code
stringlengths
1
1.05M
repo_name
stringlengths
6
83
path
stringlengths
3
242
language
stringclasses
222 values
license
stringclasses
20 values
size
int64
1
1.05M
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CHACHA20 #include "chacha20_x8664_common.S" .text .align 64 g_ror16: .byte 0x2,0x3,0x0,0x1, 0x6,0x7,0x4,0x5, 0xa,0xb,0x8,0x9, 0xe,0xf,0xc,0xd .size g_ror16, .-g_ror16 .align 64 g_ror8: .byte 0x3,0x0,0x1,0x2, 0x7,0x4,0x5,0x6, 0xb,0x8,0x9,0xa, 0xf,0xc,0xd,0xe .size g_ror8, .-g_ror8 .align 64 g_ror16_128: .byte 0x2,0x3,0x0,0x1, 0x6,0x7,0x4,0x5, 0xa,0xb,0x8,0x9, 0xe,0xf,0xc,0xd, \ 0x2,0x3,0x0,0x1, 0x6,0x7,0x4,0x5, 0xa,0xb,0x8,0x9, 0xe,0xf,0xc,0xd .size g_ror16_128, .-g_ror16_128 .align 64 g_ror8_128: .byte 0x3,0x0,0x1,0x2, 0x7,0x4,0x5,0x6, 0xb,0x8,0x9,0xa, 0xf,0xc,0xd,0xe, \ 0x3,0x0,0x1,0x2, 0x7,0x4,0x5,0x6, 0xb,0x8,0x9,0xa, 0xf,0xc,0xd,0xe .size g_ror8_128, .-g_ror8_128 .align 64 g_addOne: .long 0, 0, 0, 0, 1, 0, 0, 0, 2, 0, 0, 0, 3, 0, 0, 0 .size g_addOne, .-g_addOne .align 64 g_add4block: .long 0, 1, 2, 3 .size g_add4block, .-g_add4block .align 64 g_addsecond4block: .long 4, 4, 4, 4 .size g_addsecond4block, .-g_addsecond4block .align 64 g_add8block: .long 0, 1, 2, 3, 4, 5, 6, 7 .size g_add8block, .-g_add8block .align 64 g_addsecond8block: .long 8, 8, 8, 8, 8, 8, 8, 8 .size g_addsecond8block, .-g_addsecond8block .align 64 g_add16block: .long 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 .size g_add16block, .-g_add16block .align 64 g_addsecond16block: .long 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 .size g_addsecond16block, .-g_addsecond16block .set IN, %rsi .set OUT, %rdx /* * Processing 64 bytes: 4 x registers, number of instructions in a single loop: 21*2 = 42 * xmm0 ~ xmm3: * xmm0 {0, 1, 2, 3} * xmm1 {4, 5, 6, 7} * xmm2 {8, 9, 10, 11} * xmm3 {12, 13, 14, 15} * * Processing 128-256 bytes: 4 x registers, number of instructions in a single loop:30 * ymm0 ~ ymm3: * ymm0 {0, 1, 2, 3, 0, 1, 2, 3 } * ymm1 {4, 5, 6, 7, 4, 5, 6, 7 } * ymm2 {8, 9, 10, 11, 8, 9, 10, 11} * ymm3 {12, 13, 14, 15, 12, 13, 14, 15} * * Processing 512 bytes: y registers 0-15, 128 stack space and y registers 16-31,number of instructions *in a single loop:12*8 = 96 * Processing 1024 bytes: z registers 0-15, 256 stack space and z registers 16-31, number of instructions * in a single loop:12*8 = 96 * ymm0 ~ ymm15: * ymm0 {0, 0, 0, 0, 0, 0, 0, 0} * ymm1 {1, 1, 1, 1, 1, 1, 1, 1} * ymm2 {2, 2, 2, 2, 2, 2, 2, 2} * ymm3 {3, 3, 3, 3, 3, 3, 3, 3} * ...... * ymm15 {15, 15, 15, 15, 15, 15, 15, 15} * * zmm0 ~ zmm31: * zmm0 {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0} * zmm1 {1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1} * zmm2 {2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2} * zmm3 {3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3, 3} * ... * zmm15 {15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15} */ .macro CHACHA20_ROUND s0 s1 s2 s3 vpaddd \s1, \s0, \s0 vpxord \s0, \s3, \s3 vprold $16, \s3, \s3 vpaddd \s3, \s2, \s2 vpxord \s2, \s1, \s1 vprold $12, \s1, \s1 vpaddd \s1, \s0, \s0 vpxord \s0, \s3, \s3 vprold $8, \s3, \s3 vpaddd \s3, \s2, \s2 vpxord \s2, \s1, \s1 vprold $7, \s1, \s1 .endm /* convert y registers and write back */ .macro CONVERT_Y s0 s1 pos inpos outpos /* ymm16 => {xmm16, xmm17} */ vextracti32x4 \pos, \s0, %xmm16 vextracti32x4 \pos, \s1, %xmm17 vinserti32x4 $1, %xmm17, %ymm16, %ymm16 vpxord (IN), %ymm16, %ymm16 vmovdqu64 %ymm16, (OUT) add $32, \inpos add $32, \outpos .endm /* convert z registers and write back */ .macro CONVERT_Z s0 s1 s2 s3 pos inpos outpos /* zmm16 => {xmm16, xmm17, xmm18, xmm19} */ vextracti64x2 \pos, \s0, %xmm16 vextracti64x2 \pos, \s1, %xmm17 vextracti64x2 \pos, \s2, %xmm18 vextracti64x2 \pos, \s3, %xmm19 vinserti64x2 $1, %xmm17, %zmm16, %zmm16 vinserti64x2 $2, %xmm18, %zmm16, %zmm16 vinserti64x2 $3, %xmm19, %zmm16, %zmm16 vpxord (IN), %zmm16, %zmm16 vmovdqu64 %zmm16, (OUT) add $64, \inpos add $64, \outpos .endm /** * @Interconnection with the C interface:void CHACHA20_Update(CRYPT_CHACHA20_Ctx *ctx, const uint8_t *in, uint8_t *out, uint32_t len); * @brief chacha20 algorithm * @param ctx [IN] Algorithm context, which is set by the C interface and transferred. * @param in [IN] Data to be encrypted * @param out [OUT] Data after encryption * @param len [IN] Encrypted length * esp cannot use 15 available ctx in out len * 16 registers are needed in one cycle, then * {0, 1, 4, 5, 8, 9, 12, 13} * {2, 3, 6, 7, 10, 11, 14, 15} **/ .globl CHACHA20_Update .type CHACHA20_Update,%function .align 64 CHACHA20_Update: .cfi_startproc mov 48(%rdi), %r11d mov %rsp, %r9 subq $2048,%rsp andq $-1024,%rsp .Lchacha20_start: cmp $1024, %rcx jae .Lchacha20_1024_start cmp $512, %rcx jae .Lchacha20_512_start cmp $256, %rcx jae .Lchacha20_256_start cmp $128, %rcx jae .Lchacha20_128_start cmp $64, %rcx jae .Lchacha20_64_start jmp .Lchacha20_end .Lchacha20_64_start: LOAD_STATE %xmm0, %xmm1, %xmm2, %xmm3, %rdi vmovdqa %xmm0, %xmm10 vmovdqa %xmm1, %xmm11 vmovdqa %xmm2, %xmm12 vmovdqa %xmm3, %xmm13 mov $10, %r8 .Lchacha20_64_loop: /* 0 = 0 + 4, 12 = (12 ^ 0) >>> 16 | 8 = 8 + 12, 4 = (4 ^ 8) >>> 12 | * 0 = 0 + 4, 12 = (12 ^ 0) >>> 8 | 8 = 8 + 12, 4 = (4 ^ 8) >>> 7 * 1 = 1 + 5, 13 = (13 ^ 1) >>> 16 | 9 = 9 + 13, 5 = (5 ^ 9) >>> 12 | * 1 = 1 + 5, 13 = (13 ^ 1) >>> 8 | 9 = 9 + 13, 5 = (5 ^ 9) >>> 7 * 2 = 2 + 6, 14 = (14 ^ 2) >>> 16 | 10 = 10 + 14, 6 = (6 ^ 10)>>> 12 | * 2 = 2 + 6, 14 = (14 ^ 2) >>> 8 | 10 = 10 + 14, 6 = (6 ^ 10)>>> 7 * 3 = 3 + 7, 15 = (15 ^ 3) >>> 16 | 11 = 11 + 15, 7 = (7 ^ 11)>>> 12 | * 3 = 3 + 7 ,15 = (15 ^ 3) >>> 8 | 11 = 11 + 15, 7 = (7 ^ 11)>>> 7 */ CHACHA20_ROUND %xmm0, %xmm1, %xmm2, %xmm3 vpshufd $78, %xmm2, %xmm2 // {8 9 10 11} ==> {10 11 8 9} 01 00 11 10 vpshufd $57, %xmm1, %xmm1 // {4 5 6 7} ==> {5 6 7 4} 00 11 10 01 vpshufd $147, %xmm3, %xmm3 // {12 13 14 15} ==> {15 12 13 14} 10 01 00 11 /* 0 = 0 + 5 , 15 = (15 ^ 0) >>> 16 | 10 = 10 + 15, 5 = (5 ^ 10) >>> 12 | * 0 = 0 + 5, 15 = (15 ^ 0) >>> 8 | 10 = 10 + 15, 5 = (5 ^ 10) >>> 7 * 1 = 1 + 6 , 12 = (12 ^ 1) >>> 16 | 11 = 11 + 12, 6 = (6 ^ 11) >>> 12 | * 1 = 1 + 6, 12 = (12 ^ 1) >>> 8 | 11 = 11 + 12, 6 = (6 ^ 11) >>> 7 * 2 = 2 + 7 , 13 = (13 ^ 2) >>> 16 | 8 = 8 + 13, 7 = (7 ^ 8)>>> 12 | * 2 = 2 + 7, 13 = (13 ^ 2) >>> 8 | 8 = 8 + 13, 7 = (7 ^ 8)>>> 7 * 3 = 3 + 4 , 14 = (14 ^ 3) >>> 16 | 9 = 9 + 14, 4 = (4 ^ 9)>>> 12 | * 3 = 3 + 4, 14 = (14 ^ 3) >>> 8 | 9 = 9 + 14, 4 = (4 ^ 9)>>> 7 */ CHACHA20_ROUND %xmm0, %xmm1, %xmm2, %xmm3 vpshufd $78, %xmm2, %xmm2 // {10 11 8 9} ==> {8 9 10 11} 01 00 11 10 vpshufd $147, %xmm1, %xmm1 // {5 6 7 4} ==> {4 5 6 7} 00 11 10 01 vpshufd $57, %xmm3, %xmm3 // {15 12 13 14} ==> {12 13 14 15} 10 01 00 11 decq %r8 jnz .Lchacha20_64_loop vpaddd %xmm10, %xmm0, %xmm0 vpaddd %xmm11, %xmm1, %xmm1 vpaddd %xmm12, %xmm2, %xmm2 vpaddd %xmm13, %xmm3, %xmm3 add $1, %r11d WRITEBACK_64_AVX512 IN, OUT, %xmm0, %xmm1, %xmm2, %xmm3 mov %r11d, 48(%rdi) jmp .Lchacha20_end .Lchacha20_128_start: vbroadcasti128 (%rdi), %ymm0 // {0 1 2 3 0 1 2 3} vbroadcasti128 16(%rdi), %ymm1 // {4 5 6 7 4 5 6 7} vbroadcasti128 32(%rdi), %ymm2 // {8 9 10 11 8 9 10 11} vbroadcasti128 48(%rdi), %ymm3 // {12 13 14 15 12 13 14 15} vpaddd g_addOne(%rip), %ymm3, %ymm3 vmovdqa32 %ymm0, %ymm16 vmovdqa32 %ymm1, %ymm17 vmovdqa32 %ymm2, %ymm18 vmovdqa32 %ymm3, %ymm19 mov $10, %r8 .Lchacha20_128_loop: CHACHA20_ROUND %ymm0, %ymm1, %ymm2, %ymm3 vpshufd $78, %ymm2, %ymm2 // {8 9 10 11} ==> {10 11 8 9} 01 00 11 10 vpshufd $57, %ymm1, %ymm1 // {4 5 6 7} ==> {5 6 7 4} 00 11 10 01 vpshufd $147, %ymm3, %ymm3 // {12 13 14 15} ==> {15 12 13 14} 10 01 00 11 CHACHA20_ROUND %ymm0, %ymm1, %ymm2, %ymm3 vpshufd $78, %ymm2, %ymm2 // {8 9 10 11} ==> {10 11 8 9} 01 00 11 10 vpshufd $147, %ymm1, %ymm1 // {4 5 6 7} ==> {5 6 7 4} 00 11 10 01 vpshufd $57, %ymm3, %ymm3 // {12 13 14 15} ==> {15 12 13 14} 10 01 00 11 decq %r8 jnz .Lchacha20_128_loop vpaddd %ymm16, %ymm0, %ymm0 vpaddd %ymm17, %ymm1, %ymm1 vpaddd %ymm18, %ymm2, %ymm2 vpaddd %ymm19, %ymm3, %ymm3 vextracti32x4 $1, %ymm0, %xmm5 // ymm0 => {xmm0 xmm5} vextracti32x4 $1, %ymm1, %xmm6 // ymm1 => {xmm1 xmm6} vextracti32x4 $1, %ymm2, %xmm7 // ymm2 => {xmm2 xmm7} vextracti32x4 $1, %ymm3, %xmm8 // ymm3 => {xmm3 xmm8} WRITEBACK_64_AVX512 IN, OUT, %xmm0, %xmm1, %xmm2, %xmm3 WRITEBACK_64_AVX512 IN, OUT, %xmm5, %xmm6, %xmm7, %xmm8 add $2, %r11d sub $128, %rcx mov %r11d, 48(%rdi) jz .Lchacha20_end jmp .Lchacha20_start .Lchacha20_256_start: LOAD_1024_STATE %zmm0 %zmm1 %zmm2 %zmm3 %rdi vpaddd g_addOne(%rip), %zmm3, %zmm3 vmovdqa64 %zmm0, %zmm16 vmovdqa64 %zmm1, %zmm17 vmovdqa64 %zmm2, %zmm18 vmovdqa64 %zmm3, %zmm19 mov $10, %r8 .Lchacha20_256_loop: CHACHA20_ROUND %zmm0, %zmm1, %zmm2, %zmm3 vpshufd $78, %zmm2, %zmm2 // {8 9 10 11} ==> {10 11 8 9} 01 00 11 10 vpshufd $57, %zmm1, %zmm1 // {4 5 6 7} ==> {5 6 7 4} 00 11 10 01 vpshufd $147, %zmm3, %zmm3 // {12 13 14 15} ==> {15 12 13 14} 10 01 00 11 CHACHA20_ROUND %zmm0, %zmm1, %zmm2, %zmm3 vpshufd $78, %zmm2, %zmm2 // {8 9 10 11} ==> {10 11 8 9} 01 00 11 10 vpshufd $147, %zmm1, %zmm1 // {4 5 6 7} ==> {5 6 7 4} 00 11 10 01 vpshufd $57, %zmm3, %zmm3 // {12 13 14 15} ==> {15 12 13 14} 10 01 00 11 decq %r8 jnz .Lchacha20_256_loop vpaddd %zmm16, %zmm0, %zmm0 vpaddd %zmm17, %zmm1, %zmm1 vpaddd %zmm18, %zmm2, %zmm2 vpaddd %zmm19, %zmm3, %zmm3 vextracti64x2 $1, %zmm0, %xmm4 vextracti64x2 $1, %zmm1, %xmm5 vextracti64x2 $1, %zmm2, %xmm6 vextracti64x2 $1, %zmm3, %xmm7 vextracti64x2 $2, %zmm0, %xmm8 vextracti64x2 $2, %zmm1, %xmm9 vextracti64x2 $2, %zmm2, %xmm10 vextracti64x2 $2, %zmm3, %xmm11 vextracti64x2 $3, %zmm0, %xmm12 vextracti64x2 $3, %zmm1, %xmm13 vextracti64x2 $3, %zmm2, %xmm14 vextracti64x2 $3, %zmm3, %xmm15 WRITEBACK_64_AVX512 IN, OUT, %xmm0, %xmm1, %xmm2, %xmm3 WRITEBACK_64_AVX512 IN, OUT, %xmm4, %xmm5, %xmm6, %xmm7 WRITEBACK_64_AVX512 IN, OUT, %xmm8, %xmm9, %xmm10, %xmm11 WRITEBACK_64_AVX512 IN, OUT, %xmm12, %xmm13, %xmm14, %xmm15 add $4, %r11d sub $256, %rcx mov %r11d, 48(%rdi) jz .Lchacha20_end jmp .Lchacha20_start .Lchacha20_512_start: LOAD_512_STATE %ymm0, %ymm1, %ymm2, %ymm3, %rdi vpshufd $0b00000000, %ymm3, %ymm12 vpshufd $0b01010101, %ymm3, %ymm13 vpaddd g_add8block(%rip), %ymm12, %ymm12 // 0, 1, 2, 3, 4, 5, 6 ,7 vmovdqa32 %ymm12, %ymm28 vpshufd $0b10101010, %ymm3, %ymm14 vmovdqa32 %ymm13, %ymm29 vpshufd $0b11111111, %ymm3, %ymm15 vmovdqa32 %ymm14, %ymm30 vpshufd $0b00000000, %ymm2, %ymm8 vmovdqa32 %ymm15, %ymm31 vpshufd $0b01010101, %ymm2, %ymm9 vmovdqa32 %ymm8, %ymm24 vpshufd $0b10101010, %ymm2, %ymm10 vmovdqa32 %ymm9, %ymm25 vpshufd $0b11111111, %ymm2, %ymm11 vmovdqa32 %ymm10, %ymm26 vpshufd $0b00000000, %ymm1, %ymm4 vmovdqa32 %ymm11, %ymm27 vpshufd $0b01010101, %ymm1, %ymm5 vmovdqa32 %ymm4, %ymm20 vpshufd $0b10101010, %ymm1, %ymm6 vmovdqa32 %ymm5, %ymm21 vpshufd $0b11111111, %ymm1, %ymm7 vmovdqa32 %ymm6, %ymm22 vpshufd $0b11111111, %ymm0, %ymm3 vmovdqa32 %ymm7, %ymm23 vpshufd $0b10101010, %ymm0, %ymm2 vmovdqa32 %ymm3, %ymm19 vpshufd $0b01010101, %ymm0, %ymm1 vmovdqa32 %ymm2, %ymm18 vpshufd $0b00000000, %ymm0, %ymm0 vmovdqa32 %ymm1, %ymm17 vmovdqa32 %ymm0, %ymm16 mov $10, %r8 .Lchacha20_512_loop: CHACHA20_LOOP_AVX512 %ymm0, %ymm1, %ymm2, %ymm3, %ymm4, %ymm5, %ymm6, %ymm7, %ymm8, %ymm9, \ %ymm10, %ymm11, %ymm12, %ymm13, %ymm14, %ymm15 decq %r8 jnz .Lchacha20_512_loop /* ymm16~31: original matrix */ vpaddd %ymm16, %ymm0, %ymm0 vpaddd %ymm17, %ymm1, %ymm1 vpaddd %ymm18, %ymm2, %ymm2 vpaddd %ymm19, %ymm3, %ymm3 vpaddd %ymm20, %ymm4, %ymm4 vpaddd %ymm21, %ymm5, %ymm5 vpaddd %ymm22, %ymm6, %ymm6 vpaddd %ymm23, %ymm7, %ymm7 vpaddd %ymm24, %ymm8, %ymm8 vpaddd %ymm25, %ymm9, %ymm9 vpaddd %ymm26, %ymm10, %ymm10 vpaddd %ymm27, %ymm11, %ymm11 vpaddd %ymm28, %ymm12, %ymm12 vpaddd %ymm29, %ymm13, %ymm13 vpaddd %ymm30, %ymm14, %ymm14 vpaddd %ymm31, %ymm15, %ymm15 MATRIX_TO_STATE %ymm0, %ymm1, %ymm2, %ymm3, %ymm20, %ymm21 // set state 0, 3, 9, 10 MATRIX_TO_STATE %ymm4, %ymm5, %ymm6, %ymm7, %ymm22, %ymm23 // set state 4, 7, 13, 14 MATRIX_TO_STATE %ymm8, %ymm9, %ymm10, %ymm11, %ymm1, %ymm2 // set state 8, 11, 1, 2 MATRIX_TO_STATE %ymm12, %ymm13, %ymm14, %ymm15, %ymm5, %ymm6 // set state 12, 15, 5, 6 /* * {A0 A1 A2 A3 E0 E1 E2 E3} * {B0 B1 B2 B3 F0 F1 F2 F3} * {C0 C1 C2 C3 G0 G1 G2 G3} * {D0 D1 D2 D3 H0 H1 H2 H3} * ... * => * {A0 A1 A2 A3 B0 B1 B2 B3} * {C0 C1 C2 C3 D0 D1 D2 D3} * .... */ CONVERT_Y %ymm0, %ymm4, $0 IN OUT CONVERT_Y %ymm8, %ymm12, $0 IN OUT CONVERT_Y %ymm3, %ymm7, $0 IN OUT CONVERT_Y %ymm11, %ymm15, $0 IN OUT CONVERT_Y %ymm20, %ymm22, $0 IN OUT CONVERT_Y %ymm1, %ymm5, $0 IN OUT CONVERT_Y %ymm21, %ymm23, $0 IN OUT CONVERT_Y %ymm2, %ymm6, $0 IN OUT CONVERT_Y %ymm0, %ymm4, $1 IN OUT CONVERT_Y %ymm8, %ymm12, $1 IN OUT CONVERT_Y %ymm3, %ymm7, $1 IN OUT CONVERT_Y %ymm11, %ymm15, $1 IN OUT CONVERT_Y %ymm20, %ymm22, $1 IN OUT CONVERT_Y %ymm1, %ymm5, $1 IN OUT CONVERT_Y %ymm21, %ymm23, $1 IN OUT CONVERT_Y %ymm2, %ymm6, $1 IN OUT add $8, %r11d sub $512, %rcx mov %r11d, 48(%rdi) jz .Lchacha20_end jmp .Lchacha20_start .Lchacha20_1024_start: LOAD_1024_STATE %zmm0 %zmm1 %zmm2 %zmm3 %rdi STATE_TO_MATRIX_Z_AVX512 %zmm0, %zmm16, %zmm17, %zmm18, %zmm19 STATE_TO_MATRIX_Z_AVX512 %zmm1, %zmm20, %zmm21, %zmm22, %zmm23 STATE_TO_MATRIX_Z_AVX512 %zmm2, %zmm24, %zmm25, %zmm26, %zmm27 STATE_TO_MATRIX_Z_AVX512 %zmm3, %zmm28, %zmm29, %zmm30, %zmm31 vpaddd g_add16block(%rip), %zmm28, %zmm28 vmovdqa64 %zmm16, %zmm0 vmovdqa64 %zmm17, %zmm1 vmovdqa64 %zmm18, %zmm2 vmovdqa64 %zmm19, %zmm3 vmovdqa64 %zmm20, %zmm4 vmovdqa64 %zmm21, %zmm5 vmovdqa64 %zmm22, %zmm6 vmovdqa64 %zmm23, %zmm7 vmovdqa64 %zmm24, %zmm8 vmovdqa64 %zmm25, %zmm9 vmovdqa64 %zmm26, %zmm10 vmovdqa64 %zmm27, %zmm11 vmovdqa64 %zmm28, %zmm12 vmovdqa64 %zmm29, %zmm13 vmovdqa64 %zmm30, %zmm14 vmovdqa64 %zmm31, %zmm15 mov $10, %r8 jmp .Lchacha20_1024_loop .Lchacha20_1024_start_cont: vmovdqa32 %zmm16, %zmm0 vmovdqa32 %zmm17, %zmm1 vmovdqa32 %zmm18, %zmm2 vmovdqa32 %zmm19, %zmm3 vmovdqa32 %zmm20, %zmm4 vmovdqa32 %zmm21, %zmm5 vmovdqa32 %zmm22, %zmm6 vmovdqa32 %zmm23, %zmm7 vmovdqa32 %zmm24, %zmm8 vmovdqa32 %zmm25, %zmm9 vmovdqa32 %zmm26, %zmm10 vmovdqa32 %zmm27, %zmm11 vmovdqa32 %zmm28, %zmm12 vmovdqa32 %zmm29, %zmm13 vpaddd g_addsecond16block(%rip), %zmm12, %zmm12 // add 8, 8, 8, 8, 8, 8, 8, 8 or 4, 4, 4, 4 vmovdqa32 %zmm30, %zmm14 vmovdqa32 %zmm31, %zmm15 vmovdqa32 %zmm12, %zmm28 mov $10, %r8 .Lchacha20_1024_loop: CHACHA20_LOOP_AVX512 %zmm0, %zmm1, %zmm2, %zmm3, %zmm4, %zmm5, %zmm6, %zmm7, %zmm8, %zmm9, \ %zmm10, %zmm11, %zmm12, %zmm13, %zmm14, %zmm15 decq %r8 jnz .Lchacha20_1024_loop vpaddd %zmm16, %zmm0, %zmm0 vpaddd %zmm17, %zmm1, %zmm1 vpaddd %zmm18, %zmm2, %zmm2 vpaddd %zmm19, %zmm3, %zmm3 vpaddd %zmm20, %zmm4, %zmm4 vpaddd %zmm21, %zmm5, %zmm5 vpaddd %zmm22, %zmm6, %zmm6 vpaddd %zmm23, %zmm7, %zmm7 vpaddd %zmm24, %zmm8, %zmm8 vpaddd %zmm25, %zmm9, %zmm9 vpaddd %zmm26, %zmm10, %zmm10 vpaddd %zmm27, %zmm11, %zmm11 vpaddd %zmm28, %zmm12, %zmm12 vpaddd %zmm29, %zmm13, %zmm13 vpaddd %zmm30, %zmm14, %zmm14 vpaddd %zmm31, %zmm15, %zmm15 /* store matrix 16, 17, 18, 19 in stack */ vmovdqa64 %zmm16, (%rsp) vmovdqa64 %zmm17, 64(%rsp) vmovdqa64 %zmm18, 128(%rsp) vmovdqa64 %zmm19, 192(%rsp) /* store matrix 9, 10, 13, 14 in zmm16, 17, 18, 19 */ vmovdqa64 %zmm9, %zmm16 // zmm16: encrypt matrix zmm9 vmovdqa64 %zmm10, %zmm17 // zmm17: encrypt matrix zmm10 vmovdqa64 %zmm13, %zmm18 // zmm18: encrypt matrix zmm13 vmovdqa64 %zmm14, %zmm19 // zmm19: encrypt matrix zmm14 /* zmm0~15: encrypt matrix 0 ~ 15*/ MATRIX_TO_STATE %zmm0, %zmm1, %zmm2, %zmm3, %zmm9, %zmm10 // set state 0, 3, 9, 10 MATRIX_TO_STATE %zmm4, %zmm5, %zmm6, %zmm7, %zmm13, %zmm14 // set state 4, 7, 13, 14 MATRIX_TO_STATE %zmm8, %zmm16, %zmm17, %zmm11, %zmm1, %zmm2 // set state 8, 11, 1, 2 MATRIX_TO_STATE %zmm12, %zmm18, %zmm19, %zmm15, %zmm5, %zmm6 // set state 12, 15, 5, 6 /* * {A0 A1 A2 A3 E0 E1 E2 E3 I0 I1 I2 I3 M0 M1 M2 M3} * {B0 B1 B2 B3 F0 F1 F2 F3 J0 J1 J2 J3 N0 N1 N2 N3} * {C0 C1 C2 C3 G0 G1 G2 G3 K0 K1 K2 K3 O0 O1 O2 O3} * {D0 D1 D2 D3 H0 H1 H2 H3 L0 L1 L2 L3 P0 P1 P2 P3} * ... * => * {A0 A1 A2 A3 B0 B1 B2 B3 C0 C1 C2 C3 D0 D1 D2 D3} * {E0 E1 E2 E3 F0 F1 F2 F3 G0 G1 G2 G3 H0 H1 H2 H3} * {I0 I1 I2 I3 J0 J1 J2 J3 K0 K1 K2 K3 L0 L1 L2 L3} * .... */ CONVERT_Z %zmm0, %zmm4, %zmm8, %zmm12, $0 IN OUT CONVERT_Z %zmm3, %zmm7, %zmm11, %zmm15, $0 IN OUT CONVERT_Z %zmm9, %zmm13, %zmm1, %zmm5, $0 IN OUT CONVERT_Z %zmm10, %zmm14, %zmm2, %zmm6, $0 IN OUT CONVERT_Z %zmm0, %zmm4, %zmm8, %zmm12, $1 IN OUT CONVERT_Z %zmm3, %zmm7, %zmm11, %zmm15, $1 IN OUT CONVERT_Z %zmm9, %zmm13, %zmm1, %zmm5, $1 IN OUT CONVERT_Z %zmm10, %zmm14, %zmm2, %zmm6, $1 IN OUT CONVERT_Z %zmm0, %zmm4, %zmm8, %zmm12, $2 IN OUT CONVERT_Z %zmm3, %zmm7, %zmm11, %zmm15, $2 IN OUT CONVERT_Z %zmm9, %zmm13, %zmm1, %zmm5, $2 IN OUT CONVERT_Z %zmm10, %zmm14, %zmm2, %zmm6, $2 IN OUT CONVERT_Z %zmm0, %zmm4, %zmm8, %zmm12, $3 IN OUT CONVERT_Z %zmm3, %zmm7, %zmm11, %zmm15, $3 IN OUT CONVERT_Z %zmm9, %zmm13, %zmm1, %zmm5, $3 IN OUT CONVERT_Z %zmm10, %zmm14, %zmm2, %zmm6, $3 IN OUT /* store zmm16~19 in stack */ vmovdqa64 (%rsp), %zmm16 vmovdqa64 64(%rsp), %zmm17 vmovdqa64 128(%rsp), %zmm18 vmovdqa64 192(%rsp), %zmm19 add $16, %r11d sub $1024, %rcx mov %r11d, 48(%rdi) jz .Lchacha20_clear cmp $1024, %rcx jae .Lchacha20_1024_start_cont jmp .Lchacha20_start .Lchacha20_clear: /* clear sensitive info in stack */ vpxord %zmm0, %zmm0, %zmm0 vmovdqa64 %zmm0, (%rsp) vmovdqa64 %zmm0, 64(%rsp) vmovdqa64 %zmm0, 128(%rsp) vmovdqa64 %zmm0, 192(%rsp) .Lchacha20_end: xor %r11d, %r11d mov %r9, %rsp .cfi_endproc ret .size CHACHA20_Update,.-CHACHA20_Update #endif
2401_83913325/openHiTLS-examples_7925
crypto/chacha20/src/asm/chacha20block_x8664_avx512.S
Unix Assembly
unknown
21,249
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CHACHA20 .text .LAndBlock: .long 1, 0, 0, 0 .LRor16: .byte 0x2,0x3,0x0,0x1, 0x6,0x7,0x4,0x5, 0xa,0xb,0x8,0x9, 0xe,0xf,0xc,0xd .LRor8: .byte 0x3,0x0,0x1,0x2, 0x7,0x4,0x5,0x6, 0xb,0x8,0x9,0xa, 0xf,0xc,0xd,0xe .set IN, %r9 .set OUT, %r10 /* Original State */ .set O00, %xmm12 .set O01, %xmm13 .set O02, %xmm14 .set O03, %xmm15 /* State 0 */ .set S00, %xmm0 // LINE 0 STATE 0 .set S01, %xmm1 // LINE 1 STATE 0 .set S02, %xmm2 // LINE 2 STATE 0 .set S03, %xmm3 // LINE 3 STATE 0 /* State 1 */ .set S10, %xmm5 // LINE 0 STATE 1 .set S11, %xmm6 // LINE 1 STATE 1 .set S12, %xmm7 // LINE 2 STATE 1 .set S13, %xmm8 // LINE 3 STATE 1 .macro CHACHA20_ROUND S0 S1 S2 S3 CUR paddd \S1, \S0 pxor \S0, \S3 pshufb .LRor16(%rip), \S3 paddd \S3, \S2 pxor \S2, \S1 movdqa \S1, \CUR psrld $20, \S1 pslld $12, \CUR por \CUR, \S1 paddd \S1, \S0 pxor \S0, \S3 pshufb .LRor8(%rip), \S3 paddd \S3, \S2 pxor \S2, \S1 movdqa \S1, \CUR psrld $25, \S1 pslld $7, \CUR por \CUR, \S1 .endm /* QUARTERROUND for two states */ .macro CHACHA20_2_ROUND S0 S1 S2 S3 CUR S4 S5 S6 S7 CUR1 paddd \S1, \S0 pxor \S0, \S3 pshufb .LRor16(%rip), \S3 paddd \S3, \S2 pxor \S2, \S1 movdqa \S1, \CUR psrld $20, \S1 pslld $12, \CUR por \CUR, \S1 paddd \S1, \S0 pxor \S0, \S3 pshufb .LRor8(%rip), \S3 paddd \S3, \S2 pxor \S2, \S1 movdqa \S1, \CUR psrld $25, \S1 pslld $7, \CUR por \CUR, \S1 paddd \S5, \S4 pxor \S4, \S7 pshufb .LRor16(%rip), \S7 paddd \S7, \S6 pxor \S6, \S5 movdqa \S5, \CUR1 psrld $20, \S5 pslld $12, \CUR1 por \CUR1, \S5 paddd \S5, \S4 pxor \S4, \S7 pshufb .LRor8(%rip), \S7 paddd \S7, \S6 pxor \S6, \S5 movdqa \S5, \CUR1 psrld $25, \S5 pslld $7, \CUR1 por \CUR1, \S5 .endm /* final add & xor for 64 bytes */ .macro WRITE_BACK_64 IN_POS OUT_POS paddd O00, S00 paddd O01, S01 paddd O02, S02 paddd O03, S03 movdqu (\IN_POS), %xmm4 // get input movdqu 16(\IN_POS), %xmm9 movdqu 32(\IN_POS), %xmm10 movdqu 48(\IN_POS), %xmm11 pxor %xmm4, S00 pxor %xmm9, S01 pxor %xmm10, S02 pxor %xmm11, S03 movdqu S00, (\OUT_POS) // write back output movdqu S01, 16(\OUT_POS) movdqu S02, 32(\OUT_POS) movdqu S03, 48(\OUT_POS) .endm /* final add & xor for 128 bytes */ .macro WRITE_BACK_128 IN_POS OUT_POS paddd O00, S00 // state 0 + origin state 0 paddd O01, S01 paddd O02, S02 paddd O03, S03 pinsrd $0, %r11d, O03 // change Original state 0 to Original state 1 paddd O00, S10 // state 1 + origin state 1 paddd O01, S11 paddd O02, S12 paddd O03, S13 movdqu (\IN_POS), %xmm4 // get input 0 movdqu 16(\IN_POS), %xmm9 movdqu 32(\IN_POS), %xmm10 movdqu 48(\IN_POS), %xmm11 pxor %xmm4, S00 // input 0 ^ state 0 pxor %xmm9, S01 pxor %xmm10, S02 pxor %xmm11, S03 movdqu S00, (\OUT_POS) // write back to output 0 movdqu S01, 16(\OUT_POS) movdqu S02, 32(\OUT_POS) movdqu S03, 48(\OUT_POS) movdqu 64(\IN_POS), %xmm4 // get input 1 movdqu 80(\IN_POS), %xmm9 movdqu 96(\IN_POS), %xmm10 movdqu 112(\IN_POS), %xmm11 pxor %xmm4, S10 // input 1 ^ state 1 pxor %xmm9, S11 pxor %xmm10, S12 pxor %xmm11, S13 movdqu S10, 64(\OUT_POS) // write back to output 1 movdqu S11, 80(\OUT_POS) movdqu S12, 96(\OUT_POS) movdqu S13, 112(\OUT_POS) .endm .macro GENERATE_1_STATE add $1, %r11d pinsrd $0, %r11d, O03 movdqu O00, S00 // set state 0 movdqu O01, S01 movdqu O02, S02 movdqu O03, S03 .endm .macro GENERATE_2_STATE add $1, %r11d pinsrd $0, %r11d, O03 movdqu O00, S00 // set state 0 movdqu O01, S01 movdqu O02, S02 movdqu O03, S03 movdqu O00, S10 // set state 1 movdqu O01, S11 movdqu O02, S12 movdqu O03, S13 add $1, %r11d pinsrd $0, %r11d, S13 .endm /* * Processing 64 bytes: 4 xmm registers * xmm0 ~ xmm3: * xmm0 {0, 1, 2, 3} * xmm1 {4, 5, 6, 7} * xmm2 {8, 9, 10, 11} * xmm3 {12, 13, 14, 15} * * Processing 128 bytes: 8 xmm registers * xmm0 ~ xmm8: * xmm0 {0, 1, 2, 3} xmm5 {0, 1, 2, 3} * xmm1 {4, 5, 6, 7} xmm6 {4, 5, 6, 7} * xmm2 {8, 9, 10, 11} xmm7 {8, 9, 10, 11} * xmm3 {12, 13, 14, 15} xmm8 {12, 13, 14, 15} * * Processing 256 bytes: 16 xmm registers * xmm0 ~ xmm15: * xmm0 {0, 0, 0, 0} * xmm1 {1, 2, 2, 2} * xmm2 {3, 3, 3, 3} * xmm3 {4, 4, 4, 4} * ... * xmm15 {15, 15, 15, 15} * * Processing 512 bytes: 16 xmm registers * ymm0 ~ ymm15: * ymm0 {0, 0, 0, 0} * ymm1 {1, 2, 2, 2} * ymm2 {3, 3, 3, 3} * ymm3 {4, 4, 4, 4} * ... * ymm15 {15, 15, 15, 15} * */ /** * @Interconnection with the C interface:void CHACHA20_Update(CRYPT_CHACHA20_Ctx *ctx, const uint8_t *in, uint8_t *out, uint32_t len); * @brief chacha20 algorithm * @param ctx [IN] Algorithm context, which is set by the C interface and transferred. * @param in [IN] Data to be encrypted * @param out [OUT] Data after encryption * @param len [IN] Encrypted length * esp cannot use 15 available ctx in out len * 16 registers are needed in one cycle, then * {0, 1, 4, 5, 8, 9, 12, 13} * {2, 3, 6, 7, 10, 11, 14, 15} **/ .globl CHACHA20_Update .type CHACHA20_Update,%function .align 64 CHACHA20_Update: .cfi_startproc push %r12 mov %rcx, %r12 mov 48(%rdi), %r11d mov %rsi, IN mov %rdx, OUT movdqu (%rdi), O00 // state[0-3] movdqu 16(%rdi), O01 // state[4-7] movdqu 32(%rdi), O02 // state[8-11] movdqu 48(%rdi), O03 // state[12-15] sub $1, %r11d .LChaCha20_start: cmp $128, %r12 jae .LChaCha20_128_start cmp $64, %r12 jae .LChaCha20_64_start jmp .LChaCha20_end .LChaCha20_64_start: GENERATE_1_STATE mov $10, %r8 .LChaCha20_64_loop: sub $1, %r8 /* 0 = 0 + 4, 12 = (12 ^ 0) >>> 16 | 8 = 8 + 12, 4 = (4 ^ 8) >>> 12 | 0 = 0 + 4, 12 = (12 ^ 0) >>> 8 | 8 = 8 + 12, 4 = (4 ^ 8) >>> 7 */ /* 1 = 1 + 5, 13 = (13 ^ 1) >>> 16 | 9 = 9 + 13, 5 = (5 ^ 9) >>> 12 | 1 = 1 + 5, 13 = (13 ^ 1) >>> 8 | 9 = 9 + 13, 5 = (5 ^ 9) >>> 7 */ /* 2 = 2 + 6, 14 = (14 ^ 2) >>> 16 | 10 = 10 + 14, 6 = (6 ^ 10)>>> 12 | 2 = 2 + 6, 14 = (14 ^ 2) >>> 8 | 10 =10+ 14, 6 = (6 ^ 10)>>> 7 */ /* 3 = 3 + 7, 15 = (15 ^ 3) >>> 16 | 11 = 11 + 15, 7 = (7 ^ 11)>>> 12 | 3 = 3 + 7 ,15 = (15 ^ 3) >>> 8 | 11 =11+ 15, 7 = (7 ^ 11)>>> 7 */ CHACHA20_ROUND S00 S01 S02 S03 %xmm4 pshufd $78, S02, S02 // {8 9 10 11} ==> {10 11 8 9} 01 00 11 10 pshufd $57, S01, S01 // {4 5 6 7} ==> {5 6 7 4} 00 11 10 01 pshufd $147, S03, S03 // {12 13 14 15} ==> {15 12 13 14} 10 01 00 11 /* 0 = 0 + 5 , 15 = (15 ^ 0) >>> 16 | 10 = 10 + 15, 5 = (5 ^ 10) >>> 12 | 0 = 0 + 5, 15 = (15 ^ 0) >>> 8 | 10 = 10 + 15, 5 = (5 ^ 10) >>> 7 */ /* 1 = 1 + 6 , 12 = (12 ^ 1) >>> 16 | 11 = 11 + 12, 6 = (6 ^ 11) >>> 12 | 1 = 1 + 6, 12 = (12 ^ 1) >>> 8 | 11 = 11 + 12, 6 = (6 ^ 11) >>> 7 */ /* 2 = 2 + 7 , 13 = (13 ^ 2) >>> 16 | 8 = 8 + 13, 7 = (7 ^ 8)>>> 12 | 2 = 2 + 7, 13 = (13 ^ 2) >>> 8 | 8 = 8 + 13, 7 = (7 ^ 8)>>> 7 */ /* 3 = 3 + 4 , 14 = (14 ^ 3) >>> 16 | 9 = 9 + 14, 4 = (4 ^ 9)>>> 12 | 3 = 3 + 4, 14 = (14 ^ 3) >>> 8 | 9 = 9 + 14, 4 = (4 ^ 9)>>> 7 */ CHACHA20_ROUND S00 S01 S02 S03 %xmm4 pshufd $78, S02, S02 // {10 11 8 9} ==> {8 9 10 11} 01 00 11 10 pshufd $147, S01, S01 // {5 6 7 4} ==> {4 5 6 7} 00 11 10 01 pshufd $57, S03, S03 // {15 12 13 14} ==> {12 13 14 15} 10 01 00 11 jnz .LChaCha20_64_loop WRITE_BACK_64 IN OUT add $64, IN add $64, OUT sub $64, %r12 jmp .LChaCha20_start .LChaCha20_128_start: GENERATE_2_STATE mov $10, %r8 .LChaCha20_128_loop: CHACHA20_2_ROUND S00 S01 S02 S03 %xmm4 S10 S11 S12 S13 %xmm9 pshufd $78, S02, S02 // {8 9 10 11} ==> {10 11 8 9} 01 00 11 10 pshufd $57, S01, S01 // {4 5 6 7} ==> {5 6 7 4} 00 11 10 01 pshufd $147, S03, S03 // {12 13 14 15} ==> {15 12 13 14} 10 01 00 11 pshufd $78, S12, S12 // {8 9 10 11} ==> {10 11 8 9} 01 00 11 10 pshufd $57, S11, S11 // {4 5 6 7} ==> {5 6 7 4} 00 11 10 01 pshufd $147, S13, S13 // {12 13 14 15} ==> {15 12 13 14} 10 01 00 11 CHACHA20_2_ROUND S00 S01 S02 S03 %xmm4 S10 S11 S12 S13 %xmm9 pshufd $78, S02, S02 // {8 9 10 11} ==> {10 11 8 9} 01 00 11 10 pshufd $147, S01, S01 // {4 5 6 7} ==> {5 6 7 4} 00 11 10 01 pshufd $57, S03, S03 // {12 13 14 15} ==> {15 12 13 14} 10 01 00 11 pshufd $78, S12, S12 // {8 9 10 11} ==> {10 11 8 9} 01 00 11 10 pshufd $147, S11, S11 // {4 5 6 7} ==> {5 6 7 4} 00 11 10 01 pshufd $57, S13, S13 // {12 13 14 15} ==> {15 12 13 14} 10 01 00 11 sub $1, %r8 jnz .LChaCha20_128_loop WRITE_BACK_128 IN OUT add $128, IN add $128, OUT sub $128, %r12 jmp .LChaCha20_start .LChaCha20_end: add $1, %r11d mov %r11d, 48(%rdi) pop %r12 ret .cfi_endproc .size CHACHA20_Update,.-CHACHA20_Update #endif
2401_83913325/openHiTLS-examples_7925
crypto/chacha20/src/asm/chachablock_x86_AVX2.S
Unix Assembly
unknown
10,613
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CHACHA20 #include "securec.h" #include "bsl_err_internal.h" #include "crypt_utils.h" #include "crypt_errno.h" #include "crypt_chacha20.h" #include "chacha20_local.h" #define KEYSET 0x01 #define NONCESET 0x02 // RFC7539-2.1 #define QUARTER(a, b, c, d) \ do { \ (a) += (b); (d) ^= (a); (d) = ROTL32((d), 16); \ (c) += (d); (b) ^= (c); (b) = ROTL32((b), 12); \ (a) += (b); (d) ^= (a); (d) = ROTL32((d), 8); \ (c) += (d); (b) ^= (c); (b) = ROTL32((b), 7); \ } while (0) #define QUARTERROUND(state, a, b, c, d) QUARTER((state)[(a)], (state)[(b)], (state)[(c)], (state)[(d)]) int32_t CRYPT_CHACHA20_SetKey(CRYPT_CHACHA20_Ctx *ctx, const uint8_t *key, uint32_t keyLen) { if (ctx == NULL || key == NULL || keyLen == 0) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (keyLen != CHACHA20_KEYLEN) { BSL_ERR_PUSH_ERROR(CRYPT_CHACHA20_KEYLEN_ERROR); return CRYPT_CHACHA20_KEYLEN_ERROR; } /** * RFC7539-2.3 * cccccccc cccccccc cccccccc cccccccc * kkkkkkkk kkkkkkkk kkkkkkkk kkkkkkkk * kkkkkkkk kkkkkkkk kkkkkkkk kkkkkkkk * bbbbbbbb nnnnnnnn nnnnnnnn nnnnnnnn */ // The first four words (0-3) are constants: 0x61707865, 0x3320646e, 0x79622d32, 0x6b206574 ctx->state[0] = 0x61707865; ctx->state[1] = 0x3320646e; ctx->state[2] = 0x79622d32; ctx->state[3] = 0x6b206574; /** * The next eight words (4-11) are taken from the 256-bit key by * reading the bytes in little-endian order, in 4-byte chunks. */ ctx->state[4] = GET_UINT32_LE(key, 0); ctx->state[5] = GET_UINT32_LE(key, 4); ctx->state[6] = GET_UINT32_LE(key, 8); ctx->state[7] = GET_UINT32_LE(key, 12); ctx->state[8] = GET_UINT32_LE(key, 16); ctx->state[9] = GET_UINT32_LE(key, 20); ctx->state[10] = GET_UINT32_LE(key, 24); ctx->state[11] = GET_UINT32_LE(key, 28); // Word 12 is a block counter // RFC7539-2.4: It makes sense to use one if we use the zero block ctx->state[12] = 1; ctx->set |= KEYSET; ctx->lastLen = 0; return CRYPT_SUCCESS; } static int32_t CRYPT_CHACHA20_SetNonce(CRYPT_CHACHA20_Ctx *ctx, const uint8_t *nonce, uint32_t nonceLen) { // RFC7539-2.3 if (ctx == NULL || nonce == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (nonceLen != CHACHA20_NONCELEN) { BSL_ERR_PUSH_ERROR(CRYPT_CHACHA20_NONCELEN_ERROR); return CRYPT_CHACHA20_NONCELEN_ERROR; } /** * Words 13-15 are a nonce, which should not be repeated for the same * key. The 13th word is the first 32 bits of the input nonce taken * as a little-endian integer, while the 15th word is the last 32 * bits. */ ctx->state[13] = GET_UINT32_LE(nonce, 0); ctx->state[14] = GET_UINT32_LE(nonce, 4); ctx->state[15] = GET_UINT32_LE(nonce, 8); ctx->set |= NONCESET; ctx->lastLen = 0; return CRYPT_SUCCESS; } // Little-endian data input static int32_t CRYPT_CHACHA20_SetCount(CRYPT_CHACHA20_Ctx *ctx, const uint8_t *cnt, uint32_t cntLen) { if (ctx == NULL || cnt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (cntLen != sizeof(uint32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_CHACHA20_COUNTLEN_ERROR); return CRYPT_CHACHA20_COUNTLEN_ERROR; } /** * RFC7539-2.4 * This can be set to any number, but will * usually be zero or one. It makes sense to use one if we use the * zero block for something else, such as generating a one-time * authenticator key as part of an AEAD algorithm */ ctx->state[12] = GET_UINT32_LE((uintptr_t)cnt, 0); ctx->lastLen = 0; return CRYPT_SUCCESS; } void CHACHA20_Block(CRYPT_CHACHA20_Ctx *ctx) { uint32_t i; // The length defined by ctx->last.c is the same as that defined by ctx->state. // Therefore, the returned value is not out of range. (void)memcpy_s(ctx->last.c, CHACHA20_STATEBYTES, ctx->state, sizeof(ctx->state)); /* RFC7539-2.3 These are 20 round in this function */ for (i = 0; i < 10; i++) { /* column round */ QUARTERROUND(ctx->last.c, 0, 4, 8, 12); QUARTERROUND(ctx->last.c, 1, 5, 9, 13); QUARTERROUND(ctx->last.c, 2, 6, 10, 14); QUARTERROUND(ctx->last.c, 3, 7, 11, 15); /* diagonal round */ QUARTERROUND(ctx->last.c, 0, 5, 10, 15); QUARTERROUND(ctx->last.c, 1, 6, 11, 12); QUARTERROUND(ctx->last.c, 2, 7, 8, 13); QUARTERROUND(ctx->last.c, 3, 4, 9, 14); } /* Reference from rfc 7539, At the end of 20 rounds (or 10 iterations of the above list), * we add the original input words to the output words */ for (i = 0; i < CHACHA20_STATESIZE; i++) { ctx->last.c[i] += ctx->state[i]; ctx->last.c[i] = CRYPT_HTOLE32(ctx->last.c[i]); } ctx->state[12]++; } int32_t CRYPT_CHACHA20_Update(CRYPT_CHACHA20_Ctx *ctx, const uint8_t *in, uint8_t *out, uint32_t len) { if (ctx == NULL || out == NULL || in == NULL || len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((ctx->set & KEYSET) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CHACHA20_NO_KEYINFO); return CRYPT_CHACHA20_NO_KEYINFO; } if ((ctx->set & NONCESET) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CHACHA20_NO_NONCEINFO); return CRYPT_CHACHA20_NO_NONCEINFO; } uint32_t i; const uint8_t *offIn = in; uint8_t *offOut = out; uint32_t tLen = len; if (ctx->lastLen != 0) { // has remaining data during the last processing uint32_t num = (tLen < ctx->lastLen) ? tLen : ctx->lastLen; uint8_t *tLast = ctx->last.u + CHACHA20_STATEBYTES - ctx->lastLen; // offset for (i = 0; i < num; i++) { offOut[i] = tLast[i] ^ offIn[i]; } offIn += num; offOut += num; tLen -= num; ctx->lastLen -= num; } if (tLen >= CHACHA20_STATEBYTES) { // which is greater than or equal to an integer multiple of 64 bytes CHACHA20_Update(ctx, offIn, offOut, tLen); // processes data that is an integer multiple of 64 bytes uint32_t vLen = tLen - (tLen & 0x3f); // 0x3f = %CHACHA20_STATEBYTES offIn += vLen; offOut += vLen; tLen -= vLen; } // Process the remaining data if (tLen > 0) { CHACHA20_Block(ctx); uint32_t t = tLen & 0xf8; // processing length is a multiple of 8 if (t != 0) { DATA64_XOR(ctx->last.u, offIn, offOut, t); } for (i = t; i < tLen; i++) { offOut[i] = ctx->last.u[i] ^ offIn[i]; } ctx->lastLen = CHACHA20_STATEBYTES - tLen; } return CRYPT_SUCCESS; } int32_t CRYPT_CHACHA20_Ctrl(CRYPT_CHACHA20_Ctx *ctx, int32_t opt, void *val, uint32_t len) { switch (opt) { case CRYPT_CTRL_SET_IV: // in chacha20_poly1305 mode, the configured IV is the nonce of chacha20. /** * RFC_7539-2.8.1 * chacha20_aead_encrypt(aad, key, iv, constant, plaintext): * nonce = constant | iv */ return CRYPT_CHACHA20_SetNonce(ctx, val, len); case CRYPT_CTRL_SET_COUNT: return CRYPT_CHACHA20_SetCount(ctx, val, len); default: BSL_ERR_PUSH_ERROR(CRYPT_CHACHA20_CTRLTYPE_ERROR); return CRYPT_CHACHA20_CTRLTYPE_ERROR; } } void CRYPT_CHACHA20_Clean(CRYPT_CHACHA20_Ctx *ctx) { if (ctx == NULL) { return; } (void)memset_s(ctx, sizeof(CRYPT_CHACHA20_Ctx), 0, sizeof(CRYPT_CHACHA20_Ctx)); } #endif // HITLS_CRYPTO_CHACHA20
2401_83913325/openHiTLS-examples_7925
crypto/chacha20/src/chacha20.c
C
unknown
8,292
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CHACHA20_LOCAL_H #define CHACHA20_LOCAL_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_CHACHA20 #include "crypt_chacha20.h" void CHACHA20_Block(CRYPT_CHACHA20_Ctx *ctx); void CHACHA20_Update(CRYPT_CHACHA20_Ctx *ctx, const uint8_t *in, uint8_t *out, uint32_t len); #endif // HITLS_CRYPTO_CHACHA20 #endif // CHACHA20_LOCAL_H
2401_83913325/openHiTLS-examples_7925
crypto/chacha20/src/chacha20_local.h
C
unknown
885
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CHACHA20 #include "crypt_utils.h" #include "chacha20_local.h" void CHACHA20_Update(CRYPT_CHACHA20_Ctx *ctx, const uint8_t *in, uint8_t *out, uint32_t len) { const uint8_t *offIn = in; uint8_t *offOut = out; uint32_t tLen = len; // one block is processed each time while (tLen >= CHACHA20_STATEBYTES) { CHACHA20_Block(ctx); // Process 64 bits at a time DATA64_XOR(ctx->last.u, offIn, offOut, CHACHA20_STATEBYTES); offIn += CHACHA20_STATEBYTES; offOut += CHACHA20_STATEBYTES; tLen -= CHACHA20_STATEBYTES; } } #endif // HITLS_CRYPTO_CHACHA20
2401_83913325/openHiTLS-examples_7925
crypto/chacha20/src/chacha20block.c
C
unknown
1,206
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_CBC_MAC_H #define CRYPT_CBC_MAC_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_CBC_MAC #include <stdint.h> #include "crypt_types.h" #include "crypt_cmac.h" #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ typedef struct CBC_MAC_Ctx CRYPT_CBC_MAC_Ctx; #define CRYPT_CBC_MAC_SetParam NULL /** * @brief Create a new CBC_MAC context. * @param id [IN] CBC_MAC algorithm ID * @return Pointer to the CBC_MAC context */ CRYPT_CBC_MAC_Ctx *CRYPT_CBC_MAC_NewCtx(CRYPT_MAC_AlgId id); /** * @brief Create a new CBC_MAC context with external library context. * @param libCtx [in] External library context * @param id [in] CBC_MAC algorithm ID * @return Pointer to the CBC_MAC context */ CRYPT_CBC_MAC_Ctx *CRYPT_CBC_MAC_NewCtxEx(void *libCtx, CRYPT_MAC_AlgId id); /** * @brief Use the key passed by the user to initialize the algorithm context. * @param ctx [IN] CBC_MAC context * @param key [in] symmetric algorithm key * @param len [in] Key length * @param param [in] param * @retval #CRYPT_SUCCESS Succeeded. * @retval #CRYPT_NULL_INPUT The input parameter is NULL. * For other error codes, see crypt_errno.h. */ int32_t CRYPT_CBC_MAC_Init(CRYPT_CBC_MAC_Ctx *ctx, const uint8_t *key, uint32_t len, void *param); /** * @brief Enter the data to be calculated and update the context. * @param ctx [IN] CBC_MAC context * @param *in [in] Pointer to the data to be calculated * @param len [in] Length of the data to be calculated * @retval #CRYPT_SUCCESS Succeeded. * @retval #CRYPT_NULL_INPUT The input parameter is NULL. * For other error codes, see crypt_errno.h. */ int32_t CRYPT_CBC_MAC_Update(CRYPT_CBC_MAC_Ctx *ctx, const uint8_t *in, uint32_t len); /** * @brief Output the cmac calculation result. * @param ctx [IN] CBC_MAC context * @param out [OUT] Output data. Sufficient memory must be allocated to store CBC_MAC results and cannot be null. * @param len [IN/OUT] Output data length * @retval #CRYPT_SUCCESS Succeeded. * @retval #CRYPT_NULL_INPUT The input parameter is NULL. * @retval #CRYPT_EAL_BUFF_LEN_NOT_ENOUGH The length of the output buffer is insufficient. * For other error codes, see crypt_errno.h. */ int32_t CRYPT_CBC_MAC_Final(CRYPT_CBC_MAC_Ctx *ctx, uint8_t *out, uint32_t *len); /** * @brief Re-initialize using the information retained in the ctx. Do not need to invoke the init again. * This function is equivalent to the combination of deinit and init interfaces. * @param ctx [IN] CBC_MAC context */ int32_t CRYPT_CBC_MAC_Reinit(CRYPT_CBC_MAC_Ctx *ctx); /** * @brief Deinitialization function. * If calculation is required after this function is invoked, it needs to be initialized again. * @param ctx [IN] CBC_MAC context */ int32_t CRYPT_CBC_MAC_Deinit(CRYPT_CBC_MAC_Ctx *ctx); /** * @brief CBC_MAC control function to set some information * @param ctx [IN] CBC_MAC context * @param opt [IN] option * @param val [IN] value * @param len [IN] the length of value * @return See crypt_errno.h. */ int32_t CRYPT_CBC_MAC_Ctrl(CRYPT_CBC_MAC_Ctx *ctx, uint32_t opt, void *val, uint32_t len); /** * @brief Free the CBC_MAC context. * @param ctx [IN] CBC_MAC context */ void CRYPT_CBC_MAC_FreeCtx(CRYPT_CBC_MAC_Ctx *ctx); #ifdef __cplusplus } #endif /* __cpluscplus */ #endif #endif
2401_83913325/openHiTLS-examples_7925
crypto/cmac/include/crypt_cbc_mac.h
C
unknown
4,037
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_CMAC_H #define CRYPT_CMAC_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_CMAC #include <stdint.h> #include "crypt_types.h" #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ typedef struct Cipher_MAC_Ctx CRYPT_CMAC_Ctx; #define CRYPT_CMAC_SetParam NULL /** * @brief Create a new CMAC context. * @param id [in] Symmetric encryption and decryption algorithm ID * @return CMAC context */ CRYPT_CMAC_Ctx *CRYPT_CMAC_NewCtx(CRYPT_MAC_AlgId id); /** * @brief Create a new CMAC context with external library context. * @param libCtx [in] External library context * @param id [in] Symmetric encryption and decryption algorithm ID * @return CMAC context */ CRYPT_CMAC_Ctx *CRYPT_CMAC_NewCtxEx(void *libCtx, CRYPT_MAC_AlgId id); /** * @brief Use the key passed by the user to initialize the algorithm context. * @param ctx [IN] CMAC context * @param key [in] symmetric algorithm key * @param len [in] Key length * @param param [in] param * @retval #CRYPT_SUCCESS Succeeded. * @retval #CRYPT_NULL_INPUT The input parameter is NULL. * For other error codes, see crypt_errno.h. */ int32_t CRYPT_CMAC_Init(CRYPT_CMAC_Ctx *ctx, const uint8_t *key, uint32_t len, void *param); /** * @brief Enter the data to be calculated and update the context. * @param ctx [IN] CMAC context * @param *in [in] Pointer to the data to be calculated * @param len [in] Length of the data to be calculated * @retval #CRYPT_SUCCESS Succeeded. * @retval #CRYPT_NULL_INPUT The input parameter is NULL. * For other error codes, see crypt_errno.h. */ int32_t CRYPT_CMAC_Update(CRYPT_CMAC_Ctx *ctx, const uint8_t *in, uint32_t len); /** * @brief Output the cmac calculation result. * @param ctx [IN] CMAC context * @param out [OUT] Output data. Sufficient memory must be allocated to store CMAC results and cannot be null. * @param len [IN/OUT] Output data length * @retval #CRYPT_SUCCESS Succeeded. * @retval #CRYPT_NULL_INPUT The input parameter is NULL. * @retval #CRYPT_EAL_BUFF_LEN_NOT_ENOUGH The length of the output buffer is insufficient. * For other error codes, see crypt_errno.h. */ int32_t CRYPT_CMAC_Final(CRYPT_CMAC_Ctx *ctx, uint8_t *out, uint32_t *len); /** * @brief Re-initialize using the information retained in the ctx. Do not need to invoke the init again. * This function is equivalent to the combination of deinit and init interfaces. * @param ctx [IN] CMAC context * @retval #CRYPT_SUCCESS Succeeded. * @retval #CRYPT_NULL_INPUT The input parameter is NULL. * For other error codes, see crypt_errno.h. */ int32_t CRYPT_CMAC_Reinit(CRYPT_CMAC_Ctx *ctx); /** * @brief Deinitialization function. * If calculation is required after this function is invoked, it needs to be initialized again. * @param ctx [IN] CMAC context * @retval #CRYPT_SUCCESS Succeeded. * @retval #CRYPT_NULL_INPUT The input parameter is NULL. * For other error codes, see crypt_errno.h. */ int32_t CRYPT_CMAC_Deinit(CRYPT_CMAC_Ctx *ctx); /** * @brief Control function for CMAC. * @param ctx [IN] CMAC context * @param opt [IN] Control option * @param val [IN]/[OUT] Control value * @param len [IN] Control value length * @retval #CRYPT_SUCCESS Succeeded. * @retval #CRYPT_NULL_INPUT The input parameter is NULL. * For other error codes, see crypt_errno.h. */ int32_t CRYPT_CMAC_Ctrl(CRYPT_CMAC_Ctx *ctx, uint32_t opt, void *val, uint32_t len); /** * @brief Free the CMAC context. * @param ctx [IN] CMAC context */ void CRYPT_CMAC_FreeCtx(CRYPT_CMAC_Ctx *ctx); #ifdef __cplusplus } #endif /* __cpluscplus */ #endif #endif
2401_83913325/openHiTLS-examples_7925
crypto/cmac/include/crypt_cmac.h
C
unknown
4,258
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CBC_MAC #include <stdint.h> #include "bsl_sal.h" #include "crypt_types.h" #include "crypt_utils.h" #include "bsl_err_internal.h" #include "cipher_mac_common.h" #include "crypt_errno.h" #include "crypt_cbc_mac.h" #include "eal_mac_local.h" CRYPT_CBC_MAC_Ctx *CRYPT_CBC_MAC_NewCtx(CRYPT_MAC_AlgId id) { int32_t ret; EAL_MacDepMethod method = {0}; ret = EAL_MacFindDepMethod(id, NULL, NULL, &method, NULL, false); if (ret != CRYPT_SUCCESS) { return NULL; } CRYPT_CBC_MAC_Ctx *ctx = BSL_SAL_Calloc(1, sizeof(CRYPT_CBC_MAC_Ctx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } ret = CipherMacInitCtx(&ctx->common, method.method.sym); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(ctx); return NULL; } ctx->paddingType = CRYPT_PADDING_MAX_COUNT; return ctx; } CRYPT_CBC_MAC_Ctx *CRYPT_CBC_MAC_NewCtxEx(void *libCtx, CRYPT_MAC_AlgId id) { (void)libCtx; return CRYPT_CBC_MAC_NewCtx(id); } int32_t CRYPT_CBC_MAC_Init(CRYPT_CBC_MAC_Ctx *ctx, const uint8_t *key, uint32_t len, void *param) { (void)param; if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } return CipherMacInit(&ctx->common, key, len); } int32_t CRYPT_CBC_MAC_Update(CRYPT_CBC_MAC_Ctx *ctx, const uint8_t *in, uint32_t len) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->paddingType == CRYPT_PADDING_MAX_COUNT) { BSL_ERR_PUSH_ERROR(CRYPT_CBC_MAC_PADDING_NOT_SET); return CRYPT_CBC_MAC_PADDING_NOT_SET; } return CipherMacUpdate(&ctx->common, in, len); } static int32_t CbcMacPadding(CRYPT_CBC_MAC_Ctx *ctx) { const EAL_SymMethod *method = ctx->common.method; uint32_t length = ctx->common.len; uint32_t padLen = method->blockSize - length; switch (ctx->paddingType) { case CRYPT_PADDING_ZEROS: for (uint32_t i = 0; i < padLen; i++) { ctx->common.left[length++] = 0; } ctx->common.len = length; return CRYPT_SUCCESS; default: BSL_ERR_PUSH_ERROR(CRYPT_CBC_MAC_PADDING_NOT_SUPPORT); return CRYPT_CBC_MAC_PADDING_NOT_SUPPORT; } } int32_t CRYPT_CBC_MAC_Final(CRYPT_CBC_MAC_Ctx *ctx, uint8_t *out, uint32_t *len) { if (ctx == NULL || ctx->common.method == NULL || len == NULL || out == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } const EAL_SymMethod *method = ctx->common.method; uint32_t blockSize = method->blockSize; if (*len < blockSize) { BSL_ERR_PUSH_ERROR(CRYPT_CBC_MAC_OUT_BUFF_LEN_NOT_ENOUGH); return CRYPT_CBC_MAC_OUT_BUFF_LEN_NOT_ENOUGH; } int32_t ret = CbcMacPadding(ctx); if (ret != CRYPT_SUCCESS) { return ret; } DATA_XOR(ctx->common.left, ctx->common.data, ctx->common.left, blockSize); ret = method->encryptBlock(ctx->common.key, ctx->common.left, out, blockSize); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } *len = blockSize; return CRYPT_SUCCESS; } int32_t CRYPT_CBC_MAC_Reinit(CRYPT_CBC_MAC_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } return CipherMacReinit(&ctx->common); } int32_t CRYPT_CBC_MAC_Deinit(CRYPT_CBC_MAC_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } return CipherMacDeinit(&ctx->common); } int32_t CRYPT_CBC_MAC_Ctrl(CRYPT_CBC_MAC_Ctx *ctx, uint32_t opt, void *val, uint32_t len) { if (ctx == NULL || val == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } switch (opt) { case CRYPT_CTRL_SET_CBC_MAC_PADDING: if (len != sizeof(CRYPT_PaddingType)) { BSL_ERR_PUSH_ERROR(CRYPT_CBC_MAC_ERR_CTRL_LEN); return CRYPT_CBC_MAC_ERR_CTRL_LEN; } ctx->paddingType = *(CRYPT_PaddingType*)val; return CRYPT_SUCCESS; case CRYPT_CTRL_GET_MACLEN: return CipherMacGetMacLen(&ctx->common, val, len); default: BSL_ERR_PUSH_ERROR(CRYPT_CBC_MAC_ERR_UNSUPPORTED_CTRL_OPTION); return CRYPT_CBC_MAC_ERR_UNSUPPORTED_CTRL_OPTION; } } void CRYPT_CBC_MAC_FreeCtx(CRYPT_CBC_MAC_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return; } CipherMacDeinitCtx(&ctx->common); BSL_SAL_Free(ctx); } #endif
2401_83913325/openHiTLS-examples_7925
crypto/cmac/src/cbc_mac.c
C
unknown
5,409
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CBC_MAC) || defined(HITLS_CRYPTO_CMAC) #include <stdlib.h> #include "securec.h" #include "bsl_sal.h" #include "crypt_utils.h" #include "crypt_errno.h" #include "bsl_err_internal.h" #include "crypt_local_types.h" #include "cipher_mac_common.h" int32_t CipherMacInitCtx(Cipher_MAC_Common_Ctx *ctx, const EAL_SymMethod *method) { if (ctx == NULL || method == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } void *key = (void *)BSL_SAL_Calloc(1u, method->ctxSize); if (key == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } // set key and set method ctx->key = key; ctx->method = method; return CRYPT_SUCCESS; } void CipherMacDeinitCtx(Cipher_MAC_Common_Ctx *ctx) { if (ctx == NULL || ctx->method == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return; } const EAL_SymMethod *method = ctx->method; BSL_SAL_CleanseData((void *)(ctx->key), method->ctxSize); BSL_SAL_FREE(ctx->key); } int32_t CipherMacInit(Cipher_MAC_Common_Ctx *ctx, const uint8_t *key, uint32_t len) { if (ctx == NULL || ctx->method == NULL || (key == NULL && len != 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = ctx->method->setEncryptKey(ctx->key, key, len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } (void)memset_s(ctx->data, CIPHER_MAC_MAXBLOCKSIZE, 0, CIPHER_MAC_MAXBLOCKSIZE); ctx->len = 0; return CRYPT_SUCCESS; } int32_t CipherMacUpdate(Cipher_MAC_Common_Ctx *ctx, const uint8_t *in, uint32_t len) { if (ctx == NULL || ctx->method == NULL || (in == NULL && len != 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } const EAL_SymMethod *method = ctx->method; int32_t ret; uint32_t blockSize = method->blockSize; const uint8_t *inTmp = in; uint32_t lenTmp = len; if (ctx->len > 0) { if (ctx->len > (UINT32_MAX - lenTmp)) { BSL_ERR_PUSH_ERROR(CRYPT_CMAC_INPUT_OVERFLOW); return CRYPT_CMAC_INPUT_OVERFLOW; } uint32_t end = (ctx->len + lenTmp) > (blockSize) ? (blockSize) : (ctx->len + lenTmp); for (uint32_t i = ctx->len; i < end; i++) { ctx->left[i] = (*inTmp); inTmp++; } lenTmp -= (end - ctx->len); if (lenTmp == 0) { ctx->len = end; return CRYPT_SUCCESS; } DATA_XOR(ctx->left, ctx->data, ctx->left, blockSize); ret = method->encryptBlock(ctx->key, ctx->left, ctx->data, blockSize); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } while (lenTmp > blockSize) { DATA_XOR(inTmp, ctx->data, ctx->left, blockSize); ret = method->encryptBlock(ctx->key, ctx->left, ctx->data, blockSize); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } lenTmp -= blockSize; inTmp += blockSize; } for (uint32_t i = 0; i < lenTmp; i++) { ctx->left[i] = inTmp[i]; } ctx->len = lenTmp; return CRYPT_SUCCESS; } int32_t CipherMacReinit(Cipher_MAC_Common_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } (void)memset_s(ctx->data, CIPHER_MAC_MAXBLOCKSIZE, 0, CIPHER_MAC_MAXBLOCKSIZE); ctx->len = 0; return CRYPT_SUCCESS; } int32_t CipherMacDeinit(Cipher_MAC_Common_Ctx *ctx) { if (ctx == NULL || ctx->method == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } const uint32_t ctxSize = ctx->method->ctxSize; BSL_SAL_CleanseData(ctx->key, ctxSize); (void)memset_s(ctx->data, CIPHER_MAC_MAXBLOCKSIZE, 0, CIPHER_MAC_MAXBLOCKSIZE); (void)memset_s(ctx->left, CIPHER_MAC_MAXBLOCKSIZE, 0, CIPHER_MAC_MAXBLOCKSIZE); ctx->len = 0; return CRYPT_SUCCESS; } int32_t CipherMacGetMacLen(const Cipher_MAC_Common_Ctx *ctx, void *val, uint32_t len) { if (ctx == NULL || ctx->method == NULL || val == NULL || len != sizeof(uint32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } *(uint32_t *)val = ctx->method->blockSize; return CRYPT_SUCCESS; } #endif // #if defined(HITLS_CRYPTO_CBC_MAC) || defined(HITLS_CRYPTO_CMAC)
2401_83913325/openHiTLS-examples_7925
crypto/cmac/src/cipher_mac_common.c
C
unknown
5,210
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CIPHER_MAC_COMMON_H #define CIPHER_MAC_COMMON_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_CBC_MAC) || defined(HITLS_CRYPTO_CMAC) #include <stdint.h> #include "crypt_local_types.h" #include "crypt_cmac.h" #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ #define CIPHER_MAC_MAXBLOCKSIZE 16 struct Cipher_MAC_Ctx { const EAL_SymMethod *method; void *key; /* Stores the intermediate process data of CBC_MAC. The length is the block size. */ uint8_t data[CIPHER_MAC_MAXBLOCKSIZE]; uint8_t left[CIPHER_MAC_MAXBLOCKSIZE]; uint32_t len; /* Length of a non-integral data block */ }; typedef struct Cipher_MAC_Ctx Cipher_MAC_Common_Ctx; #ifdef HITLS_CRYPTO_CBC_MAC struct CBC_MAC_Ctx { Cipher_MAC_Common_Ctx common; CRYPT_PaddingType paddingType; }; #endif int32_t CipherMacInitCtx(Cipher_MAC_Common_Ctx *ctx, const EAL_SymMethod *method); void CipherMacDeinitCtx(Cipher_MAC_Common_Ctx *ctx); int32_t CipherMacInit(Cipher_MAC_Common_Ctx *ctx, const uint8_t *key, uint32_t len); int32_t CipherMacUpdate(Cipher_MAC_Common_Ctx *ctx, const uint8_t *in, uint32_t len); int32_t CipherMacReinit(Cipher_MAC_Common_Ctx *ctx); int32_t CipherMacDeinit(Cipher_MAC_Common_Ctx *ctx); int32_t CipherMacGetMacLen(const Cipher_MAC_Common_Ctx *ctx, void *val, uint32_t len); #ifdef __cplusplus } #endif /* __cpluscplus */ #endif // #if defined(HITLS_CRYPTO_CBC_MAC) || defined(HITLS_CRYPTO_CMAC) #endif // CIPHER_MAC_COMMON_H
2401_83913325/openHiTLS-examples_7925
crypto/cmac/src/cipher_mac_common.h
C
unknown
2,084
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CMAC #include <stdlib.h> #include "bsl_sal.h" #include "crypt_errno.h" #include "crypt_utils.h" #include "bsl_err_internal.h" #include "cipher_mac_common.h" #include "crypt_cmac.h" #include "eal_mac_local.h" CRYPT_CMAC_Ctx *CRYPT_CMAC_NewCtx(CRYPT_MAC_AlgId id) { int32_t ret; EAL_MacDepMethod method = {0}; ret = EAL_MacFindDepMethod(id, NULL, NULL, &method, NULL, false); if (ret != CRYPT_SUCCESS) { return NULL; } CRYPT_CMAC_Ctx *ctx = BSL_SAL_Calloc(1, sizeof(CRYPT_CMAC_Ctx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } ret = CipherMacInitCtx(ctx, method.method.sym); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(ctx); return NULL; } return ctx; } CRYPT_CMAC_Ctx *CRYPT_CMAC_NewCtxEx(void *libCtx, CRYPT_MAC_AlgId id) { (void)libCtx; return CRYPT_CMAC_NewCtx(id); } int32_t CRYPT_CMAC_Init(CRYPT_CMAC_Ctx *ctx, const uint8_t *key, uint32_t len, void *param) { (void)param; return CipherMacInit((Cipher_MAC_Common_Ctx *)ctx, key, len); } int32_t CRYPT_CMAC_Update(CRYPT_CMAC_Ctx *ctx, const uint8_t *in, uint32_t len) { return CipherMacUpdate((Cipher_MAC_Common_Ctx *)ctx, in, len); } static inline void LeftShiftOneBit(const uint8_t *in, uint32_t len, uint8_t *out) { uint32_t i = len - 1; out[i] = (in[i] << 1) | 0; do { i--; out[i] = (in[i] << 1) | (in[i + 1] >> 7); // 7 is used to obtain the most significant bit of the 8-bit data. } while (i != 0); } static void CMAC_Final(CRYPT_CMAC_Ctx *ctx) { const uint8_t z[CIPHER_MAC_MAXBLOCKSIZE] = {0}; uint8_t rb; uint8_t l[CIPHER_MAC_MAXBLOCKSIZE]; uint8_t k1[CIPHER_MAC_MAXBLOCKSIZE]; const EAL_SymMethod *method = ctx->method; uint32_t blockSize = method->blockSize; int32_t ret; ret = method->encryptBlock(ctx->key, z, l, blockSize); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return; } LeftShiftOneBit(l, blockSize, k1); if (blockSize == CIPHER_MAC_MAXBLOCKSIZE) { rb = 0x87; /* When the AES algorithm is used and the blocksize is 128 bits, rb uses 0x87. */ } else { rb = 0x1B; /* When the DES and TDES algorithms are used and blocksize is 64 bits, rb uses 0x1B. */ } if ((l[0] & 0x80) != 0) { k1[blockSize - 1] ^= rb; } uint32_t length = ctx->len; if (length == blockSize) { // When the message length is an integer multiple of blockSize, use K1 DATA_XOR(ctx->left, k1, ctx->left, blockSize); } else { // The message length is not an integer multiple of blockSize. Use K2 after padding. /* padding */ ctx->left[length++] = 0x80; // 0x80 indicates that the first bit of the data is added with 1. while (length < blockSize) { ctx->left[length++] = 0; } uint8_t k2[CIPHER_MAC_MAXBLOCKSIZE]; LeftShiftOneBit(k1, blockSize, k2); if ((k1[0] & 0x80) != 0) { k2[blockSize - 1] ^= rb; } DATA_XOR(ctx->left, k2, ctx->left, blockSize); ctx->len = blockSize; } } int32_t CRYPT_CMAC_Final(CRYPT_CMAC_Ctx *ctx, uint8_t *out, uint32_t *len) { if (ctx == NULL || ctx->method == NULL || len == NULL || out == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } const EAL_SymMethod *method = ctx->method; uint32_t blockSize = method->blockSize; if (*len < blockSize) { BSL_ERR_PUSH_ERROR(CRYPT_CMAC_OUT_BUFF_LEN_NOT_ENOUGH); return CRYPT_CMAC_OUT_BUFF_LEN_NOT_ENOUGH; } CMAC_Final(ctx); DATA_XOR(ctx->left, ctx->data, ctx->left, blockSize); int32_t ret = method->encryptBlock(ctx->key, ctx->left, out, blockSize); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } *len = blockSize; return CRYPT_SUCCESS; } int32_t CRYPT_CMAC_Reinit(CRYPT_CMAC_Ctx *ctx) { return CipherMacReinit((Cipher_MAC_Common_Ctx *)ctx); } int32_t CRYPT_CMAC_Deinit(CRYPT_CMAC_Ctx *ctx) { return CipherMacDeinit((Cipher_MAC_Common_Ctx *)ctx); } int32_t CRYPT_CMAC_Ctrl(CRYPT_CMAC_Ctx *ctx, uint32_t opt, void *val, uint32_t len) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } switch (opt) { case CRYPT_CTRL_GET_MACLEN: return CipherMacGetMacLen(ctx, val, len); default: break; } BSL_ERR_PUSH_ERROR(CRYPT_CMAC_ERR_UNSUPPORTED_CTRL_OPTION); return CRYPT_CMAC_ERR_UNSUPPORTED_CTRL_OPTION; } void CRYPT_CMAC_FreeCtx(CRYPT_CMAC_Ctx *ctx) { CipherMacDeinitCtx(ctx); BSL_SAL_Free(ctx); } #endif /* HITLS_CRYPTO_CMAC */
2401_83913325/openHiTLS-examples_7925
crypto/cmac/src/cmac.c
C
unknown
5,318
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_DECODE_KEY_IMPL_H #define CRYPT_DECODE_KEY_IMPL_H #ifdef __cplusplus extern "C" { #endif #include "hitls_build.h" #ifdef HITLS_CRYPTO_CODECSKEY #include <stdint.h> #include "bsl_params.h" typedef struct { const char *outFormat; const char *outType; } DECODER_CommonCtx; int32_t DECODER_CommonGetParam(const DECODER_CommonCtx *commonCtx, BSL_Param *param); void *DECODER_EPKI2PKI_NewCtx(void *provCtx); int32_t DECODER_EPKI2PKI_GetParam(void *ctx, BSL_Param *param); int32_t DECODER_EPKI2PKI_SetParam(void *ctx, const BSL_Param *param); int32_t DECODER_EPKI2PKI_Decode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); void DECODER_EPKI2PKI_FreeOutData(void *ctx, BSL_Param *outParam); void DECODER_EPKI2PKI_FreeCtx(void *ctx); int32_t DECODER_DER2KEY_GetParam(void *ctx, BSL_Param *param); int32_t DECODER_DER2KEY_SetParam(void *ctx, const BSL_Param *param); void DECODER_DER2KEY_FreeOutData(void *ctx, BSL_Param *outParam); void DECODER_DER2KEY_FreeCtx(void *ctx); #ifdef HITLS_CRYPTO_RSA void *DECODER_RsaDer2KeyNewCtx(void *provCtx); int32_t DECODER_RsaPrvKeyDer2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); int32_t DECODER_RsaPubKeyDer2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); int32_t DECODER_RsaSubPubKeyDer2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); int32_t DECODER_RsaSubPubKeyWithOutSeqDer2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); int32_t DECODER_RsaPkcs8Der2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); #endif #ifdef HITLS_CRYPTO_ECDSA void *DECODER_EcdsaDer2KeyNewCtx(void *provCtx); int32_t DECODER_EcdsaPrvKeyDer2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); int32_t DECODER_EcdsaSubPubKeyDer2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); int32_t DECODER_EcdsaSubPubKeyWithOutSeqDer2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); int32_t DECODER_EcdsaPkcs8Der2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); #endif #ifdef HITLS_CRYPTO_SM2 void *DECODER_Sm2Der2KeyNewCtx(void *provCtx); int32_t DECODER_Sm2PrvKeyDer2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); int32_t DECODER_Sm2SubPubKeyDer2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); int32_t DECODER_Sm2SubPubKeyWithOutSeqDer2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); int32_t DECODER_Sm2Pkcs8Der2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); #endif #ifdef HITLS_CRYPTO_ED25519 void *DECODER_Ed25519Der2KeyNewCtx(void *provCtx); int32_t DECODER_Ed25519SubPubKeyDer2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); int32_t DECODER_Ed25519SubPubKeyWithOutSeqDer2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); int32_t DECODER_Ed25519Pkcs8Der2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); #endif #ifdef HITLS_BSL_PEM void *DECODER_Pem2DerNewCtx(void *provCtx); int32_t DECODER_Pem2DerGetParam(void *ctx, BSL_Param *param); int32_t DECODER_Pem2DerSetParam(void *ctx, const BSL_Param *param); int32_t DECODER_Pem2DerDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); void DECODER_Pem2DerFreeOutData(void *ctx, BSL_Param *outParam); void DECODER_Pem2DerFreeCtx(void *ctx); #endif void *DECODER_LowKeyObject2PkeyObjectNewCtx(void *provCtx); int32_t DECODER_LowKeyObject2PkeyObjectSetParam(void *ctx, const BSL_Param *param); int32_t DECODER_LowKeyObject2PkeyObjectGetParam(void *ctx, BSL_Param *param); int32_t DECODER_LowKeyObject2PkeyObjectDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam); void DECODER_LowKeyObject2PkeyObjectFreeOutData(void *ctx, BSL_Param *outParam); void DECODER_LowKeyObject2PkeyObjectFreeCtx(void *ctx); #endif /* HITLS_CRYPTO_CODECSKEY */ #ifdef __cplusplus } #endif #endif /* CRYPT_DECODE_KEY_IMPL_H */
2401_83913325/openHiTLS-examples_7925
crypto/codecskey/include/crypt_decode_key_impl.h
C
unknown
4,509
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_ENCODE_DECODE_KEY_H #define CRYPT_ENCODE_DECODE_KEY_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_CODECSKEY #include "bsl_types.h" #include "bsl_asn1_internal.h" #include "crypt_eal_pkey.h" #ifdef HITLS_CRYPTO_KEY_INFO #include "bsl_uio.h" #endif #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ typedef struct { int32_t version; BslCid keyType; BSL_ASN1_Buffer keyParam; uint8_t *pkeyRawKey; uint32_t pkeyRawKeyLen; void *attrs; // HITLS_X509_Attrs * } CRYPT_ENCODE_DECODE_Pk8PrikeyInfo; #ifdef HITLS_CRYPTO_KEY_DECODE typedef struct { BslCid keyType; BSL_ASN1_Buffer keyParam; BSL_ASN1_BitString pubKey; } CRYPT_DECODE_SubPubkeyInfo; int32_t CRYPT_DECODE_SubPubkey(uint8_t *buff, uint32_t buffLen, BSL_ASN1_DecTemplCallBack keyInfoCb, CRYPT_DECODE_SubPubkeyInfo *subPubkeyInfo, bool isComplete); int32_t CRYPT_DECODE_Pkcs8Info(uint8_t *buff, uint32_t buffLen, BSL_ASN1_DecTemplCallBack keyInfoCb, CRYPT_ENCODE_DECODE_Pk8PrikeyInfo *pk8PrikeyInfo); int32_t CRYPT_EAL_ParseRsaPssAlgParam(BSL_ASN1_Buffer *param, CRYPT_RSA_PssPara *para); int32_t CRYPT_EAL_PriKeyParseFile(BSL_ParseFormat format, int32_t type, const char *path, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPriKey); #endif // HITLS_CRYPTO_KEY_DECODE #ifdef HITLS_CRYPTO_KEY_ENCODE int32_t CRYPT_ENCODE_Pkcs8Info(CRYPT_ENCODE_DECODE_Pk8PrikeyInfo *pk8PrikeyInfo, BSL_Buffer *asn1); int32_t CRYPT_EAL_EncodePubKeyBuffInternal(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ParseFormat format, int32_t type, bool isComplete, BSL_Buffer *encode); #ifdef HITLS_CRYPTO_RSA int32_t CRYPT_EAL_EncodeRsaPssAlgParam(const CRYPT_RSA_PssPara *rsaPssParam, uint8_t **buf, uint32_t *bufLen); #endif #endif // HITLS_CRYPTO_KEY_ENCODE #if defined(HITLS_CRYPTO_RSA) && (defined(HITLS_CRYPTO_KEY_ENCODE) || defined(HITLS_CRYPTO_KEY_INFO)) int32_t CRYPT_EAL_InitRsaPrv(const CRYPT_EAL_PkeyCtx *ealPriKey, CRYPT_PKEY_AlgId cid, CRYPT_EAL_PkeyPrv *rsaPrv); void CRYPT_EAL_DeinitRsaPrv(CRYPT_EAL_PkeyPrv *rsaPrv); int32_t CRYPT_EAL_GetRsaPssPara(CRYPT_EAL_PkeyCtx *ealPriKey, CRYPT_RSA_PssPara *rsaPssParam); #endif #ifdef HITLS_PKI_PKCS12_PARSE // parse PKCS7-EncryptData:only support PBES2 + PBKDF2. int32_t CRYPT_EAL_ParseAsn1PKCS7EncryptedData(CRYPT_EAL_LibCtx *libCtx, const char *attrName, BSL_Buffer *encode, const uint8_t *pwd, uint32_t pwdlen, BSL_Buffer *output); #endif #ifdef HITLS_PKI_PKCS12_GEN // encode PKCS7-EncryptData:only support PBES2 + PBKDF2. int32_t CRYPT_EAL_EncodePKCS7EncryptDataBuff(CRYPT_EAL_LibCtx *libCtx, const char *attrName, BSL_Buffer *data, const void *encodeParam, BSL_Buffer *encode); #endif #ifdef HITLS_CRYPTO_KEY_INFO int32_t CRYPT_EAL_PrintPubkey(uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio); int32_t CRYPT_EAL_PrintPrikey(uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio); #ifdef HITLS_CRYPTO_RSA int32_t CRYPT_EAL_PrintRsaPssPara(uint32_t layer, CRYPT_RSA_PssPara *para, BSL_UIO *uio); #endif #endif // HITLS_CRYPTO_KEY_INFO int32_t CRYPT_EAL_GetEncodeFormat(const char *format); int32_t CRYPT_EAL_GetEncodeType(const char *type); #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_CODECSKEY #endif // CRYPT_ENCODE_DECODE_KEY_H
2401_83913325/openHiTLS-examples_7925
crypto/codecskey/include/crypt_encode_decode_key.h
C
unknown
3,777
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CODECSKEY) && defined(HITLS_CRYPTO_PROVIDER) #include <string.h> #include <stdbool.h> #include "crypt_eal_implprovider.h" #include "crypt_eal_pkey.h" #include "crypt_default_provderimpl.h" #include "crypt_algid.h" #ifdef HITLS_CRYPTO_RSA #include "crypt_rsa.h" #endif #ifdef HITLS_CRYPTO_ECDSA #include "crypt_ecdsa.h" #endif #ifdef HITLS_CRYPTO_SM2 #include "crypt_sm2.h" #endif #ifdef HITLS_CRYPTO_ED25519 #include "crypt_curve25519.h" #endif #include "eal_pkey.h" #include "crypt_provider_local.h" #include "crypt_errno.h" #include "bsl_sal.h" #include "bsl_obj.h" #include "bsl_err_internal.h" #include "crypt_encode_decode_local.h" #include "crypt_decode_key_impl.h" #define PKEY_MAX_PARAM_NUM 20 #if defined(HITLS_CRYPTO_RSA) || defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) || \ defined(HITLS_CRYPTO_ED25519) typedef struct { CRYPT_EAL_ProvMgrCtx *provMgrCtx; EAL_PkeyUnitaryMethod *method; int32_t keyAlgId; const char *outFormat; const char *outType; } DECODER_Der2KeyCtx; DECODER_Der2KeyCtx *DECODER_DER2KEY_NewCtx(void *provCtx) { (void)provCtx; DECODER_Der2KeyCtx *ctx = (DECODER_Der2KeyCtx *)BSL_SAL_Calloc(1, sizeof(DECODER_Der2KeyCtx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } ctx->outFormat = "OBJECT"; ctx->outType = "LOW_KEY"; return ctx; } #define DECODER_DEFINE_DER2KEY_NEW_CTX(keyType, keyId, keyMethod, asyCipherMethod, exchMethod, signMethod, kemMethod) \ void *DECODER_##keyType##Der2KeyNewCtx(void *provCtx) \ { \ DECODER_Der2KeyCtx *ctx = DECODER_DER2KEY_NewCtx(provCtx); \ if (ctx == NULL) { \ return NULL; \ } \ int32_t ret = CRYPT_EAL_SetPkeyMethod(&ctx->method, keyMethod, asyCipherMethod, exchMethod, signMethod, \ kemMethod); \ if (ret != CRYPT_SUCCESS) { \ BSL_SAL_Free(ctx); \ return NULL; \ } \ ctx->keyAlgId = keyId; \ return ctx; \ } int32_t DECODER_CommonGetParam(const DECODER_CommonCtx *commonCtx, BSL_Param *param) { if (commonCtx == NULL || param == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } BSL_Param *param1 = BSL_PARAM_FindParam(param, CRYPT_PARAM_DECODE_OUTPUT_TYPE); if (param1 != NULL) { if (param1->valueType != BSL_PARAM_TYPE_OCTETS_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } param1->value = (void *)(uintptr_t)commonCtx->outType; } BSL_Param *param2 = BSL_PARAM_FindParam(param, CRYPT_PARAM_DECODE_OUTPUT_FORMAT); if (param2 != NULL) { if (param2->valueType != BSL_PARAM_TYPE_OCTETS_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } param2->value = (void *)(uintptr_t)commonCtx->outFormat; } return CRYPT_SUCCESS; } int32_t DECODER_DER2KEY_GetParam(void *ctx, BSL_Param *param) { DECODER_Der2KeyCtx *decoderCtx = (DECODER_Der2KeyCtx *)ctx; if (decoderCtx == NULL || param == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } DECODER_CommonCtx commonCtx = { .outFormat = decoderCtx->outFormat, .outType = decoderCtx->outType }; return DECODER_CommonGetParam(&commonCtx, param); } int32_t DECODER_DER2KEY_SetParam(void *ctx, const BSL_Param *param) { DECODER_Der2KeyCtx *decoderCtx = (DECODER_Der2KeyCtx *)ctx; if (decoderCtx == NULL || param == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } const BSL_Param *input = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_DECODE_PROVIDER_CTX); if (input != NULL) { if (input->valueType != BSL_PARAM_TYPE_CTX_PTR || input->value == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } decoderCtx->provMgrCtx = (CRYPT_EAL_ProvMgrCtx *)(uintptr_t)input->value; } return CRYPT_SUCCESS; } static int32_t CheckParams(DECODER_Der2KeyCtx *decoderCtx, const BSL_Param *inParam, BSL_Param **outParam, BSL_Buffer *asn1Encode) { if (decoderCtx == NULL || inParam == NULL || outParam == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } const BSL_Param *input = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_BUFFER_DATA); if (input == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (input->value == NULL || input->valueLen == 0 || input->valueType != BSL_PARAM_TYPE_OCTETS) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } asn1Encode->data = (uint8_t *)(uintptr_t)input->value; asn1Encode->dataLen = input->valueLen; return CRYPT_SUCCESS; } #define DECODER_CHECK_PARAMS(ctx, inParam, outParam) \ void *key = NULL; \ BSL_Buffer asn1Encode = {0}; \ DECODER_Der2KeyCtx *decoderCtx = (DECODER_Der2KeyCtx *)ctx; \ int32_t ret = CheckParams(decoderCtx, inParam, outParam, &asn1Encode); \ if (ret != CRYPT_SUCCESS) { \ BSL_ERR_PUSH_ERROR(ret); \ return ret; \ } static int32_t ConstructOutputParams(DECODER_Der2KeyCtx *decoderCtx, void *key, BSL_Param **outParam) { BSL_Param *result = BSL_SAL_Calloc(7, sizeof(BSL_Param)); if (result == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = BSL_PARAM_InitValue(&result[0], CRYPT_PARAM_DECODE_OBJECT_DATA, BSL_PARAM_TYPE_CTX_PTR, key, 0); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BSL_PARAM_InitValue(&result[1], CRYPT_PARAM_DECODE_OBJECT_TYPE, BSL_PARAM_TYPE_INT32, &decoderCtx->keyAlgId, sizeof(int32_t)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BSL_PARAM_InitValue(&result[2], CRYPT_PARAM_DECODE_PKEY_EXPORT_METHOD_FUNC, BSL_PARAM_TYPE_FUNC_PTR, decoderCtx->method->export, 0); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BSL_PARAM_InitValue(&result[3], CRYPT_PARAM_DECODE_PKEY_FREE_METHOD_FUNC, BSL_PARAM_TYPE_FUNC_PTR, decoderCtx->method->freeCtx, 0); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BSL_PARAM_InitValue(&result[4], CRYPT_PARAM_DECODE_PKEY_DUP_METHOD_FUNC, BSL_PARAM_TYPE_FUNC_PTR, decoderCtx->method->dupCtx, 0); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BSL_PARAM_InitValue(&result[5], CRYPT_PARAM_DECODE_PROVIDER_CTX, BSL_PARAM_TYPE_CTX_PTR, decoderCtx->provMgrCtx, 0); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } *outParam = result; return CRYPT_SUCCESS; EXIT: if (decoderCtx->method != NULL && decoderCtx->method->freeCtx != NULL) { decoderCtx->method->freeCtx(key); } BSL_SAL_Free(result); return ret; } #define DECODER_DEFINE_PRVKEY_DER2KEY_DECODE(keyType, keyStructName, parseFunc) \ int32_t DECODER_##keyType##PrvKeyDer2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam) \ { \ DECODER_CHECK_PARAMS(ctx, inParam, outParam); \ ret = parseFunc(decoderCtx->provMgrCtx->libCtx, asn1Encode.data, asn1Encode.dataLen, NULL, \ (keyStructName **)&key); \ if (ret != CRYPT_SUCCESS) { \ BSL_ERR_PUSH_ERROR(ret); \ return ret; \ } \ return ConstructOutputParams(decoderCtx, key, outParam); \ } #define DECODER_DEFINE_PUBKEY_DER2KEY_DECODE(keyType, keyStructName, parseFunc) \ int32_t DECODER_##keyType##PubKeyDer2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam) \ { \ DECODER_CHECK_PARAMS(ctx, inParam, outParam); \ ret = parseFunc(decoderCtx->provMgrCtx->libCtx, asn1Encode.data, asn1Encode.dataLen, NULL, \ (keyStructName **)&key, BSL_CID_UNKNOWN); \ if (ret != CRYPT_SUCCESS) { \ BSL_ERR_PUSH_ERROR(ret); \ return ret; \ } \ return ConstructOutputParams(decoderCtx, key, outParam); \ } #define DECODER_DEFINE_SUBPUBKEY_DER2KEY_DECODE(keyType, keyStructName, parseFunc) \ int32_t DECODER_##keyType##SubPubKeyDer2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam) \ { \ DECODER_CHECK_PARAMS(ctx, inParam, outParam) \ ret = parseFunc(decoderCtx->provMgrCtx->libCtx, asn1Encode.data, asn1Encode.dataLen, \ (keyStructName **)&key, true); \ if (ret != CRYPT_SUCCESS) { \ BSL_ERR_PUSH_ERROR(ret); \ return ret; \ } \ return ConstructOutputParams(decoderCtx, key, outParam); \ } #define DECODER_DEFINE_SUBPUBKEY_WITHOUT_SEQ_DER2KEY_DECODE(keyType, keyStructName, parseFunc) \ int32_t DECODER_##keyType##SubPubKeyWithOutSeqDer2KeyDecode(void *ctx, const BSL_Param *inParam, \ BSL_Param **outParam) \ { \ DECODER_CHECK_PARAMS(ctx, inParam, outParam) \ ret = parseFunc(decoderCtx->provMgrCtx->libCtx, asn1Encode.data, asn1Encode.dataLen, (keyStructName **)&key, \ false); \ if (ret != CRYPT_SUCCESS) { \ BSL_ERR_PUSH_ERROR(ret); \ return ret; \ } \ return ConstructOutputParams(decoderCtx, key, outParam); \ } #define DECODER_DEFINE_PKCS8_DECODE(keyType, keyStructName, parseFunc) \ int32_t DECODER_##keyType##Pkcs8Der2KeyDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam) \ { \ DECODER_CHECK_PARAMS(ctx, inParam, outParam) \ ret = parseFunc(decoderCtx->provMgrCtx->libCtx, asn1Encode.data, asn1Encode.dataLen, (keyStructName **)&key); \ if (ret != CRYPT_SUCCESS) { \ BSL_ERR_PUSH_ERROR(ret); \ return ret; \ } \ return ConstructOutputParams(decoderCtx, key, outParam); \ } void DECODER_DER2KEY_FreeOutData(void *ctx, BSL_Param *outParam) { DECODER_Der2KeyCtx *decoderCtx = ctx; if (decoderCtx == NULL || outParam == NULL) { return; } if (decoderCtx->method == NULL || decoderCtx->method->freeCtx == NULL) { return; } BSL_Param *outKey = BSL_PARAM_FindParam(outParam, CRYPT_PARAM_DECODE_OBJECT_DATA); if (outKey == NULL) { return; } decoderCtx->method->freeCtx(outKey->value); BSL_SAL_Free(outParam); } void DECODER_DER2KEY_FreeCtx(void *ctx) { if (ctx == NULL) { return; } DECODER_Der2KeyCtx *decoderCtx = (DECODER_Der2KeyCtx *)ctx; if (decoderCtx->method != NULL) { BSL_SAL_Free(decoderCtx->method); } BSL_SAL_Free(decoderCtx); } #endif #ifdef HITLS_CRYPTO_RSA DECODER_DEFINE_DER2KEY_NEW_CTX(Rsa, CRYPT_PKEY_RSA, g_defEalKeyMgmtRsa, g_defEalAsymCipherRsa, NULL, \ g_defEalSignRsa, NULL) #endif #ifdef HITLS_CRYPTO_ECDSA DECODER_DEFINE_DER2KEY_NEW_CTX(Ecdsa, CRYPT_PKEY_ECDSA, g_defEalKeyMgmtEcdsa, NULL, NULL, \ g_defEalSignEcdsa, NULL) #endif #ifdef HITLS_CRYPTO_SM2 DECODER_DEFINE_DER2KEY_NEW_CTX(Sm2, CRYPT_PKEY_SM2, g_defEalKeyMgmtSm2, g_defEalAsymCipherSm2, g_defEalExchSm2, \ g_defEalSignSm2, NULL) #endif #ifdef HITLS_CRYPTO_ED25519 DECODER_DEFINE_DER2KEY_NEW_CTX(Ed25519, CRYPT_PKEY_ED25519, g_defEalKeyMgmtEd25519, NULL, NULL, \ g_defEalSignEd25519, NULL) #endif #ifdef HITLS_CRYPTO_RSA DECODER_DEFINE_PRVKEY_DER2KEY_DECODE(Rsa, CRYPT_RSA_Ctx, CRYPT_RSA_ParsePrikeyAsn1Buff) DECODER_DEFINE_PUBKEY_DER2KEY_DECODE(Rsa, CRYPT_RSA_Ctx, CRYPT_RSA_ParsePubkeyAsn1Buff) DECODER_DEFINE_SUBPUBKEY_DER2KEY_DECODE(Rsa, CRYPT_RSA_Ctx, CRYPT_RSA_ParseSubPubkeyAsn1Buff) DECODER_DEFINE_SUBPUBKEY_WITHOUT_SEQ_DER2KEY_DECODE(Rsa, CRYPT_RSA_Ctx, CRYPT_RSA_ParseSubPubkeyAsn1Buff) DECODER_DEFINE_PKCS8_DECODE(Rsa, CRYPT_RSA_Ctx, CRYPT_RSA_ParsePkcs8Key) #endif #ifdef HITLS_CRYPTO_ECDSA DECODER_DEFINE_PRVKEY_DER2KEY_DECODE(Ecdsa, void, CRYPT_ECC_ParsePrikeyAsn1Buff) DECODER_DEFINE_SUBPUBKEY_DER2KEY_DECODE(Ecdsa, void, CRYPT_ECC_ParseSubPubkeyAsn1Buff) DECODER_DEFINE_SUBPUBKEY_WITHOUT_SEQ_DER2KEY_DECODE(Ecdsa, void, CRYPT_ECC_ParseSubPubkeyAsn1Buff) DECODER_DEFINE_PKCS8_DECODE(Ecdsa, void, CRYPT_ECC_ParsePkcs8Key) #endif #ifdef HITLS_CRYPTO_SM2 DECODER_DEFINE_PRVKEY_DER2KEY_DECODE(Sm2, CRYPT_SM2_Ctx, CRYPT_SM2_ParsePrikeyAsn1Buff) DECODER_DEFINE_SUBPUBKEY_DER2KEY_DECODE(Sm2, CRYPT_SM2_Ctx, CRYPT_SM2_ParseSubPubkeyAsn1Buff) DECODER_DEFINE_SUBPUBKEY_WITHOUT_SEQ_DER2KEY_DECODE(Sm2, CRYPT_SM2_Ctx,CRYPT_SM2_ParseSubPubkeyAsn1Buff) DECODER_DEFINE_PKCS8_DECODE(Sm2, CRYPT_SM2_Ctx, CRYPT_SM2_ParsePkcs8Key) #endif #ifdef HITLS_CRYPTO_ED25519 DECODER_DEFINE_SUBPUBKEY_DER2KEY_DECODE(Ed25519, CRYPT_CURVE25519_Ctx, CRYPT_ED25519_ParseSubPubkeyAsn1Buff) DECODER_DEFINE_SUBPUBKEY_WITHOUT_SEQ_DER2KEY_DECODE(Ed25519, CRYPT_CURVE25519_Ctx, CRYPT_ED25519_ParseSubPubkeyAsn1Buff) DECODER_DEFINE_PKCS8_DECODE(Ed25519, CRYPT_CURVE25519_Ctx, CRYPT_ED25519_ParsePkcs8Key) #endif #endif /* HITLS_CRYPTO_CODECSKEY && defined(HITLS_CRYPTO_PROVIDER) */
2401_83913325/openHiTLS-examples_7925
crypto/codecskey/src/crypt_decode_der2key.c
C
unknown
13,506
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_KEY_DECODE #include "crypt_ecc.h" #ifdef HITLS_CRYPTO_ECDSA #include "crypt_ecdsa.h" #endif #ifdef HITLS_CRYPTO_SM2 #include "crypt_sm2.h" #endif #ifdef HITLS_CRYPTO_ED25519 #include "crypt_curve25519.h" #endif #include "crypt_params_key.h" #include "bsl_asn1_internal.h" #include "bsl_params.h" #include "bsl_obj_internal.h" #include "bsl_err_internal.h" #include "crypt_errno.h" #include "crypt_encode_decode_local.h" #include "crypt_encode_decode_key.h" #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) typedef struct { int32_t version; BSL_ASN1_Buffer param; BSL_ASN1_Buffer prikey; BSL_ASN1_Buffer pubkey; } CRYPT_DECODE_EccPrikeyInfo; static int32_t GetParaId(uint8_t *octs, uint32_t octsLen) { BslOidString oidStr = {octsLen, (char *)octs, 0}; BslCid cid = BSL_OBJ_GetCID(&oidStr); if (cid == BSL_CID_UNKNOWN) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_PKEY_PARAID_MAX; } return (int32_t)cid; } static int32_t ParsePrikeyAsn1Info(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *pk8AlgoParam, CRYPT_DECODE_EccPrikeyInfo *eccPrvInfo) { BSL_ASN1_Buffer asn1[CRYPT_ECPRIKEY_PUBKEY_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_PrikeyAsn1Buff(buff, buffLen, asn1, CRYPT_ECPRIKEY_PUBKEY_IDX + 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } int32_t version; BSL_ASN1_Buffer *prikey = &asn1[CRYPT_ECPRIKEY_PRIKEY_IDX]; // the ECC OID BSL_ASN1_Buffer *ecParamOid = &asn1[CRYPT_ECPRIKEY_PARAM_IDX]; // the parameters OID BSL_ASN1_Buffer *pubkey = &asn1[CRYPT_ECPRIKEY_PUBKEY_IDX]; // the ECC OID BSL_ASN1_Buffer *param = pk8AlgoParam; if (ecParamOid->len != 0) { // has a valid Algorithm param param = ecParamOid; } else { if (param == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (param->len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS8_INVALID_ALGO_PARAM); return CRYPT_DECODE_PKCS8_INVALID_ALGO_PARAM; } } if (pubkey->len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ASN1_BUFF_FAILED); return CRYPT_DECODE_ASN1_BUFF_FAILED; } ret = BSL_ASN1_DecodePrimitiveItem(&asn1[CRYPT_ECPRIKEY_VERSION_IDX], &version); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } eccPrvInfo->version = version; eccPrvInfo->param = *param; eccPrvInfo->prikey = *prikey; eccPrvInfo->pubkey = *pubkey; return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_ECDSA || HITLS_CRYPTO_SM2 #ifdef HITLS_CRYPTO_ECDSA // ecdh is not considered, and it will be improved in the future static int32_t EccKeyNew(void *libCtx, BSL_ASN1_Buffer *ecParamOid, void **ecKey) { int32_t paraId = GetParaId(ecParamOid->buff, ecParamOid->len); if (!IsEcdsaEcParaId(paraId)) { return CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH; } CRYPT_ECDSA_Ctx *key = CRYPT_ECDSA_NewCtxEx(libCtx); if (key == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = ECC_SetPara(key, ECC_NewPara(paraId)); if (ret != CRYPT_SUCCESS) { ECC_FreeCtx(key); BSL_ERR_PUSH_ERROR(ret); return ret; } *ecKey = (void *)key; return CRYPT_SUCCESS; } int32_t CRYPT_ECC_ParseSubPubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, void **pubKey, bool isComplete) { if (buff == NULL || buffLen == 0 || pubKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DECODE_SubPubkeyInfo subPubkeyInfo = {0}; void *pctx = NULL; int32_t ret = CRYPT_DECODE_SubPubkey(buff, buffLen, NULL, &subPubkeyInfo, isComplete); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (subPubkeyInfo.keyType != BSL_CID_EC_PUBLICKEY) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH); return CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH; } ret = EccKeyNew(libCtx, &subPubkeyInfo.keyParam, &pctx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_Param pubParam[2] = { {CRYPT_PARAM_EC_PUBKEY, BSL_PARAM_TYPE_OCTETS, subPubkeyInfo.pubKey.buff, subPubkeyInfo.pubKey.len, 0}, BSL_PARAM_END }; ret = ECC_PkeySetPubKeyEx(pctx, pubParam); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); ECC_FreeCtx(pctx); return ret; } *pubKey = (void *)pctx; return ret; } int32_t CRYPT_ECC_ParsePrikeyAsn1Buff(void *libCtx, uint8_t *buffer, uint32_t bufferLen, BSL_ASN1_Buffer *pk8AlgoParam, void **ecPriKey) { if (buffer == NULL || bufferLen == 0 || ecPriKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DECODE_EccPrikeyInfo eccPrvInfo = {0}; int32_t ret = ParsePrikeyAsn1Info(buffer, bufferLen, pk8AlgoParam, &eccPrvInfo); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } void *pctx = NULL; ret = EccKeyNew(libCtx, &eccPrvInfo.param, &pctx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_Param pubParam[2] = { {CRYPT_PARAM_EC_PUBKEY, BSL_PARAM_TYPE_OCTETS, (eccPrvInfo.pubkey.buff + 1), eccPrvInfo.pubkey.len - 1, 0}, BSL_PARAM_END }; ret = ECC_PkeySetPubKeyEx(pctx, pubParam); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } BSL_Param prvParam[2] = { {CRYPT_PARAM_EC_PRVKEY, BSL_PARAM_TYPE_OCTETS, eccPrvInfo.prikey.buff, eccPrvInfo.prikey.len, 0}, BSL_PARAM_END }; ret = ECC_PkeySetPrvKeyEx(pctx, prvParam); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } *ecPriKey = pctx; return ret; ERR: ECC_FreeCtx(pctx); return ret; } int32_t CRYPT_ECC_ParsePkcs8Key(void *libCtx, uint8_t *buff, uint32_t buffLen, void **ecdsaPriKey) { CRYPT_ENCODE_DECODE_Pk8PrikeyInfo pk8PrikeyInfo = {0}; int32_t ret = CRYPT_DECODE_Pkcs8Info(buff, buffLen, NULL, &pk8PrikeyInfo); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (pk8PrikeyInfo.keyType != BSL_CID_EC_PUBLICKEY) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH); return CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH; } ret = CRYPT_ECC_ParsePrikeyAsn1Buff(libCtx, pk8PrikeyInfo.pkeyRawKey, pk8PrikeyInfo.pkeyRawKeyLen, &pk8PrikeyInfo.keyParam, ecdsaPriKey); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_CRYPTO_ECDSA #ifdef HITLS_CRYPTO_SM2 static int32_t Sm2KeyNew(void *libCtx, BSL_ASN1_Buffer *ecParamOid, CRYPT_SM2_Ctx **ecKey) { CRYPT_SM2_Ctx *key = NULL; int32_t paraId = GetParaId(ecParamOid->buff, ecParamOid->len); if (paraId != CRYPT_ECC_SM2) { return CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH; } key = CRYPT_SM2_NewCtxEx(libCtx); if (key == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } *ecKey = key; return CRYPT_SUCCESS; } int32_t CRYPT_SM2_ParseSubPubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_SM2_Ctx **pubKey, bool isComplete) { if (buff == NULL || buffLen == 0 || pubKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DECODE_SubPubkeyInfo subPubkeyInfo = {0}; CRYPT_SM2_Ctx *pctx = NULL; int32_t ret = CRYPT_DECODE_SubPubkey(buff, buffLen, NULL, &subPubkeyInfo, isComplete); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (subPubkeyInfo.keyType != BSL_CID_EC_PUBLICKEY && subPubkeyInfo.keyType != BSL_CID_SM2PRIME256) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH); return CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH; } ret = Sm2KeyNew(libCtx, &subPubkeyInfo.keyParam, &pctx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_Param pubParam[2] = { {CRYPT_PARAM_EC_PUBKEY, BSL_PARAM_TYPE_OCTETS, subPubkeyInfo.pubKey.buff, subPubkeyInfo.pubKey.len, 0}, BSL_PARAM_END }; ret = CRYPT_SM2_SetPubKeyEx(pctx, pubParam); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); CRYPT_SM2_FreeCtx(pctx); return ret; } *pubKey = pctx; return ret; } int32_t CRYPT_SM2_ParsePrikeyAsn1Buff(void *libCtx, uint8_t *buffer, uint32_t bufferLen, BSL_ASN1_Buffer *pk8AlgoParam, CRYPT_SM2_Ctx **sm2PriKey) { CRYPT_DECODE_EccPrikeyInfo eccPrvInfo = {0}; int32_t ret = ParsePrikeyAsn1Info(buffer, bufferLen, pk8AlgoParam, &eccPrvInfo); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } CRYPT_SM2_Ctx *pctx = NULL; ret = Sm2KeyNew(libCtx, &eccPrvInfo.param, &pctx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_Param pubParam[2] = { {CRYPT_PARAM_EC_PUBKEY, BSL_PARAM_TYPE_OCTETS, eccPrvInfo.pubkey.buff + 1, eccPrvInfo.pubkey.len - 1, 0}, BSL_PARAM_END }; ret = CRYPT_SM2_SetPubKeyEx(pctx, pubParam); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } BSL_Param prvParam[2] = { {CRYPT_PARAM_EC_PRVKEY, BSL_PARAM_TYPE_OCTETS, eccPrvInfo.prikey.buff, eccPrvInfo.prikey.len, 0}, BSL_PARAM_END }; ret = CRYPT_SM2_SetPrvKeyEx(pctx, prvParam); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } *sm2PriKey = pctx; return ret; ERR: CRYPT_SM2_FreeCtx(pctx); return ret; } int32_t CRYPT_SM2_ParsePkcs8Key(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_SM2_Ctx **sm2PriKey) { CRYPT_ENCODE_DECODE_Pk8PrikeyInfo pk8PrikeyInfo = {0}; int32_t ret = CRYPT_DECODE_Pkcs8Info(buff, buffLen, NULL, &pk8PrikeyInfo); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (pk8PrikeyInfo.keyType != BSL_CID_EC_PUBLICKEY) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH); return CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH; } ret = CRYPT_SM2_ParsePrikeyAsn1Buff(libCtx, pk8PrikeyInfo.pkeyRawKey, pk8PrikeyInfo.pkeyRawKeyLen, &pk8PrikeyInfo.keyParam, sm2PriKey); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_CRYPTO_SM2 #ifdef HITLS_CRYPTO_ED25519 static int32_t ParseEd25519PrikeyAsn1Buff(void *libCtx, uint8_t *buffer, uint32_t bufferLen, CRYPT_CURVE25519_Ctx **ed25519PriKey) { uint8_t *tmpBuff = buffer; uint32_t tmpBuffLen = bufferLen; int32_t ret = BSL_ASN1_DecodeTagLen(BSL_ASN1_TAG_OCTETSTRING, &tmpBuff, &tmpBuffLen, &tmpBuffLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } CRYPT_CURVE25519_Ctx *pctx = CRYPT_ED25519_NewCtxEx(libCtx); if (pctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } BSL_Param prvParam[2] = { {CRYPT_PARAM_CURVE25519_PRVKEY, BSL_PARAM_TYPE_OCTETS, tmpBuff, tmpBuffLen, 0}, BSL_PARAM_END }; ret = CRYPT_CURVE25519_SetPrvKeyEx(pctx, prvParam); if (ret != CRYPT_SUCCESS) { CRYPT_CURVE25519_FreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } *ed25519PriKey = pctx; return CRYPT_SUCCESS; } int32_t CRYPT_ED25519_ParsePkcs8Key(void *libCtx, uint8_t *buffer, uint32_t bufferLen, CRYPT_CURVE25519_Ctx **ed25519PriKey) { CRYPT_ENCODE_DECODE_Pk8PrikeyInfo pk8PrikeyInfo = {0}; int32_t ret = CRYPT_DECODE_Pkcs8Info(buffer, bufferLen, NULL, &pk8PrikeyInfo); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (pk8PrikeyInfo.keyType != BSL_CID_ED25519) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH); return CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH; } return ParseEd25519PrikeyAsn1Buff(libCtx, pk8PrikeyInfo.pkeyRawKey, pk8PrikeyInfo.pkeyRawKeyLen, ed25519PriKey); } int32_t CRYPT_ED25519_ParseSubPubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_CURVE25519_Ctx **pubKey, bool isComplete) { if (buff == NULL || buffLen == 0 || pubKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DECODE_SubPubkeyInfo subPubkeyInfo = {0}; int32_t ret = CRYPT_DECODE_SubPubkey(buff, buffLen, NULL, &subPubkeyInfo, isComplete); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (subPubkeyInfo.keyType != BSL_CID_ED25519) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH); return CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH; } CRYPT_CURVE25519_Ctx *pctx = CRYPT_ED25519_NewCtxEx(libCtx); if (pctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } BSL_Param pubParam[2] = { {CRYPT_PARAM_CURVE25519_PUBKEY, BSL_PARAM_TYPE_OCTETS, subPubkeyInfo.pubKey.buff, subPubkeyInfo.pubKey.len, 0}, BSL_PARAM_END }; ret = CRYPT_CURVE25519_SetPubKeyEx(pctx, pubParam); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); CRYPT_CURVE25519_FreeCtx(pctx); return ret; } *pubKey = pctx; return ret; } #endif // HITLS_CRYPTO_ED25519 #endif // HITLS_CRYPTO_KEY_DECODE
2401_83913325/openHiTLS-examples_7925
crypto/codecskey/src/crypt_decode_ecc.c
C
unknown
14,282
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CODECSKEY) && defined(HITLS_CRYPTO_KEY_EPKI) && defined(HITLS_CRYPTO_PROVIDER) #include <string.h> #include "crypt_eal_implprovider.h" #include "crypt_params_key.h" #include "crypt_errno.h" #include "bsl_types.h" #include "bsl_params.h" #include "bsl_err_internal.h" #include "crypt_encode_decode_local.h" #include "crypt_decode_key_impl.h" typedef struct DECODER_EPki2PkiCtx { CRYPT_EAL_LibCtx *libCtx; const char *attrName; const char *outFormat; const char *outType; } DECODER_EPki2PkiCtx; void *DECODER_EPKI2PKI_NewCtx(void *provCtx) { (void)provCtx; DECODER_EPki2PkiCtx *ctx = (DECODER_EPki2PkiCtx *)BSL_SAL_Calloc(1, sizeof(DECODER_EPki2PkiCtx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } ctx->outFormat = "ASN1"; ctx->outType = "PRIKEY_PKCS8_UNENCRYPT"; return ctx; } int32_t DECODER_EPKI2PKI_GetParam(void *ctx, BSL_Param *param) { DECODER_EPki2PkiCtx *decoderCtx = (DECODER_EPki2PkiCtx *)ctx; if (decoderCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } DECODER_CommonCtx commonCtx = { .outFormat = decoderCtx->outFormat, .outType = decoderCtx->outType }; return DECODER_CommonGetParam(&commonCtx, param); } int32_t DECODER_EPKI2PKI_SetParam(void *ctx, const BSL_Param *param) { DECODER_EPki2PkiCtx *decoderCtx = (DECODER_EPki2PkiCtx *)ctx; if (decoderCtx == NULL || param == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } const BSL_Param *attrNameParam = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_DECODE_TARGET_ATTR_NAME); if (attrNameParam != NULL) { if (attrNameParam->valueType != BSL_PARAM_TYPE_OCTETS_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } decoderCtx->attrName = (const char *)attrNameParam->value; } const BSL_Param *libCtxParam = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_DECODE_LIB_CTX); if (libCtxParam != NULL) { if (libCtxParam->valueType != BSL_PARAM_TYPE_CTX_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } decoderCtx->libCtx = (CRYPT_EAL_LibCtx *)(uintptr_t)libCtxParam->value; } return CRYPT_SUCCESS; } int32_t DECODER_EPKI2PKI_Decode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam) { DECODER_EPki2PkiCtx *decoderCtx = (DECODER_EPki2PkiCtx *)ctx; if (decoderCtx == NULL || inParam == NULL || outParam == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } const BSL_Param *inputParam = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_BUFFER_DATA); if (inputParam == NULL || inputParam->value == NULL || inputParam->valueType != BSL_PARAM_TYPE_OCTETS) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } const BSL_Param *passParam = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_PASSWORD); if (passParam == NULL || passParam->valueType != BSL_PARAM_TYPE_OCTETS) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } BSL_Buffer input = {(uint8_t *)(uintptr_t)inputParam->value, inputParam->valueLen}; BSL_Buffer pwdBuff = {(uint8_t *)(uintptr_t)passParam->value, passParam->valueLen}; BSL_Buffer decode = {NULL, 0}; int32_t ret = CRYPT_DECODE_Pkcs8PrvDecrypt(decoderCtx->libCtx, decoderCtx->attrName, &input, &pwdBuff, NULL, &decode); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return CRYPT_DECODE_ConstructBufferOutParam(outParam, decode.data, decode.dataLen); } void DECODER_EPKI2PKI_FreeCtx(void *ctx) { if (ctx == NULL) { return; } BSL_SAL_Free(ctx); } void DECODER_EPKI2PKI_FreeOutData(void *ctx, BSL_Param *outParam) { (void)ctx; if (outParam == NULL) { return; } BSL_Param *dataParam = BSL_PARAM_FindParam(outParam, CRYPT_PARAM_DECODE_BUFFER_DATA); if (dataParam == NULL) { return; } BSL_SAL_ClearFree(dataParam->value, dataParam->valueLen); BSL_SAL_Free(outParam); } #endif /* HITLS_CRYPTO_CODECSKEY && HITLS_CRYPTO_EPKI2PKI && HITLS_CRYPTO_PROVIDER */
2401_83913325/openHiTLS-examples_7925
crypto/codecskey/src/crypt_decode_epki2pki.c
C
unknown
4,914
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CODECSKEY) && defined(HITLS_CRYPTO_PROVIDER) #include "crypt_eal_implprovider.h" #include "crypt_eal_pkey.h" #include "crypt_provider.h" #include "crypt_params_key.h" #include "crypt_types.h" #include "crypt_errno.h" #include "crypt_utils.h" #include "eal_pkey.h" #include "crypt_decode_key_impl.h" #include "bsl_err_internal.h" typedef struct { CRYPT_EAL_LibCtx *libCtx; const char *targetAttrName; const char *outFormat; const char *outType; } DECODER_Lowkey2PkeyCtx; void *DECODER_LowKeyObject2PkeyObjectNewCtx(void *provCtx) { (void)provCtx; DECODER_Lowkey2PkeyCtx *ctx = (DECODER_Lowkey2PkeyCtx *)BSL_SAL_Calloc(1, sizeof(DECODER_Lowkey2PkeyCtx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } ctx->outFormat = "OBJECT"; ctx->outType = "HIGH_KEY"; return (void *)ctx; } int32_t DECODER_LowKeyObject2PkeyObjectSetParam(void *ctx, const BSL_Param *param) { DECODER_Lowkey2PkeyCtx *decoderCtx = (DECODER_Lowkey2PkeyCtx *)ctx; if (decoderCtx == NULL || param == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } const BSL_Param *libCtxParam = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_DECODE_LIB_CTX); if (libCtxParam != NULL) { if (libCtxParam->valueType != BSL_PARAM_TYPE_CTX_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } decoderCtx->libCtx = (CRYPT_EAL_LibCtx *)(uintptr_t)libCtxParam->value; } const BSL_Param *targetAttrNameParam = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_DECODE_TARGET_ATTR_NAME); if (targetAttrNameParam != NULL) { if (targetAttrNameParam->valueType != BSL_PARAM_TYPE_OCTETS_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } decoderCtx->targetAttrName = (const char *)(uintptr_t)targetAttrNameParam->value; } return CRYPT_SUCCESS; } int32_t DECODER_LowKeyObject2PkeyObjectGetParam(void *ctx, BSL_Param *param) { DECODER_Lowkey2PkeyCtx *decoderCtx = (DECODER_Lowkey2PkeyCtx *)ctx; if (decoderCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } DECODER_CommonCtx commonCtx = { .outFormat = decoderCtx->outFormat, .outType = decoderCtx->outType }; return DECODER_CommonGetParam(&commonCtx, param); } typedef struct LowKeyObjectMethodInfo { CRYPT_EAL_ImplPkeyMgmtExport export; CRYPT_EAL_ImplPkeyMgmtDupCtx dupCtx; CRYPT_EAL_ImplPkeyMgmtFreeCtx freeCtx; } LowKeyObjectMethodInfo; static int32_t GetLowKeyObjectInfo(const BSL_Param *inParam, void **object, int32_t *objectType, LowKeyObjectMethodInfo *method) { const BSL_Param *lowObjectRef = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_OBJECT_DATA); if (lowObjectRef == NULL || lowObjectRef->valueType != BSL_PARAM_TYPE_CTX_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } const BSL_Param *lowObjectRefType = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_OBJECT_TYPE); if (lowObjectRefType == NULL || lowObjectRefType->valueType != BSL_PARAM_TYPE_INT32) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } const BSL_Param *exportFunc = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_PKEY_EXPORT_METHOD_FUNC); if (exportFunc == NULL || exportFunc->valueType != BSL_PARAM_TYPE_FUNC_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } const BSL_Param *dupFunc = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_PKEY_DUP_METHOD_FUNC); if (dupFunc == NULL || dupFunc->valueType != BSL_PARAM_TYPE_FUNC_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } const BSL_Param *freeFunc = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_PKEY_FREE_METHOD_FUNC); if (freeFunc == NULL || freeFunc->valueType != BSL_PARAM_TYPE_FUNC_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } if (lowObjectRef->value == NULL || lowObjectRefType->value == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } *object = (void *)(uintptr_t)lowObjectRef->value; *objectType = *((int32_t *)(uintptr_t)lowObjectRefType->value); method->export = (CRYPT_EAL_ImplPkeyMgmtExport)(uintptr_t)exportFunc->value; method->dupCtx = (CRYPT_EAL_ImplPkeyMgmtDupCtx)(uintptr_t)dupFunc->value; method->freeCtx = (CRYPT_EAL_ImplPkeyMgmtFreeCtx)(uintptr_t)freeFunc->value; return CRYPT_SUCCESS; } static int32_t GetProviderInfo(const BSL_Param *inParam, CRYPT_EAL_ProvMgrCtx **lastDecoderProviderCtx) { const BSL_Param *lastDecoderProvCtxParam = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_PROVIDER_CTX); if (lastDecoderProvCtxParam != NULL) { if (lastDecoderProvCtxParam->valueType != BSL_PARAM_TYPE_CTX_PTR) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } *lastDecoderProviderCtx = (CRYPT_EAL_ProvMgrCtx *)(uintptr_t)lastDecoderProvCtxParam->value; } return CRYPT_SUCCESS; } typedef struct { CRYPT_EAL_PkeyMgmtInfo *pkeyAlgInfo; void *targetKeyRef; } ImportTargetPkeyArgs; static int32_t ImportTargetPkey(const BSL_Param *param, void *args) { if (param == NULL || args == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } ImportTargetPkeyArgs *importTargetPkeyArgs = (ImportTargetPkeyArgs *)args; void *provCtx = NULL; CRYPT_EAL_PkeyMgmtInfo *pkeyAlgInfo = importTargetPkeyArgs->pkeyAlgInfo; if (pkeyAlgInfo == NULL || pkeyAlgInfo->keyMgmtMethod->provNewCtx == NULL || pkeyAlgInfo->keyMgmtMethod->import == NULL || pkeyAlgInfo->keyMgmtMethod->freeCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = CRYPT_EAL_ProviderCtrl(pkeyAlgInfo->mgrCtx, CRYPT_PROVIDER_GET_USER_CTX, &provCtx, sizeof(provCtx)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } void *keyRef = pkeyAlgInfo->keyMgmtMethod->provNewCtx(provCtx, pkeyAlgInfo->algId); if (keyRef == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ret = pkeyAlgInfo->keyMgmtMethod->import(keyRef, param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); pkeyAlgInfo->keyMgmtMethod->freeCtx(keyRef); return ret; } importTargetPkeyArgs->targetKeyRef = keyRef; return CRYPT_SUCCESS; } static int32_t TransLowKeyToTargetLowKey(CRYPT_EAL_PkeyMgmtInfo *pkeyAlgInfo, const LowKeyObjectMethodInfo *method, void *lowObjectRef, void **targetKeyRef) { ImportTargetPkeyArgs importTargetPkeyArgs = {0}; importTargetPkeyArgs.pkeyAlgInfo = pkeyAlgInfo; if (method->export == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } BSL_Param param[3] = { {CRYPT_PARAM_PKEY_PROCESS_FUNC, BSL_PARAM_TYPE_FUNC_PTR, ImportTargetPkey, 0, 0}, {CRYPT_PARAM_PKEY_PROCESS_ARGS, BSL_PARAM_TYPE_CTX_PTR, &importTargetPkeyArgs, 0, 0}, BSL_PARAM_END }; int32_t ret = method->export(lowObjectRef, param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } *targetKeyRef = importTargetPkeyArgs.targetKeyRef; return CRYPT_SUCCESS; } static int32_t DupLowKey(const LowKeyObjectMethodInfo *method, void *lowObjectRef, void **targetKeyRef) { if (method->dupCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } *targetKeyRef = method->dupCtx(lowObjectRef); if (*targetKeyRef == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } return CRYPT_SUCCESS; } static int32_t ConstructOutObjectParam(BSL_Param **outParam, void *object) { BSL_Param *result = BSL_SAL_Calloc(2, sizeof(BSL_Param)); if (result == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = BSL_PARAM_InitValue(&result[0], CRYPT_PARAM_DECODE_OBJECT_DATA, BSL_PARAM_TYPE_CTX_PTR, object, 0); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(result); BSL_ERR_PUSH_ERROR(ret); } *outParam = result; return ret; } /* input is pem format buffer, output is der format buffer */ int32_t DECODER_LowKeyObject2PkeyObjectDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam) { if (ctx == NULL || inParam == NULL || outParam == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } DECODER_Lowkey2PkeyCtx *decoderCtx = (DECODER_Lowkey2PkeyCtx *)ctx; void *lowObjectRef = NULL; int32_t lowObjectRefType = 0; CRYPT_EAL_ProvMgrCtx *lastDecoderProviderCtx = NULL; LowKeyObjectMethodInfo method = {0}; void *targetKeyRef = NULL; CRYPT_EAL_PkeyMgmtInfo pkeyAlgInfo = {0}; int32_t ret = 0; RETURN_RET_IF_ERR(GetLowKeyObjectInfo(inParam, &lowObjectRef, &lowObjectRefType, &method), ret); if (method.freeCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } RETURN_RET_IF_ERR(GetProviderInfo(inParam, &lastDecoderProviderCtx), ret); RETURN_RET_IF_ERR(CRYPT_EAL_GetPkeyAlgInfo(decoderCtx->libCtx, lowObjectRefType, decoderCtx->targetAttrName, &pkeyAlgInfo), ret); if (pkeyAlgInfo.mgrCtx != lastDecoderProviderCtx) { ret = TransLowKeyToTargetLowKey(&pkeyAlgInfo, &method, lowObjectRef, &targetKeyRef); } else { ret = DupLowKey(&method, lowObjectRef, &targetKeyRef); } if (ret != CRYPT_SUCCESS) { goto EXIT; } CRYPT_EAL_PkeyCtx *ealPKey = CRYPT_EAL_MakeKeyByPkeyAlgInfo(&pkeyAlgInfo, targetKeyRef, sizeof(void *)); if (ealPKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto EXIT; } ret = ConstructOutObjectParam(outParam, ealPKey); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(ealPKey); BSL_ERR_PUSH_ERROR(ret); } return ret; EXIT: BSL_SAL_Free(pkeyAlgInfo.keyMgmtMethod); if (targetKeyRef != NULL) { method.freeCtx(targetKeyRef); } return ret; } void DECODER_LowKeyObject2PkeyObjectFreeOutData(void *ctx, BSL_Param *outParam) { DECODER_Lowkey2PkeyCtx *decoderCtx = (DECODER_Lowkey2PkeyCtx *)ctx; if (outParam == NULL || decoderCtx == NULL) { return; } BSL_Param *objectDataParam = BSL_PARAM_FindParam(outParam, CRYPT_PARAM_DECODE_OBJECT_DATA); if (objectDataParam == NULL || objectDataParam->valueType != BSL_PARAM_TYPE_CTX_PTR || objectDataParam->value == NULL) { return; } CRYPT_EAL_PkeyCtx *ealPKey = (CRYPT_EAL_PkeyCtx *)objectDataParam->value; CRYPT_EAL_PkeyFreeCtx(ealPKey); BSL_SAL_Free(outParam); } void DECODER_LowKeyObject2PkeyObjectFreeCtx(void *ctx) { if (ctx == NULL) { return; } BSL_SAL_Free(ctx); } #endif
2401_83913325/openHiTLS-examples_7925
crypto/codecskey/src/crypt_decode_lowkey2pkey.c
C
unknown
11,815
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CODECSKEY) && defined(HITLS_BSL_PEM) && defined(HITLS_CRYPTO_PROVIDER) #include <stdint.h> #include <string.h> #include "crypt_eal_implprovider.h" #include "crypt_errno.h" #include "crypt_params_key.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "bsl_pem_internal.h" #include "crypt_encode_decode_local.h" #include "crypt_decode_key_impl.h" typedef struct { void *provCtx; const char *outFormat; const char *outType; } DECODER_Pem2DerCtx; void *DECODER_Pem2DerNewCtx(void *provCtx) { (void)provCtx; DECODER_Pem2DerCtx *ctx = (DECODER_Pem2DerCtx *)BSL_SAL_Calloc(1, sizeof(DECODER_Pem2DerCtx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } ctx->provCtx = provCtx; ctx->outFormat = "ASN1"; ctx->outType = NULL; return ctx; } int32_t DECODER_Pem2DerGetParam(void *ctx, BSL_Param *param) { DECODER_Pem2DerCtx *decoderCtx = (DECODER_Pem2DerCtx *)ctx; if (decoderCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } DECODER_CommonCtx commonCtx = { .outFormat = decoderCtx->outFormat, .outType = decoderCtx->outType }; return DECODER_CommonGetParam(&commonCtx, param); } int32_t DECODER_Pem2DerSetParam(void *ctx, const BSL_Param *param) { (void)ctx; (void)param; return CRYPT_SUCCESS; } /* input is pem format buffer, output is der format buffer */ int32_t DECODER_Pem2DerDecode(void *ctx, const BSL_Param *inParam, BSL_Param **outParam) { if (ctx == NULL || inParam == NULL || outParam == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } BSL_PEM_Symbol symbol = {0}; char *dataType = NULL; DECODER_Pem2DerCtx *decoderCtx = (DECODER_Pem2DerCtx *)ctx; const BSL_Param *input = BSL_PARAM_FindConstParam(inParam, CRYPT_PARAM_DECODE_BUFFER_DATA); if (input == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (input->value == NULL || input->valueLen == 0 || input->valueType != BSL_PARAM_TYPE_OCTETS) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } BSL_Buffer encode = {(uint8_t *)(uintptr_t)input->value, input->valueLen}; uint8_t *asn1Encode = NULL; uint32_t asn1Len = 0; int32_t ret = BSL_PEM_GetSymbolAndType((char *)encode.data, encode.dataLen, &symbol, &dataType); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BSL_PEM_DecodePemToAsn1((char **)&encode.data, &encode.dataLen, &symbol, &asn1Encode, &asn1Len); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(asn1Encode); BSL_ERR_PUSH_ERROR(ret); return ret; } decoderCtx->outType = dataType; return CRYPT_DECODE_ConstructBufferOutParam(outParam, asn1Encode, asn1Len); } void DECODER_Pem2DerFreeOutData(void *ctx, BSL_Param *outParam) { (void)ctx; if (outParam == NULL) { return; } BSL_Param *asn1DataParam = BSL_PARAM_FindParam(outParam, CRYPT_PARAM_DECODE_BUFFER_DATA); if (asn1DataParam == NULL) { return; } BSL_SAL_Free(asn1DataParam->value); asn1DataParam->value = NULL; asn1DataParam->valueLen = 0; BSL_SAL_Free(outParam); } void DECODER_Pem2DerFreeCtx(void *ctx) { if (ctx == NULL) { return; } BSL_SAL_Free(ctx); } #endif /* HITLS_CRYPTO_CODECSKEY && HITLS_BSL_PEM && HITLS_CRYPTO_PROVIDER */
2401_83913325/openHiTLS-examples_7925
crypto/codecskey/src/crypt_decode_pem2der.c
C
unknown
4,088
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CODECSKEY) #include "securec.h" #include "bsl_sal.h" #include "bsl_list.h" #include "sal_file.h" #include "bsl_err_internal.h" #include "crypt_errno.h" #include "crypt_eal_provider.h" #include "crypt_eal_implprovider.h" #include "crypt_eal_codecs.h" #include "crypt_provider.h" #include "crypt_eal_pkey.h" #include "bsl_types.h" #include "crypt_types.h" #include "crypt_utils.h" #include "eal_pkey.h" #include "crypt_encode_decode_local.h" #include "crypt_encode_decode_key.h" #if defined(HITLS_CRYPTO_PROVIDER) static int32_t SetDecodePoolParamForKey(CRYPT_DECODER_PoolCtx *poolCtx, char *targetType, char *targetFormat) { int32_t ret = CRYPT_DECODE_PoolCtrl(poolCtx, CRYPT_DECODE_POOL_CMD_SET_TARGET_FORMAT, targetFormat, (int32_t)strlen(targetFormat)); if (ret != CRYPT_SUCCESS) { return ret; } ret = CRYPT_DECODE_PoolCtrl(poolCtx, CRYPT_DECODE_POOL_CMD_SET_TARGET_TYPE, targetType, (int32_t)strlen(targetType)); if (ret != CRYPT_SUCCESS) { return ret; } return ret; } static int32_t GetObjectFromOutData(BSL_Param *outData, void **object) { if (outData == NULL || object == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } BSL_Param *param = BSL_PARAM_FindParam(outData, CRYPT_PARAM_DECODE_OBJECT_DATA); if (param == NULL || param->valueType != BSL_PARAM_TYPE_CTX_PTR || param->value == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } *object = param->value; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_ProviderDecodeBuffKeyInner(CRYPT_EAL_LibCtx *libCtx, const char *attrName, int32_t keyType, const char *format, const char *type, BSL_Buffer *encode, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPKey) { char *targetType = "HIGH_KEY"; char *targetFormat = "OBJECT"; uint32_t index = 0; BSL_Param *outParam = NULL; bool isFreeOutData = false; BSL_Param input[3] = {{0}, {0}, BSL_PARAM_END}; CRYPT_EAL_PkeyCtx *tmpPKey = NULL; if (encode == NULL || encode->data == NULL || encode->dataLen == 0 || ealPKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DECODER_PoolCtx *poolCtx = CRYPT_DECODE_PoolNewCtx(libCtx, attrName, keyType, format, type); if (poolCtx == NULL) { return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = SetDecodePoolParamForKey(poolCtx, targetType, targetFormat); if (ret != CRYPT_SUCCESS) { goto EXIT; } (void)BSL_PARAM_InitValue(&input[index++], CRYPT_PARAM_DECODE_BUFFER_DATA, BSL_PARAM_TYPE_OCTETS, encode->data, encode->dataLen); if (pwd != NULL) { (void)BSL_PARAM_InitValue(&input[index++], CRYPT_PARAM_DECODE_PASSWORD, BSL_PARAM_TYPE_OCTETS, pwd->data, pwd->dataLen); } ret = CRYPT_DECODE_PoolDecode(poolCtx, input, &outParam); if (ret != CRYPT_SUCCESS) { goto EXIT; } ret = GetObjectFromOutData(outParam, (void **)(&tmpPKey)); if (ret != CRYPT_SUCCESS) { goto EXIT; } int32_t algId = CRYPT_EAL_PkeyGetId(tmpPKey); if (keyType != BSL_CID_UNKNOWN && algId != keyType) { ret = CRYPT_EAL_ERR_ALGID; BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); goto EXIT; } ret = CRYPT_DECODE_PoolCtrl(poolCtx, CRYPT_DECODE_POOL_CMD_SET_FLAG_FREE_OUT_DATA, &isFreeOutData, sizeof(bool)); if (ret != CRYPT_SUCCESS) { goto EXIT; } *ealPKey = tmpPKey; BSL_SAL_Free(outParam); EXIT: CRYPT_DECODE_PoolFreeCtx(poolCtx); return ret; } #endif /* HITLS_CRYPTO_PROVIDER */ int32_t CRYPT_EAL_ProviderDecodeBuffKey(CRYPT_EAL_LibCtx *libCtx, const char *attrName, int32_t keyType, const char *format, const char *type, BSL_Buffer *encode, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPKey) { #ifdef HITLS_CRYPTO_PROVIDER return CRYPT_EAL_ProviderDecodeBuffKeyInner(libCtx, attrName, keyType, format, type, encode, pwd, ealPKey); #else (void)libCtx; (void)attrName; (void)keyType; int32_t encodeType = CRYPT_EAL_GetEncodeType(type); int32_t encodeFormat = CRYPT_EAL_GetEncodeFormat(format); if (pwd == NULL) { return CRYPT_EAL_DecodeBuffKey(encodeFormat, encodeType, encode, NULL, 0, ealPKey); } else { return CRYPT_EAL_DecodeBuffKey(encodeFormat, encodeType, encode, pwd->data, pwd->dataLen, ealPKey); } #endif } #ifdef HITLS_BSL_SAL_FILE int32_t CRYPT_EAL_ProviderDecodeFileKey(CRYPT_EAL_LibCtx *libCtx, const char *attrName, int32_t keyType, const char *format, const char *type, const char *path, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPKey) { if (path == NULL || strlen(path) > PATH_MAX_LEN) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } uint8_t *data = NULL; uint32_t dataLen = 0; int32_t ret = BSL_SAL_ReadFile(path, &data, &dataLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_Buffer encode = {data, dataLen}; ret = CRYPT_EAL_ProviderDecodeBuffKey(libCtx, attrName, keyType, format, type, &encode, pwd, ealPKey); BSL_SAL_Free(data); return ret; } #endif /* HITLS_BSL_SAL_FILE */ #endif /* HITLS_CRYPTO_CODECSKEY */
2401_83913325/openHiTLS-examples_7925
crypto/codecskey/src/crypt_decode_pkey.c
C
unknown
5,857
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_KEY_DECODE) && defined(HITLS_CRYPTO_RSA) #include "crypt_rsa.h" #include "bsl_asn1_internal.h" #include "bsl_params.h" #include "bsl_errno.h" #include "bsl_err_internal.h" #include "crypt_errno.h" #include "crypt_params_key.h" #include "crypt_encode_decode_local.h" #include "crypt_encode_decode_key.h" static int32_t ProcRsaPubKey(const BSL_ASN1_Buffer *asn1, CRYPT_RSA_Ctx *rsaKey) { const BSL_Param param[3] = { {CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_E_IDX].buff, asn1[CRYPT_RSA_PRV_E_IDX].len, 0}, {CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_N_IDX].buff, asn1[CRYPT_RSA_PRV_N_IDX].len, 0}, BSL_PARAM_END }; return CRYPT_RSA_SetPubKeyEx(rsaKey, param); } static int32_t ProcRsaPrivKey(const BSL_ASN1_Buffer *asn1, CRYPT_RSA_Ctx *rsaKey) { const BSL_Param param[10] = { {CRYPT_PARAM_RSA_D, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_D_IDX].buff, asn1[CRYPT_RSA_PRV_D_IDX].len, 0}, {CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_N_IDX].buff, asn1[CRYPT_RSA_PRV_N_IDX].len, 0}, {CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_E_IDX].buff, asn1[CRYPT_RSA_PRV_E_IDX].len, 0}, {CRYPT_PARAM_RSA_P, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_P_IDX].buff, asn1[CRYPT_RSA_PRV_P_IDX].len, 0}, {CRYPT_PARAM_RSA_Q, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_Q_IDX].buff, asn1[CRYPT_RSA_PRV_Q_IDX].len, 0}, {CRYPT_PARAM_RSA_DP, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_DP_IDX].buff, asn1[CRYPT_RSA_PRV_DP_IDX].len, 0}, {CRYPT_PARAM_RSA_DQ, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_DQ_IDX].buff, asn1[CRYPT_RSA_PRV_DQ_IDX].len, 0}, {CRYPT_PARAM_RSA_QINV, BSL_PARAM_TYPE_OCTETS, asn1[CRYPT_RSA_PRV_QINV_IDX].buff, asn1[CRYPT_RSA_PRV_QINV_IDX].len, 0}, BSL_PARAM_END }; return CRYPT_RSA_SetPrvKeyEx(rsaKey, param); } static int32_t ProcRsaKeyPair(uint8_t *buff, uint32_t buffLen, CRYPT_RSA_Ctx *rsaKey) { // decode n and e BSL_ASN1_Buffer asn1[CRYPT_RSA_PRV_OTHER_PRIME_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_RsaPrikeyAsn1Buff(buff, buffLen, asn1, CRYPT_RSA_PRV_OTHER_PRIME_IDX + 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = ProcRsaPrivKey(asn1, rsaKey); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return ProcRsaPubKey(asn1, rsaKey); } static int32_t ProcRsaPssParam(BSL_ASN1_Buffer *rsaPssParam, CRYPT_RSA_Ctx *rsaPriKey) { CRYPT_RsaPadType padType = CRYPT_EMSA_PSS; int32_t ret = CRYPT_RSA_Ctrl(rsaPriKey, CRYPT_CTRL_SET_RSA_PADDING, &padType, sizeof(CRYPT_RsaPadType)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (rsaPssParam == NULL || rsaPssParam->buff == NULL) { return CRYPT_SUCCESS; } CRYPT_RSA_PssPara para = {0}; ret = CRYPT_EAL_ParseRsaPssAlgParam(rsaPssParam, &para); if (ret != CRYPT_SUCCESS) { return ret; } BSL_Param param[4] = { {CRYPT_PARAM_RSA_MD_ID, BSL_PARAM_TYPE_INT32, &para.mdId, sizeof(para.mdId), 0}, {CRYPT_PARAM_RSA_MGF1_ID, BSL_PARAM_TYPE_INT32, &para.mgfId, sizeof(para.mgfId), 0}, {CRYPT_PARAM_RSA_SALTLEN, BSL_PARAM_TYPE_INT32, &para.saltLen, sizeof(para.saltLen), 0}, BSL_PARAM_END}; return CRYPT_RSA_Ctrl(rsaPriKey, CRYPT_CTRL_SET_RSA_EMSA_PSS, param, 0); } static int32_t DecodeRsaPrikeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *rsaPssParam, BslCid cid, CRYPT_RSA_Ctx **rsaPriKey) { CRYPT_RSA_Ctx *pctx = CRYPT_RSA_NewCtxEx(libCtx); if (pctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = ProcRsaKeyPair(buff, buffLen, pctx); if (ret != CRYPT_SUCCESS) { CRYPT_RSA_FreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } if (cid != BSL_CID_RSASSAPSS) { *rsaPriKey = pctx; return CRYPT_SUCCESS; } ret = ProcRsaPssParam(rsaPssParam, pctx); if (ret != CRYPT_SUCCESS) { CRYPT_RSA_FreeCtx(pctx); return ret; } *rsaPriKey = pctx; return ret; } int32_t CRYPT_RSA_ParsePrikeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *rsaPssParam, CRYPT_RSA_Ctx **rsaPriKey) { return DecodeRsaPrikeyAsn1Buff(libCtx, buff, buffLen, rsaPssParam, BSL_CID_UNKNOWN, rsaPriKey); } int32_t CRYPT_RSA_ParsePubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *param, CRYPT_RSA_Ctx **rsaPubKey, BslCid cid) { // decode n and e BSL_ASN1_Buffer pubAsn1[CRYPT_RSA_PUB_E_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_RsaPubkeyAsn1Buff(buff, buffLen, pubAsn1, CRYPT_RSA_PUB_E_IDX + 1); if (ret != CRYPT_SUCCESS) { return ret; } CRYPT_RSA_Ctx *pctx = CRYPT_RSA_NewCtxEx(libCtx); if (pctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } BSL_Param pubParam[3] = { {CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, pubAsn1[CRYPT_RSA_PUB_E_IDX].buff, pubAsn1[CRYPT_RSA_PUB_E_IDX].len, 0}, {CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, pubAsn1[CRYPT_RSA_PUB_N_IDX].buff, pubAsn1[CRYPT_RSA_PUB_N_IDX].len, 0}, BSL_PARAM_END }; ret = CRYPT_RSA_SetPubKeyEx(pctx, pubParam); if (cid != BSL_CID_RSASSAPSS) { *rsaPubKey = pctx; return CRYPT_SUCCESS; } ret = ProcRsaPssParam(param, pctx); if (ret != CRYPT_SUCCESS) { CRYPT_RSA_FreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } *rsaPubKey = pctx; return ret; } int32_t CRYPT_RSA_ParseSubPubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_RSA_Ctx **pubKey, bool isComplete) { if (pubKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DECODE_SubPubkeyInfo subPubkeyInfo = {0}; CRYPT_RSA_Ctx *pctx = NULL; int32_t ret = CRYPT_DECODE_SubPubkey(buff, buffLen, NULL, &subPubkeyInfo, isComplete); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (subPubkeyInfo.keyType != BSL_CID_RSASSAPSS && subPubkeyInfo.keyType != BSL_CID_RSA) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH); return CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH; } ret = CRYPT_RSA_ParsePubkeyAsn1Buff(libCtx, subPubkeyInfo.pubKey.buff, subPubkeyInfo.pubKey.len, &subPubkeyInfo.keyParam, &pctx, subPubkeyInfo.keyType); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } *pubKey = pctx; return ret; } int32_t CRYPT_RSA_ParsePkcs8Key(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_RSA_Ctx **rsaPriKey) { CRYPT_ENCODE_DECODE_Pk8PrikeyInfo pk8PrikeyInfo = {0}; int32_t ret = CRYPT_DECODE_Pkcs8Info(buff, buffLen, NULL, &pk8PrikeyInfo); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (pk8PrikeyInfo.keyType != BSL_CID_RSASSAPSS && pk8PrikeyInfo.keyType != BSL_CID_RSA) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH); return CRYPT_DECODE_ERR_KEY_TYPE_NOT_MATCH; } ret = DecodeRsaPrikeyAsn1Buff(libCtx, pk8PrikeyInfo.pkeyRawKey, pk8PrikeyInfo.pkeyRawKeyLen, &pk8PrikeyInfo.keyParam, pk8PrikeyInfo.keyType, rsaPriKey); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_CRYPTO_KEY_DECODE && HITLS_CRYPTO_RSA
2401_83913325/openHiTLS-examples_7925
crypto/codecskey/src/crypt_decode_rsa.c
C
unknown
8,338
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CODECSKEY #include <stdint.h> #include <string.h> #ifdef HITLS_BSL_SAL_FILE #include "sal_file.h" #endif #include "bsl_types.h" #include "bsl_asn1_internal.h" #ifdef HITLS_BSL_PEM #include "bsl_pem_internal.h" #endif // HITLS_BSL_PEM #include "bsl_err_internal.h" #include "crypt_errno.h" #include "crypt_types.h" #include "crypt_eal_pkey.h" #include "crypt_eal_codecs.h" #include "crypt_encode_decode_local.h" #include "crypt_encode_decode_key.h" int32_t CRYPT_EAL_GetEncodeFormat(const char *format) { if (format == NULL) { return BSL_FORMAT_UNKNOWN; } static const struct { const char *formatStr; int32_t formatInt; } FORMAT_MAP[] = { {"ASN1", BSL_FORMAT_ASN1}, {"PEM", BSL_FORMAT_PEM}, {"PFX_COM", BSL_FORMAT_PFX_COM}, {"PKCS12", BSL_FORMAT_PKCS12}, {"OBJECT", BSL_FORMAT_OBJECT} }; for (size_t i = 0; i < sizeof(FORMAT_MAP) / sizeof(FORMAT_MAP[0]); i++) { if (strcmp(format, FORMAT_MAP[i].formatStr) == 0) { return FORMAT_MAP[i].formatInt; } } return BSL_FORMAT_UNKNOWN; } #ifdef HITLS_BSL_PEM static int32_t EAL_GetPemPubKeySymbol(int32_t type, BSL_PEM_Symbol *symbol) { switch (type) { case CRYPT_PUBKEY_SUBKEY: symbol->head = BSL_PEM_PUB_KEY_BEGIN_STR; symbol->tail = BSL_PEM_PUB_KEY_END_STR; return CRYPT_SUCCESS; #ifdef HITLS_CRYPTO_RSA case CRYPT_PUBKEY_RSA: symbol->head = BSL_PEM_RSA_PUB_KEY_BEGIN_STR; symbol->tail = BSL_PEM_RSA_PUB_KEY_END_STR; return CRYPT_SUCCESS; #endif default: BSL_ERR_PUSH_ERROR(CRYPT_DECODE_NO_SUPPORT_TYPE); return CRYPT_DECODE_NO_SUPPORT_TYPE; } } static int32_t EAL_GetPemPriKeySymbol(int32_t type, BSL_PEM_Symbol *symbol) { switch (type) { #ifdef HITLS_CRYPTO_ECDSA case CRYPT_PRIKEY_ECC: symbol->head = BSL_PEM_EC_PRI_KEY_BEGIN_STR; symbol->tail = BSL_PEM_EC_PRI_KEY_END_STR; return CRYPT_SUCCESS; #endif #ifdef HITLS_CRYPTO_RSA case CRYPT_PRIKEY_RSA: symbol->head = BSL_PEM_RSA_PRI_KEY_BEGIN_STR; symbol->tail = BSL_PEM_RSA_PRI_KEY_END_STR; return CRYPT_SUCCESS; #endif case CRYPT_PRIKEY_PKCS8_UNENCRYPT: symbol->head = BSL_PEM_PRI_KEY_BEGIN_STR; symbol->tail = BSL_PEM_PRI_KEY_END_STR; return CRYPT_SUCCESS; case CRYPT_PRIKEY_PKCS8_ENCRYPT: symbol->head = BSL_PEM_P8_PRI_KEY_BEGIN_STR; symbol->tail = BSL_PEM_P8_PRI_KEY_END_STR; return CRYPT_SUCCESS; default: BSL_ERR_PUSH_ERROR(CRYPT_DECODE_NO_SUPPORT_TYPE); return CRYPT_DECODE_NO_SUPPORT_TYPE; } } #endif // HITLS_BSL_PEM #ifdef HITLS_CRYPTO_KEY_DECODE int32_t CRYPT_EAL_ParseAsn1PriKey(int32_t type, BSL_Buffer *encode, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPriKey) { (void)pwd; switch (type) { #ifdef HITLS_CRYPTO_ECDSA case CRYPT_PRIKEY_ECC: return ParseEccPrikeyAsn1Buff(encode->data, encode->dataLen, NULL, ealPriKey); #endif #ifdef HITLS_CRYPTO_RSA case CRYPT_PRIKEY_RSA: return ParseRsaPrikeyAsn1Buff(encode->data, encode->dataLen, NULL, BSL_CID_UNKNOWN, ealPriKey); #endif case CRYPT_PRIKEY_PKCS8_UNENCRYPT: return ParsePk8PriKeyBuff(encode, ealPriKey); #ifdef HITLS_CRYPTO_KEY_EPKI case CRYPT_PRIKEY_PKCS8_ENCRYPT: return ParsePk8EncPriKeyBuff(encode, pwd, ealPriKey); #endif default: BSL_ERR_PUSH_ERROR(CRYPT_DECODE_NO_SUPPORT_TYPE); return CRYPT_DECODE_NO_SUPPORT_TYPE; } } #ifdef HITLS_BSL_PEM int32_t CRYPT_EAL_ParsePemPriKey(int32_t type, BSL_Buffer *encode, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPriKey) { BSL_PEM_Symbol symbol = {0}; uint8_t *buff = encode->data; uint32_t buffLen = encode->dataLen; int32_t ret = EAL_GetPemPriKeySymbol(type, &symbol); if (ret != CRYPT_SUCCESS) { return ret; } BSL_Buffer asn1 = {0}; ret = BSL_PEM_DecodePemToAsn1((char **)&buff, &buffLen, &symbol, &(asn1.data), &(asn1.dataLen)); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = CRYPT_EAL_ParseAsn1PriKey(type, &asn1, pwd, ealPriKey); BSL_SAL_Free(asn1.data); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_BSL_PEM int32_t CRYPT_EAL_ParseUnknownPriKey(int32_t type, BSL_Buffer *encode, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPriKey) { #ifdef HITLS_BSL_PEM bool isPem = BSL_PEM_IsPemFormat((char *)(encode->data), encode->dataLen); if (isPem) { return CRYPT_EAL_ParsePemPriKey(type, encode, pwd, ealPriKey); } #endif return CRYPT_EAL_ParseAsn1PriKey(type, encode, pwd, ealPriKey); } int32_t CRYPT_EAL_PriKeyParseBuff(BSL_ParseFormat format, int32_t type, BSL_Buffer *encode, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPriKey) { if (encode == NULL || encode->data == NULL || encode->dataLen == 0 || ealPriKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } switch (format) { case BSL_FORMAT_ASN1: return CRYPT_EAL_ParseAsn1PriKey(type, encode, pwd, ealPriKey); #ifdef HITLS_BSL_PEM case BSL_FORMAT_PEM: return CRYPT_EAL_ParsePemPriKey(type, encode, pwd, ealPriKey); #endif // HITLS_BSL_PEM case BSL_FORMAT_UNKNOWN: return CRYPT_EAL_ParseUnknownPriKey(type, encode, pwd, ealPriKey); default: return CRYPT_DECODE_NO_SUPPORT_FORMAT; } } int32_t CRYPT_EAL_ParseAsn1PubKey(int32_t type, BSL_Buffer *encode, CRYPT_EAL_PkeyCtx **ealPubKey) { switch (type) { case CRYPT_PUBKEY_SUBKEY_WITHOUT_SEQ: return CRYPT_EAL_ParseAsn1SubPubkey(encode->data, encode->dataLen, (void **)ealPubKey, false); case CRYPT_PUBKEY_SUBKEY: return CRYPT_EAL_ParseAsn1SubPubkey(encode->data, encode->dataLen, (void **)ealPubKey, true); default: #ifdef HITLS_CRYPTO_RSA return ParseRsaPubkeyAsn1Buff(encode->data, encode->dataLen, NULL, ealPubKey, BSL_CID_UNKNOWN); #else return CRYPT_DECODE_NO_SUPPORT_TYPE; #endif } } #ifdef HITLS_BSL_PEM int32_t CRYPT_EAL_ParsePemPubKey(int32_t type, BSL_Buffer *encode, CRYPT_EAL_PkeyCtx **ealPubKey) { BSL_PEM_Symbol symbol = {0}; int32_t ret = EAL_GetPemPubKeySymbol(type, &symbol); if (ret != CRYPT_SUCCESS) { return ret; } BSL_Buffer asn1 = {0}; ret = BSL_PEM_DecodePemToAsn1((char **)&(encode->data), &(encode->dataLen), &symbol, &(asn1.data), &(asn1.dataLen)); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = CRYPT_EAL_ParseAsn1PubKey(type, &asn1, ealPubKey); BSL_SAL_Free(asn1.data); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_BSL_PEM int32_t CRYPT_EAL_ParseUnknownPubKey(int32_t type, BSL_Buffer *encode, CRYPT_EAL_PkeyCtx **ealPubKey) { #ifdef HITLS_BSL_PEM bool isPem = BSL_PEM_IsPemFormat((char *)(encode->data), encode->dataLen); if (isPem) { return CRYPT_EAL_ParsePemPubKey(type, encode, ealPubKey); } #endif return CRYPT_EAL_ParseAsn1PubKey(type, encode, ealPubKey); } int32_t CRYPT_EAL_PubKeyParseBuff(BSL_ParseFormat format, int32_t type, BSL_Buffer *encode, CRYPT_EAL_PkeyCtx **ealPubKey) { if (encode == NULL || encode->data == NULL || encode->dataLen == 0 || ealPubKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } switch (format) { case BSL_FORMAT_ASN1: return CRYPT_EAL_ParseAsn1PubKey(type, encode, ealPubKey); #ifdef HITLS_BSL_PEM case BSL_FORMAT_PEM: return CRYPT_EAL_ParsePemPubKey(type, encode, ealPubKey); #endif // HITLS_BSL_PEM case BSL_FORMAT_UNKNOWN: return CRYPT_EAL_ParseUnknownPubKey(type, encode, ealPubKey); default: return CRYPT_DECODE_NO_SUPPORT_FORMAT; } } int32_t CRYPT_EAL_UnKnownKeyParseBuff(BSL_ParseFormat format, const BSL_Buffer *pwd, BSL_Buffer *encode, CRYPT_EAL_PkeyCtx **ealPKey) { int32_t ret; for (int32_t type = CRYPT_PRIKEY_PKCS8_UNENCRYPT; type <= CRYPT_PRIKEY_ECC; type++) { ret = CRYPT_EAL_PriKeyParseBuff(format, type, encode, pwd, ealPKey); if (ret == CRYPT_SUCCESS) { return ret; } } for (int32_t type = CRYPT_PUBKEY_SUBKEY; type <= CRYPT_PUBKEY_SUBKEY_WITHOUT_SEQ; type++) { ret = CRYPT_EAL_PubKeyParseBuff(format, type, encode, ealPKey); if (ret == CRYPT_SUCCESS) { return ret; } } return CRYPT_DECODE_NO_SUPPORT_TYPE; } int32_t CRYPT_EAL_DecodeBuffKey(int32_t format, int32_t type, BSL_Buffer *encode, const uint8_t *pwd, uint32_t pwdlen, CRYPT_EAL_PkeyCtx **ealPKey) { BSL_Buffer pwdBuffer = {(uint8_t *)(uintptr_t)pwd, pwdlen}; switch (type) { case CRYPT_PRIKEY_PKCS8_UNENCRYPT: case CRYPT_PRIKEY_PKCS8_ENCRYPT: #ifdef HITLS_CRYPTO_ECDSA case CRYPT_PRIKEY_ECC: #endif #ifdef HITLS_CRYPTO_RSA case CRYPT_PRIKEY_RSA: #endif return CRYPT_EAL_PriKeyParseBuff(format, type, encode, &pwdBuffer, ealPKey); case CRYPT_PUBKEY_SUBKEY_WITHOUT_SEQ: case CRYPT_PUBKEY_SUBKEY: #ifdef HITLS_CRYPTO_RSA case CRYPT_PUBKEY_RSA: #endif return CRYPT_EAL_PubKeyParseBuff(format, type, encode, ealPKey); case CRYPT_ENCDEC_UNKNOW: return CRYPT_EAL_UnKnownKeyParseBuff(format, &pwdBuffer, encode, ealPKey); default: BSL_ERR_PUSH_ERROR(CRYPT_DECODE_NO_SUPPORT_TYPE); return CRYPT_DECODE_NO_SUPPORT_TYPE; } } #ifdef HITLS_BSL_SAL_FILE int32_t CRYPT_EAL_PriKeyParseFile(BSL_ParseFormat format, int32_t type, const char *path, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPriKey) { uint8_t *data = NULL; uint32_t dataLen = 0; int32_t ret = BSL_SAL_ReadFile(path, &data, &dataLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_Buffer encode = {data, dataLen}; ret = CRYPT_EAL_PriKeyParseBuff(format, type, &encode, pwd, ealPriKey); BSL_SAL_Free(data); return ret; } int32_t CRYPT_EAL_PubKeyParseFile(BSL_ParseFormat format, int32_t type, const char *path, CRYPT_EAL_PkeyCtx **ealPubKey) { uint8_t *data = NULL; uint32_t dataLen = 0; int32_t ret = BSL_SAL_ReadFile(path, &data, &dataLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_Buffer encode = {data, dataLen}; ret = CRYPT_EAL_PubKeyParseBuff(format, type, &encode, ealPubKey); BSL_SAL_Free(data); return ret; } int32_t CRYPT_EAL_UnKnownKeyParseFile(BSL_ParseFormat format, const char *path, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealKey) { uint8_t *data = NULL; uint32_t dataLen = 0; int32_t ret = BSL_SAL_ReadFile(path, &data, &dataLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_Buffer encode = {data, dataLen}; ret = CRYPT_EAL_UnKnownKeyParseBuff(format, pwd, &encode, ealKey); BSL_SAL_Free(data); return ret; } int32_t CRYPT_EAL_DecodeFileKey(int32_t format, int32_t type, const char *path, uint8_t *pwd, uint32_t pwdlen, CRYPT_EAL_PkeyCtx **ealPKey) { BSL_Buffer pwdBuffer = {(uint8_t *)pwd, pwdlen}; if (path == NULL || strlen(path) > PATH_MAX_LEN) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } switch (type) { case CRYPT_PRIKEY_PKCS8_UNENCRYPT: case CRYPT_PRIKEY_PKCS8_ENCRYPT: #ifdef HITLS_CRYPTO_RSA case CRYPT_PRIKEY_RSA: #endif #ifdef HITLS_CRYPTO_ECDSA case CRYPT_PRIKEY_ECC: #endif return CRYPT_EAL_PriKeyParseFile(format, type, path, &pwdBuffer, ealPKey); case CRYPT_PUBKEY_SUBKEY_WITHOUT_SEQ: case CRYPT_PUBKEY_SUBKEY: #ifdef HITLS_CRYPTO_RSA case CRYPT_PUBKEY_RSA: return CRYPT_EAL_PubKeyParseFile(format, type, path, ealPKey); #endif case CRYPT_ENCDEC_UNKNOW: return CRYPT_EAL_UnKnownKeyParseFile(format, path, &pwdBuffer, ealPKey); default: BSL_ERR_PUSH_ERROR(CRYPT_DECODE_NO_SUPPORT_TYPE); return CRYPT_DECODE_NO_SUPPORT_TYPE; } } #endif // HITLS_BSL_SAL_FILE #endif // HITLS_CRYPTO_KEY_DECODE int32_t CRYPT_EAL_GetEncodeType(const char *type) { if (type == NULL) { return CRYPT_ENCDEC_UNKNOW; } static const struct { const char *typeStr; int32_t typeInt; } TYPE_MAP[] = { {"PRIKEY_PKCS8_UNENCRYPT", CRYPT_PRIKEY_PKCS8_UNENCRYPT}, {"PRIKEY_PKCS8_ENCRYPT", CRYPT_PRIKEY_PKCS8_ENCRYPT}, {"PRIKEY_RSA", CRYPT_PRIKEY_RSA}, {"PRIKEY_ECC", CRYPT_PRIKEY_ECC}, {"PUBKEY_SUBKEY", CRYPT_PUBKEY_SUBKEY}, {"PUBKEY_RSA", CRYPT_PUBKEY_RSA}, {"PUBKEY_SUBKEY_WITHOUT_SEQ", CRYPT_PUBKEY_SUBKEY_WITHOUT_SEQ} }; for (size_t i = 0; i < sizeof(TYPE_MAP) / sizeof(TYPE_MAP[0]); i++) { if (strcmp(type, TYPE_MAP[i].typeStr) == 0) { return TYPE_MAP[i].typeInt; } } return CRYPT_ENCDEC_UNKNOW; } #ifdef HITLS_CRYPTO_KEY_ENCODE int32_t CRYPT_EAL_EncodeAsn1PriKey(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPriKey, const CRYPT_EncodeParam *encodeParam, int32_t type, BSL_Buffer *encode) { #ifndef HITLS_CRYPTO_KEY_EPKI (void)libCtx; (void)attrName; (void)encodeParam; #endif switch (type) { #ifdef HITLS_CRYPTO_ECDSA case CRYPT_PRIKEY_ECC: return EncodeEccPrikeyAsn1Buff(ealPriKey, NULL, encode); #endif #ifdef HITLS_CRYPTO_RSA case CRYPT_PRIKEY_RSA: return EncodeRsaPrikeyAsn1Buff(ealPriKey, CRYPT_PKEY_RSA, encode); #endif case CRYPT_PRIKEY_PKCS8_UNENCRYPT: return EncodePk8PriKeyBuff(ealPriKey, encode); #ifdef HITLS_CRYPTO_KEY_EPKI case CRYPT_PRIKEY_PKCS8_ENCRYPT: return EncodePk8EncPriKeyBuff(libCtx, attrName, ealPriKey, encodeParam, encode); #endif default: BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_NO_SUPPORT_FORMAT); return CRYPT_ENCODE_NO_SUPPORT_FORMAT; } } #ifdef HITLS_BSL_PEM int32_t CRYPT_EAL_EncodePemPriKey(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPriKey, const CRYPT_EncodeParam *encodeParam, int32_t type, BSL_Buffer *encode) { BSL_Buffer asn1 = {0}; int32_t ret = CRYPT_EAL_EncodeAsn1PriKey(libCtx, attrName, ealPriKey, encodeParam, type, &asn1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_PEM_Symbol symbol = {0}; ret = EAL_GetPemPriKeySymbol(type, &symbol); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(asn1.data); return ret; } ret = BSL_PEM_EncodeAsn1ToPem(asn1.data, asn1.dataLen, &symbol, (char **)&encode->data, &encode->dataLen); BSL_SAL_Free(asn1.data); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_BSL_PEM int32_t CRYPT_EAL_PriKeyEncodeBuff(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPriKey, const CRYPT_EncodeParam *encodeParam, BSL_ParseFormat format, int32_t type, BSL_Buffer *encode) { if (ealPriKey == NULL || encode == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } switch (format) { case BSL_FORMAT_ASN1: return CRYPT_EAL_EncodeAsn1PriKey(libCtx, attrName, ealPriKey, encodeParam, type, encode); #ifdef HITLS_BSL_PEM case BSL_FORMAT_PEM: return CRYPT_EAL_EncodePemPriKey(libCtx, attrName, ealPriKey, encodeParam, type, encode); #endif // HITLS_BSL_PEM default: BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_NO_SUPPORT_FORMAT); return CRYPT_ENCODE_NO_SUPPORT_FORMAT; } } int32_t CRYPT_EAL_PubKeyEncodeBuff(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ParseFormat format, int32_t type, BSL_Buffer *encode) { return CRYPT_EAL_EncodePubKeyBuffInternal(ealPubKey, format, type, true, encode); } static int32_t ProviderEncodeBuffKeyInternal(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPKey, const CRYPT_EncodeParam *encodeParam, int32_t format, int32_t type, BSL_Buffer *encode) { switch (type) { case CRYPT_PRIKEY_PKCS8_UNENCRYPT: case CRYPT_PRIKEY_PKCS8_ENCRYPT: #ifdef HITLS_CRYPTO_RSA case CRYPT_PRIKEY_RSA: #endif #ifdef HITLS_CRYPTO_ECDSA case CRYPT_PRIKEY_ECC: #endif return CRYPT_EAL_PriKeyEncodeBuff(libCtx, attrName, ealPKey, encodeParam, format, type, encode); case CRYPT_PUBKEY_SUBKEY: #ifdef HITLS_CRYPTO_RSA case CRYPT_PUBKEY_RSA: #endif return CRYPT_EAL_PubKeyEncodeBuff(ealPKey, format, type, encode); default: BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_NO_SUPPORT_TYPE); return CRYPT_ENCODE_NO_SUPPORT_TYPE; } } int32_t CRYPT_EAL_ProviderEncodeBuffKey(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPKey, const CRYPT_EncodeParam *encodeParam, const char *format, const char *type, BSL_Buffer *encode) { int32_t encodeType = CRYPT_EAL_GetEncodeType(type); int32_t encodeFormat = CRYPT_EAL_GetEncodeFormat(format); return ProviderEncodeBuffKeyInternal(libCtx, attrName, ealPKey, encodeParam, encodeFormat, encodeType, encode); } int32_t CRYPT_EAL_EncodeBuffKey(CRYPT_EAL_PkeyCtx *ealPKey, const CRYPT_EncodeParam *encodeParam, int32_t format, int32_t type, BSL_Buffer *encode) { return ProviderEncodeBuffKeyInternal(NULL, NULL, ealPKey, encodeParam, format, type, encode); } static int32_t CRYPT_EAL_EncodeAsn1PubKey(CRYPT_EAL_PkeyCtx *ealPubKey, int32_t type, bool isComplete, BSL_Buffer *encode) { switch (type) { case CRYPT_PUBKEY_SUBKEY: return CRYPT_EAL_EncodeAsn1SubPubkey(ealPubKey, isComplete, encode); #ifdef HITLS_CRYPTO_RSA case CRYPT_PUBKEY_RSA: return EncodeRsaPubkeyAsn1Buff(ealPubKey, NULL, encode); #endif default: BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_NO_SUPPORT_TYPE); return CRYPT_ENCODE_NO_SUPPORT_TYPE; } } #ifdef HITLS_BSL_PEM static int32_t CRYPT_EAL_EncodePemPubKey(CRYPT_EAL_PkeyCtx *ealPubKey, int32_t type, bool isComplete, BSL_Buffer *encode) { BSL_Buffer asn1 = {0}; int32_t ret = CRYPT_EAL_EncodeAsn1PubKey(ealPubKey, type, isComplete, &asn1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_PEM_Symbol symbol = {0}; ret = EAL_GetPemPubKeySymbol(type, &symbol); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(asn1.data); return ret; } ret = BSL_PEM_EncodeAsn1ToPem(asn1.data, asn1.dataLen, &symbol, (char **)&encode->data, &encode->dataLen); BSL_SAL_Free(asn1.data); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_BSL_PEM int32_t CRYPT_EAL_EncodePubKeyBuffInternal(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ParseFormat format, int32_t type, bool isComplete, BSL_Buffer *encode) { if (ealPubKey == NULL || encode == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } switch (format) { case BSL_FORMAT_ASN1: return CRYPT_EAL_EncodeAsn1PubKey(ealPubKey, type, isComplete, encode); #ifdef HITLS_BSL_PEM case BSL_FORMAT_PEM: return CRYPT_EAL_EncodePemPubKey(ealPubKey, type, isComplete, encode); #endif // HITLS_BSL_PEM default: BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_NO_SUPPORT_FORMAT); return CRYPT_ENCODE_NO_SUPPORT_FORMAT; } } #ifdef HITLS_BSL_SAL_FILE int32_t CRYPT_EAL_PriKeyEncodeFile(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPriKey, const CRYPT_EncodeParam *encodeParam, BSL_ParseFormat format, int32_t type, const char *path) { BSL_Buffer encode = {0}; int32_t ret = CRYPT_EAL_PriKeyEncodeBuff(libCtx, attrName, ealPriKey, encodeParam, format, type, &encode); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BSL_SAL_WriteFile(path, encode.data, encode.dataLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } BSL_SAL_Free(encode.data); return ret; } int32_t CRYPT_EAL_PubKeyEncodeFile(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ParseFormat format, int32_t type, const char *path) { BSL_Buffer encode = {0}; int32_t ret = CRYPT_EAL_PubKeyEncodeBuff(ealPubKey, format, type, &encode); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BSL_SAL_WriteFile(path, encode.data, encode.dataLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } BSL_SAL_FREE(encode.data); return ret; } static int32_t ProviderEncodeFileKeyInternal(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPKey, const CRYPT_EncodeParam *encodeParam, int32_t format, int32_t type, const char *path) { if (path == NULL || strlen(path) > PATH_MAX_LEN) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } switch (type) { case CRYPT_PRIKEY_PKCS8_UNENCRYPT: case CRYPT_PRIKEY_PKCS8_ENCRYPT: #ifdef HITLS_CRYPTO_RSA case CRYPT_PRIKEY_RSA: #endif #ifdef HITLS_CRYPTO_ECDSA case CRYPT_PRIKEY_ECC: #endif return CRYPT_EAL_PriKeyEncodeFile(libCtx, attrName, ealPKey, encodeParam, format, type, path); case CRYPT_PUBKEY_SUBKEY: #ifdef HITLS_CRYPTO_RSA case CRYPT_PUBKEY_RSA: #endif return CRYPT_EAL_PubKeyEncodeFile(ealPKey, format, type, path); default: BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_NO_SUPPORT_TYPE); return CRYPT_ENCODE_NO_SUPPORT_TYPE; } } int32_t CRYPT_EAL_ProviderEncodeFileKey(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPKey, const CRYPT_EncodeParam *encodeParam, const char *format, const char *type, const char *path) { int32_t encodeType = CRYPT_EAL_GetEncodeType(type); int32_t encodeFormat = CRYPT_EAL_GetEncodeFormat(format); return ProviderEncodeFileKeyInternal(libCtx, attrName, ealPKey, encodeParam, encodeFormat, encodeType, path); } int32_t CRYPT_EAL_EncodeFileKey(CRYPT_EAL_PkeyCtx *ealPKey, const CRYPT_EncodeParam *encodeParam, int32_t format, int32_t type, const char *path) { return ProviderEncodeFileKeyInternal(NULL, NULL, ealPKey, encodeParam, format, type, path); } #endif // HITLS_BSL_SAL_FILE #endif // HITLS_CRYPTO_KEY_ENCODE #endif // HITLS_CRYPTO_CODECSKEY
2401_83913325/openHiTLS-examples_7925
crypto/codecskey/src/crypt_encode_decode.c
C
unknown
23,492
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CODECSKEY #include "securec.h" #include "bsl_asn1_internal.h" #include "bsl_params.h" #include "bsl_err_internal.h" #include "bsl_obj_internal.h" #include "crypt_errno.h" #include "crypt_algid.h" #include "crypt_eal_kdf.h" #include "crypt_eal_rand.h" #include "crypt_eal_cipher.h" #include "crypt_params_key.h" #include "crypt_encode_decode_key.h" #include "crypt_encode_decode_local.h" #if defined(HITLS_CRYPTO_KEY_EPKI) && defined(HITLS_CRYPTO_KEY_ENCODE) /** * EncryptedPrivateKeyInfo ::= SEQUENCE { * encryptionAlgorithm EncryptionAlgorithmIdentifier, * encryptedData EncryptedData } * * https://datatracker.ietf.org/doc/html/rfc5208#autoid-6 */ static BSL_ASN1_TemplateItem g_pk8EncPriKeyTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 1}, // EncryptionAlgorithmIdentifier {BSL_ASN1_TAG_OBJECT_ID, 0, 2}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 2}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_HEADERONLY, 3}, // derivation param {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 3}, // enc scheme {BSL_ASN1_TAG_OBJECT_ID, 0, 4}, // alg {BSL_ASN1_TAG_OCTETSTRING, 0, 4}, // iv {BSL_ASN1_TAG_OCTETSTRING, 0, 1}, // EncryptedData }; #endif // HITLS_CRYPTO_KEY_EPKI && HITLS_CRYPTO_KEY_ENCODE #if defined(HITLS_CRYPTO_RSA) && (defined(HITLS_CRYPTO_KEY_ENCODE) || defined(HITLS_CRYPTO_KEY_INFO)) int32_t CRYPT_EAL_GetRsaPssPara(CRYPT_EAL_PkeyCtx *ealPriKey, CRYPT_RSA_PssPara *rsaPssParam) { int32_t ret; ret = CRYPT_EAL_PkeyCtrl(ealPriKey, CRYPT_CTRL_GET_RSA_SALTLEN, &rsaPssParam->saltLen, sizeof(rsaPssParam->saltLen)); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = CRYPT_EAL_PkeyCtrl(ealPriKey, CRYPT_CTRL_GET_RSA_MD, &rsaPssParam->mdId, sizeof(rsaPssParam->mdId)); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = CRYPT_EAL_PkeyCtrl(ealPriKey, CRYPT_CTRL_GET_RSA_MGF, &rsaPssParam->mgfId, sizeof(rsaPssParam->mgfId)); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #ifdef HITLS_CRYPTO_KEY_ENCODE int32_t CRYPT_EAL_InitRsaPrv(const CRYPT_EAL_PkeyCtx *ealPriKey, CRYPT_PKEY_AlgId cid, CRYPT_EAL_PkeyPrv *rsaPrv) { uint32_t bnLen = CRYPT_EAL_PkeyGetKeyLen(ealPriKey); if (bnLen == 0) { return CRYPT_EAL_ALG_NOT_SUPPORT; } uint8_t *pri = (uint8_t *)BSL_SAL_Malloc(bnLen * 8); // 8 items if (pri == NULL) { return CRYPT_MEM_ALLOC_FAIL; } rsaPrv->id = cid; rsaPrv->key.rsaPrv.d = pri; rsaPrv->key.rsaPrv.n = pri + bnLen; rsaPrv->key.rsaPrv.p = pri + bnLen * 2; // 2nd buffer rsaPrv->key.rsaPrv.q = pri + bnLen * 3; // 3rd buffer rsaPrv->key.rsaPrv.dP = pri + bnLen * 4; // 4th buffer rsaPrv->key.rsaPrv.dQ = pri + bnLen * 5; // 5th buffer rsaPrv->key.rsaPrv.qInv = pri + bnLen * 6; // 6th buffer rsaPrv->key.rsaPrv.e = pri + bnLen * 7; // 7th buffer rsaPrv->key.rsaPrv.dLen = bnLen; rsaPrv->key.rsaPrv.nLen = bnLen; rsaPrv->key.rsaPrv.pLen = bnLen; rsaPrv->key.rsaPrv.qLen = bnLen; rsaPrv->key.rsaPrv.dPLen = bnLen; rsaPrv->key.rsaPrv.dQLen = bnLen; rsaPrv->key.rsaPrv.qInvLen = bnLen; rsaPrv->key.rsaPrv.eLen = bnLen; return CRYPT_SUCCESS; } void CRYPT_EAL_DeinitRsaPrv(CRYPT_EAL_PkeyPrv *rsaPrv) { BSL_SAL_ClearFree(rsaPrv->key.rsaPrv.d, rsaPrv->key.rsaPrv.dLen * 8); // 8 items } #endif // HITLS_CRYPTO_KEY_ENCODE #endif // HITLS_CRYPTO_RSA #ifdef HITLS_CRYPTO_KEY_DECODE #ifdef HITLS_CRYPTO_RSA static int32_t ProcRsaPssParam(BSL_ASN1_Buffer *rsaPssParam, CRYPT_EAL_PkeyCtx *ealPriKey) { CRYPT_RsaPadType padType = CRYPT_EMSA_PSS; int32_t ret = CRYPT_EAL_PkeyCtrl(ealPriKey, CRYPT_CTRL_SET_RSA_PADDING, &padType, sizeof(CRYPT_RsaPadType)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (rsaPssParam == NULL || rsaPssParam->buff == NULL) { return CRYPT_SUCCESS; } CRYPT_RSA_PssPara para = {0}; ret = CRYPT_EAL_ParseRsaPssAlgParam(rsaPssParam, &para); if (ret != CRYPT_SUCCESS) { return ret; } BSL_Param param[4] = { {CRYPT_PARAM_RSA_MD_ID, BSL_PARAM_TYPE_INT32, &para.mdId, sizeof(para.mdId), 0}, {CRYPT_PARAM_RSA_MGF1_ID, BSL_PARAM_TYPE_INT32, &para.mgfId, sizeof(para.mgfId), 0}, {CRYPT_PARAM_RSA_SALTLEN, BSL_PARAM_TYPE_INT32, &para.saltLen, sizeof(para.saltLen), 0}, BSL_PARAM_END}; return CRYPT_EAL_PkeyCtrl(ealPriKey, CRYPT_CTRL_SET_RSA_EMSA_PSS, param, 0); } static int32_t SetRsaPubKey(const BSL_ASN1_Buffer *n, const BSL_ASN1_Buffer *e, CRYPT_EAL_PkeyCtx *ealPkey) { CRYPT_EAL_PkeyPub rsaPub = { .id = CRYPT_PKEY_RSA, .key.rsaPub = {.n = n->buff, .nLen = n->len, .e = e->buff, .eLen = e->len}}; return CRYPT_EAL_PkeySetPub(ealPkey, &rsaPub); } int32_t ParseRsaPubkeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *param, CRYPT_EAL_PkeyCtx **ealPubKey, BslCid cid) { // decode n and e BSL_ASN1_Buffer pubAsn1[CRYPT_RSA_PUB_E_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_RsaPubkeyAsn1Buff(buff, buffLen, pubAsn1, CRYPT_RSA_PUB_E_IDX + 1); if (ret != CRYPT_SUCCESS) { return ret; } CRYPT_EAL_PkeyCtx *pctx = CRYPT_EAL_PkeyNewCtx(CRYPT_PKEY_RSA); if (pctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ret = SetRsaPubKey(pubAsn1 + CRYPT_RSA_PUB_N_IDX, pubAsn1 + CRYPT_RSA_PUB_E_IDX, pctx); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } if (cid != BSL_CID_RSASSAPSS) { *ealPubKey = pctx; return CRYPT_SUCCESS; } ret = ProcRsaPssParam(param, pctx); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } *ealPubKey = pctx; return ret; } static int32_t ProcEalRsaPrivKey(const BSL_ASN1_Buffer *asn1, CRYPT_EAL_PkeyCtx *ealPkey) { CRYPT_EAL_PkeyPrv rsaPrv = {0}; rsaPrv.id = CRYPT_PKEY_RSA; rsaPrv.key.rsaPrv.d = asn1[CRYPT_RSA_PRV_D_IDX].buff; rsaPrv.key.rsaPrv.dLen = asn1[CRYPT_RSA_PRV_D_IDX].len; rsaPrv.key.rsaPrv.n = asn1[CRYPT_RSA_PRV_N_IDX].buff; rsaPrv.key.rsaPrv.nLen = asn1[CRYPT_RSA_PRV_N_IDX].len; rsaPrv.key.rsaPrv.e = asn1[CRYPT_RSA_PRV_E_IDX].buff; rsaPrv.key.rsaPrv.eLen = asn1[CRYPT_RSA_PRV_E_IDX].len; rsaPrv.key.rsaPrv.p = asn1[CRYPT_RSA_PRV_P_IDX].buff; rsaPrv.key.rsaPrv.pLen = asn1[CRYPT_RSA_PRV_P_IDX].len; rsaPrv.key.rsaPrv.q = asn1[CRYPT_RSA_PRV_Q_IDX].buff; rsaPrv.key.rsaPrv.qLen = asn1[CRYPT_RSA_PRV_Q_IDX].len; rsaPrv.key.rsaPrv.dP = asn1[CRYPT_RSA_PRV_DP_IDX].buff; rsaPrv.key.rsaPrv.dPLen = asn1[CRYPT_RSA_PRV_DP_IDX].len; rsaPrv.key.rsaPrv.dQ = asn1[CRYPT_RSA_PRV_DQ_IDX].buff; rsaPrv.key.rsaPrv.dQLen = asn1[CRYPT_RSA_PRV_DQ_IDX].len; rsaPrv.key.rsaPrv.qInv = asn1[CRYPT_RSA_PRV_QINV_IDX].buff; rsaPrv.key.rsaPrv.qInvLen = asn1[CRYPT_RSA_PRV_QINV_IDX].len; return CRYPT_EAL_PkeySetPrv(ealPkey, &rsaPrv); } static int32_t ProcEalRsaKeyPair(uint8_t *buff, uint32_t buffLen, CRYPT_EAL_PkeyCtx *ealPkey) { // decode n and e BSL_ASN1_Buffer asn1[CRYPT_RSA_PRV_OTHER_PRIME_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_RsaPrikeyAsn1Buff(buff, buffLen, asn1, CRYPT_RSA_PRV_OTHER_PRIME_IDX + 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = ProcEalRsaPrivKey(asn1, ealPkey); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return SetRsaPubKey(asn1 + CRYPT_RSA_PRV_N_IDX, asn1 + CRYPT_RSA_PRV_E_IDX, ealPkey); } int32_t ParseRsaPrikeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *rsaPssParam, BslCid cid, CRYPT_EAL_PkeyCtx **ealPriKey) { CRYPT_EAL_PkeyCtx *pctx = CRYPT_EAL_PkeyNewCtx(CRYPT_PKEY_RSA); if (pctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = ProcEalRsaKeyPair(buff, buffLen, pctx); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } if (cid != BSL_CID_RSASSAPSS) { *ealPriKey = pctx; return CRYPT_SUCCESS; } ret = ProcRsaPssParam(rsaPssParam, pctx); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); return ret; } *ealPriKey = pctx; return ret; } #endif #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) static int32_t EccEalKeyNew(BSL_ASN1_Buffer *ecParamOid, int32_t *alg, CRYPT_EAL_PkeyCtx **ealKey) { int32_t algId; BslOidString oidStr = {ecParamOid->len, (char *)ecParamOid->buff, 0}; CRYPT_PKEY_ParaId paraId = (CRYPT_PKEY_ParaId)BSL_OBJ_GetCID(&oidStr); if (paraId == CRYPT_ECC_SM2) { algId = CRYPT_PKEY_SM2; } else if (IsEcdsaEcParaId(paraId)) { algId = CRYPT_PKEY_ECDSA; } else { // scenario ecdh is not considered, and it will be improved in the future return CRYPT_DECODE_UNKNOWN_OID; } CRYPT_EAL_PkeyCtx *key = CRYPT_EAL_PkeyNewCtx(algId); if (key == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } #ifdef HITLS_CRYPTO_ECDSA if (paraId != CRYPT_ECC_SM2) { int32_t ret = CRYPT_EAL_PkeySetParaById(key, paraId); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(key); BSL_ERR_PUSH_ERROR(ret); return ret; } } #endif *ealKey = key; *alg = algId; return CRYPT_SUCCESS; } static int32_t ParseEccPubkeyAsn1Buff(BSL_ASN1_BitString *bitPubkey, BSL_ASN1_Buffer *ecParamOid, CRYPT_EAL_PkeyCtx **ealPubKey) { int32_t algId; CRYPT_EAL_PkeyCtx *pctx = NULL; int32_t ret = EccEalKeyNew(ecParamOid, &algId, &pctx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } CRYPT_EAL_PkeyPub pub = {.id = algId, .key.eccPub = {.data = bitPubkey->buff, .len = bitPubkey->len}}; ret = CRYPT_EAL_PkeySetPub(pctx, &pub); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } *ealPubKey = pctx; return ret; } static int32_t ParseEccPrikeyAsn1(BSL_ASN1_Buffer *encode, BSL_ASN1_Buffer *pk8AlgoParam, CRYPT_EAL_PkeyCtx **ealPriKey) { BSL_ASN1_Buffer *prikey = &encode[CRYPT_ECPRIKEY_PRIKEY_IDX]; // the ECC OID BSL_ASN1_Buffer *ecParamOid = &encode[CRYPT_ECPRIKEY_PARAM_IDX]; // the parameters OID BSL_ASN1_Buffer *pubkey = &encode[CRYPT_ECPRIKEY_PUBKEY_IDX]; // the ECC OID BSL_ASN1_Buffer *param = pk8AlgoParam; if (ecParamOid->len != 0) { // has a valid Algorithm param param = ecParamOid; } else { if (param == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (param->len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS8_INVALID_ALGO_PARAM); return CRYPT_DECODE_PKCS8_INVALID_ALGO_PARAM; } } if (pubkey->len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ASN1_BUFF_FAILED); return CRYPT_DECODE_ASN1_BUFF_FAILED; } int32_t algId; CRYPT_EAL_PkeyCtx *pctx = NULL; int32_t ret = EccEalKeyNew(param, &algId, &pctx); // Changed ecParamOid to param if (ret != CRYPT_SUCCESS) { return ret; } CRYPT_EAL_PkeyPrv prv = {.id = algId, .key.eccPrv = {.data = prikey->buff, .len = prikey->len}}; ret = CRYPT_EAL_PkeySetPrv(pctx, &prv); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } // the tag of public key is BSL_ASN1_TAG_BITSTRING, 1 denote unusedBits CRYPT_EAL_PkeyPub pub = {.id = algId, .key.eccPub = {.data = pubkey->buff + 1, .len = pubkey->len - 1}}; ret = CRYPT_EAL_PkeySetPub(pctx, &pub); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } *ealPriKey = pctx; return ret; } int32_t ParseEccPrikeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *pk8AlgoParam, CRYPT_EAL_PkeyCtx **ealPriKey) { BSL_ASN1_Buffer asn1[CRYPT_ECPRIKEY_PUBKEY_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_PrikeyAsn1Buff(buff, buffLen, asn1, CRYPT_ECPRIKEY_PUBKEY_IDX + 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return ParseEccPrikeyAsn1(asn1, pk8AlgoParam, ealPriKey); } #endif // HITLS_CRYPTO_ECDSA || HITLS_CRYPTO_SM2 #ifdef HITLS_CRYPTO_ED25519 static int32_t ParseEd25519PrikeyAsn1Buff(uint8_t *buff, uint32_t buffLen, CRYPT_EAL_PkeyCtx **ealPriKey) { uint8_t *tmpBuff = buff; uint32_t tmpBuffLen = buffLen; int32_t ret = BSL_ASN1_DecodeTagLen(BSL_ASN1_TAG_OCTETSTRING, &tmpBuff, &tmpBuffLen, &tmpBuffLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } CRYPT_EAL_PkeyCtx *pctx = CRYPT_EAL_PkeyNewCtx(CRYPT_PKEY_ED25519); if (pctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } CRYPT_EAL_PkeyPrv prv = {.id = CRYPT_PKEY_ED25519, .key.curve25519Prv = {.data = tmpBuff, .len = tmpBuffLen}}; ret = CRYPT_EAL_PkeySetPrv(pctx, &prv); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } *ealPriKey = pctx; return CRYPT_SUCCESS; } static int32_t ParseEd25519PubkeyAsn1Buff(uint8_t *buff, uint32_t buffLen, CRYPT_EAL_PkeyCtx **ealPubKey) { CRYPT_EAL_PkeyCtx *pctx = CRYPT_EAL_PkeyNewCtx(CRYPT_PKEY_ED25519); if (pctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } CRYPT_EAL_PkeyPub pub = {.id = CRYPT_PKEY_ED25519, .key.curve25519Pub = {.data = buff, .len = buffLen}}; int32_t ret = CRYPT_EAL_PkeySetPub(pctx, &pub); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_PkeyFreeCtx(pctx); BSL_ERR_PUSH_ERROR(ret); return ret; } *ealPubKey = pctx; return ret; } #endif // HITLS_CRYPTO_ED25519 static int32_t ParsePk8PrikeyAsn1(CRYPT_ENCODE_DECODE_Pk8PrikeyInfo *pk8PrikeyInfo, CRYPT_EAL_PkeyCtx **ealPriKey) { #ifdef HITLS_CRYPTO_RSA if (pk8PrikeyInfo->keyType == BSL_CID_RSA || pk8PrikeyInfo->keyType == BSL_CID_RSASSAPSS) { return ParseRsaPrikeyAsn1Buff(pk8PrikeyInfo->pkeyRawKey, pk8PrikeyInfo->pkeyRawKeyLen, &pk8PrikeyInfo->keyParam, pk8PrikeyInfo->keyType, ealPriKey); } #endif #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) if (pk8PrikeyInfo->keyType == BSL_CID_EC_PUBLICKEY) { return ParseEccPrikeyAsn1Buff(pk8PrikeyInfo->pkeyRawKey, pk8PrikeyInfo->pkeyRawKeyLen, &pk8PrikeyInfo->keyParam, ealPriKey); } #endif #ifdef HITLS_CRYPTO_ED25519 if (pk8PrikeyInfo->keyType == BSL_CID_ED25519) { return ParseEd25519PrikeyAsn1Buff(pk8PrikeyInfo->pkeyRawKey, pk8PrikeyInfo->pkeyRawKeyLen, ealPriKey); } #endif return CRYPT_DECODE_UNSUPPORTED_PKCS8_TYPE; } int32_t ParseSubPubkeyAsn1(BSL_ASN1_Buffer *encode, CRYPT_EAL_PkeyCtx **ealPubKey) { uint8_t *algoBuff = encode->buff; // AlgorithmIdentifier Tag and Len, 2 bytes. uint32_t algoBuffLen = encode->len; BSL_ASN1_Buffer algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_AlgoIdAsn1Buff(algoBuff, algoBuffLen, NULL, algoId, BSL_ASN1_TAG_ALGOID_ANY_IDX + 1); if (ret != CRYPT_SUCCESS) { return ret; } BSL_ASN1_Buffer *oid = algoId; // OID BSL_ASN1_Buffer *algParam = algoId + 1; // the parameters BSL_ASN1_Buffer *pubkey = &encode[CRYPT_SUBKEYINFO_BITSTRING_IDX]; // the last BSL_ASN1_Buffer, the pubkey BSL_ASN1_BitString bitPubkey = {0}; ret = BSL_ASN1_DecodePrimitiveItem(pubkey, &bitPubkey); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BslOidString oidStr = {oid->len, (char *)oid->buff, 0}; BslCid cid = BSL_OBJ_GetCID(&oidStr); #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) if (cid == BSL_CID_EC_PUBLICKEY || cid == BSL_CID_SM2PRIME256) { return ParseEccPubkeyAsn1Buff(&bitPubkey, algParam, ealPubKey); } #endif #ifdef HITLS_CRYPTO_RSA if (cid == BSL_CID_RSA || cid == BSL_CID_RSASSAPSS) { return ParseRsaPubkeyAsn1Buff(bitPubkey.buff, bitPubkey.len, algParam, ealPubKey, cid); } #endif #ifdef HITLS_CRYPTO_ED25519 (void)algParam; if (cid == BSL_CID_ED25519) { return ParseEd25519PubkeyAsn1Buff(bitPubkey.buff, bitPubkey.len, ealPubKey); } #endif BSL_ERR_PUSH_ERROR(CRYPT_DECODE_UNKNOWN_OID); return CRYPT_DECODE_UNKNOWN_OID; } int32_t ParsePk8PriKeyBuff(BSL_Buffer *buff, CRYPT_EAL_PkeyCtx **ealPriKey) { uint8_t *tmpBuff = buff->data; uint32_t tmpBuffLen = buff->dataLen; CRYPT_ENCODE_DECODE_Pk8PrikeyInfo pk8PrikeyInfo = {0}; int32_t ret = CRYPT_DECODE_Pkcs8Info(tmpBuff, tmpBuffLen, NULL, &pk8PrikeyInfo); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return ParsePk8PrikeyAsn1(&pk8PrikeyInfo, ealPriKey); } #ifdef HITLS_CRYPTO_KEY_EPKI int32_t ParsePk8EncPriKeyBuff(BSL_Buffer *buff, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPriKey) { BSL_Buffer decode = {0}; int32_t ret = CRYPT_DECODE_Pkcs8PrvDecrypt(NULL, NULL, buff, pwd, NULL, &decode); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = ParsePk8PriKeyBuff(&decode, ealPriKey); BSL_SAL_ClearFree(decode.data, decode.dataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif int32_t CRYPT_EAL_ParseAsn1SubPubkey(uint8_t *buff, uint32_t buffLen, void **ealPubKey, bool isComplete) { // decode sub pubkey info BSL_ASN1_Buffer pubAsn1[CRYPT_SUBKEYINFO_BITSTRING_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_ParseSubKeyInfo(buff, buffLen, pubAsn1, isComplete); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return ParseSubPubkeyAsn1(pubAsn1, (CRYPT_EAL_PkeyCtx **)ealPubKey); } #endif // HITLS_CRYPTO_KEY_DECODE #ifdef HITLS_CRYPTO_KEY_ENCODE #ifdef HITLS_CRYPTO_RSA static int32_t EncodePssParam(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ASN1_Buffer *pssParam) { if (pssParam == NULL) { return CRYPT_SUCCESS; } int32_t padType = 0; int32_t ret = CRYPT_EAL_PkeyCtrl(ealPubKey, CRYPT_CTRL_GET_RSA_PADDING, &padType, sizeof(padType)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (padType != CRYPT_EMSA_PSS) { pssParam->tag = BSL_ASN1_TAG_NULL; return CRYPT_SUCCESS; } CRYPT_RSA_PssPara rsaPssParam = {0}; ret = CRYPT_EAL_GetRsaPssPara(ealPubKey, &rsaPssParam); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pssParam->tag = BSL_ASN1_TAG_SEQUENCE | BSL_ASN1_TAG_CONSTRUCTED; return CRYPT_EAL_EncodeRsaPssAlgParam(&rsaPssParam, &pssParam->buff, &pssParam->len); } int32_t EncodeRsaPubkeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ASN1_Buffer *pssParam, BSL_Buffer *encodePub) { uint32_t bnLen = CRYPT_EAL_PkeyGetKeyLen(ealPubKey); if (bnLen == 0) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } CRYPT_EAL_PkeyPub pub = {0}; pub.id = CRYPT_PKEY_RSA; pub.key.rsaPub.n = (uint8_t *)BSL_SAL_Malloc(bnLen); if (pub.key.rsaPub.n == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } pub.key.rsaPub.e = (uint8_t *)BSL_SAL_Malloc(bnLen); if (pub.key.rsaPub.e == NULL) { BSL_SAL_FREE(pub.key.rsaPub.n); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } pub.key.rsaPub.nLen = bnLen; pub.key.rsaPub.eLen = bnLen; int32_t ret = CRYPT_EAL_PkeyGetPub(ealPubKey, &pub); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(pub.key.rsaPub.n); BSL_SAL_FREE(pub.key.rsaPub.e); BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_ASN1_Buffer pubAsn1[CRYPT_RSA_PUB_E_IDX + 1] = { {BSL_ASN1_TAG_INTEGER, pub.key.rsaPub.nLen, pub.key.rsaPub.n}, {BSL_ASN1_TAG_INTEGER, pub.key.rsaPub.eLen, pub.key.rsaPub.e}, }; ret = CRYPT_ENCODE_RsaPubkeyAsn1Buff(pubAsn1, encodePub); BSL_SAL_FREE(pub.key.rsaPub.n); BSL_SAL_FREE(pub.key.rsaPub.e); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = EncodePssParam(ealPubKey, pssParam); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(encodePub->data); BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t EncodeRsaPrvKey(CRYPT_EAL_PkeyCtx *ealPriKey, BSL_ASN1_Buffer *pk8AlgoParam, BSL_Buffer *bitStr, CRYPT_PKEY_AlgId *cid) { CRYPT_RsaPadType pad = CRYPT_RSA_PADDINGMAX; int32_t ret = CRYPT_EAL_PkeyCtrl(ealPriKey, CRYPT_CTRL_GET_RSA_PADDING, &pad, sizeof(pad)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } CRYPT_RSA_PssPara rsaPssParam = {0}; BSL_Buffer tmp = {0}; switch (pad) { case CRYPT_EMSA_PSS: ret = CRYPT_EAL_GetRsaPssPara(ealPriKey, &rsaPssParam); if (ret != BSL_SUCCESS) { return ret; } ret = EncodeRsaPrikeyAsn1Buff(ealPriKey, CRYPT_PKEY_RSA, &tmp); if (ret != BSL_SUCCESS) { return ret; } ret = CRYPT_EAL_EncodeRsaPssAlgParam(&rsaPssParam, &pk8AlgoParam->buff, &pk8AlgoParam->len); if (ret != BSL_SUCCESS) { BSL_SAL_ClearFree(tmp.data, tmp.dataLen); BSL_ERR_PUSH_ERROR(ret); return ret; } pk8AlgoParam->tag = BSL_ASN1_TAG_SEQUENCE | BSL_ASN1_TAG_CONSTRUCTED; *cid = (CRYPT_PKEY_AlgId)BSL_CID_RSASSAPSS; break; default: ret = EncodeRsaPrikeyAsn1Buff(ealPriKey, CRYPT_PKEY_RSA, &tmp); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pk8AlgoParam->tag = BSL_ASN1_TAG_NULL; break; } bitStr->data = tmp.data; bitStr->dataLen = tmp.dataLen; return CRYPT_SUCCESS; } static void SetRsaPrv2Arr(const CRYPT_EAL_PkeyPrv *rsaPrv, BSL_ASN1_Buffer *asn1) { asn1[CRYPT_RSA_PRV_D_IDX].buff = rsaPrv->key.rsaPrv.d; asn1[CRYPT_RSA_PRV_D_IDX].len = rsaPrv->key.rsaPrv.dLen; asn1[CRYPT_RSA_PRV_N_IDX].buff = rsaPrv->key.rsaPrv.n; asn1[CRYPT_RSA_PRV_N_IDX].len = rsaPrv->key.rsaPrv.nLen; asn1[CRYPT_RSA_PRV_E_IDX].buff = rsaPrv->key.rsaPrv.e; asn1[CRYPT_RSA_PRV_E_IDX].len = rsaPrv->key.rsaPrv.eLen; asn1[CRYPT_RSA_PRV_P_IDX].buff = rsaPrv->key.rsaPrv.p; asn1[CRYPT_RSA_PRV_P_IDX].len = rsaPrv->key.rsaPrv.pLen; asn1[CRYPT_RSA_PRV_Q_IDX].buff = rsaPrv->key.rsaPrv.q; asn1[CRYPT_RSA_PRV_Q_IDX].len = rsaPrv->key.rsaPrv.qLen; asn1[CRYPT_RSA_PRV_DP_IDX].buff = rsaPrv->key.rsaPrv.dP; asn1[CRYPT_RSA_PRV_DP_IDX].len = rsaPrv->key.rsaPrv.dPLen; asn1[CRYPT_RSA_PRV_DQ_IDX].buff = rsaPrv->key.rsaPrv.dQ; asn1[CRYPT_RSA_PRV_DQ_IDX].len = rsaPrv->key.rsaPrv.dQLen; asn1[CRYPT_RSA_PRV_QINV_IDX].buff = rsaPrv->key.rsaPrv.qInv; asn1[CRYPT_RSA_PRV_QINV_IDX].len = rsaPrv->key.rsaPrv.qInvLen; asn1[CRYPT_RSA_PRV_D_IDX].tag = BSL_ASN1_TAG_INTEGER; asn1[CRYPT_RSA_PRV_N_IDX].tag = BSL_ASN1_TAG_INTEGER; asn1[CRYPT_RSA_PRV_E_IDX].tag = BSL_ASN1_TAG_INTEGER; asn1[CRYPT_RSA_PRV_P_IDX].tag = BSL_ASN1_TAG_INTEGER; asn1[CRYPT_RSA_PRV_Q_IDX].tag = BSL_ASN1_TAG_INTEGER; asn1[CRYPT_RSA_PRV_DP_IDX].tag = BSL_ASN1_TAG_INTEGER; asn1[CRYPT_RSA_PRV_DQ_IDX].tag = BSL_ASN1_TAG_INTEGER; asn1[CRYPT_RSA_PRV_QINV_IDX].tag = BSL_ASN1_TAG_INTEGER; } int32_t EncodeRsaPrikeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPriKey, CRYPT_PKEY_AlgId cid, BSL_Buffer *encode) { int32_t ret; BSL_ASN1_Buffer asn1[CRYPT_RSA_PRV_OTHER_PRIME_IDX + 1] = {0}; CRYPT_EAL_PkeyPrv rsaPrv = {0}; ret = CRYPT_EAL_InitRsaPrv(ealPriKey, cid, &rsaPrv); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = CRYPT_EAL_PkeyGetPrv(ealPriKey, &rsaPrv); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_DeinitRsaPrv(&rsaPrv); BSL_ERR_PUSH_ERROR(ret); return ret; } SetRsaPrv2Arr(&rsaPrv, asn1); uint8_t version = 0; asn1[CRYPT_RSA_PRV_VERSION_IDX].buff = (uint8_t *)&version; asn1[CRYPT_RSA_PRV_VERSION_IDX].len = sizeof(version); asn1[CRYPT_RSA_PRV_VERSION_IDX].tag = BSL_ASN1_TAG_INTEGER; ret = CRYPT_ENCODE_RsaPrikeyAsn1Buff(asn1, CRYPT_RSA_PRV_OTHER_PRIME_IDX + 1, encode); CRYPT_EAL_DeinitRsaPrv(&rsaPrv); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) static inline void SetAsn1Buffer(BSL_ASN1_Buffer *asn, uint8_t tag, uint32_t len, uint8_t *buff) { asn->tag = tag; asn->len = len; asn->buff = buff; } static int32_t EncodeEccKeyPair(CRYPT_EAL_PkeyCtx *ealPriKey, CRYPT_PKEY_AlgId cid, BSL_ASN1_Buffer *asn1, BSL_Buffer *encode) { int32_t ret; uint32_t keyLen = CRYPT_EAL_PkeyGetKeyLen(ealPriKey); if (keyLen == 0) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } uint8_t *pri = (uint8_t *)BSL_SAL_Malloc(keyLen); if (pri == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } CRYPT_EAL_PkeyPrv prv = {.id = cid, .key.eccPrv = {.data = pri, .len = keyLen}}; uint8_t *pub = NULL; do { ret = CRYPT_EAL_PkeyGetPrv(ealPriKey, &prv); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } SetAsn1Buffer(asn1 + CRYPT_ECPRIKEY_PRIKEY_IDX, BSL_ASN1_TAG_OCTETSTRING, prv.key.eccPrv.len, prv.key.eccPrv.data); pub = (uint8_t *)BSL_SAL_Malloc(keyLen); if (pub == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); break; } CRYPT_EAL_PkeyPub pubKey = {.id = cid, .key.eccPub = {.data = pub, .len = keyLen}}; ret = CRYPT_EAL_PkeyCtrl(ealPriKey, CRYPT_CTRL_GEN_ECC_PUBLICKEY, NULL, 0); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } ret = CRYPT_EAL_PkeyGetPub(ealPriKey, &pubKey); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } BSL_ASN1_BitString bitStr = {pubKey.key.eccPub.data, pubKey.key.eccPub.len, 0}; SetAsn1Buffer(asn1 + CRYPT_ECPRIKEY_PUBKEY_IDX, BSL_ASN1_TAG_BITSTRING, sizeof(BSL_ASN1_BitString), (uint8_t *)&bitStr); ret = CRYPT_ENCODE_EccPrikeyAsn1Buff(asn1, CRYPT_ECPRIKEY_PUBKEY_IDX + 1, encode); } while (0); BSL_SAL_ClearFree(pri, keyLen); BSL_SAL_FREE(pub); return ret; } int32_t EncodeEccPrikeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPriKey, BSL_ASN1_Buffer *pk8AlgoParam, BSL_Buffer *encode) { uint8_t version = 1; BSL_ASN1_Buffer asn1[CRYPT_ECPRIKEY_PUBKEY_IDX + 1] = { {BSL_ASN1_TAG_INTEGER, sizeof(version), &version}, {0}, {0}, {0}}; CRYPT_PKEY_AlgId cid = CRYPT_EAL_PkeyGetId(ealPriKey); BslOidString *oid = cid == CRYPT_PKEY_SM2 ? BSL_OBJ_GetOID((BslCid)CRYPT_ECC_SM2) : BSL_OBJ_GetOID((BslCid)CRYPT_EAL_PkeyGetParaId(ealPriKey)); if (oid == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } if (pk8AlgoParam != NULL) { // pkcs8 pk8AlgoParam->buff = (uint8_t *)oid->octs; pk8AlgoParam->len = oid->octetLen; pk8AlgoParam->tag = BSL_ASN1_TAG_OBJECT_ID; } else { // pkcs1 asn1[CRYPT_ECPRIKEY_PARAM_IDX].buff = (uint8_t *)oid->octs; asn1[CRYPT_ECPRIKEY_PARAM_IDX].len = oid->octetLen; asn1[CRYPT_ECPRIKEY_PARAM_IDX].tag = BSL_ASN1_TAG_OBJECT_ID; } return EncodeEccKeyPair(ealPriKey, cid, asn1, encode); } static int32_t EncodeEccPubkeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ASN1_Buffer *ecParamOid, BSL_Buffer *encodePub) { int32_t ret; CRYPT_PKEY_ParaId paraId = CRYPT_EAL_PkeyGetParaId(ealPubKey); BslOidString *oid = BSL_OBJ_GetOID((BslCid)paraId); if (CRYPT_EAL_PkeyGetId(ealPubKey) == CRYPT_PKEY_SM2) { oid = BSL_OBJ_GetOID((BslCid)CRYPT_ECC_SM2); } if (oid == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } ecParamOid->buff = (uint8_t *)oid->octs; ecParamOid->len = oid->octetLen; ecParamOid->tag = BSL_ASN1_TAG_OBJECT_ID; uint32_t pubLen = CRYPT_EAL_PkeyGetKeyLen(ealPubKey); if (pubLen == 0) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } uint8_t *pub = (uint8_t *)BSL_SAL_Malloc(pubLen); if (pub == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } CRYPT_EAL_PkeyPub pubKey = {.id = CRYPT_EAL_PkeyGetId(ealPubKey), .key.eccPub = {.data = pub, .len = pubLen}}; ret = CRYPT_EAL_PkeyGetPub(ealPubKey, &pubKey); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(pub); BSL_ERR_PUSH_ERROR(ret); return ret; } encodePub->data = pubKey.key.eccPub.data; encodePub->dataLen = pubKey.key.eccPub.len; return ret; } #endif // HITLS_CRYPTO_ECDSA || HITLS_CRYPTO_SM2 #ifdef HITLS_CRYPTO_ED25519 static int32_t EncodeEd25519PubkeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_Buffer *bitStr) { uint32_t pubLen = CRYPT_EAL_PkeyGetKeyLen(ealPubKey); if (pubLen == 0) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } uint8_t *pub = (uint8_t *)BSL_SAL_Malloc(pubLen); if (pub == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } CRYPT_EAL_PkeyPub pubKey = {.id = CRYPT_PKEY_ED25519, .key.curve25519Pub = {.data = pub, .len = pubLen}}; int32_t ret = CRYPT_EAL_PkeyGetPub(ealPubKey, &pubKey); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(pub); BSL_ERR_PUSH_ERROR(ret); return ret; } bitStr->data = pubKey.key.curve25519Pub.data; bitStr->dataLen = pubKey.key.curve25519Pub.len; return CRYPT_SUCCESS; } static int32_t EncodeEd25519PrikeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPriKey, BSL_Buffer *bitStr) { uint8_t keyBuff[32] = {0}; // The length of the ed25519 private key is 32 CRYPT_EAL_PkeyPrv prv = {.id = CRYPT_PKEY_ED25519, .key.curve25519Prv = {.data = keyBuff, .len = sizeof(keyBuff)}}; int32_t ret = CRYPT_EAL_PkeyGetPrv(ealPriKey, &prv); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_ASN1_TemplateItem octStr[] = {{BSL_ASN1_TAG_OCTETSTRING, 0, 0}}; BSL_ASN1_Template templ = {octStr, 1}; BSL_ASN1_Buffer prvAsn1 = {BSL_ASN1_TAG_OCTETSTRING, prv.key.curve25519Prv.len, prv.key.curve25519Prv.data}; return BSL_ASN1_EncodeTemplate(&templ, &prvAsn1, 1, &bitStr->data, &bitStr->dataLen); } #endif // HITLS_CRYPTO_ED25519 static int32_t EncodePk8AlgidAny(CRYPT_EAL_PkeyCtx *ealPriKey, BSL_Buffer *bitStr, BSL_ASN1_Buffer *keyParam, BslCid *cidOut) { (void)keyParam; int32_t ret = CRYPT_DECODE_NO_SUPPORT_TYPE; BSL_Buffer tmp = {0}; CRYPT_PKEY_AlgId cid = CRYPT_EAL_PkeyGetId(ealPriKey); switch (cid) { #ifdef HITLS_CRYPTO_RSA case CRYPT_PKEY_RSA: ret = EncodeRsaPrvKey(ealPriKey, keyParam, &tmp, &cid); break; #endif #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) case CRYPT_PKEY_ECDSA: case CRYPT_PKEY_SM2: cid = (CRYPT_PKEY_AlgId)BSL_CID_EC_PUBLICKEY; ret = EncodeEccPrikeyAsn1Buff(ealPriKey, keyParam, &tmp); break; #endif #ifdef HITLS_CRYPTO_ED25519 case CRYPT_PKEY_ED25519: ret = EncodeEd25519PrikeyAsn1Buff(ealPriKey, &tmp); break; #endif default: ret = CRYPT_DECODE_NO_SUPPORT_TYPE; break; } if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } bitStr->data = tmp.data; bitStr->dataLen = tmp.dataLen; *cidOut = (BslCid)cid; return ret; } int32_t EncodePk8PriKeyBuff(CRYPT_EAL_PkeyCtx *ealPriKey, BSL_Buffer *asn1) { int32_t ret; BSL_Buffer bitStr = {0}; CRYPT_ENCODE_DECODE_Pk8PrikeyInfo pk8PrikeyInfo = {0}; do { ret = EncodePk8AlgidAny(ealPriKey, &bitStr, &pk8PrikeyInfo.keyParam, &pk8PrikeyInfo.keyType); if (ret != CRYPT_SUCCESS) { break; } pk8PrikeyInfo.pkeyRawKey = bitStr.data; pk8PrikeyInfo.pkeyRawKeyLen = bitStr.dataLen; ret = CRYPT_ENCODE_Pkcs8Info(&pk8PrikeyInfo, asn1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } } while (0); // rsa-pss mode release buffer if (pk8PrikeyInfo.keyParam.tag == (BSL_ASN1_TAG_SEQUENCE | BSL_ASN1_TAG_CONSTRUCTED)) { BSL_SAL_FREE(pk8PrikeyInfo.keyParam.buff); } BSL_SAL_ClearFree(bitStr.data, bitStr.dataLen); return ret; } #ifdef HITLS_CRYPTO_KEY_EPKI static int32_t CheckEncodeParam(const CRYPT_EncodeParam *encodeParam) { if (encodeParam == NULL || encodeParam->param == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (encodeParam->deriveMode != CRYPT_DERIVE_PBKDF2) { BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_NO_SUPPORT_TYPE); return CRYPT_ENCODE_NO_SUPPORT_TYPE; } CRYPT_Pbkdf2Param *pkcsParam = (CRYPT_Pbkdf2Param *)encodeParam->param; if (pkcsParam->pwdLen > PWD_MAX_LEN || (pkcsParam->pwd == NULL && pkcsParam->pwdLen != 0)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } if (pkcsParam->pbesId != BSL_CID_PBES2 || pkcsParam->pbkdfId != BSL_CID_PBKDF2) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } return CRYPT_SUCCESS; } int32_t EncodePk8EncPriKeyBuff(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPriKey, const CRYPT_EncodeParam *encodeParam, BSL_Buffer *encode) { /* EncAlgid */ int32_t ret = CheckEncodeParam(encodeParam); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } CRYPT_Pbkdf2Param *pkcs8Param = (CRYPT_Pbkdf2Param *)encodeParam->param; BSL_Buffer unEncrypted = {0}; ret = EncodePk8PriKeyBuff(ealPriKey, &unEncrypted); if (ret != CRYPT_SUCCESS) { return ret; } BSL_ASN1_Buffer asn1[CRYPT_PKCS_ENCPRIKEY_MAX] = {0}; ret = CRYPT_ENCODE_PkcsEncryptedBuff(libCtx, attrName, pkcs8Param, &unEncrypted, asn1); if (ret != CRYPT_SUCCESS) { BSL_SAL_ClearFree(unEncrypted.data, unEncrypted.dataLen); return ret; } BSL_ASN1_Template templ = {g_pk8EncPriKeyTempl, sizeof(g_pk8EncPriKeyTempl) / sizeof(g_pk8EncPriKeyTempl[0])}; ret = BSL_ASN1_EncodeTemplate(&templ, asn1, CRYPT_PKCS_ENCPRIKEY_MAX, &encode->data, &encode->dataLen); BSL_SAL_ClearFree(unEncrypted.data, unEncrypted.dataLen); BSL_SAL_ClearFree(asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].len); BSL_SAL_ClearFree(asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].len); BSL_SAL_FREE(asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].buff); return ret; } #endif // HITLS_CRYPTO_KEY_EPKI static int32_t CRYPT_EAL_SubPubkeyGetInfo(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ASN1_Buffer *algo, BSL_Buffer *bitStr) { int32_t ret = CRYPT_ERR_ALGID; CRYPT_PKEY_AlgId cid = CRYPT_EAL_PkeyGetId(ealPubKey); BSL_Buffer bitTmp = {0}; BSL_ASN1_Buffer algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX + 1] = {0}; #ifdef HITLS_CRYPTO_RSA if (cid == CRYPT_PKEY_RSA) { ret = EncodeRsaPubkeyAsn1Buff(ealPubKey, &algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX], &bitTmp); if (algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX].tag == (BSL_ASN1_TAG_SEQUENCE | BSL_ASN1_TAG_CONSTRUCTED)) { cid = (CRYPT_PKEY_AlgId)BSL_CID_RSASSAPSS; } } #endif #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) if (cid == CRYPT_PKEY_ECDSA || cid == CRYPT_PKEY_SM2) { cid = (CRYPT_PKEY_AlgId)BSL_CID_EC_PUBLICKEY; ret = EncodeEccPubkeyAsn1Buff(ealPubKey, &algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX], &bitTmp); } #endif #ifdef HITLS_CRYPTO_ED25519 if (cid == CRYPT_PKEY_ED25519) { ret = EncodeEd25519PubkeyAsn1Buff(ealPubKey, &bitTmp); } #endif if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BslOidString *oidStr = BSL_OBJ_GetOID((BslCid)cid); if (oidStr == NULL) { BSL_SAL_FREE(bitTmp.data); ret = CRYPT_ERR_ALGID; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } algoId[BSL_ASN1_TAG_ALGOID_IDX].buff = (uint8_t *)oidStr->octs; algoId[BSL_ASN1_TAG_ALGOID_IDX].len = oidStr->octetLen; algoId[BSL_ASN1_TAG_ALGOID_IDX].tag = BSL_ASN1_TAG_OBJECT_ID; ret = CRYPT_ENCODE_AlgoIdAsn1Buff(algoId, BSL_ASN1_TAG_ALGOID_ANY_IDX + 1, &algo->buff, &algo->len); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(bitTmp.data); BSL_ERR_PUSH_ERROR(ret); goto EXIT; } bitStr->data = bitTmp.data; bitStr->dataLen = bitTmp.dataLen; EXIT: #ifdef HITLS_CRYPTO_RSA if (cid == (CRYPT_PKEY_AlgId)BSL_CID_RSASSAPSS) { BSL_SAL_FREE(algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX].buff); } #endif return ret; } int32_t CRYPT_EAL_EncodeAsn1SubPubkey(CRYPT_EAL_PkeyCtx *ealPubKey, bool isComplete, BSL_Buffer *encodeH) { BSL_ASN1_Buffer algo = {0}; BSL_Buffer bitStr = {0}; int32_t ret = CRYPT_EAL_SubPubkeyGetInfo(ealPubKey, &algo, &bitStr); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = CRYPT_ENCODE_SubPubkeyByInfo(&algo, &bitStr, encodeH, isComplete); BSL_SAL_FREE(bitStr.data); BSL_SAL_FREE(algo.buff); return ret; } #ifdef HITLS_CRYPTO_RSA int32_t EncodeHashAlg(CRYPT_MD_AlgId mdId, BSL_ASN1_Buffer *asn) { if (mdId == CRYPT_MD_SHA1) { asn->tag = BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_HASH; asn->buff = NULL; asn->len = 0; return CRYPT_SUCCESS; } BslOidString *oidStr = BSL_OBJ_GetOID((BslCid)mdId); if (oidStr == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } BSL_ASN1_TemplateItem hashTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, {BSL_ASN1_TAG_OBJECT_ID, 0, 1}, {BSL_ASN1_TAG_ANY, BSL_ASN1_FLAG_OPTIONAL, 1}, }; BSL_ASN1_Template templ = {hashTempl, sizeof(hashTempl) / sizeof(hashTempl[0])}; BSL_ASN1_Buffer asnArr[2] = { {BSL_ASN1_TAG_OBJECT_ID, oidStr->octetLen, (uint8_t *)oidStr->octs}, {BSL_ASN1_TAG_NULL, 0, NULL}, }; int32_t ret = BSL_ASN1_EncodeTemplate(&templ, asnArr, 2, &(asn->buff), &(asn->len)); // 2: oid and null if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } asn->tag = BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_HASH; return CRYPT_SUCCESS; } static int32_t EncodeMgfAlg(CRYPT_MD_AlgId mgfId, BSL_ASN1_Buffer *asn) { if (mgfId == CRYPT_MD_SHA1) { asn->tag = BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_MASKGEN; asn->buff = NULL; asn->len = 0; return CRYPT_SUCCESS; } BslOidString *mgfStr = BSL_OBJ_GetOID(BSL_CID_MGF1); if (mgfStr == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } BslOidString *oidStr = BSL_OBJ_GetOID((BslCid)mgfId); if (oidStr == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } BSL_ASN1_TemplateItem mgfTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, {BSL_ASN1_TAG_OBJECT_ID, 0, 1}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 1}, {BSL_ASN1_TAG_OBJECT_ID, 0, 2}, {BSL_ASN1_TAG_ANY, BSL_ASN1_FLAG_OPTIONAL, 2}, }; BSL_ASN1_Template templ = {mgfTempl, sizeof(mgfTempl) / sizeof(mgfTempl[0])}; BSL_ASN1_Buffer asnArr[3] = { {BSL_ASN1_TAG_OBJECT_ID, mgfStr->octetLen, (uint8_t *)mgfStr->octs}, {BSL_ASN1_TAG_OBJECT_ID, oidStr->octetLen, (uint8_t *)oidStr->octs}, {BSL_ASN1_TAG_NULL, 0, NULL}, // param }; int32_t ret = BSL_ASN1_EncodeTemplate(&templ, asnArr, 3, &(asn->buff), &(asn->len)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } asn->tag = BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_MASKGEN; return CRYPT_SUCCESS; } static int32_t EncodeSaltLen(int32_t saltLen, BSL_ASN1_Buffer *asn) { if (saltLen == 20) { // 20 : default saltLen asn->tag = BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_SALTLEN; asn->buff = NULL; asn->len = 0; return CRYPT_SUCCESS; } BSL_ASN1_Buffer saltAsn = {0}; int32_t ret = BSL_ASN1_EncodeLimb(BSL_ASN1_TAG_INTEGER, (uint64_t)saltLen, &saltAsn); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_ASN1_TemplateItem saltTempl = {BSL_ASN1_TAG_INTEGER, 0, 0}; BSL_ASN1_Template templ = {&saltTempl, 1}; ret = BSL_ASN1_EncodeTemplate(&templ, &saltAsn, 1, &(asn->buff), &(asn->len)); BSL_SAL_Free(saltAsn.buff); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } asn->tag = BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_SALTLEN; return CRYPT_SUCCESS; } #define X509_RSAPSS_ELEM_NUMBER 4 int32_t CRYPT_EAL_EncodeRsaPssAlgParam(const CRYPT_RSA_PssPara *rsaPssParam, uint8_t **buf, uint32_t *bufLen) { BSL_ASN1_Buffer asnArr[X509_RSAPSS_ELEM_NUMBER] = {0}; int32_t ret = EncodeHashAlg(rsaPssParam->mdId, &asnArr[0]); if (ret != CRYPT_SUCCESS) { return ret; } ret = EncodeMgfAlg(rsaPssParam->mgfId, &asnArr[1]); if (ret != CRYPT_SUCCESS) { goto EXIT; } ret = EncodeSaltLen(rsaPssParam->saltLen, &asnArr[2]); // 2: saltLength if (ret != CRYPT_SUCCESS) { goto EXIT; } if (asnArr[0].len + asnArr[1].len + asnArr[2].len == 0) { // [0]:hash + [1]:mgf + [2]:salt all default return ret; } // 3 : trailed asnArr[3].tag = BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_TRAILED; BSL_ASN1_TemplateItem rsapssTempl[] = { {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_HASH, BSL_ASN1_FLAG_DEFAULT, 0}, {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_MASKGEN, BSL_ASN1_FLAG_DEFAULT, 0}, {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_SALTLEN, BSL_ASN1_FLAG_DEFAULT, 0}, {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_TRAILED, BSL_ASN1_FLAG_DEFAULT, 0}, }; BSL_ASN1_Template templ = {rsapssTempl, sizeof(rsapssTempl) / sizeof(rsapssTempl[0])}; ret = BSL_ASN1_EncodeTemplate(&templ, asnArr, X509_RSAPSS_ELEM_NUMBER, buf, bufLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } EXIT: for (uint32_t i = 0; i < X509_RSAPSS_ELEM_NUMBER; i++) { BSL_SAL_Free(asnArr[i].buff); } return ret; } #endif // HITLS_CRYPTO_RSA #endif // HITLS_CRYPTO_KEY_ENCODE #ifdef HITLS_PKI_PKCS12 #define HITLS_P7_SPECIFIC_ENCONTENTINFO_EXTENSION 0 /** * EncryptedContentInfo ::= SEQUENCE { * contentType ContentType, * contentEncryptionAlgorithm ContentEncryptionAlgorithmIdentifier, * encryptedContent [0] IMPLICIT EncryptedContent OPTIONAL * } * * https://datatracker.ietf.org/doc/html/rfc5652#section-6.1 */ static BSL_ASN1_TemplateItem g_enContentInfoTempl[] = { /* ContentType */ {BSL_ASN1_TAG_OBJECT_ID, 0, 0}, /* ContentEncryptionAlgorithmIdentifier */ {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, // ContentEncryptionAlgorithmIdentifier {BSL_ASN1_TAG_OBJECT_ID, 0, 1}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 1}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_HEADERONLY, 2}, // derivation param {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 2}, // enc scheme {BSL_ASN1_TAG_OBJECT_ID, 0, 3}, // alg {BSL_ASN1_TAG_OCTETSTRING, 0, 3}, // iv /* encryptedContent */ {BSL_ASN1_CLASS_CTX_SPECIFIC | HITLS_P7_SPECIFIC_ENCONTENTINFO_EXTENSION, BSL_ASN1_FLAG_OPTIONAL, 0}, }; typedef enum { HITLS_P7_ENC_CONTINFO_TYPE_IDX, HITLS_P7_ENC_CONTINFO_ENCALG_IDX, HITLS_P7_ENC_CONTINFO_DERIVE_PARAM_IDX, HITLS_P7_ENC_CONTINFO_SYMALG_IDX, HITLS_P7_ENC_CONTINFO_SYMIV_IDX, HITLS_P7_ENC_CONTINFO_ENCONTENT_IDX, HITLS_P7_ENC_CONTINFO_MAX_IDX, } HITLS_P7_ENC_CONTINFO_IDX; #define HITLS_P7_SPECIFIC_UNPROTECTEDATTRS_EXTENSION 1 /** * EncryptedData ::= SEQUENCE { * version CMSVersion, * encryptedContentInfo EncryptedContentInfo, * unprotectedAttrs [1] IMPLICIT UnprotectedAttributes OPTIONAL * } * * https://datatracker.ietf.org/doc/html/rfc5652#page-29 */ static BSL_ASN1_TemplateItem g_encryptedDataTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, /* version */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* EncryptedContentInfo */ {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_HEADERONLY, 1}, /* unprotectedAttrs */ {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SET | HITLS_P7_SPECIFIC_UNPROTECTEDATTRS_EXTENSION, BSL_ASN1_FLAG_OPTIONAL | BSL_ASN1_FLAG_HEADERONLY, 1}, }; typedef enum { HITLS_P7_ENCRYPTDATA_VERSION_IDX, HITLS_P7_ENCRYPTDATA_ENCRYPTINFO_IDX, HITLS_P7_ENCRYPTDATA_UNPROTECTEDATTRS_IDX, HITLS_P7_ENCRYPTDATA_MAX_IDX, } HITLS_P7_ENCRYPTDATA_IDX; #ifdef HITLS_PKI_PKCS12_PARSE static int32_t ParsePKCS7EncryptedContentInfo(CRYPT_EAL_LibCtx *libCtx, const char *attrName, BSL_Buffer *encode, const uint8_t *pwd, uint32_t pwdlen, BSL_Buffer *output) { uint8_t *temp = encode->data; uint32_t tempLen = encode->dataLen; BSL_ASN1_Buffer asn1[HITLS_P7_ENC_CONTINFO_MAX_IDX] = {0}; BSL_ASN1_Template templ = {g_enContentInfoTempl, sizeof(g_enContentInfoTempl) / sizeof(g_enContentInfoTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&templ, NULL, &temp, &tempLen, asn1, HITLS_P7_ENC_CONTINFO_MAX_IDX); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BslOidString typeOidStr = {asn1[HITLS_P7_ENC_CONTINFO_TYPE_IDX].len, (char *)asn1[HITLS_P7_ENC_CONTINFO_TYPE_IDX].buff, 0}; BslCid cid = BSL_OBJ_GetCID(&typeOidStr); if (cid != BSL_CID_PKCS7_SIMPLEDATA) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_UNSUPPORTED_PKCS7_TYPE); return CRYPT_DECODE_UNSUPPORTED_PKCS7_TYPE; } BslOidString encOidStr = {asn1[HITLS_P7_ENC_CONTINFO_ENCALG_IDX].len, (char *)asn1[HITLS_P7_ENC_CONTINFO_ENCALG_IDX].buff, 0}; cid = BSL_OBJ_GetCID(&encOidStr); if (cid != BSL_CID_PBES2) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_UNSUPPORTED_ENCRYPT_TYPE); return CRYPT_DECODE_UNSUPPORTED_ENCRYPT_TYPE; } // parse sym alg id BslOidString symOidStr = {asn1[HITLS_P7_ENC_CONTINFO_SYMALG_IDX].len, (char *)asn1[HITLS_P7_ENC_CONTINFO_SYMALG_IDX].buff, 0}; BslCid symId = BSL_OBJ_GetCID(&symOidStr); if (symId == BSL_CID_UNKNOWN) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_UNKNOWN_OID); return CRYPT_DECODE_UNKNOWN_OID; } BSL_Buffer derivekeyData = {asn1[HITLS_P7_ENC_CONTINFO_DERIVE_PARAM_IDX].buff, asn1[HITLS_P7_ENC_CONTINFO_DERIVE_PARAM_IDX].len}; BSL_Buffer ivData = {asn1[HITLS_P7_ENC_CONTINFO_SYMIV_IDX].buff, asn1[HITLS_P7_ENC_CONTINFO_SYMIV_IDX].len}; BSL_Buffer enData = {asn1[HITLS_P7_ENC_CONTINFO_ENCONTENT_IDX].buff, asn1[HITLS_P7_ENC_CONTINFO_ENCONTENT_IDX].len}; EncryptPara encPara = {.derivekeyData = &derivekeyData, .ivData = &ivData, .enData = &enData}; BSL_Buffer pwdBuffer = {(uint8_t *)(uintptr_t)pwd, pwdlen}; ret = CRYPT_DECODE_ParseEncDataAsn1(libCtx, attrName, symId, &encPara, &pwdBuffer, NULL, output); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t CRYPT_EAL_ParseAsn1PKCS7EncryptedData(CRYPT_EAL_LibCtx *libCtx, const char *attrName, BSL_Buffer *encode, const uint8_t *pwd, uint32_t pwdlen, BSL_Buffer *output) { if (encode == NULL || pwd == NULL || output == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pwdlen > PWD_MAX_LEN) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } uint8_t *temp = encode->data; uint32_t tempLen = encode->dataLen; BSL_ASN1_Buffer asn1[HITLS_P7_ENCRYPTDATA_MAX_IDX] = {0}; BSL_ASN1_Template templ = {g_encryptedDataTempl, sizeof(g_encryptedDataTempl) / sizeof(g_encryptedDataTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&templ, NULL, &temp, &tempLen, asn1, HITLS_P7_ENCRYPTDATA_MAX_IDX); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } uint32_t version = 0; ret = BSL_ASN1_DecodePrimitiveItem(&asn1[HITLS_P7_ENCRYPTDATA_VERSION_IDX], &version); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (version == 0 && asn1[HITLS_P7_ENCRYPTDATA_UNPROTECTEDATTRS_IDX].buff != NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS7_INVALIDE_ENCRYPTDATA_TYPE); return CRYPT_DECODE_PKCS7_INVALIDE_ENCRYPTDATA_TYPE; } // In RFC5652, if the encapsulated content type is other than id-data, then the value of version MUST be 2. if (version == 2 && asn1[HITLS_P7_ENCRYPTDATA_UNPROTECTEDATTRS_IDX].buff == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS7_INVALIDE_ENCRYPTDATA_TYPE); return CRYPT_DECODE_PKCS7_INVALIDE_ENCRYPTDATA_TYPE; } BSL_Buffer encryptInfo = {asn1[HITLS_P7_ENCRYPTDATA_ENCRYPTINFO_IDX].buff, asn1[HITLS_P7_ENCRYPTDATA_ENCRYPTINFO_IDX].len}; ret = ParsePKCS7EncryptedContentInfo(libCtx, attrName, &encryptInfo, pwd, pwdlen, output); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_PKI_PKCS12_PARSE #ifdef HITLS_PKI_PKCS12_GEN /* Encode PKCS7-EncryptData:only support PBES2 + PBKDF2, the param check ref CheckEncodeParam. */ static int32_t EncodePKCS7EncryptedContentInfo(CRYPT_EAL_LibCtx *libCtx, const char *attrName, BSL_Buffer *data, const CRYPT_EncodeParam *encodeParam, BSL_Buffer *encode) { /* EncAlgid */ int32_t ret = CheckEncodeParam(encodeParam); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } CRYPT_Pbkdf2Param *pkcs7Param = (CRYPT_Pbkdf2Param *)encodeParam->param; BSL_ASN1_Buffer asn1[CRYPT_PKCS_ENCPRIKEY_MAX] = {0}; ret = CRYPT_ENCODE_PkcsEncryptedBuff(libCtx, attrName, pkcs7Param, data, asn1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } do { BslOidString *oidStr = BSL_OBJ_GetOID(BSL_CID_PKCS7_SIMPLEDATA); if (oidStr == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); ret = CRYPT_ERR_ALGID; break; } BSL_ASN1_Buffer p7asn[HITLS_P7_ENC_CONTINFO_MAX_IDX] = { {BSL_ASN1_TAG_OBJECT_ID, oidStr->octetLen, (uint8_t *)oidStr->octs}, {asn1[CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX].tag, asn1[CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX].len, asn1[CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX].buff}, {asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].tag, asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].len, asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].buff}, {asn1[CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX].tag, asn1[CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX].len, asn1[CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX].buff}, {asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].tag, asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].len, asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].buff}, {BSL_ASN1_CLASS_CTX_SPECIFIC | HITLS_P7_SPECIFIC_ENCONTENTINFO_EXTENSION, asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].len, asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].buff}, }; BSL_ASN1_Template templ = {g_enContentInfoTempl, sizeof(g_enContentInfoTempl) / sizeof(g_enContentInfoTempl[0])}; ret = BSL_ASN1_EncodeTemplate(&templ, p7asn, HITLS_P7_ENC_CONTINFO_MAX_IDX, &encode->data, &encode->dataLen); } while (0); BSL_SAL_ClearFree(asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].len); BSL_SAL_ClearFree(asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].len); BSL_SAL_FREE(asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].buff); return ret; } int32_t CRYPT_EAL_EncodePKCS7EncryptDataBuff(CRYPT_EAL_LibCtx *libCtx, const char *attrName, BSL_Buffer *data, const void *encodeParam, BSL_Buffer *encode) { if (data == NULL || encodeParam == NULL || encode == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } BSL_Buffer contentInfo = {0}; int32_t ret = EncodePKCS7EncryptedContentInfo(libCtx, attrName, data, encodeParam, &contentInfo); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } uint8_t version = 0; BSL_ASN1_Buffer asn1[HITLS_P7_ENCRYPTDATA_MAX_IDX] = { {BSL_ASN1_TAG_INTEGER, sizeof(version), &version}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, contentInfo.dataLen, contentInfo.data}, {0, 0, 0}, }; BSL_ASN1_Template templ = {g_encryptedDataTempl, sizeof(g_encryptedDataTempl) / sizeof(g_encryptedDataTempl[0])}; BSL_Buffer tmp = {0}; ret = BSL_ASN1_EncodeTemplate(&templ, asn1, HITLS_P7_ENCRYPTDATA_MAX_IDX, &tmp.data, &tmp.dataLen); BSL_SAL_FREE(contentInfo.data); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } encode->data = tmp.data; encode->dataLen = tmp.dataLen; return ret; } #endif // HITLS_PKI_PKCS12_GEN #endif // HITLS_PKI_PKCS12 #endif // HITLS_CRYPTO_CODECSKEY
2401_83913325/openHiTLS-examples_7925
crypto/codecskey/src/crypt_encode_decode_local.c
C
unknown
56,034
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_ENCODE_DECODE_KEY_LOCAL_H #define CRYPT_ENCODE_DECODE_KEY_LOCAL_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_CODECSKEY #include "bsl_types.h" #include "bsl_asn1_internal.h" #include "crypt_types.h" #include "crypt_eal_pkey.h" #ifdef HITLS_CRYPTO_RSA #include "crypt_rsa.h" #endif #ifdef HITLS_CRYPTO_SM2 #include "crypt_sm2.h" #endif #ifdef HITLS_CRYPTO_ED25519 #include "crypt_curve25519.h" #endif #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ typedef struct { BSL_Buffer *derivekeyData; BSL_Buffer *ivData; BSL_Buffer *enData; } EncryptPara; typedef enum { CRYPT_RSA_PUB_N_IDX = 0, CRYPT_RSA_PUB_E_IDX = 1, } CRYPT_RSA_PUB_TEMPL_IDX; typedef enum { BSL_ASN1_TAG_ALGOID_IDX = 0, BSL_ASN1_TAG_ALGOID_ANY_IDX = 1, } ALGOID_TEMPL_IDX; typedef enum { CRYPT_SUBKEYINFO_ALGOID_IDX = 0, CRYPT_SUBKEYINFO_BITSTRING_IDX = 1, } CRYPT_SUBKEYINFO_TEMPL_IDX; typedef enum { CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX, CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX, CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX, CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX, CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX, CRYPT_PKCS_ENCPRIKEY_MAX } CRYPT_PKCS_ENCPRIKEY_TEMPL_IDX; typedef enum { CRYPT_ECPRIKEY_VERSION_IDX = 0, CRYPT_ECPRIKEY_PRIKEY_IDX = 1, CRYPT_ECPRIKEY_PARAM_IDX = 2, CRYPT_ECPRIKEY_PUBKEY_IDX = 3, } CRYPT_ECPRIKEY_TEMPL_IDX; typedef enum { CRYPT_RSA_PRV_VERSION_IDX = 0, CRYPT_RSA_PRV_N_IDX = 1, CRYPT_RSA_PRV_E_IDX = 2, CRYPT_RSA_PRV_D_IDX = 3, CRYPT_RSA_PRV_P_IDX = 4, CRYPT_RSA_PRV_Q_IDX = 5, CRYPT_RSA_PRV_DP_IDX = 6, CRYPT_RSA_PRV_DQ_IDX = 7, CRYPT_RSA_PRV_QINV_IDX = 8, CRYPT_RSA_PRV_OTHER_PRIME_IDX = 9 } CRYPT_RSA_PRV_TEMPL_IDX; #define CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_HASH 0 #define CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_MASKGEN 1 #define CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_SALTLEN 2 #define CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_TRAILED 3 #define PATH_MAX_LEN 4096 #define PWD_MAX_LEN 4096 #ifdef HITLS_CRYPTO_KEY_DECODE int32_t ParseSubPubkeyAsn1(BSL_ASN1_Buffer *encode, CRYPT_EAL_PkeyCtx **ealPubKey); int32_t ParseRsaPubkeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *param, CRYPT_EAL_PkeyCtx **ealPubKey, BslCid cid); int32_t ParseRsaPrikeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *rsaPssParam, BslCid cid, CRYPT_EAL_PkeyCtx **ealPriKey); int32_t ParseEccPrikeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *pk8AlgoParam, CRYPT_EAL_PkeyCtx **ealPriKey); int32_t ParsePk8PriKeyBuff(BSL_Buffer *buff, CRYPT_EAL_PkeyCtx **ealPriKey); #ifdef HITLS_CRYPTO_KEY_EPKI int32_t ParsePk8EncPriKeyBuff(BSL_Buffer *buff, const BSL_Buffer *pwd, CRYPT_EAL_PkeyCtx **ealPriKey); int32_t CRYPT_DECODE_Pkcs8PrvDecrypt(CRYPT_EAL_LibCtx *libctx, const char *attrName, BSL_Buffer *buff, const BSL_Buffer *pwd, BSL_ASN1_DecTemplCallBack keyInfoCb, BSL_Buffer *decode); int32_t CRYPT_DECODE_ParseEncDataAsn1(CRYPT_EAL_LibCtx *libctx, const char *attrName, BslCid symAlg, EncryptPara *encPara, const BSL_Buffer *pwd, BSL_ASN1_DecTemplCallBack keyInfoCb, BSL_Buffer *decode); #endif int32_t CRYPT_EAL_ParseAsn1SubPubkey(uint8_t *buff, uint32_t buffLen, void **ealPubKey, bool isComplete); int32_t CRYPT_DECODE_AlgoIdAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_DecTemplCallBack keyInfoCb, BSL_ASN1_Buffer *algoId, uint32_t algoIdNum); int32_t CRYPT_DECODE_ConstructBufferOutParam(BSL_Param **outParam, uint8_t *buffer, uint32_t bufferLen); int32_t CRYPT_DECODE_ParseSubKeyInfo(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *pubAsn1, bool isComplete); int32_t CRYPT_DECODE_PrikeyAsn1Buff(uint8_t *buffer, uint32_t bufferLen, BSL_ASN1_Buffer *asn1, uint32_t arrNum); #ifdef HITLS_CRYPTO_RSA int32_t CRYPT_DECODE_RsaPubkeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *pubAsn1, uint32_t arrNum); int32_t CRYPT_DECODE_RsaPrikeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *asn1, uint32_t asn1Num); int32_t CRYPT_RSA_ParsePubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *param, CRYPT_RSA_Ctx **rsaPubKey, BslCid cid); int32_t CRYPT_RSA_ParsePkcs8Key(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_RSA_Ctx **rsaPriKey); int32_t CRYPT_RSA_ParseSubPubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_RSA_Ctx **pubKey, bool isComplete); int32_t CRYPT_RSA_ParsePrikeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *rsaPssParam, CRYPT_RSA_Ctx **rsaPriKey); #endif #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_ECDH) int32_t CRYPT_ECC_ParseSubPubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, void **pubKey, bool isComplete); int32_t CRYPT_ECC_ParsePkcs8Key(void *libCtx, uint8_t *buff, uint32_t buffLen, void **ecdsaPriKey); int32_t CRYPT_ECC_ParsePrikeyAsn1Buff(void *libCtx, uint8_t *buffer, uint32_t bufferLen, BSL_ASN1_Buffer *pk8AlgoParam, void **ecPriKey); #endif #ifdef HITLS_CRYPTO_SM2 int32_t CRYPT_SM2_ParseSubPubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_SM2_Ctx **pubKey, bool isComplete); int32_t CRYPT_SM2_ParsePrikeyAsn1Buff(void *libCtx, uint8_t *buffer, uint32_t bufferLen, BSL_ASN1_Buffer *pk8AlgoParam, CRYPT_SM2_Ctx **sm2PriKey); int32_t CRYPT_SM2_ParsePkcs8Key(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_SM2_Ctx **sm2PriKey); #endif #ifdef HITLS_CRYPTO_ED25519 int32_t CRYPT_ED25519_ParsePkcs8Key(void *libCtx, uint8_t *buffer, uint32_t bufferLen, CRYPT_CURVE25519_Ctx **ed25519PriKey); int32_t CRYPT_ED25519_ParseSubPubkeyAsn1Buff(void *libCtx, uint8_t *buff, uint32_t buffLen, CRYPT_CURVE25519_Ctx **pubKey, bool isComplete); #endif #endif #ifdef HITLS_CRYPTO_KEY_ENCODE int32_t EncodeRsaPubkeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPubKey, BSL_ASN1_Buffer *pssParam, BSL_Buffer *encodePub); int32_t EncodeRsaPrikeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPriKey, CRYPT_PKEY_AlgId cid, BSL_Buffer *encode); int32_t EncodeEccPrikeyAsn1Buff(CRYPT_EAL_PkeyCtx *ealPriKey, BSL_ASN1_Buffer *pk8AlgoParam, BSL_Buffer *encode); int32_t EncodePk8PriKeyBuff(CRYPT_EAL_PkeyCtx *ealPriKey, BSL_Buffer *asn1); int32_t CRYPT_ENCODE_SubPubkeyByInfo(BSL_ASN1_Buffer *algo, BSL_Buffer *bitStr, BSL_Buffer *encodeH, bool isComplete); int32_t CRYPT_ENCODE_AlgoIdAsn1Buff(BSL_ASN1_Buffer *algoId, uint32_t algoIdNum, uint8_t **buff, uint32_t *buffLen); int32_t CRYPT_ENCODE_PkcsEncryptedBuff(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_Pbkdf2Param *pkcsParam, BSL_Buffer *unEncrypted, BSL_ASN1_Buffer *asn1); int32_t CRYPT_ENCODE_EccPrikeyAsn1Buff(BSL_ASN1_Buffer *asn1, uint32_t asn1Num, BSL_Buffer *encode); #ifdef HITLS_CRYPTO_KEY_EPKI int32_t EncodePk8EncPriKeyBuff(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_EAL_PkeyCtx *ealPriKey, const CRYPT_EncodeParam *encodeParam, BSL_Buffer *encode); #endif int32_t CRYPT_EAL_EncodeAsn1SubPubkey(CRYPT_EAL_PkeyCtx *ealPubKey, bool isComplete, BSL_Buffer *encodeH); #ifdef HITLS_CRYPTO_RSA int32_t CRYPT_ENCODE_RsaPrikeyAsn1Buff(BSL_ASN1_Buffer *asn1, uint32_t asn1Num, BSL_Buffer *encode); int32_t CRYPT_ENCODE_RsaPubkeyAsn1Buff(BSL_ASN1_Buffer *pubAsn1, BSL_Buffer *encodePub); #endif #endif static inline bool IsEcdsaEcParaId(int32_t paraId) { return paraId == CRYPT_ECC_NISTP224 || paraId == CRYPT_ECC_NISTP256 || paraId == CRYPT_ECC_NISTP384 || paraId == CRYPT_ECC_NISTP521 || paraId == CRYPT_ECC_BRAINPOOLP256R1 || paraId == CRYPT_ECC_BRAINPOOLP384R1 || paraId == CRYPT_ECC_BRAINPOOLP512R1; } #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_CODECSKEY #endif // CRYPT_ENCODE_DECODE_KEY_LOCAL_H
2401_83913325/openHiTLS-examples_7925
crypto/codecskey/src/crypt_encode_decode_local.h
C
unknown
8,212
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CODECSKEY #include <stdint.h> #include "securec.h" #include "bsl_types.h" #include "bsl_asn1_internal.h" #include "bsl_obj_internal.h" #include "bsl_err_internal.h" #include "crypt_params_key.h" #include "crypt_errno.h" #include "crypt_encode_decode_key.h" #include "crypt_encode_decode_local.h" #include "crypt_eal_kdf.h" #include "crypt_eal_cipher.h" #include "crypt_eal_rand.h" #ifdef HITLS_CRYPTO_RSA /** * RSAPrivateKey ::= SEQUENCE { * version Version, * modulus INTEGER, -- n * publicExponent INTEGER, -- e * privateExponent INTEGER, -- d * prime1 INTEGER, -- p * prime2 INTEGER, -- q * exponent1 INTEGER, -- d mod (p-1) * exponent2 INTEGER, -- d mod (q-1) * coefficient INTEGER, -- (inverse of q) mod p * otherPrimeInfos OtherPrimeInfos OPTIONAL * } * * https://datatracker.ietf.org/doc/html/rfc3447#autoid-39 */ static BSL_ASN1_TemplateItem g_rsaPrvTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, /* ignore seq header */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* version */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* n */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* e */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* d */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* p */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* q */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* d mod (p-1) */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* d mod (q-1) */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* q^-1 mod p */ {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_OPTIONAL | BSL_ASN1_FLAG_HEADERONLY | BSL_ASN1_FLAG_SAME, 1}, /* OtherPrimeInfos OPTIONAL */ {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 2}, /* OtherPrimeInfo */ {BSL_ASN1_TAG_INTEGER, 0, 3}, /* ri */ {BSL_ASN1_TAG_INTEGER, 0, 3}, /* di */ {BSL_ASN1_TAG_INTEGER, 0, 3} /* ti */ }; /** * RSAPublicKey ::= SEQUENCE { * modulus INTEGER, -- n * publicExponent INTEGER } -- e * * https://datatracker.ietf.org/doc/html/rfc4055#autoid-3 */ static BSL_ASN1_TemplateItem g_rsaPubTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, /* ignore seq */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* n */ {BSL_ASN1_TAG_INTEGER, 0, 1}, /* e */ }; #ifdef HITLS_CRYPTO_KEY_DECODE /** * ref: rfc4055 * RSASSA-PSS-params ::= SEQUENCE { * hashAlgorithm [0] HashAlgorithm DEFAULT sha1Identifier, * maskGenAlgorithm [1] MaskGenAlgorithm DEFAULT mgf1SHA1Identifier, * saltLength [2] INTEGER DEFAULT 20, * trailerField [3] INTEGER DEFAULT 1 * } * HashAlgorithm ::= AlgorithmIdentifier * MaskGenAlgorithm ::= AlgorithmIdentifier */ static BSL_ASN1_TemplateItem g_rsaPssTempl[] = { {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_HASH, BSL_ASN1_FLAG_DEFAULT, 0}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 1}, {BSL_ASN1_TAG_OBJECT_ID, 0, 2}, {BSL_ASN1_TAG_ANY, BSL_ASN1_FLAG_OPTIONAL, 2}, {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_MASKGEN, BSL_ASN1_FLAG_DEFAULT, 0}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 1}, {BSL_ASN1_TAG_OBJECT_ID, 0, 2}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 2}, {BSL_ASN1_TAG_OBJECT_ID, 0, 3}, {BSL_ASN1_TAG_ANY, BSL_ASN1_FLAG_OPTIONAL, 3}, {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_SALTLEN, BSL_ASN1_FLAG_DEFAULT, 0}, {BSL_ASN1_TAG_INTEGER, 0, 1}, {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | CRYPT_ASN1_CTX_SPECIFIC_TAG_RSAPSS_TRAILED, BSL_ASN1_FLAG_DEFAULT, 0}, {BSL_ASN1_TAG_INTEGER, 0, 1} }; typedef enum { CRYPT_RSAPSS_HASH_IDX, CRYPT_RSAPSS_HASHANY_IDX, CRYPT_RSAPSS_MGF1_IDX, CRYPT_RSAPSS_MGF1PARAM_IDX, CRYPT_RSAPSS_MGF1PARAMANY_IDX, CRYPT_RSAPSS_SALTLEN_IDX, CRYPT_RSAPSS_TRAILED_IDX, CRYPT_RSAPSS_MAX } CRYPT_RSAPSS_IDX; #endif // HITLS_CRYPTO_KEY_DECODE #endif #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) /** * ECPrivateKey ::= SEQUENCE { * version INTEGER { ecPrivkeyVer1(1) } (ecPrivkeyVer1), * privateKey OCTET STRING, * parameters [0] ECParameters {{ NamedCurve }} OPTIONAL, * publicKey [1] BIT STRING OPTIONAL * } * * https://datatracker.ietf.org/doc/html/rfc5915#autoid-3 */ #define BSL_ASN1_TAG_EC_PRIKEY_PARAM 0 #define BSL_ASN1_TAG_EC_PRIKEY_PUBKEY 1 static BSL_ASN1_TemplateItem g_ecPriKeyTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, // ignore seq header {BSL_ASN1_TAG_INTEGER, 0, 1}, /* version */ {BSL_ASN1_TAG_OCTETSTRING, 0, 1}, /* private key */ {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_EC_PRIKEY_PARAM, BSL_ASN1_FLAG_OPTIONAL, 1}, {BSL_ASN1_TAG_OBJECT_ID, 0, 2}, {BSL_ASN1_CLASS_CTX_SPECIFIC | BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_EC_PRIKEY_PUBKEY, BSL_ASN1_FLAG_OPTIONAL, 1}, {BSL_ASN1_TAG_BITSTRING, 0, 2}, }; #endif /** * PrivateKeyInfo ::= SEQUENCE { * version INTEGER, * privateKeyAlgorithm AlgorithmIdentifier, * privateKey OCTET STRING, * attributes [0] IMPLICIT Attributes OPTIONAL } * * https://datatracker.ietf.org/doc/html/rfc5208#autoid-5 */ static BSL_ASN1_TemplateItem g_pk8PriKeyTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, // ignore seq header {BSL_ASN1_TAG_INTEGER, 0, 1}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_HEADERONLY, 1}, {BSL_ASN1_TAG_OCTETSTRING, 0, 1}, }; typedef enum { CRYPT_PK8_PRIKEY_VERSION_IDX = 0, CRYPT_PK8_PRIKEY_ALGID_IDX = 1, CRYPT_PK8_PRIKEY_PRIKEY_IDX = 2, } CRYPT_PK8_PRIKEY_TEMPL_IDX; #ifdef HITLS_CRYPTO_KEY_EPKI #ifdef HITLS_CRYPTO_KEY_DECODE /** * EncryptedPrivateKeyInfo ::= SEQUENCE { * encryptionAlgorithm EncryptionAlgorithmIdentifier, * encryptedData EncryptedData } * * https://datatracker.ietf.org/doc/html/rfc5208#autoid-6 */ static BSL_ASN1_TemplateItem g_pk8EncPriKeyTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 1}, // EncryptionAlgorithmIdentifier {BSL_ASN1_TAG_OBJECT_ID, 0, 2}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 2}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_HEADERONLY, 3}, // derivation param {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 3}, // enc scheme {BSL_ASN1_TAG_OBJECT_ID, 0, 4}, // alg {BSL_ASN1_TAG_OCTETSTRING, 0, 4}, // iv {BSL_ASN1_TAG_OCTETSTRING, 0, 1}, // EncryptedData }; #endif static BSL_ASN1_TemplateItem g_pbkdf2DerParamTempl[] = { {BSL_ASN1_TAG_OBJECT_ID, 0, 0}, // derive alg {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, {BSL_ASN1_TAG_OCTETSTRING, 0, 1}, // salt {BSL_ASN1_TAG_INTEGER, 0, 1}, // iteration {BSL_ASN1_TAG_INTEGER, BSL_ASN1_FLAG_OPTIONAL, 1}, // keyLen {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_DEFAULT | BSL_ASN1_FLAG_HEADERONLY, 1}, // prf }; #endif // HITLS_CRYPTO_KEY_EPKI /** * SubjectPublicKeyInfo ::= SEQUENCE { * algorithm AlgorithmIdentifier, * subjectPublicKey BIT STRING * } * * https://datatracker.ietf.org/doc/html/rfc5480#autoid-3 */ static BSL_ASN1_TemplateItem g_subKeyInfoTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_HEADERONLY, 1}, {BSL_ASN1_TAG_BITSTRING, 0, 1}, }; static BSL_ASN1_TemplateItem g_subKeyInfoInnerTempl[] = { {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, BSL_ASN1_FLAG_HEADERONLY, 0}, {BSL_ASN1_TAG_BITSTRING, 0, 0}, }; /** * AlgorithmIdentifier ::= SEQUENCE { * algorithm OBJECT IDENTIFIER, * parameters ANY DEFINED BY algorithm OPTIONAL } * * https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.1.2 */ static BSL_ASN1_TemplateItem g_algoIdTempl[] = { {BSL_ASN1_TAG_OBJECT_ID, 0, 0}, {BSL_ASN1_TAG_ANY, BSL_ASN1_FLAG_OPTIONAL, 0}, }; #ifdef HITLS_CRYPTO_KEY_EPKI typedef enum { CRYPT_PKCS_ENC_DERALG_IDX, CRYPT_PKCS_ENC_DERSALT_IDX, CRYPT_PKCS_ENC_DERITER_IDX, CRYPT_PKCS_ENC_DERKEYLEN_IDX, CRYPT_PKCS_ENC_DERPRF_IDX, CRYPT_PKCS_ENC_DERPARAM_MAX } CRYPT_PKCS_ENC_DERIVEPARAM_IDX; static int32_t CRYPT_ENCODE_DECODE_DecryptEncData(CRYPT_EAL_LibCtx *libctx, const char *attrName, BSL_Buffer *ivData, BSL_Buffer *enData, int32_t alg, bool isEnc, BSL_Buffer *key, uint8_t *output, uint32_t *dataLen) { uint32_t buffLen = *dataLen; CRYPT_EAL_CipherCtx *ctx = CRYPT_EAL_ProviderCipherNewCtx(libctx, alg, attrName); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL); return BSL_MALLOC_FAIL; } int32_t ret = CRYPT_EAL_CipherInit(ctx, key->data, key->dataLen, ivData->data, ivData->dataLen, isEnc); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } uint32_t blockSize; ret = CRYPT_EAL_CipherCtrl(ctx, CRYPT_CTRL_GET_BLOCKSIZE, &blockSize, sizeof(blockSize)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (blockSize != 1) { ret = CRYPT_EAL_CipherSetPadding(ctx, CRYPT_PADDING_PKCS7); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } } ret = CRYPT_EAL_CipherUpdate(ctx, enData->data, enData->dataLen, output, dataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } buffLen -= *dataLen; ret = CRYPT_EAL_CipherFinal(ctx, output + *dataLen, &buffLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } *dataLen += buffLen; EXIT: CRYPT_EAL_CipherFreeCtx(ctx); return ret; } static int32_t PbkdfDeriveKey(CRYPT_EAL_LibCtx *libctx, const char *attrName, uint32_t iter, int32_t prfId, BSL_Buffer *salt, const uint8_t *pwd, uint32_t pwdLen, BSL_Buffer *key) { CRYPT_EAL_KdfCTX *kdfCtx = CRYPT_EAL_ProviderKdfNewCtx(libctx, CRYPT_KDF_PBKDF2, attrName); if (kdfCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_PBKDF2_NOT_SUPPORTED); return CRYPT_PBKDF2_NOT_SUPPORTED; } BSL_Param params[5] = {{0}, {0}, {0}, {0}, BSL_PARAM_END}; (void)BSL_PARAM_InitValue(&params[0], CRYPT_PARAM_KDF_MAC_ID, BSL_PARAM_TYPE_UINT32, &prfId, sizeof(prfId)); (void)BSL_PARAM_InitValue(&params[1], CRYPT_PARAM_KDF_PASSWORD, BSL_PARAM_TYPE_OCTETS, (uint8_t *)(uintptr_t)pwd, pwdLen); // Fixed pwd parameter (void)BSL_PARAM_InitValue(&params[2], CRYPT_PARAM_KDF_SALT, BSL_PARAM_TYPE_OCTETS, salt->data, salt->dataLen); (void)BSL_PARAM_InitValue(&params[3], CRYPT_PARAM_KDF_ITER, BSL_PARAM_TYPE_UINT32, &iter, sizeof(iter)); int32_t ret = CRYPT_EAL_KdfSetParam(kdfCtx, params); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = CRYPT_EAL_KdfDerive(kdfCtx, key->data, key->dataLen); EXIT: CRYPT_EAL_KdfFreeCtx(kdfCtx); return ret; } #endif // HITLS_CRYPTO_EPKI #ifdef HITLS_CRYPTO_KEY_DECODE #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) int32_t CRYPT_DECODE_PrikeyAsn1Buff(uint8_t *buffer, uint32_t bufferLen, BSL_ASN1_Buffer *asn1, uint32_t arrNum) { uint8_t *tmpBuff = buffer; uint32_t tmpBuffLen = bufferLen; BSL_ASN1_Template templ = {g_ecPriKeyTempl, sizeof(g_ecPriKeyTempl) / sizeof(g_ecPriKeyTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&templ, NULL, &tmpBuff, &tmpBuffLen, asn1, arrNum); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif #ifdef HITLS_CRYPTO_RSA int32_t CRYPT_DECODE_RsaPubkeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *pubAsn1, uint32_t arrNum) { if (buff == NULL || pubAsn1 == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } uint8_t *tmpBuff = buff; uint32_t tmpBuffLen = buffLen; BSL_ASN1_Template pubTempl = {g_rsaPubTempl, sizeof(g_rsaPubTempl) / sizeof(g_rsaPubTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&pubTempl, NULL, &tmpBuff, &tmpBuffLen, pubAsn1, arrNum); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t CRYPT_DECODE_RsaPrikeyAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *asn1, uint32_t asn1Num) { uint8_t *tmpBuff = buff; uint32_t tmpBuffLen = buffLen; BSL_ASN1_Template templ = {g_rsaPrvTempl, sizeof(g_rsaPrvTempl) / sizeof(g_rsaPrvTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&templ, NULL, &tmpBuff, &tmpBuffLen, asn1, asn1Num); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t RsaPssTagGetOrCheck(int32_t type, uint32_t idx, void *data, void *expVal) { (void) idx; (void) data; if (type == BSL_ASN1_TYPE_GET_ANY_TAG) { *(uint8_t *) expVal = BSL_ASN1_TAG_NULL; // is null return CRYPT_SUCCESS; } BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_RSSPSS_GET_ANY_TAG); return CRYPT_DECODE_ERR_RSSPSS_GET_ANY_TAG; } int32_t CRYPT_EAL_ParseRsaPssAlgParam(BSL_ASN1_Buffer *param, CRYPT_RSA_PssPara *para) { para->mdId = (CRYPT_MD_AlgId)BSL_CID_SHA1; // hashAlgorithm [0] HashAlgorithm DEFAULT sha1Identifier, para->mgfId = (CRYPT_MD_AlgId)BSL_CID_SHA1; // maskGenAlgorithm [1] MaskGenAlgorithm DEFAULT mgf1SHA1Identifier, para->saltLen = 20; // saltLength [2] INTEGER DEFAULT 20 uint8_t *temp = param->buff; uint32_t tempLen = param->len; BSL_ASN1_Buffer asns[CRYPT_RSAPSS_MAX] = {0}; BSL_ASN1_Template templ = {g_rsaPssTempl, sizeof(g_rsaPssTempl) / sizeof(g_rsaPssTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&templ, RsaPssTagGetOrCheck, &temp, &tempLen, asns, CRYPT_RSAPSS_MAX); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_RSSPSS); return CRYPT_DECODE_ERR_RSSPSS; } if (asns[CRYPT_RSAPSS_HASH_IDX].tag != 0) { BslOidString hashOid = {asns[CRYPT_RSAPSS_HASH_IDX].len, (char *)asns[CRYPT_RSAPSS_HASH_IDX].buff, 0}; para->mdId = (CRYPT_MD_AlgId)BSL_OBJ_GetCID(&hashOid); if (para->mdId == (CRYPT_MD_AlgId)BSL_CID_UNKNOWN) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_RSSPSS_MD); return CRYPT_DECODE_ERR_RSSPSS_MD; } } if (asns[CRYPT_RSAPSS_MGF1PARAM_IDX].tag != 0) { BslOidString mgf1 = {asns[CRYPT_RSAPSS_MGF1PARAM_IDX].len, (char *)asns[CRYPT_RSAPSS_MGF1PARAM_IDX].buff, 0}; para->mgfId = (CRYPT_MD_AlgId)BSL_OBJ_GetCID(&mgf1); if (para->mgfId == (CRYPT_MD_AlgId)BSL_CID_UNKNOWN) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_RSSPSS_MGF1MD); return CRYPT_DECODE_ERR_RSSPSS_MGF1MD; } } if (asns[CRYPT_RSAPSS_SALTLEN_IDX].tag != 0) { ret = BSL_ASN1_DecodePrimitiveItem(&asns[CRYPT_RSAPSS_SALTLEN_IDX], &para->saltLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if (asns[CRYPT_RSAPSS_TRAILED_IDX].tag != 0) { // trailerField ret = BSL_ASN1_DecodePrimitiveItem(&asns[CRYPT_RSAPSS_TRAILED_IDX], &tempLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (tempLen != 1) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ERR_RSSPSS_TRAILER); return CRYPT_DECODE_ERR_RSSPSS_TRAILER; } } return ret; } #endif static int32_t DecSubKeyInfoCb(int32_t type, uint32_t idx, void *data, void *expVal) { (void)idx; BSL_ASN1_Buffer *param = (BSL_ASN1_Buffer *)data; switch (type) { case BSL_ASN1_TYPE_GET_ANY_TAG: { BslOidString oidStr = {param->len, (char *)param->buff, 0}; BslCid cid = BSL_OBJ_GetCID(&oidStr); if (cid == BSL_CID_EC_PUBLICKEY || cid == BSL_CID_SM2PRIME256) { // note: any It can be encoded empty or it can be null *(uint8_t *)expVal = BSL_ASN1_TAG_OBJECT_ID; } else if (cid == BSL_CID_RSASSAPSS) { *(uint8_t *)expVal = BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE; } else if (cid == BSL_CID_ED25519) { /* RFC8410: Ed25519 has no algorithm parameters */ *(uint8_t *)expVal = BSL_ASN1_TAG_EMPTY; // is empty } else { *(uint8_t *)expVal = BSL_ASN1_TAG_NULL; // is null } return CRYPT_SUCCESS; } default: break; } BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ASN1_BUFF_FAILED); return CRYPT_DECODE_ASN1_BUFF_FAILED; } int32_t CRYPT_DECODE_ParseSubKeyInfo(uint8_t *buff, uint32_t buffLen, BSL_ASN1_Buffer *pubAsn1, bool isComplete) { uint8_t *tmpBuff = buff; uint32_t tmpBuffLen = buffLen; // decode sub pubkey info BSL_ASN1_Template pubTempl; if (isComplete) { pubTempl.templItems = g_subKeyInfoTempl; pubTempl.templNum = sizeof(g_subKeyInfoTempl) / sizeof(g_subKeyInfoTempl[0]); } else { pubTempl.templItems = g_subKeyInfoInnerTempl; pubTempl.templNum = sizeof(g_subKeyInfoInnerTempl) / sizeof(g_subKeyInfoInnerTempl[0]); } int32_t ret = BSL_ASN1_DecodeTemplate(&pubTempl, DecSubKeyInfoCb, &tmpBuff, &tmpBuffLen, pubAsn1, CRYPT_SUBKEYINFO_BITSTRING_IDX + 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t CRYPT_DECODE_AlgoIdAsn1Buff(uint8_t *buff, uint32_t buffLen, BSL_ASN1_DecTemplCallBack keyInfoCb, BSL_ASN1_Buffer *algoId, uint32_t algoIdNum) { uint8_t *tmpBuff = buff; uint32_t tmpBuffLen = buffLen; BSL_ASN1_DecTemplCallBack cb = keyInfoCb == NULL ? DecSubKeyInfoCb : keyInfoCb; BSL_ASN1_Template templ = {g_algoIdTempl, sizeof(g_algoIdTempl) / sizeof(g_algoIdTempl[0])}; return BSL_ASN1_DecodeTemplate(&templ, cb, &tmpBuff, &tmpBuffLen, algoId, algoIdNum); } int32_t CRYPT_DECODE_SubPubkey(uint8_t *buff, uint32_t buffLen, BSL_ASN1_DecTemplCallBack keyInfoCb, CRYPT_DECODE_SubPubkeyInfo *subPubkeyInfo, bool isComplete) { if (buff == NULL || subPubkeyInfo == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } BSL_ASN1_Buffer pubAsn1[CRYPT_SUBKEYINFO_BITSTRING_IDX + 1] = {0}; BSL_ASN1_BitString bitPubkey = {0}; BSL_ASN1_Buffer algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_ParseSubKeyInfo(buff, buffLen, pubAsn1, isComplete); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = CRYPT_DECODE_AlgoIdAsn1Buff(pubAsn1->buff, pubAsn1->len, keyInfoCb, algoId, BSL_ASN1_TAG_ALGOID_ANY_IDX + 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_ASN1_Buffer *oid = algoId; BSL_ASN1_Buffer *pubkey = &pubAsn1[CRYPT_SUBKEYINFO_BITSTRING_IDX]; ret = BSL_ASN1_DecodePrimitiveItem(pubkey, &bitPubkey); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BslOidString oidStr = {oid->len, (char *)oid->buff, 0}; BslCid cid = BSL_OBJ_GetCID(&oidStr); if (cid == BSL_CID_UNKNOWN) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_UNKNOWN_OID); return CRYPT_DECODE_UNKNOWN_OID; } subPubkeyInfo->keyType = cid; subPubkeyInfo->keyParam = *(algoId + 1); subPubkeyInfo->pubKey = bitPubkey; return CRYPT_SUCCESS; } static int32_t ParsePk8PriParamAsn1(BSL_ASN1_Buffer *encode, BSL_ASN1_DecTemplCallBack keyInfoCb, BslCid *keyType, BSL_ASN1_Buffer *keyParam) { BSL_ASN1_Buffer *algo = &encode[CRYPT_PK8_PRIKEY_ALGID_IDX]; // AlgorithmIdentifier BSL_ASN1_Buffer algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX + 1] = {0}; int32_t ret = CRYPT_DECODE_AlgoIdAsn1Buff(algo->buff, algo->len, keyInfoCb, algoId, BSL_ASN1_TAG_ALGOID_ANY_IDX + 1); if (ret != CRYPT_SUCCESS) { return ret; } BslOidString oidStr = {algoId[0].len, (char *)algoId[0].buff, 0}; BslCid cid = BSL_OBJ_GetCID(&oidStr); if (cid == BSL_CID_UNKNOWN) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_UNKNOWN_OID); return CRYPT_DECODE_UNKNOWN_OID; } *keyType = cid; *keyParam = *(algoId + 1); return CRYPT_SUCCESS; } int32_t CRYPT_DECODE_Pkcs8Info(uint8_t *buff, uint32_t buffLen, BSL_ASN1_DecTemplCallBack keyInfoCb, CRYPT_ENCODE_DECODE_Pk8PrikeyInfo *pk8PrikeyInfo) { if (buff == NULL || buffLen == 0 || pk8PrikeyInfo == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } uint8_t *tmpBuff = buff; uint32_t tmpBuffLen = buffLen; int32_t version = 0; BslCid keyType = BSL_CID_UNKNOWN; BSL_ASN1_Buffer keyParam = {0}; BSL_ASN1_Buffer asn1[CRYPT_PK8_PRIKEY_PRIKEY_IDX + 1] = {0}; BSL_ASN1_Template templ = {g_pk8PriKeyTempl, sizeof(g_pk8PriKeyTempl) / sizeof(g_pk8PriKeyTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&templ, NULL, &tmpBuff, &tmpBuffLen, asn1, CRYPT_PK8_PRIKEY_PRIKEY_IDX + 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BSL_ASN1_DecodePrimitiveItem(&asn1[CRYPT_PK8_PRIKEY_VERSION_IDX], &version); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_ASN1_Buffer octPriKey = asn1[CRYPT_PK8_PRIKEY_PRIKEY_IDX]; ret = ParsePk8PriParamAsn1(asn1, keyInfoCb, &keyType, &keyParam); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pk8PrikeyInfo->version = version; pk8PrikeyInfo->keyType = keyType; pk8PrikeyInfo->pkeyRawKey = octPriKey.buff; pk8PrikeyInfo->pkeyRawKeyLen = octPriKey.len; pk8PrikeyInfo->keyParam = keyParam; pk8PrikeyInfo->attrs = NULL; return CRYPT_SUCCESS; } #ifdef HITLS_CRYPTO_KEY_EPKI static int32_t ParseDeriveKeyPrfAlgId(BSL_ASN1_Buffer *asn, int32_t *prfId, BSL_ASN1_DecTemplCallBack keyInfoCb) { if (asn->len != 0) { BSL_ASN1_Buffer algoId[2] = {0}; int32_t ret = CRYPT_DECODE_AlgoIdAsn1Buff(asn->buff, asn->len, keyInfoCb, algoId, 2); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BslOidString oidStr = {algoId[BSL_ASN1_TAG_ALGOID_IDX].len, (char *)algoId[BSL_ASN1_TAG_ALGOID_IDX].buff, 0}; *prfId = BSL_OBJ_GetCID(&oidStr); if (*prfId == BSL_CID_UNKNOWN) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS8_INVALID_ALGO_PARAM); return CRYPT_DECODE_PKCS8_INVALID_ALGO_PARAM; } } else { *prfId = BSL_CID_HMAC_SHA1; } return CRYPT_SUCCESS; } static int32_t ParseDeriveKeyParam(BSL_Buffer *derivekeyData, uint32_t *iter, uint32_t *keyLen, BSL_Buffer *salt, int32_t *prfId, BSL_ASN1_DecTemplCallBack keyInfoCb) { uint8_t *tmpBuff = derivekeyData->data; uint32_t tmpBuffLen = derivekeyData->dataLen; BSL_ASN1_Buffer derParam[CRYPT_PKCS_ENC_DERPARAM_MAX] = {0}; BSL_ASN1_Template templ = {g_pbkdf2DerParamTempl, sizeof(g_pbkdf2DerParamTempl) / sizeof(g_pbkdf2DerParamTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&templ, NULL, &tmpBuff, &tmpBuffLen, derParam, CRYPT_PKCS_ENC_DERPARAM_MAX); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BslOidString oidStr = {derParam[CRYPT_PKCS_ENC_DERALG_IDX].len, (char *)derParam[CRYPT_PKCS_ENC_DERALG_IDX].buff, 0}; BslCid cid = BSL_OBJ_GetCID(&oidStr); if (cid != BSL_CID_PBKDF2) { // only pbkdf2 is supported BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS8_INVALID_ALGO_PARAM); return CRYPT_DECODE_PKCS8_INVALID_ALGO_PARAM; } ret = BSL_ASN1_DecodePrimitiveItem(&derParam[CRYPT_PKCS_ENC_DERITER_IDX], iter); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS8_INVALID_ITER); return CRYPT_DECODE_PKCS8_INVALID_ITER; } if (derParam[CRYPT_PKCS_ENC_DERKEYLEN_IDX].len != 0) { ret = BSL_ASN1_DecodePrimitiveItem(&derParam[CRYPT_PKCS_ENC_DERKEYLEN_IDX], keyLen); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS8_INVALID_KEYLEN); return CRYPT_DECODE_PKCS8_INVALID_KEYLEN; } } salt->data = derParam[CRYPT_PKCS_ENC_DERSALT_IDX].buff; salt->dataLen = derParam[CRYPT_PKCS_ENC_DERSALT_IDX].len; return ParseDeriveKeyPrfAlgId(&derParam[CRYPT_PKCS_ENC_DERPRF_IDX], prfId, keyInfoCb); } int32_t CRYPT_DECODE_ParseEncDataAsn1(CRYPT_EAL_LibCtx *libctx, const char *attrName, BslCid symAlg, EncryptPara *encPara, const BSL_Buffer *pwd, BSL_ASN1_DecTemplCallBack keyInfoCb, BSL_Buffer *decode) { uint32_t iter; int32_t prfId; uint32_t keylen = 0; uint8_t key[512] = {0}; // The maximum length of the symmetry algorithm BSL_Buffer salt = {0}; int32_t ret = ParseDeriveKeyParam(encPara->derivekeyData, &iter, &keylen, &salt, &prfId, keyInfoCb); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } uint32_t symKeyLen; ret = CRYPT_EAL_CipherGetInfo((CRYPT_CIPHER_AlgId)symAlg, CRYPT_INFO_KEY_LEN, &symKeyLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (keylen != 0 && symKeyLen != keylen) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PKCS8_INVALID_KEYLEN); return CRYPT_DECODE_PKCS8_INVALID_KEYLEN; } BSL_Buffer keyBuff = {key, symKeyLen}; ret = PbkdfDeriveKey(libctx, attrName, iter, prfId, &salt, pwd->data, pwd->dataLen, &keyBuff); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (encPara->enData->dataLen != 0) { uint8_t *output = BSL_SAL_Malloc(encPara->enData->dataLen); if (output == NULL) { (void)memset_s(key, sizeof(key), 0, sizeof(key)); BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL); return BSL_MALLOC_FAIL; } uint32_t dataLen = encPara->enData->dataLen; ret = CRYPT_ENCODE_DECODE_DecryptEncData(libctx, attrName, encPara->ivData, encPara->enData, symAlg, false, &keyBuff, output, &dataLen); if (ret != CRYPT_SUCCESS) { (void)memset_s(key, sizeof(key), 0, sizeof(key)); BSL_SAL_Free(output); BSL_ERR_PUSH_ERROR(ret); return ret; } decode->data = output; decode->dataLen = dataLen; } (void)memset_s(key, sizeof(key), 0, sizeof(key)); return CRYPT_SUCCESS; } int32_t CRYPT_DECODE_Pkcs8PrvDecrypt(CRYPT_EAL_LibCtx *libctx, const char *attrName, BSL_Buffer *buff, const BSL_Buffer *pwd, BSL_ASN1_DecTemplCallBack keyInfoCb, BSL_Buffer *decode) { if (buff == NULL || buff->dataLen == 0 || pwd == NULL || decode == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pwd->dataLen > PWD_MAX_LEN || (pwd->data == NULL && pwd->dataLen != 0)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } uint8_t *tmpBuff = buff->data; uint32_t tmpBuffLen = buff->dataLen; BSL_ASN1_Buffer asn1[CRYPT_PKCS_ENCPRIKEY_MAX] = {0}; BSL_ASN1_Template templ = {g_pk8EncPriKeyTempl, sizeof(g_pk8EncPriKeyTempl) / sizeof(g_pk8EncPriKeyTempl[0])}; int32_t ret = BSL_ASN1_DecodeTemplate(&templ, NULL, &tmpBuff, &tmpBuffLen, asn1, CRYPT_PKCS_ENCPRIKEY_MAX); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BslOidString encOidStr = {asn1[CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX].len, (char *)asn1[CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX].buff, 0}; BslCid cid = BSL_OBJ_GetCID(&encOidStr); if (cid != BSL_CID_PBES2) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_UNKNOWN_OID); return CRYPT_DECODE_UNKNOWN_OID; } // parse sym alg id BslOidString symOidStr = {asn1[CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX].len, (char *)asn1[CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX].buff, 0}; BslCid symId = BSL_OBJ_GetCID(&symOidStr); if (symId == BSL_CID_UNKNOWN) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_UNKNOWN_OID); return CRYPT_DECODE_UNKNOWN_OID; } BSL_Buffer derivekeyData = {asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].len}; BSL_Buffer ivData = {asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].len}; BSL_Buffer enData = {asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].len}; EncryptPara encPara = { .derivekeyData = &derivekeyData, .ivData = &ivData, .enData = &enData, }; ret = CRYPT_DECODE_ParseEncDataAsn1(libctx, attrName, symId, &encPara, pwd, keyInfoCb, decode); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif /* HITLS_CRYPTO_KEY_EPKI */ int32_t CRYPT_DECODE_ConstructBufferOutParam(BSL_Param **outParam, uint8_t *buffer, uint32_t bufferLen) { BSL_Param *result = BSL_SAL_Calloc(2, sizeof(BSL_Param)); if (result == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = BSL_PARAM_InitValue(&result[0], CRYPT_PARAM_DECODE_BUFFER_DATA, BSL_PARAM_TYPE_OCTETS, buffer, bufferLen); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(result); BSL_ERR_PUSH_ERROR(ret); return ret; } *outParam = result; return ret; } #endif /* HITLS_CRYPTO_KEY_DECODE */ #ifdef HITLS_CRYPTO_KEY_ENCODE #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) int32_t CRYPT_ENCODE_EccPrikeyAsn1Buff(BSL_ASN1_Buffer *asn1, uint32_t asn1Num, BSL_Buffer *encode) { BSL_ASN1_Template templ = {g_ecPriKeyTempl, sizeof(g_ecPriKeyTempl) / sizeof(g_ecPriKeyTempl[0])}; return BSL_ASN1_EncodeTemplate(&templ, asn1, asn1Num, &encode->data, &encode->dataLen); } #endif /* HITLS_CRYPTO_ECDSA || HITLS_CRYPTO_SM2 */ #ifdef HITLS_CRYPTO_RSA int32_t CRYPT_ENCODE_RsaPubkeyAsn1Buff(BSL_ASN1_Buffer *pubAsn1, BSL_Buffer *encodePub) { BSL_ASN1_Template pubTempl = {g_rsaPubTempl, sizeof(g_rsaPubTempl) / sizeof(g_rsaPubTempl[0])}; int32_t ret = BSL_ASN1_EncodeTemplate(&pubTempl, pubAsn1, CRYPT_RSA_PUB_E_IDX + 1, &encodePub->data, &encodePub->dataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return CRYPT_SUCCESS; } int32_t CRYPT_ENCODE_RsaPrikeyAsn1Buff(BSL_ASN1_Buffer *asn1, uint32_t asn1Num, BSL_Buffer *encode) { BSL_ASN1_Template templ = {g_rsaPrvTempl, sizeof(g_rsaPrvTempl) / sizeof(g_rsaPrvTempl[0])}; int32_t ret = BSL_ASN1_EncodeTemplate(&templ, asn1, asn1Num, &encode->data, &encode->dataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif int32_t CRYPT_ENCODE_SubPubkeyByInfo(BSL_ASN1_Buffer *algo, BSL_Buffer *bitStr, BSL_Buffer *encodeH, bool isComplete) { BSL_ASN1_Buffer encode[CRYPT_SUBKEYINFO_BITSTRING_IDX + 1] = {0}; encode[CRYPT_SUBKEYINFO_ALGOID_IDX].buff = algo->buff; encode[CRYPT_SUBKEYINFO_ALGOID_IDX].len = algo->len; encode[CRYPT_SUBKEYINFO_ALGOID_IDX].tag = BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE; BSL_ASN1_BitString bitPubkey = {bitStr->data, bitStr->dataLen, 0}; encode[CRYPT_SUBKEYINFO_BITSTRING_IDX].buff = (uint8_t *)&bitPubkey; encode[CRYPT_SUBKEYINFO_BITSTRING_IDX].len = sizeof(BSL_ASN1_BitString); encode[CRYPT_SUBKEYINFO_BITSTRING_IDX].tag = BSL_ASN1_TAG_BITSTRING; BSL_ASN1_Template pubTempl; if (isComplete) { pubTempl.templItems = g_subKeyInfoTempl; pubTempl.templNum = sizeof(g_subKeyInfoTempl) / sizeof(g_subKeyInfoTempl[0]); } else { pubTempl.templItems = g_subKeyInfoInnerTempl; pubTempl.templNum = sizeof(g_subKeyInfoInnerTempl) / sizeof(g_subKeyInfoInnerTempl[0]); } int32_t ret = BSL_ASN1_EncodeTemplate(&pubTempl, encode, CRYPT_SUBKEYINFO_BITSTRING_IDX + 1, &encodeH->data, &encodeH->dataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t CRYPT_ENCODE_AlgoIdAsn1Buff(BSL_ASN1_Buffer *algoId, uint32_t algoIdNum, uint8_t **buff, uint32_t *buffLen) { BSL_ASN1_Template templ = {g_algoIdTempl, sizeof(g_algoIdTempl) / sizeof(g_algoIdTempl[0])}; return BSL_ASN1_EncodeTemplate(&templ, algoId, algoIdNum, buff, buffLen); } #ifdef HITLS_CRYPTO_KEY_EPKI static int32_t EncodeDeriveKeyParam(CRYPT_EAL_LibCtx *libCtx, CRYPT_Pbkdf2Param *param, BSL_Buffer *encode, BSL_Buffer *salt) { BSL_ASN1_Buffer derParam[CRYPT_PKCS_ENC_DERPRF_IDX + 1] = {0}; /* deralg */ BslOidString *oidPbkdf = BSL_OBJ_GetOID((BslCid)param->pbkdfId); if (oidPbkdf == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } derParam[CRYPT_PKCS_ENC_DERALG_IDX].buff = (uint8_t *)oidPbkdf->octs; derParam[CRYPT_PKCS_ENC_DERALG_IDX].len = oidPbkdf->octetLen; derParam[CRYPT_PKCS_ENC_DERALG_IDX].tag = BSL_ASN1_TAG_OBJECT_ID; /* salt */ int32_t ret = CRYPT_EAL_RandbytesEx(libCtx, salt->data, salt->dataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } derParam[CRYPT_PKCS_ENC_DERSALT_IDX].buff = salt->data; derParam[CRYPT_PKCS_ENC_DERSALT_IDX].len = salt->dataLen; derParam[CRYPT_PKCS_ENC_DERSALT_IDX].tag = BSL_ASN1_TAG_OCTETSTRING; /* iter */ ret = BSL_ASN1_EncodeLimb(BSL_ASN1_TAG_INTEGER, param->itCnt, &derParam[CRYPT_PKCS_ENC_DERITER_IDX]); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BSL_ASN1_Template templ = {g_pbkdf2DerParamTempl, sizeof(g_pbkdf2DerParamTempl) / sizeof(g_pbkdf2DerParamTempl[0])}; if (param->hmacId == CRYPT_MAC_HMAC_SHA1) { ret = BSL_ASN1_EncodeTemplate(&templ, derParam, CRYPT_PKCS_ENC_DERPRF_IDX + 1, &encode->data, &encode->dataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } BSL_SAL_FREE(derParam[CRYPT_PKCS_ENC_DERITER_IDX].buff); return ret; } BslOidString *oidHmac = BSL_OBJ_GetOID((BslCid)param->hmacId); if (oidHmac == NULL) { BSL_SAL_FREE(derParam[CRYPT_PKCS_ENC_DERITER_IDX].buff); BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } BSL_Buffer algo = {0}; BSL_ASN1_Buffer algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX + 1] = { {BSL_ASN1_TAG_OBJECT_ID, oidHmac->octetLen, (uint8_t *)oidHmac->octs}, {BSL_ASN1_TAG_NULL, 0, NULL}, }; ret = CRYPT_ENCODE_AlgoIdAsn1Buff(algoId, BSL_ASN1_TAG_ALGOID_ANY_IDX + 1, &algo.data, &algo.dataLen); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(derParam[CRYPT_PKCS_ENC_DERITER_IDX].buff); BSL_ERR_PUSH_ERROR(ret); return ret; } derParam[CRYPT_PKCS_ENC_DERPRF_IDX].buff = algo.data; derParam[CRYPT_PKCS_ENC_DERPRF_IDX].len = algo.dataLen; derParam[CRYPT_PKCS_ENC_DERPRF_IDX].tag = BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE; ret = BSL_ASN1_EncodeTemplate(&templ, derParam, CRYPT_PKCS_ENC_DERPRF_IDX + 1, &encode->data, &encode->dataLen); BSL_SAL_FREE(algo.data); BSL_SAL_FREE(derParam[CRYPT_PKCS_ENC_DERITER_IDX].buff); return ret; } static int32_t EncodeEncryptedData(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_Pbkdf2Param *pkcsParam, BSL_Buffer *unEncrypted, BSL_Buffer *salt, BSL_ASN1_Buffer *asn1) { int32_t ret; uint8_t *output = NULL; BSL_Buffer keyBuff = {0}; do { ret = CRYPT_EAL_CipherGetInfo(pkcsParam->symId, CRYPT_INFO_KEY_LEN, &keyBuff.dataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } keyBuff.data = (uint8_t *)BSL_SAL_Malloc(keyBuff.dataLen); if (keyBuff.data == NULL) { ret = BSL_MALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); break; } ret = PbkdfDeriveKey(libCtx, attrName, pkcsParam->itCnt, (int32_t)pkcsParam->hmacId, salt, pkcsParam->pwd, pkcsParam->pwdLen, &keyBuff); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } uint32_t pkcsDataLen = unEncrypted->dataLen + 16; // extras 16 for padding. output = (uint8_t *)BSL_SAL_Malloc(pkcsDataLen); if (output == NULL) { ret = BSL_MALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); break; } BSL_Buffer enData = {unEncrypted->data, unEncrypted->dataLen}; BSL_Buffer ivData = {asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].len}; ret = CRYPT_ENCODE_DECODE_DecryptEncData(libCtx, attrName, &ivData, &enData, (int32_t)pkcsParam->symId, true, &keyBuff, output, &pkcsDataLen); if (ret != CRYPT_SUCCESS) { break; } asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].buff = output; asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].len = pkcsDataLen; asn1[CRYPT_PKCS_ENCPRIKEY_ENCDATA_IDX].tag = BSL_ASN1_TAG_OCTETSTRING; BSL_SAL_ClearFree(keyBuff.data, keyBuff.dataLen); return ret; } while (0); BSL_SAL_ClearFree(keyBuff.data, keyBuff.dataLen); BSL_SAL_FREE(output); return ret; } static int32_t GenRandIv(CRYPT_EAL_LibCtx *libCtx, CRYPT_Pbkdf2Param *pkcsParam, BSL_ASN1_Buffer *asn1) { int32_t ret; BslOidString *oidSym = BSL_OBJ_GetOID((BslCid)pkcsParam->symId); if (oidSym == NULL) { return CRYPT_ERR_ALGID; } asn1[CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX].buff = (uint8_t *)oidSym->octs; asn1[CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX].len = oidSym->octetLen; asn1[CRYPT_PKCS_ENCPRIKEY_SYMALG_IDX].tag = BSL_ASN1_TAG_OBJECT_ID; uint32_t ivLen; ret = CRYPT_EAL_CipherGetInfo(pkcsParam->symId, CRYPT_INFO_IV_LEN, &ivLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (ivLen == 0) { asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].tag = BSL_ASN1_TAG_OCTETSTRING; return CRYPT_SUCCESS; } uint8_t *iv = (uint8_t *)BSL_SAL_Malloc(ivLen); if (iv == NULL) { BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL); return BSL_MALLOC_FAIL; } ret = CRYPT_EAL_RandbytesEx(libCtx, iv, ivLen); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(iv); BSL_ERR_PUSH_ERROR(ret); return ret; } asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].buff = iv; asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].len = ivLen; asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].tag = BSL_ASN1_TAG_OCTETSTRING; return ret; } int32_t CRYPT_ENCODE_PkcsEncryptedBuff(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_Pbkdf2Param *pkcsParam, BSL_Buffer *unEncrypted, BSL_ASN1_Buffer *asn1) { int32_t ret; BslOidString *oidPbes = BSL_OBJ_GetOID((BslCid)pkcsParam->pbesId); if (oidPbes == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } /* derivation param */ BSL_Buffer derParam = {0}; uint8_t *saltData = (uint8_t *)BSL_SAL_Malloc(pkcsParam->saltLen); if (saltData == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } do { BSL_Buffer salt = {saltData, pkcsParam->saltLen}; ret = EncodeDeriveKeyParam(libCtx, pkcsParam, &derParam, &salt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].buff = derParam.data; asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].len = derParam.dataLen; asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].tag = BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE; /* iv */ ret = GenRandIv(libCtx, pkcsParam, asn1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } /* encryptedData */ ret = EncodeEncryptedData(libCtx, attrName, pkcsParam, unEncrypted, &salt, asn1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } BSL_SAL_ClearFree(saltData, pkcsParam->saltLen); asn1[CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX].buff = (uint8_t *)oidPbes->octs; asn1[CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX].len = oidPbes->octetLen; asn1[CRYPT_PKCS_ENCPRIKEY_ENCALG_IDX].tag = BSL_ASN1_TAG_OBJECT_ID; return CRYPT_SUCCESS; } while (0); BSL_SAL_ClearFree(saltData, pkcsParam->saltLen); BSL_SAL_ClearFree(asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_DERPARAM_IDX].len); BSL_SAL_ClearFree(asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].buff, asn1[CRYPT_PKCS_ENCPRIKEY_SYMIV_IDX].len); return ret; } #endif // HITLS_CRYPTO_KEY_EPKI int32_t CRYPT_ENCODE_Pkcs8Info(CRYPT_ENCODE_DECODE_Pk8PrikeyInfo *pk8PrikeyInfo, BSL_Buffer *asn1) { if (pk8PrikeyInfo == NULL || asn1 == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } int32_t ret; BSL_ASN1_Buffer algo = {0}; BSL_ASN1_Buffer algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX + 1] = {0}; do { BslOidString *oidStr = BSL_OBJ_GetOID((BslCid)pk8PrikeyInfo->keyType); if (oidStr == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); ret = CRYPT_ERR_ALGID; break; } algoId[BSL_ASN1_TAG_ALGOID_IDX].buff = (uint8_t *)oidStr->octs; algoId[BSL_ASN1_TAG_ALGOID_IDX].len = oidStr->octetLen; algoId[BSL_ASN1_TAG_ALGOID_IDX].tag = BSL_ASN1_TAG_OBJECT_ID; algoId[BSL_ASN1_TAG_ALGOID_ANY_IDX] = pk8PrikeyInfo->keyParam; ret = CRYPT_ENCODE_AlgoIdAsn1Buff(algoId, BSL_ASN1_TAG_ALGOID_ANY_IDX + 1, &algo.buff, &algo.len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); break; } BSL_ASN1_Buffer encode[CRYPT_PK8_PRIKEY_PRIKEY_IDX + 1] = { {BSL_ASN1_TAG_INTEGER, sizeof(pk8PrikeyInfo->version), (uint8_t *)&pk8PrikeyInfo->version}, {BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, algo.len, algo.buff}, {BSL_ASN1_TAG_OCTETSTRING, pk8PrikeyInfo->pkeyRawKeyLen, pk8PrikeyInfo->pkeyRawKey} }; BSL_ASN1_Template pubTempl = {g_pk8PriKeyTempl, sizeof(g_pk8PriKeyTempl) / sizeof(g_pk8PriKeyTempl[0])}; ret = BSL_ASN1_EncodeTemplate(&pubTempl, encode, CRYPT_PK8_PRIKEY_PRIKEY_IDX + 1, &asn1->data, &asn1->dataLen); } while (0); BSL_SAL_ClearFree(algo.buff, algo.len); return ret; } #endif /* HITLS_CRYPTO_KEY_ENCODE */ #endif /* HITLS_CRYPTO_CODECSKEY */
2401_83913325/openHiTLS-examples_7925
crypto/codecskey/src/crypt_encode_decode_utils.c
C
unknown
43,490
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_KEY_INFO #include <stdint.h> #include <string.h> #include "bsl_err_internal.h" #include "bsl_obj_internal.h" #include "bsl_print.h" #include "crypt_utils.h" #include "crypt_eal_pkey.h" #include "crypt_errno.h" #include "crypt_encode_decode_key.h" #define CRYPT_UNKOWN_STRING "Unknown\n" #define CRYPT_UNSUPPORT_ALG "Unsupported alg\n" static inline int32_t PrintPubkeyBits(bool isEcc, uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio) { if (!isEcc) { return BSL_PRINT_Fmt(layer, uio, "Public-Key: (%d bit)\n", CRYPT_EAL_PkeyGetKeyBits(pkey)); } uint32_t bits = 0; int32_t ret = CRYPT_EAL_PkeyCtrl(pkey, CRYPT_CTRL_GET_ECC_ORDER_BITS, &bits, sizeof(uint32_t)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return BSL_PRINT_Fmt(layer, uio, "Public-Key: (%d bit)\n", bits); } #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) static int32_t GetEccPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_PkeyPub *pub) { uint32_t keyLen = CRYPT_EAL_PkeyGetKeyLen(pkey); if (keyLen == 0) { return CRYPT_DECODE_PRINT_NO_KEY; } uint8_t *buff = (uint8_t *)BSL_SAL_Malloc(keyLen); if (buff == NULL) { return CRYPT_MEM_ALLOC_FAIL; } pub->id = CRYPT_EAL_PkeyGetId(pkey); pub->key.eccPub.data = buff; pub->key.eccPub.len = keyLen; int32_t ret = CRYPT_EAL_PkeyGetPub(pkey, pub); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); BSL_SAL_Free(buff); pub->key.eccPub.data = NULL; } return ret; } static int32_t PrintEccPubkey(uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio) { RETURN_RET_IF(PrintPubkeyBits(true, layer, pkey, uio) != 0, CRYPT_DECODE_PRINT_KEYBITS); /* pub key */ CRYPT_EAL_PkeyPub pub = {0}; int32_t ret = GetEccPub(pkey, &pub); if (ret != CRYPT_SUCCESS) { return ret; } if (BSL_PRINT_Fmt(layer, uio, "Pub:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pub.key.eccPub.data, pub.key.eccPub.len, uio) != 0) { BSL_SAL_Free(pub.key.eccPub.data); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_ECC_PUB); return CRYPT_DECODE_PRINT_ECC_PUB; } BSL_SAL_Free(pub.key.eccPub.data); /* ASN1 OID */ CRYPT_PKEY_ParaId paraId = CRYPT_EAL_PkeyGetId(pkey) == CRYPT_PKEY_SM2 ? CRYPT_ECC_SM2 : CRYPT_EAL_PkeyGetParaId(pkey); const char *name = BSL_OBJ_GetOidNameFromCID((BslCid)paraId); if (BSL_PRINT_Fmt(layer, uio, "ANS1 OID: %s\n", name == NULL ? CRYPT_UNKOWN_STRING : name) != 0) { BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_ECC_OID); return CRYPT_DECODE_PRINT_ECC_OID; } return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_ECDSA || HITLS_CRYPTO_SM2 #ifdef HITLS_CRYPTO_RSA static int32_t GetRsaPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_PkeyPub *pub) { uint32_t keyLen = CRYPT_EAL_PkeyGetKeyLen(pkey); if (keyLen == 0) { return CRYPT_DECODE_PRINT_NO_KEY; } uint8_t *buff = (uint8_t *)BSL_SAL_Malloc(keyLen * 2); // 2: n + e if (buff == NULL) { return CRYPT_MEM_ALLOC_FAIL; } pub->id = CRYPT_PKEY_RSA; pub->key.rsaPub.n = buff; pub->key.rsaPub.e = buff + keyLen; pub->key.rsaPub.nLen = keyLen; pub->key.rsaPub.eLen = keyLen; int32_t ret = CRYPT_EAL_PkeyGetPub(pkey, pub); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); BSL_SAL_Free(buff); pub->key.rsaPub.n = NULL; pub->key.rsaPub.e = NULL; } return ret; } int32_t CRYPT_EAL_PrintRsaPssPara(uint32_t layer, CRYPT_RSA_PssPara *para, BSL_UIO *uio) { if (para == NULL || uio == NULL) { return CRYPT_INVALID_ARG; } /* hash */ const char *mdIdName = BSL_OBJ_GetOidNameFromCID((BslCid)para->mdId); RETURN_RET_IF(BSL_PRINT_Fmt(layer, uio, "Hash Algorithm: %s%s\n", mdIdName == NULL ? CRYPT_UNKOWN_STRING : mdIdName, para->mdId == CRYPT_MD_SHA1 ? " (default)" : "") != BSL_SUCCESS, CRYPT_DECODE_PRINT_RSAPSS_PARA); /* mgf */ const char *mgfIdName = BSL_OBJ_GetOidNameFromCID((BslCid)para->mgfId); RETURN_RET_IF(BSL_PRINT_Fmt(layer, uio, "Mask Algorithm: %s%s\n", mgfIdName == NULL ? CRYPT_UNKOWN_STRING : mgfIdName, para->mgfId == CRYPT_MD_SHA1 ? " (default)" : "") != BSL_SUCCESS, CRYPT_DECODE_PRINT_RSAPSS_PARA); /* saltLen */ RETURN_RET_IF(BSL_PRINT_Fmt(layer, uio, "Salt Length: 0x%x%s\n", para->saltLen, para->saltLen == 20 ? " (default)" : "") != 0, CRYPT_DECODE_PRINT_RSAPSS_PARA); /* trailer is not supported */ return CRYPT_SUCCESS; } static int32_t PrintRsaPssPara(uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio) { CRYPT_RsaPadType padType = 0; int32_t ret = CRYPT_EAL_PkeyCtrl(pkey, CRYPT_CTRL_GET_RSA_PADDING, &padType, sizeof(CRYPT_RsaPadType)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (padType != CRYPT_EMSA_PSS) { return CRYPT_SUCCESS; } CRYPT_RSA_PssPara para = {0}; ret = CRYPT_EAL_GetRsaPssPara(pkey, &para); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (para.saltLen <= 0 && para.mdId == 0 && para.mgfId == 0) { return BSL_PRINT_Fmt(layer, uio, "No PSS parameter restrictions\n"); } RETURN_RET_IF(BSL_PRINT_Fmt(layer, uio, "PSS parameter restrictions:\n") != 0, CRYPT_DECODE_PRINT_RSAPSS_PARA); return CRYPT_EAL_PrintRsaPssPara(layer + 1, &para, uio); } static int32_t PrintRsaPubkey(uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio) { RETURN_RET_IF(PrintPubkeyBits(false, layer, pkey, uio) != 0, CRYPT_DECODE_PRINT_KEYBITS); /* pub key */ CRYPT_EAL_PkeyPub pub = {0}; int32_t ret = GetRsaPub(pkey, &pub); if (ret != CRYPT_SUCCESS) { return ret; } if (BSL_PRINT_Fmt(layer, uio, "Modulus:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pub.key.rsaPub.n, pub.key.rsaPub.nLen, uio) != 0) { BSL_SAL_Free(pub.key.rsaPub.n); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_MODULUS); return CRYPT_DECODE_PRINT_MODULUS; } if (BSL_PRINT_Number(layer, "Exponent", pub.key.rsaPub.e, pub.key.rsaPub.eLen, uio) != 0) { BSL_SAL_Free(pub.key.rsaPub.n); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_EXPONENT); return CRYPT_DECODE_PRINT_EXPONENT; } BSL_SAL_Free(pub.key.rsaPub.n); return PrintRsaPssPara(layer, pkey, uio); } #endif // HITLS_CRYPTO_RSA int32_t CRYPT_EAL_PrintPubkey(uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio) { if (uio == NULL) { return CRYPT_INVALID_ARG; } CRYPT_PKEY_AlgId algId = CRYPT_EAL_PkeyGetId(pkey); switch (algId) { #ifdef HITLS_CRYPTO_RSA case CRYPT_PKEY_RSA: return PrintRsaPubkey(layer, pkey, uio); #endif #if defined(HITLS_CRYPTO_ECDSA) || defined(HITLS_CRYPTO_SM2) case CRYPT_PKEY_ECDSA: case CRYPT_PKEY_SM2: return PrintEccPubkey(layer, pkey, uio); #endif default: return CRYPT_DECODE_PRINT_UNSUPPORT_ALG; } } #ifdef HITLS_CRYPTO_RSA static inline int32_t PrintPrikeyBits(bool isEcc, uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio) { if (!isEcc) { return BSL_PRINT_Fmt(layer, uio, "Private-Key: (%d bit)\n", CRYPT_EAL_PkeyGetKeyBits(pkey)); } uint32_t bits = 0; int32_t ret = CRYPT_EAL_PkeyCtrl(pkey, CRYPT_CTRL_GET_ECC_ORDER_BITS, &bits, sizeof(uint32_t)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return BSL_PRINT_Fmt(layer, uio, "Private-Key: (%d bit)\n", bits); } static int32_t PrintRsaPrikey(uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio) { RETURN_RET_IF(PrintPrikeyBits(false, layer, pkey, uio) != 0, CRYPT_DECODE_PRINT_KEYBITS); int32_t ret; /* pri key */ CRYPT_EAL_PkeyPrv pri = {0}; ret = CRYPT_EAL_InitRsaPrv(pkey, CRYPT_PKEY_RSA, &pri); if (ret != CRYPT_SUCCESS) { return ret; } ret = CRYPT_EAL_PkeyGetPrv(pkey, &pri); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_DeinitRsaPrv(&pri); return ret; } if (BSL_PRINT_Fmt(layer, uio, "Modulus:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pri.key.rsaPrv.n, pri.key.rsaPrv.nLen, uio) != 0) { CRYPT_EAL_DeinitRsaPrv(&pri); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_MODULUS); return CRYPT_DECODE_PRINT_MODULUS; } if (BSL_PRINT_Number(layer, "PublicExponent", pri.key.rsaPrv.e, pri.key.rsaPrv.eLen, uio) != 0) { CRYPT_EAL_DeinitRsaPrv(&pri); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_EXPONENT); return CRYPT_DECODE_PRINT_EXPONENT; } if (BSL_PRINT_Fmt(layer, uio, "PrivateExponent:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pri.key.rsaPrv.d, pri.key.rsaPrv.dLen, uio) != 0) { CRYPT_EAL_DeinitRsaPrv(&pri); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_MODULUS); return CRYPT_DECODE_PRINT_MODULUS; } if (BSL_PRINT_Fmt(layer, uio, "Prime1:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pri.key.rsaPrv.p, pri.key.rsaPrv.pLen, uio) != 0) { CRYPT_EAL_DeinitRsaPrv(&pri); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_MODULUS); return CRYPT_DECODE_PRINT_MODULUS; } if (BSL_PRINT_Fmt(layer, uio, "Prime2:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pri.key.rsaPrv.q, pri.key.rsaPrv.qLen, uio) != 0) { CRYPT_EAL_DeinitRsaPrv(&pri); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_MODULUS); return CRYPT_DECODE_PRINT_MODULUS; } if (BSL_PRINT_Fmt(layer, uio, "Exponent1:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pri.key.rsaPrv.dP, pri.key.rsaPrv.dPLen, uio) != 0) { CRYPT_EAL_DeinitRsaPrv(&pri); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_MODULUS); return CRYPT_DECODE_PRINT_MODULUS; } if (BSL_PRINT_Fmt(layer, uio, "Exponent2:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pri.key.rsaPrv.dQ, pri.key.rsaPrv.dQLen, uio) != 0) { CRYPT_EAL_DeinitRsaPrv(&pri); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_MODULUS); return CRYPT_DECODE_PRINT_MODULUS; } if (BSL_PRINT_Fmt(layer, uio, "Coefficient:\n") != 0 || BSL_PRINT_Hex(layer + 1, false, pri.key.rsaPrv.qInv, pri.key.rsaPrv.qInvLen, uio) != 0) { CRYPT_EAL_DeinitRsaPrv(&pri); BSL_ERR_PUSH_ERROR(CRYPT_DECODE_PRINT_MODULUS); return CRYPT_DECODE_PRINT_MODULUS; } CRYPT_EAL_DeinitRsaPrv(&pri); return CRYPT_SUCCESS; } #endif int32_t CRYPT_EAL_PrintPrikey(uint32_t layer, CRYPT_EAL_PkeyCtx *pkey, BSL_UIO *uio) { if (uio == NULL) { return CRYPT_INVALID_ARG; } CRYPT_PKEY_AlgId algId = CRYPT_EAL_PkeyGetId(pkey); switch (algId) { #ifdef HITLS_CRYPTO_RSA case CRYPT_PKEY_RSA: return PrintRsaPrikey(layer, pkey, uio); #endif default: return CRYPT_DECODE_PRINT_UNSUPPORT_ALG; } } #endif // HITLS_CRYPTO_KEY_INFO
2401_83913325/openHiTLS-examples_7925
crypto/codecskey/src/crypt_encode_print.c
C
unknown
11,557
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_CURVE25519_H #define CRYPT_CURVE25519_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_CURVE25519 #include <stdint.h> #include "crypt_local_types.h" #include "bsl_params.h" #ifdef __cplusplus extern "C" { #endif #define CRYPT_CURVE25519_KEYLEN 32 #define CRYPT_CURVE25519_SIGNLEN 64 typedef struct CryptCurve25519Ctx CRYPT_CURVE25519_Ctx; #ifdef HITLS_CRYPTO_X25519 /** * @ingroup curve25519 * @brief curve25519 Create a key pair structure and allocate memory space. * * @retval (CRYPT_CURVE25519_Ctx *) Pointer to the key pair structure * @retval NULL Invalid null pointer */ CRYPT_CURVE25519_Ctx *CRYPT_X25519_NewCtx(void); /** * @ingroup curve25519 * @brief curve25519 Create a key pair structure and allocate memory space. * * @param libCtx [IN] Library context * * @retval (CRYPT_CURVE25519_Ctx *) Pointer to the key pair structure * @retval NULL Invalid null pointer */ CRYPT_CURVE25519_Ctx *CRYPT_X25519_NewCtxEx(void *libCtx); #endif #ifdef HITLS_CRYPTO_ED25519 /** * @ingroup ed25519 * @brief curve25519 Create a key pair structure for ED25519 algorithm and allocate memory space. * * @retval (CRYPT_CURVE25519_Ctx *) Pointer to the key pair structure * @retval NULL Invalid null pointer */ CRYPT_CURVE25519_Ctx *CRYPT_ED25519_NewCtx(void); /** * @ingroup ed25519 * @brief curve25519 Create a key pair structure for ED25519 algorithm and allocate memory space. * * @param libCtx [IN] Library context * * @retval (CRYPT_CURVE25519_Ctx *) Pointer to the key pair structure * @retval NULL Invalid null pointer */ CRYPT_CURVE25519_Ctx *CRYPT_ED25519_NewCtxEx(void *libCtx); #endif /** * @ingroup curve25519 * @brief Copy the curve25519 context. The memory management of the return value is handed over to the caller. * * @param ctx [IN] Source curve25519 context. The CTX is set NULL by the invoker. * * @return CRYPT_CURVE25519_Ctx curve25519 Context pointer * If the operation fails, null is returned. */ CRYPT_CURVE25519_Ctx *CRYPT_CURVE25519_DupCtx(CRYPT_CURVE25519_Ctx *ctx); /** * @ingroup curve25519 * @brief Clear the curve25519 key pair data and releases memory. * * @param pkey [IN] curve25519 Key pair structure. The pkey is set NULL by the invoker. */ void CRYPT_CURVE25519_FreeCtx(CRYPT_CURVE25519_Ctx *pkey); /** * @ingroup curve25519 * @brief curve25519 Control interface * * @param pkey [IN/OUT] curve25519 Key pair structure * @param val [IN] Hash method, which must be SHA512. * @param opt [IN] Operation mode * @param len [IN] val length * * @retval CRYPT_SUCCESS set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval CRYPT_CURVE25519_UNSUPPORTED_CTRL_OPTION The opt mode is not supported. * @retval CRYPT_CURVE25519_HASH_METH_ERROR The hash method is not SHA512 */ int32_t CRYPT_CURVE25519_Ctrl(CRYPT_CURVE25519_Ctx *pkey, int32_t opt, void *val, uint32_t len); /** * @ingroup curve25519 * @brief curve25519 Set the public key. * * @param pkey [IN] curve25519 Key pair structure * @param pub [IN] Public key * * @retval CRYPT_SUCCESS set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval CRYPT_CURVE25519_KEYLEN_ERROR pubKeyLen is not equal to curve25519 public key length */ int32_t CRYPT_CURVE25519_SetPubKey(CRYPT_CURVE25519_Ctx *pkey, const CRYPT_Curve25519Pub *pub); /** * @ingroup curve25519 * @brief curve25519 Obtain the public key. * * @param pkey [IN] curve25519 Key pair structure * @param pub [OUT] Public key * * @retval CRYPT_SUCCESS set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval CRYPT_CURVE25519_NO_PUBKEY The key pair has no public key. * @retval CRYPT_CURVE25519_KEYLEN_ERROR pubKeyLen is less than curve25519 public key length. */ int32_t CRYPT_CURVE25519_GetPubKey(const CRYPT_CURVE25519_Ctx *pkey, CRYPT_Curve25519Pub *pub); /** * @ingroup curve25519 * @brief curve25519 Set the private key. * * @param pkey [IN] curve25519 Key pair structure * @param prv [IN] Private key * * @retval CRYPT_SUCCESS set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval CRYPT_CURVE25519_KEYLEN_ERROR prvKeyLen is not equal to curve25519 private key length */ int32_t CRYPT_CURVE25519_SetPrvKey(CRYPT_CURVE25519_Ctx *pkey, const CRYPT_Curve25519Prv *prv); /** * @ingroup curve25519 * @brief curve25519 Obtain the private key. * * @param pkey [IN] curve25519 Key pair structure * @param prv [OUT] private key * * @retval CRYPT_SUCCESS successfully set. * @retval CRYPT_NULL_INPUT Any input parameter is empty. * @retval CRYPT_CURVE25519_NO_PRVKEY The key pair has no private key. * @retval CRYPT_CURVE25519_KEYLEN_ERROR prvKeyLen is less than the private key length of curve25519. */ int32_t CRYPT_CURVE25519_GetPrvKey(const CRYPT_CURVE25519_Ctx *pkey, CRYPT_Curve25519Prv *prv); #ifdef HITLS_BSL_PARAMS /** * @ingroup curve25519 * @brief curve25519 Set the public key. * * @param pkey [IN] curve25519 Key pair structure * @param para [IN] Public key * * @retval CRYPT_SUCCESS set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval CRYPT_CURVE25519_KEYLEN_ERROR pubKeyLen is not equal to curve25519 public key length */ int32_t CRYPT_CURVE25519_SetPubKeyEx(CRYPT_CURVE25519_Ctx *pkey, const BSL_Param *para); /** * @ingroup curve25519 * @brief curve25519 Set the private key. * * @param pkey [IN] curve25519 Key pair structure * @param para [IN] Private key * * @retval CRYPT_SUCCESS set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval CRYPT_CURVE25519_KEYLEN_ERROR prvKeyLen is not equal to curve25519 private key length */ int32_t CRYPT_CURVE25519_SetPrvKeyEx(CRYPT_CURVE25519_Ctx *pkey, const BSL_Param *para); /** * @ingroup curve25519 * @brief curve25519 Obtain the public key. * * @param pkey [IN] curve25519 Key pair structure * @param para [OUT] Public key * * @retval CRYPT_SUCCESS set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval CRYPT_CURVE25519_NO_PUBKEY The key pair has no public key. * @retval CRYPT_CURVE25519_KEYLEN_ERROR pubKeyLen is less than curve25519 public key length. */ int32_t CRYPT_CURVE25519_GetPubKeyEx(const CRYPT_CURVE25519_Ctx *pkey, BSL_Param *para); /** * @ingroup curve25519 * @brief curve25519 Obtain the private key. * * @param pkey [IN] curve25519 Key pair structure * @param para [OUT] private key * * @retval CRYPT_SUCCESS successfully set. * @retval CRYPT_NULL_INPUT Any input parameter is empty. * @retval CRYPT_CURVE25519_NO_PRVKEY The key pair has no private key. * @retval CRYPT_CURVE25519_KEYLEN_ERROR prvKeyLen is less than the private key length of curve25519. */ int32_t CRYPT_CURVE25519_GetPrvKeyEx(const CRYPT_CURVE25519_Ctx *pkey, BSL_Param *para); #endif /** * @ingroup curve25519 * @brief curve25519 Obtain the key length, in bits. * * @param pkey [IN] curve25519 Key pair structure * * @retval Key length */ int32_t CRYPT_CURVE25519_GetBits(const CRYPT_CURVE25519_Ctx *pkey); #ifdef HITLS_CRYPTO_ED25519 /** * @ingroup curve25519 * @brief curve25519 Sign * * @param pkey [IN/OUT] curve25519 Key pair structure. A private key is required for signature. * After signature, a public key is generated. * @param algid [IN] md algid * @param msg [IN] Data to be signed * @param msgLen [IN] Data length: 0 <= msgLen <= (2^125 - 64) bytes * @param hashMethod [IN] SHA512 method * @param sign [OUT] Signature * @param signLen [IN/OUT] Length of the signature buffer (must be greater than 64 bytes)/Length of the signature * * @retval CRYPT_SUCCESS generated successfully. * @retval CRYPT_CURVE25519_NO_PRVKEY The key pair has no private key. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval Error code of the hash module. An error occurs in the sha512 operation. * @retval CRYPT_CURVE25519_NO_HASH_METHOD No hash method is set. * @retval CRYPT_CURVE25519_SIGNLEN_ERROR signLen is less than the signature length of curve25519. */ int32_t CRYPT_CURVE25519_Sign(CRYPT_CURVE25519_Ctx *pkey, int32_t algId, const uint8_t *msg, uint32_t msgLen, uint8_t *sign, uint32_t *signLen); /** * @ingroup curve25519 * @brief curve25519 Obtain the signature length, in bytes. * * @param pkey [IN] curve25519 Key pair structure * * @retval Signature length */ int32_t CRYPT_CURVE25519_GetSignLen(const CRYPT_CURVE25519_Ctx *pkey); /** * @ingroup curve25519 * @brief curve25519 Verification * * @param pkey [IN] curve25519 Key pair structure. A public key is required for signature verification. * @param algid [IN] md algid * @param msg [IN] Data * @param msgLen [IN] Data length: 0 <= msgLen <= (2^125 - 64) bytes * @param sign [IN] Signature * @param signLen [IN] Signature length, which must be 64 bytes * * @retval CRYPT_SUCCESS The signature verification is successful. * @retval CRYPT_CURVE25519_NO_PUBKEY The key pair has no public key. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval Error code of the hash module. An error occurs in the sha512 operation. * @retval CRYPT_CURVE25519_VERIFY_FAIL Failed to verify the signature. * @retval CRYPT_CURVE25519_INVALID_PUBKEY Invalid public key. * @retval CRYPT_CURVE25519_SIGNLEN_ERROR signLen is not equal to curve25519 signature length * @retval CRYPT_CURVE25519_NO_HASH_METHOD No hash method is set. */ int32_t CRYPT_CURVE25519_Verify(const CRYPT_CURVE25519_Ctx *pkey, int32_t algId, const uint8_t *msg, uint32_t msgLen, const uint8_t *sign, uint32_t signLen); /** * @ingroup curve25519 * @brief ed25519 Generate a key pair (public and private keys). * * @param pkey [IN/OUT] curve25519 Key pair structure/Key pair structure containing public and private keys * * @retval CRYPT_SUCCESS generated successfully. * @retval CRYPT_NO_REGIST_RAND Unregistered random number * @retval Error code of the hash module. An error occurs during the SHA512 operation. * @retval Error code of the registered random number module. Failed to obtain the random number. * @retval CRYPT_CURVE25519_NO_HASH_METHOD No hash method is set. * @retval CRYPT_NULL_INPUT The input parameter is empty. */ int32_t CRYPT_ED25519_GenKey(CRYPT_CURVE25519_Ctx *pkey); #endif /* HITLS_CRYPTO_ED25519 */ #ifdef HITLS_CRYPTO_X25519 /** * @ingroup curve25519 * @brief x25519 Calculate the shared key based on the private key of the local end and the public key of the peer end. * * @param prvKey [IN] curve25519 Key pair structure, local private key * @param pubKey [IN] curve25519 Key pair structure, peer public key * @param sharedKey [OUT] Shared key * @param shareKeyLen [IN/OUT] Shared key length * * @retval CRYPT_SUCCESS generated successfully. * @retval CRYPT_CURVE25519_KEY_COMPUTE_FAILED Failed to generate the shared key. */ int32_t CRYPT_CURVE25519_ComputeSharedKey(CRYPT_CURVE25519_Ctx *prvKey, CRYPT_CURVE25519_Ctx *pubKey, uint8_t *sharedKey, uint32_t *shareKeyLen); /** * @ingroup curve25519 * @brief x25519 Generate a key pair (public and private keys). * * @param pkey [IN/OUT] curve25519 Key pair structure/Key pair structure containing public and private keys * * @retval CRYPT_SUCCESS generated successfully. * @retval CRYPT_NO_REGIST_RAND Unregistered random number callback * @retval Error code of the registered random number module. Failed to obtain the random number. * @retval CRYPT_NULL_INPUT The input parameter is empty. */ int32_t CRYPT_X25519_GenKey(CRYPT_CURVE25519_Ctx *pkey); #endif /* HITLS_CRYPTO_X25519 */ /** * @ingroup curve25519 * @brief curve25519 Public key comparison * * @param a [IN] curve25519 Context structure * @param b [IN] curve25519 Context structure * * @retval CRYPT_SUCCESS is the same * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_CURVE25519_PUBKEY_NOT_EQUAL Public Keys are not equal */ int32_t CRYPT_CURVE25519_Cmp(const CRYPT_CURVE25519_Ctx *a, const CRYPT_CURVE25519_Ctx *b); /** * @ingroup curve25519 * @brief curve25519 get security bits * * @param ctx [IN] curve25519 Context structure * * @retval security bits */ int32_t CRYPT_CURVE25519_GetSecBits(const CRYPT_CURVE25519_Ctx *ctx); #ifdef HITLS_CRYPTO_PROVIDER /** * @ingroup curve25519 * @brief curve25519 import key * * @param ctx [IN/OUT] curve25519 context structure * @param params [IN] parameters */ int32_t CRYPT_CURVE25519_Import(CRYPT_CURVE25519_Ctx *ctx, const BSL_Param *params); /** * @ingroup curve25519 * @brief curve25519 export key * * @param ctx [IN] curve25519 context structure * @param params [IN/OUT] key parameters */ int32_t CRYPT_CURVE25519_Export(const CRYPT_CURVE25519_Ctx *ctx, BSL_Param *params); #endif // HITLS_CRYPTO_PROVIDER #ifdef HITLS_CRYPTO_ED25519_CHECK /** * @ingroup ed25519 * @brief ed25519 check key pair * * @param checkType [IN] check type * @param pkey1 [IN] ed25519 context structure * @param pkey2 [IN] ed25519 context structure * * @retval CRYPT_SUCCESS successfully. * @retval other error. */ int32_t CRYPT_ED25519_Check(uint32_t checkType, const CRYPT_CURVE25519_Ctx *pkey1, const CRYPT_CURVE25519_Ctx *pkey2); #endif // HITLS_CRYPTO_ED25519_CHECK #ifdef HITLS_CRYPTO_X25519_CHECK /** * @ingroup x25519 * @brief x25519 check key pair * * @param checkType [IN] check type * @param pkey1 [IN] x25519 context structure * @param pkey2 [IN] x25519 context structure * * @retval CRYPT_SUCCESS successfully. * @retval other error. */ int32_t CRYPT_X25519_Check(uint32_t checkType, const CRYPT_CURVE25519_Ctx *pkey1, const CRYPT_CURVE25519_Ctx *pkey2); #endif // HITLS_CRYPTO_X25519_CHECK #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_CURVE25519 #endif // CRYPT_CURVE25519_H
2401_83913325/openHiTLS-examples_7925
crypto/curve25519/include/crypt_curve25519.h
C
unknown
15,400
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_X25519 #include "crypt_arm.h" .file "x25519_armv8.S" .text .macro push_stack /* save register. */ stp x19, x20, [sp, #-16]! stp x21, x22, [sp, #-16]! sub sp, sp, #32 .endm .macro pop_stack add sp, sp, #32 /* pop register */ ldp x21, x22, [sp], #16 ldp x19, x20, [sp], #16 .endm .macro u64mul oper1, oper2 mul x19, \oper1, \oper2 umulh x2, \oper1, \oper2 .endm .macro u51mul cur, low, high u64mul x3, \cur adds \low, \low, x19 adc \high, \high, x2 .endm .macro reduce /* retain the last 51 bits */ mov x8, #0x7ffffffffffff /* 计算 h2' */ mov x3, x9 lsr x9, x9, #51 // carry(h2-low) lsl x10, x10, #13 // (h2-high) << 13 /* 计算 h0' */ mov x1, x4 lsr x4, x4, #51 // carry(h1-low) lsl x5, x5, #13 // (h1-high) << 13 /* 计算 h2' */ and x3, x3, x8 // h2' = rax = h2 & (2^51 - 1) = r12 & (2^51 - 1) orr x10, x10, x9 // r13 = (h2 >> 51) adds x11, x11, x10 // h3 += (h2 >> 51) adc x12, x12, XZR // h3-high carry /* 计算 h0' */ and x1, x1, x8 // h0' = rsi = h0 & (2^51 - 1) = r8 & (2^51 - 1) orr x5, x5, x4 // r9 = (h0 >> 51) adds x6, x6, x5 // h1 += (h0 >> 51) adc x7, x7, XZR // h1-high carry /* 计算 h3' */ mov x4, x11 // h3-low -> x4 lsr x11, x11, #51 // h3->low >> 51 lsl x12, x12, #13 // h3-high << 13 and x4, x4, x8 // h3' = r8 = h3 & (2^51 - 1) = r14 & (2^51 - 1) orr x12, x12, x11 // r15 = (h3 >> 51) adds x13, x13, x12 // h4 += (h3 >> 51) adc x14, x14, XZR // h4-high carry /* 计算 h1' */ mov x2, x6 // h1-low -> x2 lsr x6, x6, #51 // h1->low >> 51 lsl x7, x7, #13 // h1-high << 13 and x2, x2, x8 // h1' = rdx = h1 & (2^51 - 1) = r10 & (2^51 - 1) orr x7, x7, x6 // r11 = (h1 >> 51) adds x3, x3, x7 // h2 += (h1 >> 51) /* 计算 h4' */ mov x5, x13 // h4-low -> x5 lsr x13, x13, #51 // h4->low >> 51 lsl x14, x14, #13 // h4-high << 13 and x5, x5, x8 // h4' = r9 = h4 & (2^51 - 1) = rbx & (2^51 - 1) orr x14, x14, x13 // rcx = (h4 >> 51) /* out[0] = out[0] + 19 * carry */ lsl x6, x14, #3 adds x6, x6, x14 // h4-high * 8 + h4-high -> x6 (9 * h4-high) adds x14, x14, x6, lsl #1 // x6 *2 + x14 => x6 --- h4-high * 9 * 2 + h4-high adds x1, x1, x14 // h4-high * 19 +->h0-low /* h2 剩余 */ mov x6, x3 // h2-low -> x6 and x3, x8, x3 // h2 &= (2^51 - 1) lsr x6, x6, #51 // h2-low << 51 adds x4, x4, x6 // h2-low << 51 -> h3-low /* out[1] += out[0] >> 51 */ mov x6, x1 // h0-low -> x6 /* out[0] &= (2^51 - 1) */ and x1, x1, x8 // clear the upper 13 bits of h0-low lsr x6, x6, #51 // h0-low << 51 adds x2, x2, x6 // h0-low << 51 -> h1-low /* 存储结果 */ str x1, [x0] // h0' str x2, [x0, #8] // h1' str x3, [x0, #16] // h2' str x4, [x0, #24] // h3' str x5, [x0, #32] // h4' .endm ############################################################# # void Fp51Mul (Fp51 *out, const Fp51 *f, const Fp51 *g); ############################################################# .globl Fp51Mul .type Fp51Mul, @function .align 6 Fp51Mul: AARCH64_PACIASP /* save register */ push_stack /* * x0: out; x1: f; x2: g; fp51: array[u64; 5] */ ldr x3, [x1] // f0 ldr x13, [x2] // g0 ldp x11, x12, [x2, #8] // g1, g2 ldp x15, x14, [x2, #24] // g3, g4 str x0, [sp, #24] /* * x13, x11, and x12 will be overwritten in subsequent calculation, and g0 to g2 will be stored. */ mov x8, #19 /* h0 = f0g0 + 19f1g4 + 19f2g3 + 19f3g2 + 19f4g1; save in x4(low), x5(high) */ mul x4, x3, x13 // (x4, x5) = f0 * g0 umulh x5, x3, x13 str x13, [sp, #16] // g0 /* h1 = f0g1 + f1g0 + 19f2g4 + 19f3g3 + 19f4g2; save in x6, x7 */ mul x6, x3, x11 // (x6, x7) = f0 * g1 umulh x7, x3, x11 lsl x13, x14, #3 add x13, x13, x14 // g4 * 8 + g4 = g4 * 9 str x11, [sp, #8] // g1 /* h2 = f0g2 + f1g1 + f2g0 + 19f3g4 + 19f4g3; save in x9, x10 */ mul x9, x3, x12 // (x9, x10) = f0 * g2 umulh x10, x3, x12 lsl x0, x13, #1 add x0, x0, x14 // rdi = 2 * (9 * g4) + g4 str x12, [sp] // g2 /* h3 = f0g3 + f1g2 + f2g1 + f3g0 + 19f4g4; save in x11, x12 */ mul x11, x3, x15 // (x11, x12) = f0 * g3 umulh x12, x3, x15 /* h4 = f0g4 + f1g3 + f2g2 + f3g1 + f4g0; save in x13, x14 */ mul x13, x3, x14 // (x13, x14) = f0 * g4 umulh x14, x3, x14 ldr x3, [x1, #8] // f1 /* compute 19 * g4 */ u51mul x0, x4, x5 // (x4, x5) = 19 * f1 * g4; load f2 ldr x3, [x1, #16] u51mul x0, x6, x7 // (x6, x7) = 19 * f2 * g4; load f3 ldr x3, [x1, #24] u51mul x0, x9, x10 // (x9, x10) = 19 * f3 * g4; load f4 ldr x3, [x1, #32] u51mul x0, x11, x12 // (x11, x12) = 19 * f3 * g4; load f4 ldr x3, [x1, #8] mul x0, x15, x8 // 19 * g3 /* compute g3 */ u64mul x3, x15 // (x13, x14) = f1 * g3 ldr x15, [sp] // g2 adds x13, x13, x19 ldr x3, [x1, #16] // f2 adc x14, x14, x2 u51mul x0, x4, x5 // (x4, x5) = 19 * f2 * g3; load f3 ldr x3, [x1, #24] u51mul x0, x6, x7 // (x6, x7) = 19 * f3 * g3; load f4 ldr x3, [x1, #32] u64mul x3, x0 // (rax, rdx) = 19 * f4 * g3 mul x0, x15, x8 // 19 * g2 adds x9, x9, x19 ldr x3, [x1, #8] // f1 adc x10, x10, x2 /* compute g2 */ u51mul x15, x11, x12 // (x11, x12) = f1 * g2; load f2 ldr x3, [x1, #16] u64mul x3, x15 // (rax, rdx) = f2 * g2 ldr x15, [sp, #8] // g1 adds x13, x13, x19 ldr x3, [x1, #24] // f3 adc x14, x14, x2 u51mul x0, x4, x5 // (x4, x5) = 19 * f3 * g2; load f4 ldr x3, [x1, #32] u51mul x0, x6, x7 // (x6, x7) = 19 * f4 * g2; load f2 ldr x3, [x1, #8] /* compute g1 */ u64mul x3, x15 // (x19, x2) = f1 * g1 mul x0, x15, x8 // 19 * g1 adds x9, x9, x19 ldr x3, [x1, #16] // f2 adc x10, x10, x2 u51mul x15, x11, x12 // (x11, x12) += f2 * g1; load f3 ldr x3, [x1, #24] u64mul x3, x15 // (x19, x2) = f3 * g1 ldr x15, [sp, #16] // g0 adds x13, x13, x19 ldr x3, [x1, #32] // f4 adc x14, x14, x2 u51mul x0, x4, x5 // (x4, x5) += 19 * f4 * g1; load f1 ldr x3, [x1, #8] /* compute g0 */ u51mul x15, x6, x7 // (x6, x7) += f1 * g0; load f2 ldr x3, [x1, #16] u51mul x15, x9, x10 // (x9, x10) += f2 * g0; load f3 ldr x3, [x1, #24] u51mul x15, x11, x12 // (x11, x12) = f3 * g0; load f4 ldr x3, [x1, #32] u64mul x3, x15 // (x13, x14) += f4 * g0 adds x13, x13, x19 adc x14, x14, x2 /* pop stack register */ ldr x0, [sp, #24] reduce pop_stack AARCH64_AUTIASP ret .size Fp51Mul,.-Fp51Mul ############################################################# # void Fp51Square(Fp51 *out, const Fp51 *f); ############################################################# .globl Fp51Square .type Fp51Square, @function .align 6 Fp51Square: AARCH64_PACIASP push_stack /* * x0: out; x1: f; fp51 : array [u64; 5] */ ldr x3, [x1] // f0 ldr x12, [x1, #16] // f2 ldr x14, [x1, #32] // f4 mov x8, #19 lsl x2, x3, #1 // 2 * f0 str x0, [sp, #24] /* h0 = f0^2 + 38f1f4 + 38f2f3; save in x4, x5 */ mul x4, x3, x3 // (x4, x5) = f0^2 umulh x5, x3, x3 ldr x3, [x1, #8] // f1 /* h1 = 19f3^2 + 2f0f1 + 38f2g4; save in x6, x7 */ mul x6, x3, x2 // (x6, x7) = 2f0 * f1 umulh x7, x3, x2 str x12, [sp, #16] // save f2 /* h2 = f1^2 + 2f0f2 + 38f3g4; save in x9, x10 */ mul x9, x12, x2 // (x9, x10) = 2f0 * f2 umulh x10, x12, x2 ldr x3, [x1, #24] // f3 mul x0, x14, x8 // 19 * f4 /* h3 = 19f4^2 + 2f0f3 + 2f1f2; save in r14, r15 */ mul x11, x3, x2 // (x11, x12) = 2f0 * f3 umulh x12, x3, x2 mov x3, x14 // f4 /* h4 = f2^2 + 2f0f4 + 2f1f3; save in x13, x14 */ mul x13, x3, x2 // (x13, x14) = 2f0 * f4 umulh x14, x3, x2 /* * h3: compute 19 * f4 */ u51mul x0, x11, x12 // (x11, x12) += 19 * f4^2; load f1 ldr x3, [x1, #8] /* * h2 : compute f1 */ lsl x15, x3, #1 // 2 * f1 u51mul x3, x9, x10 // (x9, x10) += f1^2; load f2 ldr x3, [sp, #16] /* h3 */ u51mul x15, x11, x12 // (x11, x12) += 2 * f1 * f2; load f3 ldr x3, [x1, #24] /* h4 */ u51mul x15, x13, x14 // (x13, x14) = 2 * f1 * f3; load 2 * f1 mov x3, x15 ldr x1, [x1, #24] // f3 mul x15, x1, x8 // 19 * f3 /* h0 */ u64mul x3, x0 lsl x3, x1, #1 // 2 * f3 adds x4, x4, x19 // (x4, x5) += 2 * f1 * 19 * f4 adc x5, x5, x2 /* * h2: compute f3 */ u51mul x0, x9, x10 // (x9, x10) += f3 * 2 * 19 * f4; load f3 mov x3, x1 /* h1 */ u51mul x15, x6, x7 // (x6, x7) += 19 * f3 * f3; load f2 ldr x3, [sp, #16] /* * h4: compute f2 */ lsl x1, x3, #1 // 2 * f2 u51mul x3, x13, x14 // (x13, x14) += f2 * f2; load 19 * f3 mov x3, x15 /* h0 */ u51mul x1, x4, x5 // (x4, x5) = 2 * f2 * 19 * f3; load 2 * f2 mov x3, x1 /* h1 */ u64mul x3, x0 // (x6, x7) += 2 * f2 * 19 * f4 adds x6, x19, x6 adc x7, x2, x7 ldr x0, [sp, #24] reduce pop_stack AARCH64_AUTIASP ret .size Fp51Square,.-Fp51Square ############################################################# # void Fp51MulScalar(Fp51 *out, const Fp51 *in); ############################################################# .globl Fp51MulScalar .type Fp51MulScalar, @function .align 6 Fp51MulScalar: AARCH64_PACIASP /* * x0: out; x1: in; fp51 array [u64; 5] */ /* mov 121666 */ mov x3, #0xDB42 movk x3, #0x1, lsl #16 /* ldr f0, f1 */ ldp x2, x8, [x1] /* h0 */ mul x4, x2, x3 // f0 * 121666 umulh x5, x2, x3 /* h1 */ mul x6, x8, x3 // f1 * 121666 umulh x7, x8, x3 /* ldr f2, f3 */ ldp x2, x8, [x1, #16] /* h2 */ mul x9, x2, x3 // f2 * 121666 umulh x10, x2, x3 /* h3 */ mul x11, x8, x3 // f3 * 121666 umulh x12, x8, x3 /* ldr f4 */ ldr x8, [x1, #32] /* h4 */ mul x13, x3, x8 // f4 * 121666 umulh x14, x3, x8 reduce AARCH64_AUTIASP ret .size Fp51MulScalar,.-Fp51MulScalar #endif
