code
stringlengths 1
1.05M
| repo_name
stringlengths 6
83
| path
stringlengths 3
242
| language
stringclasses 222
values | license
stringclasses 20
values | size
int64 1
1.05M
|
|---|---|---|---|---|---|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef EAL_KDF_LOCAL_H
#define EAL_KDF_LOCAL_H
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_KDF)
#include <stdint.h>
#include "crypt_algid.h"
#include "crypt_local_types.h"
#ifdef __cplusplus
extern "C" {
#endif // __cplusplus
struct EalKdfCtx {
bool isProvider;
EAL_KdfUnitaryMethod *method; /* algorithm operation entity */
void *data;
CRYPT_KDF_AlgId id;
};
const EAL_KdfMethod *EAL_KdfFindMethod(CRYPT_KDF_AlgId id);
#ifdef __cplusplus
}
#endif // __cplusplus
#endif // HITLS_CRYPTO_KDF
#endif // EAL_KDF_LOCAL_H
|
2301_79861745/bench_create
|
crypto/eal/src/eal_kdf_local.h
|
C
|
unknown
| 1,121
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_KDF)
#include "crypt_local_types.h"
#include "crypt_algid.h"
#ifdef HITLS_CRYPTO_PBKDF2
#include "crypt_pbkdf2.h"
#endif
#ifdef HITLS_CRYPTO_HKDF
#include "crypt_hkdf.h"
#endif
#ifdef HITLS_CRYPTO_KDFTLS12
#include "crypt_kdf_tls12.h"
#endif
#ifdef HITLS_CRYPTO_SCRYPT
#include "crypt_scrypt.h"
#endif
#include "bsl_err_internal.h"
#include "eal_common.h"
#include "bsl_sal.h"
#define CRYPT_KDF_IMPL_METHOD_DECLARE(name) \
EAL_KdfMethod g_kdfMethod_##name = { \
(KdfNewCtx)CRYPT_##name##_NewCtx, (KdfSetParam)CRYPT_##name##_SetParam, \
(KdfDerive)CRYPT_##name##_Derive, (KdfDeinit)CRYPT_##name##_Deinit, \
(KdfFreeCtx)CRYPT_##name##_FreeCtx \
}
#ifdef HITLS_CRYPTO_PBKDF2
CRYPT_KDF_IMPL_METHOD_DECLARE(PBKDF2);
#endif
#ifdef HITLS_CRYPTO_HKDF
CRYPT_KDF_IMPL_METHOD_DECLARE(HKDF);
#endif
#ifdef HITLS_CRYPTO_KDFTLS12
CRYPT_KDF_IMPL_METHOD_DECLARE(KDFTLS12);
#endif
#ifdef HITLS_CRYPTO_SCRYPT
CRYPT_KDF_IMPL_METHOD_DECLARE(SCRYPT);
#endif
static const EAL_CidToKdfMeth ID_TO_KDF_METH_TABLE[] = {
#ifdef HITLS_CRYPTO_PBKDF2
{CRYPT_KDF_PBKDF2, &g_kdfMethod_PBKDF2},
#endif
#ifdef HITLS_CRYPTO_HKDF
{CRYPT_KDF_HKDF, &g_kdfMethod_HKDF},
#endif
#ifdef HITLS_CRYPTO_KDFTLS12
{CRYPT_KDF_KDFTLS12, &g_kdfMethod_KDFTLS12},
#endif
#ifdef HITLS_CRYPTO_SCRYPT
{CRYPT_KDF_SCRYPT, &g_kdfMethod_SCRYPT},
#endif
};
const EAL_KdfMethod *EAL_KdfFindMethod(CRYPT_KDF_AlgId id)
{
EAL_KdfMethod *pKdfMeth = NULL;
uint32_t num = sizeof(ID_TO_KDF_METH_TABLE) / sizeof(ID_TO_KDF_METH_TABLE[0]);
for (uint32_t i = 0; i < num; i++) {
if (ID_TO_KDF_METH_TABLE[i].id == id) {
pKdfMeth = ID_TO_KDF_METH_TABLE[i].kdfMeth;
return pKdfMeth;
}
}
return NULL;
}
#endif
|
2301_79861745/bench_create
|
crypto/eal/src/eal_kdf_method.c
|
C
|
unknown
| 2,456
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_CODECSKEY) && defined(HITLS_CRYPTO_PROVIDER)
#include "crypt_errno.h"
#include "crypt_eal_pkey.h"
#include "eal_pkey_local.h"
#include "eal_pkey.h"
#include "bsl_err_internal.h"
#include "bsl_sal.h"
CRYPT_EAL_PkeyCtx *CRYPT_EAL_MakeKeyByPkeyAlgInfo(CRYPT_EAL_PkeyMgmtInfo *pkeyAlgInfo, void *keyRef,
uint32_t keyRefLen)
{
if (pkeyAlgInfo == NULL || keyRef == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return NULL;
}
if (keyRefLen != sizeof(void *)) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return NULL;
}
CRYPT_EAL_PkeyCtx *pkeyCtx = BSL_SAL_Calloc(1, sizeof(CRYPT_EAL_PkeyCtx