2401_83913325/openHiTLS-examples_7925
crypto/curve25519/src/asm/x25519_armv8.S
Unix Assembly
unknown
13,608
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_X25519 .file "x25519_x86_64.S" .text .macro push_stack /* Save register. The following registers need to be saved by the caller and restored when the function exits. */ pushq %rbx pushq %rbp pushq %r12 pushq %r13 pushq %r14 pushq %r15 /* Allocate stack space and store the following necessary content: */ leaq -32(%rsp), %rsp .endm .macro pop_stack /* Recovery register */ movq 32(%rsp),%r15 movq 40(%rsp),%r14 movq 48(%rsp),%r13 movq 56(%rsp),%r12 movq 64(%rsp),%rbp movq 72(%rsp),%rbx /* Restore stack pointer. The stack is opened with 32 bytes and 6 registers are restored. The total number is 80 bytes. */ leaq 80(%rsp), %rsp .endm .macro u51mul cur, low, high, next mulq \cur addq %rax, \low movq \next, %rax adcq %rdx, \high .endm .macro reduce /* Retain the last 51 digits. */ movq $0x7ffffffffffff, %rbp /* Calculate h2' */ movq %r12, %rax shrq $51, %r12 shlq $13, %r13 /* Calculate h0' */ movq %r8, %rsi shrq $51, %r8 shlq $13, %r9 /* Calculate h2' */ andq %rbp, %rax // h2' = rax = h2 & (2^51 - 1) = r12 & (2^51 - 1) orq %r12, %r13 // r13 = (h2 >> 51) addq %r13, %r14 // h3 += (h2 >> 51) adcq $0, %r15 /* Calculate h0' */ andq %rbp, %rsi // h0' = rsi = h0 & (2^51 - 1) = r8 & (2^51 - 1) orq %r8, %r9 // r9 = (h0 >> 51) addq %r9, %r10 // h1 += (h0 >> 51) adcq $0, %r11 /* Calculate h3' */ movq %r14, %r8 shrq $51, %r14 shlq $13, %r15 andq %rbp, %r8 // h3' = r8 = h3 & (2^51 - 1) = r14 & (2^51 - 1) orq %r14, %r15 // r15 = (h3 >> 51) addq %r15, %rbx // h4 += (h3 >> 51) adcq $0, %rcx /* Calculate h1' */ movq %r10, %rdx shrq $51, %r10 shlq $13, %r11 andq %rbp, %rdx // h1' = rdx = h1 & (2^51 - 1) = r10 & (2^51 - 1) orq %r10, %r11 // r11 = (h1 >> 51) addq %r11, %rax // h2 += (h1 >> 51) /* Calculate h4' */ movq %rbx, %r9 shrq $51, %rbx shlq $13, %rcx andq %rbp, %r9 // h4' = r9 = h4 & (2^51 - 1) = rbx & (2^51 - 1) orq %rbx, %rcx // rcx = (h4 >> 51) /* out[0] = out[0] + 19 * carry */ leaq (%rcx, %rcx, 8), %r10 // r10 = 8 * rcx leaq (%rcx, %r10, 2), %rcx // rcx = 2 * (8 * rcx) + rcx = 19 * rcx addq %rcx, %rsi /* h2 remaining */ movq %rax, %r10 andq %rbp, %rax // h2 &= (2^51 - 1) shrq $51, %r10 addq %r10, %r8 /* out[1] += out[0] >> 51 */ movq %rsi, %r10 /* out[0] &= (2^51 - 1) */ andq %rbp, %rsi shrq $51, %r10 addq %r10, %rdx /* Storing Results */ movq %rsi, (%rdi) // h0' movq %rdx, 8(%rdi) // h1' movq %rax, 16(%rdi) // h2' movq %r8, 24(%rdi) // h3' movq %r9, 32(%rdi) // h4' .endm ############################################################# # void Fp51Mul (Fp51 *out, const Fp51 *f, const Fp51 *g); ############################################################# .globl Fp51Mul .type Fp51Mul, @function .align 32 Fp51Mul: .cfi_startproc /* Save Register */ push_stack /* The input and output parameters are transferred by registers rdi, rsi, and rdx. * rdi: out; rsi: f; rdx: g; fp51 is an array of [u64; 5] * rdx will be overwritten in subsequent calculation. * Therefore, you need to load the data in the rdx variable in advance. */ movq (%rsi), %rax // f0 movq (%rdx), %rbx // g0 movq 8(%rdx), %r14 // g1 movq 16(%rdx), %r15 // g2 movq 24(%rdx), %rbp // g3, Store g0-g3, store g3 in unaffected registers movq 32(%rdx), %rcx // g4 /* Stores the out pointer and frees the rdi so that the rdi can be used in subsequent calculations. Stores 19 * g4. */ movq %rdi, 24(%rsp) movq %rax, %rdi // f0 /* r14, r15, rbx, and rcx will be overwritten in subsequent calculations. g0 to g2 will be stored. * Storage actions will be scattered in the calculation code for performance purposes. */ /* h0 = f0g0 + 19f1g4 + 19f2g3 + 19f3g2 + 19f4g1; Stored in r8, r9 */ mulq %rbx // (rax, rdx) = f0 * g0, in le movq %rax, %r8 movq %rdi, %rax // f0 movq %rbx, 16(%rsp) // g0 movq %rdx, %r9 /* h1 = f0g1 + f1g0 + 19f2g4 + 19f3g3 + 19f4g2; Stored in r10, r11 */ mulq %r14 // (rax, rdx) = f0 * g1 movq %rax, %r10 movq %rdi, %rax // f0 leaq (%rcx, %rcx, 8), %rbx // g4 * 8 + g4 = g4 * 9 movq %r14, 8(%rsp) // g1 movq %rdx, %r11 /* h2 = f0g2 + f1g1 + f2g0 + 19f3g4 + 19f4g3; Stored in r12, r13 */ mulq %r15 // (rax, rdx) = f0 * g2 movq %rax, %r12 movq %rdi, %rax // f0 leaq (%rcx, %rbx, 2), %rdi // rdi = 2 * (9 * g4) + g4, Store 19 * g4 to rdi before rcx is overwritten movq %r15, (%rsp) // g2 movq %rdx, %r13 /* h3 = f0g3 + f1g2 + f2g1 + f3g0 + 19f4g4; Stored in r14, r15 */ mulq %rbp // (rax, rdx) = f0 * g3 movq %rax, %r14 movq (%rsi), %rax // f0 movq %rdx, %r15 /* h4 = f0g4 + f1g3 + f2g2 + f3g1 + f4g0; Stored in rbx, rcx */ mulq %rcx // (rax, rdx) = f0 * g4 movq %rax, %rbx movq 8(%rsi), %rax // f1 movq %rdx, %rcx /* Calculate 19 * g4 related */ u51mul %rdi, %r8, %r9, 16(%rsi) // (rax, rdx) = 19 * f1 * g4; load f2 u51mul %rdi, %r10, %r11, 24(%rsi) // (rax, rdx) = 19 * f2 * g4; load f3 u51mul %rdi, %r12, %r13, 32(%rsi) // (rax, rdx) = 19 * f3 * g4; load f4 mulq %rdi // (rax, rdx) = 19 * f4 * g4 imulq $19, %rbp, %rdi // 19 * g3 addq %rax, %r14 movq 8(%rsi), %rax // f1 adcq %rdx, %r15 /* Calculate g3 related */ mulq %rbp // (rax, rdx) = f1 * g3 movq (%rsp), %rbp // g2 addq %rax, %rbx movq 16(%rsi), %rax // f2 adcq %rdx, %rcx u51mul %rdi, %r8, %r9, 24(%rsi) // (rax, rdx) = 19 * f2 * g3; load f3 u51mul %rdi, %r10, %r11, 32(%rsi) // (rax, rdx) = 19 * f3 * g3; load f4 mulq %rdi // (rax, rdx) = 19 * f4 * g3 imulq $19, %rbp, %rdi // 19 * g2 addq %rax, %r12 movq 8(%rsi), %rax // f1 adcq %rdx, %r13 /* Calculate g2 related */ u51mul %rbp, %r14, %r15, 16(%rsi) // (rax, rdx) = f1 * g2; load f2 mulq %rbp // (rax, rdx) = f2 * g2 movq 8(%rsp), %rbp // g1 addq %rax, %rbx movq 24(%rsi), %rax // f3 adcq %rdx, %rcx u51mul %rdi, %r8, %r9, 32(%rsi) // (rax, rdx) = 19 * f3 * g2; load f4 u51mul %rdi, %r10, %r11, 8(%rsi) // (rax, rdx) = 19 * f4 * g2; load f2 /* Calculate g1 related */ mulq %rbp // (rax, rdx) = f1 * g1 imulq $19, %rbp, %rdi // 19 * g1 addq %rax, %r12 movq 16(%rsi), %rax // f2 adcq %rdx, %r13 u51mul %rbp, %r14, %r15, 24(%rsi) // (rax, rdx) = f2 * g1; load f3 mulq %rbp // (rax, rdx) = f3 * g1 movq 16(%rsp), %rbp // g0 addq %rax, %rbx movq 32(%rsi), %rax // f4 adcq %rdx, %rcx u51mul %rdi, %r8, %r9, 8(%rsi) // (rax, rdx) = 19 * f4 * g1; load f1 /* Calculate g0 related */ u51mul %rbp, %r10, %r11, 16(%rsi) // (rax, rdx) = f1 * g0; load f2 u51mul %rbp, %r12, %r13, 24(%rsi) // (rax, rdx) = f2 * g0; load f3 u51mul %rbp, %r14, %r15, 32(%rsi) // (rax, rdx) = f3 * g0; load f4 mulq %rbp // (rax, rdx) = f4 * g0 addq %rax, %rbx adcq %rdx, %rcx /* Restore the stack pointer. */ movq 24(%rsp), %rdi reduce /* Recovery register */ pop_stack ret .cfi_endproc .size Fp51Mul,.-Fp51Mul ############################################################# # void Fp51Square(Fp51 *out, const Fp51 *f); ############################################################# .globl Fp51Square .type Fp51Square, @function .align 32 Fp51Square: .cfi_startproc /* Save Register */ push_stack /* The input and output parameters are transferred by registers rdi and rsi. * rdi: out; rsi: f; fp51 is an array of [u64; 5] * Loads only non-adjacent data, vacating registers for storage calculations */ movq (%rsi), %rax // f0 movq 16(%rsi), %r15 // f2 movq 32(%rsi), %rcx // f4 /* Open the stack and store the following necessary content, which is consistent with the Fp51Mul. * Stores the out pointer, frees the rdi, * so that the rdi can be used in subsequent calculations, and stores 19 * f4. */ leaq (%rax, %rax, 1), %rbp // 2 * f0 movq %rdi, 24(%rsp) /* h0 = f0^2 + 38f1f4 + 38f2f3; Stored in r8, r9 */ mulq %rax // (rax, rdx) = f0^2 movq %rax, %r8 movq 8(%rsi), %rax // f1 movq %rdx, %r9 /* h1 = 19f3^2 + 2f0f1 + 38f2g4; Stored in r10, r11 */ mulq %rbp // (rax, rdx) = 2f0 * f1 movq %rax, %r10 movq %r15, %rax // f2 movq %r15, 16(%rsp) // Store f2 for later use of rsi movq %rdx, %r11 /* h2 = f1^2 + 2f0f2 + 38f3g4; Stored in r12, r13 */ mulq %rbp // (rax, rdx) = 2f0 * f2 movq %rax, %r12 movq 24(%rsi), %rax // f3 movq %rdx, %r13 imulq $19, %rcx, %rdi // Store 19 * f4 to rdi before rcx is overwritten /* h3 = 19f4^2 + 2f0f3 + 2f1f2; Stored in r14, r15 */ mulq %rbp // (rax, rdx) = 2f0 * f3 movq %rax, %r14 movq %rcx, %rax // f4 movq %rdx, %r15 /* h4 = f2^2 + 2f0f4 + 2f1f3; Stored in rbx, rcx */ mulq %rbp // (rax, rdx) = 2f0 * f4 movq %rax, %rbx movq %rcx, %rax // f4 movq %rdx, %rcx /* Calculate 19 * f4 related * h3 */ u51mul %rdi, %r14, %r15, 8(%rsi) // (rax, rdx) = 19 * f4^2; load f1 movq 24(%rsi), %rsi // f3 /* Calculate f1 related * h2 */ leaq (%rax, %rax, 1), %rbp // 2 * f1 u51mul %rax, %r12, %r13, 16(%rsp) // (rax, rdx) = f1^2; load f2 /* h3 */ u51mul %rbp, %r14, %r15, %rsi // (rax, rdx) = 2 * f1 * f2; load f3 /* h4 */ u51mul %rbp, %rbx, %rcx, %rbp // (rax, rdx) = 2 * f1 * f3; load 2 * f1 imulq $19, %rsi, %rbp // 19 * f3 /* h0 */ mulq %rdi // (rax, rdx) = 2 * f1 * 19 * f4 addq %rax, %r8 leaq (%rsi, %rsi, 1), %rax // 2 * f3 adcq %rdx, %r9 /* Calculate f3 related * h2 */ u51mul %rdi, %r12, %r13, %rsi // (rax, rdx) = f3 * 2 * 19 * f4; load f3 /* h1 */ u51mul %rbp, %r10, %r11, 16(%rsp) // (rax, rdx) = 19 * f3^2; load f2 /* Calculate f2 related * h4 */ leaq (%rax, %rax, 1), %rsi // 2 * f2 u51mul %rax, %rbx, %rcx, %rbp // (rax, rdx) = f2^2; load 19 * f3 /* h0 */ u51mul %rsi, %r8, %r9, %rsi // (rax, rdx) = 2 * f2 * 19 * f3; load 2 * f2 /* h1 */ mulq %rdi // (rax, rdx) = 2 * f2 * 19 * f4 addq %rax, %r10 adcq %rdx, %r11 /* Recovery register */ movq 24(%rsp), %rdi reduce /* Recovery register */ pop_stack ret .cfi_endproc .size Fp51Square,.-Fp51Square ############################################################# # void Fp51MulScalar(Fp51 *out, const Fp51 *in); ############################################################# .globl Fp51MulScalar .type Fp51MulScalar, @function .align 32 Fp51MulScalar: .cfi_startproc /* Save Register */ push_stack /*The input and output parameters are transferred by registers rdi, rsi, and rdx. * rdi: out; rsi: in; rdx: scalar; fp51 Is an array of [u64; 5] * Open stack, consistent with Fp51Mul */ /* h0 */ movl $121666, %eax mulq (%rsi) // f0 * 121666 movq %rax, %r8 movl $121666, %eax // Modify the rax immediately after the rax is vacated. movq %rdx, %r9 /* h1 */ mulq 8(%rsi) // f1 * 121666 movq %rax, %r10 movl $121666, %eax movq %rdx, %r11 /* h2 */ mulq 16(%rsi) // f2 * 121666 movq %rax, %r12 movl $121666, %eax movq %rdx, %r13 /* h3 */ mulq 24(%rsi) // f3 * 121666 movq %rax, %r14 movl $121666, %eax movq %rdx, %r15 /* h4 */ mulq 32(%rsi) // f4 * 121666 movq %rax, %rbx movq %rdx, %rcx reduce /* Recovery register */ pop_stack ret .cfi_endproc .size Fp51MulScalar,.-Fp51MulScalar /** * Fp64 reduce: * +------+-----+-----+-----+------+ * | | r15 | r14 | r13 | r12 | * | | | | | 38 | * +-------------------------------+ * | | | | r12'| r12' | * | | | r13'| r13'| | * | | r14'| r14'| | | * | r15' | r15'| | | | * +-------------------------------+ * | | r11'| r10'| r9' | r8' | * | | | | |19r15'| * +-------------------------------+ * | | r11 | r10 | r9 | r8 | * +------+-----+-----+-----+------+ */ .macro Fp64Reduce xorq %rsi, %rsi movq $38, %rdx mulx %r12, %rax, %rbx adcx %rax, %r8 adox %rbx, %r9 mulx %r13, %rax, %rbx adcx %rax, %r9 adox %rbx, %r10 mulx %r14, %rax, %rbx adcx %rax, %r10 adox %rbx, %r11 mulx %r15, %rax, %r12 adcx %rax, %r11 adcx %rsi, %r12 adox %rsi, %r12 shld $1, %r11, %r12 movq $0x7FFFFFFFFFFFFFFF, %rbp andq %rbp, %r11 imulq $19, %r12, %r12 addq %r12, %r8 adcx %rsi, %r9 adcx %rsi, %r10 adcx %rsi, %r11 movq 0(%rsp), %rdi movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) movq %r8, 0(%rdi) .endm .globl Fp64Mul .type Fp64Mul,@function .align 32 Fp64Mul: .cfi_startproc pushq %rbp pushq %rbx pushq %r12 pushq %r13 pushq %r14 pushq %r15 pushq %rdi /** * (f3, f2, f1, f0) * (g3, g2, g1, g0) : * + + + + + + + + + * | | | | | A3 | A2 | A1 | A0 | * | | | | | B3 | B2 | B1 | B0 | * +------------------------------------------+ * | | | | | | |A0B0|A0B0| * | | | | | |A1B0|A1B0| | * | | | | |A2B0|A2B0| | | * | | | |A3B0|A3B0| | | | * | | | | | |A0B1|A0B1| | * | | | | |A1B1|A1B1| | | * | | | |A2B1|A2B1| | | | * | | |A3B1|A3B1| | | | | * | | | | |A2B0|A2B0| | | * | | | |A2B1|A2B1| | | | * | | |A2B2|A2B2| | | | | * | |A2B3|A2B3| | | | | | * | | | |A3B0|A3B0| | | | * | | |A3B1|A3B1| | | | | * | |A3B2|A3B2| | | | | | * |A3B3|A3B3| | | | | | | * +------------------------------------------+ * |r15 |r14 |r13 |r12 |r11 |r10 |r9 |r8 | * + + + + + + + + + */ movq 0(%rdx), %rcx movq 8(%rdx), %rbp movq 16(%rdx), %rdi movq 24(%rdx), %r15 movq 0(%rsi), %rdx xorq %r14, %r14 // (f3, f2, f1, f0) * g0 mulx %rcx, %r8, %rax mulx %rbp, %r9, %rbx adcx %rax, %r9 mulx %rdi, %r10, %rax adcx %rbx, %r10 mulx %r15, %r11, %r12 movq 8(%rsi), %rdx adcx %rax, %r11 adcx %r14, %r12 // (f3, f2, f1, f0) * g1 mulx %rcx, %rax, %rbx adcx %rax, %r9 adox %rbx, %r10 mulx %rbp, %rax, %rbx adcx %rax, %r10 adox %rbx, %r11 mulx %rdi, %rax, %rbx adcx %rax, %r11 adox %rbx, %r12 mulx %r15, %rax, %r13 movq 16(%rsi), %rdx adcx %rax, %r12 adox %r14, %r13 adcx %r14, %r13 // (f3, f2, f1, f0) * g2 mulx %rcx, %rax, %rbx adcx %rax, %r10 adox %rbx, %r11 mulx %rbp, %rax, %rbx adcx %rax, %r11 adox %rbx, %r12 mulx %rdi, %rax, %rbx adcx %rax, %r12 adox %rbx, %r13 mulx %r15, %rax, %r14 movq 24(%rsi), %rdx adcx %rax, %r13 movq $0, %rsi adox %rsi, %r14 adcx %rsi, %r14 // (f3, f2, f1, f0) * g3 mulx %rcx, %rax, %rbx adcx %rax, %r11 adox %rbx, %r12 mulx %rbp, %rax, %rbx adcx %rax, %r12 adox %rbx, %r13 mulx %rdi, %rax, %rbx adcx %rax, %r13 adox %rbx, %r14 mulx %r15, %rax, %r15 adcx %rax, %r14 adox %rsi, %r15 adcx %rsi, %r15 // reduce Fp64Reduce movq 8(%rsp), %r15 movq 16(%rsp), %r14 movq 24(%rsp), %r13 movq 32(%rsp), %r12 movq 40(%rsp), %rbx movq 48(%rsp), %rbp leaq 56(%rsp), %rsp ret .cfi_endproc .size Fp64Mul,.-Fp64Mul .globl Fp64Sqr .type Fp64Sqr,@function .align 32 Fp64Sqr: .cfi_startproc pushq %rbp pushq %rbx pushq %r12 pushq %r13 pushq %r14 pushq %r15 pushq %rdi /** * (f3, f2, f1, f0) ^ 2 : * +----+----+----+----+----+----+----+----+----+ * | | | | | | A3 | A2 | A1 | A0 | * | * | | | | | A3 | A2 | A1 | A0 | * +--------------------------------------------+ * | | | | | | |A0A1|A0A1| | * | | | | | |A0A2|A0A2| | | * | + | | | |A0A3|A0A3| | | | * | | | | |A1A2|A1A2| | | | * | | | |A1A3|A1A3| | | | | * | | |A2A3|A2A3| | | | | | * +--------------------------------------------+ * | *2 | |r14`|r13`|r12`|r11`|r10`|r9` | | * +--------------------------------------------+ * | |r15'|r14'|r13'|r12'|r11'|r10'|r9' | | * +--------------------------------------------+ * | | | | | | | |A0A0|A0A0| * | | | | | |A1A1|A1A1| | | * | + | | |A2A2|A2A2| | | | | * | |A3A3|A3A3| | | | | | | * +--------------------------------------------+ * | |r15 |r14 |r13 |r12 |r11 |r10 |r9 |r8 | * +--------------------------------------------+ */ movq 0(%rsi), %rbx // a0 movq 8(%rsi), %rcx // a1 movq 16(%rsi), %rbp // a2 movq 24(%rsi), %rdi // a3 xorq %r15, %r15 // (a1, a2, a3) * a0 movq %rbx, %rdx mulx %rcx, %r9, %rsi mulx %rbp, %r10, %rax adcx %rsi, %r10 mulx %rdi, %r11, %r12 movq %rcx, %rdx adcx %rax, %r11 adcx %r15, %r12 // (a2, a3) * a1 mulx %rbp, %rsi, %rax adcx %rsi, %r11 adox %rax, %r12 mulx %rdi, %rsi, %r13 movq %rbp, %rdx adcx %rsi, %r12 adcx %r15, %r13 adox %r15, %r13 // a3 * a2 mulx %rdi, %rsi, %r14 movq %rbx, %rdx adcx %rsi, %r13 adcx %r15, %r14 // (r9 --- r14) *2 shld $1, %r14, %r15 shld $1, %r13, %r14 shld $1, %r12, %r13 shld $1, %r11, %r12 shld $1, %r10, %r11 shld $1, %r9, %r10 shlq $1, %r9 xorq %r8, %r8 // clear cf flag // a0 * a0 mulx %rdx, %r8, %rax movq %rcx, %rdx adcx %rax, %r9 // a1 * a1 mulx %rdx, %rsi, %rax movq %rbp, %rdx adcx %rsi, %r10 adcx %rax, %r11 // a2 * a2 mulx %rdx, %rsi, %rax movq %rdi, %rdx adcx %rsi, %r12 adcx %rax, %r13 // a3 * a3 mulx %rdx, %rsi, %rax adcx %rsi, %r14 adcx %rax, %r15 // reduce Fp64Reduce movq 8(%rsp), %r15 movq 16(%rsp), %r14 movq 24(%rsp), %r13 movq 32(%rsp), %r12 movq 40(%rsp), %rbx movq 48(%rsp), %rbp leaq 56(%rsp), %rsp ret .cfi_endproc .size Fp64Sqr, .-Fp64Sqr .globl Fp64MulScalar .type Fp64MulScalar, @function .align 32 Fp64MulScalar: .cfi_startproc movl $121666, %edx mulx 0(%rsi), %r8, %rax mulx 8(%rsi), %r9, %rcx addq %rax, %r9 mulx 16(%rsi), %r10, %rax adcx %rcx, %r10 mulx 24(%rsi), %r11, %rcx adcx %rax, %r11 movl $0, %edx adcx %rdx, %rcx movq $0x7FFFFFFFFFFFFFFF, %rax shld $1, %r11, %rcx andq %rax, %r11 imulq $19, %rcx, %rcx addq %rcx, %r8 adcx %rdx, %r9 movq %r8, 0(%rdi) adcx %rdx, %r10 movq %r9, 8(%rdi) adcx %rdx, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size Fp64MulScalar, .-Fp64MulScalar .globl Fp64Add .type Fp64Add, @function .align 32 Fp64Add: .cfi_startproc movq 0(%rsi),%r8 movq 8(%rsi),%r9 addq 0(%rdx),%r8 adcx 8(%rdx),%r9 movq 16(%rsi),%r10 movq 24(%rsi),%r11 adcx 16(%rdx),%r10 adcx 24(%rdx),%r11 movq $0, %rax movq $38, %rcx cmovae %rax, %rcx addq %rcx, %r8 adcx %rax, %r9 adcx %rax, %r10 movq %r9, 8(%rdi) adcx %rax, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) cmovc %rcx, %rax addq %rax, %r8 movq %r8, 0(%rdi) ret .cfi_endproc .size Fp64Add, .-Fp64Add .globl Fp64Sub .type Fp64Sub,@function .align 32 Fp64Sub: .cfi_startproc movq 0(%rsi),%r8 movq 8(%rsi),%r9 subq 0(%rdx),%r8 sbbq 8(%rdx),%r9 movq 16(%rsi),%r10 movq 24(%rsi),%r11 sbbq 16(%rdx),%r10 sbbq 24(%rdx),%r11 movq $0, %rax movq $38, %rcx cmovae %rax, %rcx subq %rcx, %r8 sbbq %rax, %r9 sbbq %rax, %r10 movq %r9,8(%rdi) sbbq %rax, %r11 movq %r10,16(%rdi) cmovc %rcx, %rax movq %r11,24(%rdi) subq %rax, %r8 movq %r8,0(%rdi) ret .cfi_endproc .size Fp64Sub,.-Fp64Sub .globl Fp64PolyToData .type Fp64PolyToData,@function .align 32 Fp64PolyToData: .cfi_startproc movq 24(%rsi), %r11 movq 16(%rsi), %r10 xorq %rax, %rax leaq (%r11, %r11, 1), %rcx sarq $63, %r11 shrq $1, %rcx andq $19, %r11 addq $19, %r11 movq 0(%rsi), %r8 movq 8(%rsi), %r9 addq %r11, %r8 adcx %rax, %r9 adcx %rax, %r10 adcx %rax, %rcx leaq (%rcx, %rcx, 1), %r11 sarq $63, %rcx shrq $1, %r11 notq %rcx andq $19, %rcx subq %rcx, %r8 sbbq $0, %r9 movq %r8, 0(%rdi) movq %r9, 8(%rdi) sbbq $0, %r10 sbbq $0, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size Fp64PolyToData,.-Fp64PolyToData #endif
2401_83913325/openHiTLS-examples_7925
crypto/curve25519/src/asm/x25519_x86_64.S
Unix Assembly
unknown
25,769
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_X25519 #include "x25519_asm.h" #include "securec.h" #include "curve25519_local.h" #ifdef HITLS_CRYPTO_X25519_X8664 #include "crypt_utils.h" #endif // X25519 alternative implementation, faster but require asm #define CURVE25519_51BITS_MASK 0x7ffffffffffff #define CURVE25519_51BITS 51 static void Fp51DataToPoly(Fp51 *out, const uint8_t in[32]) { uint64_t h[5]; CURVE25519_BYTES7_LOAD(h, in); // load 7 bytes CURVE25519_BYTES6_LOAD(h + 1, in + 7); // load 6 bytes from in7 to h1 h[1] <<= 5; // shift 5 to fit 51 bits CURVE25519_BYTES7_LOAD(h + 2, in + 13); // load 7 bytes from in13 to h2 h[2] <<= 2; // shift 2 to fit 51 bits CURVE25519_BYTES6_LOAD(h + 3, in + 20); // load 6 bytes from in20 to h3 h[3] <<= 7; // shift 7 to fit 51 bits CURVE25519_BYTES6_LOAD(h + 4, in + 26); // load 6 bytes from in26 to h4 h[4] &= 0x7fffffffffff; // 41 bits mask = 0x7fffffffffff h[4] <<= 4; // shift 4 to fit 51 bits h[1] |= h[0] >> CURVE25519_51BITS; // carry h[0] -> h[1] h[0] &= CURVE25519_51BITS_MASK; // clear h[0] h[2] |= h[1] >> CURVE25519_51BITS; // carry h[1] -> h[2] h[1] &= CURVE25519_51BITS_MASK; // clear h[1] h[3] |= h[2] >> CURVE25519_51BITS; // carry h[2] -> h[3] h[2] &= CURVE25519_51BITS_MASK; // clear h[2] h[4] |= h[3] >> CURVE25519_51BITS; // carry h[3] -> h[4] h[3] &= CURVE25519_51BITS_MASK; // clear h[3] out->data[0] = h[0]; // 0 out->data[1] = h[1]; // 1 out->data[2] = h[2]; // 2 out->data[3] = h[3]; // 3 out->data[4] = h[4]; // 4 } static void Fp51UnloadTo8Bits(uint8_t out[32], uint64_t h[5]) { // load from uint64 to uint8, load 8 bits at a time out[0] = (uint8_t)h[0]; out[1] = (uint8_t)(h[0] >> 8); // load from position 8 to out[1] out[2] = (uint8_t)(h[0] >> 16); // load from position 16 to out[2] out[3] = (uint8_t)(h[0] >> 24); // load from position 24 to out[3] out[4] = (uint8_t)(h[0] >> 32); // load from position 32 to out[4] out[5] = (uint8_t)(h[0] >> 40); // load from position 40 to out[5] // load from position 48 from h[1] and (8-5)=3 bits from h[1] to out[6] out[6] = (uint8_t)((h[0] >> 48) | (uint8_t)(h[1] << 3)); out[7] = (uint8_t)(h[1] >> 5); // load h[1] from position 5 to out[7] out[8] = (uint8_t)(h[1] >> 13); // load h[1] from position 13 to out[8] out[9] = (uint8_t)(h[1] >> 21); // load h[1] from position 21 to out[9] out[10] = (uint8_t)(h[1] >> 29); // load h[1] from position 29 to out[10] out[11] = (uint8_t)(h[1] >> 37); // load h[1] from position 37 to out[11] // load from position 45 from h[1] and (8-2)=6 bits from h[2] to out[12] out[12] = (uint8_t)((h[1] >> 45) | (uint8_t)(h[2] << 6)); out[13] = (uint8_t)(h[2] >> 2); // load h[2] from position 2 to out[13] out[14] = (uint8_t)(h[2] >> 10); // load h[2] from position 10 to out[14] out[15] = (uint8_t)(h[2] >> 18); // load h[2] from position 18 to out[15] out[16] = (uint8_t)(h[2] >> 26); // load h[2] from position 26 to out[16] out[17] = (uint8_t)(h[2] >> 34); // load h[2] from position 34 to out[17] out[18] = (uint8_t)(h[2] >> 42); // load h[2] from position 42 to out[18] // load from position 50 from h[2] and (8-1)=7 bits from h[3] to out[19] out[19] = (uint8_t)((h[2] >> 50) | (uint8_t)(h[3] << 1)); out[20] = (uint8_t)(h[3] >> 7); // load h[3] from position 7 to out[20] out[21] = (uint8_t)(h[3] >> 15); // load h[3] from position 15 to out[21] out[22] = (uint8_t)(h[3] >> 23); // load h[3] from position 23 to out[22] out[23] = (uint8_t)(h[3] >> 31); // load h[3] from position 31 to out[23] out[24] = (uint8_t)(h[3] >> 39); // load h[3] from position 39 to out[24] // load from position 47 from h[3] and (4-4)=4 bits from h[4] to out[25] out[25] = (uint8_t)((h[3] >> 47) | (uint8_t)(h[4] << 4)); out[26] = (uint8_t)(h[4] >> 4); // load h[4] from position 4 to out[26] out[27] = (uint8_t)(h[4] >> 12); // load h[4] from position 12 to out[27] out[28] = (uint8_t)(h[4] >> 20); // load h[4] from position 20 to out[28] out[29] = (uint8_t)(h[4] >> 28); // load h[4] from position 28 to out[29] out[30] = (uint8_t)(h[4] >> 36); // load h[4] from position 36 to out[30] out[31] = (uint8_t)(h[4] >> 44); // load h[4] from position 44 to out[31] } static void Fp51PolyToData(const Fp51 *in, uint8_t out[32]) { uint64_t h[5]; h[0] = in->data[0]; // 0 h[1] = in->data[1]; // 1 h[2] = in->data[2]; // 2 h[3] = in->data[3]; // 3 h[4] = in->data[4]; // 4 uint64_t carry; carry = (h[0] + 19) >> CURVE25519_51BITS; // plus 19 then calculate carry carry = (h[1] + carry) >> CURVE25519_51BITS; // carry of h[1] carry = (h[2] + carry) >> CURVE25519_51BITS; // carry of h[2] carry = (h[3] + carry) >> CURVE25519_51BITS; // carry of h[3] carry = (h[4] + carry) >> CURVE25519_51BITS; // carry of h[4] h[0] += 19 * carry; // process carry h[4] -> h[0], h[0] += 19 * carry h[1] += h[0] >> CURVE25519_51BITS; // process carry h[0] -> h[1] h[0] &= CURVE25519_51BITS_MASK; // clear h[0] h[2] += h[1] >> CURVE25519_51BITS; // process carry h[1] -> h[2] h[1] &= CURVE25519_51BITS_MASK; // clear h[1] h[3] += h[2] >> CURVE25519_51BITS; // process carry h[2] -> h[3] h[2] &= CURVE25519_51BITS_MASK; // clear h[2] h[4] += h[3] >> CURVE25519_51BITS; // process carry h[3] -> h[4] h[3] &= CURVE25519_51BITS_MASK; // clear h[3] h[4] &= CURVE25519_51BITS_MASK; // clear h[4] Fp51UnloadTo8Bits(out, h); } /* out = in1 ^ (4 * 2 ^ (2 * times)) * in2 */ static inline void Fp51MultiSquare(Fp51 *in1, Fp51 *in2, Fp51 *out, int32_t times) { int32_t i; Fp51 temp1, temp2; Fp51Square(&temp1, in1); Fp51Square(&temp2, &temp1); for (i = 0; i < times; i++) { Fp51Square(&temp1, &temp2); Fp51Square(&temp2, &temp1); } Fp51Mul(out, in2, &temp2); } /* out = a ^ -1 */ static void Fp51Invert(Fp51 *out, const Fp51 *a) { Fp51 a0; /* save a^1 */ Fp51 a1; /* save a^2 */ Fp51 a2; /* save a^11 */ Fp51 a3; /* save a^(2^5-1) */ Fp51 a4; /* save a^(2^10-1) */ Fp51 a5; /* save a^(2^20-1) */ Fp51 a6; /* save a^(2^40-1) */ Fp51 a7; /* save a^(2^50-1) */ Fp51 a8; /* save a^(2^100-1) */ Fp51 a9; /* save a^(2^200-1) */ Fp51 a10; /* save a^(2^250-1) */ Fp51 temp1, temp2; /* We know a×b=1(mod p), then a and b are inverses of mod p, i.e. a=b^(-1), b=a^(-1); * According to Fermat's little theorem a^(p-1)=1(mod p), so a*a^(p-2)=1(mod p); * So the inverse element of a is a^(-1) = a^(p-2)(mod p) * Here it is, p=2^255-19, thus we need to compute a^(2^255-21)(mod(2^255-19)) */ /* a^1 */ CURVE25519_FP51_COPY(a0.data, a->data); /* a^2 */ Fp51Square(&a1, &a0); /* a^4 */ Fp51Square(&temp1, &a1); /* a^8 */ Fp51Square(&temp2, &temp1); /* a^9 */ Fp51Mul(&temp1, &a0, &temp2); /* a^11 */ Fp51Mul(&a2, &a1, &temp1); /* a^22 */ Fp51Square(&temp2, &a2); /* a^(2^5-1) = a^(9+22) */ Fp51Mul(&a3, &temp1, &temp2); /* a^(2^10-1) = a^(2^10-2^5) * a^(2^5-1) */ Fp51Square(&temp1, &a3); Fp51Square(&temp2, &temp1); Fp51Square(&temp1, &temp2); Fp51Square(&temp2, &temp1); Fp51Square(&temp1, &temp2); Fp51Mul(&a4, &a3, &temp1); /* a^(2^20-1) = a^(2^20-2^10) * a^(2^10-1) */ Fp51MultiSquare(&a4, &a4, &a5, 4); // (2 * 2) ^ 4 /* a^(2^40-1) = a^(2^40-2^20) * a^(2^20-1) */ Fp51MultiSquare(&a5, &a5, &a6, 9); // (2 * 2) ^ 9 /* a^(2^50-1) = a^(2^50-2^10) * a^(2^10-1) */ Fp51MultiSquare(&a6, &a4, &a7, 4); // (2 * 2) ^ 4 /* a^(2^100-1) = a^(2^100-2^50) * a^(2^50-1) */ Fp51MultiSquare(&a7, &a7, &a8, 24); // (2 * 2) ^ 24 /* a^(2^200-1) = a^(2^200-2^100) * a^(2^100-1) */ Fp51MultiSquare(&a8, &a8, &a9, 49); // (2 * 2) ^ 49 /* a^(2^250-1) = a^(2^250-2^50) * a^(2^50-1) */ Fp51MultiSquare(&a9, &a7, &a10, 24); // (2 * 2) ^ 24 /* a^(2^5*(2^250-1)) = (a^(2^250-1))^5 */ Fp51Square(&temp1, &a10); Fp51Square(&temp2, &temp1); Fp51Square(&temp1, &temp2); Fp51Square(&temp2, &temp1); Fp51Square(&temp1, &temp2); /* The output:a^(2^255-21) = a(2^5*(2^250-1)+11) = a^(2^5*(2^250-1)) * a^11 */ Fp51Mul(out, &a2, &temp1); } void Fp51ScalarMultiPoint(uint8_t out[32], const uint8_t scalar[32], const uint8_t point[32]) { uint8_t k[32]; const uint8_t *u = point; int32_t t; uint32_t swap; uint32_t kTemp; Fp51 x1, x2, x3; Fp51 z2, z3; Fp51 t1, t2; /* Decord the scalar into k */ CURVE25519_DECODE_LITTLE_ENDIAN(k, scalar); /* Reference RFC 7748 section 5:The constant a24 is (486662 - 2) / 4 = 121665 for curve25519/X25519 */ Fp51DataToPoly(&x1, u); CURVE25519_FP51_SET(x2.data, 1); CURVE25519_FP51_SET(z2.data, 0); CURVE25519_FP51_COPY(x3.data, x1.data); CURVE25519_FP51_SET(z3.data, 1); swap = 0; /* "bits" parameter set to 255 for x25519 */ /* For t = bits-1(254) down to 0: */ for (t = 254; t >= 0; t--) { /* t >> 3: calculation the index of bit; t & 7: Obtains the corresponding bit in the byte */ kTemp = (k[(uint32_t)t >> 3] >> ((uint32_t)t & 7)) & 1; /* kTemp = (k >> t) & 1 */ swap ^= kTemp; /* swap ^= kTemp */ CURVE25519_FP51_CSWAP(swap, x2.data, x3.data); /* (x_2, x_3) = cswap(swap, x_2, x_3) */ CURVE25519_FP51_CSWAP(swap, z2.data, z3.data); /* (z_2, z_3) = cswap(swap, z_2, z_3) */ swap = kTemp; /* swap = kTemp */ CURVE25519_FP51_SUB(t1.data, x3.data, z3.data); /* x3 = D */ CURVE25519_FP51_SUB(t2.data, x2.data, z2.data); /* t2 = B */ CURVE25519_FP51_ADD(x2.data, x2.data, z2.data); /* t1 = A */ CURVE25519_FP51_ADD(z2.data, x3.data, z3.data); /* x2 = C */ Fp51Mul(&z3, &t1, &x2); Fp51Mul(&z2, &z2, &t2); Fp51Square(&t1, &t2); Fp51Square(&t2, &x2); CURVE25519_FP51_ADD(x3.data, z3.data, z2.data); CURVE25519_FP51_SUB(z2.data, z3.data, z2.data); Fp51Mul(&x2, &t2, &t1); CURVE25519_FP51_SUB(t2.data, t2.data, t1.data); Fp51Square(&z2, &z2); Fp51MulScalar(&z3, &t2); // z2 *= 121665 + 1 = 121666 Fp51Square(&x3, &x3); CURVE25519_FP51_ADD(t1.data, t1.data, z3.data); Fp51Mul(&z3, &x1, &z2); Fp51Mul(&z2, &t2, &t1); } CURVE25519_FP51_CSWAP(swap, x2.data, x3.data); CURVE25519_FP51_CSWAP(swap, z2.data, z3.data); /* Return x2 * (z2 ^ (p - 2)) */ Fp51Invert(&t1, &z2); Fp51Mul(&t2, &x2, &t1); Fp51PolyToData(&t2, out); (void)memset_s(k, sizeof(k), 0, sizeof(k)); } #ifdef HITLS_CRYPTO_X25519_X8664 #define CURVE25519_63BITS_MASK 0x7fffffffffffffff #define CURVE25519_FP64_SET(dst, value) \ do { \ (dst)[0] = (value); \ (dst)[1] = 0; \ (dst)[2] = 0; \ (dst)[3] = 0; \ } while (0) #define CURVE25519_FP64_COPY(dst, src) \ do { \ (dst)[0] = (src)[0]; \ (dst)[1] = (src)[1]; \ (dst)[2] = (src)[2]; \ (dst)[3] = (src)[3]; \ } while (0) #define CURVE25519_BYTES8_LOAD(dst, src) \ do { \ dst = (uint64_t)(src)[0]; \ dst |= ((uint64_t)(src)[1]) << 8; \ dst |= ((uint64_t)(src)[2]) << 16; \ dst |= ((uint64_t)(src)[3]) << 24; \ dst |= ((uint64_t)(src)[4]) << 32; \ dst |= ((uint64_t)(src)[5]) << 40; \ dst |= ((uint64_t)(src)[6]) << 48; \ dst |= ((uint64_t)(src)[7]) << 56; \ } while (0) #define CURVE25519_FP64_CSWAP(s, a, b) \ do { \ uint64_t tt; \ const uint64_t tsMacro = 0 - (uint64_t)(s); \ for (uint32_t ii = 0; ii < 4; ii++) { \ tt = tsMacro & ((a)[ii] ^ (b)[ii]); \ (a)[ii] = (a)[ii] ^ tt; \ (b)[ii] = (b)[ii] ^ tt; \ } \ } while (0) static void Fp64DataToPoly(Fp64 h, const uint8_t *point) { uint8_t *tmp = (uint8_t *)(uintptr_t)point; CURVE25519_BYTES8_LOAD(h[0], tmp); tmp += 8; // the second 8 bytes CURVE25519_BYTES8_LOAD(h[1], tmp); tmp += 8; // the third 8 bytes CURVE25519_BYTES8_LOAD(h[2], tmp); tmp += 8; // the forth 8 bytes CURVE25519_BYTES8_LOAD(h[3], tmp); h[3] &= CURVE25519_63BITS_MASK; return; } /* out = in1 ^ (4 * 2 ^ (2 * times)) * in2 */ static inline void Fp64MultiSqr(Fp64 in1, Fp64 in2, Fp64 out, int32_t times) { int32_t i; Fp64 temp1, temp2; Fp64Sqr(temp1, in1); Fp64Sqr(temp2, temp1); for (i = 0; i < times; i++) { Fp64Sqr(temp1, temp2); Fp64Sqr(temp2, temp1); } Fp64Mul(out, in2, temp2); } static void Fe64Invert(Fp64 out, const Fp64 z) { Fp64 t0; Fp64 t1; Fp64 t2; Fp64 t3; Fp64 t4; Fp64Sqr(t0, z); /* t^2 */ Fp64Sqr(t1, t0); /* t^4 */ Fp64Sqr(t1, t1); /* t^8 */ Fp64Mul(t1, z, t1); /* t^9 */ Fp64Mul(t0, t0, t1); /* t^11 */ Fp64Sqr(t2, t0); /* t^22 */ Fp64Mul(t1, t1, t2); /* t^(2^5-1) = t^(9+22) */ /* t^(2^10-1) = t^(2^10-2^5) * t^(2^5-1) */ Fp64Sqr(t2, t1); Fp64Sqr(t4, t2); Fp64Sqr(t2, t4); Fp64Sqr(t4, t2); Fp64Sqr(t2, t4); Fp64Mul(t1, t2, t1); /* t^(2^20-1) = t^(2^20-2^10) * t^(2^10-1) */ Fp64MultiSqr(t1, t1, t2, 4); /* t^(2^40-1) = t^(2^40-2^20) * t^(2^20-1) */ Fp64MultiSqr(t2, t2, t4, 9); // (2 * 2) ^ 9 /* t^(2^50-1) = t^(2^50-2^10) * t^(2^10-1) */ Fp64MultiSqr(t4, t1, t2, 4); // (2 * 2) ^ 4 /* t^(2^100-1) = t^(2^100-2^50) * t^(2^50-1) */ Fp64MultiSqr(t2, t2, t1, 24); // (2 * 2) ^ 24 /* t^(2^200-1) = t^(2^200-2^100) * t^(2^100-1) */ Fp64MultiSqr(t1, t1, t4, 49); // (2 * 2) ^ 49 /* t^(2^250-1) = t^(2^250-2^50) * t^(2^50-1) */ Fp64MultiSqr(t4, t2, t3, 24); // (2 * 2) ^ 24 /* t^(2^5*(2^250-1)) = (t^(2^250-1))^5 */ Fp64Sqr(t1, t3); Fp64Sqr(t2, t1); Fp64Sqr(t1, t2); Fp64Sqr(t2, t1); Fp64Sqr(t1, t2); /* The output:t^(2^255-21) = t(2^5*(2^250-1)+11) = t^(2^5*(2^250-1)) * t^11 */ Fp64Mul(out, t0, t1); } void Fp64ScalarMultiPoint(uint8_t out[32], const uint8_t scalar[32], const uint8_t point[32]) { uint8_t e[32]; uint32_t swap = 0; int32_t t; Fp64 x1, x2, x3; Fp64 z2, z3; Fp64 t1, t2; CURVE25519_DECODE_LITTLE_ENDIAN(e, scalar); Fp64DataToPoly(x1, point); CURVE25519_FP64_SET(x2, 1); CURVE25519_FP64_SET(z2, 0); CURVE25519_FP64_COPY(x3, x1); CURVE25519_FP64_SET(z3, 1); for (t = 254; t >= 0; --t) { /* For t = bits-1(254) down to 0: */ /* t >> 3: calculation the index of bit; t & 7: Obtains the corresponding bit in the byte */ uint32_t kTemp = (e[(uint32_t)t >> 3] >> ((uint32_t)t & 7)) & 1; swap ^= kTemp; CURVE25519_FP64_CSWAP(swap, x2, x3); CURVE25519_FP64_CSWAP(swap, z2, z3); swap = kTemp; Fp64Sub(t1, x3, z3); Fp64Sub(t2, x2, z2); Fp64Add(x2, x2, z2); Fp64Add(z2, x3, z3); Fp64Mul(z3, x2, t1); Fp64Mul(z2, z2, t2); Fp64Sqr(t1, t2); Fp64Sqr(t2, x2); Fp64Add(x3, z3, z2); Fp64Sub(z2, z3, z2); Fp64Mul(x2, t2, t1); Fp64Sub(t2, t2, t1); Fp64Sqr(z2, z2); Fp64MulScalar(z3, t2); Fp64Sqr(x3, x3); Fp64Add(t1, t1, z3); Fp64Mul(z3, x1, z2); Fp64Mul(z2, t2, t1); } Fe64Invert(z2, z2); Fp64Mul(x2, x2, z2); Fp64PolyToData(out, x2); (void)memset_s(e, sizeof(e), 0, sizeof(e)); } #endif void ScalarMultiPoint(uint8_t out[32], const uint8_t scalar[32], const uint8_t point[32]) { #if defined (__x86_64__) && defined (HITLS_CRYPTO_X25519_X8664) if (IsSupportBMI2() && IsSupportADX()) { Fp64ScalarMultiPoint(out, scalar, point); return; } #endif Fp51ScalarMultiPoint(out, scalar, point); return; } #endif /* HITLS_CRYPTO_X25519 */
2401_83913325/openHiTLS-examples_7925
crypto/curve25519/src/asm_curve25519_ops.c
C
unknown
17,901
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CURVE25519 #include "securec.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_errno.h" #include "crypt_utils.h" #include "curve25519_local.h" #include "crypt_util_rand.h" #include "crypt_types.h" #include "eal_md_local.h" #ifdef HITLS_BSL_PARAMS #include "bsl_params.h" #include "crypt_params_key.h" #endif #ifdef HITLS_CRYPTO_X25519 CRYPT_CURVE25519_Ctx *CRYPT_X25519_NewCtx(void) { CRYPT_CURVE25519_Ctx *ctx = NULL; ctx = (CRYPT_CURVE25519_Ctx *)BSL_SAL_Malloc(sizeof(CRYPT_CURVE25519_Ctx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(ctx, sizeof(CRYPT_CURVE25519_Ctx), 0, sizeof(CRYPT_CURVE25519_Ctx)); ctx->keyType = CURVE25519_NOKEY; ctx->hashMethod = NULL; BSL_SAL_ReferencesInit(&(ctx->references)); return ctx; } CRYPT_CURVE25519_Ctx *CRYPT_X25519_NewCtxEx(void *libCtx) { CRYPT_CURVE25519_Ctx *ctx = CRYPT_X25519_NewCtx(); if (ctx == NULL) { return NULL; } ctx->libCtx = libCtx; return ctx; } #endif #ifdef HITLS_CRYPTO_ED25519 CRYPT_CURVE25519_Ctx *CRYPT_ED25519_NewCtx(void) { CRYPT_CURVE25519_Ctx *ctx = NULL; ctx = (CRYPT_CURVE25519_Ctx *)BSL_SAL_Malloc(sizeof(CRYPT_CURVE25519_Ctx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(ctx, sizeof(CRYPT_CURVE25519_Ctx), 0, sizeof(CRYPT_CURVE25519_Ctx)); ctx->hashMethod = EAL_MdFindDefaultMethod(CRYPT_MD_SHA512); if (ctx->hashMethod == NULL) { BSL_SAL_Free(ctx); BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return NULL; } ctx->keyType = CURVE25519_NOKEY; BSL_SAL_ReferencesInit(&(ctx->references)); return ctx; } CRYPT_CURVE25519_Ctx *CRYPT_ED25519_NewCtxEx(void *libCtx) { CRYPT_CURVE25519_Ctx *ctx = CRYPT_ED25519_NewCtx(); if (ctx == NULL) { return NULL; } ctx->libCtx = libCtx; return ctx; } #endif CRYPT_CURVE25519_Ctx *CRYPT_CURVE25519_DupCtx(CRYPT_CURVE25519_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } CRYPT_CURVE25519_Ctx *newCtx = (CRYPT_CURVE25519_Ctx *)BSL_SAL_Malloc(sizeof(CRYPT_CURVE25519_Ctx)); if (newCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memcpy_s(newCtx, sizeof(CRYPT_CURVE25519_Ctx), ctx, sizeof(CRYPT_CURVE25519_Ctx)); BSL_SAL_ReferencesInit(&(newCtx->references)); return newCtx; } static int32_t CRYPT_CURVE25519_GetLen(CRYPT_CURVE25519_Ctx *ctx, GetLenFunc func, void *val, uint32_t len) { if (val == NULL || len != sizeof(int32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } *(int32_t *)val = func(ctx); return CRYPT_SUCCESS; } static int32_t CRYPT_CURVE25519_GetKeyLen(const CRYPT_CURVE25519_Ctx *pkey) { (void)pkey; return CRYPT_CURVE25519_KEYLEN; } int32_t CRYPT_CURVE25519_Ctrl(CRYPT_CURVE25519_Ctx *pkey, int32_t opt, void *val, uint32_t len) { if (pkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } switch (opt) { case CRYPT_CTRL_GET_BITS: return CRYPT_CURVE25519_GetLen(pkey, (GetLenFunc)CRYPT_CURVE25519_GetBits, val, len); #ifdef HITLS_CRYPTO_ED25519 case CRYPT_CTRL_GET_SIGNLEN: return CRYPT_CURVE25519_GetLen(pkey, (GetLenFunc)CRYPT_CURVE25519_GetSignLen, val, len); #endif case CRYPT_CTRL_GET_SECBITS: return CRYPT_CURVE25519_GetLen(pkey, (GetLenFunc)CRYPT_CURVE25519_GetSecBits, val, len); case CRYPT_CTRL_GET_PUBKEY_LEN: case CRYPT_CTRL_GET_PRVKEY_LEN: case CRYPT_CTRL_GET_SHARED_KEY_LEN: return GetUintCtrl(pkey, val, len, (GetUintCallBack)CRYPT_CURVE25519_GetKeyLen); case CRYPT_CTRL_UP_REFERENCES: if (val == NULL || len != (uint32_t)sizeof(int)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } return BSL_SAL_AtomicUpReferences(&(pkey->references), (int *)val); #ifdef HITLS_CRYPTO_X25519 case CRYPT_CTRL_GEN_X25519_PUBLICKEY: if ((pkey->keyType & CURVE25519_PUBKEY) != 0) { return CRYPT_SUCCESS; } if ((pkey->keyType & CURVE25519_PRVKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PRVKEY); return CRYPT_CURVE25519_NO_PRVKEY; } CRYPT_X25519_PublicFromPrivate(pkey->prvKey, pkey->pubKey); pkey->keyType |= CURVE25519_PUBKEY; return CRYPT_SUCCESS; #endif default: break; } BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_UNSUPPORTED_CTRL_OPTION); return CRYPT_CURVE25519_UNSUPPORTED_CTRL_OPTION; } void CRYPT_CURVE25519_FreeCtx(CRYPT_CURVE25519_Ctx *pkey) { if (pkey == NULL) { return; } int ret = 0; BSL_SAL_AtomicDownReferences(&(pkey->references), &ret); if (ret > 0) { return; } BSL_SAL_ReferencesFree(&(pkey->references)); BSL_SAL_CleanseData((void *)(pkey), sizeof(CRYPT_CURVE25519_Ctx)); BSL_SAL_FREE(pkey); } #ifdef HITLS_BSL_PARAMS int32_t CRYPT_CURVE25519_SetPubKeyEx(CRYPT_CURVE25519_Ctx *pkey, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_Curve25519Pub pub = {0}; if (GetConstParamValue(para, CRYPT_PARAM_CURVE25519_PUBKEY, &pub.data, &pub.len) == NULL) { (void)GetConstParamValue(para, CRYPT_PARAM_PKEY_ENCODE_PUBKEY, (uint8_t **)&pub.data, &pub.len); } return CRYPT_CURVE25519_SetPubKey(pkey, &pub); } int32_t CRYPT_CURVE25519_SetPrvKeyEx(CRYPT_CURVE25519_Ctx *pkey, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_Curve25519Prv prv = {0}; (void)GetConstParamValue(para, CRYPT_PARAM_CURVE25519_PRVKEY, &prv.data, &prv.len); return CRYPT_CURVE25519_SetPrvKey(pkey, &prv); } int32_t CRYPT_CURVE25519_GetPubKeyEx(const CRYPT_CURVE25519_Ctx *pkey, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_Curve25519Pub pub = {0}; BSL_Param *paramPub = GetParamValue(para, CRYPT_PARAM_CURVE25519_PUBKEY, &pub.data, &(pub.len)); if (paramPub == NULL) { paramPub = GetParamValue(para, CRYPT_PARAM_PKEY_ENCODE_PUBKEY, &pub.data, &(pub.len)); } int32_t ret = CRYPT_CURVE25519_GetPubKey(pkey, &pub); if (ret != CRYPT_SUCCESS) { return ret; } paramPub->useLen = pub.len; return CRYPT_SUCCESS; } int32_t CRYPT_CURVE25519_GetPrvKeyEx(const CRYPT_CURVE25519_Ctx *pkey, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_Curve25519Prv prv = {0}; BSL_Param *paramPrv = GetParamValue(para, CRYPT_PARAM_CURVE25519_PRVKEY, &prv.data, &(prv.len)); int32_t ret = CRYPT_CURVE25519_GetPrvKey(pkey, &prv); if (ret != CRYPT_SUCCESS) { return ret; } paramPrv->useLen = prv.len; return CRYPT_SUCCESS; } #endif int32_t CRYPT_CURVE25519_SetPubKey(CRYPT_CURVE25519_Ctx *pkey, const CRYPT_Curve25519Pub *pub) { if (pkey == NULL || pub == NULL || pub->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pub->len != CRYPT_CURVE25519_KEYLEN) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_KEYLEN_ERROR); return CRYPT_CURVE25519_KEYLEN_ERROR; } /* The keyLen has been checked and does not have the overlong problem. The pkey memory is dynamically allocated and does not overlap with the pubkey memory. */ /* There is no failure case for memcpy_s. */ (void)memcpy_s(pkey->pubKey, CRYPT_CURVE25519_KEYLEN, pub->data, pub->len); pkey->keyType |= CURVE25519_PUBKEY; return CRYPT_SUCCESS; } int32_t CRYPT_CURVE25519_SetPrvKey(CRYPT_CURVE25519_Ctx *pkey, const CRYPT_Curve25519Prv *prv) { if (pkey == NULL || prv == NULL || prv->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (prv->len != CRYPT_CURVE25519_KEYLEN) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_KEYLEN_ERROR); return CRYPT_CURVE25519_KEYLEN_ERROR; } /* The keyLen has been checked and does not have the overlong problem. The pkey memory is dynamically allocated and does not overlap with the pubkey memory. */ /* There is no failure case for memcpy_s. */ (void)memcpy_s(pkey->prvKey, CRYPT_CURVE25519_KEYLEN, prv->data, prv->len); pkey->keyType |= CURVE25519_PRVKEY; return CRYPT_SUCCESS; } int32_t CRYPT_CURVE25519_GetPubKey(const CRYPT_CURVE25519_Ctx *pkey, CRYPT_Curve25519Pub *pub) { if (pkey == NULL || pub == NULL || pub->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pub->len < CRYPT_CURVE25519_KEYLEN) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_KEYLEN_ERROR); return CRYPT_CURVE25519_KEYLEN_ERROR; } if ((pkey->keyType & CURVE25519_PUBKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PUBKEY); return CRYPT_CURVE25519_NO_PUBKEY; } /* The keyLen has been checked and does not have the overlong problem. The pkey memory is dynamically allocated and does not overlap with the pubkey memory. */ /* There is no failure case for memcpy_s. */ (void)memcpy_s(pub->data, pub->len, pkey->pubKey, CRYPT_CURVE25519_KEYLEN); pub->len = CRYPT_CURVE25519_KEYLEN; return CRYPT_SUCCESS; } int32_t CRYPT_CURVE25519_GetPrvKey(const CRYPT_CURVE25519_Ctx *pkey, CRYPT_Curve25519Prv *prv) { if (pkey == NULL || prv == NULL || prv->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (prv->len < CRYPT_CURVE25519_KEYLEN) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_KEYLEN_ERROR); return CRYPT_CURVE25519_KEYLEN_ERROR; } if ((pkey->keyType & CURVE25519_PRVKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PRVKEY); return CRYPT_CURVE25519_NO_PRVKEY; } /* The keyLen has been checked and does not have the overlong problem. The pkey memory is dynamically allocated and does not overlap with the pubkey memory. */ /* There is no failure case for memcpy_s. */ (void)memcpy_s(prv->data, prv->len, pkey->prvKey, CRYPT_CURVE25519_KEYLEN); prv->len = CRYPT_CURVE25519_KEYLEN; return CRYPT_SUCCESS; } int32_t CRYPT_CURVE25519_GetBits(const CRYPT_CURVE25519_Ctx *pkey) { (void)pkey; return CRYPT_CURVE25519_KEYLEN * 8; // bits = 8 * bytes } #ifdef HITLS_CRYPTO_ED25519 static int32_t PrvKeyHash(const uint8_t *prvKey, uint32_t prvKeyLen, uint8_t *prvKeyHash, uint32_t prvHashLen, const EAL_MdMethod *hashMethod) { void *mdCtx = NULL; int32_t ret; uint32_t hashLen = prvHashLen; mdCtx = hashMethod->newCtx(NULL, hashMethod->id); if (mdCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ret = hashMethod->init(mdCtx, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->update(mdCtx, prvKey, prvKeyLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->final(mdCtx, prvKeyHash, &hashLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } EXIT: hashMethod->freeCtx(mdCtx); return ret; } static int32_t GetRHash(uint8_t r[CRYPT_CURVE25519_SIGNLEN], const uint8_t prefix[CRYPT_CURVE25519_KEYLEN], const uint8_t *msg, uint32_t msgLen, const EAL_MdMethod *hashMethod) { void *mdCtx = NULL; int32_t ret; uint32_t hashLen = CRYPT_CURVE25519_SIGNLEN; mdCtx = hashMethod->newCtx(NULL, hashMethod->id); if (mdCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ret = hashMethod->init(mdCtx, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->update(mdCtx, prefix, CRYPT_CURVE25519_KEYLEN); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->update(mdCtx, msg, msgLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->final(mdCtx, r, &hashLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } EXIT: hashMethod->freeCtx(mdCtx); return ret; } static int32_t GetKHash(uint8_t k[CRYPT_CURVE25519_SIGNLEN], const uint8_t r[CRYPT_CURVE25519_KEYLEN], const uint8_t pubKey[CRYPT_CURVE25519_KEYLEN], const uint8_t *msg, uint32_t msgLen, const EAL_MdMethod *hashMethod) { void *mdCtx = NULL; uint32_t hashLen = CRYPT_CURVE25519_SIGNLEN; mdCtx = hashMethod->newCtx(NULL, hashMethod->id); if (mdCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = hashMethod->init(mdCtx, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->update(mdCtx, r, CRYPT_CURVE25519_KEYLEN); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->update(mdCtx, pubKey, CRYPT_CURVE25519_KEYLEN); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->update(mdCtx, msg, msgLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = hashMethod->final(mdCtx, k, &hashLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } EXIT: hashMethod->freeCtx(mdCtx); return ret; } static int32_t SignInputCheck(const CRYPT_CURVE25519_Ctx *pkey, const uint8_t *msg, uint32_t msgLen, const uint8_t *sign, const uint32_t *signLen) { if (pkey == NULL || (msg == NULL && msgLen != 0) || sign == NULL || signLen == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((pkey->keyType & CURVE25519_PRVKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PRVKEY); return CRYPT_CURVE25519_NO_PRVKEY; } if (*signLen < CRYPT_CURVE25519_SIGNLEN) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_SIGNLEN_ERROR); return CRYPT_CURVE25519_SIGNLEN_ERROR; } if (pkey->hashMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_HASH_METHOD); return CRYPT_CURVE25519_NO_HASH_METHOD; } return CRYPT_SUCCESS; } int32_t CRYPT_CURVE25519_Sign(CRYPT_CURVE25519_Ctx *pkey, int32_t algId, const uint8_t *msg, uint32_t msgLen, uint8_t *sign, uint32_t *signLen) { (void)algId; uint8_t prvKeyHash[CRYPT_CURVE25519_SIGNLEN]; uint8_t r[CRYPT_CURVE25519_SIGNLEN]; uint8_t k[CRYPT_CURVE25519_SIGNLEN]; uint8_t outSign[CRYPT_CURVE25519_SIGNLEN]; GeE geTmp; int32_t ret = SignInputCheck(pkey, msg, msgLen, sign, signLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = PrvKeyHash(pkey->prvKey, CRYPT_CURVE25519_KEYLEN, prvKeyHash, CRYPT_CURVE25519_SIGNLEN, pkey->hashMethod); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } prvKeyHash[0] &= 0xf8; // on block 31, clear the highest bit prvKeyHash[31] &= 0x7f; // on block 31, set second highest bit to 1 prvKeyHash[31] |= 0x40; // if ctx has no public key, generate public key and store it in ctx if ((pkey->keyType & CURVE25519_PUBKEY) == 0) { ScalarMultiBase(&geTmp, prvKeyHash); PointEncoding(&geTmp, pkey->pubKey, CRYPT_CURVE25519_KEYLEN); pkey->keyType |= CURVE25519_PUBKEY; } ret = GetRHash(r, prvKeyHash + CRYPT_CURVE25519_KEYLEN, msg, msgLen, pkey->hashMethod); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ModuloL(r); ScalarMultiBase(&geTmp, r); PointEncoding(&geTmp, outSign, CRYPT_CURVE25519_SIGNLEN); ret = GetKHash(k, outSign, pkey->pubKey, msg, msgLen, pkey->hashMethod); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ModuloL(k); ScalarMulAdd(outSign + CRYPT_CURVE25519_KEYLEN, k, prvKeyHash, r); // The value of *signLen has been checked in SignInputCheck to ensure that // the value is greater than or equal to CRYPT_CURVE25519_SIGNLEN. // The sign memory is input from outside the function. The outSign memory is allocated within the function. // Memory overlap does not exist. There is no failure case for memcpy_s. (void)memcpy_s(sign, *signLen, outSign, CRYPT_CURVE25519_SIGNLEN); *signLen = CRYPT_CURVE25519_SIGNLEN; EXIT: BSL_SAL_CleanseData(prvKeyHash, sizeof(prvKeyHash)); BSL_SAL_CleanseData(r, sizeof(r)); BSL_SAL_CleanseData(k, sizeof(k)); return ret; } int32_t CRYPT_CURVE25519_GetSignLen(const CRYPT_CURVE25519_Ctx *pkey) { (void)pkey; return CRYPT_CURVE25519_SIGNLEN; } static int32_t VerifyInputCheck(const CRYPT_CURVE25519_Ctx *pkey, const uint8_t *msg, uint32_t msgLen, const uint8_t *sign, uint32_t signLen) { if (pkey == NULL || (msg == NULL && msgLen != 0) || sign == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((pkey->keyType & CURVE25519_PUBKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PUBKEY); return CRYPT_CURVE25519_NO_PUBKEY; } if (signLen != CRYPT_CURVE25519_SIGNLEN) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_SIGNLEN_ERROR); return CRYPT_CURVE25519_SIGNLEN_ERROR; } if (pkey->hashMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_HASH_METHOD); return CRYPT_CURVE25519_NO_HASH_METHOD; } return CRYPT_SUCCESS; } /* check 0 <= s < l, l = 2^252 + 27742317777372353535851937790883648493 */ static bool VerifyCheckSValid(const uint8_t s[CRYPT_CURVE25519_KEYLEN]) { const uint8_t l[CRYPT_CURVE25519_KEYLEN] = { 0xED, 0xD3, 0xF5, 0x5C, 0x1A, 0x63, 0x12, 0x58, 0xD6, 0x9C, 0xF7, 0xA2, 0xDE, 0xF9, 0xDE, 0x14, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10 }; int32_t i; // start from highest block 31 for (i = 31; i >= 0; i--) { if (s[i] > l[i]) { return false; } else if (s[i] < l[i]) { return true; } } // s = l is invalid return false; } int32_t CRYPT_CURVE25519_Verify(const CRYPT_CURVE25519_Ctx *pkey, int32_t algId, const uint8_t *msg, uint32_t msgLen, const uint8_t *sign, uint32_t signLen) { if (algId != CRYPT_MD_SHA512) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } GeE geA, sG; uint8_t kHash[CRYPT_CURVE25519_SIGNLEN]; uint8_t localR[CRYPT_CURVE25519_KEYLEN]; const uint8_t *r = NULL; const uint8_t *s = NULL; int32_t ret = VerifyInputCheck(pkey, msg, msgLen, sign, signLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } // r is first half of sign, length 32 r = sign; // s is second half of the sign, length 32 s = sign + 32; if (!VerifyCheckSValid(s)) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_VERIFY_FAIL); ret = CRYPT_CURVE25519_VERIFY_FAIL; return ret; } if (PointDecoding(&geA, pkey->pubKey) != 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_VERIFY_FAIL); ret = CRYPT_CURVE25519_INVALID_PUBKEY; return ret; } ret = GetKHash(kHash, r, pkey->pubKey, msg, msgLen, pkey->hashMethod); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } CURVE25519_FP_NEGATE(geA.x, geA.x); CURVE25519_FP_NEGATE(geA.t, geA.t); ModuloL(kHash); KAMulPlusMulBase(&sG, kHash, &geA, s); PointEncoding(&sG, localR, CRYPT_CURVE25519_KEYLEN); if (memcmp(localR, r, CRYPT_CURVE25519_KEYLEN) != 0) { ret = CRYPT_CURVE25519_VERIFY_FAIL; BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t CRYPT_ED25519_PublicFromPrivate(const uint8_t prvKey[CRYPT_CURVE25519_KEYLEN], uint8_t pubKey[CRYPT_CURVE25519_KEYLEN], const EAL_MdMethod *hashMethod) { GeE tmp; uint8_t prvKeyHash[CRYPT_CURVE25519_SIGNLEN]; int32_t ret = PrvKeyHash(prvKey, CRYPT_CURVE25519_KEYLEN, prvKeyHash, CRYPT_CURVE25519_SIGNLEN, hashMethod); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } prvKeyHash[0] &= 0xf8; // on block 31, clear the highest bit prvKeyHash[31] &= 0x7f; // on block 31, set second highest bit to 1 prvKeyHash[31] |= 0x40; ScalarMultiBase(&tmp, prvKeyHash); PointEncoding(&tmp, pubKey, CRYPT_CURVE25519_KEYLEN); BSL_SAL_CleanseData(prvKeyHash, sizeof(prvKeyHash)); return CRYPT_SUCCESS; } int32_t CRYPT_ED25519_GenKey(CRYPT_CURVE25519_Ctx *pkey) { if (pkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } // SHA512 digest size is 64, no other hash has 64 md size if (pkey->hashMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_HASH_METHOD); return CRYPT_CURVE25519_NO_HASH_METHOD; } int32_t ret; uint8_t prvKey[CRYPT_CURVE25519_KEYLEN]; ret = CRYPT_RandEx(pkey->libCtx, prvKey, sizeof(prvKey)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = CRYPT_ED25519_PublicFromPrivate(prvKey, pkey->pubKey, pkey->hashMethod); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // The pkey is not empty. The length of the prvKey is CRYPT_CURVE25519_KEYLEN, // which is the same as the length of local prvKey. // The pkey->prvKey memory is input outside the function. The local prvKey memory is allocated within the function. // Memory overlap does not exist. No failure case exists for memcpy_s. (void)memcpy_s(pkey->prvKey, CRYPT_CURVE25519_KEYLEN, prvKey, CRYPT_CURVE25519_KEYLEN); pkey->keyType = CURVE25519_PRVKEY | CURVE25519_PUBKEY; EXIT: BSL_SAL_CleanseData(prvKey, sizeof(prvKey)); return ret; } #endif /* HITLS_CRYPTO_ED25519 */ #ifdef HITLS_CRYPTO_X25519 /* Calculate the shared key based on the local private key and peer public key * Shared12 = prv1 * Pub2 = prv1 * (prv2 * G) = prv1 * prv2 * G */ int32_t CRYPT_CURVE25519_ComputeSharedKey(CRYPT_CURVE25519_Ctx *prvKey, CRYPT_CURVE25519_Ctx *pubKey, uint8_t *sharedKey, uint32_t *shareKeyLen) { if (prvKey == NULL || pubKey == NULL || sharedKey == NULL || shareKeyLen == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (*shareKeyLen < CRYPT_CURVE25519_KEYLEN) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_KEYLEN_ERROR); return CRYPT_CURVE25519_KEYLEN_ERROR; } if ((prvKey->keyType & CURVE25519_PRVKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PRVKEY); return CRYPT_CURVE25519_NO_PRVKEY; } if ((pubKey->keyType & CURVE25519_PUBKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PUBKEY); return CRYPT_CURVE25519_NO_PUBKEY; } uint32_t tmpLen = *shareKeyLen; ScalarMultiPoint(sharedKey, prvKey->prvKey, pubKey->pubKey); int32_t i; uint8_t checkValid = 0; for (i = 0; i < CRYPT_CURVE25519_KEYLEN; i++) { checkValid |= sharedKey[i]; } if (checkValid == 0) { *shareKeyLen = tmpLen; BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_KEY_COMPUTE_FAILED); return CRYPT_CURVE25519_KEY_COMPUTE_FAILED; } else { *shareKeyLen = CRYPT_CURVE25519_KEYLEN; return CRYPT_SUCCESS; } } /** * @brief x25519 Calculate the public key based on the private key. * * @param privateKey [IN] Private key * @param publicKey [OUT] Public key * */ void CRYPT_X25519_PublicFromPrivate(const uint8_t privateKey[CRYPT_CURVE25519_KEYLEN], uint8_t publicKey[CRYPT_CURVE25519_KEYLEN]) { uint8_t privateCopy[CRYPT_CURVE25519_KEYLEN]; GeE out; Fp25 zPlusY, zMinusY, zMinusYInvert; (void)memcpy_s(privateCopy, sizeof(privateCopy), privateKey, sizeof(privateCopy)); privateCopy[0] &= 0xf8; /* decodeScalar25519(k): k_list[0] &= 0xf8 */ privateCopy[31] &= 0x7f; /* decodeScalar25519(k): k_list[31] &= 0x7f */ privateCopy[31] |= 0x40; /* decodeScalar25519(k): k_list[31] |= 0x40 */ ScalarMultiBase(&out, privateCopy); CURVE25519_FP_ADD(zPlusY, out.z, out.y); CURVE25519_FP_SUB(zMinusY, out.z, out.y); FpInvert(zMinusYInvert, zMinusY); FpMul(zPlusY, zPlusY, zMinusYInvert); PolynomialToData(publicKey, zPlusY); /* cleanup tmp private key */ BSL_SAL_CleanseData(privateCopy, sizeof(privateCopy)); } int32_t CRYPT_X25519_GenKey(CRYPT_CURVE25519_Ctx *pkey) { if (pkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = CRYPT_RandEx(pkey->libCtx, pkey->prvKey, sizeof(pkey->prvKey)); if (ret != CRYPT_SUCCESS) { pkey->keyType = 0; BSL_ERR_PUSH_ERROR(ret); return ret; } CRYPT_X25519_PublicFromPrivate(pkey->prvKey, pkey->pubKey); pkey->keyType = CURVE25519_PRVKEY | CURVE25519_PUBKEY; return CRYPT_SUCCESS; } #endif /* HITLS_CRYPTO_X25519 */ int32_t CRYPT_CURVE25519_Cmp(const CRYPT_CURVE25519_Ctx *a, const CRYPT_CURVE25519_Ctx *b) { RETURN_RET_IF(a == NULL || b == NULL, CRYPT_NULL_INPUT); RETURN_RET_IF((a->keyType & CURVE25519_PUBKEY) == 0 || (b->keyType & CURVE25519_PUBKEY) == 0, CRYPT_CURVE25519_NO_PUBKEY); RETURN_RET_IF(memcmp(a->pubKey, b->pubKey, CRYPT_CURVE25519_KEYLEN) != 0, CRYPT_CURVE25519_PUBKEY_NOT_EQUAL); return CRYPT_SUCCESS; } int32_t CRYPT_CURVE25519_GetSecBits(const CRYPT_CURVE25519_Ctx *ctx) { (void) ctx; return 128; } #ifdef HITLS_CRYPTO_PROVIDER int32_t CRYPT_CURVE25519_Import(CRYPT_CURVE25519_Ctx *ctx, const BSL_Param *params) { if (ctx == NULL || params == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = CRYPT_SUCCESS; const BSL_Param *prv = BSL_PARAM_FindConstParam(params, CRYPT_PARAM_CURVE25519_PRVKEY); const BSL_Param *pub = BSL_PARAM_FindConstParam(params, CRYPT_PARAM_CURVE25519_PUBKEY); if (prv != NULL) { ret = CRYPT_CURVE25519_SetPrvKeyEx(ctx, params); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if (pub != NULL) { ret = CRYPT_CURVE25519_SetPubKeyEx(ctx, params); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } return ret; } int32_t CRYPT_CURVE25519_Export(const CRYPT_CURVE25519_Ctx *ctx, BSL_Param *params) { if (ctx == NULL || params == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } uint32_t index = 0; uint32_t keyBytes = CRYPT_CURVE25519_KEYLEN; CRYPT_EAL_ProcessFuncCb processCb = NULL; void *args = NULL; BSL_Param ed25519Params[3] = {0}; // 3: pub key + priv key + end marker int32_t ret = CRYPT_GetPkeyProcessParams(params, &processCb, &args); if (ret != CRYPT_SUCCESS) { return ret; } uint8_t *buffer = BSL_SAL_Calloc(1, keyBytes * 2); // For public + private key if (buffer == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } if ((ctx->keyType & CURVE25519_PUBKEY) != 0) { (void)BSL_PARAM_InitValue(&ed25519Params[index], CRYPT_PARAM_CURVE25519_PUBKEY, BSL_PARAM_TYPE_OCTETS, buffer, keyBytes); ret = CRYPT_CURVE25519_GetPubKeyEx(ctx, ed25519Params); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(buffer); return ret; } ed25519Params[index].valueLen = ed25519Params[index].useLen; index++; } if ((ctx->keyType & CURVE25519_PRVKEY) != 0) { (void)BSL_PARAM_InitValue(&ed25519Params[index], CRYPT_PARAM_CURVE25519_PRVKEY, BSL_PARAM_TYPE_OCTETS, buffer + keyBytes, keyBytes); ret = CRYPT_CURVE25519_GetPrvKeyEx(ctx, ed25519Params); if (ret != CRYPT_SUCCESS) { BSL_SAL_Free(buffer); return ret; } ed25519Params[index].valueLen = ed25519Params[index].useLen; index++; } ret = processCb(ed25519Params, args); BSL_SAL_Free(buffer); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif // HITLS_CRYPTO_PROVIDER #if defined(HITLS_CRYPTO_X25519_CHECK) || defined(HITLS_CRYPTO_ED25519_CHECK) static int32_t Curve25519PrvKeyCheck(const CRYPT_CURVE25519_Ctx *prvKey) { if (prvKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((prvKey->keyType & CURVE25519_PRVKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PRVKEY); return CRYPT_CURVE25519_NO_PRVKEY; } uint8_t tmp[CRYPT_CURVE25519_KEYLEN] = {0}; // prv key is not all 0. if (memcmp(tmp, prvKey->prvKey, CRYPT_CURVE25519_KEYLEN) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_INVALID_PRVKEY); return CRYPT_CURVE25519_INVALID_PRVKEY; } return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_X25519_CHECK || HITLS_CRYPTO_ED25519_CHECK #ifdef HITLS_CRYPTO_ED25519_CHECK static int32_t ED25519KeyPairCheck(const CRYPT_CURVE25519_Ctx *pubKey, const CRYPT_CURVE25519_Ctx *prvKey) { if (pubKey == NULL || prvKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((prvKey->keyType & CURVE25519_PRVKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PRVKEY); return CRYPT_CURVE25519_NO_PRVKEY; } if ((pubKey->keyType & CURVE25519_PUBKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PUBKEY); return CRYPT_CURVE25519_NO_PUBKEY; } uint8_t res[CRYPT_CURVE25519_KEYLEN]; int32_t ret = CRYPT_ED25519_PublicFromPrivate(prvKey->prvKey, res, prvKey->hashMethod); if (ret != CRYPT_SUCCESS) { return ret; } if (memcmp(res, pubKey->pubKey, CRYPT_CURVE25519_KEYLEN) != 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_PAIRWISE_CHECK_FAIL); return CRYPT_CURVE25519_PAIRWISE_CHECK_FAIL; } return CRYPT_SUCCESS; } int32_t CRYPT_ED25519_Check(uint32_t checkType, const CRYPT_CURVE25519_Ctx *pkey1, const CRYPT_CURVE25519_Ctx *pkey2) { switch (checkType) { case CRYPT_PKEY_CHECK_KEYPAIR: return ED25519KeyPairCheck(pkey1, pkey2); case CRYPT_PKEY_CHECK_PRVKEY: return Curve25519PrvKeyCheck(pkey1); default: BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } } #endif // HITLS_CRYPTO_ED25519_CHECK #ifdef HITLS_CRYPTO_X25519_CHECK static int32_t X25519KeyPairCheck(const CRYPT_CURVE25519_Ctx *pubKey, const CRYPT_CURVE25519_Ctx *prvKey) { if (pubKey == NULL || prvKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((prvKey->keyType & CURVE25519_PRVKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PRVKEY); return CRYPT_CURVE25519_NO_PRVKEY; } if ((pubKey->keyType & CURVE25519_PUBKEY) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_NO_PUBKEY); return CRYPT_CURVE25519_NO_PUBKEY; } uint8_t res[CRYPT_CURVE25519_KEYLEN]; CRYPT_X25519_PublicFromPrivate(prvKey->prvKey, res); if (memcmp(res, pubKey->pubKey, CRYPT_CURVE25519_KEYLEN) != 0) { BSL_ERR_PUSH_ERROR(CRYPT_CURVE25519_PAIRWISE_CHECK_FAIL); return CRYPT_CURVE25519_PAIRWISE_CHECK_FAIL; } return CRYPT_SUCCESS; } int32_t CRYPT_X25519_Check(uint32_t checkType, const CRYPT_CURVE25519_Ctx *pkey1, const CRYPT_CURVE25519_Ctx *pkey2) { switch (checkType) { case CRYPT_PKEY_CHECK_KEYPAIR: return X25519KeyPairCheck(pkey1, pkey2); case CRYPT_PKEY_CHECK_PRVKEY: return Curve25519PrvKeyCheck(pkey1); default: BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } } #endif // HITLS_CRYPTO_X25519_CHECK #endif /* HITLS_CRYPTO_CURVE25519 */
2401_83913325/openHiTLS-examples_7925
crypto/curve25519/src/curve25519.c
C
unknown
33,267
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CURVE25519_LOCAL_H #define CURVE25519_LOCAL_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_CURVE25519 #include "crypt_curve25519.h" #include "sal_atomic.h" #ifdef __cplusplus extern "C" { #endif #define CURVE25519_NOKEY 0 #define CURVE25519_PRVKEY 0x1 #define CURVE25519_PUBKEY 0x10 #define UINT8_32_21BITS_BLOCKNUM 12 #define UINT8_64_21BITS_BLOCKNUM 24 struct CryptCurve25519Ctx { uint8_t keyType; /* specify the key type */ const EAL_MdMethod *hashMethod; uint8_t pubKey[CRYPT_CURVE25519_KEYLEN]; uint8_t prvKey[CRYPT_CURVE25519_KEYLEN]; BSL_SAL_RefCount references; void *libCtx; }; typedef int32_t Fp25[10]; typedef struct Fp51 { uint64_t data[5]; } Fp51; typedef struct H19 { int64_t data[19]; } H19; // group element in Projective Coordinate, x = X / Z, y = Y / Z typedef struct GeP { Fp25 x; Fp25 y; Fp25 z; } GeP; // group element in Extended Coordinate, x = X / Z, y = Y / Z, T = XY / Z which leads to XY = ZT typedef struct GeE { Fp25 x; Fp25 y; Fp25 t; Fp25 z; } GeE; // group element in Completed Coordinate, x = X / Z, y = Y / T typedef struct GeC { Fp25 x; Fp25 y; Fp25 t; Fp25 z; } GeC; typedef struct GePre { Fp25 yplusx; Fp25 yminusx; Fp25 xy2d; } GePre; typedef struct GeEPre { Fp25 yplusx; Fp25 yminusx; Fp25 t2z; Fp25 z; } GeEPre; /* Get High x bits for 64bits block */ #define MASK_HIGH64(x) (0xFFFFFFFFFFFFFFFFLL << (64 - (x))) /* Get low x bits for 32bits block */ #define MASK_LOW32(x) (0xFFFFFFFF >> (32 - (x))) /* Get high x bits for 32bits block */ #define MASK_HIGH32(x) (0xFFFFFFFF << (32 - (x))) /* low 21 bits for 64bits block */ #define MASK_64_LOW21 0x1fffffLL #define CURVE25519_MASK_HIGH_38 0xfffffffffc000000LL #define CURVE25519_MASK_HIGH_39 0xfffffffffe000000LL /* process carry from h0_ to h1_, h0_ boundary restrictions is bits */ #define PROCESS_CARRY(h0_, h1_, signMask_, over_, bits) \ do { \ (over_) = (h0_) + (1 << (bits)); \ (signMask_) = MASK_HIGH64((bits) + 1) & (-((over_) >> 63)); \ (h1_) += ((over_) >> ((bits) + 1)) | (signMask_); \ (h0_) -= MASK_HIGH64(64 - ((bits) + 1)) & (over_); \ } while (0) /* process carry from h0_ to h1_ ignoring sign, h0_ boundary restrictions is bits */ #define PROCESS_CARRY_UNSIGN(h0_, h1_, signMask_, over_, bits) \ do { \ (signMask_) = MASK_HIGH64((bits)) & (-((h0_) >> 63)); \ (over_) = ((h0_) >> (bits)) | (signMask_); \ (h1_) += (over_); \ (h0_) -= (over_) * (1 << (bits)); \ } while (0) /* l = 2^252 + 27742317777372353535851937790883648493, let l0 = 27742317777372353535851937790883648493 */ /* -l0 = 666643 * 2^0 + 470296 * 2^21 + 654183 * 2^(2*21) - 997805 * 2^(3*21) + 136657 * 2^(4*21) - 683901 * 2^(5*21) */ #define CURVE25519_MULTI_BY_L0(src, pos) \ do { \ (src)[0 + (pos)] += (src)[12 + (pos)] * 666643; \ (src)[1 + (pos)] += (src)[12 + (pos)] * 470296; \ (src)[2 + (pos)] += (src)[12 + (pos)] * 654183; \ (src)[3 + (pos)] -= (src)[12 + (pos)] * 997805; \ (src)[4 + (pos)] += (src)[12 + (pos)] * 136657; \ (src)[5 + (pos)] -= (src)[12 + (pos)] * 683901; \ (src)[12 + (pos)] = 0; \ } while (0) /* Compute multiplications by 19 */ #define CURVE25519_MULTI_BY_19(dst, src, t1_, t2_, t16_) \ do { \ (t1_) = (uint64_t)(src); \ (t2_) = (t1_) << 1; \ (t16_) = (t1_) << 4; \ (dst) += (int64_t)((t1_) + (t2_) + (t16_)); \ } while (0) /* Set this parameter to value, */ #define CURVE25519_FP_SET(dst, value) \ do { \ (dst)[0] = (value); \ (dst)[1] = 0; \ (dst)[2] = 0; \ (dst)[3] = 0; \ (dst)[4] = 0; \ (dst)[5] = 0; \ (dst)[6] = 0; \ (dst)[7] = 0; \ (dst)[8] = 0; \ (dst)[9] = 0; \ } while (0) #define CURVE25519_FP51_SET(dst, value) \ do { \ (dst)[0] = (value); \ (dst)[1] = 0; \ (dst)[2] = 0; \ (dst)[3] = 0; \ (dst)[4] = 0; \ } while (0) /* Copy */ #define CURVE25519_FP_COPY(dst, src) \ do { \ (dst)[0] = (src)[0]; \ (dst)[1] = (src)[1]; \ (dst)[2] = (src)[2]; \ (dst)[3] = (src)[3]; \ (dst)[4] = (src)[4]; \ (dst)[5] = (src)[5]; \ (dst)[6] = (src)[6]; \ (dst)[7] = (src)[7]; \ (dst)[8] = (src)[8]; \ (dst)[9] = (src)[9]; \ } while (0) #define CURVE25519_FP51_COPY(dst, src) \ do { \ (dst)[0] = (src)[0]; \ (dst)[1] = (src)[1]; \ (dst)[2] = (src)[2]; \ (dst)[3] = (src)[3]; \ (dst)[4] = (src)[4]; \ } while (0) /* Negate */ #define CURVE25519_FP_NEGATE(dst, src) \ do { \ (dst)[0] = -(src)[0]; \ (dst)[1] = -(src)[1]; \ (dst)[2] = -(src)[2]; \ (dst)[3] = -(src)[3]; \ (dst)[4] = -(src)[4]; \ (dst)[5] = -(src)[5]; \ (dst)[6] = -(src)[6]; \ (dst)[7] = -(src)[7]; \ (dst)[8] = -(src)[8]; \ (dst)[9] = -(src)[9]; \ } while (0) /* Basic operation */ #define CURVE25519_FP_OP(dst, src1, src2, op) \ do { \ (dst)[0] = (src1)[0] op (src2)[0]; \ (dst)[1] = (src1)[1] op (src2)[1]; \ (dst)[2] = (src1)[2] op (src2)[2]; \ (dst)[3] = (src1)[3] op (src2)[3]; \ (dst)[4] = (src1)[4] op (src2)[4]; \ (dst)[5] = (src1)[5] op (src2)[5]; \ (dst)[6] = (src1)[6] op (src2)[6]; \ (dst)[7] = (src1)[7] op (src2)[7]; \ (dst)[8] = (src1)[8] op (src2)[8]; \ (dst)[9] = (src1)[9] op (src2)[9]; \ } while (0) /* Basic operation */ #define CURVE25519_FP51_ADD(dst, src1, src2) \ do { \ (dst)[0] = (src1)[0] + (src2)[0]; \ (dst)[1] = (src1)[1] + (src2)[1]; \ (dst)[2] = (src1)[2] + (src2)[2]; \ (dst)[3] = (src1)[3] + (src2)[3]; \ (dst)[4] = (src1)[4] + (src2)[4]; \ } while (0) #define CURVE25519_FP51_SUB(dst, src1, src2) \ do { \ (dst)[0] = ((src1)[0] + 0xfffffffffffda) - (src2)[0]; \ (dst)[1] = ((src1)[1] + 0xffffffffffffe) - (src2)[1]; \ (dst)[2] = ((src1)[2] + 0xffffffffffffe) - (src2)[2]; \ (dst)[3] = ((src1)[3] + 0xffffffffffffe) - (src2)[3]; \ (dst)[4] = ((src1)[4] + 0xffffffffffffe) - (src2)[4]; \ } while (0) #define CURVE25519_GE_COPY(dst, src) \ do { \ CURVE25519_FP_COPY((dst).x, (src).x); \ CURVE25519_FP_COPY((dst).y, (src).y); \ CURVE25519_FP_COPY((dst).z, (src).z); \ CURVE25519_FP_COPY((dst).t, (src).t); \ } while (0) /* Add */ #define CURVE25519_FP_ADD(dst, src1, src2) CURVE25519_FP_OP(dst, src1, src2, +) /* Subtract */ #define CURVE25519_FP_SUB(dst, src1, src2) CURVE25519_FP_OP(dst, src1, src2, -) /* dst = dst * bit, bit = 0 or 1 */ #define CURVE25519_FP_MUL_BIT(dst, bit) \ do { \ int ii; \ for (ii = 0; ii < 10; ii++) { \ (dst)[ii] = (dst)[ii] * (bit); \ } \ } while (0) /* dst[i] = src[i] * scalar */ #define CURVE25519_FP_MUL_SCALAR(dst, src, scalar) \ do { \ uint32_t ii; \ for (ii = 0; ii < 10; ii++) { \ (dst)[ii] = (uint64_t)((src)[ii] * (scalar)); \ } \ } while (0) #define CURVE25519_BYTES3_LOAD_PADDING(dst, bits, src) \ do { \ uint64_t valMacro = ((uint64_t)*((src) + 0)) << 0; \ valMacro |= ((uint64_t)*((src) + 1)) << 8; \ valMacro |= ((uint64_t)*((src) + 2)) << 16; \ *(dst) = (uint64_t)(valMacro<< (bits)); \ } while (0) #define CURVE25519_BYTES3_LOAD(dst, src) \ do { \ *(dst) = ((uint64_t)*((src) + 0)) << 0; \ *(dst) |= ((uint64_t)*((src) + 1)) << 8; \ *(dst) |= ((uint64_t)*((src) + 2)) << 16; \ } while (0) #define CURVE25519_BYTES4_LOAD(dst, src) \ do { \ *(dst) = ((uint64_t)*((src) + 0)) << 0; \ *(dst) |= ((uint64_t)*((src) + 1)) << 8; \ *(dst) |= ((uint64_t)*((src) + 2)) << 16; \ *(dst) |= ((uint64_t)*((src) + 3)) << 24; \ } while (0) #define CURVE25519_BYTES6_LOAD(dst, src) \ do { \ *(dst) = (uint64_t)*(src); \ *(dst) |= ((uint64_t)*((src) + 1)) << 8; \ *(dst) |= ((uint64_t)*((src) + 2)) << 16; \ *(dst) |= ((uint64_t)*((src) + 3)) << 24; \ *(dst) |= ((uint64_t)*((src) + 4)) << 32; \ *(dst) |= ((uint64_t)*((src) + 5)) << 40; \ } while (0) #define CURVE25519_BYTES7_LOAD(dst, src) \ do { \ *(dst) = (uint64_t)*(src); \ *(dst) |= ((uint64_t)*((src) + 1)) << 8; \ *(dst) |= ((uint64_t)*((src) + 2)) << 16; \ *(dst) |= ((uint64_t)*((src) + 3)) << 24; \ *(dst) |= ((uint64_t)*((src) + 4)) << 32; \ *(dst) |= ((uint64_t)*((src) + 5)) << 40; \ *(dst) |= ((uint64_t)*((src) + 6)) << 48; \ } while (0) #define CURVE25519_BYTES3_PADDING_UNLOAD(dst, bits1, bits2, src) \ do { \ const uint32_t posMacro = 8 - (bits1); \ uint32_t valMacro = (uint32_t)(*(src)); \ uint32_t signMaskMacro= -(valMacro >> 31); \ uint32_t expand =( (uint32_t)(*((src) + 1))) << (bits2); \ *((dst) + 0) = (uint8_t)(valMacro >> (0 + posMacro) | (signMaskMacro>> (0 + posMacro))); \ *((dst) + 1) = (uint8_t)(valMacro >> (8 + posMacro) | (signMaskMacro>> (8 + posMacro))); \ *((dst) + 2) = (uint8_t)(expand | ((valMacro >> (16 + posMacro)) | (signMaskMacro>> (16 + posMacro)))); \ } while (0) #define CURVE25519_BYTES3_UNLOAD(dst, bits, src) \ do { \ const uint32_t posMacro = 8 - (bits); \ uint32_t valMacro = (uint32_t)(*(src)); \ uint32_t signMaskMacro= -(valMacro >> 31); \ *((dst) + 0) = (uint8_t)((valMacro >> (0 + posMacro)) | (signMaskMacro>> (0 + posMacro))); \ *((dst) + 1) = (uint8_t)((valMacro >> (8 + posMacro)) | (signMaskMacro>> (8 + posMacro))); \ *((dst) + 2) = (uint8_t)((valMacro >> (16 + posMacro)) | (signMaskMacro>> (16 + posMacro))); \ } while (0) #define CURVE25519_BYTES4_PADDING_UNLOAD(dst, bits, src) \ do { \ uint32_t valMacro = (uint32_t)(*(src)); \ uint32_t signMaskMacro= -(valMacro >> 31); \ uint32_t expand = ((uint32_t)(*((src) + 1))) << (bits); \ *((dst) + 0) = (uint8_t)((valMacro >> 0) | (signMaskMacro>> 0)); \ *((dst) + 1) = (uint8_t)((valMacro >> 8) | (signMaskMacro>> 8)); \ *((dst) + 2) = (uint8_t)((valMacro >> 16) | (signMaskMacro>> 16)); \ *((dst) + 3) = (uint8_t)(expand | ((valMacro >> 24) | (signMaskMacro>> 24))); \ } while (0) /** * Reference RFC 7748 section 5: For X25519, in order to decode 32 random bytes as an integer scalar, * set the three least significant bits of the first byte and the most significant bit of the last to zero, * set the second most significant bit of the last byte to 1 and, finally, decode as little-endian. */ #define CURVE25519_DECODE_LITTLE_ENDIAN(dst, src) \ do { \ uint32_t ii; \ for (ii = 0; ii < 32; ii++) { \ (dst)[ii] = (src)[ii]; \ } \ (dst)[0] &= 248; \ (dst)[31] &= 127; \ (dst)[31] |= 64; \ } while (0) #define CURVE25519_FP_CSWAP(s, a, b) \ do { \ uint32_t tt; \ const uint32_t tsMacro = 0 - (s); \ for (uint32_t ii = 0; ii < 10; ii++) { \ tt = tsMacro & (((uint32_t)(a)[ii]) ^ ((uint32_t)(b)[ii])); \ (a)[ii] = (int32_t)((uint32_t)(a)[ii] ^ tt); \ (b)[ii] = (int32_t)((uint32_t)(b)[ii] ^ tt); \ } \ } while (0) #define CURVE25519_FP51_CSWAP(s, a, b) \ do { \ uint64_t tt; \ const uint64_t tsMacro = 0 - (uint64_t)(s); \ for (uint32_t ii = 0; ii < 5; ii++) { \ tt = tsMacro & ((a)[ii] ^ (b)[ii]); \ (a)[ii] = (a)[ii] ^ tt; \ (b)[ii] = (b)[ii] ^ tt; \ } \ } while (0) void TableLookup(GePre *preCompute, int32_t pos, int8_t e); void ConditionalMove(GePre *preCompute, const GePre *tableElement, uint32_t indicator); void ScalarMultiBase(GeE *out, const uint8_t in[CRYPT_CURVE25519_KEYLEN]); #ifdef HITLS_CRYPTO_ED25519 void PointEncoding(const GeE *point, uint8_t *output, uint32_t outputLen); int32_t PointDecoding(GeE *point, const uint8_t in[CRYPT_CURVE25519_KEYLEN]); void ScalarMulAdd(uint8_t s[CRYPT_CURVE25519_KEYLEN], const uint8_t a[CRYPT_CURVE25519_KEYLEN], const uint8_t b[CRYPT_CURVE25519_KEYLEN], const uint8_t c[CRYPT_CURVE25519_KEYLEN]); void ModuloL(uint8_t s[CRYPT_CURVE25519_SIGNLEN]); void KAMulPlusMulBase(GeE *out, const uint8_t hash[CRYPT_CURVE25519_KEYLEN], const GeE *p, const uint8_t s[CRYPT_CURVE25519_KEYLEN]); #endif #ifdef HITLS_CRYPTO_X25519 void ScalarMultiPoint(uint8_t out[32], const uint8_t scalar[32], const uint8_t point[32]); #endif void FpInvert(Fp25 out, const Fp25 a); void FpMul(Fp25 out, const Fp25 f, const Fp25 g); void FpSquareDoubleCore(Fp25 out, const Fp25 in, bool doDouble); void PolynomialToData(uint8_t out[32], const Fp25 polynomial); void DataToPolynomial(Fp25 out, const uint8_t data[32]); #ifdef HITLS_CRYPTO_X25519 void CRYPT_X25519_PublicFromPrivate(const uint8_t privateKey[CRYPT_CURVE25519_KEYLEN], uint8_t publicKey[CRYPT_CURVE25519_KEYLEN]); #endif #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_CURVE25519 #endif // CURVE25519_LOCAL_H
2401_83913325/openHiTLS-examples_7925
crypto/curve25519/src/curve25519_local.h
C
unknown
18,563
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ /* Some of these codes are adapted from https://ed25519.cr.yp.to/software.html */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CURVE25519 #include <stdbool.h> #include "securec.h" #include "curve25519_local.h" #include "bsl_sal.h" #ifdef HITLS_CRYPTO_ED25519 #define CRYPT_CURVE25519_OPTLEN 32 #endif #define CONDITION_COPY(dst, src, indicate) \ (int32_t)((uint32_t)(dst) ^ (((uint32_t)(dst) ^ (uint32_t)(src)) & (indicate))) // process Fp multiplication carry #define FP_PROCESS_CARRY(h) \ do { \ int64_t carry0, carry1, carry2, carry3, carry4, carry5, carry6, carry7, carry8, carry9; \ carry0 = h##0 + (1 << 25); h##1 += carry0 >> 26; h##0 -= carry0 & CURVE25519_MASK_HIGH_38; \ carry4 = h##4 + (1 << 25); h##5 += carry4 >> 26; h##4 -= carry4 & CURVE25519_MASK_HIGH_38; \ carry1 = h##1 + (1 << 24); h##2 += carry1 >> 25; h##1 -= carry1 & CURVE25519_MASK_HIGH_39; \ carry5 = h##5 + (1 << 24); h##6 += carry5 >> 25; h##5 -= carry5 & CURVE25519_MASK_HIGH_39; \ carry2 = h##2 + (1 << 25); h##3 += carry2 >> 26; h##2 -= carry2 & CURVE25519_MASK_HIGH_38; \ carry6 = h##6 + (1 << 25); h##7 += carry6 >> 26; h##6 -= carry6 & CURVE25519_MASK_HIGH_38; \ carry3 = h##3 + (1 << 24); h##4 += carry3 >> 25; h##3 -= carry3 & CURVE25519_MASK_HIGH_39; \ carry7 = h##7 + (1 << 24); h##8 += carry7 >> 25; h##7 -= carry7 & CURVE25519_MASK_HIGH_39; \ carry4 = h##4 + (1 << 25); h##5 += carry4 >> 26; h##4 -= carry4 & CURVE25519_MASK_HIGH_38; \ carry8 = h##8 + (1 << 25); h##9 += carry8 >> 26; h##8 -= carry8 & CURVE25519_MASK_HIGH_38; \ carry9 = h##9 + (1 << 24); h##0 += (carry9 >> 25) * 19; h##9 -= carry9 & CURVE25519_MASK_HIGH_39; \ carry0 = h##0 + (1 << 25); h##1 += carry0 >> 26; h##0 -= carry0 & CURVE25519_MASK_HIGH_38; \ } while (0) // h0...h9 to Fp25 #define INT64_2_FP25(h, out) \ do { \ (out)[0] = (int32_t)h##0; \ (out)[1] = (int32_t)h##1; \ (out)[2] = (int32_t)h##2; \ (out)[3] = (int32_t)h##3; \ (out)[4] = (int32_t)h##4; \ (out)[5] = (int32_t)h##5; \ (out)[6] = (int32_t)h##6; \ (out)[7] = (int32_t)h##7; \ (out)[8] = (int32_t)h##8; \ (out)[9] = (int32_t)h##9; \ } while (0) #define FP25_2_INT32(in, out) \ do { \ out##0 = (in)[0]; \ out##1 = (in)[1]; \ out##2 = (in)[2]; \ out##3 = (in)[3]; \ out##4 = (in)[4]; \ out##5 = (in)[5]; \ out##6 = (in)[6]; \ out##7 = (in)[7]; \ out##8 = (in)[8]; \ out##9 = (in)[9]; \ } while (0) /* out = f * g */ void FpMul(Fp25 out, const Fp25 f, const Fp25 g) { int32_t f0, f1, f2, f3, f4, f5, f6, f7, f8, f9; int32_t g0, g1, g2, g3, g4, g5, g6, g7, g8, g9; int64_t h0, h1, h2, h3, h4, h5, h6, h7, h8, h9; FP25_2_INT32(f, f); FP25_2_INT32(g, g); int32_t f1_2 = f1 * 2; int32_t f3_2 = f3 * 2; int32_t f5_2 = f5 * 2; int32_t f7_2 = f7 * 2; int32_t f9_2 = f9 * 2; int32_t g1_19 = g1 * 19; int32_t g2_19 = g2 * 19; int32_t g3_19 = g3 * 19; int32_t g4_19 = g4 * 19; int32_t g5_19 = g5 * 19; int32_t g6_19 = g6 * 19; int32_t g7_19 = g7 * 19; int32_t g8_19 = g8 * 19; int32_t g9_19 = g9 * 19; /* h0 = f0g0 + 38f1g9 + 19f2g8 + 38f3g7 + 19f4g6 + 38f5g5 + 19f6g4 + 38f7g3 + 19f8g2 + 38f9g1 h1 = f0g1 + f1g0 + 19f2g9 + 19f3g8 + 19f4g7 + 19f5g6 + 19f6g5 + 19f7g4 + 19f8g3 + 19f9g2 h2 = f0g2 + 2f1g1 + f2g0 + 38f3g9 + 19f4g8 + 38f5g7 + 19f6g6 + 38f7g5 + 19f8g4 + 38f9g2 h3 = f0g3 + f1g2 + f2g1 + f3g0 + 19f4g9 + 19f5g8 + 19f6g7 + 19f7g6 + 19f8g5 + 19f9g4 h4 = f0g4 + 2f1g3 + f2g2 + 2f3g1 + f4g0 + 38f5g9 + 19f6g8 + 38f7g7 + 19f8g6 + 38f9g5 h5 = f0g5 + f1g4 + f2g3 + f3g2 + f4g1 + f5g0 + 19f6g9 + 19f7g8 + 19f8g7 + 19f9g6 h6 = f0g6 + 2f1g5 + f2g4 + 2f3g3 + f4g2 + 2f5g1 + f6g0 + 38f7g9 + 19f8g8 + 38f9g7 h7 = f0g7 + f1g6 + f2g5 + f3g4 + f4g3 + f5g2 + f6g1 + f7g0 + 19f8g9 + 19f9g8 h8 = f0g8 + 2f1g7 + f2g6 + 2f3g5 + f4g4 + 2f5g3 + f6g2 + 2f7g1 + f8g0 + 38f9g9 h9 = f0g9 + f1g8 + f2g7 + f3g6 + f4g5 + f5g4 + f6g3 + f7g2 + f8g1 + f9g0 The calculation is performed by column. */ h0 = (int64_t)f0 * g0; h1 = (int64_t)f0 * g1; h2 = (int64_t)f0 * g2; h3 = (int64_t)f0 * g3; h4 = (int64_t)f0 * g4; h5 = (int64_t)f0 * g5; h6 = (int64_t)f0 * g6; h7 = (int64_t)f0 * g7; h8 = (int64_t)f0 * g8; h9 = (int64_t)f0 * g9; h0 += (int64_t)f1_2 * g9_19; h1 += (int64_t)f1 * g0; h2 += (int64_t)f1_2 * g1; h3 += (int64_t)f1 * g2; h4 += (int64_t)f1_2 * g3; h5 += (int64_t)f1 * g4; h6 += (int64_t)f1_2 * g5; h7 += (int64_t)f1 * g6; h8 += (int64_t)f1_2 * g7; h9 += (int64_t)f1 * g8; h0 += (int64_t)f2 * g8_19; h1 += (int64_t)f2 * g9_19; h2 += (int64_t)f2 * g0; h3 += (int64_t)f2 * g1; h4 += (int64_t)f2 * g2; h5 += (int64_t)f2 * g3; h6 += (int64_t)f2 * g4; h7 += (int64_t)f2 * g5; h8 += (int64_t)f2 * g6; h9 += (int64_t)f2 * g7; h0 += (int64_t)f3_2 * g7_19; h1 += (int64_t)f3 * g8_19; h2 += (int64_t)f3_2 * g9_19; h3 += (int64_t)f3 * g0; h4 += (int64_t)f3_2 * g1; h5 += (int64_t)f3 * g2; h6 += (int64_t)f3_2 * g3; h7 += (int64_t)f3 * g4; h8 += (int64_t)f3_2 * g5; h9 += (int64_t)f3 * g6; h0 += (int64_t)f4 * g6_19; h1 += (int64_t)f4 * g7_19; h2 += (int64_t)f4 * g8_19; h3 += (int64_t)f4 * g9_19; h4 += (int64_t)f4 * g0; h5 += (int64_t)f4 * g1; h6 += (int64_t)f4 * g2; h7 += (int64_t)f4 * g3; h8 += (int64_t)f4 * g4; h9 += (int64_t)f4 * g5; h0 += (int64_t)f5_2 * g5_19; h1 += (int64_t)f5 * g6_19; h2 += (int64_t)f5_2 * g7_19; h3 += (int64_t)f5 * g8_19; h4 += (int64_t)f5_2 * g9_19; h5 += (int64_t)f5 * g0; h6 += (int64_t)f5_2 * g1; h7 += (int64_t)f5 * g2; h8 += (int64_t)f5_2 * g3; h9 += (int64_t)f5 * g4; h0 += (int64_t)f6 * g4_19; h1 += (int64_t)f6 * g5_19; h2 += (int64_t)f6 * g6_19; h3 += (int64_t)f6 * g7_19; h4 += (int64_t)f6 * g8_19; h5 += (int64_t)f6 * g9_19; h6 += (int64_t)f6 * g0; h7 += (int64_t)f6 * g1; h8 += (int64_t)f6 * g2; h9 += (int64_t)f6 * g3; h0 += (int64_t)f7_2 * g3_19; h1 += (int64_t)f7 * g4_19; h2 += (int64_t)f7_2 * g5_19; h3 += (int64_t)f7 * g6_19; h4 += (int64_t)f7_2 * g7_19; h5 += (int64_t)f7 * g8_19; h6 += (int64_t)f7_2 * g9_19; h7 += (int64_t)f7 * g0; h8 += (int64_t)f7_2 * g1; h9 += (int64_t)f7 * g2; h0 += (int64_t)f8 * g2_19; h1 += (int64_t)f8 * g3_19; h2 += (int64_t)f8 * g4_19; h3 += (int64_t)f8 * g5_19; h4 += (int64_t)f8 * g6_19; h5 += (int64_t)f8 * g7_19; h6 += (int64_t)f8 * g8_19; h7 += (int64_t)f8 * g9_19; h8 += (int64_t)f8 * g0; h9 += (int64_t)f8 * g1; h0 += (int64_t)f9_2 * g1_19; h1 += (int64_t)f9 * g2_19; h2 += (int64_t)f9_2 * g3_19; h3 += (int64_t)f9 * g4_19; h4 += (int64_t)f9_2 * g5_19; h5 += (int64_t)f9 * g6_19; h6 += (int64_t)f9_2 * g7_19; h7 += (int64_t)f9 * g8_19; h8 += (int64_t)f9_2 * g9_19; h9 += (int64_t)f9 * g0; FP_PROCESS_CARRY(h); INT64_2_FP25(h, out); } void FpSquareDoubleCore(Fp25 out, const Fp25 in, bool doDouble) { int64_t h0, h1, h2, h3, h4, h5, h6, h7, h8, h9; int32_t f0, f1, f2, f3, f4, f5, f6, f7, f8, f9; FP25_2_INT32(in, f); int32_t f0_2 = f0 * 2; int32_t f1_2 = f1 * 2; int32_t f2_2 = f2 * 2; int32_t f3_2 = f3 * 2; int32_t f4_2 = f4 * 2; int32_t f5_2 = f5 * 2; int32_t f6_2 = f6 * 2; int32_t f7_2 = f7 * 2; int32_t f9_38 = f9 * 38; int32_t f8_19 = f8 * 19; int32_t f7_38 = f7 * 38; int32_t f6_19 = f6 * 19; int32_t f5_19 = f5 * 19; h0 = (int64_t)f0 * f0; h1 = (int64_t)f0_2 * f1; h2 = (int64_t)f0_2 * f2; h3 = (int64_t)f0_2 * f3; h4 = (int64_t)f0_2 * f4; h5 = (int64_t)f0_2 * f5; h6 = (int64_t)f0_2 * f6; h7 = (int64_t)f0_2 * f7; h8 = (int64_t)f0_2 * f8; h9 = (int64_t)f0_2 * f9; h0 += (int64_t)f1_2 * f9_38; h1 += (int64_t)f2 * f9_38; h2 += (int64_t)f1_2 * f1; h3 += (int64_t)f1_2 * f2; h4 += (int64_t)f1_2 * f3_2; h5 += (int64_t)f1_2 * f4; h6 += (int64_t)f1_2 * f5_2; h7 += (int64_t)f1_2 * f6; h8 += (int64_t)f1_2 * f7_2; h9 += (int64_t)f1_2 * f8; h0 += (int64_t)f2_2 * f8_19; h1 += (int64_t)f3_2 * f8_19; h2 += (int64_t)f3_2 * f9_38; h3 += (int64_t)f4 * f9_38; h4 += (int64_t)f2 * f2; h5 += (int64_t)f2_2 * f3; h6 += (int64_t)f2_2 * f4; h7 += (int64_t)f2_2 * f5; h8 += (int64_t)f2_2 * f6; h9 += (int64_t)f2_2 * f7; h0 += (int64_t)f3_2 * f7_38; h1 += (int64_t)f4 * f7_38; h2 += (int64_t)f4_2 * f8_19; h3 += (int64_t)f5_2 * f8_19; h4 += (int64_t)f5_2 * f9_38; h5 += (int64_t)f6 * f9_38; h6 += (int64_t)f3_2 * f3; h7 += (int64_t)f3_2 * f4; h8 += (int64_t)f3_2 * f5_2; h9 += (int64_t)f3_2 * f6; h0 += (int64_t)f4_2 * f6_19; h1 += (int64_t)f5_2 * f6_19; h2 += (int64_t)f5_2 * f7_38; h3 += (int64_t)f6 * f7_38; h4 += (int64_t)f6_2 * f8_19; h5 += (int64_t)f7_2 * f8_19; h6 += (int64_t)f7_2 * f9_38; h7 += (int64_t)f8 * f9_38; h8 += (int64_t)f4 * f4; h9 += (int64_t)f4_2 * f5; h0 += (int64_t)f5_2 * f5_19; h2 += (int64_t)f6 * f6_19; h4 += (int64_t)f7 * f7_38; h6 += (int64_t)f8 * f8_19; h8 += (int64_t)f9 * f9_38; if (doDouble) { h0 *= 2; h1 *= 2; h2 *= 2; h3 *= 2; h4 *= 2; h5 *= 2; h6 *= 2; h7 *= 2; h8 *= 2; h9 *= 2; } FP_PROCESS_CARRY(h); INT64_2_FP25(h, out); } /* out = in1 ^ (4 * 2 ^ (2 * times)) * in2 */ static void FpMultiSquare(Fp25 in1, Fp25 in2, Fp25 out, int32_t times) { int32_t i; Fp25 temp1, temp2; FpSquareDoubleCore(temp1, in1, false); FpSquareDoubleCore(temp2, temp1, false); for (i = 0; i < times; i++) { FpSquareDoubleCore(temp1, temp2, false); FpSquareDoubleCore(temp2, temp1, false); } FpMul(out, in2, temp2); } /* out = a ^ -1 */ void FpInvert(Fp25 out, const Fp25 a) { int32_t i; Fp25 a0; /* save a^1 */ Fp25 a1; /* save a^2 */ Fp25 a2; /* save a^11 */ Fp25 a3; /* save a^(2^5-1) */ Fp25 a4; /* save a^(2^10-1) */ Fp25 a5; /* save a^(2^20-1) */ Fp25 a6; /* save a^(2^40-1) */ Fp25 a7; /* save a^(2^50-1) */ Fp25 a8; /* save a^(2^100-1) */ Fp25 a9; /* save a^(2^200-1) */ Fp25 a10; /* save a^(2^250-1) */ Fp25 temp1, temp2; /* We know a×b=1(mod p), then a and b are inverses of mod p, i.e. a=b^(-1), b=a^(-1); * According to Fermat's little theorem a^(p-1)=1(mod p), so a*a^(p-2)=1(mod p); * So the inverse element of a is a^(-1) = a^(p-2)(mod p) * Here it is, p=2^255-19, thus we need to compute a^(2^255-21)(mod(2^255-19)) */ /* a^1 */ CURVE25519_FP_COPY(a0, a); /* a^2 */ FpSquareDoubleCore(a1, a0, false); /* a^4 */ FpSquareDoubleCore(temp1, a1, false); /* a^8 */ FpSquareDoubleCore(temp2, temp1, false); /* a^9 */ FpMul(temp1, a0, temp2); /* a^11 */ FpMul(a2, a1, temp1); /* a^22 */ FpSquareDoubleCore(temp2, a2, false); /* a^(2^5-1) = a^(9+22) */ FpMul(a3, temp1, temp2); /* a^(2^10-1) = a^(2^10-2^5) * a^(2^5-1) */ FpSquareDoubleCore(temp1, a3, false); for (i = 0; i < 2; i++) { // (2 * 2)^2 FpSquareDoubleCore(temp2, temp1, false); FpSquareDoubleCore(temp1, temp2, false); } FpMul(a4, a3, temp1); /* a^(2^20-1) = a^(2^20-2^10) * a^(2^10-1) */ FpMultiSquare(a4, a4, a5, 4); // (2 * 2) ^ 4 /* a^(2^40-1) = a^(2^40-2^20) * a^(2^20-1) */ FpMultiSquare(a5, a5, a6, 9); // (2 * 2) ^ 9 /* a^(2^50-1) = a^(2^50-2^10) * a^(2^10-1) */ FpMultiSquare(a6, a4, a7, 4); // (2 * 2) ^ 4 /* a^(2^100-1) = a^(2^100-2^50) * a^(2^50-1) */ FpMultiSquare(a7, a7, a8, 24); // (2 * 2) ^ 24 /* a^(2^200-1) = a^(2^200-2^100) * a^(2^100-1) */ FpMultiSquare(a8, a8, a9, 49); // (2 * 2) ^ 49 /* a^(2^250-1) = a^(2^250-2^50) * a^(2^50-1) */ FpMultiSquare(a9, a7, a10, 24); // (2 * 2) ^ 24 /* a^(2^5*(2^250-1)) = (a^(2^250-1))^5 */ FpSquareDoubleCore(temp1, a10, false); FpSquareDoubleCore(temp2, temp1, false); FpSquareDoubleCore(temp1, temp2, false); FpSquareDoubleCore(temp2, temp1, false); FpSquareDoubleCore(temp1, temp2, false); /* The output:a^(2^255-21) = a(2^5*(2^250-1)+11) = a^(2^5*(2^250-1)) * a^11 */ FpMul(out, a2, temp1); } #ifdef HITLS_CRYPTO_ED25519 /* out = in ^ ((q - 5) / 8) */ static void FpPowq58(Fp25 out, Fp25 in) { Fp25 a, b, c; int32_t i; FpSquareDoubleCore(a, in, false); FpSquareDoubleCore(b, a, false); FpSquareDoubleCore(b, b, false); FpMul(b, in, b); FpMul(a, a, b); FpSquareDoubleCore(a, a, false); FpMul(a, b, a); FpSquareDoubleCore(b, a, false); // b = a ^ (2^5) for (i = 1; i < 5; i++) { FpSquareDoubleCore(b, b, false); } FpMul(a, b, a); FpSquareDoubleCore(b, a, false); // b = a ^ (2^10) for (i = 1; i < 10; i++) { FpSquareDoubleCore(b, b, false); } FpMul(b, b, a); FpSquareDoubleCore(c, b, false); // c = b ^ (2^20) for (i = 1; i < 20; i++) { FpSquareDoubleCore(c, c, false); } FpMul(b, c, b); // b = b ^ (2^10) for (i = 0; i < 10; i++) { FpSquareDoubleCore(b, b, false); } FpMul(a, b, a); FpSquareDoubleCore(b, a, false); // b = a ^ (2^50) for (i = 1; i < 50; i++) { FpSquareDoubleCore(b, b, false); } FpMul(b, b, a); FpSquareDoubleCore(c, b, false); // c = b ^ (2 ^ 100) for (i = 1; i < 100; i++) { FpSquareDoubleCore(c, c, false); } FpMul(b, c, b); // b = b ^ (2^50) for (i = 0; i < 50; i++) { FpSquareDoubleCore(b, b, false); } FpMul(a, b, a); FpSquareDoubleCore(a, a, false); FpSquareDoubleCore(a, a, false); FpMul(out, a, in); } #endif static void PaddingUnload(uint8_t out[32], Fp25 pFp25) { int32_t *p = (int32_t *)pFp25; /* Take a polynomial form number into a 32-byte array */ CURVE25519_BYTES4_PADDING_UNLOAD(out, 2, p); /* p0 unload 4 bytes on out[0] expand 2 */ CURVE25519_BYTES3_PADDING_UNLOAD(out + 4, 2, 3, p + 1); /* p1 unload 3 bytes on out[4] shift 2 expand 3 */ CURVE25519_BYTES3_PADDING_UNLOAD(out + 7, 3, 5, p + 2); /* p2 unload 3 bytes on out[7] shift 3 expand 5 */ CURVE25519_BYTES3_PADDING_UNLOAD(out + 10, 5, 6, p + 3); /* p3 unload 3 bytes on out[10] shift 5 expand 6 */ CURVE25519_BYTES3_UNLOAD(out + 13, 6, p + 4); /* p4 unload 3 bytes on out[13] shift 6 */ CURVE25519_BYTES4_PADDING_UNLOAD(out + 16, 1, p + 5); /* p5 unload 4 bytes on out[16] expand 1 */ CURVE25519_BYTES3_PADDING_UNLOAD(out + 20, 1, 3, p + 6); /* p6 unload 3 bytes on out[20] shift 1 expand 3 */ CURVE25519_BYTES3_PADDING_UNLOAD(out + 23, 3, 4, p + 7); /* p7 unload 3 bytes on out[23] shift 3 expand 4 */ CURVE25519_BYTES3_PADDING_UNLOAD(out + 26, 4, 6, p + 8); /* p8 unload 3 bytes on out[26] shift 4 expand 6 */ CURVE25519_BYTES3_UNLOAD(out + 29, 6, p + 9); /* p9 unload 3 bytes on out[29] shift 6 */ } void PolynomialToData(uint8_t out[32], const Fp25 polynomial) { Fp25 pFp25; uint32_t pos; uint32_t over; uint32_t mul19; uint32_t signMask; CURVE25519_FP_COPY(pFp25, polynomial); /* First process, all the carry transport to pFp25[0] */ mul19 = (uint32_t)pFp25[9] * 19; // mul 19 for mod over = mul19 + (1 << 24); // plus 1 << 24 for carry // restricted to 25 bits, shift 31 for sign signMask = (-(over >> 31)) & MASK_HIGH32(25); over = (over >> 25) | signMask; // 25 bits pos = 0; do { over = (uint32_t)pFp25[pos] + over; // first carry is restricted to 25 bits, shift 31 for sign signMask = (-(over >> 31)) & MASK_HIGH32(25); over = (over >> 25) | signMask; // 25 bits pos++; over = (uint32_t)pFp25[pos] + over; // second carry is restricted to 26 bits, shift 31 for sign signMask = (-(over >> 31)) & MASK_HIGH32(26); over = (over >> 26) | signMask; // 26 bits pos++; } while (pos < 10); // process from 0 to 9, pos < 10 mul19 = over * 19; // mul 19 for mod pFp25[0] += (int32_t)mul19; /* We subtracted 2^255-19 and get the result * all polynomial[i] is restricted to 25 bits or 26 bits */ pos = 0; do { // first polynomial is restricted to 26 bits, shift 31 for sign signMask = (-((uint32_t)pFp25[pos] >> 31)) & MASK_HIGH32(26); over = ((uint32_t)pFp25[pos] >> 26) | signMask; // 26 bits pFp25[pos] = (int32_t)((uint32_t)pFp25[pos] & MASK_LOW32(26)); // 26 bits pos++; pFp25[pos] += (int32_t)over; // second polynomial is restricted to 25 bits, shift 31 for sign signMask = (-((uint32_t)pFp25[pos] >> 31)) & MASK_HIGH32(25); over = ((uint32_t)pFp25[pos] >> 25) | signMask; // 25 bits pFp25[pos] = (int32_t)((uint32_t)pFp25[pos] & MASK_LOW32(25)); pos++; pFp25[pos] += (int32_t)over; } while (pos < 8); // process form 0 to 7, pos < 8 // process pFp25[8], restricted to 26 bits, shift 31 for sign signMask = (-((uint32_t)pFp25[pos] >> 31)) & MASK_HIGH32(26); over = ((uint32_t)pFp25[pos] >> 26) | signMask; // 26 bits pFp25[pos] = (int32_t)((uint32_t)pFp25[pos] & MASK_LOW32(26)); // 26 bits pos++; // process pFp25[9] pFp25[pos] += (int32_t)over; pFp25[pos] = (int32_t)((uint32_t)pFp25[pos] & MASK_LOW32(25)); // pFp25[9] is restricted to 25 bits PaddingUnload(out, pFp25); } /* unified addition in Extended twist Edwards Coordinate */ /* out = out + tableElement */ static void GeAdd(GeE *out, const GePre *tableElement) { Fp25 a; Fp25 b; Fp25 c; Fp25 d; Fp25 e; Fp25 f; Fp25 g; Fp25 h; /* a = (Y1 − X1) * (Y2 − X2), b = (Y1 + X1) * (Y2 + X2) * c = 2 * d * T1 * X2 * Y2, d = 2 * Z1 * e = b − a, f = d − c, g = d + c, h = b + a * X3 = e * f, Y3 = g * h, T3 = e * h, Z3 = f * g */ CURVE25519_FP_ADD(e, out->y, out->x); CURVE25519_FP_SUB(f, out->y, out->x); FpMul(b, e, tableElement->yplusx); FpMul(a, f, tableElement->yminusx); FpMul(c, out->t, tableElement->xy2d); CURVE25519_FP_ADD(d, out->z, out->z); CURVE25519_FP_SUB(e, b, a); CURVE25519_FP_SUB(f, d, c); CURVE25519_FP_ADD(g, d, c); CURVE25519_FP_ADD(h, b, a); FpMul(out->x, e, f); FpMul(out->y, h, g); FpMul(out->z, g, f); FpMul(out->t, e, h); } #ifdef HITLS_CRYPTO_ED25519 /* out = out - tableElement */ static void GeSub(GeE *out, const GePre *tableElement) { Fp25 a; Fp25 b; Fp25 c; Fp25 d; Fp25 e; Fp25 f; Fp25 g; Fp25 h; CURVE25519_FP_ADD(e, out->y, out->x); CURVE25519_FP_SUB(f, out->y, out->x); FpMul(b, e, tableElement->yminusx); FpMul(a, f, tableElement->yplusx); FpMul(c, out->t, tableElement->xy2d); CURVE25519_FP_ADD(d, out->z, out->z); CURVE25519_FP_SUB(e, b, a); CURVE25519_FP_ADD(f, d, c); CURVE25519_FP_SUB(g, d, c); CURVE25519_FP_ADD(h, b, a); FpMul(out->x, e, f); FpMul(out->y, h, g); FpMul(out->z, g, f); FpMul(out->t, e, h); } #endif /* double in Projective twist Edwards Coordinate */ static void ProjectiveDouble(GeC *complete, const GeP *projective) { Fp25 tmp; FpSquareDoubleCore((complete->x), (projective->x), false); FpSquareDoubleCore((complete->z), (projective->y), false); // T = 2 * Z^2 FpSquareDoubleCore(complete->t, projective->z, true); CURVE25519_FP_ADD(complete->y, projective->x, projective->y); FpSquareDoubleCore(tmp, complete->y, false); // tmp = (X1 + Y1) ^ 2, T = 2 * Z^2, X = X1 ^ 2, Y = Z1 ^ 2, Z = Y1 ^ 2 CURVE25519_FP_ADD(complete->y, complete->z, complete->x); CURVE25519_FP_SUB(complete->z, complete->z, complete->x); CURVE25519_FP_SUB(complete->x, tmp, complete->y); CURVE25519_FP_SUB(complete->t, complete->t, complete->z); } /* Convert complete coordinate to projective coordinate */ static void GeCompleteToProjective(GeP *out, const GeC *complete) { FpMul(out->x, complete->t, complete->x); FpMul(out->y, complete->z, complete->y); FpMul(out->z, complete->t, complete->z); } /* p1 = 16 * p1 */ static void P1DoubleFourTimes(GeE *p1) { GeP p; GeC c; // From extended coordinate to projective coordinate, just ignore T CURVE25519_FP_COPY(p.x, p1->x); CURVE25519_FP_COPY(p.y, p1->y); CURVE25519_FP_COPY(p.z, p1->z); // double 4 times to get 16p1 ProjectiveDouble(&c, &p); GeCompleteToProjective(&p, &c); ProjectiveDouble(&c, &p); GeCompleteToProjective(&p, &c); ProjectiveDouble(&c, &p); GeCompleteToProjective(&p, &c); ProjectiveDouble(&c, &p); FpMul(p1->x, c.x, c.t); FpMul(p1->y, c.y, c.z); FpMul(p1->z, c.z, c.t); FpMul(p1->t, c.x, c.y); } static void SetExtendedBasePoint(GeE *out) { CURVE25519_FP_SET(out->x, 0); CURVE25519_FP_SET(out->y, 1); CURVE25519_FP_SET(out->t, 0); CURVE25519_FP_SET(out->z, 1); } /* Multiple with Base point, see paper: High-speed high-security signatures */ void ScalarMultiBase(GeE *out, const uint8_t in[CRYPT_CURVE25519_KEYLEN]) { uint8_t carry; // inLen is always 32, buffer needs 32 * 2 = 64 uint8_t privateKey[64]; int32_t i; GePre preCompute; // split 32 8bits input into 64 4bits-based number for (i = 0; i < 32; i++) { privateKey[i * 2] = in[i] & 15; // and 15 to get low 4 bits, stored in 2i privateKey[i * 2 + 1] = (in[i] >> 4) & 15; // shift 4 then and 15 to get upper 4 bits, stored in 2i+1 } carry = 0; /** * change from 0 - 15 to -8 - 7, if privateKey[i] >= 8, carry = 1, privateKey[i] -= 16 * if privateKey[i] < 8, privateKey[i] = privateKey[i] */ for (i = 0; i < 63; i++) { // 0 to 63 privateKey[i] += carry; carry = (privateKey[i] + 8) >> 4; // plus 8 then shit 4 to get carry privateKey[i] -= carry << 4; // left shift 4 } // never overflow since we set first bit to 0 of private key privateKey[63] += carry; // last one is 63 // set base point X:Y:T:Z -> 0:1:0:1 SetExtendedBasePoint(out); for (i = 1; i < 64; i += 2) { // form 1 to 63, process all odd element, increment by 2, i < 64 TableLookup(&preCompute, i / 2, (int8_t)privateKey[i]); // position goes from 0 to 31, i / 2 = pos // Fit with paper: Twisted Edwards Curves Revisited GeAdd(out, &preCompute); } // now we have P1, double it four times we have 16P1, P1 is in Extended now, we do double in projective coordinate P1DoubleFourTimes(out); // Add P0 with precomute for (i = 0; i < 64; i += 2) { // form 0 to 62, process all even element, increment by 2, i < 64 TableLookup(&preCompute, i / 2, (int8_t)privateKey[i]); // position goes from 0 to 31, i / 2 = pos GeAdd(out, &preCompute); } // clean up private key information BSL_SAL_CleanseData(privateKey, sizeof(privateKey)); } #ifdef HITLS_CRYPTO_ED25519 void PointEncoding(const GeE *point, uint8_t *output, uint32_t outputLen) { Fp25 zInvert; Fp25 x; Fp25 y; uint8_t xData[CRYPT_CURVE25519_KEYLEN]; /* x = X / Z, y = Y / Z */ (void)outputLen; FpInvert(zInvert, point->z); FpMul(x, point->x, zInvert); FpMul(y, point->y, zInvert); PolynomialToData(output, y); PolynomialToData(xData, x); // PointEcoding writes only 32 bytes data, therefore output[31] is the last one output[31] ^= (xData[0] & 0x1) << 7; // last one is output[31], get only last bit then shift 7 } #endif static void FeCmove(Fp25 dst, const Fp25 src, const uint32_t indicator) { // if indicator = 1, now it will be 111111111111b.... const uint32_t indicate = 0 - indicator; /* des become source if dst->data[i] ^ src->data[i] is in 1111....b, or it does not change if (dst->data[i] ^ src->data[i]) & indicate is all 0 */ dst[0] = CONDITION_COPY(dst[0], src[0], indicate); // 0 dst[1] = CONDITION_COPY(dst[1], src[1], indicate); // 1 dst[2] = CONDITION_COPY(dst[2], src[2], indicate); // 2 dst[3] = CONDITION_COPY(dst[3], src[3], indicate); // 3 dst[4] = CONDITION_COPY(dst[4], src[4], indicate); // 4 dst[5] = CONDITION_COPY(dst[5], src[5], indicate); // 5 dst[6] = CONDITION_COPY(dst[6], src[6], indicate); // 6 dst[7] = CONDITION_COPY(dst[7], src[7], indicate); // 7 dst[8] = CONDITION_COPY(dst[8], src[8], indicate); // 8 dst[9] = CONDITION_COPY(dst[9], src[9], indicate); // 9 } void ConditionalMove(GePre *preCompute, const GePre *tableElement, uint32_t indicator) { FeCmove(preCompute->yplusx, tableElement->yplusx, indicator); FeCmove(preCompute->yminusx, tableElement->yminusx, indicator); FeCmove(preCompute->xy2d, tableElement->xy2d, indicator); } void DataToPolynomial(Fp25 out, const uint8_t data[32]) { const uint8_t *t = data; uint64_t p[10]; uint64_t over; int32_t i; uint64_t signMask; /* f0, load 32 bits */ CURVE25519_BYTES4_LOAD(p, t); /* f1, load 24 bits from t4, shift bits: 26 - 24 - (8 - x) = 0 -> x = 6 */ CURVE25519_BYTES3_LOAD_PADDING(p + 1, 6, t + 4); /* f2, load 24 bits from t7, shift bits: 51 - 48 - (8 - x) = 0 -> x = 5 */ CURVE25519_BYTES3_LOAD_PADDING(p + 2, 5, t + 7); /* f3, load 24 bits from t10, shift bits: 77 - 72 - (8 - x) = 0 -> x = 3 */ CURVE25519_BYTES3_LOAD_PADDING(p + 3, 3, t + 10); /* f4, load 24 bits from t13, shift bits: 102 - 96 - (8 - x) = 0 -> x = 2 */ CURVE25519_BYTES3_LOAD_PADDING(p + 4, 2, t + 13); /* f5, load 32 bits from t16 */ CURVE25519_BYTES4_LOAD(p + 5, t + 16); /* f6, load 24 bits from t20, shift bits: 153 - 152 - (8 - x) = 0 -> x = 7 */ CURVE25519_BYTES3_LOAD_PADDING(p + 6, 7, t + 20); /* f7, load 24 bits from t23, shift bits: 179 - 176 - (8 - x) = 0 -> x = 5 */ CURVE25519_BYTES3_LOAD_PADDING(p + 7, 5, t + 23); /* f8, load 24 bits from t26, shift bits: 204 - 200 - (8 - x) = 0 -> x = 4 */ CURVE25519_BYTES3_LOAD_PADDING(p + 8, 4, t + 26); /* f9, load 24 bits from t29, shift bits: 230 - 224 - (8 - x) = 0 -> x = 2 */ CURVE25519_BYTES3_LOAD(p + 9, t + 29); p[9] = (p[9] & 0x7fffff) << 2; /* p9 is 25 bits, left shift 2 */ /* Limiting the number of bits, exchange 2^1 to 2^25.5, turn into polynomial representation */ /* f9->f0, shift 24 for carry */ over = p[9] + (1 << 24); signMask = MASK_HIGH64(25) & (-((over) >> 63)); // shift 63 bits for sign, mask 25 bits p[0] += ((over >> 25) | signMask) * 19; // 24 bits plus sign is 25, mul 19 for mod p[9] -= MASK_HIGH64(39) & over; // 64 - 25 = 39 bits mask /* f1->f2, restricted to 24 bits */ PROCESS_CARRY(p[1], p[2], signMask, over, 24); /* f3->f4, restricted to 24 bits */ PROCESS_CARRY(p[3], p[4], signMask, over, 24); /* f5->f6, restricted to 24 bits */ PROCESS_CARRY(p[5], p[6], signMask, over, 24); /* f7->f8, restricted to 24 bits */ PROCESS_CARRY(p[7], p[8], signMask, over, 24); /* f0->f1, restricted to 25 bits */ PROCESS_CARRY(p[0], p[1], signMask, over, 25); /* f2->f3, restricted to 25 bits */ PROCESS_CARRY(p[2], p[3], signMask, over, 25); /* f4->f5, restricted to 25 bits */ PROCESS_CARRY(p[4], p[5], signMask, over, 25); /* f6->f7, restricted to 25 bits */ PROCESS_CARRY(p[6], p[7], signMask, over, 25); /* f8->f9, restricted to 25 bits */ PROCESS_CARRY(p[8], p[9], signMask, over, 25); /* After process carry, polynomial every term would not exceed 32 bits, convert form 0 to 9, i < 10 */ for (i = 0; i < 10; i++) { out[i] = (int32_t)p[i]; } } #ifdef HITLS_CRYPTO_ED25519 static bool CheckZero(Fp25 x) { uint8_t tmp[32]; const uint8_t zero[32] = {0}; PolynomialToData(tmp, x); if (memcmp(tmp, zero, sizeof(zero)) == 0) { return true; } else { return false; } } static uint8_t GetXBit(Fp25 in) { uint8_t tmp[32]; PolynomialToData(tmp, in); return tmp[0] & 0x1; } static const Fp25 SQRTM1 = {-32595792, -7943725, 9377950, 3500415, 12389472, -272473, -25146209, -2005654, 326686, 11406482}; static const Fp25 D = {-10913610, 13857413, -15372611, 6949391, 114729, -8787816, -6275908, -3247719, -18696448, -12055116}; int32_t PointDecoding(GeE *point, const uint8_t in[CRYPT_CURVE25519_KEYLEN]) { Fp25 u, v, v3, x2, result; // get the last block (31), shift 7 for first bit uint8_t x0 = in[31] >> 7; DataToPolynomial(point->y, in); CURVE25519_FP_SET(point->z, 1); FpSquareDoubleCore(u, point->y, false); FpMul(v, u, D); CURVE25519_FP_SUB(u, u, point->z); CURVE25519_FP_ADD(v, v, point->z); FpSquareDoubleCore(v3, v, false); FpMul(v3, v3, v); FpSquareDoubleCore(point->x, v3, false); FpMul(point->x, point->x, v); FpMul(point->x, point->x, u); /* x = x ^ ((q - 5) / 8) */ FpPowq58(point->x, point->x); FpMul(point->x, point->x, v3); FpMul(point->x, point->x, u); FpSquareDoubleCore(x2, point->x, false); FpMul(x2, x2, v); CURVE25519_FP_SUB(result, x2, u); if (CheckZero(result) == false) { CURVE25519_FP_ADD(result, x2, u); if (CheckZero(result) == false) { return 1; } FpMul(point->x, point->x, SQRTM1); } uint8_t bit = GetXBit(point->x); if (bit != x0) { CURVE25519_FP_NEGATE(point->x, point->x); } FpMul(point->t, point->x, point->y); return 0; } static void ScalarMulAddPreLoad(const uint8_t in[CRYPT_CURVE25519_KEYLEN], uint64_t out[UINT8_32_21BITS_BLOCKNUM]) { CURVE25519_BYTES3_LOAD(&out[0], in); out[0] = out[0] & MASK_64_LOW21; CURVE25519_BYTES4_LOAD(&out[1], in + 2); // 1: load 4 bytes form position 2 out[1] = MASK_64_LOW21 & (out[1] >> 5); // 1: 8 - ((3 * 8) mod 21) mod 8 = 5 CURVE25519_BYTES3_LOAD(&out[2], in + 5); // 2: load 3 bytes form position 5 out[2] = MASK_64_LOW21 & (out[2] >> 2); // 2: 8 - ((6 * 8) mod 21) mod 8 = 2 CURVE25519_BYTES4_LOAD(&out[3], in + 7); // 3: load 4 bytes form position 7 out[3] = MASK_64_LOW21 & (out[3] >> 7); // 3: 8 - ((8 * 8) mod 21) mod 8 = 7 CURVE25519_BYTES4_LOAD(&out[4], in + 10); // 4: load 4 bytes form position 10 out[4] = MASK_64_LOW21 & (out[4] >> 4); // 4: 8 - ((11 * 8) mod 21) mod 8 = 4 CURVE25519_BYTES3_LOAD(&out[5], in + 13); // 5: load 3 bytes form position 13 out[5] = MASK_64_LOW21 & (out[5] >> 1); // 5: 8 - ((14 * 8) mod 21) mod 8 = 1 CURVE25519_BYTES4_LOAD(&out[6], in + 15); // 6: load 4 bytes form position 15 out[6] = MASK_64_LOW21 & (out[6] >> 6); // 6: 8 - ((16 * 8) mod 21) mod 8 = 6 CURVE25519_BYTES3_LOAD(&out[7], in + 18); // 7: load 3 bytes form position 18 out[7] = MASK_64_LOW21 & (out[7] >> 3); // 7: 8 - ((19 * 8) mod 21) mod 8 = 3 CURVE25519_BYTES3_LOAD(&out[8], in + 21); // 8: load 3 bytes form position 21 out[8] = MASK_64_LOW21 & out[8]; // 8: ((22 * 8) mod 21) mod 8 = 0 CURVE25519_BYTES4_LOAD(&out[9], in + 23); // 9: load 4 bytes form position 23 out[9] = MASK_64_LOW21 & (out[9] >> 5); // 9: 8 - ((24 * 8) mod 21) mod 8 = 5 CURVE25519_BYTES3_LOAD(&out[10], in + 26); // 10: load 3 bytes form position 26 out[10] = MASK_64_LOW21 & (out[10] >> 2); // 10: 8 - ((27 * 8) mod 21) mod 8 = 2 CURVE25519_BYTES4_LOAD(&out[11], in + 28); // 11: load 4 bytes form position 28 out[11] = (out[11] >> 7); // 11: 8 - ((29 * 8) mod 21) mod 8 = 7 } static void ModuloLPreLoad(const uint8_t s[CRYPT_CURVE25519_SIGNLEN], uint64_t s21Bits[UINT8_64_21BITS_BLOCKNUM]) { CURVE25519_BYTES3_LOAD(&s21Bits[0], s); s21Bits[0] = s21Bits[0] & MASK_64_LOW21; CURVE25519_BYTES4_LOAD(&s21Bits[1], s + 2); // 1: load 4 bytes form position 2 s21Bits[1] = MASK_64_LOW21 & (s21Bits[1] >> 5); // 1: 8 - ((3 * 8) mod 21) mod 8 = 5 CURVE25519_BYTES3_LOAD(&s21Bits[2], s + 5); // 2: load 3 bytes form position 5 s21Bits[2] = MASK_64_LOW21 & (s21Bits[2] >> 2); // 2: 8 - ((6 * 8) mod 21) mod 8 = 2 CURVE25519_BYTES4_LOAD(&s21Bits[3], s + 7); // 3: load 4 bytes form position 7 s21Bits[3] = MASK_64_LOW21 & (s21Bits[3] >> 7); // 3: 8 - ((8 * 8) mod 21) mod 8 = 7 CURVE25519_BYTES4_LOAD(&s21Bits[4], s + 10); // 4: load 4 bytes form position 10 s21Bits[4] = MASK_64_LOW21 & (s21Bits[4] >> 4); // 4: 8 - ((11 * 8) mod 21) mod 8 = 4 CURVE25519_BYTES3_LOAD(&s21Bits[5], s + 13); // 5: load 3 bytes form position 13 s21Bits[5] = MASK_64_LOW21 & (s21Bits[5] >> 1); // 5: 8 - ((14 * 8) mod 21) mod 8 = 1 CURVE25519_BYTES4_LOAD(&s21Bits[6], s + 15); // 6: load 4 bytes form position 15 s21Bits[6] = MASK_64_LOW21 & (s21Bits[6] >> 6); // 6: 8 - ((16 * 8) mod 21) mod 8 = 6 CURVE25519_BYTES3_LOAD(&s21Bits[7], s + 18); // 7: load 3 bytes form position 18 s21Bits[7] = MASK_64_LOW21 & (s21Bits[7] >> 3); // 7: 8 - ((19 * 8) mod 21) mod 8 = 3 CURVE25519_BYTES3_LOAD(&s21Bits[8], s + 21); // 8: load 3 bytes form position 21 s21Bits[8] = MASK_64_LOW21 & s21Bits[8]; // 8: ((22 * 8) mod 21) mod 8 = 0 CURVE25519_BYTES4_LOAD(&s21Bits[9], s + 23); // 9: load 4 bytes form position 23 s21Bits[9] = MASK_64_LOW21 & (s21Bits[9] >> 5); // 9: 8 - ((24 * 8) mod 21) mod 8 = 5 CURVE25519_BYTES3_LOAD(&s21Bits[10], s + 26); // 10: load 3 bytes form position 26 s21Bits[10] = MASK_64_LOW21 & (s21Bits[10] >> 2); // 10: 8 - ((27 * 8) mod 21) mod 8 = 2 CURVE25519_BYTES4_LOAD(&s21Bits[11], s + 28); // 11: load 4 bytes form position 28 s21Bits[11] = MASK_64_LOW21 & (s21Bits[11] >> 7); // 11: 8 - ((29 * 8) mod 21) mod 8 = 7 CURVE25519_BYTES4_LOAD(&s21Bits[12], s + 31); // 12: load 4 bytes form position 31 s21Bits[12] = MASK_64_LOW21 & (s21Bits[12] >> 4); // 12: 8 - ((32 * 8) mod 21) mod 8 = 4 CURVE25519_BYTES3_LOAD(&s21Bits[13], s + 34); // 13: load 3 bytes form position 34 s21Bits[13] = MASK_64_LOW21 & (s21Bits[13] >> 1); // 13: 8 - ((35 * 8) mod 21) mod 8 = 1 CURVE25519_BYTES4_LOAD(&s21Bits[14], s + 36); // 14: load 4 bytes form position 36 s21Bits[14] = MASK_64_LOW21 & (s21Bits[14] >> 6); // 14: 8 - ((37 * 8) mod 21) mod 8 = 6 CURVE25519_BYTES3_LOAD(&s21Bits[15], s + 39); // 15: load 3 bytes form position 39 s21Bits[15] = MASK_64_LOW21 & (s21Bits[15] >> 3); // 15: 8 - ((40 * 8) mod 21) mod 8 = 3 CURVE25519_BYTES3_LOAD(&s21Bits[16], s + 42); // 16: load 3 bytes form position 42 s21Bits[16] = MASK_64_LOW21 & s21Bits[16]; // 16: ((43 * 8) mod 21) mod 8 = 0 CURVE25519_BYTES4_LOAD(&s21Bits[17], s + 44); // 17: load 4 bytes form position 44 s21Bits[17] = MASK_64_LOW21 & (s21Bits[17] >> 5); // 17: 8 - ((45 * 8) mod 21) mod 8 = 5 CURVE25519_BYTES3_LOAD(&s21Bits[18], s + 47); // 18: load 3 bytes form position 47 s21Bits[18] = MASK_64_LOW21 & (s21Bits[18] >> 2); // 18: 8 - ((48 * 8) mod 21) mod 8 = 2 CURVE25519_BYTES4_LOAD(&s21Bits[19], s + 49); // 19: load 4 bytes form position 49 s21Bits[19] = MASK_64_LOW21 & (s21Bits[19] >> 7); // 19: 8 - ((50 * 8) mod 21) mod 8 = 7 CURVE25519_BYTES4_LOAD(&s21Bits[20], s + 52); // 20: load 4 bytes form position 52 s21Bits[20] = MASK_64_LOW21 & (s21Bits[20] >> 4); // 20: 8 - ((53 * 8) mod 21) mod 8 = 4 CURVE25519_BYTES3_LOAD(&s21Bits[21], s + 55); // 21: load 3 bytes form position 55 s21Bits[21] = MASK_64_LOW21 & (s21Bits[21] >> 1); // 21: 8 - ((56 * 8) mod 21) mod 8 = 1 CURVE25519_BYTES4_LOAD(&s21Bits[22], s + 57); // 22: load 4 bytes form position 57 s21Bits[22] = MASK_64_LOW21 & (s21Bits[22] >> 6); // 22: 8 - ((58 * 8) mod 21) mod 8 = 6 CURVE25519_BYTES4_LOAD(&s21Bits[23], s + 60); // 23: load 4 bytes form position 60 s21Bits[23] = s21Bits[23] >> 3; // 23: 8 - ((61 * 8) mod 21) mod 8 = 3 } static void UnloadTo8Bits(uint8_t s8Bits[CRYPT_CURVE25519_OPTLEN], uint64_t s21Bits[UINT8_64_21BITS_BLOCKNUM]) { s8Bits[0] = (uint8_t)s21Bits[0]; // 1: load from 8 on block 0 s8Bits[1] = (uint8_t)(s21Bits[0] >> 8); // 2: load from (16 + 1) to 21 on block 0 and 1 to 3 on block 1, 8 - 3 = 5 s8Bits[2] = (uint8_t)((s21Bits[0] >> 16) | (s21Bits[1] << 5)); // 3: load from (3 + 1) on block 1 s8Bits[3] = (uint8_t)(s21Bits[1] >> 3); // 4: load from (11 + 1) on block 1 s8Bits[4] = (uint8_t)(s21Bits[1] >> 11); // 5: load from (19 + 1) to 21 on block 1 and 1 to 6 on block 2, 8 - 6 = 2 s8Bits[5] = (uint8_t)((s21Bits[1] >> 19) | (s21Bits[2] << 2)); // 6: load from (6 + 1) on block 2 s8Bits[6] = (uint8_t)(s21Bits[2] >> 6); // 7: load from (14 + 1) to 21 on block 2 and 1 on block 3, 8 - 7 = 1 s8Bits[7] = (uint8_t)((s21Bits[2] >> 14) | (s21Bits[3] << 7)); // 8: load from (1 + 1) on block 3 s8Bits[8] = (uint8_t)(s21Bits[3] >> 1); // 9: load from (9 + 1) on block 3 s8Bits[9] = (uint8_t)(s21Bits[3] >> 9); // 10: load from (17 + 1) to 21 on block 3 and 1 to 4 on block 4, 8 - 4 = 4 s8Bits[10] = (uint8_t)((s21Bits[3] >> 17) | (s21Bits[4] << 4)); // 11: load from (4 + 1) on block 4 s8Bits[11] = (uint8_t)(s21Bits[4] >> 4); // 12: load from (12 + 1) on block 4 s8Bits[12] = (uint8_t)(s21Bits[4] >> 12); // 13: load from (20 + 1) on block 4 and 1 to 7 on block 5, 8 - 7 = 1 s8Bits[13] = (uint8_t)((s21Bits[4] >> 20) | (s21Bits[5] << 1)); // 14: load from (7 + 1) on block 5 s8Bits[14] = (uint8_t)(s21Bits[5] >> 7); // 15: load from (15 + 1) to 21 on block 5 and 1 to 2 on block 6, 8 - 2 = 6 s8Bits[15] = (uint8_t)((s21Bits[5] >> 15) | (s21Bits[6] << 6)); // 16: load from (2 + 1) on block 6 s8Bits[16] = (uint8_t)(s21Bits[6] >> 2); // 17: load from (10 + 1) on block 6 s8Bits[17] = (uint8_t)(s21Bits[6] >> 10); // 18: load from (18 + 1) to 21 on block 6 and 1 to 5 on block 7, 8 - 5 = 3 s8Bits[18] = (uint8_t)((s21Bits[6] >> 18) | (s21Bits[7] << 3)); // 19: load from (5 + 1) on block 7 s8Bits[19] = (uint8_t)(s21Bits[7] >> 5); // 20: load from (13 + 1) on block 7 s8Bits[20] = (uint8_t)(s21Bits[7] >> 13); // 21: load 8bits on block 8 s8Bits[21] = (uint8_t)s21Bits[8]; // 22: load from (8 + 1) on block 8 s8Bits[22] = (uint8_t)(s21Bits[8] >> 8); // 23: load from (16 + 1) to 21 on block 8 and 1 to 3 on block 9, 8 - 3 = 5 s8Bits[23] = (uint8_t)((s21Bits[8] >> 16) | (s21Bits[9] << 5)); // 24: load from (3 + 1) on block 9 s8Bits[24] = (uint8_t)(s21Bits[9] >> 3); // 25: load from (11 + 1) on block 9 s8Bits[25] = (uint8_t)(s21Bits[9] >> 11); // 26: load from (19 + 1) to 21 on block 9 and 1 to 6 on block 10, 8 - 6 = 2 s8Bits[26] = (uint8_t)((s21Bits[9] >> 19) | (s21Bits[10] << 2)); // 27: load from (6 + 1) on block 10 s8Bits[27] = (uint8_t)(s21Bits[10] >> 6); // 28: load from (14 + 1) to 21 on block 10 and 1 on block 11, 8 - 7 = 1 s8Bits[28] = (uint8_t)((s21Bits[10] >> 14) | (s21Bits[11] << 7)); // 29: load from (1 + 1) on block 11 s8Bits[29] = (uint8_t)(s21Bits[11] >> 1); // 30: load from (9 + 1) on block 11 s8Bits[30] = (uint8_t)(s21Bits[11] >> 9); // 31: load from (17 + 1) on block 11 s8Bits[31] = (uint8_t)(s21Bits[11] >> 17); } static void ModuloLCore(uint64_t s21Bits[UINT8_64_21BITS_BLOCKNUM]) { int32_t i; uint64_t signMask1, signMask2; uint64_t carry1, carry2; // multiply by l0, start with {11, 12, 13, 14, 15, 16} to {6, 7, 8, 9, 10, 11, 12} CURVE25519_MULTI_BY_L0(s21Bits, 11); CURVE25519_MULTI_BY_L0(s21Bits, 10); CURVE25519_MULTI_BY_L0(s21Bits, 9); CURVE25519_MULTI_BY_L0(s21Bits, 8); CURVE25519_MULTI_BY_L0(s21Bits, 7); CURVE25519_MULTI_BY_L0(s21Bits, 6); // need to process carry to prevent overflow, process carry from 6->7, 8->9 ... 16->17, increment by 2 for (i = 6; i <= 16; i += 2) { // 21 bits minus sign is 20 bits PROCESS_CARRY(s21Bits[i], s21Bits[i + 1], signMask1, carry1, 20); } // process carry from 7->8, 9->10 ... 15->16, increment by 2 for (i = 7; i <= 15; i += 2) { // 21 bits minus sign bit is 20 bits PROCESS_CARRY(s21Bits[i], s21Bits[i + 1], signMask2, carry2, 20); } // {5, 6, 7, 8, 9, 10} to {0, 1, 2, 3, 4, 5, 6} CURVE25519_MULTI_BY_L0(s21Bits, 5); CURVE25519_MULTI_BY_L0(s21Bits, 4); CURVE25519_MULTI_BY_L0(s21Bits, 3); CURVE25519_MULTI_BY_L0(s21Bits, 2); CURVE25519_MULTI_BY_L0(s21Bits, 1); CURVE25519_MULTI_BY_L0(s21Bits, 0); // process carry again, from 0->1, 2->3 ... 10->11, increment by 2 for (i = 0; i <= 10; i += 2) { // 21 bits minus sign bit is 20 bits PROCESS_CARRY(s21Bits[i], s21Bits[i + 1], signMask1, carry1, 20); } // from 1->2, 3->4 ... 11->12, increment by 2 for (i = 1; i <= 11; i += 2) { // 21 bits minus sign is 20 bits PROCESS_CARRY(s21Bits[i], s21Bits[i + 1], signMask2, carry2, 20); } CURVE25519_MULTI_BY_L0(s21Bits, 0); // process carry from 0 to 11 for (i = 0; i <= 11; i++) { PROCESS_CARRY_UNSIGN(s21Bits[i], s21Bits[i + 1], signMask1, carry1, 21); // s21Bits is 21 bits } CURVE25519_MULTI_BY_L0(s21Bits, 0); // from 0 to 10 for (i = 0; i <= 10; i++) { PROCESS_CARRY_UNSIGN(s21Bits[i], s21Bits[i + 1], signMask1, carry1, 21); // s21Bits is 21 bits } } void ModuloL(uint8_t s[CRYPT_CURVE25519_SIGNLEN]) { // 24 of 21 bits block uint64_t s21Bits[UINT8_64_21BITS_BLOCKNUM] = {0}; ModuloLPreLoad(s, s21Bits); ModuloLCore(s21Bits); UnloadTo8Bits(s, s21Bits); } static void MulAdd(uint64_t s21Bits[UINT8_64_21BITS_BLOCKNUM], const uint64_t a21Bits[UINT8_32_21BITS_BLOCKNUM], const uint64_t b21Bits[UINT8_32_21BITS_BLOCKNUM], const uint64_t c21Bits[UINT8_32_21BITS_BLOCKNUM]) { // s0 = c0 + a0b0 s21Bits[0] = c21Bits[0] + a21Bits[0] * b21Bits[0]; // s1 = c1 + a0b1 + a1b0 s21Bits[1] = c21Bits[1] + a21Bits[0] * b21Bits[1] + a21Bits[1] * b21Bits[0]; // s2 = c2 + a0b2 + b1a1 + a2b0 s21Bits[2] = c21Bits[2] + a21Bits[0] * b21Bits[2] + a21Bits[1] * b21Bits[1] + a21Bits[2] * b21Bits[0]; // s3 = c3 + a0b3 + a1b2 + a2b1 + a3b0 s21Bits[3] = c21Bits[3] + a21Bits[0] * b21Bits[3] + a21Bits[1] * b21Bits[2] + a21Bits[2] * b21Bits[1] + a21Bits[3] * b21Bits[0]; // a2b1 + a3b0 // s4 = c4 + a0b4 +a1b3 + a2b2 + a3b1 + a4b0 s21Bits[4] = c21Bits[4] + a21Bits[0] * b21Bits[4] + a21Bits[1] * b21Bits[3] + a21Bits[2] * b21Bits[2] + a21Bits[3] * b21Bits[1] + a21Bits[4] * b21Bits[0]; // a2b2 + a3b1 + a4b0 // s5 = c5 + a0b5 + a1b4 + a2b3 + a3b2 + a4b1 + a5b0 s21Bits[5] = c21Bits[5] + a21Bits[0] * b21Bits[5] + a21Bits[1] * b21Bits[4] + a21Bits[2] * b21Bits[3] + a21Bits[3] * b21Bits[2] + a21Bits[4] * b21Bits[1] + a21Bits[5] * b21Bits[0]; // a3b2 + a4b1 + a5b0 // s6 = c6 + a0b6 + a1b5 + a2b4 + a3b3 + a2b4 + a5b1 + a6b0 s21Bits[6] = c21Bits[6] + a21Bits[0] * b21Bits[6] + a21Bits[1] * b21Bits[5] + a21Bits[2] * b21Bits[4] + a21Bits[3] * b21Bits[3] + a21Bits[4] * b21Bits[2] + a21Bits[5] * b21Bits[1] + // a3b3 + a2b4 + a5b1 a21Bits[6] * b21Bits[0]; // a6b0 // s7 = c7 + a0b7 + a1b6 + a2b5 + a3b4 + a4b3 + a5b2 + a6b1 + a7b0 s21Bits[7] = c21Bits[7] + a21Bits[0] * b21Bits[7] + a21Bits[1] * b21Bits[6] + a21Bits[2] * b21Bits[5] + a21Bits[3] * b21Bits[4] + a21Bits[4] * b21Bits[3] + a21Bits[5] * b21Bits[2] + // a3b4 + a4b3 + a5b2 a21Bits[6] * b21Bits[1] + a21Bits[7] * b21Bits[0]; // a6b1 + a7b0 // s8 = c8 + a0b8 + a1b7 + a2b6 + a3b5 + a4b4 + a5b3 + a6b2 + a7b1 + a8b0 s21Bits[8] = c21Bits[8] + a21Bits[0] * b21Bits[8] + a21Bits[1] * b21Bits[7] + a21Bits[2] * b21Bits[6] + a21Bits[3] * b21Bits[5] + a21Bits[4] * b21Bits[4] + a21Bits[5] * b21Bits[3] + // a3b5 + a4b4 + a5b3 a21Bits[6] * b21Bits[2] + a21Bits[7] * b21Bits[1] + a21Bits[8] * b21Bits[0]; // a6b2 + a7b1 + a8b0 // s9 = c9 + a0b9 + a1b8 + a2b7 + a3b6 + a4b5 + a5b4 + a6b3 + a7b2 + a8b1 + a9b0 s21Bits[9] = c21Bits[9] + a21Bits[0] * b21Bits[9] + a21Bits[1] * b21Bits[8] + a21Bits[2] * b21Bits[7] + a21Bits[3] * b21Bits[6] + a21Bits[4] * b21Bits[5] + a21Bits[5] * b21Bits[4] + // a3b6 + a4b5 + a5b4 a21Bits[6] * b21Bits[3] + a21Bits[7] * b21Bits[2] + a21Bits[8] * b21Bits[1] + // a6b3 + a7b2 + a8b1 a21Bits[9] * b21Bits[0]; // a9b0 // s10 = c10 + a0b10 + a1b9 + a2b8 + a3b7 + a4b6 + a5b5 + a6b4 + a7b3 + a8b2 + a9b1 + a10b0 s21Bits[10] = c21Bits[10] + a21Bits[0] * b21Bits[10] + a21Bits[1] * b21Bits[9] + a21Bits[2] * b21Bits[8] + a21Bits[3] * b21Bits[7] + a21Bits[4] * b21Bits[6] + a21Bits[5] * b21Bits[5] + // a3b7 + a4b6 + a5b5 a21Bits[6] * b21Bits[4] + a21Bits[7] * b21Bits[3] + a21Bits[8] * b21Bits[2] + // a6b4 + a7b3 + a8b2 a21Bits[9] * b21Bits[1] + a21Bits[10] * b21Bits[0]; // a9b1 + a10b0 // s11 = c11 + a0b11 + a1b10 + a2b9 + a3b8 + a4b7 + a5b6 + a6b5 + a7b4 + a8b3 + a9b2 + a10b1 + a11b0 s21Bits[11] = c21Bits[11] + a21Bits[0] * b21Bits[11] + a21Bits[1] * b21Bits[10] + a21Bits[2] * b21Bits[9] + a21Bits[3] * b21Bits[8] + a21Bits[4] * b21Bits[7] + a21Bits[5] * b21Bits[6] + // a3b8 + a4b7 + a5b6 a21Bits[6] * b21Bits[5] + a21Bits[7] * b21Bits[4] + a21Bits[8] * b21Bits[3] + // a6b5 + a7b4 + a8b3 a21Bits[9] * b21Bits[2] + a21Bits[10] * b21Bits[1] + a21Bits[11] * b21Bits[0]; // a9b2 + a10b1 + a11b0 // s12 = a1b11 + a2b10 + a3b9 + a4b8 + a5b7 + a6b6 + a7b5 + a8b4 + a9b3 + a10b2 + a11b1 s21Bits[12] = a21Bits[1] * b21Bits[11] + a21Bits[2] * b21Bits[10] + a21Bits[3] * b21Bits[9] + a21Bits[4] * b21Bits[8] + a21Bits[5] * b21Bits[7] + a21Bits[6] * b21Bits[6] + // a4b8 + a5b7 + a6b6 a21Bits[7] * b21Bits[5] + a21Bits[8] * b21Bits[4] + a21Bits[9] * b21Bits[3] + // a7b5 + a8b4 + a9b3 a21Bits[10] * b21Bits[2] + a21Bits[11] * b21Bits[1]; // a10b2 + a11b1 // s13 = a2b11 + a3b10 + a4b9 + a5b8 + a6b7 + a7b6 + a8b5 + a9b4 + a10b3 + a11b2 s21Bits[13] = a21Bits[2] * b21Bits[11] + a21Bits[3] * b21Bits[10] + a21Bits[4] * b21Bits[9] + a21Bits[5] * b21Bits[8] + a21Bits[6] * b21Bits[7] + a21Bits[7] * b21Bits[6] + // a5b8 + a6b7 + a7b6 a21Bits[8] * b21Bits[5] + a21Bits[9] * b21Bits[4] + a21Bits[10] * b21Bits[3] + // a8b5 + a9b4 + a10b3 a21Bits[11] * b21Bits[2]; // a11b2 // s14 = a3b11 + a4b10 + a5b9 + a6b8 + a7b7 + a8b6 + a9b5 + a10b4 + a11b3 s21Bits[14] = a21Bits[3] * b21Bits[11] + a21Bits[4] * b21Bits[10] + a21Bits[5] * b21Bits[9] + a21Bits[6] * b21Bits[8] + a21Bits[7] * b21Bits[7] + a21Bits[8] * b21Bits[6] + // a6b8 + a7b7 + a8b6 a21Bits[9] * b21Bits[5] + a21Bits[10] * b21Bits[4] + a21Bits[11] * b21Bits[3]; // a9b5 + a10b4 + a11b3 // s15 = a4b11 + a5b10 + a6b9 + a7b8 + a8b7 + a9b6 + a10b5 + a11b4 s21Bits[15] = a21Bits[4] * b21Bits[11] + a21Bits[5] * b21Bits[10] + a21Bits[6] * b21Bits[9] + a21Bits[7] * b21Bits[8] + a21Bits[8] * b21Bits[7] + a21Bits[9] * b21Bits[6] + // a7b8 + a8b7 + a9b6 a21Bits[10] * b21Bits[5] + a21Bits[11] * b21Bits[4]; // a10b5 + a11b4 // s16 = a5b11 + a6b10 + a7b9 + a8b8 + a9b7 + a10b6 + a11b5 s21Bits[16] = a21Bits[5] * b21Bits[11] + a21Bits[6] * b21Bits[10] + a21Bits[7] * b21Bits[9] + a21Bits[8] * b21Bits[8] + a21Bits[9] * b21Bits[7] + a21Bits[10] * b21Bits[6] + // a8b8 + a9b7 + a10b6 a21Bits[11] * b21Bits[5]; // a11b5 // s17 = a6b11 + a7b10 + a8b9 + a9b8 + a10b7 + a11b6 s21Bits[17] = a21Bits[6] * b21Bits[11] + a21Bits[7] * b21Bits[10] + a21Bits[8] * b21Bits[9] + a21Bits[9] * b21Bits[8] + a21Bits[10] * b21Bits[7] + a21Bits[11] * b21Bits[6]; // a9b8 + a10b7 + a11b6 // s18 = a7b11 + a8b10 + a9b9 + a10b8 + a11b7 s21Bits[18] = a21Bits[7] * b21Bits[11] + a21Bits[8] * b21Bits[10] + a21Bits[9] * b21Bits[9] + a21Bits[10] * b21Bits[8] + a21Bits[11] * b21Bits[7]; // a10b8 + a11b7 // s19 = a8b11 + a9b10 + a10b9 + a11b8 s21Bits[19] = a21Bits[8] * b21Bits[11] + a21Bits[9] * b21Bits[10] + a21Bits[10] * b21Bits[9] + a21Bits[11] * b21Bits[8]; // a11b8 // s20 = a9b11 + a10b10 + a11b9 s21Bits[20] = a21Bits[9] * b21Bits[11] + a21Bits[10] * b21Bits[10] + a21Bits[11] * b21Bits[9]; // s21 = a10b11 + a11b10 s21Bits[21] = a21Bits[10] * b21Bits[11] + a21Bits[11] * b21Bits[10]; // s22 = a11b11 s21Bits[22] = a21Bits[11] * b21Bits[11]; // s23 = 0 s21Bits[23] = 0; } void ScalarMulAdd(uint8_t s[CRYPT_CURVE25519_KEYLEN], const uint8_t a[CRYPT_CURVE25519_KEYLEN], const uint8_t b[CRYPT_CURVE25519_KEYLEN], const uint8_t c[CRYPT_CURVE25519_KEYLEN]) { uint64_t a21Bits[UINT8_32_21BITS_BLOCKNUM]; uint64_t b21Bits[UINT8_32_21BITS_BLOCKNUM]; uint64_t c21Bits[UINT8_32_21BITS_BLOCKNUM]; ScalarMulAddPreLoad(a, a21Bits); ScalarMulAddPreLoad(b, b21Bits); ScalarMulAddPreLoad(c, c21Bits); uint64_t s21Bits[UINT8_64_21BITS_BLOCKNUM]; MulAdd(s21Bits, a21Bits, b21Bits, c21Bits); int32_t i; uint64_t signMask1, signMask2; uint64_t carryA, carryB; // process carry 0->1, 2->3 ... 22->23 for (i = 0; i <= 22; i += 2) { // 21 bits minus sign bit is 20 bits PROCESS_CARRY(s21Bits[i], s21Bits[i + 1], signMask1, carryA, 20); } // process carry 1->2, 3->4 ... 21->22 for (i = 1; i <= 21; i += 2) { // 21 bits minus sign bit is 20 bits PROCESS_CARRY(s21Bits[i], s21Bits[i + 1], signMask2, carryB, 20); } ModuloLCore(s21Bits); UnloadTo8Bits(s, s21Bits); } /* RFC8032, out = a + b */ static void PointAdd(GeE *out, GeE *greA, GeE *greB) { const Fp25 d2 = {-21827239, -5839606, -30745221, 13898782, 229458, 15978800, -12551817, -6495438, 29715968, 9444199}; Fp25 a, b, c, d, e, f, g, h; CURVE25519_FP_SUB(e, greA->y, greA->x); CURVE25519_FP_SUB(f, greB->y, greB->x); CURVE25519_FP_ADD(g, greA->y, greA->x); CURVE25519_FP_ADD(h, greB->y, greB->x); FpMul(a, e, f); FpMul(b, g, h); FpMul(c, greA->t, greB->t); FpMul(c, c, d2); FpMul(d, greA->z, greB->z); CURVE25519_FP_ADD(d, d, d); CURVE25519_FP_SUB(e, b, a); CURVE25519_FP_SUB(f, d, c); CURVE25519_FP_ADD(g, d, c); CURVE25519_FP_ADD(h, b, a); FpMul(out->x, e, f); FpMul(out->y, g, h); FpMul(out->z, f, g); FpMul(out->t, e, h); } static void PointAddPrecompute(GeE *out, GeE *greA, GeEPre *greB) { Fp25 a, b, c, d, e, f, g, h; CURVE25519_FP_SUB(e, greA->y, greA->x); CURVE25519_FP_ADD(g, greA->y, greA->x); FpMul(a, e, greB->yminusx); FpMul(b, g, greB->yplusx); FpMul(c, greA->t, greB->t2z); FpMul(d, greA->z, greB->z); CURVE25519_FP_ADD(d, d, d); CURVE25519_FP_SUB(e, b, a); CURVE25519_FP_SUB(f, d, c); CURVE25519_FP_ADD(g, d, c); CURVE25519_FP_ADD(h, b, a); FpMul(out->x, e, f); FpMul(out->y, g, h); FpMul(out->z, f, g); FpMul(out->t, e, h); } static void PointSubPrecompute(GeE *out, GeE *greA, GeEPre *greB) { Fp25 a, b, c, d, e, f, g, h; CURVE25519_FP_SUB(e, greA->y, greA->x); CURVE25519_FP_ADD(g, greA->y, greA->x); FpMul(a, e, greB->yplusx); FpMul(b, g, greB->yminusx); FpMul(c, greA->t, greB->t2z); FpMul(d, greA->z, greB->z); CURVE25519_FP_ADD(d, d, d); CURVE25519_FP_SUB(e, b, a); CURVE25519_FP_ADD(f, d, c); CURVE25519_FP_SUB(g, d, c); CURVE25519_FP_ADD(h, b, a); FpMul(out->x, e, f); FpMul(out->y, g, h); FpMul(out->z, f, g); FpMul(out->t, e, h); } static void P1DoubleN(GeE *p1, int32_t n) { GeP p; GeC c; int32_t i; // From extended coordinate to projective coordinate, just ignore T CURVE25519_FP_COPY(p.x, p1->x); CURVE25519_FP_COPY(p.y, p1->y); CURVE25519_FP_COPY(p.z, p1->z); ProjectiveDouble(&c, &p); for (i = 1; i < n; i++) { GeCompleteToProjective(&p, &c); ProjectiveDouble(&c, &p); } FpMul(p1->x, c.t, c.x); FpMul(p1->y, c.z, c.y); FpMul(p1->z, c.t, c.z); FpMul(p1->t, c.y, c.x); } static void PointToPrecompute(GeEPre *out, GeE *in) { const Fp25 d2 = {-21827239, -5839606, -30745221, 13898782, 229458, 15978800, -12551817, -6495438, 29715968, 9444199}; CURVE25519_FP_ADD(out->yplusx, in->y, in->x); CURVE25519_FP_SUB(out->yminusx, in->y, in->x); CURVE25519_FP_COPY(out->z, in->z); FpMul(out->t2z, in->t, d2); } static void FlipK(int8_t slide[256], uint32_t start) { uint32_t k; for (k = start; k < 256; k++) { if (slide[k] == 0) { slide[k] = 1; break; } else { slide[k] = 0; } } } static void SlideReduce(int8_t *out, uint32_t outLen, const uint8_t *in, uint32_t inLen) { uint32_t i, j; int8_t tmp; (void)outLen; (void)inLen; // 32 * 8 = 256 for (i = 0; i < 256; i++) { // turn 32 8bits to 256 1bit, block: in[i >> 3], bit: (i & 7) out[i] = (int8_t)((in[i >> 3] >> (i & 7)) & 1); } // 32 * 8 = 256 for (i = 0; i < 256; i++) { if (out[i] == 0) { continue; } for (j = 1; j <= 6 && (i + j) < 256; j++) { // check next 6 since 2^6 - 2^5 = 16 > 15, 256 is array length if (out[i + j] == 0) { continue; } // range 15 to -15 tmp = (int8_t)((uint8_t)(out[i + j]) << j); if (out[i] + tmp <= 15) { // max 15, 0x1, 0x1, 0x1, 0x1 , 0 -> 0x1111, 0, 0, 0, 0 out[i] += tmp; out[i + j] = 0; } else if (out[i] - tmp >= -15) { // min -15, 0x1111, 0, 0, 0, 1, 1 -> -1, 0, 0, 0, 0, 1 out[i] -= tmp; FlipK(out, i + j); } else { break; } } } } // Base on article "High-speed high-security signatures" // stores B, 3B, 5B, 7B, 9B, 11B, 13B, 15B, with B as ed25519 base point static const GePre g_precomputedB[8] = { { {25967493, -14356035, 29566456, 3660896, -12694345, 4014787, 27544626, -11754271, -6079156, 2047605}, {-12545711, 934262, -2722910, 3049990, -727428, 9406986, 12720692, 5043384, 19500929, -15469378}, {-8738181, 4489570, 9688441, -14785194, 10184609, -12363380, 29287919, 11864899, -24514362, -4438546}, }, { {15636291, -9688557, 24204773, -7912398, 616977, -16685262, 27787600, -14772189, 28944400, -1550024}, {16568933, 4717097, -11556148, -1102322, 15682896, -11807043, 16354577, -11775962, 7689662, 11199574}, {30464156, -5976125, -11779434, -15670865, 23220365, 15915852, 7512774, 10017326, -17749093, -9920357}, }, { {10861363, 11473154, 27284546, 1981175, -30064349, 12577861, 32867885, 14515107, -15438304, 10819380}, {4708026, 6336745, 20377586, 9066809, -11272109, 6594696, -25653668, 12483688, -12668491, 5581306}, {19563160, 16186464, -29386857, 4097519, 10237984, -4348115, 28542350, 13850243, -23678021, -15815942}, }, { {5153746, 9909285, 1723747, -2777874, 30523605, 5516873, 19480852, 5230134, -23952439, -15175766}, {-30269007, -3463509, 7665486, 10083793, 28475525, 1649722, 20654025, 16520125, 30598449, 7715701}, {28881845, 14381568, 9657904, 3680757, -20181635, 7843316, -31400660, 1370708, 29794553, -1409300}, }, { {-22518993, -6692182, 14201702, -8745502, -23510406, 8844726, 18474211, -1361450, -13062696, 13821877}, {-6455177, -7839871, 3374702, -4740862, -27098617, -10571707, 31655028, -7212327, 18853322, -14220951}, {4566830, -12963868, -28974889, -12240689, -7602672, -2830569, -8514358, -10431137, 2207753, -3209784}, }, { {-25154831, -4185821, 29681144, 7868801, -6854661, -9423865, -12437364, -663000, -31111463, -16132436}, {25576264, -2703214, 7349804, -11814844, 16472782, 9300885, 3844789, 15725684, 171356, 6466918}, {23103977, 13316479, 9739013, -16149481, 817875, -15038942, 8965339, -14088058, -30714912, 16193877}, }, { {-33521811, 3180713, -2394130, 14003687, -16903474, -16270840, 17238398, 4729455, -18074513, 9256800}, {-25182317, -4174131, 32336398, 5036987, -21236817, 11360617, 22616405, 9761698, -19827198, 630305}, {-13720693, 2639453, -24237460, -7406481, 9494427, -5774029, -6554551, -15960994, -2449256, -14291300}, }, { {-3151181, -5046075, 9282714, 6866145, -31907062, -863023, -18940575, 15033784, 25105118, -7894876}, {-24326370, 15950226, -31801215, -14592823, -11662737, -5090925, 1573892, -2625887, 2198790, -15804619}, {-3099351, 10324967, -2241613, 7453183, -5446979, -2735503, -13812022, -16236442, -32461234, -12290683}, }, }; /* out = hash * p + s * B */ void KAMulPlusMulBase(GeE *out, const uint8_t hash[CRYPT_CURVE25519_KEYLEN], const GeE *p, const uint8_t s[CRYPT_CURVE25519_KEYLEN]) { SetExtendedBasePoint(out); GeE tmpP[8]; // stores p, 3p, 5p, 7p, 9p, 11p, 13p, 15p GeE doubleP; GeEPre preComputedP[8]; // stores p, 3p, 5p, 7p, 9p, 11p, 13p, 15p int8_t slideP[256]; int8_t slideS[256]; int32_t i; SlideReduce(slideP, 256, hash, CRYPT_CURVE25519_KEYLEN); SlideReduce(slideS, 256, s, CRYPT_CURVE25519_KEYLEN); CURVE25519_GE_COPY(tmpP[0], *p); CURVE25519_GE_COPY(doubleP, *p); PointToPrecompute(&preComputedP[0], &tmpP[0]); P1DoubleN(&doubleP, 1); for (i = 1; i < 8; i += 1) { // p, 3p, ....., 13p, 15p, total 8 PointAdd(&tmpP[i], &tmpP[i - 1], &doubleP); PointToPrecompute(&preComputedP[i], &tmpP[i]); } int32_t zeroCount = 0; i = 255; // 255 to 0 while (i >= 0 && slideP[i] == 0 && slideS[i] == 0) { i--; } for (; i >= 0; i--) { while (i >= 0 && slideP[i] == 0 && slideS[i] == 0) { zeroCount++; i--; } if (i < 0) { P1DoubleN(out, zeroCount); break; } else { P1DoubleN(out, zeroCount + 1); } zeroCount = 0; if (slideP[i] > 0) { PointAddPrecompute(out, out, &preComputedP[slideP[i] / 2]); // preComputedP[i] = (i * 2 + 1)P } else if (slideP[i] < 0) { PointSubPrecompute(out, out, &preComputedP[(-slideP[i]) / 2]); // preComputedP[i] = (i * 2 + 1)P } if (slideS[i] > 0) { GeAdd(out, &g_precomputedB[slideS[i] / 2]); // g_precomputedB[i] = (i * 2 + 1)P } else if (slideS[i] < 0) { GeSub(out, &g_precomputedB[(-slideS[i]) / 2]); // g_precomputedB[i] = (i * 2 + 1)P } } } #endif /* HITLS_CRYPTO_ED25519 */ #endif /* HITLS_CRYPTO_CURVE25519 */
2401_83913325/openHiTLS-examples_7925
crypto/curve25519/src/curve25519_op.c
C
unknown
60,542
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ /* Some of these codes are adapted from https://ed25519.cr.yp.to/software.html */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CURVE25519 #include "curve25519_local.h" /* lookup table that computing y-x, y+x and 2dxy, with 512 ^ n B, n starts from 0 */ /* table is generated base on article "High-speed high-security signatures" */ static const GePre CURVE25519PRE_COMPUTE[32][8] = { { { {25967493, -14356035, 29566456, 3660896, -12694345, 4014787, 27544626, -11754271, -6079156, 2047605}, {-12545711, 934262, -2722910, 3049990, -727428, 9406986, 12720692, 5043384, 19500929, -15469378}, {-8738181, 4489570, 9688441, -14785194, 10184609, -12363380, 29287919, 11864899, -24514362, -4438546}, }, { {-12815894, -12976347, -21581243, 11784320, -25355658, -2750717, -11717903, -3814571, -358445, -10211303}, {-21703237, 6903825, 27185491, 6451973, -29577724, -9554005, -15616551, 11189268, -26829678, -5319081}, {26966642, 11152617, 32442495, 15396054, 14353839, -12752335, -3128826, -9541118, -15472047, -4166697}, }, { {15636291, -9688557, 24204773, -7912398, 616977, -16685262, 27787600, -14772189, 28944400, -1550024}, {16568933, 4717097, -11556148, -1102322, 15682896, -11807043, 16354577, -11775962, 7689662, 11199574}, {30464156, -5976125, -11779434, -15670865, 23220365, 15915852, 7512774, 10017326, -17749093, -9920357}, }, { {-17036878, 13921892, 10945806, -6033431, 27105052, -16084379, -28926210, 15006023, 3284568, -6276540}, {23599295, -8306047, -11193664, -7687416, 13236774, 10506355, 7464579, 9656445, 13059162, 10374397}, {7798556, 16710257, 3033922, 2874086, 28997861, 2835604, 32406664, -3839045, -641708, -101325}, }, { {10861363, 11473154, 27284546, 1981175, -30064349, 12577861, 32867885, 14515107, -15438304, 10819380}, {4708026, 6336745, 20377586, 9066809, -11272109, 6594696, -25653668, 12483688, -12668491, 5581306}, {19563160, 16186464, -29386857, 4097519, 10237984, -4348115, 28542350, 13850243, -23678021, -15815942}, }, { {-15371964, -12862754, 32573250, 4720197, -26436522, 5875511, -19188627, -15224819, -9818940, -12085777}, {-8549212, 109983, 15149363, 2178705, 22900618, 4543417, 3044240, -15689887, 1762328, 14866737}, {-18199695, -15951423, -10473290, 1707278, -17185920, 3916101, -28236412, 3959421, 27914454, 4383652}, }, { {5153746, 9909285, 1723747, -2777874, 30523605, 5516873, 19480852, 5230134, -23952439, -15175766}, {-30269007, -3463509, 7665486, 10083793, 28475525, 1649722, 20654025, 16520125, 30598449, 7715701}, {28881845, 14381568, 9657904, 3680757, -20181635, 7843316, -31400660, 1370708, 29794553, -1409300}, }, { {14499471, -2729599, -33191113, -4254652, 28494862, 14271267, 30290735, 10876454, -33154098, 2381726}, {-7195431, -2655363, -14730155, 462251, -27724326, 3941372, -6236617, 3696005, -32300832, 15351955}, {27431194, 8222322, 16448760, -3907995, -18707002, 11938355, -32961401, -2970515, 29551813, 10109425}, }, }, { { {-13657040, -13155431, -31283750, 11777098, 21447386, 6519384, -2378284, -1627556, 10092783, -4764171}, {27939166, 14210322, 4677035, 16277044, -22964462, -12398139, -32508754, 12005538, -17810127, 12803510}, {17228999, -15661624, -1233527, 300140, -1224870, -11714777, 30364213, -9038194, 18016357, 4397660}, }, { {-10958843, -7690207, 4776341, -14954238, 27850028, -15602212, -26619106, 14544525, -17477504, 982639}, {29253598, 15796703, -2863982, -9908884, 10057023, 3163536, 7332899, -4120128, -21047696, 9934963}, {5793303, 16271923, -24131614, -10116404, 29188560, 1206517, -14747930, 4559895, -30123922, -10897950}, }, { {-27643952, -11493006, 16282657, -11036493, 28414021, -15012264, 24191034, 4541697, -13338309, 5500568}, {12650548, -1497113, 9052871, 11355358, -17680037, -8400164, -17430592, 12264343, 10874051, 13524335}, {25556948, -3045990, 714651, 2510400, 23394682, -10415330, 33119038, 5080568, -22528059, 5376628}, }, { {-26088264, -4011052, -17013699, -3537628, -6726793, 1920897, -22321305, -9447443, 4535768, 1569007}, {-2255422, 14606630, -21692440, -8039818, 28430649, 8775819, -30494562, 3044290, 31848280, 12543772}, {-22028579, 2943893, -31857513, 6777306, 13784462, -4292203, -27377195, -2062731, 7718482, 14474653}, }, { {2385315, 2454213, -22631320, 46603, -4437935, -15680415, 656965, -7236665, 24316168, -5253567}, {13741529, 10911568, -33233417, -8603737, -20177830, -1033297, 33040651, -13424532, -20729456, 8321686}, {21060490, -2212744, 15712757, -4336099, 1639040, 10656336, 23845965, -11874838, -9984458, 608372}, }, { {-13672732, -15087586, -10889693, -7557059, -6036909, 11305547, 1123968, -6780577, 27229399, 23887}, {-23244140, -294205, -11744728, 14712571, -29465699, -2029617, 12797024, -6440308, -1633405, 16678954}, {-29500620, 4770662, -16054387, 14001338, 7830047, 9564805, -1508144, -4795045, -17169265, 4904953}, }, { {24059557, 14617003, 19037157, -15039908, 19766093, -14906429, 5169211, 16191880, 2128236, -4326833}, {-16981152, 4124966, -8540610, -10653797, 30336522, -14105247, -29806336, 916033, -6882542, -2986532}, {-22630907, 12419372, -7134229, -7473371, -16478904, 16739175, 285431, 2763829, 15736322, 4143876}, }, { {2379352, 11839345, -4110402, -5988665, 11274298, 794957, 212801, -14594663, 23527084, -16458268}, {33431127, -11130478, -17838966, -15626900, 8909499, 8376530, -32625340, 4087881, -15188911, -14416214}, {1767683, 7197987, -13205226, -2022635, -13091350, 448826, 5799055, 4357868, -4774191, -16323038}, }, }, { { {6721966, 13833823, -23523388, -1551314, 26354293, -11863321, 23365147, -3949732, 7390890, 2759800}, {4409041, 2052381, 23373853, 10530217, 7676779, -12885954, 21302353, -4264057, 1244380, -12919645}, {-4421239, 7169619, 4982368, -2957590, 30256825, -2777540, 14086413, 9208236, 15886429, 16489664}, }, { {1996075, 10375649, 14346367, 13311202, -6874135, -16438411, -13693198, 398369, -30606455, -712933}, {-25307465, 9795880, -2777414, 14878809, -33531835, 14780363, 13348553, 12076947, -30836462, 5113182}, {-17770784, 11797796, 31950843, 13929123, -25888302, 12288344, -30341101, -7336386, 13847711, 5387222}, }, { {-18582163, -3416217, 17824843, -2340966, 22744343, -10442611, 8763061, 3617786, -19600662, 10370991}, {20246567, -14369378, 22358229, -543712, 18507283, -10413996, 14554437, -8746092, 32232924, 16763880}, {9648505, 10094563, 26416693, 14745928, -30374318, -6472621, 11094161, 15689506, 3140038, -16510092}, }, { {-16160072, 5472695, 31895588, 4744994, 8823515, 10365685, -27224800, 9448613, -28774454, 366295}, {19153450, 11523972, -11096490, -6503142, -24647631, 5420647, 28344573, 8041113, 719605, 11671788}, {8678025, 2694440, -6808014, 2517372, 4964326, 11152271, -15432916, -15266516, 27000813, -10195553}, }, { {-15157904, 7134312, 8639287, -2814877, -7235688, 10421742, 564065, 5336097, 6750977, -14521026}, {11836410, -3979488, 26297894, 16080799, 23455045, 15735944, 1695823, -8819122, 8169720, 16220347}, {-18115838, 8653647, 17578566, -6092619, -8025777, -16012763, -11144307, -2627664, -5990708, -14166033}, }, { {-23308498, -10968312, 15213228, -10081214, -30853605, -11050004, 27884329, 2847284, 2655861, 1738395}, {-27537433, -14253021, -25336301, -8002780, -9370762, 8129821, 21651608, -3239336, -19087449, -11005278}, {1533110, 3437855, 23735889, 459276, 29970501, 11335377, 26030092, 5821408, 10478196, 8544890}, }, { {32173121, -16129311, 24896207, 3921497, 22579056, -3410854, 19270449, 12217473, 17789017, -3395995}, {-30552961, -2228401, -15578829, -10147201, 13243889, 517024, 15479401, -3853233, 30460520, 1052596}, {-11614875, 13323618, 32618793, 8175907, -15230173, 12596687, 27491595, -4612359, 3179268, -9478891}, }, { {31947069, -14366651, -4640583, -15339921, -15125977, -6039709, -14756777, -16411740, 19072640, -9511060}, {11685058, 11822410, 3158003, -13952594, 33402194, -4165066, 5977896, -5215017, 473099, 5040608}, {-20290863, 8198642, -27410132, 11602123, 1290375, -2799760, 28326862, 1721092, -19558642, -3131606}, }, }, { { {7881532, 10687937, 7578723, 7738378, -18951012, -2553952, 21820786, 8076149, -27868496, 11538389}, {-19935666, 3899861, 18283497, -6801568, -15728660, -11249211, 8754525, 7446702, -5676054, 5797016}, {-11295600, -3793569, -15782110, -7964573, 12708869, -8456199, 2014099, -9050574, -2369172, -5877341}, }, { {-22472376, -11568741, -27682020, 1146375, 18956691, 16640559, 1192730, -3714199, 15123619, 10811505}, {14352098, -3419715, -18942044, 10822655, 32750596, 4699007, -70363, 15776356, -28886779, -11974553}, {-28241164, -8072475, -4978962, -5315317, 29416931, 1847569, -20654173, -16484855, 4714547, -9600655}, }, { {15200332, 8368572, 19679101, 15970074, -31872674, 1959451, 24611599, -4543832, -11745876, 12340220}, {12876937, -10480056, 33134381, 6590940, -6307776, 14872440, 9613953, 8241152, 15370987, 9608631}, {-4143277, -12014408, 8446281, -391603, 4407738, 13629032, -7724868, 15866074, -28210621, -8814099}, }, { {26660628, -15677655, 8393734, 358047, -7401291, 992988, -23904233, 858697, 20571223, 8420556}, {14620715, 13067227, -15447274, 8264467, 14106269, 15080814, 33531827, 12516406, -21574435, -12476749}, {236881, 10476226, 57258, -14677024, 6472998, 2466984, 17258519, 7256740, 8791136, 15069930}, }, { {1276410, -9371918, 22949635, -16322807, -23493039, -5702186, 14711875, 4874229, -30663140, -2331391}, {5855666, 4990204, -13711848, 7294284, -7804282, 1924647, -1423175, -7912378, -33069337, 9234253}, {20590503, -9018988, 31529744, -7352666, -2706834, 10650548, 31559055, -11609587, 18979186, 13396066}, }, { {24474287, 4968103, 22267082, 4407354, 24063882, -8325180, -18816887, 13594782, 33514650, 7021958}, {-11566906, -6565505, -21365085, 15928892, -26158305, 4315421, -25948728, -3916677, -21480480, 12868082}, {-28635013, 13504661, 19988037, -2132761, 21078225, 6443208, -21446107, 2244500, -12455797, -8089383}, }, { {-30595528, 13793479, -5852820, 319136, -25723172, -6263899, 33086546, 8957937, -15233648, 5540521}, {-11630176, -11503902, -8119500, -7643073, 2620056, 1022908, -23710744, -1568984, -16128528, -14962807}, {23152971, 775386, 27395463, 14006635, -9701118, 4649512, 1689819, 892185, -11513277, -15205948}, }, { {9770129, 9586738, 26496094, 4324120, 1556511, -3550024, 27453819, 4763127, -19179614, 5867134}, {-32765025, 1927590, 31726409, -4753295, 23962434, -16019500, 27846559, 5931263, -29749703, -16108455}, {27461885, -2977536, 22380810, 1815854, -23033753, -3031938, 7283490, -15148073, -19526700, 7734629}, }, }, { { {-8010264, -9590817, -11120403, 6196038, 29344158, -13430885, 7585295, -3176626, 18549497, 15302069}, {-32658337, -6171222, -7672793, -11051681, 6258878, 13504381, 10458790, -6418461, -8872242, 8424746}, {24687205, 8613276, -30667046, -3233545, 1863892, -1830544, 19206234, 7134917, -11284482, -828919}, }, { {11334899, -9218022, 8025293, 12707519, 17523892, -10476071, 10243738, -14685461, -5066034, 16498837}, {8911542, 6887158, -9584260, -6958590, 11145641, -9543680, 17303925, -14124238, 6536641, 10543906}, {-28946384, 15479763, -17466835, 568876, -1497683, 11223454, -2669190, -16625574, -27235709, 8876771}, }, { {-25742899, -12566864, -15649966, -846607, -33026686, -796288, -33481822, 15824474, -604426, -9039817}, {10330056, 70051, 7957388, -9002667, 9764902, 15609756, 27698697, -4890037, 1657394, 3084098}, {10477963, -7470260, 12119566, -13250805, 29016247, -5365589, 31280319, 14396151, -30233575, 15272409}, }, { {-12288309, 3169463, 28813183, 16658753, 25116432, -5630466, -25173957, -12636138, -25014757, 1950504}, {-26180358, 9489187, 11053416, -14746161, -31053720, 5825630, -8384306, -8767532, 15341279, 8373727}, {28685821, 7759505, -14378516, -12002860, -31971820, 4079242, 298136, -10232602, -2878207, 15190420}, }, { {-32932876, 13806336, -14337485, -15794431, -24004620, 10940928, 8669718, 2742393, -26033313, -6875003}, {-1580388, -11729417, -25979658, -11445023, -17411874, -10912854, 9291594, -16247779, -12154742, 6048605}, {-30305315, 14843444, 1539301, 11864366, 20201677, 1900163, 13934231, 5128323, 11213262, 9168384}, }, { {-26280513, 11007847, 19408960, -940758, -18592965, -4328580, -5088060, -11105150, 20470157, -16398701}, {-23136053, 9282192, 14855179, -15390078, -7362815, -14408560, -22783952, 14461608, 14042978, 5230683}, {29969567, -2741594, -16711867, -8552442, 9175486, -2468974, 21556951, 3506042, -5933891, -12449708}, }, { {-3144746, 8744661, 19704003, 4581278, -20430686, 6830683, -21284170, 8971513, -28539189, 15326563}, {-19464629, 10110288, -17262528, -3503892, -23500387, 1355669, -15523050, 15300988, -20514118, 9168260}, {-5353335, 4488613, -23803248, 16314347, 7780487, -15638939, -28948358, 9601605, 33087103, -9011387}, }, { {-19443170, -15512900, -20797467, -12445323, -29824447, 10229461, -27444329, -15000531, -5996870, 15664672}, {23294591, -16632613, -22650781, -8470978, 27844204, 11461195, 13099750, -2460356, 18151676, 13417686}, {-24722913, -4176517, -31150679, 5988919, -26858785, 6685065, 1661597, -12551441, 15271676, -15452665}, }, }, { { {11433042, -13228665, 8239631, -5279517, -1985436, -725718, -18698764, 2167544, -6921301, -13440182}, {-31436171, 15575146, 30436815, 12192228, -22463353, 9395379, -9917708, -8638997, 12215110, 12028277}, {14098400, 6555944, 23007258, 5757252, -15427832, -12950502, 30123440, 4617780, -16900089, -655628}, }, { {-4026201, -15240835, 11893168, 13718664, -14809462, 1847385, -15819999, 10154009, 23973261, -12684474}, {-26531820, -3695990, -1908898, 2534301, -31870557, -16550355, 18341390, -11419951, 32013174, -10103539}, {-25479301, 10876443, -11771086, -14625140, -12369567, 1838104, 21911214, 6354752, 4425632, -837822}, }, { {-10433389, -14612966, 22229858, -3091047, -13191166, 776729, -17415375, -12020462, 4725005, 14044970}, {19268650, -7304421, 1555349, 8692754, -21474059, -9910664, 6347390, -1411784, -19522291, -16109756}, {-24864089, 12986008, -10898878, -5558584, -11312371, -148526, 19541418, 8180106, 9282262, 10282508}, }, { {-26205082, 4428547, -8661196, -13194263, 4098402, -14165257, 15522535, 8372215, 5542595, -10702683}, {-10562541, 14895633, 26814552, -16673850, -17480754, -2489360, -2781891, 6993761, -18093885, 10114655}, {-20107055, -929418, 31422704, 10427861, -7110749, 6150669, -29091755, -11529146, 25953725, -106158}, }, { {-4234397, -8039292, -9119125, 3046000, 2101609, -12607294, 19390020, 6094296, -3315279, 12831125}, {-15998678, 7578152, 5310217, 14408357, -33548620, -224739, 31575954, 6326196, 7381791, -2421839}, {-20902779, 3296811, 24736065, -16328389, 18374254, 7318640, 6295303, 8082724, -15362489, 12339664}, }, { {27724736, 2291157, 6088201, -14184798, 1792727, 5857634, 13848414, 15768922, 25091167, 14856294}, {-18866652, 8331043, 24373479, 8541013, -701998, -9269457, 12927300, -12695493, -22182473, -9012899}, {-11423429, -5421590, 11632845, 3405020, 30536730, -11674039, -27260765, 13866390, 30146206, 9142070}, }, { {3924129, -15307516, -13817122, -10054960, 12291820, -668366, -27702774, 9326384, -8237858, 4171294}, {-15921940, 16037937, 6713787, 16606682, -21612135, 2790944, 26396185, 3731949, 345228, -5462949}, {-21327538, 13448259, 25284571, 1143661, 20614966, -8849387, 2031539, -12391231, -16253183, -13582083}, }, { {31016211, -16722429, 26371392, -14451233, -5027349, 14854137, 17477601, 3842657, 28012650, -16405420}, {-5075835, 9368966, -8562079, -4600902, -15249953, 6970560, -9189873, 16292057, -8867157, 3507940}, {29439664, 3537914, 23333589, 6997794, -17555561, -11018068, -15209202, -15051267, -9164929, 6580396}, }, }, { { {-12185861, -7679788, 16438269, 10826160, -8696817, -6235611, 17860444, -9273846, -2095802, 9304567}, {20714564, -4336911, 29088195, 7406487, 11426967, -5095705, 14792667, -14608617, 5289421, -477127}, {-16665533, -10650790, -6160345, -13305760, 9192020, -1802462, 17271490, 12349094, 26939669, -3752294}, }, { {-12889898, 9373458, 31595848, 16374215, 21471720, 13221525, -27283495, -12348559, -3698806, 117887}, {22263325, -6560050, 3984570, -11174646, -15114008, -566785, 28311253, 5358056, -23319780, 541964}, {16259219, 3261970, 2309254, -15534474, -16885711, -4581916, 24134070, -16705829, -13337066, -13552195}, }, { {9378160, -13140186, -22845982, -12745264, 28198281, -7244098, -2399684, -717351, 690426, 14876244}, {24977353, -314384, -8223969, -13465086, 28432343, -1176353, -13068804, -12297348, -22380984, 6618999}, {-1538174, 11685646, 12944378, 13682314, -24389511, -14413193, 8044829, -13817328, 32239829, -5652762}, }, { {-18603066, 4762990, -926250, 8885304, -28412480, -3187315, 9781647, -10350059, 32779359, 5095274}, {-33008130, -5214506, -32264887, -3685216, 9460461, -9327423, -24601656, 14506724, 21639561, -2630236}, {-16400943, -13112215, 25239338, 15531969, 3987758, -4499318, -1289502, -6863535, 17874574, 558605}, }, { {-13600129, 10240081, 9171883, 16131053, -20869254, 9599700, 33499487, 5080151, 2085892, 5119761}, {-22205145, -2519528, -16381601, 414691, -25019550, 2170430, 30634760, -8363614, -31999993, -5759884}, {-6845704, 15791202, 8550074, -1312654, 29928809, -12092256, 27534430, -7192145, -22351378, 12961482}, }, { {-24492060, -9570771, 10368194, 11582341, -23397293, -2245287, 16533930, 8206996, -30194652, -5159638}, {-11121496, -3382234, 2307366, 6362031, -135455, 8868177, -16835630, 7031275, 7589640, 8945490}, {-32152748, 8917967, 6661220, -11677616, -1192060, -15793393, 7251489, -11182180, 24099109, -14456170}, }, { {5019558, -7907470, 4244127, -14714356, -26933272, 6453165, -19118182, -13289025, -6231896, -10280736}, {10853594, 10721687, 26480089, 5861829, -22995819, 1972175, -1866647, -10557898, -3363451, -6441124}, {-17002408, 5906790, 221599, -6563147, 7828208, -13248918, 24362661, -2008168, -13866408, 7421392}, }, { {8139927, -6546497, 32257646, -5890546, 30375719, 1886181, -21175108, 15441252, 28826358, -4123029}, {6267086, 9695052, 7709135, -16603597, -32869068, -1886135, 14795160, -7840124, 13746021, -1742048}, {28584902, 7787108, -6732942, -15050729, 22846041, -7571236, -3181936, -363524, 4771362, -8419958}, }, }, { { {24949256, 6376279, -27466481, -8174608, -18646154, -9930606, 33543569, -12141695, 3569627, 11342593}, {26514989, 4740088, 27912651, 3697550, 19331575, -11472339, 6809886, 4608608, 7325975, -14801071}, {-11618399, -14554430, -24321212, 7655128, -1369274, 5214312, -27400540, 10258390, -17646694, -8186692}, }, { {11431204, 15823007, 26570245, 14329124, 18029990, 4796082, -31446179, 15580664, 9280358, -3973687}, {-160783, -10326257, -22855316, -4304997, -20861367, -13621002, -32810901, -11181622, -15545091, 4387441}, {-20799378, 12194512, 3937617, -5805892, -27154820, 9340370, -24513992, 8548137, 20617071, -7482001}, }, { {-938825, -3930586, -8714311, 16124718, 24603125, -6225393, -13775352, -11875822, 24345683, 10325460}, {-19855277, -1568885, -22202708, 8714034, 14007766, 6928528, 16318175, -1010689, 4766743, 3552007}, {-21751364, -16730916, 1351763, -803421, -4009670, 3950935, 3217514, 14481909, 10988822, -3994762}, }, { {15564307, -14311570, 3101243, 5684148, 30446780, -8051356, 12677127, -6505343, -8295852, 13296005}, {-9442290, 6624296, -30298964, -11913677, -4670981, -2057379, 31521204, 9614054, -30000824, 12074674}, {4771191, -135239, 14290749, -13089852, 27992298, 14998318, -1413936, -1556716, 29832613, -16391035}, }, { {7064884, -7541174, -19161962, -5067537, -18891269, -2912736, 25825242, 5293297, -27122660, 13101590}, {-2298563, 2439670, -7466610, 1719965, -27267541, -16328445, 32512469, -5317593, -30356070, -4190957}, {-30006540, 10162316, -33180176, 3981723, -16482138, -13070044, 14413974, 9515896, 19568978, 9628812}, }, { {33053803, 199357, 15894591, 1583059, 27380243, -4580435, -17838894, -6106839, -6291786, 3437740}, {-18978877, 3884493, 19469877, 12726490, 15913552, 13614290, -22961733, 70104, 7463304, 4176122}, {-27124001, 10659917, 11482427, -16070381, 12771467, -6635117, -32719404, -5322751, 24216882, 5944158}, }, { {8894125, 7450974, -2664149, -9765752, -28080517, -12389115, 19345746, 14680796, 11632993, 5847885}, {26942781, -2315317, 9129564, -4906607, 26024105, 11769399, -11518837, 6367194, -9727230, 4782140}, {19916461, -4828410, -22910704, -11414391, 25606324, -5972441, 33253853, 8220911, 6358847, -1873857}, }, { {801428, -2081702, 16569428, 11065167, 29875704, 96627, 7908388, -4480480, -13538503, 1387155}, {19646058, 5720633, -11416706, 12814209, 11607948, 12749789, 14147075, 15156355, -21866831, 11835260}, {19299512, 1155910, 28703737, 14890794, 2925026, 7269399, 26121523, 15467869, -26560550, 5052483}, }, }, { { {-3017432, 10058206, 1980837, 3964243, 22160966, 12322533, -6431123, -12618185, 12228557, -7003677}, {32944382, 14922211, -22844894, 5188528, 21913450, -8719943, 4001465, 13238564, -6114803, 8653815}, {22865569, -4652735, 27603668, -12545395, 14348958, 8234005, 24808405, 5719875, 28483275, 2841751}, }, { {-16420968, -1113305, -327719, -12107856, 21886282, -15552774, -1887966, -315658, 19932058, -12739203}, {-11656086, 10087521, -8864888, -5536143, -19278573, -3055912, 3999228, 13239134, -4777469, -13910208}, {1382174, -11694719, 17266790, 9194690, -13324356, 9720081, 20403944, 11284705, -14013818, 3093230}, }, { {16650921, -11037932, -1064178, 1570629, -8329746, 7352753, -302424, 16271225, -24049421, -6691850}, {-21911077, -5927941, -4611316, -5560156, -31744103, -10785293, 24123614, 15193618, -21652117, -16739389}, {-9935934, -4289447, -25279823, 4372842, 2087473, 10399484, 31870908, 14690798, 17361620, 11864968}, }, { {-11307610, 6210372, 13206574, 5806320, -29017692, -13967200, -12331205, -7486601, -25578460, -16240689}, {14668462, -12270235, 26039039, 15305210, 25515617, 4542480, 10453892, 6577524, 9145645, -6443880}, {5974874, 3053895, -9433049, -10385191, -31865124, 3225009, -7972642, 3936128, -5652273, -3050304}, }, { {30625386, -4729400, -25555961, -12792866, -20484575, 7695099, 17097188, -16303496, -27999779, 1803632}, {-3553091, 9865099, -5228566, 4272701, -5673832, -16689700, 14911344, 12196514, -21405489, 7047412}, {20093277, 9920966, -11138194, -5343857, 13161587, 12044805, -32856851, 4124601, -32343828, -10257566}, }, { {-20788824, 14084654, -13531713, 7842147, 19119038, -13822605, 4752377, -8714640, -21679658, 2288038}, {-26819236, -3283715, 29965059, 3039786, -14473765, 2540457, 29457502, 14625692, -24819617, 12570232}, {-1063558, -11551823, 16920318, 12494842, 1278292, -5869109, -21159943, -3498680, -11974704, 4724943}, }, { {17960970, -11775534, -4140968, -9702530, -8876562, -1410617, -12907383, -8659932, -29576300, 1903856}, {23134274, -14279132, -10681997, -1611936, 20684485, 15770816, -12989750, 3190296, 26955097, 14109738}, {15308788, 5320727, -30113809, -14318877, 22902008, 7767164, 29425325, -11277562, 31960942, 11934971}, }, { {-27395711, 8435796, 4109644, 12222639, -24627868, 14818669, 20638173, 4875028, 10491392, 1379718}, {-13159415, 9197841, 3875503, -8936108, -1383712, -5879801, 33518459, 16176658, 21432314, 12180697}, {-11787308, 11500838, 13787581, -13832590, -22430679, 10140205, 1465425, 12689540, -10301319, -13872883}, }, }, { { {5414091, -15386041, -21007664, 9643570, 12834970, 1186149, -2622916, -1342231, 26128231, 6032912}, {-26337395, -13766162, 32496025, -13653919, 17847801, -12669156, 3604025, 8316894, -25875034, -10437358}, {3296484, 6223048, 24680646, -12246460, -23052020, 5903205, -8862297, -4639164, 12376617, 3188849}, }, { {29190488, -14659046, 27549113, -1183516, 3520066, -10697301, 32049515, -7309113, -16109234, -9852307}, {-14744486, -9309156, 735818, -598978, -20407687, -5057904, 25246078, -15795669, 18640741, -960977}, {-6928835, -16430795, 10361374, 5642961, 4910474, 12345252, -31638386, -494430, 10530747, 1053335}, }, { {-29265967, -14186805, -13538216, -12117373, -19457059, -10655384, -31462369, -2948985, 24018831, 15026644}, {-22592535, -3145277, -2289276, 5953843, -13440189, 9425631, 25310643, 13003497, -2314791, -15145616}, {-27419985, -603321, -8043984, -1669117, -26092265, 13987819, -27297622, 187899, -23166419, -2531735}, }, { {-21744398, -13810475, 1844840, 5021428, -10434399, -15911473, 9716667, 16266922, -5070217, 726099}, {29370922, -6053998, 7334071, -15342259, 9385287, 2247707, -13661962, -4839461, 30007388, -15823341}, {-936379, 16086691, 23751945, -543318, -1167538, -5189036, 9137109, 730663, 9835848, 4555336}, }, { {-23376435, 1410446, -22253753, -12899614, 30867635, 15826977, 17693930, 544696, -11985298, 12422646}, {31117226, -12215734, -13502838, 6561947, -9876867, -12757670, -5118685, -4096706, 29120153, 13924425}, {-17400879, -14233209, 19675799, -2734756, -11006962, -5858820, -9383939, -11317700, 7240931, -237388}, }, { {-31361739, -11346780, -15007447, -5856218, -22453340, -12152771, 1222336, 4389483, 3293637, -15551743}, {-16684801, -14444245, 11038544, 11054958, -13801175, -3338533, -24319580, 7733547, 12796905, -6335822}, {-8759414, -10817836, -25418864, 10783769, -30615557, -9746811, -28253339, 3647836, 3222231, -11160462}, }, { {18606113, 1693100, -25448386, -15170272, 4112353, 10045021, 23603893, -2048234, -7550776, 2484985}, {9255317, -3131197, -12156162, -1004256, 13098013, -9214866, 16377220, -2102812, -19802075, -3034702}, {-22729289, 7496160, -5742199, 11329249, 19991973, -3347502, -31718148, 9936966, -30097688, -10618797}, }, { {21878590, -5001297, 4338336, 13643897, -3036865, 13160960, 19708896, 5415497, -7360503, -4109293}, {27736861, 10103576, 12500508, 8502413, -3413016, -9633558, 10436918, -1550276, -23659143, -8132100}, {19492550, -12104365, -29681976, -852630, -3208171, 12403437, 30066266, 8367329, 13243957, 8709688}, }, }, { { {12015105, 2801261, 28198131, 10151021, 24818120, -4743133, -11194191, -5645734, 5150968, 7274186}, {2831366, -12492146, 1478975, 6122054, 23825128, -12733586, 31097299, 6083058, 31021603, -9793610}, {-2529932, -2229646, 445613, 10720828, -13849527, -11505937, -23507731, 16354465, 15067285, -14147707}, }, { {7840942, 14037873, -33364863, 15934016, -728213, -3642706, 21403988, 1057586, -19379462, -12403220}, {915865, -16469274, 15608285, -8789130, -24357026, 6060030, -17371319, 8410997, -7220461, 16527025}, {32922597, -556987, 20336074, -16184568, 10903705, -5384487, 16957574, 52992, 23834301, 6588044}, }, { {32752030, 11232950, 3381995, -8714866, 22652988, -10744103, 17159699, 16689107, -20314580, -1305992}, {-4689649, 9166776, -25710296, -10847306, 11576752, 12733943, 7924251, -2752281, 1976123, -7249027}, {21251222, 16309901, -2983015, -6783122, 30810597, 12967303, 156041, -3371252, 12331345, -8237197}, }, { {8651614, -4477032, -16085636, -4996994, 13002507, 2950805, 29054427, -5106970, 10008136, -4667901}, {31486080, 15114593, -14261250, 12951354, 14369431, -7387845, 16347321, -13662089, 8684155, -10532952}, {19443825, 11385320, 24468943, -9659068, -23919258, 2187569, -26263207, -6086921, 31316348, 14219878}, }, { {-28594490, 1193785, 32245219, 11392485, 31092169, 15722801, 27146014, 6992409, 29126555, 9207390}, {32382935, 1110093, 18477781, 11028262, -27411763, -7548111, -4980517, 10843782, -7957600, -14435730}, {2814918, 7836403, 27519878, -7868156, -20894015, -11553689, -21494559, 8550130, 28346258, 1994730}, }, { {-19578299, 8085545, -14000519, -3948622, 2785838, -16231307, -19516951, 7174894, 22628102, 8115180}, {-30405132, 955511, -11133838, -15078069, -32447087, -13278079, -25651578, 3317160, -9943017, 930272}, {-15303681, -6833769, 28856490, 1357446, 23421993, 1057177, 24091212, -1388970, -22765376, -10650715}, }, { {-22751231, -5303997, -12907607, -12768866, -15811511, -7797053, -14839018, -16554220, -1867018, 8398970}, {-31969310, 2106403, -4736360, 1362501, 12813763, 16200670, 22981545, -6291273, 18009408, -15772772}, {-17220923, -9545221, -27784654, 14166835, 29815394, 7444469, 29551787, -3727419, 19288549, 1325865}, }, { {15100157, -15835752, -23923978, -1005098, -26450192, 15509408, 12376730, -3479146, 33166107, -8042750}, {20909231, 13023121, -9209752, 16251778, -5778415, -8094914, 12412151, 10018715, 2213263, -13878373}, {32529814, -11074689, 30361439, -16689753, -9135940, 1513226, 22922121, 6382134, -5766928, 8371348}, }, }, { { {9923462, 11271500, 12616794, 3544722, -29998368, -1721626, 12891687, -8193132, -26442943, 10486144}, {-22597207, -7012665, 8587003, -8257861, 4084309, -12970062, 361726, 2610596, -23921530, -11455195}, {5408411, -1136691, -4969122, 10561668, 24145918, 14240566, 31319731, -4235541, 19985175, -3436086}, }, { {-13994457, 16616821, 14549246, 3341099, 32155958, 13648976, -17577068, 8849297, 65030, 8370684}, {-8320926, -12049626, 31204563, 5839400, -20627288, -1057277, -19442942, 6922164, 12743482, -9800518}, {-2361371, 12678785, 28815050, 4759974, -23893047, 4884717, 23783145, 11038569, 18800704, 255233}, }, { {-5269658, -1773886, 13957886, 7990715, 23132995, 728773, 13393847, 9066957, 19258688, -14753793}, {-2936654, -10827535, -10432089, 14516793, -3640786, 4372541, -31934921, 2209390, -1524053, 2055794}, {580882, 16705327, 5468415, -2683018, -30926419, -14696000, -7203346, -8994389, -30021019, 7394435}, }, { {23838809, 1822728, -15738443, 15242727, 8318092, -3733104, -21672180, -3492205, -4821741, 14799921}, {13345610, 9759151, 3371034, -16137791, 16353039, 8577942, 31129804, 13496856, -9056018, 7402518}, {2286874, -4435931, -20042458, -2008336, -13696227, 5038122, 11006906, -15760352, 8205061, 1607563}, }, { {14414086, -8002132, 3331830, -3208217, 22249151, -5594188, 18364661, -2906958, 30019587, -9029278}, {-27688051, 1585953, -10775053, 931069, -29120221, -11002319, -14410829, 12029093, 9944378, 8024}, {4368715, -3709630, 29874200, -15022983, -20230386, -11410704, -16114594, -999085, -8142388, 5640030}, }, { {10299610, 13746483, 11661824, 16234854, 7630238, 5998374, 9809887, -16694564, 15219798, -14327783}, {27425505, -5719081, 3055006, 10660664, 23458024, 595578, -15398605, -1173195, -18342183, 9742717}, {6744077, 2427284, 26042789, 2720740, -847906, 1118974, 32324614, 7406442, 12420155, 1994844}, }, { {14012521, -5024720, -18384453, -9578469, -26485342, -3936439, -13033478, -10909803, 24319929, -6446333}, {16412690, -4507367, 10772641, 15929391, -17068788, -4658621, 10555945, -10484049, -30102368, -4739048}, {22397382, -7767684, -9293161, -12792868, 17166287, -9755136, -27333065, 6199366, 21880021, -12250760}, }, { {-4283307, 5368523, -31117018, 8163389, -30323063, 3209128, 16557151, 8890729, 8840445, 4957760}, {-15447727, 709327, -6919446, -10870178, -29777922, 6522332, -21720181, 12130072, -14796503, 5005757}, {-2114751, -14308128, 23019042, 15765735, -25269683, 6002752, 10183197, -13239326, -16395286, -2176112}, }, }, { { {-19025756, 1632005, 13466291, -7995100, -23640451, 16573537, -32013908, -3057104, 22208662, 2000468}, {3065073, -1412761, -25598674, -361432, -17683065, -5703415, -8164212, 11248527, -3691214, -7414184}, {10379208, -6045554, 8877319, 1473647, -29291284, -12507580, 16690915, 2553332, -3132688, 16400289}, }, { {15716668, 1254266, -18472690, 7446274, -8448918, 6344164, -22097271, -7285580, 26894937, 9132066}, {24158887, 12938817, 11085297, -8177598, -28063478, -4457083, -30576463, 64452, -6817084, -2692882}, {13488534, 7794716, 22236231, 5989356, 25426474, -12578208, 2350710, -3418511, -4688006, 2364226}, }, { {16335052, 9132434, 25640582, 6678888, 1725628, 8517937, -11807024, -11697457, 15445875, -7798101}, {29004207, -7867081, 28661402, -640412, -12794003, -7943086, 31863255, -4135540, -278050, -15759279}, {-6122061, -14866665, -28614905, 14569919, -10857999, -3591829, 10343412, -6976290, -29828287, -10815811}, }, { {27081650, 3463984, 14099042, -4517604, 1616303, -6205604, 29542636, 15372179, 17293797, 960709}, {20263915, 11434237, -5765435, 11236810, 13505955, -10857102, -16111345, 6493122, -19384511, 7639714}, {-2830798, -14839232, 25403038, -8215196, -8317012, -16173699, 18006287, -16043750, 29994677, -15808121}, }, { {9769828, 5202651, -24157398, -13631392, -28051003, -11561624, -24613141, -13860782, -31184575, 709464}, {12286395, 13076066, -21775189, -1176622, -25003198, 4057652, -32018128, -8890874, 16102007, 13205847}, {13733362, 5599946, 10557076, 3195751, -5557991, 8536970, -25540170, 8525972, 10151379, 10394400}, }, { {4024660, -16137551, 22436262, 12276534, -9099015, -2686099, 19698229, 11743039, -33302334, 8934414}, {-15879800, -4525240, -8580747, -2934061, 14634845, -698278, -9449077, 3137094, -11536886, 11721158}, {17555939, -5013938, 8268606, 2331751, -22738815, 9761013, 9319229, 8835153, -9205489, -1280045}, }, { {-461409, -7830014, 20614118, 16688288, -7514766, -4807119, 22300304, 505429, 6108462, -6183415}, {-5070281, 12367917, -30663534, 3234473, 32617080, -8422642, 29880583, -13483331, -26898490, -7867459}, {-31975283, 5726539, 26934134, 10237677, -3173717, -605053, 24199304, 3795095, 7592688, -14992079}, }, { {21594432, -14964228, 17466408, -4077222, 32537084, 2739898, 6407723, 12018833, -28256052, 4298412}, {-20650503, -11961496, -27236275, 570498, 3767144, -1717540, 13891942, -1569194, 13717174, 10805743}, {-14676630, -15644296, 15287174, 11927123, 24177847, -8175568, -796431, 14860609, -26938930, -5863836}, }, }, { { {12962541, 5311799, -10060768, 11658280, 18855286, -7954201, 13286263, -12808704, -4381056, 9882022}, {18512079, 11319350, -20123124, 15090309, 18818594, 5271736, -22727904, 3666879, -23967430, -3299429}, {-6789020, -3146043, 16192429, 13241070, 15898607, -14206114, -10084880, -6661110, -2403099, 5276065}, }, { {30169808, -5317648, 26306206, -11750859, 27814964, 7069267, 7152851, 3684982, 1449224, 13082861}, {10342826, 3098505, 2119311, 193222, 25702612, 12233820, 23697382, 15056736, -21016438, -8202000}, {-33150110, 3261608, 22745853, 7948688, 19370557, -15177665, -26171976, 6482814, -10300080, -11060101}, }, { {32869458, -5408545, 25609743, 15678670, -10687769, -15471071, 26112421, 2521008, -22664288, 6904815}, {29506923, 4457497, 3377935, -9796444, -30510046, 12935080, 1561737, 3841096, -29003639, -6657642}, {10340844, -6630377, -18656632, -2278430, 12621151, -13339055, 30878497, -11824370, -25584551, 5181966}, }, { {25940115, -12658025, 17324188, -10307374, -8671468, 15029094, 24396252, -16450922, -2322852, -12388574}, {-21765684, 9916823, -1300409, 4079498, -1028346, 11909559, 1782390, 12641087, 20603771, -6561742}, {-18882287, -11673380, 24849422, 11501709, 13161720, -4768874, 1925523, 11914390, 4662781, 7820689}, }, { {12241050, -425982, 8132691, 9393934, 32846760, -1599620, 29749456, 12172924, 16136752, 15264020}, {-10349955, -14680563, -8211979, 2330220, -17662549, -14545780, 10658213, 6671822, 19012087, 3772772}, {3753511, -3421066, 10617074, 2028709, 14841030, -6721664, 28718732, -15762884, 20527771, 12988982}, }, { {-14822485, -5797269, -3707987, 12689773, -898983, -10914866, -24183046, -10564943, 3299665, -12424953}, {-16777703, -15253301, -9642417, 4978983, 3308785, 8755439, 6943197, 6461331, -25583147, 8991218}, {-17226263, 1816362, -1673288, -6086439, 31783888, -8175991, -32948145, 7417950, -30242287, 1507265}, }, { {29692663, 6829891, -10498800, 4334896, 20945975, -11906496, -28887608, 8209391, 14606362, -10647073}, {-3481570, 8707081, 32188102, 5672294, 22096700, 1711240, -33020695, 9761487, 4170404, -2085325}, {-11587470, 14855945, -4127778, -1531857, -26649089, 15084046, 22186522, 16002000, -14276837, -8400798}, }, { {-4811456, 13761029, -31703877, -2483919, -3312471, 7869047, -7113572, -9620092, 13240845, 10965870}, {-7742563, -8256762, -14768334, -13656260, -23232383, 12387166, 4498947, 14147411, 29514390, 4302863}, {-13413405, -12407859, 20757302, -13801832, 14785143, 8976368, -5061276, -2144373, 17846988, -13971927}, }, }, { { {-2244452, -754728, -4597030, -1066309, -6247172, 1455299, -21647728, -9214789, -5222701, 12650267}, {-9906797, -16070310, 21134160, 12198166, -27064575, 708126, 387813, 13770293, -19134326, 10958663}, {22470984, 12369526, 23446014, -5441109, -21520802, -9698723, -11772496, -11574455, -25083830, 4271862}, }, { {-25169565, -10053642, -19909332, 15361595, -5984358, 2159192, 75375, -4278529, -32526221, 8469673}, {15854970, 4148314, -8893890, 7259002, 11666551, 13824734, -30531198, 2697372, 24154791, -9460943}, {15446137, -15806644, 29759747, 14019369, 30811221, -9610191, -31582008, 12840104, 24913809, 9815020}, }, { {-4709286, -5614269, -31841498, -12288893, -14443537, 10799414, -9103676, 13438769, 18735128, 9466238}, {11933045, 9281483, 5081055, -5183824, -2628162, -4905629, -7727821, -10896103, -22728655, 16199064}, {14576810, 379472, -26786533, -8317236, -29426508, -10812974, -102766, 1876699, 30801119, 2164795}, }, { {15995086, 3199873, 13672555, 13712240, -19378835, -4647646, -13081610, -15496269, -13492807, 1268052}, {-10290614, -3659039, -3286592, 10948818, 23037027, 3794475, -3470338, -12600221, -17055369, 3565904}, {29210088, -9419337, -5919792, -4952785, 10834811, -13327726, -16512102, -10820713, -27162222, -14030531}, }, { {-13161890, 15508588, 16663704, -8156150, -28349942, 9019123, -29183421, -3769423, 2244111, -14001979}, {-5152875, -3800936, -9306475, -6071583, 16243069, 14684434, -25673088, -16180800, 13491506, 4641841}, {10813417, 643330, -19188515, -728916, 30292062, -16600078, 27548447, -7721242, 14476989, -12767431}, }, { {10292079, 9984945, 6481436, 8279905, -7251514, 7032743, 27282937, -1644259, -27912810, 12651324}, {-31185513, -813383, 22271204, 11835308, 10201545, 15351028, 17099662, 3988035, 21721536, -3148940}, {10202177, -6545839, -31373232, -9574638, -32150642, -8119683, -12906320, 3852694, 13216206, 14842320}, }, { {-15815640, -10601066, -6538952, -7258995, -6984659, -6581778, -31500847, 13765824, -27434397, 9900184}, {14465505, -13833331, -32133984, -14738873, -27443187, 12990492, 33046193, 15796406, -7051866, -8040114}, {30924417, -8279620, 6359016, -12816335, 16508377, 9071735, -25488601, 15413635, 9524356, -7018878}, }, { {12274201, -13175547, 32627641, -1785326, 6736625, 13267305, 5237659, -5109483, 15663516, 4035784}, {-2951309, 8903985, 17349946, 601635, -16432815, -4612556, -13732739, -15889334, -22258478, 4659091}, {-16916263, -4952973, -30393711, -15158821, 20774812, 15897498, 5736189, 15026997, -2178256, -13455585}, }, }, { { {-8858980, -2219056, 28571666, -10155518, -474467, -10105698, -3801496, 278095, 23440562, -290208}, {10226241, -5928702, 15139956, 120818, -14867693, 5218603, 32937275, 11551483, -16571960, -7442864}, {17932739, -12437276, -24039557, 10749060, 11316803, 7535897, 22503767, 5561594, -3646624, 3898661}, }, { {7749907, -969567, -16339731, -16464, -25018111, 15122143, -1573531, 7152530, 21831162, 1245233}, {26958459, -14658026, 4314586, 8346991, -5677764, 11960072, -32589295, -620035, -30402091, -16716212}, {-12165896, 9166947, 33491384, 13673479, 29787085, 13096535, 6280834, 14587357, -22338025, 13987525}, }, { {-24349909, 7778775, 21116000, 15572597, -4833266, -5357778, -4300898, -5124639, -7469781, -2858068}, {9681908, -6737123, -31951644, 13591838, -6883821, 386950, 31622781, 6439245, -14581012, 4091397}, {-8426427, 1470727, -28109679, -1596990, 3978627, -5123623, -19622683, 12092163, 29077877, -14741988}, }, { {5269168, -6859726, -13230211, -8020715, 25932563, 1763552, -5606110, -5505881, -20017847, 2357889}, {32264008, -15407652, -5387735, -1160093, -2091322, -3946900, 23104804, -12869908, 5727338, 189038}, {14609123, -8954470, -6000566, -16622781, -14577387, -7743898, -26745169, 10942115, -25888931, -14884697}, }, { {20513500, 5557931, -15604613, 7829531, 26413943, -2019404, -21378968, 7471781, 13913677, -5137875}, {-25574376, 11967826, 29233242, 12948236, -6754465, 4713227, -8940970, 14059180, 12878652, 8511905}, {-25656801, 3393631, -2955415, -7075526, -2250709, 9366908, -30223418, 6812974, 5568676, -3127656}, }, { {11630004, 12144454, 2116339, 13606037, 27378885, 15676917, -17408753, -13504373, -14395196, 8070818}, {27117696, -10007378, -31282771, -5570088, 1127282, 12772488, -29845906, 10483306, -11552749, -1028714}, {10637467, -5688064, 5674781, 1072708, -26343588, -6982302, -1683975, 9177853, -27493162, 15431203}, }, { {20525145, 10892566, -12742472, 12779443, -29493034, 16150075, -28240519, 14943142, -15056790, -7935931}, {-30024462, 5626926, -551567, -9981087, 753598, 11981191, 25244767, -3239766, -3356550, 9594024}, {-23752644, 2636870, -5163910, -10103818, 585134, 7877383, 11345683, -6492290, 13352335, -10977084}, }, { {-1931799, -5407458, 3304649, -12884869, 17015806, -4877091, -29783850, -7752482, -13215537, -319204}, {20239939, 6607058, 6203985, 3483793, -18386976, -779229, -20723742, 15077870, -22750759, 14523817}, {27406042, -6041657, 27423596, -4497394, 4996214, 10002360, -28842031, -4545494, -30172742, -4805667}, }, }, { { {11374242, 12660715, 17861383, -12540833, 10935568, 1099227, -13886076, -9091740, -27727044, 11358504}, {-12730809, 10311867, 1510375, 10778093, -2119455, -9145702, 32676003, 11149336, -26123651, 4985768}, {-19096303, 341147, -6197485, -239033, 15756973, -8796662, -983043, 13794114, -19414307, -15621255}, }, { {6490081, 11940286, 25495923, -7726360, 8668373, -8751316, 3367603, 6970005, -1691065, -9004790}, {1656497, 13457317, 15370807, 6364910, 13605745, 8362338, -19174622, -5475723, -16796596, -5031438}, {-22273315, -13524424, -64685, -4334223, -18605636, -10921968, -20571065, -7007978, -99853, -10237333}, }, { {17747465, 10039260, 19368299, -4050591, -20630635, -16041286, 31992683, -15857976, -29260363, -5511971}, {31932027, -4986141, -19612382, 16366580, 22023614, 88450, 11371999, -3744247, 4882242, -10626905}, {29796507, 37186, 19818052, 10115756, -11829032, 3352736, 18551198, 3272828, -5190932, -4162409}, }, { {12501286, 4044383, -8612957, -13392385, -32430052, 5136599, -19230378, -3529697, 330070, -3659409}, {6384877, 2899513, 17807477, 7663917, -2358888, 12363165, 25366522, -8573892, -271295, 12071499}, {-8365515, -4042521, 25133448, -4517355, -6211027, 2265927, -32769618, 1936675, -5159697, 3829363}, }, { {28425966, -5835433, -577090, -4697198, -14217555, 6870930, 7921550, -6567787, 26333140, 14267664}, {-11067219, 11871231, 27385719, -10559544, -4585914, -11189312, 10004786, -8709488, -21761224, 8930324}, {-21197785, -16396035, 25654216, -1725397, 12282012, 11008919, 1541940, 4757911, -26491501, -16408940}, }, { {13537262, -7759490, -20604840, 10961927, -5922820, -13218065, -13156584, 6217254, -15943699, 13814990}, {-17422573, 15157790, 18705543, 29619, 24409717, -260476, 27361681, 9257833, -1956526, -1776914}, {-25045300, -10191966, 15366585, 15166509, -13105086, 8423556, -29171540, 12361135, -18685978, 4578290}, }, { {24579768, 3711570, 1342322, -11180126, -27005135, 14124956, -22544529, 14074919, 21964432, 8235257}, {-6528613, -2411497, 9442966, -5925588, 12025640, -1487420, -2981514, -1669206, 13006806, 2355433}, {-16304899, -13605259, -6632427, -5142349, 16974359, -10911083, 27202044, 1719366, 1141648, -12796236}, }, { {-12863944, -13219986, -8318266, -11018091, -6810145, -4843894, 13475066, -3133972, 32674895, 13715045}, {11423335, -5468059, 32344216, 8962751, 24989809, 9241752, -13265253, 16086212, -28740881, -15642093}, {-1409668, 12530728, -6368726, 10847387, 19531186, -14132160, -11709148, 7791794, -27245943, 4383347}, }, }, { { {-28970898, 5271447, -1266009, -9736989, -12455236, 16732599, -4862407, -4906449, 27193557, 6245191}, {-15193956, 5362278, -1783893, 2695834, 4960227, 12840725, 23061898, 3260492, 22510453, 8577507}, {-12632451, 11257346, -32692994, 13548177, -721004, 10879011, 31168030, 13952092, -29571492, -3635906}, }, { {3877321, -9572739, 32416692, 5405324, -11004407, -13656635, 3759769, 11935320, 5611860, 8164018}, {-16275802, 14667797, 15906460, 12155291, -22111149, -9039718, 32003002, -8832289, 5773085, -8422109}, {-23788118, -8254300, 1950875, 8937633, 18686727, 16459170, -905725, 12376320, 31632953, 190926}, }, { {-24593607, -16138885, -8423991, 13378746, 14162407, 6901328, -8288749, 4508564, -25341555, -3627528}, {8884438, -5884009, 6023974, 10104341, -6881569, -4941533, 18722941, -14786005, -1672488, 827625}, {-32720583, -16289296, -32503547, 7101210, 13354605, 2659080, -1800575, -14108036, -24878478, 1541286}, }, { {2901347, -1117687, 3880376, -10059388, -17620940, -3612781, -21802117, -3567481, 20456845, -1885033}, {27019610, 12299467, -13658288, -1603234, -12861660, -4861471, -19540150, -5016058, 29439641, 15138866}, {21536104, -6626420, -32447818, -10690208, -22408077, 5175814, -5420040, -16361163, 7779328, 109896}, }, { {30279744, 14648750, -8044871, 6425558, 13639621, -743509, 28698390, 12180118, 23177719, -554075}, {26572847, 3405927, -31701700, 12890905, -19265668, 5335866, -6493768, 2378492, 4439158, -13279347}, {-22716706, 3489070, -9225266, -332753, 18875722, -1140095, 14819434, -12731527, -17717757, -5461437}, }, { {-5056483, 16566551, 15953661, 3767752, -10436499, 15627060, -820954, 2177225, 8550082, -15114165}, {-18473302, 16596775, -381660, 15663611, 22860960, 15585581, -27844109, -3582739, -23260460, -8428588}, {-32480551, 15707275, -8205912, -5652081, 29464558, 2713815, -22725137, 15860482, -21902570, 1494193}, }, { {-19562091, -14087393, -25583872, -9299552, 13127842, 759709, 21923482, 16529112, 8742704, 12967017}, {-28464899, 1553205, 32536856, -10473729, -24691605, -406174, -8914625, -2933896, -29903758, 15553883}, {21877909, 3230008, 9881174, 10539357, -4797115, 2841332, 11543572, 14513274, 19375923, -12647961}, }, { {8832269, -14495485, 13253511, 5137575, 5037871, 4078777, 24880818, -6222716, 2862653, 9455043}, {29306751, 5123106, 20245049, -14149889, 9592566, 8447059, -2077124, -2990080, 15511449, 4789663}, {-20679756, 7004547, 8824831, -9434977, -4045704, -3750736, -5754762, 108893, 23513200, 16652362}, }, }, { { {-33256173, 4144782, -4476029, -6579123, 10770039, -7155542, -6650416, -12936300, -18319198, 10212860}, {2756081, 8598110, 7383731, -6859892, 22312759, -1105012, 21179801, 2600940, -9988298, -12506466}, {-24645692, 13317462, -30449259, -15653928, 21365574, -10869657, 11344424, 864440, -2499677, -16710063}, }, { {-26432803, 6148329, -17184412, -14474154, 18782929, -275997, -22561534, 211300, 2719757, 4940997}, {-1323882, 3911313, -6948744, 14759765, -30027150, 7851207, 21690126, 8518463, 26699843, 5276295}, {-13149873, -6429067, 9396249, 365013, 24703301, -10488939, 1321586, 149635, -15452774, 7159369}, }, { {9987780, -3404759, 17507962, 9505530, 9731535, -2165514, 22356009, 8312176, 22477218, -8403385}, {18155857, -16504990, 19744716, 9006923, 15154154, -10538976, 24256460, -4864995, -22548173, 9334109}, {2986088, -4911893, 10776628, -3473844, 10620590, -7083203, -21413845, 14253545, -22587149, 536906}, }, { {4377756, 8115836, 24567078, 15495314, 11625074, 13064599, 7390551, 10589625, 10838060, -15420424}, {-19342404, 867880, 9277171, -3218459, -14431572, -1986443, 19295826, -15796950, 6378260, 699185}, {7895026, 4057113, -7081772, -13077756, -17886831, -323126, -716039, 15693155, -5045064, -13373962}, }, { {-7737563, -5869402, -14566319, -7406919, 11385654, 13201616, 31730678, -10962840, -3918636, -9669325}, {10188286, -15770834, -7336361, 13427543, 22223443, 14896287, 30743455, 7116568, -21786507, 5427593}, {696102, 13206899, 27047647, -10632082, 15285305, -9853179, 10798490, -4578720, 19236243, 12477404}, }, { {-11229439, 11243796, -17054270, -8040865, -788228, -8167967, -3897669, 11180504, -23169516, 7733644}, {17800790, -14036179, -27000429, -11766671, 23887827, 3149671, 23466177, -10538171, 10322027, 15313801}, {26246234, 11968874, 32263343, -5468728, 6830755, -13323031, -15794704, -101982, -24449242, 10890804}, }, { {-31365647, 10271363, -12660625, -6267268, 16690207, -13062544, -14982212, 16484931, 25180797, -5334884}, {-586574, 10376444, -32586414, -11286356, 19801893, 10997610, 2276632, 9482883, 316878, 13820577}, {-9882808, -4510367, -2115506, 16457136, -11100081, 11674996, 30756178, -7515054, 30696930, -3712849}, }, { {32988917, -9603412, 12499366, 7910787, -10617257, -11931514, -7342816, -9985397, -32349517, 7392473}, {-8855661, 15927861, 9866406, -3649411, -2396914, -16655781, -30409476, -9134995, 25112947, -2926644}, {-2504044, -436966, 25621774, -5678772, 15085042, -5479877, -24884878, -13526194, 5537438, -13914319}, }, }, { { {-11225584, 2320285, -9584280, 10149187, -33444663, 5808648, -14876251, -1729667, 31234590, 6090599}, {-9633316, 116426, 26083934, 2897444, -6364437, -2688086, 609721, 15878753, -6970405, -9034768}, {-27757857, 247744, -15194774, -9002551, 23288161, -10011936, -23869595, 6503646, 20650474, 1804084}, }, { {-27589786, 15456424, 8972517, 8469608, 15640622, 4439847, 3121995, -10329713, 27842616, -202328}, {-15306973, 2839644, 22530074, 10026331, 4602058, 5048462, 28248656, 5031932, -11375082, 12714369}, {20807691, -7270825, 29286141, 11421711, -27876523, -13868230, -21227475, 1035546, -19733229, 12796920}, }, { {12076899, -14301286, -8785001, -11848922, -25012791, 16400684, -17591495, -12899438, 3480665, -15182815}, {-32361549, 5457597, 28548107, 7833186, 7303070, -11953545, -24363064, -15921875, -33374054, 2771025}, {-21389266, 421932, 26597266, 6860826, 22486084, -6737172, -17137485, -4210226, -24552282, 15673397}, }, { {-20184622, 2338216, 19788685, -9620956, -4001265, -8740893, -20271184, 4733254, 3727144, -12934448}, {6120119, 814863, -11794402, -622716, 6812205, -15747771, 2019594, 7975683, 31123697, -10958981}, {30069250, -11435332, 30434654, 2958439, 18399564, -976289, 12296869, 9204260, -16432438, 9648165}, }, { {32705432, -1550977, 30705658, 7451065, -11805606, 9631813, 3305266, 5248604, -26008332, -11377501}, {17219865, 2375039, -31570947, -5575615, -19459679, 9219903, 294711, 15298639, 2662509, -16297073}, {-1172927, -7558695, -4366770, -4287744, -21346413, -8434326, 32087529, -1222777, 32247248, -14389861}, }, { {14312628, 1221556, 17395390, -8700143, -4945741, -8684635, -28197744, -9637817, -16027623, -13378845}, {-1428825, -9678990, -9235681, 6549687, -7383069, -468664, 23046502, 9803137, 17597934, 2346211}, {18510800, 15337574, 26171504, 981392, -22241552, 7827556, -23491134, -11323352, 3059833, -11782870}, }, { {10141598, 6082907, 17829293, -1947643, 9830092, 13613136, -25556636, -5544586, -33502212, 3592096}, {33114168, -15889352, -26525686, -13343397, 33076705, 8716171, 1151462, 1521897, -982665, -6837803}, {-32939165, -4255815, 23947181, -324178, -33072974, -12305637, -16637686, 3891704, 26353178, 693168}, }, { {30374239, 1595580, -16884039, 13186931, 4600344, 406904, 9585294, -400668, 31375464, 14369965}, {-14370654, -7772529, 1510301, 6434173, -18784789, -6262728, 32732230, -13108839, 17901441, 16011505}, {18171223, -11934626, -12500402, 15197122, -11038147, -15230035, -19172240, -16046376, 8764035, 12309598}, }, }, { { {5975908, -5243188, -19459362, -9681747, -11541277, 14015782, -23665757, 1228319, 17544096, -10593782}, {5811932, -1715293, 3442887, -2269310, -18367348, -8359541, -18044043, -15410127, -5565381, 12348900}, {-31399660, 11407555, 25755363, 6891399, -3256938, 14872274, -24849353, 8141295, -10632534, -585479}, }, { {-12675304, 694026, -5076145, 13300344, 14015258, -14451394, -9698672, -11329050, 30944593, 1130208}, {8247766, -6710942, -26562381, -7709309, -14401939, -14648910, 4652152, 2488540, 23550156, -271232}, {17294316, -3788438, 7026748, 15626851, 22990044, 113481, 2267737, -5908146, -408818, -137719}, }, { {16091085, -16253926, 18599252, 7340678, 2137637, -1221657, -3364161, 14550936, 3260525, -7166271}, {-4910104, -13332887, 18550887, 10864893, -16459325, -7291596, -23028869, -13204905, -12748722, 2701326}, {-8574695, 16099415, 4629974, -16340524, -20786213, -6005432, -10018363, 9276971, 11329923, 1862132}, }, { {14763076, -15903608, -30918270, 3689867, 3511892, 10313526, -21951088, 12219231, -9037963, -940300}, {8894987, -3446094, 6150753, 3013931, 301220, 15693451, -31981216, -2909717, -15438168, 11595570}, {15214962, 3537601, -26238722, -14058872, 4418657, -15230761, 13947276, 10730794, -13489462, -4363670}, }, { {-2538306, 7682793, 32759013, 263109, -29984731, -7955452, -22332124, -10188635, 977108, 699994}, {-12466472, 4195084, -9211532, 550904, -15565337, 12917920, 19118110, -439841, -30534533, -14337913}, {31788461, -14507657, 4799989, 7372237, 8808585, -14747943, 9408237, -10051775, 12493932, -5409317}, }, { {-25680606, 5260744, -19235809, -6284470, -3695942, 16566087, 27218280, 2607121, 29375955, 6024730}, {842132, -2794693, -4763381, -8722815, 26332018, -12405641, 11831880, 6985184, -9940361, 2854096}, {-4847262, -7969331, 2516242, -5847713, 9695691, -7221186, 16512645, 960770, 12121869, 16648078}, }, { {-15218652, 14667096, -13336229, 2013717, 30598287, -464137, -31504922, -7882064, 20237806, 2838411}, {-19288047, 4453152, 15298546, -16178388, 22115043, -15972604, 12544294, -13470457, 1068881, -12499905}, {-9558883, -16518835, 33238498, 13506958, 30505848, -1114596, -8486907, -2630053, 12521378, 4845654}, }, { {-28198521, 10744108, -2958380, 10199664, 7759311, -13088600, 3409348, -873400, -6482306, -12885870}, {-23561822, 6230156, -20382013, 10655314, -24040585, -11621172, 10477734, -1240216, -3113227, 13974498}, {12966261, 15550616, -32038948, -1615346, 21025980, -629444, 5642325, 7188737, 18895762, 12629579}, }, }, { { {14741879, -14946887, 22177208, -11721237, 1279741, 8058600, 11758140, 789443, 32195181, 3895677}, {10758205, 15755439, -4509950, 9243698, -4879422, 6879879, -2204575, -3566119, -8982069, 4429647}, {-2453894, 15725973, -20436342, -10410672, -5803908, -11040220, -7135870, -11642895, 18047436, -15281743}, }, { {-25173001, -11307165, 29759956, 11776784, -22262383, -15820455, 10993114, -12850837, -17620701, -9408468}, {21987233, 700364, -24505048, 14972008, -7774265, -5718395, 32155026, 2581431, -29958985, 8773375}, {-25568350, 454463, -13211935, 16126715, 25240068, 8594567, 20656846, 12017935, -7874389, -13920155}, }, { {6028182, 6263078, -31011806, -11301710, -818919, 2461772, -31841174, -5468042, -1721788, -2776725}, {-12278994, 16624277, 987579, -5922598, 32908203, 1248608, 7719845, -4166698, 28408820, 6816612}, {-10358094, -8237829, 19549651, -12169222, 22082623, 16147817, 20613181, 13982702, -10339570, 5067943}, }, { {-30505967, -3821767, 12074681, 13582412, -19877972, 2443951, -19719286, 12746132, 5331210, -10105944}, {30528811, 3601899, -1957090, 4619785, -27361822, -15436388, 24180793, -12570394, 27679908, -1648928}, {9402404, -13957065, 32834043, 10838634, -26580150, -13237195, 26653274, -8685565, 22611444, -12715406}, }, { {22190590, 1118029, 22736441, 15130463, -30460692, -5991321, 19189625, -4648942, 4854859, 6622139}, {-8310738, -2953450, -8262579, -3388049, -10401731, -271929, 13424426, -3567227, 26404409, 13001963}, {-31241838, -15415700, -2994250, 8939346, 11562230, -12840670, -26064365, -11621720, -15405155, 11020693}, }, { {1866042, -7949489, -7898649, -10301010, 12483315, 13477547, 3175636, -12424163, 28761762, 1406734}, {-448555, -1777666, 13018551, 3194501, -9580420, -11161737, 24760585, -4347088, 25577411, -13378680}, {-24290378, 4759345, -690653, -1852816, 2066747, 10693769, -29595790, 9884936, -9368926, 4745410}, }, { {-9141284, 6049714, -19531061, -4341411, -31260798, 9944276, -15462008, -11311852, 10931924, -11931931}, {-16561513, 14112680, -8012645, 4817318, -8040464, -11414606, -22853429, 10856641, -20470770, 13434654}, {22759489, -10073434, -16766264, -1871422, 13637442, -10168091, 1765144, -12654326, 28445307, -5364710}, }, { {29875063, 12493613, 2795536, -3786330, 1710620, 15181182, -10195717, -8788675, 9074234, 1167180}, {-26205683, 11014233, -9842651, -2635485, -26908120, 7532294, -18716888, -9535498, 3843903, 9367684}, {-10969595, -6403711, 9591134, 9582310, 11349256, 108879, 16235123, 8601684, -139197, 4242895}, }, }, { { {22092954, -13191123, -2042793, -11968512, 32186753, -11517388, -6574341, 2470660, -27417366, 16625501}, {-11057722, 3042016, 13770083, -9257922, 584236, -544855, -7770857, 2602725, -27351616, 14247413}, {6314175, -10264892, -32772502, 15957557, -10157730, 168750, -8618807, 14290061, 27108877, -1180880}, }, { {-8586597, -7170966, 13241782, 10960156, -32991015, -13794596, 33547976, -11058889, -27148451, 981874}, {22833440, 9293594, -32649448, -13618667, -9136966, 14756819, -22928859, -13970780, -10479804, -16197962}, {-7768587, 3326786, -28111797, 10783824, 19178761, 14905060, 22680049, 13906969, -15933690, 3797899}, }, { {21721356, -4212746, -12206123, 9310182, -3882239, -13653110, 23740224, -2709232, 20491983, -8042152}, {9209270, -15135055, -13256557, -6167798, -731016, 15289673, 25947805, 15286587, 30997318, -6703063}, {7392032, 16618386, 23946583, -8039892, -13265164, -1533858, -14197445, -2321576, 17649998, -250080}, }, { {-9301088, -14193827, 30609526, -3049543, -25175069, -1283752, -15241566, -9525724, -2233253, 7662146}, {-17558673, 1763594, -33114336, 15908610, -30040870, -12174295, 7335080, -8472199, -3174674, 3440183}, {-19889700, -5977008, -24111293, -9688870, 10799743, -16571957, 40450, -4431835, 4862400, 1133}, }, { {-32856209, -7873957, -5422389, 14860950, -16319031, 7956142, 7258061, 311861, -30594991, -7379421}, {-3773428, -1565936, 28985340, 7499440, 24445838, 9325937, 29727763, 16527196, 18278453, 15405622}, {-4381906, 8508652, -19898366, -3674424, -5984453, 15149970, -13313598, 843523, -21875062, 13626197}, }, { {2281448, -13487055, -10915418, -2609910, 1879358, 16164207, -10783882, 3953792, 13340839, 15928663}, {31727126, -7179855, -18437503, -8283652, 2875793, -16390330, -25269894, -7014826, -23452306, 5964753}, {4100420, -5959452, -17179337, 6017714, -18705837, 12227141, -26684835, 11344144, 2538215, -7570755}, }, { {-9433605, 6123113, 11159803, -2156608, 30016280, 14966241, -20474983, 1485421, -629256, -15958862}, {-26804558, 4260919, 11851389, 9658551, -32017107, 16367492, -20205425, -13191288, 11659922, -11115118}, {26180396, 10015009, -30844224, -8581293, 5418197, 9480663, 2231568, -10170080, 33100372, -1306171}, }, { {15121113, -5201871, -10389905, 15427821, -27509937, -15992507, 21670947, 4486675, -5931810, -14466380}, {16166486, -9483733, -11104130, 6023908, -31926798, -1364923, 2340060, -16254968, -10735770, -10039824}, {28042865, -3557089, -12126526, 12259706, -3717498, -6945899, 6766453, -8689599, 18036436, 5803270}, }, }, { { {-817581, 6763912, 11803561, 1585585, 10958447, -2671165, 23855391, 4598332, -6159431, -14117438}, {-31031306, -14256194, 17332029, -2383520, 31312682, -5967183, 696309, 50292, -20095739, 11763584}, {-594563, -2514283, -32234153, 12643980, 12650761, 14811489, 665117, -12613632, -19773211, -10713562}, }, { {30464590, -11262872, -4127476, -12734478, 19835327, -7105613, -24396175, 2075773, -17020157, 992471}, {18357185, -6994433, 7766382, 16342475, -29324918, 411174, 14578841, 8080033, -11574335, -10601610}, {19598397, 10334610, 12555054, 2555664, 18821899, -10339780, 21873263, 16014234, 26224780, 16452269}, }, { {-30223925, 5145196, 5944548, 16385966, 3976735, 2009897, -11377804, -7618186, -20533829, 3698650}, {14187449, 3448569, -10636236, -10810935, -22663880, -3433596, 7268410, -10890444, 27394301, 12015369}, {19695761, 16087646, 28032085, 12999827, 6817792, 11427614, 20244189, -1312777, -13259127, -3402461}, }, { {30860103, 12735208, -1888245, -4699734, -16974906, 2256940, -8166013, 12298312, -8550524, -10393462}, {-5719826, -11245325, -1910649, 15569035, 26642876, -7587760, -5789354, -15118654, -4976164, 12651793}, {-2848395, 9953421, 11531313, -5282879, 26895123, -12697089, -13118820, -16517902, 9768698, -2533218}, }, { {-24719459, 1894651, -287698, -4704085, 15348719, -8156530, 32767513, 12765450, 4940095, 10678226}, {18860224, 15980149, -18987240, -1562570, -26233012, -11071856, -7843882, 13944024, -24372348, 16582019}, {-15504260, 4970268, -29893044, 4175593, -20993212, -2199756, -11704054, 15444560, -11003761, 7989037}, }, { {31490452, 5568061, -2412803, 2182383, -32336847, 4531686, -32078269, 6200206, -19686113, -14800171}, {-17308668, -15879940, -31522777, -2831, -32887382, 16375549, 8680158, -16371713, 28550068, -6857132}, {-28126887, -5688091, 16837845, -1820458, -6850681, 12700016, -30039981, 4364038, 1155602, 5988841}, }, { {21890435, -13272907, -12624011, 12154349, -7831873, 15300496, 23148983, -4470481, 24618407, 8283181}, {-33136107, -10512751, 9975416, 6841041, -31559793, 16356536, 3070187, -7025928, 1466169, 10740210}, {-1509399, -15488185, -13503385, -10655916, 32799044, 909394, -13938903, -5779719, -32164649, -15327040}, }, { {3960823, -14267803, -28026090, -15918051, -19404858, 13146868, 15567327, 951507, -3260321, -573935}, {24740841, 5052253, -30094131, 8961361, 25877428, 6165135, -24368180, 14397372, -7380369, -6144105}, {-28888365, 3510803, -28103278, -1158478, -11238128, -10631454, -15441463, -14453128, -1625486, -6494814}, }, }, { { {793299, -9230478, 8836302, -6235707, -27360908, -2369593, 33152843, -4885251, -9906200, -621852}, {5666233, 525582, 20782575, -8038419, -24538499, 14657740, 16099374, 1468826, -6171428, -15186581}, {-4859255, -3779343, -2917758, -6748019, 7778750, 11688288, -30404353, -9871238, -1558923, -9863646}, }, { {10896332, -7719704, 824275, 472601, -19460308, 3009587, 25248958, 14783338, -30581476, -15757844}, {10566929, 12612572, -31944212, 11118703, -12633376, 12362879, 21752402, 8822496, 24003793, 14264025}, {27713862, -7355973, -11008240, 9227530, 27050101, 2504721, 23886875, -13117525, 13958495, -5732453}, }, { {-23481610, 4867226, -27247128, 3900521, 29838369, -8212291, -31889399, -10041781, 7340521, -15410068}, {4646514, -8011124, -22766023, -11532654, 23184553, 8566613, 31366726, -1381061, -15066784, -10375192}, {-17270517, 12723032, -16993061, 14878794, 21619651, -6197576, 27584817, 3093888, -8843694, 3849921}, }, { {-9064912, 2103172, 25561640, -15125738, -5239824, 9582958, 32477045, -9017955, 5002294, -15550259}, {-12057553, -11177906, 21115585, -13365155, 8808712, -12030708, 16489530, 13378448, -25845716, 12741426}, {-5946367, 10645103, -30911586, 15390284, -3286982, -7118677, 24306472, 15852464, 28834118, -7646072}, }, { {-17335748, -9107057, -24531279, 9434953, -8472084, -583362, -13090771, 455841, 20461858, 5491305}, {13669248, -16095482, -12481974, -10203039, -14569770, -11893198, -24995986, 11293807, -28588204, -9421832}, {28497928, 6272777, -33022994, 14470570, 8906179, -1225630, 18504674, -14165166, 29867745, -8795943}, }, { {-16207023, 13517196, -27799630, -13697798, 24009064, -6373891, -6367600, -13175392, 22853429, -4012011}, {24191378, 16712145, -13931797, 15217831, 14542237, 1646131, 18603514, -11037887, 12876623, -2112447}, {17902668, 4518229, -411702, -2829247, 26878217, 5258055, -12860753, 608397, 16031844, 3723494}, }, { {-28632773, 12763728, -20446446, 7577504, 33001348, -13017745, 17558842, -7872890, 23896954, -4314245}, {-20005381, -12011952, 31520464, 605201, 2543521, 5991821, -2945064, 7229064, -9919646, -8826859}, {28816045, 298879, -28165016, -15920938, 19000928, -1665890, -12680833, -2949325, -18051778, -2082915}, }, { {16000882, -344896, 3493092, -11447198, -29504595, -13159789, 12577740, 16041268, -19715240, 7847707}, {10151868, 10572098, 27312476, 7922682, 14825339, 4723128, -32855931, -6519018, -10020567, 3852848}, {-11430470, 15697596, -21121557, -4420647, 5386314, 15063598, 16514493, -15932110, 29330899, -15076224}, }, }, { { {-25499735, -4378794, -15222908, -6901211, 16615731, 2051784, 3303702, 15490, -27548796, 12314391}, {15683520, -6003043, 18109120, -9980648, 15337968, -5997823, -16717435, 15921866, 16103996, -3731215}, {-23169824, -10781249, 13588192, -1628807, -3798557, -1074929, -19273607, 5402699, -29815713, -9841101}, }, { {23190676, 2384583, -32714340, 3462154, -29903655, -1529132, -11266856, 8911517, -25205859, 2739713}, {21374101, -3554250, -33524649, 9874411, 15377179, 11831242, -33529904, 6134907, 4931255, 11987849}, {-7732, -2978858, -16223486, 7277597, 105524, -322051, -31480539, 13861388, -30076310, 10117930}, }, { {-29501170, -10744872, -26163768, 13051539, -25625564, 5089643, -6325503, 6704079, 12890019, 15728940}, {-21972360, -11771379, -951059, -4418840, 14704840, 2695116, 903376, -10428139, 12885167, 8311031}, {-17516482, 5352194, 10384213, -13811658, 7506451, 13453191, 26423267, 4384730, 1888765, -5435404}, }, { {-25817338, -3107312, -13494599, -3182506, 30896459, -13921729, -32251644, -12707869, -19464434, -3340243}, {-23607977, -2665774, -526091, 4651136, 5765089, 4618330, 6092245, 14845197, 17151279, -9854116}, {-24830458, -12733720, -15165978, 10367250, -29530908, -265356, 22825805, -7087279, -16866484, 16176525}, }, { {-23583256, 6564961, 20063689, 3798228, -4740178, 7359225, 2006182, -10363426, -28746253, -10197509}, {-10626600, -4486402, -13320562, -5125317, 3432136, -6393229, 23632037, -1940610, 32808310, 1099883}, {15030977, 5768825, -27451236, -2887299, -6427378, -15361371, -15277896, -6809350, 2051441, -15225865}, }, { {-3362323, -7239372, 7517890, 9824992, 23555850, 295369, 5148398, -14154188, -22686354, 16633660}, {4577086, -16752288, 13249841, -15304328, 19958763, -14537274, 18559670, -10759549, 8402478, -9864273}, {-28406330, -1051581, -26790155, -907698, -17212414, -11030789, 9453451, -14980072, 17983010, 9967138}, }, { {-25762494, 6524722, 26585488, 9969270, 24709298, 1220360, -1677990, 7806337, 17507396, 3651560}, {-10420457, -4118111, 14584639, 15971087, -15768321, 8861010, 26556809, -5574557, -18553322, -11357135}, {2839101, 14284142, 4029895, 3472686, 14402957, 12689363, -26642121, 8459447, -5605463, -7621941}, }, { {-4839289, -3535444, 9744961, 2871048, 25113978, 3187018, -25110813, -849066, 17258084, -7977739}, {18164541, -10595176, -17154882, -1542417, 19237078, -9745295, 23357533, -15217008, 26908270, 12150756}, {-30264870, -7647865, 5112249, -7036672, -1499807, -6974257, 43168, -5537701, -32302074, 16215819}, }, }, { { {-6898905, 9824394, -12304779, -4401089, -31397141, -6276835, 32574489, 12532905, -7503072, -8675347}, {-27343522, -16515468, -27151524, -10722951, 946346, 16291093, 254968, 7168080, 21676107, -1943028}, {21260961, -8424752, -16831886, -11920822, -23677961, 3968121, -3651949, -6215466, -3556191, -7913075}, }, { {16544754, 13250366, -16804428, 15546242, -4583003, 12757258, -2462308, -8680336, -18907032, -9662799}, {-2415239, -15577728, 18312303, 4964443, -15272530, -12653564, 26820651, 16690659, 25459437, -4564609}, {-25144690, 11425020, 28423002, -11020557, -6144921, -15826224, 9142795, -2391602, -6432418, -1644817}, }, { {-23104652, 6253476, 16964147, -3768872, -25113972, -12296437, -27457225, -16344658, 6335692, 7249989}, {-30333227, 13979675, 7503222, -12368314, -11956721, -4621693, -30272269, 2682242, 25993170, -12478523}, {4364628, 5930691, 32304656, -10044554, -8054781, 15091131, 22857016, -10598955, 31820368, 15075278}, }, { {31879134, -8918693, 17258761, 90626, -8041836, -4917709, 24162788, -9650886, -17970238, 12833045}, {19073683, 14851414, -24403169, -11860168, 7625278, 11091125, -19619190, 2074449, -9413939, 14905377}, {24483667, -11935567, -2518866, -11547418, -1553130, 15355506, -25282080, 9253129, 27628530, -7555480}, }, { {17597607, 8340603, 19355617, 552187, 26198470, -3176583, 4593324, -9157582, -14110875, 15297016}, {510886, 14337390, -31785257, 16638632, 6328095, 2713355, -20217417, -11864220, 8683221, 2921426}, {18606791, 11874196, 27155355, -5281482, -24031742, 6265446, -25178240, -1278924, 4674690, 13890525}, }, { {13609624, 13069022, -27372361, -13055908, 24360586, 9592974, 14977157, 9835105, 4389687, 288396}, {9922506, -519394, 13613107, 5883594, -18758345, -434263, -12304062, 8317628, 23388070, 16052080}, {12720016, 11937594, -31970060, -5028689, 26900120, 8561328, -20155687, -11632979, -14754271, -10812892}, }, { {15961858, 14150409, 26716931, -665832, -22794328, 13603569, 11829573, 7467844, -28822128, 929275}, {11038231, -11582396, -27310482, -7316562, -10498527, -16307831, -23479533, -9371869, -21393143, 2465074}, {20017163, -4323226, 27915242, 1529148, 12396362, 15675764, 13817261, -9658066, 2463391, -4622140}, }, { {-16358878, -12663911, -12065183, 4996454, -1256422, 1073572, 9583558, 12851107, 4003896, 12673717}, {-1731589, -15155870, -3262930, 16143082, 19294135, 13385325, 14741514, -9103726, 7903886, 2348101}, {24536016, -16515207, 12715592, -3862155, 1511293, 10047386, -3842346, -7129159, -28377538, 10048127}, }, }, { { {-12622226, -6204820, 30718825, 2591312, -10617028, 12192840, 18873298, -7297090, -32297756, 15221632}, {-26478122, -11103864, 11546244, -1852483, 9180880, 7656409, -21343950, 2095755, 29769758, 6593415}, {-31994208, -2907461, 4176912, 3264766, 12538965, -868111, 26312345, -6118678, 30958054, 8292160}, }, { {31429822, -13959116, 29173532, 15632448, 12174511, -2760094, 32808831, 3977186, 26143136, -3148876}, {22648901, 1402143, -22799984, 13746059, 7936347, 365344, -8668633, -1674433, -3758243, -2304625}, {-15491917, 8012313, -2514730, -12702462, -23965846, -10254029, -1612713, -1535569, -16664475, 8194478}, }, { {27338066, -7507420, -7414224, 10140405, -19026427, -6589889, 27277191, 8855376, 28572286, 3005164}, {26287124, 4821776, 25476601, -4145903, -3764513, -15788984, -18008582, 1182479, -26094821, -13079595}, {-7171154, 3178080, 23970071, 6201893, -17195577, -4489192, -21876275, -13982627, 32208683, -1198248}, }, { {-16657702, 2817643, -10286362, 14811298, 6024667, 13349505, -27315504, -10497842, -27672585, -11539858}, {15941029, -9405932, -21367050, 8062055, 31876073, -238629, -15278393, -1444429, 15397331, -4130193}, {8934485, -13485467, -23286397, -13423241, -32446090, 14047986, 31170398, -1441021, -27505566, 15087184}, }, { {-18357243, -2156491, 24524913, -16677868, 15520427, -6360776, -15502406, 11461896, 16788528, -5868942}, {-1947386, 16013773, 21750665, 3714552, -17401782, -16055433, -3770287, -10323320, 31322514, -11615635}, {21426655, -5650218, -13648287, -5347537, -28812189, -4920970, -18275391, -14621414, 13040862, -12112948}, }, { {11293895, 12478086, -27136401, 15083750, -29307421, 14748872, 14555558, -13417103, 1613711, 4896935}, {-25894883, 15323294, -8489791, -8057900, 25967126, -13425460, 2825960, -4897045, -23971776, -11267415}, {-15924766, -5229880, -17443532, 6410664, 3622847, 10243618, 20615400, 12405433, -23753030, -8436416}, }, { {-7091295, 12556208, -20191352, 9025187, -17072479, 4333801, 4378436, 2432030, 23097949, -566018}, {4565804, -16025654, 20084412, -7842817, 1724999, 189254, 24767264, 10103221, -18512313, 2424778}, {366633, -11976806, 8173090, -6890119, 30788634, 5745705, -7168678, 1344109, -3642553, 12412659}, }, { {-24001791, 7690286, 14929416, -168257, -32210835, -13412986, 24162697, -15326504, -3141501, 11179385}, {18289522, -14724954, 8056945, 16430056, -21729724, 7842514, -6001441, -1486897, -18684645, -11443503}, {476239, 6601091, -6152790, -9723375, 17503545, -4863900, 27672959, 13403813, 11052904, 5219329}, }, }, { { {20678546, -8375738, -32671898, 8849123, -5009758, 14574752, 31186971, -3973730, 9014762, -8579056}, {-13644050, -10350239, -15962508, 5075808, -1514661, -11534600, -33102500, 9160280, 8473550, -3256838}, {24900749, 14435722, 17209120, -15292541, -22592275, 9878983, -7689309, -16335821, -24568481, 11788948}, }, { {-3118155, -11395194, -13802089, 14797441, 9652448, -6845904, -20037437, 10410733, -24568470, -1458691}, {-15659161, 16736706, -22467150, 10215878, -9097177, 7563911, 11871841, -12505194, -18513325, 8464118}, {-23400612, 8348507, -14585951, -861714, -3950205, -6373419, 14325289, 8628612, 33313881, -8370517}, }, { {-20186973, -4967935, 22367356, 5271547, -1097117, -4788838, -24805667, -10236854, -8940735, -5818269}, {-6948785, -1795212, -32625683, -16021179, 32635414, -7374245, 15989197, -12838188, 28358192, -4253904}, {-23561781, -2799059, -32351682, -1661963, -9147719, 10429267, -16637684, 4072016, -5351664, 5596589}, }, { {-28236598, -3390048, 12312896, 6213178, 3117142, 16078565, 29266239, 2557221, 1768301, 15373193}, {-7243358, -3246960, -4593467, -7553353, -127927, -912245, -1090902, -4504991, -24660491, 3442910}, {-30210571, 5124043, 14181784, 8197961, 18964734, -11939093, 22597931, 7176455, -18585478, 13365930}, }, { {-7877390, -1499958, 8324673, 4690079, 6261860, 890446, 24538107, -8570186, -9689599, -3031667}, {25008904, -10771599, -4305031, -9638010, 16265036, 15721635, 683793, -11823784, 15723479, -15163481}, {-9660625, 12374379, -27006999, -7026148, -7724114, -12314514, 11879682, 5400171, 519526, -1235876}, }, { {22258397, -16332233, -7869817, 14613016, -22520255, -2950923, -20353881, 7315967, 16648397, 7605640}, {-8081308, -8464597, -8223311, 9719710, 19259459, -15348212, 23994942, -5281555, -9468848, 4763278}, {-21699244, 9220969, -15730624, 1084137, -25476107, -2852390, 31088447, -7764523, -11356529, 728112}, }, { {26047220, -11751471, -6900323, -16521798, 24092068, 9158119, -4273545, -12555558, -29365436, -5498272}, {17510331, -322857, 5854289, 8403524, 17133918, -3112612, -28111007, 12327945, 10750447, 10014012}, {-10312768, 3936952, 9156313, -8897683, 16498692, -994647, -27481051, -666732, 3424691, 7540221}, }, { {30322361, -6964110, 11361005, -4143317, 7433304, 4989748, -7071422, -16317219, -9244265, 15258046}, {13054562, -2779497, 19155474, 469045, -12482797, 4566042, 5631406, 2711395, 1062915, -5136345}, {-19240248, -11254599, -29509029, -7499965, -5835763, 13005411, -6066489, 12194497, 32960380, 1459310}, }, }, { { {19852034, 7027924, 23669353, 10020366, 8586503, -6657907, 394197, -6101885, 18638003, -11174937}, {31395534, 15098109, 26581030, 8030562, -16527914, -5007134, 9012486, -7584354, -6643087, -5442636}, {-9192165, -2347377, -1997099, 4529534, 25766844, 607986, -13222, 9677543, -32294889, -6456008}, }, { {-2444496, -149937, 29348902, 8186665, 1873760, 12489863, -30934579, -7839692, -7852844, -8138429}, {-15236356, -15433509, 7766470, 746860, 26346930, -10221762, -27333451, 10754588, -9431476, 5203576}, {31834314, 14135496, -770007, 5159118, 20917671, -16768096, -7467973, -7337524, 31809243, 7347066}, }, { {-9606723, -11874240, 20414459, 13033986, 13716524, -11691881, 19797970, -12211255, 15192876, -2087490}, {-12663563, -2181719, 1168162, -3804809, 26747877, -14138091, 10609330, 12694420, 33473243, -13382104}, {33184999, 11180355, 15832085, -11385430, -1633671, 225884, 15089336, -11023903, -6135662, 14480053}, }, { {31308717, -5619998, 31030840, -1897099, 15674547, -6582883, 5496208, 13685227, 27595050, 8737275}, {-20318852, -15150239, 10933843, -16178022, 8335352, -7546022, -31008351, -12610604, 26498114, 66511}, {22644454, -8761729, -16671776, 4884562, -3105614, -13559366, 30540766, -4286747, -13327787, -7515095}, }, { {-28017847, 9834845, 18617207, -2681312, -3401956, -13307506, 8205540, 13585437, -17127465, 15115439}, {23711543, -672915, 31206561, -8362711, 6164647, -9709987, -33535882, -1426096, 8236921, 16492939}, {-23910559, -13515526, -26299483, -4503841, 25005590, -7687270, 19574902, 10071562, 6708380, -6222424}, }, { {2101391, -4930054, 19702731, 2367575, -15427167, 1047675, 5301017, 9328700, 29955601, -11678310}, {3096359, 9271816, -21620864, -15521844, -14847996, -7592937, -25892142, -12635595, -9917575, 6216608}, {-32615849, 338663, -25195611, 2510422, -29213566, -13820213, 24822830, -6146567, -26767480, 7525079}, }, { {-23066649, -13985623, 16133487, -7896178, -3389565, 778788, -910336, -2782495, -19386633, 11994101}, {21691500, -13624626, -641331, -14367021, 3285881, -3483596, -25064666, 9718258, -7477437, 13381418}, {18445390, -4202236, 14979846, 11622458, -1727110, -3582980, 23111648, -6375247, 28535282, 15779576}, }, { {30098053, 3089662, -9234387, 16662135, -21306940, 11308411, -14068454, 12021730, 9955285, -16303356}, {9734894, -14576830, -7473633, -9138735, 2060392, 11313496, -18426029, 9924399, 20194861, 13380996}, {-26378102, -7965207, -22167821, 15789297, -18055342, -6168792, -1984914, 15707771, 26342023, 10146099}, }, }, { { {-26016874, -219943, 21339191, -41388, 19745256, -2878700, -29637280, 2227040, 21612326, -545728}, {-13077387, 1184228, 23562814, -5970442, -20351244, -6348714, 25764461, 12243797, -20856566, 11649658}, {-10031494, 11262626, 27384172, 2271902, 26947504, -15997771, 39944, 6114064, 33514190, 2333242}, }, { {-21433588, -12421821, 8119782, 7219913, -21830522, -9016134, -6679750, -12670638, 24350578, -13450001}, {-4116307, -11271533, -23886186, 4843615, -30088339, 690623, -31536088, -10406836, 8317860, 12352766}, {18200138, -14475911, -33087759, -2696619, -23702521, -9102511, -23552096, -2287550, 20712163, 6719373}, }, { {26656208, 6075253, -7858556, 1886072, -28344043, 4262326, 11117530, -3763210, 26224235, -3297458}, {-17168938, -14854097, -3395676, -16369877, -19954045, 14050420, 21728352, 9493610, 18620611, -16428628}, {-13323321, 13325349, 11432106, 5964811, 18609221, 6062965, -5269471, -9725556, -30701573, -16479657}, }, { {-23860538, -11233159, 26961357, 1640861, -32413112, -16737940, 12248509, -5240639, 13735342, 1934062}, {25089769, 6742589, 17081145, -13406266, 21909293, -16067981, -15136294, -3765346, -21277997, 5473616}, {31883677, -7961101, 1083432, -11572403, 22828471, 13290673, -7125085, 12469656, 29111212, -5451014}, }, { {24244947, -15050407, -26262976, 2791540, -14997599, 16666678, 24367466, 6388839, -10295587, 452383}, {-25640782, -3417841, 5217916, 16224624, 19987036, -4082269, -24236251, -5915248, 15766062, 8407814}, {-20406999, 13990231, 15495425, 16395525, 5377168, 15166495, -8917023, -4388953, -8067909, 2276718}, }, { {30157918, 12924066, -17712050, 9245753, 19895028, 3368142, -23827587, 5096219, 22740376, -7303417}, {2041139, -14256350, 7783687, 13876377, -25946985, -13352459, 24051124, 13742383, -15637599, 13295222}, {33338237, -8505733, 12532113, 7977527, 9106186, -1715251, -17720195, -4612972, -4451357, -14669444}, }, { {-20045281, 5454097, -14346548, 6447146, 28862071, 1883651, -2469266, -4141880, 7770569, 9620597}, {23208068, 7979712, 33071466, 8149229, 1758231, -10834995, 30945528, -1694323, -33502340, -14767970}, {1439958, -16270480, -1079989, -793782, 4625402, 10647766, -5043801, 1220118, 30494170, -11440799}, }, { {-5037580, -13028295, -2970559, -3061767, 15640974, -6701666, -26739026, 926050, -1684339, -13333647}, {13908495, -3549272, 30919928, -6273825, -21521863, 7989039, 9021034, 9078865, 3353509, 4033511}, {-29663431, -15113610, 32259991, -344482, 24295849, -12912123, 23161163, 8839127, 27485041, 7356032}, }, }, { { {9661027, 705443, 11980065, -5370154, -1628543, 14661173, -6346142, 2625015, 28431036, -16771834}, {-23839233, -8311415, -25945511, 7480958, -17681669, -8354183, -22545972, 14150565, 15970762, 4099461}, {29262576, 16756590, 26350592, -8793563, 8529671, -11208050, 13617293, -9937143, 11465739, 8317062}, }, { {-25493081, -6962928, 32500200, -9419051, -23038724, -2302222, 14898637, 3848455, 20969334, -5157516}, {-20384450, -14347713, -18336405, 13884722, -33039454, 2842114, -21610826, -3649888, 11177095, 14989547}, {-24496721, -11716016, 16959896, 2278463, 12066309, 10137771, 13515641, 2581286, -28487508, 9930240}, }, { {-17751622, -2097826, 16544300, -13009300, -15914807, -14949081, 18345767, -13403753, 16291481, -5314038}, {-33229194, 2553288, 32678213, 9875984, 8534129, 6889387, -9676774, 6957617, 4368891, 9788741}, {16660756, 7281060, -10830758, 12911820, 20108584, -8101676, -21722536, -8613148, 16250552, -11111103}, }, { {-19765507, 2390526, -16551031, 14161980, 1905286, 6414907, 4689584, 10604807, -30190403, 4782747}, {-1354539, 14736941, -7367442, -13292886, 7710542, -14155590, -9981571, 4383045, 22546403, 437323}, {31665577, -12180464, -16186830, 1491339, -18368625, 3294682, 27343084, 2786261, -30633590, -14097016}, }, { {-14467279, -683715, -33374107, 7448552, 19294360, 14334329, -19690631, 2355319, -19284671, -6114373}, {15121312, -15796162, 6377020, -6031361, -10798111, -12957845, 18952177, 15496498, -29380133, 11754228}, {-2637277, -13483075, 8488727, -14303896, 12728761, -1622493, 7141596, 11724556, 22761615, -10134141}, }, { {16918416, 11729663, -18083579, 3022987, -31015732, -13339659, -28741185, -12227393, 32851222, 11717399}, {11166634, 7338049, -6722523, 4531520, -29468672, -7302055, 31474879, 3483633, -1193175, -4030831}, {-185635, 9921305, 31456609, -13536438, -12013818, 13348923, 33142652, 6546660, -19985279, -3948376}, }, { {-32460596, 11266712, -11197107, -7899103, 31703694, 3855903, -8537131, -12833048, -30772034, -15486313}, {-18006477, 12709068, 3991746, -6479188, -21491523, -10550425, -31135347, -16049879, 10928917, 3011958}, {-6957757, -15594337, 31696059, 334240, 29576716, 14796075, -30831056, -12805180, 18008031, 10258577}, }, { {-22448644, 15655569, 7018479, -4410003, -30314266, -1201591, -1853465, 1367120, 25127874, 6671743}, {29701166, -14373934, -10878120, 9279288, -17568, 13127210, 21382910, 11042292, 25838796, 4642684}, {-20430234, 14955537, -24126347, 8124619, -5369288, -5990470, 30468147, -13900640, 18423289, 4177476}, }, }, }; void TableLookup(GePre *preCompute, int32_t pos, int8_t e) { GePre negate; // Prevent side-channel attack: Do not use conditional statements to ensure that the execution time is constant. // -negative = 11111111 if e is negative, or 0 if e is not // (-negative & e) << 1 = 2e if e is negative, or 0 if e is positive // absolute value = e - 2e (e negative) or e (e positive) uint8_t negative = (uint8_t)e >> 7; // shift 7 to check negative // range of e is -7 to 8, left shift won't cause sign change uint8_t abs = (uint8_t)(e - ((uint8_t)(-negative & (uint8_t)e) << 1)); // set base result CURVE25519_FP_SET(preCompute->yplusx, 1); CURVE25519_FP_SET(preCompute->yminusx, 1); CURVE25519_FP_SET(preCompute->xy2d, 0); // only copy the corrsponding position ConditionalMove(preCompute, &CURVE25519PRE_COMPUTE[pos][0], abs == 1); // 1 of 8 ConditionalMove(preCompute, &CURVE25519PRE_COMPUTE[pos][1], abs == 2); // 2 of 8 ConditionalMove(preCompute, &CURVE25519PRE_COMPUTE[pos][2], abs == 3); // 3 of 8 ConditionalMove(preCompute, &CURVE25519PRE_COMPUTE[pos][3], abs == 4); // 4 of 8 ConditionalMove(preCompute, &CURVE25519PRE_COMPUTE[pos][4], abs == 5); // 5 of 8 ConditionalMove(preCompute, &CURVE25519PRE_COMPUTE[pos][5], abs == 6); // 6 of 8 ConditionalMove(preCompute, &CURVE25519PRE_COMPUTE[pos][6], abs == 7); // 7 of 8 ConditionalMove(preCompute, &CURVE25519PRE_COMPUTE[pos][7], abs == 8); // 8 of 8 CURVE25519_FP_COPY(negate.yminusx, preCompute->yplusx); CURVE25519_FP_COPY(negate.yplusx, preCompute->yminusx); CURVE25519_FP_NEGATE(negate.xy2d, preCompute->xy2d); ConditionalMove(preCompute, &negate, negative); } #endif /* HITLS_CRYPTO_CURVE25519 */
2401_83913325/openHiTLS-examples_7925
crypto/curve25519/src/curve25519_table.c
C
unknown
96,121
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_X25519 #include "securec.h" #include "curve25519_local.h" // X25519 alternative implementation, faster but require int128 #if (defined(__SIZEOF_INT128__) && (__SIZEOF_INT128__ == 16)) #define CURVE25519_51BITS_MASK 0x7ffffffffffff #define CURVE25519_51BITS 51 static void Fp51DataToPoly(Fp51 *out, const uint8_t in[32]) { uint64_t h[5]; CURVE25519_BYTES7_LOAD(h, in); CURVE25519_BYTES6_LOAD(h + 1, in + 7); h[1] <<= 5; CURVE25519_BYTES7_LOAD(h + 2, in + 13); h[2] <<= 2; CURVE25519_BYTES6_LOAD(h + 3, in + 20); h[3] <<= 7; CURVE25519_BYTES6_LOAD(h + 4, in + 26); h[4] &= 0x7fffffffffff; // 41 bits mask = 0x7fffffffffff h[4] <<= 4; h[1] |= h[0] >> CURVE25519_51BITS; h[0] &= CURVE25519_51BITS_MASK; h[2] |= h[1] >> CURVE25519_51BITS; h[1] &= CURVE25519_51BITS_MASK; h[3] |= h[2] >> CURVE25519_51BITS; h[2] &= CURVE25519_51BITS_MASK; h[4] |= h[3] >> CURVE25519_51BITS; h[3] &= CURVE25519_51BITS_MASK; out->data[0] = h[0]; out->data[1] = h[1]; out->data[2] = h[2]; out->data[3] = h[3]; out->data[4] = h[4]; } static void Fp51UnloadTo8Bits(uint8_t out[32], uint64_t h[5]) { // load from uint64 to uint8, load 8 bits at a time out[0] = (uint8_t)h[0]; out[1] = (uint8_t)(h[0] >> 8); out[2] = (uint8_t)(h[0] >> 16); out[3] = (uint8_t)(h[0] >> 24); out[4] = (uint8_t)(h[0] >> 32); out[5] = (uint8_t)(h[0] >> 40); // load from position 48 from h[1] and (8-5)=3 bits from h[1] to out[6] out[6] = (uint8_t)((h[0] >> 48) | (uint8_t)(h[1] << 3)); out[7] = (uint8_t)(h[1] >> 5); out[8] = (uint8_t)(h[1] >> 13); out[9] = (uint8_t)(h[1] >> 21); out[10] = (uint8_t)(h[1] >> 29); out[11] = (uint8_t)(h[1] >> 37); // load from position 45 from h[1] and (8-2)=6 bits from h[2] to out[12] out[12] = (uint8_t)((h[1] >> 45) | (uint8_t)(h[2] << 6)); out[13] = (uint8_t)(h[2] >> 2); out[14] = (uint8_t)(h[2] >> 10); out[15] = (uint8_t)(h[2] >> 18); out[16] = (uint8_t)(h[2] >> 26); out[17] = (uint8_t)(h[2] >> 34); out[18] = (uint8_t)(h[2] >> 42); // load from position 50 from h[2] and (8-1)=7 bits from h[3] to out[19] out[19] = (uint8_t)((h[2] >> 50) | (uint8_t)(h[3] << 1)); out[20] = (uint8_t)(h[3] >> 7); out[21] = (uint8_t)(h[3] >> 15); out[22] = (uint8_t)(h[3] >> 23); out[23] = (uint8_t)(h[3] >> 31); out[24] = (uint8_t)(h[3] >> 39); // load from position 47 from h[3] and (4-4)=4 bits from h[4] to out[25] out[25] = (uint8_t)((h[3] >> 47) | (uint8_t)(h[4] << 4)); out[26] = (uint8_t)(h[4] >> 4); out[27] = (uint8_t)(h[4] >> 12); out[28] = (uint8_t)(h[4] >> 20); out[29] = (uint8_t)(h[4] >> 28); out[30] = (uint8_t)(h[4] >> 36); out[31] = (uint8_t)(h[4] >> 44); } static void Fp51PolyToData(const Fp51 *in, uint8_t out[32]) { uint64_t h[5]; h[0] = in->data[0]; h[1] = in->data[1]; h[2] = in->data[2]; h[3] = in->data[3]; h[4] = in->data[4]; uint64_t carry; carry = (h[0] + 19) >> CURVE25519_51BITS; // plus 19 then calculate carry carry = (h[1] + carry) >> CURVE25519_51BITS; carry = (h[2] + carry) >> CURVE25519_51BITS; carry = (h[3] + carry) >> CURVE25519_51BITS; carry = (h[4] + carry) >> CURVE25519_51BITS; h[0] += 19 * carry; // process carry h[4] -> h[0], h[0] += 19 * carry h[1] += h[0] >> CURVE25519_51BITS; h[0] &= CURVE25519_51BITS_MASK; h[2] += h[1] >> CURVE25519_51BITS; h[1] &= CURVE25519_51BITS_MASK; h[3] += h[2] >> CURVE25519_51BITS; h[2] &= CURVE25519_51BITS_MASK; h[4] += h[3] >> CURVE25519_51BITS; h[3] &= CURVE25519_51BITS_MASK; h[4] &= CURVE25519_51BITS_MASK; Fp51UnloadTo8Bits(out, h); } void Fp51ProcessCarry(__uint128_t in[5]) { in[1] += (uint64_t)(in[0] >> CURVE25519_51BITS); in[0] = (uint64_t)in[0] & CURVE25519_51BITS_MASK; in[2] += (uint64_t)(in[1] >> CURVE25519_51BITS); in[1] = (uint64_t)in[1] & CURVE25519_51BITS_MASK; in[3] += (uint64_t)(in[2] >> CURVE25519_51BITS); in[2] = (uint64_t)in[2] & CURVE25519_51BITS_MASK; in[4] += (uint64_t)(in[3] >> CURVE25519_51BITS); in[3] = (uint64_t)in[3] & CURVE25519_51BITS_MASK; in[0] += (uint64_t)(in[4] >> CURVE25519_51BITS) * 19; in[4] = (uint64_t)in[4] & CURVE25519_51BITS_MASK; in[1] += in[0] >> CURVE25519_51BITS; in[0] &= CURVE25519_51BITS_MASK; } void Fp51Mul(Fp51 *out, const Fp51 *f, const Fp51 *g) { __uint128_t h[5]; // h[0] = f0g0 + 19*f1g4 + 19*f2g3 + 19*f3g2 + 19*f4g1 h[0] = (__uint128_t)f->data[0] * g->data[0] + (__uint128_t)f->data[1] * g->data[4] * 19 + (__uint128_t)f->data[2] * g->data[3] * 19 + (__uint128_t)f->data[3] * g->data[2] * 19 + // 19*f2g3 + 19*f3g2 (__uint128_t)f->data[4] * g->data[1] * 19; // 19*f4g1 // h[1] = f0g1 + f1g0 + 19*f2g4 + 19*f3g3 + 19*f4g2 h[1] = (__uint128_t)f->data[0] * g->data[1] + (__uint128_t)f->data[1] * g->data[0] + (__uint128_t)f->data[2] * g->data[4] * 19 + (__uint128_t)f->data[3] * g->data[3] * 19 + // 19*f2g4 + 19*f3g3 (__uint128_t)f->data[4] * g->data[2] * 19; // 19*f4g2 // h[2] = f0g2 + f1g1 + f2g0 + 19*f3g4 + 19*f4g3 h[2] = (__uint128_t)f->data[0] * g->data[2] + (__uint128_t)f->data[1] * g->data[1] + (__uint128_t)f->data[2] * g->data[0] + (__uint128_t)f->data[3] * g->data[4] * 19 + // f2g0 + 19*f3g4 (__uint128_t)f->data[4] * g->data[3] * 19; // 19*f4g3 // h[3] = f0g3 + f1g2 + f2g1 + f3g0 + 19*f4g4 h[3] = (__uint128_t)f->data[0] * g->data[3] + (__uint128_t)f->data[1] * g->data[2] + (__uint128_t)f->data[2] * g->data[1] + (__uint128_t)f->data[3] * g->data[0] + // f2g1 + f3g0 (__uint128_t)f->data[4] * g->data[4] * 19; // 19*f4g4 // h[4] = f0g4 + f1g3 + f2g2 + f3g1 + f4g0 h[4] = (__uint128_t)f->data[0] * g->data[4] + (__uint128_t)f->data[1] * g->data[3] + (__uint128_t)f->data[2] * g->data[2] + (__uint128_t)f->data[3] * g->data[1] + // f2g2 + f3g1 (__uint128_t)f->data[4] * g->data[0]; // f4g0 Fp51ProcessCarry(h); out->data[0] = (uint64_t)h[0]; out->data[1] = (uint64_t)h[1]; out->data[2] = (uint64_t)h[2]; out->data[3] = (uint64_t)h[3]; out->data[4] = (uint64_t)h[4]; } void Fp51Square(Fp51 *out, const Fp51 *in) { __uint128_t h[5]; uint64_t in0mul2 = in->data[0] * 2; uint64_t in1mul2 = in->data[1] * 2; uint64_t in2mul2 = in->data[2] * 2; uint64_t in3mul19 = in->data[3] * 19; uint64_t in4mul19 = in->data[4] * 19; // h0 = in0^2 + 38 * in1 * in4 + 38 * in2 * in3 h[0] = (__uint128_t)in->data[0] * in->data[0] + (__uint128_t)in1mul2 * in4mul19 + (__uint128_t)in2mul2 * in3mul19; // h1 = 2 * in0 * in1 + 19 * in3^2 + 38 * in2 * in4 h[1] = (__uint128_t)in0mul2 * in->data[1] + (__uint128_t)in->data[3] * in3mul19 + (__uint128_t)in2mul2 * in4mul19; // h2 = 2 * in0 * in2 + in1^2 + 38 * in3 * in4 h[2] = (__uint128_t)in0mul2 * in->data[2] + (__uint128_t)in->data[1] * in->data[1] + (__uint128_t)(in->data[3] * 2) * in4mul19; // 2 * 19 * in3 * in4 // h3 = 2 * in0 * in3 + 19 * in4^2 + 2 * in1 * in2 h[3] = (__uint128_t)in0mul2 * in->data[3] + (__uint128_t)in->data[4] * in4mul19 + (__uint128_t)in1mul2 * in->data[2]; // 2 * in1 * in2 // h4 = 2 * in0 * in4 + 2 * in1 * in3 + in2^2 h[4] = (__uint128_t)in0mul2 * in->data[4] + (__uint128_t)in1mul2 * in->data[3] + (__uint128_t)in->data[2] * in->data[2]; // in2^2 Fp51ProcessCarry(h); out->data[0] = (uint64_t)h[0]; out->data[1] = (uint64_t)h[1]; out->data[2] = (uint64_t)h[2]; out->data[3] = (uint64_t)h[3]; out->data[4] = (uint64_t)h[4]; } void Fp51MulScalar(Fp51 *out, const Fp51 *in, const uint32_t scalar) { __uint128_t h[5]; h[0] = in->data[0] * (__uint128_t)scalar; h[1] = in->data[1] * (__uint128_t)scalar; h[2] = in->data[2] * (__uint128_t)scalar; h[3] = in->data[3] * (__uint128_t)scalar; h[4] = in->data[4] * (__uint128_t)scalar; Fp51ProcessCarry(h); out->data[0] = (uint64_t)h[0]; out->data[1] = (uint64_t)h[1]; out->data[2] = (uint64_t)h[2]; out->data[3] = (uint64_t)h[3]; out->data[4] = (uint64_t)h[4]; } /* out = in1 ^ (4 * 2 ^ (2 * times)) * in2 */ static inline void Fp51MultiSquare(Fp51 *in1, Fp51 *in2, Fp51 *out, int32_t times) { int32_t i; Fp51 temp1, temp2; Fp51Square(&temp1, in1); Fp51Square(&temp2, &temp1); for (i = 0; i < times; i++) { Fp51Square(&temp1, &temp2); Fp51Square(&temp2, &temp1); } Fp51Mul(out, in2, &temp2); } /* out = a ^ -1 */ static void Fp51Invert(Fp51 *out, const Fp51 *a) { Fp51 a0; /* save a^1 */ Fp51 a1; /* save a^2 */ Fp51 a2; /* save a^11 */ Fp51 a3; /* save a^(2^5-1) */ Fp51 a4; /* save a^(2^10-1) */ Fp51 a5; /* save a^(2^20-1) */ Fp51 a6; /* save a^(2^40-1) */ Fp51 a7; /* save a^(2^50-1) */ Fp51 a8; /* save a^(2^100-1) */ Fp51 a9; /* save a^(2^200-1) */ Fp51 a10; /* save a^(2^250-1) */ Fp51 temp1, temp2; /* We know a×b=1(mod p), then a and b are inverses of mod p, i.e. a=b^(-1), b=a^(-1); * According to Fermat's little theorem a^(p-1)=1(mod p), so a*a^(p-2)=1(mod p); * So the inverse element of a is a^(-1) = a^(p-2)(mod p) * Here it is, p=2^255-19, thus we need to compute a^(2^255-21)(mod(2^255-19)) */ /* a^1 */ CURVE25519_FP51_COPY(a0.data, a->data); /* a^2 */ Fp51Square(&a1, &a0); /* a^4 */ Fp51Square(&temp1, &a1); /* a^8 */ Fp51Square(&temp2, &temp1); /* a^9 */ Fp51Mul(&temp1, &a0, &temp2); /* a^11 */ Fp51Mul(&a2, &a1, &temp1); /* a^22 */ Fp51Square(&temp2, &a2); /* a^(2^5-1) = a^(9+22) */ Fp51Mul(&a3, &temp1, &temp2); /* a^(2^10-1) = a^(2^10-2^5) * a^(2^5-1) */ Fp51Square(&temp1, &a3); Fp51Square(&temp2, &temp1); Fp51Square(&temp1, &temp2); Fp51Square(&temp2, &temp1); Fp51Square(&temp1, &temp2); Fp51Mul(&a4, &a3, &temp1); /* a^(2^20-1) = a^(2^20-2^10) * a^(2^10-1) */ Fp51MultiSquare(&a4, &a4, &a5, 4); // (2 * 2) ^ 4 /* a^(2^40-1) = a^(2^40-2^20) * a^(2^20-1) */ Fp51MultiSquare(&a5, &a5, &a6, 9); // (2 * 2) ^ 9 /* a^(2^50-1) = a^(2^50-2^10) * a^(2^10-1) */ Fp51MultiSquare(&a6, &a4, &a7, 4); // (2 * 2) ^ 4 /* a^(2^100-1) = a^(2^100-2^50) * a^(2^50-1) */ Fp51MultiSquare(&a7, &a7, &a8, 24); // (2 * 2) ^ 24 /* a^(2^200-1) = a^(2^200-2^100) * a^(2^100-1) */ Fp51MultiSquare(&a8, &a8, &a9, 49); // (2 * 2) ^ 49 /* a^(2^250-1) = a^(2^250-2^50) * a^(2^50-1) */ Fp51MultiSquare(&a9, &a7, &a10, 24); // (2 * 2) ^ 24 /* a^(2^5*(2^250-1)) = (a^(2^250-1))^5 */ Fp51Square(&temp1, &a10); Fp51Square(&temp2, &temp1); Fp51Square(&temp1, &temp2); Fp51Square(&temp2, &temp1); Fp51Square(&temp1, &temp2); /* The output: a^(2^255-21) = a(2^5*(2^250-1)+11) = a^(2^5*(2^250-1)) * a^11 */ Fp51Mul(out, &a2, &temp1); } void ScalarMultiPoint(uint8_t out[32], const uint8_t scalar[32], const uint8_t point[32]) { uint8_t k[32]; const uint8_t *u = point; int32_t t; uint32_t swap; uint32_t kTemp; Fp51 x1, x2, x3; Fp51 z2, z3; Fp51 t1, t2; /* Decord the scalar into k */ CURVE25519_DECODE_LITTLE_ENDIAN(k, scalar); /* Reference RFC 7748 section 5: The constant a24 is (486662 - 2) / 4 = 121665 for curve25519/X25519 */ Fp51DataToPoly(&x1, u); CURVE25519_FP51_SET(x2.data, 1); CURVE25519_FP51_SET(z2.data, 0); CURVE25519_FP51_COPY(x3.data, x1.data); CURVE25519_FP51_SET(z3.data, 1); swap = 0; /* "bits" parameter set to 255 for x25519 */ /* For t = bits-1(254) down to 0: */ for (t = 254; t >= 0; t--) { /* t >> 3: calculation the index of bit; t & 7: Obtains the corresponding bit in the byte */ kTemp = (k[(uint32_t)t >> 3] >> ((uint32_t)t & 7)) & 1; /* kTemp = (k >> t) & 1 */ swap ^= kTemp; /* swap ^= kTemp */ CURVE25519_FP51_CSWAP(swap, x2.data, x3.data); /* (x_2, x_3) = cswap(swap, x_2, x_3) */ CURVE25519_FP51_CSWAP(swap, z2.data, z3.data); /* (z_2, z_3) = cswap(swap, z_2, z_3) */ swap = kTemp; /* swap = kTemp */ CURVE25519_FP51_SUB(t1.data, x3.data, z3.data); /* x3 = D */ CURVE25519_FP51_SUB(t2.data, x2.data, z2.data); /* t2 = B */ CURVE25519_FP51_ADD(x2.data, x2.data, z2.data); /* t1 = A */ CURVE25519_FP51_ADD(z2.data, x3.data, z3.data); /* x2 = C */ Fp51Mul(&z3, &t1, &x2); Fp51Mul(&z2, &z2, &t2); Fp51Square(&t1, &t2); Fp51Square(&t2, &x2); CURVE25519_FP51_ADD(x3.data, z3.data, z2.data); CURVE25519_FP51_SUB(z2.data, z3.data, z2.data); Fp51Mul(&x2, &t2, &t1); CURVE25519_FP51_SUB(t2.data, t2.data, t1.data); Fp51Square(&z2, &z2); Fp51MulScalar(&z3, &t2, 121666); // z2 *= 121665 + 1 = 121666 Fp51Square(&x3, &x3); CURVE25519_FP51_ADD(t1.data, t1.data, z3.data); Fp51Mul(&z3, &x1, &z2); Fp51Mul(&z2, &t2, &t1); } CURVE25519_FP51_CSWAP(swap, x2.data, x3.data); CURVE25519_FP51_CSWAP(swap, z2.data, z3.data); /* Return x2 * (z2 ^ (p - 2)) */ Fp51Invert(&t1, &z2); Fp51Mul(&t2, &x2, &t1); Fp51PolyToData(&t2, out); BSL_SAL_CleanseData(k, sizeof(k)); } #else void FpMulScalar(Fp25 out, const Fp25 p, const int32_t scalar) { int64_t s = (int64_t)scalar; uint64_t over; uint64_t result[10]; uint64_t mul19; uint64_t t1; uint64_t signMask1; uint64_t signMask2; /* Could be more than 32 bits but not be more than 64 bits */ CURVE25519_FP_MUL_SCALAR(result, p, s); /* Process Carry */ /* the radix 2^25.5 representation: * f0+2^26*f1+2^51*f2+2^77*f3+2^102*f4+2^128*f5+2^153*f6+2^179*f7+2^204*f8+2^230*f9 */ over = result[9] + (1 << 24); /* carry chain: index 9->0; 2^25 progressiv, left shift by 24 bits */ signMask1 = MASK_HIGH64(25) & (-((over) >> 63)); /* 2^25 progressiv, shift 63 for sign */ t1 = (over >> 25) | signMask1; mul19 = (t1 + (t1 << 1) + (t1 << 4)); /* 19 = 1 + 2^1 + 2^4 */ result[0] += mul19; /* carry chain: index 9->0 */ result[9] -= CURVE25519_MASK_HIGH_39 & over; /* carry chain: index 1->2; 2^25 progressiv(26->51) */ /* carry chain: index 1->2; 2^25 progressiv, left shift by 24 bits */ PROCESS_CARRY(result[1], result[2], signMask1, over, 24); /* carry chain: index 3->4; 2^25 progressiv(77->102) */ /* carry chain: index 3->4; 2^25 progressiv, left shift by 24 bits */ PROCESS_CARRY(result[3], result[4], signMask1, over, 24); /* carry chain: index 5->6; 2^25 progressiv(128->153) */ /* carry chain: index 5->6; 2^25 progressiv, left shift by 24 bits */ PROCESS_CARRY(result[5], result[6], signMask1, over, 24); /* carry chain: index 7->8; 2^25 progressiv(179->204) */ /* carry chain: index 7->8; 2^25 progressiv, left shift by 24 bits */ PROCESS_CARRY(result[7], result[8], signMask1, over, 24); /* carry chain: index 0->1; 2^26 progressiv(0->26) */ /* carry chain: index 0->1; 2^26 progressiv, left shift by 25 bits */ PROCESS_CARRY(result[0], result[1], signMask2, over, 25); /* carry chain: index 2->3; 2^26 progressiv(51->77) */ /* carry chain: index 2->3; 2^26 progressiv, left shift by 25 bits */ PROCESS_CARRY(result[2], result[3], signMask2, over, 25); /* carry chain: index 4->5; 2^26 progressiv(102->128) */ /* carry chain: index 4->5; 2^26 progressiv, left shift by 25 bits */ PROCESS_CARRY(result[4], result[5], signMask2, over, 25); /* carry chain: index 6->7; 2^26 progressiv(153->179) */ /* carry chain: index 6->7; 2^26 progressiv, left shift by 25 bits */ PROCESS_CARRY(result[6], result[7], signMask2, over, 25); /* carry chain: index 8->9; 2^26 progressiv(204->230) */ /* carry chain: index 8->9; 2^26 progressiv, left shift by 25 bits */ PROCESS_CARRY(result[8], result[9], signMask2, over, 25); /* The result would not be more than 32 bits */ out[0] = (int32_t)result[0]; // 0 out[1] = (int32_t)result[1]; // 1 out[2] = (int32_t)result[2]; // 2 out[3] = (int32_t)result[3]; // 3 out[4] = (int32_t)result[4]; // 4 out[5] = (int32_t)result[5]; // 5 out[6] = (int32_t)result[6]; // 6 out[7] = (int32_t)result[7]; // 7 out[8] = (int32_t)result[8]; // 8 out[9] = (int32_t)result[9]; // 9 (void)memset_s(result, sizeof(result), 0, sizeof(result)); } void ScalarMultiPoint(uint8_t out[32], const uint8_t scalar[32], const uint8_t point[32]) { uint8_t k[32]; const uint8_t *u = point; int32_t t; uint32_t swap; uint32_t kTemp; Fp25 x1, x2, x3, z2, z3, t1, t2, t3; /* Decord the scalar into k */ CURVE25519_DECODE_LITTLE_ENDIAN(k, scalar); /* Reference RFC 7748 section 5:The constant a24 is (486662 - 2) / 4 = 121665 for curve25519/X25519 */ DataToPolynomial(x1, u); CURVE25519_FP_SET(x2, 1); CURVE25519_FP_SET(z2, 0); CURVE25519_FP_COPY(x3, x1); CURVE25519_FP_SET(z3, 1); swap = 0; /* "bits" parameter set to 255 for x25519 */ /* For t = bits-1(254) down to 0: */ for (t = 254; t >= 0; t--) { /* t >> 3: calculation the index of bit; t & 7: Obtains the corresponding bit in the byte */ kTemp = (k[(uint32_t)t >> 3] >> ((uint32_t)t & 7)) & 1; /* kTemp = (k >> t) & 1 */ swap ^= kTemp; /* swap ^= kTemp */ CURVE25519_FP_CSWAP(swap, x2, x3); /* (x_2, x_3) = cswap(swap, x_2, x_3) */ CURVE25519_FP_CSWAP(swap, z2, z3); /* (z_2, z_3) = cswap(swap, z_2, z_3) */ swap = kTemp; /* swap = kTemp */ CURVE25519_FP_ADD(t1, x2, z2); /* t1 = A */ CURVE25519_FP_SUB(t2, x2, z2); /* t2 = B */ CURVE25519_FP_ADD(x2, x3, z3); /* x2 = C */ CURVE25519_FP_SUB(x3, x3, z3); /* x3 = D */ FpMul(z2, x3, t1); /* z2 = DA */ FpMul(z3, x2, t2); /* z3 = CB */ FpSquareDoubleCore(t1, t1, false); /* t1 = AA */ FpSquareDoubleCore(t2, t2, false); /* t2 = BB */ CURVE25519_FP_SUB(t3, t1, t2); /* t3 = E = AA - BB */ CURVE25519_FP_ADD(x3, z2, z3); /* x3 = DA + CB */ FpSquareDoubleCore(x3, x3, false); /* x3 = (DA + CB)^2 */ CURVE25519_FP_SUB(z3, z2, z3); /* z3 = DA - CB */ FpSquareDoubleCore(z3, z3, false); /* z3 = (DA - CB)^2 */ FpMul(z3, x1, z3); /* z3 = x1 * (DA - CB)^2 */ FpMul(x2, t1, t2); /* x2 = AA * BB */ FpMul(t1, t3, t1); /* t1 = E * AA */ FpSquareDoubleCore(z2, t3, false); /* z2 = E^2 */ /* Reference RFC 7748 section 5:The constant a24 is (486662 - 2) / 4 = 121665 for curve25519/X25519 */ FpMulScalar(z2, z2, 121665); /* z2 = a24 * E^2 */ CURVE25519_FP_ADD(z2, t1, z2); /* z2 = E * (AA + a24 * E) */ } CURVE25519_FP_CSWAP(swap, x2, x3); CURVE25519_FP_CSWAP(swap, z2, z3); /* Return x2 * (z2 ^ (p - 2)) */ FpInvert(t1, z2); FpMul(t2, x2, t1); PolynomialToData(out, t2); } #endif // uint128 #endif /* HITLS_CRYPTO_X25519 */
2401_83913325/openHiTLS-examples_7925
crypto/curve25519/src/noasm_curve25519_fp51_ops.c
C
unknown
20,251
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef X25519_ASM_H #define X25519_ASM_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_X25519 #include "curve25519_local.h" #ifdef __cplusplus extern "C" { #endif /** * Function description: out = f * g (mod p), p = 2 ^ 255 - 19, which is the modulus of curve25519 field. * Function prototype: void Fp51Mul(Fp51 *out, const Fp51 *f, const Fp51 *g); * Input register: rdi: out; rsi: f; rdx: g; fp51 is an array of [u64; 5]. * rdi: out, array pointer of output parameter fp51. * rsi: pointer f of the input source data fp51 array. * rdx: pointer g of the input source data fp51 array. * Modify the register as follows: rax, rbx, rcx, rdx, rsp, rbp, rsi, rdi, r8-r15. * Output register: None * Function/Macro Call: None */ void Fp51Mul(Fp51 *out, const Fp51 *f, const Fp51 *g); /** * Function description: out = f ^ 2 (mod p), p = 2 ^ 255 - 19, which is the modulus of curve25519 field. * Function prototype: void Fp51Square(Fp51 *out, const Fp51 *f); * Input register: rdi: out; rsi: f; fp51 is an array of [u64; 5] * rdi: out, array pointer of output parameter fp51. * rsi: pointer f of the input source data fp51 array. * Modify the register as follows: rax, rbx, rcx, rdx, rsp, rbp, rsi, rdi, r8-r15. * Output register: None * Function/Macro Call: None */ void Fp51Square(Fp51 *out, const Fp51 *f); /** * Function description: out = f * 121666 (mod p), p = 2 ^ 255 - 19, which is the modulus of curve25519 field. * Function prototype: void Fp51MulScalar(Fp51 *out, const Fp51 *f, const uint32_t scalar); * Input register: rdi: out; rsi: f; fp51 is an array of [u64; 5] * rdi: out, array pointer of output parameter fp51. * rsi: pointer f of the input source data fp51 array. * Modify the register as follows: rax, rbx, rcx, rdx, rsp, rbp, rsi, rdi, r8-r15. * Output register: None * Function/Macro Call: None */ void Fp51MulScalar(Fp51 *out, const Fp51 *in); #ifdef HITLS_CRYPTO_X25519_X8664 typedef uint64_t Fp64[4]; /** * Function description: out = f * g (mod p), p = 2 ^ 255 - 19, which is the modulus of curve25519 field. * Function prototype: void Fp64Mul(Fp64 h, const Fp64 f, const Fp64 g); * Input register: rdi: out; rsi: f; rdx: g; Fp64 is an array of [u64; 4]. * rdi: out, array pointer of output parameter Fp64. * rsi: pointer f of the input source data Fp64 array. * rdx: pointer g of the input source data Fp64 array. * Modify the register as follows: rax, rbx, rcx, rdx, rsp, rbp, rsi, rdi, r8-r15. * Output register: None * Function/Macro Call: None */ void Fp64Mul(Fp64 out, const Fp64 f, const Fp64 g); /** * Function description: out = f ^ 2 (mod p), p = 2 ^ 255 - 19, which is the modulus of curve25519 field. * Function prototype: void Fp64Sqr(Fp64 h, const Fp64 f); * Input register: rdi: out; rsi: f; Fp64 is an array of [u64; 4] * rdi: out, array pointer of output parameter Fp64. * rsi: pointer f of the input source data Fp64 array. * Modify the register as follows: rax, rbx, rcx, rdx, rsp, rbp, rsi, rdi, r8-r15. * Output register: None * Function/Macro Call: None */ void Fp64Sqr(Fp64 out, const Fp64 f); /** * Function description: out = f * 121666 (mod p), p = 2 ^ 255 - 19, which is the modulus of curve25519 field. * Function prototype: void Fp64MulScalar(Fp64 h, Fp64 f); * Input register: rdi: out; rsi: f; Fp64 is an array of [u64; 4] * rdi: out, array pointer of output parameter Fp64. * rsi: pointer f of the input source data Fp64 array. * Modify the register as follows: rax, rbx, rcx, rdx, rsp, rbp, rsi, rdi, r8-r15. * Output register: None * Function/Macro Call: None */ void Fp64MulScalar(Fp64 out, Fp64 f); /** * Function description: out = f + g (mod p), p = 2 ^ 255 - 19, which is the modulus of curve25519 field. * Function prototype: void Fp64Add(Fp64 h, const Fp64 f, const Fp64 g); * Input register: rdi: out; rsi: f; Fp64 is an array of [u64; 4] * rdi: out, array pointer of output parameter Fp64. * rsi: pointer f of the input source data Fp64 array. * rdx: pointer g of the input source data Fp64 array. * Modify the register as follows: rax, rcx, r8-r11. * Output register: None * Function/Macro Call: None */ void Fp64Add(Fp64 out, const Fp64 f, const Fp64 g); /** * Function description: out = f - g (mod p), p = 2 ^ 255 - 19, which is the modulus of curve25519 field. * Function prototype: void Fp64Sub(Fp64 h, const Fp64 f, const Fp64 g); * Input register: rdi: out; rsi: f; Fp64 is an array of [u64; 4] * rdi: out, array pointer of output parameter Fp64. * rsi: pointer f of the input source data Fp64 array. * rdx: pointer g of the input source data Fp64 array. * Modify the register as follows: rax, rcx, r8-r11. * Output register: None * Function/Macro Call: None */ void Fp64Sub(Fp64 out, const Fp64 f, const Fp64 g); /** * Function description: data conversion. * Function prototype: void Fp64PolyToData(uint8_t *out, const Fp64 f); * Input register: rdi: out; rsi: f; Fp64 is an array of [u64; 4] * rdi: out, array pointer of output parameter Fp64. * rsi: pointer f of the input source data Fp64 array. * Modify the register as follows: rax, rcx, r8-r11. * Output register: None * Function/Macro Call: None */ void Fp64PolyToData(uint8_t *out, const Fp64 f); #endif #ifdef __cplusplus } #endif #endif /* HITLS_CRYPTO_X25519 */ #endif // X25519_ASM_H
2401_83913325/openHiTLS-examples_7925
crypto/curve25519/src/x25519_asm.h
C
unknown
6,217
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_DH_H #define CRYPT_DH_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_DH #include <stdint.h> #include "crypt_types.h" #include "crypt_algid.h" #include "bsl_params.h" #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ #ifndef CRYPT_DH_TRY_CNT_MAX #define CRYPT_DH_TRY_CNT_MAX 100 #endif /* DH key parameter */ typedef struct DH_Para CRYPT_DH_Para; /* DH key context */ typedef struct DH_Ctx CRYPT_DH_Ctx; /** * @ingroup dh * @brief dh Allocate the context of dh. * * @retval (CRYPT_DH_Ctx *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_DH_Ctx *CRYPT_DH_NewCtx(void); /** * @ingroup dh * @brief dh Allocate the context of dh. * * @param libCtx [IN] Library context * * @retval (CRYPT_DH_Ctx *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_DH_Ctx *CRYPT_DH_NewCtxEx(void *libCtx); /** * @ingroup dh * @brief Copy the DH context. After the duplicated context is used up, call CRYPT_DH_FreeCtx to release the memory. * * @param ctx [IN] Source DH context * * @return CRYPT_DH_Ctx DH context pointer * If the operation fails, null is returned. */ CRYPT_DH_Ctx *CRYPT_DH_DupCtx(CRYPT_DH_Ctx *ctx); /** * @ingroup dh * @brief dh Release context structure of dh key * * @param ctx [IN] Indicates the pointer to the context structure to be released. The ctx is set NULL by the invoker. */ void CRYPT_DH_FreeCtx(CRYPT_DH_Ctx *ctx); /** * @ingroup dh * @brief dh Allocate key parameter structure space * * @param para [IN] DH External parameter * * @retval (CRYPT_DH_Para *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_DH_Para *CRYPT_DH_NewPara(const CRYPT_DhPara *para); /** * @ingroup dh * @brief Release dh key parameter structure * * @param para [IN] Pointer to the key parameter structure to be released. The parameter is set NULL by the invoker. */ void CRYPT_DH_FreePara(CRYPT_DH_Para *dhPara); /** * @ingroup dh * @brief Set the data of the key parameter structure to the key structure. * * @param ctx [IN] Key structure for setting related parameters. The key specification is 1024-8192 bits. * @param para [IN] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DH_PARA_ERROR The key parameter data is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Internal Memory Allocation Error * @retval BN error code: An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DH_SetPara(CRYPT_DH_Ctx *ctx, const CRYPT_DhPara *para); /** * @ingroup dh * @brief Obtain the key structure parameters. * * @param ctx [IN] Key structure * @param para [OUT] Obtained key parameter. * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DH_PARA_ERROR The key parameter data is incorrect. * @retval BN error code: An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DH_GetPara(const CRYPT_DH_Ctx *ctx, CRYPT_DhPara *para); /** * @ingroup dh * @brief Set a parameter based on the parameter ID. * * @param id [IN] Parameter ID * * @retval (CRYPT_DH_Para *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_DH_Para *CRYPT_DH_NewParaById(CRYPT_PKEY_ParaId id); /** * @ingroup dh * @brief Obtain the parameter ID. * * @param ctx [IN] Key structure * * @retval ID. If the context is invalid, CRYPT_PKEY_PARAID_MAX is returned. */ CRYPT_PKEY_ParaId CRYPT_DH_GetParaId(const CRYPT_DH_Ctx *ctx); /** * @ingroup dh * @brief Obtain the valid length of the key. * * @param ctx [IN] Structure from which the key length is expected to be obtained * * @retval 0 The input is incorrect or the corresponding key structure does not have a valid key length. * @retval uint32_t Valid key length */ uint32_t CRYPT_DH_GetBits(const CRYPT_DH_Ctx *ctx); /** * @ingroup dh * @brief Generate the DH key pair. * * @param ctx [IN] dh Context structure * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_PARA_ERROR The key parameter data is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval CRYPT_DH_RAND_GENRATE_ERROR Unable to generate results within the specified number of attempts * @retval BN error code: An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS The key pair is successfully generated. */ int32_t CRYPT_DH_Gen(CRYPT_DH_Ctx *ctx); /** * @ingroup dh * @brief DH key exchange * * @param ctx [IN] dh Context structure * @param pubKey [IN] Public key data * @param shareKey [OUT] Shared key * @param shareKeyLen [IN/OUT] The input parameter is the length of the shareKey, * and the output parameter is the valid length of the shareKey. * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Key exchange succeeded. */ int32_t CRYPT_DH_ComputeShareKey(const CRYPT_DH_Ctx *ctx, const CRYPT_DH_Ctx *pubKey, uint8_t *shareKey, uint32_t *shareKeyLen); /** * @ingroup dh * @brief DH Set the private key. * * @param ctx [OUT] dh Context structure * @param prv [IN] Private key * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_PARA_ERROR The key parameter is incorrect. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DH_SetPrvKey(CRYPT_DH_Ctx *ctx, const CRYPT_DhPrv *prv); /** * @ingroup dh * @brief DH Set the public key data. * * @param ctx [OUT] dh Context structure * @param pub [IN] Public key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_DH_PARA_ERROR The key parameter data is incorrect. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DH_SetPubKey(CRYPT_DH_Ctx *ctx, const CRYPT_DhPub *pub); /** * @ingroup dh * @brief DH Obtain the private key data. * * @param ctx [IN] dh Context structure * @param prv [OUT] Private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS obtained successfully. */ int32_t CRYPT_DH_GetPrvKey(const CRYPT_DH_Ctx *ctx, CRYPT_DhPrv *prv); /** * @ingroup dh * @brief DH Obtain the public key data. * * @param ctx [IN] dh Context structure * @param pub [OUT] Public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_DH_GetPubKey(const CRYPT_DH_Ctx *ctx, CRYPT_DhPub *pub); #ifdef HITLS_BSL_PARAMS /** * @ingroup dh * @brief DH Set the private key. * * @param ctx [OUT] dh Context structure * @param para [IN] Private key * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_PARA_ERROR The key parameter is incorrect. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DH_SetPrvKeyEx(CRYPT_DH_Ctx *ctx, const BSL_Param *para); /** * @ingroup dh * @brief DH Set the public key data. * * @param ctx [OUT] dh Context structure * @param para [IN] Public key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_DH_PARA_ERROR The key parameter data is incorrect. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DH_SetPubKeyEx(CRYPT_DH_Ctx *ctx, const BSL_Param *para); /** * @ingroup dh * @brief DH Obtain the private key data. * * @param ctx [IN] dh Context structure * @param para [OUT] Private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS obtained successfully. */ int32_t CRYPT_DH_GetPrvKeyEx(const CRYPT_DH_Ctx *ctx, BSL_Param *para); /** * @ingroup dh * @brief DH Obtain the public key data. * * @param ctx [IN] dh Context structure * @param para [OUT] Public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_DH_GetPubKeyEx(const CRYPT_DH_Ctx *ctx, BSL_Param *para); /** * @ingroup dh * @brief Set the data of the key parameter structure to the key structure. * * @param ctx [IN] Key structure for setting related parameters. The key specification is 1024-8192 bits. * @param para [IN] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DH_PARA_ERROR The key parameter data is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Internal Memory Allocation Error * @retval BN error code: An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DH_SetParaEx(CRYPT_DH_Ctx *ctx, const BSL_Param *para); /** * @ingroup dh * @brief Obtain the key structure parameters. * * @param ctx [IN] Key structure * @param para [OUT] Obtained key parameter. * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DH_PARA_ERROR The key parameter data is incorrect. * @retval BN error code: An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DH_GetParaEx(const CRYPT_DH_Ctx *ctx, BSL_Param *para); #endif /** * @ingroup dh * @brief dh Compare public keys and parameters * * @param a [IN] dh Context structure * @param b [IN] dh Context structure * * @return CRYPT_SUCCESS is the same * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_DH_KEYINFO_ERROR The key information is incorrect. * @retval CRYPT_DH_PUBKEY_NOT_EQUAL Public Keys are not equal * @retval CRYPT_DH_PARA_ERROR The parameter data is incorrect. * @retval CRYPT_DH_PARA_NOT_EQUAL The parameters are not equal. */ int32_t CRYPT_DH_Cmp(const CRYPT_DH_Ctx *a, const CRYPT_DH_Ctx *b); /** * @ingroup dh * @brief DH control interface * * @param ctx [IN] dh Context structure * @param opt [IN] Operation mode * @param val [IN] Parameter * @param len [IN] val length * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_SUCCESS obtained successfully. */ int32_t CRYPT_DH_Ctrl(CRYPT_DH_Ctx *ctx, int32_t opt, void *val, uint32_t len); /** * @ingroup dh * @brief dh get security bits * * @param ctx [IN] dh Context structure * * @retval security bits */ int32_t CRYPT_DH_GetSecBits(const CRYPT_DH_Ctx *ctx); #ifdef HITLS_CRYPTO_DH_CHECK /** * @ingroup dh * @brief check the key pair consistency * * @param checkType [IN] check type * @param pkey1 [IN] dh key context structure * @param pkey2 [IN] dh key context structure * * @retval CRYPT_SUCCESS check success. * Others. For details, see error code in errno. */ int32_t CRYPT_DH_Check(uint32_t checkType, const CRYPT_DH_Ctx *pkey1, const CRYPT_DH_Ctx *pkey2); #endif // HITLS_CRYPTO_DH_CHECK #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_DH #endif // CRYPT_DH_H
2401_83913325/openHiTLS-examples_7925
crypto/dh/include/crypt_dh.h
C
unknown
13,923
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_DH #include "crypt_errno.h" #include "securec.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_bn.h" #include "crypt_utils.h" #include "crypt_dh.h" #include "dh_local.h" #include "sal_atomic.h" #include "crypt_local_types.h" #include "crypt_params_key.h" CRYPT_DH_Ctx *CRYPT_DH_NewCtx(void) { CRYPT_DH_Ctx *ctx = BSL_SAL_Malloc(sizeof(CRYPT_DH_Ctx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(ctx, sizeof(CRYPT_DH_Ctx), 0, sizeof(CRYPT_DH_Ctx)); BSL_SAL_ReferencesInit(&(ctx->references)); return ctx; } CRYPT_DH_Ctx *CRYPT_DH_NewCtxEx(void *libCtx) { CRYPT_DH_Ctx *ctx = CRYPT_DH_NewCtx(); if (ctx == NULL) { return NULL; } ctx->libCtx = libCtx; return ctx; } static CRYPT_DH_Para *ParaMemGet(uint32_t bits) { CRYPT_DH_Para *para = BSL_SAL_Calloc(1u, sizeof(CRYPT_DH_Para)); if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } para->p = BN_Create(bits); para->g = BN_Create(bits); para->id = CRYPT_PKEY_PARAID_MAX; if (para->p == NULL || para->g == NULL) { CRYPT_DH_FreePara(para); BSL_ERR_PUSH_ERROR(CRYPT_DH_CREATE_PARA_FAIL); return NULL; } return para; } static int32_t NewParaCheck(const CRYPT_DhPara *para) { if (para == NULL || para->p == NULL || para->g == NULL || para->pLen == 0 || para->gLen == 0 || (para->q == NULL && para->qLen != 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->pLen > BN_BITS_TO_BYTES(DH_MAX_PBITS)) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } if (para->gLen > para->pLen) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } if (para->q == NULL) { return CRYPT_SUCCESS; } if (para->qLen > para->pLen) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } return CRYPT_SUCCESS; } CRYPT_DH_Para *CRYPT_DH_NewPara(const CRYPT_DhPara *para) { if (NewParaCheck(para) != CRYPT_SUCCESS) { return NULL; } uint32_t modBits = BN_BYTES_TO_BITS(para->pLen); CRYPT_DH_Para *retPara = ParaMemGet(modBits); if (retPara == NULL) { return NULL; } int32_t ret = BN_Bin2Bn(retPara->p, para->p, para->pLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = BN_Bin2Bn(retPara->g, para->g, para->gLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } if (para->q == NULL) { return retPara; // The parameter q does not exist, this function is ended early. } retPara->q = BN_Create(modBits); if (retPara->q == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_CREATE_PARA_FAIL); goto ERR; } ret = BN_Bin2Bn(retPara->q, para->q, para->qLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } retPara->id = CRYPT_PKEY_PARAID_MAX; // No ID is passed in this function. Assign a invalid ID temporarily. return retPara; ERR: CRYPT_DH_FreePara(retPara); return NULL; } void CRYPT_DH_FreePara(CRYPT_DH_Para *dhPara) { if (dhPara == NULL) { return; } BN_Destroy(dhPara->p); BN_Destroy(dhPara->q); BN_Destroy(dhPara->g); BSL_SAL_FREE(dhPara); } void CRYPT_DH_FreeCtx(CRYPT_DH_Ctx *ctx) { if (ctx == NULL) { return; } int val = 0; BSL_SAL_AtomicDownReferences(&(ctx->references), &val); if (val > 0) { return; } CRYPT_DH_FreePara(ctx->para); BN_Destroy(ctx->x); BN_Destroy(ctx->y); BSL_SAL_ReferencesFree(&(ctx->references)); BSL_SAL_FREE(ctx); } static int32_t ParaQCheck(BN_BigNum *q, BN_BigNum *r) { // 1. Determine the length. if (BN_Bits(q) < DH_MIN_QBITS) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } // 2. Parity and even judgment if (BN_GetBit(q, 0) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } // 3. Compare q and r. if (BN_Cmp(q, r) >= 0) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } // 4. Check the pq multiple relationship. BN_Optimizer *opt = BN_OptimizerCreate(); if (opt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = BN_Div(NULL, r, r, q, opt); BN_OptimizerDestroy(opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } // (p - 1) % q == 0 if (!BN_IsZero(r)) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } return CRYPT_SUCCESS; } static int32_t ParaDataCheck(const CRYPT_DH_Para *para) { int32_t ret; const BN_BigNum *p = para->p; const BN_BigNum *g = para->g; // 1. Determine the length. uint32_t pBits = BN_Bits(p); if (pBits < DH_MIN_PBITS || pBits > DH_MAX_PBITS) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } // 2. P parity and g value judgment // p is an odd number if (BN_GetBit(p, 0) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } // g != 0 && g != 1 if (BN_IsZero(g) || BN_IsOne(g)) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } BN_BigNum *r = BN_Create(pBits + 1); if (r == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } // r = p - 1 ret = BN_SubLimb(r, p, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // g < p - 1 if (BN_Cmp(g, r) >= 0) { ret = CRYPT_DH_PARA_ERROR; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (para->q != NULL) { ret = ParaQCheck(para->q, r); } EXIT: BN_Destroy(r); return ret; } static CRYPT_DH_Para *ParaDup(const CRYPT_DH_Para *para) { CRYPT_DH_Para *ret = BSL_SAL_Malloc(sizeof(CRYPT_DH_Para)); if (ret == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } ret->p = BN_Dup(para->p); ret->q = BN_Dup(para->q); ret->g = BN_Dup(para->g); ret->id = para->id; if (ret->p == NULL || ret->g == NULL) { CRYPT_DH_FreePara(ret); BSL_ERR_PUSH_ERROR(CRYPT_DH_CREATE_PARA_FAIL); return NULL; } if (para->q != NULL && ret->q == NULL) { CRYPT_DH_FreePara(ret); BSL_ERR_PUSH_ERROR(CRYPT_DH_CREATE_PARA_FAIL); return NULL; } return ret; } CRYPT_DH_Ctx *CRYPT_DH_DupCtx(CRYPT_DH_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } CRYPT_DH_Ctx *newKeyCtx = BSL_SAL_Calloc(1, sizeof(CRYPT_DH_Ctx)); if (newKeyCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } // If x, y and para is not empty, copy the value. GOTO_ERR_IF_SRC_NOT_NULL(newKeyCtx->x, ctx->x, BN_Dup(ctx->x), CRYPT_MEM_ALLOC_FAIL); GOTO_ERR_IF_SRC_NOT_NULL(newKeyCtx->y, ctx->y, BN_Dup(ctx->y), CRYPT_MEM_ALLOC_FAIL); GOTO_ERR_IF_SRC_NOT_NULL(newKeyCtx->para, ctx->para, ParaDup(ctx->para), CRYPT_MEM_ALLOC_FAIL); newKeyCtx->libCtx = ctx->libCtx; BSL_SAL_ReferencesInit(&(newKeyCtx->references)); return newKeyCtx; ERR: CRYPT_DH_FreeCtx(newKeyCtx); return NULL; } static int32_t DhSetPara(CRYPT_DH_Ctx *ctx, CRYPT_DH_Para *para) { int32_t ret = ParaDataCheck(para); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } BN_Destroy(ctx->x); BN_Destroy(ctx->y); CRYPT_DH_FreePara(ctx->para); ctx->x = NULL; ctx->y = NULL; ctx->para = para; return CRYPT_SUCCESS; } int32_t CRYPT_DH_SetPara(CRYPT_DH_Ctx *ctx, const CRYPT_DhPara *para) { if (ctx == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DH_Para *dhPara = CRYPT_DH_NewPara(para); if (dhPara == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_NEW_PARA_FAIL); return CRYPT_EAL_ERR_NEW_PARA_FAIL; } int32_t ret = DhSetPara(ctx, dhPara); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); CRYPT_DH_FreePara(dhPara); } return ret; } int32_t CRYPT_DH_GetPara(const CRYPT_DH_Ctx *ctx, CRYPT_DhPara *para) { if (ctx == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } int32_t ret = BN_Bn2Bin(ctx->para->p, para->p, &(para->pLen)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (ctx->para->q == NULL) { para->q = NULL; para->qLen = 0; } else { ret = BN_Bn2Bin(ctx->para->q, para->q, &(para->qLen)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } ret = BN_Bn2Bin(ctx->para->g, para->g, &(para->gLen)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t PubCheck(const BN_BigNum *y, const BN_BigNum *minP) { // y != 0, y != 1 if (BN_IsZero(y) || BN_IsOne(y)) { BSL_ERR_PUSH_ERROR(CRYPT_DH_KEYINFO_ERROR); return CRYPT_DH_KEYINFO_ERROR; } // y < p - 1 if (BN_Cmp(y, minP) >= 0) { BSL_ERR_PUSH_ERROR(CRYPT_DH_KEYINFO_ERROR); return CRYPT_DH_KEYINFO_ERROR; } return CRYPT_SUCCESS; } // Get p-2 or q-1 static int32_t GetXLimb(BN_BigNum *xLimb, const BN_BigNum *p, const BN_BigNum *q) { if (q != NULL) { // xLimb = q - 1 return BN_SubLimb(xLimb, q, 1); } // xLimb = p - 2 return BN_SubLimb(xLimb, p, 2); } static void RefreshCtx(CRYPT_DH_Ctx *dhCtx, BN_BigNum *x, BN_BigNum *y, int32_t ret) { if (ret == CRYPT_SUCCESS) { BN_Destroy(dhCtx->x); BN_Destroy(dhCtx->y); dhCtx->x = x; dhCtx->y = y; } else { BN_Destroy(x); BN_Destroy(y); } } /* SP800-56Ar3 5_6_1_1_4 Key-Pair Generation by Testing Candidates */ static int32_t DH_GenSp80056ATestCandidates(CRYPT_DH_Ctx *ctx) { int32_t ret; uint32_t bits = BN_Bits(ctx->para->p); uint32_t qbits = BN_Bits(ctx->para->q); /* If s is not the maximum security strength that can be support by (p, q, g), then return an error. */ uint32_t s = (uint32_t)CRYPT_DH_GetSecBits(ctx); if (bits == 0 || qbits == 0 || s == 0) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } /* 2*s <= n <= len(q), set n = 2*s */ uint32_t n = 2 * s; BN_BigNum *x = BN_Create(bits); BN_BigNum *y = BN_Create(bits); BN_BigNum *twoPowN = BN_Create(n); BN_Mont *mont = BN_MontCreate(ctx->para->p); BN_BigNum *m = ctx->para->q; BN_Optimizer *opt = BN_OptimizerCreate(); if (x == NULL || y == NULL || mont == NULL || opt == NULL || twoPowN == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto ERR; } ret = BN_SetLimb(twoPowN, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = BN_Lshift(twoPowN, twoPowN, n); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } /* Set M = min(2^N, q), the minimum of 2^N and q. */ if (BN_Cmp(twoPowN, m) < 0) { m = twoPowN; } for (int32_t cnt = 0; cnt < CRYPT_DH_TRY_CNT_MAX; cnt++) { /* c in the interval [0, 2N - 1] */ ret = BN_RandRangeEx(ctx->libCtx, x, twoPowN); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } /* x = c + 1 */ ret = BN_AddLimb(x, x, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } /* If c > M - 2, (i.e. c + 1 >= M) continue */ if (BN_Cmp(x, m) >= 0) { continue; } ret = BN_MontExpConsttime(y, ctx->para->g, x, mont, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } goto ERR; // The function exits successfully. } ret = CRYPT_DH_RAND_GENERATE_ERROR; BSL_ERR_PUSH_ERROR(ret); ERR: RefreshCtx(ctx, x, y, ret); BN_Destroy(twoPowN); BN_MontDestroy(mont); BN_OptimizerDestroy(opt); return ret; } static int32_t DH_GenSp80056ASafePrime(CRYPT_DH_Ctx *ctx) { int32_t ret; uint32_t bits = BN_Bits(ctx->para->p); BN_BigNum *x = BN_Create(bits); BN_BigNum *y = BN_Create(bits); BN_BigNum *minP = BN_Create(bits); BN_BigNum *xLimb = BN_Create(bits); BN_Mont *mont = BN_MontCreate(ctx->para->p); BN_Optimizer *opt = BN_OptimizerCreate(); if (x == NULL || y == NULL || minP == NULL || xLimb == NULL || mont == NULL || opt == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_SubLimb(minP, ctx->para->p, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = GetXLimb(xLimb, ctx->para->p, ctx->para->q); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } for (int32_t cnt = 0; cnt < CRYPT_DH_TRY_CNT_MAX; cnt++) { /* Generate private key x for [1, q-1] or [1, p-2] */ ret = BN_RandRangeEx(ctx->libCtx, x, xLimb); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_AddLimb(x, x, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } /* Calculate the public key y. */ ret = BN_MontExpConsttime(y, ctx->para->g, x, mont, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } /* Check whether the public key meets the requirements. If not, try to generate the key again. */ // y != 0, y != 1, y < p - 1 if (BN_IsZero(y) || BN_IsOne(y) || BN_Cmp(y, minP) >= 0) { continue; } goto EXIT; // The function exits successfully. } ret = CRYPT_DH_RAND_GENERATE_ERROR; BSL_ERR_PUSH_ERROR(ret); EXIT: RefreshCtx(ctx, x, y, ret); BN_Destroy(minP); BN_Destroy(xLimb); BN_MontDestroy(mont); BN_OptimizerDestroy(opt); return ret; } int32_t CRYPT_DH_Gen(CRYPT_DH_Ctx *ctx) { if (ctx == NULL || ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } int32_t s = CRYPT_DH_GetSecBits(ctx); if (ctx->para->q != NULL && s != 0) { return DH_GenSp80056ATestCandidates(ctx); } return DH_GenSp80056ASafePrime(ctx); } static int32_t ComputeShareKeyInputCheck(const CRYPT_DH_Ctx *ctx, const CRYPT_DH_Ctx *pubKey, const uint8_t *shareKey, const uint32_t *shareKeyLen) { if (ctx == NULL || pubKey == NULL || shareKey == NULL || shareKeyLen == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } if (ctx->x == NULL || pubKey->y == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_KEYINFO_ERROR); return CRYPT_DH_KEYINFO_ERROR; } if (BN_Bytes(ctx->para->p) > *shareKeyLen) { BSL_ERR_PUSH_ERROR(CRYPT_DH_BUFF_LEN_NOT_ENOUGH); return CRYPT_DH_BUFF_LEN_NOT_ENOUGH; } return CRYPT_SUCCESS; } static void CheckAndFillZero(uint8_t *shareKey, uint32_t *shareKeyLen, uint32_t bytes) { int32_t i; if (*shareKeyLen == bytes) { // (*shareKeyLen > bytes) is not possible return; } uint32_t fill = bytes - *shareKeyLen; for (i = (int32_t)*shareKeyLen - 1; i >= 0; i--) { shareKey[i + (int32_t)fill] = shareKey[i]; } for (i = 0; i < (int32_t)fill; i++) { shareKey[i] = 0; } *shareKeyLen = bytes; } int32_t CRYPT_DH_ComputeShareKey(const CRYPT_DH_Ctx *ctx, const CRYPT_DH_Ctx *pubKey, uint8_t *shareKey, uint32_t *shareKeyLen) { uint32_t bytes = 0; int32_t ret = ComputeShareKeyInputCheck(ctx, pubKey, shareKey, shareKeyLen); if (ret != CRYPT_SUCCESS) { return ret; } uint32_t bits = BN_Bits(ctx->para->p); BN_BigNum *tmp = BN_Create(bits); BN_Mont *mont = BN_MontCreate(ctx->para->p); BN_Optimizer *opt = BN_OptimizerCreate(); if (tmp == NULL || mont == NULL || opt == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_SubLimb(tmp, ctx->para->p, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } /* Check whether the public key meets the requirements. */ ret = PubCheck(pubKey->y, tmp); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_MontExpConsttime(tmp, pubKey->y, ctx->x, mont, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_Bn2Bin(tmp, shareKey, shareKeyLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // no need to filled zero in the leading. if ((ctx->flags & CRYPT_DH_NO_PADZERO) == 0) { bytes = BN_BITS_TO_BYTES(bits); CheckAndFillZero(shareKey, shareKeyLen, bytes); } EXIT: BN_Destroy(tmp); BN_MontDestroy(mont); BN_OptimizerDestroy(opt); return ret; } static int32_t PrvLenCheck(const CRYPT_DH_Ctx *ctx, const CRYPT_DhPrv *prv) { if (ctx->para->q != NULL) { if (BN_Bytes(ctx->para->q) < prv->len) { BSL_ERR_PUSH_ERROR(CRYPT_DH_KEYINFO_ERROR); return CRYPT_DH_KEYINFO_ERROR; } } else { if (BN_Bytes(ctx->para->p) < prv->len) { BSL_ERR_PUSH_ERROR(CRYPT_DH_KEYINFO_ERROR); return CRYPT_DH_KEYINFO_ERROR; } } return CRYPT_SUCCESS; } int32_t CRYPT_DH_SetPrvKey(CRYPT_DH_Ctx *ctx, const CRYPT_DhPrv *prv) { if (ctx == NULL || prv == NULL || prv->data == NULL || prv->len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } int32_t ret = PrvLenCheck(ctx, prv); if (ret != CRYPT_SUCCESS) { return ret; } BN_BigNum *bnX = BN_Create(BN_BYTES_TO_BITS(prv->len)); BN_BigNum *xLimb = BN_Create(BN_Bits(ctx->para->p) + 1); if (bnX == NULL || xLimb == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } GOTO_ERR_IF(GetXLimb(xLimb, ctx->para->p, ctx->para->q), ret); GOTO_ERR_IF(BN_Bin2Bn(bnX, prv->data, prv->len), ret); // Satisfy x <= q - 1 or x <= p - 2 if (BN_Cmp(bnX, xLimb) > 0) { ret = CRYPT_DH_KEYINFO_ERROR; BSL_ERR_PUSH_ERROR(ret); goto ERR; } // x != 0 if (BN_IsZero(bnX)) { ret = CRYPT_DH_KEYINFO_ERROR; BSL_ERR_PUSH_ERROR(ret); goto ERR; } BN_Destroy(xLimb); BN_Destroy(ctx->x); ctx->x = bnX; return ret; ERR: BN_Destroy(bnX); BN_Destroy(xLimb); return ret; } // No parameter information is required for setting the public key. // Therefore, the validity of the public key is not checked during the setting. // The validity of the public key is checked during the calculation of the shared key. int32_t CRYPT_DH_SetPubKey(CRYPT_DH_Ctx *ctx, const CRYPT_DhPub *pub) { if (ctx == NULL || pub == NULL || pub->data == NULL || pub->len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pub->len > BN_BITS_TO_BYTES(DH_MAX_PBITS)) { BSL_ERR_PUSH_ERROR(CRYPT_DH_KEYINFO_ERROR); return CRYPT_DH_KEYINFO_ERROR; } BN_BigNum *bnY = BN_Create(BN_BYTES_TO_BITS(pub->len)); if (bnY == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = BN_Bin2Bn(bnY, pub->data, pub->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } BN_Destroy(ctx->y); ctx->y = bnY; return ret; ERR: BN_Destroy(bnY); return ret; } int32_t CRYPT_DH_GetPrvKey(const CRYPT_DH_Ctx *ctx, CRYPT_DhPrv *prv) { if (ctx == NULL || prv == NULL || prv->data == NULL || prv->len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->x == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_KEYINFO_ERROR); return CRYPT_DH_KEYINFO_ERROR; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } if (ctx->para->q != NULL) { if (BN_Bytes(ctx->para->q) > prv->len) { BSL_ERR_PUSH_ERROR(CRYPT_DH_BUFF_LEN_NOT_ENOUGH); return CRYPT_DH_BUFF_LEN_NOT_ENOUGH; } } else { if (BN_Bytes(ctx->para->p) > prv->len) { BSL_ERR_PUSH_ERROR(CRYPT_DH_BUFF_LEN_NOT_ENOUGH); return CRYPT_DH_BUFF_LEN_NOT_ENOUGH; } } int32_t ret = BN_Bn2Bin(ctx->x, prv->data, &(prv->len)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t CRYPT_DH_GetPubKey(const CRYPT_DH_Ctx *ctx, CRYPT_DhPub *pub) { if (ctx == NULL || pub == NULL || pub->data == NULL || pub->len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL || ctx->para->p == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } if (ctx->y == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_KEYINFO_ERROR); return CRYPT_DH_KEYINFO_ERROR; } uint32_t pubLen = BN_Bytes(ctx->para->p); if (pubLen > pub->len) { BSL_ERR_PUSH_ERROR(CRYPT_DH_BUFF_LEN_NOT_ENOUGH); return CRYPT_DH_BUFF_LEN_NOT_ENOUGH; } // RFC 8446 requires the dh public value should be encoded as a big-endian integer and padded to // the left with zeros to the size of p in bytes. int32_t ret = BN_Bn2BinFixZero(ctx->y, pub->data, pubLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } pub->len = pubLen; return ret; } #ifdef HITLS_BSL_PARAMS int32_t CRYPT_DH_SetParaEx(CRYPT_DH_Ctx *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DhPara dhPara = {0}; (void)GetConstParamValue(para, CRYPT_PARAM_DH_P, &(dhPara.p), &(dhPara.pLen)); (void)GetConstParamValue(para, CRYPT_PARAM_DH_Q, &(dhPara.q), &(dhPara.qLen)); (void)GetConstParamValue(para, CRYPT_PARAM_DH_G, &(dhPara.g), &(dhPara.gLen)); return CRYPT_DH_SetPara(ctx, &dhPara); } int32_t CRYPT_DH_GetParaEx(const CRYPT_DH_Ctx *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DhPara dhPara = {0}; BSL_Param *paramP = GetParamValue(para, CRYPT_PARAM_DH_P, &(dhPara.p), &(dhPara.pLen)); BSL_Param *paramQ = GetParamValue(para, CRYPT_PARAM_DH_Q, &(dhPara.q), &(dhPara.qLen)); BSL_Param *paramG = GetParamValue(para, CRYPT_PARAM_DH_G, &(dhPara.g), &(dhPara.gLen)); int32_t ret = CRYPT_DH_GetPara(ctx, &dhPara); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } paramP->useLen = dhPara.pLen; paramQ->useLen = dhPara.qLen; paramG->useLen = dhPara.gLen; return CRYPT_SUCCESS; } int32_t CRYPT_DH_SetPrvKeyEx(CRYPT_DH_Ctx *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DhPrv prv = {0}; (void)GetConstParamValue(para, CRYPT_PARAM_DH_PRVKEY, &prv.data, &prv.len); return CRYPT_DH_SetPrvKey(ctx, &prv); } int32_t CRYPT_DH_SetPubKeyEx(CRYPT_DH_Ctx *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DhPub pub = {0}; if (GetConstParamValue(para, CRYPT_PARAM_DH_PUBKEY, &pub.data, &pub.len) == NULL) { (void)GetConstParamValue(para, CRYPT_PARAM_PKEY_ENCODE_PUBKEY, (uint8_t **)&pub.data, &pub.len); } return CRYPT_DH_SetPubKey(ctx, &pub); } int32_t CRYPT_DH_GetPrvKeyEx(const CRYPT_DH_Ctx *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DhPrv prv = {0}; BSL_Param *paramPrv = GetParamValue(para, CRYPT_PARAM_DH_PRVKEY, &prv.data, &(prv.len)); int32_t ret = CRYPT_DH_GetPrvKey(ctx, &prv); if (ret != CRYPT_SUCCESS) { return ret; } paramPrv->useLen = prv.len; return CRYPT_SUCCESS; } int32_t CRYPT_DH_GetPubKeyEx(const CRYPT_DH_Ctx *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DhPub pub = {0}; BSL_Param *paramPub = GetParamValue(para, CRYPT_PARAM_DH_PUBKEY, &pub.data, &(pub.len)); if (paramPub == NULL) { paramPub = GetParamValue(para, CRYPT_PARAM_PKEY_ENCODE_PUBKEY, &pub.data, &(pub.len)); } int32_t ret = CRYPT_DH_GetPubKey(ctx, &pub); if (ret != CRYPT_SUCCESS) { return ret; } paramPub->useLen = pub.len; return ret; } #endif uint32_t CRYPT_DH_GetBits(const CRYPT_DH_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } return BN_Bits(ctx->para->p); } static uint32_t CRYPT_DH_GetPrvKeyLen(const CRYPT_DH_Ctx *ctx) { return BN_Bytes(ctx->x); } static uint32_t CRYPT_DH_GetPubKeyLen(const CRYPT_DH_Ctx *ctx) { if (ctx->para != NULL) { return BN_Bytes(ctx->para->p); } if (ctx->y != NULL) { return BN_Bytes(ctx->y); } BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } static uint32_t CRYPT_DH_GetSharedKeyLen(const CRYPT_DH_Ctx *ctx) { if (ctx->para != NULL) { return BN_Bytes(ctx->para->p); } BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } #ifdef HITLS_CRYPTO_DH_CHECK static int32_t DhKeyPairCheck(const CRYPT_DH_Ctx *pub, const CRYPT_DH_Ctx *prv) { int32_t ret; if (prv == NULL || pub == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (prv->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } ret = CRYPT_FFC_KeyPairCheck(prv->x, pub->y, prv->para->p, prv->para->g); if (ret == CRYPT_PAIRWISE_CHECK_FAIL) { ret = CRYPT_DH_PAIRWISE_CHECK_FAIL; BSL_ERR_PUSH_ERROR(ret); } return ret; } /* * SP800-56a 5.6.2.1.2 * for check an FFC key pair. */ static int32_t DhPrvKeyCheck(const CRYPT_DH_Ctx *pkey) { if (pkey == NULL || pkey->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = CRYPT_FFC_PrvCheck(pkey->x, pkey->para->p, pkey->para->q); if (ret == CRYPT_INVALID_KEY) { ret = CRYPT_DH_INVALID_PRVKEY; BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t CRYPT_DH_Check(uint32_t checkType, const CRYPT_DH_Ctx *pkey1, const CRYPT_DH_Ctx *pkey2) { switch (checkType) { case CRYPT_PKEY_CHECK_KEYPAIR: return DhKeyPairCheck(pkey1, pkey2); case CRYPT_PKEY_CHECK_PRVKEY: return DhPrvKeyCheck(pkey1); default: BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } } #endif // HITLS_CRYPTO_DH_CHECK int32_t CRYPT_DH_Cmp(const CRYPT_DH_Ctx *a, const CRYPT_DH_Ctx *b) { RETURN_RET_IF(a == NULL || b == NULL, CRYPT_NULL_INPUT); RETURN_RET_IF(a->y == NULL || b->y == NULL, CRYPT_DH_KEYINFO_ERROR); RETURN_RET_IF(BN_Cmp(a->y, b->y) != 0, CRYPT_DH_PUBKEY_NOT_EQUAL); // para must be both null and non-null. RETURN_RET_IF((a->para == NULL) != (b->para == NULL), CRYPT_DH_PARA_ERROR); if (a->para != NULL) { RETURN_RET_IF(BN_Cmp(a->para->p, b->para->p) != 0 || BN_Cmp(a->para->q, b->para->q) != 0 || BN_Cmp(a->para->g, b->para->g) != 0, CRYPT_DH_PARA_NOT_EQUAL); } return CRYPT_SUCCESS; } int32_t CRYPT_DH_SetParamById(CRYPT_DH_Ctx *ctx, CRYPT_PKEY_ParaId id) { CRYPT_DH_Para *para = CRYPT_DH_NewParaById(id); if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_NEW_PARA_FAIL); return CRYPT_EAL_ERR_NEW_PARA_FAIL; } int32_t ret = DhSetPara(ctx, para); if (ret != CRYPT_SUCCESS) { CRYPT_DH_FreePara(para); } return ret; } static int32_t CRYPT_DH_GetLen(const CRYPT_DH_Ctx *ctx, GetLenFunc func, void *val, uint32_t len) { if (val == NULL || len != sizeof(int32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } *(int32_t *)val = func(ctx); return CRYPT_SUCCESS; } static int32_t CRYPT_DH_SetFlag(CRYPT_DH_Ctx *ctx, const void *val, uint32_t len) { if (val == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (len != sizeof(uint32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_DH_SET_FLAG_LEN_ERROR); return CRYPT_DH_SET_FLAG_LEN_ERROR; } uint32_t flag = *(const uint32_t *)val; if (flag == 0 || flag >= CRYPT_DH_MAXFLAG) { BSL_ERR_PUSH_ERROR(CRYPT_DH_FLAG_NOT_SUPPORT_ERROR); return CRYPT_DH_FLAG_NOT_SUPPORT_ERROR; } ctx->flags |= flag; return CRYPT_SUCCESS; } int32_t CRYPT_DH_Ctrl(CRYPT_DH_Ctx *ctx, int32_t opt, void *val, uint32_t len) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } switch (opt) { case CRYPT_CTRL_GET_PARAID: return CRYPT_DH_GetLen(ctx, (GetLenFunc)CRYPT_DH_GetParaId, val, len); case CRYPT_CTRL_GET_BITS: return CRYPT_DH_GetLen(ctx, (GetLenFunc)CRYPT_DH_GetBits, val, len); case CRYPT_CTRL_GET_SECBITS: return CRYPT_DH_GetLen(ctx, (GetLenFunc)CRYPT_DH_GetSecBits, val, len); case CRYPT_CTRL_GET_PUBKEY_LEN: return GetUintCtrl(ctx, val, len, (GetUintCallBack)CRYPT_DH_GetPubKeyLen); case CRYPT_CTRL_GET_PRVKEY_LEN: return GetUintCtrl(ctx, val, len, (GetUintCallBack)CRYPT_DH_GetPrvKeyLen); case CRYPT_CTRL_GET_SHARED_KEY_LEN: return GetUintCtrl(ctx, val, len, (GetUintCallBack)CRYPT_DH_GetSharedKeyLen); case CRYPT_CTRL_SET_PARA_BY_ID: return CRYPT_DH_SetParamById(ctx, *(CRYPT_PKEY_ParaId *)val); case CRYPT_CTRL_SET_DH_FLAG: return CRYPT_DH_SetFlag(ctx, val, len); case CRYPT_CTRL_UP_REFERENCES: if (val == NULL || len != (uint32_t)sizeof(int)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } return BSL_SAL_AtomicUpReferences(&(ctx->references), (int *)val); default: break; } BSL_ERR_PUSH_ERROR(CRYPT_DH_UNSUPPORTED_CTRL_OPTION); return CRYPT_DH_UNSUPPORTED_CTRL_OPTION; } /** * @ingroup dh * @brief dh get security bits * * @param ctx [IN] dh Context structure * * @retval security bits */ int32_t CRYPT_DH_GetSecBits(const CRYPT_DH_Ctx *ctx) { if (ctx == NULL || ctx->para == NULL || ctx->para->p == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } if (ctx->para->q == NULL) { return BN_SecBits(BN_Bits(ctx->para->p), -1); } return BN_SecBits(BN_Bits(ctx->para->p), BN_Bits(ctx->para->q)); } #endif /* HITLS_CRYPTO_DH */
2401_83913325/openHiTLS-examples_7925
crypto/dh/src/dh_core.c
C
unknown
32,906
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef DH_LOCAL_H #define DH_LOCAL_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_DH #include "crypt_bn.h" #include "crypt_dh.h" #include "sal_atomic.h" #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ #define DH_MIN_PBITS 768 // Minimum DH specification: 768 bits #define DH_MAX_PBITS 8192 // Maximum DH specification: 8192 bits #define DH_MIN_QBITS 160 // Minimum specification of DH parameter Q: 160 bits /* DH key parameter */ struct DH_Para { BN_BigNum *p; BN_BigNum *q; BN_BigNum *g; CRYPT_PKEY_ParaId id; }; /* DH key context */ struct DH_Ctx { BN_BigNum *x; // Private key BN_BigNum *y; // Public key CRYPT_DH_Para *para; // key parameter BSL_SAL_RefCount references; void *libCtx; uint32_t flags; }; #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_DH #endif // CRYPT_DH_H
2401_83913325/openHiTLS-examples_7925
crypto/dh/src/dh_local.h
C
unknown
1,389
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_DH #include "bsl_err_internal.h" #include "crypt_bn.h" #include "crypt_errno.h" #include "crypt_types.h" #include "crypt_params_key.h" #include "dh_local.h" #include "crypt_dh.h" static uint8_t g_rfc3526_2409_primeG[] = { 0x02 }; static uint8_t g_rfc7919G[] = { 0x02 }; static uint8_t g_rfc2409_prime768P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x3A, 0x36, 0x20, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, }; static uint8_t g_rfc2409_prime1024P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE6, 0x53, 0x81, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, }; static uint8_t g_rfc3526_prime1536P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, 0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, 0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, 0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, 0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, 0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, 0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, 0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, 0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x23, 0x73, 0x27, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc3526_prime2048P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, 0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, 0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, 0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, 0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, 0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, 0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, 0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, 0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, 0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, 0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, 0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, 0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, 0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, 0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, 0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAC, 0xAA, 0x68, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc3526_prime3072P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, 0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, 0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, 0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, 0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, 0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, 0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, 0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, 0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, 0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, 0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, 0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, 0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, 0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, 0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, 0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D, 0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33, 0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64, 0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A, 0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D, 0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7, 0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7, 0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D, 0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B, 0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64, 0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64, 0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C, 0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C, 0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2, 0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31, 0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E, 0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x3A, 0xD2, 0xCA, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc3526_prime4096P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, 0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, 0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, 0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, 0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, 0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, 0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, 0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, 0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, 0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, 0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, 0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, 0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, 0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, 0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, 0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D, 0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33, 0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64, 0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A, 0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D, 0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7, 0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7, 0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D, 0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B, 0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64, 0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64, 0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C, 0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C, 0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2, 0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31, 0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E, 0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x21, 0x08, 0x01, 0x1A, 0x72, 0x3C, 0x12, 0xA7, 0x87, 0xE6, 0xD7, 0x88, 0x71, 0x9A, 0x10, 0xBD, 0xBA, 0x5B, 0x26, 0x99, 0xC3, 0x27, 0x18, 0x6A, 0xF4, 0xE2, 0x3C, 0x1A, 0x94, 0x68, 0x34, 0xB6, 0x15, 0x0B, 0xDA, 0x25, 0x83, 0xE9, 0xCA, 0x2A, 0xD4, 0x4C, 0xE8, 0xDB, 0xBB, 0xC2, 0xDB, 0x04, 0xDE, 0x8E, 0xF9, 0x2E, 0x8E, 0xFC, 0x14, 0x1F, 0xBE, 0xCA, 0xA6, 0x28, 0x7C, 0x59, 0x47, 0x4E, 0x6B, 0xC0, 0x5D, 0x99, 0xB2, 0x96, 0x4F, 0xA0, 0x90, 0xC3, 0xA2, 0x23, 0x3B, 0xA1, 0x86, 0x51, 0x5B, 0xE7, 0xED, 0x1F, 0x61, 0x29, 0x70, 0xCE, 0xE2, 0xD7, 0xAF, 0xB8, 0x1B, 0xDD, 0x76, 0x21, 0x70, 0x48, 0x1C, 0xD0, 0x06, 0x91, 0x27, 0xD5, 0xB0, 0x5A, 0xA9, 0x93, 0xB4, 0xEA, 0x98, 0x8D, 0x8F, 0xDD, 0xC1, 0x86, 0xFF, 0xB7, 0xDC, 0x90, 0xA6, 0xC0, 0x8F, 0x4D, 0xF4, 0x35, 0xC9, 0x34, 0x06, 0x31, 0x99, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc3526_prime6144P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, 0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, 0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, 0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, 0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, 0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, 0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, 0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, 0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, 0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, 0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, 0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, 0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, 0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, 0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, 0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D, 0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33, 0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64, 0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A, 0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D, 0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7, 0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7, 0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D, 0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B, 0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64, 0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64, 0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C, 0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C, 0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2, 0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31, 0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E, 0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x21, 0x08, 0x01, 0x1A, 0x72, 0x3C, 0x12, 0xA7, 0x87, 0xE6, 0xD7, 0x88, 0x71, 0x9A, 0x10, 0xBD, 0xBA, 0x5B, 0x26, 0x99, 0xC3, 0x27, 0x18, 0x6A, 0xF4, 0xE2, 0x3C, 0x1A, 0x94, 0x68, 0x34, 0xB6, 0x15, 0x0B, 0xDA, 0x25, 0x83, 0xE9, 0xCA, 0x2A, 0xD4, 0x4C, 0xE8, 0xDB, 0xBB, 0xC2, 0xDB, 0x04, 0xDE, 0x8E, 0xF9, 0x2E, 0x8E, 0xFC, 0x14, 0x1F, 0xBE, 0xCA, 0xA6, 0x28, 0x7C, 0x59, 0x47, 0x4E, 0x6B, 0xC0, 0x5D, 0x99, 0xB2, 0x96, 0x4F, 0xA0, 0x90, 0xC3, 0xA2, 0x23, 0x3B, 0xA1, 0x86, 0x51, 0x5B, 0xE7, 0xED, 0x1F, 0x61, 0x29, 0x70, 0xCE, 0xE2, 0xD7, 0xAF, 0xB8, 0x1B, 0xDD, 0x76, 0x21, 0x70, 0x48, 0x1C, 0xD0, 0x06, 0x91, 0x27, 0xD5, 0xB0, 0x5A, 0xA9, 0x93, 0xB4, 0xEA, 0x98, 0x8D, 0x8F, 0xDD, 0xC1, 0x86, 0xFF, 0xB7, 0xDC, 0x90, 0xA6, 0xC0, 0x8F, 0x4D, 0xF4, 0x35, 0xC9, 0x34, 0x02, 0x84, 0x92, 0x36, 0xC3, 0xFA, 0xB4, 0xD2, 0x7C, 0x70, 0x26, 0xC1, 0xD4, 0xDC, 0xB2, 0x60, 0x26, 0x46, 0xDE, 0xC9, 0x75, 0x1E, 0x76, 0x3D, 0xBA, 0x37, 0xBD, 0xF8, 0xFF, 0x94, 0x06, 0xAD, 0x9E, 0x53, 0x0E, 0xE5, 0xDB, 0x38, 0x2F, 0x41, 0x30, 0x01, 0xAE, 0xB0, 0x6A, 0x53, 0xED, 0x90, 0x27, 0xD8, 0x31, 0x17, 0x97, 0x27, 0xB0, 0x86, 0x5A, 0x89, 0x18, 0xDA, 0x3E, 0xDB, 0xEB, 0xCF, 0x9B, 0x14, 0xED, 0x44, 0xCE, 0x6C, 0xBA, 0xCE, 0xD4, 0xBB, 0x1B, 0xDB, 0x7F, 0x14, 0x47, 0xE6, 0xCC, 0x25, 0x4B, 0x33, 0x20, 0x51, 0x51, 0x2B, 0xD7, 0xAF, 0x42, 0x6F, 0xB8, 0xF4, 0x01, 0x37, 0x8C, 0xD2, 0xBF, 0x59, 0x83, 0xCA, 0x01, 0xC6, 0x4B, 0x92, 0xEC, 0xF0, 0x32, 0xEA, 0x15, 0xD1, 0x72, 0x1D, 0x03, 0xF4, 0x82, 0xD7, 0xCE, 0x6E, 0x74, 0xFE, 0xF6, 0xD5, 0x5E, 0x70, 0x2F, 0x46, 0x98, 0x0C, 0x82, 0xB5, 0xA8, 0x40, 0x31, 0x90, 0x0B, 0x1C, 0x9E, 0x59, 0xE7, 0xC9, 0x7F, 0xBE, 0xC7, 0xE8, 0xF3, 0x23, 0xA9, 0x7A, 0x7E, 0x36, 0xCC, 0x88, 0xBE, 0x0F, 0x1D, 0x45, 0xB7, 0xFF, 0x58, 0x5A, 0xC5, 0x4B, 0xD4, 0x07, 0xB2, 0x2B, 0x41, 0x54, 0xAA, 0xCC, 0x8F, 0x6D, 0x7E, 0xBF, 0x48, 0xE1, 0xD8, 0x14, 0xCC, 0x5E, 0xD2, 0x0F, 0x80, 0x37, 0xE0, 0xA7, 0x97, 0x15, 0xEE, 0xF2, 0x9B, 0xE3, 0x28, 0x06, 0xA1, 0xD5, 0x8B, 0xB7, 0xC5, 0xDA, 0x76, 0xF5, 0x50, 0xAA, 0x3D, 0x8A, 0x1F, 0xBF, 0xF0, 0xEB, 0x19, 0xCC, 0xB1, 0xA3, 0x13, 0xD5, 0x5C, 0xDA, 0x56, 0xC9, 0xEC, 0x2E, 0xF2, 0x96, 0x32, 0x38, 0x7F, 0xE8, 0xD7, 0x6E, 0x3C, 0x04, 0x68, 0x04, 0x3E, 0x8F, 0x66, 0x3F, 0x48, 0x60, 0xEE, 0x12, 0xBF, 0x2D, 0x5B, 0x0B, 0x74, 0x74, 0xD6, 0xE6, 0x94, 0xF9, 0x1E, 0x6D, 0xCC, 0x40, 0x24, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc3526_prime8192P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, 0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, 0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, 0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, 0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, 0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, 0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, 0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, 0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, 0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, 0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, 0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, 0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, 0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, 0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, 0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D, 0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33, 0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64, 0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A, 0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D, 0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7, 0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7, 0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D, 0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B, 0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64, 0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64, 0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C, 0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C, 0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2, 0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31, 0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E, 0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x21, 0x08, 0x01, 0x1A, 0x72, 0x3C, 0x12, 0xA7, 0x87, 0xE6, 0xD7, 0x88, 0x71, 0x9A, 0x10, 0xBD, 0xBA, 0x5B, 0x26, 0x99, 0xC3, 0x27, 0x18, 0x6A, 0xF4, 0xE2, 0x3C, 0x1A, 0x94, 0x68, 0x34, 0xB6, 0x15, 0x0B, 0xDA, 0x25, 0x83, 0xE9, 0xCA, 0x2A, 0xD4, 0x4C, 0xE8, 0xDB, 0xBB, 0xC2, 0xDB, 0x04, 0xDE, 0x8E, 0xF9, 0x2E, 0x8E, 0xFC, 0x14, 0x1F, 0xBE, 0xCA, 0xA6, 0x28, 0x7C, 0x59, 0x47, 0x4E, 0x6B, 0xC0, 0x5D, 0x99, 0xB2, 0x96, 0x4F, 0xA0, 0x90, 0xC3, 0xA2, 0x23, 0x3B, 0xA1, 0x86, 0x51, 0x5B, 0xE7, 0xED, 0x1F, 0x61, 0x29, 0x70, 0xCE, 0xE2, 0xD7, 0xAF, 0xB8, 0x1B, 0xDD, 0x76, 0x21, 0x70, 0x48, 0x1C, 0xD0, 0x06, 0x91, 0x27, 0xD5, 0xB0, 0x5A, 0xA9, 0x93, 0xB4, 0xEA, 0x98, 0x8D, 0x8F, 0xDD, 0xC1, 0x86, 0xFF, 0xB7, 0xDC, 0x90, 0xA6, 0xC0, 0x8F, 0x4D, 0xF4, 0x35, 0xC9, 0x34, 0x02, 0x84, 0x92, 0x36, 0xC3, 0xFA, 0xB4, 0xD2, 0x7C, 0x70, 0x26, 0xC1, 0xD4, 0xDC, 0xB2, 0x60, 0x26, 0x46, 0xDE, 0xC9, 0x75, 0x1E, 0x76, 0x3D, 0xBA, 0x37, 0xBD, 0xF8, 0xFF, 0x94, 0x06, 0xAD, 0x9E, 0x53, 0x0E, 0xE5, 0xDB, 0x38, 0x2F, 0x41, 0x30, 0x01, 0xAE, 0xB0, 0x6A, 0x53, 0xED, 0x90, 0x27, 0xD8, 0x31, 0x17, 0x97, 0x27, 0xB0, 0x86, 0x5A, 0x89, 0x18, 0xDA, 0x3E, 0xDB, 0xEB, 0xCF, 0x9B, 0x14, 0xED, 0x44, 0xCE, 0x6C, 0xBA, 0xCE, 0xD4, 0xBB, 0x1B, 0xDB, 0x7F, 0x14, 0x47, 0xE6, 0xCC, 0x25, 0x4B, 0x33, 0x20, 0x51, 0x51, 0x2B, 0xD7, 0xAF, 0x42, 0x6F, 0xB8, 0xF4, 0x01, 0x37, 0x8C, 0xD2, 0xBF, 0x59, 0x83, 0xCA, 0x01, 0xC6, 0x4B, 0x92, 0xEC, 0xF0, 0x32, 0xEA, 0x15, 0xD1, 0x72, 0x1D, 0x03, 0xF4, 0x82, 0xD7, 0xCE, 0x6E, 0x74, 0xFE, 0xF6, 0xD5, 0x5E, 0x70, 0x2F, 0x46, 0x98, 0x0C, 0x82, 0xB5, 0xA8, 0x40, 0x31, 0x90, 0x0B, 0x1C, 0x9E, 0x59, 0xE7, 0xC9, 0x7F, 0xBE, 0xC7, 0xE8, 0xF3, 0x23, 0xA9, 0x7A, 0x7E, 0x36, 0xCC, 0x88, 0xBE, 0x0F, 0x1D, 0x45, 0xB7, 0xFF, 0x58, 0x5A, 0xC5, 0x4B, 0xD4, 0x07, 0xB2, 0x2B, 0x41, 0x54, 0xAA, 0xCC, 0x8F, 0x6D, 0x7E, 0xBF, 0x48, 0xE1, 0xD8, 0x14, 0xCC, 0x5E, 0xD2, 0x0F, 0x80, 0x37, 0xE0, 0xA7, 0x97, 0x15, 0xEE, 0xF2, 0x9B, 0xE3, 0x28, 0x06, 0xA1, 0xD5, 0x8B, 0xB7, 0xC5, 0xDA, 0x76, 0xF5, 0x50, 0xAA, 0x3D, 0x8A, 0x1F, 0xBF, 0xF0, 0xEB, 0x19, 0xCC, 0xB1, 0xA3, 0x13, 0xD5, 0x5C, 0xDA, 0x56, 0xC9, 0xEC, 0x2E, 0xF2, 0x96, 0x32, 0x38, 0x7F, 0xE8, 0xD7, 0x6E, 0x3C, 0x04, 0x68, 0x04, 0x3E, 0x8F, 0x66, 0x3F, 0x48, 0x60, 0xEE, 0x12, 0xBF, 0x2D, 0x5B, 0x0B, 0x74, 0x74, 0xD6, 0xE6, 0x94, 0xF9, 0x1E, 0x6D, 0xBE, 0x11, 0x59, 0x74, 0xA3, 0x92, 0x6F, 0x12, 0xFE, 0xE5, 0xE4, 0x38, 0x77, 0x7C, 0xB6, 0xA9, 0x32, 0xDF, 0x8C, 0xD8, 0xBE, 0xC4, 0xD0, 0x73, 0xB9, 0x31, 0xBA, 0x3B, 0xC8, 0x32, 0xB6, 0x8D, 0x9D, 0xD3, 0x00, 0x74, 0x1F, 0xA7, 0xBF, 0x8A, 0xFC, 0x47, 0xED, 0x25, 0x76, 0xF6, 0x93, 0x6B, 0xA4, 0x24, 0x66, 0x3A, 0xAB, 0x63, 0x9C, 0x5A, 0xE4, 0xF5, 0x68, 0x34, 0x23, 0xB4, 0x74, 0x2B, 0xF1, 0xC9, 0x78, 0x23, 0x8F, 0x16, 0xCB, 0xE3, 0x9D, 0x65, 0x2D, 0xE3, 0xFD, 0xB8, 0xBE, 0xFC, 0x84, 0x8A, 0xD9, 0x22, 0x22, 0x2E, 0x04, 0xA4, 0x03, 0x7C, 0x07, 0x13, 0xEB, 0x57, 0xA8, 0x1A, 0x23, 0xF0, 0xC7, 0x34, 0x73, 0xFC, 0x64, 0x6C, 0xEA, 0x30, 0x6B, 0x4B, 0xCB, 0xC8, 0x86, 0x2F, 0x83, 0x85, 0xDD, 0xFA, 0x9D, 0x4B, 0x7F, 0xA2, 0xC0, 0x87, 0xE8, 0x79, 0x68, 0x33, 0x03, 0xED, 0x5B, 0xDD, 0x3A, 0x06, 0x2B, 0x3C, 0xF5, 0xB3, 0xA2, 0x78, 0xA6, 0x6D, 0x2A, 0x13, 0xF8, 0x3F, 0x44, 0xF8, 0x2D, 0xDF, 0x31, 0x0E, 0xE0, 0x74, 0xAB, 0x6A, 0x36, 0x45, 0x97, 0xE8, 0x99, 0xA0, 0x25, 0x5D, 0xC1, 0x64, 0xF3, 0x1C, 0xC5, 0x08, 0x46, 0x85, 0x1D, 0xF9, 0xAB, 0x48, 0x19, 0x5D, 0xED, 0x7E, 0xA1, 0xB1, 0xD5, 0x10, 0xBD, 0x7E, 0xE7, 0x4D, 0x73, 0xFA, 0xF3, 0x6B, 0xC3, 0x1E, 0xCF, 0xA2, 0x68, 0x35, 0x90, 0x46, 0xF4, 0xEB, 0x87, 0x9F, 0x92, 0x40, 0x09, 0x43, 0x8B, 0x48, 0x1C, 0x6C, 0xD7, 0x88, 0x9A, 0x00, 0x2E, 0xD5, 0xEE, 0x38, 0x2B, 0xC9, 0x19, 0x0D, 0xA6, 0xFC, 0x02, 0x6E, 0x47, 0x95, 0x58, 0xE4, 0x47, 0x56, 0x77, 0xE9, 0xAA, 0x9E, 0x30, 0x50, 0xE2, 0x76, 0x56, 0x94, 0xDF, 0xC8, 0x1F, 0x56, 0xE8, 0x80, 0xB9, 0x6E, 0x71, 0x60, 0xC9, 0x80, 0xDD, 0x98, 0xED, 0xD3, 0xDF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe2048P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, 0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, 0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, 0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, 0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, 0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, 0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, 0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, 0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, 0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, 0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, 0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, 0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, 0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, 0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, 0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, 0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, 0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, 0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, 0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, 0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, 0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, 0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, 0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, 0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, 0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, 0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, 0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, 0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, 0x88, 0x6B, 0x42, 0x38, 0x61, 0x28, 0x5C, 0x97, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe2048Q[] = { 0x7F, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xD6, 0xFC, 0x2A, 0x2C, 0x51, 0x5D, 0xA5, 0x4D, 0x57, 0xEE, 0x2B, 0x10, 0x13, 0x9E, 0x9E, 0x78, 0xEC, 0x5C, 0xE2, 0xC1, 0xE7, 0x16, 0x9B, 0x4A, 0xD4, 0xF0, 0x9B, 0x20, 0x8A, 0x32, 0x19, 0xFD, 0xE6, 0x49, 0xCE, 0xE7, 0x12, 0x4D, 0x9F, 0x7C, 0xBE, 0x97, 0xF1, 0xB1, 0xB1, 0x86, 0x3A, 0xEC, 0x7B, 0x40, 0xD9, 0x01, 0x57, 0x62, 0x30, 0xBD, 0x69, 0xEF, 0x8F, 0x6A, 0xEA, 0xFE, 0xB2, 0xB0, 0x92, 0x19, 0xFA, 0x8F, 0xAF, 0x83, 0x37, 0x68, 0x42, 0xB1, 0xB2, 0xAA, 0x9E, 0xF6, 0x8D, 0x79, 0xDA, 0xAB, 0x89, 0xAF, 0x3F, 0xAB, 0xE4, 0x9A, 0xCC, 0x27, 0x86, 0x38, 0x70, 0x73, 0x45, 0xBB, 0xF1, 0x53, 0x44, 0xED, 0x79, 0xF7, 0xF4, 0x39, 0x0E, 0xF8, 0xAC, 0x50, 0x9B, 0x56, 0xF3, 0x9A, 0x98, 0x56, 0x65, 0x27, 0xA4, 0x1D, 0x3C, 0xBD, 0x5E, 0x05, 0x58, 0xC1, 0x59, 0x92, 0x7D, 0xB0, 0xE8, 0x84, 0x54, 0xA5, 0xD9, 0x64, 0x71, 0xFD, 0xDC, 0xB5, 0x6D, 0x5B, 0xB0, 0x6B, 0xFA, 0x34, 0x0E, 0xA7, 0xA1, 0x51, 0xEF, 0x1C, 0xA6, 0xFA, 0x57, 0x2B, 0x76, 0xF3, 0xB1, 0xB9, 0x5D, 0x8C, 0x85, 0x83, 0xD3, 0xE4, 0x77, 0x05, 0x36, 0xB8, 0x4F, 0x01, 0x7E, 0x70, 0xE6, 0xFB, 0xF1, 0x76, 0x60, 0x1A, 0x02, 0x66, 0x94, 0x1A, 0x17, 0xB0, 0xC8, 0xB9, 0x7F, 0x4E, 0x74, 0xC2, 0xC1, 0xFF, 0xC7, 0x27, 0x89, 0x19, 0x77, 0x79, 0x40, 0xC1, 0xE1, 0xFF, 0x1D, 0x8D, 0xA6, 0x37, 0xD6, 0xB9, 0x9D, 0xDA, 0xFE, 0x5E, 0x17, 0x61, 0x10, 0x02, 0xE2, 0xC7, 0x78, 0xC1, 0xBE, 0x8B, 0x41, 0xD9, 0x63, 0x79, 0xA5, 0x13, 0x60, 0xD9, 0x77, 0xFD, 0x44, 0x35, 0xA1, 0x1C, 0x30, 0x94, 0x2E, 0x4B, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe3072P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, 0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, 0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, 0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, 0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, 0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, 0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, 0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, 0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, 0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, 0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, 0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, 0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, 0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, 0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, 0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, 0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, 0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, 0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, 0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, 0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, 0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, 0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, 0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, 0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, 0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, 0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, 0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, 0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, 0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, 0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, 0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, 0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, 0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, 0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, 0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, 0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, 0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, 0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, 0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, 0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, 0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, 0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, 0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, 0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, 0x25, 0xE4, 0x1D, 0x2B, 0x66, 0xC6, 0x2E, 0x37, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe3072Q[] = { 0x7F, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xD6, 0xFC, 0x2A, 0x2C, 0x51, 0x5D, 0xA5, 0x4D, 0x57, 0xEE, 0x2B, 0x10, 0x13, 0x9E, 0x9E, 0x78, 0xEC, 0x5C, 0xE2, 0xC1, 0xE7, 0x16, 0x9B, 0x4A, 0xD4, 0xF0, 0x9B, 0x20, 0x8A, 0x32, 0x19, 0xFD, 0xE6, 0x49, 0xCE, 0xE7, 0x12, 0x4D, 0x9F, 0x7C, 0xBE, 0x97, 0xF1, 0xB1, 0xB1, 0x86, 0x3A, 0xEC, 0x7B, 0x40, 0xD9, 0x01, 0x57, 0x62, 0x30, 0xBD, 0x69, 0xEF, 0x8F, 0x6A, 0xEA, 0xFE, 0xB2, 0xB0, 0x92, 0x19, 0xFA, 0x8F, 0xAF, 0x83, 0x37, 0x68, 0x42, 0xB1, 0xB2, 0xAA, 0x9E, 0xF6, 0x8D, 0x79, 0xDA, 0xAB, 0x89, 0xAF, 0x3F, 0xAB, 0xE4, 0x9A, 0xCC, 0x27, 0x86, 0x38, 0x70, 0x73, 0x45, 0xBB, 0xF1, 0x53, 0x44, 0xED, 0x79, 0xF7, 0xF4, 0x39, 0x0E, 0xF8, 0xAC, 0x50, 0x9B, 0x56, 0xF3, 0x9A, 0x98, 0x56, 0x65, 0x27, 0xA4, 0x1D, 0x3C, 0xBD, 0x5E, 0x05, 0x58, 0xC1, 0x59, 0x92, 0x7D, 0xB0, 0xE8, 0x84, 0x54, 0xA5, 0xD9, 0x64, 0x71, 0xFD, 0xDC, 0xB5, 0x6D, 0x5B, 0xB0, 0x6B, 0xFA, 0x34, 0x0E, 0xA7, 0xA1, 0x51, 0xEF, 0x1C, 0xA6, 0xFA, 0x57, 0x2B, 0x76, 0xF3, 0xB1, 0xB9, 0x5D, 0x8C, 0x85, 0x83, 0xD3, 0xE4, 0x77, 0x05, 0x36, 0xB8, 0x4F, 0x01, 0x7E, 0x70, 0xE6, 0xFB, 0xF1, 0x76, 0x60, 0x1A, 0x02, 0x66, 0x94, 0x1A, 0x17, 0xB0, 0xC8, 0xB9, 0x7F, 0x4E, 0x74, 0xC2, 0xC1, 0xFF, 0xC7, 0x27, 0x89, 0x19, 0x77, 0x79, 0x40, 0xC1, 0xE1, 0xFF, 0x1D, 0x8D, 0xA6, 0x37, 0xD6, 0xB9, 0x9D, 0xDA, 0xFE, 0x5E, 0x17, 0x61, 0x10, 0x02, 0xE2, 0xC7, 0x78, 0xC1, 0xBE, 0x8B, 0x41, 0xD9, 0x63, 0x79, 0xA5, 0x13, 0x60, 0xD9, 0x77, 0xFD, 0x44, 0x35, 0xA1, 0x1C, 0x30, 0x8F, 0xE7, 0xEE, 0x6F, 0x1A, 0xAD, 0x9D, 0xB2, 0x8C, 0x81, 0xAD, 0xDE, 0x1A, 0x7A, 0x6F, 0x7C, 0xCE, 0x01, 0x1C, 0x30, 0xDA, 0x37, 0xE4, 0xEB, 0x73, 0x64, 0x83, 0xBD, 0x6C, 0x8E, 0x93, 0x48, 0xFB, 0xFB, 0xF7, 0x2C, 0xC6, 0x58, 0x7D, 0x60, 0xC3, 0x6C, 0x8E, 0x57, 0x7F, 0x09, 0x84, 0xC2, 0x89, 0xC9, 0x38, 0x5A, 0x09, 0x86, 0x49, 0xDE, 0x21, 0xBC, 0xA2, 0x7A, 0x7E, 0xA2, 0x29, 0x71, 0x6B, 0xA6, 0xE9, 0xB2, 0x79, 0x71, 0x0F, 0x38, 0xFA, 0xA5, 0xFF, 0xAE, 0x57, 0x41, 0x55, 0xCE, 0x4E, 0xFB, 0x4F, 0x74, 0x36, 0x95, 0xE2, 0x91, 0x1B, 0x1D, 0x06, 0xD5, 0xE2, 0x90, 0xCB, 0xCD, 0x86, 0xF5, 0x6D, 0x0E, 0xDF, 0xCD, 0x21, 0x6A, 0xE2, 0x24, 0x27, 0x05, 0x5E, 0x68, 0x35, 0xFD, 0x29, 0xEE, 0xF7, 0x9E, 0x0D, 0x90, 0x77, 0x1F, 0xEA, 0xCE, 0xBE, 0x12, 0xF2, 0x0E, 0x95, 0xB3, 0x63, 0x17, 0x1B, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe4096P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, 0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, 0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, 0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, 0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, 0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, 0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, 0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, 0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, 0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, 0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, 0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, 0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, 0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, 0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, 0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, 0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, 0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, 0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, 0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, 0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, 0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, 0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, 0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, 0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, 0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, 0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, 0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, 0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, 0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, 0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, 0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, 0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, 0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, 0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, 0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, 0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, 0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, 0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, 0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, 0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, 0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, 0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, 0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, 0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, 0x25, 0xE4, 0x1D, 0x2B, 0x66, 0x9E, 0x1E, 0xF1, 0x6E, 0x6F, 0x52, 0xC3, 0x16, 0x4D, 0xF4, 0xFB, 0x79, 0x30, 0xE9, 0xE4, 0xE5, 0x88, 0x57, 0xB6, 0xAC, 0x7D, 0x5F, 0x42, 0xD6, 0x9F, 0x6D, 0x18, 0x77, 0x63, 0xCF, 0x1D, 0x55, 0x03, 0x40, 0x04, 0x87, 0xF5, 0x5B, 0xA5, 0x7E, 0x31, 0xCC, 0x7A, 0x71, 0x35, 0xC8, 0x86, 0xEF, 0xB4, 0x31, 0x8A, 0xED, 0x6A, 0x1E, 0x01, 0x2D, 0x9E, 0x68, 0x32, 0xA9, 0x07, 0x60, 0x0A, 0x91, 0x81, 0x30, 0xC4, 0x6D, 0xC7, 0x78, 0xF9, 0x71, 0xAD, 0x00, 0x38, 0x09, 0x29, 0x99, 0xA3, 0x33, 0xCB, 0x8B, 0x7A, 0x1A, 0x1D, 0xB9, 0x3D, 0x71, 0x40, 0x00, 0x3C, 0x2A, 0x4E, 0xCE, 0xA9, 0xF9, 0x8D, 0x0A, 0xCC, 0x0A, 0x82, 0x91, 0xCD, 0xCE, 0xC9, 0x7D, 0xCF, 0x8E, 0xC9, 0xB5, 0x5A, 0x7F, 0x88, 0xA4, 0x6B, 0x4D, 0xB5, 0xA8, 0x51, 0xF4, 0x41, 0x82, 0xE1, 0xC6, 0x8A, 0x00, 0x7E, 0x5E, 0x65, 0x5F, 0x6A, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe4096Q[] = { 0x7F, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xD6, 0xFC, 0x2A, 0x2C, 0x51, 0x5D, 0xA5, 0x4D, 0x57, 0xEE, 0x2B, 0x10, 0x13, 0x9E, 0x9E, 0x78, 0xEC, 0x5C, 0xE2, 0xC1, 0xE7, 0x16, 0x9B, 0x4A, 0xD4, 0xF0, 0x9B, 0x20, 0x8A, 0x32, 0x19, 0xFD, 0xE6, 0x49, 0xCE, 0xE7, 0x12, 0x4D, 0x9F, 0x7C, 0xBE, 0x97, 0xF1, 0xB1, 0xB1, 0x86, 0x3A, 0xEC, 0x7B, 0x40, 0xD9, 0x01, 0x57, 0x62, 0x30, 0xBD, 0x69, 0xEF, 0x8F, 0x6A, 0xEA, 0xFE, 0xB2, 0xB0, 0x92, 0x19, 0xFA, 0x8F, 0xAF, 0x83, 0x37, 0x68, 0x42, 0xB1, 0xB2, 0xAA, 0x9E, 0xF6, 0x8D, 0x79, 0xDA, 0xAB, 0x89, 0xAF, 0x3F, 0xAB, 0xE4, 0x9A, 0xCC, 0x27, 0x86, 0x38, 0x70, 0x73, 0x45, 0xBB, 0xF1, 0x53, 0x44, 0xED, 0x79, 0xF7, 0xF4, 0x39, 0x0E, 0xF8, 0xAC, 0x50, 0x9B, 0x56, 0xF3, 0x9A, 0x98, 0x56, 0x65, 0x27, 0xA4, 0x1D, 0x3C, 0xBD, 0x5E, 0x05, 0x58, 0xC1, 0x59, 0x92, 0x7D, 0xB0, 0xE8, 0x84, 0x54, 0xA5, 0xD9, 0x64, 0x71, 0xFD, 0xDC, 0xB5, 0x6D, 0x5B, 0xB0, 0x6B, 0xFA, 0x34, 0x0E, 0xA7, 0xA1, 0x51, 0xEF, 0x1C, 0xA6, 0xFA, 0x57, 0x2B, 0x76, 0xF3, 0xB1, 0xB9, 0x5D, 0x8C, 0x85, 0x83, 0xD3, 0xE4, 0x77, 0x05, 0x36, 0xB8, 0x4F, 0x01, 0x7E, 0x70, 0xE6, 0xFB, 0xF1, 0x76, 0x60, 0x1A, 0x02, 0x66, 0x94, 0x1A, 0x17, 0xB0, 0xC8, 0xB9, 0x7F, 0x4E, 0x74, 0xC2, 0xC1, 0xFF, 0xC7, 0x27, 0x89, 0x19, 0x77, 0x79, 0x40, 0xC1, 0xE1, 0xFF, 0x1D, 0x8D, 0xA6, 0x37, 0xD6, 0xB9, 0x9D, 0xDA, 0xFE, 0x5E, 0x17, 0x61, 0x10, 0x02, 0xE2, 0xC7, 0x78, 0xC1, 0xBE, 0x8B, 0x41, 0xD9, 0x63, 0x79, 0xA5, 0x13, 0x60, 0xD9, 0x77, 0xFD, 0x44, 0x35, 0xA1, 0x1C, 0x30, 0x8F, 0xE7, 0xEE, 0x6F, 0x1A, 0xAD, 0x9D, 0xB2, 0x8C, 0x81, 0xAD, 0xDE, 0x1A, 0x7A, 0x6F, 0x7C, 0xCE, 0x01, 0x1C, 0x30, 0xDA, 0x37, 0xE4, 0xEB, 0x73, 0x64, 0x83, 0xBD, 0x6C, 0x8E, 0x93, 0x48, 0xFB, 0xFB, 0xF7, 0x2C, 0xC6, 0x58, 0x7D, 0x60, 0xC3, 0x6C, 0x8E, 0x57, 0x7F, 0x09, 0x84, 0xC2, 0x89, 0xC9, 0x38, 0x5A, 0x09, 0x86, 0x49, 0xDE, 0x21, 0xBC, 0xA2, 0x7A, 0x7E, 0xA2, 0x29, 0x71, 0x6B, 0xA6, 0xE9, 0xB2, 0x79, 0x71, 0x0F, 0x38, 0xFA, 0xA5, 0xFF, 0xAE, 0x57, 0x41, 0x55, 0xCE, 0x4E, 0xFB, 0x4F, 0x74, 0x36, 0x95, 0xE2, 0x91, 0x1B, 0x1D, 0x06, 0xD5, 0xE2, 0x90, 0xCB, 0xCD, 0x86, 0xF5, 0x6D, 0x0E, 0xDF, 0xCD, 0x21, 0x6A, 0xE2, 0x24, 0x27, 0x05, 0x5E, 0x68, 0x35, 0xFD, 0x29, 0xEE, 0xF7, 0x9E, 0x0D, 0x90, 0x77, 0x1F, 0xEA, 0xCE, 0xBE, 0x12, 0xF2, 0x0E, 0x95, 0xB3, 0x4F, 0x0F, 0x78, 0xB7, 0x37, 0xA9, 0x61, 0x8B, 0x26, 0xFA, 0x7D, 0xBC, 0x98, 0x74, 0xF2, 0x72, 0xC4, 0x2B, 0xDB, 0x56, 0x3E, 0xAF, 0xA1, 0x6B, 0x4F, 0xB6, 0x8C, 0x3B, 0xB1, 0xE7, 0x8E, 0xAA, 0x81, 0xA0, 0x02, 0x43, 0xFA, 0xAD, 0xD2, 0xBF, 0x18, 0xE6, 0x3D, 0x38, 0x9A, 0xE4, 0x43, 0x77, 0xDA, 0x18, 0xC5, 0x76, 0xB5, 0x0F, 0x00, 0x96, 0xCF, 0x34, 0x19, 0x54, 0x83, 0xB0, 0x05, 0x48, 0xC0, 0x98, 0x62, 0x36, 0xE3, 0xBC, 0x7C, 0xB8, 0xD6, 0x80, 0x1C, 0x04, 0x94, 0xCC, 0xD1, 0x99, 0xE5, 0xC5, 0xBD, 0x0D, 0x0E, 0xDC, 0x9E, 0xB8, 0xA0, 0x00, 0x1E, 0x15, 0x27, 0x67, 0x54, 0xFC, 0xC6, 0x85, 0x66, 0x05, 0x41, 0x48, 0xE6, 0xE7, 0x64, 0xBE, 0xE7, 0xC7, 0x64, 0xDA, 0xAD, 0x3F, 0xC4, 0x52, 0x35, 0xA6, 0xDA, 0xD4, 0x28, 0xFA, 0x20, 0xC1, 0x70, 0xE3, 0x45, 0x00, 0x3F, 0x2F, 0x32, 0xAF, 0xB5, 0x7F, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe6144P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, 0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, 0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, 0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, 0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, 0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, 0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, 0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, 0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, 0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, 0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, 0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, 0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, 0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, 0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, 0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, 0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, 0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, 0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, 0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, 0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, 0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, 0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, 0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, 0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, 0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, 0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, 0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, 0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, 0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, 0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, 0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, 0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, 0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, 0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, 0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, 0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, 0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, 0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, 0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, 0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, 0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, 0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, 0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, 0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, 0x25, 0xE4, 0x1D, 0x2B, 0x66, 0x9E, 0x1E, 0xF1, 0x6E, 0x6F, 0x52, 0xC3, 0x16, 0x4D, 0xF4, 0xFB, 0x79, 0x30, 0xE9, 0xE4, 0xE5, 0x88, 0x57, 0xB6, 0xAC, 0x7D, 0x5F, 0x42, 0xD6, 0x9F, 0x6D, 0x18, 0x77, 0x63, 0xCF, 0x1D, 0x55, 0x03, 0x40, 0x04, 0x87, 0xF5, 0x5B, 0xA5, 0x7E, 0x31, 0xCC, 0x7A, 0x71, 0x35, 0xC8, 0x86, 0xEF, 0xB4, 0x31, 0x8A, 0xED, 0x6A, 0x1E, 0x01, 0x2D, 0x9E, 0x68, 0x32, 0xA9, 0x07, 0x60, 0x0A, 0x91, 0x81, 0x30, 0xC4, 0x6D, 0xC7, 0x78, 0xF9, 0x71, 0xAD, 0x00, 0x38, 0x09, 0x29, 0x99, 0xA3, 0x33, 0xCB, 0x8B, 0x7A, 0x1A, 0x1D, 0xB9, 0x3D, 0x71, 0x40, 0x00, 0x3C, 0x2A, 0x4E, 0xCE, 0xA9, 0xF9, 0x8D, 0x0A, 0xCC, 0x0A, 0x82, 0x91, 0xCD, 0xCE, 0xC9, 0x7D, 0xCF, 0x8E, 0xC9, 0xB5, 0x5A, 0x7F, 0x88, 0xA4, 0x6B, 0x4D, 0xB5, 0xA8, 0x51, 0xF4, 0x41, 0x82, 0xE1, 0xC6, 0x8A, 0x00, 0x7E, 0x5E, 0x0D, 0xD9, 0x02, 0x0B, 0xFD, 0x64, 0xB6, 0x45, 0x03, 0x6C, 0x7A, 0x4E, 0x67, 0x7D, 0x2C, 0x38, 0x53, 0x2A, 0x3A, 0x23, 0xBA, 0x44, 0x42, 0xCA, 0xF5, 0x3E, 0xA6, 0x3B, 0xB4, 0x54, 0x32, 0x9B, 0x76, 0x24, 0xC8, 0x91, 0x7B, 0xDD, 0x64, 0xB1, 0xC0, 0xFD, 0x4C, 0xB3, 0x8E, 0x8C, 0x33, 0x4C, 0x70, 0x1C, 0x3A, 0xCD, 0xAD, 0x06, 0x57, 0xFC, 0xCF, 0xEC, 0x71, 0x9B, 0x1F, 0x5C, 0x3E, 0x4E, 0x46, 0x04, 0x1F, 0x38, 0x81, 0x47, 0xFB, 0x4C, 0xFD, 0xB4, 0x77, 0xA5, 0x24, 0x71, 0xF7, 0xA9, 0xA9, 0x69, 0x10, 0xB8, 0x55, 0x32, 0x2E, 0xDB, 0x63, 0x40, 0xD8, 0xA0, 0x0E, 0xF0, 0x92, 0x35, 0x05, 0x11, 0xE3, 0x0A, 0xBE, 0xC1, 0xFF, 0xF9, 0xE3, 0xA2, 0x6E, 0x7F, 0xB2, 0x9F, 0x8C, 0x18, 0x30, 0x23, 0xC3, 0x58, 0x7E, 0x38, 0xDA, 0x00, 0x77, 0xD9, 0xB4, 0x76, 0x3E, 0x4E, 0x4B, 0x94, 0xB2, 0xBB, 0xC1, 0x94, 0xC6, 0x65, 0x1E, 0x77, 0xCA, 0xF9, 0x92, 0xEE, 0xAA, 0xC0, 0x23, 0x2A, 0x28, 0x1B, 0xF6, 0xB3, 0xA7, 0x39, 0xC1, 0x22, 0x61, 0x16, 0x82, 0x0A, 0xE8, 0xDB, 0x58, 0x47, 0xA6, 0x7C, 0xBE, 0xF9, 0xC9, 0x09, 0x1B, 0x46, 0x2D, 0x53, 0x8C, 0xD7, 0x2B, 0x03, 0x74, 0x6A, 0xE7, 0x7F, 0x5E, 0x62, 0x29, 0x2C, 0x31, 0x15, 0x62, 0xA8, 0x46, 0x50, 0x5D, 0xC8, 0x2D, 0xB8, 0x54, 0x33, 0x8A, 0xE4, 0x9F, 0x52, 0x35, 0xC9, 0x5B, 0x91, 0x17, 0x8C, 0xCF, 0x2D, 0xD5, 0xCA, 0xCE, 0xF4, 0x03, 0xEC, 0x9D, 0x18, 0x10, 0xC6, 0x27, 0x2B, 0x04, 0x5B, 0x3B, 0x71, 0xF9, 0xDC, 0x6B, 0x80, 0xD6, 0x3F, 0xDD, 0x4A, 0x8E, 0x9A, 0xDB, 0x1E, 0x69, 0x62, 0xA6, 0x95, 0x26, 0xD4, 0x31, 0x61, 0xC1, 0xA4, 0x1D, 0x57, 0x0D, 0x79, 0x38, 0xDA, 0xD4, 0xA4, 0x0E, 0x32, 0x9C, 0xD0, 0xE4, 0x0E, 0x65, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe6144Q[] = { 0x7F, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xD6, 0xFC, 0x2A, 0x2C, 0x51, 0x5D, 0xA5, 0x4D, 0x57, 0xEE, 0x2B, 0x10, 0x13, 0x9E, 0x9E, 0x78, 0xEC, 0x5C, 0xE2, 0xC1, 0xE7, 0x16, 0x9B, 0x4A, 0xD4, 0xF0, 0x9B, 0x20, 0x8A, 0x32, 0x19, 0xFD, 0xE6, 0x49, 0xCE, 0xE7, 0x12, 0x4D, 0x9F, 0x7C, 0xBE, 0x97, 0xF1, 0xB1, 0xB1, 0x86, 0x3A, 0xEC, 0x7B, 0x40, 0xD9, 0x01, 0x57, 0x62, 0x30, 0xBD, 0x69, 0xEF, 0x8F, 0x6A, 0xEA, 0xFE, 0xB2, 0xB0, 0x92, 0x19, 0xFA, 0x8F, 0xAF, 0x83, 0x37, 0x68, 0x42, 0xB1, 0xB2, 0xAA, 0x9E, 0xF6, 0x8D, 0x79, 0xDA, 0xAB, 0x89, 0xAF, 0x3F, 0xAB, 0xE4, 0x9A, 0xCC, 0x27, 0x86, 0x38, 0x70, 0x73, 0x45, 0xBB, 0xF1, 0x53, 0x44, 0xED, 0x79, 0xF7, 0xF4, 0x39, 0x0E, 0xF8, 0xAC, 0x50, 0x9B, 0x56, 0xF3, 0x9A, 0x98, 0x56, 0x65, 0x27, 0xA4, 0x1D, 0x3C, 0xBD, 0x5E, 0x05, 0x58, 0xC1, 0x59, 0x92, 0x7D, 0xB0, 0xE8, 0x84, 0x54, 0xA5, 0xD9, 0x64, 0x71, 0xFD, 0xDC, 0xB5, 0x6D, 0x5B, 0xB0, 0x6B, 0xFA, 0x34, 0x0E, 0xA7, 0xA1, 0x51, 0xEF, 0x1C, 0xA6, 0xFA, 0x57, 0x2B, 0x76, 0xF3, 0xB1, 0xB9, 0x5D, 0x8C, 0x85, 0x83, 0xD3, 0xE4, 0x77, 0x05, 0x36, 0xB8, 0x4F, 0x01, 0x7E, 0x70, 0xE6, 0xFB, 0xF1, 0x76, 0x60, 0x1A, 0x02, 0x66, 0x94, 0x1A, 0x17, 0xB0, 0xC8, 0xB9, 0x7F, 0x4E, 0x74, 0xC2, 0xC1, 0xFF, 0xC7, 0x27, 0x89, 0x19, 0x77, 0x79, 0x40, 0xC1, 0xE1, 0xFF, 0x1D, 0x8D, 0xA6, 0x37, 0xD6, 0xB9, 0x9D, 0xDA, 0xFE, 0x5E, 0x17, 0x61, 0x10, 0x02, 0xE2, 0xC7, 0x78, 0xC1, 0xBE, 0x8B, 0x41, 0xD9, 0x63, 0x79, 0xA5, 0x13, 0x60, 0xD9, 0x77, 0xFD, 0x44, 0x35, 0xA1, 0x1C, 0x30, 0x8F, 0xE7, 0xEE, 0x6F, 0x1A, 0xAD, 0x9D, 0xB2, 0x8C, 0x81, 0xAD, 0xDE, 0x1A, 0x7A, 0x6F, 0x7C, 0xCE, 0x01, 0x1C, 0x30, 0xDA, 0x37, 0xE4, 0xEB, 0x73, 0x64, 0x83, 0xBD, 0x6C, 0x8E, 0x93, 0x48, 0xFB, 0xFB, 0xF7, 0x2C, 0xC6, 0x58, 0x7D, 0x60, 0xC3, 0x6C, 0x8E, 0x57, 0x7F, 0x09, 0x84, 0xC2, 0x89, 0xC9, 0x38, 0x5A, 0x09, 0x86, 0x49, 0xDE, 0x21, 0xBC, 0xA2, 0x7A, 0x7E, 0xA2, 0x29, 0x71, 0x6B, 0xA6, 0xE9, 0xB2, 0x79, 0x71, 0x0F, 0x38, 0xFA, 0xA5, 0xFF, 0xAE, 0x57, 0x41, 0x55, 0xCE, 0x4E, 0xFB, 0x4F, 0x74, 0x36, 0x95, 0xE2, 0x91, 0x1B, 0x1D, 0x06, 0xD5, 0xE2, 0x90, 0xCB, 0xCD, 0x86, 0xF5, 0x6D, 0x0E, 0xDF, 0xCD, 0x21, 0x6A, 0xE2, 0x24, 0x27, 0x05, 0x5E, 0x68, 0x35, 0xFD, 0x29, 0xEE, 0xF7, 0x9E, 0x0D, 0x90, 0x77, 0x1F, 0xEA, 0xCE, 0xBE, 0x12, 0xF2, 0x0E, 0x95, 0xB3, 0x4F, 0x0F, 0x78, 0xB7, 0x37, 0xA9, 0x61, 0x8B, 0x26, 0xFA, 0x7D, 0xBC, 0x98, 0x74, 0xF2, 0x72, 0xC4, 0x2B, 0xDB, 0x56, 0x3E, 0xAF, 0xA1, 0x6B, 0x4F, 0xB6, 0x8C, 0x3B, 0xB1, 0xE7, 0x8E, 0xAA, 0x81, 0xA0, 0x02, 0x43, 0xFA, 0xAD, 0xD2, 0xBF, 0x18, 0xE6, 0x3D, 0x38, 0x9A, 0xE4, 0x43, 0x77, 0xDA, 0x18, 0xC5, 0x76, 0xB5, 0x0F, 0x00, 0x96, 0xCF, 0x34, 0x19, 0x54, 0x83, 0xB0, 0x05, 0x48, 0xC0, 0x98, 0x62, 0x36, 0xE3, 0xBC, 0x7C, 0xB8, 0xD6, 0x80, 0x1C, 0x04, 0x94, 0xCC, 0xD1, 0x99, 0xE5, 0xC5, 0xBD, 0x0D, 0x0E, 0xDC, 0x9E, 0xB8, 0xA0, 0x00, 0x1E, 0x15, 0x27, 0x67, 0x54, 0xFC, 0xC6, 0x85, 0x66, 0x05, 0x41, 0x48, 0xE6, 0xE7, 0x64, 0xBE, 0xE7, 0xC7, 0x64, 0xDA, 0xAD, 0x3F, 0xC4, 0x52, 0x35, 0xA6, 0xDA, 0xD4, 0x28, 0xFA, 0x20, 0xC1, 0x70, 0xE3, 0x45, 0x00, 0x3F, 0x2F, 0x06, 0xEC, 0x81, 0x05, 0xFE, 0xB2, 0x5B, 0x22, 0x81, 0xB6, 0x3D, 0x27, 0x33, 0xBE, 0x96, 0x1C, 0x29, 0x95, 0x1D, 0x11, 0xDD, 0x22, 0x21, 0x65, 0x7A, 0x9F, 0x53, 0x1D, 0xDA, 0x2A, 0x19, 0x4D, 0xBB, 0x12, 0x64, 0x48, 0xBD, 0xEE, 0xB2, 0x58, 0xE0, 0x7E, 0xA6, 0x59, 0xC7, 0x46, 0x19, 0xA6, 0x38, 0x0E, 0x1D, 0x66, 0xD6, 0x83, 0x2B, 0xFE, 0x67, 0xF6, 0x38, 0xCD, 0x8F, 0xAE, 0x1F, 0x27, 0x23, 0x02, 0x0F, 0x9C, 0x40, 0xA3, 0xFD, 0xA6, 0x7E, 0xDA, 0x3B, 0xD2, 0x92, 0x38, 0xFB, 0xD4, 0xD4, 0xB4, 0x88, 0x5C, 0x2A, 0x99, 0x17, 0x6D, 0xB1, 0xA0, 0x6C, 0x50, 0x07, 0x78, 0x49, 0x1A, 0x82, 0x88, 0xF1, 0x85, 0x5F, 0x60, 0xFF, 0xFC, 0xF1, 0xD1, 0x37, 0x3F, 0xD9, 0x4F, 0xC6, 0x0C, 0x18, 0x11, 0xE1, 0xAC, 0x3F, 0x1C, 0x6D, 0x00, 0x3B, 0xEC, 0xDA, 0x3B, 0x1F, 0x27, 0x25, 0xCA, 0x59, 0x5D, 0xE0, 0xCA, 0x63, 0x32, 0x8F, 0x3B, 0xE5, 0x7C, 0xC9, 0x77, 0x55, 0x60, 0x11, 0x95, 0x14, 0x0D, 0xFB, 0x59, 0xD3, 0x9C, 0xE0, 0x91, 0x30, 0x8B, 0x41, 0x05, 0x74, 0x6D, 0xAC, 0x23, 0xD3, 0x3E, 0x5F, 0x7C, 0xE4, 0x84, 0x8D, 0xA3, 0x16, 0xA9, 0xC6, 0x6B, 0x95, 0x81, 0xBA, 0x35, 0x73, 0xBF, 0xAF, 0x31, 0x14, 0x96, 0x18, 0x8A, 0xB1, 0x54, 0x23, 0x28, 0x2E, 0xE4, 0x16, 0xDC, 0x2A, 0x19, 0xC5, 0x72, 0x4F, 0xA9, 0x1A, 0xE4, 0xAD, 0xC8, 0x8B, 0xC6, 0x67, 0x96, 0xEA, 0xE5, 0x67, 0x7A, 0x01, 0xF6, 0x4E, 0x8C, 0x08, 0x63, 0x13, 0x95, 0x82, 0x2D, 0x9D, 0xB8, 0xFC, 0xEE, 0x35, 0xC0, 0x6B, 0x1F, 0xEE, 0xA5, 0x47, 0x4D, 0x6D, 0x8F, 0x34, 0xB1, 0x53, 0x4A, 0x93, 0x6A, 0x18, 0xB0, 0xE0, 0xD2, 0x0E, 0xAB, 0x86, 0xBC, 0x9C, 0x6D, 0x6A, 0x52, 0x07, 0x19, 0x4E, 0x68, 0x72, 0x07, 0x32, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe8192P[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, 0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, 0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, 0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, 0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, 0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, 0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, 0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, 0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, 0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, 0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, 0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, 0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, 0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, 0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, 0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, 0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, 0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, 0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, 0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, 0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, 0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, 0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, 0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, 0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, 0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, 0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, 0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, 0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, 0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, 0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, 0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, 0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, 0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, 0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, 0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, 0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, 0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, 0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, 0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, 0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, 0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, 0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, 0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, 0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, 0x25, 0xE4, 0x1D, 0x2B, 0x66, 0x9E, 0x1E, 0xF1, 0x6E, 0x6F, 0x52, 0xC3, 0x16, 0x4D, 0xF4, 0xFB, 0x79, 0x30, 0xE9, 0xE4, 0xE5, 0x88, 0x57, 0xB6, 0xAC, 0x7D, 0x5F, 0x42, 0xD6, 0x9F, 0x6D, 0x18, 0x77, 0x63, 0xCF, 0x1D, 0x55, 0x03, 0x40, 0x04, 0x87, 0xF5, 0x5B, 0xA5, 0x7E, 0x31, 0xCC, 0x7A, 0x71, 0x35, 0xC8, 0x86, 0xEF, 0xB4, 0x31, 0x8A, 0xED, 0x6A, 0x1E, 0x01, 0x2D, 0x9E, 0x68, 0x32, 0xA9, 0x07, 0x60, 0x0A, 0x91, 0x81, 0x30, 0xC4, 0x6D, 0xC7, 0x78, 0xF9, 0x71, 0xAD, 0x00, 0x38, 0x09, 0x29, 0x99, 0xA3, 0x33, 0xCB, 0x8B, 0x7A, 0x1A, 0x1D, 0xB9, 0x3D, 0x71, 0x40, 0x00, 0x3C, 0x2A, 0x4E, 0xCE, 0xA9, 0xF9, 0x8D, 0x0A, 0xCC, 0x0A, 0x82, 0x91, 0xCD, 0xCE, 0xC9, 0x7D, 0xCF, 0x8E, 0xC9, 0xB5, 0x5A, 0x7F, 0x88, 0xA4, 0x6B, 0x4D, 0xB5, 0xA8, 0x51, 0xF4, 0x41, 0x82, 0xE1, 0xC6, 0x8A, 0x00, 0x7E, 0x5E, 0x0D, 0xD9, 0x02, 0x0B, 0xFD, 0x64, 0xB6, 0x45, 0x03, 0x6C, 0x7A, 0x4E, 0x67, 0x7D, 0x2C, 0x38, 0x53, 0x2A, 0x3A, 0x23, 0xBA, 0x44, 0x42, 0xCA, 0xF5, 0x3E, 0xA6, 0x3B, 0xB4, 0x54, 0x32, 0x9B, 0x76, 0x24, 0xC8, 0x91, 0x7B, 0xDD, 0x64, 0xB1, 0xC0, 0xFD, 0x4C, 0xB3, 0x8E, 0x8C, 0x33, 0x4C, 0x70, 0x1C, 0x3A, 0xCD, 0xAD, 0x06, 0x57, 0xFC, 0xCF, 0xEC, 0x71, 0x9B, 0x1F, 0x5C, 0x3E, 0x4E, 0x46, 0x04, 0x1F, 0x38, 0x81, 0x47, 0xFB, 0x4C, 0xFD, 0xB4, 0x77, 0xA5, 0x24, 0x71, 0xF7, 0xA9, 0xA9, 0x69, 0x10, 0xB8, 0x55, 0x32, 0x2E, 0xDB, 0x63, 0x40, 0xD8, 0xA0, 0x0E, 0xF0, 0x92, 0x35, 0x05, 0x11, 0xE3, 0x0A, 0xBE, 0xC1, 0xFF, 0xF9, 0xE3, 0xA2, 0x6E, 0x7F, 0xB2, 0x9F, 0x8C, 0x18, 0x30, 0x23, 0xC3, 0x58, 0x7E, 0x38, 0xDA, 0x00, 0x77, 0xD9, 0xB4, 0x76, 0x3E, 0x4E, 0x4B, 0x94, 0xB2, 0xBB, 0xC1, 0x94, 0xC6, 0x65, 0x1E, 0x77, 0xCA, 0xF9, 0x92, 0xEE, 0xAA, 0xC0, 0x23, 0x2A, 0x28, 0x1B, 0xF6, 0xB3, 0xA7, 0x39, 0xC1, 0x22, 0x61, 0x16, 0x82, 0x0A, 0xE8, 0xDB, 0x58, 0x47, 0xA6, 0x7C, 0xBE, 0xF9, 0xC9, 0x09, 0x1B, 0x46, 0x2D, 0x53, 0x8C, 0xD7, 0x2B, 0x03, 0x74, 0x6A, 0xE7, 0x7F, 0x5E, 0x62, 0x29, 0x2C, 0x31, 0x15, 0x62, 0xA8, 0x46, 0x50, 0x5D, 0xC8, 0x2D, 0xB8, 0x54, 0x33, 0x8A, 0xE4, 0x9F, 0x52, 0x35, 0xC9, 0x5B, 0x91, 0x17, 0x8C, 0xCF, 0x2D, 0xD5, 0xCA, 0xCE, 0xF4, 0x03, 0xEC, 0x9D, 0x18, 0x10, 0xC6, 0x27, 0x2B, 0x04, 0x5B, 0x3B, 0x71, 0xF9, 0xDC, 0x6B, 0x80, 0xD6, 0x3F, 0xDD, 0x4A, 0x8E, 0x9A, 0xDB, 0x1E, 0x69, 0x62, 0xA6, 0x95, 0x26, 0xD4, 0x31, 0x61, 0xC1, 0xA4, 0x1D, 0x57, 0x0D, 0x79, 0x38, 0xDA, 0xD4, 0xA4, 0x0E, 0x32, 0x9C, 0xCF, 0xF4, 0x6A, 0xAA, 0x36, 0xAD, 0x00, 0x4C, 0xF6, 0x00, 0xC8, 0x38, 0x1E, 0x42, 0x5A, 0x31, 0xD9, 0x51, 0xAE, 0x64, 0xFD, 0xB2, 0x3F, 0xCE, 0xC9, 0x50, 0x9D, 0x43, 0x68, 0x7F, 0xEB, 0x69, 0xED, 0xD1, 0xCC, 0x5E, 0x0B, 0x8C, 0xC3, 0xBD, 0xF6, 0x4B, 0x10, 0xEF, 0x86, 0xB6, 0x31, 0x42, 0xA3, 0xAB, 0x88, 0x29, 0x55, 0x5B, 0x2F, 0x74, 0x7C, 0x93, 0x26, 0x65, 0xCB, 0x2C, 0x0F, 0x1C, 0xC0, 0x1B, 0xD7, 0x02, 0x29, 0x38, 0x88, 0x39, 0xD2, 0xAF, 0x05, 0xE4, 0x54, 0x50, 0x4A, 0xC7, 0x8B, 0x75, 0x82, 0x82, 0x28, 0x46, 0xC0, 0xBA, 0x35, 0xC3, 0x5F, 0x5C, 0x59, 0x16, 0x0C, 0xC0, 0x46, 0xFD, 0x82, 0x51, 0x54, 0x1F, 0xC6, 0x8C, 0x9C, 0x86, 0xB0, 0x22, 0xBB, 0x70, 0x99, 0x87, 0x6A, 0x46, 0x0E, 0x74, 0x51, 0xA8, 0xA9, 0x31, 0x09, 0x70, 0x3F, 0xEE, 0x1C, 0x21, 0x7E, 0x6C, 0x38, 0x26, 0xE5, 0x2C, 0x51, 0xAA, 0x69, 0x1E, 0x0E, 0x42, 0x3C, 0xFC, 0x99, 0xE9, 0xE3, 0x16, 0x50, 0xC1, 0x21, 0x7B, 0x62, 0x48, 0x16, 0xCD, 0xAD, 0x9A, 0x95, 0xF9, 0xD5, 0xB8, 0x01, 0x94, 0x88, 0xD9, 0xC0, 0xA0, 0xA1, 0xFE, 0x30, 0x75, 0xA5, 0x77, 0xE2, 0x31, 0x83, 0xF8, 0x1D, 0x4A, 0x3F, 0x2F, 0xA4, 0x57, 0x1E, 0xFC, 0x8C, 0xE0, 0xBA, 0x8A, 0x4F, 0xE8, 0xB6, 0x85, 0x5D, 0xFE, 0x72, 0xB0, 0xA6, 0x6E, 0xDE, 0xD2, 0xFB, 0xAB, 0xFB, 0xE5, 0x8A, 0x30, 0xFA, 0xFA, 0xBE, 0x1C, 0x5D, 0x71, 0xA8, 0x7E, 0x2F, 0x74, 0x1E, 0xF8, 0xC1, 0xFE, 0x86, 0xFE, 0xA6, 0xBB, 0xFD, 0xE5, 0x30, 0x67, 0x7F, 0x0D, 0x97, 0xD1, 0x1D, 0x49, 0xF7, 0xA8, 0x44, 0x3D, 0x08, 0x22, 0xE5, 0x06, 0xA9, 0xF4, 0x61, 0x4E, 0x01, 0x1E, 0x2A, 0x94, 0x83, 0x8F, 0xF8, 0x8C, 0xD6, 0x8C, 0x8B, 0xB7, 0xC5, 0xC6, 0x42, 0x4C, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; static uint8_t g_rfc7919_ffdhe8192Q[] = { 0x7F, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xD6, 0xFC, 0x2A, 0x2C, 0x51, 0x5D, 0xA5, 0x4D, 0x57, 0xEE, 0x2B, 0x10, 0x13, 0x9E, 0x9E, 0x78, 0xEC, 0x5C, 0xE2, 0xC1, 0xE7, 0x16, 0x9B, 0x4A, 0xD4, 0xF0, 0x9B, 0x20, 0x8A, 0x32, 0x19, 0xFD, 0xE6, 0x49, 0xCE, 0xE7, 0x12, 0x4D, 0x9F, 0x7C, 0xBE, 0x97, 0xF1, 0xB1, 0xB1, 0x86, 0x3A, 0xEC, 0x7B, 0x40, 0xD9, 0x01, 0x57, 0x62, 0x30, 0xBD, 0x69, 0xEF, 0x8F, 0x6A, 0xEA, 0xFE, 0xB2, 0xB0, 0x92, 0x19, 0xFA, 0x8F, 0xAF, 0x83, 0x37, 0x68, 0x42, 0xB1, 0xB2, 0xAA, 0x9E, 0xF6, 0x8D, 0x79, 0xDA, 0xAB, 0x89, 0xAF, 0x3F, 0xAB, 0xE4, 0x9A, 0xCC, 0x27, 0x86, 0x38, 0x70, 0x73, 0x45, 0xBB, 0xF1, 0x53, 0x44, 0xED, 0x79, 0xF7, 0xF4, 0x39, 0x0E, 0xF8, 0xAC, 0x50, 0x9B, 0x56, 0xF3, 0x9A, 0x98, 0x56, 0x65, 0x27, 0xA4, 0x1D, 0x3C, 0xBD, 0x5E, 0x05, 0x58, 0xC1, 0x59, 0x92, 0x7D, 0xB0, 0xE8, 0x84, 0x54, 0xA5, 0xD9, 0x64, 0x71, 0xFD, 0xDC, 0xB5, 0x6D, 0x5B, 0xB0, 0x6B, 0xFA, 0x34, 0x0E, 0xA7, 0xA1, 0x51, 0xEF, 0x1C, 0xA6, 0xFA, 0x57, 0x2B, 0x76, 0xF3, 0xB1, 0xB9, 0x5D, 0x8C, 0x85, 0x83, 0xD3, 0xE4, 0x77, 0x05, 0x36, 0xB8, 0x4F, 0x01, 0x7E, 0x70, 0xE6, 0xFB, 0xF1, 0x76, 0x60, 0x1A, 0x02, 0x66, 0x94, 0x1A, 0x17, 0xB0, 0xC8, 0xB9, 0x7F, 0x4E, 0x74, 0xC2, 0xC1, 0xFF, 0xC7, 0x27, 0x89, 0x19, 0x77, 0x79, 0x40, 0xC1, 0xE1, 0xFF, 0x1D, 0x8D, 0xA6, 0x37, 0xD6, 0xB9, 0x9D, 0xDA, 0xFE, 0x5E, 0x17, 0x61, 0x10, 0x02, 0xE2, 0xC7, 0x78, 0xC1, 0xBE, 0x8B, 0x41, 0xD9, 0x63, 0x79, 0xA5, 0x13, 0x60, 0xD9, 0x77, 0xFD, 0x44, 0x35, 0xA1, 0x1C, 0x30, 0x8F, 0xE7, 0xEE, 0x6F, 0x1A, 0xAD, 0x9D, 0xB2, 0x8C, 0x81, 0xAD, 0xDE, 0x1A, 0x7A, 0x6F, 0x7C, 0xCE, 0x01, 0x1C, 0x30, 0xDA, 0x37, 0xE4, 0xEB, 0x73, 0x64, 0x83, 0xBD, 0x6C, 0x8E, 0x93, 0x48, 0xFB, 0xFB, 0xF7, 0x2C, 0xC6, 0x58, 0x7D, 0x60, 0xC3, 0x6C, 0x8E, 0x57, 0x7F, 0x09, 0x84, 0xC2, 0x89, 0xC9, 0x38, 0x5A, 0x09, 0x86, 0x49, 0xDE, 0x21, 0xBC, 0xA2, 0x7A, 0x7E, 0xA2, 0x29, 0x71, 0x6B, 0xA6, 0xE9, 0xB2, 0x79, 0x71, 0x0F, 0x38, 0xFA, 0xA5, 0xFF, 0xAE, 0x57, 0x41, 0x55, 0xCE, 0x4E, 0xFB, 0x4F, 0x74, 0x36, 0x95, 0xE2, 0x91, 0x1B, 0x1D, 0x06, 0xD5, 0xE2, 0x90, 0xCB, 0xCD, 0x86, 0xF5, 0x6D, 0x0E, 0xDF, 0xCD, 0x21, 0x6A, 0xE2, 0x24, 0x27, 0x05, 0x5E, 0x68, 0x35, 0xFD, 0x29, 0xEE, 0xF7, 0x9E, 0x0D, 0x90, 0x77, 0x1F, 0xEA, 0xCE, 0xBE, 0x12, 0xF2, 0x0E, 0x95, 0xB3, 0x4F, 0x0F, 0x78, 0xB7, 0x37, 0xA9, 0x61, 0x8B, 0x26, 0xFA, 0x7D, 0xBC, 0x98, 0x74, 0xF2, 0x72, 0xC4, 0x2B, 0xDB, 0x56, 0x3E, 0xAF, 0xA1, 0x6B, 0x4F, 0xB6, 0x8C, 0x3B, 0xB1, 0xE7, 0x8E, 0xAA, 0x81, 0xA0, 0x02, 0x43, 0xFA, 0xAD, 0xD2, 0xBF, 0x18, 0xE6, 0x3D, 0x38, 0x9A, 0xE4, 0x43, 0x77, 0xDA, 0x18, 0xC5, 0x76, 0xB5, 0x0F, 0x00, 0x96, 0xCF, 0x34, 0x19, 0x54, 0x83, 0xB0, 0x05, 0x48, 0xC0, 0x98, 0x62, 0x36, 0xE3, 0xBC, 0x7C, 0xB8, 0xD6, 0x80, 0x1C, 0x04, 0x94, 0xCC, 0xD1, 0x99, 0xE5, 0xC5, 0xBD, 0x0D, 0x0E, 0xDC, 0x9E, 0xB8, 0xA0, 0x00, 0x1E, 0x15, 0x27, 0x67, 0x54, 0xFC, 0xC6, 0x85, 0x66, 0x05, 0x41, 0x48, 0xE6, 0xE7, 0x64, 0xBE, 0xE7, 0xC7, 0x64, 0xDA, 0xAD, 0x3F, 0xC4, 0x52, 0x35, 0xA6, 0xDA, 0xD4, 0x28, 0xFA, 0x20, 0xC1, 0x70, 0xE3, 0x45, 0x00, 0x3F, 0x2F, 0x06, 0xEC, 0x81, 0x05, 0xFE, 0xB2, 0x5B, 0x22, 0x81, 0xB6, 0x3D, 0x27, 0x33, 0xBE, 0x96, 0x1C, 0x29, 0x95, 0x1D, 0x11, 0xDD, 0x22, 0x21, 0x65, 0x7A, 0x9F, 0x53, 0x1D, 0xDA, 0x2A, 0x19, 0x4D, 0xBB, 0x12, 0x64, 0x48, 0xBD, 0xEE, 0xB2, 0x58, 0xE0, 0x7E, 0xA6, 0x59, 0xC7, 0x46, 0x19, 0xA6, 0x38, 0x0E, 0x1D, 0x66, 0xD6, 0x83, 0x2B, 0xFE, 0x67, 0xF6, 0x38, 0xCD, 0x8F, 0xAE, 0x1F, 0x27, 0x23, 0x02, 0x0F, 0x9C, 0x40, 0xA3, 0xFD, 0xA6, 0x7E, 0xDA, 0x3B, 0xD2, 0x92, 0x38, 0xFB, 0xD4, 0xD4, 0xB4, 0x88, 0x5C, 0x2A, 0x99, 0x17, 0x6D, 0xB1, 0xA0, 0x6C, 0x50, 0x07, 0x78, 0x49, 0x1A, 0x82, 0x88, 0xF1, 0x85, 0x5F, 0x60, 0xFF, 0xFC, 0xF1, 0xD1, 0x37, 0x3F, 0xD9, 0x4F, 0xC6, 0x0C, 0x18, 0x11, 0xE1, 0xAC, 0x3F, 0x1C, 0x6D, 0x00, 0x3B, 0xEC, 0xDA, 0x3B, 0x1F, 0x27, 0x25, 0xCA, 0x59, 0x5D, 0xE0, 0xCA, 0x63, 0x32, 0x8F, 0x3B, 0xE5, 0x7C, 0xC9, 0x77, 0x55, 0x60, 0x11, 0x95, 0x14, 0x0D, 0xFB, 0x59, 0xD3, 0x9C, 0xE0, 0x91, 0x30, 0x8B, 0x41, 0x05, 0x74, 0x6D, 0xAC, 0x23, 0xD3, 0x3E, 0x5F, 0x7C, 0xE4, 0x84, 0x8D, 0xA3, 0x16, 0xA9, 0xC6, 0x6B, 0x95, 0x81, 0xBA, 0x35, 0x73, 0xBF, 0xAF, 0x31, 0x14, 0x96, 0x18, 0x8A, 0xB1, 0x54, 0x23, 0x28, 0x2E, 0xE4, 0x16, 0xDC, 0x2A, 0x19, 0xC5, 0x72, 0x4F, 0xA9, 0x1A, 0xE4, 0xAD, 0xC8, 0x8B, 0xC6, 0x67, 0x96, 0xEA, 0xE5, 0x67, 0x7A, 0x01, 0xF6, 0x4E, 0x8C, 0x08, 0x63, 0x13, 0x95, 0x82, 0x2D, 0x9D, 0xB8, 0xFC, 0xEE, 0x35, 0xC0, 0x6B, 0x1F, 0xEE, 0xA5, 0x47, 0x4D, 0x6D, 0x8F, 0x34, 0xB1, 0x53, 0x4A, 0x93, 0x6A, 0x18, 0xB0, 0xE0, 0xD2, 0x0E, 0xAB, 0x86, 0xBC, 0x9C, 0x6D, 0x6A, 0x52, 0x07, 0x19, 0x4E, 0x67, 0xFA, 0x35, 0x55, 0x1B, 0x56, 0x80, 0x26, 0x7B, 0x00, 0x64, 0x1C, 0x0F, 0x21, 0x2D, 0x18, 0xEC, 0xA8, 0xD7, 0x32, 0x7E, 0xD9, 0x1F, 0xE7, 0x64, 0xA8, 0x4E, 0xA1, 0xB4, 0x3F, 0xF5, 0xB4, 0xF6, 0xE8, 0xE6, 0x2F, 0x05, 0xC6, 0x61, 0xDE, 0xFB, 0x25, 0x88, 0x77, 0xC3, 0x5B, 0x18, 0xA1, 0x51, 0xD5, 0xC4, 0x14, 0xAA, 0xAD, 0x97, 0xBA, 0x3E, 0x49, 0x93, 0x32, 0xE5, 0x96, 0x07, 0x8E, 0x60, 0x0D, 0xEB, 0x81, 0x14, 0x9C, 0x44, 0x1C, 0xE9, 0x57, 0x82, 0xF2, 0x2A, 0x28, 0x25, 0x63, 0xC5, 0xBA, 0xC1, 0x41, 0x14, 0x23, 0x60, 0x5D, 0x1A, 0xE1, 0xAF, 0xAE, 0x2C, 0x8B, 0x06, 0x60, 0x23, 0x7E, 0xC1, 0x28, 0xAA, 0x0F, 0xE3, 0x46, 0x4E, 0x43, 0x58, 0x11, 0x5D, 0xB8, 0x4C, 0xC3, 0xB5, 0x23, 0x07, 0x3A, 0x28, 0xD4, 0x54, 0x98, 0x84, 0xB8, 0x1F, 0xF7, 0x0E, 0x10, 0xBF, 0x36, 0x1C, 0x13, 0x72, 0x96, 0x28, 0xD5, 0x34, 0x8F, 0x07, 0x21, 0x1E, 0x7E, 0x4C, 0xF4, 0xF1, 0x8B, 0x28, 0x60, 0x90, 0xBD, 0xB1, 0x24, 0x0B, 0x66, 0xD6, 0xCD, 0x4A, 0xFC, 0xEA, 0xDC, 0x00, 0xCA, 0x44, 0x6C, 0xE0, 0x50, 0x50, 0xFF, 0x18, 0x3A, 0xD2, 0xBB, 0xF1, 0x18, 0xC1, 0xFC, 0x0E, 0xA5, 0x1F, 0x97, 0xD2, 0x2B, 0x8F, 0x7E, 0x46, 0x70, 0x5D, 0x45, 0x27, 0xF4, 0x5B, 0x42, 0xAE, 0xFF, 0x39, 0x58, 0x53, 0x37, 0x6F, 0x69, 0x7D, 0xD5, 0xFD, 0xF2, 0xC5, 0x18, 0x7D, 0x7D, 0x5F, 0x0E, 0x2E, 0xB8, 0xD4, 0x3F, 0x17, 0xBA, 0x0F, 0x7C, 0x60, 0xFF, 0x43, 0x7F, 0x53, 0x5D, 0xFE, 0xF2, 0x98, 0x33, 0xBF, 0x86, 0xCB, 0xE8, 0x8E, 0xA4, 0xFB, 0xD4, 0x22, 0x1E, 0x84, 0x11, 0x72, 0x83, 0x54, 0xFA, 0x30, 0xA7, 0x00, 0x8F, 0x15, 0x4A, 0x41, 0xC7, 0xFC, 0x46, 0x6B, 0x46, 0x45, 0xDB, 0xE2, 0xE3, 0x21, 0x26, 0x7F, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF }; typedef struct { CRYPT_PKEY_ParaId id; const CRYPT_Data *p; const CRYPT_Data *q; const CRYPT_Data *g; } DH_PARA_VECTOR; static const CRYPT_Data G_VECTOR_RFC_3526_2409 = { .data = (uint8_t *)g_rfc3526_2409_primeG, .len = sizeof(g_rfc3526_2409_primeG) }; static const CRYPT_Data G_VECTOR_RFC_7919 = { .data = (uint8_t *)g_rfc7919G, .len = sizeof(g_rfc7919G) }; static const CRYPT_Data Q_VECTOR_RFC_3526_2409 = { .data = NULL, .len = 0 }; static const CRYPT_Data Q_VECTOR_RFC_7919_2048 = { .data = (uint8_t *)g_rfc7919_ffdhe2048Q, .len = sizeof(g_rfc7919_ffdhe2048Q) }; static const CRYPT_Data Q_VECTOR_RFC_7919_3072 = { .data = (uint8_t *)g_rfc7919_ffdhe3072Q, .len = sizeof(g_rfc7919_ffdhe3072Q) }; static const CRYPT_Data Q_VECTOR_RFC_7919_4096 = { .data = (uint8_t *)g_rfc7919_ffdhe4096Q, .len = sizeof(g_rfc7919_ffdhe4096Q) }; static const CRYPT_Data Q_VECTOR_RFC_7919_6144 = { .data = (uint8_t *)g_rfc7919_ffdhe6144Q, .len = sizeof(g_rfc7919_ffdhe6144Q) }; static const CRYPT_Data Q_VECTOR_RFC_7919_8192 = { .data = (uint8_t *)g_rfc7919_ffdhe8192Q, .len = sizeof(g_rfc7919_ffdhe8192Q) }; static const CRYPT_Data P_VECTORS_RFC2409_768 = { .data = (uint8_t *)g_rfc2409_prime768P, .len = sizeof(g_rfc2409_prime768P) }; static const CRYPT_Data P_VECTORS_RFC2409_1024 = { .data = (uint8_t *)g_rfc2409_prime1024P, .len = sizeof(g_rfc2409_prime1024P) }; static const CRYPT_Data P_VECTORS_RFC3526_1536 = { .data = (uint8_t *)g_rfc3526_prime1536P, .len = sizeof(g_rfc3526_prime1536P) }; static const CRYPT_Data P_VECTORS_RFC3526_2048 = { .data = (uint8_t *)g_rfc3526_prime2048P, .len = sizeof(g_rfc3526_prime2048P) }; static const CRYPT_Data P_VECTORS_RFC3526_3072 = { .data = (uint8_t *)g_rfc3526_prime3072P, .len = sizeof(g_rfc3526_prime3072P) }; static const CRYPT_Data P_VECTORS_RFC3526_4096 = { .data = (uint8_t *)g_rfc3526_prime4096P, .len = sizeof(g_rfc3526_prime4096P) }; static const CRYPT_Data P_VECTORS_RFC3526_6144 = { .data = (uint8_t *)g_rfc3526_prime6144P, .len = sizeof(g_rfc3526_prime6144P) }; static const CRYPT_Data P_VECTORS_RFC3526_8192 = { .data = (uint8_t *)g_rfc3526_prime8192P, .len = sizeof(g_rfc3526_prime8192P) }; static const CRYPT_Data P_VECTORS_RFC7919_2048 = { .data = (uint8_t *)g_rfc7919_ffdhe2048P, .len = sizeof(g_rfc7919_ffdhe2048P) }; static const CRYPT_Data P_VECTORS_RFC7919_3072 = { .data = (uint8_t *)g_rfc7919_ffdhe3072P, .len = sizeof(g_rfc7919_ffdhe3072P) }; static const CRYPT_Data P_VECTORS_RFC7919_4096 = { .data = (uint8_t *)g_rfc7919_ffdhe4096P, .len = sizeof(g_rfc7919_ffdhe4096P) }; static const CRYPT_Data P_VECTORS_RFC7919_6144 = { .data = (uint8_t *)g_rfc7919_ffdhe6144P, .len = sizeof(g_rfc7919_ffdhe6144P) }; static const CRYPT_Data P_VECTORS_RFC7919_8192 = { .data = (uint8_t *)g_rfc7919_ffdhe8192P, .len = sizeof(g_rfc7919_ffdhe8192P) }; static const DH_PARA_VECTOR DH_PARA_VECTORS[] = { { .id = CRYPT_DH_RFC2409_768, .p = &P_VECTORS_RFC2409_768, .g = &G_VECTOR_RFC_3526_2409, .q = &Q_VECTOR_RFC_3526_2409, }, { .id = CRYPT_DH_RFC2409_1024, .p = &P_VECTORS_RFC2409_1024, .g = &G_VECTOR_RFC_3526_2409, .q = &Q_VECTOR_RFC_3526_2409, }, { .id = CRYPT_DH_RFC3526_1536, .p = &P_VECTORS_RFC3526_1536, .g = &G_VECTOR_RFC_3526_2409, .q = &Q_VECTOR_RFC_3526_2409, }, { .id = CRYPT_DH_RFC3526_2048, .p = &P_VECTORS_RFC3526_2048, .g = &G_VECTOR_RFC_3526_2409, .q = &Q_VECTOR_RFC_3526_2409, }, { .id = CRYPT_DH_RFC3526_3072, .p = &P_VECTORS_RFC3526_3072, .g = &G_VECTOR_RFC_3526_2409, .q = &Q_VECTOR_RFC_3526_2409, }, { .id = CRYPT_DH_RFC3526_4096, .p = &P_VECTORS_RFC3526_4096, .g = &G_VECTOR_RFC_3526_2409, .q = &Q_VECTOR_RFC_3526_2409, }, { .id = CRYPT_DH_RFC3526_6144, .p = &P_VECTORS_RFC3526_6144, .g = &G_VECTOR_RFC_3526_2409, .q = &Q_VECTOR_RFC_3526_2409, }, { .id = CRYPT_DH_RFC3526_8192, .p = &P_VECTORS_RFC3526_8192, .g = &G_VECTOR_RFC_3526_2409, .q = &Q_VECTOR_RFC_3526_2409, }, { .id = CRYPT_DH_RFC7919_2048, .p = &P_VECTORS_RFC7919_2048, .g = &G_VECTOR_RFC_7919, .q = &Q_VECTOR_RFC_7919_2048, }, { .id = CRYPT_DH_RFC7919_3072, .p = &P_VECTORS_RFC7919_3072, .g = &G_VECTOR_RFC_7919, .q = &Q_VECTOR_RFC_7919_3072, }, { .id = CRYPT_DH_RFC7919_4096, .p = &P_VECTORS_RFC7919_4096, .g = &G_VECTOR_RFC_7919, .q = &Q_VECTOR_RFC_7919_4096, }, { .id = CRYPT_DH_RFC7919_6144, .p = &P_VECTORS_RFC7919_6144, .g = &G_VECTOR_RFC_7919, .q = &Q_VECTOR_RFC_7919_6144, }, { .id = CRYPT_DH_RFC7919_8192, .p = &P_VECTORS_RFC7919_8192, .g = &G_VECTOR_RFC_7919, .q = &Q_VECTOR_RFC_7919_8192, } }; static const DH_PARA_VECTOR *DhIdIsVaild(uint32_t id) { for (uint32_t i = 0; i < sizeof(DH_PARA_VECTORS) / sizeof(DH_PARA_VECTORS[0]); i++) { if (id == DH_PARA_VECTORS[i].id) { return &DH_PARA_VECTORS[i]; } } return NULL; } CRYPT_DH_Para *CRYPT_DH_NewParaById(CRYPT_PKEY_ParaId id) { CRYPT_DH_Para *retPara = NULL; const DH_PARA_VECTOR *vector = DhIdIsVaild(id); if (vector == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return NULL; } CRYPT_DhPara para; para.p = vector->p->data; para.pLen = vector->p->len; para.q = vector->q->data; para.qLen = vector->q->len; para.g = vector->g->data; para.gLen = vector->g->len; retPara = CRYPT_DH_NewPara(&para); if (retPara == NULL) { goto ERR; } retPara->id = id; static const uint32_t list[] = { CRYPT_DH_RFC3526_1536, CRYPT_DH_RFC3526_2048, CRYPT_DH_RFC3526_3072, CRYPT_DH_RFC3526_4096, CRYPT_DH_RFC3526_6144, CRYPT_DH_RFC3526_8192, }; for (uint32_t i = 0; i < sizeof(list) / sizeof(list[0]); i++) { if (id == list[i]) { /** * NIST.SP.800-56Ar3 * Appendix D * Finite Field Cryptography Groups for Key Establishment: The following safe-prime * groups are defined in RFC 3526 and RFC 7919 for use with key-agreement schemes that * employ either the FFC DH or FFC MQV primitives. * The domain parameters for these groups have the form ( p, q = (p − 1)/2, g = 2 ); the explicit * values for p are provided in the RFCs */ retPara->q = BN_Dup(retPara->p); if (retPara->q == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_CREATE_PARA_FAIL); goto ERR; } // Shift to the right by 1 bit: q = (p-1)/2 if (BN_Rshift(retPara->q, retPara->q, 1) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_DH_CREATE_PARA_FAIL); goto ERR; } break; } } return retPara; ERR: CRYPT_DH_FreePara(retPara); return NULL; } CRYPT_PKEY_ParaId CRYPT_DH_GetParaId(const CRYPT_DH_Ctx *ctx) { if (ctx == NULL || ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_PKEY_PARAID_MAX; } return ctx->para->id; } #endif /* HITLS_CRYPTO_DH */
2401_83913325/openHiTLS-examples_7925
crypto/dh/src/dh_para.c
C
unknown
67,041
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_DRBG_H #define CRYPT_DRBG_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_DRBG #include <stdint.h> #include <stdbool.h> #include "crypt_types.h" #include "crypt_local_types.h" #ifdef __cplusplus extern "C" { #endif // hlcheck : health testing // pr : prediction_resistance typedef struct DrbgCtx DRBG_Ctx; #define DRBG_MAX_LEN (0x7ffffff0) #define DRBG_MAX_REQUEST (1 << 16) #ifndef DRBG_MAX_RESEED_INTERVAL #define DRBG_MAX_RESEED_INTERVAL (10000) #endif /* Default reseed intervals */ # define DRBG_RESEED_INTERVAL (1 << 8) # define DRBG_TIME_INTERVAL (60 * 60) /* 1 hour */ #ifndef DRBG_MAX_REQUEST_SM3 #define DRBG_MAX_REQUEST_SM3 (1 << 5) #endif #ifndef DRBG_MAX_REQUEST_SM4 #define DRBG_MAX_REQUEST_SM4 (1 << 4) #endif #ifndef DRBG_RESEED_INTERVAL_GM1 #define DRBG_RESEED_INTERVAL_GM1 (1 << 20) #endif #ifndef DRBG_RESEED_TIME_GM1 #define DRBG_RESEED_TIME_GM1 (600) #endif #ifndef DRBG_RESEED_INTERVAL_GM2 #define DRBG_RESEED_INTERVAL_GM2 (1 << 10) #endif #ifndef DRBG_RESEED_TIME_GM2 #define DRBG_RESEED_TIME_GM2 (60) #endif #ifndef HITLS_CRYPTO_DRBG_GM_LEVEL #define HITLS_CRYPTO_DRBG_GM_LEVEL 2 #endif #ifndef HITLS_CRYPTO_RESEED_INTERVAL_GM #if HITLS_CRYPTO_DRBG_GM_LEVEL == 1 #define HITLS_CRYPTO_RESEED_INTERVAL_GM DRBG_RESEED_INTERVAL_GM1 #else #define HITLS_CRYPTO_RESEED_INTERVAL_GM DRBG_RESEED_INTERVAL_GM2 #endif #endif #ifdef HITLS_CRYPTO_ENTROPY #ifndef HITLS_SEED_DRBG_INIT_RAND_ALG #ifdef HITLS_CRYPTO_AES #define HITLS_SEED_DRBG_INIT_RAND_ALG CRYPT_RAND_AES256_CTR #else #error "HITLS_SEED_DRBG_INIT_RAND_ALG configuration error." #endif #endif #endif #ifndef HITLS_CRYPTO_DRBG_RESEED_TIME_GM #if HITLS_CRYPTO_DRBG_GM_LEVEL == 1 #define HITLS_CRYPTO_DRBG_RESEED_TIME_GM DRBG_RESEED_TIME_GM1 #else #define HITLS_CRYPTO_DRBG_RESEED_TIME_GM DRBG_RESEED_TIME_GM2 #endif #endif #define DRBG_HASH_MAX_MDSIZE (64) #define RAND_TYPE_MD 1 #define RAND_TYPE_MAC 2 #define RAND_TYPE_AES 3 #define RAND_TYPE_AES_DF 4 #define RAND_TYPE_SM4_DF 5 typedef struct { CRYPT_RAND_AlgId drbgId; int32_t depId; uint32_t type; } DrbgIdMap; /** * @ingroup drbg * @brief Apply for a context for the DRBG. * @brief This API does not support multiple threads. * * @param libCtx Library context * @param algId Algorithm ID for the DRBG * @param param DRBG parameters * * @retval DRBG_Ctx* Success * @retval NULL Failure */ DRBG_Ctx *DRBG_New(void *libCtx, int32_t algId, BSL_Param *param); /** * @ingroup drbg * @brief Release the DRBG context. * @brief This API does not support multiple threads. * * @param ctx DRBG context * * @retval None */ void DRBG_Free(DRBG_Ctx *ctx); /** * @ingroup drbg * @brief Instantiating a DRBG based on personalization string. * @brief This API does not support multiple threads. * * @param ctx DRBG context * @param person Personalization string. The personalization string can be NULL. * @param persLen Personalization string length, * @param param DRBG parameters,Not in use yet * * @retval CRYPT_SUCCESS Instantiation succeeded. * @retval CRYPT_NULL_INPUT Invalid null pointer * @retval CRYPT_DRBG_ERR_STATE The DRBG status is incorrect. * @retval CRYPT_DRBG_FAIL_GET_ENTROPY Failed to obtain the entropy. * @retval CRYPT_DRBG_FAIL_GET_NONCE Failed to obtain the nonce. * @retval Hash function error code: Failed to invoke the hash function. */ int32_t DRBG_Instantiate(DRBG_Ctx *ctx, const uint8_t *person, uint32_t persLen, BSL_Param *param); /** * @ingroup drbg * @brief Reseeding the DRBG. * @brief The additional input can be NULL. This API does not support multiple threads. * * @param ctx DRBG context * @param adin Additional input. The data can be empty. * @param adinLen Additional input length * @param param DRBG parameters,Not in use yet * * @retval CRYPT_SUCCESS Instantiation succeeded. * @retval CRYPT_NULL_INPUT Invalid null pointer * @retval CRYPT_DRBG_ERR_STATE The DRBG status is incorrect. * @retval CRYPT_DRBG_FAIL_GET_ENTROPY Failed to obtain the entropy. * @retval Hash function error code: Failed to invoke the hash function. */ int32_t DRBG_Reseed(DRBG_Ctx *ctx, const uint8_t *adin, uint32_t adinLen, BSL_Param *param); /** * @ingroup drbg * @brief Generating pseudorandom bits using a DRBG. * @brief The additional input can be null. The user specifies the additional obfuscation data. * This API does not support multiple threads. * @brief External invoking must have a recovery mechanism after the status is abnormal. * * @param ctx DRBG context * @param out Output BUF * @param outLen Output length * @param adin Additional input. The data can be empty. * @param adinLen Additional input length * @param param DRBG parameters,involve: * pr Predicted resistance. If this parameter is set to true, reseed is executed each time. * * @retval CRYPT_SUCCESS Instantiation succeeded. * @retval CRYPT_NULL_INPUT Invalid null pointer * @retval CRYPT_DRBG_ERR_STATE The DRBG status is incorrect. * @retval Hash function error code: Failed to invoke the hash function. */ int32_t DRBG_GenerateBytes(DRBG_Ctx *ctx, uint8_t *out, uint32_t outLen, const uint8_t *adin, uint32_t adinLen, BSL_Param *param); /** * @ingroup drbg * @brief Remove the DRBG instantiation * @brief This API does not support multiple threads. * * @param ctx DRBG context * * @retval CRYPT_SUCCESS Removed successfully. * @retval CRYPT_NULL_INPUT Invalid null pointer */ int32_t DRBG_Uninstantiate(DRBG_Ctx *ctx); /** * @ingroup drbg * @brief get or set drbg param * * @param ctx [IN] drbg context * @param cmd [IN] Option information * @param val [IN/OUT] Data to be set/obtained * @param valLen [IN] Length of the data marked as "val" * * @retval #CRYPT_SUCCESS. * For other error codes, see crypt_errno.h. */ int32_t DRBG_Ctrl(DRBG_Ctx *ctx, int32_t cmd, void *val, uint32_t valLen); /** * @ingroup drbg * @brief Get the map corresponding to the algid. * * @param id enum of CRYPT_RAND_AlgId * * @retval DrbgIdMap * @retval NULL Invalid arguments */ const DrbgIdMap *DRBG_GetIdMap(CRYPT_RAND_AlgId id); #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_DRBG #endif // CRYPT_DRBG_H
2401_83913325/openHiTLS-examples_7925
crypto/drbg/include/crypt_drbg.h
C
unknown
7,080
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_DRBG #include <stdlib.h> #include <stdbool.h> #include <securec.h> #include "crypt_types.h" #include "crypt_errno.h" #include "crypt_utils.h" #include "crypt_ealinit.h" #include "eal_entropy.h" #include "bsl_err_internal.h" #include "drbg_local.h" #include "crypt_drbg_local.h" #include "bsl_params.h" #include "crypt_params_key.h" #define DRBG_NONCE_FROM_ENTROPY (2) // According to the definition of DRBG_Ctx, ctx->seedMeth is not NULL static void DRBG_CleanEntropy(DRBG_Ctx *ctx, CRYPT_Data *entropy) { CRYPT_RandSeedMethod *seedMeth = NULL; if (ctx == NULL || CRYPT_IsDataNull(entropy)) { return; } seedMeth = &ctx->seedMeth; if (seedMeth->cleanEntropy != NULL) { seedMeth->cleanEntropy(ctx->seedCtx, entropy); } entropy->data = NULL; entropy->len = 0; return; } // According to the definition of DRBG_Ctx, ctx->seedMeth is not NULL static int32_t DRBG_GetEntropy(DRBG_Ctx *ctx, CRYPT_Data *entropy, bool addEntropy) { int32_t ret; CRYPT_RandSeedMethod *seedMeth = NULL; CRYPT_Range entropyRange = ctx->entropyRange; uint32_t strength = ctx->strength; seedMeth = &ctx->seedMeth; if (addEntropy) { strength += strength / DRBG_NONCE_FROM_ENTROPY; entropyRange.min += ctx->nonceRange.min; entropyRange.max += ctx->nonceRange.max; } if (seedMeth->getEntropy == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_ENTROPY); return CRYPT_DRBG_FAIL_GET_ENTROPY; } // CPRNG is implemented by hooks, in DRBG, the CPRNG is not verified, // but only the entropy source pointer and its length are verified. ret = seedMeth->getEntropy(ctx->seedCtx, entropy, strength, &entropyRange); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_ENTROPY); return CRYPT_DRBG_FAIL_GET_ENTROPY; } if (CRYPT_CHECK_DATA_INVALID(entropy)) { goto ERR; } if (!CRYPT_IN_RANGE(entropy->len, &entropyRange)) { goto ERR; } return CRYPT_SUCCESS; ERR: DRBG_CleanEntropy(ctx, entropy); BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_ENTROPY); return CRYPT_DRBG_FAIL_GET_ENTROPY; } // According to the definition of DRBG_Ctx, ctx->seedMeth is not NULL static void DRBG_CleanNonce(DRBG_Ctx *ctx, CRYPT_Data *nonce) { CRYPT_RandSeedMethod *seedMeth = NULL; if (ctx == NULL || CRYPT_IsDataNull(nonce)) { return; } seedMeth = &ctx->seedMeth; if (seedMeth->cleanNonce != NULL) { seedMeth->cleanNonce(ctx->seedCtx, nonce); } nonce->data = NULL; nonce->len = 0; return; } // According to the definition of DRBG_Ctx, ctx->seedMeth is not NULL static int32_t DRBG_GetNonce(DRBG_Ctx *ctx, CRYPT_Data *nonce, bool *addEntropy) { int32_t ret; CRYPT_RandSeedMethod *seedMeth = NULL; seedMeth = &ctx->seedMeth; // Allowed nonce which entered by the user can be NULL. // In this case, set *addEntropy to true to obtain the nonce from the entropy. if (seedMeth->getNonce == NULL || ctx->nonceRange.max == 0) { if (ctx->nonceRange.min > 0) { *addEntropy = true; } return CRYPT_SUCCESS; } ret = seedMeth->getNonce(ctx->seedCtx, nonce, ctx->strength, &ctx->nonceRange); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_NONCE); return CRYPT_DRBG_FAIL_GET_NONCE; } if (CRYPT_CHECK_DATA_INVALID(nonce)) { goto ERR; } if (!CRYPT_IN_RANGE(nonce->len, &ctx->nonceRange)) { goto ERR; } return CRYPT_SUCCESS; ERR: DRBG_CleanNonce(ctx, nonce); BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_NONCE); return CRYPT_DRBG_FAIL_GET_NONCE; } #ifdef HITLS_CRYPTO_DRBG_CTR #define RAND_AES128_KEYLEN 16 #define RAND_AES192_KEYLEN 24 #define RAND_AES256_KEYLEN 32 #define RAND_SM4_KEYLEN 16 static int32_t GetCipherKeyLen(int32_t id, uint32_t *keyLen) { switch (id) { case CRYPT_CIPHER_AES128_CTR: *keyLen = RAND_AES128_KEYLEN; break; case CRYPT_CIPHER_AES192_CTR: *keyLen = RAND_AES192_KEYLEN; break; case CRYPT_CIPHER_AES256_CTR: *keyLen = RAND_AES256_KEYLEN; break; case CRYPT_CIPHER_SM4_CTR: *keyLen = RAND_SM4_KEYLEN; break; default: BSL_ERR_PUSH_ERROR(CRYPT_DRBG_ALG_NOT_SUPPORT); return CRYPT_DRBG_ALG_NOT_SUPPORT; } return CRYPT_SUCCESS; } #endif static int32_t DRBG_Restart(DRBG_Ctx *ctx) { if (ctx->state == DRBG_STATE_ERROR) { (void)DRBG_Uninstantiate(ctx); } if (ctx->state == DRBG_STATE_UNINITIALISED) { int32_t ret = DRBG_Instantiate(ctx, NULL, 0, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } return CRYPT_SUCCESS; } DRBG_Ctx *DRBG_New(void *libCtx, int32_t algId, BSL_Param *param) { int32_t ret; (void)libCtx; CRYPT_RandSeedMethod seedMethArray = {0}; CRYPT_RandSeedMethod *seedMeth = &seedMethArray; void *seedCtx = NULL; const BSL_Param *temp = NULL; if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_RAND_SEED_GETENTROPY)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_GETENTROPY, BSL_PARAM_TYPE_FUNC_PTR, (void **)&(seedMethArray.getEntropy), NULL), ret); } if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_RAND_SEED_CLEANENTROPY)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_CLEANENTROPY, BSL_PARAM_TYPE_FUNC_PTR, (void **)&(seedMethArray.cleanEntropy), NULL), ret); } if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_RAND_SEED_GETNONCE)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_GETNONCE, BSL_PARAM_TYPE_FUNC_PTR, (void **)&(seedMethArray.getNonce), NULL), ret); } if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_RAND_SEED_CLEANNONCE)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_CLEANNONCE, BSL_PARAM_TYPE_FUNC_PTR, (void **)&(seedMethArray.cleanNonce), NULL), ret); } if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_RAND_SEEDCTX)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEEDCTX, BSL_PARAM_TYPE_CTX_PTR, &seedCtx, NULL), ret); } DRBG_Ctx *drbg = NULL; EAL_RandMethLookup lu = { 0 }; if (EAL_RandFindMethod(algId, &lu) != CRYPT_SUCCESS) { return NULL; } switch (lu.type) { #ifdef HITLS_CRYPTO_DRBG_HASH case RAND_TYPE_MD: drbg = DRBG_NewHashCtx((const EAL_MdMethod *)(lu.method), algId == CRYPT_RAND_SM3, seedMeth, seedCtx); break; #endif #ifdef HITLS_CRYPTO_DRBG_HMAC case RAND_TYPE_MAC: drbg = DRBG_NewHmacCtx(libCtx, (const EAL_MacMethod *)(lu.method), lu.methodId, seedMeth, seedCtx); break; #endif #ifdef HITLS_CRYPTO_DRBG_CTR case RAND_TYPE_SM4_DF: case RAND_TYPE_AES: case RAND_TYPE_AES_DF: { bool isUsedDF = (lu.type == RAND_TYPE_AES_DF || lu.type == RAND_TYPE_SM4_DF) ? true : false; uint32_t keyLen; if (GetCipherKeyLen(lu.methodId, &keyLen) != CRYPT_SUCCESS) { return NULL; } drbg = DRBG_NewCtrCtx((const EAL_SymMethod *)(lu.method), keyLen, algId == CRYPT_RAND_SM4_CTR_DF, isUsedDF, seedMeth, seedCtx); break; } #endif default: BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return NULL; } return drbg; ERR: return NULL; } void DRBG_Free(DRBG_Ctx *ctx) { if (ctx == NULL || ctx->meth == NULL || ctx->meth->free == NULL) { return; } void (*ctxFree)(DRBG_Ctx *ctx) = ctx->meth->free; DRBG_Uninstantiate(ctx); ctxFree(ctx); return; } int32_t DRBG_Instantiate(DRBG_Ctx *ctx, const uint8_t *person, uint32_t persLen, BSL_Param *param) { (void) param; int32_t ret; CRYPT_Data entropy = {NULL, 0}; CRYPT_Data nonce = {NULL, 0}; CRYPT_Data pers = {(uint8_t *)(uintptr_t)person, persLen}; bool addEntropy = false; if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (CRYPT_CHECK_DATA_INVALID(&pers)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (persLen > ctx->maxPersLen) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_INVALID_LEN); return CRYPT_DRBG_INVALID_LEN; } if (ctx->state != DRBG_STATE_UNINITIALISED) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_ERR_STATE); return CRYPT_DRBG_ERR_STATE; } ctx->state = DRBG_STATE_ERROR; ret = DRBG_GetNonce(ctx, &nonce, &addEntropy); if (ret != CRYPT_SUCCESS) { goto ERR_NONCE; } ret = DRBG_GetEntropy(ctx, &entropy, addEntropy); if (ret != CRYPT_SUCCESS) { goto ERR_ENTROPY; } ret = ctx->meth->instantiate(ctx, &entropy, &nonce, &pers); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR_ENTROPY; } ctx->state = DRBG_STATE_READY; ctx->reseedCtr = 1; #if defined(HITLS_CRYPTO_DRBG_GM) if (ctx->reseedIntervalTime != 0) { ctx->lastReseedTime = BSL_SAL_CurrentSysTimeGet(); } #endif ERR_ENTROPY: DRBG_CleanEntropy(ctx, &entropy); ERR_NONCE: DRBG_CleanNonce(ctx, &nonce); return ret; } static inline bool DRBG_IsNeedReseed(const DRBG_Ctx *ctx, bool pr) { if (pr) { return true; } if (ctx->reseedCtr > ctx->reseedInterval) { return true; } #if defined(HITLS_CRYPTO_DRBG_GM) if (ctx->reseedIntervalTime != 0) { int64_t time = BSL_SAL_CurrentSysTimeGet(); return ((time - ctx->lastReseedTime) > ctx->reseedIntervalTime) ? true : false; } #endif return false; } int32_t DRBG_Reseed(DRBG_Ctx *ctx, const uint8_t *adin, uint32_t adinLen, BSL_Param *param) { (void) param; int32_t ret; CRYPT_Data entropy = {NULL, 0}; CRYPT_Data adinData = {(uint8_t*)(uintptr_t)adin, adinLen}; if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (CRYPT_CHECK_BUF_INVALID(adin, adinLen)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (adinLen > ctx->maxAdinLen) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_INVALID_LEN); return CRYPT_DRBG_INVALID_LEN; } if (ctx->state != DRBG_STATE_READY) { if (DRBG_Restart(ctx) != CRYPT_SUCCESS) { return CRYPT_DRBG_ERR_STATE; } } ctx->state = DRBG_STATE_ERROR; ret = DRBG_GetEntropy(ctx, &entropy, false); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = ctx->meth->reseed(ctx, &entropy, &adinData); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ctx->reseedCtr = 1; #if defined(HITLS_CRYPTO_DRBG_GM) if (ctx->reseedIntervalTime != 0) { ctx->lastReseedTime = BSL_SAL_CurrentSysTimeGet(); } #endif ctx->state = DRBG_STATE_READY; ERR: DRBG_CleanEntropy(ctx, &entropy); return ret; } int32_t DRBG_Generate(DRBG_Ctx *ctx, uint8_t *out, uint32_t outLen, const uint8_t *adin, uint32_t adinLen, bool pr) { int32_t ret; CRYPT_Data adinData = {(uint8_t*)(uintptr_t)adin, adinLen}; if (CRYPT_CHECK_BUF_INVALID(adin, adinLen)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (outLen > ctx->maxRequest || adinLen > ctx->maxAdinLen) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_INVALID_LEN); return CRYPT_DRBG_INVALID_LEN; } if (ctx->state != DRBG_STATE_READY) { if (DRBG_Restart(ctx) != CRYPT_SUCCESS) { return CRYPT_DRBG_ERR_STATE; } } if (DRBG_IsNeedReseed(ctx, pr)) { ret = DRBG_Reseed(ctx, adin, adinLen, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } adinData.data = NULL; adinData.len = 0; } ret = ctx->meth->generate(ctx, out, outLen, &adinData); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ctx->reseedCtr++; return ret; } int32_t DRBG_GenerateBytes(DRBG_Ctx *ctx, uint8_t *out, uint32_t outLen, const uint8_t *adin, uint32_t adinLen, BSL_Param *param) { if (ctx == NULL || out == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret; bool pr = ctx->predictionResistance; const BSL_Param *temp = NULL; if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_RAND_PR)) != NULL) { uint32_t boolSize = sizeof(bool); ret = BSL_PARAM_GetValue(temp, CRYPT_PARAM_RAND_PR, BSL_PARAM_TYPE_BOOL, (void *)&pr, &boolSize); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } uint32_t block = ctx->maxRequest; if (block == 0) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } for (uint32_t leftLen = outLen; leftLen > 0; leftLen -= block, out += block) { block = leftLen > block ? block : leftLen; ret = DRBG_Generate(ctx, out, block, adin, adinLen, pr); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } return CRYPT_SUCCESS; } int32_t DRBG_Uninstantiate(DRBG_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } ctx->meth->uninstantiate(ctx); ctx->reseedCtr = 0; ctx->state = DRBG_STATE_UNINITIALISED; return CRYPT_SUCCESS; } #if defined(HITLS_CRYPTO_DRBG_GM) static int32_t DRBG_SetGmlevel(DRBG_Ctx *ctx, const void *val, uint32_t len) { if (val == NULL || len != sizeof(uint32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } if (*(const uint32_t *)val == 1) { ctx->reseedInterval = DRBG_RESEED_INTERVAL_GM1; ctx->reseedIntervalTime = DRBG_RESEED_TIME_GM1; } else { ctx->reseedInterval = DRBG_RESEED_INTERVAL_GM2; ctx->reseedIntervalTime = DRBG_RESEED_TIME_GM2; } return CRYPT_SUCCESS; } static int32_t DRBG_SetReseedIntervalTime(DRBG_Ctx *ctx, const void *val, uint32_t len) { if (val == NULL || len != sizeof(uint64_t)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } ctx->reseedIntervalTime = *(const uint64_t *)val; return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_DRBG_GM static int32_t DRBG_SetReseedInterval(DRBG_Ctx *ctx, const void *val, uint32_t len) { if (val == NULL || len != sizeof(uint32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } ctx->reseedInterval = *(const uint32_t *)val; return CRYPT_SUCCESS; } static int32_t DRBG_SetPredictionResistance(DRBG_Ctx *ctx, const void *val, uint32_t len) { if (val == NULL || len != sizeof(bool)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } ctx->predictionResistance = *(const bool *)val; return CRYPT_SUCCESS; } int32_t DRBG_Ctrl(DRBG_Ctx *ctx, int32_t opt, void *val, uint32_t len) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } switch (opt) { #if defined(HITLS_CRYPTO_DRBG_GM) case CRYPT_CTRL_SET_GM_LEVEL: return DRBG_SetGmlevel(ctx, val, len); case CRYPT_CTRL_SET_RESEED_TIME: return DRBG_SetReseedIntervalTime(ctx, val, len); #endif // HITLS_CRYPTO_DRBG_GM case CRYPT_CTRL_SET_RESEED_INTERVAL: return DRBG_SetReseedInterval(ctx, val, len); case CRYPT_CTRL_SET_PREDICTION_RESISTANCE: return DRBG_SetPredictionResistance(ctx, val, len); default: break; } BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } static const DrbgIdMap DRBG_METHOD_MAP[] = { #if defined(HITLS_CRYPTO_DRBG_HASH) { CRYPT_RAND_SHA1, CRYPT_MD_SHA1, RAND_TYPE_MD }, { CRYPT_RAND_SHA224, CRYPT_MD_SHA224, RAND_TYPE_MD }, { CRYPT_RAND_SHA256, CRYPT_MD_SHA256, RAND_TYPE_MD }, { CRYPT_RAND_SHA384, CRYPT_MD_SHA384, RAND_TYPE_MD }, { CRYPT_RAND_SHA512, CRYPT_MD_SHA512, RAND_TYPE_MD }, #ifdef HITLS_CRYPTO_DRBG_GM { CRYPT_RAND_SM3, CRYPT_MD_SM3, RAND_TYPE_MD }, #endif #endif #if defined(HITLS_CRYPTO_DRBG_HMAC) { CRYPT_RAND_HMAC_SHA1, CRYPT_MAC_HMAC_SHA1, RAND_TYPE_MAC }, { CRYPT_RAND_HMAC_SHA224, CRYPT_MAC_HMAC_SHA224, RAND_TYPE_MAC }, { CRYPT_RAND_HMAC_SHA256, CRYPT_MAC_HMAC_SHA256, RAND_TYPE_MAC }, { CRYPT_RAND_HMAC_SHA384, CRYPT_MAC_HMAC_SHA384, RAND_TYPE_MAC }, { CRYPT_RAND_HMAC_SHA512, CRYPT_MAC_HMAC_SHA512, RAND_TYPE_MAC }, #endif #if defined(HITLS_CRYPTO_DRBG_CTR) { CRYPT_RAND_AES128_CTR, CRYPT_CIPHER_AES128_CTR, RAND_TYPE_AES }, { CRYPT_RAND_AES192_CTR, CRYPT_CIPHER_AES192_CTR, RAND_TYPE_AES }, { CRYPT_RAND_AES256_CTR, CRYPT_CIPHER_AES256_CTR, RAND_TYPE_AES }, { CRYPT_RAND_AES128_CTR_DF, CRYPT_CIPHER_AES128_CTR, RAND_TYPE_AES_DF }, { CRYPT_RAND_AES192_CTR_DF, CRYPT_CIPHER_AES192_CTR, RAND_TYPE_AES_DF }, { CRYPT_RAND_AES256_CTR_DF, CRYPT_CIPHER_AES256_CTR, RAND_TYPE_AES_DF }, #ifdef HITLS_CRYPTO_DRBG_GM { CRYPT_RAND_SM4_CTR_DF, CRYPT_CIPHER_SM4_CTR, RAND_TYPE_SM4_DF } #endif #endif }; const DrbgIdMap *DRBG_GetIdMap(CRYPT_RAND_AlgId id) { uint32_t num = sizeof(DRBG_METHOD_MAP) / sizeof(DRBG_METHOD_MAP[0]); for (uint32_t i = 0; i < num; i++) { if (DRBG_METHOD_MAP[i].drbgId == id) { return &DRBG_METHOD_MAP[i]; } } return NULL; } #endif /* HITLS_CRYPTO_DRBG */
2401_83913325/openHiTLS-examples_7925
crypto/drbg/src/drbg.c
C
unknown
18,553
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_DRBG_CTR #include <stdlib.h> #include <securec.h> #include "crypt_errno.h" #include "crypt_local_types.h" #include "crypt_utils.h" #include "bsl_sal.h" #include "crypt_types.h" #include "bsl_err_internal.h" #include "drbg_local.h" #define DRBG_CTR_MAX_KEYLEN (32) #define AES_BLOCK_LEN (16) #define DRBG_CTR_MAX_SEEDLEN (48) #define DRBG_CTR_MIN_ENTROPYLEN (32) typedef struct { uint8_t k[DRBG_CTR_MAX_KEYLEN]; // DRBG_CTR_MAX_KEYLEN 32 uint8_t v[AES_BLOCK_LEN]; // AES_BLOCK_LEN 16 (blockLen) uint8_t kx[DRBG_CTR_MAX_SEEDLEN]; // DRBG_CTR_MAX_SEEDLEN 48 uint32_t keyLen; uint32_t seedLen; const EAL_SymMethod *ciphMeth; void *ctrCtx; void *dfCtx; bool isUsedDf; } DRBG_CtrCtx; static void DRBG_CtrXor(CRYPT_Data *dst, const CRYPT_Data *src) { uint32_t xorlen; if (CRYPT_IsDataNull(dst) || CRYPT_IsDataNull(src)) { return; } xorlen = (dst->len > src->len) ? src->len : dst->len; DATA_XOR(dst->data, src->data, dst->data, xorlen); } static void DRBG_CtrInc(uint8_t *v, uint32_t len) { uint32_t i; uint8_t *p = v + len - 1; for (i = 0; i < len; i++, p--) { (*p)++; if (*p != 0) { break; } } } int32_t DRBG_CtrUpdate(DRBG_Ctx *drbg, const CRYPT_Data *in1, const CRYPT_Data *in2) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; const EAL_SymMethod *ciphMeth = ctx->ciphMeth; int32_t ret; uint8_t tempData[DRBG_CTR_MAX_SEEDLEN]; CRYPT_Data temp; uint32_t offset; if ((ret = ciphMeth->setEncryptKey(ctx->ctrCtx, ctx->k, ctx->keyLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } /** While (len (temp) < seedlen) do If ctr_len < blocklen inc = (rightmost (V, ctr_len) + 1) mod 2ctr_len . V = leftmost (V, blocklen-ctr_len) || inc. Else V = (V+1) mod 2blocklen . output_block = Block_Encrypt (Key, V). temp = temp || output_block. */ for (offset = 0; offset < ctx->seedLen; offset += AES_BLOCK_LEN) { DRBG_CtrInc(ctx->v, AES_BLOCK_LEN); if ((ret = ciphMeth->encryptBlock(ctx->ctrCtx, ctx->v, tempData + offset, AES_BLOCK_LEN)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } } // temp = temp ⊕ provided_data temp.data = tempData; temp.len = ctx->seedLen; DRBG_CtrXor(&temp, in1); DRBG_CtrXor(&temp, in2); // Key = leftmost (temp, keylen). V = rightmost (temp, blocklen). if (memcpy_s(ctx->k, DRBG_CTR_MAX_KEYLEN, temp.data, ctx->keyLen) != EOK) { BSL_ERR_PUSH_ERROR(CRYPT_SECUREC_FAIL); ret = CRYPT_SECUREC_FAIL; goto EXIT; } // The length to be copied of ctx->V is AES_BLOCK_LEN, which is also the array length. // The lower bits of temp.data are used for ctx->K, and the upper bits are used for ctx->V. (void)memcpy_s(ctx->v, AES_BLOCK_LEN, temp.data + ctx->keyLen, AES_BLOCK_LEN); EXIT: ciphMeth->cipherDeInitCtx(ctx->ctrCtx); return ret; } // BCC implementation, BCC is CBC-MAC: CBC encryption + IV(0) + last ciphertext returned. static int32_t DRBG_CtrBCCUpdateBlock(DRBG_Ctx *drbg, const uint8_t *in, uint8_t *out, uint32_t len) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; int32_t ret; /** 4. For i = 1 to n do 4.1 input_block = chaining_value ⊕ blocki. 4.2 chaining_value = Block_Encrypt (Key, input_block). */ DATA_XOR(out, in, out, len); if ((ret = ctx->ciphMeth->encryptBlock(ctx->dfCtx, out, out, AES_BLOCK_LEN)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); ctx->ciphMeth->cipherDeInitCtx(ctx->dfCtx); } return ret; } static int32_t DRBG_CtrBCCInit(DRBG_Ctx *drbg) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; uint8_t *out = ctx->kx; int32_t ret = CRYPT_SUCCESS; uint8_t in[16] = { 0 }; uint32_t offset = 0; while (offset < ctx->seedLen) { if ((ret = DRBG_CtrBCCUpdateBlock(drbg, in, out + offset, AES_BLOCK_LEN)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } in[3]++; // Each cycle is incremented by 1 at the 3rd position. offset += AES_BLOCK_LEN; } return ret; } static int32_t DRBG_CtrBCCUpdateKX(DRBG_Ctx *drbg, const uint8_t *in) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; uint8_t *out = ctx->kx; int32_t ret = CRYPT_SUCCESS; uint32_t offset = 0; while (offset < ctx->seedLen) { if ((ret = DRBG_CtrBCCUpdateBlock(drbg, in, out + offset, AES_BLOCK_LEN)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } offset += AES_BLOCK_LEN; } return ret; } // Temporary block storage used by ctr_df static int32_t DRBG_CtrBCCUpdate(DRBG_Ctx *drbg, const CRYPT_Data *in, uint8_t temp[16], uint32_t *tempLen) { uint32_t dataLeft; uint32_t offset = 0; uint32_t tempPos = *tempLen; int32_t ret = CRYPT_SUCCESS; if (CRYPT_IsDataNull(in) || in->len == 0) { return ret; } dataLeft = in->len; do { const uint32_t left = AES_BLOCK_LEN - tempPos; const uint32_t cpyLen = (left > dataLeft) ? dataLeft : left; if (memcpy_s(temp + tempPos, left, in->data + offset, cpyLen) != EOK) { BSL_ERR_PUSH_ERROR(CRYPT_SECUREC_FAIL); return CRYPT_SECUREC_FAIL; } if (left == cpyLen) { if ((ret = DRBG_CtrBCCUpdateKX(drbg, temp)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } tempPos = 0; } else { tempPos += cpyLen; } dataLeft -= cpyLen; offset += cpyLen; } while (dataLeft > 0); *tempLen = tempPos; return ret; } static int32_t DRBG_CtrBCCFinal(DRBG_Ctx *drbg, uint8_t temp[16], uint32_t tempLen) { int32_t ret; uint32_t i; for (i = tempLen; i < AES_BLOCK_LEN; i++) { temp[i] = 0; } if ((ret = DRBG_CtrBCCUpdateKX(drbg, temp)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t BlockCipherDfCal(DRBG_Ctx *drbg, CRYPT_Data *out) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; const EAL_SymMethod *ciphMeth = ctx->ciphMeth; int32_t ret; uint32_t kOffset = 0; uint32_t vOffset = ctx->keyLen; /* Set up key K */ if ((ret = ciphMeth->setEncryptKey(ctx->ctrCtx, ctx->kx, ctx->keyLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } while (kOffset < ctx->seedLen) { ret = ciphMeth->encryptBlock(ctx->ctrCtx, ctx->kx + vOffset, ctx->kx + kOffset, AES_BLOCK_LEN); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } vOffset = kOffset; kOffset += AES_BLOCK_LEN; } out->data = ctx->kx; out->len = ctx->seedLen; EXIT: ciphMeth->cipherDeInitCtx(ctx->ctrCtx); return ret; } static int32_t BlockCipherDf(DRBG_Ctx *drbg, const CRYPT_Data *in1, const CRYPT_Data *in2, const CRYPT_Data *in3, CRYPT_Data *out) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; int32_t ret; uint32_t tempLen = 8; uint8_t temp[16] = { 0 }; uint32_t l; BSL_SAL_CleanseData(ctx->kx, sizeof(ctx->kx)); if ((ret = DRBG_CtrBCCInit(drbg)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } /** 2. L = len (input_string)/8. 3. N = number_of_bits_to_return/8. 4. S = L || N || input_string || 0x80. 5. While (len (S) mod outlen) ≠ 0, do S = S || 0x00. 6. temp = the Null string. 9. While len (temp) < keylen + outlen, do 9.1 IV = i || 0^(outlen - len (i)) 9.2 temp = temp || BCC (K, (IV || S)). 9.3 i = i + 1. */ l = (in1 ? in1->len : 0) + (in2 ? in2->len : 0) + (in3 ? in3->len : 0); temp[0] = (uint8_t)((l >> 24) & 0xff); temp[1] = (uint8_t)((l >> 16) & 0xff); temp[2] = (uint8_t)((l >> 8) & 0xff); temp[3] = (uint8_t)(l & 0xff); temp[4] = 0; temp[5] = 0; temp[6] = 0; temp[7] = (uint8_t)ctx->seedLen; if ((ret = DRBG_CtrBCCUpdate(drbg, in1, temp, &tempLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if ((ret = DRBG_CtrBCCUpdate(drbg, in2, temp, &tempLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if ((ret = DRBG_CtrBCCUpdate(drbg, in3, temp, &tempLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } temp[tempLen++] = 0x80; if ((ret = DRBG_CtrBCCFinal(drbg, temp, tempLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } /** 13. While len (temp) < number_of_bits_to_return, do 13.1 X = Block_Encrypt (K, X). 13.2 temp = temp || X. */ if ((ret = BlockCipherDfCal(drbg, out)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t DRBG_CtrSetDfKey(DRBG_Ctx *drbg) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; const EAL_SymMethod *ciphMeth = ctx->ciphMeth; int32_t ret = CRYPT_SUCCESS; BSL_SAL_CleanseData(ctx->ctrCtx, ciphMeth->ctxSize); if (ctx->isUsedDf) { /* df initialisation */ const uint8_t dfKey[32] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }; BSL_SAL_CleanseData(ctx->dfCtx, ciphMeth->ctxSize); /* Set key schedule for dfKey */ if ((ret = ctx->ciphMeth->setEncryptKey(ctx->dfCtx, dfKey, ctx->keyLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } } return ret; } int32_t DRBG_CtrInstantiate(DRBG_Ctx *drbg, const CRYPT_Data *entropy, const CRYPT_Data *nonce, const CRYPT_Data *pers) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; CRYPT_Data seedMaterial; int32_t ret; if ((ret = DRBG_CtrSetDfKey(drbg)) != CRYPT_SUCCESS) { return ret; } /** * 4. Key = 0(keylen) * 5. V = 0(blocklen) */ BSL_SAL_CleanseData(ctx->k, sizeof(ctx->k)); BSL_SAL_CleanseData(ctx->v, sizeof(ctx->v)); /* seed_material = entropy_input ⊕ personalization_string. (Key, V) = CTR_DRBG_Update (seed_material, Key, V). */ if (!ctx->isUsedDf) { if ((ret = DRBG_CtrUpdate(drbg, entropy, pers)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } // seed_material = entropy_input || nonce || personalization_string. if ((ret = BlockCipherDf(drbg, entropy, nonce, pers, &seedMaterial)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); ctx->ciphMeth->cipherDeInitCtx(ctx->dfCtx); return ret; } if ((ret = DRBG_CtrUpdate(drbg, &seedMaterial, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t DRBG_CtrReseed(DRBG_Ctx *drbg, const CRYPT_Data *entropy, const CRYPT_Data *adin) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; CRYPT_Data seedMaterial; int32_t ret; if (!ctx->isUsedDf) { if ((ret = DRBG_CtrUpdate(drbg, entropy, adin)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } // seed_material = entropy_input || additional_input. if ((ret = BlockCipherDf(drbg, entropy, adin, NULL, &seedMaterial)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if ((ret = DRBG_CtrUpdate(drbg, &seedMaterial, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t DRBG_CtrGenerateBlock(DRBG_Ctx *drbg, uint8_t *out, uint32_t outLen) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; int32_t ret; DRBG_CtrInc(ctx->v, outLen); if ((ret = ctx->ciphMeth->encryptBlock(ctx->ctrCtx, ctx->v, out, outLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); ctx->ciphMeth->cipherDeInitCtx(ctx->ctrCtx); } return ret; } static int32_t DRBG_CtrGenerateBlocks(DRBG_Ctx *drbg, uint8_t *out, uint32_t outLen) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; uint32_t offset = 0; uint32_t tmpOutLen = outLen; int32_t ret; if ((ret = ctx->ciphMeth->setEncryptKey(ctx->ctrCtx, ctx->k, ctx->keyLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } while (tmpOutLen >= AES_BLOCK_LEN) { if ((ret = DRBG_CtrGenerateBlock(drbg, out + offset, AES_BLOCK_LEN)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } tmpOutLen -= AES_BLOCK_LEN; offset += AES_BLOCK_LEN; } if (tmpOutLen > 0) { uint8_t temp[AES_BLOCK_LEN]; if ((ret = DRBG_CtrGenerateBlock(drbg, temp, AES_BLOCK_LEN)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } // tmpOutLen indicates the length of the out remaining. In the last part of DRBG generation, // truncate the length of tmpOutLen and assign it to the out remaining. (void)memcpy_s(out + offset, tmpOutLen, temp, tmpOutLen); } return ret; } int32_t DRBG_CtrGenerate(DRBG_Ctx *drbg, uint8_t *out, uint32_t outLen, const CRYPT_Data *adin) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx *)drbg->ctx; int32_t ret; /** If (additional_input ≠ Null), then temp = len (additional_input) If (temp < seedlen), then additional_input = additional_input || 0^(seedlen - temp). (Key, V) = CTR_DRBG_Update (additional_input, Key, V) Else additional_input = 0seedlen. */ if (adin != NULL && adin->data != NULL && adin->len != 0) { if (!ctx->isUsedDf) { if ((ret = DRBG_CtrUpdate(drbg, adin, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } else { // additional_input = Block_Cipher_df (additional_input, seedlen). if ((ret = BlockCipherDf(drbg, adin, NULL, NULL, (CRYPT_Data *)(uintptr_t)adin)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if ((ret = DRBG_CtrUpdate(drbg, adin, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } } /** 3. temp = Null. 4. While (len (temp) < requested_number_of_bits) do: 4.1 If ctr_len < blocklen 4.1.1 inc = (rightmost (V, ctr_len) + 1) mod 2ctr_len . 4.1.2 V = leftmost (V, blocklen-ctr_len) || inc. Else V = (V+1) mod 2blocklen . 4.2 output_block = Block_Encrypt (Key, V). 4.3 temp = temp || output_block. 5. returned_bits = leftmost (temp, requested_number_of_bits). */ if ((ret = DRBG_CtrGenerateBlocks(drbg, out, outLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } // (Key, V) = CTR_DRBG_Update (additional_input, Key, V). if ((ret = DRBG_CtrUpdate(drbg, adin, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } void DRBG_CtrUnInstantiate(DRBG_Ctx *drbg) { DRBG_CtrCtx *ctx = (DRBG_CtrCtx*)drbg->ctx; ctx->ciphMeth->cipherDeInitCtx(ctx->ctrCtx); ctx->ciphMeth->cipherDeInitCtx(ctx->dfCtx); BSL_SAL_CleanseData((void *)(ctx->k), sizeof(ctx->k)); BSL_SAL_CleanseData((void *)(ctx->v), sizeof(ctx->v)); BSL_SAL_CleanseData((void *)(ctx->kx), sizeof(ctx->kx)); } DRBG_Ctx *DRBG_CtrDup(DRBG_Ctx *drbg) { if (drbg == NULL) { return NULL; } DRBG_CtrCtx *ctx = (DRBG_CtrCtx*)drbg->ctx; DRBG_Ctx *newDrbg = DRBG_NewCtrCtx(ctx->ciphMeth, ctx->keyLen, drbg->isGm, ctx->isUsedDf, &(drbg->seedMeth), drbg->seedCtx); if (newDrbg == NULL) { return NULL; } newDrbg->libCtx = drbg->libCtx; return newDrbg; } void DRBG_CtrFree(DRBG_Ctx *drbg) { if (drbg == NULL) { return; } DRBG_CtrUnInstantiate(drbg); DRBG_CtrCtx *ctx = (DRBG_CtrCtx*)drbg->ctx; BSL_SAL_FREE(ctx->dfCtx); BSL_SAL_FREE(drbg); return; } static void DRBG_InitializeRanges(DRBG_Ctx *drbg, DRBG_CtrCtx *ctx, bool isUsedDf, uint32_t keyLen) { // NIST.SP.800-90Ar1, Section 10.3.1 Table 3 defined those initial value. if (isUsedDf) { // shift rightwards by 3, converting from bit length to byte length drbg->entropyRange.min = (drbg->isGm) ? DRBG_CTR_MIN_ENTROPYLEN : keyLen; drbg->entropyRange.max = DRBG_MAX_LEN; drbg->maxPersLen = DRBG_MAX_LEN; drbg->maxAdinLen = DRBG_MAX_LEN; // NIST.SP.800-90Ar1, Section 8.6.7 defined, a nonce needs (security_strength/2) bits of entropy at least. drbg->nonceRange.min = drbg->entropyRange.min / DRBG_NONCE_FROM_ENTROPY; drbg->nonceRange.max = DRBG_MAX_LEN; } else { drbg->entropyRange.min = ctx->seedLen; drbg->entropyRange.max = ctx->seedLen; drbg->maxPersLen = ctx->seedLen; drbg->maxAdinLen = ctx->seedLen; drbg->nonceRange.min = 0; drbg->nonceRange.max = 0; } } DRBG_Ctx *DRBG_NewCtrCtx(const EAL_SymMethod *ciphMeth, const uint32_t keyLen, bool isGm, const bool isUsedDf, const CRYPT_RandSeedMethod *seedMeth, void *seedCtx) { static DRBG_Method meth = { DRBG_CtrInstantiate, DRBG_CtrGenerate, DRBG_CtrReseed, DRBG_CtrUnInstantiate, DRBG_CtrDup, DRBG_CtrFree }; if (ciphMeth == NULL || keyLen == 0 || seedMeth == NULL) { return NULL; } DRBG_Ctx *drbg = (DRBG_Ctx*)BSL_SAL_Malloc(sizeof(DRBG_Ctx) + sizeof(DRBG_CtrCtx) + ciphMeth->ctxSize); if (drbg == NULL) { return NULL; } void *dfCtx = (void*)BSL_SAL_Malloc(ciphMeth->ctxSize); // have 2 contexts if (dfCtx == NULL) { BSL_SAL_FREE(drbg); return NULL; } DRBG_CtrCtx *ctx = (DRBG_CtrCtx*)(drbg + 1); ctx->ctrCtx = (void*)(ctx + 1); ctx->dfCtx = dfCtx; ctx->ciphMeth = ciphMeth; drbg->state = DRBG_STATE_UNINITIALISED; drbg->isGm = isGm; drbg->reseedInterval = (drbg->isGm) ? HITLS_CRYPTO_RESEED_INTERVAL_GM : DRBG_MAX_RESEED_INTERVAL; #if defined(HITLS_CRYPTO_DRBG_GM) drbg->reseedIntervalTime = (drbg->isGm) ? HITLS_CRYPTO_DRBG_RESEED_TIME_GM : 0; #endif ctx->keyLen = keyLen; ctx->seedLen = AES_BLOCK_LEN + keyLen; ctx->isUsedDf = isUsedDf; drbg->meth = &meth; drbg->ctx = ctx; drbg->seedMeth = *seedMeth; drbg->seedCtx = seedCtx; drbg->strength = keyLen * 8; drbg->maxRequest = (drbg->isGm) ? DRBG_MAX_REQUEST_SM4 : DRBG_MAX_REQUEST; DRBG_InitializeRanges(drbg, ctx, isUsedDf, keyLen); drbg->predictionResistance = false; return drbg; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/drbg/src/drbg_ctr.c
C
unknown
19,544
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_DRBG_HASH #include <stdlib.h> #include <securec.h> #include "crypt_errno.h" #include "crypt_local_types.h" #include "crypt_utils.h" #include "bsl_sal.h" #include "crypt_types.h" #include "bsl_err_internal.h" #include "drbg_local.h" #define DRBG_HASH_MAX_SEEDLEN (111) typedef enum { DRBG_SHA1MDSIZE = 20, DRBG_SHA224MDSIZE = 28, DRBG_SHA256MDSIZE = 32, DRBG_SHA384MDSIZE = 48, DRBG_SHA512MDSIZE = 64, DRBG_SM3MDSIZE = 32, } DRBG_MdSize; typedef struct { uint8_t v[DRBG_HASH_MAX_SEEDLEN]; uint8_t c[DRBG_HASH_MAX_SEEDLEN]; uint32_t seedLen; const EAL_MdMethod *md; void *mdCtx; } DRBG_HashCtx; // This function performs the ctx->V += xxx operation. static void DRBG_HashAddV(uint8_t *v, uint32_t vLen, uint8_t *src, uint32_t srcLen) { uint8_t *d = v + vLen - 1; uint8_t *s = src + srcLen - 1; uint8_t c = 0; uint32_t r; while (s >= src) { r = (uint32_t)(*d) + (*s) + c; *d = (uint8_t)(r & 0xff); c = (r > 0xff) ? 1 : 0; d--; s--; } while (d >= v && c > 0) { r = (uint32_t)(*d) + c; *d = (uint8_t)(r & 0xff); c = (r > 0xff) ? 1 : 0; d--; } return; } static int32_t DRBG_UpdateDataInHashDf(DRBG_HashCtx *ctx, const CRYPT_Data *in1, const CRYPT_Data *in2, const CRYPT_Data *in3, const CRYPT_Data *in4) { const EAL_MdMethod *meth = ctx->md; void *mdCtx = ctx->mdCtx; int32_t ret = CRYPT_SUCCESS; if (!CRYPT_IsDataNull(in1)) { ret = meth->update(mdCtx, in1->data, in1->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if (!CRYPT_IsDataNull(in2)) { ret = meth->update(mdCtx, in2->data, in2->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if (!CRYPT_IsDataNull(in3)) { ret = meth->update(mdCtx, in3->data, in3->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if (!CRYPT_IsDataNull(in4)) { ret = meth->update(mdCtx, in4->data, in4->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } } return ret; } static void DRBG_HashDfValuesAssig(uint8_t values[5], uint32_t len) { // The value of values is the same as that of counter || no_of_bits_to_return in Hash_df Process // in section 10.3.1 in NIST 800-90a. values[0] = 0x1; // len is shifted leftward by 3, then byte-to-bit. Shift rightwards by 24 bits to get the highest 8 bits. values[1] = (uint8_t)(((len << 3) >> 24) & 0xff); // 2nd, len is shifted leftward by 3, then byte-to-bit. Shift rightwards by 16 bits to get the second 8 bits. values[2] = (uint8_t)(((len << 3) >> 16) & 0xff); // 3rd, len is shifted leftward by 3, then byte-to-bit. Shift rightwards by 8 bits to get the third 8 bits. values[3] = (uint8_t)(((len << 3) >> 8) & 0xff); values[4] = (uint8_t)((len << 3) & 0xff); // 4th, len is shifted leftward by 3, then byte-to-bit. } static int32_t DRBG_HashDf(DRBG_HashCtx *ctx, uint8_t *out, uint32_t outLen, const CRYPT_Data *in1, const CRYPT_Data *in2, const CRYPT_Data *in3, const CRYPT_Data *in4) { const EAL_MdMethod *meth = ctx->md; void *mdCtx = ctx->mdCtx; uint32_t mdSize = meth->mdSize; uint8_t *buf = out; uint32_t len = outLen; int32_t ret; // The temp is the same as that of counter || no_of_bits_to_return in Hash_df Process // in section 10.3.1 in NIST 800-90a. uint8_t temp[5]; // len = floor(no_of_bits_to_return / outlen) DRBG_HashDfValuesAssig(temp, len); do { // temp = temp || Hash (counter || no_of_bits_to_return || input_string). if ((ret = meth->init(mdCtx, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } // 5 indicates the maximum length of temp. For details, see the temp statement. if ((ret = meth->update(mdCtx, temp, 5)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if ((ret = DRBG_UpdateDataInHashDf(ctx, in1, in2, in3, in4)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } uint8_t tmpOut[DRBG_HASH_MAX_MDSIZE]; uint32_t tmpOutLen = DRBG_HASH_MAX_MDSIZE; if (len < mdSize) { if ((ret = meth->final(mdCtx, tmpOut, &tmpOutLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // tmpOutLen is the maximum supported MD length, // and len is the actual length, which must be smaller than tmpOutLen. // Only the len length needs to be truncated as the output. (void)memcpy_s(buf, len, tmpOut, len); break; } if ((ret = meth->final(mdCtx, buf, &tmpOutLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } buf += mdSize; len -= mdSize; temp[0]++; } while (len > 0); EXIT: meth->deinit(mdCtx); return ret; } static int32_t DRBG_Hashgen(DRBG_HashCtx *ctx, uint8_t *out, uint32_t outLen) { uint8_t data[DRBG_HASH_MAX_SEEDLEN]; const EAL_MdMethod *md = ctx->md; void *mdCtx = ctx->mdCtx; int32_t ret = CRYPT_SUCCESS; uint32_t mdSize = md->mdSize; uint32_t tmpLen = mdSize; uint32_t len = outLen; uint8_t *buf = out; // The length of the V array is the longest seedLen. Therefore, there is no failure. (void)memcpy_s(data, sizeof(data), ctx->v, ctx->seedLen); while (len > 0) { uint8_t n = 1; if ((ret = md->init(mdCtx, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if ((ret = md->update(mdCtx, data, ctx->seedLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (len >= mdSize) { if ((ret = md->final(mdCtx, buf, &tmpLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } } else { uint8_t temp[DRBG_HASH_MAX_SEEDLEN]; uint32_t tempLen = DRBG_HASH_MAX_SEEDLEN; if ((ret = md->final(mdCtx, temp, &tempLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } (void)memcpy_s(buf, len, temp, len); break; } buf += mdSize; len -= mdSize; DRBG_HashAddV(data, ctx->seedLen, &n, 1); } EXIT: // Clear MD data. md->deinit(mdCtx); return ret; } int32_t DRBG_HashInstantiate(DRBG_Ctx *drbg, const CRYPT_Data *entropy, const CRYPT_Data *nonce, const CRYPT_Data *pers) { DRBG_HashCtx *ctx = (DRBG_HashCtx*)drbg->ctx; CRYPT_Data seed = {ctx->v, (uint32_t)(ctx->seedLen)}; int32_t ret; uint8_t c = 0; CRYPT_Data temp = {&c, 1}; /** 1. seed_material = entropy || nonce || pers 2. seed = Hash_df(seed_material) 3. V = seed 4. C = Hash_df(0x00 || V) */ ret = DRBG_HashDf(ctx, ctx->v, ctx->seedLen, entropy, nonce, pers, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = DRBG_HashDf(ctx, ctx->c, ctx->seedLen, &temp, &seed, NULL, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t DRBG_HashAdinInHashGenerate(DRBG_HashCtx *ctx, const CRYPT_Data *adin) { void *mdCtx = ctx->mdCtx; const EAL_MdMethod *md = ctx->md; uint32_t mdSize = md->mdSize; int32_t ret; uint8_t temp = 0x2; uint8_t w[DRBG_HASH_MAX_MDSIZE]; uint32_t wLen = DRBG_HASH_MAX_MDSIZE; ret = md->init(mdCtx, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = md->update(mdCtx, &temp, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = md->update(mdCtx, ctx->v, ctx->seedLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = md->update(mdCtx, adin->data, adin->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = md->final(mdCtx, w, &wLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } DRBG_HashAddV(ctx->v, ctx->seedLen, w, mdSize); EXIT: // Clear MD data. md->deinit(mdCtx); return ret; } int32_t DRBG_HashGenerate(DRBG_Ctx *drbg, uint8_t *out, uint32_t outLen, const CRYPT_Data *adin) { DRBG_HashCtx *ctx = (DRBG_HashCtx*)drbg->ctx; const EAL_MdMethod *md = ctx->md; void *mdCtx = ctx->mdCtx; uint32_t mdSize = md->mdSize; uint8_t h[DRBG_HASH_MAX_MDSIZE]; uint32_t len = outLen; int32_t ret; uint32_t reseedCtrBe; /* if adin : w = HASH(0x02 || V || adin) V = (V + w) mod 2^seedLen */ if (!CRYPT_IsDataNull(adin)) { ret = DRBG_HashAdinInHashGenerate(ctx, adin); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } // Hashgen(V, out, len) ret = DRBG_Hashgen(ctx, out, len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } // H = HASH(0x03 || V) uint8_t temp = 0x3; ret = md->init(mdCtx, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = md->update(mdCtx, &temp, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = md->update(mdCtx, ctx->v, ctx->seedLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = md->final(mdCtx, h, &mdSize); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // V = (V + H + C + reseed_counter) mod 2^seedlen DRBG_HashAddV(ctx->v, ctx->seedLen, h, mdSize); DRBG_HashAddV(ctx->v, ctx->seedLen, ctx->c, ctx->seedLen); reseedCtrBe = CRYPT_HTONL((uint32_t)(drbg->reseedCtr)); DRBG_HashAddV(ctx->v, ctx->seedLen, (uint8_t*)&reseedCtrBe, sizeof(reseedCtrBe)); EXIT: // Clear MD data. md->deinit(mdCtx); return ret; } int32_t DRBG_HashReseed(DRBG_Ctx *drbg, const CRYPT_Data *entropy, const CRYPT_Data *adin) { int32_t ret; DRBG_HashCtx *ctx = (DRBG_HashCtx*)drbg->ctx; CRYPT_Data v = {ctx->v, ctx->seedLen}; uint8_t c = 0x1; CRYPT_Data temp = {&c, 1}; /** seed_material = 0x01 || V || entropy_input || additional_input. seed = Hash_Df(seed_material) // The memory of C is reused. V = seed C = Hash_Df(0x00 || V) */ if (drbg->isGm) { ret = DRBG_HashDf(ctx, ctx->c, ctx->seedLen, &temp, entropy, &v, adin); } else { ret = DRBG_HashDf(ctx, ctx->c, ctx->seedLen, &temp, &v, entropy, adin); } if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } // The length of the C array is the longest seedLen. Therefore, there is no failure. (void)memcpy_s(ctx->v, sizeof(ctx->v), ctx->c, ctx->seedLen); c = 0x0; ret = DRBG_HashDf(ctx, ctx->c, ctx->seedLen, &temp, &v, NULL, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } void DRBG_HashUnInstantiate(DRBG_Ctx *drbg) { DRBG_HashCtx *ctx = (DRBG_HashCtx*)drbg->ctx; ctx->md->deinit(ctx->mdCtx); BSL_SAL_CleanseData((void *)(ctx->c), sizeof(ctx->c)); BSL_SAL_CleanseData((void *)(ctx->v), sizeof(ctx->v)); } DRBG_Ctx *DRBG_HashDup(DRBG_Ctx *drbg) { if (drbg == NULL) { return NULL; } DRBG_HashCtx *ctx = (DRBG_HashCtx*)drbg->ctx; DRBG_Ctx *newDrbg = DRBG_NewHashCtx(ctx->md, drbg->isGm, &(drbg->seedMeth), drbg->seedCtx); if (newDrbg == NULL) { return NULL; } newDrbg->libCtx = drbg->libCtx; return newDrbg; } void DRBG_HashFree(DRBG_Ctx *drbg) { if (drbg == NULL) { return; } DRBG_HashUnInstantiate(drbg); DRBG_HashCtx *ctx = (DRBG_HashCtx*)drbg->ctx; ctx->md->freeCtx(ctx->mdCtx); BSL_SAL_FREE(drbg); return; } static int32_t DRBG_NewHashCtxBase(uint32_t mdSize, DRBG_Ctx *drbg, DRBG_HashCtx *ctx) { switch (mdSize) { case DRBG_SHA1MDSIZE: drbg->strength = 128; // 128 is the standard content length of nist 800-90a. ctx->seedLen = 55; // 55 is the standard content length of nist 800-90a. return CRYPT_SUCCESS; case DRBG_SHA224MDSIZE: drbg->strength = 192; // 192 is the standard content length of nist 800-90a. ctx->seedLen = 55; // 55 is the standard content length of nist 800-90a. return CRYPT_SUCCESS; case DRBG_SHA256MDSIZE: drbg->strength = 256; // 256 is the standard content length of nist 800-90a. ctx->seedLen = 55; // 55 is the standard content length of nist 800-90a. return CRYPT_SUCCESS; case DRBG_SHA384MDSIZE: case DRBG_SHA512MDSIZE: drbg->strength = 256; // 256 is the standard content length of nist 800-90a. ctx->seedLen = 111; // 111 is the standard content length of nist 800-90a. return CRYPT_SUCCESS; default: BSL_ERR_PUSH_ERROR(CRYPT_DRBG_ALG_NOT_SUPPORT); return CRYPT_DRBG_ALG_NOT_SUPPORT; } } DRBG_Ctx *DRBG_NewHashCtx(const EAL_MdMethod *md, bool isGm, const CRYPT_RandSeedMethod *seedMeth, void *seedCtx) { DRBG_Ctx *drbg = NULL; DRBG_HashCtx *ctx = NULL; static DRBG_Method meth = { DRBG_HashInstantiate, DRBG_HashGenerate, DRBG_HashReseed, DRBG_HashUnInstantiate, DRBG_HashDup, DRBG_HashFree }; if (md == NULL || md->newCtx == NULL || md->freeCtx == NULL || seedMeth == NULL) { return NULL; } drbg = (DRBG_Ctx*)BSL_SAL_Malloc(sizeof(DRBG_Ctx) + sizeof(DRBG_HashCtx)); if (drbg == NULL) { return NULL; } ctx = (DRBG_HashCtx*)(drbg + 1); ctx->md = md; ctx->mdCtx = md->newCtx(NULL, md->id); if (ctx->mdCtx == NULL) { BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL); BSL_SAL_FREE(drbg); return NULL; } if (DRBG_NewHashCtxBase(md->mdSize, drbg, ctx) != CRYPT_SUCCESS) { BSL_SAL_FREE(drbg); md->freeCtx(ctx->mdCtx); ctx->mdCtx = NULL; return NULL; } drbg->state = DRBG_STATE_UNINITIALISED; drbg->isGm = isGm; drbg->reseedInterval = (drbg->isGm) ? HITLS_CRYPTO_RESEED_INTERVAL_GM : DRBG_MAX_RESEED_INTERVAL; #if defined(HITLS_CRYPTO_DRBG_GM) drbg->reseedIntervalTime = (drbg->isGm) ? HITLS_CRYPTO_DRBG_RESEED_TIME_GM : 0; #endif drbg->meth = &meth; drbg->ctx = ctx; drbg->seedMeth = *seedMeth; drbg->seedCtx = seedCtx; // Shift right by 3, from bit length to byte length drbg->entropyRange.min = drbg->strength >> 3; drbg->entropyRange.max = DRBG_MAX_LEN; drbg->nonceRange.min = drbg->entropyRange.min / DRBG_NONCE_FROM_ENTROPY; drbg->nonceRange.max = DRBG_MAX_LEN; drbg->maxPersLen = DRBG_MAX_LEN; drbg->maxAdinLen = DRBG_MAX_LEN; drbg->maxRequest = (drbg->isGm) ? DRBG_MAX_REQUEST_SM3 : DRBG_MAX_REQUEST; drbg->predictionResistance = false; return drbg; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/drbg/src/drbg_hash.c
C
unknown
16,203
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_DRBG_HMAC #include <stdlib.h> #include <securec.h> #include "crypt_errno.h" #include "crypt_local_types.h" #include "crypt_utils.h" #include "bsl_sal.h" #include "crypt_types.h" #include "bsl_err_internal.h" #include "drbg_local.h" #define DRBG_HMAC_MAX_MDLEN (64) typedef enum { DRBG_HMAC_SHA1SIZE = 20, DRBG_HMAC_SHA224SIZE = 28, DRBG_HMAC_SHA256SIZE = 32, DRBG_HMAC_SHA384SIZE = 48, DRBG_HMAC_SHA512SIZE = 64, } DRBG_HmacSize; typedef struct { uint8_t k[DRBG_HMAC_MAX_MDLEN]; uint8_t v[DRBG_HMAC_MAX_MDLEN]; uint32_t blockLen; const EAL_MacMethod *hmacMeth; CRYPT_MAC_AlgId macId; void *hmacCtx; } DRBG_HmacCtx; static int32_t Hmac(DRBG_HmacCtx *ctx, uint8_t mark, const CRYPT_Data *provData[], int32_t provDataLen) { int32_t ret; uint32_t ctxKLen = sizeof(ctx->k); uint32_t ctxVLen = sizeof(ctx->v); // K = HMAC (K, V || mark || provided_data). mark can be 0x00 or 0x01, // provided_data = in1 || in2 || in3, private_data can be NULL if ((ret = ctx->hmacMeth->init(ctx->hmacCtx, ctx->k, ctx->blockLen, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if ((ret = ctx->hmacMeth->update(ctx->hmacCtx, ctx->v, ctx->blockLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if ((ret = ctx->hmacMeth->update(ctx->hmacCtx, &mark, 1)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } for (int32_t i = 0; i < provDataLen; i++) { if ((ret = ctx->hmacMeth->update(ctx->hmacCtx, provData[i]->data, provData[i]->len)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } } if ((ret = ctx->hmacMeth->final(ctx->hmacCtx, ctx->k, &ctxKLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // V = HMAC (K, V). if ((ret = ctx->hmacMeth->init(ctx->hmacCtx, ctx->k, ctx->blockLen, NULL)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if ((ret = ctx->hmacMeth->update(ctx->hmacCtx, ctx->v, ctx->blockLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if ((ret = ctx->hmacMeth->final(ctx->hmacCtx, ctx->v, &ctxVLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } EXIT: // clear hmacCtx ctx->hmacMeth->deinit(ctx->hmacCtx); return ret; } /** * Ref: NIST.SP.800-90Ar1 https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-90ar1.pdf * Section: 10.1.2.2 HMAC_DRBG Update Process */ static int32_t DRBG_HmacUpdate(DRBG_Ctx *drbg, const CRYPT_Data *provData[], int32_t provDataLen) { DRBG_HmacCtx *ctx = (DRBG_HmacCtx *)drbg->ctx; int32_t ret; // K = HMAC (K, V || 0x00 || provided_data). V = HMAC (K, V), provided_data have 3 input ret = Hmac(ctx, 0x00, provData, provDataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } // If (provided_data = Null), then return K and V. It's not an error, it's algorithmic. if (provDataLen == 0) { return ret; } // K = HMAC (K, V || 0x01 || provided_data). V = HMAC (K, V) ret = Hmac(ctx, 0x01, provData, provDataLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } /** * Ref: NIST.SP.800-90Ar1 https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-90ar1.pdf * Section: 10.1.2.3 Instantiation of HMAC_DRBG */ int32_t DRBG_HmacInstantiate(DRBG_Ctx *drbg, const CRYPT_Data *entropyInput, const CRYPT_Data *nonce, const CRYPT_Data *perstr) { DRBG_HmacCtx *ctx = (DRBG_HmacCtx *)drbg->ctx; int32_t ret; const CRYPT_Data *provData[3] = {0}; // We only need 3 at most. int32_t index = 0; if (!CRYPT_IsDataNull(entropyInput)) { provData[index++] = entropyInput; } if (!CRYPT_IsDataNull(nonce)) { provData[index++] = nonce; } if (!CRYPT_IsDataNull(perstr)) { provData[index++] = perstr; } // Key = 0x00 00...00. (void)memset_s(ctx->k, sizeof(ctx->k), 0, ctx->blockLen); // V = 0x01 01...01. (void)memset_s(ctx->v, sizeof(ctx->v), 1, ctx->blockLen); // seed_material = entropy_input || nonce || personalization_string. // (Key, V) = HMAC_DRBG_Update (seed_material, Key, V). ret = DRBG_HmacUpdate(drbg, provData, index); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } /** * Ref: NIST.SP.800-90Ar1 https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-90ar1.pdf * Section: 10.1.2.4 HMAC_DRBG Reseed Process */ int32_t DRBG_HmacReseed(DRBG_Ctx *drbg, const CRYPT_Data *entropyInput, const CRYPT_Data *adin) { int32_t ret; // seed_material = entropy_input || additional_input. const CRYPT_Data *seedMaterial[2] = {0}; // This stage only needs 2 at most. int32_t index = 0; if (!CRYPT_IsDataNull(entropyInput)) { seedMaterial[index++] = entropyInput; } if (!CRYPT_IsDataNull(adin)) { seedMaterial[index++] = adin; } // (Key, V) = HMAC_DRBG_Update (seed_material, Key, V). ret = DRBG_HmacUpdate(drbg, seedMaterial, index); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } /** * Ref: NIST.SP.800-90Ar1 https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-90ar1.pdf * Section: 10.1.2.5 HMAC_DRBG Generate Process */ int32_t DRBG_HmacGenerate(DRBG_Ctx *drbg, uint8_t *out, uint32_t outLen, const CRYPT_Data *adin) { DRBG_HmacCtx *ctx = (DRBG_HmacCtx *)drbg->ctx; const EAL_MacMethod *hmacMeth = ctx->hmacMeth; const uint8_t *temp = ctx->v; uint32_t tmpLen = ctx->blockLen; uint32_t len = outLen; uint8_t *buf = out; int32_t ret; uint32_t ctxVLen; int32_t hasAdin = CRYPT_IsDataNull(adin) ? 0 : 1; // If additional_input ≠ Null, then (Key, V) = HMAC_DRBG_Update (additional_input, Key, V). if (hasAdin == 1) { if ((ret = DRBG_HmacUpdate(drbg, &adin, hasAdin)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } /** While (len (temp) < requested_number_of_bits) do: V = HMAC (Key, V). temp = temp || V. */ while (len > 0) { if ((ret = hmacMeth->init(ctx->hmacCtx, ctx->k, ctx->blockLen, NULL)) != CRYPT_SUCCESS || (ret = hmacMeth->update(ctx->hmacCtx, temp, ctx->blockLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (len <= ctx->blockLen) { break; } if ((ret = hmacMeth->final(ctx->hmacCtx, buf, &tmpLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } temp = buf; buf += ctx->blockLen; len -= ctx->blockLen; } ctxVLen = sizeof(ctx->v); if ((ret = hmacMeth->final(ctx->hmacCtx, ctx->v, &ctxVLen)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // Intercepts the len-length V-value as an output, and because of len <= blockLen, // length of V is always greater than blockLen,Therefore, this problem does not exist. (void)memcpy_s(buf, len, ctx->v, len); // (Key, V) = HMAC_DRBG_Update (additional_input, Key, V). if ((ret = DRBG_HmacUpdate(drbg, &adin, hasAdin)) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } EXIT: // clear hmacCtx hmacMeth->deinit(ctx->hmacCtx); return ret; } void DRBG_HmacUnInstantiate(DRBG_Ctx *drbg) { DRBG_HmacCtx *ctx = (DRBG_HmacCtx*)drbg->ctx; ctx->hmacMeth->deinit(ctx->hmacCtx); BSL_SAL_CleanseData((void *)(ctx->k), sizeof(ctx->k)); BSL_SAL_CleanseData((void *)(ctx->v), sizeof(ctx->v)); } DRBG_Ctx *DRBG_HmacDup(DRBG_Ctx *drbg) { if (drbg == NULL) { return NULL; } DRBG_HmacCtx *ctx = (DRBG_HmacCtx*)drbg->ctx; DRBG_Ctx *newDrbg = DRBG_NewHmacCtx(drbg->libCtx, ctx->hmacMeth, ctx->macId, &(drbg->seedMeth), drbg->seedCtx); if (newDrbg == NULL) { return NULL; } newDrbg->libCtx = drbg->libCtx; return newDrbg; } void DRBG_HmacFree(DRBG_Ctx *drbg) { if (drbg == NULL) { return; } DRBG_HmacUnInstantiate(drbg); DRBG_HmacCtx *ctx = (DRBG_HmacCtx*)drbg->ctx; ctx->hmacMeth->freeCtx(ctx->hmacCtx); BSL_SAL_FREE(drbg); return; } static int32_t DRBG_NewHmacCtxBase(uint32_t hmacSize, DRBG_Ctx *drbg) { switch (hmacSize) { case DRBG_HMAC_SHA1SIZE: drbg->strength = 128; // nist 800-90a specified the length must be 128 return CRYPT_SUCCESS; case DRBG_HMAC_SHA224SIZE: drbg->strength = 192; // nist 800-90a specified the length must be 192 return CRYPT_SUCCESS; case DRBG_HMAC_SHA256SIZE: case DRBG_HMAC_SHA384SIZE: case DRBG_HMAC_SHA512SIZE: drbg->strength = 256; // nist 800-90a specified the length must be 256 return CRYPT_SUCCESS; default: BSL_ERR_PUSH_ERROR(CRYPT_DRBG_ALG_NOT_SUPPORT); return CRYPT_DRBG_ALG_NOT_SUPPORT; } } DRBG_Ctx *DRBG_NewHmacCtx(void *libCtx, const EAL_MacMethod *hmacMeth, CRYPT_MAC_AlgId macId, const CRYPT_RandSeedMethod *seedMeth, void *seedCtx) { DRBG_Ctx *drbg = NULL; DRBG_HmacCtx *ctx = NULL; static DRBG_Method meth = { DRBG_HmacInstantiate, DRBG_HmacGenerate, DRBG_HmacReseed, DRBG_HmacUnInstantiate, DRBG_HmacDup, DRBG_HmacFree }; if (hmacMeth == NULL || seedMeth == NULL) { return NULL; } drbg = (DRBG_Ctx*)BSL_SAL_Malloc(sizeof(DRBG_Ctx) + sizeof(DRBG_HmacCtx)); if (drbg == NULL) { return NULL; } ctx = (DRBG_HmacCtx*)(drbg + 1); ctx->hmacMeth = hmacMeth; ctx->macId = macId; void *macCtx = hmacMeth->newCtx(libCtx, ctx->macId); if (macCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); BSL_SAL_FREE(drbg); return NULL; } ctx->hmacCtx = macCtx; uint32_t tempLen = 0; int32_t ret = hmacMeth->ctrl(ctx->hmacCtx, CRYPT_CTRL_GET_MACLEN, &tempLen, sizeof(uint32_t)); if (ret != CRYPT_SUCCESS) { hmacMeth->freeCtx(ctx->hmacCtx); BSL_SAL_FREE(drbg); return NULL; } ctx->blockLen = tempLen; if (DRBG_NewHmacCtxBase(ctx->blockLen, drbg) != CRYPT_SUCCESS) { hmacMeth->freeCtx(ctx->hmacCtx); BSL_SAL_FREE(drbg); return NULL; } drbg->state = DRBG_STATE_UNINITIALISED; drbg->reseedInterval = DRBG_MAX_RESEED_INTERVAL; drbg->meth = &meth; drbg->ctx = ctx; drbg->seedMeth = *seedMeth; drbg->seedCtx = seedCtx; // shift rightwards by 3, converting from bit length to byte length drbg->entropyRange.min = drbg->strength >> 3; drbg->entropyRange.max = DRBG_MAX_LEN; drbg->nonceRange.min = drbg->entropyRange.min / DRBG_NONCE_FROM_ENTROPY; drbg->nonceRange.max = DRBG_MAX_LEN; drbg->maxPersLen = DRBG_MAX_LEN; drbg->maxAdinLen = DRBG_MAX_LEN; drbg->maxRequest = DRBG_MAX_REQUEST; drbg->libCtx = libCtx; drbg->predictionResistance = false; return drbg; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/drbg/src/drbg_hmac.c
C
unknown
11,780
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef DRBG_LOCAL_H #define DRBG_LOCAL_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_DRBG #include <stdint.h> #include "crypt_drbg.h" #ifdef __cplusplus extern "C" { #endif // Relationship between the number of NONCE and ENTROPY #define DRBG_NONCE_FROM_ENTROPY (2) typedef enum { DRBG_STATE_UNINITIALISED, DRBG_STATE_READY, DRBG_STATE_ERROR, } DRBG_State; typedef struct { int32_t (*instantiate)(DRBG_Ctx *ctx, const CRYPT_Data *entropy, const CRYPT_Data *nonce, const CRYPT_Data *pers); int32_t (*generate)(DRBG_Ctx *ctx, uint8_t *out, uint32_t outLen, const CRYPT_Data *adin); int32_t (*reseed)(DRBG_Ctx *ctx, const CRYPT_Data *entropy, const CRYPT_Data *adin); void (*uninstantiate)(DRBG_Ctx *ctx); DRBG_Ctx* (*dup)(DRBG_Ctx *ctx); void (*free)(DRBG_Ctx *ctx); } DRBG_Method; struct DrbgCtx { bool isGm; DRBG_State state; /* DRBG state */ uint32_t reseedCtr; /* reseed counter */ uint32_t reseedInterval; /* reseed interval times */ #if defined(HITLS_CRYPTO_DRBG_GM) uint64_t lastReseedTime; /* last reseed time, uint: second */ uint64_t reseedIntervalTime; /* Time threshold for reseed, uint: second */ #endif uint32_t strength; /* Algorithm strength */ uint32_t maxRequest; /* Maximum number of bytes per request, which is determined by the algorithm. */ CRYPT_Range entropyRange; /* entropy size range */ CRYPT_Range nonceRange; /* nonce size range */ uint32_t maxPersLen; /* Maximum private data length */ uint32_t maxAdinLen; /* Maximum additional data length */ DRBG_Method *meth; /* Internal different mode method */ void *ctx; /* Mode Context */ /* seed function, which is related to the entropy source and DRBG generation. When seedMeth and seedCtx are empty, the default entropy source is used. */ CRYPT_RandSeedMethod seedMeth; void *seedCtx; /* Seed context */ void *libCtx; /* Library context */ bool predictionResistance; }; #ifdef HITLS_CRYPTO_DRBG_HMAC /** * @ingroup drbg * @brief Apply for a context for the HMAC_DRBG. * @brief This API does not support multiple threads. * * @param libCtx Library context * @param hmacMeth HMAC method * @param mdMeth hash algid * @param seedMeth DRBG seed hook * @param seedCtx DRBG seed context * * @retval DRBG_Ctx* Success * @retval NULL failure */ DRBG_Ctx *DRBG_NewHmacCtx(void *libCtx, const EAL_MacMethod *hmacMeth, CRYPT_MAC_AlgId macId, const CRYPT_RandSeedMethod *seedMeth, void *seedCtx); #endif #ifdef HITLS_CRYPTO_DRBG_HASH /** * @ingroup drbg * @brief Apply for a context for the Hash_DRBG. * @brief This API does not support multiple threads. * * @param md HASH method * @param isGm is sm3 * @param seedMeth DRBG seed hook * @param seedCtx DRBG seed context * * @retval DRBG_Ctx* Success * @retval NULL failure */ DRBG_Ctx *DRBG_NewHashCtx(const EAL_MdMethod *md, bool isGm, const CRYPT_RandSeedMethod *seedMeth, void *seedCtx); #endif #ifdef HITLS_CRYPTO_DRBG_CTR /** * @ingroup drbg * @brief Apply for a context for the CTR_DRBG. * @brief This API does not support multiple threads. * * @param ciphMeth AES method * @param keyLen Key length * @param isGm is sm4 * @param isUsedDf Indicates whether to use derivation function. * @param seedMeth DRBG seed hook * @param seedCtx DRBG seed context * * @retval DRBG_Ctx* Success * @retval NULL failure */ DRBG_Ctx *DRBG_NewCtrCtx(const EAL_SymMethod *ciphMeth, const uint32_t keyLen, bool isGm, const bool isUsedDf, const CRYPT_RandSeedMethod *seedMeth, void *seedCtx); #endif #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_DRBG #endif // DRBG_LOCAL_H
2401_83913325/openHiTLS-examples_7925
crypto/drbg/src/drbg_local.h
C
unknown
4,287
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_DSA_H #define CRYPT_DSA_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_DSA #include <stdint.h> #include "crypt_bn.h" #include "crypt_types.h" #include "bsl_params.h" #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ #ifndef CRYPT_DSA_TRY_MAX_CNT #define CRYPT_DSA_TRY_MAX_CNT 100 // Maximum number of attempts to generate keys and signatures #endif #define CRYPT_DSA_FFC_PARAM 1 #define CRYPT_DH_FFC_PARAM 2 #define CRYPT_DISABLE_SP800_KEYGEN_FLAG 0 #define CRYPT_ENABLE_SP800_KEYGEN_FLAG 1 /* DSA key parameters */ typedef struct DSA_Para CRYPT_DSA_Para; /* DSA key context */ typedef struct DSA_Ctx CRYPT_DSA_Ctx; /** * @ingroup dsa * @brief dsa Allocates context memory space. * * @retval (CRYPT_DSA_Ctx *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_DSA_Ctx *CRYPT_DSA_NewCtx(void); /** * @ingroup dsa * @brief dsa Allocates context memory space. * * @param libCtx [IN] Library context * * @retval (CRYPT_DSA_Ctx *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_DSA_Ctx *CRYPT_DSA_NewCtxEx(void *libCtx); /** * @ingroup dsa * @brief Copy the DSA context. After the duplication is complete, invoke the CRYPT_DSA_FreeCtx to release the memory. * * @param ctx [IN] Source DSA context * * @return CRYPT_DSA_Ctx Dsa context pointer * If the operation fails, null is returned. */ CRYPT_DSA_Ctx *CRYPT_DSA_DupCtx(CRYPT_DSA_Ctx *dsaCtx); /** * @ingroup dsa * @brief dsa Release the key context structure * * @param ctx [IN] Indicates the pointer to the context structure to be released. The ctx is set NULL by the invoker. */ void CRYPT_DSA_FreeCtx(CRYPT_DSA_Ctx *ctx); /** * @ingroup dsa * @brief dsa generate key parameter structure * * @param para [IN] dsa external parameter * * @retval (CRYPT_DSA_Para *) Pointer to the memory space of the allocated context * @retval NULL Invalid null pointer */ CRYPT_DSA_Para *CRYPT_DSA_NewPara(const CRYPT_DsaPara *para); /** * @ingroup dsa * @brief Release the key parameter structure of DSA. * * @param para [IN] Pointer to the key parameter structure to be released. para is set NULL by the invoker. */ void CRYPT_DSA_FreePara(CRYPT_DSA_Para *para); /** * @ingroup dsa * @brief Set the data of the key parameter structure to the key structure. * * @param ctx [IN] Key structure for setting related parameters. The key specification is 1024-3072 bits. * @param para [IN] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_ERR_KEY_PARA The key parameter data is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL internal memory allocation error * @retval BN error code. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DSA_SetPara(CRYPT_DSA_Ctx *ctx, const CRYPT_DsaPara *para); /** * @ingroup dsa * @brief Set the parameter data in the key structure to the key parameter structure. * * @param ctx [IN] Key structure for setting related parameters. The key specification is 1024-3072 bits. * @param para [OUT] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_PARA_ERROR The key parameter data is incorrect. * @retval BN error code. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Get successfully. */ int32_t CRYPT_DSA_GetPara(const CRYPT_DSA_Ctx *ctx, CRYPT_DsaPara *para); /** * @ingroup dsa * @brief dsa Obtain the key length. * * @param ctx [IN] DSA context structure * * @retval 0 The input is incorrect or the corresponding key structure does not contain valid key length. * @retval uint32_t Valid key length */ uint32_t CRYPT_DSA_GetBits(const CRYPT_DSA_Ctx *ctx); /** * @ingroup dsa * @brief dsa Obtain the required length of the signature. * * @param ctx [IN] DSA context structure * * @retval 0 The input is incorrect or the corresponding key structure does not contain valid parameter data. * @retval uint32_t Length required for valid signature data */ uint32_t CRYPT_DSA_GetSignLen(const CRYPT_DSA_Ctx *ctx); /** * @ingroup dsa * @brief Generate a DSA key pair. * * @param ctx [IN/OUT] DSA context structure * * @retval CRYPT_NULL_INPUT Error null pointer input. * @retval CRYPT_DSA_ERR_KEY_PARA The key parameter data is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval CRYPT_DSA_ERR_TRY_CNT Unable to generate results within the specified number of attempts. * @retval BN error code. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS The key pair is successfully generated. */ int32_t CRYPT_DSA_Gen(CRYPT_DSA_Ctx *ctx); /** * @ingroup dsa * @brief DSA Signature * * @param ctx [IN] DSA context structure * @param algId [IN] md algId * @param data [IN] Data to be signed * @param dataLen [IN] Length of the data to be signed * @param sign [OUT] Signature data * @param signLen [IN/OUT] The input parameter is the space length of the sign, * and the output parameter is the valid length of the sign. * The required space can be obtained by calling CRYPT_DSA_GetSignLen. * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_DSA_ERR_TRY_CNT Unable to generate results within the specified number of attempts. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval BN error An error occurred in the internal BigNum operation. * @retval CRYPT_SUCCESS Signed successfully. */ int32_t CRYPT_DSA_Sign(const CRYPT_DSA_Ctx *ctx, int32_t algId, const uint8_t *data, uint32_t dataLen, uint8_t *sign, uint32_t *signLen); /** * @ingroup dsa * @brief DSA Signature * * @param ctx [IN] DSA context structure * @param data [IN] Data to be signed * @param dataLen [IN] Length of the data to be signed * @param sign [OUT] Signature data * @param signLen [IN/OUT] The input parameter is the space length of the sign, * and the output parameter is the valid length of the sign. * The required space can be obtained by calling CRYPT_DSA_GetSignLen. * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_DSA_ERR_TRY_CNT Unable to generate results within the specified number of attempts. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval BN error An error occurred in the internal BigNum operation. * @retval CRYPT_SUCCESS Signed successfully. */ int32_t CRYPT_DSA_SignData(const CRYPT_DSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen, uint8_t *sign, uint32_t *signLen); /** * @ingroup dsa * @brief DSA verification * * @param ctx [IN] DSA context structure * @param data [IN] Data to be signed * @param dataLen [IN] Length of the data to be signed * @param sign [IN] Signature data * @param signLen [IN] Valid length of the sign * * @retval CRYPT_NULL_INPUT Error null pointer input. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval CRYPT_DSA_DECODE_FAIL Signature Data Decoding Failure. * @retval CRYPT_DSA_VERIFY_FAIL Failed to verify the signature. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS The signature is verified successfully. */ int32_t CRYPT_DSA_VerifyData(const CRYPT_DSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen, const uint8_t *sign, uint32_t signLen); /** * @ingroup dsa * @brief DSA verification * * @param ctx [IN] DSA context structure * @param algId [IN] md algId * @param data [IN] Data to be signed * @param dataLen [IN] Length of the data to be signed * @param sign [IN] Signature data * @param signLen [IN] Valid length of the sign * * @retval CRYPT_NULL_INPUT Error null pointer input. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval CRYPT_DSA_DECODE_FAIL Signature Data Decoding Failure. * @retval CRYPT_DSA_VERIFY_FAIL Failed to verify the signature. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS The signature is verified successfully. */ int32_t CRYPT_DSA_Verify(const CRYPT_DSA_Ctx *ctx, int32_t algId, const uint8_t *data, uint32_t dataLen, const uint8_t *sign, uint32_t signLen); /** * @ingroup dsa * @brief Set the private key data for the DSA. * * @param ctx [IN] DSA context structure * @param prv [IN] External private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_ERR_KEY_PARA The key parameter data is incorrect. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DSA_SetPrvKey(CRYPT_DSA_Ctx *ctx, const CRYPT_DsaPrv *prv); /** * @ingroup dsa * @brief Set the public key data for the DSA. * * @param ctx [IN] DSA context structure * @param pub [IN] External public key data * * @retval CRYPT_NULL_INPUT Error null pointer input. * @retval CRYPT_DSA_ERR_KEY_PARA The key parameter data is incorrect. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DSA_SetPubKey(CRYPT_DSA_Ctx *ctx, const CRYPT_DsaPub *pub); /** * @ingroup dsa * @brief Obtain the private key data of the DSA. * * @param ctx [IN] DSA context structure * @param prv [OUT] External private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval BN error. An error occurs in the internal BigNum calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_DSA_GetPrvKey(const CRYPT_DSA_Ctx *ctx, CRYPT_DsaPrv *prv); /** * @ingroup dsa * @brief Obtain the public key data of the DSA. * * @param ctx [IN] DSA context structure * @param pub [OUT] External public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval BN error. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_DSA_GetPubKey(const CRYPT_DSA_Ctx *ctx, CRYPT_DsaPub *pub); #ifdef HITLS_BSL_PARAMS /** * @ingroup dsa * @brief Set the data of the key parameter structure to the key structure. * * @param ctx [IN] Key structure for setting related parameters. The key specification is 1024-3072 bits. * @param para [IN] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_ERR_KEY_PARA The key parameter data is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL internal memory allocation error * @retval BN error code. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DSA_SetParaEx(CRYPT_DSA_Ctx *ctx, const BSL_Param *para); /** * @ingroup dsa * @brief Set the parameter data in the key structure to the key parameter structure. * * @param ctx [IN] Key structure for setting related parameters. The key specification is 1024-3072 bits. * @param para [OUT] Key parameters * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_PARA_ERROR The key parameter data is incorrect. * @retval BN error code. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Get successfully. */ int32_t CRYPT_DSA_GetParaEx(const CRYPT_DSA_Ctx *ctx, BSL_Param *para); /** * @ingroup dsa * @brief Set the private key data for the DSA. * * @param ctx [IN] DSA context structure * @param para [IN] External private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_ERR_KEY_PARA The key parameter data is incorrect. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DSA_SetPrvKeyEx(CRYPT_DSA_Ctx *ctx, const BSL_Param *para); /** * @ingroup dsa * @brief Set the public key data for the DSA. * * @param ctx [IN] DSA context structure * @param para [IN] External public key data * * @retval CRYPT_NULL_INPUT Error null pointer input. * @retval CRYPT_DSA_ERR_KEY_PARA The key parameter data is incorrect. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t CRYPT_DSA_SetPubKeyEx(CRYPT_DSA_Ctx *ctx, const BSL_Param *para); /** * @ingroup dsa * @brief Obtain the private key data of the DSA. * * @param ctx [IN] DSA context structure * @param para [OUT] External private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval BN error. An error occurs in the internal BigNum calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_DSA_GetPrvKeyEx(const CRYPT_DSA_Ctx *ctx, BSL_Param *para); /** * @ingroup dsa * @brief Obtain the public key data of the DSA. * * @param ctx [IN] DSA context structure * @param para [OUT] External public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval BN error. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t CRYPT_DSA_GetPubKeyEx(const CRYPT_DSA_Ctx *ctx, BSL_Param *para); #endif /** * @ingroup dsa * @brief dsa Compare public keys and parameters * * @param a [IN] DSA context structure * @param b [IN] DSA context structure * * @retval CRYPT_SUCCESS is the same * @retval CRYPT_NULL_INPUT Invalid null pointer input. * @retval CRYPT_DSA_ERR_KEY_INFO The key information is incorrect. * @retval CRYPT_DSA_PUBKEY_NOT_EQUAL Public keys are not equal. * @retval CRYPT_DSA_PARA_ERROR The parameter information is incorrect. * @retval CRYPT_DSA_PARA_NOT_EQUAL The parameters are not equal. */ int32_t CRYPT_DSA_Cmp(const CRYPT_DSA_Ctx *a, const CRYPT_DSA_Ctx *b); /** * @ingroup dsa * @brief DSA control interface * * @param ctx [IN] DSA context structure * @param opt [IN] Operation mode * @param val [IN] Parameter * @param len [IN] val length * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_SUCCESS obtained successfully. */ int32_t CRYPT_DSA_Ctrl(CRYPT_DSA_Ctx *ctx, int32_t opt, void *val, uint32_t len); /** * @ingroup DSA * @brief DSA get security bits * * @param ctx [IN] DSA Context structure * * @retval security bits */ int32_t CRYPT_DSA_GetSecBits(const CRYPT_DSA_Ctx *ctx); #ifdef HITLS_CRYPTO_DSA_CHECK /** * @ingroup dsa * @brief check the key pair consistency * * @param checkType [IN] check type * @param pkey1 [IN] dsa key context structure * @param pkey2 [IN] dsa key context structure * * @retval CRYPT_SUCCESS succeeded * @retval other error. */ int32_t CRYPT_DSA_Check(uint32_t checkType, const CRYPT_DSA_Ctx *pkey1, const CRYPT_DSA_Ctx *pkey2); #endif // HITLS_CRYPTO_DSA_CHECK #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_DSA #endif // CRYPT_DSA_H
2401_83913325/openHiTLS-examples_7925
crypto/dsa/include/crypt_dsa.h
C
unknown
17,937
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_DSA #include "crypt_errno.h" #include "securec.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_utils.h" #include "crypt_encode_internal.h" #include "dsa_local.h" #include "crypt_dsa.h" #include "eal_md_local.h" #include "crypt_util_rand.h" #include "crypt_params_key.h" #ifdef HITLS_BSL_PARAMS #include "bsl_params.h" #include "crypt_params_key.h" #endif CRYPT_DSA_Ctx *CRYPT_DSA_NewCtx(void) { CRYPT_DSA_Ctx *ctx = BSL_SAL_Malloc(sizeof(CRYPT_DSA_Ctx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(ctx, sizeof(CRYPT_DSA_Ctx), 0, sizeof(CRYPT_DSA_Ctx)); BSL_SAL_ReferencesInit(&(ctx->references)); return ctx; } CRYPT_DSA_Ctx *CRYPT_DSA_NewCtxEx(void *libCtx) { CRYPT_DSA_Ctx *ctx = CRYPT_DSA_NewCtx(); if (ctx == NULL) { return NULL; } ctx->libCtx = libCtx; return ctx; } static bool InputBufferCheck(const uint8_t *buffer, uint32_t bufferLen) { if (buffer == NULL || bufferLen == 0) { return true; } return false; } static int32_t NewParaCheck(const CRYPT_DsaPara *para) { bool invalidInput = (para == NULL) || InputBufferCheck(para->p, para->pLen) || InputBufferCheck(para->q, para->qLen) || InputBufferCheck(para->g, para->gLen); if (invalidInput) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->pLen > BN_BITS_TO_BYTES(DSA_MAX_PBITS)) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } if (para->qLen > para->pLen) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } if (para->gLen > para->pLen) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } return CRYPT_SUCCESS; } static CRYPT_DSA_Para *ParaMemGet(uint32_t bits) { CRYPT_DSA_Para *para = BSL_SAL_Malloc(sizeof(CRYPT_DSA_Para)); if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } para->p = BN_Create(bits); para->q = BN_Create(bits); para->g = BN_Create(bits); if (para->p == NULL || para->q == NULL || para->g == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); CRYPT_DSA_FreePara(para); return NULL; } return para; } CRYPT_DSA_Para *CRYPT_DSA_NewPara(const CRYPT_DsaPara *para) { if (NewParaCheck(para) != CRYPT_SUCCESS) { return NULL; } CRYPT_DSA_Para *retPara = ParaMemGet(para->pLen * 8); // bits = bytes * 8 if (retPara == NULL) { return NULL; } int32_t ret = BN_Bin2Bn(retPara->p, para->p, para->pLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = BN_Bin2Bn(retPara->q, para->q, para->qLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = BN_Bin2Bn(retPara->g, para->g, para->gLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } return retPara; ERR: CRYPT_DSA_FreePara(retPara); return NULL; } void CRYPT_DSA_FreePara(CRYPT_DSA_Para *para) { if (para == NULL) { return; } BN_Destroy(para->p); BN_Destroy(para->q); BN_Destroy(para->g); BSL_SAL_FREE(para); } void CRYPT_DSA_FreeCtx(CRYPT_DSA_Ctx *ctx) { if (ctx == NULL) { return; } int ref = 0; BSL_SAL_AtomicDownReferences(&(ctx->references), &ref); if (ref > 0) { return; } BSL_SAL_ReferencesFree(&(ctx->references)); CRYPT_DSA_FreePara(ctx->para); BN_Destroy(ctx->x); BN_Destroy(ctx->y); BSL_SAL_FREE(ctx->mdAttr); BSL_SAL_FREE(ctx); } static int32_t ParaPQGCheck(const BN_BigNum *p, const BN_BigNum *q, const BN_BigNum *g) { uint32_t pBits = BN_Bits(p); BN_BigNum *r = BN_Create(pBits + 1); BN_Optimizer *opt = BN_OptimizerCreate(); int32_t ret; if (r == NULL || opt == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // judgment of numeric values // r = p - 1 ret = BN_SubLimb(r, p, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // q < p - 1 if (BN_Cmp(q, r) >= 0) { ret = CRYPT_DSA_ERR_KEY_PARA; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // g < p - 1 if (BN_Cmp(g, r) >= 0) { ret = CRYPT_DSA_ERR_KEY_PARA; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // judgment of multiple relationship about p & q ret = BN_Div(NULL, r, r, q, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } // (p - 1) % q == 0 if (!BN_IsZero(r)) { ret = CRYPT_DSA_ERR_KEY_PARA; BSL_ERR_PUSH_ERROR(ret); } EXIT: BN_Destroy(r); BN_OptimizerDestroy(opt); return ret; } static int32_t ParaDataCheck(const CRYPT_DSA_Para *para) { const BN_BigNum *p = para->p; const BN_BigNum *q = para->q; const BN_BigNum *g = para->g; // 1. judge validity of length uint32_t pBits = BN_Bits(p); if (pBits < DSA_MIN_PBITS || pBits > DSA_MAX_PBITS) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } if (BN_Bits(q) < DSA_MIN_QBITS) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } // 2. parity judgment of p & q and value judgment of g // p is an odd number && q is an odd number if (BN_GetBit(p, 0) == 0 || BN_GetBit(q, 0) == 0) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } // g != 1 && g != 0 if (BN_IsOne(g) || BN_IsZero(g)) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } // This interface is invoked only here, and pushErr is performed internally. // If this interface fails, pushErr does not need to be invoked. return ParaPQGCheck(p, q, g); } static CRYPT_DSA_Para *ParaDup(const CRYPT_DSA_Para *para) { CRYPT_DSA_Para *ret = BSL_SAL_Malloc(sizeof(CRYPT_DSA_Para)); if (ret == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } ret->p = BN_Dup(para->p); ret->q = BN_Dup(para->q); ret->g = BN_Dup(para->g); if (ret->p == NULL || ret->q == NULL || ret->g == NULL) { CRYPT_DSA_FreePara(ret); BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return NULL; } return ret; } int32_t CRYPT_DSA_SetPara(CRYPT_DSA_Ctx *ctx, const CRYPT_DsaPara *para) { if (ctx == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DSA_Para *dsaPara = CRYPT_DSA_NewPara(para); if (dsaPara == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_NEW_PARA_FAIL); return CRYPT_EAL_ERR_NEW_PARA_FAIL; } int32_t ret = ParaDataCheck(dsaPara); if (ret != CRYPT_SUCCESS) { CRYPT_DSA_FreePara(dsaPara); return ret; } BN_Destroy(ctx->x); BN_Destroy(ctx->y); CRYPT_DSA_FreePara(ctx->para); ctx->x = NULL; ctx->y = NULL; ctx->para = dsaPara; return CRYPT_SUCCESS; } int32_t CRYPT_DSA_GetPara(const CRYPT_DSA_Ctx *ctx, CRYPT_DsaPara *para) { if (ctx == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_PARA_ERROR); return CRYPT_DSA_PARA_ERROR; } int32_t ret = BN_Bn2Bin(ctx->para->p, para->p, &(para->pLen)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BN_Bn2Bin(ctx->para->q, para->q, &(para->qLen)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BN_Bn2Bin(ctx->para->g, para->g, &(para->gLen)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } CRYPT_DSA_Ctx *CRYPT_DSA_DupCtx(CRYPT_DSA_Ctx *dsaCtx) { if (dsaCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } CRYPT_DSA_Ctx *dsaNewCtx = BSL_SAL_Malloc(sizeof(CRYPT_DSA_Ctx)); if (dsaNewCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(dsaNewCtx, sizeof(CRYPT_DSA_Ctx), 0, sizeof(CRYPT_DSA_Ctx)); GOTO_ERR_IF_SRC_NOT_NULL(dsaNewCtx->x, dsaCtx->x, BN_Dup(dsaCtx->x), CRYPT_MEM_ALLOC_FAIL); GOTO_ERR_IF_SRC_NOT_NULL(dsaNewCtx->y, dsaCtx->y, BN_Dup(dsaCtx->y), CRYPT_MEM_ALLOC_FAIL); GOTO_ERR_IF_SRC_NOT_NULL(dsaNewCtx->para, dsaCtx->para, ParaDup(dsaCtx->para), CRYPT_MEM_ALLOC_FAIL); GOTO_ERR_IF_SRC_NOT_NULL(dsaNewCtx->mdAttr, dsaCtx->mdAttr, BSL_SAL_Dump(dsaCtx->mdAttr, strlen(dsaCtx->mdAttr) + 1), CRYPT_MEM_ALLOC_FAIL); dsaNewCtx->libCtx = dsaCtx->libCtx; BSL_SAL_ReferencesInit(&(dsaNewCtx->references)); return dsaNewCtx; ERR: CRYPT_DSA_FreeCtx(dsaNewCtx); return NULL; } uint32_t CRYPT_DSA_GetBits(const CRYPT_DSA_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return 0; } return BN_Bits(ctx->para->p); } uint32_t CRYPT_DSA_GetSignLen(const CRYPT_DSA_Ctx *ctx) { if (ctx == NULL || ctx->para == NULL) { return 0; } uint32_t qLen = BN_Bytes(ctx->para->q); uint32_t maxSignLen = 0; int32_t ret = CRYPT_EAL_GetSignEncodeLen(qLen, qLen, &maxSignLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return 0; } return maxSignLen; } /* x != 0 && x < q */ int32_t CRYPT_DSA_SetPrvKey(CRYPT_DSA_Ctx *ctx, const CRYPT_DsaPrv *prv) { if (ctx == NULL || prv == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (InputBufferCheck(prv->data, prv->len)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } if (BN_Bytes(ctx->para->q) < prv->len) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_INFO); return CRYPT_DSA_ERR_KEY_INFO; } BN_BigNum *bnX = BN_Create(prv->len * 8); if (bnX == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = BN_Bin2Bn(bnX, prv->data, prv->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } // x < q if (BN_Cmp(bnX, ctx->para->q) >= 0) { ret = CRYPT_DSA_ERR_KEY_INFO; BSL_ERR_PUSH_ERROR(ret); goto ERR; } // x != 0 if (BN_IsZero(bnX)) { ret = CRYPT_DSA_ERR_KEY_INFO; BSL_ERR_PUSH_ERROR(ret); goto ERR; } BN_Destroy(ctx->x); ctx->x = bnX; return ret; ERR: BN_Destroy(bnX); return ret; } /* y != 0 && y != 1 && y < p */ int32_t CRYPT_DSA_SetPubKey(CRYPT_DSA_Ctx *ctx, const CRYPT_DsaPub *pub) { if (ctx == NULL || pub == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (InputBufferCheck(pub->data, pub->len)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } if (BN_Bytes(ctx->para->p) < pub->len) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_INFO); return CRYPT_DSA_ERR_KEY_INFO; } BN_BigNum *bnY = BN_Create(pub->len * 8); // bits = bytes * 8 if (bnY == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = BN_Bin2Bn(bnY, pub->data, pub->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } // y < p if (BN_Cmp(bnY, ctx->para->p) >= 0) { ret = CRYPT_DSA_ERR_KEY_INFO; BSL_ERR_PUSH_ERROR(ret); goto ERR; } // y != 0 && y != 1 if (BN_IsZero(bnY) || BN_IsOne(bnY)) { ret = CRYPT_DSA_ERR_KEY_INFO; BSL_ERR_PUSH_ERROR(ret); goto ERR; } BN_Destroy(ctx->y); ctx->y = bnY; return CRYPT_SUCCESS; ERR: BN_Destroy(bnY); return ret; } int32_t CRYPT_DSA_GetPrvKey(const CRYPT_DSA_Ctx *ctx, CRYPT_DsaPrv *prv) { if (ctx == NULL || prv == NULL || prv->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } if (ctx->x == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_INFO); return CRYPT_DSA_ERR_KEY_INFO; } if (BN_Bytes(ctx->para->q) > prv->len) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_BUFF_LEN_NOT_ENOUGH); return CRYPT_DSA_BUFF_LEN_NOT_ENOUGH; } int32_t ret = BN_Bn2Bin(ctx->x, prv->data, &(prv->len)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t CRYPT_DSA_GetPubKey(const CRYPT_DSA_Ctx *ctx, CRYPT_DsaPub *pub) { if (ctx == NULL || pub == NULL || pub->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->y == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_INFO); return CRYPT_DSA_ERR_KEY_INFO; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } if (BN_Bytes(ctx->para->p) > pub->len) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_BUFF_LEN_NOT_ENOUGH); return CRYPT_DSA_BUFF_LEN_NOT_ENOUGH; } int32_t ret = BN_Bn2Bin(ctx->y, pub->data, &(pub->len)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #ifdef HITLS_BSL_PARAMS int32_t CRYPT_DSA_SetParaEx(CRYPT_DSA_Ctx *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } #ifdef HITLS_CRYPTO_PROVIDER int32_t ret; const BSL_Param *temp = NULL; if ((temp = BSL_PARAM_FindConstParam(para, CRYPT_PARAM_MD_ATTR)) != NULL) { ret = CRYPT_PkeySetMdAttr((const char *)(temp->value), temp->valueLen, &(ctx->mdAttr)); if (ret != CRYPT_SUCCESS) { return ret; } } #endif if (BSL_PARAM_FindConstParam(para, CRYPT_PARAM_DSA_P) == NULL) { return CRYPT_SUCCESS; } CRYPT_DsaPara dsaPara = {0}; (void)GetConstParamValue(para, CRYPT_PARAM_DSA_P, &dsaPara.p, &dsaPara.pLen); (void)GetConstParamValue(para, CRYPT_PARAM_DSA_Q, &dsaPara.q, &dsaPara.qLen); (void)GetConstParamValue(para, CRYPT_PARAM_DSA_G, &dsaPara.g, &dsaPara.gLen); return CRYPT_DSA_SetPara(ctx, &dsaPara); } int32_t CRYPT_DSA_GetParaEx(const CRYPT_DSA_Ctx *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DsaPara eccPara = {0}; BSL_Param *paramP = GetParamValue(para, CRYPT_PARAM_DSA_P, &eccPara.p, &eccPara.pLen); BSL_Param *paramQ = GetParamValue(para, CRYPT_PARAM_DSA_Q, &eccPara.q, &eccPara.qLen); BSL_Param *paramG = GetParamValue(para, CRYPT_PARAM_DSA_G, &eccPara.g, &eccPara.gLen); int32_t ret = CRYPT_DSA_GetPara(ctx, &eccPara); if (ret != CRYPT_SUCCESS) { return ret; } paramP->useLen = eccPara.pLen; paramQ->useLen = eccPara.qLen; paramG->useLen = eccPara.gLen; return ret; } int32_t CRYPT_DSA_SetPrvKeyEx(CRYPT_DSA_Ctx *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DsaPrv dsaPrv = {0}; (void)GetConstParamValue(para, CRYPT_PARAM_DSA_PRVKEY, &dsaPrv.data, &dsaPrv.len); return CRYPT_DSA_SetPrvKey(ctx, &dsaPrv); } int32_t CRYPT_DSA_SetPubKeyEx(CRYPT_DSA_Ctx *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DsaPub dsaPub = {0}; (void)GetConstParamValue(para, CRYPT_PARAM_DSA_PUBKEY, &dsaPub.data, &dsaPub.len); return CRYPT_DSA_SetPubKey(ctx, &dsaPub); } int32_t CRYPT_DSA_GetPrvKeyEx(const CRYPT_DSA_Ctx *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DsaPrv dsaPrv = {0}; BSL_Param *paramPrv = GetParamValue(para, CRYPT_PARAM_DSA_PRVKEY, &dsaPrv.data, &dsaPrv.len); int32_t ret = CRYPT_DSA_GetPrvKey(ctx, &dsaPrv); if (ret != CRYPT_SUCCESS) { return ret; } if (paramPrv != NULL) { paramPrv->useLen = dsaPrv.len; } return CRYPT_SUCCESS; } int32_t CRYPT_DSA_GetPubKeyEx(const CRYPT_DSA_Ctx *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_DsaPub dsaPub = {0}; BSL_Param *paramPub = GetParamValue(para, CRYPT_PARAM_DSA_PUBKEY, &dsaPub.data, &dsaPub.len); int32_t ret = CRYPT_DSA_GetPubKey(ctx, &dsaPub); if (ret != CRYPT_SUCCESS) { return ret; } if (paramPub != NULL) { paramPub->useLen = dsaPub.len; } return CRYPT_SUCCESS; } #endif static int32_t RandRangeQ(void *libCtx, BN_BigNum *r, const BN_BigNum *q) { int32_t cnt = 0; for (cnt = 0; cnt < CRYPT_DSA_TRY_MAX_CNT; cnt++) { int32_t ret = BN_RandRangeEx(libCtx, r, q); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (BN_IsZero(r)) { continue; } return CRYPT_SUCCESS; // if succeed then exit } /* If the key fails to be generated after try CRYPT_DSA_TRI_MAX_CNT times, then failed and exit. */ BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_TRY_CNT); return CRYPT_DSA_ERR_TRY_CNT; } static void RefreshCtx(CRYPT_DSA_Ctx *ctx, BN_BigNum *x, BN_BigNum *y, int32_t ret) { if (ret == CRYPT_SUCCESS) { BN_Destroy(ctx->x); BN_Destroy(ctx->y); ctx->x = x; ctx->y = y; } else { BN_Destroy(x); BN_Destroy(y); } } /* Security length from NIST.FIPS.186-4 4.2 */ static uint32_t DSAFips1864ValidateSecurityLength(uint32_t pBits, uint32_t qBits, int isGen, int type) { if (type == CRYPT_DSA_FFC_PARAM) { if (pBits == 3072 && qBits == 256) { // If Pbits = 3072 and Qbits = 256. return 128; // Secure length is 128. } if (pBits == 2048 && (qBits == 224 || qBits == 256)) { // If Pbits = 2048 and Qbits = 224 or 256. return 112; // Secure length is 112. } /* Security strength of 80 bits is no longer considered adequate, and is retained only for compatibility. */ if (isGen == 1) { return 0; } if (pBits == 1024 && qBits == 160) { // If Pbits = 1024 and Qbits = 160. return 80; // Secure length is 80. } } else if (type == CRYPT_DH_FFC_PARAM) { if (pBits == 2048 && (qBits == 224 || qBits == 256)) { // If Pbits = 2048 and Qbits = 224 or 256. return 112; // Secure length is 112. } } return 0; } // fips186-4 A.2.2 int32_t CryptDsaFips1864PartialValidateG(const CRYPT_DSA_Para *dsaPara) { if (BN_IsNegative(dsaPara->g) == true || BN_IsZero(dsaPara->g) == true || BN_IsOne(dsaPara->g) == true) { // g < 2 BSL_ERR_PUSH_ERROR(CRYPT_DSA_VERIFY_FAIL); return CRYPT_DSA_VERIFY_FAIL; } int32_t ret; BN_Optimizer *opt = BN_OptimizerCreate(); RETURN_RET_IF(opt == NULL, CRYPT_MEM_ALLOC_FAIL); (void)OptimizerStart(opt); uint32_t pBits = BN_Bits(dsaPara->p); BN_BigNum *p_1 = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); if (p_1 == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } ret = BN_SubLimb(p_1, dsaPara->p, 1); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); if (BN_Cmp(dsaPara->g, p_1) > 0) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_VERIFY_FAIL); ret = CRYPT_DSA_VERIFY_FAIL; goto ERR; } ret = BN_ModExp(p_1, dsaPara->g, dsaPara->q, dsaPara->p, opt); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); if (BN_IsOne(p_1) != true) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_VERIFY_FAIL); ret = CRYPT_DSA_VERIFY_FAIL; } ERR: OptimizerEnd(opt); BN_OptimizerDestroy(opt); return ret; } // Generate private key, from SP800-56Ar3 5_6_1_1_4 static int32_t DSA_GenPrivateKey(void *libCtx, const CRYPT_DSA_Para *para, BN_BigNum *privKey) { uint32_t pBits = BN_Bits(para->p); uint32_t qBits = BN_Bits(para->q); RETURN_RET_IF(DSAFips1864ValidateSecurityLength(pBits, qBits, 1, CRYPT_DSA_FFC_PARAM) == 0, CRYPT_DSA_PARA_ERROR); int32_t ret = CryptDsaFips1864PartialValidateG(para); RETURN_RET_IF(ret != CRYPT_SUCCESS, ret); ret = CRYPT_MEM_ALLOC_FAIL; BN_BigNum *pow = BN_Create(qBits + 1); GOTO_ERR_IF_TRUE(pow == NULL, ret); GOTO_ERR_IF(BN_SetLimb(pow, 1), ret); GOTO_ERR_IF(BN_Lshift(pow, pow, qBits), ret); BN_BigNum *min = pow; if (BN_Cmp(min, para->q) > 0) { min = para->q; } while (true) { GOTO_ERR_IF(RandRangeQ(libCtx, privKey, pow), ret); // c GOTO_ERR_IF(BN_AddLimb(privKey, privKey, 1), ret); // c + 1 if (BN_Cmp(privKey, min) < 0) { // c <= min - 2 equal to c + 1 < min. break; } } ERR: if (ret != CRYPT_SUCCESS) { (void)BN_Zeroize(privKey); } BN_Destroy(pow); return ret; } int32_t CRYPT_DSA_Gen(CRYPT_DSA_Ctx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } int32_t ret = CRYPT_SUCCESS; int32_t cnt; BN_BigNum *x = BN_Create(BN_Bits(ctx->para->q)); BN_BigNum *y = BN_Create(BN_Bits(ctx->para->p)); BN_Mont *mont = BN_MontCreate(ctx->para->p); BN_Optimizer *opt = BN_OptimizerCreate(); if (x == NULL || y == NULL || opt == NULL || mont == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } for (cnt = 0; cnt < CRYPT_DSA_TRY_MAX_CNT; cnt++) { /* Generate the private key x of [1, q-1], see RFC6979-2.2. */ if ((ctx->flag & CRYPT_ENABLE_SP800_KEYGEN_FLAG) != 0) { ret = DSA_GenPrivateKey(ctx->libCtx, ctx->para, x); } else { ret = RandRangeQ(ctx->libCtx, x, ctx->para->q); } if (ret != CRYPT_SUCCESS) { // Internal API, the BSL_ERR_PUSH_ERROR info is already exists when failed. goto ERR; } /* Calculate the public key y. */ ret = BN_MontExpConsttime(y, ctx->para->g, x, mont, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } /* y != 0 && y != 1 */ if (BN_IsZero(y) || BN_IsOne(y)) { continue; } goto ERR; // If succeed then exit. } /* If the key fails to be generated after try CRYPT_DSA_TRY_MAX_CNT times, then failed and exit. */ ret = CRYPT_DSA_ERR_TRY_CNT; BSL_ERR_PUSH_ERROR(ret); ERR: RefreshCtx(ctx, x, y, ret); BN_MontDestroy(mont); BN_OptimizerDestroy(opt); return ret; } // Get the input hash data, see RFC6979-2.4.1 and RFC6979-2.3.2 static BN_BigNum *DSA_Bits2Int(BN_BigNum *q, const uint8_t *data, uint32_t dataLen) { BN_BigNum *d = BN_Create(BN_Bits(q)); // 1 byte = 8 bits if (d == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } if (data != NULL) { uint32_t qLen = BN_Bytes(q); uint32_t dLen = (dataLen < qLen) ? dataLen : qLen; // The input parameters of the function have been verified, and no failure exists. (void)BN_Bin2Bn(d, data, dLen); } return d; } // s = (h + x*r)*k^-1 mod q // s' = (h*blind + x*r*blind)*k^-1*blind^-1 mod q // s == s' static int32_t CalcSValue(const CRYPT_DSA_Ctx *ctx, BN_BigNum *r, BN_BigNum *s, BN_BigNum *k, BN_BigNum *d, BN_Optimizer *opt) { BN_BigNum *blind = BN_Create(BN_Bits(ctx->para->q)); if (blind == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } BN_BigNum *blindm = BN_Create(BN_Bits(ctx->para->q)); if (blindm == NULL) { BN_Destroy(blind); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret; GOTO_ERR_IF(RandRangeQ(ctx->libCtx, blind, ctx->para->q), ret); GOTO_ERR_IF(BN_ModMul(s, blind, ctx->x, ctx->para->q, opt), ret); GOTO_ERR_IF(BN_ModMul(s, s, r, ctx->para->q, opt), ret); GOTO_ERR_IF(BN_ModMul(blindm, blind, d, ctx->para->q, opt), ret); GOTO_ERR_IF(BN_ModAdd(s, s, blindm, ctx->para->q, opt), ret); GOTO_ERR_IF(BN_ModInv(k, k, ctx->para->q, opt), ret); GOTO_ERR_IF(BN_ModMul(s, s, k, ctx->para->q, opt), ret); GOTO_ERR_IF(BN_ModInv(blind, blind, ctx->para->q, opt), ret); GOTO_ERR_IF(BN_ModMul(s, s, blind, ctx->para->q, opt), ret); ERR: BN_Destroy(blind); BN_Destroy(blindm); return ret; } static int32_t SignCore(const CRYPT_DSA_Ctx *ctx, BN_BigNum *d, BN_BigNum *r, BN_BigNum *s) { int32_t cnt = 0; int32_t ret = CRYPT_SUCCESS; BN_BigNum *k = BN_Create(BN_Bits(ctx->para->q)); BN_Mont *montP = BN_MontCreate(ctx->para->p); BN_Optimizer *opt = BN_OptimizerCreate(); if (k == NULL || montP == NULL || opt == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } for (cnt = 0; cnt < CRYPT_DSA_TRY_MAX_CNT; cnt++) { // Generate random number k of [1, q-1], see RFC6979-2.4.2 */ ret = RandRangeQ(ctx->libCtx, k, ctx->para->q); if (ret != CRYPT_SUCCESS) { // Internal function. The BSL_ERR_PUSH_ERROR information exists when the failure occurs. goto EXIT; } // Compute r = g^k mod p mod q, see RFC6979-2.4.3 */ ret = BN_MontExpConsttime(r, ctx->para->g, k, montP, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_Mod(r, r, ctx->para->q, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (BN_IsZero(r)) { continue; } // Compute s = (h+x*sign->r)/k mod q, see RFC6979-2.4.4 */ ret = CalcSValue(ctx, r, s, k, d, opt); if (ret != CRYPT_SUCCESS) { goto EXIT; } if (BN_IsZero(s)) { continue; } goto EXIT; // The signature generation meets the requirements and exits successfully. } ret = CRYPT_DSA_ERR_TRY_CNT; BSL_ERR_PUSH_ERROR(ret); EXIT: BN_Destroy(k); BN_MontDestroy(montP); BN_OptimizerDestroy(opt); return ret; } static int32_t CryptDsaSign(const CRYPT_DSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen, BN_BigNum **r, BN_BigNum **s) { int32_t ret; BN_BigNum *signR = NULL; BN_BigNum *signS = NULL; BN_BigNum *d = DSA_Bits2Int(ctx->para->q, data, dataLen); if (d == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } signR = BN_Create(BN_Bits(ctx->para->p)); signS = BN_Create(BN_Bits(ctx->para->q)); if ((signR == NULL) || (signS == NULL)) { BN_Destroy(d); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } ret = SignCore(ctx, d, signR, signS); BN_Destroy(d); if (ret != CRYPT_SUCCESS) { goto ERR; } *r = signR; *s = signS; return ret; ERR: BN_Destroy(signR); BN_Destroy(signS); return ret; } // Data with a value of 0 can also be signed. int32_t CRYPT_DSA_SignData(const CRYPT_DSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen, uint8_t *sign, uint32_t *signLen) { if (ctx == NULL || sign == NULL || signLen == NULL || (data == NULL && dataLen != 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } if (ctx->x == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_INFO); return CRYPT_DSA_ERR_KEY_INFO; } if (*signLen < CRYPT_DSA_GetSignLen(ctx)) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_BUFF_LEN_NOT_ENOUGH); return CRYPT_DSA_BUFF_LEN_NOT_ENOUGH; } int32_t ret; BN_BigNum *r = NULL; BN_BigNum *s = NULL; ret = CryptDsaSign(ctx, data, dataLen, &r, &s); if (ret != CRYPT_SUCCESS) { return ret; } ret = CRYPT_EAL_EncodeSign(r, s, sign, signLen); BN_Destroy(r); BN_Destroy(s); return ret; } int32_t CRYPT_DSA_Sign(const CRYPT_DSA_Ctx *ctx, int32_t algId, const uint8_t *data, uint32_t dataLen, uint8_t *sign, uint32_t *signLen) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } uint8_t hash[64]; // 64 is max hash len uint32_t hashLen = sizeof(hash) / sizeof(hash[0]); int32_t ret = EAL_Md(algId, ctx->libCtx, ctx->mdAttr, data, dataLen, hash, &hashLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return CRYPT_DSA_SignData(ctx, hash, hashLen, sign, signLen); } static int32_t VerifyCore(const CRYPT_DSA_Ctx *ctx, BN_BigNum *d, BN_BigNum *r, BN_BigNum *s) { int32_t ret = CRYPT_MEM_ALLOC_FAIL; BN_BigNum *u1 = BN_Create(BN_Bits(ctx->para->p)); BN_BigNum *u2 = BN_Create(BN_Bits(ctx->para->p)); BN_BigNum *w = BN_Create(BN_Bits(ctx->para->q)); BN_Mont *montP = BN_MontCreate(ctx->para->p); BN_Optimizer *opt = BN_OptimizerCreate(); if (u1 == NULL || u2 == NULL || w == NULL || montP == NULL || opt == NULL) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } /* Calculate w = 1/s mod q * u1 = (d * w) mod q * u2 = (r * w) mod q * u1 = (g ^ u1) mod p * u2 = (y ^ u2) mod p * v = (u1 * u2) mod p * v = v mod q * If v == r, sign verification is succeeded. */ ret = BN_ModInv(w, s, ctx->para->q, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_ModMul(u1, d, w, ctx->para->q, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_ModMul(u2, r, w, ctx->para->q, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_MontExpMul(u1, ctx->para->g, u1, ctx->y, u2, montP, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_Mod(u1, u1, ctx->para->q, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = BN_Cmp(u1, r); if (ret != 0) { BSL_ERR_PUSH_ERROR(ret); ret = CRYPT_DSA_VERIFY_FAIL; } EXIT: BN_Destroy(u1); BN_Destroy(u2); BN_Destroy(w); BN_MontDestroy(montP); BN_OptimizerDestroy(opt); return ret; } int32_t CRYPT_DSA_VerifyData(const CRYPT_DSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen, const uint8_t *sign, uint32_t signLen) { if (ctx == NULL || sign == NULL || signLen == 0 || (data == NULL && dataLen != 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->para == NULL || ctx->y == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_INFO); return CRYPT_DSA_ERR_KEY_INFO; } int32_t ret; BN_BigNum *r = BN_Create(BN_Bits(ctx->para->p)); BN_BigNum *s = BN_Create(BN_Bits(ctx->para->q)); BN_BigNum *d = DSA_Bits2Int(ctx->para->q, data, dataLen); if (r == NULL || s == NULL || d == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; goto EXIT; } ret = CRYPT_EAL_DecodeSign(sign, signLen, r, s); if (ret != CRYPT_SUCCESS) { goto EXIT; } ret = VerifyCore(ctx, d, r, s); EXIT: BN_Destroy(r); BN_Destroy(s); BN_Destroy(d); return ret; } int32_t CRYPT_DSA_Verify(const CRYPT_DSA_Ctx *ctx, int32_t algId, const uint8_t *data, uint32_t dataLen, const uint8_t *sign, uint32_t signLen) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } uint8_t hash[64]; // 64 is max hash len uint32_t hashLen = sizeof(hash) / sizeof(hash[0]); int32_t ret = EAL_Md(algId, ctx->libCtx, ctx->mdAttr, data, dataLen, hash, &hashLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } return CRYPT_DSA_VerifyData(ctx, hash, hashLen, sign, signLen); } int32_t CRYPT_DSA_Cmp(const CRYPT_DSA_Ctx *a, const CRYPT_DSA_Ctx *b) { RETURN_RET_IF(a == NULL || b == NULL, CRYPT_NULL_INPUT); RETURN_RET_IF(a->y == NULL || b->y == NULL, CRYPT_DSA_ERR_KEY_INFO); RETURN_RET_IF(BN_Cmp(a->y, b->y) != 0, CRYPT_DSA_PUBKEY_NOT_EQUAL); // para must be both NULL and non-NULL. RETURN_RET_IF((a->para == NULL) != (b->para == NULL), CRYPT_DSA_PARA_ERROR); if (a->para != NULL) { RETURN_RET_IF(BN_Cmp(a->para->p, b->para->p) != 0 || BN_Cmp(a->para->q, b->para->q) != 0 || BN_Cmp(a->para->g, b->para->g) != 0, CRYPT_DSA_PARA_NOT_EQUAL); } return CRYPT_SUCCESS; } static uint32_t CRYPT_DSA_GetPrvKeyLen(const CRYPT_DSA_Ctx *ctx) { return BN_Bytes(ctx->x); } static uint32_t CRYPT_DSA_GetPubKeyLen(const CRYPT_DSA_Ctx *ctx) { if (ctx->para != NULL) { return BN_Bytes(ctx->para->p); } if (ctx->y != NULL) { return BN_Bytes(ctx->y); } BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } int32_t CRYPT_DSA_GetSecBits(const CRYPT_DSA_Ctx *ctx) { if (ctx == NULL || ctx->para == NULL || ctx->para->p == NULL || ctx->para->q == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } return BN_SecBits((int32_t)BN_Bits(ctx->para->p), (int32_t)BN_Bits(ctx->para->q)); } #ifdef HITLS_CRYPTO_DSA_GEN_PARA static int32_t GetDsaParamValue(const BSL_Param *params, int32_t paramId, uint32_t maxLen, const uint8_t **value, uint32_t *valueLen) { const BSL_Param *param = BSL_PARAM_FindConstParam(params, paramId); if (param == NULL || param->value == NULL || param->valueLen > maxLen || param->valueLen == 0) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_KEY_PARA); return CRYPT_DSA_ERR_KEY_PARA; } *value = param->value; *valueLen = param->valueLen; return CRYPT_SUCCESS; } static int32_t DSAFips1864GenQ(int32_t algId, void *libCtx, const char *mdAttr, uint32_t qBits, const uint8_t *seed, uint32_t seedLen, BN_BigNum *q) { uint8_t hash[64] = {0}; // 64 is max hash len uint32_t hashLen = sizeof(hash) / sizeof(hash[0]); int32_t ret = EAL_Md(algId, libCtx, mdAttr, seed, seedLen, hash, &hashLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } uint8_t *md = hash; uint32_t qLen = qBits >> 3; if (hashLen > qLen) { md = hash + (hashLen - qLen); } md[0] |= 0x80; md[qLen - 1] |= 0x01; ret = BN_Bin2Bn(q, md, qLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } static int32_t DSAFips1864GenP(DSA_FIPS186_4_Para *fipsPara, const BN_BigNum *pow, BN_Optimizer *opt, BSL_Buffer *seed, CRYPT_DSA_Para *dsaPara, void *libCtx, const char *mdAttr) { uint8_t hash[64]; // 64 is max hash len uint32_t hashLen; uint32_t outLen = CRYPT_GetMdSizeById(fipsPara->algId) * 8; // bytes * 8 = bits RETURN_RET_IF(outLen == 0, CRYPT_EAL_ERR_ALGID); uint32_t n = (fipsPara->l - 1) / outLen; // ((pBits + outLen - 1) / outLen) - 1 int32_t ret = OptimizerStart(opt); RETURN_RET_IF(ret != CRYPT_SUCCESS, ret); BN_BigNum *V = OptimizerGetBn(opt, BITS_TO_BN_UNIT(outLen)); if (V == NULL) { OptimizerEnd(opt); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } for (uint32_t j = 0; j <= n; j++) { for (uint32_t k = 0; k < seed->dataLen; k++) { seed->data[seed->dataLen - k - 1]++; if (seed->data[seed->dataLen - k - 1] != 0) { // no carry break; } } hashLen = sizeof(hash) / sizeof(hash[0]); (void)memset_s(hash, hashLen, 0, hashLen); ret = EAL_Md(fipsPara->algId, libCtx, mdAttr, seed->data, seed->dataLen, hash, &hashLen); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_Bin2Bn(V, hash, hashLen); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_Lshift(V, V, outLen * j); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_Add(dsaPara->p, dsaPara->p, V); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); } ret = BN_MaskBit(dsaPara->p, fipsPara->l - 1); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_Add(V, pow, dsaPara->p); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_Lshift(dsaPara->p, dsaPara->q, 1); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_Mod(dsaPara->p, V, dsaPara->p, opt); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_SubLimb(dsaPara->p, dsaPara->p, 1); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_Sub(dsaPara->p, V, dsaPara->p); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); OptimizerEnd(opt); return CRYPT_SUCCESS; ERR: (void)BN_Zeroize(dsaPara->p); OptimizerEnd(opt); return ret; } static int32_t SetPQ2Para(CRYPT_DSA_Para *destPara, const CRYPT_DSA_Para *srcPara) { uint32_t pBits = BN_Bits(srcPara->p); uint32_t qBits = BN_Bits(srcPara->q); BN_BigNum *pOut = BN_Create(pBits); if (pOut == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } BN_BigNum *qOut = BN_Create(qBits); if (qOut == NULL) { BN_Destroy(pOut); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = BN_Copy(pOut, srcPara->p); if (ret != CRYPT_SUCCESS) { BN_Destroy(pOut); BN_Destroy(qOut); BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BN_Copy(qOut, srcPara->q); if (ret != CRYPT_SUCCESS) { BN_Destroy(pOut); BN_Destroy(qOut); BSL_ERR_PUSH_ERROR(ret); return ret; } BN_Destroy(destPara->p); BN_Destroy(destPara->q); destPara->p = pOut; destPara->q = qOut; return CRYPT_SUCCESS; } // fips186-4 A.1.1.2 int32_t CryptDsaFips1864GenPq(CRYPT_DSA_Ctx *ctx, DSA_FIPS186_4_Para *fipsPara, uint32_t type, BSL_Buffer *seed, uint32_t *counter) { BSL_Buffer msg = {NULL, 0}; RETURN_RET_IF(DSAFips1864ValidateSecurityLength(fipsPara->l, fipsPara->n, 1, type) == 0, CRYPT_DSA_PARA_ERROR); uint32_t outLen = CRYPT_GetMdSizeById(fipsPara->algId); RETURN_RET_IF(seed->dataLen * 8 < fipsPara->n || outLen * 8 < fipsPara->n, CRYPT_DSA_PARA_ERROR); // from FIPS.186-4 BN_Optimizer *opt = BN_OptimizerCreate(); RETURN_RET_IF(opt == NULL, CRYPT_MEM_ALLOC_FAIL); (void)OptimizerStart(opt); BN_BigNum *pow = OptimizerGetBn(opt, BITS_TO_BN_UNIT(fipsPara->l)); BN_BigNum *pTmp = OptimizerGetBn(opt, BITS_TO_BN_UNIT(fipsPara->l)); BN_BigNum *qTmp = OptimizerGetBn(opt, BITS_TO_BN_UNIT(fipsPara->n)); msg.dataLen = seed->dataLen; msg.data = (uint8_t *)BSL_SAL_Calloc(seed->dataLen, 1); int32_t ret = CRYPT_MEM_ALLOC_FAIL; GOTO_ERR_IF_TRUE(pow == NULL || pTmp == NULL || qTmp == NULL || msg.data == NULL, ret); CRYPT_DSA_Para dsaParaTmp = {pTmp, qTmp, NULL}; GOTO_ERR_IF(BN_SetLimb(pow, 1), ret); GOTO_ERR_IF(BN_Lshift(pow, pow, fipsPara->l - 1), ret); while (true) { // until valid p,q or error occurs. /* Generate Q */ GOTO_ERR_IF(CRYPT_RandEx(ctx->libCtx, seed->data, seed->dataLen), ret); (void)memcpy_s(msg.data, seed->dataLen, seed->data, seed->dataLen); GOTO_ERR_IF(DSAFips1864GenQ(fipsPara->algId, ctx->libCtx, ctx->mdAttr, fipsPara->n, seed->data, seed->dataLen, qTmp), ret); ret = BN_PrimeCheck(qTmp, 0, opt, NULL); if (ret == CRYPT_BN_NOR_CHECK_PRIME) { continue; } GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); /* Generate P */ uint32_t cntMax = 4 * fipsPara->l - 1; // 4 * fipsPara->l - 1 from FIPS.186-4. for (uint32_t cnt = 0; cnt <= cntMax; cnt++) { GOTO_ERR_IF(BN_Zeroize(pTmp), ret); GOTO_ERR_IF(DSAFips1864GenP(fipsPara, pow, opt, &msg, &dsaParaTmp, ctx->libCtx, ctx->mdAttr), ret); if (BN_Cmp(pTmp, pow) < 0) { continue; } ret = BN_PrimeCheck(pTmp, 0, opt, NULL); if (ret == CRYPT_BN_NOR_CHECK_PRIME) { continue; } GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); GOTO_ERR_IF(SetPQ2Para(ctx->para, &dsaParaTmp), ret); *counter = cnt; goto ERR; // success } } ERR: BSL_SAL_ClearFree(msg.data, msg.dataLen); OptimizerEnd(opt); BN_OptimizerDestroy(opt); return ret; } // fips186-4 A.1.1.3 int32_t CryptDsaFips1864ValidatePq(int32_t algId, void *libCtx, const char *mdAttr, uint32_t type, BSL_Buffer *seed, CRYPT_DSA_Para *dsaPara, uint32_t counter) { BSL_Buffer msg = {NULL, 0}; uint32_t pBits = BN_Bits(dsaPara->p); uint32_t qBits = BN_Bits(dsaPara->q); RETURN_RET_IF(DSAFips1864ValidateSecurityLength(pBits, qBits, 0, type) == 0, CRYPT_DSA_PARA_ERROR); RETURN_RET_IF(seed->dataLen * 8 < qBits || counter > 4 * pBits - 1, CRYPT_DSA_PARA_ERROR); // from FIPS.186-4 BN_Optimizer *opt = BN_OptimizerCreate(); RETURN_RET_IF(opt == NULL, CRYPT_MEM_ALLOC_FAIL); (void)OptimizerStart(opt); BN_BigNum *pow = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); BN_BigNum *pTmp = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); BN_BigNum *qTmp = OptimizerGetBn(opt, BITS_TO_BN_UNIT(qBits)); msg.dataLen = seed->dataLen; msg.data = (uint8_t *)BSL_SAL_Dump(seed->data, seed->dataLen); int32_t ret = CRYPT_MEM_ALLOC_FAIL; GOTO_ERR_IF_TRUE(pow == NULL || pTmp == NULL || qTmp == NULL || msg.data == NULL, ret); CRYPT_DSA_Para dsaParaTmp = {pTmp, qTmp, NULL}; GOTO_ERR_IF(BN_SetLimb(pow, 1), ret); GOTO_ERR_IF(BN_Lshift(pow, pow, pBits - 1), ret); /* Validate Q */ GOTO_ERR_IF(DSAFips1864GenQ(algId, libCtx, mdAttr, qBits, seed->data, seed->dataLen, qTmp), ret); GOTO_ERR_IF(BN_PrimeCheck(qTmp, 0, opt, NULL), ret); ret = CRYPT_DSA_PARA_NOT_EQUAL; GOTO_ERR_IF_TRUE(BN_Cmp(qTmp, dsaPara->q), ret); /* Validate P */ DSA_FIPS186_4_Para fipsPara = {algId, 0, pBits, qBits}; for (uint32_t i = 0; i <= counter; i++) { GOTO_ERR_IF(BN_Zeroize(pTmp), ret); GOTO_ERR_IF(DSAFips1864GenP(&fipsPara, pow, opt, &msg, &dsaParaTmp, libCtx, mdAttr), ret); if (BN_Cmp(pTmp, pow) < 0) { continue; } ret = BN_PrimeCheck(pTmp, 0, opt, NULL); if (ret == CRYPT_BN_NOR_CHECK_PRIME) { continue; } GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); if (BN_Cmp(pTmp, dsaPara->p) != 0) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_PARA_NOT_EQUAL); ret = CRYPT_DSA_PARA_NOT_EQUAL; } goto ERR; } ERR: OptimizerEnd(opt); BN_OptimizerDestroy(opt); BSL_SAL_ClearFree(msg.data, msg.dataLen); return ret; } // fips186-4 A.2.3 int32_t CryptDsaFips1864GenVerifiableG(DSA_FIPS186_4_Para *fipsPara, BSL_Buffer *seed, CRYPT_DSA_Para *dsaPara) { RETURN_RET_IF(fipsPara->index < 0, CRYPT_INVALID_ARG); int32_t ret; uint8_t hash[64]; // 64 is max hash len uint32_t hashLen; uint32_t pBits = BN_Bits(dsaPara->p); BN_Optimizer *opt = BN_OptimizerCreate(); RETURN_RET_IF(opt == NULL, CRYPT_MEM_ALLOC_FAIL); (void)OptimizerStart(opt); BN_BigNum *e = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); BN_BigNum *gTmp = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); BN_BigNum *gOut = BN_Create(pBits); uint32_t msgLen = seed->dataLen + 7; // "ggen" + index + counter = 7 uint8_t *msg = (uint8_t *)BSL_SAL_Calloc(msgLen, 1); if (e == NULL || gTmp == NULL || gOut == NULL || msg == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } GOTO_ERR_IF(BN_SubLimb(e, dsaPara->p, 1), ret); GOTO_ERR_IF(BN_Div(e, NULL, e, dsaPara->q, opt), ret); (void)memcpy_s(msg, msgLen, seed->data, seed->dataLen); (void)memcpy_s(msg + seed->dataLen, msgLen - seed->dataLen, "ggen", 4); // 4 is the length of "ggen". msg[seed->dataLen + 4] = (uint8_t)(fipsPara->index & 0xff); // skip 4 bytes. for (int32_t cnt = 1; cnt <= 0xFFFF; cnt++) { msg[seed->dataLen + 5] = (uint8_t)((cnt >> 8) & 0xff); // skip 5 bytes, get high 8 bits in cnt. msg[seed->dataLen + 6] = (uint8_t)(cnt & 0xff); // skip 6 bytes. hashLen = sizeof(hash) / sizeof(hash[0]); (void)memset_s(hash, hashLen, 0, hashLen); GOTO_ERR_IF(EAL_Md(fipsPara->algId, NULL, NULL, msg, msgLen, hash, &hashLen), ret); GOTO_ERR_IF(BN_Bin2Bn(gTmp, hash, hashLen), ret); GOTO_ERR_IF(BN_ModExp(gTmp, gTmp, e, dsaPara->p, opt), ret); if (BN_IsNegative(gTmp) == true || BN_IsZero(gTmp) == true || BN_IsOne(gTmp) == true) { // gTmp < 2 continue; } GOTO_ERR_IF(BN_Copy(gOut, gTmp), ret); BN_Destroy(dsaPara->g); dsaPara->g = gOut; goto ERR; // success } BSL_ERR_PUSH_ERROR(CRYPT_DSA_ERR_TRY_CNT); ret = CRYPT_DSA_ERR_TRY_CNT; ERR: if (ret != CRYPT_SUCCESS) { BN_Destroy(gOut); } OptimizerEnd(opt); BN_OptimizerDestroy(opt); BSL_SAL_ClearFree(msg, msgLen); return ret; } // fips186-4 A.2.1 int32_t CryptDsaFips1864GenUnverifiableG(CRYPT_DSA_Para *dsaPara) { int32_t ret; uint32_t pBits = BN_Bits(dsaPara->p); BN_Optimizer *opt = BN_OptimizerCreate(); RETURN_RET_IF(opt == NULL, CRYPT_MEM_ALLOC_FAIL); (void)OptimizerStart(opt); BN_BigNum *e = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); BN_BigNum *p_1 = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); BN_BigNum *h = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); BN_BigNum *gTmp = OptimizerGetBn(opt, BITS_TO_BN_UNIT(pBits)); BN_BigNum *gOut = BN_Create(pBits); if (e == NULL || p_1 == NULL || h == NULL || gTmp == NULL || gOut == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; goto ERR; } ret = BN_SubLimb(p_1, dsaPara->p, 1); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_Div(e, NULL, p_1, dsaPara->q, opt); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); ret = BN_SetLimb(h, 1); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); while (true) { ret = BN_AddLimb(h, h, 1); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); if (BN_Cmp(h, p_1) >= 0) { BSL_ERR_PUSH_ERROR(CRYPT_BN_BITS_INVALID); ret = CRYPT_BN_BITS_INVALID; goto ERR; } ret = BN_ModExp(gTmp, h, e, dsaPara->p, opt); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); if (BN_IsOne(gTmp) == true) { // 4. If (gTmp = 1), then go to step 2. continue; } ret = BN_Copy(gOut, gTmp); GOTO_ERR_IF_TRUE(ret != CRYPT_SUCCESS, ret); BN_Destroy(dsaPara->g); dsaPara->g = gOut; goto ERR; // success } ERR: if (ret != CRYPT_SUCCESS) { BN_Destroy(gOut); } OptimizerEnd(opt); BN_OptimizerDestroy(opt); return ret; } // fips186-4 A.2.4 int32_t CryptDsaFips1864ValidateG(DSA_FIPS186_4_Para *fipsPara, BSL_Buffer *seed, CRYPT_DSA_Para *dsaPara) { int32_t ret = CryptDsaFips1864PartialValidateG(dsaPara); if (ret != CRYPT_SUCCESS) { return ret; } CRYPT_DSA_Para dsaVerify = {dsaPara->p, dsaPara->q, NULL}; ret = CryptDsaFips1864GenVerifiableG(fipsPara, seed, &dsaVerify); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } if (BN_Cmp(dsaVerify.g, dsaPara->g) == 0) { ret = CRYPT_SUCCESS; } else { BSL_ERR_PUSH_ERROR(CRYPT_DSA_VERIFY_FAIL); ret = CRYPT_DSA_VERIFY_FAIL; } BN_Destroy(dsaVerify.g); return ret; } static int32_t DSA_GetFipsPara(BSL_Param *params, DSA_FIPS186_4_Para *fipsPara, BSL_Buffer *seed) { const uint8_t *algId = NULL; const uint8_t *pBits = NULL; const uint8_t *qBits = NULL; const uint8_t *index = NULL; const uint8_t *seedLen = NULL; uint32_t len = 0; int32_t ret = GetDsaParamValue(params, CRYPT_PARAM_DSA_ALGID, sizeof(int32_t), &algId, &len); if (ret != CRYPT_SUCCESS || len != sizeof(int32_t)) { return CRYPT_DSA_ERR_KEY_PARA; } ret = GetDsaParamValue(params, CRYPT_PARAM_DSA_PBITS, sizeof(uint32_t), &pBits, &len); if (ret != CRYPT_SUCCESS || len != sizeof(uint32_t)) { return CRYPT_DSA_ERR_KEY_PARA; } ret = GetDsaParamValue(params, CRYPT_PARAM_DSA_QBITS, sizeof(uint32_t), &qBits, &len); if (ret != CRYPT_SUCCESS || len != sizeof(uint32_t)) { return CRYPT_DSA_ERR_KEY_PARA; } ret = GetDsaParamValue(params, CRYPT_PARAM_DSA_GINDEX, sizeof(int32_t), &index, &len); if (ret != CRYPT_SUCCESS || len != sizeof(int32_t)) { return CRYPT_DSA_ERR_KEY_PARA; } ret = GetDsaParamValue(params, CRYPT_PARAM_DSA_SEEDLEN, sizeof(uint32_t), &seedLen, &len); if (ret != CRYPT_SUCCESS || len != sizeof(uint32_t)) { return CRYPT_DSA_ERR_KEY_PARA; } fipsPara->algId = *(const int32_t *)algId; fipsPara->l = *(const uint32_t *)pBits; fipsPara->n = *(const uint32_t *)qBits; fipsPara->index = *(const int32_t *)index; seed->dataLen = *(const uint32_t *)seedLen; seed->data = (uint8_t *)BSL_SAL_Calloc(seed->dataLen, 1); if (seed->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } return CRYPT_SUCCESS; } /* generate PQ NIST.FIPS.186-4 A.1.1.2 */ /* generate G NIST.FIPS.186-4 A.2.3 */ int32_t CryptDsaFips1864GenParams(CRYPT_DSA_Ctx *ctx, void *val) { int32_t ret; uint32_t counter; DSA_FIPS186_4_Para fipsPara = {0}; BSL_Buffer seed = {0}; CRYPT_DSA_Para *dsaPara = NULL; CRYPT_DSA_Para *oldPara = NULL; BSL_Param *params = (BSL_Param *)val; if (params == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } ret = DSA_GetFipsPara(params, &fipsPara, &seed); if (ret != CRYPT_SUCCESS) { return ret; } dsaPara = (CRYPT_DSA_Para *)BSL_SAL_Calloc(1, sizeof(CRYPT_DSA_Para)); if (dsaPara == NULL) { BSL_SAL_Free(seed.data); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } oldPara = ctx->para; ctx->para = dsaPara; ret = CryptDsaFips1864GenPq(ctx, &fipsPara, CRYPT_DSA_FFC_PARAM, &seed, &counter); if (ret != CRYPT_SUCCESS) { BSL_SAL_ClearFree(seed.data, seed.dataLen); BSL_SAL_Free(ctx->para); ctx->para = oldPara; return ret; } ret = CryptDsaFips1864GenVerifiableG(&fipsPara, &seed, ctx->para); BSL_SAL_ClearFree(seed.data, seed.dataLen); if (ret != CRYPT_SUCCESS) { CRYPT_DSA_FreePara(ctx->para); ctx->para = oldPara; return ret; } CRYPT_DSA_FreePara(oldPara); return CRYPT_SUCCESS; } #endif /* HITLS_CRYPTO_DSA_GEN_PARA */ // Set flag == 1, enable generate private key SP800-56Ar3 5_6_1_1_4. static int32_t CRYPT_SetFipsFlag(CRYPT_DSA_Ctx *ctx, void *val, uint32_t len) { if (len != sizeof(uint32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_PARA_ERROR); return CRYPT_DSA_PARA_ERROR; } uint32_t flag = *(uint32_t *)val; ctx->flag = (uint8_t)flag; return CRYPT_SUCCESS; } int32_t CRYPT_DSA_Ctrl(CRYPT_DSA_Ctx *ctx, int32_t opt, void *val, uint32_t len) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } switch (opt) { case CRYPT_CTRL_GET_BITS: return GetUintCtrl(ctx, val, len, (GetUintCallBack)CRYPT_DSA_GetBits); case CRYPT_CTRL_GET_SIGNLEN: return GetUintCtrl(ctx, val, len, (GetUintCallBack)CRYPT_DSA_GetSignLen); case CRYPT_CTRL_GET_SECBITS: return GetUintCtrl(ctx, val, len, (GetUintCallBack)CRYPT_DSA_GetSecBits); case CRYPT_CTRL_GET_PUBKEY_LEN: return GetUintCtrl(ctx, val, len, (GetUintCallBack)CRYPT_DSA_GetPubKeyLen); case CRYPT_CTRL_GET_PRVKEY_LEN: return GetUintCtrl(ctx, val, len, (GetUintCallBack)CRYPT_DSA_GetPrvKeyLen); case CRYPT_CTRL_UP_REFERENCES: if (val == NULL || len != (uint32_t)sizeof(int)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } return BSL_SAL_AtomicUpReferences(&(ctx->references), (int *)val); case CRYPT_CTRL_SET_GEN_FLAG: return CRYPT_SetFipsFlag(ctx, val, len); #ifdef HITLS_CRYPTO_DSA_GEN_PARA case CRYPT_CTRL_GEN_PARA: return CryptDsaFips1864GenParams(ctx, val); #endif /* HITLS_CRYPTO_DSA_GEN_PARA */ default: break; } BSL_ERR_PUSH_ERROR(CRYPT_DSA_UNSUPPORTED_CTRL_OPTION); return CRYPT_DSA_UNSUPPORTED_CTRL_OPTION; } #ifdef HITLS_CRYPTO_DSA_CHECK static int32_t DsaKeyPairCheck(const CRYPT_DSA_Ctx *pub, const CRYPT_DSA_Ctx *prv) { int32_t ret; if (prv == NULL || pub == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (prv->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DH_PARA_ERROR); return CRYPT_DH_PARA_ERROR; } ret = CRYPT_FFC_KeyPairCheck(prv->x, pub->y, prv->para->p, prv->para->g); if (ret == CRYPT_PAIRWISE_CHECK_FAIL) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_PAIRWISE_CHECK_FAIL); ret = CRYPT_DSA_PAIRWISE_CHECK_FAIL; } return ret; } /* * SP800-56a 5.6.2.1.2 * for check an FFC key pair. */ static int32_t DsaPrvKeyCheck(const CRYPT_DSA_Ctx *pkey) { if (pkey == NULL || pkey->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = CRYPT_FFC_PrvCheck(pkey->x, pkey->para->p, pkey->para->q); if (ret == CRYPT_INVALID_KEY) { BSL_ERR_PUSH_ERROR(CRYPT_DSA_INVALID_PRVKEY); ret = CRYPT_DSA_INVALID_PRVKEY; } return ret; } int32_t CRYPT_DSA_Check(uint32_t checkType, const CRYPT_DSA_Ctx *pkey1, const CRYPT_DSA_Ctx *pkey2) { switch (checkType) { case CRYPT_PKEY_CHECK_KEYPAIR: return DsaKeyPairCheck(pkey1, pkey2); case CRYPT_PKEY_CHECK_PRVKEY: return DsaPrvKeyCheck(pkey1); default: BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } } #endif // HITLS_CRYPTO_DSA_CHECK #endif /* HITLS_CRYPTO_DSA */
2401_83913325/openHiTLS-examples_7925
crypto/dsa/src/dsa_core.c
C
unknown
56,232
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef DSA_LOCAL_H #define DSA_LOCAL_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_DSA #include "crypt_bn.h" #include "crypt_dsa.h" #include "sal_atomic.h" #ifdef __cplusplus extern "C" { #endif /* __cpluscplus */ #define DSA_MIN_PBITS 1024 // The minimum specification of DSA: 1024 bits #define DSA_MAX_PBITS 3072 // The maximum specification of DSA: 3072 bits #define DSA_MIN_QBITS 160 // The minimum specification of parameter q of DSA /* DSA key parameters */ struct DSA_Para { BN_BigNum *p; BN_BigNum *q; BN_BigNum *g; }; /* DSA key ctx */ struct DSA_Ctx { BN_BigNum *x; // private key BN_BigNum *y; // public key CRYPT_DSA_Para *para; // key parameter BSL_SAL_RefCount references; void *libCtx; char *mdAttr; uint8_t flag; }; typedef struct { int32_t algId; // hash algid int32_t index; // gen g need index uint32_t l; // pbits uint32_t n; // qbits } DSA_FIPS186_4_Para; #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_DSA #endif // DSA_LOCAL_H
2401_83913325/openHiTLS-examples_7925
crypto/dsa/src/dsa_local.h
C
unknown
1,567
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef EAL_PKEY_H #define EAL_PKEY_H #include "crypt_eal_pkey.h" #include "crypt_eal_provider.h" #include "crypt_local_types.h" #ifdef __cplusplus extern "C" { #endif // __cplusplus typedef struct { int32_t algId; CRYPT_EAL_ProvMgrCtx *mgrCtx; EAL_PkeyUnitaryMethod *keyMgmtMethod; } CRYPT_EAL_PkeyMgmtInfo; typedef struct { CRYPT_EAL_ProvMgrCtx *mgrCtx; const CRYPT_EAL_Func *funcsAsyCipher; const CRYPT_EAL_Func *funcsExch; const CRYPT_EAL_Func *funcSign; const CRYPT_EAL_Func *funcKem; const CRYPT_EAL_Func *funcsKeyMgmt; } CRYPT_EAL_AsyAlgFuncsInfo; /** * @ingroup crypt_eal_pkey * @brief Create a new asymmetric key context by key management information. * * @param pkey [IN/OUT] The asymmetric key context to be created. * @param pkeyAlgInfo [IN] The key management information. * @param keyRef [IN] The reference to the key. * @param keyRefLen [IN] The length of the key reference. * * @return CRYPT_SUCCESS on success, CRYPT_ERROR on failure. */ CRYPT_EAL_PkeyCtx *CRYPT_EAL_MakeKeyByPkeyAlgInfo(CRYPT_EAL_PkeyMgmtInfo *pkeyAlgInfo, void *keyRef, uint32_t keyRefLen); /** * @ingroup crypt_eal_pkey * @brief Get the key management information by algorithm ID and attribute name. * * @param libCtx [IN] The library context. * @param algId [IN] The algorithm ID. * @param attrName [IN] The attribute name. * @param pkeyAlgInfo [OUT] The key management information. */ int32_t CRYPT_EAL_GetPkeyAlgInfo(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName, CRYPT_EAL_PkeyMgmtInfo *pkeyAlgInfo); int32_t CRYPT_EAL_SetPkeyMethod(EAL_PkeyUnitaryMethod **pkeyMethod, const CRYPT_EAL_Func *funcsKeyMgmt, const CRYPT_EAL_Func *funcsAsyCipher, const CRYPT_EAL_Func *funcsExch, const CRYPT_EAL_Func *funcSign, const CRYPT_EAL_Func *funcKem); int32_t CRYPT_EAL_ProviderGetAsyAlgFuncs(CRYPT_EAL_LibCtx *libCtx, int32_t algId, uint32_t pkeyOperType, const char *attrName, CRYPT_EAL_AsyAlgFuncsInfo *funcs); #ifdef __cplusplus } #endif // __cplusplus #endif // EAL_PKEY_H
2401_83913325/openHiTLS-examples_7925
crypto/eal/include/eal_pkey.h
C
unknown
2,600
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_CIPHER) #include "securec.h" #include "crypt_algid.h" #include "crypt_eal_cipher.h" #include "bsl_err_internal.h" #include "bsl_sal.h" #include "crypt_errno.h" #include "eal_cipher_local.h" #include "eal_common.h" #include "crypt_utils.h" #include "crypt_ealinit.h" #include "crypt_types.h" #ifdef HITLS_CRYPTO_PROVIDER #include "crypt_provider.h" #endif static void CipherCopyMethod(const EAL_CipherMethod *modeMethod, EAL_CipherUnitaryMethod *method) { method->newCtx = modeMethod->newCtx; method->initCtx = modeMethod->initCtx; method->deinitCtx = modeMethod->deinitCtx; method->update = modeMethod->update; method->final = modeMethod->final; method->ctrl = modeMethod->ctrl; method->freeCtx = modeMethod->freeCtx; } static CRYPT_EAL_CipherCtx *CipherNewDefaultCtx(CRYPT_CIPHER_AlgId id) { int32_t ret; const EAL_CipherMethod *modeMethod = NULL; ret = EAL_FindCipher(id, &modeMethod); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, id, ret); return NULL; } CRYPT_EAL_CipherCtx *ctx = (CRYPT_EAL_CipherCtx *)BSL_SAL_Calloc(1u, sizeof(struct CryptEalCipherCtx)); if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, id, CRYPT_MEM_ALLOC_FAIL); return NULL; } EAL_CipherUnitaryMethod *method = (EAL_CipherUnitaryMethod *)BSL_SAL_Calloc(1u, sizeof(EAL_CipherUnitaryMethod)); if (method == NULL) { BSL_SAL_Free(ctx); EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, id, CRYPT_MEM_ALLOC_FAIL); return NULL; } void *modeCtx = modeMethod->newCtx(id); if (modeCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, id, CRYPT_EAL_CIPHER_ERR_NEWCTX); BSL_SAL_Free(ctx); BSL_SAL_Free(method); return NULL; } CipherCopyMethod(modeMethod, method); ctx->id = id; ctx->method = method; ctx->ctx = modeCtx; ctx->states = EAL_CIPHER_STATE_NEW; return ctx; } #ifdef HITLS_CRYPTO_PROVIDER static int32_t CRYPT_EAL_SetCipherMethod(CRYPT_EAL_CipherCtx *ctx, const CRYPT_EAL_Func *funcs) { int32_t index = 0; EAL_CipherUnitaryMethod *method = BSL_SAL_Calloc(1, sizeof(EAL_CipherUnitaryMethod)); if (method == NULL) { BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL); return BSL_MALLOC_FAIL; } while (funcs[index].id != 0) { switch (funcs[index].id) { case CRYPT_EAL_IMPLCIPHER_NEWCTX: method->provNewCtx = funcs[index].func; break; case CRYPT_EAL_IMPLCIPHER_INITCTX: method->initCtx = funcs[index].func; break; case CRYPT_EAL_IMPLCIPHER_UPDATE: method->update = funcs[index].func; break; case CRYPT_EAL_IMPLCIPHER_FINAL: method->final = funcs[index].func; break; case CRYPT_EAL_IMPLCIPHER_DEINITCTX: method->deinitCtx = funcs[index].func; break; case CRYPT_EAL_IMPLCIPHER_FREECTX: method->freeCtx = funcs[index].func; break; case CRYPT_EAL_IMPLCIPHER_CTRL: method->ctrl = funcs[index].func; break; default: BSL_SAL_FREE(method); BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } ctx->method = method; return CRYPT_SUCCESS; } CRYPT_EAL_CipherCtx *CRYPT_EAL_ProviderCipherNewCtxInner(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName) { const CRYPT_EAL_Func *funcs = NULL; void *provCtx = NULL; int32_t ret = CRYPT_EAL_ProviderGetFuncs(libCtx, CRYPT_EAL_OPERAID_SYMMCIPHER, algId, attrName, (const CRYPT_EAL_Func **)&funcs, &provCtx); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, algId, ret); return NULL; } CRYPT_EAL_CipherCtx *ctx = BSL_SAL_Calloc(1u, sizeof(CRYPT_EAL_CipherCtx)); if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, algId, CRYPT_MEM_ALLOC_FAIL); return NULL; } ret = CRYPT_EAL_SetCipherMethod(ctx, funcs); if (ret != BSL_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, algId, ret); BSL_SAL_FREE(ctx); return NULL; } if (ctx->method->provNewCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, algId, CRYPT_PROVIDER_ERR_IMPL_NULL); BSL_SAL_FREE(ctx->method); BSL_SAL_FREE(ctx); return NULL; } ctx->ctx = ctx->method->provNewCtx(provCtx, algId); if (ctx->ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, algId, CRYPT_MEM_ALLOC_FAIL); BSL_SAL_FREE(ctx->method); BSL_SAL_FREE(ctx); return NULL; } ctx->id = algId; ctx->states = EAL_CIPHER_STATE_NEW; ctx->isProvider = true; return ctx; } #endif CRYPT_EAL_CipherCtx *CRYPT_EAL_ProviderCipherNewCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName) { #ifdef HITLS_CRYPTO_PROVIDER return CRYPT_EAL_ProviderCipherNewCtxInner(libCtx, algId, attrName); #else (void)libCtx; (void)attrName; return CRYPT_EAL_CipherNewCtx(algId); #endif } CRYPT_EAL_CipherCtx *CRYPT_EAL_CipherNewCtx(CRYPT_CIPHER_AlgId id) { #ifdef HITLS_CRYPTO_ASM_CHECK if (CRYPT_ASMCAP_Cipher(id) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return NULL; } #endif return CipherNewDefaultCtx(id); } void CRYPT_EAL_CipherFreeCtx(CRYPT_EAL_CipherCtx *ctx) { if (ctx == NULL) { // If the input parameter is NULL, it is not considered as an error. return; } if (ctx->method == NULL || ctx->method->freeCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); BSL_SAL_FREE(ctx->method); BSL_SAL_FREE(ctx); return; } (void)ctx->method->freeCtx(ctx->ctx); BSL_SAL_FREE(ctx->method); // Free the memory eal ctx and mode ctx at the EAL layer. BSL_SAL_FREE(ctx); } int32_t CRYPT_EAL_CipherInit(CRYPT_EAL_CipherCtx *ctx, const uint8_t *key, uint32_t keyLen, const uint8_t *iv, uint32_t ivLen, bool enc) { int32_t ret; if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, CRYPT_CIPHER_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method == NULL || ctx->method->initCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } CRYPT_EAL_CipherDeinit(ctx); if (ctx->states != EAL_CIPHER_STATE_NEW) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } ret = ctx->method->initCtx(ctx->ctx, key, keyLen, iv, ivLen, NULL, enc); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, ret); return ret; } ctx->states = EAL_CIPHER_STATE_INIT; return CRYPT_SUCCESS; } void CRYPT_EAL_CipherDeinit(CRYPT_EAL_CipherCtx *ctx) { if (ctx == NULL) { // If the ctx is NULL during deinit, it is not considered as an error. return; } if (ctx->method == NULL || ctx->method->deinitCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return; } int32_t ret = ctx->method->deinitCtx(ctx->ctx); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, ret); } // Restore the state to the state after the new is successful. ctx->states = EAL_CIPHER_STATE_NEW; } // no need for IV, the value can be set to NULL int32_t CRYPT_EAL_CipherReinit(CRYPT_EAL_CipherCtx *ctx, uint8_t *iv, uint32_t ivLen) { int32_t ret; if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, CRYPT_CIPHER_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } // Without init, reinit cannot be invoked directly. if (ctx->states == EAL_CIPHER_STATE_NEW) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } // Reset the IV. In this case, reset the IV is not restricted by the states. if (ctx->method == NULL || ctx->method->ctrl == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } ret = ctx->method->ctrl(ctx->ctx, CRYPT_CTRL_REINIT_STATUS, iv, ivLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, ret); return ret; } // Reset the states. ctx->states = EAL_CIPHER_STATE_INIT; return CRYPT_SUCCESS; } static bool IsPartialOverLap(const void *out, const void *in, uint32_t len) { uintptr_t diff; if ((uintptr_t)out > (uintptr_t)in) { diff = (uintptr_t)out - (uintptr_t)in; return diff < (uintptr_t)len; } // If in >= out, this case is valid. return false; } static int32_t CheckUpdateParam(const CRYPT_EAL_CipherCtx *ctx, const uint8_t *in, uint32_t inLen, const uint8_t *out, const uint32_t *outLen) { if (ctx == NULL || out == NULL || outLen == NULL || (in == NULL && inLen != 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((in != NULL && inLen != 0) && IsPartialOverLap(out, in, inLen)) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_PART_OVERLAP); return CRYPT_EAL_ERR_PART_OVERLAP; } // If the state is not init or update, the state is regarded as an error. // If the state is final or new, update cannot be directly invoked. if (!(ctx->states == EAL_CIPHER_STATE_INIT || ctx->states == EAL_CIPHER_STATE_UPDATE)) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } if (ctx->method == NULL || ctx->method->update == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } return CRYPT_SUCCESS; } int32_t CRYPT_EAL_CipherUpdate(CRYPT_EAL_CipherCtx *ctx, const uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen) { int32_t ret = CheckUpdateParam(ctx, in, inLen, out, outLen); if (ret != CRYPT_SUCCESS) { // The push error in CheckUpdateParam can be locate the only error location. No need to add the push error here. EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, (ctx == NULL) ? CRYPT_CIPHER_MAX : ctx->id, ret); return ret; } ret = ctx->method->update(ctx->ctx, in, inLen, out, outLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, ret); return ret; } ctx->states = EAL_CIPHER_STATE_UPDATE; return CRYPT_SUCCESS; } int32_t CheckFinalParam(const CRYPT_EAL_CipherCtx *ctx, const uint8_t *out, const uint32_t *outLen) { if (ctx == NULL || out == NULL || outLen == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } // If the state is not init or update, the state is regarded as an error. // If the state is final or new, update cannot be directly invoked. if (!(ctx->states == EAL_CIPHER_STATE_UPDATE || ctx->states == EAL_CIPHER_STATE_INIT)) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } if (ctx->method == NULL || ctx->method->final == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } return CRYPT_SUCCESS; } int32_t CRYPT_EAL_CipherFinal(CRYPT_EAL_CipherCtx *ctx, uint8_t *out, uint32_t *outLen) { int32_t ret; ret = CheckFinalParam(ctx, out, outLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, (ctx == NULL) ? CRYPT_CIPHER_MAX : ctx->id, ret); return ret; } ret = ctx->method->final(ctx->ctx, out, outLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, ret); return ret; } ctx->states = EAL_CIPHER_STATE_FINAL; return CRYPT_SUCCESS; } static bool CipherCtrlIsCanSet(const CRYPT_EAL_CipherCtx *ctx, int32_t type) { if (ctx->states == EAL_CIPHER_STATE_NEW) { return false; } if (ctx->states == EAL_CIPHER_STATE_FINAL) { return false; } if ((ctx->states == EAL_CIPHER_STATE_UPDATE) && (type == CRYPT_CTRL_SET_COUNT || type == CRYPT_CTRL_SET_TAGLEN || type == CRYPT_CTRL_SET_MSGLEN || type == CRYPT_CTRL_SET_AAD)) { return false; } return true; } int32_t CRYPT_EAL_CipherCtrl(CRYPT_EAL_CipherCtx *ctx, int32_t type, void *data, uint32_t len) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, CRYPT_CIPHER_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } // The IV cannot be set through the Ctrl. You need to set the IV through the init and reinit. if (type == CRYPT_CTRL_SET_IV || type == CRYPT_CTRL_REINIT_STATUS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_CIPHER_CTRL_ERROR); return CRYPT_EAL_CIPHER_CTRL_ERROR; } // If the algorithm is running in the intermediate state, write operations are not allowed. if (!CipherCtrlIsCanSet(ctx, type)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } // Setting AAD indicates that the encryption operation has started and no more write operations are allowed. if (type == CRYPT_CTRL_SET_AAD) { ctx->states = EAL_CIPHER_STATE_UPDATE; } else if (type == CRYPT_CTRL_GET_TAG) { // After getTag the system enters the final state. ctx->states = EAL_CIPHER_STATE_FINAL; } if (ctx->method == NULL || ctx->method->ctrl == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = ctx->method->ctrl(ctx->ctx, type, data, len); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, ret); return ret; } return ret; } int32_t CRYPT_EAL_CipherSetPadding(CRYPT_EAL_CipherCtx *ctx, CRYPT_PaddingType type) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, CRYPT_CIPHER_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method == NULL || ctx->method->ctrl == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = ctx->method->ctrl(ctx->ctx, CRYPT_CTRL_SET_PADDING, (void *)&type, sizeof(type)); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, ret); } return ret; } int32_t CRYPT_EAL_CipherGetPadding(CRYPT_EAL_CipherCtx *ctx) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, CRYPT_CIPHER_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method == NULL || ctx->method->ctrl == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t type; int32_t ret = ctx->method->ctrl(ctx->ctx, CRYPT_CTRL_GET_PADDING, (void *)&type, sizeof(type)); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, ctx->id, ret); return CRYPT_PADDING_MAX_COUNT; } return type; } bool CRYPT_EAL_CipherIsValidAlgId(CRYPT_CIPHER_AlgId id) { const EAL_CipherMethod *m = NULL; return EAL_FindCipher(id, &m) == CRYPT_SUCCESS; } static const uint32_t CIPHER_IS_AEAD[] = { CRYPT_CIPHER_AES128_CCM, CRYPT_CIPHER_AES192_CCM, CRYPT_CIPHER_AES256_CCM, CRYPT_CIPHER_AES128_GCM, CRYPT_CIPHER_AES192_GCM, CRYPT_CIPHER_AES256_GCM, CRYPT_CIPHER_CHACHA20_POLY1305, CRYPT_CIPHER_SM4_GCM, }; // Check whether the algorithm is the AEAD algorithm. If yes, true is returned. Otherwise, false is returned. static bool IsAeadAlg(CRYPT_CIPHER_AlgId id) { if (ParamIdIsValid(id, CIPHER_IS_AEAD, sizeof(CIPHER_IS_AEAD) / sizeof(CIPHER_IS_AEAD[0]))) { return true; } return false; } int32_t CRYPT_EAL_CipherGetInfo(CRYPT_CIPHER_AlgId id, int32_t type, uint32_t *infoValue) { if (infoValue == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, id, CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } CRYPT_CipherInfo info = {0}; if (EAL_GetCipherInfo(id, &info) != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, id, CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } switch (type) { case CRYPT_INFO_IS_AEAD: (*infoValue) = IsAeadAlg(id) ? 1 : 0; break; case CRYPT_INFO_IS_STREAM: (*infoValue) = (uint32_t)!((info.blockSize) != 1); break; case CRYPT_INFO_IV_LEN: (*infoValue) = info.ivLen; break; case CRYPT_INFO_KEY_LEN: (*infoValue) = info.keyLen; break; case CRYPT_INFO_BLOCK_LEN: (*infoValue) = (uint32_t)info.blockSize; break; default: EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_CIPHER, id, CRYPT_EAL_INTO_TYPE_NOT_SUPPORT); return CRYPT_EAL_INTO_TYPE_NOT_SUPPORT; } return CRYPT_SUCCESS; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_cipher.c
C
unknown
18,569
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef EAL_CIPHER_LOCAL_H #define EAL_CIPHER_LOCAL_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_CIPHER) #include "crypt_algid.h" #include "crypt_eal_cipher.h" #include "crypt_local_types.h" #ifdef HITLS_CRYPTO_GCM #include "crypt_modes_gcm.h" #endif #ifdef __cplusplus extern "C" { #endif // __cplusplus /** * @ingroup crypt_cipherstates * Symmetry encryption/decryption status */ typedef enum { EAL_CIPHER_STATE_NEW, EAL_CIPHER_STATE_INIT, EAL_CIPHER_STATE_UPDATE, EAL_CIPHER_STATE_FINAL } EAL_CipherStates; /** * @ingroup alg map * Symmetric encryption/decryption mode and ID of the encryption algorithm. */ typedef struct { uint32_t id; CRYPT_MODE_AlgId modeId; } EAL_SymAlgMap; /** * @ingroup EAL * * CRYPT_CipherInfo: User search algorithm information. Currently, only blockSize is available. */ typedef struct { CRYPT_CIPHER_AlgId id; uint8_t blockSize; uint32_t keyLen; uint32_t ivLen; } CRYPT_CipherInfo; /** * @ingroup crypt_eal_cipherctx * Asymmetric algorithm data type */ struct CryptEalCipherCtx { #ifdef HITLS_CRYPTO_PROVIDER bool isProvider; #endif CRYPT_CIPHER_AlgId id; EAL_CipherStates states; /**< record status */ void *ctx; /**< handle of the mode */ EAL_CipherUnitaryMethod *method; /**< method corresponding to the encryption/decryption mode */ }; const EAL_SymMethod *EAL_GetSymMethod(int32_t algId); /** * @brief Obtain the EAL_CipherMethod based on the algorithm ID. * * @param id [IN] Symmetric encryption/decryption algorithm ID. * @param modeMethod [IN/OUT] EAL_CipherMethod Pointer * @return If it's successful, the system returns CRYPT_SUCCESS and assigns the value to the method in m. * If it's failed, returns CRYPT_EAL_ERR_ALGID: ID of the unsupported algorithm. */ int32_t EAL_FindCipher(CRYPT_CIPHER_AlgId id, const EAL_CipherMethod **modeMethod); /** * @brief Obtain keyLen/ivLen/blockSize based on the algorithm ID. * * @param id [IN] Symmetric algorithm ID. * @param id [OUT] Assign the obtained keyLen/ivLen/blockSize to the variable corresponding to info. * * @return Success: CRYPT_SUCCESS * Failure: CRYPT_ERR_ALGID */ int32_t EAL_GetCipherInfo(CRYPT_CIPHER_AlgId id, CRYPT_CipherInfo *info); /** * @brief Obtain mode method based on the algorithm ID * * @param id [IN] Symmetric encryption/decryption algorithm ID. * @return If the operation is successful, the combination of ciphers is returned. * If the operation fails, NULL is returned. */ const EAL_CipherMethod *EAL_FindModeMethod(CRYPT_MODE_AlgId id); #ifdef __cplusplus } #endif // __cplusplus #endif // HITLS_CRYPTO_CIPHER #endif // EAL_CIPHER_LOCAL_H
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_cipher_local.h
C
unknown
3,325
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_CIPHER) #include "bsl_err_internal.h" #include "crypt_errno.h" #include "eal_cipher_local.h" #include "crypt_modes.h" #include "crypt_local_types.h" #ifdef HITLS_CRYPTO_CTR #include "crypt_modes_ctr.h" #endif #ifdef HITLS_CRYPTO_CBC #include "crypt_modes_cbc.h" #endif #ifdef HITLS_CRYPTO_ECB #include "crypt_modes_ecb.h" #endif #ifdef HITLS_CRYPTO_GCM #include "crypt_modes_gcm.h" #endif #ifdef HITLS_CRYPTO_CCM #include "crypt_modes_ccm.h" #endif #ifdef HITLS_CRYPTO_XTS #include "crypt_modes_xts.h" #endif #ifdef HITLS_CRYPTO_AES #include "crypt_aes.h" #endif #if defined(HITLS_CRYPTO_CHACHA20) && defined(HITLS_CRYPTO_CHACHA20POLY1305) #include "crypt_modes_chacha20poly1305.h" #endif #ifdef HITLS_CRYPTO_CHACHA20 #include "crypt_chacha20.h" #endif #ifdef HITLS_CRYPTO_SM4 #include "crypt_sm4.h" #endif #ifdef HITLS_CRYPTO_CFB #include "crypt_modes_cfb.h" #endif #ifdef HITLS_CRYPTO_OFB #include "crypt_modes_ofb.h" #endif #include "eal_common.h" #include "bsl_sal.h" #if defined(HITLS_CRYPTO_CHACHA20) && defined(HITLS_CRYPTO_CHACHA20POLY1305) static const EAL_CipherMethod CHACHA20_POLY1305_METHOD = { (CipherNewCtx)MODES_CHACHA20POLY1305_NewCtx, (CipherInitCtx)MODES_CHACHA20POLY1305_InitCtx, (CipherDeInitCtx)MODES_CHACHA20POLY1305_DeInitCtx, (CipherUpdate)MODES_CHACHA20POLY1305_Update, (CipherFinal)MODES_CHACHA20POLY1305_Final, (CipherCtrl)MODES_CHACHA20POLY1305_Ctrl, (CipherFreeCtx)MODES_CHACHA20POLY1305_FreeCtx }; #endif #ifdef HITLS_CRYPTO_CTR static const EAL_CipherMethod CTR_METHOD = { (CipherNewCtx)MODES_CTR_NewCtx, (CipherInitCtx)MODES_CTR_InitCtxEx, (CipherDeInitCtx)MODES_CTR_DeInitCtx, (CipherUpdate)MODES_CTR_UpdateEx, (CipherFinal)MODES_CTR_Final, (CipherCtrl)MODES_CTR_Ctrl, (CipherFreeCtx)MODES_CTR_FreeCtx }; #endif #ifdef HITLS_CRYPTO_CBC static const EAL_CipherMethod CBC_METHOD = { (CipherNewCtx)MODES_CBC_NewCtx, (CipherInitCtx)MODES_CBC_InitCtxEx, (CipherDeInitCtx)MODES_CBC_DeInitCtx, (CipherUpdate)MODES_CBC_UpdateEx, (CipherFinal)MODES_CBC_FinalEx, (CipherCtrl)MODES_CBC_Ctrl, (CipherFreeCtx)MODES_CBC_FreeCtx }; #endif #ifdef HITLS_CRYPTO_ECB static const EAL_CipherMethod ECB_METHOD = { (CipherNewCtx)MODES_ECB_NewCtx, (CipherInitCtx)MODES_ECB_InitCtxEx, (CipherDeInitCtx)MODES_ECB_DeinitCtx, (CipherUpdate)MODES_ECB_UpdateEx, (CipherFinal)MODES_ECB_FinalEx, (CipherCtrl)MODES_ECB_Ctrl, (CipherFreeCtx)MODES_ECB_FreeCtx }; #endif #ifdef HITLS_CRYPTO_CCM static const EAL_CipherMethod CCM_METHOD = { (CipherNewCtx)MODES_CCM_NewCtx, (CipherInitCtx)MODES_CCM_InitCtx, (CipherDeInitCtx)MODES_CCM_DeInitCtx, (CipherUpdate)MODES_CCM_UpdateEx, (CipherFinal)MODES_CCM_Final, (CipherCtrl)MODES_CCM_Ctrl, (CipherFreeCtx)MODES_CCM_FreeCtx }; #endif #ifdef HITLS_CRYPTO_GCM static const EAL_CipherMethod GCM_METHOD = { (CipherNewCtx)MODES_GCM_NewCtx, (CipherInitCtx)MODES_GCM_InitCtxEx, (CipherDeInitCtx)MODES_GCM_DeInitCtx, (CipherUpdate)MODES_GCM_UpdateEx, (CipherFinal)MODES_GCM_Final, (CipherCtrl)MODES_GCM_Ctrl, (CipherFreeCtx)MODES_GCM_FreeCtx }; #endif #ifdef HITLS_CRYPTO_CFB static const EAL_CipherMethod CFB_METHOD = { (CipherNewCtx)MODES_CFB_NewCtx, (CipherInitCtx)MODES_CFB_InitCtxEx, (CipherDeInitCtx)MODES_CFB_DeInitCtx, (CipherUpdate)MODES_CFB_UpdateEx, (CipherFinal)MODES_CFB_Final, (CipherCtrl)MODES_CFB_Ctrl, (CipherFreeCtx)MODES_CFB_FreeCtx }; #endif #ifdef HITLS_CRYPTO_OFB static const EAL_CipherMethod OFB_METHOD = { (CipherNewCtx)MODES_OFB_NewCtx, (CipherInitCtx)MODES_OFB_InitCtxEx, (CipherDeInitCtx)MODES_OFB_DeInitCtx, (CipherUpdate)MODES_OFB_UpdateEx, (CipherFinal)MODES_OFB_Final, (CipherCtrl)MODES_OFB_Ctrl, (CipherFreeCtx)MODES_OFB_FreeCtx }; #endif #ifdef HITLS_CRYPTO_XTS static const EAL_CipherMethod XTS_METHOD = { (CipherNewCtx)MODES_XTS_NewCtx, (CipherInitCtx)MODES_XTS_InitCtxEx, (CipherDeInitCtx)MODES_XTS_DeInitCtx, (CipherUpdate)MODES_XTS_UpdateEx, (CipherFinal)MODES_XTS_Final, (CipherCtrl)MODES_XTS_Ctrl, (CipherFreeCtx)MODES_XTS_FreeCtx }; #endif /** * g_modeMethod[id] * The content of g_modeMethod has a hash mapping relationship with CRYPT_MODE_AlgId. Change the value accordingly. */ static const EAL_CipherMethod *g_modeMethod[CRYPT_MODE_MAX] = { #ifdef HITLS_CRYPTO_CBC &CBC_METHOD, #else NULL, #endif // cbc #ifdef HITLS_CRYPTO_ECB &ECB_METHOD, #else NULL, #endif // ecb #ifdef HITLS_CRYPTO_CTR &CTR_METHOD, #else NULL, #endif // ctr #ifdef HITLS_CRYPTO_XTS &XTS_METHOD, #else NULL, #endif // xts #ifdef HITLS_CRYPTO_CCM &CCM_METHOD, #else NULL, #endif // ccm #ifdef HITLS_CRYPTO_GCM &GCM_METHOD, #else NULL, #endif // gcm #if defined(HITLS_CRYPTO_CHACHA20) && defined(HITLS_CRYPTO_CHACHA20POLY1305) &CHACHA20_POLY1305_METHOD, #else NULL, #endif // chacha20 #ifdef HITLS_CRYPTO_CFB &CFB_METHOD, #else NULL, #endif // cfb #ifdef HITLS_CRYPTO_OFB &OFB_METHOD #else NULL #endif // ofb }; const EAL_CipherMethod *EAL_FindModeMethod(CRYPT_MODE_AlgId id) { if (id < 0 || id >= CRYPT_MODE_MAX) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return NULL; } return g_modeMethod[id]; } static const EAL_SymAlgMap SYM_ID_MAP[] = { #ifdef HITLS_CRYPTO_AES {.id = CRYPT_CIPHER_AES128_CBC, .modeId = CRYPT_MODE_CBC }, {.id = CRYPT_CIPHER_AES192_CBC, .modeId = CRYPT_MODE_CBC }, {.id = CRYPT_CIPHER_AES256_CBC, .modeId = CRYPT_MODE_CBC }, {.id = CRYPT_CIPHER_AES128_ECB, .modeId = CRYPT_MODE_ECB }, {.id = CRYPT_CIPHER_AES192_ECB, .modeId = CRYPT_MODE_ECB }, {.id = CRYPT_CIPHER_AES256_ECB, .modeId = CRYPT_MODE_ECB }, {.id = CRYPT_CIPHER_AES128_CTR, .modeId = CRYPT_MODE_CTR }, {.id = CRYPT_CIPHER_AES192_CTR, .modeId = CRYPT_MODE_CTR }, {.id = CRYPT_CIPHER_AES256_CTR, .modeId = CRYPT_MODE_CTR }, {.id = CRYPT_CIPHER_AES128_CCM, .modeId = CRYPT_MODE_CCM }, {.id = CRYPT_CIPHER_AES192_CCM, .modeId = CRYPT_MODE_CCM }, {.id = CRYPT_CIPHER_AES256_CCM, .modeId = CRYPT_MODE_CCM }, {.id = CRYPT_CIPHER_AES128_GCM, .modeId = CRYPT_MODE_GCM }, {.id = CRYPT_CIPHER_AES192_GCM, .modeId = CRYPT_MODE_GCM }, {.id = CRYPT_CIPHER_AES256_GCM, .modeId = CRYPT_MODE_GCM }, {.id = CRYPT_CIPHER_AES128_CFB, .modeId = CRYPT_MODE_CFB }, {.id = CRYPT_CIPHER_AES192_CFB, .modeId = CRYPT_MODE_CFB }, {.id = CRYPT_CIPHER_AES256_CFB, .modeId = CRYPT_MODE_CFB }, {.id = CRYPT_CIPHER_AES128_OFB, .modeId = CRYPT_MODE_OFB }, {.id = CRYPT_CIPHER_AES192_OFB, .modeId = CRYPT_MODE_OFB }, {.id = CRYPT_CIPHER_AES256_OFB, .modeId = CRYPT_MODE_OFB }, {.id = CRYPT_CIPHER_AES128_XTS, .modeId = CRYPT_MODE_XTS }, {.id = CRYPT_CIPHER_AES256_XTS, .modeId = CRYPT_MODE_XTS }, #endif #ifdef HITLS_CRYPTO_CHACHA20 {.id = CRYPT_CIPHER_CHACHA20_POLY1305, .modeId = CRYPT_MODE_CHACHA20_POLY1305}, #endif #ifdef HITLS_CRYPTO_SM4 {.id = CRYPT_CIPHER_SM4_XTS, .modeId = CRYPT_MODE_XTS }, {.id = CRYPT_CIPHER_SM4_ECB, .modeId = CRYPT_MODE_ECB }, {.id = CRYPT_CIPHER_SM4_CBC, .modeId = CRYPT_MODE_CBC }, {.id = CRYPT_CIPHER_SM4_CTR, .modeId = CRYPT_MODE_CTR }, {.id = CRYPT_CIPHER_SM4_GCM, .modeId = CRYPT_MODE_GCM }, {.id = CRYPT_CIPHER_SM4_CFB, .modeId = CRYPT_MODE_CFB }, {.id = CRYPT_CIPHER_SM4_OFB, .modeId = CRYPT_MODE_OFB }, #endif }; int32_t EAL_FindCipher(CRYPT_CIPHER_AlgId id, const EAL_CipherMethod **modeMethod) { uint32_t num = sizeof(SYM_ID_MAP) / sizeof(SYM_ID_MAP[0]); const EAL_SymAlgMap *symAlgMap = NULL; for (uint32_t i = 0; i < num; i++) { if (SYM_ID_MAP[i].id == id) { symAlgMap = &SYM_ID_MAP[i]; break; } } if (symAlgMap == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } *modeMethod = EAL_FindModeMethod(symAlgMap->modeId); if (*modeMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } return CRYPT_SUCCESS; } #ifdef HITLS_CRYPTO_AES static const EAL_SymMethod AES128_METHOD = { (SetEncryptKey)CRYPT_AES_SetEncryptKey128, (SetDecryptKey)CRYPT_AES_SetDecryptKey128, (EncryptBlock)CRYPT_AES_Encrypt, (DecryptBlock)CRYPT_AES_Decrypt, (DeInitBlockCtx)CRYPT_AES_Clean, NULL, 16, sizeof(CRYPT_AES_Key), CRYPT_SYM_AES128 }; static const EAL_SymMethod AES192_METHOD = { (SetEncryptKey)CRYPT_AES_SetEncryptKey192, (SetDecryptKey)CRYPT_AES_SetDecryptKey192, (EncryptBlock)CRYPT_AES_Encrypt, (DecryptBlock)CRYPT_AES_Decrypt, (DeInitBlockCtx)CRYPT_AES_Clean, NULL, 16, sizeof(CRYPT_AES_Key), CRYPT_SYM_AES192 }; static const EAL_SymMethod AES256_METHOD = { (SetEncryptKey)CRYPT_AES_SetEncryptKey256, (SetDecryptKey)CRYPT_AES_SetDecryptKey256, (EncryptBlock)CRYPT_AES_Encrypt, (DecryptBlock)CRYPT_AES_Decrypt, (DeInitBlockCtx)CRYPT_AES_Clean, NULL, 16, sizeof(CRYPT_AES_Key), CRYPT_SYM_AES256 }; #endif #ifdef HITLS_CRYPTO_CHACHA20 static const EAL_SymMethod CHACHA20_METHOD = { (SetEncryptKey)CRYPT_CHACHA20_SetKey, (SetDecryptKey)CRYPT_CHACHA20_SetKey, (EncryptBlock)CRYPT_CHACHA20_Update, (DecryptBlock)CRYPT_CHACHA20_Update, (DeInitBlockCtx)CRYPT_CHACHA20_Clean, (CipherCtrl)CRYPT_CHACHA20_Ctrl, 1, sizeof(CRYPT_CHACHA20_Ctx), CRYPT_SYM_CHACHA20 }; #endif #ifdef HITLS_CRYPTO_SM4 static const EAL_SymMethod SM4_METHOD = { (SetEncryptKey)CRYPT_SM4_SetKey, (SetDecryptKey)CRYPT_SM4_SetKey, (EncryptBlock)CRYPT_SM4_Encrypt, (DecryptBlock)CRYPT_SM4_Decrypt, (DeInitBlockCtx)CRYPT_SM4_Clean, NULL, 16, sizeof(CRYPT_SM4_Ctx), CRYPT_SYM_SM4 }; #endif const EAL_SymMethod *EAL_GetSymMethod(int32_t algId) { switch (algId) { #ifdef HITLS_CRYPTO_AES case CRYPT_CIPHER_AES128_CBC: case CRYPT_CIPHER_AES128_ECB: case CRYPT_CIPHER_AES128_XTS: case CRYPT_CIPHER_AES128_CTR: case CRYPT_CIPHER_AES128_CCM: case CRYPT_CIPHER_AES128_GCM: case CRYPT_CIPHER_AES128_CFB: case CRYPT_CIPHER_AES128_OFB: return &AES128_METHOD; case CRYPT_CIPHER_AES192_CBC: case CRYPT_CIPHER_AES192_ECB: case CRYPT_CIPHER_AES192_CTR: case CRYPT_CIPHER_AES192_CCM: case CRYPT_CIPHER_AES192_GCM: case CRYPT_CIPHER_AES192_CFB: case CRYPT_CIPHER_AES192_OFB: return &AES192_METHOD; case CRYPT_CIPHER_AES256_CBC: case CRYPT_CIPHER_AES256_ECB: case CRYPT_CIPHER_AES256_CTR: case CRYPT_CIPHER_AES256_XTS: case CRYPT_CIPHER_AES256_CCM: case CRYPT_CIPHER_AES256_GCM: case CRYPT_CIPHER_AES256_CFB: case CRYPT_CIPHER_AES256_OFB: return &AES256_METHOD; #endif #ifdef HITLS_CRYPTO_SM4 case CRYPT_CIPHER_SM4_XTS: case CRYPT_CIPHER_SM4_CBC: case CRYPT_CIPHER_SM4_ECB: case CRYPT_CIPHER_SM4_CTR: case CRYPT_CIPHER_SM4_GCM: case CRYPT_CIPHER_SM4_CFB: case CRYPT_CIPHER_SM4_OFB: return &SM4_METHOD; #endif #ifdef HITLS_CRYPTO_CHACHA20 case CRYPT_CIPHER_CHACHA20_POLY1305: return &CHACHA20_METHOD; #endif default: return NULL; } } static CRYPT_CipherInfo g_cipherInfo[] = { #ifdef HITLS_CRYPTO_AES {.id = CRYPT_CIPHER_AES128_CBC, .blockSize = 16, .keyLen = 16, .ivLen = 16}, {.id = CRYPT_CIPHER_AES192_CBC, .blockSize = 16, .keyLen = 24, .ivLen = 16}, {.id = CRYPT_CIPHER_AES256_CBC, .blockSize = 16, .keyLen = 32, .ivLen = 16}, {.id = CRYPT_CIPHER_AES128_ECB, .blockSize = 16, .keyLen = 16, .ivLen = 0}, {.id = CRYPT_CIPHER_AES192_ECB, .blockSize = 16, .keyLen = 24, .ivLen = 0}, {.id = CRYPT_CIPHER_AES256_ECB, .blockSize = 16, .keyLen = 32, .ivLen = 0}, {.id = CRYPT_CIPHER_AES128_CTR, .blockSize = 1, .keyLen = 16, .ivLen = 16}, {.id = CRYPT_CIPHER_AES192_CTR, .blockSize = 1, .keyLen = 24, .ivLen = 16}, {.id = CRYPT_CIPHER_AES256_CTR, .blockSize = 1, .keyLen = 32, .ivLen = 16}, {.id = CRYPT_CIPHER_AES128_CCM, .blockSize = 1, .keyLen = 16, .ivLen = 12}, {.id = CRYPT_CIPHER_AES192_CCM, .blockSize = 1, .keyLen = 24, .ivLen = 12}, {.id = CRYPT_CIPHER_AES256_CCM, .blockSize = 1, .keyLen = 32, .ivLen = 12}, {.id = CRYPT_CIPHER_AES128_GCM, .blockSize = 1, .keyLen = 16, .ivLen = 12}, {.id = CRYPT_CIPHER_AES192_GCM, .blockSize = 1, .keyLen = 24, .ivLen = 12}, {.id = CRYPT_CIPHER_AES256_GCM, .blockSize = 1, .keyLen = 32, .ivLen = 12}, {.id = CRYPT_CIPHER_AES128_CFB, .blockSize = 1, .keyLen = 16, .ivLen = 16}, {.id = CRYPT_CIPHER_AES192_CFB, .blockSize = 1, .keyLen = 24, .ivLen = 16}, {.id = CRYPT_CIPHER_AES256_CFB, .blockSize = 1, .keyLen = 32, .ivLen = 16}, {.id = CRYPT_CIPHER_AES128_OFB, .blockSize = 1, .keyLen = 16, .ivLen = 16}, {.id = CRYPT_CIPHER_AES192_OFB, .blockSize = 1, .keyLen = 24, .ivLen = 16}, {.id = CRYPT_CIPHER_AES256_OFB, .blockSize = 1, .keyLen = 32, .ivLen = 16}, {.id = CRYPT_CIPHER_AES128_XTS, .blockSize = 1, .keyLen = 32, .ivLen = 16}, {.id = CRYPT_CIPHER_AES256_XTS, .blockSize = 1, .keyLen = 64, .ivLen = 16}, #endif #ifdef HITLS_CRYPTO_CHACHA20 {.id = CRYPT_CIPHER_CHACHA20_POLY1305, .blockSize = 1, .keyLen = 32, .ivLen = 12}, #endif #ifdef HITLS_CRYPTO_SM4 {.id = CRYPT_CIPHER_SM4_XTS, .blockSize = 1, .keyLen = 32, .ivLen = 16}, {.id = CRYPT_CIPHER_SM4_CBC, .blockSize = 16, .keyLen = 16, .ivLen = 16}, {.id = CRYPT_CIPHER_SM4_ECB, .blockSize = 16, .keyLen = 16, .ivLen = 0}, {.id = CRYPT_CIPHER_SM4_CTR, .blockSize = 1, .keyLen = 16, .ivLen = 16}, {.id = CRYPT_CIPHER_SM4_GCM, .blockSize = 1, .keyLen = 16, .ivLen = 12}, {.id = CRYPT_CIPHER_SM4_CFB, .blockSize = 1, .keyLen = 16, .ivLen = 16}, {.id = CRYPT_CIPHER_SM4_OFB, .blockSize = 1, .keyLen = 16, .ivLen = 16}, #endif }; /** * Search for the lengths of the block, key, and IV of algorithm. If ID in g_cipherInfo is changed, * synchronize the value of the SDV_CRYPTO_CIPHER_FUN_TC008 test case. * The input ID has a mapping relationship with g_ealCipherMethod and CRYPT_CIPHER_AlgId. * The corresponding information must be synchronized to symMap. * The symMap and CRYPT_SYM_AlgId, CRYPT_MODE_AlgId depend on each other. Synchronize the corresponding information. */ int32_t EAL_GetCipherInfo(CRYPT_CIPHER_AlgId id, CRYPT_CipherInfo *info) { uint32_t num = sizeof(g_cipherInfo) / sizeof(g_cipherInfo[0]); const CRYPT_CipherInfo *cipherInfoGet = NULL; for (uint32_t i = 0; i < num; i++) { if (g_cipherInfo[i].id == id) { cipherInfoGet = &g_cipherInfo[i]; break; } } if (cipherInfoGet == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ERR_ALGID); return CRYPT_ERR_ALGID; } info->blockSize = cipherInfoGet->blockSize; info->ivLen = cipherInfoGet->ivLen; info->keyLen = cipherInfoGet->keyLen; return CRYPT_SUCCESS; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_cipher_method.c
C
unknown
15,720
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) #include <stddef.h> #include "crypt_types.h" #include "crypt_eal_md.h" #include "crypt_eal_mac.h" #include "eal_cipher_local.h" #include "eal_pkey_local.h" #include "eal_md_local.h" #include "eal_mac_local.h" #include "bsl_err_internal.h" #include "eal_common.h" EventReport g_eventReportFunc = NULL; void CRYPT_EAL_RegEventReport(EventReport func) { g_eventReportFunc = func; } void EAL_EventReport(CRYPT_EVENT_TYPE oper, CRYPT_ALGO_TYPE type, int32_t id, int32_t err) { if (g_eventReportFunc == NULL) { return; } g_eventReportFunc(oper, type, id, err); } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_common.c
C
unknown
1,190
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef EAL_COMMON_H #define EAL_COMMON_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_EAL #include <stdint.h> #include "crypt_types.h" #ifdef __cplusplus extern "C" { #endif // __cplusplus #define EAL_ERR_REPORT(oper, type, id, err) \ do { \ EAL_EventReport((oper), (type), (id), (err)); \ BSL_ERR_PUSH_ERROR((err)); \ } while (0) void EAL_EventReport(CRYPT_EVENT_TYPE oper, CRYPT_ALGO_TYPE type, int32_t id, int32_t err); #ifdef __cplusplus } #endif // __cplusplus #endif // HITLS_CRYPTO_EAL #endif // EAL_COMMON_H
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_common.h
C
unknown
1,094
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_ENTROPY) #include "securec.h" #include "bsl_err_internal.h" #include "crypt_errno.h" #include "eal_entropy.h" #define EAL_MAX_ENTROPY_EVERY_BYTE 8 #define EAL_ECF_OUT_LEN 16 static uint32_t GetMinLen(void *pool, uint32_t entropy, uint32_t minLen) { uint32_t minEntropy = ENTROPY_SeedPoolGetMinEntropy(pool); if (minEntropy == 0) { return 0; } uint32_t len = (uint32_t)(((uint64_t)entropy + (uint64_t)minEntropy - 1) / (uint64_t)minEntropy); /* '<' indicates that the data with a length of len can provide sufficient bit entropy. */ if (len < minLen) { len = minLen; } return len; } EAL_EntropyCtx *EAL_EntropyNewCtx(CRYPT_EAL_SeedPoolCtx *seedPool, uint8_t isNpesUsed, uint32_t minLen, uint32_t maxLen, uint32_t entropy) { if (minLen > maxLen || maxLen == 0) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return NULL; } if (!ENTROPY_SeedPoolCheckState(seedPool->pool, isNpesUsed)) { BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_STATE_ERROR); return NULL; } if (entropy > maxLen * EAL_MAX_ENTROPY_EVERY_BYTE) { BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_RANGE_ERROR); return NULL; } EAL_EntropyCtx *ctx = BSL_SAL_Malloc(sizeof(EAL_EntropyCtx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(ctx, sizeof(EAL_EntropyCtx), 0, sizeof(EAL_EntropyCtx)); ctx->minLen = minLen; ctx->maxLen = maxLen; ctx->isNpesUsed = isNpesUsed; ctx->requestEntropy = entropy; ctx->isNeedFe = (minLen == maxLen) ? true : false; uint32_t needLen; if (ctx->isNeedFe) { ctx->ecfuncId = CRYPT_MAC_CMAC_AES128; ctx->ecfOutLen = EAL_ECF_OUT_LEN; ctx->ecfunc = EAL_EntropyGetECF(CRYPT_MAC_CMAC_AES128); needLen = minLen; } else { needLen = GetMinLen(seedPool->pool, entropy, minLen); } ctx->buf = BSL_SAL_Malloc(needLen); if (ctx->buf == NULL) { BSL_SAL_Free(ctx); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } ctx->bufLen = needLen; return ctx; } void EAL_EntropyFreeCtx(EAL_EntropyCtx *ctx) { if (ctx->buf != NULL) { (void)memset_s(ctx->buf, ctx->bufLen, 0, ctx->bufLen); BSL_SAL_FREE(ctx->buf); } BSL_SAL_Free(ctx); } static int32_t EAL_EntropyObtain(void *seedPool, EAL_EntropyCtx *ctx) { while (ctx->curEntropy < ctx->requestEntropy) { uint32_t needEntropy = ctx->requestEntropy - ctx->curEntropy; uint8_t *buff = ctx->buf + ctx->curLen; uint32_t len = ctx->bufLen - ctx->curLen; uint32_t entropy = ENTROPY_SeedPoolCollect(seedPool, ctx->isNpesUsed, needEntropy, buff, &len); if (entropy == 0) { BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_NO_ENTROPY_OBTAINED); return CRYPT_SEED_POOL_NO_ENTROPY_OBTAINED; } ctx->curEntropy += entropy; ctx->curLen += len; } /* * If the entropy data length is greater than the upper limit, the entropy source quality cannot meet the * requirements and an error is reported. */ if (ctx->curLen > ctx->maxLen) { BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_NOT_MEET_REQUIREMENT); return CRYPT_SEED_POOL_NOT_MEET_REQUIREMENT; } if (ctx->curLen < ctx->minLen) { /* * If the length of the entropy data is less than the lower limit of the required length, * the entropy data that meets the length requirement is read without considering the entropy. */ uint32_t len = ctx->minLen - ctx->curLen; uint32_t ent = ENTROPY_SeedPoolCollect(seedPool, true, 0, ctx->buf + ctx->curLen, &len); if (ent == 0 || len != ctx->minLen - ctx->curLen) { BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_NO_SUFFICIENT_ENTROPY); return CRYPT_SEED_POOL_NO_SUFFICIENT_ENTROPY; } ctx->curLen = ctx->minLen; } return CRYPT_SUCCESS; } static int32_t EAL_EntropyFesObtain(void *seedPool, EAL_EntropyCtx *ctx) { ENTROPY_ECFCtx seedCtx = {ctx->ecfuncId, ctx->ecfOutLen, ctx->ecfunc}; int32_t ret = ENTROPY_GetFullEntropyInput(&seedCtx, seedPool, ctx->isNpesUsed, ctx->requestEntropy, ctx->buf, ctx->bufLen); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ctx->curEntropy = ctx->requestEntropy; ctx->curLen = ctx->bufLen; return ret; } int32_t EAL_EntropyCollection(CRYPT_EAL_SeedPoolCtx *seedPool, EAL_EntropyCtx *ctx) { if (!ENTROPY_SeedPoolCheckState(seedPool->pool, true)) { BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_STATE_ERROR); return CRYPT_SEED_POOL_STATE_ERROR; } if (!ctx->isNeedFe || ENTROPY_SeedPoolGetMinEntropy(seedPool->pool) == EAL_MAX_ENTROPY_EVERY_BYTE) { return EAL_EntropyObtain(seedPool->pool, ctx); } else { return EAL_EntropyFesObtain(seedPool->pool, ctx); } } uint8_t *EAL_EntropyDetachBuf(EAL_EntropyCtx *ctx, uint32_t *len) { if (ctx->curEntropy < ctx->requestEntropy) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_ENTROPY); return NULL; } uint8_t *data = ctx->buf; *len = ctx->curLen; ctx->buf = NULL; ctx->bufLen = 0; ctx->curLen = 0; ctx->curEntropy = 0; return data; } static int32_t GetEntropy(void *seedCtx, CRYPT_Data *entropy, uint32_t strength, CRYPT_Range *lenRange) { return CRYPT_EAL_SeedPoolGetEntropy(seedCtx, entropy, strength, lenRange); } static void CleanEntropy(void *ctx, CRYPT_Data *entropy) { (void)ctx; BSL_SAL_CleanseData(entropy->data, entropy->len); BSL_SAL_FREE(entropy->data); } static int32_t GetNonce(void *ctx, CRYPT_Data *nonce, uint32_t strength, CRYPT_Range *lenRange) { return GetEntropy(ctx, nonce, strength, lenRange); } static void CleanNonce(void *ctx, CRYPT_Data *nonce) { CleanEntropy(ctx, nonce); } int32_t EAL_SetDefaultEntropyMeth(CRYPT_RandSeedMethod *meth) { if (meth == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } meth->getEntropy = GetEntropy; meth->cleanEntropy = CleanEntropy; meth->cleanNonce = CleanNonce; meth->getNonce = GetNonce; return CRYPT_SUCCESS; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_entropy.c
C
unknown
6,865
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef EAL_ENTROPY_H #define EAL_ENTROPY_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_ENTROPY) #include "crypt_eal_entropy.h" #include "bsl_sal.h" #include "crypt_entropy.h" #ifdef __cplusplus extern "C" { #endif // __cplusplus #ifdef HITLS_CRYPTO_ENTROPY_SYS struct CryptEalEntropySource { ENTROPY_EntropySource *es; BSL_SAL_ThreadLockHandle lock; // thread lock }; #endif typedef struct { /* whether non-physical entropy sources are allowed. */ bool isNpesUsed; /* whether a full-entropy bit string is required. */ bool isNeedFe; /* the minimum length of entropy data. */ uint32_t minLen; /* the maximum length of entropy data. */ uint32_t maxLen; /* the amount of entropy required. */ uint32_t requestEntropy; /* the current amount of entropy. */ uint32_t curEntropy; /* external conditioning function algorithm */ int32_t ecfuncId; int32_t ecfOutLen; /* external conditioning function */ ExternalConditioningFunction ecfunc; /* the length of the existing entropy data */ uint32_t curLen; /* the length of entropy buffer. */ uint32_t bufLen; /* the buffer of entropy buffer. */ uint8_t *buf; } EAL_EntropyCtx; struct EAL_SeedPool { CRYPT_EAL_Es *es; void *pool; BSL_SAL_ThreadLockHandle lock; // thread lock }; /* * @brief Creating an Entropy Source Application Handle. * * @param seedPool[IN] seed pool handle * @param isNpesUsed[IN] whether non-physical entropy sources are allowed * @param minLen[IN] the minimum length of entropy data * @param maxLen[IN] the maximum length of entropy data * @param entropy[IN] the amount of entropy required * @return entropy context */ EAL_EntropyCtx *EAL_EntropyNewCtx(CRYPT_EAL_SeedPoolCtx *seedPool, uint8_t isNpesUsed, uint32_t minLen, uint32_t maxLen, uint32_t entropy); /* * @brief Release an Entropy Source Application Handle. * * @param ctx[IN] seed pool handle * @return void */ void EAL_EntropyFreeCtx(EAL_EntropyCtx *ctx); /* * @brief collect entropy data. * * @param seedPool[IN] seed pool handle * @param ctx[IN] entropy source application Handle * @return success: CRYPT_SUCCESS * failed: other error codes */ int32_t EAL_EntropyCollection(CRYPT_EAL_SeedPoolCtx *seedPool, EAL_EntropyCtx *ctx); /* * @brief pop entropy data. * * @param seedPool[IN] seed pool handle * @param ctx[IN] entropy source application Handle * @param len[OUT] entropy buf length * @return success: buffer * failed: NULL */ uint8_t *EAL_EntropyDetachBuf(EAL_EntropyCtx *ctx, uint32_t *len); /** * @brief Set the random number method that uses the default system entropy source. * * @param meth meth method * @return Success: CRYPT_SUCCESS */ int32_t EAL_SetDefaultEntropyMeth(CRYPT_RandSeedMethod *meth); /** * @brief Obtain the conditioning function of the corresponding algorithm. * * @param algId algId * @return ExternalConditioningFunction */ ExternalConditioningFunction EAL_EntropyGetECF(uint32_t algId); #ifdef __cplusplus } #endif // __cplusplus #endif #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_entropy.h
C
unknown
3,681
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_ENTROPY) #include "securec.h" #include "bsl_err_internal.h" #include "bsl_sal.h" #include "crypt_errno.h" #include "eal_entropy.h" #include "eal_common.h" #ifdef HITLS_CRYPTO_ENTROPY_SYS #include "eal_md_local.h" #endif #include "crypt_eal_entropy.h" #define CRYPT_ENTROPY_SOURCE_FULL_ENTROPY 8 #ifdef HITLS_CRYPTO_ENTROPY_GM_CF #define HITLS_ENTROPY_DEFAULT_CF "sm3_df" #else #define HITLS_ENTROPY_DEFAULT_CF "sha256_df" #endif #ifdef HITLS_CRYPTO_ENTROPY_SYS CRYPT_EAL_Es *CRYPT_EAL_EsNew(void) { CRYPT_EAL_Es *esCtx = BSL_SAL_Malloc(sizeof(CRYPT_EAL_Es)); if (esCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(esCtx, sizeof(CRYPT_EAL_Es), 0, sizeof(CRYPT_EAL_Es)); esCtx->es = ENTROPY_EsNew(); if (esCtx->es == NULL) { BSL_SAL_Free(esCtx); BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_CREATE_ERROR); return NULL; } int32_t ret = BSL_SAL_ThreadLockNew(&esCtx->lock); if (ret != CRYPT_SUCCESS) { ENTROPY_EsFree(esCtx->es); BSL_SAL_FREE(esCtx); BSL_ERR_PUSH_ERROR(ret); return NULL; } return esCtx; } void CRYPT_EAL_EsFree(CRYPT_EAL_Es *esCtx) { if (esCtx == NULL) { return; } BSL_SAL_ThreadLockHandle lock = esCtx->lock; esCtx->lock = NULL; if (BSL_SAL_ThreadWriteLock(lock) != BSL_SUCCESS) { ENTROPY_EsFree(esCtx->es); BSL_SAL_ThreadLockFree(lock); BSL_SAL_Free(esCtx); return; } ENTROPY_EsFree(esCtx->es); (void)BSL_SAL_ThreadUnlock(lock); BSL_SAL_ThreadLockFree(lock); BSL_SAL_Free(esCtx); return; } int32_t CRYPT_EAL_EsInit(CRYPT_EAL_Es *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = BSL_SAL_ThreadWriteLock(ctx->lock); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = ENTROPY_EsInit(ctx->es); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } (void)BSL_SAL_ThreadUnlock(ctx->lock); return ret; } uint32_t CRYPT_EAL_EsEntropyGet(CRYPT_EAL_Es *esCtx, uint8_t *data, uint32_t len) { if (esCtx == NULL || data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } int32_t ret = BSL_SAL_ThreadWriteLock((esCtx->lock)); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR((ret)); return 0; } uint32_t resLen = ENTROPY_EsEntropyGet(esCtx->es, data, len); (void)BSL_SAL_ThreadUnlock(esCtx->lock); return resLen; } static uint32_t EAL_CfGetAlgId(const char *name) { if (strcmp(name, "sm3_df") == 0) { return CRYPT_MD_SM3; } if (strcmp(name, "sha224_df") == 0) { return CRYPT_MD_SHA224; } if (strcmp(name, "sha256_df") == 0) { return CRYPT_MD_SHA256; } if (strcmp(name, "sha384_df") == 0) { return CRYPT_MD_SHA384; } if (strcmp(name, "sha512_df") == 0) { return CRYPT_MD_SHA512; } return CRYPT_MD_MAX; } static int32_t EAL_CFSetDfMethod(CRYPT_EAL_Es *esCtx, const char *name) { CRYPT_MD_AlgId alg = EAL_CfGetAlgId(name); if (alg == CRYPT_MD_MAX) { BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ECF_ALG_ERROR); return CRYPT_ENTROPY_ECF_ALG_ERROR; } const EAL_MdMethod *md = EAL_MdFindDefaultMethod(alg); if (md == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, alg, CRYPT_EAL_ERR_ALGID); return CRYPT_ENTROPY_ECF_ALG_ERROR; } ENTROPY_CFPara para = {alg, (void *)(uintptr_t)md}; return ENTROPY_EsCtrl(esCtx->es, CRYPT_ENTROPY_SET_CF, (void *)&para, sizeof(ENTROPY_CFPara)); } static int32_t EAL_EsPoolCfSet(CRYPT_EAL_Es *esCtx, void *data, uint32_t len) { if (data == NULL || len == 0) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (strstr(data, "df") != NULL) { return EAL_CFSetDfMethod(esCtx, data); } BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ECF_ALG_ERROR); return CRYPT_ENTROPY_ECF_ALG_ERROR; } static int32_t EAL_EsCtrl(CRYPT_EAL_Es *esCtx, int32_t cmd, void *data, uint32_t len) { switch (cmd) { case CRYPT_ENTROPY_SET_CF: return EAL_EsPoolCfSet(esCtx, data, len); case CRYPT_ENTROPY_GATHER_ENTROPY: return ENTROPY_EsEntropyGather(esCtx->es); default: return ENTROPY_EsCtrl(esCtx->es, cmd, data, len); } } int32_t CRYPT_EAL_EsCtrl(CRYPT_EAL_Es *esCtx, int32_t type, void *data, uint32_t len) { if (esCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (type < CRYPT_ENTROPY_SET_POOL_SIZE || type >= CRYPT_ENTROPY_MAX) { BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_CTRL_ERROR); return CRYPT_ENTROPY_ES_CTRL_ERROR; } int32_t ret = BSL_SAL_ThreadWriteLock(esCtx->lock); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = EAL_EsCtrl(esCtx, type, data, len); (void)BSL_SAL_ThreadUnlock(esCtx->lock); return ret; } static CRYPT_EAL_Es *EsDefaultCreate(void) { CRYPT_EAL_Es *es = CRYPT_EAL_EsNew(); if (es == NULL) { return NULL; } char *data = HITLS_ENTROPY_DEFAULT_CF; int32_t ret = CRYPT_EAL_EsCtrl(es, CRYPT_ENTROPY_SET_CF, data, strlen(data)); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_EsFree(es); return NULL; } ret = ENTROPY_EsInit(es->es); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_EsFree(es); return NULL; } return es; } #endif CRYPT_EAL_SeedPoolCtx *CRYPT_EAL_SeedPoolNew(bool isCreateNullPool) { CRYPT_EAL_SeedPoolCtx *ctx = BSL_SAL_Malloc(sizeof(CRYPT_EAL_SeedPoolCtx)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(ctx, sizeof(CRYPT_EAL_SeedPoolCtx), 0, sizeof(CRYPT_EAL_SeedPoolCtx)); int32_t ret = BSL_SAL_ThreadLockNew(&ctx->lock); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(ctx); BSL_ERR_PUSH_ERROR(ret); return NULL; } ctx->pool = ENTROPY_SeedPoolNew(isCreateNullPool); if (ctx->pool == NULL) { CRYPT_EAL_SeedPoolFree(ctx); BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_NEW_ERROR); return NULL; } #ifdef HITLS_CRYPTO_ENTROPY_SYS if (isCreateNullPool) { ctx->es = NULL; return ctx; } ctx->es = EsDefaultCreate(); if (ctx->es == NULL) { CRYPT_EAL_SeedPoolFree(ctx); return NULL; } CRYPT_EAL_EsPara para = {false, CRYPT_ENTROPY_SOURCE_FULL_ENTROPY, ctx->es, (CRYPT_EAL_EntropyGet)CRYPT_EAL_EsEntropyGet}; ret = ENTROPY_SeedPoolAddEs(ctx->pool, &para); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_SeedPoolFree(ctx); BSL_ERR_PUSH_ERROR(ret); return NULL; } #endif return ctx; } int32_t CRYPT_EAL_SeedPoolAddEs(CRYPT_EAL_SeedPoolCtx *ctx, const CRYPT_EAL_EsPara *para) { if (ctx == NULL || para == NULL || para->minEntropy == 0 || para->minEntropy > CRYPT_ENTROPY_SOURCE_FULL_ENTROPY || para->entropyGet == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = BSL_SAL_ThreadWriteLock(ctx->lock); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = ENTROPY_SeedPoolAddEs(ctx->pool, para); (void)BSL_SAL_ThreadUnlock(ctx->lock); return ret; } void CRYPT_EAL_SeedPoolFree(CRYPT_EAL_SeedPoolCtx *ctx) { if (ctx == NULL) { return; } (void)BSL_SAL_ThreadWriteLock(ctx->lock); if (ctx->pool != NULL) { ENTROPY_SeedPoolFree(ctx->pool); ctx->pool = NULL; } #ifdef HITLS_CRYPTO_ENTROPY_SYS if (ctx->es != NULL) { CRYPT_EAL_EsFree(ctx->es); ctx->es = NULL; } #endif (void)BSL_SAL_ThreadUnlock(ctx->lock); BSL_SAL_ThreadLockFree(ctx->lock); BSL_SAL_FREE(ctx); return; } static int32_t SeedPoolGetEntropy(CRYPT_EAL_SeedPoolCtx *poolCtx, CRYPT_Data *entropy, uint32_t strength, const CRYPT_Range *lenRange) { EAL_EntropyCtx *ctx = EAL_EntropyNewCtx(poolCtx, true, lenRange->min, lenRange->max, strength); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_CTX_CREATE_FAILED); return CRYPT_ENTROPY_CTX_CREATE_FAILED; } int32_t ret = EAL_EntropyCollection(poolCtx, ctx); if (ret != CRYPT_SUCCESS) { EAL_EntropyFreeCtx(ctx); BSL_ERR_PUSH_ERROR(ret); return ret; } entropy->data = EAL_EntropyDetachBuf(ctx, &entropy->len); EAL_EntropyFreeCtx(ctx); if (entropy->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_ENTROPY); return CRYPT_DRBG_FAIL_GET_ENTROPY; } return CRYPT_SUCCESS; } int32_t CRYPT_EAL_SeedPoolGetEntropy(CRYPT_EAL_SeedPoolCtx *ctx, CRYPT_Data *entropy, uint32_t strength, const CRYPT_Range *lenRange) { if (ctx == NULL || entropy == NULL || lenRange == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = BSL_SAL_ThreadWriteLock(ctx->lock); if (ret != BSL_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = SeedPoolGetEntropy(ctx, entropy, strength, lenRange); (void)BSL_SAL_ThreadUnlock(ctx->lock); return ret; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_entropyPool.c
C
unknown
10,317
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_ENTROPY) #include "securec.h" #include "bsl_err_internal.h" #include "bsl_sal.h" #include "crypt_errno.h" #include "eal_entropy.h" #include "eal_common.h" #include "crypt_eal_mac.h" #include "crypt_eal_md.h" #ifdef HITLS_CRYPTO_MAC #define ECF_ALG_KEY_LEN 16 static int32_t ECFMac(uint32_t algId, uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen) { CRYPT_EAL_MacCtx *ctx = CRYPT_EAL_MacNewCtx(algId); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_ENTROPY_CONDITION_FAILURE; } uint32_t keyLen = ECF_ALG_KEY_LEN; uint8_t *ecfKey = (uint8_t *)BSL_SAL_Malloc(keyLen); if (ecfKey == NULL) { CRYPT_EAL_MacFreeCtx(ctx); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } /* reference nist-800 90c-3pd section 3.3.1.1 * Unlike other cryptographic applications, keys used in these external conditioning functions do not require * secrecy to accomplish their purpose so may be hard-coded, fixed, or all zeros. */ (void)memset_s(ecfKey, keyLen, 0, keyLen); int32_t ret = CRYPT_EAL_MacInit(ctx, ecfKey, keyLen); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_MacFreeCtx(ctx); BSL_SAL_FREE(ecfKey); return ret; } ret = CRYPT_EAL_MacUpdate(ctx, in, inLen); if (ret != CRYPT_SUCCESS) { CRYPT_EAL_MacFreeCtx(ctx); BSL_SAL_FREE(ecfKey); return ret; } ret = CRYPT_EAL_MacFinal(ctx, out, outLen); CRYPT_EAL_MacFreeCtx(ctx); BSL_SAL_FREE(ecfKey); return ret; } #endif ExternalConditioningFunction EAL_EntropyGetECF(uint32_t algId) { (void)algId; #ifdef HITLS_CRYPTO_MAC return ECFMac; #else return NULL; #endif } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_entropy_ecf.c
C
unknown
2,370
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_KDF) #include <stdint.h> #include "crypt_eal_kdf.h" #include "securec.h" #include "bsl_err_internal.h" #include "crypt_local_types.h" #include "crypt_eal_mac.h" #ifdef HITLS_CRYPTO_PROVIDER #include "crypt_eal_implprovider.h" #include "crypt_provider.h" #endif #include "crypt_algid.h" #include "crypt_errno.h" #include "eal_mac_local.h" #include "eal_kdf_local.h" #ifdef HITLS_CRYPTO_HMAC #include "crypt_hmac.h" #endif #ifdef HITLS_CRYPTO_PBKDF2 #include "crypt_pbkdf2.h" #endif #ifdef HITLS_CRYPTO_HKDF #include "crypt_hkdf.h" #endif #ifdef HITLS_CRYPTO_KDFTLS12 #include "crypt_kdf_tls12.h" #endif #ifdef HITLS_CRYPTO_SCRYPT #include "crypt_scrypt.h" #endif #include "eal_common.h" #include "crypt_utils.h" #include "bsl_sal.h" static CRYPT_EAL_KdfCTX *KdfAllocCtx(CRYPT_KDF_AlgId id, EAL_KdfUnitaryMethod *method) { CRYPT_EAL_KdfCTX *ctx = BSL_SAL_Calloc(1u, sizeof(CRYPT_EAL_KdfCTX)); if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } void *data = method->newCtx(); if (data == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, id, CRYPT_MEM_ALLOC_FAIL); BSL_SAL_FREE(ctx); return NULL; } ctx->data = data; return ctx; } static void EalKdfCopyMethod(const EAL_KdfMethod *method, EAL_KdfUnitaryMethod *dest) { dest->newCtx = method->newCtx; dest->setParam = method->setParam; dest->derive = method->derive; dest->deinit = method->deinit; dest->freeCtx = method->freeCtx; } #ifdef HITLS_CRYPTO_PROVIDER static int32_t CRYPT_EAL_SetKdfMethod(CRYPT_EAL_KdfCTX *ctx, const CRYPT_EAL_Func *funcs) { int32_t index = 0; EAL_KdfUnitaryMethod *method = BSL_SAL_Calloc(1, sizeof(EAL_KdfUnitaryMethod)); if (method == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return BSL_MALLOC_FAIL; } while (funcs[index].id != 0) { switch (funcs[index].id) { case CRYPT_EAL_IMPLKDF_NEWCTX: method->provNewCtx = funcs[index].func; break; case CRYPT_EAL_IMPLKDF_SETPARAM: method->setParam = funcs[index].func; break; case CRYPT_EAL_IMPLKDF_DERIVE: method->derive = funcs[index].func; break; case CRYPT_EAL_IMPLKDF_DEINITCTX: method->deinit = funcs[index].func; break; case CRYPT_EAL_IMPLKDF_CTRL: method->ctrl = funcs[index].func; break; case CRYPT_EAL_IMPLKDF_FREECTX: method->freeCtx = funcs[index].func; break; default: BSL_SAL_FREE(method); BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } ctx->method = method; return CRYPT_SUCCESS; } CRYPT_EAL_KdfCTX *CRYPT_EAL_ProviderKdfNewCtxInner(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName) { const CRYPT_EAL_Func *funcs = NULL; void *provCtx = NULL; int32_t ret = CRYPT_EAL_ProviderGetFuncs(libCtx, CRYPT_EAL_OPERAID_KDF, algId, attrName, &funcs, &provCtx); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, algId, ret); return NULL; } CRYPT_EAL_KdfCTX *ctx = BSL_SAL_Calloc(1u, sizeof(CRYPT_EAL_KdfCTX)); if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, algId, CRYPT_MEM_ALLOC_FAIL); return NULL; } ret = CRYPT_EAL_SetKdfMethod(ctx, funcs); if (ret != BSL_SUCCESS) { BSL_SAL_FREE(ctx); return NULL; } if (ctx->method->provNewCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, algId, CRYPT_PROVIDER_ERR_IMPL_NULL); BSL_SAL_FREE(ctx->method); BSL_SAL_FREE(ctx); return NULL; } ctx->data = ctx->method->provNewCtx(provCtx, algId); if (ctx->data == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, algId, CRYPT_MEM_ALLOC_FAIL); BSL_SAL_FREE(ctx->method); BSL_SAL_FREE(ctx); return NULL; } ctx->id = algId; ctx->isProvider = true; return ctx; } #endif // HITLS_CRYPTO_PROVIDER bool CRYPT_EAL_KdfIsValidAlgId(CRYPT_KDF_AlgId id) { const EAL_KdfMethod *method = EAL_KdfFindMethod(id); if (method == NULL) { return false; } else { return true; } } CRYPT_EAL_KdfCTX *CRYPT_EAL_ProviderKdfNewCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName) { #ifdef HITLS_CRYPTO_PROVIDER return CRYPT_EAL_ProviderKdfNewCtxInner(libCtx, algId, attrName); #else (void)libCtx; (void)attrName; return CRYPT_EAL_KdfNewCtx(algId); return NULL; #endif } CRYPT_EAL_KdfCTX *CRYPT_EAL_KdfNewCtx(CRYPT_KDF_AlgId algId) { const EAL_KdfMethod *method = EAL_KdfFindMethod(algId); if (method == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, algId, CRYPT_EAL_ERR_ALGID); return NULL; } EAL_KdfUnitaryMethod *temp = BSL_SAL_Calloc(1, sizeof(EAL_KdfUnitaryMethod)); if (temp == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, algId, BSL_MALLOC_FAIL); return NULL; } EalKdfCopyMethod(method, temp); CRYPT_EAL_KdfCTX *ctx = KdfAllocCtx(algId, temp); if (ctx == NULL) { BSL_SAL_FREE(temp); return NULL; } ctx->id = algId; ctx->method = temp; return ctx; } int32_t CRYPT_EAL_KdfSetParam(CRYPT_EAL_KdfCTX *ctx, const BSL_Param *param) { int32_t ret; if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, CRYPT_KDF_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method == NULL || ctx->method->setParam == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } ret = ctx->method->setParam(ctx->data, param); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, ctx->id, ret); } return ret; } int32_t CRYPT_EAL_KdfDerive(CRYPT_EAL_KdfCTX *ctx, uint8_t *key, uint32_t keyLen) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, CRYPT_KDF_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method == NULL || ctx->method->derive == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = ctx->method->derive(ctx->data, key, keyLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, ctx->id, ret); return ret; } return CRYPT_SUCCESS; } int32_t CRYPT_EAL_KdfDeInitCtx(CRYPT_EAL_KdfCTX *ctx) { if (ctx == NULL || ctx->method == NULL || ctx->method->deinit == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, CRYPT_KDF_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } ctx->method->deinit(ctx->data); return CRYPT_SUCCESS; } void CRYPT_EAL_KdfFreeCtx(CRYPT_EAL_KdfCTX *ctx) { if (ctx == NULL) { return; } if (ctx->method != NULL && ctx->method->freeCtx != NULL) { ctx->method->freeCtx(ctx->data); EAL_EventReport(CRYPT_EVENT_ZERO, CRYPT_ALGO_KDF, ctx->id, CRYPT_SUCCESS); } else { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_KDF, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); } BSL_SAL_FREE(ctx->method); BSL_SAL_FREE(ctx); return; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_kdf.c
C
unknown
8,217
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef EAL_KDF_LOCAL_H #define EAL_KDF_LOCAL_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_KDF) #include <stdint.h> #include "crypt_algid.h" #include "crypt_local_types.h" #ifdef __cplusplus extern "C" { #endif // __cplusplus struct EalKdfCtx { bool isProvider; EAL_KdfUnitaryMethod *method; /* algorithm operation entity */ void *data; CRYPT_KDF_AlgId id; }; const EAL_KdfMethod *EAL_KdfFindMethod(CRYPT_KDF_AlgId id); #ifdef __cplusplus } #endif // __cplusplus #endif // HITLS_CRYPTO_KDF #endif // EAL_KDF_LOCAL_H
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_kdf_local.h
C
unknown
1,121
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_KDF) #include "crypt_local_types.h" #include "crypt_algid.h" #ifdef HITLS_CRYPTO_PBKDF2 #include "crypt_pbkdf2.h" #endif #ifdef HITLS_CRYPTO_HKDF #include "crypt_hkdf.h" #endif #ifdef HITLS_CRYPTO_KDFTLS12 #include "crypt_kdf_tls12.h" #endif #ifdef HITLS_CRYPTO_SCRYPT #include "crypt_scrypt.h" #endif #include "bsl_err_internal.h" #include "eal_common.h" #include "bsl_sal.h" #define CRYPT_KDF_IMPL_METHOD_DECLARE(name) \ EAL_KdfMethod g_kdfMethod_##name = { \ (KdfNewCtx)CRYPT_##name##_NewCtx, (KdfSetParam)CRYPT_##name##_SetParam, \ (KdfDerive)CRYPT_##name##_Derive, (KdfDeinit)CRYPT_##name##_Deinit, \ (KdfFreeCtx)CRYPT_##name##_FreeCtx \ } #ifdef HITLS_CRYPTO_PBKDF2 CRYPT_KDF_IMPL_METHOD_DECLARE(PBKDF2); #endif #ifdef HITLS_CRYPTO_HKDF CRYPT_KDF_IMPL_METHOD_DECLARE(HKDF); #endif #ifdef HITLS_CRYPTO_KDFTLS12 CRYPT_KDF_IMPL_METHOD_DECLARE(KDFTLS12); #endif #ifdef HITLS_CRYPTO_SCRYPT CRYPT_KDF_IMPL_METHOD_DECLARE(SCRYPT); #endif static const EAL_CidToKdfMeth ID_TO_KDF_METH_TABLE[] = { #ifdef HITLS_CRYPTO_PBKDF2 {CRYPT_KDF_PBKDF2, &g_kdfMethod_PBKDF2}, #endif #ifdef HITLS_CRYPTO_HKDF {CRYPT_KDF_HKDF, &g_kdfMethod_HKDF}, #endif #ifdef HITLS_CRYPTO_KDFTLS12 {CRYPT_KDF_KDFTLS12, &g_kdfMethod_KDFTLS12}, #endif #ifdef HITLS_CRYPTO_SCRYPT {CRYPT_KDF_SCRYPT, &g_kdfMethod_SCRYPT}, #endif }; const EAL_KdfMethod *EAL_KdfFindMethod(CRYPT_KDF_AlgId id) { EAL_KdfMethod *pKdfMeth = NULL; uint32_t num = sizeof(ID_TO_KDF_METH_TABLE) / sizeof(ID_TO_KDF_METH_TABLE[0]); for (uint32_t i = 0; i < num; i++) { if (ID_TO_KDF_METH_TABLE[i].id == id) { pKdfMeth = ID_TO_KDF_METH_TABLE[i].kdfMeth; return pKdfMeth; } } return NULL; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_kdf_method.c
C
unknown
2,456
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CODECSKEY) && defined(HITLS_CRYPTO_PROVIDER) #include "crypt_errno.h" #include "crypt_eal_pkey.h" #include "eal_pkey_local.h" #include "eal_pkey.h" #include "bsl_err_internal.h" #include "bsl_sal.h" CRYPT_EAL_PkeyCtx *CRYPT_EAL_MakeKeyByPkeyAlgInfo(CRYPT_EAL_PkeyMgmtInfo *pkeyAlgInfo, void *keyRef, uint32_t keyRefLen) { if (pkeyAlgInfo == NULL || keyRef == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } if (keyRefLen != sizeof(void *)) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return NULL; } CRYPT_EAL_PkeyCtx *pkeyCtx = BSL_SAL_Calloc(1, sizeof(CRYPT_EAL_PkeyCtx)); if (pkeyCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } pkeyCtx->isProvider = true; pkeyCtx->id = pkeyAlgInfo->algId; pkeyCtx->key = keyRef; pkeyCtx->extData = NULL; pkeyCtx->method = pkeyAlgInfo->keyMgmtMethod; BSL_SAL_ReferencesInit(&(pkeyCtx->references)); return pkeyCtx; } int32_t CRYPT_EAL_GetPkeyAlgInfo(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName, CRYPT_EAL_PkeyMgmtInfo *pkeyAlgInfo) { CRYPT_EAL_AsyAlgFuncsInfo funcInfo = {0}; int32_t ret = CRYPT_EAL_ProviderGetAsyAlgFuncs(libCtx, algId, CRYPT_EAL_PKEY_UNKNOWN_OPERATE, attrName, &funcInfo); if (ret != CRYPT_SUCCESS) { return ret; } ret = CRYPT_EAL_SetPkeyMethod(&(pkeyAlgInfo->keyMgmtMethod), funcInfo.funcsKeyMgmt, funcInfo.funcsAsyCipher, funcInfo.funcsExch, funcInfo.funcSign, funcInfo.funcKem); if (ret != CRYPT_SUCCESS) { return ret; } pkeyAlgInfo->algId = algId; pkeyAlgInfo->mgrCtx = funcInfo.mgrCtx; return CRYPT_SUCCESS; } #endif /* HITLS_CRYPTO_CODECSKEY && CRYPT_EAL_PROVIDER */
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_keymgmt_util.c
C
unknown
2,358
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MAC) #include <stdio.h> #include <stdlib.h> #include "crypt_eal_mac.h" #include "securec.h" #include "bsl_err_internal.h" #include "bsl_sal.h" #include "crypt_local_types.h" #include "crypt_eal_mac.h" #include "crypt_algid.h" #include "crypt_errno.h" #include "crypt_ealinit.h" #include "eal_mac_local.h" #include "eal_common.h" #ifdef HITLS_CRYPTO_PROVIDER #include "crypt_eal_implprovider.h" #include "crypt_provider.h" #endif #define MAC_TYPE_INVALID 0 static CRYPT_EAL_MacCtx *MacNewCtxInner(int32_t algId, CRYPT_EAL_LibCtx *libCtx, const char *attrName, bool isProvider) { EAL_MacMethod *method = NULL; CRYPT_EAL_MacCtx *macCtx = BSL_SAL_Malloc(sizeof(CRYPT_EAL_MacCtx)); if (macCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, algId, CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(macCtx, sizeof(CRYPT_EAL_MacCtx), 0, sizeof(CRYPT_EAL_MacCtx)); void *provCtx = NULL; if (!isProvider) { method = EAL_MacFindMethod(algId, &macCtx->macMeth); } else { method = EAL_MacFindMethodEx(algId, libCtx, attrName, &macCtx->macMeth, &provCtx); } if (method == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, algId, CRYPT_EAL_ERR_METH_NULL_MEMBER); BSL_SAL_Free(macCtx); return NULL; } if (macCtx->macMeth.newCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, algId, CRYPT_NULL_INPUT); BSL_SAL_Free(macCtx); return NULL; } void *data = macCtx->macMeth.newCtx(provCtx, algId); if (data == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, algId, CRYPT_MEM_ALLOC_FAIL); BSL_SAL_Free(macCtx); return NULL; } macCtx->ctx = data; macCtx->id = algId; macCtx->state = CRYPT_MAC_STATE_NEW; return macCtx; } CRYPT_EAL_MacCtx *CRYPT_EAL_ProviderMacNewCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName) { return MacNewCtxInner(algId, libCtx, attrName, true); } CRYPT_EAL_MacCtx *CRYPT_EAL_MacNewCtx(CRYPT_MAC_AlgId id) { #if defined(HITLS_CRYPTO_ASM_CHECK) if (CRYPT_ASMCAP_Mac(id) != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, id, CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return NULL; } #endif return MacNewCtxInner(id, NULL, NULL, false); } void CRYPT_EAL_MacFreeCtx(CRYPT_EAL_MacCtx *ctx) { if (ctx == NULL) { return; } if (ctx->macMeth.freeCtx != NULL) { ctx->macMeth.freeCtx(ctx->ctx); EAL_EventReport(CRYPT_EVENT_ZERO, CRYPT_ALGO_MAC, ctx->id, CRYPT_SUCCESS); } else { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); } BSL_SAL_Free(ctx); return; } int32_t CRYPT_EAL_MacInit(CRYPT_EAL_MacCtx *ctx, const uint8_t *key, uint32_t len) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->macMeth.init == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = ctx->macMeth.init(ctx->ctx, key, len, NULL); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, ret); return ret; } ctx->state = CRYPT_MAC_STATE_INIT; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_MacUpdate(CRYPT_EAL_MacCtx *ctx, const uint8_t *in, uint32_t len) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((ctx->state == CRYPT_MAC_STATE_FINAL) || (ctx->state == CRYPT_MAC_STATE_NEW)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } if (ctx->macMeth.update == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = ctx->macMeth.update(ctx->ctx, in, len); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, ret); return ret; } ctx->state = CRYPT_MAC_STATE_UPDATE; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_MacFinal(CRYPT_EAL_MacCtx *ctx, uint8_t *out, uint32_t *len) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if ((ctx->state == CRYPT_MAC_STATE_NEW) || (ctx->state == CRYPT_MAC_STATE_FINAL)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } if (ctx->macMeth.final == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = ctx->macMeth.final(ctx->ctx, out, len); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, ret); return ret; } ctx->state = CRYPT_MAC_STATE_FINAL; return CRYPT_SUCCESS; } void CRYPT_EAL_MacDeinit(CRYPT_EAL_MacCtx *ctx) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT); return; } if (ctx->macMeth.deinit == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return; } int32_t ret = ctx->macMeth.deinit(ctx->ctx); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, ret); return; } ctx->state = CRYPT_MAC_STATE_NEW; return; } int32_t CRYPT_EAL_MacReinit(CRYPT_EAL_MacCtx *ctx) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->state == CRYPT_MAC_STATE_NEW) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } if (ctx->macMeth.reinit == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = ctx->macMeth.reinit(ctx->ctx); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, ret); return ret; } ctx->state = CRYPT_MAC_STATE_INIT; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_MacCtrl(CRYPT_EAL_MacCtx *ctx, int32_t cmd, void *val, uint32_t valLen) { if (ctx == NULL || ctx->macMeth.ctrl == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (cmd == CRYPT_CTRL_GET_MACLEN) { return ctx->macMeth.ctrl(ctx->ctx, cmd, val, valLen); } if (ctx->state != CRYPT_MAC_STATE_INIT) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } return ctx->macMeth.ctrl(ctx->ctx, cmd, val, valLen); } uint32_t CRYPT_EAL_GetMacLen(const CRYPT_EAL_MacCtx *ctx) { uint32_t result = 0; int32_t ret = CRYPT_EAL_MacCtrl((CRYPT_EAL_MacCtx *)(uintptr_t)ctx, CRYPT_CTRL_GET_MACLEN, &result, sizeof(uint32_t)); return (ret == CRYPT_SUCCESS) ? result : 0; } /* The function not support provider */ bool CRYPT_EAL_MacIsValidAlgId(CRYPT_MAC_AlgId id) { // 1. Check if the dependency method is valid /** * The dependency method is getted from the global static table: * If the mac algorithm is HMAC, the method in mdMethod will be overwritten. * If the mac algorithm is other than HMAC, the depMeth.method will be overwritten. */ EAL_MdMethod mdMethod = {0}; EAL_MacDepMethod depMeth = {.method = {.md = &mdMethod}}; int32_t ret = EAL_MacFindDepMethod(id, NULL, NULL, &depMeth, NULL, false); if (ret != CRYPT_SUCCESS) { return false; } // 2. Check if the mac method is valid return EAL_MacFindDefaultMethod(id) != NULL; } int32_t CRYPT_EAL_MacSetParam(CRYPT_EAL_MacCtx *ctx, const BSL_Param *param) { if (ctx == NULL || param == NULL || ctx->macMeth.setParam == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } return ctx->macMeth.setParam(ctx->ctx, param); } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_mac.c
C
unknown
9,152
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef EAL_MAC_LOCAL_H #define EAL_MAC_LOCAL_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MAC) #include <stdint.h> #include "crypt_algid.h" #include "crypt_local_types.h" #ifdef __cplusplus extern "C" { #endif // __cplusplus typedef enum { CRYPT_MAC_STATE_NEW = 0, CRYPT_MAC_STATE_INIT, CRYPT_MAC_STATE_UPDATE, CRYPT_MAC_STATE_FINAL } CRYPT_MAC_WORKSTATE; struct EAL_MacCtx { EAL_MacMethod macMeth; void *ctx; // MAC context CRYPT_MAC_AlgId id; CRYPT_MAC_WORKSTATE state; }; /** * @ingroup eal * @brief Find the default MAC method by the algorithm ID. * * @param id The algorithm ID. * * @return The MAC method. */ const EAL_MacMethod *EAL_MacFindDefaultMethod(CRYPT_MAC_AlgId id); /** * @ingroup eal * @brief Find MAC algorithm implementation method by algorithm ID * * This function retrieves the default implementation method for specified MAC algorithm ID. * If the input method pointer is NULL, will allocate new memory for method structure. Otherwise, * will initialize the provided method structure. * * @param id [IN] MAC algorithm identifier (e.g. CRYPT_MAC_HMAC, CRYPT_MAC_CMAC) * @param method [IN/OUT] Pointer to method structure. * If NULL, function will allocate new memory. Caller must free returned pointer when no longer needed. * If not NULL, the method should be cleared before calling this function. * * @return Pointer to MAC method structure on success. NULL on failure (invalid ID or allocate fail). * Note: When input method is NULL, returned pointer MUST be freed by caller. * When input method is not NULL, returns the same pointer with initialized contents. */ EAL_MacMethod *EAL_MacFindMethod(CRYPT_MAC_AlgId id, EAL_MacMethod *method); /** * @ingroup eal * @brief Find MAC algorithm implementation method by algorithm ID with provider context * * This function retrieves the default implementation method for specified MAC algorithm ID. * If the input method pointer is NULL, will allocate new memory for method structure. Otherwise, * will initialize the provided method structure. * * @param id [IN] MAC algorithm identifier (e.g. CRYPT_MAC_HMAC, CRYPT_MAC_CMAC) * @param libCtx [IN] The library context. * @param attrName [IN] The attribute name. * @param method [IN/OUT] Pointer to method structure. * If NULL, function will allocate new memory. Caller must free returned pointer when no longer needed. * If not NULL, the method should be cleared before calling this function. * @param provCtx [OUT] The provider context. * * @return Pointer to MAC method structure on success. NULL on failure (invalid ID or alloc fail). * Note: When input method is NULL, returned pointer MUST be freed by caller. * When input method is not NULL, returns the same pointer with initialized contents. */ EAL_MacMethod *EAL_MacFindMethodEx(CRYPT_MAC_AlgId id, void *libCtx, const char *attrName, EAL_MacMethod *method, void **provCtx); /** * @ingroup eal * @brief Find dependent algorithm methods for MAC calculation * * @param macId [IN] MAC algorithm identifier * @param libCtx [IN] Library context (for provider operations) * @param attrName [IN] Attribute name for provider selection * @param depMeth [OUT] Structure containing dependent methods and algorithm IDs * @param provCtx [OUT] The provider context. * @param isProvider [IN] Whether to use the provider method. * * @return CRYPT_SUCCESS on success, error code on failure * * @note When macId is HMAC: * - depMeth->method.md is NULL: * - Function will allocate new EAL_MdMethod structure internally * - Caller MUST free allocated method * - depMeth->method.md is non-NULL: * - Function will reuse existing method structure * - Original contents will be overwritten */ int32_t EAL_MacFindDepMethod(CRYPT_MAC_AlgId macId, void *libCtx, const char *attrName, EAL_MacDepMethod *depMeth, void **provCtx, bool isProvider); #ifdef __cplusplus } #endif // __cplusplus #endif // HITLS_CRYPTO_MAC #endif // EAL_MAC_LOCAL_H
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_mac_local.h
C
unknown
4,785
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MAC) #include <stdint.h> #include "securec.h" #include "crypt_local_types.h" #include "crypt_algid.h" #include "crypt_errno.h" #include "bsl_sal.h" #include "eal_mac_local.h" #include "eal_cipher_local.h" #include "eal_md_local.h" #ifdef HITLS_CRYPTO_HMAC #include "crypt_hmac.h" #endif #ifdef HITLS_CRYPTO_CMAC #include "crypt_cmac.h" #endif #ifdef HITLS_CRYPTO_CBC_MAC #include "crypt_cbc_mac.h" #endif #ifdef HITLS_CRYPTO_GMAC #include "crypt_gmac.h" #endif #ifdef HITLS_CRYPTO_SIPHASH #include "crypt_siphash.h" #endif #include "bsl_err_internal.h" #include "eal_common.h" #ifdef HITLS_CRYPTO_PROVIDER #include "crypt_eal_implprovider.h" #endif #define CRYPT_MAC_IMPL_METHOD_DECLARE(name) \ EAL_MacMethod g_macMethod_##name = { \ (MacNewCtx)CRYPT_##name##_NewCtxEx, \ (MacInit)CRYPT_##name##_Init, \ (MacUpdate)CRYPT_##name##_Update, \ (MacFinal)CRYPT_##name##_Final, \ (MacDeinit)CRYPT_##name##_Deinit, \ (MacReinit)CRYPT_##name##_Reinit, \ (MacCtrl)CRYPT_##name##_Ctrl, \ (MacSetParam)CRYPT_##name##_SetParam, \ (MacFreeCtx)CRYPT_##name##_FreeCtx \ } #ifdef HITLS_CRYPTO_HMAC CRYPT_MAC_IMPL_METHOD_DECLARE(HMAC); #endif #ifdef HITLS_CRYPTO_CMAC CRYPT_MAC_IMPL_METHOD_DECLARE(CMAC); #endif #ifdef HITLS_CRYPTO_CBC_MAC CRYPT_MAC_IMPL_METHOD_DECLARE(CBC_MAC); #endif #ifdef HITLS_CRYPTO_GMAC CRYPT_MAC_IMPL_METHOD_DECLARE(GMAC); #endif #ifdef HITLS_CRYPTO_SIPHASH CRYPT_MAC_IMPL_METHOD_DECLARE(SIPHASH); EAL_SiphashMethod g_siphash64Meth = {.hashSize = SIPHASH_MIN_DIGEST_SIZE, .compressionRounds = DEFAULT_COMPRESSION_ROUND, .finalizationRounds = DEFAULT_FINALIZATION_ROUND}; EAL_SiphashMethod g_siphash128Meth = {.hashSize = SIPHASH_MAX_DIGEST_SIZE, .compressionRounds = DEFAULT_COMPRESSION_ROUND, .finalizationRounds = DEFAULT_FINALIZATION_ROUND}; #endif typedef enum { CRYPT_MAC_HMAC = 0, CRYPT_MAC_CMAC, CRYPT_MAC_CBC_MAC, CRYPT_MAC_SIPHASH, CRYPT_MAC_GMAC, CRYPT_MAC_INVALID } CRYPT_MAC_ID; static const EAL_MacMethod *g_macMethods[] = { #ifdef HITLS_CRYPTO_HMAC &g_macMethod_HMAC, // HMAC #else NULL, #endif #ifdef HITLS_CRYPTO_CMAC &g_macMethod_CMAC, // CMAC #else NULL, #endif #ifdef HITLS_CRYPTO_CBC_MAC &g_macMethod_CBC_MAC, // CBC-MAC #else NULL, #endif #ifdef HITLS_CRYPTO_SIPHASH &g_macMethod_SIPHASH, // SIPHASH #else NULL, #endif #ifdef HITLS_CRYPTO_GMAC &g_macMethod_GMAC, // GMAC #else NULL, #endif }; typedef struct { uint32_t id; CRYPT_MAC_ID macId; union { CRYPT_MD_AlgId mdId; CRYPT_SYM_AlgId symId; }; } EAL_MacAlgMap; static const EAL_MacAlgMap CID_MAC_ALG_MAP[] = { #ifdef HITLS_CRYPTO_HMAC {.id = CRYPT_MAC_HMAC_MD5, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_MD5}, {.id = CRYPT_MAC_HMAC_SHA1, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA1}, {.id = CRYPT_MAC_HMAC_SHA224, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA224}, {.id = CRYPT_MAC_HMAC_SHA256, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA256}, {.id = CRYPT_MAC_HMAC_SHA384, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA384}, {.id = CRYPT_MAC_HMAC_SHA512, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA512}, {.id = CRYPT_MAC_HMAC_SHA3_224, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA3_224}, {.id = CRYPT_MAC_HMAC_SHA3_256, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA3_256}, {.id = CRYPT_MAC_HMAC_SHA3_384, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA3_384}, {.id = CRYPT_MAC_HMAC_SHA3_512, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA3_512}, {.id = CRYPT_MAC_HMAC_SM3, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SM3}, #endif // HITLS_CRYPTO_HMAC #ifdef HITLS_CRYPTO_CMAC_AES {.id = CRYPT_MAC_CMAC_AES128, .macId = CRYPT_MAC_CMAC, .symId = CRYPT_SYM_AES128}, {.id = CRYPT_MAC_CMAC_AES192, .macId = CRYPT_MAC_CMAC, .symId = CRYPT_SYM_AES192}, {.id = CRYPT_MAC_CMAC_AES256, .macId = CRYPT_MAC_CMAC, .symId = CRYPT_SYM_AES256}, #endif #ifdef HITLS_CRYPTO_CMAC_SM4 {.id = CRYPT_MAC_CMAC_SM4, .macId = CRYPT_MAC_CMAC, .symId = CRYPT_SYM_SM4}, #endif #ifdef HITLS_CRYPTO_CBC_MAC {.id = CRYPT_MAC_CBC_MAC_SM4, .macId = CRYPT_MAC_CBC_MAC, .symId = CRYPT_SYM_SM4}, #endif #ifdef HITLS_CRYPTO_GMAC {.id = CRYPT_MAC_GMAC_AES128, .macId = CRYPT_MAC_GMAC, .symId = CRYPT_SYM_AES128}, {.id = CRYPT_MAC_GMAC_AES192, .macId = CRYPT_MAC_GMAC, .symId = CRYPT_SYM_AES192}, {.id = CRYPT_MAC_GMAC_AES256, .macId = CRYPT_MAC_GMAC, .symId = CRYPT_SYM_AES256}, #endif #ifdef HITLS_CRYPTO_SIPHASH {.id = CRYPT_MAC_SIPHASH64, .macId = CRYPT_MAC_SIPHASH}, {.id = CRYPT_MAC_SIPHASH128, .macId = CRYPT_MAC_SIPHASH} #endif }; static const EAL_MacAlgMap *EAL_FindMacAlgMap(CRYPT_MAC_AlgId id) { uint32_t num = sizeof(CID_MAC_ALG_MAP) / sizeof(CID_MAC_ALG_MAP[0]); const EAL_MacAlgMap *macAlgMap = NULL; for (uint32_t i = 0; i < num; i++) { if (CID_MAC_ALG_MAP[i].id == id) { macAlgMap = &CID_MAC_ALG_MAP[i]; break; } } return macAlgMap; } #if defined(HITLS_CRYPTO_CMAC) || defined(HITLS_CRYPTO_CBC_MAC) || defined(HITLS_CRYPTO_GMAC) static int32_t ConvertSymId2CipherId(CRYPT_SYM_AlgId algId) { switch (algId) { case CRYPT_SYM_AES128: return CRYPT_CIPHER_AES128_ECB; case CRYPT_SYM_AES192: return CRYPT_CIPHER_AES192_ECB; case CRYPT_SYM_AES256: return CRYPT_CIPHER_AES256_ECB; case CRYPT_SYM_SM4: return CRYPT_CIPHER_SM4_XTS; default: return CRYPT_CIPHER_MAX; } } #endif const EAL_MacMethod *EAL_MacFindDefaultMethod(CRYPT_MAC_AlgId id) { const EAL_MacAlgMap *macAlgMap = EAL_FindMacAlgMap(id); if (macAlgMap == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return NULL; } return g_macMethods[macAlgMap->macId]; } EAL_MacMethod *EAL_MacFindMethod(CRYPT_MAC_AlgId id, EAL_MacMethod *method) { EAL_MacMethod *retMethod = method; const EAL_MacMethod *findMethod = EAL_MacFindDefaultMethod(id); if (findMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return NULL; } if (retMethod == NULL) { retMethod = BSL_SAL_Malloc(sizeof(EAL_MacMethod)); if (retMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(retMethod, sizeof(EAL_MacMethod), 0, sizeof(EAL_MacMethod)); } *retMethod = *findMethod; return retMethod; } #ifdef HITLS_CRYPTO_PROVIDER static int32_t SetMacMethod(const CRYPT_EAL_Func *funcs, EAL_MacMethod *method) { int32_t index = 0; while (funcs[index].id != 0) { switch (funcs[index].id) { case CRYPT_EAL_IMPLMAC_NEWCTX: method->newCtx = funcs[index].func; break; case CRYPT_EAL_IMPLMAC_INIT: method->init = funcs[index].func; break; case CRYPT_EAL_IMPLMAC_UPDATE: method->update = funcs[index].func; break; case CRYPT_EAL_IMPLMAC_FINAL: method->final = funcs[index].func; break; case CRYPT_EAL_IMPLMAC_REINITCTX: method->reinit = funcs[index].func; break; case CRYPT_EAL_IMPLMAC_DEINITCTX: method->deinit = funcs[index].func; break; case CRYPT_EAL_IMPLMAC_CTRL: method->ctrl = funcs[index].func; break; case CRYPT_EAL_IMPLMAC_FREECTX: method->freeCtx = funcs[index].func; break; case CRYPT_EAL_IMPLMAC_SETPARAM: method->setParam = funcs[index].func; break; default: BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } return CRYPT_SUCCESS; } static EAL_MacMethod *EAL_ProviderMacFindMethod(CRYPT_MAC_AlgId id, void *libCtx, const char *attrName, EAL_MacMethod *method, void **provCtx) { EAL_MacMethod *retMethod = method; const CRYPT_EAL_Func *funcs = NULL; int32_t ret = CRYPT_EAL_ProviderGetFuncs(libCtx, CRYPT_EAL_OPERAID_MAC, id, attrName, &funcs, provCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return NULL; } if (method == NULL) { retMethod = (EAL_MacMethod *)BSL_SAL_Malloc(sizeof(EAL_MacMethod)); if (retMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(retMethod, sizeof(EAL_MacMethod), 0, sizeof(EAL_MacMethod)); } ret = SetMacMethod(funcs, retMethod); if (ret != CRYPT_SUCCESS) { if (retMethod != method) { BSL_SAL_Free(retMethod); } return NULL; } return retMethod; } #endif // HITLS_CRYPTO_PROVIDER EAL_MacMethod *EAL_MacFindMethodEx(CRYPT_MAC_AlgId id, void *libCtx, const char *attrName, EAL_MacMethod *method, void **provCtx) { #ifdef HITLS_CRYPTO_PROVIDER return EAL_ProviderMacFindMethod(id, libCtx, attrName, method, provCtx); #else (void)libCtx; (void)attrName; (void)provCtx; return EAL_MacFindMethod(id, method); #endif } int32_t EAL_MacFindDepMethod(CRYPT_MAC_AlgId macId, void *libCtx, const char *attrName, EAL_MacDepMethod *depMeth, void **provCtx, bool isProvider) { (void)libCtx; (void)attrName; (void)provCtx; (void)isProvider; const EAL_MacAlgMap *macAlgMap = EAL_FindMacAlgMap(macId); if (macAlgMap == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } #ifdef HITLS_CRYPTO_HMAC EAL_MdMethod *mdMethod = NULL; #endif switch (macAlgMap->macId) { #ifdef HITLS_CRYPTO_HMAC case CRYPT_MAC_HMAC: depMeth->id.mdId = macAlgMap->mdId; mdMethod = isProvider ? EAL_MdFindMethodEx(macAlgMap->mdId, libCtx, attrName, depMeth->method.md, provCtx) : EAL_MdFindMethod(macAlgMap->mdId, depMeth->method.md); if (mdMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } if (depMeth->method.md == NULL) { // if the md pointer is NULL, the md method will be allocated. The caller should free the md method. depMeth->method.md = mdMethod; } // if the md pointer is not NULL, the md method has been overwritten before. return CRYPT_SUCCESS; #endif #if defined(HITLS_CRYPTO_CMAC) || defined(HITLS_CRYPTO_CBC_MAC) || defined(HITLS_CRYPTO_GMAC) case CRYPT_MAC_CMAC: case CRYPT_MAC_CBC_MAC: case CRYPT_MAC_GMAC: depMeth->id.symId = macAlgMap->symId; // sym method is get from global, so no need to free it. depMeth->method.sym = EAL_GetSymMethod(ConvertSymId2CipherId(macAlgMap->symId)); break; #endif #ifdef HITLS_CRYPTO_SIPHASH case CRYPT_MAC_SIPHASH: // sip method is get from global, so no need to free it. depMeth->method.sip = (macId == CRYPT_MAC_SIPHASH64) ? &g_siphash64Meth : &g_siphash128Meth; break; #endif default: BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } if (depMeth->method.sym == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } return CRYPT_SUCCESS; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_mac_method.c
C
unknown
12,428
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MD) #include <stdio.h> #include <stdlib.h> #include "securec.h" #include "bsl_err_internal.h" #include "bsl_sal.h" #include "crypt_local_types.h" #include "crypt_eal_md.h" #include "crypt_algid.h" #include "crypt_errno.h" #include "eal_md_local.h" #include "eal_common.h" #include "crypt_ealinit.h" #ifdef HITLS_CRYPTO_PROVIDER #include "crypt_eal_implprovider.h" #include "crypt_provider.h" #endif static CRYPT_EAL_MdCTX *MdNewCtxInner(CRYPT_MD_AlgId id, CRYPT_EAL_LibCtx *libCtx, const char *attrName, bool isProvider) { EAL_MdMethod *method = NULL; CRYPT_EAL_MdCTX *ctx = BSL_SAL_Malloc(sizeof(CRYPT_EAL_MdCTX)); if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_MEM_ALLOC_FAIL); return NULL; } void *provCtx = NULL; // The ctx->method will be overwritten if the method is found. (void)memset_s(&ctx->method, sizeof(ctx->method), 0, sizeof(ctx->method)); if (!isProvider) { method = EAL_MdFindMethod(id, &ctx->method); } else { method = EAL_MdFindMethodEx(id, libCtx, attrName, &ctx->method, &provCtx); } if (method == NULL) { BSL_SAL_Free(ctx); return NULL; } if (ctx->method.newCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_NULL_INPUT); BSL_SAL_Free(ctx); return NULL; } void *data = ctx->method.newCtx(provCtx, id); if (data == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_MEM_ALLOC_FAIL); BSL_SAL_Free(ctx); return NULL; } ctx->id = id; ctx->state = CRYPT_MD_STATE_NEW; ctx->data = data; return ctx; } CRYPT_EAL_MdCTX *CRYPT_EAL_ProviderMdNewCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName) { return MdNewCtxInner(algId, libCtx, attrName, true); } CRYPT_EAL_MdCTX *CRYPT_EAL_MdNewCtx(CRYPT_MD_AlgId id) { #ifdef HITLS_CRYPTO_ASM_CHECK if (CRYPT_ASMCAP_Md(id) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return NULL; } #endif return MdNewCtxInner(id, NULL, NULL, false); } bool CRYPT_EAL_MdIsValidAlgId(CRYPT_MD_AlgId id) { return EAL_MdFindDefaultMethod(id) != NULL; } int32_t CRYPT_EAL_MdGetId(CRYPT_EAL_MdCTX *ctx) { if (ctx == NULL) { return CRYPT_MD_MAX; } return ctx->id; } int32_t CRYPT_EAL_MdCopyCtx(CRYPT_EAL_MdCTX *to, const CRYPT_EAL_MdCTX *from) { if (to == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (from == NULL || from->method.dupCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (to->data != NULL) { if (to->method.freeCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } to->method.freeCtx(to->data); to->data = NULL; } void *data = from->method.dupCtx(from->data); if (data == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, from->id, CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } *to = *from; to->data = data; return CRYPT_SUCCESS; } CRYPT_EAL_MdCTX *CRYPT_EAL_MdDupCtx(const CRYPT_EAL_MdCTX *ctx) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT); return NULL; } if (ctx->method.dupCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_NULL_INPUT); return NULL; } CRYPT_EAL_MdCTX *newCtx = BSL_SAL_Malloc(sizeof(CRYPT_EAL_MdCTX)); if (newCtx == NULL) { BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL); return NULL; } *newCtx = *ctx; newCtx->data = ctx->method.dupCtx(ctx->data); if (newCtx->data == NULL) { BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL); BSL_SAL_Free(newCtx); return NULL; } return newCtx; } void CRYPT_EAL_MdFreeCtx(CRYPT_EAL_MdCTX *ctx) { if (ctx == NULL) { return; } if (ctx->method.freeCtx != NULL) { ctx->method.freeCtx(ctx->data); EAL_EventReport(CRYPT_EVENT_ZERO, CRYPT_ALGO_MD, ctx->id, CRYPT_SUCCESS); } else { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); } BSL_SAL_FREE(ctx); return; } int32_t CRYPT_EAL_MdInit(CRYPT_EAL_MdCTX *ctx) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method.init == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = ctx->method.init(ctx->data, NULL); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, ret); return ret; } ctx->state = CRYPT_MD_STATE_INIT; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_MdUpdate(CRYPT_EAL_MdCTX *ctx, const uint8_t *data, uint32_t len) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method.update == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } if ((ctx->state == CRYPT_MD_STATE_FINAL) || (ctx->state == CRYPT_MD_STATE_NEW) || (ctx->state == CRYPT_MD_STATE_SQUEEZE)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } int32_t ret = ctx->method.update(ctx->data, data, len); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, ret); return ret; } ctx->state = CRYPT_MD_STATE_UPDATE; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_MdFinal(CRYPT_EAL_MdCTX *ctx, uint8_t *out, uint32_t *len) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method.final == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } if ((ctx->state == CRYPT_MD_STATE_NEW) || (ctx->state == CRYPT_MD_STATE_FINAL) || (ctx->state == CRYPT_MD_STATE_SQUEEZE)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } // The validity of the buffer length that carries the output result (len > ctx->method->mdSize) // is determined by the algorithm bottom layer and is not verified here. int32_t ret = ctx->method.final(ctx->data, out, len); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, ret); return ret; } ctx->state = CRYPT_MD_STATE_FINAL; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_MdSqueeze(CRYPT_EAL_MdCTX *ctx, uint8_t *out, uint32_t len) { if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->method.squeeze == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } if ((ctx->state == CRYPT_MD_STATE_NEW) || (ctx->state == CRYPT_MD_STATE_FINAL)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ERR_STATE); return CRYPT_EAL_ERR_STATE; } int32_t ret = ctx->method.squeeze(ctx->data, out, len); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, ret); return ret; } ctx->state = CRYPT_MD_STATE_SQUEEZE; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_MdDeinit(CRYPT_EAL_MdCTX *ctx) { if (ctx == NULL || ctx->method.deinit == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = ctx->method.deinit(ctx->data); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, ret); return ret; } ctx->state = CRYPT_MD_STATE_NEW; return CRYPT_SUCCESS; } typedef struct { CRYPT_MD_AlgId id; uint32_t digestSize; } CRYPT_MD_DigestSizeMap; static const CRYPT_MD_DigestSizeMap g_mdDigestSizeMap[] = { {CRYPT_MD_SHA1, 20}, {CRYPT_MD_SHA224, 28}, {CRYPT_MD_SHA256, 32}, {CRYPT_MD_SHA384, 48}, {CRYPT_MD_SHA512, 64}, {CRYPT_MD_SHA3_224, 28}, {CRYPT_MD_SHA3_256, 32}, {CRYPT_MD_SHA3_384, 48}, {CRYPT_MD_SHA3_512, 64}, {CRYPT_MD_SHAKE128, 0}, {CRYPT_MD_SHAKE256, 0}, {CRYPT_MD_SM3, 32}, {CRYPT_MD_MD5, 16}, }; uint32_t CRYPT_EAL_MdGetDigestSize(CRYPT_MD_AlgId id) { for (uint32_t i = 0; i < sizeof(g_mdDigestSizeMap) / sizeof(g_mdDigestSizeMap[0]); i++) { if (g_mdDigestSizeMap[i].id == id) { return g_mdDigestSizeMap[i].digestSize; } } EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_EAL_ERR_ALGID); return 0; } int32_t CRYPT_EAL_Md(CRYPT_MD_AlgId id, const uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen) { return EAL_Md(id, NULL, NULL, in, inLen, out, outLen); } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_md.c
C
unknown
10,152
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef EAL_MD_LOCAL_H #define EAL_MD_LOCAL_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MD) #include <stdint.h> #include "crypt_algid.h" #include "crypt_local_types.h" #ifdef __cplusplus extern "C" { #endif // __cplusplus typedef enum { CRYPT_MD_STATE_NEW = 0, CRYPT_MD_STATE_INIT, CRYPT_MD_STATE_UPDATE, CRYPT_MD_STATE_FINAL, CRYPT_MD_STATE_SQUEEZE } CRYPT_MD_WORKSTATE; struct EAL_MdCtx { EAL_MdMethod method; /* algorithm operation entity */ void *data; /* Algorithm ctx, mainly context */ uint32_t state; CRYPT_MD_AlgId id; }; /** * @ingroup eal * @brief Find the default MD method by the algorithm ID. * * @param id The algorithm ID. * * @return The MD method. */ const EAL_MdMethod *EAL_MdFindDefaultMethod(CRYPT_MD_AlgId id); /** * @ingroup eal * @brief Find Md algorithm implementation method by algorithm ID * * This function retrieves the default implementation method for specified MD algorithm ID. * If the input method pointer is NULL, will allocate new memory for method structure. Otherwise, * will initialize the provided method structure. * * @param id [IN] MD algorithm identifier (e.g. CRYPT_MD_SHA256, CRYPT_MD_SHA384) * @param method [IN/OUT] Pointer to method structure. * If NULL, function will allocate new memory. Caller must free returned pointer when no longer needed. * If not NULL, the method should be cleared before calling this function. * * @return Pointer to MD method structure on success. NULL on failure (invalid ID or alloc fail). * Note: When input method is NULL, returned pointer MUST be freed by caller. * When input method is valid, returns the same pointer with initialized contents. */ EAL_MdMethod *EAL_MdFindMethod(CRYPT_MD_AlgId id, EAL_MdMethod *method); /** * @ingroup eal * @brief Find Md algorithm implementation method by algorithm ID with provider context * * This function retrieves the default implementation method for specified MD algorithm ID. * If the input method pointer is NULL, will allocate new memory for method structure. Otherwise, * will initialize the provided method structure. * * @param id [IN] MD algorithm identifier (e.g. CRYPT_MD_SHA256, CRYPT_MD_SHA384) * @param libCtx [IN] The library context. * @param attrName [IN] The attribute name. * @param method [IN/OUT] Pointer to method structure. * If NULL, function will allocate new memory. Caller must free returned pointer when no longer needed. * If not NULL, the method should be cleared before calling this function. * @param provCtx [OUT] The provider context. * * @return Pointer to MD method structure on success. NULL on failure (invalid ID or alloc fail). * Note: When input method is NULL, returned pointer MUST be freed by caller. * When input method is valid, returns the same pointer with initialized contents. */ EAL_MdMethod *EAL_MdFindMethodEx(CRYPT_MD_AlgId id, void *libCtx, const char *attrName, EAL_MdMethod *method, void **provCtx); /** * @ingroup eal * @brief Calculate the hash value * * @param id [IN] Algorithm ID * @param libCtx [IN] Library context * @param attr [IN] Attribute * @param in [IN] Input data * @param inLen [IN] Input data length * @param out [OUT] Output data * @param outLen [OUT] Output data length * * @return #CRYPT_SUCCESS Success. * @return #CRYPT_EAL_ERR_ALGID Algorithm ID is invalid. */ int32_t EAL_Md(CRYPT_MD_AlgId id, void *libCtx, const char *attr, const uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen); #ifdef __cplusplus } #endif // __cplusplus #endif // HITLS_CRYPTO_MD #endif // EAL_MD_LOCAL_H
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_md_local.h
C
unknown
4,333
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MD) #include "securec.h" #include "crypt_local_types.h" #include "crypt_algid.h" #ifdef HITLS_CRYPTO_SHA2 #include "crypt_sha2.h" #endif #ifdef HITLS_CRYPTO_SHA1 #include "crypt_sha1.h" #endif #ifdef HITLS_CRYPTO_SM3 #include "crypt_sm3.h" #endif #ifdef HITLS_CRYPTO_SHA3 #include "crypt_sha3.h" #endif #ifdef HITLS_CRYPTO_MD5 #include "crypt_md5.h" #endif #include "bsl_err_internal.h" #include "eal_common.h" #include "bsl_sal.h" #include "crypt_errno.h" #ifdef HITLS_CRYPTO_PROVIDER #include "crypt_eal_provider.h" #include "crypt_eal_implprovider.h" #endif typedef struct { uint32_t id; EAL_MdMethod *mdMeth; } EAL_CidToMdMeth; #define CRYPT_MD_IMPL_METHOD_DECLARE(name, id) \ EAL_MdMethod g_mdMethod_##name = { \ id, \ CRYPT_##name##_BLOCKSIZE, CRYPT_##name##_DIGESTSIZE, \ (MdNewCtx)CRYPT_##name##_NewCtxEx, (MdInit)CRYPT_##name##_Init, \ (MdUpdate)CRYPT_##name##_Update, (MdFinal)CRYPT_##name##_Final, \ (MdDeinit)CRYPT_##name##_Deinit, (MdCopyCtx)CRYPT_##name##_CopyCtx, \ (MdDupCtx)CRYPT_##name##_DupCtx, (MdFreeCtx)CRYPT_##name##_FreeCtx, \ (MdGetParam)CRYPT_##name##_GetParam, (MdSqueeze)CRYPT_##name##_Squeeze \ } #ifdef HITLS_CRYPTO_MD5 CRYPT_MD_IMPL_METHOD_DECLARE(MD5, CRYPT_MD_MD5); #endif #ifdef HITLS_CRYPTO_SHA1 CRYPT_MD_IMPL_METHOD_DECLARE(SHA1, CRYPT_MD_SHA1); #endif #ifdef HITLS_CRYPTO_SHA224 CRYPT_MD_IMPL_METHOD_DECLARE(SHA2_224, CRYPT_MD_SHA224); #endif #ifdef HITLS_CRYPTO_SHA256 CRYPT_MD_IMPL_METHOD_DECLARE(SHA2_256, CRYPT_MD_SHA256); #endif #ifdef HITLS_CRYPTO_SHA384 CRYPT_MD_IMPL_METHOD_DECLARE(SHA2_384, CRYPT_MD_SHA384); #endif #ifdef HITLS_CRYPTO_SHA512 CRYPT_MD_IMPL_METHOD_DECLARE(SHA2_512, CRYPT_MD_SHA512); #endif #ifdef HITLS_CRYPTO_SHA3 CRYPT_MD_IMPL_METHOD_DECLARE(SHA3_224, CRYPT_MD_SHA3_224); CRYPT_MD_IMPL_METHOD_DECLARE(SHA3_256, CRYPT_MD_SHA3_256); CRYPT_MD_IMPL_METHOD_DECLARE(SHA3_384, CRYPT_MD_SHA3_384); CRYPT_MD_IMPL_METHOD_DECLARE(SHA3_512, CRYPT_MD_SHA3_512); CRYPT_MD_IMPL_METHOD_DECLARE(SHAKE128, CRYPT_MD_SHAKE128); CRYPT_MD_IMPL_METHOD_DECLARE(SHAKE256, CRYPT_MD_SHAKE256); #endif #ifdef HITLS_CRYPTO_SM3 CRYPT_MD_IMPL_METHOD_DECLARE(SM3, CRYPT_MD_SM3); #endif static const EAL_CidToMdMeth ID_TO_MD_METH_TABLE[] = { #ifdef HITLS_CRYPTO_MD5 {CRYPT_MD_MD5, &g_mdMethod_MD5}, #endif #ifdef HITLS_CRYPTO_SHA1 {CRYPT_MD_SHA1, &g_mdMethod_SHA1}, #endif #ifdef HITLS_CRYPTO_SHA224 {CRYPT_MD_SHA224, &g_mdMethod_SHA2_224}, #endif #ifdef HITLS_CRYPTO_SHA256 {CRYPT_MD_SHA256, &g_mdMethod_SHA2_256}, #endif #ifdef HITLS_CRYPTO_SHA384 {CRYPT_MD_SHA384, &g_mdMethod_SHA2_384}, #endif #ifdef HITLS_CRYPTO_SHA512 {CRYPT_MD_SHA512, &g_mdMethod_SHA2_512}, #endif #ifdef HITLS_CRYPTO_SHA3 {CRYPT_MD_SHA3_224, &g_mdMethod_SHA3_224}, {CRYPT_MD_SHA3_256, &g_mdMethod_SHA3_256}, {CRYPT_MD_SHA3_384, &g_mdMethod_SHA3_384}, {CRYPT_MD_SHA3_512, &g_mdMethod_SHA3_512}, {CRYPT_MD_SHAKE128, &g_mdMethod_SHAKE128}, {CRYPT_MD_SHAKE256, &g_mdMethod_SHAKE256}, #endif #ifdef HITLS_CRYPTO_SM3 {CRYPT_MD_SM3, &g_mdMethod_SM3}, #endif }; const EAL_MdMethod *EAL_MdFindDefaultMethod(CRYPT_MD_AlgId id) { uint32_t num = sizeof(ID_TO_MD_METH_TABLE) / sizeof(ID_TO_MD_METH_TABLE[0]); for (uint32_t i = 0; i < num; i++) { if (ID_TO_MD_METH_TABLE[i].id == id) { return ID_TO_MD_METH_TABLE[i].mdMeth; } } return NULL; } EAL_MdMethod *EAL_MdFindMethod(CRYPT_MD_AlgId id, EAL_MdMethod *method) { EAL_MdMethod *retMethod = method; const EAL_MdMethod *findMethod = EAL_MdFindDefaultMethod(id); if (findMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return NULL; } if (retMethod == NULL) { retMethod = BSL_SAL_Malloc(sizeof(EAL_MdMethod)); if (retMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(retMethod, sizeof(EAL_MdMethod), 0, sizeof(EAL_MdMethod)); } *retMethod = *findMethod; return retMethod; } #ifdef HITLS_CRYPTO_PROVIDER static int32_t SetMdMethod(const CRYPT_EAL_Func *funcs, EAL_MdMethod *method) { int32_t index = 0; while (funcs[index].id != 0) { switch (funcs[index].id) { case CRYPT_EAL_IMPLMD_NEWCTX: method->newCtx = funcs[index].func; break; case CRYPT_EAL_IMPLMD_INITCTX: method->init = funcs[index].func; break; case CRYPT_EAL_IMPLMD_UPDATE: method->update = funcs[index].func; break; case CRYPT_EAL_IMPLMD_FINAL: method->final = funcs[index].func; break; case CRYPT_EAL_IMPLMD_DEINITCTX: method->deinit = funcs[index].func; break; case CRYPT_EAL_IMPLMD_DUPCTX: method->dupCtx = funcs[index].func; break; case CRYPT_EAL_IMPLMD_GETPARAM: method->getParam = funcs[index].func; break; case CRYPT_EAL_IMPLMD_FREECTX: method->freeCtx = funcs[index].func; break; case CRYPT_EAL_IMPLMD_SQUEEZE: method->squeeze = funcs[index].func; break; case CRYPT_EAL_IMPLMD_COPYCTX: method->copyCtx = funcs[index].func; break; default: BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } return CRYPT_SUCCESS; } static EAL_MdMethod *EAL_ProviderMdFindMethod(CRYPT_MD_AlgId id, void *libCtx, const char *attrName, EAL_MdMethod *method, void **provCtx) { EAL_MdMethod *retMethod = method; const CRYPT_EAL_Func *funcs = NULL; int32_t ret = CRYPT_EAL_ProviderGetFuncs(libCtx, CRYPT_EAL_OPERAID_HASH, id, attrName, &funcs, provCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return NULL; } if (method == NULL) { retMethod = (EAL_MdMethod *)BSL_SAL_Malloc(sizeof(EAL_MdMethod)); if (retMethod == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(retMethod, sizeof(EAL_MdMethod), 0, sizeof(EAL_MdMethod)); } ret = SetMdMethod(funcs, retMethod); if (ret != CRYPT_SUCCESS) { goto ERR; } if (retMethod->getParam == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_IMPL_NULL); goto ERR; } BSL_Param params[] = {{0}, {0}, BSL_PARAM_END}; ret = BSL_PARAM_InitValue(&params[0], CRYPT_PARAM_MD_DIGEST_SIZE, BSL_PARAM_TYPE_UINT16, &retMethod->mdSize, sizeof(retMethod->mdSize)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = BSL_PARAM_InitValue(&params[1], CRYPT_PARAM_MD_BLOCK_SIZE, BSL_PARAM_TYPE_UINT16, &retMethod->blockSize, sizeof(retMethod->blockSize)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = retMethod->getParam(NULL, &params[0]); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } retMethod->id = id; return retMethod; ERR: if (retMethod != method) { BSL_SAL_Free(retMethod); } return NULL; } #endif // HITLS_CRYPTO_PROVIDER EAL_MdMethod *EAL_MdFindMethodEx(CRYPT_MD_AlgId id, void *libCtx, const char *attrName, EAL_MdMethod *method, void **provCtx) { #ifdef HITLS_CRYPTO_PROVIDER return EAL_ProviderMdFindMethod(id, libCtx, attrName, method, provCtx); #else (void)libCtx; (void)attrName; (void)provCtx; return EAL_MdFindMethod(id, method); #endif } int32_t EAL_Md(CRYPT_MD_AlgId id, void *libCtx, const char *attr, const uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen) { int32_t ret; if (out == NULL || outLen == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (in == NULL && inLen != 0) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } EAL_MdMethod method = {0}; void *provCtx = NULL; if (EAL_MdFindMethodEx(id, libCtx, attr, &method, &provCtx) == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } if (method.newCtx == NULL || method.init == NULL || method.update == NULL || method.final == NULL || method.freeCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_EAL_MD_METH_NULL); return CRYPT_EAL_MD_METH_NULL; } void *data = method.newCtx(provCtx, id); if (data == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ret = method.init(data, NULL); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, ret); goto EXIT; } if (inLen != 0) { ret = method.update(data, in, inLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, ret); goto EXIT; } } ret = method.final(data, out, outLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, ret); goto EXIT; } if (method.mdSize != 0) { *outLen = method.mdSize; } EXIT: method.freeCtx(data); return ret; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_md_method.c
C
unknown
10,583
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY) #include <securec.h> #include "bsl_sal.h" #include "crypt_errno.h" #include "bsl_err_internal.h" #include "eal_pkey_local.h" #include "crypt_eal_pkey.h" #include "eal_common.h" int32_t CRYPT_EAL_PkeyComputeShareKey(const CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyCtx *pubKey, uint8_t *share, uint32_t *shareLen) { if (pkey == NULL || pubKey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->id != pubKey->id) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } if (pkey->method == NULL || pkey->method->computeShareKey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->computeShareKey(pkey->key, pubKey->key, share, shareLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, ret); } return ret; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_pkey_computesharekey.c
C
unknown
1,751
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY) #include <stdbool.h> #include <securec.h> #include "bsl_sal.h" #include "crypt_eal_pkey.h" #include "crypt_errno.h" #include "eal_pkey_local.h" #include "crypt_algid.h" #include "bsl_err_internal.h" #include "eal_common.h" int32_t CRYPT_EAL_PkeyEncrypt(const CRYPT_EAL_PkeyCtx *pkey, const uint8_t *data, uint32_t dataLen, uint8_t *out, uint32_t *outLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->encrypt == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } return pkey->method->encrypt(pkey->key, data, dataLen, out, outLen); } int32_t CRYPT_EAL_PkeyDecrypt(const CRYPT_EAL_PkeyCtx *pkey, const uint8_t *data, uint32_t dataLen, uint8_t *out, uint32_t *outLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->decrypt == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } return pkey->method->decrypt(pkey->key, data, dataLen, out, outLen); } int32_t CRYPT_EAL_PkeyPairCheck(CRYPT_EAL_PkeyCtx *pubKey, CRYPT_EAL_PkeyCtx *prvKey) { if ((pubKey == NULL) || (prvKey == NULL)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pubKey->method == NULL || prvKey->method == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pubKey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_NULL_INPUT; } if (pubKey->method->check == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pubKey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } return pubKey->method->check(CRYPT_PKEY_CHECK_KEYPAIR, pubKey->key, prvKey->key); } int32_t CRYPT_EAL_PkeyPrvCheck(CRYPT_EAL_PkeyCtx *prvKey) { if (prvKey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (prvKey->method == NULL || prvKey->method->check == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, prvKey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_NULL_INPUT; } return prvKey->method->check(CRYPT_PKEY_CHECK_PRVKEY, prvKey->key, NULL); } int32_t CRYPT_EAL_PkeyHEAdd(const CRYPT_EAL_PkeyCtx *pkey, const BSL_Param *input, uint8_t *out, uint32_t *outLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->headd == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } return pkey->method->headd(pkey->key, input, out, outLen); } int32_t CRYPT_EAL_PkeyHEMul(const CRYPT_EAL_PkeyCtx *pkey, const BSL_Param *input, uint8_t *out, uint32_t *outLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->hemul == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } return pkey->method->hemul(pkey->key, input, out, outLen); } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_pkey_crypt.c
C
unknown
4,356
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY) #include <stdlib.h> #include <stdbool.h> #include "securec.h" #include "eal_pkey_local.h" #include "crypt_eal_pkey.h" #include "crypt_errno.h" #include "crypt_algid.h" #include "crypt_local_types.h" #include "crypt_types.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_utils.h" #include "eal_md_local.h" #include "eal_common.h" #include "crypt_eal_implprovider.h" #include "crypt_ealinit.h" #include "bsl_err_internal.h" #include "crypt_provider.h" #include "bsl_params.h" #include "crypt_params_key.h" #include "eal_pkey.h" static void EalPkeyCopyMethod(const EAL_PkeyMethod *method, EAL_PkeyUnitaryMethod *dest) { dest->newCtx = method->newCtx; dest->dupCtx = method->dupCtx; dest->freeCtx = method->freeCtx; dest->setPara = method->setPara; dest->getPara = method->getPara; dest->gen = method->gen; dest->ctrl = method->ctrl; dest->setPub = method->setPub; dest->setPrv = method->setPrv; dest->getPub = method->getPub; dest->getPrv = method->getPrv; dest->sign = method->sign; dest->signData = method->signData; dest->verify = method->verify; dest->verifyData = method->verifyData; dest->recover = method->recover; dest->computeShareKey = method->computeShareKey; dest->encrypt = method->encrypt; dest->decrypt = method->decrypt; dest->headd = method->headd; dest->hemul = method->hemul; dest->check = method->check; dest->cmp = method->cmp; dest->encaps = method->encaps; dest->decaps = method->decaps; dest->blind = method->blind; dest->unBlind = method->unBlind; } CRYPT_EAL_PkeyCtx *PkeyNewDefaultCtx(CRYPT_PKEY_AlgId id) { /* Obtain the method based on the algorithm ID. */ const EAL_PkeyMethod *method = CRYPT_EAL_PkeyFindMethod(id); if (method == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, id, CRYPT_EAL_ERR_ALGID); return NULL; } EAL_PkeyUnitaryMethod *temp = BSL_SAL_Calloc(1, sizeof(EAL_PkeyUnitaryMethod)); if (temp == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, id, CRYPT_MEM_ALLOC_FAIL); return NULL; } EalPkeyCopyMethod(method, temp); /* Resource application and initialization */ CRYPT_EAL_PkeyCtx *pkey = BSL_SAL_Calloc(1, sizeof(CRYPT_EAL_PkeyCtx)); if (pkey == NULL) { BSL_SAL_FREE(temp); EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, id, CRYPT_MEM_ALLOC_FAIL); return NULL; } pkey->key = method->newCtx(); if (pkey->key == NULL) { BSL_SAL_FREE(temp); EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, id, CRYPT_MEM_ALLOC_FAIL); goto ERR; } pkey->method = temp; pkey->id = id; BSL_SAL_ReferencesInit(&(pkey->references)); return pkey; ERR: CRYPT_EAL_PkeyFreeCtx(pkey); return NULL; } CRYPT_EAL_PkeyCtx *CRYPT_EAL_PkeyNewCtx(CRYPT_PKEY_AlgId id) { #ifdef HITLS_CRYPTO_ASM_CHECK if (CRYPT_ASMCAP_Pkey(id) != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, id, CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return NULL; } #endif return PkeyNewDefaultCtx(id); } static int32_t PkeyCopyCtx(CRYPT_EAL_PkeyCtx *to, const CRYPT_EAL_PkeyCtx *from) { if (from->method == NULL || from->method->dupCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, from->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } EAL_PkeyUnitaryMethod *temp = to->method; (void)memcpy_s(to, sizeof(CRYPT_EAL_PkeyCtx), from, sizeof(CRYPT_EAL_PkeyCtx)); to->key = from->method->dupCtx(from->key); if (to->key == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, from->id, CRYPT_EAL_PKEY_DUP_ERROR); return CRYPT_EAL_PKEY_DUP_ERROR; } if (temp == NULL) { temp = BSL_SAL_Calloc(1, sizeof(EAL_PkeyUnitaryMethod)); if (temp == NULL) { from->method->freeCtx(to->key); to->key = NULL; EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, from->id, CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } } to->method = temp; *(EAL_PkeyUnitaryMethod *)(uintptr_t)to->method = *from->method; BSL_SAL_ReferencesInit(&(to->references)); return CRYPT_SUCCESS; } int32_t CRYPT_EAL_PkeyCopyCtx(CRYPT_EAL_PkeyCtx *to, const CRYPT_EAL_PkeyCtx *from) { if (to == NULL || from == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (to->key != NULL) { if (to->method->freeCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } to->method->freeCtx(to->key); to->key = NULL; } BSL_SAL_ReferencesFree(&(to->references)); return PkeyCopyCtx(to, from); } CRYPT_EAL_PkeyCtx *CRYPT_EAL_PkeyDupCtx(const CRYPT_EAL_PkeyCtx *pkey) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return NULL; } CRYPT_EAL_PkeyCtx *newPkey = BSL_SAL_Calloc(1, sizeof(CRYPT_EAL_PkeyCtx)); if (newPkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_MEM_ALLOC_FAIL); return NULL; } if (PkeyCopyCtx(newPkey, pkey) != CRYPT_SUCCESS) { BSL_SAL_FREE(newPkey); return NULL; } return newPkey; } void CRYPT_EAL_PkeyFreeCtx(CRYPT_EAL_PkeyCtx *pkey) { if (pkey == NULL) { return; } if (pkey->method == NULL || pkey->method->freeCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); BSL_SAL_ReferencesFree(&(pkey->references)); BSL_SAL_FREE(pkey->method); BSL_SAL_FREE(pkey); return; } int ref = 0; BSL_SAL_AtomicDownReferences(&(pkey->references), &ref); if (ref > 0) { return; } BSL_SAL_ReferencesFree(&(pkey->references)); pkey->method->freeCtx(pkey->key); BSL_SAL_FREE(pkey->method); BSL_SAL_FREE(pkey); return; } static int32_t ParaIsVaild(const CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyPara *para) { bool isInputValid = (pkey == NULL) || (para == NULL); if (isInputValid) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->id != para->id) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } return CRYPT_SUCCESS; } static int32_t SetDsaParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_DsaPara *dsaPara) { BSL_Param param[4] = { {CRYPT_PARAM_DSA_P, BSL_PARAM_TYPE_OCTETS, dsaPara->p, dsaPara->pLen, 0}, {CRYPT_PARAM_DSA_Q, BSL_PARAM_TYPE_OCTETS, dsaPara->q, dsaPara->qLen, 0}, {CRYPT_PARAM_DSA_G, BSL_PARAM_TYPE_OCTETS, dsaPara->g, dsaPara->gLen, 0}, BSL_PARAM_END }; return pkey->method->setPara(pkey->key, param); } static int32_t SetRsaParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_RsaPara *rsaPara) { uint32_t bits = rsaPara->bits; BSL_Param param[] = { {CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, rsaPara->e, rsaPara->eLen, 0}, {CRYPT_PARAM_RSA_BITS, BSL_PARAM_TYPE_UINT32, &bits, sizeof(bits), 0}, BSL_PARAM_END }; return pkey->method->setPara(pkey->key, param); } static int32_t SetDhParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_DhPara *dhPara) { BSL_Param param[4] = { {CRYPT_PARAM_DH_P, BSL_PARAM_TYPE_OCTETS, dhPara->p, dhPara->pLen, 0}, {CRYPT_PARAM_DH_Q, BSL_PARAM_TYPE_OCTETS, dhPara->q, dhPara->qLen, 0}, {CRYPT_PARAM_DH_G, BSL_PARAM_TYPE_OCTETS, dhPara->g, dhPara->gLen, 0}, BSL_PARAM_END }; return pkey->method->setPara(pkey->key, param); } static int32_t SetEccParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EccPara *eccPara) { BSL_Param param[8] = { {CRYPT_PARAM_EC_P, BSL_PARAM_TYPE_OCTETS, eccPara->p, eccPara->pLen, 0}, {CRYPT_PARAM_EC_A, BSL_PARAM_TYPE_OCTETS, eccPara->a, eccPara->aLen, 0}, {CRYPT_PARAM_EC_B, BSL_PARAM_TYPE_OCTETS, eccPara->b, eccPara->bLen, 0}, {CRYPT_PARAM_EC_N, BSL_PARAM_TYPE_OCTETS, eccPara->n, eccPara->nLen, 0}, {CRYPT_PARAM_EC_H, BSL_PARAM_TYPE_OCTETS, eccPara->h, eccPara->hLen, 0}, {CRYPT_PARAM_EC_X, BSL_PARAM_TYPE_OCTETS, eccPara->x, eccPara->xLen, 0}, {CRYPT_PARAM_EC_Y, BSL_PARAM_TYPE_OCTETS, eccPara->y, eccPara->yLen, 0}, BSL_PARAM_END }; return pkey->method->setPara(pkey->key, param); } static int32_t SetPaillierParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_PaillierPara *paillierPara) { uint32_t bits = paillierPara->bits; BSL_Param param[4] = { {CRYPT_PARAM_PAILLIER_P, BSL_PARAM_TYPE_OCTETS, paillierPara->p, paillierPara->pLen, 0}, {CRYPT_PARAM_PAILLIER_Q, BSL_PARAM_TYPE_OCTETS, paillierPara->q, paillierPara->qLen, 0}, {CRYPT_PARAM_PAILLIER_BITS, BSL_PARAM_TYPE_UINT32, &bits, sizeof(bits), 0}, BSL_PARAM_END }; return pkey->method->setPara(pkey->key, param); } static int32_t SetElGamalParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_ElGamalPara *elgamalPara) { uint32_t bits = elgamalPara->bits; uint32_t k_bits = elgamalPara->k_bits; BSL_Param param[4] = { {CRYPT_PARAM_ELGAMAL_Q, BSL_PARAM_TYPE_OCTETS, elgamalPara->q, elgamalPara->qLen, 0}, {CRYPT_PARAM_ELGAMAL_BITS, BSL_PARAM_TYPE_UINT32, &bits, sizeof(bits), 0}, {CRYPT_PARAM_ELGAMAL_KBITS, BSL_PARAM_TYPE_UINT32, &k_bits, sizeof(k_bits), 0}, BSL_PARAM_END }; return pkey->method->setPara(pkey->key, param); } static int32_t GetDsaParams(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_DsaPara *dsaPara) { BSL_Param param[4] = { {CRYPT_PARAM_DSA_P, BSL_PARAM_TYPE_OCTETS, dsaPara->p, dsaPara->pLen, 0}, {CRYPT_PARAM_DSA_Q, BSL_PARAM_TYPE_OCTETS, dsaPara->q, dsaPara->qLen, 0}, {CRYPT_PARAM_DSA_G, BSL_PARAM_TYPE_OCTETS, dsaPara->g, dsaPara->gLen, 0}, BSL_PARAM_END }; int32_t ret = pkey->method->getPara(pkey->key, param); if (ret == CRYPT_SUCCESS) { dsaPara->pLen = param[0].useLen; dsaPara->qLen = param[1].useLen; dsaPara->gLen = param[2].useLen; } return ret; } static int32_t GetDhParams(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_DhPara *dhPara) { BSL_Param param[4] = { {CRYPT_PARAM_DH_P, BSL_PARAM_TYPE_OCTETS, dhPara->p, dhPara->pLen, 0}, {CRYPT_PARAM_DH_Q, BSL_PARAM_TYPE_OCTETS, dhPara->q, dhPara->qLen, 0}, {CRYPT_PARAM_DH_G, BSL_PARAM_TYPE_OCTETS, dhPara->g, dhPara->gLen, 0}, BSL_PARAM_END }; int32_t ret = pkey->method->getPara(pkey->key, param); if (ret == CRYPT_SUCCESS) { dhPara->pLen = param[0].useLen; dhPara->qLen = param[1].useLen; dhPara->gLen = param[2].useLen; } return ret; } static int32_t GetEccParams(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EccPara *eccPara) { BSL_Param param[8] = { {CRYPT_PARAM_EC_P, BSL_PARAM_TYPE_OCTETS, eccPara->p, eccPara->pLen, 0}, {CRYPT_PARAM_EC_A, BSL_PARAM_TYPE_OCTETS, eccPara->a, eccPara->aLen, 0}, {CRYPT_PARAM_EC_B, BSL_PARAM_TYPE_OCTETS, eccPara->b, eccPara->bLen, 0}, {CRYPT_PARAM_EC_N, BSL_PARAM_TYPE_OCTETS, eccPara->n, eccPara->nLen, 0}, {CRYPT_PARAM_EC_H, BSL_PARAM_TYPE_OCTETS, eccPara->h, eccPara->hLen, 0}, {CRYPT_PARAM_EC_X, BSL_PARAM_TYPE_OCTETS, eccPara->x, eccPara->xLen, 0}, {CRYPT_PARAM_EC_Y, BSL_PARAM_TYPE_OCTETS, eccPara->y, eccPara->yLen, 0}, BSL_PARAM_END }; int32_t ret = pkey->method->getPara(pkey->key, param); if (ret == CRYPT_SUCCESS) { eccPara->pLen = param[0].useLen; eccPara->aLen = param[1].useLen; eccPara->bLen = param[2].useLen; eccPara->nLen = param[3].useLen; eccPara->hLen = param[4].useLen; eccPara->xLen = param[5].useLen; eccPara->yLen = param[6].useLen; } return ret; } static int32_t CvtBslParamAndSetParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyPara *para) { int32_t ret = CRYPT_NOT_SUPPORT; switch (pkey->id) { case CRYPT_PKEY_DSA: ret = SetDsaParams(pkey, &para->para.dsaPara); break; case CRYPT_PKEY_RSA: ret = SetRsaParams(pkey, &para->para.rsaPara); break; case CRYPT_PKEY_DH: ret = SetDhParams(pkey, &para->para.dhPara); break; case CRYPT_PKEY_ECDSA: case CRYPT_PKEY_ECDH: ret = SetEccParams(pkey, &para->para.eccPara); break; case CRYPT_PKEY_PAILLIER: ret = SetPaillierParams(pkey, &para->para.paillierPara); break; case CRYPT_PKEY_ELGAMAL: ret = SetElGamalParams(pkey, &para->para.elgamalPara); break; case CRYPT_PKEY_ED25519: case CRYPT_PKEY_X25519: case CRYPT_PKEY_SM2: default: return CRYPT_NOT_SUPPORT; } if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } static int32_t CvtBslParamAndGetParams(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_PkeyPara *para) { int32_t ret = CRYPT_NOT_SUPPORT; switch (pkey->id) { case CRYPT_PKEY_DSA: ret = GetDsaParams(pkey, &para->para.dsaPara); break; case CRYPT_PKEY_DH: ret = GetDhParams(pkey, &para->para.dhPara); break; case CRYPT_PKEY_ECDSA: case CRYPT_PKEY_ECDH: ret = GetEccParams(pkey, &para->para.eccPara); break; case CRYPT_PKEY_PAILLIER: case CRYPT_PKEY_ELGAMAL: case CRYPT_PKEY_RSA: case CRYPT_PKEY_ED25519: case CRYPT_PKEY_X25519: case CRYPT_PKEY_SM2: default: return CRYPT_NOT_SUPPORT; } if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeySetPara(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyPara *para) { int32_t ret; ret = ParaIsVaild(pkey, para); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, ret); return ret; } if (pkey->method == NULL || pkey->method->setPara == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } ret = CvtBslParamAndSetParams(pkey, para); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeySetParaEx(CRYPT_EAL_PkeyCtx *pkey, const BSL_Param *param) { if (pkey == NULL || param == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->setPara == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->setPara(pkey->key, param); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeyGetPara(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_PkeyPara *para) { int32_t ret; ret = ParaIsVaild(pkey, para); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, ret); return ret; } if (pkey->method == NULL || pkey->method->getPara == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } ret = CvtBslParamAndGetParams(pkey, para); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeyCtrl(CRYPT_EAL_PkeyCtx *pkey, int32_t opt, void *val, uint32_t len) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->ctrl == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->ctrl(pkey->key, opt, val, len); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeySetParaById(CRYPT_EAL_PkeyCtx *pkey, CRYPT_PKEY_ParaId id) { return CRYPT_EAL_PkeyCtrl(pkey, CRYPT_CTRL_SET_PARA_BY_ID, &id, sizeof(id)); } int32_t CRYPT_EAL_PkeyGen(CRYPT_EAL_PkeyCtx *pkey) { int32_t ret; if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->gen == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } /* Invoke the algorithm entity to generate a key pair. */ ret = pkey->method->gen(pkey->key); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); return ret; } return CRYPT_SUCCESS; } static int32_t PriAndPubParamIsValid(const CRYPT_EAL_PkeyCtx *pkey, const void *key, bool isPriKey) { bool isInputValid = (pkey == NULL) || (key == NULL); if (isInputValid) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } // false indicates the public key path, and true indicates the private key path if (isPriKey == false) { CRYPT_EAL_PkeyPub *keyParam = (CRYPT_EAL_PkeyPub *)(uintptr_t)key; if (keyParam->id != pkey->id) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } } else { CRYPT_EAL_PkeyPrv *keyParam = (CRYPT_EAL_PkeyPrv *)(uintptr_t)key; if (keyParam->id != pkey->id) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } } return CRYPT_SUCCESS; } int32_t CRYPT_EAL_PkeySetPub(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyPub *key) { int32_t ret = PriAndPubParamIsValid(pkey, key, false); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, (pkey == NULL) ? CRYPT_PKEY_MAX : pkey->id, ret); return ret; } if (pkey->method == NULL || pkey->method->setPub == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } switch (key->id) { case CRYPT_PKEY_RSA: { BSL_Param rsa[3] = {{CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, key->key.rsaPub.e, key->key.rsaPub.eLen, 0}, {CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, key->key.rsaPub.n, key->key.rsaPub.nLen, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &rsa); break; } case CRYPT_PKEY_DSA: { BSL_Param dsa[2] = {{CRYPT_PARAM_DSA_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.dsaPub.data, key->key.dsaPub.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &dsa); break; } case CRYPT_PKEY_ED25519: case CRYPT_PKEY_X25519: { BSL_Param para[2] = {{CRYPT_PARAM_CURVE25519_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.curve25519Pub.data, key->key.curve25519Pub.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &para); break; } case CRYPT_PKEY_DH: { BSL_Param dhParam[2] = {{CRYPT_PARAM_DH_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.dhPub.data, key->key.dhPub.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &dhParam); break; } case CRYPT_PKEY_ECDH: case CRYPT_PKEY_ECDSA: case CRYPT_PKEY_SM2: { BSL_Param ecParam[2] = {{CRYPT_PARAM_EC_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.eccPub.data, key->key.eccPub.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &ecParam); break; } case CRYPT_PKEY_PAILLIER: { BSL_Param paParam[4] = {{CRYPT_PARAM_PAILLIER_N, BSL_PARAM_TYPE_OCTETS, key->key.paillierPub.n, key->key.paillierPub.nLen, 0}, {CRYPT_PARAM_PAILLIER_G, BSL_PARAM_TYPE_OCTETS, key->key.paillierPub.g, key->key.paillierPub.gLen, 0}, {CRYPT_PARAM_PAILLIER_N2, BSL_PARAM_TYPE_OCTETS, key->key.paillierPub.n2, key->key.paillierPub.n2Len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &paParam); break; } case CRYPT_PKEY_ML_KEM: { BSL_Param paParam[2] = {{CRYPT_PARAM_ML_KEM_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.kemEk.data, key->key.kemEk.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &paParam); break; } case CRYPT_PKEY_ML_DSA: { BSL_Param paParam[2] = {{CRYPT_PARAM_ML_DSA_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.mldsaPub.data, key->key.mldsaPub.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &paParam); break; } case CRYPT_PKEY_ELGAMAL: { BSL_Param paParam[5] = {{CRYPT_PARAM_ELGAMAL_P, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPub.p, key->key.elgamalPub.pLen, 0}, {CRYPT_PARAM_ELGAMAL_G, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPub.g, key->key.elgamalPub.gLen, 0}, {CRYPT_PARAM_ELGAMAL_Y, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPub.y, key->key.elgamalPub.pLen, 0}, {CRYPT_PARAM_ELGAMAL_Q, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPub.q, key->key.elgamalPub.qLen, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &paParam); break; } case CRYPT_PKEY_SLH_DSA: { BSL_Param slhDsaPub[3] = {{CRYPT_PARAM_SLH_DSA_PUB_SEED, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPub.seed, key->key.slhDsaPub.len, 0}, {CRYPT_PARAM_SLH_DSA_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPub.root, key->key.slhDsaPub.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &slhDsaPub); break; } case CRYPT_PKEY_XMSS: { BSL_Param xmssPub[3] = { {CRYPT_PARAM_XMSS_PUB_SEED, BSL_PARAM_TYPE_OCTETS, key->key.xmssPub.seed, key->key.xmssPub.len, 0}, {CRYPT_PARAM_XMSS_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, key->key.xmssPub.root, key->key.xmssPub.len, 0}, BSL_PARAM_END, }; ret = pkey->method->setPub(pkey->key, &xmssPub); break; } case CRYPT_PKEY_HYBRID_KEM: { BSL_Param paParam[2] = {{CRYPT_PARAM_HYBRID_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.kemEk.data, key->key.kemEk.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPub(pkey->key, &paParam); break; } default: ret = CRYPT_EAL_ALG_NOT_SUPPORT; } if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeySetPrv(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyPrv *key) { int32_t ret = PriAndPubParamIsValid(pkey, key, true); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, (pkey == NULL) ? CRYPT_PKEY_MAX : pkey->id, ret); return ret; } if (pkey->method == NULL || pkey->method->setPrv == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } switch(key->id) { case CRYPT_PKEY_RSA: { BSL_Param rsaParam[] = {{CRYPT_PARAM_RSA_D, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.d, key->key.rsaPrv.dLen, 0}, {CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.n, key->key.rsaPrv.nLen, 0}, {CRYPT_PARAM_RSA_P, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.p, key->key.rsaPrv.pLen, 0}, {CRYPT_PARAM_RSA_Q, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.q, key->key.rsaPrv.qLen, 0}, {CRYPT_PARAM_RSA_DP, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.dP, key->key.rsaPrv.dPLen, 0}, {CRYPT_PARAM_RSA_DQ, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.dQ, key->key.rsaPrv.dQLen, 0}, {CRYPT_PARAM_RSA_QINV, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.qInv, key->key.rsaPrv.qInvLen, 0}, {CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.e, key->key.rsaPrv.eLen, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &rsaParam); break; } case CRYPT_PKEY_DSA: { BSL_Param dsaParam[2] = {{CRYPT_PARAM_DSA_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.dsaPrv.data, key->key.dsaPrv.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &dsaParam); break; } case CRYPT_PKEY_ED25519: case CRYPT_PKEY_X25519: { BSL_Param para[2] = {{CRYPT_PARAM_CURVE25519_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.curve25519Prv.data, key->key.curve25519Prv.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &para); break; } case CRYPT_PKEY_DH: { BSL_Param dhParam[2] = {{CRYPT_PARAM_DH_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.dhPrv.data, key->key.dhPrv.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &dhParam); break; } case CRYPT_PKEY_ECDH: case CRYPT_PKEY_ECDSA: case CRYPT_PKEY_SM2: { BSL_Param ecParam[2] = {{CRYPT_PARAM_EC_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.eccPrv.data, key->key.eccPrv.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &ecParam); break; } case CRYPT_PKEY_PAILLIER: { BSL_Param paParam[5] = {{CRYPT_PARAM_PAILLIER_N, BSL_PARAM_TYPE_OCTETS, key->key.paillierPrv.n, key->key.paillierPrv.nLen, 0}, {CRYPT_PARAM_PAILLIER_LAMBDA, BSL_PARAM_TYPE_OCTETS, key->key.paillierPrv.lambda, key->key.paillierPrv.lambdaLen, 0}, {CRYPT_PARAM_PAILLIER_MU, BSL_PARAM_TYPE_OCTETS, key->key.paillierPrv.mu, key->key.paillierPrv.muLen, 0}, {CRYPT_PARAM_PAILLIER_N2, BSL_PARAM_TYPE_OCTETS, key->key.paillierPrv.n2, key->key.paillierPrv.n2Len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &paParam); break; } case CRYPT_PKEY_SLH_DSA: { BSL_Param slhDsaParam[5] = {{CRYPT_PARAM_SLH_DSA_PRV_SEED, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPrv.seed, key->key.slhDsaPrv.pub.len, 0}, {CRYPT_PARAM_SLH_DSA_PRV_PRF, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPrv.prf, key->key.slhDsaPrv.pub.len, 0}, {CRYPT_PARAM_SLH_DSA_PUB_SEED, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPrv.pub.seed, key->key.slhDsaPrv.pub.len, 0}, {CRYPT_PARAM_SLH_DSA_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPrv.pub.root, key->key.slhDsaPrv.pub.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &slhDsaParam); break; } case CRYPT_PKEY_XMSS: { uint64_t index = key->key.xmssPrv.index; BSL_Param xmssParam[6] = { {CRYPT_PARAM_XMSS_PRV_SEED, BSL_PARAM_TYPE_OCTETS, key->key.xmssPrv.seed, key->key.xmssPrv.pub.len, 0}, {CRYPT_PARAM_XMSS_PRV_PRF, BSL_PARAM_TYPE_OCTETS, key->key.xmssPrv.prf, key->key.xmssPrv.pub.len, 0}, {CRYPT_PARAM_XMSS_PRV_INDEX, BSL_PARAM_TYPE_UINT64, &index, sizeof(index), 0}, {CRYPT_PARAM_XMSS_PUB_SEED, BSL_PARAM_TYPE_OCTETS, key->key.xmssPrv.pub.seed, key->key.xmssPrv.pub.len, 0}, {CRYPT_PARAM_XMSS_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, key->key.xmssPrv.pub.root, key->key.xmssPrv.pub.len, 0}, BSL_PARAM_END, }; ret = pkey->method->setPrv(pkey->key, &xmssParam); break; } case CRYPT_PKEY_ELGAMAL: { BSL_Param paParam[4] = { {CRYPT_PARAM_ELGAMAL_P, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPrv.p, key->key.elgamalPrv.pLen, 0}, {CRYPT_PARAM_ELGAMAL_G, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPrv.g, key->key.elgamalPrv.gLen, 0}, {CRYPT_PARAM_ELGAMAL_X, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPrv.x, key->key.elgamalPrv.xLen, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &paParam); break; } case CRYPT_PKEY_ML_KEM: { BSL_Param paParam[2] = {{CRYPT_PARAM_ML_KEM_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.kemDk.data, key->key.kemDk.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &paParam); break; } case CRYPT_PKEY_ML_DSA: { BSL_Param paParam[2] = {{CRYPT_PARAM_ML_DSA_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.mldsaPrv.data, key->key.mldsaPrv.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &paParam); break; } case CRYPT_PKEY_HYBRID_KEM: { BSL_Param paParam[2] = {{CRYPT_PARAM_HYBRID_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.kemDk.data, key->key.kemDk.len, 0}, BSL_PARAM_END}; ret = pkey->method->setPrv(pkey->key, &paParam); break; } default: ret = CRYPT_EAL_ALG_NOT_SUPPORT; } if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } static int32_t GetRSAPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_RsaPub *pub) { BSL_Param param[3] = {{CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, pub->e, pub->eLen, 0}, {CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, pub->n, pub->nLen, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pub->eLen = param[0].useLen; pub->nLen = param[1].useLen; return CRYPT_SUCCESS; } static int32_t GetCommonPub(const CRYPT_EAL_PkeyCtx *pkey, int32_t paramKey, CRYPT_Data *pub) { BSL_Param param[2] = {{paramKey, BSL_PARAM_TYPE_OCTETS, pub->data, pub->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pub->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetPaillierPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_PaillierPub *pub) { BSL_Param param[4] = {{CRYPT_PARAM_PAILLIER_N, BSL_PARAM_TYPE_OCTETS, pub->n, pub->nLen, 0}, {CRYPT_PARAM_PAILLIER_G, BSL_PARAM_TYPE_OCTETS, pub->g, pub->gLen, 0}, {CRYPT_PARAM_PAILLIER_N2, BSL_PARAM_TYPE_OCTETS, pub->n2, pub->n2Len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pub->nLen = param[0].useLen; pub->gLen = param[1].useLen; pub->n2Len = param[2].useLen; return CRYPT_SUCCESS; } static int32_t GetElGamalPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_ElGamalPub *pub) { BSL_Param param[5] = {{CRYPT_PARAM_ELGAMAL_P, BSL_PARAM_TYPE_OCTETS, pub->p, pub->pLen, 0}, {CRYPT_PARAM_ELGAMAL_G, BSL_PARAM_TYPE_OCTETS, pub->g, pub->gLen, 0}, {CRYPT_PARAM_ELGAMAL_Y, BSL_PARAM_TYPE_OCTETS, pub->y, pub->yLen, 0}, {CRYPT_PARAM_ELGAMAL_Q, BSL_PARAM_TYPE_OCTETS, pub->q, pub->qLen, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pub->pLen = param[0].useLen; pub->gLen = param[1].useLen; pub->yLen = param[2].useLen; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_PkeyGetPubEx(const CRYPT_EAL_PkeyCtx *pkey, BSL_Param *param) { if (pkey == NULL || param == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->getPub == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->getPub(pkey->key, param); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeySetPubEx(CRYPT_EAL_PkeyCtx *pkey, const BSL_Param *param) { if (pkey == NULL || param == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->setPub == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->setPub(pkey->key, param); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeyGetPrvEx(const CRYPT_EAL_PkeyCtx *pkey, BSL_Param *param) { if (pkey == NULL || param == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->getPrv == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->getPrv(pkey->key, param); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeySetPrvEx(CRYPT_EAL_PkeyCtx *pkey, const BSL_Param *param) { if (pkey == NULL || param == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->setPrv == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->setPrv(pkey->key, param); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } static int32_t GetMlkemPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_KemEncapsKey *kemEk) { BSL_Param param[2] = {{CRYPT_PARAM_ML_KEM_PUBKEY, BSL_PARAM_TYPE_OCTETS, kemEk->data, kemEk->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } kemEk->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetMldsaPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_MlDsaPub *dsaPub) { BSL_Param param[2] = {{CRYPT_PARAM_ML_DSA_PUBKEY, BSL_PARAM_TYPE_OCTETS, dsaPub->data, dsaPub->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } dsaPub->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetHybridkemPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_KemEncapsKey *kemEk) { BSL_Param param[2] = {{CRYPT_PARAM_HYBRID_PUBKEY, BSL_PARAM_TYPE_OCTETS, kemEk->data, kemEk->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } kemEk->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetSlhDsaPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_SlhDsaPub *pub) { BSL_Param param[3] = {{CRYPT_PARAM_SLH_DSA_PUB_SEED, BSL_PARAM_TYPE_OCTETS, pub->seed, pub->len, 0}, {CRYPT_PARAM_SLH_DSA_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, pub->root, pub->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pub->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetXmssPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_XmssPub *pub) { BSL_Param param[3] = { {CRYPT_PARAM_XMSS_PUB_SEED, BSL_PARAM_TYPE_OCTETS, pub->seed, pub->len, 0}, {CRYPT_PARAM_XMSS_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, pub->root, pub->len, 0}, BSL_PARAM_END, }; int32_t ret = pkey->method->getPub(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } pub->len = param[0].useLen; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_PkeyGetPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_PkeyPub *key) { int32_t ret = PriAndPubParamIsValid(pkey, key, false); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, (pkey == NULL) ? CRYPT_PKEY_MAX : pkey->id, ret); return ret; } if (pkey->method == NULL || pkey->method->getPub == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } switch (key->id) { case CRYPT_PKEY_RSA: ret = GetRSAPub(pkey, &key->key.rsaPub); break; case CRYPT_PKEY_DSA: ret = GetCommonPub(pkey, CRYPT_PARAM_DSA_PUBKEY, &key->key.dsaPub); break; case CRYPT_PKEY_ED25519: case CRYPT_PKEY_X25519: ret = GetCommonPub(pkey, CRYPT_PARAM_CURVE25519_PUBKEY, &key->key.curve25519Pub); break; case CRYPT_PKEY_DH: ret = GetCommonPub(pkey, CRYPT_PARAM_DH_PUBKEY, &key->key.dhPub); break; case CRYPT_PKEY_ECDH: case CRYPT_PKEY_ECDSA: case CRYPT_PKEY_SM2: ret = GetCommonPub(pkey, CRYPT_PARAM_EC_PUBKEY, &key->key.eccPub); break; case CRYPT_PKEY_PAILLIER: ret = GetPaillierPub(pkey, &key->key.paillierPub); break; case CRYPT_PKEY_ELGAMAL: ret = GetElGamalPub(pkey, &key->key.elgamalPub); break; case CRYPT_PKEY_ML_KEM: ret = GetMlkemPub(pkey, &key->key.kemEk); break; case CRYPT_PKEY_ML_DSA: ret = GetMldsaPub(pkey, &key->key.mldsaPub); break; case CRYPT_PKEY_HYBRID_KEM: ret = GetHybridkemPub(pkey, &key->key.kemEk); break; case CRYPT_PKEY_SLH_DSA: ret = GetSlhDsaPub(pkey, &key->key.slhDsaPub); break; case CRYPT_PKEY_XMSS: ret = GetXmssPub(pkey, &key->key.xmssPub); break; default: ret = CRYPT_EAL_ALG_NOT_SUPPORT; } if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } static int32_t GetRSAPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_RsaPrv *prv) { BSL_Param param[] = {{CRYPT_PARAM_RSA_D, BSL_PARAM_TYPE_OCTETS, prv->d, prv->dLen, 0}, {CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, prv->n, prv->nLen, 0}, {CRYPT_PARAM_RSA_P, BSL_PARAM_TYPE_OCTETS, prv->p, prv->pLen, 0}, {CRYPT_PARAM_RSA_Q, BSL_PARAM_TYPE_OCTETS, prv->q, prv->qLen, 0}, {CRYPT_PARAM_RSA_DP, BSL_PARAM_TYPE_OCTETS, prv->dP, prv->dPLen, 0}, {CRYPT_PARAM_RSA_DQ, BSL_PARAM_TYPE_OCTETS, prv->dQ, prv->dQLen, 0}, {CRYPT_PARAM_RSA_QINV, BSL_PARAM_TYPE_OCTETS, prv->qInv, prv->qInvLen, 0}, {CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, prv->e, prv->eLen, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } prv->dLen = param[0].useLen; prv->nLen = param[1].useLen; prv->pLen = param[2].useLen; prv->qLen = param[3].useLen; prv->dPLen = param[4].useLen; prv->dQLen = param[5].useLen; prv->qInvLen = param[6].useLen; prv->eLen = param[7].useLen; return CRYPT_SUCCESS; } static int32_t GetCommonPrv(const CRYPT_EAL_PkeyCtx *pkey, int32_t paramKey, CRYPT_Data *prv) { BSL_Param param[2] = {{paramKey, BSL_PARAM_TYPE_OCTETS, prv->data, prv->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } prv->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetPaillierPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_PaillierPrv *prv) { BSL_Param param[5] = {{CRYPT_PARAM_PAILLIER_N, BSL_PARAM_TYPE_OCTETS, prv->n, prv->nLen, 0}, {CRYPT_PARAM_PAILLIER_LAMBDA, BSL_PARAM_TYPE_OCTETS, prv->lambda, prv->lambdaLen, 0}, {CRYPT_PARAM_PAILLIER_MU, BSL_PARAM_TYPE_OCTETS, prv->mu, prv->muLen, 0}, {CRYPT_PARAM_PAILLIER_N2, BSL_PARAM_TYPE_OCTETS, prv->n2, prv->n2Len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } prv->nLen = param[0].useLen; prv->lambdaLen = param[1].useLen; prv->muLen = param[2].useLen; prv->n2Len = param[3].useLen; return CRYPT_SUCCESS; } static int32_t GetElGamalPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_ElGamalPrv *prv) { BSL_Param param[5] = {{CRYPT_PARAM_ELGAMAL_P, BSL_PARAM_TYPE_OCTETS, prv->p, prv->pLen, 0}, {CRYPT_PARAM_ELGAMAL_G, BSL_PARAM_TYPE_OCTETS, prv->g, prv->gLen, 0}, {CRYPT_PARAM_ELGAMAL_X, BSL_PARAM_TYPE_OCTETS, prv->x, prv->xLen, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } prv->pLen = param[0].useLen; prv->gLen = param[1].useLen; prv->xLen = param[2].useLen; return CRYPT_SUCCESS; } static int32_t GetMlkemPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_KemDecapsKey *kemDk) { BSL_Param param[2] = {{CRYPT_PARAM_ML_KEM_PRVKEY, BSL_PARAM_TYPE_OCTETS, kemDk->data, kemDk->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } kemDk->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetMldsaPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_MlDsaPrv *dsaPrv) { BSL_Param param[2] = {{CRYPT_PARAM_ML_DSA_PRVKEY, BSL_PARAM_TYPE_OCTETS, dsaPrv->data, dsaPrv->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } dsaPrv->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetHybridkemPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_KemDecapsKey *kemDk) { BSL_Param param[2] = {{CRYPT_PARAM_HYBRID_PRVKEY, BSL_PARAM_TYPE_OCTETS, kemDk->data, kemDk->len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } kemDk->len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetSlhDsaPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_SlhDsaPrv *prv) { BSL_Param param[5] = {{CRYPT_PARAM_SLH_DSA_PRV_SEED, BSL_PARAM_TYPE_OCTETS, prv->seed, prv->pub.len, 0}, {CRYPT_PARAM_SLH_DSA_PRV_PRF, BSL_PARAM_TYPE_OCTETS, prv->prf, prv->pub.len, 0}, {CRYPT_PARAM_SLH_DSA_PUB_SEED, BSL_PARAM_TYPE_OCTETS, prv->pub.seed, prv->pub.len, 0}, {CRYPT_PARAM_SLH_DSA_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, prv->pub.root, prv->pub.len, 0}, BSL_PARAM_END}; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } prv->pub.len = param[0].useLen; return CRYPT_SUCCESS; } static int32_t GetXmssPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_XmssPrv *prv) { BSL_Param param[6] = { {CRYPT_PARAM_XMSS_PRV_SEED, BSL_PARAM_TYPE_OCTETS, prv->seed, prv->pub.len, 0}, {CRYPT_PARAM_XMSS_PRV_PRF, BSL_PARAM_TYPE_OCTETS, prv->prf, prv->pub.len, 0}, {CRYPT_PARAM_XMSS_PRV_INDEX, BSL_PARAM_TYPE_UINT64, &prv->index, sizeof(prv->index), 0}, {CRYPT_PARAM_XMSS_PUB_SEED, BSL_PARAM_TYPE_OCTETS, prv->pub.seed, prv->pub.len, 0}, {CRYPT_PARAM_XMSS_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, prv->pub.root, prv->pub.len, 0}, BSL_PARAM_END, }; int32_t ret = pkey->method->getPrv(pkey->key, &param); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } prv->pub.len = param[0].useLen; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_PkeyGetPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_PkeyPrv *key) { int32_t ret = PriAndPubParamIsValid(pkey, key, true); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, (pkey == NULL) ? CRYPT_PKEY_MAX : pkey->id, ret); return ret; } if (pkey->method == NULL || pkey->method->getPrv == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } switch(key->id) { case CRYPT_PKEY_RSA: ret = GetRSAPrv(pkey, &key->key.rsaPrv); break; case CRYPT_PKEY_DSA: ret = GetCommonPrv(pkey, CRYPT_PARAM_DSA_PRVKEY, &key->key.dsaPrv); break; case CRYPT_PKEY_ED25519: case CRYPT_PKEY_X25519: ret = GetCommonPrv(pkey, CRYPT_PARAM_CURVE25519_PRVKEY, &key->key.curve25519Prv); break; case CRYPT_PKEY_DH: ret = GetCommonPrv(pkey, CRYPT_PARAM_DH_PRVKEY, &key->key.dhPrv); break; case CRYPT_PKEY_ECDH: case CRYPT_PKEY_ECDSA: case CRYPT_PKEY_SM2: ret = GetCommonPrv(pkey, CRYPT_PARAM_EC_PRVKEY, &key->key.eccPrv); break; case CRYPT_PKEY_PAILLIER: ret = GetPaillierPrv(pkey, &key->key.paillierPrv); break; case CRYPT_PKEY_ELGAMAL: ret = GetElGamalPrv(pkey, &key->key.elgamalPrv); break; case CRYPT_PKEY_ML_KEM: ret = GetMlkemPrv(pkey, &key->key.kemDk); break; case CRYPT_PKEY_ML_DSA: ret = GetMldsaPrv(pkey, &key->key.mldsaPrv); break; case CRYPT_PKEY_SLH_DSA: ret = GetSlhDsaPrv(pkey, &key->key.slhDsaPrv); break; case CRYPT_PKEY_XMSS: ret = GetXmssPrv(pkey, &key->key.xmssPrv); break; case CRYPT_PKEY_HYBRID_KEM: ret = GetHybridkemPrv(pkey, &key->key.kemDk); break; default: ret = CRYPT_EAL_ALG_NOT_SUPPORT; } if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } uint32_t CRYPT_EAL_PkeyGetSignLen(const CRYPT_EAL_PkeyCtx *pkey) { int32_t result = 0; int32_t ret = CRYPT_EAL_PkeyCtrl((CRYPT_EAL_PkeyCtx *)(uintptr_t)pkey, CRYPT_CTRL_GET_SIGNLEN, &result, sizeof(result)); return ret == CRYPT_SUCCESS ? result : 0; } uint32_t CRYPT_EAL_PkeyGetKeyLen(const CRYPT_EAL_PkeyCtx *pkey) { int32_t result = 0; int32_t ret = CRYPT_EAL_PkeyCtrl((CRYPT_EAL_PkeyCtx *)(uintptr_t)pkey, CRYPT_CTRL_GET_BITS, &result, sizeof(result)); return ret == CRYPT_SUCCESS ? ((result + 7) >> 3) : 0; // bytes = (bits + 7) >> 3 } uint32_t CRYPT_EAL_PkeyGetKeyBits(const CRYPT_EAL_PkeyCtx *pkey) { int32_t result = 0; int32_t ret = CRYPT_EAL_PkeyCtrl((CRYPT_EAL_PkeyCtx *)(uintptr_t)pkey, CRYPT_CTRL_GET_BITS, &result, sizeof(result)); return ret == CRYPT_SUCCESS ? result : 0; } uint32_t CRYPT_EAL_PkeyGetSecurityBits(const CRYPT_EAL_PkeyCtx *pkey) { int32_t result = 0; int32_t ret = CRYPT_EAL_PkeyCtrl((CRYPT_EAL_PkeyCtx *)(uintptr_t)pkey, CRYPT_CTRL_GET_SECBITS, &result, sizeof(result)); return ret == CRYPT_SUCCESS ? result : 0; } CRYPT_PKEY_AlgId CRYPT_EAL_PkeyGetId(const CRYPT_EAL_PkeyCtx *pkey) { if (pkey == NULL) { return CRYPT_PKEY_MAX; } return pkey->id; } CRYPT_PKEY_ParaId CRYPT_EAL_PkeyGetParaId(const CRYPT_EAL_PkeyCtx *pkey) { int32_t result = 0; int32_t ret = CRYPT_EAL_PkeyCtrl((CRYPT_EAL_PkeyCtx *)(uintptr_t)pkey, CRYPT_CTRL_GET_PARAID, &result, sizeof(result)); return ret == CRYPT_SUCCESS ? result : CRYPT_PKEY_PARAID_MAX; } int32_t CRYPT_EAL_PkeyCmp(const CRYPT_EAL_PkeyCtx *a, const CRYPT_EAL_PkeyCtx *b) { if (a == NULL || b == NULL) { if (a == b) { return CRYPT_SUCCESS; } EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (a->id != b->id) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_EAL_PKEY_CMP_DIFF_KEY_TYPE); return CRYPT_EAL_PKEY_CMP_DIFF_KEY_TYPE; } if (a->method == NULL || b->method == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (a->method->cmp == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, a->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } return a->method->cmp(a->key, b->key); } // Set the user's personal data. The life cycle is processed by the user. The value of data can be NULL, // which is used to release the personal data and is set NULL. int32_t CRYPT_EAL_PkeySetExtData(CRYPT_EAL_PkeyCtx *pkey, void *data) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } pkey->extData = data; return CRYPT_SUCCESS; } // Obtain user's personal data. void *CRYPT_EAL_PkeyGetExtData(const CRYPT_EAL_PkeyCtx *pkey) { if (pkey == NULL) { return NULL; } return pkey->extData; } bool CRYPT_EAL_PkeyIsValidAlgId(CRYPT_PKEY_AlgId id) { return CRYPT_EAL_PkeyFindMethod(id) != NULL; } int32_t CRYPT_EAL_PkeyUpRef(CRYPT_EAL_PkeyCtx *pkey) { int i = 0; if (pkey == NULL) { return CRYPT_NULL_INPUT; } return BSL_SAL_AtomicUpReferences(&(pkey->references), &i); } #ifdef HITLS_CRYPTO_PROVIDER static int32_t CRYPT_EAL_SetKeyMethod(const CRYPT_EAL_Func *funcsKeyMgmt, EAL_PkeyUnitaryMethod *method) { int32_t index = 0; if (funcsKeyMgmt != NULL) { while (funcsKeyMgmt[index].id != 0) { switch (funcsKeyMgmt[index].id) { case CRYPT_EAL_IMPLPKEYMGMT_NEWCTX: method->provNewCtx = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_SETPARAM: method->setPara = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_GETPARAM: method->getPara = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_GENKEY: method->gen = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_SETPRV: method->setPrv = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_SETPUB: method->setPub = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_GETPRV: method->getPrv = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_GETPUB: method->getPub = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_DUPCTX: method->dupCtx = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_CHECK: method->check = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_COMPARE: method->cmp = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_CTRL: method->ctrl = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_FREECTX: method->freeCtx = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_IMPORT: method->import = funcsKeyMgmt[index].func; break; case CRYPT_EAL_IMPLPKEYMGMT_EXPORT: method->export = funcsKeyMgmt[index].func; break; default: BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } } return CRYPT_SUCCESS; } static int32_t CRYPT_EAL_SetCipherMethod(const CRYPT_EAL_Func *funcsAsyCipher, EAL_PkeyUnitaryMethod *method) { int32_t index = 0; if (funcsAsyCipher != NULL) { while (funcsAsyCipher[index].id != 0) { switch (funcsAsyCipher[index].id) { case CRYPT_EAL_IMPLPKEYCIPHER_ENCRYPT: method->encrypt = funcsAsyCipher[index].func; break; case CRYPT_EAL_IMPLPKEYCIPHER_DECRYPT: method->decrypt = funcsAsyCipher[index].func; break; case CRYPT_EAL_IMPLPKEYCIPHER_HEADD: method->headd = funcsAsyCipher[index].func; break; case CRYPT_EAL_IMPLPKEYCIPHER_HEMUL: method->hemul = funcsAsyCipher[index].func; break; default: BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } } return CRYPT_SUCCESS; } static int32_t CRYPT_EAL_SetExchMethod(const CRYPT_EAL_Func *funcsExch, EAL_PkeyUnitaryMethod *method) { int32_t index = 0; if (funcsExch != NULL) { while (funcsExch[index].id != 0) { switch (funcsExch[index].id) { case CRYPT_EAL_IMPLPKEYEXCH_EXCH: method->computeShareKey = funcsExch[index].func; break; default: BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } } return CRYPT_SUCCESS; } static int32_t CRYPT_EAL_SetSignMethod(const CRYPT_EAL_Func *funcSign, EAL_PkeyUnitaryMethod *method) { int32_t index = 0; if (funcSign != NULL) { while (funcSign[index].id != 0) { switch (funcSign[index].id) { case CRYPT_EAL_IMPLPKEYSIGN_SIGN: method->sign = funcSign[index].func; break; case CRYPT_EAL_IMPLPKEYSIGN_SIGNDATA: method->signData = funcSign[index].func; break; case CRYPT_EAL_IMPLPKEYSIGN_VERIFY: method->verify = funcSign[index].func; break; case CRYPT_EAL_IMPLPKEYSIGN_VERIFYDATA: method->verifyData = funcSign[index].func; break; case CRYPT_EAL_IMPLPKEYSIGN_BLIND: method->blind = funcSign[index].func; break; case CRYPT_EAL_IMPLPKEYSIGN_UNBLIND: method->unBlind = funcSign[index].func; break; case CRYPT_EAL_IMPLPKEYSIGN_RECOVER: method->recover = funcSign[index].func; break; default: BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } } return CRYPT_SUCCESS; } static int32_t CRYPT_EAL_SetKemMethod(const CRYPT_EAL_Func *funcKem, EAL_PkeyUnitaryMethod *method) { int32_t index = 0; if (funcKem != NULL) { while (funcKem[index].id != 0) { switch (funcKem[index].id) { case CRYPT_EAL_IMPLPKEYKEM_ENCAPSULATE_INIT: method->encapsInit = funcKem[index].func; break; case CRYPT_EAL_IMPLPKEYKEM_DECAPSULATE_INIT: method->decapsInit = funcKem[index].func; break; case CRYPT_EAL_IMPLPKEYKEM_ENCAPSULATE: method->encaps = funcKem[index].func; break; case CRYPT_EAL_IMPLPKEYKEM_DECAPSULATE: method->decaps = funcKem[index].func; break; default: BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } } return CRYPT_SUCCESS; } int32_t CRYPT_EAL_SetPkeyMethod(EAL_PkeyUnitaryMethod **pkeyMethod, const CRYPT_EAL_Func *funcsKeyMgmt, const CRYPT_EAL_Func *funcsAsyCipher, const CRYPT_EAL_Func *funcsExch, const CRYPT_EAL_Func *funcSign, const CRYPT_EAL_Func *funcKem) { int32_t ret; EAL_PkeyUnitaryMethod *method = BSL_SAL_Calloc(1, sizeof(EAL_PkeyUnitaryMethod)); if (method == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return BSL_MALLOC_FAIL; } ret = CRYPT_EAL_SetKeyMethod(funcsKeyMgmt, method); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(method); return ret; } ret = CRYPT_EAL_SetCipherMethod(funcsAsyCipher, method); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(method); return ret; } ret = CRYPT_EAL_SetExchMethod(funcsExch, method); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(method); return ret; } ret = CRYPT_EAL_SetSignMethod(funcSign, method); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(method); return ret; } ret = CRYPT_EAL_SetKemMethod(funcKem, method); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(method); return ret; } *pkeyMethod = method; return CRYPT_SUCCESS; } static int32_t ProviderGetTargetFuncs(CRYPT_EAL_LibCtx *libCtx, int32_t operaId, int32_t algId, const char *attrName, const CRYPT_EAL_Func **funcs, CRYPT_EAL_ProvMgrCtx **mgrCtx) { int32_t ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, operaId, algId, attrName, funcs, mgrCtx); return ret == CRYPT_NOT_SUPPORT ? CRYPT_SUCCESS : ret; } int32_t CRYPT_EAL_ProviderGetAsyAlgFuncs(CRYPT_EAL_LibCtx *libCtx, int32_t algId, uint32_t pkeyOperType, const char *attrName, CRYPT_EAL_AsyAlgFuncsInfo *funcs) { int32_t ret = CRYPT_PROVIDER_NOT_SUPPORT; if (pkeyOperType == CRYPT_EAL_PKEY_UNKNOWN_OPERATE) { RETURN_RET_IF_ERR(ProviderGetTargetFuncs(libCtx, CRYPT_EAL_OPERAID_ASYMCIPHER, algId, attrName, &funcs->funcsAsyCipher, &funcs->mgrCtx), ret); RETURN_RET_IF_ERR(ProviderGetTargetFuncs(libCtx, CRYPT_EAL_OPERAID_KEYEXCH, algId, attrName, &funcs->funcsExch, &funcs->mgrCtx), ret); RETURN_RET_IF_ERR(ProviderGetTargetFuncs(libCtx, CRYPT_EAL_OPERAID_SIGN, algId, attrName, &funcs->funcSign, &funcs->mgrCtx), ret); RETURN_RET_IF_ERR(ProviderGetTargetFuncs(libCtx, CRYPT_EAL_OPERAID_KEM, algId, attrName, &funcs->funcKem, &funcs->mgrCtx), ret); } if ((pkeyOperType & CRYPT_EAL_PKEY_CIPHER_OPERATE) == CRYPT_EAL_PKEY_CIPHER_OPERATE) { ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, CRYPT_EAL_OPERAID_ASYMCIPHER, algId, attrName, &funcs->funcsAsyCipher, &funcs->mgrCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if ((pkeyOperType & CRYPT_EAL_PKEY_EXCH_OPERATE) == CRYPT_EAL_PKEY_EXCH_OPERATE) { ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, CRYPT_EAL_OPERAID_KEYEXCH, algId, attrName, &funcs->funcsExch, &funcs->mgrCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if ((pkeyOperType & CRYPT_EAL_PKEY_SIGN_OPERATE) == CRYPT_EAL_PKEY_SIGN_OPERATE) { ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, CRYPT_EAL_OPERAID_SIGN, algId, attrName, &funcs->funcSign, &funcs->mgrCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } if ((pkeyOperType & CRYPT_EAL_PKEY_KEM_OPERATE) == CRYPT_EAL_PKEY_KEM_OPERATE) { ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, CRYPT_EAL_OPERAID_KEM, algId, attrName, &funcs->funcKem, &funcs->mgrCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } } ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, CRYPT_EAL_OPERAID_KEYMGMT, algId, attrName, &funcs->funcsKeyMgmt, &funcs->mgrCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } CRYPT_EAL_PkeyCtx *CRYPT_EAL_ProviderPkeyNewCtxInner(CRYPT_EAL_LibCtx *libCtx, int32_t algId, uint32_t pkeyOperType, const char *attrName) { void *provCtx = NULL; CRYPT_EAL_AsyAlgFuncsInfo funcInfo = {NULL, NULL, NULL, NULL, NULL, NULL}; int32_t ret = CRYPT_EAL_ProviderGetAsyAlgFuncs(libCtx, algId, pkeyOperType, attrName, &funcInfo); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, algId, ret); return NULL; } ret = CRYPT_EAL_ProviderCtrl(funcInfo.mgrCtx, CRYPT_PROVIDER_GET_USER_CTX, &provCtx, sizeof(provCtx)); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, algId, ret); return NULL; } CRYPT_EAL_PkeyCtx *ctx = BSL_SAL_Calloc(1u, sizeof(CRYPT_EAL_PkeyCtx)); if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, algId, CRYPT_MEM_ALLOC_FAIL); return NULL; } ret = CRYPT_EAL_SetPkeyMethod(&(ctx->method), funcInfo.funcsKeyMgmt, funcInfo.funcsAsyCipher, funcInfo.funcsExch, funcInfo.funcSign, funcInfo.funcKem); if (ret != BSL_SUCCESS) { BSL_SAL_FREE(ctx); return NULL; } if (ctx->method->provNewCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, algId, CRYPT_PROVIDER_ERR_IMPL_NULL); BSL_SAL_FREE(ctx->method); BSL_SAL_FREE(ctx); return NULL; } ctx->key = ctx->method->provNewCtx(provCtx, algId); if (ctx->key == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, algId, CRYPT_MEM_ALLOC_FAIL); BSL_SAL_FREE(ctx->method); BSL_SAL_FREE(ctx); return NULL; } ctx->isProvider = true; ctx->id = algId; BSL_SAL_ReferencesInit(&(ctx->references)); return ctx; } #endif // HITLS_CRYPTO_PROVIDER CRYPT_EAL_PkeyCtx *CRYPT_EAL_ProviderPkeyNewCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, uint32_t pkeyOperType, const char *attrName) { #ifdef HITLS_CRYPTO_PROVIDER return CRYPT_EAL_ProviderPkeyNewCtxInner(libCtx, algId, pkeyOperType, attrName); #else (void)libCtx; (void)pkeyOperType; (void)attrName; return CRYPT_EAL_PkeyNewCtx(algId); #endif } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_pkey_gen.c
C
unknown
65,515
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY) #include "securec.h" #include "eal_pkey_local.h" #include "crypt_eal_pkey.h" #include "crypt_errno.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "bsl_params.h" #include "eal_common.h" #include "crypt_eal_md.h" int32_t CRYPT_EAL_PkeyEncapsInit(CRYPT_EAL_PkeyCtx *pkey, BSL_Param *params) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = CRYPT_SUCCESS; #ifdef HITLS_CRYPTO_PROVIDER if (pkey->isProvider && pkey->method != NULL && pkey->method->encapsInit != NULL) { ret = pkey->method->encapsInit(pkey->key, params); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } } #else (void)params; #endif return ret; } int32_t CRYPT_EAL_PkeyDecapsInit(CRYPT_EAL_PkeyCtx *pkey, BSL_Param *params) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = CRYPT_SUCCESS; #ifdef HITLS_CRYPTO_PROVIDER if (pkey->isProvider && pkey->method != NULL && pkey->method->decapsInit != NULL) { ret = pkey->method->decapsInit(pkey->key, params); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } } #else (void)params; #endif return ret; } int32_t CRYPT_EAL_PkeyEncaps(const CRYPT_EAL_PkeyCtx *pkey, uint8_t *cipher, uint32_t *cipherLen, uint8_t *sharekey, uint32_t *shareKeyLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->encaps == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->encaps(pkey->key, cipher, cipherLen, sharekey, shareKeyLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeyDecaps(const CRYPT_EAL_PkeyCtx *pkey, const uint8_t *cipher, uint32_t cipherLen, uint8_t *sharekey, uint32_t *shareKeyLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->decaps == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->decaps(pkey->key, cipher, cipherLen, sharekey, shareKeyLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_pkey_kem.c
C
unknown
3,575
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef EAL_PKEY_LOCAL_H #define EAL_PKEY_LOCAL_H #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY) #include <stdint.h> #include "crypt_algid.h" #include "crypt_local_types.h" #include "crypt_eal_pkey.h" #include "sal_atomic.h" #ifdef __cplusplus extern "C" { #endif // __cplusplus /** * @ingroup EAL * * Pkey session structure */ struct EAL_PkeyCtx { bool isProvider; EAL_PkeyUnitaryMethod *method; void *key; void *extData; CRYPT_PKEY_AlgId id; BSL_SAL_RefCount references; }; /** * @ingroup crypt_method * @brief Generate the default method of the signature algorithm. * * @param id [IN] Algorithm ID. * * @return success: Pointer to EAL_PkeyMethod * For other error codes, see crypt_errno.h. */ const EAL_PkeyMethod *CRYPT_EAL_PkeyFindMethod(CRYPT_PKEY_AlgId id); #ifdef __cplusplus } #endif // __cplusplus #endif // HITLS_CRYPTO_PKEY #endif // EAL_PKEY_LOCAL_H
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_pkey_local.h
C
unknown
1,485
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY) #include "securec.h" #include "crypt_local_types.h" #include "crypt_algid.h" #include "eal_pkey_local.h" #ifdef HITLS_CRYPTO_RSA #include "crypt_rsa.h" #endif #ifdef HITLS_CRYPTO_DSA #include "crypt_dsa.h" #endif #ifdef HITLS_CRYPTO_CURVE25519 #include "crypt_curve25519.h" #endif #ifdef HITLS_CRYPTO_DH #include "crypt_dh.h" #endif #ifdef HITLS_CRYPTO_ECDH #include "crypt_ecdh.h" #endif #ifdef HITLS_CRYPTO_ECDSA #include "crypt_ecdsa.h" #endif #ifdef HITLS_CRYPTO_SM2 #include "crypt_sm2.h" #endif #ifdef HITLS_CRYPTO_PAILLIER #include "crypt_paillier.h" #endif #ifdef HITLS_CRYPTO_ELGAMAL #include "crypt_elgamal.h" #endif #ifdef HITLS_CRYPTO_KEM #include "crypt_mlkem.h" #endif #ifdef HITLS_CRYPTO_MLDSA #include "crypt_mldsa.h" #endif #ifdef HITLS_CRYPTO_SLH_DSA #include "crypt_slh_dsa.h" #endif #ifdef HITLS_CRYPTO_HYBRIDKEM #include "crypt_hybridkem.h" #endif #ifdef HITLS_CRYPTO_XMSS #include "crypt_xmss.h" #endif #include "bsl_err_internal.h" #include "crypt_types.h" #include "crypt_errno.h" #include "eal_common.h" #include "bsl_sal.h" #define EAL_PKEY_METHOD_DEFINE(id, \ newCtx, dupCtx, freeCtx, setPara, getPara, gen, ctrl, setPub, setPrv, getPub, getPrv, \ sign, signData, verify, verifyData, recover, computeShareKey, encrypt, decrypt, \ headd, hemul, check, cmp, copyParam, encaps, decaps, blind, unBlind) { \ id, (PkeyNew)(newCtx), (PkeyDup)(dupCtx), (PkeyFree)(freeCtx), \ (PkeySetPara)(setPara), (PkeyGetPara)(getPara), (PkeyGen)(gen), (PkeyCtrl)(ctrl), \ (PkeySetPub)(setPub), (PkeySetPrv)(setPrv), (PkeyGetPub)(getPub), (PkeyGetPrv)(getPrv), \ (PkeySign)(sign), (PkeySignData)(signData), (PkeyVerify)(verify), (PkeyVerifyData)(verifyData), \ (PkeyRecover)(recover), (PkeyComputeShareKey)(computeShareKey), \ (PkeyCrypt)(encrypt), (PkeyCrypt)(decrypt), (PkeyHEOperation)(headd), (PkeyHEOperation)(hemul), \ (PkeyCheck)(check), (PkeyCmp)(cmp), (PkeyCopyParam)(copyParam), \ (PkeyEncapsulate)(encaps), (PkeyDecapsulate)(decaps), (PkeyBlind)(blind), (PkeyUnBlind)(unBlind)} static const EAL_PkeyMethod METHODS[] = { #ifdef HITLS_CRYPTO_DSA EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_DSA, CRYPT_DSA_NewCtx, CRYPT_DSA_DupCtx, CRYPT_DSA_FreeCtx, CRYPT_DSA_SetParaEx, CRYPT_DSA_GetParaEx, CRYPT_DSA_Gen, CRYPT_DSA_Ctrl, CRYPT_DSA_SetPubKeyEx, CRYPT_DSA_SetPrvKeyEx, CRYPT_DSA_GetPubKeyEx, CRYPT_DSA_GetPrvKeyEx, CRYPT_DSA_Sign, CRYPT_DSA_SignData, CRYPT_DSA_Verify, CRYPT_DSA_VerifyData, NULL, // recover NULL, // computeShareKey NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_DSA_CHECK CRYPT_DSA_Check, #else NULL, // check #endif CRYPT_DSA_Cmp, NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), // CRYPT_PKEY_DSA #endif #ifdef HITLS_CRYPTO_ED25519 EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_ED25519, CRYPT_ED25519_NewCtx, CRYPT_CURVE25519_DupCtx, CRYPT_CURVE25519_FreeCtx, NULL, // setPara NULL, // getPara CRYPT_ED25519_GenKey, CRYPT_CURVE25519_Ctrl, CRYPT_CURVE25519_SetPubKeyEx, CRYPT_CURVE25519_SetPrvKeyEx, CRYPT_CURVE25519_GetPubKeyEx, CRYPT_CURVE25519_GetPrvKeyEx, CRYPT_CURVE25519_Sign, NULL, // signData CRYPT_CURVE25519_Verify, NULL, // verifyData NULL, // recover NULL, // computeShareKey NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_ED25519_CHECK CRYPT_ED25519_Check, #else NULL, // check #endif CRYPT_CURVE25519_Cmp, NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), // CRYPT_PKEY_ED25519 #endif #ifdef HITLS_CRYPTO_X25519 EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_X25519, CRYPT_X25519_NewCtx, CRYPT_CURVE25519_DupCtx, CRYPT_CURVE25519_FreeCtx, NULL, // setPara NULL, // getPara CRYPT_X25519_GenKey, CRYPT_CURVE25519_Ctrl, CRYPT_CURVE25519_SetPubKeyEx, CRYPT_CURVE25519_SetPrvKeyEx, CRYPT_CURVE25519_GetPubKeyEx, CRYPT_CURVE25519_GetPrvKeyEx, NULL, // sign NULL, // signData NULL, // verify NULL, // verifyData NULL, // recover CRYPT_CURVE25519_ComputeSharedKey, NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_X25519_CHECK CRYPT_X25519_Check, #else NULL, // check #endif CRYPT_CURVE25519_Cmp, NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), // CRYPT_PKEY_X25519 #endif #ifdef HITLS_CRYPTO_RSA EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_RSA, CRYPT_RSA_NewCtx, CRYPT_RSA_DupCtx, CRYPT_RSA_FreeCtx, CRYPT_RSA_SetParaEx, NULL, // getPara #ifdef HITLS_CRYPTO_RSA_GEN CRYPT_RSA_Gen, #else NULL, // gen #endif CRYPT_RSA_Ctrl, CRYPT_RSA_SetPubKeyEx, CRYPT_RSA_SetPrvKeyEx, CRYPT_RSA_GetPubKeyEx, CRYPT_RSA_GetPrvKeyEx, #ifdef HITLS_CRYPTO_RSA_SIGN CRYPT_RSA_Sign, CRYPT_RSA_SignData, #else NULL, // sign NULL, // signData #endif #ifdef HITLS_CRYPTO_RSA_VERIFY CRYPT_RSA_Verify, CRYPT_RSA_VerifyData, CRYPT_RSA_Recover, #else NULL, // verify NULL, // verifyData NULL, // recover #endif NULL, // computeShareKey #ifdef HITLS_CRYPTO_RSA_ENCRYPT CRYPT_RSA_Encrypt, #else NULL, // encrypt #endif #ifdef HITLS_CRYPTO_RSA_DECRYPT CRYPT_RSA_Decrypt, #else NULL, // decrypt #endif NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_RSA_CHECK CRYPT_RSA_Check, #else NULL, // check #endif CRYPT_RSA_Cmp, NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps #ifdef HITLS_CRYPTO_RSA_BSSA #ifdef HITLS_CRYPTO_RSA_SIGN CRYPT_RSA_Blind, // blind #else NULL, // blind #endif #ifdef HITLS_CRYPTO_RSA_VERIFY CRYPT_RSA_UnBlind // unBlind #else NULL // unBlind #endif #else NULL, // blind NULL // unBlind #endif ), #endif #ifdef HITLS_CRYPTO_DH EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_DH, CRYPT_DH_NewCtx, CRYPT_DH_DupCtx, CRYPT_DH_FreeCtx, CRYPT_DH_SetParaEx, CRYPT_DH_GetParaEx, CRYPT_DH_Gen, CRYPT_DH_Ctrl, CRYPT_DH_SetPubKeyEx, CRYPT_DH_SetPrvKeyEx, CRYPT_DH_GetPubKeyEx, CRYPT_DH_GetPrvKeyEx, NULL, // sign NULL, // signData NULL, // verify NULL, // verifyData NULL, // recover CRYPT_DH_ComputeShareKey, NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_DH_CHECK CRYPT_DH_Check, #else NULL, // check #endif CRYPT_DH_Cmp, NULL, NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), #endif #ifdef HITLS_CRYPTO_ECDSA EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_ECDSA, CRYPT_ECDSA_NewCtx, CRYPT_ECDSA_DupCtx, CRYPT_ECDSA_FreeCtx, CRYPT_ECDSA_SetParaEx, CRYPT_ECDSA_GetParaEx, CRYPT_ECDSA_Gen, CRYPT_ECDSA_Ctrl, CRYPT_ECDSA_SetPubKeyEx, CRYPT_ECDSA_SetPrvKeyEx, CRYPT_ECDSA_GetPubKeyEx, CRYPT_ECDSA_GetPrvKeyEx, CRYPT_ECDSA_Sign, CRYPT_ECDSA_SignData, CRYPT_ECDSA_Verify, CRYPT_ECDSA_VerifyData, NULL, // recover NULL, // computeShareKey NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_ECDSA_CHECK CRYPT_ECDSA_Check, #else NULL, // check #endif CRYPT_ECDSA_Cmp, NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), #endif #ifdef HITLS_CRYPTO_ECDH EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_ECDH, CRYPT_ECDH_NewCtx, CRYPT_ECDH_DupCtx, CRYPT_ECDH_FreeCtx, CRYPT_ECDH_SetParaEx, CRYPT_ECDH_GetParaEx, CRYPT_ECDH_Gen, CRYPT_ECDH_Ctrl, CRYPT_ECDH_SetPubKeyEx, CRYPT_ECDH_SetPrvKeyEx, CRYPT_ECDH_GetPubKeyEx, CRYPT_ECDH_GetPrvKeyEx, NULL, // sign NULL, // signData NULL, // verify NULL, // verifyData NULL, // recover CRYPT_ECDH_ComputeShareKey, NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_ECDH_CHECK CRYPT_ECDH_Check, #else NULL, // check #endif CRYPT_ECDH_Cmp, NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), #endif #ifdef HITLS_CRYPTO_SM2 EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_SM2, CRYPT_SM2_NewCtx, CRYPT_SM2_DupCtx, CRYPT_SM2_FreeCtx, NULL, // setPara NULL, // getPara CRYPT_SM2_Gen, CRYPT_SM2_Ctrl, CRYPT_SM2_SetPubKeyEx, CRYPT_SM2_SetPrvKeyEx, CRYPT_SM2_GetPubKeyEx, CRYPT_SM2_GetPrvKeyEx, #ifdef HITLS_CRYPTO_SM2_SIGN CRYPT_SM2_Sign, NULL, CRYPT_SM2_Verify, NULL, #else NULL, // sign NULL, // signData NULL, // verify NULL, // verifyData #endif NULL, // recover #ifdef HITLS_CRYPTO_SM2_EXCH CRYPT_SM2_KapComputeKey, // compute share key #else NULL, // computeShareKey #endif #ifdef HITLS_CRYPTO_SM2_CRYPT CRYPT_SM2_Encrypt, // encrypt CRYPT_SM2_Decrypt, // decrypt #else NULL, // encrypt NULL, // decrypt #endif NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_SM2_CHECK CRYPT_SM2_Check, #else NULL, // check #endif CRYPT_SM2_Cmp, NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), // CRYPT_PKEY_SM2 #endif #ifdef HITLS_CRYPTO_PAILLIER EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_PAILLIER, CRYPT_PAILLIER_NewCtx, CRYPT_PAILLIER_DupCtx, CRYPT_PAILLIER_FreeCtx, CRYPT_PAILLIER_SetParaEx, NULL, CRYPT_PAILLIER_Gen, CRYPT_PAILLIER_Ctrl, CRYPT_PAILLIER_SetPubKeyEx, CRYPT_PAILLIER_SetPrvKeyEx, CRYPT_PAILLIER_GetPubKeyEx, CRYPT_PAILLIER_GetPrvKeyEx, NULL, NULL, NULL, NULL, NULL, // recover NULL, CRYPT_PAILLIER_Encrypt, CRYPT_PAILLIER_Decrypt, CRYPT_PAILLIER_Add, NULL, NULL, NULL, // cmp NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), // CRYPT_PKEY_PAILLIER #endif #ifdef HITLS_CRYPTO_ELGAMAL EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_ELGAMAL, CRYPT_ELGAMAL_NewCtx, CRYPT_ELGAMAL_DupCtx, CRYPT_ELGAMAL_FreeCtx, CRYPT_ELGAMAL_SetParaEx, NULL, CRYPT_ELGAMAL_Gen, CRYPT_ELGAMAL_Ctrl, CRYPT_ELGAMAL_SetPubKeyEx, CRYPT_ELGAMAL_SetPrvKeyEx, CRYPT_ELGAMAL_GetPubKeyEx, CRYPT_ELGAMAL_GetPrvKeyEx, NULL, NULL, NULL, NULL, NULL, // recover NULL, CRYPT_ELGAMAL_Encrypt, CRYPT_ELGAMAL_Decrypt, NULL, // headd NULL, // hemul NULL, NULL, // cmp NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), // CRYPT_PKEY_ELGAMAL #endif #ifdef HITLS_CRYPTO_MLKEM EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_ML_KEM, CRYPT_ML_KEM_NewCtx, CRYPT_ML_KEM_DupCtx, CRYPT_ML_KEM_FreeCtx, NULL, // setPara NULL, // getPara CRYPT_ML_KEM_GenKey, CRYPT_ML_KEM_Ctrl, CRYPT_ML_KEM_SetEncapsKeyEx, CRYPT_ML_KEM_SetDecapsKeyEx, CRYPT_ML_KEM_GetEncapsKeyEx, CRYPT_ML_KEM_GetDecapsKeyEx, NULL, // sign NULL, // signData NULL, // verify NULL, // verifyData NULL, // recover NULL, // computeShareKey NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_MLKEM_CHECK CRYPT_ML_KEM_Check, #else NULL, // check #endif CRYPT_ML_KEM_Cmp, NULL, // copyPara CRYPT_ML_KEM_Encaps, CRYPT_ML_KEM_Decaps, NULL, // blind NULL // unBlind ), #endif #ifdef HITLS_CRYPTO_MLDSA EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_ML_DSA, CRYPT_ML_DSA_NewCtx, CRYPT_ML_DSA_DupCtx, CRYPT_ML_DSA_FreeCtx, NULL, // setPara NULL, // getPara CRYPT_ML_DSA_GenKey, CRYPT_ML_DSA_Ctrl, CRYPT_ML_DSA_SetPubKeyEx, CRYPT_ML_DSA_SetPrvKeyEx, CRYPT_ML_DSA_GetPubKeyEx, CRYPT_ML_DSA_GetPrvKeyEx, CRYPT_ML_DSA_Sign, // sign NULL, // signData CRYPT_ML_DSA_Verify, // verify NULL, // verifyData NULL, // recover NULL, // computeShareKey NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul #ifdef HITLS_CRYPTO_MLDSA_CHECK CRYPT_ML_DSA_Check, #else NULL, // check #endif CRYPT_ML_DSA_Cmp, NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), #endif #ifdef HITLS_CRYPTO_SLH_DSA EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_SLH_DSA, CRYPT_SLH_DSA_NewCtx, NULL, // dupCtx CRYPT_SLH_DSA_FreeCtx, NULL, // setPara NULL, // getPara CRYPT_SLH_DSA_Gen, CRYPT_SLH_DSA_Ctrl, CRYPT_SLH_DSA_SetPubKeyEx, CRYPT_SLH_DSA_SetPrvKeyEx, CRYPT_SLH_DSA_GetPubKeyEx, CRYPT_SLH_DSA_GetPrvKeyEx, CRYPT_SLH_DSA_Sign, NULL, CRYPT_SLH_DSA_Verify, NULL, NULL, NULL, // verifyData NULL, // recover NULL, // computeShareKey NULL, // encrypt NULL, // decrypt #ifdef HITLS_CRYPTO_SLH_DSA_CHECK CRYPT_SLH_DSA_Check, #else NULL, // check #endif NULL, // cmp NULL, // copyPara NULL, // pkeyEncaps NULL, // pkeyDecaps NULL, // blind NULL // unBlind ), #endif #ifdef HITLS_CRYPTO_XMSS EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_XMSS, CRYPT_XMSS_NewCtx, NULL, // dupCtx CRYPT_XMSS_FreeCtx, NULL, // setPara NULL, // getPara CRYPT_XMSS_Gen, CRYPT_XMSS_Ctrl, CRYPT_XMSS_SetPubKey, CRYPT_XMSS_SetPrvKey, CRYPT_XMSS_GetPubKey, CRYPT_XMSS_GetPrvKey, CRYPT_XMSS_Sign, NULL, CRYPT_XMSS_Verify, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL ), #endif #ifdef HITLS_CRYPTO_HYBRIDKEM EAL_PKEY_METHOD_DEFINE( CRYPT_PKEY_HYBRID_KEM, CRYPT_HYBRID_KEM_NewCtx, NULL, CRYPT_HYBRID_KEM_FreeCtx, NULL, // setPara NULL, // getPara CRYPT_HYBRID_KEM_GenKey, CRYPT_HYBRID_KEM_KeyCtrl, CRYPT_HYBRID_KEM_SetEncapsKeyEx, CRYPT_HYBRID_KEM_SetDecapsKeyEx, CRYPT_HYBRID_KEM_GetEncapsKeyEx, CRYPT_HYBRID_KEM_GetDecapsKeyEx, NULL, // sign NULL, // signData NULL, // verify NULL, // verifyData NULL, // recover NULL, // computeShareKey NULL, // encrypt NULL, // decrypt NULL, // headd NULL, // hemul NULL, // check NULL, NULL, // copyPara CRYPT_HYBRID_KEM_Encaps, CRYPT_HYBRID_KEM_Decaps, NULL, // blind NULL // unBlind ), #endif }; const EAL_PkeyMethod *CRYPT_EAL_PkeyFindMethod(CRYPT_PKEY_AlgId id) { uint32_t num = sizeof(METHODS) / sizeof(METHODS[0]); const EAL_PkeyMethod *pkeyMeth = NULL; for (uint32_t i = 0; i < num; i++) { if (METHODS[i].id == id) { pkeyMeth = &METHODS[i]; return pkeyMeth; } } return NULL; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_pkey_method.c
C
unknown
17,564
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY) #include <stdbool.h> #include "securec.h" #include "bsl_sal.h" #include "crypt_eal_pkey.h" #include "crypt_eal_md.h" #include "crypt_errno.h" #include "eal_md_local.h" #include "eal_pkey_local.h" #include "crypt_eal_rand.h" #include "crypt_algid.h" #include "bsl_err_internal.h" #include "eal_common.h" #include "crypt_utils.h" int32_t CRYPT_EAL_PkeySignData(const CRYPT_EAL_PkeyCtx *pkey, const uint8_t *hash, uint32_t hashLen, uint8_t *sign, uint32_t *signLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->signData == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } if ((hash == NULL && hashLen != 0) || (hash != NULL && hashLen == 0)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } int32_t ret = pkey->method->signData(pkey->key, hash, hashLen, sign, signLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeySign(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_MD_AlgId id, const uint8_t *data, uint32_t dataLen, uint8_t *sign, uint32_t *signLen) { // 1. Check the input parameter if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->sign == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->sign(pkey->key, id, data, dataLen, sign, signLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeyVerify(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_MD_AlgId id, const uint8_t *data, uint32_t dataLen, const uint8_t *sign, uint32_t signLen) { // 1. Check the input parameter if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->verify == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } // 2. Hash the plaintext data and verify the hash value. int32_t ret = pkey->method->verify(pkey->key, id, data, dataLen, sign, signLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); return ret; } return ret; } int32_t CRYPT_EAL_PkeyVerifyData(const CRYPT_EAL_PkeyCtx *pkey, const uint8_t *hash, uint32_t hashLen, const uint8_t *sign, uint32_t signLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->verifyData == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } if ((hash == NULL && hashLen != 0) || (hash != NULL && hashLen == 0)) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } int32_t ret = pkey->method->verifyData(pkey->key, hash, hashLen, sign, signLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeyBlind(CRYPT_EAL_PkeyCtx *pkey, CRYPT_MD_AlgId id, const uint8_t *input, uint32_t inputLen, uint8_t *out, uint32_t *outLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->blind == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->blind(pkey->key, id, input, inputLen, out, outLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } int32_t CRYPT_EAL_PkeyUnBlind(CRYPT_EAL_PkeyCtx *pkey, const uint8_t *input, uint32_t inputLen, uint8_t *out, uint32_t *outLen) { if (pkey == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->method == NULL || pkey->method->unBlind == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT); return CRYPT_EAL_ALG_NOT_SUPPORT; } int32_t ret = pkey->method->unBlind(pkey->key, input, inputLen, out, outLen); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret); } return ret; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_pkey_sign.c
C
unknown
5,882
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_DRBG) #include <stdbool.h> #include <securec.h> #include "crypt_eal_rand.h" #include "crypt_errno.h" #include "bsl_errno.h" #include "bsl_sal.h" #include "crypt_algid.h" #include "crypt_drbg.h" #ifdef HITLS_CRYPTO_MD #include "eal_md_local.h" #endif #ifdef HITLS_CRYPTO_MAC #include "eal_mac_local.h" #endif #ifdef HITLS_CRYPTO_CIPHER #include "eal_cipher_local.h" #endif #include "crypt_drbg_local.h" #include "bsl_err_internal.h" #include "crypt_types.h" #include "crypt_utils.h" #include "crypt_util_rand.h" #include "eal_common.h" #include "eal_entropy.h" #include "sal_atomic.h" #include "crypt_ealinit.h" #include "crypt_eal_implprovider.h" #include "crypt_eal_provider.h" #include "crypt_provider.h" #include "crypt_params_key.h" #ifdef HITLS_CRYPTO_ENTROPY static EAL_SeedDrbg g_seedDrbg = {HITLS_SEED_DRBG_INIT_RAND_ALG, NULL, NULL, {0}, {0}}; static BSL_SAL_ThreadLockHandle g_seedLock = NULL; #endif static CRYPT_EAL_RndCtx *EAL_RandNewDrbg(CRYPT_RAND_AlgId id, CRYPT_RandSeedMethod *seedMeth, void *seedCtx); #define RETURN_RAND_LOCK(ctx, ret) \ do { \ (ret) = BSL_SAL_ThreadWriteLock(((ctx)->lock)); \ if ((ret) != BSL_SUCCESS) { \ BSL_ERR_PUSH_ERROR((ret)); \ return (ret); \ } \ } while (0) #define RAND_UNLOCK(ctx) (void)BSL_SAL_ThreadUnlock(((ctx)->lock)) #if defined(HITLS_CRYPTO_RAND_CB) static CRYPT_EAL_RandFunc g_rndFunc = NULL; static CRYPT_EAL_RandFuncEx g_rndFuncEx = NULL; #endif static int32_t EAL_RandSetMeth(EAL_RandUnitaryMethod *meth, CRYPT_EAL_RndCtx *ctx) { EAL_RandUnitaryMethod *temp = BSL_SAL_Dump(meth, sizeof(EAL_RandUnitaryMethod)); if (temp == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ctx->meth = temp; return CRYPT_SUCCESS; } static int32_t GetSeedParam(BSL_Param *seedParam, CRYPT_RandSeedMethod *seedMeth, void *seedCtx) { uint32_t iter = 0; if (seedCtx != NULL) { if (BSL_PARAM_InitValue(&seedParam[iter++], CRYPT_PARAM_RAND_SEEDCTX, BSL_PARAM_TYPE_CTX_PTR, seedCtx, 0) != CRYPT_SUCCESS) { return CRYPT_DRBG_PARAM_ERROR; } } if (seedMeth->getEntropy != NULL) { if (BSL_PARAM_InitValue(&seedParam[iter++], CRYPT_PARAM_RAND_SEED_GETENTROPY, BSL_PARAM_TYPE_FUNC_PTR, seedMeth->getEntropy, 0) != CRYPT_SUCCESS) { return CRYPT_DRBG_PARAM_ERROR; } } if (seedMeth->cleanEntropy != NULL) { if (BSL_PARAM_InitValue(&seedParam[iter++], CRYPT_PARAM_RAND_SEED_CLEANENTROPY, BSL_PARAM_TYPE_FUNC_PTR, seedMeth->cleanEntropy, 0) != CRYPT_SUCCESS) { return CRYPT_DRBG_PARAM_ERROR; } } if (seedMeth->getNonce != NULL) { if (BSL_PARAM_InitValue(&seedParam[iter++], CRYPT_PARAM_RAND_SEED_GETNONCE, BSL_PARAM_TYPE_FUNC_PTR, seedMeth->getNonce, 0) != CRYPT_SUCCESS) { return CRYPT_DRBG_PARAM_ERROR; } } if (seedMeth->cleanNonce != NULL) { if (BSL_PARAM_InitValue(&seedParam[iter++], CRYPT_PARAM_RAND_SEED_CLEANNONCE, BSL_PARAM_TYPE_FUNC_PTR, seedMeth->cleanNonce, 0) != CRYPT_SUCCESS) { return CRYPT_DRBG_PARAM_ERROR; } } return CRYPT_SUCCESS; } /* Initialize the global DRBG. */ static int32_t EAL_RandNew(CRYPT_RAND_AlgId id, CRYPT_RandSeedMethod *seedMeth, void *seedCtx, CRYPT_EAL_RndCtx *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->working == true) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_RAND_WORKING); return CRYPT_EAL_ERR_RAND_WORKING; } BSL_Param seedParam[6] = {BSL_PARAM_END}; int32_t ret = GetSeedParam(seedParam, seedMeth, seedCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ctx->ctx = ctx->meth->newCtx(NULL, id, seedParam); if (ctx->ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_DRBG_INIT_FAIL); return CRYPT_EAL_ERR_DRBG_INIT_FAIL; } return CRYPT_SUCCESS; } static void MethFreeCtx(CRYPT_EAL_RndCtx *ctx) { EAL_RandUnitaryMethod *meth = ctx->meth; if (meth != NULL && meth->freeCtx != NULL) { meth->freeCtx(ctx->ctx); } BSL_SAL_FREE(ctx->meth); return; } #ifdef HITLS_CRYPTO_ENTROPY int32_t EAL_SeedDrbgLockInit(void) { if (g_seedLock != NULL) { return BSL_SUCCESS; } return BSL_SAL_ThreadLockNew(&g_seedLock); } void EAL_SeedDrbgLockDeInit(void) { if (g_seedLock == NULL) { return; } BSL_SAL_ThreadLockFree(g_seedLock); g_seedLock = NULL; } void EAL_SeedDrbgRandDeinit(CRYPT_EAL_RndCtx *rndCtx) { if (rndCtx == NULL) { return; } rndCtx->working = false; MethFreeCtx(rndCtx); BSL_SAL_ThreadLockFree(rndCtx->lock); BSL_SAL_FREE(rndCtx); } void EAL_SeedDrbgDeinit(bool isDefaultSeed) { if (!isDefaultSeed) { return; } (void)BSL_SAL_ThreadWriteLock(g_seedLock); int val = 0; BSL_SAL_AtomicDownReferences(&(g_seedDrbg.references), &val); if (val > 0) { (void)BSL_SAL_ThreadUnlock(g_seedLock); return; } if (g_seedDrbg.seed != NULL) { EAL_SeedDrbgRandDeinit(g_seedDrbg.seed); g_seedDrbg.seed = NULL; CRYPT_EAL_SeedPoolFree(g_seedDrbg.seedCtx); g_seedDrbg.seedCtx = NULL; (void)memset_s(&(g_seedDrbg.seedMeth), sizeof(g_seedDrbg.seedMeth), 0, sizeof(g_seedDrbg.seedMeth)); BSL_SAL_ReferencesFree(&(g_seedDrbg.references)); } (void)BSL_SAL_ThreadUnlock(g_seedLock); } #endif void EAL_RandDeinit(CRYPT_EAL_RndCtx *ctx) { if (ctx == NULL) { return; } BSL_SAL_ThreadLockHandle lock = ctx->lock; ctx->lock = NULL; if (BSL_SAL_ThreadWriteLock(lock) != BSL_SUCCESS) { // write lock MethFreeCtx(ctx); BSL_SAL_ThreadLockFree(lock); #ifdef HITLS_CRYPTO_ENTROPY EAL_SeedDrbgDeinit(ctx->isDefaultSeed); #endif BSL_SAL_FREE(ctx); return; } ctx->working = false; MethFreeCtx(ctx); (void)BSL_SAL_ThreadUnlock(lock); BSL_SAL_ThreadLockFree(lock); // free the lock resource #ifdef HITLS_CRYPTO_ENTROPY EAL_SeedDrbgDeinit(ctx->isDefaultSeed); #endif BSL_SAL_FREE(ctx); return; } // Check whether the state of CTX is available. static int32_t CheckRndCtxState(CRYPT_EAL_RndCtx *ctx) { if (ctx->working == false) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, ctx->id, CRYPT_EAL_ERR_RAND_NO_WORKING); return CRYPT_EAL_ERR_RAND_NO_WORKING; } return CRYPT_SUCCESS; } #if defined(HITLS_CRYPTO_RAND_CB) void CRYPT_EAL_SetRandCallBack(CRYPT_EAL_RandFunc func) { g_rndFunc = func; CRYPT_RandRegist(func); return; } void CRYPT_EAL_SetRandCallBackEx(CRYPT_EAL_RandFuncEx func) { g_rndFuncEx = func; CRYPT_RandRegistEx(func); return; } #endif int32_t EAL_DrbgbytesWithAdin(CRYPT_EAL_RndCtx *ctx, uint8_t *byte, uint32_t len, uint8_t *addin, uint32_t addinLen) { if (ctx == NULL || ctx->meth == NULL || ctx->meth->gen == NULL || byte == NULL || len == 0) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, CRYPT_RAND_ALGID_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret; RETURN_RAND_LOCK(ctx, ret); // write lock ret = CheckRndCtxState(ctx); if (ret != CRYPT_SUCCESS) { RAND_UNLOCK(ctx); return ret; } ret = ctx->meth->gen(ctx->ctx, byte, len, addin, addinLen, NULL); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, ctx->id, ret); } RAND_UNLOCK(ctx); return ret; } int32_t EAL_DrbgSeedWithAdin(CRYPT_EAL_RndCtx *ctx, uint8_t *addin, uint32_t addinLen) { if (ctx == NULL || ctx->meth == NULL || ctx->meth->reSeed == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, CRYPT_RAND_ALGID_MAX, CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret; RETURN_RAND_LOCK(ctx, ret); // write lock ret = CheckRndCtxState(ctx); if (ret != CRYPT_SUCCESS) { RAND_UNLOCK(ctx); return ret; } ret = ctx->meth->reSeed(ctx->ctx, addin, addinLen, NULL); if (ret != CRYPT_SUCCESS) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, ctx->id, ret); } RAND_UNLOCK(ctx); return ret; } void EAL_RandDrbgFree(void *ctx) { if (ctx == NULL) { return; } DRBG_Ctx *drbg = (DRBG_Ctx *)ctx; DRBG_Free(drbg); return; } #ifdef HITLS_CRYPTO_ENTROPY static int32_t GetSeedDrbgEntropy(void *ctx, CRYPT_Data *entropy, uint32_t strength, CRYPT_Range *lenRange) { int32_t ret; CRYPT_EAL_RndCtx *seed = (CRYPT_EAL_RndCtx *)ctx; uint32_t strengthBytes = (strength + 7) / 8; // Figure out how many bytes needed. entropy->len = ((strengthBytes > lenRange->min) ? strengthBytes : lenRange->min); if (entropy->len > lenRange->max) { BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_RANGE_ERROR); return CRYPT_ENTROPY_RANGE_ERROR; } entropy->data = BSL_SAL_Malloc(entropy->len); if (entropy->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ret = EAL_DrbgbytesWithAdin(seed, entropy->data, entropy->len, NULL, 0); if (ret != CRYPT_SUCCESS) { BSL_SAL_FREE(entropy->data); } return ret; } static void CleanSeedDrbgEntropy(void *ctx, CRYPT_Data *entropy) { (void)ctx; BSL_SAL_CleanseData(entropy->data, entropy->len); BSL_SAL_FREE(entropy->data); } void EAL_SeedDrbgEntropyMeth(CRYPT_RandSeedMethod *meth) { meth->getEntropy = GetSeedDrbgEntropy; meth->cleanEntropy = CleanSeedDrbgEntropy; meth->cleanNonce = CleanSeedDrbgEntropy; meth->getNonce = GetSeedDrbgEntropy; } static int32_t SetSeedDrbgReseedInfo(CRYPT_EAL_RndCtx *rndCtx) { int32_t ret; #if defined(HITLS_CRYPTO_DRBG_GM) if (g_seedDrbg.id == CRYPT_RAND_SM3 || g_seedDrbg.id == CRYPT_RAND_SM4_CTR_DF) { uint32_t gmLevel = 2; // Set gm level 2 ret = rndCtx->meth->ctrl(rndCtx->ctx, CRYPT_CTRL_SET_GM_LEVEL, &gmLevel, sizeof(uint32_t)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } #endif uint32_t reseedInterval = DRBG_RESEED_INTERVAL; ret = rndCtx->meth->ctrl(rndCtx->ctx, CRYPT_CTRL_SET_RESEED_INTERVAL, &reseedInterval, sizeof(uint32_t)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t EAL_SeedDrbgInit(EAL_SeedDrbg *seedDrbg) { CRYPT_RandSeedMethod seedMethond = {0}; int32_t ret = EAL_SetDefaultEntropyMeth(&seedMethond); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } CRYPT_EAL_SeedPoolCtx *seedPoolCtx = CRYPT_EAL_SeedPoolNew(false); if (seedPoolCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_NEW_ERROR); return CRYPT_SEED_POOL_NEW_ERROR; } CRYPT_EAL_RndCtx *rndCtx = EAL_RandNewDrbg(seedDrbg->id, &seedMethond, seedPoolCtx); if (rndCtx == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = SetSeedDrbgReseedInfo(rndCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } ret = rndCtx->meth->inst(rndCtx->ctx, NULL, 0, NULL); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } rndCtx->working = true; seedDrbg->seed = rndCtx; seedDrbg->seedMeth = seedMethond; seedDrbg->seedCtx = seedPoolCtx; BSL_SAL_ReferencesInit(&(seedDrbg->references)); return CRYPT_SUCCESS; EXIT: CRYPT_EAL_SeedPoolFree(seedPoolCtx); EAL_RandDeinit(rndCtx); return ret; } int32_t EAL_GetDefaultSeed(CRYPT_RandSeedMethod *seedMeth, void **seedCtx) { EAL_SeedDrbgEntropyMeth(seedMeth); (void)BSL_SAL_ThreadWriteLock(g_seedLock); if (g_seedDrbg.seed != NULL) { *seedCtx = g_seedDrbg.seed; int val = 0; BSL_SAL_AtomicUpReferences(&(g_seedDrbg.references), &val); (void)BSL_SAL_ThreadUnlock(g_seedLock); return CRYPT_SUCCESS; } int32_t ret = EAL_SeedDrbgInit(&g_seedDrbg); if (ret != CRYPT_SUCCESS) { (void)BSL_SAL_ThreadUnlock(g_seedLock); return CRYPT_EAL_ERR_DRBG_INIT_FAIL; } *seedCtx = g_seedDrbg.seed; (void)BSL_SAL_ThreadUnlock(g_seedLock); return CRYPT_SUCCESS; } #endif static CRYPT_EAL_RndCtx *EAL_RandNewDrbg(CRYPT_RAND_AlgId id, CRYPT_RandSeedMethod *seedMeth, void *seedCtx) { #ifdef HITLS_CRYPTO_ASM_CHECK if (CRYPT_ASMCAP_Drbg(id) != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return NULL; } #endif CRYPT_RandSeedMethod seedMethTmp = {0}; CRYPT_RandSeedMethod *seedMethond = seedMeth; EAL_RandUnitaryMethod *meth = NULL; void *seedTmp = NULL; int32_t ret; CRYPT_EAL_RndCtx *randCtx = (CRYPT_EAL_RndCtx *)BSL_SAL_Calloc(1, sizeof(CRYPT_EAL_RndCtx)); if (randCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } randCtx->isDefaultSeed = false; if (seedMeth == NULL || seedMeth->getEntropy == NULL) { #ifdef HITLS_CRYPTO_ENTROPY ret = EAL_GetDefaultSeed(&seedMethTmp, &seedTmp); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } seedCtx = seedTmp; seedMethond = &seedMethTmp; randCtx->isDefaultSeed = true; #else (void)seedMethTmp; (void)seedTmp; BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); goto ERR; #endif } meth = EAL_RandGetMethod(); // Apply for lock resources. ret = BSL_SAL_ThreadLockNew(&(randCtx->lock)); if (ret != CRYPT_SUCCESS) { goto ERR; } randCtx->isProvider = false; randCtx->working = false; randCtx->id = id; ret = EAL_RandSetMeth(meth, randCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = EAL_RandNew(id, seedMethond, seedCtx, randCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } return randCtx; ERR: EAL_RandDeinit(randCtx); return NULL; } #ifdef HITLS_CRYPTO_DRBG static CRYPT_EAL_RndCtx *g_globalRndCtx = NULL; static int32_t DrbgParaIsValid(CRYPT_RAND_AlgId id, const CRYPT_RandSeedMethod *seedMeth, const void *seedCtx, const uint8_t *pers, uint32_t persLen) { if (DRBG_GetIdMap(id) == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } if (seedMeth == NULL && seedCtx != NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pers == NULL && persLen != 0) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (seedMeth != NULL && seedMeth->getEntropy == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } return CRYPT_SUCCESS; } int32_t CRYPT_EAL_RandInit(CRYPT_RAND_AlgId id, CRYPT_RandSeedMethod *seedMeth, void *seedCtx, const uint8_t *pers, uint32_t persLen) { CRYPT_EAL_RndCtx *ctx = NULL; if (g_globalRndCtx != NULL) { // Prevent DRBG repeated Init BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_DRBG_REPEAT_INIT); return CRYPT_EAL_ERR_DRBG_REPEAT_INIT; } int32_t ret = DrbgParaIsValid(id, seedMeth, seedCtx, pers, persLen); if (ret != CRYPT_SUCCESS) { return ret; } ctx = EAL_RandNewDrbg(id, seedMeth, seedCtx); if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, id, CRYPT_EAL_ERR_DRBG_INIT_FAIL); return CRYPT_EAL_ERR_DRBG_INIT_FAIL; } ret = CRYPT_EAL_DrbgInstantiate(ctx, pers, persLen); if (ret != CRYPT_SUCCESS) { EAL_RandDeinit(ctx); return ret; } CRYPT_RandRegist((CRYPT_EAL_RandFunc)CRYPT_EAL_Randbytes); g_globalRndCtx = ctx; return CRYPT_SUCCESS; } int32_t CRYPT_EAL_RandbytesWithAdin(uint8_t *byte, uint32_t len, uint8_t *addin, uint32_t addinLen) { if (g_globalRndCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, CRYPT_RAND_ALGID_MAX, CRYPT_EAL_ERR_GLOBAL_DRBG_NULL); return CRYPT_EAL_ERR_GLOBAL_DRBG_NULL; } return EAL_DrbgbytesWithAdin(g_globalRndCtx, byte, len, addin, addinLen); } int32_t CRYPT_EAL_Randbytes(uint8_t *byte, uint32_t len) { #if defined(HITLS_CRYPTO_RAND_CB) if (g_rndFunc != NULL) { return g_rndFunc(byte, len); } #endif return CRYPT_EAL_RandbytesWithAdin(byte, len, NULL, 0); } int32_t CRYPT_EAL_RandSeedWithAdin(uint8_t *addin, uint32_t addinLen) { if (g_globalRndCtx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, CRYPT_RAND_ALGID_MAX, CRYPT_EAL_ERR_GLOBAL_DRBG_NULL); return CRYPT_EAL_ERR_GLOBAL_DRBG_NULL; } return EAL_DrbgSeedWithAdin(g_globalRndCtx, addin, addinLen); } int32_t CRYPT_EAL_RandSeed(void) { return CRYPT_EAL_RandSeedWithAdin(NULL, 0); } bool CRYPT_EAL_RandIsValidAlgId(CRYPT_RAND_AlgId id) { return (DRBG_GetIdMap(id) != NULL); } #endif // end of HITLS_CRYPTO_DRBG int32_t CRYPT_EAL_DrbgInstantiate(CRYPT_EAL_RndCtx *rndCtx, const uint8_t *pers, uint32_t persLen) { if (rndCtx == NULL || rndCtx->meth == NULL || rndCtx->meth->inst == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret; RETURN_RAND_LOCK(rndCtx, ret); ret = rndCtx->meth->inst(rndCtx->ctx, pers, persLen, NULL); if (ret != CRYPT_SUCCESS) { RAND_UNLOCK(rndCtx); return ret; } rndCtx->working = true; RAND_UNLOCK(rndCtx); return ret; } CRYPT_EAL_RndCtx *CRYPT_EAL_DrbgNew(CRYPT_RAND_AlgId id, CRYPT_RandSeedMethod *seedMeth, void *seedCtx) { if (seedMeth == NULL && seedCtx != NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, id, CRYPT_NULL_INPUT); return NULL; } return EAL_RandNewDrbg(id, seedMeth, seedCtx); } int32_t CRYPT_EAL_DrbgSeedWithAdin(CRYPT_EAL_RndCtx *ctx, uint8_t *addin, uint32_t addinLen) { return EAL_DrbgSeedWithAdin(ctx, addin, addinLen); } int32_t CRYPT_EAL_DrbgSeed(CRYPT_EAL_RndCtx *ctx) { return CRYPT_EAL_DrbgSeedWithAdin(ctx, NULL, 0); } int32_t CRYPT_EAL_DrbgbytesWithAdin(CRYPT_EAL_RndCtx *ctx, uint8_t *byte, uint32_t len, uint8_t *addin, uint32_t addinLen) { return EAL_DrbgbytesWithAdin(ctx, byte, len, addin, addinLen); } int32_t CRYPT_EAL_Drbgbytes(CRYPT_EAL_RndCtx *ctx, uint8_t *byte, uint32_t len) { return CRYPT_EAL_DrbgbytesWithAdin(ctx, byte, len, NULL, 0); } void CRYPT_EAL_DrbgDeinit(CRYPT_EAL_RndCtx *ctx) { EAL_RandDeinit(ctx); return; } CRYPT_EAL_RndCtx *CRYPT_EAL_GetSeedCtx(bool isParentEntropy) { if (isParentEntropy) { #ifdef HITLS_CRYPTO_ENTROPY return g_seedDrbg.seed; #else return NULL; #endif } return g_globalRndCtx; } static int32_t GetDrbgWorkingStatus(CRYPT_EAL_RndCtx *rndCtx, void *val, uint32_t len) { RETURN_RET_IF(val == NULL, CRYPT_NULL_INPUT); RETURN_RET_IF(len != sizeof(uint32_t), CRYPT_INVALID_ARG); *(uint32_t *)val = (uint32_t)(rndCtx->working); return CRYPT_SUCCESS; } int32_t CRYPT_EAL_DrbgCtrl(CRYPT_EAL_RndCtx *rndCtx, int32_t opt, void *val, uint32_t len) { if (rndCtx == NULL || rndCtx->meth == NULL || rndCtx->meth->ctrl == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (opt == CRYPT_CTRL_GET_WORKING_STATUS) { return GetDrbgWorkingStatus(rndCtx, val, len); } int32_t ret; RETURN_RAND_LOCK(rndCtx, ret); if (rndCtx->working == true) { RAND_UNLOCK(rndCtx); BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_RAND_WORKING); return CRYPT_EAL_ERR_RAND_WORKING; } ret = rndCtx->meth->ctrl(rndCtx->ctx, opt, val, len); RAND_UNLOCK(rndCtx); return ret; } #ifdef HITLS_CRYPTO_PROVIDER int32_t CRYPT_EAL_SetRandMethod(CRYPT_EAL_RndCtx *ctx, const CRYPT_EAL_Func *funcs) { int32_t index = 0; EAL_RandUnitaryMethod *method = BSL_SAL_Calloc(1, sizeof(EAL_RandUnitaryMethod)); if (method == NULL) { BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL); return BSL_MALLOC_FAIL; } while (funcs[index].id != 0) { switch (funcs[index].id) { case CRYPT_EAL_IMPLRAND_DRBGNEWCTX: method->newCtx = funcs[index].func; break; case CRYPT_EAL_IMPLRAND_DRBGINST: method->inst = funcs[index].func; break; case CRYPT_EAL_IMPLRAND_DRBGUNINST: method->unInst = funcs[index].func; break; case CRYPT_EAL_IMPLRAND_DRBGGEN: method->gen = funcs[index].func; break; case CRYPT_EAL_IMPLRAND_DRBGRESEED: method->reSeed = funcs[index].func; break; case CRYPT_EAL_IMPLRAND_DRBGCTRL: method->ctrl = funcs[index].func; break; case CRYPT_EAL_IMPLRAND_DRBGFREECTX: method->freeCtx = funcs[index].func; break; default: BSL_SAL_Free(method); BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL); return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL; } index++; } ctx->meth = method; return CRYPT_SUCCESS; } static CRYPT_EAL_RndCtx *EAL_ProvRandInitDrbg(CRYPT_EAL_LibCtx *libCtx, CRYPT_RAND_AlgId id, const char *attrName, BSL_Param *param) { const CRYPT_EAL_Func *funcs = NULL; void *provCtx = NULL; int32_t ret = CRYPT_EAL_ProviderGetFuncs(libCtx, CRYPT_EAL_OPERAID_RAND, id, attrName, &funcs, &provCtx); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return NULL; } CRYPT_EAL_RndCtx *randCtx = BSL_SAL_Calloc(1, sizeof(CRYPT_EAL_RndCtx)); if (randCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } // Apply for lock resources. ret = BSL_SAL_ThreadLockNew(&(randCtx->lock)); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); BSL_SAL_FREE(randCtx); return NULL; } randCtx->isDefaultSeed = false; randCtx->isProvider = true; randCtx->working = false; randCtx->id = id; ret = CRYPT_EAL_SetRandMethod(randCtx, funcs); if (ret != CRYPT_SUCCESS) { goto ERR; } if (randCtx->meth->newCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); goto ERR; } randCtx->ctx = randCtx->meth->newCtx(provCtx, id, param); if (randCtx->ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_DRBG_INIT_FAIL); goto ERR; } return randCtx; ERR: BSL_SAL_ThreadLockFree(randCtx->lock); // free the lock resource BSL_SAL_FREE(randCtx->meth); BSL_SAL_FREE(randCtx); return NULL; } int32_t CRYPT_EAL_ProviderRandInitCtxInner(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName, const uint8_t *pers, uint32_t persLen, BSL_Param *param) { CRYPT_EAL_RndCtx *ctx = NULL; CRYPT_EAL_LibCtx *localLibCtx = NULL; localLibCtx = libCtx; if (localLibCtx == NULL) { localLibCtx = CRYPT_EAL_GetGlobalLibCtx(); } if (localLibCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_INVALID_LIB_CTX); return CRYPT_PROVIDER_INVALID_LIB_CTX; } if (localLibCtx->drbg != NULL) { // Prevent DRBG repeated Init EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, algId, CRYPT_EAL_ERR_DRBG_REPEAT_INIT); return CRYPT_EAL_ERR_DRBG_REPEAT_INIT; } ctx = EAL_ProvRandInitDrbg(libCtx, algId, attrName, param); if (ctx == NULL) { EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, algId, CRYPT_EAL_ERR_DRBG_INIT_FAIL); return CRYPT_EAL_ERR_DRBG_INIT_FAIL; } if (ctx->meth->inst == NULL) { EAL_RandDeinit(ctx); return CRYPT_EAL_ERR_DRBG_INIT_FAIL; } int32_t ret = ctx->meth->inst(ctx->ctx, pers, persLen, param); if (ret != CRYPT_SUCCESS) { EAL_RandDeinit(ctx); return ret; } ctx->working = true; CRYPT_RandRegistEx((CRYPT_EAL_RandFuncEx)CRYPT_EAL_RandbytesEx); localLibCtx->drbg = ctx; return CRYPT_SUCCESS; } #endif // end of HITLS_CRYPTO_PROVIDER CRYPT_EAL_RndCtx *CRYPT_EAL_ProviderDrbgNewCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName, BSL_Param *param) { #ifdef HITLS_CRYPTO_PROVIDER return EAL_ProvRandInitDrbg(libCtx, algId, attrName, param); #else (void) libCtx; (void) algId; (void) attrName; (void) param; return NULL; #endif } int32_t CRYPT_EAL_NoProviderRandInitCtxInner(int32_t algId, const uint8_t *pers, uint32_t persLen, BSL_Param *param) { CRYPT_RandSeedMethod seedMeth = {0}; void *seedCtx = NULL; const BSL_Param *temp = NULL; int32_t ret; bool hasEnt = false; if ((temp = BSL_PARAM_FindParam(param, CRYPT_PARAM_RAND_SEED_GETENTROPY)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_GETENTROPY, BSL_PARAM_TYPE_FUNC_PTR, (void **)&(seedMeth.getEntropy), NULL), ret); hasEnt = true; } if ((temp = BSL_PARAM_FindParam(param, CRYPT_PARAM_RAND_SEED_CLEANENTROPY)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_CLEANENTROPY, BSL_PARAM_TYPE_FUNC_PTR, (void **)&(seedMeth.cleanEntropy), NULL), ret); hasEnt = true; } if ((temp = BSL_PARAM_FindParam(param, CRYPT_PARAM_RAND_SEED_GETNONCE)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_GETNONCE, BSL_PARAM_TYPE_FUNC_PTR, (void **)&(seedMeth.getNonce), NULL), ret); hasEnt = true; } if ((temp = BSL_PARAM_FindParam(param, CRYPT_PARAM_RAND_SEED_CLEANNONCE)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_CLEANNONCE, BSL_PARAM_TYPE_FUNC_PTR, (void **)&(seedMeth.cleanNonce), NULL), ret); hasEnt = true; } if ((temp = BSL_PARAM_FindParam(param, CRYPT_PARAM_RAND_SEEDCTX)) != NULL) { GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEEDCTX, BSL_PARAM_TYPE_CTX_PTR, &seedCtx, NULL), ret); } if (hasEnt) { ret = CRYPT_EAL_RandInit(algId, &seedMeth, seedCtx, pers, persLen); } else { ret = CRYPT_EAL_RandInit(algId, NULL, seedCtx, pers, persLen); } if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } ERR: return ret; } int32_t CRYPT_EAL_ProviderRandInitCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName, const uint8_t *pers, uint32_t persLen, BSL_Param *param) { #ifdef HITLS_CRYPTO_PROVIDER return CRYPT_EAL_ProviderRandInitCtxInner(libCtx, algId, attrName, pers, persLen, param); #else (void) libCtx; (void) attrName; return CRYPT_EAL_NoProviderRandInitCtxInner(algId, pers, persLen, param); #endif } void CRYPT_EAL_RandDeinitEx(CRYPT_EAL_LibCtx *libCtx) { #ifdef HITLS_CRYPTO_PROVIDER CRYPT_EAL_LibCtx *localLibCtx = libCtx; if (localLibCtx == NULL) { localLibCtx = CRYPT_EAL_GetGlobalLibCtx(); } if (localLibCtx == NULL) { return; } EAL_RandDeinit(localLibCtx->drbg); localLibCtx->drbg = NULL; return; #else (void) libCtx; CRYPT_EAL_RandDeinit(); return; #endif } void CRYPT_EAL_RandDeinit(void) { EAL_RandDeinit(g_globalRndCtx); g_globalRndCtx = NULL; return; } #ifdef HITLS_CRYPTO_PROVIDER int32_t CRYPT_EAL_RandbytesWithAdinEx(CRYPT_EAL_LibCtx *libCtx, uint8_t *byte, uint32_t len, uint8_t *addin, uint32_t addinLen) { CRYPT_EAL_LibCtx *localCtx = libCtx; if (localCtx == NULL) { localCtx = CRYPT_EAL_GetGlobalLibCtx(); } if (localCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_INVALID_LIB_CTX); return CRYPT_PROVIDER_INVALID_LIB_CTX; } return EAL_DrbgbytesWithAdin((CRYPT_EAL_RndCtx *)localCtx->drbg, byte, len, addin, addinLen); } #endif int32_t CRYPT_EAL_RandbytesEx(CRYPT_EAL_LibCtx *libCtx, uint8_t *byte, uint32_t len) { #ifdef HITLS_CRYPTO_PROVIDER CRYPT_EAL_LibCtx *localCtx = libCtx; if (localCtx == NULL) { localCtx = CRYPT_EAL_GetGlobalLibCtx(); } if (localCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_INVALID_LIB_CTX); return CRYPT_PROVIDER_INVALID_LIB_CTX; } return EAL_DrbgbytesWithAdin((CRYPT_EAL_RndCtx *)localCtx->drbg, byte, len, NULL, 0); #else (void) libCtx; return CRYPT_EAL_Randbytes(byte, len); #endif } int32_t CRYPT_EAL_RandSeedEx(CRYPT_EAL_LibCtx *libCtx) { #ifdef HITLS_CRYPTO_PROVIDER CRYPT_EAL_LibCtx *localCtx = libCtx; if (localCtx == NULL) { localCtx = CRYPT_EAL_GetGlobalLibCtx(); } if (localCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_INVALID_LIB_CTX); return CRYPT_PROVIDER_INVALID_LIB_CTX; } return EAL_DrbgSeedWithAdin((CRYPT_EAL_RndCtx *)localCtx->drbg, NULL, 0); #else (void) libCtx; return CRYPT_EAL_RandSeed(); #endif } #endif // end of HITLS_CRYPTO_EAL && HITLS_CRYPTO_DRBG
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_rand.c
C
unknown
30,091
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_DRBG) #include <stdint.h> #include <stdbool.h> #include <securec.h> #include "crypt_eal_rand.h" #include "crypt_errno.h" #include "bsl_errno.h" #include "bsl_err_internal.h" #include "bsl_sal.h" #include "eal_common.h" #include "crypt_types.h" #include "crypt_local_types.h" #include "crypt_algid.h" #include "crypt_drbg.h" #include "crypt_drbg_local.h" #ifdef HITLS_CRYPTO_MD #include "eal_md_local.h" #endif #ifdef HITLS_CRYPTO_MAC #include "eal_mac_local.h" #endif #ifdef HITLS_CRYPTO_CIPHER #include "eal_cipher_local.h" #endif static EAL_RandUnitaryMethod g_randMethod = { .newCtx = (RandDrbgNewCtx)DRBG_New, .inst = (RandDrbgInst)DRBG_Instantiate, .unInst = (RandDrbgUnInst)DRBG_Uninstantiate, .gen = (RandDrbgGen)DRBG_GenerateBytes, .reSeed = (RandDrbgReSeed)DRBG_Reseed, .ctrl = (RandDrbgCtrl)DRBG_Ctrl, .freeCtx = (RandDrbgFreeCtx)DRBG_Free, }; EAL_RandUnitaryMethod* EAL_RandGetMethod(void) { return &g_randMethod; } static int32_t GetRequiredMethod(const DrbgIdMap *map, EAL_RandMethLookup *lu) { switch (map->type) { #ifdef HITLS_CRYPTO_DRBG_HASH case RAND_TYPE_MD: { const EAL_MdMethod *md = EAL_MdFindDefaultMethod(map->depId); if (md == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } lu->methodId = map->depId; lu->method = md; break; } #endif #ifdef HITLS_CRYPTO_DRBG_HMAC case RAND_TYPE_MAC: { lu->method = EAL_MacFindDefaultMethod(map->depId); if (lu->method == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } lu->methodId = map->depId; break; } #endif #ifdef HITLS_CRYPTO_DRBG_CTR case RAND_TYPE_SM4_DF: case RAND_TYPE_AES: case RAND_TYPE_AES_DF: { const EAL_SymMethod *ciphMeth = EAL_GetSymMethod(map->depId); if (ciphMeth == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } lu->methodId = map->depId; lu->method = ciphMeth; break; } #endif default: BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } return CRYPT_SUCCESS; } int32_t EAL_RandFindMethod(CRYPT_RAND_AlgId id, EAL_RandMethLookup *lu) { if (lu == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } const DrbgIdMap *map = DRBG_GetIdMap(id); if (map == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID); return CRYPT_EAL_ERR_ALGID; } int32_t ret = GetRequiredMethod(map, lu); if (ret != CRYPT_SUCCESS) { return ret; } lu->type = map->type; return CRYPT_SUCCESS; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/eal/src/eal_rand_method.c
C
unknown
3,536
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_EALINIT_H #define CRYPT_EALINIT_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_ASM_CHECK #include <stdint.h> #ifdef __cplusplus extern "C" { #endif // __cplusplus /** * @ingroup crypt_asmcap * @brief Check cpu capability for assembly implementation * * @param id [IN] algorithm id * @retval CRYPT_SUCCESS Instantiation succeeded. * @retval CRYPT_EAL_ALG_ASM_NOT_SUPPORT CPU is not supported for assembly implementation */ int32_t CRYPT_ASMCAP_Cipher(CRYPT_CIPHER_AlgId id); /** * @ingroup crypt_asmcap * @brief Check cpu capability for assembly implementation * * @param id [IN] algorithm id * @retval CRYPT_SUCCESS Instantiation succeeded. * @retval CRYPT_EAL_ALG_ASM_NOT_SUPPORT CPU is not supported for assembly implementation */ int32_t CRYPT_ASMCAP_Md(CRYPT_MD_AlgId id); /** * @ingroup crypt_asmcap * @brief Check cpu capability for assembly implementation * * @param id [IN] algorithm id * @retval CRYPT_SUCCESS Instantiation succeeded. * @retval CRYPT_EAL_ALG_ASM_NOT_SUPPORT CPU is not supported for assembly implementation */ int32_t CRYPT_ASMCAP_Pkey(CRYPT_PKEY_AlgId id); /** * @ingroup crypt_asmcap * @brief Check cpu capability for assembly implementation * * @param id [IN] algorithm id * @retval CRYPT_SUCCESS Instantiation succeeded. * @retval CRYPT_EAL_ALG_ASM_NOT_SUPPORT CPU is not supported for assembly implementation */ int32_t CRYPT_ASMCAP_Mac(CRYPT_MAC_AlgId id); /** * @ingroup crypt_asmcap * @brief Check cpu capability for assembly implementation * * @param id [IN] algorithm id * @retval CRYPT_SUCCESS Instantiation succeeded. * @retval CRYPT_EAL_ALG_ASM_NOT_SUPPORT CPU is not supported for assembly implementation */ int32_t CRYPT_ASMCAP_Drbg(CRYPT_RAND_AlgId id); #ifdef __cplusplus } #endif // __cplusplus #endif // HITLS_CRYPTO_ASM_CHECK #endif // CRYPT_EALINIT_H
2401_83913325/openHiTLS-examples_7925
crypto/ealinit/include/crypt_ealinit.h
C
unknown
2,512
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ASM_CHECK #ifdef __cplusplus extern "c" { #endif #include "crypt_errno.h" #include "crypt_utils.h" #include "bsl_err_internal.h" #include "asmcap_local.h" #if defined(HITLS_CRYPTO_CIPHER) #if defined(HITLS_CRYPTO_AES_ASM) int32_t CRYPT_AES_AsmCheck(void) { #if defined(HITLS_CRYPTO_AES_X8664) if (!IsSupportAVX() || !IsOSSupportAVX() || !IsSupportAES() || !IsSupportSSE2()) { // SetEncryptKey256 uses AVX and SSE2. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #elif defined(HITLS_CRYPTO_AES_ARMV8) if (!IsSupportPMULL() || !IsSupportAES()) { // ARMV8 should support the PMULL instruction sets. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_AES_ASM #if defined(HITLS_CRYPTO_CHACHA20_ASM) int32_t CRYPT_CHACHA20_AsmCheck(void) { #if defined(HITLS_CRYPTO_CHACHA20_X8664) if (!IsSupportAVX() || !IsOSSupportAVX() || !IsSupportAVX2()) { // The CHACHA20_Update function uses the AVX and AVX2 instruction sets. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_CHACHA20 #if defined(HITLS_CRYPTO_CHACHA20POLY1305_ASM) int32_t CRYPT_POLY1305_AsmCheck(void) { #if defined(HITLS_CRYPTO_CHACHA20POLY1305_X8664) if (!IsSupportAVX() || !IsOSSupportAVX() || !IsSupportAVX2() || !IsSupportSSE2()) { // The Poly1305BlockAVX2 function uses AVX, AVX2, and SSE2. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_CHACHA20POLY1305 #if defined(HITLS_CRYPTO_SM4_ASM) int32_t CRYPT_SM4_AsmCheck(void) { #if defined(HITLS_CRYPTO_SM4_X8664) if ((!IsSupportAVX()) || !IsOSSupportAVX() || !IsSupportAVX2() || (!IsSupportAES()) || (!IsSupportMOVBE())) { // The AES instruction is used for the SBOX assembly in the XTS. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #elif (HITLS_CRYPTO_SM4_ARMV8) if (!IsSupportAES()) { // sbox uses the AES instruction. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_SM4 #if defined(HITLS_CRYPTO_GCM_ASM) int32_t CRYPT_GHASH_AsmCheck(void) { #if defined(HITLS_CRYPTO_GCM_X8664) if (!IsSupportAVX() || !IsOSSupportAVX()) { // GcmTableGen4bit uses the AVX. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #elif defined(HITLS_CRYPTO_GCM_ARMV8) if (!IsSupportPMULL()) { // In ARMV8, GHASH_BLOCK must support the PMULL instruction set. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_GCM #endif // HITLS_CRYPTO_CIPHER #if defined(HITLS_CRYPTO_MD) #if defined(HITLS_CRYPTO_MD5_ASM) int32_t CRYPT_MD5_AsmCheck(void) { #if defined(HITLS_CRYPTO_MD5_X8664) if (!IsSupportBMI1()) { // MD5_Compress uses the BMI1 instruction set. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_MD5 #if defined(HITLS_CRYPTO_SHA1_ASM) int32_t CRYPT_SHA1_AsmCheck(void) { #if defined(HITLS_CRYPTO_SHA1_X8664) if (!IsSupportAVX() || !IsOSSupportAVX() || !IsSupportAVX2() || !IsSupportBMI1() || !IsSupportBMI2()) { // The SHA1_Step function uses the AVX, AVX2, BMI1, and BMI2 instruction sets. return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_SHA1 #if defined(HITLS_CRYPTO_SHA2_ASM) int32_t CRYPT_SHA2_AsmCheck(void) { #if defined(HITLS_CRYPTO_SHA2_X8664) if (!IsSupportAVX() || !IsOSSupportAVX() || !IsSupportAVX2() || !IsSupportBMI1() || !IsSupportBMI2()) { // The SHA*CompressMultiBlocks_Asm function uses the AVX, AVX2, BMI1, and BMI2 instruction sets. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_SHA2 #if defined(HITLS_CRYPTO_SM3_ASM) int32_t CRYPT_SM3_AsmCheck(void) { #if defined(HITLS_CRYPTO_SM3_X8664) if (!IsSupportMOVBE()) { // MOVBE is used in the SM3_CompressAsm function. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_SM3 #endif // HITLS_CRYPTO_MD #if defined(HITLS_CRYPTO_PKEY) #if defined(HITLS_CRYPTO_BN_ASM) int32_t CRYPT_BN_AsmCheck(void) { return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_BN #if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) int32_t CRYPT_ECP256_AsmCheck(void) { #if defined(HITLS_CRYPTO_ECC_X8664) if (!IsSupportAVX() || !IsOSSupportAVX()) { // ECP256_OrdSqr uses AVX. BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } #endif return CRYPT_SUCCESS; } #endif // HITLS_CRYPTO_ECC #endif // HITLS_CRYPTO_PKEY #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_ASM_CHECK
2401_83913325/openHiTLS-examples_7925
crypto/ealinit/src/asmcap_alg_asm.c
C
unknown
6,038
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef ASMCAP_LOCAL_H #define ASMCAP_LOCAL_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_ASM_CHECK #include "crypt_ealinit.h" #ifdef __cplusplus extern "c" { #endif #if defined(HITLS_CRYPTO_CIPHER) #if defined(HITLS_CRYPTO_AES_ASM) int32_t CRYPT_AES_AsmCheck(void); #endif // HITLS_CRYPTO_AES_ASM #if defined(HITLS_CRYPTO_CHACHA20_ASM) int32_t CRYPT_CHACHA20_AsmCheck(void); #endif // HITLS_CRYPTO_CHACHA20 #if defined(HITLS_CRYPTO_CHACHA20POLY1305_ASM) int32_t CRYPT_POLY1305_AsmCheck(void); #endif // HITLS_CRYPTO_CHACHA20POLY1305 #if defined(HITLS_CRYPTO_SM4_ASM) int32_t CRYPT_SM4_AsmCheck(void); #endif // HITLS_CRYPTO_SM4 #if defined(HITLS_CRYPTO_GCM_ASM) int32_t CRYPT_GHASH_AsmCheck(void); #endif // HITLS_CRYPTO_GCM #endif // HITLS_CRYPTO_CIPHER #if defined(HITLS_CRYPTO_MD) #if defined(HITLS_CRYPTO_MD5_ASM) int32_t CRYPT_MD5_AsmCheck(void); #endif // HITLS_CRYPTO_MD5 #if defined(HITLS_CRYPTO_SHA1_ASM) int32_t CRYPT_SHA1_AsmCheck(void); #endif // HITLS_CRYPTO_SHA1 #if defined(HITLS_CRYPTO_SHA2_ASM) int32_t CRYPT_SHA2_AsmCheck(void); #endif // HITLS_CRYPTO_SHA2 #if defined(HITLS_CRYPTO_SM3_ASM) int32_t CRYPT_SM3_AsmCheck(void); #endif // HITLS_CRYPTO_SM3 #endif // HITLS_CRYPTO_MD #if defined(HITLS_CRYPTO_PKEY) #if defined(HITLS_CRYPTO_BN_ASM) int32_t CRYPT_BN_AsmCheck(void); #endif // HITLS_CRYPTO_BN_ASM #if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) int32_t CRYPT_ECP256_AsmCheck(void); #endif // HITLS_CRYPTO_ECC #endif // HITLS_CRYPTO_PKEY #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_ASM_CHECK #endif // ASMCAP_LOCAL_H
2401_83913325/openHiTLS-examples_7925
crypto/ealinit/src/asmcap_local.h
C
unknown
2,112
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "crypt_utils.h" #ifdef __x86_64__ #include <cpuid.h> #include "securec.h" CpuInstrSupportState g_cpuState = {0}; /* Obtain whether the CPU supports the SIMD instruction set through the cpuid instruction. */ void GetCpuId(uint32_t eax, uint32_t ecx, uint32_t cpuId[CPU_ID_OUT_U32_CNT]) { uint32_t eaxOut, ebxOut, ecxOut, edxOut; __asm("cpuid": "=a"(eaxOut), "=b"(ebxOut), "=c"(ecxOut), "=d"(edxOut): "a"(eax), "c"(ecx):); cpuId[EAX_OUT_IDX] = eaxOut; cpuId[EBX_OUT_IDX] = ebxOut; cpuId[ECX_OUT_IDX] = ecxOut; cpuId[EDX_OUT_IDX] = edxOut; } /* Obtain whether the OS supports the SIMD instruction set by using the xgetbv instruction. */ static uint32_t GetExCtl(uint32_t ecx) { uint32_t ret = 0; __asm("xgetbv": "=a"(ret): "c"(ecx):); return ret; } bool IsSupportBMI1(void) { return g_cpuState.code7Out[EBX_OUT_IDX] & bit_BMI; } bool IsSupportMOVBE(void) { return g_cpuState.code1Out[ECX_OUT_IDX] & bit_MOVBE; } bool IsSupportBMI2(void) { return g_cpuState.code7Out[EBX_OUT_IDX] & bit_BMI2; } bool IsSupportADX(void) { return g_cpuState.code7Out[EBX_OUT_IDX] & bit_ADX; } bool IsSupportSSE(void) { return g_cpuState.code1Out[EDX_OUT_IDX] & bit_SSE; } bool IsSupportSSE2(void) { return g_cpuState.code1Out[EDX_OUT_IDX] & bit_SSE2; } bool IsSupportAVX(void) { return g_cpuState.code1Out[ECX_OUT_IDX] & bit_AVX; } bool IsSupportAES(void) { return g_cpuState.code1Out[ECX_OUT_IDX] & bit_AES; } bool IsSupportSSE3(void) { return g_cpuState.code1Out[ECX_OUT_IDX] & bit_SSE3; } bool IsSupportAVX2(void) { return g_cpuState.code7Out[EBX_OUT_IDX] & bit_AVX2; } bool IsSupportAVX512F(void) { return g_cpuState.code7Out[EBX_OUT_IDX] & bit_AVX512F; } bool IsSupportAVX512DQ(void) { return g_cpuState.code7Out[EBX_OUT_IDX] & bit_AVX512DQ; } bool IsSupportAVX512VL(void) { return g_cpuState.code7Out[EBX_OUT_IDX] & bit_AVX512VL; } bool IsSupportAVX512BW(void) { return g_cpuState.code7Out[EBX_OUT_IDX] & bit_AVX512BW; } bool IsSupportXSAVE(void) { return g_cpuState.code1Out[ECX_OUT_IDX] & bit_XSAVE; } bool IsSupportOSXSAVE(void) { return g_cpuState.code1Out[ECX_OUT_IDX] & bit_OSXSAVE; } bool IsOSSupportAVX(void) { return g_cpuState.osSupportAVX; } bool IsOSSupportAVX512(void) { return g_cpuState.osSupportAVX512; } /* ARM */ #elif defined(__arm__) || defined (__arm) || defined(__aarch64__) #include "crypt_arm.h" uint32_t g_cryptArmCpuInfo = 0; #if defined(HITLS_CRYPTO_NO_AUXVAL) #include <setjmp.h> #include <signal.h> static jmp_buf g_jump_buffer; void signal_handler(int sig) { (void)sig; longjmp(g_jump_buffer, 1); } void getarmcap(void) { struct sigaction sa, old_sa; sa.sa_handler = signal_handler; sigemptyset(&sa.sa_mask); sa.sa_flags = 0; sigaction(SIGILL, &sa, &old_sa); // NEON if (setjmp(g_jump_buffer) == 0) { #if defined(__ARM_NEON) || defined(__aarch64__) // ORR v0.16b, v0.16b, v0.16b __asm__ volatile (".inst 0x4ea01c00" : : : "v0"); g_cryptArmCpuInfo |= CRYPT_ARM_NEON; #endif #if defined(__aarch64__) // AES if (setjmp(g_jump_buffer) == 0) { // aese v0.16b, v0.16b __asm__ volatile (".inst 0x4e284800" : : : "v0"); g_cryptArmCpuInfo |= CRYPT_ARM_AES; } // PMULL if (setjmp(g_jump_buffer) == 0) { // pmull v0.1q, v0.1d, v0.1d __asm__ volatile (".inst 0x0ee0e000" : : : "v0"); g_cryptArmCpuInfo |= CRYPT_ARM_PMULL; } // SHA1 if (setjmp(g_jump_buffer) == 0) { // sha1h s0, s0 __asm__ volatile (".inst 0x5e280800" : : : "s0"); g_cryptArmCpuInfo |= CRYPT_ARM_SHA1; } // SHA256 if (setjmp(g_jump_buffer) == 0) { // sha256su0 v0.4s, v0.4s __asm__ volatile (".inst 0x5e282800" : : : "v0"); g_cryptArmCpuInfo |= CRYPT_ARM_SHA256; } // SHA512 if (setjmp(g_jump_buffer) == 0) { // sha512su0 v0.2d, v0.2d __asm__ volatile (".inst 0xcec08000" : : : "v0"); g_cryptArmCpuInfo |= CRYPT_ARM_SHA512; } #endif } sigaction(SIGILL, &old_sa, NULL); } #else #include <sys/auxv.h> static bool g_supportNEON = {0}; bool IsSupportAES(void) { return g_cryptArmCpuInfo & CRYPT_ARM_AES; } bool IsSupportPMULL(void) { return g_cryptArmCpuInfo & CRYPT_ARM_PMULL; } bool IsSupportSHA1(void) { return g_cryptArmCpuInfo & CRYPT_ARM_SHA1; } bool IsSupportSHA256(void) { return g_cryptArmCpuInfo & CRYPT_ARM_SHA256; } bool IsSupportNEON(void) { return g_supportNEON; } #if defined(__aarch64__) bool IsSupportSHA512(void) { return g_cryptArmCpuInfo & CRYPT_ARM_SHA512; } #endif // __aarch64__ #endif // HITLS_CRYPTO_NO_AUXVAL #endif // x86_64 || __arm__ || __arm || __aarch64__ void GetCpuInstrSupportState(void) { #ifdef __x86_64__ uint32_t cpuId[CPU_ID_OUT_U32_CNT]; uint64_t xcr0; /* SIMD CPU support */ GetCpuId(0x1, 0, cpuId); (void)memcpy_s(g_cpuState.code1Out, CPU_ID_OUT_U32_CNT * sizeof(uint32_t), cpuId, CPU_ID_OUT_U32_CNT * sizeof(uint32_t)); GetCpuId(0x7, 0, cpuId); (void)memcpy_s(g_cpuState.code7Out, CPU_ID_OUT_U32_CNT * sizeof(uint32_t), cpuId, CPU_ID_OUT_U32_CNT * sizeof(uint32_t)); /* SIMD OS support */ if (IsSupportXSAVE() && IsSupportOSXSAVE()) { xcr0 = GetExCtl(0); bool sse = xcr0 & XCR0_BIT_SSE; bool avx = xcr0 & XCR0_BIT_AVX; g_cpuState.osSupportAVX = sse && avx; bool opmask = xcr0 & XCR0_BIT_OPMASK; bool zmmLow = xcr0 & XCR0_BIT_ZMM_LOW; bool zmmHigh = xcr0 & XCR0_BIT_ZMM_HIGH; g_cpuState.osSupportAVX512 = opmask && zmmLow && zmmHigh; } #elif defined(__arm__) || defined (__arm) || defined(__aarch64__) #if defined(HITLS_CRYPTO_NO_AUXVAL) getarmcap(); #else // HITLS_CRYPTO_NO_AUXVAL g_supportNEON = getauxval(CRYPT_CAP) & CRYPT_ARM_NEON; if (g_supportNEON) { g_cryptArmCpuInfo = (uint32_t)getauxval(CRYPT_CE); } #endif // HITLS_CRYPTO_NO_AUXVAL #endif // defined(__arm__) || defined (__arm) || defined(__aarch64__) }
2401_83913325/openHiTLS-examples_7925
crypto/ealinit/src/cpucap.c
C
unknown
6,773
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "bsl_init.h" #include "bsl_err_internal.h" #include "crypt_local_types.h" #include "crypt_algid.h" #include "crypt_errno.h" #include "crypt_eal_rand.h" #include "crypt_utils.h" #include "asmcap_local.h" #include "crypt_ealinit.h" #include "crypt_util_rand.h" #ifdef HITLS_CRYPTO_PROVIDER #include "crypt_eal_provider.h" #include "crypt_provider.h" #endif #include "crypt_eal_init.h" static uint64_t g_ealInitOpts = 0; #if defined(HITLS_CRYPTO_PROVIDER) static int32_t ProviderModuleInit(uint64_t initOpt, int32_t alg) { (void) alg; int32_t ret = CRYPT_SUCCESS; if (initOpt & CRYPT_EAL_INIT_PROVIDER && (g_ealInitOpts & CRYPT_EAL_INIT_PROVIDER) == 0) { ret = CRYPT_EAL_InitPreDefinedProviders(); if (ret != CRYPT_SUCCESS) { return ret; } g_ealInitOpts |= CRYPT_EAL_INIT_PROVIDER; } #if defined(HITLS_CRYPTO_DRBG) if (initOpt & CRYPT_EAL_INIT_PROVIDER_RAND && (g_ealInitOpts & CRYPT_EAL_INIT_PROVIDER_RAND) == 0) { ret = CRYPT_EAL_ProviderRandInitCtx(NULL, alg, "provider=default", NULL, 0, NULL); if (ret != CRYPT_SUCCESS) { return ret; } g_ealInitOpts |= CRYPT_EAL_INIT_PROVIDER_RAND; } #endif return ret; } static void ProviderModuleFree(uint64_t initOpt) { if (!(initOpt & CRYPT_EAL_INIT_PROVIDER) || (g_ealInitOpts & CRYPT_EAL_INIT_PROVIDER) == 0) { return; } CRYPT_EAL_FreePreDefinedProviders(); } #else static int32_t ProviderModuleInit(uint64_t initOpt, int32_t alg) { (void) initOpt; (void) alg; return CRYPT_SUCCESS; } static void ProviderModuleFree(uint64_t initOpt) { (void) initOpt; return; } #endif #if defined(HITLS_BSL_INIT) static int32_t BslModuleInit(uint64_t initOpt) { if (!(initOpt & CRYPT_EAL_INIT_BSL) || (g_ealInitOpts & CRYPT_EAL_INIT_BSL) != 0) { return BSL_SUCCESS; } int32_t ret = BSL_GLOBAL_Init(); if (ret == BSL_SUCCESS) { g_ealInitOpts |= CRYPT_EAL_INIT_BSL; } return ret; } static void BslModuleFree(uint64_t initOpt) { if (!(initOpt & CRYPT_EAL_INIT_BSL) || (g_ealInitOpts & CRYPT_EAL_INIT_BSL) == 0) { return; } BSL_GLOBAL_DeInit(); } #else static int32_t BslModuleInit(uint64_t initOpt) { (void) initOpt; return CRYPT_SUCCESS; } static void BslModuleFree(uint64_t initOpt) { (void) initOpt; return; } #endif #if defined(HITLS_CRYPTO_DRBG) static void RandModuleFree(uint64_t initOpt) { if (!(initOpt & CRYPT_EAL_INIT_RAND) || (g_ealInitOpts & CRYPT_EAL_INIT_RAND) == 0) { return; } CRYPT_EAL_RandDeinit(); } static int32_t RandModuleInit(uint64_t initOpt, int32_t alg) { if (!(initOpt & CRYPT_EAL_INIT_RAND) || (g_ealInitOpts & CRYPT_EAL_INIT_RAND) != 0) { return BSL_SUCCESS; } int32_t ret = CRYPT_EAL_RandInit(alg, NULL, NULL, NULL, 0); if (ret == CRYPT_SUCCESS) { g_ealInitOpts |= CRYPT_EAL_INIT_RAND; } return ret; } #else static void RandModuleFree(uint64_t initOpt) { (void) initOpt; return; } static int32_t RandModuleInit(uint64_t initOpt, int32_t alg) { (void) alg; (void) initOpt; return CRYPT_SUCCESS; } #endif static int32_t GlobalLockInit(uint64_t initOpt, int32_t alg) { (void) alg; if ((initOpt & CRYPT_EAL_INIT_LOCK) == 0 || (g_ealInitOpts & CRYPT_EAL_INIT_LOCK) != 0) { return CRYPT_SUCCESS; } #ifdef HITLS_CRYPTO_ENTROPY int32_t ret = EAL_SeedDrbgLockInit(); if (ret != CRYPT_SUCCESS) { return ret; } #endif g_ealInitOpts |= CRYPT_EAL_INIT_LOCK; return CRYPT_SUCCESS; } static void GlobalLockFree(uint64_t initOpt) { if ((initOpt & CRYPT_EAL_INIT_LOCK) == 0 || (g_ealInitOpts & CRYPT_EAL_INIT_LOCK) == 0) { return; } #ifdef HITLS_CRYPTO_ENTROPY EAL_SeedDrbgLockDeInit(); #endif return; } #if defined(HITLS_EAL_INIT_OPTS) static bool g_ealInitOptsFlags = false; #endif #if defined(HITLS_EAL_INIT_OPTS) __attribute__((constructor(102))) int32_t CRYPT_EAL_Init(uint64_t opts) #else int32_t CRYPT_EAL_Init(uint64_t opts) #endif { int32_t ret = CRYPT_SUCCESS; uint64_t initOpt = opts; #if defined(HITLS_EAL_INIT_OPTS) if (!g_ealInitOptsFlags) { initOpt = HITLS_EAL_INIT_OPTS; g_ealInitOptsFlags = true; } #endif #if defined(HITLS_CRYPTO_INIT_RAND_ALG) int32_t alg = HITLS_CRYPTO_INIT_RAND_ALG; #else int32_t alg = CRYPT_RAND_SHA256; #endif if ((initOpt & CRYPT_EAL_INIT_CPU) && (g_ealInitOpts & CRYPT_EAL_INIT_CPU) == 0) { GetCpuInstrSupportState(); g_ealInitOpts |= CRYPT_EAL_INIT_CPU; } ret = BslModuleInit(initOpt); if (ret != CRYPT_SUCCESS) { return ret; } ret = ProviderModuleInit(initOpt, alg); if (ret != CRYPT_SUCCESS) { BslModuleFree(initOpt); return ret; } ret = RandModuleInit(initOpt, alg); if (ret != CRYPT_SUCCESS) { BslModuleFree(initOpt); ProviderModuleFree(initOpt); return ret; } ret = GlobalLockInit(initOpt, alg); if (ret != CRYPT_SUCCESS) { RandModuleFree(initOpt); BslModuleFree(initOpt); ProviderModuleFree(initOpt); return ret; } return ret; } #if defined(HITLS_EAL_INIT_OPTS) __attribute__((destructor(101))) void CRYPT_EAL_Cleanup(uint64_t opts) #else void CRYPT_EAL_Cleanup(uint64_t opts) #endif { uint64_t initOpt = opts; #if defined(HITLS_EAL_INIT_OPTS) initOpt = HITLS_EAL_INIT_OPTS; #endif ProviderModuleFree(initOpt); RandModuleFree(initOpt); BslModuleFree(initOpt); GlobalLockFree(initOpt); g_ealInitOpts = 0; } #ifdef HITLS_CRYPTO_ASM_CHECK typedef int (*HITLS_ASM_CHECK_CALLBACK)(void); typedef struct EAL_CheckAsm { uint32_t id; HITLS_ASM_CHECK_CALLBACK callback[2]; } EAL_CheckAsm; static int32_t CryptCheckCapId(const BslCid id, const EAL_CheckAsm asmlist[], uint32_t len) { for (uint32_t i = 0; i < len; i++) { if (asmlist[i].id != id) { continue; } for (uint32_t j = 0; j < 2; j++) { // 2 means Alg and Method if (asmlist[i].callback[j] != NULL && asmlist[i].callback[j]() != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT); return CRYPT_EAL_ALG_ASM_NOT_SUPPORT; } } } return CRYPT_SUCCESS; } static const EAL_CheckAsm HITLS_ASM_SYM_ALG_CHECK[] = { /* symmetric encryption/decryption combination algorithm ID */ #if defined(HITLS_CRYPTO_AES_ASM) {.id = CRYPT_CIPHER_AES128_CBC, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES192_CBC, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES256_CBC, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES128_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES192_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES256_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES128_ECB, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES192_ECB, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES256_ECB, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES128_XTS, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES256_XTS, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES128_CCM, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES192_CCM, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES256_CCM, .callback = {CRYPT_AES_AsmCheck, NULL}}, #if defined(HITLS_CRYPTO_GCM_ASM) {.id = CRYPT_CIPHER_AES128_GCM, .callback = {CRYPT_AES_AsmCheck, CRYPT_GHASH_AsmCheck}}, {.id = CRYPT_CIPHER_AES192_GCM, .callback = {CRYPT_AES_AsmCheck, CRYPT_GHASH_AsmCheck}}, {.id = CRYPT_CIPHER_AES256_GCM, .callback = {CRYPT_AES_AsmCheck, CRYPT_GHASH_AsmCheck}}, #endif // HITLS_CRYPTO_GCM_ASM {.id = CRYPT_CIPHER_AES128_CFB, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES192_CFB, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES256_CFB, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES128_OFB, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES192_OFB, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_AES256_OFB, .callback = {CRYPT_AES_AsmCheck, NULL}}, #endif // HITLS_CRYPTO_AES_ASM #if defined(HITLS_CRYPTO_CHACHA20_ASM) || defined(HITLS_CRYPTO_CHACHA20POLY1305_ASM) {.id = CRYPT_CIPHER_CHACHA20_POLY1305, .callback = {CRYPT_CHACHA20_AsmCheck, CRYPT_POLY1305_AsmCheck}}, #endif // HITLS_CRYPTO_CHACHA20POLY1305_ASM #if defined(HITLS_CRYPTO_SM4_ASM) {.id = CRYPT_CIPHER_SM4_XTS, .callback = {CRYPT_SM4_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_SM4_CBC, .callback = {CRYPT_SM4_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_SM4_ECB, .callback = {CRYPT_SM4_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_SM4_CTR, .callback = {CRYPT_SM4_AsmCheck, NULL}}, #if defined(HITLS_CRYPTO_GCM_ASM) {.id = CRYPT_CIPHER_SM4_GCM, .callback = {CRYPT_SM4_AsmCheck, CRYPT_GHASH_AsmCheck}}, #endif // HITLS_CRYPTO_GCM_ASM {.id = CRYPT_CIPHER_SM4_CFB, .callback = {CRYPT_SM4_AsmCheck, NULL}}, {.id = CRYPT_CIPHER_SM4_OFB, .callback = {CRYPT_SM4_AsmCheck, NULL}}, #endif // HITLS_CRYPTO_SM4 {.id = CRYPT_CIPHER_MAX, .callback = {NULL, NULL}}, }; int32_t CRYPT_ASMCAP_Cipher(CRYPT_CIPHER_AlgId id) { return CryptCheckCapId((BslCid)id, HITLS_ASM_SYM_ALG_CHECK, sizeof(HITLS_ASM_SYM_ALG_CHECK) / sizeof(EAL_CheckAsm)); } #if defined(HITLS_CRYPTO_MD) static const EAL_CheckAsm HITLS_ASM_MD_ALG_CHECK[] = { /* hash algorithm ID */ #if defined(HITLS_CRYPTO_MD5_ASM) {.id = CRYPT_MD_MD5, .callback = {CRYPT_MD5_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SHA1_ASM) {.id = CRYPT_MD_SHA1, .callback = {CRYPT_SHA1_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SHA2_ASM) {.id = CRYPT_MD_SHA224, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_MD_SHA256, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_MD_SHA384, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_MD_SHA512, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SM3_ASM) {.id = CRYPT_MD_SM3, .callback = {CRYPT_SM3_AsmCheck, NULL}}, #endif {.id = CRYPT_MD_MAX, .callback = {NULL, NULL}}, }; #endif int32_t CRYPT_ASMCAP_Md(CRYPT_MD_AlgId id) { return CryptCheckCapId((BslCid)id, HITLS_ASM_MD_ALG_CHECK, sizeof(HITLS_ASM_MD_ALG_CHECK) / sizeof(EAL_CheckAsm)); } #if defined(HITLS_CRYPTO_PKEY) static const EAL_CheckAsm HITLS_ASM_PKEY_ALG_CHECK[] = { /* Asymmetric algorithm ID */ #if defined(HITLS_CRYPTO_BN_ASM) {.id = CRYPT_PKEY_DSA, .callback = {CRYPT_BN_AsmCheck, NULL}}, {.id = CRYPT_PKEY_RSA, .callback = {CRYPT_BN_AsmCheck, NULL}}, {.id = CRYPT_PKEY_DH, .callback = {CRYPT_BN_AsmCheck, NULL}}, #if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) {.id = CRYPT_PKEY_ECDSA, .callback = {CRYPT_BN_AsmCheck, CRYPT_ECP256_AsmCheck}}, {.id = CRYPT_PKEY_ECDH, .callback = {CRYPT_BN_AsmCheck, CRYPT_ECP256_AsmCheck}}, #endif {.id = CRYPT_PKEY_SM2, .callback = {CRYPT_BN_AsmCheck, NULL}}, #endif {.id = CRYPT_PKEY_MAX, .callback = {NULL, NULL}}, }; int32_t CRYPT_ASMCAP_Pkey(CRYPT_PKEY_AlgId id) { return CryptCheckCapId((BslCid)id, HITLS_ASM_PKEY_ALG_CHECK, sizeof(HITLS_ASM_PKEY_ALG_CHECK) / sizeof(EAL_CheckAsm)); } #endif // HITLS_CRYPTO_PKEY #if defined(HITLS_CRYPTO_DRBG) static const EAL_CheckAsm HITLS_ASM_DRBG_ALG_CHECK[] = { /* RAND algorithm ID */ #if defined(HITLS_CRYPTO_SHA1_ASM) {.id = CRYPT_RAND_SHA1, .callback = {CRYPT_SHA1_AsmCheck, NULL}}, {.id = CRYPT_RAND_HMAC_SHA1, .callback = {CRYPT_SHA1_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SHA2_ASM) {.id = CRYPT_RAND_SHA224, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_RAND_SHA256, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_RAND_SHA384, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_RAND_SHA512, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_RAND_HMAC_SHA224, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_RAND_HMAC_SHA256, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_RAND_HMAC_SHA384, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_RAND_HMAC_SHA512, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SM3_ASM) {.id = CRYPT_RAND_SM3, .callback = {CRYPT_SM3_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_AES_ASM) {.id = CRYPT_RAND_AES128_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_RAND_AES192_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_RAND_AES256_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_RAND_AES128_CTR_DF, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_RAND_AES192_CTR_DF, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_RAND_AES256_CTR_DF, .callback = {CRYPT_AES_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SM4_ASM) {.id = CRYPT_RAND_SM4_CTR_DF, .callback = {CRYPT_SM4_AsmCheck, NULL}}, #endif {.id = CRYPT_RAND_ALGID_MAX, .callback = {NULL, NULL}}, }; int32_t CRYPT_ASMCAP_Drbg(CRYPT_RAND_AlgId id) { return CryptCheckCapId((BslCid)id, HITLS_ASM_DRBG_ALG_CHECK, sizeof(HITLS_ASM_DRBG_ALG_CHECK) / sizeof(EAL_CheckAsm)); } #endif // HITLS_CRYPTO_DRBG #if defined(HITLS_CRYPTO_MAC) static const EAL_CheckAsm HITLS_ASM_MAC_ALG_CHECK[] = { /* MAC algorithm ID */ #if defined(HITLS_CRYPTO_MD5_ASM) {.id = CRYPT_MAC_HMAC_MD5, .callback = {CRYPT_MD5_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SHA1_ASM) {.id = CRYPT_MAC_HMAC_SHA1, .callback = {CRYPT_SHA1_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SHA2_ASM) {.id = CRYPT_MAC_HMAC_SHA224, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_MAC_HMAC_SHA256, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_MAC_HMAC_SHA384, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, {.id = CRYPT_MAC_HMAC_SHA512, .callback = {CRYPT_SHA2_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_SM3_ASM) {.id = CRYPT_MAC_HMAC_SM3, .callback = {CRYPT_SM3_AsmCheck, NULL}}, #endif #if defined(HITLS_CRYPTO_AES_ASM) {.id = CRYPT_MAC_CMAC_AES128, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_MAC_CMAC_AES192, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_MAC_CMAC_AES256, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_MAC_GMAC_AES128, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_MAC_GMAC_AES192, .callback = {CRYPT_AES_AsmCheck, NULL}}, {.id = CRYPT_MAC_GMAC_AES256, .callback = {CRYPT_AES_AsmCheck, NULL}}, #endif {.id = CRYPT_MAC_MAX, .callback = {NULL, NULL}}, }; int32_t CRYPT_ASMCAP_Mac(CRYPT_MAC_AlgId id) { return CryptCheckCapId((BslCid)id, HITLS_ASM_MAC_ALG_CHECK, sizeof(HITLS_ASM_MAC_ALG_CHECK) / sizeof(EAL_CheckAsm)); } #endif // HITLS_CRYPTO_MAC #endif /* HITLS_CRYPTO_ASM_CHECK */
2401_83913325/openHiTLS-examples_7925
crypto/ealinit/src/crypt_init.c
C
unknown
15,574
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_ECC_H #define CRYPT_ECC_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include "crypt_bn.h" #include "crypt_algid.h" #include "crypt_types.h" #include "bsl_params.h" #ifdef __cplusplus extern "C" { #endif /** * Elliptic Curve Point Information */ typedef struct EccPointInfo ECC_Point; /** * Elliptic Curve Parameter Information */ typedef struct EccPara ECC_Para; /** * Point information of elliptic curve scalar after recoding */ typedef struct { int8_t *num; uint32_t *wide; uint32_t size; uint32_t baseBits; // Indicates the offset start address of the first block. uint32_t offset; } ReCodeData; /** * @ingroup ecc * @brief Creating curve parameters * * @param id [IN] Curve enumeration * * @retval Not NULL Success * @retval NULL failure */ ECC_Para *ECC_NewPara(CRYPT_PKEY_ParaId id); /** * @ingroup ecc * @brief Curve parameter release * * @param para [IN] Curve parameter information. The para is set NULL by the invoker. * * @retval None */ void ECC_FreePara(ECC_Para *para); /** * @ingroup ecc * @brief Read the curve parameter ID. * * @param para [IN] Curve parameter information * * @retval Curve ID */ CRYPT_PKEY_ParaId ECC_GetParaId(const ECC_Para *para); /** * @ingroup ecc * @brief Obtain the curve parameter ID based on the curve parameter information. * * @param eccpara [IN] Curve parameter information * * @retval Curve ID */ CRYPT_PKEY_ParaId GetCurveId(const CRYPT_EccPara *eccPara); /** * @ingroup ecc * @brief Point creation * * @param para [IN] Curve parameter information * * @retval Not NULL Success * @retval NULL failure */ ECC_Point *ECC_NewPoint(const ECC_Para *para); /** * @ingroup ecc * @brief Point Release * * @param pt [IN] Point data, pt is set to null by the invoker. * * @retval none */ void ECC_FreePoint(ECC_Point *pt); /** * @ingroup ecc * @brief Point copy * * @param dst [OUT] The copied point information * @param src [IN] Input * * @retval Not NULL Success * @retval NULL failure */ int32_t ECC_CopyPoint(ECC_Point *dst, const ECC_Point *src); /** * @ingroup ecc * @brief Generate a point data with the same content. * * @param pt [IN] Input point information * * @retval Not NULL Success * @retval NULL failure */ ECC_Point *ECC_DupPoint(const ECC_Point *pt); /** * @ingroup ecc * @brief Check if a and b are the same point * * @param para [IN] Curve parameter information * @param a [IN] Point a in Jacobian coordinate * @param b [IN] Point b in Jacobian coordinate * * @retval CRYPT_SUCCESS The two points are the same. * @retval CRYPT_ECC_POINT_NOT_EQUAL The two points are different. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_PointCmp(const ECC_Para *para, const ECC_Point *a, const ECC_Point *b); /** * @ingroup ecc * @brief Convert the Jacobian coordinate point (x, y, z) to affine coordinate (x/z^2, y/z^3, 1) and get coordinates. * * @param para [IN] Curve parameter information * @param pt [IN/OUT] Point (x, y, z) -> (x/z^2, y/z^3, 1) * @param x [OUT] x/z^2 * @param y [OUT] y/z^3 * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_GetPoint(const ECC_Para *para, ECC_Point *pt, CRYPT_Data *x, CRYPT_Data *y); /** * @ingroup ecc * @brief Convert the Jacobian coordinate point (x, y, z) to affine coordinate (x/z^2, y/z^3, 1) and get coordinats. * * @param para [IN] Curve parameter information * @param pt [IN/OUT] Point (x, y, z) -> (x/z^2, y/z^3, 1) * @param x [OUT] x/z^2 * @param y [OUT] y/z^3 * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_GetPoint2Bn(const ECC_Para *para, ECC_Point *pt, BN_BigNum *x, BN_BigNum *y); /** * @ingroup ecc * @brief Convert the Jacobian coordinate point (x, y, z) to affine coordinate (x/z^2, y/z^3, 1) and get x/z^2 * * @param para [IN] Curve parameter information * @param pt [IN/OUT] Point (x, y, z) -> (x/z^2, y/z^3, 1) * @param x [OUT] x/z^2 * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_GetPointDataX(const ECC_Para *para, ECC_Point *pt, BN_BigNum *x); /** * @ingroup ecc * @brief Calculate r = k * pt. When pt is NULL, calculate r = k * G, where G is the generator * The pre-computation table under the para parameter will be updated. * * @param para [IN] Curve parameter information * @param r [OUT] Scalar multiplication * @param k [IN] Scalar * @param pt [IN] Point data, which can be NULL. * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt); /** * @ingroup ecc * @brief Calculate r = k1 * G + k2 * pt, where G is the generator. * * @param para [IN] Curve parameter information * @param r [OUT] Point k1 * G + k2 * pt * @param k1 [IN] Scalar k1 * @param k2 [IN] Scalar k2 * @param pt [IN] Point pt * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt); /** * @ingroup ecc * @brief Convert the Jacobian coordinate point (x, y, z) to affine coordinate (x/z^2, y/z^3, 1) and encode point. * * @param para [IN] Curve parameter information * @param pt [IN/OUT] Point (x, y, z) -> (x/z^2, y/z^3, 1) * @param data [OUT] Data stream * @param dataLen [IN/OUT] The input is the buff length of data and the output is the valid length of data. * @param format [IN] Encoding format * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_EncodePoint(const ECC_Para *para, ECC_Point *pt, uint8_t *data, uint32_t *dataLen, CRYPT_PKEY_PointFormat format); /** * @ingroup ecc * @brief Encode the data stream into point information. * * @param para [IN] Curve parameter information * @param pt [OUT] Point in affine coordinate(z=1) * @param data [IN] Data stream * @param dataLen [IN] Data stream length * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_DecodePoint(const ECC_Para *para, ECC_Point *pt, const uint8_t *data, uint32_t dataLen); /** * @ingroup ecc * @brief Obtain the parameter value h based on the curve parameter. * * @param para [IN] Curve parameter information * * @retval Not NULL Success * @retval NULL failure */ BN_BigNum *ECC_GetParaH(const ECC_Para *para); /** * @ingroup ecc * @brief Obtain the parameter value n based on the curve parameter. * * @param para [IN] Curve parameter information * * @retval Not NULL Success * @retval NULL failure */ BN_BigNum *ECC_GetParaN(const ECC_Para *para); /** * @ingroup ecc * @brief Obtain the coefficient a based on curve parameters. * * @param para [IN] Curve parameter information * * @retval Not NULL Success * @retval NULL failure */ BN_BigNum *ECC_GetParaA(const ECC_Para *para); /** * @ingroup ecc * @brief Obtain the coefficient b based on curve parameters. * * @param para [IN] Curve parameter information * * @retval Not NULL Success * @retval NULL failure */ BN_BigNum *ECC_GetParaB(const ECC_Para *para); /** * @ingroup ecc * @brief Obtain the coordinate x of the base point G based on curve parameters. * * @param para [IN] Curve parameter information * * @retval Not NULL Success * @retval NULL failure */ BN_BigNum *ECC_GetParaX(const ECC_Para *para); /** * @ingroup ecc * @brief Obtain the coordinate y of the base point G based on curve parameters. * * @param para [IN] Curve parameter information * * @retval Not NULL Success * @retval NULL failure */ BN_BigNum *ECC_GetParaY(const ECC_Para *para); /** * @ingroup ecc * @brief Obtain bit length of parameter p based on the curve parameter. * * @param para [IN] Curve parameter information * * @retval Return the specification unit of the curve parameter is bits. 0 is returned when an error occurs. */ uint32_t ECC_ParaBits(const ECC_Para *para); /** * @ingroup ecc * @brief Generate a curve parameter with the same content. * * @param para [IN] Curve parameter information * * @retval Not NULL Success * @retval NULL failure */ ECC_Para *ECC_DupPara(const ECC_Para *para); /** * @ingroup ecc * @brief Check whether the point is valid. * * @param pt [IN] Point information * * @retval CRYPT_SUCCESS This point is valid. * @retval CRYPT_ECC_POINT_AT_INFINITY The point is an infinite point (0 point). * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_PointCheck(const ECC_Point *pt); /** * @ingroup ecc * @brief Obtain the generator(with z=1) based on curve parameters. * * @param para [IN] Curve parameters * * @retval Not NULL Success * @retval NULL failure */ ECC_Point *ECC_GetGFromPara(const ECC_Para *para); /** * @ingroup ecc * @brief Scalar re-encoding to obtain the encoded data whose window is the 'window'. * * @param k [IN] Curve parameters * @param window [IN] Window size * * @retval Not NULL Success * @retval NULL failure */ ReCodeData *ECC_ReCodeK(const BN_BigNum *k, uint32_t window); /** * @ingroup ecc * @brief Release the encoded data. * * @param code [IN/OUT] Data to be released. The code is set NULL by the invoker. * * @retval None */ void ECC_ReCodeFree(ReCodeData *code); /** * @brief Calculate r = 1/a mod para->n * * @param para [IN] Curve parameter information * @param r [OUT] Output modulus inverse value * @param a [IN] Input BigNum that needs to be inverted. * * @retval CRYPT_SUCCESS set successfully. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a); /** * @ingroup ecc * @brief Calculate addition r = a + b * * @param para [IN] Curve parameter * @param r [OUT] Point r = a + b * @param a [IN] Point a * @param b [IN] Point b * * @retval CRYPT_SUCCESS succeeded. * @retval For other errors, see crypt_errno.h. */ int32_t ECC_PointAddAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); /** * @ingroup ecc * @brief ecc get security bits * * @param para [IN] ecc Context structure * * @retval security bits */ int32_t ECC_GetSecBits(const ECC_Para *para); /** * @ingroup ecc * @brief Randomize z for preventing attack. * Converting a point (x, y, z) -> (x/z0^2, y/z0^3, z*z0) * @param para [IN] Curve parameters * @param pt [IN/OUT] Point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECC_PointBlind(const ECC_Para *para, ECC_Point *pt); /** * @ingroup ecc * @brief convert ecc point to mont form * @param para [IN] Curve parameters * @param pt [IN/OUT] Point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECC_PointToMont(const ECC_Para *para, ECC_Point *pt, BN_Optimizer *opt); /** * @ingroup ecc * @brief recover ecc point from mont form * @param para [IN] Curve parameters * @param pt [IN/OUT] Point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ void ECC_PointFromMont(const ECC_Para *para, ECC_Point *r); /** * @ingroup ecc * @brief convert ecc point to mont form * @param para [IN] Curve parameters * @param pt [IN/OUT] Point information * * @param libCtx [IN] Pointer to the library context * @param para [OUT] Pointer to the elliptic curve parameters */ void ECC_SetLibCtx(void *libCtx, ECC_Para *para); #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_ECC #endif // CRYPT_ECC_H
2401_83913325/openHiTLS-examples_7925
crypto/ecc/include/crypt_ecc.h
C
unknown
12,530
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef CRYPT_ECC_PKEY_H #define CRYPT_ECC_PKEY_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include "crypt_bn.h" #include "crypt_ecc.h" #include "crypt_algid.h" #include "bsl_params.h" #include "sal_atomic.h" #include "bsl_params.h" #ifdef __cplusplus extern "C" { #endif #ifndef CRYPT_ECC_TRY_MAX_CNT #define CRYPT_ECC_TRY_MAX_CNT 100 // Maximum number of attempts to generate keys and signatures #endif /* ECC key context */ typedef struct ECC_PkeyCtx { BN_BigNum *prvkey; // Private key ECC_Point *pubkey; // Public key ECC_Para *para; // Key parameter CRYPT_PKEY_PointFormat pointFormat; // Public key point format uint32_t useCofactorMode; // Indicates whether to use the cofactor mode. 1 indicates yes, and 0 indicates no. BSL_SAL_RefCount references; void *libCtx; char *mdAttr; } ECC_Pkey; /** * @ingroup ecc * @brief After the copied ECC context is used up, call the ECC_FreeCtx to release the memory. * * @param ctx [IN] Source ECC context * * @return ECC_Pkey ECC context pointer * If the operation fails, null is returned. */ ECC_Pkey *ECC_DupCtx(ECC_Pkey *ctx); /** * @ingroup ecc * @brief ecc Release the key context structure * * @param ctx [IN] Pointer to the context structure to be released. The ctx is set NULL by the invoker. */ void ECC_FreeCtx(ECC_Pkey *ctx); /** * @ingroup ecc * @brief Obtain the valid length of the key, which is used before obtaining the private key. * * @param ctx [IN] Structure from which the key length is expected to be obtained * * @retval 0 The input is incorrect or the corresponding key structure does not have a valid key length. * @retval uint32_t Valid key length greater than 0 */ uint32_t ECC_PkeyGetBits(const ECC_Pkey *ctx); /** * @ingroup ecc * @brief Obtain curve parameters. * * @param pkey [IN] Curve parameter information * @param eccPara [OUT] Curve parameter information * * @retval CRYPT_SUCCESS * @retval Other failure */ int32_t ECC_GetPara(const ECC_Pkey *pkey, CRYPT_EccPara *eccPara); /** * @ingroup ecc * @brief Generate a public key from the public key. * * @param ctx [IN] ECC key context structure * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval ECC error code. Internal ECC calculation error * @retval BN error code. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS The public key is successfully generated. */ int32_t ECC_GenPublicKey(ECC_Pkey *ctx); /** * @ingroup ecc * @brief Generate the ECC key pair. * * @param ctx [IN] dh Context structure * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval ECC error code. Internal ECC calculation error * @retval BN error code. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS The key pair is successfully generated. */ int32_t ECC_PkeyGen(ECC_Pkey *ctx); /** * @ingroup ecc * @brief ECC Set the private key data. * * @param ctx [OUT] ECC context structure * @param prv [IN] Private key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t ECC_PkeySetPrvKey(ECC_Pkey *ctx, const CRYPT_EccPrv *prv); /** * @ingroup ecc * @brief ECC Set the public key data. * * @param ctx [OUT] ECC context structure * @param pub [IN] Public key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t ECC_PkeySetPubKey(ECC_Pkey *ctx, const CRYPT_EccPub *pub); /** * @ingroup ecc * @brief ECC Obtain the private key data. * * @param ctx [IN] ECC context structure * @param prv [OUT] Private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval ECC_Pkey_KEYINFO_ERROR The key information is incorrect. * @retval BN error. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t ECC_PkeyGetPrvKey(const ECC_Pkey *ctx, CRYPT_EccPrv *prv); /** * @ingroup ecc * @brief ECC Obtain the public key data. * * @param ctx [IN] ECC context structure * @param pub [OUT] Public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval ECC_Pkey_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval ECC_Pkey_KEYINFO_ERROR The key information is incorrect. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t ECC_PkeyGetPubKey(const ECC_Pkey *ctx, CRYPT_EccPub *pub); #ifdef HITLS_BSL_PARAMS /** * @ingroup ecc * @brief ECC Set the private key data. * * @param ctx [OUT] ECC context structure * @param para [IN] Private key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t ECC_PkeySetPrvKeyEx(ECC_Pkey *ctx, const BSL_Param *para); /** * @ingroup ecc * @brief ECC Set the public key data. * * @param ctx [OUT] ECC context structure * @param para [IN] Public key data * * @retval CRYPT_NULL_INPUT Error null pointer input * @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Set successfully. */ int32_t ECC_PkeySetPubKeyEx(ECC_Pkey *ctx, const BSL_Param *para); /** * @ingroup ecc * @brief ECC Obtain the private key data. * * @param ctx [IN] ECC context structure * @param para [OUT] Private key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval ECC_Pkey_KEYINFO_ERROR The key information is incorrect. * @retval BN error. An error occurred in the internal BigNum calculation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t ECC_PkeyGetPrvKeyEx(const ECC_Pkey *ctx, BSL_Param *para); /** * @ingroup ecc * @brief ECC Obtain the public key data. * * @param ctx [IN] ECC context structure * @param para [OUT] Public key data * * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval ECC_Pkey_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient. * @retval ECC_Pkey_KEYINFO_ERROR The key information is incorrect. * @retval BN error. An error occurs in the internal BigNum operation. * @retval CRYPT_SUCCESS Obtained successfully. */ int32_t ECC_PkeyGetPubKeyEx(const ECC_Pkey *ctx, BSL_Param *para); /** * @ingroup ecc * @brief Obtain curve parameters. * * @param pkey [IN] Curve parameter information * @param para [OUT] Curve parameter information * * @retval CRYPT_SUCCESS * @retval Other failure */ int32_t ECC_GetParaEx(const ECC_Pkey *ctx, BSL_Param *para); #endif /** * @ingroup ecc * @brief ECC control interface * * @param ctx [IN/OUT] ECC context structure * @param opt [IN] Operation mode. For details, see ECC_CtrlType. * @param val [IN] Input parameter * @param len [IN] val Length * * @retval CRYPT_SUCCESS Set successfully. * @retval CRYPT_NULL_INPUT If any input parameter is empty * @retval ECC_Pkey_ERR_UNSUPPORTED_CTRL_OPTION opt mode not supported */ int32_t ECC_PkeyCtrl(ECC_Pkey *ctx, int32_t opt, void *val, uint32_t len); /** * @ingroup ecc * @brief ecc Create a context. * * @param id [IN] elliptic curve ID * @return ECC_Pkey ECC context pointer * If the operation fails, null is returned. */ ECC_Pkey *ECC_PkeyNewCtx(CRYPT_PKEY_ParaId id); /** * @ingroup ecc * @brief ecc Compare public keys and parameters * * @param a [IN] ECC Context structure * @param b [IN] ECC context structure * * @retval CRYPT_SUCCESS is the same * @retval CRYPT_NULL_INPUT Invalid null pointer input * @retval CRYPT_ECC_KEY_PUBKEY_NOT_EQUAL Public keys are not equal * @retval CRYPT_ECC_POINT_ERR_CURVE_ID Parameter curve IDs are not equal. * @retval CRYPT_ECC_ERR_POINT_FORMAT Point compression formats are not equal * @retval For other error codes, see crypt_errno.h. */ int32_t ECC_PkeyCmp(const ECC_Pkey *a, const ECC_Pkey *b); /** * @ingroup ecc * @brief Set the parameter of the ECC context * * @param ctx [IN] ECC context * @param para [IN] ECC parameter * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h. */ int32_t ECC_SetPara(ECC_Pkey *ctx, ECC_Para *para); #ifdef HITLS_CRYPTO_ECC_CHECK /** * @ingroup ecc * @brief check the key pair consistency * * @param pkey1 [IN] ecc key context structure * @param pkey2 [IN] ecc key context structure * @param checkType [IN] check type * * @retval CRYPT_SUCCESS check success. * Others. For details, see error code in errno. */ int32_t ECC_PkeyCheck(const ECC_Pkey *pkey1, const ECC_Pkey *pkey2, uint32_t checkType); #endif // HITLS_CRYPTO_ECC_CHECK #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_ECC #endif // CRYPT_ECC_PKEY_H
2401_83913325/openHiTLS-examples_7925
crypto/ecc/include/crypt_ecc_pkey.h
C
unknown
10,209
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CURVE_NISTP256) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) #include "crypt_arm.h" #include "ecp256_pre_comp_table.s" .arch armv8-a+crypto .file "ecp256_armv8.S" .section .rodata .align 4 .Lpoly: // P .quad 0xffffffffffffffff,0x00000000ffffffff,0x0000000000000000,0xffffffff00000001 .Lone_mont: // R mod P, R = 2^256, = 2^256 - P .quad 0x0000000000000001,0xffffffff00000000,0xffffffffffffffff,0x00000000fffffffe .Lord: // Order, n .quad 0xf3b9cac2fc632551,0xbce6faada7179e84,0xffffffffffffffff,0xffffffff00000000 .LordK: // (2^64 - ord[0]) * ordK = 1 // LordK * Lord, the lower 64 bits are all Fs. // LordK * Lord, The lower 64 bits are all Fs, coincidence? .quad 0xccd1c8aaee00bc4f .Lone: .quad 1, 0, 0, 0 /* Initial z is not set to 1 0000000300000000, 00000001FFFFFFFE, FFFFFFFD00000002, FFFFFFFE00000003 */ .text .globl ECP256_GetPreCompTable .type ECP256_GetPreCompTable,%function .align 4 ECP256_GetPreCompTable: AARCH64_PACIASP adrp x0, g_preCompTable add x0, x0, :lo12:g_preCompTable AARCH64_AUTIASP ret .size ECP256_GetPreCompTable,.-ECP256_GetPreCompTable .globl ECP256_FromMont .type ECP256_FromMont,%function .align 4 ECP256_FromMont: AARCH64_PACIASP stp x29, x30, [sp, #-32]! add x29, sp , #0 stp x19, x20, [sp, #16] ldp x4 , x5 , [x1] ldp x6 , x7 , [x1, #16] adrp x14, .Lpoly+8 add x14,x14,:lo12:.Lpoly+8 ldr x12,[x14] ldr x13,[x14,#16] adrp x2, .Lone // &bp[0] add x2, x2, :lo12:.Lone bl ECP256_MulCore ldp x19, x20, [sp , #16] ldp x29, x30, [sp], #32 AARCH64_AUTIASP ret .size ECP256_FromMont,.-ECP256_FromMont .type ECP256_AddCore,%function .align 4 ECP256_AddCore: AARCH64_PACIASP adds x14, x14, x8 // ret = a+b adcs x15, x15, x9 adcs x16, x16, x10 adcs x17, x17, x11 adc x1 , xzr, xzr // r -= p, p = 0xffffffffffffffff,0x00000000ffffffff,0x0000000000000000,0xffffffff00000001 adds x8 , x14, #1 // x8 = x14 - 0xffffffffffffffff = x14 + 1 sbcs x9 , x15, x12 // x9 = x15 - 0x00000000ffffffff sbcs x10, x16, xzr // x10 = x16 - 0 sbcs x11, x17, x13 // x11 = x17 - 0xffffffff00000001 sbcs xzr, x1 , xzr // Determine whether r-p has borrowing // r = r < p ? r : r-p // x8~x11 saves r-p, x14~x17 saves r csel x14, x14, x8 , lo csel x15, x15, x9 , lo csel x16, x16, x10, lo csel x17, x17, x11, lo stp x14, x15, [x0] stp x16, x17, [x0, #16] AARCH64_AUTIASP ret .size ECP256_AddCore,.-ECP256_AddCore /////////////////////////////////////// // x14~x17 = a[0~3], x8~x11 = b[0~3] // /////////////////////////////////////// .type ECP256_SubCore1,%function .align 4 ECP256_SubCore1: AARCH64_PACIASP subs x14, x14, x8 sbcs x15, x15, x9 sbcs x16, x16, x10 sbcs x17, x17, x11 sbc x1 , xzr, xzr // x1 = CF // r += p subs x8 , x14, #1 // x8 = x14 + 0xffffffffffffffff = x14 - 1 adcs x9 , x15, x12 // x9 = x15 + 0x00000000ffffffff adcs x10, x16, xzr // x10 = x16 + 0 adc x11, x17, x13 // x11 = x17 + 0xffffffff00000001 cmp x1 , xzr // r = borrow==0 ? r : r+p csel x14, x14, x8 , eq csel x15, x15, x9 , eq csel x16, x16, x10, eq csel x17, x17, x11, eq stp x14, x15, [x0] stp x16, x17, [x0, #16] AARCH64_AUTIASP ret .size ECP256_SubCore1,.-ECP256_SubCore1 .type ECP256_SubCore2,%function .align 4 ECP256_SubCore2: AARCH64_PACIASP subs x14, x8 , x14 sbcs x15, x9 , x15 sbcs x16, x10, x16 sbcs x17, x11, x17 sbc x1 , xzr, xzr // x1 = CF // r += p subs x8 , x14, #1 // x8 = x14 + 0xffffffffffffffff = x14 - 1 adcs x9 , x15, x12 // x9 = x15 + 0x00000000ffffffff adcs x10, x16, xzr // x10 = x16 + 0 adc x11, x17, x13 // x11 = x17 + 0xffffffff00000001 cmp x1 , xzr // r = borrow==0 ? r : r+p csel x14, x14, x8 , eq csel x15, x15, x9 , eq csel x16, x16, x10, eq csel x17, x17, x11, eq stp x14, x15, [x0] stp x16, x17, [x0, #16] AARCH64_AUTIASP ret .size ECP256_SubCore2,.-ECP256_SubCore2 .type ECP256_DivBy2Core,%function .align 4 ECP256_DivBy2Core: AARCH64_PACIASP // a+p subs x8 , x14, #1 // x8 = x14 + 0xffffffffffffffff = x14 - 1 adcs x9 , x15, x12 // x9 = x15 + 0x00000000ffffffff adcs x10, x16, xzr // x10 = x16 + 0 adcs x11, x17, x13 // x11 = x17 + 0xffffffff00000001 adc x1 , xzr, xzr // x1 = CF tst x14, #1 // Check whether a is an even number. eq indicates that a is an even number. // a = a Is an even number ? a : a+p csel x14, x14, x8 , eq csel x15, x15, x9 , eq csel x16, x16, x10, eq csel x17, x17, x11, eq csel x1 , xzr, x1 , eq // If a is still a, then x1, which holds the carry, is set to 0. lsr x14, x14, #1 // r >>= 1, Divided by 2. orr x14, x14, x15, lsl#63 // x15 is shifted leftward by 63 bits. The lower 63 bits become 0. // The most significant bit is the least significant bit before the shift. lsr x15, x15, #1 // The most significant bit of x14 is changed to the least significant bit of x15 // to achieve cyclic right shift. orr x15, x15, x16, lsl#63 lsr x16, x16, #1 orr x16, x16, x17, lsl#63 lsr x17, x17, #1 orr x17, x17, x1 , lsl#63 // The most significant bit of the highest block is x1. stp x14, x15, [x0] stp x16, x17, [x0, #16] AARCH64_AUTIASP ret .size ECP256_DivBy2Core,.-ECP256_DivBy2Core .globl ECP256_Neg .type ECP256_Neg,%function .align 4 ECP256_Neg: AARCH64_PACIASP stp x29, x30, [sp, #-16]! add x29, sp , #0 ldp x14, x15, [x1] ldp x16, x17, [x1, #16] mov x8 , xzr mov x9 , xzr mov x10, xzr mov x11, xzr adrp x7, .Lpoly+8 add x7,x7,:lo12:.Lpoly+8 ldr x12,[x7] ldr x13,[x7,#16] // -a = 0 - a bl ECP256_SubCore2 ldp x29, x30, [sp], #16 AARCH64_AUTIASP ret .size ECP256_Neg,.-ECP256_Neg .type ECP256_MulCore,%function .align 4 ECP256_MulCore: AARCH64_PACIASP ldr x3 , [x2] // b[0] mul x14, x4 , x3 umulh x8 , x4 , x3 mul x15, x5 , x3 umulh x9 , x5 , x3 mul x16, x6 , x3 umulh x10, x6 , x3 mul x17, x7 , x3 umulh x11, x7 , x3 adds x15, x15, x8 adcs x16, x16, x9 adcs x17, x17, x10 adc x19, xzr, x11 // x19 = x11 + CF mov x20, xzr lsl x8 , x14, #32 // In this case, x14 stores the lower 32 bits of the lo(a[0]*b[i]), x8 = lo(a[0]*b[i]). // The lower 32 bits are shifted to the left by 32 bits, and 0s are padded to the lower bits. lsr x9 , x14, #32 // x9 = The most significant 32 bits of lo(a[0]*b[i]) are shifted rightward by 32 bits // and 0s are padded to the most significant bits. subs x10, x14, x8 sbc x11, x14, x9 adds x14, x15, x8 adcs x15, x16, x9 adcs x16, x17, x10 adcs x17, x19, x11 adc x19, x20, xzr ldr x3 , [x2, #8] // b[1] // lo(a[0~3] * b[i]) mul x8 , x4 , x3 mul x9 , x5 , x3 mul x10, x6 , x3 mul x11, x7 , x3 adds x14, x14, x8 adcs x15, x15, x9 adcs x16, x16, x10 adcs x17, x17, x11 adc x19, x19, xzr // hi(a[0~3] * b[i]) umulh x8 , x4 , x3 umulh x9 , x5 , x3 umulh x10, x6 , x3 umulh x11, x7 , x3 adds x15, x15, x8 adcs x16, x16, x9 adcs x17, x17, x10 adcs x19, x19, x11 adc x20, xzr, xzr lsl x8 , x14, #32 // In this case, x14 stores the lower 32 bits of the lo(a[0]*b[i]), // x8 = lo(a[0]*b[i]). The lower 32 bits are shifted to the left by 32 bits, // and 0s are padded to the lower bits. lsr x9 , x14, #32 // x9 = The most significant 32 bits of lo(a[0]*b[i]) are shifted rightward // by 32 bits and 0s are padded to the most significant bits. subs x10, x14, x8 sbc x11, x14, x9 adds x14, x15, x8 adcs x15, x16, x9 adcs x16, x17, x10 adcs x17, x19, x11 adc x19, x20, xzr ldr x3 , [x2, #8*2] // b[2] // lo(a[0~3] * b[i]) mul x8 , x4 , x3 mul x9 , x5 , x3 mul x10, x6 , x3 mul x11, x7 , x3 adds x14, x14, x8 adcs x15, x15, x9 adcs x16, x16, x10 adcs x17, x17, x11 adc x19, x19, xzr // hi(a[0~3] * b[i]) umulh x8 , x4 , x3 umulh x9 , x5 , x3 umulh x10, x6 , x3 umulh x11, x7 , x3 adds x15, x15, x8 adcs x16, x16, x9 adcs x17, x17, x10 adcs x19, x19, x11 adc x20, xzr, xzr lsl x8 , x14, #32 // x8 = lq<<32 lsr x9 , x14, #32 // x9 = hq subs x10, x14, x8 // x10 = q - lq<<32 sbc x11, x14, x9 // x11 = q - hq adds x14, x15, x8 adcs x15, x16, x9 adcs x16, x17, x10 adcs x17, x19, x11 adc x19, x20, xzr ldr x3 , [x2, #8*3] // b[3] // lo(a[0~3] * b[i]) mul x8 , x4 , x3 mul x9 , x5 , x3 mul x10, x6 , x3 mul x11, x7 , x3 adds x14, x14, x8 adcs x15, x15, x9 adcs x16, x16, x10 adcs x17, x17, x11 adc x19, x19, xzr // hi(a[0~3] * b[i]) umulh x8 , x4 , x3 umulh x9 , x5 , x3 umulh x10, x6 , x3 umulh x11, x7 , x3 adds x15, x15, x8 adcs x16, x16, x9 adcs x17, x17, x10 adcs x19, x19, x11 adc x20, xzr, xzr // last reduction lsl x8 , x14, #32 // In this case, x14 stores the lower 32 bits of the lo(a[0]*b[i]), // x8 = The lower 32 bits of (lo(a[0]*b[i])) are shifted to the left by 32 bits, // and 0s are padded to the lower bits. lsr x9 , x14, #32 // x9 = The most significant 32 bits of (lo(a[0]*b[i])) are shifted rightward // by 32 bits and 0s are padded to the most significant bits. subs x10, x14, x8 sbc x11, x14, x9 adds x14, x15, x8 adcs x15, x16, x9 adcs x16, x17, x10 adcs x17, x19, x11 adc x19, x20, xzr // x8~x11 = r - p (r may be greater than p) adds x8 , x14, #1 // x8 = x14 - 0xffffffffffffffff = x14 + 1 sbcs x9 , x15, x12 // x9 = x15 - 0x00000000ffffffff sbcs x10, x16, xzr // x10 = x16 - 0 sbcs x11, x17, x13 // x11 = x17 - 0xffffffff00000001 sbcs xzr, x19, xzr // Determine whether to borrow csel x14, x14, x8 , lo csel x15, x15, x9 , lo csel x16, x16, x10, lo csel x17, x17, x11, lo stp x14, x15, [x0] stp x16, x17, [x0, #8*2] AARCH64_AUTIASP ret .size ECP256_MulCore, .-ECP256_MulCore .type ECP256_SqrCore,%function .align 4 ECP256_SqrCore: AARCH64_PACIASP /****************************************** x7 x1 x20 x19 x17 x16 x15 x14 h0*1 l0*1 h0*2 l0*2 h0*3 l0*3 h1*2 l1*2 h1*3 l1*3 h2*3 l2*3 h3*3 l3*3 h2*2 l2*2 h1*1 l1*1 h0*0 l0*0 *******************************************/ // a[1~3] * a[0] mul x15, x5 , x4 // lo(a[1] * a[0]) umulh x8 , x5 , x4 // hi(a[1] * a[0]) mul x16, x6 , x4 // lo(a[2] * a[0]) umulh x9 , x6 , x4 // hi(a[2] * a[0]) mul x17, x7 , x4 // lo(a[3] * a[0]) umulh x19, x7 , x4 // hi(a[3] * a[0]) adds x16, x16, x8 adcs x17, x17, x9 adc x19, x19, xzr // There will be no more carry. // a[2~3] * a[1] mul x8 , x6 , x5 // lo(a[2] * a[1]) umulh x9 , x6 , x5 // hi(a[2] * a[1]) mul x10, x7 , x5 // lo(a[3] * a[1]) umulh x11, x7 , x5 // hi(a[3] * a[1]) // a[3] * a[2] mul x20, x7 , x6 umulh x1 , x7 , x6 // Add the results of the current round, and then add the acc (register in the note above). adds x9 , x10, x9 adc x10, x11, xzr adds x17, x17, x8 adcs x19, x19, x9 adcs x20, x20, x10 adc x1 , x1 , xzr // a[0-3] has been saved in x4 to x7. // a[0~3] ^ 2 mul x14, x4 , x4 umulh x4 , x4 , x4 mul x8 , x5 , x5 umulh x5 , x5 , x5 mul x9 , x6 , x6 umulh x6 , x6 , x6 mul x10, x7 , x7 umulh x7 , x7 , x7 // acc[1~6] << 1 adds x15, x15, x15 adcs x16, x16, x16 adcs x17, x17, x17 adcs x19, x19, x19 adcs x20, x20, x20 adcs x1 , x1 , x1 adc x2 , xzr, xzr // acc[] += a[] ^ 2 adds x15, x15, x4 adcs x16, x16, x8 adcs x17, x17, x5 adcs x19, x19, x9 adcs x20, x20, x6 adcs x1 , x1 , x10 adc x7 , x7 , x2 // Four rounds of reduce. lsl x8 , x14, #32 lsr x9 , x14, #32 subs x10, x14, x8 sbc x11, x14, x9 adds x14, x15, x8 adcs x15, x16, x9 adcs x16, x17, x10 adc x17, x11, xzr lsl x8 , x14, #32 lsr x9 , x14, #32 subs x10, x14, x8 sbc x11, x14, x9 adds x14, x15, x8 adcs x15, x16, x9 adcs x16, x17, x10 adc x17, x11, xzr lsl x8 , x14, #32 lsr x9 , x14, #32 subs x10, x14, x8 sbc x11, x14, x9 adds x14, x15, x8 adcs x15, x16, x9 adcs x16, x17, x10 adc x17, x11, xzr lsl x8 , x14, #32 lsr x9 , x14, #32 subs x10, x14, x8 sbc x11, x14, x9 adds x14, x15, x8 adcs x15, x16, x9 adcs x16, x17, x10 adc x17, x11, xzr // Add acc[4-7]. x14~x19 is the current calculation result r. adds x14, x14, x19 adcs x15, x15, x20 adcs x16, x16, x1 adcs x17, x17, x7 adc x19, xzr, xzr // r -= p adds x8 , x14, #1 // subs x8,x14,#-1 sbcs x9 , x15, x12 sbcs x10, x16, xzr sbcs x11, x17, x13 sbcs xzr, x19, xzr // The set CF is used to determine the size relationship between r and p. // r = r-p < 0 ? r : r-p csel x14, x14, x8 , lo csel x15, x15, x9 , lo csel x16, x16, x10, lo csel x17, x17, x11, lo stp x14, x15, [x0] stp x16, x17, [x0, #16] AARCH64_AUTIASP ret .size ECP256_SqrCore,.-ECP256_SqrCore .globl ECP256_Mul .type ECP256_Mul,%function .align 4 ECP256_Mul: AARCH64_PACIASP stp x29, x30, [sp, #-32]! add x29, sp , #0 stp x19, x20, [sp, #16] ldp x4 , x5 , [x1] ldp x6 , x7 , [x1,#16] adrp x3, .Lpoly+8 add x3,x3,:lo12:.Lpoly+8 ldr x12,[x3] ldr x13,[x3,#16] bl ECP256_MulCore ldp x19, x20, [sp , #16] ldp x29, x30, [sp], #32 AARCH64_AUTIASP ret .size ECP256_Mul,.-ECP256_Mul .globl ECP256_Sqr .type ECP256_Sqr,%function .align 4 ECP256_Sqr: AARCH64_PACIASP stp x29, x30, [sp, #-32]! add x29, sp , #0 stp x19, x20, [sp, #16] ldp x4 , x5 , [x1] ldp x6 , x7 , [x1, #16] adrp x3, .Lpoly+8 add x3,x3,:lo12:.Lpoly+8 ldr x12,[x3] ldr x13,[x3,#16] bl ECP256_SqrCore ldp x19, x20, [sp , #16] ldp x29, x30, [sp], #32 AARCH64_AUTIASP ret .size ECP256_Sqr,.-ECP256_Sqr # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2007-bl # Deal process: # Z1Z1 = Z12 # U2 = X2*Z1Z1 # S2 = Y2*Z1*Z1Z1 # H = U2-X1 # HH = H2 # I = 4*HH # J = H*I # r = 2*(S2-Y1) # V = X1*I # X3 = r2-J-2*V # Y3 = r*(V-X3)-2*Y1*J # Z3 = (Z1+H)2-Z1Z1-HH .globl ECP256_AddAffine .type ECP256_AddAffine,%function .align 5 ECP256_AddAffine: AARCH64_PACIASP stp x29, x30, [sp, #-80]! add x29, sp , #0 stp x19, x20, [sp, #16] stp x21, x22, [sp, #32] stp x23, x24, [sp, #48] stp x25, x26, [sp, #64] sub sp , sp , #32*10 // Each coordinate is 256 bits, that is, 32 bytes, and a space of 10 coordinates is applied for. // Based on C implementation, z1sqr and S2 lifecycles do not overlap. // You can share one piece of memory and save an extra piece of memory. // x0 to x2 will be used to invoke the interface to transfer parameters. // Therefore, the initial input parameters are saved to x21 to x23. // Obtains the structure members based on the address offset. Each member is 256 bits, that is, 32 bytes. mov x21, x0 // CRYPT_P256_Point *r mov x22, x1 // CRYPT_P256_Point *a mov x23, x2 // CRYPT_P256_AffinePoint *b adrp x14, .Lpoly+8 // p[1] add x14,x14,:lo12:.Lpoly+8 ldr x12,[x14] // p[3] ldr x13,[x14,#16] ldp x4, x5, [x1, #64] // x1+64 = &(a->z[0]), a->z[0] is marked as z1[0] ldp x6, x7, [x1, #64+16] // x1+64+16 = &(a->z[2]) orr x24, x4 , x5 // x24 = z1[0] | z1[1] orr x24, x24, x6 // x24 |= z1[2] orr x24, x24, x7 // x24 |= z1[3] cmp x24, #0 csetm x24, ne // x24 = x24!=0 ? -1 : 0, it means ~iszero(z1), // determine whether point a is (x, y, 0) ldp x8 , x9 , [x2] // x2 = &(b->x[0]), b->x[0] is marked as x2[0] ldp x10, x11, [x2, #16] // x2+16 = &(b->x[2]) ldp x14, x15, [x2, 32] // x2+32 = &(b->y[0]) ldp x16, x17, [x2, #32+16] // x2+32+16 = &(b->y[2]) // x25 = x2[0] | x2[1] | x2[2] | x2[3] | y2[0] | y2[1] | y2[2] | y2[3] orr x25, x8 , x9 orr x25, x25, x10 orr x25, x25, x11 orr x25, x25, x14 orr x25, x25, x15 orr x25, x25, x16 orr x25, x25, x17 cmp x25, #0 csetm x25, ne // x25 = x25!=0 ? -1 : 0, it means ~iszero(x2|y2), // Check whether point b is (0, 0). add x0 , sp , #32*3 // zsqr = sp[32*3] // x4~x7 = z1[0~3] (the value has been assigned.) bl ECP256_SqrCore // zsqr = z1^2 // x14~x17 also temporarily stored results // The next calculation requires the zsqr calculation result as the input. // The calculation result is stored in x4 to x7 in advance to prevent x14 to x17 from being overwritten // by the next calculation. Therefore, the calculation result needs to be read from the memory. mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x0 , sp , #32*4 // u2 = sp[32*4] add x2 , x23, #0 // x2 points to b->x. // x4~x7 * [x2] bl ECP256_MulCore // u2 = z1^2 * x2 // x14~x17 also temporarily stored results. ldp x8 , x9 , [x22] // a->x ldp x10, x11, [x22, #16] add x0 , sp , #32*5 // h = sp[32*5] // x14~x17 - x8~x11 bl ECP256_SubCore1 // h = u2 - x1 ldp x4 , x5 , [sp, #32*3] // zsqr = sp[32*3] ldp x6 , x7 , [sp, #32*3+16] add x2 , x22, #64 // x2 points to a->z add x0 , sp , #32*3 // s2 = sp[32*3], zsqr will not be used later. // You can use this block memory to store and calculate s2. bl ECP256_MulCore // s2 = zsqr * z1 = z1^3 ldp x4 , x5 , [sp, #32*5] // x4~x7 = h = sp[32*5] ldp x6 , x7 , [sp, #32*5+16] add x2 , x22, #64 add x0 , sp , #32*2 // x0 points to res_z. bl ECP256_MulCore // res_z = h * z1 ldp x4 , x5 , [sp, #32*3] // x4~x7 = s2 = sp[32*3] ldp x6 , x7 , [sp, #32*3+16] add x2 , x23, #32 // x2 points to b->y. add x0 , sp , #32*3 // s2 = sp[32*3] bl ECP256_MulCore // s2 = s2 * y2 = y2 * z1^3 ldp x8 , x9 , [x22, #32] ldp x10, x11, [x22, #32+16] add x0 , sp , #32*6 // R = sp[32*6] // x14~x17 - x8~x11 bl ECP256_SubCore1 // R = s2 - y1 // Rsqr = R^2 and hsqr = h^2 are independent of each other. The sequence can be adjusted. // If Rsqr is calculated first, the memory can be read less once. (The pipeline bubble needs to be optimized.) // In addition, the calculated hsqr can read less memory in hcub = hsqr x h. mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x0 , sp , #32*7 // Rsqr = sp[32*7] bl ECP256_SqrCore // Rsqr = R^2 ldp x4 , x5 , [sp, #32*5] // h = sp[32*5] ldp x6 , x7 , [sp, #32*5+16] add x0 , sp , #32*8 // hsqr = sp[32*8] bl ECP256_SqrCore // hsqr = h^2 // x14 to x17 stores the hsqr results and does not need to be read from the memory. // (The pipeline bubble exists and needs to be optimized.) mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x2 , sp , #32*5 // h = sp[32*5] add x0 , sp , #32*9 // hcub = sp[32*9] bl ECP256_MulCore // hcub = hsqr * h = h^3 // Because the multiplication involves too many registers, the preceding hsqr cannot be backed up. // If the registers after x19 are used, the hsqr needs to be pushed and popped at the beginning // and end of the stack, which outweighs the gain. Therefore, the hsqr can only be read from the memory. ldp x4 , x5 , [sp, #32*8] // hsqr = sp[32*8] ldp x6 , x7 , [sp, #32*8+16] add x2 , x22, #0 // x2 points to a->x add x0 , sp , #32*4 // u2 = sp[32*4] bl ECP256_MulCore // u2 = hsqr * x1 mov x8 , x14 mov x9 , x15 mov x10, x16 mov x11, x17 add x0 , sp , #32*8 // hsqr = sp[32*8] // x14~x17 + x8~x11 bl ECP256_AddCore // hsqr = 2 * u2 // x14~x17 saves hsqr, so ECP256_SubCore2 is called. ldp x8 , x9 , [sp, #32*7] // Rsqr = sp[32*7] ldp x10, x11, [sp, #32*7+16] // x8~x11 - x14~x17 add x0 , sp , #0 // x0 points to res_x bl ECP256_SubCore2 // res_x = Rsqr - hsqr // x14~x17 save res_x, so call ECP256_SubCore1 ldp x8 , x9 , [sp, #32*9] // hcub = sp[32*9] ldp x10, x11, [sp, #32*9+16] // x14~x17 - x8~x11 bl ECP256_SubCore1 // res_x = res_x - hcub // x14~x17 save res_x, so call ECP256_SubCore2 ldp x8 , x9 , [sp, #32*4] // u2 = sp[32*4] ldp x10, x11, [sp, #32*4+16] add x0 , sp , #32*1 bl ECP256_SubCore2 // res_y = u2 - res_x ldp x4 , x5 , [sp, #32*9] // hcub = sp[32*9] ldp x6 , x7 , [sp, #32*9+16] add x2 , x22, #32 // y1 = a->y add x0 , sp , #32*3 // s2 = sp[32*3] bl ECP256_MulCore // s2 = y1 * hcub add x2 , sp , #32*6 // R = sp[32*6] add x0 , sp , #32*1 // res_y = sp[32*1] ldp x4 , x5 , [x0] ldp x6 , x7 , [x0, #16] bl ECP256_MulCore // res_y = res_y * R // x14–x17 stores res_y, and x0 is still res_y. No value needs to be assigned again. ldp x8 , x9 , [sp, #32*3] // s2 = sp[32*3] ldp x10, x11, [sp, #32*3+16] // x14~x17 - x8~x11 bl ECP256_SubCore1 // res_y = res_y - s2 // Four memory blocks are not read. (The pipeline bubble exists and needs to be optimized.) // x14-x17 stores res_y. Therefore, res_y is judged and assigned a value. // copy y ldp x4 , x5 , [x23, #32] // in2_y, b->y ldp x6 , x7 , [x23, #32+16] ldp x8 , x9 , [x22, #32] // in1_y, a->y ldp x10, x11, [x22, #32+16] // res_y = in1infty == 0 ? res_y : in2_y cmp x24, #0 // x24 = ~in1infty csel x14, x14, x4 , ne csel x15, x15, x5 , ne csel x16, x16, x6 , ne csel x17, x17, x7 , ne // res_y = in2infty == 0 ? res_y : in1_y cmp x25, #0 // x25 = ~in2infty csel x14, x14, x8 , ne csel x15, x15, x9 , ne csel x16, x16, x10, ne csel x17, x17, x11, ne stp x14, x15, [x21, #32] stp x16, x17, [x21, #32+16] // copy x ldp x4 , x5 , [x23] // in2_x, b->x ldp x6 , x7 , [x23, #16] ldp x8 , x9 , [x22] // in1_x, a->x ldp x10, x11, [x22, #16] ldp x14, x15, [sp] // res_x ldp x16, x17, [sp , #16] // res_x = in1infty == 0 ? res_x : in2_x cmp x24, #0 // x24 = ~in1infty csel x14, x14, x4 , ne csel x15, x15, x5 , ne csel x16, x16, x6 , ne csel x17, x17, x7 , ne // res_x = in2infty == 0 ? res_x : in1_x cmp x25, #0 // x25 = ~in2infty csel x14, x14, x8 , ne csel x15, x15, x9 , ne csel x16, x16, x10, ne csel x17, x17, x11, ne stp x14, x15, [x21] stp x16, x17, [x21, #16] // copy z adrp x23, .Lone_mont add x23, x23, :lo12:.Lone_mont ldp x4 , x5 , [x23] // one_mont, 1 * RR * R' = R (mod p) ldp x6 , x7 , [x23, #16] ldp x8 , x9 , [x22, #64] // in1_z, a->z ldp x10, x11, [x22, #64+16] ldp x14, x15, [sp , #64] // res_z ldp x16, x17, [sp , #64+16] // res_z = in1infty == 0 ? res_z : ONE cmp x24, #0 // x24 = ~in1infty csel x14, x14, x4 , ne csel x15, x15, x5 , ne csel x16, x16, x6 , ne csel x17, x17, x7 , ne // res_z = in2infty == 0 ? res_z : in1_z cmp x25, #0 // x25 = ~in2infty csel x14, x14, x8 , ne csel x15, x15, x9 , ne csel x16, x16, x10, ne csel x17, x17, x11, ne stp x14, x15, [x21, #64] stp x16, x17, [x21, #64+16] add sp , x29, #0 ldp x19, x20, [x29, #16] ldp x21, x22, [x29, #32] ldp x23, x24, [x29, #48] ldp x25, x26, [x29, #64] ldp x29, x30, [sp], #80 AARCH64_AUTIASP ret .size ECP256_AddAffine,.-ECP256_AddAffine # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-1998-cmo # Deal process: # U1 = X1*Z22 # U2 = X2*Z12 # S1 = Y1*Z23 # S2 = Y2*Z13 # H = U2-U1 # r = S2-S1 # X3 = r2-H3-2*U1*H2 # Y3 = r*(U1*H2-X3)-S1*H3 # Z3 = Z1*Z2*H .globl ECP256_PointAdd .type ECP256_PointAdd,%function .align 5 ECP256_PointAdd: AARCH64_PACIASP stp x29, x30, [sp, #-96]! add x29, sp , #0 stp x19, x20, [sp, #16] stp x21, x22, [sp, #32] stp x23, x24, [sp, #48] stp x25, x26, [sp, #64] stp x27, x28, [sp, #80] sub sp , sp , #32*12 // Each coordinate is 256 bits, that is, 32 bytes, // and a space of 10 coordinates is applied for. adrp x14, .Lpoly+8 // p[1] add x14,x14,:lo12:.Lpoly+8 ldr x12,[x14] // p[3] ldr x13,[x14,#16] // Pointer to the initial backup input parameter. // x0 to x2 are used to transfer parameters when the interface is invoked. mov x21, x0 mov x22, x1 mov x23, x2 ldp x4 , x5 , [x22, #64] // z1 ldp x6 , x7 , [x22, #64+16] // x24 = z1[0] | z1[1] | z1[2] | z1[3] orr x24, x4 , x5 orr x24, x24, x6 orr x24, x24, x7 // x24 = ~in1infty cmp x24, #0 csetm x24, ne // x24 = (x24 != 0) ? -1 : 0, that is ~iszero(z1), // Determine whether point a is(x, y, 0) // Because x4 to x7 exactly hold z1, z1^2 can be calculated first. add x0 , sp , #0 // z1sqr = sp[32*0] bl ECP256_SqrCore // z1sqr = z1^2 // x14 to x17 exactly save the z1sqr result (the pipeline bubble exists and needs to be optimized). mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x2 , x22, #64 // x2 points to z1, that is a->z add x0 , sp , #32*1 // s2 = sp[32*1] bl ECP256_MulCore // s2 = z1^3 // x14 to x17 exactly save the result of s2. (The pipeline bubble exists and needs to be optimized.) mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x2 , x23, #32 // x2 points to y2, that is b->y // add x0 , sp , #32*1 // s2 = sp[32*1], x0 It is exactly s2 and does not need to be set. // (There are pipeline bubbles to be optimized.) bl ECP256_MulCore // s2 = y2 * z1^3 ldp x4 , x5 , [x23, #64] // z2 ldp x6 , x7 , [x23, #64+16] // x25 = z2[0] | z2[1] | z2[2] | z2[3] orr x25, x4 , x5 orr x25, x25, x6 orr x25, x25, x7 // x25 = ~in2infty cmp x25, #0 csetm x25, ne // x25 = (x25 != 0) ? -1 : 0, that is ~iszero(z2), // Check whether point b is(x, y, 0) // Because x4~x7 happens to hold z2, z2^2 can be calculated add x0 , sp , #32*2 // z2sqr = sp[32*2] bl ECP256_SqrCore // z2sqr = z2^2 // x14 to x17 exactly save the z2sqr result. (There are pipeline bubbles to be optimized.) mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x2 , x23, #64 // x2 points to z2, that is b->z add x0 , sp , #32*3 // s1 = sp[32*3] bl ECP256_MulCore // s1 = z2^3 // x14 to x17 exactly save the result of s2. (The pipeline bubble exists and needs to be optimized.) mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x2 , x22, #32 // x2 points to y1, that is a->y // add x0 , sp , #32*3 // s1 = sp[32*3], x0 is exactly s1 and does not need to be set. // (There are pipeline bubbles to be optimized.) bl ECP256_MulCore // s1 = y1 * z2^3 // x14 to x17 save the result of s1. Therefore, the ECP256_SubCore2 interface is selected. ldp x8 , x9 , [sp, #32*1] // s2 = sp[32*1] ldp x10, x11, [sp, #32*1+16] // x8~x11 - x14~x17 add x0 , sp , #32*4 // R = sp[32*4] bl ECP256_SubCore2 // R = s2 - s1 // x14 to x17 save the result of R, (R==0) <==> (s2 == s1) orr x26, x14, x15 orr x26, x26, x16 orr x26, x26, x17 // x26 = ~(s1 == s2), The data of R is not read from the memory in advance. ldp x4 , x5 , [x22] // Take x1, that is a->x ldp x6 , x7 , [x22, #16] add x2 , sp , #32*2 // z2sqr = sp[32*2] add x0 , sp , #32*5 // u1 = sp[32*5] bl ECP256_MulCore // u1 = x1 * z2sqr ldp x4 , x5 , [x23] // Take x2, that is b->x ldp x6 , x7 , [x23, #16] add x2 , sp , #0 // z1sqr = sp[32*0] add x0 , sp , #32*6 // u2 = sp[32*6] bl ECP256_MulCore // u2 = x2 * z1sqr // x14 to x17 save the result of u2. Therefore, the ECP256_SubCore1 interface is selected. ldp x8 , x9 , [sp, #32*5] // u1 = sp[32*5] ldp x10, x11, [sp, #32*5+16] // x14~x17 - x8~x11 add x0 , sp , #32*7 // h = sp[32*7] bl ECP256_SubCore1 // h = u2 - u1 // x14 to x17 save the result of h, (h==0) <==> (u2 == u1) orr x14, x14, x15 orr x14, x14, x16 orr x14, x14, x17 // x14 = ~(u1 == u2), It is used for subsequent judgment. // The data of h does not need to be read from the memory in advance. // x24 = ~in2infty // x25 = ~in1infty // x26 = ~(s1 == s2) = ~is_equal(S1, S2) // x14 = ~(u1 == u2) = ~is_equal(U1, U2) // if(is_equal(U1, U2) & ~in1infty & ~in2infty & is_equal(S1, S2)) // 将(is_equal(U1, U2) & ~in1infty & ~in2infty & is_equal(S1, S2))记为flag // <==> // if ((~is_equal(U1, U2) | in1infty | in2infty | ~is_equal(S1, S2)) == 0) // if (flag == 0) mvn x27, x24 // x27 = in1infty mvn x28, x25 // x28 = in2infty orr x14, x14, x26 orr x14, x14, x27 orr x14, x14, x28 cbnz x14, .Lpoint_add // flag != 0, Continue calculation by C implementation .Ladd_double: mov x0 , x21 // x0 = r mov x1 , x22 // x1 = a ldp x23, x24, [x29, #48] // The double function uses only x19 to x22, and only x19 to x22 // is popped at the end. Therefore, x23 to x28 is popped in advance. ldp x25, x26, [x29, #64] ldp x27, x28, [x29, #80] add sp , sp , #32*(12-4) // The size of the stack space used varies. The double function // only releases 32 x 4. Therefore, you need to release part of the stack space in advance. b .Lpoint_double .align 4 .Lpoint_add: ldp x4 , x5 , [sp, #32*4] // R = sp[32*4] ldp x6 , x7 , [sp, #32*4+16] add x0 , sp , #0 // Rsqr = sp[0], Because z1sqr will not be used later, // this memory can be used to save Rsqr. bl ECP256_SqrCore // Rsqr = R^2 ldp x4 , x5 , [sp, #32*7] // h = sp[32*7] ldp x6 , x7 , [sp, #32*7+16] add x2 , x22, #64 // x2 points to z1 add x0 , sp , #32*11 // res_z = sp[32*11] bl ECP256_MulCore // res_z = h * z1 // The res_z result is stored in x14 to x17. (The pipeline bubble needs to be optimized.) mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x2 , x23, #64 // x2 points to z2 // x0 is still res_z and does not need to be reassigned. // add x0 , sp , #32*11 // res_z = sp[32*11] bl ECP256_MulCore // res_z = res_z * z2 ldp x4 , x5 , [sp, #32*7] // h = sp[32*7] ldp x6 , x7 , [sp, #32*7+16] add x0 , sp , #32*2 // hsqr = sp[32*2], Because z2sqr will not be used later, // you can use this memory to save hsqr. bl ECP256_SqrCore // The hsqr result is stored in x14 to x17. (The pipeline bubble needs to be optimized.) mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x2 , sp , #32*7 // h = sp[32*7] add x0 , sp , #32*8 // hcub = sp[32*8] bl ECP256_MulCore // hcub = hsqr * h ldp x4 , x5 , [sp, #32*5] // u1 = sp[32*5] ldp x6 , x7 , [sp, #32*5+16] add x2 , sp , #32*2 // hsqr = sp[32*2] add x0 , sp , #32*6 // u2 = sp[32*6] bl ECP256_MulCore // u2 = u1 * hsqr // x14~x17 exactly save the result of u2. mov x8 , x14 mov x9 , x15 mov x10, x16 mov x11, x17 // add x0 , sp , #32*2 // hsqr = sp[32*2] // The previous operation x2 also saves the address of hsqr. mov x0 , x2 // x14~x17 + x8~x11 bl ECP256_AddCore // hsqr = 2 * u2 // x14 to x17 save the hsqr result. Therefore, ECP256_SubCore2 is called. ldp x8 , x9 , [sp] // Rsqr = sp[0] ldp x10, x11, [sp, #16] // x8~x11 - x14~x17 add x0 , sp , #32*9 // res_x = sp[32*9] bl ECP256_SubCore2 // res_x = Rsqr - hsqr // x14 to x17 exactly save the result of res_x, so ECP256_SubCore1 is called. ldp x8 , x9 , [sp, #32*8] // hcub = sp[32*8] ldp x10, x11, [sp, #32*8+16] // x14~x17 - x8~11 // The previous operation x0 also stores the address of res_x. bl ECP256_SubCore1 // res_x = res_x - hcub // x14 to x17 exactly save the result of res_x. Therefore, ECP256_SubCore2 is called. ldp x8 , x9 , [sp, #32*6] // u2 = sp[0] ldp x10, x11, [sp, #32*6+16] // x8~x11 - x14~x17 add x0 , sp , #32*10 bl ECP256_SubCore2 // res_y = u2 - res_x ldp x4 , x5 , [sp, #32*3] // s1 = sp[32*3] ldp x6 , x7 , [sp, #32*3+16] add x2 , sp , #32*8 // hcub = sp[32*8] add x0 , sp , #32*1 // s2 = sp[32*1] bl ECP256_MulCore // s2 = s1 * hcub add x2 , sp , #32*4 // R = sp[32*4] add x0 , sp , #32*10 // res_y = sp[32*10] ldp x4 , x5 , [x0] // res_y = sp[32*10], Borrowing x0 address without offset ldp x6 , x7 , [x0, #16] bl ECP256_MulCore // res_y = res_y * R // x14 to x17 exactly save the result of res_y. Therefore, ECP256_SubCore1 is called. ldp x8 , x9 , [sp, #32] // s2 = sp[32*1] ldp x10, x11, [sp, #32+16] // x14~x17 - x8~x11 // The previous operation x0 also stores the address of res_y. bl ECP256_SubCore1 // res_y = res_y - s2 // Four memory blocks are not read. (The pipeline bubble exists and needs to be optimized.) // x14-x17 stores res_y. Therefore, res_y is judged and assigned a value. // copy y ldp x4 , x5 , [x23, #32] // in2_y, b->y ldp x6 , x7 , [x23, #32+16] ldp x8 , x9 , [x22, #32] // in1_y, a->y ldp x10, x11, [x22, #32+16] // res_y = in1infty == 0 ? res_y : in2_y cmp x24, #0 // x24 = ~in1infty csel x14, x14, x4 , ne csel x15, x15, x5 , ne csel x16, x16, x6 , ne csel x17, x17, x7 , ne // res_y = in2infty == 0 ? res_y : in1_y cmp x25, #0 // x25 = ~in2infty csel x14, x14, x8 , ne csel x15, x15, x9 , ne csel x16, x16, x10, ne csel x17, x17, x11, ne stp x14, x15, [x21, #32] stp x16, x17, [x21, #32+16] // copy x ldp x4 , x5 , [x23] // in2_x, b->x ldp x6 , x7 , [x23, #16] ldp x8 , x9 , [x22] // in1_x, a->x ldp x10, x11, [x22, #16] ldp x14, x15, [sp , #32*9] // res_x ldp x16, x17, [sp , #32*9+16] // res_x = in1infty == 0 ? res_x : in2_x cmp x24, #0 // x24 = ~in1infty csel x14, x14, x4 , ne csel x15, x15, x5 , ne csel x16, x16, x6 , ne csel x17, x17, x7 , ne // res_x = in2infty == 0 ? res_x : in1_x cmp x25, #0 // x25 = ~in2infty csel x14, x14, x8 , ne csel x15, x15, x9 , ne csel x16, x16, x10, ne csel x17, x17, x11, ne stp x14, x15, [x21] stp x16, x17, [x21, #16] // copy z ldp x4 , x5 , [x23, #64] // in2_z, b->z ldp x6 , x7 , [x23, #64+16] ldp x8 , x9 , [x22, #64] // in1_z, a->z ldp x10, x11, [x22, #64+16] ldp x14, x15, [sp , #32*11] // res_z ldp x16, x17, [sp , #32*11+16] // res_z = in1infty == 0 ? res_z : in2_z cmp x24, #0 // x24 = ~in1infty csel x14, x14, x4 , ne csel x15, x15, x5 , ne csel x16, x16, x6 , ne csel x17, x17, x7 , ne // res_z = in2infty == 0 ? res_z : in1_z cmp x25, #0 // x25 = ~in2infty csel x14, x14, x8 , ne csel x15, x15, x9 , ne csel x16, x16, x10, ne csel x17, x17, x11, ne stp x14, x15, [x21, #64] stp x16, x17, [x21, #64+16] add sp , x29, #0 // Free temporary variable ldp x19, x20, [x29, #16] ldp x21, x22, [x29, #32] ldp x23, x24, [x29, #48] ldp x25, x26, [x29, #64] ldp x27, x28, [x29, #80] ldp x29, x30, [sp], #96 AARCH64_AUTIASP ret .size ECP256_PointAdd,.-ECP256_PointAdd # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#doubling-dbl-2001-b # Deal process: # delta = Z12 # gamma = Y12 # beta = X1*gamma # alpha = 3*(X1-delta)*(X1+delta) # X3 = alpha2-8*beta # Z3 = (Y1+Z1)2-gamma-delta # Y3 = alpha*(4*beta-X3)-8*gamma2 .globl ECP256_PointDouble .type ECP256_PointDouble,%function .align 5 ECP256_PointDouble: AARCH64_PACIASP stp x29, x30, [sp, #-96]! // Why is 96 space given here? Only x19~x22 is stacked. Theoretically, only [sp, #-48] is required. add x29, sp , #0 // Whether it is related to the Lpoint_double jump of the ecp_nistz256_point_add interface stp x19, x20, [sp, #16] stp x21, x22, [sp, #32] sub sp , sp , #32*4 .Lpoint_double: ldp x14, x15, [x1 , #32] // a->y ldp x16, x17, [x1 , #32+16] // Back up the initial input parameter pointer r, a. mov x21, x0 mov x22, x1 adrp x3, .Lpoly+8 // p[1] add x3,x3,:lo12:.Lpoly+8 ldr x12,[x3] // p[3] ldr x13,[x3,#16] mov x8 , x14 mov x9 , x15 ldp x4 , x5 , [x22, #64] // a->z mov x10, x16 mov x11, x17 ldp x6 , x7 , [x22, #64+16] add x0 , sp , #0 // s = sp[0] bl ECP256_AddCore // s = 2 * a->y add x0 , sp , #32 // zsqr = sp[32*1] bl ECP256_SqrCore // zsqr = (a->z)^2 // x14 to x17 save the result of s. Calculate s^2 first. ldp x4 , x5 , [sp] add x0 , sp , #0 // s = sp[0] ldp x6 , x7 , [sp, #16] bl ECP256_SqrCore // s = s^2 ldp x14, x15, [sp, #32] // a->x ldp x8 , x9 , [x22] // a->x ldp x16, x17, [sp, #32+16] add x0 , sp , #64 // m = sp[32*2] ldp x10, x11, [x22, #16] bl ECP256_AddCore // m = a->x + zsqr ldp x14 , x15 , [sp, #32] // a->x ldp x8 , x9 , [x22] // a->x ldp x16, x17, [sp, #32+16] add x0 , sp , #32 ldp x10, x11, [x22, #16] bl ECP256_SubCore2 // zsqr = a->x - zsqr ldp x4 , x5 , [x22, #64] // a->z ldp x6 , x7 , [x22, #64+16] add x0 , x21, #64 // res_z add x2 , x22, #32 // a->y bl ECP256_MulCore // res_z = a->z * a->y // x14 to x17 save the result of res_z. mov x8 , x14 mov x9 , x15 ldp x4 , x5 , [sp] // s = sp[0] mov x10, x16 mov x11, x17 ldp x6 , x7 , [sp, #16] add x0 , x21, #64 // res_z bl ECP256_AddCore // res_z = 2 * res_z add x0 , x21, #32 // x0 points to res_y, that is r->y bl ECP256_SqrCore // res_y = s^2 add x0 , x21, #32 bl ECP256_DivBy2Core // res_y = res_y / 2 ldp x4 , x5 , [sp, #64] // m = sp[64] ldp x6 , x7 , [sp, #64+16] add x2 , sp , #32 // zsqr = sp[32] add x0 , sp , #64 bl ECP256_MulCore // m = m * zsqr // x14–x17 saves the result of m. Save an extra copy to x4–x7. mov x8 , x14 mov x4 , x14 mov x9 , x15 mov x5 , x15 mov x10, x16 mov x6 , x16 mov x11, x17 mov x7 , x17 add x0 , sp , #64 bl ECP256_AddCore // m = 2 * m mov x8 , x4 mov x9 , x5 mov x10, x6 mov x11, x7 bl ECP256_AddCore // m = 3 * m ldp x4 , x5 , [sp] // s = sp[0] add x2 , x22, #0 // a->x ldp x6 , x7 , [sp, #16] add x0 , sp , #0 // s = sp[0] bl ECP256_MulCore // s = s * a->x // x14~x17 exactly saves the result of s mov x8 , x14 mov x9 , x15 ldp x4 , x5 , [sp, #64] mov x10, x16 mov x11, x17 ldp x6 , x7 , [sp, #64+16] add x0 , sp , #96 // tmp = sp[96] bl ECP256_AddCore // tmp = 2 * s // x14~x17 exactly saves the result of m. add x0 , x21, #0 // res_x = r->x bl ECP256_SqrCore // res_x = m^2 // x14~x17 exactly saves the result of res_x. ldp x8 , x9 , [sp, #96] // tmp = sp[96] ldp x10, x11, [sp, #96+16] bl ECP256_SubCore1 // res_x = res_x - tmp // x14~x17 exactly saves the result of res_x, Therefore, ECP256_SubCore2 is invoked. ldp x8 , x9 , [sp] // s = sp[0] ldp x10, x11, [sp, #16] add x0 , sp , #0 bl ECP256_SubCore2 // s = s - res_x // x14~x17 exactly saves the result of s, x0 still points to s. mov x4 , x14 mov x5 , x15 mov x6 , x16 mov x7 , x17 add x2 , sp , #64 // m = sp[64] bl ECP256_MulCore // s = s * m // x14 to x17 just save the result of s, so call ECP256_SubCore1. add x0 , x21, #32 // x0 points to res_y ldp x8 , x9 , [x0] // res_y ldp x10, x11, [x0, #16] bl ECP256_SubCore1 // res_y = s - res_y add sp , x29, #0 // Free temporary variable ldp x19, x20, [x29, #16] ldp x21, x22, [x29, #32] ldp x29, x30, [sp], #96 AARCH64_AUTIASP ret .size ECP256_PointDouble,.-ECP256_PointDouble .globl ECP256_OrdMul .type ECP256_OrdMul,%function .align 4 ECP256_OrdMul: AARCH64_PACIASP stp x29, x30, [sp, #-64]! add x29, sp , #0 stp x19, x20, [sp, #16] stp x21, x22, [sp, #32] stp x23, x24, [sp, #48] adrp x23, .Lord add x23, x23, :lo12:.Lord // x23 = &n ldp x12, x13, [x23] // n[0~3] ldp x21, x22, [x23, #16] ldr x23, [x23, #32] // x23 = LordK ldp x4 , x5 , [x1] // a[0~3] ldp x6 , x7 , [x1, #16] ldr x3 , [x2] // x3 = b[0] mul x14, x4 , x3 // a[0~3] * b[0] umulh x8 , x4 , x3 mul x15, x5 , x3 umulh x9 , x5 , x3 mul x16, x6 , x3 umulh x10, x6 , x3 mul x17, x7 , x3 umulh x11, x7 , x3 // a[0-3] * b[0] is stored in x14~x17, x19, x20. adds x15, x15, x8 adcs x16, x16, x9 adcs x17, x17, x10 adc x19, xzr, x11 // x19 = x11 + CF mov x20, xzr // reduce // n[0] = 0xf3b9cac2fc632551 // n[1] = 0xbce6faada7179e84 // n[2] = 0xffffffffffffffff, lo(q*n[2]) = -q , hi(q*n[2]) = q // n[3] = 0xffffffff00000000, lo(q*n[3]) = -lq<<32, hi(q*n[3]) = q-hq mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), Equivalent to q in Montgomery // modular multiplication lsl x8 , x24, #32 // lq << 32 lsr x9 , x24, #32 // hq subs x16, x16, x24 // x16 = x16 + lo(q*n[2]) = x16 - q sbcs x17, x17, x8 // x17 = x17 + lo(q*n[3]) = x17 - lq<<32 sbcs x19, x19, x9 // x19 = x19 - hq, Should have added q-hq, here first subtract hq, then add q. sbc x20, x20, xzr // x20 = x20 - CF umulh x9 , x12, x24 // hi(q*n[0]) mul x10, x13, x24 // lo(q*n[1]) umulh x11, x13, x24 // hi(q*n[1]) // First calculate the value to be added to the same accumulator. subs xzr, x14, #1 // CF = (x14 < 1)? adcs x10, x10, x9 // x10 = hi(q*n[0]) + lo(q*n[1]) adc x11, x11, xzr // x11 = hi(q*n[1]) + CF // S /= r, accumulation of staggered blocks adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1]) adcs x15, x16, x11 // x15 = x16 + hi(q*n[1]) adcs x16, x17, x24 // x16 = x17 + hi(q*n[2]) adcs x17, x19, x24 // x17 = x19 + q, hq has been subtracted from x19 in front, // so here x17 = hi(q*n[3]) adc x19, x20, xzr // x19 = x20 + CF ldr x3 , [x2, #8] // b[1] mul x8 , x4 , x3 mul x9 , x5 , x3 mul x10, x6 , x3 mul x11, x7 , x3 // add lo(a[0~3] * b[i]) adds x14, x14, x8 adcs x15, x15, x9 adcs x16, x16, x10 adcs x17, x17, x11 adc x19, x19, xzr umulh x8 , x4 , x3 umulh x9 , x5 , x3 umulh x10, x6 , x3 umulh x11, x7 , x3 // add hi(a[0~3] * b[i]) adds x15, x15, x8 adcs x16, x16, x9 adcs x17, x17, x10 adcs x19, x19, x11 adc x20, xzr, xzr // reduce mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q // in Montgomery modular multiplication lsl x8 , x24, #32 lsr x9 , x24, #32 subs x16, x16, x24 sbcs x17, x17, x8 sbcs x19, x19, x9 sbc x20, x20, xzr umulh x9 , x12, x24 // hi(q*n[0]) mul x10, x13, x24 // lo(q*n[1]) umulh x11, x13, x24 // hi(q*n[1]) subs xzr, x14, #1 adcs x10, x10, x9 adc x11, x11, xzr // S /= r, accumulation of staggered blocks adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1]) adcs x15, x16, x11 // x15 = x16 + hi(q*n[1]) adcs x16, x17, x24 // x16 = x17 + hi(q*n[2]) adcs x17, x19, x24 // x17 = x19 + q, hq has been subtracted from x19 in front, // so here x17 = hi(q*n[3]) adc x19, x20, xzr // x19 = x20 + CF ldr x3 , [x2, #16] // b[2] mul x8 , x4 , x3 mul x9 , x5 , x3 mul x10, x6 , x3 mul x11, x7 , x3 // adds lo(a[0~3] * b[i]) adds x14, x14, x8 adcs x15, x15, x9 adcs x16, x16, x10 adcs x17, x17, x11 adc x19, x19, xzr umulh x8 , x4 , x3 umulh x9 , x5 , x3 umulh x10, x6 , x3 umulh x11, x7 , x3 // adds hi(a[0~3] * b[i]) adds x15, x15, x8 adcs x16, x16, x9 adcs x17, x17, x10 adcs x19, x19, x11 adc x20, xzr, xzr // reduce mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery // modular multiplication lsl x8 , x24, #32 lsr x9 , x24, #32 subs x16, x16, x24 sbcs x17, x17, x8 sbcs x19, x19, x9 sbc x20, x20, xzr umulh x9 , x12, x24 // hi(q*n[0]) mul x10, x13, x24 // lo(q*n[1]) umulh x11, x13, x24 // hi(q*n[1]) subs xzr, x14, #1 adcs x10, x10, x9 adc x11, x11, xzr // S /= r, accumulation of staggered blocks adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1]) adcs x15, x16, x11 // x15 = x16 + hi(q*n[1]) adcs x16, x17, x24 // x16 = x17 + hi(q*n[2]) adcs x17, x19, x24 // x17 = x19 + q, hq has been subtracted from x19 in front, // so here x17 = hi(q*n[3]) adc x19, x20, xzr // x19 = x20 + CF ldr x3 , [x2, #24] // b[3] mul x8 , x4 , x3 mul x9 , x5 , x3 mul x10, x6 , x3 mul x11, x7 , x3 // add lo(a[0~3] * b[i]) adds x14, x14, x8 adcs x15, x15, x9 adcs x16, x16, x10 adcs x17, x17, x11 adc x19, x19, xzr umulh x8 , x4 , x3 umulh x9 , x5 , x3 umulh x10, x6 , x3 umulh x11, x7 , x3 // add hi(a[0~3] * b[i]) adds x15, x15, x8 adcs x16, x16, x9 adcs x17, x17, x10 adcs x19, x19, x11 adc x20, xzr, xzr // reduce mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery // modular multiplication. lsl x8 , x24, #32 lsr x9 , x24, #32 subs x16, x16, x24 sbcs x17, x17, x8 sbcs x19, x19, x9 sbc x20, x20, xzr umulh x9 , x12, x24 // hi(q*n[0]) mul x10, x13, x24 // lo(q*n[1]) umulh x11, x13, x24 // hi(q*n[1]) subs xzr, x14, #1 adcs x10, x10, x9 adc x11, x11, xzr // S /= r, Accumulation of staggered blocks adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1]) adcs x15, x16, x11 // x15 = x16 + hi(q*n[1]) adcs x16, x17, x24 // x16 = x17 + hi(q*n[2]) adcs x17, x19, x24 // x17 = x19 + q, hq has been subtracted from x19 in front, so here x17 = hi(q*n[3]) adc x19, x20, xzr // x19 = x20 + CF // So far, x14 to x17, and x19 retain the calculation results. // x8~x11 save r -= n subs x8 , x14, x12 sbcs x9 , x15, x13 sbcs x10, x16, x21 sbcs x11, x17, x22 sbcs xzr, x19, xzr // Finally, the CF bit is set to indicate whether r-n needs to be borrowed. // r = r-n < 0 ? r : r-n csel x14, x14, x8 , lo csel x15, x15, x9 , lo csel x16, x16, x10, lo csel x17, x17, x11, lo stp x14, x15, [x0] // Write the result to r stp x16, x17, [x0, #16] ldp x19, x20, [sp, #16] ldp x21, x22, [sp, #32] ldp x23, x24, [sp, #48] ldr x29, [sp], #64 AARCH64_AUTIASP ret .size ECP256_OrdMul,.-ECP256_OrdMul .globl ECP256_OrdSqr .type ECP256_OrdSqr,%function .align 4 ECP256_OrdSqr: AARCH64_PACIASP stp x29, x30, [sp, #-64]! add x29, sp , #0 stp x19, x20, [sp, #16] stp x21, x22, [sp, #32] stp x23, x24, [sp, #48] adrp x23, .Lord add x23, x23, :lo12:.Lord // x23 = &n ldp x12, x13, [x23] // n[0~3] ldp x21, x22, [x23, #16] ldr x23, [x23, #32] // x23 = LordK ldp x4 , x5 , [x1] // x4~x7 = a[0~3] ldp x6 , x7 , [x1, #16] .align 4 .Lord_sqr: sub x2 , x2 , #1 /****************************************** x7 x1 x20 x19 x17 x16 x15 x14 h0*1 l0*1 h0*2 l0*2 h0*3 l0*3 h1*2 l1*2 h1*3 l1*3 h2*3 l2*3 h3*3 l3*3 h2*2 l2*2 h1*1 l1*1 h0*0 l0*0 *******************************************/ // a[1~3] * a[0] mul x15, x5 , x4 // lo(a[1] * a[0]) umulh x8 , x5 , x4 // hi(a[1] * a[0]) mul x16, x6 , x4 // lo(a[2] * a[0]) umulh x9 , x6 , x4 // hi(a[2] * a[0]) mul x17, x7 , x4 // lo(a[3] * a[0]) umulh x19, x7 , x4 // hi(a[3] * a[0]) adds x16, x16, x8 adcs x17, x17, x9 adc x19, x19, xzr // No more carry // a[2~3] * a[1] mul x8 , x6 , x5 // lo(a[2] * a[1]) umulh x9 , x6 , x5 // hi(a[2] * a[1]) mul x10, x7 , x5 // lo(a[3] * a[1]) umulh x11, x7 , x5 // hi(a[3] * a[1]) // a[3] * a[2] mul x20, x7 , x6 umulh x1 , x7 , x6 // Add the calculation result of the current round, // and then add the calculation result with the acc (register in the preceding note). adds x9 , x10, x9 adc x10, x11, xzr adds x17, x17, x8 adcs x19, x19, x9 adcs x20, x20, x10 adc x1 , x1 , xzr // a[0-3] has been saved in x4 to x7. // a[0~3] ^ 2 mul x14, x4 , x4 umulh x4 , x4 , x4 mul x8 , x5 , x5 umulh x5 , x5 , x5 mul x9 , x6 , x6 umulh x6 , x6 , x6 mul x10, x7 , x7 umulh x7 , x7 , x7 // acc[1~6] << 1 adds x15, x15, x15 adcs x16, x16, x16 adcs x17, x17, x17 adcs x19, x19, x19 adcs x20, x20, x20 adcs x1 , x1 , x1 adc x3 , xzr, xzr // acc[] += a[] ^ 2 adds x15, x15, x4 adcs x16, x16, x8 adcs x17, x17, x5 adcs x19, x19, x9 adcs x20, x20, x6 adcs x1 , x1 , x10 adc x7 , x7 , x3 // Four rounds of reduce mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery // modular multiplication umulh x9 , x12, x24 // hi(q*n[0]) mul x10, x13, x24 // lo(q*n[1]) umulh x11, x13, x24 // hi(q*n[1]) // First calculate the value to be added to the same accumulator. subs xzr, x14, #1 // CF = (x14 < 1) adcs x10, x10, x9 // x10 = hi(q*n[0]) + lo(q*n[1]) adc x11, x11, xzr // x11 = hi(q*n[1]) + CF // S /= r, accumulation of staggered blocks adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1]) adcs x15, x16, x11 // x15 = x16 + hi(q*n[1]) adcs x16, x17, x24 // x16 = x17 + hi(q*n[2]) adc x17, xzr, x24 // x17 += q, Supposed to be add hi(q*n[3]) = q-hq, hq will be subtracted later. lsl x8 , x24, #32 // lq << 32 lsr x9 , x24, #32 // hq subs x15, x15, x24 // x15 = x15 + lo(q*n[2]) = x15 - q sbcs x16, x16, x8 // x16 = x16 + lo(q*n[3]) = x16 - lq<<32 sbc x17, x17, x9 // x17 = x17 - hq, (remaining part of hi(q*n[3])) // Round 2 reduce mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery // modular multiplication umulh x9 , x12, x24 // hi(q*n[0]) mul x10, x13, x24 // lo(q*n[1]) umulh x11, x13, x24 // hi(q*n[1]) // First calculate the value to be added to the same accumulator. subs xzr, x14, #1 // CF = (x14 < 1) adcs x10, x10, x9 // x10 = hi(q*n[0]) + lo(q*n[1]) adc x11, x11, xzr // x11 = hi(q*n[1]) + CF // S /= r, accumulation of staggered blocks adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1]) adcs x15, x16, x11 // x15 = x16 + hi(q*n[1]) adcs x16, x17, x24 // x16 = x17 + hi(q*n[2]) adc x17, xzr, x24 // x17 += q, Supposed to be add hi(q*n[3]) = q-hq, hq will be subtracted later. lsl x8 , x24, #32 // lq << 32 lsr x9 , x24, #32 // hq subs x15, x15, x24 // x15 = x15 + lo(q*n[2]) = x15 - q sbcs x16, x16, x8 // x16 = x16 + lo(q*n[3]) = x16 - lq<<32 sbc x17, x17, x9 // x17 = x17 - hq, (The remainder of the hi(q*n[3])) // Round 3 reduce mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery // modular multiplication umulh x9 , x12, x24 // hi(q*n[0]) mul x10, x13, x24 // lo(q*n[1]) umulh x11, x13, x24 // hi(q*n[1]) // First calculate the value to be added to the same accumulator. subs xzr, x14, #1 // CF = (x14 < 1) adcs x10, x10, x9 // x10 = hi(q*n[0]) + lo(q*n[1]) adc x11, x11, xzr // x11 = hi(q*n[1]) + CF // S /= r, accumulation of staggered blocks adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1]) adcs x15, x16, x11 // x15 = x16 + hi(q*n[1]) adcs x16, x17, x24 // x16 = x17 + hi(q*n[2]) adc x17, xzr, x24 // x17 += q, Supposed to be add hi(q*n[3]) = q-hq, hq will be subtracted later. lsl x8 , x24, #32 // lq << 32 lsr x9 , x24, #32 // hq subs x15, x15, x24 // x15 = x15 + lo(q*n[2]) = x15 - q sbcs x16, x16, x8 // x16 = x16 + lo(q*n[3]) = x16 - lq<<32 sbc x17, x17, x9 // x17 = x17 - hq, (Remaining part of hi(q*n[3])) // Round 4 reduce mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery // modular multiplication umulh x9 , x12, x24 // hi(q*n[0]) mul x10, x13, x24 // lo(q*n[1]) umulh x11, x13, x24 // hi(q*n[1]) // First calculate the value to be added to the same accumulator. subs xzr, x14, #1 // CF = (x14 < 1) adcs x10, x10, x9 // x10 = hi(q*n[0]) + lo(q*n[1]) adc x11, x11, xzr // x11 = hi(q*n[1]) + CF // S /= r, accumulation of staggered blocks adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1]) adcs x15, x16, x11 // x15 = x16 + hi(q*n[1]) adcs x16, x17, x24 // x16 = x17 + hi(q*n[2]) adc x17, xzr, x24 // x17 += q, Supposed to be add hi(q*n[3]) = q-hq, hq will be subtracted later. lsl x8 , x24, #32 // lq << 32 lsr x9 , x24, #32 // hq subs x15, x15, x24 // x15 = x15 + lo(q*n[2]) = x15 - q sbcs x16, x16, x8 // x16 = x16 + lo(q*n[3]) = x16 - lq<<32 sbc x17, x17, x9 // x17 = x17 - hq, (Remaining part of hi(q*n[3])) // add acc[4-7], x14~x19 is the current calculation result r adds x14, x14, x19 adcs x15, x15, x20 adcs x16, x16, x1 adcs x17, x17, x7 adc x19, xzr, xzr // r -= p subs x8 , x14, x12 sbcs x9 , x15, x13 sbcs x10, x16, x21 sbcs x11, x17, x22 sbcs xzr, x19, xzr // The set CF is used to determine the relationship between r and p. // r = r-p < 0 ? r : r-p // Use x4 to x7 to save the result. You can perform the square operation cyclically. csel x4 , x14, x8 , lo csel x5 , x15, x9 , lo csel x6 , x16, x10, lo csel x7 , x17, x11, lo cbnz x2 , .Lord_sqr // Number of square operations, that is a^(2^rep) stp x4 , x5 , [x0] stp x6 , x7 , [x0, #16] ldp x19, x20, [sp, #16] ldp x21, x22, [sp, #32] ldp x23, x24, [sp, #48] ldr x29, [sp], #64 AARCH64_AUTIASP ret .size ECP256_OrdSqr,.-ECP256_OrdSqr .globl ECP256_Scatterw5 .type ECP256_Scatterw5,%function .align 4 ECP256_Scatterw5: AARCH64_PACIASP stp x29, x30, [sp, #-16]! add x29, sp , #0 add x0 , x0 , x2 , lsl#3 // Needs x0 = x0 + (x2-1)*8 = x0 + x2*8 - 8 // The action of -8 is placed in the str instruction. ldp x4 , x5 , [x1] // x ldp x6 , x7 , [x1, #16] str x4 , [x0, #128*0-8] // 8*16*0 str x5 , [x0, #128*1-8] // 8*16*1 str x6 , [x0, #128*2-8] // 8*16*2 str x7 , [x0, #128*3-8] // 8*16*3 add x0 , x0 , #64*8 ldp x4 , x5 , [x1, #32] // y ldp x6 , x7 , [x1, #32+16] str x4 , [x0, #128*0-8] // 8*16*0 str x5 , [x0, #128*1-8] // 8*16*1 str x6 , [x0, #128*2-8] // 8*16*2 str x7 , [x0, #128*3-8] // 8*16*3 add x0 , x0 , #64*8 ldp x4 , x5 , [x1, #64] // z ldp x6 , x7 , [x1, #64+16] str x4 , [x0, #128*0-8] // 8*16*0 str x5 , [x0, #128*1-8] // 8*16*1 str x6 , [x0, #128*2-8] // 8*16*2 str x7 , [x0, #128*3-8] // 8*16*3 ldr x29, [sp], #16 AARCH64_AUTIASP ret .size ECP256_Scatterw5,.-ECP256_Scatterw5 .globl ECP256_Gatherw5 .type ECP256_Gatherw5,%function .align 4 ECP256_Gatherw5: AARCH64_PACIASP stp x29, x30, [sp, #-16]! add x29, sp , #0 cmp x2 , xzr csetm x3 , ne // x3 = (x2 == 0) ? 0 : -1 add x2 , x2 , x3 // x2 += x3, if x2 != 0, then x2 = x2 - 1, if not x2 = 0 add x1 , x1 , x2 , lsl#3 // x1 += x2*8, offset ldr x4 , [x1, #128*0] ldr x5 , [x1, #128*1] ldr x6 , [x1, #128*2] ldr x7 , [x1, #128*3] csel x4 , x4 , xzr, ne // If x2 = 0, Then return to 0. Otherwise, returns the read point coordinates csel x5 , x5 , xzr, ne csel x6 , x6 , xzr, ne csel x7 , x7 , xzr, ne stp x4 , x5 , [x0] // r->x stp x6 , x7 , [x0, #16] add x1 , x1 , #64*8 ldr x4 , [x1, #128*0] ldr x5 , [x1, #128*1] ldr x6 , [x1, #128*2] ldr x7 , [x1, #128*3] csel x4 , x4 , xzr, ne // If x2 = 0, return 0. Otherwise, returns the read point coordinates csel x5 , x5 , xzr, ne csel x6 , x6 , xzr, ne csel x7 , x7 , xzr, ne stp x4 , x5 , [x0, #32] // r->y stp x6 , x7 , [x0, #48] add x1 , x1 , #64*8 ldr x4 , [x1, #128*0] ldr x5 , [x1, #128*1] ldr x6 , [x1, #128*2] ldr x7 , [x1, #128*3] csel x4 , x4 , xzr, ne // If x2 = 0, return 0. Otherwise, returns the read point coordinates csel x5 , x5 , xzr, ne csel x6 , x6 , xzr, ne csel x7 , x7 , xzr, ne stp x4 , x5 , [x0, #64] // r->z stp x6 , x7 , [x0, #80] ldr x29, [sp], #16 AARCH64_AUTIASP ret .size ECP256_Gatherw5,.-ECP256_Gatherw5 .globl ECP256_Scatterw7 .type ECP256_Scatterw7,%function .align 4 ECP256_Scatterw7: AARCH64_PACIASP stp x29, x30, [sp, #-16]! add x29, sp , #0 // add x0 , x0 , x2 sub x2 , x2 , #63 // x2 = x2 - 63 sub x0 , x0 , x2 // x0 = x0 - (x2(original) - 63) = x0 + (63 - x2(original)) mov x2 , #8 // Loop count .Lscatter_w7: ldr x3 , [x1], #8 subs x2 , x2 , #1 strb w3 , [x0, #64*0] lsr x3 , x3 , #8 strb w3 , [x0, #64*1] lsr x3 , x3 , #8 strb w3 , [x0, #64*2] lsr x3 , x3 , #8 strb w3 , [x0, #64*3] lsr x3 , x3 , #8 strb w3 , [x0, #64*4] lsr x3 , x3 , #8 strb w3 , [x0, #64*5] lsr x3 , x3 , #8 strb w3 , [x0, #64*6] lsr x3 , x3 , #8 strb w3 , [x0, #64*7] add x0 , x0 , #64*8 b.ne .Lscatter_w7 ldr x29, [sp], #16 AARCH64_AUTIASP ret .size ECP256_Scatterw7,.-ECP256_Scatterw7 // The anti-cache attack solution can be used together with ECP256_Scatterw7. .globl ECP256_Gatherw7 .type ECP256_Gatherw7,%function .align 4 ECP256_Gatherw7: AARCH64_PACIASP stp x29, x30, [sp, #-16]! add x29, sp , #0 cmp x2 , xzr csetm x3 , ne // x3 = (x2 == 0) ? 0 : -1 add x2 , x2 , x3 // x2 = (x2 == 0) ? 0 : (x2 - 1) (offset) sub x2 , x2 , #63 // x2 = x2 - 63 sub x1 , x1 , x2 // x0 = x0 - (x2(original) - 63) = x0 + (63 - x2(original)) mov x2 , #8 // Indicates the number of cycles. The x and y coordinates contain 64 bytes in total, // and 8 bytes are obtained at a time. Therefore, eight cycles are required. nop .Lgather_w7: ldrb w4 , [x1, #64*0] ldrb w5 , [x1, #64*1] ldrb w6 , [x1, #64*2] ldrb w7 , [x1, #64*3] ldrb w8 , [x1, #64*4] ldrb w9 , [x1, #64*5] ldrb w10, [x1, #64*6] ldrb w11, [x1, #64*7] // x4 = x4 | x5 << 8 // x6 = x6 | x7 << 8 // x4 = x4 | x6 << 16 // x4 = [x7][x6][x5][x4] orr x4 , x4 , x5 , lsl#8 orr x6 , x6 , x7 , lsl#8 orr x4 , x4 , x6 , lsl#16 // x8 = x8 | x9 << 8 // x10 = x10 | x11 << 8 // x8 = x8 | x10 << 16 // x8 = [x11][x10][x9][x8] orr x8 , x8 , x9 , lsl#8 orr x10, x10, x11, lsl#8 orr x8 , x8 , x10, lsl#16 // x4 = x4 | x8 << 32 // x4 = [x11][x10][x9][x8] orr x4 , x4 , x8 , lsl#32 and x4 , x4 , x3 str x4 , [x0], #8 add x1 , x1 , #64*8 subs x2 , x2, #1 b.ne .Lgather_w7 ldr x29,[sp],#16 AARCH64_AUTIASP ret .size ECP256_Gatherw7,.-ECP256_Gatherw7 #endif
2401_83913325/openHiTLS-examples_7925
crypto/ecc/src/asm/ecp256_armv8.S
Unix Assembly
unknown
71,139
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC /* * Base point pre-computation table, which contains 37 subtables of point multiplication results of each window. * The size of each subtable is 64 x 64 bytes. * Coordinates (x, y) of points in the subtable. Each column contains 32 bytes and is arranged in little-endian mode * from top to bottom. * The columns from right to left are the point multiplication results of window values starting from 1 and increasing. */ .section .rodata .type g_preCompTable,%object .balign 4096 g_preCompTable: .byte 0x80,0xe5,0x91,0xcc,0x19,0x8e,0xf0,0x28,0x14,0x83,0x53,0x8d,0x04,0xc9,0x1a,0xd3,0x12,0x97,0xd9,0xbf,0x7c,0x06,0x01,0x91,0x3e,0x42,0xee,0xb5,0xb7,0xf5,0xd3,0x34,0xd8,0x89,0x43,0x32,0x1f,0xb4,0x08,0x9f,0x19,0x68,0x76,0x08,0x31,0xe8,0x7a,0x9d,0x80,0x5b,0x4a,0x09,0x68,0x04,0xc8,0xe8,0x8f,0x4f,0x4a,0xf5,0xcc,0x27,0x4d,0x3c .byte 0x8b,0x1f,0x2f,0x04,0x6e,0xaa,0x82,0xca,0x7a,0x56,0xcf,0x4d,0x59,0x64,0x17,0xac,0xc6,0x60,0x90,0x79,0x89,0x7d,0xad,0x2e,0x9f,0xc1,0xc0,0x08,0x9b,0x7e,0x3c,0x45,0xa3,0xff,0xb3,0xe1,0xcd,0xfe,0x80,0x87,0x28,0x50,0x30,0xb2,0x7a,0x9a,0xa9,0x5c,0xfb,0x05,0x66,0xd7,0x77,0xe4,0x1e,0x20,0xa7,0x3b,0x66,0x61,0x8d,0xc1,0xd6,0x14 .byte 0x96,0xf9,0x96,0x4c,0x8a,0x46,0xea,0xca,0x8d,0x30,0x12,0x6c,0x44,0x3f,0x8c,0xf6,0xad,0xa7,0xee,0xcd,0x5a,0x8a,0x2b,0xd2,0x2e,0x59,0x63,0xce,0x21,0xc6,0xa2,0x66,0xe3,0x55,0x98,0x66,0x2c,0xe2,0x1f,0x37,0xd0,0xe4,0x6f,0x35,0x33,0x65,0xad,0x3c,0xc6,0x60,0xcf,0x2e,0x69,0x45,0xc2,0x4e,0x99,0x17,0x77,0x5c,0x91,0xeb,0xdd,0xa9 .byte 0x05,0x9f,0xa1,0x7f,0xed,0x5c,0xa7,0x7a,0x7e,0xe7,0xb2,0x54,0x83,0x3b,0x48,0x1f,0x77,0xca,0x49,0xd5,0xd5,0x24,0xed,0x2e,0xb8,0xa0,0x4d,0x8c,0xa8,0xde,0x7c,0x0f,0xc5,0x67,0x32,0xcb,0x17,0x97,0xed,0xd8,0x15,0x2d,0x2f,0xc1,0xd2,0xa5,0x56,0xd5,0x0b,0xbc,0xb0,0x4b,0xd2,0x62,0x9d,0x26,0x94,0xa0,0x3e,0xc4,0x46,0x4e,0x10,0x18 .byte 0xf3,0x31,0x75,0x1a,0x28,0xd6,0xe8,0xe7,0x40,0xf9,0x8e,0x38,0x6e,0x1c,0xd0,0x42,0x30,0x13,0xb1,0xcc,0x1f,0xfd,0xcf,0x49,0x1d,0x88,0xca,0xc5,0xd6,0x7f,0x14,0x56,0xcf,0x69,0xb1,0x6a,0xb7,0xf4,0x32,0xac,0xb2,0x53,0x35,0xec,0x29,0xba,0xc8,0xcb,0x65,0xb7,0x5b,0x63,0xa7,0x0a,0xd1,0x8f,0xd1,0x4e,0x37,0xae,0x0d,0x90,0xd4,0xd4 .byte 0x96,0xd9,0xf1,0xeb,0x68,0x4e,0x00,0x32,0x41,0xbb,0x5b,0x96,0xf3,0xec,0xc2,0x0b,0x41,0x75,0xb5,0x26,0x7c,0x3f,0x5c,0x60,0x68,0x94,0xc3,0x7b,0x58,0x84,0x20,0x14,0xfc,0x3c,0x1c,0xb4,0x3e,0x2a,0xad,0x19,0x83,0x76,0x11,0x4c,0x91,0x12,0x51,0x1d,0x0b,0xd8,0xa3,0x25,0x1a,0x26,0xdb,0x6e,0x4c,0x35,0x47,0x8a,0xb5,0x3f,0x46,0x30 .byte 0x6d,0xd3,0x35,0x67,0x1e,0xd4,0x6c,0xc8,0xc4,0x8b,0x42,0x35,0x92,0x8c,0xb9,0x95,0x34,0x3c,0x75,0xe4,0xfd,0xf2,0xb3,0x4d,0xd7,0xd8,0x2c,0x46,0x5e,0x16,0xab,0x15,0xc5,0xf7,0x24,0x5d,0x52,0x2c,0xe4,0xa3,0x38,0xf8,0xc6,0x2e,0x97,0xa9,0x3e,0x09,0x8b,0xbc,0x42,0xc4,0xb7,0x7d,0x18,0xc9,0xf1,0x46,0x39,0x1b,0xb0,0xac,0x00,0xe7 .byte 0xdb,0xb8,0xe5,0x36,0xdc,0x69,0xf2,0x3e,0x8f,0x25,0xa0,0x97,0x26,0x50,0x0f,0x21,0x6b,0x28,0x40,0x1e,0xec,0x4f,0x5f,0x62,0xe4,0xa9,0x8a,0x00,0x3d,0xfd,0xb6,0x87,0xd8,0xe2,0xb4,0x5e,0x4b,0x04,0x61,0xa4,0x6d,0xf4,0x0f,0x56,0x8a,0xfe,0x5f,0x97,0x80,0x72,0xa2,0xcc,0x04,0xea,0x2c,0x75,0x27,0x07,0x40,0xbe,0x74,0xff,0x85,0x79 .byte 0xb9,0xed,0xa7,0x84,0xc7,0xd1,0xaf,0x29,0x6a,0xe6,0x5f,0x79,0xc0,0x3f,0x78,0x09,0xa0,0x06,0xba,0x18,0xfb,0xfa,0xc7,0x22,0x3c,0x46,0xce,0x55,0x7f,0xb7,0x9d,0x03,0xbf,0xe6,0xa1,0x80,0x92,0x13,0x38,0xb0,0x35,0x6e,0x9a,0x7d,0xdc,0x6e,0x3e,0x7b,0x6b,0x4b,0xe3,0x0d,0x33,0xe0,0x39,0x41,0x55,0xf7,0x3e,0x7d,0x73,0xfb,0x7d,0x01 .byte 0x73,0x8e,0xf5,0x4f,0xd9,0x63,0x9a,0x5b,0xf3,0x5b,0x7c,0x46,0xf9,0xdf,0x52,0x69,0x03,0x39,0x9e,0x6e,0x10,0x73,0xa5,0x28,0xe1,0x93,0x48,0x8d,0xc5,0x76,0x84,0xf1,0xdf,0x17,0x65,0x58,0xa8,0x73,0x75,0x67,0x9a,0x1f,0x2a,0xf4,0x2b,0xa1,0x40,0x17,0x2e,0x7e,0x07,0xd3,0x5a,0xdf,0x81,0xa8,0x34,0x00,0xee,0x53,0xc1,0x81,0x82,0xb6 .byte 0x9f,0x51,0x58,0x40,0x89,0xd0,0x29,0x38,0x56,0xef,0x55,0xf2,0x45,0x5e,0x68,0xdc,0xd8,0xc8,0x6e,0x6c,0x91,0x88,0xa6,0x07,0x25,0x0b,0xe9,0x17,0x06,0x3e,0x91,0x68,0x79,0x30,0x4f,0x92,0xa6,0xbf,0xb1,0x6b,0xdd,0x2e,0x91,0x83,0x86,0xe1,0x8b,0x0a,0xfe,0xe2,0x97,0x6f,0x34,0x7f,0xcf,0xa7,0x9b,0x3c,0x6c,0xb9,0x23,0x7d,0x33,0xed .byte 0x08,0xf0,0xed,0xa9,0x41,0xa8,0xe4,0xc7,0x95,0x07,0xf8,0x92,0xaf,0x1e,0x13,0x53,0xbb,0x36,0xa0,0x94,0xb2,0x87,0x1d,0x6f,0xdf,0xff,0x0f,0x7f,0x1b,0x23,0xa3,0x4b,0x40,0x47,0xb4,0x0d,0x30,0xae,0xd8,0xed,0x40,0x9e,0xe3,0x47,0x0f,0x25,0x8f,0xac,0x3f,0x56,0x7f,0x85,0xca,0x6e,0x0f,0x59,0x6f,0xd2,0x34,0x94,0xc6,0x08,0xa4,0x5f .byte 0x13,0x00,0x61,0x21,0x36,0xd3,0x0d,0x57,0xca,0xbf,0x2e,0xc4,0x69,0xba,0xaa,0x84,0x29,0xa9,0x9a,0x0b,0xab,0xb4,0xe3,0xb5,0x0b,0x14,0x17,0x8c,0xbd,0x64,0xc6,0x7c,0x4c,0xe7,0x49,0x3a,0x28,0xd7,0x7a,0x9e,0x50,0xe8,0x23,0x65,0x8f,0xba,0x4d,0xb6,0x75,0xee,0xf7,0x69,0xf5,0x95,0x8a,0xed,0xc5,0x13,0x4f,0x9a,0xed,0x4a,0xc1,0xfc .byte 0x09,0x48,0xe0,0x66,0x23,0xd5,0xc8,0xea,0xf3,0xa5,0x51,0x3f,0xc4,0xc0,0xfb,0x04,0x65,0x4f,0x33,0x94,0x94,0xbf,0xcb,0xe0,0x0f,0xe7,0x31,0x45,0xd0,0xe4,0xa5,0xae,0x90,0xf7,0x4e,0x96,0xcb,0x42,0x26,0xb4,0x75,0xa7,0xfa,0xb2,0x86,0x3a,0x96,0x24,0xe0,0x23,0x48,0x67,0xde,0x07,0x86,0xbf,0xb5,0x02,0x74,0x64,0xa6,0xf8,0xe3,0x95 .byte 0x0a,0x9c,0xd7,0x55,0xfc,0x00,0xca,0xfe,0x1f,0xee,0x2e,0x9c,0x0e,0x0b,0x8b,0xe7,0x49,0x62,0x5c,0x32,0x91,0xc5,0x55,0xdf,0x20,0x5a,0x23,0x36,0x91,0x2e,0xa7,0xce,0xfd,0x3c,0xa1,0xbe,0x23,0x6a,0xc9,0xc1,0x0d,0xc7,0x9f,0xe1,0x16,0x36,0xfc,0x76,0x82,0xcc,0x6e,0x35,0xde,0xe4,0xf9,0xe6,0x2a,0xd2,0xae,0xec,0x50,0x27,0x6a,0xba .byte 0x38,0x03,0x6e,0x59,0x33,0x21,0x99,0x1b,0xbb,0x31,0x4f,0x5f,0x2e,0xe2,0xa7,0xff,0xa7,0x0a,0x78,0x00,0x00,0x80,0xa1,0x6f,0x83,0x6f,0x51,0xb6,0xc6,0x74,0xca,0x85,0xbe,0xdd,0xa3,0xf1,0x73,0xd3,0xe6,0x6f,0x6d,0x37,0xc9,0x74,0x59,0x68,0x4a,0xf1,0x58,0x03,0x12,0x0e,0xab,0x9d,0x98,0xab,0x46,0x2b,0x55,0x90,0x46,0xb0,0xaa,0x75 .byte 0x01,0x26,0x33,0x0a,0xbc,0x36,0xe1,0x38,0x44,0xc1,0x6c,0xd9,0xb7,0xd4,0x6a,0x27,0xbd,0xc7,0xe0,0x58,0xb0,0x81,0x8f,0x71,0x80,0x64,0x3b,0x06,0x6e,0xc8,0x94,0xb9,0x97,0x0d,0xcd,0xe2,0xeb,0xd7,0xfb,0xaf,0x9f,0x69,0x3d,0x30,0xba,0xac,0x79,0xff,0x49,0x70,0x60,0x11,0x5e,0xb5,0x49,0x00,0x6b,0x08,0xad,0x0c,0xf2,0x98,0xd9,0x10 .byte 0x1e,0xcb,0xa2,0xb5,0x39,0x7c,0x8b,0xaf,0x00,0x14,0xd5,0xac,0x28,0x18,0xfa,0x61,0x05,0xf2,0x25,0x7f,0xd3,0x59,0x2f,0x22,0x72,0x36,0xf3,0xd8,0x57,0xb4,0x8d,0x8a,0x01,0x60,0x7a,0xb9,0x53,0xfd,0xf6,0xf3,0x46,0x40,0xba,0x3b,0x83,0x41,0x29,0x2d,0xf5,0x93,0x26,0x98,0x38,0x1a,0x0b,0xeb,0xfc,0xbb,0xa3,0xc2,0x0a,0xbc,0x90,0x25 .byte 0xc6,0x82,0x89,0xce,0x1c,0xd1,0xd7,0x1e,0x60,0xc8,0xc4,0xc8,0x75,0x43,0xb1,0x76,0x88,0x5a,0xf8,0x47,0x81,0x74,0xa9,0xce,0xf2,0xfb,0x2e,0x77,0x57,0xc2,0x67,0x57,0xad,0xf7,0xc7,0x17,0xe1,0x4f,0x7f,0xf1,0x2b,0x58,0xf8,0x3f,0xd2,0x2c,0x2e,0xfe,0x83,0x81,0x83,0x9e,0x37,0xac,0x25,0xc8,0x2c,0x23,0x17,0x76,0x10,0xcb,0x14,0x62 .byte 0xc2,0x91,0x20,0x7e,0x67,0xa2,0x7e,0xfd,0x14,0x46,0x25,0xa8,0xc6,0x2f,0xd5,0x28,0x6d,0x71,0xab,0x57,0xe3,0x05,0x30,0x39,0x66,0x16,0x22,0xa6,0xd2,0xef,0x75,0x65,0xfe,0x3c,0x3a,0x03,0xcf,0x08,0x85,0x32,0x1d,0xa3,0xd2,0x5a,0x5d,0x75,0x41,0x2c,0x2c,0xe4,0xc6,0x55,0xee,0x8d,0x48,0x44,0xf0,0x0c,0x5b,0xd0,0xe8,0x87,0x8d,0x77 .byte 0x83,0x32,0xc0,0x53,0xe2,0xea,0xb6,0xe3,0x85,0x4a,0xf9,0xed,0x01,0x85,0x68,0xb2,0xa7,0xec,0x5b,0xe0,0x46,0x90,0x4c,0x15,0x4c,0x7d,0x85,0xae,0x10,0x34,0xa3,0xae,0x58,0x9d,0xcd,0x27,0xc0,0xeb,0xeb,0x33,0xf9,0xa2,0x85,0x6c,0xd9,0x77,0xab,0x75,0x7c,0x24,0x54,0x3f,0x9d,0x15,0xd6,0x04,0x2a,0xb5,0x1a,0xaa,0xac,0xdd,0x03,0x2b .byte 0x0b,0x76,0xa4,0xf6,0x8f,0x27,0xe3,0x12,0x43,0x0e,0x6f,0x8b,0x32,0xeb,0xe2,0xd0,0xaa,0xaf,0x0d,0x8a,0x20,0xad,0x59,0x11,0x98,0x23,0xfd,0x8b,0xcb,0x41,0x73,0xc4,0x6a,0x68,0xd6,0x70,0x2e,0xc9,0xc5,0x99,0xcb,0x5f,0x06,0x50,0x99,0x22,0x47,0x39,0x2f,0x74,0xbf,0xd4,0xd2,0xa4,0x2c,0x9c,0xf0,0xaa,0x96,0xb5,0xac,0x77,0x05,0x73 .byte 0xa7,0xc3,0x7a,0xcd,0x6f,0x97,0x6f,0x82,0x84,0xeb,0x28,0x2e,0x5a,0x1d,0xfb,0x4c,0x1b,0x20,0x03,0x1e,0x0e,0xd9,0xe2,0xca,0x09,0x8f,0x63,0x74,0xe4,0x8e,0x06,0x09,0x6d,0xf5,0xf4,0x4a,0x08,0xd2,0xc7,0x95,0xd7,0x82,0x0b,0x2a,0x80,0x84,0xf2,0xf1,0xef,0x33,0x17,0xbc,0x09,0xf3,0x7d,0xc0,0x90,0x3e,0x0a,0x1c,0xda,0xad,0x22,0xfb .byte 0x7d,0x95,0x17,0x71,0x02,0xcb,0xd6,0x06,0x6a,0x0d,0xc1,0x91,0x90,0xda,0xed,0xff,0x1a,0x6b,0xa1,0x1b,0x5f,0xb7,0xc2,0xee,0x89,0x06,0x74,0xc5,0x0a,0x0b,0x5b,0xac,0xbc,0x8e,0xc5,0x94,0x97,0x49,0x1a,0xe3,0x61,0xd0,0x6a,0x6d,0x04,0xb8,0xa6,0xb0,0xd5,0xee,0x17,0xbc,0x24,0x1f,0x73,0x2c,0x8f,0xf4,0xd5,0x94,0x0c,0x66,0x73,0x79 .byte 0xc7,0x8d,0x13,0xfa,0x15,0xb7,0xcd,0xcc,0x63,0xdd,0x51,0xb0,0x42,0x43,0xa7,0x2b,0xad,0xfd,0xdc,0x78,0x91,0x94,0x43,0x4f,0x27,0xac,0x6c,0xeb,0xc3,0x21,0x64,0x0c,0xa4,0xb4,0x3c,0x48,0x97,0x6a,0x10,0x2e,0x15,0x42,0xa4,0xfc,0x4e,0xfc,0xda,0x4e,0x23,0x09,0x2e,0x59,0x56,0x73,0x8f,0x6b,0x0d,0x03,0x73,0xc8,0x6b,0x7e,0x3b,0xc6 .byte 0x38,0x56,0xb4,0x35,0x99,0x53,0x02,0x8c,0xae,0x30,0xc8,0x34,0xe5,0xa4,0xab,0xdb,0x43,0x8b,0x31,0x32,0xd2,0x19,0xfe,0x61,0x32,0x86,0x3d,0x94,0x3d,0xe5,0x3e,0xb1,0x32,0x87,0xfc,0x3d,0xdb,0xc7,0xfb,0x2a,0x31,0xbf,0x58,0x62,0xfb,0xc3,0xeb,0x57,0xb7,0xda,0xc7,0xb7,0xe1,0x90,0x42,0xe1,0x23,0x3e,0x36,0x23,0x17,0x74,0x3a,0x55 .byte 0x9b,0xfc,0x39,0x83,0x6f,0xdd,0x8d,0xcf,0x51,0xb7,0x26,0x66,0xe5,0x3f,0x7e,0xb7,0x03,0xa7,0x29,0x82,0x8d,0xb0,0xfa,0x01,0xf7,0x31,0x60,0xa3,0x4a,0xa3,0x30,0x44,0x55,0xfc,0xb6,0x60,0xaa,0xf7,0xf2,0x43,0xfc,0x27,0x33,0x67,0x5b,0x97,0x80,0x7a,0x03,0xd3,0x12,0x95,0x83,0x9c,0xb3,0xc4,0x65,0x12,0x21,0x05,0xb0,0xff,0xcf,0x37 .byte 0x56,0x82,0xe5,0x9b,0xbc,0x8a,0x64,0x6a,0x74,0xa7,0xee,0x30,0xd0,0x5c,0x2b,0x4f,0x47,0xeb,0xa4,0x6d,0xa9,0x3d,0x5b,0xdb,0x75,0x36,0x7c,0xdf,0xd5,0x42,0xdd,0xf0,0x69,0xb1,0x52,0x48,0xf2,0x2e,0x55,0x65,0x2e,0x17,0xe9,0xc1,0xfe,0x28,0x6f,0x6c,0x91,0x0a,0xfd,0x53,0xcb,0x64,0x24,0xf0,0xb2,0xc3,0x54,0x89,0x41,0xb6,0x3d,0xa5 .byte 0x94,0x34,0x3a,0xa6,0xcd,0x1b,0x5f,0x30,0x4a,0x49,0xea,0x8d,0x34,0x0d,0xdb,0x08,0x02,0x74,0xc3,0x34,0xf6,0xdb,0xce,0x4f,0x00,0xc4,0xdc,0x87,0x6c,0x86,0xd4,0x68,0x77,0xf8,0xb5,0x59,0x6a,0x4b,0xa8,0xeb,0x2f,0x7c,0xe8,0xf4,0xb6,0x28,0x1b,0x0a,0x80,0x43,0x32,0xac,0x77,0xf1,0x47,0x80,0x1e,0x19,0x59,0x05,0xf5,0x3f,0xe4,0x76 .byte 0x83,0xa4,0xb0,0x44,0x4c,0xab,0x72,0x98,0x0c,0x84,0x0f,0x31,0x7f,0xbe,0xb8,0xe6,0x39,0x99,0x84,0x7d,0x25,0x85,0x89,0x0a,0x7b,0xe4,0xc7,0xa3,0x65,0x0b,0xdd,0x68,0x70,0xc4,0x8c,0xf9,0x6b,0xa5,0xaa,0x42,0x23,0xea,0x77,0xd9,0xee,0x5c,0xbd,0x5c,0x3c,0x0e,0x73,0x77,0xdf,0x90,0xc9,0x30,0x89,0x51,0x4b,0x96,0x62,0x6a,0x32,0x5f .byte 0xfb,0x63,0xbc,0x4a,0x0c,0x2b,0x5f,0x32,0x3f,0xee,0x8a,0x3a,0xf7,0x0e,0xce,0xdb,0x40,0x96,0xc6,0x4f,0x34,0x9c,0x9c,0x10,0x2d,0x53,0xf0,0x63,0x69,0x64,0x82,0xec,0x22,0x8d,0x28,0x66,0x7f,0x8a,0x4b,0x67,0x7b,0x2c,0xc7,0xea,0xd1,0x54,0x5a,0xa3,0xd6,0xaa,0xae,0x84,0xe1,0x70,0x61,0x5b,0x63,0xba,0x07,0x07,0x73,0x93,0xbb,0x90 .byte 0x95,0x07,0x0d,0x99,0xd4,0x4c,0x30,0xc1,0xba,0x5c,0xbb,0xec,0x88,0xd2,0x0d,0xab,0xc8,0x4b,0xce,0xe9,0x5f,0x17,0x64,0x98,0x46,0x58,0xad,0x27,0x35,0xca,0xc9,0x33,0x39,0x94,0xd0,0xe2,0xe9,0x9f,0x99,0x96,0xf9,0xaf,0xfd,0xec,0xe2,0xfe,0x67,0xc1,0x54,0xe2,0xfa,0x73,0x4e,0x3e,0xcc,0xe0,0xb7,0x13,0x13,0xc9,0x57,0x26,0xf6,0x18 .byte 0x2f,0xba,0x8e,0x69,0xca,0x04,0x1b,0x59,0x2a,0xde,0x7e,0x64,0x7c,0xa3,0x10,0xe8,0xf1,0x0e,0x63,0x1a,0xda,0x6c,0x7a,0x8f,0x98,0x98,0xe5,0xb6,0x3a,0xa9,0x71,0xf1,0xf5,0x99,0xbc,0x99,0xa1,0x70,0x18,0x28,0xc7,0xa9,0x04,0xb9,0x5d,0x6b,0x1d,0x87,0x9b,0x5d,0x6b,0x7f,0x43,0x88,0x76,0x14,0x77,0x4d,0x4b,0x10,0xa6,0xeb,0xa5,0x0a .byte 0xfe,0x76,0xe3,0x9b,0x75,0x67,0xb2,0x9e,0xf3,0x2b,0x10,0xb2,0x68,0x1e,0xb7,0x09,0xdf,0xd6,0x6e,0xa2,0x50,0x96,0x25,0x62,0x17,0x2f,0x65,0xeb,0xa0,0x6a,0xf9,0xc1,0x42,0x32,0x0a,0x88,0x3d,0x5e,0x80,0x62,0xcb,0x85,0x5f,0xe5,0x00,0x69,0x5a,0x99,0x3f,0xc4,0x58,0xe1,0x5b,0x4e,0x9e,0x33,0x49,0x9d,0xe4,0x4f,0xab,0xa7,0xe1,0x56 .byte 0xed,0x3e,0x32,0xeb,0x0e,0x42,0x3f,0xac,0x9a,0x18,0xd6,0x1c,0x64,0x24,0xe2,0x11,0x5a,0x21,0x58,0x2b,0x0d,0xa6,0xff,0x5c,0x65,0xc5,0x77,0x3c,0xcd,0xeb,0xb6,0x8e,0xef,0xa5,0x04,0x20,0xa8,0x89,0x24,0x96,0x4b,0x47,0x41,0x86,0x84,0x4c,0x48,0xe7,0xa2,0x83,0x5d,0x0e,0xbb,0x94,0xdd,0x5f,0x2d,0x5b,0x77,0xba,0xcb,0x83,0xbe,0x95 .byte 0x80,0x38,0xbb,0xdb,0xf8,0x15,0x62,0x2a,0x1f,0xa0,0xe7,0xc3,0x58,0x73,0x9a,0x5e,0x17,0xd9,0xc1,0x78,0x73,0x61,0xe9,0xa3,0xf2,0x63,0xfe,0x7d,0x94,0x8c,0x5d,0x3a,0xdb,0x4e,0x1c,0x5c,0xd1,0x09,0x1d,0xb4,0xb2,0x9e,0x35,0xe2,0x78,0xdc,0x5e,0x93,0x52,0x63,0x99,0xc0,0x1c,0x2b,0x80,0xa4,0x53,0x3f,0xd3,0xe7,0xe4,0xc9,0x61,0xce .byte 0x12,0xd5,0x4e,0x19,0xbb,0x0c,0xc4,0xdb,0x5b,0xc5,0xd2,0x41,0x29,0xa7,0x89,0x28,0x66,0xcc,0xc9,0x96,0x87,0x62,0x7d,0xa2,0x88,0x23,0x3b,0x8a,0xbd,0x90,0x0b,0x2b,0x6d,0x81,0x2f,0x73,0x3e,0xba,0xe1,0xfe,0x50,0xfb,0xbb,0xb2,0x41,0xe7,0x72,0x46,0xd6,0x4f,0xb7,0x90,0xd9,0x61,0x78,0x7a,0xa9,0x30,0x20,0x4a,0x4c,0x1f,0xd3,0x57 .byte 0x65,0x04,0x42,0xf8,0x35,0xe9,0x1b,0xf2,0xc2,0x95,0x70,0x7f,0x8d,0x4e,0x80,0x92,0x9f,0x55,0x62,0xcb,0x66,0xb0,0x66,0xda,0xa1,0x7d,0x2d,0x44,0xae,0x01,0x00,0x83,0x3e,0xfe,0x8c,0x66,0x39,0xb7,0x14,0xc9,0xd7,0xa4,0x87,0xd4,0x1c,0xe9,0xbd,0x31,0x1b,0x52,0x2d,0x2b,0x12,0x85,0x40,0x77,0xa3,0xd0,0x62,0x9b,0xf2,0x5c,0x48,0x53 .byte 0x3c,0x7c,0xdc,0xfa,0xa1,0x84,0xed,0x09,0xca,0xb4,0x8f,0x16,0x7a,0x0b,0x9e,0x7c,0xf5,0x07,0xab,0x47,0xa0,0x41,0x58,0xb0,0x0b,0xd8,0xc3,0x2b,0xeb,0x3a,0x7b,0xc4,0xe2,0xe9,0xcc,0xdb,0x3d,0x00,0xcf,0x8d,0x51,0x60,0xa7,0x9d,0xef,0x36,0xa2,0x7d,0xf1,0xb8,0xb5,0x75,0xac,0x76,0x2b,0xb7,0x9d,0x47,0xd3,0x30,0x96,0x4c,0x36,0xf2 .byte 0x9a,0x70,0xe3,0xd7,0xaf,0xa0,0x33,0xb9,0xdf,0xea,0xc2,0x80,0xf6,0x37,0xbf,0x83,0x39,0x22,0x42,0xc7,0xbf,0xba,0xd1,0xb6,0xd9,0xe2,0x0e,0xa1,0xe5,0x65,0xfd,0x6a,0x09,0xd9,0xd5,0x98,0x1d,0x92,0x84,0x4b,0xa5,0x03,0x94,0xf2,0x82,0x2d,0x66,0x22,0xf2,0x40,0x27,0x35,0x0c,0x1a,0x0c,0x1e,0xf5,0x28,0x93,0xeb,0x2d,0xb0,0x2f,0xdd .byte 0x82,0x97,0x1e,0x0d,0x2c,0xea,0xad,0x2a,0x4b,0xb4,0xaa,0xf2,0x62,0x65,0x96,0x5a,0xb7,0x13,0x2b,0xa5,0x7f,0xa8,0xae,0x47,0x34,0x76,0x09,0x50,0x13,0xd5,0x92,0xef,0x08,0x28,0x4a,0xa3,0x68,0x58,0x08,0x50,0x56,0x4a,0xa4,0x61,0xae,0xc5,0x3c,0x0e,0x87,0x25,0xc2,0xe3,0x37,0xc8,0x08,0xe3,0x15,0xdd,0xb5,0x2b,0x47,0x1a,0xf8,0x5c .byte 0xaf,0x81,0x70,0x35,0xff,0xeb,0x19,0x78,0x21,0xa6,0x65,0x13,0x35,0x5f,0x9c,0x5b,0xc5,0xca,0x3f,0x33,0x3b,0xe5,0x50,0x9a,0x1c,0x88,0x04,0xd8,0xfe,0x52,0x6f,0xd5,0x99,0x60,0x9b,0x18,0x2a,0xfb,0xc5,0x39,0xe3,0x9f,0xfe,0x3c,0xcb,0x77,0x0b,0xb8,0x65,0x1b,0x37,0xd2,0x56,0x61,0xbe,0x45,0xba,0x7b,0x14,0x88,0xf4,0xfe,0x6f,0xe4 .byte 0xae,0x4e,0x06,0xd4,0xad,0x37,0x63,0x61,0xf2,0x27,0x62,0x21,0xdf,0x1a,0x44,0x64,0xd8,0xae,0xb4,0x2b,0x08,0xdc,0x2c,0x7e,0xab,0x82,0x38,0x20,0x2b,0x78,0x87,0x47,0x0a,0xeb,0xbf,0xfb,0x4b,0xb7,0x8a,0xf4,0xa1,0x29,0x23,0xbb,0xff,0xa9,0x4f,0x9c,0x0b,0xa4,0x22,0x2e,0x89,0x7f,0x3f,0x5d,0x9e,0xa6,0xff,0xeb,0xd6,0x61,0x23,0x19 .byte 0x8f,0x82,0x68,0xee,0x22,0xa8,0x7a,0xb6,0xb1,0x9e,0xe7,0x52,0x22,0x5e,0xa4,0xf4,0xb7,0x7b,0x5a,0xf7,0x4b,0xea,0xf3,0xc8,0x36,0x81,0xbf,0x6f,0x16,0x54,0x6f,0x58,0x48,0x98,0x06,0xa2,0x80,0xdd,0x62,0x43,0x88,0x27,0x4d,0x83,0xff,0xfb,0x8f,0xe8,0x4b,0x42,0x83,0x74,0xca,0xe5,0x38,0xce,0xcf,0x5d,0xad,0xe5,0xfa,0x08,0xeb,0xba .byte 0xb9,0x30,0xef,0x80,0xa0,0xd3,0x3e,0x0d,0x86,0x87,0x44,0x6f,0xae,0x1c,0xe6,0x27,0xfb,0x10,0x66,0x69,0x6c,0x52,0x11,0x2e,0x8c,0x66,0x59,0x3e,0xd3,0x0c,0x1f,0x28,0x64,0xa2,0x1e,0x47,0xc7,0x6f,0x8b,0x12,0x49,0x9c,0x6a,0xc0,0x17,0x4a,0xaf,0x30,0x19,0x54,0x9e,0x90,0xf6,0x9e,0x91,0xed,0x7d,0xf2,0x53,0xef,0x71,0xad,0xcb,0xe4 .byte 0x6b,0xb9,0xe5,0x56,0x51,0xfc,0x53,0x06,0xdb,0x9f,0xc4,0x2f,0x2e,0x51,0x7a,0x7d,0xd7,0x4e,0x1d,0x44,0x44,0xd0,0x96,0x4d,0xe1,0xa7,0xb3,0xda,0x82,0x30,0xcb,0xd1,0x9b,0x1c,0x51,0x24,0xf9,0xc6,0x89,0x63,0x49,0xa4,0x2d,0xad,0xec,0x24,0x5c,0xbf,0xc3,0x35,0x56,0x83,0xd2,0x93,0x89,0x7b,0x32,0xf2,0x2b,0x68,0x84,0x47,0xd7,0xb8 .byte 0x72,0x98,0x72,0x3c,0xc6,0x8a,0x70,0x48,0xe0,0x75,0xe0,0xb8,0xb9,0xf1,0xde,0x14,0x26,0x94,0x43,0x25,0x23,0x82,0x35,0xf9,0xc6,0xc4,0xaa,0xad,0x4e,0x3c,0xa2,0x09,0x44,0x92,0x75,0x47,0xa7,0xd0,0x39,0xcc,0xea,0xfd,0x0c,0x0f,0xd4,0x06,0x2a,0x75,0x70,0x66,0x29,0x74,0x0e,0x0f,0x3a,0xaf,0xe3,0x42,0x9c,0xc5,0x62,0x3e,0x2c,0x4a .byte 0x8f,0xac,0x64,0x47,0x12,0x77,0xfa,0x57,0x01,0xee,0x7e,0x3d,0x23,0x61,0xef,0x26,0x0b,0x9b,0x45,0xc5,0x04,0x4d,0x9b,0xb6,0x74,0x2e,0xcc,0xe7,0x93,0x31,0xbb,0x55,0x7e,0x2d,0xb6,0x90,0xa6,0x3b,0x5a,0x96,0x11,0xe5,0x64,0x1b,0xa2,0x58,0x4b,0x05,0x36,0xd7,0xbe,0x68,0x17,0x25,0xc4,0x56,0x21,0x67,0x29,0x73,0x17,0x58,0x15,0x8b .byte 0xf8,0xe0,0xee,0xa2,0x96,0xf8,0x3e,0x01,0xac,0xca,0xb1,0x97,0x9e,0x62,0x46,0xd8,0xe3,0xd4,0x5d,0x81,0x17,0x18,0xcf,0xce,0x59,0x1c,0x9c,0x2c,0xc6,0xf7,0x26,0x74,0x40,0xfc,0x41,0x9f,0x1e,0xbb,0xf5,0xee,0x01,0x71,0xb5,0xa4,0x66,0xc1,0xba,0xbb,0x9e,0x97,0xdb,0xc1,0x66,0x3d,0xd2,0x1a,0xf0,0x95,0x11,0x68,0x2e,0x8e,0xbe,0x25 .byte 0x4b,0x0d,0xe9,0xbb,0xad,0x77,0xfb,0x7a,0x96,0x18,0x36,0xe1,0xc3,0x1c,0x3a,0x8e,0x75,0x93,0x83,0x0c,0x34,0xa3,0x14,0xd9,0x43,0x7b,0x31,0x46,0xa0,0x7a,0x94,0x15,0x2e,0x03,0xa4,0x61,0xb7,0x4c,0x44,0x31,0x75,0x2f,0x35,0x29,0x5e,0x08,0x7b,0x83,0x0e,0x47,0xe7,0x5b,0x6d,0x64,0xe5,0x2f,0xbb,0x41,0x9f,0x1f,0xd2,0xe9,0x2d,0xf3 .byte 0x42,0x23,0x4b,0x44,0x51,0xe4,0x5f,0x9b,0xb5,0xe5,0x19,0xaf,0xbe,0x68,0x14,0x81,0x9d,0xed,0xf7,0xf8,0x9d,0xe6,0x60,0x57,0xf5,0x4e,0x59,0x58,0x51,0x23,0x56,0x3f,0x9a,0x98,0x3a,0x7c,0x0c,0xeb,0xa9,0xb7,0xcb,0xac,0x3a,0xac,0xa9,0x95,0x84,0x18,0x58,0x8a,0x65,0x1f,0xde,0xad,0x9b,0xb1,0x60,0xc9,0x63,0x7a,0xdd,0x2e,0x04,0x21 .byte 0x78,0x91,0x81,0xda,0x4f,0x7c,0xbe,0xc7,0xa4,0x80,0x1d,0xdc,0x9b,0x82,0xcc,0xf7,0x52,0x5d,0x55,0xc7,0xd6,0xa5,0x90,0x1d,0x5e,0xe1,0x8e,0x15,0xe2,0x6b,0x3c,0x76,0xad,0x0c,0x9b,0x77,0x2d,0x78,0x5f,0xc9,0x93,0x71,0x15,0x7f,0x8a,0xe3,0x1b,0x0d,0xb1,0x77,0x2a,0xbd,0x8a,0x1e,0x77,0x88,0xbe,0x77,0xef,0x7e,0xe5,0x1a,0x92,0xdd .byte 0xa0,0x8f,0x98,0x66,0xbd,0x01,0x2d,0x32,0xc2,0x68,0xa4,0xd2,0x4b,0x3d,0x6b,0x92,0xce,0x51,0xc0,0xde,0x7d,0x3b,0x0b,0x59,0xa3,0xfa,0xd6,0xe5,0xba,0x12,0xa3,0x4f,0x1a,0xfd,0x37,0x39,0x48,0x08,0x7b,0x59,0x31,0x13,0xda,0x3e,0x3f,0x9b,0x7f,0x7f,0x3b,0xde,0x3e,0x22,0xfa,0x89,0x65,0x9a,0x84,0xdc,0x4c,0x87,0xde,0x31,0x0e,0x88 .byte 0xa4,0x7c,0xff,0x84,0x04,0xf7,0x56,0x26,0x5b,0x6a,0x77,0xbc,0x01,0xe2,0x71,0xf5,0xf5,0x9d,0xb2,0xf6,0x24,0xcd,0xb2,0x32,0x6e,0x64,0x84,0xbc,0xc0,0xab,0x32,0x60,0x9c,0xed,0xda,0x69,0x8b,0xd1,0xe9,0x88,0xf0,0x8e,0x17,0x02,0xc5,0x5e,0x92,0x24,0x62,0xa6,0x19,0x64,0x8c,0xaa,0x2d,0x01,0x7b,0x3b,0xd4,0xa9,0x36,0x08,0xfb,0x86 .byte 0x10,0xbf,0x47,0x65,0x0a,0x51,0xab,0xab,0x9a,0xcf,0xf2,0x55,0x27,0xa5,0xb7,0x78,0x75,0x81,0xc8,0x2e,0x7a,0x91,0x00,0x77,0x25,0xb8,0xaa,0x3e,0x0a,0xe4,0x73,0x09,0x96,0xec,0x67,0x96,0x68,0x97,0xfd,0x06,0x69,0x06,0xe9,0x75,0x61,0x66,0x26,0x4e,0xc4,0xef,0xe4,0xd0,0x22,0x0d,0x7d,0x6e,0x3c,0x93,0x24,0x40,0x6c,0x82,0xa8,0xe8 .byte 0x80,0x92,0xdd,0xb6,0xc4,0x66,0x17,0xc5,0x4e,0xc2,0x3d,0xb1,0x5c,0x99,0x43,0x4d,0xa8,0x04,0x57,0x77,0x39,0x9e,0x4b,0xc6,0xab,0x47,0xbd,0xf6,0x45,0x24,0xc7,0xf9,0x7b,0xfa,0xd6,0x8a,0x4a,0x2d,0x14,0x12,0x76,0x48,0x9d,0x7a,0x91,0x85,0x26,0x2f,0x55,0x64,0xe8,0x7c,0x28,0x0c,0x5f,0x2b,0x12,0xef,0xf4,0x35,0x6b,0x78,0x19,0xd2 .byte 0x70,0x70,0x09,0xf3,0x32,0x8b,0x41,0x26,0x08,0xf4,0xeb,0x83,0x8d,0x2d,0x13,0x36,0xc2,0x27,0x65,0xb5,0x2a,0xa0,0x3d,0x7b,0x2f,0x08,0x4d,0xa8,0x26,0xf8,0xf8,0xc4,0xa4,0x45,0x72,0x1b,0x78,0x31,0xc7,0x68,0x8a,0x6f,0x74,0xa3,0xd0,0x7b,0x4d,0xd0,0x20,0xf4,0xbb,0x97,0xca,0x8e,0xb5,0x9b,0x76,0x67,0x5f,0x16,0x63,0x07,0x3b,0x85 .byte 0x49,0x9b,0xe0,0xdb,0xe8,0x7a,0x47,0x76,0x2c,0xf3,0x95,0x52,0x0f,0x4c,0x8c,0xfa,0x5c,0xfd,0xf8,0xe6,0xa4,0xdd,0x7d,0x4a,0x70,0x24,0xc3,0x88,0xa5,0x7a,0x74,0x63,0xc2,0x47,0x1f,0xe2,0x52,0xde,0x5a,0x99,0x7b,0x66,0xd0,0x7f,0xe0,0x59,0x39,0xc3,0xe2,0xad,0x1b,0xb7,0x8a,0xb8,0x4a,0x5f,0xdf,0x08,0xf7,0xe9,0xb8,0xcc,0x8a,0x5d .byte 0x84,0x95,0xac,0x2b,0xe4,0xfb,0x67,0x01,0x6c,0x4c,0x95,0x46,0x0f,0xf5,0x62,0x47,0x32,0xdd,0xb7,0xd9,0x7b,0xb2,0xbc,0x88,0xaa,0x19,0x80,0x00,0x6d,0xb4,0x0d,0x2f,0x91,0x7b,0x60,0x3b,0x58,0x4b,0x2e,0xf7,0x73,0x77,0x5c,0x47,0xfe,0x12,0x02,0x74,0xef,0x79,0xaa,0xe7,0x23,0x25,0x3b,0x83,0x06,0x24,0x07,0xd1,0x5a,0x87,0x5b,0x88 .byte 0x0e,0x40,0x35,0x87,0xbb,0x46,0x56,0x00,0x02,0xf1,0xea,0x43,0x9c,0xa2,0xc3,0xf2,0x41,0x6d,0xc1,0x2c,0x38,0x95,0x89,0x03,0xd1,0x69,0x9c,0x62,0xdd,0x8b,0x57,0xc3,0x95,0x4d,0x51,0x2a,0x40,0xd8,0xd1,0x56,0xca,0x90,0x5d,0xc9,0xc5,0x6d,0x05,0x32,0x01,0x70,0x2e,0xc9,0x53,0xe1,0xeb,0xfd,0x77,0x6e,0x4a,0x2d,0x4c,0xe5,0x0a,0x25 .byte 0x44,0x01,0xff,0x80,0x09,0x98,0x94,0xc6,0x81,0x3f,0x3f,0x59,0x26,0x83,0x94,0x7e,0xe9,0x6e,0x38,0xfe,0x90,0x4f,0xe3,0xec,0x12,0xe5,0x80,0x43,0x11,0x62,0x0c,0x03,0x92,0x91,0xce,0x2a,0x5f,0x68,0x30,0xc3,0x5e,0x7b,0x07,0xf1,0xe1,0x25,0xd9,0x26,0xb2,0x0a,0xdc,0x69,0x95,0x23,0x54,0xcd,0xf2,0x15,0x6d,0xbb,0x39,0x29,0x51,0x18 .byte 0x20,0x6a,0xcf,0xc7,0x01,0x49,0x49,0xc6,0x76,0x01,0x6e,0xda,0xf2,0xe3,0x41,0x07,0xc7,0xf8,0xa3,0xcb,0x9f,0x5f,0xcf,0xfe,0x66,0xc0,0xc2,0x61,0x9e,0x01,0x10,0x43,0xd7,0xe8,0x45,0x14,0xcc,0x10,0x80,0x8d,0xc5,0x68,0x8d,0xd5,0x04,0xee,0xc7,0x12,0xf7,0x17,0x06,0x87,0x7c,0x00,0x9a,0x59,0x12,0xd9,0x91,0x76,0x4c,0x6a,0x77,0xff .byte 0x67,0x87,0x60,0x1b,0x82,0x62,0x37,0x44,0x92,0xe8,0x55,0xa1,0xf2,0x31,0xd3,0x94,0xef,0xbf,0x3d,0x3a,0x62,0x79,0xa8,0x0b,0x46,0x0b,0xa4,0xb3,0x0b,0xa9,0x59,0x6c,0x31,0x8a,0x0d,0x98,0xb4,0x43,0x17,0x94,0x5d,0xd0,0x3e,0x86,0xe1,0x20,0x6f,0xd5,0xed,0x42,0x27,0xc0,0xf5,0x93,0x71,0x66,0xec,0xed,0xc9,0xa0,0xb1,0xf0,0xc5,0x71 .byte 0x29,0x90,0x6b,0x0d,0x04,0xa0,0x06,0xda,0x83,0x25,0x1a,0xfb,0x7e,0xd7,0xd7,0xd3,0x85,0x9b,0x03,0xd7,0xeb,0x47,0xf3,0xf7,0x03,0x0c,0xd9,0x58,0x48,0x2b,0xa1,0xb1,0x62,0xf3,0x46,0x37,0xa9,0x2d,0xed,0x7b,0x59,0x83,0x79,0xc0,0x5e,0xf7,0x6c,0xeb,0x64,0x20,0x15,0xfb,0x7f,0x68,0x78,0x08,0x56,0xea,0xa4,0x73,0x84,0xd5,0x78,0x85 .byte 0xd5,0x40,0xba,0x98,0xc0,0x69,0x7b,0xf9,0x7d,0x36,0xc1,0x9d,0xcf,0xaa,0xdd,0x22,0x50,0x59,0xd1,0x60,0x61,0xa7,0x76,0xba,0xc9,0x25,0x11,0xae,0x88,0x65,0x17,0x20,0xa2,0xc7,0x70,0x17,0xd7,0x31,0x1a,0x80,0xd3,0x00,0x94,0x62,0x83,0x2a,0x59,0x0c,0xb8,0x0a,0x08,0xe3,0xf1,0xdf,0x90,0x2c,0xdd,0x4f,0x17,0xe9,0x96,0xcd,0xfc,0x2a .byte 0x21,0x3a,0xdb,0x12,0x4f,0x8e,0x1f,0xc3,0x0d,0x3d,0x76,0x1c,0xc5,0xd7,0x4b,0x57,0xea,0xe7,0x3e,0x06,0xa6,0xdb,0xbc,0x0e,0xed,0x52,0x35,0x90,0x64,0xb0,0x96,0xa8,0x35,0xc5,0x87,0x09,0xf2,0x6e,0x93,0x9a,0xd7,0x51,0x21,0xac,0xc0,0x84,0x33,0x54,0x26,0x04,0x61,0x8e,0xaf,0x84,0x9a,0x04,0x3a,0x3f,0x37,0x7d,0x92,0x93,0x46,0xd6 .byte 0xd7,0x54,0xee,0xbf,0xeb,0x5b,0xc7,0xea,0xef,0xef,0x5b,0x0c,0xa3,0x74,0x77,0x6c,0xc5,0x13,0xb0,0x81,0x04,0x53,0x61,0xe2,0xdf,0xbc,0x80,0x00,0xd9,0xe4,0xcd,0x8e,0x4b,0x72,0xc1,0xcc,0xef,0xf0,0x26,0xc6,0xe5,0x8c,0x84,0x3b,0x39,0xeb,0x92,0x63,0x79,0x74,0xa8,0x78,0xd7,0x89,0x36,0xa8,0xcc,0x91,0x4c,0xda,0x94,0xc2,0x69,0x2a .byte 0xd5,0x16,0x39,0x97,0xac,0xea,0x31,0x00,0x3c,0x12,0xeb,0x76,0xd8,0xd1,0x83,0x77,0xc5,0xb9,0x94,0x31,0x6c,0xad,0xdf,0x9f,0x83,0xc1,0x19,0x09,0xe9,0xf8,0xbc,0x6a,0xab,0xa6,0xdc,0x09,0xd4,0x8b,0x17,0x0a,0x91,0xe9,0x39,0x80,0x63,0x46,0xd5,0x60,0xeb,0x5f,0x74,0xf1,0x8b,0x16,0x08,0x82,0x44,0x08,0xed,0xc2,0x39,0x6e,0x69,0x7a .byte 0x62,0xc7,0x4d,0x06,0xee,0x1f,0x9c,0xc9,0x3b,0xca,0xcc,0x8b,0x57,0xb2,0x0f,0xc5,0xa1,0x14,0x69,0x81,0x4d,0x1b,0xd3,0xc2,0xf9,0x08,0xc7,0xec,0x4f,0x4b,0x33,0x2c,0xe5,0xf2,0x2e,0xac,0x9b,0xde,0xe2,0x27,0xe8,0x5c,0x09,0xf5,0x13,0xb0,0xe5,0xec,0xb9,0xc3,0xd4,0x04,0xf3,0x4b,0x5c,0x88,0xe1,0x20,0x3e,0x5b,0x10,0x6d,0xfa,0x81 .byte 0x98,0x09,0x63,0x5e,0xf1,0x25,0x6a,0xcc,0x53,0x79,0xdd,0x22,0xe3,0x47,0xe8,0x8e,0xbf,0xd0,0xbd,0xec,0x32,0x34,0x36,0x96,0x2c,0x04,0xbd,0x41,0x04,0xae,0xcd,0xdf,0xb0,0x72,0x75,0x64,0xd6,0xf1,0x4e,0x2e,0x7f,0x5a,0x61,0x08,0xd6,0x30,0xf1,0x67,0x24,0xd4,0x58,0x9e,0x6b,0x33,0x38,0x36,0x81,0x68,0xa5,0xfb,0x81,0x49,0x8f,0xcb .byte 0x00,0x21,0xd3,0xcc,0x81,0x72,0x2f,0x07,0x52,0x1e,0x38,0xd9,0x26,0x7b,0xfe,0xdb,0xcf,0xfc,0x35,0x38,0x70,0x3f,0x07,0x7a,0xae,0xed,0x33,0x2e,0x2d,0xb3,0x03,0xd1,0x72,0x70,0x5c,0x50,0x32,0xcc,0xd0,0x22,0x02,0xa6,0x10,0x91,0x1b,0x39,0xcb,0x5c,0x2b,0x2d,0x4a,0x66,0x15,0xef,0xb2,0x21,0x70,0x52,0xd6,0x30,0xe3,0x0a,0x6d,0xc5 .byte 0x80,0xe2,0x21,0xef,0x5d,0xf7,0x20,0xa4,0xe6,0x42,0x9c,0x37,0x57,0x4b,0x5d,0xc7,0x84,0xa6,0x84,0x14,0xa3,0x8a,0xe4,0x40,0x29,0xa4,0xc0,0x30,0x46,0xec,0xc5,0x17,0x67,0xb8,0x3a,0x06,0x7b,0xdf,0x41,0xf4,0x32,0xb4,0xc5,0x43,0xb3,0xe3,0xe8,0x73,0x3d,0xac,0x0c,0x07,0xb3,0x8c,0x33,0xe5,0x4f,0xf2,0x35,0xb8,0x44,0x38,0x48,0x63 .byte 0x82,0x6c,0x6d,0x9e,0x42,0xbc,0x5c,0x48,0x81,0xde,0xb4,0xda,0x13,0x04,0x85,0x0c,0x81,0x93,0x46,0x43,0x17,0x5a,0xdb,0xd3,0x1a,0x6d,0xbe,0x30,0xc1,0x2b,0xa3,0x54,0xcf,0xe2,0xa5,0xfd,0x0f,0x01,0xfd,0xf6,0x78,0x5a,0x95,0x5f,0x01,0x6d,0xb0,0x8f,0x09,0x57,0x90,0xa2,0x46,0x38,0xf8,0x98,0xcf,0x95,0xa3,0xbe,0xb5,0xf5,0x6d,0x54 .byte 0xa1,0x3c,0xa4,0x63,0x0f,0x5f,0xfe,0x47,0x43,0xa5,0x0a,0x18,0x2b,0x5d,0x44,0x29,0x06,0xde,0xc5,0x40,0x6d,0x62,0x8c,0x5a,0x63,0x22,0xc3,0x68,0xa0,0x02,0x30,0xc2,0xaa,0xc5,0xc3,0x40,0xb6,0x39,0xec,0x54,0x76,0x0f,0x52,0xd4,0x47,0xe5,0x9f,0xcb,0x55,0xc9,0x5d,0x38,0xb1,0x96,0xb4,0x82,0x82,0x3d,0xd2,0xd3,0xb1,0x51,0xa5,0xff .byte 0xd3,0xde,0x55,0x9d,0x6f,0xb7,0x6f,0xed,0xbb,0x7e,0xfc,0x5c,0xbb,0xa1,0x73,0x5f,0x96,0xf4,0x4c,0x4b,0x37,0x7b,0x77,0x2a,0x87,0x19,0x88,0xb0,0x82,0x53,0x77,0x2c,0xee,0x53,0x25,0x85,0x88,0x38,0x60,0x1e,0xa0,0xdd,0xd0,0x9b,0xb6,0xda,0x9b,0xf9,0xbe,0xea,0x4c,0x69,0x81,0x87,0x0e,0x27,0xbe,0xc9,0x0e,0xf8,0x1d,0x70,0xcb,0x62 .byte 0x5b,0xfe,0x04,0x21,0x5e,0xc5,0x29,0xe2,0x2b,0x3e,0x26,0x9b,0x2a,0xf3,0x85,0x2b,0x67,0x8f,0x63,0xde,0x5e,0x83,0x3f,0xe5,0x8d,0x27,0x88,0xed,0x81,0x2e,0xba,0xf2,0xf5,0x0d,0x88,0xc6,0x42,0xdd,0x36,0xf5,0x73,0x2d,0x49,0x37,0xdf,0x7b,0x53,0xe5,0xcd,0xfc,0xee,0xa8,0x1d,0x33,0x19,0xcd,0x87,0xea,0x3d,0x0f,0x36,0x8e,0xb9,0xac .byte 0xa3,0x36,0x68,0x30,0x02,0xbd,0xa3,0x80,0x18,0x6c,0x85,0x11,0xc3,0xe8,0x02,0x62,0x4c,0x86,0xe3,0x07,0xb6,0xcc,0xc0,0xbb,0x34,0xdb,0x3b,0xcc,0x2e,0xc4,0xe4,0x3b,0x01,0xc8,0x2f,0x29,0x71,0x44,0xc8,0x25,0x17,0x1d,0x3e,0x1d,0x55,0x9a,0x9d,0xc2,0xb3,0x71,0x8f,0xaf,0xcb,0x17,0x9b,0xaf,0xd6,0x61,0xcf,0xdf,0x7b,0xa7,0xd8,0xb9 .byte 0x57,0xfd,0x2e,0x67,0x60,0xb3,0x5a,0x62,0x7b,0xc3,0x52,0xbb,0xec,0xd8,0x16,0x7e,0xf1,0x47,0x1d,0x65,0xd3,0x69,0x19,0x68,0x71,0x46,0x7b,0xa0,0xd5,0x34,0xed,0x0d,0x60,0x11,0x1f,0x37,0x67,0x8f,0xb2,0x6d,0x7d,0x87,0x35,0xd9,0x81,0x4a,0xea,0x59,0x8c,0xeb,0x8a,0x27,0xe4,0xce,0xc5,0xcf,0xa1,0xed,0x40,0x43,0x82,0xbd,0xc6,0xb6 .byte 0x33,0xca,0xcd,0xdb,0x25,0xec,0xf9,0x5f,0x4f,0xe3,0x6f,0xef,0x97,0x72,0x13,0x46,0xba,0xda,0xad,0xfa,0x10,0xc2,0xa6,0x71,0x43,0xb9,0xf9,0x78,0x53,0xa8,0x5d,0xb5,0x8b,0xcb,0xaf,0xc5,0xae,0xdf,0xbb,0x09,0x4b,0xec,0xe2,0x7d,0xff,0x84,0x0c,0xb2,0xf8,0x9a,0x04,0x4f,0x5e,0x1d,0x90,0x31,0xff,0x20,0x82,0xe6,0x63,0x3d,0xfb,0xf2 .byte 0x0c,0x9a,0x35,0xcb,0x36,0xae,0x01,0x83,0xd9,0x9e,0x74,0xc7,0x11,0x40,0x63,0xdc,0xd3,0x53,0xd9,0x9d,0x97,0x8e,0x13,0xf2,0xf8,0xd0,0xa9,0x22,0x4b,0x07,0x36,0xb2,0x1d,0xea,0x4b,0x27,0x88,0x1f,0x0b,0x34,0xf1,0x6c,0xb7,0x0b,0x39,0x8e,0xdb,0x50,0xbf,0x40,0xf8,0xc1,0x1b,0xe8,0x29,0xd9,0xd5,0xea,0x9f,0xd0,0x5b,0x73,0x50,0x7e .byte 0xa4,0x14,0x0c,0x6f,0xc8,0xe5,0xa3,0x0d,0x00,0xf7,0x9f,0xc5,0xdd,0xed,0xa9,0xa9,0x42,0xe1,0xca,0x73,0x57,0x89,0x8f,0x89,0xd2,0x43,0x5e,0x90,0xe9,0x96,0x86,0x26,0x80,0x32,0xed,0x71,0x23,0xd2,0x18,0x91,0x61,0x8b,0xe0,0x81,0xab,0xfc,0x98,0xab,0x0b,0x23,0x80,0xc0,0x15,0xf0,0x80,0x40,0x72,0x6c,0xa5,0x41,0xf5,0x0a,0x15,0xb5 .byte 0xcd,0xe6,0xeb,0x8c,0x70,0xf0,0xc3,0x8e,0xf5,0x36,0x26,0xdb,0x88,0x07,0x69,0x25,0x09,0x68,0x20,0x02,0xe3,0x11,0xa2,0x9d,0xc8,0x2d,0xd0,0x96,0xe9,0xed,0x07,0x14,0x95,0x59,0x53,0x76,0xe7,0xe7,0x8e,0xa5,0xdd,0xe7,0x2e,0xc5,0x04,0xfd,0x9b,0xc6,0x64,0xec,0x4c,0x01,0xa9,0x20,0xac,0xa7,0x64,0xb2,0x3a,0x96,0xaf,0x14,0x5a,0x9d .byte 0xa2,0x24,0xd7,0x1e,0x13,0x7f,0xce,0xc9,0x80,0xff,0x2c,0xf6,0xae,0xfa,0x4a,0xf4,0xd5,0x20,0xe4,0x3e,0x44,0xe3,0x6e,0x1d,0x29,0x8d,0xc6,0xc9,0x91,0x92,0xdb,0x29,0x5b,0x43,0xb1,0x22,0xa1,0x17,0x81,0xff,0xdf,0xa2,0xb4,0x63,0x96,0xf7,0x85,0x99,0xdd,0xc4,0x6d,0x3a,0x28,0x37,0x8e,0x97,0xdd,0xa6,0x54,0x8a,0x6e,0x49,0xf3,0xad .byte 0x7a,0x68,0xf9,0xb8,0x75,0x88,0x53,0x1c,0x0e,0xcd,0xd6,0x19,0x31,0xd6,0x91,0x4f,0x0d,0xc3,0x00,0xcc,0x30,0x3a,0xc5,0xbf,0x74,0x75,0x85,0xfb,0x03,0x86,0x5d,0xb7,0x79,0xff,0x21,0xef,0x37,0x50,0x24,0x8f,0xc0,0x9b,0xef,0xca,0xe2,0x13,0x49,0x3f,0xe4,0x55,0xe8,0xe9,0xd6,0x26,0xc6,0xf5,0x0e,0x6c,0xe5,0x18,0x20,0xb8,0x90,0xb3 .byte 0x3b,0x52,0x65,0x16,0xd7,0x31,0x14,0x47,0xbe,0xb5,0x50,0xc8,0x7f,0x7f,0xae,0x70,0x03,0x79,0xfc,0xd8,0xf0,0x82,0xa4,0xb3,0x11,0x62,0xbc,0x32,0xd3,0xb3,0x55,0xba,0xe4,0x9d,0x74,0x8e,0xb4,0xad,0xe5,0xcb,0xb3,0x7f,0x5c,0x27,0xd2,0x9e,0xcf,0x9a,0xaf,0x82,0x24,0x34,0x41,0x9c,0x45,0xe0,0x6c,0xb4,0x05,0xba,0xed,0x8d,0x3e,0xa4 .byte 0xa8,0x68,0xfe,0xc1,0xd6,0x33,0x60,0xc3,0x52,0x98,0x3a,0x1b,0x7f,0xd4,0x24,0x7e,0x84,0x6d,0x23,0x15,0x98,0x27,0x21,0x0a,0x17,0xcd,0xae,0x59,0xdd,0x00,0x63,0x6c,0x7c,0xc2,0x3f,0x4c,0x61,0x5c,0x6d,0x48,0x97,0x0b,0x1d,0xe8,0x88,0x3a,0x34,0x4f,0x99,0xd7,0xc9,0xa3,0xac,0x94,0x61,0x0a,0x0b,0x38,0x4d,0x77,0x23,0x38,0x42,0xbb .byte 0xf3,0x20,0xca,0x09,0x67,0xca,0xc0,0x54,0x87,0x81,0xa6,0x0d,0x0d,0xb7,0xb5,0x29,0x39,0x61,0xf4,0xb5,0x8c,0x1a,0xd9,0xb6,0x57,0x9e,0x68,0x02,0xb6,0xd3,0x8c,0x85,0x8f,0xda,0xd6,0x2d,0x94,0x77,0xef,0xa6,0x84,0x1f,0x8c,0x51,0x33,0xef,0x5b,0x73,0xf3,0xba,0xc7,0x47,0xa1,0xe6,0x9a,0x9a,0x89,0xed,0x0d,0xee,0x53,0x7e,0x3d,0x49 .byte 0x27,0xfb,0xc8,0xd0,0x4b,0x1a,0x5f,0xcc,0x83,0xe4,0x52,0x7f,0x6c,0xee,0xa1,0xd4,0x26,0x14,0x2c,0x10,0xed,0xd7,0x6d,0x43,0xaf,0x10,0x3d,0x1d,0x84,0x1c,0x79,0x03,0x72,0x22,0xeb,0x0d,0x15,0x10,0xa6,0x00,0xf8,0x25,0xfc,0xd6,0x7c,0x34,0x0c,0xb8,0xd0,0x4f,0xe3,0x8b,0x7b,0xf6,0x81,0x06,0x89,0x51,0x8c,0x31,0x3e,0x03,0x7e,0x37 .byte 0x85,0xa0,0x3e,0xe5,0x89,0x31,0x45,0xeb,0xfb,0x28,0x21,0x5b,0xfe,0xb1,0xd7,0x72,0x63,0x2e,0xdd,0xb2,0x1c,0x20,0xb4,0x7a,0x72,0x9b,0xeb,0xda,0x09,0xec,0xbc,0x39,0xda,0x3c,0x23,0x04,0x8c,0xef,0x87,0x7f,0x48,0x5f,0x1c,0x4f,0x42,0x76,0xc6,0x85,0x45,0xec,0x60,0x08,0x9e,0xec,0x14,0x7c,0x63,0xb0,0xb4,0x02,0x90,0xf6,0x2c,0x17 .byte 0x30,0xdc,0xfb,0xe2,0x05,0xa1,0x8a,0x72,0x9b,0x22,0x86,0x90,0x3e,0xaf,0x00,0xbb,0xa6,0x35,0x96,0xcf,0x70,0x61,0x47,0x72,0x92,0x75,0x19,0x68,0x1a,0x14,0xd3,0xee,0x81,0x69,0x47,0x5a,0xae,0x1e,0x78,0x52,0x4f,0x2a,0x81,0x10,0x04,0xa1,0x3c,0xbc,0xed,0x76,0x1e,0x68,0x69,0xcb,0xa0,0x10,0x78,0x27,0xb4,0xd5,0x42,0xdb,0x96,0xa6 .byte 0xf8,0x25,0xce,0x7c,0xe8,0xf0,0x49,0xb5,0x9c,0xb8,0x45,0xe6,0xbb,0xbd,0xe3,0xf7,0x16,0xdf,0x30,0xd8,0x22,0xe9,0xa6,0x0e,0x6d,0x51,0x39,0x0d,0x74,0xee,0x9c,0xf5,0xfb,0x08,0xf6,0x78,0x0a,0xd1,0xd5,0xb6,0x8c,0x3a,0xce,0x9c,0xb1,0x6c,0x40,0xa7,0x76,0x7b,0x6a,0x36,0x89,0x93,0xc4,0x59,0xd1,0x43,0x33,0xf6,0x1f,0x46,0xdd,0xd5 .byte 0xf6,0xda,0x00,0x1a,0x03,0x19,0x5f,0xdc,0x9e,0xc6,0x99,0x07,0xfd,0xed,0xd4,0x0c,0x47,0xcc,0xa0,0x28,0x64,0x55,0x2f,0x71,0x14,0x27,0x19,0xb8,0xb1,0x61,0xfc,0x04,0x41,0x44,0xb2,0xa1,0x57,0x58,0xe7,0x69,0x2a,0xce,0x08,0x50,0xa6,0x63,0xa4,0xa3,0x2f,0x8a,0x05,0xd9,0xfd,0xf5,0x2e,0xeb,0x3e,0xea,0xdd,0xbc,0xc2,0x59,0xc0,0x46 .byte 0x4e,0xa9,0x9e,0xe3,0x98,0xff,0x37,0x37,0x88,0x67,0x55,0x4b,0x1a,0xf9,0xaf,0xc1,0x9c,0x64,0x80,0xdd,0xbe,0xa3,0x33,0xef,0x67,0x5a,0x9d,0xd2,0x48,0x92,0x0e,0xae,0x2a,0x9d,0x47,0x80,0x89,0x97,0x51,0xdc,0xc0,0x34,0xeb,0xf6,0x4b,0x82,0x56,0xd5,0x30,0x61,0xde,0x38,0x9c,0xaf,0x62,0xf3,0x1a,0xbc,0xfb,0xaa,0xd2,0xb0,0x95,0x2c .byte 0xe7,0x44,0xce,0xdd,0xb6,0x49,0x12,0x99,0x24,0xf9,0x9c,0x38,0x0d,0x9f,0xff,0x24,0x83,0xd6,0x6d,0x66,0xeb,0xf9,0x24,0x51,0x58,0x48,0x8a,0xfb,0x7b,0xf7,0x20,0x26,0xed,0xb9,0x3e,0x9f,0x47,0xa5,0xcc,0xac,0xee,0x84,0x84,0x75,0x08,0x8f,0x3c,0x13,0xe1,0xed,0x89,0x74,0x8f,0xfe,0x6d,0xb3,0x6e,0xdc,0xbb,0xa3,0x70,0x32,0xa1,0x1f .byte 0x8a,0x45,0xa3,0xff,0x08,0x5d,0x99,0x96,0x6e,0xf4,0x04,0x75,0xb2,0x2b,0xc2,0xe9,0xb7,0x87,0xd2,0x60,0x64,0xb4,0xa5,0x5c,0xd1,0xc8,0xb8,0x32,0xab,0xa6,0xc3,0xfd,0x20,0xbd,0x38,0x3a,0x3d,0xc3,0x21,0x87,0xc2,0x4a,0x48,0x5d,0x19,0x76,0x58,0xcc,0x5f,0x59,0xc8,0x62,0x3a,0x56,0x78,0xdb,0xa2,0x62,0xd5,0x8a,0x23,0x4b,0x3d,0x31 .byte 0xb5,0x2a,0xbd,0xa3,0x26,0xbe,0xeb,0x0e,0x8e,0xaf,0x60,0x48,0x15,0x6f,0xeb,0x4b,0xe4,0xb1,0xee,0x1b,0xc3,0x8f,0x76,0xe4,0x18,0x75,0xc3,0x0c,0x80,0x16,0xa6,0x87,0x4a,0x37,0xa2,0xd2,0x1f,0xdf,0xe4,0x4e,0xf7,0x22,0xe0,0x5c,0x1e,0xb3,0x5e,0xf8,0x3c,0xb3,0x28,0xff,0x8f,0x5c,0x7a,0x0a,0xad,0x86,0x45,0x4e,0x94,0xee,0x7c,0xad .byte 0x6b,0x06,0xa4,0xba,0x01,0x6f,0x87,0xcb,0x6a,0x7e,0x9e,0x86,0x39,0x8a,0xa5,0x31,0xc0,0x59,0xd2,0xbd,0x1c,0xcf,0x5d,0x21,0xb7,0x7a,0xe3,0xc1,0x7f,0xed,0xfd,0xba,0xe6,0x0f,0x9a,0x59,0xda,0x10,0xe6,0xb4,0x21,0x6f,0x0e,0x08,0xef,0x1c,0xb7,0x59,0x3d,0x60,0x40,0x65,0xe7,0x84,0x8d,0xb8,0xaa,0xaa,0x8e,0x0f,0xa1,0xd1,0x8b,0x6d .byte 0xad,0x0b,0xf7,0xd3,0x83,0x64,0xba,0xc9,0xca,0xdb,0x7c,0xcd,0x40,0xfe,0x46,0x21,0x6d,0x0b,0x09,0xfe,0xd6,0x75,0xdc,0x42,0x9b,0x17,0x0e,0xa6,0x31,0x49,0x5e,0xe4,0x01,0xc2,0xd1,0x03,0x71,0xff,0x7b,0xcc,0xe6,0xc4,0xf4,0xc3,0x47,0xe6,0x85,0x76,0xfb,0x4a,0xa0,0x59,0x8b,0x8c,0x3a,0x8e,0x3c,0x2a,0xd2,0x11,0x85,0x68,0x5d,0x3b .byte 0x6d,0xd6,0x9c,0x14,0x26,0xc8,0x91,0x30,0xca,0x7a,0x2f,0xa8,0x58,0x60,0xfa,0x89,0xde,0xc9,0xdb,0x9e,0x33,0x98,0x5b,0x9b,0x76,0xe4,0x8b,0x41,0xd3,0x86,0xe3,0xbe,0xec,0x99,0x46,0x65,0x98,0xec,0xa8,0x85,0x56,0xf5,0x19,0x2d,0xcd,0x09,0x81,0x21,0x64,0x6f,0x14,0x2a,0x74,0xe5,0xac,0xaa,0x48,0x5d,0x7f,0x49,0xd9,0xe3,0xfd,0xff .byte 0x2e,0x91,0x2c,0xa9,0x05,0xe5,0x5d,0x8f,0x16,0xc4,0x3c,0x3b,0x70,0x37,0x7c,0xa1,0xe7,0x1d,0xa4,0x9c,0x77,0xff,0xac,0x09,0x69,0x9c,0xc4,0xf3,0x27,0x6a,0xe5,0x02,0x4f,0x28,0x26,0x52,0x7f,0xb1,0xbe,0xe2,0x37,0x25,0x74,0x1f,0xec,0x4e,0xd4,0xc5,0x37,0xed,0xb2,0xca,0xa0,0xfd,0x20,0x5e,0x63,0x72,0x13,0x9a,0xe0,0xca,0x3c,0xc2 .byte 0x81,0x62,0x60,0xaa,0xfc,0xaa,0x5e,0xe8,0x97,0xd0,0x82,0xaa,0x26,0x15,0xb7,0xae,0x94,0x50,0xe7,0x91,0x51,0x23,0x91,0x76,0xcf,0x49,0x48,0xda,0xd4,0xc6,0x2c,0xcc,0xd4,0xb6,0x0a,0x28,0xc0,0xa0,0x08,0x37,0xf4,0x61,0x81,0x38,0xc0,0xe0,0x2d,0x05,0xf4,0x26,0x2e,0xd8,0xc9,0x01,0xbe,0x1e,0x15,0x5c,0x73,0x32,0x2e,0xa9,0xb0,0x87 .byte 0x1a,0x52,0x7a,0xba,0xd2,0x13,0x93,0xc8,0x16,0x9d,0x8f,0x0b,0xaa,0x16,0x3d,0xc5,0xf7,0xb6,0x0b,0x45,0x5d,0xf8,0x18,0x52,0x3e,0x5f,0x07,0x46,0x15,0x63,0xfb,0x96,0x5c,0x2f,0x62,0x95,0x18,0xc8,0xd2,0xe0,0x73,0x7f,0x5d,0xc7,0x54,0xf4,0x1a,0xb3,0x62,0x49,0x66,0x85,0xb9,0x56,0xad,0x95,0x27,0x29,0xcc,0x65,0xaf,0xfd,0xfd,0x80 .byte 0x91,0x98,0xc1,0x3f,0xc0,0x2c,0x9a,0x16,0x75,0xe1,0xf4,0xc5,0x06,0xc5,0xc9,0x5d,0xf1,0xaf,0xf6,0xb0,0x7f,0x4a,0x59,0xca,0x05,0xb7,0x30,0x91,0x0e,0x10,0x0f,0xb6,0x68,0xe6,0xbf,0xc5,0x91,0xc9,0x27,0x75,0x55,0x82,0xf7,0x5f,0xcf,0x21,0xfc,0xc1,0x35,0x74,0xe2,0x09,0x29,0xff,0xfa,0x3e,0x6f,0xaf,0x04,0xfb,0xca,0xc4,0x73,0x7a .byte 0x2a,0x25,0xdd,0xc5,0xcf,0x58,0xae,0x1b,0xc9,0x15,0xe7,0xc7,0xcd,0x18,0x52,0x0d,0xd5,0xf7,0xd7,0xd3,0x34,0x80,0x23,0xdf,0x83,0xb0,0x2d,0xd7,0xec,0x8f,0x06,0x9c,0x9f,0xf6,0xe7,0x98,0x86,0x6e,0xf1,0x05,0xaa,0x26,0xf1,0x7d,0x17,0x28,0x11,0x80,0x6f,0x12,0x57,0x7a,0x73,0x8b,0x33,0x98,0x27,0x6d,0xfa,0xf9,0xf2,0xb1,0xe6,0xb7 .byte 0x5b,0x45,0x73,0xee,0x12,0x80,0x19,0x61,0xd9,0xfa,0xf3,0xe0,0x47,0x13,0x50,0x92,0xce,0x26,0xf7,0xf4,0xc3,0x9b,0x01,0x59,0x82,0x3d,0xc1,0xa0,0x1e,0x14,0xc1,0xd6,0xad,0x24,0xfd,0xad,0x78,0x49,0x82,0x52,0x48,0xc0,0x41,0xbe,0x30,0xdc,0x87,0x54,0x2d,0xe3,0x47,0xb3,0x1f,0x14,0x30,0x78,0xfd,0xda,0xfd,0x20,0x6d,0xf3,0xa5,0xff .byte 0x6c,0x35,0x87,0x85,0x92,0x99,0x4a,0x46,0x1a,0x7d,0x5c,0x5d,0x97,0x6c,0x3b,0xc9,0xa7,0x1b,0x22,0x1f,0x26,0x2a,0xdc,0xa1,0xab,0x0c,0x46,0x68,0x67,0x3e,0xa1,0x0f,0x50,0xce,0x3f,0xac,0xe2,0x05,0xd6,0xcf,0xb9,0x5e,0xc2,0x54,0xfb,0xcd,0x17,0x2a,0xb6,0x2d,0x03,0xb9,0x62,0xb3,0x2d,0x8e,0x77,0xdc,0x3f,0xb2,0x84,0xb2,0xfc,0x34 .byte 0x3d,0x75,0xcb,0xdf,0x30,0xe1,0x56,0x3c,0x53,0x2e,0x7d,0x90,0xdc,0x6c,0x65,0x05,0x2a,0xaa,0x06,0x1c,0xa8,0x44,0xc7,0x57,0x79,0xc1,0xa7,0xef,0x64,0x9f,0x55,0x82,0xff,0x7e,0xc8,0xa1,0x35,0x40,0xcd,0xdd,0x25,0x54,0x95,0x84,0x5d,0xc7,0x52,0xc1,0x51,0x91,0xe1,0xe9,0x2e,0xcc,0xba,0xb4,0x60,0x52,0x3b,0xd6,0x39,0xb0,0x9d,0x78 .byte 0xf4,0x28,0x7b,0x88,0x40,0x20,0x0b,0x37,0x38,0x03,0x91,0xc2,0xa7,0xf0,0x21,0xa7,0x62,0x7d,0x96,0xa2,0xce,0x5d,0xba,0x25,0xc4,0x79,0x07,0x1b,0x1a,0x86,0x55,0x06,0xa7,0x44,0x03,0x74,0xf6,0x28,0xb1,0x50,0x18,0x48,0xa9,0xd9,0x4a,0xa0,0x6e,0x4e,0x31,0x4b,0x37,0xd6,0xa9,0x2e,0x5a,0x11,0x2f,0x8e,0xc7,0x2d,0x72,0xfd,0x88,0x36 .byte 0x51,0xe9,0xe4,0x0f,0x39,0xe8,0x81,0x75,0xd8,0x23,0x43,0xfb,0x69,0xbf,0x1f,0xe3,0xd4,0x43,0x9d,0xdf,0xb9,0x57,0x72,0x7c,0x56,0x1e,0x7c,0x39,0xdb,0xfe,0x5b,0x04,0xcc,0x12,0xec,0x01,0x78,0xcc,0xd3,0xe4,0x40,0xdc,0x62,0xbf,0x85,0xa1,0x7e,0xd4,0x18,0x7f,0x98,0x42,0x95,0x17,0x81,0xb5,0xd9,0x2f,0xef,0xf6,0x4b,0xb0,0xc2,0xf3 .byte 0x60,0x7b,0x2e,0x50,0x3d,0x12,0x62,0xae,0x49,0x9b,0x90,0x40,0xc9,0xe6,0x16,0xa8,0xf4,0xe9,0x56,0x4b,0x44,0x4f,0x1a,0x40,0xb8,0x1a,0xbc,0xa1,0x1d,0xfc,0xe2,0x18,0xdd,0xd5,0x44,0xad,0xda,0xd6,0x75,0x89,0xa2,0xbe,0xc1,0xa7,0x33,0xc3,0xbc,0x64,0xf3,0x8d,0x8e,0x55,0x1c,0x41,0x17,0xa8,0x4c,0x75,0xc6,0x17,0xc6,0xa7,0xb7,0xea .byte 0x28,0x1b,0x57,0x6d,0x94,0xaa,0xac,0x06,0x6c,0x69,0xd9,0xce,0x77,0x96,0xe6,0xf8,0xd0,0x70,0x7f,0x5d,0x56,0x22,0x4a,0xc6,0x5e,0xa6,0x06,0x0b,0xfc,0xcd,0xa4,0x12,0xd7,0x35,0xcb,0x09,0xfb,0x6e,0xa4,0x80,0x13,0x22,0x0a,0xfa,0x69,0x4d,0x3f,0x53,0x5a,0x1e,0xc4,0x9a,0x39,0xe2,0xa2,0x63,0x92,0xd2,0x2a,0x83,0x2c,0x01,0x04,0x6f .byte 0xde,0x28,0x01,0x83,0xa6,0xdb,0xc6,0xa6,0x86,0x45,0x6b,0xb0,0x22,0x7a,0x71,0x8b,0x5c,0x81,0xf4,0x42,0xd5,0x23,0xff,0x8d,0xc5,0x4f,0x75,0xae,0x8d,0xfb,0x99,0x53,0x3e,0x35,0x56,0xfa,0x35,0xee,0x16,0x18,0xc0,0x6a,0x5b,0x20,0x89,0x41,0xc9,0xfe,0x7b,0xe2,0xe8,0x3d,0x1d,0x74,0x31,0xe6,0xe6,0xba,0x86,0xd1,0x19,0x50,0x07,0xb4 .byte 0xd8,0x27,0xdf,0x51,0xc2,0x94,0x69,0xab,0xe1,0x6a,0x69,0x52,0x15,0x71,0x0a,0xc5,0xec,0x84,0x29,0xd3,0x48,0x79,0x53,0x95,0xb2,0xd7,0xf3,0x3a,0x92,0xec,0x51,0x85,0xfd,0xe3,0xf1,0x5c,0xac,0x73,0xf7,0x19,0x72,0xdc,0x46,0x31,0xf6,0xcd,0x8b,0xfe,0xf3,0x59,0x8a,0xe8,0x37,0x78,0x65,0xc5,0x3c,0xcc,0xf2,0x5a,0xf8,0x6e,0xaa,0x38 .byte 0xc4,0x3b,0x48,0x07,0xe1,0xbd,0x4e,0x2c,0xad,0x02,0xf4,0x19,0xd8,0xd0,0x58,0x5a,0xfe,0x0a,0xc7,0x07,0x55,0x26,0x84,0x58,0xf4,0xfc,0x57,0x4b,0x5b,0xb3,0x37,0xe9,0x97,0x7c,0xe9,0xbf,0x1d,0x8d,0x63,0xf7,0x85,0x5c,0x56,0xb0,0xf9,0x5f,0x5b,0x45,0xe5,0x5a,0x74,0x72,0xa8,0x8a,0xf5,0xf2,0x6e,0xda,0x1e,0xea,0x12,0xc4,0x05,0xb1 .byte 0x96,0xf1,0x75,0xee,0xd0,0xab,0xd4,0x50,0x51,0xae,0x01,0x23,0x55,0xa2,0xbc,0x30,0xac,0x0c,0x96,0x76,0xa2,0xc6,0xdf,0x03,0xb0,0x67,0x6d,0x77,0x9c,0xa7,0x0b,0x12,0x2d,0x57,0x6b,0x55,0x54,0x4f,0x9b,0x0f,0x87,0xbb,0xc5,0x17,0xda,0x94,0x10,0x13,0x9c,0x70,0xac,0xf9,0x10,0x9a,0xa4,0x03,0x46,0x17,0xf5,0xc3,0x63,0x3a,0x23,0xd6 .byte 0xf9,0x90,0x8c,0x66,0x1f,0xf7,0x3b,0x35,0x71,0x1f,0x87,0x7a,0x78,0x0e,0xa4,0x7a,0x59,0x70,0x72,0xd5,0x55,0xec,0x62,0x91,0x21,0xa1,0x6e,0x8d,0xd4,0x00,0xf7,0x02,0x0c,0xff,0x4f,0x0b,0xe1,0x1b,0x43,0x87,0x63,0xb1,0xc4,0xa5,0x47,0x54,0x05,0x68,0xd7,0xfc,0x80,0x4c,0x4d,0x4c,0xdb,0x8a,0x0a,0x0b,0x31,0x52,0xae,0x2e,0xf5,0x75 .byte 0x41,0x1a,0x01,0x1b,0xc2,0x1a,0x1c,0x9b,0x39,0x8b,0xa8,0x73,0x87,0x10,0x57,0x64,0xf1,0xd8,0xd7,0x19,0xad,0x9e,0x61,0x35,0x1c,0x00,0x7c,0x63,0x5f,0xc1,0x75,0x69,0x64,0x88,0xc9,0x29,0x41,0xae,0x84,0xa8,0x45,0xa0,0xbb,0xee,0xfb,0x37,0x58,0x5e,0xc7,0x59,0x62,0x0b,0x21,0x61,0x42,0x0d,0x98,0x21,0xf5,0x41,0x47,0x74,0x1f,0x6d .byte 0xcc,0x7b,0x2b,0xc7,0x90,0xf3,0xe8,0x68,0xe2,0x0c,0x17,0x06,0x95,0x04,0xfc,0xb0,0xf3,0xbd,0x5f,0xaf,0xe0,0x3b,0xe2,0x83,0x79,0xd3,0x43,0xa5,0x5d,0x97,0x53,0xc2,0xd2,0x6b,0x67,0x5a,0x36,0x7b,0xb6,0xc9,0xb3,0x5f,0x21,0x4b,0x23,0x94,0xa0,0x04,0x0b,0x5a,0x28,0xb8,0x6b,0x1b,0x27,0xcc,0xfe,0xe7,0xf9,0xed,0x8f,0x93,0x58,0x26 .byte 0xdc,0x66,0x2b,0x8d,0x2a,0x40,0x8f,0xaa,0x17,0x68,0x13,0x84,0xa6,0x7a,0x74,0xa0,0x95,0xe3,0x92,0xe5,0xc6,0x4d,0x05,0xad,0xf7,0x62,0x48,0xb8,0xcc,0xfb,0xd9,0xdf,0x0f,0xdc,0x72,0x2d,0x8f,0xad,0xb1,0x96,0x03,0xae,0x09,0x37,0xd0,0x37,0xe7,0x87,0xbd,0x57,0x74,0x3e,0x1e,0xf0,0x9d,0x31,0xa7,0x10,0x3f,0x3c,0x0b,0xf5,0xce,0xaa .byte 0x4b,0xec,0xa9,0xd9,0x19,0x8f,0x8a,0x47,0xc9,0x40,0xeb,0x70,0xbc,0x4d,0x35,0x73,0x52,0xc8,0xe5,0x5f,0x80,0x1c,0x99,0x0e,0x5e,0xc0,0xfc,0xc6,0x93,0x2c,0x11,0xa5,0x46,0xfb,0xaf,0x08,0x73,0xb5,0x9d,0xaa,0x1c,0x25,0x12,0x95,0x69,0xd5,0x47,0xbd,0xd5,0xe2,0x87,0xc2,0xe5,0xbc,0x20,0x16,0x05,0x22,0x40,0x7e,0x7c,0x6d,0xf6,0xf8 .byte 0x4e,0xb4,0xe3,0xfd,0x76,0x63,0x45,0x4f,0x07,0x4d,0xe0,0x26,0x2a,0xce,0x53,0xa8,0x07,0xfa,0x15,0x84,0xa7,0xb1,0x5f,0x32,0x25,0xa8,0x1a,0xd7,0x31,0xf1,0xf6,0x09,0xf9,0xf2,0xe9,0x84,0x5f,0xb9,0xb6,0x69,0x84,0x8f,0x97,0xac,0x59,0xf1,0xc8,0x7f,0x0f,0x0e,0xf2,0xfd,0x35,0x68,0xbb,0xe2,0x1f,0x32,0xa2,0x4a,0x08,0x56,0x53,0x88 .byte 0xe2,0x2e,0x00,0x16,0xdc,0x76,0x1d,0xb6,0xc4,0xbf,0x9f,0xde,0xb3,0xa5,0x12,0x77,0x06,0xbd,0x27,0x10,0x20,0xdd,0x26,0xdc,0x15,0x0f,0xa9,0xa4,0xa3,0xc2,0x1b,0x9a,0xf4,0x75,0xb5,0x80,0xe4,0xaa,0x13,0xe3,0x41,0xb9,0xcf,0x92,0xd9,0x5f,0x60,0x89,0x89,0xbc,0x06,0x72,0xb4,0x98,0x0f,0x71,0x2d,0x82,0xf5,0x9c,0x01,0xe6,0x5e,0x81 .byte 0xe1,0x0e,0x46,0x45,0xf1,0xfc,0xd1,0x9b,0x37,0x0d,0x44,0x43,0x88,0xe2,0xbc,0x8c,0x3e,0x82,0xca,0x48,0x42,0xe7,0x3b,0x55,0x49,0x0f,0xea,0x0b,0x74,0x30,0x0e,0x0f,0x82,0x05,0x6b,0x9b,0xda,0x0a,0xf1,0xc7,0x3a,0xb9,0x33,0x26,0x91,0x55,0x82,0x2f,0x66,0x2d,0x6b,0xdf,0x47,0x4c,0xaa,0xe2,0x90,0x1e,0x73,0x57,0x62,0xb3,0x4d,0x00 .byte 0x0a,0x94,0xa8,0x71,0x37,0x1d,0x9d,0x4d,0x60,0x55,0x9a,0xcf,0x51,0x0b,0xe1,0x9a,0x95,0x64,0x26,0x54,0x84,0xa0,0xe6,0x9c,0x3d,0x75,0xcf,0x88,0x36,0x71,0x16,0x16,0xeb,0x19,0xc0,0x41,0xc0,0xe0,0xf0,0x1f,0x65,0xfc,0x8d,0x64,0x7d,0xb3,0xdb,0x58,0xec,0xed,0x18,0x4f,0x49,0x54,0x55,0x11,0xb1,0xd5,0xbc,0x7d,0x96,0x39,0x91,0xec .byte 0xc0,0xff,0x09,0x05,0x13,0xa8,0x7f,0xae,0xc1,0x48,0xed,0x62,0x38,0x9b,0xdd,0x4e,0x52,0x5f,0x26,0xf7,0x1d,0xfb,0xdf,0x57,0xba,0x4c,0x87,0xbd,0x3d,0x3c,0x4a,0xfa,0x26,0xbd,0x7b,0x67,0x3a,0x1d,0xdb,0xd8,0xea,0x2f,0xc2,0xb1,0x0b,0xef,0x58,0xb1,0x20,0xde,0x22,0xbb,0x3a,0x5e,0xe3,0x1e,0xb0,0x12,0xfc,0x14,0x91,0xf2,0xeb,0x20 .byte 0x2e,0x3a,0xd3,0x70,0xf1,0xf5,0x46,0x14,0x6e,0x7a,0xe2,0xa2,0xa2,0x4e,0x15,0xca,0x35,0x34,0xdb,0x73,0x64,0x22,0x45,0xb9,0x56,0x87,0x15,0x07,0xd5,0x9b,0x35,0x7f,0x14,0x93,0xfd,0x1c,0xb1,0xf1,0xb3,0x6c,0x2b,0x68,0x20,0xb9,0x84,0x6e,0x4d,0xfe,0x6b,0xd4,0x40,0x33,0xf5,0xe3,0xe9,0xc1,0x94,0x79,0xe0,0x6a,0x1f,0x75,0x49,0xd3 .byte 0x31,0xa8,0x2f,0x3d,0x09,0x13,0x8b,0x90,0x01,0x34,0x3f,0x12,0x9e,0x91,0x90,0xc9,0x93,0x8d,0xf2,0xf7,0xa7,0xda,0xc0,0x9d,0x59,0xf3,0xd7,0xf3,0x95,0xa4,0x57,0x6f,0x24,0x66,0x2d,0x0f,0x94,0xb4,0x59,0xa5,0x47,0x93,0x35,0x36,0x22,0x1b,0x4d,0x8e,0xaf,0xf1,0xc2,0x1c,0x55,0x33,0x2c,0x77,0xc7,0x7f,0xd5,0x29,0xc6,0xf6,0x9d,0x38 .byte 0xe7,0x33,0x73,0x5a,0xb2,0x1f,0x7c,0xf8,0x2d,0x5a,0xbd,0xa9,0x89,0xa1,0xc0,0x00,0x8d,0x6e,0xef,0xbb,0x0a,0x91,0x3a,0x0a,0xaa,0x4d,0x5b,0x1c,0xc9,0xce,0x0a,0x66,0x3a,0x72,0x8b,0xa4,0x67,0x61,0x53,0x74,0xa0,0xd6,0x71,0xf0,0x92,0x15,0x7b,0x7f,0xfd,0x72,0xf1,0x5c,0xd2,0xa2,0xdb,0x75,0xf1,0xa3,0x34,0x0d,0x7d,0x4a,0x39,0xfa .byte 0x20,0x0d,0xdd,0xb6,0x6e,0x78,0xe0,0x57,0xdd,0xf2,0xd7,0xe1,0xba,0x49,0x92,0x71,0x5b,0x76,0xc2,0x26,0x79,0xef,0x52,0x54,0x18,0x66,0x44,0xcf,0x40,0x28,0x50,0xc7,0x02,0x7a,0x76,0x8f,0x77,0xe6,0x26,0x2c,0x2e,0x68,0xf9,0x2d,0x65,0xb3,0x95,0x98,0x5a,0xd5,0xaa,0x63,0xf3,0x7b,0x97,0xf8,0xc1,0x30,0x69,0x81,0xe3,0xd4,0xfd,0xb3 .byte 0x5e,0x83,0x8b,0xe2,0xa4,0xac,0x15,0xa7,0xf1,0xc4,0x65,0x56,0x1c,0x31,0x7d,0xd6,0x6f,0xef,0x4d,0x2d,0xcd,0x61,0x4c,0x06,0x48,0x0e,0x64,0x9a,0xab,0x04,0x7c,0xf6,0x38,0x86,0x16,0xd9,0x3d,0x1f,0xe3,0x74,0xf8,0x46,0xd3,0x84,0x5a,0x56,0x73,0x81,0x19,0xd2,0x8b,0xef,0x2a,0xb1,0xe2,0x24,0x41,0x9f,0x6b,0x65,0x9e,0x34,0xf9,0x85 .byte 0x4c,0x38,0xe4,0x6d,0x63,0xcb,0x7c,0x13,0x88,0xb3,0x62,0xfd,0xa7,0x91,0x16,0x4f,0x77,0xcc,0xb5,0x68,0x58,0x1f,0xd6,0xfc,0x63,0x0f,0xa0,0x55,0x7e,0xfb,0x0f,0x84,0x76,0x24,0xa7,0xe0,0x53,0x4c,0x3a,0x36,0x0c,0x30,0x46,0x58,0x14,0x31,0x88,0x96,0xf7,0xaf,0x39,0x6d,0x7a,0x6e,0xcf,0x62,0xa3,0x2e,0x2e,0x94,0x77,0x2e,0x36,0x64 .byte 0x58,0x13,0x66,0x39,0x59,0x70,0x4c,0x81,0x4d,0x56,0x46,0x00,0x96,0x1b,0x60,0xfd,0xbf,0xfe,0x7f,0xe5,0x59,0xc1,0x09,0xd1,0x38,0x74,0xbe,0x98,0x97,0x61,0x6f,0xcf,0xbd,0x49,0x60,0x7e,0xe3,0x6c,0x65,0xbc,0x6b,0xa1,0x79,0x65,0x59,0xc3,0xa1,0xdd,0x77,0x3d,0x32,0xed,0xbe,0x51,0x12,0x19,0x61,0x84,0x52,0x8d,0xe3,0xf7,0x3b,0x6e .byte 0x6a,0x16,0x24,0x0f,0xc8,0xa7,0x17,0xb9,0xda,0xe9,0x81,0xa7,0x56,0x46,0xa9,0xd6,0x5a,0x82,0x73,0xfe,0xd3,0xd4,0x8b,0x1a,0x61,0x2f,0x63,0xb8,0x8d,0x47,0x8b,0x4e,0xa9,0xce,0x10,0x86,0x07,0xe0,0xad,0xe8,0xb3,0x39,0x27,0xbe,0x39,0xac,0xdd,0xa5,0x09,0x4a,0x22,0x56,0x1d,0xab,0x4b,0xd4,0x03,0xf9,0xe5,0x1b,0xfc,0x3a,0x62,0xe7 .byte 0x74,0x79,0x8c,0x37,0x48,0x35,0x54,0x5b,0x66,0xdb,0x0f,0x00,0x5b,0x6c,0x22,0xd6,0x3c,0xb6,0xdf,0xb7,0xcd,0x12,0xc0,0xf2,0x22,0x1f,0xa1,0x2f,0x08,0x56,0x8c,0xed,0x6a,0xe1,0x18,0xea,0x8c,0x47,0x39,0x53,0x90,0xdc,0x93,0x74,0x33,0x71,0xe1,0xaa,0x77,0xf4,0x07,0xfd,0x8b,0xa3,0x1b,0x44,0x89,0xab,0x77,0x85,0x65,0xc3,0xfe,0x12 .byte 0xa8,0xf5,0xff,0x09,0x9f,0xce,0x10,0xd0,0xd0,0xc8,0x27,0x4c,0x59,0x99,0xc2,0x87,0xe5,0x61,0xe1,0x68,0xd5,0x6e,0x53,0xc8,0xc5,0xc7,0x7a,0x49,0x64,0x19,0xa2,0x6c,0x40,0xdb,0xfc,0x5f,0xe0,0x4f,0x12,0x53,0x8e,0x65,0x28,0xb9,0x61,0x01,0xac,0xb4,0xbf,0xee,0x6e,0x13,0x9b,0x06,0x20,0x8c,0x17,0x7c,0x3a,0x22,0x01,0x15,0xb0,0xd1 .byte 0xa7,0xa5,0x00,0xa0,0xe8,0x1c,0xf0,0x82,0xaa,0x63,0x99,0x8d,0x10,0x7b,0x24,0xef,0x2c,0xb9,0x9a,0x1d,0xd5,0x14,0x59,0x2c,0x2c,0x70,0xb6,0x5d,0x91,0xfc,0xfb,0xd1,0xed,0xe4,0x61,0xfe,0x26,0xcf,0x87,0x27,0xe5,0xa3,0xfe,0x30,0x3d,0xa5,0xec,0x5c,0xfa,0x57,0x76,0x98,0xbd,0x7e,0x48,0x8e,0x36,0x8a,0xda,0x73,0x0f,0xf6,0x79,0xf8 .byte 0x35,0xca,0x8e,0xbd,0xc7,0x58,0x32,0xe4,0xea,0xcc,0xf0,0x18,0xb7,0xda,0x8c,0x0e,0x05,0x92,0x49,0x7c,0x14,0x9e,0x49,0x73,0x0b,0xcc,0xf2,0x50,0x90,0xd4,0x6d,0x43,0xa1,0x17,0xd1,0x64,0x99,0x79,0x43,0x90,0xe7,0x06,0x73,0xa6,0x37,0x2e,0xde,0x6c,0x8f,0xd8,0x31,0x6c,0x72,0x2b,0xe5,0x9d,0x42,0xaf,0x18,0x12,0x9e,0x35,0xc0,0xf8 .byte 0x70,0x3f,0xd7,0xc7,0x61,0x39,0x7c,0x85,0x5d,0x77,0xad,0x7c,0xde,0x02,0xf1,0xa1,0x7b,0x6d,0x36,0xf8,0x31,0xe7,0x97,0x9d,0x2e,0x23,0xb6,0x9b,0xb3,0x24,0xcc,0x0f,0x3d,0x49,0x8a,0x18,0x1c,0xbb,0xbb,0xed,0xb5,0x96,0x22,0xd0,0x63,0x17,0x65,0x3a,0x83,0x98,0xa0,0x10,0x4a,0x37,0x74,0x07,0x61,0x83,0x6c,0xa0,0x5d,0xec,0x9f,0x52 .byte 0xdc,0x12,0xcc,0xec,0x9e,0xb2,0x27,0x98,0xd3,0x41,0xf7,0x52,0xca,0x4e,0x29,0xda,0x35,0xba,0x96,0xc7,0x37,0x83,0xdf,0x26,0x4c,0x6b,0x24,0xb7,0x60,0xe6,0x4d,0x09,0x30,0xb8,0x6a,0xf6,0x34,0x8b,0x4c,0xa0,0x15,0xf8,0x47,0xf3,0x40,0x80,0x2a,0x41,0xeb,0xed,0xfc,0x53,0xb7,0xc7,0x2f,0x4d,0xfd,0xab,0xcd,0xf4,0x49,0x0e,0xe1,0x1c .byte 0xb9,0xd2,0x11,0xf0,0xa9,0xf6,0x3a,0x8a,0x7a,0x90,0x4d,0xf9,0xfd,0x3a,0x75,0xc2,0x60,0x8b,0x25,0xae,0x1d,0x3a,0xf5,0x81,0xb4,0x2b,0xf7,0x4d,0x27,0xbe,0x85,0x2d,0x65,0x60,0xf6,0xdb,0x2e,0x29,0xa7,0xee,0x26,0x07,0x07,0x17,0xfa,0x4a,0x93,0x72,0xad,0x97,0x5c,0x7d,0x4f,0xd2,0x29,0x37,0x0c,0x5e,0xbb,0xbd,0xbd,0x11,0xfd,0x77 .byte 0xa1,0x6b,0xf9,0x4b,0x75,0x9b,0x02,0xb4,0x65,0xcf,0xe2,0x92,0xb2,0xef,0xf8,0x7e,0x71,0xf5,0x1b,0x6f,0xb5,0x54,0x9f,0x63,0xf4,0x6b,0xb2,0x2e,0xb6,0x4a,0xb8,0x9c,0xa0,0xb0,0xa8,0x4b,0x6a,0x1a,0x2a,0x7e,0x46,0x85,0x24,0x64,0x68,0xea,0x36,0x52,0x67,0xe5,0x42,0x82,0xa9,0x6f,0x9c,0x95,0x60,0xbf,0xc3,0x33,0x9d,0x40,0x23,0xdb .byte 0x4e,0x8a,0xf2,0x3d,0xb8,0x8e,0xfb,0xd2,0xf1,0x99,0x6f,0x96,0x38,0xe2,0xd6,0x68,0x40,0x11,0x39,0xf7,0xa1,0x07,0xe4,0xc9,0x14,0x61,0x5b,0x8c,0xc5,0x95,0xa2,0xfb,0x86,0x51,0xd1,0xd3,0x2e,0x1f,0xf7,0x42,0xd2,0xc8,0xbd,0x8c,0xc3,0x24,0x0f,0x1c,0x61,0xfa,0xee,0x64,0xca,0xc0,0x12,0xab,0xdc,0xd4,0x08,0x31,0x7f,0xea,0x3b,0x24 .byte 0x7e,0x4b,0x14,0x58,0x8a,0x48,0x9b,0xf2,0x04,0x7a,0x5b,0xec,0x49,0xaa,0xf9,0x33,0x72,0x8e,0x3e,0x06,0x80,0xe1,0xb5,0x1c,0x18,0x5c,0xe9,0x01,0xf4,0x78,0xeb,0x61,0x14,0x5f,0x52,0x1a,0x22,0x7e,0xbc,0x8f,0x38,0xa9,0x32,0xdf,0x9b,0x9d,0x96,0x13,0xc8,0xd1,0x5f,0xcf,0x51,0xbe,0xee,0xa4,0x04,0x31,0xc9,0xd1,0x0e,0xd9,0x54,0x3e .byte 0x26,0x6d,0x25,0x98,0x65,0x83,0x53,0x4e,0xc6,0x01,0xb1,0x02,0x94,0x36,0x62,0xa2,0x6f,0x8b,0x1f,0x52,0x35,0x9c,0xa1,0xc7,0x50,0x54,0x27,0x96,0x51,0x4d,0xa8,0x85,0xc2,0xbd,0xe8,0x20,0xd7,0x55,0x14,0x89,0x64,0xe4,0xe1,0x70,0xcd,0xf0,0x40,0xfa,0x8e,0x35,0x20,0x53,0xec,0x73,0x3e,0x75,0x36,0xa3,0x69,0xf0,0xe0,0x0b,0x26,0x4d .byte 0x9b,0xf8,0x03,0x72,0xb4,0x11,0x5f,0x5f,0x67,0xc1,0x7f,0xe1,0x71,0x94,0x14,0x96,0x7a,0xc4,0x81,0xab,0x26,0x15,0x7d,0xf9,0xa3,0xd7,0xab,0xaa,0x53,0xfd,0x42,0xb4,0xc4,0x79,0x1e,0xd4,0xed,0x14,0x83,0x00,0x5a,0x8d,0x86,0x6d,0xa0,0xef,0x29,0x03,0x2d,0xb1,0xf2,0xc1,0x97,0xa6,0xe8,0x23,0x6c,0x6a,0x56,0xe0,0x7a,0x4e,0xef,0x6d .byte 0x8c,0x46,0x06,0x06,0x17,0xb0,0xcf,0x86,0xca,0x0f,0x8f,0x42,0x84,0xe5,0xb1,0xeb,0x3f,0x75,0x50,0x51,0x57,0xca,0x5f,0x49,0xdb,0x8b,0xc8,0x66,0xd5,0x86,0x86,0x9d,0x2e,0x9a,0x23,0x31,0xc4,0x5a,0xc0,0x7b,0x14,0x22,0xae,0xe4,0x52,0x8e,0x55,0xd9,0x01,0xf9,0x9c,0x7a,0x96,0x6d,0x74,0xf1,0x31,0x2a,0xfd,0xda,0x4e,0xa3,0x82,0x2f .byte 0x54,0xc5,0x25,0x1d,0x85,0x6c,0xdc,0xa7,0x78,0x01,0x73,0x3e,0xcd,0x2d,0x53,0xc0,0xbf,0x23,0x05,0x19,0x93,0xbf,0x73,0x7f,0xdf,0x0a,0x38,0x9f,0x0d,0xae,0xb7,0x23,0xe6,0xb0,0x17,0xc0,0x2d,0xd4,0xd4,0x47,0x9c,0xc7,0xb6,0x42,0x8a,0xdc,0xa9,0x36,0x4f,0x07,0x02,0x1f,0x87,0x89,0xe8,0x48,0x33,0x7f,0x24,0x84,0x28,0xde,0x84,0x4a .byte 0xb9,0xf9,0xe1,0xe5,0x4b,0xd7,0xf9,0x1a,0x44,0x4d,0xf9,0x4a,0xfc,0x97,0x03,0x03,0x71,0x2b,0xfe,0x04,0xfa,0x6c,0x52,0x07,0x54,0xb4,0xd2,0x60,0x34,0xb8,0x36,0x6f,0xc7,0x3c,0x64,0x37,0x8d,0x30,0x20,0x3e,0x66,0xac,0x1e,0x75,0x2d,0x76,0x3a,0x95,0xbb,0x23,0x7a,0x43,0x63,0xba,0xc9,0x7d,0x85,0x01,0xd9,0x65,0x20,0xc1,0x95,0x68 .byte 0xcf,0x8a,0x4f,0x57,0x87,0x70,0x8e,0xe5,0x20,0xdb,0xd3,0x37,0x4c,0x03,0xc0,0x44,0x17,0x4c,0x2a,0x30,0x91,0xd9,0xb8,0x04,0xaa,0xcb,0xe9,0x8f,0x8f,0xe0,0x9a,0x79,0x1e,0x40,0x65,0x47,0x3d,0x4f,0x0e,0x7e,0xfc,0x8f,0x0c,0x20,0xe3,0xc6,0x5c,0x90,0xa8,0x09,0x41,0xbd,0x4b,0x55,0x4e,0xcc,0xeb,0xba,0x48,0x69,0xa2,0x5b,0xa0,0x41 .byte 0x15,0xa6,0x1f,0x6b,0x6f,0xa0,0x26,0x2b,0x07,0xbd,0xb2,0x49,0xda,0xa0,0x97,0x22,0x37,0xcc,0xc3,0x05,0x4c,0x73,0x8f,0xb2,0x81,0xcf,0xe3,0xa4,0x23,0x96,0xe8,0x3d,0x29,0x00,0xbd,0xfe,0xec,0x97,0x65,0x94,0xf8,0x89,0x51,0x35,0x1b,0x72,0xff,0x6a,0x85,0x8c,0x53,0x35,0x7a,0x4f,0x11,0x5e,0x95,0xcf,0x9e,0x0f,0xef,0xbc,0x64,0xee .byte 0x3a,0x6e,0xa1,0x4f,0x29,0x41,0x99,0x33,0xdc,0x7b,0x33,0xc4,0x82,0x8a,0x23,0x62,0x59,0x2c,0x2e,0x11,0x6e,0xec,0x6a,0xfb,0xe1,0x28,0x20,0xf4,0x38,0x48,0xf8,0x69,0xae,0x53,0x2b,0xd8,0x60,0x3b,0x37,0xf4,0xb1,0xa4,0xeb,0x80,0xd1,0x1f,0x11,0xd4,0x12,0x62,0x9f,0x1a,0x93,0xf7,0xfe,0x08,0x22,0x72,0x1b,0x51,0xa4,0x12,0x6e,0xe3 .byte 0x59,0x23,0xeb,0xf4,0x6e,0x03,0xe6,0x1e,0x7e,0x94,0xfe,0x21,0xa2,0xb6,0x41,0x75,0xb2,0x8f,0x24,0x41,0xa3,0x08,0x33,0xec,0xf7,0x45,0x3c,0x55,0xd2,0xb9,0x5f,0x7e,0x61,0x37,0x17,0x45,0x9d,0xf9,0x87,0x26,0x07,0x65,0xee,0x7c,0x82,0x4e,0x96,0x53,0xea,0x50,0xa4,0x99,0xb9,0xe4,0xe1,0x79,0x02,0xd2,0x1f,0xa3,0x1f,0x1c,0x13,0x48 .byte 0xf3,0x36,0x56,0x84,0x56,0x58,0xbd,0x52,0x06,0x21,0x95,0x0a,0xe1,0x45,0x43,0xe6,0x9f,0xfa,0xbd,0x1a,0x60,0x3f,0x6b,0x93,0x8c,0x22,0x17,0x4f,0xc9,0x13,0xdf,0x94,0x3e,0xd8,0x1f,0x22,0xf8,0xc4,0xaf,0xe3,0xcb,0x03,0x67,0x23,0x90,0xee,0x36,0x8e,0x3f,0xc6,0x0d,0xaf,0xd5,0x0f,0x41,0xd8,0x22,0xe3,0xf7,0x6d,0x19,0x99,0x25,0x51 .byte 0x12,0x8d,0xa1,0x19,0xc6,0x26,0xa3,0x1a,0xce,0x9b,0x0f,0xae,0xbf,0xd5,0x80,0x9b,0x4a,0x6c,0xc9,0xa7,0xd7,0x65,0x67,0xb7,0x71,0x77,0xae,0xa1,0x31,0x8b,0x3a,0x0d,0x33,0x43,0xb1,0x08,0x6c,0x97,0xd4,0x41,0xe1,0x83,0x50,0xc8,0xc5,0x44,0x5a,0x6d,0xab,0xa5,0x89,0x5f,0x87,0xb4,0xfc,0x5a,0x29,0xa0,0xb3,0x6c,0x62,0x46,0x58,0x55 .byte 0xd0,0x60,0x3f,0x6b,0x1b,0x1b,0x47,0x0d,0x02,0x2c,0xd7,0x92,0x37,0xc6,0x80,0xf1,0x0c,0xf8,0x91,0xb5,0x20,0x49,0xdd,0x56,0x59,0xb2,0xd6,0x00,0x1d,0x1c,0x87,0xbd,0x99,0x17,0xab,0x5f,0x47,0xaf,0x0e,0x87,0xf1,0xca,0x59,0xec,0xa1,0x3d,0x1e,0x60,0x3e,0xcb,0x23,0xe6,0x26,0x9e,0xc5,0xf6,0xaf,0xab,0x4b,0x9f,0xac,0xae,0x09,0xd9 .byte 0x4b,0xfa,0x24,0x55,0xfc,0xae,0x02,0x29,0xba,0xbb,0xd6,0x13,0x0d,0x4e,0xef,0x8b,0x44,0xe2,0x84,0xd4,0xef,0x5b,0x9a,0xca,0xe7,0x2a,0xdd,0x49,0xdb,0xc9,0xf6,0x77,0xdf,0xff,0x3b,0x79,0x7c,0x0b,0x11,0x30,0x36,0x84,0xf0,0xe4,0x97,0x5e,0x7c,0x48,0x9a,0xd6,0x40,0x63,0xec,0x8e,0x92,0x1b,0x44,0x83,0xaa,0x3c,0x47,0x49,0x9b,0x21 .byte 0x35,0x73,0x41,0x78,0xdc,0x06,0xa5,0x18,0xe0,0x0b,0xb9,0xab,0xf3,0x0d,0xdc,0x84,0x1c,0x52,0xef,0xc1,0x4d,0xad,0xdb,0x71,0xf0,0x33,0x4e,0xaf,0xc3,0x0c,0x8e,0x28,0x92,0xf8,0xbd,0xae,0x8f,0x2d,0x36,0x8a,0xda,0xff,0xc5,0x7f,0x27,0xdc,0xb0,0xd3,0x03,0xae,0xb8,0xdd,0x20,0xf8,0x5c,0x31,0xac,0xbc,0x36,0x71,0xde,0xc9,0x71,0x7d .byte 0x21,0x68,0xcd,0xb0,0xfc,0x9d,0x96,0x6b,0xfa,0xb0,0x3a,0xfb,0x05,0xc7,0x89,0xd1,0x50,0x7a,0x50,0x52,0x53,0x29,0xb6,0x25,0x8f,0x96,0x75,0xb3,0x66,0xac,0x1c,0xf9,0x04,0xe0,0xe7,0x9f,0x0d,0x1d,0x65,0x84,0xb2,0x47,0x08,0xfe,0x7b,0xaa,0x15,0xf0,0x35,0x4a,0x68,0x74,0x9d,0xfe,0x05,0x4d,0xe4,0x0a,0x4e,0xc1,0xba,0x84,0x37,0x95 .byte 0x6e,0xd3,0x22,0xd6,0xc4,0x6c,0x57,0xb7,0x0d,0xf9,0x55,0x76,0xec,0x4e,0x4d,0x32,0xd2,0x7f,0xd4,0xec,0x8c,0xff,0x32,0xe9,0xd5,0x83,0x13,0x43,0x85,0x67,0x0c,0x36,0x2a,0x3f,0x6d,0xf4,0xfe,0x4a,0xf8,0xd8,0xd8,0x23,0x77,0x51,0x87,0x0c,0x82,0x70,0x88,0xd8,0x8c,0xe2,0x9a,0x4a,0x9b,0xf0,0xbd,0x56,0xc6,0xa7,0x64,0x65,0xf6,0x61 .byte 0x5e,0xc1,0x8a,0x03,0x36,0xda,0x9f,0x22,0xa1,0xac,0x48,0x91,0x98,0x28,0x33,0x76,0x87,0x0d,0x5b,0x58,0xa3,0x09,0xb3,0xdd,0xcf,0xff,0x12,0x19,0x35,0x66,0x07,0xa7,0x62,0xdb,0x0d,0xd5,0xbd,0x17,0x3d,0x8a,0xb0,0x3e,0x77,0x72,0xf6,0xe6,0xc5,0xb2,0xd6,0x09,0xa8,0xf1,0x7c,0xbb,0x89,0x56,0x3d,0x27,0x37,0x03,0x45,0x68,0x23,0x71 .byte 0x6e,0x13,0xc6,0x12,0xef,0x52,0x69,0x83,0xe4,0x11,0xdb,0x18,0x4a,0x54,0xce,0xf4,0x40,0x33,0x89,0x9a,0x5b,0x6e,0xa4,0xf7,0xa8,0x9a,0x74,0x39,0xff,0x32,0xe4,0xee,0xe0,0xdb,0xf8,0x0c,0x05,0x53,0x55,0x46,0x4d,0xa3,0x9e,0x9a,0x25,0x8f,0x24,0xbc,0xc2,0x91,0xa8,0x80,0x14,0xb0,0xcf,0xb2,0x69,0x75,0x7d,0x1a,0x8e,0x42,0x2e,0x6c .byte 0x93,0x6d,0xe4,0x49,0x6d,0x8c,0x72,0x16,0xf4,0x36,0x94,0xb6,0x30,0x1d,0x83,0x5f,0x53,0x56,0xb3,0xcf,0x84,0x94,0x1a,0xd8,0x07,0xc9,0x0f,0x0d,0xf5,0xf8,0xd2,0x50,0x8e,0xa9,0x47,0xa4,0x66,0xbf,0xa5,0x2a,0x4c,0x23,0x02,0xac,0xdb,0x1d,0xa5,0xa3,0x04,0xa6,0xaa,0x78,0xf0,0x66,0xc8,0x02,0xef,0x6b,0x8d,0x38,0x8e,0xb9,0x14,0x2a .byte 0x8f,0x43,0x83,0xb6,0x90,0x64,0x15,0x35,0x36,0x17,0x1e,0xb7,0x98,0x39,0x43,0x73,0xb0,0xfe,0x1e,0x75,0xf5,0xda,0x51,0x7a,0xb5,0x5a,0x6e,0xa4,0x68,0xbc,0x84,0x19,0x7a,0x6f,0xe3,0xf4,0x05,0x1f,0x3c,0x4a,0x18,0x7d,0x97,0x9a,0xcb,0x9b,0xe1,0x53,0x90,0xaa,0x37,0xcc,0xf5,0x1d,0x39,0xa6,0x7e,0x3a,0x47,0x75,0x70,0x97,0xa1,0xb1 .byte 0x8c,0x8d,0xb2,0xb0,0xa3,0xdd,0x4f,0x44,0xaf,0x47,0xc2,0x44,0x06,0x61,0x2a,0x40,0x87,0x9e,0x98,0x0f,0x2f,0xe7,0xb4,0xf9,0xd3,0x02,0x71,0x15,0x50,0x43,0x64,0x2c,0xbb,0x55,0xc8,0xc7,0x1d,0xc5,0xb5,0xd7,0xd9,0xea,0x12,0x5e,0xf5,0x97,0xf0,0xa0,0x30,0x88,0x73,0x44,0x6e,0xe6,0x3a,0xbd,0x1c,0x0e,0xee,0xe4,0xc4,0x8c,0xb6,0xcd .byte 0x6a,0x95,0xf4,0x93,0xa1,0x30,0xe8,0x10,0x76,0x8d,0xc8,0xba,0x1b,0xd0,0xba,0xe9,0xe1,0x0a,0x67,0x99,0x0a,0xbd,0xa0,0xa3,0x14,0xd9,0x20,0xdf,0x9e,0x12,0x71,0x29,0x9d,0xd8,0x88,0x91,0xb6,0x30,0xe7,0x38,0xdb,0x77,0xcd,0xcb,0x9b,0xa6,0x58,0x64,0xf8,0xc7,0x41,0x3c,0x4f,0xc8,0x64,0x1c,0x5d,0x87,0xdf,0x38,0x2a,0xd3,0x96,0x83 .byte 0xcc,0xe4,0x8d,0xdd,0x27,0xfb,0x9d,0x23,0x1c,0xbc,0x2a,0xf1,0xce,0xb2,0x63,0xf8,0x52,0xd3,0xfc,0x8f,0xe4,0x72,0x88,0xd6,0xdb,0x27,0x10,0x96,0xd6,0x05,0xc3,0xd9,0x0c,0x94,0x6f,0xb2,0x9a,0x3b,0x6f,0x3c,0xda,0xfb,0xc8,0x34,0x81,0xf8,0x9b,0x75,0x24,0x1b,0x50,0xfa,0xe4,0xbe,0x7a,0xbf,0xfc,0x33,0xdb,0x7f,0x31,0x95,0xd5,0x12 .byte 0x31,0x76,0xe5,0xdb,0x52,0x01,0x83,0x8a,0xeb,0x70,0xc7,0x26,0x71,0xd2,0xec,0xd0,0x05,0x94,0x7e,0x48,0x88,0x1b,0x8b,0xbe,0x0c,0x91,0x43,0x24,0x5a,0x18,0xd3,0xb4,0xd8,0x78,0xde,0x0f,0xe5,0x00,0xd8,0x70,0xd5,0xf6,0xe2,0x91,0x7a,0x6e,0x8c,0x8c,0x5d,0x07,0x27,0x3f,0x73,0x75,0x47,0x20,0x8a,0xb8,0x4f,0xe9,0xe6,0xad,0xcf,0x63 .byte 0xdf,0xcd,0xa4,0x27,0xde,0xb7,0x8b,0x30,0xec,0x29,0x2c,0x87,0xe1,0xf3,0xd9,0x05,0x44,0xfd,0x36,0xf3,0x70,0xe3,0x55,0x9a,0xf9,0x04,0x8c,0xc2,0x3a,0x9f,0xbb,0x07,0x7f,0xed,0x6f,0xdb,0x1f,0x7a,0xd2,0x6c,0x54,0xa5,0x18,0xe5,0x83,0x00,0xd4,0x51,0xee,0x67,0xbc,0xf6,0x17,0x2d,0x4e,0xe2,0x89,0x94,0x5a,0x5b,0x90,0x13,0x14,0x19 .byte 0xdc,0xaf,0x3f,0x09,0x45,0xd1,0x6b,0x40,0x48,0x6f,0xee,0x1c,0x9b,0x92,0xa0,0xf1,0x32,0x34,0xd5,0xd5,0x7f,0xf2,0x55,0xbd,0xd8,0x3b,0xc2,0xc5,0x06,0x37,0x29,0xb3,0xdb,0xbf,0xc3,0x92,0x1f,0x25,0x38,0xa2,0x76,0xcd,0x5e,0x71,0x49,0x26,0xb8,0xef,0x5e,0x03,0xf4,0x81,0x00,0x0b,0xc9,0x69,0xa1,0xf5,0xa0,0x34,0xdf,0x62,0x0b,0x64 .byte 0x41,0x80,0x78,0x7b,0x89,0x9f,0x19,0x28,0x8f,0x75,0xbb,0x49,0xf7,0x4e,0x2b,0x31,0x4c,0xf9,0x50,0xd0,0x17,0xa4,0xcc,0xe3,0xda,0xe3,0x95,0xf7,0x6b,0x01,0x41,0x11,0xae,0x2f,0x9c,0xdd,0x55,0xb2,0xd5,0x7b,0x99,0x71,0x30,0x5d,0x02,0x8d,0xdf,0xca,0xe9,0xcb,0x84,0x69,0x69,0x30,0x3c,0x2c,0x4f,0x50,0xf7,0x33,0x9a,0x75,0xac,0xe1 .byte 0xc2,0xb0,0x39,0x68,0x41,0xfb,0x30,0xf2,0x3f,0x7d,0xc0,0xde,0xbd,0x11,0xf9,0x09,0x62,0x51,0x05,0x82,0x78,0x80,0xd5,0x4d,0x0b,0x63,0xc0,0x20,0xff,0x01,0x41,0xdc,0x01,0x41,0xd9,0x0d,0xa8,0x68,0xd5,0xa1,0x3d,0x2a,0xf9,0x04,0x09,0x78,0x90,0x86,0xff,0xe6,0xb3,0x25,0x0c,0x29,0x96,0x61,0x4f,0x9f,0x93,0x82,0x1e,0x5c,0x5a,0x50 .byte 0xb5,0x8f,0x8b,0x15,0x62,0x52,0x7a,0xa3,0xaf,0xac,0xbd,0xf1,0x21,0xfe,0x5c,0xc0,0x21,0x54,0x3a,0xba,0xbd,0xee,0xdb,0x92,0xc5,0x2b,0xff,0x4c,0xda,0xa0,0x0d,0x56,0x6c,0x23,0x9b,0x73,0x86,0xee,0xab,0x9b,0xf9,0x67,0xbb,0xf0,0xde,0x97,0xf5,0x1a,0x13,0xaf,0x0e,0x7c,0xe9,0xef,0x78,0xf9,0xd1,0x6b,0x01,0x85,0xa7,0x4e,0x33,0x2e .byte 0x04,0x21,0x59,0x34,0x57,0x2c,0xe5,0x96,0x92,0x08,0x8d,0xe9,0x44,0xd6,0x37,0x13,0xc8,0x6b,0x28,0x1f,0xbd,0x3b,0x52,0x3f,0x8e,0xa0,0x2e,0x84,0xfc,0xb7,0x8f,0x43,0xbc,0x69,0x47,0xc1,0xf6,0x91,0x0d,0xa9,0xd5,0x7d,0x5c,0x34,0xd8,0x1c,0x6b,0xb7,0x76,0xa9,0xad,0x6b,0x12,0xb4,0xfe,0x42,0x05,0xa2,0xbc,0x22,0xfb,0x1a,0xc6,0x82 .byte 0x4d,0xc2,0x98,0x34,0x5f,0xa0,0xc1,0x18,0x22,0xbe,0xc3,0xaa,0x14,0xd5,0xe9,0x6e,0x7c,0x24,0x19,0x95,0x40,0xeb,0x87,0x9d,0x47,0xd4,0xc8,0x46,0x35,0xf8,0x31,0x75,0xd3,0x21,0x75,0xd9,0x9d,0x09,0xb0,0x05,0x18,0x25,0x09,0x09,0xd1,0x8a,0x85,0x54,0x4b,0x57,0x64,0x42,0xf4,0xa4,0x9e,0x17,0x68,0xae,0xc8,0xa4,0x25,0x56,0xaa,0xa8 .byte 0xf8,0xd9,0xc2,0x3a,0xe9,0x4c,0x25,0x86,0x4b,0x4c,0x5a,0xd7,0x69,0xc5,0xc8,0x3e,0xbf,0x8d,0x7e,0x11,0xbb,0xf9,0x78,0xc1,0xbd,0x14,0x79,0xa4,0x14,0xad,0x78,0x17,0x2e,0x26,0x58,0x69,0xea,0x94,0x8c,0x3e,0xbb,0xac,0x61,0xbb,0x4f,0x90,0x06,0x82,0x6e,0xea,0xd3,0x1a,0xbc,0xbd,0xf0,0xee,0x89,0xc6,0x75,0x1b,0x57,0x09,0xa6,0x3f .byte 0x8a,0xd4,0x78,0x9b,0x9f,0x99,0xc8,0x9d,0x99,0x1a,0x79,0xb4,0x2d,0x69,0xce,0x3a,0xb7,0x2d,0xed,0xf4,0xe5,0xeb,0x09,0xe6,0x57,0xd3,0x66,0xb2,0xf3,0xfb,0xfb,0xda,0xdc,0xfa,0x1c,0x2e,0xa9,0xd8,0x68,0x5e,0x3d,0x2f,0x2c,0x11,0x2a,0x60,0xb4,0x08,0xa9,0x2d,0x9e,0x41,0x8a,0x02,0x82,0x73,0x58,0x25,0xba,0xca,0x4f,0x46,0x5e,0xbf .byte 0x86,0xb5,0x09,0xa9,0xde,0x86,0x91,0x47,0x8c,0xa2,0x8f,0xc0,0xc1,0xff,0xc0,0x18,0xdb,0x00,0x5c,0xab,0x20,0xe4,0xbd,0x00,0xaa,0x19,0x32,0x4c,0xf0,0xa7,0x0b,0x8e,0xec,0x91,0x50,0x87,0x8c,0x73,0x68,0xe4,0x47,0xd3,0xd9,0x4e,0x5f,0xc0,0x62,0xd0,0xa4,0x01,0x2f,0xe0,0x1e,0x5a,0x63,0x6b,0xca,0xd0,0xdf,0xda,0x9f,0x89,0xd5,0x73 .byte 0xfb,0x3f,0x98,0x20,0x6c,0x30,0x5a,0xd9,0xa6,0x41,0x47,0x82,0xde,0x2d,0x74,0x3f,0xcd,0x6a,0xe7,0x95,0x99,0x8c,0x52,0xa8,0xf9,0x45,0x29,0x40,0xbf,0x8a,0x3b,0x87,0x74,0x92,0x69,0x69,0x8d,0x41,0x84,0xa9,0x7d,0x44,0xd6,0x1d,0x0e,0xee,0x56,0xef,0x3e,0xac,0xa9,0x20,0x16,0xaa,0xf8,0xd0,0x21,0xf6,0x16,0x7d,0x4b,0x7f,0x1d,0xcc .byte 0x5e,0xad,0x25,0xec,0xd9,0x56,0x8a,0x1e,0xc8,0xd5,0x40,0xb5,0x21,0x48,0xbe,0xfe,0xfa,0x4e,0x3c,0x88,0x7f,0x59,0xcd,0x40,0xe5,0xd8,0xac,0x98,0xde,0xba,0xd9,0x6a,0xbe,0x7b,0x07,0xd7,0xfb,0x0f,0xd3,0xb9,0x14,0x6a,0x85,0xcb,0x99,0x6f,0xd9,0xb5,0x22,0x78,0xab,0xa4,0x42,0x6b,0x33,0x4f,0x3c,0xfd,0xcd,0xe1,0x68,0x73,0x08,0x66 .byte 0x34,0xe8,0xa5,0x51,0xfd,0x6f,0xdc,0x84,0x77,0x67,0x2e,0x07,0x1b,0xb4,0xc8,0xda,0x22,0x24,0xab,0x61,0x85,0x17,0xd8,0xa1,0x50,0x28,0xd0,0x3b,0xd6,0xb3,0x6a,0x7a,0x08,0xba,0x34,0x49,0x47,0x1c,0x1a,0x4a,0xd1,0x7e,0x6b,0xdb,0x74,0x26,0x9c,0x0a,0xbd,0x3d,0x29,0x93,0x81,0x02,0xd3,0x08,0x20,0xb5,0x56,0x0b,0x3d,0xf2,0xf3,0x31 .byte 0x6f,0x28,0xe2,0x61,0x81,0x17,0xbc,0xcd,0x7b,0xaa,0x49,0xb9,0x74,0xb5,0x88,0x6a,0xce,0xe3,0x6b,0xbe,0xa8,0x08,0x9c,0xf4,0xe2,0xe7,0xf4,0xfa,0x5b,0x89,0x9c,0xaa,0x12,0xdb,0xd0,0x54,0x1e,0xb7,0xa3,0x66,0x56,0xf8,0x58,0xb5,0xe7,0x5b,0x04,0xb4,0x12,0xb4,0x85,0xfd,0x22,0xde,0x8f,0xc8,0x60,0x1d,0x84,0xc7,0xae,0xae,0xbd,0x63 .byte 0x0a,0x17,0xae,0x64,0x1e,0x31,0xaa,0xdd,0xd7,0xf4,0xe4,0xf7,0x3b,0x00,0x42,0xde,0xa6,0xc6,0x77,0x75,0xa7,0xbd,0x3b,0x92,0x97,0x10,0xad,0x5a,0x9a,0x40,0xa3,0xbb,0x5a,0xe0,0x4e,0x10,0x94,0xa7,0xbd,0x6f,0x0f,0xbe,0xc2,0xd9,0x7d,0xf9,0x5e,0x8c,0xfe,0x1b,0x6f,0xb9,0xd0,0xa8,0xfd,0x8f,0x21,0x69,0x1e,0xc5,0x55,0xa4,0xe8,0x4b .byte 0x99,0x5c,0x35,0xba,0xc9,0x93,0xf0,0x59,0x9e,0xd9,0x1b,0x1d,0xcd,0x0f,0x8b,0xcc,0x55,0x34,0x2e,0xee,0x06,0xaa,0xb4,0xce,0xc1,0xc3,0xb3,0xa3,0x54,0x9b,0x21,0xdf,0xc3,0x3b,0xe5,0x4e,0x89,0x0a,0x81,0xfa,0x3e,0x08,0x66,0xe5,0x2a,0x08,0x60,0xba,0xdf,0xe1,0x81,0x98,0x7b,0xba,0xd3,0x00,0x00,0x3d,0xbc,0x3c,0x5f,0x94,0xa0,0x25 .byte 0x63,0x66,0x52,0x0d,0x20,0x06,0x6e,0x59,0xbf,0x06,0x0a,0xf9,0xd0,0xbe,0xfb,0x31,0x41,0x22,0x36,0x27,0x4f,0xd1,0x16,0x8d,0x29,0xc8,0x2e,0x76,0xae,0xc6,0x26,0xa5,0x35,0x56,0x78,0x75,0x84,0x5b,0xcf,0xc1,0x0a,0x69,0xe4,0x53,0x62,0x6e,0xc7,0xb3,0x0c,0xdf,0xe0,0xb6,0x38,0x8b,0x6f,0x76,0x05,0x80,0x84,0xf8,0xe9,0x9e,0x86,0xf6 .byte 0xcb,0xe0,0xdd,0x7c,0xde,0xab,0xe6,0xbf,0x9d,0x44,0x55,0x3a,0x71,0xc5,0x91,0x07,0xef,0x50,0x23,0x14,0x5d,0x80,0x6b,0x07,0x55,0xba,0x76,0x77,0x31,0x85,0xf7,0x8a,0x1f,0x34,0xba,0x87,0x10,0x53,0xb6,0xec,0x09,0x7a,0x30,0x91,0x1b,0x4e,0x82,0x5d,0x53,0x51,0x88,0xfe,0x2a,0x40,0x63,0xd1,0x0b,0x14,0x51,0x0f,0x15,0xb6,0x2a,0x38 .byte 0x62,0x72,0x27,0x18,0x80,0x6b,0x7f,0x73,0x4c,0xcf,0xde,0xaa,0x5f,0x33,0x43,0x12,0x37,0x8c,0xc5,0xab,0xf0,0x7e,0x69,0xaf,0xc8,0x84,0x7a,0x1b,0x13,0xce,0x17,0xb0,0x67,0xb2,0x83,0xdb,0x1b,0x71,0x67,0xd6,0x86,0x3d,0xa5,0xfc,0x51,0xc9,0xcf,0x94,0x9a,0xaa,0x8a,0xf8,0xff,0x44,0x9c,0x80,0x73,0x35,0xd1,0x8c,0xb4,0x78,0xc1,0xcc .byte 0xb9,0xd5,0x02,0x28,0x44,0x85,0x8b,0x4b,0x74,0xc2,0x2b,0x60,0xa1,0xbf,0x5d,0xe5,0x98,0xec,0x24,0x8a,0x68,0xf3,0xa2,0x37,0x0b,0xbc,0xbb,0x5d,0xe0,0x87,0xe9,0xec,0x9f,0x9f,0x6e,0x62,0x7f,0x0a,0x11,0x41,0xa4,0x1d,0x1e,0xde,0x45,0xe8,0x3e,0x05,0x73,0xd7,0xe3,0x53,0xb6,0x7f,0x94,0x13,0xef,0x33,0xfa,0x91,0x94,0x1c,0x3d,0xe8 .byte 0xb9,0xb3,0x0e,0xff,0xda,0x17,0x49,0x15,0x51,0x59,0x05,0xef,0x16,0xf5,0x10,0xcf,0x88,0xdd,0x1f,0x6d,0xe9,0x53,0xc2,0x13,0xe4,0xb3,0x01,0xff,0x75,0xe6,0xa9,0x4d,0x46,0x0c,0x79,0x76,0x4a,0xa2,0xf0,0x38,0xa0,0x89,0xda,0x92,0x79,0x22,0xa3,0x46,0xb6,0x7f,0x04,0xae,0xfc,0xa0,0xdc,0xf1,0x40,0xe6,0x46,0x0b,0x1e,0x37,0x00,0xae .byte 0x61,0x4d,0xb5,0x7f,0x7e,0x00,0x6c,0x94,0xea,0x89,0x94,0x30,0x8b,0xa5,0x2f,0x6a,0xcb,0x0d,0x08,0xd4,0x50,0xf4,0xa0,0x1e,0xf8,0x83,0xd3,0x25,0xb7,0xcd,0xc2,0x29,0x1a,0xc0,0x34,0x1d,0xeb,0xc9,0xcc,0x9a,0x8d,0x66,0x36,0x05,0xa0,0xc2,0xee,0x0e,0xe5,0x8c,0x41,0xc0,0x55,0xfd,0x2a,0x9f,0x30,0x09,0x08,0x94,0xb1,0xc6,0x79,0xae .byte 0x4e,0xbe,0x84,0xdb,0xe4,0x81,0xce,0x0c,0x44,0xb6,0x33,0x6c,0xcd,0x6f,0x91,0x36,0x28,0x5b,0xe3,0x60,0x3e,0xfe,0xc5,0x4d,0xee,0x89,0x70,0x57,0xf0,0xba,0x74,0xcb,0xcb,0xb8,0xf3,0x91,0x74,0x97,0xe3,0x2d,0x8c,0x75,0x6c,0xa9,0xa5,0x27,0x36,0x90,0x2e,0x41,0x19,0xdd,0x37,0xbe,0x2b,0xef,0x1f,0x75,0x8f,0x14,0xcc,0x94,0x9d,0xa7 .byte 0xef,0x1e,0x62,0x93,0xdb,0x2b,0xa8,0xef,0xf5,0xe8,0xbd,0x11,0x2e,0x59,0xd6,0x81,0x42,0x2b,0x90,0xe0,0xcc,0xb5,0x0b,0xf4,0xb6,0xcb,0xc9,0xc7,0xe5,0xc4,0x9d,0x70,0x40,0xa8,0xf0,0x24,0xb8,0x57,0xcf,0x4a,0xfa,0xf8,0xc0,0x97,0x0f,0x84,0xd0,0x59,0x5c,0x86,0x9e,0xfd,0x39,0x54,0x13,0x00,0x0d,0xb7,0xb0,0x8b,0xf7,0x75,0xb8,0xef .byte 0x6f,0xcf,0xc1,0xec,0x5a,0x3d,0xf4,0x0d,0x74,0xa3,0x81,0x7e,0x71,0xe1,0x67,0xf3,0x5a,0xde,0xe8,0xea,0xe3,0x18,0x7f,0x85,0x4d,0x0f,0x2c,0xbe,0x59,0xfa,0x97,0x1c,0xd5,0x6c,0x97,0x8a,0xfe,0x97,0x7c,0x47,0x2a,0x8f,0x8a,0x8d,0x84,0x61,0x0d,0x5c,0x8f,0x72,0x2e,0x89,0x50,0xff,0x85,0x40,0x6f,0x03,0x1f,0x15,0x47,0xf5,0x5f,0x3a .byte 0x52,0x26,0xbd,0x04,0x82,0x8c,0xee,0x22,0x23,0x84,0x6b,0x7d,0x35,0x28,0x2d,0xa9,0xaf,0x89,0x30,0xc3,0x8a,0x8c,0xbf,0xc3,0xa5,0x34,0x73,0xbe,0xaf,0x29,0x3c,0x26,0xed,0xa9,0x53,0x5e,0x1c,0x54,0x51,0xd5,0x20,0x34,0x4a,0x93,0x0d,0xd3,0xaa,0x26,0x37,0xce,0x5d,0x12,0xb7,0xea,0x80,0x38,0x5d,0x46,0x0b,0x72,0x63,0x5a,0x0f,0x08 .byte 0x9a,0x65,0xdf,0xa4,0xb7,0xe5,0x24,0x8f,0x08,0xb1,0xed,0x5a,0x0d,0x78,0x2c,0xa9,0xf3,0xee,0x6a,0xf8,0x73,0x39,0x61,0x6d,0x50,0x61,0x23,0x88,0x82,0x28,0x91,0xdb,0xbb,0xae,0x9c,0x39,0xe2,0xc2,0xe7,0x42,0xef,0xf9,0xdb,0xa7,0x32,0x19,0x98,0x0d,0xbb,0x67,0x68,0xe9,0x68,0x17,0xb2,0x54,0xf7,0xec,0x0c,0x35,0x05,0x76,0x73,0x26 .byte 0x79,0xb5,0x6d,0xc6,0xc8,0x84,0x80,0x84,0xf9,0xbb,0x95,0xfb,0x39,0xf9,0xaf,0x2d,0xb5,0xd6,0x72,0xad,0x77,0x35,0x09,0x32,0xaf,0xcc,0xc3,0x62,0xd9,0x02,0x33,0x1c,0x9f,0xc0,0xf1,0x18,0x54,0xdf,0xaf,0x0b,0x94,0x52,0xab,0xac,0x7e,0x62,0xab,0x07,0x11,0x83,0xe5,0x7b,0x1e,0xb5,0x3d,0xa3,0x8a,0xdc,0x43,0xf4,0x9c,0x39,0x3a,0x72 .byte 0x01,0x94,0xe5,0xfd,0x0a,0x3d,0x64,0x73,0x56,0x37,0x14,0xc6,0x7b,0x1d,0x81,0xd2,0x62,0x8f,0xe9,0x5f,0x8e,0xb8,0xb4,0xfa,0xfb,0x36,0xa1,0x63,0xe6,0x89,0x87,0x0c,0x87,0x2b,0xa9,0x5f,0x97,0x29,0x0c,0xd2,0x19,0x91,0x83,0x46,0x1f,0x93,0xdb,0x89,0x2c,0xf6,0x32,0x46,0x8b,0x47,0x52,0xad,0x86,0x74,0xda,0x26,0x71,0x6c,0xf4,0x25 .byte 0xa6,0x57,0x89,0xa4,0xd5,0xd8,0x67,0xf7,0x49,0x2a,0xd8,0x6b,0xb9,0xd7,0x97,0xf7,0x66,0xfd,0xf8,0xc2,0x39,0x5f,0xac,0xd3,0xab,0x84,0xac,0x1b,0x6c,0x04,0x00,0xe6,0x0b,0x5e,0xe8,0xc0,0xa3,0x5e,0xe5,0x83,0xb2,0x6a,0x97,0x0e,0xb0,0xa6,0x13,0x77,0xb2,0xc4,0xbb,0x2c,0x27,0x3c,0xca,0x41,0xc4,0x43,0xda,0x92,0xa8,0x0d,0xc8,0x09 .byte 0x8e,0x84,0x46,0x9a,0xd5,0x88,0x3c,0x85,0x3a,0xcd,0x27,0xd3,0x0c,0xaa,0x29,0x74,0xeb,0x3d,0x7d,0x10,0x03,0xc4,0xa7,0x95,0x90,0xb6,0x95,0xf2,0xe4,0xc4,0x35,0x3c,0x9f,0x1b,0x6d,0xd4,0x4e,0xdd,0x44,0xb3,0x59,0x5a,0x75,0xc7,0x2b,0x82,0x3e,0x71,0x34,0x97,0x16,0x86,0x83,0x26,0x2c,0x23,0xc8,0x92,0x3c,0xfe,0xaf,0xcf,0x7c,0x8f .byte 0x0d,0xe7,0x8a,0xa2,0x55,0x56,0x20,0xa3,0xdf,0x5b,0x77,0x08,0xbe,0x3d,0x5c,0x07,0xfe,0xb9,0x14,0xd7,0xec,0x30,0x41,0xcc,0x17,0x4f,0x63,0x34,0xad,0x7d,0xe7,0xac,0x36,0xb6,0x1c,0xc7,0x10,0xc0,0x5a,0x18,0xe0,0xc1,0x50,0x6b,0xb0,0x91,0x11,0xa7,0x02,0x4c,0xdf,0x1f,0x62,0x0e,0xa3,0x3e,0xd0,0xc3,0xbf,0x27,0x6a,0xe3,0xde,0x36 .byte 0x19,0x06,0x4f,0x53,0x5d,0xd3,0x94,0xac,0x4b,0x28,0x72,0x46,0xd8,0x17,0xd8,0xf1,0x47,0xcb,0xd7,0x8d,0xdd,0x85,0x57,0x23,0xf6,0x9d,0x53,0x8f,0x67,0x02,0x68,0x9b,0xf2,0x8e,0x23,0xce,0x27,0xbe,0xef,0xc0,0xd1,0x0d,0x49,0xae,0x4d,0xd3,0xa1,0xc6,0x54,0xfa,0x38,0xc0,0xf7,0xc2,0xb0,0x5c,0xd9,0x6c,0x92,0xb8,0x37,0x91,0xfc,0xf6 .byte 0x52,0x2d,0x3a,0x48,0x92,0xdb,0xcd,0x8e,0x7b,0xa6,0xe7,0xe0,0x27,0x77,0xda,0x0d,0x34,0xff,0x33,0xe2,0x26,0xc2,0xfa,0xea,0x50,0xdd,0x13,0x05,0x7c,0x79,0x40,0x05,0x69,0x31,0x4e,0x32,0x73,0x67,0x21,0x5f,0x18,0xc1,0x18,0x1b,0xea,0x19,0x24,0xc7,0xa3,0x55,0x44,0xcc,0xd3,0x5e,0x83,0x4e,0xea,0x3f,0xc6,0x58,0x9f,0x0b,0x0e,0xc6 .byte 0x29,0x00,0x98,0x99,0xc8,0x71,0xab,0x55,0x77,0x1f,0xdc,0xd0,0xab,0x78,0xd7,0x9b,0x37,0x8f,0x35,0xc0,0x64,0x41,0x6b,0x2c,0x07,0x43,0x0a,0xc3,0x4d,0x8f,0xdc,0xa2,0x18,0x94,0xe3,0xd0,0xc3,0xb2,0xd2,0x84,0xe3,0x12,0x4b,0x31,0x20,0xcb,0x10,0x8b,0x74,0x57,0xf5,0x30,0x29,0x5e,0x37,0x8c,0xc7,0xb7,0xda,0x47,0xc7,0xca,0x59,0xf5 .byte 0x6d,0x61,0x32,0x90,0xb3,0x85,0x2f,0xf8,0x1d,0x5d,0x82,0x2d,0x4a,0x93,0xb9,0x8a,0xbb,0x84,0xce,0x19,0xa4,0x8a,0xa5,0xfc,0x4e,0xa4,0x4c,0xa7,0x54,0x79,0x3a,0x7c,0x9d,0x32,0x74,0x80,0x63,0x98,0xdc,0x78,0x8a,0x0e,0xe8,0x79,0xa3,0x51,0x7b,0x1c,0x4c,0x5a,0xe6,0x3d,0x3f,0x68,0xd4,0x9b,0xc8,0xc2,0x96,0x82,0x5f,0x3c,0xab,0x1c .byte 0xb8,0x09,0xfe,0xa1,0x2d,0x95,0x8c,0xf3,0x74,0xa4,0xb6,0x6d,0x96,0xa8,0x81,0xcc,0x0a,0x46,0xaf,0xce,0xfb,0xb3,0x6a,0x18,0x68,0xc0,0x73,0xc8,0xe7,0x3b,0x3f,0x55,0xda,0xde,0x69,0x1f,0x8d,0x2b,0xd4,0x9f,0x63,0xed,0xde,0xe5,0x6d,0xae,0xa1,0xdd,0xed,0xbe,0x58,0xc7,0x30,0x30,0x50,0x04,0x45,0x54,0x3a,0x5d,0xbc,0xac,0x33,0x13 .byte 0x41,0x0f,0x07,0x1e,0xec,0x4c,0xf2,0x16,0x80,0x49,0x43,0x5a,0xbd,0xb5,0xc4,0x78,0x61,0x86,0xff,0xa2,0xef,0xbf,0x37,0x1f,0x6b,0xf3,0xaa,0x74,0x3e,0x77,0x63,0x47,0x86,0xd5,0x73,0x44,0xe6,0xf6,0x9c,0xef,0x69,0x5d,0xb6,0xe4,0x64,0x94,0x9b,0x4e,0xdd,0x0b,0x69,0xe9,0x7a,0xfd,0x8a,0x89,0xff,0x2d,0x0e,0x5b,0xdc,0xcd,0x3c,0xdb .byte 0xec,0xb8,0x0c,0xe0,0x22,0x09,0x63,0xd7,0x50,0xec,0x42,0xa1,0x2b,0x1c,0xd9,0xa6,0xb5,0xd9,0x16,0x38,0x63,0xa8,0x59,0xda,0xe7,0xbb,0x27,0xca,0xbf,0x39,0x61,0xd9,0xae,0x8f,0xbd,0x27,0xa3,0xfc,0x7c,0x10,0x3b,0x5e,0xbc,0xb0,0xc3,0xf1,0x46,0x8e,0x66,0x7d,0xe0,0x5e,0xad,0x48,0x9f,0xfc,0x5c,0xc0,0x85,0xab,0xd2,0x3a,0x6f,0x60 .byte 0x0c,0x5c,0x1b,0xd8,0x66,0xf5,0x87,0xda,0x0f,0xdc,0x39,0xee,0xdf,0x85,0xf7,0xb8,0xfa,0xd3,0xe2,0xbe,0x7a,0x06,0xda,0xf4,0x55,0xb9,0x10,0xfd,0xb6,0xe9,0xe8,0x94,0xf0,0x66,0x17,0xf2,0x87,0x55,0x99,0xa8,0x65,0x23,0x0f,0xf0,0x41,0xe1,0x9d,0xf2,0x03,0xf4,0xa9,0xc8,0x31,0xa4,0x88,0xa9,0x32,0xcf,0x02,0xd3,0x8a,0xdb,0x9b,0x12 .byte 0xa2,0x41,0xea,0x19,0xff,0x2a,0x18,0x53,0xba,0x51,0xb2,0xe3,0x01,0xbf,0xc0,0x45,0xce,0x16,0xb5,0x66,0xd0,0x61,0x4a,0x1d,0xdf,0x8e,0x35,0x9d,0xeb,0x40,0xcc,0xcd,0x0f,0x4f,0x57,0xd3,0xbc,0x44,0x73,0xf9,0x2a,0xf1,0x85,0x1c,0x06,0x5c,0xde,0xa1,0x2d,0xe4,0x68,0xf4,0xc7,0x79,0x5c,0xf4,0xd7,0x33,0x47,0xdf,0xcd,0xa2,0xe8,0x13 .byte 0x7c,0x0f,0xcb,0x81,0x42,0xa6,0x35,0xf9,0x60,0xcb,0xf3,0x6a,0xf8,0x3c,0x8d,0xff,0xb1,0xdf,0x40,0x22,0x86,0xdb,0xd1,0x59,0x05,0x2a,0xbc,0x04,0x87,0xad,0xe9,0xcd,0x45,0x7e,0xa9,0x5b,0x9a,0xad,0x24,0xf0,0x10,0xac,0xdc,0x16,0xa3,0x4c,0x3a,0x17,0x5d,0x79,0xc6,0xc7,0xcb,0xa0,0x6f,0x34,0xb0,0x9c,0x6a,0xc1,0xd3,0x50,0x0b,0xac .byte 0x2a,0xb1,0xb8,0x96,0xb6,0x82,0xc8,0x71,0xf7,0x34,0x10,0xa3,0x64,0x6f,0x3e,0x2c,0x5c,0x7a,0xec,0x50,0x6e,0xdc,0x65,0x7d,0xb0,0x7d,0xd5,0x9e,0xd0,0x6e,0x78,0xfd,0x6f,0xb8,0x8f,0x07,0xdb,0xf2,0x40,0x9d,0x90,0x7d,0x67,0xf7,0x89,0xa7,0x2d,0x1f,0xf2,0xa9,0xeb,0x3e,0x3e,0x31,0xd1,0xcf,0xec,0xd9,0x32,0x94,0x0c,0x3b,0x24,0xf7 .byte 0xff,0xdc,0x3c,0xe8,0x8b,0x06,0xae,0xc4,0x8b,0x96,0x86,0x97,0xef,0x64,0x53,0xc3,0xf3,0xa4,0xf1,0xfe,0x7f,0xf5,0xb7,0xa3,0x76,0x3b,0x6b,0x91,0x8b,0xbe,0xa2,0xb1,0x76,0xe4,0x50,0x86,0x09,0x2d,0x85,0xba,0x69,0x47,0x9e,0x02,0x13,0x07,0x46,0x9e,0xc5,0x98,0xc5,0xb8,0xd0,0x06,0x97,0x17,0x81,0x6c,0xac,0x90,0x75,0x95,0x03,0xb4 .byte 0x7f,0x76,0x87,0xd7,0x6b,0x76,0xbb,0x93,0xf3,0xe2,0x75,0x8f,0xc3,0x01,0x08,0xbd,0x19,0x1d,0x2f,0x4c,0xee,0x35,0x02,0xd0,0xf1,0x38,0x5e,0xea,0x3d,0x38,0x38,0x9d,0x56,0x38,0xf1,0xcb,0x41,0xc7,0xde,0xbd,0x2f,0xda,0x60,0x58,0x82,0xbf,0xc0,0x46,0xee,0xb2,0xcd,0x6a,0x57,0xf9,0x48,0x9f,0xcc,0xf2,0x15,0x53,0xcb,0xcb,0xad,0xfa .byte 0xb2,0x65,0x62,0xf1,0x41,0x19,0xac,0xb0,0xc3,0x64,0x4e,0xeb,0x65,0x94,0xae,0x22,0x0e,0x24,0x99,0x9c,0x9c,0xa6,0x45,0xdc,0xa7,0x2e,0xd6,0x1b,0x76,0x37,0x42,0x98,0x59,0xb1,0x16,0x7a,0xd7,0xa5,0xd1,0x53,0x58,0xec,0x6e,0xbe,0x5d,0x98,0x37,0x06,0xda,0x5d,0xf7,0xbe,0xa9,0x78,0xb3,0x5a,0x96,0x44,0xa5,0x3a,0x9f,0x08,0x29,0x3b .byte 0xff,0xc5,0x74,0xab,0xe7,0x7e,0x87,0x34,0x71,0x3b,0x45,0xa3,0x1a,0xc5,0x34,0xe7,0xe6,0xff,0xb7,0x27,0xe7,0xf9,0x91,0x9a,0x6d,0x0e,0xb5,0xfd,0xba,0x33,0xa9,0xd5,0xd7,0x2a,0xd2,0xb3,0x51,0x43,0x86,0x37,0xeb,0x06,0x23,0x31,0xfa,0x85,0x8b,0x4f,0x68,0x81,0xaf,0xf4,0x9c,0x6f,0x04,0x35,0x19,0x78,0xf0,0xd2,0xdb,0x2f,0xf5,0x35 .byte 0x62,0xe5,0x31,0xfc,0xfc,0xff,0x0f,0x7b,0x1d,0xde,0xb8,0xb0,0x8c,0x83,0x8a,0xc2,0x9d,0x0e,0x50,0x2a,0x58,0xe8,0xeb,0xbf,0x51,0x50,0xf1,0xec,0xb9,0xad,0x07,0x1b,0x51,0xa3,0xe1,0x68,0x33,0x4d,0xfd,0xaf,0xd5,0x3c,0x25,0xc6,0x95,0x8f,0xf4,0x5f,0xa9,0xde,0x5a,0xa6,0x5a,0x5f,0x3e,0xeb,0x47,0x91,0x1c,0x5d,0x3f,0x8f,0x23,0xeb .byte 0x30,0x89,0x2b,0x3c,0x48,0x4f,0xa8,0xab,0x09,0x6a,0x8a,0x75,0x3e,0xb0,0x83,0xd9,0x44,0x60,0xb5,0xd4,0x2e,0x21,0x7f,0x24,0xec,0xfc,0xd2,0x6d,0xd6,0x90,0xf4,0x1b,0x52,0x03,0xd9,0x7a,0x48,0x0b,0x32,0x40,0x70,0xc3,0x63,0x8d,0x6d,0xc7,0x23,0xea,0xf9,0x17,0x49,0x1f,0xfe,0xe5,0x50,0xbe,0xab,0x82,0xc9,0x31,0x30,0x28,0xc8,0x40 .byte 0x37,0xfe,0x9f,0x37,0xdc,0x7c,0x54,0xc7,0x02,0xf1,0xa4,0x1e,0xdd,0x52,0x11,0xa5,0xb9,0x71,0xfd,0xb8,0x41,0xed,0x82,0x1e,0xc7,0x57,0xed,0xf8,0x80,0x5d,0x92,0x49,0xfc,0x0b,0x24,0xdb,0xa7,0x97,0xbb,0xf9,0x4a,0x06,0xd8,0x4d,0x3d,0xbc,0x8d,0xe0,0x42,0x7d,0x5f,0xf9,0xa7,0x46,0xe8,0x10,0xed,0x89,0xe4,0x68,0x8e,0x1a,0xdb,0x29 .byte 0x9d,0x59,0x22,0x2d,0xe3,0x40,0x8d,0x4b,0x5b,0x6e,0x72,0xde,0xd1,0xd3,0x83,0x02,0x0e,0x7a,0x53,0xe1,0xd2,0x98,0x15,0x6e,0xdd,0x52,0xeb,0x91,0x12,0x0a,0x12,0xb1,0xd0,0xef,0xa1,0x92,0x4d,0x53,0x84,0xfd,0xf8,0x00,0xc6,0xee,0x8e,0xf1,0x07,0x78,0x31,0xdc,0x13,0x3c,0x97,0x63,0xf2,0xfe,0x24,0x3f,0x25,0x3d,0xb0,0xcf,0xa5,0xe8 .byte 0xf1,0x92,0x93,0x13,0xd7,0x9a,0x9d,0x64,0x62,0xb8,0x7d,0x83,0x6e,0xc6,0x1d,0x72,0x7f,0xd4,0xe9,0x24,0x32,0xe4,0xad,0x0d,0x2d,0x77,0x3d,0x19,0xc6,0x4c,0xb2,0xd8,0xe8,0xd0,0xda,0xef,0x13,0xa7,0x9b,0x1d,0xf5,0xea,0x36,0xdb,0xcd,0xcb,0x5c,0xdb,0xb6,0x77,0x8b,0x3e,0xbc,0x9e,0xf5,0x91,0x18,0x77,0x8c,0x62,0x18,0x43,0xbe,0xee .byte 0x79,0xff,0x2d,0x4e,0x69,0xe3,0xf2,0x19,0x9b,0x26,0x85,0x1c,0x71,0x50,0x31,0x33,0x15,0x0a,0xa1,0x0e,0xff,0xca,0xe6,0x32,0x7a,0x5b,0x22,0x8e,0x4d,0xf3,0x2a,0xa3,0x2b,0x73,0xda,0xaf,0x60,0x48,0xa0,0x13,0x09,0xb2,0x93,0xbd,0x8f,0x22,0x7c,0xfb,0x67,0xc1,0x37,0x4e,0x41,0xa7,0x08,0x6c,0x61,0xd1,0xab,0x66,0x44,0xcf,0x98,0x37 .byte 0xe5,0x82,0xdc,0x0d,0x8c,0x77,0xe0,0x69,0x0f,0xa7,0x84,0xcc,0xd1,0xcf,0x08,0xf5,0x14,0xa0,0x87,0x30,0x59,0x37,0xbe,0x53,0xbb,0x1c,0x24,0x8d,0x2d,0xbc,0x9d,0x08,0xc0,0x17,0x61,0xdd,0xe3,0xbe,0xdc,0xfc,0xf7,0x32,0xd9,0x6f,0x48,0xf2,0x37,0x2a,0x68,0x59,0x45,0x1c,0x0c,0xb1,0x78,0x0e,0xf3,0x95,0x49,0x7a,0x2f,0x2c,0xfe,0x80 .byte 0x32,0x69,0xed,0xa5,0x99,0x70,0x96,0xe0,0xd5,0x94,0xce,0x14,0x91,0x30,0xcb,0xb5,0xdb,0x54,0x3b,0xb5,0x04,0x71,0x97,0x00,0x53,0x62,0x9e,0x68,0x38,0xf6,0x1b,0x01,0xd8,0x45,0x23,0x64,0x24,0xe6,0x3a,0xdc,0x39,0x87,0x31,0xdc,0x97,0x58,0xe5,0x24,0x10,0xa6,0xa6,0x3c,0xd5,0x90,0x6e,0x1e,0x55,0xdd,0x4f,0xe3,0x05,0x58,0x9a,0x88 .byte 0x1b,0xbb,0x8d,0x21,0xd6,0xb2,0x2c,0x30,0x33,0x0c,0x43,0x98,0x72,0xad,0xc4,0x71,0xf8,0x97,0x61,0x7b,0x9b,0x70,0x1e,0x71,0x55,0xad,0x53,0xf2,0xfe,0x23,0x3c,0xda,0x84,0x37,0x11,0x47,0xa7,0x70,0xb5,0x0b,0x97,0xbe,0xd8,0x9b,0x69,0x71,0x52,0xfc,0x60,0xec,0x94,0x7a,0xc0,0xa7,0xdb,0x31,0x5d,0x19,0xde,0xc0,0xff,0x14,0xb7,0xc7 .byte 0x74,0x8b,0x65,0x33,0x31,0x4c,0x63,0xf5,0x96,0x08,0xc2,0xf5,0x56,0x3b,0x15,0xbf,0x39,0x1b,0x6b,0x59,0xe5,0x39,0x56,0xb6,0x57,0x7a,0x2b,0xcd,0x46,0x9c,0xd1,0x0e,0x49,0xe1,0x9f,0x07,0x0f,0xea,0xd5,0xb9,0x27,0x76,0x04,0x09,0x92,0x6d,0x37,0x78,0x36,0xd7,0xf8,0xa0,0x96,0x88,0x8c,0x3f,0xff,0x88,0x95,0x85,0x14,0x24,0x82,0x85 .byte 0x47,0x68,0x58,0x11,0xd0,0x21,0x5e,0x1a,0x61,0xe3,0x0f,0x3f,0xd3,0xea,0x14,0xb9,0xd6,0x98,0x10,0x7f,0x38,0x00,0xf5,0xd1,0x73,0xc0,0x71,0x7e,0x75,0xbb,0x5c,0xcc,0xf0,0x83,0x48,0x89,0x16,0xbf,0xd1,0x82,0x36,0x13,0x5d,0x05,0x43,0x18,0xb9,0xf1,0xd4,0xa3,0xcf,0xb3,0x24,0xe8,0x74,0x91,0xee,0x27,0x7c,0xe0,0x20,0xa8,0xde,0x4e .byte 0x7d,0x26,0xef,0x61,0xae,0xe3,0xa9,0xd3,0xde,0xfb,0x37,0xc2,0x06,0xbc,0x1e,0x4d,0xbf,0x3b,0x56,0xca,0x03,0x9f,0x82,0x44,0xfa,0x7c,0x1d,0xa6,0xbd,0xd8,0xcf,0x2f,0x08,0xc9,0x73,0xf3,0x0b,0xf3,0xd8,0xb7,0x93,0xd3,0xd4,0x8b,0xc1,0xce,0x4e,0x88,0xb6,0xd0,0x7e,0xbe,0x7f,0x9f,0x8e,0x98,0xa0,0xf4,0xc1,0x9a,0x65,0xe9,0xe5,0xf2 .byte 0xb5,0xbc,0x64,0xa8,0xdc,0xf0,0x00,0x59,0xc9,0x83,0xbf,0x33,0x54,0x6b,0x12,0xfc,0x61,0xc3,0x2d,0x53,0xfa,0x24,0x39,0x83,0x3a,0x8f,0xaa,0xf8,0xbd,0xff,0x74,0x15,0x10,0x3a,0x3b,0xc7,0x72,0x20,0xed,0x1a,0x79,0x0c,0x12,0xaf,0xb6,0x00,0x54,0x05,0xd7,0xde,0xe2,0x00,0x4f,0x96,0x9c,0xab,0x77,0x71,0x65,0xe1,0x2d,0xee,0x2f,0xbd .byte 0x4e,0x9a,0x0f,0xe9,0xca,0x4f,0x4c,0xdd,0xb8,0x22,0xdb,0x1c,0x5f,0x49,0x8e,0x69,0x3c,0x70,0x79,0xc1,0x20,0xd8,0xda,0x61,0x55,0x0a,0x0e,0xd0,0xb5,0xfb,0x1c,0x56,0xd2,0x85,0x82,0x7b,0xb0,0x58,0xdc,0xf0,0x8b,0x0c,0xfa,0x0c,0xce,0xe3,0x15,0x8b,0x68,0x49,0x09,0x0c,0x9b,0x80,0x17,0x92,0x19,0x08,0xe2,0x7b,0x3e,0x60,0x96,0xc3 .byte 0x81,0x5b,0x4d,0x63,0x04,0x47,0x0e,0xff,0x43,0xb1,0x71,0xb0,0x6c,0x02,0x85,0x2f,0x5b,0xdf,0xba,0xb7,0xe5,0x34,0xb6,0x7e,0xa3,0x74,0xec,0x44,0xe8,0x35,0xc7,0x10,0xa6,0xe6,0x31,0x50,0x29,0x69,0x11,0x91,0x3c,0x31,0x3b,0xb2,0x17,0x21,0xdd,0x92,0x2c,0x71,0x0a,0x45,0xe7,0x7d,0xf0,0x38,0x41,0xa6,0x09,0x72,0xcf,0xbc,0x56,0xff .byte 0x81,0x79,0xaf,0x68,0x80,0xc5,0xa6,0xb1,0xb7,0x3d,0x0d,0xc5,0x9c,0xb2,0x32,0x7f,0xcc,0x66,0x8d,0x86,0x84,0x38,0xa5,0x66,0x7c,0x4d,0x4c,0xdf,0xa7,0x1a,0x7e,0x66,0x95,0xf7,0x5e,0xe9,0x4c,0x61,0x7a,0x05,0x66,0x78,0xae,0x2b,0xef,0x6b,0x6a,0xc5,0x6d,0xbb,0x35,0xef,0x9f,0x0c,0x1c,0x00,0x45,0x2a,0xad,0x79,0x84,0x8b,0x28,0x81 .byte 0x0d,0xe8,0xef,0x49,0xaf,0x59,0xb0,0x9f,0xec,0x58,0x32,0xc9,0x49,0xb2,0xf8,0xc5,0xae,0x92,0xb8,0xde,0xec,0xc2,0xc4,0xf9,0xc8,0x28,0x99,0x07,0x39,0x71,0xed,0x06,0xcc,0x46,0x14,0xd1,0xf4,0xad,0x8d,0x72,0xa4,0x3f,0xea,0x35,0x6f,0x84,0xa8,0xc7,0xcd,0xfd,0x16,0xf8,0x66,0x16,0xb9,0xd2,0x31,0x57,0x1b,0x5c,0x50,0xec,0x8f,0x15 .byte 0xf8,0x4f,0x65,0xd0,0xdb,0x0f,0x29,0x3d,0x03,0xba,0x7b,0x56,0x95,0xfe,0x97,0x95,0xff,0x8f,0x87,0x3c,0xc5,0x70,0xbb,0x96,0x37,0x69,0xd4,0xe6,0xbd,0xd1,0x93,0x95,0x7e,0x1a,0x80,0xde,0x9f,0x2a,0x00,0x18,0x5d,0xcf,0x8d,0xcc,0x31,0x3b,0xe3,0xc9,0x07,0x20,0xf3,0x87,0xc4,0x62,0x6a,0xc2,0xbe,0x09,0xb0,0x57,0xf7,0x8d,0x56,0x4c .byte 0x6b,0xb1,0xa8,0x65,0x3c,0xff,0xfa,0x95,0x20,0xed,0xca,0x36,0x3f,0xba,0x5f,0xe1,0x03,0x6e,0xe1,0xbd,0xce,0xa0,0x68,0xaf,0x51,0x65,0x65,0x10,0xfe,0xdd,0xb4,0x33,0x49,0x57,0x69,0x60,0xad,0x8f,0x84,0x88,0xeb,0x0d,0x46,0xf2,0x2b,0x5d,0x79,0x1e,0x42,0xc5,0x9d,0x3e,0xef,0xb9,0x60,0xa9,0xc6,0x34,0x81,0xb5,0x09,0x42,0xf3,0xa8 .byte 0xf0,0x8f,0xc7,0xbc,0x05,0xc8,0xe9,0xa7,0x47,0x15,0xf7,0x41,0xe2,0xe8,0x0a,0x01,0x67,0x18,0xfb,0x63,0x5a,0x37,0xf4,0x45,0xc2,0x2d,0xcf,0xd0,0x28,0xd3,0xc1,0x2b,0x1c,0x8a,0x40,0x64,0xee,0xf6,0x2c,0x2a,0x37,0x26,0xe2,0x3d,0x76,0x27,0xa2,0x92,0x29,0xd3,0x17,0x4c,0x67,0x1b,0x1d,0xe9,0x38,0x1c,0x38,0x36,0xd5,0xa0,0x91,0xc5 .byte 0xae,0x67,0x0c,0xa3,0x1d,0x34,0x11,0xda,0xe7,0x93,0xe0,0xaa,0xa8,0xa1,0x00,0x5d,0x21,0x34,0x90,0x7d,0xff,0x25,0x46,0x64,0x55,0x56,0x1d,0x58,0xf2,0x49,0xa4,0x19,0x1a,0xe7,0x63,0x75,0xac,0x37,0xb3,0xf1,0x3c,0x14,0x46,0xd6,0x33,0x11,0xfb,0x35,0x84,0x34,0xf7,0x0d,0x99,0x49,0x21,0x8c,0x20,0xf0,0x7b,0x0d,0x4e,0x9a,0xc5,0xc3 .byte 0x16,0x1e,0x73,0x06,0xd8,0x1b,0xe0,0x08,0x5d,0x5a,0x78,0x6f,0x5b,0x18,0x85,0x76,0x41,0xdf,0xa1,0x70,0xea,0xab,0xb5,0xa0,0x4d,0x07,0x66,0x0b,0xb8,0x19,0xf1,0xe7,0x3a,0x68,0xac,0xb9,0x06,0x9e,0x74,0x6a,0x20,0xa6,0x47,0x72,0xd9,0x2d,0x80,0x15,0x0c,0xfb,0x58,0x00,0x3d,0x41,0x48,0x3e,0x72,0xf6,0x08,0xdf,0x14,0x72,0x60,0xf5 .byte 0xd4,0x34,0x7d,0x61,0x42,0xa6,0x40,0xdf,0x54,0xc8,0x37,0xa4,0x39,0x4f,0x1e,0x4c,0x1d,0xae,0x0a,0xb3,0xc8,0x8f,0xed,0x42,0xfc,0xce,0x1d,0x4b,0x31,0x49,0x48,0xe6,0xa0,0x2e,0xd5,0x50,0x13,0xdd,0xc8,0x11,0x4d,0x53,0xce,0x5a,0x41,0x30,0xa7,0xfd,0x09,0xd4,0x1e,0xb3,0xd8,0xd4,0x52,0xc1,0xc5,0x65,0x64,0x96,0xf8,0x02,0xdb,0xcb .byte 0x0e,0xf5,0x28,0xde,0x01,0x34,0x7f,0xe0,0x12,0xdd,0xfa,0x1d,0xda,0xfd,0xdc,0xd3,0xd4,0x87,0x27,0x0f,0x9a,0xb5,0x59,0xe0,0x3f,0xc2,0x38,0xdf,0x13,0xfb,0xdc,0x37,0x54,0xf4,0xf0,0xc8,0xcf,0xd2,0xd1,0xf2,0xf1,0x45,0xf8,0x50,0xb8,0xa6,0xae,0xa0,0x4f,0xaa,0x20,0xc2,0x81,0x2f,0x4e,0xdc,0xc4,0xf3,0x54,0x33,0xf0,0x9f,0x0a,0x75 .byte 0x2d,0xd4,0x43,0x0c,0x1b,0x9f,0xf1,0x82,0x75,0x2b,0x9a,0x6c,0xfd,0xf9,0xa7,0xda,0xa4,0xdc,0xe1,0xd3,0x93,0x14,0x26,0x7c,0x5f,0x20,0x83,0x85,0x38,0xfc,0x87,0xf0,0xbd,0xbd,0xd8,0x80,0xd0,0x10,0x6b,0x23,0xfd,0x52,0x25,0x4d,0xfc,0xfb,0x13,0xb7,0xf7,0xb2,0xed,0xe2,0xd7,0xf9,0x87,0x7b,0x85,0x0c,0xe4,0x6a,0xbd,0xc7,0x59,0xff .byte 0x7a,0xb5,0xfe,0x8c,0x80,0x16,0x2e,0x43,0xb4,0x90,0xff,0xa9,0x71,0x3c,0xee,0xb6,0xa5,0xaa,0x2e,0xa8,0x97,0x9f,0x0c,0xcc,0x31,0xe8,0x2a,0xd9,0xab,0x60,0x88,0xc2,0x29,0xc3,0x4d,0xc5,0x2d,0xf4,0x40,0xc8,0xfd,0x3c,0xe4,0xf7,0x67,0x35,0xf0,0xb6,0xa8,0x4c,0xec,0x30,0xfd,0x54,0xd8,0x25,0x50,0x8e,0x24,0x61,0x7e,0x54,0x0c,0x5b .byte 0x88,0xb9,0x70,0xef,0xc6,0xa7,0x23,0xd7,0xb2,0xec,0x3f,0x51,0xce,0x29,0x74,0x35,0xc2,0x32,0xda,0x1e,0x13,0xc2,0x20,0x3a,0x35,0xee,0x40,0xf4,0x00,0x3a,0xf1,0xa4,0xf3,0xd1,0x58,0x57,0xa6,0x83,0xb1,0x01,0x2d,0x15,0x1e,0x08,0xf8,0x9b,0xb5,0x35,0xee,0x33,0xba,0x5b,0x8d,0x26,0x00,0xee,0x95,0xaf,0xca,0x7e,0x98,0xd5,0x58,0x40 .byte 0xb5,0xa2,0x7d,0x8e,0x0e,0x1b,0x72,0x88,0x1c,0x4b,0x52,0x65,0x6e,0x60,0x62,0x46,0x1c,0x41,0x81,0xd2,0x83,0xc0,0x2d,0xbc,0x5d,0x58,0xc7,0xf8,0x43,0xd9,0x11,0x05,0x50,0x6d,0xc2,0x81,0x29,0xac,0xe8,0x44,0xfb,0x2d,0xf3,0xf4,0x17,0x9b,0x01,0xae,0xb1,0x8a,0x61,0xbf,0x20,0x75,0x12,0x3b,0xb4,0xf5,0xc5,0xff,0x5b,0xf5,0xa8,0x6f .byte 0xec,0x7d,0x04,0x9f,0x63,0xbc,0xb7,0xcc,0xce,0x96,0x7b,0x31,0x09,0x06,0x25,0x90,0x4e,0xd2,0xf5,0x60,0xa3,0x61,0x61,0x8d,0x3e,0x97,0x54,0x24,0x1c,0x25,0x3a,0x2e,0x6c,0xa9,0x97,0xa4,0x69,0xe5,0xdd,0xc1,0xdb,0xb2,0xf5,0xc4,0x8b,0x23,0x20,0xe5,0x68,0x85,0x78,0x08,0x2c,0x95,0x85,0xc5,0x4b,0xf1,0xfa,0xb1,0xf2,0x32,0x28,0x4e .byte 0x1c,0x7b,0x3d,0xfc,0x59,0x52,0x15,0xd5,0x74,0x86,0xea,0xde,0xd5,0x1c,0x5d,0xcb,0x22,0x4a,0x2e,0xbd,0xb4,0x5f,0x59,0xd6,0xaf,0x49,0x7b,0x0c,0xce,0x78,0x4b,0xc9,0xd2,0x2e,0x22,0x7d,0xe2,0x7b,0x05,0x0d,0xa1,0xca,0x24,0x91,0x11,0xa0,0xf2,0xbd,0x77,0x60,0xe9,0xfe,0x5d,0x5c,0xea,0x88,0xf9,0xbf,0xe1,0x26,0xd3,0x65,0x4a,0xa1 .byte 0xb0,0xbe,0x72,0x49,0xfc,0x96,0xd1,0x4b,0xc9,0xb3,0xe0,0x74,0x0e,0xff,0xb6,0x3f,0xed,0xe1,0xdc,0x92,0xe3,0x65,0xaa,0x14,0x2a,0xb9,0x2f,0xc5,0x7c,0x4b,0x30,0x1a,0xc5,0x85,0xc7,0xa4,0x8c,0xba,0xff,0xf3,0xdc,0xf8,0x75,0x4b,0x35,0x36,0x6c,0x91,0x04,0x28,0x3c,0x94,0xc3,0x23,0xd5,0x89,0xbf,0x88,0x3c,0xc8,0xf2,0xec,0x14,0x3f .byte 0x5f,0xf3,0x0c,0x6c,0x89,0x10,0xe1,0x6f,0xef,0xcc,0xd1,0x20,0x32,0xe7,0x59,0xd1,0xab,0xe8,0xe2,0x5f,0xa4,0xc3,0xe6,0x85,0x44,0x31,0xed,0x34,0xa7,0xef,0xff,0xb4,0x28,0x07,0x2f,0xc2,0x75,0x7d,0x72,0x80,0xa9,0x56,0xc1,0x6d,0x7e,0x5c,0xb7,0xdb,0x14,0x1d,0x27,0x0b,0xc7,0x5c,0xd4,0x97,0x35,0x29,0x58,0xb3,0xf0,0xd5,0x4a,0xc8 .byte 0x73,0x01,0xbc,0x86,0xb1,0xff,0xc0,0x5c,0x9d,0xc1,0x19,0xbf,0xeb,0x6d,0x60,0x0b,0x8f,0x2c,0xf4,0x90,0x10,0x43,0xe7,0x2d,0x46,0x95,0x1a,0xf8,0x09,0xc8,0x30,0xff,0x98,0xf2,0xd8,0xee,0x42,0xfb,0x44,0x1b,0xd8,0xa7,0x04,0x87,0x83,0xe2,0x5b,0x5b,0x75,0xf3,0xec,0xa0,0x92,0x64,0x48,0x2d,0x53,0xa5,0x3e,0xeb,0x3b,0x1c,0xc7,0xe8 .byte 0x09,0x66,0xae,0xaf,0x94,0x2b,0xf6,0x16,0x9f,0x07,0x01,0x46,0xcf,0xd2,0x0c,0x7e,0x7f,0x0d,0x02,0xac,0x03,0xd0,0xb8,0xa0,0xe8,0xbf,0x5f,0x57,0x07,0x09,0x38,0xde,0xab,0xac,0xe3,0xae,0x59,0x70,0x5d,0xa5,0x32,0x31,0x80,0xb9,0xbb,0x5f,0x8b,0xcc,0xe2,0x2c,0x2e,0x1a,0x78,0xa6,0xf9,0x1b,0x2d,0x7f,0xd4,0xa1,0xf4,0xd8,0x1f,0x35 .byte 0x5b,0x05,0xc9,0x41,0x8e,0x44,0x32,0x00,0xef,0x01,0x42,0x8f,0x16,0xf8,0xc0,0x8c,0x53,0xba,0x95,0xab,0x85,0xa7,0xe0,0x5b,0x28,0x2d,0xee,0xae,0xac,0x68,0xb6,0x2e,0x51,0x60,0x31,0xb3,0x2b,0xec,0x2f,0xe3,0x9b,0x20,0xb7,0x2d,0x21,0x40,0xab,0x64,0xe4,0x0f,0x2e,0x52,0xb3,0x7b,0x0a,0x3a,0x82,0x50,0xa6,0x53,0x37,0x5f,0x4c,0xca .byte 0x1f,0x68,0x26,0x51,0x2c,0x35,0x4e,0xc9,0x32,0x83,0x7d,0x6c,0xdd,0xd4,0x75,0x58,0xd9,0x6e,0x2a,0x54,0x98,0x94,0xe8,0x5a,0xff,0xcc,0xa5,0x01,0xce,0xc9,0x7c,0xc6,0xd2,0x84,0x74,0x87,0xa9,0x3e,0xb3,0xfb,0x8f,0x7a,0xc3,0x9b,0x48,0xd9,0x91,0x18,0xae,0xa4,0xbe,0xef,0x5c,0xce,0x84,0x14,0xa0,0x8e,0x97,0xd4,0xd8,0xe1,0x3f,0xe0 .byte 0x06,0x3d,0x2d,0x7f,0x76,0x58,0xb0,0x18,0xbd,0x25,0x8c,0x75,0x66,0x9e,0x50,0x3a,0x1a,0x94,0xf8,0x9a,0x9d,0xa1,0x19,0x0b,0x95,0xe0,0xdd,0xbf,0x37,0xa8,0x93,0xf6,0xd0,0x63,0xee,0xc5,0x66,0xec,0xe2,0x2d,0xd4,0x82,0x62,0x22,0xd2,0x05,0x28,0xff,0x62,0x4a,0x93,0x24,0x54,0xa3,0xf9,0xba,0xe2,0x5e,0xad,0x0a,0x54,0x82,0x20,0x95 .byte 0xc6,0xa1,0xd9,0xff,0xaf,0x83,0x14,0x4a,0x00,0xb6,0x05,0x1f,0xca,0x4e,0xb9,0x76,0x87,0x19,0xef,0x7b,0x8f,0x09,0xac,0x28,0x64,0x6e,0xd6,0xa0,0xf3,0xa0,0x58,0xc2,0x51,0xf1,0x9c,0x82,0xb7,0x36,0xfc,0xfb,0x77,0x77,0xad,0x9e,0x9f,0xdf,0xf0,0x12,0xfe,0xa2,0xd6,0x92,0xae,0xbe,0xe6,0xcd,0xc8,0xe7,0x6e,0x14,0xa3,0xcf,0xb3,0x02 .byte 0xaa,0xe2,0x39,0x0e,0x34,0xb7,0x62,0xd5,0x6a,0xcf,0xcb,0x7b,0x2b,0x9e,0xce,0x53,0x86,0xfc,0xe4,0xb6,0xa2,0xd6,0x20,0xe4,0x49,0xa5,0xa5,0x56,0x56,0xff,0x3c,0xc2,0x7c,0xb9,0xee,0x7f,0x92,0x45,0xcd,0x77,0xf0,0xd1,0x8f,0x73,0x2f,0x5d,0x14,0x5e,0x89,0xef,0xae,0xaa,0x7c,0xae,0x1e,0x9a,0xa6,0xea,0x18,0x85,0xcf,0x3a,0x98,0x0f .byte 0xca,0x59,0xa5,0x35,0x99,0x23,0x2c,0x92,0x4f,0xea,0xf8,0x6e,0xa9,0x1e,0xea,0x12,0x81,0xcb,0x30,0xff,0xfb,0x26,0xfe,0x09,0x11,0x5c,0x3f,0xef,0x7e,0x3c,0x5a,0xf6,0x08,0x49,0xcf,0x4e,0xdb,0xb6,0xf2,0x8f,0xcf,0x10,0x6d,0x84,0x55,0xb3,0xba,0x48,0x7e,0x73,0x2c,0x33,0x4f,0xc5,0xd4,0xe8,0xd8,0x57,0xb3,0x94,0x71,0x30,0x24,0x1c .byte 0x41,0xda,0xef,0x66,0x0e,0x54,0xec,0xa3,0x4a,0xf4,0x97,0x86,0x7b,0xc8,0x9b,0x75,0x5a,0x47,0x65,0xe7,0x15,0x59,0x3d,0xa1,0xb9,0xe9,0xea,0x76,0x24,0x23,0x8c,0x05,0xc0,0x06,0x6f,0x0b,0xc5,0x6b,0x25,0x24,0x40,0xee,0xa1,0xe1,0x92,0xbe,0x17,0x2c,0x5f,0x68,0xec,0xc1,0xf6,0x4c,0x76,0x7c,0x4a,0xb3,0x7c,0x5b,0xad,0x72,0x66,0x1d .byte 0x16,0x98,0x92,0x20,0x12,0xa2,0xaa,0xea,0x77,0x78,0xb9,0x3b,0xbe,0x39,0xec,0x61,0x0d,0x8a,0x01,0x98,0x91,0xdc,0xd8,0x4e,0x61,0x73,0x0b,0xe9,0x6a,0x24,0x35,0x11,0x32,0xa1,0x27,0x3f,0x96,0x63,0x2e,0xde,0xab,0x03,0xac,0x1c,0x4b,0xd8,0xe6,0xb4,0x4b,0x3b,0x47,0x32,0x8b,0xf4,0x40,0x92,0x89,0x4e,0xe1,0x63,0x86,0xa6,0x3b,0xb8 .byte 0x94,0x47,0x3c,0x34,0xc0,0x18,0x9a,0x53,0xaa,0x3a,0x64,0x96,0x1f,0x98,0x93,0x13,0x1e,0x44,0x9e,0xcb,0x92,0xc3,0x25,0x17,0xb7,0xe1,0x3e,0x91,0xbd,0x14,0x42,0x33,0xb0,0xf2,0x2f,0xcc,0x40,0x7d,0xac,0x45,0x3d,0xe1,0xe1,0xfa,0x03,0x05,0x0b,0xe7,0x9a,0x26,0x4f,0xab,0xb4,0xe8,0x42,0x9f,0x38,0x81,0xef,0x59,0xfa,0xd1,0x3b,0x27 .byte 0x87,0x23,0x17,0xd0,0xcd,0x25,0xda,0xc9,0x5e,0x21,0x26,0x2f,0x0c,0x33,0x46,0xd1,0xb2,0xf1,0x89,0xad,0xbe,0xe8,0x71,0x37,0xc7,0x27,0x5c,0xaa,0xdd,0x1f,0xd7,0x34,0x31,0x46,0x00,0xd7,0xb5,0x29,0xc2,0x35,0x58,0x07,0x74,0xb0,0x44,0xde,0x08,0x8e,0x51,0x52,0x97,0x8d,0x01,0xe7,0x13,0x18,0x6a,0xd3,0x82,0x2a,0x76,0x67,0x70,0x14 .byte 0x5d,0x1d,0x6b,0xd5,0x8b,0x3a,0x28,0xbd,0x3b,0x13,0xb0,0x43,0xde,0xf3,0x3c,0xc6,0x0f,0x32,0x77,0x7e,0xab,0x28,0xdd,0x8b,0x57,0xab,0xb7,0x65,0x56,0x5c,0x2e,0x05,0x8a,0x3f,0x4b,0xdb,0x22,0xcd,0xfb,0x99,0x06,0x38,0x6e,0x4f,0x7e,0x23,0x54,0xca,0x47,0x2f,0x33,0x18,0x79,0xdf,0x69,0xe9,0x63,0xfb,0x6e,0x9f,0x1a,0xa0,0xc2,0x15 .byte 0xc3,0x5f,0xe8,0xc1,0x35,0x5a,0x60,0xb7,0xd4,0xd4,0x5c,0xc0,0x4f,0x28,0x6d,0xea,0xe9,0xe0,0xa7,0x4a,0xfb,0x66,0x75,0x04,0xae,0xd7,0x30,0x42,0x9b,0x9b,0x0e,0xe8,0x67,0x40,0x8f,0x8e,0x0c,0x39,0xd6,0xa1,0x13,0x69,0x58,0xf3,0x09,0xdf,0x43,0x6a,0x41,0x6c,0x03,0x0d,0xc2,0x38,0x55,0x87,0x7f,0x88,0xed,0x01,0xa6,0x5f,0x1a,0x20 .byte 0xa7,0x7b,0x3a,0x59,0x1f,0x26,0xcc,0x62,0x42,0x48,0xa3,0x60,0x49,0xb0,0x62,0x8f,0xe0,0x66,0x2a,0xa1,0x21,0x6e,0x6b,0x93,0xdd,0x7b,0x89,0x65,0xf0,0xc4,0xf6,0xba,0xf5,0x8d,0x3b,0xd9,0x09,0xc0,0xe0,0xf6,0xf3,0x58,0x9d,0x47,0x0a,0x69,0x09,0x61,0x02,0x8d,0xda,0xf2,0x63,0x82,0x5b,0x50,0x36,0x6e,0x29,0xc2,0x8d,0x5d,0x7a,0x4f .byte 0xd3,0x8d,0xd3,0xfc,0x30,0x94,0xe1,0x7b,0xf7,0x0a,0xe5,0x7b,0x89,0x69,0x17,0x6b,0x07,0x90,0x28,0xa1,0xb1,0x01,0xbc,0xf9,0x3f,0x50,0xf5,0x4c,0xa2,0x9a,0x46,0x0c,0x7c,0xf0,0x68,0xdc,0x75,0x13,0x4c,0x22,0x02,0xe8,0x6f,0xcc,0x0a,0xcf,0x66,0xb7,0x86,0xb8,0x5b,0xe2,0x11,0x26,0x26,0x7b,0x07,0xc0,0xa2,0xf8,0xc6,0x5f,0x10,0x82 .byte 0xe6,0x6c,0x2a,0xb5,0x3f,0xf8,0x1e,0xe0,0x26,0x7f,0x88,0x5d,0x75,0xc1,0x0f,0x4c,0x8f,0x9d,0x87,0xab,0xe6,0x2b,0x07,0xc7,0xa2,0x28,0xef,0x05,0x02,0x55,0xee,0x79,0x7b,0x37,0x29,0x3f,0x90,0xb8,0x09,0x7c,0x62,0xae,0xad,0x0b,0xe1,0xd6,0x5c,0x6a,0x28,0xa9,0x2c,0x78,0x4b,0x37,0x6c,0xfe,0x4f,0x2a,0x59,0xdf,0xd5,0x91,0x37,0x99 .byte 0x0e,0x20,0xf2,0x74,0xe6,0xd6,0x17,0xd9,0x21,0x8f,0xdb,0xd6,0xff,0x5d,0x6b,0x2b,0xa1,0x21,0xd2,0xc9,0xb2,0x37,0x1c,0x69,0xbb,0x9e,0x4f,0x28,0xae,0x4a,0x41,0x7d,0x87,0xcb,0x6a,0xfa,0xbf,0x9f,0x23,0xd2,0x68,0x8f,0xb2,0xa4,0x15,0x60,0xf9,0x6e,0x20,0xb6,0xd7,0x5e,0xa1,0x21,0x05,0x81,0x4c,0x34,0x58,0x7b,0x55,0xae,0x85,0x7f .byte 0xe5,0x3a,0xe3,0xe0,0xf8,0x43,0x73,0xdd,0x85,0xdb,0x2e,0x2f,0x20,0x65,0xea,0x76,0xa1,0x6a,0xde,0xcf,0x76,0x22,0x8d,0x1c,0x22,0x7b,0x93,0x42,0xf3,0x2b,0x93,0x85,0x20,0xc7,0x20,0x53,0xd4,0xd9,0x51,0xba,0x2e,0xc7,0x84,0x09,0x65,0xa0,0x1c,0x58,0xf0,0xa8,0x46,0xef,0xf3,0x4b,0xc7,0x27,0xcb,0x93,0x4e,0x74,0xdc,0x0c,0xb5,0x06 .byte 0xba,0x25,0xf0,0x15,0x47,0x3d,0xf5,0x86,0x9b,0xec,0xc7,0x44,0xec,0x0f,0x7b,0x3c,0xfc,0xec,0x3c,0x71,0x00,0x75,0x42,0xae,0x25,0x5b,0x1c,0xfe,0x1c,0xdf,0x74,0x95,0xb6,0xc0,0xfc,0xd7,0x67,0xa5,0xf5,0x71,0x62,0xcc,0x04,0xab,0x46,0x39,0xfe,0x03,0x72,0x7c,0x01,0x85,0x8b,0x9d,0x9d,0xda,0xd5,0xa4,0xaf,0xbc,0x54,0x96,0x57,0x02 .byte 0x56,0xc2,0x9f,0xe2,0x9d,0x30,0x51,0xc0,0xa5,0x4b,0x86,0xb5,0xb6,0xe9,0xed,0x81,0xa7,0xb2,0x3f,0x2e,0x33,0x0a,0xa0,0x78,0x93,0x94,0x49,0x5e,0x2f,0x54,0x06,0x2c,0x98,0x0e,0xf4,0xcc,0xc2,0xbd,0x5f,0xd6,0x7c,0x81,0xb8,0xb1,0x85,0x93,0xf2,0xb4,0xb3,0x0d,0xa7,0xb8,0x9b,0xb7,0x04,0x2d,0x76,0x35,0xeb,0x4f,0x15,0x68,0xc8,0x43 .byte 0x03,0x4c,0xa7,0x67,0x0a,0xc6,0xc2,0x5b,0xdf,0xc0,0x86,0xde,0xe5,0x72,0x37,0x0e,0xbb,0xe8,0xd0,0x52,0xe1,0xb6,0x87,0xb1,0x1b,0x63,0x94,0x03,0x8a,0x3e,0x40,0x3d,0x39,0x1a,0x41,0xc6,0xb7,0x05,0x81,0x24,0x43,0x4e,0x67,0x1f,0x19,0x00,0x7b,0xd7,0x26,0x55,0x27,0xf4,0x89,0x2b,0x91,0xf4,0x0e,0x5c,0x65,0xcb,0xca,0x96,0x6b,0x92 .byte 0x58,0xba,0xa5,0xf6,0x99,0x99,0x1a,0xf2,0x66,0x6d,0xf1,0xa3,0xbe,0x1d,0x27,0x9c,0x80,0xb8,0x8f,0x01,0xfb,0x67,0x97,0x9a,0xf2,0x55,0xe2,0x04,0xac,0x1a,0x45,0xa0,0xae,0x43,0x7a,0x87,0xaa,0x6e,0xa1,0x36,0xa0,0x27,0xad,0xc8,0x86,0xa2,0xa5,0x39,0xac,0x44,0xae,0xd0,0xe0,0x15,0x04,0x5c,0xb7,0x84,0xe3,0xb3,0x1d,0x7f,0xd8,0xb6 .byte 0x65,0x45,0x1e,0xe9,0x9e,0x77,0xfe,0x6f,0x07,0x80,0x0b,0xe7,0x1a,0xc1,0xd6,0x3f,0x2b,0x32,0xda,0x75,0x50,0xd6,0xbc,0x98,0x42,0xa5,0x2f,0x83,0xb5,0xbe,0x10,0x25,0x01,0xfc,0x0d,0xbb,0x42,0xe1,0x37,0xcc,0x0d,0x53,0x83,0x0c,0x0a,0x7d,0xbf,0x0b,0x1e,0xb9,0x16,0x8e,0x36,0x7e,0x85,0x37,0x3f,0x4a,0x38,0x5b,0x44,0xb5,0x58,0x28 .byte 0x2e,0x46,0xe4,0x12,0x68,0x81,0x52,0x0f,0x4a,0x35,0x4c,0xeb,0x8a,0x7e,0xe7,0x7e,0xfd,0xb6,0x0e,0x8e,0x18,0xa0,0xc6,0x5a,0x53,0x19,0xb8,0xb1,0x39,0x44,0x3f,0xe7,0x03,0xb8,0x20,0x60,0xde,0xc7,0x80,0x01,0xb1,0x86,0x88,0x76,0x3d,0xd1,0x25,0xd1,0x98,0xd1,0xb5,0x96,0x92,0x41,0xe0,0x17,0x94,0xcd,0xf3,0xce,0x8b,0x34,0x92,0x68 .byte 0x04,0x79,0xe8,0xf7,0x07,0xcf,0x53,0x9f,0x05,0x20,0x5d,0xdd,0xbf,0xb0,0xf0,0xa6,0x00,0x1d,0xe2,0x92,0x28,0x07,0xb4,0xbf,0x34,0x7c,0x0b,0xa4,0x13,0xc4,0x57,0xc8,0xd5,0x94,0xc2,0x46,0x2c,0x8e,0x73,0xab,0x05,0xa3,0x48,0xb4,0xcb,0x66,0x52,0x97,0xd0,0x14,0x5d,0xe3,0xfd,0xea,0xe8,0xdb,0x9f,0x02,0x16,0xb3,0x59,0x41,0xb4,0x20 .byte 0xfd,0x08,0x10,0xe6,0x3a,0x96,0xf4,0x77,0x45,0xf5,0x3e,0xa2,0x6c,0xb1,0x6d,0xb9,0xb5,0x78,0x31,0x83,0x15,0xe2,0x9d,0x6b,0xa3,0x27,0xbb,0xc7,0x0d,0x91,0x04,0xed,0x96,0x2f,0xcc,0x4f,0x93,0x96,0x9c,0x8e,0xc8,0x84,0xdb,0xe3,0x26,0x23,0xfa,0x0d,0xc8,0x09,0x21,0x0f,0x0a,0x2d,0x0a,0x04,0x8b,0xcd,0xae,0xdd,0x9c,0xac,0xd1,0x57 .byte 0x22,0x9e,0x0c,0x00,0xd4,0x56,0x97,0xee,0xfd,0x87,0xd5,0x69,0xdb,0x1e,0x22,0xf4,0x67,0x2f,0x7d,0x4f,0x00,0x4e,0x6b,0x1d,0x4a,0x98,0x62,0xde,0xff,0x18,0xc3,0xf5,0xb3,0x14,0x8a,0xb6,0xd6,0x4b,0x11,0xc2,0x7b,0x5b,0x3d,0xbf,0x48,0x39,0x98,0xeb,0xeb,0x17,0xf9,0x57,0xda,0xcf,0xe2,0x59,0x8b,0xbb,0x67,0x73,0x27,0xda,0xcc,0x23 .byte 0x33,0x38,0x0d,0x02,0x43,0x9e,0xa9,0x5e,0x6b,0x85,0x82,0xff,0xe1,0xab,0x5b,0xe1,0xcd,0xa1,0xb0,0x2e,0x89,0x34,0xeb,0x4f,0x6d,0xfc,0xaf,0x39,0x9d,0xa4,0x54,0xd8,0x0f,0x32,0x33,0xe6,0xb0,0x10,0xef,0x69,0x6a,0x83,0x9c,0x73,0x7d,0x69,0x7d,0x5f,0x85,0xc4,0x0e,0x14,0xc6,0xe7,0xba,0x0a,0xb6,0xf1,0xad,0x91,0x3b,0x8e,0xda,0x11 .byte 0x64,0x58,0xdd,0x86,0x4f,0x61,0x3f,0x65,0x12,0x5d,0xa6,0x7d,0x87,0xfa,0xb7,0x3f,0x95,0xfd,0x50,0x3a,0x97,0x0a,0xfd,0x56,0x55,0xaa,0x89,0x96,0x83,0xed,0x9d,0xcd,0xc0,0xc3,0x3a,0x21,0x5a,0x0d,0x6b,0xa1,0x07,0x6f,0x36,0xa2,0xd6,0x0a,0x5c,0x1e,0xa7,0x1f,0x21,0x73,0xcb,0x76,0xc9,0xcf,0xa8,0x54,0x5e,0x8a,0x77,0xa4,0xbc,0xe1 .byte 0x8d,0xff,0x25,0xbd,0x2f,0x71,0x6e,0xff,0x36,0x99,0x62,0x07,0xfb,0x4a,0xc7,0x7c,0x27,0xd4,0xbb,0x27,0xec,0x1b,0x52,0x58,0xfe,0xa1,0x7a,0xe6,0xc7,0x04,0xff,0x76,0xc5,0xe3,0x7a,0x20,0xed,0x7c,0xbb,0x77,0x0f,0xf2,0xc7,0x93,0x11,0x85,0xe2,0x77,0xca,0xfc,0x81,0x8e,0xec,0x1c,0xf5,0x96,0xba,0xde,0x87,0x68,0xb9,0xd6,0xde,0xd7 .byte 0x69,0xd8,0xd7,0x0c,0x9e,0x04,0x23,0xcc,0x5e,0x4a,0x9b,0x53,0x78,0x3b,0x58,0x71,0x7f,0x0f,0x75,0xe7,0x81,0x75,0xce,0x90,0x80,0xf0,0x37,0xb0,0x69,0xd7,0x54,0xc4,0x57,0x14,0xf4,0x08,0xf9,0x79,0xb1,0x28,0xaa,0x0f,0xa2,0x09,0xe2,0xc9,0x04,0xd3,0xa7,0x85,0x52,0x56,0x91,0x1f,0x29,0xd8,0x10,0x89,0x13,0x7f,0x23,0x56,0x14,0x97 .byte 0x59,0x17,0xd2,0x52,0x68,0x0a,0xff,0xd1,0x0d,0xd3,0x3d,0xa2,0x22,0x7f,0x17,0x82,0x38,0x0d,0x7e,0xed,0x35,0x05,0x7e,0xfa,0x9c,0x43,0xac,0x87,0xb5,0xaa,0xe1,0xc5,0x42,0x85,0x3a,0xe9,0x18,0x34,0x73,0xfa,0x9a,0xc3,0x8a,0xca,0xd8,0xca,0xc0,0x87,0xd4,0x0c,0x70,0xc0,0xb0,0x64,0x13,0xf7,0x35,0xfa,0xd3,0x90,0x99,0x36,0xdf,0x90 .byte 0x9f,0xd5,0x01,0xfd,0x1f,0x51,0xf8,0x09,0x9d,0xec,0xea,0x79,0x70,0xae,0xc5,0x39,0x20,0xff,0x6a,0xea,0x09,0xcf,0x50,0x49,0xfd,0x6b,0xd8,0x68,0xf2,0x13,0xb1,0x58,0x73,0xbb,0xcf,0x9a,0xba,0x28,0xda,0x63,0xbf,0x02,0x75,0x8f,0x88,0x9f,0xc5,0x16,0xa9,0x58,0x34,0x46,0x42,0x59,0x13,0x22,0xb0,0xe8,0x0c,0xea,0xd3,0xbd,0x57,0xaa .byte 0x67,0x88,0xf9,0x88,0x04,0x7b,0x5f,0xf1,0x8f,0x71,0x31,0x22,0x8f,0x8a,0x3b,0x0e,0xf7,0x65,0xe4,0xd3,0xf5,0xec,0x32,0x4e,0x61,0x91,0x9f,0xa5,0x3d,0x88,0x02,0x1d,0xa6,0x7a,0x75,0x3f,0xd9,0x10,0xba,0x76,0x43,0xd4,0x31,0x3c,0x39,0x6d,0x60,0x7a,0xe9,0x19,0xe5,0x21,0x97,0xcc,0xb4,0xe6,0x1f,0x4c,0xb4,0x39,0xfc,0x36,0x29,0xec .byte 0x19,0x72,0x28,0x25,0x09,0x30,0x9d,0x7d,0x8a,0x3a,0xd4,0x31,0x65,0x53,0x61,0x05,0x07,0xd2,0x9d,0xbb,0x77,0xde,0x54,0xde,0xbb,0x5b,0xe4,0xae,0xa4,0xc7,0x75,0xfe,0x72,0x2a,0x89,0xfb,0x60,0x15,0x06,0x83,0x4e,0x38,0xfd,0x21,0x28,0x6a,0xaf,0xa2,0x58,0xd5,0x38,0x05,0xd2,0xcf,0xcd,0x48,0x7a,0xed,0x0b,0x54,0x9e,0x74,0x85,0x14 .byte 0xa6,0x84,0x2d,0xa2,0x92,0x5e,0x74,0xef,0x4f,0x6d,0x2a,0xcf,0xed,0x17,0x91,0xd8,0x97,0x25,0x37,0xe3,0xff,0x8b,0xc9,0x1f,0x25,0xa5,0x85,0x52,0xe9,0xb5,0x3a,0xa9,0xe6,0x0d,0x12,0x6b,0x46,0x51,0xf5,0xb0,0x8f,0x3d,0x9a,0x0b,0x9d,0x7c,0x9a,0x65,0xdf,0xc6,0x9c,0x17,0xd1,0x0b,0xdc,0xe3,0xd0,0x75,0xef,0xa7,0xbf,0x1d,0xae,0xe4 .byte 0x50,0x9f,0x03,0x3e,0x90,0x3a,0xa5,0x5b,0x38,0x9f,0x0b,0x02,0x35,0x5f,0x1f,0x26,0xd3,0x2a,0x6f,0x1c,0x75,0x11,0xb2,0xd3,0x65,0x3a,0x96,0x3d,0xfe,0x5e,0x8d,0xef,0x04,0xe8,0xe7,0xb3,0x6e,0x7c,0xee,0x2e,0x8f,0x0d,0x9f,0xf7,0x0b,0xed,0x01,0x82,0xdb,0x54,0x0c,0x01,0x5a,0xea,0xd9,0xeb,0x9e,0x25,0x54,0x95,0x36,0xfc,0xc4,0x09 .byte 0x15,0xee,0x88,0xb4,0x16,0xf6,0xc9,0x79,0xd7,0x79,0xf4,0x94,0x7a,0x5e,0x28,0x19,0xe7,0x2d,0x94,0xd1,0xed,0x48,0x12,0x15,0xba,0xbd,0x90,0xad,0x64,0xec,0x6a,0x52,0xa0,0x33,0xfb,0x13,0xa6,0xe7,0x30,0x04,0xfb,0x7b,0x69,0x07,0x6e,0xfc,0x1c,0xe4,0x0d,0x8b,0x8f,0x38,0x6f,0x59,0xe8,0x5a,0x0a,0x67,0x28,0xd3,0x3c,0xe4,0xd7,0xf2 .byte 0xae,0x0d,0x90,0xac,0x2a,0x9f,0xb6,0x5f,0xfb,0x30,0x5e,0x6d,0xad,0x19,0x86,0x58,0xa4,0x4c,0x2a,0x10,0xdd,0x9a,0x65,0x6e,0x07,0x4f,0x14,0xf6,0xe8,0x7b,0x43,0xb9,0x18,0x2c,0xa4,0xa7,0x2a,0xa2,0xc4,0xf9,0x4e,0x43,0x4e,0xfe,0xf6,0x57,0xbf,0x50,0xc5,0x36,0x7a,0x63,0xac,0x30,0xb3,0x7c,0x78,0x63,0xd2,0xd0,0x1d,0xe3,0x68,0xa2 .byte 0x79,0xa2,0xf3,0x29,0x54,0x04,0x31,0x47,0xf8,0x8c,0x60,0xa5,0x47,0x70,0xa8,0x86,0x89,0xfb,0x7e,0x7e,0xb1,0xc0,0xa5,0xec,0x39,0x3b,0xb5,0xb8,0xb9,0x92,0xd0,0x06,0xfb,0xed,0x39,0x56,0xa6,0x11,0xf6,0x5e,0xe9,0x04,0xb7,0xe4,0x9a,0xf0,0x61,0x3e,0x53,0xda,0xf1,0x61,0x1d,0x1e,0xc8,0xe5,0x46,0x1d,0x73,0xd3,0x33,0xc1,0xab,0xf9 .byte 0x93,0x4f,0x31,0x02,0x4d,0xab,0xd8,0x45,0xa1,0x4d,0x9b,0x37,0xc4,0xd9,0x40,0x58,0x5b,0x56,0x0b,0x46,0x69,0x0e,0xfc,0x27,0xa0,0x44,0xd7,0xf4,0xb0,0xcd,0x2a,0xd1,0xf9,0xf3,0x65,0x8a,0x3b,0xcc,0xdc,0x92,0x25,0xb6,0x8a,0x13,0xb3,0xbc,0x35,0xc8,0xd9,0xc1,0xbf,0x31,0xbb,0x27,0x96,0xa0,0xc2,0x34,0x1c,0x6c,0x33,0xda,0x24,0xac .byte 0x1e,0x0a,0x9e,0x2e,0x07,0xc7,0xc2,0xcc,0xcc,0xf6,0xd0,0x0a,0xf2,0x40,0xe0,0x20,0xce,0xf1,0xcf,0xf0,0x05,0x46,0x06,0xfc,0x33,0x8f,0x19,0x13,0x4e,0x34,0x21,0xa9,0x51,0x6c,0xcf,0x7f,0x6a,0x80,0x4a,0x32,0x6d,0x3d,0xb1,0x63,0xa8,0x2c,0x74,0x13,0x8f,0xf7,0xa1,0xfe,0x6e,0xbd,0xb4,0x80,0xc2,0x2b,0xc7,0x1c,0x99,0x26,0xd0,0x56 .byte 0x98,0x77,0x83,0xc8,0xa7,0x3e,0xe2,0x02,0xfc,0xa8,0x45,0x0d,0xcc,0xe6,0x8c,0x6f,0x07,0x03,0x93,0xdc,0x51,0xce,0xbd,0xe7,0x89,0xc8,0x7f,0x8a,0x06,0x8a,0x81,0x13,0x88,0x12,0x7f,0xd4,0xa9,0x63,0x10,0x0b,0xc2,0x82,0xbe,0x51,0x5c,0x66,0x14,0xb3,0x0f,0x3c,0x6d,0x8a,0xf7,0xec,0xe6,0x3c,0x9f,0x20,0xc8,0x02,0xe3,0xbb,0x59,0x53 .byte 0xc9,0x97,0x29,0xf0,0xa0,0xb1,0x50,0xf7,0x63,0x95,0x96,0x35,0xd0,0x81,0xb3,0xf0,0x44,0x5a,0xf5,0x55,0x10,0x3d,0xe8,0x76,0x21,0x62,0x49,0x1a,0xbb,0x8c,0x1a,0xff,0x75,0x39,0x3c,0x26,0x9e,0xee,0xef,0xaa,0x3d,0xa1,0x21,0xb0,0x47,0xb5,0x15,0x54,0x59,0x11,0x47,0x0c,0x1c,0x53,0x4e,0x0e,0x54,0x38,0xa5,0xed,0x8d,0x1f,0x4e,0x91 .byte 0xfc,0xd7,0x78,0xff,0x9c,0xfe,0xe3,0x86,0xd5,0x8d,0xc6,0xf2,0x03,0x01,0xbb,0xf7,0x89,0x25,0x19,0xb9,0xab,0xd8,0xd0,0x72,0xff,0x69,0x04,0x97,0x77,0xe4,0x43,0x0e,0xe8,0xb6,0xc3,0x57,0xab,0x96,0xe3,0x53,0xfa,0x5c,0x5e,0xfd,0xbd,0xf0,0xba,0xc9,0xfd,0xd5,0x12,0x4f,0xa9,0x72,0xfb,0xf4,0x6d,0xd2,0x74,0xef,0x29,0xd8,0x73,0x27 .byte 0x62,0xd8,0xe1,0x4c,0xd5,0xb0,0x1d,0xfa,0xf5,0x67,0x02,0xed,0x38,0xbe,0xa7,0x0c,0x3f,0xe1,0xad,0xc3,0x8f,0x4e,0x81,0x73,0xe1,0x65,0x7b,0xcc,0x41,0x16,0x2d,0x5b,0xeb,0xaf,0x14,0x96,0x7b,0x53,0x7b,0xcf,0xb7,0x98,0x28,0x92,0x88,0xc5,0x17,0xfe,0xcc,0xce,0x4e,0xe2,0x53,0xfd,0x38,0xd3,0x15,0xfb,0x31,0xd6,0x8e,0x69,0xd4,0xda .byte 0xae,0x72,0x71,0xe1,0x93,0xf9,0x2e,0x28,0x80,0x2a,0xc2,0x8a,0xaa,0x5c,0xba,0x64,0xad,0x2e,0x64,0x2a,0xb1,0x3d,0x71,0x03,0x10,0x2e,0x9a,0x93,0xca,0x85,0xaa,0x77,0xd8,0x80,0x1c,0xe0,0xf9,0x5a,0xfe,0xa3,0xc9,0x8a,0x2d,0xb9,0x45,0xc8,0x9f,0xa9,0x61,0x85,0x81,0xe7,0x1d,0x7d,0xf8,0x11,0x14,0x57,0x51,0xc4,0x84,0xf8,0xb5,0xc9 .byte 0xb9,0xa0,0x3f,0xd1,0xa2,0xcd,0x87,0xaa,0x76,0x2a,0xba,0xab,0xd4,0xb0,0x9d,0xf3,0x83,0x4e,0xcb,0x44,0xf0,0x4b,0xd9,0xce,0xb0,0x2b,0xca,0x92,0xf8,0x3c,0x4a,0x5c,0x8b,0x20,0xc3,0xfc,0x4b,0xca,0xe4,0x2f,0x35,0xfc,0xfc,0xcd,0xf9,0xc5,0x6f,0x75,0x63,0x07,0xf4,0xe1,0xe6,0x4c,0x5f,0x10,0x05,0xe3,0xb5,0xec,0x4c,0x4f,0xd8,0xda .byte 0x64,0xeb,0x7b,0x9c,0xae,0xe4,0x7c,0x3f,0x31,0x1b,0x71,0x8b,0x48,0x52,0x88,0x99,0x8f,0x5f,0x31,0xf3,0x7c,0x6e,0x15,0x4c,0x38,0x96,0xab,0xfb,0x4f,0xeb,0xee,0x3c,0xff,0x8d,0xce,0xab,0xb2,0x96,0x00,0x3b,0x8a,0xb3,0x10,0x3b,0xa5,0xc3,0x5e,0x8f,0x9d,0x2b,0x78,0x18,0x80,0x62,0x8c,0xa6,0x3c,0xeb,0x4c,0x92,0x2d,0x67,0x7e,0xdb .byte 0xc6,0x26,0x58,0x73,0x65,0x0c,0x03,0x07,0x28,0x0d,0xe7,0x9a,0x03,0x3d,0x81,0xc2,0x32,0x76,0x1d,0x27,0xef,0x6e,0xea,0x02,0x7b,0xca,0x3f,0x07,0x63,0x69,0xed,0x30,0x44,0xde,0x2b,0x7f,0x32,0x42,0x28,0x7a,0xc5,0x24,0xf9,0xb6,0x0b,0x24,0xca,0x61,0x17,0x8f,0x80,0xda,0xe7,0x86,0xf0,0xc5,0xca,0xd9,0x6a,0x9a,0x56,0xd4,0x80,0xe3 .byte 0x34,0x9e,0xae,0x9e,0x80,0xf9,0xe4,0x1f,0xa9,0x0d,0x66,0x0d,0x7c,0x31,0xad,0xeb,0x61,0xf1,0xef,0xe5,0xcf,0xfc,0x46,0xbf,0x11,0xb0,0xd1,0x4d,0x9f,0x66,0x11,0xb9,0xba,0x3a,0x32,0x9a,0x0e,0x87,0x56,0x9d,0x03,0x03,0x42,0x19,0xb8,0x4f,0x6e,0x1f,0xc9,0x70,0x69,0x78,0x1e,0x61,0xcc,0x05,0x81,0xea,0xad,0x33,0x7f,0x33,0xcc,0xfe .byte 0x29,0x42,0x02,0xc6,0xc6,0x8f,0x0c,0x02,0x80,0x11,0x1b,0x7b,0x9a,0x43,0xdc,0x66,0x22,0x6a,0x76,0xd5,0x9c,0xd2,0xbb,0xd6,0x52,0x0d,0x7a,0x93,0x24,0x54,0x6f,0x57,0x99,0x55,0xbe,0x1a,0xb6,0xa3,0x06,0xc4,0xff,0xbe,0x8c,0x2b,0x77,0xba,0x4f,0x0d,0xe6,0x34,0xc1,0xea,0x1f,0xca,0xe8,0xb7,0x77,0x84,0x69,0x77,0xa2,0x6c,0x95,0x1e .byte 0x6d,0xbf,0x45,0x59,0x8a,0x9d,0x1e,0x0f,0xf2,0xf2,0x6a,0x03,0x81,0x26,0xbd,0x2a,0x6c,0xe9,0x1e,0xd3,0xa8,0x99,0xc6,0x89,0xaa,0xce,0x1a,0x4c,0xfd,0x4b,0x88,0xe0,0x5d,0xe3,0xc7,0x0b,0xe3,0xce,0x0a,0x71,0x96,0x03,0x31,0x0c,0xc0,0xdc,0xb0,0x31,0x44,0x5a,0x33,0xde,0xd3,0x4f,0x41,0x8d,0x60,0xa9,0x7f,0x6a,0xa1,0xb2,0xc4,0x00 .byte 0x31,0x1d,0xb4,0x62,0x45,0x17,0xd9,0x05,0x55,0x7d,0x3a,0x76,0x38,0x62,0x65,0x16,0x94,0xf2,0x4f,0x7d,0x31,0x6d,0x17,0x79,0x54,0xd4,0x0a,0x5d,0x12,0x12,0xab,0xba,0xc6,0x60,0x9b,0xb2,0x42,0x55,0x2c,0x5b,0x93,0xc9,0x8a,0x11,0x66,0xd8,0x34,0x47,0x6b,0x33,0x13,0xff,0x12,0x25,0xeb,0x21,0x31,0x1a,0x70,0xb0,0x77,0xec,0xc8,0xb7 .byte 0xd6,0xc9,0x91,0x4b,0xfe,0x71,0x40,0x09,0x50,0x9d,0xf0,0xf2,0xb3,0xbd,0x4b,0x02,0x5b,0x6a,0x9e,0x30,0xed,0x31,0xd3,0x6d,0xb6,0xa8,0xed,0x9e,0x28,0xc8,0xb3,0x42,0xe4,0xbe,0x79,0x01,0x96,0x86,0x9a,0xeb,0xfb,0x7e,0x51,0x4b,0x79,0x8d,0xf9,0x8f,0x62,0xf6,0x66,0x75,0xa4,0x2e,0x9a,0x93,0x3f,0x4d,0x29,0xf9,0x8e,0xd3,0x40,0x34 .byte 0xd3,0x60,0xf6,0x68,0x61,0xe9,0x62,0xe6,0xca,0x8c,0x15,0xc3,0xac,0xde,0x40,0x61,0x02,0xcd,0x1a,0x96,0x3c,0xa6,0x4d,0x08,0x66,0x9d,0x35,0x15,0x5a,0x7a,0x38,0x24,0x64,0xb6,0xb6,0xed,0x03,0x4c,0xdd,0x7b,0xe5,0x2f,0x84,0x48,0x6b,0x31,0xc2,0x2e,0xe9,0x70,0xe1,0xaa,0x10,0x55,0x5a,0x18,0x95,0x0b,0xcd,0xa9,0xdb,0x9e,0x87,0x07 .byte 0xae,0x73,0x0c,0x87,0xd0,0xd5,0xc5,0x92,0x48,0xc5,0xa1,0x13,0x80,0xf5,0xe0,0xdc,0xa0,0x61,0x7b,0xba,0x95,0x43,0x38,0x64,0xc0,0x13,0x1b,0x3f,0x14,0x1b,0xcd,0x24,0x1e,0xf7,0x7e,0x9e,0x5d,0x05,0xeb,0xb2,0xe0,0xb8,0x34,0x8c,0xe0,0x25,0xde,0xcc,0x72,0x06,0xc1,0x4c,0x41,0x2f,0xfc,0xb1,0xc2,0x60,0x01,0x09,0xcf,0x44,0x5f,0x7e .byte 0xeb,0x79,0x15,0x89,0x8c,0xaf,0xcb,0xc6,0xcf,0x3f,0xc4,0xae,0xcc,0x82,0x1f,0x08,0x3b,0x97,0x9c,0x74,0x09,0x4c,0x24,0x79,0xea,0x4f,0xd6,0x29,0x9a,0xec,0xb7,0xbd,0xb7,0x09,0x23,0x37,0xd5,0x7d,0x3e,0x7f,0xce,0x33,0xc3,0xe2,0x6c,0xff,0x1e,0xe0,0xcf,0x88,0xca,0x51,0x77,0x9c,0xc6,0xc3,0x13,0xa0,0x7e,0x4a,0x70,0xe8,0xb3,0xe2 .byte 0x65,0x82,0x61,0xb9,0x00,0x96,0xf5,0xa8,0x78,0xba,0x4d,0x5c,0xce,0x1f,0x67,0x1e,0xc1,0xbc,0x60,0xf4,0x40,0x04,0xb6,0xd9,0xe6,0x6c,0x6e,0xbc,0x68,0xf8,0x0e,0x0c,0x93,0x2b,0xf6,0x4a,0x9b,0xfa,0x04,0xe2,0x94,0x4a,0x40,0xe3,0xc2,0x69,0xcb,0xd0,0x64,0x3f,0x4b,0x8a,0xcf,0x6e,0x50,0xde,0x54,0x6e,0xf8,0xc6,0xab,0x03,0xb9,0x88 .byte 0x4e,0xaf,0xfc,0xcc,0x90,0xfa,0x74,0x8f,0xb5,0x8f,0x8f,0xc6,0x17,0xf3,0xc9,0x7a,0x06,0x68,0x2d,0x77,0x91,0xcf,0x52,0xcd,0xf2,0x8d,0xc8,0xac,0x6f,0x4d,0x4a,0xb7,0xfd,0x7e,0x46,0xb7,0x4d,0x4d,0x92,0x05,0xc3,0x68,0xcf,0xf2,0x27,0x2b,0x9a,0x57,0xeb,0xcc,0x4d,0x5d,0xef,0x86,0xe0,0xfe,0xd9,0x43,0x66,0x88,0xb8,0x42,0x1d,0xb2 .byte 0x5e,0x80,0xbe,0x96,0x00,0x9a,0x69,0x7f,0x27,0xcf,0x15,0x44,0x6e,0x5d,0x8b,0x76,0xf9,0xd0,0xb6,0xfd,0xeb,0x56,0x39,0x4c,0x94,0x1b,0x3e,0x09,0xf8,0x59,0x03,0xc9,0x7d,0x1c,0x66,0x4e,0x7c,0xd5,0x87,0xd1,0xeb,0xcf,0x53,0xaa,0xda,0x08,0x26,0x65,0x22,0x15,0x42,0x7c,0x13,0x4d,0xfa,0x50,0xd8,0x52,0xe9,0x71,0x57,0xd9,0x29,0xd2 .byte 0x02,0xb3,0xbd,0x1c,0x1b,0x06,0x77,0x68,0xb2,0xd5,0x3a,0x7c,0x9e,0x54,0x3a,0x75,0xc7,0xa8,0x9d,0x0e,0x5f,0x89,0x20,0x46,0x20,0xdd,0x21,0xb1,0xac,0x96,0xa6,0xd4,0xdf,0x9f,0xe9,0xd4,0x06,0x52,0xc3,0x34,0x43,0x61,0xdc,0x5f,0x85,0x75,0xa1,0xc5,0x10,0x67,0x6f,0xf2,0xba,0xcd,0x64,0x9e,0x69,0x44,0xdd,0x15,0xea,0x05,0x5a,0xbb .byte 0xb3,0xa3,0x8d,0xe6,0xbf,0x4d,0xb0,0x29,0x81,0x81,0x56,0x95,0xc8,0x81,0xcd,0xc1,0x63,0x7b,0x9c,0xa1,0xf8,0x89,0xea,0xf0,0x19,0x05,0x1e,0xe9,0xbe,0xf8,0x9e,0x58,0xae,0xaa,0xf4,0xca,0x45,0x68,0x81,0x18,0x38,0xd7,0x27,0x81,0x14,0xcb,0x68,0x81,0x61,0x37,0x38,0x67,0xc3,0x4e,0xb7,0x30,0x2c,0x9f,0x00,0x6b,0x55,0x87,0xdd,0xb5 .byte 0x54,0x00,0x65,0x85,0x33,0xf6,0xde,0xe6,0x0b,0xee,0x2c,0x64,0xc7,0x14,0xbc,0xf2,0x95,0x31,0x8c,0x63,0x51,0x9d,0x41,0x72,0x14,0x3f,0x60,0x50,0xb7,0x15,0xd4,0xf4,0x8e,0x50,0x9e,0xe9,0x6a,0x94,0x3a,0x0e,0x7e,0x36,0x74,0xcb,0xdb,0xe8,0xe3,0xba,0xd9,0xe2,0x5b,0xdb,0x87,0xf8,0x17,0xd9,0x5e,0x5c,0x4d,0xca,0xc8,0x13,0xae,0xfa .byte 0x24,0x72,0xef,0xda,0x10,0xf6,0xf9,0xe9,0xe0,0xde,0xfe,0xc6,0x9b,0x76,0xfe,0x52,0xc7,0xe0,0xe1,0xf7,0x31,0xa9,0x54,0x5a,0x8e,0xb9,0x6b,0x2c,0x3a,0x18,0x57,0xe9,0x4b,0x39,0x11,0x30,0x4e,0xb5,0x85,0xb6,0xa7,0xee,0x37,0x1a,0xfe,0x60,0x64,0xf5,0x7f,0x46,0x9e,0x82,0x2d,0xcb,0x74,0x4e,0x95,0xc3,0xa0,0x87,0x94,0x85,0x84,0x54 .byte 0x28,0xe3,0x14,0x93,0xb6,0xa2,0x28,0x2c,0x14,0x68,0x8c,0x88,0x82,0xc5,0x75,0x1b,0x25,0x8e,0x50,0xf0,0xad,0xb7,0xfb,0x31,0xb2,0x24,0xf1,0x29,0x5e,0x65,0x58,0x9a,0x8c,0x2b,0x9b,0x6d,0xa4,0x07,0x08,0x0d,0x60,0x7d,0xd9,0xb4,0xe0,0x01,0x93,0x07,0xf3,0x8f,0xde,0x70,0x76,0x10,0x80,0x1d,0xe3,0x1b,0x21,0x58,0xba,0x4a,0xbe,0x9c .byte 0x04,0xdc,0x53,0x64,0x6d,0x12,0x37,0xea,0xa5,0xdf,0xa7,0x1a,0x1d,0x13,0x53,0x87,0xb0,0x98,0xa6,0x1f,0x48,0x5f,0xc2,0x56,0xf2,0x98,0x76,0xd1,0x5f,0x78,0x5e,0xb8,0x6b,0xf0,0x29,0x66,0xa6,0xb2,0x91,0x57,0xde,0xbf,0xc1,0xf1,0xd5,0x8c,0xa4,0x62,0x88,0x2c,0x40,0x53,0x0d,0x46,0x20,0x5c,0x82,0x75,0x03,0x91,0x79,0x6f,0x95,0xd0 .byte 0x95,0xda,0xab,0xd0,0x8a,0x20,0x1c,0x36,0x94,0x7c,0x12,0xe7,0xbe,0x9e,0x1f,0x99,0x7b,0x4b,0x79,0x6e,0xed,0x3e,0x7d,0x77,0x32,0x0b,0x0c,0x54,0xd3,0x22,0xe8,0xcd,0xe7,0x10,0xd7,0xe9,0xd4,0x4a,0xb5,0x68,0x61,0x29,0x1b,0x9f,0x0f,0x72,0xdd,0xaf,0xb2,0xc7,0x57,0x50,0x45,0x8d,0x45,0x6d,0xd2,0x70,0x7b,0x89,0x78,0xeb,0xb9,0x2d .byte 0xf9,0x82,0xb3,0xa3,0xc0,0x9d,0x96,0xf0,0x29,0x0c,0x4d,0xc2,0x03,0x3a,0xee,0x59,0x4e,0x26,0xe7,0x6a,0x88,0xae,0x4e,0x47,0x0d,0x18,0xce,0x71,0x01,0x79,0xf7,0xa3,0x04,0x64,0x54,0x53,0x7e,0x1f,0xb3,0x4f,0x83,0x9f,0x39,0xb8,0xfe,0x1e,0x0c,0x3e,0x9e,0x50,0xc8,0x6f,0xdf,0xf6,0x00,0x4d,0x7b,0xa3,0x0b,0x44,0x6f,0xbe,0x4f,0xf6 .byte 0x47,0x50,0xe5,0x02,0x58,0x5e,0x87,0x9a,0x18,0xc0,0xa0,0x89,0x8b,0x33,0x57,0x1a,0x31,0xab,0x6d,0xd0,0x87,0x54,0xee,0x66,0xca,0xf7,0xb9,0xe6,0x27,0x9c,0xbd,0x48,0x98,0x58,0xa5,0xcc,0x9e,0xe7,0xce,0x88,0x95,0x0e,0x1a,0x35,0x3a,0xee,0xe4,0x0c,0x7e,0xfa,0x87,0x86,0xb4,0x09,0xd7,0x10,0xdc,0x39,0x47,0x68,0xae,0x8b,0xf8,0xc4 .byte 0xf6,0x91,0x6e,0xbb,0x95,0xbf,0xba,0x41,0xd9,0xe3,0xb3,0x40,0x6b,0x3b,0xa3,0x0e,0x8f,0x6b,0xad,0x4b,0x1b,0x44,0x0d,0x35,0x7d,0xdf,0xfc,0x65,0xec,0xa7,0x73,0x14,0x2a,0xf9,0x26,0x24,0x5b,0x22,0x6e,0x97,0x65,0xdf,0x78,0x59,0xd3,0xb3,0xd9,0x68,0xbb,0x0c,0x4e,0x4d,0x4b,0x77,0xc3,0x4a,0xfa,0x0a,0xe4,0x99,0x9d,0x53,0x60,0x0f .byte 0x09,0x1c,0xcd,0x5d,0x74,0xd0,0x50,0x71,0xaa,0x2b,0x15,0xb4,0x73,0xe0,0xf9,0x66,0x54,0x7d,0x9b,0x74,0x9f,0x7f,0xf7,0x9c,0xa2,0x9c,0x91,0xeb,0xaf,0xc6,0xb7,0xb7,0x2f,0x7f,0x7a,0x25,0x6c,0xc4,0xad,0x08,0xde,0x01,0xe0,0x90,0x90,0x23,0x32,0xf9,0x3e,0x48,0x27,0xa4,0x37,0x96,0x53,0xf1,0x00,0xfe,0x6f,0xc2,0xdb,0xde,0xb3,0x63 .byte 0xab,0x6a,0xa5,0x2d,0x29,0x00,0x7d,0xbd,0x10,0xa4,0xf7,0x88,0x46,0x23,0xfb,0x05,0x5f,0x92,0x43,0x5d,0x3c,0x7c,0xbc,0x90,0x66,0x77,0xda,0x08,0x9b,0x87,0xd2,0x69,0xba,0x84,0x7b,0x7b,0x66,0x97,0x22,0xd6,0xce,0x5a,0x9d,0xc6,0xd2,0x7c,0x13,0x25,0x86,0x1b,0x4c,0x36,0x1f,0x73,0x09,0xdc,0xb3,0x96,0xd9,0x10,0xdc,0xcc,0x80,0x4c .byte 0xd9,0x72,0xed,0xa5,0x44,0x65,0x10,0x80,0xee,0x5e,0xfa,0x24,0x7a,0x23,0xb3,0xc7,0x61,0x93,0x6b,0xe4,0x0b,0x4a,0x4b,0x4a,0xa5,0xd8,0x51,0x76,0xf1,0xd9,0x92,0x2b,0x17,0x20,0x0c,0x9a,0xba,0xc3,0x4a,0x29,0x27,0x5c,0x34,0x5b,0xcf,0x44,0x17,0x16,0x61,0x52,0x41,0x3b,0x6e,0x99,0x14,0x94,0xa9,0x5f,0x9b,0x2b,0x1e,0xcf,0xdd,0xcc .byte 0xff,0xc0,0x7a,0xce,0x0a,0x1c,0xf5,0x33,0xaf,0xcb,0xde,0x92,0x56,0x36,0x81,0x98,0xa6,0x70,0x4c,0x49,0x4a,0xd8,0x88,0x0a,0xb8,0x5d,0x5a,0xbe,0x03,0x98,0xba,0xe1,0xf2,0x11,0x44,0x65,0x02,0xd8,0xef,0x8c,0x84,0x0f,0x48,0xa1,0xf1,0x61,0xff,0xef,0x18,0xf1,0x29,0x4a,0x7b,0x8b,0xb2,0xb2,0xa1,0x50,0x26,0xa9,0x86,0x2a,0x06,0x8a .byte 0x33,0x05,0x9f,0x20,0x5b,0x06,0xc3,0x50,0x79,0x20,0x34,0xe5,0x88,0xc0,0xfc,0xff,0xb6,0xa0,0x7c,0x0a,0xe2,0x43,0xc1,0xd2,0xf4,0xb2,0xdf,0xa6,0x51,0x98,0x67,0x6f,0x3e,0xc0,0xae,0xd3,0x35,0xd2,0x5f,0x73,0x71,0x2b,0x3e,0xa7,0x0d,0x8a,0x4c,0xa3,0xba,0xe4,0xac,0xc2,0xfe,0xb4,0x82,0x0e,0xe5,0x76,0x82,0x0f,0x9a,0xd3,0x54,0x24 .byte 0x21,0x01,0x34,0x4c,0xa1,0x0c,0x6e,0x80,0xe0,0x99,0xb1,0x4b,0x40,0xce,0x29,0x33,0xe3,0x5a,0x9c,0x15,0x33,0x06,0x1c,0xdf,0xea,0x01,0x3f,0x2f,0x9a,0x9a,0x34,0x07,0x53,0xc6,0x7c,0x0f,0xbd,0x17,0x06,0xa3,0x47,0x44,0x0f,0xd4,0xb4,0x96,0xf7,0xc5,0x71,0x4c,0xe0,0xc1,0xb7,0x42,0x0f,0x30,0xbb,0x09,0x17,0xc3,0xc4,0xaf,0x30,0x22 .byte 0x45,0x13,0x91,0x55,0x5e,0xde,0x31,0x19,0x0c,0xfc,0x85,0xd7,0x08,0x99,0x0b,0x30,0xbf,0xa7,0x15,0x26,0x2f,0x09,0x2d,0x2d,0xe0,0x60,0x7d,0x88,0x71,0xf4,0x97,0xa7,0x65,0x8d,0x5b,0x59,0x71,0x4d,0xc2,0xf0,0x46,0x2a,0x58,0xe1,0x23,0x78,0x33,0xd6,0x85,0xdd,0x1a,0x02,0x60,0x12,0xdd,0x45,0x8d,0xab,0xdb,0xe6,0x26,0x67,0xbe,0x12 .byte 0xb2,0xff,0xcb,0x20,0x79,0x09,0x5a,0x44,0x92,0x93,0xae,0x74,0x59,0x9d,0x20,0x96,0x81,0xe1,0x53,0x2d,0xf8,0x10,0xc8,0x69,0x4d,0xc8,0xe4,0x60,0x32,0x46,0xf1,0xba,0x6d,0x73,0x8d,0x70,0x8e,0x24,0xf1,0xb7,0x80,0x1b,0x77,0x70,0x3e,0x16,0xa1,0x15,0xb7,0x25,0xd2,0x11,0x41,0x7d,0xd8,0x7d,0x42,0xa0,0x81,0x02,0x61,0xd0,0x6d,0x3a .byte 0xb9,0xc2,0x97,0xda,0x0f,0xf0,0x20,0x23,0x45,0xd4,0xe9,0xf5,0xf4,0x15,0x4c,0x84,0x47,0x2e,0x97,0xce,0x57,0xec,0xcf,0xc3,0x6a,0x54,0x87,0xeb,0xee,0x7c,0x5b,0x9e,0x9f,0xde,0x25,0x5d,0x60,0x7d,0xbe,0xd9,0xb4,0xb9,0x41,0x57,0x9b,0xe2,0xeb,0x21,0x09,0x60,0xb5,0xb0,0x55,0xaa,0xb0,0x15,0xa4,0x0b,0x83,0x98,0xee,0x81,0x7a,0x08 .byte 0xfb,0xe6,0xf1,0xd8,0x02,0x87,0x85,0x15,0x59,0x4b,0xc7,0x6d,0x73,0x4f,0xac,0xf8,0x18,0x9e,0xd8,0x00,0xff,0x3b,0xec,0x44,0xaa,0x4a,0x1d,0x85,0x4b,0x52,0xd6,0xdd,0x88,0x6c,0xc1,0xb0,0x67,0x78,0xcd,0xa3,0xda,0xa1,0x30,0x18,0x7d,0xa6,0x14,0xc8,0x51,0xc1,0x03,0xeb,0x97,0x0b,0x03,0x94,0xcc,0x73,0x95,0xbd,0xea,0x44,0xe2,0xb2 .byte 0x20,0xa4,0x20,0x9a,0x58,0x44,0x75,0x92,0x1f,0xac,0x75,0xf3,0x61,0xea,0xc1,0x9c,0xf7,0x7c,0xf7,0x6b,0x79,0x41,0xb4,0x53,0x32,0x8a,0xb0,0xfe,0x06,0xef,0xb0,0xf9,0x87,0xdb,0x31,0x9a,0xa0,0x84,0xe3,0xa3,0x8b,0x36,0xcb,0xe7,0xb4,0x1e,0xf2,0x21,0x3d,0x06,0x37,0x1a,0xb2,0x96,0xc6,0x94,0x67,0xc5,0x50,0x84,0x06,0xcf,0x57,0x66 .byte 0x1a,0x7d,0x84,0xd6,0xa9,0xed,0x04,0xb3,0x83,0xa3,0xd4,0x55,0x4a,0x71,0x87,0x76,0x79,0xa4,0x9a,0x70,0x50,0x10,0x53,0x66,0x0e,0x7c,0xca,0xcb,0xac,0xcd,0x54,0x37,0x2e,0xe0,0x75,0x2d,0x75,0x06,0x92,0x50,0x0f,0x77,0xaf,0x87,0x71,0x1a,0x13,0x92,0xf9,0x7c,0x19,0x1c,0x3f,0x40,0xcb,0x14,0xbd,0x2e,0xe5,0x27,0x0d,0x1c,0x19,0xe3 .byte 0x0f,0xda,0xca,0xc4,0x58,0xc6,0x98,0x14,0x89,0xc7,0xb2,0x6d,0x21,0x32,0x1d,0x17,0xd2,0x5d,0x40,0x04,0x56,0xd1,0x47,0xa6,0xc6,0x89,0xc9,0x28,0x0e,0x33,0x09,0x15,0xca,0x70,0x2b,0x7f,0xde,0x83,0x5b,0x32,0x83,0x99,0xa9,0xac,0xe9,0xb3,0xb8,0x07,0xc8,0xdf,0xd3,0x16,0x0a,0x42,0x03,0x9c,0x26,0x5e,0x97,0x55,0x4f,0xf7,0x5d,0x64 .byte 0x83,0x8d,0x8f,0x14,0x89,0xed,0xd2,0xd3,0x67,0x92,0x1b,0x71,0x1f,0xef,0x17,0xcf,0xe6,0xa7,0xd7,0x3f,0xf2,0xab,0x5d,0x81,0x4b,0xfb,0x55,0x13,0xf5,0x56,0xf7,0xae,0xc3,0xae,0x40,0xbb,0xb4,0x70,0xfd,0xbc,0x6e,0xcf,0x17,0xea,0x94,0x07,0xec,0xba,0xd0,0xf9,0xc2,0x1c,0x40,0x48,0xf1,0x16,0x31,0x09,0x25,0x9a,0xe1,0xe1,0xdd,0x32 .byte 0xf1,0x9f,0x00,0x6e,0xd7,0xac,0x14,0x7a,0xa0,0xf7,0xd0,0xcc,0x0e,0x25,0x9f,0xfa,0x1d,0x4b,0xc0,0x36,0x3f,0x68,0x01,0xd3,0xca,0x48,0x93,0xfb,0xc6,0x7b,0xdb,0xcb,0xe4,0x13,0x41,0x0c,0x24,0x45,0x7d,0x5a,0x9b,0x17,0xc2,0x7a,0x73,0x7c,0x03,0x9d,0x5c,0x71,0x54,0x68,0x9a,0x5d,0xf9,0x6e,0x5f,0x13,0x79,0x6d,0x65,0xca,0x7f,0xef .byte 0xb2,0xa9,0x5a,0x77,0xc8,0x4a,0x4a,0x91,0x17,0xb1,0xb1,0x8c,0x28,0x22,0xe0,0xff,0xcb,0x00,0xa3,0xb6,0xe2,0x36,0xc2,0x5f,0xd9,0x7f,0x5f,0x85,0xef,0xe7,0x46,0x00,0xc7,0x08,0x8b,0xf3,0x1f,0x63,0x0f,0x23,0xff,0xe3,0x21,0x58,0x73,0xf7,0xaa,0xff,0x2d,0x9a,0x02,0xe5,0x18,0x66,0x34,0x65,0xfd,0x68,0xbf,0xd9,0x3b,0xfc,0xdc,0xc0 .byte 0xa8,0xf7,0x2b,0xc2,0x37,0x01,0x7e,0x3d,0x6e,0x44,0x73,0xc8,0x6b,0x53,0xc3,0x19,0x51,0x84,0x3a,0x28,0xbe,0x5f,0x5a,0x1c,0xcf,0xd3,0xfb,0x25,0x43,0x99,0x9b,0x24,0x58,0xdb,0xc0,0x27,0xf4,0xfc,0xe6,0x2f,0x17,0x48,0xbb,0xf3,0x33,0xc1,0x0a,0x3e,0xb2,0x41,0x9b,0x24,0x16,0xcb,0x0c,0x2a,0x87,0x7f,0x34,0x70,0x4f,0xf0,0xb7,0x6e .byte 0x39,0x18,0x3b,0xca,0x8f,0xcb,0x2c,0x51,0x68,0x5b,0x60,0xeb,0xeb,0x05,0xeb,0x96,0x77,0xca,0x60,0x0c,0x9c,0x88,0xc8,0x09,0x68,0x0d,0x7a,0x89,0x52,0xd7,0x8c,0x3f,0x71,0x71,0x21,0x89,0x4e,0xef,0x77,0x0a,0xdf,0xb7,0xfd,0x08,0x59,0x54,0x24,0x99,0x48,0x1f,0x27,0xca,0x7d,0x1b,0x46,0x2b,0x81,0x56,0xae,0x5a,0x02,0xd8,0x8e,0x1f .byte 0x2a,0xc1,0xd8,0x9b,0xb5,0xeb,0xfd,0xae,0xe5,0x35,0x0d,0x33,0x3d,0x49,0x9e,0x0a,0x62,0x01,0xfb,0xd0,0x25,0xd6,0x9f,0x7d,0x70,0xd9,0x6e,0xda,0x19,0x97,0x5d,0x46,0x67,0x8c,0x21,0xd3,0xe5,0xe5,0x50,0xaf,0x47,0x16,0xb3,0xea,0x21,0xe1,0xee,0x1c,0x93,0x14,0xd0,0x4a,0x1e,0xfb,0x19,0xa9,0x26,0x71,0x53,0x9b,0x17,0xda,0x8f,0x28 .byte 0xf5,0x35,0xf6,0x59,0x75,0xb1,0xeb,0xec,0x5a,0x92,0xc0,0xed,0xc1,0x48,0xaa,0xd8,0xb6,0x54,0x32,0x96,0x58,0x34,0x09,0x75,0x5e,0x0c,0x58,0x8d,0xc1,0x42,0xf1,0xfb,0x41,0xe1,0x23,0x84,0x25,0x3a,0x83,0x4c,0x13,0x0e,0x67,0x33,0xf9,0xfb,0x5b,0xa8,0xbb,0xbb,0x92,0x0a,0xca,0x5c,0x9e,0x7a,0x58,0xab,0x51,0x16,0xfc,0xf2,0x4d,0xee .byte 0xa1,0x2d,0xaa,0x2d,0xb6,0xaf,0x30,0xca,0x4a,0xec,0x63,0xd6,0xf0,0xee,0x81,0xfd,0x9e,0xe7,0x71,0xb1,0x5f,0x3a,0x8e,0xa0,0xd1,0xa9,0xe0,0x61,0xdc,0x9e,0x78,0xbd,0x2b,0xaf,0x93,0xf9,0x61,0xf7,0x70,0x5e,0x9a,0xe9,0x9a,0x31,0x9c,0x81,0x66,0x5d,0x33,0xe4,0xc9,0xf0,0x28,0xfb,0xd7,0xa4,0x10,0x31,0x38,0x83,0x9b,0x96,0x7d,0xfd .byte 0xd5,0x0e,0x23,0x62,0xa4,0x3b,0x6f,0x63,0xb7,0xbc,0x28,0xca,0xca,0xc5,0x14,0x1b,0xc5,0x3d,0x00,0x58,0xeb,0xf8,0x65,0x09,0x7f,0x0e,0x89,0xcf,0x6a,0x7d,0x0e,0x17,0xdc,0x74,0xde,0x8c,0xfd,0xe4,0x26,0x44,0xe4,0xce,0x2f,0x47,0x66,0x57,0x6f,0x4b,0x86,0x91,0xca,0x36,0xe3,0xeb,0x18,0xd3,0x48,0x63,0x5f,0x3f,0xc6,0xb5,0x38,0x5a .byte 0x7d,0x20,0xe8,0xc1,0x9b,0xb4,0xc0,0x4e,0xe8,0x93,0x5e,0xd0,0x34,0xa3,0x30,0xf6,0xd6,0x51,0x0c,0x46,0x27,0x2c,0xac,0x91,0x01,0x10,0x8f,0xed,0xcb,0x16,0xf3,0x28,0xfb,0x44,0x55,0xac,0x5e,0xdd,0xf0,0xf6,0xe8,0xbf,0x7f,0xdb,0x14,0x7e,0x40,0x5e,0xa7,0x14,0x52,0x69,0xea,0xd6,0x03,0x76,0x3a,0x10,0x64,0xea,0xe8,0x0c,0x76,0x04 .byte 0xc9,0x18,0x5e,0x22,0xe8,0x1c,0x19,0x2f,0xbe,0x72,0x61,0xe6,0xdc,0xbe,0x95,0x0b,0x95,0x39,0x3d,0x5a,0x34,0x43,0xca,0xb6,0x4b,0xa6,0xf5,0xd3,0x22,0xcc,0xa0,0x35,0x0d,0x06,0x89,0xd1,0xde,0x96,0x49,0x06,0x7e,0x62,0xa1,0x18,0xbd,0x78,0x65,0x2c,0x84,0x22,0xc0,0xea,0x9b,0x7c,0x5c,0xdd,0x97,0x20,0x60,0xc4,0xf1,0xdd,0x68,0xb7 .byte 0x4b,0x30,0x17,0xcb,0xb7,0xbd,0x3c,0xb5,0x66,0xa7,0xad,0xc2,0x9a,0x31,0x79,0x09,0xff,0x4d,0xd5,0xd6,0x35,0x02,0xa6,0x0b,0x8a,0x8a,0xbb,0x54,0xe1,0xea,0xc8,0xa9,0x67,0xfc,0x1a,0x23,0x8d,0xdb,0xc5,0xe5,0x8d,0x1b,0x6f,0x20,0x57,0xbb,0xbb,0xda,0xfa,0x5b,0x07,0x3e,0x3e,0x84,0x2e,0x00,0x36,0x06,0x5c,0x85,0xa3,0x08,0x4a,0x59 .byte 0x48,0x4c,0x7c,0xcc,0x63,0x49,0xde,0xb0,0x59,0xa2,0xb9,0x26,0x8c,0xb2,0x91,0xf8,0xf8,0x07,0xb8,0xba,0x16,0xdb,0xc7,0x6c,0x66,0x5f,0x91,0xc1,0xb8,0x24,0x97,0x1a,0xfb,0x95,0xf6,0x40,0xb0,0x5d,0xd7,0x55,0x40,0x8d,0x75,0x35,0xbf,0xd6,0xcf,0xe4,0xe8,0x6d,0x33,0x10,0xd7,0x8b,0xf3,0xc0,0x00,0x47,0xbb,0x90,0x51,0xd2,0xf5,0x56 .byte 0xf8,0x82,0xb6,0x50,0xea,0x88,0x44,0x0b,0x46,0x53,0xc4,0x10,0x80,0x03,0xfa,0x63,0xa7,0x92,0x38,0x7c,0x62,0xbe,0x90,0xea,0x9d,0x0d,0x09,0x6e,0x08,0x34,0x61,0x41,0x7f,0xe7,0xaf,0x45,0x3f,0xa5,0xbf,0x7a,0xae,0xc0,0xa8,0xfc,0x64,0x4a,0x73,0x85,0x08,0xce,0xf3,0x7b,0xcc,0x0d,0xf8,0xa4,0xa0,0x9f,0x48,0x28,0x81,0xf9,0xe4,0xb5 .byte 0xdd,0x6c,0x32,0xbb,0x1a,0x36,0xe6,0x78,0x8d,0x85,0x4a,0x8b,0xfb,0xf1,0x14,0xfe,0xde,0x15,0x92,0x8b,0xd6,0xee,0x73,0x43,0xc0,0x83,0x37,0xf2,0x0a,0xb7,0xc9,0x3b,0x25,0x2b,0x08,0x7a,0x54,0x49,0x21,0x5f,0xd4,0x78,0xc1,0x30,0x10,0x1c,0xad,0xfd,0xbd,0xb4,0xb1,0x6c,0xd8,0xd1,0x17,0x3e,0x61,0x2b,0x80,0x82,0x63,0x93,0x2d,0x0b .byte 0x0e,0xcc,0xaf,0xa9,0xc3,0x2d,0xb7,0xc7,0x25,0x37,0x5f,0x3e,0x61,0x94,0xe1,0x2c,0xd3,0x31,0x84,0x9f,0x48,0x9c,0xb2,0x73,0x7d,0xd5,0x84,0xba,0xb8,0x1c,0xa4,0x88,0x4c,0x9e,0x14,0x89,0x09,0x25,0xf1,0x47,0xc1,0x20,0x45,0xfd,0x1a,0x1f,0x25,0x33,0xeb,0x9f,0xa8,0x17,0x93,0xd4,0x41,0x24,0xbd,0xd2,0x08,0x90,0x68,0xad,0x76,0x43 .byte 0xa4,0xd9,0x35,0x68,0x0f,0x28,0xd4,0x2d,0x1e,0xcd,0x52,0x0d,0xf5,0x70,0x92,0x42,0x58,0xbb,0xa6,0xec,0xe9,0x71,0x04,0x66,0xf2,0x16,0x0d,0x3a,0xc0,0x6b,0x85,0x67,0x84,0x12,0x2d,0x02,0xa4,0x17,0x34,0x33,0x91,0x0b,0xa2,0x04,0x0c,0xe3,0xa4,0x80,0x5a,0x83,0xef,0x76,0xe7,0x9a,0xa8,0xa6,0xb8,0x41,0xe3,0x06,0xa7,0x9a,0xc7,0xe6 .byte 0x56,0xa0,0x21,0x53,0x0c,0x5c,0x38,0xad,0xa2,0x87,0x3d,0x7d,0x38,0x50,0xe1,0x49,0xb7,0x56,0xf7,0xfc,0xc4,0x60,0x9e,0xb9,0x4a,0x68,0x18,0x1b,0x84,0xea,0x9a,0x30,0x01,0x53,0xf8,0xd3,0x25,0xb1,0xd0,0x3d,0x23,0x71,0x21,0x19,0xdf,0xe0,0xe4,0xdb,0xba,0xcc,0x92,0xe8,0x97,0x56,0xba,0x4f,0x63,0x77,0xaf,0xbb,0xe9,0x30,0x09,0x40 .byte 0xbf,0x3c,0xf4,0xb6,0x0c,0x8b,0x1f,0x22,0x73,0x6e,0x49,0x1e,0x29,0x4f,0x92,0xa1,0x90,0xf7,0x2a,0x55,0xee,0xb3,0x36,0xe8,0x69,0x2c,0xc0,0x60,0xaa,0x1c,0xa6,0x84,0x0a,0x90,0xfa,0x5e,0x48,0x14,0x3a,0xf7,0x1e,0xe2,0x24,0xe7,0xae,0x2e,0x1f,0xdb,0xa6,0xc6,0xcb,0x6e,0x4b,0xae,0x88,0x4e,0x66,0xa9,0x96,0x23,0xa8,0xd7,0x94,0x3a .byte 0xae,0xa5,0xdc,0xdd,0xfb,0xbd,0x1c,0xbf,0xa6,0xe0,0x29,0xe2,0xd1,0xa5,0x1b,0xd9,0x6d,0x38,0xd1,0x84,0x6f,0xf7,0x46,0x72,0xf0,0x89,0x72,0x4f,0x7f,0xb6,0xf3,0xf9,0x91,0x61,0x68,0x12,0x48,0xfb,0x1b,0x74,0xc7,0x7a,0x6b,0x4c,0x5d,0xbd,0x4b,0x89,0xfb,0x43,0xa7,0xd7,0xd0,0xc2,0x88,0x86,0x9b,0xcf,0x0e,0x94,0xc3,0x49,0x47,0x82 .byte 0xd6,0x06,0x54,0xa4,0xb4,0x81,0xdb,0x07,0x38,0x5e,0x9e,0xc6,0x39,0x57,0x05,0x14,0x18,0xf9,0x68,0x6c,0x27,0x32,0xcf,0x90,0xd9,0xc8,0x7c,0xc4,0x1b,0xab,0xa8,0xc0,0x75,0x34,0x35,0x32,0xde,0x8e,0x20,0x09,0x6a,0x90,0x2a,0x67,0x86,0x61,0x08,0x9a,0x53,0xfc,0x6a,0x9a,0x0d,0x87,0x8b,0xa2,0xa3,0x72,0x6f,0xfa,0xc3,0xd0,0x9c,0x7a .byte 0xc6,0x9e,0x1e,0xb4,0x2e,0xaf,0x4a,0x39,0x95,0x07,0x4f,0xbb,0xb4,0x52,0x7f,0xea,0x54,0x21,0x79,0x7e,0x2b,0x7a,0xea,0xec,0xcd,0xa5,0xdc,0xfd,0x8c,0x3c,0x9b,0x1d,0x7d,0x15,0x5b,0x05,0x95,0x7a,0x14,0xa8,0x3c,0xdd,0x91,0x0e,0x25,0xfc,0xa6,0x91,0xd8,0x2d,0xa5,0xf7,0xcc,0x26,0x77,0x2e,0x08,0xda,0x56,0xb9,0xc8,0x0e,0x78,0x79 .byte 0xda,0x1d,0x56,0x41,0x1f,0x17,0x36,0x68,0x1c,0x16,0xcf,0x36,0xdf,0xb3,0x53,0xf9,0xf7,0x34,0x92,0x86,0x03,0xfe,0x67,0x8b,0x8b,0x4c,0xc3,0xfd,0xd0,0x44,0xce,0x91,0x57,0x3b,0x96,0x42,0x22,0xae,0xfc,0xf5,0xd7,0xcd,0x22,0x3e,0x91,0x05,0xf6,0x28,0xa7,0x6b,0xc7,0x0f,0xb8,0x67,0x26,0x84,0xa8,0x73,0x44,0xa5,0xd4,0x58,0x07,0x0a .byte 0xcc,0xaa,0xd6,0x49,0xff,0x1a,0xce,0x30,0x14,0x62,0x9a,0xcc,0x6e,0x98,0xb5,0x6d,0xb4,0xa4,0x5d,0x71,0x10,0xd1,0x64,0x84,0x70,0x51,0xb5,0xe1,0xfc,0x78,0xe4,0x70,0x88,0x2a,0xcf,0x41,0xcc,0x45,0x34,0xa2,0xef,0x9b,0xf0,0x8b,0x27,0x11,0x81,0x89,0xee,0x5d,0x37,0x8e,0x6d,0xe3,0x72,0x89,0x65,0x23,0x88,0x97,0x03,0xab,0xb3,0x90 .byte 0x76,0xf1,0x27,0x1b,0xa7,0xf0,0x5d,0xe4,0x83,0xda,0x4e,0x5b,0xbc,0x95,0xec,0x6f,0xdf,0x00,0xbf,0x2d,0xda,0xda,0x50,0x80,0xba,0xef,0x99,0x2b,0x6d,0xf7,0x61,0x01,0xcf,0xdb,0x9e,0x3d,0x65,0x22,0x03,0x5b,0x1d,0x0c,0x4a,0x08,0x83,0x78,0xd0,0x2b,0xe5,0x92,0x0d,0x53,0x50,0x0d,0xc0,0xdb,0x2d,0x8a,0x77,0xfe,0xb1,0x42,0x99,0xe1 .byte 0xcb,0x1e,0x07,0x51,0x39,0x7e,0x75,0xa1,0xf2,0x73,0xea,0x0e,0x5e,0x1d,0xe9,0x60,0xc1,0x18,0xe7,0x5f,0xc6,0x37,0x49,0xb0,0xd5,0xc0,0xfb,0x0b,0xbd,0xa7,0x0f,0xe1,0x07,0xea,0x99,0xad,0x98,0xee,0xa1,0xa3,0xfd,0x4b,0x94,0x35,0xd3,0xe9,0x16,0xbf,0xf3,0x91,0x80,0xc2,0x9b,0x22,0xdc,0x47,0xef,0xad,0x15,0x12,0x2c,0x3d,0x5d,0x04 .byte 0x7a,0xcc,0x43,0xf1,0xe6,0xb8,0x1a,0xe8,0xc1,0x81,0x1d,0x84,0x3a,0x42,0x92,0xc3,0xb6,0x76,0x07,0x89,0x2b,0x78,0xd0,0x0e,0xca,0xef,0xaa,0x7d,0xd1,0xe8,0x66,0xed,0xbf,0x5c,0x5e,0x2d,0x8d,0x3e,0xc2,0xbb,0xb9,0x53,0x27,0x98,0x0b,0xa1,0x5d,0x9e,0x7d,0x65,0x25,0x1f,0x3c,0xb1,0x37,0x6c,0xde,0x5e,0x02,0xbe,0x75,0x26,0x5b,0x2a .byte 0x25,0x21,0xa1,0x4f,0x95,0xda,0x29,0x61,0x1c,0xff,0x2b,0xc5,0xdc,0x2d,0x8f,0x54,0x4b,0x19,0x06,0x0c,0xb6,0x6c,0xe7,0xd4,0xc3,0x4b,0xa5,0xf5,0xc3,0xe2,0x42,0x90,0x36,0x61,0xb1,0x57,0x19,0xb7,0xca,0x7d,0xcb,0x31,0xbe,0x8d,0xb7,0x5a,0x9d,0x81,0xf2,0xf0,0x18,0x45,0xc8,0xcb,0x3c,0x71,0x42,0xe5,0x6a,0xfe,0x00,0x9f,0x4d,0x59 .byte 0x32,0xaa,0x0b,0x2c,0xed,0x1c,0xfe,0xe7,0xbd,0xce,0xc3,0x2c,0xb2,0x3e,0xdf,0xb3,0x0e,0x96,0xbe,0xe9,0xd1,0xf0,0xe2,0x31,0xf6,0xeb,0xa9,0x7b,0x32,0xbe,0x42,0x55,0xf3,0x80,0x71,0xfb,0x1f,0x6e,0x5f,0xd3,0xc8,0xdf,0x64,0x7b,0x3e,0xf2,0x00,0x60,0x7f,0x49,0x5a,0x97,0xa9,0xf1,0x8f,0x82,0x6d,0x33,0xbf,0x2f,0x34,0xc7,0xbe,0x24 .byte 0x27,0xe8,0xe2,0x88,0xfb,0x3b,0xe3,0xaa,0x86,0x90,0x8d,0x69,0x0e,0xb4,0x83,0xea,0xdc,0xc8,0xce,0x8c,0x53,0xb0,0xcc,0xcc,0x2a,0xe6,0xb0,0xee,0xde,0xe6,0x0c,0x7f,0xce,0x73,0x6f,0xa9,0xa2,0x3e,0xf6,0x66,0xc5,0x83,0xfe,0xa1,0xab,0x80,0x90,0xd5,0x58,0x98,0x22,0xb0,0x4c,0x21,0x27,0xb7,0x19,0x68,0xa7,0x18,0x6b,0xb4,0x82,0x76 .byte 0xff,0xb1,0xb1,0xa5,0x14,0x06,0x5b,0xfe,0xe4,0xd2,0xb8,0x4f,0x21,0x2a,0x74,0x17,0x01,0x78,0x74,0xf3,0x2a,0xa0,0xec,0x36,0x5c,0x9e,0xae,0x7f,0x27,0x2f,0x79,0xb1,0x2a,0x70,0x27,0x82,0xdf,0xf1,0x52,0x00,0xfe,0xce,0x04,0x47,0xda,0x8e,0x2c,0xa4,0x71,0x65,0x54,0xb3,0x81,0xbd,0x0f,0x9f,0x6b,0x5a,0x0e,0x91,0xb3,0x07,0x36,0x65 .byte 0x86,0x75,0x75,0xfb,0x96,0x10,0x8f,0xd7,0x96,0xf5,0x0d,0xa7,0x4d,0x41,0x0c,0x8f,0x28,0xbc,0xda,0xf9,0xe7,0x41,0xcd,0xfd,0xb9,0x2c,0x44,0x13,0xe4,0xde,0xa6,0xd4,0x5e,0x4c,0x17,0xfa,0x0e,0x11,0x45,0xf4,0xbb,0xad,0x58,0x0d,0xec,0x2f,0xf8,0x14,0xca,0x18,0x2d,0x04,0x38,0xdf,0x1c,0x47,0x63,0xa4,0x31,0xb9,0x18,0xf7,0x79,0xee .byte 0x15,0x4a,0xd1,0x6e,0x61,0xe7,0x05,0x5d,0x0e,0x99,0xa5,0x7d,0xfe,0x67,0x29,0x21,0x2b,0x07,0xaa,0xed,0xf0,0x54,0x37,0x79,0x5b,0xe7,0x38,0x21,0x0b,0x29,0x6e,0x34,0xe4,0xdb,0xe9,0xe3,0x6e,0xea,0x34,0x6a,0xbb,0x39,0x2a,0x5d,0x34,0x7b,0xee,0x5d,0x68,0x62,0x34,0x66,0xcf,0x3f,0x1c,0x61,0x94,0x7b,0x69,0x71,0x92,0x23,0x6e,0xc9 .byte 0xec,0x34,0xe4,0xb4,0xa3,0xc4,0x3c,0x62,0x4f,0x4c,0xc8,0x5e,0xb1,0x9c,0xcc,0x0d,0x6b,0x62,0x55,0x1b,0xdd,0xa9,0xa2,0x0a,0x69,0x79,0x1d,0x2d,0x4e,0xf1,0xb3,0xbb,0x50,0x9e,0x48,0xf2,0x71,0x1e,0x09,0x63,0x57,0x54,0xc6,0xa9,0x9f,0x1f,0xe8,0x21,0x96,0xd3,0x37,0x09,0xae,0x68,0xe9,0xd7,0x4f,0xf4,0x8c,0x49,0x13,0xb1,0x56,0x4a .byte 0x36,0x43,0x5e,0x19,0xf5,0x7a,0x2a,0xe9,0xcf,0x3e,0x01,0x44,0xb1,0xa4,0xb2,0x77,0xf5,0x53,0x00,0xe3,0x51,0x57,0x63,0x48,0xba,0xb6,0x0f,0xbd,0xec,0x2b,0xaa,0xf5,0x52,0xa1,0xd2,0x0e,0x37,0x06,0x9e,0x6e,0x06,0xb0,0x65,0x56,0x5b,0x97,0x4f,0x2b,0x87,0xd9,0x0c,0x98,0x7a,0x3c,0x1b,0xd7,0x04,0xd5,0x68,0x60,0x46,0x1b,0x0c,0x9d .byte 0x4d,0x41,0x9d,0xff,0x80,0xf3,0xb2,0x3b,0x2e,0xb0,0x1f,0x92,0x85,0x65,0xb1,0xcf,0x5c,0xa2,0xa5,0x0b,0x83,0xa1,0x1b,0xbd,0xd2,0x8e,0x8a,0x33,0x9d,0xb4,0x06,0x62,0x24,0x49,0x4e,0x00,0x8a,0xa4,0x9a,0x2c,0x84,0x3f,0xe4,0x03,0x3d,0xf2,0x30,0x90,0x1c,0x37,0x38,0xf8,0xd4,0x04,0xd2,0xdf,0x69,0xd0,0xb5,0xda,0xbc,0x41,0x38,0xe0 .byte 0xaf,0x32,0x87,0xe1,0x98,0x21,0xb7,0x1b,0x3b,0x2b,0x3e,0x92,0x74,0xe8,0x44,0xdb,0x5c,0x39,0x9a,0x5c,0x71,0x60,0x48,0x95,0x5c,0x47,0xa4,0xa8,0x12,0x3b,0xbf,0x75,0x22,0x0a,0xf1,0x73,0x42,0xbc,0x8a,0x54,0x19,0x04,0xad,0x7a,0xbc,0x9c,0x35,0x53,0x52,0x4b,0x13,0x94,0x5c,0xe7,0x10,0x12,0x49,0xa8,0xb3,0x85,0x02,0x09,0x25,0xcd .byte 0xd1,0xdc,0xb5,0xe0,0xab,0x93,0x8c,0xf1,0x78,0xac,0x6c,0xa8,0x72,0x12,0x16,0x80,0x4d,0x76,0xcb,0x04,0xba,0x50,0x3a,0xf5,0x8f,0x5f,0x82,0xa8,0x83,0x6f,0x16,0xd2,0x85,0x67,0xe2,0x81,0xc7,0x5d,0x82,0x2c,0xea,0x6a,0xd7,0xc4,0xaf,0x9b,0x22,0x21,0x05,0x29,0x92,0xd7,0xe6,0x60,0xc6,0xdc,0x4c,0x15,0xde,0x46,0x4a,0xda,0xe3,0x4a .byte 0x7d,0x9f,0x7d,0x45,0x51,0x81,0xa3,0x78,0xfc,0x34,0x91,0x93,0xae,0xa9,0xb0,0x34,0x56,0x12,0x8c,0xec,0xe7,0x75,0x14,0x43,0xa5,0x0d,0xe4,0x91,0x3c,0xbb,0x64,0xb8,0x3d,0xd3,0xf9,0x55,0x5f,0x1f,0x30,0x3e,0xf8,0x84,0x8f,0xa3,0x5c,0x91,0xaa,0xa4,0x1a,0x16,0xef,0xcf,0x45,0xd4,0xa0,0xf6,0x56,0x9d,0xd2,0x88,0x50,0x0e,0x40,0xa5 .byte 0xde,0xbe,0x80,0x83,0x71,0xfc,0xfe,0xc7,0xe5,0xf7,0xda,0x51,0x86,0xc3,0xde,0xeb,0x54,0x17,0x7e,0xf6,0x20,0xd4,0x80,0xed,0xc0,0xc4,0x67,0xb5,0x26,0x03,0x98,0x26,0xa2,0xd2,0x0c,0x0a,0xf3,0xb0,0x65,0xd7,0x7e,0x26,0xf0,0x74,0x75,0xff,0x9e,0xfd,0x6f,0x1b,0xd2,0x49,0x4b,0x79,0xf7,0xb2,0x5d,0x02,0xfa,0x17,0x51,0x5e,0xc7,0x5e .byte 0xf8,0x0e,0x99,0xc4,0x94,0x42,0x37,0x74,0x74,0xa6,0x04,0x4e,0xe1,0x1c,0x2a,0x79,0x1f,0x0a,0xba,0xd8,0x24,0xe2,0xed,0x65,0x33,0xdb,0xb6,0x2d,0x1d,0x30,0xec,0x18,0x7c,0x8f,0x82,0xf1,0xad,0x30,0x97,0xc5,0x9e,0xd8,0xa6,0x64,0x5f,0xcd,0xaa,0xd7,0xce,0xd0,0xd5,0x32,0xb6,0x4e,0xe0,0xe0,0xdd,0x03,0x04,0x63,0x76,0x83,0xda,0x4b .byte 0x63,0x28,0x73,0x63,0x02,0x76,0x02,0xde,0x96,0x6a,0xea,0x21,0x00,0x25,0x5a,0xc8,0x52,0x0a,0xcb,0x5e,0x76,0xe9,0xd8,0x61,0xd3,0xda,0xdd,0x36,0x9c,0xa1,0x8e,0xf2,0x8d,0xc8,0xa1,0xe9,0xa2,0x1d,0xd3,0x53,0xb5,0x43,0x39,0x59,0x7e,0x12,0xd5,0x51,0x3b,0x71,0x66,0x6e,0x0d,0x6a,0x68,0x56,0x47,0x9c,0x95,0x7f,0xeb,0xff,0xf3,0x3f .byte 0x88,0x13,0x36,0x43,0xff,0x56,0xc3,0x28,0xa8,0x10,0x70,0xd3,0x04,0x8a,0x45,0xb7,0xe4,0x71,0x79,0xa1,0x20,0x70,0xab,0x7c,0xc1,0x20,0xb7,0xaf,0x67,0x86,0x6f,0x1d,0x2e,0x84,0xca,0x68,0x97,0x42,0xa1,0x9b,0x1c,0x10,0xbd,0x76,0xed,0x54,0x46,0x50,0x13,0xa9,0x2d,0x43,0x43,0x82,0x84,0x2c,0xee,0x8f,0x42,0x2f,0x75,0xe1,0x37,0x46 .byte 0xaa,0x6d,0xc4,0x03,0xb6,0x6c,0xd2,0xe7,0x3a,0x45,0x5d,0xe8,0x2e,0x99,0x11,0x7d,0x61,0x8f,0x10,0x37,0x45,0x49,0x29,0xa7,0x28,0xca,0x78,0x53,0xab,0xed,0x70,0xfa,0xd9,0x1b,0xf4,0x08,0x96,0x77,0xd8,0xd9,0xdb,0x03,0xff,0x9e,0xe3,0xd1,0x03,0xc3,0xd5,0x54,0xac,0x11,0xfc,0xd0,0x7c,0x9a,0x11,0x1d,0xc9,0xbc,0x7f,0xfd,0x2d,0xb6 .byte 0x8e,0x2a,0xc7,0x35,0xde,0x5a,0x2c,0x4f,0xcd,0x29,0xb0,0x8b,0x06,0xd2,0xa7,0x20,0xc5,0x27,0xe8,0x2a,0x93,0x70,0x40,0x01,0xaa,0x9b,0x71,0x93,0x98,0xcb,0xc6,0xe1,0x2e,0x0e,0xc6,0x4c,0x4f,0xb5,0x7d,0x26,0x39,0x99,0x8d,0x9d,0x91,0x26,0xf2,0x6a,0xb9,0x8c,0x92,0x63,0x26,0x4b,0xd4,0x3b,0xf6,0xba,0x17,0x9c,0xc6,0x8c,0x60,0x52 .byte 0x16,0x5a,0xcd,0xc4,0xdb,0x5c,0x17,0xf6,0x7a,0x32,0x3e,0x13,0x88,0x5d,0x2c,0x26,0x13,0x08,0x5e,0x51,0x8d,0x20,0x88,0xbf,0x70,0x4a,0x9a,0x56,0xff,0xf6,0x25,0x59,0x58,0xaa,0x7e,0xa5,0xc7,0x2c,0x89,0x3e,0x30,0x93,0x3b,0x6c,0x02,0x6e,0xe3,0x84,0xe4,0x05,0xc6,0x69,0x84,0xcb,0xe0,0x67,0x77,0xf3,0x4d,0x8e,0xfa,0x02,0xae,0xa7 .byte 0x7c,0x75,0x5b,0xdf,0xdc,0x01,0xbe,0x70,0xfa,0x47,0x80,0x64,0x3b,0xd6,0x0c,0x6a,0x7f,0x8f,0xff,0x52,0x11,0x90,0x0b,0x40,0x78,0xf6,0xa5,0xa0,0x4e,0xcd,0xc2,0x0d,0x2f,0xb8,0x3c,0x3c,0xc3,0x15,0xf2,0xa3,0x5f,0xf3,0x40,0x96,0x6f,0x89,0x91,0x32,0xbe,0x0e,0x63,0x4f,0xea,0xa2,0xc0,0x5d,0x30,0xb9,0x6d,0x21,0xeb,0x34,0xe4,0x65 .byte 0x64,0xa4,0xd5,0x29,0x68,0xa6,0x17,0x00,0x82,0x5c,0x65,0xf0,0xeb,0x74,0xa1,0x9b,0xdd,0x1a,0xf4,0xd8,0x00,0x1b,0xb0,0x0d,0xc7,0xe4,0x23,0x62,0xf6,0x81,0x9f,0xd8,0x81,0x3f,0xd8,0x0b,0xca,0x2e,0xd4,0x3c,0x10,0x44,0x14,0x66,0x1e,0xbc,0x1c,0xc8,0x0e,0xd5,0x0c,0x22,0x18,0xd1,0xec,0xf8,0x87,0x55,0x89,0x53,0x2a,0xf0,0x66,0xca .byte 0x88,0x98,0x9c,0x1e,0xa8,0x56,0x2e,0x5e,0x24,0xd2,0xd8,0x8d,0x6e,0x0c,0x81,0x55,0xf0,0x8d,0xa5,0x8c,0x3a,0x27,0xbc,0x2e,0xab,0xdd,0x6e,0x55,0xce,0xd7,0x9a,0x6b,0x2b,0x03,0x18,0x6b,0xf7,0x78,0x79,0x6c,0x64,0xb1,0xaa,0xff,0xd4,0x34,0xac,0x61,0xfd,0x51,0x03,0x41,0xd8,0x4b,0xad,0xd7,0xd2,0xfc,0x17,0x91,0xd0,0x90,0x15,0xd3 .byte 0xcf,0x3f,0x55,0x3d,0x8c,0x70,0x7a,0xda,0x0c,0x04,0x0a,0x29,0x5c,0x08,0x56,0xa8,0x60,0xea,0xd1,0xe7,0xff,0x53,0xc7,0x27,0xe3,0x21,0xe9,0xdc,0xb7,0x6c,0xc1,0x6a,0x4c,0x62,0xb2,0x67,0x79,0x24,0x8f,0x7d,0x96,0xd6,0x4c,0xa7,0x54,0xbe,0x07,0x85,0x53,0x9f,0xc9,0xbd,0x99,0x98,0x13,0x2a,0x49,0xcc,0xe5,0x70,0x56,0x90,0xbe,0xd3 .byte 0xd5,0x17,0x44,0x2e,0x11,0x3e,0x96,0x0b,0xc1,0x66,0x0d,0x36,0x2d,0x28,0x68,0xbd,0x8c,0x46,0x71,0x39,0x8f,0xd5,0xe3,0xd1,0x74,0xde,0x85,0x26,0x3c,0x8e,0xde,0x79,0xbe,0xf4,0x20,0xfc,0x3c,0x8b,0x73,0x0d,0x82,0xc0,0xa8,0x48,0x9f,0x4e,0x9f,0xb8,0xcd,0xc2,0x70,0xa7,0x54,0xe5,0x22,0x86,0x3a,0xf1,0xf0,0xbc,0x8b,0x74,0xea,0x9e .byte 0x45,0xbd,0xa5,0x54,0xc5,0x75,0x30,0xfa,0x5e,0x05,0x4b,0xc2,0xe3,0x09,0x4b,0x3d,0xfb,0x84,0x0c,0x96,0x36,0x2b,0xbf,0xcc,0xe2,0x15,0x39,0x6f,0xc8,0x91,0x56,0x0b,0xf8,0x4b,0x1b,0x61,0xa4,0x68,0xc0,0x06,0xaa,0xa9,0xef,0xea,0x69,0xdb,0xda,0x6a,0x50,0xa9,0x5a,0xb4,0x9b,0xf5,0xf0,0xbe,0x2f,0x34,0x20,0x96,0x84,0x70,0x0d,0xfe .byte 0x00,0x16,0x77,0x45,0x5b,0xf4,0x29,0xf1,0x41,0xb5,0x71,0x3e,0x91,0x5d,0x96,0x21,0xb4,0xb2,0x61,0x23,0x96,0xcd,0x28,0xaf,0x23,0xf0,0x45,0xc7,0xaf,0xd3,0x9e,0xb4,0x29,0xd7,0x68,0x5b,0x01,0xaa,0x5f,0x06,0x78,0x61,0xc4,0x61,0x49,0x01,0x0a,0xcc,0x2d,0xe1,0x03,0x27,0x07,0x11,0x9b,0x46,0x7b,0x8f,0xe0,0xfd,0xd6,0x72,0x14,0x1e .byte 0x0f,0xd0,0xbc,0x5d,0xd7,0xb5,0x86,0x86,0xd3,0x02,0xcc,0xd4,0x2a,0xaa,0x47,0x01,0x82,0x97,0x07,0x9b,0x11,0xb3,0xba,0x8d,0x40,0x6d,0x0b,0x71,0xe1,0xa0,0xd2,0x27,0x4c,0x04,0x4f,0x33,0x4b,0xe3,0xc4,0xb6,0x60,0x8d,0x0c,0x9b,0xbc,0xfb,0x21,0x8c,0x7a,0x59,0xf1,0xf5,0xfc,0x84,0x4c,0x98,0x97,0x36,0x6d,0x38,0x1c,0x2a,0x39,0x9d .byte 0x0c,0x0c,0x4d,0xf1,0xba,0x24,0x3f,0x05,0x3b,0x9e,0x39,0xc4,0xd2,0xec,0xbe,0x31,0x6a,0x6b,0xc6,0xff,0xe8,0x75,0x1a,0xad,0x2f,0xbd,0xa5,0xf6,0x4b,0xbd,0xb9,0x26,0x89,0xb0,0x99,0x47,0xb9,0x10,0xcf,0x20,0x4a,0xfb,0xa4,0xeb,0x9d,0xbe,0x90,0x15,0xed,0xba,0x43,0xf3,0xcc,0x2e,0x68,0x09,0x39,0xb3,0x53,0xc6,0xac,0xe5,0x5c,0x97 .byte 0x75,0x95,0x4d,0x49,0x84,0x2c,0x00,0xfc,0x1d,0x58,0x61,0x88,0x3c,0x0c,0x84,0x5d,0x60,0x6d,0x86,0x6c,0x2c,0x49,0xcc,0x6a,0xee,0xc3,0xb3,0x23,0x85,0xba,0x55,0x56,0x95,0x43,0x7b,0x74,0x22,0x9f,0x7c,0x91,0x2b,0xf6,0xeb,0x4c,0xc6,0x47,0x69,0x4a,0x41,0x80,0xee,0x81,0x8f,0xe8,0xd5,0x80,0x6c,0x0b,0x1b,0x0c,0x22,0x60,0x60,0x05 .byte 0x0a,0x9f,0x53,0x6f,0xca,0xcf,0x82,0xf7,0xd4,0x3d,0x44,0x66,0x7a,0x99,0x34,0xf1,0xf2,0xec,0xfe,0x08,0x2d,0x24,0x5f,0x32,0x45,0xb9,0x43,0x97,0x58,0xf4,0x8d,0x15,0xaf,0x27,0x19,0xc4,0xdb,0x73,0xfe,0xee,0x87,0x02,0xb3,0xeb,0xb2,0x9f,0x8d,0x1b,0x13,0xaa,0x19,0xbf,0x76,0x8b,0x3f,0xce,0xea,0x84,0xe9,0xc0,0x59,0x02,0x03,0xc0 .byte 0x88,0x54,0xa2,0x3e,0x90,0x45,0xcb,0x13,0xc3,0x8f,0x57,0xd7,0x29,0xd0,0xee,0x5e,0xe6,0xe2,0x76,0xf3,0xb3,0xd0,0x6c,0x98,0x80,0x8e,0x39,0xfb,0xd8,0x2b,0x6c,0x1a,0xab,0xba,0xb1,0x32,0x2a,0x9b,0xdd,0x30,0x6c,0xd9,0xb6,0xb7,0x75,0x90,0x05,0x7b,0x93,0xec,0x62,0x2b,0x90,0xd1,0xf4,0xc6,0x35,0x92,0x07,0x5b,0x45,0x9b,0x79,0x74 .byte 0x64,0xb0,0x25,0x1f,0xd1,0x38,0x76,0x39,0xa0,0x59,0x9d,0x22,0x97,0x73,0x24,0x86,0x55,0xbf,0xbc,0x4c,0x15,0xb3,0xb7,0x77,0x14,0x03,0x15,0x60,0xea,0xaf,0x72,0x84,0xbf,0x38,0x3c,0x6d,0xe0,0xa9,0xc7,0x3e,0xef,0xf4,0x44,0x43,0x5e,0xda,0x2a,0x1d,0x3d,0xc9,0x1d,0xf0,0xb6,0xb0,0x6b,0x11,0x50,0xa6,0x2d,0xed,0x75,0xd3,0x50,0xd5 .byte 0x7a,0xe5,0x96,0xf4,0x65,0x55,0x5a,0x89,0x69,0xf8,0xb8,0xa5,0x6f,0x68,0x7f,0xdf,0x1e,0x25,0xc7,0xe3,0xbe,0x50,0x5e,0x45,0x78,0x58,0xff,0xf5,0x45,0x6e,0xa5,0x10,0xfc,0xdc,0x0f,0x84,0x92,0x00,0xc2,0x01,0x50,0x66,0xfd,0x5c,0xfc,0x87,0xf9,0x80,0xfa,0x01,0xc1,0xc5,0x2e,0x5e,0xaf,0xbe,0xce,0xf2,0x11,0x7c,0xf2,0x67,0x10,0xf3 .byte 0xcc,0x16,0x0c,0xd8,0xe0,0xdf,0x68,0x37,0xef,0x50,0xba,0x16,0x72,0x79,0x9f,0xa7,0xb5,0x82,0x7f,0x6b,0x36,0x47,0x56,0x9d,0xbd,0xb6,0xc9,0xcf,0x79,0x11,0x0a,0x27,0xaa,0x3a,0x1c,0x58,0xc7,0x69,0x23,0xf1,0xcc,0xeb,0xea,0x15,0x7b,0xb5,0x75,0x32,0xb8,0x7f,0x65,0x74,0xca,0x1e,0x92,0x29,0x5a,0x24,0x4f,0xdd,0x8d,0x69,0x89,0xa6 .byte 0x83,0x75,0xa3,0x92,0x5c,0xba,0xa3,0x19,0xde,0x2c,0x8f,0xbd,0x97,0x80,0x2f,0xd7,0x57,0xde,0x95,0x0f,0x21,0x72,0xf8,0xe7,0xcf,0xc8,0xbc,0x3c,0x9d,0x8e,0xfb,0x34,0x41,0xee,0xe9,0x34,0x5b,0x25,0x48,0x3e,0x1b,0x64,0xd0,0x1a,0x6c,0x13,0xe3,0x69,0x49,0x51,0x97,0x81,0x62,0xef,0xa1,0xd9,0xef,0x7b,0xd6,0xc2,0x63,0x25,0x6c,0x50 .byte 0x8e,0xd0,0xfe,0x07,0xe6,0xc3,0xbc,0x47,0x6b,0x3d,0x20,0x3a,0x83,0x40,0x90,0x53,0xfb,0xa5,0x9a,0x36,0x1d,0x5d,0xbf,0xf7,0x60,0x27,0xef,0x59,0xd4,0x3c,0xbf,0xb0,0x22,0x15,0xea,0x9e,0xa4,0x59,0x9d,0x74,0x52,0x21,0xe0,0x37,0xda,0x2d,0x66,0xa3,0x9d,0x8e,0x9d,0x45,0xb3,0x2f,0x0a,0x60,0x0b,0xfa,0x09,0x8f,0x3f,0x33,0xc9,0xe3 .byte 0x54,0xfd,0xa2,0x7f,0x58,0xf9,0xcd,0xbf,0xa2,0xd6,0xe0,0x37,0x62,0x5d,0x0c,0xb5,0xf2,0x0a,0x2a,0xa3,0x29,0x96,0xb5,0x96,0x6b,0xba,0x53,0x3d,0xd4,0x11,0xe9,0x43,0x6b,0x44,0x43,0x9f,0xea,0x52,0x92,0xa4,0x13,0x91,0xc1,0x77,0xc3,0x31,0x25,0xe2,0xb5,0x53,0x82,0x7e,0x35,0x58,0x36,0x03,0x61,0x69,0xba,0x27,0x2b,0x65,0x42,0x40 .byte 0x4e,0xd7,0xc2,0x90,0xad,0x52,0x0b,0x66,0x07,0xb1,0x5f,0x07,0x4a,0x67,0x4a,0x61,0x90,0xbd,0x50,0x39,0xf8,0x11,0x59,0xc3,0x41,0xfb,0x1a,0x7f,0xcb,0xf7,0x99,0xc2,0x27,0x33,0x28,0x37,0xa1,0xff,0x1b,0x23,0x46,0x96,0xc1,0x4e,0x03,0x41,0x77,0x27,0xa7,0x68,0x60,0xaf,0xb8,0x7a,0x80,0xb9,0xc2,0xa6,0x9e,0x61,0xa5,0x90,0xa1,0x6a .byte 0xe3,0xb1,0xd1,0x28,0x9f,0x9f,0xf7,0xf7,0xc9,0xff,0x02,0x82,0xdc,0x81,0x96,0x3a,0x61,0xf4,0x37,0x91,0xc2,0x58,0x48,0x54,0xaf,0xd6,0x0c,0x2d,0x2e,0xbd,0xe9,0x13,0x07,0xf7,0xc5,0x71,0xe9,0xa9,0x9d,0x93,0xa4,0x61,0x29,0x10,0x29,0xfb,0x79,0x9e,0x2c,0x1a,0x3e,0xae,0x7d,0x0e,0xcf,0x52,0xaa,0xdc,0xf2,0xeb,0x5c,0xcc,0x9e,0x42 .byte 0xcf,0x2f,0xf1,0xe8,0x91,0x6a,0x07,0x15,0xb8,0x78,0x6e,0x42,0xd5,0x5f,0x3e,0x53,0x70,0xd6,0x93,0xd4,0xc0,0x43,0x25,0x49,0x54,0xb0,0x13,0xa1,0xc1,0x68,0xdb,0xa6,0xdc,0xf4,0xa6,0x7c,0x8a,0x1c,0xc8,0xaf,0x34,0xc5,0x9f,0x30,0x7a,0xe9,0x4c,0xc9,0x27,0x41,0x7c,0xa5,0xd3,0x7f,0xee,0x17,0x9a,0x3b,0x82,0x15,0xef,0x85,0x3d,0x2b .byte 0xba,0xc7,0xb8,0x8c,0x13,0xf6,0x0d,0x53,0x33,0x04,0x0a,0x6b,0x8c,0xe5,0xf3,0xc5,0x5f,0xf6,0x7b,0xdb,0x6d,0xa4,0x63,0xef,0xe3,0xcd,0x32,0xb2,0x11,0xab,0x0a,0x01,0x9b,0xc7,0x95,0x51,0x3d,0x34,0x25,0x51,0x2a,0x63,0x73,0x99,0xa7,0x62,0x6d,0x71,0x23,0x83,0xd5,0x25,0x02,0x96,0x26,0xbb,0x25,0x35,0xb9,0x20,0xb3,0x25,0x84,0x07 .byte 0x39,0x9c,0x45,0x67,0xfb,0x89,0x61,0x38,0xb5,0xdf,0x0a,0x9d,0x9f,0xad,0x2f,0x80,0xe2,0x9c,0x6b,0x88,0x84,0xf3,0xea,0xbd,0x75,0x00,0x71,0x21,0x41,0xfe,0xdc,0x2c,0x7b,0xb1,0x3c,0x40,0x99,0xc3,0xf9,0x2b,0xab,0x40,0xf9,0x2e,0x3a,0x65,0x58,0xe5,0x42,0x30,0x5c,0x05,0xf4,0x89,0x2b,0x72,0x54,0x7c,0xce,0x1a,0xa7,0xd4,0xf0,0xc2 .byte 0x05,0x63,0x1a,0x67,0x31,0xb3,0x55,0xdc,0x9f,0x07,0x99,0xa3,0xed,0x84,0x53,0x94,0x7c,0x5f,0x63,0x1d,0xdb,0x51,0xfa,0x92,0xc4,0x5d,0xb7,0x96,0xef,0x26,0x2a,0x09,0x8b,0x5a,0xa5,0xca,0x63,0x41,0x33,0x9e,0xd1,0x00,0x5e,0xaf,0x71,0xfe,0x3a,0x97,0xa4,0xaf,0xe8,0xae,0xce,0xfa,0x82,0x90,0x39,0x00,0x6f,0xd6,0xc4,0x54,0x84,0xf9 .byte 0x0f,0x96,0xfc,0xe8,0x6e,0xce,0xc4,0x55,0xdf,0xcd,0xd3,0xfa,0x65,0xcd,0xc4,0x42,0xe3,0x9f,0xab,0xbd,0xcf,0xc7,0xd3,0xe2,0xa8,0xc4,0xc5,0x06,0xc2,0xf5,0xe7,0x86,0xa4,0xd0,0x7e,0xf6,0x1c,0xd0,0x3c,0x4d,0x15,0x30,0x50,0x43,0x02,0xce,0xd2,0xf1,0xc4,0x28,0xe6,0x54,0xfc,0x21,0x6a,0xd5,0xdd,0xc3,0x39,0xf8,0x57,0x79,0x36,0xec .byte 0x11,0x24,0x30,0xa6,0xcb,0xa7,0xa4,0x18,0x2e,0x71,0xe5,0x2e,0x31,0xf0,0x0b,0xd1,0xa4,0x77,0x4d,0xbf,0x9f,0x8d,0xb6,0x53,0x49,0x62,0xb0,0xba,0x29,0xde,0xb9,0xc6,0xdd,0x62,0x09,0x0e,0x1e,0xe2,0x78,0xd1,0x3e,0xef,0x9d,0x5d,0x91,0xf1,0x1a,0xd9,0xb8,0x81,0x4b,0x3c,0xfd,0xe9,0x54,0x4a,0x80,0xc9,0x7c,0x37,0xde,0xca,0x92,0xe2 .byte 0x0c,0x66,0xa5,0xfc,0xf1,0xe4,0x9c,0xb3,0xdb,0x15,0x11,0xb4,0xc2,0x21,0x5a,0x4e,0xb1,0x54,0xd1,0x0d,0x78,0x9c,0xaa,0xc2,0x8d,0x10,0xf7,0x24,0x3a,0xb7,0xef,0x2b,0x5b,0x1e,0xa6,0x13,0xcd,0xa9,0x06,0x48,0x98,0x80,0x61,0x67,0xca,0xef,0x76,0x10,0x83,0xe8,0x98,0x43,0xe2,0xa6,0x00,0x5a,0x3c,0xde,0x19,0x6a,0x71,0x21,0x16,0x8d .byte 0x76,0xe7,0xa1,0x82,0x8b,0xb9,0x21,0x93,0x97,0xbd,0xe2,0xac,0xb9,0xa3,0x57,0x97,0x2a,0xcb,0x27,0xcc,0xcb,0x74,0x87,0xa2,0xa1,0x37,0x63,0xda,0xec,0x64,0x9c,0x56,0x62,0x8f,0xc9,0x5f,0xd3,0x26,0x4b,0xae,0x90,0xc1,0x1a,0xda,0x3c,0x59,0xf1,0xc0,0x47,0xf1,0xa3,0xba,0xd0,0xd5,0x30,0x97,0x3f,0xfc,0x2c,0x88,0x14,0x05,0x34,0x56 .byte 0x8c,0x61,0x21,0xce,0x71,0xb5,0x60,0x62,0x1d,0x68,0x63,0x07,0x3a,0xee,0xf4,0x19,0x6c,0x59,0xdc,0xb8,0x0e,0x67,0xc0,0x74,0x58,0x13,0xe0,0x18,0xb1,0xf0,0x54,0x5c,0x83,0xdf,0xff,0x65,0x6c,0xa6,0xf7,0xff,0xc1,0x50,0x47,0x87,0xf0,0xea,0xa5,0x76,0x19,0x70,0x91,0xaa,0xc0,0x87,0x0f,0x31,0xbb,0xd6,0x7b,0x52,0xb2,0xd6,0x49,0xc1 .byte 0x41,0xdd,0xec,0x9a,0x41,0x22,0xf6,0xc5,0x80,0x80,0xbb,0x2f,0xb9,0x45,0xbd,0x6e,0xef,0x14,0x48,0x96,0xfa,0x9c,0x87,0xb2,0x0b,0x68,0xbf,0xcb,0xe3,0xe3,0x97,0x13,0xf9,0x43,0x66,0x65,0xad,0x18,0x60,0x96,0xc5,0x70,0x91,0x29,0x0d,0x91,0x8c,0xcb,0xcb,0x03,0x6c,0xd2,0xfa,0xf6,0x96,0x19,0x18,0x20,0x15,0x8e,0x77,0x9b,0x74,0xa5 .byte 0x3d,0x6e,0x76,0xc6,0x3c,0x8f,0x6f,0x72,0xe2,0x8b,0xcd,0xa6,0x17,0x26,0x00,0x36,0xac,0x91,0x19,0x1e,0x5c,0x17,0x55,0x6f,0xde,0x0c,0x31,0xe4,0xec,0xd1,0x90,0x1d,0xea,0xea,0x77,0x2f,0x8a,0xee,0x44,0xea,0x39,0xeb,0x00,0x1d,0xde,0xa6,0x37,0x40,0x3d,0x97,0xd2,0x88,0x0e,0xbc,0xbd,0x2c,0xef,0xda,0x3c,0x2e,0x8e,0x0d,0xf3,0xfc .byte 0x88,0xcb,0x34,0x89,0x3f,0x86,0xec,0xfe,0xf0,0xcd,0x0b,0x80,0xd4,0x02,0xdb,0xd6,0x06,0xf3,0xbe,0x52,0x9a,0xf0,0x1b,0xe7,0x36,0x7d,0xcc,0x84,0xf5,0x02,0x11,0xf6,0xdf,0xb6,0x67,0x3f,0x8a,0xdd,0x5a,0x32,0x12,0xf0,0x3e,0x72,0x55,0xf6,0xac,0xae,0xe4,0x4b,0xbd,0xc5,0x90,0xba,0xfe,0xc0,0x39,0x17,0x24,0xad,0x8b,0xb3,0x93,0x4e .byte 0x15,0xcc,0xd7,0xcc,0x5c,0x46,0x0e,0x61,0x7a,0x70,0x7f,0x01,0x23,0x7d,0x38,0xbc,0x27,0xb1,0x47,0x25,0x5b,0x9f,0x9c,0x53,0x95,0x40,0x94,0x33,0x16,0xfa,0x31,0xf1,0xb4,0xa3,0xb8,0x50,0x68,0x0d,0x47,0x1d,0x55,0xb3,0x26,0xfd,0xdc,0x4c,0xa8,0xc0,0x02,0xc1,0x53,0x56,0xd9,0x09,0xd8,0xdb,0xfa,0x4f,0xeb,0x33,0x00,0x57,0x28,0x34 .byte 0xf1,0x43,0x5b,0x1d,0xd0,0x13,0xa1,0x90,0x87,0x96,0x97,0xb9,0x28,0xe1,0xa2,0xc0,0xcf,0xae,0xe0,0x7e,0x53,0x3d,0xe3,0xfe,0x35,0x33,0xa9,0x54,0x36,0xb3,0xfb,0x03,0xfc,0x76,0x23,0xf3,0xce,0x58,0x90,0x8a,0x90,0xa5,0x7c,0x99,0x06,0xfc,0x65,0x67,0x13,0xde,0x0c,0x6a,0x38,0x7a,0x9a,0xc1,0xc3,0x3a,0x66,0x99,0x4c,0xed,0x0a,0x15 .byte 0xb1,0xf0,0x9e,0xd0,0x06,0x0e,0xce,0x84,0xe1,0xd7,0xa8,0xe3,0x12,0xb4,0x1a,0xb3,0x5d,0x86,0xda,0xcb,0xd7,0xd2,0x6c,0x1c,0xfa,0x2d,0x4e,0xc3,0x8d,0xe0,0x9d,0x8b,0xa3,0x9d,0xd7,0xf1,0xc5,0x29,0xa5,0x69,0x59,0xea,0x9d,0x85,0x78,0x05,0x14,0x31,0xed,0x91,0x8b,0x80,0xb6,0xd3,0xf5,0x9f,0x5f,0xa1,0x7b,0xe7,0x83,0x81,0xfa,0xa5 .byte 0x4c,0x4d,0x2a,0xae,0xf0,0x09,0x87,0x4e,0x69,0x4f,0x12,0xf7,0xbf,0x0f,0xaf,0x1f,0x9d,0xdb,0x98,0xbf,0xed,0xfe,0xea,0x0a,0xe2,0x8c,0x7d,0x20,0x04,0x85,0x12,0x15,0xf2,0x05,0x93,0x88,0xa7,0x85,0x49,0xbe,0xdf,0x33,0x96,0xc0,0x4a,0x7a,0xfc,0x89,0x01,0xdb,0x09,0xdb,0xef,0xf3,0x43,0x48,0x5b,0x2f,0x41,0x6f,0x10,0x77,0x2f,0x5b .byte 0xaa,0xaa,0x9c,0x51,0x69,0xf8,0x9b,0x6d,0x82,0xaa,0xaa,0x00,0x5d,0xfa,0xdf,0x74,0x35,0xcd,0xd1,0xf7,0xbe,0xcd,0x39,0xbf,0x94,0x5b,0x9a,0x22,0xd4,0x08,0x57,0x17,0xfa,0x89,0x40,0x44,0x9c,0x36,0x8d,0x0d,0xe5,0x1c,0x9c,0xc1,0xca,0x47,0x86,0xc2,0x3c,0xc3,0x93,0x75,0xcd,0x4c,0x3c,0xf5,0xb9,0xbe,0x2d,0x78,0x2c,0x08,0xaa,0xbf .byte 0x4d,0x4c,0xac,0x64,0x89,0xfe,0xf3,0x41,0x4a,0xc3,0xec,0x3e,0x5f,0x1e,0x78,0x20,0x4e,0x49,0x9d,0xe5,0xa0,0x18,0xb6,0x00,0x0e,0x51,0x17,0x6e,0x56,0xc3,0x75,0xca,0x77,0x61,0xea,0x6e,0x52,0xa8,0x2c,0xdc,0xdd,0x8d,0x5f,0x2b,0xd5,0x30,0x0d,0x08,0x41,0x5c,0x8d,0x97,0xc9,0xee,0x7b,0xa2,0x10,0x5f,0x3c,0x57,0x68,0xa2,0x2c,0xc8 .byte 0x3e,0xde,0x4b,0x10,0x68,0xaf,0x7d,0xd1,0xdc,0x30,0x33,0xf7,0xff,0x7a,0x23,0x66,0x86,0x56,0x24,0xc1,0x45,0xff,0x92,0x28,0xe4,0xd8,0xb0,0x18,0x63,0x1a,0x16,0xc2,0x59,0x32,0x7b,0x52,0x89,0xa5,0xac,0x71,0x61,0x28,0xc1,0xef,0xcb,0xcc,0x65,0xc3,0x4e,0x62,0xf0,0xed,0xef,0xdf,0x40,0x2b,0x69,0x62,0xe2,0xc4,0x31,0x4f,0x73,0xa8 .byte 0xff,0x17,0x87,0xd2,0x45,0xc2,0x18,0x13,0xbe,0x7f,0x64,0x3e,0x6d,0x61,0xf2,0x18,0x16,0x5a,0x02,0x98,0xf1,0x47,0x5c,0xd4,0x76,0xcf,0x5b,0x29,0x0e,0x9d,0xf9,0x82,0x5b,0x46,0xf9,0x76,0x53,0xcd,0xa0,0xa4,0xf3,0xd8,0x33,0xb2,0xcb,0x3d,0x51,0xf2,0xce,0x07,0xea,0x7d,0x8b,0x65,0xba,0xe0,0xee,0x28,0x37,0x1a,0x31,0xbe,0x70,0x4a .byte 0x69,0xac,0x35,0x32,0x4d,0xfa,0xb2,0x72,0x0d,0xde,0x26,0x1c,0x44,0xc0,0x20,0x54,0x73,0xce,0xa2,0x9d,0x9a,0xe2,0x13,0x8f,0xcd,0x5e,0x45,0x2c,0x32,0x2d,0x47,0x1d,0x4b,0x0f,0x78,0xa9,0xa2,0xe3,0xbb,0xcc,0x75,0x6f,0xbe,0xf6,0x76,0xfd,0xa2,0x58,0x44,0x31,0xe4,0xb3,0x9a,0xc4,0x82,0xeb,0x9a,0x73,0x0d,0x21,0x5d,0x0b,0x01,0xf1 .byte 0xfc,0xc7,0x4e,0xfc,0x26,0xb8,0x2d,0x04,0x59,0x1a,0xc4,0x42,0x4a,0x7c,0x67,0xc4,0xe5,0x26,0x81,0x81,0xd6,0x28,0x3b,0x43,0xac,0xbb,0x5f,0x31,0x4d,0x14,0x68,0xb8,0x2c,0x3a,0xb3,0xe4,0x72,0x7d,0x07,0x80,0x22,0x80,0xaf,0x42,0xb4,0x0f,0x2b,0x79,0x7e,0xac,0x16,0xed,0x66,0x93,0x9c,0x90,0xe0,0xc1,0x33,0x51,0xd5,0x4a,0x16,0x4d .byte 0x5f,0x55,0x7b,0x19,0x21,0x8e,0xe2,0x51,0x3d,0x94,0xf7,0x49,0x65,0x03,0x85,0xed,0x7c,0x3f,0xa9,0x28,0x96,0x20,0x95,0x44,0x62,0x8c,0xc8,0x88,0x59,0x40,0xf2,0x3e,0x05,0xa2,0x4d,0x7e,0xe5,0x9d,0xb8,0x01,0x9f,0x07,0x83,0x93,0x6d,0x0b,0x84,0xeb,0xe1,0x01,0xc0,0xc0,0xd1,0xb4,0x24,0xe4,0x43,0xdb,0x3f,0x2c,0x4b,0xe3,0x61,0x11 .byte 0xb5,0x7a,0x6a,0xf0,0xe7,0xc6,0x96,0x78,0x51,0x4b,0x21,0xec,0xb5,0x20,0xec,0xc4,0x18,0x79,0x84,0x14,0x07,0x33,0x82,0x31,0x9f,0x9e,0xb3,0xe0,0x8f,0x7b,0x84,0x2d,0xef,0xb5,0x73,0x17,0xaa,0x81,0x07,0xd2,0x21,0xd6,0x85,0x7b,0x07,0x61,0x57,0xd3,0x27,0x6c,0x5b,0x8a,0x72,0x65,0xfe,0xbb,0x10,0x1a,0xd9,0xce,0xf0,0xf8,0x70,0x55 .byte 0xe7,0xf5,0xd7,0xf7,0x4c,0xe1,0x5f,0xab,0x58,0xfd,0x8b,0x5f,0xe4,0x84,0x20,0xd9,0x6b,0x35,0x65,0xb2,0x9f,0x38,0xe7,0x6d,0xa5,0x69,0x64,0x64,0x6a,0x6e,0xf9,0x6c,0x42,0x0b,0x1f,0xbd,0xe3,0x0c,0xb4,0x62,0xf6,0x68,0x72,0x4b,0x58,0x24,0xd4,0x9d,0x91,0x66,0x9e,0x73,0x2b,0x69,0xe5,0xee,0xf5,0xb6,0x57,0x4c,0x24,0xef,0xc2,0xe5 .byte 0x33,0xb1,0x96,0xb4,0xf9,0x53,0x25,0xb3,0x1c,0xe8,0x59,0x17,0xe4,0x85,0x24,0xd1,0x9e,0x13,0x35,0x47,0x8e,0x01,0x06,0x42,0x4f,0x8f,0xd0,0x2f,0x0d,0x5a,0x8b,0x96,0xd0,0xbd,0x8e,0x67,0xce,0x47,0x40,0x49,0x17,0x7c,0xe4,0x89,0xca,0x63,0x4e,0xef,0x99,0xf9,0xbc,0x20,0xf1,0xf0,0xca,0xe4,0xe2,0xb1,0x0c,0xfe,0x68,0xc1,0xe8,0xae .byte 0x27,0x11,0x59,0x1b,0xd4,0x3e,0xb9,0xbe,0x6c,0x25,0x59,0x36,0xc1,0xf6,0x27,0x21,0x47,0x32,0xe8,0x05,0xec,0xc4,0x07,0x22,0xbd,0xcb,0x12,0x72,0x9f,0x1c,0xdd,0xc9,0xbe,0x2f,0xb4,0x84,0x2c,0xf3,0xfb,0x91,0xe4,0xe8,0x5b,0x96,0xe1,0xa1,0x7a,0xa6,0x6d,0xfe,0x94,0xd3,0x2a,0x94,0x86,0x7f,0xfc,0xa2,0x48,0xb3,0xc7,0x60,0xb2,0x97 .byte 0x27,0x4d,0xe3,0xd2,0x2b,0x8e,0x44,0x96,0x57,0x11,0x8a,0x78,0xba,0x12,0x91,0x9d,0x3d,0x1e,0x87,0xcb,0xdc,0x79,0xef,0x9a,0x37,0xd8,0x62,0x52,0xd2,0x0b,0xb7,0x3e,0xf0,0x8c,0xac,0xd1,0xfb,0x9c,0x3a,0x63,0x4b,0x0f,0x92,0xf0,0x1e,0x56,0x33,0xb1,0xfb,0xc3,0x2b,0x51,0xbd,0x30,0x4c,0xc0,0x65,0x21,0xeb,0x98,0x71,0x64,0xa3,0x6b .byte 0x31,0xe2,0xd9,0x52,0x53,0xc9,0x4c,0xc9,0x93,0x00,0xd0,0x26,0x57,0x3e,0x72,0x4a,0xb2,0x43,0x33,0x9d,0xb6,0xbc,0x68,0x9f,0x28,0xd7,0x00,0x77,0xcc,0x1c,0x0c,0xf1,0x91,0x91,0x77,0x63,0x1e,0xcf,0x8f,0x89,0x89,0xf5,0xe0,0x71,0xa3,0x59,0x49,0x79,0xad,0x7a,0x3d,0x1f,0xcc,0xc0,0x74,0x11,0x56,0x56,0x8d,0x04,0x1c,0xef,0xba,0xec .byte 0x05,0x85,0x82,0x0c,0x67,0xae,0xa3,0x40,0x4e,0x79,0x65,0xcf,0x72,0xd4,0x79,0xcc,0x96,0x0f,0x89,0xea,0x9a,0xbf,0x52,0x25,0x76,0x08,0x6e,0xdc,0x51,0x92,0xb3,0x6d,0x75,0x01,0x7b,0x13,0xa2,0x62,0xff,0x56,0x1d,0xbb,0xf1,0x8e,0x37,0x35,0x23,0x08,0xb3,0x05,0xd4,0xcc,0x74,0x35,0x63,0xae,0x67,0x51,0x10,0xc2,0xb6,0xf6,0x7f,0xc5 .byte 0x92,0x1a,0x11,0xb0,0x73,0x28,0x08,0xf0,0xee,0x32,0xab,0x3d,0x67,0xd5,0x96,0xc1,0x3a,0x55,0x3a,0x7a,0x59,0xf3,0x42,0x5e,0x8c,0xc6,0x8f,0x17,0xf6,0x30,0xdf,0x8f,0x06,0x6a,0xe3,0x92,0x02,0x20,0x69,0xc3,0x45,0x4b,0x04,0x7c,0x5f,0x5b,0x42,0x30,0x33,0xd5,0x11,0x66,0x57,0x76,0x24,0x7f,0xa7,0xa9,0x79,0x24,0x17,0x84,0x43,0xfd .byte 0xbc,0x44,0xee,0xfc,0xe9,0xeb,0xeb,0x61,0x6b,0xdc,0x32,0x9b,0x6f,0xf0,0x5b,0x9e,0x00,0x02,0x18,0x9c,0xb8,0xe2,0x2e,0x23,0x6a,0xf8,0x28,0x99,0x6d,0x03,0x87,0x4a,0x71,0xdb,0x00,0x13,0x38,0x86,0x2d,0x77,0xb6,0xd5,0xaf,0xf2,0x62,0x3b,0xe6,0xfc,0x75,0x77,0x39,0xee,0xbc,0x1c,0xc7,0xcd,0x9f,0xbf,0xa1,0xb2,0x86,0x0c,0xcc,0x4d .byte 0x47,0xbd,0xcd,0x3d,0x65,0xe4,0xd9,0x6e,0x2f,0xeb,0x1b,0x4f,0x49,0x05,0xd9,0x85,0x25,0xa1,0xdd,0xdd,0xc5,0x80,0x91,0x39,0x46,0x47,0x93,0x2a,0x31,0x56,0xe3,0xbf,0x7f,0x71,0x5b,0xc9,0x64,0x25,0x36,0x06,0xc8,0xf9,0xd6,0xad,0x5d,0x6f,0xe3,0x6d,0xbf,0xd5,0x68,0xb6,0x36,0x9a,0xae,0xa4,0x6c,0x65,0xc8,0x10,0xc0,0x04,0x88,0x4a .byte 0xf1,0x9c,0x45,0x63,0xfb,0xc1,0xc6,0x7f,0x63,0x1d,0xe9,0xe4,0xa9,0x2e,0xd9,0x5b,0xab,0x89,0x31,0x70,0xa7,0xe2,0x08,0x23,0xcf,0x43,0x25,0x28,0x89,0x9b,0xb8,0x2a,0xe8,0xc9,0x02,0x9d,0x2b,0xf0,0x1e,0xe6,0x50,0xf7,0xb6,0x1e,0xe1,0xf1,0x65,0x22,0x86,0xa8,0x91,0xfd,0xc5,0x8b,0x0f,0xa0,0xd5,0x89,0xa4,0x9b,0xd1,0xb0,0x27,0x37 .byte 0x46,0x77,0x00,0x64,0xfd,0x93,0x8c,0x44,0x84,0x3d,0xb3,0xc4,0xd1,0x68,0x2a,0x00,0x2c,0xc2,0x35,0xc7,0x31,0x96,0x73,0xef,0x05,0x8c,0x47,0x94,0x09,0x83,0xbc,0xc0,0x9f,0x5b,0x70,0x1d,0xe0,0xed,0x9d,0x1a,0x07,0xb2,0xa3,0x20,0xfd,0xa1,0x6b,0xa7,0xee,0xb2,0xd3,0x25,0x33,0x63,0x9e,0x12,0xce,0x00,0xb3,0xad,0xb6,0x56,0xc3,0xd4 .byte 0x94,0xe7,0x3d,0x45,0x9d,0xcb,0x76,0x0c,0x74,0xf0,0x26,0x9f,0x56,0x10,0x58,0xf0,0xf7,0x6f,0x09,0xc8,0x9f,0x84,0x69,0x64,0x7b,0xdb,0xd9,0x89,0xe4,0xa3,0x9c,0x3b,0xc7,0x94,0x46,0x41,0x58,0xb0,0xa4,0x44,0xaa,0x27,0x11,0xfc,0x16,0x24,0x57,0x36,0xca,0xf7,0x55,0x76,0x0e,0x9f,0x72,0x37,0x61,0x46,0xe5,0xe5,0x9d,0x83,0xac,0x18 .byte 0xdf,0x81,0xf1,0xa4,0xa3,0x3b,0x92,0x1d,0x33,0x9f,0x25,0xf0,0x6a,0x87,0x15,0x62,0x6d,0x4c,0x72,0x68,0xe0,0x0a,0x74,0x62,0x27,0x00,0xd6,0xee,0xdd,0x16,0xef,0xb4,0x4e,0x3f,0xad,0xe0,0x03,0xed,0x64,0xc4,0xbd,0x66,0x9d,0x3e,0xf4,0xec,0xd6,0x06,0x96,0x5d,0x11,0x0d,0x87,0x5e,0x62,0xba,0xdb,0xff,0x9c,0xb5,0x08,0x84,0xa3,0x54 .byte 0x22,0x60,0x07,0x9e,0x45,0xa4,0x9f,0x8b,0xb3,0x3f,0x50,0x20,0x76,0x21,0x8a,0xc4,0xf1,0xb8,0x5c,0x1d,0xe2,0x88,0x0e,0xf6,0x8c,0x3e,0x75,0x85,0x8f,0xa1,0x71,0x72,0xf2,0x74,0x24,0x69,0x43,0x10,0xef,0x7b,0xb0,0x8d,0x1a,0x1f,0x1a,0x24,0xaa,0xdf,0xaa,0xbe,0x70,0x60,0x34,0xf0,0x91,0x03,0x72,0x20,0x19,0x8d,0xa5,0xaf,0xed,0xa8 .byte 0xd7,0xe4,0x12,0xad,0x09,0x32,0x85,0x63,0x79,0x3a,0xf4,0x72,0xde,0x27,0x76,0xa1,0x8e,0x73,0xc8,0x04,0xf9,0xd0,0x09,0x03,0x44,0xbb,0xb8,0x5a,0x0f,0x36,0x51,0x8f,0x22,0xb4,0xaf,0xb0,0xc9,0xc0,0xcb,0x43,0x78,0xac,0x75,0x4a,0xf4,0x42,0x31,0x7e,0x25,0x92,0x73,0x10,0xfb,0x66,0x94,0xe9,0xd8,0xc6,0xcb,0xd2,0xc2,0xb1,0xa6,0x2c .byte 0x34,0x86,0xb9,0x9a,0xb1,0xc5,0x86,0x0d,0xb7,0xbd,0xee,0x6b,0x94,0x94,0xc6,0x30,0x62,0xda,0x90,0xc7,0xef,0xbd,0xc7,0x3c,0x99,0x0a,0x0b,0xbf,0x7a,0xfa,0xa7,0xd7,0xca,0x4a,0xe7,0x33,0x6e,0xfa,0x81,0xb1,0xb9,0x3a,0xb9,0x9f,0x20,0x53,0xb7,0x62,0xe6,0x99,0xd7,0x17,0x09,0x64,0xe8,0x81,0xac,0x39,0xde,0x4f,0x03,0x24,0x8e,0x8f .byte 0x24,0x0f,0x24,0x54,0xe8,0x1e,0xfb,0x31,0x36,0xdc,0x22,0x43,0xba,0x69,0x2c,0xf6,0x98,0xcf,0x1f,0xd4,0x45,0x17,0x92,0x50,0xda,0x85,0x59,0x7b,0x11,0x01,0x32,0x4b,0x73,0xd9,0xc8,0x4c,0x1b,0x22,0x96,0x27,0x4a,0x2f,0x26,0x9d,0xf5,0x8d,0x43,0xb3,0x2f,0x62,0x5a,0x1d,0x19,0x78,0x51,0xcf,0x65,0x09,0x88,0x7a,0x09,0x2b,0x81,0xc2 .byte 0x5b,0x03,0xee,0x13,0x1b,0xb9,0x4f,0x6d,0x6d,0xb6,0x58,0xdf,0x87,0xc3,0x24,0x01,0x48,0x9d,0xe1,0xf0,0x6d,0x04,0x9e,0x88,0xab,0x11,0x4e,0x46,0x32,0xf3,0xfd,0xb3,0x9c,0x01,0x3d,0xd2,0x09,0x35,0x3e,0xf2,0xb0,0x97,0x65,0x47,0x9a,0x14,0x15,0xd0,0x90,0xf2,0x6c,0x66,0xb2,0x66,0xf5,0x97,0xe2,0x69,0x23,0xd8,0xdb,0xbe,0xcd,0x4c .byte 0x88,0x78,0x1a,0x8f,0x5b,0xb6,0xcd,0xd0,0xd3,0x65,0x03,0x76,0x63,0x59,0xd1,0xdf,0xed,0x55,0x1b,0xae,0xd3,0xf6,0x59,0x41,0xb5,0x2c,0xf6,0x62,0x6c,0x48,0xc1,0x77,0xc8,0x78,0x94,0xd8,0xa7,0xf4,0xa3,0x8c,0x75,0x25,0xe7,0xf3,0xf4,0x5b,0xaf,0x6c,0xf6,0xb0,0x88,0xac,0x30,0x76,0x87,0x71,0x10,0x49,0x70,0x90,0x31,0x28,0x39,0x75 .byte 0x7c,0x43,0x41,0x05,0x3b,0x51,0x35,0x2e,0xe6,0x9c,0xa9,0xcf,0x4a,0xfc,0xa8,0xc7,0xb5,0xd7,0x5a,0xa8,0x4b,0x51,0x75,0xab,0x40,0x19,0xc7,0xa0,0xbc,0x6d,0x3f,0xb0,0x1b,0x2b,0x85,0x51,0x04,0xae,0xb2,0x7a,0xbd,0x3b,0xd2,0x04,0xb5,0x2a,0x69,0xed,0x7d,0x24,0x15,0x76,0xca,0x25,0x15,0xd8,0x69,0x1c,0xd4,0xc3,0x3f,0x14,0x07,0x78 .byte 0x6b,0xf6,0x5a,0x37,0xaf,0x4a,0x73,0x52,0xa2,0xe6,0x82,0xb6,0xc7,0xd2,0x6a,0x20,0x58,0xc4,0x2b,0x9b,0x95,0x81,0x5e,0xdf,0x37,0x9d,0xbc,0x76,0x9b,0xee,0x36,0x82,0x9f,0xe2,0x0a,0x7f,0xb5,0xb1,0xb4,0x2c,0x89,0xc1,0xe4,0x97,0x2d,0x01,0xc3,0x7e,0xe4,0x39,0x07,0xed,0x5a,0xa7,0x06,0x6d,0xce,0xe9,0xa8,0x2f,0x5d,0x16,0x2e,0x1f .byte 0xfc,0x20,0x34,0x32,0x8b,0xd7,0xd0,0xd1,0xbc,0x3d,0x0a,0xa8,0x1e,0x7c,0xc8,0x68,0x37,0x3a,0xa5,0xcb,0xee,0x56,0xc3,0x9f,0xb1,0xb4,0x92,0x00,0x6a,0xd9,0x9b,0x0c,0x4a,0x6a,0xd0,0xdf,0x7d,0xa4,0x2f,0x96,0x85,0xe8,0x4a,0x2a,0x34,0x77,0xfe,0xc3,0xaa,0x35,0xb0,0xd1,0xf2,0x4d,0xeb,0x1c,0x9f,0x17,0x44,0xca,0x4e,0x53,0x2b,0xc4 .byte 0xe6,0x8e,0x97,0xfb,0x2b,0xb2,0x50,0xba,0x9b,0x79,0x72,0x3a,0x52,0x3f,0x5c,0xf2,0xef,0xee,0xe2,0x13,0xdc,0x2a,0x9b,0x7f,0x48,0xec,0xad,0xf1,0xa2,0xcf,0x38,0x36,0xe6,0x67,0x16,0x2c,0x9d,0x13,0x33,0xc9,0x45,0x10,0x9a,0x70,0x7d,0xf9,0xcb,0x7b,0xe5,0x00,0x20,0xbd,0x7d,0xc0,0x6c,0xde,0xae,0x87,0xb9,0x3a,0x18,0xf5,0x9e,0xd3 .byte 0x65,0x32,0x97,0x50,0x9c,0x47,0xb2,0x3f,0xe3,0xa4,0x76,0xfb,0xc8,0x4d,0x8b,0xf3,0x8c,0x19,0x1e,0x18,0xf1,0x3d,0x52,0x13,0xbf,0xfd,0x25,0x50,0xc5,0x07,0xc7,0x8f,0x9e,0x5e,0xac,0x0a,0xfa,0x35,0xfa,0x3b,0xd4,0x74,0x6d,0x42,0xb1,0x7b,0x98,0x6c,0xe4,0xe5,0x26,0xf3,0xf7,0x08,0x44,0xa8,0x2e,0x7d,0x11,0x05,0x72,0x63,0x39,0x27 .byte 0x4f,0x60,0x2e,0xbf,0x78,0xa9,0x5e,0x41,0x33,0x36,0x01,0x55,0x8b,0xba,0x7f,0x6c,0x53,0x38,0xfe,0x98,0x9e,0x9f,0x0f,0x7f,0x01,0xda,0x62,0xc6,0x5c,0x11,0x3f,0x21,0xfa,0xf6,0x15,0xda,0xb1,0x41,0xe5,0xc8,0x9f,0x77,0xb2,0xa7,0xc5,0x4e,0xfe,0xce,0x40,0xc8,0x76,0xc1,0xa2,0x68,0x93,0x4a,0x81,0xd2,0x92,0xd1,0x21,0x81,0x42,0x9e .byte 0x44,0x4a,0x45,0xa3,0x9f,0xbf,0xa1,0x8a,0x68,0x27,0xcf,0x27,0x60,0xcb,0x28,0xd0,0x56,0x97,0xd2,0x2b,0xf4,0x3c,0xb9,0x5e,0x9e,0xa8,0xdd,0x35,0xbe,0x0e,0x7f,0xf6,0x37,0x4d,0x8a,0xb5,0xd1,0x31,0xec,0x50,0xfd,0x54,0xc5,0xf8,0xc5,0x83,0xce,0xfb,0x35,0x79,0x37,0x1e,0x8f,0xaf,0x3f,0x7d,0x82,0x2d,0x01,0x8c,0x09,0x27,0xe9,0xcb .byte 0x6a,0xfd,0x66,0x99,0x22,0x2d,0x8f,0xe2,0xb4,0x28,0x1d,0x17,0x23,0x85,0x2e,0x15,0x20,0x84,0x93,0xcc,0x3c,0x26,0x83,0x9e,0x5a,0x20,0x22,0xf4,0x9a,0x38,0x97,0xaf,0x7d,0xb9,0xb9,0x5e,0x06,0x30,0x67,0xc6,0x3b,0xf8,0x2e,0xe0,0x96,0xdc,0xa4,0x4e,0xb7,0xf5,0xe0,0x93,0xc3,0xcc,0x03,0xcf,0x69,0x18,0x0b,0x69,0x9c,0xb2,0xe2,0x71 .byte 0xb5,0x58,0xde,0xf1,0xa9,0x43,0x30,0x62,0x98,0x75,0x29,0x48,0xca,0x84,0x72,0xdc,0xf8,0xfa,0x10,0x67,0x15,0x08,0xb6,0x5d,0x91,0xd6,0xfb,0xf2,0xe3,0x3c,0x0b,0xe4,0x96,0xe1,0xe8,0xe6,0x26,0x0d,0xc6,0x6a,0x82,0x65,0x66,0xbf,0x77,0xb7,0x3b,0xe3,0xb5,0xdd,0x10,0x6b,0xb4,0xb7,0xcc,0xc2,0x54,0xbd,0xec,0x18,0x19,0xb7,0xe6,0xa8 .byte 0xdb,0xde,0xc7,0x97,0x1f,0xa5,0xee,0xc3,0x06,0x3e,0x45,0x10,0x97,0x0c,0xc4,0xe1,0xe0,0x22,0xbe,0x36,0x86,0x20,0x44,0x29,0x6e,0x75,0xbc,0xaf,0x6d,0xf9,0xb0,0xec,0x16,0x77,0x65,0xb0,0xf1,0xfc,0xa5,0x30,0x04,0x94,0x25,0x6f,0x7c,0x32,0x51,0xed,0x38,0x77,0xd7,0x3f,0x34,0x02,0x04,0x35,0x97,0xa8,0x06,0x0d,0x62,0x53,0x67,0x6e .byte 0x94,0xe4,0x0e,0x34,0x3e,0x5b,0x16,0x56,0x52,0x70,0xf1,0x49,0x0f,0x75,0x60,0x4f,0xd2,0x32,0xf8,0xd2,0x33,0x08,0xd4,0x44,0xa6,0x7c,0x9b,0xa1,0xca,0x3f,0x6c,0x6f,0x53,0xdc,0xd1,0x46,0xa4,0x37,0x38,0xf6,0xd7,0x08,0xcb,0x08,0xa6,0xe5,0xa6,0xe9,0x3c,0xb1,0x98,0x7e,0x44,0x9e,0x8e,0x4e,0xca,0xa5,0xc5,0x24,0xb7,0xe3,0x05,0xf1 .byte 0xc0,0x91,0x3b,0x97,0x6d,0x76,0x56,0x65,0x5f,0x1b,0x92,0x92,0x49,0x1e,0x3b,0xb2,0x86,0x23,0x67,0xfd,0x37,0x74,0x71,0x0a,0x16,0x19,0x7e,0x54,0x0b,0xa4,0x4d,0xc0,0x1d,0xb1,0x3f,0xe2,0x2f,0x98,0x85,0x97,0xad,0x10,0x76,0xf2,0x7e,0x42,0x78,0x81,0x98,0xab,0xd5,0xc9,0x3a,0x5b,0x69,0xc1,0xce,0x10,0xa4,0x9e,0x1c,0xd4,0xa9,0xc3 .byte 0x68,0x5b,0x82,0x3b,0x90,0x65,0x80,0x6d,0x96,0xbb,0x03,0x33,0xbf,0xb9,0xd2,0x5e,0x42,0xc9,0x7b,0x4e,0x27,0x42,0xe4,0x20,0x9f,0xc4,0x69,0x16,0x23,0xa1,0x98,0x28,0x38,0xfe,0xdf,0x19,0x7c,0xf5,0xbf,0xa3,0x8e,0xe0,0x06,0xb2,0xa4,0x63,0x06,0x03,0x45,0x26,0x51,0xe9,0xcf,0x0c,0xe1,0x2f,0x67,0xb9,0x83,0xe9,0x5b,0xf1,0x7e,0x5a .byte 0xea,0xa5,0x31,0xec,0x7d,0x2c,0x8a,0x6e,0xc0,0xb9,0x98,0x60,0xc2,0x71,0xbf,0x0f,0x1d,0xfd,0xb5,0x41,0xd6,0x6f,0xae,0xcd,0x04,0x29,0xcf,0xd9,0xf6,0x71,0xdd,0xab,0x52,0x9e,0x14,0x81,0x0d,0xb4,0x27,0xcc,0x68,0x65,0xc8,0x65,0x1f,0xfc,0xb7,0x44,0x31,0xaf,0x03,0xfe,0x9c,0xf4,0xf8,0x80,0x91,0x90,0xc5,0x0e,0xe0,0xe3,0x4f,0x46 .byte 0x33,0x84,0x51,0xea,0x2a,0x50,0xb8,0x09,0x6e,0x0f,0x6b,0xd8,0x86,0x0a,0xf5,0xfc,0xda,0xc7,0x8c,0x8f,0xec,0x15,0x61,0x57,0x30,0xdd,0xda,0x40,0xb5,0x99,0xd6,0x0d,0x34,0xb0,0x55,0xab,0x90,0xc3,0x1e,0x7e,0xac,0x90,0x75,0x49,0x54,0xc4,0xa3,0x2e,0x9d,0xd0,0xac,0xcd,0x01,0x03,0x1d,0x3f,0xf4,0xf0,0xcb,0x36,0xc2,0xe4,0xb1,0x1a .byte 0x62,0x91,0x08,0x4f,0xd2,0x91,0x22,0xf5,0x0e,0x37,0x18,0xcc,0xde,0xf4,0xbc,0x58,0x6a,0x52,0x91,0x1b,0x6a,0x22,0x5e,0xe8,0xd7,0xb4,0x87,0xfd,0xbe,0x9c,0xff,0x1a,0xb9,0x9c,0xba,0x20,0x75,0xcc,0xc7,0x3c,0x6a,0xd4,0x9a,0xfa,0xfe,0xb8,0xdc,0x7f,0x85,0x79,0x20,0x72,0x31,0x53,0xb1,0xb9,0x83,0xd9,0x2c,0x61,0x56,0x0c,0x97,0x7a .byte 0x10,0x88,0xdf,0x2d,0xa3,0xdd,0x83,0x7e,0xd9,0x63,0xf3,0xd7,0x18,0x69,0x49,0x4c,0xd5,0x6b,0x26,0xee,0xf6,0xcb,0x1d,0x44,0x0d,0xeb,0xe3,0x9b,0xfd,0xa9,0x7c,0x9d,0x69,0x82,0x11,0x17,0x32,0x0f,0x17,0xb0,0x8a,0x96,0xd9,0x78,0x0c,0x90,0x43,0x0a,0x8b,0x64,0xa4,0x61,0xdc,0xe8,0xc8,0x3c,0xa0,0xda,0x97,0x66,0x7e,0xa0,0xb7,0x1c .byte 0xd4,0xa2,0x05,0xbc,0xb8,0x60,0x10,0x5d,0xb8,0x83,0x4d,0x02,0xce,0xc4,0x30,0xf2,0x9f,0xfb,0xa7,0x15,0xed,0x2b,0x4a,0xb0,0x0e,0x6f,0x96,0xfb,0x06,0x58,0x8d,0xb4,0xde,0x96,0x88,0xfd,0xa2,0xf0,0xff,0xa4,0x4e,0xc5,0x92,0x60,0x81,0x52,0x19,0xdf,0xbc,0xd5,0x4d,0x74,0x54,0x04,0x05,0x33,0x39,0x64,0xfe,0x44,0x7e,0xb0,0x5c,0xd1 .byte 0x68,0xde,0xdf,0x3e,0x05,0xea,0xab,0x45,0xf7,0x33,0x95,0xd4,0xa1,0xc6,0x1d,0x73,0x8a,0x19,0xff,0x20,0xd8,0x48,0x08,0xc6,0x1b,0x07,0x6d,0x78,0xe7,0xe3,0x2e,0xe7,0xcd,0xc9,0x1f,0x49,0x99,0x9c,0xab,0xa3,0x4a,0x77,0x48,0x91,0xea,0xe3,0xdb,0xf6,0x7a,0x91,0x3a,0xda,0x79,0xee,0x90,0x41,0x79,0x68,0xac,0xb9,0x56,0x46,0xae,0xf1 .byte 0xd9,0xdf,0x58,0x09,0xfe,0x42,0xe7,0xe2,0x44,0xd4,0x63,0xf4,0x67,0x5d,0xeb,0x6b,0x0e,0xe4,0x56,0xfa,0x01,0xc8,0xc5,0x58,0xfa,0xb7,0xe8,0x3a,0xb1,0xa1,0xde,0x94,0x88,0x21,0x06,0xd3,0x5c,0xa7,0x89,0x68,0x7b,0x8e,0xb2,0x86,0xe3,0x9a,0x9e,0xca,0x63,0x78,0xcb,0xb6,0x1a,0x35,0x16,0x43,0x4b,0x09,0xd1,0xb4,0x71,0xef,0xb6,0xb2 .byte 0x2e,0xa5,0x2b,0x4e,0x18,0xac,0x8f,0xc0,0xfe,0x86,0xcc,0x63,0xc6,0x0c,0x3c,0xee,0x22,0x92,0x7c,0xca,0xab,0x1a,0xbf,0x21,0x20,0xf2,0xd6,0xba,0x99,0x17,0xca,0x1e,0x00,0x39,0xa9,0xe4,0x65,0xa8,0xdd,0xae,0x2a,0x29,0xb1,0xa6,0xaf,0x22,0x2a,0x94,0x6c,0x68,0x66,0xb4,0x11,0x92,0x03,0x7c,0xf6,0x49,0x88,0xac,0x91,0x14,0xb7,0x1d .byte 0x06,0x8c,0x82,0xf9,0x56,0x3c,0x54,0xa3,0x31,0xb1,0x56,0x69,0x09,0x7b,0xf1,0x9d,0x01,0x10,0x1a,0xaa,0x82,0x52,0x36,0x7d,0x28,0x6d,0xc1,0x18,0xdd,0xdb,0xc5,0x99,0x1c,0x69,0xd6,0x81,0xb8,0x1b,0x63,0x44,0xe9,0x5d,0xac,0x0e,0xd2,0xa4,0x4a,0x38,0x17,0xb5,0x41,0xca,0x81,0x96,0xe2,0x5b,0x2c,0xd2,0xd1,0xdc,0xbf,0x8a,0x57,0x46 .byte 0x7d,0x48,0x1b,0xc0,0x11,0xce,0x09,0x23,0x06,0x73,0xd0,0x2f,0x8f,0x7f,0x4e,0xaf,0x92,0xff,0x5d,0x52,0x20,0xfc,0x12,0x7d,0x7f,0x6a,0xd0,0xf3,0x20,0xc2,0xf9,0x05,0x20,0x56,0x9f,0x97,0xa3,0x64,0x5c,0x4c,0x8d,0xab,0x76,0x84,0x2b,0x6b,0xea,0x3c,0x4f,0x2a,0x2c,0x0b,0x45,0x7c,0x7b,0x73,0x6d,0x91,0x7e,0x7c,0xc0,0x2d,0x32,0x5a .byte 0xb7,0xa7,0x1e,0x15,0x17,0x18,0xfb,0xbc,0x64,0x67,0xd3,0x0c,0x28,0xc5,0xaf,0x9e,0xe5,0x89,0x36,0xdd,0x16,0xef,0x21,0x70,0xe9,0x26,0x95,0xab,0xdd,0x5b,0xce,0xd4,0x57,0xe9,0x49,0xb3,0x08,0x9b,0x19,0x74,0x70,0x3b,0x8f,0xf6,0x95,0x38,0x92,0x24,0xb1,0xf8,0x27,0xc1,0xa3,0xa3,0x87,0x71,0x42,0xca,0x95,0x05,0x0e,0x06,0x51,0x11 .byte 0x2d,0x43,0x83,0x83,0x01,0xb3,0xcd,0xf9,0xb9,0xff,0xf6,0x5c,0x8d,0xc1,0xc9,0x05,0x49,0x77,0x93,0xff,0x66,0x79,0xf6,0x7c,0xea,0x11,0x5c,0x5e,0xd4,0x82,0x36,0x28,0xc7,0xbb,0x00,0x00,0xc3,0x90,0xda,0xa2,0xef,0x95,0x45,0x6c,0x74,0xbc,0xd8,0x11,0xe6,0x73,0x1f,0xb9,0xa7,0x2b,0x79,0x62,0xbf,0xc1,0xa2,0x5c,0x10,0xfd,0x3d,0x72 .byte 0x00,0xc9,0xb6,0x05,0x9c,0xec,0x70,0x30,0x68,0x7b,0x46,0x86,0x47,0x19,0x95,0x07,0x1b,0x49,0xde,0x25,0x6b,0x34,0xea,0x75,0x28,0xdf,0xa7,0xf9,0x59,0xbc,0x79,0xab,0xaf,0x67,0x9f,0xa1,0xe0,0x39,0xe3,0xd8,0x6e,0xbd,0xfe,0x1d,0xd3,0xec,0x2d,0x3b,0x7b,0x21,0xde,0x06,0x72,0x63,0x61,0xf3,0xd0,0xdb,0xae,0x32,0xc9,0x73,0x90,0xa1 .byte 0xb3,0xdc,0xc3,0xaf,0x2b,0x43,0x12,0x72,0x5a,0xef,0x5a,0x6a,0x44,0xbc,0x38,0x65,0x8c,0x25,0x32,0x96,0xe8,0x17,0xd3,0x96,0x4c,0xf2,0x95,0x29,0x90,0xd9,0x1c,0x6d,0x86,0x60,0xef,0x1a,0x25,0xdf,0x71,0xa1,0x8a,0x3d,0x08,0x08,0x01,0x01,0x6e,0x07,0xff,0x23,0x71,0x98,0x49,0xd6,0x3c,0xd4,0x3f,0x67,0xf1,0xe5,0xc4,0x4b,0x10,0x68 .byte 0x58,0xa8,0xa5,0x33,0xbb,0x6e,0x51,0x80,0xa3,0xec,0x17,0xdf,0x18,0x6f,0xe1,0x33,0x70,0x25,0x65,0xbd,0x19,0x12,0x4f,0xf5,0x30,0x4b,0x2d,0x30,0xac,0xa8,0x64,0x70,0x9a,0x6c,0xbf,0xb3,0xdb,0xdf,0x1b,0xb3,0x75,0x19,0x1f,0x70,0x8d,0xd2,0xdb,0x1c,0xca,0x72,0xca,0xb5,0xe3,0x34,0x4f,0x16,0x72,0x3f,0x12,0x2f,0x61,0x57,0x9f,0x6c .byte 0xbc,0x2e,0x2f,0x27,0x26,0xac,0x0d,0x54,0xfc,0x78,0x58,0xdf,0x86,0x9c,0xfc,0x8b,0xaf,0x99,0x04,0x17,0x19,0xbf,0x9a,0xf9,0x03,0xea,0x3c,0xd8,0x9d,0x2e,0xd7,0xd2,0x51,0x01,0xe0,0x1e,0xbf,0x3d,0x85,0xa0,0x73,0xa6,0xcc,0x20,0x56,0x42,0x16,0xb1,0x9d,0xa9,0x1a,0xfc,0x0d,0x20,0x8c,0x04,0x55,0xbe,0x33,0xd1,0x86,0xab,0x3c,0x95 .byte 0x9b,0x86,0x84,0xf2,0x99,0xe6,0xab,0xee,0x34,0xd3,0xfd,0xf7,0xb8,0xe7,0x44,0x58,0x36,0xdb,0xc5,0xb5,0x81,0x31,0xbc,0x21,0xe0,0xd0,0x6e,0x2e,0xff,0x86,0xf5,0xb6,0x22,0x69,0x1f,0x23,0xb6,0x24,0x52,0x13,0xdd,0xc3,0xb9,0x76,0xef,0xda,0x22,0x5b,0xfb,0x68,0xfe,0xd2,0xc8,0xcc,0x9e,0x51,0xe3,0x93,0xd8,0x7c,0x6f,0xd5,0x4a,0xdd .byte 0x71,0x23,0x14,0xf5,0x0c,0xce,0xd6,0x7a,0xfd,0xda,0x03,0x36,0x4b,0xa0,0x3f,0x0d,0xc9,0xd6,0x35,0x31,0x3a,0x68,0x15,0x85,0x31,0x12,0x72,0x15,0xb3,0xb4,0xbb,0x42,0xe9,0x54,0xcd,0x93,0x78,0x28,0x31,0xcd,0xb6,0x36,0xe7,0xac,0x1f,0x5d,0x64,0x60,0x93,0x67,0x82,0x02,0xda,0x46,0x74,0xa2,0x55,0x6a,0xae,0x66,0x07,0x08,0x45,0x67 .byte 0x3e,0xa7,0x5c,0x6a,0x2a,0xe5,0x8a,0x3a,0x92,0x18,0x2f,0x63,0x36,0x49,0x37,0xa9,0x02,0x3c,0x24,0x3e,0x83,0x5c,0x7e,0xae,0x41,0x95,0x65,0x50,0x90,0x45,0xa1,0xc5,0xdd,0x8c,0x72,0xd2,0x24,0x74,0xfd,0x69,0x75,0x76,0x7a,0xd7,0x79,0xfb,0x02,0x7c,0x27,0x2b,0xdb,0x3b,0xa9,0x5f,0x32,0x03,0x25,0x8e,0x8b,0xe7,0xe7,0x64,0x85,0x47 .byte 0x58,0xfc,0xce,0x40,0xa2,0xeb,0xab,0xfd,0x4e,0xda,0x58,0x87,0x40,0xb8,0x22,0x29,0xff,0xa7,0x02,0x8c,0xdb,0x90,0xf5,0x14,0x62,0xec,0x21,0xfa,0x4e,0x52,0x2e,0xfb,0xa8,0x56,0x8a,0x68,0xdf,0xb1,0xa0,0x78,0x43,0x99,0xd8,0x45,0x6e,0xd6,0x94,0x62,0x5a,0x19,0x0f,0x47,0xdd,0x5b,0x05,0x8e,0xe2,0x4c,0x2d,0x3b,0xd9,0xfd,0x24,0x98 .byte 0x9d,0xc0,0x34,0x33,0x76,0xae,0xd9,0x82,0xcf,0x77,0x85,0x2a,0xb0,0xbd,0x98,0xc7,0xfa,0x2c,0xcd,0x91,0xb5,0x94,0x2b,0xb7,0xac,0xc9,0x7f,0xd7,0xcc,0xe0,0x77,0x18,0xce,0x44,0x7e,0x21,0x2e,0x86,0x0f,0xb5,0x3c,0xe4,0x07,0x86,0x33,0x8f,0x78,0x4a,0x6a,0x66,0x4b,0x6f,0xb8,0x54,0xfc,0x3c,0x44,0x76,0x36,0x4e,0x04,0x3f,0x37,0x46 .byte 0xc4,0x9d,0xba,0x1f,0x7e,0xf2,0x24,0xae,0x40,0x56,0x55,0xc0,0xed,0x8e,0xbc,0x2e,0x4b,0xf1,0x74,0xb5,0x99,0x73,0x62,0xb2,0x6b,0x0c,0xd2,0x8a,0xcc,0x01,0x8f,0x16,0x35,0xc2,0xad,0x03,0xdb,0x07,0x68,0x56,0x5b,0x46,0x49,0x32,0x11,0xe3,0xd5,0x6a,0xa6,0x1f,0xf5,0xde,0xf6,0xac,0x53,0x43,0xf1,0xf4,0x25,0x97,0xbc,0x27,0xbc,0x3a .byte 0x3d,0x84,0x3e,0xc6,0xe0,0x68,0x69,0x22,0x4d,0x99,0x11,0xb5,0xce,0xa4,0x0c,0xaf,0x2b,0x1c,0x26,0x8d,0xd2,0xc4,0xab,0x67,0x52,0x6b,0xac,0xc5,0x7c,0x22,0xee,0xa9,0xbd,0x61,0x79,0xbb,0x71,0x02,0xfa,0x52,0x72,0xb2,0x6a,0xb5,0x0f,0xa0,0x9f,0xba,0x35,0x8c,0xd8,0xa1,0x74,0x96,0x78,0xbf,0xc4,0xf5,0x83,0x21,0xba,0xd3,0x69,0xd1 .byte 0x3d,0xb2,0x7e,0x06,0xc6,0x10,0x7a,0xa6,0x66,0xed,0xbe,0x3c,0x42,0x89,0x2f,0xc5,0xee,0x61,0x10,0x2d,0x51,0x8f,0x34,0x03,0x32,0x4f,0x01,0x77,0x02,0xfb,0x30,0xa3,0x95,0x74,0xb9,0x97,0xc2,0xc4,0xa7,0x1e,0x52,0x94,0x29,0x31,0x21,0x8b,0xb4,0x41,0x5f,0xb0,0xf2,0x89,0x54,0xb2,0x0a,0x9b,0x06,0xba,0xb4,0xb5,0x5b,0xc9,0xad,0xeb .byte 0xdd,0x62,0x97,0xf2,0xfc,0xe9,0xc5,0xcf,0x4b,0x87,0x4e,0x46,0xfa,0x58,0x38,0x62,0x0f,0xa1,0x5e,0x32,0xa2,0x52,0x2c,0x8f,0xb7,0xc2,0x90,0xdd,0x29,0xfb,0xb2,0x8d,0x38,0x85,0x4b,0x9c,0xc2,0x94,0xfd,0x0a,0xf3,0xd2,0x73,0xda,0xc6,0xdc,0xd0,0xa5,0xa5,0x3b,0x79,0x5e,0xd0,0x72,0x9d,0x06,0x6d,0x6f,0x6c,0x97,0x08,0xd1,0xc9,0xf2 .byte 0xe7,0xd7,0xfe,0x2a,0x39,0xe4,0xf6,0xa1,0x5a,0xc7,0xe3,0x2a,0x40,0x0f,0x9b,0x5b,0xf3,0x85,0xfc,0xc9,0x23,0xa2,0xdf,0x44,0x0a,0x20,0x3c,0xc1,0x7b,0xeb,0x95,0x22,0x04,0x37,0x0a,0x77,0x2c,0xa5,0xbd,0xad,0x4b,0xf5,0xef,0x00,0xa1,0x53,0x45,0x06,0xe5,0xbb,0x6e,0x18,0x43,0xef,0xbc,0x4d,0x6e,0xae,0x2a,0xa2,0x7b,0x41,0xd2,0x92 .byte 0x68,0x92,0x98,0x0c,0xc7,0x63,0x61,0x9b,0x9c,0xaa,0x63,0x0a,0x78,0x6b,0xf2,0xde,0x60,0x2e,0xc0,0x5e,0x60,0xca,0x68,0x87,0x82,0x13,0x2c,0x9f,0x2d,0x70,0x1b,0xcb,0xe3,0xfd,0x12,0x4b,0x48,0x83,0x9c,0x7c,0xea,0xde,0x19,0xe6,0xa3,0x23,0x9b,0xcd,0xeb,0xef,0x74,0x85,0xb0,0x55,0x2d,0x3f,0xa9,0xac,0xef,0x1f,0xd6,0xbc,0xd8,0x33 .byte 0x58,0xa9,0x73,0x7c,0x9a,0xee,0x08,0x06,0x3d,0x4b,0xa5,0xee,0x37,0x9f,0xf6,0x6e,0x61,0xc9,0x42,0x94,0x89,0x4d,0x36,0x8d,0x23,0x96,0x57,0x17,0x0f,0x91,0xb1,0xea,0x0d,0x33,0xc5,0x00,0xb8,0x02,0xab,0x9e,0x68,0x75,0xf0,0x80,0x79,0x78,0xae,0xe5,0x59,0x58,0x9b,0xd4,0x1a,0x62,0x37,0x7c,0x61,0xa0,0x43,0x76,0x6a,0x00,0x44,0xc7 .byte 0x5e,0xf4,0x88,0x39,0x43,0x32,0xcb,0xd7,0x78,0x16,0xcf,0x12,0x1b,0x4e,0xae,0xb3,0x6a,0x0b,0xb1,0x52,0x4b,0x3c,0x4f,0xd5,0x44,0x95,0x3f,0x5c,0x84,0x15,0x25,0x1c,0x97,0x6b,0x5a,0x05,0x1b,0x45,0x7e,0x1d,0x28,0x24,0x8b,0x8a,0x6d,0xe9,0x11,0xe2,0xdc,0x83,0x3e,0xc4,0x7b,0xb0,0xd9,0x5a,0x0e,0x11,0x5c,0x3d,0xa9,0x78,0xcb,0xcd .byte 0x3a,0x1f,0x5e,0x57,0x5e,0x59,0xae,0xc5,0xb6,0x37,0x80,0x2f,0x63,0x7c,0xef,0xc2,0x8e,0x81,0xbb,0x6f,0xf0,0x1b,0xbf,0xbc,0x71,0xa5,0x97,0x59,0x98,0x87,0xac,0x7d,0x55,0x79,0x4a,0x47,0x32,0x6c,0x9d,0x79,0x91,0x6b,0x22,0x9b,0xec,0xf7,0x9d,0xd4,0x87,0xd1,0x57,0xb6,0x13,0x91,0x54,0x8f,0x88,0x14,0x19,0x08,0x93,0xe7,0x29,0x26 .byte 0x01,0x09,0x0d,0x44,0x16,0xc8,0x90,0x99,0x80,0x04,0x5b,0xbf,0x5a,0xa0,0x73,0xd3,0x85,0xdc,0x9c,0xa9,0xbb,0x8f,0x59,0x5e,0x28,0x01,0x6c,0x13,0xce,0x92,0xe8,0x10,0x85,0x81,0x5f,0xc8,0x5f,0x52,0x84,0x33,0x87,0x28,0x5f,0x52,0xc7,0x68,0xc6,0x49,0x9f,0xa6,0x4b,0x0e,0x11,0x7b,0x94,0xf7,0x87,0xd2,0x8e,0xdb,0x5e,0x6b,0x6b,0xe5 .byte 0x40,0x12,0xc2,0xf1,0x57,0xa3,0x72,0x7a,0xbf,0x8b,0xee,0xe7,0xd2,0x84,0x53,0xae,0x06,0x7c,0xf8,0x85,0x3a,0x2a,0x0f,0x45,0xf9,0xe1,0x61,0x15,0x59,0xc7,0x2e,0x64,0xe1,0xbe,0x95,0xe1,0x64,0x1a,0xca,0xcd,0x2c,0xb9,0x71,0x63,0xa9,0xea,0xdb,0x49,0xcd,0xdb,0x36,0x1f,0x9e,0x1f,0x93,0x01,0xdd,0xe0,0x42,0xe7,0x59,0xe7,0x24,0xcd .byte 0x57,0x4a,0x16,0xbd,0x91,0x4f,0xbf,0x05,0x54,0xea,0xed,0x9b,0xfd,0xd0,0xb8,0xcf,0xad,0x54,0xfc,0xac,0x0c,0x10,0x4f,0xbc,0x9e,0xe0,0xb5,0x79,0x0a,0x64,0xa9,0x41,0xc1,0x6c,0xd0,0x19,0x7e,0x45,0x76,0x3f,0x1f,0x58,0xab,0x6f,0xd5,0x85,0x70,0x89,0x1d,0x11,0xc7,0x93,0x31,0x5c,0x4f,0xae,0xa8,0xc6,0xde,0x81,0x04,0xe1,0x93,0x9c .byte 0x82,0x44,0x23,0x5d,0x0e,0x23,0xf7,0x3a,0x94,0x01,0x3f,0xe2,0x69,0x3f,0xfc,0x72,0x37,0xd2,0x51,0x73,0xbb,0xd2,0x67,0xa9,0xac,0xb1,0xea,0xa5,0x09,0xdf,0x65,0x4e,0x08,0x6a,0xff,0x3f,0xdf,0x12,0xb8,0x65,0x04,0x2c,0xb4,0x91,0xd0,0x0b,0x4e,0x16,0xec,0x9c,0x7f,0xe6,0x1c,0xec,0x7d,0x83,0x68,0x63,0x0d,0x40,0xb9,0x38,0xda,0xa9 .byte 0x8d,0x3c,0xfd,0xd2,0x54,0x26,0xa0,0x83,0x94,0x48,0xe1,0xb0,0x12,0x5d,0x1b,0x5c,0x66,0xad,0x6e,0xbc,0xf5,0x84,0x9e,0x13,0xb2,0x6b,0x1d,0x5f,0x8a,0xaf,0xf7,0x22,0x76,0x2b,0xf2,0x4b,0x37,0xb7,0x9d,0xea,0x10,0xb2,0x2d,0x01,0x5a,0x9a,0x11,0x29,0x7c,0xb2,0x6e,0x39,0x02,0xab,0x18,0x0d,0x47,0x15,0x13,0xfa,0x9f,0x35,0x38,0xc7 .byte 0x1b,0x74,0x7d,0xe0,0xd8,0x4d,0xa4,0xc9,0x10,0x5e,0xd1,0x88,0x7d,0x14,0x40,0xda,0xd0,0x22,0x92,0x6a,0x44,0x0d,0x73,0xc1,0xb2,0xac,0x43,0xa9,0x0a,0x19,0xc6,0xf1,0x5e,0x8b,0xf0,0x9d,0xb4,0x93,0x71,0x5f,0x7a,0x2b,0xd7,0x3e,0x42,0x1f,0x5f,0x80,0x60,0x3a,0x40,0x04,0x3f,0x21,0x1b,0x07,0xd5,0xd8,0xc6,0x15,0x9a,0x31,0xac,0x81 .byte 0x3c,0xa2,0x42,0xba,0x63,0xc4,0x84,0x15,0x0a,0x79,0xdb,0xd9,0x8b,0xde,0x6f,0x35,0x74,0x7c,0x06,0x66,0x9a,0xec,0x4d,0xd3,0x0c,0xaa,0x16,0xb3,0x68,0x02,0xb7,0xd8,0x93,0x7f,0xa2,0x86,0x05,0x3f,0x32,0xe0,0x29,0x86,0x32,0x6f,0xc3,0xd1,0x59,0x68,0xf5,0x6d,0x50,0x5b,0xc0,0xe8,0x0e,0xed,0xe4,0x4a,0x50,0xbd,0x24,0x50,0xcb,0x2b .byte 0x9e,0xad,0x0d,0xbc,0x90,0x90,0xf7,0x23,0x32,0xfe,0x01,0xba,0x7c,0x27,0xc9,0x44,0xd3,0x25,0xc5,0xa0,0x74,0x9b,0xf3,0x22,0xb1,0xf9,0x22,0x62,0x10,0x2d,0x18,0xf5,0x35,0xe8,0xa7,0x4c,0x80,0xdb,0x27,0xb2,0x09,0x80,0x70,0x7d,0x25,0xd6,0x57,0xf6,0xdb,0x91,0x4b,0xfa,0x5c,0x33,0x80,0x4e,0x08,0x0a,0x60,0x06,0xdc,0x65,0xc8,0x29 .byte 0x3c,0x0c,0xbd,0xca,0x6a,0x4c,0x0d,0x84,0x3a,0x73,0xd4,0x66,0xa4,0xab,0xa8,0x03,0x3f,0x9d,0xaf,0x61,0xae,0x2d,0xd7,0x91,0xad,0xef,0xa5,0x8f,0x84,0xb4,0x3a,0xd0,0x25,0x58,0x95,0x0c,0x9a,0x6a,0x3c,0x74,0xef,0xcd,0x81,0x2d,0x32,0x2a,0x4c,0x4a,0xfb,0xb0,0xfd,0xd4,0xed,0xbb,0xb4,0x7c,0xe5,0xda,0x0e,0xf2,0xfb,0xc5,0x77,0x22 .byte 0x47,0xfa,0x9a,0x17,0x62,0x8b,0xc9,0x4b,0xfe,0x20,0x20,0x02,0x1e,0x11,0x9c,0xd5,0x67,0x8f,0x5a,0xf3,0x69,0xc1,0x9b,0xd9,0xfa,0xbb,0x2c,0x68,0xe0,0xe6,0xfc,0xb3,0xa9,0xf6,0xf1,0xe9,0x1b,0x8e,0x4b,0x5d,0x95,0x39,0x39,0x58,0xaf,0x82,0x19,0x07,0xd3,0x97,0x46,0xbd,0xce,0xc7,0x9d,0xbe,0x15,0x7f,0x5a,0xe6,0xea,0x37,0x1d,0xdc .byte 0x17,0x13,0x83,0xd0,0x3a,0x3e,0x87,0x5f,0x01,0xad,0xa1,0x20,0x1f,0x01,0xac,0x19,0x77,0x45,0x6e,0x5b,0xeb,0xdf,0x66,0xce,0xff,0xc5,0x7e,0x46,0x47,0xca,0x4c,0xda,0xdf,0x50,0x74,0xef,0x82,0x43,0x76,0xa0,0xbe,0x39,0xea,0x48,0x38,0x56,0xdd,0x9d,0x5c,0x27,0x3f,0x40,0x54,0xe1,0xce,0xff,0x38,0x78,0x02,0x3b,0xc1,0x8b,0xa2,0x7f .byte 0x31,0x11,0x8d,0x8e,0x35,0x88,0x9f,0xe8,0xe7,0x30,0x72,0xa2,0x76,0x83,0x56,0x8c,0x4c,0x3f,0x43,0xaa,0x35,0x64,0x83,0xbc,0xec,0x17,0x8b,0x50,0xd9,0x5b,0xb0,0x9f,0x67,0xd5,0xd1,0xb7,0x93,0x39,0xe2,0xc2,0xb1,0xb9,0xcd,0x0e,0x70,0xec,0x77,0x64,0x59,0x9e,0xd0,0x44,0xa7,0x79,0x82,0xa8,0x54,0xfa,0x42,0x99,0x26,0xfe,0x40,0x53 .byte 0x21,0x58,0xe4,0x2e,0x06,0x96,0x84,0x8b,0x80,0xf4,0xe8,0xf0,0x94,0xc3,0xcf,0x86,0xce,0xea,0x1d,0x82,0x67,0xcf,0xf8,0x79,0x54,0x83,0x10,0xb9,0xa5,0xea,0xce,0xeb,0x82,0x62,0xcf,0x45,0x8a,0x9d,0xeb,0x9c,0xb1,0xa0,0xf3,0xe8,0xff,0x96,0x14,0x33,0x7c,0x51,0x75,0x4d,0x00,0x0a,0xe6,0x50,0x15,0x28,0xc8,0x31,0x75,0x71,0xb5,0x8e .byte 0xab,0xe2,0x61,0x06,0xa3,0xf6,0x03,0x12,0xb2,0x73,0x67,0xd7,0x66,0xcc,0x24,0x45,0xfb,0x9b,0x22,0x42,0x3b,0xef,0x1d,0x42,0xcc,0xc9,0xd4,0xb0,0xa5,0x3c,0x66,0xcd,0x8b,0xb4,0xf1,0xcc,0x58,0xcd,0xea,0xa2,0x0a,0x88,0xc0,0x7c,0x1b,0x6d,0x72,0x35,0x57,0x90,0x7b,0xb8,0xd4,0x17,0xe8,0x83,0x15,0x30,0x5d,0x8c,0xb7,0x1a,0x42,0x98 .byte 0xb6,0xea,0xc9,0x53,0x27,0x50,0x1d,0x2f,0x39,0xeb,0xd6,0xc1,0x62,0x8d,0x1e,0xe1,0xde,0xb1,0xae,0xac,0xde,0x46,0x7b,0x66,0xa4,0xa6,0x79,0x55,0x79,0xf0,0x89,0x41,0xa3,0x01,0xba,0xbb,0x19,0x0c,0xdc,0xff,0x86,0x23,0xe3,0xca,0x60,0x88,0xc2,0x50,0x32,0xe2,0xd8,0x7e,0x5a,0x41,0x68,0x0f,0x5e,0x80,0x6a,0x9f,0x0b,0x33,0x8e,0x91 .byte 0x99,0xd8,0x3f,0x81,0xe9,0x8a,0xaf,0xa7,0x0a,0xe5,0xa9,0x23,0x1c,0xe0,0x19,0x7e,0x88,0xd6,0xbc,0x08,0x13,0xa5,0x49,0x07,0x86,0x5a,0xef,0x30,0x33,0xd8,0xcc,0x6e,0x2e,0x1b,0x17,0xa6,0x8c,0xff,0x08,0x7a,0xf3,0x99,0xab,0x64,0x69,0xf6,0x77,0xa8,0xeb,0x88,0x98,0xbe,0xea,0x9f,0x5e,0xe1,0xb6,0x8c,0x68,0xc1,0xdd,0x9b,0x91,0xd3 .byte 0x7c,0x30,0x62,0xc2,0x61,0xa1,0xcf,0x66,0x1a,0x8e,0xe8,0x91,0x48,0x33,0x7a,0xe1,0x71,0x27,0x3f,0xbf,0x47,0x78,0x31,0x9e,0xf8,0x38,0xc4,0xff,0x92,0x2a,0x0a,0x0d,0x32,0x7f,0x9d,0xa1,0xcc,0xe9,0xf2,0xfd,0xa9,0xf0,0xdc,0xd6,0xbc,0xe5,0xec,0xe9,0x26,0x91,0x0b,0x34,0xcb,0x3a,0x16,0x76,0xb1,0x90,0x08,0x14,0xec,0x6b,0x01,0xa6 .byte 0xa7,0x45,0x18,0x38,0x94,0x38,0x15,0x9a,0x4a,0x4d,0x16,0x03,0x17,0xfe,0x09,0x93,0x2d,0xbe,0xff,0x10,0xc5,0xad,0xb8,0x47,0x6e,0x5e,0x59,0x24,0x6a,0x55,0xef,0x86,0x57,0x1c,0xba,0x8a,0x0c,0xe3,0xe3,0xdc,0xc5,0x3a,0x2e,0xe8,0x89,0x6c,0xb4,0x85,0x22,0xf0,0x6d,0x6e,0x94,0x28,0xd8,0x06,0x72,0x1c,0xa7,0x9b,0x67,0x21,0x35,0x69 .byte 0xa2,0x0a,0x22,0x09,0x55,0xe7,0x9c,0x17,0x56,0x15,0x76,0x7e,0x2e,0x29,0xf1,0x5f,0x4b,0x1f,0xff,0x58,0x58,0xeb,0xc1,0x42,0x47,0x40,0x98,0x5b,0x34,0x6c,0x4c,0xa3,0x0a,0x3e,0x01,0xf3,0xf1,0x61,0x57,0x91,0x23,0xc8,0x48,0x0f,0x66,0x9d,0x08,0xc8,0x3b,0x18,0xc3,0x78,0xc7,0xb4,0x9a,0x89,0xe7,0x49,0x72,0x26,0xd3,0x16,0xe4,0xcf .byte 0xb0,0xde,0x5b,0x01,0xd9,0xb9,0xc7,0x83,0x1a,0x64,0x65,0xf8,0x0c,0x49,0xad,0x60,0xd5,0x2c,0x6b,0x75,0xe0,0x3f,0x8a,0x64,0x81,0xbb,0xee,0x7b,0xae,0x53,0x94,0x2b,0xc6,0x76,0x23,0x84,0xa2,0xb2,0x33,0xb3,0xae,0x02,0x1f,0xeb,0x3c,0x27,0x22,0xc0,0x54,0xdc,0x1c,0x18,0xa2,0x04,0x12,0x4f,0xd7,0x24,0xa9,0x49,0x44,0xd9,0xbf,0xd8 .byte 0x0c,0xb9,0x49,0xe3,0x84,0x29,0x27,0xd0,0x8d,0xb1,0x52,0x27,0xfc,0x0e,0xd7,0x88,0x39,0x64,0x76,0x49,0xd0,0x43,0xc4,0x3c,0x87,0x65,0x5f,0x90,0x49,0xde,0x27,0xc0,0xd4,0x1b,0xd4,0xdb,0x3f,0xfd,0x66,0x73,0x19,0x30,0x0b,0x29,0x00,0x5e,0xbc,0xbf,0x5b,0xd4,0x5c,0x54,0x0a,0xbb,0xa9,0xc7,0x09,0xd5,0x2d,0x89,0x0d,0x1c,0x9b,0x76 .byte 0xf2,0xea,0x5e,0x68,0x7f,0xdf,0xce,0xcd,0xdb,0x0e,0x93,0x98,0xa7,0xa3,0xc2,0xb1,0x66,0xa6,0xb8,0xfc,0xcd,0xf1,0x3b,0x7d,0x49,0x8f,0xc6,0x25,0x56,0x3c,0x04,0x46,0xb5,0x12,0x89,0xc1,0x0a,0xc3,0x70,0x42,0x4b,0x4c,0x5c,0x0c,0x7d,0x4d,0x9c,0x4b,0xfd,0x7f,0xa1,0xbc,0xb6,0x5a,0x5b,0xe1,0xa0,0x07,0xa8,0x57,0x95,0x73,0x4e,0x2d .byte 0x88,0x41,0xba,0xcd,0xbe,0x20,0xfa,0x73,0x87,0x7c,0x66,0x8c,0x5f,0x73,0x8d,0xd5,0x6b,0x81,0xd3,0xed,0x4c,0xce,0x70,0x76,0x8d,0x98,0xb8,0xf1,0x31,0xa3,0x10,0x71,0xf8,0x5e,0x20,0xdb,0x9d,0xf4,0x1b,0x54,0xcf,0xe1,0x32,0x3b,0x74,0x91,0xf5,0x0f,0x35,0xca,0x2d,0x59,0x15,0x47,0x78,0xf8,0x2f,0x5f,0xb4,0x23,0xd6,0x8f,0x61,0x85 .byte 0xf8,0x6b,0x6f,0xc6,0xe0,0x04,0x63,0xcc,0x05,0x8f,0x8d,0x8a,0xaa,0xbb,0x8a,0xa5,0x6a,0x04,0x55,0x1c,0x3d,0x73,0x06,0xf4,0x2f,0x07,0xd4,0x84,0x8a,0x6a,0x4c,0x1f,0x4e,0x1b,0xf2,0xfd,0x26,0x7a,0x5b,0xb0,0x5d,0xcb,0x86,0xb4,0xe8,0xb1,0x68,0x41,0xc9,0xb0,0x47,0x72,0xc0,0x2a,0x7f,0xda,0x30,0x79,0x08,0xd9,0xc0,0x38,0xc3,0x46 .byte 0xc2,0xdf,0xb4,0xe8,0xe2,0x3f,0xc4,0xcd,0x32,0x10,0xe0,0x32,0x3d,0x40,0xbf,0x77,0xf5,0x14,0xfd,0x89,0x2c,0x7b,0x51,0x2d,0xdb,0x8f,0x40,0x9a,0xb2,0xa7,0x43,0x9b,0x80,0x1b,0x77,0xb2,0x2c,0xe0,0x56,0xb6,0x51,0xea,0xbb,0xe7,0x45,0x3c,0xdb,0xfc,0xc4,0x98,0x1f,0x9d,0x70,0xfd,0xbe,0x9d,0xac,0x4c,0xe5,0xa9,0x9d,0xbb,0x56,0x24 .byte 0xb3,0x85,0xe7,0x37,0x26,0x2a,0x75,0x5d,0x3d,0xd8,0xb6,0x55,0xa2,0x24,0x44,0xee,0x50,0xb5,0xfd,0xd5,0x3e,0xc3,0x5d,0x78,0xb5,0xc1,0x8a,0x35,0xf9,0x4d,0x57,0xc5,0x77,0xea,0x7a,0x15,0x18,0x3c,0x33,0x1e,0x39,0x9b,0xb4,0x7b,0xc7,0xcd,0xd7,0x13,0x46,0xe3,0xf1,0x21,0xf4,0x8f,0x35,0x66,0xd6,0x0e,0xa1,0x72,0x17,0x0b,0x7a,0x43 .byte 0xa3,0xcd,0x56,0x93,0x9b,0x2b,0xf6,0x7d,0xd5,0xec,0xa4,0x9c,0x6e,0xad,0x5f,0xc4,0xd2,0xe6,0xc2,0xdf,0x59,0x1e,0x92,0x27,0x87,0x39,0xb8,0x5e,0x84,0x3f,0xc9,0x72,0x79,0xcf,0x48,0xcb,0x22,0x4e,0xd8,0x09,0xf8,0x1f,0x76,0x63,0x9b,0x03,0xb4,0x21,0x06,0x86,0xa3,0xe5,0x67,0xf2,0x97,0x09,0x9d,0xba,0x99,0x8d,0x99,0x5d,0x70,0xff .byte 0x48,0x0f,0xee,0xa9,0x3b,0xc6,0xf9,0xc7,0x36,0x84,0x8d,0x66,0xe1,0xa5,0x03,0x60,0xc9,0x07,0x48,0x1c,0xf2,0x62,0x3b,0xf2,0x2c,0x34,0x62,0x99,0xbc,0x6c,0xb3,0x6a,0xbf,0x93,0xfa,0x59,0x33,0x34,0x5b,0xb7,0xf0,0xe0,0xaf,0x17,0x05,0xfe,0xc5,0xe5,0x08,0x8e,0x3b,0x80,0x3e,0xe1,0xe2,0x08,0x43,0x57,0x29,0x46,0x39,0x82,0xfa,0xc5 .byte 0x5c,0x5e,0x24,0xba,0x01,0xbf,0xbb,0x2f,0x14,0x08,0xbc,0x21,0x85,0xf4,0x98,0xaa,0xa8,0xed,0x31,0xd2,0xfd,0x1f,0x32,0x0c,0x4b,0x61,0xbd,0x2e,0x7d,0xcd,0xcb,0x67,0xe0,0x4b,0xd2,0x3b,0x0d,0x80,0x8c,0xdd,0xc4,0x6d,0x3b,0xf0,0x25,0xd3,0x95,0xb4,0x69,0x64,0x51,0x63,0x09,0x0d,0x0f,0x7d,0x63,0x12,0xb5,0x21,0x95,0xad,0xff,0xff .byte 0xc0,0xc7,0x97,0x6b,0x5a,0x24,0x6a,0xa5,0x97,0x40,0xc6,0xb0,0xb2,0x35,0x10,0x2e,0x4f,0x5a,0xb8,0x04,0x80,0x81,0x9a,0x09,0xf3,0xcf,0xa2,0xe9,0xd7,0xc7,0x6a,0x43,0x2b,0x74,0x70,0x26,0x66,0x50,0x1e,0xcd,0x1d,0x9e,0x78,0x7a,0xb6,0x6c,0x4d,0xce,0x9b,0xae,0x9e,0xd1,0x14,0x8a,0x63,0xb0,0x9b,0xd1,0xf3,0xec,0x05,0xed,0x72,0xf3 .byte 0x38,0xfb,0x96,0x31,0xfa,0x12,0xd5,0x97,0x10,0x71,0xc8,0x20,0x5a,0x21,0x62,0xc7,0xdd,0x70,0x41,0x7e,0xf5,0x40,0x5e,0x7c,0xdd,0x15,0xea,0x9c,0xce,0x9d,0x92,0x50,0xf6,0x4a,0x56,0x43,0xdd,0xeb,0xc3,0xfc,0x3f,0x3c,0x8a,0xac,0x70,0x06,0xd4,0x30,0xc4,0x1c,0xfd,0xcf,0x08,0x40,0xfc,0x19,0xb9,0xce,0x25,0x21,0x65,0x8d,0x50,0x24 .byte 0xad,0x17,0xa7,0x42,0x9d,0x19,0x75,0xd0,0x70,0x6f,0xee,0x15,0xb4,0x8e,0xb2,0x70,0xef,0x59,0x20,0x6a,0x2f,0xd7,0x23,0x38,0xe7,0x25,0x0c,0x5c,0x70,0xd0,0x21,0xee,0x1a,0x9e,0x13,0x2e,0x0b,0x63,0x64,0x9a,0xb3,0xd7,0x55,0xf1,0xfb,0xac,0x47,0x4a,0x24,0xa9,0x0b,0x64,0xc5,0x24,0xf1,0xb9,0x82,0xf0,0x93,0x7a,0x32,0x73,0x66,0x17 .byte 0x8c,0x6d,0xaa,0xc2,0xd1,0x08,0xd8,0xfa,0x47,0xfd,0x0e,0xc2,0x9e,0x47,0xce,0x9e,0xbd,0x10,0xb9,0x4c,0x47,0xa6,0x00,0x37,0xaf,0x6b,0x34,0x7e,0x86,0xb2,0x30,0xac,0x05,0x60,0x7b,0xfc,0x6d,0x47,0xab,0x45,0x66,0x81,0x59,0xb2,0x13,0x84,0xc2,0x07,0x64,0x17,0x64,0x20,0x9a,0x62,0xfa,0x0e,0x7b,0xf1,0x3d,0x87,0xa3,0x0d,0xaa,0x99 .byte 0x08,0x96,0x01,0x5a,0x47,0x0c,0x70,0x01,0x5f,0x16,0xdf,0x79,0xfd,0xce,0x47,0x1e,0xe0,0xb6,0xbe,0x52,0x17,0x7f,0xd7,0x05,0x8b,0xa7,0x3c,0xb0,0xe8,0xfb,0x22,0xee,0x7c,0xfc,0xb2,0x33,0xb5,0xd4,0x7e,0x87,0xd3,0xcb,0x22,0x91,0x1b,0x59,0xe5,0xbf,0x79,0xb8,0x90,0xfc,0xf5,0xa1,0xc9,0x3b,0x71,0x47,0x84,0x52,0x32,0x18,0x2c,0x91 .byte 0x81,0xa4,0xfe,0xdc,0x5e,0xf6,0x69,0xbf,0x2a,0x33,0x7b,0xc3,0xc3,0xdb,0xe7,0xe2,0xb4,0x4d,0xc5,0x47,0x62,0x74,0x84,0xb3,0xd5,0x41,0x95,0x94,0x26,0xc1,0x4a,0x27,0xd3,0x46,0xec,0x9f,0xb6,0x0e,0x79,0x1b,0x24,0x5f,0xa4,0xdf,0x33,0x2d,0x89,0xb5,0x96,0x2a,0xb9,0x2c,0x0a,0x1b,0xf2,0xd6,0x38,0xc4,0x73,0x58,0xb2,0xc4,0x9b,0x3e .byte 0x2f,0x73,0xbc,0xdb,0x6f,0xb6,0x7f,0x7e,0x68,0x18,0xc4,0x49,0x41,0xcb,0xff,0x45,0x67,0x1d,0x41,0xa0,0xc3,0x17,0x5c,0x1e,0x4d,0xa7,0xdd,0x25,0x4b,0xe2,0xf7,0xfc,0x53,0x9f,0xf6,0xf9,0x1a,0x73,0xfc,0xc0,0xcd,0x93,0x38,0x4d,0x02,0x4e,0x33,0xf8,0x6f,0x0b,0x5b,0x33,0x52,0xff,0x20,0xe1,0xea,0x37,0x44,0x82,0x26,0xa8,0xf3,0x91 .byte 0x33,0xa5,0x60,0x92,0xfc,0xe1,0x7e,0x14,0x8f,0xd1,0xd6,0xda,0xdb,0x3f,0x37,0xf1,0xf1,0xed,0x91,0x5b,0x60,0x2a,0x9d,0x31,0xd3,0xb5,0xd8,0xe8,0x78,0x8d,0x59,0x0b,0x85,0xdc,0x45,0x02,0x33,0x9a,0x5e,0x43,0x9b,0x54,0x09,0x4f,0xac,0x79,0x7e,0xa7,0x64,0xe1,0xbb,0x67,0x27,0xb7,0x34,0x0a,0xd3,0xa3,0x57,0x0b,0x8c,0x46,0x9a,0xc7 .byte 0xe2,0x4e,0xb1,0xf5,0x2b,0x91,0xbf,0x5d,0xc2,0xf7,0x21,0xb6,0x74,0x42,0xf9,0xfb,0x01,0x97,0x0d,0x65,0x93,0x14,0x6f,0x60,0x5b,0x49,0x33,0x6e,0xb4,0x3b,0x1c,0x02,0x96,0x91,0x2e,0x32,0x29,0x66,0x44,0x52,0xc0,0xab,0x2f,0x27,0x27,0xa0,0x80,0xe6,0xc9,0x63,0x08,0x34,0x23,0x5e,0xb4,0x20,0x24,0x2b,0x84,0x94,0xbf,0x29,0xef,0x86 .byte 0x8a,0xb2,0x1d,0xaf,0x98,0xc0,0xf6,0x81,0xd0,0x81,0x18,0xd1,0x2e,0x53,0xae,0xd2,0xe4,0xc6,0x7d,0x0b,0x13,0x62,0x83,0xe7,0xe5,0xc7,0x93,0x34,0xd3,0xd2,0x4c,0x0f,0x44,0x7f,0x20,0xf0,0x12,0x0d,0x71,0x26,0x45,0x97,0xda,0xee,0x9b,0x69,0x3d,0x32,0x41,0x7f,0x21,0x19,0x42,0xfc,0x8b,0x96,0xb6,0xdd,0xcb,0x7a,0x41,0x57,0x24,0xd6 .byte 0xd6,0xd2,0x39,0xf4,0xad,0x4e,0xfb,0x0e,0x88,0x8e,0x8a,0xd5,0xb2,0xa3,0x7b,0x66,0x66,0xb9,0x47,0x55,0xd4,0xa2,0x4c,0x3e,0xe6,0x85,0x2e,0xaf,0x1b,0x6b,0x9b,0xb1,0xf9,0x66,0xfc,0xdd,0xb7,0xab,0x50,0x43,0xe4,0x5e,0x35,0x0f,0x59,0x8c,0x4f,0x5a,0xc2,0xe2,0xf6,0x65,0x8e,0x7c,0x8c,0x4b,0x0e,0x92,0x71,0x53,0x1d,0xde,0xd3,0xcb .byte 0x6b,0x73,0x56,0xdb,0x7f,0xde,0x51,0x61,0xff,0xbd,0x07,0xdb,0xd4,0xbd,0x78,0x55,0xf3,0xe6,0x26,0x45,0x4a,0x55,0x8c,0xf0,0xc1,0x95,0x2e,0x20,0xc3,0x26,0x6f,0x2e,0x0b,0xba,0x7c,0x5e,0x64,0xc1,0x74,0xb7,0x5c,0x0a,0x84,0x76,0x95,0xe6,0x3f,0x00,0x67,0x08,0x82,0xb0,0x9a,0x24,0x32,0xa7,0x47,0x94,0xf3,0x0f,0xee,0xe0,0xef,0x39 .byte 0x90,0x0a,0x29,0xac,0xe3,0xbb,0xac,0xa8,0xd8,0x5b,0xc1,0xf0,0x5b,0xcf,0xe8,0x29,0x65,0x2a,0xc7,0x2b,0x05,0x05,0xf4,0xce,0xed,0x01,0x75,0x53,0x1f,0x12,0x49,0x73,0xeb,0x43,0xdf,0x6d,0x2e,0x21,0xab,0x43,0x20,0x79,0x69,0xbb,0xc1,0x92,0x41,0x07,0xe8,0x65,0x77,0xde,0x78,0x92,0x3a,0x1d,0x4d,0x93,0xd0,0xa7,0x72,0xb0,0xa4,0x9c .byte 0x7e,0xa7,0x3b,0x60,0x7d,0x6e,0xa9,0x3e,0x25,0xdb,0xfe,0x4f,0x4b,0xb5,0x45,0x2e,0x84,0x49,0x38,0x1e,0x97,0x4c,0xd3,0x2f,0x1f,0x16,0x52,0x9e,0xe4,0xed,0x8a,0x9e,0x98,0xa1,0x19,0x07,0xf3,0xe2,0x1d,0x51,0xb8,0xe9,0xc6,0xaa,0x44,0x4a,0x71,0x21,0xdf,0xab,0xe2,0x31,0x5e,0x6e,0x33,0xe5,0x2d,0xc7,0xf2,0x14,0x92,0x5b,0x2f,0x79 .byte 0x1b,0xd1,0xa7,0xe0,0x00,0x12,0xa0,0x88,0x71,0xfa,0x27,0x86,0x23,0x47,0x35,0xe5,0x95,0xdd,0xae,0xfa,0x22,0xea,0x08,0x83,0x85,0xc4,0x35,0x37,0xdf,0xdf,0xc2,0x41,0xa9,0x44,0x5d,0x30,0x6e,0xa0,0xdb,0xd4,0x97,0x07,0x43,0x9e,0x7b,0x95,0x50,0xf5,0x88,0x9a,0x26,0x9c,0xf9,0x85,0x6d,0x4e,0x92,0x0c,0xbe,0x04,0xd6,0x1a,0x32,0xda .byte 0x47,0x0c,0x04,0xab,0xdb,0xc4,0xd6,0x49,0x61,0xf9,0x4a,0x90,0x5b,0x75,0x98,0xb2,0x69,0xa3,0x01,0x47,0xf4,0x60,0x03,0xc5,0x55,0x71,0x26,0x0f,0xe3,0xc3,0xb7,0xae,0xe9,0x2a,0xe8,0x3b,0x0a,0x24,0xff,0x6b,0x3b,0x6d,0x53,0xf9,0x03,0xf5,0x12,0xd7,0xf8,0xb8,0xd2,0x33,0xfd,0xcc,0x61,0xd7,0x75,0x80,0xa9,0x30,0x38,0x6f,0x78,0x5e .byte 0xa3,0x37,0xa0,0xc6,0xf5,0x84,0x12,0x56,0xdd,0x62,0x24,0xf7,0x8a,0xf6,0x31,0xf5,0xc0,0xd5,0x94,0xa5,0x92,0xfe,0xe5,0x19,0xe7,0x97,0x6d,0x4a,0xbc,0xb6,0xab,0x05,0xa1,0x36,0x9f,0xb5,0x2f,0xf3,0x0c,0x8e,0x61,0xab,0xdc,0xe5,0x2c,0xcc,0xc7,0xd4,0x49,0xf9,0x56,0xea,0xa0,0x93,0x4a,0x0c,0x66,0xfa,0xc5,0xa2,0xfa,0x75,0x31,0x1e .byte 0x27,0x69,0x45,0x8e,0x15,0x8d,0x3c,0xde,0x86,0xd9,0x95,0xc7,0x95,0x7a,0xde,0x97,0xbe,0x8b,0x7a,0xa9,0x8b,0xc5,0x2d,0xea,0x96,0xde,0xf0,0xad,0x5c,0x7d,0xd0,0xfb,0x9a,0x34,0xbe,0x2f,0x35,0x48,0x79,0xd7,0xff,0x6b,0x10,0x28,0x08,0x9d,0xa6,0x7e,0x8b,0xdd,0xdd,0xcb,0xc5,0xc4,0xfe,0x29,0xd4,0x8e,0x36,0xa6,0x2a,0x16,0xbd,0xfc .byte 0x8e,0x67,0x9b,0x9a,0x37,0xe3,0x08,0x11,0xbb,0x02,0x09,0x49,0x15,0x67,0xa3,0x23,0x3b,0xb3,0x2c,0xc0,0x3b,0x88,0x33,0xf7,0x06,0x83,0x86,0x65,0xc8,0xb2,0x2a,0x43,0xd5,0xd8,0xd1,0x65,0x7c,0x87,0xa6,0xb5,0x93,0x3a,0x44,0xc2,0xbd,0xd9,0x78,0x23,0xf6,0xa3,0xff,0x3b,0xbe,0x8b,0xf1,0x74,0x95,0xa0,0x1e,0xa9,0xe3,0xa8,0x27,0xd4 .byte 0x0d,0xb2,0x18,0x90,0x61,0x4a,0xa3,0x8a,0x57,0x5a,0xc3,0x5f,0xf2,0x8a,0x86,0x03,0xa7,0x6e,0xd1,0x48,0xa0,0x1f,0x89,0x32,0x96,0xe6,0x85,0xbc,0xbc,0xd5,0x91,0x89,0xb0,0xb4,0x58,0x0c,0xfe,0x64,0x1c,0x55,0xba,0xcf,0x03,0x49,0x60,0x4f,0x4a,0x50,0x24,0xdb,0x02,0x2a,0x56,0xc1,0x57,0xa6,0x3b,0xbe,0xa6,0x21,0xff,0x8b,0xc3,0x63 .byte 0xb2,0xca,0x47,0xfe,0xd1,0xdc,0x90,0xba,0x24,0x0c,0x15,0x23,0xec,0xf1,0x35,0x4a,0xab,0x3a,0xf3,0xf0,0xf0,0xb4,0x04,0x58,0x16,0x4f,0xf9,0xe3,0x06,0x9b,0x3f,0xd1,0x9f,0x95,0xc7,0xcf,0x0e,0x93,0x87,0x30,0x49,0x0a,0x18,0x8a,0xc4,0x58,0x10,0x07,0x93,0xa7,0x85,0xd5,0x2a,0xe7,0x4c,0xd0,0x54,0x1d,0x8b,0x40,0x3e,0xb9,0x94,0xc7 .byte 0x3f,0xc5,0xad,0x38,0x5a,0xf4,0x87,0x60,0xda,0x5e,0x74,0x5d,0x3d,0x81,0x85,0xba,0x68,0xee,0x71,0xda,0x9e,0x4b,0x6b,0x8f,0x56,0x0d,0xe5,0x31,0x3a,0x03,0x73,0x28,0x4f,0x8b,0x50,0xf8,0x15,0x63,0x42,0x45,0x65,0xb3,0x7b,0x00,0x0f,0x24,0x01,0x09,0x4b,0x74,0x09,0x28,0xdf,0x02,0x36,0x58,0xec,0x15,0x18,0xba,0x45,0x30,0x33,0x95 .byte 0xac,0xe2,0x8d,0x8c,0x20,0xdf,0xba,0x4d,0x8f,0x1d,0x1f,0x05,0x25,0x7e,0x8c,0xea,0xa3,0x92,0x8b,0x19,0xd9,0x51,0xa6,0x35,0x39,0x35,0xd4,0x8b,0x35,0x7d,0x1a,0xc0,0x84,0x3d,0x1b,0x21,0x28,0x3b,0x12,0x73,0x92,0xc7,0xf6,0xf4,0x86,0xc5,0xba,0x9e,0x2d,0x30,0xf0,0x9b,0xe7,0xf1,0x65,0x54,0x66,0x93,0xd2,0x1c,0x59,0x02,0x15,0xb5 .byte 0x56,0x34,0xdd,0x6e,0x28,0xe1,0x54,0xe4,0x94,0x70,0x08,0x2f,0xda,0xa9,0x8b,0x44,0x5a,0x4b,0xca,0x94,0x4b,0x53,0xc0,0x30,0xd1,0x78,0x15,0x60,0x9e,0x92,0xed,0x19,0xe0,0xbc,0x0f,0xbb,0x10,0x64,0xf6,0x84,0xe2,0x4d,0x96,0x57,0x1a,0x28,0xd4,0x6f,0xe1,0x7b,0x4b,0x71,0xb7,0x01,0x7d,0x39,0x8f,0x4b,0x77,0x3f,0x04,0xf1,0x3d,0xdd .byte 0x0d,0x21,0xd9,0x94,0x9e,0x85,0x64,0x6d,0x86,0x24,0x60,0xd8,0xa0,0x87,0xdb,0xde,0x21,0xb7,0xdb,0x36,0xf6,0x6c,0xef,0x51,0x5f,0xf5,0x46,0x26,0x9d,0xda,0x9c,0x2a,0x13,0x58,0x44,0x7b,0xd3,0x91,0xbf,0x7d,0x16,0x11,0x04,0xbb,0x01,0x17,0xbe,0x2b,0x20,0x72,0xb5,0xc6,0x5d,0x27,0x3a,0x10,0x46,0x1e,0x72,0x00,0x87,0xd4,0xb0,0x54 .byte 0x4b,0x9f,0xb8,0xcb,0x52,0xf9,0xeb,0x7a,0x72,0x13,0x80,0xb2,0xdf,0x79,0x46,0xa7,0x0c,0x0b,0x70,0x32,0xf4,0x42,0x66,0x35,0x70,0xb5,0xb5,0x48,0x8a,0x43,0x65,0xaa,0xb8,0x29,0xe3,0xcf,0x39,0x62,0xf1,0xba,0xe6,0xee,0x08,0x13,0xcd,0x25,0x20,0xfa,0xdf,0x29,0xb1,0xe5,0x9e,0xc7,0xc7,0xa5,0xe3,0x74,0xdf,0x3c,0xea,0x33,0xda,0xed .byte 0x6b,0x66,0xd5,0x16,0x89,0x2e,0xe7,0x7a,0x9f,0x60,0xcd,0x96,0x4e,0x81,0xcd,0x31,0x24,0xcc,0x5c,0x24,0x44,0x83,0xe5,0xd5,0x22,0xd0,0xca,0x7c,0x17,0x32,0xa5,0x13,0xaf,0xbd,0xd2,0x91,0x7b,0x3c,0x9b,0x54,0xaf,0x0b,0x51,0xf7,0x80,0x01,0x77,0x96,0x71,0x0c,0xa1,0x6a,0x15,0x91,0xe5,0x20,0xe1,0x0a,0x02,0x94,0xb3,0x2b,0x29,0x4f .byte 0x13,0xbf,0x48,0x61,0x78,0x4f,0x6a,0x82,0x28,0x1b,0x82,0xa7,0xa0,0x28,0xfa,0x7e,0x7b,0x67,0x76,0x7c,0xc1,0x7e,0x89,0x91,0x5f,0x63,0xf7,0x26,0x60,0x10,0x01,0xff,0xe6,0xc7,0xea,0xed,0xce,0x6d,0xe6,0x15,0x4d,0x17,0x84,0x1c,0xc9,0xb1,0x76,0x80,0xa5,0x33,0x2c,0x9d,0xdf,0x20,0x55,0x46,0xbe,0xde,0xc6,0x76,0x7c,0x11,0x31,0xac .byte 0xdb,0x06,0xd0,0xe5,0x29,0xdb,0x3d,0x6e,0x8f,0xbf,0x0b,0x6a,0x6e,0x83,0xcb,0x7b,0x09,0x9d,0x1f,0x53,0x17,0x67,0x99,0x34,0xb2,0x24,0xa8,0x12,0x09,0xf1,0xaf,0xf7,0x58,0xd0,0x0a,0x9e,0x50,0xa1,0x81,0xdb,0xce,0xf3,0x24,0x40,0x45,0xfc,0xa0,0x47,0xd8,0x09,0x8a,0x2b,0x7d,0x74,0x77,0x0f,0xcc,0xf8,0xd7,0xee,0xad,0x0c,0x71,0x0b .byte 0x60,0x0b,0x0d,0x14,0x67,0x57,0xb2,0xde,0xbb,0x4d,0xdf,0x4e,0x60,0xbf,0xdb,0x93,0x87,0x60,0xb3,0x29,0x73,0x45,0xd3,0x3c,0x04,0x15,0x94,0x6b,0x29,0xf0,0x10,0x1c,0xd5,0x4b,0x2c,0xb4,0x43,0xda,0x9d,0x8f,0x41,0xb1,0xe4,0xe4,0x57,0x39,0x74,0xda,0x62,0xce,0x75,0xc8,0x2f,0xab,0xe8,0x93,0x73,0xf3,0xa7,0x4e,0x43,0xf3,0xf2,0xb8 .byte 0x46,0x05,0xac,0xe5,0x1e,0x3f,0xae,0x70,0x8a,0xee,0xff,0x1e,0xe0,0xc2,0x21,0x56,0x14,0xb2,0xb5,0x36,0x1c,0xd6,0x0d,0x1d,0x03,0xd6,0xbf,0x0c,0x2e,0xb2,0xa9,0xf0,0x3f,0x1e,0xbf,0x4f,0xe0,0x82,0x60,0x08,0xc3,0x7a,0xc1,0x0b,0xe2,0xe6,0x28,0x21,0x6b,0x20,0x56,0x74,0x02,0x13,0x43,0x4c,0xe6,0x0c,0xd6,0x82,0x81,0xc6,0xd5,0x63 .byte 0xb5,0xe7,0xbf,0x43,0x25,0xde,0xeb,0xa9,0x34,0xfd,0x8e,0xe5,0x67,0xc8,0xc6,0x5e,0x12,0xba,0xfa,0x66,0x50,0xed,0x61,0xe0,0x94,0x31,0xd6,0x71,0x30,0x2f,0x42,0x71,0x98,0xa0,0x5e,0x31,0x27,0x19,0xe9,0x81,0xd9,0x14,0x7c,0x09,0xa2,0x60,0x31,0x2f,0x9a,0x1c,0x77,0xee,0xf7,0x46,0x93,0x32,0x66,0x82,0xbb,0x50,0xce,0x32,0x81,0x6b .byte 0xe4,0x46,0xc2,0xf9,0x78,0xdd,0x7a,0x19,0xbd,0x0e,0xf8,0x40,0x11,0x85,0xbb,0xe1,0x06,0x82,0xe9,0x88,0x45,0x25,0x35,0x80,0x60,0x0b,0xf0,0xf1,0x6e,0x99,0xab,0x32,0x04,0x90,0xc9,0x50,0x82,0x49,0xc9,0x75,0xf3,0xe4,0x7d,0x22,0x3e,0x48,0x70,0xa0,0xcb,0x33,0x91,0xe6,0x8f,0x2b,0x8c,0xd4,0x9a,0x13,0x0b,0x5d,0x66,0x62,0xf5,0x16 .byte 0x8d,0x90,0x2e,0x84,0x8e,0xa1,0x90,0xfc,0x4b,0x62,0x2d,0xc3,0x1b,0x09,0x6f,0x61,0x90,0xee,0x43,0x2a,0x49,0x0b,0x16,0xea,0xa8,0x09,0x9a,0x4c,0xc1,0x73,0x8c,0xa1,0x98,0x3c,0x99,0x07,0x0c,0x55,0x4f,0x93,0xb6,0xde,0xbb,0xf0,0x26,0x92,0x43,0x63,0x83,0x7e,0xfe,0x8e,0xfe,0xbf,0xe7,0x27,0xb8,0x7d,0xbc,0xba,0xb6,0xfb,0x27,0xb5 .byte 0xfd,0xde,0x3d,0xd7,0xe9,0x46,0x9a,0x17,0xd9,0xd7,0x84,0x9d,0x75,0x58,0x26,0x6c,0x96,0x70,0x74,0xb1,0x46,0x46,0xac,0x48,0xa2,0xce,0x6a,0x95,0xea,0xbe,0xd6,0x87,0xd6,0x48,0xc1,0x70,0x07,0xbc,0xd2,0x26,0xef,0xaf,0xdf,0x04,0xa0,0xe7,0x94,0xc8,0x94,0xcf,0x85,0xf2,0xc1,0x20,0x70,0xac,0xf2,0x0f,0x61,0x3c,0x6a,0xff,0x80,0x5f .byte 0xa6,0x1e,0x7d,0x07,0x1a,0xd4,0xb9,0x5e,0x99,0x35,0x65,0x5c,0xef,0x45,0x59,0x45,0x18,0x6e,0x48,0x5c,0x18,0x96,0xd1,0xda,0xb0,0xfb,0xb7,0x71,0xa6,0x80,0x7b,0x88,0x65,0x73,0xab,0x2f,0xc1,0x8b,0x00,0x1e,0x16,0x9f,0x16,0x50,0x1d,0x7d,0x75,0xee,0x17,0x5f,0x52,0xba,0xca,0xc4,0xe9,0xfb,0xb5,0x1c,0x8f,0xf8,0x7e,0xd8,0xf4,0x7e .byte 0x11,0xb6,0xf5,0x38,0x84,0x37,0x3a,0x24,0xb5,0x07,0x1c,0x7f,0x70,0xaf,0xe9,0x17,0x33,0x89,0x92,0xb1,0xb3,0xec,0x60,0x41,0x61,0xe1,0x0a,0xf9,0x11,0x7b,0xe0,0x7e,0xca,0x32,0x4e,0xa5,0xcd,0xf7,0x95,0x2c,0x6e,0x3d,0x3f,0xe4,0xa8,0x25,0xa6,0xb4,0x6d,0xb4,0xa3,0x5e,0xb1,0x9c,0x6b,0x19,0xc4,0xdc,0x02,0xec,0xfa,0x9d,0x42,0x69 .byte 0x1e,0x48,0x3a,0xfa,0x51,0x43,0x5c,0x14,0xea,0x74,0xec,0xa6,0xf0,0xea,0x42,0xf5,0x32,0xfe,0x74,0x44,0x09,0xcb,0xa4,0xee,0xf8,0xc5,0x9a,0x66,0xbf,0xa0,0xc6,0x73,0xc0,0x29,0xfe,0xec,0x8a,0xa9,0x85,0xa5,0xa7,0x8e,0x54,0xfb,0x87,0x01,0x59,0x9c,0xb2,0x17,0x62,0xd0,0xea,0xe8,0x17,0x4d,0x67,0x82,0xa9,0xfc,0xc1,0x12,0x0c,0xfc .byte 0x3a,0xe9,0xab,0x78,0x70,0x96,0x68,0xe4,0x10,0xd1,0x70,0x61,0xbb,0x07,0xe4,0xdc,0x8c,0xc4,0xae,0x07,0x90,0xd6,0xee,0xa5,0x43,0x0c,0xc5,0xc9,0x0a,0x55,0x42,0x90,0x70,0x18,0x31,0x13,0x3c,0x00,0x89,0xa0,0x30,0xaf,0xa1,0x91,0x33,0xe6,0xd0,0xe1,0xb4,0x99,0x2b,0x27,0xee,0x25,0x95,0x1f,0xfe,0x19,0x3a,0xdb,0x2e,0x59,0x2e,0xa0 .byte 0x12,0xfb,0x34,0x20,0x72,0x34,0xa8,0x2b,0xeb,0xbe,0xdb,0xc3,0xab,0xdf,0x82,0x68,0x37,0x7f,0x76,0xcd,0x15,0xd5,0xf8,0x1c,0x6f,0x7a,0x33,0x51,0x86,0xf8,0x38,0x77,0x96,0x7b,0x15,0xa0,0x2a,0x6f,0xdb,0xad,0xfb,0x0a,0x86,0xac,0xee,0xc2,0xde,0xf3,0x81,0x6b,0xc3,0x09,0x93,0xaa,0x57,0x2d,0x6a,0xff,0xba,0xa0,0x93,0x75,0xc7,0x6e .byte 0xef,0x59,0xaf,0x57,0x32,0xf6,0x0b,0x57,0x60,0x12,0x01,0x20,0xce,0xcb,0x1c,0x88,0xd1,0xe3,0x49,0x88,0xbe,0x5e,0xdf,0xc1,0x81,0x5b,0xf7,0x15,0xac,0xa8,0xc8,0x10,0x2d,0x98,0xae,0x75,0xef,0x4e,0x17,0x10,0x3c,0x95,0x92,0xf6,0xd6,0xd7,0xdd,0x0a,0xe2,0x42,0x40,0x28,0x68,0xc2,0x27,0xac,0xd3,0xca,0xa1,0xc0,0x64,0x05,0x17,0x64 .byte 0x99,0x26,0xd3,0xb3,0xac,0x77,0xf4,0x40,0xd1,0x00,0xa9,0xc6,0x6d,0x45,0x47,0xa3,0x53,0xb7,0x13,0x61,0xc6,0x11,0xc0,0xa4,0xc9,0x2a,0x5a,0xa2,0x3a,0x27,0x0a,0x84,0xff,0xb5,0xb0,0x45,0xfe,0x38,0xb4,0xec,0x95,0x8b,0xd5,0x1a,0xf3,0xc6,0x0b,0x62,0xfa,0xeb,0xd1,0x90,0x11,0x7e,0x36,0xee,0x5c,0xe6,0xb6,0xf3,0x62,0xbf,0xe7,0xc9 .byte 0x77,0x66,0x7b,0xb5,0x1c,0x9e,0x6b,0x21,0x84,0x8c,0x19,0xa7,0xf0,0x3b,0x9d,0xb0,0xfe,0xe6,0x0d,0x64,0xc5,0xdc,0xa2,0x4f,0x7c,0xcb,0x09,0x0a,0x2b,0x9f,0xd7,0x31,0xa5,0xc7,0xba,0x2a,0xc9,0x36,0x1f,0xc5,0x5b,0x8a,0x5b,0x9e,0x10,0x2f,0x2c,0x27,0x11,0x5c,0x9c,0x71,0x45,0x33,0x53,0xed,0x0e,0xdd,0xd0,0xb4,0x28,0x59,0x36,0xf1 .byte 0xa3,0x97,0x20,0xf4,0x27,0x85,0x02,0x01,0x46,0xf4,0xd3,0xbc,0xf6,0xc9,0x33,0xa8,0xe1,0x13,0x99,0x2b,0x74,0x68,0x20,0xcf,0x0e,0xfb,0xba,0x0d,0xaa,0x1f,0x76,0x66,0x6e,0xa7,0x56,0x71,0x80,0x7f,0xe5,0x2d,0x60,0x53,0x5b,0x56,0x2d,0xf1,0x3b,0x95,0x95,0x94,0x8c,0x9d,0x37,0x90,0x60,0x9b,0x29,0x84,0x6e,0x93,0x22,0xb4,0x85,0xd0 .byte 0xea,0x51,0x2d,0x80,0x7d,0xa0,0x50,0x57,0x8e,0xc3,0x58,0x37,0x75,0x05,0x37,0x4a,0xce,0x6e,0x10,0x9a,0x4c,0xce,0xfb,0x8e,0x82,0xed,0xb3,0x93,0x00,0xce,0x38,0x09,0xde,0xa1,0x92,0x23,0xd3,0xe1,0x33,0xc4,0xca,0xcb,0x42,0xc2,0x95,0x04,0x90,0xfd,0x32,0x43,0x6a,0x2c,0x8c,0x76,0xbf,0xca,0xe6,0x60,0xed,0x48,0x30,0x47,0xbc,0xba .byte 0xff,0x00,0xfc,0xa8,0x53,0x17,0x45,0xc6,0xa2,0xc2,0xb3,0x3c,0xf1,0x1f,0x4c,0x95,0x73,0xc5,0xa3,0x6f,0x59,0xd0,0xb3,0x1e,0x12,0x27,0x0a,0xc7,0x70,0x27,0xfa,0x33,0x22,0x6a,0x25,0x3c,0x34,0x83,0x03,0x37,0xb8,0xdb,0xa9,0xc2,0xfb,0x64,0x3d,0x77,0x96,0x37,0x54,0xcf,0x18,0x31,0xce,0xe8,0xc1,0x19,0x85,0x81,0xd2,0x1b,0xcd,0x08 .byte 0xdb,0x53,0xa2,0x61,0x18,0xf2,0xe7,0x33,0x1b,0xe3,0x21,0xd5,0x52,0x8d,0x51,0x2e,0x4d,0xf2,0x95,0x1b,0x5e,0x2f,0xcb,0xe7,0x12,0xc9,0x74,0xce,0x44,0x93,0x57,0x51,0x2b,0x9c,0x03,0x9e,0x20,0x17,0x75,0xf0,0x24,0xb3,0x1f,0x38,0x1b,0xef,0x12,0x8f,0x6f,0x79,0xbc,0xce,0x40,0xa5,0x6c,0x86,0xe9,0x92,0x90,0x53,0xd2,0x28,0x40,0x77 .byte 0x44,0xa0,0x6f,0x11,0xf8,0x7b,0xf1,0xd8,0xd5,0x04,0x88,0x5a,0xf3,0xc6,0xa3,0xbc,0xcb,0xef,0x85,0x56,0x6d,0xa1,0x84,0x34,0xcf,0xaa,0x52,0xb1,0x76,0xed,0x2b,0x67,0x73,0xa7,0xc7,0x2b,0xfb,0x7a,0x9c,0xf9,0xdf,0xfa,0x92,0xd8,0x93,0xe9,0xd6,0xd1,0x66,0xe6,0xed,0x82,0x80,0x00,0xa3,0x40,0x3d,0xef,0xf4,0xf9,0x6c,0x6a,0xaa,0x73 .byte 0x7c,0xc5,0xed,0x3d,0xf5,0xf5,0x9e,0x3f,0x1a,0x9a,0x29,0xd0,0xb4,0xac,0x96,0x55,0x61,0xca,0x37,0xc0,0x60,0xea,0xc5,0xc7,0x96,0x35,0xa0,0xa8,0xab,0xf7,0xeb,0x5e,0x3b,0x7e,0x54,0xb0,0x29,0x50,0xde,0x11,0x9f,0x71,0x3c,0xa5,0x32,0x32,0xe3,0xf8,0x1f,0x19,0x08,0x89,0xe6,0xc7,0x1b,0xb8,0xda,0xe3,0x98,0xd7,0xed,0x76,0x0f,0xa5 .byte 0xc1,0x24,0x0d,0xea,0x10,0x13,0xcd,0x72,0xf4,0x44,0xb5,0x56,0xf6,0x4c,0xad,0xb7,0x43,0x6f,0x0a,0xc0,0x36,0x40,0x48,0xe1,0x4a,0x4c,0x9c,0x23,0xfd,0xde,0xaa,0x79,0x62,0xc0,0xec,0xfb,0x37,0x7f,0xbb,0xbc,0xfb,0x38,0xd0,0xaa,0x4a,0x5d,0x08,0x1c,0xa5,0x3d,0xb0,0x02,0xdc,0x5f,0xfc,0x9a,0x2a,0x6e,0x82,0x4d,0xf8,0x67,0x9d,0x2c .byte 0x6a,0x01,0x55,0xad,0xf4,0x1d,0x02,0x3e,0xc8,0x55,0x42,0xc7,0x39,0x7b,0xcd,0xa8,0x0c,0xd2,0x46,0xc2,0x1a,0x78,0x4a,0xf1,0xb6,0xd8,0x38,0xbd,0x0a,0x9b,0x53,0xdb,0xd8,0xaa,0x1f,0x30,0x9f,0x97,0xf7,0xbf,0xff,0xf1,0x3d,0x1d,0xf2,0x3b,0xc1,0x7c,0x3a,0x63,0x5c,0xb3,0x67,0x02,0xcd,0x67,0x0a,0xf9,0x6e,0xf2,0x36,0x3b,0x36,0xa9 .byte 0xce,0xf1,0x66,0x13,0xb7,0x8e,0xc8,0x36,0x30,0x34,0xde,0x32,0x68,0xc7,0x62,0x60,0x13,0x34,0x7d,0x66,0x32,0x69,0xe7,0x7a,0x0a,0x20,0x24,0x86,0x85,0x72,0x3c,0x7d,0x5f,0xea,0x6c,0xaf,0x70,0xde,0xfe,0x94,0xc2,0x6e,0xb3,0x0f,0xa1,0x2a,0x51,0x40,0xd5,0x5c,0xaf,0xdd,0xd9,0x7d,0x09,0x9b,0x31,0x45,0xae,0x48,0x67,0xfa,0x2d,0x11 .byte 0x77,0xed,0x92,0x79,0x7e,0x27,0x27,0x3b,0x1c,0xa7,0xee,0x88,0xaf,0xfe,0x71,0xa7,0x0e,0x9e,0xa8,0xa5,0x11,0xd2,0x88,0x25,0x12,0x49,0x8a,0x89,0x19,0xc7,0xa8,0xa3,0xa9,0xc6,0x48,0x57,0x21,0x23,0x91,0x07,0xfe,0xb3,0x6e,0x0b,0x70,0x08,0x7b,0x1c,0xe4,0x15,0x13,0x3e,0x8a,0x43,0x80,0x1b,0xb6,0x72,0xd6,0x62,0xfe,0x3a,0x7a,0x5f .byte 0xb9,0xd4,0x00,0xce,0x5b,0x05,0xa0,0x81,0xe5,0x9d,0x56,0x65,0xb6,0xa2,0xb7,0x2f,0xa8,0x95,0xed,0x15,0x70,0x3e,0xb4,0xbd,0x62,0xde,0xde,0x59,0x9d,0x99,0x07,0xe8,0x0b,0x83,0x2e,0x55,0x96,0x63,0x0a,0x06,0x2a,0xf4,0xcb,0xd2,0x72,0x28,0x71,0xc8,0xb3,0x22,0xa0,0x35,0xaa,0x9f,0x73,0x21,0x8b,0xd9,0x25,0x41,0x46,0xbd,0x65,0x74 .byte 0x40,0xcb,0xf4,0x83,0xa1,0xf1,0x73,0x75,0xe0,0xe2,0xee,0x1d,0xc4,0x6a,0x11,0x55,0x50,0x18,0xdb,0x94,0x58,0xbc,0xaf,0x2a,0x18,0x20,0x44,0x15,0xff,0xbd,0x67,0x19,0x64,0x39,0xab,0x35,0x72,0x34,0x83,0x66,0xd5,0x5d,0xcc,0xc7,0x68,0x4f,0x6b,0x05,0x81,0xfc,0x47,0x0d,0xe8,0xbe,0x7c,0xdd,0x27,0xd7,0xc6,0x74,0x9a,0xc1,0x5a,0x28 .byte 0x45,0x58,0x9f,0x52,0xc8,0x8f,0x7b,0x13,0xab,0x9e,0x72,0xda,0xdf,0x10,0x3a,0xe3,0x5f,0x9b,0xf8,0x59,0x2d,0xc5,0x40,0x31,0x12,0xe9,0xc4,0x1f,0x46,0xa0,0x8a,0x98,0xd7,0xbf,0x16,0xe5,0x2d,0xe8,0x51,0xc0,0x8b,0x40,0x9d,0xd6,0x5b,0x4c,0xa5,0x95,0xd2,0x18,0x1e,0x0b,0x7e,0xd2,0xfc,0x0c,0x8c,0x1a,0x8b,0x61,0x45,0x77,0xf4,0x96 .byte 0xef,0xc8,0x13,0x0b,0x93,0x27,0x35,0x9b,0x4a,0xc4,0x86,0x13,0x8e,0x86,0xf0,0xde,0x2b,0x45,0x8f,0x9a,0x22,0x31,0x50,0xa5,0x3c,0x26,0xcb,0x86,0xc1,0x88,0x18,0xb2,0x82,0xe6,0x88,0x71,0x49,0x2a,0x5c,0x2f,0x96,0x49,0x1e,0xc0,0x86,0x8a,0xe9,0x84,0x16,0x74,0xf2,0x29,0x99,0xdc,0x26,0xc4,0x3b,0xc7,0x1d,0xdd,0xbb,0x3a,0xe6,0x7a .byte 0xac,0x06,0xb9,0x91,0x23,0xae,0x46,0x2e,0x4f,0x36,0x42,0x7e,0x84,0xae,0xbd,0x0c,0x21,0x6b,0xa3,0xf0,0xd0,0x1e,0xb1,0xf4,0x38,0xde,0xa0,0x2e,0xd4,0x0d,0xdb,0x00,0x17,0xd4,0x01,0xe7,0x45,0x50,0x58,0x0d,0x0b,0x5a,0xf5,0x02,0x4b,0xeb,0x23,0xc2,0xbd,0x54,0xe8,0x2e,0x92,0xe3,0xc3,0xfe,0x32,0xa0,0xc0,0x09,0x85,0x97,0x74,0x96 .byte 0x60,0x6c,0xd5,0x6a,0xf6,0xee,0xef,0xa5,0x25,0xa8,0x6e,0xb6,0x59,0xa7,0xf9,0xad,0xf5,0x9d,0x45,0x83,0x98,0x33,0x26,0x53,0x89,0xb4,0x6d,0x45,0xb2,0x25,0xb4,0xd1,0x35,0xe0,0x28,0x77,0xcb,0x45,0x5f,0xc4,0x9d,0x8d,0x43,0xbb,0x49,0x68,0x06,0x6e,0x3d,0x48,0x3c,0xdb,0xbc,0x6f,0xfe,0x90,0xdb,0xde,0xe9,0xfb,0xca,0x29,0x7f,0x86 .byte 0xaf,0xdd,0x1f,0xcc,0x81,0x74,0x4f,0xe6,0x13,0x91,0x23,0x8b,0x99,0x04,0xec,0x73,0x7e,0x88,0x1e,0x0f,0x38,0xa6,0xd3,0x21,0xb7,0x22,0x70,0xf9,0xfd,0x28,0x65,0xda,0xa6,0x96,0x04,0x7c,0x62,0xb2,0x94,0xc9,0xe1,0x08,0xb8,0x1b,0xca,0xc7,0x07,0x1b,0x7f,0xc7,0x07,0xfd,0x3a,0x6e,0xb3,0x70,0x0b,0x29,0xa2,0xe4,0x9e,0x78,0xea,0x9a .byte 0xa8,0xe4,0x87,0xe6,0x6f,0x03,0x7c,0x88,0x45,0xf4,0x92,0x11,0xa8,0xfc,0x3c,0xae,0x51,0x66,0x82,0x59,0xb1,0xa8,0x98,0xeb,0x9a,0xb6,0x63,0x9c,0xa5,0x5e,0x10,0xf5,0x63,0x1e,0xa8,0x16,0xbf,0x8d,0xc8,0xbb,0xf7,0xcb,0xd9,0xc1,0x5d,0x2e,0x0e,0x4e,0x65,0x3c,0x20,0x77,0xe7,0x85,0xfe,0x7d,0x84,0xbe,0x1d,0x4d,0x00,0x80,0xc4,0x58 .byte 0x73,0x46,0x3e,0xc3,0x35,0xef,0x92,0xbb,0x8b,0xde,0x95,0xd9,0xf9,0x8a,0x3b,0x2d,0x59,0xab,0xd0,0x08,0x84,0x76,0x81,0xcd,0x5b,0xa0,0x98,0xf9,0xd6,0x12,0xc5,0x8e,0x91,0x18,0xfd,0x35,0x90,0x68,0x7d,0x30,0x5f,0xe9,0xdd,0x3a,0xe6,0xd3,0x94,0xdb,0xa7,0xdb,0xe7,0xb9,0x79,0xfb,0x2a,0x16,0xa3,0x8d,0x0b,0xd6,0x0d,0xb3,0xbf,0x79 .byte 0x51,0x26,0x9b,0x56,0x74,0x04,0x8a,0x20,0x58,0x2c,0xb3,0x60,0xdd,0x1d,0xcb,0x44,0x7f,0x17,0x7a,0x3f,0xe1,0x98,0x73,0xaf,0x21,0x06,0x6f,0x2f,0xbd,0x67,0xc1,0xcb,0x61,0x18,0x87,0xda,0xf2,0xab,0xe6,0xa6,0xac,0xf4,0x81,0x06,0x40,0x5a,0xb7,0x98,0x96,0x1a,0xa7,0x4b,0x0e,0x16,0x9a,0x70,0x0f,0x9c,0x2b,0x22,0xbf,0x09,0x3b,0xf3 .byte 0x49,0xde,0x71,0x07,0xc4,0xa3,0x9a,0x68,0x66,0x56,0x5b,0xad,0x53,0x4c,0xf0,0x03,0xd6,0x25,0x7f,0xbe,0xd1,0x96,0x29,0xe3,0x09,0x8c,0xcc,0xae,0x35,0x2b,0x62,0xfe,0x9f,0x8f,0x0f,0x1a,0x8d,0x91,0x0c,0xc0,0xbb,0xf1,0x85,0xaa,0xf1,0x86,0x9b,0x99,0x7f,0xad,0xbc,0xfe,0xfa,0x33,0xb3,0x59,0x42,0x31,0x83,0x53,0x50,0x07,0xb0,0x61 .byte 0x78,0x38,0x1e,0x4f,0x1f,0xa9,0x32,0x92,0xec,0x2b,0xa6,0xfb,0xf0,0x9b,0x73,0x06,0x45,0x20,0xc3,0x34,0x50,0x73,0xbd,0xdf,0x61,0xb4,0xd3,0x6b,0xde,0x63,0xc4,0xb4,0xbc,0xcf,0x64,0x1d,0xcc,0xf8,0xa0,0x3f,0x42,0x2c,0x06,0xa2,0x2a,0xbd,0xc8,0xc5,0xf6,0xf5,0xdd,0x27,0x0b,0xf7,0x00,0xf6,0x50,0xcf,0x96,0x2b,0x9a,0xf7,0xbb,0x82 .byte 0x71,0xc2,0x95,0x7f,0x2f,0xcf,0xfb,0xb3,0x1d,0x0e,0xf3,0xf6,0x6d,0x77,0x63,0x9f,0x33,0x8a,0xce,0x91,0x39,0x2a,0x08,0x42,0x2a,0x0b,0xfe,0xee,0xf7,0x5e,0x1c,0x97,0x43,0x0a,0x3f,0xbc,0x23,0x20,0xc5,0x59,0xe5,0x84,0xec,0x2f,0xb1,0x1b,0x23,0x4b,0x8b,0xa1,0x56,0x6a,0xd3,0x77,0x09,0xef,0xbc,0x70,0xf9,0x89,0x1d,0x7c,0xd2,0x2a .byte 0xfe,0x2f,0x94,0x0a,0x22,0x2e,0x99,0x57,0x3f,0xe5,0x7c,0xa3,0xeb,0xd3,0x90,0x30,0xce,0x1c,0x94,0xc6,0xf6,0xd1,0x58,0x19,0xdf,0x6c,0xfa,0x3e,0xe5,0x4d,0x5f,0x42,0xb3,0xe5,0x06,0xe3,0xdd,0x65,0xb6,0x35,0x7c,0x9f,0x50,0x6a,0xa1,0xab,0x95,0xab,0x3b,0x6d,0x87,0x07,0xaf,0x4f,0x4c,0xcc,0xd8,0x4d,0xde,0xb8,0xc6,0x0b,0xa0,0x1c .byte 0x7b,0xc5,0xda,0x29,0x92,0x8b,0x54,0x37,0xec,0xbf,0xbe,0xf6,0x99,0x64,0x61,0xce,0xdd,0xdd,0x20,0x97,0x31,0xc3,0x82,0x87,0x86,0x1e,0x6d,0xde,0x6b,0x1b,0x3b,0x82,0xf5,0x40,0xbe,0x63,0x2f,0x03,0x04,0x71,0x2b,0x04,0x78,0x19,0xe0,0xc1,0x90,0xaf,0x52,0xb7,0xb8,0xc3,0xa8,0xa4,0x61,0x88,0xb4,0xf9,0xb5,0xd0,0xfa,0xe6,0x16,0x39 .byte 0x1b,0xfc,0x9c,0xcc,0x9b,0x67,0x58,0x84,0x5d,0x21,0x82,0x06,0x77,0xc8,0xe5,0xa2,0xaa,0x37,0xc8,0x83,0xf2,0x59,0x85,0x6f,0xb4,0x13,0x8d,0xe8,0x57,0xe6,0xe6,0x83,0x10,0x4e,0xca,0x4e,0x0e,0xd9,0x15,0x58,0x05,0xaa,0xb0,0x61,0xd1,0xfe,0x19,0xc1,0x2e,0xd8,0x32,0x9e,0x19,0xf5,0x30,0x35,0x2b,0x4a,0x4b,0x4e,0xb8,0xaf,0xc5,0x4d .byte 0x48,0x9e,0x66,0xd7,0xb6,0xd3,0xd8,0x77,0x12,0x0d,0x90,0x48,0x5b,0xee,0x7d,0xb2,0xcc,0x48,0x9a,0xe3,0x0a,0x1f,0x3a,0xf5,0x4f,0x3d,0x40,0x38,0x14,0x20,0x7c,0x70,0x20,0x2a,0xea,0x55,0x97,0x45,0xca,0x7d,0x26,0xd4,0x00,0x67,0xeb,0x2c,0x92,0x9b,0xb1,0x1e,0x79,0xb0,0x57,0x68,0x2b,0x42,0x46,0x26,0x91,0x96,0xc8,0xac,0x2f,0x28 .byte 0x74,0x1d,0xf9,0xfa,0x06,0xd4,0x64,0xba,0xe6,0x07,0xae,0x11,0x78,0x75,0x3b,0xc8,0x2f,0x10,0xc6,0xe2,0x93,0x27,0x6d,0x71,0x7a,0x17,0x77,0x45,0xd7,0xe2,0x91,0x6b,0xaf,0xdf,0x5f,0x47,0x56,0xc0,0xb9,0x09,0x22,0x44,0x43,0x0c,0xa7,0x6b,0xc2,0x05,0x50,0x5a,0xb9,0x2d,0x86,0xea,0x99,0x96,0xd5,0x4d,0x90,0x4e,0x7c,0xc1,0x92,0xbb .byte 0xb6,0x06,0xe9,0xaf,0x38,0x6e,0x00,0xe9,0x19,0x4b,0x2d,0x2a,0x17,0x5f,0xb5,0xc8,0xec,0x65,0xb6,0x6d,0x67,0x42,0x79,0x92,0x13,0x17,0x76,0xa5,0x4e,0x3a,0x66,0x13,0x58,0xcf,0xa7,0x4b,0xb9,0x8e,0x84,0x66,0xb8,0x4b,0x66,0xd3,0x87,0x6a,0x65,0xd4,0x0a,0x97,0xe8,0x15,0x32,0x15,0xd4,0x2e,0x9a,0x80,0x40,0xfc,0x02,0x6d,0x4f,0x9e .byte 0x68,0x3f,0x18,0x61,0x70,0x38,0xb7,0x5a,0xda,0xe1,0x74,0xdd,0x79,0x71,0x95,0x4b,0x50,0x19,0x0c,0x93,0xc9,0x1d,0x02,0x66,0xa2,0x35,0x88,0x91,0x9e,0x4b,0x62,0x5f,0xfe,0x65,0x09,0xf7,0x71,0x98,0xa3,0xcd,0xe1,0x2b,0xcf,0x2e,0x5f,0x38,0x41,0x47,0x1b,0x94,0x61,0x5d,0xce,0xbc,0x4b,0x69,0x70,0x7e,0xe7,0x74,0x8a,0x69,0x99,0xe8 .byte 0x58,0xda,0xd4,0xb4,0xae,0x3c,0xae,0xa0,0x78,0xed,0x72,0x51,0xb7,0xc1,0x95,0x20,0x43,0x34,0x77,0x12,0xa2,0xc5,0xe9,0xad,0xb4,0x6d,0x15,0x0d,0x3c,0x1b,0x2e,0x45,0x42,0xd6,0x7a,0x4f,0xe9,0x0e,0xe3,0x70,0xbd,0xe8,0x10,0x31,0xa9,0x09,0xc7,0x32,0x0c,0xcb,0x3e,0x54,0x6d,0x52,0xc2,0xed,0x57,0xbf,0xd1,0xbb,0xfe,0xd8,0x34,0x08 .byte 0x40,0xc1,0xb8,0x86,0xf7,0x0c,0xa8,0x3c,0x11,0xbf,0x96,0xc2,0x86,0x64,0x99,0x27,0x2a,0x68,0x3b,0x29,0xca,0xc2,0xd6,0x59,0xf7,0x77,0x66,0x91,0x26,0x96,0x87,0x84,0xf1,0x01,0xe4,0x04,0x82,0xd4,0xf0,0xe5,0x72,0x40,0x3a,0x5b,0x0b,0x65,0xa1,0x78,0x91,0x8a,0x7e,0x16,0x82,0x3c,0x00,0x07,0x19,0x14,0x3d,0x01,0xc6,0xa9,0x62,0x83 .byte 0x65,0x6a,0x66,0x02,0x6c,0xa9,0x77,0xaa,0x91,0xe1,0xbc,0x85,0x73,0xad,0xeb,0xca,0x01,0x2f,0x40,0xeb,0x14,0xa5,0x3f,0x78,0xec,0x90,0x39,0xab,0xc2,0x9d,0xce,0x55,0xf2,0xaf,0xbc,0x45,0x56,0x92,0x18,0x2b,0x74,0x15,0x7d,0xbd,0x77,0xdc,0xa3,0x56,0x8f,0xa5,0xf1,0xe4,0x8a,0xb4,0xbd,0x8b,0xa9,0x73,0x23,0x93,0xe3,0x84,0x1a,0x15 .byte 0xae,0x28,0x8d,0x9e,0xca,0x2d,0xd9,0xfd,0x40,0xd0,0x92,0x2f,0x51,0x76,0xde,0x59,0xb7,0xc8,0x88,0x16,0xc1,0x7c,0xb7,0x6f,0x07,0x95,0x53,0x38,0xf8,0x42,0xea,0x80,0x0a,0xd7,0x43,0xa2,0xbc,0xd1,0x39,0xf7,0x99,0xd5,0xb9,0x17,0x8d,0xbe,0x8f,0x6f,0x5b,0x66,0x52,0x8e,0x28,0xfd,0x21,0x4f,0x16,0xef,0x83,0x83,0x62,0x50,0x6c,0x63 .byte 0xeb,0x27,0xf5,0x9c,0x59,0xe6,0xba,0xae,0xf0,0xcf,0xba,0xad,0xcc,0x04,0xba,0x7b,0x11,0x10,0xfb,0xc3,0x97,0x68,0x3c,0xff,0x9c,0x46,0x16,0x75,0x06,0x47,0x52,0x55,0x40,0x8a,0x2f,0xb6,0x88,0xc3,0x6f,0xef,0xce,0xc5,0x38,0x98,0xf8,0x65,0x64,0x5c,0xeb,0xa4,0x86,0x90,0x83,0xf9,0xd1,0xc5,0x0b,0x02,0x9c,0x76,0xe0,0x0a,0xc1,0x48 .byte 0x1d,0x2b,0x6a,0x40,0x24,0xdf,0x67,0x6c,0xb1,0xf8,0x86,0x5c,0xc3,0x5d,0x8d,0xb2,0x68,0x54,0x76,0x42,0x77,0x71,0xdc,0x72,0xed,0x00,0xa0,0xc7,0x30,0x86,0xae,0x0e,0x2e,0xa9,0x39,0x19,0x02,0xb3,0x21,0xe6,0xd4,0xab,0x5a,0x1b,0x4e,0x8a,0x2f,0x3f,0x09,0xdf,0x4e,0x82,0x79,0xa5,0x98,0x94,0x1c,0xb8,0xb6,0xa1,0x25,0x86,0x5c,0xdd .byte 0x4e,0x71,0x4b,0x6b,0x5a,0x24,0x7b,0x32,0x07,0x7e,0xcc,0xad,0x26,0x3c,0x85,0xfd,0x2a,0x7e,0x99,0x5a,0xa7,0x5f,0x51,0x23,0xa1,0x19,0x33,0x58,0xd9,0xbd,0x37,0x9d,0x0f,0xf0,0x9b,0xc7,0xb8,0xdf,0x35,0x32,0xe6,0xce,0xac,0x93,0x1e,0xef,0xa6,0x83,0x80,0x10,0xed,0x5e,0x86,0x7a,0xda,0x85,0x18,0xbd,0x1c,0x9e,0x7d,0x25,0x0d,0xbc .byte 0x7d,0x08,0xa4,0xaf,0xee,0x2b,0xc5,0xd4,0x38,0xe0,0xa9,0xd3,0x8e,0x28,0x36,0x2e,0xdc,0x2e,0x0d,0xe0,0x62,0xcb,0xd1,0x78,0xff,0x22,0xa0,0xbd,0x36,0xed,0x44,0x9e,0xdf,0x1f,0xca,0x07,0xbc,0x04,0x00,0x0d,0xda,0x56,0x9d,0x31,0xcb,0xc4,0x5a,0x05,0x88,0x82,0xa4,0x2e,0xe0,0x09,0xa1,0x0d,0x68,0x02,0x76,0x26,0x03,0xc4,0x8b,0xca .byte 0x86,0xfe,0x26,0x07,0x17,0xc4,0xee,0x93,0x67,0x4a,0xa8,0x84,0xa4,0x44,0x5c,0xe3,0x8b,0x02,0x59,0xba,0x7e,0x7b,0x19,0x1a,0x42,0xf9,0x6f,0x78,0xcb,0x6b,0xf2,0xd6,0x4b,0xbe,0x7a,0xaa,0x6e,0x9a,0x6c,0x86,0xf4,0xf1,0xb3,0x4a,0xe9,0x7b,0xe5,0x36,0x75,0x02,0xc4,0x6f,0xfb,0xe6,0xbf,0x0d,0x2a,0xed,0x5e,0x86,0xf5,0x8a,0x2c,0xed .byte 0x8c,0x83,0xd4,0xa4,0x52,0xe5,0x08,0xe5,0x4a,0xac,0xa0,0xa7,0x17,0x91,0x9e,0x48,0x59,0x94,0x59,0x60,0xac,0x79,0x62,0xcb,0xd0,0xe6,0x72,0xd2,0xca,0xd1,0x05,0xc7,0x5f,0x31,0xd0,0x8d,0xe8,0x55,0x98,0x8c,0xd2,0xc6,0x4a,0xf5,0x2a,0x5d,0xc9,0x2d,0x16,0x06,0xe1,0x6d,0xa8,0xf0,0xc4,0x4d,0x41,0x33,0x3d,0xc4,0xbf,0xba,0xc6,0xf1 .byte 0xc4,0x92,0x17,0xff,0xa8,0x3f,0x2d,0xf1,0x90,0x2a,0xae,0xf5,0x64,0x2a,0xa5,0x08,0xac,0xbe,0x48,0x6a,0x27,0x05,0x91,0x33,0x7b,0x6d,0x0b,0x58,0xca,0x9b,0x29,0xf1,0xa8,0x18,0x1a,0xe4,0x9a,0xcc,0xbd,0x2a,0x09,0x15,0xe3,0x72,0xdc,0x80,0x60,0x8d,0x4a,0xac,0x3e,0x35,0xc4,0x94,0x7e,0xc8,0x78,0x43,0x9b,0xfc,0xe5,0xe7,0x57,0x83 .byte 0x21,0x49,0x74,0x9f,0x9c,0x10,0x77,0x3b,0xda,0x11,0xe8,0x13,0x88,0x71,0xb2,0xa5,0xf1,0xa8,0x6c,0x19,0xee,0xc6,0x8a,0x96,0xe2,0x34,0xec,0xbc,0x4c,0x7e,0x72,0xdc,0xde,0xbf,0x09,0x0a,0x1e,0xce,0xbc,0x10,0xbe,0xfd,0x8d,0x0c,0x5c,0x40,0x4f,0x30,0x82,0xe3,0x99,0x72,0x91,0x6f,0xc8,0x3c,0x1c,0xe2,0xd3,0xae,0xbf,0x09,0x3a,0xec .byte 0x28,0x81,0x10,0x80,0xf6,0x2e,0xb9,0x29,0xde,0x00,0x2c,0xf6,0xd9,0x03,0x47,0xea,0x0f,0x3c,0x02,0x92,0x80,0x50,0x76,0x2b,0x60,0x0e,0x15,0xbd,0x69,0x10,0x7b,0xce,0xbf,0x40,0x15,0xd3,0xd9,0x4c,0xd2,0x6a,0x6e,0x10,0x18,0x00,0x34,0x55,0x8d,0x66,0xaf,0xf7,0x14,0x12,0xe8,0x67,0x4d,0xe7,0xfe,0x4d,0xc1,0xc5,0x05,0x6f,0xcf,0x16 .byte 0x1b,0x65,0x32,0xab,0x89,0x86,0x3e,0xe5,0x3e,0xba,0x8a,0xc1,0x5e,0x41,0xbb,0x23,0x76,0x8c,0xea,0x77,0x6e,0x1f,0x3c,0x4c,0xe4,0x98,0x9c,0xe5,0x73,0x0c,0x08,0x48,0x83,0xb6,0x24,0x24,0xe6,0xac,0xc2,0x4e,0xe1,0x67,0x33,0x01,0x33,0x85,0x59,0x34,0x35,0xd7,0xdd,0xc4,0x04,0xff,0x53,0x78,0xd4,0xb5,0xe9,0x65,0x88,0xfc,0x41,0x6f .byte 0x06,0xfb,0xfa,0x58,0x67,0xa1,0x1d,0x78,0xd9,0xad,0xf2,0x92,0x34,0x87,0x8c,0xd2,0x96,0x95,0x1d,0xc7,0x52,0xcb,0x64,0x5f,0xb2,0xe7,0x3c,0x31,0xe0,0x61,0xbb,0xab,0x34,0xef,0xd4,0x4f,0xe6,0x0b,0x3e,0x58,0x53,0x30,0x92,0xba,0x8c,0x72,0x88,0xb5,0xf5,0x8d,0xc2,0xa2,0xdf,0x86,0x7f,0x15,0xeb,0x8f,0xc1,0x62,0xe0,0x56,0x92,0x00 .byte 0xea,0xf7,0x27,0x73,0xac,0x9f,0x1d,0x13,0xcd,0x33,0xb3,0xd5,0x31,0x29,0x42,0x1e,0x28,0xc2,0xfd,0xd1,0xec,0xb0,0x32,0x83,0xec,0x22,0xda,0xae,0xab,0x7b,0x4f,0x76,0xa9,0xa0,0x0f,0xc3,0x39,0xb1,0xfe,0x63,0x2e,0x72,0xb9,0x41,0x03,0xfd,0x7a,0x33,0xbd,0x1e,0x0e,0xe1,0xd3,0x2b,0xbc,0x68,0x8c,0xd9,0x12,0x02,0xf7,0x9e,0x7f,0xc8 .byte 0x30,0xa2,0x60,0xc0,0x85,0x2a,0xae,0xfd,0xed,0xd0,0x88,0x66,0xef,0xfc,0xe8,0xaf,0x41,0xda,0xd1,0x99,0x8a,0x4e,0x7d,0xaa,0xf5,0x9a,0x56,0xac,0x18,0x14,0xf7,0x6e,0xea,0xad,0xcd,0xed,0x19,0xa6,0x28,0x41,0x2b,0x1d,0xcb,0xa5,0x84,0xfd,0x34,0x84,0x2a,0x05,0x8c,0x74,0x6a,0x43,0x34,0x28,0xf4,0x35,0x60,0x91,0x32,0xd2,0x66,0xc6 .byte 0x3b,0xaa,0xde,0x8a,0xdc,0x73,0xab,0x98,0xeb,0xeb,0xe9,0x97,0xd6,0xe2,0xf4,0xbf,0xbf,0x45,0x62,0x75,0xb2,0xd3,0xad,0x38,0x62,0xdd,0x9b,0x63,0xe1,0x27,0x6a,0x25,0xbf,0xe9,0x26,0xc1,0x9f,0x0e,0x92,0xeb,0xb9,0xdb,0x72,0xea,0xcc,0x11,0x4f,0x4d,0x2a,0x2a,0x7f,0xfd,0xf5,0x2d,0xdc,0x53,0xdf,0x56,0xcf,0x3e,0xf6,0x48,0x1b,0x5d .byte 0x51,0xb8,0x9d,0xc6,0xe3,0xd5,0xcb,0x0d,0x0b,0xb9,0x6e,0x34,0x07,0x90,0xdc,0xe7,0xd1,0x61,0x85,0x6b,0x58,0xd6,0xa2,0x58,0x5f,0xf4,0x6c,0xb9,0x3a,0x11,0x1e,0x2a,0x03,0x80,0x8d,0xc8,0x8c,0x24,0xd1,0xa2,0x53,0x63,0x50,0x66,0x01,0xed,0x0e,0xd3,0xfb,0x57,0x59,0x31,0xeb,0x2e,0x37,0xff,0xc0,0x28,0xfc,0xbb,0x6f,0x61,0xfd,0x69 .byte 0x35,0x94,0xa9,0xed,0x5e,0xca,0xa6,0x37,0x5a,0x01,0xd9,0xcf,0xe4,0x91,0xb3,0x2e,0x2a,0x97,0x46,0x46,0x26,0xd9,0x85,0x01,0xfa,0xcb,0x93,0xdf,0xb4,0x2a,0x86,0x81,0x93,0x2f,0x1b,0x56,0x3f,0xe5,0xd9,0x90,0x2e,0x2b,0xe4,0xc8,0x76,0x96,0x1b,0x91,0x9c,0x6a,0x17,0x42,0x1b,0x63,0x74,0x55,0xbc,0xe0,0xed,0x2e,0x6c,0xd0,0x61,0x37 .byte 0x5b,0xac,0x66,0x2e,0x2b,0x3d,0x47,0xa9,0x7a,0x7d,0xa6,0xfa,0xb4,0xa8,0x18,0x4b,0x65,0x31,0xbb,0xe3,0xe6,0x0e,0x76,0x91,0xe2,0x54,0xfd,0x4a,0xa5,0x35,0x70,0xe4,0xd0,0xbd,0x59,0x75,0xc8,0xca,0x46,0x58,0xf4,0xe5,0x57,0xd2,0x12,0x93,0x14,0x78,0x5f,0xe6,0xee,0x96,0x6e,0xe9,0xf6,0x10,0x41,0x61,0x38,0xf8,0x1e,0x5b,0x69,0x2c .byte 0xc1,0x54,0x8e,0x12,0x23,0xa7,0xc0,0x42,0x18,0x3e,0x4c,0x7b,0x90,0x96,0x03,0x3e,0x4d,0x5c,0xac,0x4d,0xe6,0xed,0xcd,0xe2,0xf5,0x35,0x0c,0xde,0xf7,0x70,0x07,0xa9,0xb1,0xe8,0x0c,0xf3,0x64,0xec,0xf5,0x18,0x0f,0x5a,0x70,0x03,0xcf,0x38,0xe9,0x38,0x83,0x13,0xaa,0x9c,0x6b,0xcd,0x5f,0x4e,0x03,0x04,0x33,0x0c,0x27,0x8c,0x5e,0x3e .byte 0x69,0x49,0xc7,0xc3,0x5f,0x1c,0x5f,0x78,0x55,0x2a,0x40,0xec,0xe9,0x80,0x66,0xb9,0x05,0x60,0xb6,0xa2,0xe1,0x29,0x36,0xe3,0xb7,0x87,0x09,0x3c,0x2f,0x42,0x12,0x53,0xf0,0x6f,0x4b,0xa3,0x05,0x35,0x8b,0xcd,0x18,0xbe,0xe7,0xa2,0xce,0xda,0xbc,0x83,0x0f,0x68,0xc0,0xdc,0xbb,0xa4,0x4a,0x7b,0xae,0x74,0x1f,0xe6,0x13,0x82,0x2f,0xa1 .byte 0x88,0x4f,0x64,0x7e,0x16,0xad,0xbb,0x0d,0x41,0x1c,0xb8,0x3b,0xba,0xc2,0x7a,0xed,0x05,0x54,0x85,0x41,0xf0,0xeb,0xa4,0x0c,0xb7,0x51,0xf5,0x9c,0x36,0x0e,0xea,0x13,0x03,0x91,0x9a,0x60,0x68,0xac,0xc3,0x34,0xc6,0xf1,0xdf,0xb3,0x0f,0x76,0x88,0x9a,0x62,0x01,0xf3,0x15,0xf0,0xaf,0xd7,0x5a,0x66,0x83,0xa8,0x31,0xa5,0x5f,0x97,0x87 .byte 0x10,0xe7,0xb9,0x4d,0xe5,0x87,0x64,0xb1,0x9d,0x9d,0x21,0xcb,0xab,0xeb,0x4b,0x3d,0x10,0x3d,0x9d,0x49,0xfe,0xc2,0x22,0x11,0x23,0x8a,0x0a,0x16,0x12,0xc5,0xed,0x24,0x16,0xbc,0x16,0xd3,0x03,0xa0,0x23,0xe1,0xa1,0x57,0x78,0x9d,0xb8,0x08,0xb9,0x41,0xeb,0xb9,0x8a,0xf6,0x1f,0x70,0xa1,0x99,0xe8,0x93,0x78,0x55,0x76,0xae,0x17,0x7a .byte 0x87,0xb2,0x53,0xf2,0xe9,0xbb,0x4a,0x96,0x32,0x8d,0x59,0x23,0x86,0xb3,0xba,0xaa,0xa2,0x68,0x56,0x5d,0xc9,0x83,0x29,0xe8,0x24,0xf1,0xc4,0x02,0x87,0xcf,0x58,0xeb,0x08,0xaf,0xf1,0x00,0x56,0xa5,0xd6,0x97,0x34,0x49,0x9e,0x93,0x39,0x66,0xf9,0xd9,0xfc,0x0c,0x16,0x9b,0x1f,0xe4,0x7e,0xec,0x03,0x5e,0x53,0xdf,0x2f,0x55,0xa0,0x05 .byte 0x36,0x7f,0x4a,0x4e,0x48,0x76,0xe5,0x5f,0xeb,0xe3,0x00,0x3e,0x25,0x23,0x12,0x44,0x92,0x01,0x44,0xb7,0xb3,0x46,0xb2,0xe4,0xcc,0xcb,0xa3,0x53,0xcd,0x64,0x10,0x65,0xc7,0x6c,0x92,0x07,0x39,0xf8,0x4c,0x6d,0x2c,0x33,0xb5,0x98,0x1b,0x74,0x35,0xad,0x2a,0x35,0x6c,0x51,0x47,0xee,0x1d,0xb5,0x70,0x36,0x2f,0xd4,0x23,0xdc,0xf5,0x4a .byte 0x66,0xa4,0x83,0x50,0xc5,0xb7,0x59,0x96,0x22,0xec,0x5d,0x33,0x7e,0x9d,0xcd,0xe6,0xd4,0x01,0x61,0xaa,0xb0,0x47,0x05,0x11,0x6b,0x27,0xae,0xd2,0xf1,0xe6,0x49,0xe0,0x95,0xa1,0xfd,0x76,0xa2,0xdb,0xa4,0x9d,0x02,0xe6,0x42,0xe0,0x2e,0x36,0x84,0x0f,0x31,0x1e,0xb9,0x8d,0x11,0xc0,0xb8,0xd5,0xcf,0xc8,0x0d,0x97,0xc0,0x5e,0x0b,0xf0 .byte 0x16,0xad,0xc0,0x9e,0x3e,0x38,0xd1,0xbf,0x47,0x77,0x9c,0xcd,0x6b,0xae,0x1c,0x8a,0x51,0x75,0xc4,0x74,0x78,0x5b,0x9d,0x16,0xec,0xc6,0x4b,0x1f,0x53,0xff,0x4e,0xb0,0x1b,0x03,0xdd,0xbf,0x32,0x32,0x55,0xe9,0xcc,0xe7,0xc0,0xde,0x01,0xbd,0x7d,0xb3,0x29,0xae,0xed,0xb8,0x5b,0xa0,0x96,0xc0,0x45,0xb2,0x5d,0xf7,0xa6,0x43,0xc7,0x56 .byte 0x4a,0xc0,0x16,0xbf,0x0e,0xf0,0x77,0x94,0xd0,0x52,0x7e,0xb3,0x45,0xd2,0x16,0x30,0x11,0xc0,0xd6,0xd3,0x61,0xfe,0xdb,0xed,0xa6,0x16,0x4f,0x88,0xce,0x17,0x64,0x02,0xa0,0xc1,0x42,0x47,0x19,0x0b,0xc6,0xea,0x9b,0xf1,0xf0,0xab,0x7c,0xd5,0xf9,0x73,0x9b,0xcc,0xc4,0xce,0x69,0xaf,0xc1,0x48,0xbc,0x13,0xe9,0xad,0xdc,0x6b,0x15,0xb7 .byte 0x3b,0x85,0x05,0x17,0x66,0x35,0x05,0xe6,0xf7,0x99,0xfd,0x04,0x0f,0xd3,0xbd,0xc5,0x0a,0x3f,0x7c,0x49,0x63,0xe5,0xe3,0xa7,0x7a,0x03,0xe3,0xb1,0x3c,0x7d,0x4b,0x04,0x2e,0x94,0x2d,0x9a,0x55,0x18,0xd1,0x7c,0xc5,0x06,0xbc,0xf2,0x68,0xa9,0x9a,0xd9,0xf5,0xb4,0x15,0x66,0x0a,0x8c,0x68,0xa3,0xb6,0x41,0xb1,0x57,0x55,0xac,0x5c,0x2a .byte 0xff,0xb0,0x30,0x11,0x31,0x1f,0xe4,0x05,0x91,0xe3,0xf9,0x2d,0x9a,0xd6,0x2a,0x73,0xdf,0x34,0x1d,0xf0,0xbe,0x46,0x60,0xce,0xa7,0x81,0xf1,0x8b,0x52,0x42,0x1d,0xa7,0x97,0x8c,0x92,0xe2,0xe2,0x00,0x5a,0xce,0xc2,0x70,0x52,0x02,0xa4,0x35,0xb6,0xe8,0x3f,0x22,0x75,0x4e,0xf0,0xc8,0x08,0x54,0x1b,0x52,0x21,0xe2,0x26,0x11,0x92,0x98 .byte 0xb1,0x26,0x23,0x58,0xeb,0xb8,0x97,0xcd,0xb3,0x2d,0x9b,0x4b,0x6e,0xcf,0x28,0xd5,0x0f,0x12,0x89,0x1f,0x90,0x7c,0x96,0x98,0xee,0xc0,0x29,0xed,0x6d,0xcb,0xca,0x07,0x10,0xe0,0x23,0xe4,0x28,0x97,0x8e,0x47,0x46,0x4a,0xde,0x6c,0x3b,0xff,0x75,0xfc,0x38,0x78,0xe8,0x27,0xba,0x5e,0xd2,0x9a,0xa4,0xf6,0xcd,0xef,0xf4,0x74,0x61,0x8f .byte 0x20,0x99,0x60,0x2a,0x97,0x42,0x34,0xa8,0x70,0x5d,0xe7,0xa6,0xc9,0x80,0xc8,0x15,0x11,0x5b,0xf0,0x50,0x5f,0x44,0xa2,0x01,0x63,0x32,0x11,0x89,0xaa,0x36,0x38,0xc4,0xba,0x08,0xbf,0x2a,0x9c,0x69,0x2b,0x84,0x2c,0x14,0x97,0x60,0xc3,0x5d,0x04,0xe3,0x9d,0xcb,0x9a,0xa2,0x15,0x3f,0xa6,0x28,0x24,0xde,0x00,0xee,0x1e,0x11,0x95,0xb4 .byte 0x12,0xb8,0xff,0x3e,0x31,0xf2,0xc4,0x06,0xf1,0x9c,0x44,0xc5,0x59,0xa5,0xf8,0xc0,0x33,0x59,0x97,0x2d,0x6d,0x97,0xdb,0x33,0xba,0x30,0xd2,0xa9,0xc2,0x1e,0xb6,0x8f,0x3d,0x83,0x4c,0x82,0x04,0xeb,0x50,0xdd,0x42,0x31,0x1d,0x3e,0x35,0xb4,0x32,0xaf,0x16,0x50,0xb3,0x05,0xbe,0x8a,0x80,0x14,0x8a,0x3f,0x2f,0x8d,0x70,0xc0,0x60,0xa6 .byte 0x5d,0x8e,0x38,0x94,0x47,0xab,0x1b,0xf6,0x9e,0x9e,0xf1,0x84,0xa5,0xdb,0xab,0x6a,0x71,0xc5,0x36,0x86,0xe0,0xb5,0x7e,0xd5,0x7f,0x1b,0xdb,0xa0,0x9d,0x1a,0xe3,0x84,0xc9,0x59,0xac,0x24,0x2b,0xa5,0x18,0x70,0xf9,0xf0,0xe8,0x2c,0xad,0x54,0x62,0x99,0x2a,0x56,0xbf,0x76,0x89,0x0e,0x93,0x55,0xea,0x83,0xc7,0xa1,0x2d,0x6c,0x4d,0x00 .byte 0x9f,0xa9,0x9d,0x97,0x4e,0x76,0x20,0x9d,0x09,0x24,0x97,0xfe,0xa6,0xd6,0xda,0x66,0x39,0x27,0x0a,0x05,0x52,0xee,0xc8,0x70,0x0a,0x65,0xea,0x0f,0xa3,0xe0,0x10,0xbb,0xe4,0x87,0xb1,0x18,0x75,0x72,0xe7,0x6b,0xd6,0x88,0x91,0x6c,0xd0,0x7c,0xda,0x10,0xdf,0xd6,0xc7,0xcd,0x33,0x7d,0x28,0x9d,0x6d,0x2c,0xc2,0x59,0xc3,0xf5,0xb4,0x55 .byte 0xe2,0x8b,0x65,0x92,0x4b,0x49,0x62,0x3a,0x49,0x00,0x62,0x79,0x9c,0xbd,0x99,0x7a,0x7f,0x71,0x19,0x90,0x77,0x56,0x94,0x2d,0xce,0x93,0x69,0xa6,0x56,0xde,0x75,0xdb,0x43,0x0f,0xae,0x1a,0x93,0x79,0x6c,0x2c,0x03,0xe3,0xfc,0x7d,0x90,0xd6,0x10,0xca,0x97,0x53,0x63,0x9e,0x6c,0x13,0xcf,0x4b,0x1a,0x76,0xf4,0x5b,0x57,0x27,0x20,0x76 .byte 0xe5,0xee,0xfc,0x5d,0x12,0x67,0x88,0x37,0xf4,0xb5,0xf5,0x39,0x23,0x90,0xf3,0x31,0xad,0x1d,0xc3,0x98,0xaf,0x49,0x64,0x2a,0x75,0x4d,0x34,0x8c,0xf1,0x50,0x82,0xda,0xe9,0x17,0x63,0xbb,0xe8,0x54,0x36,0xd4,0x38,0x57,0x4c,0xe3,0xfd,0x11,0x02,0xbc,0xc7,0xb6,0x65,0xe2,0xd7,0x84,0x38,0xbf,0xf1,0xea,0xac,0x23,0x89,0xa5,0x3d,0xa8 .byte 0x4d,0x5b,0x97,0x01,0x23,0xcd,0x8d,0xfc,0x28,0xc9,0xc2,0x06,0x06,0x6c,0x0d,0x07,0x0f,0x7f,0x7d,0xcf,0xcf,0x67,0xc7,0xe0,0xe1,0x4d,0xe8,0xee,0x6d,0x9a,0x1c,0x92,0xa6,0x4f,0xaf,0x4c,0xc3,0xa0,0xe7,0x73,0xa2,0x7b,0x4a,0x43,0xc2,0x94,0x6c,0xc6,0xb0,0x87,0x36,0xa0,0x3e,0x31,0x6e,0x77,0xc2,0xc1,0x90,0xb1,0x78,0x2c,0x52,0x44 .byte 0x9f,0xaf,0xc8,0x2e,0xca,0x90,0x60,0xc7,0xf8,0xa8,0xdd,0x91,0x42,0x1f,0x13,0x97,0x10,0x27,0xa1,0x74,0x51,0x71,0xeb,0xef,0xa6,0x83,0x7c,0xa0,0xd7,0x5f,0x59,0x54,0xf3,0xff,0xa2,0xfb,0x58,0xbc,0xbf,0x02,0xa8,0x44,0xca,0xf6,0x61,0xda,0x47,0xaa,0x02,0x3b,0xb4,0x2f,0xc4,0x12,0xbd,0xd7,0x24,0x56,0xe2,0x6e,0x51,0x34,0xdb,0x1c .byte 0x3d,0xd1,0xc5,0x90,0xfc,0xfd,0xe0,0xf0,0x99,0x3c,0x75,0x58,0xeb,0xb0,0xb2,0x97,0x60,0x81,0xd5,0x79,0xce,0x20,0xd2,0x20,0x50,0x46,0x20,0x96,0x98,0xdc,0x38,0x7f,0x38,0x80,0x91,0xf1,0xa1,0x26,0xa0,0xc5,0x14,0x96,0xe0,0x1f,0x96,0xf5,0x91,0x09,0xac,0xab,0xad,0x5e,0x96,0xa3,0xcb,0xfb,0x4c,0xb9,0x5f,0x30,0x0a,0x24,0x1f,0x65 .byte 0x23,0x23,0x58,0x02,0xaa,0xb0,0x2c,0xe8,0xca,0xf1,0x0d,0x7e,0xe2,0xc5,0xee,0x1a,0x19,0x94,0x48,0xeb,0xee,0x71,0xbc,0x67,0xf2,0x39,0x1e,0xff,0xb1,0x35,0x60,0x8d,0xb4,0x97,0x06,0x89,0xa6,0xca,0xee,0xb8,0x5c,0xdf,0x3e,0x52,0x5c,0xa4,0x91,0x08,0x66,0xdf,0x20,0xbf,0xbe,0xfa,0xe3,0x58,0xd0,0x47,0xeb,0x3f,0xa1,0xfd,0x07,0x68 .byte 0x35,0x7d,0x5c,0x67,0x13,0x7e,0x28,0x51,0x69,0x20,0x60,0x20,0x9c,0xf3,0x3a,0x23,0x8c,0x7c,0x95,0x0e,0x18,0x43,0xdf,0xe8,0xb1,0x71,0x4a,0x58,0x71,0x22,0x04,0xa4,0xad,0xab,0x77,0xa3,0xe5,0x01,0xb4,0x4a,0x4f,0x2f,0x6c,0x74,0x67,0x48,0x22,0x15,0xb0,0x10,0x6f,0xc4,0x95,0x11,0x09,0xa6,0x1a,0x2e,0x40,0x58,0xcb,0x5e,0x37,0xce .byte 0xbb,0xd3,0x5e,0xc8,0xcb,0xde,0x4e,0x1e,0x7a,0xb8,0xb4,0x27,0x45,0xb7,0x63,0xce,0x92,0xf8,0x31,0xd4,0xaf,0x3a,0x91,0x32,0x5f,0x27,0x67,0x94,0xf2,0x76,0xb7,0xd5,0x92,0xd2,0xe8,0x75,0xce,0x58,0x84,0xbb,0xf7,0xbb,0xa2,0x15,0x5a,0xd1,0x6e,0x83,0x5f,0x47,0xdb,0x73,0xdb,0x04,0xcd,0x55,0x15,0x6e,0x42,0xcf,0x8b,0x04,0x1b,0xfa .byte 0x82,0xf9,0xb5,0x9b,0xa0,0x2b,0x6b,0x7d,0x31,0x12,0x63,0x2e,0x27,0xdb,0x87,0x88,0x95,0xb8,0xf5,0x16,0xec,0x16,0xac,0xf1,0xa4,0x7f,0x51,0x99,0xc5,0x8a,0xf2,0x5c,0xbe,0xe2,0xe9,0xe2,0x03,0x76,0xfc,0xdd,0xaf,0x69,0x61,0x92,0xef,0xf7,0x07,0x17,0x3f,0x48,0xfa,0x04,0x8e,0xb4,0x56,0xa1,0x07,0xec,0x98,0xad,0x72,0xd5,0x91,0x52 .byte 0x4b,0xe4,0x0a,0x51,0x10,0x4f,0xad,0x99,0xfd,0x89,0xa1,0x19,0xe3,0x52,0x15,0xc8,0x8c,0x10,0xc6,0x9f,0x94,0x5b,0xf0,0xbd,0x67,0x20,0xcc,0xa1,0x9c,0x06,0x8c,0xa6,0x47,0x5d,0x1d,0x22,0x0b,0xa3,0x2c,0x59,0x18,0xfb,0x46,0xf2,0xa3,0x6a,0x3c,0x08,0xeb,0x42,0xad,0x3a,0x01,0xeb,0xfd,0x9b,0x54,0x4e,0x6e,0x60,0xee,0x94,0x04,0x42 .byte 0x75,0x5e,0xdf,0x51,0x4f,0x92,0xac,0x2e,0x6d,0xaf,0x87,0x7f,0x0a,0xdc,0x7d,0x58,0x62,0xdb,0xc8,0x15,0x1f,0xef,0x8d,0xbf,0x9f,0x80,0xf9,0x3d,0x39,0x2c,0x63,0x94,0x36,0xf2,0xda,0xf5,0x63,0x5a,0x8e,0x1e,0x28,0x12,0xbc,0xa3,0x9e,0x31,0x34,0x11,0xca,0xd0,0xc0,0x67,0x58,0xcf,0xb6,0x1d,0x68,0xa4,0xae,0x2d,0x73,0x0d,0x7b,0x02 .byte 0xc6,0x01,0xc5,0xa8,0x22,0xf0,0x7a,0x97,0x97,0x93,0xbe,0x52,0xb9,0xa2,0xdd,0x49,0x33,0x1a,0xab,0xc1,0x6e,0xc5,0x7f,0x71,0xdc,0xbf,0x1e,0x28,0x3d,0xf6,0x50,0xe2,0x66,0x01,0x21,0xc5,0x42,0xf2,0x3e,0x4e,0x8b,0x8a,0x07,0xfc,0x42,0xeb,0x78,0x0f,0xd0,0x0f,0x2a,0x4e,0x41,0x7c,0xa5,0x49,0x7b,0x0f,0x88,0x49,0x51,0x7c,0x0f,0x5e .byte 0xcd,0x9b,0x8b,0xc8,0x13,0xfd,0x16,0xfd,0xa4,0x77,0xf2,0x5b,0x02,0x02,0x38,0x5c,0xf0,0x5a,0x49,0xd8,0x80,0x48,0x10,0xa4,0x3c,0xcd,0x3b,0x6c,0x38,0x53,0x63,0xba,0xbf,0xb2,0x80,0x68,0x96,0x47,0x44,0xf3,0xa0,0xe3,0x85,0xe2,0x17,0xbb,0xfc,0x0f,0xa2,0x67,0x04,0x28,0x79,0x7f,0x05,0x84,0x5b,0x62,0x80,0x09,0x2c,0xb6,0x6f,0x76 .byte 0x18,0xba,0x83,0x39,0x82,0xa7,0x0b,0x63,0x34,0x87,0xa1,0xa1,0xa0,0xe1,0xda,0x0d,0x7b,0xe6,0xd7,0xcd,0xca,0x02,0x45,0x66,0xe5,0x30,0xc8,0xac,0x81,0xdf,0xfe,0x74,0xe5,0x45,0xd9,0x99,0x04,0xa6,0xcf,0x3c,0x10,0x73,0xfb,0xd7,0xe0,0xc0,0x44,0x54,0xda,0x9b,0x9a,0x64,0x90,0x6f,0x42,0x1a,0xda,0x65,0x24,0x3d,0xb6,0x70,0x8d,0xe1 .byte 0x33,0xf9,0xb2,0xda,0xa4,0x2e,0x7d,0x90,0x2b,0x14,0x16,0xd1,0x13,0xd4,0x1a,0xe6,0x25,0xa8,0x66,0x0b,0xed,0xed,0xa0,0x62,0x9c,0xb4,0x24,0x03,0x6f,0x36,0x7a,0x93,0x42,0xbc,0xf7,0x23,0x6b,0x0e,0xee,0xdf,0x80,0xd3,0xc1,0xc4,0x8e,0x3f,0xd9,0x1a,0x6f,0x37,0xc9,0x71,0xf4,0x3f,0x7e,0xa8,0x7d,0xbe,0x8d,0x53,0x11,0x35,0x16,0x0b .byte 0x63,0xdb,0x99,0xa5,0x3b,0x17,0x7b,0x97,0xdb,0x81,0x36,0x43,0x33,0xde,0x31,0xc1,0xc8,0xb2,0x99,0x86,0xd0,0x2f,0x57,0x89,0x91,0xd7,0x3b,0x1f,0x5b,0xd5,0xb4,0x42,0x77,0x66,0x9a,0xaa,0x65,0x9d,0x5c,0x12,0xbf,0xeb,0xa4,0xb3,0xc8,0x4c,0xdb,0xf2,0x4c,0xe5,0xe8,0xb6,0xaa,0xc1,0xe2,0xd7,0xd2,0x14,0x03,0x27,0x04,0x0a,0xf9,0x54 .byte 0x07,0xcc,0x50,0xbb,0xd6,0xfc,0x68,0x01,0xc3,0x79,0xb2,0x0c,0x4c,0x8e,0x65,0x41,0x91,0x7d,0x91,0x33,0x64,0xfa,0xeb,0x1a,0xbc,0x08,0x29,0x14,0x61,0x08,0xc8,0xd4,0xbb,0x64,0xe7,0xb1,0x2d,0xe0,0x1d,0xc6,0xae,0x78,0x20,0x81,0x8f,0x8d,0x20,0xb7,0x9d,0x7e,0x55,0x6e,0xbe,0x39,0x72,0x6e,0xc9,0xd8,0x6c,0x5c,0xa6,0x4c,0x48,0x2b .byte 0x4e,0x14,0x98,0x76,0x7b,0x6e,0x8b,0x1d,0x50,0xc8,0x30,0xa6,0x3a,0xe6,0xa4,0xf1,0x6c,0x67,0x7d,0x10,0x28,0x93,0x4d,0xe6,0x93,0x2c,0x1e,0xc1,0xbc,0x9a,0xff,0x21,0x00,0x66,0xeb,0x72,0xe1,0x57,0xe0,0x03,0x55,0x0f,0x56,0x27,0x36,0xbb,0x75,0x01,0x02,0xcd,0xad,0x6b,0xf2,0xa2,0xec,0x18,0x62,0xa3,0xd6,0x10,0x5e,0x2c,0xf6,0xa5 .byte 0xec,0x67,0xcc,0xfe,0xe8,0xa2,0x9e,0x0d,0xf0,0x11,0xf1,0x32,0xd7,0x4e,0x3a,0xbd,0xea,0xec,0xa9,0x72,0x98,0x82,0x00,0xa4,0x49,0xe2,0xa8,0xfc,0xf3,0x3c,0x3c,0x0e,0x2d,0x2c,0xc9,0xf8,0x72,0x04,0x67,0x4b,0x00,0xf9,0xd4,0x77,0x90,0x8e,0xf8,0x62,0xdc,0x23,0xc1,0x7a,0x2d,0xb3,0x40,0x47,0x7b,0x0b,0xac,0x5f,0x2a,0x67,0x84,0xed .byte 0xf4,0x75,0x9c,0xf4,0x20,0x83,0xa8,0xed,0x3e,0x14,0x28,0xbb,0xc5,0xb1,0x1f,0x25,0x46,0x32,0xd3,0x9f,0x1b,0xa8,0x2d,0xf7,0x07,0x9c,0x82,0x25,0x25,0x5c,0x75,0x03,0x32,0xce,0x6a,0x51,0x60,0xde,0xf7,0x54,0x10,0x97,0xdf,0x28,0x19,0x59,0xe9,0x62,0x81,0xd1,0x20,0xbe,0x9a,0x2d,0xf4,0x42,0xb3,0x2b,0x7c,0x5e,0x83,0xfe,0xd6,0xfc .byte 0xac,0xe5,0x5d,0x27,0xb0,0x50,0xee,0xca,0x12,0xcd,0x3d,0xe9,0x24,0x77,0xee,0x61,0xec,0xb7,0x0e,0xd1,0x10,0x9a,0xa7,0x7d,0x8a,0x77,0x9f,0xc9,0x70,0x02,0x02,0xbf,0xc7,0x9c,0xcb,0xc2,0xff,0x77,0xd2,0x7a,0x37,0x3d,0xb4,0xad,0xb8,0x4e,0xc3,0x87,0x1d,0x93,0x77,0xb4,0xab,0x7f,0x6c,0xca,0x48,0xfd,0x31,0x88,0x05,0x2d,0xc4,0xe6 .byte 0x97,0xe8,0xe7,0x39,0xab,0xe4,0xd5,0xd4,0xa8,0xc5,0x81,0xcc,0xe2,0xa3,0x48,0x49,0x9c,0x4e,0xb0,0x1c,0x80,0xbb,0xc3,0xfe,0xa2,0x04,0xcf,0xdd,0x01,0x26,0x25,0x78,0x65,0x51,0xb1,0x40,0x02,0x6e,0x58,0x90,0x59,0xad,0xe8,0x59,0xc3,0x1b,0x59,0xb1,0x34,0x38,0x32,0x66,0xd7,0x15,0xc3,0x50,0xe5,0xb1,0x54,0x23,0xd0,0xc7,0x92,0xa3 .byte 0xb3,0x66,0x07,0x49,0xc5,0xdf,0x46,0x06,0x16,0xb4,0xe1,0xca,0xb5,0x15,0xa4,0x77,0xf0,0x4a,0xba,0xfe,0xd9,0xd9,0x9b,0x11,0xdb,0x71,0xe6,0x73,0xc3,0x9a,0xaa,0x96,0xb6,0xb8,0x8f,0x2a,0xcf,0x90,0xad,0x4e,0x7c,0x3c,0xe1,0x67,0x4a,0x97,0x1a,0xce,0x7d,0x0b,0xa8,0xb3,0x6a,0xa2,0x18,0x45,0xcc,0xa7,0xe6,0x3f,0x5e,0xb4,0x51,0xc7 .byte 0xa7,0x78,0xc5,0x08,0x64,0xea,0x9d,0x1a,0x63,0x25,0x12,0x89,0xb3,0xde,0x3e,0x56,0x4a,0x9f,0x0f,0x6a,0x76,0xb0,0xa1,0xe2,0x47,0xb9,0x6a,0x2a,0xa8,0x80,0xcd,0x2a,0x30,0x75,0xd7,0x7c,0x07,0xfb,0xd3,0xf2,0xc9,0xf7,0x2a,0xb5,0x8d,0x99,0xf0,0xbd,0xbe,0xae,0x3a,0x54,0x22,0x5b,0xd9,0x21,0x3a,0x80,0xac,0x44,0xfb,0xe3,0x30,0xf5 .byte 0x22,0x07,0xc3,0xe6,0x4b,0xba,0x95,0x0f,0xd6,0x94,0x0f,0x2d,0x0c,0x65,0x92,0x18,0x9a,0xec,0xb3,0x0d,0x72,0x3b,0xb0,0x50,0xa1,0x6b,0x7f,0xc3,0x4d,0x5e,0x04,0x90,0x95,0x67,0xa5,0xa6,0xe6,0xb4,0xaa,0x00,0x4a,0x16,0x6b,0x0e,0xc9,0x67,0xad,0x73,0x39,0x93,0xf5,0xe0,0x4d,0xe1,0x92,0xd1,0xeb,0x3a,0x97,0xe5,0xb2,0xf8,0xce,0x53 .byte 0x3e,0x43,0x45,0x97,0x69,0xa2,0xd5,0xc2,0x49,0xb5,0x1e,0xad,0x76,0xc3,0x7e,0xbf,0xe7,0x36,0xa5,0x5a,0xb5,0x2d,0x0e,0xc5,0xa2,0x1b,0xdb,0x3d,0x3d,0xb1,0x9a,0x84,0x43,0x3e,0x5a,0xb9,0x36,0x68,0x28,0x6a,0x60,0x33,0x1b,0xff,0xde,0xd5,0x0a,0x1b,0xe8,0xb2,0xa7,0x1f,0x52,0x97,0xf8,0x8c,0x54,0xba,0x44,0x97,0x0d,0xd4,0x40,0x0d .byte 0x40,0x18,0x06,0xc5,0xc7,0xcd,0x4b,0xb3,0x38,0xb1,0x23,0x85,0x19,0x0c,0xd5,0x6c,0xc7,0xed,0xbe,0xeb,0x66,0x10,0x1b,0x40,0x65,0x1d,0x3a,0x0b,0xb4,0x88,0x41,0x48,0xfb,0x63,0x45,0xbe,0xdc,0x97,0x73,0x10,0x18,0x55,0xac,0x54,0xfe,0x1d,0x16,0xe9,0x79,0x1c,0xc8,0x1e,0x58,0x9c,0x9c,0xaa,0x49,0xe8,0xb3,0xab,0x4f,0xdf,0xcd,0xeb .byte 0xb6,0xdb,0x03,0xa7,0xee,0x4b,0x7f,0x22,0x54,0x58,0xa5,0x82,0x69,0xf6,0xaf,0x00,0x9b,0x6b,0xf8,0xfb,0x0f,0xfd,0xc3,0x6f,0x91,0xcb,0x47,0xee,0x79,0xdf,0x7c,0x01,0xb3,0xd8,0x0d,0x44,0x8c,0xbb,0xc7,0xa2,0x9c,0x74,0xcb,0xc7,0xc8,0x4b,0x3d,0x4e,0x83,0xe7,0x2c,0x7a,0xe9,0xca,0x71,0x30,0x05,0x33,0x71,0x3a,0x2e,0x9f,0xef,0xbd .byte 0xa8,0xfc,0xc9,0x9a,0xc4,0x5b,0x43,0x1d,0xf9,0x36,0xd7,0xde,0x61,0x39,0xa2,0x75,0x8b,0xca,0xcd,0x83,0x2f,0x05,0x13,0x3f,0x51,0xad,0x8f,0x65,0x95,0x50,0x40,0x56,0xc1,0x13,0x1d,0xda,0xd9,0x6d,0xe7,0x3d,0x75,0x13,0x01,0x65,0x0c,0xfe,0x6b,0xaf,0x14,0x5e,0x09,0xa3,0xfa,0x28,0x39,0xdd,0xd4,0xec,0x17,0x43,0x04,0xe1,0x12,0x5f .byte 0x5e,0xf9,0x3d,0x75,0x19,0x5e,0x08,0x17,0xe7,0xff,0x7a,0xf7,0x68,0x8e,0x05,0x37,0x65,0xb1,0x73,0xf1,0xb8,0xec,0x85,0x06,0xee,0x0a,0x43,0x2f,0xfb,0x93,0x51,0x50,0xb3,0xae,0xca,0xa2,0x8a,0xf0,0xd7,0x31,0x7f,0x1f,0x83,0x98,0x9e,0x06,0xce,0x12,0x32,0xb1,0xba,0x84,0x7d,0x8e,0xc9,0xe7,0x84,0x5b,0x52,0xe8,0x91,0x90,0x76,0xf4 .byte 0x00,0xce,0x8a,0x94,0x84,0x18,0x24,0x07,0xb4,0x42,0x1d,0xe1,0x8c,0x3b,0xf7,0xc8,0xa1,0xbd,0x74,0xdc,0xfd,0xe5,0x5b,0xf2,0xd6,0x12,0xb9,0x41,0x8c,0xa6,0x26,0x9a,0x01,0x1f,0x8e,0x87,0xa9,0xf0,0xfd,0xcb,0x70,0xb5,0xc7,0x42,0x22,0x1f,0x77,0xf0,0x89,0x83,0x22,0xde,0x0d,0x8f,0x37,0x7a,0x42,0x96,0xb9,0x99,0x3b,0xf6,0x25,0xd5 .byte 0xc4,0x81,0xbe,0xbf,0xc1,0x72,0x84,0x14,0x2d,0x40,0xe1,0x65,0xaf,0x46,0xd9,0x23,0x47,0x3b,0x13,0x15,0x83,0xe4,0x66,0x07,0x20,0x38,0xec,0xc8,0x62,0x81,0x9e,0x9c,0xcc,0xf7,0x3e,0x5d,0x2c,0xbc,0x67,0x0d,0x8c,0x3b,0xd5,0x46,0x37,0xef,0x0e,0x79,0x68,0x57,0xa3,0xa9,0x09,0xfc,0xe8,0xa4,0x75,0xd3,0x0a,0x8f,0xfd,0xb0,0xd7,0xbd .byte 0x26,0xf7,0xb7,0x1f,0x18,0xbc,0xff,0x02,0xc3,0x1b,0x00,0xea,0x3b,0xf5,0x04,0x00,0x53,0x94,0xc6,0x09,0x08,0x20,0x37,0xcd,0x6c,0xa8,0x9d,0x79,0xcf,0xe9,0x27,0x5e,0x12,0x9a,0xa1,0xcd,0x7d,0x92,0x52,0x52,0xc4,0xbf,0x54,0x45,0xb8,0x99,0x20,0x0d,0xdb,0xb7,0x6c,0x25,0x00,0xa2,0xd3,0x1a,0x8e,0x3a,0x60,0x2f,0x5e,0x16,0x04,0xcb .byte 0x04,0xc9,0x63,0xf9,0x3d,0x66,0xfd,0xb8,0x73,0x70,0x60,0xdd,0xfa,0x6b,0x96,0xfb,0xb1,0x6c,0x34,0xa2,0x76,0xea,0x40,0xa7,0x24,0xac,0x31,0xb6,0xef,0xe6,0xbb,0xfb,0xcf,0xfc,0xff,0x88,0xa4,0x79,0xdc,0xa7,0xe1,0x52,0xd7,0x6f,0x1c,0xf4,0x40,0x2b,0xcd,0xf7,0x95,0x3f,0x9c,0xbd,0xae,0xba,0xb3,0x9b,0xbe,0xf7,0x5f,0xc4,0x8b,0xe8 .byte 0x85,0x74,0xdc,0x51,0xe5,0x7f,0x4f,0xd7,0x54,0x93,0x7b,0x4b,0x52,0x48,0x48,0x99,0x75,0x92,0x97,0x3c,0xf3,0x4e,0x37,0x9c,0x15,0xd5,0xc3,0xeb,0xec,0x8e,0xe5,0x26,0x85,0x5c,0x95,0x23,0x09,0x1d,0x98,0x4b,0x65,0x7c,0xac,0x84,0xb9,0xc5,0xad,0x07,0xad,0x8b,0x4d,0xd9,0xc2,0x54,0x64,0x24,0x4f,0xb3,0xb8,0x04,0xca,0x35,0x20,0x70 .byte 0x92,0xe1,0x4b,0x0a,0x93,0x8e,0x25,0x68,0x78,0xcf,0xa1,0xbd,0x25,0x81,0x49,0x78,0x2f,0x78,0x67,0x40,0xef,0xa6,0x46,0x87,0x07,0xb2,0x56,0xbf,0x16,0xfd,0x64,0x24,0xf6,0x60,0xbf,0x54,0x66,0xc0,0xcc,0x99,0x6b,0x4e,0x39,0x9a,0x27,0x67,0xaf,0x1d,0x6e,0x46,0x6c,0x5c,0xd8,0xf4,0x8b,0xee,0x1b,0x3f,0xe8,0xe6,0xf8,0xbd,0xae,0x9a .byte 0x96,0x12,0xb4,0xe9,0x47,0x4b,0xfe,0x32,0x9e,0x84,0x44,0x51,0x14,0xe6,0xea,0x03,0xaf,0x45,0xc5,0x2c,0xc3,0x1c,0xc6,0x76,0x81,0xaa,0x38,0x1c,0x37,0x02,0x35,0x36,0x72,0xc1,0xa5,0x9b,0xf5,0x17,0xaf,0xe4,0xdb,0x95,0x2a,0x6e,0xb4,0xb2,0xdd,0x6e,0x02,0xa9,0x74,0xd7,0x51,0xb9,0x21,0x8f,0x34,0x74,0xdf,0xd4,0x70,0x13,0x9c,0x33 .byte 0x4e,0x9b,0x5d,0x6b,0x1c,0xd0,0x3c,0xd1,0x0d,0x47,0xc7,0xb3,0x8d,0x2c,0x40,0x3a,0x35,0xf2,0xab,0x83,0x4b,0x1a,0x04,0x29,0xd3,0xae,0x28,0x45,0x1f,0x85,0xf2,0x63,0x01,0x47,0x2b,0xe0,0xf5,0xc4,0xc3,0x11,0xa5,0x09,0x11,0x23,0xd2,0xfc,0xde,0xd4,0xf7,0x42,0x28,0x78,0x87,0x37,0xc0,0xe5,0x7b,0x79,0xb0,0xe4,0xed,0x4c,0x6f,0x13 .byte 0xa6,0xda,0x66,0x69,0xef,0x42,0xe4,0x04,0x09,0xca,0xef,0x35,0x13,0x2d,0x33,0x2f,0x6f,0xe1,0x46,0x40,0x75,0x5f,0xbf,0x35,0xb1,0xbc,0x86,0x95,0x16,0x37,0xaa,0x92,0x86,0x6f,0xdd,0x96,0x1e,0x13,0x88,0x75,0xc5,0xeb,0x29,0x1a,0x91,0xae,0xd3,0x0b,0xa1,0x14,0x4a,0xad,0x39,0xa4,0xd2,0xf1,0x51,0x61,0x9e,0x54,0xc6,0x8d,0x36,0xdf .byte 0x95,0x1d,0x9c,0xf7,0x73,0x64,0x71,0xca,0xd2,0x6b,0xde,0x8c,0xa1,0x0d,0x4a,0x07,0x79,0x35,0x5f,0x4b,0xde,0xeb,0xb6,0x36,0xd1,0xe0,0xb3,0x32,0x00,0x62,0x03,0x0a,0x01,0x4a,0x95,0xeb,0x1d,0x6a,0xcc,0x9b,0xec,0xaf,0x76,0x70,0x04,0xd3,0xbd,0x3b,0x11,0xc6,0xd6,0xf1,0xf5,0x0d,0x08,0xdd,0xaa,0x8d,0x40,0xb1,0xfd,0x09,0xda,0x01 .byte 0x32,0x13,0xe0,0x5a,0x46,0x82,0x10,0x26,0x2e,0xe5,0xd8,0xed,0xbc,0x03,0x1d,0x0f,0xd2,0x45,0x5c,0xda,0xd7,0x7e,0xb2,0xde,0x68,0x7a,0x3a,0x5a,0x4d,0x37,0xcb,0xae,0x0b,0x4a,0x92,0x7d,0x47,0x6e,0x19,0x93,0x62,0x3e,0x09,0xfe,0x0b,0x78,0x22,0xcf,0x62,0xa3,0x03,0x9e,0xa5,0x05,0x7b,0x81,0x3d,0x86,0x2e,0x00,0x4f,0xb9,0xdc,0x5c .byte 0x5e,0x38,0x37,0x98,0x9c,0x2c,0xf2,0xd4,0x2e,0xe3,0xc7,0x62,0x9f,0x62,0xbe,0xfa,0x6b,0xd6,0x2c,0x9f,0x89,0xed,0x2f,0xb0,0x50,0x29,0xa6,0x71,0x5c,0x92,0xea,0x6d,0xc7,0x77,0x36,0x43,0xbf,0x89,0x49,0xfe,0x3f,0x95,0x66,0xe6,0xfe,0x39,0xda,0x8b,0xda,0x5a,0x8f,0xf3,0x0b,0x5d,0xb0,0x2f,0x8c,0xb3,0xb4,0xbd,0x8c,0x18,0xb9,0xf8 .byte 0x70,0x2a,0xa2,0x23,0xe6,0x6b,0x21,0x26,0x07,0x60,0x00,0xa7,0xf5,0xa8,0x2f,0x57,0x35,0x06,0xe2,0x42,0x40,0xbd,0x39,0xda,0xb9,0x13,0x1b,0x29,0x6e,0x9b,0x16,0x40,0x1d,0xe8,0x5e,0xc1,0xa0,0x01,0x4b,0x70,0x95,0x11,0xb9,0xc3,0x6c,0xd0,0xe1,0x2f,0x5e,0x44,0x92,0xb5,0x2d,0x2e,0xdd,0xe8,0xfa,0xfa,0x0f,0xff,0xcc,0x9e,0x6c,0x81 .byte 0x56,0x75,0xc6,0xb8,0x92,0x58,0x83,0xd1,0x05,0x8d,0x5a,0x19,0xeb,0x43,0xbd,0xea,0xc4,0xac,0x8a,0x54,0xab,0x7c,0xc6,0x41,0x60,0x9f,0x36,0x9a,0x11,0xbe,0x10,0x0c,0x39,0x05,0xf0,0x7d,0xad,0xbe,0xcd,0x5d,0x14,0x24,0x4a,0x0f,0xa6,0x86,0x72,0x15,0xcc,0xd7,0xd3,0xc1,0x26,0xd7,0x90,0xb0,0xf7,0x62,0x31,0x73,0xa9,0xcb,0x85,0xeb .byte 0xa4,0x03,0x41,0xcc,0x60,0x4b,0x46,0xf4,0x9f,0xe6,0xc0,0x0e,0x69,0xf8,0x4c,0x4a,0x51,0xe2,0x2a,0x42,0xc2,0x32,0xcd,0x57,0x81,0xfb,0x6a,0x6e,0x01,0x12,0xe6,0xe3,0x58,0xd2,0xaf,0x28,0x64,0x56,0xb8,0x27,0xa2,0x73,0xba,0xe4,0x83,0x57,0x0d,0x5d,0xd1,0x15,0xd0,0x62,0xb8,0x79,0x97,0xc9,0x0b,0xb4,0x42,0xe1,0x2d,0xb8,0x58,0x2c .byte 0xa6,0x8a,0x68,0x78,0x05,0x6c,0x95,0x25,0x9d,0x8f,0x14,0x0c,0x76,0xe6,0xb4,0x0e,0x40,0xf7,0xb8,0xbe,0x5d,0xc6,0x08,0xe5,0x74,0x5b,0xb0,0xf7,0x68,0x0c,0x71,0xa9,0x1b,0x2f,0x39,0x64,0xf2,0xb9,0x2d,0xbc,0x38,0xdd,0x93,0x06,0xe9,0x23,0x31,0xe4,0xf4,0xdb,0x66,0x50,0x3a,0x23,0xce,0xee,0x69,0xfd,0x39,0xe5,0xb5,0x15,0xf0,0x14 .byte 0x59,0xa3,0xa1,0x78,0xb5,0x51,0x96,0x07,0x29,0x15,0x48,0x36,0xf1,0xef,0xf4,0xeb,0x90,0xea,0x3d,0xdd,0x43,0x3c,0x6e,0x85,0x8c,0xe7,0x2f,0x68,0xc4,0x16,0x82,0xf4,0x22,0x45,0xf8,0xdb,0x23,0x2c,0xb0,0xa6,0x73,0xed,0x99,0x16,0xac,0x57,0xf4,0x9d,0x5f,0x3c,0x82,0x49,0xdd,0x57,0xba,0x36,0xec,0xfc,0xd7,0x6a,0x0b,0x8a,0x24,0x80 .byte 0xbc,0x4a,0x0d,0x7b,0xae,0x54,0x76,0x70,0x93,0x5f,0x0b,0xff,0x8b,0x67,0xf1,0xb6,0x79,0xa8,0xf9,0x8e,0x06,0xb4,0x4d,0x3f,0x01,0x4e,0x17,0x97,0xeb,0xf2,0x65,0xec,0xee,0x42,0xd1,0x67,0x66,0x33,0x6a,0x6b,0xb1,0xdf,0x59,0xef,0x86,0xb5,0xda,0xaf,0x57,0x12,0x17,0x8f,0xbc,0xeb,0xcb,0x29,0x28,0x69,0x67,0x5e,0x5d,0x11,0x4d,0x18 .byte 0xaa,0xd8,0xd6,0x27,0xb8,0x9f,0x41,0x37,0x8a,0xde,0x99,0x50,0xb1,0x58,0x45,0x22,0x95,0x84,0xec,0x73,0xb6,0xa6,0xc3,0xf8,0xe7,0xc1,0xe3,0x88,0x27,0x91,0x33,0xae,0x15,0xba,0x8b,0x04,0xf8,0x96,0x2e,0x8b,0x78,0x21,0x6b,0x86,0x23,0x82,0xde,0xd6,0xb2,0x86,0xfe,0xb5,0xfc,0x57,0x1b,0x45,0x69,0xd1,0x6a,0xb3,0x64,0x11,0xdc,0xf7 .byte 0x22,0x25,0x50,0xc1,0xc7,0xc1,0x72,0x92,0xf9,0x27,0x1e,0x41,0x1a,0xd9,0x5b,0x42,0xac,0x8b,0x5c,0x32,0x03,0x2f,0x45,0xb5,0xb1,0xa5,0x13,0xd9,0x9c,0x47,0x18,0xdc,0xb9,0x46,0xd6,0x15,0xbc,0x8d,0xaa,0x91,0x0a,0xa7,0xf8,0xc5,0x0f,0xb5,0x76,0x17,0xf3,0xd6,0x51,0xd7,0x8a,0x3d,0x6f,0x03,0x2f,0xcf,0x38,0xd0,0xe4,0xac,0x0e,0x0f .byte 0xbc,0xe2,0x12,0x52,0x6b,0xd5,0x3e,0x85,0x0a,0x19,0xd5,0x47,0xdd,0x17,0x7e,0x5a,0x5d,0x5f,0xf0,0x1a,0xac,0x21,0x96,0x3d,0x62,0xc7,0x6c,0x47,0x7e,0x25,0x77,0x6b,0x24,0x4d,0xf2,0x39,0xb6,0xb9,0xaa,0x92,0x94,0x79,0x81,0xd9,0x13,0x07,0x8f,0x51,0xe6,0x16,0x80,0x36,0x3b,0x97,0x8e,0x96,0x41,0xaf,0x28,0x2d,0x1f,0x41,0x00,0x7a .byte 0x42,0x0c,0x1b,0x59,0xc1,0xee,0xae,0x1a,0xa2,0x3f,0x76,0x4e,0x25,0xb0,0x75,0xd2,0x65,0xdd,0xfb,0xcf,0xee,0x11,0xd7,0xac,0xff,0x62,0x00,0xd2,0x76,0x24,0x98,0x0c,0xdb,0x52,0x83,0xb8,0x5c,0xa2,0x3e,0xe8,0xad,0x45,0xd5,0xfa,0x12,0xcb,0xe8,0x64,0x3a,0x41,0x2c,0x34,0x04,0xe9,0x9b,0xea,0x6c,0xa6,0xcc,0x72,0x1d,0x28,0x79,0x43 .byte 0x59,0x0c,0xdf,0xa7,0xf8,0x7e,0x2c,0xf2,0x6a,0xd5,0xe9,0x5f,0xdf,0x5a,0xcc,0x66,0x3a,0x99,0x68,0xec,0x5b,0xa9,0x1f,0xd8,0x80,0x7a,0x5a,0x8a,0xa1,0xf0,0x80,0x8d,0x17,0xfd,0xd7,0xab,0x9e,0x3a,0xc6,0x4b,0xc8,0x1d,0xf9,0xba,0x29,0x15,0xc2,0x73,0xa7,0xab,0x83,0x56,0x9d,0x5e,0x91,0x3a,0xce,0xe0,0x31,0x64,0x00,0x06,0x42,0x70 .byte 0x5f,0x4d,0x08,0xe7,0xf0,0x5b,0x10,0x71,0x0c,0xf8,0x93,0x34,0x9b,0xef,0x4a,0x78,0xc3,0x24,0xa9,0xb5,0xe0,0x3a,0xf0,0xf3,0xf3,0xf1,0x7d,0xb2,0x1d,0x25,0xeb,0x51,0xa3,0xd3,0x26,0xcd,0xaa,0x41,0xd0,0x64,0xbc,0x14,0x99,0x24,0xb3,0x17,0x4b,0x6d,0xa7,0xa7,0x3c,0xff,0xe9,0xfb,0x60,0x24,0x86,0x9c,0x44,0x91,0xc9,0xf0,0x85,0xbd .byte 0x4c,0x09,0xee,0x6e,0x43,0x49,0xb9,0xc3,0xf6,0xce,0xee,0x01,0x3e,0x44,0x76,0x76,0xa3,0xd3,0x41,0xf6,0xdf,0xcf,0x0f,0x5e,0xfa,0x83,0xdc,0x7f,0xa1,0x89,0xc4,0xbb,0x3b,0xa4,0xf9,0xbb,0x87,0x3a,0x04,0xfc,0x9d,0x21,0xa7,0xe0,0x1e,0xca,0x7c,0x61,0xf6,0x91,0xdb,0xa9,0x29,0xa2,0xed,0x81,0x23,0xd7,0x8d,0x48,0x8b,0x18,0xbf,0x74 .byte 0x71,0x9e,0x65,0x65,0xca,0x2c,0x88,0xcb,0x3c,0xcf,0xda,0xc8,0xf5,0x02,0x83,0x5e,0xdd,0x6c,0xbe,0x1d,0x53,0xe3,0xe1,0xd2,0xb1,0xc5,0xf8,0xce,0x0e,0x67,0xb8,0x87,0xf0,0xee,0x86,0xde,0x06,0xc9,0xec,0xe0,0x81,0x98,0xde,0xb6,0x4d,0xb2,0x80,0x04,0xc8,0x68,0x34,0xf9,0x27,0xeb,0xd6,0x3b,0xb3,0x99,0x8d,0xa0,0xf5,0xa3,0xe6,0x87 .byte 0x29,0xe0,0x9b,0x5b,0xa1,0x18,0x82,0x04,0xd3,0xb9,0xfd,0xe3,0xe6,0x9a,0xaf,0xde,0x69,0x93,0x3d,0x9a,0x6e,0x77,0xf1,0xa9,0xf5,0x00,0x59,0x20,0xba,0x25,0x84,0xd8,0xfd,0x6f,0x0d,0x61,0x0c,0x2f,0x6f,0xe5,0xe1,0x92,0xc9,0x62,0x0c,0xb3,0xef,0x52,0xcf,0x61,0x9b,0x74,0x39,0xb5,0x84,0xdc,0x96,0xb4,0x54,0xb2,0x96,0x98,0xf2,0x4e .byte 0xb9,0x45,0x6f,0x39,0x3a,0x60,0x5d,0x42,0xc5,0x4a,0x68,0x86,0x55,0xd3,0x5f,0x3d,0x26,0xe0,0x7d,0x46,0xcd,0xb5,0x56,0x4e,0x03,0xaa,0x29,0xec,0x5e,0xb7,0x86,0xc0,0x9a,0xa0,0xaf,0xe1,0xb7,0x90,0xd4,0xd3,0x6b,0xb4,0x26,0x3f,0x93,0x32,0x49,0x73,0x40,0x8c,0xd1,0x6f,0x57,0xe9,0x4a,0x8b,0x04,0xd3,0x25,0x57,0x95,0xf5,0x64,0x4c .byte 0xed,0xa5,0xdf,0xf5,0xf6,0xa1,0xff,0xba,0xb2,0x0d,0x63,0x6c,0x54,0x12,0xf7,0x6f,0xa3,0x57,0x3d,0xf0,0xcd,0x9b,0xb8,0x02,0x1e,0xf6,0x52,0x79,0x57,0x43,0x2e,0x9d,0xc4,0xc2,0xc1,0x3e,0x6c,0xa5,0x32,0x42,0x00,0x35,0xaa,0x6a,0xe4,0x1d,0xa5,0x5a,0x83,0x59,0xb4,0xe7,0x3a,0xca,0xeb,0xe5,0xcd,0xf8,0x24,0xc8,0x05,0xf4,0xea,0x6a .byte 0x82,0xbb,0x89,0xa5,0xb2,0xdf,0x5d,0x69,0x9b,0x73,0x0d,0x26,0xd1,0x5d,0x8f,0xaa,0x4a,0x4e,0x7f,0xe1,0x25,0x07,0x67,0x9f,0x2c,0x59,0xa7,0x4d,0x4c,0x44,0x67,0x5b,0xff,0xac,0xaf,0x9a,0x1c,0xc8,0xa8,0x6c,0x34,0xd4,0xfe,0x90,0x2a,0x24,0xd5,0xbf,0xb4,0xa4,0xe3,0x51,0x94,0x38,0xf9,0xd0,0xad,0x3f,0xc5,0x1e,0x72,0x56,0xdf,0xda .byte 0x31,0xbe,0xf0,0x8d,0x79,0xa9,0x96,0x23,0x27,0x0a,0x61,0x3a,0x6c,0xb5,0xd6,0x37,0x51,0xd0,0x5c,0xbb,0x33,0x34,0x36,0x81,0xcb,0x37,0xfb,0x89,0x00,0x97,0x0e,0x98,0xb8,0xe1,0x3a,0x83,0x40,0x98,0xff,0xaf,0x9c,0x3b,0xfa,0xda,0xa6,0x80,0x6d,0xb0,0xd5,0xe6,0xa2,0xaf,0xbc,0x15,0xc1,0xc3,0xad,0x2d,0x5d,0x76,0x11,0xf3,0x09,0x0b .byte 0xfa,0x92,0x7f,0x92,0xd6,0x7a,0xf1,0xf8,0x75,0xa4,0x46,0x20,0xcb,0x4a,0x63,0x48,0x88,0x0e,0x1a,0x28,0xbc,0x3a,0xfe,0x62,0xf3,0x17,0x75,0x00,0x47,0x7a,0xea,0xcb,0x17,0x6d,0xfc,0xf1,0x17,0xfc,0x19,0xfd,0xd8,0xaa,0xc2,0x64,0x59,0x84,0x14,0x56,0x61,0xa4,0x6d,0xe8,0xae,0xe1,0x8a,0x15,0x10,0xe4,0x98,0x88,0x4e,0x89,0xdc,0xba .byte 0xbd,0x8b,0x79,0xe0,0xec,0xcd,0x3d,0x7a,0x14,0x11,0xd1,0x71,0xf3,0xc1,0xb8,0xf8,0x2e,0x7e,0x83,0x42,0x62,0xea,0x01,0x6f,0xdd,0x2c,0xc6,0xc4,0x52,0x94,0x8d,0x52,0x59,0x41,0xb3,0x42,0xf2,0x15,0xc5,0x16,0xf6,0x1c,0xa8,0xd2,0x2e,0xa2,0x91,0x97,0x5e,0xc8,0x5c,0x29,0x3b,0xa2,0x91,0xaf,0x55,0xf1,0x42,0x5b,0xbc,0x2f,0x95,0x91 .byte 0x68,0x00,0x48,0x7d,0xd5,0x4e,0x3e,0x1b,0xba,0x03,0x41,0x1f,0x0b,0xd8,0x9a,0x04,0x3c,0x3d,0x45,0xff,0xe8,0xd5,0x81,0x06,0xb1,0x96,0x27,0x46,0x14,0x31,0xe1,0x11,0xc6,0x46,0x59,0x97,0x24,0xd9,0x92,0x98,0x04,0x32,0xb1,0x2b,0x2b,0xe6,0x12,0xbd,0x9a,0x72,0xcc,0xff,0x26,0x8c,0x07,0x19,0x1c,0x1c,0xf1,0x66,0xf0,0x60,0x12,0x28 .byte 0x61,0x64,0x73,0xdf,0x4e,0x95,0x14,0x46,0x32,0xb1,0x62,0xf2,0xcc,0xd2,0xcf,0xeb,0x50,0x05,0x3d,0x5a,0xf1,0x6b,0xfb,0xe2,0x7f,0xeb,0xbc,0x91,0x15,0x86,0x36,0x18,0xde,0x72,0x3a,0x9e,0x81,0xa4,0xcb,0x7a,0xdc,0x11,0x73,0xb4,0xf8,0x3d,0xa8,0xcb,0x87,0xcd,0xdc,0x18,0x51,0x64,0x90,0x29,0xbe,0xdc,0xcf,0x3c,0xc8,0xe0,0xe8,0xb3 .byte 0x9a,0x15,0x38,0x00,0x22,0xd9,0x2d,0x18,0x9a,0xdd,0x69,0x3b,0x04,0x0b,0xa7,0xb6,0x5d,0x12,0xd2,0x4b,0xf2,0x8c,0x4d,0x6f,0xef,0x39,0x2d,0xe9,0xfe,0xec,0xb3,0x99,0x87,0x1e,0x54,0xa7,0xc9,0x99,0xa1,0x70,0x70,0x34,0x04,0xc8,0xa2,0x4c,0x6b,0x43,0x83,0x6f,0x60,0xf7,0xef,0x01,0xd8,0x9a,0x01,0x55,0xa7,0x3e,0x52,0xbf,0x3d,0x5f .byte 0xba,0xc7,0x3d,0x4f,0xc9,0xad,0x47,0xf9,0x07,0x8a,0x88,0x13,0x80,0x69,0x4b,0xb8,0x41,0x9d,0xc7,0x93,0xc3,0xc0,0xc0,0x64,0xda,0x8f,0x9e,0xa7,0xb7,0x52,0x67,0x81,0x50,0x42,0x7c,0x2b,0x35,0x37,0x1f,0xfe,0x0a,0x15,0xa5,0xa0,0xe3,0xcd,0xe9,0x9d,0xbc,0xd7,0xcc,0xec,0x35,0x74,0xef,0x61,0xf9,0xb2,0x32,0x32,0x84,0x0c,0x6c,0x6e .byte 0x52,0x84,0x01,0x45,0x05,0x84,0xd8,0x58,0x73,0x0a,0xda,0x1f,0x90,0x91,0x40,0xcd,0xdd,0x5d,0xa9,0xfc,0x03,0x2f,0xd0,0xa5,0xa7,0xa8,0x2c,0x3e,0x73,0xcc,0x58,0xc3,0xd0,0x2b,0xa9,0x20,0x14,0x11,0x63,0x13,0x84,0x60,0x05,0x76,0x89,0x1e,0x59,0x9b,0x0e,0xfa,0x4c,0x7f,0x29,0x79,0xda,0x83,0xfa,0xe1,0xbe,0x38,0xa0,0x7a,0xf2,0xd2 .byte 0x41,0x72,0xe8,0xa4,0xa2,0x38,0x78,0xc8,0x4a,0xee,0x3d,0x5b,0xe8,0x63,0x0e,0xf1,0x53,0x30,0x87,0x0d,0x4f,0xe0,0x21,0xf4,0x91,0xc9,0xc2,0x5e,0x23,0x41,0xee,0x7b,0xd3,0x4e,0x7d,0x2d,0xa6,0x5f,0x3a,0x5c,0xb4,0xfa,0x25,0x32,0x3e,0x57,0x8d,0x99,0xa5,0xe5,0x10,0xe9,0x86,0x32,0xd5,0x94,0xb5,0xc3,0xc4,0xa8,0x98,0x17,0x9b,0x8b .byte 0x10,0xa8,0x3f,0x4c,0x55,0xc7,0xa0,0x3f,0x77,0x4e,0x89,0x85,0x95,0x41,0xdf,0x2c,0x37,0xe4,0xc0,0x57,0x77,0x60,0x90,0xce,0xfc,0x86,0x87,0x9f,0x8c,0xfb,0x34,0xef,0xe4,0x33,0x7b,0x65,0xd4,0x56,0xe4,0xf1,0xa6,0x17,0x3b,0xda,0xf9,0xcb,0x7d,0xd5,0x41,0x77,0x0a,0x15,0x20,0xf6,0x0d,0x10,0x4b,0xc6,0x93,0x3d,0xe3,0x30,0x37,0xf1 .byte 0x65,0x31,0x66,0x75,0xaf,0xec,0x76,0x31,0xcb,0xd1,0xc3,0xd4,0x49,0xb3,0x69,0x1a,0x37,0x76,0xa0,0x7f,0x21,0x39,0x53,0xc2,0xa8,0xd4,0xb2,0x7c,0xf6,0x82,0xf0,0x98,0x7b,0xf1,0xd2,0xc2,0x5f,0x07,0x78,0x67,0xb4,0xaa,0x55,0xb4,0x53,0xed,0x7a,0x5b,0xed,0x10,0x2e,0x13,0x93,0xf6,0xaa,0xec,0xe7,0x6c,0xa1,0x97,0xd2,0x7e,0x87,0xd2 .byte 0xa6,0xad,0x1a,0x31,0xee,0xa8,0xa3,0x7d,0x02,0x3c,0xe7,0x10,0xef,0x3d,0x2f,0x59,0x13,0x00,0x69,0x9d,0x79,0xba,0xa2,0xb9,0x39,0xa1,0x7a,0x7d,0x6d,0xe8,0x01,0x68,0x59,0x16,0x81,0xd3,0x63,0x94,0xd1,0x55,0x57,0x55,0xaf,0x1e,0x38,0xff,0x07,0x3a,0xb1,0x91,0xd6,0xd3,0xce,0x76,0x41,0x40,0x67,0x9e,0xf5,0x13,0xa0,0x63,0x44,0xeb .byte 0x16,0xe8,0x33,0xc2,0x56,0x03,0xc9,0xc0,0x32,0xa7,0x04,0xe1,0x5b,0x50,0xd6,0x15,0xa1,0xdd,0x8f,0x35,0x0f,0xe5,0xed,0xb2,0xb5,0xeb,0x22,0x45,0xce,0x0c,0xb6,0x18,0x46,0x38,0xcf,0x8d,0x89,0xc2,0x8d,0x14,0x25,0xb3,0x69,0x8e,0x23,0xb5,0xa4,0x83,0xac,0x21,0x5d,0x34,0xea,0xbb,0x49,0xa6,0x4e,0xfb,0x60,0xdd,0x4a,0xe3,0x1b,0xdb .byte 0x22,0xf7,0x9c,0x09,0x0d,0xa4,0x00,0xc0,0x7e,0x6f,0xb2,0x7a,0x59,0xc9,0x8a,0x53,0xdf,0x4b,0xf2,0x31,0xdd,0xd7,0xe0,0x4a,0xea,0x1e,0xc1,0x71,0x3a,0x7c,0xef,0xad,0x7f,0xf5,0x3f,0xbb,0x81,0x52,0x67,0x60,0x46,0xaf,0x14,0xc9,0x77,0x63,0xa1,0xb0,0xc5,0xac,0x24,0x52,0x9f,0x32,0xf8,0x9e,0xc0,0x04,0x4d,0x6b,0xfd,0x7a,0xd4,0x1c .byte 0x68,0xaa,0xc8,0xc1,0x8b,0x41,0x31,0x69,0xbd,0x9d,0x46,0x17,0xc1,0x8a,0xdf,0x3c,0x78,0xa2,0xca,0x28,0x1b,0xf8,0xab,0xe3,0x61,0x5e,0xb2,0x31,0xac,0xf2,0xd1,0x01,0xe7,0x24,0x46,0x96,0xa6,0x81,0xb3,0x4a,0xc0,0x0e,0x23,0x52,0x7f,0xa9,0x49,0x98,0xfa,0x6b,0xfd,0x0a,0x7b,0xb7,0xc5,0xcf,0x85,0x74,0xe1,0x3b,0xde,0x37,0xa9,0x22 .byte 0x63,0xbb,0xfc,0xd3,0x02,0x90,0x87,0xb5,0x2d,0x71,0x69,0x25,0x9a,0x0c,0xaf,0x68,0x4f,0xf0,0x71,0x86,0xcc,0x1b,0xc6,0x2d,0xb5,0x6c,0x68,0x00,0x37,0x07,0xcf,0x62,0x00,0x00,0xee,0x7d,0x8e,0xf2,0x88,0xa5,0x21,0x2f,0x33,0xf8,0x7c,0xe9,0xb3,0xe3,0xd8,0xa4,0x21,0x1c,0x81,0x4b,0x62,0xcc,0x99,0xa4,0xc6,0xfe,0x49,0x65,0x35,0xd5 .byte 0x92,0xe7,0x42,0xa2,0x8e,0xb3,0x02,0xba,0xc4,0x49,0x3a,0x26,0x4a,0x66,0xbd,0x4e,0x75,0x67,0x44,0x08,0x52,0x14,0x06,0xfa,0xf9,0x01,0xa2,0x03,0xbc,0x5c,0x41,0xe4,0x65,0x2f,0x5d,0xf9,0xd9,0xe4,0xc7,0x30,0xbd,0xe4,0xa4,0xcb,0x77,0x2f,0x2d,0x72,0x07,0x4f,0x0b,0x2f,0x6c,0x3f,0xfd,0x0b,0x5c,0x69,0x71,0xda,0x4f,0x13,0xf1,0xa9 .byte 0xb6,0x97,0x5f,0x7a,0x4b,0x9b,0x26,0xe2,0xe8,0x52,0x6a,0x07,0x10,0xf7,0x12,0x2d,0x0b,0x1f,0x47,0xf0,0x45,0x90,0x8a,0x5f,0xf3,0xdf,0x71,0x38,0x5d,0xf2,0x13,0x9e,0x00,0x92,0xd2,0xe9,0xa9,0x21,0x3d,0xe1,0x60,0x18,0xd6,0x06,0x11,0xed,0x80,0xeb,0x3c,0x70,0x62,0x29,0xb0,0xff,0x67,0x6e,0xe1,0x6f,0xd0,0x73,0x10,0x61,0x6d,0x03 .byte 0x03,0x6c,0xe9,0xf4,0xba,0xe2,0x31,0x50,0xc4,0x48,0x65,0x6a,0xa8,0xb0,0xc2,0x41,0x73,0xb9,0x71,0x35,0x21,0xc3,0xff,0x96,0x07,0x7a,0x75,0x62,0xfe,0x7e,0xbe,0xfb,0xed,0x8e,0x56,0xf7,0xaf,0x0f,0xcd,0xaa,0xde,0x4a,0xd7,0xfc,0xac,0x00,0xe7,0xf0,0xc8,0xe7,0xe1,0xb1,0x03,0xb8,0x0a,0x5b,0x78,0x1d,0xc8,0x1e,0x3a,0x47,0x6d,0xf1 .byte 0x8d,0xb4,0x5d,0x71,0x15,0x7d,0xda,0x5a,0x4b,0x87,0xfa,0xaf,0x59,0x25,0x33,0x4f,0x46,0x27,0x54,0xe2,0x72,0xd2,0xe9,0x5d,0xb7,0xc3,0x1f,0x26,0xdf,0xff,0xed,0x8f,0xc1,0x91,0xa0,0x67,0xb8,0x69,0xe1,0xeb,0x6a,0xef,0x16,0xe5,0x63,0x39,0xa2,0x14,0x0c,0x20,0x1d,0xe2,0xfc,0x14,0xe4,0x6d,0xf6,0x96,0xd5,0x1a,0xfe,0x77,0x2c,0x26 .byte 0x90,0xc4,0x7f,0xc9,0xe1,0xb1,0xc0,0xeb,0xed,0x54,0xcc,0x6a,0x94,0x4e,0x5f,0xfb,0x05,0xa5,0xd7,0x8b,0xca,0x6d,0x94,0x15,0xdd,0xb6,0xf6,0x7b,0xc3,0x66,0x33,0x16,0xa1,0xe5,0x90,0x3e,0x8f,0x72,0x5a,0x18,0x4c,0xe7,0x7d,0xd0,0x80,0xf5,0xb6,0x26,0xa6,0x6a,0xab,0xa8,0x9e,0x8f,0x2f,0xc8,0xba,0xe6,0xeb,0x8b,0x5b,0x09,0xb6,0x95 .byte 0x46,0xb7,0x01,0x4e,0xbf,0x7f,0x6f,0x5d,0x64,0xfd,0x8b,0x5d,0xfe,0x2d,0xd6,0x6d,0x3f,0x34,0xc2,0xa1,0x97,0xf1,0x7a,0x1e,0x83,0x0a,0x06,0x09,0x75,0xc2,0x27,0x18,0x80,0x49,0xc9,0x7b,0xd2,0x40,0xfb,0x48,0x54,0xb4,0x22,0x30,0x7f,0xea,0x87,0x70,0x59,0xfb,0xa7,0xb6,0x63,0x33,0xb2,0x5a,0x3c,0x47,0x83,0x3c,0x81,0x34,0x50,0x2f .byte 0x0e,0x95,0xb1,0xdc,0x44,0x67,0x94,0xf4,0x0c,0x1e,0x12,0xb8,0xfb,0xc6,0xd3,0x9f,0xaa,0xa8,0x77,0x80,0x71,0x4d,0xb0,0xb8,0x90,0x69,0x1b,0x45,0x88,0x7a,0x0f,0x60,0x7c,0x06,0x64,0x64,0x5e,0x2b,0x3a,0xf5,0xee,0x34,0x8a,0xbb,0x67,0x72,0x38,0x97,0xfd,0x8b,0x3d,0xe9,0x08,0x74,0x2e,0x9a,0xca,0xc8,0x74,0x5f,0x6f,0xd5,0xf7,0xfb .byte 0xd8,0x3f,0x49,0x81,0x44,0x68,0xe0,0xbe,0x11,0xee,0x81,0x19,0xab,0x0e,0xe5,0x18,0x7a,0xbc,0x64,0xc9,0x88,0x4b,0xd1,0x72,0x7d,0xfa,0x57,0x5d,0x52,0xbe,0x36,0x85,0xb6,0x28,0xec,0xce,0xbd,0x68,0xa7,0xc0,0x43,0x15,0xcf,0x89,0xe9,0x13,0x72,0x23,0xa7,0x2e,0x12,0x03,0x87,0x0b,0xcd,0xe3,0x67,0xe6,0xbf,0x92,0x69,0x06,0xd1,0x51 .byte 0x1d,0x0a,0xea,0x48,0xdb,0x27,0x95,0x55,0xa6,0xca,0x44,0x62,0x66,0xa5,0xaa,0x36,0xfa,0x42,0x7c,0x16,0xb9,0x8f,0x07,0x78,0x2f,0x03,0xf3,0x58,0x8a,0x15,0x82,0x35,0xb4,0xa9,0x2e,0x4e,0xb1,0x86,0xf2,0xc8,0xaf,0x94,0xdf,0x4a,0xf9,0xaf,0xa6,0x6c,0xf0,0x6d,0x32,0x9b,0x61,0xc5,0xa7,0x64,0xc3,0xf7,0x51,0xe0,0xc1,0x8b,0xd1,0x12 .byte 0x43,0x3a,0xab,0x59,0x64,0xa4,0xa9,0xc9,0x6f,0xb7,0x30,0x1c,0x4b,0x77,0xa7,0x15,0x98,0x76,0xb5,0xf2,0x8f,0xba,0xce,0xb5,0x8e,0x2e,0x3f,0xe4,0xaa,0xdb,0xe3,0x10,0xb4,0x42,0xbb,0x3f,0x16,0x1c,0xec,0x10,0x68,0xcd,0xf8,0x16,0x19,0x80,0xb2,0xb4,0xfc,0x9d,0x52,0x48,0x09,0xda,0x94,0xb9,0xf1,0x00,0xfe,0x99,0xad,0x5c,0xae,0x5a .byte 0xa9,0x65,0xb7,0x7d,0xaf,0xec,0xd1,0x09,0xa3,0x5e,0x77,0x01,0x86,0x78,0x79,0xaa,0x07,0x31,0x6b,0x13,0x11,0xec,0x73,0x02,0xf8,0x0c,0xa5,0x61,0xaa,0xe7,0x7c,0x4a,0xb2,0x6b,0xba,0xb5,0x5f,0xc8,0x8d,0x2b,0x2c,0xf4,0x75,0xdc,0xbc,0x84,0x01,0x4b,0x02,0x0e,0xea,0xcb,0xe1,0x87,0xb4,0xa5,0x1c,0x79,0x5e,0x3e,0xe1,0xab,0x33,0x74 .byte 0x11,0xf6,0x9f,0x89,0x12,0x04,0x46,0xd2,0xf3,0xac,0x14,0xe8,0x32,0x54,0x26,0x78,0x61,0x8b,0x93,0xd0,0x3d,0x02,0xda,0x47,0xac,0x26,0x36,0x52,0xca,0xeb,0x9f,0xc9,0xa9,0xb4,0xcb,0xaf,0xea,0xdb,0x6e,0xfb,0x93,0x49,0x30,0x4d,0x26,0xff,0xe1,0x31,0x48,0x94,0x7a,0x81,0x69,0x0d,0x51,0x0e,0x0f,0x97,0x32,0x6d,0xd7,0xd2,0x99,0xd8 .byte 0x40,0x68,0x97,0xf9,0xe7,0xb4,0x99,0x80,0x6f,0x3a,0x7c,0xba,0x8e,0x25,0x4e,0x22,0xb2,0x65,0x6c,0xde,0x46,0x04,0x6b,0xf7,0x18,0x44,0x68,0x73,0xab,0xbd,0x75,0xff,0xe2,0xc4,0xbc,0x95,0xfe,0x53,0x20,0xb0,0xf7,0x6f,0xea,0x63,0xf7,0xb4,0x0b,0x7f,0xf1,0x95,0x4b,0xbf,0x9f,0x58,0xf6,0xb5,0x05,0x55,0x50,0x00,0x66,0x83,0x64,0xf5 .byte 0xb8,0x36,0xfa,0xe5,0x3f,0x58,0x71,0x0b,0x51,0xac,0x7b,0xba,0x1d,0xfb,0xd2,0xc3,0xb2,0xb8,0xa3,0x88,0x80,0x5d,0x38,0x27,0x5c,0x12,0xb4,0x9f,0x4d,0xa7,0x25,0x41,0x1f,0xf5,0x93,0xc0,0x6b,0xb8,0x2a,0x27,0xa2,0xa7,0x9e,0xcc,0xa0,0xb9,0xbf,0x18,0x31,0x62,0x31,0x4f,0x71,0xaf,0x6f,0xda,0xe4,0x75,0x08,0xcf,0x6b,0xfc,0x96,0xa9 .byte 0xd9,0x7b,0xc5,0xc1,0x80,0x93,0xd8,0x47,0x1f,0x57,0x56,0x23,0x00,0x2c,0xc4,0x71,0x4e,0x17,0xc6,0xc1,0xff,0x8b,0x78,0xe1,0xcd,0x74,0xc1,0x42,0xc9,0x02,0x57,0xaa,0x04,0x4a,0xbe,0x1a,0xd3,0x2a,0x94,0x47,0xbd,0x0e,0x25,0x05,0x4e,0x1f,0xf2,0x19,0x1e,0x97,0xdb,0xfa,0xb1,0x4c,0x6c,0x6e,0x7d,0xf0,0x94,0x5a,0xd0,0x46,0x90,0xc7 .byte 0x6c,0xa2,0xc6,0x20,0xd4,0x49,0x04,0xb0,0x56,0xda,0x86,0x2f,0x09,0xa7,0xc1,0xf5,0xaa,0x0f,0xbc,0x0b,0x6a,0xd5,0x41,0x5f,0x32,0xa3,0x27,0xe6,0xa1,0x03,0x58,0x28,0x06,0xb4,0xad,0x55,0x0a,0x2b,0x19,0x05,0x00,0x1c,0x98,0xbd,0xbf,0x5d,0x14,0x28,0xb0,0x7c,0x86,0x14,0xf9,0x73,0x33,0xc7,0xbc,0xd2,0x00,0x37,0x72,0xac,0x30,0x25 .byte 0x30,0xeb,0xe2,0xb8,0xcd,0xf3,0x1e,0xad,0x93,0xf4,0xa3,0xac,0x03,0x37,0xe5,0x6d,0x73,0x80,0x4d,0x9e,0xc7,0xb4,0xad,0x7d,0xbe,0xe1,0x79,0x34,0x23,0x9f,0xbf,0x5c,0x02,0x6a,0x03,0x04,0xe3,0xd0,0x55,0x65,0x3d,0xc7,0x66,0xf3,0xfb,0xba,0x9c,0xed,0x88,0x9f,0xae,0xc4,0x83,0x69,0x99,0xd3,0x0f,0xac,0x46,0x22,0xcd,0x4e,0x56,0x27 .byte 0x73,0x7c,0x10,0xcf,0xbe,0x34,0xe5,0x06,0xfb,0xa7,0xe4,0x28,0x59,0x0a,0x0d,0xba,0xf0,0x52,0xe9,0xf7,0xbb,0x00,0x58,0x65,0x77,0x3b,0x83,0x67,0xaf,0xd8,0x88,0x9e,0xe8,0xa8,0xda,0x76,0x4d,0xb8,0x8e,0x40,0x70,0xe3,0x95,0x3e,0xe8,0xf1,0xaf,0x5d,0x54,0x54,0x65,0x6e,0xc1,0x58,0x06,0xd0,0xc9,0x0f,0x5e,0x63,0x0a,0xfe,0x50,0xc7 .byte 0xca,0x16,0x7d,0xd8,0x34,0xcc,0xf6,0xd2,0xb1,0x8d,0xf1,0xd9,0xe5,0xf7,0x3d,0x5f,0xe4,0x7f,0x64,0xb8,0xc3,0xba,0xc2,0x4f,0xd7,0x3a,0x78,0xed,0x8a,0x54,0xc9,0x72,0xf0,0xec,0x64,0x2e,0x20,0x27,0x97,0xea,0x8e,0x6b,0xaa,0xb2,0x52,0x13,0x67,0x66,0x89,0xc1,0x8c,0x5b,0x64,0x9f,0xd1,0x3c,0x9b,0x4f,0x9e,0x96,0x93,0xa2,0xf3,0xa8 .byte 0x7c,0x94,0xd2,0xfa,0xd6,0xc3,0x48,0xca,0x1e,0x89,0x1a,0x62,0x52,0x92,0x01,0xc5,0x9e,0x2d,0x8b,0x4f,0xf5,0xd4,0x10,0x6b,0x33,0x0e,0x8b,0xfa,0x0c,0x80,0x05,0x50,0x0d,0x84,0x3b,0xb0,0xe4,0x27,0x63,0xc3,0x46,0x40,0xf0,0x2b,0x31,0x31,0xd3,0xf5,0x07,0xb8,0x7c,0xec,0x83,0xb8,0xff,0x9e,0x5a,0xb9,0x57,0x4a,0xe5,0x85,0xaf,0x47 .byte 0x7c,0x36,0xb1,0x5e,0xe9,0xf6,0xe8,0x02,0xfb,0x33,0xb5,0xa5,0x6f,0x03,0x76,0x26,0x20,0x03,0x1f,0xac,0x26,0x7c,0x29,0xf2,0xbf,0xcf,0xf9,0x31,0xcc,0xa0,0xdb,0x8a,0xd1,0x06,0xc2,0x6b,0x57,0x8d,0x6a,0x02,0x02,0x37,0x84,0xa4,0xd0,0x4c,0x56,0x4c,0xfd,0x18,0x30,0x86,0x9e,0xb2,0x71,0xc2,0xc8,0xe8,0x4f,0xd7,0xeb,0xa7,0x6e,0x77 .byte 0xeb,0x89,0xb4,0x6b,0x19,0x46,0x65,0xdf,0x74,0x10,0x82,0xe7,0xd2,0xbf,0x70,0x11,0x41,0x1a,0x87,0xc8,0xcb,0xc0,0xd8,0x2e,0xfd,0x36,0x24,0x92,0x91,0x67,0xb6,0x2d,0xc1,0x81,0xa0,0x6a,0xf9,0xb7,0x06,0x21,0x55,0x0d,0xa2,0x74,0xd9,0x24,0x35,0x00,0x42,0xd3,0x08,0xdb,0xcc,0x28,0x56,0xd4,0x9b,0x38,0x9c,0x2d,0x98,0xb1,0x56,0x96 .byte 0x30,0xe9,0x7a,0xde,0x8a,0xbd,0x13,0xee,0x2b,0xb9,0x10,0x88,0x1a,0x7a,0x29,0x0e,0x9b,0x45,0x7b,0x37,0x14,0x7a,0xf4,0x40,0xe9,0x60,0x16,0x6c,0x0c,0x64,0x6c,0x15,0xd8,0xf8,0xc4,0xcd,0x9e,0x9a,0xa2,0xa7,0xf5,0xe3,0xd8,0xbb,0x40,0x31,0x75,0x34,0x98,0x85,0xed,0xe5,0xaf,0xfb,0x6a,0x64,0x32,0x75,0x25,0xba,0x35,0x79,0xcf,0x9e .byte 0xb7,0x8f,0xde,0x18,0x97,0xe5,0x31,0x4f,0x52,0x69,0x50,0x05,0x94,0x8e,0xb6,0x56,0xb1,0x94,0xa6,0xa2,0x36,0x7e,0x17,0x3d,0x5e,0xb9,0xc7,0xee,0x0e,0x33,0xd4,0xeb,0x58,0xc9,0x6a,0xb8,0x3b,0x32,0x53,0xbf,0x61,0xf7,0x3f,0xec,0x7d,0x8d,0x20,0x4d,0xb4,0x38,0x68,0x3a,0x21,0x28,0x89,0x19,0x10,0xe3,0x2f,0xf5,0x74,0x77,0x39,0xe8 .byte 0xb3,0x72,0xaf,0x50,0x30,0x36,0x1e,0xc7,0x57,0x66,0x31,0xe2,0x84,0xe1,0x05,0x94,0xd6,0xbf,0x91,0x97,0xe0,0x22,0x26,0xcf,0xeb,0x06,0x33,0x70,0x22,0x19,0x58,0xc7,0x80,0x0b,0xe8,0x26,0x35,0xbc,0x8d,0xc3,0xb0,0x97,0x7d,0x8d,0x70,0xf9,0x66,0x76,0x52,0x71,0x46,0x1b,0x6a,0x4e,0x9a,0xd1,0xa1,0xfd,0xda,0x6a,0x1b,0x6f,0x2e,0xff .byte 0xd1,0xe4,0x23,0xd5,0xa9,0xc6,0x6a,0x5e,0x84,0x5c,0x2f,0x26,0x55,0x4b,0xbb,0xb1,0xf2,0x79,0xa5,0xfb,0xfb,0x29,0xcd,0x57,0xd2,0xef,0x45,0xbe,0x3f,0xc1,0x6c,0x4c,0xbc,0xca,0xe0,0x0b,0x6a,0x8e,0xb9,0x8a,0x2f,0x3b,0x86,0x42,0xb7,0xf5,0xa5,0x38,0x99,0x97,0xaa,0xf5,0x36,0x87,0x97,0x56,0xe1,0x03,0x76,0xb5,0xcc,0x84,0xad,0x31 .byte 0x29,0xad,0xc4,0x93,0x47,0x07,0x00,0x91,0x47,0x0e,0x8a,0x32,0x43,0x9c,0xba,0x02,0x59,0xe5,0x62,0xc6,0xdd,0xd5,0xcf,0x0a,0xd7,0x33,0x6a,0x76,0x6a,0xa9,0x1d,0xfc,0xfc,0x0b,0x0a,0x4e,0x4e,0xed,0x8a,0xdf,0x8f,0x97,0x50,0xb2,0x1d,0xbe,0x31,0x04,0x6d,0x04,0x5c,0xf9,0x95,0x36,0xcc,0x7c,0xa2,0xaf,0x2a,0x6a,0x50,0xbc,0xf0,0xe5 .byte 0xdd,0x1f,0xc2,0x90,0xc0,0xa0,0x33,0xcb,0x90,0x5c,0x02,0x87,0xf6,0xa1,0xf8,0xa6,0x03,0xca,0xfb,0x89,0x8e,0xff,0x82,0x6f,0x5c,0x16,0x25,0xa1,0x2c,0x0e,0xd6,0xa0,0xab,0x64,0xa0,0x4b,0x66,0x9b,0x08,0x64,0x97,0x93,0xa2,0xdb,0xf5,0xac,0x78,0x57,0x8d,0x32,0x16,0x44,0x3a,0xb9,0xd2,0xe6,0xc4,0xf3,0xb9,0x44,0x45,0x15,0x57,0x33 .byte 0xfa,0x98,0x61,0x17,0x8b,0x7c,0x2f,0xd7,0x0c,0x14,0xf2,0xb4,0xe3,0xa7,0x50,0x71,0x57,0x1d,0xd0,0x9b,0xab,0x8d,0x4f,0x42,0x08,0x7c,0x54,0x58,0xc7,0xbf,0x17,0x15,0x64,0x91,0x7a,0xd4,0xaf,0xf6,0x6a,0x45,0xdc,0x2d,0xfc,0x80,0xd6,0x5d,0x4b,0xea,0xd7,0x45,0xe7,0xd4,0x20,0xa3,0x5f,0xda,0x73,0xa1,0x87,0x8b,0xf2,0x93,0x50,0x5c .byte 0x20,0x89,0xbd,0xb2,0xe0,0x47,0xe6,0xf0,0x6c,0x42,0x2b,0xe1,0x1e,0xa0,0x2d,0x0f,0xf1,0x05,0x28,0xa2,0xd4,0x5d,0x12,0x95,0x0a,0x6e,0x62,0x11,0x34,0x56,0x29,0xe9,0x9d,0x45,0x5f,0x55,0xcb,0xaa,0x3a,0x59,0xe5,0x17,0xb3,0x12,0xcf,0x2a,0x10,0xa9,0x71,0x22,0x06,0xfa,0xec,0x99,0x6f,0x80,0xa3,0xfe,0x5c,0xc5,0x65,0xb9,0x34,0x19 .byte 0xd3,0x62,0x58,0xce,0x33,0x47,0x03,0x44,0xc6,0xa0,0xd4,0x51,0x58,0xaf,0xbb,0xe1,0xaf,0x53,0xf5,0xe7,0xee,0x6f,0x70,0x7a,0x15,0xf6,0x96,0xbf,0x4a,0xbe,0x7a,0x5d,0xbb,0x54,0xe6,0x8a,0xeb,0x48,0xaa,0x96,0xad,0xde,0x1e,0x96,0xe0,0x2a,0x0a,0x09,0x01,0xfe,0x39,0xfe,0x1f,0x3a,0xef,0x2f,0xa9,0xfc,0x33,0xf1,0xec,0x05,0x24,0x5e .byte 0xb3,0x35,0xd3,0x56,0x07,0x8b,0xe5,0xba,0xbd,0x2a,0x8c,0xf0,0x59,0xe0,0xef,0xd6,0x7c,0xe2,0x26,0xd8,0x2d,0x38,0x17,0x06,0x11,0x90,0xe1,0x01,0x14,0x7e,0xcb,0x0f,0x0f,0x60,0x01,0x26,0x4f,0x21,0x24,0xad,0x15,0xd0,0x69,0x85,0xe6,0xbc,0xe6,0x47,0x52,0x40,0xec,0xe3,0x14,0xf7,0x8c,0xcc,0x93,0x1d,0xef,0xb4,0xa5,0xa5,0x21,0x93 .byte 0x37,0x09,0x86,0xac,0x28,0x45,0x1d,0x11,0xb8,0xaa,0xa8,0x5a,0x9f,0xb1,0x66,0x4b,0x57,0xa2,0xd9,0x22,0xcf,0xbf,0x69,0xa6,0x20,0x1f,0x7e,0x35,0x32,0x83,0x20,0x6d,0x2a,0x4b,0x14,0x71,0xd1,0x3b,0x11,0x9d,0xc8,0x7f,0x9d,0x2c,0xf6,0x75,0xd9,0x08,0xac,0xa4,0xd3,0x14,0x8b,0xf3,0x14,0xff,0x03,0x88,0xeb,0xb9,0xb9,0x9e,0x83,0x64 .byte 0xfe,0x8a,0x97,0x0b,0xa1,0x7c,0x50,0x11,0x6b,0xc1,0x6e,0x77,0x56,0x25,0x6e,0x32,0xfc,0x54,0xc1,0x99,0xc0,0x31,0xef,0x65,0xb3,0x67,0xd0,0x7c,0x12,0x62,0xfd,0x8f,0x71,0x5c,0xfc,0xf9,0x26,0x29,0x2d,0x50,0x28,0xbd,0x26,0x40,0x63,0x43,0x79,0x78,0x07,0xa8,0xb4,0x19,0x06,0x25,0xd8,0xe5,0xad,0x75,0x6f,0xe0,0xb4,0xef,0x1f,0xe9 .byte 0x5b,0xa0,0xf8,0x32,0xec,0xe5,0xc1,0x75,0x04,0x88,0x1f,0xad,0x30,0x16,0xe2,0x05,0x8c,0xee,0x81,0x80,0x9b,0x0c,0x8d,0xd1,0xfb,0x55,0x0b,0x8d,0xdf,0x67,0x91,0x05,0xb2,0xfc,0x1e,0x99,0x12,0xb3,0x7c,0x33,0x4a,0x39,0x5f,0xbb,0xd9,0xe8,0xbb,0x17,0xd9,0x4b,0x8b,0xd6,0x6d,0x90,0xa8,0xbf,0xb7,0xd8,0xe0,0x83,0x93,0x16,0x5b,0x0f .byte 0x8b,0xc8,0x14,0x7d,0x24,0xf5,0xc7,0x33,0x21,0xa6,0xa0,0x1c,0x37,0xea,0xab,0x74,0x86,0xb8,0xe0,0xb7,0x57,0x4d,0x5e,0x2a,0x2c,0x4c,0xbb,0x06,0x0b,0x44,0xe4,0xab,0xb9,0xcd,0x94,0xa9,0x33,0x40,0xc6,0x20,0x90,0xe2,0x7b,0xf6,0x84,0x23,0x59,0x52,0x72,0x83,0x45,0x33,0x5d,0x91,0x93,0xa8,0x32,0xa1,0xe4,0x26,0x13,0xd8,0xf6,0x21 .byte 0x85,0x02,0x66,0xad,0xbf,0x18,0x41,0x50,0xd3,0xda,0xa4,0xee,0x3b,0xd8,0xc1,0x2d,0xe6,0xa6,0x40,0x97,0xeb,0xd4,0x2f,0x7e,0x70,0x1a,0x7a,0xf1,0xc2,0x24,0xf8,0xef,0x43,0xef,0x0b,0xf9,0x87,0x6b,0xe7,0x10,0xa1,0x17,0x75,0x03,0x30,0x33,0xca,0xa4,0xb5,0x8d,0x70,0x7d,0xec,0x2c,0xe8,0x07,0x42,0x11,0x9d,0x29,0x23,0x31,0x8f,0x9d .byte 0x83,0x71,0xeb,0x39,0x2d,0x80,0x15,0xd2,0xcf,0x42,0xc9,0x06,0x6d,0x90,0x73,0x8b,0xcb,0xeb,0x9d,0xb6,0xc8,0x61,0xcc,0x84,0x2d,0xa7,0xf2,0x35,0xbc,0xc8,0x14,0xe9,0x89,0xb5,0x47,0xe5,0x5c,0xdb,0x0c,0x98,0xc9,0xec,0x20,0x61,0x63,0x2c,0x58,0xbb,0x8e,0x46,0xb1,0xca,0x6a,0xbb,0x11,0x73,0xb6,0x5e,0x88,0x50,0xce,0xcf,0x14,0x60 .byte 0x5c,0xc8,0x59,0x81,0xb2,0x8f,0xde,0x36,0x57,0x5a,0x18,0xf7,0xa5,0x57,0xf7,0x71,0xd3,0x92,0x5a,0xb5,0x41,0x4d,0xcc,0x74,0xe8,0xdb,0xfd,0x15,0x1b,0xb8,0x40,0x91,0x04,0x12,0x74,0x84,0xcb,0x1f,0x3c,0x13,0xa4,0xa2,0xde,0x52,0xaf,0xdd,0x3b,0x1e,0x88,0x6e,0x86,0xd0,0xe9,0xb7,0x10,0x3b,0x29,0xef,0xce,0xa3,0xf9,0x85,0x0d,0x27 .byte 0x1d,0x21,0x74,0x0e,0x06,0x66,0xfa,0xcb,0xad,0x88,0x58,0x79,0xdb,0x3f,0x8a,0xbe,0x4d,0x56,0x4b,0x45,0xae,0x6f,0x0c,0x6a,0x8c,0x73,0x5b,0x61,0xde,0x41,0x03,0x9b,0xef,0xdd,0x35,0xde,0x57,0x96,0x11,0x8a,0x56,0x6b,0xa5,0x57,0x7e,0xb1,0xa7,0x12,0x4a,0x79,0xb9,0xc4,0x04,0xd5,0x7b,0x8c,0xad,0xf2,0x83,0xff,0x7d,0xdc,0xcf,0x22 .byte 0x25,0x5d,0x6f,0xfc,0xd7,0x7b,0xac,0x53,0x80,0x1d,0x7e,0xff,0x89,0x95,0x48,0x38,0xc0,0x48,0xd8,0xb9,0x3b,0x5e,0xc3,0x99,0xc8,0xc6,0x6d,0xd2,0x0e,0xd8,0xc2,0x9e,0x3d,0x9e,0xf4,0xa7,0x5f,0xc4,0x9a,0xd1,0x0c,0x49,0xb8,0x5a,0x66,0x94,0x69,0x71,0x19,0xba,0x9b,0xe6,0x4f,0xa9,0xcf,0x70,0x7d,0xe2,0x60,0xea,0x06,0xd7,0x94,0xe1 .byte 0xb6,0x23,0x7f,0x2c,0x2c,0xe4,0xf4,0xdf,0xcc,0x1a,0x25,0xfa,0x47,0xef,0xf2,0x37,0x32,0xd4,0xf2,0xdd,0xc9,0x13,0xb8,0x09,0x85,0x33,0x5c,0xa2,0xa2,0x20,0x11,0xd1,0x3b,0x6e,0x9d,0x11,0xb6,0xb8,0x75,0xf1,0x47,0x6f,0x93,0x35,0x55,0x55,0xa5,0x11,0x4d,0xbf,0xc1,0x0a,0x99,0x84,0x65,0x91,0x16,0xc1,0x64,0x1a,0xdb,0x15,0xcf,0x2f .byte 0x93,0x0e,0x6b,0xe0,0x8c,0x70,0xfa,0x5e,0xa2,0x5c,0xd8,0x43,0x2f,0x93,0x22,0x9e,0xdc,0xad,0xf6,0x39,0x15,0x2b,0x50,0xa0,0xdb,0x51,0xfc,0x00,0xda,0x8b,0x7a,0xa9,0x14,0x07,0x79,0x25,0x8c,0x7d,0x71,0x3f,0x8d,0x51,0x20,0x81,0xdc,0x4a,0x92,0x71,0x4c,0xb2,0xc6,0x5c,0x8a,0x18,0xa1,0xaa,0xb0,0x2e,0x06,0xb4,0xd4,0x6a,0xd4,0xa8 .byte 0xd1,0x31,0x81,0x22,0xe3,0x22,0xc9,0x75,0x84,0xc1,0x95,0xae,0xa6,0xa2,0xb4,0x93,0x4b,0x9c,0xea,0xc6,0x4c,0xdc,0x25,0xd9,0xeb,0x12,0x64,0xf9,0x42,0x8e,0x72,0x47,0xd9,0x89,0xd6,0xc4,0xf9,0xa7,0xc6,0x64,0x53,0x05,0x40,0xf5,0x9c,0xab,0x53,0x45,0xa4,0xe5,0x3e,0x2f,0xf7,0x69,0x06,0xc1,0x7e,0xb0,0xec,0x4c,0x22,0xfe,0x89,0x6c .byte 0x4c,0x80,0x5d,0x51,0x0a,0x20,0xaa,0x71,0x68,0x9c,0x3e,0x29,0xf2,0x82,0xd4,0x81,0x6c,0x8b,0x11,0x42,0x00,0x86,0x70,0x74,0xe0,0x94,0xcf,0xee,0x2f,0xbd,0x8a,0xab,0xee,0xfc,0xd8,0x8e,0x87,0x2e,0xce,0x89,0xaf,0x29,0xc2,0x2b,0xcd,0xa3,0xc4,0x47,0xa2,0x1f,0x2e,0xc3,0x2d,0x9f,0x89,0xbb,0x57,0xa6,0x00,0xc3,0x4a,0x91,0x2e,0xfd .byte 0xbf,0xbb,0x4a,0xb5,0x3c,0xa1,0x4d,0x96,0x2d,0x62,0xf6,0xda,0x9f,0x75,0xef,0x84,0x18,0x5c,0x31,0x31,0xcc,0xe4,0x82,0xd4,0xb6,0x7a,0xd7,0x6b,0x6e,0x32,0xb6,0xdb,0x90,0x16,0x5a,0xc0,0x4e,0xe4,0x48,0x69,0xd3,0xe3,0xf2,0xfa,0xed,0x17,0x4b,0x06,0xe0,0xd8,0x4d,0xa9,0xee,0x19,0x98,0x65,0xf5,0xb3,0x69,0xe2,0x23,0x23,0x04,0xca .byte 0x52,0x7b,0x7b,0xaa,0xb9,0x03,0x71,0x1b,0x37,0x17,0x16,0xe0,0xb7,0x5a,0x75,0xa9,0x97,0xbe,0x44,0xa9,0xb2,0xef,0x5a,0x5c,0x17,0x31,0x77,0xe3,0x15,0x4f,0xb6,0x4c,0xff,0xf9,0x10,0xdd,0x41,0xab,0xfa,0xf0,0xed,0xe7,0xa6,0x74,0x6f,0x7e,0xc9,0x71,0x66,0x16,0xed,0x68,0xb0,0x74,0x85,0xeb,0xb2,0xc5,0x73,0xc1,0x00,0x33,0xb3,0x9d .byte 0xd9,0x7f,0x0e,0x9d,0x17,0xf2,0x0b,0x55,0xb6,0x68,0x9b,0xe9,0xc9,0x46,0xa5,0x97,0xe3,0xe9,0xb6,0xc3,0xa3,0x10,0x57,0x11,0xd6,0xc1,0x7a,0xfe,0x05,0xa5,0xcb,0x15,0x75,0x92,0xd8,0x69,0xdd,0xe0,0x67,0x5a,0x8c,0x50,0x6d,0x66,0xd5,0x79,0xf6,0xb6,0x7e,0xf1,0x04,0x95,0x45,0x03,0x84,0x0e,0x8a,0xa6,0x27,0x87,0x9b,0x6b,0x58,0x46 .byte 0x52,0xfb,0x36,0xd8,0x90,0x14,0xcd,0x68,0xa9,0xb7,0x51,0x2e,0xb5,0xc5,0x3b,0x4d,0xee,0x86,0x65,0x94,0xec,0x94,0x8e,0x26,0x01,0xe8,0xcd,0x0a,0xa0,0xb8,0x7c,0x76,0xe7,0xd7,0x65,0xa4,0x0c,0xe5,0x6f,0xfc,0x3d,0xad,0xc0,0x94,0x44,0xb4,0x98,0xc9,0x01,0x71,0x03,0x96,0x12,0x77,0x0d,0xbf,0xb7,0x05,0xe1,0x95,0xff,0x01,0x0c,0x26 .byte 0x13,0xbe,0x09,0xf6,0x35,0xee,0x44,0x33,0x86,0xf4,0xb4,0x65,0x72,0xbd,0x66,0x1a,0xcf,0x89,0xa5,0xe0,0x3a,0xe7,0x1a,0x2a,0x1e,0x73,0xf0,0xef,0x74,0xdb,0xaf,0x02,0x4c,0xd4,0x0f,0xfd,0x5e,0x20,0x4f,0xd7,0x19,0x36,0xeb,0x00,0x2e,0xce,0x56,0xe7,0xba,0x6d,0xae,0x73,0x27,0x7e,0xc5,0x28,0x94,0xc6,0xbf,0x9b,0xca,0xb4,0x52,0x04 .byte 0xd3,0xd1,0x4f,0x61,0x5b,0xcd,0x97,0x12,0x35,0xc0,0x10,0x12,0x15,0x05,0x02,0x1a,0xae,0x0e,0xf9,0xc7,0x5d,0xeb,0xea,0xcd,0x3c,0x10,0x51,0xf2,0x0c,0x48,0x6f,0x45,0xa2,0x50,0xa9,0x95,0x21,0x7c,0xd3,0x91,0x5f,0x72,0x59,0xa8,0x2b,0xfb,0xe8,0xb1,0xd9,0xdb,0x46,0x1e,0xe8,0x25,0x78,0x2c,0x01,0xbb,0x35,0x3f,0x95,0x04,0x84,0x96 .byte 0x1f,0x55,0xa4,0x46,0x2a,0x8c,0x58,0xb6,0xfc,0x2e,0xfa,0xa4,0xb8,0x4d,0x5d,0x0b,0x5f,0xa4,0x93,0x06,0xae,0x62,0x6a,0x6a,0xce,0xa5,0xc7,0x06,0xf0,0x05,0xf8,0xd7,0x3a,0x0b,0xb8,0x80,0xa6,0x2f,0x73,0xbd,0xbc,0x31,0x33,0x96,0xf9,0x8b,0x52,0x7e,0x3f,0x64,0x48,0x1d,0xca,0x23,0x71,0xe6,0xf3,0x2b,0x03,0x20,0xa0,0x2b,0xec,0x5b .byte 0xca,0x5e,0x31,0x7c,0x01,0xf4,0x58,0xdc,0x27,0x57,0x8e,0x41,0xfc,0xa6,0x10,0x09,0xc3,0xbd,0x89,0x7b,0xfb,0x09,0x85,0xa5,0xa3,0xbe,0x15,0x94,0x41,0x7a,0x86,0xfe,0xab,0x9d,0xcf,0x56,0x60,0xa1,0xb3,0xee,0x9a,0x69,0xf9,0x2f,0xb7,0x92,0x7a,0x7b,0xb6,0x23,0xf3,0xca,0x9c,0xbe,0xb6,0x51,0x04,0x3d,0x2a,0x17,0xdd,0x13,0x9b,0x9b .byte 0x1c,0x50,0xe4,0x11,0x5b,0xce,0x0e,0x54,0x7c,0x25,0xdd,0xc1,0x91,0x90,0xe4,0xb5,0xa6,0x84,0x22,0x44,0x46,0x68,0x7b,0x16,0x23,0xc0,0x69,0x64,0xc4,0x12,0x03,0x8c,0x85,0xe2,0x4c,0x83,0xdb,0xb1,0xe3,0x35,0x15,0x6a,0xd3,0x56,0x73,0xa1,0x51,0xad,0xd2,0x15,0xc5,0xa9,0xb3,0x7e,0x81,0xa1,0x16,0x19,0xbe,0x8b,0x98,0x2f,0x31,0xaf .byte 0x51,0x67,0x4c,0x09,0xae,0x4d,0x77,0xa4,0xcd,0x28,0xbf,0xd0,0x0e,0x17,0x57,0x15,0xcf,0x48,0x8b,0x90,0xb1,0xb5,0x59,0x43,0xac,0x34,0x34,0xa1,0x4b,0x36,0x20,0x0d,0x40,0x6d,0x81,0xa2,0x40,0x5e,0x7b,0xd8,0xf3,0xf5,0x33,0x3b,0x14,0x19,0x55,0x07,0xfc,0x53,0x22,0x7e,0x4f,0xe2,0xde,0xb7,0x8b,0x2d,0x10,0x0c,0xc1,0xc7,0x0d,0x3c .byte 0xc0,0x8a,0x91,0xfa,0xf5,0x9b,0xcd,0x25,0xe8,0x8f,0x10,0x4b,0x9a,0x07,0x94,0xa9,0xc0,0xb4,0x18,0x6c,0x9a,0x88,0x94,0x4d,0x33,0xc7,0xf5,0x20,0x8c,0x02,0x9a,0xde,0x90,0x11,0xbd,0x90,0x14,0xb0,0x72,0xaf,0x8e,0xef,0x9c,0x22,0x2b,0x6a,0xd7,0x75,0xae,0x6e,0x97,0x46,0x3f,0xef,0xb3,0x4d,0x34,0x0b,0x41,0x35,0xc9,0xb4,0xaa,0x18 .byte 0xfb,0x95,0x09,0x64,0xe0,0xff,0x51,0xa0,0xf4,0x8f,0xa9,0x5f,0x8f,0x51,0xa6,0x5b,0x86,0x0d,0x83,0x26,0x1e,0x00,0xab,0x6f,0x73,0xf6,0x98,0x24,0x4b,0xb2,0xe0,0xfe,0xbc,0x03,0x7f,0x6c,0x88,0xe8,0x36,0xea,0x10,0xe7,0x73,0xa0,0x96,0x88,0xad,0x0f,0x88,0xb6,0x9f,0xa7,0xe4,0x38,0x35,0xa3,0x29,0x9a,0x34,0xd1,0x00,0x1c,0x61,0x93 .byte 0x90,0x12,0xc3,0xcb,0x72,0x62,0x0a,0xc8,0xad,0x9c,0x0d,0x19,0x6c,0xe2,0x53,0xf0,0xf0,0x2f,0x2c,0x72,0x0f,0xf1,0xb1,0xd1,0x56,0xd4,0x87,0xbc,0x73,0x63,0xfe,0x2c,0x7b,0x9b,0xaa,0x6c,0xa6,0x79,0xfd,0xfa,0x20,0x83,0xb2,0x6d,0x4e,0xe4,0xae,0x73,0xf8,0xb5,0x6c,0x1a,0x97,0x07,0x8a,0x6f,0xe8,0x33,0xc5,0xea,0x61,0x18,0x53,0x56 .byte 0xa4,0x11,0x32,0xe1,0x8c,0xae,0x69,0xac,0xed,0x35,0xe0,0x6f,0x7d,0x97,0x8b,0xa3,0x12,0xa4,0x92,0x42,0xcf,0x43,0xef,0xc3,0x8e,0x99,0x12,0x0a,0xb6,0xa6,0xcc,0xae,0xca,0x1c,0xe3,0xa1,0x65,0x74,0x79,0x6a,0x5f,0xa2,0x3e,0x6d,0xb6,0x45,0xa5,0x40,0xc8,0x59,0xa0,0x31,0xa9,0x07,0x35,0x81,0xaf,0xee,0x35,0x07,0xa0,0xe3,0x26,0x4c .byte 0x57,0x08,0xa0,0x01,0xc3,0x8b,0xd8,0x9a,0xba,0xe4,0x73,0x7f,0xcb,0xc4,0x0a,0x65,0xb3,0x16,0xf5,0x36,0x35,0xd3,0x2f,0x15,0x61,0xa6,0x90,0xa6,0xa5,0x4c,0xc6,0x57,0xd4,0xd0,0x80,0xfb,0x68,0x52,0xd4,0x09,0x24,0x39,0x29,0xa1,0x39,0xf2,0x3d,0xbc,0xc6,0x7c,0x95,0x3c,0xa4,0xe1,0xeb,0x33,0x94,0xfe,0xda,0x92,0x75,0x7f,0x76,0xe0 .byte 0x61,0xa9,0x27,0x2d,0x43,0xf9,0x4f,0xd6,0x61,0x12,0x89,0x12,0x46,0x79,0xb6,0x6c,0xa1,0x6d,0xcb,0xcb,0x12,0x1b,0x82,0xa6,0x41,0xa8,0xf5,0x43,0x46,0xdd,0x8b,0x43,0x5f,0x5f,0xce,0x7b,0xc1,0xec,0x55,0x8d,0x37,0xe5,0x78,0x4c,0x2e,0x3a,0x64,0xcf,0xef,0x8c,0x76,0x04,0x75,0x42,0x0d,0xb5,0xaa,0x5f,0xd1,0x55,0xbc,0x54,0x26,0x9e .byte 0xc6,0xa0,0x8c,0x36,0x39,0x23,0x54,0x66,0x34,0x83,0xed,0x1e,0xf4,0xca,0x7e,0x11,0xb4,0xd1,0x0c,0xcd,0x67,0xa6,0xbb,0x02,0x30,0x61,0xd9,0x3f,0xbf,0x83,0x5c,0x15,0x60,0xa4,0x1b,0x73,0x67,0xa0,0x54,0x07,0x2a,0xc4,0x11,0x4e,0xfb,0xe8,0x85,0xda,0x78,0xbb,0x91,0x98,0xb8,0xf4,0x7c,0x6c,0x0b,0x32,0xad,0x6d,0x1b,0x29,0x2a,0x2e .byte 0x36,0xef,0xd8,0xdd,0xa3,0xdd,0x6d,0x45,0xf0,0x90,0xa9,0xf8,0xb5,0x1f,0x3b,0xaa,0xe2,0x88,0x97,0x46,0xc1,0x86,0x8e,0xb7,0x6b,0x01,0x5f,0xac,0xa4,0xfa,0x35,0xef,0xfb,0xa4,0x0a,0x31,0xaa,0x80,0x81,0x98,0x78,0xcf,0xe5,0x25,0xbf,0x4a,0x84,0xd1,0x11,0x92,0x0a,0xc6,0x98,0xd2,0x99,0xa8,0x42,0x46,0x20,0x04,0x95,0xa1,0xad,0xef .byte 0x86,0x1f,0xe3,0x4d,0x6f,0xed,0x01,0xf4,0x42,0x54,0xe4,0x34,0xec,0x64,0x97,0x48,0x1f,0x41,0xe1,0x50,0x85,0x86,0xe3,0x85,0xdb,0xd0,0x8b,0xe4,0xc9,0x91,0xea,0xa4,0x5d,0x65,0xd2,0x98,0x52,0x0a,0x0d,0xde,0x71,0xb4,0x86,0xaa,0xfc,0xa7,0x1b,0x7b,0x1a,0xa1,0x1c,0x5a,0xea,0x82,0x97,0x03,0x43,0x88,0xcd,0x96,0xf6,0x55,0x87,0x6f .byte 0xb9,0x85,0xed,0x9c,0x17,0x89,0x31,0x7e,0x72,0x96,0x0f,0x2f,0xb7,0xcb,0x45,0xe4,0x46,0x4d,0xf3,0x38,0xc2,0xe2,0x24,0xdb,0x7e,0x1e,0x1d,0xae,0x56,0x34,0x7e,0xf5,0xc7,0x17,0x08,0x22,0xab,0xb6,0x3c,0xf3,0x3f,0xe1,0xd6,0xd3,0x71,0xb5,0x58,0xad,0x88,0x41,0xab,0x1b,0x2c,0x90,0xd2,0x94,0x65,0x0c,0x02,0x7f,0x9c,0x01,0xbc,0x14 .byte 0x89,0x4d,0xca,0x3e,0x57,0xc5,0x00,0xe7,0x61,0x81,0x5c,0x07,0x39,0x18,0xc9,0xaa,0xd9,0xa1,0x3d,0xa9,0x9e,0xe2,0xec,0xaa,0x15,0x34,0xf8,0xd5,0x7b,0x20,0xbb,0x19,0xe2,0xc8,0x95,0xbe,0x46,0xfa,0xa1,0xde,0x22,0x18,0xbc,0x28,0xf6,0x72,0x2a,0xc7,0x4a,0x26,0x4c,0xe2,0xdb,0xcf,0xc1,0xa2,0x41,0x9e,0xb8,0xfb,0x93,0x65,0x8f,0xc8 .byte 0x38,0x6a,0x8a,0x4e,0xea,0x35,0xed,0xc6,0x1a,0xcd,0x77,0x4f,0xc1,0x7c,0x08,0xd3,0xc6,0x50,0xab,0x08,0x34,0x76,0xbc,0x65,0x8f,0x88,0xa8,0xa7,0x03,0x18,0x4a,0xdf,0x64,0x35,0xad,0xa0,0x1a,0x91,0xee,0x41,0x1e,0xe7,0x70,0x9f,0x6e,0x46,0xd5,0xc6,0xda,0x1b,0x17,0x5c,0x11,0x56,0x55,0x5c,0xdd,0x24,0xb7,0x15,0xc8,0xa6,0x02,0x33 .byte 0xa6,0x10,0xd6,0x9b,0x67,0xc0,0x20,0x46,0x25,0xf8,0xd0,0xab,0x25,0xbb,0x00,0x3a,0xcc,0x00,0x30,0xad,0xa9,0x60,0x28,0xc9,0xfd,0x8c,0x0d,0x02,0x95,0x47,0xff,0x30,0xa5,0x52,0x91,0xc4,0xef,0x73,0x28,0x93,0x08,0x37,0xe7,0x81,0x8f,0xd5,0x0c,0xd8,0x6b,0xc6,0x73,0xe7,0xfe,0x3f,0xc8,0xe0,0xd8,0xa7,0x68,0xa2,0xa9,0xd8,0xa3,0xa3 .byte 0x90,0x7e,0xa5,0x30,0x61,0xac,0xfc,0xe9,0x56,0x07,0x49,0xc6,0xf6,0x0d,0x21,0x86,0xa5,0xc8,0x7b,0x3a,0xfb,0xa7,0x59,0x3f,0xd0,0xe7,0x2b,0x90,0x40,0x71,0x76,0x06,0x34,0x03,0x32,0xb9,0x93,0x02,0xa4,0xa8,0x17,0x27,0xa3,0x47,0x40,0x79,0xed,0x8c,0x6f,0x12,0x7f,0x32,0x7d,0x9f,0x3a,0x39,0xfb,0xb6,0x75,0x66,0x60,0x66,0x6f,0x84 .byte 0x79,0xd6,0xce,0x6a,0x78,0x55,0x60,0x6b,0x1d,0x81,0xed,0x29,0x48,0x56,0x62,0x21,0xe0,0x8e,0xf8,0x63,0xad,0x6a,0x08,0xcc,0x9d,0x25,0x77,0x50,0x57,0x87,0x7d,0x52,0x8b,0x85,0x27,0x1c,0x10,0x68,0xe5,0xb7,0xfa,0x75,0xd2,0xfe,0x7d,0x89,0x1a,0x17,0xb7,0x0b,0x6c,0xe8,0x50,0xcf,0x42,0x51,0x77,0x27,0x75,0x2b,0x15,0xdb,0xc8,0x10 .byte 0x7a,0xd5,0x32,0x90,0x08,0x31,0x16,0x18,0x26,0x22,0xdb,0xfb,0x98,0xe1,0x49,0x71,0x7b,0x63,0x6f,0xb8,0x5e,0xd0,0x70,0x59,0xa0,0x26,0xd4,0xe0,0x01,0x0f,0xd2,0xb1,0x8a,0x94,0x94,0xa1,0x31,0x61,0xf8,0xbb,0x9a,0xe3,0x9b,0x3d,0xe8,0x55,0x4b,0x49,0xc0,0x71,0x57,0xfe,0x39,0xef,0x53,0x35,0xec,0x0c,0xf7,0x71,0x9f,0x18,0x66,0xe1 .byte 0x46,0x29,0x2c,0xc6,0x74,0xd2,0x20,0xf5,0xb2,0x64,0xa2,0x20,0x99,0x19,0x43,0x36,0x33,0x7d,0x85,0xcb,0x09,0x65,0x18,0xc5,0x7c,0x9f,0xf9,0xae,0x0a,0x1a,0x47,0xf6,0x65,0x4a,0x43,0x13,0x4e,0xcf,0x2b,0x9f,0x0d,0x9b,0x8a,0x5e,0xc6,0xf8,0xc2,0x26,0x88,0xc1,0x4e,0xde,0xa2,0x08,0xdd,0x0e,0xeb,0x46,0x3d,0x93,0xae,0xeb,0xd8,0xc0 .byte 0x29,0x2a,0x11,0x56,0x7c,0x97,0x10,0xae,0x6e,0x02,0xc9,0xc8,0xed,0x78,0x68,0x8d,0xa7,0x93,0x74,0x4c,0x7a,0x67,0xd4,0xb8,0x97,0x2d,0x0d,0xc0,0x33,0x96,0xb7,0xbc,0x4a,0x02,0x5f,0xa7,0xd7,0x1e,0x92,0xfd,0xf4,0x2f,0xd3,0x44,0x41,0x80,0x11,0x76,0x95,0x93,0x9d,0xf5,0xfb,0x98,0xc1,0xb6,0x11,0x3e,0x05,0x3b,0x7f,0x4a,0xa7,0xde .byte 0x3a,0x8b,0xff,0x0c,0x13,0x5a,0x93,0xa8,0x34,0x64,0x85,0x6c,0x63,0x67,0x71,0x45,0x83,0xbb,0x27,0x9f,0xda,0xf7,0x66,0x92,0x7e,0xb7,0x1f,0xcf,0x23,0x38,0x1f,0xe4,0x7c,0x39,0xcc,0x30,0x34,0x14,0x3b,0x6f,0x02,0x52,0xd8,0xac,0xcf,0x72,0xb6,0x95,0xf7,0xc0,0x64,0x36,0x31,0x08,0x45,0x8d,0x17,0x17,0x9c,0x75,0xec,0x21,0x5c,0x87 .byte 0x4f,0x94,0x64,0x24,0xb6,0x07,0x7f,0x13,0xee,0x62,0x67,0x62,0xab,0x2d,0xf1,0xfa,0x06,0x21,0x92,0xb8,0xa3,0x1e,0xc0,0x62,0x85,0x2e,0x3b,0xe5,0xbb,0x08,0xd5,0x18,0xb6,0x0c,0xd7,0x5d,0x2e,0xd6,0xfc,0xd4,0x05,0x49,0x82,0x19,0x17,0xdd,0xd0,0xd3,0xb6,0xc3,0x2e,0x72,0x59,0x2e,0x29,0xf0,0xf3,0x57,0xef,0x43,0xb6,0x1d,0x10,0x2a .byte 0x34,0xd5,0x52,0x9d,0xdc,0x8f,0x14,0xf9,0x52,0x9c,0x30,0xd9,0x49,0x39,0xe1,0x20,0x0e,0x04,0x79,0x8a,0x4a,0x17,0xd9,0xa9,0xf7,0x66,0x73,0xbd,0x40,0x3f,0x1a,0xff,0x38,0x63,0xe7,0x9c,0xfe,0xf1,0xd8,0x30,0xbf,0x76,0x8f,0x43,0x8f,0x18,0x72,0xd2,0x1d,0x7d,0x4a,0x2d,0xee,0xcb,0x4d,0xc5,0x96,0x19,0x5e,0x23,0xdc,0x7a,0xb9,0x69 .byte 0x94,0xe3,0xf6,0x8a,0x66,0xe6,0x68,0x1f,0x36,0x2f,0xca,0xb2,0xca,0x4a,0x3f,0xcd,0x7d,0x70,0xe1,0x0d,0x41,0x5f,0x46,0x26,0x5f,0xee,0xb9,0x78,0xaa,0xa2,0xd1,0xc1,0x27,0xb8,0x4d,0x3d,0x52,0xaa,0x1e,0x8b,0x3c,0xc0,0x4e,0x26,0xcc,0xa9,0x99,0x1b,0x0d,0x58,0xdd,0x6d,0xde,0x25,0x9e,0x3c,0x3b,0xab,0xcb,0x68,0x5d,0xfe,0x58,0xaa .byte 0x98,0x37,0xe8,0xbf,0xc4,0x99,0x60,0xc7,0x96,0xf2,0xc7,0x2e,0x2f,0x61,0x14,0x28,0x4b,0x8e,0x05,0x0f,0x3b,0xb9,0x7a,0xa5,0xf8,0xbe,0x01,0x4a,0x68,0x44,0x7f,0xf8,0xc1,0xdf,0x18,0xe8,0x5a,0xc3,0x67,0xe0,0xf8,0x3b,0x17,0x51,0x03,0xfb,0xc1,0x6b,0xa8,0x65,0x4a,0x5f,0xe0,0xd2,0x69,0xa9,0x6c,0xb2,0xe8,0x2f,0xeb,0x90,0xab,0xe5 .byte 0x6d,0xdb,0xb2,0x1d,0xda,0x58,0x76,0xa2,0xb7,0x76,0x6f,0xbf,0x96,0xe8,0x97,0x7b,0x49,0xa6,0x5f,0x29,0xdd,0x02,0x09,0x0f,0x2b,0x09,0xf3,0xbd,0xa0,0xca,0x2b,0xfa,0x82,0x52,0x42,0x93,0xb6,0x53,0x33,0xb7,0x4d,0xa8,0x91,0x81,0x5c,0x88,0x51,0xf6,0xcc,0x65,0x6e,0x76,0xd1,0x07,0xb5,0x19,0xc4,0x90,0x6f,0xd7,0x5a,0xf7,0x34,0x00 .byte 0xba,0x0d,0x1f,0x64,0x66,0x87,0x25,0xcf,0xac,0xd0,0x60,0x44,0xdf,0x29,0x9b,0x84,0xf2,0x37,0xf5,0x17,0xaa,0x75,0xba,0x0a,0x5d,0x71,0xe4,0x50,0xaf,0x87,0x76,0x18,0x21,0x94,0xe1,0x0f,0x9a,0x2f,0xb1,0x10,0x8a,0x49,0x13,0x43,0x92,0xc6,0xf3,0xa3,0x68,0x2b,0x52,0x91,0x91,0x41,0xeb,0x33,0xfd,0x45,0xea,0x9c,0x6e,0x32,0x3b,0x9d .byte 0x1e,0xe0,0x97,0xb7,0xa2,0x83,0xd1,0xf4,0x2f,0xb9,0xe8,0x5a,0x7d,0x5a,0xe1,0xc4,0xec,0x4b,0x1b,0x22,0xf5,0xc8,0x87,0x74,0xdd,0xe4,0xb5,0x8c,0x4e,0x69,0x33,0x50,0xe7,0x31,0x36,0xef,0xf7,0xb2,0x29,0xc6,0x31,0x1f,0xde,0xa7,0x7b,0xae,0xa8,0xae,0x57,0xf4,0x17,0xf9,0xbd,0x9e,0x1d,0x83,0x98,0x70,0x00,0x1f,0xb6,0x14,0xdb,0xb3 .byte 0xc5,0x4d,0x7b,0xdd,0x36,0x4d,0x94,0xff,0xec,0x24,0x6b,0xb8,0xa7,0xaa,0x32,0x2d,0xff,0xcc,0x6c,0xdb,0x26,0x95,0x47,0x69,0xdf,0xf0,0xa2,0xc0,0xc3,0x98,0x30,0x29,0x40,0x97,0x45,0x84,0x3b,0x3b,0x4c,0x36,0x2c,0xdf,0xe7,0x8e,0x03,0x8b,0x60,0xc7,0xb5,0x24,0x19,0x56,0x98,0xd5,0x23,0xfa,0xce,0x30,0xb3,0x5f,0xef,0x74,0x3a,0xf7 .byte 0x49,0x57,0x6d,0xad,0xb6,0x97,0x54,0xbb,0x85,0x80,0x52,0x5c,0x44,0x7e,0x2e,0x2c,0xd4,0xd5,0x05,0xd2,0xf1,0xd2,0xb1,0xc0,0xda,0xde,0xf3,0x46,0xe4,0xde,0x59,0x85,0x39,0xa8,0x5c,0xf0,0x10,0x9e,0xa0,0x99,0x68,0x5b,0x00,0xe7,0x2a,0x60,0x65,0xe7,0x69,0x24,0xb0,0xdc,0xd3,0x7d,0x98,0xd6,0x1f,0x75,0x37,0x5a,0x14,0x3c,0xe2,0x8d .byte 0xe9,0xf4,0x73,0x5d,0xd7,0xde,0xf6,0x74,0xb0,0x07,0x51,0xee,0x5c,0x4c,0x72,0x72,0x16,0xf2,0xfb,0x44,0xac,0x26,0x20,0xaa,0xe8,0x96,0xc5,0xdc,0x5e,0xea,0xf9,0x62,0x76,0x96,0x1b,0xe3,0xc3,0x50,0xc0,0xc6,0xc4,0x07,0xc6,0x32,0x3c,0xc2,0x8e,0x4e,0xfc,0xcb,0xa2,0x22,0x24,0xa2,0x58,0x3c,0x0f,0xce,0x5b,0xb4,0x27,0xaf,0x67,0xed .byte 0x81,0xf1,0x9c,0x26,0x38,0x80,0xc5,0xfc,0xfa,0xd1,0xae,0xfe,0x12,0xe7,0xb4,0x49,0x34,0x8f,0x52,0x5f,0x49,0xd7,0x0c,0x14,0x6e,0x93,0xc2,0x7e,0x3f,0x26,0x50,0x6d,0xc4,0xcb,0x55,0x76,0x52,0x95,0xd8,0x5b,0x81,0x0c,0x97,0x34,0xf0,0xaa,0x46,0x60,0x52,0x7a,0x53,0x99,0x74,0xf7,0xdc,0x3e,0xa4,0xbb,0xe2,0xca,0x5f,0x06,0x29,0x0d .byte 0xde,0x28,0x8a,0x40,0x9a,0x7c,0x12,0x7b,0x7d,0x8d,0xd6,0x59,0xa3,0x7b,0x36,0x15,0x1e,0xdf,0x6e,0xed,0x90,0x4a,0xa5,0x0c,0xb6,0xb1,0x8c,0x84,0xd2,0x14,0xab,0x85,0xb3,0xaa,0xb5,0x48,0xa3,0x91,0xe4,0x6e,0x46,0x69,0x2e,0x55,0xf1,0xbb,0x1d,0xa9,0xfa,0xae,0xcd,0xfa,0xf4,0xf1,0xca,0x74,0x2d,0x1b,0x8d,0x29,0x99,0x15,0x58,0x01 .byte 0xf2,0x8b,0x0d,0x2b,0x1b,0x27,0x91,0x48,0x26,0x50,0x1d,0xf0,0x72,0x3f,0xff,0xe3,0x1f,0x68,0x16,0x0c,0x4a,0xbd,0x35,0xa5,0x61,0xd0,0xd4,0xb2,0x21,0xc6,0x5a,0x49,0x4f,0x7c,0x0a,0x28,0x8f,0x57,0xc4,0xcf,0x74,0x42,0xdd,0x0a,0x7c,0x42,0x21,0x96,0x8a,0xcb,0xc4,0xc7,0x1d,0xc9,0xe0,0xc9,0x1f,0x62,0xfb,0x96,0x52,0xc4,0xbc,0xb5 .byte 0xc2,0x32,0x08,0x66,0xbf,0x27,0x6b,0x60,0xdd,0x29,0x65,0x98,0x40,0x5f,0x0a,0x41,0xb7,0x7b,0x9e,0xd1,0xb8,0x99,0x46,0xc0,0xf4,0x89,0x4f,0xc9,0x2c,0x3c,0xaf,0xc9,0xe4,0x86,0xa6,0xf9,0xeb,0x13,0x99,0x62,0x26,0xec,0x75,0xc5,0x42,0x0f,0x64,0xf8,0x43,0x96,0x4a,0xe0,0x3c,0xb9,0x00,0x83,0x41,0x71,0xcf,0xdb,0x5d,0xa0,0xc0,0xa0 .byte 0xe5,0x2c,0x75,0x6b,0xbe,0x87,0xbc,0xb3,0x1a,0xef,0x4c,0x65,0x34,0xc8,0x98,0x19,0xa2,0xed,0xf1,0xbe,0xe8,0x7c,0xd4,0xbd,0x5a,0x32,0x30,0x63,0xe0,0x86,0xef,0x63,0x98,0xa3,0x4a,0xfb,0xfe,0xd5,0x6e,0xe2,0x9c,0x54,0xc1,0xe9,0xd2,0x40,0xcf,0xc6,0x54,0x59,0xb4,0x8c,0x1a,0x11,0x7f,0x16,0xb4,0x1c,0x49,0x45,0x44,0x91,0xea,0xcf .byte 0xa5,0xf4,0x7b,0x3a,0x83,0x05,0xc9,0xb6,0x69,0x3b,0xe1,0x5b,0x24,0x63,0x90,0x59,0x66,0x5c,0xe4,0x00,0x6b,0x4d,0xe3,0xa6,0x90,0xe1,0x3a,0xad,0x5d,0x4a,0xfb,0x32,0x87,0xed,0xd3,0xc1,0xab,0x22,0x3b,0x9c,0x0e,0x38,0xa1,0x67,0x66,0x33,0x7b,0x6d,0x7f,0x95,0x20,0xf7,0x07,0x82,0xa7,0xf8,0x57,0xdb,0xc8,0xb2,0x69,0xe5,0xcc,0x54 .byte 0x6b,0xb5,0x70,0xbf,0x06,0xd0,0xa7,0x0c,0xb8,0x2a,0xe6,0xca,0x86,0xce,0x27,0x55,0xff,0xb2,0x25,0x88,0x4d,0xda,0x51,0xe3,0x50,0x73,0xfa,0x9c,0x15,0x2e,0x1b,0x5c,0x46,0x61,0x12,0x29,0x5a,0x04,0x39,0xf2,0x18,0xe8,0x50,0x69,0xcc,0x0f,0x69,0x27,0xae,0xdb,0x30,0xce,0xf4,0x61,0xc7,0x41,0xd3,0xbd,0x92,0xab,0x8e,0xf9,0x47,0xc8 .byte 0x06,0xc1,0x94,0x05,0xcb,0xf5,0x71,0x68,0xf2,0x74,0xca,0x0f,0x8a,0xfe,0x92,0x1e,0x0e,0xd5,0x42,0x19,0x6a,0x69,0x7e,0xa9,0x79,0xfa,0x3b,0x43,0xe3,0xee,0x71,0x66,0xbe,0x39,0xb2,0x70,0x6c,0x74,0x12,0xcf,0x56,0xae,0x98,0xaa,0x19,0xf0,0x80,0xff,0xf1,0x8a,0x23,0x5e,0x86,0xc7,0xfc,0x5c,0x74,0x0d,0xfa,0x23,0x5d,0x65,0x44,0x80 .byte 0xea,0x83,0xf1,0x2b,0xf5,0xe0,0xb0,0x16,0x3b,0x4c,0xdb,0x62,0xdd,0x50,0x05,0xd0,0x84,0xc0,0xda,0x14,0xd4,0xc7,0x5e,0x41,0xe3,0xb1,0x05,0xa2,0xbe,0xe6,0x7e,0x3f,0x77,0x8a,0x89,0x77,0xff,0x59,0xeb,0x43,0x57,0xe1,0x70,0xee,0x9c,0xb3,0x75,0x46,0x4d,0x33,0x26,0x8c,0x88,0xaf,0x49,0xad,0x97,0xa9,0x03,0x16,0xe9,0x55,0xae,0x1b .byte 0xda,0x80,0xa4,0x52,0x7e,0xbc,0xef,0x17,0x27,0x94,0x09,0x94,0x05,0xab,0xdc,0x6d,0x24,0xa4,0xae,0x43,0x78,0x2e,0x18,0x0d,0xf5,0x85,0x43,0xba,0x3b,0x36,0x2a,0x43,0x3b,0xd6,0x2e,0xc9,0x97,0x29,0x87,0xf3,0x98,0x80,0xc5,0xe6,0xc3,0xa3,0xeb,0x36,0x0b,0x5a,0xc5,0x6c,0x0f,0x53,0xdf,0x7d,0xb9,0xc0,0xdb,0x57,0xde,0xbb,0x89,0x7b .byte 0xb3,0x3b,0x9b,0x9b,0xe3,0x16,0x95,0xf1,0x44,0x0b,0x96,0x51,0x56,0x37,0x74,0xcb,0x6d,0x59,0x26,0x8b,0xb3,0xa8,0xdc,0xf4,0x7c,0x32,0xa7,0xcb,0x06,0x79,0xbf,0x09,0x5f,0xca,0xd5,0xa4,0x05,0x60,0xba,0xc1,0x2e,0xc7,0x35,0xc7,0xe4,0xe4,0x91,0xd1,0x4f,0x1b,0x1d,0x5e,0x3b,0x59,0x0e,0x7e,0xb6,0x5d,0xbb,0x99,0x20,0xc3,0xf5,0x28 .byte 0xc7,0xc7,0xc5,0x8c,0x14,0xd0,0xea,0x9a,0x6c,0xb0,0x2f,0x40,0xfb,0xb3,0xd6,0x8c,0xc2,0x8f,0xcb,0x5b,0xb9,0xdf,0xd8,0xae,0x48,0x8e,0x1a,0x2a,0xdd,0x8b,0x2b,0x14,0xf8,0xff,0x51,0xd2,0x73,0xed,0xbe,0x14,0x09,0x9d,0x50,0x28,0x18,0xe6,0xc4,0xba,0x6a,0xf9,0xc3,0xb5,0x23,0x91,0x5a,0x10,0x5b,0xd6,0x69,0x99,0x76,0x1b,0x6a,0xea .byte 0xc8,0x93,0x39,0x47,0xd0,0xc4,0x23,0xf7,0xb4,0xa2,0xc3,0x31,0xc3,0xca,0x13,0x12,0x7c,0x30,0x5c,0x73,0x32,0x6c,0xe2,0x48,0x6d,0xe5,0x9f,0xfc,0xd8,0x8b,0xef,0xf2,0xa7,0xc4,0x00,0xe7,0xc9,0x7b,0x93,0xb9,0x47,0x68,0xae,0xe6,0x6c,0xf2,0xfb,0x60,0xb4,0x51,0xa2,0x09,0x19,0x81,0x3e,0x34,0xb6,0xcd,0x41,0xd7,0xe2,0x4f,0xf5,0xf8 .byte 0x08,0xe4,0x88,0xb1,0x0f,0x19,0x6e,0x9e,0xf2,0x88,0x9b,0x7e,0xfe,0x46,0x9e,0x27,0xb3,0xc7,0xaf,0x1d,0xb7,0xc3,0x31,0x9c,0x96,0x54,0x0a,0x10,0xd1,0x62,0x3f,0xa1,0x17,0x77,0xf5,0xbc,0xf5,0x53,0x87,0x68,0x18,0x17,0x32,0x62,0x7b,0x66,0x88,0x28,0xf9,0x60,0xba,0xbe,0xa8,0xe6,0xa7,0x9c,0x15,0x15,0xe8,0x3f,0x09,0xb4,0x7b,0xa0 .byte 0x14,0x8f,0x5a,0xfe,0xbf,0xc2,0xc5,0xce,0x40,0x2e,0x23,0xae,0xa2,0xa9,0x88,0xea,0x0a,0xef,0x8a,0xa4,0x63,0x19,0x80,0x06,0x90,0x7e,0x5c,0x28,0x97,0x20,0x78,0xd6,0xf2,0xb0,0xea,0xb3,0xef,0x22,0x4c,0x35,0x46,0x44,0xa0,0x84,0xba,0x29,0xee,0xf5,0xa7,0x75,0x6a,0x9d,0xe8,0x67,0xbf,0xd9,0xf4,0x9e,0xa7,0x09,0x46,0x77,0x7c,0x76 .byte 0xa6,0x1d,0x2c,0x1d,0xcb,0x95,0xa0,0x2c,0x45,0x50,0x6e,0x2c,0xdd,0xe2,0x9c,0xbc,0xa5,0xc1,0x72,0x48,0x19,0xdd,0xe0,0x21,0x90,0xf7,0x66,0xa7,0x43,0x94,0x32,0x6d,0x7d,0xe2,0x6f,0x6b,0x8f,0x38,0x97,0x4e,0xd0,0xbf,0x41,0xd2,0x24,0xba,0xd0,0xe7,0xd1,0x56,0x74,0x58,0x41,0xbc,0x7b,0xe7,0xbd,0x39,0x43,0xdb,0x2d,0x1a,0x66,0xb8 .byte 0xc8,0xef,0x3f,0x6d,0xcd,0x5d,0x2d,0x1b,0xd7,0xb9,0x53,0x92,0x23,0xa2,0x5c,0x6f,0xd9,0x37,0xf4,0x43,0x6b,0x2d,0xb3,0xd5,0x7b,0x6c,0x87,0xb4,0xdd,0x05,0x39,0xa7,0x04,0x58,0xa9,0x7a,0xbe,0x08,0xf3,0x2e,0x79,0x7d,0x90,0xce,0x3d,0x2d,0x9d,0xf0,0xad,0xe6,0x28,0x44,0x7d,0x61,0x05,0xc1,0xc8,0x5e,0x2e,0x07,0x6c,0xd4,0x9c,0xbe .byte 0x3f,0xd8,0xfc,0x46,0xe5,0xbe,0x7c,0x12,0x30,0x55,0xc9,0x6b,0xa0,0xac,0x17,0x0e,0xd0,0x65,0x70,0xc9,0xd6,0x5e,0xb3,0x97,0x58,0x43,0x8e,0xce,0x18,0x48,0xc7,0xa6,0xdc,0x0c,0x14,0xef,0xbf,0x1b,0xaf,0xca,0xbe,0x2a,0x96,0x27,0x82,0x3d,0xec,0x9b,0x0c,0xc8,0x40,0x7b,0x3f,0x03,0x93,0x70,0x87,0x50,0x24,0xc5,0x1b,0x10,0x91,0x66 .byte 0x9f,0xbd,0xc2,0x9b,0xa0,0xee,0x5d,0xd3,0x65,0x17,0x03,0x4e,0x32,0xe3,0xb1,0x62,0xf7,0xe8,0x22,0x79,0x55,0xea,0xd9,0x3b,0x27,0x77,0x65,0x3d,0x44,0xde,0xbe,0x79,0x2d,0xfa,0x0b,0x59,0x08,0xf0,0x9b,0xc5,0xe0,0x78,0x6b,0x57,0x4f,0x75,0x32,0x92,0x6f,0xb1,0x4c,0x70,0x98,0x26,0xd1,0x07,0x2d,0xb7,0x8e,0x32,0x16,0x96,0xd7,0x0e .byte 0xde,0x61,0x49,0x46,0x65,0x92,0xdd,0xb3,0xd0,0x98,0x1b,0xed,0x30,0x6f,0xfd,0x02,0x8e,0xf8,0x7f,0x84,0x95,0x6d,0xe9,0x25,0x01,0xef,0xc9,0x03,0x7b,0xe1,0xf9,0x4f,0xd9,0x19,0xbb,0xa6,0x46,0x89,0xdf,0x36,0x01,0x40,0x08,0xfa,0x0b,0x93,0x2e,0x4b,0xdd,0xd0,0x1d,0x37,0xb9,0x14,0x4c,0x09,0xf1,0x7a,0x95,0x6c,0xd7,0xde,0xdc,0xcd .byte 0xd0,0xdc,0xeb,0x84,0x59,0x24,0xa1,0x1e,0xc2,0xa0,0x52,0x6b,0x74,0x2a,0x6b,0xef,0xe2,0x37,0x94,0xef,0x6e,0x3e,0x79,0x7c,0xba,0x90,0x3d,0xda,0x2d,0x96,0xf6,0x7b,0x59,0xa9,0x12,0xa2,0x90,0x72,0x18,0xde,0xbd,0xaf,0xa2,0x4a,0x1f,0x50,0x6c,0xb4,0x03,0xb8,0x29,0xa8,0x6e,0x07,0x7a,0xbe,0xee,0x79,0x6f,0x03,0x29,0x4b,0xf5,0x76 .byte 0x06,0x41,0x5a,0x14,0xf6,0x9c,0xd4,0xa0,0xf2,0x86,0x34,0x10,0x0c,0x12,0x6e,0x3b,0x6f,0x3b,0xb2,0x29,0xde,0xa9,0xa1,0x3e,0x32,0xe9,0xd7,0x26,0x12,0x73,0x0d,0xcc,0x5e,0x4d,0x0d,0xdf,0xa7,0xe0,0x2c,0x16,0x78,0x3f,0x76,0x7a,0x90,0x98,0x95,0x7c,0x18,0x28,0x64,0x9e,0xcf,0x7f,0x02,0xa6,0xc2,0x57,0xdd,0xaf,0x81,0xa8,0x60,0x34 .byte 0x8f,0x60,0x7e,0x62,0x6d,0xb1,0xb6,0x36,0x3e,0xb4,0xa9,0xad,0xfc,0x88,0x22,0x6b,0x50,0x26,0xd1,0xc4,0xa0,0xfc,0x58,0x30,0x1b,0xb3,0xec,0x0e,0x9a,0xd8,0x44,0x34,0xc5,0x63,0x74,0x28,0xe6,0x35,0x05,0xc0,0x0a,0x0e,0x3b,0x75,0x13,0x94,0xbf,0x21,0xb3,0xba,0x90,0xca,0xc2,0x0b,0xcd,0x39,0xe3,0xcb,0xf4,0x52,0x31,0xe4,0xb1,0x31 .byte 0xf8,0x62,0x77,0x69,0x37,0x5c,0x45,0xc8,0xe7,0x14,0x35,0x45,0x41,0x03,0x5b,0x1e,0x81,0x6a,0x18,0xe9,0xc2,0x17,0xe5,0xbd,0x8a,0x33,0x29,0xe4,0x93,0x3a,0xa2,0x23,0xd4,0x5d,0xef,0x72,0x1c,0x6e,0x94,0x64,0x48,0xfc,0x53,0xd3,0x90,0x1a,0xd2,0xc8,0xa6,0x1f,0x83,0x3b,0x23,0x5d,0x7e,0x4a,0x89,0x4d,0x51,0xf6,0x1c,0x65,0x17,0xf5 .byte 0xdf,0xfb,0x6c,0x61,0xaa,0x1d,0xfd,0xf3,0xe8,0x9e,0x05,0x87,0x1b,0x70,0xde,0x1a,0x19,0xce,0x21,0xf3,0x2a,0x21,0xd1,0x16,0x19,0xc8,0x7f,0x19,0xa1,0x30,0x9f,0xd3,0x39,0x54,0x21,0x06,0x08,0x7d,0x74,0x1d,0x1e,0x04,0xfd,0x96,0xef,0xf7,0x59,0x92,0x0e,0x71,0x31,0x1b,0x86,0x86,0x8b,0xdc,0x3a,0x43,0xfa,0x2e,0x62,0x9d,0xec,0xd7 .byte 0x7a,0x96,0x1d,0xaa,0x30,0x92,0xf4,0xbf,0x05,0xa5,0xa9,0xff,0x42,0x7f,0xa7,0xae,0xe2,0x25,0x5d,0x79,0x5c,0xc2,0xbe,0xcf,0x6a,0x0e,0x08,0xa4,0x3b,0x30,0xe2,0x17,0x24,0x3d,0x4e,0xb8,0xd6,0xcd,0x03,0x01,0xaf,0xc0,0xcb,0x3f,0x32,0xb6,0x5b,0x2d,0xb4,0x66,0x51,0xe1,0x70,0x2a,0x2f,0x0e,0xda,0x68,0xe4,0x4e,0x32,0xa0,0x9a,0x50 .byte 0x0a,0x8a,0xfe,0x9f,0x5e,0xb3,0x3c,0x7b,0xc9,0x71,0xff,0xab,0x39,0xa8,0x46,0x03,0x7f,0xce,0xb9,0x3f,0x70,0x23,0x81,0xc1,0xac,0x25,0xdb,0x83,0xd6,0xd1,0x15,0x4a,0x8d,0x89,0x7e,0x8f,0x49,0xff,0x39,0x29,0xb9,0x2c,0xfe,0x50,0x2e,0xcc,0x4e,0x82,0x35,0x90,0x09,0x47,0x7f,0x67,0x1a,0xd3,0xf3,0xe8,0x8d,0x5c,0xaa,0x1c,0xbc,0x49 .byte 0xce,0x2f,0xdd,0x8f,0xe9,0x6f,0xb1,0x07,0xea,0x40,0x56,0xe9,0x86,0x04,0x4b,0xe1,0x4c,0xc6,0x6f,0x69,0x87,0x11,0x67,0xed,0x15,0xfc,0x23,0x26,0x70,0xaa,0xd2,0x0e,0x4d,0x22,0x67,0xa4,0xa2,0x6e,0x71,0xb8,0x1d,0x86,0xe8,0xc1,0x1c,0x23,0xf9,0xc1,0xae,0x0a,0xd9,0x15,0x28,0x25,0x01,0xb7,0x71,0xa8,0x5a,0x8e,0xc1,0x6a,0xad,0x39 .byte 0x75,0xee,0x1a,0xdf,0xb3,0x4d,0x22,0x79,0x2e,0xbb,0x87,0xa1,0x43,0x2a,0xdb,0x54,0x32,0xeb,0x1d,0x4c,0xbd,0x77,0xa7,0xfd,0x16,0x11,0x90,0xe0,0x38,0xc5,0xef,0x72,0xe6,0x5e,0xb9,0x77,0xfc,0xd8,0x00,0xe2,0xa5,0x11,0xc2,0x84,0x94,0xa4,0xdd,0xa9,0xea,0xc1,0x5a,0xb7,0x9a,0x07,0x14,0xd0,0x74,0x2c,0x44,0x01,0x58,0x0a,0xca,0x8d .byte 0x3b,0x27,0xda,0x02,0xeb,0x40,0x91,0x5f,0xd4,0x47,0x87,0xdf,0x5e,0x88,0xbe,0x8f,0x23,0xde,0x28,0x61,0xb5,0x93,0x74,0x47,0x14,0x1b,0x3e,0x03,0xa3,0x38,0x71,0x06,0xe8,0xf1,0x60,0xd8,0xc4,0x6d,0x91,0x42,0x72,0xdf,0xd7,0xe4,0xf8,0xce,0xdc,0xae,0x55,0xb6,0xee,0x2a,0x60,0xe7,0xc6,0x86,0x3c,0x6a,0xf4,0x05,0x09,0xf2,0xdd,0xb0 .byte 0xf5,0x9d,0x4d,0x49,0xc2,0xc1,0xb6,0x6a,0x00,0xac,0x6c,0xf5,0xc1,0x03,0xb2,0x2c,0x16,0x9b,0x16,0xe3,0x98,0x3b,0x79,0x1a,0x07,0xed,0x55,0x9d,0x0a,0x48,0x7b,0x22,0x75,0x9a,0x20,0x98,0x3a,0x8c,0x93,0xdd,0xe4,0x9e,0x1b,0xc3,0xf1,0x1f,0x64,0x63,0xa5,0x37,0x51,0x7f,0xaf,0x10,0xb3,0x35,0x9b,0xba,0x7f,0x78,0xf1,0xd8,0x9f,0x65 .byte 0x1c,0x8a,0x03,0x05,0x88,0x2d,0xd9,0x1c,0x8a,0xd3,0x52,0x71,0x20,0xf7,0xb7,0x47,0xef,0x9a,0xea,0xa4,0xd0,0x58,0x3f,0x4b,0x0e,0xe3,0xe4,0x88,0xb4,0xdc,0x75,0x31,0xa4,0xb6,0xf0,0x33,0x2f,0xc4,0xa2,0x0f,0x59,0x2e,0xa7,0x14,0x60,0x03,0x68,0xce,0x4f,0x41,0xf1,0x2c,0x49,0x18,0x34,0x70,0xbb,0x35,0xa7,0xcc,0x09,0x60,0x7b,0x0e .byte 0xc1,0x4e,0xdb,0xb6,0xfe,0x19,0x7a,0xeb,0x9b,0x9d,0x9c,0x6e,0x21,0x69,0xa5,0x8c,0xc5,0x0e,0x27,0x13,0x52,0xa2,0xaa,0x83,0x72,0x73,0xac,0xc3,0xd3,0x8b,0x92,0xd0,0xdc,0x79,0x22,0xcd,0x81,0x94,0xc3,0xb1,0xd3,0xf0,0xbb,0x0a,0x43,0x33,0xdc,0xf5,0x8e,0xd7,0x48,0xfa,0xbb,0x3c,0x47,0xd4,0x95,0xad,0x25,0xf0,0x39,0xf0,0x69,0x3d .byte 0xbb,0xf7,0xf3,0x0d,0x60,0x42,0x3e,0x50,0xff,0xa3,0xf3,0x54,0x4f,0xdb,0x5e,0xfa,0x3c,0x17,0xc8,0x4c,0xcf,0xe8,0x2d,0xcc,0xa7,0x73,0x15,0x6c,0xe6,0x5c,0x90,0xa1,0xce,0xef,0xc5,0xd5,0x1f,0x1f,0xc5,0xe0,0x6d,0xb2,0xd6,0xde,0x68,0x8f,0x73,0xa2,0x48,0x15,0xbf,0xd7,0x86,0x6a,0x11,0x36,0xde,0x60,0x69,0x86,0xb0,0x42,0xec,0xa6 .byte 0xd5,0x5d,0xfc,0x51,0x20,0xd3,0x48,0xcf,0x22,0x2f,0x3c,0x87,0x07,0x57,0x44,0xec,0x63,0x2c,0xbd,0x14,0x21,0xa2,0x4f,0x2e,0xf2,0xce,0xb4,0x25,0xf8,0x66,0xd9,0xd5,0x16,0x10,0x1d,0x3f,0x00,0xfa,0x95,0xf8,0xb6,0xb3,0x67,0x23,0x2e,0xfb,0x65,0xfd,0x16,0x80,0x81,0xc0,0x62,0xbd,0x68,0x60,0x94,0xc1,0x49,0x50,0x63,0xe7,0xf5,0xc6 .byte 0x87,0x6a,0xaf,0xbf,0x6f,0x88,0x7a,0xbb,0x9d,0x59,0xf0,0x94,0x1b,0xed,0x6e,0x52,0x52,0xd7,0xea,0x3a,0x89,0xa3,0x86,0xab,0xf2,0x32,0x28,0xf7,0xe3,0x50,0x6f,0xbe,0x9b,0xab,0x73,0x0f,0xe2,0x9c,0x0b,0xaa,0xba,0xb7,0xfb,0x99,0x09,0xe6,0x76,0xa5,0x4e,0x2a,0x56,0xdc,0x07,0xca,0x7c,0xfa,0xc5,0x36,0x89,0xe3,0xaf,0x9c,0x67,0x9f .byte 0xbc,0x94,0x35,0xb8,0xee,0xf9,0xf5,0x04,0x20,0xe0,0xed,0xc2,0x3c,0x7a,0x4a,0xc0,0x9b,0x28,0xf0,0x14,0xd2,0x08,0x40,0x3a,0x6e,0xc3,0xce,0xcc,0x4f,0x8f,0x3d,0xd9,0xca,0x8b,0xf7,0x5d,0xe5,0x0f,0x7a,0x85,0xaf,0xa1,0x9d,0xbd,0x28,0x07,0xee,0x54,0x2e,0x23,0x18,0x1d,0xc9,0x6b,0x67,0x2b,0x12,0x33,0x0d,0x8b,0xf4,0x7f,0x34,0x47 .byte 0xfb,0x2c,0x55,0x3c,0x66,0x32,0xe6,0xa0,0x97,0x3b,0x8a,0x1e,0xc8,0xcf,0xd3,0x72,0x76,0x87,0x8c,0x8e,0x0f,0xfa,0x3a,0x37,0x99,0x0f,0x2b,0xfd,0x1c,0x5c,0x4f,0x81,0x87,0x80,0x2d,0x02,0xb9,0xeb,0xe3,0x66,0xe3,0xa0,0x09,0x38,0x2c,0x48,0xbc,0x91,0x38,0x3a,0x7b,0x2a,0x63,0x0d,0x67,0x27,0xd8,0xde,0xe9,0xab,0x1a,0xf2,0x46,0x53 .byte 0xcc,0x80,0x5a,0x02,0x61,0xd1,0x18,0xd6,0x05,0x66,0xec,0x48,0x51,0x5d,0x91,0xa8,0x55,0x52,0x8d,0x56,0xa6,0x89,0xf2,0xe5,0x99,0x87,0x09,0x59,0x70,0x1f,0x11,0x1d,0x0d,0x3d,0x67,0x8f,0x9a,0x82,0x4f,0x81,0x21,0x0f,0xe6,0xeb,0x52,0xd0,0x21,0xb1,0x55,0xeb,0x59,0xfa,0x49,0x1e,0xb7,0x03,0x5b,0xe0,0x50,0xd4,0xf9,0xfd,0x41,0xa9 .byte 0x7a,0x5a,0xee,0xca,0x0b,0xdc,0xa1,0x32,0xd2,0x7f,0x72,0x1e,0xae,0x93,0x01,0xc0,0x34,0x79,0x32,0xaf,0x5f,0x60,0xba,0xc6,0x34,0xda,0xe3,0x85,0x0f,0xe1,0xe3,0x66,0xcd,0x3d,0xe4,0xfd,0xbc,0x1f,0x23,0x29,0x38,0x5e,0x8e,0x24,0xff,0x8d,0x23,0xaf,0x7d,0xd7,0x7f,0xd6,0xb2,0xca,0x1d,0xda,0x22,0xb1,0x2a,0x73,0x8e,0x3b,0xf3,0xee .byte 0xbb,0x60,0x6f,0x7b,0xfd,0x84,0x2c,0x8c,0xcb,0x13,0x31,0x5c,0x7c,0x77,0x57,0x39,0x0f,0x03,0x12,0xc9,0xa1,0x2f,0x72,0x62,0x3f,0x0e,0x70,0xd2,0x62,0x40,0x60,0xb6,0x24,0xbc,0x12,0xa4,0x24,0xbb,0x77,0x94,0xce,0x0a,0xd5,0x4a,0xba,0x9b,0x5e,0xa2,0x04,0xcd,0xe5,0x3d,0x2b,0x3b,0xa0,0x76,0x0f,0xfd,0xe7,0x0a,0x46,0x2a,0x98,0x09 .byte 0x9f,0x7c,0xd7,0xc3,0x33,0x4c,0x34,0xa4,0x2f,0x55,0x38,0x93,0xfb,0x9a,0xd5,0x75,0x22,0xdd,0x84,0x32,0x15,0xbe,0x43,0x73,0xa2,0xbe,0x23,0x1c,0x8e,0x3e,0xee,0xad,0xa7,0x54,0x8b,0xbe,0x9b,0xc8,0x6a,0x78,0x62,0xf1,0xb2,0x36,0x0e,0x00,0xfd,0xd0,0x9f,0x70,0xcc,0x2a,0x94,0x3e,0xe7,0x8c,0x60,0x4b,0xe6,0xc1,0x8c,0x65,0x0b,0x1a .byte 0xe2,0xfd,0xfd,0xe8,0xa0,0x85,0x8f,0x1d,0x2c,0x5b,0x34,0x30,0x1a,0x6f,0xe6,0xe9,0x75,0xbc,0xcf,0xc4,0x6d,0x12,0xb5,0xff,0x3d,0x56,0x4a,0x08,0xbf,0xbd,0x8b,0xd1,0xfe,0x37,0x31,0x2b,0xe8,0x7d,0x6b,0x97,0x99,0x80,0xd9,0x22,0x2f,0x4c,0xc4,0xa6,0x98,0x24,0x42,0x07,0x4b,0xbc,0x4f,0x14,0x6b,0x15,0x90,0x27,0xf6,0x9f,0x2f,0x42 .byte 0xfd,0xcc,0x51,0x1c,0xf0,0x8e,0x28,0xf6,0xea,0x3f,0xc0,0x65,0x17,0xc8,0xf7,0x90,0xf4,0x54,0x9d,0xc5,0x53,0x11,0x5c,0x90,0xcb,0xa8,0xe8,0xd2,0x0c,0x6b,0xb7,0x15,0x0d,0x2c,0x6d,0x7c,0x2e,0xb9,0xc9,0xde,0x31,0xec,0x85,0x74,0x93,0x95,0x06,0x1d,0x0c,0xed,0xd4,0x77,0x65,0x91,0x3f,0xa4,0xa5,0x90,0x63,0x63,0xcd,0x73,0x13,0xe7 .byte 0xad,0x39,0x22,0x37,0x41,0x7b,0xf8,0x64,0x14,0xe6,0xe0,0x93,0xc2,0x91,0x4f,0x34,0x0b,0x01,0xef,0x9a,0x27,0x0e,0xe7,0xf5,0x0b,0x7e,0xb1,0x13,0xa5,0x24,0xcf,0xdb,0x54,0xf8,0x32,0xae,0x01,0x2e,0x61,0x0e,0x73,0x36,0x4a,0x17,0x6c,0xdb,0x9a,0x80,0x6e,0x91,0x54,0x7b,0xa9,0x85,0x27,0x08,0x75,0xb3,0x1f,0x82,0xa5,0x3d,0x67,0x99 .byte 0x7b,0x38,0xb9,0x21,0x3f,0xa1,0x06,0x7d,0xde,0xc9,0xef,0x4d,0xca,0x8d,0xa2,0x5a,0xa1,0x85,0x03,0xe2,0x8b,0x8f,0x4f,0xc5,0x47,0x8d,0xb6,0x8d,0xd3,0x8d,0x0a,0x11,0xa5,0x45,0x7b,0x2e,0x38,0x1b,0xb6,0x23,0x17,0x89,0x06,0xe5,0x25,0x5c,0x5e,0x95,0x2f,0x61,0x48,0x5a,0x55,0x40,0x7e,0x0f,0x2b,0xd8,0x2b,0x7e,0xfb,0x3b,0xa9,0xf4 .byte 0x26,0x65,0x70,0x46,0xdb,0x1f,0xa7,0x16,0xfa,0xd4,0x5e,0x6c,0xaa,0x7c,0x2e,0x69,0xf1,0x55,0xb2,0x99,0x1e,0xed,0x54,0x5e,0xb4,0x70,0x42,0xf1,0xa5,0x68,0xd4,0x02,0x59,0x07,0x82,0x35,0x67,0xe6,0x21,0x08,0xb6,0x23,0x2d,0xa0,0xe3,0xe5,0xef,0x4c,0xe0,0x7f,0xb0,0x30,0xa5,0xc1,0x5e,0xea,0x5d,0xeb,0xe3,0x97,0x9f,0x5c,0xf7,0x91 .byte 0x8e,0x8d,0xac,0xe3,0xdc,0xd6,0x94,0x93,0x0f,0xaf,0x07,0x21,0x0c,0x20,0x0d,0x73,0xe2,0x0e,0x9f,0x77,0xb8,0xd5,0x0c,0xd8,0x64,0x49,0x34,0xe0,0xa1,0xe7,0x42,0xfb,0xfd,0x30,0x03,0x2e,0x2c,0xb7,0x9a,0x17,0xe5,0xa6,0x34,0x8d,0xe4,0xcf,0xf8,0x47,0xb7,0xf0,0xc1,0xb4,0xee,0x2b,0xbe,0x07,0x7c,0x99,0x48,0xb3,0x42,0xb6,0xf1,0x98 .byte 0x45,0xd4,0x53,0xff,0x27,0x26,0x2e,0xa5,0x74,0xfc,0xa8,0x09,0x37,0x16,0xf6,0xb2,0xad,0x5b,0xee,0x51,0xcc,0x09,0x90,0x4e,0x5f,0xd0,0x72,0xd7,0xbb,0xd6,0x85,0xd6,0xe4,0xab,0xf8,0x7d,0x02,0xe0,0xc2,0x51,0xce,0xac,0x8b,0xf1,0x91,0x63,0xb4,0x2e,0xb5,0xe2,0x3a,0xac,0xf6,0xb0,0xd9,0x4a,0x90,0xef,0x66,0x19,0x2c,0xbd,0x87,0xae .byte 0xa1,0xee,0x08,0x5e,0x88,0xde,0x1c,0x47,0xeb,0x07,0x20,0x95,0xb2,0xdf,0xfc,0xd7,0xe2,0x44,0x45,0xbc,0x56,0x48,0x46,0x26,0xef,0xce,0xf9,0x0f,0xf6,0xab,0x33,0xf0,0x35,0xc8,0x39,0xd6,0x91,0x9e,0x02,0xe7,0xc5,0x30,0x3a,0x1d,0x78,0x51,0xa7,0x48,0xc9,0xc9,0x7c,0x09,0x0e,0xa1,0x89,0x0b,0x54,0xbb,0xc6,0x65,0x16,0xb6,0xb1,0x82 .byte 0xa6,0x53,0x8b,0x20,0x25,0xf2,0xfb,0x6d,0x4e,0x5e,0xf6,0x62,0xe9,0x14,0xbc,0x0a,0x68,0x09,0xa7,0x79,0xc1,0xad,0x9d,0x45,0x75,0xbd,0x96,0x3b,0x27,0x93,0x10,0x10,0x34,0x98,0x96,0xf6,0x0e,0x24,0x92,0x1f,0x00,0xf4,0x9e,0x55,0x08,0x76,0x83,0xef,0xd8,0xad,0xcb,0xcc,0x82,0x25,0xe3,0x7d,0xd3,0xb3,0xc5,0x35,0x8f,0x5d,0x9a,0x56 .byte 0xe7,0x03,0xf2,0xa2,0x40,0x44,0x5c,0x1e,0xb6,0x53,0x1f,0xe1,0x65,0xa9,0xa1,0x06,0xa1,0x1b,0x96,0x2e,0xcc,0xce,0x99,0x11,0x26,0x2b,0x1b,0xd6,0x38,0x45,0x56,0x87,0x3d,0xf3,0x42,0xe2,0xa4,0x57,0x11,0x95,0x8c,0x07,0xd0,0xb0,0x82,0xcc,0x75,0x30,0x5c,0x61,0x72,0x5a,0x22,0xd7,0xa2,0xb3,0xa1,0x1c,0xa2,0xfa,0xaa,0x71,0x31,0xc2 .byte 0xde,0xf5,0x3f,0x52,0x02,0x25,0x86,0x37,0x1c,0x1e,0x67,0x3f,0x8b,0x1a,0xe9,0x0a,0x5e,0xe5,0xef,0x14,0xe0,0x69,0x47,0x6d,0xb3,0xbd,0xd2,0x44,0xbf,0x1a,0xdc,0x71,0xe6,0xd8,0xf8,0x7a,0x1e,0xf6,0x67,0xdb,0x96,0x2f,0xab,0x8d,0xfa,0x4b,0x16,0x02,0xf9,0xdd,0x9a,0x5d,0xd3,0xf1,0x34,0x9f,0x78,0xf0,0x30,0xdd,0x5f,0x59,0x24,0x39 .byte 0xa2,0x4b,0xc4,0x66,0xf5,0xc9,0xbd,0x4c,0x0e,0xd3,0x54,0x01,0x50,0x3a,0x12,0xd9,0xd9,0x25,0x56,0xf2,0x29,0x74,0xd8,0x3b,0x7d,0xf8,0x5d,0x60,0xc7,0x72,0x4b,0xb9,0xb0,0xb2,0xc9,0x5f,0xdf,0x4e,0x6d,0x6e,0x0f,0x97,0x19,0xe6,0xaf,0x1d,0xfb,0x70,0xc5,0x62,0xb9,0xb1,0xa4,0x4b,0x3d,0x26,0xe9,0xd2,0x3d,0x44,0x61,0x1d,0xbe,0xe0 .byte 0x3e,0x7d,0xe4,0x77,0x41,0x37,0xa0,0x9b,0x60,0x57,0x62,0x05,0x4c,0x04,0x68,0xfb,0x47,0xcf,0x48,0x48,0xa0,0x86,0x22,0xea,0x9f,0x49,0x89,0xc3,0x7c,0x4c,0x5c,0xde,0x31,0xad,0x85,0xf7,0x99,0x00,0x4e,0x64,0xbd,0xd1,0x6e,0xa0,0xd8,0xfb,0x71,0x08,0x44,0x7d,0x22,0x75,0x78,0x5f,0xe4,0x6b,0xce,0x28,0xd8,0x47,0x9d,0xb1,0x31,0x68 .byte 0x1a,0x91,0x4f,0x94,0x25,0x6d,0x9f,0xc8,0x21,0x77,0xaf,0x4e,0x98,0xc5,0x9d,0xf9,0x52,0x5f,0x0a,0x23,0x61,0x0e,0xda,0x11,0xad,0x43,0xae,0x82,0x07,0x5b,0xc8,0x1f,0xee,0x15,0x65,0xf0,0x30,0xb4,0x97,0x55,0xdd,0xbd,0xcf,0x01,0x37,0x14,0xd5,0x6e,0x12,0xe4,0xa5,0x20,0x38,0xea,0x4c,0x61,0x68,0x8c,0x47,0x68,0xfd,0xd5,0xda,0x36 .byte 0x8c,0x18,0x31,0x7c,0x5a,0xde,0x03,0x1d,0xb3,0xe2,0x17,0xe8,0x5a,0x7b,0x9b,0x0f,0x2a,0xac,0x1d,0x79,0x8d,0xb4,0xbe,0x41,0x00,0x0a,0x8e,0x75,0xa6,0x69,0x7a,0x17,0xe7,0x29,0xd4,0xcd,0xd5,0xbc,0x5c,0x17,0x53,0x17,0x3c,0x58,0x4b,0x44,0x39,0xa8,0x6b,0x7b,0x01,0x05,0xe3,0x33,0xd8,0x8e,0xb8,0x25,0xe6,0xe5,0x15,0xe3,0x2d,0xb4 .byte 0x75,0x2e,0x4e,0x7c,0xd5,0x19,0x56,0x9d,0x55,0xca,0xf7,0xd0,0x40,0x2d,0x98,0x4d,0x17,0x29,0xec,0x87,0x0e,0xb1,0x9b,0x80,0xb6,0x34,0xe6,0xe8,0xdf,0x2b,0x91,0x5a,0x4f,0x68,0x1e,0x2d,0x99,0x9f,0xf8,0x94,0xab,0x58,0xa8,0x02,0x99,0x52,0x42,0xf9,0xb0,0xe1,0x21,0x0d,0xb6,0xad,0x1f,0xce,0x77,0x53,0x1f,0x37,0x7b,0x19,0xf9,0x1c .byte 0x84,0xfb,0x7a,0x81,0x37,0xd5,0xd7,0x28,0xfe,0x11,0x03,0x1b,0xd1,0x75,0x68,0x85,0x4a,0x59,0x42,0x8a,0xca,0x48,0x32,0x54,0x1b,0x5d,0x4d,0xa0,0x8f,0xc2,0x01,0xf5,0xab,0x53,0xb0,0xa2,0x64,0xfe,0x0f,0x82,0x0b,0xeb,0xdb,0xd5,0xfc,0xf1,0x8a,0xf8,0xf4,0x71,0x16,0xc4,0xe7,0x0f,0x61,0xe5,0x04,0xb1,0xdc,0x47,0xed,0x3e,0xe7,0x5d .byte 0x22,0x65,0x4e,0xc9,0xd9,0x37,0x1d,0x0f,0xc9,0xee,0x86,0x47,0xa0,0x59,0x32,0x80,0x76,0xd1,0xf8,0x23,0x36,0xca,0x5d,0x26,0x6f,0x19,0x62,0x0c,0x23,0xaa,0xb3,0xa9,0x4f,0xc9,0x78,0x6d,0x1e,0xa6,0xf6,0xc2,0x88,0xbc,0x7e,0x38,0xaa,0x88,0x8f,0xad,0x95,0x13,0x80,0x5b,0x0a,0x95,0x5d,0x2d,0x2d,0xb0,0x81,0xf7,0x54,0x98,0xa8,0xfd .byte 0x4b,0x67,0x66,0x96,0xc2,0x58,0x5f,0xef,0x7f,0xc2,0xa5,0x2d,0xf1,0xdc,0x6e,0xf3,0x70,0x23,0x2b,0xe6,0xad,0x9f,0x52,0x58,0xa0,0x68,0x44,0xdb,0xf8,0x8e,0x9e,0x74,0xe5,0x84,0xc2,0xfa,0xd6,0x0c,0x16,0x22,0x0c,0x7b,0xf1,0x33,0x29,0x9a,0x6c,0x19,0xab,0xe0,0x61,0x81,0x02,0x6c,0x3b,0xe6,0xb9,0x5d,0x8a,0xb3,0x85,0x88,0x95,0x17 .byte 0x73,0x55,0x6a,0xd6,0xe4,0xa3,0xbc,0x36,0x7e,0x87,0x5f,0x63,0x6d,0x76,0x5f,0xba,0x29,0x20,0x98,0xc6,0x60,0x30,0xc3,0xa8,0x07,0x48,0xcf,0x0c,0x47,0x76,0x17,0xf3,0xa9,0x5b,0x3b,0xd7,0x57,0x3c,0xde,0x7f,0x00,0xd2,0x4f,0xba,0xdc,0x45,0xd1,0xbd,0xf4,0x6b,0x87,0xbd,0x48,0x4f,0xb4,0x7d,0x7a,0xd7,0xf7,0xda,0x96,0xd7,0xe0,0x7c .byte 0x3c,0x6b,0x27,0x89,0x69,0x53,0x78,0x75,0xf6,0xb6,0x1b,0x92,0xd1,0x99,0x5c,0xdb,0xda,0xbf,0x48,0x59,0x7e,0x24,0xb6,0xa9,0x33,0xd9,0x8b,0x09,0xcb,0x15,0xe4,0xd8,0x72,0xcc,0xfb,0x1d,0x0b,0xc9,0x0a,0x78,0xec,0x2e,0xc1,0x58,0x0b,0xd2,0x78,0xa1,0xf0,0x1c,0x67,0x9f,0x9d,0xe2,0xce,0x04,0x33,0xa3,0x7e,0xc5,0x40,0x62,0x8b,0x8b .byte 0x2f,0x72,0x66,0x8f,0x57,0x43,0xe5,0x06,0x28,0x43,0x24,0xdc,0xa1,0x12,0x07,0x27,0xfa,0xd2,0xb8,0x92,0xe8,0xc5,0x33,0x1e,0xa1,0x2c,0xf2,0x94,0x5b,0x9a,0x5f,0xbe,0x05,0x51,0xa8,0x6e,0x4a,0xa4,0x10,0x9d,0xa7,0x9e,0x97,0x97,0x1b,0x91,0x1c,0x85,0x8a,0x96,0x6e,0xc7,0x02,0x8e,0x59,0x38,0x8b,0xea,0xf7,0xc5,0xeb,0xa7,0xd2,0xfb .byte 0xde,0xdd,0x47,0x61,0xbc,0x08,0x03,0xbe,0x48,0xcc,0xd4,0x11,0xe4,0x5a,0xd9,0x6a,0x58,0x0c,0x7e,0xd8,0x53,0x04,0xaa,0x27,0xfe,0x90,0x99,0x08,0x16,0x1e,0x88,0xf1,0x60,0x3b,0xba,0xfc,0xf2,0x04,0x14,0x4a,0x3d,0x57,0x40,0x56,0xc3,0x76,0x01,0xf5,0x8c,0x1a,0xde,0xd9,0x6e,0x1d,0x37,0xf7,0xa6,0xd6,0x57,0xcf,0xa1,0xea,0xf7,0x26 .byte 0xdc,0x85,0x76,0x61,0x47,0xcc,0x4b,0xce,0x00,0x04,0x4b,0xbe,0xbd,0x17,0x61,0x49,0x17,0x18,0xb4,0x17,0xcd,0x19,0x03,0xb6,0x78,0x1d,0x8b,0xa6,0xf2,0xed,0xb2,0x38,0xf4,0xf1,0x7f,0x15,0xb3,0x3e,0x1e,0x5f,0xa0,0xe5,0x0b,0xf3,0xc3,0xb0,0xdd,0x0a,0xda,0x78,0x06,0xc6,0xe3,0x9c,0xee,0xaa,0xe3,0x93,0x08,0x9c,0x8f,0xc7,0x03,0x5f .byte 0xad,0x66,0xc2,0xf3,0x9f,0xce,0x24,0x81,0x93,0xfa,0xc0,0x9f,0xda,0x5c,0x38,0xcf,0x69,0x0e,0x0d,0x9b,0x22,0xc7,0xa1,0x62,0x94,0xf1,0x7a,0xf6,0x54,0x14,0xcc,0xc1,0xa4,0xd6,0xd0,0xb6,0x12,0x94,0x97,0x96,0x4d,0xa6,0xce,0x84,0x7f,0x0f,0x19,0xf2,0x6d,0xba,0x3e,0xf2,0x50,0x06,0xc7,0x53,0x62,0xb4,0x9b,0xf4,0x82,0x48,0x85,0x2b .byte 0xa6,0xab,0x65,0xff,0x18,0x4e,0x72,0x2f,0xfb,0x9f,0x73,0x08,0x80,0x12,0xe6,0x6b,0x81,0xf9,0x70,0x9d,0x38,0xbb,0x59,0x65,0x60,0xb6,0x89,0xbc,0xd5,0xf9,0xbd,0xbd,0xb5,0x17,0xcb,0x41,0xb8,0x29,0x87,0x11,0xd2,0xe5,0x06,0xfa,0x60,0x11,0x75,0xd8,0x83,0xcb,0x65,0x6c,0xb7,0xaf,0x86,0x41,0xb8,0x0d,0x4a,0x6c,0x48,0xf2,0x21,0x06 .byte 0xab,0xd5,0xa5,0xef,0x62,0x51,0xbe,0x29,0xb0,0x02,0x77,0x0e,0xba,0xc8,0xac,0x77,0x97,0xeb,0x3f,0x83,0x17,0x54,0xa9,0xe6,0x1f,0xfd,0xc8,0xb2,0x64,0x89,0x78,0x39,0xe7,0xb9,0x4f,0xd4,0x6e,0x00,0xc3,0x8d,0x9a,0x11,0x4a,0x2a,0x3a,0x0d,0xa2,0x5a,0xe5,0xe3,0xf3,0xa3,0xa9,0x77,0x91,0xdd,0xa5,0x7d,0x1a,0xe9,0xa4,0xf1,0x78,0xaa .byte 0x4e,0x93,0xb7,0x89,0x03,0x1a,0xba,0xa4,0x1b,0x2e,0xe6,0xfc,0xdf,0x3f,0x99,0xda,0x1d,0xa1,0xec,0x4a,0xc8,0x4b,0x28,0x24,0xb3,0xe5,0x1e,0xbf,0x85,0x74,0x8b,0xba,0xd5,0x5b,0x6c,0xd1,0x59,0x55,0x95,0xb3,0x6a,0x5f,0xd6,0xee,0x7a,0xf7,0x69,0xf5,0xb9,0xda,0xe6,0xdf,0x37,0xa3,0x61,0x4f,0x87,0xe8,0x13,0x1e,0x7a,0xab,0x98,0x79 .byte 0xd2,0xd6,0x0b,0x1d,0x2a,0x9c,0xe4,0x09,0x82,0x75,0x0b,0x45,0xa1,0xf2,0xa9,0x01,0x51,0x71,0x32,0xf6,0x23,0xaf,0xd4,0xe6,0x69,0xf1,0x08,0x0f,0x68,0x1c,0x47,0xe1,0x34,0xb8,0xd4,0x9a,0x98,0xb5,0x5a,0x95,0x24,0x1f,0x78,0xaa,0x51,0x63,0x95,0x61,0xc2,0xd3,0xcd,0x88,0xfb,0x8a,0x8c,0x75,0x94,0x0d,0x34,0x3f,0x7e,0xb0,0x40,0xaf .byte 0x45,0x65,0xe4,0x70,0xb9,0x86,0xf2,0x5d,0x4b,0x96,0xa4,0x0c,0x33,0xe0,0x6a,0x54,0x3a,0x21,0xae,0xd2,0x66,0x12,0x96,0x15,0x22,0xbb,0x08,0x3e,0xcf,0xd7,0x55,0x82,0x33,0x0a,0x6c,0x82,0xa1,0x2c,0x0d,0x08,0x96,0x7a,0xc4,0xc0,0x46,0x32,0x28,0xf3,0x59,0xbf,0xc7,0xfd,0x47,0xe7,0xc7,0x11,0x97,0x2b,0xa3,0xdf,0x44,0x30,0xe8,0x26 .byte 0xa4,0xfe,0x90,0x21,0x31,0xb6,0xed,0xe0,0x39,0x1f,0xfb,0x0b,0x94,0x00,0x2c,0x30,0x80,0x89,0xde,0x36,0x8c,0x73,0x7b,0x96,0x03,0x27,0xe0,0x99,0x37,0x63,0xc6,0xc5,0x49,0xa9,0xe9,0xca,0x88,0x3e,0xcb,0x87,0x23,0x84,0xa5,0xc8,0xa7,0xf4,0x1c,0x45,0xae,0x63,0xf8,0xca,0x58,0x4e,0x5b,0xa1,0x02,0x9a,0xd5,0xc1,0xb4,0xa7,0x2f,0xe4 .byte 0xab,0x54,0x3e,0x50,0x7d,0xcb,0x40,0x5d,0x13,0x8d,0x06,0xdf,0x1a,0xe9,0x35,0x32,0xac,0xa9,0x66,0x75,0x32,0x9b,0x4b,0x61,0x5d,0x3d,0x0a,0x8c,0xfe,0xfb,0x5f,0xc8,0xc0,0xcd,0xa8,0x81,0xd0,0xfb,0x45,0xb7,0x7b,0x86,0x58,0xb0,0x3d,0x77,0x27,0x76,0x1b,0x10,0x5f,0x8d,0xe0,0x54,0x89,0xab,0x51,0x41,0x11,0x9a,0x7b,0xe5,0xa5,0xee .byte 0xa7,0xfe,0x31,0x63,0xf9,0x66,0xf6,0x83,0x20,0x2c,0xe9,0x25,0x2e,0x75,0xff,0x9e,0x1b,0x81,0xe0,0xdc,0x55,0xa2,0x34,0x9c,0xaa,0x1c,0x6e,0xfc,0x98,0x10,0x99,0xce,0x31,0xe1,0x5f,0xb6,0x0b,0xab,0xa4,0x7c,0xd0,0x48,0xfd,0xd1,0xd6,0xf3,0x6a,0x4c,0xfc,0xba,0x4a,0x70,0x19,0xe1,0x5a,0x9b,0x1d,0x93,0xf5,0x8f,0x32,0x83,0xbc,0x04 .byte 0xe0,0x25,0xf8,0x41,0x16,0x10,0x88,0x30,0xa9,0x7a,0x47,0x40,0xad,0x88,0x43,0x20,0xe0,0x21,0x81,0xfb,0xbe,0xff,0xd2,0xad,0x37,0x9f,0xf7,0x5c,0xfb,0x89,0x46,0xc0,0x48,0xde,0x0a,0x06,0x94,0xec,0x2d,0xce,0x60,0xf0,0x58,0x62,0x55,0xf9,0x4b,0x61,0xff,0xc9,0x75,0x90,0x38,0x13,0x72,0xb4,0xd4,0x84,0x93,0x0b,0xff,0xfd,0x4d,0xbf .byte 0xce,0x5c,0xac,0x31,0x78,0x1d,0x19,0x3e,0xf1,0xcc,0x28,0x14,0x40,0x19,0x0f,0x5f,0x77,0x13,0x11,0xa1,0x96,0x3a,0xe5,0xb6,0xec,0x4f,0x12,0x98,0x81,0x11,0x9e,0x8c,0xd5,0xa3,0xb6,0xa1,0x62,0x63,0x02,0x28,0xec,0x3c,0x4a,0x65,0x69,0xab,0xd6,0xc3,0xcf,0x73,0xa6,0xaa,0x9e,0xa1,0xb9,0x70,0x61,0xfe,0xd3,0x48,0x9f,0xe3,0xc2,0x8f .byte 0x76,0x91,0xc1,0x7c,0xef,0x2e,0x3a,0x35,0x35,0xe4,0x6a,0x4c,0x94,0x11,0x92,0x72,0xde,0x7c,0xaa,0x76,0xa4,0x59,0x31,0xd7,0x83,0x12,0x67,0x45,0x0a,0x78,0xe5,0x90,0x06,0x4e,0x73,0x04,0x57,0x53,0x9b,0xa2,0x01,0x7c,0x54,0xfb,0xfe,0xb7,0xd2,0x46,0x3a,0x7f,0xc7,0x38,0xb2,0x94,0xcb,0x37,0x3a,0xd8,0x29,0x3b,0x02,0xfa,0x29,0xd7 .byte 0x68,0xed,0x3a,0x8e,0x6e,0x28,0x6d,0x93,0x2d,0x72,0xd2,0xb0,0xf9,0x8c,0x55,0xf6,0x2e,0x87,0x2c,0xce,0x7d,0x8f,0xe5,0x45,0xf5,0x88,0x03,0x19,0xc4,0x1c,0x93,0x0a,0x92,0x60,0x02,0xf8,0x1b,0xc5,0xba,0xf3,0x01,0x55,0xfd,0xd3,0xc1,0xe0,0xb7,0x23,0x7e,0x06,0xb5,0xe2,0x2c,0xbb,0x09,0xba,0xc3,0x03,0xf9,0xa1,0xd1,0x84,0xfe,0xd0 .byte 0xf6,0xac,0x99,0xff,0x08,0xe7,0x49,0x35,0x3a,0x06,0x33,0x15,0x2f,0xf6,0x4a,0xce,0xfe,0x4c,0xc4,0x8f,0x76,0xbf,0x86,0x49,0x3e,0xb0,0x93,0xa7,0x25,0xa3,0xc8,0x7b,0xfb,0x55,0x12,0x0c,0x36,0x93,0x3b,0x3d,0x04,0xd2,0xc3,0x85,0xb8,0xa5,0xa3,0x62,0x1e,0x74,0x1a,0xcb,0x81,0x89,0x38,0x59,0x06,0x8f,0x4a,0x71,0xd0,0x80,0xda,0x02 .byte 0xaa,0xdb,0x88,0xc8,0xf3,0x33,0x52,0x30,0x29,0x15,0xd9,0xfb,0x19,0x9e,0x4e,0xcd,0x9c,0x7c,0x43,0x42,0xe1,0x24,0x37,0x55,0x75,0x5a,0x0a,0x64,0xf8,0x8b,0x9f,0x45,0x89,0x61,0x0a,0xc1,0xc8,0x3a,0x92,0x59,0x2c,0x9e,0xdc,0x69,0xe1,0xad,0xe0,0x67,0xd5,0x64,0x82,0x8c,0x76,0xf4,0x9c,0x57,0x06,0xe4,0xa9,0x05,0xb2,0xab,0x6d,0x20 .byte 0x35,0x3d,0x85,0xf2,0x83,0xb6,0xc7,0xa8,0xb6,0xc2,0xc1,0x04,0xe9,0x56,0xde,0xb8,0x29,0xf9,0x4e,0x1f,0x7e,0xbe,0xbb,0xa2,0x07,0x7a,0xdd,0xfc,0xe5,0xf9,0x4a,0xfc,0x85,0x4b,0x94,0x84,0x22,0x1f,0x18,0xbc,0x61,0xb3,0x2d,0x4f,0xd8,0x64,0x9c,0x6e,0x07,0x35,0x0a,0x90,0xf8,0x54,0xf1,0x51,0x5f,0xa1,0xc0,0x0c,0x2b,0xfb,0x27,0x07 .byte 0x9a,0x85,0x29,0x3e,0x9a,0x1c,0x6b,0xbb,0xd9,0x13,0x70,0x27,0x92,0xb4,0x17,0xba,0x27,0x7e,0x2a,0xfe,0xaf,0x4b,0x47,0x5f,0x78,0x03,0xe4,0xba,0x6f,0xb4,0xaf,0xe2,0x3a,0xc8,0xc8,0xd0,0x5c,0x5b,0x6e,0x1a,0xf1,0x55,0xb8,0x7a,0x82,0xf5,0x38,0x3f,0xda,0x29,0xa2,0xce,0xf0,0xe8,0x1f,0x61,0xf1,0x3a,0x1a,0x3c,0x2f,0x2f,0xeb,0xe3 .byte 0x04,0x2e,0x88,0x4d,0x57,0x58,0xeb,0xa9,0xd2,0xb0,0x2c,0x99,0xfe,0x13,0xc0,0x0b,0x89,0xbb,0xaa,0x6d,0x45,0x76,0xf2,0xe3,0xea,0x9e,0x3d,0xed,0x4d,0x8e,0x99,0x41,0x55,0xc1,0xae,0xbb,0xd9,0x55,0xe8,0x64,0x5d,0x2e,0x53,0xd1,0x86,0x4c,0x67,0x4d,0xbc,0xa1,0xb5,0xaf,0x17,0xb7,0x4b,0x3a,0x26,0xb2,0xec,0x7b,0x6d,0x5b,0x64,0xb7 .byte 0xaa,0xf2,0x93,0xfb,0x87,0x6c,0x4b,0x37,0x45,0x68,0x9e,0xc9,0x99,0xa1,0x73,0x6a,0xa9,0x3d,0xa4,0xb0,0x89,0x98,0x61,0xbf,0x0b,0xa0,0x23,0xdb,0xed,0x12,0xe2,0x38,0x83,0x52,0xa4,0x3f,0xc0,0x23,0xe7,0xf3,0x9f,0xf6,0x81,0x2e,0x41,0x54,0xec,0x77,0xcc,0x36,0xb0,0x35,0x3a,0x2f,0x74,0x42,0x93,0x08,0xa6,0x3a,0xaa,0x76,0x7a,0x4f .byte 0xe5,0x12,0x8f,0x8e,0xb5,0x93,0x56,0x7e,0xd1,0x8d,0x68,0x13,0x50,0x63,0xd6,0x43,0xb0,0xc0,0xd1,0x0d,0x64,0xbd,0x69,0x99,0x9c,0xf7,0x4e,0x83,0xff,0x9b,0x3c,0x88,0x65,0x0a,0x55,0xa7,0xf9,0x39,0xbb,0x6a,0x10,0xa2,0x9e,0x13,0xc8,0x5b,0xd5,0x4e,0xc2,0x27,0x7c,0xba,0xd2,0x99,0xde,0xaa,0x6f,0xc5,0xda,0x4b,0x6c,0x53,0x1d,0xe8 .byte 0xa9,0xa4,0xd6,0xad,0x94,0x9f,0x3b,0x0a,0x21,0xe0,0xf3,0xc2,0x96,0x63,0x4a,0x37,0x17,0x24,0x31,0x01,0x59,0x90,0xce,0x5e,0xed,0x06,0x22,0x80,0x67,0x73,0xcd,0xd4,0xcc,0x85,0x20,0x95,0x97,0xfe,0x99,0xd4,0x93,0x17,0x3d,0x15,0x15,0x4e,0x89,0x7c,0x6a,0x7b,0x2b,0xc4,0x8e,0x34,0xaa,0xf8,0x27,0xf6,0x0b,0xd5,0x64,0x21,0x96,0x37 .byte 0x04,0xd9,0x01,0x13,0x6d,0xd6,0x2d,0x5b,0xef,0xc1,0xac,0x5f,0x96,0xdb,0x14,0x0f,0x1e,0xc7,0x2a,0x96,0x32,0x07,0xd3,0x98,0x5a,0xab,0x75,0xda,0x4f,0x13,0xf0,0x7f,0xf5,0x4e,0xe1,0x6c,0x1f,0x0e,0xe8,0x5b,0x04,0x64,0x50,0x1f,0x18,0xf9,0x72,0x25,0x5e,0x95,0xa5,0x22,0x13,0xd6,0x21,0xeb,0xbe,0xfa,0x5c,0xb3,0x2a,0x0d,0x54,0xa2 .byte 0x0b,0x99,0xb5,0xa4,0xf4,0x5d,0x57,0x71,0x35,0x03,0xf5,0x1d,0x64,0x12,0xe4,0xba,0x2a,0x1d,0xd7,0x10,0xf1,0x5e,0xb5,0xc4,0x48,0x66,0x23,0xc4,0xcc,0x29,0x7f,0x18,0x70,0x8b,0xaa,0xb2,0xf0,0xe0,0x2b,0x8c,0xd1,0x07,0x49,0x1f,0x6e,0xd0,0x97,0xcb,0xe1,0x0e,0x3f,0x87,0xad,0x11,0xbe,0x09,0x14,0x47,0x3a,0xbe,0x5e,0xe5,0xcd,0x9c .byte 0x7e,0xa7,0xd7,0x2d,0xf9,0xf1,0xd1,0xa1,0xde,0x3b,0xf4,0xa6,0x9f,0x90,0xe5,0x61,0x65,0x9f,0xa1,0x1c,0x89,0xbe,0xae,0xd9,0x03,0xc4,0x96,0x15,0x43,0x80,0xbb,0x9a,0xaa,0x57,0x34,0xa9,0x66,0x1f,0xef,0xc7,0x70,0xe1,0xd4,0x35,0x71,0xaf,0x8c,0x23,0x01,0xf5,0x7e,0x63,0x84,0x8f,0xc0,0x8b,0x28,0xf7,0xbc,0x2f,0x07,0x65,0x80,0x4c .byte 0x84,0xbc,0x4c,0x95,0x5f,0xf9,0x08,0xc3,0x03,0xf3,0x31,0x35,0x4a,0x66,0xea,0x49,0x95,0xe4,0xce,0xcc,0x9c,0x9e,0x3f,0xf6,0x24,0x23,0xa5,0xf7,0xb0,0x4a,0x20,0x81,0xe5,0xc4,0xf0,0xe8,0xae,0xea,0xbf,0xcc,0x50,0xa2,0x9b,0xfe,0x97,0xfe,0x6b,0x1b,0xe0,0x56,0x90,0x0b,0x0e,0x47,0x6b,0x92,0x2e,0x49,0xed,0x99,0x1b,0x3d,0x42,0x3d .byte 0x3e,0xf6,0x7d,0x6d,0x6c,0xc4,0xc6,0xae,0xa6,0x98,0xfd,0xeb,0xa5,0x57,0x05,0x00,0x44,0xbb,0xf3,0xa3,0x00,0x29,0x3d,0xcd,0x45,0xc1,0xa8,0x7d,0x34,0xaf,0x8b,0x53,0x49,0x5f,0x42,0x6e,0xcd,0x51,0x67,0x3d,0x75,0x82,0x17,0x65,0x1d,0x13,0xef,0x2d,0xc3,0xf2,0x87,0xbf,0x95,0x43,0x05,0xfb,0x3c,0x35,0xd7,0xbb,0x35,0x7f,0xbe,0x13 .byte 0x10,0x06,0xdd,0x17,0xe7,0x39,0xa1,0x8f,0x8f,0xf2,0xba,0xe2,0x27,0x83,0x6e,0x86,0x01,0x8c,0x04,0xa3,0xc8,0x6e,0xf9,0x51,0x3f,0xf2,0x36,0xe6,0x0a,0x48,0xf3,0x72,0x56,0xb7,0xd7,0x8f,0x43,0x17,0x60,0x9b,0xaf,0xcf,0x74,0x43,0xc9,0x27,0x40,0x10,0x28,0x13,0x04,0x6a,0xb3,0xa4,0xf8,0x41,0xfe,0xd5,0xd2,0xcd,0xe7,0x12,0x1d,0x82 .byte 0x91,0x6d,0x3e,0xce,0x30,0x74,0x39,0x2b,0xbb,0xed,0x46,0x3d,0x0b,0x98,0x6f,0x76,0x20,0x01,0xc0,0x50,0x25,0xa2,0x02,0x7b,0xbc,0x31,0x2b,0x2b,0xb5,0xd4,0xad,0x38,0xe2,0x20,0xdb,0x4d,0x8e,0x1e,0x21,0x3d,0x80,0x1b,0x77,0xc0,0x7d,0xfd,0x88,0xac,0x85,0xed,0xc9,0xfd,0xf0,0xa2,0x60,0xcd,0xc6,0x35,0x88,0x5d,0x22,0xfa,0x7f,0x0c .byte 0xad,0x67,0xee,0xdf,0xd8,0xce,0x10,0x1e,0xb3,0x6f,0xe7,0xe0,0x5c,0x56,0xae,0x08,0xd1,0x65,0x68,0xc1,0xfd,0x17,0xaf,0xc0,0x89,0x77,0xb1,0x12,0x78,0x4e,0xb3,0x39,0x4a,0x95,0x74,0xcb,0x72,0xd9,0xee,0x0b,0x30,0x8f,0x02,0xb4,0x7f,0x15,0x9a,0x13,0x3f,0x02,0x1c,0xb0,0x80,0xaa,0xb0,0xa1,0x14,0x1a,0x93,0x69,0xde,0x83,0x89,0xa1 .byte 0x83,0x48,0x27,0x5a,0x22,0xb8,0xd1,0xf6,0x25,0x81,0xb0,0xe9,0xb6,0x3f,0x17,0xa1,0xe1,0x37,0x46,0x6b,0xa5,0x5f,0x85,0xcc,0x39,0x19,0x45,0xe1,0x95,0x21,0xe9,0x5b,0x09,0xa6,0x9a,0xe0,0x11,0xed,0x10,0x20,0x40,0xb3,0xfd,0xd0,0x48,0x3a,0x9f,0x85,0x92,0x37,0x12,0xa8,0x44,0xa7,0x22,0x45,0x1c,0x57,0xe4,0x36,0x79,0xe0,0x08,0xd8 .byte 0x40,0xa2,0x66,0x7b,0x2d,0xe7,0xb1,0x56,0x62,0xd6,0xaa,0x33,0xdd,0xbd,0x74,0x3f,0x26,0x04,0x0d,0xc1,0x45,0xf4,0xaa,0x70,0xbb,0x8a,0x24,0x4a,0x60,0x01,0x5b,0xc2,0x79,0xb1,0x0e,0x24,0x46,0x4b,0x15,0x02,0xda,0x9a,0x24,0x0e,0x1d,0xa1,0xb4,0xa3,0xc1,0x31,0xfb,0x3d,0x7b,0x69,0xd2,0x22,0x52,0x37,0x9f,0xc0,0xb8,0xd4,0x36,0x01 .byte 0xe7,0xe2,0x99,0x93,0xec,0x96,0x0d,0x8c,0xbe,0xa9,0x92,0xa0,0x25,0xe3,0x66,0x26,0x2e,0xae,0x44,0xbf,0x9e,0xa0,0x20,0x97,0x41,0x2f,0x19,0x80,0xbc,0x78,0x19,0x8e,0x08,0xea,0x55,0x7f,0x88,0x74,0x4a,0x78,0xfb,0x6b,0x33,0x51,0x54,0xb4,0xa3,0x82,0x3b,0xa6,0xa7,0x5a,0x6d,0x01,0xa7,0x59,0x2f,0xf1,0xba,0x35,0x8e,0xbd,0xe4,0xb4 .byte 0xc3,0x37,0xc7,0x1c,0xcf,0x5b,0x26,0x02,0x2d,0x64,0xe5,0xb4,0x61,0xea,0x56,0xcf,0x6a,0x53,0x7a,0x1b,0x8c,0xc7,0x4f,0x32,0x6d,0x57,0xd9,0xde,0xf1,0xd3,0x8f,0x95,0x52,0xc6,0xab,0x43,0xc3,0x57,0x3e,0x04,0xb3,0xf9,0x0c,0x66,0x82,0xf4,0x19,0xa5,0xd4,0xc5,0x3a,0xc1,0xe0,0x00,0x11,0x36,0x51,0x38,0x97,0x3a,0x62,0x10,0xd5,0x81 .byte 0xec,0x16,0x34,0xd5,0xff,0x8a,0x01,0xb1,0x25,0x44,0xf6,0xcb,0xda,0x2d,0xbd,0x42,0xb5,0xd1,0x8a,0xf4,0xab,0xe4,0xae,0x18,0x72,0x66,0x93,0xef,0xfa,0x8d,0xdb,0x43,0x46,0xb3,0x68,0xa0,0x15,0x93,0xce,0x33,0xa9,0x29,0x12,0xf0,0x69,0x74,0x34,0x6a,0xea,0xfc,0x05,0x35,0x7a,0x0e,0xfe,0x89,0x73,0xb8,0x47,0x5b,0x6c,0x1b,0xd2,0x41 .byte 0xaf,0xca,0xcd,0x67,0x00,0x44,0xf6,0xc9,0xcf,0x80,0x73,0xda,0x90,0x41,0xd1,0x35,0x75,0x67,0xfe,0x30,0x61,0x8f,0xa7,0x88,0x7f,0x1b,0x39,0x3d,0x41,0x41,0x8d,0xf8,0x04,0x0b,0x8c,0x25,0x2b,0xb6,0xd5,0xe3,0xb9,0xeb,0xd9,0xb1,0x99,0x0c,0x45,0x12,0x9f,0x19,0xce,0xc3,0xd6,0x02,0x3e,0x4c,0xdf,0xf9,0x61,0x41,0x50,0x7b,0x38,0x7e .byte 0x40,0x43,0x90,0x2a,0xb0,0x2e,0x16,0x33,0x32,0xa2,0x34,0xb8,0xc5,0x76,0xdc,0xda,0x71,0x07,0x45,0x9b,0x1f,0x6b,0xd7,0x92,0x69,0x04,0x02,0xa2,0x50,0x55,0xd3,0x96,0x10,0xaa,0x22,0x1e,0xb7,0x6a,0x84,0x8b,0xc6,0x7a,0xdb,0xe5,0xc6,0x25,0x9a,0x7b,0xa4,0x3a,0x06,0xc9,0x2f,0x95,0xb2,0x9b,0xac,0xfc,0xbb,0xb2,0x9a,0x39,0x84,0x6d .byte 0xce,0x56,0x62,0x34,0x61,0x48,0x34,0x31,0x6b,0x29,0xaa,0x5c,0xdd,0x52,0xae,0x8e,0x9f,0x36,0x3b,0xec,0xd9,0xc2,0x3d,0x13,0x61,0xc7,0x74,0x58,0xf9,0x2b,0x87,0x05,0x07,0x3c,0xd7,0x37,0x7f,0x59,0x54,0x32,0x95,0x19,0xc8,0x38,0x69,0x6e,0xc9,0x88,0x77,0x65,0x20,0x2c,0xf4,0xaf,0x57,0xc1,0x7d,0xe2,0xb4,0xdc,0x4e,0x74,0x77,0x92 .byte 0x83,0xee,0x4a,0x7d,0x74,0x6f,0x19,0x74,0x8f,0xb5,0x76,0x5d,0x79,0x4a,0x16,0xb9,0xaf,0x2a,0x2d,0xd9,0xeb,0xd2,0xad,0x70,0x37,0x5d,0xff,0x96,0xfc,0xe2,0x9c,0xed,0x45,0x4f,0x56,0x59,0x9a,0xdb,0x81,0x3f,0x3f,0xc3,0x47,0x81,0x46,0x7d,0x14,0xdd,0x45,0xee,0x50,0x25,0xae,0xd4,0x61,0x8e,0x4d,0x58,0x35,0xf5,0x62,0xc0,0xa8,0x25 .byte 0xb1,0xf1,0xd4,0x86,0xd5,0x67,0x8d,0x50,0xfc,0xfb,0x8d,0x18,0x82,0xc9,0x34,0xbe,0xe0,0x0b,0x6a,0xcb,0x2f,0xf0,0xd1,0x32,0x40,0x35,0xf9,0x4c,0xa8,0xd2,0x92,0x53,0x90,0xc1,0x44,0xb4,0x59,0xb2,0x8c,0xc7,0xb9,0xb7,0x5d,0xf9,0xa0,0x9b,0x8c,0xcd,0x32,0x36,0x72,0xce,0xa8,0x49,0xbe,0xba,0x46,0x5e,0x43,0xa0,0xd5,0xf3,0x81,0xa5 .byte 0xbe,0xf4,0x37,0x22,0x27,0x5e,0x56,0x52,0x00,0x1b,0x79,0xf8,0x17,0xa5,0x61,0x92,0x7a,0xfb,0x0d,0xf9,0xaf,0x4a,0x9c,0x7c,0x09,0xda,0xab,0xda,0x8a,0xdb,0x6a,0x25,0xcc,0x60,0x79,0x48,0x11,0x3f,0xd9,0x0d,0x30,0x4b,0xaf,0xa3,0x48,0xb9,0x80,0x9b,0x43,0x94,0x1a,0x2d,0xdf,0x1d,0x74,0x1c,0x17,0x9f,0xbb,0x52,0xbc,0x9c,0x2f,0xaa .byte 0x7a,0x0a,0x8d,0xc9,0x2c,0xbb,0x33,0xf0,0xc2,0x25,0x34,0x9d,0x1a,0x5c,0x11,0x38,0x95,0xeb,0x65,0xce,0x85,0xe6,0xa8,0xd1,0x20,0x7c,0x8f,0xd3,0xb6,0x42,0xb9,0x97,0x4f,0x94,0xc6,0xfe,0xcc,0x8b,0x90,0x9a,0x18,0x46,0xdb,0xdc,0x2e,0x45,0xd5,0xe4,0x11,0xb6,0xb0,0x9b,0xf6,0x0b,0x53,0x0e,0x44,0xf5,0x33,0x9a,0xdc,0xd3,0x36,0x52 .byte 0x3f,0xe3,0x3e,0x3a,0xfc,0x6b,0xaf,0x31,0xf8,0x21,0x19,0x54,0x68,0x5e,0x37,0x95,0x9f,0xba,0x83,0x8c,0x53,0xa3,0xda,0x26,0x48,0x2a,0x4a,0xe0,0x73,0x82,0x51,0x68,0x1c,0x60,0x5e,0x3d,0x95,0x61,0x2b,0xb7,0x94,0x7a,0x94,0x03,0x50,0x4e,0xa2,0x3e,0xa7,0xc8,0x29,0x79,0x3a,0x12,0x82,0x71,0x7e,0x3c,0x35,0xed,0x24,0x9f,0x90,0xb1 .byte 0x04,0xec,0x83,0xeb,0x4f,0x91,0x54,0x44,0x7c,0xb2,0x14,0x44,0xde,0x73,0x69,0x84,0x4b,0x9c,0x12,0x13,0x27,0xe8,0x1a,0x6b,0x39,0xce,0xad,0x56,0x17,0x99,0x1a,0x6c,0x54,0x21,0xe2,0x6f,0x0d,0xe6,0x2a,0xff,0x7d,0x22,0xfa,0xdf,0xa6,0x32,0xf0,0xfd,0xa7,0xa4,0xe9,0xaa,0x33,0x8e,0xd6,0x36,0x7f,0xfd,0xf8,0x13,0x7e,0xb5,0x16,0xdb .byte 0xea,0x61,0xf3,0x18,0x36,0xfd,0xf3,0xa4,0x11,0x5d,0x93,0x86,0xfb,0xaa,0x86,0xd5,0xd6,0x24,0xfb,0x00,0x8a,0x8a,0x78,0x28,0xdf,0x8e,0x2a,0x51,0x65,0xd3,0xb2,0x6f,0x02,0xb8,0xa4,0x03,0x42,0xf5,0xf9,0x61,0x00,0x17,0x34,0x32,0x83,0x20,0x0c,0xee,0x2a,0xe7,0x04,0x65,0x52,0xe0,0x0c,0xaf,0x77,0xa7,0x72,0x44,0xa8,0xb1,0x85,0x73 .byte 0x9f,0x8b,0x99,0x10,0xf9,0x5b,0x68,0xfc,0xe6,0xae,0xdb,0x65,0x99,0x09,0x01,0x4a,0x80,0xd6,0xe2,0xd6,0x86,0xb1,0xf0,0x5f,0xb3,0x12,0xf4,0xdd,0x53,0x0d,0x9c,0x61,0x6d,0x8a,0x68,0xca,0x36,0x65,0xf0,0x7d,0x71,0xa3,0x62,0xd6,0x15,0x73,0x5b,0x8b,0x84,0x29,0x1f,0xde,0x24,0x22,0x4f,0xe3,0xd3,0xee,0x68,0xb4,0xf0,0x0c,0xa8,0x33 .byte 0xde,0x82,0x74,0x9b,0x65,0x7d,0x96,0xce,0x52,0x2f,0x41,0xe2,0xa9,0x2a,0x62,0xd1,0x2a,0xf4,0x52,0xa0,0xbc,0x0d,0x88,0xd4,0xbe,0x0d,0x7b,0x2d,0xf0,0x3c,0xc9,0x76,0x69,0x44,0x88,0x4f,0x75,0x73,0x77,0xd8,0xec,0x7d,0x01,0x95,0xab,0x2f,0x29,0x99,0xb8,0xdb,0xa3,0xf0,0xea,0x57,0x2b,0x91,0xf9,0x6c,0x4d,0x59,0xae,0x09,0x52,0x08 .byte 0x89,0xa2,0x32,0x2b,0x7e,0xca,0xae,0x30,0x8e,0xa5,0x66,0x88,0x79,0x9e,0xb3,0xd4,0xe2,0xe2,0x0e,0x5d,0xf6,0x17,0x66,0x77,0x09,0x84,0xf3,0x00,0x59,0xfb,0xfc,0x5c,0xb0,0x0f,0x2f,0xa7,0x5a,0xbd,0xf7,0x7e,0x74,0xd1,0x86,0x9d,0x9c,0x7f,0x00,0x16,0xa1,0x2b,0x90,0xe7,0x3e,0x94,0xab,0x7e,0xf5,0x18,0x1c,0x77,0x8e,0xf8,0x4d,0x43 .byte 0x6b,0xfd,0xa8,0x26,0xbb,0xb2,0x05,0x01,0xa2,0x95,0xcc,0x9a,0x54,0xad,0x5e,0xa2,0xc2,0xa8,0x82,0x5b,0x43,0xef,0xbf,0x87,0x61,0xcb,0x21,0x12,0x56,0xef,0x55,0x09,0xeb,0x22,0x49,0xf8,0x13,0x8d,0x1a,0x84,0x0c,0xf6,0xeb,0xbc,0xf3,0x09,0x5c,0xe7,0x61,0xcf,0xb4,0x84,0x8d,0x95,0x6f,0xa8,0x10,0xc7,0x99,0xd5,0x21,0x59,0x7e,0xe9 .byte 0xd2,0x05,0xf6,0xab,0x40,0xe5,0x5b,0xb1,0xe1,0x64,0xdb,0x38,0x1e,0x9e,0xe2,0x0c,0xd7,0xe5,0xa2,0xe4,0x51,0x4b,0xff,0x8b,0x10,0x79,0x21,0xaf,0xa9,0xdd,0x40,0x43,0x56,0x57,0x01,0xa3,0xe0,0x40,0x94,0xe5,0x85,0x6c,0xa5,0x93,0x0f,0x28,0x97,0xaa,0x82,0x3c,0x01,0x77,0x1e,0x18,0x6c,0xdd,0xff,0x32,0x23,0x7b,0x0b,0x9c,0x95,0x66 .byte 0x62,0xb8,0xa0,0x94,0xcb,0x0e,0xdc,0xed,0xb1,0x44,0x1f,0xa8,0xcd,0x1f,0xf7,0xb7,0x41,0x7b,0x0c,0x96,0x08,0x75,0x98,0xd2,0x6e,0xb4,0x8a,0x24,0xf1,0x21,0x18,0x0c,0x2b,0x9f,0xef,0xd9,0x7b,0x3a,0x46,0x05,0xac,0xe4,0x5f,0xad,0x1d,0x2d,0xd0,0x34,0x83,0xfb,0x2c,0xd9,0xaa,0x59,0x86,0x6d,0x06,0x07,0x2e,0x2d,0x61,0x78,0x85,0xba .byte 0x7d,0x50,0xde,0x4f,0x55,0x83,0x4d,0xdf,0xfb,0x56,0x81,0xa7,0xf1,0x63,0x97,0xd0,0xf2,0x69,0x7d,0x14,0xf3,0x7b,0xc2,0xf5,0xcf,0x44,0x39,0x9e,0x3b,0x1c,0x65,0x09,0xfb,0xdb,0xa6,0xb8,0xe4,0x20,0xc5,0x21,0xc8,0xe7,0x51,0xe8,0xf9,0xd7,0x29,0xf8,0xee,0xfd,0xbd,0xff,0x15,0x91,0x7c,0x92,0xcd,0x89,0xe9,0x9e,0xde,0x24,0xdc,0x67 .byte 0xcf,0x51,0x94,0xff,0xb0,0x21,0x30,0x8c,0xea,0x38,0x08,0xf8,0x02,0x31,0x5d,0x57,0x99,0x15,0x2f,0xf2,0xd5,0x7e,0xe5,0x87,0x5a,0xfa,0xee,0xa2,0x34,0x2e,0x24,0xcd,0x53,0xe7,0x89,0x51,0x9b,0x1c,0x88,0xd6,0x3c,0x12,0xe4,0xe0,0xf7,0xb6,0x39,0x3b,0x26,0x9a,0x0d,0xb7,0xfc,0x5e,0x74,0x58,0x74,0x78,0x3d,0x3b,0xc8,0xc0,0xb0,0xfe .byte 0x82,0x15,0x1e,0x38,0x75,0x1d,0x85,0xd7,0x07,0xc2,0xc4,0x79,0x73,0xef,0x67,0xf0,0x56,0xf3,0x2f,0xce,0x8c,0x58,0x98,0x64,0x2b,0x7b,0x41,0xfa,0x32,0xba,0x6e,0x1c,0xa5,0xf4,0xc0,0x66,0x26,0x85,0x6d,0x65,0x7e,0x83,0x17,0xc4,0x8a,0x82,0xe2,0xc9,0x1d,0x5e,0x06,0xc7,0xbe,0xe5,0x49,0x66,0x9d,0x7f,0x75,0xa3,0x5d,0x02,0xb7,0x23 .byte 0xc9,0x94,0x81,0xb5,0xe6,0x0c,0xf0,0x5e,0x70,0xbb,0x69,0xf2,0xd9,0xc5,0x96,0xe2,0x35,0x6b,0xf1,0xd4,0x42,0xfb,0x0f,0xc0,0x35,0x93,0xb1,0x73,0x3d,0xeb,0xdd,0x85,0x03,0xd5,0x8d,0x41,0x35,0x6f,0xf5,0x0f,0x7b,0xe0,0x03,0xc8,0x6d,0xae,0x1f,0x5d,0x58,0xf1,0xf1,0xc8,0x97,0x3a,0x1a,0x4a,0x0e,0x23,0xa3,0x72,0x3a,0xdd,0xf3,0x9d .byte 0xd3,0x1b,0xcd,0x5f,0xb8,0x49,0x07,0x2d,0x49,0xc1,0xbb,0x40,0x32,0x86,0x00,0xe8,0x95,0xa0,0x34,0x25,0x1f,0xac,0x30,0x4e,0x41,0xde,0x6d,0x94,0xb6,0xb0,0xf9,0x9f,0x3a,0x12,0xf9,0x80,0xc4,0xf7,0x57,0x3d,0x53,0x38,0x0c,0x7f,0x80,0xfb,0xdd,0x5b,0x7c,0xe4,0x6f,0x47,0x30,0x16,0x56,0x37,0x01,0x49,0x9c,0xd9,0x89,0x34,0xa1,0x29 .byte 0x20,0x57,0xb5,0x7c,0xbd,0xcc,0x90,0xec,0xb2,0xcc,0x39,0xad,0xc2,0xbe,0x06,0xd0,0x60,0x30,0xc0,0xe9,0x4c,0x7d,0x30,0x86,0x53,0x80,0x8b,0x35,0x70,0x2c,0x35,0x3d,0xb2,0x3a,0x9a,0xca,0x69,0x40,0x11,0x71,0x75,0x4b,0x68,0x5b,0x9c,0x03,0x48,0x4c,0x9c,0x68,0xce,0xe7,0x5a,0x65,0x98,0xed,0xa1,0xe5,0x20,0xe4,0x0f,0x54,0x0c,0x0e .byte 0x50,0x97,0xa3,0xf2,0x67,0x97,0xea,0x74,0x93,0x73,0x82,0x60,0xa4,0x29,0xb6,0xa3,0x9d,0xc1,0x2f,0x31,0x30,0xb9,0x1f,0xfd,0xc3,0x4f,0xbe,0xa1,0xb1,0xc4,0xbc,0x88,0x78,0x27,0x85,0xb1,0xa1,0x91,0x3e,0x61,0x3b,0xd5,0x0f,0x8d,0x28,0x80,0xf1,0x4b,0x8e,0xdf,0x34,0x22,0x45,0x6b,0x62,0xb8,0xac,0xd9,0xe3,0xff,0xce,0xfc,0x2e,0x34 .byte 0x81,0x70,0xc1,0xb8,0x51,0xa2,0xa2,0x1a,0x7a,0xbc,0xf0,0x56,0x12,0x7a,0xf4,0x3b,0x34,0xc7,0xcf,0x63,0x66,0xc9,0x36,0x77,0x52,0xfd,0xc5,0x87,0xa6,0x97,0x9a,0x39,0x7f,0x4c,0xdf,0x0d,0xfe,0x8f,0x57,0xbe,0x75,0x6b,0x79,0x86,0x57,0x40,0x88,0x7e,0x63,0xb6,0xe9,0x1a,0x07,0xa4,0xa0,0x15,0xee,0xb4,0xb6,0x18,0x23,0x7b,0x9f,0x2f .byte 0xba,0x2c,0x8c,0x7f,0x7b,0xbf,0xab,0x21,0x5b,0x45,0xc7,0x61,0xd2,0xa5,0x0b,0x13,0x1a,0x63,0x6a,0x69,0x4f,0x06,0x78,0x22,0xe6,0x98,0xbc,0xaa,0xd1,0x67,0xc5,0x2c,0x05,0x38,0x57,0xfb,0x28,0xfd,0x09,0x29,0x02,0x12,0x0c,0xab,0x2a,0xd8,0xf1,0x6c,0x9d,0xdf,0x9c,0x76,0x4b,0xf8,0x18,0x80,0xa3,0xfc,0xbb,0x82,0xe2,0xb5,0x1d,0xcf .byte 0x23,0xf9,0xe1,0x6d,0x97,0xe9,0x4d,0xfe,0xe7,0x8c,0x2f,0x05,0x1d,0x03,0xaf,0xcd,0x00,0x2c,0xe0,0xec,0x2a,0xa8,0x36,0x96,0xaf,0x5c,0xe3,0x70,0x37,0x2c,0xa5,0xf1,0x4e,0x3c,0x98,0x0f,0xcb,0xea,0x9b,0x2d,0xdd,0x56,0xfb,0x5f,0xa8,0xf5,0x92,0x4f,0x35,0x5b,0x1f,0x80,0xb5,0x86,0x05,0x90,0xac,0x53,0x5f,0xc4,0x67,0x41,0x9f,0x93 .byte 0x9d,0x9e,0xe4,0x12,0x7b,0xee,0x6d,0x77,0xe6,0x47,0xf8,0x31,0xcb,0x21,0xc1,0x2e,0xd7,0xdc,0x28,0x98,0x27,0x91,0xbe,0x91,0xfd,0x99,0xae,0x54,0x28,0xfc,0x84,0x13,0xe7,0x8a,0xf0,0xc9,0xd8,0xd6,0xa5,0xfa,0x57,0x7a,0x84,0xee,0xf1,0xb1,0x90,0x19,0xc5,0x43,0x6b,0x35,0x48,0xd9,0xfe,0x49,0xdf,0xf9,0xc8,0x27,0xfb,0xea,0x08,0x60 .byte 0xe2,0x38,0xca,0xc7,0x8e,0xc4,0x8c,0xc0,0x9c,0xf9,0x1e,0xa6,0xea,0xda,0x0f,0x61,0xdb,0x45,0x81,0xd1,0xed,0x07,0x61,0x2d,0x43,0x54,0x56,0xc4,0xbd,0x29,0x5a,0x8f,0x41,0xa3,0xc3,0x1b,0x7d,0x52,0xab,0x2b,0x5f,0xa3,0xff,0x9a,0xb0,0x9d,0xb2,0x18,0xdc,0x61,0xea,0x4c,0x25,0xd6,0xe5,0x2d,0xc7,0xbe,0x3c,0x0b,0x15,0xa9,0x46,0x07 .byte 0x36,0x92,0x9e,0x43,0x8f,0xf9,0x5e,0x35,0x5c,0x3f,0xfe,0xae,0x87,0x91,0xdb,0xa8,0x4a,0x05,0x2e,0x51,0xdf,0x36,0xf5,0x39,0x03,0x50,0x8a,0xc3,0xd3,0x1b,0xa4,0x1e,0xe1,0xfb,0xbc,0x53,0x3b,0xd3,0x6b,0x22,0x72,0xd0,0x5c,0x67,0x61,0xca,0x85,0x37,0x17,0xa5,0x8e,0x10,0xd1,0x58,0xb1,0x8b,0x17,0x43,0xb0,0xc6,0xc5,0xdc,0xde,0x45 .byte 0x1f,0x18,0x25,0x72,0x89,0x36,0x09,0xa5,0xd7,0x9e,0x8b,0x11,0xce,0xbf,0x31,0xee,0xee,0x6f,0x6d,0xf9,0x94,0x23,0x17,0x11,0xc5,0x53,0xb8,0xfc,0x8f,0xf4,0xdc,0x56,0x6c,0x7d,0x4d,0x42,0x32,0x30,0xb2,0xbb,0x8d,0x69,0xf8,0xb5,0x3b,0x77,0x38,0x04,0xcf,0x49,0x4f,0xec,0x40,0x61,0xbb,0x13,0x9c,0xc4,0xcc,0x7c,0xe8,0x90,0x27,0x91 .byte 0x9e,0x95,0xf8,0x87,0x63,0x94,0xa9,0xc5,0x78,0x78,0x38,0xa1,0xf7,0x21,0x7a,0xec,0x91,0xaf,0x2f,0x2f,0xa4,0x52,0x16,0x5f,0x7f,0x27,0xea,0xce,0xb4,0x1f,0x38,0xe4,0xd9,0xb1,0x24,0xce,0xe5,0xd2,0xd1,0x09,0x2f,0x04,0x65,0xf3,0x54,0x1c,0xac,0xad,0x3d,0x97,0x21,0x83,0x12,0x9c,0x08,0xb8,0x2b,0xd6,0x7e,0x91,0xc5,0xdf,0xa7,0x13 .byte 0x3f,0x4b,0x60,0x52,0xb8,0x1a,0x28,0x44,0x8d,0x8a,0x41,0x6f,0x02,0xf8,0x62,0x6a,0xe4,0xad,0xcc,0x81,0x48,0x44,0x9a,0xed,0x7a,0x87,0x60,0x3a,0x65,0x10,0x49,0x7b,0x90,0x60,0xd9,0xe7,0x67,0x8d,0xff,0xef,0xdf,0x7e,0x07,0x46,0x67,0xfc,0xcd,0xbc,0xae,0x3d,0x39,0xfb,0x5f,0xf9,0x36,0x7a,0xaa,0x80,0x48,0x9d,0x6d,0x98,0x82,0xf9 .byte 0x76,0x08,0xe6,0x5c,0x2f,0xde,0x9d,0xd2,0xb6,0x18,0x4f,0x1f,0x98,0x23,0x91,0x41,0x89,0xcd,0xfa,0x8d,0x5d,0x50,0xcb,0x6a,0x57,0xf0,0x34,0x57,0x68,0x00,0xca,0x4b,0xe4,0xc6,0x1a,0x82,0x6c,0x57,0xad,0xfb,0x37,0xc0,0x2e,0x39,0xd7,0x8e,0x6f,0x36,0x28,0x82,0x99,0x3f,0x9a,0xeb,0xdc,0x1f,0x63,0x34,0xb1,0x14,0xad,0x33,0xdd,0xfc .byte 0x92,0x4a,0x15,0xa8,0xb8,0x48,0x3f,0x11,0xef,0x58,0x17,0xa0,0xe6,0x7b,0x54,0x44,0xaa,0x7c,0x21,0x3e,0xfc,0x23,0x98,0xbb,0x18,0x28,0x37,0x00,0x31,0xb3,0xec,0x90,0x89,0x6f,0x5c,0xaa,0x3a,0x95,0x22,0x6c,0xb7,0x73,0x6d,0x2b,0x94,0xa5,0xda,0x37,0xb7,0x5f,0x0e,0x5a,0x51,0xee,0xec,0xde,0x80,0xeb,0xd7,0x84,0x4e,0x24,0xba,0x97 .byte 0xf0,0x8e,0x6e,0x0c,0x51,0x94,0xb4,0x9b,0x2d,0xa3,0x93,0xf1,0x73,0x96,0xd4,0xf0,0x6a,0x42,0x83,0xde,0x72,0xc9,0x12,0x42,0x2d,0xab,0x2f,0xf5,0x9c,0x21,0x6f,0x6a,0xc3,0xfd,0x01,0x18,0xba,0x3d,0xb0,0x9e,0x64,0x4b,0xab,0xfa,0x2d,0xff,0x13,0x0a,0xab,0xd4,0x4b,0xaf,0x06,0x38,0x8b,0x79,0xd3,0xa6,0x03,0x38,0xa6,0xe2,0x39,0xa9 .byte 0x0b,0xc1,0x83,0xd6,0x56,0x72,0xcd,0x10,0x35,0xbc,0xa3,0xe6,0x8c,0xf7,0x0e,0x70,0xbf,0xb8,0x4f,0xe2,0x37,0x88,0xf3,0x79,0x79,0x12,0xa5,0x4b,0x87,0x73,0x39,0x0b,0x25,0x4b,0x56,0x47,0x38,0x6d,0x03,0xa7,0xff,0x32,0x2a,0xd2,0x03,0x2c,0xe6,0xe0,0x73,0x1b,0x7c,0xeb,0x47,0xb5,0x4e,0x65,0x6c,0xd8,0x0f,0x08,0xbf,0x98,0xbf,0x5e .byte 0xae,0x69,0x0e,0x13,0xc6,0xfd,0x33,0x78,0x58,0xe9,0xe7,0x52,0x4c,0xb1,0x68,0x46,0x35,0x8c,0x1f,0x10,0xf5,0xeb,0x2f,0xaa,0xf3,0xdb,0x1a,0x2c,0x54,0xe1,0x3d,0x49,0x65,0x90,0x80,0xce,0x55,0x19,0xab,0xf9,0x05,0x3f,0xa8,0xf9,0x40,0x11,0x2a,0x84,0x82,0xbc,0x6f,0x95,0xad,0x66,0xff,0x6c,0xc8,0x84,0xb9,0xc7,0x74,0xa8,0xf3,0x5b .byte 0x48,0x8d,0x6a,0xef,0xec,0x58,0x5a,0x96,0x35,0xcd,0xc8,0xbf,0x6e,0xc3,0x23,0x81,0x0b,0x5d,0x80,0x98,0x4d,0xe7,0xf5,0xb5,0x4a,0x1e,0x0a,0xfd,0x04,0xc6,0x10,0x50,0x79,0x7a,0x34,0x72,0xfa,0xaf,0x2c,0xf2,0xfd,0xfb,0xc7,0xb1,0x46,0x8a,0x0f,0xc2,0xee,0xa9,0x54,0x83,0x5b,0x84,0x20,0x88,0x74,0x98,0xcc,0x8f,0x77,0x8a,0x1a,0xf4 .byte 0x07,0x5c,0xf2,0x1b,0x1f,0xdc,0x03,0x76,0x96,0xf7,0x98,0xc9,0xbd,0x54,0xb1,0x61,0x46,0xbb,0x07,0xab,0xce,0x83,0x90,0xd9,0x3d,0x53,0x9b,0x65,0xa2,0x89,0x29,0x7b,0x75,0x1c,0x46,0x41,0x46,0x3d,0x83,0x2f,0x1d,0x67,0x32,0x0a,0xc6,0x4a,0x6c,0x8d,0x47,0x2a,0xc7,0xb7,0xe6,0xef,0x27,0x7a,0xff,0x86,0x1f,0xcc,0x8f,0xbb,0x48,0xda .byte 0x70,0x49,0xbf,0xdd,0xf0,0x2c,0x30,0x9a,0x63,0xf8,0x1f,0xae,0xdd,0xb3,0x1f,0x50,0x75,0x15,0xf6,0x94,0x60,0x17,0xd4,0x99,0x82,0xef,0xb1,0x19,0xef,0x9a,0x3f,0x73,0x7e,0xb2,0x30,0x47,0x8e,0x3f,0xf3,0x78,0x53,0x72,0x2b,0xb5,0x34,0xcb,0xa4,0x8f,0xf0,0x1c,0x3f,0x3d,0xde,0x77,0x40,0x0b,0x14,0xb1,0x94,0x1e,0x72,0x94,0x24,0xdd .byte 0x3a,0x5b,0x02,0xb8,0x88,0x8f,0x28,0x29,0x3f,0x3b,0x8d,0xc2,0xff,0x0d,0x74,0x77,0x6f,0x70,0x0e,0x92,0x32,0x2c,0x62,0xe7,0x16,0xf3,0x0b,0xdd,0x58,0xd7,0x7b,0x10,0x1a,0x73,0x49,0x57,0x37,0xcc,0x69,0xd6,0xd2,0xda,0xc8,0x85,0xd8,0x64,0x62,0xae,0x21,0x11,0x75,0xb6,0x39,0xa4,0x18,0x02,0x46,0x48,0x10,0x46,0x5c,0x4a,0x86,0xd7 .byte 0x1d,0xbe,0x0e,0x4b,0x6d,0x4e,0xe2,0xbe,0x22,0xd7,0xd5,0x3d,0x1f,0x77,0x7d,0x30,0x13,0xac,0xf4,0x38,0x93,0x85,0x55,0x47,0xaf,0xa5,0x16,0x28,0xc4,0xd0,0xb9,0x04,0xa3,0x27,0xd0,0xdf,0x1d,0x77,0xdd,0xd5,0xf6,0x8f,0x35,0x56,0x47,0xc5,0xb6,0x21,0xf8,0xea,0x5e,0xe4,0xa4,0xbc,0x20,0xc3,0x73,0x30,0xc7,0x2f,0x92,0x89,0x65,0x8b .byte 0x6b,0x12,0xa6,0xc7,0x14,0xa8,0xd8,0xfb,0x99,0xe0,0x1d,0x95,0x90,0xd2,0x66,0xc3,0xf4,0x9b,0x03,0x59,0x2f,0x96,0xbc,0xdc,0x17,0x82,0x56,0x4e,0xf6,0xe9,0x0a,0xe1,0x25,0xb3,0xa5,0x13,0x70,0xd7,0xc8,0xd3,0x12,0x67,0xa9,0xdc,0xde,0x1c,0x3e,0x18,0x26,0x70,0x24,0xf4,0x17,0xf6,0xed,0xa0,0xb3,0xa1,0x38,0x6f,0x95,0x34,0x79,0x43 .byte 0x7e,0xc5,0x9e,0xb7,0x48,0x13,0x5c,0x8b,0x66,0x8e,0xad,0x69,0x02,0x00,0x3c,0xb6,0x76,0x37,0x0c,0x72,0x5a,0xe9,0xc3,0x94,0xc6,0xb5,0x1a,0x51,0x9f,0xb0,0xda,0x0c,0x57,0x5d,0x8d,0x99,0x1d,0xb3,0x12,0xd8,0x87,0x2f,0xbc,0x97,0xb5,0x76,0x30,0x11,0x29,0x59,0xa3,0x61,0xf7,0x61,0xcd,0x9a,0xc4,0xb6,0x2a,0x34,0x0f,0xc8,0x6a,0x08 .byte 0x52,0x14,0x63,0xcf,0x54,0xdb,0xb9,0x7c,0xf2,0x8b,0xa8,0x04,0xef,0x7d,0x9a,0x4d,0x00,0x2e,0x17,0xa4,0x2d,0x83,0x33,0x00,0xa4,0x58,0xda,0x5b,0x95,0x22,0x32,0x69,0xc9,0x6c,0x44,0x19,0x92,0x4b,0xa4,0x24,0xfe,0xc2,0x46,0x88,0x3e,0x8d,0x54,0x88,0x11,0xeb,0x36,0x32,0x03,0x87,0x55,0x8b,0x95,0x35,0x9c,0x04,0xd2,0x07,0x35,0xe0 .byte 0x7a,0x70,0x6c,0x18,0x56,0xaa,0x85,0xf1,0xa2,0x13,0xfb,0xef,0x12,0x0f,0xb9,0x42,0x7f,0xd5,0xa1,0xd0,0xdd,0x29,0x62,0x08,0xe1,0x4c,0x20,0xb6,0xee,0x44,0x45,0x61,0x0b,0xeb,0x40,0x6e,0xef,0xea,0x60,0xfc,0x55,0xa0,0x74,0x45,0x27,0x51,0x90,0x0d,0x1d,0xbc,0x62,0xfb,0xed,0xca,0x7f,0x88,0x85,0x8a,0xfa,0x5c,0x89,0xf6,0x79,0x5b .byte 0xe3,0x3c,0xfd,0x19,0xa9,0xba,0x33,0xc4,0x7a,0x89,0x5b,0x11,0xe2,0xda,0x92,0xd1,0x3d,0x3e,0x9c,0x66,0xa5,0x1d,0xcb,0x9b,0x0a,0x46,0x84,0x93,0x3f,0xc4,0xbf,0x52,0x06,0x49,0xe2,0x46,0x0e,0x2b,0x39,0x67,0x1c,0x8f,0x4f,0xf3,0x53,0xce,0x2a,0x33,0x74,0xc4,0xe9,0x44,0x99,0x01,0xf0,0x55,0xcc,0x0a,0xed,0xa9,0xce,0x76,0x52,0x4d .byte 0x85,0x52,0x26,0x82,0x75,0x3d,0x47,0xfb,0xb1,0xc4,0xfd,0x07,0xa6,0x79,0xff,0x3f,0xda,0xc2,0xa9,0xab,0xc7,0x88,0xa2,0xa1,0x5d,0xf2,0x03,0xe3,0xdc,0xbf,0xa6,0x90,0xfd,0xe0,0x43,0x69,0x88,0x78,0x50,0x99,0xb0,0x7d,0x18,0xca,0x4d,0xb5,0x04,0x8e,0x1a,0xbb,0x22,0xe5,0xc4,0xc6,0x85,0xe3,0x62,0xa9,0xce,0x50,0x83,0x9b,0xa0,0xf0 .byte 0x1a,0x07,0x10,0x90,0x3a,0x31,0x74,0x11,0x69,0x23,0xd2,0x08,0xce,0xfe,0xb1,0x21,0x64,0x62,0x05,0x3b,0x4c,0x8d,0xe3,0x8b,0x42,0x27,0xbf,0x93,0x06,0xf1,0x99,0x00,0x20,0xdf,0xe3,0xd3,0x4b,0x8e,0xb2,0x12,0xb6,0x2c,0x63,0xd0,0x4e,0xd1,0x38,0x8c,0x49,0x69,0x60,0x83,0x02,0xbb,0x8c,0x96,0x0f,0xe9,0x24,0x46,0x85,0xc9,0xf9,0x3f .byte 0x58,0x1b,0x7e,0x72,0x26,0x81,0xb9,0xfb,0xe4,0x41,0xbf,0xd8,0x1b,0xd8,0x36,0x16,0x92,0xf4,0x78,0x0e,0xd4,0x95,0x92,0x20,0x33,0x83,0x65,0x21,0x97,0x92,0x19,0x0f,0x12,0x1c,0x4e,0xd5,0x3c,0xb9,0x54,0xd4,0x6a,0x4d,0x6d,0x89,0x7b,0xf0,0x07,0xf4,0x50,0xb2,0xa1,0xd8,0x4a,0x9e,0xf3,0x3a,0x99,0x65,0x67,0x61,0x09,0xc2,0xf5,0xd5 .byte 0x97,0x36,0xcb,0xe6,0x95,0xa0,0x19,0x2e,0xcf,0x4c,0xce,0xc9,0x4e,0x3b,0x55,0xd1,0xba,0x47,0x4f,0xb5,0xbd,0x29,0xa1,0x8c,0xcd,0xd8,0x9d,0xcf,0xf8,0x1c,0xa5,0x37,0x91,0x66,0x6d,0x3d,0xfc,0x03,0x8b,0x85,0xa9,0x51,0xaa,0x30,0xf7,0x0e,0x44,0x82,0x77,0x5f,0x84,0x60,0x6c,0xc2,0x95,0x4e,0xca,0x16,0x23,0xf2,0x66,0x97,0x45,0x05 .byte 0x90,0xdb,0xb8,0xbf,0x8e,0xaa,0xc8,0x41,0x1e,0x23,0xd0,0xbe,0xc7,0x6c,0x5f,0x39,0x18,0x61,0x1d,0xa2,0x15,0xe5,0x15,0x58,0xd0,0x36,0x99,0xe7,0xdc,0x90,0x5e,0x9a,0x67,0xee,0x92,0xb1,0x61,0xbd,0xe9,0x70,0x04,0x00,0x07,0xc9,0xab,0x74,0x1e,0x0f,0x84,0x45,0x1f,0x49,0xbb,0x49,0xec,0x03,0x00,0x47,0x38,0xfd,0x09,0xbe,0x23,0x3e .byte 0xa8,0x80,0x21,0xf9,0x92,0x5e,0xd6,0x51,0x91,0x7e,0x21,0x5d,0x1e,0xfc,0xbb,0x60,0x9a,0xf5,0x0a,0x3b,0x41,0x4a,0xfa,0xfa,0x26,0xb2,0x54,0x6a,0x61,0xe4,0x13,0x9e,0xc5,0x50,0x29,0xf1,0x29,0xa5,0x76,0xb7,0xce,0x2c,0xe6,0x98,0x88,0xb5,0x87,0xcf,0x49,0x6b,0xa4,0x54,0x94,0x34,0x73,0xec,0xde,0xe4,0x6c,0xe9,0x1e,0x07,0x60,0x8c .byte 0xb4,0x47,0x87,0x82,0xb0,0x51,0xbc,0xb6,0xeb,0x5c,0xbc,0x78,0x94,0x8f,0xe9,0xd9,0xd1,0xc4,0xfe,0x51,0x57,0xdd,0x7b,0x4a,0x9b,0xbf,0xfb,0xe4,0x04,0x49,0xc4,0x29,0x1e,0xc3,0xf6,0xd5,0xf9,0x42,0xed,0x5d,0x57,0x8f,0x5d,0x1e,0x29,0x69,0xb6,0xf9,0x11,0x36,0x65,0x53,0x07,0xaf,0x8d,0xd3,0xa3,0xb4,0x75,0xeb,0x7a,0xbb,0xc0,0x35 .byte 0xe5,0xfa,0x42,0xab,0xda,0xd8,0x83,0x65,0xc2,0x97,0x61,0x76,0xbb,0x96,0x8d,0x8f,0x8b,0xb0,0xa5,0x6f,0x3a,0x3c,0x19,0x84,0x7f,0x20,0x0e,0x97,0x2e,0xd9,0xee,0x2e,0xd6,0x29,0x01,0x94,0x67,0x0d,0x4d,0x43,0x24,0xe5,0xa6,0x92,0x77,0x85,0x49,0xdb,0xb9,0x62,0xb2,0xb8,0xd2,0x2f,0xc3,0x9a,0xe5,0xc0,0x23,0xac,0xd7,0x02,0xf9,0xf7 .byte 0x8b,0x64,0x19,0x44,0xfc,0x2d,0x57,0x3f,0x3e,0x32,0x0d,0xdf,0x2c,0xc9,0x38,0x47,0xa2,0x24,0xab,0x30,0x53,0x7b,0x51,0xf2,0xc4,0xf3,0x18,0x4d,0x4b,0x0e,0xf2,0x09,0x0b,0x0f,0xa3,0x01,0x0a,0x92,0x71,0x2a,0x37,0xca,0x03,0x2e,0x17,0x17,0x64,0x40,0xdf,0x5d,0xdb,0xee,0x71,0xae,0xb8,0xbe,0x3b,0x06,0x03,0x66,0xa7,0x93,0x42,0x1e .byte 0x15,0x1c,0x26,0x51,0x22,0x15,0x7f,0xab,0x2d,0x64,0xe6,0xde,0xb9,0x25,0x2b,0xa3,0xa7,0xbc,0x26,0xad,0x12,0x2c,0x36,0x12,0x7b,0x7d,0x5a,0x44,0x4e,0xe1,0x6b,0x26,0x8b,0x54,0xe8,0x8f,0x94,0x24,0x7e,0x3c,0xd9,0xe2,0x28,0x64,0x40,0xeb,0xaf,0xbf,0xe0,0xbc,0xd1,0xc2,0xfe,0xc3,0xc3,0x0f,0x0c,0x30,0x2d,0xf6,0xf2,0xc2,0x9a,0xe9 .byte 0xdc,0x2c,0x63,0x9d,0x1a,0xc2,0xfc,0x94,0xe7,0xfa,0x6e,0x9f,0x3c,0xd5,0x51,0x18,0x62,0x46,0xcc,0xab,0xbd,0x26,0xe6,0x85,0x9b,0x4d,0x5d,0xf5,0x16,0xe1,0x5e,0xf0,0x40,0x44,0x90,0xf6,0x98,0x06,0x68,0xdc,0x7c,0xcb,0x26,0x78,0xde,0xe9,0xbd,0xa1,0xfd,0xe9,0x43,0x8c,0xcf,0xe0,0x8b,0xf3,0xca,0x65,0x19,0xc1,0x93,0x18,0x13,0x5d .byte 0x0f,0xce,0x0b,0x2b,0x6f,0x68,0x38,0x82,0x79,0x68,0x82,0x0a,0x24,0x40,0x77,0xa5,0xcd,0x98,0x36,0xf5,0x0d,0x03,0xd1,0x0f,0xed,0xaa,0x24,0xe1,0xe2,0x8f,0x5a,0xf0,0x3c,0xce,0xbd,0x65,0x4e,0x40,0xd3,0xcc,0x89,0xd3,0xa8,0x5f,0xbf,0xcc,0x77,0x75,0x61,0x1e,0x78,0x70,0x3d,0x41,0xdf,0xb8,0x13,0x0d,0x58,0x37,0x94,0x67,0x89,0xc3 .byte 0x52,0x19,0xb5,0x59,0x83,0xb4,0xf5,0x54,0x57,0x93,0x9a,0xc6,0x40,0x8c,0x85,0x7f,0xd2,0x42,0x6a,0xaf,0xb2,0xae,0xcf,0x57,0x99,0xbf,0x4d,0xa4,0xb0,0x1f,0x50,0x58,0x3a,0xc0,0xf1,0xdc,0x91,0x8c,0x67,0xc3,0x2a,0xce,0x46,0x4c,0x66,0x39,0xa9,0xd0,0xa7,0x5e,0xd8,0x0d,0x08,0x0f,0x9f,0xb0,0xd2,0x38,0x22,0xb5,0xdb,0xba,0x0f,0xcd .byte 0x1a,0x62,0x73,0xc4,0xb6,0x6b,0xc5,0x0b,0x54,0xe6,0x83,0xae,0xb5,0x5e,0x73,0x1e,0xb2,0x4a,0xe5,0x2c,0xa6,0x6b,0x1b,0xe7,0x63,0xa3,0xa1,0xe9,0x7d,0xab,0xa9,0x87,0x6e,0xaa,0x43,0x55,0x6f,0x95,0xee,0x81,0xa0,0x45,0x1a,0x56,0xce,0x70,0xe6,0x1f,0x7f,0xd8,0x18,0x52,0x25,0x3b,0x58,0x65,0xbe,0xbf,0x90,0x35,0xee,0x76,0x8b,0x7c .byte 0x1f,0x2f,0x9e,0x35,0xcf,0xc7,0x29,0xea,0x62,0x66,0x0b,0xe1,0xd0,0xcc,0x29,0xc6,0x6e,0xd4,0xbd,0x46,0x4b,0x02,0x96,0xd3,0x30,0xc3,0x71,0x60,0x73,0x06,0x3a,0x25,0x71,0x9b,0x63,0x82,0x3f,0xac,0xd4,0xdb,0x69,0xbc,0x7c,0x39,0xb7,0x71,0x98,0xa1,0x68,0x7c,0x0c,0x13,0xf7,0xef,0x5b,0xba,0xd9,0x45,0x3a,0x5e,0xa2,0x65,0x1a,0xbf .byte 0x6e,0x5a,0xa3,0x2f,0x7c,0xf8,0xe4,0x43,0x3f,0xa3,0x53,0x26,0x05,0x2a,0x63,0x21,0x71,0x4f,0x40,0x9e,0xc9,0xd1,0xb1,0x9a,0x0b,0xf2,0x04,0xed,0xc8,0xb8,0x93,0x0f,0xa9,0xad,0x3f,0x30,0x39,0xc8,0x94,0xa3,0x9b,0x77,0x35,0x18,0xb3,0x82,0x1b,0xe5,0xab,0x86,0x9c,0x99,0xaf,0x52,0x6f,0x7a,0xf5,0x3b,0x8e,0x83,0x4a,0x8c,0xfc,0xa0 .byte 0x72,0x10,0x1d,0xb4,0xd3,0xdb,0x38,0x82,0x11,0x5f,0x22,0xc1,0x9d,0x63,0xf2,0x50,0xc9,0x6d,0x1f,0xc4,0x57,0x52,0x53,0x79,0xb2,0x24,0x7b,0x38,0x43,0x26,0xe0,0xdc,0xeb,0x6a,0x5b,0xd2,0xff,0xfc,0xb5,0xd9,0x69,0xf2,0x80,0xaf,0x71,0x33,0xdf,0x33,0x35,0xb0,0xef,0x5f,0xdc,0x37,0xb6,0x36,0xe9,0xae,0x03,0xbc,0x4d,0xa8,0x40,0xc1 .byte 0x7d,0x2c,0xf0,0xf4,0x3b,0x53,0x90,0xf7,0xcb,0xa1,0xd2,0x21,0x8f,0xff,0xfc,0x0c,0x61,0x85,0x53,0x04,0x30,0x0b,0x8c,0xf5,0x6b,0x60,0x73,0xff,0x88,0x29,0x5b,0xfc,0xeb,0xec,0x81,0x10,0xf0,0x56,0x00,0xd8,0x86,0xf0,0xbe,0xbd,0x50,0xf5,0xc9,0x27,0xa4,0x18,0x4c,0xd6,0x3a,0xe6,0x12,0x21,0x8c,0xe9,0x5e,0xba,0x30,0x03,0x4d,0x9e .byte 0x16,0x60,0x77,0x9c,0x3f,0xa6,0xd5,0x0c,0x82,0x39,0xaf,0xfa,0x7e,0xcf,0x50,0xcb,0x87,0xe2,0x35,0xaf,0x24,0x96,0x2c,0x02,0x70,0xb9,0x21,0x00,0x2f,0xdb,0x3f,0xfd,0xe8,0xa5,0x40,0x87,0xfe,0xfc,0x7b,0x05,0xcf,0xa8,0xae,0x0d,0x71,0x22,0xd1,0xdc,0x7e,0x4f,0x2d,0xd3,0x0f,0x5d,0x0f,0xff,0xdf,0x4f,0xea,0x88,0x4c,0xe7,0x84,0xb6 .byte 0x7d,0xb0,0x74,0x37,0xdb,0x75,0xfa,0x95,0xe7,0xee,0x58,0xb5,0xd4,0x1d,0xe7,0xcc,0x1f,0x3a,0xd0,0x59,0xb8,0x93,0xbf,0xe6,0x33,0x59,0x7b,0x96,0x80,0x77,0x06,0xf3,0xf7,0xab,0x91,0xcd,0x0a,0x4c,0x48,0xc0,0x35,0x07,0x3d,0x9a,0x32,0x90,0x50,0xde,0x22,0x1c,0x40,0x7b,0x19,0x7d,0x98,0x50,0x8a,0x0d,0x19,0xd1,0x97,0xcc,0x42,0xbf .byte 0xb3,0x81,0x09,0x4f,0x14,0x8d,0xb2,0xfd,0x7d,0xee,0x76,0x97,0xb9,0x99,0x2c,0xbd,0x94,0xd2,0x29,0x6d,0x3c,0x91,0x29,0x64,0x2f,0x6c,0xdb,0x4e,0x26,0x55,0xef,0x55,0x6b,0xb6,0x34,0xf4,0xeb,0x13,0x96,0x5f,0xac,0xcf,0x31,0x72,0x6b,0x9f,0x06,0xb0,0x80,0xc4,0x56,0x33,0x75,0x57,0xdd,0x8e,0x07,0x82,0xe5,0x13,0x20,0xef,0xee,0x4d .byte 0x8d,0x8b,0xc7,0x73,0x1d,0x7f,0x49,0xdf,0xa4,0x29,0xcf,0xe7,0x9f,0x40,0x8a,0x05,0xba,0x73,0x16,0xdc,0xe9,0x6f,0xdd,0xae,0x79,0xd9,0x44,0x59,0x26,0xd3,0x7c,0xa2,0xcd,0x57,0xc9,0x9d,0x90,0x38,0x73,0x65,0x82,0xc6,0x18,0x77,0xba,0xe2,0xbc,0xea,0x25,0x43,0xc5,0xf6,0xad,0x6c,0x95,0x4c,0x86,0x3f,0x50,0x56,0x28,0x79,0x3e,0x68 .byte 0xf9,0xc3,0xb8,0x52,0x65,0x35,0x6c,0xd8,0x8e,0x06,0xaa,0xec,0x80,0x46,0xdb,0xa8,0xcd,0xbc,0x5b,0xe2,0x30,0x3a,0x3b,0xcb,0x2a,0xec,0xbc,0xe7,0x09,0x84,0xf7,0x9f,0x31,0xbc,0xef,0xdc,0xa9,0xb8,0x87,0x9d,0x4f,0xe1,0xd2,0x1b,0x9f,0x3f,0xd8,0xdc,0x2c,0xc7,0x73,0x08,0x2c,0xaa,0xbe,0x06,0x78,0x8f,0xb1,0x64,0x1b,0x3d,0xb5,0xad .byte 0x62,0x60,0x7f,0xc4,0x64,0x43,0x18,0xd4,0x8d,0x27,0xb3,0x32,0xae,0x28,0x47,0xdd,0x5d,0xdf,0x08,0x0b,0x0e,0xfb,0xba,0x92,0x55,0x33,0x92,0x02,0xf6,0xc2,0x2e,0xd2,0x70,0xaa,0xfb,0x88,0x9c,0x5e,0x9b,0x26,0x32,0x98,0xf8,0xe6,0x98,0x5c,0xf9,0xd7,0x3f,0xb9,0x74,0x5b,0x10,0x51,0x01,0x6e,0x44,0x71,0x91,0x3e,0x2d,0x06,0x68,0x97 .byte 0xe8,0xe3,0xf5,0xdd,0x46,0xc1,0x10,0x61,0xa9,0xa9,0x96,0x27,0x2a,0x25,0x7b,0x16,0x4a,0xbc,0x61,0x4b,0x32,0x6c,0x44,0x94,0x10,0x04,0x8e,0x0f,0xe6,0x8e,0x15,0xbc,0xb6,0x1b,0x66,0x19,0xff,0x2e,0x70,0x80,0xb2,0x9a,0x51,0x82,0x1a,0xc9,0x98,0x6b,0x7e,0x4f,0x4c,0xf9,0x93,0x2a,0x8e,0xb4,0x44,0x3b,0x75,0xc9,0x28,0xd1,0x63,0xd9 .byte 0x13,0xc8,0x68,0x60,0xad,0x4a,0xbe,0x03,0x1f,0xe2,0xe3,0xe5,0x99,0x11,0x4f,0xc6,0xbe,0x32,0xfa,0xb8,0xde,0x69,0x28,0x4b,0x11,0x4e,0xdd,0x0e,0x45,0x6e,0x43,0xe1,0xe6,0x7c,0x8f,0x8c,0xee,0x57,0xef,0x29,0xb4,0xb9,0x3c,0x9e,0x3a,0xc7,0xe0,0x98,0xce,0x29,0x44,0x1c,0x72,0x68,0x33,0x04,0xd4,0x9a,0x42,0xe1,0x77,0xa0,0x5b,0x1f .byte 0x11,0x5d,0x82,0x8c,0xb6,0xb1,0x3b,0xce,0x4e,0xa9,0xaa,0x05,0xf2,0x67,0x6c,0x0c,0xa3,0x08,0x9a,0xe0,0x14,0x92,0x82,0x51,0x98,0x7f,0x01,0x0a,0x77,0x35,0xa9,0xc0,0xbe,0x0a,0xde,0x13,0xf0,0x89,0xc9,0x54,0x9c,0x1e,0xc7,0x57,0xad,0x6b,0x36,0x8e,0x91,0x95,0x70,0x78,0x43,0x64,0x0e,0x0b,0x5c,0x97,0xc7,0xc5,0xc0,0xb6,0x4e,0x80 .byte 0x6e,0x20,0xa6,0xe7,0xfb,0xd1,0xc1,0x57,0x86,0x81,0xd8,0x8f,0x59,0x8c,0xd4,0xa8,0x8b,0x8c,0x2b,0x50,0x6a,0x90,0xdf,0xef,0x14,0x53,0x18,0x2f,0xbc,0x39,0xf8,0x1f,0xa6,0xc3,0x23,0x0f,0x0f,0xcf,0x75,0x7a,0xad,0x12,0xfd,0x22,0x24,0x56,0x51,0xb5,0x94,0x90,0x08,0xb2,0x1c,0x01,0x09,0xa4,0xe3,0xa0,0x65,0x3a,0xda,0xd7,0xe5,0xf2 .byte 0x78,0x4f,0xe6,0x55,0x37,0xc4,0x9c,0x9e,0xb0,0xb8,0xbe,0x89,0x61,0x7e,0x46,0xf3,0x51,0xdd,0x2c,0x87,0x48,0x0f,0x04,0xe7,0x96,0x3a,0xcb,0x4d,0x8b,0x9d,0xa0,0xfb,0x6c,0xe8,0xa4,0xc2,0x92,0x4c,0x97,0x05,0xd3,0x23,0x3f,0x07,0x3c,0xba,0x64,0xa8,0xdb,0x09,0x81,0x7d,0xea,0x66,0x1a,0x8e,0x7c,0x35,0x28,0xce,0xe3,0xce,0xbf,0x7c .byte 0x02,0x4f,0x39,0xac,0x38,0xd8,0x34,0x71,0xe4,0xfa,0x26,0x6e,0xf1,0xd9,0x53,0xd6,0x50,0xce,0x21,0xeb,0x4c,0x98,0x97,0xeb,0x21,0x29,0x4f,0xd8,0x49,0x34,0xd1,0xc9,0x32,0x7c,0x82,0x53,0xc2,0xec,0x41,0x5d,0x42,0x39,0x11,0x17,0x41,0x54,0x3d,0x60,0x8b,0xb4,0x42,0x99,0x68,0x16,0xbd,0x50,0xb2,0x4a,0xba,0xca,0x42,0x59,0xb0,0x7e .byte 0x88,0xab,0x18,0x6b,0x1d,0xe4,0x68,0x2e,0xeb,0x95,0xb5,0xc6,0x3b,0x64,0x38,0xbd,0x15,0x61,0xac,0x1a,0x79,0xd0,0x73,0xde,0x31,0xfc,0xd8,0x43,0x54,0xca,0x97,0xdb,0xa7,0x16,0xf8,0x34,0xa6,0x86,0xce,0x3f,0x82,0xbc,0x92,0xf9,0x82,0x8e,0xef,0xc5,0x6b,0xa4,0xa0,0x83,0x7f,0xe9,0xf5,0x1f,0xdd,0x24,0xdc,0x88,0x08,0xf2,0x93,0x36 .byte 0x4a,0x9c,0xaa,0x8a,0x51,0xf7,0x10,0x03,0x35,0x9e,0x44,0x29,0x15,0x94,0x46,0x71,0xc7,0x2a,0x8a,0x14,0x48,0xde,0x11,0x67,0xb1,0x8b,0xb4,0x5a,0x0a,0x76,0xc7,0xd8,0x1c,0x17,0xee,0x78,0x12,0xcc,0x93,0x0f,0xab,0x17,0x9f,0xb0,0x90,0x31,0x46,0x76,0x10,0xb3,0x37,0x26,0xe8,0x60,0x21,0x9a,0xd6,0x63,0x41,0xbe,0x8c,0x51,0x96,0xb0 .byte 0x0d,0x44,0x99,0x32,0xef,0x54,0xf7,0xf4,0xb2,0x65,0x3e,0x2c,0x39,0x72,0x06,0xd7,0x57,0x0b,0x61,0x12,0xe2,0x90,0xbf,0x45,0xe2,0xd6,0xd3,0x27,0x9f,0xbe,0x3f,0x83,0x58,0x6a,0xe7,0x03,0x3f,0xeb,0x82,0x9f,0xad,0xe3,0x12,0x9c,0x0b,0x65,0x32,0x28,0xee,0x93,0xf9,0x1a,0xd2,0xda,0xd0,0x41,0xad,0xb4,0x9d,0x37,0xc7,0xd5,0x44,0x9a .byte 0x48,0x42,0x29,0x89,0x21,0xa5,0x2e,0xf9,0x92,0x55,0xa2,0x64,0xdf,0x63,0x23,0x7b,0x03,0xce,0xb7,0x4e,0x4d,0x84,0x83,0xf2,0x07,0x3e,0xf4,0x51,0x5c,0xb5,0xce,0x49,0xf4,0xff,0x66,0x1d,0xcc,0x3a,0x45,0x36,0x7a,0xae,0x00,0xfa,0x56,0x84,0x3c,0x3f,0x51,0xb0,0x16,0x79,0x0d,0xa5,0x02,0x25,0x3c,0xcd,0x22,0x2e,0x4c,0xde,0x5c,0xf0 .byte 0xf3,0x44,0x4f,0xb3,0xbc,0x42,0x19,0x2f,0x9c,0xbd,0xd9,0x3f,0xa4,0xfe,0x21,0xab,0x82,0x97,0x76,0x16,0xed,0x20,0xa4,0x93,0x4b,0x21,0x70,0xed,0xc1,0x10,0x7a,0x27,0x1b,0xfc,0x99,0x52,0xa0,0x75,0xc6,0xb2,0x1d,0x97,0x83,0x73,0xe7,0x0b,0xa9,0x03,0xd5,0xba,0x51,0xb9,0x4f,0xa6,0x61,0xfc,0x45,0xff,0xe3,0x82,0xd6,0xab,0xc5,0x36 .byte 0x1c,0x63,0xcb,0x09,0x14,0xee,0x5a,0x5a,0xe8,0x20,0xa2,0xde,0x4b,0x1a,0x8a,0xcf,0xb4,0xd8,0x6f,0x5c,0x98,0x21,0x66,0xfb,0x5d,0x8a,0xc1,0xbe,0xdd,0x69,0x9e,0x1e,0xeb,0xa0,0x81,0xea,0x8b,0x2a,0xb6,0x80,0xff,0xb9,0x32,0x0a,0xfc,0xb6,0xb7,0xd8,0xa2,0x5d,0xbf,0xc3,0xe1,0x73,0xba,0x4b,0xbc,0xaa,0x31,0x7e,0xc9,0xe7,0xd0,0x9e .byte 0xde,0xdc,0xb5,0xfa,0x9d,0x9d,0x8c,0xed,0xe6,0x44,0x3a,0x81,0x37,0xd7,0x2c,0xee,0x3f,0xe4,0xed,0xc5,0x43,0xcc,0x2e,0x02,0xdd,0xfc,0xae,0xd1,0x2d,0xb3,0x75,0xdd,0x7c,0x85,0xfa,0x2d,0x8a,0xec,0x05,0xd3,0x45,0x8b,0x3a,0x6d,0x78,0x36,0x04,0x71,0xe2,0x10,0xb8,0x13,0xb2,0xbd,0xc6,0x0e,0xb7,0xda,0xfa,0xf8,0x47,0x9b,0x7d,0x14 .byte 0xe2,0xaa,0x82,0xfc,0x23,0xd2,0xef,0xff,0xaa,0x94,0x67,0x82,0xf6,0x31,0xfa,0x5e,0xbd,0xd1,0x78,0xee,0x07,0xb2,0xcd,0x0f,0x73,0x36,0xeb,0xb3,0x7c,0x6e,0x66,0x73,0x85,0x5a,0x23,0x26,0x2d,0x5b,0xb0,0x6c,0x04,0x1f,0x70,0x0a,0x67,0xff,0x02,0x77,0x66,0x51,0xbf,0x0b,0xe2,0x90,0x96,0x79,0xe2,0xac,0x21,0xa4,0x58,0x51,0x7c,0xb2 .byte 0x03,0xb1,0x64,0xb1,0x51,0x95,0xad,0x3e,0x4b,0x76,0xf1,0xb0,0x87,0x02,0x82,0x4b,0x18,0xb3,0x87,0xc1,0xc1,0x49,0xf3,0xd2,0x71,0x69,0x0a,0xef,0x5b,0x8d,0x89,0x80,0x98,0x9a,0xee,0xc5,0xab,0x9b,0x04,0x9b,0x1a,0x51,0x53,0xc6,0xaa,0x3f,0x84,0xe8,0x60,0xf4,0x15,0xff,0xb4,0xc8,0x1b,0xe1,0x8d,0x3f,0xe9,0x6c,0x79,0x74,0xc3,0xef .byte 0x1a,0xb8,0xdd,0xb5,0x92,0xba,0xf9,0x29,0xa1,0x0c,0x0d,0x88,0x08,0xd8,0x8c,0xb9,0xad,0xdf,0x62,0x03,0x27,0x79,0x69,0xca,0x21,0x24,0x00,0x3f,0x9e,0xcd,0xc6,0x8f,0x66,0xee,0x0d,0x6f,0x29,0xa5,0xf7,0x51,0x7c,0xa8,0xfd,0xa9,0xce,0x75,0xcd,0xdb,0xa6,0x86,0x43,0x16,0xc7,0xf0,0xea,0xfd,0xf8,0x08,0xd4,0x4e,0x7b,0x10,0xd2,0x5b .byte 0xcf,0x4f,0xf0,0x71,0x72,0xc4,0x31,0x90,0x93,0x09,0x69,0xfb,0xd6,0x1c,0x41,0x62,0x58,0x5c,0x60,0xbb,0x89,0x28,0xc1,0x57,0xa2,0x52,0x8d,0x48,0x98,0x0b,0xd8,0x7c,0xb1,0x7c,0x92,0x1c,0x2a,0xec,0x0a,0x61,0xa6,0x36,0x3b,0xf5,0x24,0xe4,0xb4,0xc3,0x09,0x99,0x89,0x8b,0x7a,0x9f,0x61,0x3c,0xc1,0x8b,0x1b,0xda,0xb2,0x44,0xab,0xbb .byte 0x8a,0xad,0xcb,0x17,0xe5,0x2e,0x74,0x23,0x39,0x76,0x10,0x0f,0xd5,0xa8,0x4f,0xc2,0x14,0xa5,0xb6,0x47,0x48,0xfb,0xb2,0x52,0x9e,0x0a,0xfc,0x0f,0x95,0x04,0xa8,0x71,0xa7,0xca,0xb7,0x01,0x67,0x39,0xd1,0xc7,0xf6,0x15,0xc4,0x8b,0xe8,0xa5,0xb9,0x5c,0x7e,0x83,0x26,0xd5,0x37,0x4c,0x44,0xff,0x0b,0xa3,0x53,0x3b,0x6c,0xb7,0xbb,0x10 .byte 0xbc,0x33,0xb8,0xd0,0x4c,0x00,0x3b,0x62,0x6b,0x43,0x4e,0x91,0x2f,0xa5,0x08,0x35,0x6f,0xc3,0x03,0xa1,0x10,0xbc,0xb1,0x31,0x8d,0x51,0x0f,0x2f,0x42,0xfb,0x45,0x55,0xac,0x1e,0x05,0x05,0xbc,0xc9,0xe8,0x23,0xd5,0xe8,0x68,0x32,0xa7,0x10,0xa0,0x7d,0x72,0x02,0xc1,0xcd,0x0a,0xdc,0x2f,0x4b,0xbc,0x34,0x94,0x25,0x9b,0xc8,0x25,0x4a .byte 0xc7,0x1a,0xc6,0x62,0xeb,0xa5,0x4b,0x8b,0x0e,0x2b,0x93,0x88,0xbf,0xa6,0xb9,0x73,0xae,0x7f,0xa5,0x6d,0xce,0xc3,0xf5,0x9a,0xcb,0xed,0x69,0xc7,0x34,0x39,0xcf,0xde,0x86,0xf3,0xa8,0x0e,0x5d,0xdc,0x76,0x0d,0x60,0x96,0x62,0x2e,0x61,0xe6,0x69,0xc6,0xd8,0xb9,0x86,0xda,0x4f,0xa0,0x78,0x03,0xa7,0x1a,0x52,0xb4,0x1b,0xb8,0x57,0xca .byte 0xed,0x92,0x6c,0xbc,0x3c,0x83,0xbd,0x8d,0xbd,0xe3,0xa9,0x08,0xe1,0x8a,0xab,0x30,0x39,0xc8,0x50,0xe8,0xda,0x6e,0xa6,0xc6,0xc4,0xe7,0x13,0x7d,0xa7,0x77,0xea,0x3b,0xe1,0xa3,0x4a,0x8e,0x48,0xf3,0x52,0xa7,0x82,0x40,0x76,0x99,0x3e,0x45,0x60,0x6e,0xf1,0x59,0xa5,0x22,0x7c,0x3d,0xac,0x72,0x00,0xbc,0xc6,0x37,0x62,0x58,0x63,0x63 .byte 0xd8,0xe9,0x47,0x2f,0x1c,0x89,0xaf,0xc9,0x3b,0x73,0xdf,0xbe,0x6c,0x96,0x1a,0x87,0x20,0xd7,0xf7,0x1b,0xce,0xa6,0x08,0x46,0x44,0x0a,0x1a,0xe4,0x87,0x6b,0x94,0x1a,0x35,0x70,0xec,0x2b,0xdd,0xf9,0xbb,0xd3,0xd3,0x2a,0x63,0xd3,0x07,0x7e,0xab,0x18,0xa8,0x2f,0x64,0x00,0x7e,0x08,0xaf,0x46,0x39,0x8b,0x29,0xf2,0x50,0xd3,0xa9,0xf1 .byte 0xf0,0xe0,0x38,0x32,0xe5,0x82,0x88,0x8d,0xa7,0x79,0x88,0x20,0x56,0x01,0xf5,0x6c,0x99,0xe6,0xbf,0x89,0xd7,0x1c,0xfa,0xfd,0xd1,0x86,0xfd,0x5d,0xdf,0x04,0x95,0xda,0xe6,0x99,0x64,0x80,0x68,0xda,0x36,0x97,0x65,0x81,0x1f,0xed,0xb4,0xba,0x21,0xb0,0x87,0x01,0x7c,0x96,0xe7,0x6f,0xea,0x36,0x20,0x65,0xa9,0x73,0x6c,0x03,0xa6,0x03 .byte 0x9c,0x82,0xbb,0xbf,0x3b,0x3d,0x9e,0x0d,0x31,0x1a,0x08,0x46,0x02,0xb5,0x43,0xe7,0xa1,0xfe,0xdb,0x35,0x13,0x6f,0x28,0x87,0x14,0x53,0x38,0xdf,0xda,0x88,0x0e,0xd1,0xac,0xe3,0xd4,0xea,0xd3,0x09,0xb8,0xc6,0x6f,0x9b,0x51,0x82,0xa8,0xc5,0x18,0x1d,0x8d,0x9c,0xc8,0xde,0x98,0x57,0xa8,0x3f,0xaf,0x8d,0x09,0xeb,0xab,0xa9,0x63,0x98 .byte 0x5a,0x6d,0x05,0x45,0xcc,0xb7,0x0c,0xb7,0xd0,0x59,0x11,0x25,0x51,0x63,0xba,0x61,0x4a,0x1a,0x86,0x68,0x3e,0xb1,0xfa,0xb9,0xab,0x9b,0x78,0xbe,0x8f,0xde,0x4e,0xf9,0x22,0x4b,0xaa,0x19,0x2c,0xad,0x17,0xa9,0xb2,0x9b,0x40,0x8c,0xeb,0xb6,0x42,0xbc,0x14,0xa8,0xa2,0xd2,0x21,0x6e,0x19,0xe8,0xd3,0x07,0x82,0x0a,0x22,0xd9,0xf3,0x09 .byte 0x29,0x68,0x34,0xb0,0xbb,0xad,0x25,0x17,0x3d,0x3b,0xf9,0x29,0xe3,0x8e,0x30,0x9d,0xb4,0xb8,0x51,0xa9,0x67,0x6f,0xe9,0xca,0x05,0xf0,0xd5,0xc2,0xd0,0x73,0x83,0x61,0x97,0x50,0x90,0x4c,0x6f,0x95,0xe6,0x62,0xcf,0xc0,0xe5,0x2c,0x42,0x45,0xd6,0xc9,0x01,0x74,0x19,0xaa,0x7a,0x53,0x9f,0xb6,0xab,0xa9,0xd3,0x19,0x80,0x10,0xd7,0xe2 .byte 0x68,0xaa,0x17,0x60,0x47,0x8b,0x64,0x1f,0x69,0x16,0x2b,0xd5,0x7d,0x04,0x1a,0x3c,0x25,0x68,0xb6,0x0b,0x85,0x1b,0x4b,0x8b,0x11,0xde,0x57,0x97,0x03,0xcb,0x91,0x03,0x65,0xc9,0x2d,0x0b,0x59,0xd0,0x8e,0x98,0x91,0x3a,0x00,0x83,0xd6,0x41,0xb1,0x3b,0x2c,0x34,0x84,0x57,0x0d,0xf0,0xc4,0x25,0xa6,0xf1,0xa6,0x41,0xdf,0x0e,0xad,0x06 .byte 0x03,0x13,0xcb,0x63,0x68,0xf7,0x07,0x1e,0xec,0xe1,0x36,0x4a,0x4d,0x50,0xc1,0x48,0xc5,0x95,0x22,0x10,0xf8,0xb7,0x45,0xc7,0xa4,0x35,0x40,0x8e,0x7c,0x9f,0x8b,0xa2,0x22,0x6b,0x2d,0xbb,0x52,0x33,0x13,0xfc,0x08,0x59,0x13,0xd0,0x3c,0x0e,0x2b,0x80,0xab,0x02,0xc3,0x92,0x3f,0x94,0x41,0x86,0x47,0xf8,0x27,0xa2,0xf8,0x0b,0xf2,0x45 .byte 0x33,0x23,0xfa,0xd0,0xf0,0xa1,0x74,0x02,0x60,0x4f,0x1b,0xdd,0xba,0x2d,0xbe,0xd6,0xf3,0x6b,0xbe,0x4d,0x6b,0x66,0xe2,0x4c,0x4e,0x03,0xc2,0xd9,0xe4,0x52,0xbd,0x4d,0xdd,0x0d,0x46,0x9c,0x97,0x68,0xdc,0xd6,0xfb,0xfe,0x19,0xdd,0x69,0xd1,0x6e,0xbb,0x8b,0x58,0x5c,0x5c,0x2c,0x4d,0x5c,0x63,0x6e,0x01,0x60,0xf3,0x9b,0xb1,0x63,0x70 .byte 0x3e,0x55,0xeb,0xc0,0x5f,0x12,0x1f,0x06,0x6d,0xbb,0xed,0x53,0x5c,0x25,0x4f,0x5b,0x1d,0x84,0xb7,0xab,0xaa,0x11,0x75,0xc7,0xb0,0x66,0xd9,0x32,0xec,0xb4,0xe3,0x3d,0x8d,0x9f,0x44,0xa1,0x03,0xbc,0xf2,0x9d,0x62,0x7d,0xbd,0x80,0x0d,0xa1,0xfa,0xe8,0xd0,0x91,0xe2,0xd5,0x20,0xe1,0xb8,0xdb,0xd8,0xa8,0x15,0x47,0x09,0x00,0x7e,0x29 .byte 0xf2,0x5c,0x93,0x04,0x79,0x81,0x7e,0x22,0xd0,0x86,0x1c,0xf3,0x42,0x11,0xff,0xdc,0x9a,0x35,0x4c,0x9f,0xa4,0x7f,0xf3,0x0a,0xe8,0x63,0xb9,0x79,0x59,0xcc,0x8d,0xfd,0x27,0xbb,0x2d,0x1b,0x72,0xd6,0xac,0x5f,0x6e,0x13,0xbc,0xc3,0xff,0x84,0xf5,0x58,0x00,0x8a,0x71,0xdb,0x69,0xf4,0xd4,0xc8,0xbc,0x12,0x84,0xf7,0x07,0x4d,0x5b,0xd0 .byte 0x7d,0x6c,0xec,0x01,0xe6,0x39,0x07,0x15,0x1c,0xca,0x49,0x62,0xe2,0xe9,0xf7,0xd2,0x81,0xd8,0x13,0x9f,0xaf,0xb3,0x1f,0xf5,0xf1,0x8d,0x61,0xa1,0x02,0x03,0x21,0xce,0x07,0xe2,0xd5,0xec,0x8d,0xfc,0xd4,0x51,0xd6,0x7a,0xc5,0x50,0x38,0x9d,0x91,0x0e,0xfe,0x97,0x63,0x19,0xb8,0x43,0x75,0xd2,0xfb,0xde,0xbd,0x84,0x1d,0xb7,0xdf,0xab .byte 0xa9,0x86,0x69,0x2d,0x11,0x18,0xec,0x00,0x88,0xf0,0x86,0xa2,0xd5,0x07,0x9d,0x60,0x52,0x39,0x6d,0xae,0x30,0x5d,0x01,0xa2,0xd8,0xc9,0xc3,0xf8,0xc7,0xbe,0x04,0xe1,0x80,0x4e,0x7a,0xaa,0x3d,0xd2,0xb3,0x2f,0x91,0x9a,0xa8,0xbf,0xef,0x6d,0x61,0xf6,0x33,0x3e,0xf4,0xe6,0x0e,0x82,0x88,0x6f,0xef,0x55,0x97,0xf2,0xda,0x52,0xf1,0x3b .byte 0x46,0x5d,0x23,0xe5,0x7e,0x7c,0x8b,0x51,0x56,0x96,0xf4,0x77,0xc5,0xa0,0x3c,0x14,0x3d,0xc2,0x3a,0xc1,0xaf,0xfe,0x6d,0xec,0x80,0x79,0xba,0x19,0x5f,0x26,0x8c,0x7d,0xb6,0xd2,0x27,0xf0,0xcf,0xa4,0x04,0x31,0x7d,0x8c,0xf5,0xa0,0xcc,0x04,0xd5,0x6e,0x4f,0xe0,0x35,0x0f,0x20,0xec,0x53,0xad,0x02,0xb8,0xdb,0x4c,0x4e,0xda,0x73,0x5a .byte 0xc5,0x46,0xe5,0x10,0xbd,0xa2,0xb5,0xbf,0x71,0xc1,0x3a,0x83,0x58,0x6c,0x74,0x32,0xed,0xd3,0xcc,0xa5,0x6d,0x65,0x5b,0x5c,0xfe,0xcd,0x68,0x02,0xad,0xcf,0x54,0x4c,0x1d,0xad,0xdf,0xeb,0xa0,0xda,0xb0,0x12,0x5c,0xba,0x7b,0xa2,0x5d,0x5e,0xf3,0x6f,0x42,0x2d,0x83,0xf3,0x28,0xaa,0xcf,0x6c,0x85,0x6a,0x6b,0x80,0xc0,0x28,0x2e,0x1b .byte 0x68,0xfa,0xe7,0xdc,0x1e,0x97,0x8d,0xca,0x1b,0xed,0xca,0xde,0x8f,0x52,0x73,0x54,0x57,0xaf,0xf0,0xb8,0x91,0x08,0xec,0x01,0x42,0x97,0x26,0x27,0xdd,0xfc,0x53,0x81,0x4c,0xbe,0x95,0xb5,0x67,0x51,0x35,0xb2,0xa5,0x8f,0x62,0x10,0x7a,0x1a,0x0e,0xcc,0xf1,0x9c,0xc4,0xa3,0xff,0xda,0xe4,0x23,0x12,0xf9,0x73,0x6f,0xeb,0xb1,0x82,0x00 .byte 0x5f,0x35,0xaf,0x2e,0x6e,0x88,0x31,0xc0,0xb9,0x1a,0xce,0x27,0x5f,0xbc,0xcf,0x6d,0x03,0x12,0xfb,0xe9,0xae,0x3e,0xff,0x1c,0xa5,0x28,0x9d,0x19,0xd3,0xfe,0xca,0xd0,0x3c,0x04,0xd1,0x64,0xea,0xdd,0x2d,0x4a,0x0f,0x23,0xcc,0xd4,0xe5,0xf9,0xad,0x95,0xe4,0x91,0xb0,0xaa,0xb7,0x1e,0x28,0x9f,0xac,0xbc,0x9f,0xa3,0x62,0xb0,0x37,0xaf .byte 0xdd,0xe6,0xcd,0x65,0xb4,0xea,0x31,0xbe,0xca,0x44,0x93,0x16,0x74,0x46,0x5a,0x3d,0x78,0x8d,0x9d,0x01,0x6b,0xf6,0xa7,0xf3,0xdd,0x1b,0x92,0xc1,0x74,0xf0,0xe4,0x32,0x90,0xc5,0x4d,0xdb,0x3e,0xab,0x0d,0x4c,0x1e,0x82,0x2f,0x82,0xe2,0xf7,0xe6,0x13,0xa8,0x8c,0xd6,0xaa,0x59,0xee,0x5c,0xc6,0x1c,0x67,0xd6,0x6f,0xf8,0x92,0xce,0xf0 .byte 0xfa,0xde,0x15,0xdb,0x86,0x79,0x6e,0xaf,0x03,0x10,0x91,0x3f,0x6b,0xc4,0x6a,0x23,0x2d,0x01,0x36,0xbf,0xb4,0xff,0x99,0x46,0x92,0x64,0x45,0xd5,0xb0,0x1d,0xaf,0x13,0xa0,0xe0,0xf4,0x21,0x5d,0x98,0x47,0x04,0xef,0x06,0x81,0xd1,0x7c,0xf1,0x1d,0x4d,0x6d,0x04,0x9f,0x3b,0xf7,0xf9,0x27,0x6c,0x91,0x15,0xf3,0xf0,0x48,0x63,0x9d,0x56 .byte 0xb1,0x8a,0xdb,0x27,0xf4,0x83,0x4e,0xfa,0x4b,0x15,0xc5,0x38,0xdf,0x4b,0xd5,0xcc,0xd4,0x15,0x21,0xc0,0xd8,0xbe,0xda,0x9e,0xe6,0x35,0xa6,0x4e,0x76,0x27,0xc6,0x10,0x02,0xf4,0xa1,0x9d,0x71,0xe5,0x77,0xdc,0xcd,0xbd,0xda,0xdb,0x46,0xd7,0xc7,0xa0,0x71,0xd5,0x0e,0xfd,0x4e,0xe7,0xe0,0xb9,0x69,0x9b,0x31,0x12,0x16,0x04,0x71,0x0d .byte 0xac,0x6e,0xb7,0x66,0x1e,0xfd,0x9b,0x0d,0x57,0xd9,0x8f,0xd6,0x2e,0x13,0xb4,0x5b,0xd4,0x6e,0xa3,0xeb,0x7a,0x10,0x62,0x21,0xdc,0x0f,0x5c,0x29,0x37,0xd0,0x81,0x0e,0x14,0xc2,0xb6,0x2f,0x26,0x8b,0x1b,0x2d,0x72,0xb4,0x85,0x28,0xad,0x90,0x29,0x44,0x4e,0x1c,0x0e,0x1e,0x31,0xf8,0x54,0x8b,0x54,0x35,0x36,0x1c,0x3c,0xc9,0x1f,0x0e .byte 0xf8,0xee,0x35,0xec,0x04,0x65,0xf8,0x13,0xb3,0x5a,0x73,0xfc,0x12,0xd6,0x35,0x19,0x7a,0x20,0x91,0x86,0xef,0x26,0xae,0x8b,0x03,0x11,0xb1,0x3a,0xa0,0xfc,0xee,0x6d,0xf2,0xfc,0x46,0x34,0x60,0x16,0xeb,0x4a,0xdb,0xcc,0xfb,0xa5,0xf1,0xde,0x19,0x62,0x9a,0x07,0xee,0x88,0xfe,0xdc,0x2e,0xc6,0x96,0x72,0x83,0x62,0x60,0x75,0xb9,0x88 .byte 0x96,0x18,0xd9,0x03,0x80,0xd0,0x24,0x80,0x1d,0x04,0x2d,0xee,0x63,0x96,0xd6,0xfc,0xc7,0x01,0x71,0xb1,0xfc,0x8b,0xc4,0x88,0xcf,0x01,0x25,0xa7,0x51,0xbc,0xe6,0xaa,0x48,0x77,0xbb,0x70,0xe6,0x8d,0xfe,0x83,0x33,0xae,0x29,0xd9,0x1d,0x44,0xff,0x18,0xcf,0x91,0xe8,0x0d,0xdc,0x8b,0xdd,0x6b,0xec,0x35,0x16,0xfc,0xe1,0x0b,0xb2,0x70 .byte 0xad,0x4a,0xa4,0x2c,0x23,0xa7,0xb8,0x64,0x2f,0x4a,0x7d,0x13,0xf6,0xa6,0x57,0x26,0x4d,0x08,0x6c,0x39,0x72,0xbe,0xdb,0x59,0xa8,0xe1,0x60,0x00,0x03,0xa6,0x56,0xa3,0x89,0x56,0xf1,0xe9,0x81,0x31,0x32,0xfd,0xba,0xd6,0x5f,0x38,0x89,0x92,0x88,0xd6,0xf0,0xb5,0x3c,0x46,0xed,0xec,0x9d,0x5a,0x42,0xe0,0x9a,0x6e,0xed,0x98,0x6a,0xec .byte 0x97,0x22,0x5b,0x93,0xba,0xa5,0xc4,0x71,0x86,0x1f,0x32,0xa0,0x2a,0x50,0xb3,0x56,0x7e,0x62,0xb2,0xe1,0x84,0x5a,0xbd,0xdb,0x2f,0x38,0xd0,0x12,0x79,0x57,0xe8,0xf7,0x45,0xd9,0x71,0x4e,0x1a,0x0a,0x08,0xa0,0xc7,0xea,0x9d,0x74,0xc7,0xa6,0xaa,0x62,0x17,0xa2,0xba,0x23,0x26,0x41,0x1a,0xe4,0x02,0x98,0xd1,0xbb,0x32,0xa2,0xa1,0xcf .byte 0x55,0x3c,0x2d,0xef,0xa6,0x69,0x4f,0xed,0x15,0x43,0x34,0xfa,0x40,0x8c,0xa2,0x0c,0xcf,0x2c,0xda,0x4d,0x08,0x34,0x3e,0xae,0x98,0xbd,0x2c,0x75,0x40,0x77,0xd7,0x7e,0x6e,0x09,0x64,0x39,0x0a,0x84,0x79,0x5e,0xe7,0x72,0x96,0x9d,0xc2,0x17,0x0a,0x3c,0x6d,0x76,0xf0,0x4b,0x75,0x12,0x45,0x19,0x55,0x84,0x06,0x6b,0x27,0x44,0xe5,0xf4 .byte 0x89,0xbc,0xd4,0x50,0x0e,0x89,0xfd,0x9f,0xd6,0x3b,0xfb,0xa5,0x88,0xef,0x1d,0xd2,0x58,0x2b,0xc7,0x6b,0x07,0xb8,0x6a,0x40,0xe9,0x29,0x5a,0x9d,0x20,0xad,0xfd,0x9b,0x36,0x7e,0x8d,0x1f,0x81,0xd9,0x06,0x03,0x47,0x70,0x3f,0x7d,0x89,0x03,0x57,0xa7,0x46,0xc4,0x4b,0x9a,0xc8,0x57,0x35,0x02,0x2d,0xe0,0x89,0x0a,0xd1,0x67,0xe1,0x7a .byte 0xe2,0x2f,0xcd,0xe3,0x2e,0xbc,0x2a,0xf5,0x1a,0xb1,0x6c,0xc3,0x89,0x5c,0xda,0x63,0xc4,0xc6,0x8e,0xca,0x97,0xf4,0x5d,0x02,0xfc,0x37,0x46,0x72,0x07,0xca,0x3a,0x4a,0xa2,0xc4,0x90,0x14,0x0c,0x3c,0x9c,0x6d,0xb2,0x33,0xe8,0x94,0xfd,0x5e,0xb5,0x53,0x19,0xa5,0xfa,0x2a,0x99,0x26,0x8b,0x34,0x7e,0x8b,0xe3,0xc6,0x50,0x6c,0x3c,0x3f .byte 0xda,0xe0,0xa4,0x50,0x34,0xa0,0x6a,0xdc,0x06,0xac,0xee,0x77,0x9a,0xa0,0xc1,0x8b,0x4f,0x82,0x71,0x1b,0x5e,0x3d,0xef,0xcd,0xcf,0x19,0x44,0x01,0x80,0x65,0x1a,0x1c,0xbd,0x5f,0x50,0x4a,0x6c,0xa2,0x7f,0x82,0x74,0xa6,0x59,0x39,0x46,0xc1,0x87,0x5b,0xcb,0x70,0x21,0x5e,0xcf,0x1e,0x61,0x73,0x01,0xe6,0x1b,0x0e,0x94,0xf9,0x16,0x91 .byte 0x1b,0x42,0x99,0xee,0x62,0x62,0xc3,0x02,0xbb,0xaf,0x5f,0xcc,0x98,0x09,0xd5,0xd7,0xdf,0xb8,0xed,0xb9,0xb3,0xde,0x4a,0xfc,0x22,0x8b,0x47,0xc2,0x60,0x31,0x89,0x4f,0x6a,0xbb,0x88,0xc4,0x02,0x25,0x65,0x7b,0x7c,0x2b,0x47,0xf5,0x83,0x99,0x0e,0x0a,0xf5,0x49,0x8c,0x32,0xd5,0x04,0x05,0x7f,0xe0,0x59,0xd5,0xb8,0x9a,0xf7,0xa0,0x3d .byte 0x67,0xed,0x1c,0xc1,0x62,0xb2,0x48,0x8a,0x64,0xa4,0x97,0x74,0x3b,0x9e,0xec,0x04,0xf9,0xa3,0x40,0x85,0xd4,0x39,0x37,0xe1,0x1a,0x64,0x6e,0x9d,0x2a,0xbb,0x6b,0xf5,0xb9,0x65,0xfd,0x1b,0x14,0x23,0x85,0xcc,0xfa,0x69,0x69,0xca,0x09,0xf1,0x64,0x11,0x3b,0x03,0x29,0x46,0x53,0x0b,0x06,0x29,0x29,0x86,0x03,0x40,0x5c,0xa8,0x5b,0xbe .byte 0xd5,0xa6,0x04,0x2d,0x05,0x91,0x88,0xb5,0x85,0x37,0x37,0x26,0xed,0xf5,0xdd,0x58,0x98,0x53,0xf9,0x26,0x08,0x80,0xae,0x37,0x65,0x42,0xe1,0x4a,0x7b,0x75,0xeb,0x73,0x14,0x27,0x13,0xee,0x40,0xe0,0x39,0x62,0x09,0xaa,0x0a,0xe9,0x22,0x4a,0x6b,0x23,0x10,0x9a,0x60,0xc0,0x24,0x71,0xb5,0xb6,0x92,0xe5,0x2e,0x64,0x0f,0xae,0x23,0x6f .byte 0x49,0x48,0x60,0x3b,0xe5,0xf7,0xdd,0xc2,0x01,0xb4,0xb0,0xf6,0xf9,0xfb,0x68,0x59,0x79,0x24,0xc3,0x4c,0x16,0xed,0x00,0xcc,0xa9,0x6f,0x83,0x43,0xf7,0x6c,0x1b,0x2e,0x9c,0x52,0xd3,0x0a,0x4a,0x10,0x5c,0xb8,0xbc,0xe9,0xe0,0xa0,0x69,0x1d,0x4c,0x5f,0x20,0xd8,0xba,0x16,0xc5,0x82,0xad,0x79,0x76,0x53,0x4c,0x4b,0x0e,0xb0,0x98,0xa6 .byte 0xdd,0xd7,0x8b,0x1b,0x2f,0x9a,0xa5,0x6d,0x5b,0x11,0x97,0x3b,0x90,0x61,0xde,0x44,0x9a,0xe4,0xda,0xc7,0x15,0x32,0xea,0x0e,0x5e,0xc2,0x3c,0x88,0xb1,0x78,0x67,0xdb,0xb4,0x1a,0x65,0xa1,0x14,0x7c,0xb7,0xe6,0x7c,0x34,0xf4,0xb1,0xa0,0x1a,0xdf,0x8e,0x50,0x1e,0x6f,0x64,0x84,0xdb,0x91,0x3d,0x9f,0x03,0xa3,0x62,0xa8,0x05,0x48,0x32 .byte 0xbd,0xee,0x64,0xde,0xd7,0xf4,0x65,0x30,0x48,0x6c,0x66,0x8f,0x31,0x93,0xc3,0x25,0xd4,0xe0,0x9e,0xd5,0x61,0xb7,0x6c,0xe5,0x8b,0x79,0x4b,0x5f,0x2b,0xa8,0x8f,0x17,0x31,0xef,0x1e,0x93,0x8f,0xcf,0x2b,0x49,0x01,0x6a,0x72,0xe8,0x83,0x95,0xc6,0x91,0xff,0x79,0x6f,0x50,0xeb,0xa5,0x69,0xe4,0x0e,0xcf,0x68,0x5d,0x19,0xc3,0xe4,0x73 .byte 0xf4,0x08,0x5b,0x0d,0xd4,0x27,0xa7,0xc0,0x06,0xd8,0xa5,0x5e,0x56,0x1a,0xdd,0xf3,0x5e,0xd5,0x83,0x54,0x86,0xb4,0xbc,0x6c,0xc4,0xf4,0x34,0x6a,0x85,0xd9,0x29,0x67,0x90,0xaa,0xb4,0xaa,0x85,0xaf,0x04,0x90,0x3c,0x33,0xb7,0x7c,0x77,0xeb,0xcc,0xab,0xc0,0x4b,0xe0,0xd4,0xb6,0x40,0x24,0x7c,0x85,0x7c,0xd8,0xf3,0xfc,0x32,0xad,0xbd .byte 0x43,0xcd,0x54,0xa9,0x94,0x51,0xba,0x0f,0x1e,0xbb,0x79,0xf5,0x31,0x29,0xf0,0x8e,0x20,0x62,0xd1,0x38,0x99,0x32,0x05,0x81,0x88,0x64,0x51,0x50,0x31,0xa4,0x38,0x55,0x31,0x86,0x77,0x0b,0x0f,0xcf,0x00,0xe4,0x50,0x9d,0x26,0x98,0xc1,0x3d,0x0c,0x7e,0xec,0x99,0xbe,0x18,0x38,0xf0,0xcd,0xc9,0x98,0x80,0x1c,0x56,0xb4,0xf9,0x15,0xb4 .byte 0xdd,0x74,0xb5,0x37,0xd2,0x2b,0x24,0xb1,0x18,0xfd,0x40,0x48,0xba,0xa3,0x1a,0xec,0x71,0x01,0xcf,0xd9,0xe2,0x1c,0x4d,0x1f,0xad,0x91,0x1e,0x6f,0x15,0x99,0xe6,0xd3,0x40,0x92,0xa9,0xfd,0xb5,0x6e,0xf6,0xfc,0x0a,0xff,0x07,0x19,0x2f,0xd7,0x5f,0x1b,0x62,0xb7,0x66,0x5c,0x51,0xff,0x36,0x5d,0x97,0x23,0x51,0xa5,0x29,0x2c,0xe5,0xce .byte 0x21,0xd4,0xa3,0xdc,0x31,0xaf,0xf0,0xfe,0xa0,0x71,0xc0,0xa3,0xeb,0xdc,0xd6,0x17,0x1d,0xa5,0xd0,0xc2,0xdd,0x21,0x9d,0x91,0x3f,0x9d,0xee,0xa2,0xe1,0x7e,0xfa,0x4c,0xe0,0x8b,0x13,0x3e,0x76,0x7e,0xc0,0x62,0xf5,0x6f,0x79,0x0e,0xda,0xc9,0xc6,0x74,0xd0,0xe1,0xae,0x03,0x51,0xe3,0x7b,0x46,0x65,0x7d,0x0e,0x7b,0xb4,0x18,0xf6,0x7e .byte 0x28,0x0a,0xbd,0xc5,0xfd,0xb6,0xff,0x20,0x88,0xdb,0xa0,0x65,0x87,0xa6,0x0b,0x3d,0xb5,0xa3,0x36,0x9c,0x26,0x50,0x8d,0xad,0x7f,0x19,0x78,0xd3,0x4f,0x34,0x2b,0xae,0x09,0xb1,0xf5,0x1b,0x6d,0xa0,0xed,0x83,0x90,0xc2,0x52,0xfe,0x72,0x46,0xf2,0xca,0xd8,0x42,0x39,0x76,0xce,0x99,0xcd,0x68,0x8f,0xc8,0x3b,0x25,0x54,0x1d,0x32,0x4a .byte 0xd5,0x93,0x01,0xbd,0x6d,0xa8,0xcc,0x66,0x49,0xc7,0x5d,0x8f,0xd3,0x85,0x08,0xcb,0xa8,0x70,0x2b,0xa9,0x8f,0xed,0xb9,0x9d,0xea,0xe5,0x75,0x9f,0x8f,0x1e,0x8f,0xff,0x4b,0x4f,0x00,0xd3,0x3a,0x2a,0xd4,0x68,0x15,0xae,0x6e,0xe5,0x5d,0x80,0x74,0x78,0x97,0x90,0x7b,0x1e,0x2a,0x9a,0x4b,0x53,0x07,0xe9,0x58,0x24,0x7f,0x42,0x9c,0xc8 .byte 0xfc,0x0f,0x51,0xb7,0xbc,0xde,0x1e,0xf0,0x43,0xb0,0x48,0x61,0xd3,0x7f,0x89,0x3f,0x65,0x44,0x14,0x86,0xfe,0x24,0x5f,0xcd,0xf4,0xda,0xac,0x8d,0xc5,0xdb,0xa5,0x3d,0x9c,0x5d,0xa8,0xee,0x75,0xc0,0x0b,0x3d,0x93,0x2e,0x6b,0xd6,0x71,0xf7,0x8a,0x48,0xcf,0xbd,0xd5,0x38,0xb5,0x0b,0x8b,0x44,0x3f,0x86,0x59,0x07,0x25,0x2e,0x75,0xe6 .byte 0x16,0xe7,0x78,0x5a,0x8a,0xfc,0x4f,0x48,0x27,0x30,0x2f,0x32,0x4a,0xf1,0xa6,0xe0,0x44,0x85,0xbc,0x50,0xbc,0x0e,0xab,0x1b,0xf7,0x64,0x1a,0xd2,0x25,0xe9,0xf7,0xaf,0x32,0x14,0x33,0xa7,0xbc,0xa5,0xd7,0xb0,0x3c,0xc8,0x42,0xdd,0x2d,0x91,0xde,0xed,0xdc,0x89,0x57,0x91,0xb1,0x9a,0x5b,0x7d,0x63,0xbb,0xcb,0x4b,0xe2,0x04,0xf2,0x32 .byte 0x1a,0xdf,0xaf,0x96,0xc9,0xbc,0x50,0x51,0x57,0xcd,0xac,0x9e,0xa5,0x21,0x99,0x81,0xaa,0x2a,0x93,0xbc,0x79,0x7d,0x52,0x0c,0x5c,0x73,0x41,0x48,0x47,0x4b,0x9f,0x71,0xfe,0x8b,0xef,0x65,0xa4,0x18,0x8b,0xe9,0x42,0x62,0x09,0x9d,0x1d,0x4f,0x01,0x51,0xc4,0xfd,0x44,0xb0,0xf4,0x02,0x16,0x9a,0xef,0xa2,0xa8,0xa8,0x15,0xca,0xcf,0x55 .byte 0x14,0x4a,0x7f,0x3a,0xc2,0x2d,0x46,0xcf,0xc7,0x5a,0xa1,0xeb,0x69,0x1a,0xbf,0xf7,0x54,0xa6,0x16,0xdf,0x4c,0xf2,0xf2,0xb0,0xa9,0xc2,0x2f,0xcd,0x64,0x50,0xac,0x4e,0x43,0x02,0xe1,0x4e,0xd4,0xdf,0x01,0x36,0xaa,0x2b,0xb2,0x05,0xcf,0x22,0xcc,0x3e,0x0a,0x7f,0x25,0x17,0xa3,0x12,0x72,0x94,0x51,0xe8,0x32,0x20,0x05,0x36,0xee,0x8f .byte 0x19,0xf2,0xd6,0xe3,0x78,0x4c,0xa9,0x57,0xc0,0xa6,0xea,0xef,0xc4,0x25,0x65,0xb8,0x92,0x17,0x99,0xa9,0xa3,0x8f,0x60,0xb9,0x5b,0x65,0x1e,0x1d,0x6e,0x6c,0x11,0x6f,0x9f,0x49,0x97,0x15,0x5c,0xbf,0x9b,0x7e,0x6b,0x4d,0xdb,0x0b,0xb6,0xb8,0xf6,0xe0,0xd8,0x05,0x67,0x78,0xfc,0x27,0xf3,0x0b,0xf7,0x98,0xc1,0x2d,0x46,0x46,0x15,0x22 .byte 0x66,0xff,0x9d,0x31,0x12,0x56,0xcb,0x5a,0xc1,0xed,0x2f,0x9f,0xc7,0xff,0xd6,0x46,0x64,0x70,0x7c,0xa7,0xd5,0x84,0xd5,0x8d,0x6a,0x02,0xc9,0x9d,0x76,0xb0,0x9c,0xe5,0xd2,0x66,0x07,0x1d,0x64,0xb5,0x21,0xb3,0x61,0x1d,0x3b,0x19,0x85,0xfa,0xe6,0xdb,0x81,0xa1,0x22,0xf2,0x23,0x7c,0x56,0x2a,0x4c,0x21,0xfd,0x3e,0x45,0x9e,0x86,0x9c .byte 0x12,0xec,0x8a,0x13,0xa2,0xe1,0xf2,0xd5,0xd4,0x1f,0x35,0xdc,0xd9,0x48,0x8a,0xd1,0xa6,0x78,0xf6,0x7b,0xc7,0x69,0x23,0xec,0x3e,0x10,0xd6,0x31,0xf6,0xdf,0xfb,0x06,0xa3,0x5d,0x21,0x4e,0xe8,0xe6,0xcc,0x7a,0x60,0x12,0x87,0x03,0x1d,0x28,0xd5,0x1a,0xaf,0x79,0x30,0xbe,0x8c,0xdd,0x8c,0x32,0x49,0x8d,0xfd,0x54,0xc6,0x50,0xf8,0x9a .byte 0x54,0xa6,0xc3,0x72,0x17,0x13,0x1c,0xe1,0x1a,0x93,0x57,0xc0,0x5a,0xd5,0x93,0x90,0x0e,0x74,0x82,0x2a,0xc4,0x8a,0x14,0xc1,0x77,0x23,0xf5,0xcd,0x62,0x86,0x86,0xf4,0x7c,0x0c,0xd7,0x82,0x21,0xe7,0x7e,0x49,0x4f,0x35,0xbc,0xdf,0xd7,0x28,0x2f,0xd7,0xd9,0x51,0x51,0x68,0xff,0x21,0x4f,0xea,0xd4,0x72,0x6b,0xc3,0xb2,0x5d,0xf1,0xa7 .byte 0xa4,0x4e,0xf2,0xa6,0xe0,0xe9,0xa2,0xd1,0xd6,0x42,0xdf,0x87,0x38,0x78,0xa5,0xb6,0xee,0x15,0xaf,0xd6,0x84,0x0d,0xba,0x3c,0xdb,0x5a,0x18,0x90,0xdf,0xee,0xb1,0xa2,0x19,0xfd,0xa9,0x7c,0xdc,0x62,0x79,0xf2,0xc5,0x75,0x7b,0xb8,0x6d,0xc8,0x97,0x38,0xc0,0xaf,0x2d,0xbb,0xa7,0xaf,0x2a,0x9e,0x87,0x08,0xce,0xa0,0xd3,0xfc,0xe2,0xc4 .byte 0xa5,0x77,0x4b,0xfe,0xbb,0x10,0x22,0x78,0x2c,0xb6,0x2c,0x57,0xef,0xb1,0xde,0x54,0xa0,0x08,0xc8,0xee,0xeb,0xd1,0x7c,0x58,0x62,0xd8,0xa4,0xa8,0xe6,0x99,0x9a,0xaa,0x97,0x66,0xac,0x6e,0xc4,0x24,0xfe,0x62,0xca,0xfb,0x61,0xac,0x7b,0x74,0x8b,0x30,0x80,0x8e,0x29,0xb3,0x5a,0xca,0x37,0x4b,0xfb,0xbc,0x99,0x7f,0x66,0xf6,0xa5,0xed .byte 0xe5,0xb6,0x4c,0x7b,0x99,0x58,0x9f,0x95,0x8e,0xbd,0xfc,0x84,0x66,0x03,0xe2,0x7d,0x45,0x1d,0xc2,0x8b,0xd5,0xd6,0x48,0x8f,0x8b,0x95,0x98,0xf4,0x5f,0xe1,0x3e,0x5b,0x62,0xf0,0x5c,0xaa,0x88,0xa6,0x57,0x01,0x98,0xaa,0xbb,0xf9,0x52,0x13,0x1f,0xa1,0xb9,0xaf,0xc9,0x55,0xb9,0xb5,0x78,0x8c,0xa9,0x20,0x96,0x97,0xf8,0xbb,0xed,0x5a .byte 0x13,0x4a,0xfc,0xe4,0x22,0x16,0x04,0xac,0x57,0xcb,0xcf,0xd1,0xf5,0xf1,0xc3,0xa3,0x85,0xb8,0x43,0xed,0x68,0x72,0xe4,0x55,0x50,0xe1,0x8d,0x49,0xcd,0xc7,0x60,0xc4,0x3d,0x06,0xe6,0x2c,0xd1,0xaa,0x31,0xaf,0x4a,0x39,0x5b,0x25,0xbf,0x14,0x9c,0xa5,0x0e,0x6e,0xb4,0xea,0xdf,0x46,0x7c,0x9c,0x24,0xa9,0xca,0x58,0x92,0x2e,0xf9,0xe2 .byte 0xc6,0x37,0x33,0x33,0xe0,0x1f,0xf3,0xf2,0x81,0x0c,0xef,0xae,0xa4,0x0e,0xff,0x8b,0xdd,0x06,0x09,0x3a,0x26,0x3f,0x18,0x8c,0x09,0x76,0x27,0x90,0x5f,0x4c,0xb4,0x74,0x8a,0x00,0xbf,0x7d,0x57,0x5d,0x4d,0x8b,0x6f,0x0f,0x4c,0x02,0x37,0x7d,0xb3,0x6a,0x1b,0xb5,0x15,0x3f,0xc3,0x57,0x10,0x0c,0xeb,0x34,0x9b,0xf2,0xa4,0x09,0x3f,0x60 .byte 0xcb,0xf9,0x23,0x79,0x7f,0x06,0xd4,0xb0,0xff,0x53,0xb6,0x4f,0x53,0xa2,0x59,0xe5,0x6a,0x56,0x72,0x51,0x8d,0xc9,0x67,0xb7,0xdc,0xbd,0xd9,0x8c,0xa3,0x59,0x12,0xef,0x4a,0x65,0x26,0x4a,0x64,0x60,0xfc,0x98,0x23,0x2d,0x89,0xf5,0x30,0x2d,0x2b,0x19,0x71,0xa7,0x21,0x6d,0x97,0xe7,0x37,0xcb,0x80,0x84,0x16,0xa1,0xdd,0x14,0xfb,0xc3 .byte 0xb6,0x03,0xa4,0x33,0x72,0xa5,0x3a,0x30,0xf8,0x1a,0x19,0x7f,0x7d,0xb1,0xce,0x66,0x17,0x0f,0x39,0x59,0xf9,0xa6,0xbe,0x13,0xe3,0xaf,0xe6,0x37,0x8d,0x0d,0x52,0xa1,0xc6,0x7f,0xe7,0xc0,0x0d,0x86,0x4e,0xfb,0x22,0x50,0x3e,0xdc,0x18,0xc9,0xb9,0x0d,0x1f,0x99,0xb9,0x44,0xb1,0x07,0xcc,0xa7,0x70,0x58,0x33,0x88,0xde,0x93,0x9a,0xbf .byte 0x7e,0x37,0x8b,0x97,0x6a,0xda,0x27,0xd8,0x67,0xb4,0xba,0xb8,0x49,0x93,0x68,0x59,0x77,0xc2,0x72,0x4a,0x5f,0xe6,0x94,0xf9,0x30,0xd5,0xdc,0x55,0x50,0x35,0x44,0x5e,0x46,0xfa,0x48,0xa9,0xa7,0xd4,0xd0,0x1d,0xbb,0xb2,0x53,0x3f,0x43,0xf7,0xf0,0xae,0x2c,0xc8,0x03,0xca,0x8a,0x5d,0x8e,0x98,0x85,0x3d,0x62,0x7a,0x7a,0xde,0x9b,0xb6 .byte 0xe1,0x3f,0x49,0xe1,0x81,0x54,0x66,0x10,0x20,0x92,0x52,0xbc,0xf9,0xba,0x85,0xa3,0xdb,0x32,0x57,0x89,0x8b,0xe1,0xd7,0x0b,0xe8,0xb3,0x5a,0x38,0x65,0x7f,0x47,0xd8,0x4b,0x2b,0xca,0x54,0x47,0xbf,0x0f,0x82,0xfb,0x88,0xcc,0x29,0xfb,0xe4,0xf5,0x7a,0x89,0x9d,0xca,0x23,0x2b,0xe9,0xd1,0xaa,0xe2,0x32,0xd9,0x5e,0xc7,0x89,0x59,0xe9 .byte 0xc1,0x58,0x0b,0xa7,0x0f,0x18,0x00,0xc1,0x75,0x73,0x09,0xb0,0xd4,0x17,0xe2,0x98,0xe5,0x52,0xf9,0x42,0xe3,0xbb,0xe1,0x38,0xb7,0x3a,0x0a,0x1b,0x40,0xf5,0x96,0x41,0x5a,0x2a,0x0d,0x06,0xf3,0xc7,0xa0,0xcd,0x5c,0xa1,0x86,0xb4,0x2b,0x90,0x73,0xda,0x96,0xef,0x81,0x4e,0xc4,0x33,0x20,0x5a,0x60,0xb4,0x49,0xe7,0x3b,0x0b,0x2e,0x8c .byte 0x1c,0x45,0xb1,0x02,0x19,0xb3,0x77,0x4e,0x7d,0x25,0x7c,0x5f,0x10,0x7b,0xe7,0x5d,0x66,0xe5,0xd0,0x7a,0x65,0xea,0x13,0xa9,0x55,0x10,0xe1,0xb6,0xeb,0x79,0x14,0x06,0xd2,0xb2,0x07,0x90,0x8b,0x9e,0xea,0x47,0xbb,0x47,0x82,0x03,0xd7,0x97,0xc5,0xfb,0x54,0x16,0xd1,0x68,0x54,0xbe,0x66,0x5c,0xfd,0xc5,0xfb,0xd8,0x05,0x0c,0x5c,0x78 .byte 0xa6,0x41,0xa1,0x64,0x33,0xd2,0x74,0xe6,0x44,0x35,0xb8,0xf4,0x68,0x57,0xe4,0x33,0x9b,0x1e,0xb9,0xd0,0x19,0x00,0x6e,0xda,0x76,0xa8,0x73,0xd8,0xca,0xab,0x6d,0x85,0x43,0xfb,0xc3,0xa2,0x38,0x6c,0xbd,0x66,0x00,0x59,0x30,0x2b,0x25,0xf5,0xd8,0xb5,0xb9,0x73,0xca,0x05,0x81,0x78,0x2a,0x37,0x0c,0x03,0xaa,0xd4,0x72,0x24,0x51,0x1a .byte 0x7e,0x56,0x36,0x76,0x4f,0x0c,0x08,0x20,0x45,0x82,0xc0,0x29,0xb5,0xa6,0xde,0x17,0xc4,0x99,0x90,0x4b,0xd8,0xd8,0x3e,0xaf,0x31,0x38,0xfc,0x92,0x5c,0x50,0x70,0x32,0x77,0xc0,0x90,0xaa,0x7a,0x9a,0xf3,0xb1,0x68,0xa8,0xd8,0xe1,0xc7,0x34,0x08,0x41,0x0a,0xef,0x08,0x81,0x16,0x0c,0x0c,0xc4,0x8e,0x21,0xa6,0xb5,0x29,0x8e,0xf6,0x5a .byte 0x49,0x6e,0xf7,0x2e,0x29,0xdf,0xe7,0xab,0x90,0xea,0x97,0x50,0x97,0x6b,0xc1,0x78,0x72,0x0d,0x39,0x31,0x7a,0xca,0x7c,0xc8,0x74,0x69,0x9d,0x7b,0x49,0x33,0x6b,0xae,0x24,0x50,0x72,0xa5,0x8b,0xbb,0x2b,0xdb,0x06,0x15,0x69,0xb0,0x78,0x98,0xe6,0x10,0x78,0x34,0x89,0xf4,0xcf,0xc4,0x57,0x81,0x48,0x62,0x2d,0xa1,0x78,0x42,0x17,0x07 .byte 0x55,0x95,0x68,0x13,0xc2,0xf1,0x93,0x5a,0x50,0x46,0x68,0x1d,0x64,0x30,0x55,0xa2,0x66,0x75,0xf5,0x6d,0x1a,0x12,0x82,0xeb,0xcf,0xad,0x13,0xf3,0x8c,0x63,0x51,0x66,0xd0,0xd3,0x1c,0xd1,0x6b,0xb7,0xb2,0x7d,0xe9,0xbb,0xd9,0x5c,0xb5,0xb5,0x2c,0x77,0xc8,0x2c,0x38,0x86,0xb0,0x6d,0x6b,0x30,0x4d,0x93,0xd4,0x1f,0xea,0xbd,0xab,0x95 .byte 0x1d,0x91,0x8e,0x6b,0xcc,0x6d,0x98,0x99,0x21,0x21,0x2d,0x6b,0x46,0x91,0x1b,0x8d,0xcb,0xb3,0x4c,0x3b,0x28,0x5d,0x14,0xba,0xd2,0xd1,0x48,0x48,0xdf,0xca,0xc5,0xfa,0xc4,0xda,0x39,0xb3,0xa8,0x72,0x8a,0x1a,0x59,0x18,0xc7,0x17,0x6d,0xd6,0x3f,0x8c,0xf2,0xe5,0x3d,0x9c,0x49,0x1f,0x3b,0x5f,0xfb,0x8e,0x86,0x96,0x3a,0x56,0xe0,0x51 .byte 0x13,0x4f,0x4f,0xff,0x35,0x01,0x8e,0xd0,0x62,0xc8,0xf1,0x23,0x73,0x85,0xaa,0xcc,0x71,0xd7,0x04,0x7f,0x15,0xf7,0x6c,0xc0,0xf6,0x8d,0xd9,0xe9,0x65,0x79,0x76,0xfb,0x69,0xd7,0x7e,0x3f,0xed,0xfd,0x6f,0x33,0x0c,0x21,0x15,0x2e,0x1e,0xe2,0x37,0xdf,0x05,0xc0,0x16,0xae,0xa5,0x1e,0xff,0x10,0xed,0xaf,0xd2,0xc6,0x1a,0x72,0xc2,0x42 .byte 0x33,0x86,0x27,0xf4,0x63,0xc0,0xbb,0x48,0x78,0x87,0x60,0x5f,0x89,0xad,0x60,0xfd,0x1b,0xab,0xba,0xf7,0x07,0xd5,0x24,0x43,0xfa,0x47,0x24,0x5b,0x89,0x30,0xa8,0x2c,0x84,0xdf,0x09,0x6f,0x86,0x46,0xb5,0xe6,0x0b,0x62,0x69,0xc5,0xb6,0x67,0x14,0xe0,0xb9,0x00,0x7c,0xb4,0x55,0x1c,0xac,0x75,0x7b,0xc0,0x04,0x7a,0xc1,0xf1,0x28,0xe6 .byte 0xd5,0x50,0x2e,0x9f,0xbe,0xde,0xfd,0x9a,0x6f,0x0c,0xbc,0xfc,0x21,0xa0,0x63,0xbf,0x77,0x51,0x4a,0x82,0x11,0x17,0xef,0xd3,0x55,0xcb,0xc3,0x6b,0x62,0x4a,0x12,0xa9,0x33,0x96,0x2e,0x8f,0x13,0x89,0x72,0x60,0x74,0xfa,0x44,0x64,0xd7,0xe8,0x05,0xb7,0xdb,0x86,0x9a,0x7d,0x92,0xe2,0x45,0x0f,0xb8,0x9a,0x94,0x5c,0x4c,0x64,0x49,0xf4 .byte 0xde,0x6d,0x4b,0x0d,0xc5,0x50,0xe5,0xcd,0xaa,0x8d,0x30,0xb1,0xa6,0x14,0xb3,0xc7,0x1d,0xd9,0x88,0xb5,0xce,0xf1,0xb5,0x69,0x03,0xd5,0x21,0xbd,0xa9,0x59,0xd4,0x7d,0xe4,0xad,0xe7,0x6e,0x60,0xfb,0x71,0xb9,0x77,0xf4,0xc2,0xbf,0xe5,0xc3,0xb8,0x18,0x92,0x8a,0x17,0xf2,0x06,0xf8,0xd8,0xc9,0xcd,0xbf,0xfa,0xed,0x1b,0xf0,0xa4,0x32 .byte 0x7e,0x52,0x1d,0x44,0x45,0x3d,0xc6,0x29,0x05,0xd9,0xaa,0xc6,0x94,0xa2,0x7c,0xfb,0x42,0x32,0xf2,0x42,0xc6,0xac,0x26,0xf1,0x69,0xe3,0x43,0xe2,0xe1,0xff,0xa9,0xda,0xf7,0xf9,0x69,0x47,0xcd,0x24,0xa5,0x4c,0x9a,0xe0,0x15,0xa8,0xb3,0x08,0xfb,0xb3,0x07,0x81,0x18,0x62,0xb5,0x2f,0xd0,0xf1,0x59,0x8d,0xc2,0xf3,0x93,0xd2,0x4d,0x17 .byte 0xaf,0x22,0x5f,0x98,0x47,0x83,0x14,0x77,0x05,0x05,0x9c,0x0b,0x04,0x6f,0x83,0x83,0x68,0x86,0x95,0x8e,0x03,0xe7,0x5d,0x54,0xdf,0x6e,0x05,0xb6,0x12,0x9a,0x69,0x3a,0x88,0xcc,0x66,0xff,0x0c,0xa1,0x4f,0x09,0x5a,0xfd,0x58,0xd0,0xbb,0xa8,0x00,0x26,0xa2,0xfe,0xaa,0x2a,0xc1,0x22,0x9b,0x5e,0xc2,0x93,0xa0,0x08,0x34,0x93,0x47,0x48 .byte 0x9e,0x48,0xfd,0x0a,0x9f,0x3e,0xdb,0xe1,0xcf,0x4c,0xc4,0x07,0x74,0xf6,0xc8,0x30,0x39,0x35,0x23,0x8f,0x7c,0x9f,0xf8,0xd5,0xeb,0x93,0xb6,0x5d,0x50,0x14,0xcf,0xf5,0x3d,0x95,0x2e,0x41,0x06,0xb1,0x48,0x33,0x8f,0x0f,0x05,0xba,0x60,0xf9,0x14,0xd9,0x09,0x24,0x18,0x1b,0xe7,0xef,0xd9,0x57,0xd7,0xef,0xec,0x73,0xe7,0xf3,0xfd,0xa8 .byte 0xd3,0x3f,0x48,0xbe,0x17,0xf2,0x1d,0x00,0x2f,0x98,0xc7,0x76,0xda,0x1c,0x97,0x28,0x07,0xfe,0xe8,0xcb,0xfc,0xa0,0x6e,0x61,0x6c,0xb3,0x28,0x72,0xa8,0xb6,0x5f,0x78,0xa1,0x24,0x46,0xb0,0xff,0x7f,0x56,0xad,0x9a,0x52,0x2d,0xc3,0x40,0xf4,0xd3,0x65,0x63,0x4e,0xa1,0xb9,0x48,0x33,0x75,0x50,0xbb,0x18,0x06,0x07,0xa3,0xa7,0xe4,0x56 .byte 0x69,0xbc,0xa3,0xd8,0x20,0xa3,0xba,0x3e,0xc2,0x2f,0xe2,0x2c,0xe1,0xc9,0x74,0x75,0x56,0x2b,0xa8,0xde,0xc8,0x40,0x64,0x7f,0x60,0xfa,0x35,0x6f,0x2d,0x6f,0x14,0xb0,0xb3,0x45,0x3c,0x5d,0xcd,0x84,0x4f,0xb8,0xc6,0xbf,0xaa,0x49,0xfd,0xd4,0xbf,0x14,0xe2,0x1e,0x12,0xbf,0x67,0x78,0xf9,0xee,0x1e,0x75,0x96,0xe1,0x89,0x89,0xbe,0xc7 .byte 0x2f,0x33,0x6c,0xa4,0x38,0xc2,0x2d,0x0f,0xc0,0xa5,0x4e,0xd4,0xf8,0x65,0xc6,0x5b,0xd8,0x4d,0x5a,0xbb,0x1b,0xfa,0x56,0x37,0x72,0x6f,0x4f,0xd9,0x0f,0x22,0xdf,0x98,0x2b,0x92,0x68,0x83,0xb7,0xe4,0x01,0x1e,0x4a,0x2e,0xa6,0xf6,0x8e,0x4f,0xdc,0x45,0xac,0x5b,0xc9,0x47,0xad,0x96,0x22,0xce,0x72,0x66,0xc0,0xe3,0x5e,0xcf,0x1c,0x9d .byte 0x1b,0x96,0x99,0x08,0x6e,0x17,0x6c,0x46,0x77,0x4c,0x4e,0xe3,0x68,0xa5,0xf2,0x84,0xea,0x64,0xaf,0xe6,0x36,0x55,0xdd,0x0b,0xd6,0xe4,0x06,0x4d,0xc4,0x2b,0x34,0xbb,0x49,0xf9,0xac,0xe4,0xb2,0xbc,0xb3,0xa5,0x48,0x39,0xe5,0xc6,0x8e,0xc1,0xfb,0xe9,0x26,0x47,0x81,0x8c,0xcb,0xad,0xa0,0xbf,0xa9,0xf2,0xb3,0xfb,0xbb,0x14,0x52,0x7a .byte 0xf1,0xa4,0x01,0x88,0x06,0x30,0x7e,0x69,0x1c,0x97,0xff,0xfc,0x1c,0x0d,0x2b,0x69,0xaf,0x93,0xa0,0x0f,0x04,0xa3,0x9c,0xf2,0xde,0x61,0xa7,0x45,0x1c,0xa6,0x9c,0x2f,0x58,0x35,0x59,0x95,0x3f,0xff,0xbd,0xbc,0xc9,0xe5,0x2c,0xe3,0x48,0x1e,0xdc,0x36,0xe1,0xbe,0x30,0xc2,0xcb,0x80,0x8f,0x17,0x90,0xcd,0x0f,0x2d,0x94,0x3b,0x44,0xb5 .byte 0x6a,0x62,0xf1,0x93,0x2f,0xbd,0xf5,0x55,0xed,0xf6,0xfb,0xae,0x01,0x99,0x5a,0xc9,0xe3,0xed,0x78,0x39,0x65,0x81,0x06,0x5f,0xc3,0xb3,0x2e,0x8c,0xcf,0x59,0x47,0x75,0xbe,0x56,0x25,0x22,0x05,0xd8,0x0a,0x1b,0xbe,0x60,0xb2,0x8a,0xac,0x28,0xaf,0xb1,0x84,0x38,0x6e,0xba,0xc5,0x91,0x17,0x3a,0x63,0xa9,0xff,0x89,0x56,0xed,0x36,0x32 .byte 0xde,0x12,0xa8,0x38,0x92,0xbb,0x51,0xdd,0x6b,0x5e,0x97,0x68,0x8d,0x27,0x10,0xd9,0x83,0x98,0x02,0xd2,0x8b,0x75,0x88,0xae,0xd0,0x22,0x69,0x95,0xc1,0x6d,0x2d,0xec,0x01,0xd9,0x06,0xc4,0xd0,0xa2,0x45,0xc9,0xd6,0x48,0x49,0xeb,0xdb,0xd5,0x83,0x7a,0x06,0xc5,0x88,0xd9,0x6f,0xb4,0xba,0xc2,0xbc,0x83,0x23,0x0a,0x9f,0xe1,0x4f,0x54 .byte 0x34,0x80,0x78,0x2f,0x82,0xd2,0x86,0x20,0xa6,0x73,0xb7,0x4e,0x93,0x6c,0x8a,0xd4,0xe8,0x46,0xed,0xa8,0xe2,0xd5,0x1e,0xe3,0xb3,0xdb,0xde,0xbc,0x94,0x02,0xb7,0x37,0x10,0x94,0x1e,0x0b,0xc7,0xbd,0x60,0x38,0x04,0x29,0x92,0xef,0x01,0xe0,0x20,0x55,0xb3,0x0d,0x50,0xc9,0x0f,0x6a,0x46,0x5f,0x55,0x73,0xd5,0xec,0x2e,0x1e,0xa4,0x0f .byte 0xf4,0x3c,0xbe,0x5c,0xb7,0x81,0x78,0x0c,0xf0,0x7d,0x38,0x32,0x6a,0x9c,0x43,0x19,0x0f,0x51,0xe6,0x2f,0xe6,0xcd,0x09,0x07,0x92,0x93,0xfd,0x22,0x1b,0xec,0x75,0xfe,0x3a,0xf4,0xbe,0x8b,0xb6,0x9c,0x58,0xca,0xf8,0x9f,0xe5,0x8f,0x47,0x37,0xfb,0x6e,0xc9,0xe2,0xd7,0xb4,0x78,0xcf,0x0c,0x06,0xa8,0x30,0xd0,0x54,0x2e,0x84,0x79,0x44 .byte 0xc2,0x32,0xd3,0x8f,0x47,0xb6,0xa3,0x57,0x30,0xe5,0x72,0x44,0x54,0xd4,0xfb,0xe4,0x84,0xf8,0x4d,0x0e,0xbe,0xc8,0xf5,0xda,0xbb,0xb6,0x03,0xa2,0x47,0xaf,0xab,0x85,0xb2,0x3b,0x05,0x0b,0xb1,0x95,0x8c,0x3c,0x33,0x0e,0xee,0x5a,0x01,0x82,0x18,0x9b,0x8a,0x31,0x9e,0xde,0x75,0xed,0x0a,0x1e,0x0d,0x84,0x69,0x8a,0x51,0x57,0x12,0xc0 .byte 0x73,0x9f,0x24,0x65,0xe6,0x73,0xdb,0x2a,0x10,0x2a,0x76,0xc6,0x82,0xd7,0x06,0x68,0x03,0x78,0x83,0xf1,0xcb,0x32,0x80,0xf8,0x48,0xdf,0x2e,0x37,0xee,0x35,0xe2,0xd9,0x62,0x18,0xf5,0x54,0xbe,0x75,0x94,0x59,0x2b,0xa4,0xae,0x74,0x2e,0xaf,0xdf,0xc2,0xec,0x9d,0xe0,0x60,0x27,0x4b,0xef,0xb3,0x0b,0xa1,0x88,0x20,0x17,0x4f,0x07,0x83 .byte 0xfa,0x9a,0x30,0x3e,0x8a,0xc0,0xcf,0x4d,0x39,0xdd,0x92,0x46,0x62,0x9d,0x20,0x80,0x77,0x82,0x12,0x01,0x08,0x99,0x38,0xa8,0x92,0xa7,0xc0,0x61,0x75,0x6e,0x97,0xb4,0x4c,0x89,0x5a,0xf5,0x9f,0xee,0x08,0x56,0x66,0x0f,0x86,0xc3,0x49,0xee,0x3f,0x63,0x47,0x74,0xca,0x4c,0xc8,0x8a,0x8e,0x5a,0x70,0x80,0x65,0x10,0xb6,0x55,0x55,0x1f .byte 0x75,0x6a,0xf5,0x3b,0xfb,0x43,0xf2,0x21,0xd7,0xa6,0x5d,0x84,0xc1,0x56,0x8e,0x03,0x99,0x32,0xbd,0xf2,0x98,0xc4,0xdd,0x0e,0xf8,0xf1,0x33,0xbf,0xfb,0x2c,0xff,0x48,0x1a,0xd9,0x03,0x14,0x0a,0x88,0x4f,0x74,0xc4,0x7f,0x54,0x1b,0xa4,0x7c,0x52,0x84,0x24,0x89,0x16,0xc3,0xd7,0x4c,0x02,0xd4,0x4c,0xab,0x0d,0x07,0xf8,0xd8,0xe8,0x28 .byte 0xa3,0x04,0x14,0x5b,0xca,0xc3,0x72,0x86,0x0b,0x42,0x1b,0x5d,0x1a,0xbb,0x0d,0xa4,0xc6,0x0c,0x25,0xa2,0xdb,0x23,0x4b,0xa9,0x7c,0xdb,0xb5,0x09,0x08,0xed,0x23,0x01,0x3d,0x7b,0xa3,0xe2,0x24,0xa5,0xbd,0x56,0xe6,0xb5,0x13,0x32,0x0a,0x68,0xb3,0x14,0x0a,0xd6,0xf5,0xe6,0xc9,0x7a,0xb6,0xb6,0x31,0x47,0x15,0x66,0x7b,0x08,0xfb,0x20 .byte 0xa4,0x3f,0xca,0xc9,0x02,0x3a,0x5a,0x4e,0x1f,0x30,0x50,0x5c,0xc6,0x20,0x50,0x02,0x1e,0xf3,0x5f,0x62,0x0c,0x70,0x72,0xa8,0x5c,0x51,0x47,0x88,0x0a,0x06,0x1a,0x5a,0xa6,0x4a,0xe3,0x05,0x99,0xc8,0x0e,0x26,0x32,0x22,0x78,0x58,0x36,0x84,0x42,0x71,0xb4,0x3e,0x26,0x7d,0xe1,0x3d,0x76,0xd4,0xde,0x54,0xd0,0x78,0x17,0xe7,0x01,0xd7 .byte 0x93,0xae,0x58,0x77,0xde,0xc4,0xa6,0xfd,0x15,0xbf,0x21,0x59,0x19,0x8d,0xc4,0xf4,0xd5,0xf0,0x9a,0x22,0xe8,0x92,0x2f,0x9d,0x84,0x96,0x19,0xbb,0xc8,0xf4,0x76,0xfe,0xb4,0x43,0xa1,0xc9,0x87,0x65,0xf0,0x8d,0x95,0xeb,0x13,0xa3,0x9a,0xdc,0x42,0x8b,0xb6,0x2d,0xfa,0x94,0xb8,0xc1,0x51,0x75,0xdb,0xaa,0xe5,0x19,0xf3,0x05,0x66,0xf1 .byte 0x24,0xa7,0xf8,0x56,0x49,0x6d,0xe0,0xbc,0x9f,0xf7,0x39,0x1d,0xcb,0xec,0x7e,0x39,0xda,0x73,0xee,0x50,0x0f,0x19,0x2e,0xc4,0x54,0x44,0x06,0x1a,0x9b,0x46,0x9a,0x68,0x96,0xdf,0x3e,0x3a,0x23,0x9f,0x5d,0xac,0x92,0x51,0x9d,0xe5,0xcf,0x5f,0x7f,0xb4,0xd8,0x93,0xe3,0xd8,0x80,0xe9,0x96,0xd2,0x04,0x94,0x37,0x6e,0x49,0x44,0xff,0xb3 .byte 0xa5,0x97,0x35,0xb7,0x2e,0x04,0xae,0x2d,0xf2,0x77,0xc7,0x19,0x3a,0xd9,0x35,0x9a,0x91,0x18,0xe1,0xb9,0xb0,0x22,0x99,0x76,0xb7,0x69,0xe6,0xc6,0xf1,0xee,0xdf,0xce,0x35,0xd5,0xbe,0xc7,0x02,0x57,0x2b,0x4a,0x72,0x6a,0xe3,0xd7,0x75,0xab,0xa5,0x2a,0x6a,0xeb,0x76,0x92,0xab,0x37,0x41,0x64,0x4d,0x0a,0x99,0x82,0xc3,0xe1,0xab,0x70 .byte 0x4c,0xaa,0x85,0x90,0xc2,0x2f,0x5a,0x91,0x31,0x93,0xeb,0x8e,0x1f,0xec,0x30,0x40,0xb3,0x95,0xc8,0xef,0x06,0x74,0xc5,0xb6,0x65,0xf9,0x10,0xe7,0xce,0x9b,0x12,0xee,0xe8,0x02,0x5f,0xa5,0x0b,0x42,0x34,0x38,0xb3,0x7b,0x89,0x30,0xac,0x25,0x81,0x2c,0x48,0x22,0xa6,0xa8,0x4e,0x6b,0x1a,0x53,0x2b,0x35,0xa9,0xbe,0x5d,0x4e,0x97,0xc6 .byte 0xc2,0x9a,0x51,0xff,0xcc,0x21,0x42,0x98,0x85,0x64,0x37,0x79,0x3e,0x33,0x10,0xbc,0x26,0x0b,0x71,0xb0,0x15,0x01,0xc7,0x21,0x1f,0x62,0x55,0x8d,0x91,0x57,0x10,0x6d,0x3e,0x95,0xa8,0x38,0xb2,0x9d,0x8e,0x90,0x73,0x4a,0x2f,0x48,0x08,0x09,0xfb,0x76,0x24,0xc4,0x91,0x7d,0x56,0x60,0xd4,0x96,0x46,0x61,0xc9,0xc8,0x3e,0xd0,0xc4,0x51 .byte 0xc5,0x03,0x2e,0xb6,0xec,0x64,0x56,0x54,0xbe,0x7a,0x77,0x19,0x0d,0xbc,0xdb,0x77,0x67,0x23,0xb2,0x32,0xd3,0x39,0xe8,0x9b,0xf0,0xe7,0xc0,0xf1,0x35,0x9a,0x9d,0x13,0x3f,0x10,0x0d,0xb6,0x89,0x49,0x93,0x64,0x9c,0x64,0x6f,0xdf,0x4d,0x6c,0x50,0x4a,0xfb,0x87,0x2f,0x58,0xcd,0xe7,0x12,0x89,0xe8,0x3d,0x14,0xf2,0xff,0xc3,0x51,0xe0 .byte 0x33,0x8a,0x98,0x37,0xc2,0x71,0xea,0x61,0xde,0x64,0xa3,0xae,0xad,0xff,0x70,0xe9,0x7f,0x89,0x7a,0xee,0x3e,0xec,0x71,0xa2,0xd5,0xa2,0xa3,0x46,0xde,0x93,0x35,0x78,0x18,0x43,0xd5,0xa0,0x61,0x0b,0x82,0x4b,0x59,0x80,0xb7,0xc4,0x63,0xb2,0xf6,0x45,0xe3,0x4e,0x73,0x94,0xdb,0xdf,0x86,0xec,0x32,0x5a,0x0c,0x7d,0xc7,0xf1,0xda,0x35 .byte 0xb8,0xdf,0x5b,0x31,0xfc,0x85,0x7b,0xcf,0xe6,0x19,0xc2,0x13,0xab,0xee,0x06,0x1f,0x30,0xa7,0x6f,0x50,0xfe,0x38,0x84,0x83,0xd5,0x08,0x2c,0x13,0x81,0x7d,0x5d,0x2d,0x7d,0xa5,0x9c,0x56,0x77,0xb8,0x0e,0xc0,0x4e,0x7e,0x16,0x0b,0x79,0xa5,0x87,0x64,0x9f,0x7c,0x8e,0x44,0x3f,0x6d,0x24,0x62,0x6c,0xc7,0x24,0x23,0x08,0x03,0x5f,0xd1 .byte 0x7c,0x3e,0x63,0x69,0xff,0x7d,0xbf,0xe2,0xc7,0xc0,0xdf,0x77,0x9c,0x02,0x5d,0xaf,0xb9,0x80,0xaa,0x50,0x66,0xd7,0xb4,0x2b,0xc9,0xef,0x3f,0xbc,0xf5,0x35,0x92,0xc7,0xea,0xcc,0xf6,0x5a,0x4f,0xe6,0xcd,0x09,0x0f,0xb9,0x1f,0xe7,0x05,0xb1,0x2d,0xe3,0xc1,0x08,0xf7,0x59,0xe1,0x7c,0x74,0xad,0xbc,0x25,0x03,0x97,0xba,0x72,0xe8,0x0e .byte 0x78,0x18,0xf1,0x42,0xc2,0x7e,0xbf,0x4e,0x89,0x07,0xe3,0x80,0xfa,0x25,0x09,0x0f,0x3f,0xac,0xce,0xea,0xe0,0xe5,0x15,0xff,0x7a,0xb4,0xc7,0x7f,0x58,0x17,0x89,0x55,0x7f,0x85,0xeb,0x07,0x38,0x92,0x68,0x03,0x6d,0x33,0x5c,0x2b,0xfd,0xd6,0x53,0x8d,0x1f,0xbc,0xac,0x82,0xda,0x88,0xc6,0xf3,0x1f,0xa3,0x25,0x0a,0xa4,0xae,0x94,0x91 .byte 0x06,0xda,0xe7,0x04,0x9b,0x84,0x08,0x01,0x79,0xa0,0x79,0x20,0xf8,0x4b,0xd9,0x94,0x24,0xa8,0x59,0x59,0xd6,0xaf,0xe9,0xc1,0xcd,0xb4,0x8b,0xf0,0x49,0xda,0x13,0x9a,0x4e,0x53,0x31,0x74,0xbb,0x8c,0x51,0xfa,0x95,0x9a,0x27,0x73,0x0c,0xde,0x58,0x73,0x12,0x4b,0x3c,0xe6,0x69,0x48,0x9e,0x63,0xbf,0xe5,0x2e,0xf7,0x2e,0x6a,0xe3,0x05 .byte 0x5f,0x70,0xa6,0xfa,0x29,0x9c,0x12,0x2d,0x2d,0xb1,0x32,0xc0,0x52,0xbd,0x1a,0x88,0xae,0x0d,0x92,0x4d,0x17,0xa8,0x02,0x81,0xf6,0xca,0x1a,0x46,0x70,0x58,0xc6,0x6f,0x45,0x50,0x64,0x9a,0x1b,0x36,0x3e,0x40,0x68,0x84,0x3a,0xb1,0xb7,0xc5,0xe9,0xb5,0x60,0xe4,0x75,0x4e,0x8c,0x27,0xc4,0xd3,0xcd,0xe5,0xa9,0x0c,0x23,0x85,0x3e,0x22 .byte 0xcf,0xa6,0x62,0x29,0x82,0xd4,0x37,0x6e,0x98,0x67,0x43,0xc7,0x43,0x67,0xfd,0xa6,0x0c,0x7f,0x76,0xa8,0x18,0xf0,0xa9,0x76,0x69,0x9a,0x8f,0x1c,0x88,0x7e,0x22,0xce,0x1c,0x3e,0xf2,0x0b,0x3a,0xf1,0xd0,0xf6,0xcc,0xfe,0xf5,0x58,0xef,0x50,0x7c,0xe4,0x3f,0xef,0xb4,0x5b,0xce,0xbc,0x55,0x5b,0x9e,0x9e,0x49,0xa5,0x5d,0xd5,0x0b,0xe7 .byte 0x71,0x0b,0xbf,0x7c,0x82,0xee,0x2c,0xd7,0x7e,0x97,0x75,0x9c,0xea,0x04,0x7c,0xde,0x16,0x96,0x0b,0x89,0x50,0x83,0xf2,0xd2,0x1d,0xba,0x2b,0x0d,0x4f,0x79,0x5f,0x29,0xb0,0xf5,0x07,0x68,0x19,0x5d,0x5d,0xc8,0x31,0x95,0xe8,0x50,0x15,0x76,0x7d,0xab,0x3b,0x9a,0xa8,0x8a,0xea,0x5b,0xaf,0xc6,0xfc,0x1a,0x2d,0x4d,0x14,0xee,0x7c,0x2b .byte 0x6e,0xaa,0xe1,0xc4,0x0e,0x17,0x87,0x30,0x67,0xca,0x19,0xa5,0xb7,0xed,0x3b,0x8e,0xca,0x98,0xd0,0xa7,0x0b,0x0e,0x0f,0xd8,0x40,0x9b,0xb6,0x7c,0xef,0xd1,0x83,0xb7,0xaf,0x43,0x64,0x9e,0x66,0x9a,0xdf,0xb6,0x5c,0xf0,0x36,0xea,0xfb,0xea,0x0a,0x03,0x8e,0xde,0x3d,0x3f,0x69,0x3a,0x38,0x91,0x62,0x41,0x8e,0x70,0x11,0xd7,0x59,0x05 .byte 0x3e,0x52,0x36,0x43,0x6e,0x09,0x67,0x35,0x8e,0x0c,0x6d,0x3b,0xb4,0x6b,0xc7,0x8f,0xe8,0x53,0x77,0x6d,0x4d,0xa9,0x0d,0x2a,0x96,0xd3,0x1b,0xe8,0x3a,0x8f,0xfa,0xd2,0x17,0xfd,0x1f,0xce,0x90,0x99,0xb0,0xda,0x15,0x1c,0xe0,0xe9,0xff,0xc8,0x8b,0x5a,0x1a,0x0d,0x83,0x1a,0x99,0xaa,0x73,0x43,0xb1,0x68,0x10,0xed,0xf5,0xbd,0x67,0xdb .byte 0x1f,0x1c,0x12,0x9b,0xa2,0x91,0x3b,0xe6,0x72,0x9a,0xc8,0x55,0x23,0x5a,0x05,0x4b,0x7b,0x9c,0xa2,0x28,0xc6,0xcb,0x0a,0xac,0x59,0x25,0xb2,0x7a,0xb2,0x02,0xae,0xc4,0x61,0x7d,0x5c,0x90,0x1e,0xcd,0xce,0xd6,0x9f,0x6f,0x1b,0x93,0x6d,0xec,0xb6,0xa0,0xcf,0x6e,0xea,0x4e,0xfb,0x23,0xf2,0x39,0xab,0x7f,0x45,0x40,0x16,0x4f,0xf6,0x0e .byte 0x09,0xf7,0x85,0x03,0xee,0x3c,0xaa,0xb1,0x0e,0x07,0x2b,0xee,0x65,0xca,0x9a,0xa9,0xc8,0x78,0x97,0x77,0x38,0xaf,0x32,0x97,0x0a,0x2f,0xd4,0x7a,0xf8,0x04,0xc7,0xcc,0xce,0xe6,0x9d,0x10,0xe7,0xf6,0xc1,0x4c,0x24,0xd1,0xcc,0x79,0x53,0x5a,0xc8,0xf9,0xfc,0x08,0x2a,0xe1,0xb4,0x51,0xc4,0x12,0x3e,0x50,0xf9,0x73,0x9d,0x42,0x85,0x4b .byte 0x4e,0x68,0x7c,0x7b,0x8f,0xe1,0xc6,0xe2,0x07,0xa9,0xc1,0xca,0x35,0x56,0x58,0x40,0x8a,0xc7,0x6d,0x7f,0x9d,0x91,0xff,0x32,0xc3,0xc9,0x58,0x56,0x67,0xc5,0x51,0x2d,0x3f,0x98,0x16,0x4b,0x95,0x4e,0xed,0x83,0x7a,0xe5,0x6b,0x21,0x91,0x4a,0x8d,0xcc,0x26,0x21,0x59,0x4e,0xe6,0x05,0x6a,0xd2,0x83,0xba,0x6b,0x8a,0x4f,0xe5,0x03,0xd1 .byte 0x81,0x5b,0x84,0x07,0x9a,0xe1,0xf5,0x55,0x5c,0xfa,0x9f,0xad,0x15,0x20,0x7f,0xc6,0xc8,0x3a,0x7e,0xd8,0x2e,0x56,0x96,0x38,0xc2,0xe8,0xae,0xfb,0x28,0x44,0x6e,0x23,0x64,0xdd,0xfd,0x2e,0x86,0xea,0x7a,0x97,0xa4,0x50,0xdb,0x1f,0xa5,0x8e,0xaa,0x54,0x56,0x41,0x51,0x91,0x47,0xf7,0x5b,0xb5,0x33,0x74,0x65,0x41,0x9c,0xc8,0x19,0xde .byte 0x66,0x2d,0x18,0xb2,0x05,0xc6,0x24,0xd1,0xd5,0xd5,0x4e,0xba,0x25,0x8c,0x28,0x7d,0xf4,0xb5,0x2a,0xc4,0xef,0xac,0xa0,0x82,0x78,0x96,0xe3,0x7a,0x5f,0xca,0xd9,0xc4,0x38,0xa9,0xb8,0xfa,0x7e,0x04,0x16,0x5f,0x4e,0x02,0xf5,0x45,0x6c,0x7f,0xbe,0x8e,0x94,0x45,0xaa,0x85,0x5a,0x74,0x36,0x47,0xb7,0xc5,0x2b,0xfd,0xc3,0x70,0x4b,0x39 .byte 0x66,0x9c,0x84,0x45,0x32,0xb9,0x32,0xd6,0x1f,0x72,0xdb,0x81,0x81,0x72,0x6d,0x54,0x55,0x0f,0x83,0x92,0xca,0x8e,0xd1,0xf9,0x18,0x4d,0x24,0xd0,0x9a,0xa6,0xc4,0xfb,0x36,0x34,0xe6,0x9a,0xac,0xe6,0x25,0xe5,0x28,0xf0,0x09,0xd7,0x10,0x41,0x66,0xd5,0xf3,0x43,0xa8,0x03,0xcb,0x8e,0x5a,0x1b,0x3a,0x70,0x9e,0x33,0x79,0x42,0xe3,0xea .byte 0x74,0x45,0x44,0x64,0x89,0xa1,0xf9,0x0f,0xe8,0x8f,0x40,0xcb,0x60,0x63,0x0d,0x11,0xe3,0xda,0x37,0x94,0x4d,0x8f,0x84,0x89,0x92,0x46,0x4a,0xf3,0x9f,0xce,0xfc,0xaa,0x4c,0x0c,0xfc,0x8d,0xff,0x6f,0x73,0x91,0xce,0x55,0x47,0x4f,0x7c,0xcc,0x01,0x27,0xd1,0x4f,0xbe,0x70,0x05,0xbb,0xee,0xb4,0xdd,0x4f,0xf5,0xca,0xb3,0xab,0x7e,0x68 .byte 0x8b,0x21,0x03,0x8a,0xfe,0x63,0x43,0xfd,0x06,0xf6,0x0a,0xa2,0xae,0x5b,0x88,0xed,0x4c,0xbd,0xa4,0xf7,0x84,0x0b,0x43,0xba,0xed,0xf1,0x58,0x7e,0xea,0x5c,0xc0,0x90,0x1c,0x50,0x60,0x6b,0x06,0x93,0xe5,0x3f,0xe1,0xec,0x5e,0x3e,0xd0,0x14,0x15,0x04,0x6a,0x13,0x4c,0x28,0xa7,0x7b,0x7b,0xeb,0xb0,0x59,0xa2,0x08,0x33,0x73,0xa2,0xc5 .byte 0x57,0x51,0x8e,0xd3,0x8b,0xbd,0x83,0xe4,0xd3,0x5b,0x6f,0x6b,0x61,0xf7,0x7d,0x17,0xed,0x7f,0xea,0xcf,0x56,0x03,0x87,0x2f,0x50,0xbc,0x73,0xc8,0x84,0x7c,0xb1,0xfd,0xe6,0x6c,0x95,0x79,0x97,0x7f,0xd9,0x8d,0x0d,0x4e,0x21,0xde,0x82,0x5c,0xb7,0x96,0x22,0xff,0x2f,0xaa,0x85,0x25,0x62,0x65,0x8b,0xc1,0x3a,0xa9,0xa3,0xef,0xc6,0x27 .byte 0x1f,0xfe,0xc5,0x5d,0x27,0xee,0xe0,0x5a,0x7b,0xa2,0xdc,0x6d,0xad,0xa1,0x60,0xcd,0xcc,0x8f,0x6e,0xa2,0xfd,0xaa,0x64,0x12,0x86,0x61,0x5a,0x61,0x93,0x3e,0x9c,0x0d,0xe5,0x1a,0x8a,0xb4,0x00,0xbb,0xc6,0x31,0x0f,0xb5,0x9b,0x1c,0x75,0x3e,0xdf,0x02,0x86,0x9c,0xf4,0x3e,0x10,0xf2,0x5e,0x47,0xb4,0x1f,0x73,0xb9,0x09,0xe4,0xcc,0x3d .byte 0x45,0xe0,0xa7,0xa9,0x27,0xc9,0x26,0x13,0x81,0x81,0x94,0xed,0x16,0x16,0x44,0x22,0x74,0x9b,0x0c,0x98,0x8b,0xbc,0x88,0x01,0x26,0x0e,0x04,0xa4,0x74,0x85,0xa7,0x7e,0x65,0x1e,0x83,0xa5,0xb5,0x73,0xbb,0xa7,0xd8,0x54,0xf6,0xa7,0xc3,0xb7,0x75,0x7c,0x56,0x6b,0x26,0x11,0x2f,0x4f,0x14,0x56,0x39,0x58,0x2a,0xee,0xf1,0x33,0x9f,0x7b .byte 0x76,0x9b,0xf6,0xcc,0xa6,0x3f,0xd7,0xc5,0x0a,0x3d,0xfa,0x20,0x5a,0x79,0xf5,0x1e,0x51,0xa6,0x5c,0xcf,0xab,0x41,0xbf,0x30,0x91,0x85,0xb2,0x84,0x8d,0xd8,0x69,0xa2,0x4e,0xd6,0x8d,0x57,0x2e,0xaa,0x6b,0x68,0x24,0xd7,0x4d,0xf7,0xb2,0x23,0x1b,0x37,0x4e,0x8e,0xc6,0xbb,0x00,0x95,0x06,0x84,0x99,0x10,0x15,0xa3,0xcc,0x33,0x6e,0x69 .byte 0x5f,0x5b,0xb0,0x0f,0xd4,0x76,0x1f,0x5d,0xba,0x05,0x87,0x49,0xbd,0x35,0x11,0x8b,0x57,0x4d,0xa0,0x17,0x3d,0xc2,0xc3,0xde,0x61,0x0f,0x75,0x4a,0x92,0x44,0xc0,0x4b,0x6c,0xa0,0x78,0x95,0xa7,0xf5,0x0b,0x8b,0xf9,0x20,0xb1,0x01,0xdc,0x67,0x37,0x68,0xd7,0x41,0xb2,0xe7,0x9d,0x24,0x6f,0x14,0x36,0x74,0xe4,0x23,0x0b,0x9e,0xec,0xe0 .byte 0xaa,0xa2,0x4a,0x1f,0x69,0x1a,0xac,0x52,0xf5,0x67,0x11,0x76,0x7b,0xed,0x07,0x73,0xd6,0x5d,0x94,0xd6,0xab,0x9e,0x85,0xdc,0xfc,0xa8,0xa6,0x40,0x15,0xa2,0x56,0xcf,0x74,0x22,0x25,0xcd,0xf5,0x9c,0x39,0x8c,0xf5,0x89,0xd9,0x2d,0x82,0x82,0x59,0x30,0x8c,0xe7,0x0b,0x85,0x93,0xad,0x42,0x6a,0x49,0x9a,0x19,0x54,0x12,0xcf,0xf8,0xb7 .byte 0x33,0xc2,0x75,0xf7,0xcf,0x91,0xdb,0xda,0x8e,0x4e,0xc5,0xc0,0xe5,0xe6,0x52,0x03,0xdd,0x11,0x18,0x5b,0x21,0xa2,0x7e,0x6c,0x43,0xd3,0x38,0xa2,0x92,0x55,0x6f,0xd4,0xf6,0x8f,0x95,0xf1,0x70,0x1b,0xf3,0x86,0x53,0x5e,0xd7,0x17,0x5f,0x81,0x7f,0x58,0x53,0x35,0x53,0x40,0x95,0x0b,0x46,0x13,0x8e,0x9e,0x6e,0x4c,0xc4,0xe0,0x11,0x4d .byte 0xb7,0xf8,0x68,0x89,0xfa,0xe5,0x60,0x33,0xe2,0xc3,0xf8,0x8e,0xcf,0xf9,0xc9,0xd8,0x06,0xd0,0x0b,0x25,0xcd,0x4d,0x2f,0xbe,0x5e,0x81,0xe0,0x02,0x74,0x93,0xd0,0x8a,0x33,0x77,0xab,0xe6,0x17,0xd5,0xb1,0x53,0x6b,0xfc,0x94,0x88,0x1f,0xc4,0xf3,0x42,0x3e,0x16,0x54,0xf6,0xa5,0x05,0x58,0xe4,0x91,0x79,0x51,0x9d,0x29,0xd1,0xd1,0x69 .byte 0xa9,0xb5,0xd1,0x2c,0xe5,0x47,0xea,0x2d,0x67,0x59,0xea,0xa4,0x0e,0x1f,0xde,0xfb,0xe2,0x16,0xe1,0xc2,0xb2,0x36,0x3b,0x15,0x84,0x19,0xc1,0xee,0x37,0x49,0x8f,0x1c,0xf8,0x3d,0xc7,0x94,0x39,0xab,0xf2,0xdc,0x7c,0x53,0xc1,0xb4,0x89,0x65,0x73,0xe0,0x91,0x8a,0xa3,0xa7,0xb4,0x05,0x7d,0x18,0x9d,0x2d,0x13,0x76,0x9d,0xfc,0x9d,0xef .byte 0x0b,0x02,0x61,0xc0,0x2d,0xa0,0x6e,0x2b,0x0b,0xbb,0x9f,0x53,0xc1,0x20,0xcc,0x58,0xbe,0xf3,0x56,0xb4,0x68,0x82,0x30,0xfc,0xb6,0x4f,0x7d,0x03,0x56,0x37,0x68,0x97,0xa8,0xea,0x9d,0x20,0x2b,0x46,0xd7,0xdc,0xce,0x8b,0x1a,0x29,0x5c,0xa0,0x35,0x34,0x86,0xcb,0xbb,0xdb,0x8b,0xc4,0x6b,0x2b,0x4f,0xab,0xc5,0x8b,0x34,0x92,0x5c,0xbd .byte 0x2f,0xf4,0xd6,0x40,0xf8,0xc7,0x0e,0x4b,0x1e,0x8d,0xf6,0x45,0x2e,0xa9,0xb0,0xec,0xdb,0xe0,0x71,0x23,0xe4,0x89,0xa9,0x22,0x89,0x20,0x12,0x94,0xa0,0x00,0xca,0xb0,0xf3,0xac,0xda,0x27,0x4d,0xcf,0x76,0xd3,0xa9,0x2b,0xc4,0x0a,0x5d,0xd0,0x7f,0xf8,0x8f,0xa7,0xb3,0x5e,0xf6,0xb8,0x36,0xc0,0x50,0x6e,0x23,0xb8,0xb8,0x55,0x0e,0xf9 .byte 0x3c,0xed,0x24,0xde,0xf0,0xb3,0x83,0x09,0xae,0xfa,0xed,0x71,0xb1,0xd8,0xd1,0x9e,0x35,0xf6,0x2c,0x83,0x89,0xc7,0x86,0x25,0xb1,0xc3,0xac,0x09,0xf9,0x52,0xe4,0xf1,0xc7,0x82,0x54,0x33,0xa4,0xbe,0xc6,0x92,0xa2,0x54,0x43,0x25,0x51,0x6a,0xa3,0x87,0x45,0x32,0x9f,0x46,0x37,0xf2,0x55,0xbd,0xb5,0x54,0x7b,0xcf,0xfb,0xf8,0x3e,0x80 .byte 0x35,0xb6,0x76,0xc0,0x4c,0xe7,0xf7,0xd8,0x69,0x4c,0xa7,0x53,0xb5,0x5a,0xbf,0xa4,0x6d,0x99,0xc0,0x54,0x92,0x16,0x9b,0x89,0x57,0x32,0x20,0x71,0x31,0xa9,0x72,0xb8,0xca,0x69,0x0b,0x3f,0x82,0xaf,0x72,0xa6,0x99,0x08,0x17,0x02,0x9e,0xc1,0xa5,0x83,0x53,0xa7,0xea,0x11,0x17,0x23,0x1d,0xbf,0x82,0x29,0x93,0x49,0x15,0xe8,0x60,0xc6 .byte 0xf2,0x04,0x9a,0xa3,0x34,0x1e,0xa2,0x4f,0xe1,0xa8,0x4d,0xd4,0xc2,0x92,0x84,0x6a,0xa9,0x15,0x68,0x91,0xd3,0x73,0x8f,0x6f,0xab,0x24,0x63,0x8a,0x9d,0x51,0x79,0x8f,0x90,0x74,0x4d,0x67,0xeb,0x21,0x12,0x07,0x6d,0xee,0x7f,0x9e,0x07,0xbb,0xfc,0xe6,0xad,0x02,0x69,0x85,0x02,0x48,0x44,0x32,0x39,0xf7,0xd5,0x1c,0xd9,0xb2,0xe7,0xdd .byte 0x5a,0x92,0x42,0x3d,0x75,0x7f,0x06,0x14,0x18,0xda,0x1e,0x9d,0xa0,0x36,0x8b,0xe8,0xf3,0x69,0x1c,0x2a,0x93,0xc5,0x98,0x0c,0xd3,0xe0,0x5c,0x08,0xbb,0x21,0x02,0xfb,0xa9,0x5e,0xe8,0x18,0x44,0x01,0xb6,0x61,0x17,0x9c,0x2e,0xff,0x61,0xc1,0xe4,0xf6,0x08,0xbe,0x08,0xaa,0x74,0xaa,0x7d,0x8e,0x51,0x49,0xc4,0x52,0xd0,0xe7,0xc4,0xfc .byte 0xf0,0x05,0x6f,0xff,0x47,0x64,0xda,0x13,0xcb,0x7f,0x74,0x45,0x35,0x67,0x3c,0xe4,0x2f,0xd3,0xd8,0x6c,0xc3,0xb9,0x71,0x9f,0xe0,0xc8,0x8c,0x21,0xb9,0x4f,0xdf,0x2f,0xfe,0x5b,0x26,0x0d,0x0e,0x9f,0xa5,0x38,0x1b,0x9a,0xc8,0xca,0x63,0x37,0xd1,0xf3,0x8e,0x78,0xcb,0x29,0x28,0xc2,0x24,0x67,0xb2,0xa9,0xc5,0xb0,0xc0,0xc0,0xb7,0xb9 .byte 0xcb,0xb9,0x1d,0x31,0x76,0xc8,0x84,0x8e,0x99,0x0b,0xec,0x90,0x56,0x45,0xed,0xe7,0x11,0x2f,0x01,0x93,0x22,0x13,0x21,0x33,0x75,0x41,0xf3,0xf4,0x1d,0xb6,0x0d,0x60,0x65,0xe8,0xf2,0x0d,0x91,0x02,0x8c,0xa2,0x95,0xa8,0x82,0x65,0xd7,0x9b,0x7d,0xeb,0x6c,0x8a,0x77,0x04,0x79,0x6d,0x89,0x9d,0xf6,0x0e,0x47,0x10,0x1f,0x0d,0x8d,0x87 .byte 0x47,0x72,0xce,0x3e,0x7e,0xa5,0xc4,0x67,0x46,0x18,0x67,0xc2,0xb6,0xee,0xe4,0xad,0xdd,0xb1,0x40,0x96,0xf0,0x5d,0x46,0x3f,0x23,0xc8,0xef,0x06,0x26,0xd2,0xf7,0x88,0x6f,0xb2,0x3d,0xf3,0xd7,0x9c,0x1b,0x11,0x65,0xf9,0xdd,0xbd,0x67,0x18,0x6c,0x2a,0x1f,0x00,0xef,0xf3,0x64,0x42,0x9e,0x96,0x5e,0x9e,0xe8,0xeb,0x39,0x5f,0x3f,0x87 .byte 0xce,0xb7,0x1f,0x8f,0x3b,0xff,0xd8,0x93,0x9a,0xc7,0xbb,0xb4,0xc7,0xb5,0xa9,0xaa,0xcb,0x80,0x03,0x96,0x04,0xdd,0xce,0x60,0x28,0xe0,0x9d,0x74,0xf1,0x7f,0x8a,0x44,0xe4,0x10,0x42,0x12,0xd4,0xaa,0x7a,0x43,0x24,0x3b,0xaf,0x20,0x7f,0xaa,0x0f,0xda,0x00,0x14,0xe3,0x30,0x55,0x18,0xd0,0xcf,0x03,0x23,0xe2,0x56,0x94,0xa7,0xc3,0xca .byte 0xde,0x1b,0x80,0xad,0x36,0x61,0x23,0xf1,0x2c,0xc3,0x05,0x18,0x82,0xb7,0x55,0x91,0xe7,0x51,0x92,0x6c,0xe5,0xdb,0x5f,0x1e,0xf3,0xfd,0x72,0x49,0xb4,0xe7,0xa4,0x03,0x21,0xfb,0xb5,0x75,0xe4,0xd2,0x9f,0x17,0x64,0x36,0x5b,0x8b,0x9a,0x33,0xeb,0x02,0xa7,0xfe,0xbd,0xb2,0x03,0x89,0xe7,0xba,0x65,0x96,0x56,0x9e,0x9f,0xde,0xbc,0xed .byte 0xa5,0x4c,0x69,0xed,0x04,0x42,0x5b,0x1d,0x20,0x37,0x45,0x10,0xbd,0xf7,0x14,0x92,0x58,0x41,0xb5,0x87,0xf9,0x47,0xb5,0xa6,0xa8,0xc1,0x53,0x71,0x59,0xcb,0x9d,0xa4,0xa9,0x7d,0x42,0x64,0x2a,0x74,0xa9,0x64,0x1b,0x08,0xca,0x9a,0x30,0x92,0xfc,0x48,0xff,0x30,0x63,0x88,0x12,0xa7,0x48,0x03,0xb9,0x5a,0xf6,0xa1,0x51,0x4e,0x51,0xe1 .byte 0x82,0xe3,0xe7,0x5d,0x6d,0xab,0x53,0x06,0xbd,0x85,0x43,0xb1,0x67,0x1a,0xf3,0x14,0xe7,0x0a,0x15,0x93,0x3a,0x0d,0xac,0x30,0x1d,0xe0,0x2c,0xae,0x54,0xef,0x60,0x0b,0xb0,0xee,0x20,0x14,0x71,0xc2,0x27,0x4e,0x08,0x6e,0x0f,0x32,0x53,0x2a,0xb0,0x22,0x15,0xe0,0x11,0xd1,0x76,0x65,0xbf,0x3c,0x9c,0x05,0x1e,0x00,0xba,0x58,0x2a,0xdc .byte 0xac,0xb4,0x8c,0x12,0xe3,0x56,0xca,0xc1,0x6b,0x10,0x11,0x64,0x1c,0x58,0xfe,0xb5,0x6b,0x7f,0xb1,0x67,0x01,0xd8,0x38,0x3e,0x18,0x49,0x0d,0x04,0x9c,0xb4,0x9a,0x34,0xdd,0x18,0x87,0xfc,0x69,0x0d,0xe1,0x9b,0x5c,0x48,0xda,0xa6,0xa3,0x39,0x8a,0xc1,0x5d,0x7a,0x43,0xa2,0xad,0x83,0x6f,0x9c,0x4d,0x90,0xe7,0x87,0x10,0x35,0x39,0xb8 .byte 0xa2,0x19,0xa5,0x42,0xb2,0x8f,0x50,0xf4,0x1e,0xa4,0x08,0x7b,0x16,0x99,0xa1,0xa5,0x07,0x52,0xc8,0x62,0xa5,0x2c,0xc1,0x10,0xb1,0x81,0xa9,0x50,0x4e,0x66,0x5e,0x65,0xca,0x28,0x9b,0x5a,0x3f,0xe9,0xc2,0x68,0xb9,0xc3,0x5f,0xe8,0x11,0x27,0xac,0x05,0xbf,0x1b,0x0b,0xcd,0x84,0xa3,0x73,0xdd,0x6f,0x70,0x5c,0xbe,0x54,0xc1,0xbd,0x03 .byte 0x15,0xe2,0x5f,0x6b,0x12,0x6f,0xb0,0xa4,0x33,0xfc,0x32,0x14,0xcd,0xbc,0x39,0x17,0x68,0xc9,0x00,0x60,0xd4,0x6b,0xf6,0xc3,0x67,0x3e,0xd4,0x09,0xb7,0xf6,0x04,0x3c,0xc5,0x80,0xeb,0xca,0x1e,0xd2,0xc9,0x7c,0x36,0x10,0xc1,0x1e,0xe3,0x52,0x54,0x5d,0xe6,0x34,0x46,0x26,0x7c,0xdd,0x4d,0xa3,0xc2,0x6b,0x73,0x5e,0xa7,0xcf,0x91,0x34 .byte 0xf7,0xea,0xa8,0x09,0xf3,0xd3,0x14,0x5b,0x0e,0x72,0x0f,0xb7,0xd5,0xfb,0xbd,0xe6,0x19,0x32,0x5d,0x58,0xe1,0x6e,0x5b,0xed,0x4b,0x3b,0x8f,0x94,0x29,0x6c,0x0f,0xac,0xd5,0x69,0x4e,0xa4,0x9d,0xf7,0xbf,0xe0,0x8d,0x5f,0x14,0x66,0x81,0x0b,0xa5,0x3e,0xc6,0xb3,0x90,0x84,0x0e,0xb3,0x40,0x89,0xa0,0x4c,0x7d,0x0b,0x4f,0x15,0x9a,0x1c .byte 0xe3,0xcb,0x68,0xa5,0x94,0xae,0x67,0xab,0xcd,0x58,0xdf,0x32,0xc7,0x83,0x26,0x1a,0x38,0x7e,0x22,0xe6,0x21,0x7d,0x93,0x94,0xa3,0x20,0xdf,0x47,0x14,0x5d,0x1f,0x71,0x5f,0xb1,0xb6,0xf7,0xe6,0xaa,0xbe,0x09,0x29,0x37,0x06,0xa7,0xda,0x97,0x65,0x76,0xb8,0xaf,0xbc,0x38,0x74,0xea,0x0b,0x8d,0x53,0x27,0x72,0x8e,0x07,0x42,0x2f,0x98 .byte 0xf8,0x50,0xc0,0x3e,0x68,0x15,0x89,0xb8,0x0e,0xf9,0x47,0xea,0xdd,0x0a,0x94,0x6b,0x88,0x15,0xed,0xc6,0xab,0xc5,0x5b,0x79,0x4f,0x78,0xb7,0x99,0x55,0x69,0x69,0xf0,0x91,0xc0,0xa8,0x32,0x42,0x36,0x4e,0x41,0xb1,0x02,0xdf,0xb8,0xa8,0x64,0x29,0x6b,0x52,0x3f,0x89,0x53,0x8e,0x2a,0x51,0xc9,0x05,0xca,0x9f,0x41,0xc4,0xc0,0x70,0x51 .byte 0x8a,0x5a,0x2b,0x83,0xa5,0xc9,0x9b,0xf4,0xd2,0x5a,0xb1,0xa2,0xcc,0x51,0x2b,0x74,0x5d,0xc0,0xf2,0x23,0xcb,0x91,0x12,0x3e,0xb8,0x73,0xd3,0x62,0x53,0x25,0x0e,0x58,0x55,0x2f,0xdf,0x7b,0x0e,0x3c,0xbf,0xb6,0xe6,0xd2,0xad,0x20,0x1b,0xea,0xac,0xfc,0xdd,0xe9,0x35,0x49,0x5f,0x90,0x7d,0x4f,0x09,0xb0,0xc5,0x8a,0x11,0x2a,0x2d,0xa1 .byte 0xf1,0x84,0xca,0x91,0xc9,0x9a,0x7a,0xe0,0x81,0x3e,0x92,0x07,0x32,0xb0,0x3f,0x59,0x1f,0xec,0x07,0x8e,0x8a,0x73,0x12,0x85,0x52,0x3a,0x7c,0xc3,0x1f,0xfe,0x27,0xd7,0x45,0x1a,0xf6,0x97,0x82,0x5a,0x97,0xdc,0x9e,0x70,0x37,0xe9,0xbe,0x35,0x76,0xae,0x15,0x0c,0x9a,0x66,0x69,0xb6,0xbd,0xcc,0x55,0xc9,0x44,0xb5,0x59,0x09,0xe9,0x0b .byte 0x03,0xa0,0x5e,0x37,0xd1,0xff,0xd9,0xcb,0x5e,0x2a,0x97,0x6f,0x3a,0xee,0xb9,0xc4,0xc9,0xe0,0xb9,0xc8,0xc2,0x9e,0x66,0x0c,0xee,0x05,0x1e,0x12,0xa7,0x2c,0x61,0x7f,0x61,0x1c,0x90,0xbb,0x6a,0xb9,0xd9,0xf3,0x9a,0x5e,0xae,0xfc,0x18,0x15,0x46,0xa8,0x12,0xdd,0x81,0x66,0x44,0x91,0x84,0xbe,0xa8,0x20,0x9a,0x3c,0x0a,0x57,0x32,0xe1 .byte 0x22,0x3f,0x5d,0xa7,0x11,0xa3,0xeb,0xdc,0xaf,0x93,0xbb,0x2e,0xae,0x64,0x6e,0xbb,0x08,0xa8,0x83,0xb8,0xc2,0xfe,0x25,0x22,0x99,0x08,0x68,0xa8,0x6e,0xda,0xee,0xb2,0x78,0xc9,0x59,0x6b,0xac,0x48,0x5d,0x2d,0x1d,0x8c,0xa8,0xd3,0x4b,0x2d,0x27,0x65,0x01,0x5a,0xe4,0x4b,0x90,0x7c,0xe7,0x23,0xbe,0x90,0xf7,0xf9,0x15,0x2f,0xc1,0x70 .byte 0x41,0x80,0x54,0xbf,0xfe,0xb0,0x44,0xfa,0x0e,0x3b,0x07,0xa5,0x85,0x40,0x8e,0x21,0x72,0x1d,0x22,0x0c,0x78,0xcf,0x67,0xdb,0xb2,0xbb,0xec,0x78,0x6f,0xcf,0xcd,0x96,0x16,0xf4,0x82,0x56,0xd6,0xa0,0x0c,0x7f,0xb8,0x3b,0xa7,0x4d,0xc4,0x1c,0x6c,0x8f,0xa4,0xe7,0xd2,0x35,0x43,0x17,0xd0,0x0a,0x56,0xc3,0xa6,0xd6,0xf6,0x27,0x95,0xf1 .byte 0xa6,0x9d,0x5c,0x9c,0xb4,0x41,0x36,0xb5,0x36,0xcc,0xcb,0xbf,0x89,0xbc,0x63,0x21,0x7e,0x08,0x9c,0xdb,0x3f,0x60,0x7d,0x00,0xd0,0xbd,0xb0,0x20,0x2e,0xca,0x82,0x05,0xf0,0xff,0x57,0x56,0xc4,0x4e,0x50,0x58,0x5b,0x54,0x43,0x30,0x90,0x9a,0xf5,0x37,0x34,0x08,0xd7,0x57,0xc8,0x17,0x03,0x42,0x0d,0x42,0x04,0xaa,0xdb,0xc7,0xa7,0xdc .byte 0x7b,0x10,0xc3,0x87,0x6c,0x0d,0x8d,0x43,0x1b,0x50,0xfa,0x71,0x2e,0x76,0x5f,0x27,0x73,0x0b,0x7f,0x01,0x28,0xb4,0xea,0x3a,0x1e,0x04,0x74,0xb4,0x18,0xa0,0xdd,0x8d,0x41,0x1a,0x20,0x09,0x11,0x9e,0x02,0xe4,0x50,0x37,0xb0,0x20,0x49,0x69,0xfb,0x30,0x82,0xd5,0x03,0x88,0x9b,0x03,0xa0,0x92,0xb1,0x51,0x63,0xcb,0x6a,0x4f,0xa4,0x74 .byte 0xc9,0x93,0xed,0x13,0x3c,0x6a,0xdc,0x43,0x57,0x87,0x56,0xb8,0xe3,0x30,0x4f,0x63,0x2d,0x7b,0x23,0x8e,0xe3,0x80,0x30,0x03,0x62,0x59,0x9b,0xbd,0xbe,0xc5,0xa9,0x40,0xbd,0x01,0xac,0x2f,0xbf,0x90,0x46,0x30,0x53,0x20,0x74,0x45,0xe4,0x21,0x17,0x72,0x54,0x7f,0x4d,0x90,0xd8,0x72,0x7f,0x7b,0x6c,0x83,0x5b,0x00,0xa6,0x17,0x7d,0x42 .byte 0x60,0xb5,0xd1,0x0b,0xf2,0x57,0xb4,0x13,0x45,0x7d,0xe4,0x9b,0x29,0x12,0x1b,0x29,0x76,0xd0,0xc0,0x59,0x9f,0x1e,0xa2,0xd7,0x76,0x05,0xe5,0x42,0x73,0x65,0xd3,0xb0,0x58,0x18,0x7a,0x00,0x4c,0xdb,0x0f,0xb2,0xb0,0xb4,0x4c,0xef,0x59,0xfd,0x20,0xca,0x45,0x51,0x82,0xf6,0x4d,0x20,0x96,0x5c,0x11,0x7f,0x33,0x67,0x38,0xea,0x1b,0x1a .byte 0x10,0x9f,0x60,0x6a,0xe1,0xd3,0x77,0x27,0x1d,0x5d,0x29,0x3c,0x55,0xc3,0x34,0x51,0x37,0x0d,0xe2,0x55,0xf9,0xc3,0xb9,0x7f,0x06,0x68,0x07,0x84,0x05,0x18,0x18,0x64,0xfb,0x44,0xc7,0x62,0x22,0xdb,0x23,0xb3,0x70,0x40,0x73,0xf7,0x3e,0xa7,0xd7,0xe5,0x40,0xad,0xa7,0x54,0x18,0x41,0x95,0x56,0xda,0x80,0xe4,0x5e,0xca,0x0b,0x15,0x6d .byte 0xc1,0xf5,0xf6,0x30,0x08,0x30,0x21,0x81,0x1c,0x27,0x62,0x2e,0x1a,0xde,0xf9,0x2c,0xec,0x4f,0x70,0x3a,0x6b,0x63,0x1a,0xbb,0x99,0x1b,0xb4,0x82,0xc5,0x81,0xef,0xc3,0x6f,0x12,0xf4,0x22,0xc4,0x32,0x11,0x11,0xba,0x56,0x71,0x47,0x10,0xd7,0xf7,0xe8,0x5b,0x07,0xb6,0x2f,0xa9,0xa9,0xfd,0x4d,0x42,0xe8,0xb7,0x2a,0xbf,0x93,0xb1,0xef .byte 0x09,0x8e,0xa3,0x6b,0x40,0xcc,0xb1,0x63,0x10,0xb7,0x8f,0x9e,0xd1,0x02,0x2b,0x86,0x86,0xbf,0x44,0x89,0x22,0xf9,0xe5,0xf7,0xad,0x10,0xda,0xd8,0xdf,0xef,0xa0,0x98,0x42,0xad,0x21,0xa8,0x42,0x6f,0x47,0x08,0xf2,0x62,0x9e,0x2b,0xaf,0xc2,0xac,0x71,0x3d,0xd6,0x43,0x65,0x85,0x60,0x17,0xc6,0xa2,0xa2,0x3a,0xd9,0x34,0xeb,0x0b,0x6d .byte 0x04,0xf7,0x6f,0xa5,0x39,0xf5,0xfa,0x71,0x58,0x9d,0xe9,0xe5,0x44,0x8c,0xd3,0xf0,0x62,0x8a,0x2f,0x73,0xf6,0xab,0xf4,0x09,0xe1,0xd1,0x23,0x0f,0x7c,0x5c,0x63,0xa4,0x34,0x26,0xeb,0xca,0xe5,0x96,0x1c,0x31,0x61,0xcc,0xa1,0x1f,0x95,0x9c,0xd9,0xb5,0x2d,0x19,0x9e,0x9a,0x5d,0x99,0x4f,0x78,0xb7,0x7a,0x36,0xde,0x3c,0x77,0xe3,0xb8 .byte 0x55,0xcc,0x27,0x14,0xc3,0x69,0xf9,0x23,0xea,0xc6,0x07,0x12,0x94,0xc9,0x1e,0x28,0xab,0xaa,0xf3,0x28,0x35,0x8c,0xb5,0xa4,0x8d,0x1d,0xa6,0xa3,0xb0,0xfe,0xca,0x8e,0x44,0xd1,0x96,0x47,0xf3,0x04,0x77,0xea,0x9e,0xbc,0xaf,0xda,0xed,0x77,0x6b,0x80,0x9d,0x32,0x4f,0xff,0xda,0xd6,0x61,0x1f,0x57,0x66,0xa7,0xfb,0x54,0x78,0x0a,0x43 .byte 0xaf,0xf7,0x31,0x47,0xd9,0xf4,0x6e,0x70,0x9f,0x1c,0xe0,0x71,0xba,0x11,0x2a,0x0e,0x83,0xba,0xa2,0xc4,0x8b,0x64,0x1e,0xcf,0x17,0xfc,0xb5,0x72,0xa3,0x4e,0x03,0xc7,0x6f,0xa6,0xf6,0x6f,0xe7,0xb7,0x09,0x1a,0x6f,0x09,0xa6,0x45,0xd5,0x20,0x2f,0xbd,0x5a,0xc8,0xae,0x02,0xf3,0x00,0xf7,0xb4,0xd9,0x05,0x38,0x23,0x64,0x27,0x0b,0x27 .byte 0xc3,0x54,0xea,0x6f,0x85,0x68,0x10,0xa8,0xcd,0xb6,0xf3,0xb6,0x7a,0x55,0xba,0x7e,0x5f,0x6d,0x0e,0x33,0xf3,0x98,0xef,0xd3,0x9b,0x30,0x5c,0x2b,0xd3,0x10,0x89,0xe7,0x34,0x95,0x4f,0x58,0xb5,0xe6,0x7f,0x84,0x3f,0x71,0x3b,0xae,0xc7,0xcd,0x2e,0x93,0xff,0x72,0x33,0x6f,0xf7,0x8b,0x25,0xd4,0x48,0xa4,0x66,0xe9,0xc1,0xe7,0x1a,0xf7 .byte 0x2d,0x63,0x67,0x5e,0x6c,0x96,0x9c,0x93,0x52,0xe9,0x0f,0xf6,0x1a,0x78,0xa9,0xa0,0xa1,0x96,0x95,0x49,0x69,0xfd,0x78,0xf6,0x65,0x49,0xc6,0x1c,0x44,0x3d,0xbd,0xb5,0x04,0x5f,0xaf,0x69,0x1c,0x3e,0xc1,0xea,0x53,0x3b,0x2e,0x40,0x61,0xf2,0x66,0x24,0x90,0x4a,0x86,0xf0,0x74,0xec,0xdb,0x95,0x68,0x9e,0x83,0x11,0xfc,0x5a,0x51,0x66 .byte 0x51,0x09,0x71,0x6c,0x32,0xbe,0x5d,0x1d,0x04,0xb2,0xba,0x90,0xfa,0xcb,0xd5,0xa4,0xa7,0x26,0x4e,0xe1,0x1e,0x32,0x7c,0x18,0x40,0x6d,0x40,0xed,0x8d,0xcc,0xa3,0x8a,0xc2,0x29,0x73,0x73,0x94,0x0b,0x09,0x43,0xd4,0x2c,0x0f,0xc5,0x92,0x3c,0x47,0x25,0x41,0x96,0xa6,0x2b,0xb0,0xae,0x98,0x82,0x72,0xd3,0x2f,0x7f,0xcc,0x2a,0x22,0x18 .byte 0xaf,0x07,0xfc,0x64,0x9f,0x72,0x4d,0x61,0x88,0x59,0x6f,0xaa,0x27,0x8d,0x42,0x21,0x5f,0x25,0xbe,0xa3,0x29,0x4d,0x06,0x2d,0xd5,0xaa,0xb3,0xb5,0xbe,0xa5,0x6c,0x1e,0xdb,0x2e,0xb2,0xc0,0x9d,0x03,0x0f,0xce,0xfa,0xc6,0x45,0xff,0xac,0xc8,0x22,0xb6,0x90,0x40,0x88,0xae,0xc0,0x9e,0xcb,0xf2,0x2b,0xa3,0x74,0x34,0xe1,0xb0,0xe3,0xdb .byte 0x46,0x88,0xb8,0x67,0x24,0x6b,0x53,0xf7,0x18,0x2e,0x52,0x44,0x24,0x23,0x4d,0x33,0x94,0x4d,0x58,0x47,0x0e,0xcc,0xae,0x46,0x56,0x49,0x76,0xfc,0x62,0x9e,0x3d,0x05,0x14,0xe7,0xaa,0x1a,0x44,0x8b,0x02,0x0c,0x8a,0x8b,0x9c,0x5b,0x8d,0x99,0x10,0xb3,0x4a,0x8d,0x9c,0x5f,0x9f,0xe9,0x35,0x10,0x67,0x1a,0xfe,0x1f,0xb9,0x5e,0x02,0xeb .byte 0x05,0xe2,0xbe,0xa6,0xea,0x81,0x64,0x2d,0x8e,0x8b,0xf4,0xe5,0x02,0x98,0x21,0xa9,0x9d,0xc7,0xc1,0x4b,0x74,0x33,0x8a,0x1e,0x7b,0xbc,0x15,0x27,0xda,0xe8,0x35,0xa5,0x36,0xa5,0xe4,0xad,0x1c,0xa0,0x7c,0x1d,0xc9,0x1e,0x7e,0x88,0xa7,0x59,0x88,0x1c,0xb6,0x0a,0x07,0x94,0xbb,0x5d,0xa1,0x00,0xdd,0x85,0x70,0xac,0x60,0xcb,0xc8,0x70 .byte 0x2c,0x8f,0x4e,0x2e,0x85,0xdf,0xf4,0x6d,0x78,0x16,0x03,0x50,0xed,0xe8,0x13,0x79,0x64,0x89,0xf7,0xf0,0x42,0xf6,0xc9,0x78,0xe6,0x23,0x36,0xdd,0xaf,0x13,0xee,0xc4,0x94,0x81,0xc3,0x68,0xe8,0x88,0xb3,0xd4,0x16,0x05,0x43,0x52,0xab,0x60,0x8f,0x04,0xee,0x9c,0xb3,0x22,0x63,0x25,0xe0,0x9d,0xd3,0xc0,0xa4,0x79,0x75,0xac,0xba,0x16 .byte 0xea,0x43,0x18,0x9c,0x9a,0x9a,0x9b,0xbf,0x51,0xa0,0xd1,0xf2,0x64,0x0d,0x3c,0x8f,0xaa,0xb2,0x25,0x30,0x35,0xf9,0x87,0xf8,0x1d,0xc2,0xbd,0x3a,0xa1,0x28,0xb7,0xaa,0x55,0xc0,0x79,0xc8,0xb4,0x21,0x8e,0x44,0x7e,0xc1,0xd5,0x7f,0xe8,0x18,0xfc,0xab,0xff,0x22,0x6d,0xc8,0x25,0x8a,0xe0,0x96,0xa4,0xf2,0xde,0x49,0xf2,0x4c,0xfe,0x5b .byte 0x56,0x3b,0xa0,0x35,0x5e,0xbe,0xf7,0x47,0x66,0xff,0x62,0xfb,0xe9,0x27,0xd6,0x0a,0x98,0x99,0xb7,0x76,0xe8,0x67,0x05,0x70,0xd5,0x43,0xcd,0x28,0x9b,0xf5,0x9f,0xa4,0x80,0x31,0x1a,0x02,0xd6,0x67,0x05,0x61,0xd0,0xcb,0x15,0xe0,0xec,0xe3,0x41,0x53,0xb0,0x0f,0x21,0x65,0x56,0x47,0x49,0x9f,0x16,0x29,0x1a,0xca,0xe0,0x50,0x54,0xd2 .byte 0x46,0x9b,0xae,0x68,0x06,0x61,0x0b,0xd7,0x46,0x93,0x79,0x06,0x0a,0xc9,0xc5,0x8f,0x33,0xfe,0x63,0xf8,0x2d,0x87,0xa6,0x95,0x01,0x87,0x2c,0x15,0xd3,0xbc,0x03,0x02,0x7f,0x75,0xf1,0xbe,0x78,0xe2,0x8b,0x03,0x6a,0xea,0xb1,0x74,0xd3,0xc7,0xef,0x2e,0x8b,0xa2,0xd9,0xe3,0x8e,0xfd,0x6a,0x1a,0x6b,0xf5,0x9f,0x5b,0x9c,0x9b,0x78,0x58 .byte 0x81,0xba,0xb0,0x63,0x5e,0xd4,0x36,0xe1,0xd4,0xb4,0x9d,0x90,0x77,0x08,0xc7,0xc8,0x09,0x64,0x54,0x35,0x16,0xc6,0x9c,0xe2,0xc2,0x40,0x39,0x00,0x65,0x8d,0x7d,0x90,0x9b,0xdb,0xb3,0xac,0xe8,0x17,0xe3,0x78,0x4a,0x26,0x42,0xf8,0xb8,0xb8,0x3b,0x55,0x7f,0x8d,0xed,0xee,0x88,0xaa,0xa7,0x05,0xa9,0x72,0xc1,0x58,0x21,0x1b,0x9e,0x6f .byte 0xf2,0xf3,0x8d,0x72,0x8c,0x3a,0xab,0x21,0x8d,0xcb,0x33,0x53,0xa1,0x9c,0x6d,0x41,0xef,0xf8,0xae,0xcf,0x0c,0xf7,0xca,0x7f,0x38,0x17,0x28,0xa4,0xab,0xb5,0xf4,0x5d,0x96,0xf4,0x36,0x13,0x50,0xb6,0xe5,0x9a,0xeb,0x3f,0xe2,0x64,0x94,0xc0,0xd5,0x9c,0x60,0x87,0xff,0xf5,0x8a,0x60,0x83,0x3d,0x02,0xfc,0x7f,0xc0,0x20,0x24,0x4e,0x0c .byte 0xf3,0x31,0x1d,0x07,0x67,0x90,0xa6,0xbd,0x1f,0x6e,0xb0,0xbd,0x24,0x53,0x31,0x50,0x72,0xdb,0xb1,0xdd,0xb2,0xfd,0x77,0x68,0x75,0x7a,0x7d,0x66,0x52,0x40,0xab,0x48,0x5a,0xf2,0x94,0xc6,0x54,0xcf,0xfe,0x2a,0xe7,0x80,0x67,0x34,0x93,0x72,0x85,0x6c,0x48,0x1c,0x00,0x62,0xf8,0x6f,0x2e,0xb1,0x85,0x42,0x5b,0x6b,0xe8,0xf5,0x69,0x05 .byte 0xaf,0x59,0x1a,0x43,0x0a,0xfe,0x49,0x8c,0x35,0xbc,0xf7,0xb8,0x2d,0x9c,0x89,0x64,0x37,0x5e,0xfa,0x05,0x15,0x9d,0x3c,0x80,0xc4,0x41,0x5a,0x00,0xcb,0xdc,0x9c,0x60,0xfe,0x3a,0x2e,0x45,0x16,0xb3,0x4b,0x81,0xbb,0xed,0xfe,0x09,0x99,0x0b,0xb3,0x13,0xa4,0x36,0xe0,0xe0,0xaa,0x5f,0x7b,0x76,0x7c,0x64,0x54,0x85,0x53,0xf7,0x82,0x8c .byte 0x8d,0xc6,0xf2,0x89,0xc6,0x26,0xa3,0x9b,0x26,0x2a,0xbe,0xed,0x39,0xcf,0x4a,0x16,0xec,0x75,0xca,0x08,0x3a,0x2a,0x1b,0x29,0x27,0x71,0x41,0xe2,0xd2,0x83,0xa0,0xd5,0x20,0x28,0x92,0xb8,0xbd,0xe5,0x3d,0x45,0x94,0x5f,0x83,0x70,0xb0,0x44,0x14,0x05,0xac,0xc3,0x88,0xad,0xe6,0x6a,0x95,0x7f,0x63,0x5d,0xb8,0x2d,0x0f,0x08,0x50,0x1e .byte 0xc2,0x28,0x20,0xcf,0x35,0xd9,0x37,0x72,0x97,0x03,0x33,0x7a,0x28,0xf4,0x96,0x6d,0x77,0xb7,0x1d,0xd8,0x67,0xf4,0xce,0xd8,0x2c,0xd6,0x84,0xc0,0xcf,0x56,0xb4,0xe1,0xdd,0xbb,0xbc,0xf2,0x72,0xff,0x69,0x4c,0x16,0x45,0x58,0x99,0x82,0x69,0x7a,0x86,0xa3,0xe2,0xdd,0x16,0xd2,0x65,0x65,0x7f,0x7e,0x55,0x54,0x16,0xda,0xfe,0x3a,0x49 .byte 0xfa,0x9e,0x0f,0xfa,0xdc,0x1c,0x25,0x46,0xa9,0xca,0x4f,0xf7,0x15,0x2c,0xd2,0xe2,0xf4,0x79,0x0f,0xb5,0x61,0x0a,0xb3,0xbb,0x2a,0x9e,0xa1,0xf7,0x9b,0x85,0xa7,0xb9,0xf3,0x36,0x29,0x4e,0x5d,0xee,0xab,0x46,0x9f,0xf8,0x4a,0xf7,0xbe,0x9b,0x51,0x1b,0x55,0x1b,0x91,0x78,0x06,0xbf,0x2c,0xec,0x3d,0xcc,0xe0,0x89,0x99,0xf9,0xea,0xc4 .byte 0x94,0x92,0x12,0x1e,0xa9,0x1b,0x4f,0x7d,0xd0,0xd8,0xc1,0x6f,0xcd,0x6e,0x51,0x3a,0xb1,0xab,0x04,0x32,0xbe,0xa7,0x57,0xf3,0x5c,0x08,0x30,0xef,0x02,0x11,0x8e,0x55,0x9a,0x62,0x7a,0x4c,0x54,0x9e,0xc0,0x30,0x8e,0x24,0xc2,0x38,0x83,0x4d,0xd1,0x66,0x2a,0x86,0x40,0x70,0x7c,0xb3,0xf8,0x85,0x3b,0x3c,0x98,0xe3,0x7a,0x54,0xb8,0xf5 .byte 0xf4,0xda,0x5e,0x43,0xfb,0x44,0x74,0xe7,0x81,0x82,0xfe,0xa6,0x2f,0xb0,0x18,0x3e,0x17,0xd3,0xfc,0xe7,0xbd,0x5e,0xf0,0x69,0x0f,0x70,0x78,0x95,0x18,0xcb,0xde,0x44,0xa3,0xf4,0xa2,0x05,0xac,0x70,0xcb,0x89,0xbc,0x24,0x53,0x1f,0xfe,0x0e,0xa7,0x4e,0x67,0xab,0x48,0x6d,0xbe,0x77,0xe0,0xa5,0x46,0xcb,0x06,0x70,0x99,0xa9,0x40,0xd7 .byte 0x9e,0xd9,0xc3,0xff,0x86,0xca,0x0c,0x29,0x72,0x90,0x9b,0x72,0xc7,0xd3,0x51,0x23,0x8c,0xca,0xa2,0xdf,0x4f,0x01,0xb5,0x56,0xa4,0x99,0x6f,0xb2,0x57,0x5f,0x67,0x84,0x99,0xce,0xd9,0x86,0x25,0x82,0x53,0x15,0xb0,0x37,0x19,0xfa,0xad,0x9e,0x76,0x52,0xa0,0xb2,0xbd,0xc5,0x1f,0xee,0xdb,0x2d,0x0d,0xea,0x1d,0x3c,0xb4,0x5c,0xfe,0xfb .byte 0x95,0xea,0x56,0x65,0x9f,0xca,0xa0,0xd6,0xe3,0x2c,0xb5,0xd1,0x12,0x38,0xca,0x53,0x09,0x76,0x1b,0x77,0xb0,0x0b,0x54,0x59,0x38,0xd5,0xe9,0x08,0xa9,0x17,0x1c,0x88,0xe8,0x7a,0xd6,0x03,0xee,0x7c,0x46,0x3e,0x3c,0xeb,0x2c,0xa6,0x16,0x7b,0x7d,0xd5,0x30,0xea,0x12,0xfc,0x16,0x5d,0xcd,0xa9,0x73,0xfb,0xba,0xac,0xc6,0x8d,0xe4,0x87 .byte 0x3a,0x46,0x5f,0x35,0x4f,0x8f,0x53,0xe0,0x22,0xd3,0x7b,0x9a,0x2c,0x5e,0x06,0x05,0x1e,0xb1,0x87,0x80,0x75,0xa3,0x4d,0x32,0xc8,0xa0,0xd8,0x41,0x47,0xde,0x01,0x8a,0x56,0x0f,0xf8,0x3e,0x8a,0xde,0x1f,0x1f,0xd9,0xab,0xc2,0xcd,0x9a,0xd7,0xa5,0x2c,0x5c,0x42,0x9f,0x43,0x43,0x75,0x8d,0x1e,0x2b,0xe7,0x1a,0xaf,0x98,0xf4,0xc1,0xab .byte 0xb4,0x1b,0x09,0x89,0x94,0xe3,0x42,0xd4,0xd0,0xdb,0x35,0xdf,0xce,0xb6,0x96,0xb8,0x2b,0xe2,0x51,0xa0,0xdc,0x92,0x3d,0x4c,0x6e,0x69,0xc1,0xe6,0xd5,0xec,0xda,0x51,0xe9,0x54,0x7e,0x56,0xe2,0x47,0xeb,0x37,0xce,0xce,0xbd,0xc2,0xf0,0x97,0x27,0x40,0x66,0x67,0xda,0xdf,0x86,0xcb,0xda,0x5e,0x03,0xe0,0x38,0x54,0x44,0x62,0xfe,0xb2 .byte 0xfa,0xc3,0x6d,0xa5,0x8b,0x89,0xc5,0x84,0xbe,0x86,0x41,0x0c,0x52,0x0c,0x75,0x71,0xf5,0x74,0xed,0x2c,0x01,0xf2,0x55,0xef,0x85,0x14,0x84,0x3b,0x11,0x38,0xda,0xcd,0x59,0x15,0x80,0xd7,0x61,0xe9,0x89,0x3d,0xeb,0xad,0x43,0x44,0x30,0x14,0xe3,0x4d,0xbd,0xc9,0x80,0xdb,0x2d,0xd7,0x40,0x94,0xc7,0x56,0x35,0x62,0x23,0xfb,0x8f,0xe2 .byte 0x87,0x9c,0xd9,0x07,0xc0,0x7e,0xc7,0x74,0x44,0x1d,0x98,0x3b,0xa1,0xa7,0xd1,0x05,0x66,0x69,0x59,0x58,0xc1,0x55,0x2a,0x6e,0x33,0x31,0xc1,0x3e,0xdf,0x03,0x4c,0x9a,0x9d,0xd1,0xff,0x43,0x6a,0x87,0x92,0xd0,0xdf,0x6b,0x51,0x22,0x68,0xa8,0xda,0xe8,0x8c,0xe0,0xb2,0xdc,0x61,0xdf,0x5d,0x08,0x27,0xe8,0xf9,0xdd,0xe8,0xe7,0xe5,0x2b .byte 0x89,0xf3,0x03,0x44,0xe4,0x51,0x8b,0x5a,0x23,0xc2,0x3e,0xde,0x1d,0xa7,0x82,0x66,0xd6,0xb7,0xe6,0xa4,0xc8,0x8a,0x65,0x72,0xe8,0x30,0x77,0x55,0x52,0x78,0x1b,0x9d,0x39,0x2b,0xa0,0x27,0x70,0x39,0xff,0x66,0x49,0x43,0x37,0xd1,0xc1,0x1a,0x95,0xc3,0xa3,0x34,0xad,0xe9,0x34,0x08,0x14,0x5d,0x20,0xbc,0x96,0x7b,0x25,0x44,0xc3,0x5f .byte 0xb8,0x4b,0x82,0x88,0xff,0x9e,0xee,0xec,0x4c,0xd4,0x06,0xb3,0x2f,0xc3,0xe6,0xae,0x0e,0xa8,0xa6,0xb1,0xef,0x16,0xc5,0x82,0x34,0x8e,0x51,0xd1,0xaf,0x9f,0xee,0x33,0x3c,0xa8,0x8c,0x42,0x2f,0xe7,0x40,0x1d,0xbc,0xb7,0x24,0xb0,0xd7,0xa5,0x42,0x7f,0x3f,0x1a,0xe3,0xf8,0x58,0x86,0xe3,0x0b,0x4a,0xe9,0xe3,0x5d,0x09,0x9a,0xb0,0x10 .byte 0x8f,0x00,0xc3,0x5f,0xa2,0xce,0x77,0x01,0x0a,0xae,0x46,0x68,0x65,0xc0,0x2c,0x7e,0x79,0xb1,0x80,0x8a,0x24,0x1a,0x2c,0x34,0xbe,0xa6,0x30,0x41,0xee,0xf5,0xee,0xa0,0xfe,0x47,0x1f,0xf4,0xae,0xd8,0xb3,0xa5,0xdc,0x5a,0xab,0xf6,0xf9,0x64,0xa1,0xe6,0xc2,0x73,0xee,0xf9,0x33,0xdb,0xe4,0xc8,0xa2,0x23,0x48,0x68,0xe2,0x94,0xef,0xc5 .byte 0xe4,0xc7,0x9a,0x18,0x88,0x42,0xed,0xa0,0x2d,0x3d,0x05,0x92,0xe4,0x71,0xf8,0x90,0xd9,0x9e,0xf3,0x74,0x0c,0xa5,0x66,0x4d,0x40,0x8a,0x22,0x8e,0x0d,0x0e,0xfb,0x18,0xc4,0x06,0xed,0x4e,0xcb,0x7b,0xd5,0x6e,0xf0,0xe6,0x0e,0x7e,0x2c,0xe8,0xf1,0xa8,0x41,0x83,0x02,0xf2,0xb2,0xfa,0x5f,0x21,0xb8,0x4e,0x20,0x81,0xbf,0xbe,0x0f,0xd4 .byte 0xc2,0x6e,0x2c,0xfb,0x67,0xcc,0xe7,0x7f,0x24,0x36,0x0e,0xa2,0xf5,0xf5,0x4b,0x80,0xb6,0x7f,0x53,0x09,0x77,0xe1,0x51,0x16,0x92,0xc5,0xa8,0x22,0xa9,0x89,0x11,0xab,0x6b,0x90,0xeb,0x75,0x51,0xe4,0x9d,0x39,0xaa,0xab,0x98,0x21,0x1c,0xa9,0x3a,0x7f,0x04,0x3e,0xfd,0xa6,0xa3,0x91,0xa8,0x51,0xfe,0x30,0x26,0x2e,0x44,0xde,0x5d,0x41 .byte 0x91,0x35,0x65,0x5d,0x17,0x1e,0x71,0xb5,0xc5,0xb9,0x3c,0x3a,0xcc,0x06,0xa2,0x2b,0xef,0x02,0xe4,0x0e,0x42,0x82,0x4d,0x2b,0x91,0x9a,0x38,0x49,0xc6,0xba,0x15,0x08,0x2c,0xe6,0x38,0x10,0x06,0xbe,0x59,0xa0,0xf7,0x78,0xbb,0xc3,0x4c,0x4b,0xe8,0x14,0x0f,0x7d,0x92,0x14,0x34,0x67,0x17,0x37,0x49,0xcf,0xf4,0x77,0xc2,0x41,0x47,0x16 .byte 0x70,0x63,0x38,0x81,0xe0,0x2b,0x8b,0xfe,0x15,0x59,0x0b,0x3f,0xaa,0xf1,0x2d,0x21,0x66,0x85,0x03,0xb7,0x09,0x6f,0x28,0xfa,0xc8,0x09,0x26,0x93,0x0d,0x3b,0xa4,0x96,0xb2,0x87,0x44,0x21,0xb9,0xec,0x30,0xf4,0xb4,0x8a,0x7c,0x84,0x7c,0x47,0xf4,0x01,0x48,0x42,0xa0,0xd0,0xf7,0x52,0xb5,0xdb,0xf9,0x24,0x02,0x7b,0xa8,0x97,0x54,0x89 .byte 0x6a,0x4d,0x5c,0xac,0xfc,0x61,0x69,0x4b,0x79,0x7a,0xae,0x72,0x9f,0x3f,0xea,0x09,0x50,0xd7,0x16,0x1f,0x0d,0x58,0x00,0x02,0x27,0xfd,0x2a,0x52,0x41,0x0d,0x1e,0xf3,0xe3,0x5f,0x93,0x01,0x51,0xc5,0xea,0x11,0x7b,0xd3,0x31,0x8b,0xcc,0x21,0xd7,0x17,0xb4,0x04,0xb8,0x30,0xc0,0xf7,0xf8,0x65,0x23,0x3f,0x8e,0x04,0x62,0x38,0x37,0x09 .byte 0x06,0xde,0xe5,0xfb,0xa5,0x2a,0xc7,0xba,0x52,0x89,0xc6,0x9a,0xb2,0x0c,0xe4,0x89,0x3b,0xe8,0xc2,0x33,0xa4,0x48,0x8d,0x6d,0x35,0x3e,0xbf,0xef,0x15,0x9a,0x05,0x6c,0xdf,0x4f,0xa2,0x96,0xeb,0x75,0xc5,0x26,0x5b,0x9c,0xc8,0x22,0xab,0x8b,0xf9,0xbe,0x2e,0x8e,0x70,0xd2,0x60,0xf6,0x6f,0xa0,0x3f,0x24,0xe4,0x76,0x67,0xa5,0x5d,0x65 .byte 0x9d,0xc7,0x7f,0xab,0x69,0xdd,0xd5,0x5d,0xcc,0xf7,0xab,0x60,0x57,0x18,0x1f,0x1c,0x79,0x2f,0x37,0x44,0x37,0x54,0x13,0xd5,0x7f,0x51,0x5b,0x59,0x1c,0x2b,0x0c,0x43,0xeb,0x05,0x25,0xf4,0xa8,0xbf,0x76,0x7a,0xb4,0xc8,0x54,0x3f,0xe5,0x1b,0xd4,0x85,0x9a,0x6e,0x52,0x49,0x68,0xcd,0x90,0xcc,0xa5,0x36,0x9d,0xa9,0xe8,0x4f,0xc3,0xbd .byte 0x8a,0x83,0x65,0x57,0xe1,0x5f,0x09,0xdc,0xb3,0x06,0x61,0xe0,0x61,0x34,0xf7,0x72,0xaa,0xb2,0x14,0xfe,0xf7,0xae,0xb4,0x59,0x90,0x83,0x64,0xc0,0x64,0xe5,0x1d,0x35,0x7b,0x40,0xbb,0x20,0xaa,0x63,0xfe,0x7d,0xbb,0xed,0x26,0x93,0x95,0x8a,0x85,0x20,0x98,0x83,0x14,0xec,0xef,0x74,0xb8,0x1e,0x2c,0x6e,0x3d,0x34,0xdc,0x6a,0xd7,0x7f .byte 0x7b,0xdb,0x57,0x15,0x28,0xb2,0xf3,0xa0,0x6b,0x26,0x5d,0xe6,0xd5,0x0d,0x07,0x4d,0xa6,0xc5,0x9b,0x5e,0xbe,0x48,0x0d,0x99,0x91,0x14,0x41,0x3a,0x4c,0xc9,0xef,0x37,0x6c,0x8f,0x4e,0xdc,0x93,0xae,0xb0,0x80,0x70,0x35,0x5e,0x7c,0xee,0x6e,0xb2,0xab,0xc1,0xed,0x30,0x4f,0x90,0x7b,0xfc,0xa3,0xf5,0x12,0x38,0xbf,0x8f,0x54,0x46,0x6d .byte 0x13,0xf4,0x7f,0xcb,0x35,0xfd,0xd0,0xbb,0xe4,0x40,0xb2,0x9a,0x2a,0x5a,0x16,0xe0,0xbc,0x77,0x31,0xa0,0x04,0x71,0x6b,0x1a,0x37,0x7c,0xdf,0x68,0x02,0x43,0x73,0x8d,0x53,0xd4,0x58,0x6e,0x05,0x94,0x97,0x45,0xf9,0xb1,0x55,0x7a,0x6a,0x99,0x5c,0x8b,0xb0,0x8e,0x35,0x23,0x5a,0x2d,0xd0,0x3c,0xd1,0x16,0xb6,0x81,0xc3,0x88,0x6b,0x8e .byte 0x2c,0x08,0xf8,0x90,0x6a,0x40,0x7b,0xf5,0x26,0xaa,0xdc,0xa2,0xdd,0x0f,0x38,0x68,0x0c,0xeb,0xe4,0x50,0xfd,0xc6,0x3a,0xd6,0x2b,0x3d,0x59,0x45,0xfb,0x64,0x5e,0x65,0x81,0x0e,0x66,0xed,0xbc,0x49,0x52,0x14,0x51,0x75,0x8c,0x47,0x88,0x76,0x95,0x0b,0x2e,0x02,0x3d,0xce,0x20,0x83,0x34,0x56,0xfe,0xf8,0x50,0x7d,0x9a,0x93,0xb5,0x0f .byte 0x88,0x0a,0xea,0x7e,0x50,0x98,0xdf,0x93,0x5d,0xa9,0xba,0x1c,0x6f,0x58,0x8d,0xb0,0x7a,0x37,0x86,0xba,0x49,0x12,0x35,0x99,0x16,0x6a,0x1d,0x02,0x03,0xfc,0xef,0x7a,0x4a,0x8e,0x54,0x7b,0xc4,0xd4,0x6b,0x6c,0xe5,0x7c,0xc0,0xa9,0x20,0x26,0x6f,0x2e,0x71,0xb9,0x6b,0x3e,0x26,0x9e,0x02,0x7a,0xeb,0x87,0x6b,0xf2,0xc1,0x8e,0x8f,0xe8 .byte 0x26,0x23,0x86,0xcd,0xdc,0x8f,0xbd,0xe9,0xeb,0x80,0x7f,0x0d,0xbd,0x8f,0x05,0x3c,0xa7,0xbc,0x0b,0x9c,0x03,0xb7,0x82,0xbd,0xc7,0x7a,0xd5,0x4d,0xb0,0x0d,0xd1,0xac,0xba,0x90,0x3e,0xa1,0xef,0x79,0xfc,0x50,0x7d,0xbf,0x8c,0x52,0x13,0x6c,0x91,0x9e,0xb4,0x2b,0xa8,0x96,0x95,0x04,0xe6,0x2e,0x17,0x43,0x43,0x23,0x91,0x63,0xd4,0x1a .byte 0xe2,0xb7,0x16,0xdf,0x3a,0x39,0xca,0x80,0x92,0x0a,0x00,0x52,0x50,0x75,0xde,0x1c,0x2e,0x91,0x0a,0xf2,0x28,0xb8,0x94,0x16,0x2b,0x0c,0xc0,0x11,0xc4,0x47,0x35,0x4f,0x59,0x03,0x6f,0xcd,0x99,0x23,0xdc,0x24,0xe5,0x68,0x7f,0x82,0x0c,0x28,0xba,0x57,0xa7,0x7c,0x75,0xd9,0x0d,0x34,0x23,0x7e,0x53,0x61,0xad,0xef,0x63,0xdc,0xa4,0xb0 .byte 0xa0,0xa7,0x54,0xec,0xc9,0xf8,0x80,0x13,0x2c,0xd9,0xc4,0x42,0xec,0xd3,0xd8,0xac,0x04,0xa1,0x61,0x5a,0xdd,0x3e,0xa5,0x29,0x70,0x8f,0xa3,0x44,0x04,0x14,0x7d,0x2b,0x34,0x38,0x89,0x53,0xf4,0x89,0x5a,0x9b,0xa2,0xf5,0x30,0x0b,0x17,0x0a,0xda,0x4e,0x9c,0xca,0xb6,0xa8,0xbb,0x0a,0x1b,0xa0,0x48,0x6d,0x85,0x48,0x70,0x7b,0x98,0xbd .byte 0x82,0x09,0x1f,0xbf,0xf9,0xe7,0xe7,0x4a,0x9e,0xa6,0x9a,0xf4,0x61,0xd7,0xfa,0x45,0x3e,0xd6,0x29,0xf7,0x4c,0x23,0x32,0x76,0x56,0x2d,0xa7,0x88,0xc5,0x63,0xc0,0x99,0x69,0x85,0x69,0x98,0x1d,0xfb,0x8f,0x5a,0x2c,0x0d,0xd8,0x44,0xae,0x12,0xff,0x28,0xa2,0x12,0x12,0x05,0xe2,0xb9,0x06,0x38,0xfb,0x0b,0x1e,0x5f,0x38,0x04,0x37,0xe6 .byte 0x1b,0x87,0xe2,0xaf,0x7a,0x01,0x34,0x72,0xc0,0xf6,0x36,0x6c,0x62,0x22,0x5f,0xdd,0x22,0xb9,0xef,0x15,0x51,0x76,0xaa,0x18,0xa9,0xba,0xc0,0x4d,0x5b,0x72,0x73,0xcd,0x25,0x79,0xc0,0x81,0xdd,0x38,0xab,0x75,0x9f,0x53,0xe6,0xfd,0xbe,0x94,0x99,0xac,0x93,0xb6,0x85,0x96,0x04,0xc2,0xf2,0x52,0xbc,0x3b,0x47,0x91,0xdd,0xa0,0x36,0xbe .byte 0x63,0x70,0x72,0x55,0x61,0xc0,0x2c,0x09,0x16,0xa5,0xc9,0xaa,0x1f,0x0e,0x62,0xae,0x3c,0xf0,0xf2,0xa6,0xd2,0xd1,0xaa,0xdb,0xc1,0x75,0xfd,0x55,0x8c,0x99,0xd1,0x07,0xb7,0xd4,0x0e,0x24,0x89,0x0f,0xc8,0x05,0xe4,0x2e,0x20,0x8a,0x56,0x26,0xe0,0x24,0x0f,0xf8,0xc6,0xc5,0x17,0xcc,0xac,0x4e,0xbe,0x03,0x81,0xe2,0xd5,0x9c,0x33,0x5f .byte 0x86,0xb2,0xc4,0x66,0x08,0x78,0xc2,0x41,0x91,0x1e,0xa2,0x66,0xfb,0x12,0x24,0x41,0x5f,0x34,0x73,0xc7,0x9d,0x4b,0xaa,0x19,0x8e,0x6b,0x42,0x17,0x97,0x96,0xef,0x2b,0xb6,0x33,0xaf,0xe4,0x86,0xd0,0x68,0x57,0xf3,0x75,0x65,0x72,0x90,0x36,0xb0,0x18,0xba,0xcf,0x98,0x25,0xe7,0x81,0x42,0xfc,0x1b,0x6a,0x34,0x08,0xa5,0x41,0xb6,0x22 .byte 0x49,0x27,0x8f,0xd1,0xa1,0xda,0x01,0x88,0x9a,0x0c,0xd7,0x48,0xf4,0xbb,0xa0,0x79,0x91,0x6b,0x41,0x46,0x1c,0x2e,0xc7,0x4f,0x18,0xcc,0x11,0x20,0x84,0xc7,0xfe,0x2c,0x3a,0xf6,0x15,0xdf,0xcd,0x8b,0x69,0xda,0xd0,0xd8,0x2d,0xf6,0x7b,0x82,0x7b,0x65,0xcb,0x6a,0x3d,0x20,0x8b,0x35,0xe5,0x6f,0x69,0xa4,0x8d,0x76,0x96,0xe6,0x70,0x67 .byte 0xa2,0xca,0x56,0x23,0x0e,0x3c,0x62,0x47,0x36,0xb4,0xd5,0x79,0xa4,0x4e,0x35,0xa8,0x1a,0x46,0x7a,0x78,0x6d,0x9a,0xd9,0xbc,0x90,0xff,0xa8,0xb0,0x13,0x1d,0x42,0xb2,0xf2,0xa9,0xc4,0x0c,0x8e,0x16,0x1c,0x60,0xcf,0x3d,0xfe,0x5e,0xbb,0x7c,0xe5,0xd5,0x3c,0xb3,0x32,0x86,0xcb,0xa4,0xff,0xe5,0x9b,0x26,0xf7,0xc2,0x5a,0x3f,0xa0,0x9d .byte 0x2d,0x2d,0xb5,0x4a,0x08,0x80,0xf4,0x04,0xf8,0x85,0x0c,0xed,0x52,0x75,0xab,0xbb,0x4b,0x16,0xf7,0xa8,0x21,0xa9,0x47,0x80,0x9c,0x54,0xee,0x8f,0x77,0xb1,0x93,0xd4,0x11,0x52,0x3d,0xe7,0xa5,0x30,0x8d,0x9e,0xef,0x82,0x93,0x5e,0x62,0xdb,0x52,0x64,0x8c,0x3a,0x0f,0x9a,0xfa,0x0c,0x9c,0x54,0x5d,0x7c,0xd6,0xc3,0xf6,0xca,0xe6,0x60 .byte 0x15,0xbd,0x97,0xac,0x0e,0x54,0x5e,0x9a,0x2c,0x58,0xd1,0x87,0xcd,0x36,0xef,0x0d,0x87,0xf8,0x57,0x3e,0x95,0x1c,0x9c,0xac,0x76,0xb9,0x63,0x17,0x6a,0x20,0x94,0xcf,0x2b,0xb2,0xa4,0x2c,0x67,0x31,0x92,0x31,0x76,0xc6,0x89,0xbd,0xd6,0xa5,0xd1,0x36,0x42,0xc7,0xb4,0x92,0x83,0xb1,0xb5,0xd8,0xa0,0x77,0xc8,0xd5,0x24,0x57,0x98,0xd8 .byte 0x18,0x9a,0xe5,0x5c,0xfa,0xe0,0x29,0xfe,0x18,0x4d,0x67,0xaf,0x6b,0x51,0xdc,0xaa,0xc5,0x05,0x3d,0xe7,0xda,0x81,0x66,0xc1,0x93,0x78,0x70,0x9a,0x4a,0xbe,0x32,0x0d,0x92,0x28,0x5a,0x1e,0xf3,0x53,0x1c,0x1a,0x5c,0x08,0x42,0xe4,0xc0,0x83,0xb0,0x89,0x19,0xd9,0xeb,0xf8,0xf3,0x60,0x4c,0xce,0x78,0x2d,0x05,0x21,0xd3,0xea,0xdb,0xc4 .byte 0x35,0xcb,0xe7,0x08,0x03,0xec,0x4c,0x32,0xcf,0x51,0xae,0x01,0x47,0xe9,0xaa,0x0d,0x69,0x9a,0xf0,0x5e,0x30,0x78,0xa5,0x49,0xdf,0x1e,0x4c,0xa5,0x86,0xb3,0x8a,0xf4,0x14,0x4a,0x9a,0xf7,0x22,0xd0,0x90,0x1f,0x1f,0xe3,0x57,0x6c,0xdb,0x83,0xea,0x74,0xd6,0xd3,0x62,0x19,0x02,0x93,0x6b,0x32,0x62,0x8b,0xd0,0xa5,0x21,0xaa,0x8f,0x7f .byte 0x36,0xc4,0x9c,0x1f,0x61,0x3a,0xd8,0xab,0x92,0xd3,0x09,0xe3,0xad,0xcc,0xdc,0x0d,0x04,0xaf,0xa7,0x57,0xff,0x3a,0x5e,0x50,0x7d,0x96,0x6d,0xcf,0x87,0x17,0x0a,0xec,0x70,0x9a,0xb0,0x98,0xa8,0xe4,0xf5,0x32,0x09,0x76,0xf3,0x59,0x50,0x48,0x34,0x25,0x14,0xef,0x85,0x45,0x1e,0xb8,0x1f,0x66,0x6b,0x45,0x6a,0xfa,0xd4,0x48,0xd2,0x59 .byte 0xd7,0x4c,0xf3,0x27,0x43,0x3d,0xf7,0x69,0x7f,0x64,0x8d,0xf3,0x55,0x82,0x05,0x5c,0xef,0x89,0x29,0x2c,0x35,0x22,0x8b,0xce,0x2f,0xcf,0xca,0x55,0x04,0x39,0xa0,0xda,0x37,0x3c,0xdd,0x32,0x99,0x8e,0xc7,0xcc,0x87,0x4a,0x47,0xd8,0xb2,0x9a,0x30,0x43,0x5c,0xe5,0xc7,0x44,0x87,0x9e,0x19,0x29,0xff,0xc8,0xea,0x43,0x87,0xf6,0xf3,0x3b .byte 0x4e,0x1c,0xff,0xf3,0xd2,0x6b,0x04,0x03,0x52,0x83,0x97,0x59,0x4e,0x57,0x7b,0x8d,0x5d,0x8a,0xa7,0x7c,0xc1,0x88,0x52,0x7c,0x13,0xda,0x7e,0x80,0x64,0x03,0x30,0x83,0xbc,0xd1,0x3e,0x79,0xee,0xd4,0x23,0xc8,0xe5,0x5c,0xf1,0x3b,0xa5,0x1e,0xa4,0x0d,0x20,0x8f,0x8b,0x87,0x18,0x63,0x7e,0x6c,0x17,0x1b,0x01,0x0b,0xd5,0x47,0x89,0x43 .byte 0x84,0x0d,0x2a,0x80,0x1e,0x54,0xab,0x8a,0x0c,0x94,0xa5,0x0b,0x24,0x5e,0xcd,0xde,0x1c,0x00,0x8f,0x2a,0x29,0x01,0xf5,0xcc,0xca,0x54,0xa1,0xce,0x37,0xef,0xe5,0x4e,0x53,0x8e,0xc1,0x13,0x1a,0x75,0xf7,0x8f,0xec,0xf8,0xe9,0x5c,0xc8,0xe6,0x28,0x89,0x6e,0xb8,0x4b,0x39,0x24,0x73,0x28,0x3d,0x56,0xaf,0x8b,0x3b,0x61,0x70,0xae,0x3b .byte 0xc7,0xe8,0xab,0x47,0xe7,0x16,0xce,0xb8,0xac,0x82,0xac,0x51,0x0b,0x70,0xec,0x6e,0xda,0x0a,0x7e,0x9a,0x6f,0xe1,0xff,0x83,0xb4,0x89,0xec,0x49,0xda,0x48,0xb0,0x3e,0xdb,0x64,0xf6,0x7b,0xc5,0x33,0x02,0x7d,0xae,0x37,0xf1,0x3e,0x03,0x6d,0xf8,0xa3,0x86,0xb3,0xde,0x6a,0x57,0x1b,0xd8,0x85,0xbd,0x9c,0x07,0x84,0xea,0x17,0x4c,0x38 .byte 0x27,0xfe,0x4e,0x2f,0x94,0x09,0xa8,0x7d,0xe0,0x51,0xea,0x6c,0x32,0x2a,0x54,0x2e,0xc1,0xc1,0x21,0x44,0x0b,0x8d,0xc5,0xbd,0x25,0xaf,0xdc,0x45,0x77,0x39,0xbf,0xea,0x60,0x0f,0xb8,0x30,0x74,0xdf,0xd4,0xd6,0x79,0xcf,0x6c,0x2d,0x23,0x21,0xce,0x68,0x16,0x4e,0x9c,0x47,0xc1,0xa7,0x77,0xb8,0x9e,0xe7,0x5c,0x72,0x73,0xab,0xd1,0x56 .byte 0x6e,0x50,0x6d,0xe6,0xd6,0xd3,0x13,0x92,0xed,0x98,0x85,0x4a,0x7d,0xc8,0x9f,0x50,0xb6,0x42,0x9c,0x0a,0x8b,0xc1,0x23,0x46,0x20,0xa9,0xd9,0x20,0x2a,0x38,0x5e,0x39,0xfc,0x46,0x9e,0xbe,0x82,0x5c,0x73,0x33,0x7d,0x8a,0xfd,0x2c,0x1d,0x84,0xa9,0x5e,0x64,0xea,0x3f,0xbf,0x82,0xe4,0xd8,0x70,0xc9,0x7d,0x01,0xca,0x71,0xfb,0x63,0xe8 .byte 0xd8,0x75,0x25,0xd0,0xa3,0x80,0x43,0x8c,0x2a,0x70,0x4f,0x7f,0x04,0x99,0x1d,0xe3,0x73,0x7d,0x6c,0x3f,0xf7,0xf7,0x2f,0xd8,0x0e,0xa4,0x60,0xf6,0x22,0xb1,0xf1,0x2f,0x5a,0x1f,0xd4,0xdb,0xae,0xdb,0x97,0x94,0x16,0xe6,0xd2,0xf2,0xc1,0x9f,0xb8,0xc5,0xb3,0xed,0x41,0x12,0x40,0xe1,0x09,0xaf,0xe3,0x52,0x97,0x63,0xa3,0x41,0x63,0x93 .byte 0x6f,0x6e,0x07,0xa7,0x92,0xa9,0x94,0x60,0x38,0x60,0x1e,0xff,0x05,0x0c,0xed,0xdc,0x78,0xfb,0x6e,0xa4,0x08,0x21,0x31,0xaa,0xf9,0x6f,0xed,0xaf,0xc6,0x5d,0xfe,0xbe,0xab,0x76,0x4f,0x78,0xb9,0xaa,0x21,0x4d,0xdd,0xb2,0x14,0xf5,0x32,0x03,0xa2,0x6e,0x57,0xc6,0x54,0x65,0x81,0x1f,0xdc,0x1a,0xc5,0xba,0xee,0x26,0xa2,0x90,0xc8,0xb6 .byte 0x47,0xc6,0xbb,0x9a,0xaa,0x19,0x72,0x8d,0x19,0xbc,0x21,0xe5,0x93,0x58,0xf8,0x1f,0x00,0x28,0x6f,0x66,0x45,0x5e,0x02,0xeb,0x44,0x69,0x87,0xd1,0x1b,0x73,0xb7,0xc7,0xc8,0xf6,0x20,0x30,0x85,0x77,0xc3,0x2d,0x0e,0x55,0x7d,0x80,0x14,0x50,0xff,0x5e,0x79,0x6b,0x1f,0xff,0x76,0x33,0x7d,0x7d,0x34,0x01,0xaf,0xfb,0x73,0x8a,0x89,0x6d .byte 0x2f,0x0b,0xdb,0xc3,0xea,0x17,0x94,0x06,0x59,0x2e,0x0f,0x34,0x1c,0x75,0x42,0x42,0x83,0xb0,0x18,0xe5,0x6e,0x3c,0x22,0x59,0xce,0x45,0xb8,0x77,0x99,0x92,0x55,0x34,0x45,0x2e,0x04,0x1f,0xd4,0x4f,0x03,0x64,0x92,0x99,0x9c,0x8b,0xd8,0xd7,0x36,0x7c,0xdb,0x2a,0x30,0xb6,0x17,0xba,0x85,0x9d,0x1b,0xc4,0xc7,0x13,0x76,0xe4,0x0b,0xe6 .byte 0x28,0x8a,0x3a,0x7f,0x96,0x27,0x1c,0xea,0x9e,0x06,0x29,0xe2,0x88,0x22,0xd4,0xda,0x0e,0x19,0x3e,0x42,0xea,0x55,0xf3,0x4d,0x3e,0xf6,0x0b,0xcd,0x05,0x0c,0x5d,0x8a,0x46,0x3e,0x7a,0x3c,0x95,0x55,0x42,0x83,0x32,0x4c,0x5f,0x91,0x4e,0x7d,0x0a,0x8a,0x90,0xbe,0x7d,0x01,0xd7,0x4f,0x21,0xe9,0x24,0x25,0xd3,0x76,0xe8,0x54,0x97,0x44 .byte 0xdc,0x7e,0x89,0xe5,0x74,0xc4,0xfe,0x41,0x39,0x95,0x81,0x7e,0x3f,0x4c,0xca,0x84,0x7a,0xb8,0x24,0x3d,0x3c,0x86,0xa1,0x49,0x4c,0xec,0x55,0x59,0x11,0x7d,0x1a,0x2e,0xa3,0x36,0x70,0x36,0x9c,0x69,0x47,0x96,0xc1,0x85,0xb0,0xc5,0x9f,0x85,0x1a,0x5a,0x4e,0x77,0x64,0x91,0x73,0x19,0x41,0x59,0x6a,0xb6,0xae,0x37,0x65,0xa2,0x7d,0x2f .byte 0xef,0x24,0xab,0x48,0xbc,0x20,0x4c,0x57,0x49,0x08,0xc6,0x2f,0x26,0x8c,0xb5,0xa0,0x55,0xf6,0x95,0xfc,0x14,0xb2,0xa3,0x28,0xf1,0x98,0x24,0x67,0xeb,0x7d,0x49,0x6d,0xf2,0x63,0x16,0x99,0xb3,0x67,0xdd,0xd2,0x7e,0xaf,0xcb,0x6c,0x76,0xcd,0x05,0xc8,0x8b,0xec,0x56,0x7d,0x00,0xf9,0x89,0x64,0x15,0xbb,0xa2,0xb8,0x8b,0xdb,0xd2,0x86 .byte 0xaf,0xf7,0x85,0x0a,0x50,0x4c,0xca,0x65,0xc3,0x31,0xca,0xdc,0x81,0xea,0xd3,0x89,0xd8,0xb3,0x91,0x90,0x8c,0x7b,0xff,0x20,0x62,0xac,0xad,0x06,0x47,0xdd,0x22,0xa5,0xb9,0xd0,0x4f,0xee,0x30,0x69,0x51,0x7d,0x7d,0x32,0x4f,0xbb,0x03,0x43,0xec,0x39,0xac,0x8e,0xab,0xcf,0xc2,0x72,0x67,0x68,0x84,0x61,0x3b,0x4d,0x77,0x6b,0xab,0xe9 .byte 0x04,0x9c,0x82,0x46,0xef,0x58,0x92,0x94,0x6c,0x33,0xfa,0x61,0x61,0x15,0xb2,0x4d,0xfc,0x49,0x91,0xad,0x67,0xb2,0x6a,0xa9,0x0c,0x06,0x20,0xc7,0x5e,0xc0,0xd3,0xb0,0x20,0x36,0xd7,0x76,0x7d,0x3c,0x1b,0x6a,0xfa,0xab,0x2d,0xb7,0x1f,0xad,0xb9,0x43,0x45,0x48,0x2b,0x09,0x29,0x80,0x14,0x2d,0x17,0x42,0x4e,0x1d,0x53,0x57,0x67,0xe3 .byte 0xca,0xc7,0x92,0xd1,0x4d,0x07,0xac,0xcf,0x08,0x0e,0xd1,0xd2,0xd5,0xbf,0x18,0x01,0xd2,0x2f,0x79,0x3b,0xd2,0x51,0x7a,0xdc,0x69,0x40,0x51,0x3e,0x57,0xa2,0x3c,0x5f,0x55,0x9b,0xfc,0x0e,0x45,0x96,0xa3,0x8f,0xa2,0x3d,0x64,0x40,0x12,0x07,0x7e,0x0b,0x1d,0x33,0x4f,0xd8,0xd0,0x93,0x8c,0xd9,0x2e,0xd4,0xa9,0xb4,0x08,0x28,0x21,0x52 .byte 0xda,0xd4,0x86,0x19,0x3b,0x71,0xe4,0x37,0x22,0x5b,0x2a,0x8f,0x83,0x9f,0xd6,0x42,0x85,0xc9,0x30,0x4c,0x5d,0xe4,0x14,0xa9,0xec,0x19,0x8e,0x0a,0x0a,0x29,0xe0,0x00,0x23,0x0b,0xbd,0xc2,0xd4,0xe8,0x6a,0xcb,0xf8,0xdf,0xd0,0x50,0x69,0x0d,0x40,0xe9,0x69,0x31,0xfb,0x64,0x4a,0x6b,0x47,0xba,0x24,0x46,0xf1,0x29,0x80,0x0b,0x75,0x92 .byte 0x4e,0x9c,0x59,0xd5,0xf4,0x49,0x32,0x5f,0x92,0xdb,0x1e,0x76,0xa9,0x35,0xe3,0x94,0xcf,0xe8,0x1d,0x47,0x6f,0x82,0xe8,0x75,0xaa,0x41,0xd2,0xa0,0x26,0xfc,0x9d,0x0c,0x02,0x93,0xd5,0xd1,0x14,0x96,0x7c,0xa5,0x9d,0x44,0xec,0x8d,0xa6,0x02,0x17,0x12,0x32,0xb9,0xe4,0x8a,0x91,0xfd,0x23,0xc3,0x64,0x13,0xcd,0x57,0x84,0x8e,0x81,0xb5 .byte 0xa0,0x36,0x22,0x88,0xc0,0x45,0xe5,0xbf,0xb2,0xa6,0xe6,0xa8,0x1c,0xe8,0x8b,0xc8,0x55,0x7f,0xbe,0x45,0x17,0x76,0xe3,0x87,0x67,0x3a,0xd6,0xa0,0x62,0xc1,0x54,0xef,0xaa,0x53,0xd0,0x6d,0x6c,0x33,0xdf,0x7f,0x03,0xa5,0xa3,0x36,0x7d,0xab,0x55,0xbf,0x04,0x43,0xa5,0x59,0xcc,0x6f,0x1c,0xaf,0xfc,0x0e,0x46,0x7f,0x23,0xda,0x89,0xf7 .byte 0x4d,0xe7,0xfe,0x1e,0xb4,0x08,0x7a,0xea,0x61,0xf5,0xcd,0x1f,0xee,0x70,0xe2,0xfb,0xb1,0xe3,0xb1,0x57,0x65,0x29,0xa0,0xa9,0x11,0x20,0xba,0x29,0x2c,0x68,0x37,0x38,0x07,0x9b,0x58,0x20,0x81,0x4e,0x3c,0x07,0x91,0x93,0xf7,0x1c,0x28,0x59,0x72,0x55,0x50,0xe1,0x23,0xca,0x28,0x32,0xa4,0x5b,0xdf,0xc7,0xd2,0x6b,0x3e,0xdc,0x21,0xec .byte 0xe3,0xb7,0xae,0x10,0x4d,0x86,0xa9,0xc7,0x43,0xc2,0x84,0xd8,0xb8,0x5e,0x2c,0x4b,0xf3,0xad,0x4f,0xd0,0x1e,0xe9,0xdd,0x4c,0xcc,0x7a,0x02,0xc2,0x43,0xd0,0x32,0x80,0xc5,0x97,0x05,0xaa,0xef,0x67,0xe2,0xde,0xaf,0xf4,0x41,0xa1,0x98,0xc6,0xe6,0xb6,0x03,0x06,0xec,0x56,0xe7,0x90,0x5e,0xba,0x67,0x4b,0xa1,0x52,0xb4,0xfd,0xa0,0x32 .byte 0x19,0xb5,0x1c,0x8f,0x11,0xc7,0xa7,0xb6,0xa3,0x29,0x83,0x94,0x8f,0x41,0x6b,0xc2,0x60,0xa0,0x3d,0x61,0xe2,0x51,0x2d,0x1f,0xe3,0xa6,0x71,0x72,0x1b,0x3e,0x5b,0xdd,0x0f,0xc4,0xfc,0x3c,0xc1,0xfd,0x2b,0x7b,0x30,0x5c,0x73,0x95,0x53,0x12,0x68,0x22,0x4e,0x71,0xbf,0xbe,0x87,0x67,0xe0,0xc8,0x5d,0x7b,0xd3,0x3b,0xba,0x2a,0xd5,0x5c .byte 0x61,0x92,0x04,0xd2,0x64,0x5b,0xd0,0x04,0x99,0xe3,0x38,0x0a,0x27,0x7b,0xe0,0xf0,0x04,0xa5,0x15,0x8b,0x4b,0x0e,0x20,0x6e,0x22,0x22,0xa6,0x02,0xf2,0x40,0x74,0x6e,0xce,0x8f,0x56,0x42,0xbc,0xd3,0x55,0x9b,0xbb,0xa2,0x8e,0x26,0x84,0xda,0xea,0xf9,0xf6,0xb1,0x1c,0x93,0xe5,0x65,0xb6,0x0c,0x69,0x28,0x83,0x58,0x05,0xc7,0x44,0x66 .byte 0xbc,0x84,0x2a,0xc4,0x8c,0x78,0x80,0xa2,0x62,0x75,0x25,0x32,0x44,0xb8,0xd0,0x5e,0x76,0xc0,0x70,0x3d,0x18,0xb3,0x5c,0xe1,0x18,0xf6,0x08,0xef,0x13,0x97,0x02,0x6a,0x4c,0xac,0x86,0x57,0x0b,0xf2,0x7a,0xdb,0xc0,0xf5,0xf0,0xa1,0xfd,0x48,0x96,0x85,0xac,0x66,0x2d,0x49,0xeb,0x1c,0x56,0x46,0x2f,0x4b,0x01,0x98,0x1e,0xbc,0x74,0x57 .byte 0x6e,0x2e,0x11,0x9a,0xa5,0x94,0x8f,0x02,0x89,0x21,0x52,0x73,0x9a,0x8d,0x0e,0xba,0x7c,0x7c,0x2a,0xbe,0x84,0x36,0x3d,0x4a,0x14,0xb3,0x63,0x71,0x66,0xb6,0xf6,0x1f,0x95,0x73,0xe2,0x4b,0xa9,0xdb,0xe3,0x91,0x06,0xc3,0xfe,0x42,0xa5,0xae,0x60,0x6b,0x59,0xf5,0x25,0x77,0xc1,0x27,0xc0,0xbf,0x48,0xc4,0xe5,0x48,0x44,0xee,0xd4,0x51 .byte 0x25,0x56,0xf8,0x55,0x6a,0x8f,0x73,0xd4,0x9d,0xa1,0x12,0xfc,0x4e,0xb4,0x22,0x07,0x7c,0x90,0xa6,0x47,0x14,0xd0,0x42,0xec,0x74,0xb8,0xed,0x10,0xaf,0x85,0xb5,0x73,0xa2,0x70,0x97,0xee,0xfe,0xdd,0x49,0x65,0x62,0x8e,0x83,0x61,0xc7,0x37,0x79,0x84,0xa7,0x1f,0x2b,0xec,0x86,0x53,0xf0,0x78,0x06,0x96,0x42,0xb1,0xf8,0x07,0xf7,0x78 .byte 0x8b,0x75,0x35,0x59,0xce,0xaf,0x89,0x47,0x3c,0x64,0xae,0xda,0x35,0x53,0xe2,0x73,0x0f,0x58,0x92,0x74,0x08,0x3e,0xfb,0x07,0xad,0x41,0xeb,0x47,0xc7,0x64,0xf7,0x62,0x52,0x34,0x36,0x23,0xba,0x2f,0x3d,0x57,0xf4,0x4b,0xad,0xb6,0x3a,0x94,0x9c,0x31,0x07,0xf4,0x1d,0xd7,0xf1,0x6e,0xbb,0x9c,0x42,0x4b,0x7a,0x87,0x10,0xe8,0x9b,0xdb .byte 0x8b,0x7b,0x8b,0x16,0xd4,0x4c,0x5b,0xcb,0xe6,0x7e,0x0f,0xe1,0x64,0x14,0xc0,0xef,0x63,0x7c,0x71,0x92,0xc4,0x4f,0xd4,0x11,0x0e,0x26,0x08,0xb0,0xe9,0xdc,0xb6,0x75,0xe7,0x97,0xde,0x0e,0xed,0xe5,0x87,0xfb,0x59,0xeb,0x5c,0x70,0x02,0xad,0xfb,0x00,0x17,0x32,0x0d,0x15,0xfd,0xce,0xfe,0xa3,0x11,0x2f,0xf4,0xd1,0xbe,0xbf,0xee,0x50 .byte 0xd7,0xaf,0x4c,0xe8,0x0f,0x2a,0xfd,0x59,0x5f,0x23,0xe3,0x8c,0x49,0x60,0xa4,0xe0,0x80,0x1a,0x2f,0xc0,0x38,0xb3,0x1b,0x3f,0xa5,0xc6,0xa4,0xb6,0x53,0x3b,0xe2,0xb0,0xc2,0x55,0xba,0x84,0xa2,0xe3,0x6e,0x16,0x6b,0x2f,0x11,0xea,0xdd,0x52,0x77,0xd7,0x25,0xfa,0x12,0x36,0xd5,0x72,0x94,0x5a,0xc0,0x56,0xdf,0xd3,0xef,0x77,0x2a,0x2f .byte 0x87,0x02,0x06,0x9a,0x00,0x7e,0x80,0xf2,0x90,0xea,0xfd,0x93,0x6e,0x0c,0x0d,0xbd,0xe5,0x9d,0x8c,0x4e,0xdf,0x9c,0x87,0x89,0xf9,0xde,0xff,0xc4,0x49,0xc9,0xb6,0x3c,0xe1,0xcd,0xce,0xfb,0x59,0xd0,0x5a,0x97,0x67,0x62,0x63,0x19,0xcc,0x54,0x3c,0xf4,0x97,0x4e,0x77,0xb3,0xbc,0x42,0x15,0x95,0x27,0x54,0x41,0xad,0x21,0x25,0xc7,0x36 .byte 0x07,0x58,0xa5,0xca,0x7c,0x27,0xa5,0x6a,0xc1,0x90,0xcc,0x06,0x39,0x10,0x1b,0x20,0x46,0x55,0xd6,0x3a,0xe7,0xec,0x6b,0xba,0x7f,0x99,0x8b,0xd3,0xab,0xaa,0x1a,0x4e,0x7c,0x5e,0x01,0x8e,0xa4,0x99,0x0b,0x41,0x22,0x1a,0x3a,0xeb,0x3b,0xe6,0xfb,0x0b,0x9c,0x65,0xe1,0xcb,0x61,0xf1,0xb0,0x18,0xee,0x52,0xb5,0xbb,0x46,0xf4,0xca,0xae .byte 0xe9,0xa0,0xe3,0xe9,0xea,0x84,0x88,0x95,0x6d,0xd2,0xe9,0x82,0x0f,0x40,0x5f,0xeb,0xcb,0x51,0x34,0xf1,0x5c,0x1b,0xac,0x75,0xc3,0x0f,0x14,0x6b,0xc9,0xb3,0xa2,0x40,0xbb,0x0e,0x71,0x3b,0x7a,0xee,0xe8,0x25,0xf5,0x64,0xa0,0x3a,0x94,0xeb,0xfb,0x4d,0x9c,0x72,0xbb,0x85,0x22,0x44,0x53,0x19,0x0e,0xc7,0x68,0xa6,0x12,0x6d,0xaf,0xd7 .byte 0x13,0x0d,0x02,0xd9,0xe8,0xd4,0x8c,0xc2,0x83,0x5b,0x68,0x42,0xbc,0x22,0x9a,0x2b,0x2a,0x4f,0x3e,0x1c,0x52,0x21,0x14,0x58,0x75,0x1e,0x31,0xcf,0xac,0xaa,0xa3,0xd7,0x31,0x0e,0x73,0x79,0x31,0xf6,0xbe,0x3d,0xe2,0x27,0x23,0x58,0xda,0xc2,0xb5,0xce,0xd8,0x91,0x76,0x97,0x3c,0x64,0x4b,0x95,0xce,0x93,0x52,0x32,0xfe,0x33,0x3b,0xef .byte 0xa4,0xed,0xdf,0x81,0x18,0xc7,0x08,0x51,0x81,0xf2,0xfb,0xf8,0x2d,0xcf,0x69,0x21,0x05,0x15,0xed,0x9d,0xf7,0x87,0x64,0xeb,0x9b,0x0b,0x2c,0x9b,0xf3,0xbf,0x32,0x21,0x27,0x38,0x20,0xc3,0x5f,0xb8,0xfe,0x17,0xf5,0x8f,0x3f,0xac,0xda,0x49,0x3d,0x54,0x14,0x9e,0xd5,0x89,0xdb,0x20,0xda,0x43,0x67,0x84,0x4b,0xb7,0x11,0xd3,0x08,0x2f .byte 0x56,0x8f,0x95,0x79,0x82,0x28,0xec,0x45,0x3c,0xc5,0xa7,0xd7,0xad,0xaa,0x82,0xda,0x87,0xb3,0x32,0x3e,0x27,0xf4,0x3d,0x27,0xcf,0x2d,0x04,0x00,0x22,0x13,0x36,0x57,0x8c,0x84,0x10,0x4a,0x7c,0xbb,0x57,0x13,0x1f,0x4d,0x64,0x60,0x14,0x64,0x85,0x9a,0x05,0x46,0xfc,0x10,0x6f,0x67,0x82,0x5a,0xb9,0x65,0xd5,0x00,0xfa,0x07,0xb3,0x70 .byte 0x18,0x94,0x3a,0x4f,0xef,0x6e,0x4d,0x13,0xf3,0x63,0x5a,0xa1,0xe1,0x19,0xbf,0xc0,0x2e,0xf5,0x1f,0x53,0x7c,0x33,0xc3,0x5b,0xab,0xbd,0xdf,0x90,0xca,0x2d,0x20,0xb4,0x4e,0x6a,0xea,0xa5,0xad,0x62,0x20,0x8a,0xbf,0xf4,0xc4,0x90,0x5b,0xa8,0xe5,0xea,0xe9,0x53,0x42,0x33,0x29,0xce,0x46,0x69,0x4f,0x58,0x18,0xab,0x15,0xc2,0x5f,0x50 .byte 0x6f,0x31,0xcf,0x09,0x23,0x2e,0xf5,0x29,0xef,0xad,0xcb,0x36,0x7c,0xf1,0x5d,0x0c,0xf6,0xfc,0xfb,0x17,0x08,0x31,0xa7,0xa9,0xc9,0x56,0x51,0xcf,0x27,0xea,0x25,0x15,0x89,0xe1,0xe4,0x1c,0x18,0x30,0x4c,0xd4,0x2a,0x0e,0x68,0xd6,0x07,0x19,0x51,0x95,0xdd,0x70,0x60,0x98,0x1d,0x21,0xab,0x59,0x36,0xb3,0x2c,0xc2,0xbf,0xdb,0x79,0xbe .byte 0xd6,0x32,0xff,0x86,0xa0,0xfc,0xa9,0x7a,0xb7,0x08,0x40,0xb8,0x6d,0x44,0x78,0xe6,0xae,0x52,0x3d,0x60,0x48,0x0c,0xd3,0x72,0x30,0x1c,0x51,0x1e,0x5f,0x1d,0x34,0x7c,0xfb,0x08,0x04,0x1d,0xcc,0x6e,0xec,0x67,0xd8,0x65,0xae,0x63,0xba,0x7b,0xeb,0xd6,0x15,0xbe,0x69,0x41,0xdc,0x67,0x09,0x20,0x6e,0xa5,0x19,0xc7,0xc2,0xd2,0x12,0x74 .byte 0x1e,0x27,0xed,0xc4,0x61,0x23,0xcc,0xb8,0xc0,0x1c,0xb9,0xb2,0xc4,0x4c,0x9b,0x04,0x4b,0x41,0x63,0x2a,0x04,0xef,0xe9,0x12,0x14,0x9f,0xbf,0x36,0x0f,0x73,0x68,0x14,0xdb,0x12,0x5c,0x27,0xcc,0xd3,0xb4,0x2a,0xa9,0x45,0xeb,0x7e,0x72,0xab,0x22,0x23,0x0f,0xa2,0x7c,0x67,0xa6,0x3e,0x74,0xb6,0x84,0xb0,0xab,0x65,0xe2,0x4e,0x31,0x5a .byte 0xec,0x30,0x52,0x94,0x58,0x08,0x26,0x1f,0x7a,0x3c,0xed,0x38,0xcb,0x2d,0x3d,0x13,0xab,0x2c,0x37,0xb5,0x68,0x5a,0xb5,0x35,0xb6,0xc6,0xa5,0x20,0xdb,0x2f,0x66,0xb4,0xf3,0xae,0x3a,0xf8,0x22,0x86,0x6b,0x09,0x98,0xce,0x8f,0x2b,0x9c,0x1a,0xa2,0x47,0x05,0xbb,0xf1,0xf5,0x2d,0x5c,0xfb,0xc4,0x6e,0xeb,0x1f,0x4c,0x40,0x3d,0x97,0x1d .byte 0x86,0xf0,0xf8,0x17,0xd6,0xd9,0x3f,0x65,0x33,0x30,0x85,0x37,0x5a,0xf6,0x7d,0x39,0xac,0x87,0x99,0xeb,0x76,0xcc,0x79,0xe2,0xda,0xe9,0xc4,0x62,0x4d,0x4a,0xbf,0x67,0x22,0x10,0x91,0xbe,0x25,0x8f,0xd7,0x28,0x75,0xbc,0x52,0x2c,0x66,0x3e,0xc0,0x35,0x4c,0x02,0x37,0x96,0x6b,0x90,0x00,0xaf,0x23,0x49,0x90,0x4d,0x97,0x90,0x9f,0x06 .byte 0xde,0x9b,0x63,0x57,0x88,0x33,0x40,0xd5,0xd7,0xcc,0xf2,0xa8,0x9e,0x5f,0x40,0xb6,0x17,0xae,0xe5,0xda,0x4c,0x2f,0x9d,0xc7,0xfd,0x1a,0x62,0x8e,0x99,0x8e,0x47,0x96,0x31,0xc1,0xb9,0x72,0x73,0xd4,0x7f,0x31,0xa3,0xfb,0x67,0xed,0x3c,0x44,0x9b,0x9c,0x21,0x4b,0xaf,0x91,0x80,0xfc,0x8f,0x4a,0x6c,0x83,0x4f,0xb3,0xb0,0x2f,0x5c,0xee .byte 0xeb,0x9b,0x8d,0xb0,0x18,0x46,0xcb,0xfc,0x0a,0x46,0x4a,0xe5,0x88,0xb0,0x08,0x75,0x78,0x61,0x2f,0x1a,0x26,0x70,0x43,0xcf,0x5a,0xbb,0xb4,0x1a,0x65,0x19,0xbb,0xe7,0xe1,0x23,0xd3,0x39,0x79,0x76,0xb7,0x1c,0xe2,0x05,0x90,0x43,0x8c,0xb6,0xa0,0xca,0x05,0x28,0xa5,0xd7,0x42,0x02,0x2f,0x2c,0xc1,0x6c,0x29,0xaf,0xfe,0x68,0x71,0x82 .byte 0x43,0x9d,0x55,0xd6,0x6e,0x49,0xdb,0xf0,0x3c,0x7b,0x10,0x22,0x77,0x16,0xe7,0x75,0xe8,0x54,0x47,0x49,0xae,0x3b,0x4b,0xc8,0x97,0xa4,0xf2,0x63,0xff,0x2a,0xd1,0x01,0x18,0x24,0x13,0x18,0x27,0x02,0xfd,0xe2,0xf5,0xc7,0x21,0xb8,0x15,0x45,0x9a,0xb5,0x82,0xd6,0xde,0x08,0x44,0x4c,0xb2,0x4f,0xa0,0xd6,0x4f,0x84,0x04,0x83,0xe1,0xf5 .byte 0xce,0xa5,0x6f,0xa8,0x24,0x91,0xf6,0x52,0x8b,0x5e,0x2f,0x66,0x58,0x74,0xbc,0xd3,0x91,0xe7,0x25,0x2d,0x2d,0x69,0xf3,0x6a,0xe9,0x96,0x18,0x64,0x59,0x7b,0x62,0x13,0x4b,0x3e,0x15,0xbd,0xe0,0xff,0xe3,0xa9,0x70,0x9a,0xba,0xcd,0x90,0xcd,0xf0,0x89,0x2b,0xa6,0x38,0x7b,0xe1,0x67,0x89,0x85,0x0c,0x2e,0x16,0xea,0x97,0x2d,0x6e,0x6f .byte 0x1f,0x9c,0x0a,0xf3,0xe5,0x95,0x03,0xc2,0xe4,0x84,0xc8,0x0d,0x08,0xb7,0x59,0x25,0x5b,0x77,0x7f,0x7c,0x43,0x16,0xb7,0x27,0x38,0xf1,0x71,0x50,0x0d,0xed,0xa8,0xc6,0x27,0x36,0xf1,0xaa,0xa6,0x43,0x3f,0x1f,0xc1,0xa2,0xc5,0x23,0x46,0xf8,0x9c,0xe5,0x5f,0xb9,0x25,0x3b,0x71,0xb3,0xe2,0xc7,0xa5,0x7e,0x30,0xc5,0xe9,0x3b,0x4e,0xa1 .byte 0xd6,0x33,0x3c,0x8b,0xb9,0x08,0x93,0x3c,0xc5,0x4c,0x7c,0x7c,0x8b,0xe9,0xa7,0x46,0xa8,0x9e,0x97,0xc5,0x71,0x7e,0x81,0xa6,0x22,0x49,0xb0,0x25,0xa8,0x74,0xba,0x7b,0xce,0xf8,0xd6,0xe8,0xf1,0xa1,0x0f,0x03,0xe6,0x8a,0x30,0x02,0xba,0xde,0xaa,0x16,0x0d,0x7a,0x4a,0x86,0xf8,0xd0,0x80,0xf6,0xde,0x9e,0x70,0xe2,0xa9,0x7c,0x98,0xde .byte 0x6b,0x8b,0x04,0xa3,0xb4,0xa9,0xfb,0x15,0x5e,0x40,0x92,0xa0,0xb7,0x36,0xab,0x8d,0x02,0xb0,0x95,0x4c,0x3f,0x5d,0xa6,0x17,0xd3,0x98,0x41,0xe0,0xfb,0xf2,0x49,0x3b,0xf6,0xb5,0xfe,0xc7,0x8d,0x77,0xa7,0x1e,0xcb,0x10,0x32,0xf0,0x55,0x7e,0x44,0x6e,0xa8,0xc6,0x2c,0x52,0x09,0xda,0xe6,0x02,0x7c,0xc2,0xfe,0xe7,0x05,0xc8,0x37,0xc4 .byte 0x90,0x5a,0xed,0x54,0xaa,0x29,0xbd,0x3c,0x22,0x34,0xd7,0x41,0x5b,0xf5,0x89,0x1e,0x22,0x87,0xc3,0x51,0x90,0xc4,0xe5,0x77,0x41,0x6b,0xcc,0x23,0x61,0x6c,0x89,0x55,0x79,0x15,0xdc,0x3b,0x3f,0x52,0x2f,0x67,0x8c,0x0f,0x56,0xbb,0x8b,0x06,0x72,0x62,0x76,0xf7,0xa2,0xe2,0x00,0x70,0x78,0x3f,0x52,0xc5,0xcb,0x10,0x22,0x59,0x44,0x81 .byte 0x5d,0x05,0xd2,0x92,0x72,0x6e,0x8b,0x3e,0x52,0x54,0x06,0x5b,0x51,0x55,0x08,0x81,0x5a,0x1c,0x82,0x86,0x30,0x7c,0x0e,0x66,0xdd,0x17,0xad,0x1f,0x54,0x85,0xd6,0x4f,0x9b,0x4d,0x49,0x42,0xdf,0x6c,0xa1,0x6a,0x18,0x00,0x38,0xb6,0xf7,0x8d,0xbb,0xce,0x7a,0xbb,0xcb,0x59,0x03,0x2d,0x7e,0x56,0x33,0x54,0x5f,0x46,0x7a,0xba,0x24,0x17 .byte 0x22,0x3b,0xb4,0x86,0x1d,0xa7,0x92,0xea,0x85,0x99,0x67,0x85,0x9a,0x45,0x53,0xce,0x9f,0x44,0xea,0xb2,0xac,0x24,0x8e,0x0c,0x0b,0x8c,0x21,0x00,0xe8,0xd5,0x08,0xe3,0xbe,0x1a,0xd5,0x3e,0xaa,0x62,0xf0,0xcd,0x5f,0xae,0x5b,0xef,0x89,0xf0,0xc0,0x48,0xa4,0xdc,0xd4,0x60,0xd3,0xd5,0x05,0x42,0x7f,0xb1,0xec,0x1d,0x62,0x0e,0xe8,0xe4 .byte 0x4d,0x20,0x9e,0x25,0xc0,0xa5,0x7c,0xe4,0x5f,0xf7,0xfa,0xf1,0x50,0x3b,0x39,0x62,0x10,0x09,0x46,0x24,0x47,0x49,0x75,0xf7,0xae,0x2b,0x2c,0x79,0x23,0xfe,0xcd,0x81,0xdf,0x0b,0x94,0xe3,0x4d,0x2e,0xe8,0x4a,0x87,0x70,0xec,0xfe,0xa8,0xda,0x06,0x86,0x62,0x30,0x00,0x0c,0x76,0xa4,0xd1,0x48,0x6d,0xdb,0xa6,0xb5,0x65,0x35,0xcd,0xa2 .byte 0xd7,0x95,0x9b,0x0e,0x3e,0x7d,0xe6,0xd3,0x3a,0x6b,0x26,0x9a,0x50,0xd6,0x12,0xe5,0x76,0xff,0xa6,0xfd,0xbf,0xb7,0xba,0xee,0x42,0x09,0xa4,0x2b,0x10,0x64,0xab,0x43,0xaa,0xe0,0x1d,0xe5,0x35,0xf4,0xc7,0xa3,0xb0,0xc4,0x1a,0xd3,0x8b,0x03,0x9f,0xd0,0x2b,0xa5,0x26,0x70,0x92,0x0d,0xe5,0x3b,0xb8,0x62,0x6b,0x4a,0xc5,0x93,0x6b,0xc8 .byte 0xbe,0x66,0x51,0x0b,0x56,0xed,0xee,0x6c,0xf1,0xf3,0x05,0xc1,0x7a,0xae,0xf6,0x26,0xe5,0x4d,0x1e,0x0b,0xf9,0x29,0xc4,0xd7,0x80,0x75,0x3f,0x5c,0x60,0xa6,0x06,0x09,0x58,0x4b,0xfd,0xa3,0xc2,0x76,0xd8,0x43,0x66,0x04,0xdd,0x84,0x9f,0x5e,0x15,0x87,0xe8,0xf7,0xa4,0x56,0xf4,0x81,0x88,0x98,0x26,0xa4,0x24,0x3c,0xfb,0x7e,0xb6,0xbf .byte 0xe8,0x0f,0x12,0x31,0xe5,0x84,0xa9,0x3b,0x73,0x48,0x03,0x7c,0x0b,0x8c,0x52,0x2d,0x6c,0xa3,0x66,0x1e,0x00,0xc7,0x1d,0xe2,0x41,0x68,0x04,0x0a,0x66,0x13,0xe9,0x17,0xca,0x16,0x79,0x44,0x17,0xaf,0x41,0x0e,0x50,0x4f,0x1f,0x28,0x3e,0x68,0x80,0xb1,0x62,0x20,0x9e,0x1c,0xaa,0x18,0xa8,0x1d,0x09,0xed,0xe2,0x97,0xc2,0x9c,0xec,0x99 .byte 0xd6,0x12,0xde,0xd1,0x48,0x9c,0x1e,0xdf,0x0c,0xb5,0x6c,0x17,0x3d,0x59,0xe6,0xfc,0xe6,0xd5,0x1a,0x70,0x66,0x49,0xf5,0x09,0x30,0x11,0x5b,0x5d,0x1a,0xeb,0xc7,0xf8,0xe5,0x44,0xf5,0x3f,0x93,0xde,0xf5,0x2a,0x00,0x72,0x19,0xae,0xde,0xe9,0x7f,0xc7,0x30,0x9c,0x95,0x17,0x33,0xca,0x2c,0xd5,0x75,0xcf,0xb7,0x1b,0xd0,0x4d,0x58,0x1e .byte 0x07,0x23,0xa8,0x8d,0x63,0x9d,0x95,0x92,0x8b,0xbd,0x77,0xe3,0xa0,0xd0,0xe0,0x43,0xeb,0x9d,0xdf,0x96,0xb2,0x4e,0xac,0x37,0x74,0xf3,0x54,0x9b,0x48,0x32,0x49,0x80,0x9d,0x68,0x7b,0x9f,0x2c,0x74,0xbb,0x31,0x22,0x71,0xf1,0x3c,0xaa,0xf3,0x07,0x64,0x4d,0x55,0xb9,0x18,0xb3,0xe5,0x02,0xce,0x07,0xec,0xfc,0x6d,0x73,0xc8,0x48,0xc8 .byte 0xab,0x6b,0x3a,0x8a,0xa2,0x06,0x37,0x7d,0xf7,0x8f,0xc8,0x6f,0xc1,0xc0,0x28,0x0e,0x66,0x79,0xdf,0x76,0x51,0x48,0x3d,0x0d,0x94,0x48,0x0c,0xae,0x05,0xa6,0xf3,0x2b,0xa4,0x71,0x22,0xb0,0x38,0x81,0x45,0xc3,0x68,0x4b,0x0d,0xec,0x06,0xad,0xa8,0x5b,0x25,0x25,0x1c,0xda,0xfe,0xc2,0xe5,0x6a,0x81,0xd5,0xe2,0x3f,0x8d,0x9d,0xcb,0xb0 .byte 0x5c,0xb4,0xdb,0x14,0xa9,0x61,0x3c,0x77,0xe6,0x1b,0xc8,0x18,0xfa,0xc7,0xf2,0x03,0x96,0xd0,0xcb,0xd8,0x38,0xfd,0xcf,0x3c,0xf0,0xc4,0xd6,0xe4,0xff,0x86,0x11,0x03,0x85,0x30,0xee,0x57,0xf7,0x53,0xf8,0xbe,0x81,0x88,0x54,0x4f,0x57,0x63,0x36,0x6b,0xbb,0x44,0x21,0x84,0xa1,0x5d,0x03,0x01,0xc4,0xca,0xe2,0x89,0xec,0x8e,0x55,0xe0 .byte 0xb7,0x24,0x9a,0xd8,0x43,0x51,0xc3,0xe7,0xbe,0xa7,0x40,0xcb,0x35,0xa9,0x3c,0xa0,0x03,0x71,0x51,0x22,0x03,0x0f,0xc7,0x3e,0xcb,0x33,0xab,0xb5,0xfb,0x91,0x0e,0x21,0x51,0x0d,0x67,0x66,0x89,0xac,0xa8,0xd3,0xda,0x25,0x78,0xa4,0xd7,0x16,0x0e,0x48,0xee,0xc8,0x89,0xc4,0x4b,0x99,0xe2,0x55,0x0c,0x69,0x0c,0xc4,0xe8,0xd7,0xee,0x2d .byte 0x5a,0x5f,0x56,0xf7,0x9a,0xad,0x61,0x32,0x9c,0x73,0x91,0x9a,0x60,0xb2,0xbe,0x36,0xfe,0xb1,0x54,0x89,0x6d,0x32,0x10,0x5b,0xc4,0x60,0xe1,0x9d,0xbb,0x12,0xf0,0xaa,0x73,0x69,0x2c,0x4d,0xb6,0xce,0x0a,0x47,0x5a,0x5c,0x4c,0x25,0x7e,0xb9,0x56,0x79,0x55,0x67,0x98,0x3e,0xc0,0xdd,0xe4,0x97,0xe7,0x6b,0x1a,0xa5,0x8d,0x26,0xfb,0x7e .byte 0x85,0x7e,0x0a,0xa3,0x43,0xbc,0x99,0xa7,0x34,0x82,0xda,0xd9,0x92,0x58,0x79,0x8d,0x3b,0xa6,0x08,0x47,0xdd,0x18,0x33,0x68,0xdd,0x97,0x6b,0x14,0x9e,0xa4,0x7b,0x3e,0x48,0xf4,0x3f,0x44,0x18,0x07,0xc1,0xef,0x15,0xbb,0xba,0x5e,0x2d,0x92,0xdc,0x20,0xc9,0x87,0x06,0x8d,0x0b,0x69,0xed,0x94,0x98,0xe6,0x1a,0x5b,0x0c,0xb2,0xaf,0x54 .byte 0x27,0x49,0x1e,0x9a,0xc3,0x5d,0xf7,0xc5,0x82,0x8c,0xa0,0xfd,0xf2,0xc3,0x68,0x60,0xf7,0x88,0xb9,0x04,0x6c,0xb2,0xeb,0x9a,0xcd,0x9f,0xe9,0xd8,0xfc,0xbd,0xed,0x72,0x11,0xf6,0xb4,0x7b,0xd8,0x64,0x5e,0x55,0xc7,0x19,0xcf,0xd7,0xb3,0x47,0xdd,0xb2,0x3e,0x18,0x7b,0xb2,0xc7,0x5c,0x9d,0x99,0x05,0x2d,0x22,0x94,0xc2,0x0e,0xab,0x0b .byte 0x7f,0x1f,0xc4,0x3f,0x63,0xcf,0x52,0x43,0x2e,0x92,0x76,0xff,0x8a,0xce,0x61,0x4b,0xf3,0x44,0x91,0x7e,0x11,0x7d,0x73,0x06,0xda,0xde,0x54,0xad,0x7a,0x09,0x85,0xfd,0x58,0x24,0xee,0xae,0x0c,0x86,0xca,0x39,0x12,0xe2,0x5b,0xe6,0x65,0x0e,0x9e,0x94,0xe0,0xfa,0x41,0x56,0x9e,0x73,0x1a,0xd8,0x09,0xe4,0xb3,0xe9,0x8f,0xb0,0x35,0x69 .byte 0x61,0x9f,0xe9,0x9f,0x19,0x11,0x1a,0x41,0x06,0xc3,0x6f,0xc1,0x73,0xb7,0x14,0x0b,0x31,0x4e,0xc5,0x54,0xd3,0xef,0x17,0x2b,0xad,0xe3,0xaa,0xcd,0x42,0xd9,0xe9,0xba,0x77,0x48,0xaf,0x86,0x68,0xaa,0x69,0x56,0xc2,0xfd,0x82,0xcc,0xd5,0xa1,0x98,0x17,0x5f,0x2d,0x5f,0xee,0x3b,0xb2,0x11,0x56,0x36,0xdb,0x88,0xd7,0xed,0x21,0x67,0x4d .byte 0xe4,0x78,0x38,0xab,0x97,0xaa,0xd6,0x41,0x70,0x82,0x8e,0x65,0x3e,0xd2,0x6d,0xb3,0xad,0x6b,0xcc,0x0c,0x0e,0x2c,0x3d,0xdd,0xf9,0xaf,0x21,0xc9,0x65,0x2c,0x4c,0xd8,0x95,0xe2,0x35,0xa8,0xe1,0x67,0xd9,0x93,0x22,0xd4,0x37,0x5e,0x8b,0x15,0x5c,0x2e,0xa0,0x1f,0x10,0x58,0x58,0x84,0x87,0xb3,0x2a,0xd6,0x7c,0xcd,0x3e,0x9b,0x13,0x4f .byte 0x16,0x19,0x5d,0x99,0xa0,0x0b,0x3b,0x7a,0x5e,0x5b,0xfa,0x64,0x7d,0x0c,0x2b,0xfb,0x32,0x76,0xc7,0x95,0x40,0x52,0x1d,0x5a,0x71,0xb5,0xfc,0xeb,0xc6,0x93,0x45,0x55,0x24,0xa8,0x9f,0x5d,0x5c,0x22,0xe4,0x1d,0xda,0x7c,0xcf,0x06,0x6d,0xcf,0x8b,0xd0,0x11,0x96,0xcd,0x57,0xb5,0xa9,0x3c,0xfe,0x6c,0xf2,0x1e,0xa3,0x22,0x5f,0x7c,0x62 .byte 0xdd,0x01,0xe2,0x2e,0xb7,0xda,0x79,0x93,0x69,0xd5,0xf0,0x9e,0xeb,0xa3,0xf7,0x18,0xd6,0x92,0x13,0xfe,0x24,0xb3,0x83,0x65,0x07,0xe5,0x80,0x28,0x52,0xc0,0x3b,0x4e,0x99,0xcf,0x53,0x75,0xe9,0xd5,0xa3,0xea,0x79,0x69,0x54,0x71,0xd6,0x25,0x43,0x1d,0x36,0xc4,0x74,0xa6,0x20,0xa4,0x0b,0xd7,0x24,0xb2,0xc5,0xee,0x49,0xae,0x8e,0xe4 .byte 0xc3,0x18,0x47,0xc0,0xb5,0x49,0x9a,0xf4,0x39,0x35,0xe4,0xb9,0xb0,0x5f,0xbb,0x81,0xf4,0xc7,0x1e,0x2b,0x24,0x93,0xae,0x5d,0xd9,0x13,0xea,0xa7,0xfd,0xdd,0x80,0xe7,0x90,0x70,0x4f,0x43,0xbe,0x72,0x32,0x73,0xb4,0x08,0x14,0x90,0x08,0xa4,0x1f,0x11,0x9b,0x80,0x1e,0x0e,0x5f,0x5c,0x46,0x9b,0xe9,0xe5,0x88,0x17,0x3b,0x7b,0xc3,0x9a .byte 0xfb,0xf0,0x37,0x06,0xb9,0x18,0x5c,0x1f,0x07,0x84,0x1e,0x74,0x6c,0x94,0xa7,0x52,0xbc,0xf1,0x76,0xd3,0xfd,0xab,0x47,0xea,0x2d,0x58,0x51,0x4a,0x87,0xc4,0x5b,0xc0,0x93,0xb1,0x31,0x96,0xec,0xe5,0xe2,0xea,0xdd,0x84,0xb1,0xf7,0x5f,0x38,0x2e,0x98,0x52,0xdc,0xb8,0x3b,0x69,0xde,0x09,0xa3,0x24,0x65,0x2d,0x44,0x36,0x26,0xbe,0xcc .byte 0xb2,0xaa,0x30,0x67,0xad,0x96,0x39,0xa7,0xe7,0x92,0x59,0x69,0x2a,0x46,0x51,0x48,0x25,0x11,0x81,0xe5,0xf8,0x59,0x77,0x14,0xc5,0x14,0x4e,0x93,0x75,0xc0,0xb5,0xf1,0xbb,0x90,0xf1,0xa9,0xd9,0x72,0x43,0x8f,0xfb,0xe8,0xbe,0x69,0x80,0xb7,0x51,0x71,0x9d,0x70,0xdd,0x01,0x95,0x84,0x78,0xd1,0xf0,0x86,0xc9,0x06,0xa8,0xaf,0x5d,0xbd .byte 0xdd,0x68,0xbf,0x8a,0x4b,0x64,0xe6,0x1a,0x48,0xc4,0x34,0x3f,0xce,0x7b,0x04,0x2c,0xa4,0x12,0x62,0x69,0xfe,0x05,0x12,0x2d,0x16,0x49,0x2f,0xa1,0x69,0xd4,0x9e,0x95,0x61,0xa2,0x24,0x34,0xfc,0x51,0xb7,0x89,0x3a,0x2a,0x80,0xce,0x3b,0xe5,0x16,0x8f,0x6e,0x35,0x19,0x1d,0x78,0x27,0x1c,0x81,0x52,0xf3,0x93,0x83,0x83,0x94,0x95,0x5d .byte 0xaa,0x94,0x28,0xc6,0xd5,0xec,0x38,0x95,0x50,0x12,0x9d,0xc2,0xc2,0x28,0x2c,0xf8,0x30,0xa5,0x79,0x19,0x79,0xf4,0x71,0xd3,0xc0,0xfd,0xc3,0x64,0x1a,0x95,0x5c,0x79,0xef,0x73,0x8d,0x66,0xbb,0x63,0x53,0x24,0x5d,0xb2,0xf9,0x94,0xe6,0xcc,0xf3,0xe9,0xf4,0x94,0xcf,0x77,0xbe,0x25,0x0e,0x2c,0x5e,0xed,0xdd,0x49,0x25,0xd3,0x15,0x54 .byte 0x68,0x49,0x15,0x27,0x7d,0x1e,0xa2,0x95,0x8d,0xf7,0xea,0xe5,0x1c,0x33,0x90,0x4f,0x83,0x06,0x17,0xd4,0x5e,0x6e,0xe6,0x3a,0x90,0xda,0x4b,0x31,0x57,0x0e,0xab,0x98,0x1d,0x87,0x63,0x20,0x9e,0xd7,0x00,0xa0,0x1e,0x77,0xef,0x22,0xf4,0x4b,0xd2,0x58,0xaf,0xfd,0xe1,0xa2,0xb0,0xb9,0x9b,0x2a,0x75,0x6a,0xc7,0x51,0xe3,0x3b,0x66,0x83 .byte 0x65,0x9c,0x87,0x09,0x56,0xd0,0x09,0xa8,0x6b,0x08,0x77,0x46,0x86,0x3f,0xe6,0x63,0x62,0xdc,0x82,0xd1,0x04,0xe5,0xa8,0x36,0x70,0xa8,0xe8,0xb3,0xb0,0x85,0xac,0x5a,0x11,0x54,0xd2,0x68,0x35,0xfa,0x4c,0x5e,0x15,0x64,0x77,0x6c,0x25,0xf4,0x19,0x8b,0x7e,0xe2,0xb1,0x7d,0x1d,0x63,0x5b,0x8c,0xa6,0x42,0x72,0x60,0x1e,0xe3,0x54,0x3a .byte 0x5b,0x9c,0x8d,0x6c,0x4b,0x28,0x2d,0xf6,0xd2,0x80,0x66,0xbe,0x79,0x91,0x64,0x11,0xe6,0x3e,0x5c,0x3e,0x8b,0x71,0x40,0x06,0x7f,0x26,0x8d,0xf3,0xce,0xc9,0x6d,0x9c,0x94,0xf4,0x22,0xff,0xac,0xeb,0x5a,0xb2,0x99,0x86,0x66,0x66,0xb5,0xfd,0x62,0xcc,0xf6,0x20,0xca,0xb9,0xb5,0xc4,0xc7,0xe9,0xca,0x23,0x59,0x2b,0xa6,0xae,0x53,0x8e .byte 0xdf,0xd5,0xc1,0x0e,0x52,0x8c,0x35,0x7c,0xb3,0x03,0x41,0x7c,0xdc,0x87,0x4a,0x59,0x56,0x5c,0x88,0x6c,0xa9,0x10,0x6b,0xd5,0x04,0x42,0x5d,0x60,0xef,0xc2,0xc1,0x28,0x36,0x91,0xd8,0xd0,0x62,0x30,0xa4,0xaf,0x5b,0x06,0xb0,0x86,0xc1,0xb2,0xff,0xc3,0x3d,0x41,0xb8,0xe9,0x12,0xde,0xab,0x4a,0xaf,0x57,0xfb,0xdf,0xb0,0x15,0xd1,0x1e .byte 0xed,0x69,0xb5,0x79,0x5a,0x3d,0xeb,0xd3,0x3c,0x33,0x27,0x71,0x7a,0x7c,0xf2,0x28,0x50,0xe3,0x96,0x0d,0x6d,0x18,0x7d,0x7d,0xe2,0xb3,0x9b,0x9b,0x49,0x7f,0xe3,0xba,0xd1,0xf1,0xbc,0x9c,0xae,0x73,0xf8,0x35,0x71,0xbd,0xc1,0x4b,0xbc,0x36,0x08,0xf9,0x9e,0x78,0x57,0xc5,0xd0,0x52,0xc9,0x93,0xb4,0x7f,0x06,0x6b,0xc2,0x2e,0x8a,0x9b .byte 0x8a,0x8b,0xf5,0x69,0xc4,0xaf,0x61,0xbb,0xc3,0x79,0x40,0xa2,0x8f,0xd6,0x76,0xcd,0x51,0x4b,0x91,0x75,0xfa,0x9f,0x19,0x8d,0x29,0xe2,0x25,0xae,0x8d,0x34,0x31,0xeb,0x26,0x42,0xca,0x69,0x1c,0xba,0x37,0xa0,0x6d,0x5f,0x60,0x04,0xc3,0x96,0xad,0xdc,0x8f,0xf0,0x51,0x54,0x89,0xc8,0x71,0xe6,0x9d,0x7b,0x11,0xad,0xc9,0xbe,0x38,0x40 .byte 0x4f,0x90,0x7c,0x6c,0xa1,0x1f,0x2d,0x92,0x29,0xf1,0x37,0x8b,0x55,0x20,0xf0,0x85,0x93,0x93,0x6f,0x72,0x4a,0x11,0x60,0x06,0x4d,0xd9,0xf0,0x0e,0xf8,0xf8,0xea,0x2e,0x4a,0x31,0x48,0xa3,0x9c,0xf7,0xac,0x64,0x84,0x59,0x91,0x5f,0x0d,0xd5,0x54,0x05,0x01,0x63,0x89,0x4b,0x11,0x72,0x52,0x0f,0xa4,0x13,0x8e,0x3c,0xb9,0x25,0x2c,0xb6 .byte 0x48,0x11,0xe7,0xe7,0xc1,0x5f,0xca,0x0c,0x2a,0xf0,0xe3,0xcf,0x29,0x5b,0x99,0xe0,0x05,0xae,0x59,0x14,0x97,0xba,0x31,0x1f,0xf4,0xc4,0x45,0xb0,0x89,0x22,0x68,0x29,0x97,0xf3,0xf9,0x2f,0x68,0x1a,0x3f,0xb3,0x6b,0x88,0xa9,0x8e,0x20,0x31,0xc5,0x63,0x13,0x6b,0x2d,0x52,0x18,0x98,0xc8,0x34,0x07,0x85,0x14,0xb2,0x6c,0xcc,0x78,0xdb .byte 0xb5,0xee,0x08,0xb5,0xfa,0xb7,0x40,0x98,0x2d,0x1c,0x46,0xa7,0x2e,0x78,0xad,0x6f,0x95,0x02,0x57,0xbc,0xfd,0x5f,0xf4,0xe0,0xbd,0x7f,0xae,0x0e,0x52,0xf4,0x34,0x9b,0x6a,0xbe,0xba,0x6a,0x30,0x86,0x7a,0x47,0x60,0x86,0xa1,0x9a,0x48,0xe1,0xea,0xca,0xab,0x4d,0x2f,0xdf,0x84,0x1c,0x51,0x44,0xfa,0x8a,0xc2,0x59,0x0b,0x86,0xc0,0x73 .byte 0xed,0x72,0xa2,0x22,0x73,0x93,0x69,0xfe,0x39,0x07,0x5f,0x75,0x6f,0xf8,0x30,0x7c,0xea,0xea,0xda,0x30,0xfd,0x22,0x31,0xf8,0xd9,0x68,0x3d,0x75,0x93,0xc0,0xb0,0x5a,0x1d,0xa1,0x62,0x35,0x43,0xab,0xdc,0x82,0x4b,0xa8,0x40,0x0d,0x7f,0xeb,0x02,0x90,0x55,0x10,0x47,0xfd,0xfc,0x2f,0xe7,0x8f,0xe0,0x48,0x41,0x14,0x1a,0xaa,0x51,0x25 .byte 0xad,0x79,0x23,0x6c,0x08,0x44,0x31,0xff,0x0f,0x4a,0x57,0x58,0x76,0x08,0xa0,0x28,0x56,0x9e,0x70,0x3a,0x3a,0xd0,0x00,0xc6,0xa6,0x7f,0x5e,0xfd,0x88,0xcb,0x12,0x51,0x3b,0x97,0xb0,0xe9,0x8a,0x57,0x8f,0x4c,0x2e,0xba,0xc7,0x8f,0x47,0x05,0x4e,0xb0,0x98,0x22,0x85,0x80,0x43,0x09,0xc9,0xda,0x90,0x86,0x14,0xc3,0x5c,0x00,0x2f,0x39 .byte 0x2f,0xc0,0xf9,0x37,0xe6,0xee,0x56,0xee,0xa2,0x05,0x14,0xe6,0x63,0xbd,0x6d,0x8f,0x21,0x46,0xbd,0x7f,0x67,0x0e,0x14,0xaa,0x11,0xf5,0x1b,0xfb,0x06,0x6b,0xbf,0x82,0x25,0xaa,0x8d,0x15,0xc3,0x86,0x1c,0xb5,0xcb,0xdf,0xa1,0x9d,0xd8,0xd6,0x0b,0x89,0x76,0x71,0xb8,0x5d,0x16,0xde,0x1d,0x04,0x17,0xb3,0x0f,0x26,0xc8,0xc5,0x95,0x35 .byte 0xcf,0xf4,0x6b,0x71,0x38,0xa2,0x87,0xcf,0xca,0xda,0x67,0x2b,0x01,0x37,0xbc,0x35,0x33,0x0c,0xff,0xe2,0x1e,0x33,0x96,0xb4,0x10,0x7f,0x8f,0x9c,0x42,0x07,0x73,0x4c,0xfc,0x47,0xf4,0xa5,0x1a,0x8d,0xd8,0x65,0x97,0x16,0x89,0xb6,0x25,0x50,0xd2,0x40,0x31,0x56,0x9d,0x30,0xf6,0xe3,0xcc,0x79,0x83,0xcb,0xf6,0xf7,0xdb,0x8e,0xe0,0xc9 .byte 0x6d,0xac,0xca,0x6c,0xfe,0x1c,0xc1,0xde,0x4e,0xa8,0xea,0x06,0x33,0x96,0x98,0x99,0xe1,0xe9,0x28,0xe0,0x0c,0x15,0xcd,0x75,0x1b,0x4c,0xc3,0x9b,0xea,0x86,0xd2,0xeb,0xd3,0x92,0x4e,0xdb,0xc5,0x41,0x20,0x52,0xf9,0x11,0xf8,0x17,0xb0,0x78,0x07,0xf3,0x99,0x53,0xee,0x24,0x05,0xc2,0xc7,0x44,0x66,0x8b,0xa0,0x5c,0x90,0x6a,0xc6,0xa6 .byte 0xe8,0x95,0x88,0x60,0xf7,0x9f,0x5e,0x64,0x7c,0x24,0xbb,0x3f,0x51,0x61,0x7a,0xc0,0x89,0x6d,0x49,0xfe,0x41,0x95,0xee,0x13,0x80,0x2d,0xeb,0x5b,0x60,0xc4,0x3d,0xb2,0xce,0xd0,0x29,0x24,0xb4,0xc7,0xc5,0xa6,0x4b,0x2e,0x80,0x38,0x68,0x41,0x4c,0x72,0x71,0xc1,0x08,0xf8,0x72,0x93,0x28,0x1c,0x7d,0xb3,0xf5,0x41,0xd2,0x7d,0x3a,0xc4 .byte 0x20,0x95,0x9c,0x52,0x7e,0x4f,0x5c,0x5e,0x72,0x2d,0x98,0xbc,0xd4,0x7a,0x31,0x30,0x1c,0x4d,0xe8,0x79,0xf6,0x65,0xcc,0x22,0xfe,0xc9,0xc7,0x61,0xcc,0xbe,0x21,0xd4,0xb4,0x18,0xde,0xaa,0xe5,0xc8,0x61,0x00,0xb5,0xc0,0x89,0xf2,0x19,0x88,0xb8,0xfe,0xe3,0x2b,0xb0,0xfa,0xf2,0x35,0x4e,0xf9,0xce,0x43,0xd4,0xc3,0xc3,0xf6,0xc5,0x60 .byte 0x8f,0xd3,0x12,0x32,0xe9,0xbc,0x1e,0xbd,0x4f,0x4c,0xdf,0x2e,0xc4,0x4a,0xd9,0x28,0x81,0xca,0x17,0x36,0xc9,0xbd,0x21,0xea,0xf1,0xdf,0x73,0x91,0xbe,0x8c,0x24,0x3c,0x74,0xf4,0x42,0x0f,0x5c,0xa1,0x42,0x83,0x73,0x3c,0x01,0x09,0x80,0x06,0x2a,0x91,0x63,0x59,0x6f,0xf4,0x09,0xb0,0x94,0x8c,0xc3,0xcc,0x7d,0xb2,0xf7,0x0b,0xa4,0x29 .byte 0x87,0x8b,0x9d,0x6c,0x8f,0x57,0x7d,0x45,0xee,0xc7,0x1b,0x4d,0x61,0xc5,0x66,0x7f,0x59,0xe5,0xbc,0x8f,0x45,0x33,0x05,0xc9,0xe6,0xf2,0xbb,0x5a,0x61,0xe6,0x5c,0x41,0x44,0x70,0x55,0xaf,0xb5,0xa0,0x3c,0xb5,0x4a,0xf2,0xe8,0x50,0x4e,0x94,0x01,0x56,0xc4,0x7f,0x08,0x7d,0x64,0x18,0x8b,0x14,0x15,0x15,0x54,0x23,0x49,0x4f,0x9b,0x48 .byte 0x99,0x48,0x9f,0x57,0x48,0x58,0xd1,0xe9,0x07,0x5c,0xe2,0x98,0x90,0xd7,0xc0,0x09,0xd7,0x5c,0x6f,0x0c,0x68,0xf7,0x68,0x66,0x78,0x46,0x7d,0xf6,0xaf,0x86,0x87,0x0a,0x5e,0x47,0xb2,0x9a,0xe8,0x52,0x00,0x48,0x66,0x76,0xe0,0xf7,0xa8,0x9d,0xe1,0xff,0xad,0x77,0x31,0x3f,0x28,0x2f,0x08,0x26,0xd6,0x79,0x31,0x4a,0xac,0x58,0xa8,0x98 .byte 0x56,0xd0,0x83,0x66,0x4f,0x05,0x20,0x43,0xe7,0x6b,0x1f,0x9c,0x90,0x79,0x6a,0x6c,0xb2,0xff,0xd3,0xee,0x51,0x32,0x57,0x34,0xdc,0x1b,0x61,0xf7,0x86,0xd2,0x78,0xdb,0xb1,0x91,0x6b,0xd7,0x8e,0x9a,0xab,0x71,0x8b,0x77,0x4b,0xda,0xe0,0x74,0xe4,0x80,0x47,0xad,0xd1,0x76,0x31,0xdc,0xfa,0xa9,0xb0,0xd8,0x0f,0x35,0xc1,0x06,0xdf,0x87 .byte 0x5f,0x0c,0x02,0xef,0x38,0xe0,0x1b,0x4c,0xcd,0xc4,0x2a,0x20,0xd5,0xbe,0x59,0x5e,0x11,0xe4,0x71,0xa6,0x2c,0xdb,0x53,0x35,0xac,0x1f,0xae,0x45,0xa7,0x6c,0x58,0x62,0x5d,0xbe,0x5f,0x21,0x23,0x28,0x0e,0x2c,0xcd,0x7d,0xc2,0xdf,0xcb,0x0d,0xd4,0x7c,0xda,0x88,0x26,0x97,0x88,0x13,0x3c,0x51,0xcb,0x91,0x96,0xd6,0xf4,0x63,0x21,0xe1 .byte 0x61,0x8e,0xbf,0x09,0x3f,0x00,0x1e,0xa4,0x2c,0x43,0x86,0x5f,0x5a,0x18,0xcb,0x66,0x8c,0x56,0x26,0xa4,0x5b,0x1d,0xf6,0x0d,0xd9,0x40,0xe8,0xef,0x13,0xcd,0x71,0xd1,0x4c,0x48,0xfc,0xb3,0xfe,0x20,0xb0,0x72,0x3e,0xd8,0x76,0xc5,0x87,0xb4,0xd6,0xfc,0xcc,0xf6,0x0f,0x3a,0xd5,0x98,0x1d,0x0f,0xa6,0xd7,0x63,0x32,0x1e,0xf9,0x1b,0x5a .byte 0x7c,0xce,0x7f,0x90,0xd2,0x2d,0x2c,0xa9,0x9e,0x01,0x46,0x47,0x80,0x8c,0xf3,0x5e,0xfe,0x8e,0x41,0xdc,0x33,0xd5,0x11,0xf9,0xbc,0xc1,0x4a,0xbf,0xd9,0xc0,0xeb,0x43,0xe6,0x8e,0x04,0x5c,0xea,0xcb,0x53,0x2f,0x43,0x3f,0xe9,0xfe,0x04,0xaa,0x15,0xf1,0x38,0x46,0x70,0xbf,0x74,0x01,0xfa,0x5f,0x50,0xf3,0xb2,0x35,0x97,0x44,0x2a,0xad .byte 0x49,0x1e,0x19,0x76,0x48,0x32,0x74,0xc2,0xc9,0x72,0x8b,0x44,0x2c,0x59,0x77,0xa9,0xf1,0x36,0x0a,0xa7,0xe7,0x69,0x6f,0x2b,0xcc,0x3f,0xa7,0x5c,0x39,0xc0,0x38,0xd2,0x85,0x02,0x6a,0x1f,0xdf,0x21,0x34,0x66,0xfe,0x56,0x2a,0xf8,0xac,0x4e,0xe1,0x1a,0x14,0x12,0xd5,0xc1,0x41,0x0b,0x1f,0x18,0xf3,0x0a,0x52,0x96,0xbb,0xaa,0x78,0x59 .byte 0x16,0xe1,0xbf,0xa5,0x87,0x26,0x19,0x0d,0x68,0x0e,0xc0,0x4b,0xfd,0xd4,0xf8,0x60,0x9c,0xf4,0x6e,0x64,0xf2,0xbe,0x24,0x2a,0x3a,0x4e,0x05,0x01,0x26,0xe7,0x15,0xb5,0x14,0x06,0xeb,0x6e,0x21,0x88,0x4b,0x86,0x1b,0xcd,0xc5,0x29,0xaf,0x68,0xd1,0x94,0x25,0xbc,0x5c,0xf5,0xd3,0xd7,0x20,0x40,0x4e,0xad,0x9b,0x82,0xdf,0x46,0xe6,0x10 .byte 0x35,0x3e,0xbc,0x53,0x60,0x5a,0x1e,0x91,0xa0,0xcb,0xd7,0x09,0xd9,0x54,0xf4,0x2e,0xc8,0x4d,0x1e,0x8f,0x76,0xc4,0x67,0xed,0xb6,0x00,0xe4,0x97,0xb2,0xf9,0x21,0x98,0x3a,0xea,0xb3,0x53,0x79,0x98,0xfd,0x32,0x9a,0x76,0xb9,0x3c,0x74,0x09,0x37,0x60,0xfd,0xf6,0x36,0x58,0x40,0x19,0x4f,0x73,0x5b,0x27,0xed,0x3a,0xa8,0x58,0x27,0xf0 .byte 0xd0,0x11,0xee,0x20,0x94,0x0e,0x41,0x7d,0x47,0x85,0x27,0x45,0xae,0x3f,0x14,0x75,0xda,0x5d,0x8d,0xd9,0x31,0x58,0x99,0x40,0x9a,0xfe,0x1e,0x9c,0x7e,0x42,0x2f,0xe7,0xcd,0x43,0xb3,0x08,0xa9,0x71,0x5f,0x92,0x34,0x01,0xde,0x05,0x40,0xae,0x08,0xe3,0x62,0x36,0x71,0x7a,0xd4,0x75,0xf3,0xee,0x71,0x84,0x41,0xce,0xf3,0xca,0xa6,0x69 .byte 0xc2,0x13,0x2c,0x75,0x85,0xb4,0x43,0x8c,0x08,0x6c,0x1b,0xfb,0x87,0x1a,0xe2,0x74,0x22,0x86,0x2e,0x9e,0x3e,0x85,0xaa,0x34,0xb3,0x5f,0x43,0xf2,0xe5,0x6b,0x87,0x84,0x1a,0xce,0x70,0x1e,0x08,0x24,0xd8,0x16,0xe0,0x1a,0x78,0xd5,0x93,0xf7,0xe5,0x7b,0x49,0xff,0x8c,0x14,0x44,0xa6,0x2c,0xab,0x58,0xe6,0x59,0xb7,0x56,0x00,0xcd,0x1e .byte 0x53,0xd2,0xc2,0xa4,0x1a,0x56,0xbc,0x08,0x08,0xac,0xa7,0x95,0xbe,0xbb,0xdc,0xc8,0xdf,0xe3,0xa8,0x35,0x42,0x60,0x8a,0x1c,0xa6,0xf0,0xf3,0xa4,0xdc,0xcb,0x6b,0xb4,0x0a,0x6f,0x45,0xfa,0x6f,0x9c,0x92,0x15,0xe2,0x0b,0x0a,0xdd,0xb1,0xa9,0x68,0x54,0x3c,0x3b,0x9f,0xa3,0x9f,0x93,0x50,0xca,0xd4,0x8f,0xd5,0x09,0x0d,0xe8,0x94,0x18 .byte 0xce,0x5b,0x28,0xd9,0xd1,0xce,0x3f,0xc7,0x3d,0x42,0x11,0xd7,0x47,0x2c,0x8b,0x6c,0x6b,0x43,0x52,0xd2,0xdf,0xbb,0xe9,0xb4,0x4c,0x39,0xc6,0xf8,0x9e,0xc8,0xa5,0xa8,0x70,0x92,0xea,0x83,0x78,0xf9,0x40,0x57,0x43,0x58,0x8c,0xe6,0x08,0x34,0x01,0xf8,0xc6,0x8c,0xa9,0x93,0x0f,0x2f,0x91,0x95,0x90,0xb9,0xe4,0xb8,0x4f,0x89,0xb2,0xfa .byte 0x4e,0x30,0x4b,0x6e,0x91,0x69,0x80,0x0a,0xc5,0x2a,0x62,0x44,0x18,0x15,0xcf,0x93,0x9c,0x0f,0x55,0x44,0x4a,0x71,0xf2,0x72,0x87,0x88,0x38,0xff,0x79,0xc6,0xe9,0xe8,0xb6,0xd9,0xcb,0xd5,0x27,0x8b,0xc1,0x71,0xeb,0x42,0x12,0xbf,0x3b,0xeb,0x45,0x75,0xe1,0x80,0xcd,0xd4,0xdc,0xf6,0x2b,0x82,0x93,0x0c,0xad,0xc9,0x3a,0x31,0xb6,0xec .byte 0x38,0xee,0x3e,0xc0,0x5c,0x98,0xf9,0xe3,0xf5,0x82,0xf9,0x83,0x57,0xbb,0xed,0x1d,0x7a,0x48,0x10,0x1d,0x18,0xd8,0xab,0x2c,0xfd,0xf6,0x67,0x61,0x26,0x37,0x74,0x33,0x0f,0x9e,0x82,0x8e,0xaf,0x22,0x7f,0x57,0x5d,0xf7,0x53,0x9e,0xf9,0x20,0x98,0xf5,0x1f,0xbe,0x60,0xd9,0x81,0x5f,0xba,0x9b,0x36,0x07,0x65,0x9e,0x65,0xb5,0x2f,0x3f .byte 0x2b,0x0d,0xef,0x1a,0xf8,0xf7,0x6e,0x16,0x09,0x00,0xef,0xed,0x95,0x38,0xec,0x1b,0xf3,0xf6,0xa2,0x9f,0xb2,0x21,0x6a,0xc8,0x0f,0x59,0xf2,0xe8,0x6c,0x92,0x35,0x99,0x56,0x3f,0xa4,0xd9,0xcd,0x5c,0x72,0xfb,0x0a,0xea,0x3e,0xa2,0x58,0x33,0x85,0x48,0x53,0xcc,0xba,0x92,0x5e,0x81,0xa3,0x46,0xe3,0x1d,0xe8,0xc4,0x22,0x10,0x57,0x0a .byte 0xa1,0xba,0x5a,0x4e,0xc8,0xfb,0x14,0x9a,0x36,0x9d,0x61,0x5b,0x0d,0x2e,0x25,0x46,0x18,0x38,0x8c,0x20,0x51,0xd7,0xd1,0xe0,0x73,0xdb,0x76,0xaa,0xb3,0xa8,0x54,0xdc,0xb5,0x38,0xf2,0x5a,0x75,0x66,0x28,0xd3,0x5d,0x4a,0x8f,0x02,0x40,0x7e,0x88,0xfe,0x80,0x83,0x44,0x11,0xad,0xe8,0x52,0x70,0xa3,0x50,0x3d,0x22,0xc2,0x8a,0x83,0xef .byte 0xda,0xd7,0xae,0x04,0xb8,0x98,0x4e,0x9f,0xf6,0xb7,0x39,0xa5,0x72,0x29,0x61,0xbd,0xdf,0xd9,0xdc,0xe2,0x10,0x9b,0x8a,0x5f,0x42,0x4e,0x41,0x49,0x41,0x81,0xa2,0xc7,0x81,0x30,0xe9,0xfb,0x7f,0x10,0x1a,0x44,0xaa,0x79,0x70,0x1a,0x9d,0xe4,0xbd,0x98,0x25,0x75,0xff,0x45,0x5a,0x79,0x5d,0xe3,0x8d,0x58,0x87,0x2c,0x05,0xfd,0x34,0x98 .byte 0x06,0x90,0x55,0x24,0x6d,0xde,0xed,0x38,0xd4,0xf2,0xfa,0x55,0x43,0x34,0x73,0x83,0x82,0x47,0x0c,0x4c,0x1a,0xff,0xf8,0x9a,0xd3,0x57,0x75,0x8d,0x1d,0xf3,0x8e,0xde,0x96,0x29,0xce,0xd1,0x73,0xb1,0xe4,0x1c,0x24,0x3b,0xdf,0xed,0xd8,0xef,0x4a,0x5f,0xdb,0xe5,0x42,0x55,0x58,0x86,0xb7,0x01,0x6d,0x14,0x40,0x2c,0xb8,0x08,0x9f,0x9a .byte 0x46,0x9c,0xfd,0x85,0xcf,0x2d,0x5e,0x07,0x41,0xf9,0xb7,0x9f,0x6a,0xa8,0xaf,0x23,0xdc,0xdf,0x46,0x54,0xdb,0xd4,0xb0,0x03,0xef,0x82,0x26,0x8f,0x00,0x6e,0xf6,0x26,0x99,0xda,0xeb,0xab,0xc2,0x1e,0x49,0x8e,0x40,0x42,0x85,0x0b,0xc6,0x51,0xa9,0xe4,0x1f,0x63,0xf7,0x56,0x46,0xf4,0x4d,0x95,0x16,0x4a,0x38,0xc7,0x28,0x52,0x03,0xd6 .byte 0x5e,0x90,0x09,0xaf,0x31,0xc0,0x5b,0x32,0x52,0x1d,0x6b,0xb7,0xf7,0x17,0x86,0x6d,0x90,0x1d,0x78,0xf3,0xae,0xf6,0x96,0xe3,0x02,0x6d,0xe3,0xd6,0xdf,0xb9,0xfc,0x7a,0xfd,0x04,0xa5,0xbe,0x42,0x19,0x5c,0xd9,0x44,0x60,0x1e,0xb5,0xca,0xd7,0x99,0xa9,0x98,0x52,0x4b,0x9a,0x2c,0x05,0x08,0x88,0x06,0x12,0x30,0xe2,0xca,0x14,0xb9,0x30 .byte 0x7d,0x22,0xd8,0xaa,0x58,0x4c,0x80,0x10,0x39,0xa6,0x2b,0x7d,0x17,0xfe,0x72,0xe2,0x2f,0xa8,0x85,0x03,0x91,0xae,0xa0,0xe5,0xed,0xe0,0x02,0x40,0xf4,0x93,0x0c,0xf9,0x73,0xc7,0x8b,0x3e,0x26,0x1b,0xc6,0xf8,0x34,0x5d,0xda,0x74,0xf4,0x72,0xb2,0xcd,0x89,0xd2,0xdb,0xdc,0x60,0x84,0xa8,0xa5,0x40,0x9a,0x5e,0x6b,0x47,0x17,0x75,0x81 .byte 0x89,0x1b,0xec,0x18,0xd2,0x09,0x2c,0x57,0x1d,0xce,0x41,0x6e,0x14,0x99,0x2f,0x52,0x43,0x77,0xf7,0xdd,0x72,0xeb,0x8b,0x39,0x72,0x4b,0xcb,0x92,0x92,0xfc,0x55,0xbd,0xfd,0xd1,0xd6,0xd3,0xbb,0xa1,0x23,0x21,0x5a,0x41,0x2b,0x4e,0xe6,0xcf,0x9b,0x33,0x1e,0x0b,0xab,0xa5,0x69,0x96,0x32,0x4c,0x40,0xbe,0xfa,0x48,0x40,0x0c,0xbf,0x2f .byte 0x9d,0xd4,0xb0,0xfe,0x74,0x3e,0x9f,0xb6,0x08,0xb0,0x71,0x32,0xa6,0xeb,0x62,0x2a,0xbc,0xdd,0xca,0x68,0x41,0xe4,0xcd,0x52,0xfb,0x4f,0x09,0xdc,0xb8,0x26,0xad,0xfd,0x23,0x9d,0x65,0x80,0x00,0xd8,0xd2,0x27,0xfb,0x80,0xd0,0x06,0xfa,0xe8,0xbc,0x70,0x54,0x5a,0xb7,0x30,0x9a,0xec,0x38,0x02,0x76,0x0f,0xda,0x41,0x1e,0xfe,0xe9,0xa0 .byte 0x77,0x6e,0xef,0xfb,0x2e,0xf9,0x35,0x5a,0xcb,0x2d,0xdf,0x57,0x68,0xc3,0xb5,0xd9,0xef,0x72,0xb2,0xac,0xcb,0x60,0x90,0x17,0x70,0x8f,0xe6,0x70,0x52,0x13,0xa1,0xb2,0xe8,0x80,0xee,0x77,0x87,0xf2,0x72,0xeb,0x53,0xf0,0xcc,0x37,0xc2,0xe5,0x8c,0x0a,0x50,0x00,0x67,0x9f,0xf0,0xa6,0x2c,0xde,0xe9,0xd6,0xde,0x8a,0x96,0x50,0x6c,0x9e .byte 0xb0,0xd3,0x6a,0x8a,0xd0,0xd7,0x1d,0x53,0x63,0x58,0xef,0xfc,0xd3,0x74,0xe2,0x46,0x51,0xf7,0x78,0x69,0xb9,0x3e,0x6a,0xa3,0xdb,0x1b,0x7c,0x1c,0xc6,0x25,0xf7,0x36,0xba,0x27,0xd5,0x96,0x70,0x24,0x81,0xe1,0x7f,0x44,0x82,0x57,0xc7,0x37,0x71,0x00,0x6b,0xd1,0x99,0x12,0xb1,0x84,0xc9,0x65,0x03,0x3f,0x9b,0x36,0x4b,0x37,0x21,0x5d .byte 0x12,0x96,0x5d,0x64,0xdf,0x2c,0xe4,0x7a,0x1a,0x1e,0xf3,0xdf,0xc3,0xbb,0xb9,0x35,0x36,0x5f,0x71,0xe5,0xca,0x76,0x02,0x95,0x8e,0x2d,0x87,0x32,0xf2,0x78,0x0e,0x01,0xe1,0xb2,0x4c,0x11,0x26,0x70,0x4d,0x9b,0x9f,0xa1,0x65,0x7d,0x9c,0x2f,0xa6,0x01,0x2b,0xdc,0x3f,0x72,0xd1,0xe8,0xb1,0xd2,0x04,0x6b,0x8b,0xbf,0x43,0xba,0xbb,0xb9 .byte 0xec,0x86,0x2a,0x87,0xb5,0xee,0x82,0x40,0x96,0xde,0xd7,0xcc,0x07,0x66,0x38,0x90,0x70,0x20,0x03,0x51,0x5b,0xf2,0x54,0x87,0x5c,0x29,0x8c,0xb1,0xa1,0xf0,0x56,0x1f,0xb4,0x4c,0x69,0x3b,0x4e,0x6d,0x6a,0x39,0x0c,0xde,0x1b,0x32,0x15,0xbe,0xb0,0xc5,0x4c,0x9b,0x4b,0xf0,0x47,0x8a,0x30,0x6e,0xa9,0xbc,0xf1,0xa0,0x73,0x14,0x5c,0xea .byte 0x73,0x7c,0x0d,0x80,0x02,0xed,0x74,0xe7,0x77,0x42,0x2b,0x4a,0xc6,0xdd,0x70,0xd7,0x5d,0x4c,0xe9,0xfd,0x62,0x41,0xc1,0x55,0xd7,0xee,0x81,0x81,0x16,0xb5,0x3f,0x9f,0x6c,0x8a,0xb9,0x90,0x1c,0xd3,0xba,0x32,0x6b,0xa7,0xa6,0xa7,0x8f,0xd9,0xfa,0x18,0xfd,0x25,0x91,0x6e,0xc4,0x35,0xde,0x07,0x89,0x92,0x4e,0xfe,0x4a,0xb7,0x09,0x66 .byte 0xb0,0x58,0x32,0xe2,0xa3,0xa8,0x4e,0x7f,0x10,0xab,0xb8,0xe0,0x87,0xf1,0xaa,0x59,0x8e,0x71,0x62,0x47,0x93,0x19,0x82,0x8a,0xf9,0x0c,0x2d,0x9f,0x5d,0x6d,0xd2,0xa4,0x1f,0x96,0x36,0x3c,0x41,0x94,0xa2,0x87,0x68,0xcd,0x03,0x65,0x8c,0xbc,0x92,0xa9,0xa1,0xda,0x9c,0xcb,0x64,0x56,0xdd,0x06,0x82,0xc8,0xbb,0x20,0xb0,0xd3,0xf0,0x8e .byte 0x47,0xb7,0x71,0xf8,0x7c,0xc3,0x74,0x54,0x38,0xd2,0xa6,0x3c,0x7e,0xcb,0x27,0xcb,0xef,0xe9,0x7b,0xda,0xca,0x08,0x47,0x4b,0x35,0x45,0xff,0x64,0xae,0x6c,0x37,0xe9,0x5d,0xf5,0x00,0x51,0x71,0xf4,0x30,0x60,0x8c,0x22,0x5c,0xae,0x8a,0x03,0xc7,0xd3,0x91,0x7d,0x0f,0xf9,0x91,0xb5,0x2d,0xdc,0x36,0x61,0x4a,0x94,0xf8,0xc0,0x12,0xcf .byte 0x3e,0xf6,0xea,0x15,0x9c,0xe0,0x35,0x09,0xfb,0xca,0x1b,0x53,0x7e,0x4f,0x12,0xbc,0x2c,0xa8,0x1b,0x78,0x54,0xa1,0x7f,0x08,0x47,0xe3,0x0c,0x0e,0x84,0xd5,0x9e,0x49,0x91,0xf6,0x8d,0x30,0x5a,0x94,0xcf,0x50,0x62,0x26,0xc7,0x6b,0xad,0xa0,0x3a,0x45,0x12,0x0d,0x31,0xb1,0x64,0xcb,0xa1,0xda,0xc3,0x57,0x41,0x3b,0x03,0x43,0xe0,0xe9 .byte 0xa5,0xc5,0x4c,0x56,0x82,0xef,0x9f,0x1b,0xb4,0xd7,0xb3,0xc9,0xf5,0xca,0x0e,0xfa,0xc5,0xf2,0x4c,0xf3,0x20,0x0b,0x95,0xe1,0xeb,0xcc,0xb1,0x96,0xd8,0x55,0x68,0x23,0xda,0x30,0x98,0xe3,0x85,0x45,0xa7,0xc0,0xa8,0xe1,0xd6,0x3f,0x4b,0x7e,0x71,0x4b,0xdc,0x46,0x66,0x90,0xd1,0x6d,0x04,0x6b,0xb5,0xa4,0x6f,0x81,0x2c,0x9e,0x20,0xb2 .byte 0xad,0x80,0x57,0xd9,0x86,0x42,0xc2,0xab,0xfc,0x61,0x29,0x04,0x32,0xfc,0x77,0x12,0xa5,0xd8,0x58,0x97,0xf0,0x47,0xd2,0x60,0x51,0x86,0xcb,0xce,0x0a,0x2d,0x8b,0xdb,0xa3,0x38,0x32,0xc4,0xef,0xa1,0x7d,0xb8,0x56,0x72,0xd1,0xbc,0x1c,0xf7,0xfc,0xda,0xca,0x6b,0x61,0x13,0xb1,0x73,0x0c,0xb2,0x37,0xcb,0x68,0x69,0x19,0xcc,0xda,0x21 .byte 0xf1,0x3a,0x63,0x50,0x3c,0xfd,0x24,0x6e,0x66,0xbb,0x0d,0xfa,0xf3,0xe8,0xfa,0xb1,0x81,0x8a,0x4b,0x00,0x98,0x32,0x56,0x5c,0xaa,0xd0,0x13,0xe4,0x37,0xe2,0x7a,0xdd,0x00,0x6b,0x5d,0xc8,0x6f,0x25,0xd8,0xd8,0x36,0x24,0xeb,0x20,0x60,0x8e,0xbf,0x41,0x4f,0xab,0xc1,0xfc,0xc8,0x38,0xd6,0xf8,0xd6,0x27,0x52,0xac,0x2a,0x9a,0xf0,0x00 .byte 0x56,0xe8,0xdb,0xd1,0x14,0x68,0xb2,0xdc,0xbb,0x6f,0x18,0x93,0x52,0xe5,0x20,0x14,0x98,0x08,0x51,0xc8,0x89,0xee,0xaf,0x1e,0x78,0xcc,0x6a,0x92,0xcc,0x49,0xd4,0xfd,0xbe,0xa5,0x88,0x7b,0x07,0xcb,0x30,0x79,0x56,0xd6,0x0e,0x39,0x0b,0xc0,0x9e,0x1d,0xdf,0x5c,0x12,0x87,0x9d,0x9e,0x1f,0x0e,0xf1,0x6f,0xee,0x6d,0x71,0x18,0x63,0x72 .byte 0x57,0x3c,0x01,0xb9,0x69,0xb2,0xf3,0x4f,0x2a,0x2d,0x69,0x39,0x52,0xcd,0xac,0x3d,0xd9,0x9d,0xdb,0x2c,0xa9,0x51,0x52,0xd0,0xc2,0x61,0x78,0x87,0xef,0x74,0xc9,0x70,0x6e,0x73,0x37,0xa4,0x15,0xcd,0xb0,0xd9,0xac,0x59,0xfc,0xf8,0xcb,0xb6,0x6c,0xa6,0xa6,0xfa,0xf4,0x0d,0x87,0xe1,0xe3,0x5a,0x72,0xfe,0xfa,0xa6,0xab,0x34,0xd0,0x24 .byte 0xba,0xa8,0xa1,0x7e,0xbe,0xc0,0xec,0xd7,0x84,0x26,0x15,0xaf,0xf8,0xd6,0x73,0x61,0xa0,0xd8,0x2c,0x60,0x60,0xbe,0x34,0x1d,0x57,0x12,0xce,0x1b,0x24,0xea,0xca,0x8e,0x18,0x7f,0xe9,0x9e,0xc1,0x8b,0x09,0x11,0x9c,0x96,0x1c,0xf1,0xb3,0xa0,0x19,0x6a,0x17,0x42,0x32,0x46,0xc8,0x72,0xbc,0x6b,0x83,0x58,0x42,0xe9,0x87,0x0e,0x1b,0xeb .byte 0xbb,0xea,0x5f,0xe4,0xcf,0xff,0xc3,0xf9,0x59,0xd5,0xc4,0x3c,0xfa,0x84,0xb2,0xa7,0x7b,0x49,0x9d,0xd8,0x68,0x45,0x07,0x0a,0x21,0x8a,0x75,0x80,0x94,0x2e,0xb9,0x36,0x01,0x0c,0xd0,0xde,0x88,0xed,0x62,0x55,0xc2,0x49,0x92,0xf5,0xa4,0x51,0x5b,0xcd,0x3a,0x56,0x0a,0x85,0x36,0x14,0xea,0x23,0x79,0x48,0xea,0x6e,0x67,0x20,0xcc,0x2b .byte 0x2d,0xb8,0xfb,0x01,0x89,0xf3,0x9a,0x22,0x0c,0x6e,0xb9,0x47,0x3a,0x07,0xef,0x11,0x88,0xd4,0xc0,0xab,0x39,0x2e,0xee,0x8d,0x1f,0x44,0x0e,0x2c,0x32,0xba,0x54,0x60,0x03,0x70,0xed,0x11,0x01,0x2d,0x08,0x5a,0x69,0xea,0x62,0x46,0xdb,0xf5,0x99,0xa6,0x69,0x1c,0x43,0x95,0x4b,0xf6,0x02,0xb1,0xd1,0x38,0xe9,0xd3,0x96,0x7d,0xae,0x0f .byte 0x46,0x0d,0x9c,0x73,0xe3,0x90,0x9a,0x23,0xc2,0x34,0xb0,0x53,0x04,0x88,0xd0,0x61,0x82,0x46,0xef,0xe1,0x54,0xca,0x54,0x32,0xc1,0xaa,0x1f,0x3d,0x9b,0xac,0x8c,0x78,0x0d,0x0d,0x53,0xba,0x81,0x48,0x7c,0xda,0x9c,0x49,0x07,0x38,0x0d,0xc0,0xa3,0xb2,0xc0,0x4a,0xae,0x29,0x3b,0x0a,0x78,0x0c,0x4b,0xf5,0x9e,0xb3,0x4c,0x42,0xa0,0x52 .byte 0xb6,0x6f,0xc5,0x77,0xd8,0xed,0xae,0x4d,0x45,0x09,0xe5,0xc8,0xd2,0xbe,0x5b,0x12,0x1d,0x6f,0x5c,0x3a,0x7e,0x5f,0x7a,0x04,0xbf,0x67,0x4d,0x76,0xdf,0x00,0x42,0x18,0xcd,0x65,0x6d,0x64,0x97,0x85,0x09,0x80,0xb6,0x13,0xc0,0x9b,0x8c,0x25,0x52,0x6b,0x03,0x88,0x2f,0xba,0x4c,0xbe,0xab,0xf9,0x3a,0x3b,0x4a,0x87,0x42,0xc0,0xe5,0x61 .byte 0x37,0x4b,0x1a,0xb9,0x68,0x1a,0x50,0xde,0xf2,0xaf,0xdd,0xf4,0xa4,0xa0,0x97,0xf6,0xec,0x70,0xbe,0x6e,0xe5,0x7a,0x14,0x8a,0xfe,0x49,0x54,0x18,0x21,0x30,0xc3,0x3e,0xa8,0xa0,0xbc,0xd0,0x32,0x48,0x8b,0x67,0x47,0x39,0x10,0x1b,0x5f,0x67,0xe1,0x3c,0xf2,0xfc,0xe5,0xb9,0x23,0x96,0xdd,0xeb,0xc5,0x76,0x5a,0xc9,0xee,0xe2,0x09,0x43 .byte 0xfe,0x4b,0x6e,0x99,0x17,0x24,0xfc,0x30,0x02,0x2f,0x4c,0x3d,0x52,0xe7,0xdf,0xd5,0x20,0x5d,0x13,0x3b,0x4a,0xfd,0xb4,0x78,0x3b,0x91,0x58,0x52,0x2e,0x3c,0x8a,0xad,0xfc,0x64,0xb9,0xc2,0xcd,0xdd,0x58,0xf5,0xce,0x1f,0x50,0xdf,0xd9,0x8f,0x39,0x93,0x17,0xe4,0xac,0x7d,0x6b,0xf6,0x7f,0x72,0xd2,0x9e,0xa5,0x8c,0x4f,0x16,0x29,0xf8 .byte 0xca,0xb2,0xf3,0xb2,0x94,0x08,0x91,0x74,0xf9,0x1a,0x01,0xa1,0x15,0xb4,0x79,0xb3,0xb9,0x18,0x91,0x34,0xa5,0x2b,0x45,0xd3,0xbf,0xf7,0x11,0x42,0xbd,0x63,0x08,0xf9,0x89,0xab,0xbe,0x02,0xab,0xda,0xfc,0xc6,0xba,0x57,0xd8,0x60,0x1d,0x03,0x12,0x57,0x01,0x9f,0x88,0xc1,0x3b,0xa5,0xa3,0x09,0xd5,0xb5,0x37,0x32,0x86,0xe6,0xf0,0x1d .byte 0xf2,0x37,0x57,0xdd,0x05,0x56,0xfe,0x2d,0x7c,0x95,0x52,0x93,0x21,0x1c,0x8b,0xfe,0xda,0xea,0xee,0xd9,0xc4,0xec,0x54,0x2e,0x35,0xb3,0x64,0x72,0xf2,0x7a,0x4a,0x1c,0xc9,0x33,0x07,0xda,0xc9,0xd8,0x7d,0x5d,0xeb,0xef,0x23,0x91,0xb5,0x68,0x8e,0xf5,0x4e,0xb9,0xd3,0xff,0x7b,0x72,0x27,0xbf,0x9e,0xf7,0x16,0x8a,0x42,0x4f,0x3a,0x0a .byte 0x09,0xfe,0x0b,0xf9,0x64,0xfd,0xa6,0xf2,0xaa,0x29,0x45,0xeb,0xe1,0x4c,0xf8,0x84,0x9d,0x19,0xf9,0x18,0xf6,0x72,0x9e,0x5f,0xf6,0x91,0xca,0xf7,0xda,0x88,0x0a,0x2c,0xb0,0xea,0x33,0x34,0xd0,0xa9,0x4c,0xd5,0x1f,0x91,0x08,0x74,0xc7,0x62,0x66,0xb4,0x60,0xdb,0x76,0x3e,0x17,0x43,0x73,0xdd,0x67,0x71,0xaa,0xc0,0x6c,0xe2,0x1c,0x54 .byte 0xfe,0x97,0x5e,0xf9,0x1b,0xa7,0x61,0xf2,0x40,0x96,0xc1,0x06,0x14,0xc8,0x7f,0xe5,0xec,0x66,0x2d,0xca,0x53,0xd1,0xf8,0x49,0x59,0xce,0xfd,0x79,0x20,0xe0,0xd4,0x3d,0x4f,0x25,0x7e,0x43,0x51,0x58,0x84,0x7e,0x23,0x29,0x4d,0xc3,0x4f,0x60,0x11,0xbb,0xc4,0x7b,0x67,0x32,0xd4,0x33,0x70,0x65,0x16,0x02,0x0f,0xdd,0x19,0xde,0xc2,0x1c .byte 0x69,0xd2,0x39,0x79,0xd0,0x81,0x91,0xc0,0x3d,0xb3,0xee,0x79,0xcc,0xdd,0x81,0x0a,0x7c,0x92,0x5f,0x23,0x4e,0x66,0xbc,0x0a,0xc4,0xab,0xf4,0xf4,0x31,0x74,0x46,0xd9,0x74,0x18,0xe3,0x68,0xc2,0xc9,0x04,0x73,0x5a,0xb4,0xd3,0x87,0xda,0x56,0xe7,0x60,0xb2,0x2b,0x1e,0xd3,0x20,0x72,0x33,0x40,0xa6,0x4b,0x26,0x6f,0xcc,0x05,0x57,0x62 .byte 0x17,0x0d,0x7d,0x14,0x5d,0xe8,0x7c,0xa9,0x1e,0x2e,0xbb,0x6f,0xb4,0x2f,0x3e,0xec,0x3b,0x62,0x1c,0xae,0x9d,0x2d,0x6c,0x9f,0x1f,0xed,0xd0,0xb1,0x99,0x71,0xd0,0x79,0x0b,0x80,0x68,0x3b,0xeb,0x47,0xb0,0xf4,0xec,0x8a,0x1f,0x9f,0x55,0xb6,0xf4,0xfc,0xd0,0xb5,0x7d,0xa8,0xd0,0x70,0x73,0x32,0x87,0x5e,0xb9,0x61,0x5c,0xc1,0xdc,0x5d .byte 0x2e,0x1f,0xfb,0x83,0x82,0xaf,0xfa,0xa9,0x6b,0x61,0x4b,0xe4,0x4a,0xa7,0x50,0x28,0x8d,0x7f,0x27,0x1b,0x8e,0xb1,0x81,0x1a,0x60,0xa5,0x1e,0x79,0x0a,0xcf,0xc6,0x4e,0x0e,0xdf,0x67,0xe2,0x08,0xb5,0xbb,0xa7,0xa2,0x5a,0xcf,0xa2,0xc2,0xd3,0xdf,0x7f,0xb8,0xbb,0x06,0x44,0xd9,0xfb,0xa9,0xa4,0x3b,0x8e,0x93,0x64,0xce,0x54,0x9c,0x6d .byte 0xce,0x2d,0xca,0xb7,0xbf,0xb1,0x13,0x8c,0x53,0x25,0x7b,0xcb,0x4d,0x15,0x99,0xe8,0x3e,0xdd,0xf9,0x0a,0x64,0xd0,0x52,0xc1,0xd9,0x08,0xb7,0x6c,0x47,0xcb,0x76,0x9f,0xda,0x38,0x5c,0x8d,0x81,0xd2,0x74,0xc7,0xa5,0xb2,0x44,0x1d,0xa5,0x92,0xb8,0x0d,0x99,0x97,0xd7,0x16,0x30,0x22,0xaf,0xac,0xcf,0x5a,0x5f,0x32,0x0e,0x18,0xce,0xfa .byte 0xec,0x52,0x36,0xa5,0x03,0x00,0xc6,0xe6,0x4e,0x7c,0x22,0x97,0xbb,0xbd,0x19,0x60,0xec,0xc7,0xb3,0xb4,0xee,0x74,0x9a,0x66,0x6b,0x19,0x6c,0x41,0x02,0xd7,0x15,0x68,0xf9,0x13,0x9f,0xa4,0xf4,0xf1,0x58,0x0d,0x9e,0xf5,0x00,0x2d,0xce,0x6d,0xbb,0x2b,0x0a,0xcc,0x52,0xcb,0x17,0x6f,0xfa,0x22,0xfd,0x5b,0x01,0x3a,0x5b,0xee,0x48,0x71 .byte 0xbf,0xe8,0xad,0x7b,0x95,0xd8,0x6b,0x96,0x36,0x80,0x4b,0xf6,0x92,0x0d,0x86,0x8d,0xc3,0xeb,0x8f,0xe8,0x90,0x2f,0x21,0x16,0xb4,0x9b,0x89,0xbc,0x2d,0x72,0x7c,0x17,0xdb,0x35,0x07,0x0d,0x67,0x7e,0x99,0x04,0x89,0x14,0xcb,0x95,0xd7,0x35,0x58,0xbd,0x63,0x28,0x24,0x8c,0x05,0xea,0xab,0x75,0xd8,0xa9,0x14,0x2c,0xda,0xc8,0xcf,0x21 .byte 0x1e,0xaf,0xa9,0x7a,0x39,0x7a,0xc6,0x26,0x27,0xa5,0x62,0x51,0xe6,0x51,0xf2,0x9b,0xe8,0x02,0xa7,0x97,0xb5,0x8f,0x2f,0xff,0xf0,0xf0,0x7e,0x93,0x8d,0xd1,0x0c,0x5f,0x01,0xb7,0xb9,0x36,0x89,0x47,0xd4,0x30,0x02,0xf2,0xaa,0x28,0x3c,0x8e,0x25,0x8e,0x19,0x8e,0xfa,0x54,0x25,0x57,0xf2,0x38,0xbc,0x06,0xa5,0xcd,0x93,0xf4,0x9e,0x77 .byte 0x3d,0x58,0x8f,0x69,0x10,0xab,0xcc,0x38,0xb1,0xa8,0x2c,0x3e,0xde,0x80,0x6b,0xa6,0xd7,0x7e,0xbd,0x07,0xfe,0x8a,0x10,0xd8,0x1f,0x37,0x77,0xed,0x29,0x6c,0x45,0x6c,0x0d,0xb9,0xab,0xcf,0x4c,0x04,0x8c,0x0d,0xce,0x10,0x3a,0xfb,0x16,0xd3,0x89,0x53,0x5f,0x41,0xc0,0x18,0x6a,0x5e,0xd6,0xdd,0xc4,0x46,0x19,0x3b,0xbe,0x25,0xd5,0x03 .byte 0x27,0xfe,0x00,0x76,0x45,0x95,0x89,0x19,0x9c,0x2f,0x70,0xa7,0xb6,0x87,0x85,0x5e,0xd0,0xe4,0x2f,0x48,0x0f,0x52,0x3d,0x25,0x3a,0x45,0x5d,0x0b,0x55,0xcb,0xec,0x6d,0x97,0xaa,0xe9,0x7e,0xae,0x70,0x72,0xe2,0xbd,0x06,0xd7,0x4c,0x1d,0x1d,0x56,0xa7,0x24,0x09,0x4b,0xcb,0x09,0xc6,0x65,0xf1,0x5e,0x3d,0xeb,0x0a,0xc1,0x9c,0xc7,0x12 .byte 0xfd,0xd9,0xdb,0xe7,0xe2,0x52,0x5a,0x68,0x4f,0x90,0xf3,0xf8,0xa4,0xe1,0x46,0x30,0x47,0x31,0x54,0x67,0xbc,0xdc,0x77,0xd6,0x73,0xe7,0x55,0xc9,0x2e,0xbe,0xe9,0xb6,0x6f,0x7f,0x0f,0xd8,0x30,0x50,0x95,0x03,0x3e,0x8f,0x8a,0x3c,0x4c,0x86,0x63,0xb6,0x44,0xae,0x1b,0xbc,0x1d,0x90,0x1a,0x76,0x4e,0x92,0x98,0xba,0x59,0x73,0xf8,0xff .byte 0x07,0xdb,0xc4,0x90,0x17,0x0d,0xf1,0x58,0x13,0x64,0x88,0xcc,0x16,0x30,0xec,0x70,0x87,0x20,0xfc,0x3e,0xf6,0x70,0x2e,0x92,0xcb,0x42,0x47,0x5b,0xb3,0xf1,0x89,0xf1,0xd7,0xf5,0x16,0x89,0xed,0xf5,0x04,0x1a,0x85,0x9e,0xe7,0x74,0x8c,0xd6,0x79,0x26,0x2c,0x21,0xcd,0xff,0x53,0xea,0xf9,0xff,0x69,0x82,0x35,0xdb,0xc1,0x2a,0x36,0xf6 .byte 0xf6,0x98,0x08,0x7c,0xcd,0x31,0x32,0x8e,0xb3,0xf5,0xe9,0xe4,0x38,0xec,0x38,0x08,0xa8,0xbc,0x83,0x3f,0xfa,0xbe,0xb6,0xd6,0x20,0x10,0xaa,0x3e,0x5d,0x6c,0x96,0x4f,0x31,0x63,0xf2,0x90,0xce,0x0a,0x4c,0x94,0x63,0xb7,0xb5,0xd1,0x4a,0xcb,0xf1,0xd6,0x21,0x23,0x07,0x49,0x80,0x6c,0xe6,0x4a,0x6a,0xa4,0x9c,0x10,0x31,0x34,0xe3,0xf5 .byte 0x3c,0x8c,0x53,0x7d,0x56,0x3e,0xc7,0x91,0x99,0x7c,0xd3,0x0a,0xa0,0x81,0x50,0x54,0x4c,0x8c,0x8f,0x53,0x6a,0xda,0x39,0x9e,0xc4,0xf5,0xa9,0x26,0xa0,0xc3,0x1f,0xb2,0x79,0x9b,0x51,0x0a,0x18,0x2a,0xe8,0xf5,0x94,0x30,0xa3,0x4e,0x27,0xc3,0xdb,0x8c,0xc6,0xa1,0x8f,0x4f,0xef,0x94,0x11,0x74,0xb6,0x05,0x9e,0xd8,0xc1,0x8f,0x8a,0x0f .byte 0x38,0x36,0x70,0x68,0x66,0x56,0x14,0xf1,0xda,0xda,0xc2,0xe1,0xc8,0xaf,0x1f,0x85,0x95,0xa7,0xaf,0x17,0xdc,0x38,0x7e,0x05,0x23,0x1e,0x37,0x05,0x6c,0xde,0x1c,0x91,0x64,0x0d,0xd5,0x74,0xe7,0xef,0xee,0x01,0xac,0x85,0xbb,0xca,0x06,0x7c,0xab,0x8d,0xaa,0xb4,0xaa,0xd4,0xb8,0x0c,0xb8,0xcf,0x13,0x9b,0xd2,0x9d,0x22,0xa5,0x44,0x51 .byte 0xd5,0x87,0xdf,0x74,0xe1,0x70,0x8b,0xef,0x24,0x04,0xe8,0x3a,0x74,0xf1,0x35,0x89,0xc3,0x20,0x81,0xc7,0xaa,0x1e,0x51,0x5f,0x28,0x42,0x37,0xbc,0xaf,0x81,0xe3,0x4d,0xc5,0x10,0xcc,0xb4,0x6d,0xf6,0x81,0x73,0x1f,0xc5,0x59,0x78,0x7d,0xce,0x7d,0xab,0x20,0x4f,0x86,0x06,0xb9,0xa3,0xc5,0x97,0x76,0x5d,0xeb,0xc4,0x9f,0x22,0xb8,0x7b .byte 0xc1,0x35,0x6c,0xd6,0x4e,0x12,0x26,0xf1,0xda,0xae,0x15,0xab,0xab,0xbc,0xd5,0x07,0x5b,0xf1,0x9a,0xf0,0xbd,0x7f,0x08,0x15,0xd1,0x12,0x23,0x7f,0x78,0x9e,0x89,0x54,0xd8,0x16,0x96,0xa1,0x14,0x45,0x12,0xce,0xda,0xad,0x41,0xa4,0x70,0xdf,0xfc,0xa3,0xdc,0x27,0xc2,0xa3,0x11,0x8d,0x25,0x8b,0x6d,0xda,0xd7,0x03,0x7d,0x32,0x32,0x3c .byte 0x8a,0x97,0x8f,0x10,0xcc,0x40,0x89,0x17,0x5e,0x30,0x2b,0xd1,0xb6,0x44,0xb4,0x6c,0x44,0xe7,0xe0,0xd1,0xfb,0xe1,0x68,0xf5,0xc9,0xa8,0x3c,0xa6,0x0b,0x30,0xb5,0x7a,0x0a,0x15,0x43,0x57,0xbd,0x0a,0xcc,0x02,0x05,0x47,0xfb,0x10,0x30,0x07,0x8b,0x9e,0xae,0xd8,0x03,0x18,0x06,0x26,0x35,0xa8,0xae,0x1e,0x51,0x71,0xa8,0x4d,0x27,0x6e .byte 0x25,0x27,0x77,0xb5,0x79,0x43,0x03,0x04,0xaf,0x61,0x04,0xbc,0x29,0x3e,0x6e,0xfe,0x35,0xc9,0x41,0xfc,0x8a,0x3c,0xd8,0xe4,0xa3,0x34,0x40,0x49,0x36,0x9b,0x18,0x8c,0x6a,0x34,0xa6,0x4c,0xed,0x51,0x8f,0x3a,0xaa,0xa2,0x3f,0xc6,0xce,0xa8,0x53,0x5a,0xa8,0x4e,0xc1,0x84,0x5d,0x2a,0x0b,0x24,0xe5,0x46,0x8e,0xc4,0x55,0x52,0xf4,0xf3 .byte 0x0c,0xa5,0x24,0x10,0x7e,0xfc,0xed,0x42,0x11,0x39,0xfd,0x3d,0x4a,0x07,0xaf,0x21,0x35,0x4a,0x51,0xcd,0xfb,0x98,0x9a,0x5f,0x15,0x3a,0xab,0xb0,0x56,0x39,0x17,0xcd,0xb9,0xa6,0x6d,0x73,0xbc,0x63,0x95,0xf8,0x78,0x65,0x6f,0x47,0xe9,0x5d,0x12,0x62,0x52,0xb6,0xb2,0x86,0x49,0x1b,0x53,0x3d,0x27,0xc4,0x17,0xa4,0x56,0xc9,0x85,0xbe .byte 0xe1,0x54,0xed,0x72,0x03,0xd9,0x67,0x6f,0xd0,0xea,0xf7,0x5b,0x39,0x61,0x42,0x48,0xd5,0x8d,0xfb,0xe6,0x3b,0x93,0x16,0x42,0x29,0x0b,0x27,0x1d,0x1f,0xae,0x78,0x16,0x59,0xa6,0x33,0x36,0x86,0x8d,0x31,0x30,0x9e,0xa0,0x82,0xdd,0x02,0x1c,0xde,0x01,0x0f,0x87,0x85,0x2e,0xbb,0x68,0x46,0x8e,0xfc,0xfe,0x32,0x78,0xe4,0x27,0x4f,0xb2 .byte 0x12,0x94,0x95,0x93,0xba,0x09,0xb4,0x58,0x5c,0x0e,0xa4,0x8a,0x6f,0x0a,0xfc,0xac,0x9f,0x99,0x8a,0x06,0xaa,0x9f,0x69,0x4f,0x3c,0xec,0xe5,0x52,0x60,0x60,0xb8,0xfe,0xf6,0x27,0x47,0xff,0xc9,0x2f,0xec,0xed,0x50,0x07,0xe5,0x3e,0x28,0x65,0xb3,0x36,0x52,0x5c,0xa9,0x4c,0x64,0x65,0x5f,0xfe,0xe3,0xe6,0x19,0x4b,0xdc,0xa0,0x3f,0xab .byte 0xff,0xca,0x37,0x03,0x83,0xb1,0xe2,0x35,0x69,0x08,0x6d,0x08,0xe4,0xa8,0xc5,0x04,0xe0,0x00,0x66,0x70,0x96,0x16,0x21,0x07,0xe2,0xbc,0x92,0x30,0x31,0x6d,0x02,0xeb,0xbf,0x5a,0x8c,0x39,0x7a,0xd6,0xba,0x15,0x52,0xf6,0xf7,0x30,0x08,0x04,0x5a,0x84,0x56,0x7d,0x8c,0xf1,0x3b,0x87,0xc9,0xfd,0x76,0xd0,0x6d,0x28,0x93,0x4f,0x23,0x9b .byte 0xf7,0x26,0x7a,0xfe,0xc2,0xde,0xf4,0xb6,0x9c,0x29,0xcc,0x45,0x1a,0x50,0x52,0xab,0xa2,0xef,0x38,0x69,0xe7,0x73,0x54,0xa1,0xf3,0xce,0x31,0xe6,0xa3,0x8a,0x26,0xa5,0x37,0x39,0x88,0xa4,0xf0,0x39,0xb5,0x52,0x2c,0x3d,0xc7,0x60,0xe0,0x9e,0xfe,0xa4,0x4e,0x00,0xf3,0x58,0x4b,0x8a,0xb0,0x9a,0xfc,0x31,0xc5,0x1a,0xd5,0x80,0x37,0x06 .byte 0x35,0xc2,0x52,0xff,0xa3,0xff,0xd6,0xb5,0xbd,0x66,0x3b,0x61,0x00,0x1e,0x0a,0x9c,0xea,0x8b,0xb1,0x89,0x8a,0x5d,0xe2,0x4f,0x9a,0xf5,0x45,0xe8,0x76,0xa1,0xcf,0x12,0x57,0x74,0x00,0x8f,0xd4,0xc7,0x69,0xef,0x81,0x0e,0x87,0x0c,0xd9,0x54,0x59,0x73,0xed,0x37,0xb8,0xd6,0x90,0x6a,0xae,0x35,0x60,0x77,0x3f,0xd8,0xb6,0x07,0x6e,0x7a .byte 0x80,0x6b,0x51,0x7a,0xbe,0xd3,0x7c,0xe3,0xaf,0x75,0xee,0x25,0x84,0x14,0x74,0x64,0xed,0xc1,0x06,0x44,0xf8,0x1d,0x92,0x95,0x3e,0xfa,0x7b,0x01,0x5c,0x07,0xda,0x3e,0xb1,0x25,0x25,0xf2,0xf9,0x4f,0x07,0x91,0x96,0xf9,0x22,0x39,0x79,0x4e,0x5b,0x82,0xb1,0xb1,0x4c,0x28,0xba,0x13,0x76,0xd1,0x74,0xda,0x52,0xf9,0x2b,0x08,0x05,0x81 .byte 0x9b,0xa2,0xf1,0x17,0x96,0x23,0x37,0x37,0x4f,0xc4,0x81,0x30,0xff,0xfe,0xb2,0x3a,0xc3,0x73,0x91,0xd3,0x75,0xaf,0x99,0xc1,0x8e,0x18,0x9e,0x73,0xef,0xad,0x37,0xc4,0x1f,0xeb,0x67,0x3b,0xba,0x5d,0xc8,0x65,0x7a,0x8f,0xdf,0x1c,0x3e,0x6e,0xca,0xca,0x48,0x67,0x6b,0x10,0xad,0x43,0x06,0xe8,0xd5,0xfc,0xf5,0x5f,0x10,0x20,0x43,0x20 .byte 0x5e,0x84,0x49,0x15,0x13,0x0d,0xf2,0x4e,0x9f,0xcf,0x66,0xab,0x6d,0x52,0x43,0x62,0xc3,0x84,0x8a,0xee,0x99,0x3f,0x2f,0xbf,0x05,0x72,0x0d,0xad,0x97,0x5e,0x58,0x09,0xe7,0x88,0xe6,0x79,0xe4,0x2e,0xa4,0x10,0x0f,0x1e,0x8e,0xb4,0x01,0x24,0xf0,0x3e,0x16,0xad,0xf4,0x77,0x87,0x86,0xff,0xb6,0x32,0xa3,0x98,0xc4,0xb3,0xd6,0x6e,0x55 .byte 0xca,0x93,0x18,0x5d,0x55,0xd4,0x08,0x73,0x42,0x32,0xc0,0xa2,0x92,0x33,0xa8,0xdf,0x7e,0xd9,0x99,0x3d,0x4a,0x88,0xf6,0xff,0x78,0xbd,0x94,0xd5,0x70,0x11,0x29,0x00,0x89,0xe8,0x76,0xe2,0x98,0x53,0xaf,0x8e,0x30,0x63,0x43,0x35,0x68,0x96,0xbc,0xdd,0xb8,0xca,0xca,0x23,0x9b,0xb8,0x05,0xbe,0x63,0xa0,0x16,0x53,0xef,0x2d,0x8d,0x6c .byte 0xaa,0xba,0x77,0xd1,0xcf,0xde,0x04,0xbb,0x8a,0xd2,0xc1,0x0e,0xbf,0x4e,0x21,0x8b,0xf3,0x25,0x2f,0xe3,0xef,0x3f,0xd6,0xd2,0x73,0xf1,0xb2,0x1c,0x82,0x19,0xd1,0xb0,0x71,0x5a,0x87,0xcc,0x67,0x22,0x7f,0x3f,0xeb,0xfe,0x9c,0x30,0x65,0x48,0xbd,0xe0,0x9b,0x10,0x22,0xe3,0x36,0xab,0xf4,0x69,0x62,0x24,0xb7,0xc7,0x51,0xe3,0x33,0x7e .byte 0x1a,0x05,0xad,0x3a,0xf5,0x63,0x21,0xcb,0x87,0x30,0xa1,0xb4,0xf6,0xd1,0xfd,0x30,0x73,0x32,0x4a,0xf5,0x20,0xe8,0x29,0xa1,0x37,0xed,0x5e,0xcb,0xf8,0x3e,0x03,0x7f,0x2f,0x4c,0x56,0xaa,0x35,0xf3,0xd3,0x4b,0xda,0xe6,0x49,0xf3,0x3a,0x62,0x88,0x31,0x76,0x09,0x60,0xf8,0x22,0x0b,0x1c,0x2f,0x3a,0xf9,0x64,0xc4,0xce,0x68,0x41,0xc7 .byte 0x85,0x25,0xdc,0x81,0xe7,0x60,0x36,0x48,0x44,0xdb,0x64,0x72,0x00,0xe4,0x98,0x53,0x2a,0x48,0x21,0xbe,0xb9,0x52,0xc8,0xc5,0xaa,0xb1,0x2b,0x0f,0xeb,0x24,0xd1,0x4f,0x0d,0x4e,0x52,0xf0,0x8f,0xa8,0x13,0x94,0x0d,0x01,0xea,0xdd,0xeb,0x4c,0xb8,0xcb,0x31,0x2e,0xe4,0x5d,0x1f,0x37,0x86,0xfd,0x52,0x10,0xf3,0x02,0xf6,0x32,0xf5,0x34 .byte 0xb7,0xa9,0x87,0x43,0xf1,0x46,0x06,0x8e,0xa7,0x1c,0x8c,0x34,0x17,0xaa,0xf7,0x59,0x33,0x2f,0xdd,0x27,0x37,0x9e,0x44,0x65,0x81,0x29,0x86,0x44,0xa8,0xdf,0xc7,0x3d,0x67,0x9f,0x14,0x50,0xd7,0xe0,0x59,0x7f,0xd9,0xdb,0xdf,0x19,0xe9,0x03,0x81,0xae,0xf8,0xa9,0x36,0x3b,0x7c,0x3c,0x30,0x6a,0x4f,0x76,0x07,0xfb,0x0d,0xa8,0xaf,0x4d .byte 0x97,0x2f,0x2c,0x0f,0x73,0x45,0xba,0x60,0xd0,0x50,0xf7,0xf7,0xba,0x04,0xf0,0x8c,0xdb,0x68,0x04,0xbb,0xa2,0xf5,0x6a,0x58,0xeb,0xec,0x7e,0x68,0x3e,0x6c,0x69,0x6f,0x32,0x9c,0x74,0xb6,0x4a,0x8f,0x34,0x3c,0x36,0xb2,0xfc,0xfb,0xbb,0x9b,0xd9,0xbc,0x00,0x31,0x59,0x0d,0x85,0x66,0x1c,0xfb,0x99,0x55,0x78,0xdd,0x0d,0x92,0xec,0x85 .byte 0x97,0xc1,0x6f,0xf5,0x6b,0x25,0xed,0x6f,0x09,0xef,0x50,0xdd,0xc2,0x90,0xb1,0x7d,0xa0,0x27,0x7b,0xa8,0x5f,0x35,0x0c,0x51,0x54,0x6e,0x64,0x4f,0x5d,0xcf,0x2f,0x5f,0xe7,0x99,0xb5,0xc1,0x91,0x4c,0xc0,0x24,0x01,0x4b,0x44,0x95,0xfc,0xd1,0x9f,0xa5,0xd0,0xe1,0x4f,0xb0,0x56,0x99,0x8b,0x03,0x44,0xf9,0x5e,0xfe,0xbe,0xa2,0xcc,0x58 .byte 0x3b,0x69,0xbf,0x44,0x67,0x8e,0xd1,0xb2,0x66,0x3c,0x8e,0x68,0x6b,0x1b,0x5c,0xfb,0xeb,0x84,0xf2,0x92,0x43,0x8d,0x7c,0x64,0x11,0xc8,0xf5,0xda,0xf5,0x4f,0xeb,0x8b,0x91,0xac,0x6b,0x47,0xe0,0xfc,0xaa,0x89,0xe8,0xd2,0xba,0x58,0x43,0xbb,0x9e,0x13,0x20,0xa1,0xfe,0xf7,0xa5,0x15,0x82,0x0d,0xbb,0xc3,0x60,0x40,0xf5,0x49,0xd5,0xea .byte 0x71,0xad,0xd7,0x7d,0x8c,0x90,0xd2,0xe5,0x51,0x8a,0x01,0x3d,0xbf,0x59,0x00,0x41,0x59,0x65,0xba,0x18,0x30,0x86,0x2a,0xcb,0x41,0x24,0x9a,0x44,0x54,0xac,0x07,0xf2,0xcf,0xe9,0x3c,0xec,0xd0,0x7d,0x91,0x0e,0xb5,0xbd,0xed,0xc4,0xf2,0x90,0x27,0x2f,0x31,0x31,0x96,0xd2,0xfc,0xe2,0x6e,0x70,0x61,0x81,0x7b,0xc8,0x8d,0x78,0x41,0xb9 .byte 0x56,0x64,0x01,0x37,0x86,0x54,0xec,0x2b,0xdb,0xd5,0xef,0xf7,0xf4,0x73,0x8d,0x84,0xdd,0x5c,0xd4,0x00,0x23,0x2b,0x4c,0x4c,0x04,0x4b,0x4b,0x61,0xd0,0x4b,0x38,0x8f,0x5e,0x56,0xb2,0xc5,0xc7,0x72,0x04,0x33,0xed,0xd7,0x91,0x99,0x22,0xee,0xdf,0xe5,0x65,0x55,0x9a,0xcb,0x32,0x22,0x48,0x6d,0x55,0xe8,0x9f,0xf9,0x95,0x62,0x45,0xdc .byte 0x21,0x6e,0xc5,0xb2,0x8e,0x4d,0x9a,0xf2,0x2b,0x2e,0x6f,0x40,0xd1,0x2f,0x4d,0xda,0xbd,0x85,0xb1,0x6f,0x04,0x39,0x09,0xfa,0xa1,0x3b,0x86,0xe6,0xdb,0x3e,0x50,0x27,0x48,0x51,0x2c,0x1e,0xe5,0xf0,0x82,0xb6,0xfc,0xd7,0xc3,0x3f,0x3f,0x16,0xa6,0xbc,0x85,0x60,0x8f,0x6e,0xd9,0xd7,0xbd,0x93,0x33,0xf4,0xd2,0xb6,0xb4,0x9f,0x73,0xef .byte 0xa5,0x59,0x32,0x4c,0x89,0x1f,0xb0,0x0b,0x71,0xf1,0xa1,0xa3,0xdb,0x4d,0xed,0xcc,0x59,0xfe,0xe9,0x6f,0x60,0x96,0xa3,0x11,0x46,0xc5,0x3d,0x60,0x53,0x39,0x3e,0x6c,0x87,0xbb,0x14,0x85,0xe6,0x0f,0x80,0x8c,0x7d,0x63,0xdc,0x34,0x20,0xc0,0x5d,0x7f,0xb4,0x19,0xdd,0xb2,0xe5,0x36,0x86,0xb9,0x88,0x7b,0x18,0x81,0x2e,0xc9,0xdd,0xf9 .byte 0x8a,0xb8,0xc9,0x21,0x16,0x5f,0xd3,0x8c,0x49,0xdc,0xe0,0x65,0x9f,0x41,0xe4,0x5a,0x52,0x07,0x1e,0x35,0xbb,0x6f,0x06,0x42,0xc7,0x91,0x66,0xc8,0x93,0xe1,0x89,0x39,0x43,0x3a,0x76,0xdb,0x14,0x41,0x91,0x90,0xcf,0x55,0x78,0x36,0xbd,0x52,0x5f,0x23,0x9e,0x59,0x45,0xad,0x00,0xdf,0xac,0x50,0xc3,0xe1,0xa4,0xca,0x5b,0x3e,0xf7,0x7d .byte 0x51,0x21,0xb0,0x61,0xc6,0x3d,0xca,0xc0,0x06,0x9d,0x16,0xd3,0x7c,0x08,0x56,0x5f,0xc6,0xf2,0x27,0xe6,0x60,0x39,0x8f,0xf7,0x41,0xd4,0x3c,0xb9,0x25,0x1c,0xa2,0xb8,0xc6,0x73,0x6e,0x71,0x92,0xb6,0x3d,0xed,0x9d,0x1c,0x76,0xd3,0x8d,0x56,0xd7,0xc6,0xd6,0x1f,0x6a,0x0d,0x3c,0x91,0xeb,0x3a,0x7b,0x38,0x6b,0x18,0xcb,0x91,0x56,0xc2 .byte 0xf6,0xa6,0xb2,0x5f,0x36,0x31,0xa2,0xd9,0xdf,0x49,0xb3,0xeb,0xf5,0x60,0xbe,0x95,0x57,0xa1,0x22,0x3e,0xb5,0x81,0x0a,0x58,0xc7,0x65,0x3d,0xb8,0x89,0x5b,0x91,0x5d,0x21,0x29,0x87,0xa9,0x03,0xdb,0x4c,0x36,0x4c,0x4f,0xf0,0xe5,0x4a,0x73,0x34,0x97,0x62,0x40,0x4e,0x2b,0x66,0x71,0xfc,0x4f,0xa2,0x99,0xbb,0xe6,0x59,0x82,0xca,0x6d .byte 0x61,0x35,0x6e,0xb3,0x2c,0x3c,0xb6,0xa0,0xb5,0x91,0xb2,0xe1,0x11,0x7d,0x8a,0xfd,0x32,0xff,0x67,0xbd,0xe7,0x98,0xcb,0x25,0x8a,0xea,0x03,0xbe,0xd0,0xf2,0x14,0x97,0x7a,0xc0,0x8a,0x4f,0x04,0x26,0x26,0x01,0x24,0xd4,0x50,0x57,0x73,0xdb,0xe9,0xc2,0xbc,0xc8,0x47,0x08,0x64,0x16,0x33,0xa1,0x5e,0xac,0x2c,0xa3,0x8e,0x88,0x88,0x66 .byte 0x0a,0x3b,0x11,0x39,0x44,0x3c,0xab,0xb1,0x69,0xe0,0x42,0xc2,0xda,0xda,0x0d,0xdd,0x4d,0x66,0xc2,0xdf,0xb7,0xa1,0xa0,0xb3,0x82,0x95,0xe3,0x62,0x2e,0x29,0xb4,0x97,0x75,0x6a,0x3a,0x23,0x29,0x67,0x69,0x53,0xd5,0x9a,0xba,0xc8,0x42,0xfe,0x54,0xba,0xca,0x4f,0x8f,0xaa,0xb0,0x76,0x69,0x83,0x84,0x0d,0x3b,0xf8,0x15,0x37,0xbc,0x86 .byte 0x15,0x98,0x89,0xc6,0x8c,0x40,0x52,0xf9,0xe7,0x87,0xdb,0x19,0x64,0xb7,0x1f,0x32,0xdb,0x41,0xe8,0x7a,0xcf,0x4c,0x98,0xc0,0xfb,0x33,0xbd,0x84,0x6d,0x9c,0xbd,0x1c,0xdb,0xba,0x1b,0x3b,0xb1,0x22,0x3e,0x6f,0x74,0x36,0xe2,0x54,0xb3,0x87,0x70,0x27,0x4c,0x5f,0xb9,0xe4,0x90,0x8b,0x63,0x0c,0x3d,0xed,0xa0,0xb0,0x36,0x2c,0x96,0xd6 .byte 0xc7,0x49,0x3e,0x29,0xc7,0x62,0x5a,0x3b,0x57,0x9c,0x91,0x68,0x8f,0x4e,0x80,0x18,0x9c,0xba,0xd1,0xcc,0x5a,0xdf,0xa0,0x88,0xbc,0x8f,0x31,0xaa,0xbc,0xd0,0xde,0x43,0x57,0x20,0x12,0x3e,0x88,0x58,0x1f,0xd5,0x68,0xba,0x87,0x38,0x94,0x6f,0x24,0x03,0xf4,0xe0,0x34,0xab,0xab,0x35,0x71,0xad,0xb0,0xaf,0x0f,0x9a,0x29,0xfa,0xde,0x69 .byte 0xe8,0xcc,0xcd,0xaa,0x28,0xfe,0x85,0xdd,0xba,0xcf,0xdf,0x71,0xdc,0x12,0x77,0x94,0x70,0xd7,0x27,0xe6,0xab,0xa9,0xb3,0x8a,0x73,0x58,0x90,0x86,0x9a,0x0e,0xe1,0xae,0x8e,0x3c,0x07,0x8f,0xb4,0x9d,0x87,0x8f,0xb2,0xa3,0x3b,0x49,0x76,0x63,0xbf,0x6b,0x75,0x52,0x54,0x66,0x4c,0xa8,0xa9,0xb2,0xd4,0x4f,0xb0,0xd0,0x9e,0xfd,0x26,0x23 .byte 0x57,0x4f,0xa5,0x99,0x1c,0xbe,0x67,0xbb,0x26,0xd2,0xcb,0x1a,0x18,0xd6,0x5f,0xfa,0x91,0xfd,0x30,0x3b,0xf4,0x02,0xa2,0x36,0x0c,0xfe,0x30,0xb2,0xc8,0x96,0xe1,0xa9,0x75,0xad,0xf3,0xb7,0x20,0x9b,0x47,0xee,0x5c,0xae,0x7b,0xfe,0xbd,0x38,0x8b,0x2b,0x7d,0xb8,0x92,0x59,0xd7,0x3b,0x91,0x40,0x5e,0xa8,0x20,0x6f,0x45,0xd8,0xd4,0x5f .byte 0x33,0x8f,0x6a,0xd3,0x67,0x9e,0x46,0x17,0xb8,0x02,0x31,0xc0,0xdc,0x5e,0x35,0xfa,0x22,0xb6,0x7e,0xbf,0xd6,0xc9,0x4e,0x66,0xa1,0xd2,0xd8,0x2a,0x84,0x2c,0xd6,0xb1,0x15,0xda,0xdb,0x3e,0xc4,0x61,0x93,0x08,0x64,0x8d,0xf0,0x61,0x9d,0xeb,0x12,0xcc,0xd1,0x3b,0xf7,0x9f,0x1a,0x18,0xe7,0xc8,0x00,0x6b,0xfd,0x84,0xd6,0xed,0xb5,0x40 .byte 0x69,0x72,0xd3,0x19,0x7d,0x24,0x7b,0x19,0xf2,0x57,0x58,0x19,0x75,0xec,0x26,0xe7,0x90,0x9d,0xe5,0x9d,0x91,0xa6,0x64,0x2e,0x29,0x15,0xc6,0x7f,0x7c,0x05,0x35,0xd5,0xe5,0x8e,0x36,0xce,0x49,0xc7,0xcd,0x69,0xa2,0xf9,0x1b,0xd5,0x84,0x13,0x4b,0x4a,0xb1,0x6c,0x15,0x6e,0xf2,0xf1,0x47,0xef,0x8a,0x18,0x6f,0xbc,0x36,0xfe,0xc3,0x85 .byte 0x2b,0x46,0x7b,0x1c,0x31,0xa6,0x41,0x33,0xaa,0x62,0x6f,0x17,0xae,0xd4,0x23,0x9b,0x93,0x79,0xdc,0xac,0x53,0x01,0x83,0x81,0x2b,0xef,0x5b,0x79,0x6a,0x8a,0x82,0xfe,0x9c,0xe3,0x08,0x06,0x57,0x2d,0xf0,0xc1,0x3a,0xa9,0x8c,0x57,0xa9,0xa6,0x13,0xf5,0xfc,0x2c,0xef,0x96,0xaa,0x3b,0xe9,0x5b,0xf0,0xb9,0x38,0x3d,0xe3,0x8c,0xa2,0xaa .byte 0x2c,0x75,0xca,0xc5,0x0a,0x72,0x8b,0x48,0xc7,0x97,0xd3,0x06,0x38,0x13,0x52,0xde,0x38,0xed,0x20,0xd1,0x43,0x24,0xee,0xd7,0x97,0x56,0x2c,0x46,0x09,0x38,0x13,0xd9,0x0a,0xa3,0x45,0x01,0x29,0x2b,0xf4,0xff,0x8e,0x87,0x94,0x4e,0xaf,0x35,0xdb,0x17,0x49,0xa7,0x53,0x0e,0x0f,0x8f,0xee,0x08,0xa1,0xee,0x54,0x73,0x66,0x6f,0xd3,0x17 .byte 0xec,0x72,0x51,0x54,0x5e,0x06,0xaa,0x10,0x1f,0x2c,0xe0,0x34,0xd9,0x4d,0x34,0x0f,0xbd,0x9e,0x18,0x33,0x83,0xdb,0xbe,0x9a,0x9d,0x44,0xd4,0xef,0x8e,0x9d,0x5e,0xe5,0x29,0x2b,0x98,0xfc,0xfc,0x7a,0xb4,0xd7,0x34,0x81,0x43,0xae,0x46,0x01,0x81,0xb9,0xb7,0x93,0x00,0x35,0x55,0x72,0x7a,0x54,0xc2,0x59,0xda,0xe7,0x14,0xee,0x9e,0x04 .byte 0xe2,0x60,0x5a,0x71,0x58,0xb5,0xdc,0x98,0xf2,0xc7,0xce,0x37,0x7a,0x31,0xcf,0x5a,0x25,0x56,0x5c,0x1c,0x97,0x22,0x70,0xc2,0x91,0xf7,0xb2,0xff,0x69,0x8e,0x5b,0xaf,0xf8,0xd3,0x3e,0x35,0x0a,0x69,0x3c,0xd5,0x79,0xb6,0xef,0xbe,0xf8,0x47,0xe5,0xc5,0x82,0xca,0x12,0xde,0x86,0x1d,0xbe,0xbe,0xe1,0xc3,0x37,0xdd,0xb9,0x3e,0x6b,0xbf .byte 0xe7,0x37,0xc2,0x6d,0xe5,0xa0,0x57,0xd8,0x5d,0x7e,0xff,0x9e,0x4b,0xb9,0x04,0x0c,0x3b,0x40,0x64,0xc8,0x50,0x68,0x7b,0x9d,0xbe,0x64,0x31,0x8f,0x8b,0x4d,0x74,0xa8,0x09,0xd3,0x36,0x0f,0x9e,0x56,0xdd,0xb7,0xee,0x81,0x88,0x06,0x12,0xf8,0xf6,0xca,0x7f,0x97,0x04,0xc8,0x23,0xea,0xc2,0x07,0x3e,0x22,0xca,0x2a,0xe2,0xf3,0x4f,0xfe .byte 0x42,0x09,0x78,0x13,0xe5,0x4e,0x91,0xc7,0x33,0x5d,0xf4,0xf4,0x07,0x85,0x7b,0xd4,0x79,0x31,0xd1,0xcb,0xac,0xc9,0x54,0x53,0x39,0x37,0x82,0x6b,0x54,0xbe,0x30,0x7b,0x7d,0x8d,0xe7,0xc6,0x04,0xc2,0xa9,0x27,0x27,0x0c,0x38,0xd5,0x6d,0x32,0x6f,0xe1,0xa0,0xe2,0x41,0x6e,0x11,0x1e,0xe7,0x32,0x9d,0xa2,0x3e,0x16,0xaa,0x96,0xd9,0xd1 .byte 0x78,0xde,0xd3,0x42,0xcf,0x27,0xba,0xea,0x82,0xdc,0xf8,0x32,0xa6,0xb9,0x19,0x6a,0x9a,0x0c,0x21,0xae,0xb2,0x0f,0x5c,0x5b,0x64,0x6f,0x29,0xcc,0x5c,0x59,0xc6,0x9d,0x42,0x9b,0x60,0xb0,0x64,0x5e,0xbe,0x22,0xa1,0x00,0xc1,0xc4,0x8f,0x5e,0x3c,0x2a,0x34,0x63,0x41,0x66,0xa7,0x38,0x50,0x57,0xd3,0xd4,0x88,0xb1,0x82,0xaf,0x48,0x29 .byte 0x48,0x6d,0x31,0x21,0x76,0x71,0xfb,0xea,0x95,0xdd,0xe0,0xd6,0xa4,0xf9,0x3f,0x09,0xf0,0x8f,0x9c,0xdc,0x67,0x8d,0x11,0xf6,0xad,0x00,0x93,0x71,0x5d,0x2b,0xe1,0xb6,0x7a,0x1a,0x80,0xbd,0x1f,0x01,0xe7,0xd5,0xbb,0x9a,0x42,0x75,0x29,0x83,0xe4,0x4f,0x54,0x67,0xbf,0x16,0xf5,0x6c,0x67,0x5b,0x0d,0xb6,0x24,0xb6,0x36,0xa5,0x9c,0xfe .byte 0xa5,0xfe,0x3e,0x72,0xf4,0x1b,0x3e,0x6d,0xd9,0xd7,0xe3,0xb4,0x44,0x36,0xc1,0x87,0x56,0xe2,0x77,0x61,0xea,0xc6,0xfe,0xf6,0xfb,0x48,0xd0,0xa4,0x99,0xf7,0x1a,0x85,0x4a,0xd1,0x6d,0xad,0x84,0xeb,0xd3,0x6d,0x1d,0xfd,0xaf,0x3f,0xde,0x3c,0x26,0xae,0x55,0xad,0x97,0x42,0xd5,0x6e,0xd7,0x7e,0x6b,0x42,0x7f,0x3a,0xa6,0xa8,0x27,0x0a .byte 0x68,0xbf,0x6e,0x41,0x51,0x1d,0x01,0x1a,0x93,0x50,0xc5,0xd8,0x4f,0xbf,0x42,0xca,0x37,0x07,0x01,0xe8,0xd1,0xf1,0x2a,0x3a,0xa2,0xc3,0x2a,0xc8,0x4b,0xde,0x66,0xf4,0x38,0xc5,0x36,0x4e,0xe9,0x3b,0xad,0xcd,0x5f,0xe1,0x40,0xc3,0xea,0x93,0x7d,0x45,0xfb,0xab,0xde,0x52,0x9b,0x96,0x90,0xfe,0x67,0xf5,0x43,0x6e,0x1a,0x3f,0xf8,0x47 .byte 0x68,0xf7,0x9e,0x08,0x70,0x45,0x4f,0xbc,0x5c,0x0b,0x4c,0x01,0xe8,0x96,0xfd,0xae,0xe4,0x41,0x75,0xe6,0xb0,0x66,0x68,0x2f,0x43,0xcd,0x55,0x20,0x99,0xd0,0x48,0x34,0x38,0x0b,0xb7,0x77,0x3a,0x4c,0x3e,0xb5,0x57,0xaa,0x11,0xbb,0xc9,0xcf,0x04,0x78,0xbb,0x49,0x41,0xee,0x6d,0x39,0xfa,0x09,0xe7,0x13,0xf3,0x23,0x41,0xdc,0x2e,0x93 .byte 0x65,0xc8,0xda,0x1b,0x18,0x99,0x07,0xaf,0x67,0x6e,0xcd,0xf1,0x66,0xab,0x1f,0x89,0x4b,0x8f,0x2c,0x09,0x2f,0x87,0xe1,0xd0,0xb0,0x6d,0x2c,0xa4,0x16,0x6c,0x9e,0x9f,0x8f,0x92,0x0e,0x21,0xf1,0x06,0x67,0x93,0x53,0x51,0xd4,0xcb,0xa2,0x12,0xf4,0xd4,0x87,0x2e,0x12,0xd5,0x98,0xba,0x95,0xe3,0xd3,0xbe,0x3f,0x20,0x39,0xe5,0xbb,0x9e .byte 0xaf,0xcc,0xa0,0x71,0xd8,0x8d,0x35,0x4b,0xf0,0x98,0x71,0x57,0x00,0xd3,0xb3,0xba,0xe3,0x04,0x24,0xb9,0xee,0x75,0x40,0x83,0xb4,0x11,0x0d,0x0d,0xf6,0xe0,0x10,0xf0,0x30,0x4c,0x45,0x71,0x5a,0x2e,0xd0,0xc8,0xcc,0xa9,0x5a,0xc8,0x10,0xb3,0x7c,0x07,0xf7,0x0b,0x8d,0x1e,0xe1,0xf1,0xa0,0x82,0xfd,0x1d,0xe4,0xad,0x8a,0x37,0xa3,0x81 .byte 0xff,0x14,0x12,0x74,0x42,0x81,0x7f,0x5c,0x89,0x47,0xcc,0x3c,0x27,0x92,0xf9,0xfa,0x9f,0xb8,0x6f,0xfe,0x36,0x23,0x1d,0x94,0xf3,0x43,0x09,0x82,0x87,0x46,0x92,0x8c,0x6a,0xbb,0x41,0x42,0xef,0x4d,0xa5,0x55,0x8a,0x48,0x13,0xd8,0x86,0x03,0x5b,0x48,0x3a,0x2b,0xcf,0xfd,0x35,0xb2,0xd4,0xf8,0x61,0x9c,0x0b,0x70,0x65,0x67,0x54,0x46 .byte 0x8d,0x2f,0xc6,0x97,0x12,0xff,0xfe,0xc9,0x23,0x64,0xcd,0xb7,0x14,0xa5,0x41,0x43,0xf3,0x0d,0x08,0xe4,0xf0,0x41,0x46,0x57,0x4b,0xdb,0x42,0xac,0xd5,0x0d,0xc8,0x33,0x84,0xa9,0x57,0x05,0x03,0xaf,0xbd,0x4f,0x48,0x5f,0xc2,0x3c,0xb9,0x07,0x79,0x47,0x2c,0x3c,0x71,0x1b,0x74,0xb9,0xc3,0x5a,0x65,0xc7,0xff,0x70,0xfb,0xc0,0x63,0x98 .byte 0x81,0x3d,0xd0,0x57,0x42,0x79,0xa2,0xdb,0xe6,0x2a,0xe0,0x00,0x4e,0xdf,0x3d,0x9d,0xc9,0x40,0x09,0x01,0x30,0x0d,0xa8,0xce,0x40,0x55,0x95,0xaf,0x01,0x48,0x74,0x16,0x99,0xa3,0xdf,0x63,0xa6,0x56,0xd8,0xe8,0x1e,0x8a,0xa7,0x7d,0x18,0xe6,0x37,0xe0,0xf8,0xd9,0xf4,0xb6,0x3f,0x92,0x7b,0xe1,0x17,0x57,0x3c,0x26,0x33,0x1d,0xf2,0x9e .byte 0xfc,0x26,0xd5,0x5a,0x34,0xcf,0xc4,0xaf,0x7b,0x11,0xe3,0x77,0x95,0x51,0x93,0x8a,0x56,0x68,0x80,0xf8,0x62,0x6c,0xc0,0x4e,0xe8,0x39,0x46,0x7f,0x56,0x27,0x26,0x25,0x2b,0x88,0xdb,0x38,0x62,0xa5,0xbc,0x96,0x16,0xed,0xd1,0xc7,0x0f,0x47,0xec,0x72,0x83,0xb0,0xbe,0xb0,0x46,0x54,0xab,0xa7,0x60,0xd4,0xb3,0x63,0xa9,0x3a,0x67,0x7f .byte 0x68,0x94,0x8a,0x54,0xf0,0x79,0x38,0x2a,0x67,0x7f,0x29,0xb4,0x7b,0xdf,0x0f,0x24,0xfb,0x21,0x0e,0xf5,0xc5,0x47,0x41,0x93,0xb5,0xe3,0x85,0xff,0x84,0x34,0x2b,0x12,0x73,0x5f,0x37,0x32,0xb6,0xce,0x73,0x27,0xe6,0x5a,0x6e,0x62,0xdd,0x7f,0x49,0x59,0xe2,0x3d,0x80,0xda,0xc3,0x29,0x70,0x40,0x70,0x25,0x8b,0xa5,0xc0,0xb0,0x18,0xa2 .byte 0xe0,0x5d,0xb6,0x52,0x14,0x8f,0xaa,0x17,0x68,0x80,0xa1,0x26,0xd2,0xbb,0xb4,0x2c,0x9a,0x41,0xfa,0x53,0x74,0xfb,0x7b,0x99,0x82,0xc1,0xff,0x77,0xa5,0xe0,0xea,0x64,0xb0,0x9c,0x48,0xce,0xb0,0x7a,0x05,0xa6,0x80,0x8d,0x92,0x92,0x47,0x1a,0x50,0xce,0x62,0xed,0xbd,0x41,0x59,0xe7,0xe6,0x3b,0xfb,0xe4,0xa4,0xb2,0xd4,0xb0,0x0b,0xe2 .byte 0x82,0xff,0x4d,0xb3,0xa6,0x43,0x4b,0xbf,0x7a,0xf7,0xfa,0x3c,0x38,0xd5,0xb2,0xf1,0xce,0x71,0x07,0xa4,0x6a,0xe3,0x7a,0x78,0xdf,0x56,0x1c,0xa1,0xf6,0x5d,0xeb,0xcc,0xb4,0xa7,0xca,0xaf,0x19,0xd0,0xb8,0x11,0x85,0xc7,0xf3,0x8a,0x23,0x6e,0xb8,0x92,0xd0,0xfc,0x61,0x9b,0x38,0x28,0x7b,0xa4,0xff,0x0d,0x32,0xf5,0xc5,0x31,0x5b,0x69 .byte 0xbd,0x6b,0xa5,0x46,0xd2,0x26,0x2c,0xe2,0x36,0xba,0x7c,0x42,0x8d,0xbe,0xfe,0x7c,0xbd,0x38,0x14,0x47,0x9a,0x6d,0xc7,0x20,0xda,0xd4,0x9d,0x05,0x31,0xdb,0xe7,0xda,0xac,0x27,0x14,0x7f,0xca,0x23,0xc1,0x5e,0x7e,0x26,0x04,0xf0,0xf3,0xb7,0xf7,0xdd,0xd4,0x05,0x7b,0xc5,0x7e,0x4a,0xeb,0x78,0x35,0x5e,0xb4,0xda,0xec,0xb5,0x46,0x96 .byte 0x63,0x56,0x17,0x55,0xfa,0xe8,0x11,0xd0,0xac,0xfd,0x5c,0xc8,0x99,0x2d,0xf7,0x4a,0x76,0xed,0x06,0xa2,0x77,0xfc,0x0f,0x13,0xe6,0xbc,0x79,0xae,0x15,0x23,0x17,0x0d,0xc3,0x01,0xee,0x36,0xe4,0x21,0x33,0x22,0x03,0x56,0x51,0x81,0xb4,0x5b,0x70,0xc7,0x6e,0xc4,0x54,0x93,0xcc,0x46,0x60,0x76,0x0e,0xc6,0x10,0x8c,0x52,0x6b,0x75,0x6a .byte 0xd9,0x27,0x04,0x0a,0x56,0x80,0x1b,0xfd,0x59,0x88,0xd5,0x03,0x99,0x01,0x5e,0xc6,0x2f,0x74,0xf0,0x90,0xae,0x10,0x9e,0x52,0x39,0xcd,0xa4,0x69,0x4d,0xb9,0x8d,0xbc,0xaa,0xf2,0xe4,0x25,0xdb,0x85,0x00,0x82,0x95,0xe3,0x8e,0x72,0xba,0xd0,0xf3,0xfe,0xb0,0x6e,0xb8,0xcd,0x2d,0x7c,0xae,0x95,0x62,0x1f,0xe9,0xf8,0x71,0x23,0xd5,0x3e .byte 0x33,0x30,0xb8,0x2d,0xf6,0xf5,0x45,0x1a,0x1b,0xf6,0xf1,0x6a,0x9a,0x7d,0xd4,0x76,0x27,0x6e,0x29,0x57,0xe6,0x90,0x36,0x83,0x4c,0x6b,0x00,0x77,0xf0,0x3d,0xb5,0xfe,0x19,0xb8,0x6f,0x76,0x58,0x7a,0x6c,0x2c,0xd0,0x22,0x5f,0x23,0x46,0x15,0xaf,0xbb,0xa0,0x40,0x37,0xba,0xb2,0x7f,0x6d,0xe2,0xa8,0x79,0x65,0x7a,0xb7,0xb0,0x51,0x04 .byte 0x77,0xec,0xed,0x58,0xd0,0x37,0x43,0xc4,0x95,0xe9,0xcb,0x82,0x8e,0x17,0xba,0x7a,0x8b,0xc0,0x71,0x6e,0x8a,0x5d,0x5d,0xe9,0xbd,0x28,0x0d,0xda,0xd9,0x4a,0xd6,0x71,0x58,0x3c,0x31,0x69,0x34,0x48,0x48,0xe1,0x50,0xc6,0x69,0x28,0x0d,0x24,0x45,0x15,0x13,0x1d,0x00,0xd6,0xd4,0x6b,0x05,0x56,0xf9,0xb7,0xf7,0xbc,0x26,0x37,0x51,0x65 .byte 0x91,0xf3,0xc6,0x50,0x44,0xce,0xa6,0x35,0xd9,0x0a,0xb2,0xd8,0xf3,0x6c,0x60,0x63,0x20,0xa3,0x18,0x34,0x83,0x1f,0x0d,0xc9,0x97,0xab,0x1f,0xb5,0x1f,0x6d,0x28,0xd4,0x84,0x1d,0xd4,0x08,0x45,0x83,0xa2,0x18,0x26,0x98,0xf6,0x1a,0x1c,0x9c,0xd9,0x79,0x92,0xef,0xdb,0x86,0x7b,0xb2,0x7b,0x30,0x64,0xeb,0x9d,0x7c,0xf0,0xf0,0x22,0x1e .byte 0x65,0x2d,0x22,0x11,0x0a,0x73,0x9b,0x82,0x21,0xb0,0x0f,0xa4,0xb4,0xdf,0x5d,0x72,0x61,0x56,0x60,0x27,0xab,0x84,0xe2,0xdc,0x63,0x74,0xd3,0xbf,0x45,0x93,0xc3,0x05,0x17,0x16,0x69,0xcd,0xfa,0xf7,0x5d,0xcb,0x29,0x04,0x88,0xf1,0x67,0x94,0xce,0x1d,0xa1,0x7f,0xc4,0xd1,0xca,0x09,0x39,0x54,0xf2,0x1d,0x32,0x99,0x49,0x89,0x95,0xe3 .byte 0x8b,0xc6,0x4a,0x41,0xbc,0x13,0x60,0xbc,0xff,0x2a,0xa0,0xc8,0xb2,0xc0,0x42,0x52,0x7a,0x8f,0x77,0xcb,0xc8,0x79,0xfd,0x0f,0x08,0x40,0xd6,0x39,0x1e,0xcd,0x87,0x12,0x09,0x6e,0x9b,0xc9,0x5f,0xfa,0x79,0xd1,0x83,0x63,0xcb,0xa6,0x7b,0x0c,0x4d,0x41,0x9f,0x30,0x70,0x35,0x48,0x0a,0x64,0xdd,0x4f,0x4f,0x28,0x19,0x8a,0x29,0xff,0xa2 .byte 0x5c,0xe9,0x1e,0x4c,0x68,0xdf,0x6a,0x3c,0x85,0x82,0x6b,0x0b,0x8a,0x63,0x6f,0x02,0x86,0x9f,0xe4,0x0a,0xf8,0xb5,0xae,0x65,0x64,0x55,0xb5,0x3f,0xb3,0xaa,0x0f,0xda,0x10,0xb0,0xeb,0xb5,0x5c,0x70,0x93,0xea,0x92,0x27,0x30,0x4e,0x73,0x4f,0x2d,0x25,0x88,0xa5,0x39,0x84,0xf7,0xf7,0x3a,0x4b,0x42,0x75,0xa1,0x87,0x75,0x9f,0xb0,0x08 .byte 0xda,0xb4,0x45,0x62,0x20,0x65,0x40,0x37,0x79,0xc9,0xdb,0x1d,0xbe,0x79,0x32,0x62,0x37,0x48,0x3c,0xc5,0xbf,0xb6,0xe4,0xb9,0x71,0xdb,0x88,0x16,0x2a,0xd3,0xec,0x50,0x94,0x52,0x65,0x41,0x84,0x94,0x58,0x6c,0xe5,0x95,0x44,0x3f,0x79,0x5e,0x71,0xbd,0x22,0x14,0x7d,0x8a,0x7d,0xd5,0x63,0x2d,0xce,0xfb,0x63,0xfc,0x0c,0xe5,0x99,0xd0 .byte 0x64,0xb5,0x00,0x80,0x26,0xa1,0xa1,0x40,0xa7,0x58,0xcc,0x32,0xc1,0xa5,0x27,0x16,0x9f,0x74,0xf2,0x01,0x59,0xf8,0x79,0x50,0x4f,0xef,0x0a,0xb9,0x79,0xf7,0x00,0xa4,0x9e,0x4f,0xa7,0x75,0x46,0x0e,0x25,0x5c,0x57,0x20,0xf2,0x08,0x57,0x82,0xc6,0xc3,0x57,0xdc,0xb4,0x65,0xdc,0x0f,0x17,0x17,0x36,0xef,0x49,0x05,0xf1,0x33,0xef,0x24 .byte 0x28,0xba,0xce,0xbc,0x4e,0xfd,0x0b,0xd5,0xce,0xe0,0xcb,0x38,0x16,0xcf,0x89,0xbb,0xc3,0x34,0xd0,0x1b,0xf0,0x4a,0x63,0x8a,0xcb,0x7c,0x46,0x7a,0xca,0x9e,0x9e,0xc9,0x03,0xa6,0x25,0xd1,0x22,0xeb,0xe7,0x1a,0x16,0x04,0x20,0x33,0x2a,0xf8,0xbc,0xca,0xb4,0xfc,0xff,0x95,0x31,0xdf,0xaa,0x0a,0xf7,0x60,0xf7,0x72,0x1f,0x53,0xd8,0x0a .byte 0x73,0xa6,0x27,0x55,0xdf,0x21,0xc8,0x41,0x1c,0x27,0xe3,0xe6,0x10,0x29,0xcf,0xd1,0x72,0x71,0x9b,0xcc,0xe6,0xf4,0x9f,0x2b,0xec,0x5d,0x6b,0xab,0xf6,0x09,0xff,0xd8,0x5e,0xf0,0x38,0x7a,0x67,0xb3,0xbe,0xa5,0x82,0xa5,0xc1,0x2e,0xa4,0xd6,0x42,0x07,0xc7,0x96,0x0d,0x11,0x2f,0x09,0x12,0x3c,0x81,0xaf,0xe6,0x52,0x31,0x2a,0x00,0x68 .byte 0x24,0x6e,0x28,0xc5,0x6e,0x3a,0x93,0x6f,0x01,0x3d,0xbc,0xc0,0xc0,0xca,0x92,0xb8,0x99,0x77,0xde,0x1a,0x38,0x24,0xdd,0xe4,0x1e,0x8c,0xf2,0x73,0xad,0x0b,0x79,0x8d,0xce,0xfa,0xf4,0x50,0xb6,0x64,0xab,0xf5,0x93,0x3a,0x73,0xba,0xe0,0x50,0x56,0x49,0xf3,0x08,0xf2,0x9d,0xec,0xe0,0x50,0xf1,0x26,0x08,0x2f,0x66,0x09,0xa1,0x45,0xb7 .byte 0x7b,0x3e,0xb4,0xfb,0xce,0xfe,0x69,0xfb,0x85,0x6d,0xc4,0x4b,0x15,0x87,0x8c,0x22,0x08,0x12,0x0f,0x46,0x9b,0xfa,0x32,0xae,0x7f,0xd1,0xa2,0x2c,0x65,0x0b,0xf0,0x62,0xa7,0x6a,0x8e,0xdc,0x10,0x56,0x86,0x84,0x14,0x77,0x6d,0x9f,0xd3,0x72,0x09,0xd9,0xdc,0x28,0xfe,0x15,0x9d,0xfb,0x10,0x0d,0xda,0x9e,0xbe,0x4b,0xcb,0xd9,0xf9,0x9c .byte 0xff,0xd5,0x19,0x18,0x6e,0x4f,0x33,0x21,0xfb,0x50,0x05,0x3c,0xbf,0x69,0xb2,0x91,0x07,0x5b,0xdb,0x2e,0x99,0x6c,0x20,0xc9,0x68,0x51,0x25,0x90,0xb2,0xcc,0x45,0x50,0x11,0x09,0xca,0xe2,0x19,0x04,0x5b,0x0c,0x99,0x34,0x7b,0x1e,0xc6,0x22,0xec,0xc4,0x5e,0x46,0x28,0xd2,0x08,0xf9,0x33,0xb4,0x9f,0xd0,0x56,0x52,0x97,0xa7,0x88,0xcf .byte 0x90,0xd7,0xe0,0xc4,0xcd,0xef,0xba,0x3f,0x56,0xb9,0x00,0x21,0x5b,0xc8,0xcd,0xc7,0x43,0x00,0xde,0x24,0xca,0x44,0xe5,0x9e,0xe5,0x7a,0x08,0xe5,0x7b,0x19,0x86,0x62,0xa1,0xff,0x8d,0x69,0xbf,0xea,0xee,0xae,0x7d,0x76,0x63,0x04,0xa7,0x56,0xb5,0x5d,0x08,0x98,0xd3,0x34,0x4c,0xa1,0x1f,0x26,0x41,0x8f,0xd5,0xd4,0x7f,0xb5,0x9d,0xce .byte 0x70,0xf1,0xbf,0xc5,0xa2,0x44,0x3c,0x30,0x89,0xbf,0xba,0x04,0xb5,0x0e,0x7e,0xe1,0x1d,0x1c,0xbb,0x29,0x83,0xa8,0x16,0x98,0x7d,0x8c,0xb4,0x03,0xb5,0x85,0x85,0x3a,0xcb,0xc1,0x54,0xf0,0xda,0xa7,0x89,0x81,0xe6,0xd1,0xe0,0x95,0xb6,0x9e,0x30,0xf8,0x2b,0xd1,0xbc,0x7d,0xcd,0xab,0xa2,0x1b,0xc3,0x8d,0x1d,0x2c,0x83,0xf9,0xe1,0xa7 .byte 0x92,0x94,0x9f,0x9e,0xdf,0xa7,0xe5,0x14,0x03,0x6a,0x6a,0x60,0x8b,0x01,0x02,0xae,0xea,0x1e,0x05,0xce,0xcd,0x2b,0x29,0xca,0x0f,0x94,0xf8,0xbd,0xc8,0x55,0x6d,0x4c,0x95,0x26,0x04,0x4f,0xf8,0x75,0xcb,0x43,0xab,0x76,0x0c,0x88,0x10,0x56,0xdf,0x66,0x16,0xcc,0xf1,0x1b,0x13,0xa9,0x93,0x9c,0xc4,0x63,0xac,0x44,0xf4,0x13,0xf3,0xdb .byte 0xcf,0xff,0xef,0x9d,0x89,0x9f,0xef,0x5b,0xa4,0x84,0xb4,0x0d,0x92,0x3b,0x76,0x03,0x3f,0x1d,0xdd,0xb1,0x5f,0x24,0xd5,0xa9,0xa5,0xdc,0x44,0x3a,0x3b,0xef,0xf2,0x8b,0x27,0xfa,0x83,0xdc,0x2d,0x4c,0xd8,0xb0,0xf8,0x7f,0x1e,0xea,0x3f,0x90,0x81,0xe1,0xc0,0x97,0x7a,0xfc,0xe1,0x00,0xf3,0x11,0xfc,0xc1,0xc2,0xa7,0x1a,0xf0,0x2c,0x41 .byte 0x49,0xc9,0x65,0xbe,0xe1,0x0f,0x54,0xdf,0xd5,0x39,0xe8,0x7a,0x48,0x81,0xdc,0x21,0x8f,0x8f,0xd2,0x16,0x6f,0xf4,0xfa,0x43,0xdd,0xfb,0x72,0xfb,0x5a,0xd7,0x62,0x0b,0x3e,0x92,0x82,0x2d,0x27,0x04,0x7d,0x5a,0x48,0x60,0x19,0x15,0x01,0x27,0x9d,0x05,0xf2,0x6c,0xaa,0x0c,0x7c,0x79,0x14,0xdc,0x3e,0x75,0x28,0xd2,0x9d,0x3b,0x28,0xc2 .byte 0x35,0x6c,0x73,0x4c,0x77,0x5f,0x36,0x7e,0xf8,0x3e,0xaf,0x1d,0x55,0x80,0x29,0x14,0xa4,0x48,0x80,0x82,0xb2,0x82,0xb9,0x3e,0x02,0xd6,0xd1,0xae,0x6a,0x0d,0x3d,0xfd,0xc1,0x57,0xf4,0xe6,0x90,0x8b,0x57,0x0d,0xde,0xd8,0xb7,0x15,0x71,0x82,0xe9,0x18,0x76,0x23,0xcd,0x93,0x41,0x17,0x83,0x5e,0xcd,0x6a,0x31,0x52,0x8d,0xff,0xb1,0x98 .byte 0x6d,0x47,0x96,0x6f,0x57,0x99,0xd7,0xe8,0x70,0xd2,0x68,0x8d,0x3e,0x26,0xfd,0x86,0x5c,0x64,0xb8,0x55,0x9b,0x4a,0xcf,0x75,0x39,0x97,0x73,0x77,0x30,0x06,0xea,0x55,0x2a,0x4f,0x3c,0x78,0x98,0x85,0x37,0x81,0x5b,0xc6,0x2c,0x90,0xaf,0xb3,0xc1,0xd5,0xf1,0x81,0xce,0x7d,0xe7,0xa5,0xee,0x74,0x3f,0x1e,0xec,0x2f,0xca,0x36,0x7c,0xd2 .byte 0x0f,0xce,0x9f,0x81,0x45,0x26,0x05,0x0e,0xeb,0xfc,0x5d,0x81,0x6d,0x05,0x22,0x75,0xdf,0x45,0x38,0x1c,0x33,0x27,0x48,0xe3,0x7c,0x18,0x9d,0x6d,0x39,0x53,0x75,0x1b,0x8a,0xcf,0xc1,0xf6,0x95,0xa7,0x30,0x43,0x71,0x62,0xe1,0x23,0xd5,0xb1,0xf4,0x5c,0xda,0x71,0x26,0x47,0xd2,0x76,0xec,0x11,0x3e,0xa5,0x00,0xcd,0x85,0x0e,0x1a,0xa7 .byte 0xe5,0x58,0x8e,0x67,0xc8,0x73,0x1d,0xd0,0xd9,0x0d,0x43,0x04,0x41,0x4a,0xde,0xbb,0x1a,0x75,0x0d,0xb3,0xa3,0xa2,0x20,0xf2,0x14,0xf2,0xe0,0x22,0xc0,0xec,0xd3,0x7b,0x8e,0x98,0x4e,0xf5,0xe9,0x88,0x64,0x6d,0xd6,0xeb,0xf9,0xb7,0xa1,0xd3,0x9f,0x3c,0xdd,0xdb,0x91,0xe0,0x92,0x52,0x3b,0x07,0xa4,0x40,0x47,0x04,0x11,0x95,0xdd,0xc9 .byte 0x33,0x24,0xe2,0xd5,0xa5,0x99,0xd2,0x0b,0xb5,0xb7,0xb7,0x59,0x24,0x2c,0x3e,0xff,0xc0,0xbc,0x11,0x55,0xf6,0x27,0x8e,0xd4,0xa8,0x23,0xf0,0x68,0x0b,0xd7,0x15,0xb7,0xe4,0x7d,0xc3,0x5c,0x3d,0xef,0x95,0xb4,0xad,0xe9,0x14,0x63,0xf7,0x3a,0x55,0x5f,0x6a,0x10,0x4a,0x3e,0x27,0xd1,0x7c,0xfc,0x4a,0x1a,0xab,0x2f,0x8f,0x4d,0x28,0x4b .byte 0xd4,0xe1,0x0b,0xeb,0xa1,0x85,0xea,0x68,0xd5,0x08,0x56,0x79,0x5f,0xbd,0x2a,0x7e,0xbf,0x44,0x05,0x05,0x10,0xf3,0x22,0x58,0xa5,0x0c,0x38,0x81,0xa4,0x95,0x19,0x51,0xf7,0x7c,0x4c,0x3f,0xcf,0x55,0xf7,0x90,0xbc,0xc5,0xec,0xd0,0x6a,0x22,0xf8,0xc9,0x1e,0x62,0x17,0x86,0x24,0x04,0x5e,0x50,0xb2,0xb5,0x94,0x18,0x48,0x96,0xb8,0x21 .byte 0x5e,0x63,0xc9,0xd7,0x29,0xc6,0x74,0xf5,0x28,0x36,0xa1,0x56,0x45,0xd6,0x60,0x4d,0x84,0xd5,0x57,0xc2,0xb6,0x9d,0xbd,0x3f,0xb4,0xac,0xf1,0x53,0x1b,0x79,0x7d,0x73,0xf5,0x61,0x5e,0x2b,0x10,0x97,0x88,0xcc,0x7d,0xe4,0xa6,0x38,0x46,0x1c,0xc0,0xa8,0x58,0x1f,0x7b,0xf4,0xf5,0x52,0x8f,0x58,0x9a,0x17,0x49,0x5a,0xd2,0x38,0x3a,0xfd .byte 0x66,0xcb,0xf5,0x4b,0x28,0x8b,0x8d,0x7c,0xb2,0x42,0x8e,0xa5,0x2a,0x08,0x72,0xfc,0x9b,0x85,0x0d,0xe6,0x85,0xf8,0x76,0xe2,0x73,0x6a,0x53,0xc2,0x3a,0x79,0x97,0x31,0xa9,0x52,0x70,0x75,0x3a,0xe3,0xfe,0xe5,0xbc,0x95,0x8e,0xf0,0xc9,0x97,0x17,0xdc,0x26,0x78,0x24,0xd1,0xe7,0x87,0x29,0x75,0x8e,0xd8,0x3f,0x56,0xde,0x46,0x97,0x7c .byte 0xcd,0xd4,0x01,0x57,0x6f,0xb5,0xd7,0xe7,0xbb,0xd1,0x0d,0x6f,0x0e,0x1b,0xf1,0x34,0x2a,0xcf,0x93,0x79,0x4d,0x47,0x0b,0xd4,0x69,0x77,0xc6,0x72,0x78,0x65,0xc8,0xec,0xb1,0x21,0x8a,0xfd,0x71,0xa9,0xc5,0xd7,0x89,0xa9,0xb0,0x9c,0xed,0xb8,0xc6,0x99,0x57,0xe0,0x13,0x6f,0x0e,0x85,0xea,0xc8,0x08,0xa7,0x38,0xdf,0x87,0xb3,0x46,0x80 .byte 0xfa,0xc6,0xe8,0x6a,0x45,0x71,0x13,0x20,0xd7,0xeb,0x6c,0x3a,0x43,0x56,0x36,0x1f,0xe2,0xf4,0x65,0x2f,0x04,0x7e,0x24,0x24,0xfe,0xe0,0x8f,0x1e,0x96,0x6e,0x01,0xfe,0x4e,0x11,0x9c,0x07,0x3e,0x5a,0x29,0x04,0x21,0x6a,0xe5,0x74,0x0b,0x93,0xa3,0xb2,0xe2,0x3e,0x0b,0x39,0x97,0xf6,0xdb,0x3d,0xb8,0x0e,0x8e,0xe2,0xd9,0xf0,0xbe,0x56 .byte 0x6f,0x6c,0xb2,0x49,0xe0,0xe0,0xc4,0x02,0xe7,0xbc,0x40,0x03,0x3d,0x5d,0xd9,0x1b,0x06,0x08,0x7b,0x0c,0x8e,0x78,0x6d,0x17,0x06,0x87,0x46,0x1e,0xfd,0xcd,0xa3,0x83,0xdf,0x67,0x25,0x54,0x2a,0xc2,0xf4,0xf9,0x73,0xf5,0xd8,0xa5,0xe5,0xc0,0xd6,0x39,0x04,0x5b,0x0e,0xd1,0x71,0x47,0xed,0x7d,0x34,0x76,0x62,0x9a,0x7d,0x6f,0x26,0xba .byte 0x69,0x0b,0x0e,0xb2,0xbe,0xad,0xa9,0x5f,0xdd,0xe8,0x05,0xbe,0xb5,0xa5,0x2e,0xba,0x2f,0x27,0x17,0x81,0xdb,0x9c,0x38,0xd2,0xf7,0xcd,0x77,0x75,0x41,0xda,0x65,0xd1,0xf6,0x0d,0xaa,0xc4,0x43,0x69,0x2a,0xd8,0x38,0x89,0x1b,0x77,0x16,0x26,0xa7,0xcd,0x46,0x68,0x7e,0x2a,0xbc,0xbb,0x8a,0xad,0xc0,0x7c,0xd8,0x14,0xc7,0x0f,0x76,0x97 .byte 0x33,0x0e,0x30,0xd8,0x10,0x7f,0xd1,0x38,0x5a,0x86,0xf2,0xfa,0x13,0x7a,0xd3,0x04,0x35,0x92,0x0f,0xc7,0x85,0x91,0xaa,0xe1,0xd2,0xa5,0xde,0x9a,0x0a,0xf2,0x77,0x99,0x94,0x5e,0x9d,0x67,0xf3,0x0d,0xb8,0x39,0x70,0x96,0xea,0x6c,0x82,0x59,0xe1,0x4c,0xca,0xf7,0x8c,0x26,0x42,0x1d,0x06,0xd9,0x26,0x32,0x76,0xde,0xf2,0xd2,0x8d,0xb6 .byte 0x6f,0x58,0x57,0x0e,0xcc,0x46,0x68,0x30,0x37,0xab,0x27,0xd9,0x84,0x52,0x7f,0x67,0x64,0xaa,0xa6,0x90,0x1e,0x36,0xbe,0x70,0x35,0xd3,0x3e,0xf6,0x4e,0xee,0xa1,0xa0,0x44,0x7c,0xb0,0x22,0x75,0x1f,0x83,0x67,0xc9,0x75,0x78,0x4c,0xe6,0x6c,0x08,0xab,0x01,0x74,0xfc,0x4c,0xff,0x4e,0x1c,0x9d,0xdd,0x24,0x6c,0x4f,0xad,0x8a,0xa0,0xe3 .byte 0xb4,0x9b,0x2f,0xfa,0xd5,0x2b,0xa0,0xb2,0x32,0xa7,0x98,0x35,0xa0,0x58,0x26,0x22,0x4a,0x63,0xf5,0x3c,0x54,0x2c,0xbc,0xa6,0x7e,0xdb,0x1c,0xf1,0xd4,0x35,0xf6,0xb7,0x62,0xd4,0x84,0xbe,0xb8,0x59,0x32,0x33,0x8a,0x17,0xb9,0x59,0xa0,0x62,0xa7,0x00,0xfb,0x72,0xc4,0xe1,0x1e,0x6c,0xec,0x64,0xea,0x97,0xeb,0xf7,0x24,0x5f,0xb2,0xdb .byte 0xfc,0x28,0x35,0x81,0x2b,0x5a,0x73,0xd1,0x0b,0x4b,0x68,0x5d,0xa2,0x55,0x41,0xb1,0x9e,0xdf,0x35,0xed,0x7e,0x39,0xd7,0xe6,0x45,0xe8,0xe2,0x4d,0xcd,0x82,0x26,0x72,0x0a,0xa6,0x4f,0x7b,0x27,0x55,0xc1,0x7c,0xee,0x83,0x2b,0x50,0x70,0xfa,0x6b,0xf5,0x2f,0x13,0xc1,0xf7,0xa4,0x79,0xac,0x1e,0x46,0x45,0x24,0xb2,0x61,0x58,0xd6,0xea .byte 0x11,0x72,0x83,0xa8,0x76,0x62,0x49,0x42,0x1c,0x11,0x18,0x9e,0x32,0x20,0x4b,0xc1,0x09,0xe4,0x62,0x8e,0x19,0xc7,0xda,0xed,0x57,0x12,0x20,0x59,0x53,0xa0,0x7b,0x0e,0x1f,0xc5,0x7d,0x43,0x82,0xd8,0xbd,0x33,0x09,0xb4,0x33,0x9e,0x73,0xf7,0x8c,0xea,0x34,0xe4,0x84,0x9a,0x67,0x15,0x80,0x9d,0x3d,0x77,0x30,0x9f,0xc4,0xd7,0x08,0x64 .byte 0xce,0x90,0xd5,0x81,0xda,0xbd,0x6d,0x4d,0x0c,0x57,0x73,0xba,0x90,0xa7,0x28,0x10,0xc1,0x53,0xf3,0xfe,0x94,0x43,0x90,0xaf,0xc2,0xd7,0xdc,0xe9,0x02,0xe2,0xe4,0x67,0x98,0xa7,0x5b,0x5e,0xe2,0x40,0xcd,0x0d,0xc7,0xbb,0x46,0xab,0xd2,0x75,0x24,0x47,0x85,0xa3,0x34,0x03,0x5c,0xc6,0x7c,0xb4,0xbd,0x07,0xc0,0xa7,0x60,0xb5,0xe7,0x45 .byte 0xac,0xb7,0x6a,0xfe,0x56,0x5a,0x08,0xc0,0x86,0xf8,0x14,0x59,0xee,0x0e,0x68,0x8f,0xa1,0xd5,0x67,0x4d,0x08,0x19,0xc8,0x29,0xcf,0x72,0xf5,0x9a,0x9a,0xf3,0x0a,0xb7,0xeb,0x31,0xd0,0x6b,0x9f,0xc3,0x26,0x58,0x9e,0x69,0x9b,0x60,0x0b,0x7e,0x43,0x0b,0xed,0x7b,0xd2,0xc8,0x6d,0x22,0xf1,0xfb,0xc9,0x82,0x50,0xec,0xf0,0xb3,0x40,0x02 .byte 0xfd,0xc8,0xac,0x46,0x5c,0x49,0x17,0x98,0x8b,0x07,0x7e,0x9c,0x6a,0xa4,0xcf,0x46,0x4d,0x01,0x4a,0x9f,0x7a,0x39,0x81,0xf7,0xef,0x7f,0x59,0x35,0xd3,0x1a,0x71,0x1f,0x84,0xa6,0xd0,0x1b,0x47,0x9c,0xea,0x1a,0x29,0x46,0xaa,0xe3,0xa3,0xfc,0xfd,0xd2,0x4d,0xda,0x10,0x5b,0xdc,0x56,0x81,0x31,0x4d,0x01,0xb1,0x5e,0x39,0x77,0x8d,0x78 .byte 0x5b,0x61,0xb8,0xc2,0xd9,0xe4,0xe0,0xab,0xe8,0x3e,0xb7,0x0f,0xc5,0xf8,0xad,0x2a,0xe5,0x1a,0xa3,0x66,0x69,0x78,0x66,0x4b,0xc2,0xe3,0x44,0x04,0xe8,0x51,0x59,0x2b,0xbf,0x19,0xe9,0x36,0x13,0xfd,0x1b,0x1c,0x45,0x46,0x65,0x61,0xcb,0x9e,0x98,0x03,0x40,0xf7,0xc1,0x76,0xf4,0x47,0xd3,0x69,0xef,0x63,0x36,0x0c,0x30,0x91,0xaf,0x1c .byte 0x69,0xd5,0x93,0x41,0x8a,0x47,0x61,0xe9,0x31,0xaa,0x12,0xa4,0x99,0xa9,0x0c,0x7c,0xce,0x72,0x7d,0x9b,0xc3,0xe4,0x2d,0xb2,0x5a,0xce,0xae,0x8e,0xa1,0x54,0x75,0x20,0xed,0x9b,0xd1,0x5e,0x5e,0x55,0x9c,0x02,0x5d,0x70,0x3c,0x63,0xf4,0x60,0xb3,0x3e,0x0a,0x4d,0x29,0xf4,0x1f,0x5b,0x08,0xce,0xa5,0x06,0xdc,0xb8,0x5f,0x4d,0x6b,0xef .byte 0x60,0xda,0xb7,0x70,0xa8,0xcd,0x2a,0x77,0xaa,0xf2,0x0f,0x77,0xb1,0xec,0xc8,0xe9,0xc0,0xed,0xb9,0x26,0xa8,0xfe,0x5e,0x60,0x1b,0x8d,0xea,0x67,0x38,0x3d,0xa5,0x5f,0xf0,0x4d,0x9d,0x75,0xc8,0xb2,0x9e,0x40,0xf8,0x7d,0x25,0xc0,0xcc,0x89,0x94,0x93,0xd6,0x3e,0x3b,0xf6,0x58,0xbf,0x5b,0xf9,0x6f,0x64,0x69,0x97,0xf4,0x9f,0xf3,0xc5 .byte 0x98,0xe6,0xb2,0x9c,0x1d,0xb8,0xd3,0x6d,0xdb,0xf4,0x49,0x75,0x67,0x0b,0x1f,0xac,0x89,0x6c,0x16,0xc1,0x4e,0xfe,0x8f,0x8b,0x61,0x4e,0x99,0x04,0x86,0xea,0x77,0x63,0x38,0x27,0x92,0xe0,0xcd,0xdd,0x33,0x7c,0xaf,0x41,0xce,0x37,0x21,0xd9,0x37,0x08,0x38,0x55,0xfc,0x04,0x2a,0x67,0x49,0xd0,0x6a,0x71,0xac,0xc8,0x95,0x01,0xb3,0x49 .byte 0x7c,0x19,0x05,0xdb,0xd9,0xc3,0xe6,0x81,0x3e,0x0e,0x79,0x24,0xc3,0x3d,0x95,0x6a,0x1b,0xb4,0x38,0xfa,0xcb,0x16,0xd3,0x0c,0x00,0xf7,0x85,0x4c,0x38,0x4a,0x50,0xe1,0x64,0x45,0x38,0x54,0xfa,0x85,0x04,0xe6,0x5a,0x02,0x80,0x6a,0x04,0xc2,0x28,0xb8,0x18,0xa1,0x1d,0xa1,0x88,0x18,0x30,0x8b,0x4c,0xfa,0xda,0xdd,0xe0,0x3f,0xae,0x81 .byte 0xaf,0xa6,0xcd,0xc3,0xe9,0x33,0x46,0xd3,0x17,0xab,0x74,0xf6,0xee,0x24,0xa7,0x8c,0xfa,0x5d,0x18,0xe0,0xa7,0x23,0x06,0x71,0x87,0x26,0x6a,0xd1,0xc7,0x1f,0x53,0xa8,0x53,0x7a,0xdb,0x83,0xfe,0x77,0x9c,0x68,0x84,0xe4,0xbf,0xa7,0x87,0x1e,0xd1,0xd7,0x44,0xb1,0x83,0x5b,0x20,0x69,0xe3,0xc9,0x8a,0x97,0x53,0x22,0x71,0xef,0x4d,0xb4 .byte 0x52,0x64,0x89,0x05,0x14,0x1d,0x00,0xd2,0xc4,0x89,0x46,0xc1,0xf6,0x6f,0x08,0x10,0xe8,0x51,0x7c,0xc8,0xc0,0xaa,0xc3,0xd8,0xd4,0x0d,0xfa,0x7d,0x26,0xa4,0xc8,0x33,0x32,0x62,0x64,0x01,0xa9,0x72,0x86,0x62,0xe2,0xbf,0xb3,0x71,0xbf,0x6d,0x91,0xc1,0x96,0xb1,0x57,0x4b,0x7b,0x87,0xe8,0xa2,0x58,0xc3,0x77,0x7b,0x75,0x60,0xa1,0xcf .byte 0xe2,0xf2,0x1f,0x48,0x22,0xd0,0x35,0x91,0x68,0x16,0xdd,0x71,0x2b,0xa5,0x2f,0xa6,0x54,0x0c,0xe1,0x8e,0x8c,0xb9,0x3f,0x94,0x48,0xc7,0x2f,0xfd,0xbe,0x4a,0x29,0x8b,0xdc,0x1a,0xef,0x95,0x1e,0xdf,0xa0,0x11,0x7e,0x74,0x22,0xf1,0xaf,0x6a,0xdd,0x65,0x0f,0x38,0x87,0x83,0x9b,0x03,0x6b,0xa0,0x9d,0xbe,0x94,0x1d,0x0b,0x97,0x1f,0xcd .byte 0x0e,0x77,0xcf,0x56,0x2e,0xd2,0xda,0xd1,0xf5,0xc7,0xc3,0x17,0x43,0xee,0x42,0xb3,0xda,0x9c,0xf5,0x39,0xe1,0x01,0x55,0x4a,0x3f,0x28,0xdb,0x5f,0x80,0x32,0xbd,0xc8,0xba,0x51,0xf6,0xc5,0x56,0x74,0x9f,0xa6,0x28,0x14,0xcc,0x6c,0x81,0xd6,0xfe,0x31,0xf6,0xae,0xeb,0x19,0x70,0xfa,0xb5,0x77,0xf9,0xfd,0x43,0x49,0xd7,0x83,0x57,0xe8 .byte 0x81,0x03,0xa2,0x91,0x15,0xfd,0x83,0x72,0xd1,0x5a,0xdb,0xcb,0x09,0xe3,0x63,0x36,0xbb,0x64,0x47,0x70,0x65,0xf1,0x3e,0x7f,0x93,0xfb,0x00,0x47,0x64,0x1e,0xe0,0xad,0x49,0xc8,0x4d,0x95,0xb8,0xc7,0x58,0x00,0xd1,0x92,0x84,0x59,0x79,0x45,0x6f,0xfa,0x8c,0x2a,0xf8,0x25,0x77,0xa6,0x03,0x6c,0xa2,0xd6,0xfb,0xab,0xe5,0xcf,0x72,0xdd .byte 0x2c,0xa5,0xcc,0x09,0x74,0xfa,0x18,0xe5,0x02,0xaf,0x05,0x2b,0xc1,0xb3,0x99,0x50,0xfb,0x6c,0xf4,0x35,0x6e,0xd2,0x50,0x6a,0xb2,0xa0,0x05,0x5c,0x82,0x71,0x58,0x05,0x71,0x99,0x46,0xd9,0xfd,0x1c,0xdf,0x1f,0x1f,0x8c,0xf1,0x7a,0xe1,0x92,0x08,0x52,0x4a,0x1b,0x52,0x61,0x2c,0xd0,0x2d,0xb1,0x6c,0x48,0x23,0x7f,0x0f,0x45,0x98,0x04 .byte 0xbb,0x91,0x40,0x28,0x3c,0xf9,0x01,0xd9,0xdf,0xd9,0x0c,0x31,0xec,0x58,0xe1,0xd0,0x55,0xcb,0x4a,0xb2,0xfe,0x09,0x97,0xaa,0xbe,0x01,0xd9,0xe9,0xf3,0x76,0x48,0xd9,0x75,0x0d,0xba,0x54,0xaa,0x2e,0x99,0x0a,0xbf,0x4c,0x5b,0xae,0xf0,0x27,0xd2,0xe5,0x1c,0x9d,0x74,0xf9,0x7f,0xc6,0x88,0x7c,0xa4,0x0f,0x96,0x2c,0xe7,0xc5,0xfd,0x26 .byte 0x59,0xe5,0xcc,0x86,0xb2,0x93,0xae,0x17,0x59,0x39,0x3b,0xa6,0xf0,0xff,0x07,0xa0,0x6e,0xff,0x39,0x01,0x71,0x50,0x5f,0x4f,0x12,0x13,0xcf,0x44,0x85,0xe6,0xd8,0x89,0x4f,0xa6,0x21,0xb2,0x32,0xbd,0x37,0x9f,0x1d,0x35,0x9d,0x30,0x49,0x7d,0x29,0x60,0x07,0xdd,0x06,0x05,0x21,0x44,0x22,0xaf,0x1d,0xc9,0xc7,0x31,0x60,0x88,0x2d,0x4d .byte 0x71,0x88,0x4d,0x5b,0x7c,0xc6,0x68,0x09,0x54,0x01,0xc0,0xe9,0xda,0xa0,0x08,0x75,0x6f,0x3c,0xdb,0xf7,0xa4,0x1c,0x9d,0x8d,0x49,0xb6,0x30,0x38,0x22,0xe6,0x08,0xf9,0x00,0xa5,0xaa,0xf2,0x83,0xd3,0xb1,0x37,0xdb,0x2a,0xd4,0x65,0x94,0x98,0xd6,0xe1,0xc9,0xf6,0xc0,0xd1,0xbe,0x28,0x92,0x6b,0x2f,0x13,0x8d,0xc6,0x62,0x82,0xf2,0x5a .byte 0xe1,0x62,0x74,0x08,0x72,0x28,0xa4,0xca,0x83,0x84,0x42,0xca,0xc6,0x17,0xf4,0xa7,0xf5,0x4e,0x57,0x9e,0x50,0x9c,0x9b,0x96,0x88,0x28,0x39,0xb1,0x1d,0x71,0x6d,0x6a,0x41,0x1c,0x63,0x85,0xa0,0xf6,0x38,0x3b,0x74,0x5b,0xe9,0xfa,0x67,0x63,0xd2,0x54,0x1c,0x22,0x12,0x4c,0x1d,0x56,0xf2,0x29,0x55,0xfb,0x4a,0x18,0x50,0xb3,0x2f,0xa7 .byte 0x0f,0x53,0x9b,0x2b,0x0e,0xae,0xfc,0xda,0xfc,0xa3,0x98,0x47,0x50,0x38,0x24,0xc0,0x3d,0xd6,0x4b,0x44,0x4f,0x9e,0xdb,0x0a,0xaf,0xc7,0x2c,0xc2,0x5e,0x7e,0x97,0x21,0xa5,0x62,0x07,0x5f,0x97,0xe9,0x95,0x41,0x88,0x13,0xe9,0x53,0x6a,0xd6,0x59,0x8b,0x69,0xe2,0x02,0x1b,0x73,0x5d,0xb8,0xa6,0xd3,0x9d,0x76,0x6c,0x86,0xc5,0x73,0xf0 .byte 0x45,0x68,0x0c,0xc1,0x5b,0x38,0x3d,0x64,0x92,0xfc,0x1a,0x2a,0x28,0x85,0x2b,0xfc,0x6a,0xf0,0x66,0x6a,0x8c,0xdc,0x7c,0xd9,0x65,0xe0,0x68,0xa2,0x36,0x0e,0x5f,0xe8,0xbe,0x16,0x6b,0x72,0xa2,0xcc,0x3e,0xef,0x1f,0xbe,0x98,0x0f,0x49,0x22,0x6a,0x5e,0xbc,0x88,0x2f,0xd6,0x54,0x7f,0xff,0xb9,0xab,0xc9,0x68,0xd7,0xd5,0x2f,0xb1,0x6b .byte 0x65,0x26,0x7c,0xd7,0x97,0x2c,0x6a,0x15,0x15,0x88,0x95,0x54,0x55,0x7b,0x56,0xab,0x16,0x6b,0xc7,0xa9,0xa3,0xbc,0xf2,0xaa,0xc3,0xff,0x11,0xb5,0xee,0x55,0x61,0x34,0x50,0x0c,0xe1,0xec,0xa6,0x5d,0x03,0x95,0x7d,0xca,0x00,0x80,0x02,0x44,0x8a,0x00,0x9b,0x16,0x02,0x7c,0x35,0xed,0xae,0x62,0xdd,0x20,0xfc,0x99,0x82,0x58,0x85,0x94 .byte 0x7b,0x2b,0xfb,0x7b,0xdf,0x99,0x69,0x7f,0x7e,0xf0,0x96,0xc5,0x48,0x27,0x90,0x32,0x88,0x96,0x89,0x95,0x9c,0x45,0x0e,0x90,0x94,0x54,0xa6,0x94,0x36,0xf7,0xc1,0x01,0xee,0xcb,0xfb,0x4e,0x62,0xd0,0x34,0x95,0xd6,0xb5,0xa4,0xa6,0xae,0x2b,0x0e,0x1f,0x03,0x87,0x6c,0x54,0x77,0x7d,0xf7,0x22,0xd1,0x63,0xb2,0x57,0x05,0xd1,0x8d,0xaf .byte 0x35,0xca,0x23,0x8d,0x66,0x79,0xa0,0xed,0x9a,0x4a,0xbc,0xd8,0x20,0xe6,0x44,0x3e,0x6f,0x1d,0xf7,0xf3,0x43,0x83,0x5b,0xb6,0xdf,0x43,0x12,0xef,0x5c,0xfa,0xd5,0x8d,0x94,0x48,0xf8,0x2b,0x9b,0xfe,0xd0,0xab,0x88,0xa4,0x7d,0xa7,0xed,0x1d,0x53,0xd1,0x28,0x64,0x92,0xca,0x21,0x47,0x8b,0x2d,0xcd,0xf2,0xfb,0x1a,0xd1,0x6b,0x10,0x38 .byte 0x8b,0x23,0xa5,0x85,0x0c,0x8f,0x2d,0x8f,0xcd,0x64,0x21,0x2d,0xc9,0x69,0xad,0xe3,0x17,0xf7,0x36,0x94,0x13,0xd1,0x8c,0x66,0x2e,0x72,0xc1,0x12,0x0b,0x52,0xce,0xb5,0x1c,0x5e,0x93,0xb5,0x80,0x5d,0x95,0xe2,0x0c,0x2f,0x08,0x92,0x47,0xb3,0x90,0x19,0x44,0x8b,0x9b,0x3b,0xb7,0xa2,0xaf,0xf7,0xfa,0x6e,0x40,0xa4,0x50,0x11,0x87,0x15 .byte 0x75,0x75,0xad,0x55,0xa9,0x34,0xd0,0x1f,0x0f,0x76,0x79,0x55,0x5b,0x1a,0x22,0x3c,0x20,0x50,0x70,0xeb,0x2f,0x9c,0xd2,0xb0,0x16,0xd3,0xa5,0xdd,0xec,0xbf,0x69,0x29,0xdf,0xcf,0xa2,0x2c,0x73,0xa8,0xd2,0xe9,0x99,0x81,0x19,0x07,0x0a,0x3e,0x34,0x90,0x34,0x5b,0x7b,0xd6,0x5b,0x03,0xc4,0xcc,0x1a,0x68,0xb4,0x6a,0xf7,0x13,0x00,0x6c .byte 0xbe,0xbd,0x45,0xf1,0x70,0x29,0xc9,0x59,0xfb,0x88,0xb3,0x60,0x55,0x65,0xd1,0x97,0x24,0xfe,0x5d,0xb3,0x7a,0x13,0x2a,0x32,0xe6,0x68,0x74,0x47,0x8f,0x90,0x85,0x20,0x10,0x88,0x78,0x7d,0xb5,0x20,0x21,0x05,0x8b,0xd2,0xc6,0x1e,0xbe,0xad,0xd5,0xba,0x44,0x48,0xee,0xa5,0xcd,0x9b,0xf6,0x91,0xce,0x73,0x5d,0x3d,0xa7,0x9b,0xa7,0x7f .byte 0xbe,0xa7,0x8c,0xd1,0x76,0x23,0xa4,0xab,0xc0,0x3f,0x3b,0x35,0xce,0x3f,0xe5,0x91,0x4a,0x93,0x21,0xcd,0x74,0xea,0xc5,0x0b,0x4d,0x21,0xd0,0xf6,0x8d,0x51,0xfe,0x8d,0x7d,0xab,0xd1,0x61,0x8b,0xda,0x8b,0x66,0x58,0x52,0xc1,0x63,0xc4,0xca,0x41,0x72,0x87,0x54,0x69,0x5d,0xa8,0xcf,0x38,0x5f,0xf8,0x52,0x99,0x5f,0x5e,0x4e,0x01,0x4d .byte 0xdf,0x53,0xe3,0xac,0x5d,0x62,0xb9,0x4e,0xea,0x73,0x1b,0x4b,0xeb,0x7d,0x9c,0x6f,0xa4,0xbf,0xba,0xee,0x31,0x55,0x85,0xed,0x5a,0x28,0x34,0xca,0x8d,0xcd,0x0d,0xe6,0xc6,0xfb,0xb1,0x4b,0x0d,0x30,0xfa,0x12,0x46,0x1e,0x4e,0x5e,0xcf,0x73,0xd1,0x49,0x58,0x69,0x6f,0x41,0xf2,0x33,0xff,0x06,0xc3,0xac,0x86,0x0d,0xd7,0x8e,0xab,0x15 .byte 0xf7,0xa4,0xfe,0x1f,0xfd,0x48,0xa1,0x39,0x2b,0x72,0x8b,0xa3,0x49,0xb6,0xfe,0x06,0x1c,0xe3,0x39,0x0c,0xf0,0xfb,0x3e,0xd9,0x7f,0xa6,0x49,0x85,0x18,0xbc,0x37,0xc2,0xba,0xf7,0xc6,0x84,0x9b,0xeb,0x85,0xfe,0xea,0xd5,0xcd,0x0f,0x86,0x4a,0xa9,0xdc,0xfd,0x57,0x3f,0xa5,0x2a,0xc6,0x95,0xcf,0x72,0xd6,0x5b,0xca,0x39,0x2f,0x87,0x27 .byte 0x72,0x33,0x4d,0x2a,0x53,0x83,0x02,0x96,0x0a,0x4a,0x0a,0x16,0x07,0xd6,0xb4,0xbe,0xff,0xa0,0x72,0x31,0x8b,0xc7,0x9b,0xfd,0x4b,0xdc,0x95,0x00,0x82,0x2a,0x56,0x93,0x31,0x08,0xbf,0xb5,0x6f,0xc4,0xca,0x9c,0x13,0xe8,0x57,0xc9,0x22,0xe6,0x89,0x7a,0x81,0xaa,0xf4,0x7c,0x59,0xd6,0x8c,0x71,0x78,0xeb,0x0d,0xa0,0x64,0xef,0x7a,0xcc .byte 0xea,0x45,0xcc,0xe9,0xfc,0xf5,0x83,0x38,0x3b,0x4f,0x2e,0x47,0x13,0xb5,0xb1,0x09,0xb5,0x94,0xb4,0x74,0x31,0x77,0xc3,0xdb,0xf3,0xfe,0xfe,0x3d,0x4d,0xc6,0xfa,0x5a,0xbc,0xee,0xaa,0x5f,0x03,0x09,0xdc,0x19,0x83,0x1f,0xe3,0x81,0xca,0xb9,0x59,0x4a,0x0d,0xde,0xda,0xf1,0xd0,0x21,0x7d,0x90,0x05,0x4e,0xee,0x63,0xc3,0x20,0x20,0x1f .byte 0x9f,0xdf,0x99,0x09,0x5f,0x61,0xab,0xbb,0x47,0xd7,0x20,0x79,0x81,0x69,0xb2,0xfe,0xb7,0xc1,0x27,0xcb,0x07,0xce,0x47,0xb6,0x32,0x8f,0x8b,0x06,0x0f,0x3c,0x34,0xe5,0x27,0xdd,0x20,0x42,0x63,0xed,0x9d,0x5f,0x36,0x31,0xf6,0xdb,0xfe,0x2c,0x50,0x9a,0x9c,0x2e,0x42,0xa1,0x1d,0x37,0xc5,0x63,0xd4,0xf6,0xc5,0x53,0xba,0x21,0x88,0x5b .byte 0xd6,0xc1,0x10,0xaf,0x22,0x21,0xeb,0x7f,0x1b,0x65,0x2b,0x0d,0x54,0xa8,0x0d,0x29,0xdf,0xbc,0x2f,0xd0,0xc0,0xa3,0x52,0x78,0x0c,0x76,0x56,0xf1,0x1f,0x22,0xa7,0x6f,0xb7,0xf7,0xd5,0xcf,0x0c,0xd3,0xbd,0x2f,0x84,0x53,0xae,0xef,0xb1,0xa3,0x38,0x0c,0x80,0x4b,0xef,0x88,0x59,0x2d,0x1f,0x79,0x92,0xfe,0xcc,0xd1,0x75,0x33,0x59,0xde .byte 0x74,0xd2,0xec,0x7c,0xad,0x8e,0xc7,0x8d,0xb8,0x2a,0x46,0xe0,0xa6,0xb9,0x10,0xf4,0x88,0x58,0x0e,0x68,0xba,0x31,0xaf,0x7b,0x7c,0x00,0xc5,0x9f,0x48,0x16,0x3c,0x92,0xa1,0xa2,0x02,0xf5,0xfd,0xbb,0x3f,0x85,0x9a,0x96,0xc5,0x24,0x36,0xc1,0x18,0x2e,0x85,0x27,0xa0,0xa0,0x69,0x40,0x35,0xe9,0xee,0xdc,0xbf,0x25,0xb1,0x2f,0xa8,0x30 .byte 0x7e,0x36,0x4d,0x74,0xb8,0x73,0xf9,0xaa,0xfd,0xf7,0xb3,0x4d,0x6b,0xbb,0x1b,0x5e,0xfd,0x45,0xca,0xc3,0xa6,0xe2,0x95,0xd3,0xba,0xcb,0x63,0x2a,0x1a,0xd3,0x50,0x1c,0x73,0x6c,0xb6,0x54,0x1c,0xf5,0xf7,0x8b,0x64,0x10,0x07,0x9c,0xc9,0x2a,0xfc,0x97,0x1c,0x21,0x2d,0x80,0xe7,0x5c,0x2d,0xcc,0x4e,0x0b,0x79,0x73,0xd0,0x1b,0xfe,0x92 .byte 0x05,0x95,0x9a,0x93,0xb5,0xbf,0x2f,0x09,0xa6,0x22,0x73,0xf9,0xb6,0x76,0xf5,0x90,0x6a,0x04,0xd2,0x5f,0xc4,0xb5,0x07,0xfc,0x46,0xf4,0xf0,0xcd,0xef,0x80,0xc7,0xf8,0x3d,0x1e,0xf5,0x85,0xfa,0xd7,0x17,0x57,0xba,0x74,0x9d,0xc2,0x73,0x6c,0xf6,0xa6,0x10,0x8d,0x03,0x82,0xee,0xbe,0xe3,0x03,0x0c,0xa5,0x68,0x20,0xf3,0x1e,0xaa,0xcc .byte 0x2b,0x8a,0xb4,0x76,0xb5,0x97,0x0b,0xa2,0xb0,0xf1,0xa5,0xfd,0xdf,0x0b,0xc2,0xce,0x93,0x75,0x46,0x28,0x53,0xf5,0x19,0x52,0xc6,0x7f,0xbd,0x1e,0x34,0xf8,0xbb,0x11,0x25,0xab,0x0f,0xed,0xd2,0x5e,0xdf,0x67,0x60,0xec,0x3c,0x5c,0x30,0xf0,0x42,0x21,0x97,0x47,0x09,0x77,0x58,0xf6,0x50,0x72,0xd9,0xc6,0xd6,0x71,0x8c,0xf9,0xaa,0x95 .byte 0x45,0x79,0xc6,0x5f,0xae,0xc9,0x36,0x8e,0x48,0x7a,0x56,0x94,0x97,0xed,0x0d,0x51,0xa0,0x54,0xb7,0x64,0x3d,0x3d,0x28,0x31,0x74,0xe9,0x1a,0x11,0x9a,0x5d,0x74,0x40,0x28,0x3c,0x7a,0x12,0xa8,0xbd,0x34,0x13,0xae,0x4b,0xb8,0xba,0xfb,0x84,0xee,0xd7,0x7f,0x6a,0xe4,0x2c,0x77,0xe6,0xf0,0x2f,0x94,0x32,0xd3,0xc2,0x29,0x23,0x55,0x82 .byte 0x17,0x2f,0x69,0x42,0xd2,0x8c,0xa4,0xc9,0xfc,0x6c,0x4d,0x30,0x85,0x23,0x1d,0x63,0xd4,0xc5,0x84,0x8c,0xcb,0xcb,0x68,0xb4,0x10,0x2d,0x44,0x33,0xd2,0xeb,0x45,0x6f,0x6e,0x7f,0x39,0xf3,0xbd,0xc1,0x63,0x49,0x43,0x51,0x64,0x40,0xf8,0xba,0x94,0x0f,0x6f,0x95,0x0d,0x51,0x64,0x68,0x44,0x73,0x3b,0xfc,0x8b,0x52,0x13,0xdd,0x07,0x4f .byte 0x73,0x97,0xf0,0x9a,0xde,0x5e,0x4b,0x6a,0xe8,0x62,0x25,0x62,0x29,0x67,0x54,0x37,0x11,0xfd,0x3a,0xa1,0xec,0xf2,0xdd,0xd2,0x09,0xb0,0x6c,0x84,0x87,0x32,0xac,0x29,0x68,0x86,0x39,0xf9,0x64,0xa9,0xb6,0xb8,0xd5,0x64,0x8f,0x9c,0xf8,0xae,0x9d,0x84,0x45,0x85,0xf8,0x29,0xba,0xfd,0xb4,0xcb,0x62,0xfd,0xaa,0xb2,0xd0,0x17,0xf0,0x86 .byte 0x92,0xbe,0x69,0x18,0xfa,0x56,0x94,0xbe,0x0f,0xa5,0x47,0x9c,0x6f,0x54,0xe4,0xa8,0x86,0x6a,0xf7,0x16,0x1d,0xd2,0xbd,0x8b,0xb2,0x03,0x01,0x23,0xa4,0x2b,0x91,0x8f,0x30,0xe7,0xc3,0x2a,0xbd,0x82,0xdd,0x2c,0x60,0xb8,0x9f,0x3f,0x03,0x91,0x47,0x37,0x8c,0x1e,0x83,0x23,0x4b,0xe9,0x17,0xf9,0xca,0x86,0x95,0xbe,0x21,0x2a,0x69,0x66 .byte 0x7a,0x2f,0x7f,0xba,0x73,0xa7,0xc3,0xb9,0x6f,0x77,0x5d,0xa9,0x97,0x82,0xff,0xba,0x37,0x72,0xee,0x52,0xe5,0x27,0xeb,0x5e,0xf3,0x88,0x0a,0x29,0xe1,0x7e,0xec,0x2a,0xf2,0xce,0xbd,0x3e,0x55,0x5c,0x22,0x29,0xce,0x35,0x68,0x68,0x12,0x5f,0x0d,0x8f,0x4c,0xa5,0xde,0x49,0xc9,0xb7,0x52,0x85,0x1f,0x81,0x42,0x65,0x4d,0x24,0xf8,0xe9 .byte 0x71,0x0f,0x37,0xdc,0xff,0x2f,0x07,0xf3,0x4c,0x15,0x66,0x24,0xf7,0xeb,0x13,0x25,0x24,0x33,0x47,0xbb,0x3e,0x45,0x31,0x61,0x6a,0x30,0x44,0xe2,0x43,0x2c,0xf1,0x46,0x1c,0x08,0x71,0x70,0xeb,0xa3,0xd1,0x03,0xcb,0x45,0x02,0xe8,0x46,0x5c,0x25,0x25,0x75,0x8f,0x0a,0x89,0x30,0x2e,0xbe,0x48,0xb4,0xb2,0x89,0xa2,0x56,0x87,0x32,0x19 .byte 0x85,0xe5,0x5c,0x69,0x6d,0xee,0xaf,0x64,0x22,0x93,0xe4,0x61,0x84,0xaf,0x36,0xee,0x4c,0xae,0x26,0x37,0xda,0x6b,0x78,0x64,0x2c,0x1b,0x9a,0xd2,0x8f,0x40,0xb9,0xf1,0xd0,0xbd,0xd6,0x67,0x16,0x42,0x2b,0xc0,0xfd,0x77,0x9a,0x69,0x69,0x44,0xbf,0x2c,0xfb,0x81,0xf0,0x96,0x29,0x31,0x35,0xae,0x8b,0x87,0x22,0x2a,0xa7,0x56,0xc8,0x85 .byte 0xd4,0xc8,0x32,0x3b,0xab,0x15,0x98,0x55,0xe3,0x13,0x77,0xd4,0x1b,0xa3,0xeb,0x89,0xe3,0x16,0xc4,0x0d,0xa8,0xde,0x54,0x0b,0x63,0xc5,0x77,0x1d,0x1a,0x0d,0xfb,0x15,0xb3,0x83,0x94,0xab,0x7a,0x7d,0xf3,0xf5,0xd5,0x4f,0x83,0xa2,0xf5,0xd9,0x09,0xa5,0xa7,0xb2,0x79,0xc4,0xbb,0xaf,0x66,0x09,0xd2,0xcd,0x05,0xe8,0xf3,0xcf,0xcc,0xd8 .byte 0x40,0xdb,0x9e,0xc3,0xb4,0xf0,0x1e,0x08,0x0d,0x41,0x75,0xae,0x7c,0x6e,0x19,0x1a,0xf9,0x27,0x6c,0x86,0xc6,0x97,0x99,0xc6,0xc0,0x39,0xbb,0xee,0x85,0x49,0xb8,0x29,0xef,0x3b,0xa4,0x35,0x68,0x4b,0x85,0xaa,0xfd,0xa1,0x5f,0x60,0x9b,0xee,0xca,0x09,0xd2,0xc4,0xe7,0x03,0xd2,0x29,0x78,0x56,0xd0,0x24,0x1e,0xf7,0x57,0x80,0x91,0x0c .byte 0x09,0xe8,0x03,0x36,0xaf,0x57,0xc5,0x94,0x04,0x13,0xa7,0x44,0x33,0x4e,0x27,0xe4,0xf0,0x05,0xb9,0xab,0x68,0x7d,0x4a,0x67,0x18,0x8f,0xdd,0x57,0x7b,0x83,0xb3,0x48,0x36,0x8a,0xbe,0x88,0xd8,0x86,0xe1,0x51,0x09,0x7e,0xd8,0x83,0x68,0x06,0x1a,0x4a,0x49,0x97,0x89,0x5b,0xc5,0x41,0x59,0xfc,0xb9,0xdc,0x3f,0x09,0x90,0x9d,0x94,0x86 .byte 0xd8,0xcd,0x07,0x46,0x8c,0xb5,0x73,0xd1,0x0b,0x5f,0x67,0x71,0x6f,0xf5,0xc2,0xbd,0x9f,0x7b,0xcb,0x0d,0x7f,0x9c,0xc3,0x92,0xb6,0x23,0xd8,0x84,0xea,0x7f,0xba,0xd6,0x6c,0x3e,0x79,0x8b,0x9f,0x96,0xda,0x9d,0x6f,0x3b,0x05,0x33,0x83,0xf2,0x0a,0x6d,0xac,0x7c,0xce,0xa5,0xc7,0x62,0x43,0x24,0x02,0x79,0x0a,0xad,0x92,0xe8,0x5b,0x36 .byte 0x4e,0x66,0xd6,0x1d,0x09,0x40,0x6f,0x3f,0x0e,0xb3,0x6c,0x9f,0x78,0x77,0xc0,0x78,0x59,0x93,0x70,0xa7,0xf9,0x16,0xf2,0x0b,0x53,0x96,0x89,0x4b,0x1e,0x32,0xbb,0x53,0x29,0xf8,0x55,0x46,0xa1,0x29,0x01,0x34,0x52,0xd1,0xc9,0x8f,0xb4,0x4a,0x49,0x5f,0x46,0x97,0x49,0xf4,0xd5,0x60,0xc7,0x78,0x14,0xde,0x5c,0x8e,0x8f,0xcf,0x28,0xee .byte 0x8b,0x82,0x71,0xdc,0xbb,0x7c,0x3d,0xda,0x0f,0x01,0x31,0x74,0x9d,0x84,0xca,0x57,0x2b,0x5f,0x2a,0x02,0x52,0x9d,0xb1,0x26,0x7d,0xc3,0x58,0xc6,0x6c,0x8e,0xf2,0x2f,0x10,0x48,0xdf,0x7c,0xd3,0xdb,0x01,0x6d,0x45,0xe4,0xc2,0x62,0xfe,0x60,0x26,0x39,0xd6,0x29,0xe0,0x51,0xfd,0x1f,0xf0,0xd2,0x3f,0xc7,0xc8,0x65,0x14,0xa1,0xb0,0xe8 .byte 0x36,0x61,0x0e,0x11,0xa3,0x37,0x48,0xa8,0xa9,0x35,0xb7,0x38,0x71,0xbe,0xd3,0xb0,0x8a,0xb2,0x96,0x13,0xb3,0xe0,0x44,0xa9,0xd4,0x8a,0x46,0x58,0xa7,0xf4,0x90,0xee,0xde,0x57,0x96,0xaf,0xeb,0x4c,0xd0,0x1b,0xed,0xe4,0xd1,0x8b,0x2e,0xd4,0x93,0xb3,0xc9,0x01,0x36,0xdc,0xdb,0x6d,0x23,0xfb,0xa1,0xdc,0xe8,0x2c,0x9e,0x49,0xaf,0x42 .byte 0x14,0xf1,0xbb,0xf8,0x44,0x85,0x2a,0x0d,0x28,0xe1,0x6e,0x30,0xb6,0x50,0xbf,0x77,0x77,0x8e,0x3c,0x67,0xb7,0x3a,0x0c,0x45,0x6b,0x6c,0x6c,0x9c,0x3e,0x5b,0xe6,0x9e,0x1c,0xbd,0xd2,0x46,0x72,0xe8,0xb4,0x52,0x7f,0x1e,0xea,0x6c,0x24,0x48,0xc7,0x7c,0xb5,0x78,0xf5,0x6a,0x18,0xaf,0xe0,0xa5,0xb3,0x55,0xd6,0x3f,0xf2,0x6c,0xaf,0x6c .byte 0x30,0x80,0x1f,0x57,0xe0,0xd3,0x6d,0xf6,0xb2,0xf8,0x9f,0x7a,0xcd,0x18,0xd8,0x3d,0x01,0x60,0x26,0x7f,0xdb,0xdd,0x86,0x42,0x1c,0xe7,0x65,0x86,0xe3,0x02,0x60,0x12,0x21,0x0d,0x4c,0x07,0xc0,0xdc,0xb7,0xb7,0x05,0x1e,0xca,0xe7,0x40,0x70,0x63,0xc4,0xa6,0x1c,0x27,0xcf,0x03,0xe8,0xba,0x07,0xd3,0xa1,0x8e,0xf5,0x27,0xc2,0xaa,0x89 .byte 0xdd,0x36,0x46,0x39,0xaf,0x60,0xdd,0x99,0x7f,0x42,0xb1,0xfd,0x7d,0xe5,0x1e,0x5a,0x6b,0x97,0xa9,0xfc,0x58,0xcd,0xac,0x63,0x23,0x66,0xe8,0xf7,0x5e,0x41,0x6b,0x2b,0x77,0xf3,0xf1,0xa7,0x3b,0xa4,0xbc,0xe9,0x0a,0x80,0x57,0x2b,0x62,0xb9,0x02,0x26,0xa9,0xfa,0xb5,0xd5,0x2d,0x5e,0x19,0x77,0x63,0xcd,0x7f,0x4d,0xdf,0x71,0x5e,0x2d .byte 0xce,0xfd,0x45,0x99,0x8c,0x46,0xc2,0x9d,0x89,0x3e,0xd0,0xac,0x39,0x0f,0x15,0x6b,0xfc,0x99,0x24,0x8c,0xcf,0xf9,0x55,0xf8,0x79,0xb3,0x8e,0xa9,0xf8,0xb6,0x81,0x49,0xda,0x95,0xda,0xce,0xdd,0x5f,0x94,0xb8,0x24,0x41,0xae,0xf3,0xc2,0x7c,0x6b,0xb8,0x7a,0xb9,0x0c,0xb2,0x34,0x2b,0x0e,0x90,0xc8,0x69,0xc3,0xd1,0x53,0x83,0x70,0xc2 .byte 0x6f,0x72,0x3a,0x1a,0xd4,0x68,0x0d,0x8d,0xff,0xa4,0xc5,0xd4,0x04,0xd6,0xca,0x18,0x04,0x7d,0xd1,0xc5,0x02,0xae,0x58,0x07,0x22,0x30,0xf3,0x7e,0xd4,0x3c,0x04,0x61,0xc4,0x24,0xee,0x0e,0x8d,0x48,0x7a,0xc7,0x28,0xe7,0x33,0xed,0x3a,0xe9,0x52,0x52,0x13,0x7e,0x89,0xe3,0x2b,0x5e,0xe3,0x28,0x7b,0x8f,0x87,0x80,0xc8,0x9c,0x4c,0x13 .byte 0x7a,0x2d,0xcd,0x68,0x60,0xcd,0xea,0x27,0x45,0x25,0xef,0x43,0xe7,0x65,0xc9,0xb4,0x81,0xeb,0xbc,0x71,0x0b,0xcf,0xbf,0xcf,0x6a,0xa8,0x70,0x4f,0x92,0xf4,0x8b,0xa2,0x82,0x8d,0x5c,0x73,0xdb,0x1f,0x9b,0xe3,0x81,0xe0,0x07,0x28,0x51,0x77,0x41,0xee,0x83,0xc5,0xcc,0x35,0x07,0x9a,0x20,0x13,0x2c,0x55,0x7c,0x97,0xc0,0xda,0x1e,0x41 .byte 0x56,0x80,0x15,0x26,0x10,0x66,0x12,0xdc,0x82,0xdd,0x1a,0x3f,0xd2,0x72,0xe4,0x80,0xd7,0x47,0x2a,0xa9,0x50,0xa4,0xa4,0xf1,0x6c,0xbe,0x6e,0x69,0x61,0x46,0xae,0x17,0x72,0x96,0xc8,0xcb,0x1c,0x89,0x0b,0x9e,0x0c,0x24,0x90,0x93,0xf6,0xf6,0x9c,0x5c,0x0b,0xeb,0x39,0xde,0xa7,0x64,0x88,0x18,0xc3,0x32,0x92,0xd5,0x06,0x6d,0x88,0xfd .byte 0xd0,0x99,0xe2,0x65,0x23,0xc3,0x24,0x16,0x2d,0x56,0x47,0x96,0x1c,0x8a,0x09,0xbf,0x23,0x1e,0x36,0x12,0x3b,0xba,0xac,0x13,0xf4,0x82,0xb2,0x0f,0xb4,0x73,0xf8,0x1e,0x96,0xaa,0x5a,0x31,0x48,0x70,0x4e,0x5a,0xf1,0x9b,0xf7,0xf5,0xd3,0x88,0xdd,0x35,0x7c,0xbe,0x85,0x62,0x8d,0x5d,0xc8,0x52,0x41,0x8a,0x24,0xe1,0xae,0x02,0xbe,0x4d .byte 0xe6,0x15,0x70,0x43,0xed,0x01,0xcb,0xa7,0xf0,0x31,0x10,0x0c,0xc0,0x25,0x02,0x74,0xa9,0x2e,0x34,0xbd,0x77,0xd5,0x00,0x89,0x24,0xa4,0x30,0x36,0x52,0xe9,0x51,0x47,0xe8,0x79,0xe3,0x7a,0x2e,0xe6,0x43,0x6b,0xa4,0x48,0xd7,0x3f,0x75,0x6c,0x64,0x4f,0xc7,0xf9,0x90,0x17,0x8f,0xbc,0x52,0x67,0x34,0x16,0xad,0x35,0x64,0x2c,0xa0,0xf0 .byte 0x67,0x4e,0x2b,0xf8,0x27,0xe0,0xa4,0x4a,0xba,0xe5,0xcb,0x17,0xd9,0x9f,0xc6,0x64,0x68,0xf4,0xe0,0xfc,0x0c,0x5c,0x3b,0xc7,0xc4,0xc0,0x88,0xa5,0x23,0xf3,0x48,0x7a,0x7e,0xa5,0x10,0x97,0x61,0xa2,0x45,0xf5,0xe8,0xe6,0xe9,0x48,0x25,0x78,0xcb,0x6b,0x42,0x5f,0x18,0x26,0xb3,0xb7,0xb1,0x34,0x57,0xf1,0xbc,0x13,0x7a,0xb4,0x01,0xda .byte 0x9f,0x72,0x91,0xb3,0x4d,0x27,0xff,0x90,0x22,0x5c,0xb2,0xef,0xef,0xd6,0x9c,0x41,0xf3,0x29,0x8d,0x92,0xd9,0x03,0xbe,0x24,0x64,0x99,0xb0,0x8f,0xbb,0x85,0xd2,0x2c,0xda,0x9b,0xb1,0x81,0x52,0x5a,0x0b,0xdf,0x8d,0x70,0x94,0xec,0x72,0x2e,0x58,0x0a,0x38,0x78,0xa1,0x51,0x8a,0x72,0xaf,0x49,0x6e,0xdf,0x8d,0xbc,0xce,0xd2,0xab,0x13 .byte 0x57,0x50,0x40,0xad,0xb8,0x3a,0x17,0x1c,0x61,0xb8,0x06,0xd3,0x2f,0x46,0xa6,0x57,0x4f,0x3a,0xe5,0xcb,0x96,0x48,0x37,0x9e,0xd9,0xb4,0x12,0xb3,0x15,0x10,0xe4,0x4a,0x36,0x6e,0xc5,0x4a,0xd8,0x6a,0xcb,0x96,0xfd,0xef,0xdd,0x1a,0xdb,0x80,0x92,0x93,0x5a,0xc4,0x2a,0x7b,0xe3,0x2d,0x6f,0x83,0x3e,0x50,0xb7,0x66,0xc5,0x66,0xca,0x42 .byte 0x97,0x6e,0x32,0x81,0x31,0x18,0xb9,0xc5,0xfa,0xae,0xb8,0xdd,0x5c,0x91,0xa1,0xc6,0x69,0xa5,0x2a,0xe0,0x1f,0xa4,0xaf,0x0d,0x92,0x4e,0x12,0x60,0xe1,0x0f,0x92,0xcb,0x78,0x49,0xbc,0xcf,0x64,0x4c,0xd8,0xa0,0x2b,0x70,0x7c,0x8b,0xa6,0x64,0x97,0x1b,0x22,0x22,0x3c,0x82,0x8d,0x08,0xfa,0xc4,0x8c,0x18,0xe3,0x1b,0xe9,0xd0,0xd9,0x10 .byte 0xca,0x9b,0x53,0x9c,0x3a,0xe2,0x1e,0xa8,0x00,0x4d,0xe1,0x58,0x55,0x6c,0xd9,0x88,0xda,0xb8,0x3c,0xbe,0x3c,0x65,0xfa,0x4d,0xdd,0x0b,0xde,0xf4,0xaf,0x50,0x9c,0xe4,0xa5,0xae,0xe3,0xc2,0x1a,0x53,0xfb,0x32,0xff,0x7e,0xf0,0x29,0x0c,0xac,0xa2,0xf5,0x68,0xc8,0xd8,0x04,0x7b,0x5f,0xe3,0xe0,0x57,0x0d,0x9e,0xcd,0x58,0xda,0x2a,0x44 .byte 0x49,0x3b,0x1d,0xd9,0x75,0x6b,0x41,0xf7,0xe6,0x7e,0x0c,0x49,0x20,0xc0,0xb5,0x67,0xdf,0xc4,0x28,0xcf,0x21,0x0b,0xa0,0x8e,0xde,0xff,0x5c,0x9f,0x34,0xdf,0xab,0xb9,0x70,0xa0,0xfd,0x80,0x54,0xb6,0xaf,0xc9,0xc4,0x10,0x5c,0x0a,0xc8,0xe1,0x91,0x5d,0xfc,0x24,0xab,0x12,0xdc,0x48,0x45,0xd5,0xc4,0x95,0xbb,0xe0,0x83,0x3a,0x5d,0xb7 .byte 0x8c,0xf1,0xf0,0xc6,0x56,0xed,0x3c,0x31,0x79,0xf2,0x75,0x81,0x3f,0xf0,0x4a,0x3f,0x44,0x99,0xdb,0x9a,0x48,0x44,0xaa,0x4c,0xff,0xea,0xfd,0xc0,0xd3,0xaf,0x46,0xad,0xd2,0x96,0xc5,0x6b,0xd7,0x2b,0x39,0xe5,0xef,0xc6,0xa6,0xe9,0x37,0x5a,0x25,0x0f,0x00,0x05,0x09,0x30,0xbd,0xb0,0x16,0x9f,0x1e,0x15,0x62,0x20,0xd1,0x01,0x4f,0xb7 .byte 0x20,0xb8,0xd2,0x6b,0x2b,0x18,0x66,0x45,0xac,0xad,0x33,0x14,0x4a,0x7f,0x74,0x8b,0xfa,0xa6,0x20,0xef,0x2e,0xd7,0xf6,0x84,0x03,0xb8,0x20,0x76,0x01,0x2b,0x20,0xf9,0x17,0x59,0xc4,0x09,0xe1,0x8b,0x43,0xf1,0x32,0xf2,0xc9,0xe8,0x00,0x37,0x77,0x10,0xd0,0x4d,0x89,0xc4,0x69,0x14,0x24,0xf6,0x30,0xc2,0xfb,0xcc,0x6c,0x6c,0x1d,0xdb .byte 0x7c,0xd7,0x32,0x1f,0x54,0x1b,0x50,0x39,0x2a,0xd3,0xb4,0x5e,0x0f,0xff,0x7a,0x04,0x5b,0xeb,0xf1,0xcb,0xea,0x5c,0xab,0xaa,0x73,0xb7,0x43,0xe5,0xf1,0xdc,0xc7,0xe4,0xb6,0x53,0x04,0xa5,0xb4,0xb2,0xf5,0xc6,0x93,0xa5,0x24,0x67,0xf3,0xd4,0xbb,0x3d,0x24,0xa2,0x30,0x4c,0x35,0x38,0x9c,0x5b,0x4b,0xba,0xfd,0x69,0x25,0xca,0xff,0x1a .byte 0xf6,0xc1,0x9b,0xd4,0xd7,0x29,0x9e,0x1c,0x57,0xb5,0x7e,0xa8,0x23,0x0b,0x8f,0x54,0x12,0x36,0x07,0x83,0x15,0xde,0x08,0x17,0xf2,0x65,0xb2,0x36,0xa3,0x55,0x6b,0x2d,0x0b,0xc2,0xf9,0x7a,0xab,0x39,0x9e,0x24,0x31,0x94,0x31,0x21,0xe2,0x1c,0x46,0x69,0x07,0x15,0xd3,0x42,0x42,0x7a,0x60,0x75,0x7e,0x48,0x46,0xc8,0xa5,0xee,0x3f,0xea .byte 0x97,0x5d,0xb1,0x80,0xbe,0x03,0x29,0xb5,0xf5,0xde,0xae,0xdb,0xf2,0x83,0x7f,0xc1,0x7f,0xb5,0xd5,0xb5,0x18,0x64,0xec,0x90,0xab,0x48,0xed,0xfb,0x75,0x30,0x13,0x2c,0x56,0xbc,0x2c,0xc3,0xc4,0x9d,0xf4,0x50,0xaa,0x08,0x59,0x9a,0x4b,0xc1,0x78,0x8f,0xe9,0xd4,0x3b,0x14,0x48,0x67,0x3e,0x78,0xf5,0xc8,0xba,0xbf,0x92,0xf3,0x23,0x94 .byte 0x35,0x7b,0x0a,0x7d,0xdd,0x21,0xde,0x9d,0x36,0xed,0xb1,0x72,0x0a,0x3a,0x93,0xc7,0x66,0x91,0xf6,0xc1,0xe0,0xf3,0x53,0x5f,0xb5,0xfb,0xa2,0xb7,0x91,0x06,0xf3,0xba,0xb7,0xf9,0x41,0x58,0xc6,0x4b,0x8e,0x63,0x35,0xd1,0xb5,0x6d,0x86,0x3e,0xd9,0x66,0xe1,0x1c,0xb7,0x02,0xc9,0x19,0x82,0xaa,0xda,0x04,0xce,0xe0,0xd0,0xa4,0x7a,0xd3 .byte 0xa2,0x3b,0x18,0x5b,0xfc,0x63,0xea,0xf5,0x8e,0xbb,0x57,0x9e,0x7c,0xe6,0x14,0x03,0xf7,0xe0,0xfe,0xf8,0xee,0x47,0x2a,0x3d,0x71,0x4b,0xe4,0x22,0x88,0x2f,0x7c,0x97,0x9c,0xb7,0x89,0x64,0xc4,0xc9,0xe9,0xa3,0xbd,0xbd,0xa4,0x73,0x98,0xd5,0x48,0x9f,0x2f,0x46,0x1a,0xc6,0xa1,0xce,0x84,0xb6,0x0a,0xb2,0xcb,0xbb,0xde,0x56,0xc3,0x1f .byte 0x81,0x07,0x08,0xc3,0x50,0xd8,0xcf,0xe8,0x17,0x79,0x4d,0x82,0x09,0x90,0x8b,0xde,0xdb,0x71,0x49,0xb9,0xb0,0x6a,0x82,0x22,0x78,0xbc,0xcf,0x48,0x94,0x76,0xa1,0x6f,0x31,0xe9,0x8a,0x33,0xac,0x6b,0x9e,0xc4,0xa0,0x12,0x9c,0x38,0x82,0xe1,0x70,0xac,0xc8,0x2a,0x2b,0x13,0x87,0xf2,0xc1,0xd3,0xc4,0x5b,0x77,0x37,0x82,0x28,0x4a,0xa1 .byte 0x7a,0x39,0xff,0x8a,0xdd,0x38,0x74,0xb0,0x88,0x83,0x71,0xe5,0x25,0xaf,0x04,0x19,0x99,0x1c,0x8d,0xa0,0x57,0x96,0x36,0xd5,0x28,0x83,0x30,0xd5,0x12,0x78,0x74,0x9f,0x9c,0xbf,0xee,0x68,0x95,0xec,0x56,0x67,0x77,0x54,0x35,0xb3,0xce,0xcf,0x29,0x2f,0xcf,0xec,0x14,0xa1,0x58,0x67,0x95,0xdd,0xc9,0x29,0xe4,0x0a,0xce,0x72,0x9a,0x5f .byte 0x3d,0x21,0x96,0x0f,0xf3,0x97,0x3a,0x60,0x82,0x1d,0xc5,0xbd,0x45,0x9a,0xe5,0x45,0x71,0x92,0xa3,0x3d,0xb3,0x13,0xf4,0x2a,0x71,0xcd,0x4f,0x70,0xbc,0x16,0x8c,0x35,0xcd,0xaf,0xf9,0x98,0xef,0xa7,0xc4,0x36,0x4e,0x65,0x89,0xaa,0xfc,0x9b,0x58,0x51,0x63,0x8e,0xd3,0x22,0x5b,0xf2,0x5d,0x13,0x6f,0xc8,0xa8,0x67,0x9c,0x8f,0x34,0xfd .byte 0xfe,0xf5,0xb7,0x84,0xcb,0x87,0x3d,0xb5,0x24,0xb8,0x19,0xa7,0x00,0x03,0x6d,0xc6,0x4f,0x1f,0xb9,0x57,0xff,0xdc,0x65,0xa4,0xe9,0x8e,0xc3,0x6b,0xfa,0x57,0x51,0x3d,0xf0,0x07,0x95,0xaa,0x00,0x31,0xdc,0x08,0x21,0xa1,0x73,0x9c,0xc9,0x46,0x3f,0xf4,0x0f,0xfd,0xec,0xcd,0xf2,0x76,0x73,0xa6,0xc2,0x15,0xeb,0x9b,0x9d,0xfb,0x6e,0xe5 .byte 0xe2,0x6e,0xaa,0x1a,0x30,0x82,0x02,0xad,0x56,0x67,0x3f,0x50,0x76,0x2f,0x04,0x4f,0x79,0xd5,0xfd,0x50,0x39,0xc1,0xe1,0xd5,0x1d,0x6f,0xb8,0x15,0x25,0xa6,0x4c,0x97,0x90,0x93,0x0f,0x34,0x46,0xda,0x99,0x2f,0x0e,0x4e,0xf7,0x09,0x2d,0x30,0xa7,0x74,0x95,0x8c,0x84,0x69,0x60,0x93,0x17,0x66,0xa3,0xff,0x4b,0xed,0xc7,0x5b,0x16,0x51 .byte 0x6a,0x39,0xc4,0x7f,0xd8,0x48,0x92,0xbd,0xc3,0x58,0xfd,0x87,0x8e,0x34,0xac,0xcc,0x2a,0xbb,0x40,0xd5,0x80,0x57,0x12,0x89,0x56,0x77,0x64,0xe3,0xf9,0x25,0x7d,0xd6,0xfe,0xd2,0xeb,0x9d,0x6c,0x20,0x12,0x7f,0xa4,0x19,0x45,0x27,0x36,0x22,0x3b,0x4c,0x1f,0x45,0xab,0x95,0xad,0xed,0x53,0xd8,0xce,0x84,0xde,0xbe,0xb7,0x93,0x6a,0x05 .byte 0x09,0xe4,0x57,0x38,0xb1,0xa9,0x7a,0x34,0x3e,0x43,0x03,0xa6,0xdb,0x60,0x15,0xdf,0x6f,0x26,0xf1,0x41,0xf2,0x83,0x1b,0xc9,0x15,0xf3,0xab,0xfa,0x33,0x19,0x87,0xac,0x55,0x7b,0xb6,0xbd,0x0a,0xbc,0xa5,0x08,0xfa,0xf4,0x7e,0x89,0x49,0x06,0x21,0x6c,0x44,0x27,0xf5,0x7c,0x46,0x6e,0x95,0x50,0x93,0x81,0xae,0xef,0x93,0x50,0x1c,0x4e .byte 0x7e,0x8c,0x3c,0xf4,0x41,0xbd,0x4a,0xfa,0x11,0x2e,0xed,0x6f,0x84,0x94,0xe1,0x0e,0xe4,0x5b,0x1f,0x0d,0xe0,0x2b,0xa1,0xa2,0xf8,0xa2,0x56,0x3b,0x52,0x41,0xf9,0x0a,0xe4,0x5b,0x82,0xa6,0xaa,0xd6,0x09,0x18,0x14,0x7a,0x36,0x66,0x01,0x47,0x7c,0x20,0xc6,0xf0,0xb3,0x24,0x29,0xb3,0x03,0x54,0x74,0x7d,0xee,0x28,0x6e,0xd8,0x4a,0x1a .byte 0x02,0x1d,0x86,0x11,0x16,0x4b,0x0f,0x92,0x31,0x6e,0x7b,0x8b,0x47,0x73,0xd8,0x46,0xf6,0x7b,0x82,0xfe,0xcd,0xe8,0x01,0x49,0x32,0xb7,0xa3,0xf1,0xc0,0xb9,0x0a,0x86,0xf7,0x6d,0xee,0xf3,0xed,0x66,0x8a,0x35,0x73,0xfb,0xb7,0xfd,0xff,0x0d,0xd1,0xd5,0x1b,0x4e,0x59,0x1a,0x84,0x0f,0x73,0x9c,0xfd,0x36,0xb0,0x81,0x79,0xec,0x46,0x94 .byte 0x32,0x1f,0x7a,0x98,0x1f,0xc7,0x99,0xc9,0x1d,0x54,0x8b,0xda,0x80,0x7a,0x38,0x38,0x8f,0x9e,0x2a,0xfc,0x24,0x2b,0x58,0x17,0xa6,0x2c,0x31,0x37,0xcd,0x14,0xb5,0x67,0xcb,0xdc,0x59,0x9b,0xd2,0x77,0x31,0xa1,0x6d,0xbe,0x09,0xd2,0x12,0x34,0x70,0x81,0xb0,0x19,0xbf,0xd6,0xb2,0x63,0x75,0xc1,0x1b,0xaa,0x8c,0xdc,0x59,0x79,0x12,0x5d .byte 0x20,0x43,0xd8,0x1a,0x03,0x87,0xb3,0x8f,0x52,0x0b,0xdc,0x69,0xa5,0xf2,0x19,0x07,0x6d,0xe2,0xfd,0x52,0xc9,0x7b,0x9a,0x37,0x48,0x1b,0xb1,0xd2,0x6b,0xd9,0x4e,0x6c,0xfd,0xc1,0x94,0xf2,0x36,0x21,0x89,0x5e,0x89,0x5e,0x87,0x09,0xa1,0x9b,0x6b,0x67,0xd1,0xde,0x85,0x2f,0xd5,0x6c,0x19,0x78,0xe7,0x61,0xd3,0x53,0x6e,0xb5,0x1c,0x23 .byte 0x5e,0x4d,0x32,0x73,0x25,0xa6,0x29,0xa2,0xb9,0x1b,0xc0,0x07,0x54,0x38,0x17,0xdf,0xc0,0xcc,0xb1,0x47,0xb9,0x07,0x1d,0xbd,0x8f,0x97,0xab,0x3f,0x7f,0x5b,0xff,0x34,0x01,0x3a,0x2c,0x6a,0x15,0x1d,0x77,0x36,0x32,0x55,0xf5,0x5c,0x84,0xfc,0xd6,0x54,0x22,0xfb,0x6a,0xce,0xb2,0x62,0x03,0x7f,0x96,0xf6,0x37,0xce,0xcc,0x08,0xcf,0x68 .byte 0x66,0x42,0x27,0x80,0x27,0x99,0x3d,0xbd,0xf8,0x60,0x4e,0x49,0x06,0x8a,0xd2,0x6b,0x1d,0x80,0xe0,0xfe,0xe4,0x2a,0x75,0x8e,0xd1,0xdf,0x26,0x69,0x55,0xe5,0xbb,0xa8,0xf3,0x3d,0xdd,0x54,0x90,0x90,0xd8,0x5d,0x86,0x9c,0xdc,0x41,0x71,0xac,0xd4,0x48,0x8f,0x15,0xc6,0xca,0x7e,0x03,0x95,0x81,0x56,0xdb,0xb6,0xe5,0x27,0xb3,0x60,0x51 .byte 0x93,0x21,0x9a,0x68,0x1e,0xb2,0x5c,0xf8,0xf1,0xdd,0x19,0x02,0xaa,0x5f,0x16,0xaa,0x13,0xa6,0xe7,0xcf,0xfb,0x7c,0xd4,0xe7,0x55,0x8a,0x5d,0xf3,0xec,0x3d,0xca,0xf8,0x34,0x32,0xaa,0xd8,0x47,0x11,0x25,0xe4,0xf1,0xbd,0x7a,0x1d,0xe9,0xa3,0xce,0x2e,0x44,0xe1,0xa4,0xbe,0x70,0x68,0x49,0xa4,0x14,0x7b,0xde,0xa6,0x9e,0xe1,0x32,0x01 .byte 0xb3,0xed,0xc4,0x15,0x0c,0x84,0xb1,0xd4,0xef,0xa5,0xbc,0x2e,0xc8,0x79,0x6b,0xf1,0xf8,0x61,0xae,0x55,0xa3,0xd5,0x0e,0xf5,0xc0,0xb8,0x9c,0xdf,0x7f,0x12,0x19,0xc2,0x73,0x22,0xc2,0xc5,0x77,0x76,0xb0,0x36,0xe5,0x89,0x7e,0x5a,0x4a,0xb4,0xa0,0x4d,0x8e,0x1b,0xbe,0x52,0xd1,0xf5,0x3b,0x84,0xf8,0x44,0x76,0x26,0xbb,0x31,0x38,0xd1 .byte 0x24,0xa7,0xb7,0xb5,0xcb,0xa6,0xa7,0x9c,0x15,0xeb,0x31,0x57,0x93,0x3f,0x1c,0x48,0xe9,0x3b,0x20,0x21,0x46,0xe9,0xe2,0xe1,0xd3,0xf4,0xd9,0xcb,0xe7,0xa1,0xa9,0x75,0x7e,0x70,0x95,0x33,0x43,0x86,0xb2,0xd1,0x01,0x8e,0xcb,0xb5,0x1c,0xc5,0xe8,0xcb,0xec,0x1d,0xf2,0xd1,0xe9,0x3b,0xf0,0x8f,0x1a,0x30,0x79,0x83,0x31,0xd6,0x29,0x18 .byte 0xe7,0x80,0xaf,0xd3,0x1d,0x48,0x59,0x14,0x1e,0x94,0x4f,0x32,0xaa,0x8c,0x40,0x37,0xad,0xed,0x30,0xe3,0x5a,0xc5,0x2c,0xdf,0xf5,0xa4,0xcc,0x52,0xdb,0x48,0x90,0xc3,0xbb,0xff,0x65,0x9b,0x86,0xec,0x06,0xac,0xec,0x3c,0x67,0xdc,0x82,0x57,0xb5,0xd4,0x19,0x19,0x68,0x73,0xad,0xd7,0xa9,0x9c,0x3f,0x8e,0xe8,0x7c,0x92,0x4c,0x66,0xbe .byte 0xe1,0xa6,0x9c,0x1c,0x85,0xcc,0xcf,0xfa,0x86,0xeb,0x34,0xe5,0xf1,0x14,0x09,0xa7,0xde,0xf5,0x2f,0xc0,0xc9,0xb4,0xab,0x92,0x8f,0x76,0xf0,0x78,0x02,0x8d,0x8d,0x44,0x3c,0x2c,0x57,0xfe,0x40,0xb5,0xd2,0xea,0x67,0x1c,0x30,0xb4,0x75,0xbb,0xeb,0xd4,0xf7,0x53,0x0a,0x09,0x29,0x0c,0x02,0x40,0x4b,0x22,0x98,0xe7,0x70,0xa7,0x6b,0xcf .byte 0xf3,0xa1,0xed,0x50,0xec,0xbb,0xbc,0x24,0x48,0x20,0x03,0x64,0xac,0x03,0xf7,0x9a,0xb5,0x8e,0x16,0xee,0x36,0xb1,0xa7,0x82,0xf4,0x21,0x77,0x79,0xa8,0x07,0x57,0xb4,0xb5,0x59,0x84,0x62,0x29,0xcd,0xb4,0xb8,0x78,0x3c,0x20,0x96,0xe5,0x43,0x8f,0x21,0x38,0xff,0x32,0xa5,0x4f,0x23,0x4b,0xf4,0x5d,0x96,0xc4,0x74,0xe4,0xc1,0x9e,0x72 .byte 0xb1,0x37,0x2a,0x7c,0xa7,0xd1,0xa9,0xf0,0x9e,0x90,0xdd,0xfa,0x3b,0x47,0x7d,0x31,0x08,0x7a,0xbd,0xe7,0x0b,0x0c,0x78,0x92,0x85,0xb4,0x7f,0x33,0xe0,0x7c,0x14,0x92,0x3f,0x3b,0x2e,0x6a,0x61,0x4a,0x81,0xf1,0x76,0x53,0x1f,0x24,0x95,0xe7,0xc2,0xd0,0x7d,0xb4,0x3c,0x59,0x85,0x55,0x0b,0x46,0xd0,0xc3,0x0b,0x0c,0xe1,0x34,0xd9,0x67 .byte 0xfc,0x6b,0x98,0x67,0xdb,0x24,0x08,0xd3,0x15,0x9d,0xb5,0x31,0x22,0x7e,0xe7,0x77,0x7c,0x7e,0x49,0x48,0x6c,0x3e,0xd5,0xda,0x4f,0x46,0x94,0xf9,0x59,0x5d,0xb6,0x4e,0xec,0x76,0xfe,0x5e,0x10,0x63,0x92,0x89,0x3e,0x56,0x18,0x94,0x6c,0xac,0xc1,0x2d,0xba,0xf4,0x1f,0xd4,0x09,0xa0,0x00,0x39,0x8f,0x9e,0xfb,0x63,0xa0,0x34,0x71,0x23 .byte 0xdf,0xaf,0x0d,0x88,0x75,0x37,0x92,0xd0,0x17,0xcb,0x20,0xad,0x94,0xa9,0x94,0x9f,0xce,0x1c,0x19,0xe2,0xdb,0x36,0xe0,0xa6,0x68,0xa4,0x1d,0x16,0xb6,0x16,0xb2,0xf4,0xe4,0x3e,0xfc,0x3b,0xda,0x10,0x57,0xc9,0x81,0x58,0x28,0x43,0xf8,0x45,0x38,0x5c,0xb1,0xd6,0x54,0x16,0x45,0x36,0x46,0xe2,0x60,0xa5,0x47,0x9a,0x29,0x85,0x54,0x45 .byte 0xdc,0x1a,0x63,0xe6,0xae,0x3b,0xdf,0xa9,0xd4,0x10,0x63,0x19,0x91,0x81,0x8e,0x90,0xb4,0x1f,0x25,0x5a,0x46,0xff,0x41,0x1e,0x25,0x1f,0x98,0xb5,0x69,0x2b,0x5e,0x5d,0x7d,0x0a,0x27,0x13,0x3f,0x70,0xe8,0xae,0xa1,0x89,0xb7,0x4a,0x5c,0xef,0x03,0x08,0x7f,0x66,0xa4,0xa7,0x6a,0x27,0x27,0xfc,0x8c,0xe4,0x61,0x8e,0x9e,0x19,0x6d,0x98 .byte 0x2f,0xd0,0x31,0xdf,0xb5,0x86,0xa5,0x23,0xe0,0x82,0x8c,0x26,0xf7,0x96,0x7f,0xca,0xab,0xba,0xcb,0x54,0x5e,0x05,0x9a,0x0a,0x75,0xbe,0xbf,0x25,0x80,0x18,0xac,0xd8,0x4e,0x9c,0xd3,0xb7,0x34,0x73,0xfa,0x73,0x17,0x89,0xc7,0xe2,0x94,0x59,0xc1,0xca,0x78,0x48,0x6d,0x63,0x2c,0xce,0x70,0x90,0x6a,0xbd,0x6b,0xb8,0xaa,0xac,0x5f,0x09 .byte 0xf3,0x96,0xac,0x07,0xe0,0x12,0xdc,0xf7,0x12,0x61,0xa7,0x9d,0x7c,0x7b,0x63,0x02,0x59,0x43,0xd4,0xcb,0xa4,0x32,0x7e,0x3e,0x27,0xf5,0x37,0xf5,0x75,0x35,0xc4,0x17,0xa4,0x98,0xae,0x04,0xe8,0x28,0x18,0x84,0xf1,0x57,0xff,0x1a,0xa8,0xaa,0x31,0xc2,0x5f,0xd9,0x38,0x11,0xdc,0x49,0x59,0x28,0x8a,0x43,0x04,0xd2,0x83,0x96,0x66,0xe3 .byte 0x26,0x56,0x5e,0x4a,0x8f,0x11,0xcc,0x30,0xd4,0x11,0x52,0xdf,0x95,0x46,0xb6,0x8a,0x9a,0x80,0xa5,0x9f,0xae,0xeb,0x06,0x38,0x14,0x7d,0x6a,0x25,0x7b,0xf8,0xf8,0xa1,0x2e,0xeb,0x84,0xc3,0x25,0x63,0xa4,0xe4,0xf8,0x9b,0x4b,0xfb,0xb1,0xb4,0x18,0x54,0xfa,0x74,0xc5,0x5a,0x59,0x79,0xf5,0x19,0x2a,0x51,0x4c,0xe0,0x30,0xe5,0x43,0x71 .byte 0xda,0x37,0xb3,0xca,0x1c,0x6f,0xa3,0xf5,0xa1,0xd9,0x6c,0xaa,0xca,0xb5,0xae,0x9f,0x51,0xef,0x17,0xc3,0xaa,0x4c,0xe1,0x3b,0x2a,0x61,0x85,0xdf,0xb4,0x6b,0x18,0x9f,0x1e,0x0d,0x4a,0xe6,0xaf,0x72,0x4a,0xa0,0xad,0x5b,0x44,0xf5,0xa4,0x00,0x91,0x4a,0x33,0xf8,0x8d,0x83,0x51,0x83,0x6b,0x1d,0xca,0xcd,0x94,0x04,0x0b,0x5f,0x3d,0x60 .byte 0x26,0xbf,0x9f,0xa5,0xac,0xaf,0x66,0x5c,0x2a,0x37,0xa6,0xfc,0x11,0x1b,0xa6,0x8b,0x02,0xe5,0x4e,0x0f,0x1f,0x7a,0x0d,0x49,0x22,0xb9,0x66,0x97,0xbd,0xee,0x82,0xc7,0x78,0xba,0x77,0x50,0x54,0x68,0xf6,0xc8,0xc9,0x73,0x82,0x93,0x1f,0xfe,0x6b,0x49,0x9b,0x63,0xad,0x6c,0xaa,0x78,0x07,0x9f,0xda,0x11,0xb2,0x36,0xb7,0xcb,0xea,0x27 .byte 0x83,0x66,0xa3,0x20,0x20,0xf8,0x29,0x56,0xb8,0xcf,0x93,0xcd,0x40,0x94,0x94,0xef,0x3e,0xda,0x3d,0x4e,0xff,0xef,0xea,0x29,0xc3,0xd2,0x6e,0x2d,0x74,0x27,0xe4,0x31,0xd0,0xcb,0x76,0x48,0xf2,0x9b,0xf7,0x59,0x95,0x15,0x33,0xc1,0x2f,0x88,0xf3,0xa8,0xdf,0xc9,0x86,0xcf,0x37,0xf1,0x08,0xb9,0x76,0xe6,0x09,0x48,0x44,0x25,0x9b,0x98 .byte 0xbe,0xab,0x20,0xa1,0x21,0xe9,0xf9,0x9b,0x31,0xf1,0xfd,0x49,0xaa,0xb5,0xf0,0xbf,0xec,0x8d,0x1c,0xf4,0xaa,0xa9,0x23,0xe5,0x0c,0x1b,0xd7,0xad,0xbd,0x97,0x16,0xdf,0x4f,0x7a,0xd4,0x68,0xd6,0xc2,0xba,0x92,0x17,0x5c,0x80,0xf6,0x4a,0xf1,0x26,0x50,0x58,0xd0,0x11,0xed,0x98,0x55,0x75,0x44,0xb2,0xb5,0x96,0x22,0xe6,0x4f,0xc8,0xba .byte 0x97,0x3a,0x3e,0xce,0xc5,0x8c,0xf2,0x8c,0xf1,0x91,0xb6,0xb3,0xcd,0xae,0x2c,0x80,0x2a,0x15,0x7e,0x65,0x28,0x35,0x50,0xae,0x36,0x03,0x8b,0x38,0x8f,0x51,0x20,0x8d,0x38,0x19,0x68,0x6e,0x25,0x28,0xd7,0x2c,0x74,0x7f,0xac,0xa8,0x02,0xed,0x01,0x08,0x01,0x1a,0xc4,0x7d,0x18,0x6c,0xf5,0xce,0x25,0xea,0x1f,0xdc,0x85,0xf2,0x8c,0x56 .byte 0x60,0xe6,0x5c,0x5f,0x08,0x2c,0x43,0xe2,0x53,0x5c,0xd0,0xa7,0x78,0xec,0x2a,0x75,0xb4,0x18,0x4f,0x80,0x19,0xca,0x30,0x13,0x67,0xcd,0x73,0xba,0xf9,0xba,0x54,0x39,0x0b,0x4b,0x03,0x7d,0xfd,0x21,0xac,0x14,0x54,0x56,0xba,0x6f,0x0b,0x59,0xbf,0x52,0x19,0xb2,0xb7,0x18,0x57,0xaa,0xaa,0xb2,0x07,0x6b,0xf7,0x13,0x37,0xe1,0xff,0x5a .byte 0x1d,0x54,0xdf,0xf0,0x57,0xb4,0x14,0x93,0x03,0x31,0xe3,0xaa,0x53,0xa5,0x8e,0x39,0xbc,0x17,0x83,0xd1,0xc3,0x4d,0x5f,0x8d,0xa0,0x08,0x09,0xf2,0xde,0x5b,0x47,0x72,0xad,0x9f,0x22,0x59,0x8d,0x7c,0x8f,0x4b,0x78,0xd2,0x35,0x49,0x34,0x23,0x89,0xa4,0xa1,0x15,0xb0,0xed,0xc0,0x60,0x53,0x68,0xf6,0x3b,0x35,0xca,0x75,0xf6,0x04,0xde .byte 0x2f,0x0c,0x8c,0xd8,0x75,0xd1,0x7c,0xa1,0x62,0x6b,0x2c,0x2d,0x10,0x1b,0x38,0x81,0x10,0x82,0xcb,0xb8,0x75,0xfa,0x3f,0xfd,0x41,0xd5,0x6d,0x88,0x12,0x5e,0xc5,0x23,0xb3,0x8e,0x37,0x01,0xd9,0xee,0x25,0x32,0xda,0x3c,0x3b,0x50,0xa7,0xef,0xe3,0xac,0xfd,0x50,0x4e,0x55,0x94,0x2d,0xcc,0x41,0x07,0x6e,0x3f,0x8f,0x1a,0x21,0x4d,0x79 .byte 0x42,0x1c,0x8e,0x23,0x4c,0x43,0x02,0x5c,0xf8,0x59,0xc8,0x88,0x64,0x93,0x30,0x25,0xf7,0xea,0xeb,0x2c,0xe5,0x10,0x47,0x36,0xd8,0x32,0xe7,0xf3,0x5e,0x1b,0xcc,0x78,0xda,0xe7,0xc9,0xb6,0xf9,0x24,0x50,0x5a,0x6c,0xfb,0x30,0xc7,0x25,0xa4,0x54,0xdb,0xdc,0xc7,0xf3,0x64,0x9f,0x79,0xc5,0x6c,0xef,0xa2,0x12,0xb3,0x18,0xff,0x97,0xe8 .byte 0x79,0xaa,0x33,0xf1,0xb2,0x69,0x48,0x61,0x71,0x4c,0x8b,0x87,0x50,0x00,0xc1,0x90,0xc4,0x16,0x2a,0x52,0xca,0xf3,0x30,0x51,0xd0,0x8b,0x19,0x46,0x1c,0xb1,0xa3,0x56,0x8a,0x18,0xd8,0x04,0x9f,0x4d,0x3e,0xd7,0xcb,0x15,0x07,0x08,0x45,0x29,0x0d,0xf1,0x94,0x35,0xea,0xc2,0x89,0x0d,0x32,0x01,0x53,0xe3,0x8b,0xba,0xbf,0x39,0x36,0xe4 .byte 0x3a,0x9b,0x0b,0x8f,0x3b,0xbd,0x15,0x47,0x81,0x68,0x99,0xc3,0x40,0xc4,0xad,0x44,0x8f,0x02,0xe8,0x77,0x32,0x4d,0x8e,0xfe,0xf3,0xa0,0x95,0xef,0x8b,0x1b,0xd6,0xbc,0xac,0xe5,0x2b,0x05,0x5d,0xcd,0x1f,0xe6,0xac,0x80,0x62,0x91,0x54,0x6c,0x6f,0xcc,0xab,0x09,0x83,0x1d,0xcc,0xf2,0x40,0x91,0xc1,0x6b,0x41,0x19,0x33,0x36,0x8b,0x81 .byte 0xfb,0x97,0x2b,0x6f,0x28,0xc7,0xc2,0x69,0x7e,0x36,0x60,0x5d,0x89,0x8c,0xee,0xe0,0x0a,0xbf,0x38,0x6e,0xc4,0x9b,0xe4,0x93,0x33,0x96,0x80,0xf4,0x56,0x00,0xf4,0xa5,0xe5,0x29,0x04,0x13,0x83,0x0d,0x5d,0xcb,0x6a,0x09,0x90,0xc9,0xb4,0xe9,0xa4,0x13,0x3a,0x0e,0x64,0x18,0x2d,0x33,0x19,0x67,0x5f,0x89,0xd1,0x86,0x3d,0x8f,0x9d,0xb3 .byte 0x0c,0x7b,0x90,0x6e,0x9a,0x09,0xa2,0xb6,0x8a,0xc6,0x03,0x16,0xcf,0xe7,0xe0,0xe3,0x29,0xad,0x59,0x29,0x78,0xdd,0x26,0xcd,0x32,0xd7,0xb4,0x43,0xb8,0x18,0xa9,0x8f,0x79,0xe8,0xbc,0xe1,0x4d,0x16,0xa5,0x09,0x88,0x5c,0x37,0x50,0x88,0xee,0xcd,0x35,0x0d,0xd4,0xe4,0x14,0xd0,0x1b,0x9b,0x1f,0xd7,0x44,0x36,0x9a,0xe8,0x82,0x5b,0xb3 .byte 0xb3,0xea,0xcf,0x05,0x78,0xd8,0x94,0xd4,0x63,0x7f,0x45,0x0e,0xb2,0x96,0x7b,0x97,0xf0,0xde,0x85,0x2a,0x70,0xc3,0xb1,0x17,0xd2,0xf0,0x3a,0xb7,0xde,0xa5,0x5f,0xbc,0xda,0xa5,0x93,0xd2,0xd8,0x2c,0x74,0xd3,0xad,0x25,0xbd,0xda,0x80,0xd9,0x13,0xff,0x07,0x3f,0x56,0xa7,0x27,0x72,0x45,0xa9,0x06,0x44,0x3f,0x28,0xc4,0xb6,0x20,0x9d .byte 0xcd,0xb7,0xba,0x53,0xbc,0xe0,0xb6,0x91,0x8b,0x9d,0x2b,0x3d,0x0a,0x35,0xdb,0x9f,0xed,0x47,0x29,0x54,0xc1,0xbf,0x33,0xc2,0x69,0x0f,0x5b,0x7d,0xa1,0xe8,0x8b,0xd0,0x4f,0x69,0xf1,0x32,0x68,0x2a,0x2a,0x83,0xd0,0xe9,0xe3,0x73,0xbd,0xcd,0x6e,0x5c,0x33,0xab,0xf0,0xed,0xc3,0xf4,0x03,0xa2,0x8c,0xb8,0x53,0x91,0xb5,0x79,0x7a,0xfb .byte 0xc4,0x99,0xb8,0x06,0xf1,0xdf,0x4e,0x65,0xf2,0x0c,0xc6,0xd2,0x3f,0xe6,0xc2,0x4c,0xb3,0xfd,0xa8,0x24,0x27,0x5c,0xae,0x16,0xf1,0x99,0x12,0x8b,0xc9,0xf0,0x96,0xb2,0xcf,0x13,0x92,0x62,0xfb,0xf6,0x66,0xf4,0x87,0x1a,0x8b,0x09,0x4c,0xac,0x1b,0x6b,0x8b,0xa8,0x9d,0x14,0x36,0x90,0xe1,0xdc,0x6e,0x14,0x2e,0xa0,0x81,0xeb,0xd9,0x2c .byte 0xe0,0x2d,0x83,0x99,0x91,0xe5,0x79,0xca,0x61,0xfb,0x44,0x8e,0x63,0x52,0x85,0x27,0x1a,0x2e,0x63,0x34,0xdb,0x96,0xe7,0x39,0x0d,0x7e,0x64,0xc8,0x71,0x65,0xe0,0xb5,0x4a,0x03,0xe1,0x05,0xf0,0x23,0xf9,0x0a,0xc1,0xcb,0x8b,0x6f,0xee,0x47,0x99,0x63,0xac,0xb6,0x7b,0x12,0x68,0x45,0x8d,0x51,0x03,0xfa,0x3e,0x18,0xed,0xba,0x35,0x3a .byte 0xd7,0x6d,0x32,0xca,0x04,0x04,0x24,0xba,0x95,0x52,0x97,0x35,0x91,0x1c,0x9f,0xf2,0x83,0x4d,0xe3,0x3f,0xcd,0x71,0xf8,0xc2,0xe0,0xbe,0xcb,0x32,0x1e,0xa3,0x00,0xf6,0x53,0x9d,0x22,0x33,0xb1,0x4c,0x2a,0x9f,0x03,0x98,0xba,0x72,0x63,0x6b,0xa3,0x3a,0xe4,0x27,0xc6,0xec,0xfb,0x6a,0x35,0xae,0x56,0x7e,0xf2,0x26,0x43,0xad,0x04,0x26 .byte 0xc8,0xcd,0x3b,0xa7,0xf4,0xab,0xb4,0x8c,0xc3,0xde,0xd8,0xce,0x51,0xa8,0x35,0xc9,0x87,0x68,0x72,0x35,0xb7,0x87,0x37,0xe2,0x7f,0x02,0x06,0xce,0x32,0x0f,0xe7,0x7b,0x5f,0x41,0x58,0x6f,0xe6,0xef,0xd8,0x4f,0x45,0x9f,0x92,0xe2,0x8a,0x37,0xd0,0xdd,0xe5,0xa9,0x56,0x41,0xc2,0xea,0x93,0xfc,0x9f,0xfb,0x42,0x73,0x8b,0x9e,0xd4,0x4b .byte 0xb4,0x3b,0x30,0x33,0x36,0x50,0x7a,0x0a,0xdd,0x9c,0x65,0x78,0x8f,0xb4,0x91,0x9f,0xc3,0x90,0x4b,0x7a,0xed,0x8a,0xe2,0xe6,0x63,0x8b,0x51,0x1d,0x3d,0xef,0x62,0x27,0x21,0xaa,0xc4,0x7a,0xc1,0xea,0x66,0xed,0xb6,0x73,0x4a,0x6e,0x0c,0xec,0xae,0xf7,0xd5,0x3e,0x63,0xb3,0xbc,0x04,0x3e,0x9e,0xa8,0x27,0xa4,0xb1,0x48,0x5b,0x56,0x0a .byte 0x9d,0xfb,0xdb,0xd1,0x08,0x10,0xa5,0x46,0x80,0x03,0x7c,0x23,0x94,0x06,0x71,0xd0,0x47,0x45,0xe5,0x83,0x7f,0x06,0x94,0xdc,0xcb,0x0e,0xd0,0xd1,0xfb,0x04,0xa3,0x0c,0x30,0x07,0x37,0xc0,0x1d,0x90,0x6f,0xbc,0x71,0x4a,0xce,0x2d,0x9e,0x8c,0x2f,0x98,0x2c,0x31,0x73,0x67,0x68,0xdf,0x01,0xaa,0x49,0x40,0xfc,0x71,0xfd,0xbd,0x67,0xdf .byte 0x6c,0xe6,0x37,0x64,0x88,0x8f,0x05,0x04,0x59,0x0c,0x16,0x4e,0x6f,0x0c,0xff,0x11,0xcb,0xac,0x9d,0x42,0xb7,0xfc,0xf4,0xda,0x77,0xdf,0x62,0xe7,0x80,0x9d,0x37,0x50,0x86,0x16,0xb2,0xf3,0x86,0x8f,0x04,0xe0,0xb7,0x2b,0x2d,0x82,0x9a,0xe5,0x34,0x31,0x9a,0x77,0x63,0x60,0x7a,0xfe,0x5b,0x9b,0x32,0xf9,0x4d,0x66,0x5e,0x01,0x05,0xd4 .byte 0xc1,0x74,0xb5,0x41,0x3d,0x0c,0xab,0x98,0xdf,0xdd,0x42,0x62,0x78,0xb2,0x42,0x20,0x66,0x19,0x9e,0x83,0x9c,0xbf,0x32,0x4d,0x96,0x78,0x56,0x9b,0xa0,0xb6,0xce,0x67,0x3a,0xfc,0x34,0x92,0x39,0xe3,0x8f,0x8a,0x8a,0x81,0x1d,0x5b,0xf7,0xfb,0x15,0xba,0x2b,0x2e,0x20,0x3b,0x82,0xfb,0x59,0x90,0xb7,0x2f,0xd4,0x60,0x79,0x58,0x64,0xee .byte 0xb8,0xcd,0x4e,0x1c,0xac,0x58,0x43,0xce,0x5c,0xc9,0xe7,0xce,0xb1,0xc8,0x78,0x85,0x19,0x02,0x5d,0x86,0x1b,0xed,0x0b,0x7a,0x27,0x24,0xc2,0x90,0xae,0x5e,0x66,0xad,0x3b,0xc6,0xb5,0xe4,0xaf,0xc5,0xf2,0x0d,0x87,0x63,0x7a,0xcd,0x32,0x77,0x24,0xf8,0x67,0x84,0xbb,0xc1,0x09,0xf1,0x1c,0x41,0x7b,0x4d,0xb3,0x6e,0x58,0x02,0xf0,0x2d .byte 0x09,0x78,0x4b,0x86,0xd3,0xb2,0x3a,0x52,0x15,0x86,0xde,0x47,0xb0,0x85,0x1e,0x01,0xe8,0xe8,0xeb,0x71,0x96,0x23,0x4a,0xb9,0x32,0xc6,0x51,0x93,0x5d,0x60,0x40,0x5e,0xb8,0xb4,0x85,0x6b,0x0c,0xe6,0xfb,0x02,0x16,0xd8,0x4b,0xaf,0x7f,0xa2,0x48,0x0c,0x43,0x55,0x5a,0x9a,0xd0,0x24,0x88,0xbe,0xcf,0x97,0x4b,0x79,0xf3,0x7a,0xb8,0x3a .byte 0x6d,0xcd,0x8d,0x84,0x72,0xd7,0xd8,0xb4,0x54,0x68,0xa9,0x3d,0x72,0x53,0x51,0x42,0xca,0x11,0x2e,0xc8,0xe1,0xce,0x40,0x65,0x3e,0x5f,0x34,0x37,0xa3,0xee,0x2d,0x8a,0x68,0xcb,0xf0,0x96,0xc9,0x34,0xe3,0x5b,0x5c,0x4b,0xd6,0x48,0xdb,0x0c,0x79,0xbb,0x26,0xe4,0xa5,0x60,0x5a,0x21,0xec,0x2a,0x2d,0x64,0xe8,0xef,0xd9,0x9d,0x6e,0x9c .byte 0xdf,0xfe,0xbc,0x40,0x2d,0x6f,0xfe,0x55,0x7a,0x51,0x43,0x87,0xc8,0x03,0xd7,0x23,0x4f,0xf0,0xb9,0x31,0x70,0x9b,0xdb,0xf8,0x6c,0xad,0x45,0xe8,0x81,0x25,0x72,0x5d,0x6e,0xc1,0x68,0x9d,0xd7,0x5a,0x94,0xe3,0xab,0xa1,0x37,0x71,0xcb,0x2a,0x70,0x86,0x73,0x8b,0x52,0x1f,0x2d,0xe7,0xd3,0xc1,0xdd,0x7d,0x3a,0x32,0x0f,0x0c,0x0e,0x1f .byte 0xd9,0xfb,0x11,0xbe,0x40,0x17,0x89,0x8f,0x24,0x23,0x19,0xa0,0x53,0x7d,0x90,0x6e,0xfb,0x11,0xfa,0xc7,0x05,0x02,0xca,0x42,0xcf,0x00,0x58,0xeb,0xfb,0x4d,0xe7,0x8a,0x75,0x84,0x41,0x50,0xf8,0x5d,0x47,0x23,0x45,0x45,0x2e,0x77,0x47,0xc4,0x59,0x6f,0x91,0x98,0xbc,0xdf,0x91,0xef,0x2a,0x7a,0xe7,0x48,0x02,0xc6,0x4d,0x4b,0x21,0xe6 .byte 0xc8,0xcf,0x50,0x6a,0xe5,0xa4,0x6f,0x76,0x6f,0xb2,0xbe,0xb8,0x26,0xe8,0xea,0x8e,0x4e,0xf3,0xcc,0x09,0x29,0x5b,0x5a,0x4e,0xa0,0x0c,0x95,0xf2,0xf8,0x8d,0x07,0xa0,0x85,0x1d,0x2c,0x15,0x94,0xa6,0xdc,0x80,0x40,0x4a,0x95,0xfd,0x24,0x02,0x6b,0xf1,0xfc,0x55,0x51,0x45,0x5e,0x45,0x53,0x9c,0x45,0x84,0x7c,0x90,0xeb,0x84,0xf8,0x04 .byte 0x07,0x86,0x75,0x74,0x88,0xd8,0x2a,0x43,0xd2,0x55,0xda,0xfe,0x78,0xb0,0xc5,0xd1,0x18,0x71,0x20,0x6a,0xc2,0x74,0xc5,0x17,0x1d,0x03,0xa4,0x2f,0x2c,0xba,0xbd,0xdf,0xd0,0x24,0x83,0xbb,0x75,0xa9,0xd4,0xb3,0xc7,0x1e,0xb2,0x20,0x6b,0xe7,0x66,0x41,0x1c,0x1f,0xc5,0xa5,0x00,0x97,0x49,0x55,0xe2,0xde,0x6b,0x90,0x9d,0x1e,0xb6,0x7d .byte 0x42,0x9e,0x2d,0x76,0xa3,0x78,0x3a,0x46,0x96,0x99,0x25,0xb9,0x30,0xdb,0xe9,0x17,0xce,0x26,0x0e,0x90,0x5c,0x25,0x74,0xeb,0x0e,0xf4,0x7d,0x22,0x66,0xcd,0x48,0xe6,0x2e,0xa6,0xbd,0xff,0x46,0x19,0xb4,0x6d,0x6f,0xe1,0xc5,0x8b,0x18,0x13,0xde,0x22,0x9b,0xe2,0x98,0x97,0x4c,0xde,0x93,0xf4,0x3d,0xe8,0x8d,0xe5,0x0f,0x0d,0x8b,0xe9 .byte 0x1a,0x5a,0xf4,0x32,0x5e,0xad,0x54,0xd2,0x4a,0xd5,0x15,0xb0,0xdc,0xdf,0xb1,0x5f,0xde,0x76,0x3b,0x10,0x2f,0x47,0xc4,0xd4,0x7c,0x8b,0x57,0xf9,0xf2,0x15,0x97,0x25,0x8b,0x59,0x92,0x78,0xb0,0x55,0x2a,0x98,0xfc,0x31,0x73,0x71,0xd4,0xe4,0x5b,0x05,0xf7,0xd1,0xc0,0x4c,0xb4,0x3c,0x4c,0xe2,0x1d,0xd0,0xa4,0x46,0x62,0x1e,0x8a,0x06 .byte 0xba,0xe4,0x89,0x40,0x1c,0x91,0x4a,0x30,0xdb,0x2b,0x51,0x2b,0x28,0x4d,0x06,0xa6,0xd7,0x0c,0xb9,0xc7,0xdc,0x8d,0xea,0x4e,0x89,0xae,0x3d,0x98,0xb6,0x39,0x9a,0x46,0x74,0xac,0xd1,0x88,0xe5,0x86,0xa7,0x6e,0x7d,0x5c,0x0a,0xfc,0x77,0x3f,0xba,0xd4,0xef,0x51,0x93,0x4b,0x24,0xe5,0x57,0xd2,0xdd,0xdc,0x04,0x4e,0x4a,0xa0,0xe8,0x8d .byte 0x40,0x11,0xcc,0x8b,0xaa,0x6d,0x26,0x68,0xb2,0x60,0x0c,0x7e,0x2d,0xd8,0x5a,0x56,0xaa,0x81,0xbe,0x7d,0x1e,0xb7,0x9b,0xe0,0x1f,0x8a,0xd7,0xd3,0xe8,0x5a,0xa9,0x21,0x5c,0x75,0xa0,0x6a,0x12,0x35,0xa3,0x60,0xb0,0x5a,0x04,0xe5,0xb3,0x11,0xf3,0xb8,0x52,0x8b,0xab,0xff,0x1b,0xf8,0x51,0xd9,0x81,0xef,0xb8,0x66,0x16,0xed,0xd5,0x72 .byte 0x6d,0xf6,0x9b,0x03,0x3d,0x7c,0xc2,0xdf,0x00,0x13,0x24,0xb9,0x05,0xad,0x31,0x3c,0x0e,0x53,0x25,0xdb,0x86,0xbd,0xd9,0x0a,0xdd,0x0f,0x33,0x96,0x6a,0x72,0xd0,0x47,0xb2,0xee,0x1d,0xa4,0x92,0x3d,0xd8,0x33,0xed,0x2f,0xca,0xa1,0x9b,0x51,0xdd,0xbf,0x3f,0xfc,0x4b,0x6b,0xfe,0xd9,0xde,0x3a,0xa7,0x9b,0x3b,0xfb,0x94,0xc9,0xea,0x25 .byte 0xc6,0x24,0xd1,0xe3,0x47,0x89,0xc7,0x12,0xd1,0x7c,0xc6,0x10,0x3a,0xaf,0xb6,0x68,0x11,0xef,0x1a,0x16,0xd8,0xd9,0x9f,0x48,0xbb,0xba,0x44,0x97,0x69,0x34,0xf1,0xf0,0x7c,0xe0,0x27,0x59,0x2b,0x8a,0x2d,0x69,0xca,0xdb,0xae,0x07,0x21,0xbe,0xb6,0xa7,0xc1,0xbb,0xe6,0x07,0xdc,0x46,0x46,0x77,0xe2,0x98,0x1c,0xf8,0x73,0xdf,0xd9,0x93 .byte 0x52,0x70,0x09,0xf8,0xcc,0x2e,0x5e,0xff,0x87,0x0c,0xc6,0x9e,0x90,0x4b,0xfa,0x2b,0x49,0xb6,0xe6,0xb8,0xcb,0xfd,0xec,0x21,0xd6,0x04,0x9f,0xe4,0x90,0x11,0xa4,0x9c,0xd3,0x29,0xf6,0x9b,0x01,0xd3,0x7c,0xbc,0x00,0xb0,0x38,0x08,0x70,0x7c,0x6a,0x13,0xa7,0x2b,0x5f,0xd2,0x1f,0xf0,0x7b,0x9f,0xd6,0x48,0x43,0x66,0x6a,0x7e,0x9f,0x44 .byte 0x1c,0x63,0xdd,0xeb,0xd5,0x4e,0xdd,0x7d,0x47,0x36,0x93,0xe2,0xdb,0x93,0x26,0x35,0x47,0x4a,0x25,0x51,0x19,0xce,0xcb,0xbb,0x31,0x90,0xbf,0xe5,0x94,0xb5,0x06,0x95,0xe5,0x88,0xbd,0x0a,0x65,0x8f,0x5c,0x1a,0x78,0x9c,0xd4,0xfd,0xd3,0xc4,0xb2,0xde,0x90,0x06,0xb1,0x34,0x81,0x65,0xb3,0xfc,0xeb,0x2b,0x76,0x1e,0xac,0x88,0xec,0x42 .byte 0xf7,0xf4,0xbb,0x1a,0x21,0xee,0x68,0xd8,0x4e,0x02,0x54,0xae,0x49,0x66,0x83,0x2a,0xb3,0x8d,0x5f,0xfb,0xca,0x13,0x3b,0xaa,0xd8,0x3b,0x16,0x44,0xe8,0xb8,0xc0,0xdc,0x58,0xbf,0xe3,0x01,0xe2,0xae,0x45,0x9d,0xbf,0xfe,0x2e,0x7d,0xaa,0xee,0xbc,0xd8,0x9b,0x73,0xf9,0x01,0x0f,0x32,0x45,0x51,0x4b,0x60,0xfa,0xd4,0xdb,0x75,0x2d,0xbc .byte 0x95,0x1c,0x74,0xd5,0x24,0x56,0x38,0x7e,0x4e,0xab,0x05,0xe8,0x98,0xfb,0xe2,0x1e,0x53,0xef,0xbb,0x8f,0xef,0x07,0xcf,0xcc,0xf5,0xb9,0x0c,0xca,0xaf,0xe1,0x89,0xfe,0x72,0xf2,0xe9,0x11,0x7a,0x8a,0x9f,0x2c,0x60,0x55,0x25,0xe7,0x82,0x64,0xe6,0x75,0xa4,0xdd,0x49,0x05,0xd2,0x04,0xd4,0x4b,0xdc,0xb2,0xa8,0x62,0x7b,0x51,0xf1,0xdf .byte 0xd4,0xa6,0x3d,0xb4,0x19,0xf5,0x2a,0x19,0x77,0x0c,0x11,0x46,0x82,0x9d,0x19,0xa6,0xfc,0x17,0xff,0x77,0x3f,0x61,0xe5,0x91,0x51,0x2d,0x57,0x70,0x51,0xc0,0x09,0xfd,0x31,0x43,0x76,0x22,0x89,0xc4,0x77,0x8f,0x63,0x5d,0x9e,0xe8,0xe9,0x17,0x52,0x05,0x5c,0x16,0x2b,0x24,0x83,0xe1,0xb1,0x2f,0x78,0x45,0x16,0x80,0x92,0x62,0x0e,0x1a .byte 0x6f,0x78,0xb4,0xb7,0x1b,0x0a,0x2c,0xf4,0x9d,0xb0,0xda,0x32,0x88,0xc4,0x0c,0x2e,0xdc,0xfa,0x3d,0x54,0x2c,0x74,0x4e,0x14,0xa6,0x3d,0x39,0x2c,0x6d,0x44,0x71,0x51,0xb0,0xc0,0x7a,0xff,0x26,0x07,0x09,0xad,0x2c,0x1e,0x0a,0xb9,0xe3,0xdd,0x1d,0x76,0x66,0x57,0x38,0xa1,0xcc,0xe7,0x2d,0xe8,0xf5,0x8c,0x1e,0xa3,0xc6,0x4b,0x07,0x8b .byte 0xda,0x95,0x50,0x5d,0xac,0xac,0xb2,0xf7,0xd2,0x42,0xe2,0x4d,0xbb,0x72,0x55,0x94,0xf9,0xff,0x3d,0xfd,0x9a,0x52,0xc3,0x32,0x76,0xdc,0x63,0xb1,0x19,0xdc,0xd8,0x32,0xc4,0x85,0xb5,0x29,0x5d,0x27,0x8d,0x93,0xa3,0x29,0xcb,0x3d,0x93,0x39,0x3d,0x81,0x98,0xde,0x47,0x97,0x0c,0xe6,0xd8,0x1c,0xa0,0x87,0xe0,0x4e,0x03,0x21,0x6a,0x1b .byte 0x64,0x22,0xa3,0x25,0x4c,0xe0,0xd9,0xd0,0x37,0x94,0x3b,0x2b,0xd2,0x07,0x6c,0xaa,0x32,0x3b,0x09,0xde,0x38,0xbf,0xc8,0x63,0x0c,0x5d,0xf2,0x31,0x3a,0x40,0xcb,0xca,0xc2,0xe1,0x11,0x01,0x75,0x85,0x9d,0x0e,0x72,0xcc,0x3b,0x70,0xa5,0xd7,0xdd,0xa1,0xb9,0xf3,0x8d,0xca,0xba,0xc7,0x9f,0xe8,0xe7,0x34,0x72,0x27,0x0f,0xb6,0x87,0x3a .byte 0x52,0x50,0xdb,0x0a,0xc8,0x1d,0x39,0x0d,0x86,0xb6,0x1a,0xce,0x19,0xf7,0x20,0x5e,0xb6,0xe4,0xcc,0x06,0xaf,0x66,0xf3,0x19,0x23,0x5d,0xec,0x11,0x80,0x67,0x40,0x9f,0xcc,0xa5,0x89,0xe3,0xd6,0x06,0xd1,0x40,0xc9,0xf5,0x9d,0xa7,0xa2,0x3e,0x08,0x7a,0xef,0x8b,0xff,0x09,0x6f,0xd0,0x23,0x73,0x2c,0x46,0xd4,0x73,0x9e,0x69,0xcc,0x05 .byte 0x27,0x3d,0x8a,0x22,0x9d,0x92,0x84,0x40,0x07,0x81,0x65,0x03,0x6a,0x59,0xe9,0x57,0x4c,0x93,0x1a,0xaf,0xc2,0x12,0x7d,0x23,0x1a,0xd8,0xad,0xcb,0x51,0x8b,0xce,0x28,0xc5,0x8e,0xb8,0xab,0xa4,0x50,0xc3,0xe7,0xb9,0x8f,0xc3,0x99,0xc2,0x7b,0x86,0x9f,0xb3,0x4e,0x4d,0x14,0x66,0xe4,0xdf,0x40,0xdf,0xd8,0xdd,0x05,0x9f,0x96,0x3b,0x7e .byte 0x9f,0x72,0xc9,0x11,0x98,0x73,0x40,0x72,0x2e,0xbc,0x2c,0xc7,0x0c,0x70,0xcf,0xbc,0x3c,0x25,0x43,0xec,0x36,0x5f,0xb9,0x80,0x19,0x79,0xd3,0x29,0x6e,0xe8,0x35,0x0b,0x1a,0x75,0xfa,0x4a,0x08,0xda,0xaf,0x1d,0xb5,0x06,0x6b,0x44,0xe4,0xde,0xe7,0x16,0x59,0xe5,0xad,0x23,0xc1,0x8e,0x87,0x27,0x03,0xc2,0xad,0x20,0xf7,0xdd,0x05,0x39 .byte 0x16,0xc8,0x6b,0x32,0x99,0x8b,0x39,0xb4,0x6e,0x16,0xa5,0x4e,0x5d,0xe1,0xf0,0x91,0xf2,0xfd,0x5e,0xbf,0x0a,0xf7,0x33,0x82,0xaf,0x8a,0xaa,0x99,0xac,0x24,0xdf,0x43,0x84,0x8f,0x82,0x56,0x8a,0xae,0xbd,0x2e,0x5b,0x1b,0x95,0x0f,0xc1,0x7c,0xa1,0x4e,0xda,0x11,0x21,0x0c,0x7e,0xa2,0x5b,0x30,0x89,0xbb,0x52,0x4a,0x8d,0x9f,0x95,0xd9 .byte 0x0e,0x6b,0x74,0xb4,0x0b,0x2a,0x37,0x21,0x9e,0xb6,0x00,0x9f,0x09,0x71,0xf8,0xd2,0x98,0x47,0x65,0x33,0x88,0x16,0x6b,0x5a,0x61,0x8c,0xdf,0x4d,0xbe,0xb0,0xde,0xc9,0x35,0xa3,0xa8,0x9f,0xf6,0xe7,0x93,0x29,0x29,0x66,0x43,0x5e,0xcc,0x1e,0x8b,0xf7,0x8d,0x3c,0xc2,0xfa,0x52,0xfc,0x44,0x71,0x02,0xfc,0x54,0x74,0xc2,0x10,0x84,0xc1 .byte 0xfb,0xd0,0x65,0x05,0x5c,0x16,0xd3,0x65,0x1a,0x8c,0xae,0x45,0xb8,0x70,0x8a,0x27,0x66,0xaf,0x7f,0x6b,0xcf,0x71,0x33,0x14,0xdd,0xe4,0xd7,0xdf,0x81,0xcb,0xd5,0x6b,0x67,0x82,0x52,0x6c,0xbc,0xb7,0xd8,0x19,0x24,0x74,0xdd,0x7f,0x06,0x04,0x76,0x36,0x5a,0x63,0x9e,0x6e,0x36,0xc3,0xc6,0xa7,0x4c,0xa8,0x1b,0x6c,0x45,0x14,0x4d,0x6e .byte 0x62,0x88,0x27,0x6e,0xb8,0x00,0x11,0x93,0x6a,0xee,0xa6,0xcf,0xcb,0x6b,0x6a,0x2d,0x67,0x32,0x61,0x0b,0xea,0xb6,0xfd,0x9a,0x4a,0x34,0x02,0x79,0x80,0x0c,0x3d,0x3f,0x69,0x9f,0xb5,0xcf,0xda,0x6a,0xdf,0x4d,0xba,0xf4,0x63,0xf3,0x4f,0xc0,0x86,0x1c,0x41,0x3b,0xd6,0x43,0x35,0x1b,0xee,0xfc,0xac,0x6c,0x27,0x94,0xa9,0x98,0xe3,0x07 .byte 0x83,0xb2,0x19,0x9e,0x75,0x84,0x1f,0x70,0xe0,0x3c,0x49,0x77,0x82,0xb5,0xc0,0x52,0x80,0x06,0xce,0xb7,0x1c,0x9b,0x08,0x47,0x5e,0x7f,0xe1,0x8e,0x90,0x4f,0x29,0xdc,0x50,0xbd,0x0e,0x64,0xfb,0x93,0xa6,0x5e,0x6d,0xa4,0x2d,0x36,0xf2,0xe1,0x65,0xed,0x13,0xbe,0xf4,0x8c,0x46,0x3b,0x24,0x96,0xaf,0x47,0xe1,0x13,0xe1,0x7b,0x4c,0xf7 .byte 0x7d,0x8c,0x1c,0x41,0x6e,0xa7,0xcd,0x1e,0x0a,0x5c,0x44,0xc0,0xf7,0x1d,0x53,0xff,0x1f,0xe4,0x64,0x92,0xa7,0xe4,0x68,0x7b,0xaa,0xb0,0x76,0x88,0x21,0x1d,0x43,0x9b,0x9d,0x7c,0xdb,0x6e,0x91,0x90,0xd6,0xbe,0x9a,0xb8,0x2b,0x8e,0x73,0xe9,0x07,0x09,0x2f,0x85,0x7d,0x63,0x75,0x25,0x1d,0xb5,0x39,0xbc,0x1e,0x27,0xd7,0xf8,0x40,0xda .byte 0xe5,0x45,0xb5,0x02,0x9c,0x7e,0x0a,0x4b,0x5e,0xb5,0x88,0xbb,0x86,0x3a,0x35,0xb8,0xb9,0x0b,0x39,0x85,0xbd,0x18,0xb7,0x58,0xcd,0x6b,0xdc,0x25,0x86,0xee,0x17,0x9d,0x3d,0xd8,0xb4,0x33,0x09,0x1c,0x57,0x52,0x7c,0x0e,0xb3,0x61,0x07,0x5c,0xea,0xf5,0x05,0x1b,0x43,0x20,0x14,0x87,0x15,0xfb,0x9c,0x3f,0x0d,0xa9,0xfc,0xf6,0xa7,0x66 .byte 0x46,0x54,0x8c,0x2c,0x2d,0x22,0x72,0x8f,0x2d,0x00,0x1d,0x1b,0x0c,0x84,0xb4,0x21,0xd6,0x3f,0x3d,0x5f,0xfd,0x22,0xe3,0xd7,0x72,0xa7,0xd1,0x98,0x7f,0x53,0xf0,0xcf,0x6b,0xb9,0xe4,0x40,0x1c,0x23,0x94,0xa9,0x8e,0x9f,0x00,0x0e,0x65,0x59,0x2a,0xcf,0x2d,0xb6,0x15,0xa8,0x97,0x9a,0x75,0xac,0x88,0xf7,0xe7,0xe4,0x1e,0x56,0x38,0xc7 .byte 0xb7,0x68,0xaf,0x15,0x48,0x9c,0xa6,0xca,0x3e,0x67,0x11,0xca,0x7f,0x3a,0x9c,0xc7,0x1a,0xff,0xcc,0x10,0x10,0x67,0x5f,0x62,0x72,0xca,0xd8,0xf2,0x4b,0x7a,0xc5,0xf0,0xc9,0x40,0x45,0xc9,0xe4,0xef,0x50,0x18,0xf8,0x38,0xca,0x93,0x68,0x74,0xdb,0x3e,0x92,0x77,0xf6,0xc1,0x81,0x33,0xaf,0x6f,0x62,0xb3,0x5e,0x67,0x66,0xca,0x53,0xe5 .byte 0xc2,0x37,0x4e,0x97,0xa8,0xac,0x5e,0xf5,0x36,0x48,0xa5,0xb4,0x9e,0x07,0x38,0x7b,0x2a,0xb5,0xb6,0x3c,0xc6,0x04,0x90,0x38,0x52,0x07,0xc3,0x26,0xd2,0x08,0x55,0x6f,0x7d,0xda,0x53,0xf2,0x3e,0x09,0xa7,0x3e,0xe6,0x6b,0x31,0x72,0xc3,0xcb,0x30,0x3a,0x5b,0x0e,0xca,0x4c,0x94,0x7e,0x18,0x27,0xe3,0xb2,0x40,0x7b,0x68,0xa2,0xa7,0x2b .byte 0x80,0xf1,0x36,0xc9,0xb0,0x52,0x71,0x59,0x1c,0x41,0xcd,0xe9,0x4b,0x3a,0x89,0x9e,0xc4,0x5c,0x0c,0xfe,0x96,0x02,0xbd,0x3c,0xbd,0xe9,0xf1,0x78,0xe3,0x89,0xab,0xe3,0x7d,0x8b,0xc8,0xc6,0x40,0x2c,0xd5,0xfe,0xc9,0x02,0x1a,0x69,0x72,0x50,0x49,0x16,0x8a,0x9a,0x79,0x25,0x69,0x84,0xc7,0xc0,0xae,0xd1,0x7d,0xd0,0x28,0x88,0x12,0xee .byte 0x22,0x86,0xec,0xea,0xe2,0x74,0x19,0xae,0x54,0x78,0xd1,0xc1,0x64,0x90,0x04,0x6f,0x0a,0xa3,0x60,0x14,0x63,0xe3,0x6a,0xed,0x7e,0xd5,0x36,0x0a,0x3c,0x72,0x2c,0xde,0xbd,0x01,0xff,0x22,0xe8,0x4c,0x55,0xbf,0xa6,0x24,0x18,0xbe,0x23,0x12,0xfa,0x91,0x30,0xa6,0x09,0xcd,0xc2,0x43,0x59,0x0c,0xab,0xc0,0x99,0x20,0xf1,0xbc,0x5e,0xab .byte 0x72,0x85,0x72,0x2f,0x1c,0x21,0xcc,0x38,0xa3,0xa2,0xbe,0x40,0x70,0xf1,0x80,0x4d,0x18,0x1d,0xb4,0x61,0x84,0x19,0xc1,0xd0,0xcd,0xae,0xa8,0x74,0x46,0xe3,0x4e,0x0e,0x54,0xc6,0xc3,0x80,0x17,0x32,0x62,0x80,0x9a,0x8c,0x7a,0x7b,0x94,0xb2,0x1a,0xa4,0xa5,0xcc,0x65,0x46,0xa9,0xe6,0x62,0xf7,0x04,0x43,0x75,0x0e,0x48,0xf6,0xdb,0xc7 .byte 0xad,0x2f,0xad,0x0c,0x19,0xce,0xe6,0x03,0xcf,0x9b,0x33,0x99,0x90,0x8a,0x5f,0xf0,0x84,0xe6,0xe9,0xda,0xaa,0x6f,0x45,0xdc,0xab,0x9e,0xc6,0xd8,0x6f,0xc4,0xa2,0xea,0x17,0x8f,0xa7,0x0c,0xbf,0x79,0x2e,0x06,0xa7,0x84,0x41,0x80,0x85,0x25,0xdc,0x40,0xf9,0x11,0x45,0xfb,0x6d,0x43,0x3c,0x84,0x64,0xf4,0xa2,0xdc,0xa3,0x0d,0xa1,0x0a .byte 0x49,0x34,0x10,0x63,0x3a,0xef,0xe7,0x08,0xe9,0xf4,0xff,0x0e,0x2d,0x3b,0xf6,0xa7,0x62,0x8e,0xe5,0x61,0x32,0x3d,0xaa,0x01,0xd0,0xa3,0x54,0xf1,0xdf,0x1f,0x8a,0x58,0xfd,0x2d,0x81,0x8b,0x3b,0xe8,0x95,0x2e,0x92,0x58,0x5c,0x23,0x95,0x29,0xe7,0x3c,0x3c,0x09,0xbb,0xdc,0x55,0x37,0xf4,0xa6,0x14,0xc8,0xff,0x6b,0xff,0x17,0xb8,0x81 .byte 0xf7,0xa1,0x96,0xb6,0xd0,0xea,0x35,0x1b,0x3e,0x81,0xf4,0xf2,0x88,0x03,0x97,0xbf,0x1d,0x06,0xa1,0xa4,0xa9,0x9f,0x81,0xa3,0x36,0x3a,0x58,0x2c,0x9d,0x5c,0x44,0xcb,0x10,0x5e,0xa6,0x62,0x3e,0xb6,0xf9,0x1d,0x24,0xa4,0xb8,0xb8,0xa7,0x13,0x14,0x1f,0xab,0x29,0x64,0xaf,0xa8,0x48,0xa4,0xc9,0x31,0xb7,0x1d,0xb2,0xd0,0x88,0xe1,0x14 .byte 0x87,0x26,0x65,0x47,0x61,0x4e,0xd2,0xf1,0x48,0x32,0x06,0xb4,0x39,0x49,0xed,0x68,0xa8,0x71,0x83,0xfd,0x77,0xdf,0x69,0x88,0x36,0x34,0x4a,0x11,0xfd,0xa0,0x11,0x87,0xe4,0xe7,0x02,0x52,0x34,0xfe,0xfe,0x77,0xbf,0x21,0x33,0x77,0x4d,0x85,0x57,0xd6,0xbb,0x07,0xdc,0x63,0xb1,0x53,0xc4,0x9f,0x7c,0x05,0x6f,0x23,0xe8,0xb7,0x49,0x1e .byte 0xd9,0xdb,0xc7,0xff,0x99,0x2a,0xc1,0xef,0x93,0x09,0x3c,0x13,0xf7,0x49,0xdb,0x72,0x16,0x68,0xb2,0x37,0x39,0x43,0x43,0x4a,0x75,0xdb,0x77,0x3a,0x7c,0x8f,0x6f,0xe1,0x47,0x65,0xbe,0xe7,0x3e,0xec,0xf8,0xe9,0xff,0x6b,0x71,0x7c,0x3b,0x56,0x57,0xea,0x9e,0x51,0x13,0xe3,0xdc,0x59,0xa1,0x81,0x84,0xd0,0xfc,0x12,0xf4,0x2e,0x2b,0xba .byte 0xed,0xb9,0x13,0x76,0x63,0xee,0x42,0x6f,0x74,0x71,0x06,0x26,0x7a,0x03,0x39,0x5f,0xb1,0x54,0x6a,0xf9,0xf0,0xdf,0x8f,0x9f,0xca,0x58,0x5e,0x4d,0x72,0xa8,0x76,0x2f,0xa1,0x9e,0xa3,0x0f,0x73,0x31,0x8c,0xe8,0x90,0x53,0xd6,0x2b,0xa1,0x35,0xd9,0x6a,0xae,0x56,0x5f,0xd4,0xfc,0x9b,0xae,0x1d,0xdc,0x21,0x50,0x39,0x7c,0xfe,0xd2,0x80 .byte 0x7b,0x9e,0x20,0xde,0x30,0x79,0x5c,0xc6,0x8d,0x10,0xb4,0xb1,0x3c,0xf0,0x1d,0x48,0x6f,0x0f,0x2d,0xd7,0x0a,0x2f,0x62,0x1f,0xdc,0x24,0x7b,0x8b,0xe8,0xf2,0xb4,0x3f,0xd5,0xb3,0x69,0x87,0x65,0x38,0xff,0x63,0xc2,0xb0,0xc8,0x50,0x8f,0x1c,0x17,0xaa,0xd7,0x0f,0x14,0x27,0xb2,0xc5,0xf7,0xe0,0x18,0x9c,0x35,0xa7,0xe0,0xf9,0xad,0x74 .byte 0xec,0xe0,0x0c,0xda,0x79,0x7f,0x58,0xa3,0xb9,0x07,0x76,0x1e,0x64,0x20,0x99,0x17,0x32,0xfd,0xe7,0x6a,0xd9,0xcb,0x7b,0x2f,0xd8,0x57,0xd4,0xfa,0x4e,0x3a,0xbc,0x0b,0xdd,0x90,0x04,0xdb,0x3d,0xc9,0x8a,0xb0,0x6a,0x72,0x42,0xff,0x0c,0x08,0x88,0xfc,0xa4,0x59,0x07,0x2a,0x32,0x2f,0x02,0xb1,0x78,0x13,0x1b,0x05,0x38,0x73,0xa5,0xf1 .byte 0x98,0xee,0xd4,0x1f,0x83,0x63,0x90,0x9c,0x74,0xa5,0x3d,0x7d,0x32,0x29,0x08,0xa4,0x01,0x8a,0xc7,0x26,0x86,0x85,0xd2,0xa1,0x0b,0xaf,0x92,0x0a,0x28,0x8b,0x5f,0x90,0x99,0x56,0xec,0xe8,0x9b,0x0e,0x9a,0x4d,0xc2,0xdc,0xf4,0x27,0x04,0x1b,0xc5,0xe8,0x6d,0xa6,0x1f,0x94,0xa7,0xd1,0xbe,0xf7,0xe9,0xc0,0x39,0x0a,0x85,0xa4,0xbf,0x30 .byte 0x43,0x4b,0xf8,0x28,0x6d,0x6d,0xb9,0xa2,0x7f,0x64,0x0d,0x04,0x8b,0xd3,0xc5,0xab,0xe9,0xb0,0xa1,0x4c,0x85,0xe6,0x3d,0x3e,0x37,0xad,0x3e,0x27,0x72,0xaf,0x60,0x5a,0xd3,0xa3,0xf0,0x6a,0x67,0xfb,0xda,0xc5,0x41,0x81,0x2e,0xcb,0x75,0x00,0xf7,0xdf,0xf5,0xef,0x19,0x03,0x81,0x4f,0x70,0xc9,0xa4,0x40,0xbf,0xeb,0x39,0xff,0x14,0xf5 .byte 0xaf,0xcf,0x21,0x77,0x65,0x4e,0x96,0xf6,0xb3,0x9c,0x9a,0xb9,0xfe,0xe3,0x37,0x3f,0xf8,0x6e,0xc5,0x51,0x3f,0xd0,0xfa,0xef,0x7c,0x07,0x72,0xb6,0xca,0xcb,0xf8,0x20,0x94,0x74,0x8c,0xe9,0x0d,0x6b,0xfb,0x98,0x0a,0xec,0x90,0x05,0x33,0xc4,0x7d,0xfc,0x7b,0x95,0xd9,0xc3,0x67,0x0b,0xd7,0xdd,0xd8,0x67,0x3c,0xf1,0x84,0xf4,0x51,0x78 .byte 0x29,0xff,0x51,0x86,0xc8,0x84,0x6e,0x31,0x3c,0x6d,0xaf,0x8b,0xe0,0x2d,0xb0,0xc7,0xf5,0x19,0x87,0xe6,0x76,0xc7,0x5b,0xb7,0xd3,0xe0,0xb6,0x4c,0x65,0x95,0x74,0xaf,0x6e,0x5f,0x9c,0x67,0x98,0x1f,0x7c,0xec,0xd5,0xf8,0x47,0x24,0x1d,0x95,0xbf,0x95,0x6e,0x64,0x89,0xad,0x42,0x0a,0xe5,0x7f,0xc0,0x2e,0xc5,0x93,0xc2,0x06,0x20,0xe7 .byte 0xc2,0x3e,0x04,0x51,0x3b,0x61,0xce,0xda,0x84,0x95,0xba,0x59,0x2b,0x88,0x21,0x68,0xed,0x64,0xd7,0x13,0xb7,0x1b,0x5c,0xa2,0xbd,0xa6,0xd4,0x38,0x68,0xf3,0xd8,0x66,0x29,0x51,0x88,0x02,0xc7,0x87,0xa6,0x5b,0x29,0x5b,0x8e,0xb8,0xbf,0xff,0xc7,0x8c,0x98,0xe7,0xc5,0xc2,0x93,0x6a,0xc0,0xb4,0x04,0x8f,0x1a,0x2d,0xd4,0xea,0x1f,0x2a .byte 0xfd,0xf3,0x30,0x50,0xda,0xbe,0x81,0x0a,0x76,0xad,0x73,0xfc,0xd1,0x7d,0x06,0x58,0xeb,0x77,0x55,0x3c,0x8e,0xef,0x25,0x4d,0x78,0x0e,0xda,0x00,0x8c,0x8b,0x94,0xed,0x65,0x3d,0x51,0xbe,0xd2,0xa0,0x3d,0x8c,0xde,0x2e,0xd0,0xe5,0x8b,0x7c,0x1f,0x15,0x35,0x27,0xe4,0x62,0xa5,0xcb,0x40,0x29,0x63,0x51,0x35,0xbe,0x6b,0x0c,0xec,0xdd .byte 0xb8,0x35,0x89,0x03,0xdf,0x50,0x85,0xbc,0x93,0x34,0x83,0x65,0x7b,0xfc,0x34,0x7a,0x72,0x90,0x44,0xec,0x3e,0x6b,0xda,0x65,0x6a,0xaf,0x90,0xe3,0xcc,0x86,0xb4,0x1e,0x26,0x68,0x34,0x91,0xfd,0xcb,0x5d,0xac,0x04,0xff,0xdd,0x7a,0xe4,0x5c,0xd7,0x05,0x7b,0x4c,0xbc,0x26,0x31,0xb9,0xbc,0x9b,0xd0,0x0b,0x1e,0x1b,0x4b,0x0a,0x25,0x58 .byte 0x9b,0x11,0x66,0x16,0x07,0x15,0xd1,0x3a,0x68,0xfc,0xdb,0x88,0xcc,0x91,0x4b,0x2e,0xd7,0xe6,0x9d,0x13,0x3c,0x8c,0x0c,0x35,0x4d,0xc9,0xfc,0xc7,0xb6,0x7e,0xaf,0x02,0x7c,0xd4,0x8c,0xf9,0xf4,0x63,0x87,0x2f,0x0a,0xd1,0xf7,0x1f,0xd9,0xa8,0xd6,0x5c,0x1e,0xee,0xe7,0xb6,0x3b,0xa2,0x93,0x9e,0xa7,0x5b,0x66,0x38,0xb6,0xd3,0x39,0x6a .byte 0xb7,0xc4,0x34,0xf1,0x5d,0x50,0x45,0x32,0x59,0x90,0x5b,0x05,0xd8,0xed,0x6d,0x01,0xdb,0x1f,0x37,0x59,0x1b,0x42,0xc2,0x4c,0xc4,0x32,0xa1,0xc4,0xdf,0xa0,0x45,0x64,0x33,0x26,0x9b,0x6a,0x91,0x5f,0x8f,0x9a,0x21,0x8b,0xdc,0xed,0x5c,0xbb,0xcc,0xdc,0x75,0x21,0x14,0xbc,0x49,0x1a,0x3a,0xc7,0x5f,0xba,0x11,0xae,0x37,0x3f,0x9f,0x66 .byte 0xd4,0xf9,0x25,0xb6,0x7b,0xa8,0x85,0x9b,0x27,0x6a,0x3b,0xcc,0x87,0x72,0xa1,0xf1,0x41,0x15,0x98,0x37,0xea,0x63,0xb9,0xd3,0x44,0x81,0x26,0xec,0x7a,0xaa,0x5b,0xe9,0xe1,0xe1,0xd3,0x6b,0x31,0x38,0x7f,0xc4,0xd3,0xb1,0xcf,0xc8,0x61,0x70,0x49,0xe1,0xac,0x08,0xd3,0x64,0x4a,0xbc,0x1a,0xe4,0x76,0xa5,0xf1,0x12,0x42,0xbb,0x97,0x52 .byte 0x7d,0xf0,0x42,0xbb,0xc0,0x1c,0xda,0x40,0x04,0x98,0xa9,0x3f,0x0e,0xf2,0x6d,0x82,0x8e,0x52,0x7c,0xc1,0x91,0x54,0xe8,0xc0,0x69,0x09,0x25,0xc1,0xe8,0xea,0x57,0x8c,0x76,0x55,0x03,0xfc,0x39,0x1f,0x90,0x6b,0xb9,0x98,0xc3,0xc1,0x73,0x4f,0x4e,0xbf,0xc5,0x64,0x95,0x1e,0xba,0x7e,0x73,0x51,0x22,0xee,0x24,0xce,0x12,0x66,0x3e,0x84 .byte 0x4a,0x27,0x2e,0x45,0xc6,0x3d,0x4a,0x3a,0xbe,0xf9,0xb6,0x14,0x0a,0xf0,0xa5,0x94,0x14,0x69,0x2d,0x25,0x7d,0x60,0x9b,0x77,0x79,0xc5,0xd2,0xfd,0x1f,0x66,0xc5,0xad,0x99,0x7f,0x42,0x08,0xe2,0xc6,0x40,0xa8,0x8c,0x07,0xd2,0xa9,0x10,0x30,0x8d,0x80,0x4c,0x41,0xc5,0x42,0x67,0x09,0xbe,0x60,0xbf,0x0d,0xba,0x94,0x4f,0xb0,0x78,0xed .byte 0x60,0x91,0x26,0x99,0x9a,0x50,0x30,0x65,0xe3,0xa4,0x7b,0x76,0x32,0x85,0x29,0xeb,0x47,0x17,0x88,0xd4,0x05,0xf5,0xd9,0x6a,0xec,0x90,0x44,0x40,0x06,0xc7,0x77,0x45,0x9c,0x17,0xf8,0x25,0xcd,0x0f,0xeb,0xb3,0xcc,0x78,0x09,0x98,0xc5,0x68,0xb4,0xd8,0x9d,0x35,0xa6,0x33,0xf3,0xdd,0xee,0x8a,0xb5,0x3c,0x93,0xee,0x08,0xcf,0x1d,0xd1 .byte 0xf1,0x96,0x81,0xc0,0x3a,0xa1,0x5a,0x2b,0x69,0x6d,0x6a,0x4d,0x8d,0x5a,0xed,0xb3,0xd1,0x7a,0x29,0x99,0xa2,0x65,0x05,0x33,0x95,0xd8,0x2e,0xd8,0x73,0x3b,0x4e,0xc2,0x94,0x80,0x77,0x34,0xcb,0x0b,0x92,0x01,0x1e,0xaa,0x2b,0x1d,0xe6,0x03,0xc0,0xb4,0xb7,0x1f,0xed,0xf1,0x4b,0xb2,0x82,0x65,0x13,0x9a,0x9e,0x35,0x8d,0xe5,0xb8,0xb0 .byte 0xc8,0x93,0x04,0x1e,0x83,0xbb,0xcb,0x91,0x2b,0x8d,0x18,0x22,0xd0,0x73,0x4f,0xae,0x54,0x5f,0x8a,0x20,0x4a,0xa5,0x98,0x9e,0x37,0x68,0x5d,0xcc,0x41,0x86,0x2d,0xb3,0xe5,0x09,0xdb,0xbd,0xa1,0x27,0xbf,0x7a,0x69,0x05,0xb4,0xf2,0x06,0x11,0x80,0x57,0xbd,0x92,0xed,0xb5,0x26,0x3a,0x1a,0xea,0x70,0x99,0x04,0x90,0x07,0x4e,0xa7,0xc2 .byte 0x78,0x49,0x70,0x80,0x97,0x10,0xb8,0xd7,0x45,0x8a,0x23,0x99,0x80,0xa3,0x1c,0x66,0x26,0xdb,0xdc,0x82,0x3a,0x09,0x0c,0x1e,0x61,0x78,0x70,0x68,0x81,0x85,0x91,0x82,0x68,0x8e,0xed,0xeb,0xad,0xd1,0x6b,0xe7,0x52,0x29,0xca,0x5f,0x3c,0xd3,0x55,0xeb,0x11,0x19,0x99,0xe0,0xf0,0x33,0xdc,0x9f,0x53,0x52,0xeb,0xda,0xfd,0x35,0x89,0xc3 .byte 0xc8,0xa6,0x7c,0xd2,0xf3,0xab,0x8b,0xe1,0xbf,0xca,0xa7,0x24,0xd2,0xd4,0xa2,0xa5,0x94,0x2a,0x9e,0x90,0x82,0xb4,0xcd,0x9f,0xe8,0x1e,0x70,0xdb,0x67,0x60,0xb8,0x2b,0x3d,0x74,0x25,0x5c,0xd6,0xbd,0xc2,0x92,0xfb,0xdd,0x3f,0x1d,0x24,0xa0,0xbd,0xbe,0x42,0xc6,0x78,0xde,0xf7,0xa0,0x1a,0x6a,0x6a,0xd0,0x05,0xcc,0xec,0xf0,0x4c,0xa9 .byte 0x52,0x68,0xb0,0x41,0x7e,0xd8,0x73,0xf0,0x45,0x65,0xa4,0x6e,0xf1,0x9c,0xdc,0xa8,0x22,0x7f,0x50,0x67,0xb8,0x90,0xd5,0x1b,0x57,0x36,0x4d,0x16,0x98,0xf3,0xef,0x03,0xd7,0x76,0x31,0x1b,0xd3,0x22,0x56,0x30,0xda,0xaf,0x72,0xa8,0xf1,0xa4,0x88,0xee,0xfd,0x0b,0x46,0x26,0x9b,0x37,0xa2,0xc6,0x1d,0x42,0xb1,0x86,0xe3,0xef,0xaf,0xe6 .byte 0xfb,0xc9,0x90,0xbe,0x58,0xe1,0xea,0xe1,0xa6,0xd3,0xc0,0xf2,0xf3,0x31,0x09,0xc0,0x73,0x04,0xfb,0x96,0x53,0xb2,0xd5,0xb2,0x4a,0xeb,0xd2,0x7d,0xd3,0xcb,0x49,0xba,0xbd,0x1f,0xe6,0x00,0x16,0x84,0x4e,0xc0,0x63,0x00,0xe3,0xb5,0x47,0xa1,0x2c,0xda,0x72,0xb4,0x4b,0xc8,0x52,0x93,0x65,0x73,0xf0,0xce,0x84,0x6c,0x99,0xda,0x0a,0x00 .byte 0x06,0x60,0xa2,0x9d,0x95,0xe0,0x44,0x05,0x02,0x57,0x65,0x5a,0xa7,0x4f,0x9d,0x3c,0x9f,0x58,0xbd,0x5e,0x70,0x05,0xaa,0x05,0x14,0xb0,0x10,0xe4,0x6f,0xfa,0xd6,0xff,0xde,0x5f,0x1b,0x71,0x3e,0x0c,0x75,0x20,0xd4,0xe3,0xfc,0x3b,0xc0,0x0d,0xb0,0xad,0x64,0xea,0x46,0x38,0x0a,0x93,0xf4,0xcb,0x5b,0x16,0xd4,0x17,0xbe,0x69,0x13,0x6e .byte 0xe8,0x1d,0x6d,0xb0,0x2b,0x51,0xae,0x66,0xbb,0xf2,0xda,0x0a,0xea,0x21,0xba,0x01,0x41,0x51,0x00,0xe4,0x1a,0x72,0xf7,0x11,0xdf,0xc4,0x6d,0x9f,0x82,0xb6,0xde,0x3b,0xaa,0x32,0x8b,0x52,0x09,0x25,0x9d,0x84,0xc7,0xc2,0xa9,0xe4,0x8e,0x09,0x8f,0x38,0xf9,0x83,0xe7,0xa6,0xf2,0x88,0xbb,0x94,0x80,0xa1,0xce,0x7f,0x8e,0x91,0xfd,0xcb .byte 0xae,0xf2,0x71,0x57,0xa9,0x22,0x82,0xe2,0xb6,0xc8,0x08,0x7b,0x9b,0x85,0x7f,0x51,0x2b,0x03,0xd0,0x94,0x2d,0x2f,0x89,0xef,0x91,0xaa,0x0d,0xde,0xcc,0x0d,0xe9,0xb8,0x6f,0xed,0xed,0x0d,0x43,0x41,0x9c,0x3b,0x6b,0x52,0x41,0x09,0x49,0xad,0xff,0xd7,0x93,0x15,0x2e,0xae,0x54,0x07,0x42,0x13,0x59,0xe6,0xed,0x3a,0x68,0x42,0x1e,0x4b .byte 0xe8,0x5c,0xe3,0xa8,0x4f,0x1c,0x0e,0x7a,0xc8,0x62,0x5f,0x53,0x04,0x3c,0x86,0x3b,0xf7,0x8d,0x64,0xf6,0x1e,0x11,0x83,0x02,0x44,0xaa,0xf4,0xaa,0x5a,0xc8,0x57,0x98,0xd9,0xc2,0xc5,0xd7,0x06,0xc2,0xe7,0x56,0x9f,0xcd,0xa3,0x4a,0x8c,0xc1,0xb2,0xa3,0xc6,0x9f,0xd3,0x6c,0x4b,0x38,0xfd,0x23,0x98,0x42,0x78,0xca,0xd8,0x6c,0xfa,0x08 .byte 0xb8,0x87,0x0e,0x34,0x9b,0xc5,0xe1,0x15,0x98,0xf7,0x06,0xd3,0xc7,0x25,0xe4,0x0d,0x44,0x2a,0xe4,0xdb,0x45,0xae,0x41,0x80,0xac,0x15,0x45,0x16,0x51,0x59,0xe5,0x98,0x68,0xbd,0x9d,0x0d,0x96,0x42,0xbb,0xb5,0x48,0x67,0x7c,0x79,0x3d,0xee,0x73,0xe6,0x4f,0x87,0xd5,0x34,0x91,0xdb,0x0e,0x7b,0xdb,0x2d,0xb5,0xea,0x5d,0xe3,0xf7,0x64 .byte 0x47,0x41,0x95,0x75,0x3a,0x61,0x87,0x87,0xc6,0x51,0xeb,0x50,0xee,0x25,0x8d,0xc0,0xc5,0xb6,0x6f,0x67,0xca,0x45,0xb9,0xe0,0xad,0x2d,0x0c,0xe2,0x80,0xc2,0xf6,0xef,0xb7,0xa9,0xe3,0x44,0x76,0xe9,0x10,0x6f,0xc3,0x42,0xf5,0xa0,0x7b,0x15,0xd4,0x0f,0xde,0x72,0x1e,0x10,0x95,0xa0,0x03,0xbe,0x80,0xb0,0x24,0x06,0x84,0x24,0x1b,0x90 .byte 0x8d,0xe5,0xb7,0xa9,0xab,0x69,0xdf,0x4a,0xf4,0x69,0x63,0x6a,0x9b,0x19,0x6d,0x47,0xe9,0xd1,0xe6,0xcd,0x2c,0xff,0x5b,0xf9,0x73,0xe8,0xd7,0xa3,0x3c,0xbd,0x42,0x47,0xf1,0xcf,0xf6,0xdd,0x58,0x09,0x81,0x7d,0x67,0x43,0x07,0x0d,0xb1,0x24,0x07,0xdf,0xc8,0x1d,0x0a,0xb3,0x97,0x37,0xef,0xc6,0x42,0xe9,0xf4,0x46,0xf6,0x35,0xfd,0x26 .byte 0x11,0x0c,0xea,0x2f,0x34,0x96,0xe3,0x64,0x1a,0xca,0xaa,0x40,0x71,0xbe,0x00,0x43,0xd3,0x15,0x79,0x87,0x6a,0x78,0xfe,0x8b,0x20,0xd3,0x10,0xde,0xb1,0x49,0xf5,0xc6,0x14,0x4a,0x41,0xd0,0xf3,0xf1,0x61,0x00,0x0a,0xd6,0xf7,0x68,0x09,0x70,0xe9,0xd3,0xd2,0xf6,0x3c,0x0b,0x62,0x71,0xa4,0xd5,0x9d,0xfe,0xa1,0x7e,0x0c,0x52,0x44,0x1c .byte 0x4f,0x5d,0x11,0x20,0xa1,0x9c,0x35,0x10,0xc1,0xab,0x22,0x94,0x95,0xe5,0xac,0x92,0x30,0x4b,0x59,0x30,0x33,0xbb,0x36,0xd0,0xd6,0xde,0x6b,0x89,0x58,0x25,0xbb,0x20,0x86,0x00,0x24,0x40,0x79,0x53,0xea,0x73,0xb1,0xa3,0x05,0x0f,0x88,0xe8,0x35,0x19,0xd3,0xca,0x42,0x68,0xe0,0x5e,0x6f,0x1e,0xe2,0x75,0x9b,0x65,0xa7,0xf8,0x21,0x41 .byte 0x14,0x6e,0xf9,0xa5,0x28,0x12,0x8a,0xd4,0x75,0xfe,0x8d,0xef,0x0b,0x1f,0xd7,0x5e,0x9f,0x79,0xf9,0x8f,0xbb,0x78,0xf9,0xe6,0x5f,0x94,0x4b,0x5f,0xe7,0xdd,0xc9,0xa2,0x15,0x16,0xbf,0x47,0x45,0xd1,0x8c,0x05,0x59,0x7e,0xd9,0xf0,0x5a,0x70,0x52,0x01,0x72,0x90,0xef,0xe7,0x96,0xf5,0x0b,0xf3,0xa5,0x97,0xdc,0x3a,0xb8,0x9c,0x5c,0x57 .byte 0x34,0x65,0x35,0xfb,0xe1,0xde,0x62,0x45,0x08,0xc2,0xc5,0x8a,0x7a,0x88,0x66,0xdd,0x66,0xee,0xc6,0xc0,0xab,0xf7,0x7e,0x63,0x91,0x51,0xd9,0xe9,0x00,0xba,0x7e,0xfa,0x9e,0x61,0x5b,0xb8,0x18,0x67,0x15,0x02,0x3e,0xf2,0x73,0xd5,0x3e,0x71,0xc7,0x6f,0x8c,0x74,0x1c,0xd6,0xb6,0x1c,0xc1,0x27,0x67,0xae,0x96,0xc6,0x57,0x80,0x52,0x3c .byte 0x54,0x33,0xb5,0x14,0x05,0x68,0xe3,0x16,0x94,0xac,0x85,0x7a,0x57,0x76,0xe1,0xe5,0x49,0xe6,0xe0,0x56,0x5d,0xb2,0xf2,0x9e,0x01,0x7d,0x79,0xbe,0x83,0x9f,0x00,0x8a,0x69,0x68,0x8a,0xfd,0x5c,0x5d,0xea,0x87,0x1b,0x5f,0x55,0x36,0xf1,0x47,0xf3,0x5a,0x64,0xb2,0x13,0xd3,0xac,0x13,0xbb,0xfe,0xe3,0xb6,0x69,0xdf,0x25,0x1d,0x9e,0x00 .byte 0x90,0xc2,0x21,0x96,0x2f,0x0f,0x9f,0xe6,0x37,0x23,0xd6,0xe0,0x00,0xbc,0xa5,0xb0,0x01,0x54,0xbd,0x70,0xbb,0x53,0xd7,0x80,0x38,0x6b,0xc0,0xa8,0x50,0x64,0x1f,0x94,0xf0,0xb4,0x67,0x62,0x62,0xad,0x91,0x0a,0x1e,0x5b,0x15,0xa8,0x65,0xea,0x8a,0xaf,0xf0,0xe7,0x76,0xce,0x36,0x16,0x97,0xf8,0x1c,0x5c,0x90,0x04,0xa3,0xbe,0x5a,0x64 .byte 0x9f,0xd3,0x1d,0x7b,0x25,0x91,0x5b,0xbc,0xce,0xc3,0x15,0xf0,0x7f,0xe8,0xa2,0x6b,0x54,0xe4,0x61,0x88,0x18,0xee,0x5c,0x13,0xa8,0xae,0x16,0x94,0x48,0x1c,0x67,0x2c,0xc4,0x9f,0x5d,0x01,0x36,0x21,0x5f,0xf4,0x64,0x60,0x8e,0x1a,0xc5,0x61,0x18,0xea,0x44,0x6a,0xcc,0xd4,0xf2,0x2c,0xb0,0xa6,0x6b,0x54,0x3e,0xcd,0xa4,0x55,0x26,0x55 .byte 0x94,0xa1,0x26,0xc1,0xb1,0x81,0xa1,0xcb,0xbe,0x74,0x1b,0x64,0x5b,0x91,0x73,0x94,0xc8,0xaa,0xfa,0xc0,0x22,0xc5,0xb0,0xc6,0x59,0x23,0xb2,0x95,0x41,0x04,0x62,0x98,0x9c,0x3a,0x6a,0x78,0xd2,0xc0,0x74,0xbf,0x65,0x15,0xac,0x66,0x0c,0x84,0xa2,0x66,0xdf,0xf7,0x69,0xd5,0x8b,0x79,0x87,0x5a,0x77,0xa1,0xe8,0x43,0x5d,0x01,0x1b,0x13 .byte 0x2b,0x4e,0x69,0x5f,0x07,0xa4,0x3d,0xb7,0xc7,0xd0,0x6c,0xcc,0x2e,0xe0,0x87,0x9d,0x23,0xec,0x15,0xbe,0xe3,0xbe,0x53,0x21,0x2d,0x2e,0x22,0xa4,0x47,0x6e,0xff,0xc6,0x57,0xe6,0xe6,0x41,0xb3,0x08,0x02,0xa1,0x8c,0x6d,0xb1,0xd9,0x61,0xfe,0xc5,0x55,0xf5,0xf3,0xea,0x97,0x6d,0x7f,0xc7,0x36,0x6f,0x00,0xb7,0x80,0x9c,0xb3,0x04,0x55 .byte 0xf5,0xf8,0x29,0xae,0x88,0x46,0x4f,0x78,0xb5,0x81,0x59,0x4b,0x33,0x98,0x19,0x08,0xc2,0xce,0x61,0x0f,0x66,0x45,0x07,0x2f,0x73,0xbd,0x10,0xa6,0x32,0x3c,0xdf,0x3a,0xa5,0x07,0x6e,0xf8,0xa8,0x0d,0xb8,0xb2,0x78,0xd1,0x9f,0x50,0x9e,0x35,0x1a,0x6e,0xcb,0xd9,0x76,0x40,0xb9,0x48,0xa4,0x8f,0x91,0x52,0x66,0xa3,0xc5,0x4f,0x69,0x07 .byte 0xed,0xe0,0xd7,0xd8,0xc1,0x72,0x62,0x9a,0x52,0xbc,0x17,0x1e,0x26,0xdc,0x06,0xde,0xa2,0x04,0x4a,0x67,0x24,0x30,0xca,0xff,0x01,0x50,0x20,0xf1,0xfe,0xaf,0x70,0x8d,0xdf,0x86,0x0f,0x8e,0x94,0x92,0xa6,0x41,0x69,0x96,0x0f,0x20,0xd9,0xba,0xab,0x68,0x69,0x8a,0x7e,0x6f,0xda,0x48,0x7a,0xc8,0x53,0xb0,0x8f,0xe5,0x8f,0x6f,0x29,0xc2 .byte 0x72,0xf1,0x6f,0x7f,0x41,0x1f,0xd3,0x8f,0x66,0xe1,0x17,0xe1,0x91,0xd8,0x60,0x7f,0x52,0xf0,0x50,0xa5,0xcd,0xa1,0x92,0x9a,0x8f,0x45,0x0f,0x84,0x6a,0x95,0x25,0x7e,0x22,0x2d,0xb0,0x74,0x2c,0x60,0x62,0x69,0x17,0x8b,0x08,0x41,0x5c,0xbf,0x4f,0x5c,0x7b,0x99,0x21,0xe0,0xcd,0x26,0x24,0xf4,0x4f,0x72,0xbf,0x9a,0x80,0x13,0x4b,0xcf .byte 0x5a,0x60,0xd3,0x35,0x1c,0xf2,0x54,0xdd,0x99,0x12,0x8b,0xfa,0x6d,0xa2,0xf0,0xb3,0x02,0xac,0x1a,0xfc,0x2d,0xfe,0x35,0x5d,0x33,0xd4,0x41,0x2b,0x75,0xfb,0xbd,0x4a,0xd6,0x60,0x99,0xfb,0x8e,0xa5,0x4b,0x2a,0x38,0x6b,0x31,0x40,0xfe,0x38,0xc0,0xec,0xe1,0xf7,0x17,0x0b,0x13,0x61,0xda,0x9e,0x26,0xea,0x16,0x46,0x62,0x12,0xb6,0xa3 .byte 0x01,0x2d,0x40,0x84,0x9b,0x91,0x42,0xed,0x04,0x2a,0xd8,0x90,0xbd,0xc3,0x8f,0xb4,0xfb,0x6f,0xa3,0xb8,0x76,0x77,0xe0,0xe7,0xa6,0x99,0xde,0x16,0x8a,0x0a,0x84,0x12,0xc6,0xd6,0xea,0xfa,0x7d,0x81,0x39,0xff,0xb8,0x70,0xa5,0x7e,0xda,0x19,0x6e,0xb7,0x94,0x57,0xa9,0xa3,0xea,0xf2,0x77,0x49,0xf6,0xb4,0x82,0x1b,0x58,0xa7,0x65,0xdb .byte 0x27,0x00,0xb6,0x30,0xba,0x25,0xbe,0x07,0x5c,0x1a,0x66,0x4a,0xd3,0x5c,0xa2,0x31,0x4d,0x38,0xfe,0xf5,0xcb,0xef,0xa1,0x80,0xa0,0x53,0x8f,0x7b,0xae,0xe3,0xe0,0x2d,0x93,0x09,0xd0,0xc6,0x43,0x4d,0xe7,0x58,0x6c,0x45,0xa7,0x74,0x51,0xe9,0x57,0xd0,0xbf,0x11,0xcd,0x12,0x25,0xce,0x0c,0xaa,0xdd,0xa3,0xed,0x25,0x58,0xbb,0xdb,0x94 .byte 0x21,0x06,0x08,0x78,0x80,0x5f,0x14,0xc4,0x4f,0x25,0xb2,0xa1,0x8e,0x58,0x9d,0xc7,0x63,0xf0,0xef,0x66,0xc8,0x03,0x74,0x3a,0x3a,0xea,0x65,0x5a,0xb6,0x02,0x88,0xbc,0xbe,0x60,0x57,0xdf,0x5c,0x72,0xc6,0x06,0xbd,0x4b,0x9b,0x90,0x78,0xc1,0x97,0xdf,0xf4,0xa4,0xe7,0x75,0xed,0x3f,0xf6,0x4a,0x33,0x31,0xd7,0xed,0xa3,0x1f,0xb9,0x52 .byte 0x4e,0x59,0x03,0x66,0x89,0xee,0x9b,0xaa,0xfd,0x67,0xd0,0x3a,0xb4,0xfe,0x86,0xfe,0x14,0x7c,0x71,0x4a,0x2f,0xff,0x11,0x85,0x25,0x8e,0xc5,0x72,0xb9,0x8c,0x78,0x91,0x17,0x27,0xcf,0x0e,0xc0,0x46,0xaa,0x08,0x2d,0x49,0x84,0x4e,0xdf,0x9a,0xbc,0x50,0xa2,0x50,0x1f,0x52,0x0a,0x36,0x32,0x1f,0x1f,0x7d,0xf4,0x15,0x2b,0x01,0x34,0x50 .byte 0xa8,0xa3,0x98,0xa6,0xd0,0x44,0x20,0x44,0x55,0x8f,0xf0,0x99,0xc1,0xaf,0x0f,0x54,0xee,0xea,0xb8,0xb6,0xf4,0x14,0xdb,0x4f,0x9d,0x31,0x66,0x7d,0x08,0x92,0xfb,0x20,0xda,0x3e,0x6e,0xfe,0xb9,0x57,0x41,0x63,0xb8,0x10,0x8e,0x7c,0x12,0x01,0xa3,0x0b,0x0c,0x19,0xce,0x14,0xc7,0x13,0xc6,0x72,0xf6,0x6f,0x4d,0x8d,0x2b,0xaf,0x96,0x1c .byte 0xfc,0xcc,0x38,0x0b,0x7e,0xb7,0x44,0x1e,0x37,0xc6,0x2d,0x72,0xfb,0x20,0x40,0x07,0xa9,0x97,0xb3,0x17,0xc1,0x0a,0x65,0x75,0x57,0xda,0xc9,0xdc,0xcb,0x6a,0x3b,0xaa,0xd6,0x57,0x45,0xdb,0x22,0x9f,0x9c,0x0b,0x53,0xb3,0x08,0x9f,0xe3,0x79,0x0f,0xb1,0xa9,0x18,0xcc,0x96,0xf2,0xd0,0x8d,0xb0,0x4f,0x50,0x2d,0xec,0x03,0x26,0x8e,0x8b .byte 0xeb,0x9b,0x52,0xa5,0xfc,0x2e,0xcc,0xcf,0x7b,0x1b,0x11,0x44,0x01,0x71,0x8b,0x03,0x5d,0x08,0x56,0x67,0x3a,0xe0,0x9d,0xb5,0xec,0x3f,0xce,0x7d,0x0f,0xb3,0x2b,0x1f,0xcc,0x0e,0xba,0xa8,0x69,0x22,0xa7,0x14,0x8a,0x7b,0x7c,0xa8,0x81,0x62,0x03,0x9c,0x3d,0x1e,0x27,0x09,0x4f,0xda,0x8b,0x0f,0x71,0xbc,0x87,0x9b,0xa9,0x48,0xed,0xa0 .byte 0xf3,0x52,0xa1,0x4d,0xdd,0x57,0xa5,0x4f,0x38,0xdc,0x5a,0xd4,0x24,0x7a,0x9c,0x62,0xf3,0x51,0x54,0x28,0x1f,0xef,0x92,0x81,0x9c,0x80,0x1d,0xa3,0xe1,0xb8,0xb4,0xf4,0xb9,0xa1,0x43,0x27,0xc8,0x99,0x10,0x36,0x22,0xf8,0x7f,0x86,0xe2,0x5f,0x2f,0x21,0xe2,0x7e,0x16,0x9a,0xe7,0x29,0x3e,0x6b,0x03,0x32,0xcf,0x64,0x86,0xa1,0x8a,0x1e .byte 0xce,0x15,0x12,0x8c,0xa9,0x71,0x2e,0x96,0x2b,0x70,0x94,0x51,0xeb,0xf9,0x59,0xa0,0x69,0xa7,0x1a,0xec,0x21,0x8b,0xea,0xa6,0xd5,0x8b,0x60,0x17,0x51,0x88,0xe5,0x5f,0xf5,0xc5,0x6c,0x0f,0xf3,0x32,0xef,0xab,0x5f,0x25,0x14,0x36,0x61,0x41,0x7d,0x7c,0x94,0x3a,0x3f,0xa5,0xbb,0xf1,0x52,0x2a,0xd1,0x9b,0xbe,0x5e,0x93,0xa1,0x9d,0xd3 .byte 0xb7,0x19,0x7f,0x86,0x32,0x62,0xbc,0x5b,0x53,0x8a,0x41,0x0c,0x45,0x5b,0xc4,0xfd,0x78,0xfc,0xc2,0x6f,0x90,0xef,0xea,0xbd,0xd6,0x63,0x27,0xc8,0xcf,0x8a,0x7f,0xb1,0x04,0x10,0xe0,0x30,0xd9,0xba,0x57,0x24,0x6d,0x3d,0x9a,0x2a,0x90,0xfc,0x7e,0x49,0x28,0xda,0x89,0x89,0xcb,0xab,0x23,0xfb,0x85,0xbd,0x2c,0xca,0xf2,0x6b,0x59,0x7d .byte 0x9c,0x06,0x88,0xd3,0xc5,0x5e,0xbd,0xa3,0xb5,0xbe,0x59,0xba,0xd9,0x73,0x43,0x99,0xf4,0xd1,0xf0,0x78,0x76,0xff,0x13,0x6b,0xc9,0x91,0x7e,0xad,0x4a,0x00,0xf3,0x05,0xa5,0x8d,0x17,0xf7,0xd8,0x5b,0xad,0x34,0x23,0x74,0xed,0xb6,0xa7,0x1a,0x0b,0x6a,0xf1,0xe8,0x8a,0xe5,0x81,0x0e,0xc2,0xe3,0xa0,0x8b,0x8e,0xca,0xed,0x50,0x03,0x8b .byte 0xc0,0x0c,0xee,0x7c,0xde,0x3f,0xbc,0xd8,0x58,0x87,0x97,0x0c,0x12,0xed,0x08,0xa4,0xf0,0x12,0x6d,0xea,0xae,0x9f,0xc8,0x3e,0x7c,0xfa,0x7d,0x19,0x8d,0xad,0x38,0xdd,0x61,0x2e,0x58,0x05,0x23,0x92,0x83,0x63,0xe6,0x8e,0x86,0xbb,0xba,0xf3,0xe8,0x4b,0xf8,0xe6,0x6b,0xfd,0xeb,0x1d,0x6a,0xd5,0x8e,0x78,0x77,0x30,0xd5,0xb4,0x32,0x86 .byte 0xd0,0xa6,0x26,0xf7,0xc6,0xd3,0xfc,0xd1,0x65,0x65,0xae,0xe2,0x2c,0x52,0xf7,0x36,0x4f,0xff,0xe2,0x6a,0x2a,0xd5,0x8c,0x85,0x5e,0xbf,0xbc,0xda,0x38,0x56,0xb2,0xc3,0x6c,0x5d,0x0f,0xdf,0xe4,0xb8,0x6a,0x43,0xd6,0x8b,0x55,0x5e,0xf5,0x38,0x46,0x26,0x25,0xe1,0x01,0x67,0x09,0xc8,0xc2,0xa7,0x23,0x30,0xf3,0x6d,0x25,0xf0,0x2e,0xa2 .byte 0x51,0x2d,0x00,0x72,0x8d,0x47,0x0e,0xdd,0xa1,0xd8,0x88,0x06,0xbb,0x49,0x33,0xa1,0x07,0x62,0x3d,0xa5,0x31,0x9c,0x62,0x71,0xde,0x89,0xd2,0xcf,0xcf,0x53,0x24,0x54,0x86,0x52,0xae,0xdf,0x4a,0xff,0x5b,0x80,0x66,0xf5,0xd3,0xc0,0x56,0x76,0xc9,0xd0,0x53,0xd7,0xd8,0xd8,0x1d,0x39,0xfb,0xb3,0x06,0x89,0x07,0x5d,0x68,0xf0,0xc8,0x0b .byte 0x90,0xbe,0x5b,0x95,0xac,0x3c,0x7d,0x81,0x6e,0x10,0xf6,0x77,0x35,0x72,0x31,0x12,0x5f,0x3b,0x2d,0xd5,0x7e,0x68,0x02,0xde,0x06,0xd9,0xa8,0xc5,0xb8,0x9b,0xa0,0xbd,0x24,0x3a,0xdc,0xea,0x3d,0xb7,0x44,0x87,0x70,0xe7,0x07,0x6d,0xf1,0xa4,0xe8,0xbd,0x1a,0xa9,0x12,0xf3,0xfa,0x62,0x6f,0x68,0x42,0xe5,0xbf,0x1f,0xb6,0x6e,0x35,0xa3 .byte 0xc8,0xc3,0x11,0xb0,0x09,0x68,0xbe,0x99,0xf7,0x2e,0xac,0x2d,0x55,0x81,0x0d,0xbc,0xcc,0xec,0xbf,0x52,0x50,0x22,0xf2,0x7a,0x10,0x2d,0xe7,0x46,0xd6,0x9d,0xee,0xb7,0xa1,0xa0,0xaa,0xc9,0xa2,0x32,0x0c,0x99,0x6e,0x76,0x36,0x53,0x0e,0x0f,0x00,0x96,0x0b,0x5f,0x6b,0x80,0xc5,0xe2,0xcf,0x1d,0xe3,0x97,0x54,0x07,0x9b,0x3e,0xf3,0x74 .byte 0xee,0x1e,0x93,0xaa,0x68,0xbd,0x7b,0x39,0x6e,0x4d,0x2c,0x67,0xe2,0x45,0xcb,0x35,0x3a,0x04,0x53,0x49,0x74,0xde,0xfb,0xfd,0x80,0xa1,0x0b,0x8d,0xb9,0x9e,0x9a,0x6f,0x4d,0x09,0x4b,0x4e,0x90,0x30,0xf4,0xe2,0x53,0x00,0xc3,0x33,0x59,0x0e,0x56,0x6c,0xd6,0xb9,0x4f,0xc1,0x44,0x6b,0x79,0x85,0x9e,0x2a,0x37,0x0f,0xc2,0xa7,0x63,0xca .byte 0x6d,0x18,0x2e,0xd7,0x24,0xf3,0xc3,0x08,0xe9,0xf8,0x29,0x32,0x8a,0xb3,0x28,0x1a,0x93,0x7a,0x47,0xff,0xd0,0x9a,0xe4,0x97,0xef,0x4a,0x23,0xb5,0x61,0x1d,0x64,0x7c,0x69,0x90,0x5b,0xba,0x70,0x41,0xa6,0x51,0x08,0xf3,0x48,0x8e,0x0c,0xba,0x30,0x54,0x17,0x26,0xc7,0xd0,0x85,0x27,0x45,0x92,0x80,0xb1,0xe7,0xf2,0x1e,0xae,0x35,0x1e .byte 0x29,0x61,0x74,0x2d,0x55,0x22,0x04,0xfd,0xa2,0xf0,0x7c,0x15,0x9a,0x3e,0xee,0x5a,0xa3,0x1b,0x83,0xc0,0x45,0x1e,0x49,0x81,0xb1,0xa1,0xff,0x78,0x69,0xcf,0x95,0xc8,0x8d,0x3b,0x0f,0xfe,0x2e,0xde,0x6e,0x57,0x69,0x87,0xaf,0x30,0x88,0xbc,0x70,0x8c,0x79,0x84,0x9f,0x52,0x46,0x9d,0x34,0x3a,0xe5,0xe4,0x98,0x9f,0x43,0x77,0x40,0x99 .byte 0x58,0xae,0x60,0xfd,0xef,0xc9,0x62,0x9e,0x89,0x7f,0xe3,0x2f,0x4e,0xdc,0xb8,0xb8,0x8d,0xdf,0x31,0x5f,0x73,0xed,0x42,0xdf,0x58,0xd0,0xe1,0x50,0x60,0xf1,0x04,0xab,0x3c,0x5c,0xe4,0x5f,0xc1,0xa1,0xeb,0x51,0x61,0x5b,0xab,0x47,0x71,0xbb,0xcc,0x14,0x6c,0xeb,0x84,0x4f,0x87,0xde,0x11,0x7d,0xb7,0x37,0x99,0x35,0xdb,0x31,0x4f,0x0e .byte 0xfe,0xbb,0x16,0x7b,0x9c,0x62,0x33,0x33,0x98,0xaf,0x86,0x29,0x69,0xe7,0xc9,0x64,0x87,0x81,0xff,0xf5,0xbd,0xf0,0xe2,0x41,0xf9,0x24,0xe3,0xd3,0x55,0xa5,0xdc,0xf3,0x35,0xb4,0x3d,0x55,0x31,0x51,0x77,0xbd,0x1c,0xe4,0x46,0xe8,0x2b,0x5c,0xc9,0x35,0x7f,0x84,0xde,0x25,0x8c,0x61,0xff,0x09,0xd4,0x5f,0xd8,0x3b,0xa8,0x8b,0xa5,0xa9 .byte 0xe8,0xa8,0xe2,0xef,0x82,0x6d,0x60,0x3e,0xc6,0x48,0x73,0x03,0x04,0x81,0x11,0x10,0xee,0x41,0xdb,0xc3,0xb9,0x78,0xd9,0xf0,0x32,0xa1,0xcc,0xa5,0x4a,0x67,0xe7,0x6b,0x21,0x6c,0x64,0x06,0x2c,0x8c,0x52,0x53,0xaa,0xb5,0x28,0x4d,0xd6,0xc6,0xa5,0x09,0x43,0x37,0xd6,0x73,0xfc,0xe7,0xf6,0x88,0x50,0xbc,0x81,0x7b,0xa5,0x92,0xa7,0x0b .byte 0x86,0x5d,0x20,0x0c,0xbf,0x4d,0x1f,0x47,0xd1,0xd6,0x48,0xf4,0x64,0x55,0x99,0x7c,0x74,0x15,0x21,0xa8,0xeb,0x35,0xf2,0x86,0xc1,0x5e,0xbf,0x80,0x34,0x4b,0x44,0x38,0x21,0xd2,0x01,0x7d,0xf7,0x51,0x0c,0x02,0x03,0xe9,0x60,0xdf,0x80,0x36,0x40,0xfc,0x0a,0x96,0xbc,0x2e,0x88,0x8e,0xa4,0xa7,0x1c,0xc8,0x42,0x34,0xb5,0xd9,0xda,0xd7 .byte 0x74,0x19,0xf7,0xff,0x0f,0x56,0x2c,0x02,0x48,0x92,0x5c,0x82,0xb3,0x7d,0x1d,0xef,0xd1,0xec,0x86,0x9b,0x3f,0xa8,0xb7,0xfa,0x02,0x44,0xb5,0x19,0x0c,0xce,0xd8,0x66,0xc6,0x48,0xbe,0x97,0xbd,0x4c,0x65,0x3a,0x09,0x5a,0x79,0xb9,0xa1,0x48,0xb4,0x2a,0x5d,0x10,0x61,0xac,0x17,0xd3,0xf6,0x13,0x1d,0x71,0x08,0x86,0xc8,0x4e,0xab,0xb9 .byte 0x0d,0x6f,0x7f,0x79,0xe8,0xf8,0x85,0x68,0x8f,0xac,0x98,0x93,0xbf,0xe5,0xf6,0x84,0x5e,0x47,0x9d,0xc4,0x21,0xb6,0xf8,0x17,0x1a,0xb9,0xff,0x8f,0xfd,0xd8,0xc1,0x6f,0xb8,0x74,0xb9,0xfa,0x55,0xd9,0x33,0x3e,0x98,0x3d,0x0e,0x3b,0xfa,0x2c,0x13,0xf4,0xcb,0x2a,0x4e,0x74,0x33,0x6a,0x50,0x49,0xeb,0xb6,0x87,0xb2,0x8d,0x24,0x38,0xc2 .byte 0x01,0x80,0xf7,0x7c,0x4e,0x8d,0xa5,0x79,0xed,0x43,0xd6,0x82,0x6a,0x2e,0x0a,0x6c,0xe3,0x58,0x26,0x7a,0xc2,0x68,0x84,0x78,0x5c,0x67,0x33,0x97,0x97,0xd8,0x7e,0xeb,0x40,0x9d,0x61,0x25,0x6a,0x2f,0x63,0x9c,0xae,0x05,0xcf,0xb5,0x39,0x4e,0xb0,0xdb,0xc9,0x2e,0x14,0x3c,0x6b,0xda,0x02,0x6f,0xf8,0x73,0xab,0xe4,0x1e,0xaa,0x2c,0x62 .byte 0x41,0x65,0x5f,0x2c,0x5b,0xcb,0x56,0x8e,0x61,0x6a,0x57,0x21,0x8d,0xe5,0x8e,0x44,0x4f,0xfb,0x69,0x45,0x46,0x62,0xe3,0x12,0xe6,0x36,0x00,0x82,0x6a,0xa5,0x5e,0xfd,0x01,0xde,0xd1,0x9e,0xd7,0x3c,0x88,0x44,0x66,0x5d,0x0c,0x9f,0x0a,0x03,0xc8,0x79,0x96,0x54,0xf3,0x33,0x69,0x1e,0x98,0xe9,0x85,0x4a,0x8a,0xf7,0x3a,0x5e,0x02,0xe7 .byte 0x88,0x23,0x41,0x08,0x4f,0x4b,0xf5,0xde,0x3a,0xbc,0x0d,0xfa,0xec,0xf2,0x74,0x63,0x51,0x4a,0x49,0xae,0x82,0xc0,0x9b,0x08,0x96,0x99,0x6b,0x13,0xb8,0x47,0x55,0x63,0x80,0xc0,0x41,0x83,0xf3,0x77,0x6b,0x76,0x0d,0xd6,0x32,0xbb,0x6f,0xfb,0xa9,0xfa,0x86,0x6e,0xe2,0xa3,0x0d,0x34,0x3c,0x8a,0x0d,0x06,0xbb,0x34,0x98,0xf2,0xad,0x2c .byte 0x81,0xb8,0xd5,0x8e,0x78,0xa6,0x63,0xbd,0x3c,0x9e,0xb5,0x3b,0x2e,0xf4,0x28,0x57,0x06,0xe0,0xcf,0xef,0x4b,0x3e,0xfd,0x2e,0x6f,0xb8,0xff,0x5b,0x78,0x2e,0xa2,0x05,0xa5,0xcd,0x43,0x6f,0xf5,0xfe,0xe9,0xcd,0xda,0x48,0xfd,0x8f,0x74,0x0e,0x60,0x47,0x04,0xed,0x17,0xd8,0x67,0x7a,0x65,0x7f,0x45,0x0c,0x5f,0xf0,0x3a,0x6a,0x88,0x14 .byte 0xb2,0x04,0xf6,0x95,0x1b,0x20,0xf3,0x94,0x77,0xaa,0xf3,0x57,0x09,0xbf,0x7e,0x1f,0x51,0x08,0x7e,0x7f,0x7c,0x9f,0xfd,0x33,0x47,0xb1,0x94,0x36,0x67,0x54,0x8c,0x2b,0x6c,0xb0,0x32,0xc5,0xc3,0x9b,0x9f,0x5b,0x71,0x94,0x20,0x86,0xc9,0x16,0x82,0xa9,0xe7,0xe4,0x58,0x63,0x7a,0x6a,0x25,0x0e,0x9f,0x00,0xc8,0x65,0x14,0xbf,0xf0,0x4e .byte 0x33,0x9f,0x0e,0xe7,0x10,0x61,0x21,0x6c,0x9c,0xf0,0x42,0x52,0xb6,0x5c,0xcd,0xbf,0xe6,0x20,0xe6,0xa7,0x20,0xe9,0x94,0x8b,0x29,0x1f,0x33,0x93,0x1a,0xc6,0x49,0xfb,0x1c,0xb6,0x2c,0x12,0x4a,0x2a,0x31,0xc7,0xc9,0xd1,0x73,0x53,0xbe,0x02,0x6d,0x58,0x9b,0x0e,0xfa,0x90,0x84,0x40,0x58,0x06,0x99,0x6b,0xfe,0x4d,0xbb,0xe2,0x9d,0x09 .byte 0x74,0x4f,0xf8,0x5d,0x59,0xbf,0xac,0x39,0xe5,0xf0,0xa2,0x89,0xf3,0x78,0xbe,0xb1,0x85,0x48,0xd6,0x1c,0x92,0x2b,0x85,0x87,0xc4,0xa6,0x81,0x64,0xf0,0xd1,0xe0,0x40,0xc8,0xd9,0x66,0xb9,0x06,0x21,0x8e,0x02,0x27,0x93,0xac,0xc3,0x79,0x20,0x43,0x62,0xa8,0xe1,0xcd,0x52,0x19,0xe5,0xf1,0x10,0x7a,0xc5,0x3e,0xe0,0x20,0xd0,0xc8,0x5f .byte 0x47,0x41,0x97,0xe4,0x65,0x6f,0x89,0xf6,0x51,0x4c,0xd6,0x1b,0x71,0xd2,0x9a,0x1c,0xca,0x5a,0x9a,0xf2,0x44,0xed,0x3f,0x50,0xf2,0xf6,0x11,0x48,0x23,0xf9,0x82,0x90,0x5c,0x65,0x1a,0x2a,0xfc,0x9e,0x8b,0x64,0xa6,0x46,0x16,0x80,0xd4,0xcc,0xe2,0xd0,0xcd,0x7f,0x30,0xfd,0xd2,0x11,0xa1,0x5c,0x6f,0x7e,0x4b,0x81,0x03,0x98,0x85,0x44 .byte 0x54,0x8a,0x9d,0x1b,0x5c,0x6c,0xe4,0xe3,0x61,0xe5,0x85,0xa7,0xfe,0x03,0x34,0xe0,0xed,0xff,0x46,0xba,0x0f,0xac,0x79,0x6d,0x47,0x60,0x08,0xba,0x95,0x8c,0xe6,0x7d,0x33,0xca,0x82,0x8a,0xe6,0x1e,0x1f,0xb4,0xba,0x49,0x51,0x05,0x2b,0x18,0xb3,0x7c,0x5f,0x12,0xa2,0x2f,0x96,0x28,0xab,0xe8,0x16,0xac,0xfe,0xa0,0x83,0xbd,0x86,0x1b .byte 0x53,0xc1,0xab,0xed,0x42,0x2a,0x8b,0xaa,0x90,0x3f,0xcd,0x20,0xd7,0x9e,0xb8,0x3b,0xcd,0x5a,0xc9,0xea,0xbe,0xb2,0x7b,0x38,0xe4,0x16,0x95,0xaa,0xee,0xf6,0x1e,0xbd,0x1a,0x0f,0x89,0x96,0x35,0x0b,0x61,0xa9,0x87,0xca,0x35,0x27,0x25,0x1a,0xd6,0x31,0x8f,0xc4,0x10,0xf6,0xb7,0xff,0x3a,0x6a,0xb0,0xb7,0x7f,0x44,0x4c,0x08,0xaf,0x17 .byte 0xe4,0x4a,0x0a,0x52,0x83,0x3e,0x11,0x53,0x7f,0x86,0x09,0x23,0xc7,0x46,0x3c,0x6d,0x66,0x2b,0xd0,0x82,0x08,0x02,0xa3,0x41,0x21,0x29,0x5e,0x68,0xa3,0x11,0xa9,0x8f,0x91,0xb9,0x60,0x87,0x22,0x37,0xfe,0x04,0xea,0x09,0x9f,0x96,0x6c,0x1e,0x67,0x31,0x9f,0x81,0xa9,0xeb,0xb0,0x1f,0xe0,0xb0,0xf4,0xf4,0xb9,0xa1,0x3f,0xb8,0xc7,0x83 .byte 0x53,0x74,0x34,0x7b,0xfb,0xcd,0xf2,0x6e,0xe6,0xa3,0x26,0x86,0x57,0xb7,0x57,0xa2,0x24,0x43,0xd2,0xdd,0x9e,0x30,0xeb,0x3f,0xf5,0xa2,0x84,0x97,0xc0,0x23,0x63,0xee,0x84,0x8e,0x01,0xa2,0x57,0xf2,0xa1,0x48,0x6f,0x0f,0x19,0x31,0xae,0x26,0x08,0x4a,0x13,0x7e,0xde,0x85,0xb8,0x72,0xea,0x69,0x17,0x51,0x94,0x17,0x96,0xc1,0xc6,0x93 .byte 0x10,0x38,0x0c,0xba,0xd1,0x86,0x57,0x5e,0x39,0xd5,0x7f,0x50,0x0e,0x94,0x8b,0xc4,0x1b,0x3d,0x40,0x3c,0xfb,0x49,0x48,0xf9,0xf4,0xd8,0x0d,0xb2,0x3a,0xa9,0xd9,0x29,0x31,0x57,0xc7,0x65,0x1e,0x86,0x77,0x9d,0x53,0x8c,0x60,0x83,0xb0,0xea,0x19,0x76,0x8e,0x02,0x73,0x69,0x2c,0xd6,0x25,0xbd,0x83,0xd1,0xf3,0xfd,0xb7,0x51,0x95,0x07 .byte 0x51,0xf8,0x36,0xc9,0x8d,0xc1,0xec,0x47,0x3f,0xfa,0x19,0x8c,0xd5,0x07,0x20,0xd1,0x9f,0xff,0xb2,0x25,0x2d,0xe0,0xe4,0xa2,0xa3,0x29,0xbd,0x81,0x34,0xbf,0x60,0x04,0x8c,0x80,0x68,0xce,0x8b,0xbf,0xfa,0x50,0x12,0xdf,0x26,0x6c,0x9c,0x90,0x68,0xd9,0xfd,0x3b,0xc5,0x10,0xb3,0xd2,0xdf,0x17,0xae,0xf8,0xb0,0xe5,0xf3,0x44,0x5f,0x01 .byte 0xbc,0x86,0x11,0x74,0xda,0x06,0x4b,0xac,0x49,0x75,0x77,0x65,0x38,0x97,0x1c,0x7c,0x8c,0x69,0x5b,0x9e,0x17,0x30,0x14,0x4f,0xf0,0x2d,0xd5,0xd6,0x78,0x56,0x27,0x96,0xe4,0xb8,0x69,0x1f,0xd5,0xaa,0x27,0x50,0x80,0x09,0xed,0x14,0x8f,0x36,0x48,0x32,0xfd,0x66,0x47,0x10,0xd9,0x8c,0xcf,0xa6,0xe6,0xd5,0x21,0x6a,0xe3,0x40,0xaa,0x4c .byte 0xa2,0x0a,0xd6,0x2c,0x6f,0x79,0x10,0x8b,0x06,0xb4,0x01,0x91,0xce,0x62,0xfc,0xa0,0x53,0x3a,0xa0,0x65,0xe5,0xd4,0xe9,0xd6,0x91,0x04,0x55,0xa7,0xa9,0x75,0xc7,0x9c,0x13,0x45,0x16,0xcb,0x13,0x88,0xf4,0x08,0xa6,0xe9,0x8e,0x8a,0x84,0xd6,0x8c,0x83,0x5b,0xc5,0xf9,0xbf,0x1d,0xae,0x44,0xd3,0x74,0xa7,0x5d,0x29,0x03,0xf2,0x01,0xad .byte 0xdb,0x3d,0xa2,0xcd,0xf0,0xf9,0xa1,0x27,0xe1,0xbb,0xe6,0x22,0x97,0x0e,0xb4,0x3a,0x09,0xba,0xaf,0x41,0xd5,0x6b,0x67,0x67,0x42,0x1c,0x93,0x52,0x5e,0x79,0x85,0x9b,0x59,0xaf,0x98,0xbb,0x3e,0xbe,0x18,0x0f,0x2a,0x52,0xd1,0xc9,0xb5,0x21,0x04,0x9f,0xee,0xe9,0x30,0x97,0x74,0x7f,0x71,0xfd,0xec,0x0d,0xfa,0x0e,0x32,0x75,0x8f,0x31 .byte 0x3a,0x90,0x90,0xe4,0x0a,0x4b,0xb9,0xfc,0x55,0x02,0xfa,0x1c,0xbc,0xd7,0x30,0x24,0x1a,0x72,0x30,0x22,0xe9,0x61,0xf0,0xdd,0x60,0x55,0x69,0x8d,0x97,0xc1,0xfe,0x81,0x6a,0x16,0x8f,0x46,0x0b,0x1d,0xf5,0xc1,0xf7,0xf2,0xb6,0xf1,0x12,0x23,0x59,0x19,0xbd,0x3a,0xcd,0x57,0x34,0xfe,0x3b,0x1d,0xce,0xe5,0xe5,0xb7,0x90,0x65,0x2f,0x81 .byte 0xcc,0xae,0x07,0x0d,0xe6,0xfa,0x5d,0x7c,0x5f,0x4f,0x45,0xed,0x90,0x05,0xe5,0xfc,0x10,0xb9,0x4d,0x2a,0x03,0x09,0xf9,0x9c,0x7a,0xd6,0x20,0xf2,0xb2,0x87,0xc0,0xde,0xba,0xea,0x78,0x69,0x8f,0x4d,0x6a,0x5d,0xc1,0x20,0x59,0x39,0x8a,0x9f,0x9d,0x8e,0xc4,0xad,0x93,0x4e,0x4f,0x03,0x6e,0x79,0xf7,0x5a,0x21,0x7d,0xa0,0xd4,0xce,0xe3 .byte 0x0e,0xea,0xbd,0xd2,0x0e,0x16,0x89,0x0e,0x7f,0xec,0xc3,0x2a,0x21,0x86,0xb3,0x4f,0xb7,0xc4,0x1b,0x60,0xda,0x18,0xdb,0x73,0xda,0xbc,0x79,0xab,0xea,0xef,0xab,0xa2,0x59,0x89,0x76,0xce,0x72,0x51,0x41,0xf8,0xfe,0xa0,0xbb,0x38,0xf8,0x99,0xcd,0x9d,0x58,0xb9,0x6a,0xb5,0x5f,0xb7,0xa1,0x69,0xe3,0xb9,0x1d,0xfb,0x7a,0x1c,0xc8,0x21 .byte 0x4d,0x11,0x57,0x1d,0xc0,0x45,0x21,0xba,0xa2,0xa3,0xbb,0x1a,0x34,0x17,0xaa,0xa1,0x0b,0x81,0xa1,0xb9,0xf0,0xba,0xf8,0xbf,0xb8,0x6a,0x8a,0x3c,0x75,0xf9,0x48,0x66,0x34,0x29,0xc3,0xc5,0x77,0x58,0x2e,0xdd,0xc1,0xd3,0x38,0x23,0xe0,0x92,0xe6,0x77,0xe5,0xf8,0xf4,0x70,0xe9,0x81,0xad,0x94,0xd3,0xce,0x69,0x97,0x2c,0x4b,0xc1,0xcf .byte 0x83,0xc6,0xfb,0x89,0x7f,0xa7,0x28,0xfa,0xce,0xa4,0x6e,0x24,0x15,0x80,0x3b,0x9b,0x14,0x0d,0xc4,0x82,0x3f,0xdf,0xe9,0x40,0x81,0x7f,0xcc,0xb1,0xbb,0xa4,0xdf,0xee,0x56,0x7e,0xf7,0xe3,0x34,0xb2,0xfd,0xed,0x58,0x48,0xcc,0x1e,0x05,0x21,0x9f,0x30,0xf3,0xa9,0x24,0xe6,0xc3,0xdb,0x2c,0x72,0xfb,0xd6,0x0b,0xd7,0x84,0x64,0xd4,0x9b .byte 0xf5,0x55,0xe5,0xb1,0xdf,0x01,0x07,0x5f,0xb7,0xd7,0xde,0x99,0x63,0x55,0x90,0x02,0x5d,0xef,0x86,0x91,0xa8,0x70,0x87,0x58,0xde,0xe8,0xa8,0xf1,0xf4,0x09,0x2d,0x44,0x19,0x4e,0x45,0x30,0x72,0xf9,0xc3,0xaa,0xc9,0x12,0x71,0xa5,0x63,0xa0,0x38,0x0b,0x77,0xa5,0x0a,0xef,0xf5,0xbb,0xbc,0xec,0xfd,0xb8,0x75,0x9c,0xfb,0x70,0x2a,0xe8 .byte 0x71,0x3f,0xf7,0x39,0x56,0x69,0xe0,0x37,0xf7,0x94,0xfe,0x3a,0x7b,0x78,0x49,0x35,0x11,0x99,0xa2,0x70,0x66,0xbe,0xae,0x21,0x26,0xff,0x75,0x03,0x87,0xc2,0x7c,0xd7,0x29,0x5a,0x36,0x3f,0x73,0xba,0xba,0x08,0x5d,0x4b,0xc0,0xe0,0x76,0xb6,0x15,0x1b,0x9f,0xbb,0x01,0x0a,0xf6,0xf7,0x98,0x8b,0x4b,0x0e,0xbc,0x71,0x7a,0xd2,0x69,0x87 .byte 0xe3,0x45,0xa6,0x41,0xd9,0x9d,0x64,0x90,0x7c,0x9d,0x12,0xf8,0xf0,0xc9,0x52,0x50,0x11,0x18,0x6b,0x9f,0x94,0x31,0x14,0x70,0x59,0xc3,0xb3,0xad,0x73,0x01,0x70,0xa7,0xb3,0xc7,0xcc,0xae,0x8a,0xc1,0x4e,0x62,0x1e,0xb1,0x4b,0x34,0xc9,0x11,0x73,0xb1,0x3f,0xbf,0xe2,0xe3,0xed,0xf1,0xab,0x07,0x87,0x3a,0xfb,0x1f,0x32,0x75,0x74,0x39 .byte 0xba,0x2a,0xa6,0x82,0x33,0x27,0x60,0x94,0xc1,0x91,0x4e,0xaa,0x4d,0x99,0xcb,0xb2,0x5e,0xfa,0xdd,0x2d,0xf7,0xc3,0xf1,0x66,0x7d,0x0a,0xc3,0x8e,0x10,0x56,0x2e,0xde,0xc7,0xca,0x48,0xe7,0xaa,0x90,0x11,0x4b,0x60,0x57,0x2f,0xae,0xa5,0xe3,0x95,0x16,0xe3,0xac,0xab,0xc5,0x68,0xd3,0x71,0x2c,0xe0,0xdc,0x9d,0x48,0xe7,0x73,0x25,0xc9 .byte 0xf7,0x16,0x3c,0x7f,0x25,0x4b,0x75,0x21,0xe1,0x20,0x1b,0x95,0xde,0xf8,0xba,0xa9,0x51,0xe9,0xce,0xec,0xa1,0x44,0x66,0x05,0x46,0xeb,0x6d,0x48,0x32,0x1f,0x13,0x25,0x61,0x2d,0xfc,0xb9,0x4d,0x88,0x70,0xdc,0x37,0xaf,0x1f,0xb4,0xb2,0x14,0x28,0x06,0xf4,0x51,0xcf,0x09,0x25,0xef,0x7d,0x68,0xac,0xb0,0x47,0x30,0x0a,0x33,0x32,0x05 .byte 0xd7,0xbc,0xae,0x4a,0x92,0x8f,0xc8,0xe2,0xd4,0xec,0x03,0xe5,0xa2,0x92,0x78,0xd3,0xe8,0x9a,0x4a,0x07,0xe9,0x46,0x02,0x42,0xbc,0x9d,0x0f,0x63,0xf3,0x5a,0xba,0xec,0x0d,0x21,0x29,0x35,0x29,0xa5,0xfa,0x10,0xb6,0x29,0xf3,0xf7,0xd2,0xd3,0xb0,0x41,0xba,0x08,0x3f,0x52,0x21,0x74,0xe2,0x32,0x16,0x92,0x77,0x2b,0xca,0xeb,0xbe,0xe2 .byte 0x15,0xda,0x39,0x4d,0x8c,0x4b,0x0d,0xf9,0xa1,0xa5,0x0f,0x2b,0xbd,0x17,0xe9,0x5c,0x8a,0x87,0x60,0xae,0xdb,0x1c,0x39,0x49,0x80,0x03,0x1c,0xc3,0xcc,0xd7,0xad,0xf9,0x92,0x38,0x08,0xc8,0x0c,0x38,0xff,0x84,0x29,0x5c,0x75,0xb2,0xf6,0x64,0x00,0x07,0x6c,0xb1,0x62,0x40,0x21,0xfb,0x7e,0xa0,0xb5,0xb4,0xbd,0x47,0x22,0x07,0x4b,0xdf .byte 0x42,0x94,0x43,0x5a,0xe9,0x5b,0x61,0x16,0xdc,0x1a,0xb8,0x35,0x51,0x17,0x87,0xf9,0xac,0xee,0x4b,0x2c,0x03,0x53,0xc0,0xb4,0xd6,0x13,0x11,0xb5,0x1b,0x10,0x0c,0x54,0x1b,0x74,0xd9,0xf8,0x15,0x1e,0xc5,0x92,0x6c,0x4c,0x30,0x67,0x78,0xef,0xb9,0xd8,0xd7,0x5a,0xf2,0x4b,0x87,0x3c,0x65,0xd9,0xfd,0xa1,0xb0,0x2b,0xaf,0x69,0xc4,0x8c .byte 0xbc,0x79,0x10,0x10,0xa2,0x43,0xfe,0x0a,0x2d,0xb3,0x6b,0xc8,0x7d,0x5c,0x80,0xab,0x9e,0xfd,0x4c,0x9b,0x32,0x50,0x2a,0x78,0x2f,0xfb,0xdc,0xc0,0x2e,0x61,0xff,0xbb,0xad,0xb8,0xfc,0x2b,0x8a,0x92,0x7b,0xdc,0xb9,0x1c,0x7e,0x89,0x5c,0xf5,0x4f,0xd8,0x69,0xf5,0x4f,0xe9,0x8e,0x5d,0x6e,0x52,0xa3,0x63,0x00,0x52,0xb6,0xbd,0x68,0x8f .byte 0x63,0xb2,0x8a,0xc7,0xc8,0x37,0xd0,0xed,0x36,0x4a,0x18,0xba,0xb8,0x6b,0x0e,0x93,0xf5,0xca,0x86,0xcd,0x99,0xe4,0x8e,0xe1,0x20,0x23,0xe0,0xc1,0x06,0x73,0xae,0x21,0x25,0x36,0xdd,0xb8,0x52,0xb6,0x69,0x12,0x01,0xad,0xc5,0x72,0x22,0xa1,0xe0,0xae,0x19,0x56,0x0e,0xb5,0xcb,0xeb,0xc9,0x8a,0xf3,0x28,0x8b,0x8c,0x09,0x86,0xa0,0x8c .byte 0x86,0xef,0xeb,0x73,0xbd,0x57,0x20,0xa7,0xe2,0x1e,0xa2,0x62,0x0e,0xa8,0xdf,0x2a,0x03,0x6a,0xe2,0x48,0xea,0xd2,0x6a,0xb1,0xa1,0x85,0x51,0xc7,0xb0,0xb0,0x45,0x17,0x24,0xef,0x0a,0x72,0xfa,0xb9,0x89,0x10,0x9e,0x47,0x5d,0xce,0x62,0x54,0xca,0xae,0x77,0x95,0xf0,0x65,0xb9,0xcd,0x6f,0xd6,0x81,0xdd,0xf7,0x6f,0x76,0x22,0xa4,0x2e .byte 0x6c,0x14,0x2f,0xb8,0x4f,0x2b,0x5b,0xa5,0x2f,0xa8,0x07,0x15,0x20,0xf5,0xcc,0x7d,0x6f,0x2d,0x3e,0x8b,0x15,0x90,0xcd,0x73,0x34,0xec,0xfd,0x81,0x9a,0x09,0xa6,0x67,0xa0,0x4f,0xd7,0xff,0x3b,0xbd,0x5d,0x39,0xde,0xbf,0x26,0xd8,0xc1,0x3b,0x32,0x78,0x71,0x56,0x73,0x43,0xa2,0x16,0x7a,0xbf,0xc6,0xb3,0xfa,0xfe,0x96,0xfa,0xd4,0xc9 .byte 0xbf,0xda,0x2a,0x16,0x35,0xb4,0x3f,0x46,0x12,0xb5,0xc2,0x7f,0xae,0xee,0x4e,0x06,0x67,0xa0,0x00,0x0c,0xd0,0x2e,0xa7,0xbe,0xd5,0x28,0x6b,0x95,0x59,0x4c,0x3a,0x42,0xb6,0x39,0x49,0x26,0x43,0x1e,0xe9,0x46,0x1c,0x7d,0x7f,0x45,0x9b,0x4c,0x2f,0x9f,0xa4,0x48,0xb2,0x20,0xe4,0x76,0x4c,0x58,0x19,0x69,0xda,0x98,0x92,0xbd,0x78,0x52 .byte 0x57,0xe3,0xcd,0x77,0xf3,0x57,0x6f,0x97,0x6d,0x63,0xd0,0xee,0xae,0x93,0x19,0xbc,0xff,0xe2,0x66,0x72,0xbc,0xd3,0x75,0x65,0x1f,0xe6,0xbc,0xad,0x92,0x37,0x8d,0xa6,0xb8,0xca,0xf0,0xee,0x1d,0xa0,0xc4,0x9c,0x3c,0xa3,0x45,0x87,0x14,0x1e,0x06,0xab,0x97,0xd6,0x8c,0x7a,0xae,0xcd,0x8b,0xa6,0x60,0x7b,0x0f,0x2a,0x30,0xbe,0x34,0x41 .byte 0xfd,0xf2,0x1f,0xc1,0x1e,0x4e,0x52,0xbf,0x32,0x3b,0x55,0xbf,0x12,0xb3,0x24,0x79,0x63,0xc7,0x48,0x4c,0x87,0x04,0xed,0x3c,0xf2,0x1b,0x95,0x32,0x0f,0x1c,0x60,0xfe,0x5a,0xc7,0x6a,0xbb,0x29,0x36,0x57,0x22,0x3c,0x6f,0x74,0xac,0x6e,0x40,0x12,0x17,0x4c,0x47,0x27,0xc9,0x03,0xdb,0x08,0xc6,0x84,0x15,0x83,0x63,0xe1,0xc8,0x00,0x3f .byte 0xfc,0xe6,0x9c,0x66,0x0f,0x0c,0x8e,0xae,0x0c,0x5d,0xde,0x9f,0xba,0x11,0x35,0xe3,0x0d,0xba,0x18,0xbe,0x0b,0xbc,0x39,0xc3,0x84,0xa0,0xfd,0xc9,0x79,0x65,0xde,0x2f,0x80,0x38,0x34,0x16,0xc0,0x29,0xfe,0xf6,0x9e,0x7e,0x97,0x47,0x6f,0xd7,0xa0,0x79,0x3a,0xa7,0x3f,0x12,0x7a,0x0c,0x99,0x41,0x3d,0x75,0xd2,0x0e,0x38,0x56,0xb8,0xe6 .byte 0x1d,0x3c,0x32,0xe0,0xa2,0xb6,0xee,0xd6,0xf3,0xaf,0x5a,0xe3,0xf6,0x27,0x42,0x68,0xfb,0x99,0xbe,0xc9,0xab,0x2d,0x90,0x53,0xd8,0x28,0x3a,0x7b,0x5f,0xad,0x83,0xea,0x86,0x6a,0x9c,0x22,0x96,0x0c,0x13,0xb6,0xb0,0x38,0xbb,0x67,0x89,0xba,0x82,0x8e,0xa7,0xf7,0xeb,0x93,0xaa,0x8c,0xd4,0x00,0xb0,0x62,0x57,0x84,0xf1,0x46,0xdb,0x3d .byte 0x1b,0xdc,0x74,0xc4,0x8e,0x86,0x5a,0xd5,0x5d,0xd2,0xdd,0x17,0xf8,0x4f,0xcc,0x8d,0x4a,0x43,0xe5,0xd6,0x58,0x14,0xa3,0x61,0xf3,0xc3,0x52,0xe2,0x6a,0xce,0xd8,0x44,0x60,0x67,0xf2,0xcd,0xa1,0xb2,0xf6,0xb9,0xe0,0xc9,0x88,0xd4,0x1a,0xa2,0xd0,0x1d,0xe6,0x7b,0x20,0x20,0x89,0x80,0xdb,0x39,0x20,0x3d,0x4f,0xc2,0x58,0x2b,0x3c,0xd4 .byte 0x90,0x20,0xea,0x43,0x9b,0xe3,0x64,0x1a,0xd3,0xd3,0xdc,0x40,0xb4,0x88,0x4b,0xca,0x23,0x66,0x9c,0x08,0x1f,0x9f,0xfb,0xca,0x9d,0xa1,0x88,0xe1,0x4f,0xb5,0xaf,0x43,0x00,0x02,0x0b,0x42,0xc5,0xd5,0xaa,0x27,0xcf,0xa0,0xdb,0x0d,0x60,0xbc,0x99,0xfb,0xdc,0xa9,0xb9,0xe3,0x3a,0x6a,0x49,0x02,0x16,0x41,0x43,0xf0,0x75,0x63,0xca,0xad .byte 0xd6,0x93,0xc7,0x28,0xb7,0xb6,0x5b,0xf4,0x7d,0x5a,0x24,0x5c,0xa9,0xd8,0x7d,0xd4,0x7d,0x1c,0x8d,0x6f,0xab,0x0f,0x7f,0x38,0x4e,0x0c,0x68,0xca,0x1e,0x88,0xed,0x11,0x8d,0xd4,0x37,0xfd,0xce,0x6d,0xb1,0x77,0x2b,0x49,0xc6,0x10,0xde,0x6f,0x93,0x28,0xf6,0x2b,0x50,0x1f,0xf5,0x56,0x35,0x0e,0x7c,0xc5,0x52,0xc5,0x75,0xc4,0x2e,0x30 .byte 0x3d,0x17,0xa9,0x41,0x45,0x29,0x77,0x3f,0x33,0xd8,0x7f,0xb9,0xd2,0x82,0x25,0xe9,0x51,0x6c,0xba,0x03,0x83,0xd1,0x48,0x7c,0x81,0x03,0x26,0x8e,0xad,0x58,0x8b,0xd1,0xda,0x94,0x32,0x17,0x67,0x98,0xac,0x1e,0x7b,0x06,0xc8,0x9a,0x5c,0x83,0xbc,0xbe,0x4b,0x5c,0x7d,0xce,0x76,0x2a,0xa0,0x24,0x5c,0x4e,0x9c,0x16,0x62,0xac,0xe5,0xa9 .byte 0x38,0x60,0xcc,0xc1,0x51,0xb2,0xca,0xaf,0xac,0x33,0xe3,0x58,0x35,0x65,0x17,0x18,0x55,0x3f,0xd6,0xbc,0xfc,0xa0,0x48,0x65,0x31,0x41,0x6a,0x70,0x63,0x0b,0xc2,0xdb,0x12,0xc4,0xb2,0x20,0xbc,0xde,0x53,0xc4,0x12,0xb5,0xa9,0x77,0x23,0x99,0xc8,0x9c,0xe8,0x2b,0xc6,0x46,0xc3,0x64,0xc0,0x10,0xee,0xc7,0x24,0xd1,0xfb,0xd2,0xc6,0x62 .byte 0xd2,0x7a,0x2b,0x5b,0xbb,0xfd,0x71,0xf9,0xf7,0xa7,0xb3,0xf6,0xe1,0xef,0x71,0xfc,0x5e,0xd9,0x69,0xe5,0x64,0x05,0xb1,0xcd,0x1e,0xa3,0x10,0x52,0xa3,0x95,0xf1,0x19,0xc5,0x50,0x57,0x5e,0xc8,0x76,0xd0,0xa7,0xc8,0xe7,0xa6,0x74,0x02,0x01,0x07,0x7a,0x27,0x17,0x55,0x46,0xd3,0x39,0xd5,0xea,0x12,0xc4,0x8c,0xcc,0xb8,0x13,0x8f,0x94 .byte 0xde,0x5b,0x97,0x5e,0x2a,0x75,0x6e,0x45,0x05,0x7f,0x1f,0xea,0xab,0x48,0x62,0x3e,0x75,0xd6,0x58,0x6c,0xeb,0x18,0xad,0xcd,0x1d,0x6e,0x4a,0x54,0xf1,0x49,0x05,0x4f,0x2a,0x86,0x20,0x66,0xc6,0xd5,0xfd,0xc5,0xef,0x66,0x06,0x2b,0xe6,0x19,0x81,0xb6,0xda,0xcc,0xed,0x10,0x0c,0x4f,0x05,0xcd,0x0b,0xe2,0xf7,0x89,0x73,0xc7,0x7c,0x72 .byte 0xc3,0xa4,0xf6,0xbf,0x88,0x27,0xff,0x24,0xdf,0x37,0xfb,0x86,0x9c,0x5f,0xba,0x2a,0xc1,0x5d,0x0d,0x40,0x8a,0x23,0x09,0x76,0x34,0x8e,0x6d,0x48,0x50,0xaa,0x1f,0x8b,0xfd,0x48,0xee,0xa0,0x7c,0xcf,0x45,0x42,0x0d,0x1f,0x04,0x09,0x1f,0x4b,0xe2,0x33,0xd1,0x24,0x71,0xc9,0xdc,0xd6,0xac,0x4d,0x01,0xc7,0xab,0x62,0xc1,0x42,0x99,0x5a .byte 0x7d,0xb5,0x76,0xb5,0xf2,0xac,0x10,0x92,0xdb,0x7a,0x91,0x0b,0xd9,0xba,0x09,0x41,0x8f,0x13,0xfb,0xbf,0xdc,0x5a,0xbc,0x19,0x8d,0x92,0xa0,0xf6,0x9a,0xdb,0xde,0xbc,0xc0,0x7c,0x50,0xd2,0x8a,0x8e,0x5a,0x48,0xf5,0xf4,0x8e,0x0d,0xbe,0xfc,0x12,0xda,0xc2,0x33,0x05,0xa8,0x28,0x64,0xc3,0x14,0xc5,0xc4,0x6d,0x7c,0xa8,0x02,0xd3,0xf0 .byte 0x58,0xf6,0x80,0x7e,0xbf,0xde,0x0e,0xe9,0x96,0xac,0xd1,0x12,0xd6,0x19,0x01,0xbb,0x20,0xcb,0x4b,0x10,0x7e,0xee,0xf9,0x79,0xab,0x03,0x01,0x0d,0x51,0xa9,0x94,0x0d,0xf5,0x2c,0xe6,0xb1,0x2e,0xf9,0x58,0x44,0x12,0xe5,0xc9,0xe5,0x73,0xbf,0xdf,0x6e,0xe6,0xfa,0x76,0x07,0x8a,0x00,0x58,0x0d,0x63,0x5f,0x09,0x98,0xec,0xd6,0x04,0x80 .byte 0xb5,0x8d,0x30,0xb9,0xbd,0x99,0x80,0xb2,0xc3,0xd1,0x7e,0x15,0xfa,0xbf,0xb9,0x80,0x7e,0x5b,0xff,0xaf,0x81,0x47,0x6a,0xdc,0x39,0xb9,0xcb,0x1b,0x62,0x6f,0xbd,0xfd,0xbc,0xf7,0x42,0xf8,0x5c,0x70,0xea,0xaa,0x2a,0x6b,0x4e,0x4e,0xf3,0x8f,0x41,0x13,0x13,0xbc,0x8e,0x39,0x94,0x34,0xf1,0xb1,0x2b,0xbc,0x98,0x2d,0xf7,0xaf,0xec,0xc9 .byte 0xb4,0x2f,0x4c,0x17,0x45,0xfd,0x9f,0x3c,0x39,0xdd,0xa5,0xe0,0x65,0x7a,0x9b,0xec,0x4e,0xe1,0xc5,0x97,0xda,0xc5,0x8b,0x9a,0x1a,0xbd,0xd6,0x69,0x84,0x58,0xde,0x36,0x6a,0x66,0xce,0x70,0xe4,0x71,0x0f,0x4b,0x02,0x48,0x7f,0x37,0x98,0x93,0x4a,0x63,0x96,0x7d,0x2d,0xf6,0xb1,0x54,0x8f,0x21,0xdd,0xf7,0x45,0xaf,0x31,0x7a,0x6b,0x43 .byte 0xfb,0x38,0x92,0x48,0x29,0x93,0xcb,0x62,0x76,0x86,0x2d,0xf9,0x9d,0x73,0x3d,0x58,0xdb,0x8d,0x68,0xa9,0x98,0xa0,0xcb,0x51,0x86,0x14,0x2b,0x42,0x8b,0x00,0x2e,0x45,0x84,0x5a,0x73,0x99,0x31,0xbf,0x21,0x4e,0x71,0x0d,0xd0,0x43,0xbe,0x32,0xc5,0x35,0x3d,0xf7,0x9a,0x4f,0xf9,0x44,0xdf,0xc1,0xb4,0x9f,0x75,0x88,0xe8,0x42,0xb1,0xb1 .byte 0x49,0x2e,0x0b,0xac,0xfd,0x67,0x1d,0xc4,0x3b,0xc5,0x60,0xc7,0x61,0x44,0x0a,0x35,0xc2,0x28,0x8f,0xe8,0x95,0x44,0xf8,0xf4,0xa4,0x41,0x14,0xac,0xe0,0xf0,0x36,0x30,0xa4,0xab,0x0c,0x13,0xeb,0x86,0xdf,0x9e,0x10,0x2c,0x29,0x4a,0x7b,0xad,0xe8,0x31,0x37,0xe0,0xcb,0xcb,0x8a,0xb7,0xcb,0xee,0x68,0x32,0x1f,0x10,0xc3,0xda,0x1d,0xeb .byte 0x3b,0x69,0x1b,0xd5,0x40,0xb4,0x3d,0x03,0x0c,0xfb,0x8d,0x1d,0x04,0xbd,0xe9,0x08,0x61,0x4c,0x0d,0x36,0x6d,0x2c,0x67,0x97,0x1c,0xc7,0x4d,0x9d,0x06,0x0e,0x3c,0x04,0x6c,0x26,0xf9,0x1e,0xde,0xb5,0x31,0x28,0x35,0xb7,0x64,0x27,0xd1,0x46,0x47,0x2e,0xff,0x15,0xf1,0x13,0x0d,0x02,0x42,0xba,0xba,0xbe,0x4b,0xf5,0x3c,0x17,0xea,0x62 .byte 0x62,0x90,0xa5,0xc7,0xb7,0x29,0xde,0xaa,0x1c,0x14,0x0d,0x6f,0x7c,0xc6,0xe0,0x68,0x5d,0xbf,0x73,0x12,0xe5,0xe3,0xdb,0x39,0x4a,0xb0,0x97,0xbc,0xee,0x3a,0x41,0x91,0xd7,0x4e,0x90,0x32,0x51,0xd7,0x34,0xea,0x97,0x12,0x8b,0xc9,0x27,0x40,0x73,0x6c,0xe9,0x9d,0x09,0x6b,0x4f,0x6f,0x85,0xdc,0x1e,0xda,0xb3,0xcf,0x27,0x46,0xcf,0x68 .byte 0x5f,0xfa,0x4c,0x95,0x5d,0x26,0xf6,0x56,0xdb,0x96,0x3e,0x4d,0x93,0x62,0xe1,0xa9,0x4b,0x7c,0xcf,0xff,0x67,0xb4,0x76,0x1f,0xaa,0x44,0xb3,0xb8,0xf1,0xf3,0x3e,0x7f,0x38,0x46,0xab,0x49,0x1c,0x2f,0x50,0x47,0xb3,0x94,0xaa,0x8b,0x18,0xbf,0x3f,0xa8,0xa6,0x27,0xb7,0x72,0xb0,0xfa,0xd6,0xb8,0xc5,0x9d,0xc0,0xe6,0x16,0x75,0xc5,0xe9 .byte 0x62,0x40,0x5b,0x0c,0x18,0x71,0x9c,0xcf,0xb7,0x77,0x02,0x03,0x94,0x20,0x23,0x45,0x8a,0xab,0x00,0x10,0x3b,0x89,0x74,0x6e,0x19,0x91,0xb9,0xcd,0x65,0x15,0x59,0xec,0x21,0x3a,0x26,0x20,0x6e,0x2d,0x98,0xa9,0x79,0x35,0xec,0x60,0x47,0x86,0xef,0x71,0x59,0x86,0x95,0x6e,0x2a,0x28,0xed,0x8a,0x68,0xfa,0xf8,0x2d,0x33,0x5c,0x2b,0x06 .byte 0x07,0x2d,0x2a,0x45,0xd7,0xcf,0x18,0xb3,0x03,0x40,0x76,0x4c,0x79,0xa4,0x13,0x96,0xf2,0x9d,0x57,0x3e,0x1d,0x39,0x9c,0xcd,0x5b,0x9e,0xad,0xdf,0x72,0x4e,0x13,0x29,0xac,0xce,0xa1,0x79,0xfb,0xc4,0x24,0xe9,0x48,0xb2,0x05,0x83,0xa8,0x37,0xb6,0xa3,0xd7,0x76,0x08,0xd4,0x90,0x05,0x87,0x05,0x66,0x60,0x8f,0x4c,0xf6,0xc9,0x8f,0x3b .byte 0x8d,0xe0,0x4a,0x54,0xc4,0xea,0x62,0x5c,0xac,0xde,0x56,0xdd,0xa7,0x4c,0x57,0x40,0xce,0xab,0x0b,0x21,0x66,0x43,0x48,0x29,0xec,0x4e,0x89,0x0c,0x87,0x26,0x9d,0xaa,0xd8,0x26,0xea,0x29,0x44,0x12,0x0e,0xd9,0xb1,0xb8,0x7b,0x13,0x5b,0xf6,0x17,0x69,0x3c,0x97,0x09,0xd1,0xf4,0xca,0xb0,0x74,0x32,0xea,0x94,0xda,0x74,0xb7,0x2e,0xe5 .byte 0xa0,0x15,0x81,0xaf,0x4a,0x47,0x11,0xbb,0xf5,0x25,0xb0,0x13,0x83,0xde,0xdd,0xb9,0x59,0x1d,0x21,0x2d,0xff,0x5a,0x38,0x7f,0xde,0xff,0xd2,0x3f,0x51,0xdc,0x62,0x50,0x51,0xb4,0x86,0xda,0xe2,0x0f,0xc1,0xa1,0x6c,0x42,0xe5,0xcf,0x9a,0xd3,0x51,0x70,0x19,0xb7,0xd1,0x30,0xa3,0xad,0xb3,0x0e,0xcd,0x2a,0x6f,0xcc,0x44,0x65,0xc8,0x54 .byte 0x44,0x5e,0xb2,0xf8,0x81,0xec,0xb5,0xc5,0x12,0x29,0x8f,0x4f,0x66,0x98,0x1b,0x03,0x98,0x03,0x9f,0x42,0x9c,0x87,0x2c,0x7c,0x9d,0xa4,0xbf,0x3e,0x91,0x1d,0xd0,0x4b,0xea,0x6c,0x33,0x5c,0x93,0xcf,0x8c,0x9b,0xcd,0x62,0x05,0x3d,0xf4,0x42,0xba,0x0b,0x15,0x45,0x50,0x9f,0x86,0xbb,0xb6,0x60,0x03,0x5a,0xbf,0x2b,0x17,0x30,0x5b,0x39 .byte 0xfd,0x3f,0x80,0xc0,0x6a,0xee,0x36,0x82,0x09,0x28,0x10,0xd8,0x4a,0x86,0x3b,0xd9,0xaa,0x83,0xb6,0x83,0x69,0x31,0x32,0xcc,0x80,0x8a,0x79,0x23,0x60,0xf5,0x8d,0x01,0xaf,0x4e,0xe0,0x12,0xba,0xcc,0x31,0x04,0x6c,0x6a,0x8d,0x60,0xca,0xa1,0x14,0x01,0xf1,0xa3,0x7c,0x8b,0xcf,0xfa,0x3f,0x5a,0xac,0x83,0x73,0x2a,0xe4,0x31,0xb0,0x4f .byte 0x62,0x18,0x29,0xc5,0x9a,0xdd,0x53,0xd3,0xa9,0x2a,0xc0,0x38,0x9a,0x54,0x99,0x4f,0x0f,0xf0,0x35,0x94,0x53,0x81,0xd6,0x32,0x66,0x17,0x14,0x74,0x5e,0x40,0xaf,0x4d,0x43,0x41,0x7b,0xe5,0x56,0x7b,0x30,0xbc,0x21,0x80,0x7b,0x88,0x16,0xfc,0x0b,0xb7,0x2c,0xd3,0x69,0x99,0x2d,0xb6,0xd0,0xdd,0x5b,0x87,0x4c,0xf9,0x34,0xde,0xd2,0xb1 .byte 0xb7,0xd3,0x3b,0x06,0x60,0xb2,0x73,0x7e,0xd4,0x24,0x20,0x30,0xf0,0x9c,0x15,0x05,0x03,0xf5,0xc1,0x24,0x58,0x34,0x38,0x39,0x93,0x4b,0x39,0x01,0x98,0x61,0x6e,0x01,0xd4,0xf8,0x08,0xbe,0xe1,0xbd,0x61,0xde,0x2f,0x94,0xea,0x83,0xa1,0x39,0x2f,0xe6,0x26,0x03,0x43,0xf4,0x00,0x0b,0x64,0xcc,0xcb,0xcb,0x13,0xf0,0x02,0xa3,0x93,0xf6 .byte 0xe9,0x3d,0xef,0x84,0x84,0xc3,0xb1,0x56,0x9e,0x4a,0x9c,0xea,0x94,0xce,0xae,0xa6,0xaf,0xbb,0x37,0xc1,0x63,0x06,0xa5,0x3c,0x32,0x9a,0x86,0x54,0xae,0xf4,0x6d,0x06,0x4c,0x72,0x5a,0xc3,0x28,0x35,0x1d,0xc8,0xa8,0x85,0x72,0x9e,0xaa,0x70,0x36,0x44,0xd2,0x80,0x0d,0xa0,0x42,0xfc,0xf0,0x89,0x0b,0x45,0x4e,0x79,0xc4,0x17,0x47,0x2c .byte 0x9d,0x64,0x61,0x31,0xc0,0xcb,0x6b,0x34,0x5c,0xe7,0x45,0xea,0x6f,0x61,0x5e,0x9b,0x34,0x3a,0x6d,0xbc,0x92,0x0c,0x52,0x7e,0x4d,0x7f,0xe9,0xec,0x93,0x2e,0x76,0xbb,0x34,0x2b,0x97,0x49,0x2e,0xfb,0x5f,0x83,0xf8,0x8e,0x78,0xc8,0x18,0xb6,0x81,0x67,0x63,0xe3,0x19,0xab,0x7f,0xd3,0x86,0xbb,0x4e,0x74,0x45,0xf6,0xc3,0xbf,0xf4,0x24 .byte 0x5b,0xae,0x5b,0xa0,0x6f,0xc4,0x30,0x19,0x70,0xfb,0x71,0x37,0x8b,0x80,0xd5,0xb6,0xfc,0xb0,0x3a,0xeb,0x29,0xfd,0xcf,0xfb,0x7e,0x1f,0x94,0xdf,0x34,0xa6,0x6f,0xfe,0x45,0x96,0x7e,0xa5,0x1b,0x1c,0xd1,0x7f,0x04,0x74,0xb1,0xc3,0x85,0x26,0xea,0xa2,0x25,0x80,0x07,0x21,0x2a,0x4c,0xf6,0x21,0xf7,0xad,0x3d,0xfe,0xca,0x98,0x7f,0xad .byte 0xd6,0x83,0xf5,0x3f,0x9d,0xf3,0x3e,0x18,0x4b,0xff,0x8c,0xd7,0x8c,0xeb,0x9b,0xf0,0xd4,0xfe,0x65,0xd3,0x0f,0x49,0xfe,0x9c,0x2f,0x09,0xfb,0xcc,0xca,0x5c,0x73,0x22,0x75,0x98,0x6e,0x94,0xb7,0xe6,0xef,0xe4,0xf8,0xc7,0x40,0xa6,0x0a,0xbc,0x0b,0x0f,0x70,0x34,0xcf,0x5e,0xb6,0x07,0x1c,0xaf,0x79,0xf5,0xf0,0x9e,0x89,0x98,0x51,0x75 .byte 0xe4,0x78,0x78,0x1b,0x32,0x65,0x5a,0x31,0xea,0x0f,0x17,0x3d,0x77,0x75,0x8e,0x99,0xd6,0x23,0xf6,0x26,0x5c,0x19,0x20,0xde,0xf7,0x64,0xdb,0xce,0x80,0x8b,0x5e,0xfc,0x64,0xf9,0x26,0xee,0xf8,0x17,0x38,0xf9,0x92,0x35,0xf1,0x9d,0x1a,0x5c,0x26,0xd9,0x9b,0x72,0x07,0x98,0xac,0xc3,0x07,0x33,0x62,0x17,0xae,0x0f,0x79,0x23,0x3d,0x1d .byte 0x3e,0xc8,0x2f,0xc9,0xc4,0xe9,0x2c,0x64,0x9d,0xfe,0x70,0x28,0x7a,0x89,0xb7,0xa4,0xbd,0xfe,0x61,0x7b,0x64,0x6b,0xa3,0x38,0x59,0x70,0x0b,0xe6,0x6a,0x1f,0x0a,0xb5,0xcb,0xf8,0x0e,0x7a,0xb9,0x87,0x1a,0x44,0xf7,0xcd,0x20,0xcd,0x7e,0xeb,0x22,0x44,0x3f,0x5a,0x42,0xe1,0x8a,0xe4,0x22,0x13,0x2a,0xf1,0x34,0x81,0xa7,0xf8,0x76,0xfe .byte 0x4c,0xeb,0x54,0xe3,0xe9,0xfc,0xe4,0xc5,0x68,0xf0,0x00,0x36,0x8a,0xad,0x7d,0xe5,0x16,0x7f,0xda,0xe8,0x88,0x55,0x25,0x98,0x6b,0x3c,0x3e,0xdc,0xe7,0xf3,0xe2,0x1d,0x66,0xde,0xf9,0xd8,0x08,0x25,0x81,0x4d,0xdc,0x76,0x1c,0xec,0x8b,0x13,0x83,0x47,0x8c,0x6c,0xd4,0x4e,0xce,0x28,0xdd,0x16,0x6a,0x10,0xa8,0x9b,0x21,0xce,0x70,0xfa .byte 0xf6,0x3b,0x0e,0x8f,0x30,0x34,0xad,0xc8,0xe1,0x93,0xf6,0x2b,0xa3,0xb6,0xec,0x8c,0x65,0x03,0x34,0x20,0xba,0xea,0xac,0xad,0x11,0x47,0xa5,0x98,0xf4,0xd3,0x7f,0x53,0xa5,0xc3,0xe3,0x9f,0x6a,0xd5,0xaa,0xe2,0xf8,0x67,0xfe,0xec,0x30,0x8e,0x24,0x01,0x89,0x95,0x42,0x34,0x5b,0xfc,0x7d,0xff,0xb1,0xd4,0x5e,0x5c,0x1a,0x07,0xff,0xd1 .byte 0xd8,0x95,0x43,0x97,0xc9,0xff,0x19,0x21,0xde,0x71,0x91,0x3f,0xfa,0xde,0x00,0xe0,0x7e,0xcc,0x32,0x95,0xb5,0xcb,0x56,0x1f,0x85,0xba,0x02,0x43,0xa8,0xad,0xb2,0xfe,0xdc,0x09,0xee,0xe9,0xb4,0x5b,0x13,0xbb,0x94,0xd3,0xad,0xa2,0x6a,0x6a,0x31,0x64,0x11,0xe0,0x7c,0x36,0xb9,0x21,0x8e,0x24,0xf8,0x85,0xa3,0xe8,0xc3,0x58,0xc6,0x63 .byte 0x4c,0x4a,0x60,0x73,0x99,0xd0,0x83,0x48,0x49,0x1c,0xe9,0x52,0x56,0x51,0x02,0x12,0xc9,0xb8,0x4b,0x7b,0x13,0x83,0xd8,0x64,0xe0,0x21,0xde,0xb5,0xd1,0xe1,0x38,0x25,0x41,0xb7,0xfb,0x04,0x77,0xa0,0x76,0xd6,0x37,0xed,0xe9,0xcb,0x7a,0xae,0xd4,0xcf,0xb3,0x06,0xce,0x52,0x56,0xb8,0x41,0x35,0xf4,0x48,0x34,0xcc,0xde,0x8a,0xc2,0x0d .byte 0x64,0x71,0xa7,0xd4,0x46,0x96,0x23,0x96,0xe9,0x5d,0x17,0x36,0x07,0xb1,0xa6,0xb3,0xda,0xc5,0x0f,0xdd,0xf2,0x35,0x14,0x40,0xab,0x05,0x08,0xf1,0xd1,0xa8,0xc0,0x1b,0xc3,0xa6,0x20,0xa5,0xea,0xd6,0xd7,0x5a,0xa4,0xec,0xa9,0x4a,0xe3,0x4a,0x66,0xc1,0xa0,0xcb,0x35,0x5e,0xc7,0x5f,0xdd,0xb6,0x0e,0xbb,0xa4,0x06,0xf9,0x43,0x8d,0x7d .byte 0xec,0x3b,0xbb,0xd6,0x87,0xb6,0x1c,0x4c,0xd2,0x70,0x84,0x5f,0xed,0x53,0x9e,0xf5,0x9b,0x40,0xda,0xe9,0xbd,0x3f,0x70,0xa6,0x0f,0x91,0xa3,0x56,0xb2,0x83,0xb1,0x1b,0x85,0x4c,0x88,0xb8,0x81,0x37,0x43,0xdc,0x44,0x2a,0x68,0xc0,0xd9,0xc2,0xd5,0xa5,0x7f,0x09,0xab,0xa2,0x00,0x5b,0xb6,0xaf,0x41,0x40,0x65,0xe0,0x83,0x4e,0x72,0x13 .byte 0x92,0x76,0x06,0x31,0xae,0xf8,0xf6,0x31,0xcf,0x12,0xe3,0xa4,0xa3,0x25,0xc1,0xf1,0x4e,0x28,0x59,0x30,0x72,0xb8,0x33,0x69,0x47,0xd7,0x4b,0xbe,0xe8,0xc3,0x36,0xa4,0xc1,0x3d,0xfc,0x59,0xdc,0x4a,0x94,0x3d,0x63,0x08,0xe8,0x56,0xd9,0x08,0x0e,0xdb,0x74,0x57,0x38,0x58,0xcc,0x98,0x07,0x0e,0xf8,0xe5,0xf1,0x9b,0x2c,0x1b,0x35,0xe5 .byte 0xc4,0xee,0xc0,0x61,0xd8,0xc9,0x36,0xea,0x72,0x5e,0x55,0xe2,0xec,0xb0,0x1d,0x13,0xd7,0xd1,0x3f,0x11,0x2b,0x58,0xf4,0xdd,0x25,0xba,0x95,0x27,0xfd,0xdc,0x49,0x7e,0xb6,0x87,0x34,0x72,0x7d,0x21,0x8a,0x4e,0x26,0x62,0x9a,0x8a,0xd6,0xe4,0x8c,0x56,0x3f,0x19,0x0d,0x80,0xbb,0x5d,0xc5,0x73,0x56,0xf4,0x1d,0x9f,0xb0,0x8e,0x87,0x64 .byte 0x51,0xf6,0xab,0xa1,0xa5,0x8c,0xf8,0xf4,0x39,0x8e,0x34,0xbb,0x54,0x49,0x2b,0xca,0x9e,0x47,0xbe,0xb5,0xc4,0x70,0xca,0x59,0x10,0x9d,0x57,0xd5,0x7c,0x48,0xdf,0x46,0xa3,0xf0,0xfd,0x9a,0x99,0x3c,0x84,0x95,0x36,0x39,0xbb,0x41,0xd3,0xab,0x6f,0x18,0x65,0x4b,0x10,0xe6,0x80,0xd2,0xd6,0xce,0x6a,0xd7,0xf6,0xd3,0x73,0x7e,0x35,0x9f .byte 0x7b,0xe7,0x89,0x00,0x17,0x71,0xfd,0x15,0xf2,0x85,0xa9,0x93,0xbb,0x77,0x13,0xb2,0xf4,0xbb,0x9e,0x37,0x0a,0x5d,0x4d,0x25,0x53,0x38,0xf3,0xee,0x92,0xa3,0x02,0x56,0x2a,0xb8,0x1a,0x54,0x06,0x7b,0x65,0x37,0x5c,0x90,0x39,0x3e,0x67,0x97,0x21,0xd1,0xac,0xd3,0xab,0x6e,0xa6,0x2a,0x19,0xc6,0x26,0xf8,0x12,0xc2,0xd5,0x9a,0x22,0xd8 .byte 0x9d,0x42,0x32,0x4b,0xe1,0x22,0x8c,0x3c,0x2a,0xe8,0x81,0x0d,0x05,0x87,0xce,0xf0,0x30,0x05,0x57,0xf0,0xef,0x18,0x52,0x62,0x28,0xd5,0x89,0xed,0x54,0x64,0xa4,0x1d,0x62,0x75,0x09,0x85,0x48,0x95,0xfe,0x84,0x3c,0x85,0x4e,0xa7,0x27,0x38,0x3e,0x83,0x0e,0x0c,0xfe,0xa7,0x6d,0x1e,0x2f,0x3f,0x7b,0xa5,0x44,0xc7,0xd9,0x10,0xdc,0xa9 .byte 0x27,0x16,0xda,0x75,0x49,0x12,0xde,0xa8,0x3e,0x3b,0x29,0x92,0x93,0xb1,0x0b,0xa7,0xc2,0x74,0xb4,0x0a,0x35,0xbc,0xac,0x29,0x87,0xde,0xd3,0x3f,0x73,0x4f,0xab,0x6a,0xd8,0x35,0x49,0x47,0xc7,0x07,0x85,0x53,0x48,0xe9,0x31,0xe3,0x4c,0x9f,0x64,0x5e,0xcd,0x01,0x82,0xbd,0x61,0xdc,0x47,0x82,0xc4,0x9b,0x4d,0xa4,0x6a,0xe4,0xc5,0x02 .byte 0x90,0x3f,0xd6,0x42,0x58,0xe2,0x7a,0xed,0x23,0x47,0x3e,0x93,0x6c,0xa4,0xf9,0xb8,0x60,0x5b,0x35,0xe2,0x8a,0x4d,0xdd,0x18,0x75,0xee,0x0f,0xd7,0x47,0x6a,0x9b,0x32,0xda,0x62,0x90,0x12,0x77,0x9b,0x00,0x30,0x3a,0x78,0x3d,0x70,0x30,0xde,0x5d,0x3d,0xe4,0x4f,0xef,0x9d,0x06,0x97,0x93,0x1e,0xfe,0x10,0xf7,0xd6,0x23,0x93,0x2f,0x52 .byte 0xd7,0x22,0xd0,0x45,0xe8,0x4d,0x28,0x9d,0x52,0x2f,0x11,0x64,0x0e,0x99,0xa3,0x40,0x93,0x3a,0x02,0xf9,0x4c,0xee,0xd9,0x59,0x33,0x0b,0x06,0xef,0xda,0x0c,0x35,0x74,0xfe,0x42,0x34,0xdd,0x64,0xf0,0x08,0x46,0x92,0xc4,0x40,0x12,0x58,0x3f,0xa9,0x2e,0x72,0x25,0x93,0xdf,0x39,0xe1,0x8d,0xb5,0x1a,0xf8,0xe0,0x70,0x8b,0x38,0x12,0xc0 .byte 0xa2,0x2e,0xa2,0x4e,0x33,0x82,0x6f,0xe4,0xe0,0xf3,0x91,0x5c,0x79,0x23,0xf4,0x05,0x77,0x09,0x0b,0x78,0x29,0x85,0x1b,0x99,0xa4,0xc5,0x6c,0x90,0xb3,0x2c,0xb6,0x79,0xe7,0xa8,0xe5,0xa8,0x5a,0xd5,0x10,0xc7,0xca,0x12,0x84,0x18,0x37,0x83,0x79,0x5a,0xa2,0x9d,0xd4,0xe8,0xc0,0xd2,0x88,0xf9,0x24,0x87,0x18,0x0e,0x8c,0x28,0xd6,0x8f .byte 0x58,0x50,0x10,0xcc,0x1d,0x20,0x76,0x8d,0x1a,0xf0,0x2a,0x99,0xa3,0x81,0xb6,0xa8,0x88,0x3d,0xcf,0xc0,0x60,0xc4,0x44,0xb7,0x04,0xb6,0x2a,0x18,0xf5,0xf4,0x63,0xf9,0x7d,0x64,0x93,0x98,0xcf,0x48,0x80,0xc6,0xdc,0xf6,0x39,0x0c,0x62,0x85,0x51,0xea,0xe2,0x4c,0x9f,0x82,0x5e,0x89,0x39,0xd7,0x97,0x72,0x34,0x36,0x98,0xad,0x79,0x65 .byte 0x56,0x22,0x59,0xe9,0x9f,0x4d,0x05,0x04,0x6a,0xc7,0xde,0x2b,0x61,0xe1,0xe0,0x05,0x49,0xb8,0xc7,0x4c,0x08,0x92,0xf5,0xdc,0x2f,0xc0,0x66,0x40,0x35,0xdb,0xab,0x1a,0xfb,0xbb,0x5c,0xe1,0x83,0xc9,0x88,0x4c,0xa0,0x65,0x8f,0x25,0xb6,0x15,0x93,0x11,0xbc,0x32,0x45,0x22,0x52,0x62,0x4d,0xc0,0xc1,0xb1,0xc3,0x60,0x65,0xda,0xf9,0x09 .byte 0x52,0xe7,0x9c,0xcf,0x75,0x28,0x37,0x30,0x06,0xdf,0x3b,0x63,0x30,0x06,0x27,0x28,0xea,0x48,0x76,0x10,0x9b,0x69,0x99,0x99,0xd5,0x9b,0x0b,0x01,0x57,0xdb,0xdb,0x50,0x6d,0x54,0xf3,0x52,0xf6,0x9b,0x02,0x2d,0x10,0x70,0x37,0x37,0xbe,0x07,0x44,0xc5,0xd0,0xa5,0x1b,0x3d,0x42,0xba,0xeb,0x4a,0x87,0xdf,0x36,0x1e,0xe3,0x9d,0x77,0x63 .byte 0xc7,0xd5,0x97,0xdf,0x24,0x95,0x6f,0xf3,0x94,0xc6,0xb1,0xf1,0xc7,0x60,0x3e,0x98,0x74,0x63,0x24,0x9c,0xb9,0x5f,0x04,0x41,0xbf,0x7c,0xf4,0x6d,0x20,0x30,0x6b,0xde,0x1b,0x01,0x31,0x05,0x33,0x10,0xb1,0xec,0x9d,0x2f,0xfe,0xe9,0x8c,0x1a,0x04,0x24,0x14,0x71,0x11,0xcc,0x21,0x30,0x27,0x3e,0x9c,0x98,0x88,0xfa,0x7b,0xd5,0xe2,0x43 .byte 0x1f,0x61,0xd7,0x57,0x66,0x0c,0x34,0x7a,0x1d,0x96,0x06,0x90,0x7b,0xca,0xf1,0x01,0x1e,0x20,0x6d,0x1e,0x19,0x1e,0x5f,0xde,0xe2,0xaa,0xfb,0x9c,0xd9,0x00,0x65,0x2b,0x90,0x02,0x9a,0x84,0x66,0xd7,0x7f,0x65,0x3f,0x03,0xf2,0x03,0xf3,0xd8,0x17,0xda,0xf9,0x04,0x82,0x11,0x72,0x90,0x0c,0x44,0x6d,0xde,0x51,0xae,0xa5,0xaf,0x19,0x50 .byte 0xc5,0x41,0x5d,0x05,0xb4,0x9f,0x48,0x20,0xbe,0x7d,0x48,0xb7,0xda,0x1f,0x90,0x77,0xe3,0x53,0x25,0xc7,0xed,0x3b,0x85,0xa5,0x7e,0x4d,0xe8,0x1f,0xa3,0x6f,0x2f,0x72,0x92,0x1f,0xe5,0x7c,0x34,0xcb,0xbc,0xd7,0xbf,0x01,0x20,0x9d,0xc6,0x7e,0xec,0x6d,0x51,0xf7,0x6d,0xd8,0xe6,0xb8,0xbe,0x32,0x8e,0x65,0xaf,0xea,0xae,0xcb,0x03,0x74 .byte 0x1f,0xb6,0x7a,0xdf,0xfc,0xcf,0x19,0xcf,0x75,0x3d,0xd6,0xda,0xee,0xf7,0xde,0xcf,0x1d,0xc2,0xbb,0x2e,0x30,0xf0,0x3d,0xda,0x18,0xaf,0xcd,0x7f,0x06,0x17,0xea,0x7f,0x4d,0xda,0x9b,0x9a,0xcb,0xcd,0x4d,0x3d,0x6b,0xb2,0x57,0x4e,0x8b,0x0e,0x5f,0x6b,0x58,0x13,0x6b,0xef,0x2e,0x66,0x26,0x0d,0x6b,0xd8,0xf8,0xbe,0x83,0xc9,0xd0,0x48 .byte 0xed,0xe4,0x03,0x05,0x81,0x13,0x82,0x64,0x9e,0x5c,0xc9,0xaf,0x84,0x90,0xd5,0x4b,0xec,0x02,0x1c,0xcd,0x32,0x3f,0x0b,0xc6,0x39,0x2c,0xcf,0xf7,0x86,0xbd,0xc0,0x06,0xe8,0x75,0x4b,0x45,0xa8,0x47,0xfc,0x19,0x6b,0x93,0x87,0xb3,0x4a,0x80,0x18,0xcd,0xba,0x1e,0x05,0xf6,0x16,0xb5,0xae,0xbd,0x40,0xd0,0xf1,0xd5,0xe9,0x0c,0xf5,0x89 .byte 0x0c,0x6f,0x9c,0x4e,0x75,0x72,0x48,0x7a,0x00,0x78,0xcb,0xf8,0xd7,0xce,0xb8,0x85,0xa6,0x62,0x6d,0x38,0x9c,0x83,0x64,0x03,0x4e,0xee,0xe6,0x62,0xe4,0x2a,0x40,0x86,0x99,0x62,0x76,0x0e,0x43,0x02,0x70,0x78,0x2d,0xa4,0xb5,0x6c,0x87,0x43,0xcc,0x04,0x4b,0xf5,0x46,0xdc,0x79,0x55,0x7e,0x27,0x0a,0x22,0x5a,0x2c,0x53,0xc3,0x23,0x48 .byte 0x17,0x16,0x44,0xf0,0x1d,0x40,0xa2,0x10,0x13,0x5d,0x44,0x54,0x14,0x77,0x6f,0x04,0xa2,0xa7,0x08,0x92,0xaa,0xd5,0x82,0xb4,0x74,0xa7,0xe1,0xe4,0x17,0x5e,0x9c,0x9c,0x88,0xab,0x24,0x9e,0x60,0xe7,0xe8,0xb2,0xf3,0x11,0x28,0xa9,0x9e,0x5f,0x21,0x14,0xe3,0x4d,0xc3,0x29,0xd2,0xc6,0x84,0x17,0x1b,0xa3,0x65,0x6d,0x4e,0x93,0xc7,0x61 .byte 0x30,0x53,0xd9,0x6b,0xc0,0x82,0xf4,0x7e,0xf4,0x79,0xff,0x59,0x06,0x6e,0xe1,0xea,0x45,0x3c,0x0f,0xfe,0x89,0x0d,0xa1,0x5e,0xbc,0x98,0x0c,0x0e,0xb9,0x21,0xc3,0xe8,0xd2,0xf1,0xd9,0x90,0x3c,0x9c,0xee,0x89,0xbd,0xb2,0xa6,0x21,0xfd,0xfc,0x1a,0xd2,0x3e,0x05,0xc5,0xb5,0x92,0xb1,0xb8,0xf2,0xab,0xb8,0x19,0x2b,0x83,0x80,0x8c,0xda .byte 0x43,0xef,0x16,0xef,0xed,0x15,0xe4,0x62,0xab,0x31,0x55,0x29,0xd5,0x2b,0xad,0x3b,0xb6,0x5a,0xc3,0x72,0x25,0x0c,0xfd,0x54,0x9e,0x4e,0x34,0x6f,0x77,0x6c,0x80,0x85,0x4a,0x7c,0xe3,0xb0,0x36,0x59,0x6b,0x3c,0xd9,0xf9,0x44,0x65,0xb6,0x4f,0x99,0x54,0xa4,0x73,0xef,0x4a,0xa8,0x41,0xab,0x66,0x42,0xfb,0x0e,0x3d,0x6f,0x8d,0xed,0x98 .byte 0x8f,0xdb,0xa1,0x51,0x5b,0xdc,0x16,0xc9,0x38,0xbf,0x07,0x1c,0x6d,0xb0,0x1f,0x23,0x3f,0xc5,0x9d,0xc4,0x6c,0xcf,0xd5,0xad,0x7d,0x8c,0xc6,0x59,0xe1,0x7d,0x65,0x0c,0x7c,0xd1,0x57,0x4b,0x92,0x30,0xe8,0xcd,0x81,0x4f,0xba,0x49,0xcc,0xb4,0x54,0xe8,0xc4,0x1e,0x73,0x3b,0x86,0x4f,0xfb,0x4d,0xcd,0xbc,0x13,0x8c,0x64,0x3d,0xdd,0xd5 .byte 0xed,0xb0,0xd3,0xdd,0x4f,0x1b,0x53,0xeb,0xc7,0x20,0xac,0xcd,0x69,0xa6,0xf0,0xfd,0xe5,0xfc,0xe6,0x68,0x17,0xcc,0xa9,0x97,0x44,0xe4,0x56,0x14,0xc6,0xa3,0x89,0xc0,0x0e,0xaa,0x64,0xd0,0x6b,0xbb,0xd3,0xcc,0xca,0xf2,0xe0,0x13,0x1a,0x46,0x39,0x71,0x60,0x91,0xe1,0xda,0x63,0xb5,0xd3,0xd9,0x02,0xa1,0x4d,0xc0,0x4d,0xc6,0x25,0xf8 .byte 0x8a,0xc5,0xf3,0x9c,0x64,0x74,0xb8,0xbf,0x31,0x4a,0xb6,0xbe,0xd3,0x63,0x5e,0x3f,0xce,0x57,0x37,0x43,0xff,0xb9,0x84,0xdc,0x6b,0x8d,0xfc,0xe3,0x7c,0x01,0x2a,0x81,0x2b,0x8c,0x78,0xf4,0x7e,0xe4,0x80,0x26,0xc5,0xd8,0x01,0x87,0x3f,0xe3,0x33,0x46,0x96,0x67,0xda,0x9c,0x2b,0x41,0x3e,0x9a,0x3e,0x51,0xef,0x63,0x73,0x36,0x4e,0x30 .byte 0x65,0x37,0xd1,0xb2,0x50,0xad,0xa7,0xf1,0xca,0x5b,0x11,0xeb,0x56,0x23,0xee,0x65,0x1d,0x5d,0x08,0x68,0x0f,0xb9,0xcf,0xca,0x16,0x7b,0x02,0xf0,0x47,0xe5,0x99,0x14,0xa0,0x67,0xf3,0xfc,0x86,0xf9,0x82,0xdf,0x20,0xd4,0xf9,0x7c,0x4d,0x08,0x06,0x0f,0x1a,0x9d,0x11,0x08,0x13,0xfd,0xb5,0xc5,0x3f,0xff,0xce,0xcf,0x68,0x5f,0xe8,0xae .byte 0x3e,0x9d,0x04,0x94,0xde,0xe2,0x49,0x45,0x6c,0xd7,0xb0,0x79,0xbd,0xc3,0xba,0xb8,0x58,0xbf,0x4f,0x0f,0x56,0xb5,0x39,0x92,0x36,0xd9,0x8e,0x7e,0xac,0x4d,0x9c,0xf9,0x30,0x97,0x71,0xcd,0x1b,0x40,0xf5,0xb8,0xb3,0xeb,0x33,0xf7,0xd9,0xde,0xb3,0x1c,0x7a,0xe1,0xda,0x00,0x43,0xe3,0x17,0x40,0x80,0x49,0x42,0x64,0xe9,0xf6,0x7e,0xe9 .byte 0xeb,0xc7,0xcd,0xf2,0x5e,0xcf,0xfd,0x60,0x08,0xd4,0x13,0x48,0xa9,0x4d,0x38,0xc9,0x14,0x48,0x98,0xef,0x74,0x50,0xa0,0xe4,0x2c,0xdb,0xba,0xb3,0x9a,0xbc,0xd1,0xc6,0x36,0xc3,0x5e,0xa7,0x8e,0xec,0x38,0x8d,0x95,0x32,0x8c,0x90,0x48,0xe0,0x26,0x81,0xe9,0xe3,0xfb,0xdb,0xbf,0x61,0x4f,0xa4,0x69,0x2e,0x57,0x90,0x9b,0xb2,0x0a,0x91 .byte 0x59,0x0b,0x83,0xed,0x15,0x3c,0xad,0xdf,0x99,0x59,0xc6,0x2f,0x8a,0xc6,0xcf,0xb4,0x3f,0xef,0x6e,0xe7,0x03,0x8a,0x95,0x34,0x32,0xbd,0xb4,0xda,0x23,0x64,0xae,0x5b,0xcf,0x95,0xa7,0x8d,0x55,0xd2,0x8c,0x3f,0x0a,0xcb,0x43,0x9f,0xf2,0xf2,0xa7,0x53,0xcd,0x7b,0xa7,0xa3,0x63,0x6d,0xae,0x87,0xec,0x01,0x19,0x6f,0x30,0x32,0x88,0xaf .byte 0xda,0x33,0x09,0xc7,0xf3,0x04,0xed,0xb9,0xc4,0x26,0x5e,0x59,0x9a,0x36,0xc6,0xb0,0x48,0x3b,0x6f,0x47,0x77,0x9e,0xaa,0x65,0x4b,0x3b,0xad,0x61,0x83,0x9a,0x60,0xb0,0xd3,0x1a,0x3a,0x75,0x60,0x6a,0x97,0x48,0xb5,0xc4,0x52,0x7f,0x21,0xef,0x81,0x56,0xc8,0x5c,0x45,0x38,0x32,0xa9,0x01,0xc3,0xdb,0xc3,0x3a,0xcf,0xa6,0x0d,0xcd,0x8b .byte 0x05,0xf8,0x8a,0x9b,0xca,0x54,0x5c,0x54,0x9b,0x34,0x04,0x79,0x22,0xdc,0xe4,0x02,0x8f,0x8c,0x90,0x62,0xd6,0x4e,0xb2,0x25,0xfd,0xab,0x73,0xcc,0xa8,0x4b,0x2a,0xf8,0x2f,0x95,0x94,0x53,0x1f,0xf4,0x7c,0x5a,0x47,0xaa,0x36,0xfa,0xba,0xcd,0x00,0x69,0xa1,0xdb,0x55,0xbd,0x2f,0xb9,0x2b,0x17,0x04,0x6b,0x54,0xe1,0x5d,0xa6,0x63,0x81 .byte 0x2e,0x70,0x73,0xff,0x00,0xdf,0xa7,0x26,0x1d,0x7b,0x18,0xdb,0x49,0xbe,0xaa,0x87,0x91,0x0c,0xbb,0xed,0x87,0x8e,0x55,0x8b,0x3c,0x70,0x95,0x31,0xd2,0x1f,0x15,0x65,0xaa,0x5f,0xe0,0xb2,0x14,0x03,0x2f,0x99,0xff,0xaa,0xfe,0x83,0x5b,0x4c,0xdb,0xa9,0xce,0x28,0x78,0x71,0xf2,0x2e,0x1b,0x6f,0xa8,0x53,0x0b,0xa3,0x8f,0x9e,0xb0,0xd1 .byte 0x94,0xed,0x24,0x0c,0x5d,0xa6,0xf8,0x06,0xd6,0xf1,0xb5,0x3d,0x59,0x4f,0x6a,0x87,0x23,0xc9,0x75,0xb5,0x84,0xee,0xb0,0x23,0x43,0x3e,0x77,0x66,0x73,0x7c,0x8f,0xe4,0x1d,0x79,0x34,0x6d,0x11,0xfa,0xd8,0xe3,0x28,0xa0,0x25,0x91,0x73,0x18,0xec,0xb7,0x67,0xa6,0x02,0xa0,0x3f,0xac,0x02,0x13,0x09,0xfa,0xca,0x7f,0xea,0x46,0xaf,0x10 .byte 0x61,0x15,0xf2,0x53,0xec,0xe3,0xb3,0x8b,0x0b,0xac,0x4c,0xbb,0x57,0x28,0x40,0x7b,0xef,0xf6,0x40,0xf1,0x2b,0xaa,0xe7,0x28,0xad,0xf6,0x95,0xca,0x1f,0x10,0x0e,0x8e,0xc8,0x79,0xfb,0xa8,0x92,0x25,0xfd,0xdb,0x0e,0x23,0x11,0x56,0xa9,0x94,0x01,0xa6,0xa3,0x02,0x74,0xd3,0xdd,0x38,0x27,0x33,0x03,0xb6,0x60,0x10,0x37,0x31,0xa8,0xd7 .byte 0x0b,0x01,0x9f,0xe4,0xbe,0x0e,0xb9,0x87,0xb5,0x91,0x6f,0xc7,0xd6,0x02,0x6f,0x8e,0xba,0x89,0x9a,0xd3,0x55,0x7c,0x04,0x10,0x92,0xa9,0xe4,0x50,0xfb,0x4a,0x60,0xca,0xc7,0x87,0x02,0x34,0x43,0xc3,0x14,0x98,0x62,0x3f,0xea,0x94,0x92,0x70,0xd8,0x91,0xe5,0xf7,0xdc,0x91,0x4b,0xb7,0xfc,0x6c,0x7f,0xb6,0x55,0xfb,0x91,0xdf,0x91,0x2e .byte 0x22,0x89,0xbb,0xf3,0x5f,0xb3,0x15,0x33,0x1e,0x8f,0x0a,0x98,0x28,0x61,0x15,0x0a,0x3b,0x0a,0xd1,0x21,0x85,0xfd,0x60,0x9a,0x51,0x5a,0x05,0x4f,0x57,0x59,0xdf,0xda,0x9f,0x08,0xe4,0xe1,0x0e,0xee,0x7b,0x3a,0x71,0x05,0x0b,0xad,0xb0,0xd1,0xbb,0x5b,0xe3,0x05,0xe6,0x25,0x42,0xf4,0x82,0x4d,0x5f,0x1d,0x23,0xe6,0x16,0xc8,0x60,0x20 .byte 0x37,0x27,0xca,0x65,0xe7,0x12,0xa8,0x0b,0xbc,0x37,0x93,0xe9,0xec,0xae,0x98,0x17,0xd1,0x96,0xe7,0xfe,0xf6,0xda,0x18,0x40,0xab,0x81,0x38,0x6e,0x83,0xcd,0x49,0x3c,0xe5,0xcc,0xf6,0x97,0x45,0xf9,0x4d,0x31,0x33,0x40,0xf2,0x07,0xef,0xae,0x9b,0x1f,0xab,0xde,0x07,0xb9,0xa1,0x43,0x86,0x80,0xd0,0x54,0xb1,0x44,0xce,0x91,0xaf,0x0c .byte 0xdc,0xa7,0x83,0xda,0x73,0x44,0xb2,0x5c,0xe2,0xf0,0xf5,0x88,0x95,0xe1,0x36,0xcb,0x37,0x0a,0x61,0x6d,0x56,0x69,0xdf,0x95,0x79,0x97,0xb0,0x86,0x8b,0x96,0xbf,0xe8,0x89,0xfc,0x8f,0xc9,0x41,0xe3,0xe4,0xd3,0xf0,0xed,0xd1,0x97,0xd1,0x5e,0xa8,0xcf,0x71,0x4d,0xd5,0x72,0xd0,0x94,0x48,0x86,0xba,0x0d,0x6c,0xe0,0xf1,0x81,0x74,0x6a .byte 0x0d,0x75,0xc8,0xd3,0xbc,0xd8,0x8d,0xa9,0xf5,0x44,0xc2,0x5f,0x45,0xa7,0xd1,0x9a,0xd1,0x5a,0xc7,0x39,0x9a,0x62,0x0d,0x85,0xba,0x25,0xa7,0xf4,0xcc,0x24,0xe0,0x02,0xdf,0x50,0xab,0xea,0x2f,0xc3,0x0d,0x7d,0xce,0x15,0x9d,0x8c,0x6c,0x16,0x4f,0xde,0x72,0xb2,0x40,0xef,0x9c,0x36,0xcf,0xeb,0x3b,0x17,0x88,0xd5,0xc1,0x3e,0x35,0x8b .byte 0xa3,0xe6,0x38,0xfd,0xac,0x9b,0x15,0x3c,0x8c,0x34,0x31,0x7b,0x47,0x31,0x06,0x1f,0xfc,0x23,0x34,0xa9,0x2d,0x7b,0x0a,0xe6,0x17,0xbf,0x2c,0x1d,0xf6,0xd3,0xa4,0xcf,0x47,0x63,0x58,0x83,0x63,0xcf,0xc1,0x57,0x01,0xb7,0xe6,0x4c,0xe5,0x7b,0xc6,0x40,0xa9,0x18,0x1c,0xc0,0x3c,0xca,0x87,0xd5,0xf7,0x72,0xe5,0xc6,0x24,0x4b,0xc6,0x06 .byte 0x60,0x50,0x5b,0x36,0x66,0x47,0x28,0xdc,0x4a,0xea,0x2d,0x6a,0x8f,0x1e,0xfe,0x26,0xdd,0x76,0xb4,0x33,0x20,0x90,0x3f,0x0c,0xa8,0xaa,0x12,0x80,0x72,0x0a,0x9c,0xe1,0x95,0xb1,0x9c,0xbb,0xdd,0x66,0x04,0xa9,0x3b,0xad,0xc4,0xaa,0xd0,0x38,0xb0,0x62,0x8b,0x12,0x60,0x7f,0x73,0x67,0x2e,0xb8,0x85,0xfd,0x61,0x37,0xa6,0xdf,0xa7,0x9e .byte 0x3d,0x98,0xe2,0xc2,0x2d,0xff,0x56,0x4f,0x9b,0x96,0x2d,0x21,0xca,0xc8,0x4c,0x75,0x2d,0xac,0x3b,0x2d,0x73,0x2e,0xe3,0xe8,0x6a,0x98,0x86,0x39,0x25,0x7f,0x08,0x44,0x31,0x35,0x8c,0x43,0xbc,0xf7,0x12,0xd8,0x3e,0x3a,0x9e,0xe7,0x2a,0xf9,0x49,0x96,0x95,0x14,0xb2,0xa9,0xb3,0x85,0x46,0x43,0x3b,0x31,0x37,0xe9,0xf3,0x93,0x3e,0x7e .byte 0xba,0x13,0x28,0x8a,0x67,0x16,0x8f,0x5e,0x4a,0xe5,0x52,0x67,0xdc,0x86,0xab,0x26,0x6d,0x23,0x25,0xb3,0xa3,0x46,0x29,0x73,0x72,0x38,0x7b,0x4a,0xe1,0xa7,0xeb,0x18,0xd1,0xdd,0xa1,0xe6,0xcd,0x00,0xdf,0x72,0x93,0xea,0xae,0xf2,0x27,0x49,0x01,0xdc,0x9d,0xc7,0xbd,0x4e,0xd5,0x7f,0x88,0x50,0xa8,0x3d,0xc3,0xb7,0x10,0xee,0x3f,0xe2 .byte 0x87,0xc2,0x95,0x48,0xdb,0xf0,0x95,0x8e,0xac,0x9d,0xde,0x3e,0xe6,0x4a,0xc6,0xe5,0x42,0xab,0x10,0xc2,0xd9,0xc6,0x43,0x9b,0xeb,0xd9,0xa6,0x39,0x86,0xfb,0x9a,0x3b,0x33,0x31,0x19,0x7e,0x8b,0x77,0x2f,0x75,0x53,0x63,0xbd,0xa3,0x84,0x8a,0xb9,0x09,0xcd,0x2e,0x58,0x75,0xcb,0x40,0x87,0xc9,0x7f,0x66,0x30,0x9f,0x21,0xb5,0x42,0x44 .byte 0x7f,0xcc,0x89,0x0b,0x01,0x8a,0x8f,0x5d,0x83,0x12,0x65,0x19,0x4f,0xd9,0x50,0x14,0x3a,0x42,0xaf,0xa2,0x75,0x91,0x6b,0xc5,0x15,0xb3,0x6f,0x3b,0x4f,0xdf,0xd9,0xe3,0x67,0xf0,0x0d,0x5b,0x0e,0x45,0x25,0xd3,0x01,0x7e,0x7f,0xc9,0x32,0x46,0xb6,0xd0,0x15,0x2e,0xfa,0xdf,0x5c,0xa4,0x2d,0x73,0x19,0x49,0xed,0xdb,0x09,0xde,0x7f,0x6b .byte 0x2e,0xce,0xa5,0xeb,0x0b,0xc9,0xf6,0x03,0x6f,0x52,0x2e,0x01,0xab,0x09,0xd5,0x0c,0x74,0x2b,0x73,0x9a,0xf1,0xe7,0x3f,0x5d,0xdb,0x15,0x8e,0x36,0x1f,0x88,0x42,0xdb,0x49,0xd8,0xcf,0x0c,0x63,0x3a,0x60,0x0b,0x10,0xa2,0xbf,0xc1,0xb0,0x7c,0x91,0xf5,0x16,0x9b,0x66,0x3e,0x41,0x03,0x5e,0x5a,0x8e,0x0f,0x98,0x34,0x44,0x5b,0xde,0x1a .byte 0x74,0xff,0x47,0xc8,0x27,0xdf,0x01,0xc2,0x94,0xce,0x38,0xbc,0x06,0xb9,0xef,0x93,0xd2,0x55,0x6e,0x4a,0x45,0xfb,0x42,0xd0,0xc1,0xac,0x0c,0xae,0xfb,0x76,0x2d,0xb4,0xcd,0x33,0x33,0x53,0xcc,0xd4,0x41,0xab,0x99,0xaf,0xbe,0x26,0x05,0x77,0x43,0xfc,0x3d,0xf2,0x70,0xea,0x44,0xf8,0x21,0x67,0xad,0x4b,0xfe,0xce,0xca,0x35,0x02,0x1c .byte 0xd1,0xec,0xa5,0x5f,0xc6,0xe0,0x54,0xca,0xf7,0x8f,0xaf,0x8b,0xc1,0xe5,0x87,0x90,0x0e,0x6b,0x5f,0xf4,0x07,0xe9,0xb5,0x66,0xd8,0x89,0x12,0x32,0x9c,0x62,0x7d,0x4a,0x84,0x27,0xb1,0xd7,0x01,0x68,0x84,0x94,0x85,0xa4,0x9e,0xba,0x9c,0x29,0x5a,0x1c,0xb6,0x3c,0xeb,0x5b,0x82,0x2d,0xec,0x12,0x73,0x4f,0x1f,0x78,0xa2,0xc5,0x84,0xfb .byte 0x1c,0xfa,0xdb,0x7d,0xd8,0x4e,0xd5,0x37,0xc5,0x70,0xe1,0x09,0x05,0xc7,0xfe,0x9d,0xe5,0x3d,0x64,0x9c,0xf9,0xce,0x74,0x4c,0xac,0xaf,0x35,0xd0,0x5e,0xac,0x3d,0x11,0x81,0x96,0x31,0x0b,0x46,0x66,0x1c,0x72,0xbf,0x7e,0x0d,0xc9,0xb6,0x61,0x06,0xd2,0x7e,0x23,0xfe,0xc1,0xaa,0x62,0x96,0x03,0x72,0x72,0x4b,0xca,0x9e,0x17,0xdc,0xdc .byte 0x31,0xd7,0x68,0xaf,0xb9,0xc7,0xb7,0x4a,0x6c,0x15,0xca,0x1f,0x43,0x76,0xcf,0x1a,0xcd,0xbd,0x2e,0xf5,0xe7,0xd5,0x2e,0x0d,0x6e,0x59,0xf8,0xc8,0x35,0x78,0x23,0x82,0xbe,0x70,0x0f,0x40,0xc0,0x55,0x8a,0x08,0x81,0xf1,0x74,0xd2,0x37,0x5d,0xe9,0x22,0xff,0x18,0x1d,0x9f,0x2e,0x98,0xe0,0x97,0x09,0x18,0x62,0xe8,0x2a,0x10,0xfc,0x28 .byte 0x7c,0x27,0xe9,0x0f,0x86,0xf6,0xc0,0xe5,0xeb,0x45,0x5a,0xd9,0x81,0x25,0x0d,0x06,0x54,0xdf,0xde,0x46,0xd3,0x6e,0x08,0x69,0xf9,0x76,0x63,0x66,0x9d,0xfb,0x9c,0xca,0xb2,0x32,0x08,0x96,0x7f,0xab,0xa0,0x65,0xf0,0xac,0x1e,0xce,0x74,0x63,0xaf,0x1b,0xf3,0xdc,0x12,0x0c,0x59,0x86,0xbe,0x74,0xc6,0x80,0x66,0x74,0x78,0x9c,0x0c,0x1e .byte 0x6e,0xf6,0xdf,0x39,0x79,0xfb,0x8e,0x8c,0x28,0x85,0x6f,0xfc,0x16,0xb0,0x39,0xea,0x67,0xf6,0x1c,0x41,0x10,0x90,0x0f,0x80,0x63,0x84,0x04,0xaa,0x6e,0x8e,0xfa,0xe2,0x2b,0x5c,0xa7,0x52,0x43,0x93,0xa5,0x16,0xd6,0x6c,0x9c,0x07,0x25,0xd8,0xa3,0xd5,0xb0,0xba,0x2a,0xd3,0xea,0xdc,0x9b,0xb6,0xc1,0x07,0x7d,0xd0,0xb5,0x28,0x52,0xdc .byte 0x1b,0xf7,0xeb,0xb0,0x5b,0xd2,0x20,0x0b,0xab,0xf5,0x96,0x83,0x3f,0x2b,0x7d,0xab,0x7e,0x61,0x13,0x7e,0xd8,0x07,0x2b,0xee,0xbe,0xe7,0x78,0x66,0xec,0x7d,0xc2,0xfd,0x41,0xd8,0x18,0x8b,0x8b,0x3b,0x46,0x9d,0xc8,0xd6,0xe7,0x75,0xc2,0x2d,0xf3,0xdb,0x20,0x2d,0x8c,0x8e,0x74,0xf4,0xe2,0x69,0xad,0xde,0x99,0x0b,0xf1,0xaa,0xa1,0x57 .byte 0xb0,0xd9,0x4e,0x0e,0xf5,0xfc,0x8a,0xf2,0xff,0xf2,0xbc,0xdb,0xf4,0x8b,0xff,0xf0,0xd9,0x20,0x5f,0x0f,0x80,0x43,0xaa,0x1d,0x76,0x3c,0x7d,0xad,0xf3,0x93,0x6b,0xab,0xd3,0x8d,0x35,0x1c,0x03,0xe0,0x76,0x25,0xa8,0x1f,0xdb,0x19,0x48,0x8c,0x33,0x21,0xae,0x34,0xae,0x34,0x54,0xe2,0x42,0x66,0x67,0xdb,0x90,0x21,0x46,0x16,0x1a,0xac .byte 0xf6,0x4f,0x77,0x66,0x50,0x52,0x68,0x80,0xeb,0x79,0x27,0xb1,0x24,0x81,0x75,0xde,0xe4,0x13,0x0c,0xff,0xd0,0xed,0x0a,0x98,0x04,0x70,0x05,0x2e,0xd9,0x67,0x4c,0x4e,0x93,0x49,0x08,0xb4,0x97,0x3e,0xc1,0x7c,0xc3,0xc1,0x42,0x40,0x69,0x53,0xd6,0x90,0xf5,0x85,0x39,0xa4,0x8d,0x8f,0xd2,0xf1,0x50,0x87,0x10,0x3e,0x5b,0x86,0xb3,0xd6 .byte 0xee,0x60,0x05,0x4c,0x83,0x9f,0x27,0xa9,0xfc,0x1e,0x67,0xa5,0x68,0x02,0xc7,0xe0,0xc5,0x58,0x60,0x68,0x5f,0x59,0xb9,0x8f,0x91,0x5b,0xa0,0xe5,0xf8,0xca,0x95,0x69,0xeb,0x0a,0xdb,0x87,0xd5,0x61,0xca,0x48,0xa0,0x1a,0xdc,0x96,0x02,0xd1,0x86,0x41,0xce,0xe8,0xa8,0xcd,0x24,0x36,0x9a,0x31,0x0e,0x9f,0xbf,0xc1,0x9e,0x85,0x2f,0x64 .byte 0xff,0xa8,0xb5,0xe1,0xef,0x16,0x1e,0xcd,0x93,0x7e,0x30,0x28,0x97,0x7d,0x59,0x30,0x4f,0x24,0x40,0x51,0x31,0x32,0xde,0x7b,0x1e,0x72,0x0e,0x91,0x95,0xa2,0x3f,0x87,0x49,0xb1,0x82,0xaf,0x66,0x0a,0x54,0x92,0xe9,0x5c,0x3d,0xfe,0x47,0xcf,0x27,0xf6,0x0d,0xd1,0x69,0x97,0x89,0x62,0xea,0xdb,0x44,0x39,0xf4,0x36,0x73,0x31,0x79,0xcb .byte 0x73,0x16,0x80,0x2d,0x49,0x8a,0x97,0x87,0xda,0x38,0x64,0xd9,0xc3,0x6f,0x4f,0x9b,0xa3,0xf2,0x9a,0xcd,0x2f,0xca,0x7e,0x5f,0xf7,0xf7,0x66,0xc5,0xb7,0x25,0x8d,0x9f,0xf4,0x5a,0x96,0x97,0x7c,0xd3,0x15,0xd8,0x3b,0x12,0xbd,0x09,0xf0,0x0d,0xc9,0x05,0x28,0x6b,0x43,0x62,0x3e,0x58,0x2f,0x8f,0x97,0xe7,0x72,0x8b,0x94,0x62,0xd0,0x3a .byte 0x64,0x30,0x2c,0x4d,0xd2,0xa7,0x12,0x90,0x27,0x17,0x57,0xf7,0xc8,0x8b,0x9d,0xb5,0x89,0x3e,0xb8,0x69,0x3c,0x68,0x21,0xc9,0xfa,0xed,0x83,0x22,0x89,0x70,0x64,0x0f,0xd5,0x3c,0x5c,0x9f,0xea,0x68,0x59,0xfc,0x18,0x56,0x6d,0x91,0xe7,0x8c,0xed,0x2a,0xa2,0x3a,0x21,0x5a,0x66,0x2b,0xeb,0x83,0xc0,0x79,0xf7,0x4f,0xdf,0xd2,0x62,0x88 .byte 0xe0,0x18,0x33,0xb0,0x50,0x5d,0xf5,0x81,0x1c,0x6b,0xd2,0x44,0x24,0xc0,0x5d,0xfa,0x3d,0x1a,0x26,0xb5,0x92,0x31,0xd2,0xb7,0x2f,0x98,0xfd,0xbf,0x6e,0xaf,0x1b,0x12,0x46,0xa3,0x6c,0x76,0x5a,0x50,0xb2,0x81,0x55,0x3d,0x47,0x32,0x61,0x0b,0x1d,0x86,0x90,0x72,0x87,0x66,0x89,0x0e,0x64,0xdb,0xdb,0x3b,0xa3,0x4e,0x49,0xa6,0xbe,0x42 .byte 0x73,0x0f,0x45,0x73,0x47,0x1c,0xb8,0x4a,0xb1,0x3f,0x98,0x15,0x8e,0x75,0xf5,0x33,0xc9,0x65,0x77,0x66,0xb8,0xd5,0x20,0x61,0x23,0xbe,0x40,0xd9,0xe7,0xbc,0xeb,0xff,0xcd,0xb6,0x2c,0x2b,0x76,0x3a,0xf1,0xef,0x38,0x6d,0xe3,0xcd,0x70,0x6e,0xe0,0x29,0xad,0xca,0x6d,0x03,0xfe,0x5a,0x1d,0x69,0x2f,0xf7,0xde,0xfd,0xf4,0x6b,0xb3,0xc5 .byte 0xe5,0xac,0xf3,0xd2,0x95,0x02,0xf2,0x6a,0x58,0x4c,0x5b,0xeb,0x1f,0x0b,0x7f,0x9d,0x0a,0x0e,0xb3,0xf0,0x41,0x50,0x04,0x65,0xf3,0xc0,0x68,0xc9,0x1f,0x0b,0xdb,0xd0,0xd6,0x19,0x4b,0xa8,0x72,0xb2,0x60,0xf2,0x1c,0xbd,0x99,0xb5,0x7d,0xe0,0x1e,0xe3,0xfd,0x42,0x8a,0x62,0xe3,0x8f,0xd6,0xcf,0x45,0x16,0x94,0x76,0x73,0xb7,0xa1,0x2a .byte 0x67,0x25,0x02,0x73,0x0e,0xf6,0x10,0xcf,0x57,0x0a,0x74,0xeb,0x5a,0x4d,0x07,0x04,0x7b,0x1c,0x7e,0xf4,0x55,0xda,0x39,0x76,0xeb,0x11,0xfb,0x04,0xf5,0x32,0xdf,0x63,0x58,0xd0,0xc4,0xa4,0x76,0x76,0xd8,0xaf,0xc6,0xe4,0x21,0x97,0x51,0x6a,0xc1,0xab,0x81,0xd8,0x65,0xac,0x28,0x54,0xcd,0x36,0xcb,0xba,0xfc,0x08,0x3f,0xb1,0x81,0x69 .byte 0xbe,0x42,0x79,0x17,0x74,0x23,0x5f,0x28,0x59,0x60,0x84,0xa3,0x3c,0x57,0x9b,0xc9,0x77,0x24,0xe2,0xcf,0x51,0xb6,0x31,0x46,0xe2,0xd2,0x30,0xb9,0x76,0xcc,0xb4,0xca,0x8a,0xd5,0xa6,0x1c,0x3c,0xcc,0x39,0x1e,0xae,0x54,0x2a,0xde,0x0a,0x76,0x7e,0xaa,0x78,0xd2,0xaa,0xa0,0xe0,0xda,0x05,0x6d,0x1a,0x2a,0x44,0x8f,0x75,0x37,0x8f,0x4f .byte 0x38,0xaa,0x9b,0x30,0x79,0x98,0x0a,0xe2,0x5d,0x4d,0x0a,0x91,0x18,0xb1,0x0e,0x3b,0xa6,0xd5,0x72,0x00,0xc4,0xbe,0x09,0x7e,0xd0,0xe5,0xf3,0x98,0x28,0x9c,0x34,0x44,0xdd,0x35,0x2c,0x7d,0x06,0x22,0x59,0x98,0x7b,0x50,0x7d,0xc6,0xb2,0xd4,0xa2,0xaa,0x4f,0xad,0x50,0x72,0xbb,0xbb,0xb5,0x79,0x25,0x40,0x8e,0x43,0x6a,0x09,0x3f,0x60 .byte 0x28,0x67,0x47,0x8c,0xbd,0xc8,0x12,0x50,0x9b,0xdc,0xd4,0x03,0x99,0x3d,0x7c,0x08,0xd6,0xe3,0xfd,0xfa,0x5d,0xba,0x85,0xb4,0x0e,0xea,0xf6,0x70,0x82,0x18,0xc6,0x05,0xc6,0xb9,0x0d,0x81,0x6a,0xc0,0x40,0x7f,0x26,0xfc,0xe0,0x49,0x5e,0x1d,0x28,0xc5,0x91,0xd4,0xb5,0x6d,0x6c,0xe8,0x8a,0x59,0x30,0x1d,0x0a,0x8e,0xb2,0x6c,0x2b,0x03 .byte 0xfb,0x20,0x60,0xb2,0x9d,0xd4,0xb0,0xe1,0xa4,0x9d,0xb0,0x84,0x3f,0xfd,0x82,0x1d,0xeb,0x93,0x66,0xa8,0x1d,0x94,0x69,0x99,0x8f,0x3e,0x16,0x1a,0x36,0x4c,0xc4,0x6f,0x14,0x04,0xa7,0xcf,0x0a,0x0b,0x6e,0xd6,0x29,0x49,0x8d,0x9d,0x11,0xa4,0xf7,0x58,0x25,0x39,0x6e,0x68,0x7a,0xca,0xf7,0x3b,0x6e,0x2b,0x1c,0xc3,0xef,0xca,0x97,0x83 .byte 0x4b,0xf3,0x48,0x9a,0xc6,0x23,0x63,0x72,0x40,0x44,0x40,0xc3,0xf0,0x5b,0x80,0xff,0xd7,0x7e,0x37,0xc2,0x54,0xda,0xa4,0x2a,0xdd,0x65,0xc8,0x48,0x89,0x8c,0xea,0x5f,0xd2,0x46,0xfe,0xe9,0xbf,0xce,0x4a,0x80,0x3b,0xd0,0x51,0xcd,0x83,0x5f,0xfb,0x27,0xab,0x05,0x25,0x44,0xeb,0xe1,0x57,0x18,0x50,0xfc,0xb0,0x83,0x79,0xdc,0xa0,0xd3 .byte 0xc4,0xfb,0xc1,0xef,0xd2,0x44,0x2f,0x87,0x4f,0xef,0xed,0x3a,0x55,0x07,0xe6,0x67,0xe0,0x22,0xa0,0xaf,0x9e,0xb9,0xef,0x32,0x2e,0x81,0xe6,0x30,0x25,0xe4,0x4d,0xa0,0x34,0x1e,0x7d,0x6b,0xb9,0x21,0x4d,0xae,0xfd,0x51,0xe0,0xee,0xf6,0xe2,0x0d,0x9c,0xf6,0x63,0x73,0x93,0xc0,0xbb,0x88,0x0c,0x06,0xb9,0xa0,0xf3,0xfc,0x26,0x64,0x91 .byte 0x84,0xd1,0x77,0x21,0xf9,0xf1,0x4c,0x48,0x65,0x15,0x56,0xd7,0xd2,0x86,0x26,0x6f,0xf5,0xce,0x81,0x1d,0x9d,0xa7,0x83,0xd0,0x2a,0x4e,0x01,0x79,0xd6,0x1d,0xee,0x10,0x66,0x6f,0xf8,0x80,0x47,0x6c,0xed,0x18,0xc1,0xb5,0x39,0xec,0x2d,0x42,0xf1,0xd5,0x2c,0xd9,0x9c,0xd5,0xaa,0xbf,0xc1,0x67,0xf3,0xf9,0xd6,0xd2,0x44,0x20,0x27,0x7b .byte 0x40,0x04,0x0c,0x77,0x64,0xef,0x5c,0x1b,0xc8,0x2c,0x25,0x3e,0x9d,0x63,0xbb,0x94,0x78,0x02,0x14,0x46,0xfc,0xa6,0x09,0x0e,0xc5,0x81,0x34,0x1b,0x11,0xdf,0xb4,0xb6,0x8e,0x40,0x0e,0xf3,0x05,0x0a,0xf5,0x28,0x58,0x5a,0x2a,0xb5,0x6c,0x9d,0xe5,0x50,0x0d,0x3e,0xcf,0xb6,0xc5,0x3b,0xc8,0x56,0x50,0x8c,0xda,0x83,0x8d,0x4d,0xce,0x22 .byte 0xb9,0x5b,0x14,0x76,0x88,0x84,0xdf,0xa3,0x93,0x79,0x21,0x8c,0xfa,0x42,0x98,0xda,0x0d,0x2a,0x4e,0x43,0x41,0x0d,0xac,0xe6,0x9e,0x11,0x14,0x81,0xcc,0xcf,0x72,0x84,0xb5,0x8e,0x99,0x0e,0x64,0xad,0xbc,0x35,0x9d,0x04,0x56,0xae,0x33,0x8e,0x3a,0x2a,0x56,0x91,0xa7,0x9c,0xe4,0xba,0xfc,0xe9,0x65,0x14,0xbf,0x07,0xf8,0x85,0x45,0xe1 .byte 0x1d,0x29,0x4c,0x10,0xde,0x5e,0x6c,0xb6,0x28,0xad,0x9a,0xb8,0x18,0xeb,0x77,0x2d,0x7b,0x6e,0x26,0x51,0xee,0x84,0x40,0x00,0x0f,0xed,0xb2,0x28,0x11,0x34,0xca,0xc7,0x33,0xf8,0x67,0x96,0xce,0x93,0x1d,0x4d,0x42,0x0f,0x55,0x5d,0x34,0x88,0x55,0xdd,0x8f,0x43,0xaa,0xfb,0xfe,0xea,0x53,0xee,0x69,0x10,0xcd,0xc3,0x94,0xab,0xe1,0xff .byte 0x89,0xb1,0x35,0xd2,0x21,0x0d,0x3a,0xa3,0x85,0xfa,0x42,0xb7,0xb1,0x16,0x97,0xb8,0xe3,0x1a,0xfa,0xab,0x86,0x1b,0x9c,0x66,0xf8,0xe6,0xae,0x1e,0x68,0x84,0xf5,0xef,0xb6,0x5c,0x72,0x86,0xa3,0x27,0x9a,0x65,0xff,0x54,0xe7,0x83,0xfe,0xd7,0x00,0xe9,0x63,0x1e,0x05,0xe3,0xe1,0x10,0x7a,0x19,0xee,0xb3,0xc8,0xf0,0x1c,0x2e,0x3c,0x79 .byte 0x05,0xf7,0x5e,0xcc,0x01,0x88,0xc8,0x1f,0x0b,0xbd,0xda,0x44,0xfd,0x97,0x53,0x58,0xa6,0xab,0xf7,0x89,0xb1,0x52,0x29,0x73,0xff,0xb1,0xfa,0x66,0x8a,0x56,0x22,0xe5,0x9c,0xbb,0xab,0x55,0x37,0x4a,0x3e,0xc3,0xeb,0x09,0xbe,0x40,0x77,0xcd,0xf9,0x0f,0xcf,0xa7,0x14,0x4b,0xe7,0x19,0x8c,0x12,0x31,0x2f,0x34,0x45,0x1d,0x1a,0x4f,0xf0 .byte 0xc5,0x24,0x78,0x39,0x2e,0x96,0x13,0x5b,0x47,0xcc,0xb9,0xb3,0xa6,0x16,0x4f,0xa3,0x2b,0xca,0x79,0x98,0x0d,0x89,0xad,0x65,0xdb,0x1c,0xf8,0x61,0x18,0x28,0x21,0x47,0x28,0x11,0x77,0xb5,0x33,0xf5,0xbd,0x92,0xb8,0xa6,0xdc,0xfe,0x67,0x20,0x3c,0x05,0xe5,0x14,0xc9,0xb9,0x40,0xc3,0x15,0x8e,0xd9,0xbf,0xef,0xcb,0x4d,0x0a,0xf7,0xbd .byte 0xc2,0x48,0x7c,0xdc,0x23,0x13,0xc2,0xc1,0x94,0x4a,0x8c,0xb8,0x62,0x2c,0xb5,0xd6,0x49,0x7e,0xaa,0x99,0x61,0xdc,0xae,0x18,0x5f,0xce,0xb4,0xe4,0x57,0xf1,0x48,0x7b,0xc3,0xc1,0x63,0x6b,0xa6,0xc3,0xbc,0xa8,0x93,0xd3,0x51,0xd7,0xfc,0x5a,0x89,0x73,0x4d,0xbe,0x48,0x75,0x51,0xaf,0x75,0x0d,0x48,0xf7,0x3c,0x34,0xdc,0xae,0xf5,0xf9 .byte 0xc1,0xb0,0x53,0x50,0x85,0xcd,0xf9,0xa9,0x37,0x48,0x14,0x6c,0x7f,0x7b,0x9c,0xa1,0xf5,0xb2,0xf4,0x38,0xbf,0x4b,0x39,0x8e,0xb5,0x2b,0xb5,0x1e,0x22,0xa8,0x52,0xad,0x1b,0x57,0x69,0xdc,0xb1,0xca,0xb6,0x2a,0x0b,0x42,0x6e,0xde,0xc6,0xb2,0xec,0x30,0x05,0x00,0x87,0xeb,0x7e,0x77,0x14,0x07,0x35,0x6e,0x11,0x09,0xc0,0xd9,0xc4,0xaa .byte 0x96,0xa4,0xa8,0xb6,0xd9,0x6d,0xf8,0xc5,0x52,0x7f,0x85,0x25,0xc2,0x81,0x1d,0x67,0x76,0x4a,0x45,0xa3,0xd5,0x40,0xaf,0x63,0x75,0xe5,0xcc,0xb0,0x46,0x0f,0xe6,0x7c,0xf8,0x5b,0x2e,0x09,0x98,0x89,0xc9,0x1b,0x8c,0x49,0x91,0xd9,0xcd,0x56,0x02,0x8d,0xcc,0x67,0x5c,0xa1,0x69,0x76,0x16,0x7a,0x93,0x44,0x04,0xb1,0x3b,0x19,0x28,0x15 .byte 0x73,0x11,0x81,0x92,0x42,0x5a,0x91,0x10,0xf4,0x36,0xed,0x7a,0x90,0x5c,0x74,0xb8,0x96,0x97,0xde,0xd7,0x5e,0x1e,0x78,0xb1,0x33,0xbc,0x0f,0x66,0x65,0x0e,0x68,0xb1,0x47,0x16,0xdc,0x89,0xc8,0x80,0x9e,0x44,0xc0,0x85,0x86,0xed,0xc7,0x74,0xc8,0xf4,0x3f,0xbe,0x2e,0xe7,0xa5,0x85,0x6f,0xf7,0x08,0x0e,0x40,0xec,0xc5,0x15,0xcc,0x63 .byte 0x13,0x91,0x75,0xc2,0x7b,0xbc,0xa4,0xf1,0xf6,0xa2,0xec,0xae,0x8b,0x60,0x08,0x2d,0xc0,0x17,0x3b,0x9e,0x34,0x15,0xe7,0x7c,0xb4,0x86,0xd3,0x69,0x7e,0xb0,0xa3,0x17,0x50,0x2d,0x64,0x7c,0x99,0x87,0x61,0x50,0x86,0x90,0x87,0x50,0xdd,0x5f,0x83,0x1f,0xc0,0x9c,0x14,0x44,0xed,0x96,0xce,0x41,0xe5,0xe6,0x38,0xc2,0xfb,0x5e,0xf1,0x3e .byte 0x31,0x82,0xbb,0x4c,0x59,0x23,0x47,0x6f,0x3e,0x55,0x76,0x4b,0xb1,0x39,0x53,0x3e,0x16,0xaf,0xbd,0x33,0x9f,0x05,0x05,0xa4,0x9a,0x10,0x83,0xa1,0xfc,0xf1,0x45,0x29,0x30,0x91,0x0f,0xb6,0xc0,0x32,0x23,0xd0,0xd8,0xcc,0x91,0x63,0x70,0x39,0x9a,0x95,0x0b,0xb0,0x47,0x8b,0x47,0x57,0x53,0x33,0xb3,0x51,0x9c,0x3c,0xf0,0x71,0xd0,0xf6 .byte 0x91,0x14,0xb4,0x05,0x2e,0x65,0x4d,0x1e,0xb6,0xce,0xf6,0xd2,0xb9,0x06,0x59,0xac,0x25,0xe7,0x9f,0x44,0x9d,0x53,0x3a,0x06,0xad,0x19,0xaf,0xb1,0xc3,0x6a,0x10,0xf7,0xc1,0xa1,0x31,0x7a,0x42,0x38,0x3f,0x81,0x22,0x8a,0x56,0xc6,0x68,0x0f,0x18,0x84,0xb9,0x5b,0xd1,0x6e,0x7f,0xae,0xa6,0xfe,0xb0,0x2d,0x91,0x20,0x49,0xb1,0xe2,0x19 .byte 0x4b,0x91,0x5f,0x5e,0x77,0x8b,0xd5,0x47,0x0c,0x15,0x36,0x12,0x91,0x01,0xef,0xc8,0x3a,0x39,0x22,0x03,0x9f,0x49,0x93,0x00,0x11,0xda,0x4b,0x6f,0xcd,0x3c,0xb2,0xc0,0xe5,0x78,0xa0,0xeb,0x61,0x56,0x97,0x28,0x53,0x3b,0xec,0x04,0x83,0x7e,0x77,0x78,0x50,0xf6,0xe0,0x0c,0x1f,0x5c,0xd5,0x0c,0x5b,0x45,0xfa,0xee,0xd0,0x26,0x5b,0xfb .byte 0x44,0x5e,0x49,0x04,0x17,0x97,0xbb,0xaa,0x69,0x1f,0x89,0xcb,0xc1,0xf2,0x53,0xaa,0x5f,0x4f,0x3e,0x49,0xca,0x74,0x51,0x60,0x0c,0x04,0xec,0x74,0xdb,0x58,0x18,0xc0,0x77,0xfd,0x26,0xe7,0x69,0x6d,0x44,0x93,0x89,0x32,0x89,0x88,0xde,0xe2,0x6d,0x9b,0x63,0xfc,0xe0,0xc1,0x92,0x0b,0x52,0xf9,0xef,0x17,0x0f,0x46,0xa0,0xa0,0x98,0x44 .byte 0x58,0xbd,0xe1,0x88,0x45,0x3c,0xf1,0xd6,0x5e,0x5b,0xd1,0x94,0x6e,0xe4,0xac,0x98,0xc0,0x44,0x7c,0x21,0xac,0xd0,0xa4,0x13,0x2e,0x5a,0x6d,0x54,0x2f,0x07,0x2b,0xca,0xa1,0xeb,0x81,0x4f,0xee,0xa2,0x4e,0x09,0xdb,0x28,0x2d,0x67,0x87,0x00,0xf6,0x52,0xb0,0xbe,0xed,0xa5,0x54,0xff,0x7d,0x27,0xb0,0x1e,0x49,0x9d,0x98,0xc4,0xf3,0xf3 .byte 0xd9,0x33,0xef,0x61,0x53,0x11,0xd3,0x8a,0x10,0x05,0xde,0xe3,0x39,0xf1,0x4a,0x17,0x9a,0xbd,0x76,0xbc,0xf6,0xd0,0x43,0xcb,0xe4,0xa7,0x26,0x29,0xc8,0x89,0x05,0xf2,0x26,0x19,0x4c,0x11,0x05,0xcb,0x73,0x3d,0x2d,0x2d,0x4a,0x7a,0x0b,0x87,0x23,0x86,0x18,0xd8,0x53,0x91,0xb4,0x73,0xea,0xa3,0xf4,0xb9,0x15,0x2c,0x36,0xba,0xc7,0xf1 .byte 0x3f,0x92,0xd7,0xde,0xc5,0xfc,0xe5,0x91,0x29,0xa7,0x0c,0x1a,0xf7,0x09,0x49,0xad,0x88,0xde,0x47,0xf1,0x5d,0x01,0x08,0x2d,0x20,0xc6,0x39,0x08,0x9f,0x02,0x3f,0x20,0xe2,0x21,0x68,0xa0,0x0d,0x1b,0xcf,0xbf,0xb2,0x2f,0x13,0x5c,0x88,0xae,0xc1,0x29,0xa7,0x54,0x4f,0xa3,0x37,0xf1,0xa5,0x0b,0x4f,0x1b,0xa4,0x39,0x0b,0x99,0x0d,0x65 .byte 0xfa,0xf1,0x43,0x46,0xc3,0xfd,0xcc,0x3b,0x7d,0x3c,0xd4,0x15,0x32,0x51,0xf4,0xbe,0xf8,0x46,0x01,0x62,0xa6,0xe2,0x44,0x1c,0x78,0x4c,0x57,0x13,0x2c,0x9d,0x8a,0xea,0xe0,0xfc,0x2e,0xe7,0x80,0x6f,0x90,0x67,0x00,0xf0,0x13,0xbb,0x05,0xe0,0xbd,0xf8,0x11,0x9d,0x7e,0x9d,0x01,0x61,0x3a,0x13,0x9a,0x02,0xfb,0x24,0xea,0x91,0x0c,0xe5 .byte 0xeb,0xe3,0x80,0x22,0xb6,0xac,0xe1,0x13,0x95,0x65,0x22,0xeb,0xf7,0x91,0xa3,0xe6,0x4b,0x54,0x1e,0xf8,0x7b,0xcd,0x27,0x7c,0xca,0xb7,0x88,0x52,0xdf,0xba,0x9e,0xf6,0xed,0x03,0xb4,0xac,0xab,0x17,0xe7,0xb0,0x5e,0x1a,0x19,0xee,0x61,0xdf,0xa5,0x23,0x28,0xd6,0x63,0xe3,0x45,0xea,0x92,0x70,0x94,0x31,0x32,0x8f,0x47,0xad,0xee,0x9e .byte 0x6a,0x2c,0x18,0x66,0x55,0xd1,0xd9,0xc6,0xd4,0x08,0x5a,0x7c,0xe8,0x09,0xcc,0x62,0x1e,0x24,0xed,0x2f,0x3e,0x1b,0x84,0x92,0x73,0x14,0x22,0xbc,0xb7,0xf0,0xed,0x3f,0x12,0x98,0x49,0x52,0xb5,0x29,0x5e,0x2d,0xca,0x23,0xeb,0x8a,0xb1,0xea,0x3c,0x6c,0x93,0x68,0x7f,0x84,0x4f,0x49,0x9c,0x9b,0xb8,0xc7,0xfd,0x6a,0xb7,0xf1,0xde,0xf9 .byte 0xc1,0x72,0x26,0xd1,0xfb,0x40,0x72,0x78,0xb0,0xa3,0xce,0xa8,0xab,0x3b,0x0f,0x8c,0x2b,0x13,0xe2,0xe3,0x86,0x9a,0xa0,0x69,0x46,0x85,0xdf,0x50,0x5b,0x60,0x9a,0xb7,0x4f,0xa9,0x76,0x70,0xd6,0xeb,0xbb,0x97,0xb7,0x63,0xed,0xec,0xbe,0x93,0x9f,0x79,0xff,0xcf,0x2c,0x09,0x85,0x22,0x1f,0x0e,0xbd,0xd4,0xb7,0x7b,0x1e,0x0e,0xc3,0x99 .byte 0x55,0x1b,0x50,0xc0,0xb9,0x68,0xe3,0xa9,0x59,0x73,0xa4,0xe6,0x86,0x6c,0xda,0xc5,0xba,0x76,0xab,0x56,0x94,0xa5,0x11,0xdf,0x1b,0x09,0x67,0xde,0x20,0x9f,0xf4,0xb8,0x6f,0x64,0xb1,0x9b,0xac,0x59,0xf9,0xcc,0xd8,0xc1,0x41,0xe9,0xdd,0x00,0xda,0x6a,0x11,0x3b,0xad,0x04,0x81,0x39,0x87,0x8e,0xf3,0x99,0xcf,0xde,0x29,0x7b,0x25,0x91 .byte 0x6e,0x2e,0x1d,0x83,0x9c,0xb6,0xa7,0xff,0x65,0x88,0xe8,0xc1,0xe7,0xca,0x7e,0x46,0xf0,0xc0,0xe7,0x55,0x36,0x76,0xa7,0xc5,0x25,0x06,0xc4,0x77,0x7b,0xff,0x61,0x1d,0x5a,0x77,0xa0,0xbc,0xa5,0x6f,0xda,0x3d,0xfe,0x92,0xd3,0x8e,0xc4,0x95,0xea,0x13,0xbd,0x18,0xff,0x8f,0xcd,0x7c,0x18,0xe1,0x88,0xee,0x5d,0xcc,0x8d,0xea,0x9e,0x21 .byte 0xe5,0x8f,0x8c,0x6b,0x51,0xbb,0xab,0x9d,0x64,0x53,0x70,0x5b,0x0b,0x5c,0xa0,0xde,0x4d,0x56,0x82,0xb0,0xa8,0x3b,0x91,0x0c,0xe6,0x8c,0x7b,0x24,0xdd,0x32,0xb9,0xf2,0x06,0xc0,0xce,0xcb,0x11,0x4f,0x5b,0x70,0xc3,0x09,0x37,0x5b,0xd9,0x69,0x97,0x0b,0x9b,0x37,0x14,0xb3,0x95,0x4f,0x5c,0x0a,0x3c,0x4f,0x79,0x65,0x22,0x07,0xd3,0xd6 .byte 0xe9,0x55,0x42,0xfa,0x47,0xe8,0x7c,0x5c,0x63,0x24,0xe5,0xd0,0x91,0x28,0x87,0x0f,0xe0,0x21,0x79,0x85,0x7a,0x8b,0xb9,0x37,0xa0,0x86,0x7c,0xfc,0x52,0x04,0xb1,0x1b,0x62,0x9e,0xc3,0x18,0x59,0x87,0xb1,0x86,0x17,0xac,0x0d,0xb7,0xca,0xa9,0x37,0x18,0x30,0x67,0x76,0x90,0x84,0x78,0xcb,0x62,0x26,0x24,0xf6,0x1b,0xfe,0xb8,0xc0,0x1f .byte 0xdc,0x1d,0x2f,0x52,0xe5,0x64,0xbc,0xd5,0x43,0x87,0xb9,0x66,0x2d,0xa9,0x5c,0x98,0x2c,0x2a,0xf9,0xf9,0x78,0xa7,0x0f,0x23,0xe0,0x11,0x36,0xa0,0x4e,0x40,0x2c,0x79,0xca,0x1c,0x44,0x76,0x3f,0x61,0x34,0x9e,0x01,0x8c,0x61,0x2f,0x84,0x52,0x15,0x22,0xb3,0x53,0x27,0x14,0x5f,0x54,0x09,0x24,0x83,0x47,0x90,0x43,0xc3,0xdf,0xad,0x66 .byte 0x9c,0x7a,0xa1,0x4b,0x53,0xc1,0x91,0xc5,0x48,0xfa,0xc4,0x6b,0x4a,0xc9,0xdc,0x85,0xb4,0xe2,0x21,0x88,0xda,0x27,0xcd,0x54,0xac,0xcf,0xb4,0x09,0x1d,0x5a,0x7f,0x23,0x2c,0x23,0xa4,0x98,0x96,0x29,0xa8,0xc7,0x33,0x45,0x79,0xd4,0x35,0x9d,0x78,0xbb,0x00,0x5f,0xca,0xcc,0x62,0x65,0x47,0xa3,0x8b,0x3b,0xd1,0x6b,0x18,0xb3,0xf4,0x1d .byte 0xac,0x9c,0x9b,0x90,0xbb,0xb0,0x0d,0x8a,0x7d,0x2e,0x3b,0xbd,0x52,0x35,0x11,0xfc,0xcd,0x59,0x76,0x2c,0x9d,0xf4,0x6b,0x29,0x6d,0x63,0x51,0xc9,0x3b,0x73,0x9b,0xcc,0x33,0x4f,0x0e,0xcd,0xf1,0x06,0xf0,0xe7,0xcf,0x93,0x66,0x51,0x34,0xb0,0x98,0x50,0x2f,0xa4,0xf8,0x37,0xdb,0x78,0xc2,0x36,0x20,0x9d,0x58,0xf1,0x52,0x35,0x7d,0x8a .byte 0xd0,0x43,0xab,0x46,0x0d,0x59,0xdb,0xf2,0x8e,0xe7,0x79,0xbf,0xf5,0x00,0xc8,0xbe,0x1b,0x98,0xf8,0x1e,0x53,0x1b,0x17,0xa9,0x2d,0x7c,0x7a,0xef,0x14,0x33,0x70,0x65,0x7b,0x55,0x82,0xe1,0x63,0x8e,0xf0,0x15,0xf6,0xb4,0x2b,0x18,0xe2,0x40,0x30,0x96,0x74,0xf7,0x91,0x82,0x83,0xef,0x74,0x38,0x89,0xea,0xaf,0x6f,0xd6,0x89,0x80,0x1c .byte 0x46,0xa2,0xaa,0xcd,0x60,0x84,0xa2,0x65,0x8a,0xc7,0x03,0x07,0xa0,0xc9,0x00,0xd7,0x34,0x54,0x33,0x08,0xba,0x1a,0xab,0x49,0x93,0x7f,0xd2,0x51,0xe4,0xcf,0x96,0x35,0x48,0xd0,0x91,0xa5,0x10,0x65,0x95,0xe2,0x01,0x3b,0x1c,0xa1,0x4b,0x8d,0x62,0x09,0x49,0xdf,0x67,0xde,0xe5,0x8e,0xcc,0xa6,0x99,0xc1,0x8b,0x6a,0x29,0xeb,0xa0,0xe4 .byte 0xaa,0x2a,0xd4,0xe9,0x28,0xb5,0xd1,0x39,0x78,0xe1,0xae,0x0f,0xc5,0x05,0x64,0xc8,0x62,0x27,0xf6,0x67,0xb5,0x79,0x52,0xd6,0x0d,0xbd,0x42,0xbd,0xa2,0x5d,0x00,0xd9,0xbe,0x5b,0x26,0x4c,0x20,0xdc,0xa2,0x33,0x9c,0x8e,0xd5,0x3c,0x75,0x7f,0x25,0xa2,0x04,0x70,0xfb,0x2a,0xb2,0xc6,0xb3,0xc0,0x1d,0xc5,0x58,0xe7,0xc1,0xd9,0x67,0x8c .byte 0x2c,0x30,0x93,0x97,0x84,0x72,0xdf,0x5f,0x49,0xac,0x9e,0x09,0x0a,0x35,0xfd,0x69,0x50,0xf4,0x45,0x34,0x8e,0x07,0x9f,0x09,0x4c,0x2d,0xd8,0x7d,0x47,0xc2,0x7b,0xd7,0x67,0xb7,0xcb,0x60,0x46,0x8b,0x4c,0xe1,0x81,0x88,0x56,0x8e,0x3d,0x32,0x10,0x77,0xb4,0x33,0xba,0x2c,0xcd,0x20,0x73,0x46,0xdb,0xfa,0x83,0x27,0x43,0x3e,0xc4,0xd4 .byte 0xd3,0x86,0x26,0x67,0x9f,0x1e,0xc8,0x1d,0x3c,0x5d,0x5b,0xcb,0xef,0x1a,0xcf,0x79,0xfd,0xce,0x72,0x8e,0xb7,0xce,0xc8,0x02,0x5c,0xde,0xe3,0x1c,0x78,0xb6,0xc1,0xb1,0xcd,0xee,0xf7,0x5a,0x57,0xa9,0xa7,0x37,0xfa,0x71,0x41,0xdd,0x1c,0xcb,0xb3,0xde,0x6f,0xbb,0xbd,0x43,0xa1,0xcd,0xc8,0x23,0x30,0xb6,0x03,0x18,0xb5,0x6f,0x20,0xc6 .byte 0xce,0x22,0x8a,0xf2,0x01,0x30,0x74,0x1c,0x27,0x9e,0x44,0xce,0xad,0x7d,0xbc,0x93,0x5c,0xaf,0xdc,0x05,0xda,0x41,0x92,0x7c,0x6b,0x47,0x62,0xb4,0x94,0xe4,0x2e,0x70,0x7e,0x86,0xdd,0xfd,0x61,0xbc,0xdd,0x9b,0xc6,0x8e,0xbb,0x7b,0x4f,0xd9,0x0a,0x74,0x8a,0xb7,0xb1,0x19,0x0b,0x37,0xbe,0xa6,0x7c,0x48,0x1b,0xcd,0x04,0x49,0x98,0x3b .byte 0x48,0x93,0x0c,0x2d,0x34,0xf4,0xdc,0x1d,0xa8,0x29,0xd1,0x70,0x32,0x5f,0x38,0xf6,0x5d,0xde,0xee,0x96,0xf9,0x48,0x15,0xb3,0xbc,0x10,0x65,0x0b,0x95,0xd8,0xee,0xac,0xa4,0x32,0xa8,0x06,0xee,0xe9,0xce,0x6f,0x9a,0xef,0x4f,0xa1,0x16,0x25,0xc5,0x21,0x10,0x52,0x8f,0x95,0xbe,0xd3,0x53,0x21,0x14,0xca,0xf0,0xe2,0xb8,0xf5,0x61,0x88 .byte 0x71,0xfe,0x2e,0xa7,0xf1,0xf7,0xfc,0xba,0xf4,0x09,0xbf,0xec,0x5d,0xb2,0xc1,0xa7,0x93,0x43,0x19,0xcd,0x09,0xf8,0x46,0x99,0x89,0x07,0x92,0xd8,0xb6,0x3d,0x7f,0x7d,0xc3,0xd9,0x53,0x4f,0xba,0x86,0x02,0xe6,0xd4,0x1f,0x43,0xd7,0xb3,0x35,0x59,0x7e,0x76,0x71,0xe5,0x02,0x74,0x95,0x7d,0x20,0xab,0x4b,0xfe,0x41,0x35,0xed,0x40,0x8c .byte 0xeb,0x54,0x50,0xe4,0x1a,0xec,0xe5,0x2f,0xa9,0xba,0x7e,0x89,0x94,0xc4,0x72,0xec,0x20,0x46,0x3a,0xea,0xc3,0x1c,0xd6,0x27,0x9a,0xca,0xa6,0x05,0x48,0xef,0x6d,0xad,0x1c,0xde,0xcb,0x33,0x0a,0x02,0x8c,0x5c,0x54,0x8c,0xba,0x0e,0x94,0x6a,0xb3,0xa6,0x66,0x5b,0xfc,0xd8,0xe4,0xb9,0xc4,0xd4,0x03,0xf7,0xc0,0xd7,0x16,0xab,0x58,0x04 .byte 0xe8,0x95,0xc4,0x25,0x79,0xe8,0x18,0xb5,0x54,0x32,0xd4,0x75,0xf6,0x80,0xda,0x35,0xac,0x09,0xbf,0x37,0x1b,0xed,0x6e,0xdb,0xa1,0x42,0x14,0x49,0x11,0x4c,0x7a,0xda,0xed,0xc9,0x9d,0xe1,0x21,0x04,0x37,0x7a,0xbd,0x26,0x2d,0x40,0xc8,0x88,0x69,0x4d,0xd2,0x52,0x93,0xa2,0x6d,0x9a,0xd4,0xb0,0xdf,0x9a,0xc1,0x84,0xc5,0x08,0x5a,0xd9 .byte 0x1f,0xbe,0x57,0x97,0x81,0x38,0x46,0x32,0xce,0xe3,0x0b,0x93,0x25,0x04,0xe5,0x7b,0xac,0xfd,0x37,0xc6,0x48,0x91,0x3c,0xef,0x5d,0x09,0xea,0x29,0xa9,0xc7,0x50,0x4b,0x47,0xe6,0xba,0xbd,0x96,0xe3,0x8e,0x9a,0x0f,0x8c,0x49,0xf4,0xe6,0xdf,0x3c,0xbb,0x51,0x12,0x8f,0x90,0x5e,0x77,0xd1,0x2e,0xd4,0xea,0x1f,0x34,0xac,0x6d,0xcf,0x74 .byte 0xb6,0xd4,0xaa,0x89,0xe0,0xa6,0x37,0x77,0x34,0xad,0x1a,0x7d,0x97,0x63,0x13,0x83,0x82,0x67,0x61,0xed,0xd6,0xbf,0xda,0x6a,0x09,0xce,0x0f,0x53,0xef,0x42,0x22,0x69,0x0f,0x8e,0xbb,0x6d,0xa5,0x57,0xcb,0xe3,0x3c,0xbe,0xd7,0x2e,0xc1,0x67,0x32,0xc0,0xa8,0xbf,0xbf,0x11,0xdd,0xdf,0xfd,0xc6,0x44,0xbb,0xca,0x4e,0xd1,0x2d,0x61,0x3c .byte 0xef,0xb4,0x8b,0xcd,0x76,0xa6,0x00,0xe0,0xb8,0x66,0x0c,0xed,0xd6,0x20,0xd3,0x27,0x33,0xcb,0x5e,0x76,0x33,0xbe,0xb4,0x3c,0x77,0x8b,0x14,0xec,0x93,0x16,0x54,0x1d,0x87,0x7d,0xeb,0xca,0x49,0xd3,0x2b,0xa6,0xbd,0xa5,0xe7,0x1a,0x3a,0x94,0xd9,0xb9,0xe0,0xaa,0x23,0x83,0x7c,0xe5,0xff,0x17,0xfd,0x14,0x63,0x8f,0xb8,0xff,0x93,0x8f .byte 0xc7,0xa7,0x7b,0x43,0x31,0xd4,0xa8,0xf4,0x6c,0xab,0x2c,0x44,0xd4,0x7d,0x80,0x79,0x33,0x4c,0x15,0x41,0x20,0x14,0x02,0x04,0xcd,0x3b,0x66,0xe7,0xd7,0x0f,0x87,0xda,0xb1,0x45,0x74,0x14,0xa6,0xc4,0xaa,0x19,0xa6,0x8d,0x7e,0x51,0xed,0x5a,0x42,0xa4,0xb9,0x7b,0x8c,0x87,0xfd,0xe1,0x4a,0x58,0x15,0xf5,0x1d,0xcf,0x59,0xe5,0xbc,0x11 .byte 0x10,0x7c,0xba,0x6b,0x47,0x9a,0xef,0x69,0x40,0xaf,0x3f,0x06,0x53,0x9f,0x96,0x55,0x30,0x83,0x9b,0x6a,0xfb,0xd3,0x93,0xf0,0x38,0x43,0xcb,0x5b,0xe4,0x23,0x0d,0x2c,0x1e,0xa9,0xe6,0xaf,0xd9,0xa9,0x19,0xf1,0xda,0x57,0x4b,0xd7,0x31,0x23,0x60,0x00,0x1b,0x88,0x15,0x68,0xe4,0xf1,0x26,0x1b,0x65,0xf5,0x6d,0xc8,0xc8,0x32,0x0e,0x65 .byte 0x2e,0x49,0xbd,0x88,0x5a,0xc2,0x05,0xf9,0xee,0x07,0xf2,0x27,0x9b,0xeb,0x54,0x23,0x8a,0x10,0xe6,0x7d,0x5a,0xeb,0xb4,0xc5,0x34,0x4e,0xdf,0xa8,0x05,0xf2,0x35,0x68,0x74,0x83,0xf3,0x90,0x36,0x2c,0x46,0xcd,0x6d,0x27,0xe5,0x40,0x07,0xb8,0x34,0x6f,0x80,0xcf,0x17,0x9b,0xae,0x68,0x59,0x25,0xed,0x70,0x9e,0xb9,0xfa,0x89,0x44,0x10 .byte 0x4d,0x6e,0xef,0x22,0x08,0x99,0x5e,0x07,0x9b,0xb7,0x31,0xfe,0x89,0x1c,0x7e,0x0c,0x0e,0xdf,0x4e,0xdc,0x04,0x43,0x67,0x27,0xfb,0x1d,0xd9,0x97,0x75,0xad,0x1d,0x6d,0x14,0x90,0x33,0x64,0x8c,0xbb,0xa4,0x61,0xcf,0x00,0x93,0xf4,0x4c,0xc2,0x49,0xda,0xc1,0xcd,0x55,0xba,0x39,0xa8,0x82,0x93,0xc5,0x3a,0xc9,0x4a,0x68,0x31,0x00,0x1b .byte 0xcf,0x7a,0xaf,0xff,0x0c,0x86,0x92,0x2a,0xda,0x71,0x55,0xcc,0xba,0x50,0x61,0x0c,0xb0,0x6e,0xe9,0xac,0x21,0x29,0x70,0x5c,0xbd,0xc6,0x4c,0x8f,0x96,0xa8,0x5f,0x51,0x8b,0xec,0x9d,0x32,0x13,0x09,0x7e,0x1b,0xa2,0xec,0x14,0x66,0x90,0xae,0x04,0xe8,0x90,0xe3,0x46,0x82,0x17,0x69,0xa5,0x22,0xb0,0x28,0x1a,0x24,0xe6,0x27,0xd6,0x8b .byte 0x97,0x54,0xbd,0x49,0xfb,0xb7,0xa7,0x17,0x6f,0xdd,0x84,0x1d,0x10,0x1a,0x40,0x79,0x98,0x40,0x4e,0xa5,0xa6,0x17,0x0d,0xe9,0x48,0xfe,0x73,0x95,0x2e,0x3f,0xb5,0x23,0x59,0x87,0x66,0x8a,0xa7,0x6a,0x98,0x6f,0x49,0x05,0x02,0x5a,0x6b,0x5f,0x46,0xdd,0x89,0xd1,0x4a,0x11,0x10,0xcf,0x0d,0x76,0x2e,0x4c,0xa4,0x15,0xd6,0xbd,0x2a,0xaf .byte 0xff,0xe0,0x9b,0xd8,0x35,0x46,0x15,0xa5,0xf8,0x92,0xe1,0x5f,0x05,0x2a,0x45,0xe0,0x51,0x47,0x41,0x36,0xaf,0xbf,0x33,0x1b,0x8d,0xd8,0xf2,0x83,0xfd,0x01,0x4d,0x10,0xe7,0x60,0xd8,0x94,0x1b,0x51,0xcc,0x87,0x80,0xe8,0x59,0x87,0x4f,0x03,0x2c,0xef,0xbf,0xd6,0x0a,0x23,0xe8,0xb5,0x24,0x4c,0xe7,0x97,0xf0,0x83,0x95,0x25,0x42,0x0f .byte 0xda,0xb8,0xd6,0x88,0x63,0x61,0x69,0xb5,0x0f,0xf6,0x31,0x3d,0xc6,0xc6,0x82,0xd8,0xc4,0xe5,0xce,0x09,0x30,0x4c,0xc7,0x87,0x39,0x47,0xae,0x18,0x46,0x23,0x11,0x8c,0x58,0x15,0xa8,0x22,0x63,0x16,0x44,0xe3,0x68,0x92,0x9a,0xac,0xec,0xdd,0x6d,0x17,0xbe,0xdd,0x73,0x14,0x7d,0xb0,0x7e,0xdf,0x75,0xa5,0x96,0xfd,0x7d,0x4e,0xa6,0xee .byte 0x35,0x21,0x9a,0x16,0x22,0x89,0x69,0xcd,0x26,0xfd,0xbb,0x1a,0x76,0xb8,0xed,0x33,0x38,0x41,0x13,0x3d,0xce,0xd3,0xdd,0x99,0xa9,0xc4,0x4d,0x5b,0xd4,0x76,0xd7,0xbb,0x6e,0x59,0x78,0x43,0x43,0xb2,0x32,0x0d,0x30,0xe7,0xa7,0x90,0x7d,0xb0,0x5a,0x5a,0x99,0x7b,0xb3,0x7d,0x43,0x91,0x91,0xbc,0x2f,0x55,0x3f,0x6e,0x69,0x87,0x29,0x89 .byte 0xd8,0xe8,0x0c,0x65,0x3e,0xab,0x21,0xee,0x1c,0xe1,0xc0,0x9e,0x2a,0xc7,0x3e,0xa9,0x94,0x58,0xad,0x74,0xf4,0x61,0x1f,0xdd,0x24,0xba,0x39,0x46,0x7e,0x11,0x1b,0x88,0xe6,0x69,0x28,0xfe,0xd0,0x38,0x61,0xc6,0x74,0x8b,0x33,0x89,0x32,0xe4,0x71,0xa2,0xd0,0xac,0x15,0x62,0x51,0xb4,0x55,0xbf,0xa1,0x1f,0x17,0x42,0x10,0x14,0x77,0x38 .byte 0x9f,0xb8,0x14,0x2b,0x2f,0xf5,0x11,0xfc,0x1e,0x9b,0xa9,0xee,0x03,0xc3,0xc9,0x06,0x42,0xa7,0xa0,0xe1,0x76,0x8e,0xc5,0x6c,0x2f,0xec,0xeb,0x6d,0xb4,0xd8,0x56,0xeb,0x99,0x04,0x0d,0x1a,0xae,0x54,0xe5,0x47,0x91,0xcc,0xaa,0xc4,0x26,0x77,0x1b,0x89,0x0d,0xe7,0x7f,0x25,0x42,0x14,0x55,0x87,0x17,0x75,0x53,0x64,0x6c,0xf3,0x52,0x71 .byte 0x2d,0xd2,0x17,0x80,0xca,0x52,0xb3,0x93,0x58,0xac,0xa0,0x8e,0x2b,0x8a,0xe7,0xbd,0x29,0xd7,0xd0,0xfa,0x3a,0xcb,0xc2,0x61,0x8e,0x04,0xc6,0x63,0xff,0x9c,0x31,0x36,0xcf,0x51,0x95,0xe9,0xd0,0xfe,0x6f,0x8b,0xe0,0x9a,0x9e,0x70,0x4e,0x29,0x1e,0xd3,0xec,0xde,0x9c,0x85,0x82,0xca,0x36,0xd4,0xf1,0x58,0x0e,0x38,0xc7,0x9b,0x61,0x87 .byte 0x24,0x05,0xc5,0xeb,0xe1,0xa7,0xa7,0x65,0x2d,0x73,0x10,0x85,0x90,0xe6,0x3c,0x18,0x22,0x9a,0x59,0x8e,0xdc,0xfd,0xc9,0x3f,0x76,0x7c,0xe5,0xb6,0x9d,0xd5,0x84,0x9a,0xcc,0x02,0xa8,0x94,0xf0,0xa5,0xff,0x16,0x4a,0xe1,0x9f,0x23,0x5d,0x6e,0xc7,0x4d,0x93,0xfa,0x5f,0xa4,0x76,0xa4,0x91,0x64,0x95,0x67,0x3c,0x47,0x8a,0xe0,0x5f,0x93 .byte 0x6b,0xa7,0x3e,0x56,0xfa,0xf1,0x1e,0xeb,0x03,0x45,0x17,0x2a,0xa2,0x78,0xe9,0x6d,0x0e,0x77,0x71,0x6f,0x40,0x94,0xce,0x28,0x16,0xa3,0xa9,0x44,0xa3,0x87,0x56,0xb1,0xf7,0xa7,0x9c,0x4c,0x22,0x69,0x8d,0x89,0x89,0xdb,0x2c,0xed,0x23,0x19,0x40,0x29,0x71,0xcd,0xf7,0xfa,0x9d,0xfe,0x04,0xb5,0xc0,0x8d,0xb0,0xb5,0x19,0x31,0x0b,0x1e .byte 0xeb,0x2d,0x1d,0x13,0xab,0xee,0x8b,0x9f,0x87,0x04,0xc8,0xe3,0xaa,0xf6,0xb3,0xf0,0x44,0xa1,0xb0,0x8b,0xea,0xde,0x8b,0xfb,0x6d,0x93,0xdd,0x49,0x6a,0xab,0x6f,0xae,0xad,0xf6,0x5e,0x2a,0xe8,0xb5,0xb3,0x03,0x3f,0x09,0xe8,0x69,0x38,0xc7,0xb9,0xf9,0x56,0x94,0x50,0x73,0x31,0x21,0x4b,0x6e,0xd3,0x0f,0x5e,0x8f,0xcb,0x6a,0x06,0x08 .byte 0x80,0x5b,0xd0,0x5d,0x5f,0x09,0xa0,0x31,0x46,0x4d,0x79,0x49,0xfc,0x4e,0x89,0x83,0xbb,0x6c,0x6d,0xc5,0x69,0x8f,0xb6,0xa6,0x99,0x0b,0xe5,0x0d,0xb5,0xa9,0xa7,0xc9,0x15,0xde,0x52,0xb3,0xa4,0x3f,0x3e,0xb2,0xb7,0x0c,0xe6,0x84,0x66,0x67,0x4c,0xa6,0x1a,0xbf,0xff,0x31,0xfb,0x69,0xee,0xc4,0xab,0x95,0xb6,0x5f,0x49,0x21,0x62,0x09 .byte 0x70,0xb9,0xa0,0x41,0xca,0x23,0xd2,0xc0,0xde,0x5d,0x2e,0x3e,0x41,0x33,0x7a,0xa8,0x23,0x3a,0x11,0xf9,0x2d,0x3f,0x86,0xe8,0x46,0xbb,0xc1,0xa6,0xb3,0x63,0xf9,0x9e,0xbc,0xbd,0x90,0xef,0x11,0x94,0xda,0xbd,0x92,0xba,0x36,0x96,0x27,0x66,0x87,0x12,0x13,0xe7,0x04,0x25,0x01,0xa8,0x20,0xcb,0x34,0xfd,0x6a,0x97,0x48,0x36,0xf4,0xa1 .byte 0x2d,0x56,0x61,0x72,0x9f,0x59,0x61,0x30,0xb4,0xb1,0x94,0xa8,0x71,0x08,0xd2,0x0b,0xa5,0x9c,0x3d,0x70,0xa4,0x54,0x61,0x82,0x4d,0x00,0x2a,0x7c,0x10,0x61,0x64,0x8e,0xd9,0x96,0x7d,0xdb,0xa0,0xcc,0x34,0xb4,0x24,0xea,0x46,0x12,0x81,0x65,0x52,0x68,0xb4,0xa1,0x56,0xdd,0x51,0x8b,0x4d,0x15,0xd9,0x72,0x9b,0x87,0x89,0xf3,0x31,0x6d .byte 0x83,0xb5,0xa6,0xb5,0x91,0xbe,0x9a,0xb8,0x1e,0x1e,0x5e,0xec,0xe0,0x6c,0xd7,0x3e,0xcc,0x0b,0x9d,0x5b,0x26,0xcc,0xb8,0xfe,0x17,0x14,0x68,0xa3,0xb5,0x6b,0x0d,0x68,0x75,0x06,0x14,0x22,0x3e,0xc8,0x28,0xa6,0x2c,0xc7,0xd4,0x08,0xe7,0xa5,0x8e,0xe5,0x76,0xb6,0x3c,0xce,0xb2,0x54,0xcb,0x27,0x39,0x9d,0x49,0xfc,0x1c,0x9d,0xf4,0xa3 .byte 0x46,0x98,0xae,0xd8,0x9b,0xed,0x85,0x17,0xe0,0xa4,0xd4,0xad,0xd3,0xed,0x1b,0x43,0x04,0xc5,0x10,0x36,0x8f,0x5e,0x06,0xfb,0x17,0x96,0x95,0xe5,0x8c,0x11,0x8c,0xb4,0xb0,0x6a,0xdf,0x8a,0xf8,0x75,0xe8,0x03,0xce,0xc2,0x43,0x26,0x98,0x48,0x3a,0x77,0x0b,0x34,0x22,0x78,0xee,0xc1,0x13,0x29,0x71,0xdd,0xde,0xd3,0x65,0x35,0xc2,0x28 .byte 0xe2,0x8f,0x21,0xde,0x45,0xa1,0x14,0xff,0x79,0x0b,0xad,0x7b,0x9a,0x57,0x2c,0x08,0x4d,0x09,0x62,0x85,0x01,0xf0,0x9f,0xc3,0xf2,0xbd,0xfc,0x1a,0x4d,0xaa,0x89,0xbf,0xe1,0xb1,0x72,0x27,0x04,0x2d,0x6b,0x7d,0x18,0x73,0x10,0xee,0x32,0xbe,0x4b,0x0d,0xe7,0xd6,0x2b,0x68,0x2f,0xda,0x46,0x0e,0x6d,0x07,0x3f,0xea,0x46,0x0e,0x57,0x58 .byte 0x71,0xa0,0x23,0x78,0x21,0x2a,0x8b,0xcc,0x2c,0x6b,0xcc,0x90,0xf6,0xb0,0x3a,0x70,0xef,0x7c,0x89,0x71,0xcc,0xc2,0x0b,0xab,0x8b,0x10,0xa9,0xf9,0x8e,0xca,0xf8,0xbf,0xa1,0x6a,0x20,0xf8,0x87,0x34,0x63,0x57,0x5f,0x5c,0x3a,0x71,0x6e,0x91,0x5f,0x4b,0xf6,0xc6,0x75,0xa7,0x98,0xdf,0x6a,0x57,0xb7,0x8c,0xbc,0xc3,0x26,0x35,0xd0,0x93 .byte 0x3b,0xb1,0x51,0x95,0x1a,0x6f,0xae,0x6a,0x5e,0x55,0x27,0xae,0xe4,0x99,0x5d,0xb2,0x73,0x35,0xc1,0x37,0xae,0xc7,0x68,0xf3,0x62,0xdd,0xca,0xa3,0x9f,0x39,0x02,0xc7,0xdf,0x3c,0x97,0x96,0x5a,0xd4,0xea,0xea,0xb7,0x6b,0xc3,0x08,0x49,0x93,0xdb,0x9b,0xe5,0x7f,0x7e,0xc0,0x0a,0xf3,0x35,0x9e,0xe4,0x40,0x72,0x27,0x0f,0xc1,0x7b,0x8c .byte 0x23,0xa6,0x52,0xa3,0xac,0xd7,0x63,0x10,0x83,0x86,0x36,0x2e,0x99,0xf0,0x75,0x53,0xa2,0x2e,0x7f,0xaa,0x22,0x39,0xf9,0xe5,0x6a,0x9b,0x72,0xa9,0xa2,0xc3,0x7c,0xce,0xd6,0x1b,0x1e,0xfe,0xd1,0xd4,0x52,0x58,0xe5,0xad,0x7c,0xbd,0x67,0xf0,0xa9,0x1f,0x5a,0xed,0xf3,0x4f,0x29,0x17,0x12,0x2c,0xbe,0x01,0x54,0x88,0x3d,0x4d,0xb4,0xd7 .byte 0xd0,0xad,0x46,0x9d,0xfa,0x62,0xab,0xf3,0x3d,0xcf,0x4a,0x89,0xd7,0x60,0xa8,0xde,0x73,0xfe,0xa6,0x2f,0xad,0xf7,0x4d,0x03,0xff,0xbc,0x3c,0xf7,0x3d,0x58,0xc2,0xf1,0xe5,0x80,0xd3,0xf0,0x7a,0x90,0x2c,0xd2,0xf3,0x85,0xb8,0x30,0xbd,0xc2,0x35,0xd0,0x30,0xe1,0xdd,0x6c,0x31,0x08,0xbf,0x75,0x61,0xe1,0x79,0x07,0xa9,0xe4,0x46,0x80 .byte 0x0b,0xf8,0x74,0xbf,0x7a,0x71,0x95,0x87,0x4f,0xc3,0x7e,0x32,0x9a,0x41,0xb5,0xa6,0x46,0x3c,0x07,0x1a,0x84,0x6a,0xf2,0xf2,0xc4,0xb1,0x0d,0x01,0xb4,0x9f,0x48,0x13,0xa3,0x8b,0x4d,0xbf,0x64,0x00,0x01,0xec,0x9d,0x35,0x1d,0xdc,0x62,0x92,0x19,0x48,0x3c,0x97,0x8e,0xee,0x29,0x6d,0x63,0x6c,0xb2,0x84,0x9b,0x16,0x84,0x89,0x6f,0x97 .byte 0xd3,0x3e,0x98,0xb8,0x93,0x5d,0xd4,0xdd,0xc5,0x7d,0x55,0x4c,0x53,0x4e,0xf7,0x4b,0x32,0xa3,0xae,0x67,0xdc,0xe9,0x7c,0x7d,0x9f,0x62,0x4e,0xf9,0x59,0xff,0xf8,0xd9,0x81,0x54,0x2f,0xaf,0xbc,0xad,0xbe,0xc4,0xf5,0x2f,0x71,0x34,0x1c,0x79,0x21,0xb4,0xaf,0x6c,0x1d,0xc8,0xb0,0xd3,0x8b,0x8d,0x04,0xcb,0xf1,0x35,0xa8,0xde,0xa5,0xfb .byte 0x9d,0xe5,0x98,0x8b,0xd2,0xd2,0x99,0x10,0x23,0xf7,0x0c,0x94,0xfd,0x9a,0x8a,0x4d,0x39,0x7e,0x79,0x2b,0x4a,0xe1,0x81,0x22,0x0d,0xb7,0x44,0xb1,0x9f,0x7b,0xd5,0xa6,0x7e,0x62,0x5c,0x3d,0x0f,0x00,0xf8,0x82,0xd0,0x30,0x05,0x05,0xc8,0x6e,0xc3,0x5c,0xdd,0xf8,0x18,0x7d,0x44,0xaf,0x28,0x5d,0x84,0x21,0xd2,0x5a,0x78,0x52,0x65,0x15 .byte 0x13,0xfb,0x25,0xb3,0xa4,0x7d,0x2f,0x5c,0xef,0xf6,0x6d,0xb4,0x9f,0xb6,0x21,0x9e,0xec,0xa5,0x15,0xc9,0xf0,0x92,0x92,0x36,0x49,0x46,0xea,0xe3,0x4b,0x38,0x5b,0xfa,0xc1,0x87,0x75,0x79,0x82,0xa0,0x37,0x30,0xca,0x0c,0xec,0x5b,0x5b,0xcd,0x1d,0x30,0xeb,0x63,0x11,0x66,0xb3,0x5f,0x81,0xfd,0x69,0x32,0x80,0x08,0x06,0xcf,0xbf,0xb0 .byte 0x31,0xec,0xa9,0x8f,0x66,0x00,0x05,0x55,0x04,0x0d,0xcf,0xb9,0x3f,0xcc,0x5b,0x1a,0x11,0xb4,0x96,0x39,0x70,0x26,0xd2,0x4d,0x4e,0xac,0x2b,0x36,0x4c,0x77,0x0b,0xc2,0x9b,0xd0,0xc6,0x03,0xc6,0xec,0xdd,0x74,0x53,0xe5,0x8a,0x9c,0x17,0xe0,0x1b,0xe8,0x1e,0xfb,0x9a,0x11,0x61,0x68,0xe0,0xf5,0x3e,0xe2,0x3a,0x4a,0x20,0xa0,0xe1,0x40 .byte 0xbe,0xdd,0xec,0x5e,0x1f,0x0f,0x87,0x9f,0x5d,0xc6,0x4b,0x2e,0x81,0x52,0x25,0x59,0x3e,0x3d,0xbb,0xb5,0x32,0x88,0xc0,0x3a,0x15,0x0d,0x77,0x9e,0x9e,0x31,0x26,0x61,0x24,0xa4,0xe6,0x35,0x50,0xca,0x61,0x55,0x8f,0x0a,0xaa,0x7c,0x3f,0x9e,0x30,0x04,0x03,0xa2,0x3c,0x2a,0x02,0xf4,0x70,0x9e,0xe7,0xa5,0x6e,0xb7,0x9b,0x4c,0x47,0xe5 .byte 0x1b,0xa7,0x91,0x36,0x1c,0xed,0x84,0xab,0xf4,0x33,0x56,0xb6,0x94,0xb8,0xa0,0x68,0x34,0x15,0x87,0xc6,0x7b,0x36,0xea,0x51,0x94,0xeb,0xde,0x6e,0xfd,0xde,0xe1,0x3c,0x44,0x04,0x8e,0xb1,0x35,0x4b,0x8c,0x2b,0xd2,0x4b,0x63,0x48,0x0c,0xbd,0x92,0x61,0x39,0x4d,0xdd,0xc9,0xb9,0x1f,0xf6,0xc8,0x70,0xfd,0x9c,0xd2,0xef,0x71,0x6c,0x32 .byte 0x99,0x2c,0xa5,0x8e,0xa9,0xb5,0x0f,0xeb,0x8d,0x9a,0xbc,0x2a,0x3f,0x11,0x68,0xb6,0xdf,0x93,0x4d,0xd3,0x6c,0x00,0x45,0xc3,0x5a,0xad,0xaa,0xe7,0x31,0x9c,0xad,0x9a,0xe4,0xf7,0xda,0xa0,0x5b,0x0b,0x23,0x78,0x40,0x92,0x12,0xe9,0x66,0x7c,0x04,0x60,0xbd,0xd2,0x74,0xcf,0xc9,0xd7,0xae,0x47,0x69,0x4b,0x5b,0x16,0x64,0x48,0xca,0x03 .byte 0x27,0x30,0x4c,0x65,0x0c,0xbf,0x74,0x03,0x81,0xaf,0xa2,0xb4,0x45,0xfe,0x9e,0x66,0x3a,0xa2,0xc8,0xce,0xc3,0x5e,0x6b,0xc7,0x70,0x51,0xfa,0xe3,0xce,0xc3,0x18,0x7b,0x39,0xfc,0x6f,0xae,0x31,0x09,0x2d,0x63,0xb7,0xb8,0x43,0x5c,0x78,0xa9,0x35,0xae,0x87,0x2a,0xf0,0xbc,0xc1,0xd8,0x21,0x02,0x2e,0x11,0x6b,0x41,0xa9,0x21,0x8d,0x94 .byte 0x70,0x85,0x08,0x22,0x9e,0xae,0x38,0x23,0x07,0x97,0x72,0xd5,0xa6,0x3c,0xb2,0xb9,0xaf,0x2e,0x8f,0xd3,0x25,0xaa,0xc4,0xee,0x77,0x72,0x17,0xe4,0xa8,0x4a,0xf4,0x79,0x8c,0x37,0xa1,0x80,0xbb,0x82,0x29,0x3a,0x7c,0x8a,0x6f,0x3a,0x83,0xaa,0x94,0xf3,0x95,0x66,0x0e,0xdd,0x51,0x09,0x12,0xf8,0x1d,0xb9,0xa8,0x83,0x2d,0x29,0x34,0xd5 .byte 0x53,0xcd,0xeb,0x22,0x31,0x22,0xea,0x65,0xb4,0x8c,0x0c,0x1b,0xf7,0x72,0x54,0xed,0xd3,0x2e,0xd6,0xc2,0xed,0xe9,0x12,0x61,0x7a,0x51,0xc8,0x50,0x01,0xf9,0xe8,0x12,0x43,0x4e,0x58,0x29,0xec,0xeb,0xdb,0xcd,0x94,0xba,0xaa,0x87,0x4d,0xbf,0x20,0x3e,0x31,0x05,0x7b,0x5a,0xfa,0x9a,0x16,0x14,0x11,0x2c,0x9f,0x96,0xe6,0x38,0xff,0xfa .byte 0x4e,0x05,0x3f,0xcb,0x13,0xdd,0x4e,0x70,0x41,0xce,0xb8,0xae,0xc2,0xf7,0x67,0xa0,0x68,0xb5,0x8d,0x03,0x72,0x4a,0x0e,0x27,0x99,0xef,0x09,0x32,0x3c,0x77,0xde,0x9c,0xfd,0x6c,0x65,0xcd,0x6b,0x10,0x42,0x08,0x12,0x30,0xa4,0x0c,0xdd,0xc9,0x86,0xc6,0xe8,0x84,0x6d,0x69,0x71,0x45,0x6b,0xb5,0xcb,0x74,0x81,0xe9,0x34,0xa5,0xf1,0x66 .byte 0x2e,0x31,0xcb,0xf8,0xec,0x9e,0x97,0x7e,0x3d,0x16,0xd7,0xab,0x5b,0xc8,0xf7,0x4f,0x59,0xbe,0x1f,0x12,0xfa,0x0d,0xb1,0x76,0x2d,0xe4,0x00,0xd9,0x30,0x3e,0x73,0x0a,0xa7,0xf7,0x19,0x06,0xe7,0xd4,0x81,0x2f,0xf0,0x8b,0x44,0xa9,0xaf,0xc8,0x95,0xd8,0xbb,0x92,0xb8,0x2f,0xd3,0x2c,0xcb,0x3e,0x5f,0x4e,0x42,0x2f,0x98,0x88,0xbc,0xf4 .byte 0x46,0x94,0x1d,0x5a,0x23,0xc8,0xb2,0x28,0x67,0xa7,0x26,0x1e,0x37,0x21,0x8a,0x7f,0xdc,0x8e,0x1c,0xa3,0x50,0x95,0x07,0xdf,0x8d,0x7b,0xab,0x29,0xc1,0x87,0x69,0x6a,0x8e,0xdf,0xcf,0x5f,0xb7,0x1b,0x8f,0xc7,0xc4,0x63,0x27,0x43,0x17,0x3d,0x29,0x94,0x71,0xa5,0xcc,0x1c,0xbf,0xc5,0x4a,0xd5,0x5e,0xe9,0x6d,0xa6,0x00,0x0b,0x41,0xe0 .byte 0x91,0x73,0xc9,0x22,0xf3,0xb2,0x5b,0x95,0xc8,0x5c,0x43,0xe2,0x48,0x3a,0x7e,0x67,0xf1,0x95,0x49,0xd9,0x47,0x68,0xc5,0xbf,0x28,0x2e,0x8c,0xcf,0x26,0xc2,0x23,0xec,0xb2,0xef,0xff,0x29,0x3d,0x7f,0x3f,0x4c,0xfb,0x7a,0x0d,0x80,0x89,0x0c,0x6d,0x45,0xf8,0xb9,0x72,0xa9,0x5b,0xbe,0x51,0x46,0x3b,0xe2,0x08,0x73,0x87,0x72,0x3e,0x1b .byte 0x7e,0x05,0x9d,0xce,0xc7,0x14,0xbe,0x36,0xa9,0xf8,0x5f,0x3e,0x3c,0x82,0x83,0x75,0xd7,0x96,0x9e,0x1b,0x6d,0x5b,0x2b,0x7d,0xdd,0xb9,0x42,0x19,0xbe,0x57,0xe3,0x9b,0xcc,0x3d,0x26,0x80,0xec,0x68,0x52,0x8f,0x85,0xd2,0x12,0x7b,0xe1,0x31,0x64,0xd6,0xde,0xe1,0xc1,0x8e,0x8c,0x66,0x8c,0x6b,0xb2,0x5f,0x75,0x9a,0x1b,0x96,0x78,0xb5 .byte 0x79,0x53,0xbb,0x70,0x4c,0x5e,0x8e,0x60,0xfa,0x1e,0xee,0xde,0x8d,0xd1,0x33,0xf6,0x36,0x95,0x00,0x6f,0xba,0xc7,0xf4,0xd1,0x96,0x33,0xf8,0xa2,0x20,0x65,0xf3,0x97,0x7d,0x0b,0x68,0x23,0x3d,0x39,0x54,0x67,0xb5,0xfc,0xff,0x48,0x04,0xb0,0xd2,0xea,0x09,0x1b,0xff,0x41,0x00,0xff,0x2d,0xc6,0x9f,0x8b,0x37,0xc9,0x35,0x37,0x38,0xd7 .byte 0x68,0x0e,0xa9,0x9b,0x19,0x25,0x17,0x94,0x55,0x0b,0x09,0x7f,0xc5,0x2f,0xb5,0x93,0x61,0x91,0x30,0xe5,0x46,0x09,0xff,0xf7,0x9d,0x7d,0x5e,0x9a,0x0e,0x5f,0xc1,0x2f,0xf3,0x09,0xc6,0xb2,0x86,0xca,0x0e,0x6f,0x3e,0x17,0x43,0x7d,0x4d,0x51,0x33,0x2b,0x57,0xf8,0xd0,0x1a,0x0e,0x8e,0xe6,0xc3,0x87,0x35,0xe4,0x53,0x3c,0xdf,0x9a,0xc9 .byte 0x5a,0x5d,0x40,0x80,0x90,0x97,0x7f,0x8c,0x55,0xbe,0x19,0x57,0x96,0x55,0x2e,0x7b,0x27,0x79,0x19,0xeb,0x8e,0x7a,0x27,0xf0,0xc4,0x9a,0x16,0x12,0xc9,0x41,0xdd,0xec,0x12,0x58,0x95,0xca,0xc7,0x77,0xd8,0xd8,0x17,0xa5,0x9b,0x79,0x8c,0xcb,0x04,0x07,0x69,0x06,0xf2,0x71,0x33,0x5e,0x96,0x56,0x90,0x75,0xa3,0x1b,0x4b,0x1b,0x18,0x71 .byte 0x18,0x25,0xc2,0x81,0x16,0xb6,0xd1,0x35,0x53,0x58,0x2f,0x49,0x4e,0xf0,0xab,0x23,0xa9,0xc8,0x28,0xc8,0x8a,0x2a,0x94,0x55,0x72,0xa2,0xf0,0x25,0x47,0x30,0x85,0x79,0xba,0x91,0x38,0xfe,0xbf,0x9d,0x05,0x8d,0xf7,0xd5,0x77,0x71,0x06,0x22,0x14,0x8b,0xb6,0x42,0x90,0x39,0xca,0x23,0x78,0xde,0x54,0x0e,0xe8,0xc5,0xb4,0xd6,0x07,0xf6 .byte 0x4e,0xa9,0xb4,0x9a,0xa1,0x03,0x36,0x83,0xb9,0x69,0x29,0xf5,0xc6,0x98,0x9f,0x47,0x53,0x46,0x13,0xf3,0xe5,0x93,0x28,0x20,0x5d,0x1f,0x0f,0x6a,0xee,0xa8,0xc1,0x96,0x7f,0xcb,0xf4,0xc3,0x17,0x95,0x6a,0xe5,0xc7,0xb3,0x77,0x0e,0xa8,0x9f,0x91,0xfd,0xb2,0x4b,0x7d,0xf7,0x78,0x57,0x9e,0x87,0xd7,0xf4,0x3e,0x81,0xc4,0x91,0x71,0xd9 .byte 0x6b,0x21,0x78,0x82,0x8a,0x03,0x5b,0x2e,0x89,0xc9,0xd4,0xca,0x5d,0x32,0x57,0x43,0xb0,0xe5,0xe3,0x9f,0x93,0xb5,0x4d,0x52,0xce,0xe6,0x46,0x05,0xe8,0x36,0x26,0x35,0x90,0x69,0x0c,0x8e,0xf0,0x65,0x03,0x65,0x32,0x10,0xae,0xdd,0x85,0xdd,0xef,0x84,0x0e,0xd1,0x03,0x51,0x02,0x0b,0x37,0x0f,0xdf,0x95,0xbb,0x5b,0xe2,0x25,0xda,0xd6 .byte 0x0a,0x55,0x55,0x8a,0x3a,0x72,0xca,0xc3,0x6f,0x84,0xe9,0x09,0xad,0x2f,0x73,0x1b,0x99,0xa6,0x22,0xc4,0xc5,0xf2,0x40,0x44,0xd8,0x4b,0x7a,0x75,0x82,0x06,0x9c,0x0f,0x73,0x89,0xa3,0x57,0x3a,0xf7,0x36,0xcf,0x86,0x34,0x2f,0x37,0x01,0xcf,0x4b,0x4d,0x83,0xe4,0xe3,0x92,0x1c,0xe7,0x67,0x01,0x72,0xec,0x50,0xe0,0x9f,0x0a,0xa9,0x41 .byte 0xe2,0x4d,0x43,0x01,0x14,0xe0,0xbc,0x11,0x4f,0xf8,0xdb,0xab,0x6f,0x07,0x5a,0x71,0x28,0xb9,0xaf,0x6e,0xd1,0x3d,0x3c,0x6e,0xd9,0xa9,0xe4,0xe2,0x71,0x40,0x31,0x9d,0x48,0xcb,0x76,0x3e,0x5d,0x0d,0xb4,0x11,0x0c,0x4d,0x89,0xba,0x16,0x8a,0xd6,0x43,0x99,0x65,0xec,0xbd,0xdd,0xae,0x4a,0xb4,0x6c,0x77,0x36,0x5b,0xef,0x51,0x33,0xcd .byte 0x3f,0x55,0xc5,0x00,0x25,0x85,0x0b,0x83,0xd6,0x22,0x70,0xb5,0x32,0x7f,0xb0,0x02,0x7b,0x8d,0x8c,0x09,0x37,0xf6,0x26,0x95,0xe2,0xb2,0x4c,0x7f,0x18,0x50,0xe9,0x96,0x65,0xe8,0x1a,0x70,0xff,0xbb,0x1e,0x35,0xda,0x41,0xbd,0x89,0xa8,0x7f,0xb0,0x85,0x05,0xd7,0xd1,0x11,0x66,0x2f,0xf6,0x66,0x50,0x05,0x66,0x58,0xb2,0x2a,0x5d,0xad .byte 0x42,0x60,0x14,0x7c,0xad,0xba,0x03,0xf8,0xce,0x29,0x6b,0x13,0xb3,0xdf,0xd1,0x5a,0x7a,0x11,0x8a,0x8b,0x6c,0x62,0x12,0xc3,0x77,0x28,0xcc,0x34,0x18,0x67,0x46,0xb5,0xda,0x87,0x1f,0x65,0x01,0xe7,0xe3,0x55,0x17,0xaf,0xd3,0x40,0x32,0x23,0x16,0x0a,0x57,0x86,0xab,0xdb,0xd8,0x18,0x71,0x96,0x11,0x1c,0xc1,0x87,0xaf,0xc9,0x7a,0xfa .byte 0x07,0x2a,0xdc,0x95,0x08,0xff,0xea,0x78,0x84,0x63,0x18,0xd5,0x54,0x6e,0x85,0x8e,0xcd,0xd6,0xff,0xea,0x8c,0xad,0xc4,0xdb,0x4f,0x33,0xcb,0x5c,0x01,0x6c,0xc4,0x60,0x04,0x43,0x7b,0x53,0x29,0x99,0xff,0xcd,0x4c,0xf1,0x82,0x11,0x85,0x84,0xf4,0xe5,0x29,0x65,0x6c,0x9f,0xb1,0x2b,0xa5,0xb5,0xc1,0xd6,0x5f,0xb7,0x0c,0x7b,0xf6,0x17 .byte 0xb7,0x80,0xaf,0xd2,0x9e,0x20,0x6e,0x01,0x5c,0x09,0x6b,0xd5,0xe3,0x4a,0x43,0x60,0x7e,0xc8,0xb4,0x1c,0x08,0x79,0x8e,0x48,0x71,0x22,0x81,0xd9,0x81,0x19,0x0a,0x04,0x29,0xce,0x09,0x70,0x82,0x49,0xc0,0xc0,0x3f,0xcc,0x9f,0x18,0x9a,0xd5,0x5e,0xde,0x70,0xdb,0x85,0xd8,0x53,0x71,0x7f,0x03,0xf1,0xf3,0x07,0x52,0x79,0x44,0xea,0xac .byte 0xd9,0xf3,0x0c,0x1e,0xb5,0x57,0xf8,0xfb,0x41,0x69,0xf1,0xf5,0x40,0xc7,0xd7,0x94,0x06,0x95,0x3a,0x49,0x0c,0x09,0x84,0xa7,0x1c,0x42,0x52,0x65,0xb9,0xef,0x6f,0x9b,0x37,0x5e,0xc3,0x3e,0x6b,0x96,0x93,0x02,0x94,0x9a,0xdc,0x04,0xb2,0x85,0x3c,0xa9,0x5b,0xa0,0x55,0x2e,0xaa,0x06,0xfd,0xc6,0xbc,0x73,0x32,0x08,0x26,0x5b,0x0a,0xa2 .byte 0x42,0xf2,0x61,0xb8,0x09,0xf0,0xaa,0xee,0xb7,0x35,0x63,0xe5,0xb2,0xfe,0xec,0xe7,0xae,0x62,0xf2,0x43,0x12,0xde,0xb4,0x8f,0xc1,0x06,0x72,0xde,0x7d,0x75,0x54,0x07,0x4a,0x99,0x83,0x39,0x97,0x9c,0x1e,0xd4,0xaf,0x2a,0x8c,0xb4,0x92,0xb5,0x9a,0xf7,0x87,0x8f,0x60,0xda,0xe5,0x01,0xca,0xc6,0x61,0x3d,0xb1,0xbe,0x33,0x58,0x2e,0xb1 .byte 0x7e,0xa1,0x3b,0x93,0x8d,0x25,0xe3,0xb4,0xea,0x94,0x26,0xbe,0xa9,0xf9,0xa1,0x2f,0x61,0xf4,0x7c,0x32,0x31,0x2e,0x99,0xdb,0xa4,0x3f,0xbf,0xd9,0xdb,0xca,0xd8,0x3d,0xda,0x44,0xe0,0x14,0x39,0x18,0xff,0x3e,0x5b,0xd2,0xc9,0x91,0xe1,0xa1,0xea,0x3f,0x1b,0x0e,0xd6,0x82,0xa6,0xb1,0xa2,0x6f,0x85,0x51,0xfc,0xa8,0x47,0xd7,0x87,0x28 .byte 0xc6,0x2f,0x2a,0x9f,0xad,0x7e,0xcc,0xd9,0xd2,0xfa,0x4c,0x28,0xca,0x66,0x55,0x1e,0x26,0x6d,0x19,0xe4,0x47,0x25,0x18,0x12,0xc5,0xe1,0x12,0x43,0x7c,0x96,0xb7,0x52,0xa6,0x07,0x04,0x83,0x44,0x82,0xcd,0x4e,0x79,0x07,0x0c,0x01,0xe4,0x81,0x25,0x98,0xce,0x2e,0x07,0x3c,0x76,0x39,0x37,0xc0,0xd0,0x54,0x14,0xaf,0x6c,0x87,0x99,0x1e .byte 0xf2,0xa3,0xd6,0x32,0x40,0xd1,0xe4,0x8d,0x60,0x32,0xf7,0xb0,0xaf,0x05,0x10,0x04,0xaa,0x99,0xfa,0xea,0x39,0x58,0x5f,0x30,0x06,0x2b,0x6d,0xd6,0x68,0x1c,0x85,0xcf,0xda,0xa9,0xd6,0xc3,0x05,0xd7,0xe3,0x3b,0x8c,0xc1,0xfe,0xf8,0x58,0x1d,0x1f,0x7b,0x80,0xcc,0xf3,0x4b,0x6f,0x3c,0x52,0x62,0x97,0x15,0xeb,0x5b,0x0f,0xaa,0x77,0x6c .byte 0x82,0x63,0x5e,0x84,0xbe,0xc5,0xb5,0x50,0x48,0x7c,0x56,0xbf,0x3a,0x8c,0xb4,0xbc,0x3e,0x8e,0xcf,0x2d,0xa2,0x26,0x3d,0xde,0x9d,0x4b,0xda,0xa4,0xd9,0x9b,0x6d,0xeb,0x35,0x44,0xa9,0x06,0x20,0x39,0x83,0xd5,0xeb,0x09,0xf0,0x45,0xdb,0xbb,0x9d,0x53,0x4d,0xbe,0xe3,0x3e,0x66,0xee,0xb2,0xce,0x3a,0xf0,0x75,0x92,0x58,0x79,0x5a,0xba .byte 0x1b,0x75,0x6b,0x83,0x0a,0xb6,0xe0,0x52,0xd3,0x61,0x2a,0xc0,0xa9,0x41,0x15,0x8c,0xd9,0x6b,0x87,0x94,0xda,0x31,0x0c,0x14,0x3e,0x37,0xd2,0xed,0xf6,0x40,0x57,0x70,0xc5,0xf5,0x0e,0xc4,0x3b,0x51,0xdf,0x4c,0xd2,0x42,0xbc,0xa5,0x3b,0x88,0x78,0x85,0x16,0x6c,0xaf,0x19,0xcf,0xb0,0x6a,0x42,0x07,0x66,0xf6,0xa7,0x4a,0x77,0x87,0x5f .byte 0x81,0x78,0x84,0xea,0x86,0xeb,0xe9,0x86,0xba,0x00,0xb4,0xe2,0xe7,0xd0,0x91,0x3d,0x9c,0x80,0xd6,0x37,0x86,0x96,0x80,0xcc,0xa0,0x8d,0xaa,0xc3,0x4f,0x79,0x9d,0xb8,0xa6,0xfb,0x0e,0x34,0x0d,0x54,0x1d,0xc1,0x51,0x62,0xb1,0x7b,0x8a,0x63,0x2c,0xbd,0xac,0xc7,0x6d,0x03,0xa2,0xdc,0xba,0xc9,0x70,0x9b,0x34,0x19,0x26,0x7f,0xd1,0x1e .byte 0xf7,0x47,0x38,0x3c,0x50,0x28,0xf8,0xba,0x0e,0xa0,0xfb,0x03,0xa1,0xb4,0x5e,0xf7,0x77,0xec,0x5d,0x94,0x6e,0xe6,0x40,0x1d,0xe4,0x0d,0x23,0x9f,0xe1,0x8c,0x7f,0xfa,0x83,0xd9,0x39,0x67,0xbd,0x41,0x82,0x37,0x7c,0x6a,0xc5,0x74,0x0d,0x41,0x35,0x55,0x64,0x7f,0x4c,0x3e,0x13,0xfc,0x41,0x4f,0x5e,0x1b,0xd8,0x4d,0x02,0x28,0x29,0x20 .byte 0x4c,0xcd,0x1b,0x5f,0xe7,0x51,0x68,0x2d,0x05,0xea,0x35,0x20,0xac,0x5b,0x44,0x70,0x02,0x55,0x20,0x17,0xcb,0xb5,0xd0,0xbf,0x79,0x33,0x02,0x69,0xa1,0xb0,0x24,0x10,0x62,0x0a,0x66,0x7c,0x0b,0xb2,0x50,0xa0,0xf6,0x94,0xf1,0x98,0xc7,0x8c,0x4a,0xef,0x03,0xb1,0x7e,0xe7,0x60,0xc0,0x38,0x7e,0xbf,0xbd,0x7a,0xa8,0x0b,0xe5,0x2d,0xed .byte 0x68,0xb0,0x37,0xa2,0x9b,0x6e,0x20,0x06,0xd2,0x7c,0xf7,0x50,0x03,0x19,0x74,0xf5,0xc8,0x84,0x44,0xeb,0x63,0x3f,0x10,0x63,0x36,0x62,0x48,0x96,0x4d,0xde,0xf2,0x08,0xc6,0xf4,0x09,0xeb,0x37,0xe8,0x0f,0x29,0xb5,0x9f,0xe6,0x58,0x86,0xf5,0xeb,0x18,0xa8,0xe0,0x28,0xf4,0x79,0x1f,0x98,0x60,0x82,0x67,0x06,0xfd,0x21,0x04,0x4d,0x33 .byte 0x17,0xc5,0x2f,0x3e,0x0d,0x8d,0x02,0x37,0x9b,0x66,0xb0,0x06,0x09,0xe0,0x92,0x10,0xb9,0x04,0x3a,0xc6,0x42,0x34,0x70,0xcb,0x51,0xd0,0x78,0xd3,0x0e,0x83,0x65,0x00,0xcf,0x95,0x83,0x51,0xca,0x62,0xfe,0x3e,0x3f,0xc4,0x7f,0x10,0x5b,0x85,0x00,0x5f,0x7d,0x38,0x93,0xf3,0xb7,0x33,0xbd,0x4c,0x1d,0xcd,0xc9,0xfa,0x05,0xb6,0x31,0x78 .byte 0xc8,0xc8,0x51,0x34,0xd6,0xb5,0x1a,0xa2,0xdb,0x7f,0x3d,0x8a,0x1b,0x49,0x36,0xaf,0x49,0x99,0x10,0x65,0xbe,0x19,0xf9,0x9f,0xaa,0xd6,0xc6,0x69,0x52,0x42,0x79,0x6b,0x64,0x53,0x90,0xb7,0x7f,0x7f,0xd2,0xde,0xe2,0xda,0x5f,0x3e,0xa6,0x5d,0xf2,0xcc,0x8a,0x88,0x2f,0x44,0xcf,0x07,0x77,0x7b,0x20,0x55,0xcc,0xa4,0x48,0x7d,0x87,0x6a .byte 0x25,0x35,0x07,0x7c,0x37,0x02,0xb5,0x7c,0x5f,0x2d,0xc2,0x92,0x1d,0xe5,0xb2,0x55,0x85,0xdd,0x58,0x24,0xc3,0x2a,0x11,0xca,0x02,0x36,0x44,0x96,0x7a,0xf3,0x42,0xfd,0x05,0xf8,0xe1,0xa0,0x06,0xd8,0x3f,0x37,0x4e,0x15,0xca,0x1c,0xe8,0x8d,0x20,0xed,0x83,0xa2,0x42,0x9a,0xe5,0x51,0xf0,0xae,0x43,0x9d,0xa8,0x76,0xb8,0xf6,0xca,0x06 .byte 0x5d,0xa1,0x61,0x36,0x4c,0x13,0x75,0xe5,0xbf,0x5c,0x40,0x43,0xa0,0x50,0x4e,0xf7,0xea,0x35,0xa2,0x43,0x38,0x6b,0x20,0x3a,0x8b,0x05,0x28,0xbe,0x72,0x16,0x48,0x9c,0xbf,0x2d,0xff,0x1e,0x0f,0x08,0x3b,0xaa,0x49,0x42,0x72,0x92,0x3b,0x4f,0x28,0x8b,0xab,0x4e,0xa0,0xaf,0x36,0xba,0x7e,0x19,0xa7,0xc7,0xfd,0xd4,0xe2,0x80,0x33,0x2b .byte 0xb9,0x2d,0x81,0x65,0x43,0xe1,0x3e,0xab,0xa5,0x36,0x00,0x68,0xb8,0xd8,0x27,0x64,0x85,0x10,0x67,0x68,0xd0,0x66,0xeb,0x2f,0xf2,0xa0,0x6e,0x6b,0xd5,0xc3,0x5f,0xa3,0x95,0xc8,0x5e,0x0f,0x3d,0x61,0xb3,0x12,0x99,0xd6,0x9a,0xe5,0x40,0x47,0xb4,0xcf,0x83,0xf2,0x79,0x31,0x18,0x54,0x6e,0x9c,0x32,0x63,0x2f,0x06,0x94,0x7a,0xd7,0x46 .byte 0x5b,0xd4,0xe3,0x58,0xbf,0x54,0xeb,0x47,0x85,0x47,0xe1,0x47,0x11,0x08,0x20,0x75,0x33,0x5c,0xed,0x58,0x26,0x5b,0x0f,0x4e,0x0f,0x8c,0x25,0x8c,0x36,0x28,0x03,0x73,0x93,0xb0,0xc8,0x9f,0x5e,0xd7,0x9e,0x57,0x88,0x07,0x92,0x1a,0xa0,0xfe,0xd0,0xc6,0x1c,0x7c,0x48,0x34,0x52,0x10,0xd1,0x3a,0x82,0x8d,0xe9,0x52,0xa1,0xfe,0x87,0x0f .byte 0x04,0x6a,0xb0,0x67,0xc6,0xd7,0x09,0x00,0x66,0x35,0x6a,0x67,0x12,0x92,0xf5,0xbb,0xc5,0x16,0x0d,0x20,0x71,0x52,0x30,0xbe,0x03,0xb2,0x36,0xcf,0x88,0x11,0xb0,0x93,0x4a,0x4f,0xb3,0xc5,0x7f,0xbe,0xff,0xc0,0x68,0xd7,0x44,0x6e,0x98,0x42,0x4b,0x21,0xbe,0xe3,0x33,0x30,0xa3,0xa5,0x3c,0x66,0x79,0xaf,0xe6,0x58,0x42,0x5e,0xc6,0xf9 .byte 0x5e,0xea,0x0a,0x5f,0x08,0x2d,0x96,0xa3,0xcc,0x17,0xf6,0xac,0x67,0xba,0xc4,0xf7,0x40,0xca,0xc3,0x66,0x36,0x01,0x29,0xcf,0xc2,0x1e,0xfa,0xe2,0xba,0x44,0x36,0xda,0xf6,0xc5,0x53,0x35,0x64,0x74,0x0d,0x16,0x75,0x2a,0x82,0x3a,0x4e,0x5a,0x2c,0x62,0x23,0x2a,0x66,0x0f,0xad,0xdc,0x44,0x77,0x2f,0x78,0x74,0x82,0xe2,0xbf,0x3e,0x19 .byte 0x00,0x58,0xb7,0x65,0xb0,0x24,0x87,0xc5,0xe0,0x7c,0xbd,0x3a,0x97,0x30,0xa7,0xd4,0x79,0x91,0x96,0x7e,0x7d,0x75,0xf5,0x9d,0xb3,0x0e,0x2a,0xde,0x08,0x96,0xb6,0xdc,0xa4,0xf6,0xf7,0xa4,0xde,0xb7,0x9b,0xc5,0x75,0xdf,0xa6,0xe1,0x6f,0x5a,0x9f,0xaf,0x1d,0x60,0xac,0xde,0x1a,0xb9,0x02,0x0b,0xc5,0x6e,0x24,0x59,0xf9,0xc8,0xdc,0x97 .byte 0x53,0xf4,0x1b,0xf8,0x53,0x80,0x34,0xaa,0x53,0xaf,0x06,0x79,0xeb,0x39,0x72,0xd4,0x1d,0xf2,0xb7,0x26,0x41,0x8c,0xc5,0x6d,0x86,0xf8,0x34,0x98,0x98,0xa0,0x19,0x2e,0x9f,0xb0,0x0b,0xe8,0x3d,0xef,0xe1,0xb6,0x18,0xc3,0x63,0xc4,0x0e,0x6e,0x92,0x41,0x43,0x9a,0x2a,0xe3,0x3a,0x9f,0xac,0xac,0x0a,0xe8,0x6a,0xa4,0xa6,0x97,0x0e,0xd9 .byte 0xbd,0x97,0x57,0x38,0x6c,0x2c,0xa4,0x62,0xdb,0xea,0xb6,0x90,0x4c,0x7c,0x29,0xd2,0x06,0x24,0x57,0x5d,0x2c,0x71,0xb4,0xa5,0x13,0x5e,0x6e,0xb5,0x42,0x7e,0xb5,0x3f,0xd0,0x49,0xa5,0xd2,0xf6,0xe5,0xc8,0x86,0xef,0xae,0xcc,0x98,0x5f,0x0d,0x43,0x20,0x2f,0xe4,0x90,0xd1,0x1d,0x66,0xc4,0x38,0x7f,0x63,0xea,0x39,0x8b,0x16,0xfa,0x19 .byte 0x77,0x8c,0xbf,0x28,0x4c,0xce,0x6c,0x08,0x98,0x7b,0x6a,0xf8,0xb3,0xc9,0x41,0xb1,0xf4,0xf4,0x05,0xbd,0xdb,0xd9,0xf8,0x0d,0x74,0xfe,0x3a,0x07,0xe7,0x11,0xbd,0x33,0xc2,0xd6,0x59,0x62,0x4f,0x22,0x86,0xf6,0xf2,0x9a,0x19,0x81,0xe7,0x17,0xfb,0xe7,0xfa,0x7f,0x6a,0xcf,0xf1,0x71,0xe7,0xf0,0xbb,0x6b,0xe1,0xc1,0x26,0x6e,0x41,0xfd .byte 0xa4,0x83,0xd9,0x68,0xcd,0xc4,0x7b,0x04,0x7a,0x3f,0x18,0xa9,0x73,0x21,0xa2,0x38,0xc2,0xf4,0x88,0x7e,0xa6,0x20,0xaf,0x60,0xb9,0xb9,0xf0,0x74,0x52,0x3a,0x09,0xe6,0x22,0xc8,0xa0,0x0f,0xf1,0xa4,0x02,0x2a,0x80,0x17,0x40,0x83,0x26,0x5e,0xe5,0x78,0xc3,0x78,0x5b,0x9d,0x74,0xf4,0x4f,0x58,0x5a,0xfc,0xde,0x11,0xf7,0xee,0xdc,0x68 .byte 0x57,0x1a,0x54,0x0a,0xe3,0xf2,0x77,0xe1,0x36,0x4d,0xa4,0x9e,0xad,0x86,0x81,0x54,0xd9,0xa5,0x90,0x0e,0xa9,0xfb,0x95,0xaa,0x98,0xea,0x0d,0xc7,0x33,0x40,0x62,0x67,0xf2,0xdf,0x54,0x64,0x82,0xd0,0x21,0xd9,0x87,0xcb,0x47,0xff,0x3b,0xde,0x53,0x61,0x4f,0x33,0xb2,0x4a,0x76,0xd6,0xa2,0x66,0x93,0x39,0x8b,0xee,0xbc,0x0d,0x54,0x8e .byte 0xe4,0xfe,0x4b,0xae,0x2f,0x05,0xcf,0xfc,0x0e,0xa7,0xc8,0x8d,0x43,0x66,0xc7,0xc8,0x64,0x49,0x57,0xca,0xe2,0x1a,0xac,0x11,0xc2,0x17,0xf2,0x6a,0xc5,0x97,0xb9,0x28,0xe0,0xe7,0x3b,0x6f,0x78,0x99,0x5c,0xec,0x30,0xb7,0x1c,0x9f,0x2f,0xac,0x4d,0x1d,0x90,0x8e,0x6a,0x0d,0x20,0xe6,0x43,0xf3,0x1e,0xa6,0xc8,0x00,0x0e,0x5e,0x62,0x9d .byte 0xea,0x58,0x23,0x46,0x43,0x29,0xc6,0x1f,0x0c,0x9a,0x3e,0x19,0x53,0xf2,0x3f,0xd8,0x13,0x68,0x90,0x98,0xa3,0xcf,0x22,0x3c,0x55,0xfc,0x36,0x15,0x14,0x39,0x8b,0x32,0xa7,0x81,0x96,0xb1,0x3e,0xf2,0x2c,0xf8,0xea,0xf6,0x10,0xe5,0x89,0x30,0xa5,0xa4,0xc7,0x5b,0x41,0xfd,0x0c,0x39,0x60,0x9c,0x0d,0x49,0x36,0xa8,0xe6,0xe7,0x9c,0xbe .byte 0x8e,0x23,0x7c,0xb2,0x86,0x6e,0x6b,0x0e,0xa7,0xa7,0xc5,0x42,0xcf,0x14,0xf1,0x88,0xb9,0x7b,0x1f,0xfd,0x5b,0xd6,0xbe,0xa7,0x19,0x15,0x29,0x34,0x44,0x40,0xc8,0xfa,0xde,0x69,0xde,0xec,0xa6,0x39,0xfe,0xce,0x44,0xa9,0x39,0x5d,0x6e,0xac,0x75,0x77,0x32,0xc5,0x28,0xfd,0x18,0xa0,0x2a,0x3e,0x1f,0x30,0x63,0x8e,0x46,0x15,0x49,0x49 .byte 0x15,0xb4,0x1b,0x69,0x83,0x92,0xac,0x3b,0x76,0x75,0x52,0x18,0xbf,0x0c,0xc0,0x55,0x80,0xac,0xf0,0x4f,0x49,0x00,0x6e,0xd2,0x46,0xcc,0x9d,0x4b,0xb3,0x75,0x6a,0x4b,0x43,0x29,0xf4,0x8f,0x9f,0x61,0x51,0xd8,0x59,0x8e,0x9d,0x9c,0x95,0x69,0xdc,0xba,0x73,0x03,0x55,0x65,0x19,0xc1,0x94,0x31,0xde,0x5e,0x26,0xd7,0x3c,0xde,0xae,0xf6 .byte 0xa0,0xf5,0xc4,0x9c,0x7c,0x3a,0x8d,0xe4,0x90,0x71,0xd6,0xc1,0x84,0xd9,0xb3,0x80,0xae,0x78,0x96,0xec,0x30,0x6d,0x2d,0x74,0x37,0x14,0x2b,0x6c,0x88,0x2c,0xcd,0xd3,0x50,0x15,0x38,0xf5,0xe2,0x85,0xaa,0x95,0xdd,0xed,0x8e,0xe4,0x6d,0xa5,0x6b,0x27,0xee,0x4b,0xaf,0x9e,0xbc,0xae,0xf9,0xc7,0x85,0x0e,0x30,0x30,0x10,0xde,0x9e,0xe5 .byte 0x05,0xd8,0xd9,0xaa,0x3c,0x6c,0x59,0x7d,0xc2,0x59,0x33,0xb5,0x94,0xc1,0xa8,0x27,0xff,0x7d,0xdd,0x6e,0x8b,0xc5,0x09,0x52,0x04,0x72,0x72,0x81,0x6e,0xaf,0xe0,0x15,0x42,0x4a,0xb3,0x46,0xdc,0xfb,0x8c,0x5a,0xe4,0xcc,0xfb,0x94,0x47,0xd7,0xe3,0x8e,0x6a,0x73,0x23,0x12,0xdb,0x2e,0x2b,0x7e,0x7a,0x25,0x7c,0x75,0x0e,0xa2,0x7e,0x20 .byte 0xdc,0xc9,0xc3,0xd5,0x63,0x96,0x19,0x25,0xb7,0xa4,0x8e,0x1a,0x5a,0x92,0x62,0xcb,0xa8,0x5b,0x80,0x61,0x26,0x1b,0x6d,0xab,0x1e,0x09,0xd4,0x06,0xd4,0x96,0xc9,0xc8,0x51,0xb9,0xfd,0x19,0xca,0xc6,0x65,0x74,0xf5,0x4d,0xee,0xc8,0x52,0xb4,0x17,0xff,0x63,0x46,0x45,0xdf,0x8f,0xd1,0x49,0x05,0xe3,0x36,0x76,0xdd,0x47,0x8a,0x7e,0x43 .byte 0x6d,0x0a,0x11,0x78,0xbc,0x56,0x6d,0x5e,0x62,0x5e,0x6d,0xfc,0x03,0x9c,0x53,0x25,0x10,0xc4,0xd4,0x48,0xf9,0x67,0xa4,0xb5,0x71,0xe7,0x08,0x42,0x37,0x1b,0xe1,0x9c,0xe6,0xb5,0xbc,0xf5,0xc6,0x56,0xab,0xd1,0x45,0x93,0x2c,0xbe,0x87,0x52,0x27,0xa1,0xe3,0x38,0x1a,0x4d,0xae,0x98,0xb3,0xf8,0x4d,0x00,0x76,0xe3,0x31,0x62,0x83,0x04 .byte 0xee,0x62,0x35,0x70,0xb4,0x98,0x4c,0x5a,0x0f,0xcf,0x94,0xf3,0x4f,0xab,0xd7,0xbc,0xa0,0x9f,0x5e,0xe7,0x58,0x40,0xb5,0x9f,0xf8,0xd3,0x86,0x25,0x13,0x12,0xb3,0x0a,0x72,0x1f,0xef,0x39,0x07,0xf4,0x1c,0x6c,0x38,0xb7,0xd5,0x5b,0xda,0x68,0xd5,0x68,0xc7,0xa6,0x2b,0x94,0x33,0x11,0xff,0x71,0x15,0x86,0x58,0xb5,0x62,0xdc,0x7a,0x1b .byte 0xdb,0xc5,0x81,0x24,0xcb,0xcb,0xbd,0x03,0x15,0x8d,0xdb,0xdb,0x20,0x51,0x0e,0x2d,0xc3,0xa2,0x3d,0x3a,0x3d,0x00,0xdb,0xbd,0xf0,0xe4,0x82,0x8f,0x9c,0xf7,0xdb,0x82,0xac,0x50,0xe5,0x2b,0x35,0x65,0xee,0x7a,0x61,0x4d,0x29,0x32,0x60,0xd0,0x02,0x40,0x45,0x75,0xc7,0x48,0xa7,0x0f,0x1e,0x1c,0xb4,0xd9,0x06,0xd4,0x31,0x72,0x24,0x33 .byte 0x57,0xe6,0xe6,0x3d,0x3a,0xde,0xbd,0xc0,0xbc,0xfd,0x78,0xe5,0x8c,0x8f,0x36,0x33,0xba,0x70,0xea,0x78,0x30,0x50,0xb6,0x79,0xb5,0x63,0x43,0xea,0x88,0x6c,0x8c,0x9a,0x42,0x44,0x15,0xb9,0xdc,0xdf,0xaa,0xfa,0xe7,0x76,0x26,0x32,0x98,0x96,0xdc,0x0c,0x3f,0xf9,0xff,0x9e,0x09,0xba,0x19,0xef,0x10,0x35,0x93,0x3c,0xb8,0x48,0x39,0x05 .byte 0x98,0xaa,0x74,0x53,0xf3,0x2b,0x62,0xdd,0xa1,0x28,0xe8,0x0d,0x52,0x51,0x89,0x80,0x68,0x1d,0xb9,0x86,0x01,0x69,0x9b,0x53,0x5f,0xe8,0x05,0xe5,0x34,0x62,0xfa,0x70,0x9d,0xcd,0x00,0x74,0xf6,0xc3,0x68,0xb9,0x8d,0x7b,0xff,0x05,0x70,0xf9,0xa5,0xc8,0xa2,0x42,0xc0,0xc2,0x2e,0xb2,0xc1,0x33,0xfd,0x5c,0xf2,0x05,0x82,0xf2,0x29,0x0f .byte 0xd1,0x05,0x13,0xba,0xe0,0xbd,0x00,0x89,0xbe,0x04,0xb3,0x09,0x1b,0xd5,0x3e,0x56,0x74,0xf9,0xb5,0xf5,0x46,0x13,0x1c,0x2f,0x90,0xd6,0x24,0xa1,0x5a,0x94,0x65,0x78,0x30,0x67,0x0e,0xe2,0xc9,0x9a,0x3f,0xe6,0xdc,0xdc,0xca,0x11,0xf4,0xd0,0x04,0xe4,0x14,0xef,0xc6,0x7b,0x11,0x14,0x29,0xc4,0xde,0xe7,0x25,0xeb,0x44,0x74,0x7e,0xdb .byte 0x71,0x0b,0x58,0xdb,0x1f,0x15,0x85,0xb3,0x43,0x6d,0x3c,0xda,0x69,0x3c,0x84,0xf4,0x41,0x55,0xd0,0x99,0x4f,0x9b,0x8d,0x68,0x18,0x2c,0x2a,0x58,0xc8,0xc2,0xac,0xa5,0x30,0x37,0xa6,0x44,0xd0,0xd6,0x92,0xe4,0xa3,0x0d,0x2b,0xc4,0xa3,0x54,0xc2,0x3d,0xaa,0xf0,0x03,0x66,0x1e,0xac,0x05,0x5a,0xb5,0x46,0x96,0xc5,0x09,0x93,0xa7,0x98 .byte 0x16,0x5a,0xb7,0xfb,0x9f,0x70,0xcc,0xe5,0x03,0x74,0x66,0x2c,0xac,0x7b,0x11,0xfd,0x9d,0xf3,0x2d,0xaa,0xf0,0xea,0x4f,0x00,0x9d,0x11,0x20,0xa4,0x2b,0x3e,0x8e,0x2f,0xcd,0xfd,0x8d,0xaf,0xbe,0x8b,0x72,0xc3,0xd7,0x18,0x2c,0x88,0xdd,0xae,0x2e,0xf6,0xd9,0xb9,0x9e,0x68,0xb7,0xe5,0xde,0x83,0xeb,0x16,0x19,0x43,0x21,0xbb,0x24,0x33 .byte 0xc4,0xce,0xb2,0xb4,0x13,0x52,0xf5,0x62,0xfe,0xd1,0x37,0xf2,0xee,0xd4,0xa9,0x4b,0x35,0xf5,0xfd,0x7b,0xb0,0x85,0xee,0xb7,0x96,0x32,0x49,0x07,0x5f,0x98,0x8d,0x5e,0x16,0xdd,0xbb,0x88,0x82,0x1f,0x35,0x25,0x24,0x09,0x62,0x4d,0x82,0x09,0xa4,0x13,0x91,0x51,0xc9,0x85,0xae,0xee,0x2f,0x6a,0x9c,0xcc,0x73,0x8c,0x7c,0x61,0x05,0xc3 .byte 0x18,0xa1,0xc1,0x7b,0x3d,0x85,0x0e,0x03,0x30,0xa5,0x5f,0x0b,0x33,0xd6,0xc8,0x1a,0x37,0xb0,0x3e,0xc7,0x7e,0x24,0x53,0x7f,0xfe,0x64,0x91,0x46,0xf9,0x6a,0x4a,0x87,0x92,0x0e,0x4d,0x62,0xb8,0x70,0xf9,0xa3,0x76,0x5e,0xc1,0x45,0x24,0x46,0xe9,0x0a,0xf0,0x50,0x21,0x3c,0x6a,0x3a,0x90,0x1b,0x36,0x5d,0xc6,0xd5,0x48,0x78,0x09,0xe0 .byte 0x24,0xd8,0x16,0xc0,0xec,0x3a,0xb5,0x12,0x8c,0x7c,0xc0,0xb1,0xf7,0x00,0x63,0x96,0x37,0x44,0xc2,0x8f,0xad,0xdc,0xda,0xa4,0x3a,0x5c,0x04,0x14,0x60,0xc4,0xf5,0x64,0xdd,0xf1,0xd9,0x04,0x6f,0xc6,0x0b,0x3d,0x7d,0x40,0x32,0xcc,0x79,0xb5,0x2f,0x99,0xc3,0xf7,0x7b,0xd9,0x54,0x60,0x49,0x46,0x92,0xd8,0x71,0x3e,0xca,0xfe,0x8c,0xb3 .byte 0x52,0x3b,0xbf,0x42,0xec,0xab,0x71,0x0d,0xa6,0xb9,0x53,0x37,0xed,0x01,0x58,0xbc,0x00,0x55,0x5d,0x0d,0x0d,0xb0,0x62,0x53,0xbf,0x76,0xba,0xfa,0x15,0xe7,0x22,0x69,0x9d,0x1c,0x23,0xfc,0x2d,0x65,0xa0,0x6d,0xba,0x39,0x3e,0x51,0x51,0x4b,0x50,0x10,0x59,0x04,0x82,0x92,0x75,0xa1,0x24,0x62,0xe3,0x5b,0x85,0xb1,0xfa,0xc4,0xc0,0xe9 .byte 0x26,0x19,0x63,0x2e,0xa9,0x16,0xda,0xae,0x45,0x1c,0x84,0x4c,0x94,0x6a,0xd0,0xd1,0xd2,0xb0,0x6c,0xb0,0x3b,0x3a,0x90,0x9e,0x7a,0xa7,0xb6,0x1b,0x2c,0x1d,0x7d,0xfe,0xfe,0xc7,0x7d,0x4d,0xf2,0xdf,0x23,0x54,0xea,0xb1,0xcf,0xd0,0xd1,0x1d,0xaf,0x01,0x86,0x73,0x18,0x1a,0x66,0xc1,0x66,0x32,0xd9,0xf3,0x07,0x65,0x6d,0xe9,0xae,0xfd .byte 0xb3,0x8e,0x18,0x7a,0xb4,0x5d,0x53,0xb0,0x26,0x51,0x08,0x40,0x42,0x8e,0xcc,0xdc,0xdf,0x39,0x36,0xa5,0xbe,0x91,0x41,0xe4,0x78,0x29,0x76,0x54,0x61,0x43,0xa4,0xb7,0x94,0x0e,0x17,0x7f,0x46,0xad,0x5a,0x3d,0x6b,0xfc,0xf9,0xa0,0x3a,0xe5,0x86,0x75,0xc3,0xff,0xab,0xbc,0x99,0xeb,0x9f,0x85,0xb8,0x0c,0x9c,0x9b,0x6f,0xd3,0x74,0xf6 .byte 0x58,0x72,0x96,0x5c,0x49,0x31,0x4f,0x61,0x4f,0x78,0x8b,0x94,0x40,0x75,0xf4,0x66,0xcc,0xd9,0x27,0x9c,0x6d,0xac,0xef,0xa7,0x4e,0xd8,0xb7,0xf9,0x3a,0xf7,0x63,0xb5,0xec,0xc7,0xad,0xe5,0x2c,0x87,0xed,0xae,0x1e,0xdd,0x05,0x1b,0xf0,0x61,0x82,0xf3,0x40,0xc2,0x1b,0xe2,0xc7,0xce,0x2d,0x4c,0xbe,0x3a,0x51,0x63,0xef,0xe0,0xf2,0xae .byte 0x0d,0xfd,0x6a,0x38,0x1f,0xc2,0xf1,0x91,0xc1,0x12,0x74,0x88,0x32,0x61,0xa7,0x65,0xea,0x30,0xfa,0x4c,0x93,0x61,0xef,0xa9,0x49,0x74,0xe7,0xfb,0x7a,0x3d,0xf9,0xbf,0xfe,0xdd,0x17,0x29,0xe5,0xdf,0xab,0x3a,0xf1,0xc2,0x1a,0x53,0x82,0xd0,0xe3,0x46,0x85,0x87,0x69,0xdf,0xb1,0x64,0xc3,0x39,0x24,0x27,0x29,0x16,0x66,0xb2,0x55,0xcf .byte 0x2c,0xab,0x9e,0x35,0x4a,0x86,0x06,0x51,0x9d,0x1d,0x07,0x61,0x7f,0x71,0xa8,0x6f,0xef,0xf9,0x9d,0xf3,0x56,0xef,0x97,0x4a,0x6a,0x07,0x70,0xd7,0x80,0xcc,0x33,0x98,0x87,0x8e,0xa6,0xc3,0x18,0x58,0xfd,0xe9,0x4d,0x7d,0x07,0x8e,0x7d,0xae,0x30,0x1d,0x2d,0x1c,0x34,0x98,0x01,0xb9,0x13,0x86,0x13,0x26,0x55,0x15,0xe6,0x87,0x6f,0xc8 .byte 0x3c,0x4d,0x1e,0x70,0xdc,0x44,0x40,0xb0,0x69,0xe7,0xb4,0xf5,0x81,0x66,0xef,0x70,0x15,0xee,0x6e,0xb4,0x44,0x9e,0xbb,0x40,0x6f,0x5b,0x36,0x96,0xd4,0x52,0x8d,0x9e,0x0f,0x9a,0x97,0xea,0xd1,0x37,0x7e,0x9a,0x30,0xb4,0xe9,0x1f,0x01,0x0d,0x26,0xa6,0xb1,0x74,0x90,0x6e,0xe1,0xe0,0x67,0x7c,0x76,0x6c,0xed,0xbd,0x62,0x61,0x8d,0x66 .byte 0x7e,0x71,0x07,0x9a,0xcd,0x9e,0x7d,0xc7,0x78,0x39,0xaa,0xc8,0x83,0xdd,0xb7,0x28,0xb8,0xce,0x05,0x29,0x50,0x06,0xd0,0xe5,0xc2,0x01,0x31,0x7a,0x41,0x3a,0xdf,0x4f,0x7d,0xb3,0xa2,0x2a,0x5b,0x1e,0x39,0x1d,0xfd,0xbf,0x3c,0x9c,0xe3,0x17,0xfb,0x21,0x5d,0xdc,0x48,0x05,0xf1,0x36,0xac,0x98,0x9b,0xd2,0xb2,0xbd,0x97,0x2a,0x19,0x9b .byte 0xfc,0x05,0x85,0x87,0x69,0x60,0x2c,0x83,0xfa,0x39,0xda,0x0e,0x3e,0x80,0xc9,0xf4,0x5a,0x6b,0xe3,0xda,0x72,0xed,0x42,0x39,0x67,0x00,0x38,0x7e,0x84,0xdd,0x5c,0x06,0x9c,0xee,0x4a,0xf3,0x75,0x32,0x6f,0x69,0x9a,0xa6,0x5e,0xb8,0x10,0x7d,0xe8,0x35,0x5e,0xa1,0x86,0x69,0x2a,0x48,0xa7,0x53,0xef,0xce,0x90,0x49,0xce,0x82,0x92,0x20 .byte 0xfd,0x71,0xe7,0xb4,0xce,0x81,0x01,0xf9,0xaf,0x36,0xd9,0xe2,0x28,0xe9,0xd0,0x9f,0x0f,0xf0,0x2f,0xca,0xa4,0x2b,0x90,0xdd,0x21,0x66,0x1c,0xbc,0x3f,0x80,0x89,0xcc,0x53,0xe5,0x72,0x91,0x45,0x9f,0x62,0x57,0x70,0x29,0xb9,0x6d,0x41,0xa3,0x67,0xf3,0x99,0xac,0x0e,0x3c,0x43,0x1f,0x92,0xf0,0xd5,0xca,0x86,0xad,0x0a,0xd4,0x2b,0xf4 .byte 0x3f,0x8f,0x90,0xcf,0x05,0x9f,0x07,0x07,0xac,0x36,0x5c,0x7d,0xb6,0xcb,0x9b,0x77,0x1a,0x11,0xed,0x0a,0x4e,0x1f,0x7b,0x68,0x39,0x88,0xb2,0x5d,0x8a,0x37,0x83,0x25,0xd6,0xc7,0x98,0x0a,0x1a,0x14,0x9a,0x1f,0x1e,0x66,0xd4,0x4f,0xd6,0x3f,0x88,0x7b,0x4a,0x18,0x06,0x27,0x79,0x40,0xc7,0xc8,0x54,0x8b,0xc8,0xc3,0x2e,0x56,0xf8,0x92 .byte 0xda,0xac,0x74,0x5b,0xaf,0x02,0x0d,0xe7,0xc4,0xf4,0x72,0xab,0xb1,0x83,0x4b,0x7a,0xe0,0xe1,0xe2,0xac,0xe7,0x20,0xbd,0xc3,0xda,0xae,0x10,0x47,0x68,0x3b,0xd1,0xc5,0xd7,0x28,0x8e,0x31,0xcf,0xba,0xe3,0x33,0x56,0x5e,0x8c,0x44,0xe4,0x41,0x9b,0xbb,0x8a,0x80,0x98,0xb8,0xc6,0x66,0x2c,0xa1,0x26,0x42,0xb4,0x90,0x42,0xf9,0xc5,0x4b .byte 0x7c,0xaa,0xf1,0x70,0x8a,0x00,0x80,0x31,0xf9,0x0b,0x5e,0xec,0x25,0x36,0x2a,0x98,0x0c,0x05,0x97,0x23,0xd3,0x9e,0xf6,0xa9,0x11,0x8e,0xee,0x0a,0xda,0x8e,0xd3,0x65,0xc7,0x50,0x55,0xba,0x08,0x7e,0x78,0x1a,0x04,0x91,0x43,0x3a,0x14,0xfb,0x88,0x65,0x59,0xfe,0xf3,0xa6,0xde,0x3f,0x98,0xc4,0x7e,0x67,0x05,0x79,0x1f,0x26,0xce,0x9d .byte 0xee,0x2c,0x86,0x81,0xf9,0x35,0x47,0x52,0x7b,0x35,0x6d,0xda,0x5f,0xd8,0x91,0x59,0x9d,0x8d,0x91,0xe7,0x3f,0x79,0x0c,0xca,0xc5,0x08,0xfd,0x59,0x24,0xaf,0x6c,0x3a,0x2a,0xd9,0xb6,0xaa,0x46,0x1b,0x9d,0x2e,0x17,0x5a,0x94,0x56,0xd4,0xb8,0xc9,0xb3,0xa5,0x4b,0xc7,0xfa,0x2d,0xd0,0x37,0x83,0xf1,0x53,0x27,0x42,0x8d,0x98,0x02,0x73 .byte 0x26,0x18,0x5d,0x32,0xf5,0xda,0xac,0x5d,0x45,0x10,0x58,0xec,0x0a,0xdd,0x8a,0xf0,0x65,0x03,0x6e,0x0f,0xd3,0x6d,0x83,0x2e,0x28,0x2c,0xd6,0x31,0x52,0x2b,0xb5,0x49,0x43,0x81,0xfd,0xd6,0x7c,0x72,0x19,0x9d,0x02,0x9f,0x15,0xca,0xfa,0x34,0xbe,0x10,0xf3,0x2d,0x93,0xcd,0xde,0x4f,0xb7,0xe9,0x74,0xb5,0x85,0xb6,0x1f,0xc5,0x14,0x1a .byte 0x54,0x48,0x8d,0x0b,0x16,0x2c,0x62,0x15,0x64,0x55,0x7f,0x8e,0x59,0x10,0x53,0x98,0x2f,0x5d,0x92,0x7d,0x98,0x17,0x80,0x57,0x2d,0x5a,0x59,0x1b,0x97,0x46,0x59,0x1c,0x7c,0x3d,0x5b,0x4b,0x27,0x14,0xf3,0xfe,0x76,0x4e,0x1f,0xd6,0x2c,0x84,0x6e,0x8e,0xec,0xa7,0x0f,0x18,0x8f,0x96,0xd8,0xdf,0xba,0x1d,0x2d,0x41,0xd3,0xcf,0x2e,0xcc .byte 0x52,0xdd,0xf9,0xd3,0x1b,0x6b,0xf9,0x4d,0x99,0xf9,0x19,0x58,0xc9,0x3f,0x4d,0xe9,0xad,0xd2,0xe8,0xd6,0x87,0x82,0xf0,0xcf,0x0d,0x17,0x30,0x85,0x9e,0x0e,0xca,0x15,0xa5,0x8e,0x88,0x27,0x7c,0xf7,0x3b,0xf3,0x43,0x5e,0xa6,0x3f,0x8d,0x86,0x5c,0x21,0x3b,0x20,0xf9,0xe4,0x55,0x37,0x8a,0x8c,0x41,0xcf,0x2c,0x8e,0xa9,0x17,0x96,0xaf .byte 0x3a,0x8f,0x4b,0x3d,0x9d,0xb9,0x17,0xe9,0x46,0x2d,0xf5,0x4c,0xfd,0x0d,0xee,0xbe,0x25,0x84,0x75,0xda,0xaf,0x0c,0x87,0xb0,0x7a,0x29,0xd9,0x6a,0x0d,0x8a,0xad,0xb0,0xc5,0xac,0xf0,0xad,0x2c,0xec,0x2b,0x91,0x36,0xc5,0xbc,0xfe,0x92,0xa8,0x84,0xff,0xa5,0xf1,0x07,0xfc,0xeb,0xe4,0xd8,0x39,0x63,0x2e,0x4f,0xfd,0x46,0x64,0x3c,0xd1 .byte 0x3a,0x8d,0xab,0x8c,0xa1,0xd8,0x46,0xc2,0xf4,0xcf,0xa1,0x75,0xc3,0x50,0x97,0x8b,0x7c,0xdb,0x45,0x36,0x8c,0x85,0x0f,0xb9,0xfc,0x37,0xdd,0x64,0x68,0xe2,0xa8,0x9e,0x03,0x02,0x30,0x43,0x9f,0xb1,0xfe,0xe8,0x95,0xbf,0xfb,0x34,0x14,0x62,0xbf,0x0a,0x20,0x56,0x52,0x69,0xd5,0x2e,0x2f,0xff,0x4d,0xe2,0x27,0x99,0x32,0xb6,0x49,0xe9 .byte 0xa8,0xcf,0xe4,0x81,0xef,0x36,0x75,0x13,0x83,0x82,0x59,0x43,0x22,0x3c,0xfd,0xe7,0xf1,0x51,0x5d,0x1e,0x08,0xde,0xc6,0x6b,0x2d,0xd4,0x71,0xf8,0xe9,0xae,0x32,0x64,0x10,0x5d,0x96,0xf9,0xc2,0x2a,0x45,0x35,0x64,0x1e,0xdf,0xb9,0x24,0xf1,0x8d,0x75,0x95,0x2c,0x0b,0x9f,0x3f,0x12,0xe3,0x31,0xe4,0x8b,0x2d,0x1e,0xd2,0x9e,0xe7,0xde .byte 0xc3,0x45,0x6f,0xe0,0xe0,0x7d,0xed,0x95,0xad,0xe7,0xca,0x27,0xee,0xc7,0x18,0x6d,0xcf,0x1d,0x2a,0x6c,0x37,0xc2,0xa6,0x82,0x26,0xb8,0x8e,0x6d,0x00,0x99,0x82,0x24,0xda,0xe3,0x9a,0x84,0x12,0x31,0xc3,0x3d,0x4b,0x44,0xde,0x8a,0x2b,0x64,0xc9,0xea,0xa9,0x73,0xd1,0xc6,0x75,0x3f,0x60,0xb9,0xdd,0x06,0x55,0xae,0x44,0x16,0x30,0xb8 .byte 0x02,0x07,0xe9,0x4f,0x23,0x1b,0x02,0x4f,0x2e,0xaa,0x43,0x34,0x44,0xca,0xf5,0x68,0x85,0xcc,0x50,0xc3,0x43,0x71,0xc8,0x24,0x6a,0x30,0x48,0xee,0xeb,0xd2,0xf3,0x18,0x7f,0xb0,0x89,0x68,0x80,0xa3,0xbb,0x06,0xf9,0x04,0xaa,0xda,0xd0,0xfb,0x47,0xd7,0xea,0x3e,0xf8,0x61,0x57,0x8f,0x1e,0xb7,0xc1,0x9e,0x09,0x7e,0x49,0x08,0x2f,0x8a .byte 0xdf,0x04,0x85,0x40,0x6f,0xfa,0xc1,0x0b,0x0d,0x60,0xc4,0x88,0x58,0x99,0xbc,0xcc,0x67,0xba,0xab,0x39,0xeb,0x32,0x6e,0xe8,0xb6,0x82,0x78,0x15,0xc3,0x51,0xda,0x53,0x32,0x70,0xc7,0x0f,0x56,0x31,0x71,0xac,0xc8,0x62,0x04,0x58,0x2e,0x9e,0xcb,0x0f,0xb1,0x05,0x82,0x50,0x53,0xdd,0xa2,0x03,0x78,0x1a,0x4e,0x70,0x57,0x24,0xfa,0xa2 .byte 0x69,0xfa,0xd3,0x6c,0xd6,0x90,0x2b,0xed,0x7b,0x39,0xe8,0xed,0xa5,0x5d,0xf8,0xf2,0xbb,0xe5,0x09,0xa5,0x89,0x37,0x9a,0x3b,0xdc,0xae,0xd3,0xba,0x88,0xad,0x0b,0x41,0xf0,0x72,0x8a,0x40,0x32,0x98,0x77,0x3f,0x3a,0x37,0xa6,0x15,0x58,0xbd,0xf2,0x04,0x17,0x3d,0xcb,0x23,0x1f,0x49,0x19,0x62,0xc8,0x97,0x44,0xbd,0xf1,0x69,0x17,0x5f .byte 0x08,0xee,0x0b,0x1c,0x71,0x46,0x5f,0x2a,0x40,0x74,0x0b,0xb0,0x8a,0xb3,0x15,0x8c,0xbc,0x8e,0x9c,0x53,0x8a,0x5f,0xd1,0x10,0xc7,0xbc,0x7a,0x85,0x6e,0x8a,0x35,0xd9,0x2c,0xf1,0xa2,0x16,0xdf,0xf0,0xaf,0x09,0x4b,0x9d,0xe6,0x22,0x5f,0xac,0x91,0x18,0x4b,0x3b,0x96,0xd8,0x2d,0x4e,0x03,0x81,0xe3,0xd8,0x8d,0x15,0x83,0x09,0xca,0xa7 .byte 0x1b,0x4a,0x4e,0x36,0xbb,0x05,0x36,0xf2,0xb6,0x81,0x50,0xa4,0xaf,0x6c,0x5e,0xce,0x11,0x83,0x71,0x8e,0xcd,0x41,0x61,0x0e,0x27,0xaf,0xa4,0x9e,0xcd,0xe6,0xc8,0xb5,0x69,0x88,0xf7,0x9a,0xcb,0x7d,0xa2,0x30,0x20,0xdb,0xb6,0x5c,0x15,0xa2,0xf4,0x02,0x53,0x82,0x4a,0x6b,0x39,0xdb,0x3a,0x5e,0xa0,0x3d,0xbf,0xcf,0x1e,0x26,0x17,0xae .byte 0x34,0x8c,0xd7,0x7e,0x45,0xbd,0x53,0xcf,0x0d,0xb3,0x47,0x6c,0xef,0x3b,0xde,0xf6,0x40,0x04,0x11,0x1d,0x1c,0x93,0x48,0xba,0xf1,0x13,0x9d,0x03,0x60,0xab,0x10,0x5f,0x72,0x00,0xf9,0x71,0x7c,0xe1,0xb7,0xd4,0xbf,0xb1,0x1e,0x7f,0x2b,0x99,0x54,0x81,0x56,0xfd,0x9f,0x60,0x81,0x3f,0x7e,0xbf,0xc0,0x01,0xb0,0x12,0x1b,0xca,0x9f,0x09 .byte 0xc8,0x6d,0x44,0xdf,0xd3,0xbc,0xd3,0xb5,0xeb,0x09,0x24,0xec,0xde,0x50,0xe0,0xb2,0xc7,0x0b,0x3f,0x41,0xad,0x10,0xaa,0xc4,0xf0,0x79,0x25,0xc0,0x75,0x08,0x9f,0xe2,0xde,0xe3,0x12,0x20,0x0e,0x81,0x2c,0x27,0x68,0x53,0x40,0xa1,0xf1,0xf2,0x12,0x25,0x3c,0x16,0xe3,0x27,0x8a,0x18,0x1a,0x5b,0xfd,0xc5,0xd1,0x1e,0x4b,0x85,0xcb,0xd0 .byte 0xbf,0x3e,0xd3,0x4e,0xfd,0x79,0xc9,0xb0,0xf3,0x88,0x24,0x38,0xe4,0xd5,0xe1,0xfd,0x92,0xe0,0x21,0xea,0x50,0x59,0x01,0xa3,0xfd,0x43,0xfb,0x3f,0xc3,0x24,0x0a,0x18,0x98,0x1f,0xc1,0x1e,0x9b,0xd5,0x80,0xa3,0xca,0x5f,0x49,0xf0,0x1b,0xe1,0x2a,0xa9,0xe0,0xca,0xf9,0x5e,0x15,0x0f,0x59,0x04,0x18,0x09,0x75,0xb7,0x33,0xf8,0x79,0xf1 .byte 0x3b,0xb9,0xc5,0x60,0xcd,0x1d,0xb8,0xd0,0xc6,0x68,0x65,0xa9,0xdd,0x83,0x67,0x3c,0x21,0x8e,0x1f,0x4b,0xfd,0x4f,0x2f,0x31,0x63,0x5f,0xfc,0xb4,0x6b,0x7a,0x08,0x46,0x06,0x88,0x2d,0xf9,0x72,0xc4,0x59,0x13,0x80,0x0c,0xe1,0x74,0x82,0x48,0x0c,0xb3,0x04,0x37,0xd0,0xf7,0xe1,0x38,0x83,0xb9,0xd9,0x79,0x65,0xab,0x7f,0x9e,0xb8,0xc6 .byte 0x72,0xf3,0xca,0x3f,0x46,0xe7,0x4a,0x6a,0xb2,0x3e,0xe2,0xf4,0xdb,0x60,0xc4,0x95,0x7e,0x9e,0xe8,0x1f,0x87,0x6c,0x20,0x46,0xfd,0x91,0xa0,0xd7,0x9a,0x64,0xa5,0xf0,0x28,0xe1,0x87,0xda,0x61,0xd5,0x1e,0x55,0x56,0x93,0x68,0x94,0xcb,0x64,0x79,0xa4,0xbf,0x75,0x3a,0x6a,0x3a,0x29,0x73,0xb7,0x87,0x8a,0x98,0x1a,0xa5,0xc7,0xe9,0xea .byte 0x42,0x0a,0x9f,0x9c,0xcd,0xf5,0xcb,0xdd,0xad,0xe4,0xb2,0xdd,0xa5,0x8b,0xf8,0x4a,0x12,0x86,0xec,0x2d,0xe8,0xe9,0xa1,0x8b,0x95,0x51,0xfd,0x31,0x8e,0xf9,0xb3,0x30,0x5f,0xab,0xc8,0xf6,0xdd,0xec,0x7a,0x12,0x7c,0xcf,0xf4,0x6d,0x1b,0x5e,0xba,0x8a,0xa4,0xe4,0x79,0xa0,0x97,0xf6,0x44,0x46,0x81,0xcb,0xeb,0x1b,0x3a,0x06,0xe8,0xb5 .byte 0xbf,0xc3,0xe3,0x64,0x9f,0xeb,0xef,0x88,0x6c,0xc0,0x35,0x8b,0x9b,0x0c,0x5b,0x3c,0x99,0xce,0x7b,0x34,0xe3,0x06,0xda,0x19,0xbb,0x81,0x1d,0xa2,0xa9,0xb8,0x1f,0xf1,0xc8,0x1f,0x8a,0x29,0xae,0xd6,0x82,0x9b,0xaf,0x68,0x27,0x01,0x14,0x1a,0x1f,0xfd,0xdc,0xcf,0xcd,0x95,0x6b,0x67,0xde,0x3c,0x75,0x11,0xbe,0x4f,0xa6,0x9d,0x83,0x5f .byte 0x23,0xc6,0xfd,0x21,0x78,0x90,0x22,0x25,0xd5,0x48,0xef,0xf0,0x26,0x73,0x05,0xad,0x8b,0xa3,0x4c,0xdd,0xff,0xfb,0xa0,0xc2,0xc4,0x76,0xcc,0x9f,0x75,0x3e,0x16,0xe6,0x28,0x04,0xae,0x5d,0xb0,0x2f,0x19,0xa5,0x53,0x2d,0x30,0x45,0x1a,0x5c,0x09,0xa3,0xd3,0xbc,0x71,0xd4,0xa7,0xf2,0xb0,0x19,0xd7,0xf4,0x28,0xad,0xdf,0xf6,0xd7,0x37 .byte 0xa0,0x73,0x8a,0x7b,0x33,0xdc,0xb4,0xb0,0x68,0xa7,0x78,0x76,0xde,0x53,0x6a,0xf8,0x12,0x9d,0x26,0xe4,0x9e,0x5a,0xd3,0x60,0xf9,0x44,0x99,0xd1,0x38,0x60,0x2b,0x69,0xec,0xec,0xd2,0x68,0xfc,0xdb,0x3d,0xed,0x4e,0xf8,0x85,0x84,0x48,0xb7,0xa3,0x05,0x9e,0x11,0xdd,0x42,0xa7,0x6e,0x09,0x93,0xa6,0x17,0x76,0x29,0x13,0xed,0xbc,0x14 .byte 0x91,0x11,0x47,0x47,0xca,0x4e,0xc9,0xd5,0x6c,0x06,0x7d,0xcb,0xbf,0x87,0x56,0x36,0xe8,0x1f,0x57,0xe0,0xdf,0x21,0xd5,0xa2,0x46,0x12,0x54,0x04,0xc2,0x81,0x3a,0xb6,0xb1,0xaa,0x59,0x52,0xbf,0xb3,0x1c,0x8f,0x74,0xb1,0x9c,0x0a,0xda,0x69,0x8b,0xe6,0x68,0x6b,0xf5,0x1f,0x91,0x16,0x56,0x6b,0x13,0x06,0x51,0x0e,0x81,0x8f,0x5f,0xa5 .byte 0x26,0x20,0xb8,0xfe,0x40,0x4e,0x31,0xdc,0x35,0xa0,0x76,0x3c,0x33,0x19,0xe2,0xda,0xb0,0xda,0xc4,0xe4,0xc4,0xe4,0xfb,0x66,0xef,0x28,0x69,0x0e,0x54,0x09,0x5b,0x8a,0x83,0x7f,0xc4,0x9d,0x5d,0xa1,0xa5,0xf1,0x75,0x05,0xda,0x8a,0xf5,0xa0,0x70,0xb4,0x62,0x99,0x54,0x3a,0x99,0x4d,0xa4,0xe4,0x3a,0xd5,0x46,0x5d,0x5d,0x13,0x14,0x7a .byte 0x45,0xf4,0x91,0x2f,0xe0,0x96,0xaf,0xd0,0x76,0xa5,0xd7,0x49,0x61,0x0a,0x87,0x05,0xcc,0x6e,0xf5,0xc9,0x29,0xe9,0x5a,0x89,0x13,0xd2,0x69,0x9a,0xd5,0x75,0xf6,0x9c,0xc2,0x9e,0xc3,0xe4,0xd7,0xce,0x87,0x36,0xc6,0xb6,0xab,0x7d,0x81,0xb5,0x0f,0x3d,0xd5,0x5a,0x3a,0x87,0x89,0xa6,0x10,0xa6,0xca,0x1d,0x86,0x54,0x02,0x7d,0x6f,0x8f .byte 0x14,0x16,0xbd,0xe5,0xce,0x08,0x34,0x11,0xf3,0xd7,0x6d,0x91,0xc5,0xdf,0x15,0x22,0x13,0xc3,0x55,0xeb,0x6b,0xc4,0xf2,0xfa,0x39,0xd8,0x64,0x29,0x4f,0x5c,0x3a,0xf8,0x7e,0xd9,0x73,0x27,0xf7,0x8f,0xb4,0x55,0xe0,0xcb,0xdf,0xcb,0x4f,0x42,0xc2,0x9b,0xd8,0x1b,0xfc,0x6d,0x4a,0x8d,0x83,0xa4,0x02,0x86,0x7f,0x07,0x9f,0xdc,0x5a,0x70 .byte 0x2a,0xf3,0xbc,0x3f,0x78,0xf9,0x6b,0xac,0x73,0xbf,0x6f,0x89,0x60,0x67,0x4b,0xd9,0xe1,0x57,0x41,0x35,0x56,0xdf,0x74,0xab,0x89,0x1a,0x10,0xe8,0x24,0xd6,0x64,0x22,0x46,0xb8,0xca,0x33,0x9e,0x6f,0x15,0xf3,0x4a,0x42,0x2a,0x61,0x70,0x1a,0x78,0x5f,0x3a,0x74,0xd2,0x05,0xff,0x70,0xee,0x5d,0x15,0x98,0x38,0x4d,0xed,0x8a,0x14,0x60 .byte 0x00,0x41,0x6d,0x6a,0x29,0xb6,0xb2,0xd1,0x2e,0x1f,0xd2,0xde,0x71,0x97,0x4b,0x26,0xd8,0x20,0x92,0x5e,0x0a,0x52,0x16,0x84,0x65,0x43,0xde,0x8b,0xf9,0x1e,0x5c,0xec,0xfb,0x71,0x42,0xcc,0xca,0x99,0xbc,0x34,0x07,0xa1,0x32,0x4d,0xc7,0x95,0xfd,0xe7,0x56,0x9c,0x35,0xd5,0xbb,0x96,0x41,0xbf,0x60,0xac,0xe2,0xe7,0xda,0x1f,0x8c,0xb5 .byte 0x15,0x12,0x94,0xbf,0x8e,0x41,0x5c,0x67,0x51,0x02,0xc5,0x82,0x34,0x15,0xbe,0xd4,0x49,0x41,0x1b,0xfd,0x24,0x8a,0x11,0xff,0x01,0x86,0xab,0xbc,0x80,0xc6,0x7f,0xec,0x31,0xcf,0x06,0xc1,0xa2,0x02,0x3b,0x21,0x26,0xd3,0x1d,0xd3,0xe3,0x99,0xf6,0x29,0x6c,0x6c,0xf4,0xd3,0x6f,0x8e,0xf1,0x4e,0x87,0x57,0x7b,0x43,0xf8,0x03,0x3d,0x20 .byte 0x3d,0x99,0x90,0x5d,0x9b,0xf2,0x19,0xb9,0x3b,0x98,0x09,0xd1,0xe3,0xcf,0x10,0xd1,0xa5,0xc3,0x74,0x64,0xbe,0x68,0xb0,0xc5,0x90,0xf0,0x42,0x84,0xdc,0x14,0xbe,0xa8,0x23,0x62,0xfa,0x5e,0x7c,0xfd,0x82,0xdc,0x05,0x17,0x22,0x17,0x12,0xfa,0xd7,0xb8,0x71,0xdf,0x84,0x8e,0x41,0x3e,0x6d,0x1e,0x66,0x57,0x40,0x51,0x0c,0x00,0xea,0x64 .byte 0x99,0x39,0xb6,0x41,0xcd,0xd1,0xf9,0x52,0x39,0xce,0x49,0x08,0x9a,0x8e,0x41,0x1e,0x58,0xd2,0x78,0x4a,0x73,0x7f,0xa5,0x1f,0x40,0xbe,0xec,0x61,0x6d,0xb6,0x53,0xc5,0x7a,0x87,0xc6,0xd7,0x95,0x51,0x3f,0x95,0x4c,0x61,0xb0,0x89,0xb1,0x7f,0xad,0x93,0x7d,0x98,0xfa,0x4e,0x91,0xd2,0xb1,0x70,0xd2,0x3b,0x78,0x50,0x34,0x55,0x67,0x30 .byte 0x51,0x72,0x4c,0x9f,0xd3,0x98,0xf0,0x75,0xf2,0xd1,0x5a,0x79,0x46,0x78,0x5b,0x92,0xed,0x7b,0x9a,0xc8,0xa8,0x66,0xba,0x1b,0x28,0xc9,0xd7,0x14,0x48,0x02,0xd8,0x13,0x50,0x24,0x23,0xda,0x34,0x27,0x39,0xd5,0xa3,0x37,0x27,0x16,0x69,0x24,0x7b,0xd4,0x00,0xdc,0x88,0x0b,0x12,0xc8,0x0f,0x16,0xd6,0xe1,0xe5,0xe1,0x38,0x1c,0xfb,0xfa .byte 0xc0,0x42,0x54,0x2e,0x1c,0x89,0x95,0xf5,0x34,0x9a,0x65,0x1f,0x67,0x5d,0x6f,0xe8,0xcc,0x72,0x81,0xec,0x44,0x7c,0x61,0xa1,0xac,0xd5,0x69,0x53,0x1c,0xd1,0xba,0xb7,0x93,0xef,0x4e,0x2d,0xab,0x4a,0xe8,0xb2,0x17,0x48,0x34,0x53,0x72,0x15,0x94,0x58,0x62,0x88,0x80,0xdd,0x70,0x6a,0x77,0x7f,0x2b,0xc8,0xe1,0xac,0x83,0xce,0xe5,0xed .byte 0xd0,0xc3,0x24,0x09,0x5e,0x4c,0x9c,0x95,0x4a,0x4b,0xdf,0xe6,0x69,0x8e,0xb0,0x2a,0x0c,0x5c,0x08,0x2c,0xe3,0xd5,0xc8,0x3f,0x48,0x40,0xf6,0xf5,0x72,0x83,0xb8,0xd2,0x1a,0x78,0x70,0x75,0x23,0x9a,0x6f,0x11,0x1f,0xdb,0x5c,0x42,0x4f,0xab,0xbc,0x0e,0x44,0xf6,0xfb,0x73,0x85,0x2e,0x2f,0x20,0xc4,0x28,0x0d,0x44,0xfa,0xb0,0x79,0x85 .byte 0xf2,0xce,0x2f,0xc3,0xaa,0x93,0xbd,0xfc,0xe8,0x5b,0xc4,0x9f,0x3f,0xf8,0x9e,0xd2,0xec,0xf2,0xca,0xe0,0xd4,0x82,0xe2,0x9e,0x1e,0xee,0x22,0x74,0x81,0xb3,0x26,0x36,0x02,0x94,0xcf,0x04,0xee,0x7a,0x99,0x43,0xa1,0x3a,0x26,0xbc,0x05,0x9d,0x67,0x7c,0xe7,0x95,0xa7,0x73,0x7e,0x0a,0x54,0x7b,0x6a,0x53,0x95,0xce,0x9a,0x0c,0x20,0x4c .byte 0x9c,0x61,0x91,0x6e,0x43,0x1c,0x4e,0xa0,0x99,0x98,0xcc,0x90,0x29,0xb1,0xc7,0x4f,0x40,0x1c,0xe5,0x7a,0xb8,0x9f,0x50,0x52,0x8b,0xde,0x5e,0x32,0xf1,0x52,0x9a,0xab,0x55,0x40,0xfb,0x75,0x45,0x87,0x49,0x43,0x9d,0x45,0x51,0x8a,0x5c,0x6d,0x86,0xdf,0x9c,0x74,0x7c,0xc1,0xe0,0xe7,0xe9,0x87,0x7d,0xae,0x06,0xe1,0xf3,0x23,0xa9,0x32 .byte 0xda,0xcb,0x37,0xca,0x6c,0x51,0x78,0x53,0x74,0x36,0x13,0xc4,0x92,0x1c,0x40,0x4a,0xeb,0xab,0x95,0xb2,0x97,0xb0,0xef,0x11,0x35,0x11,0x29,0x55,0xff,0x71,0x8c,0xdb,0x2b,0xea,0x8c,0x15,0xaf,0x2c,0x0d,0x25,0xe4,0xc3,0x7b,0xd7,0x2e,0xaf,0xd3,0xf8,0xb9,0xdc,0x19,0x71,0xac,0x66,0x9d,0x22,0x56,0x8c,0x15,0x89,0x43,0xf7,0xa7,0xf7 .byte 0x8c,0x5d,0xc4,0xbe,0x51,0xf8,0xa9,0xaf,0x41,0x6b,0x8f,0x81,0xdb,0xf5,0x23,0xf4,0x45,0x61,0x7c,0x8d,0x30,0x16,0xc9,0xf4,0xb5,0x7c,0x15,0x20,0xed,0xe2,0x2e,0x9c,0x14,0xe9,0x7e,0x98,0x11,0x4f,0xe1,0x99,0x14,0x8c,0xa9,0xae,0x7d,0x28,0x10,0x87,0x63,0x40,0xcf,0x16,0x42,0x30,0xd9,0xbe,0xdb,0xf9,0xd0,0xc5,0x69,0x8c,0x6b,0x5e .byte 0x54,0xd9,0xe3,0xbd,0x28,0x8f,0x71,0xc9,0xd5,0x93,0x10,0x29,0xd8,0xee,0x69,0xe2,0x98,0xb0,0x21,0x1c,0x3e,0xf1,0x3e,0xb4,0x77,0x98,0x15,0x9b,0x4e,0x48,0xe7,0xd3,0xcf,0x26,0x5b,0x97,0x3d,0xad,0x32,0x57,0x56,0x2b,0xbd,0xef,0x85,0x7f,0x2e,0x12,0xb7,0xfc,0xc5,0xc6,0xa8,0x05,0x5e,0x91,0xae,0xd1,0xc6,0x7c,0x62,0x07,0x5e,0xda .byte 0x84,0x34,0xc2,0x6b,0x7c,0xa5,0x07,0xb0,0x02,0xf7,0x02,0x7b,0x8e,0x90,0x34,0xa1,0x4f,0x15,0x79,0x87,0xd5,0x76,0xac,0xf2,0x94,0xed,0xb5,0x49,0x82,0xb8,0xea,0x0c,0x06,0xec,0xa6,0x8a,0x46,0xfe,0x3a,0xdf,0x14,0x67,0xc9,0x63,0xc3,0x53,0xee,0x3f,0xf5,0x4a,0x96,0x54,0x61,0x5c,0x53,0x52,0x96,0xdc,0x2b,0xe9,0x85,0xb6,0x72,0xf3 .byte 0xe7,0x69,0x9a,0x25,0x88,0x0e,0x64,0xac,0x04,0xb7,0xb2,0xbc,0x8a,0xd4,0x24,0x2b,0xa4,0xf9,0x58,0xdb,0x36,0x0b,0x05,0x4a,0xba,0x84,0x7f,0x95,0x58,0x46,0x23,0x7b,0x3c,0xcf,0xaa,0xa6,0x77,0xe6,0x1f,0xc8,0x5a,0xd5,0x82,0x09,0x87,0x3a,0x36,0xb7,0xb5,0x4c,0xdc,0xa0,0x40,0x6e,0xd7,0x61,0x1f,0xed,0xf7,0x81,0x32,0xbf,0xaa,0xd4 .byte 0xfa,0xc5,0xd7,0x62,0x9a,0x73,0x24,0x6c,0xb9,0x5b,0x5e,0x9b,0x8d,0xe1,0x4e,0x89,0x0d,0x1c,0xc9,0x7b,0xfe,0xcc,0x95,0x97,0xec,0xba,0x35,0x5d,0xbc,0x06,0x37,0xcf,0x8d,0x02,0x28,0xa1,0x0b,0xca,0xe9,0xee,0x23,0x65,0xd2,0x01,0xe2,0x49,0x2a,0x58,0x4c,0x12,0x4d,0x44,0x19,0x10,0x4c,0x4e,0xbb,0xb2,0xe9,0x43,0xa6,0x0b,0x70,0x87 .byte 0x22,0xf0,0x1a,0x66,0x08,0xf1,0xb2,0x50,0x3c,0x36,0xfc,0x4f,0x39,0xa8,0xce,0x8e,0x9c,0xb1,0x29,0xd8,0x6d,0xce,0x5d,0x77,0x94,0xff,0x64,0x81,0x10,0x47,0xa3,0xa0,0x87,0x15,0x22,0x4f,0x88,0x72,0x3f,0x99,0x39,0x85,0x5c,0xe8,0x77,0x10,0xce,0xd0,0xa5,0xd7,0x47,0x14,0xd9,0x43,0x20,0x88,0x68,0xc4,0xe7,0xd9,0x22,0x05,0xeb,0x54 .byte 0xbc,0x7c,0xb7,0x8c,0x78,0xa3,0xde,0x76,0xb8,0x85,0x0d,0x30,0xd8,0x7b,0x84,0x28,0x4b,0xad,0xb7,0x16,0x11,0x12,0x1a,0x36,0x12,0xe7,0x4f,0x12,0xaf,0x5a,0xce,0x4e,0x11,0xd4,0x7d,0xd7,0xdf,0x00,0x9a,0x74,0xab,0x60,0x40,0xa0,0x07,0x9c,0x07,0x5e,0x48,0x0c,0x72,0x82,0x3e,0x5a,0xc6,0xd1,0x64,0x10,0x63,0xd3,0x17,0x4d,0x1f,0x65 .byte 0x2f,0x3c,0x87,0x23,0x39,0x86,0xd9,0x94,0xfd,0x81,0xe0,0x2e,0x94,0xec,0x2e,0x39,0xcd,0x4b,0x48,0x00,0x8d,0x03,0xc2,0xe4,0x31,0xba,0x37,0x4a,0x1b,0x69,0x52,0x27,0xcd,0xd2,0x1b,0x0b,0x32,0xbd,0x80,0x36,0x20,0xcc,0x01,0x51,0xf3,0x78,0x8e,0xae,0xab,0x49,0x42,0xa2,0x79,0x6b,0xc1,0x0d,0xf8,0x5f,0x14,0xf8,0x95,0x53,0x33,0x97 .byte 0x50,0x5f,0x99,0x3a,0x89,0x21,0x5e,0x32,0x15,0xa9,0xa9,0x19,0x28,0x1a,0xa4,0xb0,0x25,0x2e,0xcf,0x60,0x7d,0xc7,0xc0,0x21,0x18,0xb2,0xca,0x8b,0x30,0xfe,0x2d,0x86,0xb4,0xc8,0xc7,0xd6,0xa1,0x71,0x0f,0xf1,0x54,0xe7,0x64,0x0a,0xfc,0x7c,0x73,0xb1,0xb8,0x26,0x01,0x37,0x94,0x9c,0x97,0x9b,0x6d,0x37,0x2e,0xe0,0x22,0x5b,0xe1,0x25 .byte 0x82,0x91,0x12,0x7d,0x9f,0xb0,0xc4,0x01,0x32,0x16,0xea,0x38,0x22,0x3c,0xa9,0xb2,0xc6,0x20,0x7d,0x58,0x50,0xec,0x3f,0x3b,0x43,0xdd,0xb3,0xd2,0x31,0x37,0x30,0x6b,0x40,0x28,0x83,0x99,0xf4,0x41,0xc8,0x05,0x3b,0x87,0x45,0xb3,0x21,0xe7,0xac,0x4d,0xe7,0x5c,0x76,0xf1,0x85,0x8c,0xfc,0xbf,0x8e,0xad,0xa5,0xb8,0x10,0x3b,0x37,0x86 .byte 0xa1,0x15,0xa2,0x48,0x1f,0x9d,0x61,0xbe,0xa8,0xa4,0xb6,0xb3,0x71,0xcb,0x71,0x80,0x12,0x39,0xcc,0x6f,0xe7,0x8a,0x06,0x79,0x6b,0x8d,0xfd,0xf9,0x00,0x6d,0x28,0x82,0x3f,0xf3,0x3c,0xfb,0x06,0x19,0x63,0xdd,0x36,0xfc,0x5c,0xd9,0x6f,0x34,0xfc,0xc3,0xdd,0x77,0x71,0x53,0xa4,0x9b,0xce,0xc2,0xb2,0x06,0xec,0xa4,0xfc,0x36,0xd8,0x0c .byte 0x72,0x19,0x58,0xad,0xea,0x02,0x55,0x21,0x3a,0xb1,0x56,0x04,0xc7,0x58,0x5a,0xc1,0x18,0x9d,0xbb,0xc4,0x75,0x11,0x7c,0x30,0x94,0xd5,0xa3,0x80,0x57,0x6e,0xca,0xaf,0xec,0xdc,0x5e,0x58,0x5d,0xaa,0x2f,0x73,0x50,0x3e,0x2c,0x17,0xa4,0xa3,0x77,0xa0,0x5e,0x18,0x77,0x8b,0xf4,0xe5,0x09,0xa3,0x43,0xce,0x39,0xc5,0x70,0x16,0xf5,0xb5 .byte 0xf5,0xe3,0xc0,0x70,0xdd,0xb2,0x03,0xc8,0x43,0x48,0xc6,0xc1,0xbb,0xcc,0x04,0xb1,0x87,0xf6,0xde,0xd7,0x78,0xc9,0x8b,0xc2,0xa6,0xaa,0xea,0x1a,0x00,0x91,0x56,0x09,0x91,0xb7,0x24,0xf6,0x81,0x06,0x80,0x3e,0x2f,0xde,0x22,0xd7,0xf2,0x23,0xc5,0xde,0xf5,0x1f,0x30,0x4e,0xd7,0xed,0x3f,0x97,0x48,0x5c,0x1b,0x62,0x41,0x0e,0x7d,0xdc .byte 0xdf,0xfb,0xdd,0xea,0x99,0x26,0xf7,0x8d,0xbf,0xd0,0x0f,0x38,0x06,0xe0,0x35,0x74,0x58,0xec,0x5f,0x13,0x58,0xe6,0x33,0x8e,0x90,0x39,0xff,0x3a,0xaa,0xd8,0x81,0xf3,0x6a,0x6e,0xbd,0xa9,0x5c,0xcc,0x1c,0x61,0x41,0xcb,0xd7,0x0a,0x4f,0x10,0xcd,0x84,0xd2,0x84,0x0a,0x1b,0xd6,0xf5,0x48,0xdc,0x1a,0x7f,0x41,0x11,0xd5,0x13,0xf5,0xc0 .byte 0xa9,0xe0,0xd9,0x58,0xc6,0x96,0x4a,0xf5,0x46,0xe1,0x1d,0x87,0xe4,0x91,0x01,0x01,0x64,0xad,0x7c,0x4b,0x2f,0xa9,0x9a,0x95,0xf9,0x71,0x06,0x76,0xa6,0x09,0x6d,0x80,0xe7,0x9a,0xb2,0xa3,0xc1,0x8d,0x6d,0x2c,0x72,0xd6,0xf8,0xfa,0xc8,0xb1,0x70,0xf7,0x73,0xec,0x55,0x0a,0x3e,0xc6,0xc4,0xe8,0x5b,0x8b,0x84,0x9b,0x3d,0xf1,0xcc,0x5b .byte 0xbd,0x79,0xe3,0x29,0x59,0x18,0x24,0x3f,0x5f,0x25,0x63,0xed,0xc9,0x59,0xa2,0xa5,0xe0,0x4d,0x1c,0xa4,0xb2,0x04,0x6b,0x20,0x58,0xe9,0x84,0xc8,0x36,0xbb,0x4d,0x46,0x70,0x2f,0x41,0x47,0x23,0xdf,0x09,0xb1,0x63,0x7e,0x29,0x76,0xed,0xc9,0x34,0x68,0xc6,0x51,0xd2,0x76,0xe8,0xd3,0xb6,0x5a,0xfe,0xeb,0xa6,0xe9,0xd6,0x1e,0x80,0x2f .byte 0xc0,0xc0,0x13,0xd8,0x00,0x50,0x31,0x25,0xb7,0x6c,0x84,0xc3,0x87,0x26,0xf9,0x9d,0x43,0x1b,0x09,0x42,0x6d,0xbf,0xaf,0x7c,0xda,0x93,0x8a,0xe2,0x81,0xa5,0x05,0x78,0xdf,0xc5,0xa0,0x70,0x89,0x38,0x61,0x3c,0xb7,0x27,0x36,0x57,0x10,0x7a,0xc9,0xc3,0x9e,0xe6,0xa2,0x81,0x30,0x52,0xd3,0x62,0x0e,0xd4,0xff,0x59,0x81,0xee,0x50,0x35 .byte 0x72,0xa7,0x06,0x93,0xf7,0x5a,0xde,0x46,0xb1,0xe7,0x47,0x61,0x6a,0x31,0xb6,0x87,0x51,0xfe,0x49,0x39,0xea,0x33,0xc1,0xf3,0x19,0xa3,0xa8,0x58,0x68,0x5e,0x11,0xa3,0xc2,0x37,0xff,0xe4,0x36,0xa8,0x3d,0x2a,0x6e,0xaf,0xed,0x8b,0x36,0x77,0x0d,0xa0,0xda,0x4a,0x1d,0x9e,0x4d,0xae,0xf8,0xe8,0x40,0xef,0x2f,0xf9,0x6d,0x82,0x21,0x6c .byte 0xb3,0xad,0x96,0x0d,0x68,0xb7,0x57,0x11,0x5d,0xbe,0xd9,0x5d,0xa2,0xad,0x6f,0xdc,0xf6,0x1d,0x51,0x7d,0x44,0xd1,0x79,0x40,0x18,0x1f,0x2d,0xc7,0xde,0x01,0xc4,0xde,0x53,0xa9,0x54,0x11,0xa4,0xea,0x0d,0x10,0xbb,0x4e,0x0a,0x42,0xfa,0xc2,0x47,0x91,0xef,0xaf,0xf7,0x3b,0xff,0xc9,0xb4,0x86,0xb2,0xe1,0x7f,0xc9,0x2e,0x9e,0x2e,0xa9 .byte 0x58,0x1a,0xde,0x61,0x68,0xce,0xe8,0x6f,0x21,0x81,0xc0,0x3f,0xa3,0xc3,0x7b,0x93,0xce,0x4c,0xe0,0xa7,0xe1,0x09,0x47,0xe8,0xb4,0x6d,0x3f,0xde,0xdd,0x17,0x8d,0x72,0x75,0xb6,0x18,0x85,0x61,0xbe,0x75,0xac,0xfa,0x23,0xd5,0xd3,0x43,0xc9,0x82,0x9a,0xfa,0xfd,0x0c,0xf9,0xee,0xce,0x63,0x9b,0x79,0xa2,0x03,0x0e,0xcc,0x99,0xf7,0x32 .byte 0x61,0xb0,0xd2,0x65,0x8e,0x02,0x7e,0xa0,0x63,0x3c,0xd8,0x78,0x2e,0x9f,0xd2,0x16,0x16,0xf1,0xf0,0xc3,0x43,0x34,0x2f,0x16,0x9a,0x3f,0xdf,0x4d,0x1c,0x0d,0x9a,0x0c,0x4e,0x85,0xd2,0x5f,0x0d,0x63,0x57,0x7d,0xc3,0x69,0xe8,0x7d,0x4f,0x12,0x27,0x85,0x8c,0xb4,0x4d,0xf9,0xf9,0xfc,0x5a,0x43,0x63,0x80,0x7c,0xfd,0xae,0xb4,0x7f,0x48 .byte 0xb8,0xbd,0xac,0xf9,0xfa,0xd9,0x3a,0x31,0xaf,0x53,0xcd,0x47,0xf1,0x8c,0x15,0x66,0x55,0xa6,0x04,0x27,0x73,0x19,0x39,0x85,0xf9,0x96,0x48,0x2b,0x8c,0x64,0x14,0x7a,0xad,0xe3,0x34,0xd6,0xf5,0x4c,0x62,0x33,0x23,0x68,0x16,0x39,0x57,0x09,0x16,0x20,0x74,0xc3,0x98,0x24,0x69,0xc3,0x15,0xf7,0x05,0x45,0x30,0xf7,0x8f,0x7a,0x1d,0xb0 .byte 0x71,0x96,0x5a,0xaa,0xd6,0xa6,0x2f,0x95,0x15,0xdd,0x58,0x9e,0xc6,0x6e,0xb4,0xab,0x0d,0x1c,0x74,0x97,0xe3,0xb4,0x03,0xa8,0xba,0x27,0xe4,0xe3,0xf7,0x9d,0x7d,0x83,0x81,0x89,0x88,0x86,0xb3,0x4b,0x14,0xc0,0xd6,0xf3,0x2c,0xc2,0x17,0xac,0xb6,0xa1,0x7f,0xa6,0x98,0x42,0x72,0xa5,0xaf,0x4e,0xbb,0x9f,0x85,0x62,0xa5,0xaa,0xe0,0x27 .byte 0x9b,0x08,0x07,0xc8,0x37,0x37,0x33,0x30,0x1e,0x81,0xa0,0xbe,0x71,0x30,0xbf,0x70,0xf8,0x1b,0x28,0x91,0xc5,0xfc,0x37,0x0e,0x98,0x87,0x6a,0xdb,0xaa,0x26,0x31,0xcc,0x4e,0xd4,0xb9,0x5d,0xce,0x07,0x9e,0x48,0x15,0xf2,0xc0,0x56,0x44,0x36,0xe1,0xd0,0x56,0x3e,0x46,0xc0,0xec,0xd6,0x25,0x58,0x1b,0x66,0x3c,0xd2,0x5f,0xe0,0xca,0x69 .byte 0x5f,0xe4,0x00,0x4a,0x77,0x91,0x87,0xb0,0xb6,0x13,0x93,0xed,0x86,0x9f,0xef,0x6b,0x99,0xe6,0x6f,0xb8,0x2d,0x82,0xc6,0x71,0x30,0x3d,0x10,0xd1,0x55,0xb4,0xa3,0xbf,0x48,0x0e,0x69,0x1f,0xc3,0x5a,0x28,0xd2,0x7b,0x19,0xb1,0xf3,0x35,0x02,0xde,0x9b,0xd1,0x39,0x53,0xa6,0x9e,0x30,0xd7,0x08,0x96,0xb4,0x67,0x90,0x9f,0x27,0xe4,0x8f .byte 0x07,0x5f,0x69,0xb0,0x4b,0x2c,0x88,0x4d,0x9a,0x20,0x48,0x60,0x53,0xac,0x6f,0x81,0x53,0x1f,0xec,0x88,0x95,0x4d,0xc3,0xcf,0x52,0x13,0xa1,0x69,0x52,0x85,0xda,0x73,0x6e,0x6e,0xec,0x88,0xda,0xed,0xea,0xf5,0x9c,0x0b,0xc9,0xac,0x31,0x44,0x12,0x68,0xec,0x0d,0xc6,0x3c,0x05,0xef,0xec,0xff,0x6b,0x99,0xda,0xc9,0x3b,0x41,0x7d,0x4c .byte 0xdd,0xd2,0x83,0xca,0x52,0xc8,0x0d,0xe5,0xf8,0x76,0x34,0x06,0x98,0xa0,0xcd,0x74,0xc1,0xd5,0x44,0x60,0xeb,0xd4,0x67,0x67,0xda,0xff,0xe9,0x41,0x39,0x22,0xde,0x9b,0x9d,0x36,0xfe,0x6d,0xb1,0xc8,0xfe,0x39,0xe4,0x80,0x5b,0x3d,0x34,0x51,0x3d,0x3c,0xbc,0x8e,0xaa,0x1e,0x80,0xa9,0x20,0x98,0xa2,0x86,0x91,0x13,0x9a,0x2c,0xa7,0xf9 .byte 0x82,0x92,0xac,0x4c,0xf1,0x8b,0x9e,0xc2,0x27,0x4a,0xbd,0xb3,0xde,0x40,0x33,0x05,0x6d,0x6b,0xcd,0xfd,0x99,0x45,0x81,0xdc,0x98,0x69,0xc8,0xc3,0xc6,0x1d,0x4d,0x52,0x2e,0xf3,0x3b,0x5a,0x8f,0xce,0x89,0x77,0x74,0x0b,0x63,0x3a,0x70,0x7a,0x79,0x86,0x87,0x33,0x2a,0x67,0x9d,0xc0,0x1e,0xd8,0xa6,0xbd,0x7f,0x3e,0x7d,0x36,0x12,0xf2 .byte 0x2b,0x04,0x6c,0x5e,0x60,0x74,0x2b,0x05,0xa1,0x7a,0x67,0x2d,0xd7,0x50,0x9d,0xe7,0xce,0xbd,0x26,0xda,0xe7,0xab,0x63,0xc5,0x41,0x85,0x33,0x30,0x59,0x0a,0xfd,0xd6,0x27,0xbe,0x96,0x4b,0xe8,0xc1,0x98,0xa7,0xe2,0x5c,0xd9,0x8d,0xfd,0x1d,0x2e,0xcc,0x08,0x7f,0x3a,0xcf,0x0c,0x4f,0xc0,0xdc,0x70,0x5b,0x74,0x28,0xe7,0x79,0x04,0x55 .byte 0x59,0x91,0x8b,0xb1,0x6a,0x37,0x9e,0xf5,0xd4,0x61,0x4a,0xbe,0xd6,0x6e,0x23,0xc9,0xc9,0xcc,0xc2,0xbd,0xe6,0x85,0xc7,0xfc,0x58,0x81,0x90,0x0d,0x71,0xa1,0xfe,0x9d,0xb5,0x6b,0xa3,0x42,0x1d,0x34,0x7e,0x13,0xb1,0x17,0x75,0xff,0x99,0x25,0x67,0xb7,0x6b,0x43,0xb8,0x34,0x59,0x22,0x4f,0xa5,0xf0,0xd0,0x00,0xc9,0x25,0x2d,0xe6,0xba .byte 0x3a,0x67,0x50,0x01,0x74,0x7f,0x6e,0xbd,0x59,0x0d,0x90,0xe9,0xf8,0x00,0xea,0xab,0x40,0x79,0x5a,0xbb,0x32,0xb3,0x99,0x21,0xc1,0xca,0x0a,0x21,0x93,0x56,0x62,0xfe,0x87,0x98,0x27,0xbc,0x29,0x59,0x16,0x4f,0x40,0x43,0xed,0x3f,0x78,0xbd,0x5e,0x88,0x1b,0x33,0x37,0x4b,0xba,0x7c,0xd2,0x90,0xf5,0xf9,0xa6,0x54,0x87,0xac,0x3e,0xe1 .byte 0xf3,0x46,0xab,0xa1,0x93,0xe1,0xe1,0xbb,0xbe,0xa3,0x46,0x06,0x2d,0xed,0xeb,0x9b,0x13,0xb4,0x3b,0xc6,0x5f,0x8a,0xdf,0x0b,0xc4,0x3a,0x9b,0x12,0x82,0x81,0x86,0xbd,0x0f,0x94,0xd2,0xa4,0x52,0xd6,0x06,0x15,0xef,0xaf,0xa2,0x90,0x32,0xe5,0xa2,0x0d,0x38,0x1f,0xe9,0x78,0xac,0xec,0x95,0x71,0xca,0x93,0xd6,0xc8,0x6c,0x1d,0x24,0x8e .byte 0xe0,0x8d,0x80,0x3f,0x6d,0x2f,0x09,0x59,0xaa,0xd2,0x68,0x0c,0xe4,0x5f,0x25,0x7e,0x57,0x90,0xf8,0xcf,0xc0,0x1a,0x22,0xfc,0x66,0x48,0x8f,0xaf,0x26,0x8d,0xa0,0xa8,0x83,0x9b,0x89,0xb8,0xaf,0xd6,0xed,0xcf,0xa0,0x9a,0xbe,0x29,0xf1,0xa7,0x36,0xb0,0x46,0x1e,0x6c,0x18,0x90,0xed,0x0c,0xde,0xb6,0xd5,0xd0,0xfb,0xb6,0xce,0xd9,0xd0 .byte 0x2e,0x76,0x89,0xfb,0xa7,0x8c,0x49,0x22,0xda,0x4c,0x5c,0x8e,0xc7,0x2e,0xf8,0x41,0x21,0x30,0x0e,0x39,0xec,0xa3,0x0c,0x18,0x1b,0x72,0x85,0x33,0xaf,0x72,0x2b,0x02,0x4a,0xb8,0xcb,0x7d,0x79,0xbd,0x09,0x42,0x0a,0xe2,0x2f,0x1f,0x7a,0xec,0xda,0x65,0xc2,0xb5,0x9b,0x94,0xd1,0xed,0x1f,0x3d,0x39,0x13,0xe9,0x85,0xe0,0xb0,0x25,0xfa .byte 0x03,0x82,0x6c,0x4b,0x2a,0x9f,0x60,0xdd,0x16,0x94,0xfd,0x7d,0xbc,0x6f,0x0a,0xdc,0x55,0xec,0x25,0x0d,0xe6,0x83,0xb3,0x57,0xfd,0x0f,0x58,0xa5,0x5b,0x6d,0x79,0x80,0x51,0xdd,0xa7,0xfa,0x21,0x03,0x39,0xaf,0x86,0xa6,0x55,0x49,0x58,0xc4,0x86,0x4d,0xf3,0xe7,0x8d,0xb9,0xb9,0x6c,0x12,0xee,0x6e,0x6d,0x78,0x70,0xeb,0x6c,0x90,0x45 .byte 0x23,0x40,0x4f,0xe1,0x05,0x46,0xa0,0xe8,0xe8,0xb8,0x94,0xeb,0xf2,0x47,0x6c,0x80,0x66,0x45,0xea,0xd2,0x99,0x7b,0x5d,0x40,0x6b,0x60,0xad,0xba,0xc2,0xd2,0x5d,0xa8,0xff,0xdd,0x7d,0xbe,0xa1,0xbc,0x99,0xd2,0xb1,0x6d,0x24,0x94,0xdd,0x3e,0xf1,0x1f,0x78,0x53,0xf3,0xa9,0x79,0xc1,0xe7,0x58,0x8e,0x97,0xcb,0xdc,0x84,0xbb,0x44,0x4b .byte 0x95,0xe7,0xf5,0x9d,0xba,0x80,0x56,0x26,0x07,0x39,0xf3,0xc0,0xb1,0xfb,0xaa,0x9c,0xd8,0x80,0xcf,0x6b,0x68,0x61,0x79,0x88,0x14,0x9a,0x71,0x78,0x8b,0x46,0xb5,0x63,0xc6,0xed,0xde,0x1a,0x1d,0xaa,0xe0,0x23,0x96,0x8b,0x6e,0x3d,0x16,0xf1,0xe0,0x3d,0xe1,0x60,0x5a,0xcd,0x1e,0x95,0x9a,0x20,0x32,0xe7,0xc9,0xae,0x63,0x91,0xdf,0x34 .byte 0x35,0xc9,0xe7,0xf2,0x55,0x31,0xf4,0xad,0x0c,0x26,0x1a,0x3f,0x46,0x43,0x88,0xef,0x17,0x01,0xa6,0x46,0xdf,0x22,0x76,0x47,0x7c,0xfb,0xe2,0x53,0x74,0x51,0x3a,0x28,0xe5,0x70,0xaa,0x33,0x74,0x9e,0xe2,0xcb,0x44,0x89,0xc7,0xfa,0xa6,0x2a,0xae,0x1e,0xce,0x2b,0xc3,0xd2,0x58,0x83,0x94,0x40,0x0d,0xc9,0xe1,0xe7,0xea,0x90,0xac,0x99 .byte 0x27,0x30,0x2b,0x30,0x5e,0xe9,0x10,0x27,0x1e,0x29,0x4e,0x61,0xe3,0x50,0xdb,0xdd,0x51,0xe4,0x32,0x01,0xf4,0x72,0xfe,0x16,0xc1,0xa5,0x45,0xa9,0xd2,0x6c,0x15,0xa2,0x93,0x9c,0x7a,0x2c,0x79,0xb4,0xc0,0x88,0x07,0x7c,0x90,0x97,0xd7,0x9c,0x6c,0xc1,0x97,0x83,0x1d,0xec,0xa4,0xf0,0x74,0x6c,0x6c,0xa4,0x43,0xfd,0x5c,0x0c,0x7c,0x6f .byte 0x30,0xeb,0x84,0xf4,0x98,0xc2,0xd9,0x8f,0x54,0x41,0x3d,0x3e,0x3c,0x9d,0xae,0x81,0x8d,0x24,0xae,0x74,0xe5,0xa0,0x6f,0xd5,0x4f,0x89,0x46,0x74,0x3b,0xef,0x2a,0x8a,0x1c,0xe5,0x94,0xeb,0x05,0xec,0xc9,0x42,0xf5,0x1e,0x67,0x95,0x38,0x8b,0xaa,0x1c,0x44,0xfb,0xf9,0xbb,0xec,0x0f,0xd3,0x28,0x68,0x28,0x8d,0x04,0x23,0x92,0xff,0x99 .byte 0x76,0x8a,0x87,0x9b,0x36,0x87,0x52,0x15,0x5d,0xc8,0x4a,0xda,0x2e,0xca,0x9c,0x45,0x13,0x80,0x88,0x1a,0xe9,0xfb,0xfe,0x08,0xab,0x8b,0x23,0xba,0x3a,0xfe,0xed,0x70,0xea,0x0d,0x99,0x69,0xea,0xa6,0xd5,0xbf,0x5c,0x1f,0x22,0x40,0xa4,0x09,0xd6,0x3a,0x69,0x39,0xe9,0x81,0x5f,0x19,0xdf,0x26,0x70,0x55,0xb0,0x2d,0x11,0x67,0x06,0x6a .byte 0x32,0xcc,0xa4,0x9d,0xa5,0xa2,0x48,0x53,0x92,0x3a,0x52,0x6e,0xcf,0x23,0x96,0x82,0x4d,0x62,0xc5,0x72,0xd5,0x52,0x89,0xb7,0x08,0x86,0x14,0x54,0xc3,0xa7,0x44,0xb9,0x8e,0xe2,0xb1,0x10,0x20,0x15,0xc6,0xcf,0xa4,0x5e,0x66,0xa4,0x2d,0xca,0xf7,0x93,0xcb,0xd5,0x99,0x48,0x1e,0xde,0xec,0xc1,0xd3,0xd3,0xf5,0xcb,0x4a,0x24,0x31,0x5d .byte 0x5a,0xaa,0x32,0x89,0x3e,0x1a,0x2f,0x1e,0xb6,0xc3,0x5f,0x09,0x50,0x7a,0x6f,0x46,0x01,0x0e,0xeb,0x10,0x23,0x1b,0x49,0x9e,0xa9,0x2b,0xed,0xf2,0x2d,0x34,0xe9,0x45,0x2a,0xdb,0xa9,0xc5,0xf7,0x84,0x8a,0xa1,0xe5,0xc7,0xd0,0x56,0x35,0xab,0x7a,0x55,0x66,0x14,0x28,0x38,0x6a,0x0f,0xb7,0xb1,0xc8,0x28,0xce,0xbe,0xe2,0xdf,0x5a,0x45 .byte 0x50,0x87,0xc5,0x31,0x92,0x89,0x59,0x7e,0x18,0x97,0x22,0x2e,0x9d,0xea,0xce,0x29,0x07,0xef,0x06,0xc4,0xab,0xe8,0x85,0xe4,0x36,0x6f,0x0a,0x38,0xe5,0x54,0xc6,0x1d,0x19,0xdd,0x68,0xc9,0xfe,0x8a,0x50,0xe4,0xaf,0x4e,0xf1,0x4a,0xc8,0xf0,0xe0,0xa8,0x62,0x9e,0xbf,0xab,0x50,0xde,0x77,0x87,0x5f,0x7e,0xb5,0xdc,0x45,0x23,0xef,0xaa .byte 0xc4,0x92,0x6b,0x65,0xed,0xbf,0xa9,0x39,0xa6,0x7a,0xdb,0x32,0x89,0xbe,0xd9,0x51,0x4e,0x25,0x1d,0x98,0x1f,0x58,0xa4,0xcf,0xbf,0xc0,0x1c,0xa4,0xb7,0x4c,0xbf,0xc9,0xc4,0xea,0xee,0x13,0xd2,0xde,0x56,0x32,0x66,0xb9,0x65,0xbf,0xe9,0xd3,0x80,0x0a,0x1e,0x61,0xc8,0xb2,0x1d,0x94,0xec,0x5f,0x89,0x1c,0x27,0x47,0x58,0x22,0x23,0xa8 .byte 0x21,0x95,0x3d,0xc6,0x22,0xcd,0x77,0xfb,0x59,0xbe,0xa5,0x97,0xfc,0xe8,0x9a,0xa9,0xbc,0xa3,0x7a,0xbd,0x68,0xdd,0x33,0x1f,0x3c,0xc3,0x24,0x6e,0x57,0xc8,0x6a,0x54,0xdc,0x8c,0xdb,0xe8,0x8c,0xc2,0xd8,0xb6,0xbf,0x15,0xa3,0xff,0x57,0xca,0xd9,0xe7,0xe3,0xda,0x83,0x79,0x27,0x8f,0x72,0x17,0xcf,0x95,0x44,0x65,0x18,0x63,0xcd,0x8d .byte 0xa7,0x74,0x66,0x5c,0xd3,0x71,0xd4,0x7f,0x06,0x6f,0xc1,0x3e,0x1d,0x06,0x7e,0x0d,0x45,0x9c,0x04,0x7a,0xbd,0x50,0x2d,0xc2,0x4c,0x27,0x32,0x3c,0x86,0x57,0xc1,0x9a,0x2a,0x74,0xe9,0x39,0x21,0x91,0xa0,0xc9,0x3f,0x47,0xf2,0xa5,0x4c,0xda,0x0f,0xe0,0x25,0x02,0xad,0x19,0x54,0xec,0xdb,0xb2,0x06,0xe0,0xc6,0x77,0xc1,0x8d,0xf7,0xcb .byte 0xe1,0x43,0xad,0x0f,0xb1,0x0f,0x7e,0x5b,0xba,0x1c,0x02,0xfa,0x60,0x9c,0xdc,0x89,0xdb,0xb2,0xc5,0x74,0xc3,0x5f,0x82,0x55,0x0a,0xbc,0x08,0x13,0xdf,0xac,0x35,0x7a,0xcc,0xdb,0x9e,0xbf,0xd7,0xde,0xfc,0x64,0x58,0xfb,0x33,0xd7,0xc3,0x39,0x4d,0x38,0x65,0xe7,0x98,0x83,0xbe,0x12,0x6d,0xb0,0xda,0x23,0xc0,0x7d,0xa8,0x64,0x75,0x33 .byte 0x7f,0xe9,0xa7,0xa1,0x41,0x85,0x50,0xcc,0xaa,0x3c,0xc1,0xd8,0xda,0xa1,0x53,0x0c,0xac,0xca,0x6a,0x8c,0xbd,0xb0,0x2b,0xd9,0x2f,0x4c,0x3d,0x3d,0xec,0x9d,0x70,0x6c,0x67,0xff,0x1d,0x95,0xb0,0xaa,0x46,0xaa,0xd6,0x6c,0x3c,0x4c,0x65,0x36,0x47,0xea,0x5e,0x46,0x25,0x38,0x8f,0xbe,0x7d,0x3d,0x80,0x39,0x0f,0x05,0x06,0x1e,0xbe,0xe1 .byte 0x9f,0xd4,0xc8,0x7d,0x11,0x8d,0x78,0x0d,0x26,0xe7,0x9a,0x47,0x8f,0x63,0x5a,0xe5,0x91,0xc0,0x81,0xa1,0xe6,0xff,0xa5,0x1f,0x38,0x0b,0x46,0x5b,0xc8,0x31,0xf3,0x56,0x5a,0x40,0x68,0x43,0x45,0xe0,0x83,0xf3,0x9a,0xc2,0x2e,0x62,0x4e,0xf9,0xd4,0xe8,0x13,0xe0,0x16,0x2d,0xa7,0x33,0xae,0xb5,0xc9,0x77,0xd6,0x5f,0xb1,0x28,0xa8,0xf7 .byte 0x40,0x03,0x1b,0xe1,0x2a,0x3d,0xd6,0xe5,0x60,0x64,0x5e,0xe2,0x59,0xbb,0xb1,0x36,0x0b,0xeb,0xf7,0x8e,0x60,0x5a,0x3a,0x4a,0x78,0x9c,0x2d,0xef,0xe6,0x9e,0x1c,0x4f,0x53,0xea,0xc3,0xab,0x88,0x36,0x8e,0x08,0x3e,0x18,0xcc,0xb4,0xa2,0x60,0x5c,0xae,0x64,0xf6,0x6c,0x3c,0xcf,0x34,0xa4,0x6d,0xfd,0xb5,0x2f,0xfa,0x93,0x8f,0xf7,0xc1 .byte 0x96,0xfe,0xa9,0x8c,0x85,0xec,0x65,0xc1,0x26,0x86,0x4f,0x36,0x1b,0xda,0xe0,0x47,0xb6,0xe4,0x34,0xf6,0xaf,0xce,0x56,0xdd,0xcf,0xad,0x94,0x1b,0x78,0xd3,0x17,0x00,0xf4,0x66,0x8e,0x8a,0x1d,0x11,0x1b,0xa2,0x7e,0x31,0xfc,0xda,0xc5,0x39,0x8a,0xc4,0x7d,0xee,0x53,0xe0,0x39,0x2d,0x53,0x2a,0x63,0x6b,0x0a,0x76,0xd0,0x2e,0xde,0x8d .byte 0xf7,0x79,0x78,0xea,0x25,0x75,0x23,0x7f,0x17,0x93,0xfc,0xd3,0xfb,0x0e,0x51,0x3f,0x84,0x49,0xd4,0xbd,0x73,0x21,0x30,0x56,0x58,0x63,0x7a,0x20,0xfd,0x59,0x00,0xfd,0x42,0x82,0x69,0xd4,0x8e,0x69,0x4f,0xc8,0xf4,0x45,0x6d,0x8a,0x5c,0xa2,0xba,0x7d,0x69,0xcd,0xb5,0xf2,0x24,0x85,0x03,0x10,0xb3,0x3f,0xa6,0x9a,0xeb,0xe3,0x0d,0x75 .byte 0x82,0x8d,0xe7,0xfb,0x9f,0x9b,0x7b,0x5b,0x33,0x1d,0xba,0xe8,0xde,0x01,0xfd,0xd3,0x38,0x16,0xb4,0x65,0xb7,0x53,0xdd,0xd5,0x4b,0x13,0x3e,0x1a,0x87,0xbe,0x34,0xbb,0xe2,0xbb,0x03,0x0a,0xc9,0xdf,0x47,0xa8,0x10,0x5f,0x3e,0x74,0xab,0x1a,0x7d,0x98,0x26,0xd1,0xc9,0xb7,0x8e,0xb8,0x3b,0x71,0x10,0x90,0x0a,0x91,0x86,0xef,0x22,0xec .byte 0x3e,0x70,0x3d,0x05,0x75,0xb8,0x91,0xf6,0x77,0x54,0x5b,0x91,0x13,0x58,0xf9,0x29,0xbb,0x94,0x50,0xe7,0x8a,0xb5,0x31,0xa5,0xe3,0x07,0x7d,0x53,0xc0,0xe5,0x58,0x38,0x27,0x84,0xf0,0x96,0x99,0xef,0x60,0x07,0x05,0xdd,0x46,0x64,0xed,0xa8,0xc4,0x3e,0xde,0xac,0x6a,0xfe,0x2c,0x1a,0x9d,0x47,0x88,0x37,0x16,0xf5,0xb2,0x9e,0x78,0x21 .byte 0x6e,0xd4,0x81,0x00,0x29,0xa1,0xcb,0x03,0x32,0x1e,0x45,0xbd,0xc9,0x86,0x97,0x56,0x34,0x2e,0xe5,0x91,0x2b,0x8d,0xf0,0x22,0xe9,0x13,0x0a,0x31,0xd8,0x82,0xbc,0x1a,0x7e,0x97,0x08,0x71,0x08,0xb0,0x82,0x8c,0x24,0x90,0x43,0x09,0x28,0x2d,0xcd,0xf1,0x31,0x9c,0x70,0x54,0x2b,0x13,0x07,0x33,0x4d,0x29,0x1d,0xbd,0x37,0x7d,0x95,0x07 .byte 0x7b,0x23,0x67,0x59,0x34,0x0c,0x85,0xae,0x55,0x94,0xe3,0xfe,0xbf,0xd2,0x38,0x0b,0x2f,0x4f,0xc7,0x4c,0xb7,0x1d,0xfe,0x97,0x2a,0x22,0xf1,0xa4,0x2d,0x02,0xb6,0xdf,0xc7,0x9b,0x0a,0xf5,0x6c,0xcf,0x91,0xee,0x44,0xd5,0x2a,0xe5,0xa7,0x64,0xf7,0x37,0x59,0x85,0x8e,0xef,0xa3,0x0d,0xfe,0xcc,0x80,0xb9,0x5c,0x8d,0x01,0x0f,0xbc,0x5d .byte 0xd5,0x47,0xff,0xa0,0x32,0xc7,0xac,0xb8,0xf8,0x43,0x3f,0x6d,0x68,0xa8,0xed,0x20,0x04,0x3b,0xa6,0x70,0x7a,0x75,0x84,0x50,0x7a,0x5f,0xab,0xa0,0x98,0xdf,0xa1,0x45,0x82,0x22,0xe7,0xf4,0xf5,0xc9,0x85,0x43,0xda,0x3b,0x18,0x40,0x38,0xfb,0x66,0x14,0xa4,0x51,0x26,0xe3,0xd8,0x2e,0x05,0x9d,0xd2,0x38,0xd5,0xca,0xd2,0xd9,0x87,0x4a .byte 0x06,0xb1,0x12,0xa3,0x16,0xa2,0xea,0x96,0x8c,0xee,0x78,0xc5,0x57,0x0c,0xbb,0x45,0x38,0xd3,0x9b,0xb3,0x66,0xe0,0x0d,0x00,0x48,0x4d,0xfc,0xa1,0x59,0x31,0x30,0x77,0xdc,0x26,0x3a,0xe0,0xc6,0x53,0x42,0x50,0xac,0x50,0xa3,0x4d,0xd8,0x70,0xcf,0xdc,0x3a,0xd0,0xcc,0xab,0x5d,0x1e,0xda,0x30,0x32,0x7c,0xf1,0x5a,0x15,0x6a,0x92,0xb3 .byte 0x32,0xce,0x4b,0xf7,0xa4,0x8b,0x62,0xaa,0xad,0xa0,0x46,0xed,0x2a,0xb3,0x01,0xaf,0x9f,0x4a,0x5a,0xce,0xcf,0xb4,0xe6,0x34,0xd0,0xad,0xdc,0xce,0x2a,0x32,0xee,0x60,0x3d,0xb4,0xd3,0xc6,0x0e,0x72,0xdf,0xe5,0xea,0x15,0x58,0x19,0x72,0xfa,0x78,0x55,0x1d,0x57,0x62,0xe9,0xa0,0x13,0xbf,0x64,0x17,0xae,0x42,0xce,0xf7,0x70,0x2a,0xd0 .byte 0xf2,0xd8,0x3e,0xef,0x25,0x2f,0xf8,0x93,0xc1,0xc3,0xf5,0x35,0x6d,0x43,0x49,0xfd,0xda,0x97,0x3b,0x6c,0x04,0xe2,0xe0,0xae,0x92,0x2b,0xc7,0x24,0x3c,0x76,0xc5,0x29,0xd2,0x3f,0x35,0x9a,0x5b,0xc2,0x16,0x6a,0x34,0x44,0x10,0x36,0x32,0xb1,0xcc,0xc0,0x42,0xff,0x1a,0x3d,0xaf,0x66,0x52,0xda,0xe5,0xf8,0x74,0xda,0x7a,0x1e,0x29,0x35 .byte 0x47,0xc8,0xe1,0x8d,0x7a,0x2f,0x0d,0x1c,0x12,0x5e,0xe6,0x56,0x15,0x74,0x6e,0x85,0x68,0xf5,0x17,0xd3,0x21,0x04,0x85,0x01,0x02,0xe4,0xfa,0x3f,0x69,0x29,0xd7,0x39,0x86,0x94,0x6f,0x81,0xa1,0x81,0x04,0x29,0xde,0xe2,0x0a,0x9b,0xd7,0x57,0xdc,0x77,0x2e,0x77,0x93,0x59,0x54,0xd3,0xf1,0xd5,0x11,0x07,0xe0,0x01,0x71,0xb5,0xb3,0xc0 .byte 0xdb,0x17,0x4b,0x5b,0x58,0xfc,0x32,0xf9,0x75,0x8e,0xdf,0x60,0x88,0x8f,0xf9,0xb0,0xe3,0x64,0x75,0xd5,0x5e,0xb1,0xec,0x57,0xa3,0xd4,0xe2,0x05,0xf1,0xf9,0xa9,0x51,0x6b,0x84,0xc3,0x78,0x74,0xe9,0x36,0xd0,0xb6,0x14,0xcd,0xa3,0x05,0xb6,0xa2,0x5c,0x2c,0x11,0x53,0x10,0x60,0x8c,0x2c,0xd8,0x7b,0xc0,0x00,0xf1,0x64,0x35,0xdc,0x7b .byte 0xf5,0x9b,0xd0,0x82,0xa8,0x00,0xe6,0x17,0xb9,0x5a,0x80,0xe1,0xee,0xb0,0x0c,0x3d,0x9a,0xae,0xaf,0xd8,0x70,0x2e,0x85,0xf0,0x0e,0xb4,0x5e,0x92,0x96,0x33,0xa5,0xa9,0x07,0x12,0x95,0xf1,0x4b,0x67,0x25,0x51,0x40,0x91,0xda,0xb9,0x4d,0x5b,0x6b,0x07,0x7e,0x52,0xa8,0xa6,0xf9,0xd1,0xeb,0x8e,0x47,0xd0,0xf8,0x7a,0x17,0x6f,0x04,0x41 .byte 0x2b,0x65,0x3c,0x3b,0x0f,0xbc,0xef,0x26,0xc1,0x63,0x24,0x33,0x40,0x40,0xf2,0x1f,0x34,0xaf,0xba,0x1d,0x94,0x72,0xd6,0x44,0xe2,0x6f,0x1b,0x83,0x87,0xd6,0x2c,0xc9,0x4c,0x2e,0xa3,0x98,0xc4,0x86,0x16,0xfe,0xc2,0xa3,0xdc,0xb4,0x86,0xfd,0x66,0xd2,0xc3,0x09,0xfd,0x8e,0xa7,0xb9,0xd2,0x5c,0x57,0x5e,0xd6,0x15,0xc4,0x12,0xa0,0xe3 .byte 0x52,0x54,0x7c,0x26,0x93,0x28,0xdc,0x13,0x97,0xff,0x1e,0x79,0x2d,0x83,0xbb,0xf2,0x9c,0xf1,0x51,0xf9,0xd7,0x26,0x78,0x69,0xfe,0x9b,0x07,0x91,0x0d,0xef,0x29,0x28,0xf0,0xd5,0x94,0xed,0xb8,0x45,0xe2,0xe1,0xde,0xe9,0x9a,0x01,0xc5,0x00,0x77,0xdf,0x40,0x61,0x52,0xbe,0x9e,0x82,0x8c,0x04,0x0e,0x92,0xab,0x67,0x96,0xdf,0xc7,0xa7 .byte 0x01,0x55,0x66,0x73,0x6c,0xaa,0x47,0x2e,0xb6,0x98,0x64,0x0d,0x7e,0x45,0xa2,0xda,0x34,0x2d,0x1a,0x7b,0x35,0x49,0xee,0xc5,0x91,0x05,0xe0,0x14,0x19,0xdd,0xb7,0x2b,0x43,0x07,0x5a,0xb5,0xb2,0x6a,0x6a,0x7d,0xf1,0x17,0x3a,0x26,0x95,0x3a,0xff,0x9c,0xa8,0x19,0xe0,0x03,0x11,0x26,0xb9,0x07,0xfc,0x01,0xe3,0xa2,0x4a,0xeb,0x92,0xc0 .byte 0x26,0x0a,0x88,0xdf,0x5b,0x67,0xc6,0xca,0xe0,0x98,0x0a,0x94,0x1e,0x93,0x32,0x49,0x64,0x7b,0xe5,0x8d,0x39,0x7c,0xb7,0xf0,0x4b,0xf0,0x46,0x62,0x47,0xcb,0x09,0x6f,0x01,0x09,0xbb,0x13,0x89,0xb3,0xc5,0xa8,0xa0,0xbb,0x05,0x61,0x62,0x07,0xdb,0xd8,0x4f,0x6a,0xc0,0xdc,0xaf,0xfe,0x97,0xb3,0x38,0x74,0xe0,0xa6,0x13,0xa9,0xb0,0x27 .byte 0x1d,0xb7,0x2d,0xb1,0xa3,0x7c,0x22,0x7f,0x99,0x67,0x5a,0x7e,0x1c,0xd9,0xf4,0x45,0xa1,0xfe,0x12,0xa7,0x9d,0x43,0x1d,0x1c,0x29,0xfe,0x95,0x33,0x79,0xe7,0xb9,0xa2,0x7e,0x50,0x50,0xa4,0x52,0x92,0xd0,0x44,0x2b,0x4c,0x78,0x77,0xfa,0xd8,0x6f,0x81,0xe8,0xfb,0x50,0x9c,0xfc,0x80,0x61,0x91,0x25,0x3d,0x66,0x11,0xd0,0xc3,0x77,0x83 .byte 0x20,0xee,0xf9,0x38,0x24,0x2f,0x63,0x6b,0x9e,0xca,0xda,0x49,0xd2,0xba,0x10,0x80,0xfe,0x77,0xf6,0x79,0x1b,0x95,0x30,0x16,0xec,0x90,0xde,0x4a,0xb4,0x7d,0x35,0x20,0x4c,0xac,0x23,0xaf,0xe4,0xfb,0xbb,0x8f,0xe8,0xc6,0xf5,0xc5,0xf9,0x0f,0x74,0x25,0x7c,0x37,0x96,0x81,0x21,0x4f,0xe9,0x56,0x28,0x5c,0xd1,0xf2,0x94,0xb4,0xf6,0x6b .byte 0x34,0x9e,0xd9,0x37,0x41,0xeb,0x9c,0x71,0x4e,0xeb,0xc6,0xd3,0x7b,0x5b,0xc7,0x3e,0x07,0x59,0xe1,0xc5,0x81,0x72,0x7e,0x30,0xdb,0x35,0xcf,0xce,0x47,0x9f,0x36,0x74,0x34,0x00,0xa1,0xde,0x9f,0xae,0xba,0xe9,0x16,0xf7,0xf3,0xa7,0x24,0xf5,0x81,0xfa,0x40,0x80,0x9b,0x48,0xcf,0x97,0xc4,0xde,0xeb,0x7a,0x07,0xbc,0xf5,0xeb,0x5c,0x38 .byte 0x6d,0x64,0xaa,0xc3,0x81,0x66,0x41,0xc8,0x3b,0xaa,0x8b,0x69,0x22,0x0b,0x19,0x6d,0x0f,0xd8,0xcb,0xea,0x2a,0x98,0x03,0x4b,0x42,0x4c,0x0a,0x7b,0x92,0xdf,0x59,0xa0,0xfd,0x27,0x0e,0x0f,0x98,0xa6,0xc9,0x31,0xe1,0x8f,0x9c,0x57,0x29,0x07,0x01,0x0f,0x26,0xf3,0xc6,0x43,0xdf,0x1d,0xe4,0xa6,0xd6,0xb0,0x56,0xfd,0xf7,0x9c,0xc1,0x0b .byte 0x2f,0x9b,0xc3,0xbe,0xc0,0x09,0x14,0x0f,0x19,0x70,0xd3,0x5a,0x7f,0xe1,0x64,0xbb,0x47,0x04,0xb9,0x2a,0xfc,0x49,0x68,0xba,0x14,0xfa,0x65,0xc9,0x9b,0x46,0xd1,0x0c,0x03,0x3b,0x20,0x36,0x47,0x05,0xb0,0x89,0xd9,0xc0,0x36,0xe8,0xe2,0xfa,0xb3,0x2a,0xf9,0x2f,0x23,0x40,0x26,0xf3,0xe0,0x61,0xdf,0x6d,0x47,0xc4,0xe2,0xb9,0xdd,0x44 .byte 0x9a,0x34,0xcf,0x1f,0xdb,0x72,0x28,0x23,0xf0,0x56,0x65,0xcb,0x43,0xad,0x7d,0x42,0xa5,0x73,0x97,0x62,0x7c,0x2d,0x6e,0x51,0x8f,0x94,0x07,0xe9,0x14,0xa8,0x48,0xdd,0xc5,0x63,0x4b,0xfd,0x73,0x46,0xc3,0xe2,0x55,0x66,0xe2,0x58,0x32,0x00,0x68,0xaf,0x1c,0xd4,0xf3,0x8c,0x59,0x89,0x6f,0x08,0xc5,0xb3,0x47,0x09,0x56,0x90,0x05,0xd1 .byte 0xf8,0xc6,0x20,0x4a,0xb8,0x69,0xd4,0x87,0x5d,0x3d,0x89,0x6d,0xf4,0x10,0xcd,0x5c,0xba,0x3f,0x48,0x7a,0x26,0xb8,0x4d,0x9a,0x0e,0x22,0x2e,0x9e,0x70,0x5d,0xff,0xf9,0xf2,0xec,0xe8,0xb0,0xfc,0xbb,0xcf,0xfe,0x8e,0xc9,0x8d,0x2f,0xda,0x25,0x46,0xcb,0xe4,0x6a,0x33,0xce,0xbb,0x02,0x72,0x58,0xee,0x6d,0x40,0x86,0xc9,0x8d,0x06,0x62 .byte 0x8f,0x6b,0x81,0x60,0xeb,0x78,0x46,0x32,0xe8,0xc6,0xde,0x86,0x4f,0x11,0xa9,0xad,0x62,0xb0,0x15,0xb6,0x09,0xa9,0x3c,0xe1,0x6b,0x12,0xb0,0x39,0x59,0x26,0xde,0xc6,0x7a,0x95,0xaf,0x00,0xd6,0xb7,0xc5,0xe4,0x43,0xde,0xc6,0xcf,0x2f,0xa0,0x8d,0xfd,0x54,0xd7,0xc6,0xed,0x64,0x16,0xa1,0x9b,0x39,0xe3,0xc6,0x9c,0x1e,0x60,0x6c,0x03 .byte 0x3f,0xac,0x24,0x99,0x59,0x5a,0x4e,0x95,0x01,0x5d,0x2e,0x03,0xd0,0xb5,0xdf,0x19,0x85,0x4a,0x5e,0x70,0x6d,0x46,0x00,0xfb,0xbb,0xf5,0xb1,0x35,0x11,0xcb,0xda,0x4b,0x31,0x1a,0x0b,0xa3,0x58,0x9c,0xcf,0x09,0x79,0xd7,0x31,0x4e,0x6c,0xbc,0x16,0x6f,0x14,0xa3,0xbf,0xcf,0x05,0xe4,0xf8,0x2f,0x3b,0x5f,0xb7,0xc4,0xa4,0xbf,0x80,0xac .byte 0x53,0xb5,0xf8,0x7c,0xf5,0x16,0x7c,0x5e,0x16,0x47,0xd1,0x01,0x34,0xd6,0xb9,0x8a,0xc9,0xff,0xe3,0x7d,0x80,0xe4,0xcd,0x83,0xfe,0x8a,0x49,0x34,0xa5,0xc0,0xf3,0xe7,0xff,0x09,0xbd,0xf4,0x84,0x36,0x19,0xc6,0xc7,0x4d,0x50,0xd2,0x3f,0xa7,0xdb,0xea,0x3d,0x74,0x15,0x45,0xe3,0x0f,0x6c,0x6a,0xcc,0x2a,0x16,0x40,0xef,0xaf,0x64,0x2d .byte 0x76,0xa0,0xdc,0x74,0xa9,0xb5,0x70,0x6f,0x27,0xf5,0x3c,0xd0,0xa1,0x46,0xfb,0x9d,0x4c,0xb3,0xda,0x01,0x02,0xc0,0xbd,0x9f,0x4a,0x21,0xb7,0xdb,0xd9,0x89,0xe9,0x90,0x62,0xfb,0x89,0xb8,0x84,0x4b,0x2b,0x1c,0x5e,0x67,0xde,0x9d,0x59,0x3a,0xd0,0x15,0xc0,0xba,0xdf,0x12,0xf2,0x9e,0x07,0x2f,0xb0,0x9c,0x7f,0xf3,0x73,0x89,0x84,0x26 .byte 0xb8,0x7f,0x2d,0xad,0x18,0xf7,0x06,0x10,0x9d,0xe9,0x09,0x4f,0x7b,0xa5,0xa0,0x96,0x2f,0x3d,0x8e,0x65,0x0b,0xe4,0x65,0xa2,0x7a,0x10,0x81,0xb1,0xb9,0xc8,0x4c,0x27,0x53,0x70,0xc7,0x25,0x5f,0x2c,0x03,0x7f,0xe4,0xff,0xc3,0x20,0x89,0x2e,0x4d,0xe8,0xab,0x0a,0x27,0x26,0x0e,0xe4,0x35,0xb5,0x43,0x5e,0x80,0xdd,0x18,0x53,0x3a,0xb7 .byte 0x17,0x6b,0xc5,0x68,0x2b,0x13,0x0e,0xa7,0x93,0x9e,0xfb,0x6c,0x48,0xe8,0x57,0xf5,0xd5,0x2a,0xd8,0x5d,0x56,0xb1,0x5b,0x5a,0x1f,0x6a,0xc0,0x7e,0x55,0x01,0x80,0xcb,0xa9,0xf3,0x20,0x06,0x74,0xa6,0x73,0xe5,0xcb,0x1e,0xc6,0xf4,0x81,0xf7,0x8d,0x8c,0x18,0xfc,0xa2,0x9b,0xe2,0xb6,0x1d,0xd6,0x5c,0xbe,0x82,0xda,0x2c,0xa7,0x08,0x8f .byte 0x58,0x2f,0x32,0x99,0x9c,0xa0,0x8f,0x22,0xfd,0x00,0xcf,0xef,0x4b,0xc5,0x49,0x11,0xf3,0x0a,0xa0,0x67,0x3b,0xf5,0x6a,0x2e,0x18,0xd1,0x3d,0xd1,0xee,0xd2,0xc3,0xc0,0x4f,0xbd,0x6a,0xd3,0xab,0x7b,0x56,0x92,0xd7,0x63,0x9f,0x87,0x44,0x0d,0x2a,0x67,0x44,0x17,0x48,0xa1,0xb8,0x99,0x3d,0xa7,0x57,0x46,0x3d,0x65,0x04,0x58,0xb0,0x43 .byte 0xa4,0x73,0x95,0xd4,0xb2,0xbb,0x8f,0x65,0xea,0x4d,0x55,0xcd,0xe5,0xb6,0xa2,0x15,0x0d,0x74,0x6c,0x3f,0xe5,0x06,0x9a,0x75,0xc3,0x51,0xa0,0x1a,0x66,0x36,0x30,0xff,0x7a,0xdf,0x27,0x22,0x70,0x02,0x20,0x2d,0x52,0x6f,0x6d,0x34,0xb5,0x74,0x3a,0x88,0xf6,0xec,0x7d,0x34,0x02,0x27,0x1e,0x58,0xcc,0x50,0x88,0x4a,0x13,0x98,0x97,0xf9 .byte 0x8f,0x6e,0x38,0x3b,0xed,0x2f,0x17,0x2e,0x44,0xb3,0xb4,0x93,0x14,0xe0,0xda,0xfd,0x29,0x02,0xb6,0xc5,0x80,0xa0,0xe2,0x1d,0x89,0x57,0xec,0xe8,0x15,0x43,0x7c,0xca,0x8b,0xb6,0x19,0x32,0x1c,0xf7,0x75,0x07,0xf7,0x37,0x4b,0x03,0x84,0x75,0xab,0x64,0x7a,0xa7,0xae,0x52,0xcb,0xe9,0xb1,0xc9,0x36,0xe9,0x49,0x60,0x82,0xc8,0xb9,0xcd .byte 0x37,0x1d,0x2a,0x9a,0x76,0x8a,0x4a,0x26,0xcd,0xff,0xac,0x48,0xc6,0x28,0x00,0xdb,0x2b,0x87,0x77,0x17,0xf7,0x57,0x93,0xb7,0x68,0xa8,0xf9,0xec,0x7b,0xaf,0xb0,0xad,0xe1,0x31,0x09,0x5b,0xf6,0x11,0x09,0x4e,0x96,0x53,0x3c,0x5a,0xb1,0x99,0x1d,0xfb,0x3f,0x25,0x1b,0xcf,0x61,0x08,0x2d,0x98,0xcb,0x76,0xa7,0xe9,0x77,0xc6,0x3d,0xe0 .byte 0x0c,0xc7,0x2e,0x34,0x57,0x57,0x4f,0x0b,0xb3,0x66,0xb4,0x57,0x3d,0x66,0xe4,0x3d,0x86,0x8a,0x3c,0x4f,0x19,0x97,0x3a,0x28,0x74,0x1a,0xa0,0xef,0x0d,0x10,0x51,0x58,0xb7,0xe2,0x2d,0x6a,0x6f,0x75,0xc3,0x67,0x9d,0xaf,0x76,0x6d,0x89,0x5d,0xd0,0x78,0xcd,0x03,0x48,0xb4,0x50,0x0b,0x5b,0x94,0x78,0x7a,0xe3,0x52,0xf6,0x4f,0x70,0x4c .byte 0xc3,0xe2,0x89,0xc9,0x33,0x75,0x83,0xc4,0x65,0x79,0x4d,0x8f,0xff,0x0e,0x11,0xb1,0x9e,0x87,0x9c,0xe4,0xd1,0x31,0x36,0xd4,0xef,0xa8,0x41,0x78,0xd7,0xad,0x47,0xbb,0x3d,0x0b,0xf5,0xd7,0x2a,0xf3,0xe5,0x3b,0x7c,0x90,0xa5,0xe6,0x71,0x89,0x55,0x88,0x5e,0x48,0x88,0x18,0xca,0xec,0x08,0x41,0x27,0xd5,0xe1,0x9f,0xb4,0x3c,0xdf,0x11 .byte 0x57,0x9f,0x5a,0x54,0x4e,0xfb,0x6c,0xc9,0xb2,0x98,0x65,0xa3,0xe2,0xd5,0x91,0x52,0x4a,0x87,0x30,0xc8,0x9e,0xcb,0xe7,0x9e,0x00,0x78,0x9e,0x3f,0x9d,0xe1,0x46,0x5b,0xdd,0xf3,0x3e,0xf4,0x36,0x94,0x97,0x06,0x78,0x46,0x53,0xb9,0x0d,0x8f,0x94,0x42,0x60,0x76,0xc7,0xc3,0x4d,0x48,0x06,0xee,0xf1,0xb9,0x58,0xe4,0xe7,0x11,0x68,0x41 .byte 0x51,0xd9,0x98,0xd1,0x26,0x3b,0xcb,0xd1,0x4f,0xce,0x89,0x20,0x76,0x1d,0x58,0x70,0xc7,0x0b,0xe4,0x70,0xf1,0xd0,0x33,0x1b,0x17,0x9a,0xda,0x47,0x7e,0xfc,0xec,0x34,0x0a,0xf8,0x24,0xf1,0xec,0x83,0xe4,0x0d,0x91,0x6d,0x46,0x82,0x33,0xf6,0x25,0xa3,0x26,0x7c,0x2a,0x78,0xef,0x7c,0x6c,0x0e,0x6a,0xd5,0x88,0x97,0xe4,0x76,0x4a,0x2c .byte 0x36,0xa2,0xa0,0x06,0xe2,0x20,0x7c,0x94,0xe2,0x0a,0xee,0x5b,0xc7,0x21,0x4e,0x60,0x24,0x32,0x46,0x09,0x69,0x56,0x6c,0xf5,0x62,0xe7,0xab,0x0d,0x64,0x7e,0x6a,0xa2,0x1b,0x15,0x33,0xb8,0x41,0x0f,0x96,0x16,0x2f,0x7b,0x97,0xdd,0x14,0x6a,0xec,0xfb,0xbf,0xc8,0x3d,0x99,0x72,0xa7,0x14,0xaa,0xae,0xf2,0x10,0xd5,0x4a,0xaa,0xd0,0xb1 .byte 0xb9,0xbb,0x5f,0xa9,0x51,0x96,0x91,0xc0,0x1a,0x31,0xad,0xa1,0x7e,0xb8,0x55,0x90,0x1a,0x17,0x37,0x4d,0x62,0x8c,0x75,0x19,0xfc,0x84,0x54,0x3d,0x5e,0x0a,0xaf,0x27,0xe0,0x5f,0xe2,0x76,0xad,0x9d,0xda,0x43,0xac,0x23,0x5c,0xb9,0xf7,0x2a,0xac,0x55,0xea,0x9b,0x07,0x4c,0x06,0x9a,0xba,0x4c,0x25,0x20,0xee,0x2a,0x37,0xb5,0x7d,0xa0 .byte 0x4f,0x3a,0xb8,0xc7,0x7c,0x2b,0x0f,0xb7,0x1e,0x26,0xe1,0xc3,0x17,0xf2,0x60,0x2b,0x47,0x06,0x7f,0xa3,0x7b,0x80,0xd0,0x48,0xf1,0x8e,0x5a,0x3d,0xcd,0x6a,0x49,0x0f,0x60,0xe5,0x3a,0x7f,0xa8,0x10,0x4b,0x0e,0x29,0x74,0x4e,0xe8,0xe1,0xae,0xe3,0x46,0xa5,0x87,0x7d,0xe2,0xd3,0x98,0x63,0x1e,0xc4,0xba,0x31,0x7e,0xd5,0xe2,0xbf,0x95 .byte 0x2d,0x8d,0x3b,0x1c,0xc8,0x5a,0xd3,0x42,0xe5,0x5e,0x26,0xfa,0xa3,0xcf,0x7b,0x68,0x43,0x5a,0xf6,0x86,0x06,0xd7,0x08,0xeb,0x70,0xa9,0x17,0xf6,0xcb,0xfc,0x9e,0xbe,0x82,0x69,0xe2,0x58,0xb3,0x5f,0x16,0xed,0xf1,0xea,0xaa,0xe4,0xbd,0x5c,0xcd,0x88,0xd6,0x48,0x18,0xfd,0x65,0xd1,0x44,0x77,0x06,0x8e,0x82,0x93,0x88,0x97,0x05,0xad .byte 0xc5,0x62,0x1b,0x6f,0xcd,0x23,0x45,0x86,0xcd,0x19,0x9a,0x90,0x6f,0x54,0x33,0x1b,0x35,0x01,0x05,0x50,0x09,0x7d,0x61,0x4e,0xc3,0x79,0x27,0xe0,0xf7,0xf6,0xf3,0x8c,0x3f,0xd2,0x77,0x09,0xa7,0x9c,0xb4,0xb9,0x2b,0x2e,0x5a,0x34,0x2c,0x60,0xc5,0xcf,0xa6,0x5f,0xf9,0x16,0x8a,0xd8,0xd7,0xab,0x2d,0xe7,0x0b,0x90,0x97,0xb0,0x45,0xf1 .byte 0xc5,0xe7,0xb2,0x50,0x5c,0x4f,0x3a,0xfe,0x7d,0x6b,0xbf,0xe7,0x8d,0x9d,0x9a,0x0d,0xaa,0x3f,0x58,0x09,0x7c,0x0f,0x3a,0xe5,0xff,0x05,0xa7,0x2f,0x78,0x0d,0x5f,0xa3,0x3e,0xf8,0xc5,0x51,0x98,0xc7,0x6b,0x98,0x53,0xe3,0xdd,0x69,0xa6,0x20,0x64,0x99,0x41,0xd7,0x78,0xcf,0x83,0x11,0xc4,0x9a,0x85,0x32,0x12,0xe7,0xff,0x8e,0x4e,0xce .byte 0x17,0xe6,0xb4,0x33,0x24,0x1c,0x99,0xba,0x1e,0xf8,0x3c,0xf3,0xb8,0x2e,0x80,0x89,0xa1,0x26,0x55,0xfc,0x22,0xde,0x5b,0x66,0xbb,0xf2,0x3b,0xd7,0xad,0x11,0xd6,0x5e,0x67,0xb2,0x34,0x6f,0x0c,0x7b,0x09,0xa9,0x7f,0x6f,0x88,0xe3,0xef,0x11,0x85,0x76,0x23,0x32,0x78,0x0b,0xa7,0x81,0xc0,0xdd,0xb0,0xac,0x59,0xe8,0xc8,0xde,0x13,0xa5 .byte 0x75,0x30,0xfb,0xac,0xaf,0x13,0x0f,0xb9,0x32,0xf9,0x41,0xfb,0x36,0x29,0x19,0x11,0xd3,0x6d,0xf5,0xd1,0xf0,0xf3,0x99,0x16,0xf5,0x04,0x01,0x41,0x94,0x8d,0x89,0xc6,0x9c,0xf2,0x39,0x9d,0x07,0x74,0x12,0x70,0x89,0xff,0x16,0xc1,0x79,0x30,0xf5,0x27,0x24,0x75,0x48,0x51,0xcd,0x81,0x15,0xcd,0x70,0x54,0x58,0x9b,0xe5,0x80,0x9c,0x2b .byte 0xdc,0x99,0x69,0x8f,0x14,0xbe,0xee,0x21,0x96,0xa8,0xd4,0x6b,0xf5,0x60,0xa4,0x2c,0x11,0x01,0xff,0x07,0x99,0x72,0x4b,0x5b,0xca,0xb5,0x10,0xfc,0x32,0xdc,0xbc,0x56,0x91,0xe9,0xec,0xb5,0x51,0x0a,0xa1,0x46,0x2c,0x8e,0x74,0xd7,0x63,0x42,0x76,0x41,0x8e,0xc1,0x7d,0x5d,0x86,0xf9,0x8c,0xbe,0x9b,0x52,0xce,0xf1,0x5b,0x04,0x8c,0x62 .byte 0x8c,0xb7,0x62,0x0e,0x62,0x46,0xaf,0xc0,0xb0,0x8c,0x94,0x8e,0xff,0x17,0x83,0x45,0x45,0x19,0x01,0x49,0xf5,0x97,0x13,0xb7,0x9c,0xe5,0x8d,0x62,0xc0,0x25,0x01,0xcb,0xcc,0x23,0xd1,0xfd,0xdb,0xc6,0x4d,0xca,0xe2,0x50,0x3c,0x77,0x1a,0x48,0xb2,0x3e,0x66,0x6b,0x80,0xff,0x7e,0x26,0x23,0x21,0x1b,0xa3,0x1e,0x17,0x3d,0x13,0x7f,0x43 .byte 0x51,0x97,0xfc,0x56,0x1e,0xaf,0x79,0x43,0xd8,0x2a,0x32,0x4f,0x28,0x28,0xe2,0x34,0x19,0x2a,0x64,0x13,0xae,0xf8,0xaf,0x18,0xc7,0x97,0x5d,0xab,0xd4,0xa4,0x3d,0x1f,0xa1,0x13,0x60,0x17,0x63,0x8c,0xb7,0x6a,0x36,0x57,0xab,0x23,0xcb,0x87,0xad,0x4d,0x6b,0xce,0x7f,0xc2,0x65,0xf9,0x30,0xbc,0x22,0xb9,0x8a,0x6e,0x82,0xb9,0xcf,0xd5 .byte 0xe6,0xa7,0x8d,0x6c,0x50,0x6f,0x98,0x15,0xe3,0x38,0x37,0x7a,0x23,0x47,0xed,0xac,0xb8,0xa3,0xa3,0xe7,0x5c,0x51,0x2f,0x9e,0x69,0x49,0xea,0xaf,0x9b,0x6d,0x6f,0x64,0x54,0xcc,0xa4,0x23,0x7b,0x5b,0xa0,0x30,0x5a,0xcd,0xb7,0xa4,0xe5,0x02,0x13,0x36,0x21,0x58,0x96,0xa2,0xfd,0xeb,0x00,0x78,0x5c,0x71,0x63,0x32,0x80,0x63,0x8c,0x67 .byte 0xac,0xe7,0xe0,0x92,0x5b,0x27,0x49,0x9d,0xa6,0x84,0x64,0x2e,0x51,0x5d,0x87,0x83,0xbe,0xce,0xba,0x56,0x33,0x8f,0x5c,0xed,0xb6,0xc0,0x90,0x80,0x17,0x98,0x8a,0x7c,0xe5,0x51,0xaf,0x8d,0xc0,0x76,0x19,0x6b,0xc8,0x7e,0xa1,0x9d,0x94,0x18,0x25,0xd6,0xf4,0xc0,0x19,0x75,0x34,0xaa,0x83,0xfd,0x8c,0x8f,0xeb,0x08,0x63,0xcc,0x39,0xa8 .byte 0xf7,0xe6,0x75,0x53,0x01,0xed,0xb0,0x43,0x8c,0x54,0x37,0xea,0x1d,0x55,0x88,0x38,0x46,0x30,0x37,0xa2,0x85,0x4d,0xf8,0xdf,0xd4,0x42,0xd1,0xb8,0xac,0x1b,0x23,0x4d,0x49,0xd8,0x07,0xe0,0x0f,0x8a,0x24,0x73,0xb7,0xd1,0x0a,0x2c,0x1c,0x72,0x19,0x5b,0x84,0xac,0xe9,0xcb,0xd5,0xa0,0x2f,0x5d,0x2f,0xca,0xe7,0x25,0x5e,0x22,0x3d,0x37 .byte 0x22,0xfe,0x53,0xbb,0xb3,0xf3,0xc4,0x73,0x3a,0x43,0x1f,0xd7,0x73,0x82,0x5f,0x1d,0x94,0x54,0xfc,0xfc,0x7b,0xc5,0x27,0x6c,0x31,0x12,0x0c,0x20,0x59,0x43,0xd6,0xc2,0xeb,0xea,0x38,0x4e,0xa2,0xd8,0xe4,0x4a,0x07,0x36,0xe8,0x37,0x77,0xbd,0x14,0x5b,0xdb,0x7e,0x2b,0x77,0x08,0x4f,0x29,0x96,0xf9,0x11,0x80,0x6e,0x91,0x10,0xe6,0x9b .byte 0xef,0x18,0xf9,0x73,0x16,0xbf,0xd4,0x18,0x8e,0x9e,0x29,0x6e,0xbf,0x38,0xea,0xa7,0x23,0xc2,0x85,0xe0,0x96,0xb5,0xd7,0x61,0x3b,0xfe,0xca,0xe6,0x03,0xdd,0xf2,0x67,0xfb,0x1f,0xb9,0x8b,0x73,0xca,0x1e,0xe7,0xd3,0xc4,0x5b,0xd2,0x35,0x01,0x77,0xfa,0x1e,0xea,0x6c,0x2a,0x8b,0xb3,0x9d,0x83,0x6d,0xef,0x1b,0x84,0x2b,0x7e,0xa4,0xc0 .byte 0x64,0x4d,0xea,0x44,0xce,0x23,0x63,0x5d,0x98,0xe4,0xfe,0x86,0x8e,0xe3,0x35,0xb4,0x4d,0x18,0x53,0x15,0xbc,0xaa,0x23,0x0b,0x0d,0xe4,0xa9,0x83,0xae,0xbe,0x43,0x57,0x33,0xf6,0xa4,0x95,0xf4,0x68,0xba,0xc7,0xf3,0xfe,0x83,0x3b,0x32,0xd3,0x65,0xb7,0x02,0x16,0x8f,0xb4,0xc8,0x4a,0x6d,0xf5,0x9c,0x58,0xa4,0xdc,0xe2,0x6c,0xaf,0xc9 .byte 0x7a,0x46,0xac,0x39,0x82,0x23,0x00,0xfd,0x49,0x2f,0x83,0xca,0x15,0xd6,0xfd,0x05,0xd4,0x50,0x9a,0xd3,0xee,0x31,0x78,0x7b,0x34,0xe1,0x96,0x83,0x22,0xaa,0xd8,0xc7,0xe4,0xee,0x76,0xb0,0x35,0x9e,0x26,0x97,0xb8,0x40,0xc2,0xe4,0x83,0x7b,0x3f,0x1c,0x01,0x6c,0x6d,0x0f,0x95,0x47,0x53,0x04,0x6d,0xa6,0x73,0xc0,0x8f,0x06,0xf8,0x86 .byte 0x84,0x96,0xe2,0x3e,0x38,0x17,0x50,0xbe,0x60,0x35,0x80,0x3a,0xba,0x24,0x3b,0x38,0xdc,0x15,0x49,0xfd,0xef,0xbd,0x33,0xe2,0xf6,0x21,0xfd,0x15,0xc2,0x34,0xce,0xe2,0xf2,0xe5,0xfa,0x68,0x4c,0xf0,0x38,0xda,0x9f,0xcc,0x65,0x3a,0x1c,0xe4,0x30,0x1e,0x01,0x89,0x6e,0x96,0xd5,0x45,0x27,0xb5,0x82,0x98,0xaa,0xbb,0xee,0xcc,0xb5,0xe4 .byte 0xbf,0xc6,0x7e,0x26,0x0a,0x7e,0x70,0x5c,0x52,0xc2,0x64,0xbc,0x49,0x37,0x50,0x78,0x81,0xdb,0xd9,0x80,0x68,0xad,0x1d,0x3e,0xa7,0xca,0x95,0x93,0x7c,0x18,0x0b,0xa9,0x92,0xd9,0xf8,0x8c,0xf4,0x58,0x40,0x4f,0x74,0xed,0xbc,0x0e,0x64,0x7c,0x8a,0x44,0x04,0x8e,0x33,0x27,0x46,0xa2,0x37,0xb3,0xce,0xff,0xc6,0x0b,0xb2,0x6c,0x41,0x01 .byte 0xe6,0x0d,0x6c,0xbe,0x60,0xd1,0x1e,0xde,0xb0,0x81,0x57,0x4f,0xa2,0xf8,0x02,0x5b,0x00,0x3d,0xca,0x9c,0x43,0x4a,0xf7,0xbe,0xab,0x3b,0xc0,0xc9,0xaf,0xab,0x1e,0xa7,0xf2,0x10,0xb1,0xb7,0x73,0x6b,0x43,0xf2,0x75,0xe1,0x7c,0xc7,0xb8,0x91,0x5d,0xc6,0xb8,0xb4,0xd8,0x2b,0x95,0xf5,0x8b,0xe3,0x9e,0x3e,0x5a,0x7a,0x55,0x05,0x7f,0xd2 .byte 0x83,0x36,0xb0,0xfc,0xc5,0x73,0x2a,0xa5,0x6c,0xcb,0x72,0xeb,0xae,0x38,0x38,0x05,0xdd,0xab,0xe2,0xa2,0x92,0x11,0xed,0xd5,0x2a,0x27,0x52,0x6b,0xba,0xae,0x56,0xf0,0x1b,0x60,0x53,0x9b,0x21,0xa6,0x62,0xfb,0x06,0x28,0xfe,0x94,0x26,0x38,0x72,0x80,0xed,0x76,0x61,0x5c,0x43,0xe2,0xee,0xfc,0x4f,0x37,0x52,0x00,0xc7,0xb6,0x51,0xcd .byte 0xb4,0x9d,0x4f,0x28,0x31,0x44,0x14,0xba,0xe4,0x3b,0x79,0x63,0x8c,0x48,0x71,0x38,0xc2,0xeb,0x86,0x4f,0x5b,0x0a,0xc6,0x2e,0xbc,0x7a,0xea,0x09,0x11,0xc4,0x95,0x25,0x35,0x36,0x2a,0x08,0x2c,0xc5,0xc3,0xf0,0x94,0xaa,0xce,0xdc,0x48,0x42,0x7d,0xf6,0x36,0x21,0x58,0x89,0x5b,0x5f,0x11,0xaf,0x8d,0x5e,0x72,0x38,0x6b,0xda,0xe6,0xd6 .byte 0xde,0x5c,0xfb,0x64,0xbb,0x9b,0xb6,0xe1,0x8d,0x25,0x00,0xa6,0x75,0x13,0x2d,0xa4,0xbe,0xf7,0xdf,0xe2,0x15,0x50,0xfa,0x11,0xe8,0xe7,0x85,0x92,0x3b,0xcd,0x10,0x2c,0x91,0xfa,0xb7,0x88,0xed,0x80,0x8f,0xec,0x91,0x15,0x70,0x51,0x2f,0x3d,0x52,0x01,0xd8,0xc8,0x76,0x9c,0x4c,0xdb,0x13,0x02,0x6c,0x30,0xcb,0x3f,0xea,0x3b,0xa6,0x26 .byte 0x89,0x12,0x1f,0x34,0x04,0x46,0x05,0xff,0xa7,0x71,0x41,0xf7,0x88,0xa1,0x53,0x3e,0x2d,0x8e,0x5b,0xad,0xe6,0xab,0xb4,0x4d,0x0a,0x9d,0x40,0x6c,0x12,0xfc,0xd8,0x49,0xeb,0x7e,0x91,0xb9,0xca,0xac,0x60,0x93,0x28,0x44,0x91,0x6f,0x54,0xf6,0x7b,0x67,0x8c,0xed,0x43,0x2b,0x36,0x56,0x1e,0x91,0xc3,0x67,0xac,0xd6,0x51,0x00,0xcc,0x97 .byte 0xfa,0xde,0x4d,0x74,0x1e,0x62,0xd6,0x8a,0x2a,0xb5,0xc3,0x53,0x81,0xcd,0x2a,0xb2,0xc8,0xb7,0x95,0x99,0xba,0x6c,0xb8,0xde,0xe1,0x93,0x39,0x6f,0xe8,0xb7,0x3f,0x6c,0x41,0x10,0x44,0xd9,0x9d,0x7e,0xe6,0x8d,0xdb,0xbb,0x70,0x4f,0xe8,0x44,0x8f,0x7d,0x1d,0x0f,0x8a,0xa4,0xb8,0xa7,0xdc,0x82,0x59,0xb6,0x23,0x16,0x26,0xf9,0xc1,0x92 .byte 0xe0,0xbf,0x9c,0x38,0xc1,0x9f,0xd9,0x1e,0x07,0x74,0x8c,0x0d,0x93,0xdd,0x5d,0x25,0x2a,0xa9,0xbc,0x74,0x97,0x5f,0x39,0xc7,0x25,0x11,0x5c,0x89,0x78,0x39,0xa1,0xf1,0x11,0x16,0xca,0x08,0xcc,0x12,0x09,0x17,0x7f,0x1b,0x86,0x47,0xce,0x95,0xf3,0x0a,0x5e,0x75,0x52,0xed,0x5c,0x7c,0xae,0x1c,0x93,0x3e,0x44,0x1e,0x11,0xed,0x7b,0xff .byte 0x92,0x27,0x30,0x1c,0xfe,0x33,0xa5,0x52,0x39,0x44,0x20,0x08,0x02,0x22,0x58,0x47,0xc4,0x63,0xec,0xd8,0xc4,0x29,0x04,0x44,0xa7,0x94,0xbc,0x8f,0xba,0x84,0xc8,0x16,0x85,0xe3,0xc3,0x58,0x9a,0xf6,0xdc,0x3e,0x15,0x58,0x06,0x04,0xc8,0x78,0xe6,0xb7,0x94,0x2c,0xce,0xb0,0x42,0x3c,0xbe,0x56,0xb4,0x82,0x84,0xb1,0xe7,0xb2,0xad,0x42 .byte 0x58,0x48,0x6e,0xd5,0x94,0x78,0xc3,0x5e,0xd8,0xb0,0xd3,0xa5,0x4c,0xe0,0xaf,0x77,0x0f,0x93,0xa3,0x03,0xf5,0xa6,0x50,0x19,0xb4,0xef,0x9f,0x57,0x84,0x24,0x12,0xb0,0xec,0xb0,0xb0,0x9a,0x9d,0x51,0x69,0xcb,0xd0,0x04,0x13,0x1e,0xfb,0xc1,0xc9,0x66,0xe7,0xb2,0x4c,0x75,0x25,0xbb,0xef,0x21,0x7b,0x00,0x3d,0x3f,0x4c,0x44,0x42,0xbf .byte 0x45,0xeb,0x42,0x28,0xbb,0x88,0x41,0xfc,0x9a,0xc8,0x04,0x1e,0xff,0x79,0xb0,0x12,0x7f,0xf6,0xb2,0xcd,0x34,0xaa,0xaa,0x83,0x8a,0xb1,0x1b,0x13,0xe2,0xb1,0x9e,0xcd,0xe7,0x87,0x4c,0x0e,0x14,0xd4,0x00,0x65,0x95,0x9c,0x5f,0x76,0x94,0x63,0xb6,0x1e,0x7c,0xe0,0x97,0xe9,0x87,0x6e,0x86,0x7a,0xba,0xa1,0xea,0x60,0x62,0xb1,0x93,0x7a .byte 0x08,0xba,0x85,0x18,0x61,0x1e,0x9b,0x63,0x09,0xea,0xf5,0x06,0xb8,0xc6,0x1b,0x24,0x3d,0x86,0x70,0x4a,0x6d,0xfa,0xb9,0xf2,0xb0,0xc8,0x59,0xa2,0xa6,0xde,0x78,0xf5,0x55,0xd4,0x91,0x57,0x56,0x53,0x8f,0x0f,0x4f,0x76,0xf9,0x57,0xa8,0x66,0xde,0xd6,0x33,0x30,0xb8,0x0c,0xb5,0x0a,0xea,0x84,0x9a,0xe5,0xcd,0x03,0x57,0xcb,0x8b,0x47 .byte 0xf5,0xe3,0x67,0xc1,0x69,0x42,0x7c,0xa3,0x91,0xa4,0x25,0x22,0x5a,0xf2,0x15,0x43,0xca,0x3a,0x62,0x2c,0xcd,0x9a,0x99,0xfb,0xb0,0xfc,0x2c,0x41,0xa6,0x84,0x51,0x93,0xc7,0x64,0xd8,0x95,0x8a,0xe7,0x0c,0xa4,0xd1,0x0d,0x57,0x4c,0x00,0xa6,0x55,0x3f,0x5b,0x9a,0x88,0xd3,0x39,0xf8,0xfe,0x30,0xf5,0xff,0xa7,0xcf,0x66,0x33,0xaa,0x20 .byte 0x2f,0x20,0xc6,0x47,0x33,0x36,0xac,0xf8,0x8b,0xca,0x83,0xa3,0xc3,0x5f,0x97,0xe5,0x9f,0x88,0x27,0x34,0x90,0xa1,0xfc,0x94,0xdc,0x5c,0x20,0x13,0x92,0x7c,0x9b,0x8b,0xe5,0x76,0xc2,0xb0,0x42,0x31,0x7c,0x0c,0xdd,0xbc,0xc5,0xcb,0xcd,0x72,0xaa,0xfc,0x89,0xbf,0x9d,0x79,0x19,0x9c,0x1b,0xca,0x19,0xe5,0x57,0xb3,0xbd,0x54,0x92,0xd4 .byte 0xbc,0x93,0x82,0x05,0x0b,0xc9,0x92,0x18,0x78,0xc1,0x23,0xff,0x65,0x7a,0x27,0x93,0xae,0xb6,0xf9,0x28,0x70,0x80,0xfe,0x97,0x73,0x06,0xe5,0x66,0x2b,0xb9,0xd9,0x20,0xe0,0x4a,0xf4,0xa6,0xa2,0xd1,0x6e,0x97,0x2b,0x90,0xa5,0x34,0x80,0x2c,0x25,0x3f,0x92,0xf2,0x41,0x50,0x5c,0x32,0x3d,0xe2,0xf0,0x6e,0x07,0x3c,0xc1,0x13,0x2d,0x04 .byte 0x2e,0x39,0xc6,0x19,0x74,0xe4,0x1d,0x4e,0x85,0xc8,0x3b,0x91,0x44,0x01,0xbc,0x86,0xdb,0xcb,0x0f,0xe5,0x54,0x6d,0xec,0xac,0xa9,0xdf,0x34,0xa2,0x9c,0xa9,0x77,0xe8,0x84,0x7f,0x82,0x67,0xf8,0xd1,0xce,0x7d,0xc8,0xc0,0x29,0xf8,0x59,0x03,0xea,0x6d,0x7d,0x21,0x07,0xe4,0x7e,0xf0,0xb1,0x13,0x8d,0x20,0x6d,0xa0,0xe9,0x98,0x3f,0x73 .byte 0xaf,0x8b,0x28,0x34,0xe9,0x12,0x57,0xaf,0x9a,0xd3,0xc7,0xb5,0xb0,0x60,0x26,0x72,0xae,0x39,0xf1,0x4a,0x38,0xa6,0xd5,0x07,0x7e,0xc1,0x37,0x1f,0x45,0x40,0x89,0x6f,0x1e,0x31,0x4d,0x6a,0x20,0x65,0x5e,0xd7,0x04,0x3d,0x9a,0x94,0x31,0x07,0xf7,0x20,0xef,0x1c,0xa6,0xcd,0xde,0x7e,0xcb,0x45,0x55,0x1e,0xe3,0x7f,0x3a,0x8f,0xf2,0xdf .byte 0xa3,0x55,0xcb,0xfd,0xc2,0x51,0x49,0x07,0xda,0xb4,0x64,0xac,0x82,0xa3,0xb5,0x0f,0x87,0x6e,0xf6,0x6d,0xfd,0x9e,0x5f,0xf8,0xe5,0x74,0xa4,0xd4,0x61,0x6d,0x9e,0xea,0x41,0xc1,0xa7,0xa4,0x8d,0x13,0xdf,0x0c,0x8d,0x1d,0xe5,0x19,0xa3,0xd3,0xc1,0xf5,0xb5,0xe5,0x09,0xc7,0x52,0x2d,0x23,0x74,0x9e,0xa2,0xcd,0xe2,0x58,0x24,0x62,0xd8 .byte 0xcd,0x60,0x24,0x1d,0xf6,0x84,0xec,0x35,0x35,0xfc,0x6e,0x78,0x96,0xea,0xfa,0x40,0xff,0x10,0x05,0x8e,0xfa,0x4c,0xae,0xe4,0x41,0x71,0xf2,0x4d,0x81,0x6c,0x2c,0xc3,0x60,0xcf,0x2f,0xaa,0xcf,0xda,0xe9,0x2d,0x58,0x2c,0xec,0x4f,0x04,0x03,0xa5,0xbe,0xb2,0x40,0x11,0x5c,0x85,0xae,0xf9,0x1a,0x43,0x62,0x90,0xd6,0xa1,0xdf,0x34,0x59 .byte 0xf4,0x8e,0x1b,0x1e,0x89,0x8e,0xba,0x82,0xa5,0x3b,0x96,0xa7,0x4c,0x24,0x72,0x00,0x25,0x7a,0x36,0xa1,0x81,0x61,0x1d,0x62,0x57,0x7d,0x8b,0x32,0xe2,0xdb,0x31,0xe3,0x68,0xb4,0xb8,0xac,0x83,0x95,0x9a,0xbb,0x7a,0x54,0x42,0x08,0xd8,0x68,0xf6,0x97,0x9d,0x3a,0x94,0x7e,0x9b,0xa4,0x13,0x72,0x51,0x3d,0x90,0x32,0xa7,0x21,0x21,0x96 .byte 0xc4,0x67,0x3d,0x0b,0x4e,0x7d,0x8b,0x58,0x6b,0x8d,0x0e,0xcf,0x6d,0xbb,0x6b,0xe8,0xc9,0x47,0xc8,0x3d,0x59,0xa5,0x48,0xc6,0x74,0x61,0xd9,0x98,0xa6,0xba,0xa6,0x75,0x19,0x02,0xb6,0x15,0xd9,0xe0,0xa2,0x4a,0x1b,0xe0,0xe0,0x83,0xb8,0xcb,0x7b,0xf2,0x54,0x02,0xc9,0xcd,0x77,0x51,0xd2,0xce,0x9f,0x47,0x4a,0x32,0x7a,0x85,0x91,0xab .byte 0x24,0x46,0x5b,0x50,0xa1,0x7b,0x7f,0x28,0xd4,0x09,0x62,0xce,0x15,0x9b,0x71,0xed,0x54,0x32,0xc6,0xb0,0x5d,0x11,0xfc,0x79,0x2e,0xfa,0xba,0x63,0xf5,0x56,0xe7,0xfe,0x93,0xce,0xb3,0x41,0xd8,0x3e,0x55,0xcb,0xfd,0x67,0x02,0x82,0xf7,0xc8,0x5f,0xd4,0x5a,0xee,0x80,0xe4,0x6c,0x2a,0xfe,0x2c,0x27,0x33,0x82,0x88,0x40,0x59,0x78,0x8e .byte 0xfe,0x46,0x57,0xd1,0xd6,0xe1,0x51,0xf3,0x26,0xb3,0x87,0xeb,0xbd,0xce,0x67,0x27,0x0a,0x6d,0x9f,0xdc,0x41,0xf9,0xf8,0xcb,0x8f,0x78,0xdc,0x9d,0x8e,0x62,0x31,0x78,0x4c,0x6b,0xef,0xec,0x1a,0xd0,0xfb,0xf9,0x9d,0xc1,0x84,0xd7,0xeb,0x68,0x7d,0x8b,0x01,0x7a,0xca,0xc9,0x25,0x40,0x9b,0x0b,0x2b,0xa6,0x93,0x7d,0xe2,0xa2,0x40,0x0e .byte 0x4e,0x1e,0x12,0x5d,0x62,0x0b,0x92,0x72,0x06,0x04,0x7d,0xdf,0x68,0x64,0xf1,0x99,0x88,0x38,0x73,0x23,0xe3,0xf5,0xbf,0x06,0x88,0x65,0x9b,0xc2,0xee,0x66,0xf5,0x6e,0xa3,0x03,0x04,0x5c,0x2e,0x7a,0xac,0x3e,0x31,0x59,0x6c,0x9e,0x3b,0x09,0xb0,0x80,0x7f,0x05,0x6b,0x6a,0xc0,0xc4,0xfb,0x24,0x71,0x49,0xa2,0xdd,0x7c,0x88,0xb9,0x21 .byte 0xcb,0xc0,0x86,0xf0,0x49,0xbd,0x46,0x06,0xbd,0x5d,0xd1,0x4c,0x64,0x9c,0x99,0x33,0x36,0xf3,0x23,0x74,0x85,0x75,0xc2,0xba,0x20,0x5f,0x20,0xbd,0x75,0x4f,0x83,0x28,0xae,0x91,0x68,0xb2,0xf2,0xc3,0x0f,0xd3,0xf8,0xaa,0x3b,0x42,0xfa,0x79,0xfb,0x7d,0x19,0xa5,0xbb,0x51,0xc1,0x91,0x5b,0x38,0xac,0x8c,0xd9,0x0f,0xe3,0x35,0x60,0xff .byte 0x3d,0xa6,0x28,0x43,0x5d,0x7d,0xfe,0xb5,0xae,0xf3,0x47,0xc5,0xfa,0xe4,0x16,0x4b,0xb9,0xd2,0x51,0x39,0x9f,0x44,0xd8,0x50,0x70,0xab,0xe3,0xab,0xa8,0x63,0x31,0xe4,0xd3,0xeb,0x60,0x25,0x1d,0x67,0x8f,0x33,0x34,0xef,0x07,0xd4,0x92,0xce,0xbf,0x33,0xa8,0x3c,0x62,0x9a,0x09,0x22,0x42,0x12,0xba,0x80,0xb1,0x5b,0x98,0xec,0xbd,0x1b .byte 0x84,0x3f,0x52,0x4f,0xc8,0x9f,0x85,0xc9,0x03,0x4e,0x34,0xa9,0x62,0xe6,0x0d,0x81,0x0e,0x01,0x14,0x3b,0x8b,0x3e,0x4f,0xf0,0xca,0xb5,0xbb,0x6d,0x0f,0x2c,0x43,0xb9,0x84,0x03,0x5a,0xee,0x5b,0x63,0xac,0xb9,0x55,0x96,0x3c,0x53,0xc4,0xd5,0xe6,0xe0,0xd4,0x51,0x1e,0x3c,0x86,0x92,0x9f,0x86,0xa4,0x74,0xd7,0x8e,0x6d,0x23,0x71,0xcf .byte 0xaf,0xfe,0xf2,0x39,0x7b,0x41,0x9e,0x7e,0x1f,0x91,0xeb,0x7c,0xd0,0x18,0x67,0x7d,0xaf,0x24,0x87,0x40,0xab,0x0a,0x08,0xcc,0x00,0xee,0x3a,0xdc,0x02,0x70,0x94,0x74,0xdb,0x27,0x72,0xcd,0xff,0xf1,0x03,0xcf,0x00,0xc9,0x9b,0x56,0x3b,0x40,0x65,0xd5,0x80,0x9a,0xa7,0x17,0xb2,0x50,0x79,0x41,0x0d,0xe2,0x22,0x93,0xaf,0x7e,0xab,0x1b .byte 0xa0,0x61,0x27,0x8a,0x67,0xae,0x56,0x96,0xd2,0x0d,0x49,0x02,0xe3,0x6b,0x13,0xe8,0x7d,0x53,0xd3,0x5a,0x19,0x68,0x07,0x1e,0x5c,0xaf,0x5e,0xa2,0x2f,0x14,0xbe,0xbd,0xa5,0x8d,0x90,0xf4,0x7a,0x86,0x06,0x03,0x68,0x82,0xb1,0xd3,0x69,0x7f,0xd1,0x23,0x24,0xf9,0xfa,0xde,0xfa,0x08,0x98,0x0b,0x23,0xf1,0xf7,0xdb,0xe0,0x58,0x6c,0xb7 .byte 0xb1,0x5e,0x98,0xe6,0x15,0xc9,0xaf,0x86,0x64,0x95,0xab,0xb3,0x7e,0x07,0xd1,0x10,0x71,0x21,0xcc,0xef,0x27,0xc1,0x96,0xe5,0xf1,0xa8,0x35,0x57,0x10,0xe3,0xd4,0x1a,0x32,0x56,0x5e,0x1e,0xb3,0xdd,0xa5,0xe9,0x80,0x4d,0x84,0x43,0x04,0xf0,0x71,0xba,0xb6,0x2e,0xf3,0x5c,0x3d,0xbc,0xa9,0x50,0x24,0xc3,0xdf,0x5d,0xb4,0x2c,0x20,0x60 .byte 0x10,0x1a,0x6e,0x44,0x0d,0x2b,0xa4,0x31,0xdc,0xd3,0x5d,0xa6,0x8d,0xde,0x48,0x99,0x0e,0xb4,0xc2,0x4a,0x1b,0x4f,0x45,0x54,0x9c,0x54,0x5b,0xd6,0x63,0xb2,0xb1,0x3a,0xa7,0x2a,0x42,0x70,0xfe,0xd8,0x33,0x1f,0x95,0xfc,0x26,0x82,0xc5,0x78,0x86,0xf5,0x93,0x07,0x31,0x31,0x74,0x5b,0x44,0xa4,0x5a,0xb2,0x8d,0xfc,0x38,0x99,0xde,0xbd .byte 0xcd,0x26,0xe6,0xdf,0xd1,0x26,0x4e,0x9d,0x73,0xe7,0xa0,0x4e,0x31,0x3d,0x3e,0xea,0x4d,0xb9,0xc1,0x37,0xe3,0xba,0x32,0xd9,0xfd,0x3b,0x94,0x12,0xb0,0x84,0xd3,0xd9,0x73,0xe7,0xc3,0xc6,0xc4,0x2c,0xa2,0x21,0xeb,0xe7,0xd9,0xe5,0x53,0xe9,0xe7,0x4c,0x04,0xab,0xc4,0x70,0xd4,0xd4,0x11,0xba,0x18,0xf6,0xb4,0xcb,0xab,0xa0,0x6c,0x3f .byte 0x9c,0x03,0xe8,0x97,0x68,0x22,0xa1,0x55,0xe8,0x3d,0x8d,0x44,0x5f,0x10,0x1e,0x57,0x9c,0xb1,0xca,0xf2,0xc7,0xce,0xea,0xe7,0x45,0x26,0xbc,0xd7,0x30,0x51,0x18,0xd7,0x70,0xa5,0xad,0xe4,0x7f,0x46,0xdd,0x8b,0xd8,0x0e,0x19,0x59,0x22,0xdc,0x89,0xd2,0xc4,0xbc,0x07,0xc1,0xab,0xaf,0x70,0xd5,0x55,0xe9,0x04,0x2c,0x28,0xd7,0x17,0xd7 .byte 0xc1,0x6b,0x79,0x4d,0x7f,0x8c,0x14,0xd9,0x47,0x15,0x21,0xa5,0xac,0x55,0x52,0x3b,0xf5,0x64,0x50,0x0a,0x94,0x4d,0x1a,0x23,0xcf,0x29,0x53,0xaa,0x2d,0xf1,0xc2,0x1b,0x19,0xc6,0x46,0x5a,0xd0,0x9e,0x7a,0x01,0xb5,0xe8,0xc7,0x6f,0xee,0xbd,0x61,0x12,0x0b,0x25,0x13,0x94,0xee,0x35,0xc9,0x68,0xe3,0x6c,0x4c,0xcd,0xd9,0x81,0x63,0x8b .byte 0x57,0x86,0xc7,0xb2,0x8a,0xfc,0xb0,0x19,0x8c,0x64,0x78,0x05,0x29,0xc6,0x00,0x4d,0xdd,0x4f,0x34,0x5e,0xc1,0xb1,0xa0,0x86,0xe3,0x13,0x65,0x5f,0xec,0x54,0xc0,0xe8,0xbb,0x6c,0xec,0x56,0x11,0x38,0x5b,0x7c,0x55,0x35,0x67,0xf1,0xae,0x86,0x93,0x69,0x59,0x7e,0x8c,0x84,0x8e,0x1d,0xdd,0x99,0x19,0x95,0xb0,0xd2,0x42,0xf2,0x0a,0x43 .byte 0xb8,0x82,0x87,0x9e,0x6d,0x83,0x33,0xed,0x9f,0xef,0x10,0x8e,0x17,0x25,0x17,0xe9,0x84,0x56,0x16,0x55,0x28,0x07,0x40,0xf0,0xdc,0xff,0xc7,0x67,0x32,0xb9,0x32,0xe2,0xd5,0x20,0x82,0xee,0xfd,0x37,0xe8,0x54,0x8a,0xf7,0x76,0x42,0x78,0xde,0x53,0x4f,0xd5,0xfe,0x15,0x7a,0xf5,0xa6,0xe8,0x19,0x89,0xab,0x7f,0xc1,0x43,0xed,0xdd,0xa2 .byte 0x53,0xc4,0xb5,0x0a,0x6c,0xa5,0x83,0x9d,0x09,0x55,0xde,0xbe,0xa5,0xc2,0x00,0x93,0x92,0x8e,0x6d,0xbb,0xfc,0x0c,0x80,0x1f,0x7c,0x16,0x77,0xf9,0xb1,0xde,0x82,0x0b,0xf9,0x98,0xbc,0x49,0x68,0x5f,0xcf,0xb0,0xde,0xe3,0xc9,0xa5,0x35,0xa6,0xe3,0x4a,0x61,0xa3,0x34,0x51,0x64,0x64,0x1a,0x05,0x51,0x87,0xfb,0x04,0xe5,0xcb,0x6b,0xa9 .byte 0x04,0x4a,0xfe,0x19,0xcd,0xbd,0xad,0x9c,0x7e,0xe8,0x36,0x54,0x95,0xea,0x78,0x69,0xf5,0x3f,0xc5,0x11,0x42,0xc1,0x36,0xc3,0x72,0xe3,0xaa,0x15,0x30,0x40,0x73,0xae,0xc0,0x0f,0x3e,0xd8,0xe1,0xe6,0xb8,0xc6,0x81,0x79,0x72,0x2d,0xa2,0x1c,0x19,0x8a,0x31,0xcf,0x7a,0xfb,0x3b,0x51,0xee,0x25,0x50,0xea,0x43,0x0f,0xca,0x07,0xbc,0xde .byte 0x3e,0x24,0xb1,0x57,0xb1,0xe2,0xc5,0xe3,0xc9,0x50,0x72,0x82,0xfc,0xf7,0xf6,0xfb,0x8c,0xd3,0x1a,0xa1,0xbb,0x71,0x40,0x71,0xf8,0xdc,0x14,0x8d,0x45,0xca,0x7b,0x5a,0xd7,0xfb,0x84,0x63,0xc3,0x60,0xf0,0xd1,0xca,0xdb,0x63,0xa2,0x74,0x75,0x42,0xaa,0x03,0x2b,0xc4,0xe8,0xc9,0xa8,0x95,0x8c,0x8f,0x06,0x6f,0x58,0x98,0x14,0x54,0xb4 .byte 0x4d,0x2f,0x5e,0x67,0x57,0xbf,0xe5,0xdc,0x8e,0xb8,0x6b,0x8d,0xb6,0x92,0xad,0x45,0x6f,0xda,0xec,0x8c,0xbc,0x30,0xde,0xcf,0x07,0x90,0xef,0xfd,0x6a,0xb6,0x24,0x0a,0xcf,0x53,0x87,0x7d,0xf1,0x7a,0x75,0x6e,0x5b,0x35,0xc6,0x70,0x24,0x8f,0xac,0xcd,0x78,0xe3,0x2b,0xd8,0x6c,0x35,0x55,0x0e,0xb7,0xb6,0xe1,0x3a,0x1c,0x96,0x4d,0x11 .byte 0x91,0x5c,0x40,0x87,0x02,0x91,0x12,0x6c,0x01,0x26,0x01,0xa7,0x9e,0x75,0xb7,0x22,0x31,0x81,0xa2,0x1e,0x6f,0xa1,0xd4,0x24,0x55,0xc9,0xc6,0x21,0xbc,0x94,0xe1,0xdd,0x6b,0xcf,0x27,0xfc,0xb0,0xd6,0xbd,0xa5,0x8d,0x7c,0xeb,0x04,0xcd,0x36,0x2b,0x09,0x6f,0x40,0x99,0x91,0x7b,0x30,0x4c,0x2b,0x84,0x62,0xeb,0xaf,0x0a,0x38,0xee,0x5d .byte 0xeb,0xb8,0xe9,0xbf,0x24,0xc7,0x2f,0xde,0x4d,0x6f,0xaa,0x69,0xf6,0xae,0x01,0xb6,0x93,0x88,0x96,0xc4,0xaa,0x5b,0x80,0xfb,0xf1,0x08,0x93,0xbe,0x99,0x26,0x8b,0x27,0x56,0xd1,0x81,0x66,0x90,0x04,0x9f,0x09,0xda,0x93,0x22,0x65,0x98,0x4f,0x89,0x3b,0x2e,0xe1,0xbc,0x05,0x38,0xfe,0xb6,0xed,0xdd,0x48,0xa7,0x12,0x07,0x55,0x0c,0x1f .byte 0xd1,0x45,0x03,0x06,0x72,0x2a,0xa6,0xb3,0x56,0x66,0x8b,0x4e,0x7d,0x72,0xe4,0x35,0xcf,0x83,0x12,0x99,0xe0,0x28,0x69,0xc5,0x1e,0x58,0xc0,0x94,0x58,0xa5,0xae,0x6e,0xfe,0x9e,0x05,0xca,0xae,0xfa,0x91,0x48,0x86,0x93,0x46,0x2f,0xe4,0x7c,0xac,0x16,0xb5,0xd2,0xbe,0xd9,0xf8,0x96,0x3b,0x57,0xfc,0x0b,0xd2,0x5c,0x50,0x0a,0xb2,0xcd .byte 0xc9,0xcf,0x0c,0xca,0x9a,0x84,0xf2,0x2a,0xa8,0xe1,0x3d,0xab,0xc8,0x36,0x8f,0x8a,0x81,0x9b,0x52,0xd5,0x3b,0x1c,0x64,0xf2,0x74,0xc5,0x31,0x39,0xe1,0x84,0x7a,0xd0,0xd2,0xbe,0xb8,0x04,0x53,0x03,0x18,0xe6,0xa8,0x17,0x62,0xb5,0x8d,0x54,0xfc,0xd8,0x55,0x68,0x4a,0x8f,0x8e,0xf0,0x8b,0x17,0xce,0x83,0x8a,0xf4,0xb7,0x93,0xc9,0x95 .byte 0xdd,0xdf,0x7b,0x78,0x5f,0x6b,0x32,0x5e,0xcd,0xbd,0x44,0x8a,0x1f,0xfc,0x97,0xff,0x15,0xca,0x6b,0x2a,0x84,0x89,0x4c,0x6e,0x8a,0x45,0x53,0x81,0xc3,0x51,0x61,0x7e,0xb8,0x57,0xb7,0x2a,0x5d,0xc1,0xe6,0x2f,0x5e,0x7b,0xb5,0xc2,0x15,0x25,0xa3,0xe4,0x3a,0x85,0x59,0x43,0x4e,0x38,0x0b,0xeb,0x4d,0x61,0x62,0xd2,0xe8,0x06,0x54,0x45 .byte 0xeb,0x43,0xe7,0x22,0x61,0x27,0x85,0xdf,0x8c,0x19,0xd6,0xb8,0x52,0xa1,0xd4,0x34,0x52,0x3e,0xa5,0xf8,0x6c,0x3c,0xc3,0x53,0xec,0x77,0x80,0x53,0x1a,0xea,0x3b,0x00,0xfa,0xac,0x4c,0xfb,0x03,0xf0,0x03,0xcc,0x4d,0xfd,0x02,0x96,0x68,0x9e,0xab,0x8e,0xb0,0x9f,0x9f,0x0b,0x3d,0x27,0x21,0xd5,0x5a,0x5f,0x40,0x14,0xf2,0x21,0x2f,0x9d .byte 0x1d,0x4b,0x48,0xec,0x59,0x68,0x9b,0x26,0xc6,0xab,0x10,0xd6,0xf6,0x83,0x5d,0x0d,0xf4,0x91,0xb4,0x3b,0x83,0xce,0xbf,0x84,0x4c,0xc1,0x0c,0x75,0x45,0x32,0xec,0xb8,0x82,0x17,0xc7,0x43,0x18,0x78,0x16,0x98,0x0b,0xdb,0xfa,0x3d,0x83,0x2a,0xa8,0x2e,0xad,0x9d,0x39,0x63,0xbf,0xc0,0xbb,0xc6,0x4c,0x81,0x60,0xe6,0x58,0xbe,0xc0,0x85 .byte 0x77,0x68,0xb5,0xfe,0xd8,0x0d,0xd8,0xc2,0x92,0x49,0x76,0x74,0x91,0x62,0x1c,0x20,0xc1,0x93,0x3c,0x4b,0xdb,0x9e,0x5a,0x97,0x6b,0xc8,0xb6,0x4f,0x3f,0x3c,0x2a,0xe8,0xeb,0x0b,0x1f,0x05,0x04,0xb4,0xbf,0xac,0x2a,0xc5,0x04,0xf2,0xda,0xfb,0xba,0x08,0x9e,0xf6,0x78,0xd9,0xb1,0xde,0xce,0xfa,0x7d,0x8e,0x22,0x83,0x23,0x5b,0x2a,0x35 .byte 0x62,0x2f,0x15,0x6f,0x4a,0x44,0x06,0x11,0xde,0xd4,0xea,0xb4,0x05,0xd0,0xd4,0x7f,0x3a,0x20,0x6e,0x01,0xa6,0x79,0xd6,0x67,0x19,0xec,0x76,0xfd,0xaa,0x00,0x28,0x6b,0xf3,0xef,0xdd,0xef,0xec,0xf4,0x99,0xc2,0x25,0xf8,0x3c,0x18,0xcf,0x65,0xf0,0xd3,0x30,0xd3,0xeb,0xc7,0x4c,0xa1,0x3e,0x3d,0xa4,0xe7,0x20,0x78,0xe0,0xbe,0x9f,0x48 .byte 0xbb,0x51,0x30,0x62,0x16,0xe9,0x3a,0x4d,0x5c,0x6e,0xa5,0x4f,0xa8,0x77,0x92,0xd7,0x87,0x4e,0xf9,0xb9,0x43,0xeb,0x4e,0xd2,0x2f,0xc0,0x29,0x22,0xfe,0x37,0xc4,0x58,0x36,0x71,0x1c,0x18,0x05,0x44,0xd2,0x24,0x01,0x25,0x65,0x1b,0xc7,0xfd,0xd4,0xef,0x15,0xeb,0x91,0x06,0x26,0x74,0x2e,0x28,0xb2,0x46,0xb5,0xb5,0xaf,0xeb,0xaa,0x9a .byte 0xc8,0x9a,0xd0,0x34,0xb9,0xf4,0xce,0x6e,0x7a,0xca,0x63,0xf0,0x46,0xad,0xfb,0x53,0xa8,0x2b,0xc4,0x2f,0xed,0x7c,0xab,0x63,0x1c,0xb6,0xfe,0xb7,0x53,0x53,0x3f,0x5a,0x5f,0x45,0xd9,0x50,0x79,0x43,0xa3,0x56,0x0a,0x9e,0x6e,0x22,0xf5,0x85,0x6f,0xe9,0x81,0x94,0xa6,0xc5,0x0d,0x8b,0xef,0x3e,0x0f,0x68,0xbf,0x20,0x86,0x0d,0xd8,0x32 .byte 0xde,0xab,0xf0,0x0b,0x96,0xce,0xc2,0xad,0x8d,0xe1,0x3b,0x37,0xd1,0x06,0xec,0x38,0xec,0x42,0x06,0x3a,0xb1,0xc6,0xb8,0xc0,0xc5,0xea,0x8f,0xcb,0x5f,0xf0,0x15,0x1f,0x77,0x37,0x46,0x10,0xfb,0xc3,0x55,0x7d,0x53,0x41,0xb9,0xb6,0x31,0xe6,0xab,0x0d,0xeb,0x45,0xfe,0x45,0x65,0x46,0xa9,0xbc,0xd9,0xcd,0x3f,0x26,0xce,0x32,0xd2,0x0d .byte 0x7b,0x8f,0xfd,0x6f,0x70,0x33,0x98,0xab,0x3e,0xdb,0x16,0x24,0x63,0x96,0x55,0x04,0x3e,0xb1,0x06,0x1b,0xf3,0xca,0x9e,0xb2,0x47,0x42,0x51,0x5c,0xdc,0xff,0x40,0x72,0x45,0x09,0xdf,0xeb,0x50,0x57,0xf5,0xcb,0xe8,0xb6,0x0c,0xe3,0x13,0xb1,0xdf,0x0e,0x40,0x90,0x6d,0x51,0xee,0xc7,0x0e,0x6e,0xa7,0x67,0xcd,0x59,0xef,0x09,0x3c,0x9c .byte 0x81,0x66,0xf7,0xfb,0x4a,0x14,0x08,0x14,0xc4,0x72,0x79,0x55,0xaa,0x99,0xa5,0xe1,0xfe,0x12,0xf7,0x07,0x05,0x27,0xc7,0xf8,0x18,0xaa,0xf8,0x20,0xac,0xc7,0x23,0x28,0x58,0x38,0xc4,0x1d,0x88,0x8d,0x5a,0x33,0xa1,0x04,0xaa,0xb4,0x7e,0x9c,0xe5,0x60,0x25,0xb1,0xa4,0x75,0x61,0xba,0xa7,0xf5,0x9e,0x2a,0xc4,0x26,0x28,0x7f,0xb0,0x56 .byte 0xaa,0x0a,0x6a,0xd8,0xab,0xfb,0x7a,0x30,0x3c,0x26,0xa9,0x38,0x21,0x9d,0x7d,0x3c,0xef,0x81,0xbf,0x50,0x5c,0x7e,0x1e,0x4a,0xa6,0xec,0x16,0x6b,0xac,0x74,0xf8,0xdb,0x8b,0x1b,0xa6,0xd8,0x48,0xc9,0x25,0x3e,0xa0,0x7b,0x39,0x52,0x17,0x17,0xc2,0xf3,0xc6,0xfa,0xcb,0x4d,0xdf,0xdc,0xf9,0x37,0x00,0x08,0xb6,0x5f,0x12,0x81,0xed,0x6e .byte 0xc5,0x22,0xb3,0xcd,0x57,0x81,0xf7,0x72,0x32,0x9a,0x1c,0x5b,0x96,0xd5,0xb2,0x65,0x6a,0xbc,0x8a,0x6d,0xa4,0xe0,0x54,0x65,0x7e,0x82,0xce,0xa3,0xd9,0x59,0xb8,0x46,0xff,0x18,0x83,0xb0,0x40,0x17,0x84,0x39,0xea,0x32,0xaa,0x52,0xd7,0xb9,0xc1,0x92,0xe5,0xaf,0x42,0x7d,0xde,0xc7,0x71,0xa2,0x0e,0x02,0x04,0x7c,0x92,0x91,0x6e,0xbb .byte 0x91,0xc7,0x38,0x36,0xe6,0xef,0x2f,0x87,0x73,0xe8,0xce,0x04,0x58,0xe4,0xc7,0x0f,0xfb,0x69,0x77,0xf6,0x01,0x41,0x13,0x1d,0xc9,0x59,0x7a,0xf3,0xc2,0x20,0xf7,0xd8,0xfd,0xd9,0xe7,0xd1,0x14,0xe1,0xf1,0x1a,0x35,0x1f,0x8e,0x3f,0x78,0x1e,0xe2,0x01,0x92,0x07,0x3f,0xf4,0x73,0x4f,0x36,0x48,0xb3,0x4c,0x51,0xbe,0xea,0x24,0x20,0x7d .byte 0xaa,0x54,0xe0,0xea,0xf7,0xde,0xaa,0x43,0xa1,0x22,0x85,0xd4,0xf7,0x50,0x47,0x68,0xe9,0x92,0x41,0x84,0xe4,0xa9,0x1f,0x96,0x43,0xb5,0x3b,0x8b,0x23,0xdd,0x2f,0xd1,0xcc,0x5e,0xcb,0xf5,0x77,0xd8,0xc9,0xc0,0xfe,0x1e,0x6c,0xac,0xb3,0x6f,0xc1,0x6c,0x5a,0x33,0x35,0x7b,0x09,0xe7,0x4b,0x2e,0xbf,0x9f,0xb1,0x68,0x56,0xb5,0x17,0x2d .byte 0x77,0xc6,0x76,0xbc,0x47,0xf4,0x41,0x3f,0x35,0xb3,0x41,0xff,0xb8,0xc6,0xe2,0x1e,0xfc,0x2f,0x3f,0x26,0x30,0x10,0xb9,0x37,0x8e,0xa9,0x59,0xff,0x7f,0x74,0x3d,0x99,0x0c,0x65,0x62,0xa4,0xc9,0xed,0xaf,0x72,0xb4,0x7a,0x17,0xab,0xbb,0x33,0xda,0x24,0xde,0x97,0xfb,0xa8,0x9d,0x10,0x6c,0x1e,0x9a,0x13,0xec,0x7e,0xb8,0xa5,0xe6,0x0d .byte 0x92,0x96,0xbe,0x91,0x8c,0x69,0x07,0x78,0xe0,0x02,0x7e,0x97,0x61,0x2f,0xf8,0x0f,0x17,0x3d,0x7d,0x09,0x13,0xb9,0x1c,0xcf,0xd0,0x9e,0x85,0x35,0x3c,0xa3,0x06,0x82,0xb2,0xb2,0x1c,0x09,0xe3,0x91,0x43,0x13,0xff,0x9d,0xa7,0x05,0xd7,0x69,0x4a,0xe1,0xa7,0x1a,0xaa,0x57,0x1f,0xcf,0xcb,0x43,0xac,0x40,0x34,0xd2,0xb8,0xff,0xf8,0x0f .byte 0x82,0xf7,0xa8,0x9d,0x5f,0x5f,0xb9,0xf9,0x78,0x89,0xe4,0x65,0xa8,0x54,0x5f,0x47,0xb4,0x53,0xe4,0x73,0x2a,0x29,0xe0,0xa0,0x70,0x79,0x22,0x51,0x3a,0x5a,0xc6,0x42,0x8c,0x74,0xdc,0xf7,0x85,0xce,0x1f,0x2a,0x1b,0x4d,0x83,0xcb,0xd2,0xce,0x5a,0x4f,0xde,0x18,0x48,0x64,0x4c,0xe8,0x17,0xb2,0x55,0xfe,0x6c,0x5f,0x31,0xa7,0x03,0x4a .byte 0xae,0x8f,0x40,0x47,0x7e,0x92,0xa2,0x19,0x7c,0x53,0x32,0xaa,0x8c,0xc2,0x06,0x79,0xc3,0xc7,0x45,0x02,0x77,0x23,0x12,0x37,0x2b,0x8e,0x84,0xf5,0x8b,0x1a,0x4c,0xd3,0x10,0x0e,0xba,0x33,0x8f,0x2e,0x02,0x21,0x63,0xa8,0x3f,0x02,0x6e,0x42,0x49,0x0a,0x5a,0xf4,0xf0,0xe8,0xed,0x53,0x1f,0x99,0x73,0x65,0x88,0xe3,0xfc,0x60,0x34,0x4e .byte 0x91,0xa5,0x0c,0xbe,0x1d,0xbb,0x95,0x57,0xff,0x7a,0xa1,0xec,0x34,0xe7,0xb6,0x63,0x8d,0xb2,0x3a,0x01,0xa3,0x31,0x50,0xaa,0x8a,0xef,0x97,0x9d,0xe5,0xd7,0xf9,0x8e,0xc1,0x5d,0xcb,0xd3,0x8d,0xc1,0x3e,0x05,0x95,0xfc,0x63,0x14,0xe4,0x44,0x58,0xee,0x3d,0x30,0x04,0x80,0x0c,0x63,0x1d,0x14,0xd2,0xc3,0xc1,0xe1,0x67,0x51,0x64,0x8a .byte 0x23,0xaf,0x31,0x05,0x46,0x4f,0xf7,0x88,0x80,0xcb,0xba,0x47,0x31,0x40,0x3f,0xa0,0xfb,0xe7,0x8e,0x34,0xc1,0xe4,0x69,0xbd,0xb1,0x07,0x2b,0x55,0x27,0x0d,0x04,0xe8,0x74,0x93,0x04,0x15,0x62,0x1f,0x9a,0x66,0xe9,0x8d,0xa1,0xd6,0xc1,0x50,0xd8,0x8e,0x6a,0xe3,0x7c,0x9a,0xb7,0xa0,0x6f,0xf6,0xee,0x2e,0x03,0x67,0x1c,0x06,0x08,0x92 .byte 0x83,0xf5,0x4f,0xa1,0xf7,0x23,0x01,0x1a,0xf8,0xda,0x80,0xca,0xce,0x2a,0x01,0x59,0xee,0xeb,0xbe,0xc4,0x95,0xf2,0xfd,0x7e,0x15,0xb6,0xbe,0x69,0x6b,0x4b,0x33,0x5b,0x83,0x89,0x1a,0x29,0xac,0x23,0x31,0x29,0xd8,0x29,0xea,0x87,0xf3,0x12,0x40,0x4b,0xcc,0xb6,0x07,0x0d,0xbf,0xf4,0x72,0x52,0x74,0x95,0xc9,0x15,0x0a,0x09,0x93,0xdf .byte 0xd6,0x7e,0x4a,0x3c,0xd0,0xf6,0xfc,0xcf,0x75,0x7e,0x65,0x4e,0x5a,0x49,0x72,0xbd,0x46,0xbe,0x5e,0x26,0xc5,0x09,0xdb,0xea,0x5c,0x44,0xcc,0xaf,0x92,0x54,0x58,0x6b,0x5f,0xa8,0xf3,0xe6,0xed,0xb0,0x41,0x1c,0xb1,0x9b,0x1d,0x8b,0x3a,0x27,0x31,0x50,0xf0,0x76,0xaf,0xbf,0xd7,0x40,0x4f,0x23,0x59,0xcb,0x4e,0xa9,0x12,0xd9,0x16,0x5e .byte 0x8d,0x70,0xb0,0x36,0xd7,0xf6,0xde,0xa0,0x62,0x4b,0x8b,0xea,0xf1,0x7c,0x82,0x05,0x80,0x17,0x8d,0x14,0xf3,0xb4,0x9a,0x42,0xa1,0xa2,0x64,0x28,0xf8,0x38,0x0e,0x8e,0xb6,0x0e,0xb9,0x6e,0xfa,0x77,0xf3,0xec,0x28,0x6f,0x56,0x93,0x13,0x1c,0x5e,0x01,0x31,0x8d,0x65,0x46,0xc9,0xff,0x46,0x5e,0xc3,0xbf,0x75,0x45,0x19,0xb4,0x8e,0x8e .byte 0xf1,0x90,0xda,0x83,0x57,0x6c,0x30,0x49,0xf2,0x67,0x64,0x0a,0xf5,0xb5,0x51,0xac,0x91,0xa0,0x5a,0x9f,0x19,0xbd,0x02,0xb2,0x0d,0x5d,0x1f,0xbe,0xc2,0x76,0xf1,0xcb,0x59,0xf8,0xd1,0x90,0x67,0x17,0xda,0xd1,0xd8,0x9f,0x33,0x00,0x61,0x5d,0xd7,0x90,0xd6,0xd6,0xcd,0x16,0xf7,0x35,0xef,0xcb,0x2f,0xbb,0xc0,0x9e,0x2a,0xc8,0xf6,0x03 .byte 0x7a,0x1d,0x4c,0xac,0xde,0xf1,0x25,0x9a,0x3e,0xb1,0xae,0xbb,0x59,0xab,0xe7,0x81,0xa5,0x3f,0x42,0x07,0x4f,0x66,0x8f,0x7c,0x93,0xf6,0xab,0x44,0x2e,0x9a,0x68,0x95,0x16,0xc8,0x59,0x5b,0x0e,0x00,0xdc,0xc8,0x2a,0x97,0x20,0xca,0xdf,0xb1,0x6c,0x1f,0x64,0xe4,0xed,0xd3,0xae,0xea,0x47,0x2a,0xfd,0x52,0x30,0x13,0x05,0xe6,0xc7,0xc6 .byte 0xca,0xde,0xec,0xe3,0xe2,0x58,0x99,0xbf,0xaa,0xff,0x64,0xfc,0xda,0x55,0x3c,0x29,0x00,0xc6,0x60,0xde,0x33,0xbe,0xec,0xe0,0x14,0x2c,0xb6,0x30,0x9f,0xec,0x46,0x11,0x9a,0x36,0x64,0xab,0x2c,0xcb,0x39,0xe9,0x87,0x6a,0x73,0xe4,0xe8,0x6b,0x81,0x1b,0x61,0xc1,0x1a,0xbe,0x1e,0x66,0x76,0x6b,0xaf,0xab,0xb0,0xaf,0x59,0xa9,0xb9,0x54 .byte 0x84,0xe0,0xca,0x10,0x5e,0xe1,0xc1,0x9d,0xed,0x23,0x5b,0xeb,0xa6,0x9f,0x7a,0x0c,0x94,0x97,0x21,0xf4,0xee,0xec,0x69,0x47,0x05,0xfc,0x21,0xbf,0x79,0x47,0x63,0x4e,0x78,0x99,0x07,0xf0,0x53,0xbc,0x3a,0xc3,0xcd,0x36,0xdf,0x33,0x7b,0xa0,0x91,0x39,0xdd,0x7f,0x49,0xaa,0xde,0xdd,0xa2,0x93,0x8f,0x36,0xca,0xaa,0xad,0xd2,0x3d,0xd1 .byte 0x1a,0xdb,0x7e,0x97,0xce,0xe7,0xb3,0xda,0x3e,0x25,0x0d,0xc7,0x0d,0xdb,0x54,0x93,0x20,0xf1,0x10,0xdd,0xb5,0xc9,0x75,0x67,0x61,0xa3,0x24,0x41,0x42,0xb9,0x67,0x03,0x0c,0x52,0xe4,0xf1,0x68,0x07,0x90,0x7a,0xf9,0xe9,0x33,0x19,0x0e,0x11,0xb3,0xda,0xe8,0x5a,0x84,0xf3,0x41,0x77,0x43,0x6c,0xea,0x98,0x23,0xd8,0xae,0xf6,0xdd,0x5a .byte 0xc7,0x4f,0xf4,0x06,0x80,0xd9,0x84,0x90,0x27,0xf5,0x0e,0x85,0x44,0xa8,0x2f,0x03,0x02,0xca,0xa6,0x8f,0x44,0x7a,0x3c,0xb8,0x2f,0x32,0xab,0x9d,0xd7,0xde,0xee,0x1c,0x33,0x91,0x95,0x96,0x66,0xb2,0x03,0xb3,0x95,0x8d,0x45,0x41,0xd3,0xb9,0x19,0xf1,0x93,0xc7,0xe8,0xce,0x16,0x8b,0x69,0xe0,0xdb,0x6b,0x2d,0x44,0xe3,0xff,0x92,0x8f .byte 0x16,0x97,0x3e,0xc1,0x4d,0xc3,0x0b,0x5a,0xff,0x6e,0xe2,0x83,0x91,0x13,0xe5,0xc2,0xac,0x4a,0x97,0x81,0xd0,0x37,0x83,0x10,0x78,0xce,0xd9,0xed,0xe7,0x7f,0x74,0x23,0x22,0x42,0x72,0x12,0x50,0xf2,0xef,0x04,0xf5,0xf1,0x86,0xdd,0x7d,0x5c,0xea,0x81,0x7c,0xfb,0x66,0x2b,0x7e,0xfa,0x84,0xa7,0x4c,0x42,0x08,0x2d,0xa4,0x92,0xc5,0x21 .byte 0xf3,0x1d,0x22,0x76,0x09,0x3f,0xba,0x1a,0x3d,0xaf,0x3d,0xae,0x33,0x8f,0xd7,0x52,0x18,0x7c,0x9e,0xcf,0x39,0xb1,0x84,0x0b,0xc6,0x26,0xc0,0x5b,0x6e,0xd2,0xae,0x6b,0xa4,0xe9,0x6f,0x74,0x51,0x47,0x17,0x1b,0x6e,0xdf,0xd0,0x6c,0xce,0x46,0x3f,0xda,0x9d,0xda,0xa3,0xdd,0x50,0x0d,0x94,0xa2,0x82,0x16,0x6b,0x1d,0x9e,0x39,0x69,0x96 .byte 0x40,0x42,0x87,0xba,0xb6,0xae,0xe5,0x0c,0xee,0x9f,0xf5,0x8a,0x66,0x94,0x68,0x40,0xd3,0x76,0xea,0x27,0x5f,0xf8,0xe2,0x6e,0xb6,0xb2,0xf2,0xb6,0x46,0x9c,0xef,0x18,0xb4,0xd9,0x7f,0xa8,0x86,0xae,0xb1,0xd3,0xe9,0xc5,0xa9,0x18,0x36,0xdf,0x26,0x19,0x5e,0xa6,0x29,0x3a,0xc0,0x4c,0x1b,0x58,0x2d,0xc1,0x33,0xc7,0x06,0x4f,0x14,0x42 .byte 0x17,0x2c,0x62,0x81,0x7e,0x76,0xd6,0xfc,0xa4,0x8e,0xeb,0x56,0x8f,0xac,0x57,0xa1,0x73,0xb2,0x53,0x18,0xa8,0x06,0x9a,0x20,0x33,0x8a,0xe8,0x40,0x68,0x45,0x31,0xc3,0xb8,0xc0,0xd8,0xf4,0x2e,0x11,0xd3,0xf3,0x7d,0xc7,0x45,0x2f,0x58,0xb7,0xce,0x52,0x9d,0x87,0x1a,0x45,0x1e,0x0b,0x17,0x55,0xb7,0x74,0xec,0x2c,0xb4,0xac,0x83,0xc9 .byte 0xff,0x77,0xbd,0x39,0x99,0xce,0x12,0x44,0x80,0x84,0xcd,0x56,0x23,0x24,0x8a,0x77,0x45,0xd9,0x7c,0xdb,0x23,0xa4,0x72,0xd0,0xbf,0x4d,0x5e,0x37,0x21,0xe3,0xd4,0x48,0x2b,0xb9,0x73,0x49,0x82,0xa1,0x54,0x61,0x5d,0x8b,0xae,0x14,0x89,0x20,0x62,0x43,0x6d,0x16,0x34,0x9a,0x0e,0x73,0xf0,0x29,0x3c,0xa2,0xcb,0x66,0x15,0xcc,0xb4,0x49 .byte 0xde,0x22,0x93,0xde,0xce,0x84,0x9c,0x19,0xda,0x16,0x62,0x62,0xca,0xae,0x71,0xde,0x36,0x7d,0x3f,0x9f,0x9a,0x51,0x2b,0x18,0x91,0xa3,0xf9,0x47,0x7f,0x8f,0x45,0x9a,0x12,0xe0,0xdb,0x20,0xa5,0x44,0x52,0x99,0x36,0xac,0xe9,0x1c,0x61,0x5e,0xd6,0x51,0xc1,0xbb,0x2b,0x75,0xd6,0x28,0xab,0x22,0x11,0x40,0x24,0x77,0x56,0x8d,0x62,0x8c .byte 0x41,0x17,0x06,0x4d,0x2f,0x8b,0x0d,0x6c,0x44,0x00,0x62,0xee,0xfd,0x4b,0x61,0xb3,0xe6,0x40,0xa3,0x54,0x51,0x67,0x26,0x18,0x06,0x4f,0xd4,0x4b,0x73,0xbf,0xee,0x53,0x50,0x7a,0x6e,0xc2,0x42,0x7f,0x78,0x34,0xd6,0xcb,0xdf,0x49,0xe0,0x8e,0xef,0xd6,0x3c,0x19,0x77,0x8a,0xcd,0x48,0xdf,0x71,0x07,0x0e,0xf0,0xe8,0x09,0x91,0xe7,0xaf .byte 0x2f,0xf7,0x17,0xb5,0x9e,0x3f,0xe1,0x37,0xbf,0xb1,0xa2,0x89,0xd2,0x08,0x9d,0x67,0xb2,0x1e,0xe6,0x18,0xc0,0xfc,0x91,0xdc,0x79,0x32,0x13,0x32,0xf4,0x07,0x1b,0xf9,0x7e,0x2c,0xa5,0xf8,0xbe,0x57,0xce,0xfd,0x84,0xdc,0x85,0x6c,0x42,0x32,0x20,0x6a,0x91,0xbd,0xba,0xf9,0x83,0x0a,0x53,0x0a,0x3e,0x58,0x36,0x80,0x1f,0xde,0x8b,0xee .byte 0x95,0x2a,0x74,0xbb,0x6e,0x06,0x28,0x40,0xb3,0x3d,0xf5,0x1c,0x65,0x0d,0xf7,0xcc,0x5e,0x1a,0x01,0xfe,0xb2,0x39,0x92,0x49,0x32,0xad,0x5a,0x9a,0xbb,0x06,0x48,0x7b,0xb0,0x4f,0x16,0x10,0xf7,0x46,0x98,0xe5,0xe7,0xdc,0xf8,0x3c,0x3d,0xa6,0x96,0x4f,0x25,0x2e,0xa7,0x99,0x5a,0xe9,0x17,0x35,0x48,0x56,0x48,0x5d,0xea,0x3c,0x4f,0x9a .byte 0x7a,0x0c,0x28,0xaf,0x64,0x56,0xb0,0x4a,0x34,0xa1,0xfc,0xef,0xb8,0x50,0xe5,0x71,0x3f,0x8d,0xda,0x3c,0x75,0xb8,0x22,0x8a,0x89,0x36,0xd5,0xea,0x2f,0xfd,0xfb,0xf3,0x94,0xf2,0xed,0xbc,0xde,0xee,0x6d,0xc0,0x65,0x47,0x8a,0x11,0x52,0xaf,0xf4,0xf0,0x89,0x4d,0x68,0xa5,0x90,0x6d,0x30,0x46,0x0d,0xc6,0x38,0x19,0xe2,0x2a,0x62,0xe9 .byte 0xb3,0x68,0x9a,0x26,0x4b,0x01,0x83,0xbb,0x9d,0x6c,0x23,0x38,0xee,0xe1,0x72,0x60,0xb5,0x30,0xda,0x27,0xd6,0x12,0xe0,0xe4,0x65,0x01,0xc5,0x4b,0xc6,0xbf,0xee,0xe9,0x47,0xf4,0xa7,0x64,0xec,0x61,0x34,0xa9,0xda,0x16,0xa0,0xcc,0x0d,0xdc,0xa4,0xe8,0x8f,0xdc,0xcb,0x4e,0xe7,0xc9,0x7f,0x29,0xc4,0x89,0xbb,0xc2,0x83,0xc8,0x3e,0x28 .byte 0x02,0x73,0x7e,0x63,0x9c,0x88,0xc6,0x35,0x51,0x54,0x17,0xed,0x81,0xbb,0x3a,0x29,0x07,0xe4,0xa6,0xa3,0x28,0x28,0x65,0x40,0x9d,0x86,0xad,0x02,0x7e,0x8b,0x26,0x54,0x32,0x79,0x38,0x24,0xef,0x4a,0xfc,0xaf,0xc0,0x6b,0xd2,0x11,0x86,0x40,0x54,0xe8,0x56,0x9c,0xd8,0xc4,0xab,0xab,0x86,0xd4,0x2d,0xef,0x58,0x22,0x10,0xe0,0xb3,0x89 .byte 0xb7,0x44,0x35,0x5f,0x7f,0x6f,0xd3,0x11,0x66,0x75,0xd5,0x45,0x95,0x93,0x8c,0x05,0x32,0x97,0xad,0x92,0xe3,0xef,0x03,0xb0,0xae,0x28,0x00,0xca,0xac,0x4b,0x36,0xa5,0xa5,0x4a,0x70,0x69,0xe6,0xeb,0x61,0xfc,0xb8,0xc8,0xca,0x88,0x13,0x50,0x14,0xf6,0x5a,0x86,0x41,0x1d,0x84,0xd4,0x59,0x8c,0xae,0xbc,0x68,0xc0,0x33,0x4b,0x13,0x28 .byte 0x89,0xb2,0x63,0x2d,0x85,0xc8,0x33,0x15,0x2e,0x9f,0xeb,0x3b,0xf8,0x26,0xd2,0x79,0x42,0xa9,0x70,0xb7,0x52,0x00,0xdf,0x1a,0x36,0xae,0x85,0x3b,0xf5,0x73,0x80,0xc1,0x7c,0xb4,0x7e,0xbf,0x6b,0xde,0xa1,0xc2,0x9f,0x85,0x86,0x3f,0xff,0x55,0x2d,0x4a,0x6f,0x2d,0x25,0x3c,0x01,0x54,0x92,0x3f,0x63,0x68,0x61,0x4a,0x8c,0xcf,0x34,0xd7 .byte 0x3b,0xcc,0x5e,0x6f,0x80,0x38,0x2f,0xda,0xb3,0x70,0x60,0x35,0x8e,0x3d,0x92,0x4f,0xc8,0xaf,0x4e,0xcd,0x69,0xa8,0x0e,0x62,0xb7,0xbe,0x9b,0xa8,0x09,0x67,0x68,0x08,0xf0,0x39,0x00,0x5e,0x04,0x11,0x64,0x21,0x75,0xf4,0x2a,0xdd,0x3a,0x81,0x95,0xe1,0xa2,0x26,0x4e,0xc2,0x17,0x7e,0xe3,0x27,0x8b,0x80,0x01,0xdf,0xe6,0xfd,0x8e,0x24 .byte 0xe6,0x0c,0xa4,0xdb,0x1e,0x8d,0x03,0x63,0x5a,0xa1,0x00,0x6b,0xcc,0x34,0x75,0x63,0x84,0x91,0x9d,0x4f,0x4f,0xfb,0xbb,0xa3,0x06,0x4c,0xad,0x32,0x62,0x34,0x3c,0x74,0x4a,0x19,0x2c,0x87,0x65,0xb6,0xbb,0x84,0x8f,0x06,0x4d,0x80,0x4e,0x54,0xc5,0xd6,0xe1,0xb3,0x5f,0xf7,0xa1,0xb7,0xb8,0x09,0x7d,0x72,0x36,0x9d,0x14,0x26,0x05,0x6e .byte 0x9a,0x0f,0xfd,0x8a,0x81,0x83,0xa2,0x94,0xf9,0xee,0x5d,0xfe,0x08,0xd7,0xcc,0x8e,0x47,0x7c,0x07,0xbf,0xfe,0x14,0xf9,0x39,0x89,0x47,0x85,0x23,0xab,0x58,0x46,0x06,0x8b,0x81,0x37,0xe7,0x80,0x8c,0x72,0x51,0x3f,0x78,0xa5,0x88,0x41,0x4a,0x20,0x27,0x6d,0xd0,0x41,0xa2,0xb5,0xb1,0x78,0x48,0x39,0x8c,0x77,0xd8,0x77,0x94,0xd1,0x3d .byte 0xa5,0x4f,0x14,0x5e,0x10,0x70,0xba,0x26,0x34,0x4e,0x4d,0xe1,0xee,0xe8,0x3b,0x0b,0xe5,0x58,0x7a,0x00,0x94,0x62,0x24,0xff,0x05,0x14,0xff,0xe4,0xa5,0x9c,0xe3,0x0e,0x4f,0xbf,0x7e,0xcc,0x60,0x74,0x8d,0xfa,0x44,0xaa,0xd9,0x66,0x79,0x24,0x6d,0x18,0x5b,0xcf,0xd3,0xa7,0x2f,0xd6,0x20,0xe4,0x5d,0xed,0x1f,0xe6,0xad,0x59,0xe4,0xa7 .byte 0x44,0xb9,0x8e,0x4e,0xa2,0x41,0x73,0xb6,0x38,0x6b,0x7f,0x4e,0x15,0x0a,0x41,0x3c,0x57,0xa3,0x21,0xe2,0xbf,0x19,0xf9,0x43,0x61,0x11,0x7c,0xa9,0xdb,0x25,0xce,0x10,0x74,0x6f,0x35,0xfb,0xfc,0x9b,0x0e,0x2c,0xb7,0x42,0x25,0x97,0x07,0xb5,0xba,0x51,0xbc,0xc7,0x6e,0xa0,0x60,0x65,0x8d,0xcb,0x4a,0x94,0xbe,0x99,0x28,0x7b,0x9e,0x7a .byte 0x0e,0x57,0xa2,0x74,0x68,0x76,0x75,0x7c,0x28,0xb5,0x1f,0xf4,0x5a,0x2f,0x00,0xae,0xbe,0xe8,0xc6,0xf6,0x9e,0x16,0x96,0x06,0xed,0xea,0x73,0xfb,0xd8,0x46,0xb3,0xb0,0xdd,0xc4,0x64,0x9b,0xd3,0xe0,0xd5,0x2b,0xbc,0xb6,0xd8,0x05,0xbf,0xf7,0x92,0x11,0x18,0xc6,0xe1,0x55,0x50,0x42,0x72,0x93,0x6e,0xf1,0x85,0x9e,0x0a,0x2e,0x2a,0xee .byte 0x51,0xa7,0x44,0xe1,0x2a,0xdd,0x58,0x3b,0x00,0x72,0xaf,0xb3,0x14,0x11,0xcf,0xc9,0xcf,0xa5,0x7c,0x6c,0x8a,0x75,0x42,0x39,0x6e,0x99,0x3d,0xed,0xbe,0xd3,0x69,0xbb,0x7b,0xb1,0x00,0x6b,0xa9,0x84,0xdd,0x38,0x30,0xdf,0x20,0xed,0x50,0x78,0xc2,0xc7,0xae,0x47,0xdb,0x87,0x2a,0xe7,0x58,0x83,0x2b,0xc9,0xf1,0x34,0xbe,0x2d,0xfa,0x6c .byte 0xf9,0x8c,0x73,0x58,0xb5,0x53,0x1b,0x8a,0xa0,0x86,0xa3,0x03,0x56,0xf8,0x35,0x00,0xd5,0xb7,0x5b,0xa5,0x4a,0x28,0x68,0xf6,0x3b,0x32,0xf4,0xdc,0xad,0xf0,0x24,0x0c,0xc9,0x5e,0xb4,0x32,0xdb,0xb8,0x4a,0x8d,0x19,0xec,0xf0,0x32,0x06,0xc9,0x84,0xc0,0x99,0x0b,0x14,0xf6,0x64,0x88,0x99,0xbc,0x4c,0x90,0x07,0x49,0x18,0x1b,0x05,0x15 .byte 0x3f,0x43,0x42,0xf1,0x43,0x89,0xa3,0x14,0x78,0xdb,0xea,0xe9,0x90,0xde,0x3c,0x71,0x14,0x77,0xc1,0xab,0x29,0x1a,0x20,0x9e,0xd6,0xdd,0x73,0x32,0xf9,0xf7,0x2f,0x58,0x3f,0x59,0x80,0x36,0xe8,0xf7,0x79,0xa2,0xe8,0x38,0xdf,0xd9,0xb2,0xbf,0x97,0x95,0xf4,0x9c,0xec,0xc4,0x23,0x7d,0x5d,0x13,0x68,0x79,0x7e,0xe7,0x88,0xcb,0xd8,0x2b .byte 0x14,0x2d,0x56,0xcf,0x36,0x59,0x67,0xb7,0x62,0xd5,0xb2,0x70,0x01,0x7c,0x96,0x8a,0x72,0xab,0x09,0x83,0xa2,0x4c,0xfe,0xe3,0xc0,0xbe,0x8a,0xa2,0xa5,0x35,0xc4,0xea,0xd6,0x56,0x50,0x43,0x09,0xf5,0x49,0xf3,0x7a,0x70,0x39,0x29,0xc1,0x47,0xcc,0x82,0xf5,0x96,0x0f,0x94,0xb0,0xa5,0x81,0x8f,0x79,0xa4,0xdc,0x65,0x3d,0x32,0x67,0xe7 .byte 0xdc,0x67,0xb3,0x9a,0x44,0xa7,0xf6,0x61,0x97,0xa9,0x01,0xc7,0x0a,0xf2,0xd3,0xc2,0x16,0x12,0x18,0x18,0x67,0xca,0xc8,0x0c,0x04,0x70,0x7b,0x43,0xa9,0xea,0x15,0x11,0x08,0xe8,0x5b,0x2a,0xc8,0x2c,0xc7,0x17,0xb1,0x65,0x8d,0xe7,0xca,0x18,0x1e,0x10,0xbe,0xd0,0xa6,0xe6,0xcd,0x79,0xcd,0xef,0x4b,0x45,0x7c,0x4e,0x52,0x49,0x69,0xc2 .byte 0x57,0x72,0xf6,0xa9,0x4e,0x1c,0xb1,0x91,0x87,0x45,0x5c,0xc0,0xa1,0xb5,0x11,0x40,0xc2,0x6c,0xa8,0x6e,0xb7,0xd5,0x59,0x64,0x2f,0x42,0x55,0x56,0xd7,0x3c,0x53,0x98,0x2f,0xfa,0xd1,0x8e,0x13,0x1b,0x67,0xdb,0x12,0x37,0x98,0xd9,0x6d,0xf1,0xea,0x0a,0x13,0x14,0xf6,0xb6,0x86,0x8e,0xa0,0x95,0xa9,0x80,0x58,0x2e,0x02,0x02,0x63,0x07 .byte 0x32,0xff,0x57,0xb2,0xd5,0x4f,0xa9,0xd2,0x60,0x65,0x9c,0x15,0x8f,0xff,0x9b,0xe4,0x79,0x29,0x19,0xa7,0x8b,0x98,0xfa,0x68,0x2c,0x3a,0x1c,0x63,0xb5,0x95,0x3c,0x1d,0xa1,0xfe,0x67,0xa8,0xaf,0x48,0x35,0x80,0xc7,0x3f,0x53,0xb4,0x61,0xa4,0xb8,0x39,0xa4,0xce,0x32,0xff,0x98,0xc3,0x75,0xb0,0x82,0x52,0x59,0x64,0xfc,0xc5,0x8e,0x50 .byte 0x67,0xbd,0x57,0x48,0x06,0x05,0x87,0xaf,0x6e,0x26,0xf1,0x91,0x76,0xac,0x7d,0x67,0xd7,0xea,0xd6,0x54,0xf2,0x43,0x5c,0x57,0x71,0x02,0x27,0x6e,0x24,0xd8,0x46,0x82,0x30,0x76,0xa1,0xd7,0xc9,0xc0,0xc0,0x2a,0x35,0x87,0x2c,0xf5,0x0b,0xb9,0x2d,0x3d,0xdf,0xd4,0x9b,0xd5,0x68,0x68,0x5c,0x00,0x55,0x74,0x6c,0x09,0x6b,0x82,0x96,0x4c .byte 0xf4,0xfd,0xf9,0x8f,0x43,0x29,0x12,0xee,0xf6,0xfb,0xcf,0xdf,0x9b,0x4f,0xed,0x42,0xca,0x52,0x54,0xa2,0xf5,0x49,0x20,0x54,0x8f,0x34,0x76,0xba,0x68,0xf1,0x62,0x56,0x9d,0xc7,0xe1,0xfa,0xff,0x6b,0xf6,0x7e,0xab,0xfe,0x40,0x6d,0x0d,0xb1,0x44,0x16,0x84,0x28,0xbe,0x78,0x00,0xe3,0xe1,0x8c,0x6c,0x49,0x02,0x41,0xcd,0x07,0xd7,0x1d .byte 0xba,0x63,0xed,0x91,0xb8,0x74,0xae,0xa2,0x12,0x3c,0xac,0x31,0xe1,0xb9,0x46,0x9b,0x3a,0x0d,0xc8,0x6a,0xf3,0x83,0xa7,0x68,0x48,0x5c,0xc4,0xc8,0xc7,0x0f,0x81,0x0c,0x6d,0x29,0x4b,0xac,0x91,0xfa,0x7e,0x8e,0x08,0xd3,0xdc,0x8b,0x30,0x25,0x36,0xba,0xae,0x61,0x98,0x84,0xfb,0x2d,0x3b,0x97,0xa2,0x46,0x8f,0xf2,0x50,0xae,0xbf,0x8a .byte 0x52,0x46,0xf8,0x87,0x8e,0x8e,0xff,0x2e,0x73,0x8f,0x90,0x8f,0x0e,0x3f,0x0a,0x4b,0x9a,0x3c,0x80,0xef,0x0a,0x3d,0xaf,0xd8,0x3d,0xc3,0x8b,0x71,0x1d,0x5b,0x37,0xe5,0x62,0x5f,0xde,0xc2,0x14,0xac,0x2c,0x13,0x6e,0x49,0x0c,0xc3,0x31,0x58,0x35,0x1e,0xf0,0xe5,0x16,0x84,0xe1,0xe8,0x60,0x98,0x2d,0x1a,0x1d,0x1f,0x58,0x57,0xb8,0x40 .byte 0xd7,0xcf,0xac,0xef,0x0d,0x4e,0xf4,0x4e,0x62,0x1e,0x97,0x81,0x88,0x26,0xb9,0xeb,0x02,0x67,0x0e,0x89,0xfe,0x65,0x5e,0x04,0xc6,0xc1,0xe1,0x25,0xa6,0xd6,0x81,0x86,0x76,0xcd,0x23,0x5b,0x64,0x61,0x75,0x5d,0x4c,0xfa,0x43,0xa2,0x21,0xd2,0x4b,0x62,0xc3,0x13,0x39,0x12,0xa6,0x9c,0x16,0x87,0x62,0x5e,0xaf,0xff,0xf3,0x76,0x7d,0xed .byte 0x05,0x11,0x56,0xa0,0x63,0x10,0x1a,0xed,0x0e,0x90,0x14,0xa1,0xef,0x0a,0xcf,0x1b,0xcd,0xe4,0x29,0xf6,0x4d,0xee,0x04,0xea,0xd5,0x7f,0xa4,0x67,0xf7,0xe2,0x2e,0x35,0x1a,0xab,0x64,0x1c,0x47,0x78,0x65,0x39,0xff,0x65,0x5a,0xd8,0xd1,0x9f,0xca,0xe4,0xec,0xb7,0xf7,0xe2,0x90,0x66,0xa6,0x72,0xd4,0xd7,0x71,0xa2,0x3a,0x9d,0x9b,0xc5 .byte 0x22,0xce,0x45,0x8f,0x6d,0xe1,0xd1,0xd9,0x96,0x1c,0x9b,0xc0,0xb8,0x03,0x3b,0x3c,0x69,0x49,0xb3,0x66,0x2b,0x00,0x70,0x99,0x6f,0x3a,0x17,0x93,0x28,0xec,0x4d,0x2d,0x0f,0x66,0x11,0x26,0x98,0x66,0x60,0xa5,0x8d,0xe8,0x13,0xaa,0xd6,0xe7,0x10,0x9e,0x5d,0x52,0x76,0xcc,0xd0,0xd7,0x67,0x19,0x33,0xc7,0xe0,0xff,0x11,0x3a,0x94,0x57 .byte 0xc0,0xd1,0x2e,0x3c,0x8d,0x39,0x3e,0xf9,0x62,0x97,0xcb,0x8e,0xf5,0x0c,0x62,0x8c,0x79,0xad,0x06,0xec,0x51,0x0c,0x03,0xc0,0xf0,0x5c,0xd6,0x61,0x7d,0x0b,0xd8,0xf5,0x65,0x7b,0xb4,0x05,0x6c,0x62,0xa7,0xab,0x42,0xe5,0x8b,0x82,0x6d,0xa0,0xcc,0xe2,0x83,0xa3,0xe3,0x63,0x68,0x61,0x48,0x74,0x2b,0x3f,0x1b,0x10,0x85,0x61,0x48,0xcf .byte 0x19,0xba,0x82,0xa9,0xde,0xc9,0xfd,0xa6,0x1e,0xed,0x2c,0xc7,0xef,0xaa,0x77,0xbb,0x61,0xb5,0xea,0x73,0x85,0x72,0xf6,0x1f,0x5c,0x3d,0xbe,0x99,0x70,0x1f,0x19,0x8a,0x39,0x41,0x07,0xda,0x1e,0x35,0x15,0xa8,0x80,0x2c,0xf3,0xe9,0xe6,0x0e,0x81,0x71,0xf8,0x1f,0xee,0x35,0xd5,0xd4,0xf8,0xbb,0x93,0xf5,0x19,0x26,0xb5,0xea,0x98,0x5f .byte 0x92,0xae,0xcd,0x5c,0x0a,0x2f,0x8e,0x12,0x55,0x29,0xa6,0xc6,0x0e,0xde,0x50,0x83,0xa0,0x5a,0xb9,0x05,0x0d,0x7c,0x96,0xfd,0x41,0xd2,0xb2,0x2b,0xea,0x14,0x9f,0x8b,0x77,0x20,0x83,0xc8,0xf7,0xe6,0xd6,0x8d,0x43,0x00,0x0b,0xf0,0xde,0xcf,0x6c,0x46,0xb0,0xd3,0x02,0xe1,0x7f,0x89,0x1c,0xe7,0x8d,0x7d,0x5c,0x59,0xa1,0xf7,0x17,0x04 .byte 0xd6,0x1c,0x85,0x8c,0x6a,0x4f,0x74,0xd2,0x1c,0x7b,0x4a,0xcb,0x8a,0x42,0x2a,0x35,0x17,0x08,0xe7,0xa3,0x6a,0x00,0xdd,0x28,0x8e,0x12,0x8a,0x03,0x99,0x29,0x34,0x69,0x84,0xec,0x98,0xef,0x31,0x21,0x23,0xeb,0xf8,0x44,0x15,0xdc,0xab,0x7e,0x7f,0x7b,0x0a,0xb6,0x4c,0xfb,0x21,0xe4,0x5b,0xe6,0xf0,0x3e,0xe5,0x81,0x8a,0xc9,0x84,0x76 .byte 0xb7,0xf7,0xa2,0x05,0x14,0x91,0xb2,0x0d,0x90,0xa0,0x32,0xdc,0x1c,0xf4,0xdd,0x1b,0x70,0x06,0xf5,0xb9,0xb1,0x20,0xd7,0xcd,0x58,0x04,0xfd,0xb7,0xa9,0xc7,0x4d,0xbf,0xa3,0xce,0xc8,0xa7,0x0c,0x8d,0x1f,0x96,0xfa,0x8c,0xa7,0xe0,0x99,0x6c,0x4d,0x71,0xa4,0x3d,0x67,0xb1,0x59,0xa7,0xe3,0xdb,0xbb,0x59,0xa5,0x1c,0xdf,0xfd,0x3a,0x05 .byte 0xc4,0xd8,0xe6,0xde,0x42,0x5a,0x0c,0x88,0xe6,0xe3,0x52,0xb7,0xcb,0xa0,0xdc,0xc5,0x8a,0x70,0xa5,0xd1,0x99,0xd8,0x18,0xec,0xd9,0x8d,0x7d,0x54,0xca,0xf3,0x1c,0xdb,0x1f,0xc5,0x74,0xeb,0xd3,0xbf,0x96,0x6e,0xa4,0xc9,0x62,0x8b,0xff,0x64,0x4b,0x63,0x65,0x97,0x83,0xe7,0x02,0x64,0x70,0x56,0x0d,0x78,0xcc,0x75,0x30,0xf1,0xd2,0xb6 .byte 0x69,0x9d,0xe2,0x56,0x63,0xb3,0x9a,0xa2,0x7b,0x91,0xad,0x24,0xbb,0x61,0x3b,0xea,0xcd,0xb2,0xce,0xd7,0xa8,0xb0,0x9e,0xc3,0xac,0x67,0x01,0x57,0x0b,0xb3,0xc5,0x47,0xf7,0xb2,0x32,0xdc,0x25,0x18,0x22,0x1d,0xef,0x88,0xe0,0x47,0x67,0xeb,0xad,0x09,0xd8,0xb8,0x17,0x17,0xc7,0xc5,0x3d,0xa2,0x51,0x9b,0xa5,0xd4,0x0b,0x6c,0xe5,0x39 .byte 0x30,0xed,0x6e,0xf9,0x15,0xc2,0xaa,0x2c,0xb2,0x86,0x1c,0x33,0xca,0x0d,0x27,0xe8,0x68,0xb2,0x11,0xad,0x8b,0x9e,0x69,0xb9,0x3f,0xdb,0x54,0xf3,0x46,0xb4,0xc3,0x9d,0x47,0x32,0x1e,0x5b,0x49,0xc5,0xa2,0x2d,0xaf,0x37,0x8a,0x53,0xfd,0x96,0x70,0xfc,0x0b,0x55,0xaa,0x35,0x22,0x9e,0xb1,0x09,0xf6,0xae,0x9f,0x47,0x5f,0x5f,0xd7,0x9e .byte 0xc2,0x13,0x7a,0x82,0x32,0x1a,0xdc,0xdc,0x87,0x7d,0x9c,0x00,0xc0,0xef,0xef,0x71,0x76,0xf9,0x48,0x17,0x95,0x69,0x30,0x30,0x36,0xf6,0x24,0xc9,0x11,0xd5,0xd7,0xbd,0x1b,0x23,0xd9,0x9f,0x57,0xf4,0xf3,0x01,0x9d,0x22,0x91,0x92,0xa0,0x0f,0xb5,0x88,0xe6,0x3d,0xa7,0x2b,0x19,0x7a,0x65,0x73,0x34,0xc5,0x16,0x1d,0x93,0xeb,0x08,0x71 .byte 0x46,0x98,0x2b,0x21,0x70,0x9b,0x83,0x15,0x9b,0x4e,0x1f,0x6c,0xf0,0x6e,0xde,0x6d,0xd1,0x40,0x17,0x8d,0x18,0xc2,0x5f,0x91,0x97,0xb0,0x66,0xe8,0x77,0xf7,0x22,0xdf,0x10,0x5f,0xb2,0xc2,0x3b,0x37,0x59,0x52,0xf1,0xea,0x0c,0x6f,0xd4,0xa5,0x40,0xa5,0xb6,0x38,0xe9,0x81,0x5b,0x81,0xc8,0x9d,0xf5,0xbe,0xbf,0x4d,0x7d,0xc2,0x53,0x9f .byte 0xac,0xa6,0xf0,0x7a,0x22,0x9c,0x16,0xa9,0x1f,0xb9,0x54,0x25,0xf9,0xd3,0x6e,0x42,0xe8,0xc2,0xf4,0x9d,0xa7,0x25,0x95,0xab,0x7e,0x9a,0xaa,0x4a,0xcc,0x89,0xc5,0x73,0x4f,0xe2,0xed,0x2e,0x22,0x6d,0xb0,0x22,0x5f,0x79,0x9b,0xf2,0x0d,0x9d,0xd2,0xa2,0x7e,0xbf,0x2a,0xe0,0xe4,0xf2,0x2c,0xec,0x52,0xd7,0xac,0x63,0xac,0x82,0xa5,0xbf .byte 0x02,0xda,0x3a,0x9e,0x36,0x8f,0xdf,0x39,0xbc,0x96,0xdf,0xbc,0x38,0x39,0x84,0xe6,0x7e,0x6e,0x65,0x1b,0x48,0x58,0x24,0x54,0x25,0x6b,0x70,0xd5,0xe4,0x33,0x59,0x1c,0x12,0xca,0xe7,0xbf,0x21,0xa7,0xc0,0x96,0x85,0x52,0x0e,0x53,0xc5,0xea,0xdc,0xd4,0x37,0xb7,0x02,0x38,0x41,0xf5,0x3e,0x39,0x3a,0x65,0x4e,0x93,0xe3,0xe6,0x9d,0x8b .byte 0x15,0x1f,0xdf,0x6f,0xaa,0x4b,0x6f,0x11,0xfd,0xb6,0x47,0x3b,0xc8,0xb1,0x01,0x25,0x9b,0xbf,0x7c,0xae,0x75,0x9b,0xab,0xec,0x93,0xdc,0x28,0x42,0x92,0xb5,0x3d,0xdc,0xdc,0xa1,0x82,0xdb,0x2a,0x05,0xec,0xaf,0xa9,0xfa,0x34,0xca,0xaa,0x6d,0xa1,0x6a,0x4b,0xe5,0x43,0x73,0x31,0xde,0xb0,0x5d,0xc2,0xdb,0xd0,0x3a,0xb7,0x9f,0xe2,0x86 .byte 0xfd,0x96,0xa9,0x93,0x5e,0xe7,0x5d,0xa6,0x24,0xe4,0x72,0x16,0xb8,0x27,0x06,0x95,0xbe,0x87,0x78,0xb7,0xba,0xa3,0xcb,0x7e,0x2b,0xfc,0x3a,0x24,0x1c,0x3c,0x16,0x03,0xd4,0xe1,0x28,0x25,0xac,0xb2,0x73,0xcb,0xff,0xf1,0x0c,0x65,0xc7,0x44,0x84,0xe0,0x19,0xe8,0x58,0x4f,0xc4,0xa0,0x19,0x5a,0x64,0x41,0xf7,0xaf,0x4a,0x87,0xf3,0xc2 .byte 0xc3,0xa6,0x11,0xd2,0xf2,0xd3,0x18,0x13,0x38,0xec,0x26,0xf3,0xcd,0x17,0x9b,0xaf,0x9a,0x40,0x10,0xb9,0x0c,0x60,0x82,0xd2,0x62,0xe2,0xae,0xba,0x4d,0x95,0x44,0xea,0x19,0xff,0x21,0xca,0xba,0x31,0x38,0xa0,0x8d,0xcd,0xde,0xae,0x50,0x93,0x96,0xfe,0x39,0x50,0x97,0x79,0xd9,0xcd,0x68,0x56,0xc9,0xe3,0x3c,0x85,0x7c,0xb8,0x1d,0x01 .byte 0x92,0x72,0xf2,0x35,0x26,0x5e,0xf0,0x38,0x85,0xd9,0x05,0xd1,0xe9,0x18,0x1f,0xf5,0xd1,0xf3,0xc3,0xc5,0x43,0xe6,0x87,0xcb,0xf7,0x25,0x89,0xb3,0x17,0xea,0x58,0xa1,0x5f,0x61,0x28,0x37,0x72,0x65,0x44,0xde,0x53,0xa8,0xd8,0x80,0x35,0x14,0x1d,0x02,0x64,0x68,0x2f,0xc9,0x1c,0x75,0x44,0xec,0x07,0x4e,0xba,0x49,0xa0,0xe8,0x3b,0x3c .byte 0x63,0x32,0x66,0x62,0xa8,0xe3,0x39,0x3c,0xe7,0x70,0x20,0x6d,0x1e,0x2e,0x74,0x91,0xb4,0x8f,0xdf,0x59,0xc2,0x0e,0x1e,0x43,0x9b,0x26,0x7b,0x36,0x7b,0xe8,0x96,0x61,0x81,0x96,0x16,0x12,0xeb,0xd9,0x8e,0xd8,0xd8,0x04,0x1f,0x00,0x90,0x81,0x9f,0xbe,0x59,0x83,0x83,0x7d,0x83,0x56,0x41,0x78,0x1d,0xac,0x64,0x7b,0xdd,0xea,0x2f,0x34 .byte 0x2e,0xf4,0x58,0x21,0x8b,0x39,0x82,0x90,0x80,0x75,0x63,0xd9,0x2e,0xf9,0x4a,0x75,0x77,0xa8,0x66,0xa9,0x95,0x88,0x38,0xd7,0x1f,0xd9,0xae,0xf9,0xba,0x29,0x65,0x29,0x3d,0xd6,0x3c,0x47,0xb7,0x22,0x37,0x65,0xce,0x81,0xf3,0x70,0xc9,0xeb,0x5c,0x02,0x65,0x71,0x65,0x8a,0x93,0xcc,0x02,0xe5,0x21,0x2c,0x38,0x69,0xad,0xb6,0x89,0x7d .byte 0x46,0x37,0x44,0x67,0x87,0xb0,0x41,0x85,0x7d,0xae,0x82,0x05,0xc0,0x28,0x29,0xf3,0x76,0xa6,0x54,0x4a,0x15,0x84,0x49,0xb6,0xce,0x82,0x45,0x5a,0x2d,0x46,0xae,0xf8,0x8a,0xe6,0x82,0x27,0xe7,0xc0,0xe4,0x6c,0xce,0xd7,0x2e,0x7f,0xd7,0x69,0x97,0x22,0x69,0x1f,0x0f,0xdb,0x6e,0x4e,0x21,0x31,0x9b,0x9b,0xdb,0x33,0xcb,0x7f,0x1f,0x2d .byte 0x08,0x16,0xb8,0x1e,0x87,0x2f,0x39,0x87,0xc2,0xe9,0x6f,0xd8,0x14,0xbc,0xe9,0x09,0x17,0x66,0xab,0x09,0xe6,0x69,0xe9,0x75,0xca,0xa9,0xe5,0xc6,0xbf,0x6d,0xce,0x5d,0xb5,0x86,0xe4,0xf1,0x59,0x73,0xfd,0xf5,0xc7,0xcf,0xf0,0xa7,0xb2,0xcf,0xe7,0x2b,0x4a,0x57,0x99,0x48,0xf8,0x49,0x31,0x9a,0xdc,0xd3,0x05,0x7c,0x00,0xbc,0x47,0x3e .byte 0x22,0x6d,0x45,0xe3,0x13,0x1b,0x75,0x0f,0xac,0xc7,0xc9,0xed,0x4a,0xd8,0xc6,0xf5,0x16,0x30,0x16,0xcc,0x6b,0x1f,0x8b,0xb4,0x7a,0x28,0xa7,0x90,0xd4,0x6b,0xab,0x6a,0x6e,0x02,0x03,0x75,0x08,0x40,0x82,0x64,0x3a,0xbe,0xbb,0x3c,0x46,0xab,0x47,0xc2,0x08,0xbb,0xa4,0xd0,0x95,0x5d,0x1f,0x1f,0x5b,0xa3,0x7d,0x47,0x2f,0x1c,0xee,0x10 .byte 0x1b,0xbd,0xf8,0xd2,0x86,0x78,0x72,0x6c,0x2f,0x7b,0xba,0x5c,0x8a,0x0a,0x0e,0x13,0x9c,0x4e,0x33,0x6b,0xa1,0x47,0xdd,0xe5,0x66,0x4e,0x23,0x82,0x18,0x83,0xb8,0xe7,0xb2,0x9b,0x75,0x29,0xef,0x95,0x5a,0xb2,0xbe,0x06,0x4d,0x44,0x7c,0xdf,0x31,0x04,0x92,0xe6,0x5b,0x52,0x0c,0x98,0xac,0x85,0xee,0x04,0x8d,0x87,0x55,0x59,0x3d,0x7e .byte 0xa2,0x19,0xdd,0xdb,0xbd,0xb2,0x9c,0x6d,0x51,0x67,0x42,0xdd,0xb8,0xb7,0x51,0x7b,0x93,0xb1,0x69,0x22,0x10,0x94,0x46,0x6f,0xc4,0xcc,0x53,0xf0,0x66,0x26,0x56,0xf8,0x95,0x52,0xba,0xf2,0xac,0xe1,0x34,0x47,0x9c,0x7a,0xae,0x56,0x8b,0x77,0x81,0xc6,0x25,0x96,0xda,0xe9,0x87,0x85,0xda,0x1b,0x0f,0x24,0x7f,0x46,0x99,0xe0,0x9e,0x4b .byte 0xb1,0x01,0xe2,0xc0,0x58,0xbd,0xb4,0xb4,0x09,0xa0,0xfe,0x82,0xd8,0xde,0x9e,0x2f,0x0e,0x03,0xbd,0x35,0x1b,0x46,0x9b,0x14,0xff,0x5c,0x5f,0xf0,0xab,0x56,0x8c,0x38,0xae,0x7e,0x36,0x73,0x0d,0x85,0xe4,0x54,0x40,0xcc,0xe7,0x11,0xcf,0x46,0x9f,0x58,0x56,0x45,0xa8,0xce,0x35,0xe7,0x41,0x15,0xce,0xeb,0x36,0xca,0x42,0xfe,0x13,0x25 .byte 0x57,0xff,0xdd,0xe0,0x7a,0xde,0x67,0xa7,0xbc,0x5f,0x32,0xaa,0x87,0xe6,0xb8,0x3a,0xfd,0x86,0xa7,0x64,0x0d,0x69,0x66,0x2b,0xd1,0xae,0x55,0x63,0x4b,0x36,0x19,0x3d,0x69,0xde,0x6b,0x27,0x6a,0xfb,0x4b,0x73,0xac,0xf7,0xa0,0x13,0x2e,0xf0,0x37,0x15,0xd8,0x71,0xf3,0x1e,0xca,0x00,0x60,0x61,0xee,0xc1,0x5e,0x18,0xc3,0x3d,0x5c,0xca .byte 0x60,0xbe,0x40,0xac,0x22,0xd0,0xba,0x2a,0xbb,0xdc,0x57,0x33,0x05,0x1a,0x33,0xf7,0x58,0x97,0x4e,0x88,0xb3,0x70,0x91,0x05,0xa9,0x92,0x1b,0x22,0x3c,0x4a,0xcf,0x20,0x15,0x5e,0xad,0xa7,0x77,0x37,0xc7,0x57,0x20,0xbc,0xaf,0xd8,0x02,0x2a,0x01,0x93,0xbc,0xc7,0x29,0x21,0xdf,0x9a,0xe4,0x39,0x0e,0xa8,0x91,0x03,0x92,0x25,0xc9,0x2c .byte 0x63,0x78,0x49,0xe7,0x37,0xa2,0x36,0xff,0x5a,0x44,0x84,0xf1,0xe5,0x30,0xcd,0x9b,0x72,0xe2,0x70,0xb9,0x4c,0x9a,0xef,0x1f,0xcf,0x7e,0x4c,0xdb,0x79,0xde,0xd5,0x7a,0x87,0x93,0x31,0x26,0x42,0x67,0x34,0xa2,0x1e,0xae,0x39,0x84,0xaf,0xe8,0xf5,0x49,0xe0,0xd2,0x16,0xb8,0x28,0x4a,0x7c,0xb4,0x58,0xef,0x5d,0xf3,0x6c,0xe6,0x89,0xa2 .byte 0x5b,0x19,0x5e,0xc3,0x1d,0x7b,0xcb,0x60,0x3b,0x48,0xc3,0xb2,0x98,0x41,0x22,0xac,0x8a,0x86,0x0f,0x29,0xb7,0xa9,0xe8,0x7d,0x1e,0xce,0x7e,0x7f,0xd2,0x4f,0x59,0x70,0x18,0xb9,0x43,0xb3,0x09,0xa5,0xcf,0x8d,0xa7,0x74,0x62,0xf9,0x92,0xf6,0x99,0xc8,0xed,0x2d,0x32,0xa3,0xe8,0x51,0x8a,0x9e,0x55,0xf3,0x9e,0xef,0xdf,0x90,0xe0,0xbe .byte 0x1b,0x36,0x0e,0x3a,0x28,0x99,0x21,0x1c,0x14,0x2c,0xa1,0x7e,0xf6,0x51,0x7f,0x19,0x96,0xe4,0xcc,0xd4,0xbf,0xdd,0xaa,0x0a,0x06,0xa3,0x05,0x2c,0x8b,0x17,0x85,0xef,0xfb,0x76,0xa3,0xd0,0x90,0xb3,0xb9,0x6c,0x2d,0xf9,0xba,0x51,0xbf,0x13,0xd4,0xf3,0x23,0x5b,0x8e,0x6e,0x8a,0x03,0x02,0x70,0x01,0xf8,0x54,0x41,0x09,0x12,0x57,0x31 .byte 0x0c,0x30,0x11,0xf2,0x10,0x2d,0xc3,0x90,0xac,0xc8,0x01,0x7f,0x2f,0xc0,0x8b,0x56,0xd5,0xb5,0x1d,0xd7,0x85,0xe3,0x26,0x90,0x0a,0x47,0xbe,0xee,0xeb,0xea,0x62,0x6d,0x95,0xe2,0x0e,0x04,0x21,0x65,0xd8,0x1b,0x88,0xc8,0x5e,0xec,0x3a,0xc7,0x2b,0x12,0x4f,0x2d,0xfb,0xc8,0x56,0x1b,0x6f,0xe5,0xf7,0x03,0xa6,0x94,0x29,0x3e,0xd7,0xf1 .byte 0x46,0x91,0x26,0xbf,0x3c,0x8f,0x55,0x71,0x39,0xaf,0x1f,0x4f,0x96,0xdc,0x9f,0xaa,0xef,0xc2,0xcb,0xc4,0x97,0xa8,0xf5,0x82,0xaa,0x36,0x47,0x80,0x80,0x10,0x1b,0x68,0x88,0x29,0x8e,0x8e,0x14,0x4f,0xf2,0x3f,0xb6,0x16,0x2a,0x42,0xe8,0x8f,0x7b,0xd6,0xb9,0x1f,0x3a,0x56,0x7a,0x3f,0xad,0x5d,0x68,0x34,0x6d,0x65,0xde,0x13,0x4d,0xa9 .byte 0xf9,0x4f,0x37,0x49,0xc0,0x63,0xc4,0x28,0x42,0x4c,0x77,0xae,0x78,0x38,0x31,0x87,0xf4,0x9f,0x4a,0x16,0xbb,0x6e,0x06,0x9a,0xa1,0x1c,0xe2,0x97,0xc9,0xf9,0xfb,0x3a,0xe1,0x25,0x4e,0x4e,0xc3,0xfe,0x9a,0xef,0x1f,0x43,0xfb,0x69,0xb1,0x06,0x09,0x4b,0x33,0xf3,0x9c,0x40,0x05,0x83,0x17,0x71,0x81,0xd6,0x87,0xb5,0xd1,0xa7,0x59,0x38 .byte 0x1f,0xbc,0x6c,0x64,0xb6,0x85,0xee,0xce,0x39,0xb4,0xfe,0x3a,0xf2,0x9e,0x02,0x84,0xc4,0xf9,0x2c,0x56,0xeb,0xd1,0x06,0x8d,0xf4,0x25,0x91,0x98,0xf0,0x49,0xb1,0xa5,0xcd,0x06,0x43,0x74,0xfe,0xea,0x50,0xeb,0x8c,0x42,0x47,0x2d,0x33,0x3a,0xc6,0x4d,0xe4,0x9d,0xa5,0xea,0xc2,0x26,0x90,0xa7,0x17,0xb7,0x8a,0x0c,0x3e,0x0d,0x31,0xeb .byte 0xe5,0xfe,0x98,0xc9,0x43,0x15,0x2b,0x36,0x06,0x68,0x52,0x12,0xf6,0xa8,0xcb,0x61,0xa8,0xb3,0xc1,0xcc,0xe3,0xf7,0xb4,0x05,0x1c,0xea,0x67,0x48,0xb8,0xe8,0x6f,0x08,0xc3,0x9d,0x48,0xdc,0x06,0xbc,0xae,0xbe,0x35,0x49,0x58,0xe9,0x33,0xbe,0xe5,0xbb,0x5c,0x25,0x79,0x2e,0xde,0xc6,0x7c,0x2d,0xdf,0x53,0xb4,0xa9,0xc3,0x00,0x86,0xe6 .byte 0xe8,0x1f,0x2b,0x83,0x7c,0xb5,0x90,0xba,0x29,0x63,0x26,0xbf,0x04,0x4a,0xee,0xb9,0xa5,0xd1,0x34,0xc5,0x2f,0x18,0xb8,0xc3,0xdc,0xa1,0x30,0x83,0x8b,0xe7,0x84,0x1b,0x96,0x7b,0x93,0xe9,0xe8,0x15,0x6e,0x3f,0xf7,0x6e,0xe4,0x44,0x0f,0xcf,0x98,0x74,0x63,0x35,0x36,0x29,0xaf,0xc1,0x14,0x98,0xcb,0x7a,0x38,0x37,0xc3,0x0d,0x11,0x43 .byte 0x7e,0xda,0x34,0x22,0x86,0xb8,0x96,0x6d,0x36,0xfb,0xd4,0x36,0x6e,0x10,0x06,0x41,0xa6,0x80,0xd5,0x1b,0x96,0x1b,0x06,0x71,0x08,0x97,0x17,0x1e,0x2d,0x62,0x3f,0x8d,0xd8,0x46,0xbd,0x5d,0x31,0x74,0x04,0x48,0xaa,0x2c,0xd2,0xb3,0x5e,0xbd,0x60,0x60,0xa4,0x81,0x5c,0xda,0x13,0xd5,0xd6,0x96,0x76,0x2f,0x9c,0x7f,0x40,0x23,0x9f,0x5c .byte 0x49,0x58,0x2f,0x34,0xb0,0xbb,0xf0,0xb1,0x67,0x8e,0x95,0xeb,0x92,0xee,0xba,0xcf,0x16,0xe2,0x85,0x22,0x67,0x6f,0xd8,0xb7,0x4c,0x17,0x34,0x68,0x5d,0xea,0x4a,0xa3,0xa5,0xad,0x8f,0xf0,0x86,0xdf,0x79,0xa1,0x84,0xb3,0xf2,0x4f,0xbe,0xae,0x55,0x60,0x4c,0xd5,0x44,0x3f,0xe9,0xe3,0x9d,0xf2,0x3c,0x42,0x1b,0x35,0x95,0x3b,0x5f,0x6c .byte 0x76,0xdb,0x5c,0x8a,0x67,0x10,0x15,0x52,0xde,0x50,0x62,0x87,0x66,0x0f,0x36,0xdb,0x14,0x8f,0xda,0x13,0x35,0x9f,0xce,0x90,0x22,0xcd,0x78,0xe5,0xc5,0xcb,0xb4,0x4a,0x23,0x49,0x30,0xe9,0x3a,0xfd,0x9d,0x63,0x98,0xd7,0x9e,0x2f,0x32,0x8b,0xb9,0x34,0x4e,0xaa,0x20,0xe9,0xbc,0x72,0x85,0x2b,0xee,0x2c,0xc3,0xb6,0x31,0x81,0x3e,0x56 .byte 0x9c,0xda,0x4d,0x9f,0x19,0x36,0xe7,0x47,0x46,0x8f,0x9d,0x83,0xcd,0xa1,0xcc,0xcf,0x69,0xfc,0xbd,0x5d,0x7d,0xd8,0xa8,0x71,0xb5,0xc0,0x6c,0xe5,0xbb,0x5b,0xe3,0xd0,0x6b,0x38,0x53,0x51,0x9b,0x3d,0x0d,0x93,0x95,0x5c,0xc1,0x82,0xbd,0x59,0x8b,0x2a,0xef,0xb8,0x07,0x92,0x3d,0x0f,0x34,0x3c,0xc8,0x39,0x91,0x8e,0x9b,0x72,0x7f,0x51 .byte 0x61,0xdd,0xce,0x98,0x71,0xde,0xdc,0xdd,0x14,0x0c,0x77,0x48,0x8e,0x26,0xc0,0xc7,0xa0,0x22,0xa5,0xb2,0x36,0xe1,0x2f,0x1b,0x43,0x6b,0xd8,0x8e,0xb2,0x18,0x5d,0xc3,0xba,0xcc,0xae,0xf6,0xb8,0x4a,0x79,0xb2,0x95,0x4b,0xfe,0x15,0x4c,0xc6,0x17,0x4f,0x0f,0x65,0xe2,0xc2,0xc7,0xbf,0x53,0x89,0xa3,0x64,0xbb,0x93,0x58,0x47,0x2a,0xcb .byte 0x5c,0xc6,0x9c,0x69,0x83,0x2e,0x82,0x92,0xe2,0xcd,0xff,0xfa,0x3f,0xe3,0x4e,0x45,0xce,0x7f,0x71,0x60,0x98,0x06,0x1a,0x4d,0x21,0x26,0x1e,0x3c,0x1d,0xef,0xd5,0xbb,0x10,0x33,0x45,0xdf,0xed,0xd9,0x89,0x32,0x68,0x91,0x3f,0xee,0xc7,0x6a,0x43,0xef,0x33,0xcf,0x3e,0x1e,0x0f,0xa2,0x3e,0x81,0x06,0xc8,0x85,0x7f,0x42,0x23,0xd9,0x85 .byte 0x8b,0x9a,0xbb,0x11,0x3b,0x26,0xb7,0x21,0x45,0xe8,0x28,0x34,0x32,0x86,0x32,0x18,0x84,0x74,0x27,0x33,0x7e,0xd7,0x07,0x84,0x26,0x50,0x7f,0xc0,0xce,0x1d,0x17,0x1a,0x99,0x5a,0xeb,0x15,0xd2,0x6a,0xaf,0xea,0x89,0xcf,0x11,0xa2,0x9d,0x76,0x70,0x07,0xb2,0x73,0x7a,0x9b,0xad,0xf7,0x3a,0x02,0xf3,0xdb,0x7b,0xdc,0x28,0xec,0xb6,0x6e .byte 0x0e,0xee,0xae,0xe6,0x20,0xa3,0xc9,0xb1,0x21,0xc7,0x7b,0xb4,0xba,0x5d,0x0c,0xc0,0x1c,0xab,0xea,0xf7,0xfb,0x5b,0x78,0xbe,0x91,0x2d,0x48,0x4a,0x56,0x59,0x90,0x0e,0x4e,0xf1,0xda,0xa9,0x46,0x5a,0x76,0x96,0xa6,0x14,0x7f,0xeb,0x75,0xe5,0x86,0x7a,0x63,0xbe,0x74,0xbc,0xcb,0x9e,0xee,0x03,0x6e,0x98,0xb5,0x62,0xf8,0x27,0x8e,0x46 .byte 0x37,0xe6,0x7a,0x12,0x45,0xad,0x0f,0xc1,0x2d,0xef,0xad,0x8f,0xc1,0xf6,0xcc,0x97,0x88,0x14,0x0e,0xea,0xbf,0xe3,0x14,0x26,0x0c,0xaf,0xe2,0x9e,0xca,0x30,0xc6,0x51,0x36,0x35,0x6f,0x8b,0x37,0x8d,0x09,0x8f,0x48,0x18,0xea,0xa6,0x13,0x01,0x38,0x04,0xcc,0xa5,0x71,0x91,0x07,0x43,0xc8,0x76,0x1f,0x88,0x57,0xaa,0xd6,0x44,0x3b,0xf0 .byte 0x17,0xca,0x2d,0x30,0x36,0x41,0xfc,0x24,0x3c,0xbc,0xa3,0x4b,0x10,0x03,0xd2,0xa9,0xef,0xe1,0x98,0x3e,0x88,0xcc,0x7f,0x64,0xb5,0xb7,0x25,0xac,0xf6,0xf6,0xc6,0xd9,0xe4,0x73,0xc3,0xe9,0x21,0x6e,0xee,0x24,0xb3,0xf6,0xa0,0x3f,0xa0,0xdf,0x1c,0xf7,0x66,0x7a,0x87,0x7d,0x8a,0x21,0xd0,0xce,0x2a,0x34,0xef,0xd8,0x83,0x34,0xcb,0x97 .byte 0xc7,0xb8,0xb5,0xa8,0x9d,0x06,0x2d,0x35,0x70,0x6a,0x3f,0x91,0x81,0x37,0x3d,0xae,0x43,0xb2,0xff,0x6b,0x81,0x44,0x69,0xba,0x81,0xf4,0xb5,0xf6,0xf4,0xea,0x17,0xb5,0x7f,0x0a,0x02,0x2c,0x7a,0x3f,0x6c,0x7a,0x07,0xea,0xd5,0x48,0x17,0x75,0x80,0xa0,0x35,0x03,0x59,0xe9,0x45,0x4f,0x18,0xd7,0xd3,0xed,0x48,0x2b,0xa2,0x17,0xd6,0x35 .byte 0xc6,0x2f,0x7a,0x9c,0x08,0x83,0x12,0xe6,0x1e,0xc8,0xc7,0x02,0x8f,0xf8,0x15,0x2a,0x79,0xe5,0x1f,0xd2,0x1f,0x05,0x34,0xe4,0xb4,0x7e,0xb8,0x05,0xb7,0xae,0x44,0x5c,0x35,0x6c,0x2e,0x69,0xde,0x09,0x2d,0x71,0xe3,0x40,0x7e,0x50,0xb7,0x09,0xdf,0xe8,0x87,0x19,0x82,0x17,0x7b,0x46,0x5b,0xa4,0x23,0x62,0x0b,0x79,0x59,0x5f,0x3a,0x19 .byte 0x0a,0xc1,0x90,0x79,0x0d,0xce,0x9b,0xc0,0xaa,0xb5,0x6a,0x71,0xe3,0x88,0x31,0x66,0x0c,0x0d,0x8c,0xaa,0xd6,0xf0,0x61,0x71,0x09,0xb4,0xbe,0x61,0x8b,0x9e,0xf3,0xb3,0x9e,0x8b,0x5a,0x50,0x55,0x13,0x0f,0xbe,0x9b,0xa6,0x76,0x34,0xbc,0xae,0xa1,0x7f,0x72,0x21,0xac,0x6c,0x58,0x74,0x5b,0x19,0x16,0x53,0xa9,0x0f,0x0f,0x0f,0x15,0xc9 .byte 0x2b,0xbb,0x80,0x97,0x5e,0x37,0x8b,0xef,0xf7,0xb5,0x4f,0xf0,0x01,0x77,0xce,0x03,0x86,0x8e,0xe7,0x7b,0x9e,0x52,0x2e,0x3b,0xbb,0x17,0xf5,0x12,0xd5,0xac,0xb2,0x0d,0xe1,0xb4,0xcd,0x04,0xe8,0xfa,0x65,0xea,0x95,0xa5,0xf6,0x82,0x75,0x28,0x90,0xfe,0xef,0x2c,0xd1,0xbb,0x9e,0x71,0x47,0xfc,0xf1,0x63,0x5a,0xd0,0x49,0x4d,0xfe,0xf9 .byte 0x5d,0x22,0xbf,0x80,0x8d,0x07,0x50,0xde,0x57,0x9e,0x0c,0xc5,0x00,0xad,0xfa,0x57,0x8f,0xcd,0x53,0x70,0x37,0x25,0x22,0x56,0x2b,0xea,0x8e,0x62,0x41,0xe8,0xac,0x3b,0x1f,0xef,0x46,0xd4,0x8d,0xf7,0x4d,0x89,0xb1,0x61,0x1b,0xb8,0x74,0x1a,0x40,0x80,0xbc,0x62,0x71,0x76,0x90,0x37,0x9c,0x91,0x3c,0xfb,0x0c,0xc5,0x18,0x63,0x9a,0xcf .byte 0xe1,0x43,0xd0,0x01,0xe3,0xcc,0xc6,0x93,0xc7,0x4f,0x04,0x5f,0x07,0x33,0x1f,0xd8,0x5d,0xb0,0xe7,0xa1,0xa1,0xfc,0xbf,0xff,0x4f,0x3e,0x38,0x38,0x14,0x1c,0x90,0xc0,0x77,0x60,0x85,0x4c,0x11,0x75,0xca,0xe5,0x87,0xbb,0x0a,0x49,0xb1,0xd8,0x12,0x06,0x00,0xa0,0xe9,0xe6,0x8a,0x34,0xd5,0x8f,0x56,0xd1,0x6f,0xfc,0xcb,0x6a,0xbd,0x4a .byte 0x68,0x4a,0xbc,0x90,0xf0,0x1c,0x9f,0x36,0x68,0xab,0x26,0xc9,0x7f,0x48,0xe9,0xf6,0x8a,0x68,0x85,0x95,0x30,0x31,0xdb,0x02,0xc8,0x48,0xbf,0x1a,0x76,0x85,0x23,0xde,0xc6,0xa3,0x83,0x02,0x5f,0x7f,0x1e,0x57,0x7c,0x1b,0x4c,0x77,0x72,0x76,0xb9,0xe3,0x09,0xd6,0x73,0xe1,0x0c,0x03,0x51,0x55,0xe9,0xfc,0xab,0x79,0x9f,0xc5,0x00,0xd9 .byte 0xcf,0x5c,0x61,0x6a,0x30,0x83,0xd8,0x38,0xc8,0x41,0x8e,0xb9,0x6a,0xbc,0x33,0x02,0x03,0x0b,0x03,0x3a,0xf1,0x8e,0xfc,0xb8,0xa8,0xf9,0x4f,0x6b,0x87,0x21,0x23,0x60,0x33,0x53,0xa4,0x38,0x0c,0x95,0x07,0x31,0x14,0x8a,0x71,0x2c,0xd8,0x58,0x67,0xa0,0x78,0x6f,0x9f,0xac,0xf0,0xe3,0xcd,0x9a,0x63,0x5b,0x3b,0xa9,0xae,0x7f,0xf8,0x94 .byte 0x4f,0x81,0x21,0x8a,0xd9,0xe9,0x65,0xe4,0x98,0xb4,0x8b,0xad,0xfc,0x47,0xf3,0xe4,0x38,0xe1,0x90,0x74,0xfa,0xa8,0xab,0xbd,0xac,0x3d,0xb7,0x93,0x8f,0x99,0x10,0x3e,0x9a,0xb1,0xba,0x9b,0xb0,0xe9,0x43,0x34,0x3c,0x20,0x03,0x65,0x50,0x37,0x9b,0xe1,0xcf,0x64,0x94,0xaf,0xd4,0x9c,0x07,0xad,0x68,0xc4,0xaf,0x2c,0xda,0xd7,0xdd,0x49 .byte 0xb6,0xed,0xcd,0xcb,0x1e,0x8a,0x4b,0x6e,0x7f,0x5f,0x54,0x79,0x12,0x30,0xbe,0xfe,0x8a,0xeb,0x84,0xd8,0x48,0xc2,0x5d,0x83,0x09,0x5c,0xfd,0x3f,0x80,0xfd,0x68,0x78,0xc3,0xa4,0x90,0xae,0xb7,0x1d,0x9a,0xd3,0x57,0x8b,0x5e,0x3d,0xc9,0xda,0xff,0x52,0xca,0x3f,0xf7,0x5f,0x84,0x25,0x1f,0xa3,0x64,0x68,0x69,0xb9,0x84,0xb1,0xd7,0x0c .byte 0x4c,0xbc,0xd3,0x66,0xcc,0x28,0xab,0xa7,0x9b,0x1f,0xd0,0xe5,0xac,0x54,0xf3,0x5a,0x1f,0xdb,0xcf,0x9e,0xa3,0x26,0xfd,0x2e,0xd7,0x02,0x89,0xa5,0xb6,0x8c,0x81,0xac,0xa8,0x54,0x4e,0xa7,0x6c,0x1d,0x5d,0x31,0x0e,0xdf,0xf7,0x32,0x77,0x83,0x00,0x81,0xd2,0x3b,0x39,0xd9,0xda,0xbf,0x0d,0xdc,0xab,0x46,0xb1,0xdc,0x1f,0x8a,0x6d,0xe9 .byte 0x20,0xf8,0xf3,0xe9,0xdc,0x94,0x15,0x5e,0xe9,0x62,0x44,0xf0,0xbc,0x76,0x64,0x92,0x31,0xb7,0xf1,0x27,0xbb,0x83,0x16,0xfa,0x6e,0xc4,0xc4,0x03,0x50,0x8a,0x08,0x54,0x1d,0xfb,0x3d,0x66,0x05,0x83,0x93,0x62,0x25,0xc3,0xff,0x2d,0x84,0x12,0x98,0x1a,0x61,0x37,0xc5,0x09,0x00,0xdc,0x08,0xa5,0xd5,0x08,0xde,0x78,0x73,0x54,0x1a,0x54 .byte 0x98,0xc6,0x97,0xec,0x52,0x4c,0x90,0x46,0xa0,0xf5,0xec,0x90,0x8d,0x7e,0xb3,0x8b,0x41,0x5a,0xad,0xd7,0x73,0x8c,0xdc,0x2e,0xc1,0xd6,0xbb,0x95,0x76,0x09,0x32,0x17,0x6e,0x14,0x6a,0x84,0xb2,0xc4,0xa3,0x9c,0x96,0x8d,0x57,0x62,0x43,0xb7,0x75,0x3d,0xd1,0x79,0x0f,0x75,0x13,0xfe,0x63,0x75,0xe6,0x83,0xde,0xc8,0xa2,0x11,0x4d,0x93 .byte 0x92,0xc7,0x4d,0xfc,0xaf,0x35,0x0f,0x98,0x76,0x22,0xe1,0x95,0x27,0x3a,0xb0,0x62,0x67,0xb2,0x62,0x9f,0x34,0x47,0xb8,0x41,0xa8,0xc9,0x82,0xbd,0xed,0x5b,0xf7,0x33,0xd0,0xcc,0x60,0xef,0xe4,0x47,0xfe,0x6d,0xf8,0xa5,0xee,0x5b,0x3d,0x00,0xc8,0x22,0x7d,0xcf,0x81,0xe3,0xac,0xf9,0x26,0x77,0x26,0x11,0x85,0x99,0xa0,0x77,0x19,0x7d .byte 0x67,0x80,0x74,0xc7,0xbb,0xe6,0xbb,0x8d,0x16,0x2b,0x50,0x81,0x08,0x89,0x32,0x21,0x20,0xd4,0x7b,0x80,0xd7,0x20,0x53,0x4a,0x0c,0x18,0xb3,0xec,0x49,0x2f,0x3b,0x9b,0x9f,0x69,0x99,0xb5,0x85,0x74,0x0b,0x54,0x61,0x9a,0xe9,0xa1,0xd6,0x98,0x20,0x52,0x82,0x78,0x30,0x5a,0x66,0x02,0x43,0xbf,0x5c,0x5e,0x36,0x3a,0x3b,0xaf,0x7e,0x92 .byte 0xbc,0x64,0x62,0x2a,0x20,0x65,0xd5,0x1b,0x64,0x6a,0x00,0x88,0xec,0x9b,0xe8,0xd7,0x61,0x80,0x38,0x9e,0x4e,0x55,0x1b,0x5b,0x85,0x7b,0xa0,0x2f,0xc3,0xbe,0x73,0x09,0xfd,0x24,0xbe,0xa6,0x9b,0x81,0x3b,0x3c,0x0c,0xd7,0x23,0xb0,0xe1,0x7b,0x26,0xda,0x54,0x39,0x2e,0x85,0x44,0xe2,0x8b,0x50,0x00,0x31,0x37,0x02,0x68,0x06,0xf1,0x47 .byte 0x62,0xf9,0x09,0x07,0xbf,0x80,0xd6,0x36,0x8b,0xb7,0x8b,0x28,0x0c,0x2b,0x28,0x4d,0xfc,0xa4,0xc9,0x96,0x90,0xf9,0x12,0xab,0xb2,0xa3,0x91,0x78,0xf4,0x3a,0x6c,0xea,0x29,0xb5,0x9d,0xe5,0x2c,0xd5,0x28,0xdf,0xdd,0xb6,0x0a,0xbe,0xff,0x60,0x23,0x88,0x5b,0x0d,0x98,0xbe,0xb5,0x7c,0xb8,0x4d,0x5c,0x2b,0x2d,0xeb,0xc3,0xce,0xca,0x21 .byte 0x11,0x2c,0x34,0xef,0xc7,0xce,0xb7,0x11,0x6d,0x46,0x6d,0xcb,0x58,0x2b,0x73,0xae,0xc0,0x9c,0xf6,0x75,0xe1,0x2c,0xbf,0xab,0x9d,0x9f,0x0e,0xd4,0xba,0xf1,0x1f,0xd7,0x8b,0xd2,0x2e,0x00,0xd0,0x01,0xc9,0xe5,0x3a,0xd6,0x2e,0x98,0x79,0x6d,0x04,0xd8,0x39,0xb5,0xd7,0x47,0x48,0x78,0xa6,0xfa,0xbe,0xe3,0x73,0xd9,0x60,0x50,0xc0,0x32 .byte 0xc2,0xa9,0x08,0xaf,0xce,0xc1,0xda,0x17,0xf6,0xc0,0xa6,0xa8,0x1d,0x58,0xff,0xb1,0x2e,0x3a,0x14,0xa8,0x75,0x8b,0x2e,0xcb,0x0d,0x9d,0x2a,0xe2,0x16,0xc3,0xa6,0x2f,0x48,0xa9,0xe6,0xe7,0xfb,0x85,0xd2,0x75,0xfb,0x7f,0x42,0x4a,0x78,0xa9,0x03,0x43,0xc5,0x9d,0xf3,0xfe,0xd0,0x0a,0xd0,0xb3,0x4c,0xc9,0xad,0x3e,0xd9,0x17,0x3c,0x93 .byte 0xde,0x05,0x5b,0xb3,0xbb,0x7f,0x79,0x40,0x42,0xe6,0x32,0x6e,0x5e,0xee,0x8a,0xa1,0x8c,0xc6,0x3b,0x50,0x1f,0x46,0x91,0x10,0x21,0xbb,0xa9,0x45,0x5e,0x59,0xe8,0x27,0xb4,0x4a,0x55,0x10,0xae,0xe2,0xfc,0xa3,0x0e,0x62,0x3c,0x47,0xc6,0x65,0x5c,0xcf,0x5d,0x02,0x5c,0x53,0x5c,0x03,0xc0,0xce,0x8a,0x57,0x10,0xe8,0xb6,0xab,0xc1,0xa3 .byte 0x0b,0x81,0xb2,0x93,0xef,0x48,0x5e,0x79,0x4e,0x79,0x9b,0xfe,0xd6,0x6c,0xef,0xd0,0xe7,0x9d,0x7d,0x74,0x6c,0xb5,0x44,0x34,0xa6,0x8c,0x38,0x3d,0x90,0xd9,0xf2,0x53,0x15,0x60,0xdd,0xb9,0xde,0x7d,0x66,0x93,0xae,0xef,0xa2,0xd8,0xce,0x48,0x3e,0x32,0x13,0x0e,0xd0,0x36,0x42,0xe0,0xc9,0x40,0x3b,0xc3,0xe6,0x37,0x3d,0x7f,0xf6,0xe0 .byte 0x11,0x51,0xda,0xba,0x10,0x59,0xa2,0xcb,0x96,0x69,0xe2,0x84,0x2d,0x7b,0x1b,0x4b,0x81,0x5f,0xd2,0x8f,0xfc,0x2b,0x7c,0xdd,0xd6,0xcf,0xcf,0x98,0xac,0xe5,0x52,0x07,0xbf,0xe9,0xe7,0x0d,0x2d,0x6b,0xf1,0x69,0x5e,0xc8,0xaf,0xd0,0x70,0xb2,0xca,0xe6,0xc6,0x37,0x29,0x75,0xbf,0xca,0x6f,0x69,0x27,0x8c,0x15,0x3d,0x69,0x83,0xee,0x2b .byte 0x10,0x9d,0x1d,0xd5,0xad,0x36,0x5a,0x15,0x78,0x1f,0x6c,0x92,0xca,0x5a,0x84,0x1c,0x35,0x49,0x2b,0x33,0x79,0x0f,0xc2,0x84,0x54,0x24,0x3c,0xae,0xac,0x0a,0x76,0xe1,0x22,0x48,0xed,0x8f,0x89,0xeb,0x05,0xfe,0x32,0x6b,0x83,0x00,0x8c,0x36,0xee,0xff,0x1b,0xa0,0x71,0x0e,0xd8,0xe9,0x29,0xa3,0xbb,0x5b,0x8e,0xbf,0x10,0x4f,0xc3,0xeb .byte 0x3b,0x85,0x3a,0xb3,0x63,0xbb,0x77,0x1a,0x07,0x7a,0x47,0xfa,0x76,0xf5,0x05,0xc4,0xd7,0xe1,0x8f,0xd0,0x4a,0xf9,0x96,0xda,0xcb,0x84,0x43,0xe8,0x61,0xe4,0x2d,0xa8,0x1f,0x4e,0x81,0xaa,0x50,0x2a,0x66,0x2a,0x8c,0xc8,0x0f,0x1c,0x57,0x79,0xdc,0x02,0xbf,0xfb,0x1c,0x68,0xe9,0x02,0x34,0x9b,0xe6,0x2e,0xba,0x60,0x61,0x7c,0x5f,0xc1 .byte 0xa6,0x7a,0x6c,0x2d,0x02,0xb8,0x6c,0xf2,0x91,0xe3,0xf0,0xed,0xbe,0xe8,0x2d,0x03,0x5a,0x4b,0xcb,0xe5,0x3b,0x3f,0x24,0x30,0x09,0x4d,0x22,0x76,0xf6,0x20,0x9c,0x07,0x1a,0x75,0x2a,0xb3,0xd1,0x9e,0x69,0x6a,0xca,0xc4,0x54,0x5d,0xd8,0x23,0x70,0x5f,0x27,0x94,0x7b,0x0f,0x90,0x12,0xc2,0xbc,0x9c,0x5b,0x02,0x15,0x14,0x4f,0x32,0x0d .byte 0xef,0xf3,0xa5,0x2a,0xab,0xb3,0xf0,0xe9,0xdc,0x2c,0x66,0x65,0x41,0x67,0x04,0x75,0x81,0x3b,0xb0,0x53,0x42,0x88,0x74,0x26,0x7a,0x9c,0x3f,0x39,0x40,0x25,0xb6,0x4f,0x54,0x86,0xa0,0xea,0x8d,0x78,0xb5,0x43,0x5e,0xfc,0x2d,0x4d,0x14,0xcd,0x4b,0x5f,0x2e,0x37,0x0b,0x28,0xbe,0xbf,0x91,0x60,0xa5,0x40,0xdf,0x73,0xbb,0xa7,0x8e,0xc1 .byte 0xcc,0xdb,0x8e,0x3a,0xfc,0x7a,0x21,0xac,0x84,0x79,0x33,0x50,0x41,0xa1,0xad,0xb3,0x2e,0xbc,0x74,0xbd,0x66,0x3e,0x36,0x2d,0xf6,0xfd,0xba,0xc4,0x51,0x95,0xaa,0x49,0x92,0xc4,0x6a,0x56,0x9a,0x70,0x5e,0x93,0x74,0x2f,0x6b,0x15,0x60,0x1b,0x3c,0xa9,0x05,0xc4,0xe2,0x0b,0xb9,0x9e,0x86,0x60,0x29,0xb5,0x70,0xe2,0x63,0x10,0xc5,0xfa .byte 0x73,0xc3,0xb1,0x89,0xcf,0x3d,0xf0,0xf9,0x28,0xa4,0x94,0x9b,0xcd,0xd2,0x9b,0x47,0x4d,0xd4,0x0e,0xb6,0x95,0x68,0x94,0x5b,0x8d,0xcb,0x77,0xa5,0x41,0xf1,0x74,0xb0,0x43,0x9d,0x40,0x1c,0xf3,0x1d,0x66,0x6e,0x00,0x23,0x5f,0x3c,0x00,0xdd,0x9d,0x89,0x8f,0xdf,0x58,0x18,0x9c,0x2d,0xc9,0xaf,0xd5,0x73,0x38,0x23,0x5c,0x2c,0xf6,0x27 .byte 0x69,0x0d,0xc5,0xe6,0x99,0xb1,0x64,0xa5,0x60,0x74,0x1f,0x7b,0xd2,0x9c,0x1e,0x9f,0x49,0x78,0x17,0x32,0x18,0xce,0xac,0x55,0x6d,0x91,0x7a,0x69,0xed,0xa4,0xa7,0x5f,0x1f,0x5e,0xa1,0xae,0x03,0x6f,0x0e,0xe7,0xed,0x44,0xdd,0xe4,0x9b,0x25,0x4b,0xbf,0x63,0x8b,0x87,0x73,0xb5,0x6f,0x1a,0x1b,0xdc,0xb1,0xf1,0x6b,0xc8,0xb6,0x15,0x84 .byte 0xc5,0x6b,0x17,0xdc,0x8a,0x20,0xa1,0xeb,0x5b,0x60,0xb4,0x65,0x3a,0x0d,0xe2,0x42,0x97,0x2d,0x93,0xbc,0x93,0x23,0xb0,0x9a,0xa4,0x06,0xa9,0x0e,0xaf,0xa1,0xbc,0xfa,0xe8,0x8e,0xa7,0xa6,0x85,0xc2,0x8d,0x8e,0x70,0xfe,0xa7,0xac,0x8b,0x94,0x8e,0xea,0x6c,0xa6,0xf2,0x6c,0x0e,0x91,0xb6,0xc2,0x6f,0xa4,0x71,0x61,0x05,0xd9,0xb2,0xfa .byte 0x1a,0x19,0x23,0x4f,0x8f,0x41,0xec,0x9a,0x88,0x2b,0xc7,0x8d,0xf3,0x19,0x21,0xd0,0x40,0x12,0xa9,0x3b,0x44,0x54,0x26,0xc2,0x19,0x35,0x05,0xb0,0x70,0x4a,0xc5,0x91,0x63,0x1e,0x4e,0x74,0x79,0x53,0xd3,0xc8,0x3f,0x39,0x46,0x7a,0x6b,0x74,0x64,0xd3,0xa0,0x97,0x61,0xc2,0x1b,0xe5,0x7f,0x88,0xb1,0xb9,0xf7,0xae,0xbf,0x67,0xc3,0x19 .byte 0xde,0x41,0xc9,0xbf,0xd1,0x5e,0xc7,0xee,0xc9,0x54,0x02,0x8c,0x92,0xe4,0x6a,0x91,0x60,0x59,0x7f,0x88,0xef,0x0a,0xfc,0x1c,0x09,0x1c,0x9f,0xb4,0x22,0xa2,0x95,0x81,0x81,0x47,0x27,0xee,0x8b,0x7a,0x4c,0x66,0xff,0x15,0xea,0x3e,0xbb,0x41,0x1f,0x6a,0xdf,0x07,0x9e,0xb6,0x43,0xe6,0x88,0x78,0xd4,0x02,0xa7,0x0f,0x88,0x0a,0x1d,0xf3 .byte 0xe0,0x30,0x06,0x89,0xfc,0x85,0x37,0xef,0xc2,0x03,0xa6,0x2b,0xe8,0xd9,0x35,0x03,0x59,0x93,0x82,0x2b,0x54,0x2f,0x1f,0xee,0x50,0xab,0xa2,0xbf,0xcb,0x07,0xed,0x6a,0xab,0x37,0xf9,0x7e,0x21,0xf6,0xa5,0xe1,0xec,0x06,0x55,0x0e,0x78,0x60,0x18,0x80,0x07,0x62,0x56,0xee,0x3e,0x75,0x94,0x59,0x04,0xe1,0x8c,0x1d,0x07,0x22,0xa3,0x2f .byte 0x97,0xe6,0xeb,0x62,0x6d,0x3e,0xcc,0x63,0xcf,0xcb,0x53,0xd2,0x5c,0xc6,0xdf,0x9b,0x00,0xb8,0x86,0xaf,0x3d,0xdf,0x6c,0xe9,0xe0,0xf1,0xd6,0xeb,0xf0,0xe3,0xe3,0x37,0x70,0x55,0x14,0x07,0x86,0xf4,0x07,0x00,0x96,0x1b,0x7e,0xd9,0xa8,0x4b,0x15,0xa4,0xf0,0x87,0x20,0x1b,0xdb,0x6c,0xa4,0x37,0x52,0x31,0xb6,0x59,0xaf,0xc4,0x00,0xc2 .byte 0xfa,0x7c,0xc7,0xc4,0x9e,0xdf,0xd8,0x61,0x90,0x52,0xd9,0x0b,0xcf,0xe3,0xe3,0x82,0x9e,0x3d,0xb4,0xf7,0xc8,0x7b,0x17,0x1a,0xf6,0x48,0x62,0x2e,0x84,0x89,0x07,0xe1,0x8a,0xb4,0xdd,0xa5,0x46,0x9f,0x5d,0x91,0x16,0x23,0xc2,0x81,0x99,0x4f,0x3c,0xb9,0x24,0xd6,0xcc,0xfd,0x16,0xde,0x83,0x10,0xaa,0x69,0xed,0xe4,0x36,0xed,0x54,0xd8 .byte 0xe3,0xec,0x4e,0x3d,0x19,0xa5,0x09,0xd2,0xd6,0xd2,0x54,0x51,0x95,0xbe,0xf0,0x23,0xcc,0xeb,0x50,0x77,0x0b,0x94,0xa3,0x71,0xee,0x70,0x83,0x3b,0x87,0x07,0x53,0x89,0x0a,0x3c,0x60,0xb2,0xb8,0x2b,0x7e,0xf8,0x91,0xf9,0xc2,0xd5,0xad,0x2f,0x2d,0x9e,0xa2,0xfb,0xad,0xee,0x16,0x9d,0x0a,0x7e,0xaf,0x94,0x37,0x86,0x94,0xd2,0x09,0xcf .byte 0xf9,0xe3,0xfe,0x26,0xd8,0xde,0xdf,0x73,0xa0,0xcb,0x75,0x6c,0x78,0xef,0x42,0xa0,0xb4,0x25,0x2d,0x1e,0xf2,0x77,0x8e,0xd0,0x91,0xdb,0xde,0xb5,0x3b,0x32,0xfb,0x4a,0x92,0x69,0x68,0xba,0x37,0xba,0xe7,0xc4,0x3c,0xe6,0xc2,0x7f,0xc9,0x33,0xbb,0x3d,0x10,0xae,0xff,0x75,0x99,0xe7,0x2a,0x92,0xc4,0x7e,0x03,0x10,0xb1,0xa7,0x71,0x88 .byte 0x8b,0xc9,0xfe,0x73,0x17,0x44,0x06,0x6c,0x87,0xd3,0x09,0xfd,0xd2,0x9d,0x7e,0x0a,0xba,0xdc,0xab,0xd0,0xa1,0x28,0x2c,0x92,0x57,0xa3,0xfc,0x89,0xba,0xbc,0x10,0x44,0x8e,0xb6,0x86,0x20,0x1a,0xc3,0xcf,0x93,0x1d,0x33,0x08,0xf8,0x06,0x47,0x5c,0x5e,0xda,0x8e,0x2d,0x36,0xff,0xf8,0xf2,0x07,0x8d,0x99,0x6c,0xbd,0xd2,0xa0,0xe7,0x74 .byte 0x0c,0x67,0x4a,0x66,0x06,0x02,0xa5,0x01,0x51,0x0b,0x28,0xaa,0x39,0x2e,0x62,0x8b,0x2c,0xcb,0x2b,0xec,0xec,0xe3,0xbf,0x77,0x28,0x06,0x9a,0x6c,0x2c,0xb2,0xf1,0xd5,0x65,0x37,0x4f,0x46,0x5f,0xef,0x50,0x20,0xd4,0x95,0x12,0xdd,0x38,0x21,0x34,0xe5,0x21,0xd3,0x4c,0x42,0xec,0xc4,0x9c,0x4c,0x79,0xb1,0x03,0x14,0x60,0x09,0xd3,0x52 .byte 0x0e,0x10,0x1c,0x39,0xf1,0xeb,0x2f,0x77,0x9a,0xc2,0x4f,0xe8,0x71,0x0c,0xdd,0x3b,0x61,0x09,0xf3,0x63,0x11,0x56,0xde,0x54,0x13,0x82,0x18,0x38,0x40,0x92,0x81,0x4a,0xe5,0x3b,0x41,0x4c,0x37,0x9d,0xd9,0x87,0x9a,0x8b,0x2a,0x25,0xfb,0x0a,0x33,0xc8,0x33,0x30,0x54,0x6d,0x1a,0xda,0xea,0xa3,0x23,0x0f,0x2c,0x94,0x74,0x12,0xa3,0x96 .byte 0x3d,0x0d,0xad,0xe0,0xe9,0x85,0xef,0xe6,0x3b,0xb3,0x52,0xcb,0x36,0xd4,0x4a,0x50,0xf3,0x08,0xf6,0x10,0x91,0xed,0x13,0x2f,0x0f,0x02,0x61,0x72,0x8a,0x73,0x49,0x3c,0x07,0x8d,0x80,0x4b,0xb7,0xdf,0x43,0x4f,0x31,0x95,0x67,0x25,0x11,0x37,0x6e,0x79,0x6d,0xbd,0x59,0xb6,0x53,0xf1,0x0c,0x86,0x79,0x7b,0xb6,0x9a,0x34,0x92,0xaf,0x01 .byte 0x3e,0x25,0x90,0xc9,0x3f,0x73,0x67,0xb3,0x33,0xd5,0xa6,0xef,0x0d,0x85,0xcb,0xc3,0xec,0x5b,0x9a,0xcc,0x5d,0x8b,0xac,0x60,0x81,0x1f,0xea,0x12,0xac,0x27,0xc2,0xf6,0x49,0xcd,0xc2,0xe2,0xd8,0x67,0x0a,0x0d,0x65,0x5a,0x46,0x19,0x8e,0x68,0x37,0xbb,0x6d,0x2b,0x2f,0x9f,0x7a,0xaf,0x27,0x19,0x26,0xeb,0x47,0x16,0xdf,0x70,0x07,0x84 .byte 0x69,0x4b,0xb8,0xdf,0x77,0x85,0x13,0x44,0xda,0x65,0xac,0xeb,0x23,0x71,0x0b,0x45,0x8a,0xc0,0x8c,0x12,0x42,0xb2,0x24,0x8c,0x13,0x64,0x30,0x47,0x80,0x69,0x73,0xb7,0xb2,0xd7,0xb0,0x11,0x6d,0x37,0x05,0xfd,0xbc,0xf2,0x42,0xc6,0x00,0x3d,0xd8,0x17,0x58,0x38,0x3a,0xf2,0x11,0x72,0x14,0xbf,0x4a,0x90,0xf7,0x83,0x59,0x41,0x7c,0xe6 .byte 0xfb,0xf6,0x87,0x52,0xe2,0xa1,0x76,0xa8,0xb4,0x5f,0x35,0xb8,0x6d,0xee,0x27,0x50,0x55,0x8a,0xbe,0xda,0x6d,0xa1,0xe2,0x3e,0xf6,0xaf,0x6a,0x67,0xc2,0x9e,0x5c,0x13,0xd1,0x2f,0xdc,0xca,0x29,0x96,0xee,0x8e,0xac,0x04,0x6b,0x44,0x99,0x92,0x81,0x2c,0x73,0xa5,0x5d,0xcd,0xaa,0x20,0x51,0x36,0x62,0xc8,0xac,0x24,0x54,0x40,0x8e,0xd4 .byte 0x5e,0xd9,0xb7,0x88,0x64,0xb9,0x9a,0xcc,0xfe,0x78,0xbe,0xd7,0x95,0x33,0xa3,0x5f,0xff,0x3f,0xcd,0x90,0x83,0xd0,0xb6,0xcf,0x90,0x9e,0x7f,0xf1,0x3b,0x25,0xa0,0xa1,0x3f,0xfb,0xcf,0x0d,0x36,0x36,0x90,0x24,0x73,0x1d,0xeb,0x2b,0x67,0xd0,0xf9,0x01,0xe9,0x3f,0xb0,0xa4,0xd3,0xf5,0x56,0xd9,0xb0,0x17,0xe4,0x78,0x90,0x1c,0x16,0xe2 .byte 0xb4,0xd8,0x1a,0xb6,0x48,0xa3,0xc6,0x06,0xee,0x0c,0xea,0x07,0xc1,0x48,0x11,0xe5,0x9e,0x2f,0xb8,0x47,0xcf,0xac,0x32,0x35,0x8b,0xce,0x4f,0xe4,0x1a,0x8b,0xc9,0x7b,0x9b,0x07,0x27,0xf4,0x8e,0x2c,0xb5,0x61,0xef,0x85,0x7a,0x39,0xb3,0x03,0x7a,0xac,0x8f,0x64,0x53,0xd8,0x3b,0x4d,0xf5,0x80,0xab,0x2b,0x81,0xa1,0xb1,0xf0,0x2d,0x46 .byte 0xfc,0x8d,0x80,0x62,0x48,0xe0,0xee,0xee,0x87,0xc6,0xdb,0xda,0xc4,0xb5,0xe7,0x10,0xc3,0x70,0x3a,0xbe,0x8d,0x34,0xa8,0x8b,0x02,0xf6,0x11,0xbc,0x92,0x66,0x58,0x89,0x83,0xff,0x43,0xd1,0x89,0x02,0x69,0xea,0xc7,0xc8,0x4f,0x97,0xca,0x22,0x29,0x1d,0x2c,0x74,0x5e,0x21,0xdc,0x40,0x02,0xe9,0x7f,0x66,0x4e,0x9e,0x7d,0x59,0xae,0xa7 .byte 0xd4,0x1f,0xde,0xf3,0x70,0xcf,0x81,0xea,0x3c,0xab,0x4e,0xb1,0x12,0x80,0x22,0xc0,0x36,0x7c,0xb9,0x15,0x9a,0x01,0x72,0x67,0xd5,0xbd,0xef,0x68,0x37,0x18,0x94,0xb9,0xec,0x09,0xf9,0x47,0x8e,0x38,0x2e,0xe0,0xb1,0xe8,0x63,0xae,0x44,0x84,0xf2,0xc8,0x15,0x5d,0xff,0x58,0xf4,0x9b,0x48,0x4a,0x30,0x1b,0xb9,0xea,0x1a,0xce,0xc7,0xaa .byte 0xd2,0x3d,0x0e,0x3a,0x08,0xa7,0x5b,0x57,0x15,0x4f,0xfd,0x96,0xd0,0xa3,0xd3,0x98,0x9e,0xd3,0xc3,0xc3,0x00,0xc2,0xf3,0xdc,0xf8,0x25,0x59,0x42,0x09,0x19,0xa3,0x6c,0xb6,0xcf,0x22,0x4c,0xb7,0x0d,0xd3,0x8f,0xf0,0x49,0xae,0xb8,0xcd,0xdc,0x0c,0x99,0x26,0x58,0x9f,0x6b,0x59,0xbb,0xa2,0xc3,0x6b,0xd6,0xb6,0xf0,0xe1,0xfa,0x94,0x67 .byte 0xe9,0x21,0x92,0x95,0xe1,0xa3,0x76,0x07,0x98,0x43,0x29,0x98,0x3e,0xc5,0x58,0x88,0x7a,0xbb,0xb0,0x58,0x18,0x53,0x35,0xde,0x47,0xf9,0x05,0xa2,0x46,0x67,0x1c,0x09,0x9c,0x16,0x10,0x2e,0xb1,0xd3,0xda,0xea,0x20,0x34,0xf7,0xeb,0x35,0xfb,0x9b,0x74,0x38,0xbf,0xc1,0x97,0xd3,0x7e,0xe8,0xc1,0xf6,0x83,0x76,0xc0,0x94,0xa0,0xa1,0x7d .byte 0x48,0x13,0x9a,0x08,0xe8,0x8e,0xa4,0x2b,0x95,0x61,0x12,0xaf,0xbd,0xc9,0x81,0x26,0xef,0x87,0x06,0x7b,0xc3,0x52,0xc2,0xd5,0xde,0xf3,0x55,0x34,0x71,0xc6,0xe3,0xe9,0xf7,0x5e,0x0b,0x6e,0xd4,0xee,0xeb,0xb3,0xa0,0xf9,0x99,0x33,0x14,0x5d,0x28,0x1a,0x57,0xcf,0xf5,0xa9,0x92,0x08,0xa6,0x10,0x6d,0x5a,0xd5,0x6b,0xe0,0x15,0x17,0x06 .byte 0x72,0x32,0xcd,0xc7,0x79,0x1b,0x4c,0x12,0x78,0xea,0x88,0xb3,0x1a,0x4c,0x9a,0x3c,0xbe,0x41,0xe9,0x69,0xb5,0xe3,0x4c,0xd7,0xce,0x86,0x3b,0xca,0x3f,0xf6,0xaa,0xa2,0xc4,0x34,0x41,0x89,0x2c,0x9d,0xdd,0x0e,0x01,0x0c,0x35,0xa0,0xe8,0x7f,0x26,0xcd,0x0c,0x27,0x16,0x70,0xaf,0x8d,0x30,0xcf,0xe5,0x22,0x21,0x95,0xf6,0x98,0x84,0x2e .byte 0x03,0xf2,0xdc,0x7a,0x00,0x1a,0xed,0x6c,0x5f,0x8d,0xb6,0xed,0xa9,0x84,0xb0,0x12,0x35,0xbf,0x55,0xe2,0xe5,0xae,0x52,0x03,0x9a,0xf9,0x69,0x30,0xd5,0x58,0x1b,0x88,0xf2,0x63,0xff,0xfd,0x47,0x47,0x86,0xae,0x7b,0x18,0xd1,0x67,0xcf,0x49,0xb6,0xfd,0x8b,0x76,0xbe,0x2d,0x91,0x6c,0x52,0xd4,0x85,0xec,0xd9,0x1b,0x73,0x0b,0x3f,0xfa .byte 0x83,0x70,0x0a,0x5f,0xd6,0x91,0x52,0x33,0xe0,0x92,0x0b,0x99,0x52,0xa8,0x59,0xe1,0x71,0xfa,0x45,0x29,0x25,0x56,0xd1,0xc2,0xf9,0x66,0x5c,0x48,0x41,0x2a,0xe8,0x1e,0x34,0x04,0xbd,0xd8,0xe6,0x7f,0x87,0x88,0x37,0x14,0x91,0xea,0x48,0x30,0x0b,0x93,0x68,0x37,0x8c,0x75,0x8c,0x3d,0x3d,0x36,0xa2,0x83,0xf4,0x4c,0x27,0x59,0xef,0x9e .byte 0x8d,0x98,0xcc,0x97,0x0c,0x49,0x7b,0x32,0xa7,0x32,0x50,0x7d,0x47,0x6e,0x53,0xca,0xa2,0xec,0xa7,0x62,0x6b,0x08,0x50,0x72,0x5c,0x92,0x71,0x35,0xde,0x0b,0xde,0x15,0xc6,0x46,0xa1,0x3a,0x82,0x09,0xe7,0xcd,0x7b,0x11,0x1e,0x34,0x6d,0x7f,0x3e,0x8c,0xc9,0x27,0x88,0xc9,0x35,0xe7,0x1d,0x0a,0xb1,0x5e,0x85,0xfa,0x6e,0x47,0xa3,0x4f .byte 0x22,0x84,0x16,0x36,0x84,0x1b,0x28,0xe8,0x28,0xdb,0x0b,0x41,0xca,0xf1,0x93,0xd9,0x3f,0x3c,0xe9,0xbc,0x46,0x0b,0x8c,0x34,0x04,0x3a,0xd4,0xfc,0x87,0x1b,0xd6,0x9a,0xe4,0x01,0x9e,0xf0,0xa9,0x83,0xca,0x72,0xfe,0x25,0xb3,0xc8,0x9a,0x07,0x84,0x61,0xea,0x6a,0x11,0x3f,0xaa,0x85,0x19,0x89,0xa7,0x1b,0x47,0x85,0x1e,0x72,0x29,0xc3 .byte 0x43,0x2a,0xc7,0xcc,0x6d,0xec,0x16,0x12,0xfa,0xa3,0xa0,0xce,0x3f,0x64,0xb2,0x40,0x90,0x57,0x0f,0x0b,0xd7,0x21,0xe8,0x9d,0x12,0xf8,0x77,0xd8,0x88,0xf9,0xb7,0xdc,0x82,0xb4,0x07,0x52,0x01,0xdf,0xb5,0x58,0x5f,0x39,0x53,0x66,0x52,0xaf,0xb0,0xa5,0x3a,0xa3,0x8b,0xc2,0xca,0xd7,0x46,0x31,0x95,0xcc,0xa6,0xfb,0xb0,0x2b,0x1e,0x1e .byte 0x3a,0x99,0xc0,0x67,0x98,0x0d,0xb0,0x61,0x58,0x10,0x1f,0x47,0x7d,0x4d,0x11,0x69,0xf5,0xe5,0x6a,0xbf,0xbc,0x83,0x4c,0xef,0xef,0x8f,0x15,0x08,0x32,0xae,0x47,0x0c,0x9f,0xfd,0x10,0xa5,0xc6,0xe1,0x11,0x26,0x20,0xfe,0xb4,0xd6,0x7a,0xd3,0x16,0x5c,0xaf,0x0f,0xd6,0x12,0x44,0x1e,0x99,0x46,0x6d,0x22,0x35,0x52,0x90,0xb7,0xe7,0xc9 .byte 0xb4,0xdd,0x18,0x86,0x4f,0x94,0xa2,0x7c,0x10,0xb1,0x00,0xb9,0xea,0x30,0x6a,0xfe,0x84,0xb8,0x18,0x28,0xd0,0xa3,0x1b,0xfa,0x65,0xbe,0x67,0x0f,0x0d,0x28,0x32,0x05,0x3c,0xf1,0x15,0x9c,0x54,0x92,0x41,0x4f,0x7d,0x32,0x01,0x49,0x8d,0x83,0x01,0x51,0x70,0x24,0x7e,0x53,0xf8,0x69,0x96,0x56,0xd4,0xe5,0xe7,0x37,0xd5,0x5b,0x9a,0x2d .byte 0x41,0x33,0x52,0x84,0x1c,0x13,0xae,0x67,0x96,0x9f,0x96,0x5f,0x6a,0xc4,0x55,0x4d,0x68,0x7c,0x27,0x0b,0xc9,0x15,0x01,0x47,0x40,0x42,0x45,0xaf,0x33,0x20,0x62,0x53,0xed,0xe0,0x0e,0x84,0xaa,0x26,0x76,0x30,0x0d,0x4d,0x64,0x5b,0x68,0x4c,0x04,0xe1,0xe3,0x57,0x66,0x88,0xd7,0xe5,0x3b,0x5c,0x7d,0x70,0x56,0xe1,0x18,0x48,0x18,0x80 .byte 0xab,0x4d,0xd8,0x16,0xdb,0x31,0x58,0x6a,0xea,0xd7,0xca,0x80,0x42,0xa0,0x02,0x4c,0x99,0xdc,0xff,0xa4,0x4e,0x99,0x8e,0xba,0xae,0x9b,0xc4,0xe5,0x80,0xce,0x51,0x26,0x5c,0x83,0xa4,0xdb,0x4c,0x98,0x20,0xc6,0x09,0xd1,0x11,0xab,0x29,0x48,0xc9,0x58,0xb4,0xa8,0xd0,0x8c,0xe5,0x5f,0xa8,0x80,0x19,0xc3,0x8c,0xb1,0xb6,0xae,0xfc,0x80 .byte 0x99,0x35,0x49,0xfb,0x8c,0xae,0xb0,0x28,0x74,0x6a,0xf5,0xc4,0x2a,0x23,0x6e,0x09,0x1e,0xe6,0xdb,0x97,0x65,0x89,0x4f,0x45,0xbd,0x45,0x35,0x08,0x34,0x3f,0x13,0x59,0xf8,0x78,0x26,0xc0,0x26,0x00,0x24,0xa1,0xda,0x66,0xd8,0x87,0x03,0x3a,0x31,0xd1,0x66,0xc1,0xdc,0x7b,0x2a,0x67,0x57,0x5b,0xfb,0xfb,0x07,0xe9,0xdc,0x3a,0x2e,0x03 .byte 0x3f,0x63,0x1c,0x1d,0x28,0x85,0x8e,0xbf,0xec,0xc6,0xcd,0x6c,0xf6,0x86,0x12,0x0f,0x92,0x03,0x70,0x14,0x5c,0x48,0x1c,0x13,0xe8,0xbd,0x32,0xfd,0xa5,0xfd,0x93,0xa8,0x64,0x50,0x5d,0x35,0xcd,0x08,0x31,0x90,0xd2,0x33,0xb4,0x42,0x92,0xb5,0x45,0x42,0x32,0x1b,0x25,0x29,0x18,0x04,0xf2,0xea,0x41,0x8b,0xcd,0x8c,0xb2,0xc6,0x30,0x06 .byte 0xd6,0x57,0x69,0x5f,0x34,0xf4,0xcd,0xc9,0xf5,0x36,0x7d,0x91,0x11,0x71,0x8c,0xa1,0xda,0x5f,0xca,0xd9,0x23,0xf0,0x77,0x7d,0xcc,0x01,0x70,0x3b,0x9e,0x3d,0x65,0xb0,0x44,0x41,0x5d,0x4e,0x91,0x4b,0xfd,0x8b,0x47,0xc7,0x36,0x41,0xf1,0x58,0xb0,0xd9,0xb6,0x62,0x3e,0xd6,0x24,0xa6,0x87,0xfe,0x63,0x0b,0x29,0x3c,0x80,0xd4,0x93,0x81 .byte 0x4a,0x41,0x85,0x9d,0xe6,0x36,0xd0,0xdc,0x0b,0xb5,0x5d,0x8b,0x22,0x7e,0xaf,0x11,0xb9,0xd1,0x49,0xdf,0xdb,0xde,0xa8,0xc7,0x9c,0x01,0x6b,0xd7,0x86,0xf0,0x79,0x3b,0x3a,0x89,0xd0,0x02,0x34,0x55,0x1d,0x27,0x17,0xca,0x44,0x47,0xc2,0x06,0x69,0x77,0xc4,0x63,0x80,0x05,0x99,0x2e,0x7b,0x57,0x3c,0x86,0x5f,0x38,0xe1,0xb2,0x4c,0x33 .byte 0x30,0x4b,0x90,0x68,0xc0,0xe1,0x20,0x12,0x25,0xda,0xfc,0xc3,0x49,0x16,0x96,0x80,0xd2,0xae,0xcd,0x5e,0x1a,0x02,0x07,0x97,0xaf,0x97,0xf9,0xd0,0x0c,0x23,0x27,0x08,0x14,0x19,0xdc,0xe9,0x11,0x6c,0x58,0x3c,0xfb,0xbc,0xd4,0x18,0x0d,0x44,0xa8,0x2b,0xe9,0x66,0x3e,0x06,0xe4,0xb6,0xdd,0x00,0xd6,0xd1,0x7b,0xce,0xcd,0xe1,0xf0,0x35 .byte 0x1c,0x96,0xff,0xf1,0x62,0x95,0x35,0x35,0xcf,0x37,0x8c,0xdc,0x09,0xac,0xaa,0x95,0x0f,0x7e,0x9f,0xc0,0xbe,0x06,0xe8,0xf6,0x2c,0x1c,0x19,0xb5,0xdf,0x0a,0xd9,0xfc,0x83,0x99,0xad,0xdb,0x5e,0x8f,0x7f,0x1d,0x3e,0x25,0x7a,0x3e,0x25,0xf8,0xb3,0x43,0xfe,0x13,0x8c,0x58,0xb7,0x5a,0xc8,0xf6,0x7a,0x4a,0x63,0x57,0x2c,0x53,0x06,0x2d .byte 0xae,0x16,0xb5,0xac,0x1d,0x21,0x34,0xbb,0x26,0x8a,0x09,0x93,0x2c,0x1c,0x38,0x86,0xda,0x49,0x24,0x83,0xdd,0xa8,0x32,0xdf,0xcb,0x74,0x00,0x10,0xe0,0x87,0x48,0xdb,0xfb,0xce,0xd9,0xe8,0xd3,0x73,0xcb,0x6c,0x7f,0xbf,0xba,0xe4,0x7f,0x78,0xb1,0x65,0xf7,0xdc,0x0e,0x71,0x1d,0xdb,0x1f,0x3e,0x4e,0x2d,0x56,0x12,0x7e,0x53,0xe9,0x77 .byte 0x24,0xa7,0xf4,0x02,0x47,0xf1,0xa1,0x0f,0xc7,0xe2,0x5c,0x4b,0xf1,0x8b,0xda,0x05,0xe6,0x66,0x08,0x1c,0x84,0xa5,0x75,0x3a,0x6f,0xc7,0xd3,0x50,0x5d,0xce,0x09,0x9e,0x8e,0xa8,0x1a,0xc7,0x1d,0x28,0x13,0x80,0x3b,0x36,0x0c,0x3b,0x9c,0xea,0x53,0xe6,0xe4,0x35,0x5e,0x15,0x1a,0xa5,0x28,0x70,0x9c,0xde,0xbc,0xd6,0x04,0x94,0xcb,0xd8 .byte 0x29,0xe5,0xc6,0x94,0x61,0xe0,0x73,0x61,0x66,0xa9,0x85,0x23,0xb5,0x3e,0x7f,0x4b,0x54,0x20,0x49,0x05,0x88,0x09,0xe4,0xee,0x25,0xeb,0x86,0x5a,0x17,0xed,0xed,0xe7,0x25,0xfe,0x4f,0x89,0x05,0x2f,0xfb,0x1c,0x19,0x5c,0x66,0x47,0xf9,0x53,0x30,0xa8,0x64,0x97,0x4a,0x39,0x9a,0x4a,0x88,0x30,0xce,0xdf,0x67,0xae,0xa9,0x2c,0x0e,0xf3 .byte 0x12,0xe0,0x6a,0xaa,0xa1,0x2e,0x85,0x0f,0x96,0xe6,0x6a,0x33,0xb6,0xf0,0x16,0xb6,0x1e,0x44,0xac,0xdf,0x16,0xd5,0x8e,0xaf,0x65,0x9c,0xe9,0x65,0xea,0xe8,0x35,0x91,0xca,0x2e,0x8d,0xc7,0x6b,0x2f,0xae,0xbc,0xc5,0x49,0xfd,0x2a,0x2d,0xec,0xd8,0x67,0x56,0x68,0xa2,0xdd,0x5d,0x51,0x75,0x30,0x2e,0x56,0x50,0x4d,0xa4,0x6f,0xe1,0xb4 .byte 0xa5,0x9b,0x35,0x3b,0xc8,0x1a,0xd5,0x78,0x22,0x49,0x44,0x27,0xe7,0x67,0x60,0x91,0xb0,0x08,0x1c,0x83,0x3c,0x64,0x27,0x15,0xcf,0xbd,0x69,0xfe,0x56,0xff,0xab,0x56,0x1d,0x79,0xe6,0xc3,0xbd,0xce,0x75,0xf0,0x4f,0xa7,0x7a,0x9a,0x2e,0x7a,0xd7,0xf7,0xac,0xfb,0x87,0x8e,0x87,0xc6,0x10,0x3c,0x4c,0xb2,0xe3,0xf7,0xae,0x7d,0xaa,0x0c .byte 0x46,0x17,0xce,0x61,0xce,0x73,0xc5,0x0d,0xdb,0x8e,0x8c,0x21,0x7b,0x7c,0x09,0x34,0x5d,0x3f,0x44,0xf0,0x16,0x7c,0xe2,0xdd,0xf2,0x07,0xd6,0x53,0x3c,0x0a,0xe9,0xfd,0x7a,0x41,0x13,0xcf,0x7c,0xa2,0x11,0xca,0xb5,0xdb,0x10,0x21,0x68,0x02,0x85,0xb6,0xe3,0xd4,0xb9,0xf7,0x9c,0xdf,0x54,0xaf,0x48,0x67,0x3e,0xd2,0x04,0xde,0xce,0x53 .byte 0x1a,0x9b,0x6b,0xd4,0x5e,0xb2,0xd0,0xa5,0xc8,0x7b,0x2e,0xb3,0xd8,0x46,0xc2,0x57,0x69,0x69,0xe6,0x54,0xee,0xf9,0x48,0x04,0x4e,0x11,0x2e,0x80,0x53,0x87,0x61,0xc7,0x1b,0x75,0xab,0xac,0x5f,0x17,0xda,0x25,0x5f,0x66,0xa0,0x59,0xfb,0xc2,0xf0,0xbf,0xc2,0x53,0xdc,0x8e,0x2d,0x41,0x13,0x7c,0x29,0xf0,0x80,0x70,0xb5,0x07,0x14,0x6c .byte 0x5f,0x3a,0x66,0x1a,0xf8,0x7f,0xb4,0x8e,0x55,0xe8,0x2d,0x5b,0xec,0x65,0xe6,0x7b,0xf2,0xde,0xa2,0x51,0x45,0x9a,0x8a,0xfa,0xba,0x0c,0xcb,0x28,0x27,0x2c,0x01,0x81,0x38,0x5b,0x2e,0xbb,0x31,0x37,0x77,0xe7,0x52,0x2c,0xf9,0xb8,0x42,0x76,0x49,0x81,0xd4,0x64,0xd0,0x86,0xd4,0x3d,0x2c,0x74,0xca,0x4d,0xbb,0xa6,0x99,0x9d,0x79,0xd6 .byte 0x52,0x5e,0xfd,0xd4,0xc2,0x50,0x48,0x2e,0x4d,0x9c,0x4e,0xe6,0xbe,0x57,0xdb,0x28,0xf2,0xc0,0x25,0x9f,0x26,0x0e,0xc7,0x61,0xa0,0x77,0x7c,0x3d,0xf4,0xec,0x70,0x6c,0x06,0x37,0x3f,0xa2,0x3c,0x70,0xca,0x53,0xcb,0x56,0x51,0x0f,0x30,0x20,0x16,0x21,0xac,0x3a,0xe5,0x78,0x4c,0xe2,0x8e,0x9f,0x6e,0x36,0xb2,0x3d,0xb2,0x15,0x10,0x06 .byte 0x8e,0xff,0xa4,0x62,0x8e,0xa7,0x61,0x56,0xe7,0x27,0xa6,0x72,0x24,0x0b,0x47,0xca,0xa6,0x6b,0x74,0x5f,0x5e,0x80,0x64,0x47,0x1f,0x95,0x20,0x99,0x13,0x66,0x99,0x92,0xe7,0x82,0xdb,0xa1,0x97,0xdc,0x2d,0x35,0xa2,0xc9,0x91,0xf4,0x12,0x91,0xdd,0xb3,0xb4,0x7a,0x34,0xa0,0xd6,0x02,0xb1,0x38,0x42,0xad,0x53,0xd4,0xd1,0x82,0xd0,0x3f .byte 0xb4,0x32,0x7a,0x70,0xe2,0x6e,0xae,0x9c,0x99,0xe3,0x62,0x6e,0x7d,0x01,0xcd,0x3b,0x4e,0xb0,0x57,0x9d,0x47,0x6f,0x2a,0x62,0x12,0x44,0x28,0xfd,0x78,0x00,0x08,0x9a,0x2b,0x5b,0x3f,0x62,0x24,0x94,0x75,0x5c,0x1e,0x8b,0xc4,0x3c,0xbc,0x7d,0xe8,0x10,0xbf,0x9d,0x23,0x52,0xc8,0x65,0xe8,0x39,0x8a,0x97,0x70,0xbb,0xa4,0x09,0xf8,0x29 .byte 0xd2,0x36,0x7a,0x46,0x4a,0x19,0x68,0xe8,0x57,0xc8,0x3c,0x88,0xa2,0x8c,0x01,0xa5,0x21,0x32,0xff,0x6c,0xa7,0x6f,0x07,0x94,0xc3,0x07,0xfc,0x09,0x1a,0x0c,0xe4,0x01,0x41,0x51,0x80,0xf2,0x47,0x41,0xe7,0x8d,0x97,0x34,0xe4,0xdf,0x21,0x17,0x27,0x41,0x8c,0x31,0x03,0x5e,0xee,0x36,0xaf,0x37,0x4f,0x89,0x92,0x6b,0x03,0xb1,0x19,0xc1 .byte 0x26,0xb1,0x32,0x68,0x6f,0x9e,0x1c,0xc4,0x7f,0xce,0x1f,0xa9,0xd7,0xd8,0x19,0xd4,0x76,0xd5,0xe5,0xe6,0xeb,0x99,0x45,0xe6,0x72,0x2e,0xdb,0x13,0x2b,0x4d,0xdd,0x39,0x2a,0xd4,0x0f,0x26,0x49,0x81,0xaa,0x9d,0x6a,0xad,0x0e,0x58,0x81,0xc8,0x74,0x60,0xb3,0x29,0x92,0xc4,0x2e,0x3c,0x2b,0xdd,0x7f,0x13,0x91,0x84,0xa4,0xc5,0x8e,0x75 .byte 0xcd,0x83,0x4b,0x9f,0xfa,0x6e,0x29,0x1d,0xa5,0xfd,0x97,0x6e,0x36,0xcb,0x50,0x3f,0x68,0xac,0xec,0xee,0x00,0xb8,0x38,0xb9,0xcb,0x8b,0xf6,0x1c,0x45,0x28,0x8d,0x6f,0x5a,0x97,0x64,0x9c,0x52,0x40,0xff,0xbb,0xf6,0x46,0x1f,0xcc,0xad,0x93,0xcb,0x3a,0xce,0xc9,0xae,0x03,0x04,0xe0,0x9b,0x54,0xde,0xe0,0xdc,0xbf,0x9f,0x4e,0xb6,0xc4 .byte 0x0f,0x1b,0x95,0x92,0xbc,0x8e,0x70,0x2b,0xbf,0x8d,0xf1,0xdd,0x4c,0xad,0xb6,0x5d,0xbd,0x36,0x5a,0x3c,0x0e,0x0b,0x83,0x1a,0x5d,0x0a,0xaf,0x0b,0x69,0x46,0xb4,0x42,0x3c,0x5c,0xe2,0x7d,0x75,0x3c,0x6b,0x03,0x32,0x1b,0xd0,0xe9,0xe7,0xe3,0x87,0xe8,0xd2,0x39,0x3b,0xe0,0x5f,0x8e,0xf7,0xeb,0x89,0x2e,0x0f,0x3f,0x1e,0xf3,0x34,0x0d .byte 0x86,0x6b,0x28,0xbb,0x7c,0x7a,0x61,0xb2,0xab,0xfe,0xbc,0xba,0xaf,0xf5,0xab,0x2d,0xe9,0x9b,0x88,0x8b,0xd0,0x2d,0x3e,0xf6,0x12,0x25,0x24,0x63,0x60,0xfb,0x32,0x23,0x5a,0xbf,0x1a,0x3e,0x07,0xb9,0x46,0xe6,0x09,0x30,0xa8,0x59,0x87,0x14,0xcc,0x94,0x0b,0xa4,0xac,0x31,0x51,0x04,0xde,0xda,0xe4,0x50,0x5a,0xa2,0x9e,0xae,0x3f,0xed .byte 0xaf,0x9d,0xc7,0x6f,0xf3,0x05,0x2b,0xb8,0xd9,0xcc,0xe9,0xc1,0x7e,0x9c,0xbb,0x86,0xe3,0x3b,0xa0,0xc3,0x0b,0x38,0x28,0xf1,0x83,0x50,0xc8,0xf2,0x1f,0x05,0xcc,0x1b,0xd1,0x59,0xff,0x73,0xb0,0x13,0x75,0x59,0x22,0x4d,0xac,0x65,0x75,0x47,0x3b,0x37,0x91,0xf1,0x40,0x6b,0x7b,0xe8,0x72,0xe5,0x11,0x12,0x23,0x5a,0x2c,0x9c,0xa2,0xe5 .byte 0x14,0x5b,0x17,0xb5,0x41,0x95,0xdd,0x0d,0x0b,0x70,0xba,0xbc,0xb7,0x55,0x37,0x77,0x1e,0x32,0xf4,0xba,0x57,0x81,0x0b,0x64,0xf6,0x1f,0x57,0x99,0xeb,0xb2,0x06,0x9c,0x6c,0x4f,0x1c,0xbf,0xca,0x79,0xeb,0xff,0x6e,0x32,0xaf,0x0e,0x2b,0xf3,0xbb,0x75,0xf8,0x80,0x9f,0x95,0xb3,0x35,0x63,0xe0,0x92,0x8f,0x50,0xa3,0x41,0x38,0xb7,0x7b .byte 0xa1,0x3b,0xde,0x69,0x85,0x36,0xb7,0x44,0xb3,0xb2,0xc5,0x85,0xd3,0x9a,0x78,0x26,0x97,0xc1,0x58,0xfd,0x0f,0x27,0x74,0x93,0x0e,0x54,0x23,0x6f,0x5c,0x48,0x38,0xb9,0xb5,0x7d,0x17,0x23,0x5a,0x36,0x32,0xdd,0x40,0x7e,0x1c,0xb4,0x65,0x84,0x83,0xcc,0x6e,0xa0,0x3a,0xa6,0xbe,0xf8,0xca,0x55,0xf4,0x0a,0x65,0x83,0x52,0x14,0x9d,0x10 .byte 0x4a,0x31,0xe7,0x05,0x99,0x01,0xb3,0x01,0x47,0x64,0xa2,0xee,0x8f,0xf1,0x77,0x91,0x94,0xa3,0xad,0xfc,0xfa,0x7e,0x92,0x90,0x41,0xb6,0x2a,0xb7,0xa1,0xfa,0xf3,0x74,0x8f,0x27,0xe1,0x48,0xe1,0x96,0xff,0x85,0xd4,0x40,0x76,0x15,0x2a,0x6c,0xce,0xdb,0x72,0x0b,0xf6,0x33,0x5f,0xa0,0x72,0xf1,0xf1,0x92,0xaa,0xfc,0x75,0xef,0x11,0x2b .byte 0x71,0x2f,0x6b,0xe4,0x70,0x13,0xa3,0xbe,0xfc,0xa4,0x35,0xc5,0xa7,0x2a,0x94,0x34,0x7a,0x15,0x7e,0x0d,0x8b,0x92,0xe6,0xfb,0x12,0x77,0xf9,0xe3,0x0e,0xce,0x1e,0x84,0xcd,0x3a,0xce,0x44,0x65,0xe8,0x6c,0x0b,0x86,0x70,0xe9,0x66,0x18,0x37,0x3d,0xc0,0xc0,0xcb,0xe0,0x7b,0x16,0xda,0x89,0xc9,0x8e,0x83,0xc4,0x21,0x40,0x65,0xd2,0xe8 .byte 0x3f,0xa5,0xda,0xe9,0x4b,0x2e,0x1d,0x89,0x4d,0x3b,0x84,0x4b,0xfd,0x0e,0x2c,0x50,0xe2,0x01,0x7d,0xec,0x12,0x81,0x49,0x9b,0xe3,0x14,0xd8,0xb4,0xe3,0x44,0x06,0x7f,0xbf,0x92,0xd4,0xb8,0x65,0x1f,0xdb,0x7a,0xb4,0xd6,0x9e,0x0c,0xe0,0xc2,0xc9,0xe8,0xc9,0xf8,0x34,0xff,0x7b,0x1a,0x0d,0xc9,0xc7,0x77,0xf2,0x44,0x79,0xdb,0xef,0x31 .byte 0x61,0xd4,0x85,0x0d,0x0f,0x11,0x29,0xfb,0x07,0xe0,0x83,0x11,0x81,0xbb,0xe0,0x6e,0x1c,0x0a,0x31,0xe3,0x29,0x53,0x91,0xab,0xea,0xc8,0x2f,0xaf,0x96,0xe7,0x64,0x8b,0xfd,0x4f,0x49,0xf5,0x1f,0x93,0x3b,0x32,0xdf,0x0c,0x1d,0x8e,0x33,0x15,0x00,0x7c,0x0c,0x4b,0x95,0xd5,0x09,0x8f,0x48,0xc3,0x6e,0xdc,0xd8,0x5d,0x36,0x53,0xc2,0x19 .byte 0xef,0xd7,0x50,0x0d,0xa2,0xc9,0x39,0xd1,0xef,0xe4,0x26,0x30,0x27,0x77,0x79,0x85,0x18,0x39,0xb7,0xb7,0xb6,0xba,0xf2,0x1f,0xa4,0xee,0x53,0x7b,0x43,0xff,0xd6,0x1c,0xa8,0x32,0xb7,0xfb,0x9b,0x45,0x6f,0x0f,0x60,0x62,0x5c,0xfe,0x02,0x5d,0x11,0xeb,0xe5,0x27,0xde,0x75,0xd4,0x11,0xbb,0xa4,0x7f,0xa0,0xb6,0x23,0x8a,0xbb,0x75,0x3c .byte 0xba,0x8b,0x3d,0x61,0x93,0xc2,0x1b,0x6f,0x79,0x93,0xc2,0x22,0x4c,0x48,0xe9,0x94,0x6e,0xed,0x2c,0x1d,0x51,0x0e,0xa6,0x69,0x1d,0x62,0xeb,0x67,0x47,0x5d,0x2f,0xa8,0x47,0x4f,0xe7,0x2f,0x65,0x92,0xd7,0x55,0xc1,0x46,0xfe,0x1d,0xfc,0xef,0x26,0xaf,0x3a,0x18,0x63,0x02,0x4d,0x8b,0xf4,0x24,0x99,0x3f,0x1a,0x74,0xd2,0x8e,0xd8,0x9e .byte 0xd6,0x3b,0xf9,0xce,0x67,0xa3,0xa6,0x0a,0x74,0x21,0x4e,0x0e,0x15,0x07,0xb6,0xbf,0xa2,0xcf,0x6e,0xf7,0xfa,0x49,0x98,0xfa,0xa0,0xf7,0xf0,0xd8,0x50,0xbf,0x6f,0x64,0x93,0xac,0xe0,0x88,0x04,0x04,0x74,0xa4,0xdd,0x9f,0x75,0xfe,0x30,0x37,0x77,0x09,0x1c,0xfc,0x54,0x47,0x4d,0x3f,0xda,0xfe,0x14,0x50,0x19,0x5e,0x88,0x4a,0xe9,0xcb .byte 0x5e,0x60,0x4e,0xef,0x5b,0x15,0x10,0x3b,0x1d,0x98,0x43,0xe4,0xbe,0x92,0xc6,0x8f,0x04,0x0e,0x04,0x16,0x68,0x82,0x1c,0xfe,0x30,0x9a,0xd2,0x4b,0x25,0xd7,0xed,0x19,0x22,0x06,0x09,0x3b,0x26,0xa6,0x9a,0x17,0x65,0x01,0x8f,0x70,0x8a,0x83,0x2a,0xa3,0xbf,0xeb,0xf9,0x3f,0xf3,0x5a,0x3f,0x62,0x86,0x6a,0x3b,0x3b,0xe3,0x43,0xc8,0x4c .byte 0x79,0x46,0xd3,0x9f,0x98,0x0d,0xac,0x11,0xf9,0xa3,0x46,0xe1,0xea,0x8c,0x1d,0x26,0x5e,0xca,0xd1,0x84,0x3b,0x01,0xb2,0x3d,0xe8,0xe5,0x8f,0x78,0x41,0x76,0xe9,0x18,0xcd,0x34,0xd9,0x48,0xb0,0x34,0xda,0xc2,0x34,0x3a,0x58,0x9d,0x12,0xa7,0x2a,0x73,0x40,0xc5,0x28,0x67,0xef,0x1a,0x7a,0x39,0x45,0x86,0x02,0x47,0xb8,0xde,0xc9,0x6b .byte 0x78,0x7a,0x01,0x48,0xa8,0xc6,0xc4,0x57,0x52,0xa9,0xad,0x8e,0x4e,0x22,0x1a,0xc5,0x21,0x65,0x98,0x0a,0x1d,0xf5,0x68,0x13,0xd8,0xef,0xb9,0x40,0x49,0x98,0x02,0x76,0x54,0x0f,0x36,0xf8,0x8f,0x88,0xfc,0xec,0xe1,0x73,0xc0,0x45,0xe1,0x1a,0x92,0x86,0x7b,0x78,0x63,0x7e,0x06,0xce,0x16,0x39,0x57,0xbc,0x96,0x63,0x32,0x99,0xad,0xff .byte 0xeb,0x63,0x33,0x35,0xef,0x33,0x08,0xca,0x0c,0xac,0x4b,0xc1,0x26,0xa1,0x7a,0x71,0x8e,0x2d,0x18,0x8b,0x6c,0x4a,0x18,0xa1,0x6c,0x15,0x9b,0xb8,0xc1,0xa1,0xc2,0x01,0x6e,0x65,0x40,0x6b,0x8c,0xf7,0x61,0x93,0x3f,0xe3,0xf0,0x56,0xe3,0x3d,0xa1,0x59,0xd9,0x80,0x6b,0x0c,0xe2,0x84,0x56,0xb5,0x06,0xc0,0x83,0xc3,0xf3,0xdd,0xfc,0xc9 .byte 0xad,0xa0,0x0e,0x5f,0x3b,0x36,0x79,0x46,0xc3,0x0e,0x6c,0x74,0xb0,0xc1,0x75,0xd1,0xe4,0x0b,0xd6,0x8e,0xbd,0x32,0x68,0x8f,0x77,0x0e,0xd4,0xdc,0xa1,0xa8,0x02,0x07,0xef,0x7d,0x5b,0x88,0x29,0x3f,0x7a,0x0a,0x46,0xf1,0x6b,0xfd,0x87,0x59,0x61,0x13,0x69,0x66,0x92,0x3a,0xd9,0x45,0xb7,0x76,0x10,0xad,0x31,0xe0,0x36,0x7e,0x6e,0x57 .byte 0x65,0x95,0x53,0xc6,0xd3,0xbb,0x6d,0xd2,0x5f,0xd6,0xed,0xbe,0x83,0x7e,0x51,0x0b,0x54,0xc4,0xf7,0xda,0xe1,0x3b,0x96,0xae,0x86,0x90,0x7f,0x1d,0x16,0x37,0xfa,0x7c,0x2e,0x9b,0x27,0x4e,0xf5,0x44,0xf3,0x72,0xec,0xd4,0xa1,0xc8,0xcf,0xb6,0xda,0x26,0x95,0x37,0xbf,0xdc,0x2e,0x3b,0xd4,0xf1,0x09,0x14,0x58,0x8e,0x01,0xcb,0x8c,0x28 .byte 0x18,0xdd,0x71,0x99,0x7b,0xdf,0x94,0x77,0xc6,0x39,0xea,0x61,0x8a,0x71,0x9a,0xe3,0xd2,0x14,0x6c,0xec,0xfc,0xc6,0x6e,0xf8,0xe2,0x5b,0x55,0xe5,0x58,0xfc,0x06,0x65,0xdb,0xbc,0x9f,0x22,0x30,0x98,0x40,0xc5,0xcf,0xa8,0x97,0xab,0x2e,0x15,0x79,0xe0,0x30,0xb5,0x28,0xd5,0x32,0xec,0x2d,0x4b,0x2c,0x00,0x47,0xdf,0xc5,0xc2,0x19,0x3d .byte 0xf5,0xc9,0xff,0x7b,0x7a,0x97,0x5f,0x8c,0xd9,0x0f,0x8c,0xa5,0x84,0x1f,0xd6,0x2b,0x36,0x94,0xf9,0xf2,0x92,0x46,0xb9,0x3d,0x67,0xc6,0x4a,0x14,0x57,0xb6,0x16,0x90,0x31,0xd9,0x8e,0xb7,0xbf,0x7b,0x74,0xde,0x7f,0x0e,0x34,0x14,0xb8,0x83,0x7e,0x31,0x15,0xb0,0xa1,0xc8,0xfc,0x28,0x3f,0x7e,0x2b,0xe8,0xc3,0xf6,0x49,0x2d,0x03,0xc6 .byte 0x94,0x8f,0xe8,0x97,0x46,0x2b,0x83,0x1c,0xe2,0xab,0xe3,0xf1,0xc4,0x20,0x0c,0xa6,0xca,0x78,0x89,0x66,0xb1,0xce,0x8e,0x0d,0x07,0x97,0x9a,0xce,0x8f,0x63,0x9b,0x5a,0x2f,0x51,0x38,0x40,0x37,0xa1,0x8b,0x13,0x51,0xe0,0x4c,0x86,0x8f,0x90,0xe8,0x00,0x1b,0xef,0xb7,0x98,0x7e,0xb8,0xf4,0x29,0xe8,0xa6,0xba,0x58,0x19,0x5f,0x13,0x5e .byte 0xd6,0x21,0x48,0x8b,0x64,0xee,0xd5,0xc9,0xbd,0x12,0xf4,0xf1,0x2b,0x89,0xaf,0x50,0xab,0x0c,0x9a,0xaa,0x78,0x62,0x90,0x71,0x3f,0xa8,0x19,0x92,0xb3,0x28,0xa9,0x37,0x93,0xbc,0x4c,0xf6,0xde,0xa5,0x02,0x22,0xc1,0x24,0x80,0x03,0x09,0x2a,0x9c,0xdb,0x5a,0xd0,0xf1,0x25,0xe1,0x46,0x0c,0xbf,0xed,0x4b,0x05,0xa1,0xde,0x40,0x71,0xb4 .byte 0xa9,0x3e,0xf4,0xf1,0x8e,0x00,0x17,0x09,0xa8,0x2c,0xcc,0xbc,0xfe,0x6e,0x9f,0xb6,0x2c,0x53,0x2c,0x12,0x67,0xad,0xa8,0xcc,0xfb,0x46,0xe6,0x00,0x6b,0xb7,0x9b,0xe0,0xd8,0x39,0x4d,0xbe,0xa0,0x14,0x25,0xd6,0xe4,0xc3,0x04,0xde,0xfb,0x85,0x14,0x46,0x5a,0x01,0x64,0x2f,0xb7,0x66,0x31,0x20,0x3e,0x06,0xf8,0x4a,0x68,0xf2,0xa1,0xa1 .byte 0xe6,0x0b,0xd8,0x3d,0x93,0xb3,0x72,0xff,0x36,0xf8,0xcc,0xa6,0x4f,0x32,0x9d,0xcb,0x25,0x2f,0x4f,0x78,0xb6,0xd3,0xb1,0x58,0x98,0x95,0xc1,0xbf,0xfe,0x08,0x92,0x55,0xf8,0x8a,0x8f,0x65,0xa8,0x51,0xb5,0x69,0x76,0xb0,0x03,0x05,0x93,0xef,0xf3,0x7d,0xfd,0x1e,0xda,0x7e,0x59,0x2c,0x84,0xaf,0x1c,0xd3,0xf0,0x3c,0xe6,0x83,0x4d,0x92 .byte 0xce,0x62,0x42,0x1b,0xbd,0x81,0xa5,0x5d,0xfe,0xaf,0x47,0xd4,0xf0,0x00,0x95,0x19,0x6c,0xbd,0x9d,0x86,0xdc,0xd9,0xc2,0x67,0x52,0x48,0xa7,0x0c,0x5b,0x4c,0xc1,0x31,0x1e,0xd1,0x1d,0x8b,0x1b,0x01,0x92,0x41,0x4e,0x32,0xbd,0x8e,0x61,0x84,0x02,0x57,0x7f,0x24,0x7c,0xb4,0x02,0x6e,0x2d,0xe2,0x6e,0x44,0xa5,0x2a,0xcc,0xed,0xf6,0xc6 .byte 0x1f,0x59,0x64,0xad,0x3f,0xc5,0xd4,0x07,0x83,0x32,0xfb,0xd2,0x7e,0xb8,0x50,0x3f,0x2a,0x06,0x7c,0xdd,0x61,0x5f,0xad,0x89,0x57,0x61,0xce,0x75,0xe5,0xa8,0x8b,0x33,0xb1,0x87,0xe3,0x3b,0x64,0xab,0xac,0xb7,0x7e,0xd5,0xbe,0xfa,0x28,0xc4,0x2b,0xe5,0x4b,0x49,0xcd,0x27,0x41,0xcc,0xe3,0x3d,0x6a,0xb7,0x0b,0xf5,0x6f,0xa3,0x1b,0x18 .byte 0xe2,0x03,0xd9,0x88,0x6a,0xf3,0x05,0x39,0x02,0x79,0xf8,0x2f,0x28,0xbc,0xed,0x39,0xf3,0x14,0xe6,0xfd,0x73,0x4c,0xf0,0x5f,0xd9,0xc9,0x7a,0x6c,0x1c,0xcf,0x38,0x0b,0xae,0xfa,0x34,0x02,0x21,0xc6,0xb3,0x88,0xda,0x96,0xe2,0xe0,0x68,0x75,0x7a,0x98,0x88,0x0d,0x1c,0x92,0xee,0xca,0xac,0x18,0x28,0x89,0x40,0xd7,0x1b,0x6f,0x59,0x21 .byte 0xd3,0x30,0x4c,0x0c,0x2c,0xca,0x41,0x46,0x8e,0x7d,0xe9,0x76,0x81,0x70,0xc3,0x10,0x42,0x64,0xaf,0x52,0x3e,0x78,0x38,0xcd,0xab,0x88,0xa5,0x32,0xbe,0xbe,0x55,0x39,0xc4,0xc6,0xce,0x53,0xfc,0x11,0x1b,0x0b,0x83,0xd3,0x3e,0x7b,0x71,0x3a,0x58,0x5d,0x70,0xfb,0x49,0x41,0x7d,0xe8,0x1e,0x37,0x17,0x3f,0x80,0x34,0x3a,0x81,0x65,0xb9 .byte 0x27,0x3c,0xfa,0xdb,0xc1,0xb8,0x5e,0x4c,0x80,0xf7,0x1e,0x89,0x2a,0x04,0xf0,0xfd,0x14,0xf2,0xbc,0x72,0xbb,0x36,0x9d,0x79,0xa5,0x7c,0xed,0x0f,0xf7,0x4f,0x69,0x7d,0xaf,0x8f,0xfc,0xcd,0x14,0x4c,0x29,0x55,0xb5,0xcd,0xb9,0x7c,0xa7,0xd4,0x83,0x28,0xcd,0x9c,0x35,0x75,0x00,0x0f,0xaa,0x3b,0x18,0xa5,0x0f,0x2e,0x97,0xa3,0x38,0xca .byte 0xb5,0x8a,0x8f,0x9e,0x47,0xc8,0xde,0x82,0x72,0xe0,0xb2,0x14,0xfc,0x28,0xa5,0xf9,0x76,0x38,0xf5,0x42,0xd2,0x87,0x82,0xfe,0x49,0x4d,0xb1,0x32,0x30,0x37,0xdf,0xc4,0x11,0x10,0x30,0xf8,0x51,0x5f,0x5f,0x59,0x02,0x17,0x90,0x5c,0xe6,0x6b,0xec,0x5b,0x14,0xb0,0xde,0xa9,0xca,0xe4,0x00,0x8c,0xe0,0xdb,0xf8,0xd2,0x2b,0x08,0x30,0xbb .byte 0x37,0xb2,0xd1,0x0e,0x8d,0xba,0xe6,0x60,0x4b,0xe7,0xe3,0x23,0xb6,0x31,0x5f,0x8c,0xb5,0x34,0x7b,0x6f,0x61,0xae,0xeb,0xc7,0xf6,0x0b,0x94,0x28,0xae,0x76,0x81,0xeb,0x44,0xcc,0x51,0xd5,0x5e,0xba,0x97,0x36,0xd3,0xc3,0xc9,0x03,0xe9,0x08,0x92,0x98,0x83,0x2a,0x7b,0x14,0x36,0xd0,0x27,0x5a,0x60,0xa5,0xc0,0xc6,0x12,0x42,0x44,0x85 .byte 0x8a,0xc7,0x2e,0x5d,0x2a,0xf4,0x25,0x50,0x7d,0x91,0x1c,0x95,0xb6,0x4f,0x1d,0x77,0x80,0x83,0x1c,0x4e,0x55,0xf8,0x1f,0x16,0xee,0xc3,0x8b,0xf5,0x96,0x25,0x1e,0xb6,0x34,0x5c,0xd7,0xd4,0xfa,0xff,0xa1,0x5b,0xd8,0x03,0xc2,0xe9,0x85,0x16,0xde,0x9d,0xef,0x37,0xc4,0x4c,0x82,0xdb,0xe4,0xf9,0x0f,0xcb,0x5e,0x9b,0x75,0xc1,0x3d,0x72 .byte 0xdd,0xa3,0x31,0xbe,0x19,0x90,0x3d,0x7f,0x5e,0xed,0xa4,0xa4,0xc6,0x5c,0x96,0xfe,0x87,0x44,0x50,0x10,0x9d,0x70,0xf7,0x50,0x11,0xb3,0x20,0x6b,0x48,0xf5,0x5e,0x26,0xed,0x30,0x69,0x91,0x66,0x83,0xf7,0x45,0xa1,0x0e,0x60,0x68,0xae,0x8a,0x84,0x8c,0x6a,0x7d,0x27,0x34,0xc0,0x85,0xaf,0xb5,0x47,0xcd,0x5b,0xab,0xbc,0xb9,0xf8,0x14 .byte 0xb1,0x81,0xd3,0xd9,0x26,0x5d,0xda,0xb1,0x8b,0x50,0x3f,0xa5,0x88,0x2c,0xc0,0x31,0x14,0x9a,0x5a,0xef,0x24,0x18,0xcf,0x8d,0x1e,0x25,0x38,0x30,0xa9,0x5f,0x8c,0xc6,0xc1,0x85,0x7f,0xec,0xa3,0xb3,0xf8,0xf2,0x48,0x1a,0x9a,0xef,0x21,0xc5,0x13,0xfb,0x89,0xc6,0xec,0xb6,0x81,0xd1,0xef,0xd7,0x2e,0x1d,0x06,0x5a,0x51,0x9b,0xbb,0x44 .byte 0xce,0x14,0x83,0xb7,0x04,0xf2,0x61,0x47,0x2a,0xff,0x4f,0xe6,0x6d,0x6e,0xd9,0x95,0x48,0x36,0x89,0x96,0x7d,0xfa,0xaf,0xb8,0xf1,0x80,0x66,0x3d,0x01,0x20,0x42,0x76,0xe7,0x58,0xb3,0xbf,0xc7,0xde,0xfb,0x12,0xfa,0x21,0xfb,0x63,0x3e,0xa0,0x7e,0x21,0x90,0xd7,0xf1,0x37,0xa4,0x43,0xbc,0x1b,0xf9,0x51,0x81,0xd0,0x88,0x42,0xf0,0xec .byte 0x82,0xce,0x92,0x81,0x19,0x77,0x50,0x5b,0xa3,0xd8,0xbd,0x50,0x7b,0xec,0x4d,0x63,0x99,0x29,0x89,0x28,0x9c,0xe4,0x90,0xfb,0x05,0x7e,0x0c,0xc8,0xb9,0xd7,0xc4,0xc6,0x11,0x82,0x22,0xaa,0xe9,0x60,0x20,0x72,0xd6,0x5b,0xa8,0x8e,0x04,0x0b,0x14,0xfc,0x38,0x50,0x7e,0x8b,0x55,0x13,0xe3,0x4a,0x25,0x03,0x88,0x50,0x17,0x73,0x3c,0x0a .size g_preCompTable,.-g_preCompTable #endif
2401_83913325/openHiTLS-examples_7925
crypto/ecc/src/asm/ecp256_pre_comp_table.s
Motorola 68K Assembly
unknown
777,850
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CURVE_NISTP256) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) #include "ecp256_pre_comp_table.s" .file "ecp256_x86.S" .data .align 64 .Lpoly: // P .quad 0xffffffffffffffff, 0x00000000ffffffff, 0x0000000000000000, 0xffffffff00000001 .LrrModP: // Indicates the calculated value of R * R mod p, which is used in montgomery modular multiplication. .quad 0x0000000000000003, 0xfffffffbffffffff, 0xfffffffffffffffe, 0x00000004fffffffd .Lone_mont: // R mod P, R = 2^256, = 2^256 - P .quad 0x0000000000000001, 0xffffffff00000000, 0xffffffffffffffff, 0x00000000fffffffe .Lord: // order, n .quad 0xf3b9cac2fc632551, 0xbce6faada7179e84, 0xffffffffffffffff, 0xffffffff00000000 .LordK: // (2^64 - ord[0]) * ordK = 1 (mod 2^64)) LordK = -(ord[0])^(-1) (mod 2^64) LordK * Lord, // The lower 64 bits are all Fs. .quad 0xccd1c8aaee00bc4f .LOne: .quad 0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000 .text /** * Function description: Returns the address of the field calculation table of the ECP256 field. * Function prototype: const ECP256_TableRow *ECP256_GetPreCompTable(void); * Input register: None * Change register: None * Output register: rax * Function/Macro Call: None */ .globl ECP256_GetPreCompTable .type ECP256_GetPreCompTable,@function .align 32 ECP256_GetPreCompTable: .cfi_startproc leaq g_preCompTable(%rip), %rax ret .cfi_endproc .size ECP256_GetPreCompTable, .-ECP256_GetPreCompTable /** * Function description: Addition of the ECP256 field. res = a + b mod P * Function prototype: void ECP256_Add(Coord *r, const Coord *a, const Coord *b); * Input register: * rdi: Pointer to the output Coord structure * rsi: Address pointing to input data a * rdx: Address pointing to input data b * Change register: rsi, rdx, rcx, rax, r8, r9, r10, r11, r12, r13 * Output register: None * Function/Macro call: Addition can be implemented by calling ECP256_AddCore. */ .globl ECP256_Add .type ECP256_Add,@function .align 32 ECP256_Add: .cfi_startproc pushq %r12 pushq %r13 movq (%rsi), %r8 // a[0] movq 8(%rsi), %r9 // a[1] xorq %r13, %r13 // Save carry movq 16(%rsi), %r10 // a[2] movq 24(%rsi), %r11 // a[3] leaq .Lpoly(%rip), %rsi // P addq (%rdx), %r8 // c[0] = a[0] + b[0] adcq 8(%rdx), %r9 // c[1] = a[1] + b[1] + carry movq %r8, %rax // save c[0] adcq 16(%rdx), %r10 // c[2] = a[2] + b[2] + carry adcq 24(%rdx), %r11 // c[3] = a[3] = b[3] + carry movq %r9, %rcx // save c[1] adcq $0, %r13 // save carry value to r13 subq $-1, %r8 // d[0] = c[0] - P[0] movq %r10, %rdx // save c[2] sbbq 8(%rsi), %r9 // d[1] = c[1] - P[1] - borrow sbbq $0, %r10 // d[2] = c[2] - P[2] - borrow movq %r11, %r12 // save c[3] sbbq 24(%rsi), %r11 // d[3] = c[3] - P[3] - borrow sbbq $0, %r13 // r13 = 0 + carry - borrow cmovcq %rax, %r8 // res[0] = (r13 < 0) ? c[0]: d[0] cmovcq %rcx, %r9 // res[1] = (r13 < 0) ? c[1]: d[1] movq %r8, (%rdi) cmovcq %rdx, %r10 // res[2] = (r13 < 0) ? c[2]: d[2] movq %r9, 8(%rdi) cmovcq %r12, %r11 // res[3] = (r13 < 0) ? c[3]: d[3] movq %r10, 16(%rdi) movq (%rsp), %r13 movq %r11, 24(%rdi) movq 8(%rsp), %r12 leaq 16(%rsp), %rsp ret .cfi_endproc .size ECP256_Add, .-ECP256_Add /** * Function description: Addition core part of the ECP256 field, a + b mod P; Outputs r8-r11, r14,15 are P[1] and P[3] * Input register: * r8-r11:256-bit input data a * rdx: points to the input 256-bit data b. * r14:P[1] * r15:P[3] * Change register: rdx, rcx, rax, r8, r9, r10, r11, r12, r13 * Output register: r8-r11 */ .type ECP256_AddCore,@function .align 32 ECP256_AddCore: .cfi_startproc xorq %r13, %r13 addq (%rdx), %r8 // Addition result. adcq 8(%rdx), %r9 movq %r8, %rax adcq 16(%rdx), %r10 adcq 24(%rdx), %r11 movq %r9, %rcx adcq $0, %r13 // Save carry value to r13. subq $-1, %r8 // Mod P. movq %r10, %rdx sbbq %r14, %r9 sbbq $0, %r10 movq %r11, %r12 sbbq %r15, %r11 sbbq $0, %r13 cmovcq %rax, %r8 // Obtain mod P result. cmovcq %rcx, %r9 movq %r8, (%rdi) cmovcq %rdx, %r10 movq %r9, 8(%rdi) cmovcq %r12, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size ECP256_AddCore, .-ECP256_AddCore /** * Function description: Subtraction of the ECP256 field. Res = a - b mod P * Function prototype: void ECP256_Sub(Coord *r, const Coord *a, const Coord *b); * Input register: * rdi: Pointer to the output Coord structure * rsi: Address pointing to input data a * rdx: Address pointing to input data b * Change register: rsi, rdx, rcx, rax, r8, r9, r10, r11, r12, r13 * Output register: None * Function/Macro call: Subtraction can be implemented by calling ECP256_SubCore. */ .globl ECP256_Sub .type ECP256_Sub,@function .align 32 ECP256_Sub: .cfi_startproc pushq %r12 pushq %r13 movq (%rsi), %r8 // a[0] movq 8(%rsi), %r9 // a[1] xorq %r13, %r13 // Save borrow movq 16(%rsi), %r10 // a[3] movq 24(%rsi), %r11 // a[4] leaq .Lpoly(%rip), %rsi // P subq (%rdx), %r8 // c[0] = a[0] - b[0] sbbq 8(%rdx), %r9 // c[1] = a[1] - b[1] - borrow movq %r8, %rax // save c[0] sbbq 16(%rdx), %r10 // c[2] = a[2] - b[2] - borrow sbbq 24(%rdx), %r11 // c[3] = a[3] - b[3] - borrow movq %r9, %rcx // save c[1] sbbq $0, %r13 // save borrow value to r13 addq $-1, %r8 // d[0] = c[0] + P[0] movq %r10, %rdx // save c[2] adcq 8(%rsi), %r9 // d[1] = c[1] + P[1] + carry adcq $0, %r10 // d[2] = c[2] + P[2] + carry movq %r11, %r12 // save c[3] adcq 24(%rsi), %r11 // d[3] = c[3] + P[3] + carry testq %r13, %r13 cmovzq %rax, %r8 // res[0] = (r13 == 0) ? c[0] : d[0] cmovzq %rcx, %r9 // res[1] = (r13 == 0) ? c[1] : d[1] movq %r8, (%rdi) cmovzq %rdx, %r10 // res[2] = (r13 == 0) ? c[2] : d[2] movq %r9, 8(%rdi) cmovzq %r12, %r11 // res[3] = (r13 == 0) ? c[3] : d[3] movq %r10, 16(%rdi) movq %r11, 24(%rdi) movq (%rsp), %r13 movq 8(%rsp), %r12 leaq 16(%rsp), %rsp ret .cfi_endproc .size ECP256_Sub, .-ECP256_Sub /** * Function description: subtraction core part of the ECP256 field, a-b mod P; no writeback * Input register: * r8-r11:256-bit input data a * rdx:Points to the input 256-bit data b. * r14:P[1] * r15:P[3] * Change register: rdx, rcx, rax, r8, r9, r10, r11, r12, r13 * Output register: r8-r11 */ .type ECP256_SubCore,@function .align 32 ECP256_SubCore: .cfi_startproc xorq %r13, %r13 subq (%rdx), %r8 // Subtraction results. sbbq 8(%rdx), %r9 movq %r8, %rax // Save Results. sbbq 16(%rdx), %r10 sbbq 24(%rdx), %r11 movq %r9, %rcx sbbq $0, %r13 // Borrowing saved in r13. addq $-1, %r8 // a - b + P movq %r10, %rdx adcq %r14, %r9 adcq $0, %r10 movq %r11, %r12 adcq %r15, %r11 testq %r13, %r13 cmovzq %rax, %r8 // If r13 is equal to 0, a-b is used. Otherwise, a-b+P is used. cmovzq %rcx, %r9 cmovzq %rdx, %r10 cmovzq %r12, %r11 ret .cfi_endproc .size ECP256_SubCore, .-ECP256_SubCore /** * Function description: negation of the ECP256 field. res = -a mod P * Function prototype: void ECP256_Neg(Coord *r, const Coord *a); * Input register: * rdi: Pointer to the output Coord structure * rsi: Address pointing to input data a * Change register: rsi, rdx, rcx, rax, r8, r9, r10, r11, r12, r13 * Output register: None * Function/Macro Call: */ .globl ECP256_Neg .type ECP256_Neg,@function .align 32 ECP256_Neg: .cfi_startproc pushq %r12 pushq %r13 xorq %r8, %r8 // -a = 0 - a xorq %r9, %r9 xorq %r13, %r13 leaq .Lpoly(%rip), %rdx xorq %r10, %r10 xorq %r11, %r11 subq (%rsi),%r8 sbbq 8(%rsi),%r9 movq %r8, %rax sbbq 16(%rsi),%r10 sbbq 24(%rsi),%r11 movq %r9, %rcx sbbq $0, %r13 addq $-1, %r8 movq %r10, %rsi adcq 8(%rdx), %r9 adcq $0, %r10 movq %r11, %r12 adcq 24(%rdx), %r11 testq %r13, %r13 // Choost result cmovzq %rax, %r8 cmovzq %rcx, %r9 movq %r8, (%rdi) cmovzq %rsi, %r10 movq %r9, 8(%rdi) cmovzq %r12, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) movq (%rsp), %r13 movq 8(%rsp), %r12 leaq 16(%rsp), %rsp ret .cfi_endproc .size ECP256_Neg, .-ECP256_Neg /** * Function description: multiplication of the ECP256 field: res = a * b * 2^-256 mod P * Function prototype: void ECP256_Mul(Coord *r, const Coord *a, const Coord *b); * Input register: * rdi: Pointer to the output Coord structure * rsi: Address pointing to input data a * rdx: Address pointing to input data b * Change register: rax, rbx, rcx, rdx, rbp, r8, r9, r10, r11, r12, r13, r14, r15 * Output register: None * Function/macro call: Multiplication can be implemented by calling ECP256_MulCore. */ .globl ECP256_Mul .type ECP256_Mul,@function .align 32 ECP256_Mul: .cfi_startproc pushq %rbx pushq %rbp pushq %r12 pushq %r13 pushq %r14 pushq %r15 movq %rdx, %rcx // rdx is for mul movq .Lpoly+8(%rip), %r14 movq .Lpoly+24(%rip), %r15 call ECP256_MulCore_q movq (%rsp), %r15 movq 8(%rsp), %r14 movq 16(%rsp), %r13 movq 24(%rsp), %r12 movq 32(%rsp), %rbp movq 40(%rsp), %rbx leaq 48(%rsp), %rsp ret .cfi_endproc .size ECP256_Mul, .-ECP256_Mul /** * Function description: Montgomery multiplication of the ECP256 field * Input register: * rdi: Return address. * rsi: Factor address. * rcx: Factor address. * Change register: rax,rbx,rcx,rdx,rbp,r8-r13 * Output register: None. */ .type ECP256_MulCore_q,@function .align 32 ECP256_MulCore_q: .cfi_startproc movq (%rcx), %rax // b[0] movq %rax, %rbp // save b[0] mulq (%rsi) // a[0] * b[0] movq %rax, %r10 movq %rbp, %rax // b[0] movq %rdx, %r11 mulq 8(%rsi) // a[1] * b[0] addq %rax, %r11 movq %rbp, %rax adcq $0, %rdx // a[1:0] * b[0] < 2^192, no overflow movq %rdx, %r12 mulq 16(%rsi) // a[2] * b[0] addq %rax, %r12 movq %rbp, %rax adcq $0, %rdx movq %rdx, %r13 mulq 24(%rsi) // a[3] * b[0] addq %rax, %r13 adcq $0, %rdx movq %rdx, %r8 // result: r8 r13 r12 r11 r10 xorq %r9, %r9 movq %r10, %rax // first reduction movq %r10, %rbp shlq $32, %r10 // r10 * 2^96 low mulq %r15 // r10 * 0xffffffff00000001 shrq $32, %rbp // r10 * 2^96 high addq %r10, %r11 adcq %rbp, %r12 adcq %rax, %r13 adcq %rdx, %r8 movq 8(%rcx), %rax adcq $0, %r9 xorq %r10, %r10 movq %rax, %rbp mulq (%rsi) addq %rax, %r11 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 8(%rsi) addq %rbx, %r12 adcq $0, %rdx addq %rax, %r12 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 16(%rsi) addq %rbx, %r13 adcq $0, %rdx addq %rax, %r13 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 24(%rsi) addq %rbx, %r8 adcq $0, %rdx addq %rax, %r8 adcq %rdx, %r9 adcq $0, %r10 movq %r11, %rbp movq %r11, %rax shlq $32, %r11 // r11 * 2^96 low mulq %r15 // r11 * 0xffffffff00000001 shrq $32, %rbp // r11 * 2^96 high addq %r11, %r12 adcq %rbp, %r13 movq 16(%rcx), %rbp adcq %rax, %r8 adcq %rdx, %r9 movq %rbp, %rax adcq $0, %r10 xorq %r11, %r11 mulq (%rsi) // a[0] * b[2] addq %rax, %r12 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 8(%rsi) addq %rbx, %r13 adcq $0, %rdx addq %rax, %r13 movq %rbp, %rax adcq $0, %rdx movq %rdx, %rbx mulq 16(%rsi) addq %rbx, %r8 adcq $0, %rdx addq %rax, %r8 movq %rbp, %rax adcq $0, %rdx movq %rdx, %rbx mulq 24(%rsi) addq %rbx, %r9 adcq $0, %rdx addq %rax, %r9 adcq %rdx, %r10 movq %r12, %rbp adcq $0, %r11 movq %r12, %rax // third reduction shlq $32, %r12 // r12 * 2^96 low mulq %r15 // r12 * 0xffffffff00000001 shrq $32, %rbp // r12 * 2^96 high addq %r12, %r13 adcq %rbp, %r8 movq 24(%rcx), %rbp adcq %rax, %r9 adcq %rdx, %r10 movq %rbp, %rax adcq $0, %r11 xorq %r12, %r12 mulq (%rsi) // a[0] * b[3] addq %rax, %r13 adcq $0, %rdx movq %rdx, %rbx movq %rbp, %rax mulq 8(%rsi) addq %rbx, %r8 adcq $0, %rdx addq %rax, %r8 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 16(%rsi) addq %rbx, %r9 adcq $0, %rdx addq %rax, %r9 movq %rbp, %rax adcq $0, %rdx movq %rdx, %rbx mulq 24(%rsi) addq %rbx, %r10 adcq $0, %rdx addq %rax, %r10 adcq %rdx, %r11 adcq $0, %r12 movq %r13, %rbp movq %r13, %rax // last reduction shlq $32, %r13 // r13 * 2^96 low mulq %r15 // r13 * 0xffffffff00000001 shrq $32, %rbp // r13 * 2^96 high addq %r13, %r8 adcq %rbp, %r9 adcq %rax, %r10 adcq %rdx, %r11 movq %r8, %rbx movq %r9, %rbp adcq $0, %r12 movq %r10, %rax movq %r11, %rdx subq $-1, %r8 sbbq %r14, %r9 sbbq $0, %r10 sbbq %r15, %r11 sbbq $0, %r12 cmovcq %rbx, %r8 cmovcq %rbp, %r9 cmovcq %rax, %r10 movq %r8, (%rdi) movq %r9, 8(%rdi) cmovcq %rdx, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size ECP256_MulCore_q, .-ECP256_MulCore_q /** * Function description: ECP256 Montgomery form * Function prototype: void ECP256_ToMont(Coord *r, const Coord *a); * Input register: * rdi: pointer to the output Coord structure * rsi: address pointing to input data a * Change register: rax,rbx,rcx,rdx,rbp,r8-r13 * Output register: None * Function/Macro invoking: This function can be implemented by calling ECP256_Mul. */ .globl ECP256_ToMont .type ECP256_ToMont,@function .align 32 ECP256_ToMont: .cfi_startproc leaq .LrrModP(%rip),%rcx pushq %rbx pushq %rbp pushq %r12 pushq %r13 pushq %r14 pushq %r15 movq .Lpoly+8(%rip), %r14 movq .Lpoly+24(%rip), %r15 call ECP256_MulCore_q movq (%rsp), %r15 movq 8(%rsp), %r14 movq 16(%rsp), %r13 movq 24(%rsp), %r12 movq 32(%rsp), %rbp movq 40(%rsp), %rbx leaq 48(%rsp), %rsp ret .cfi_endproc .size ECP256_ToMont, .-ECP256_ToMont /** * Function description: ECP256 Montgomery form converted to normal form * Function prototype: void ECP256_FromMont(Coord *r, const Coord *a); * Input register: * rdi: Pointer to the output Coord structure. * rsi: Address pointing to input data a. * Change register: rax,rcx,rdx,r8-r13 * Output register: None. * Function/Macro Call: */ .globl ECP256_FromMont .type ECP256_FromMont,@function .align 32 ECP256_FromMont: .cfi_startproc pushq %r12 pushq %r13 movq .Lpoly+8(%rip), %r12 movq .Lpoly+24(%rip), %r13 movq (%rsi), %r8 movq 8(%rsi), %r9 movq 16(%rsi), %r10 movq 24(%rsi), %r11 movq %r8, %rax movq %r8, %rcx shlq $32, %r8 mulq %r13 // 0xff * 0xff = 0xfe01 shrq $32, %rcx addq %r8, %r9 adcq %rcx, %r10 movq %r9, %rcx adcq %rax, %r11 adcq $0, %rdx // rdx + 1 <= 0xff movq %r9, %rax movq %rdx, %r8 shlq $32, %r9 mulq %r13 shrq $32, %rcx addq %r9, %r10 adcq %rcx, %r11 movq %r10, %rcx adcq %rax, %r8 adcq $0, %rdx movq %r10, %rax movq %rdx, %r9 shlq $32, %r10 mulq %r13 shrq $32, %rcx addq %r10, %r11 adcq %rcx, %r8 movq %r11, %rcx adcq %rax, %r9 adcq $0, %rdx movq %r11, %rax movq %rdx, %r10 shlq $32, %r11 mulq %r13 shrq $32, %rcx addq %r11, %r8 adcq %rcx, %r9 movq %r8, %rsi adcq %rax, %r10 adcq $0, %rdx movq %rdx, %r11 // r8 r9 r10 r11 movq %r9, %rdx subq $-1, %r8 movq %r10, %rcx sbbq %r12, %r9 movq %r11, %rax sbbq $0, %r10 sbbq %r13, %r11 cmovcq %rsi, %r8 // < P cmovcq %rdx, %r9 movq %r8, (%rdi) cmovcq %rcx, %r10 movq %r9, 8(%rdi) cmovcq %rax, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) movq (%rsp), %r13 movq 8(%rsp), %r12 leaq 16(%rsp), %rsp ret .cfi_endproc .size ECP256_FromMont, .-ECP256_FromMont /** * Function description: Multiplication of the ECP256 field:res = a*b*2^-256 mod P * Function prototype: void ECP256_Sqr(Coord *r, const Coord *a); * Input register: * rdi: pointer to the output Coord structure * rsi: address pointing to input data a * Change register: rax, rbx, rcx, rdx, rsi, rdi, rbp, r8, r9, r10, r11, r12, r13, r14, r15 * Output register: None * Function/Macro Call: Multiplication can be implemented by calling ECP256_SqrCore_q. */ .globl ECP256_Sqr .type ECP256_Sqr,@function .align 32 ECP256_Sqr: .cfi_startproc pushq %rbx pushq %rbp pushq %r12 pushq %r13 pushq %r14 pushq %r15 nop // add this instruction to improve performance, movq %rsi, %rdx is ok movq (%rsi), %rax // a[0] movq 8(%rsi), %r14 // a[1] movq 16(%rsi), %rbp // a[2] movq 24(%rsi), %r15 // a[3] call ECP256_SqrCore_q movq (%rsp), %r15 movq 8(%rsp), %r14 movq 16(%rsp), %r13 movq 24(%rsp), %r12 movq 32(%rsp), %rbp movq 40(%rsp), %rbx leaq 48(%rsp), %rsp ret .cfi_endproc .size ECP256_Sqr, .-ECP256_Sqr /** * Function description: Montgomery square of the ECP256 field * Input register: * rdi: Return address * rsi: Factor address * Change register: rax, rbx, rcx, rdx, rbp, rsi, r8-r15 * Output register: None */ .type ECP256_SqrCore_q,@function .align 32 ECP256_SqrCore_q: .cfi_startproc movq %rax, %r8 mulq %r14 // rdx:rax = a[0] * a[1] xorq %rcx, %rcx movq %rax, %r9 // r9 = rax xorq %r11, %r11 xorq %r12, %r12 movq %r8, %rax xorq %r13, %r13 xorq %rbx, %rbx movq %rdx, %r10 // r10:r9 = a[0] * a[1] mulq %rbp // rdx:rax = a[0] * a[2] addq %rax, %r10 // r10 += rax movq %r8, %rax // a[0] --> rax adcq %rdx, %r11 // a[0] * (a[2] * 2^64 + a[1]) < 2^196, no overflow mulq %r15 // rdx:rax = a[0] * a[3] addq %rax, %r11 // r11 += rax movq %r14, %rax // a[0] --> rax adcq %rdx, %r12 // a[0] * (a[3] * 2^128 + a[2] * 2^64 + a[1]) < 2^256, no overflow mulq %rbp // rdx:rax = a[1] * a[2] addq %rax, %r11 movq %r14, %rax adcq %rdx, %r12 adcq $0, %r13 mulq %r15 // rdx:rax = a[1] * a[3] addq %rax, %r12 movq %rbp, %rax adcq %rdx, %r13 adcq $0, %rbx mulq %r15 // rdx:rax = a[2] * a[3] addq %rax, %r13 adcq %rdx, %rbx // rbx not overflow movq %r8, %rax addq %r9, %r9 // twice adcq %r10, %r10 adcq %r11, %r11 adcq %r12, %r12 adcq %r13, %r13 adcq %rbx, %rbx adcq $0, %rcx mulq %rax // rdx:rax = a[0] * a[0] movq %rax, %r8 movq %r14, %rax movq %rdx, %rsi mulq %rax // rdx:rax = a[1] * a[1] addq %rsi, %r9 adcq %rax, %r10 movq %rbp, %rax adcq $0, %rdx movq %rdx, %rsi mulq %rax // rdx:rax = a[2] * a[2] addq %rsi, %r11 adcq %rax, %r12 movq %r15, %rax adcq $0, %rdx movq %rdx, %rsi mulq %rax // rdx:rax = a[3] * a[3] addq %rsi, %r13 adcq %rax, %rbx movq %r8, %rax adcq %rdx, %rcx // rcx not overflow movq .Lpoly+8(%rip), %r14 movq .Lpoly+24(%rip), %r15 movq %r8, %rbp // First reduction shlq $32, %r8 // l32[r8 << 96] mulq %r15 shrq $32, %rbp // h32[r8 << 96] addq %r8, %r9 adcq %rbp, %r10 adcq %rax, %r11 adcq $0, %rdx movq %r9, %rax movq %r9, %rbp movq %rdx, %r8 // r8 r11 r10 r9 0 shlq $32, %r9 // Second reduction mulq %r15 shrq $32, %rbp addq %r9, %r10 adcq %rbp, %r11 adcq %rax, %r8 adcq $0, %rdx movq %r10, %rax movq %r10, %rbp movq %rdx, %r9 // r9 r8 r11 r10 0 shlq $32, %r10 // Third reduction mulq %r15 shrq $32, %rbp addq %r10, %r11 adcq %rbp, %r8 adcq %rax, %r9 adcq $0, %rdx movq %r11, %rax movq %r11, %rbp movq %rdx, %r10 // r10 r9 r8 r11 0 shlq $32, %r11 // Last reduction mulq %r15 shrq $32, %rbp addq %r11, %r8 adcq %rbp, %r9 adcq %rax, %r10 adcq $0, %rdx // rdx r10 r9 r8 0 xorq %rsi, %rsi // Add the reduction result addq %r8, %r12 adcq %r9, %r13 movq %r12, %r8 adcq %r10, %rbx adcq %rdx, %rcx movq %r13, %r9 adcq $0, %rsi // Reserve carry value subq $-1, %r8 movq %rbx, %r10 sbbq %r14, %r9 sbbq $0, %r10 movq %rcx, %r11 sbbq %r15, %r11 sbbq $0, %rsi cmovcq %r12, %r8 cmovcq %r13, %r9 movq %r8, (%rdi) cmovcq %rbx, %r10 movq %r9, 8(%rdi) cmovcq %rcx, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size ECP256_SqrCore_q, .-ECP256_SqrCore_q /** * Function description: Multiplication of the ECP256 field: res = a*b*2^-256 mod Order(P) * Function prototype: void ECP256_OrdSqr(Coord *r, const Coord *a, int32_t repeat); * Input register: * rdi: Pointer to the output Coord structure * rsi: Address pointing to input data a * rdx:Repeat * Change register: rax, rbx, rcx, rdx, rsi, rbp, r8, r9, r10, r11, r12, r13, r14, r15 * Output register: None * Function/Macro Call: */ .globl ECP256_OrdSqr .type ECP256_OrdSqr,@function .align 32 ECP256_OrdSqr: .cfi_startproc pushq %rbx pushq %rbp pushq %r12 pushq %r13 pushq %r14 pushq %r15 movq (%rsi), %r8 movq 8(%rsi), %rax movq 16(%rsi), %r14 movq 24(%rsi), %r15 leaq .Lord(%rip), %rbp // ptr(N) --> rbp movq %rdx, %rbx .align 32 .Lord_sqr_loop: movq %rax, %rsi mulq %r8 // rdx:rax = acc[0] * acc[1] movq %rax, %r9 // r9 = rax vmovq %rsi, %xmm1 // save acc[1] -> xmm1 movq %r14, %rax // acc[2] --> rax movq %rdx, %r10 // r10:r9 = acc[0] * acc[1] mulq %r8 // rdx:rax = acc[0] * acc[2] addq %rax, %r10 // r10 += rax vmovq %r14, %xmm2 // save acc[2] -> xmm2 adcq $0, %rdx // acc[0] * (acc[2] * 2^64 + acc[1]) < 2^196, no overflow movq %r15, %rax // acc[3] --> rax movq %rdx, %r11 mulq %r8 // rdx:rax = a[0] * a[3] addq %rax, %r11 // r11 += rax vmovq %r15, %xmm3 // Save acc[3] -> xmm3 adcq $0, %rdx // acc[0] * (acc[3] * 2^128 + acc[2] * 2^64 + acc[1]) < 2^256, no overflow movq %r15, %rax // acc[1] --> rax movq %rdx, %r12 mulq %r14 movq %rax, %r13 movq %r14, %rax movq %rdx, %r14 mulq %rsi addq %rax, %r11 movq %r15, %rax adcq $0, %rdx movq %rdx, %r15 mulq %rsi addq %rax, %r12 adcq $0, %rdx addq %r15, %r12 adcq %rdx, %r13 movq %r8, %rax // acc[0] --> rax adcq $0, %r14 // r14 r13 r12 r11 r10 r9 xorq %r15, %r15 // 0 --> r15 addq %r9, %r9 // twice adcq %r10, %r10 adcq %r11, %r11 adcq %r12, %r12 adcq %r13, %r13 adcq %r14, %r14 adcq $0, %r15 // result: r15 r14 r13 r12 r11 r10 r9 mulq %rax // rdx:rax = acc[0] * acc[0] movq %rax, %r8 // rax --> r8 vmovq %xmm1, %rax // acc[1] --> rax movq %rdx, %rcx // save rdx to rcx mulq %rax // rdx:rax = acc[1] * acc[1] addq %rcx, %r9 // r9 += rcx adcq %rax, %r10 // r10 += rax adcq $0, %rdx // no overflow vmovq %xmm2, %rax // acc[2] --> rax movq %rdx, %rcx // save rdx to rcx mulq %rax // rdx:rax = a[2] * a[2] addq %rcx, %r11 // r11 += rcx adcq %rax, %r12 // r12 += rax movq %r8, %rsi // acc[0] --> rsi adcq $0, %rdx // no overflow vmovq %xmm3, %rax // acc[3] --> rax movq %rdx, %rcx // save rcx to rdx imulq 32(%rbp), %r8 // m = acc[0] * LordK (mod 2^64) --> r8 mulq %rax // rdx:rax = a[3] * a[3] addq %rcx, %r13 // r13 += rcx adcq %rax, %r14 // r14 += r movq (%rbp), %rax // N[0] --> rax adcq %rdx, %r15 // r15 not overflow /* Result acc[8:0] = r15 r14 r13 r12 r11 r10 r9 r8; */ /* The first reduction */ mulq %r8 // rdx:rax = m * N[0] addq %rax, %rsi // rsi = 0 movq %r8, %rcx // m --> rcx adcq %rdx, %rsi // rsi = rdx + carry --> acc[1] subq %r8, %r10 // acc[2] - m sbbq $0, %rcx // m - borrwo, to acc[3] movq 8(%rbp), %rax // N[1] --> rax mulq %r8 // rdx:rax = m * N[1] addq %rsi, %r9 // acc[1] += high[m * N[0]] adcq $0, %rdx // save carry addq %rax, %r9 // acc[1] += low[m * N[1]] movq %r8, %rax // m --> rax adcq %rdx, %r10 // acc[2] += high[m * N[1]] movq %r9, %rsi // acc[1] --> rsi movq %r8, %rdx // m --> rdx adcq $0, %rcx // m - borrwoto acc[3] imulq 32(%rbp), %r9 // m = acc[1] * LordK --> r9 shlq $32, %rax // low(m) --> rax low(m * 2^228) shrq $32, %rdx // high(m) --> rdx high(m * 2^228) subq %rax, %r11 // acc[3] - low(m * 2^228) movq (%rbp), %rax // N[0] --> rax sbbq %rdx, %r8 // m - high(m * 2^228) to acc[4] addq %rcx, %r11 // acc[3] += m + carry - borrow adcq $0, %r8 // to acc[4] /* Second reduction */ mulq %r9 // rdx:rax = m * N[0] addq %rax, %rsi // acc[1] += rax --> 0 movq %r9, %rcx // m --> rcx adcq %rdx, %rsi // rsi = high[m * N[0]] + carry --> acc[2] movq 8(%rbp), %rax // N[1] --> rax subq %r9, %r11 // acc[3] -= m sbbq $0, %rcx // m - borrow --> rcx mulq %r9 // rdx:rax = m * N[1] addq %rsi, %r10 // acc[2] += high[m * N[1]] + carry adcq $0, %rdx // rdx += carry, no overflow addq %rax, %r10 // acc[2] += rax movq %r9, %rax // m --> rax adcq %rdx, %r11 // acc[3] += rdx movq %r10, %rsi // acc[2] --> rsi movq %r9, %rdx // m --> rdx adcq $0, %rcx // m - borrow + carry --> rcx imulq 32(%rbp), %r10 // m = acc[2] * LordK --> r10 shlq $32, %rax // low(m * 2^228) shrq $32, %rdx // high(m * 2^228) subq %rax, %r8 // t0 acc[4] - low(m * 2^228) movq (%rbp), %rax // N[0] --> rax sbbq %rdx, %r9 // m - high(m * 2^228) to acc[5] addq %rcx, %r8 // to acc[4] adcq $0, %r9 // to acc[5] /* Third reduction */ mulq %r10 // rdx:rax = m * N[0] movq %r10, %rcx // m --> rcx addq %rax, %rsi // acc[2] += rax --> 0 adcq %rdx, %rsi // rsi = high[m * N[0]] + carry --> acc[3] movq 8(%rbp), %rax // N[1] --> rax subq %r10, %r8 // to acc[4] -= m sbbq $0, %rcx // m - borrow --> rcx mulq %r10 // rdx:rax = m * N[1] addq %rsi, %r11 // acc[3] += high[m * N[1]] + carry adcq $0, %rdx // rdx += carry, no overflow addq %rax, %r11 // acc[3] += rax movq %r10, %rax // m --> rax adcq %rdx, %r8 // to acc[4] += rdx movq %r11, %rsi // acc[3] --> rsi movq %r10, %rdx // m --> rdx adcq $0, %rcx // m - borrow + carry --> rcx imulq 32(%rbp), %r11 // m = acc[3] * LordK --> r11 shlq $32, %rax // low(m * 2^228) shrq $32, %rdx // high(m * 2^228) subq %rax, %r9 // to acc[5]: - low(m * 2^228) sbbq %rdx, %r10 // to acc[6]: m - high(m * 2^228) movq (%rbp), %rax // N[0] --> rax addq %rcx, %r9 // to acc[5] adcq $0, %r10 // to acc[6] /* Last reduction */ mulq %r11 // rdx:rax = m * N[0] addq %rax, %rsi // acc[3] += rax --> 0 movq %r11, %rcx // m --> rcx adcq %rdx, %rsi // rsi = high[m * N[0]] + carry --> acc[4] movq 8(%rbp), %rax // N[1] --> rax subq %r11, %r9 // to acc[5] : -= m sbbq $0, %rcx // to acc[6] : m - borrow mulq %r11 // rdx:rax = m * N[1] addq %rsi, %r8 // to acc[4]: += high[m * N[1]] + carry adcq $0, %rdx // rdx += carry, no overflow addq %rax, %r8 // to acc[4]: += rax movq %r11, %rax // m --> rax adcq %rdx, %r9 // to acc[5]: += rdx movq %r11, %rdx // m --> rdx adcq $0, %rcx // m - borrow + carry --> rcx shlq $32, %rax // low(m * 2^228) shrq $32, %rdx // high(m * 2^228) subq %rax, %r10 // to acc[6]: - low(m * 2^228) sbbq %rdx, %r11 // to acc[7]: m - high(m * 2^228) addq %rcx, %r10 // to acc[6] adcq $0, %r11 // to acc[7] /* r15 r14 r13 r12 + r11 r10 r9 r8 */ xorq %rdx, %rdx addq %r12, %r8 adcq %r13, %r9 movq %r8, %r12 adcq %r14, %r10 adcq %r15, %r11 movq %r9, %rax adcq $0, %rdx subq (%rbp), %r8 movq %r10, %r14 sbbq 8(%rbp), %r9 sbbq 16(%rbp), %r10 movq %r11, %r15 sbbq 24(%rbp), %r11 sbbq $0, %rdx cmovcq %r12, %r8 cmovncq %r9, %rax cmovncq %r10, %r14 cmovncq %r11, %r15 // r8 rax r14 r15 decq %rbx jnz .Lord_sqr_loop movq %r8, (%rdi) movq %rax, 8(%rdi) vpxor %xmm2, %xmm2, %xmm2 movq %r14, 16(%rdi) vpxor %xmm3, %xmm3, %xmm3 movq %r15, 24(%rdi) vpxor %xmm1, %xmm1, %xmm1 movq (%rsp), %r15 movq 8(%rsp), %r14 movq 16(%rsp), %r13 movq 24(%rsp), %r12 movq 32(%rsp), %rbp movq 40(%rsp), %rbx leaq 48(%rsp), %rsp ret .cfi_endproc .size ECP256_OrdSqr, .-ECP256_OrdSqr /** * Function description: half calculation of the ECP256 field: res = a/2 mod P * Input register: * rdi: Pointer to the output Coord structure * r8: a[0] * r9: a[1] * r10:a[2] * r11:a[3] * r14:P[1] * r15:P[3] * Change register: rax, rcx, rdx, rsi, r8, r9, r10, r11, r12, r13 * Output register: r8, r9, r10, r11 */ .type ECP256_DivBy2Core,@function ECP256_DivBy2Core: .cfi_startproc xorq %r13, %r13 movq %r8, %rax movq %r9, %rcx addq $-1, %r8 movq %r10, %rdx adcq %r14, %r9 movq %r11, %r12 adcq $0, %r10 adcq %r15, %r11 adcq $0, %r13 xorq %rsi, %rsi testq $1, %rax cmovzq %rax, %r8 cmovzq %rcx, %r9 cmovzq %rdx, %r10 cmovzq %r12, %r11 movq %r9, %rcx cmovzq %rsi, %r13 movq %r10, %rdx movq %r11, %r12 shrq $1, %r8 shlq $63, %rcx shrq $1, %r9 shlq $63, %rdx shrq $1, %r10 orq %rcx, %r8 shlq $63, %r12 shrq $1, %r11 shlq $63, %r13 orq %rdx, %r9 orq %r12, %r10 orq %r13, %r11 movq %r8, (%rdi) movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size ECP256_DivBy2Core, .-ECP256_DivBy2Core /** * Function description: Half calculation of the ECP256 field: res = a/2 mod P * Function prototype: void ECP256_DivBy2(Coord *r, const Coord *a); * Input register: * rdi: Pointer to the output Coord structure * rsi: Address pointing to input data a * Change register: rax, rcx, rdx, rsi, r8, r9, r10, r11, r12, r13, r14, r15 * Output register: None * Function/macro call: Call ECP256_DivBy2Core to implement half calculation. */ .globl ECP256_DivBy2 .type ECP256_DivBy2, @function ECP256_DivBy2: .cfi_startproc pushq %r12 pushq %r13 pushq %r14 pushq %r15 movq (%rsi), %r8 movq 8(%rsi), %r9 movq 16(%rsi), %r10 movq 24(%rsi), %r11 movq 8+.Lpoly(%rip), %r14 movq 24+.Lpoly(%rip), %r15 call ECP256_DivBy2Core movq (%rsp), %r15 movq 8(%rsp), %r14 movq 16(%rsp), %r13 movq 24(%rsp), %r12 leaq 32(%rsp), %rsp ret .cfi_endproc .size ECP256_DivBy2, .-ECP256_DivBy2 /* r14 = .Lpoly[1], r15 = .Lpoly[3] */ .type ECP256_MulBy2Core,@function .align 32 ECP256_MulBy2Core: .cfi_startproc xorq %r13, %r13 addq %r8, %r8 adcq %r9, %r9 movq %r8, %rax adcq %r10, %r10 adcq %r11, %r11 movq %r9, %rcx adcq $0, %r13 subq $-1, %r8 movq %r10, %rdx sbbq %r14, %r9 movq %r11, %r12 sbbq $0, %r10 sbbq %r15, %r11 sbbq $0, %r13 cmovcq %rax, %r8 // Obtain mod P result cmovcq %rcx, %r9 movq %r8, (%rdi) cmovcq %rdx, %r10 movq %r9, 8(%rdi) cmovcq %r12, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size ECP256_MulBy2Core, .-ECP256_MulBy2Core .globl ECP256_MulBy2 .type ECP256_MulBy2,@function .align 32 ECP256_MulBy2: .cfi_startproc pushq %r12 pushq %r13 movq (%rsi), %r8 movq 8(%rsi), %r9 movq 16(%rsi), %r10 movq 24(%rsi), %r11 xorq %r13, %r13 leaq .Lpoly(%rip), %rsi addq %r8, %r8 adcq %r9, %r9 movq %r8, %rax adcq %r10, %r10 adcq %r11, %r11 movq %r9, %rcx adcq $0, %r13 subq $-1, %r8 movq %r10, %rdx sbbq 8(%rsi), %r9 movq %r11, %r12 sbbq $0, %r10 sbbq 24(%rsi), %r11 sbbq $0, %r13 cmovcq %rax, %r8 // Obtain mod P result cmovcq %rcx, %r9 movq %r8, (%rdi) cmovcq %rdx, %r10 movq %r9, 8(%rdi) cmovcq %r12, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) movq 0(%rsp), %r13 movq 8(%rsp), %r12 leaq 16(%rsp), %rsp ret .cfi_endproc .size ECP256_MulBy2, .-ECP256_MulBy2 /* r14 = .Lpoly[1], r15 = .Lpoly[3] */ .type ECP256_MulBy3Core,@function .align 32 ECP256_MulBy3Core: .cfi_startproc xorq %r13, %r13 addq %r8, %r8 adcq %r9, %r9 movq %r8, %rax adcq %r10, %r10 adcq %r11, %r11 movq %r9, %rcx adcq $0, %r13 subq $-1, %r8 movq %r10, %rdx sbbq %r14, %r9 movq %r11, %r12 sbbq $0, %r10 sbbq %r15, %r11 sbbq $0, %r13 cmovcq %rax, %r8 // Obtain mod P result cmovcq %rcx, %r9 cmovcq %rdx, %r10 cmovcq %r12, %r11 xorq %r13, %r13 addq (%rsi), %r8 adcq 8(%rsi), %r9 movq %r8, %rax adcq 16(%rsi), %r10 adcq 24(%rsi), %r11 movq %r9, %rcx adcq $0, %r13 subq $-1, %r8 movq %r10, %rdx sbbq %r14, %r9 sbbq $0, %r10 movq %r11, %r12 sbbq %r15, %r11 sbbq $0, %r13 cmovcq %rax, %r8 // Obtain mod P result cmovcq %rcx, %r9 movq %r8, (%rdi) cmovcq %rdx, %r10 movq %r9, 8(%rdi) cmovcq %r12, %r11 movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size ECP256_MulBy3Core, .-ECP256_MulBy3Core .globl ECP256_MulBy3 .type ECP256_MulBy3,@function .align 32 ECP256_MulBy3: .cfi_startproc pushq %r12 pushq %r13 pushq %r14 pushq %r15 movq (%rsi), %r8 movq 8(%rsi), %r9 movq 16(%rsi), %r10 movq 24(%rsi), %r11 movq 8+.Lpoly(%rip), %r14 movq 24+.Lpoly(%rip), %r15 call ECP256_MulBy3Core movq (%rsp), %r15 movq 8(%rsp), %r14 movq 16(%rsp), %r13 movq 24(%rsp), %r12 leaq 32(%rsp), %rsp ret .cfi_endproc .size ECP256_MulBy3, .-ECP256_MulBy3 /** * Function description: This function is used to calculate the Montgomery multiplication of the ord(P256) field: * res = a * b * 2^(-256) mod ord(P) * Input register: * rdi: Pointer to the output Coord structure * rsi: Address pointing to input data a * rdx: Address pointing to input data b * Change register: rax, rbx, rcx, rdx, rbp, r8, r9, r10, r11, r12, r13, r14, r15 * Function/Macro invoking: The calculation can be implemented by calling ECP256_OrdMulCore. */ .globl ECP256_OrdMul .type ECP256_OrdMul,@function .align 32 ECP256_OrdMul: .cfi_startproc pushq %rbx pushq %rbp pushq %r12 pushq %r13 pushq %r14 pushq %r15 movq %rdx, %rcx // rdx used to output the mul multiplication result. // The rcx saves the b address. leaq .Lord(%rip), %r15 movq .LordK(%rip), %r14 movq (%rdx), %rax // b[0] //a[0-3] * b[0] movq %rax, %rbp // save b[0] mulq (%rsi) // a[0] * b[0] movq %rax, %r8 movq %rbp, %rax // b[0] movq %rdx, %r9 mulq 8(%rsi) // a[1] * b[0] addq %rax, %r9 movq %rbp, %rax adcq $0, %rdx // a[1:0] * b[0] The result must be less than 2 ^ 192, // So no carry is required. movq %rdx, %r10 mulq 16(%rsi) // a[2] * b[0] addq %rax, %r10 movq %rbp, %rax adcq $0, %rdx movq %rdx, %r11 mulq 24(%rsi) // a[3] * b[0] addq %rax, %r11 adcq $0, %rdx movq %r8, %r13 movq %rdx, %r12 // First round multiplication results r12 r11 r10 r9 r8 // First round of reduction // n[0] = 0xf3b9cac2fc632551 // n[1] = 0xbce6faada7179e84 // n[2] = 0xffffffffffffffff, lo(q*n[2]) = -q , hi(q*n[2]) = q // n[3] = 0xffffffff00000000, lo(q*n[3]) = -lq<<32, hi(q*n[3]) = q-hq imulq %r14, %r8 // r8 = r8 * ordK = q movq %r8, %rax mulq (%r15) // n[0] * q addq %rax, %r13 // %r13 must be 0. adcq $0, %rdx // hi(n[0]*q) + 1 < 2^32 + 1 < 2^64 No further carry is required. movq %r8, %rax movq %rdx, %rbp // %rbp = hi(n[0]*q) mulq 8(%r15) // n[1] * q addq %rbp, %rax // %rax = lo(n[1]*q)+hi(n[0]*q) adcq $0, %rdx // %rdx = hi(n[1]*q), be the same as the above hi(n[1]*q) + 1 < 2^64 // No further carry is required. movq %r8, %rbx subq %r8, %r10 // r10 = r[2] - q sbbq $0, %rbx // When q>0, rbx - 1 = q - 1 >= 0, when q=0 (r[2]-q) does not borrow, // rbx = rbx - 0 >= 0, so the following formula does not borrow addq %rax, %r9 // r9 = r[1] + lo(n[1]*q) + hi(n[0]*q) adcq %rdx, %r10 // r10 = r[2] - q + hi(n[1]*q) movq %r8, %rax adcq $0, %rbx // Overflowing is not possible. movq %r8, %rdx shrq $32, %rax // rax = hq shlq $32, %rdx // rdx = lq<<32 subq %rdx, %rbx // q - lq<<32 sbbq %rax, %r8 // r8 = q - hq = hq * 2^32 + lq - hq >= lq, // When lq!=0, The following formula does not borrow. // When lq==0, the upper formula does not borrow. adcq %rbx, %r11 movq 8(%rcx), %rax adcq %r8, %r12 movq %rax, %rbp adcq $0, %r13 // a[0-3] * b[1] mulq (%rsi) addq %rax, %r9 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 8(%rsi) addq %rbx, %r10 adcq $0, %rdx addq %rax, %r10 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 16(%rsi) addq %rbx, %r11 adcq $0, %rdx addq %rax, %r11 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx xorq %r8, %r8 // r8 = 0 mulq 24(%rsi) addq %rbx, %r12 adcq $0, %rdx addq %rax, %r12 adcq %rdx, %r13 movq %r9, %rbx adcq $0, %r8 // Second round of multiplication results r9,r10,r11,r12,r13,r8 // Second round of reduction imulq %r14, %r9 // r9 = r9 * ordK = q movq %r9, %rax mulq (%r15) // n[0] * q addq %rax, %rbx // %rbx must be 0 adcq $0, %rdx // hi(n[0]*q) + 1 < 2^32 + 1 < 2^64 No further carry is required movq %r9, %rax movq %rdx, %rbp // %rbp = hi(n[0]*q) mulq 8(%r15) // n[1] * q addq %rbp, %rax // %rax = lo(n[1]*q)+hi(n[0]*q) adcq $0, %rdx // %rdx = hi(n[1]*q), be the same as the above hi(n[1]*q) + 1 < 2^64 // No further carry is required movq %r9, %rbx subq %r9, %r11 // r11 = r[2] - q sbbq $0, %rbx // when q>0 rbx - 1 = q - 1 >= 0, // When q=0 (r[2]-q) does not borrow, rbx = rbx - 0 >= 0, // So the following equation does not borrow addq %rax, %r10 // r10 = r[1] + lo(n[1]*q) + hi(n[0]*q) adcq %rdx, %r11 // r11 = r[2] - q + hi(n[1]*q) movq %r9, %rax adcq $0, %rbx // Overflowing is not possible. movq %r9, %rdx shrq $32, %rax // rax = hq shlq $32, %rdx // rdx = lq<<32 subq %rdx, %rbx // q - lq<<32 sbbq %rax, %r9 // r9 = q - hq = hq * 2^32 + lq - hq >= lq, // When lq!=0, The following formula does not borrow. // When lq==0, the preceding formula does not borrow. movq 16(%rcx), %rax adcq %rbx, %r12 adcq %r9, %r13 adcq $0, %r8 // a[0-3] * b[2] movq %rax, %rbp mulq (%rsi) // a[0] * b[2] addq %rax, %r10 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 8(%rsi) addq %rbx, %r11 adcq $0, %rdx addq %rax, %r11 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 16(%rsi) addq %rbx, %r12 adcq $0, %rdx addq %rax, %r12 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx xorq %r9, %r9 mulq 24(%rsi) addq %rbx, %r13 adcq $0, %rdx addq %rax, %r13 adcq %rdx, %r8 movq %r10, %rbx adcq $0, %r9 // Third round reduction imulq %r14, %r10 // r10 = r10 * ordK = q movq %r10, %rax mulq (%r15) // n[0] * q addq %rax, %rbx // %rbx must be 0 adcq $0, %rdx // hi(n[0]*q) + 1 < 2^32 + 1 < 2^64 no further carry is required. movq %r10, %rax movq %rdx, %rbp // %rbp = hi(n[0]*q) mulq 8(%r15) // n[1] * q addq %rbp, %rax // %rax = lo(n[1]*q)+hi(n[0]*q) adcq $0, %rdx // %rdx = hi(n[1]*q), same as above hi(n[1]*q) + 1 < 2^64 no further carry is required. movq %r10, %rbx subq %r10, %r12 // r12 = r[2] - q sbbq $0, %rbx // if q>0, rbx - 1 = q - 1 >= 0. // if q=0, (r[2]-q) Won't borrow , rbx = rbx - 0 >= 0, // the following formula will not borrow. addq %rax, %r11 // r11 = r[1] + lo(n[1]*q) + hi(n[0]*q) adcq %rdx, %r12 // r12 = r[2] - q + hi(n[1]*q) movq %r10, %rax adcq $0, %rbx // Overflowing is not possible. movq %r10, %rdx shrq $32, %rax // rax = hq shlq $32, %rdx // rdx = lq<<32 subq %rdx, %rbx // q - lq<<32 sbbq %rax, %r10 // r10 = q - hq = hq * 2^32 + lq - hq >= lq, // if lq!=0, the following formula does not borrow, // if lq==0, The above formula does not borrow. movq 24(%rcx), %rax adcq %rbx, %r13 adcq %r10, %r8 adcq $0, %r9 // a[0-3] * b[3] movq %rax, %rbp mulq (%rsi) // a[0] * b[3] addq %rax, %r11 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 8(%rsi) addq %rbx, %r12 adcq $0, %rdx addq %rax, %r12 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx mulq 16(%rsi) addq %rbx, %r13 adcq $0, %rdx addq %rax, %r13 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rbx xorq %r10, %r10 mulq 24(%rsi) addq %rbx, %r8 adcq $0, %rdx addq %rax, %r8 adcq %rdx, %r9 movq %r11, %rbx adcq $0, %r10 // last round reduction. imulq %r14, %r11 // r11 = r11 * ordK = q movq %r11, %rax mulq (%r15) // n[0] * q addq %rax, %rbx // %rbx must be 0 adcq $0, %rdx // hi(n[0]*q) + 1 < 2^32 + 1 < 2^64 no further carry is required. movq %r11, %rax movq %rdx, %rbp // %rbp = hi(n[0]*q) mulq 8(%r15) // n[1] * q addq %rbp, %rax // %rax = lo(n[1]*q)+hi(n[0]*q) adcq $0, %rdx // %rdx = hi(n[1]*q), same as above, // hi(n[1]*q) + 1 < 2^64 no further carry is required. movq %r11, %rbx subq %r11, %r13 // r13 = r[2] - q sbbq $0, %rbx // When q>0 rbx - 1 = q - 1 >= 0, // When q=0,(r[2]-q)No borrowing, rbx = rbx - 0 >= 0, // so the following formula does not borrow. addq %rax, %r12 // r12 = r[1] + lo(n[1]*q) + hi(n[0]*q) adcq %rdx, %r13 // r13 = r[2] - q + hi(n[1]*q) movq %r11, %rax adcq $0, %rbx // Overflowing is not possible. movq %r11, %rdx shrq $32, %rax // rax = hq shlq $32, %rdx // rdx = lq<<32 subq %rdx, %rbx // q - lq<<32 sbbq %rax, %r11 // r11 = q - hq = hq * 2^32 + lq - hq >= lq, // when lq!=0, the following formula does not borrow. // When lq==0, the preceding formula does not borrow. adcq %rbx, %r8 adcq %r11, %r9 adcq $0, %r10 // mod n movq %r12, %rbx movq %r13, %rbp movq %r8, %rax movq %r9, %rdx subq (%r15), %r12 sbbq 8(%r15), %r13 sbbq 16(%r15), %r8 sbbq 24(%r15), %r9 sbbq $0, %r10 cmovcq %rbx, %r12 cmovcq %rbp, %r13 cmovcq %rax, %r8 cmovcq %rdx, %r9 movq %r12, (%rdi) movq %r13, 8(%rdi) movq %r8, 16(%rdi) movq %r9, 24(%rdi) movq (%rsp), %r15 movq 8(%rsp), %r14 movq 16(%rsp), %r13 movq 24(%rsp), %r12 movq 32(%rsp), %rbp movq 40(%rsp), %rbx leaq 48(%rsp), %rsp ret .cfi_endproc .size ECP256_OrdMul, .-ECP256_OrdMul /** * Function description: Calculate the point doubling of an elliptic curve: res = 2*a * Function prototype: void ECP256_PointDouble(P256_Point *r, const P256_Point *a); * Input register: * rdi: pointer to the output P256_POINT structure * rsi: address pointing to input data a * Change register: rax, rbx, rcx, rdx, rbp, rsi, r8, r9, r10, r11, r12, r13, r14, r15 * Function/Macro Call: ECP256_MulBy2Core, ECP256_SqrCore_q, ECP256_AddCore, ECP256_MulCore_q, ECP256_SubCore * ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#doubling-dbl-2001-b * Deal process: * delta = Z12 * gamma = Y12 * beta = X1*gamma * alpha = 3*(X1-delta)*(X1+delta) * X3 = alpha2-8*beta * Z3 = (Y1+Z1)2-gamma-delta * Y3 = alpha*(4*beta-X3)-8*gamma2 */ .globl ECP256_PointDouble .type ECP256_PointDouble,@function .align 32 ECP256_PointDouble: .cfi_startproc pushq %rbx pushq %rbp pushq %r12 pushq %r13 pushq %r14 pushq %r15 subq $168, %rsp // Create 32 x 5 + 8 stack space. .Lpoint_double_core: vmovdqu (%rsi), %xmm0 // Save x to stack vmovdqu 16(%rsi), %xmm1 vmovdqa %xmm0, (%rsp) vmovdqa %xmm1, 16(%rsp) vmovq %rsi, %xmm3 // Backup a vmovq %rdi, %xmm0 // Backup &r->x, &r->y, &r->z leaq 32(%rdi), %r12 leaq 64(%rdi), %r13 vmovq %r12, %xmm1 vmovq %r13, %xmm2 movq 32(%rsi), %r8 // Read a->y movq 40(%rsi), %r9 movq 48(%rsi), %r10 movq 56(%rsi), %r11 movq 8+.Lpoly(%rip), %r14 // Read P[1], P[3] movq 24+.Lpoly(%rip), %r15 leaq 32(%rsp), %rdi call ECP256_MulBy2Core // ECP256_MulBy2(S, &a->y), Not overwritten rsi movq 64(%rsi), %rax movq 72(%rsi), %r14 movq 80(%rsi), %rbp movq 88(%rsi), %r15 leaq 64(%rsi), %rsi // Setting Input Parameters leaq 64(%rsp), %rdi // Z2 = rsp + 64 call ECP256_SqrCore_q // ECP256_Sqr(Z2, &a->z) leaq (%rsp), %rdx leaq 96(%rsp), %rdi // M = rsp + 96 call ECP256_AddCore // ECP256_Add(M, a->x, Z2) movq 32(%rsp), %rax movq 40(%rsp), %r14 movq 48(%rsp), %rbp movq 56(%rsp), %r15 leaq 32(%rsp), %rdi // S = rsp + 32 call ECP256_SqrCore_q // ECP256_Sqr(S, S) vmovq %xmm3, %rcx leaq 32(%rcx), %rsi leaq 64(%rcx), %rcx vmovq %xmm2, %rdi call ECP256_MulCore_q // ECP256_Mul(r->z, a->y, a->z) call ECP256_MulBy2Core // ECP256_MulBy2(r->z, r->z) movq (%rsp), %r8 movq 8(%rsp), %r9 movq 16(%rsp), %r10 movq 24(%rsp), %r11 leaq 64(%rsp), %rdx call ECP256_SubCore // ECP256_SubCore(Z2,a->x,Z2) movq %r8, 64(%rsp) movq %r9, 72(%rsp) movq %r10, 80(%rsp) movq %r11, 88(%rsp) movq 32(%rsp), %rax movq 40(%rsp), %r14 movq 48(%rsp), %rbp movq 56(%rsp), %r15 vmovq %xmm1, %rdi call ECP256_SqrCore_q // ECP256_Sqr(r->y,S) call ECP256_DivBy2Core // ECP256_Div(r->y,r->y) leaq 96(%rsp), %rdi leaq 96(%rsp), %rsi leaq 64(%rsp), %rcx call ECP256_MulCore_q // ECP256_MulCore_q(M,M,Z2) call ECP256_MulBy3Core // ECP256_MulBy3Core(M,M) leaq (%rsp), %rcx leaq 32(%rsp), %rsi leaq 32(%rsp), %rdi call ECP256_MulCore_q // ECP256_MulCore_q(S, S, a->x) leaq 128(%rsp), %rdi // T = 128 + rsp call ECP256_MulBy2Core // ECP256_MulBy2Core(T, S) movq 96(%rsp), %rax movq 104(%rsp), %r14 movq 112(%rsp), %rbp movq 120(%rsp), %r15 vmovq %xmm0, %rdi call ECP256_SqrCore_q // ECP256_Sqr(r->x, M) leaq 128(%rsp), %rdx call ECP256_SubCore // ECP256_SubCore(r->x, r->x, T) movq %r8, (%rdi) movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) xorq %rsi, %rsi // ECP256_SubCore(S, S, r->x), output %r12, %r13, %r8, %r9 movq 32(%rsp), %rax movq 40(%rsp), %rbx movq 48(%rsp), %rcx subq %r8, %rax sbbq %r9, %rbx movq 56(%rsp), %rdx movq %rax, %r12 sbbq %r10, %rcx sbbq %r11, %rdx movq %rbx, %r13 movq %rcx, %r8 sbbq $0, %rsi addq $-1, %rax movq %rdx, %r9 adcq %r14, %rbx adcq $0, %rcx adcq %r15, %rdx testq %rsi, %rsi cmovnzq %rax, %r12 cmovnzq %rbx, %r13 cmovnzq %rcx, %r8 cmovnzq %rdx, %r9 movq %r12, 32(%rsp) movq %r13, 40(%rsp) movq %r8, 48(%rsp) movq %r9, 56(%rsp) leaq 32(%rsp), %rdi leaq 32(%rsp), %rsi leaq 96(%rsp), %rcx call ECP256_MulCore_q // ECP256_MulCore_q(S, S, M) vmovq %xmm1, %rdx vmovq %xmm1, %rdi call ECP256_SubCore // ECP256_SubCore(r->y, S, r->y) movq %r8, (%rdi) movq %r9, 8(%rdi) leaq 168+48(%rsp), %rsi movq %r10, 16(%rdi) movq %r11, 24(%rdi) movq -48(%rsi), %r15 movq -40(%rsi), %r14 movq -32(%rsi), %r13 movq -24(%rsi), %r12 movq -16(%rsi), %rbp movq -8(%rsi), %rbx leaq (%rsi), %rsp ret .cfi_endproc .size ECP256_PointDouble, .-ECP256_PointDouble /** * Function description: Elliptic curve point addition calculation: res = a + b * Function prototype: void ECP256_PointAdd(P256_Point *r, const P256_Point *a, const P256_Point *b); * Input register: * rdi: Pointer to the output P256_POINT structure * rsi: Address pointing to input data a * rdx: Address pointing to input data b * Change register: rax, rbx, rcx, rdx, rbp, rsi, r8, r9, r10, r11, r12, r13, r14, r15 * Function/Macro Call: ECP256_PointDouble, ECP256_SqrCore_q, ECP256_MulCore_q, ECP256_SubCore, ECP256_MulBy2Core * ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-1998-cmo * Deal process: * U1 = X1*Z22 * U2 = X2*Z12 * S1 = Y1*Z23 * S2 = Y2*Z13 * H = U2-U1 * r = S2-S1 * X3 = r2-H3-2*U1*H2 * Y3 = r*(U1*H2-X3)-S1*H3 * Z3 = Z1*Z2*H */ .globl ECP256_PointAdd .type ECP256_PointAdd,@function .align 32 ECP256_PointAdd: .cfi_startproc pushq %rbx pushq %rbp pushq %r12 pushq %r13 pushq %r14 pushq %r15 subq $640+8, %rsp // Create 32 x 20 + 8 stack space. vmovdqu (%rsi), %xmm0 vmovdqu 16(%rsi), %xmm1 vmovdqu 32(%rsi), %xmm2 vmovdqu 48(%rsi), %xmm3 vmovdqu 64(%rsi), %xmm4 vmovdqu 80(%rsi), %xmm5 movq %rsi, %rcx movq %rdx, %rsi vmovdqu %xmm0, (%rsp) // Save a on the stack, a_cpy: 0~96(%rsp) vmovdqu %xmm1, 16(%rsp) vmovdqu %xmm2, 32(%rsp) vmovdqu %xmm3, 48(%rsp) vmovdqu %xmm4, 64(%rsp) vmovdqu %xmm5, 80(%rsp) vpor %xmm4, %xmm5, %xmm5 // xmm5 = (Za[3]|Za[1], Za[2]|Za[0]) vmovdqu (%rsi), %xmm0 vpshufd $0xb1, %xmm5, %xmm3 // xmm3 = ((lo(Za[3]|Za[1])<<32) | hi(Za[3]|Za[1]), (lo(Za[2]|Za[0])<<32) | hi(Za[2]|Za[0])) vmovdqu 16(%rsi), %xmm1 vmovdqu 32(%rsi), %xmm2 vpor %xmm3, %xmm5, %xmm5 // xmm5 = ((lo(Za[3]|Za[1])|hi(Za[3]|Za[1]))##~, (lo(Za[2]|Za[0])|hi(Za[2]|Za[0]))##~) vmovdqu 48(%rsi), %xmm3 movq 64(%rsi), %rax // Read b.z, then calculate (b.z)^2 movq 72(%rsi), %r14 movq 80(%rsi), %rbp movq 88(%rsi), %r15 vmovdqu %xmm0, 96(%rsp) // Save b on the stack. b_cpy: 96–192(%rsp) vpshufd $0x1e, %xmm5, %xmm4 // xmm4 = ((lo(Za[2]|Za[0])|hi(Za[2]|Za[0]))##~, (lo(Za[3]|Za[1])|hi(Za[3]|Za[1]))##~) vmovdqu %xmm1, 112(%rsp) vmovdqu 64(%rsi), %xmm0 vmovdqu 80(%rsi), %xmm1 vmovdqu %xmm2, 128(%rsp) vmovdqu %xmm3, 144(%rsp) vpor %xmm4, %xmm5, %xmm5 // xmm5 = ((lo(Za[0]|Za[1]|Za[2]|Za[3])|hi(Za[0]|Za[1]|Za[2]|Za[3]))##~##~##~) vpxor %xmm4, %xmm4, %xmm4 vpor %xmm0, %xmm1, %xmm1 vmovq %rdi, %xmm0 // Backup rdi movq %rax, 160(%rsp) movq %r14, 168(%rsp) leaq 192(%rsp), %rdi // Zb^2: 192~224(%rsp) movq %rbp, 176(%rsp) movq %r15, 184(%rsp) vmovq %rcx, %xmm2 // Backup a call ECP256_SqrCore_q // sqr(Zb^2, Zb) vpcmpeqd %xmm4, %xmm5, %xmm5 // a_infty, Whether a is an infinity point (Za == 0) vpshufd $0xb1, %xmm1, %xmm4 vpor %xmm1, %xmm4, %xmm4 vpshufd $0x1e, %xmm4, %xmm3 vpor %xmm3, %xmm4, %xmm4 vpxor %xmm3, %xmm3, %xmm3 vpcmpeqd %xmm3, %xmm4, %xmm4 // b_infty, Whether b is an infinity point (Zb == 0) movq 64(%rsp), %rax movq 72(%rsp), %r14 leaq 224(%rsp), %rdi // Za^2: 224~256(%rsp) movq 80(%rsp), %rbp movq 88(%rsp), %r15 call ECP256_SqrCore_q // sqr(Za^2, Za) leaq 160(%rsp), %rsi // Zb leaq 192(%rsp), %rcx // Zb^2 leaq 256(%rsp), %rdi // S1: 256~288(%rsp) call ECP256_MulCore_q // mul(S1, Zb, Zb^2) leaq 64(%rsp), %rsi // Za leaq 224(%rsp), %rcx // Za^2 leaq 288(%rsp), %rdi // S2: 288~320(%rsp) call ECP256_MulCore_q // mul(S2, Za, Za^2) leaq 32(%rsp), %rsi // Ya leaq 256(%rsp), %rcx // S1 leaq 256(%rsp), %rdi // S1 call ECP256_MulCore_q // mul(S1,S1,Ya) leaq 128(%rsp), %rsi // Yb leaq 288(%rsp), %rcx // S2 leaq 288(%rsp), %rdi // S2 call ECP256_MulCore_q // mul(S2,S2,Yb) leaq 256(%rsp), %rdx // S1 call ECP256_SubCore // sub(R,S2,S1) movq %r8, 320(%rsp) // R: 320~352(%rsp) movq %r9, 328(%rsp) movq %r10, 336(%rsp) movq %r11, 344(%rsp) orq %r9, %r8 vmovdqa %xmm4, %xmm1 orq %r10, %r8 orq %r11, %r8 vpor %xmm5, %xmm1, %xmm1 // a_infty | b_infty vmovq %r8, %xmm3 leaq (%rsp), %rsi // Xa leaq 192(%rsp), %rcx // Zb^2 leaq 352(%rsp), %rdi // U1: 352~384(%rsp) call ECP256_MulCore_q // Mul(U1, Xa, Zb^2) leaq 96(%rsp), %rsi // Xb leaq 224(%rsp), %rcx // Za^2 leaq 384(%rsp), %rdi // U2: 384~416(%rsp) call ECP256_MulCore_q // Mul(U2, Xb, Za^2) leaq 352(%rsp), %rdx // U1 leaq 416(%rsp), %rdi // H: 416~448(%rsp) call ECP256_SubCore // sub(H,U2,U1) movq %r8, 416(%rsp) movq %r9, 424(%rsp) movq %r10, 432(%rsp) movq %r11, 440(%rsp) orq %r9, %r8 vmovq %xmm1, %r12 orq %r10, %r8 vmovq %xmm3, %r13 orq %r11, %r8 orq %r12, %r8 orq %r13, %r8 jnz .Lpoint_add .Lequal_point: vmovq %xmm0, %rdi vmovq %xmm2, %rsi addq $640-32*5, %rsp jmp .Lpoint_double_core .align 32 .Lpoint_add: movq 320(%rsp), %rax // R movq 328(%rsp), %r14 leaq 448(%rsp), %rdi // R^2: 448~480(%rsp) movq 336(%rsp), %rbp movq 344(%rsp), %r15 call ECP256_SqrCore_q // sqr(R^2,R) leaq 64(%rsp), %rsi // Za leaq 416(%rsp), %rcx // H leaq 480(%rsp), %rdi // Zr:480~512(%rsp) call ECP256_MulCore_q // Mul(Zr,H,Za) movq 416(%rsp), %rax // H movq 424(%rsp), %r14 leaq 512(%rsp), %rdi // H^2:512~544(%rsp) movq 432(%rsp), %rbp movq 440(%rsp), %r15 call ECP256_SqrCore_q // sqr(H^2, H) leaq 480(%rsp), %rdi // Zr leaq 480(%rsp), %rsi // Zr leaq 160(%rsp), %rcx // Zb call ECP256_MulCore_q // Mul(Zr, Zr, Zb) leaq 544(%rsp), %rdi // H3:544~576(%rsp) leaq 512(%rsp), %rsi // H2 leaq 416(%rsp), %rcx // H call ECP256_MulCore_q // mul(H^3,H,H^2) leaq 384(%rsp), %rdi // U2 leaq 352(%rsp), %rsi // U1 leaq 512(%rsp), %rcx // H2 call ECP256_MulCore_q // mul(U2,U1,H^2) leaq 512(%rsp), %rdi // H^2 call ECP256_MulBy2Core // mulby2(H^2,U2) movq 448(%rsp), %rax // sub(Xr,R^2,H^2) movq 456(%rsp), %rbx xorq %rsi, %rsi movq 464(%rsp), %rcx movq 472(%rsp), %rdx subq %r8, %rax sbbq %r9, %rbx movq %rax, %r8 sbbq %r10, %rcx sbbq %r11, %rdx movq %rbx, %r9 sbbq $0, %rsi addq $-1, %r8 movq %rcx, %r10 adcq %r14, %r9 adcq $0, %r10 movq %rdx, %r11 adcq %r15, %r11 testq %rsi, %rsi cmovzq %rax, %r8 cmovzq %rbx, %r9 cmovzq %rcx, %r10 cmovzq %rdx, %r11 leaq 576(%rsp), %rdi // Xr: 576~608(%rsp) leaq 544(%rsp), %rdx // H^3 call ECP256_SubCore // sub(Xr, Xr, H^3) movq %r8, 576(%rsp) movq %r9, 584(%rsp) movq %r10, 592(%rsp) movq %r11, 600(%rsp) movq 384(%rsp), %rax // sub(Yr, U2, Xr) movq 392(%rsp), %rbx xorq %rsi, %rsi movq 400(%rsp), %rcx movq 408(%rsp), %rdx subq %r8, %rax sbbq %r9, %rbx movq %rax, %r8 sbbq %r10, %rcx sbbq %r11, %rdx movq %rbx, %r9 sbbq $0, %rsi addq $-1, %r8 movq %rcx, %r10 adcq %r14, %r9 adcq $0, %r10 movq %rdx, %r11 adcq %r15, %r11 testq %rsi, %rsi cmovzq %rax, %r8 cmovzq %rbx, %r9 cmovzq %rcx, %r10 cmovzq %rdx, %r11 movq %r8, 608(%rsp) // Yr: 608~640(%rsp) movq %r9, 616(%rsp) movq %r10, 624(%rsp) movq %r11, 632(%rsp) leaq 288(%rsp), %rdi // S2 leaq 256(%rsp), %rsi // S1 leaq 544(%rsp), %rcx // H^3 call ECP256_MulCore_q // Mul(S2, S1, H^3) leaq 608(%rsp), %rdi // Yr leaq 608(%rsp), %rsi leaq 320(%rsp), %rcx // r call ECP256_MulCore_q // Mul(Yr, Yr, R) leaq 608(%rsp), %rdi // Yr leaq 288(%rsp), %rdx // S2 call ECP256_SubCore // sub(Yr,Yr,S2) movq %r8, 608(%rsp) movq %r9, 616(%rsp) movq %r10, 624(%rsp) movq %r11, 632(%rsp) vmovq %xmm0, %rdi vmovdqa %xmm5, %xmm0 // a_infty vmovdqa %xmm5, %xmm1 vpandn 576(%rsp), %xmm0, %xmm0 // !a_infty & Xr vpandn 592(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm2 vmovdqa %xmm5, %xmm3 vpand 96(%rsp), %xmm2, %xmm2 // a_infty & Xb vpand 112(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 // a_infty ? Xb : Xr vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 // b_infty vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 // !b_infty & (a_infty ? Xb : Xr) vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm2 vmovdqa %xmm4, %xmm3 vpand (%rsp), %xmm2, %xmm2 // b_infty & Xa vpand 16(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 // b_infty ? Xa : (a_infty ? Xb : Xr) vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2, (%rdi) vmovdqu %xmm3, 16(%rdi) vmovdqa %xmm5, %xmm0 // a_infty vmovdqa %xmm5, %xmm1 vpandn 608(%rsp), %xmm0, %xmm0 // !a_infty & Yr vpandn 624(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm2 vmovdqa %xmm5, %xmm3 vpand 128(%rsp), %xmm2, %xmm2 // a_infty & Yb vpand 144(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 // a_infty ? Yb : Yr vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 // b_infty vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 // !b_infty & (a_infty ? Yb : Yr) vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm2 vmovdqa %xmm4, %xmm3 vpand 32(%rsp), %xmm2, %xmm2 // b_infty & Ya vpand 48(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 // b_infty ? Ya : (a_infty ? Yb : Yr) vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2, 32(%rdi) vmovdqu %xmm3, 48(%rdi) vmovdqa %xmm5, %xmm0 // a_infty vmovdqa %xmm5, %xmm1 vpandn 480(%rsp), %xmm0, %xmm0 // !a_infty & Zr vpandn 496(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm2 vmovdqa %xmm5, %xmm3 vpand 160(%rsp), %xmm2, %xmm2 // a_infty & Zb vpand 176(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 // a_infty ? Zb : Zr vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 // b_infty vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 // !b_infty & (a_infty ? Zb : Zr) vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm2 vmovdqa %xmm4, %xmm3 vpand 64(%rsp), %xmm2, %xmm2 // b_infty & Za vpand 80(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 // b_infty ? Za : (a_infty ? Zb : Zr) vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2, 64(%rdi) vmovdqu %xmm3, 80(%rdi) leaq 640+56(%rsp), %rsi movq -48(%rsi), %r15 movq -40(%rsi), %r14 movq -32(%rsi), %r13 movq -24(%rsi), %r12 movq -16(%rsi), %rbp movq -8(%rsi), %rbx leaq (%rsi), %rsp ret .cfi_endproc .size ECP256_PointAdd, .-ECP256_PointAdd /** * Function description: Point addition of normal coordinates and affine coordinates assembly implementation * Function prototype: void ECP256_AddAffine(P256_Point *r, const P256_Point *a, const P256_AffinePoint *b); * Input register: * rdi: Points to the returned P256_Point. * rsi: Points to the input P256_Point. * rdx: P256_AffinePoint that points to the input * Change register: rax, rbx, rcx, rdx, rsi, rdi, rbp, r8, r9, r10, r11, r12, r13, r14, r15 * Output register: None * Function/Macro Call: ECP256_MulBy2Core, ECP256_SqrCore_q, ECP256_AddCore, ECP256_MulCore_q, ECP256_SubCore * ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2007-bl * Deal process: * Z1Z1 = Z12 * U2 = X2*Z1Z1 * S2 = Y2*Z1*Z1Z1 * H = U2-X1 * HH = H2 * I = 4*HH * J = H*I * r = 2*(S2-Y1) * V = X1*I * X3 = r2-J-2*V * Y3 = r*(V-X3)-2*Y1*J * Z3 = (Z1+H)2-Z1Z1-HH */ .globl ECP256_AddAffine .type ECP256_AddAffine,@function .align 32 ECP256_AddAffine: .cfi_startproc pushq %rbp pushq %rbx pushq %r12 pushq %r13 pushq %r14 pushq %r15 subq $488, %rsp // open up stack space 32 * 15 + 8 = 488 vmovdqu 0(%rsi), %xmm0 // X1[1]X1[0] --> xmm0 vmovdqu 16(%rsi), %xmm1 // X1[3]X1[2] vmovdqu 32(%rsi), %xmm2 // Y1[1]Y1[0] vmovdqu 48(%rsi), %xmm3 // Y1[3]Y1[2] movq 72(%rsi), %r14 // Z1[1] 64 + 8 movq 64(%rsi), %rax // Z1[0] 64 + 0 vmovdqu 64(%rsi), %xmm4 // Z1[1]Z1[0] movq 88(%rsi), %r15 // Z1[3] 64 + 24 movq 80(%rsi), %rbp // Z1[2] 64 + 16 vmovdqu 80(%rsi), %xmm5 // Z1[3]Z1[2] vmovdqa %xmm0, 320(%rsp) // save X1[1]X1[0] to stack vmovdqa %xmm1, 336(%rsp) // save X1[3]X1[2] to stack vmovdqa %xmm2, 352(%rsp) // save Y1[1]Y1[0] to stack vmovdqa %xmm3, 368(%rsp) // save Y1[3]Y1[2] to stack vmovdqa %xmm4, 384(%rsp) // save Z1[1]Z1[0] to stack vmovdqa %xmm5, 400(%rsp) // save Z1[3]Z1[2] to stack vpor %xmm4, %xmm5, %xmm5 // Z1[1]Z1[0] | Z1[3]Z1[2] vmovdqu (%rdx), %xmm0 // X2[1]X2[0] --> xmm0 vpshufd $0xb1, %xmm5, %xmm3 // Order(10 11 00 01) --> [2 3 0 1] with 32bit vmovdqu 16(%rdx), %xmm1 // X2[3]X2[2] --> xmm1 vmovdqu 32(%rdx), %xmm2 // Y2[1]Y2[0] --> xmm2 vpor %xmm3, %xmm5, %xmm5 // [2 3 0 1] | [3 2 1 0] vmovdqu 48(%rdx), %xmm3 // Y2[3]Y2[2] --> xmm3 vmovdqa %xmm0, 416(%rsp) // save X2[1]X2[0] to stack vpshufd $0x1e, %xmm5, %xmm4 // Order(00 01 11 10) --> [0 1 3 2] vmovdqa %xmm1, 432(%rsp) // save X2[3]X2[1] to stack vpor %xmm0, %xmm1, %xmm1 // X2[1]X2[0] | X2[3]X2[2] vmovq %rdi, %xmm0 // save rdi to xmm0 vmovdqa %xmm2, 448(%rsp) // save X2[1]X2[0] to stack vmovdqa %xmm3, 464(%rsp) // save X2[3]X2[2] to stack vpor %xmm2, %xmm3, %xmm3 // Y2[1]Y2[0] | Y2[3]Y2[2] vpor %xmm4, %xmm5, %xmm5 vpxor %xmm4, %xmm4, %xmm4 // 0 vpor %xmm1, %xmm3, %xmm3 // X2[1]X2[0] | X2[3]X2[2] | Y2[1]Y2[0] | Y2[3]Y2[2] .balign 32 /* Z1Z1 = Z1 ^ 2 */ leaq 64(%rsi), %rsi // addr(z) leaq 32(%rsp), %rdi // save Z1Z1 to stack call ECP256_SqrCore_q // Output: r8 - r11 P[1] --> r14 P[3] --> r15 vpcmpeqd %xmm4, %xmm5, %xmm5 vpshufd $0xb1, %xmm3, %xmm4 // Order(10 11 00 01) vpor %xmm3, %xmm4, %xmm4 vpshufd $0, %xmm5, %xmm5 // Order(00 00 00 00) vpshufd $0x1e, %xmm4, %xmm3 // Order(00 01 11 10) vpor %xmm3, %xmm4, %xmm4 vpxor %xmm3, %xmm3, %xmm3 vpcmpeqd %xmm3, %xmm4, %xmm4 vpshufd $0, %xmm4, %xmm4 /* U2 = X2 * Z1Z1 */ leaq 416(%rsp), %rcx // addr of X2 in stack leaq 32(%rsp), %rsi // read Z1Z1 from stack leaq (%rsp), %rdi // save U2 to stack call ECP256_MulCore_q // ouput: r8 - r11 P[1] --> r14 P[3] --> r15 /* H = U2 - X1 */ leaq 320(%rsp), %rdx // read X1 from stack leaq 64(%rsp), %rdi // save H to stack call ECP256_SubCore // input: rdx, r8 - r11 P[1] --> r14 P[3] --> r15 movq %r8, (%rdi) movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) /* Z1Z1Z1 = Z1Z1 * Z1 */ leaq 384(%rsp), %rcx // read Z1 from stack leaq 32(%rsp), %rsi // read Z1Z1 from stack leaq 32(%rsp), %rdi // save Z1Z1Z1 to stack call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15 movq %r8, (%rdi) movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) /* Z3/2 = H * Z1 */ leaq 384(%rsp), %rcx // read Z1 from stack leaq 64(%rsp), %rsi // read H from stack leaq 288(%rsp), %rdi // save Z3/2 to stack call ECP256_MulCore_q // P[1] --> r14 P[3] --> r15 /* S2 = Y2 * Z1Z1Z1 */ leaq 448(%rsp), %rcx // read Y2 from stack leaq 32(%rsp), %rsi // read Z1Z1Z1 from stack leaq 32(%rsp), %rdi // save S2 to stack call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15 /* r/2 = (S2 - Y1) */ leaq 352(%rsp), %rdx // read Y1 from stack leaq 96(%rsp), %rdi // save r/2 to stack call ECP256_SubCore // output: r8-r11 P[1] --> r14 P[3] --> r15 movq %r8, (%rdi) // save r/2 to stack movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) /* I/4 = H ^ 2 */ leaq 64(%rsp), %rsi // read H from stack movq (%rsi), %rax // a[0] movq 8(%rsi), %r14 // a[1] movq 16(%rsi), %rbp // a[2] movq 24(%rsi), %r15 // a[3] leaq 128(%rsp), %rdi // save I/4 to stack call ECP256_SqrCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15 /* (r/2)^2 = (r^2)/4 */ leaq 96(%rsp), %rsi // read r/2 from stack movq (%rsi), %rax // a[0] movq 8(%rsi), %r14 // a[1] movq 16(%rsi), %rbp // a[2] movq 24(%rsi), %r15 // a[3] leaq 192(%rsp), %rdi // save (r^2)/4 to stack call ECP256_SqrCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15 /* J/4 = I/4 * H */ leaq 128(%rsp), %rcx // read I/4 from stack leaq 64(%rsp), %rsi // read H from stack leaq 160(%rsp), %rdi // save J/4 to stack call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15 /* V/4 = X1 * I */ leaq 320(%rsp), %rcx // read X1 from stack leaq 128(%rsp), %rsi // read I/4 from stack leaq (%rsp), %rdi // save V/4 to stack call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15 xorq %r12, %r12 addq %r8, %r8 adcq %r9, %r9 movq %r8, %rax adcq %r10, %r10 adcq %r11, %r11 movq %r9, %rbp adcq $0, %r12 subq $-1, %r8 movq %r10, %rcx sbbq %r14, %r9 sbbq $0, %r10 movq %r11, %r13 sbbq %r15, %r11 sbbq $0, %r12 leaq 192(%rsp), %rsi // read (r^2)/4 from cmovcq %rax,%r8 // b[0] V/2 --> r8-r11 cmovcq %rbp,%r9 // b[1] cmovcq %rcx,%r10 // b[2] cmovcq %r13,%r11 // b[3] /* (r^2 - 2 * V)/4 = (r^2)/4 - V/2 */ xorq %r13, %r13 movq (%rsi), %rax // a[0] movq 8(%rsi), %rcx // a[1] movq 16(%rsi), %rdx // a[2] movq 24(%rsi), %r12 // a[3] subq %r8, %rax sbbq %r9, %rcx movq %rax, %r8 sbbq %r10, %rdx sbbq %r11, %r12 movq %rcx, %r9 sbbq $0, %r13 addq $-1, %r8 // a - b + P movq %rdx, %r10 adcq %r14, %r9 adcq $0, %r10 movq %r12, %r11 adcq %r15, %r11 testq %r13, %r13 cmovzq %rax, %r8 cmovzq %rcx, %r9 cmovzq %rdx, %r10 cmovzq %r12, %r11 // output: r8-r11 P[1] --> r14 P[3] --> r15 /* X3/4 = (r^2 - 2 * V - J)/4 = (r^2 - 2 * V)/4 - J/4 */ leaq 160(%rsp), %rdx // read J/4 from stack leaq 224(%rsp), %rdi // save (r^2 - 2 * V - J)/4 to stack call ECP256_SubCore // output: r8-r11 P[1] --> r14 P[3] --> r15 movq %r8, (%rdi) // b[0] movq %r9, 8(%rdi) // b[1] movq %r10, 16(%rdi) // b[2] movq %r11, 24(%rdi) // b[3] /* (V - X3)/4 = V/4 - X3/4 */ leaq (%rsp), %rsi // read (r^2 - 2 * V)/4 from stack xorq %r13, %r13 movq (%rsi), %rax // a[0] movq 8(%rsi), %rcx // a[1] movq 16(%rsi), %rdx // a[2] movq 24(%rsi), %r12 // a[3] subq %r8, %rax sbbq %r9, %rcx movq %rax, %r8 sbbq %r10, %rdx sbbq %r11, %r12 movq %rcx, %r9 sbbq $0, %r13 movq %rdx, %r10 movq %r12, %r11 addq $-1, %r8 // a - b + P adcq %r14, %r9 adcq $0, %r10 adcq %r15, %r11 testq %r13, %r13 cmovzq %rax, %r8 cmovzq %rcx, %r9 cmovzq %rdx, %r10 cmovzq %r12, %r11 leaq 64(%rsp), %rdi // save (V - X3)/4 from stack movq %r8, (%rdi) movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) // output: r8-r11 P[1] --> r14 P[3] --> r15 /* (J * Y1)/4 = Y1 * J/4 */ leaq 352(%rsp), %rcx // read Y1 from stack leaq 160(%rsp), %rsi // read J/4 from stack leaq 32(%rsp), %rdi // save (J * Y1)/4 to stack call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15 /* (r * (V - X3)/8) = (V - X3)/4 * r/2 */ leaq 96(%rsp), %rcx // read r/2 from stack leaq 64(%rsp), %rsi // read (V - X3)/4 from stack leaq 64(%rsp), %rdi // save (r * (V - X3)/8) to stack call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15 /* Y3/8 = (r * (V - X3)/8) - (J * Y1)/4 */ leaq 32(%rsp), %rdx // read (J * Y1)/4 from stack leaq 256(%rsp), %rdi // save Y3/8 call ECP256_SubCore movq %r8, (%rdi) movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) vmovq %xmm0, %rdi vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 288(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 304(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand .Lone_mont(%rip), %xmm2, %xmm2 vpand .Lone_mont+16(%rip), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 384(%rsp), %xmm2, %xmm2 vpand 400(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2, 64(%rdi) vmovdqu %xmm3, 80(%rdi) vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 224(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 224+16(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand 416(%rsp), %xmm2, %xmm2 vpand 416+16(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 320(%rsp), %xmm2, %xmm2 vpand 336(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2, 0(%rdi) vmovdqu %xmm3, 16(%rdi) vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 256(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 272(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand 448(%rsp), %xmm2, %xmm2 vpand 464(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 352(%rsp), %xmm2, %xmm2 vpand 368(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2, 32(%rdi) vmovdqu %xmm3, 48(%rdi) addq $488, %rsp popq %r15 popq %r14 popq %r13 popq %r12 popq %rbx popq %rbp ret .cfi_endproc .size ECP256_AddAffine, .-ECP256_AddAffine /** * Function description: This interface is used to store the G-16G pre-computation table discretely. * Function prototype: void ECP256_Scatterw5(P256_Point *table, const P256_Point *point, uint32_t index); * Input register: * rdi: Points to the base address of the pre-computation table. * rsi: Points to P256_Point. * rdx: Index value. The value ranges from 1 to 16. * Change register: rdx, rsi, rdi, r8, r9, r10, r11 * Output register: None * Function/Macro Call: */ .globl ECP256_Scatterw5 .type ECP256_Scatterw5,@function .align 32 ECP256_Scatterw5: .cfi_startproc subq $1, %rdx // index - 1 movq (%rsi), %r8 // x[0] movq 8(%rsi), %r9 // x[1] movq 16(%rsi), %r10 // x[2] movq 24(%rsi), %r11 // x[3] leaq (%rdi, %rdx, 8), %rdi // base = base + (index - 1) * 8 . offset for table movq %r8, (%rdi) // x[0] --> base + 0 * 128 movq %r9, 128(%rdi) // x[1] --> base + 1 * 128 movq %r10, 256(%rdi) // x[2] --> base + 2 * 128 movq %r11, 384(%rdi) // x[3] --> base + 3 * 128 leaq 512(%rdi), %rdi // base + 128 * 4 leaq 32(%rsi), %rsi // addr(y) --> rsi movq (%rsi), %r8 // y[0] movq 8(%rsi), %r9 // y[1] movq 16(%rsi), %r10 // y[2] movq 24(%rsi), %r11 // y[3] movq %r8, (%rdi) // y[0] --> base + 4 * 128 movq %r9, 128(%rdi) // y[1] --> base + 5 * 128 movq %r10, 256(%rdi) // y[2] --> base + 6 * 128 movq %r11, 384(%rdi) // y[3] --> base + 7 * 128 leaq 512(%rdi), %rdi // base + 128 * 8 leaq 32(%rsi), %rsi // addr(z) --> rsi movq (%rsi), %r8 // z[0] movq 8(%rsi), %r9 // z[1] movq 16(%rsi), %r10 // z[2] movq 24(%rsi), %r11 // z[3] movq %r8, (%rdi) // z[0] --> base + 8 * 128 movq %r9, 128(%rdi) // z[1] --> base + 9 * 128 movq %r10, 256(%rdi) // z[2] --> base + 10 * 128 movq %r11, 384(%rdi) // z[3] --> base + 11 * 128 ret .cfi_endproc .size ECP256_Scatterw5, .-ECP256_Scatterw5 /** * Function description: This interface is used to obtain the G-16G pre-computation table discretely. * Function prototype: void ECP256_Gatherw5(P256_Point *point, const P256_Point *table, uint32_t index); * Input register: * rdi: points to P256_Point. * rsi: points to the base address of the pre-computation table. * edx: index value * Change register: edx, rsi, rdi, r8, r9, r10, r11 * Output register: None * Function/Macro Call: */ .globl ECP256_Gatherw5 .type ECP256_Gatherw5,@function .align 32 ECP256_Gatherw5: .cfi_startproc movq $-1, %rax xorq %rcx, %rcx cmp $0, %rdx cmovzq %rcx, %rax // rax = (rdx == 0) ? 0 : -1 add %rax, %rdx // rdx = (rdx == 0) ? rdx : (rdx - 1) leaq (%rsi, %rdx, 8), %rsi // Calculate offset. base = base + (index -1) * 8 movq (%rsi), %r8 // x[0] movq 128(%rsi), %r9 // x[1] movq 256(%rsi), %r10 // x[2] movq 384(%rsi), %r11 // x[3] leaq 512(%rsi), %rsi // base += 512 andq %rax, %r8 andq %rax, %r9 andq %rax, %r10 andq %rax, %r11 movq %r8, (%rdi) // Write back movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) leaq 32(%rdi), %rdi // Write back point offset movq (%rsi), %r8 // y[0] movq 128(%rsi), %r9 // y[1] movq 256(%rsi), %r10 // y[2] movq 384(%rsi), %r11 // y[3] leaq 512(%rsi), %rsi // base += 512 andq %rax, %r8 andq %rax, %r9 andq %rax, %r10 andq %rax, %r11 movq %r8, (%rdi) // Write back movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) leaq 32(%rdi), %rdi // Write back point offset movq (%rsi), %r8 // z[0] movq 128(%rsi), %r9 // z[1] movq 256(%rsi), %r10 // z[2] movq 384(%rsi), %r11 // z[3] andq %rax, %r8 andq %rax, %r9 andq %rax, %r10 andq %rax, %r11 movq %r8, (%rdi) // Write back movq %r9, 8(%rdi) movq %r10, 16(%rdi) movq %r11, 24(%rdi) ret .cfi_endproc .size ECP256_Gatherw5, .-ECP256_Gatherw5 /** * Function description: Discretely obtains affine points in the precomputation table. * Function prototype: void ECP256_Gatherw7(P256_AffinePoint *point, const P256_AffinePoint *table, uint32_t index); * Input register: * rdi: points to the returned P256_AffinePoint. * rsi: points to the base address of the pre-computation table. * rdx: index value * Change register: rax, rcx, rdx, rsi, rdi, rbp, r8, r9, r10 * Output register: None * Function/Macro Call: */ .globl ECP256_Gatherw7 .type ECP256_Gatherw7,@function .align 32 ECP256_Gatherw7: .cfi_startproc movq $-1, %rax xorq %rcx, %rcx cmp $0, %rdx cmovzq %rcx, %rax // rax = (rdx == 0) ? 0 : -1 addq %rax, %rdx // rdx = (rdx == 0) ? rdx : (rdx - 1) subq $63, %rdx // rdx = (rdx == 0) ? (rdx - 63) : (rdx - 1 - 63) subq %rdx, %rsi // rsi = (rdx == 0) ? (rsi + 63 - rdx) : (rsi + 64 - rdx) movq $8, %r10 // Loop value .Lgather_w7_loop: xorq %r8, %r8 // Empty reg for data low 32 xorq %r9, %r9 // Empty reg for data high 32 movb 192(%rsi), %r8b // r8 = [0 0 0 byte(3)] movb 448(%rsi), %r9b // r9 = [0 0 0 byte(7)] shlq $8, %r8 // r8 = [0 0 byte(3) 0] shlq $8, %r9 // r9 = [0 0 byte(7) 0] movb 128(%rsi), %r8b // r8 = [0 0 byte(3) byte(2)] movb 384(%rsi), %r9b // r9 = [0 0 byte(7) byte(6)] shlq $8, %r8 // r8 = [0 byte(3) byte(2) 0] shlq $8, %r9 // r9 = [0 byte(7) byte(6) 0] movb 64(%rsi), %r8b // r8 = [0 byte(3) byte(2) byte(1)] movb 320(%rsi), %r9b // r9 = [0 byte(7) byte(6) byte(5)] shlq $8, %r8 // r8 = [byte(3) byte(2) byte(1) 0] shlq $8, %r9 // r9 = [byte(7) byte(6) byte(5) 0] movb (%rsi), %r8b // r8 = [byte(3) byte(2) byte(1) byte(0)] movb 256(%rsi), %r9b // r9 = [byte(7) byte(6) byte(5) byte(4)] leaq 512(%rsi), %rsi // base += 64 * 8 shlq $32, %r9 // r9 = [byte(7) byte(6) byte(5) byte(4) 0 0 0 0] orq %r9, %r8 // r8 = [byte(7) byte(6) byte(5) byte(4) byte(3) byte(2) byte(1) byte(0)] andq %rax, %r8 movq %r8, (%rdi) leaq 8(%rdi), %rdi subq $1, %r10 jnz .Lgather_w7_loop ret .cfi_endproc .size ECP256_Gatherw7, .-ECP256_Gatherw7 #endif
2401_83913325/openHiTLS-examples_7925
crypto/ecc/src/asm/ecp256_x86_64.S
Unix Assembly
unknown
94,871
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CURVE_SM2 #include "crypt_arm.h" .file "ecp_sm2_armv8.S" #define s0 x7 #define s1 x8 #define s2 x9 #define s3 x10 #define s4 x11 #define s5 x12 #define s6 x13 #define s7 x14 .section .rodata # The polynomial .align 4 .Lpoly: .quad 0xffffffffffffffff, 0xffffffff00000000, 0xffffffffffffffff, 0xfffffffeffffffff # The order of polynomial .Lord: .quad 0x53bbf40939d54123, 0x7203df6b21c6052b, 0xffffffffffffffff, 0xfffffffeffffffff .Lpoly_div_2: .quad 0x8000000000000000, 0xffffffff80000000, 0xffffffffffffffff, 0x7fffffff7fffffff .Lord_div_2: .quad 0xa9ddfa049ceaa092, 0xb901efb590e30295, 0xffffffffffffffff, 0x7fffffff7fffffff .Lzero: .quad 0, 0, 0, 0 .Lord_1div4: .quad 0xd4eefd024e755049, 0xdc80f7dac871814a, 0xffffffffffffffff, 0x3fffffffbfffffff .Lord_2div4: .quad 0xa9ddfa049ceaa092, 0xb901efb590e30295, 0xffffffffffffffff, 0x7fffffff7fffffff .Lord_3div4: .quad 0x7eccf706eb5ff0db, 0x9582e790595483e0, 0xffffffffffffffff, 0xbfffffff3fffffff .Lpoly_1div4: .quad 0x4000000000000000, 0xffffffffc0000000, 0xffffffffffffffff, 0x3fffffffbfffffff .Lpoly_2div4: .quad 0x8000000000000000, 0xffffffff80000000, 0xffffffffffffffff, 0x7fffffff7fffffff .Lpoly_3div4: .quad 0xc000000000000000, 0xffffffff40000000, 0xffffffffffffffff, 0xbfffffff3fffffff .LRR: // 2^512 mod P precomputed for sm2 polynomial .quad 0x0000000200000003, 0x00000002ffffffff, 0x0000000100000001, 0x0000000400000002 .Lone_mont: .quad 0x0000000000000001, 0x00000000ffffffff, 0x0000000000000000, 0x0000000100000000 .Lone: .quad 1,0,0,0 .text ### Right shift: in >> 1 ### # void ECP_Sm2Div2(BN_UINT *r, BN_UINT *a); # 1-bit right shift .globl ECP_Sm2Div2 .type ECP_Sm2Div2, %function .align 4 ECP_Sm2Div2: AARCH64_PACIASP # Load inputs ldp x9, x10, [x1] ldp x11, x12, [x1, #16] # Right shift extr x9, x10, x9, #1 extr x10, x11, x10, #1 extr x11, x12, x11, #1 lsr x12, x12, #1 # Store results stp x9, x10, [x0] stp x11, x12, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2Div2, .-ECP_Sm2Div2 ### Right shift: in >> 2 ### # void ECP_Sm2Div4(BN_UINT *r, BN_UINT *a); # 2-bit right shift .globl ECP_Sm2Div4 .type ECP_Sm2Div4, %function .align 4 ECP_Sm2Div4: AARCH64_PACIASP # Load inputs ldp x7, x8, [x1] ldp x9, x10, [x1, #16] # Right shift extr x7, x8, x7, #2 extr x8, x9, x8, #2 extr x9, x10, x9, #2 lsr x10, x10, #2 # Store results stp x7, x8, [x0] stp x9, x10, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2Div4, .-ECP_Sm2Div4 ### Sub: r = a-b ### .globl ECP_Sm2BnSub .type ECP_Sm2BnSub, %function .align 4 ECP_Sm2BnSub: AARCH64_PACIASP # Load inputs ldp x7, x8, [x1] ldp x11, x12, [x2] ldp x9, x10, [x1, #16] ldp x13, x14, [x2, #16] # Sub subs x7,x7,x11 sbcs x8,x8,x12 sbcs x9,x9,x13 sbc x10,x10,x14 # Store results stp x7, x8, [x0] stp x9, x10, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2BnSub, .-ECP_Sm2BnSub ### Add: r = a+b ### .globl ECP_Sm2BnAdd .type ECP_Sm2BnAdd, %function .align 4 ECP_Sm2BnAdd: AARCH64_PACIASP # Load inputs ldp x7, x8, [x1] ldp x11, x12, [x2] ldp x9, x10, [x1, #16] ldp x13, x14, [x2, #16] # Add adds x7,x7,x11 adcs x8,x8,x12 adcs x9,x9,x13 adc x10,x10,x14 # Store results stp x7, x8, [x0] stp x9, x10, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2BnAdd, .-ECP_Sm2BnAdd ### Modular div by 2: res = in/2 mod p ### # void ECP_Sm2Div2ModP(BN_UINT *r, BN_UINT *a) .globl ECP_Sm2Div2ModP .type ECP_Sm2Div2ModP, %function .align 4 ECP_Sm2Div2ModP: AARCH64_PACIASP # Load inputs ldp x3, x4, [x1] ldp x5, x6, [x1, #16] # Save last bit mov x11, x3 # Right shift 1 extr x3, x4, x3, #1 extr x4, x5, x4, #1 extr x5, x6, x5, #1 lsr x6, x6, #1 # Load polynomial adrp x1, .Lpoly_div_2 add x1,x1,:lo12:.Lpoly_div_2 ldp x7, x8, [x1] ldp x9, x10, [x1, #16] # Parity check tst x11, #1 csel x7,xzr,x7,eq csel x8,xzr,x8,eq csel x9,xzr,x9,eq csel x10,xzr,x10,eq # Add adds x3,x3,x7 adcs x4,x4,x8 adcs x5,x5,x9 adc x6,x6,x10 # Store results stp x3, x4, [x0] stp x5, x6, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2Div2ModP, .-ECP_Sm2Div2ModP ### Modular div by 2: res = in/2 mod n, where n = ord(p) ### # void ECP_Sm2Div2ModOrd(BN_UINT *r, BN_UINT *a) .globl ECP_Sm2Div2ModOrd .type ECP_Sm2Div2ModOrd, %function .align 4 ECP_Sm2Div2ModOrd: AARCH64_PACIASP # Load inputs ldp x3, x4, [x1] ldp x5, x6, [x1, #16] # Save last bit mov x11, x3 # Right shift 1 extr x3, x4, x3, #1 extr x4, x5, x4, #1 extr x5, x6, x5, #1 lsr x6, x6, #1 # Load polynomial adrp x1, .Lord_div_2 add x1,x1,:lo12:.Lord_div_2 ldp x7, x8, [x1] ldp x9, x10, [x1, #16] # Parity check tst x11, #1 csel x7,xzr,x7,eq csel x8,xzr,x8,eq csel x9,xzr,x9,eq csel x10,xzr,x10,eq # Add adds x3,x3,x7 adcs x4,x4,x8 adcs x5,x5,x9 adc x6,x6,x10 # Store results stp x3, x4, [x0] stp x5, x6, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2Div2ModOrd, .-ECP_Sm2Div2ModOrd ### Modular div by 4: res = in/4 mod p ### # void ECP_Sm2Div4ModP(BN_UINT *r, BN_UINT *a) .globl ECP_Sm2Div4ModP .type ECP_Sm2Div4ModP, %function .align 4 ECP_Sm2Div4ModP: AARCH64_PACIASP # Load inputs ldp x3, x4, [x1] ldp x5, x6, [x1, #16] # Save last 2 bits and x11, x3, 0x3 # Right shift 2 extr x3, x4, x3, #2 extr x4, x5, x4, #2 extr x5, x6, x5, #2 lsr x6, x6, #2 # Load polynomial adrp x12, .Lzero add x12,x12,:lo12:.Lzero adrp x13, .Lpoly_1div4 add x13,x13,:lo12:.Lpoly_1div4 adrp x14, .Lpoly_2div4 add x14,x14,:lo12:.Lpoly_2div4 adrp x15, .Lpoly_3div4 add x15,x15,:lo12:.Lpoly_3div4 cmp x11, #1 csel x1,x12,x13,cc cmp x11, #2 csel x1,x1,x14,cc cmp x11, #3 csel x1,x1,x15,cc ldp x7, x8, [x1] ldp x9, x10, [x1, #16] # Add adds x3,x3,x7 adcs x4,x4,x8 adcs x5,x5,x9 adc x6,x6,x10 # Store results stp x3, x4, [x0] stp x5, x6, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2Div4ModP, .-ECP_Sm2Div4ModP ### Modular div by 4: res = in/4 mod n, where n = ord(p) ### # void ECP_Sm2Div4ModOrd(BN_UINT *r, BN_UINT *a) .globl ECP_Sm2Div4ModOrd .type ECP_Sm2Div4ModOrd, %function .align 4 ECP_Sm2Div4ModOrd: AARCH64_PACIASP # Load inputs ldp x3, x4, [x1] ldp x5, x6, [x1, #16] # Save last 2 bits and x11, x3, 0x3 # Right shift 2 extr x3, x4, x3, #2 extr x4, x5, x4, #2 extr x5, x6, x5, #2 lsr x6, x6, #2 # Load polynomial adrp x12, .Lzero add x12,x12,:lo12:.Lzero adrp x13, .Lord_1div4 add x13,x13,:lo12:.Lord_1div4 adrp x14, .Lord_2div4 add x14,x14,:lo12:.Lord_2div4 adrp x15, .Lord_3div4 add x15,x15,:lo12:.Lord_3div4 cmp x11, #1 csel x1,x12,x13,cc cmp x11, #2 csel x1,x1,x14,cc cmp x11, #3 csel x1,x1,x15,cc ldp x7, x8, [x1] ldp x9, x10, [x1, #16] # Add adds x3,x3,x7 adcs x4,x4,x8 adcs x5,x5,x9 adc x6,x6,x10 # Store results stp x3, x4, [x0] stp x5, x6, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2Div4ModOrd, .-ECP_Sm2Div4ModOrd #define bn_mod_add(mod) \ /* Load inputs */ \ ldp x3,x4,[x1]; \ ldp x5,x6,[x1,#0x10]; \ /* Addition */ \ ldp x7,x8,[x2]; \ ldp x9,x10,[x2,#0x10]; \ adds x3,x3,x7; \ adcs x4,x4,x8; \ adcs x5,x5,x9; \ adcs x6,x6,x10; \ adc x15,xzr,xzr; \ mov x11,x3; \ mov x12,x4; \ mov x13,x5; \ mov x14,x6; \ /* Sub polynomial */ \ adrp x2, mod; \ add x2, x2, :lo12:mod; \ ldp x7,x8,[x2]; \ ldp x9,x10,[x2,#0x10]; \ subs x11,x11,x7; \ sbcs x12,x12,x8; \ sbcs x13,x13,x9; \ sbcs x14,x14,x10; \ sbcs x15,x15,xzr; \ csel x3,x3,x11,cc; \ csel x4,x4,x12,cc; \ csel x5,x5,x13,cc; \ csel x6,x6,x14,cc; \ /* Store results */ \ stp x3,x4,[x0]; \ stp x5,x6,[x0,#0x10]; \ #define bn_mod_sub(mod) \ /* Load inputs */ \ ldp x3,x4,[x1]; \ ldp x5,x6,[x1,#0x10]; \ /* Addition */ \ ldp x7,x8,[x2]; \ ldp x9,x10,[x2,#0x10]; \ subs x3,x3,x7; \ sbcs x4,x4,x8; \ sbcs x5,x5,x9; \ sbcs x6,x6,x10; \ sbc x15,xzr,xzr; \ mov x11,x3; \ mov x12,x4; \ mov x13,x5; \ mov x14,x6; \ /* Add polynomial */ \ adrp x2, mod; \ add x2, x2, :lo12:mod; \ ldp x7,x8,[x2]; \ ldp x9,x10,[x2,#0x10]; \ adds x11,x11,x7; \ adcs x12,x12,x8; \ adcs x13,x13,x9; \ adcs x14,x14,x10; \ tst x15,x15; \ csel x3,x3,x11,eq; \ csel x4,x4,x12,eq; \ csel x5,x5,x13,eq; \ csel x6,x6,x14,eq; \ /* Store results */ \ stp x3,x4,[x0]; \ stp x5,x6,[x0,#0x10]; \ ### Modular add: r = a+b mod p ### .globl ECP_Sm2AddModP .type ECP_Sm2AddModP, @function .align 4 ECP_Sm2AddModP: AARCH64_PACIASP bn_mod_add(.Lpoly); AARCH64_AUTIASP ret .size ECP_Sm2AddModP, .-ECP_Sm2AddModP ### Modular sub: r = p - r ### .globl ECP_Sm2Neg .type ECP_Sm2Neg, @function .align 4 ECP_Sm2Neg: AARCH64_PACIASP ldp x11, x12, [x1] mov x7, #0xffffffff00000000 ldp x13, x14, [x1, #16] mov x8, #0xfffffffeffffffff mov x10, #-1 subs x9,x10,x11 sbcs x7,x7,x12 sbcs x10,x10,x13 sbc x8,x8,x14 stp x9, x7, [x0] stp x10, x8, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2Neg, .-ECP_Sm2Neg ### Modular sub: r = a-b mod p ### .globl ECP_Sm2SubModP .type ECP_Sm2SubModP, @function .align 4 ECP_Sm2SubModP: AARCH64_PACIASP bn_mod_sub(.Lpoly); AARCH64_AUTIASP ret .size ECP_Sm2SubModP, .-ECP_Sm2SubModP ### Modular add: r = a+b mod n/p, where n = ord(p) ### .globl ECP_Sm2AddModOrd .type ECP_Sm2AddModOrd, @function .align 4 ECP_Sm2AddModOrd: AARCH64_PACIASP bn_mod_add(.Lord); AARCH64_AUTIASP ret .size ECP_Sm2AddModOrd, .-ECP_Sm2AddModOrd ### Modular sub: r = a-b mod n/p, where n = ord(p) ### .globl ECP_Sm2SubModOrd .type ECP_Sm2SubModOrd, @function .align 4 ECP_Sm2SubModOrd: AARCH64_PACIASP bn_mod_sub(.Lord); AARCH64_AUTIASP ret .size ECP_Sm2SubModOrd, .-ECP_Sm2SubModOrd .macro RDC # registers map # x3 x4 x5 x6 x15 # rsi rax rcx rdx rbx # r = a mod sm2 # a = a15 | a14 | ... | a0, where ai are 32–bit quantities # | a7 | a6 | a5 | a4 | a3 | a2 | a1 | a0 | (+) # | a8 | a11 | a10 | a9 | a8 | 0 | a9 | a8 | (+) # | a9 | a14 | a13 | a12 | a11 | 0 | a10 | a9 | (+) # | a10 | a15 | a14 | a13 | a12 | 0 | a11 | a10 | (+) # | a11 | 0 | a15 | a14 | a13 | 0 | a12 | a11 | (+) # | a12 | 0 | a15 | a14 | a13 | 0 | a13 | a12 | (+) # | a12 | 0 | 0 | a15 | a14 | 0 | a14 | a13 | (+) # | a13 | 0 | 0 | 0 | a15 | 0 | a14 | a13 | (+) # | a13 | 0 | 0 | 0 | 0 | 0 | a15 | a14 | (+) # | a14 | 0 | 0 | 0 | 0 | 0 | a15 | a14 | (+) # | a14 | 0 | 0 | 0 | 0 | 0 | 0 | a15 | (+) # | a15 | 0 | 0 | 0 | 0 | 0 | 0 | a15 | (+) # | a15 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | (+) # | a15 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | (+) # | 0 | 0 | 0 | 0 | 0 | a8 | 0 | 0 | (-) # | 0 | 0 | 0 | 0 | 0 | a9 | 0 | 0 | (-) # | 0 | 0 | 0 | 0 | 0 | a13 | 0 | 0 | (-) # | 0 | 0 | 0 | 0 | 0 | a14 | 0 | 0 | (-) # | U[7]| U[6]| U[5]| U[4]| U[3]| U[2]| U[1]| U[0]| # | V[3] | V[2] | V[1] | V[0] | # until r < sm2 # s7 (a15|a14), s6 (a13|a12), s5 (a11|a10), s4 (a9|a8) # s3 (a7|a6), s2 (a5|a4), s1 (a3|a2), s0 (a1|a0) # 1. 64-bit addition eor x3, x3, x3 // to store all carry eor x4, x4, x4 mov x5, s6 // rcx <- s6 mov x6, s4 // rdx <- s4 # a13 | a12 adds x5, x5, s7 // rcx <- s6 + s7 adcs x4, xzr, xzr // rax <- carry(s6+s7) adds x5, x5, s7 // rcx <- s6 + 2*s7 adcs x4, x4, xzr # a9 | a8 mov x15, x4 // rbx <- carry (rax) adds x6, x6, x5 // rdx <- s4 + s6 + 2*s7 adcs x15, x15, xzr adds x6, x6, s5 // rdx <- s4 + s5 + s6 + 2*s7 adcs x15, x15, xzr # sum adds s0, s0, x6 // s0 <- s0 + s4 + s5 + s6 + 2*s7 adcs s1, s1, x15 // s1 <- s1 + rbx + carry adcs s2, s2, x5 // s2 <- s2 + s6 + 2*s7 + carry adcs s3, s3, s7 adcs x3, xzr, xzr # add carry adds s3, s3, x4 adcs x3, x3, xzr // all carry stp s0, s1, [sp, #32] stp s2, s3, [sp, #48] # 2. 4 -> 8 64-bit to 32-bit spread mov x4, #0xffffffff mov s0, s4 mov s1, s5 mov s2, s6 mov s3, s7 and s0, s0, x4 // a8 and s1, s1, x4 // a10 and s2, s2, x4 // a12 and s3, s3, x4 // a14 lsr s4, s4, #32 // a9 lsr s5, s5, #32 // a11 lsr s6, s6, #32 // a13 lsr s7, s7, #32 // a15 # 3. 32-bit addition mov x4, s3 add x4, x4, s2 // rax <- a12 + a14 mov x15, s3 add x15, x15, s1 // rbx <- a10 + a14 mov x5, s7 add x5, x5, s6 // rcx <- a13 + a15 mov x6, s0 add x6, x6, s4 // rdx <- a8 + a9 add s7, s7, s5 // s7 <- a11 + a15 mov s2, x5 // s2 <- a13 + a15 add s2, s2, x4 // s2 <- a12 + a13 + a14 + a15 add s1, s1, s2 // s1 <- a10 + a12 + a13 + a14 + a15 add s1, s1, s2 // s1 <- a10 + 2*(a12 + a13 + a14 + a15) add s1, s1, x6 // s1 <- a8 + a9 + a10 + 2*(a12 + a13 + a14 + a15) add s1, s1, s5 // s1 <- a8 + a9 + a10 + a11 + 2*(a12 + a13 + a14 + a15) add s2, s2, s6 // s2 <- a12 + 2*a13 + a14 + a15 add s2, s2, s5 // s2 <- a11 + a12 + 2*a13 + a14 + a15 add s2, s2, s0 // s2 <- a8 + a11 + a12 + 2*a13 + a14 + a15 add x6, x6, s3 // rdx <- a8 + a9 + a14 add x6, x6, s6 // rdx <- a8 + a9 + a13 + a14 add s4, s4, x5 // s4 <- a9 + a13 + a15 add s5, s5, s4 // s5 <- a9 + a11 + a13 + a15 add s5, s5, x5 // s5 <- a9 + a11 + 2*(a13 + a15) add x4, x4, x15 // rax <- a10 + a12 + 2*a14 # U[0] s5 a9 + a11 + 2*(a13 + a15) # U[1] %rax a10 + a12 + 2*a14 # U[2] # U[3] s2 a8 + a11 + a12 + 2*a13 + a14 + a15 # U[4] s4 a9 + a13 + a15 # U[5] %rbx a10 + a14 # U[6] s7 a11 + a15 # U[7] s1 a8 + a9 + a10 + a11 + 2*(a12 + a13 + a14 + a15) # sub %rdx a8 + a9 + a13 + a14 # s0 s3 s6 %rcx # 4. 8 -> 4 32-bit to 64-bit # sub %rdx mov s0, x4 lsl s0, s0, #32 extr x4, s2, x4, #32 extr s2, x15, s2, #32 extr x15, s1, x15, #32 lsr s1, s1, #32 # 5. 64-bit addition adds s5, s5, s0 adcs x4, x4, xzr adcs s4, s4, s2 adcs s7, s7, x15 adcs x3, x3, s1 # V[0] s5 # V[1] %rax # V[2] s4 # V[3] s7 # carry %rsi # sub %rdx # 5. ADD & SUB ldp s0, s1, [sp, #32] ldp s2, s3, [sp, #48] # ADD adds s0, s0, s5 adcs s1, s1, x4 adcs s2, s2, s4 adcs s3, s3, s7 adcs x3, x3, xzr # SUB subs s1, s1, x6 sbcs s2, s2, xzr sbcs s3, s3, xzr sbcs x3, x3, xzr # 6. MOD # First Mod mov x4, x3 lsl x4, x4, #32 mov x5, x4 subs x4, x4, x3 adds s0, s0, x3 adcs s1, s1, x4 adcs s2, s2, xzr adcs s3, s3, x5 # Last Mod # return y - p if y > p else y mov s4, s0 mov s5, s1 mov s6, s2 mov s7, s3 adrp x3, .Lpoly add x3, x3, :lo12:.Lpoly ldp x4, x15, [x3] ldp x16, x17, [x3, #16] eor x5, x5, x5 adcs x5, xzr, xzr subs s0, s0, x4 sbcs s1, s1, x15 sbcs s2, s2, x16 sbcs s3, s3, x17 sbcs x5, x5, xzr csel s0, s0, s4, cs csel s1, s1, s5, cs csel s2, s2, s6, cs csel s3, s3, s7, cs stp s0, s1, [x0] stp s2, s3, [x0, #16] .endm ### Modular mul: r = a*b mod p ### # void ECP_Sm2Mul(uint64_t *r, const uint64_t *a, const uint64_t *b) # 256-bit modular multiplication in SM2 # r %rdi # a %rsi # b %rdx # registers map # s0 s1 s2 s3 s4 s5 s6 s7 # x7 x8 x9 x10 x11 x12 x13 x14 x3 x4 x5 x6 x15 # r8 r9 r10 r11 r12 r13 r14 r15 rax rdx rbx rcx rsi .globl ECP_Sm2Mul .type ECP_Sm2Mul, @function .align 4 ECP_Sm2Mul: AARCH64_PACIASP # Store scalar registers stp x29, x30, [sp, #-80]! add x29, sp, #0 stp x16, x17, [sp, #16] stp x18, x19, [sp, #64] # Load inputs ldp s0, s1, [x1] ldp s2, s3, [x1, #16] ldp s4, s5, [x2] ldp s6, s7, [x2, #16] ### multiplication ### # ======================== # s7 s6 s5 s4 # * s3 s2 s1 s0 # ------------------------ # + s0 s0 s0 s0 # * * * * # s7 s6 s5 s4 # s1 s1 s1 s1 # * * * * # s7 s6 s5 s4 # s2 s2 s2 s2 # * * * * # s7 s6 s5 s4 # s3 s3 s3 s3 # * * * * # s7 s6 s5 s4 # ------------------------ # s7 s6 s5 s4 s3 s2 s1 s0 # ======================== ### s0*s4 ### mul x16, s0, s4 umulh x5, s0, s4 eor x6, x6, x6 ### s1*s4 + s0*s5 ### mul x3, s1, s4 umulh x4, s1, s4 adds x5, x5, x3 adcs x6, x6, x4 eor x15, x15, x15 mul x3, s0, s5 umulh x4, s0, s5 adds x5, x5, x3 adcs x6, x6, x4 adcs x15, x15, xzr mov x17, x5 eor x5, x5, x5 ### s2 * s4 + s1 * s5 + s0 *s6 ### mul x3, s2, s4 umulh x4, s2, s4 adds x6, x6, x3 adcs x15, x15, x4 mul x3, s1, s5 umulh x4, s1, s5 adds x6, x6, x3 adcs x15, x15, x4 adcs x5, x5, xzr mul x3, s0, s6 umulh x4, s0, s6 adds x6, x6, x3 adcs x15, x15, x4 adcs x5, x5, xzr mov x18, x6 eor x6, x6, x6 ### s3*s4 + s2*s5 + s1*s6 + s0*s7 ### mul x3, s3, s4 umulh x4, s3, s4 adds x15, x15, x3 adcs x5, x5, x4 adcs x6, x6, xzr mul x3, s2, s5 umulh x4, s2, s5 adds x15, x15, x3 adcs x5, x5, x4 adcs x6, x6, xzr mul x3, s1, s6 umulh x4, s1, s6 adds x15, x15, x3 adcs x5, x5, x4 adcs x6, x6, xzr mul x3, s0 ,s7 umulh x4, s0, s7 adds x15, x15, x3 adcs x5, x5, x4 adcs x6, x6, xzr mov x19, x15 eor x15, x15, x15 ### s3*s5 + s2*s6 + s1*s7 ### mul x3, s3, s5 umulh x4, s3, s5 adds x5, x5, x3 adcs x6, x6, x4 # carry adcs x15, x15, xzr mul x3, s2, s6 umulh x4, s2, s6 adds x5, x5, x3 adcs x6, x6, x4 adcs x15, x15, xzr mul x3, s1, s7 umulh x4, s1, s7 adds x5, x5, x3 adcs x6, x6, x4 adcs x15, x15, xzr mov s4, x5 eor x5, x5, x5 ### s3*s6 + s2*s7 ### mul x3, s3, s6 umulh x4, s3, s6 adds x6, x6, x3 adcs x15, x15, x4 adcs x5, x5, xzr mul x3, s2, s7 umulh x4, s2, s7 adds x6, x6, x3 adcs x15, x15, x4 adcs x5, x5, xzr mov s5, x6 ### s3*s7 ### mul x3, s3, s7 umulh x4, s3, s7 adds x15, x15, x3 adcs x5, x5, x4 mov s6, x15 mov s7, x5 mov s0, x16 mov s1, x17 mov s2, x18 mov s3, x19 # result of mul: s7 s6 s5 s4 s3 s2 s1 s0 ### Reduction ### RDC # Restore scalar registers ldp x16, x17, [sp, #16] ldp x18, x19, [sp, #64] ldp x29, x30, [sp], #80 AARCH64_AUTIASP ret .size ECP_Sm2Mul, .-ECP_Sm2Mul ### Modular sqr: r = a^2 mod p ### # void ECP_Sm2Sqr(uint64_t *r, const uint64_t *a) # 256-bit modular multiplication in SM2 ### # r %rdi # a %rsi # registers map # s0 s1 s2 s3 s4 s5 s6 s7 # x7 x8 x9 x10 x11 x12 x13 x14 x3 x4 x5 x6 x15 x16 x17 # r8 r9 r10 r11 r12 r13 r14 r15 rax rdx rbx rcx rsi rbp rdi .globl ECP_Sm2Sqr .type ECP_Sm2Sqr, @function .align 4 ECP_Sm2Sqr: AARCH64_PACIASP # Store scalar registers stp x29, x30, [sp, #-64]! add x29, sp, #0 stp x16, x17, [sp, #16] # Load inputs ldp s4, s5, [x1] ldp s6, s7, [x1, #16] ### square ### # ======================== # s7 s6 s5 s4 # * s7 s6 s5 s4 # ------------------------ # + s4 s4 s4 s4 # * * * * # s7 s6 s5 s4 # s5 s5 s5 s5 # * * * * # s7 s6 s5 s4 # s6 s6 s6 s6 # * * * * # s7 s6 s5 s4 # s7 s7 s7 s7 # * * * * # s7 s6 s5 s4 # ------------------------ # s7 s6 s5 s4 s3 s2 s1 s0 # ======================== ### s1 <- s4*s5, s2 <- carry ### mul s1, s4, s5 umulh s2, s4, s5 eor s3, s3, s3 ### s2 <- s4*s6 + carry(s2), s3 <- carry ### mul x3, s6, s4 umulh s3, s6, s4 adds s2, s2, x3 adcs s3, s3, xzr eor s0, s0, s0 ### s3 <- s4*s7 + s5*s6 + carry(s3), s0 <- carry ### mul x3, s7, s4 umulh x4, s7, s4 adds s3, s3, x3 adcs s0, s0, x4 eor x5, x5, x5 mul x3, s6, s5 umulh x4, s6, s5 adds s3, s3, x3 adcs s0, s0, x4 adcs x5, xzr, xzr ### s0 <- s5*s7 + carry(s0), rbx <- carry ### mul x3, s7, s5 umulh x4, s7, s5 adds s0, s0, x3 adcs x5, x5, x4 eor x6, x6, x6 ### rbx <- s6*s7 + carry(rbx), rcx <- carry ### mul x3, s7, s6 umulh x4, s7, s6 adds x5, x5, x3 adcs x6, x6, x4 eor x15, x15, x15 ### 2*s0|1|2|3 ### adds s1, s1, s1 adcs s2, s2, s2 adcs s3, s3, s3 adcs s0, s0, s0 adcs x5, x5, x5 # update carry adcs x6, x6, x6 adcs x15, xzr, xzr ### rbp <- s4*s4, carry <- rdi ### mul x16, s4, s4 umulh x17, s4, s4 ### s4 <- s5*s5, carry <- s5 ### mul s4, s5, s5 umulh s5, s5, s5 ### s6*s6 ### mul x3, s6, s6 umulh x4, s6, s6 # s1 += carry(s4*s4) adds s1, s1, x17 # s2 += s5*s5 adcs s2, s2, s4 # s3 += carry(s5*s5) adcs s3, s3, s5 # s4(s0) += s6*s6 adcs s0, s0, x3 # s5(rbx) += carry(s6*s6) adcs x5, x5, x4 adcs x6, x6, xzr adcs x15, x15, xzr ### s7*s7 ### mul x3, s7, s7 umulh x4, s7, s7 # s6(rcx) += s7*s7 adds x6, x6, x3 # s7(rsi) += carry(s7*s7) adcs x15, x15, x4 mov s4, s0 mov s0, x16 mov s5, x5 mov s6, x6 mov s7, x15 # result of mul: s7 s6 s5 s4 s3 s2 s1 s0= ### Reduction ### RDC # Restore scalar registers ldp x16, x17, [sp, #16] ldp x29, x30, [sp], #64 AARCH64_AUTIASP ret .size ECP_Sm2Sqr, .-ECP_Sm2Sqr .globl ECP_Sm2ToMont .type ECP_Sm2ToMont,%function .align 4 ECP_Sm2ToMont: AARCH64_PACIASP stp x29, x30,[sp, #-32]! add x29,sp, #0 stp x19, x20,[sp, #16] adrp x3, .LRR // bp[0] add x3, x3,:lo12:.LRR ldr x3,[x3] ldp x4, x5,[x1] ldp x6, x7,[x1, #16] adrp x14, .Lpoly+8 add x14, x14,:lo12:.Lpoly+8 ldr x14,[x14] adrp x15, .Lpoly+24 add x15, x15,:lo12:.Lpoly+24 ldr x15,[x15] adrp x2, .LRR add x2, x2,:lo12:.LRR bl ECP_Sm2MulMont ldp x19, x20,[sp, #16] ldp x29, x30,[sp], #32 AARCH64_AUTIASP ret .size ECP_Sm2ToMont,.-ECP_Sm2ToMont .globl ECP_Sm2FromMont .type ECP_Sm2FromMont,%function .align 4 ECP_Sm2FromMont: AARCH64_PACIASP stp x29, x30,[sp, #-32]! add x29,sp, #0 stp x19, x20,[sp, #16] adrp x2, .Lone add x2, x2,:lo12:.Lone ldr x3, [x2] ldp x4, x5,[x1] ldp x6, x7,[x1, #16] adrp x14, .Lpoly+8 add x14, x14,:lo12:.Lpoly+8 ldr x14, [x14] adrp x15, .Lpoly+24 add x15, x15,:lo12:.Lpoly+24 ldr x15, [x15] bl ECP_Sm2MulMont ldp x19, x20,[sp, #16] ldp x29, x30,[sp], #32 AARCH64_AUTIASP ret .size ECP_Sm2FromMont,.-ECP_Sm2FromMont .type ECP_Sm2MulMont,%function .align 4 ECP_Sm2MulMont: AARCH64_PACIASP // a[0~3] * b[0] mul x8, x4, x3 umulh x16, x4, x3 mul x9, x5, x3 umulh x17, x5, x3 mul x10, x6, x3 umulh x19, x6, x3 mul x11, x7, x3 umulh x20, x7, x3 adds x9, x9, x16 adcs x10, x10, x17 adcs x11, x11, x19 adc x12, xzr, x20 ldr x3, [x2, #8] // get b[1] // begin 1st reduce lsl x19, x8, #32 lsr x20, x8, #32 subs x16, x8, x19 sbcs x17, xzr, x20 sbcs x19, xzr, x19 sbc x20, x8, x20 mov x13, xzr adds x8, x9, x16 adcs x9, x10, x17 adcs x10, x11, x19 adcs x11, x12, x20 adc x12, x13, xzr // lo(a[0~3]) * b[1] mul x16, x4, x3 mul x17, x5, x3 mul x19, x6, x3 mul x20, x7, x3 adds x8, x8, x16 adcs x9, x9, x17 adcs x10, x10, x19 adcs x11, x11, x20 adc x12, x12, xzr // hi(a[0~3]) * b[1] umulh x16, x4, x3 umulh x17, x5, x3 umulh x19, x6, x3 umulh x20, x7, x3 adds x9, x9, x16 adcs x10, x10, x17 adcs x11, x11, x19 adcs x12, x12, x20 adc x13, xzr, xzr ldr x3, [x2, #8*2] // get b[2] // begin 2st reduce lsl x19, x8, #32 lsr x20, x8, #32 subs x16, x8, x19 sbcs x17, xzr, x20 sbcs x19, xzr, x19 sbc x20, x8, x20 adds x8, x9, x16 adcs x9, x10, x17 adcs x10, x11, x19 adcs x11, x12, x20 adc x12, x13, xzr // lo(a[0~3] * b[2]) mul x16, x4, x3 mul x17, x5, x3 mul x19, x6, x3 mul x20, x7, x3 adds x8, x8, x16 adcs x9, x9, x17 adcs x10, x10, x19 adcs x11, x11, x20 adc x12, x12, xzr // hi(a[0~3] * b[2]) umulh x16, x4, x3 umulh x17, x5, x3 umulh x19, x6, x3 umulh x20, x7, x3 adds x9, x9, x16 adcs x10, x10, x17 adcs x11, x11, x19 adcs x12, x12, x20 adc x13, xzr, xzr ldr x3,[x2, #8*3] // get b[3] // begin 3st reduce lsl x19, x8, #32 lsr x20, x8, #32 subs x16, x8, x19 sbcs x17, xzr, x20 sbcs x19, xzr, x19 sbc x20, x8, x20 adds x8, x9, x16 adcs x9, x10, x17 adcs x10, x11, x19 adcs x11, x12, x20 adc x12, x13, xzr // lo(a[0~3] * b[3]) mul x16, x4, x3 mul x17, x5, x3 mul x19, x6, x3 mul x20, x7, x3 adds x8, x8, x16 adcs x9, x9, x17 adcs x10, x10, x19 adcs x11, x11, x20 adc x12, x12, xzr // hi(a[0~3] * b[3]) umulh x16, x4, x3 umulh x17, x5, x3 umulh x19, x6, x3 umulh x20, x7, x3 adds x9, x9, x16 adcs x10, x10, x17 adcs x11, x11, x19 adcs x12, x12, x20 adc x13, xzr, xzr lsl x19, x8, #32 lsr x20, x8, #32 // begin 4st reduce subs x16, x8, x19 sbcs x17, xzr, x20 sbcs x19, xzr, x19 sbc x20, x8, x20 adds x8, x9, x16 adcs x9, x10, x17 adcs x10, x11, x19 adcs x11, x12, x20 adc x12, x13, xzr // for cal res - p adds x16, x8, #1 // - (0xffffffffffffffff) = (+1) sbcs x17, x9, x14 adcs x19, x10, xzr sbcs x20, x11, x15 sbcs xzr, x12, xzr csel x8, x8, x16, lo csel x9, x9, x17, lo csel x10, x10, x19, lo csel x11, x11, x20, lo stp x8, x9,[x0] stp x10, x11,[x0, #8*2] AARCH64_AUTIASP ret .size ECP_Sm2MulMont,.-ECP_Sm2MulMont .type ECP_Sm2SqrMont,%function .align 4 ECP_Sm2SqrMont: AARCH64_PACIASP // a[1~3] * a[0] mul x9, x5, x4 umulh x17, x5, x4 mul x10, x6, x4 umulh x19, x6, x4 mul x11, x7, x4 umulh x12, x7, x4 adds x10, x10, x17 adcs x11, x11, x19 adc x12, x12, xzr // a[2~3] * a[1] mul x16, x6, x5 umulh x17, x6, x5 mul x19, x7, x5 umulh x20, x7, x5 // a[3] * a[2] mul x13, x7, x6 umulh x1, x7, x6 adds x17, x17, x19 adc x19, x20, xzr adds x11, x11, x16 adcs x12, x12, x17 adcs x13, x13, x19 adc x1, x1, xzr // a[0] * a[0] mul x8, x4, x4 umulh x4, x4, x4 // a[1] * a[1] mul x17, x5, x5 umulh x5, x5, x5 adds x9, x9, x9 adcs x10, x10, x10 adcs x11, x11, x11 adcs x12, x12, x12 adcs x13, x13, x13 adcs x1, x1, x1 adc x2, xzr, xzr // a[2] * a[2] mul x19, x6, x6 umulh x6, x6, x6 // a[3] * a[3] mul x20, x7, x7 umulh x7, x7, x7 adds x9, x9, x4 adcs x10, x10, x17 adcs x11, x11, x5 adcs x12, x12, x19 adcs x13, x13, x6 adcs x1, x1, x20 adc x2, x2, x7 // begin 1st reduce lsl x19, x8, #32 lsr x20, x8, #32 subs x16, x8, x19 sbcs x17, xzr, x20 sbcs x19, xzr, x19 sbc x20, x8, x20 adds x8, x9, x16 adcs x9, x10, x17 adcs x10, x11, x19 adc x11, xzr, x20 // begin 2st reduce lsl x19, x8, #32 lsr x20, x8, #32 subs x16, x8, x19 sbcs x17, xzr, x20 sbcs x19, xzr, x19 sbc x20, x8, x20 adds x8, x9, x16 adcs x9, x10, x17 adcs x10, x11, x19 adc x11, xzr, x20 // begin 3st reduce lsl x19, x8, #32 lsr x20, x8, #32 subs x16, x8, x19 sbcs x17, xzr, x20 sbcs x19, xzr, x19 sbc x20, x8, x20 adds x8, x9, x16 adcs x9, x10, x17 adcs x10, x11, x19 adc x11, xzr, x20 // begin 4st reduce lsl x19, x8, #32 lsr x20, x8, #32 subs x16, x8, x19 sbcs x17, xzr, x20 sbcs x19, xzr, x19 sbc x20, x8, x20 adds x8, x9, x16 adcs x9, x10, x17 adcs x10, x11, x19 adc x11, xzr, x20 adds x8, x8, x12 adcs x9, x9, x13 adcs x10, x10, x1 adcs x11, x11, x2 adc x12, xzr, xzr // for cal res - p adds x16, x8, #1 sbcs x17, x9, x14 adcs x19, x10, xzr sbcs x20, x11, x15 sbcs xzr, x12, xzr csel x8, x8, x16, lo csel x9, x9, x17, lo csel x10, x10, x19, lo csel x11, x11, x20, lo stp x8, x9,[x0] stp x10, x11,[x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2SqrMont,.-ECP_Sm2SqrMont .type ECP_Sm2AddCore,%function .align 4 ECP_Sm2AddCore: AARCH64_PACIASP adds x8, x8, x16 adcs x9, x9, x17 adcs x10, x10, x19 adcs x11, x11, x20 adc x1, xzr, xzr // sum - p adds x16, x8, #1 sbcs x17, x9, x14 // x14 = 0xffffffff00000000 adcs x19, x10, xzr sbcs x20, x11, x15 // x15 = 0xfffffffeffffffff sbcs xzr, x1, xzr csel x8, x8, x16,lo csel x9, x9, x17,lo csel x10, x10, x19,lo csel x11, x11, x20,lo stp x8, x9, [x0] stp x10, x11, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2AddCore,.-ECP_Sm2AddCore .type ECP_Sm2DivBy2Core,%function .align 4 ECP_Sm2DivBy2Core: AARCH64_PACIASP subs x16, x8, #1 adcs x17, x9, x14 sbcs x19, x10, xzr adcs x20, x11, x15 adc x1, xzr, xzr tst x8, #1 csel x8, x8, x16, eq csel x9, x9, x17, eq csel x10, x10, x19, eq csel x11, x11, x20 ,eq csel x1, xzr, x1, eq lsr x8, x8, #1 orr x8, x8, x9, lsl#63 lsr x9, x9, #1 orr x9, x9, x10, lsl#63 lsr x10, x10, #1 orr x10, x10, x11, lsl#63 lsr x11, x11, #1 orr x11, x11, x1, lsl#63 stp x8, x9,[x0] stp x10, x11, [x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2DivBy2Core,.-ECP_Sm2DivBy2Core .type ECP_Sm2SubAB,%function .align 4 ECP_Sm2SubAB: AARCH64_PACIASP ldp x16, x17,[x2] ldp x19, x20,[x2, #16] subs x8, x8, x16 sbcs x9, x9, x17 sbcs x10, x10, x19 sbcs x11, x11, x20 csetm x16, cc adds x8, x8, x16 and x17, x16, x14 adcs x9, x9, x17 adcs x10, x10, x16 and x19, x16, x15 adc x11, x11, x19 stp x8, x9,[x0] stp x10, x11,[x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2SubAB,.-ECP_Sm2SubAB .type ECP_Sm2SubBA,%function .align 4 ECP_Sm2SubBA: AARCH64_PACIASP ldp x16, x17,[x2] ldp x19, x20,[x2, #16] subs x8, x16, x8 sbcs x9, x17, x9 sbcs x10, x19, x10 sbcs x11, x20, x11 csetm x16, cc adds x8, x8, x16 and x17, x16, x14 adcs x9, x9, x17 adcs x10, x10, x16 and x19, x16, x15 adc x11, x11, x19 stp x8, x9,[x0] stp x10, x11,[x0, #16] AARCH64_AUTIASP ret .size ECP_Sm2SubBA,.-ECP_Sm2SubBA # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#doubling-dbl-2001-b # Deal process: # delta = Z12 # gamma = Y12 # beta = X1*gamma # alpha = 3*(X1-delta)*(X1+delta) # X3 = alpha2-8*beta # Z3 = (Y1+Z1)2-gamma-delta # Y3 = alpha*(4*beta-X3)-8*gamma2 .globl ECP_Sm2PointDoubleMont .type ECP_Sm2PointDoubleMont,%function .align 4 ECP_Sm2PointDoubleMont: AARCH64_PACIASP stp x29, x30,[sp, #-80]! mov x29, sp stp x19, x20,[sp, #16] stp x21, x22,[sp, #32] sub sp, sp, #32*4 .Lpoint_double: ldp x8, x9,[x1, #32] // a->y ldp x10, x11,[x1, #32+16] mov x21, x0 mov x22, x1 // backup point a adrp x14, .Lpoly+8 add x14, x14,:lo12:.Lpoly+8 // p[1] ldr x14, [x14] adrp x15, .Lpoly+24 add x15, x15,:lo12:.Lpoly+24 // p[3] ldr x15, [x15] mov x16, x8 mov x17, x9 mov x19, x10 mov x20, x11 ldp x4, x5, [x22, #64] // a->z ldp x6, x7, [x22, #64+16] mov x0, sp bl ECP_Sm2AddCore // s = 2 * a->y add x0, sp, #64 bl ECP_Sm2SqrMont // zsqr = (a->z)^2 ldp x16, x17, [x22] ldp x19, x20, [x22, #16] mov x4, x8 mov x5, x9 mov x6, x10 mov x7, x11 add x0, sp, #32 bl ECP_Sm2AddCore // m = a->x + zsqr add x2, x22, #0 mov x8, x4 mov x9, x5 ldp x4, x5,[sp, #0] mov x10, x6 mov x11, x7 ldp x6, x7,[sp, #16] add x0, sp, #64 bl ECP_Sm2SubBA // zsqr = a->x - zsqr add x0, sp, #0 bl ECP_Sm2SqrMont // s = s^2 ldr x3, [x22, #32] ldp x4, x5,[x22, #64] ldp x6, x7,[x22, #64+16] add x2, x22, #32 // a->y add x0, sp, #96 bl ECP_Sm2MulMont // res_z = a->z * a->y mov x16, x8 mov x17, x9 ldp x4, x5, [sp, #0] mov x19, x10 mov x20, x11 ldp x6, x7, [sp, #16] add x0, x21, #64 bl ECP_Sm2AddCore // res_z = 2 * res_z add x0, sp, #96 bl ECP_Sm2SqrMont // res_y = s^2 ldr x3, [sp, #64] ldp x4, x5, [sp, #32] ldp x6, x7, [sp, #32+16] add x0, x21, #32 bl ECP_Sm2DivBy2Core // res_y = res_y / 2 add x2, sp, #64 add x0, sp, #32 bl ECP_Sm2MulMont // m = m * zsqr mov x16, x8 mov x17, x9 mov x19, x10 mov x20, x11 mov x4, x8 mov x5, x9 mov x6, x10 mov x7, x11 add x0, sp, #32 bl ECP_Sm2AddCore mov x16, x4 mov x17, x5 ldr x3, [x22] mov x19, x6 ldp x4, x5, [sp, #0] mov x20, x7 ldp x6, x7, [sp, #16] bl ECP_Sm2AddCore // m = 3 * m mov x2, x22 add x0, sp, #0 bl ECP_Sm2MulMont // s = s * a->x mov x16, x8 mov x17, x9 ldp x4, x5, [sp, #32] mov x19, x10 mov x20, x11 ldp x6, x7, [sp, #32+16] add x0, sp, #96 bl ECP_Sm2AddCore // tmp = 2 * s mov x0, x21 bl ECP_Sm2SqrMont // res_x = m^2 add x2, sp, #96 bl ECP_Sm2SubAB // res_x = res_x - tmp add x2, sp, #0 add x0, sp, #0 bl ECP_Sm2SubBA // s = s - res_x ldr x3, [sp, #32] mov x4, x8 mov x5, x9 mov x6, x10 mov x7, x11 add x2, sp, #32 bl ECP_Sm2MulMont // s = s * m add x2, x21, #32 add x0, x21, #32 bl ECP_Sm2SubAB // res_y = s - res_y mov sp, x29 ldp x19, x20,[x29, #16] ldp x21, x22,[x29, #32] ldp x29, x30,[sp], #80 AARCH64_AUTIASP ret .size ECP_Sm2PointDoubleMont,.-ECP_Sm2PointDoubleMont # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-1998-cmo # Deal process: # U1 = X1*Z22 # U2 = X2*Z12 # S1 = Y1*Z23 # S2 = Y2*Z13 # H = U2-U1 # r = S2-S1 # X3 = r2-H3-2*U1*H2 # Y3 = r*(U1*H2-X3)-S1*H3 # Z3 = Z1*Z2*H .globl ECP_Sm2PointAddMont .type ECP_Sm2PointAddMont,%function .align 4 ECP_Sm2PointAddMont: AARCH64_PACIASP stp x29, x30,[sp, #-80]! mov x29, sp stp x19, x20,[sp, #16] stp x21, x22,[sp, #32] stp x23, x24,[sp, #48] stp x25, x26,[sp, #64] sub sp,sp, #32*12 ldp x4, x5,[x2, #64] ldp x6, x7,[x2, #64+16] mov x21, x0 mov x22, x1 // backup points mov x23, x2 adrp x14, .Lpoly+8 add x14, x14,:lo12:.Lpoly+8 // p[1] ldr x14, [x14] adrp x15, .Lpoly+24 add x15, x15,:lo12:.Lpoly+24 // p[3] ldr x15, [x15] orr x16, x4, x5 orr x19, x6, x7 orr x25, x16, x19 cmp x25, #0 csetm x25, ne // check the point is(x, y, 0) add x0, sp, #128 bl ECP_Sm2SqrMont // z1sqr = z1^2 ldp x4, x5,[x22, #64] ldp x6, x7,[x22, #64+16] orr x16, x4, x5 orr x19, x6, x7 orr x24, x16, x19 cmp x24, #0 csetm x24, ne // check the point is(x, y, 0) add x0, sp, #224 bl ECP_Sm2SqrMont // z2sqr = z2^2 ldr x3, [x23, #64] ldp x4, x5,[sp, #128] ldp x6, x7,[sp, #128+16] add x2, x23, #64 add x0,sp, #320 bl ECP_Sm2MulMont // s2 = z1^3 ldr x3,[x22, #64] ldp x4, x5,[sp, #224] ldp x6, x7,[sp, #224+16] add x2, x22, #64 add x0,sp, #352 bl ECP_Sm2MulMont // s2 = y2 * z1^3 ldr x3,[x22, #32] ldp x4, x5,[sp, #320] ldp x6, x7,[sp, #320+16] add x2, x22, #32 add x0,sp, #320 bl ECP_Sm2MulMont ldr x3,[x23, #32] ldp x4, x5,[sp, #352] ldp x6, x7,[sp, #352+16] add x2, x23, #32 add x0,sp, #352 bl ECP_Sm2MulMont add x2,sp, #320 ldr x3,[sp, #128] ldp x4, x5,[x22] ldp x6, x7,[x22, #16] add x0,sp, #96 bl ECP_Sm2SubAB orr x8, x8, x9 orr x10, x10, x11 orr x26, x8, x10 add x2,sp, #128 add x0,sp, #256 bl ECP_Sm2MulMont ldr x3,[sp, #224] ldp x4, x5,[x23] ldp x6, x7,[x23, #16] add x2,sp, #224 add x0,sp, #288 bl ECP_Sm2MulMont add x2,sp, #256 ldp x4, x5,[sp, #96] ldp x6, x7,[sp, #96+16] add x0,sp, #192 bl ECP_Sm2SubAB orr x8, x8, x9 orr x10, x10, x11 orr x8, x8, x10 tst x8, x8 b.ne .Ladd_proceed tst x24, x25 b.eq .Ladd_proceed tst x26, x26 b.eq .Ladd_double stp xzr, xzr,[x21] stp xzr, xzr,[x21, #16] stp xzr, xzr,[x21, #32] stp xzr, xzr,[x21, #48] stp xzr, xzr,[x21, #64] stp xzr, xzr,[x21, #80] b .Ladd_done .align 4 .Ladd_double: mov x1, x22 mov x0, x21 ldp x23, x24,[x29, #48] ldp x25, x26,[x29, #64] add sp,sp, #32*(12-4) b .Lpoint_double .align 4 .Ladd_proceed: add x0,sp, #128 bl ECP_Sm2SqrMont ldr x3,[x22, #64] ldp x4, x5,[sp, #192] ldp x6, x7,[sp, #192+16] add x2, x22, #64 add x0,sp, #64 bl ECP_Sm2MulMont ldp x4, x5,[sp, #192] ldp x6, x7,[sp, #192+16] add x0,sp, #224 bl ECP_Sm2SqrMont ldr x3,[x23, #64] ldp x4, x5,[sp, #64] ldp x6, x7,[sp, #64+16] add x2, x23, #64 add x0,sp, #64 bl ECP_Sm2MulMont ldr x3,[sp, #192] ldp x4, x5,[sp, #224] ldp x6, x7,[sp, #224+16] add x2,sp, #192 add x0,sp, #160 bl ECP_Sm2MulMont ldr x3,[sp, #224] ldp x4, x5,[sp, #256] ldp x6, x7,[sp, #256+16] add x2,sp, #224 add x0,sp, #288 bl ECP_Sm2MulMont mov x16, x8 mov x17, x9 mov x19, x10 mov x20, x11 add x0,sp, #224 bl ECP_Sm2AddCore add x2,sp, #128 add x0,sp, #0 bl ECP_Sm2SubBA add x2,sp, #160 bl ECP_Sm2SubAB add x2,sp, #288 ldr x3,[sp, #160] ldp x4, x5,[sp, #320] ldp x6, x7,[sp, #320+16] add x0,sp, #32 bl ECP_Sm2SubBA add x2,sp, #160 add x0,sp, #352 bl ECP_Sm2MulMont ldr x3,[sp, #96] ldp x4, x5,[sp, #32] ldp x6, x7,[sp, #32+16] add x2,sp, #96 add x0,sp, #32 bl ECP_Sm2MulMont add x2,sp, #352 bl ECP_Sm2SubAB ldp x4, x5,[sp, #0] ldp x6, x7,[sp, #16] ldp x16, x17,[x23] ldp x19, x20,[x23, #16] ldp x8, x9,[x22, #0] cmp x24, #0 csel x16, x4, x16,ne csel x17, x5, x17,ne csel x19, x6, x19,ne csel x20, x7, x20,ne cmp x25, #0 csel x8, x16, x8,ne csel x9, x17, x9,ne csel x10, x19, x10,ne csel x11, x20, x11,ne stp x8, x9,[x21, #0] stp x10, x11,[x21, #16] ldp x10, x11,[x22, #16] ldp x4, x5,[sp, #32] ldp x6, x7,[sp, #48] ldp x16, x17,[x23, #32] ldp x19, x20,[x23, #48] ldp x8, x9,[x22, #32] cmp x24, #0 csel x16, x4, x16,ne csel x17, x5, x17,ne csel x19, x6, x19,ne csel x20, x7, x20,ne cmp x25, #0 csel x8, x16, x8,ne csel x9, x17, x9,ne csel x10, x19, x10,ne csel x11, x20, x11,ne stp x8, x9,[x21, #32] stp x10, x11,[x21, #32+16] ldp x10, x11,[x22, #32+16] ldp x8, x9, [x22, #64] ldp x16, x17,[x23, #32+32] ldp x19, x20,[x23, #32+48] ldp x4, x5,[sp, #32+32] ldp x6, x7,[sp, #32+48] cmp x24, #0 ldp x10, x11,[x22, #64+16] csel x16, x4, x16,ne csel x17, x5, x17,ne csel x19, x6, x19,ne csel x20, x7, x20,ne cmp x25, #0 csel x8, x16, x8, ne csel x9, x17, x9, ne csel x10, x19, x10, ne csel x11, x20, x11, ne stp x8, x9,[x21, #64] stp x10, x11,[x21, #64+16] .Ladd_done: mov sp, x29 ldp x19, x20,[x29, #16] ldp x21, x22,[x29, #32] ldp x23, x24,[x29, #48] ldp x25, x26,[x29, #64] ldp x29, x30,[sp], #80 AARCH64_AUTIASP ret .size ECP_Sm2PointAddMont,.-ECP_Sm2PointAddMont # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2007-bl # Deal process: # Z1Z1 = Z12 # U2 = X2*Z1Z1 # S2 = Y2*Z1*Z1Z1 # H = U2-X1 # HH = H2 # I = 4*HH # J = H*I # r = 2*(S2-Y1) # V = X1*I # X3 = r2-J-2*V # Y3 = r*(V-X3)-2*Y1*J # Z3 = (Z1+H)2-Z1Z1-HH .globl ECP_Sm2PointAddAffineMont .type ECP_Sm2PointAddAffineMont,%function .align 4 ECP_Sm2PointAddAffineMont: AARCH64_PACIASP stp x29, x30,[sp, #-80]! mov x29, sp stp x19, x20,[sp, #16] stp x21, x22,[sp, #32] stp x23, x24,[sp, #48] stp x25, x26,[sp, #64] sub sp, sp, #32*10 mov x21, x0 // backup r mov x22, x1 // point a mov x23, x2 // point b adrp x14, .Lpoly+8 add x14, x14,:lo12:.Lpoly+8 ldr x14,[x14] adrp x15, .Lpoly+24 add x15, x15,:lo12:.Lpoly+24 ldr x15,[x15] ldp x4, x5,[x1, #64] // &(a->z[0]), a->z[0] is marked as z1[0] ldp x6, x7,[x1, #64+16] // &(a->z[2]) orr x16, x4, x5 orr x19, x6, x7 orr x24, x16, x19 cmp x24, #0 csetm x24, ne // check is (x, y 0) ldp x8, x9, [x2] // &(b->x[0]) ldp x10, x11, [x2, #16] // &(b->x[2]) ldp x16, x17, [x2, #32] // &(b->y[0]) ldp x19, x20, [x2, #48] // &(b->y[2]) orr x8, x8, x9 orr x10, x10, x11 orr x16, x16, x17 orr x19, x19, x20 orr x8, x8, x10 orr x16, x16, x19 orr x25, x8, x16 cmp x25, #0 csetm x25, ne // check is (x, y 0) add x0, sp, #128 bl ECP_Sm2SqrMont // zsqr = z1^2 mov x4, x8 mov x5, x9 mov x6, x10 mov x7, x11 ldr x3, [x23] mov x2, x23 add x0, sp, #96 bl ECP_Sm2MulMont // u2 = z1^2 * x2 mov x2, x22 ldr x3, [x22, #64] ldp x4, x5, [sp, #128] ldp x6, x7, [sp, #128+16] add x0,sp, #160 bl ECP_Sm2SubAB add x2, x22, #64 add x0,sp, #128 bl ECP_Sm2MulMont ldr x3,[x22, #64] ldp x4, x5,[sp, #160] ldp x6, x7,[sp, #160+16] add x2, x22, #64 add x0,sp, #64 bl ECP_Sm2MulMont ldr x3,[x23, #32] ldp x4, x5,[sp, #128] ldp x6, x7,[sp, #128+16] add x2, x23, #32 add x0,sp, #128 bl ECP_Sm2MulMont add x2, x22, #32 ldp x4, x5,[sp, #160] ldp x6, x7,[sp, #160+16] add x0,sp, #192 bl ECP_Sm2SubAB add x0,sp, #224 bl ECP_Sm2SqrMont ldp x4, x5,[sp, #192] ldp x6, x7,[sp, #192+16] add x0,sp, #288 bl ECP_Sm2SqrMont ldr x3,[sp, #160] ldp x4, x5,[sp, #224] ldp x6, x7,[sp, #224+16] add x2,sp, #160 add x0,sp, #256 bl ECP_Sm2MulMont ldr x3,[x22] ldp x4, x5,[sp, #224] ldp x6, x7,[sp, #224+16] mov x2, x22 add x0,sp, #96 bl ECP_Sm2MulMont mov x16, x8 mov x17, x9 mov x19, x10 mov x20, x11 add x0,sp, #224 bl ECP_Sm2AddCore add x2,sp, #288 add x0,sp, #0 bl ECP_Sm2SubBA add x2,sp, #256 bl ECP_Sm2SubAB add x2,sp, #96 ldr x3,[x22, #32] ldp x4, x5,[sp, #256] ldp x6, x7,[sp, #256+16] add x0,sp, #32 bl ECP_Sm2SubBA add x2, x22, #32 add x0,sp, #128 bl ECP_Sm2MulMont ldr x3,[sp, #192] ldp x4, x5,[sp, #32] ldp x6, x7,[sp, #32+16] add x2,sp, #192 add x0,sp, #32 bl ECP_Sm2MulMont add x2,sp, #128 bl ECP_Sm2SubAB ldp x4, x5,[sp, #0] ldp x6, x7,[sp, #16] ldp x16, x17,[x23] ldp x19, x20,[x23, #16] ldp x8, x9,[x22, #0] cmp x24, #0 ldp x10, x11,[x22, #16] csel x16, x4, x16, ne csel x17, x5, x17, ne csel x19, x6, x19, ne csel x20, x7, x20, ne cmp x25, #0 csel x8, x16, x8,ne csel x9, x17, x9,ne csel x10, x19, x10,ne csel x11, x20, x11,ne ldp x4, x5,[sp, #32] ldp x6, x7,[sp, #48] ldp x16, x17,[x23, #32] ldp x19, x20,[x23, #48] stp x8, x9,[x21, #0] stp x10, x11,[x21, #16] ldp x8, x9,[x22, #32] cmp x24, #0 ldp x10, x11,[x22, #32+16] csel x16, x4, x16,ne csel x17, x5, x17,ne csel x19, x6, x19,ne csel x20, x7, x20,ne cmp x25, #0 csel x8, x16, x8,ne csel x9, x17, x9,ne csel x10, x19, x10,ne csel x11, x20, x11,ne stp x8, x9,[x21, #32] stp x10, x11,[x21, #32+16] ldp x4, x5,[sp, #32+32] ldp x6, x7,[sp, #32+48] adrp x23, .Lone_mont add x23,x23,:lo12:.Lone_mont ldp x16, x17,[x23] ldp x19, x20,[x23, #16] ldp x8, x9,[x22, #64] ldp x10, x11,[x22, #64+16] cmp x24, #0 csel x16, x4, x16, ne csel x17, x5, x17, ne csel x19, x6, x19, ne csel x20, x7, x20, ne cmp x25, #0 csel x8, x16, x8, ne csel x9, x17, x9, ne csel x10, x19, x10, ne csel x11, x20, x11, ne stp x8, x9, [x21, #64] stp x10, x11, [x21, #64+16] mov sp, x29 ldp x19, x20,[x29, #16] ldp x21, x22,[x29, #32] ldp x23, x24,[x29, #48] ldp x25, x26,[x29, #64] ldp x29, x30,[sp], #80 AARCH64_AUTIASP ret .size ECP_Sm2PointAddAffineMont,.-ECP_Sm2PointAddAffineMont #endif
2401_83913325/openHiTLS-examples_7925
crypto/ecc/src/asm/ecp_sm2_armv8.S
Unix Assembly
unknown
42,773
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_CURVE_SM2 .file "ecp_sm2_x86_64.S" .text .set s0,%r8 .set s1,%r9 .set s2,%r10 .set s3,%r11 .set s4,%r12 .set s5,%r13 .set s6,%r14 .set s7,%r15 .macro REGISTER_SAVE pushq %r12 pushq %r13 pushq %r14 pushq %r15 pushq %rbx pushq %rbp .endm .macro REGISTER_POP popq %rbp popq %rbx popq %r15 popq %r14 popq %r13 popq %r12 .endm # The polynomial .align 64 .Lpoly: .quad 0xffffffffffffffff, 0xffffffff00000000, 0xffffffffffffffff, 0xfffffffeffffffff # The order of polynomial .Lord: .quad 0x53bbf40939d54123, 0x7203df6b21c6052b, 0xffffffffffffffff, 0xfffffffeffffffff .Lpoly_div_2: .quad 0x8000000000000000, 0xffffffff80000000, 0xffffffffffffffff, 0x7fffffff7fffffff .Lord_div_2: .quad 0xa9ddfa049ceaa092, 0xb901efb590e30295, 0xffffffffffffffff, 0x7fffffff7fffffff .Lzero: .quad 0, 0, 0, 0 .Lord_1div4: .quad 0xd4eefd024e755049, 0xdc80f7dac871814a, 0xffffffffffffffff, 0x3fffffffbfffffff .Lord_2div4: .quad 0xa9ddfa049ceaa092, 0xb901efb590e30295, 0xffffffffffffffff, 0x7fffffff7fffffff .Lord_3div4: .quad 0x7eccf706eb5ff0db, 0x9582e790595483e0, 0xffffffffffffffff, 0xbfffffff3fffffff .Lpoly_1div4: .quad 0x4000000000000000, 0xffffffffc0000000, 0xffffffffffffffff, 0x3fffffffbfffffff .Lpoly_2div4: .quad 0x8000000000000000, 0xffffffff80000000, 0xffffffffffffffff, 0x7fffffff7fffffff .Lpoly_3div4: .quad 0xc000000000000000, 0xffffffff40000000, 0xffffffffffffffff, 0xbfffffff3fffffff .LRR:// 2^512 mod P precomputed for sm2 polynomial .quad 0x0000000200000003, 0x00000002ffffffff, 0x0000000100000001, 0x0000000400000002 .Lone_mont: .quad 0x0000000000000001, 0x00000000ffffffff, 0x0000000000000000, 0x0000000100000000 .Lone: .quad 1,0,0,0 .LOne: .long 1,1,1,1,1,1,1,1 .globl ECP_Sm2Div2 .type ECP_Sm2Div2,@function .align 64 ECP_Sm2Div2: movq (%rdi),%r8 movq 8(%rdi),%r9 movq 16(%rdi),%r10 movq 24(%rdi),%r11 shrdq $1,%r9,%r8 shrdq $1,%r10,%r9 shrdq $1,%r11,%r10 shrq $1,%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) ret .size ECP_Sm2Div2, .-ECP_Sm2Div2 .globl ECP_Sm2Div4 .type ECP_Sm2Div4,@function .align 64 ECP_Sm2Div4: movq (%rdi),%r8 movq 8(%rdi),%r9 movq 16(%rdi),%r10 movq 24(%rdi),%r11 shrdq $2,%r9,%r8 shrdq $2,%r10,%r9 shrdq $2,%r11,%r10 shrq $2,%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) ret .size ECP_Sm2Div4, .-ECP_Sm2Div4 .globl ECP_Sm2Neg .type ECP_Sm2Neg,@function .align 64 ECP_Sm2Neg: movq (%rdi),%r8 xorq %rax,%rax movq $-1,%r8 movq $0xffffffff00000000,%r9 movq $0xfffffffeffffffff,%r11 movq $-1,%r10 subq 0(%rsi),%r8 sbbq 8(%rsi),%r9 sbbq 16(%rsi),%r10 sbbq 24(%rsi),%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) ret .size ECP_Sm2Neg, .-ECP_Sm2Neg .globl ECP_Sm2BnSub .type ECP_Sm2BnSub,@function .align 64 ECP_Sm2BnSub: movq (%rsi),%r8 movq 8(%rsi),%r9 movq 16(%rsi),%r10 movq 24(%rsi),%r11 subq (%rdx),%r8 sbbq 8(%rdx),%r9 sbbq 16(%rdx),%r10 sbbq 24(%rdx),%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) ret .size ECP_Sm2BnSub, .-ECP_Sm2BnSub .globl ECP_Sm2BnAdd .type ECP_Sm2BnAdd,@function .align 64 ECP_Sm2BnAdd: movq (%rsi),%r8 movq 8(%rsi),%r9 movq 16(%rsi),%r10 movq 24(%rsi),%r11 addq (%rdx),%r8 adcq 8(%rdx),%r9 adcq 16(%rdx),%r10 adcq 24(%rdx),%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) ret .size ECP_Sm2BnAdd, .-ECP_Sm2BnAdd .globl ECP_Sm2Div2ModP .type ECP_Sm2Div2ModP,@function .align 64 ECP_Sm2Div2ModP: subq $24,%rsp movq %rbx,(%rsp) movq %r12,8(%rsp) movq %r13,16(%rsp) xorq %r12,%r12 movq (%rsi),%r8 movq 8(%rsi),%r9 movq 16(%rsi),%r10 movq 24(%rsi),%r11 movq %r8,%r13 andq $1,%r13 shrdq $1,%r9,%r8 shrdq $1,%r10,%r9 shrdq $1,%r11,%r10 shrdq $1,%r12,%r11 leaq .Lzero(%rip),%rax leaq .Lpoly_div_2(%rip),%rbx cmpq $1,%r13 cmoveq %rbx,%rax addq (%rax),%r8 adcq 8(%rax),%r9 adcq 16(%rax),%r10 adcq 24(%rax),%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) movq (%rsp),%rbx movq 8(%rsp),%r12 movq 16(%rsp),%r13 addq $24,%rsp ret .size ECP_Sm2Div2ModP, .-ECP_Sm2Div2ModP .globl ECP_Sm2Div2ModOrd .type ECP_Sm2Div2ModOrd,@function .align 64 ECP_Sm2Div2ModOrd: subq $24,%rsp movq %rbx,(%rsp) movq %r12,8(%rsp) movq %r13,16(%rsp) xorq %r12,%r12 movq (%rsi),%r8 movq 8(%rsi),%r9 movq 16(%rsi),%r10 movq 24(%rsi),%r11 movq %r8,%r13 andq $1,%r13 shrdq $1,%r9,%r8 shrdq $1,%r10,%r9 shrdq $1,%r11,%r10 shrdq $1,%r12,%r11 leaq .Lzero(%rip),%rax leaq .Lord_div_2(%rip),%rbx cmpq $1,%r13 cmoveq %rbx,%rax addq (%rax),%r8 adcq 8(%rax),%r9 adcq 16(%rax),%r10 adcq 24(%rax),%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) movq (%rsp),%rbx movq 8(%rsp),%r12 movq 16(%rsp),%r13 addq $24,%rsp ret .size ECP_Sm2Div2ModOrd, .-ECP_Sm2Div2ModOrd .globl ECP_Sm2Div4ModP .type ECP_Sm2Div4ModP,@function .align 64 ECP_Sm2Div4ModP: subq $24,%rsp movq %rbx,(%rsp) movq %r12,8(%rsp) movq %r13,16(%rsp) xorq %r12,%r12 movq (%rsi),%r8 movq 8(%rsi),%r9 movq 16(%rsi),%r10 movq 24(%rsi),%r11 movq %r8,%r13 andq $3,%r13 shrdq $2,%r9,%r8 shrdq $2,%r10,%r9 shrdq $2,%r11,%r10 shrdq $2,%r12,%r11 leaq .Lzero(%rip),%rax leaq .Lpoly_1div4(%rip),%rbx leaq .Lpoly_2div4(%rip),%rcx leaq .Lpoly_3div4(%rip),%rdx cmpq $1,%r13 cmoveq %rbx,%rax cmpq $2,%r13 cmoveq %rcx,%rax cmpq $3,%r13 cmoveq %rdx,%rax addq (%rax),%r8 adcq 8(%rax),%r9 adcq 16(%rax),%r10 adcq 24(%rax),%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) movq (%rsp),%rbx movq 8(%rsp),%r12 movq 16(%rsp),%r13 addq $24,%rsp ret .size ECP_Sm2Div4ModP, .-ECP_Sm2Div4ModP .globl ECP_Sm2Div4ModOrd .type ECP_Sm2Div4ModOrd,@function .align 64 ECP_Sm2Div4ModOrd: subq $24,%rsp movq %rbx,(%rsp) movq %r12,8(%rsp) movq %r13,16(%rsp) xorq %r12,%r12 movq (%rsi),%r8 movq 8(%rsi),%r9 movq 16(%rsi),%r10 movq 24(%rsi),%r11 movq %r8,%r13 andq $3,%r13 shrdq $2,%r9,%r8 shrdq $2,%r10,%r9 shrdq $2,%r11,%r10 shrdq $2,%r12,%r11 leaq .Lzero(%rip),%rax leaq .Lord_1div4(%rip),%rbx leaq .Lord_2div4(%rip),%rcx leaq .Lord_3div4(%rip),%rdx cmpq $1,%r13 cmoveq %rbx,%rax cmpq $2,%r13 cmoveq %rcx,%rax cmpq $3,%r13 cmoveq %rdx,%rax addq (%rax),%r8 adcq 8(%rax),%r9 adcq 16(%rax),%r10 adcq 24(%rax),%r11 movq %r8,(%rdi) movq %r9,8(%rdi) movq %r10,16(%rdi) movq %r11,24(%rdi) movq (%rsp),%rbx movq 8(%rsp),%r12 movq 16(%rsp),%r13 addq $24,%rsp ret .size ECP_Sm2Div4ModOrd, .-ECP_Sm2Div4ModOrd #define bn_mod_add(mod) \ /* Store scalar registers */ \ subq $32, %rsp; \ movq %r12, (%rsp); \ movq %r13, 8(%rsp); \ movq %r14, 16(%rsp); \ movq %r15, 24(%rsp); \ xorq %rax, %rax; \ /* Load inputs */ \ movq (%rsi), %r8; \ movq 8(%rsi), %r9; \ movq 16(%rsi), %r10; \ movq 24(%rsi), %r11; \ /* Addition */ \ addq (%rdx), %r8; \ adcq 8(%rdx), %r9; \ adcq 16(%rdx), %r10; \ adcq 24(%rdx), %r11; \ /* Store carry */ \ adcq $0, %rax; \ movq %r8, %r12; \ movq %r9, %r13; \ movq %r10, %r14; \ movq %r11, %r15; \ /* Sub polynomial */ \ leaq mod, %rsi; \ subq 0(%rsi), %r8; \ sbbq 8(%rsi), %r9; \ sbbq 16(%rsi), %r10; \ sbbq 24(%rsi), %r11; \ sbbq $0, %rax; \ cmovcq %r12, %r8; \ cmovcq %r13, %r9; \ cmovcq %r14, %r10; \ cmovcq %r15, %r11; \ /* Store results */ \ movq %r8, (%rdi); \ movq %r9, 8(%rdi); \ movq %r10, 16(%rdi); \ movq %r11, 24(%rdi); \ /* Restore scalar registers */ \ movq (%rsp), %r12; \ movq 8(%rsp), %r13; \ movq 16(%rsp), %r14; \ movq 24(%rsp), %r15; \ addq $32, %rsp; \ #define bn_mod_sub(mod) \ /* Store scalar registers */ \ subq $32, %rsp; \ movq %r12, (%rsp); \ movq %r13, 8(%rsp); \ movq %r14, 16(%rsp); \ movq %r15, 24(%rsp); \ xorq %rax, %rax; \ /* Load inputs */ \ movq (%rsi), %r8; \ movq 8(%rsi), %r9; \ movq 16(%rsi), %r10; \ movq 24(%rsi), %r11; \ /* Subtraction */ \ subq (%rdx), %r8; \ sbbq 8(%rdx), %r9; \ sbbq 16(%rdx), %r10; \ sbbq 24(%rdx), %r11; \ sbbq $0, %rax; \ movq %r8, %r12; \ movq %r9, %r13; \ movq %r10, %r14; \ movq %r11, %r15; \ /* Add polynomial */ \ leaq mod, %rsi; \ addq 0(%rsi), %r8; \ adcq 8(%rsi), %r9; \ adcq 16(%rsi), %r10; \ adcq 24(%rsi), %r11; \ testq %rax, %rax; \ cmovzq %r12, %r8; \ cmovzq %r13, %r9; \ cmovzq %r14, %r10; \ cmovzq %r15, %r11; \ /* Store results */ \ movq %r8, (%rdi); \ movq %r9, 8(%rdi); \ movq %r10, 16(%rdi); \ movq %r11, 24(%rdi); \ /* Restore scalar registers */ \ movq (%rsp), %r12; \ movq 8(%rsp), %r13; \ movq 16(%rsp), %r14; \ movq 24(%rsp), %r15; \ addq $32, %rsp; \ ### Modular add: r = a+b mod n/p, where n = ord(p) ### # void ECP_Sm2AddModP(uint64_t *r, const uint64_t *a, const uint64_t *b) # Modular poly add # r %rdi # a %rsi # b %rdx .globl ECP_Sm2AddModP .type ECP_Sm2AddModP, @function .align 64 ECP_Sm2AddModP: bn_mod_add(.Lpoly(%rip)) ret .size ECP_Sm2AddModP, .-ECP_Sm2AddModP # void ECP_Sm2AddModOrd(uint64_t *r, const uint64_t *a, const uint64_t *b) # Modular order add # r %rdi # a %rsi # b %rdx .globl ECP_Sm2AddModOrd .type ECP_Sm2AddModOrd, @function .align 64 ECP_Sm2AddModOrd: bn_mod_add(.Lord(%rip)) ret .size ECP_Sm2AddModOrd, .-ECP_Sm2AddModOrd ### Modular sub: r = a-b mod n/p, where n = ord(p) ### # void ECP_Sm2SubModP(uint64_t *r, const uint64_t *a, const uint64_t *b) # Modular poly sub # r %rdi # a %rsi # b %rdx .globl ECP_Sm2SubModP .type ECP_Sm2SubModP, @function .align 64 ECP_Sm2SubModP: bn_mod_sub(.Lpoly(%rip)) ret .size ECP_Sm2SubModP, .-ECP_Sm2SubModP # void ECP_Sm2SubModOrd(uint64_t *r, const uint64_t *a, const uint64_t *b) # Modular order sub # r %rdi # a %rsi # b %rdx .globl ECP_Sm2SubModOrd .type ECP_Sm2SubModOrd, @function .align 64 ECP_Sm2SubModOrd: bn_mod_sub(.Lord(%rip)) ret .size ECP_Sm2SubModOrd, .-ECP_Sm2SubModOrd .macro RDC # r = a mod p256 # a = a15 | a14 | ... | a0, where ai are 32–bit quantities # | a7 | a6 | a5 | a4 | a3 | a2 | a1 | a0 | (+) # | a8 | a11 | a10 | a9 | a8 | 0 | a9 | a8 | (+) # | a9 | a14 | a13 | a12 | a11 | 0 | a10 | a9 | (+) # | a10 | a15 | a14 | a13 | a12 | 0 | a11 | a10 | (+) # | a11 | 0 | a15 | a14 | a13 | 0 | a12 | a11 | (+) # | a12 | 0 | a15 | a14 | a13 | 0 | a13 | a12 | (+) # | a12 | 0 | 0 | a15 | a14 | 0 | a14 | a13 | (+) # | a13 | 0 | 0 | 0 | a15 | 0 | a14 | a13 | (+) # | a13 | 0 | 0 | 0 | 0 | 0 | a15 | a14 | (+) # | a14 | 0 | 0 | 0 | 0 | 0 | a15 | a14 | (+) # | a14 | 0 | 0 | 0 | 0 | 0 | 0 | a15 | (+) # | a15 | 0 | 0 | 0 | 0 | 0 | 0 | a15 | (+) # | a15 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | (+) # | a15 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | (+) # | 0 | 0 | 0 | 0 | 0 | a8 | 0 | 0 | (-) # | 0 | 0 | 0 | 0 | 0 | a9 | 0 | 0 | (-) # | 0 | 0 | 0 | 0 | 0 | a13 | 0 | 0 | (-) # | 0 | 0 | 0 | 0 | 0 | a14 | 0 | 0 | (-) # | U[7]| U[6]| U[5]| U[4]| U[3]| U[2]| U[1]| U[0]| # | V[3] | V[2] | V[1] | V[0] | # until r < p256 # s7 (a15|a14), s6 (a13|a12), s5 (a11|a10), s4 (a9|a8) # s3 (a7|a6), s2 (a5|a4), s1 (a3|a2), s0 (a1|a0) # 1. 64-bit addition xorq %rsi, %rsi # to store all carry xorq %rax, %rax movq s6, %rcx # rcx <- s6 movq s4, %rdx # rdx <- s4 # a13 | a12 addq s7, %rcx # rcx <- s6 + s7 adcq $0, %rax # rax <- carry(s6+s7) addq s7, %rcx # rcx <- s6 + 2*s7 adcq $0, %rax # a9 | a8 movq %rax, %rbx # rbx <- carry (rax) addq %rcx, %rdx # rdx <- s4 + s6 + 2*s7 adcq $0, %rbx addq s5, %rdx # rdx <- s4 + s5 + s6 + 2*s7 adcq $0, %rbx # sum addq %rdx, s0 # s0 <- s0 + s4 + s5 + s6 + 2*s7 adcq %rbx, s1 # s1 <- s1 + rbx + carry adcq %rcx, s2 # s2 <- s2 + s6 + 2*s7 + carry adcq s7, s3 # s3 <- s3 + s7 + carry adcq $0, %rsi # add carry addq %rax, s3 adcq $0, %rsi # rsi <- carry # store registers movq s0, (%rsp) movq s1, 8(%rsp) movq s2, 16(%rsp) movq s3, 24(%rsp) # 2. 4 -> 8 64-bit to 32-bit spread movq $0xffffffff, %rax movq s4, s0 movq s5, s1 movq s6, s2 movq s7, s3 andq %rax, s0 # a8 andq %rax, s1 # a10 andq %rax, s2 # a12 andq %rax, s3 # a14 shrq $32, s4 # a9 shrq $32, s5 # a11 shrq $32, s6 # a13 shrq $32, s7 # a15 # 3. 32-bit addition movq s3, %rax addq s2, %rax # rax <- a12 + a14 movq s3, %rbx addq s1, %rbx # rbx <- a10 + a14 movq s7, %rcx addq s6, %rcx # rcx <- a13 + a15 movq s0, %rdx addq s4, %rdx # rdx <- a8 + a9 addq s5, s7 # s7 <- a11 + a15 movq %rcx, s2 # s2 <- a13 + a15 addq %rax, s2 # s2 <- a12 + a13 + a14 + a15 addq s2, s1 # s1 <- a10 + a12 + a13 + a14 + a15 addq s2, s1 # s1 <- a10 + 2*(a12 + a13 + a14 + a15) addq %rdx, s1 # s1 <- a8 + a9 + a10 + 2*(a12 + a13 + a14 + a15) addq s5, s1 # s1 <- a8 + a9 + a10 + a11 + 2*(a12 + a13 + a14 + a15) addq s6, s2 # s2 <- a12 + 2*a13 + a14 + a15 addq s5, s2 # s2 <- a11 + a12 + 2*a13 + a14 + a15 addq s0, s2 # s2 <- a8 + a11 + a12 + 2*a13 + a14 + a15 addq s3, %rdx # rdx <- a8 + a9 + a14 addq s6, %rdx # rdx <- a8 + a9 + a13 + a14 addq %rcx, s4 # s4 <- a9 + a13 + a15 addq s4, s5 # s5 <- a9 + a11 + a13 + a15 addq %rcx, s5 # s5 <- a9 + a11 + 2*(a13 + a15) addq %rbx, %rax # rax <- a10 + a12 + 2*a14 # U[0] s5 a9 + a11 + 2*(a13 + a15) # U[1] %rax a10 + a12 + 2*a14 # U[2] # U[3] s2 a8 + a11 + a12 + 2*a13 + a14 + a15 # U[4] s4 a9 + a13 + a15 # U[5] %rbx a10 + a14 # U[6] s7 a11 + a15 # U[7] s1 a8 + a9 + a10 + a11 + 2*(a12 + a13 + a14 + a15) # sub %rdx a8 + a9 + a13 + a14 # vacant registers: s0 s3 s6 %rcx # 4. 8 -> 4 32-bit to 64-bit # sub %rdx movq %rax, s0 shlq $32, s0 # U[1]'(s0) <- U[1] << 32 shrd $32, s2, %rax # U[3]'(%rax) <- U[3]U[1] >> 32 shrd $32, %rbx, s2 # U[5]'(s2) <- U[5]U[3] >> 32 shrd $32, s1, %rbx # U[7]'(%rbx) <- U[7]U[5] >> 32 shrq $32, s1 # U[7](s1) <- U[7] >> 32 (carry) # 5. 64-bit addition addq s0, s5 # U[0] <- U[1]' + U[0] adcq $0, %rax # U[3]' <- 0 + U[3]' adcq s2, s4 # U[4] <- U[5]' + U[4] adcq %rbx, s7 # U[6] <- U[7]' + U[6] adcq s1, %rsi # rsi <- U[7]carry + carry # V[0] s5 # V[1] %rax # V[2] s4 # V[3] s7 # carry %rsi # sub %rdx # 5. ADD & SUB movq (%rsp), s0 movq 8(%rsp), s1 movq 16(%rsp), s2 movq 24(%rsp), s3 # ADD addq s5, s0 adcq %rax, s1 adcq s4, s2 adcq s7, s3 adcq $0, %rsi # SUB subq %rdx, s1 sbbq $0, s2 sbbq $0, s3 sbbq $0, %rsi # 6. MOD # First Mod movq %rsi, %rax # rax <- carry (rsi) +out[0] shlq $32, %rax # rax <- carry << 32 movq %rax, %rcx # rcx <- rax +out[3] subq %rsi, %rax # rax <- carry << 32 - carry +out[1] addq %rsi, s0 adcq %rax, s1 adcq $0, s2 adcq %rcx, s3 # Last Mod # return r - p if r > p else r movq s0, s4 movq s1, s5 movq s2, s6 movq s3, s7 leaq .Lpoly(%rip), %rsi movq $0, %rcx adcq $0, %rcx subq 0(%rsi), s0 sbbq 8(%rsi), s1 sbbq 16(%rsi), s2 sbbq 24(%rsi), s3 sbbq $0, %rcx cmovcq s4, s0 cmovcq s5, s1 cmovcq s6, s2 cmovcq s7, s3 movq s0, (%rdi) movq s1, 8(%rdi) movq s2, 16(%rdi) movq s3, 24(%rdi) .endm ### Modular mul: r = a*b mod p ### # void ECP_Sm2Mul(uint64_t *r, const uint64_t *a, const uint64_t *b) # 256-bit modular multiplication in SM2 # r %rdi # a %rsi # b %rdx .globl ECP_Sm2Mul .type ECP_Sm2Mul, @function .align 64 ECP_Sm2Mul: # Store scalar registers subq $72, %rsp movq %rbx, 32(%rsp) movq %r12, 40(%rsp) movq %r13, 48(%rsp) movq %r14, 56(%rsp) movq %r15, 64(%rsp) # Load inputs movq (%rsi), s0 movq 8(%rsi), s1 movq 16(%rsi), s2 movq 24(%rsi), s3 movq (%rdx), s4 movq 8(%rdx), s5 movq 16(%rdx), s6 movq 24(%rdx), s7 ### multiplication ### # ======================== # s7 s6 s5 s4 # * s3 s2 s1 s0 # ------------------------ # + s0 s0 s0 s0 # * * * * # s7 s6 s5 s4 # s1 s1 s1 s1 # * * * * # s7 s6 s5 s4 # s2 s2 s2 s2 # * * * * # s7 s6 s5 s4 # s3 s3 s3 s3 # * * * * # s7 s6 s5 s4 # ------------------------ # s7 s6 s5 s4 s3 s2 s1 s0 # ======================== ### s0*s4 ### movq s0, %rax mulq s4 movq %rax, (%rsp) movq %rdx, %rbx xorq %rcx, %rcx ### s1*s4 + s0*s5 ### movq s1, %rax mulq s4 addq %rax, %rbx adcq %rdx, %rcx xorq %rsi, %rsi movq s0, %rax mulq s5 addq %rax, %rbx adcq %rdx, %rcx adcq $0, %rsi movq %rbx, 8(%rsp) xorq %rbx, %rbx ### s2 * s4 + s1 * s5 + s0 *s6 ### movq s2, %rax mulq s4 addq %rax, %rcx adcq %rdx, %rsi movq s1, %rax mulq s5 addq %rax, %rcx adcq %rdx, %rsi adcq $0, %rbx movq s0, %rax mulq s6 addq %rax, %rcx adcq %rdx, %rsi adcq $0, %rbx movq %rcx, 16(%rsp) xorq %rcx, %rcx ### s3*s4 + s2*s5 + s1*s6 + s0*s7 ### movq s3, %rax mulq s4 addq %rax, %rsi adcq %rdx, %rbx adcq $0, %rcx movq s2, %rax mulq s5 addq %rax, %rsi adcq %rdx, %rbx adcq $0, %rcx movq s1, %rax mulq s6 addq %rax, %rsi adcq %rdx, %rbx adcq $0, %rcx movq s0, %rax mulq s7 addq %rax, %rsi adcq %rdx, %rbx adcq $0, %rcx movq %rsi, 24(%rsp) xorq %rsi, %rsi ### s3*s5 + s2*s6 + s1*s7 ### movq s3, %rax mulq s5 addq %rax, %rbx adcq %rdx, %rcx # carry adcq $0, %rsi movq s2, %rax mulq s6 addq %rax, %rbx adcq %rdx, %rcx adcq $0, %rsi movq s1, %rax mulq s7 addq %rax, %rbx adcq %rdx, %rcx adcq $0, %rsi movq %rbx, s4 xorq %rbx, %rbx ### s3*s6 + s2*s7 ### movq s3, %rax mulq s6 addq %rax, %rcx adcq %rdx, %rsi # carry adcq $0, %rbx movq s2, %rax mulq s7 addq %rax, %rcx adcq %rdx, %rsi adcq $0, %rbx movq %rcx, s5 ### s3*s7 ### movq s3, %rax mulq s7 addq %rax, %rsi adcq %rdx, %rbx movq %rsi, s6 movq %rbx, s7 movq (%rsp), s0 movq 8(%rsp), s1 movq 16(%rsp), s2 movq 24(%rsp), s3 # result of mul: s7 s6 s5 s4 s3 s2 s1 s0 ### Reduction ### RDC # Restore scalar registers movq 32(%rsp), %rbx movq 40(%rsp), %r12 movq 48(%rsp), %r13 movq 56(%rsp), %r14 movq 64(%rsp), %r15 addq $72, %rsp ret .size ECP_Sm2Mul, .-ECP_Sm2Mul ### Modular sqr: r = a^2 mod p ### # void ECP_Sm2Sqr(uint64_t *r, const uint64_t *a) # 256-bit modular multiplication in SM2 ### # r %rdi # a %rsi .globl ECP_Sm2Sqr .type ECP_Sm2Sqr, @function .align 64 ECP_Sm2Sqr: # Store scalar registers subq $88, %rsp movq %rbx, 32(%rsp) movq %r12, 40(%rsp) movq %r13, 48(%rsp) movq %r14, 56(%rsp) movq %r15, 64(%rsp) movq %rbp, 72(%rsp) movq %rdi, 80(%rsp) # Load inputs movq (%rsi), s4 movq 8(%rsi), s5 movq 16(%rsi), s6 movq 24(%rsi), s7 ### square ### # ======================== # s7 s6 s5 s4 # * s7 s6 s5 s4 # ------------------------ # + s4 s4 s4 s4 # * * * * # s7 s6 s5 s4 # s5 s5 s5 s5 # * * * * # s7 s6 s5 s4 # s6 s6 s6 s6 # * * * * # s7 s6 s5 s4 # s7 s7 s7 s7 # * * * * # s7 s6 s5 s4 # ------------------------ # s7 s6 s5 s4 s3 s2 s1 s0 # ======================== ### s1 <- s4*s5, s2 <- carry ### movq s5, %rax mulq s4 movq %rax, s1 movq %rdx, s2 xorq s3, s3 ### s2 <- s4*s6 + carry(s2), s3 <- carry ### movq s6, %rax mulq s4 addq %rax, s2 adcq %rdx, s3 xorq s0, s0 ### s3 <- s4*s7 + s5*s6 + carry(s3), s0 <- carry ### movq s7, %rax mulq s4 addq %rax, s3 adcq %rdx, s0 xorq %rbx, %rbx movq s6, %rax mulq s5 addq %rax, s3 adcq %rdx, s0 adcq $0, %rbx ### s0 <- s5*s7 + carry(s0), rbx <- carry ### movq s7, %rax mulq s5 addq %rax, s0 adcq %rdx, %rbx xorq %rcx, %rcx ### rbx <- s6*s7 + carry(rbx), rcx <- carry ### movq s7, %rax mulq s6 addq %rax, %rbx adcq %rdx, %rcx xorq %rsi, %rsi ### 2*s0|1|2|3 ### addq s1, s1 adcq s2, s2 adcq s3, s3 adcq s0, s0 adcq %rbx, %rbx # update carry adcq %rcx, %rcx adcq $0, %rsi ### rbp <- s4*s4, carry <- rdi ### movq s4, %rax mulq s4 movq %rax, %rbp movq %rdx, %rdi ### s4 <- s5*s5, carry <- s5 ### movq s5, %rax mulq s5 movq %rax, s4 movq %rdx, s5 ### s6*s6 ### movq s6, %rax mulq s6 # s1 += carry(s4*s4) addq %rdi, s1 # s2 += s5*s5 adcq s4, s2 # s3 += carry(s5*s5) adcq s5, s3 # s4(s0) += s6*s6 adcq %rax, s0 # s5(rbx) += carry(s6*s6) adcq %rdx, %rbx adcq $0, %rcx adcq $0, %rsi ### s7*s7 ### movq s7, %rax mulq s7 # s6(rcx) += s7*s7 addq %rax, %rcx # s7(rsi) += carry(s7*s7) adcq %rdx, %rsi movq s0, s4 movq %rbp, s0 movq %rbx, s5 movq %rcx, s6 movq %rsi, s7 # Restore rdi movq 80(%rsp), %rdi # result of mul: s7 s6 s5 s4 s3 s2 s1 s0 ### Reduction ### RDC # Restore scalar registers movq 32(%rsp), %rbx movq 40(%rsp), %r12 movq 48(%rsp), %r13 movq 56(%rsp), %r14 movq 64(%rsp), %r15 movq 72(%rsp), %rbp addq $88, %rsp ret .size ECP_Sm2Sqr, .-ECP_Sm2Sqr .globl ECP_Sm2ToMont .type ECP_Sm2ToMont,@function .align 32 ECP_Sm2ToMont: leaq .LRR(%rip), %rdx REGISTER_SAVE movq 0(%rsi), %r9 movq 8(%rsi), %r10 movq 16(%rsi), %r11 movq 24(%rsi), %r12 movq %rdx, %rbx movq 0(%rdx), %rax call ECP_Sm2MulMont REGISTER_POP ret .size ECP_Sm2ToMont,.-ECP_Sm2ToMont .type ECP_Sm2MulMont,@function .align 32 ECP_Sm2MulMont: // a[0~3] * b[0] movq %rax, %rbp mulq %r9 movq %rax, %r8 movq %rdx, %r9 movq %rbp, %rax mulq %r10 addq %rax, %r9 adcq $0, %rdx movq %rbp, %rax movq %rdx, %r10 mulq %r11 addq %rax, %r10 adcq $0, %rdx movq %rbp, %rax movq %rdx, %r11 mulq %r12 addq %rax, %r11 adcq $0, %rdx movq %rdx, %r12 movq %r8, %rax movq %r8, %r14 xorq %r13, %r13 // begin 1st reduce shlq $32, %rax shrq $32, %r14 movq %r8, %rcx subq %rax, %rcx movq $0, %rdx sbbq %r14, %rdx movq %rdx, %rbp movq $0, %rdx sbbq %rax, %rdx movq %rdx, %rax sbbq %r14, %r8 movq %r8, %rdx movq %rcx, %r8 addq %r9, %r8 movq %rbp, %r9 adcq %r10, %r9 movq %rax, %r10 adcq %r11, %r10 movq %rdx, %r11 adcq %r12, %r11 movq $0, %r12 adcq %r13, %r12 movq 8(%rbx), %rax // b[1] movq %rax, %rbp mulq 0(%rsi) addq %rax, %r8 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rcx mulq 8(%rsi) addq %rcx, %r9 adcq $0, %rdx addq %rax, %r9 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rcx mulq 16(%rsi) addq %rcx, %r10 adcq $0, %rdx addq %rax, %r10 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rcx mulq 24(%rsi) addq %rcx, %r11 adcq $0, %rdx addq %rax, %r11 movq %r9, %rax adcq %rdx, %r12 adcq $0, %r13 movq %r8, %rax movq %r8, %r14 // begin 2st reduce shlq $32, %rax shrq $32, %r14 movq %r8, %rcx subq %rax, %rcx movq $0, %rdx sbbq %r14, %rdx movq %rdx, %rbp movq $0, %rdx sbbq %rax, %rdx movq %rdx, %rax sbbq %r14, %r8 movq %r8, %rdx movq %rcx, %r8 addq %r9, %r8 movq %rbp, %r9 adcq %r10, %r9 movq %rax, %r10 adcq %r11, %r10 movq %rdx, %r11 adcq %r12, %r11 movq $0, %r12 adcq %r13, %r12 movq 16(%rbx), %rax // b[2] movq %rax, %rbp mulq 0(%rsi) addq %rax, %r8 movq %rbp, %rax adcq $0, %rdx movq %rdx, %rcx mulq 8(%rsi) addq %rcx, %r9 adcq $0, %rdx addq %rax, %r9 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rcx mulq 16(%rsi) addq %rcx, %r10 adcq $0, %rdx addq %rax, %r10 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rcx mulq 24(%rsi) addq %rcx, %r11 adcq $0, %rdx addq %rax, %r11 movq %r9, %rax adcq %rdx, %r12 adcq $0, %r13 movq %r8, %rax movq %r8, %r14 // begin 3st reduce shlq $32, %rax shrq $32, %r14 movq %r8, %rcx movq $0, %rdx subq %rax, %rcx sbbq %r14, %rdx movq %rdx, %rbp movq $0, %rdx sbbq %rax, %rdx sbbq %r14, %r8 movq %rdx, %rax movq %r8, %rdx movq %rcx, %r8 addq %r9, %r8 movq %rbp, %r9 adcq %r10, %r9 movq %rax, %r10 adcq %r11, %r10 movq %rdx, %r11 adcq %r12, %r11 movq $0, %r12 adcq %r13, %r12 movq 24(%rbx), %rax // b[3] movq %rax, %rbp mulq 0(%rsi) addq %rax, %r8 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rcx mulq 8(%rsi) addq %rcx, %r9 adcq $0, %rdx addq %rax, %r9 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rcx mulq 16(%rsi) addq %rcx, %r10 adcq $0, %rdx addq %rax, %r10 adcq $0, %rdx movq %rbp, %rax movq %rdx, %rcx mulq 24(%rsi) addq %rcx, %r11 adcq $0, %rdx addq %rax, %r11 adcq %rdx, %r12 adcq $0, %r13 movq %r9, %rax movq %r8, %rax movq %r8, %r14 // last reduction begin shlq $32, %rax shrq $32, %r14 movq %r8, %rcx subq %rax, %rcx movq $0, %rdx sbbq %r14, %rdx movq %rdx, %rbp movq $0, %rdx sbbq %rax, %rdx movq %rdx, %rax sbbq %r14, %r8 movq %r8, %rdx movq %rcx, %r8 addq %r9, %r8 movq %rbp, %r9 adcq %r10, %r9 movq %rax, %r10 adcq %r11, %r10 movq %rdx, %r11 adcq %r12, %r11 movq $0, %rcx adcq %r13, %rcx // last reduction end // ret - p movq %r8, %r12 subq $-1, %r12 movq .Lpoly+8(%rip), %r14 movq %r9, %r13 sbbq %r14, %r13 movq %r10, %rbp sbbq $-1, %rbp movq .Lpoly+24(%rip), %r15 movq %r11, %rdx sbbq %r15, %rdx sbbq $0, %rcx cmovcq %r8, %r12 cmovcq %r9, %r13 cmovcq %r10, %rbp movq %r12,(%rdi) movq %r13,8(%rdi) cmovcq %r11, %rdx movq %rbp,16(%rdi) movq %rdx,24(%rdi) movq %rbp, %r8 movq %rdx, %r9 ret .size ECP_Sm2MulMont, .-ECP_Sm2MulMont .globl ECP_Sm2FromMont .type ECP_Sm2FromMont,@function .align 32 ECP_Sm2FromMont: leaq .Lone(%rip), %rdx REGISTER_SAVE movq %rdx, %rbx movq 0(%rsi), %r9 movq 8(%rsi), %r10 movq 16(%rsi), %r11 movq 24(%rsi), %r12 movq 0(%rdx), %rax call ECP_Sm2MulMont REGISTER_POP ret .size ECP_Sm2FromMont,.-ECP_Sm2FromMont .type ECP_Sm2SqrMont,@function .align 32 ECP_Sm2SqrMont: movq %rax, %r13 mulq %r14 // a[0] * a[1] movq %rax, %r9 movq %rdx, %r10 movq %r15, %rax mulq %r13 // a[0] * a[2] addq %rax, %r10 adcq $0, %rdx movq %r8, %rax movq %rdx, %r11 mulq %r13 // a[0] * a[3] addq %rax, %r11 adcq $0, %rdx movq %r15, %rax movq %rdx, %r12 mulq %r14 // a[1] * a[2] addq %rax, %r11 adcq $0, %rdx movq %r8, %rax movq %rdx, %rbp mulq %r14 // a[1] * a[3] addq %rax, %r12 adcq $0, %rdx addq %rbp, %r12 movq %rdx, %r13 movq %r8, %rax adcq $0, %r13 mulq %r15 // a[2] * a[3] addq %rax, %r13 movq (%rsi), %rax movq %rdx, %r14 adcq $0, %r14 movq $0, %r15 addq %r9, %r9 adcq %r10, %r10 adcq %r11, %r11 adcq %r12, %r12 adcq %r13, %r13 adcq %r14, %r14 adcq $0, %r15 mulq %rax // cal a[0] * a[0] movq %rax, %r8 movq 8(%rsi), %rax // get a[1] movq %rdx, %rcx mulq %rax // a[1] * a[1] addq %rcx, %r9 adcq %rax, %r10 adcq $0, %rdx movq 16(%rsi), %rax movq %rdx, %rcx mulq %rax // a[2] * a[2] addq %rcx, %r11 adcq %rax, %r12 adcq $0, %rdx movq 24(%rsi), %rax movq %rdx, %rcx mulq %rax // a[3] * a[3] addq %rcx, %r13 adcq %rax, %r14 movq %r8, %rax adcq %rdx, %r15 movq %r8, %rax movq %r8, %rsi // begin 1st reduce shlq $32, %rax shrq $32, %rsi movq %r8, %rcx subq %rax, %rcx movq $0, %rdx sbbq %rsi, %rdx movq %rdx, %rbp movq $0, %rdx sbbq %rax, %rdx movq %rdx, %rax sbbq %rsi, %r8 movq %r8, %rdx movq %rcx, %r8 addq %r9, %r8 movq %rbp, %r9 adcq %r10, %r9 movq %rax, %r10 adcq %r11, %r10 movq %rdx, %r11 adcq $0, %r11 movq %r8, %rax movq %r8, %rsi // begin 2st reduce shlq $32, %rax shrq $32, %rsi movq %r8, %rcx subq %rax, %rcx movq $0, %rdx sbbq %rsi, %rdx movq %rdx, %rbp movq $0, %rdx sbbq %rax, %rdx movq %rdx, %rax sbbq %rsi, %r8 movq %r8, %rdx movq %rcx, %r8 addq %r9, %r8 movq %rbp, %r9 adcq %r10, %r9 movq %rax, %r10 adcq %r11, %r10 movq %rdx, %r11 adcq $0, %r11 movq %r8, %rax movq %r8, %rsi // begin 3st reduce shlq $32, %rax shrq $32, %rsi movq %r8, %rcx subq %rax, %rcx movq $0, %rdx sbbq %rsi, %rdx movq %rdx, %rbp movq $0, %rdx sbbq %rax, %rdx movq %rdx, %rax sbbq %rsi, %r8 movq %r8, %rdx movq %rcx, %r8 addq %r9, %r8 movq %rbp, %r9 adcq %r10, %r9 movq %rax, %r10 adcq %r11, %r10 movq %rdx, %r11 adcq $0, %r11 movq %r8, %rax movq %r8, %rsi // begin 4st reduce shlq $32, %rax shrq $32, %rsi movq %r8, %rcx subq %rax, %rcx movq $0, %rdx sbbq %rsi, %rdx movq %rdx, %rbp movq $0, %rdx sbbq %rax, %rdx movq %rdx, %rax sbbq %rsi, %r8 movq %r8, %rdx movq %rcx, %r8 addq %r9, %r8 movq %rbp, %r9 adcq %r10, %r9 movq %rax, %r10 adcq %r11, %r10 movq %rdx, %r11 adcq $0, %r11 movq .Lpoly+8(%rip), %rsi movq .Lpoly+24(%rip), %rbp addq %r8, %r12 adcq %r9, %r13 adcq %r10, %r14 adcq %r11, %r15 movq $0, %r11 adcq $0, %r11 // ret - q movq %r12, %rax subq $-1, %rax movq %r13, %rcx sbbq %rsi, %rcx movq %r14, %r8 sbbq $-1, %r8 movq %r15, %rdx sbbq %rbp, %rdx sbbq $0, %r11 cmovncq %rax, %r12 cmovncq %rcx, %r13 cmovncq %r8, %r14 movq %r12,(%rdi) movq %r13,8(%rdi) cmovncq %rdx, %r15 movq %r14,16(%rdi) movq %r15,24(%rdi) ret .size ECP_Sm2SqrMont,.-ECP_Sm2SqrMont .type ECP_Sm2AddCore,@function .align 32 ECP_Sm2AddCore: addq (%rbx), %r12 adcq 8(%rbx), %r13 movq %r12, %rcx adcq 16(%rbx), %r8 adcq 24(%rbx), %r9 movq $0, %r11 movq %r13, %rbp adcq $0, %r11 subq $-1, %r12 // + 0xffffffffffffffff = -(-1) movq %r8, %rax sbbq %r14, %r13 sbbq $-1, %r8 movq %r9, %r10 sbbq %r15, %r9 sbbq $0, %r11 cmovcq %rcx, %r12 cmovcq %rbp, %r13 movq %r12, 0(%rdi) cmovcq %rax, %r8 movq %r13, 8(%rdi) cmovcq %r10, %r9 movq %r8, 16(%rdi) movq %r9, 24(%rdi) ret .size ECP_Sm2AddCore,.-ECP_Sm2AddCore .type ECP_Sm2SubBA,@function .align 32 ECP_Sm2SubBA: subq %r12, %rcx sbbq %r13, %rbp movq %rcx, %r12 sbbq %r8, %rax sbbq %r9, %r10 movq %rbp, %r13 sbbq %r11, %r11 addq $-1, %rcx movq %rax, %r8 adcq %r14, %rbp adcq $-1, %rax movq %r10, %r9 adcq %r15, %r10 testq %r11, %r11 cmovnzq %rcx, %r12 cmovnzq %rbp, %r13 cmovnzq %rax, %r8 cmovnzq %r10, %r9 ret .size ECP_Sm2SubBA,.-ECP_Sm2SubBA .type ECP_Sm2SubAB,@function .align 32 ECP_Sm2SubAB: subq 0(%rbx), %r12 sbbq 8(%rbx), %r13 sbbq 16(%rbx), %r8 sbbq 24(%rbx), %r9 sbbq %r11, %r11 movq %r14, %rbp andq %r11, %rbp movq %r11, %rax btrq $32, %rax addq %r11, %r12 adcq %rbp, %r13 adcq %r11, %r8 adcq %rax, %r9 movq %r12, (%rdi) movq %r13, 8(%rdi) movq %r8, 16(%rdi) movq %r9, 24(%rdi) ret .size ECP_Sm2SubAB,.-ECP_Sm2SubAB .type ECP_Sm2MulBy2Core,@function .align 32 ECP_Sm2MulBy2Core: addq %r12, %r12 adcq %r13, %r13 movq %r12, %rcx adcq %r8, %r8 adcq %r9, %r9 movq $0, %r11 movq %r13, %rbp adcq $0, %r11 subq $-1, %r12 // + 0xffffffffffffffff = -(-1) movq %r8, %rax sbbq %r14, %r13 sbbq $-1, %r8 movq %r9, %r10 sbbq %r15, %r9 sbbq $0, %r11 cmovcq %rcx, %r12 cmovcq %rbp, %r13 cmovcq %rax, %r8 cmovcq %r10, %r9 movq %r12, (%rdi) movq %r13, 8(%rdi) movq %r8, 16(%rdi) movq %r9, 24(%rdi) ret .size ECP_Sm2MulBy2Core,.-ECP_Sm2MulBy2Core # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#doubling-dbl-2001-b # Deal process: # delta = Z12 # gamma = Y12 # beta = X1*gamma # alpha = 3*(X1-delta)*(X1+delta) # X3 = alpha2-8*beta # Z3 = (Y1+Z1)2-gamma-delta # Y3 = alpha*(4*beta-X3)-8*gamma2 .globl ECP_Sm2PointDoubleMont .type ECP_Sm2PointDoubleMont,@function .align 32 ECP_Sm2PointDoubleMont: REGISTER_SAVE subq $168, %rsp .Lpoint_double: vmovdqu 0(%rsi), %xmm0 vmovdqu 16(%rsi), %xmm1 vmovdqa %xmm0,96(%rsp) vmovdqa %xmm1,96+16(%rsp) movq %rsi, %rbx leaq 32(%rdi), %r10 leaq 64(%rdi), %r11 vmovq %rdi, %xmm0 vmovq %r10, %xmm1 vmovq %r11, %xmm2 movq 32(%rsi), %r12 movq 40(%rsi), %r13 movq 48(%rsi), %r8 movq 56(%rsi), %r9 movq .Lpoly+8(%rip), %r14 movq .Lpoly+24(%rip), %r15 leaq (%rsp), %rdi call ECP_Sm2MulBy2Core movq 64(%rsi), %rax movq 72(%rsi), %r14 movq 80(%rsi), %r15 movq 88(%rsi), %r8 leaq 64(%rsi), %rsi // Setting Input Parameters leaq 64(%rsp), %rdi // store the result call ECP_Sm2SqrMont movq (%rsp), %rax movq 8(%rsp), %r14 movq 16(%rsp), %r15 movq 24(%rsp), %r8 leaq (%rsp), %rsi leaq (%rsp), %rdi call ECP_Sm2SqrMont movq 32(%rbx), %rax movq 64(%rbx), %r9 movq 72(%rbx), %r10 movq 80(%rbx), %r11 movq 88(%rbx), %r12 leaq 64(%rbx), %rsi leaq 32(%rbx), %rbx vmovq %xmm2, %rdi call ECP_Sm2MulMont call ECP_Sm2MulBy2Core movq 96(%rsp), %r12 movq 104(%rsp), %r13 movq 112(%rsp), %r8 movq 120(%rsp), %r9 leaq 32(%rsp), %rdi leaq 64(%rsp), %rbx call ECP_Sm2AddCore movq 96(%rsp), %r12 movq 104(%rsp), %r13 movq 112(%rsp), %r8 movq 120(%rsp), %r9 leaq 64(%rsp), %rbx // intput leaq 64(%rsp), %rdi // output call ECP_Sm2SubAB movq (%rsp), %rax movq 8(%rsp), %r14 movq 16(%rsp), %r15 movq 24(%rsp), %r8 leaq (%rsp), %rsi vmovq %xmm1, %rdi call ECP_Sm2SqrMont movq %r12, %rcx addq $-1, %r12 movq %r13, %r10 adcq %rsi, %r13 movq %r14, %rax adcq $-1, %r14 movq $0, %r9 movq %r15, %r8 adcq %rbp, %r15 adcq $0, %r9 xorq %rsi, %rsi testq $1, %rcx cmovzq %rcx, %r12 cmovzq %r10, %r13 cmovzq %rax, %r14 cmovzq %r8, %r15 cmovzq %rsi, %r9 movq %r13, %rcx shrq $1, %r12 shlq $63, %rcx shrq $1, %r13 movq %r14, %r10 orq %rcx, %r12 shlq $63, %r10 movq %r15, %rax shrq $1, %r14 orq %r10, %r13 shlq $63, %rax movq %r12,0(%rdi) shrq $1, %r15 movq %r13,8(%rdi) shlq $63, %r9 orq %rax, %r14 orq %r9, %r15 movq %r14,16(%rdi) movq %r15,24(%rdi) movq 64(%rsp), %rax leaq 64(%rsp), %rbx movq 32(%rsp), %r9 movq 40(%rsp), %r10 leaq 32(%rsp), %rsi movq 48(%rsp), %r11 movq 56(%rsp), %r12 leaq 32(%rsp), %rdi call ECP_Sm2MulMont leaq 128(%rsp), %rdi call ECP_Sm2MulBy2Core leaq 32(%rsp), %rbx leaq 32(%rsp), %rdi call ECP_Sm2AddCore movq 96(%rsp), %rax leaq 96(%rsp), %rbx movq (%rsp), %r9 movq 8(%rsp), %r10 leaq (%rsp), %rsi movq 16(%rsp), %r11 movq 24(%rsp), %r12 leaq 0(%rsp), %rdi call ECP_Sm2MulMont leaq 128(%rsp), %rdi call ECP_Sm2MulBy2Core movq 32(%rsp), %rax movq 40(%rsp), %r14 leaq 32(%rsp), %rsi movq 48(%rsp), %r15 movq 56(%rsp), %r8 vmovq %xmm0, %rdi call ECP_Sm2SqrMont leaq 128(%rsp), %rbx movq %r14, %r8 movq %r15, %r9 movq %rsi, %r14 movq %rbp, %r15 call ECP_Sm2SubAB movq (%rsp), %rcx movq 8(%rsp), %rbp movq 16(%rsp), %rax movq 24(%rsp), %r10 leaq 0(%rsp), %rdi call ECP_Sm2SubBA movq 32(%rsp), %rax leaq 32(%rsp), %rbx movq %r12, %r14 xorl %ecx, %ecx movq %r12,(%rsp) movq %r13, %r10 movq %r13,8(%rsp) cmovzq %r8, %r11 movq %r8,16(%rsp) cmovzq %r9, %r12 movq %r9,24(%rsp) movq %r14, %r9 leaq 0(%rsp), %rsi leaq 0(%rsp), %rdi call ECP_Sm2MulMont vmovq %xmm1, %rbx vmovq %xmm1, %rdi call ECP_Sm2SubAB leaq 168(%rsp), %rsp REGISTER_POP ret .size ECP_Sm2PointDoubleMont,.-ECP_Sm2PointDoubleMont # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-1998-cmo # Deal process: # U1 = X1*Z22 # U2 = X2*Z12 # S1 = Y1*Z23 # S2 = Y2*Z13 # H = U2-U1 # r = S2-S1 # X3 = r2-H3-2*U1*H2 # Y3 = r*(U1*H2-X3)-S1*H3 # Z3 = Z1*Z2*H .globl ECP_Sm2PointAddMont .type ECP_Sm2PointAddMont,@function .align 32 ECP_Sm2PointAddMont: REGISTER_SAVE subq $584, %rsp vmovdqu 0(%rsi), %xmm0 vmovdqu 16(%rsi), %xmm1 vmovdqu 32(%rsi), %xmm2 vmovdqu 48(%rsi), %xmm3 vmovdqu 64(%rsi), %xmm4 vmovdqu 80(%rsi), %xmm5 movq %rsi, %rbx movq %rdx, %rsi vmovdqa %xmm0,384(%rsp) vmovdqa %xmm1,384+16(%rsp) vmovdqa %xmm2,416(%rsp) vmovdqa %xmm3,416+16(%rsp) vmovdqa %xmm4,448(%rsp) vmovdqa %xmm5,448+16(%rsp) vpor %xmm4, %xmm5, %xmm5 vmovdqu 0(%rsi), %xmm0 vpshufd $0xb1, %xmm5, %xmm3 vmovdqu 16(%rsi), %xmm1 vmovdqu 32(%rsi), %xmm2 vpor %xmm3, %xmm5, %xmm5 vmovdqu 48(%rsi), %xmm3 movq 64(%rsi), %rax movq 72(%rsi), %r14 movq 80(%rsi), %r15 movq 88(%rsi), %r8 vmovdqa %xmm0,480(%rsp) vpshufd $0x1e, %xmm5, %xmm4 vmovdqa %xmm1,480+16(%rsp) vmovdqu 64(%rsi), %xmm0 vmovdqu 80(%rsi), %xmm1 vmovdqa %xmm2,512(%rsp) vmovdqa %xmm3,512+16(%rsp) vpor %xmm4, %xmm5, %xmm5 vpxor %xmm4, %xmm4, %xmm4 vpor %xmm0, %xmm1, %xmm1 vmovq %rdi, %xmm0 leaq 64(%rsi), %rsi movq %rax,544(%rsp) movq %r14,544+8(%rsp) movq %r15,544+16(%rsp) movq %r8,544+24(%rsp) leaq 96(%rsp), %rdi call ECP_Sm2SqrMont vpcmpeqd %xmm4, %xmm5, %xmm5 vpshufd $0xb1, %xmm1, %xmm4 vpor %xmm1, %xmm4, %xmm4 vpshufd $0, %xmm5, %xmm5 vpshufd $0x1e, %xmm4, %xmm3 vpor %xmm3, %xmm4, %xmm4 vpxor %xmm3, %xmm3, %xmm3 vpcmpeqd %xmm3, %xmm4, %xmm4 vpshufd $0, %xmm4, %xmm4 movq 64(%rbx), %rax movq 72(%rbx), %r14 movq 80(%rbx), %r15 movq 88(%rbx), %r8 vmovq %rbx, %xmm1 leaq 64(%rbx), %rsi leaq 32(%rsp), %rdi call ECP_Sm2SqrMont movq 544(%rsp), %rax leaq 544(%rsp), %rbx movq 96(%rsp), %r9 movq 104(%rsp), %r10 leaq 96(%rsp), %rsi movq 112(%rsp), %r11 movq 120(%rsp), %r12 leaq 224(%rsp), %rdi call ECP_Sm2MulMont movq 448(%rsp), %rax leaq 448(%rsp), %rbx movq 32(%rsp), %r9 movq 40(%rsp), %r10 leaq 32(%rsp), %rsi movq 48(%rsp), %r11 movq 56(%rsp), %r12 leaq 256(%rsp), %rdi call ECP_Sm2MulMont movq 416(%rsp), %rax leaq 416(%rsp), %rbx movq 224(%rsp), %r9 movq 232(%rsp), %r10 leaq 224(%rsp), %rsi movq 240(%rsp), %r11 movq 248(%rsp), %r12 leaq 224(%rsp), %rdi call ECP_Sm2MulMont movq 512(%rsp), %rax leaq 512(%rsp), %rbx movq 256(%rsp), %r9 movq 264(%rsp), %r10 leaq 256(%rsp), %rsi movq 272(%rsp), %r11 movq 280(%rsp), %r12 leaq 256(%rsp), %rdi call ECP_Sm2MulMont leaq 224(%rsp), %rbx leaq 64(%rsp), %rdi call ECP_Sm2SubAB orq %r13, %r12 vmovdqa %xmm4, %xmm2 orq %r8, %r12 orq %r9, %r12 vpor %xmm5, %xmm2, %xmm2 vmovq %r12, %xmm3 movq 384(%rsp), %rax leaq 384(%rsp), %rbx movq 96(%rsp), %r9 movq 104(%rsp), %r10 leaq 96(%rsp), %rsi movq 112(%rsp), %r11 movq 120(%rsp), %r12 leaq 160(%rsp), %rdi call ECP_Sm2MulMont movq 480(%rsp), %rax leaq 480(%rsp), %rbx movq 32(%rsp), %r9 movq 40(%rsp), %r10 leaq 32(%rsp), %rsi movq 48(%rsp), %r11 movq 56(%rsp), %r12 leaq 192(%rsp), %rdi call ECP_Sm2MulMont leaq 160(%rsp), %rbx leaq 0(%rsp), %rdi call ECP_Sm2SubAB orq %r13, %r12 orq %r8, %r12 orq %r9, %r12 vmovq %xmm2, %r8 vmovq %xmm3, %r9 orq %r8, %r12 orq %r9, %r12 jnz .Lpoint_add .Ladd_double: vmovq %xmm1, %rsi vmovq %xmm0, %rdi addq $416, %rsp jmp .Lpoint_double .align 32 .Lpoint_add: movq 64(%rsp), %rax movq 72(%rsp), %r14 leaq 64(%rsp), %rsi movq 80(%rsp), %r15 movq 88(%rsp), %r8 leaq 96(%rsp), %rdi call ECP_Sm2SqrMont movq 448(%rsp), %rax leaq 448(%rsp), %rbx movq (%rsp), %r9 movq 8(%rsp), %r10 leaq (%rsp), %rsi movq 16(%rsp), %r11 movq 24(%rsp), %r12 leaq 352(%rsp), %rdi call ECP_Sm2MulMont movq (%rsp), %rax movq 8(%rsp), %r14 leaq (%rsp), %rsi movq 16(%rsp), %r15 movq 24(%rsp), %r8 leaq 32(%rsp), %rdi call ECP_Sm2SqrMont movq 544(%rsp), %rax leaq 544(%rsp), %rbx movq 352(%rsp), %r9 movq 360(%rsp), %r10 leaq 352(%rsp), %rsi movq 368(%rsp), %r11 movq 24+352(%rsp), %r12 leaq 352(%rsp), %rdi call ECP_Sm2MulMont movq (%rsp), %rax leaq (%rsp), %rbx movq 32(%rsp), %r9 movq 40(%rsp), %r10 leaq 32(%rsp), %rsi movq 48(%rsp), %r11 movq 56(%rsp), %r12 leaq 128(%rsp), %rdi call ECP_Sm2MulMont movq 160(%rsp), %rax leaq 160(%rsp), %rbx movq 32(%rsp), %r9 movq 40(%rsp), %r10 leaq 32(%rsp), %rsi movq 48(%rsp), %r11 movq 56(%rsp), %r12 leaq 192(%rsp), %rdi call ECP_Sm2MulMont leaq 96(%rsp), %rsi movq $0, %r11 addq %r12, %r12 adcq %r13, %r13 movq %r12, %rcx adcq %r8, %r8 adcq %r9, %r9 movq %r13, %rbp adcq $0, %r11 subq $-1, %r12 movq %r8, %rax sbbq %r14, %r13 sbbq $-1, %r8 movq %r9, %r10 sbbq %r15, %r9 sbbq $0, %r11 cmovcq %rcx, %r12 movq (%rsi), %rcx cmovcq %rbp, %r13 movq 8(%rsi), %rbp cmovcq %rax, %r8 movq 16(%rsi), %rax cmovcq %r10, %r9 movq 24(%rsi), %r10 call ECP_Sm2SubBA leaq 128(%rsp), %rbx leaq 288(%rsp), %rdi call ECP_Sm2SubAB movq 192(%rsp), %rcx movq 200(%rsp), %rbp movq 208(%rsp), %rax movq 216(%rsp), %r10 leaq 320(%rsp), %rdi call ECP_Sm2SubBA movq %r12,(%rdi) movq %r13,8(%rdi) movq %r8,16(%rdi) movq %r9,24(%rdi) movq 128(%rsp), %rax leaq 128(%rsp), %rbx movq 224(%rsp), %r9 movq 232(%rsp), %r10 leaq 224(%rsp), %rsi movq 240(%rsp), %r11 movq 248(%rsp), %r12 leaq 256(%rsp), %rdi call ECP_Sm2MulMont movq 320(%rsp), %rax leaq 320(%rsp), %rbx movq 64(%rsp), %r9 movq 72(%rsp), %r10 leaq 64(%rsp), %rsi movq 80(%rsp), %r11 movq 88(%rsp), %r12 leaq 320(%rsp), %rdi call ECP_Sm2MulMont leaq 256(%rsp), %rbx leaq 320(%rsp), %rdi call ECP_Sm2SubAB vmovq %xmm0, %rdi vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 352(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 368(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand 544(%rsp), %xmm2, %xmm2 vpand 560(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 448(%rsp), %xmm2, %xmm2 vpand 464(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2,64(%rdi) vmovdqu %xmm3,80(%rdi) vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 288(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 304(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand 480(%rsp), %xmm2, %xmm2 vpand 496(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 384(%rsp), %xmm2, %xmm2 vpand 400(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2,(%rdi) vmovdqu %xmm3,16(%rdi) vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 320(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 336(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand 512(%rsp), %xmm2, %xmm2 vpand 528(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 416(%rsp), %xmm2, %xmm2 vpand 432(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2,32(%rdi) vmovdqu %xmm3,48(%rdi) .Ladd_done: leaq 584(%rsp), %rsp REGISTER_POP ret .size ECP_Sm2PointAddMont,.-ECP_Sm2PointAddMont # ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2007-bl # Deal process: # Z1Z1 = Z12 # U2 = X2*Z1Z1 # S2 = Y2*Z1*Z1Z1 # H = U2-X1 # HH = H2 # I = 4*HH # J = H*I # r = 2*(S2-Y1) # V = X1*I # X3 = r2-J-2*V # Y3 = r*(V-X3)-2*Y1*J # Z3 = (Z1+H)2-Z1Z1-HH .globl ECP_Sm2PointAddAffineMont .type ECP_Sm2PointAddAffineMont,@function .align 32 ECP_Sm2PointAddAffineMont: REGISTER_SAVE subq $488, %rsp vmovdqu (%rsi), %xmm0 vmovdqu 16(%rsi), %xmm1 vmovdqu 32(%rsi), %xmm2 vmovdqu 48(%rsi), %xmm3 vmovdqu 64(%rsi), %xmm4 vmovdqu 80(%rsi), %xmm5 movq %rdx, %rbx movq 64(%rsi), %rax movq 72(%rsi), %r14 movq 80(%rsi), %r15 movq 88(%rsi), %r8 vmovdqa %xmm0,320(%rsp) vmovdqa %xmm1,336(%rsp) vmovdqa %xmm2,352(%rsp) vmovdqa %xmm3,368(%rsp) vmovdqa %xmm4,384(%rsp) vmovdqa %xmm5,400(%rsp) vpor %xmm4, %xmm5, %xmm5 vmovdqu (%rbx), %xmm0 vpshufd $0xb1, %xmm5, %xmm3 vmovdqu 16(%rbx), %xmm1 vmovdqu 32(%rbx), %xmm2 vpor %xmm3, %xmm5, %xmm5 vmovdqu 48(%rbx), %xmm3 vmovdqa %xmm0, 416(%rsp) vpshufd $0x1e, %xmm5, %xmm4 vmovdqa %xmm1, 416+16(%rsp) vpor %xmm0, %xmm1, %xmm1 vmovq %rdi, %xmm0 vmovdqa %xmm2, 448(%rsp) vmovdqa %xmm3, 464(%rsp) vpor %xmm2, %xmm3, %xmm3 vpor %xmm4, %xmm5, %xmm5 vpxor %xmm4, %xmm4, %xmm4 vpor %xmm1, %xmm3, %xmm3 leaq 64(%rsi), %rsi leaq 32(%rsp), %rdi call ECP_Sm2SqrMont vpcmpeqd %xmm4, %xmm5, %xmm5 vpshufd $0xb1, %xmm3, %xmm4 vpor %xmm3, %xmm4, %xmm4 vpshufd $0, %xmm5, %xmm5 vpshufd $0x1e, %xmm4, %xmm3 vpor %xmm3, %xmm4, %xmm4 vpxor %xmm3, %xmm3, %xmm3 vpcmpeqd %xmm3, %xmm4, %xmm4 vpshufd $0, %xmm4, %xmm4 movq (%rbx), %rax movq %r12, %r9 movq %r13, %r10 movq %r14, %r11 leaq 32(%rsp), %rsi movq %r15, %r12 leaq (%rsp), %rdi call ECP_Sm2MulMont leaq 320(%rsp), %rbx leaq 64(%rsp), %rdi call ECP_Sm2SubAB movq 384(%rsp), %rax leaq 384(%rsp), %rbx movq 32(%rsp), %r9 movq 40(%rsp), %r10 leaq 32(%rsp), %rsi movq 48(%rsp), %r11 movq 56(%rsp), %r12 leaq 32(%rsp), %rdi call ECP_Sm2MulMont movq 384(%rsp), %rax leaq 384(%rsp), %rbx movq 64(%rsp), %r9 movq 72(%rsp), %r10 leaq 64(%rsp), %rsi movq 80(%rsp), %r11 movq 88(%rsp), %r12 leaq 288(%rsp), %rdi call ECP_Sm2MulMont movq 448(%rsp), %rax leaq 448(%rsp), %rbx movq 32(%rsp), %r9 movq 40(%rsp), %r10 leaq 32(%rsp), %rsi movq 48(%rsp), %r11 movq 56(%rsp), %r12 leaq 32(%rsp), %rdi call ECP_Sm2MulMont leaq 352(%rsp), %rbx leaq 96(%rsp), %rdi call ECP_Sm2SubAB movq 64(%rsp), %rax movq 72(%rsp), %r14 leaq 64(%rsp), %rsi movq 80(%rsp), %r15 movq 88(%rsp), %r8 leaq 128(%rsp), %rdi call ECP_Sm2SqrMont movq 96(%rsp), %rax movq 104(%rsp), %r14 leaq 96(%rsp), %rsi movq 112(%rsp), %r15 movq 120(%rsp), %r8 leaq 192(%rsp), %rdi call ECP_Sm2SqrMont movq 128(%rsp), %rax leaq 128(%rsp), %rbx movq 64(%rsp), %r9 movq 72(%rsp), %r10 leaq 64(%rsp), %rsi movq 80(%rsp), %r11 movq 88(%rsp), %r12 leaq 160(%rsp), %rdi call ECP_Sm2MulMont movq 320(%rsp), %rax leaq 320(%rsp), %rbx movq 128(%rsp), %r9 movq 136(%rsp), %r10 leaq 128(%rsp), %rsi movq 144(%rsp), %r11 movq 152(%rsp), %r12 leaq (%rsp), %rdi call ECP_Sm2MulMont leaq 192(%rsp), %rsi movq $0, %r11 addq %r12, %r12 adcq %r13, %r13 movq %r12, %rcx adcq %r8, %r8 adcq %r9, %r9 movq %r13, %rbp adcq $0, %r11 subq $-1, %r12 movq %r8, %rax sbbq %r14, %r13 sbbq $-1, %r8 movq %r9, %r10 sbbq %r15, %r9 sbbq $0, %r11 cmovcq %rcx, %r12 movq (%rsi), %rcx cmovcq %rbp, %r13 movq 8(%rsi), %rbp cmovcq %rax, %r8 movq 16(%rsi), %rax cmovcq %r10, %r9 movq 24(%rsi), %r10 call ECP_Sm2SubBA leaq 160(%rsp), %rbx leaq 224(%rsp), %rdi call ECP_Sm2SubAB movq (%rsp), %rcx movq 8(%rsp), %rbp movq 16(%rsp), %rax movq 24(%rsp), %r10 leaq 64(%rsp), %rdi call ECP_Sm2SubBA movq %r12,(%rdi) movq %r13,8(%rdi) movq %r8,16(%rdi) movq %r9,24(%rdi) movq 352(%rsp), %rax leaq 352(%rsp), %rbx movq 160(%rsp), %r9 movq 168(%rsp), %r10 leaq 160(%rsp), %rsi movq 176(%rsp), %r11 movq 184(%rsp), %r12 leaq 32(%rsp), %rdi call ECP_Sm2MulMont movq 96(%rsp), %rax leaq 96(%rsp), %rbx movq 64(%rsp), %r9 movq 72(%rsp), %r10 leaq 64(%rsp), %rsi movq 80(%rsp), %r11 movq 88(%rsp), %r12 leaq 64(%rsp), %rdi call ECP_Sm2MulMont leaq 32(%rsp), %rbx leaq 256(%rsp), %rdi call ECP_Sm2SubAB vmovq %xmm0, %rdi vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 288(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 304(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand .Lone_mont(%rip), %xmm2, %xmm2 vpand .Lone_mont+16(%rip), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 384(%rsp), %xmm2, %xmm2 vpand 400(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2,64(%rdi) vmovdqu %xmm3,80(%rdi) vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 224(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 240(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand 416(%rsp), %xmm2, %xmm2 vpand 432(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 320(%rsp), %xmm2, %xmm2 vpand 336(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2,(%rdi) vmovdqu %xmm3,16(%rdi) vmovdqa %xmm5, %xmm0 vmovdqa %xmm5, %xmm1 vpandn 256(%rsp), %xmm0, %xmm0 vmovdqa %xmm5, %xmm2 vpandn 272(%rsp), %xmm1, %xmm1 vmovdqa %xmm5, %xmm3 vpand 448(%rsp), %xmm2, %xmm2 vpand 464(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqa %xmm4, %xmm0 vmovdqa %xmm4, %xmm1 vpandn %xmm2, %xmm0, %xmm0 vmovdqa %xmm4, %xmm2 vpandn %xmm3, %xmm1, %xmm1 vmovdqa %xmm4, %xmm3 vpand 352(%rsp), %xmm2, %xmm2 vpand 368(%rsp), %xmm3, %xmm3 vpor %xmm0, %xmm2, %xmm2 vpor %xmm1, %xmm3, %xmm3 vmovdqu %xmm2,32(%rdi) vmovdqu %xmm3,48(%rdi) leaq 488(%rsp), %rsp REGISTER_POP ret .size ECP_Sm2PointAddAffineMont,.-ECP_Sm2PointAddAffineMont #endif
2401_83913325/openHiTLS-examples_7925
crypto/ecc/src/asm/ecp_sm2_x86_64.S
Unix Assembly
unknown
48,837
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE) #include <stdint.h> #include "crypt_errno.h" #include "crypt_bn.h" #include "ecp_nistp256.h" #include "crypt_ecc.h" #include "ecc_local.h" #include "bsl_err_internal.h" #include "asm_ecp_nistp256.h" static const Coord g_rrModOrder = {{ 0x83244c95be79eea2, 0x4699799c49bd6fa6, 0x2845b2392b6bec59, 0x66e12d94f3d95620 }}; static int32_t ECP256_ModOrderInvCheck(const ECC_Para *para, const BN_BigNum *r, const BN_BigNum *a) { if (para == NULL || r == NULL || a == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != CRYPT_ECC_NISTP256) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (BN_IsZero(a)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_INVERSE_INPUT_ZERO); return CRYPT_ECC_INVERSE_INPUT_ZERO; } return CRYPT_SUCCESS; } static int32_t Bn2CoordArray(const ECC_Para *para, Coord *aArr, const BN_BigNum *a) { int32_t ret = CRYPT_SUCCESS; uint32_t bits = BN_Bits(para->n); BN_Optimizer *opt = BN_OptimizerCreate(); BN_BigNum *aTemp = BN_Create(bits); if (opt == NULL || aTemp == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (BN_Cmp(a, para->n) >= 0) { ret = BN_Mod(aTemp, a, para->n, opt); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } if (BN_IsZero(aTemp)) { // If x and m are coprime, the module inverse cannot be obtained. BSL_ERR_PUSH_ERROR(CRYPT_BN_ERR_NO_INVERSE); ret = CRYPT_BN_ERR_NO_INVERSE; goto EXIT; } } else { ret = BN_Copy(aTemp, a); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } } (void)BN_BN2Array(aTemp, aArr->value, P256_SIZE); EXIT: BN_OptimizerDestroy(opt); BN_Destroy(aTemp); return ret; } // r = a^(-1) mod n, a cannot be 0 // a^(-1) mod n = a^(n-2) mod n // n = 0xffffffff 00000000 ffffffff ffffffff bce6faad a7179e84 f3b9cac2 fc632551 // n-2 = 0xffffffff 00000000 ffffffff ffffffff bce6faad a7179e84 f3b9cac2 fc63254f // Split the file into binary files as follows: // 11111111111111111111111111111111---------0xffffffff // 00000000000000000000000000000000---------0x00000000 // 11111111111111111111111111111111---------0xffffffff // 11111111111111111111111111111111---------0xffffffff // 101111 00 111 00 11 0 1111 10101 0 101 101 // 101 00 111 000 101111 00 1111 0 1 0000 1 00 // 1111 00 111 0 111 00 111 00 101 0 11 0000 10(1111): append four 1s // (1111) 11 000 11 000 11 00 1 00 10101 00 1111 // To calculate the power of a, the exponent list is { 1, 10, 11, 101, 111, 1010, 1111, 10101, 101010, 101111, ffffffff} // To calculate a^(0xffffffff), a^(0xffff) is required. The former requires a^(0xff), the latter requires a^(0x3f). // The above is the optimal multiplication chain of a^(n-2) // https://briansmith.org/ecc-inversion-addition-chains-01#p256_scalar_inversion int32_t ECP256_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a) { int32_t ret = ECP256_ModOrderInvCheck(para, r, a); if (ret != CRYPT_SUCCESS) { return ret; } const Coord one = {{1}}; Coord aArr, res; Coord table[14]; enum { bin1 = 0, bin10, bin11, bin101, bin111, bin1010, bin1111, bin10101, bin101010, bin101111, hex3f, hexff, hexffff, hexffffffff }; static const uint8_t mulMap[26] = { // The lower 128 bits of n-2 can be split into 26 binary numbers. bin101111, bin111, bin11, bin1111, bin10101, bin101, bin101, bin101, bin111, bin101111, bin1111, bin1, bin1, bin1111, bin111, bin111, bin111, bin101, bin11, bin101111, bin11, bin11, bin11, bin1, bin10101, bin1111 }; static const uint8_t sqrRep[26] = { // The lower 128 bits of n-2 can be split into 26 binary numbers. 6, 5, 4, 5, 5, 4, 3, 3, 5, 9, 6, 2, 5, 6, 5, 4, 5, 5, 3, 10, 2, 5, 5, 3, 7, 6 }; ret = Bn2CoordArray(para, &aArr, a); if (ret != CRYPT_SUCCESS) { return ret; } ECP256_OrdMul(&table[bin1], &aArr, &g_rrModOrder); // table[bin1] = a, to the field with Montgomery ECP256_OrdSqr(&table[bin10], &table[bin1], 1); // table[bin10] = a^(0b10) ECP256_OrdMul(&table[bin11], &table[bin1], &table[bin10]); // table[bin11] = a^(0b11) ECP256_OrdMul(&table[bin101], &table[bin11], &table[bin10]); // table[bin101] = a^(0b101) ECP256_OrdMul(&table[bin111], &table[bin101], &table[bin10]); // table[bin111] = a^(0b111) ECP256_OrdSqr(&table[bin1010], &table[bin101], 1); // table[bin1010] = a^(0b1010) ECP256_OrdMul(&table[bin1111], &table[bin1010], &table[bin101]); // table[bin1111] = a^(0b1111) ECP256_OrdSqr(&table[bin10101], &table[bin1010], 1); // table[bin10101] = a^(0b10100) ECP256_OrdMul(&table[bin10101], &table[bin10101], &table[bin1]); // table[bin10101] = a^(0b10101) ECP256_OrdSqr(&table[bin101010], &table[bin10101], 1); // table[bin101010] = a^(0b101010) ECP256_OrdMul(&table[bin101111], &table[bin101010], &table[bin101]); // table[bin101111] = a^(0b101111) ECP256_OrdMul(&table[hex3f], &table[bin101010], &table[bin10101]); // table[hex3f] = a^(0b0011 1111) = a^(0x3f) ECP256_OrdSqr(&table[hexff], &table[hex3f], 2); // left shift by 2 bits, table[hexff] = a^(0b1111 1100) = a^(0xfc) ECP256_OrdMul(&table[hexff], &table[hexff], &table[bin11]); // table[hexff] = a^(0b1111 1111) = a^(0xff) ECP256_OrdSqr(&table[hexffff], &table[hexff], 8); // left shift by 8 bits, table[hexffff] = a^(0xff00) ECP256_OrdMul(&table[hexffff], &table[hexffff], &table[hexff]); // table[hexffff] = a^(0xffff) // left shift by 16 bits, table[hexffffffff] = a^(0xffff0000) ECP256_OrdSqr(&table[hexffffffff], &table[hexffff], 16); ECP256_OrdMul(&table[hexffffffff], &table[hexffffffff], &table[hexffff]); // table[hexffffffff] = a^(0xffffffff) ECP256_OrdSqr(&res, &table[hexffffffff], 64); // res = a^(0xffffffff 00000000 00000000), left shift by 64 bits ECP256_OrdMul(&res, &res, &table[hexffffffff]); // res = a^(0xffffffff 00000000 ffffffff) ECP256_OrdSqr(&res, &res, 32); // res = a^(0xffffffff 00000000 ffffffff 00000000), left shift by 32 bits ECP256_OrdMul(&res, &res, &table[hexffffffff]); // res = a^(0xffffffff 00000000 ffffffff ffffffff) for (uint32_t i = 0; i < sizeof(mulMap); i++) { ECP256_OrdSqr(&res, &res, sqrRep[i]); ECP256_OrdMul(&res, &res, &table[mulMap[i]]); } // Multiplied by 1 can be converted back to the normal real number field, which is equivalent to a reduce. // For details, see Montgomery modular multiplication. ECP256_OrdMul(&res, &res, &one); (void)BN_Array2BN(r, res.value, P256_SIZE); return ret; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/ecc/src/asm64_ecp_nistp256.c
C
unknown
7,694
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE) #include <stdlib.h> #include <stdint.h> #include <stdbool.h> #include "securec.h" #include "crypt_errno.h" #include "crypt_bn.h" #include "ecp_nistp256.h" #include "crypt_ecc.h" #include "ecc_local.h" #include "bsl_err_internal.h" #include "asm_ecp_nistp256.h" #if defined(HITLS_SIXTY_FOUR_BITS) // 1 is on the field with Montgomery, 1 * RR * R' mod P = R mod P = R - P static const Coord g_oneMont = {{ 0x0000000000000001, 0xffffffff00000000, 0xffffffffffffffff, 0x00000000fffffffe }}; static const Coord g_rrModP = {{ 0x0000000000000003, 0xfffffffbffffffff, 0xfffffffffffffffe, 0x00000004fffffffd }}; #elif defined(HITLS_THIRTY_TWO_BITS) // 1 is on the field with Montgomery, 1 * RR * R' mod P = R mod P = R - P static const Coord g_oneMont = {{ 0x00000001, 0x00000000, 0x00000000, 0xffffffff, 0xffffffff, 0xffffffff, 0xfffffffe, 0x00000000 }}; static const Coord g_rrModP = {{ 0x00000003, 0x00000000, 0xffffffff, 0xfffffffb, 0xfffffffe, 0xffffffff, 0xfffffffd, 0x00000004 }}; #else #error BN_UINT MUST be 4 or 8 #endif // If the value is 0, all Fs are returned. If the value is not 0, 0 is returned. static BN_UINT IsZero(const Coord *a) { BN_UINT ret = a->value[0]; for (uint32_t i = 1; i < P256_SIZE; i++) { ret |= a->value[i]; } return BN_IsZeroUintConsttime(ret); } // r = cond == 0 ? r : a, the input parameter cond can only be 0 or 1. // If cond is 0, the value remains unchanged. If cond is 1, copy a. static void CopyConditional(Coord *r, const Coord *a, BN_UINT cond) { BN_UINT mask1 = ~cond & (cond - 1); BN_UINT mask2 = ~mask1; for (uint32_t i = 0; i < P256_SIZE; i++) { r->value[i] = (r->value[i] & mask1) ^ (a->value[i] & mask2); } } // Jacobian affine -> Jacobian projection, (X,Y)->(X,Y,Z) static void Affine2Jproj(P256_Point *r, const P256_AffinePoint *a, BN_UINT mask) { for (uint32_t i = 0; i < P256_SIZE; i++) { r->x.value[i] = a->x.value[i] & mask; r->y.value[i] = a->y.value[i] & mask; r->z.value[i] = g_oneMont.value[i] & mask; } } // r = a^-1 mod p = a^(p-2) mod p // p-2 = 0xffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff fffffffd static void ECP256_ModInverse(Coord *r, const Coord *a) { // a^(0x3), a^(0xc) = a^(0b1100), a^(0xf), a^(0xf0), a^(0xff) // a^(0xff00), a^(0xffff), a^(0xffff0000), a^(0xffffffff) Coord a3, ac, af, af0, a2f, a2f20, a4f, a4f40, a8f, ans; uint32_t i; // 0x3 = 0b11 = 0b10 + 0b01 ECP256_Sqr(&a3, a); // a^2 ECP256_Mul(&a3, &a3, a); // a^3 = a^2 * a // 0xf = 0b1111 = 0b1100 + 0b11, 0b11->0b1100 requires *4, and the exponent*4(2^2) requires twice square operations ECP256_Sqr(&af, &a3); // a^6 = (a^3)^2 ECP256_Sqr(&ac, &af); // a^12 = (a^3)^2 = a^(0xc) ECP256_Mul(&af, &ac, &a3); // a^f = a^15 = a^12 * a^3 // 0xff = 0b11111111 = 0b11110000 + 0b1111, 0b1111->0b11110000 requires *16, // the exponent*16(2^4) requires 4 times square operations ECP256_Sqr(&a2f, &af); // a^(0b11110) = (a^f)^2 ECP256_Sqr(&a2f, &a2f); // a^(0b111100) = (a^(0b11110))^2 ECP256_Sqr(&a2f, &a2f); // a^(0b1111000) = (a^(0b111100))^2 ECP256_Sqr(&af0, &a2f); // a^(0xf0) = a^(0b11110000) = (a^(0b1111000))^2 ECP256_Mul(&a2f, &af0, &af); // a^(0xff) = a^(0xf0) * a^(0xf) // a^(0xffff) ECP256_Sqr(&a2f20, &a2f); for (i = 1; i < 8; i++) { // need to left shift by 8 bits ECP256_Sqr(&a2f20, &a2f20); } // When the loop ends, &a2f20 = a^(0xff00) ECP256_Mul(&a4f, &a2f20, &a2f); // a^(0xffff) = a^(0xff00) * a^(0xff) // a^(0xffffffff) ECP256_Sqr(&a4f40, &a4f); for (i = 1; i < 16; i++) { // need to left shift by 16 bits ECP256_Sqr(&a4f40, &a4f40); } // When the loop ends, &a4f40 = a^(0xffff0000) ECP256_Mul(&a8f, &a4f40, &a4f); // a^(0xffffffff) = a^(0xffff0000) * a^(0xffff) // a^(0xffffffff 00000001) ECP256_Sqr(&ans, &a8f); for (i = 1; i < 32; i++) { // need to left shift by 32 bits ECP256_Sqr(&ans, &ans); } ECP256_Mul(&ans, &ans, a); // a^(0xffffffff 00000001) = a^(0xffffffff 00000000) * a // a^(0xffffffff 00000001 00000000 00000000 00000000 ffffffff) for (i = 0; i < 32 * 4; i++) { // need to left shift by 32 * 4 bits ECP256_Sqr(&ans, &ans); } ECP256_Mul(&ans, &ans, &a8f); // a^(0xffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff) for (i = 0; i < 32; i++) { // need to left shift by 32 bits ECP256_Sqr(&ans, &ans); } ECP256_Mul(&ans, &ans, &a8f); // a^(0xffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff fffffffd) for (i = 0; i < 32; i++) { // need to left shift by 32 bits ECP256_Sqr(&ans, &ans); } // a^(0xffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff 00000000) ECP256_Mul(&ans, &ans, &a4f40); // a^(0xffff0000) ECP256_Mul(&ans, &ans, &a2f20); // a^(0xff00) ECP256_Mul(&ans, &ans, &af0); // a^(0xf0) ECP256_Mul(&ans, &ans, &ac); // a^(0xc) ECP256_Mul(r, &ans, a); // a^(0x1) } static int32_t ECP256_GetAffine(ECC_Point *r, const P256_Point *pt) { Coord zInv3; Coord zInv2; Coord res_x; Coord res_y; int32_t ret; if (IsZero(&(pt->z)) != 0) { ret = CRYPT_ECC_POINT_AT_INFINITY; BSL_ERR_PUSH_ERROR(ret); return ret; } ECP256_ModInverse(&zInv3, &(pt->z)); // zInv ECP256_Sqr(&zInv2, &zInv3); // zInv^2 ECP256_Mul(&zInv3, &zInv2, &zInv3); // zInv^3 ECP256_Mul(&res_x, &(pt->x), &zInv2); // xMont = x / (z^2) ECP256_Mul(&res_y, &(pt->y), &zInv3); // yMont = y / (z^3) ECP256_FromMont(&res_x, &res_x); ECP256_FromMont(&res_y, &res_y); ret = BN_Array2BN(&r->x, res_x.value, P256_SIZE); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BN_Array2BN(&r->y, res_y.value, P256_SIZE); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ret = BN_SetLimb(&r->z, 1); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } static void ECP256_P256Point2EccPoint(ECC_Point *r, const P256_Point *pt) { Coord xTemp; Coord yTemp; Coord zTemp; ECP256_FromMont(&xTemp, &(pt->x)); ECP256_FromMont(&yTemp, &(pt->y)); ECP256_FromMont(&zTemp, &(pt->z)); (void)BN_Array2BN(&r->x, xTemp.value, P256_SIZE); (void)BN_Array2BN(&r->y, yTemp.value, P256_SIZE); (void)BN_Array2BN(&r->z, zTemp.value, P256_SIZE); } static void ECP256_EccPoint2P256Point(P256_Point *r, const ECC_Point *pt) { (void)BN_BN2Array(&pt->x, r->x.value, P256_SIZE); (void)BN_BN2Array(&pt->y, r->y.value, P256_SIZE); (void)BN_BN2Array(&pt->z, r->z.value, P256_SIZE); ECP256_Mul(&(r->x), &(r->x), &g_rrModP); ECP256_Mul(&(r->y), &(r->y), &g_rrModP); ECP256_Mul(&(r->z), &(r->z), &g_rrModP); } int32_t ECP256_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt) { if (r == NULL || pt == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != CRYPT_ECC_NISTP256 || r->id != CRYPT_ECC_NISTP256 || pt->id != CRYPT_ECC_NISTP256) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } P256_Point temp; ECP256_EccPoint2P256Point(&temp, pt); return ECP256_GetAffine(r, &temp); } // The value of 'in' contains a maximum of six bits. The input parameter must be & 0b111111 in advance. static uint32_t Recodew5(uint32_t in) { // Shift rightwards by 5 bits to get the most significant bit, check whether the most significant bit is 1. uint32_t sign = (in >> 5) - 1; uint32_t data = (1 << 6) - 1 - in; // (6 Ones)0b111111 - in data = (data & ~sign) | (in & sign); data = (data >> 1) + (data & 1); return (data << 1) + (~sign & 1); } // The value of 'in' contains a maximum of six bits. The input parameter must be & 0b11111111 in advance. static uint32_t Recodew7(uint32_t in) { // Shift rightwards by 7 bits to get the most significant bit, check whether the most significant bit is 1. uint32_t sign = (in >> 7) - 1; uint32_t data = (1 << 8) - 1 - in; // (8 Ones)0b11111111 - in data = (data & ~sign) | (in & sign); data = (data >> 1) + (data & 1); return (data << 1) + (~sign & 1); } static void ECP256_PreCompWindow(P256_Point table[16], P256_Point *pt) { P256_Point temp[4]; ECP256_Scatterw5(table, pt, 1); ECP256_PointDouble(&temp[0], pt); // 2G ECP256_Scatterw5(table, &temp[0], 2); // Discretely save temp[0] to the 2nd position of the table. ECP256_PointAdd(&temp[1], &temp[0], pt); // temp[0] = 3G = 2G + G ECP256_Scatterw5(table, &temp[1], 3); // Discretely saves temp[1] to the 3rd position of the table. ECP256_PointDouble(&temp[2], &temp[0]); // temp[2] = 4G = 2G * 2 ECP256_Scatterw5(table, &temp[2], 4); // Discretely save temp[2] to the 4th position in the table. ECP256_PointAdd(&temp[3], &temp[2], pt); // temp[3] = 5G = 4G + G = = temp[2] + pt ECP256_Scatterw5(table, &temp[3], 5); // Discretely save temp[3] to the 5th position in the table. ECP256_PointDouble(&temp[0], &temp[1]); // temp[0] = 6G = 3G * 2 ECP256_Scatterw5(table, &temp[0], 6); // Discretely save temp[0] to the 6th position in the table. ECP256_PointAdd(&temp[1], &temp[0], pt); // temp[1] = 7G = 6G + G ECP256_Scatterw5(table, &temp[1], 7); // Discretely save temp[1] to the 7th position in the table. ECP256_PointDouble(&temp[2], &temp[2]); // temp[2] = 8G = 4G * 2 ECP256_Scatterw5(table, &temp[2], 8); // Discretely save temp[2] to the 8th position in the table. ECP256_PointDouble(&temp[3], &temp[3]); // temp[3] = 10G = 5G * 2 ECP256_Scatterw5(table, &temp[3], 10); // Discretely save temp[3] to the 10th position in the table. ECP256_PointAdd(&temp[3], &temp[3], pt); // temp[3] = 11G = 10G + G ECP256_Scatterw5(table, &temp[3], 11); // Discretely save temp[3] to the 11th position in the table. ECP256_PointDouble(&temp[0], &temp[0]); // temp[0] = 12G = 6G * 2 ECP256_Scatterw5(table, &temp[0], 12); // Discretely save temp[0] to the 12th position in the table. ECP256_PointAdd(&temp[3], &temp[2], pt); // temp[3] = 9G = 8G + G = temp[2] + pt ECP256_Scatterw5(table, &temp[3], 9); // Discretely save temp[3] to the 9th position in the table. ECP256_PointAdd(&temp[3], &temp[0], pt); // temp[3] = 13G = 12G + G ECP256_Scatterw5(table, &temp[3], 13); // Discretely save temp[3] to the 13th position of the table. ECP256_PointDouble(&temp[1], &temp[1]); // temp[1] = 14G = 7G * 2 ECP256_Scatterw5(table, &temp[1], 14); // Discretely saves temp[1] to the 14th position of the table. ECP256_PointAdd(&temp[0], &temp[1], pt); // temp[0] = 15G = 14G + G = temp[1] + pt ECP256_Scatterw5(table, &temp[0], 15); // Discretely save temp[0] to the 15th position of the table. ECP256_PointDouble(&temp[1], &temp[2]); // temp[1] = 16G = 8G * 2 = temp[2] * 2 ECP256_Scatterw5(table, &temp[1], 16); // Discretely saves temp[1] to the 16th position of the table. } static void CRYPT_ECP256_PointDouble5Times(P256_Point *r) { ECP256_PointDouble(r, r); ECP256_PointDouble(r, r); ECP256_PointDouble(r, r); ECP256_PointDouble(r, r); ECP256_PointDouble(r, r); } // r = k*point // Ensure that m is not empty and is in the range (0, n-1) static void ECP256_WindowMul(P256_Point *r, const BN_BigNum *k, const ECC_Point *point) { uint8_t kOctets[33]; // m big endian byte stream. Apply for 33 bytes and reserve one byte for the following offset. uint32_t mLen = BN_Bytes(k); // Offset during byte stream conversion. Ensure that the valid data of the mOctet is in the upper bits. uint32_t offset = sizeof(kOctets) - mLen; P256_Point table[16]; // The pre-computation window is 2 ^ (5 - 1) = 16 points P256_Point temp; // Apply for temporary space of two points. Coord tempY; (void)BN_Bn2Bin(k, kOctets + offset, &mLen); for (uint32_t i = 0; i < offset; i++) { kOctets[i] = 0; } ECP256_EccPoint2P256Point(&temp, point); ECP256_PreCompWindow(table, &temp); // The first byte is the first two bits of kOctets[1]. // The subscript starts from 0. Therefore, it is bit 0 + 8 and bit 1 + 8 = 9. uint32_t scans = 9; uint32_t index; // position of the byte to be scanned. // Number of bits to be shifted rightwards by the current byte. // Each byte needs to be moved backward by a maximum of 7 bits. uint32_t shift = 7 - (scans % 8); uint32_t w = 5; // Window size = 5 // the recode mask, the window size is 5, thus the value is 6 bits, mask = 0b111111 = 0x3f uint32_t mask = (1u << (w + 1)) - 1; uint32_t wCode = kOctets[1]; wCode = (wCode >> shift) & mask; wCode = Recodew5(wCode); ECP256_Gatherw5(&temp, table, wCode >> 1); (void)memcpy_s(r, sizeof(P256_Point), &temp, sizeof(P256_Point)); // 5 bits is obtained each time. The total number of bits is 256 + 8 (1 byte reserved) = 264 bits. // Therefore, the last time can be scanned to 264-5 = 259 bits. while (scans < 259) { // Double the point for 5 times CRYPT_ECP256_PointDouble5Times(r); scans += w; // Number of bits in the next scan. index = scans / 8; // Location of the byte to be scanned. (1 byte = 8 bits) // Number of bits to be shifted rightwards by the current byte. // Each byte needs to be moved backward by a maximum of 7 bits. (1 byte = 8 bits) shift = 7 - (scans % 8); // Shift the upper byte by 8 bits to left, concatenate the current byte, and then shift to get the current wCode wCode = kOctets[index] | (kOctets[index - 1] << 8); wCode = (wCode >> shift) & mask; wCode = Recodew5(wCode); ECP256_Gatherw5(&temp, table, wCode >> 1); ECP256_Neg(&tempY, &(temp.y)); // If the least significant bit of the code is 1, plus -(wCode >> 1) times point. CopyConditional(&(temp.y), &tempY, wCode & 1); ECP256_PointAdd(r, r, &temp); } // Special processing of the last block CRYPT_ECP256_PointDouble5Times(r); wCode = kOctets[32]; // Obtain the last byte, that is, kOctets[32]. wCode = (wCode << 1) & mask; wCode = Recodew5(wCode); ECP256_Gatherw5(&temp, table, wCode >> 1); ECP256_Neg(&tempY, &(temp.y)); // If the least significant bit of the code is 1, plus -(wCode >> 1) times point. CopyConditional(&(temp.y), &tempY, wCode & 1); ECP256_PointAdd(r, r, &temp); } static void ComputeK1G(P256_Point *k1G, const BN_BigNum *k1) { uint8_t kOctets[33]; // applies for 33 bytes and reserves one byte for the following offset. 256 bits are 32 bytes. Coord tempY; P256_AffinePoint k1GAffine; const ECP256_TableRow *preCompTable = NULL; // precompute window size is 2 ^(7 - 1) = 64 preCompTable = ECP256_GetPreCompTable(); uint32_t kLen = BN_Bytes(k1); // Offset during byte stream conversion. Ensure that the valid data of the mOctet is in the upper bits. uint32_t offset = sizeof(kOctets) - kLen; (void)BN_Bn2Bin(k1, kOctets + offset, &kLen); for (uint32_t i = 0; i < offset; i++) { kOctets[i] = 0; } uint32_t w = 7; // Window size = 7 // the recode mask, the window size is 7, thus 8 bits are used (one extra bit is the sign bit). // mask = 0b11111111 = 0xff uint32_t mask = (1u << (w + 1)) - 1; uint32_t wCode = (kOctets[32] << 1) & mask; // Last byte kOctets[32] is the least significant 7 bits. wCode = Recodew7(wCode); ECP256_Gatherw7(&k1GAffine, preCompTable[0], wCode >> 1); ECP256_Neg(&tempY, &(k1GAffine.y)); // If the least significant bit of the code is 1, plus -(wCode >> 1) times point. CopyConditional(&(k1GAffine.y), &tempY, wCode & 1); // If the x and y coordinates of k1GAffine are both 0, then the infinity is all Fs; otherwise, the infinity is 0. BN_UINT infinity = IsZero(&(k1GAffine.x)) & IsZero(&(k1GAffine.y)); Affine2Jproj(k1G, &k1GAffine, ~infinity); uint32_t scans = 0; uint32_t index, shift; // pre-computation table is table[37][64]. The table is queried every 7 bits (valid bits) of 256 bits. 256/7 = 36.57 for (uint32_t i = 1; i < 37; i++) { scans += w; index = 32 - ((scans - 1) / 8); // The subscript of the last byte is 32, and 8 means 8 bits(1byte) shift = (scans - 1) % 8; // 8 means 8 bits(1byte) wCode = kOctets[index] | (kOctets[index - 1] << 8); // 8 means 8 bits(1byte) wCode = (wCode >> shift) & mask; wCode = Recodew7(wCode); ECP256_Gatherw7(&k1GAffine, preCompTable[i], wCode >> 1); ECP256_Neg(&tempY, &(k1GAffine.y)); // If the least significant bit of the code is 1, plus -(wCode >> 1) times point. CopyConditional(&(k1GAffine.y), &tempY, wCode & 1); ECP256_AddAffine(k1G, k1G, &k1GAffine); } } static int32_t ECP256_PointMulCheck(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt) { bool flag = (para == NULL || r == NULL || k == NULL); uint32_t bits; if (flag) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != CRYPT_ECC_NISTP256 || r->id != CRYPT_ECC_NISTP256) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (pt != NULL) { if (pt->id != CRYPT_ECC_NISTP256) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } // Special processing for the infinite point. if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } } bits = BN_Bits(k); if (bits > 256) { // 256 is the number of bits in the curve mode BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_MUL_ERR_K_LEN); return CRYPT_ECC_POINT_MUL_ERR_K_LEN; } return CRYPT_SUCCESS; } // if pt == NULL, r = k * G, otherwise r = k * pt int32_t ECP256_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt) { P256_Point rTemp; int32_t ret = ECP256_PointMulCheck(para, r, k, pt); if (ret != CRYPT_SUCCESS) { return ret; } if (pt == NULL) { ComputeK1G(&rTemp, k); } else { ECP256_WindowMul(&rTemp, k, pt); } ECP256_P256Point2EccPoint(r, &rTemp); return ret; } static int32_t ECP256_PointMulAddCheck( ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt) { bool flag = (para == NULL || r == NULL || k1 == NULL || k2 == NULL || pt == NULL); uint32_t bits1, bits2; if (flag) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != CRYPT_ECC_NISTP256 || r->id != CRYPT_ECC_NISTP256 || pt->id != CRYPT_ECC_NISTP256) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } // Special processing of the infinite point. if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } bits1 = BN_Bits(k1); bits2 = BN_Bits(k2); if (bits1 > 256 || bits2 > 256) { // 256 is the number of bits in the curve mode BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_MUL_ERR_K_LEN); return CRYPT_ECC_POINT_MUL_ERR_K_LEN; } return CRYPT_SUCCESS; } // r = k1 * G + k2 * pt int32_t ECP256_PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt) { int32_t ret = ECP256_PointMulAddCheck(para, r, k1, k2, pt); if (ret != CRYPT_SUCCESS) { return ret; } P256_Point k2Pt; P256_Point k1G; ECP256_WindowMul(&k2Pt, k2, pt); ComputeK1G(&k1G, k1); ECP256_PointAdd(&k1G, &k1G, &k2Pt); ECP256_P256Point2EccPoint(r, &k1G); return ret; } #endif /* defined(HITLS_CRYPTO_CURVE_NISTP256) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) */
2401_83913325/openHiTLS-examples_7925
crypto/ecc/src/asm_ecp_nistp256.c
C
unknown
21,703
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef ASM_ECP_NISTP256_H #define ASM_ECP_NISTP256_H #include "hitls_build.h" #ifdef __cplusplus extern "C" { #endif #define P256_BYTES 32 #define P256_SIZE (P256_BYTES / sizeof(BN_UINT)) typedef struct { BN_UINT value[P256_SIZE]; } Coord; // Point Coordinates typedef struct p256_point { Coord x; Coord y; Coord z; } P256_Point; typedef struct p256_pointaffine { Coord x; Coord y; } P256_AffinePoint; #if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE) typedef P256_AffinePoint ECP256_TableRow[64]; const ECP256_TableRow *ECP256_GetPreCompTable(void); void ECP256_FromMont(Coord *r, const Coord *a); void ECP256_Mul(Coord *r, const Coord *a, const Coord *b); void ECP256_Sqr(Coord *r, const Coord *a); void ECP256_Neg(Coord *r, const Coord *a); void ECP256_OrdMul(Coord *r, const Coord *a, const Coord *b); void ECP256_OrdSqr(Coord *r, const Coord *a, int32_t repeat); void ECP256_PointDouble(P256_Point *r, const P256_Point *a); void ECP256_PointAdd(P256_Point *r, const P256_Point *a, const P256_Point *b); void ECP256_AddAffine(P256_Point *r, const P256_Point *a, const P256_AffinePoint *b); void ECP256_Scatterw5(P256_Point *table, const P256_Point *point, uint32_t index); void ECP256_Gatherw5(P256_Point *point, const P256_Point *table, uint32_t index); void ECP256_Gatherw7(P256_AffinePoint *point, const P256_AffinePoint *table, uint32_t index); #endif /* HITLS_CRYPTO_CURVE_NISTP256_ASM && HITLS_CRYPTO_NIST_ECC_ACCELERATE */ #ifdef __cplusplus } #endif #endif
2401_83913325/openHiTLS-examples_7925
crypto/ecc/src/asm_ecp_nistp256.h
C
unknown
2,116
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #if defined(HITLS_CRYPTO_CURVE_SM2) && defined(HITLS_SIXTY_FOUR_BITS) #include <stdint.h> #include "securec.h" #include "crypt_ecc.h" #include "ecc_local.h" #include "crypt_utils.h" #include "crypt_errno.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "asm_ecp_sm2.h" #define SM2_MASK2 0xff #define WINDOW_SIZE 4 #define PRECOMPUTED_TABLE_SIZE (1 << WINDOW_SIZE) #define WINDOW_HALF_TABLE_SIZE 8 #define SM2_NUMTOOFFSET(num) (((num) < 0) ? (WINDOW_HALF_TABLE_SIZE - 1 - (((num) - 1) >> 1)) : (((num) - 1) >> 1)) static const BN_UINT g_sm2p[SM2_LIMBS] = { 0xffffffffffffffff, 0xffffffff00000000, 0xffffffffffffffff, 0xfffffffeffffffff }; static const BN_UINT g_sm2ord[SM2_LIMBS] = { 0x53bbf40939d54123, 0x7203df6b21c6052b, 0xffffffffffffffff, 0xfffffffeffffffff }; static const BN_UINT g_one[SM2_LIMBS] = {1, 0, 0, 0}; #define FDIV(uout, uin, xout, xin, div, mod) \ do { \ ECP_Sm2Div##div(uout, uin); \ ECP_Sm2Div##div##Mod##mod(xout, xin); \ } while (0) #define FSUB(uout, uin, xout, xin, mod) \ do { \ ECP_Sm2BnSub(uout, uout, uin); \ ECP_Sm2SubMod##mod(xout, xout, xin); \ } while (0) #define FSUB_DIV(u, v, x1, x2, div, mod) \ do { \ if (IsGreater(u, v) == 1) { \ FSUB(u, v, x1, x2, mod); \ FDIV(u, u, x1, x1, div, mod); \ } else { \ FSUB(v, u, x2, x1, mod); \ FDIV(v, v, x2, x2, div, mod); \ } \ } while (0) static uint32_t IsZero(BN_UINT a) { BN_UINT t = a; t |= (0 - t); t = ~t; t >>= (BN_UNIT_BITS - 1); return (uint32_t)t; } static uint32_t IsZeros(const BN_UINT *a) { BN_UINT res = a[0] ^ 0; for (uint32_t i = 1; i < SM2_LIMBS; i++) { res |= a[i] ^ 0; } return IsZero(res); } static uint32_t IsEqual(const BN_UINT *a, const BN_UINT *b) { BN_UINT res = a[0] ^ b[0]; for (uint32_t i = 1; i < SM2_LIMBS; i++) { res |= a[i] ^ b[i]; } return IsZero(res); } #define IS_ONE(a) IsEqual(a, g_one) static int32_t IsGreater(const BN_UINT *a, const BN_UINT *b) { for (int32_t i = (int32_t)(SM2_LIMBS - 1); i >= 0; --i) { if (a[i] > b[i]) { return 1; } if (a[i] < b[i]) { return -1; } } return 0; } /* * Radix-4 Binary algorithm for modular inversion in Fp * ref. <Ultra High-Speed SM2 ASIC Implementation> */ /* Modular inv: out = in^(-1) mod p */ static void ECP_Sm2ModInverse(BN_UINT *out, const BN_UINT *in) { BN_UINT u[SM2_LIMBS] ALIGN32; BN_UINT v[SM2_LIMBS] ALIGN32; BN_UINT x1[SM2_LIMBS] ALIGN32 = {1, 0, 0, 0}; BN_UINT x2[SM2_LIMBS] ALIGN32 = {0}; BN_UINT c; BN_UINT d; if (IsZeros(in) != 0) { return; } (void)memcpy_s(u, SM2_BYTES_NUM, in, SM2_BYTES_NUM); (void)memcpy_s(v, SM2_BYTES_NUM, g_sm2p, SM2_BYTES_NUM); while (((!IS_ONE(u)) != 0) && ((!IS_ONE(v)) != 0)) { c = u[0] & 0x3; // Use 0x03 to obtain the last two bits. d = v[0] & 0x3; if (c == 0) { FDIV(u, u, x1, x1, 4, P); } else if (d == 0) { FDIV(v, v, x2, x2, 4, P); } else if (c == d) { FSUB_DIV(u, v, x1, x2, 4, P); } else if (c == 2) { // if c == 2 FDIV(u, u, x1, x1, 2, P); FSUB_DIV(u, v, x1, x2, 2, P); } else if (d == 2) { // if d == 2 FDIV(v, v, x2, x2, 2, P); FSUB_DIV(u, v, x1, x2, 2, P); } else { FSUB_DIV(u, v, x1, x2, 2, P); } } if (IS_ONE(u) != 0) { (void)memcpy_s(out, SM2_BYTES_NUM, x1, SM2_BYTES_NUM); } else { (void)memcpy_s(out, SM2_BYTES_NUM, x2, SM2_BYTES_NUM); } } /* Modular inv: out = in^(-1) mod n, where n = ord(p) */ static void ECP_Sm2InvModOrd(BN_UINT *out, const BN_UINT *in) { BN_UINT u[SM2_LIMBS] ALIGN32; BN_UINT v[SM2_LIMBS] ALIGN32; BN_UINT x1[SM2_LIMBS] ALIGN32 = {1, 0, 0, 0}; BN_UINT x2[SM2_LIMBS] ALIGN32 = {0}; BN_UINT c; BN_UINT d; if (IsZeros(in) != 0) { return; } (void)memcpy_s(u, SM2_BYTES_NUM, in, SM2_BYTES_NUM); (void)memcpy_s(v, SM2_BYTES_NUM, g_sm2ord, SM2_BYTES_NUM); while (((!IS_ONE(u)) != 0) && ((!IS_ONE(v)) != 0)) { c = u[0] & 0x3; // Use 0x03 to obtain the last two bits. d = v[0] & 0x3; if (c == 0) { FDIV(u, u, x1, x1, 4, Ord); } else if (d == 0) { FDIV(v, v, x2, x2, 4, Ord); } else if (c == d) { FSUB_DIV(u, v, x1, x2, 4, Ord); } else if (c == 2) { // if c == 2 FDIV(u, u, x1, x1, 2, Ord); FSUB_DIV(u, v, x1, x2, 2, Ord); } else if (d == 2) { // if d == 2 FDIV(v, v, x2, x2, 2, Ord); FSUB_DIV(u, v, x1, x2, 2, Ord); } else { FSUB_DIV(u, v, x1, x2, 2, Ord); } } if (IS_ONE(u) != 0) { (void)memcpy_s(out, SM2_BYTES_NUM, x1, SM2_BYTES_NUM); } else { (void)memcpy_s(out, SM2_BYTES_NUM, x2, SM2_BYTES_NUM); } } static int32_t ECP_Sm2Point2Array(SM2_point *r, const ECC_Point *p) { int32_t ret; uint32_t len = SM2_LIMBS; GOTO_ERR_IF_EX(BN_Bn2U64Array(&p->x, (BN_UINT *)&r->x, &len), ret); GOTO_ERR_IF_EX(BN_Bn2U64Array(&p->y, (BN_UINT *)&r->y, &len), ret); GOTO_ERR_IF_EX(BN_Bn2U64Array(&p->z, (BN_UINT *)&r->z, &len), ret); ERR: return ret; } static int32_t ECP_Sm2Array2Point(ECC_Point *r, const SM2_point *a) { int32_t ret; GOTO_ERR_IF_EX(BN_U64Array2Bn(&r->x, (const BN_UINT *)a->x, SM2_LIMBS), ret); GOTO_ERR_IF_EX(BN_U64Array2Bn(&r->y, (const BN_UINT *)a->y, SM2_LIMBS), ret); GOTO_ERR_IF_EX(BN_U64Array2Bn(&r->z, (const BN_UINT *)a->z, SM2_LIMBS), ret); ERR: return ret; } int32_t ECP_Sm2GetAffine(SM2_AffinePoint *r, const SM2_point *a) { BN_UINT zInv3[SM2_LIMBS] ALIGN32 = {0}; BN_UINT zInv2[SM2_LIMBS] ALIGN32 = {0}; if (IsZeros(a->z) != 0) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } if (IsEqual(a->z, g_one) != 0) { (void)memcpy_s(r->x, sizeof(r->x), a->x, sizeof(r->x)); (void)memcpy_s(r->y, sizeof(r->y), a->y, sizeof(r->x)); return CRYPT_SUCCESS; } ECP_Sm2ModInverse(zInv3, a->z); ECP_Sm2Sqr(zInv2, zInv3); ECP_Sm2Mul(r->x, a->x, zInv2); ECP_Sm2Mul(zInv3, zInv3, zInv2); ECP_Sm2Mul(r->y, a->y, zInv3); return CRYPT_SUCCESS; } int32_t ECP_Sm2Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a) { if (r == NULL || a == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != CRYPT_ECC_SM2 || r->id != CRYPT_ECC_SM2 || a->id != CRYPT_ECC_SM2) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } SM2_point temp = {0}; SM2_AffinePoint rTemp = {0}; int32_t ret; GOTO_ERR_IF_EX(ECP_Sm2Point2Array(&temp, a), ret); GOTO_ERR_IF_EX(ECP_Sm2GetAffine(&rTemp, &temp), ret); GOTO_ERR_IF_EX(BN_Array2BN(&r->x, rTemp.x, SM2_LIMBS), ret); GOTO_ERR_IF_EX(BN_Array2BN(&r->y, rTemp.y, SM2_LIMBS), ret); GOTO_ERR_IF_EX(BN_SetLimb(&r->z, 1), ret); ERR: return ret; } int32_t ECP_Sm2PointDouble(const ECC_Para *para, ECC_Point *r, const ECC_Point *a) { return ECP_NistPointDouble(para, r, a); } int32_t ECP_Sm2PointAddAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b) { return ECP_NistPointAddAffine(para, r, a, b); } static void ECP_Sm2ScalarMulG(SM2_point *r, const BN_UINT *k) { const BN_UINT *precomputed = ECP_Sm2Precomputed(); uint32_t index; for (int32_t i = SM2_BYTES_NUM - 1; i >= 0; --i) { index = (k[i / sizeof(BN_UINT)] >> (SM2_BITSOFBYTES * (i % sizeof(BN_UINT)))) & SM2_MASK2; #ifndef HITLS_SM2_PRECOMPUTE_512K_TBL ECP_Sm2PointDoubleMont(r, r); ECP_Sm2PointDoubleMont(r, r); ECP_Sm2PointDoubleMont(r, r); ECP_Sm2PointDoubleMont(r, r); ECP_Sm2PointDoubleMont(r, r); ECP_Sm2PointDoubleMont(r, r); ECP_Sm2PointDoubleMont(r, r); ECP_Sm2PointDoubleMont(r, r); #endif if (index != 0) { #ifdef HITLS_SM2_PRECOMPUTE_512K_TBL index = index + i * SM2_BITS; #endif index = index * SM2_BITSOFBYTES; ECP_Sm2PointAddAffineMont(r, r, (const SM2_AffinePoint *)&precomputed[index]); } } } static int32_t ECP_Sm2WnafMul(SM2_point *r, const BN_BigNum *k, SM2_point p) { ReCodeData *recodeK = ECC_ReCodeK(k, WINDOW_SIZE); if (recodeK == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } SM2_point doublePoint; SM2_point precomputed[PRECOMPUTED_TABLE_SIZE] ALIGN64; ECP_Sm2ToMont(precomputed[0].x, p.x); ECP_Sm2ToMont(precomputed[0].y, p.y); ECP_Sm2ToMont(precomputed[0].z, p.z); ECP_Sm2PointDoubleMont(&doublePoint, &precomputed[0]); (void)memcpy_s(precomputed[WINDOW_HALF_TABLE_SIZE].x, SM2_BYTES_NUM, precomputed[0].x, SM2_BYTES_NUM); ECP_Sm2Neg(precomputed[WINDOW_HALF_TABLE_SIZE].y, precomputed[0].y); (void)memcpy_s(precomputed[WINDOW_HALF_TABLE_SIZE].z, SM2_BYTES_NUM, precomputed[0].z, SM2_BYTES_NUM); for (uint32_t i = 1; i < WINDOW_HALF_TABLE_SIZE; i++) { ECP_Sm2PointAddMont(&precomputed[i], &precomputed[i - 1], &doublePoint); // 1, 3, 5, 7, 9, 11, 13, 15 (void)memcpy_s(precomputed[i + WINDOW_HALF_TABLE_SIZE].x, SM2_BYTES_NUM, precomputed[i].x, SM2_BYTES_NUM); ECP_Sm2Neg(precomputed[i + WINDOW_HALF_TABLE_SIZE].y, precomputed[i].y); (void)memcpy_s(precomputed[i + WINDOW_HALF_TABLE_SIZE].z, SM2_BYTES_NUM, precomputed[i].z, SM2_BYTES_NUM); } int8_t index = SM2_NUMTOOFFSET(recodeK->num[0]); (void)memcpy_s(r, sizeof(SM2_point), &precomputed[index], sizeof(SM2_point)); uint32_t w = recodeK->wide[0]; while (w != 0) { ECP_Sm2PointDoubleMont(r, r); w--; } for (uint32_t i = 1; i < recodeK->size; i++) { index = SM2_NUMTOOFFSET(recodeK->num[i]); ECP_Sm2PointAddMont(r, r, &precomputed[index]); w = recodeK->wide[i]; while (w != 0) { ECP_Sm2PointDoubleMont(r, r); w--; } } ECC_ReCodeFree(recodeK); return CRYPT_SUCCESS; } int32_t ECP_Sm2PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *scalar, const ECC_Point *pt) { if (para == NULL || r == NULL || scalar == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != CRYPT_ECC_SM2 || r->id != CRYPT_ECC_SM2 || (pt != NULL && (pt->id != CRYPT_ECC_SM2))) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (pt != NULL && BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } if (BN_IsZero(scalar)) { return BN_Zeroize(&r->z); } int32_t ret; BN_UINT k[SM2_LIMBS] = {0}; uint32_t klen = SM2_LIMBS; SM2_point re = {0}; SM2_point sm2Pt = {0}; GOTO_ERR_IF_EX(BN_Bn2U64Array(scalar, k, &klen), ret); if (pt == NULL) { // calculate k*G ECP_Sm2ScalarMulG(&re, k); } else { // point 2 affine GOTO_ERR_IF_EX(ECP_Sm2Point2Array(&sm2Pt, pt), ret); GOTO_ERR_IF_EX(ECP_Sm2WnafMul(&re, scalar, sm2Pt), ret); } ECP_Sm2FromMont(re.x, re.x); ECP_Sm2FromMont(re.y, re.y); ECP_Sm2FromMont(re.z, re.z); // SM2_point 2 ECC_Point GOTO_ERR_IF_EX(ECP_Sm2Array2Point(r, &re), ret); ERR: return ret; } int32_t ECP_Sm2PointMulFast(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt) { return ECP_Sm2PointMul(para, r, k, pt); } int32_t ECP_Sm2OrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a) { if (para == NULL || r == NULL || a == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (BN_IsZero(a)) { BSL_ERR_PUSH_ERROR(CRYPT_BN_ERR_DIVISOR_ZERO); return CRYPT_BN_ERR_DIVISOR_ZERO; } int32_t ret = BN_Extend(r, SM2_LIMBS); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } ECP_Sm2InvModOrd(r->data, a->data); r->size = SM2_LIMBS; BN_FixSize(r); if (BN_IsZero(r)) { BSL_ERR_PUSH_ERROR(CRYPT_BN_ERR_NO_INVERSE); return CRYPT_BN_ERR_NO_INVERSE; } return CRYPT_SUCCESS; } static int32_t ECP_Sm2PointMulAddCheck( ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt) { bool flag = (para == NULL || r == NULL || k1 == NULL || k2 == NULL || pt == NULL); uint32_t bits1; uint32_t bits2; if (flag) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != CRYPT_ECC_SM2 || r->id != CRYPT_ECC_SM2 || pt->id != CRYPT_ECC_SM2) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } // Special processing of the infinite point. if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } bits1 = BN_Bits(k1); bits2 = BN_Bits(k2); if (bits1 > SM2_BITS || bits2 > SM2_BITS) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_MUL_ERR_K_LEN); return CRYPT_ECC_POINT_MUL_ERR_K_LEN; } return CRYPT_SUCCESS; } // r = k1 * G + k2 * pt int32_t ECP_Sm2PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt) { int32_t ret = ECP_Sm2PointMulAddCheck(para, r, k1, k2, pt); if (ret != CRYPT_SUCCESS) { return ret; } BN_UINT k1Uint[SM2_LIMBS] = {0}; uint32_t k1Len = SM2_LIMBS; SM2_point k1G = {0}; SM2_point k2Pt = {0}; SM2_point sm2Pt = {0}; GOTO_ERR_IF_EX(BN_Bn2U64Array(k1, k1Uint, &k1Len), ret); GOTO_ERR_IF_EX(ECP_Sm2Point2Array(&sm2Pt, pt), ret); // k1 * G ECP_Sm2ScalarMulG(&k1G, k1Uint); // k2 * pt GOTO_ERR_IF_EX(ECP_Sm2WnafMul(&k2Pt, k2, sm2Pt), ret); ECP_Sm2PointAddMont(&k2Pt, &k1G, &k2Pt); ECP_Sm2FromMont(k2Pt.x, k2Pt.x); ECP_Sm2FromMont(k2Pt.y, k2Pt.y); ECP_Sm2FromMont(k2Pt.z, k2Pt.z); GOTO_ERR_IF_EX(ECP_Sm2Array2Point(r, &k2Pt), ret); ERR: return ret; } #endif
2401_83913325/openHiTLS-examples_7925
crypto/ecc/src/asm_ecp_sm2.c
C
unknown
15,270
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef ASM_ECP_SM2_H #define ASM_ECP_SM2_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_CURVE_SM2 #include <stdint.h> #include "crypt_bn.h" #ifdef __cplusplus extern "C" { #endif #define SM2_BITS 256 #define SM2_BITSOFBYTES 8 #define SM2_BYTES_NUM 32 #define SM2_LIMBS (SM2_BYTES_NUM / sizeof(BN_UINT)) /* = 4 or 8 */ typedef struct SM2_point { BN_UINT x[SM2_LIMBS]; BN_UINT y[SM2_LIMBS]; BN_UINT z[SM2_LIMBS]; } SM2_point; typedef struct SM2_pointaffine { BN_UINT x[SM2_LIMBS]; BN_UINT y[SM2_LIMBS]; } SM2_AffinePoint; /* Right shift: a >> 1 */ void ECP_Sm2BnRshift1(BN_UINT *a); /* Finite field operations */ /* Modular div by 2: r = a/2 mod p */ void ECP_Sm2DivBy2(BN_UINT *r, const BN_UINT *a); /* Modular add: r = a+b mod p */ void ECP_Sm2AddModP(BN_UINT *r, const BN_UINT *a, const BN_UINT *b); /* Modular add: r = a+b mod n, where n = ord(p) */ void ECP_Sm2AddModOrd(BN_UINT *r, const BN_UINT *a, const BN_UINT *b); /* Modular sub: r = a-b mod p */ void ECP_Sm2SubModP(BN_UINT *r, const BN_UINT *a, const BN_UINT *b); /* Modular sub: r = a-b mod n, where n = ord(p) */ void ECP_Sm2SubModOrd(BN_UINT *r, const BN_UINT *a, const BN_UINT *b); /* Modular mul by 3: r = 3*a mod p */ void ECP_Sm2MulBy3(BN_UINT *r, const BN_UINT *a); /* Modular mul: r = a*b mod p */ void ECP_Sm2Mul(BN_UINT *r, const BN_UINT *a, const BN_UINT *b); /* Modular sqr: r = a^2 mod p */ void ECP_Sm2Sqr(BN_UINT *r, const BN_UINT *a); /* sub: r = p - b */ void ECP_Sm2Neg(BN_UINT *r, const BN_UINT *b); const BN_UINT *ECP_Sm2Precomputed(void); /* Right shift 1: r = a >> 1 */ void ECP_Sm2Div2(BN_UINT *r, BN_UINT *a); /* Right shift 2: r = a >> 2 */ void ECP_Sm2Div4(BN_UINT *r, BN_UINT *a); /* Sub: r = a - b */ void ECP_Sm2BnSub(BN_UINT *r, const BN_UINT *a, const BN_UINT *b); /* Add: r = a + b */ void ECP_Sm2BnAdd(BN_UINT *r, const BN_UINT *a, const BN_UINT *b); /* Finite field operations */ /* Modular div by 2: r = a/2 mod p */ void ECP_Sm2Div2ModP(BN_UINT *r, const BN_UINT *a); /* Modular div by 2: r = a/2 mod n, where n = ord(p) */ void ECP_Sm2Div2ModOrd(BN_UINT *r, const BN_UINT *a); /* Modular div by 4: r = a/4 mod p */ void ECP_Sm2Div4ModP(BN_UINT *r, BN_UINT *a); /* Modular div by 4: r = a/4 mod n, where n = ord(p) */ void ECP_Sm2Div4ModOrd(BN_UINT *r, const BN_UINT *a); /* Convert to Montgomery domain */ void ECP_Sm2ToMont(BN_UINT *r, const BN_UINT *a); /* Convert from Montgomery domain */ void ECP_Sm2FromMont(BN_UINT *r, const BN_UINT *a); /* Point double in Montgomery domain: r <- a + a */ void ECP_Sm2PointDoubleMont(SM2_point *r, const SM2_point *a); /* Point add affine in Montgomery domain: R <- a + b */ void ECP_Sm2PointAddAffineMont(SM2_point *r, const SM2_point *a, const SM2_AffinePoint *b); /* Point add in Montgomery domain: r <- a + b */ void ECP_Sm2PointAddMont(SM2_point *r, const SM2_point *a, const SM2_point *b); #ifdef __cplusplus } #endif #endif #endif
2401_83913325/openHiTLS-examples_7925
crypto/ecc/src/asm_ecp_sm2.h
C
unknown
3,462
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include "securec.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_utils.h" #include "crypt_errno.h" #include "ecc_local.h" #include "crypt_ecc.h" ECC_Point *ECC_NewPoint(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } int32_t ret; uint32_t words = BITS_TO_BN_UNIT(BN_Bits(para->p)); ECC_Point *pt = BSL_SAL_Calloc(sizeof(ECC_Point), 1u); if (pt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } pt->id = para->id; GOTO_ERR_IF(BN_Extend(&pt->x, words), ret); GOTO_ERR_IF(BN_Extend(&pt->y, words), ret); GOTO_ERR_IF(BN_Extend(&pt->z, words), ret); return pt; ERR: ECC_FreePoint(pt); return NULL; } void ECC_FreePoint(ECC_Point *pt) { if (pt == NULL) { return; } BSL_SAL_CleanseData((void *)(pt->x.data), pt->x.size * sizeof(BN_UINT)); BSL_SAL_FREE(pt->x.data); BSL_SAL_CleanseData((void *)(pt->y.data), pt->y.size * sizeof(BN_UINT)); BSL_SAL_FREE(pt->y.data); BSL_SAL_CleanseData((void *)(pt->z.data), pt->z.size * sizeof(BN_UINT)); BSL_SAL_FREE(pt->z.data); BSL_SAL_Free(pt); } void ECC_SetLibCtx(void *libCtx, ECC_Para *para) { para->libCtx = libCtx; } int32_t ECC_CopyPoint(ECC_Point *dst, const ECC_Point *src) { if (dst == NULL || src == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (dst->id != src->id) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } int32_t ret; GOTO_ERR_IF(BN_Copy(&dst->x, &src->x), ret); GOTO_ERR_IF(BN_Copy(&dst->y, &src->y), ret); GOTO_ERR_IF(BN_Copy(&dst->z, &src->z), ret); ERR: return ret; } ECC_Point *ECC_DupPoint(const ECC_Point *pt) { if (pt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } int32_t ret; ECC_Point *newPt = BSL_SAL_Calloc(sizeof(ECC_Point), 1u); if (newPt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } newPt->id = pt->id; GOTO_ERR_IF(BN_Extend(&newPt->x, pt->x.room), ret); GOTO_ERR_IF(BN_Extend(&newPt->y, pt->y.room), ret); GOTO_ERR_IF(BN_Extend(&newPt->z, pt->z.room), ret); (void)BN_Copy(&newPt->x, &pt->x); (void)BN_Copy(&newPt->y, &pt->y); (void)BN_Copy(&newPt->z, &pt->z); return newPt; ERR: ECC_FreePoint(newPt); return NULL; } // Convert to Cartesian coordinates int32_t ECC_GetPoint(const ECC_Para *para, ECC_Point *pt, CRYPT_Data *x, CRYPT_Data *y) { int32_t ret; uint32_t pBytes; if (para == NULL || pt == NULL || x == NULL || x->data == NULL || ((y != NULL) && (y->data == NULL))) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != pt->id) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } pBytes = BN_Bytes(para->p); if ((x->len < pBytes) || ((y != NULL) && (y->len < pBytes))) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_BUFF_LEN_NOT_ENOUGH); return CRYPT_ECC_BUFF_LEN_NOT_ENOUGH; } if (BN_IsZero(&pt->z)) { // infinity point BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } if (para->method->point2Affine == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT); return CRYPT_ECC_NOT_SUPPORT; } GOTO_ERR_IF(para->method->point2Affine(para, pt, pt), ret); GOTO_ERR_IF(BN_Bn2BinFixZero(&pt->x, x->data, pBytes), ret); x->len = pBytes; if (y != NULL) { GOTO_ERR_IF(BN_Bn2BinFixZero(&pt->y, y->data, pBytes), ret); y->len = pBytes; } ERR: return ret; } int32_t ECC_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a) { if (para == NULL || r == NULL || a == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->id != a->id || para->id != r->id) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_ECC_POINT_ERR_CURVE_ID; } if (BN_IsZero(&a->z)) { // infinity point BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } if (para->method->point2Affine == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT); return CRYPT_ECC_NOT_SUPPORT; } int32_t ret = para->method->point2Affine(para, r, a); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); } return ret; } int32_t ECC_GetPoint2Bn(const ECC_Para *para, ECC_Point *pt, BN_BigNum *x, BN_BigNum *y) { int32_t ret; GOTO_ERR_IF(ECC_GetPointDataX(para, pt, x), ret); if (y != NULL) { GOTO_ERR_IF(BN_Copy(y, &pt->y), ret); } ERR: return ret; } int32_t ECC_GetPointDataX(const ECC_Para *para, ECC_Point *pt, BN_BigNum *x) { int32_t ret; if (x == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } GOTO_ERR_IF(ECP_PointAtInfinity(para, pt), ret); if (para->method->point2Affine == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT); return CRYPT_ECC_NOT_SUPPORT; } GOTO_ERR_IF(para->method->point2Affine(para, pt, pt), ret); GOTO_ERR_IF(BN_Copy(x, &pt->x), ret); ERR: return ret; } ECC_Point *ECC_GetGFromPara(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } ECC_Point *pt = ECC_NewPoint(para); if (pt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)BN_Copy(&pt->x, para->x); (void)BN_Copy(&pt->y, para->y); (void)BN_SetLimb(&pt->z, 1); return pt; } int32_t ECC_PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->method->pointMulAdd == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT); return CRYPT_ECC_NOT_SUPPORT; } return para->method->pointMulAdd(para, r, k1, k2, pt); } int32_t ECC_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->method->pointMul == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT); return CRYPT_ECC_NOT_SUPPORT; } return para->method->pointMul(para, r, k, pt); } int32_t ECC_PointCmp(const ECC_Para *para, const ECC_Point *a, const ECC_Point *b) { // Currently, only prime number curves are supported. Other curves need to be expanded. return ECP_PointCmp(para, a, b); } ECC_Para *ECC_DupPara(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } ECC_Para *newPara = ECC_NewPara(para->id); if (newPara != NULL) { newPara->libCtx = para->libCtx; } return newPara; } uint32_t ECC_ParaBits(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } return BN_Bits(para->p); } BN_BigNum *ECC_GetParaH(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } return BN_Dup(para->h); } BN_BigNum *ECC_GetParaN(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } return BN_Dup(para->n); } BN_BigNum *ECC_GetParaA(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } BN_BigNum *dupA = BN_Dup(para->a); if (dupA == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto ERR; } if (para->method->bnMontDec != NULL) { para->method->bnMontDec(dupA, para->montP); } return dupA; ERR: BN_Destroy(dupA); return NULL; } BN_BigNum *ECC_GetParaB(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } BN_BigNum *dupB = BN_Dup(para->b); if (dupB == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto ERR; } if (para->method->bnMontDec != NULL) { para->method->bnMontDec(dupB, para->montP); } return dupB; ERR: BN_Destroy(dupB); return NULL; } BN_BigNum *ECC_GetParaX(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } return BN_Dup(para->x); } BN_BigNum *ECC_GetParaY(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } return BN_Dup(para->y); } int32_t ECC_EncodePoint(const ECC_Para *para, ECC_Point *pt, uint8_t *data, uint32_t *dataLen, CRYPT_PKEY_PointFormat format) { // Currently, only prime number curves are supported. Other curves need to be expanded. return ECP_EncodePoint(para, pt, data, dataLen, format); } int32_t ECC_DecodePoint(const ECC_Para *para, ECC_Point *pt, const uint8_t *data, uint32_t dataLen) { // Currently, only prime number curves are supported. Other curves need to be expanded. return ECP_DecodePoint(para, pt, data, dataLen); } int32_t ECC_PointCheck(const ECC_Point *pt) { if (pt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (BN_IsZero(&pt->z)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY); return CRYPT_ECC_POINT_AT_INFINITY; } return CRYPT_SUCCESS; } int32_t ECC_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->method->modOrdInv == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT); return CRYPT_ECC_NOT_SUPPORT; } return para->method->modOrdInv(para, r, a); } int32_t ECC_PointToMont(const ECC_Para *para, ECC_Point *pt, BN_Optimizer *opt) { if (para == NULL || pt == NULL || opt == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->method->bnMontEnc == NULL) { return CRYPT_SUCCESS; } int32_t ret; GOTO_ERR_IF(para->method->bnMontEnc(&pt->x, para->montP, opt, false), ret); GOTO_ERR_IF(para->method->bnMontEnc(&pt->y, para->montP, opt, false), ret); GOTO_ERR_IF(para->method->bnMontEnc(&pt->z, para->montP, opt, false), ret); ERR: return ret; } void ECC_PointFromMont(const ECC_Para *para, ECC_Point *r) { if (para == NULL || r == NULL || para->method->bnMontDec == NULL) { return; } para->method->bnMontDec(&r->x, para->montP); para->method->bnMontDec(&r->y, para->montP); para->method->bnMontDec(&r->z, para->montP); } /* Prime curve, point addition r = a + b Calculation formula: X3 = (Y2*Z1^3-Y1)^2 - (X2*Z1^2-X1)^2 * (X1+X2*Z1^2) Y3 = (Y2*Z1^3-Y1) * (X1*(X2*Z1^2-X1)^2-X3) - Y1 * (X2*Z1^2-X1)^3 Z3 = (X2*Z1^2-X1) * Z1 */ int32_t ECC_PointAddAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b) { int32_t ret; if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (para->method->pointAddAffine == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT); return CRYPT_ECC_NOT_SUPPORT; } BN_Optimizer *opt = BN_OptimizerCreate(); ECC_Point *affineb = ECC_NewPoint(para); ECC_Point *dupA = ECC_DupPoint(a); if (affineb == NULL || opt == NULL || dupA == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto ERR; } GOTO_ERR_IF(ECC_Point2Affine(para, affineb, b), ret); GOTO_ERR_IF(ECC_PointToMont(para, dupA, opt), ret); GOTO_ERR_IF(ECC_PointToMont(para, affineb, opt), ret); GOTO_ERR_IF(para->method->pointAddAffine(para, r, dupA, affineb), ret); ECC_PointFromMont(para, r); ERR: BN_OptimizerDestroy(opt); ECC_FreePoint(dupA); ECC_FreePoint(affineb); return ret; } typedef struct { uint32_t ecKeyLen; uint32_t secBits; } ComparableStrengths; /* See the standard document https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf Table 2: Comparable strengths */ const ComparableStrengths g_strengthsTable[] = { {512, 256}, {384, 192}, {256, 128}, {224, 112}, {160, 80} }; int32_t ECC_GetSecBits(const ECC_Para *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } uint32_t bits = BN_Bits(para->n); for (size_t i = 0; i < (sizeof(g_strengthsTable) / sizeof(g_strengthsTable[0])); i++) { if (bits >= g_strengthsTable[i].ecKeyLen) { return g_strengthsTable[i].secBits; } } return bits / 2; } #endif /* HITLS_CRYPTO_ECC */
2401_83913325/openHiTLS-examples_7925
crypto/ecc/src/ecc.c
C
unknown
13,714
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef ECC_LOCAL_H #define ECC_LOCAL_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include "crypt_ecc.h" #include "crypt_bn.h" #ifdef __cplusplus extern "C" { #endif #define ECC_MAX_BIT_LEN 521 #define PRE_COMPUTE_WINDOW 5 // Default Window Size #define PRE_COMPUTE_MAX_TABLELEN (1 << 5) // Maximum specifications of the pre-calculation table /** * Elliptic Curve Implementation Method */ typedef struct { // Calculate r = k1 * G + k2 * pt int32_t (*pointMulAdd)(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt); // Calculate r = k * pt. If pt is null, calculate r = k * G. This is the ConstTime processing function. int32_t (*pointMul)(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt); // Calculate r = k * pt. If pt is null, calculate r = k * G int32_t (*pointMulFast)(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt); // point addition r = a + b, a all can be the jacobi coordinate, b must be an affine point int32_t (*pointAddAffine)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); // point addition r = a + b, a, b all can be the jacobi coordinate. int32_t (*pointAdd)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); // point double r = a + a, a can be the jacobi coordinate. int32_t (*pointDouble)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a); // point Multi-double Calculate r = (2^m)*a, a can be the jacobi coordinate. int32_t (*pointMultDouble)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m); // Module inverse int32_t (*modInv)(BN_BigNum *r, const BN_BigNum *a, const BN_BigNum *p, BN_Optimizer *opt); // Convert points to affine coordinates based on the given module inverse information. int32_t (*point2AffineWithInv)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const BN_BigNum *inv); // Convert the point information to affine coordinates. int32_t (*point2Affine)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a); // Calculate r = (a*b) % mod int32_t (*bnModNistEccMul)(BN_BigNum *r, const BN_BigNum *a, const BN_BigNum *b, void *mod, BN_Optimizer *opt); // Calculate r = (a^2) % mod int32_t (*bnModNistEccSqr)(BN_BigNum *r, const BN_BigNum *a, void *mod, BN_Optimizer *opt); // Inverse mode order. int32_t (*modOrdInv)(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a); // convert date to Montgomery form int32_t (*bnMontEnc)(BN_BigNum *r, BN_Mont *mont, BN_Optimizer *opt, bool consttime); // convert Montgomery form to common form void (*bnMontDec)(BN_BigNum *r, BN_Mont *mont); } ECC_Method; /** * Elliptic Curve Point Information */ struct EccPointInfo { BN_BigNum x; BN_BigNum y; BN_BigNum z; CRYPT_PKEY_ParaId id; }; /** * Elliptic curve parameter information */ struct EccPara { BN_BigNum *p; BN_BigNum *a; BN_BigNum *b; BN_BigNum *n; BN_BigNum *h; BN_BigNum *x; BN_BigNum *y; // Currently, the 5-bit window is used. Only odd multiple points are calculated. // The total number of pre-calculated data is (2 ^ 5)/2, that is 16 points. ECC_Point *tableG[16]; const ECC_Method *method; CRYPT_PKEY_ParaId id; BN_Mont *montP; void *libCtx; }; /** * @ingroup ecc * @brief Check whether the checkpoint is at infinity. * * @param para [IN] Curve parameters * @param pt [IN] Point information * * @retval CRYPT_SUCCESS succeeded, indicating that the point is not at infinity. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_PointAtInfinity(const ECC_Para *para, const ECC_Point *pt); /** * @ingroup ecc * @brief Check whether the point is on the curve. * The determined point must be on the Cartesian coordinate, which is used to check the validity of the point input. * * @param para [IN] Curve parameters * @param pt [IN] Point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_PointOnCurve(const ECC_Para *para, const ECC_Point *pt); /** * @ingroup ecc * @brief Add salt to the pt point and add random z information. * * @param para [IN] Curve parameters * @param pt [IN/OUT] Point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_PointBlind(const ECC_Para *para, ECC_Point *pt); /** * @ingroup ecc * @brief Convert the point information pt to the affine coordinate system and synchronize the data to r. * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param pt [IN] Input point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt); /** * @ingroup ecc * @brief Converts all point information on pt to affine coordinate system, * which is used for the coordinate system conversion of the pre-computation table. * * @attention pt[0] cannot be an infinite point. * * @param para [IN] Curve parameters * @param pt [IN/OUT] Point information * @param ptNums [IN] Number of pts * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_Points2Affine(const ECC_Para *para, ECC_Point *pt[], uint32_t ptNums); /** * @ingroup ecc * @brief Calculated r = -a * * @attention point a must be a point in the Cartesian coordinate system * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param pt [IN] Input point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_PointInvertAtAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a); /** * @ingroup ecc * @brief Convert the point information pt to the affine coordinate system and refresh the data to r. * The inverse information of z is provided by the user. * * @attention The validity of inv is guaranteed by the user. * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param pt [IN] Input point information * @param inv [IN] inverse information of z * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_Point2AffineWithInv( const ECC_Para *para, ECC_Point *r, const ECC_Point *pt, const BN_BigNum *inv); /** * @ingroup ecc * @brief Calculate r = k1 * G + k2 * pt * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param k1 [IN] Scalar 1 * @param k2 [IN] Scalar 2 * @param pt [IN] Point data * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_PointMulAdd( ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt); /** * @ingroup ecc * @brief Check whether a is consistent with b. * * @param para [IN] Curve parameter information * @param a [IN] Input point information * @param b [IN] Input point information * * @retval CRYPT_SUCCESS The two points are the same. * @retval CRYPT_ECC_POINT_NOT_EQUAL The two points are different. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_PointCmp(const ECC_Para *para, const ECC_Point *a, const ECC_Point *b); /** * @ingroup ecc * @brief Calculate r = k * pt. When pt is NULL, calculate r = k * G * The pre-computation table under para will be updated. * * @param para [IN] Curve parameter information * @param r [OUT] Output point information * @param k [IN] Scalar * @param pt [IN] Point data, which can be set to NULL * * @retval CRYPT_SUCCESS set successfully * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt); /** * @ingroup ecc * @brief Calculate r = k * pt. When pt is NULL, calculate r = k * G * The pre-computation table under para will be updated. * Non-consttime calculation * * @param para [IN] Curve parameter information * @param r [OUT] Output point information * @param k [IN] Scalar * @param pt [IN] Point data, which can be set to NULL * * @retval CRYPT_SUCCESS set successfully * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_PointMulFast(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt); /** * @ingroup ecc * @brief Obtaining a prime number curve (p + 1)/2 * * @param p [IN] Input module * * @retval non-NULL succeeded. * @retval NULL failed */ BN_BigNum *ECP_HalfPGet(const BN_BigNum *p); /** * @ingroup ecc * @brief Search implementation method by curve ID * * @param id [IN] Curve enumeration * * @retval non-NULL succeeded. * @retval NULL failed */ const ECC_Method *ECC_FindMethod(CRYPT_PKEY_ParaId id); /** * @ingroup ecc * @brief nist Calculation of multiplication(double) of points of prime curve: r = a + a * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param a [IN] Input point information * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_NistPointDouble(const ECC_Para *para, ECC_Point *r, const ECC_Point *a); /** * @ingroup ecc * @brief nist Calculation of multi-double of points of prime curve: r = (2^m)*a * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param a [IN] Input point information * @param m [IN] Exponential information of point multiplication scalar * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_NistPointMultDouble(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m); /** * @ingroup ecc * @brief nist Calculation of multiplication(double) of points of prime curve: r = a + b * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param a [IN] Input point information, a can be the jacobi coordinate. * @param b [IN] Input point information, b must be the affine coordinate. * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_NistPointAddAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); /** * @ingroup ecc * @brief nist Calculation of multiplication(double) of points of prime curve: r = a + b * * @param para [IN] Curve parameters * @param r [OUT] Output point information * @param a [IN] Input point information, a can be the jacobi coordinate. * @param b [IN] Input point information, b can be the jacobi coordinate. * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_NistPointAdd(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); /** * @ingroup ecc * @brief Convert the point to the affine coordinate and encode the point information as a data stream. * * @param para [IN] Curve parameter information * @param pt [IN/OUT] Point data * @param data [OUT] data stream * @param dataLen [IN/OUT] The input is the buff length of data and the output is the valid length of data. * @param format [IN] Encoding format * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_EncodePoint(const ECC_Para *para, ECC_Point *pt, uint8_t *data, uint32_t *dataLen, CRYPT_PKEY_PointFormat format); /** * @ingroup ecc * @brief Encode the data stream into point information. * * @param para [IN] Curve parameter information * @param pt [OUT] Point data * @param data [IN] data stream * @param dataLen [IN] data stream length * * @retval CRYPT_SUCCESS succeeded. * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_DecodePoint(const ECC_Para *para, ECC_Point *pt, const uint8_t *data, uint32_t dataLen); /** * @brief Calculate r = 1/a mod para->n * * @param para [IN] Curve parameter information * @param r [OUT] Output modulus inverse value * @param a [IN] BigNum that needs to be inverted. * * @retval CRYPT_SUCCESS set successfully * @retval For details about other errors, see crypt_errno.h */ int32_t ECP_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a); #ifdef HITLS_CRYPTO_CURVE_MONT /** * The nist curve is based on Montgomery's calculation of double points. * r = a + a */ int32_t ECP_NistPointDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a); /** * The nist curve is based on Montgomery's calculation of multi-double points. * r = m * (a + a) */ int32_t ECP_NistPointMultDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m); /** * The nist curve is based on Montgomery's calculation of add points. * r = a + b, b must be an affine point. */ int32_t ECP_NistPointAddAffineMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); /** * The nist curve is based on Montgomery's calculation of add points. * r = a + b */ int32_t ECP_NistPointAddMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); /** * The nist curve is based on Montgomery's calculation of turn an point to an affine point. * r = a -> affine a */ int32_t ECP_Point2AffineMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt); /** * The nist curve is based on Montgomery's calculation of turn an point to an affine point. * r = a -> affine a */ int32_t ECP_PrimePointDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a); /** * The prime curve is based on Montgomery's calculation of multi-double points. * r = m * (a + a) */ int32_t ECP_PrimePointMultDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m); /** * The prime curve is based on Montgomery's calculation of add points. * r = a + b, b must be an affine point. */ int32_t ECP_PrimePointAddAffineMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); /** * The prime curve is based on Montgomery's calculation of add points. * r = a + b */ int32_t ECP_PrimePointAddMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b); /** * The prime curve is based on Montgomery's calculation of k * pt. * The implementation is based on the Montgomery ladder. */ int32_t ECP_PointMulMont(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt); #endif // HITLS_CRYPTO_CURVE_MONT #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_ECC #endif // ECC_LOCAL_H
2401_83913325/openHiTLS-examples_7925
crypto/ecc/src/ecc_local.h
C
unknown
15,618
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include "ecc_local.h" #include "bsl_err_internal.h" #include "ecp_nistp224.h" #include "ecp_nistp256.h" #include "ecp_nistp521.h" #include "ecp_sm2.h" typedef struct { uint32_t id; const ECC_Method *ecMeth; } ECC_MethodMap; #if defined(HITLS_SIXTY_FOUR_BITS) #if (((defined(HITLS_CRYPTO_CURVE_NISTP224) || defined(HITLS_CRYPTO_CURVE_NISTP521)) && \ !defined(HITLS_CRYPTO_NIST_USE_ACCEL)) || \ defined(HITLS_CRYPTO_CURVE_NISTP384) || \ (defined(HITLS_CRYPTO_CURVE_NISTP256) && (!defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) || \ (!defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE))) && (!defined(HITLS_CRYPTO_NIST_USE_ACCEL)))) static const ECC_Method EC_METHOD_NIST = { .pointMulAdd = ECP_PointMulAdd, .pointMul = ECP_PointMul, .pointMulFast = ECP_PointMulFast, .pointAddAffine = ECP_NistPointAddAffine, .pointDouble = ECP_NistPointDouble, .pointMultDouble = ECP_NistPointMultDouble, .modInv = BN_ModInv, .point2AffineWithInv = ECP_Point2AffineWithInv, .point2Affine = ECP_Point2Affine, .bnModNistEccMul = BN_ModNistEccMul, .bnModNistEccSqr = BN_ModNistEccSqr, .modOrdInv = ECP_ModOrderInv, .pointAdd = ECP_NistPointAdd, }; #endif #endif // HITLS_SIXTY_FOUR_BITS #ifdef HITLS_CRYPTO_CURVE_MONT_NIST static const ECC_Method EC_METHOD_NIST_MONT = { .pointMulAdd = ECP_PointMulAdd, .pointMul = ECP_PointMulMont, .pointMulFast = ECP_PointMulFast, .pointDouble = ECP_NistPointDoubleMont, .pointMultDouble = ECP_NistPointMultDoubleMont, .modInv = BN_ModInv, .point2Affine = ECP_Point2AffineMont, .bnModNistEccMul = BN_EcPrimeMontMul, .bnModNistEccSqr = BN_EcPrimeMontSqr, .modOrdInv = ECP_ModOrderInv, .pointAdd = ECP_NistPointAddMont, .pointAddAffine = ECP_NistPointAddAffineMont, .bnMontEnc = BnMontEnc, .bnMontDec = BnMontDec, }; #endif // HITLS_CRYPTO_CURVE_MONT_NIST #ifdef HITLS_CRYPTO_CURVE_SM2_ASM // method implementation of SM2 static const ECC_Method EC_METHOD_SM2_ASM = { .pointMulAdd = ECP_Sm2PointMulAdd, .pointMul = ECP_Sm2PointMul, .pointMulFast = ECP_Sm2PointMulFast, .pointAddAffine = ECP_Sm2PointAddAffine, .pointDouble = ECP_Sm2PointDouble, .pointMultDouble = ECP_NistPointMultDouble, .modInv = BN_ModInv, .point2AffineWithInv = ECP_Point2AffineWithInv, .point2Affine = ECP_Sm2Point2Affine, .bnModNistEccMul = BN_ModSm2EccMul, .bnModNistEccSqr = BN_ModSm2EccSqr, .modOrdInv = ECP_Sm2OrderInv, .pointAdd = ECP_NistPointAdd, }; #endif #if defined(HITLS_CRYPTO_CURVE_SM2) && !defined(HITLS_CRYPTO_CURVE_SM2_ASM) && defined(HITLS_SIXTY_FOUR_BITS) static const ECC_Method EC_METHOD_SM2_NIST = { .pointMulAdd = ECP_PointMulAdd, .pointMul = ECP_PointMul, .pointMulFast = ECP_PointMulFast, .pointAddAffine = ECP_NistPointAddAffine, .pointDouble = ECP_NistPointDouble, .pointMultDouble = ECP_NistPointMultDouble, .modInv = BN_ModInv, .point2AffineWithInv = ECP_Point2AffineWithInv, .point2Affine = ECP_Point2Affine, .bnModNistEccMul = BN_ModSm2EccMul, .bnModNistEccSqr = BN_ModSm2EccSqr, .modOrdInv = ECP_ModOrderInv, .pointAdd = ECP_NistPointAdd, }; #endif #if defined(HITLS_CRYPTO_CURVE_BP256R1) || defined(HITLS_CRYPTO_CURVE_BP384R1) || \ defined(HITLS_CRYPTO_CURVE_BP512R1) // Montgomery Ladder Optimization for General Curves in Prime Domain static const ECC_Method EC_METHOD_PRIME_MONT = { .pointMulAdd = ECP_PointMulAdd, .pointMul = ECP_PointMulMont, .pointDouble = ECP_PrimePointDoubleMont, .pointMulFast = ECP_PointMulFast, .pointMultDouble = ECP_PrimePointMultDoubleMont, .modInv = BN_ModInv, .point2Affine = ECP_Point2AffineMont, .bnModNistEccMul = BN_EcPrimeMontMul, .bnModNistEccSqr = BN_EcPrimeMontSqr, .modOrdInv = ECP_ModOrderInv, .pointAdd = ECP_PrimePointAddMont, .pointAddAffine = ECP_PrimePointAddAffineMont, .bnMontEnc = BnMontEnc, .bnMontDec = BnMontDec, }; #endif #ifdef HITLS_CRYPTO_NIST_USE_ACCEL #ifdef HITLS_CRYPTO_CURVE_NISTP224 static const ECC_Method EC_METHOD_NIST_P224 = { .pointMulAdd = ECP224_PointMulAdd, .pointMul = ECP224_PointMul, .pointMulFast = ECP224_PointMul, .pointAddAffine = ECP_NistPointAddAffine, .pointDouble = ECP_NistPointDouble, .pointMultDouble = ECP_NistPointMultDouble, .modInv = BN_ModInv, .point2AffineWithInv = ECP_Point2AffineWithInv, .point2Affine = ECP224_Point2Affine, .bnModNistEccMul = BN_ModNistEccMul, .bnModNistEccSqr = BN_ModNistEccSqr, .modOrdInv = ECP_ModOrderInv, .pointAdd = ECP_NistPointAdd, }; #endif #ifdef HITLS_CRYPTO_CURVE_NISTP521 static const ECC_Method EC_METHOD_NIST_P521 = { .pointMulAdd = ECP521_PointMulAdd, .pointMul = ECP521_PointMul, .pointMulFast = ECP521_PointMul, .pointAddAffine = ECP_NistPointAddAffine, .pointDouble = ECP_NistPointDouble, .pointMultDouble = ECP_NistPointMultDouble, .modInv = BN_ModInv, .point2AffineWithInv = ECP_Point2AffineWithInv, .point2Affine = ECP521_Point2Affine, .bnModNistEccMul = BN_ModNistEccMul, .bnModNistEccSqr = BN_ModNistEccSqr, .modOrdInv = ECP_ModOrderInv, .pointAdd = ECP_NistPointAdd, }; #endif #endif // HITLS_CRYPTO_NIST_USE_ACCEL #ifdef HITLS_CRYPTO_CURVE_NISTP256 #if ((defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE)) || \ (!defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_USE_ACCEL))) static const ECC_Method EC_METHOD_NIST_P256 = { .pointMulAdd = ECP256_PointMulAdd, .pointMul = ECP256_PointMul, .pointMulFast = ECP256_PointMul, .pointAddAffine = ECP_NistPointAddAffine, .pointDouble = ECP_NistPointDouble, .pointMultDouble = ECP_NistPointMultDouble, .modInv = BN_ModInv, .point2AffineWithInv = ECP_Point2AffineWithInv, .point2Affine = ECP256_Point2Affine, .bnModNistEccMul = BN_ModNistEccMul, .bnModNistEccSqr = BN_ModNistEccSqr, .modOrdInv = ECP256_ModOrderInv, .pointAdd = ECP_NistPointAdd, }; #endif #endif static const ECC_MethodMap EC_METHODS[] = { // p224 #ifdef HITLS_CRYPTO_CURVE_NISTP224 #ifdef HITLS_CRYPTO_NIST_USE_ACCEL { CRYPT_ECC_NISTP224, &EC_METHOD_NIST_P224 }, // Depends on uint128. #elif defined(HITLS_SIXTY_FOUR_BITS) { CRYPT_ECC_NISTP224, &EC_METHOD_NIST }, // Common nist cal + fast modulus reduction of Bn #else { CRYPT_ECC_NISTP224, &EC_METHOD_NIST_MONT }, #endif #endif // p256 #ifdef HITLS_CRYPTO_CURVE_NISTP256 #if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE) { CRYPT_ECC_NISTP256, &EC_METHOD_NIST_P256 }, // The ECC assembly optimization does not depend on uint128. #elif (!defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_USE_ACCEL)) { CRYPT_ECC_NISTP256, &EC_METHOD_NIST_P256 }, // Non-assembled ECC optimization based on uint128 #elif defined(HITLS_SIXTY_FOUR_BITS) { CRYPT_ECC_NISTP256, &EC_METHOD_NIST }, // Common nist calculation + fast modulus reduction of Bn #else { CRYPT_ECC_NISTP256, &EC_METHOD_NIST_MONT }, #endif #endif // p384 #ifdef HITLS_CRYPTO_CURVE_NISTP384 #if defined(HITLS_SIXTY_FOUR_BITS) { CRYPT_ECC_NISTP384, &EC_METHOD_NIST }, // Common nist calculation + fast modulus reduction of Bn #else { CRYPT_ECC_NISTP384, &EC_METHOD_NIST_MONT }, #endif #endif // p521 #ifdef HITLS_CRYPTO_CURVE_NISTP521 #ifdef HITLS_CRYPTO_NIST_USE_ACCEL { CRYPT_ECC_NISTP521, &EC_METHOD_NIST_P521 }, // Non-assembly optimization, depending on uint128 #elif defined(HITLS_SIXTY_FOUR_BITS) { CRYPT_ECC_NISTP521, &EC_METHOD_NIST }, // nist calculation + fast modulus reduction of Bn #else { CRYPT_ECC_NISTP521, &EC_METHOD_NIST_MONT }, #endif #endif // bp256 #ifdef HITLS_CRYPTO_CURVE_BP256R1 { CRYPT_ECC_BRAINPOOLP256R1, &EC_METHOD_PRIME_MONT }, #endif // bp384 #ifdef HITLS_CRYPTO_CURVE_BP384R1 { CRYPT_ECC_BRAINPOOLP384R1, &EC_METHOD_PRIME_MONT }, #endif // bp512 #ifdef HITLS_CRYPTO_CURVE_BP512R1 { CRYPT_ECC_BRAINPOOLP512R1, &EC_METHOD_PRIME_MONT }, #endif #ifdef HITLS_CRYPTO_CURVE_SM2 #ifdef HITLS_CRYPTO_CURVE_SM2_ASM { CRYPT_ECC_SM2, &EC_METHOD_SM2_ASM }, #elif defined(HITLS_SIXTY_FOUR_BITS) { CRYPT_ECC_SM2, &EC_METHOD_SM2_NIST }, #else { CRYPT_ECC_SM2, &EC_METHOD_NIST_MONT }, #endif #endif }; const ECC_Method *ECC_FindMethod(CRYPT_PKEY_ParaId id) { for (uint32_t i = 0; i < sizeof(EC_METHODS) / sizeof(EC_METHODS[0]); i++) { if (EC_METHODS[i].id == id) { return EC_METHODS[i].ecMeth; } } return NULL; } #endif /* HITLS_CRYPTO_ECC */
2401_83913325/openHiTLS-examples_7925
crypto/ecc/src/ecc_method.c
C
unknown
9,358
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include "securec.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_utils.h" #include "crypt_errno.h" #include "ecc_local.h" #include "crypt_types.h" #include "crypt_params_key.h" #include "crypt_ecc_pkey.h" typedef struct { const uint8_t *data; uint32_t dataLen; } ECC_ReadData; typedef struct { ECC_ReadData p; ECC_ReadData a; ECC_ReadData b; ECC_ReadData n; ECC_ReadData h; ECC_ReadData x; ECC_ReadData y; } CURVE_Para; #if defined(HITLS_CRYPTO_CURVE_NISTP224) || defined(HITLS_CRYPTO_CURVE_NISTP256) || \ defined(HITLS_CRYPTO_CURVE_NISTP384) || defined(HITLS_CRYPTO_CURVE_NISTP521) || \ defined(HITLS_CRYPTO_CURVE_SM2) static const uint8_t NIST_P_H[] = { 0x01 }; #endif #ifdef HITLS_CRYPTO_CURVE_NISTP224 static const uint8_t NIST_P224_P[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 }; static const uint8_t NIST_P224_A[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe }; static const uint8_t NIST_P224_B[] = { 0xb4, 0x05, 0x0a, 0x85, 0x0c, 0x04, 0xb3, 0xab, 0xf5, 0x41, 0x32, 0x56, 0x50, 0x44, 0xb0, 0xb7, 0xd7, 0xbf, 0xd8, 0xba, 0x27, 0x0b, 0x39, 0x43, 0x23, 0x55, 0xff, 0xb4 }; static const uint8_t NIST_P224_X[] = { 0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3, 0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21 }; static const uint8_t NIST_P224_Y[] = { 0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34 }; static const uint8_t NIST_P224_N[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2, 0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d }; #endif #ifdef HITLS_CRYPTO_CURVE_NISTP256 static const uint8_t NIST_P256_P[] = { 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; static const uint8_t NIST_P256_A[] = { 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc }; static const uint8_t NIST_P256_B[] = { 0x5a, 0xc6, 0x35, 0xd8, 0xaa, 0x3a, 0x93, 0xe7, 0xb3, 0xeb, 0xbd, 0x55, 0x76, 0x98, 0x86, 0xbc, 0x65, 0x1d, 0x06, 0xb0, 0xcc, 0x53, 0xb0, 0xf6, 0x3b, 0xce, 0x3c, 0x3e, 0x27, 0xd2, 0x60, 0x4b }; static const uint8_t NIST_P256_X[] = { 0x6b, 0x17, 0xd1, 0xf2, 0xe1, 0x2c, 0x42, 0x47, 0xf8, 0xbc, 0xe6, 0xe5, 0x63, 0xa4, 0x40, 0xf2, 0x77, 0x03, 0x7d, 0x81, 0x2d, 0xeb, 0x33, 0xa0, 0xf4, 0xa1, 0x39, 0x45, 0xd8, 0x98, 0xc2, 0x96 }; static const uint8_t NIST_P256_Y[] = { 0x4f, 0xe3, 0x42, 0xe2, 0xfe, 0x1a, 0x7f, 0x9b, 0x8e, 0xe7, 0xeb, 0x4a, 0x7c, 0x0f, 0x9e, 0x16, 0x2b, 0xce, 0x33, 0x57, 0x6b, 0x31, 0x5e, 0xce, 0xcb, 0xb6, 0x40, 0x68, 0x37, 0xbf, 0x51, 0xf5 }; static const uint8_t NIST_P256_N[] = { 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xbc, 0xe6, 0xfa, 0xad, 0xa7, 0x17, 0x9e, 0x84, 0xf3, 0xb9, 0xca, 0xc2, 0xfc, 0x63, 0x25, 0x51 }; #endif #ifdef HITLS_CRYPTO_CURVE_NISTP384 static const uint8_t NIST_P384_P[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff }; static const uint8_t NIST_P384_A[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xfc }; static const uint8_t NIST_P384_B[] = { 0xb3, 0x31, 0x2f, 0xa7, 0xe2, 0x3e, 0xe7, 0xe4, 0x98, 0x8e, 0x05, 0x6b, 0xe3, 0xf8, 0x2d, 0x19, 0x18, 0x1d, 0x9c, 0x6e, 0xfe, 0x81, 0x41, 0x12, 0x03, 0x14, 0x08, 0x8f, 0x50, 0x13, 0x87, 0x5a, 0xc6, 0x56, 0x39, 0x8d, 0x8a, 0x2e, 0xd1, 0x9d, 0x2a, 0x85, 0xc8, 0xed, 0xd3, 0xec, 0x2a, 0xef }; static const uint8_t NIST_P384_X[] = { 0xaa, 0x87, 0xca, 0x22, 0xbe, 0x8b, 0x05, 0x37, 0x8e, 0xb1, 0xc7, 0x1e, 0xf3, 0x20, 0xad, 0x74, 0x6e, 0x1d, 0x3b, 0x62, 0x8b, 0xa7, 0x9b, 0x98, 0x59, 0xf7, 0x41, 0xe0, 0x82, 0x54, 0x2a, 0x38, 0x55, 0x02, 0xf2, 0x5d, 0xbf, 0x55, 0x29, 0x6c, 0x3a, 0x54, 0x5e, 0x38, 0x72, 0x76, 0x0a, 0xb7 }; static const uint8_t NIST_P384_Y[] = { 0x36, 0x17, 0xde, 0x4a, 0x96, 0x26, 0x2c, 0x6f, 0x5d, 0x9e, 0x98, 0xbf, 0x92, 0x92, 0xdc, 0x29, 0xf8, 0xf4, 0x1d, 0xbd, 0x28, 0x9a, 0x14, 0x7c, 0xe9, 0xda, 0x31, 0x13, 0xb5, 0xf0, 0xb8, 0xc0, 0x0a, 0x60, 0xb1, 0xce, 0x1d, 0x7e, 0x81, 0x9d, 0x7a, 0x43, 0x1d, 0x7c, 0x90, 0xea, 0x0e, 0x5f }; static const uint8_t NIST_P384_N[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc7, 0x63, 0x4d, 0x81, 0xf4, 0x37, 0x2d, 0xdf, 0x58, 0x1a, 0x0d, 0xb2, 0x48, 0xb0, 0xa7, 0x7a, 0xec, 0xec, 0x19, 0x6a, 0xcc, 0xc5, 0x29, 0x73 }; #endif #ifdef HITLS_CRYPTO_CURVE_NISTP521 static const uint8_t NIST_P521_P[] = { 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; static const uint8_t NIST_P521_A[] = { 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc }; static const uint8_t NIST_P521_B[] = { 0x00, 0x51, 0x95, 0x3e, 0xb9, 0x61, 0x8e, 0x1c, 0x9a, 0x1f, 0x92, 0x9a, 0x21, 0xa0, 0xb6, 0x85, 0x40, 0xee, 0xa2, 0xda, 0x72, 0x5b, 0x99, 0xb3, 0x15, 0xf3, 0xb8, 0xb4, 0x89, 0x91, 0x8e, 0xf1, 0x09, 0xe1, 0x56, 0x19, 0x39, 0x51, 0xec, 0x7e, 0x93, 0x7b, 0x16, 0x52, 0xc0, 0xbd, 0x3b, 0xb1, 0xbf, 0x07, 0x35, 0x73, 0xdf, 0x88, 0x3d, 0x2c, 0x34, 0xf1, 0xef, 0x45, 0x1f, 0xd4, 0x6b, 0x50, 0x3f, 0x00 }; static const uint8_t NIST_P521_X[] = { 0x00, 0xc6, 0x85, 0x8e, 0x06, 0xb7, 0x04, 0x04, 0xe9, 0xcd, 0x9e, 0x3e, 0xcb, 0x66, 0x23, 0x95, 0xb4, 0x42, 0x9c, 0x64, 0x81, 0x39, 0x05, 0x3f, 0xb5, 0x21, 0xf8, 0x28, 0xaf, 0x60, 0x6b, 0x4d, 0x3d, 0xba, 0xa1, 0x4b, 0x5e, 0x77, 0xef, 0xe7, 0x59, 0x28, 0xfe, 0x1d, 0xc1, 0x27, 0xa2, 0xff, 0xa8, 0xde, 0x33, 0x48, 0xb3, 0xc1, 0x85, 0x6a, 0x42, 0x9b, 0xf9, 0x7e, 0x7e, 0x31, 0xc2, 0xe5, 0xbd, 0x66 }; static const uint8_t NIST_P521_Y[] = { 0x01, 0x18, 0x39, 0x29, 0x6a, 0x78, 0x9a, 0x3b, 0xc0, 0x04, 0x5c, 0x8a, 0x5f, 0xb4, 0x2c, 0x7d, 0x1b, 0xd9, 0x98, 0xf5, 0x44, 0x49, 0x57, 0x9b, 0x44, 0x68, 0x17, 0xaf, 0xbd, 0x17, 0x27, 0x3e, 0x66, 0x2c, 0x97, 0xee, 0x72, 0x99, 0x5e, 0xf4, 0x26, 0x40, 0xc5, 0x50, 0xb9, 0x01, 0x3f, 0xad, 0x07, 0x61, 0x35, 0x3c, 0x70, 0x86, 0xa2, 0x72, 0xc2, 0x40, 0x88, 0xbe, 0x94, 0x76, 0x9f, 0xd1, 0x66, 0x50 }; static const uint8_t NIST_P521_N[] = { 0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfa, 0x51, 0x86, 0x87, 0x83, 0xbf, 0x2f, 0x96, 0x6b, 0x7f, 0xcc, 0x01, 0x48, 0xf7, 0x09, 0xa5, 0xd0, 0x3b, 0xb5, 0xc9, 0xb8, 0x89, 0x9c, 0x47, 0xae, 0xbb, 0x6f, 0xb7, 0x1e, 0x91, 0x38, 0x64, 0x09 }; #endif #if defined(HITLS_CRYPTO_CURVE_BP256R1) || defined(HITLS_CRYPTO_CURVE_BP384R1) || defined(HITLS_CRYPTO_CURVE_BP512R1) static const uint8_t BRAINPOOL_P_H[] = { 0x01 }; #endif #ifdef HITLS_CRYPTO_CURVE_BP256R1 static const uint8_t BRAINPOOL_P256R1_P[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72, 0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77 }; static const uint8_t BRAINPOOL_P256R1_A[] = { 0x7d, 0x5a, 0x09, 0x75, 0xfc, 0x2c, 0x30, 0x57, 0xee, 0xf6, 0x75, 0x30, 0x41, 0x7a, 0xff, 0xe7, 0xfb, 0x80, 0x55, 0xc1, 0x26, 0xdc, 0x5c, 0x6c, 0xe9, 0x4a, 0x4b, 0x44, 0xf3, 0x30, 0xb5, 0xd9 }; static const uint8_t BRAINPOOL_P256R1_B[] = { 0x26, 0xdc, 0x5c, 0x6c, 0xe9, 0x4a, 0x4b, 0x44, 0xf3, 0x30, 0xb5, 0xd9, 0xbb, 0xd7, 0x7c, 0xbf, 0x95, 0x84, 0x16, 0x29, 0x5c, 0xf7, 0xe1, 0xce, 0x6b, 0xcc, 0xdc, 0x18, 0xff, 0x8c, 0x07, 0xb6 }; static const uint8_t BRAINPOOL_P256R1_X[] = { 0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf, 0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62 }; static const uint8_t BRAINPOOL_P256R1_Y[] = { 0x54, 0x7e, 0xf8, 0x35, 0xc3, 0xda, 0xc4, 0xfd, 0x97, 0xf8, 0x46, 0x1a, 0x14, 0x61, 0x1d, 0xc9, 0xc2, 0x77, 0x45, 0x13, 0x2d, 0xed, 0x8e, 0x54, 0x5c, 0x1d, 0x54, 0xc7, 0x2f, 0x04, 0x69, 0x97 }; static const uint8_t BRAINPOOL_P256R1_N[] = { 0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71, 0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7 }; #endif #ifdef HITLS_CRYPTO_CURVE_BP384R1 static const uint8_t BRAINPOOL_P384R1_P[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23, 0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53 }; static const uint8_t BRAINPOOL_P384R1_A[] = { 0x7b, 0xc3, 0x82, 0xc6, 0x3d, 0x8c, 0x15, 0x0c, 0x3c, 0x72, 0x08, 0x0a, 0xce, 0x05, 0xaf, 0xa0, 0xc2, 0xbe, 0xa2, 0x8e, 0x4f, 0xb2, 0x27, 0x87, 0x13, 0x91, 0x65, 0xef, 0xba, 0x91, 0xf9, 0x0f, 0x8a, 0xa5, 0x81, 0x4a, 0x50, 0x3a, 0xd4, 0xeb, 0x04, 0xa8, 0xc7, 0xdd, 0x22, 0xce, 0x28, 0x26 }; static const uint8_t BRAINPOOL_P384R1_B[] = { 0x04, 0xa8, 0xc7, 0xdd, 0x22, 0xce, 0x28, 0x26, 0x8b, 0x39, 0xb5, 0x54, 0x16, 0xf0, 0x44, 0x7c, 0x2f, 0xb7, 0x7d, 0xe1, 0x07, 0xdc, 0xd2, 0xa6, 0x2e, 0x88, 0x0e, 0xa5, 0x3e, 0xeb, 0x62, 0xd5, 0x7c, 0xb4, 0x39, 0x02, 0x95, 0xdb, 0xc9, 0x94, 0x3a, 0xb7, 0x86, 0x96, 0xfa, 0x50, 0x4c, 0x11 }; static const uint8_t BRAINPOOL_P384R1_X[] = { 0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b, 0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8, 0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e }; static const uint8_t BRAINPOOL_P384R1_Y[] = { 0x8a, 0xbe, 0x1d, 0x75, 0x20, 0xf9, 0xc2, 0xa4, 0x5c, 0xb1, 0xeb, 0x8e, 0x95, 0xcf, 0xd5, 0x52, 0x62, 0xb7, 0x0b, 0x29, 0xfe, 0xec, 0x58, 0x64, 0xe1, 0x9c, 0x05, 0x4f, 0xf9, 0x91, 0x29, 0x28, 0x0e, 0x46, 0x46, 0x21, 0x77, 0x91, 0x81, 0x11, 0x42, 0x82, 0x03, 0x41, 0x26, 0x3c, 0x53, 0x15 }; static const uint8_t BRAINPOOL_P384R1_N[] = { 0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf, 0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7, 0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65 }; #endif #ifdef HITLS_CRYPTO_CURVE_BP512R1 static const uint8_t BRAINPOOL_P512R1_P[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71, 0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6, 0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3 }; static const uint8_t BRAINPOOL_P512R1_A[] = { 0x78, 0x30, 0xa3, 0x31, 0x8b, 0x60, 0x3b, 0x89, 0xe2, 0x32, 0x71, 0x45, 0xac, 0x23, 0x4c, 0xc5, 0x94, 0xcb, 0xdd, 0x8d, 0x3d, 0xf9, 0x16, 0x10, 0xa8, 0x34, 0x41, 0xca, 0xea, 0x98, 0x63, 0xbc, 0x2d, 0xed, 0x5d, 0x5a, 0xa8, 0x25, 0x3a, 0xa1, 0x0a, 0x2e, 0xf1, 0xc9, 0x8b, 0x9a, 0xc8, 0xb5, 0x7f, 0x11, 0x17, 0xa7, 0x2b, 0xf2, 0xc7, 0xb9, 0xe7, 0xc1, 0xac, 0x4d, 0x77, 0xfc, 0x94, 0xca }; static const uint8_t BRAINPOOL_P512R1_B[] = { 0x3d, 0xf9, 0x16, 0x10, 0xa8, 0x34, 0x41, 0xca, 0xea, 0x98, 0x63, 0xbc, 0x2d, 0xed, 0x5d, 0x5a, 0xa8, 0x25, 0x3a, 0xa1, 0x0a, 0x2e, 0xf1, 0xc9, 0x8b, 0x9a, 0xc8, 0xb5, 0x7f, 0x11, 0x17, 0xa7, 0x2b, 0xf2, 0xc7, 0xb9, 0xe7, 0xc1, 0xac, 0x4d, 0x77, 0xfc, 0x94, 0xca, 0xdc, 0x08, 0x3e, 0x67, 0x98, 0x40, 0x50, 0xb7, 0x5e, 0xba, 0xe5, 0xdd, 0x28, 0x09, 0xbd, 0x63, 0x80, 0x16, 0xf7, 0x23 }; static const uint8_t BRAINPOOL_P512R1_X[] = { 0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93, 0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e, 0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f, 0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22 }; static const uint8_t BRAINPOOL_P512R1_Y[] = { 0x7d, 0xde, 0x38, 0x5d, 0x56, 0x63, 0x32, 0xec, 0xc0, 0xea, 0xbf, 0xa9, 0xcf, 0x78, 0x22, 0xfd, 0xf2, 0x09, 0xf7, 0x00, 0x24, 0xa5, 0x7b, 0x1a, 0xa0, 0x00, 0xc5, 0x5b, 0x88, 0x1f, 0x81, 0x11, 0xb2, 0xdc, 0xde, 0x49, 0x4a, 0x5f, 0x48, 0x5e, 0x5b, 0xca, 0x4b, 0xd8, 0x8a, 0x27, 0x63, 0xae, 0xd1, 0xca, 0x2b, 0x2f, 0xa8, 0xf0, 0x54, 0x06, 0x78, 0xcd, 0x1e, 0x0f, 0x3a, 0xd8, 0x08, 0x92 }; static const uint8_t BRAINPOOL_P512R1_N[] = { 0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07, 0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70, 0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47, 0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69 }; #endif #ifdef HITLS_CRYPTO_CURVE_SM2 static const uint8_t NIST_SM2_P[] = { 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; static const uint8_t NIST_SM2_A[] = { 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc }; static const uint8_t NIST_SM2_B[] = { 0x28, 0xe9, 0xfa, 0x9e, 0x9d, 0x9f, 0x5e, 0x34, 0x4d, 0x5a, 0x9e, 0x4b, 0xcf, 0x65, 0x09, 0xa7, 0xf3, 0x97, 0x89, 0xf5, 0x15, 0xab, 0x8f, 0x92, 0xdd, 0xbc, 0xbd, 0x41, 0x4d, 0x94, 0x0e, 0x93 }; static const uint8_t NIST_SM2_X[] = { 0x32, 0xc4, 0xae, 0x2c, 0x1f, 0x19, 0x81, 0x19, 0x5f, 0x99, 0x04, 0x46, 0x6a, 0x39, 0xc9, 0x94, 0x8f, 0xe3, 0x0b, 0xbf, 0xf2, 0x66, 0x0b, 0xe1, 0x71, 0x5a, 0x45, 0x89, 0x33, 0x4c, 0x74, 0xc7 }; static const uint8_t NIST_SM2_Y[] = { 0xbc, 0x37, 0x36, 0xa2, 0xf4, 0xf6, 0x77, 0x9c, 0x59, 0xbd, 0xce, 0xe3, 0x6b, 0x69, 0x21, 0x53, 0xd0, 0xa9, 0x87, 0x7c, 0xc6, 0x2a, 0x47, 0x40, 0x02, 0xdf, 0x32, 0xe5, 0x21, 0x39, 0xf0, 0xa0 }; static const uint8_t NIST_SM2_N[] = { 0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x72, 0x03, 0xdf, 0x6b, 0x21, 0xc6, 0x05, 0x2b, 0x53, 0xbb, 0xf4, 0x09, 0x39, 0xd5, 0x41, 0x23 }; #endif #if defined(HITLS_CRYPTO_CURVE_NISTP224) || defined(HITLS_CRYPTO_CURVE_NISTP256) || \ defined(HITLS_CRYPTO_CURVE_NISTP384) || defined(HITLS_CRYPTO_CURVE_NISTP521) || \ defined(HITLS_CRYPTO_CURVE_SM2) #define CRYPT_CURVE_PARA_DECLARE(name) \ static const CURVE_Para paraNist##name = { \ .p.data = NIST_##name##_P, \ .p.dataLen = sizeof(NIST_##name##_P), \ .a.data = NIST_##name##_A, \ .a.dataLen = sizeof(NIST_##name##_A), \ .b.data = NIST_##name##_B, \ .b.dataLen = sizeof(NIST_##name##_B), \ .n.data = NIST_##name##_N, \ .n.dataLen = sizeof(NIST_##name##_N), \ .h.data = NIST_P_H, \ .h.dataLen = sizeof(NIST_P_H), \ .x.data = NIST_##name##_X, \ .x.dataLen = sizeof(NIST_##name##_X), \ .y.data = NIST_##name##_Y, \ .y.dataLen = sizeof(NIST_##name##_Y) \ } #endif #if defined(HITLS_CRYPTO_CURVE_BP256R1) || defined(HITLS_CRYPTO_CURVE_BP384R1) || defined(HITLS_CRYPTO_CURVE_BP512R1) #define CRYPT_CURVE_BRAINPOOL_PARA_DECLARE(name) \ static const CURVE_Para paraBrainpool##name = { \ .p.data = BRAINPOOL_##name##_P, \ .p.dataLen = sizeof(BRAINPOOL_##name##_P), \ .a.data = BRAINPOOL_##name##_A, \ .a.dataLen = sizeof(BRAINPOOL_##name##_A), \ .b.data = BRAINPOOL_##name##_B, \ .b.dataLen = sizeof(BRAINPOOL_##name##_B), \ .n.data = BRAINPOOL_##name##_N, \ .n.dataLen = sizeof(BRAINPOOL_##name##_N), \ .h.data = BRAINPOOL_P_H, \ .h.dataLen = sizeof(BRAINPOOL_P_H), \ .x.data = BRAINPOOL_##name##_X, \ .x.dataLen = sizeof(BRAINPOOL_##name##_X), \ .y.data = BRAINPOOL_##name##_Y, \ .y.dataLen = sizeof(BRAINPOOL_##name##_Y) \ } #endif #ifdef HITLS_CRYPTO_CURVE_NISTP224 CRYPT_CURVE_PARA_DECLARE(P224); #endif #ifdef HITLS_CRYPTO_CURVE_NISTP256 CRYPT_CURVE_PARA_DECLARE(P256); #endif #ifdef HITLS_CRYPTO_CURVE_NISTP384 CRYPT_CURVE_PARA_DECLARE(P384); #endif #ifdef HITLS_CRYPTO_CURVE_NISTP521 CRYPT_CURVE_PARA_DECLARE(P521); #endif #ifdef HITLS_CRYPTO_CURVE_BP256R1 CRYPT_CURVE_BRAINPOOL_PARA_DECLARE(P256R1); #endif #ifdef HITLS_CRYPTO_CURVE_BP384R1 CRYPT_CURVE_BRAINPOOL_PARA_DECLARE(P384R1); #endif #ifdef HITLS_CRYPTO_CURVE_BP512R1 CRYPT_CURVE_BRAINPOOL_PARA_DECLARE(P512R1); #endif #ifdef HITLS_CRYPTO_CURVE_SM2 CRYPT_CURVE_PARA_DECLARE(SM2); #endif typedef struct { uint32_t id; const CURVE_Para *curvePara; } CURVE_ParaMap; static const CURVE_ParaMap CURVE_PARAS[] = { #ifdef HITLS_CRYPTO_CURVE_NISTP224 { CRYPT_ECC_NISTP224, &paraNistP224 }, #endif #ifdef HITLS_CRYPTO_CURVE_NISTP256 { CRYPT_ECC_NISTP256, &paraNistP256 }, #endif #ifdef HITLS_CRYPTO_CURVE_NISTP384 { CRYPT_ECC_NISTP384, &paraNistP384 }, #endif #ifdef HITLS_CRYPTO_CURVE_NISTP521 { CRYPT_ECC_NISTP521, &paraNistP521 }, #endif #ifdef HITLS_CRYPTO_CURVE_BP256R1 { CRYPT_ECC_BRAINPOOLP256R1, &paraBrainpoolP256R1 }, #endif #ifdef HITLS_CRYPTO_CURVE_BP384R1 { CRYPT_ECC_BRAINPOOLP384R1, &paraBrainpoolP384R1 }, #endif #ifdef HITLS_CRYPTO_CURVE_BP512R1 { CRYPT_ECC_BRAINPOOLP512R1, &paraBrainpoolP512R1 }, #endif #ifdef HITLS_CRYPTO_CURVE_SM2 { CRYPT_ECC_SM2, &paraNistSM2 }, #endif }; static const CURVE_Para *GetCurvePara(CRYPT_PKEY_ParaId id) { for (uint32_t i = 0; i < sizeof(CURVE_PARAS) / sizeof(CURVE_PARAS[0]); i++) { if (CURVE_PARAS[i].id == id) { return CURVE_PARAS[i].curvePara; } } BSL_ERR_PUSH_ERROR(CRYPT_ECDH_ERR_UNSUPPORT_CURVE_TYPE); return NULL; } static int32_t InitMontPara(ECC_Para *para) { if (para->method->bnMontEnc == NULL) { return CRYPT_SUCCESS; } BN_Optimizer *opt = BN_OptimizerCreate(); para->montP = BN_MontCreate(para->p); if (para->montP == NULL || opt == NULL) { BN_OptimizerDestroy(opt); // The montP is freed by the caller. return CRYPT_MEM_ALLOC_FAIL; } int32_t ret; GOTO_ERR_IF(para->method->bnMontEnc(para->a, para->montP, opt, false), ret); GOTO_ERR_IF(para->method->bnMontEnc(para->b, para->montP, opt, false), ret); ERR: BN_OptimizerDestroy(opt); return ret; } ECC_Para *ECC_NewPara(CRYPT_PKEY_ParaId id) { const CURVE_Para *curve = GetCurvePara(id); if (curve == NULL) { return NULL; } const ECC_Method *method = ECC_FindMethod(id); if (method == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT); return NULL; } ECC_Para *para = BSL_SAL_Malloc(sizeof(ECC_Para)); if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } (void)memset_s(para, sizeof(ECC_Para), 0, sizeof(ECC_Para)); para->method = method; uint32_t bits = curve->p.dataLen * 8; // bits = bytes * 8 para->id = id; para->p = BN_Create(bits); para->a = BN_Create(bits); para->b = BN_Create(bits); para->n = BN_Create(bits); para->h = BN_Create(1); // The cofactor is usually 1. para->x = BN_Create(bits); para->y = BN_Create(bits); if (para->p == NULL || para->a == NULL || para->b == NULL || para->n == NULL || para->h == NULL || para->x == NULL || para->y == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto ERR; } int32_t ret; GOTO_ERR_IF(BN_Bin2Bn(para->p, curve->p.data, curve->p.dataLen), ret); GOTO_ERR_IF(BN_Bin2Bn(para->a, curve->a.data, curve->a.dataLen), ret); GOTO_ERR_IF(BN_Bin2Bn(para->b, curve->b.data, curve->b.dataLen), ret); GOTO_ERR_IF(BN_Bin2Bn(para->n, curve->n.data, curve->n.dataLen), ret); GOTO_ERR_IF(BN_Bin2Bn(para->h, curve->h.data, curve->h.dataLen), ret); GOTO_ERR_IF(BN_Bin2Bn(para->x, curve->x.data, curve->x.dataLen), ret); GOTO_ERR_IF(BN_Bin2Bn(para->y, curve->y.data, curve->y.dataLen), ret); GOTO_ERR_IF(InitMontPara(para), ret); return para; ERR: ECC_FreePara(para); return NULL; } CRYPT_PKEY_ParaId GetCurveId(const CRYPT_EccPara *eccPara) { if (eccPara == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_PKEY_PARAID_MAX; } int32_t ret; BN_BigNum *a = BN_Create(ECC_MAX_BIT_LEN); BN_BigNum *b = BN_Create(ECC_MAX_BIT_LEN); for (uint32_t i = 0; i < sizeof(CURVE_PARAS) / sizeof(CURVE_ParaMap); i++) { const CURVE_Para *curve = GetCurvePara(CURVE_PARAS[i].id); if (curve == NULL) { continue; } GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->p, eccPara->pLen), ret); GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->p.data, curve->p.dataLen), ret); if (BN_Cmp(a, b) != 0) { continue; } GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->a, eccPara->aLen), ret); GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->a.data, curve->a.dataLen), ret); BREAK_IF(BN_Cmp(a, b) != 0); GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->b, eccPara->bLen), ret); GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->b.data, curve->b.dataLen), ret); BREAK_IF(BN_Cmp(a, b) != 0); GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->h, eccPara->hLen), ret); GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->h.data, curve->h.dataLen), ret); BREAK_IF(BN_Cmp(a, b) != 0); GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->n, eccPara->nLen), ret); GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->n.data, curve->n.dataLen), ret); BREAK_IF(BN_Cmp(a, b) != 0); GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->x, eccPara->xLen), ret); GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->x.data, curve->x.dataLen), ret); BREAK_IF(BN_Cmp(a, b) != 0); GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->y, eccPara->yLen), ret); GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->y.data, curve->y.dataLen), ret); BREAK_IF(BN_Cmp(a, b) != 0); BN_Destroy(a); BN_Destroy(b); return CURVE_PARAS[i].id; } ERR: BN_Destroy(a); BN_Destroy(b); return CRYPT_PKEY_PARAID_MAX; } int32_t ECC_GetPara(const ECC_Pkey *pkey, CRYPT_EccPara *eccPara) { if (pkey == NULL || eccPara == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->para == NULL || pkey->para->method == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_EMPTY_KEY); return CRYPT_ECC_PKEY_ERR_EMPTY_KEY; } int32_t ret; BN_BigNum *paraA = BN_Dup(pkey->para->a); BN_BigNum *paraB = BN_Dup(pkey->para->b); if (paraA == NULL || paraB == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto ERR; } if (pkey->para->method->bnMontDec != NULL) { pkey->para->method->bnMontDec(paraA, pkey->para->montP); pkey->para->method->bnMontDec(paraB, pkey->para->montP); } GOTO_ERR_IF(BN_Bn2Bin(paraA, eccPara->a, &eccPara->aLen), ret); GOTO_ERR_IF(BN_Bn2Bin(paraB, eccPara->b, &eccPara->bLen), ret); GOTO_ERR_IF(BN_Bn2Bin(pkey->para->h, eccPara->h, &eccPara->hLen), ret); GOTO_ERR_IF(BN_Bn2Bin(pkey->para->n, eccPara->n, &eccPara->nLen), ret); GOTO_ERR_IF(BN_Bn2Bin(pkey->para->p, eccPara->p, &eccPara->pLen), ret); GOTO_ERR_IF(BN_Bn2Bin(pkey->para->x, eccPara->x, &eccPara->xLen), ret); GOTO_ERR_IF(BN_Bn2Bin(pkey->para->y, eccPara->y, &eccPara->yLen), ret); ERR: BN_Destroy(paraA); BN_Destroy(paraB); return ret; } #ifdef HITLS_BSL_PARAMS int32_t ECC_GetParaEx(const ECC_Pkey *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_EccPara eccPara = {0}; BSL_Param *paramP = GetParamValue(para, CRYPT_PARAM_EC_P, &(eccPara.p), &(eccPara.pLen)); BSL_Param *paramA = GetParamValue(para, CRYPT_PARAM_EC_A, &(eccPara.a), &(eccPara.aLen)); BSL_Param *paramB = GetParamValue(para, CRYPT_PARAM_EC_B, &(eccPara.b), &(eccPara.bLen)); BSL_Param *paramN = GetParamValue(para, CRYPT_PARAM_EC_N, &(eccPara.n), &(eccPara.nLen)); BSL_Param *paramH = GetParamValue(para, CRYPT_PARAM_EC_H, &(eccPara.h), &(eccPara.hLen)); BSL_Param *paramX = GetParamValue(para, CRYPT_PARAM_EC_X, &(eccPara.x), &(eccPara.xLen)); BSL_Param *paramY = GetParamValue(para, CRYPT_PARAM_EC_Y, &(eccPara.y), &(eccPara.yLen)); int32_t ret = ECC_GetPara(ctx, &eccPara); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); return ret; } paramP->useLen = eccPara.pLen; paramA->useLen = eccPara.aLen; paramB->useLen = eccPara.bLen; paramN->useLen = eccPara.nLen; paramH->useLen = eccPara.hLen; paramX->useLen = eccPara.xLen; paramY->useLen = eccPara.yLen; return CRYPT_SUCCESS; } #endif void ECC_FreePara(ECC_Para *para) { if (para == NULL) { return; } BN_Destroy(para->p); BN_Destroy(para->a); BN_Destroy(para->b); BN_Destroy(para->n); BN_Destroy(para->h); BN_Destroy(para->x); BN_Destroy(para->y); uint32_t i; for (i = 0; i < sizeof(para->tableG) / sizeof(ECC_Point *); i++) { // clear pre-computation table ECC_FreePoint(para->tableG[i]); } BN_MontDestroy(para->montP); BSL_SAL_Free(para); } CRYPT_PKEY_ParaId ECC_GetParaId(const ECC_Para *para) { if (para == NULL) { return CRYPT_PKEY_PARAID_MAX; } return para->id; } int32_t ECC_SetPara(ECC_Pkey *ctx, ECC_Para *para) { if (ctx == NULL || para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } // Refresh the public and private keys. BN_Destroy(ctx->prvkey); ctx->prvkey = NULL; ECC_FreePoint(ctx->pubkey); ctx->pubkey = NULL; ECC_FreePara(ctx->para); ctx->para = para; ECC_SetLibCtx(ctx->libCtx, ctx->para); return CRYPT_SUCCESS; } #endif /* HITLS_CRYPTO_ECC */
2401_83913325/openHiTLS-examples_7925
crypto/ecc/src/ecc_para.c
C
unknown
29,213
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include <stdbool.h> #include "crypt_errno.h" #include "crypt_types.h" #include "crypt_utils.h" #include "securec.h" #include "bsl_sal.h" #include "bsl_err_internal.h" #include "crypt_bn.h" #include "crypt_ecc.h" #include "ecc_local.h" #include "crypt_ecc_pkey.h" #include "crypt_params_key.h" typedef struct { const char *name; /* elliptic curve NIST name */ CRYPT_PKEY_ParaId id; /* elliptic curve ID */ } EC_NAME; void ECC_FreeCtx(ECC_Pkey *ctx) { int ret = 0; if (ctx == NULL) { return; } BSL_SAL_AtomicDownReferences(&(ctx->references), &ret); if (ret > 0) { return; } BSL_SAL_ReferencesFree(&(ctx->references)); BN_Destroy(ctx->prvkey); ECC_FreePoint(ctx->pubkey); ECC_FreePara(ctx->para); BSL_SAL_FREE(ctx->mdAttr); BSL_SAL_Free(ctx); return; } ECC_Pkey *ECC_DupCtx(ECC_Pkey *ctx) { if (ctx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return NULL; } ECC_Pkey *newCtx = BSL_SAL_Calloc(1u, sizeof(ECC_Pkey)); if (newCtx == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } newCtx->useCofactorMode = ctx->useCofactorMode; newCtx->pointFormat = ctx->pointFormat; BSL_SAL_ReferencesInit(&(newCtx->references)); GOTO_ERR_IF_SRC_NOT_NULL(newCtx->prvkey, ctx->prvkey, BN_Dup(ctx->prvkey), CRYPT_MEM_ALLOC_FAIL); GOTO_ERR_IF_SRC_NOT_NULL(newCtx->pubkey, ctx->pubkey, ECC_DupPoint(ctx->pubkey), CRYPT_MEM_ALLOC_FAIL); GOTO_ERR_IF_SRC_NOT_NULL(newCtx->para, ctx->para, ECC_DupPara(ctx->para), CRYPT_MEM_ALLOC_FAIL); GOTO_ERR_IF_SRC_NOT_NULL(newCtx->mdAttr, ctx->mdAttr, BSL_SAL_Dump(ctx->mdAttr, strlen(ctx->mdAttr) + 1), CRYPT_MEM_ALLOC_FAIL); newCtx->libCtx = ctx->libCtx; return newCtx; ERR: ECC_FreeCtx(newCtx); return NULL; } // GetBits applies to both public and private keys. // The public key requires the largest space. Therefore, the public key space prevails. uint32_t ECC_PkeyGetBits(const ECC_Pkey *ctx) { if ((ctx == NULL) || (ctx->para == NULL)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } // The length of ECC_ParaBits is internally specified and can ensure that the length is not 0. 1 byte = 8 bits. uint32_t bytes = ((ECC_ParaBits(ctx->para) - 1) / 8) + 1; // The public key contains 2 coordinates. The public key flag occupies is 1 byte. 1 byte = 8 bits. return (bytes * 2 + 1) * 8; } int32_t ECC_PkeySetPrvKey(ECC_Pkey *ctx, const CRYPT_EccPrv *prv) { if ((ctx == NULL) || (ctx->para == NULL) || (prv == NULL) || (prv->data == NULL) || (prv->len == 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret; BN_BigNum *paraN = ECC_GetParaN(ctx->para); BN_BigNum *newPrvKey = BN_Create(ECC_ParaBits(ctx->para)); if ((paraN == NULL) || (newPrvKey == NULL)) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(ret); goto ERR; } ret = BN_Bin2Bn(newPrvKey, prv->data, prv->len); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto ERR; } if (ctx->para->id == CRYPT_ECC_SM2) { (void)BN_SubLimb(paraN, paraN, 1); } if (BN_IsZero(newPrvKey) || (BN_Cmp(newPrvKey, paraN)) >= 0) { ret = CRYPT_ECC_PKEY_ERR_INVALID_PRIVATE_KEY; BSL_ERR_PUSH_ERROR(ret); goto ERR; } BN_Destroy(ctx->prvkey); ctx->prvkey = newPrvKey; BN_Destroy(paraN); return CRYPT_SUCCESS; ERR: BN_Destroy(newPrvKey); BN_Destroy(paraN); return ret; } /** * In NIST.SP.800-56 Ar3, the FFC Full Public-Key Validation Routine needs to check nQ = Ø. * For performance considerations, we perform Partial public-key Validation (Section 5.6.2.3.4) when * setting the Public Key. */ int32_t ECC_PkeySetPubKey(ECC_Pkey *ctx, const CRYPT_EccPub *pub) { if ((ctx == NULL) || (ctx->para == NULL) || (pub == NULL) || (pub->data == NULL) || (pub->len == 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } ECC_Point *newPubKey = ECC_NewPoint(ctx->para); if (newPubKey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = ECC_DecodePoint(ctx->para, newPubKey, pub->data, pub->len); if (ret == CRYPT_SUCCESS) { ECC_FreePoint(ctx->pubkey); ctx->pubkey = newPubKey; return ret; } ECC_FreePoint(newPubKey); return ret; } int32_t ECC_PkeyGetPrvKey(const ECC_Pkey *ctx, CRYPT_EccPrv *prv) { if ((ctx == NULL) || (prv == NULL) || (prv->data == NULL) || (prv->len == 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->prvkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_EMPTY_KEY); return CRYPT_ECC_PKEY_ERR_EMPTY_KEY; } return BN_Bn2Bin(ctx->prvkey, prv->data, &prv->len); } int32_t ECC_PkeyGetPubKey(const ECC_Pkey *ctx, CRYPT_EccPub *pub) { if ((ctx == NULL) || (ctx->para == NULL) || (pub == NULL) || (pub->data == NULL) || (pub->len == 0)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->pubkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_EMPTY_KEY); return CRYPT_ECC_PKEY_ERR_EMPTY_KEY; } return ECC_EncodePoint(ctx->para, ctx->pubkey, pub->data, &pub->len, ctx->pointFormat); } #ifdef HITLS_BSL_PARAMS int32_t ECC_PkeySetPrvKeyEx(ECC_Pkey *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_EccPrv prv = {0}; (void)GetConstParamValue(para, CRYPT_PARAM_EC_PRVKEY, &prv.data, &prv.len); return ECC_PkeySetPrvKey(ctx, &prv); } int32_t ECC_PkeySetPubKeyEx(ECC_Pkey *ctx, const BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_EccPub pub = {0}; if (GetConstParamValue(para, CRYPT_PARAM_EC_PUBKEY, &pub.data, &pub.len) == NULL) { (void)GetConstParamValue(para, CRYPT_PARAM_PKEY_ENCODE_PUBKEY, (uint8_t **)&pub.data, &pub.len); } return ECC_PkeySetPubKey(ctx, &pub); } int32_t ECC_PkeyGetPrvKeyEx(const ECC_Pkey *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_EccPrv prv = {0}; BSL_Param *paramPrv = GetParamValue(para, CRYPT_PARAM_EC_PRVKEY, &prv.data, &(prv.len)); int32_t ret = ECC_PkeyGetPrvKey(ctx, &prv); if (ret != CRYPT_SUCCESS) { return ret; } paramPrv->useLen = prv.len; return CRYPT_SUCCESS; } int32_t ECC_PkeyGetPubKeyEx(const ECC_Pkey *ctx, BSL_Param *para) { if (para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } CRYPT_EccPub pub = {0}; BSL_Param *paramPub = GetParamValue(para, CRYPT_PARAM_EC_PUBKEY, &pub.data, &(pub.len)); if (paramPub == NULL) { paramPub = GetParamValue(para, CRYPT_PARAM_PKEY_ENCODE_PUBKEY, &pub.data, &(pub.len)); } int32_t ret = ECC_PkeyGetPubKey(ctx, &pub); if (ret != CRYPT_SUCCESS) { return ret; } paramPub->useLen = pub.len; return CRYPT_SUCCESS; } #endif static int32_t GenPrivateKey(ECC_Pkey *ctx) { int32_t ret = CRYPT_SUCCESS; uint32_t tryCount = 0; uint32_t paraBits = ECC_ParaBits(ctx->para); BN_BigNum *paraN = NULL; if (ctx->para->id == CRYPT_ECC_SM2) { paraN = BN_Create(paraBits); if (paraN == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } (void)BN_SubLimb(paraN, ctx->para->n, 1); } else { paraN = ctx->para->n; } if (ctx->prvkey == NULL) { ctx->prvkey = BN_Create(paraBits); if (ctx->prvkey == NULL) { ret = CRYPT_MEM_ALLOC_FAIL; BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); goto EXIT; } } do { ret = BN_RandRangeEx(ctx->libCtx, ctx->prvkey, paraN); if (ret != CRYPT_SUCCESS) { BSL_ERR_PUSH_ERROR(ret); goto EXIT; } tryCount += 1; } while ((BN_IsZero(ctx->prvkey) == true) && (tryCount < CRYPT_ECC_TRY_MAX_CNT)); if (tryCount == CRYPT_ECC_TRY_MAX_CNT) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_TRY_CNT); ret = CRYPT_ECC_PKEY_ERR_TRY_CNT; } EXIT: if (paraN != ctx->para->n) { BN_Destroy(paraN); } return ret; } int32_t ECC_GenPublicKey(ECC_Pkey *ctx) { if (ctx->pubkey != NULL) { return CRYPT_SUCCESS; } ctx->pubkey = ECC_NewPoint(ctx->para); if (ctx->pubkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } int32_t ret = ECC_PointMul(ctx->para, ctx->pubkey, ctx->prvkey, NULL); if (ret != CRYPT_SUCCESS) { ECC_FreePoint(ctx->pubkey); ctx->pubkey = NULL; } return ret; } static int32_t GenPublicKey(ECC_Pkey *ctx) { if (ctx->prvkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (ctx->pubkey == NULL) { ctx->pubkey = ECC_NewPoint(ctx->para); if (ctx->pubkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } } return ECC_PointMul(ctx->para, ctx->pubkey, ctx->prvkey, NULL); } int32_t ECC_PkeyGen(ECC_Pkey *ctx) { if ((ctx == NULL) || (ctx->para == NULL)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } int32_t ret = GenPrivateKey(ctx); if (ret != CRYPT_SUCCESS) { goto ERR; } ret = GenPublicKey(ctx); if (ret != CRYPT_SUCCESS) { goto ERR; } return CRYPT_SUCCESS; ERR: BN_Zeroize(ctx->prvkey); BN_Destroy(ctx->prvkey); ctx->prvkey = NULL; ECC_FreePoint(ctx->pubkey); ctx->pubkey = NULL; return ret; } #ifdef HITLS_CRYPTO_ECC_CHECK static int32_t EccKeyPairCheck(const ECC_Pkey *pub, const ECC_Pkey *prv) { int32_t ret; if (prv == NULL || pub == NULL || pub->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pub->pubkey == NULL || prv->prvkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_EMPTY_KEY); return CRYPT_ECC_PKEY_ERR_EMPTY_KEY; } ECC_Point *point = ECC_NewPoint(pub->para); if (point == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return CRYPT_MEM_ALLOC_FAIL; } ret = ECC_PointMul(pub->para, point, prv->prvkey, NULL); if (ret != CRYPT_SUCCESS) { ECC_FreePoint(point); return ret; } if (ECC_PointCmp(pub->para, point, pub->pubkey) != 0) { ret = CRYPT_ECC_PAIRWISE_CHECK_FAIL; BSL_ERR_PUSH_ERROR(ret); } ECC_FreePoint(point); return ret; } static int32_t EccPrvKeyCheck(const ECC_Pkey *pkey) { if (pkey == NULL || pkey->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (pkey->prvkey == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_EMPTY_KEY); return CRYPT_ECC_PKEY_ERR_EMPTY_KEY; } int32_t ret = CRYPT_SUCCESS; BN_BigNum *paraN = ECC_GetParaN(pkey->para); if (pkey->para->id == CRYPT_ECC_SM2) { (void)BN_SubLimb(paraN, paraN, 1); /* GB/T 32918.2-2016 for check sm2 prv key, 0 < key < n - 1 is valid */ if (BN_IsZero(pkey->prvkey) == true || BN_IsNegative(pkey->prvkey) == true || (BN_Cmp(pkey->prvkey, paraN) >= 0)) { ret = CRYPT_ECC_INVALID_PRVKEY; BSL_ERR_PUSH_ERROR(CRYPT_ECC_INVALID_PRVKEY); } } else { /* SP800-56a 5.6.2.1.2 for check an ecc private key. 0 < key <= n - 1 is valid. */ if (BN_IsZero(pkey->prvkey) == true || BN_IsNegative(pkey->prvkey) == true || (BN_Cmp(pkey->prvkey, paraN) >= 0)) { ret = CRYPT_ECC_INVALID_PRVKEY; BSL_ERR_PUSH_ERROR(CRYPT_ECC_INVALID_PRVKEY); } } BN_Destroy(paraN); return ret; } int32_t ECC_PkeyCheck(const ECC_Pkey *pkey1, const ECC_Pkey *pkey2, uint32_t checkType) { switch (checkType) { case CRYPT_PKEY_CHECK_KEYPAIR: return EccKeyPairCheck(pkey1, pkey2); case CRYPT_PKEY_CHECK_PRVKEY: return EccPrvKeyCheck(pkey1); default: BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } } #endif // HITLS_CRYPTO_ECC_CHECK static const char *EcCurveId2nist(CRYPT_PKEY_ParaId id) { static EC_NAME nistCurves[] = { {"P-224", CRYPT_ECC_NISTP224}, {"P-256", CRYPT_ECC_NISTP256}, {"P-384", CRYPT_ECC_NISTP384}, {"P-521", CRYPT_ECC_NISTP521} }; for (uint32_t i = 0; i < sizeof(nistCurves) / sizeof(nistCurves[0]); i++) { if (nistCurves[i].id == id) { return nistCurves[i].name; } } return NULL; } static int32_t ECC_GetPubXYBnBin(ECC_Pkey *ctx, int32_t opt, void *val, uint32_t len) { if (ctx->para == NULL || len != sizeof(CRYPT_Data) || val == NULL || ((CRYPT_Data *)val)->data == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return CRYPT_INVALID_ARG; } int32_t ret; uint32_t bits = BN_Bits(ctx->para->p); BN_BigNum *x = BN_Create(bits); BN_BigNum *y = BN_Create(bits); do { if (x == NULL || y == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); ret = CRYPT_MEM_ALLOC_FAIL; break; } ret = ECC_GetPoint2Bn(ctx->para, ctx->pubkey, x, y); if (ret != CRYPT_SUCCESS) { break; } if (opt == CRYPT_CTRL_GET_ECC_PUB_X_BIN) { ret = BN_Bn2Bin(x, ((CRYPT_Data *)val)->data, &((CRYPT_Data *)val)->len); } else { ret = BN_Bn2Bin(y, ((CRYPT_Data *)val)->data, &((CRYPT_Data *)val)->len); } } while (0); BN_Destroy(x); BN_Destroy(y); return ret; } static uint32_t GetOrderBits(const ECC_Pkey *ctx) { if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_PARA); return 0; } return BN_Bits(ctx->para->n); } static uint32_t ECC_GetKeyLen(const ECC_Pkey *ctx) { if ((ctx == NULL) || (ctx->para == NULL)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return 0; } return BN_Bytes(ctx->para->p); } static uint32_t ECC_GetPubKeyLen(const ECC_Pkey *ctx) { uint32_t keylen = ECC_GetKeyLen(ctx); if (keylen == 0) { BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG); return 0; } if (ctx->pointFormat == CRYPT_POINT_COMPRESSED) { return (keylen + 1); } return (keylen * 2 + 1); } static int32_t GetEccName(ECC_Pkey *ctx, void *val, uint32_t len) { if (ctx->para == NULL) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } if (memcpy_s(val, len, EcCurveId2nist(ctx->para->id), strlen("P-521") + 1) != EOK) { BSL_ERR_PUSH_ERROR(CRYPT_SECUREC_FAIL); return CRYPT_SECUREC_FAIL; } return CRYPT_SUCCESS; } static int32_t SetEccPointFormat(ECC_Pkey *ctx, void *val, uint32_t len) { if (len != sizeof(uint32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_CTRL_LEN); return CRYPT_ECC_PKEY_ERR_CTRL_LEN; } uint32_t pointFormat = *(uint32_t *)val; if (pointFormat >= CRYPT_POINT_MAX) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_INVALID_POINT_FORMAT); return CRYPT_ECC_PKEY_ERR_INVALID_POINT_FORMAT; } ctx->pointFormat = pointFormat; return CRYPT_SUCCESS; } static int32_t SetEccUseCofactorMode(ECC_Pkey *ctx, void *val, uint32_t len) { if (len != sizeof(uint32_t)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_CTRL_LEN); return CRYPT_ECC_PKEY_ERR_CTRL_LEN; } ctx->useCofactorMode = *(uint32_t *)val; return CRYPT_SUCCESS; } int32_t ECC_PkeyCtrl(ECC_Pkey *ctx, int32_t opt, void *val, uint32_t len) { if (ctx == NULL || (val == NULL && opt != CRYPT_CTRL_GEN_ECC_PUBLICKEY)) { BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT); return CRYPT_NULL_INPUT; } switch (opt) { case CRYPT_CTRL_GET_ECC_NAME: return GetEccName(ctx, val, len); case CRYPT_CTRL_GET_ECC_PUB_X_BIN: case CRYPT_CTRL_GET_ECC_PUB_Y_BIN: return ECC_GetPubXYBnBin(ctx, opt, val, len); case CRYPT_CTRL_SET_ECC_POINT_FORMAT: return SetEccPointFormat(ctx, val, len); case CRYPT_CTRL_SET_ECC_USE_COFACTOR_MODE: return SetEccUseCofactorMode(ctx, val, len); case CRYPT_CTRL_GEN_ECC_PUBLICKEY: return GenPublicKey(ctx); case CRYPT_CTRL_GET_ECC_ORDER_BITS: return GetUintCtrl(ctx, val, len, (GetUintCallBack)GetOrderBits); case CRYPT_CTRL_GET_PUBKEY_LEN: return GetUintCtrl(ctx, val, len, (GetUintCallBack)ECC_GetPubKeyLen); case CRYPT_CTRL_GET_PRVKEY_LEN: case CRYPT_CTRL_GET_SHARED_KEY_LEN: return GetUintCtrl(ctx, val, len, (GetUintCallBack)ECC_GetKeyLen); case CRYPT_CTRL_UP_REFERENCES: if (len != (uint32_t)sizeof(int)) { BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_CTRL_LEN); return CRYPT_ECC_PKEY_ERR_CTRL_LEN; } return BSL_SAL_AtomicUpReferences(&(ctx->references), (int *)val); default: BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_UNSUPPORTED_CTRL_OPTION); return CRYPT_ECC_PKEY_ERR_UNSUPPORTED_CTRL_OPTION; } } ECC_Pkey *ECC_PkeyNewCtx(CRYPT_PKEY_ParaId id) { ECC_Para *para = ECC_NewPara(id); if (para == NULL) { return NULL; } ECC_Pkey *key = BSL_SAL_Calloc(1u, sizeof(ECC_Pkey)); if (key == NULL) { ECC_FreePara(para); BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL); return NULL; } key->para = para; key->pointFormat = CRYPT_POINT_UNCOMPRESSED; BSL_SAL_ReferencesInit(&(key->references)); return key; } int32_t ECC_PkeyCmp(const ECC_Pkey *a, const ECC_Pkey *b) { RETURN_RET_IF(a == NULL || b == NULL, CRYPT_NULL_INPUT); // Compare public keys. RETURN_RET_IF(ECC_PointCmp(a->para, a->pubkey, b->pubkey), CRYPT_ECC_KEY_PUBKEY_NOT_EQUAL); // Compare parameters. RETURN_RET_IF(b->para == NULL || a->para->id != b->para->id, CRYPT_ECC_POINT_ERR_CURVE_ID); return CRYPT_SUCCESS; } #endif /* HITLS_CRYPTO_ECC */
2401_83913325/openHiTLS-examples_7925
crypto/ecc/src/ecc_pkey.c
C
unknown
19,162
/* * This file is part of the openHiTLS project. * * openHiTLS is licensed under the Mulan PSL v2. * You can use this software according to the terms and conditions of the Mulan PSL v2. * You may obtain a copy of Mulan PSL v2 at: * * http://license.coscl.org.cn/MulanPSL2 * * THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, * EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, * MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE. * See the Mulan PSL v2 for more details. */ #ifndef ECC_UTILS_H #define ECC_UTILS_H #include "hitls_build.h" #ifdef HITLS_CRYPTO_ECC #include "crypt_ecc.h" #include "ecc_local.h" #include "crypt_errno.h" #ifdef __cplusplus extern "C" { #endif /* the window length of common point multiplication */ #define WINDOW_SIZE 5 /* * Decoded from a 6-bit signed code to obtain the sign and value. The upper five bits are the complement of the value, * and the least significant bit is the carry (positive) of the next group of numbers. * Output: * sign = 0 or 1 * 0 <= value <= 16 */ inline static void DecodeScalarCode(uint32_t *sign, uint32_t *value, uint32_t code) { uint32_t s, v; s = 0 - (code >> WINDOW_SIZE); // Bit 5 is the sign bit, and the negative number is all 1s. // Take its value and add a carry. Because the symbol is obtained and then the carry is added, v may be + 16 or - 0. v = (code >> 1) + (code & 1); // Find the Take its value and add a carry. If the number is positive, v is the Take its value and add a carry. // If the number is negative, v is inverted + 1. v = (~s & v) | (s & (~v + 1)); *sign = s & 1; *value = v & ((1 << WINDOW_SIZE) - 1); // Five bits are intercepted. } inline static int32_t CheckParaValid(const ECC_Para *para, CRYPT_PKEY_ParaId id) { if (para == NULL) { return CRYPT_NULL_INPUT; } if (para->id != id) { return CRYPT_ECC_POINT_ERR_CURVE_ID; } return CRYPT_SUCCESS; } inline static int32_t CheckPointValid(const ECC_Point *pt, CRYPT_PKEY_ParaId id) { if (pt == NULL) { return CRYPT_NULL_INPUT; } if (pt->id != id) { return CRYPT_ECC_POINT_ERR_CURVE_ID; } return CRYPT_SUCCESS; } inline static int32_t CheckBnValid(const BN_BigNum *k, uint32_t maxBits) { if (k == NULL) { return CRYPT_NULL_INPUT; } if (BN_Bits(k) > maxBits) { // If K is greater than maxBits, it is considered too long. return CRYPT_ECC_POINT_MUL_ERR_K_LEN; } return CRYPT_SUCCESS; } #ifdef __cplusplus } #endif #endif // HITLS_CRYPTO_ECC #endif // ECC_UTILS_H
2401_83913325/openHiTLS-examples_7925
crypto/ecc/src/ecc_utils.h
C
unknown
2,642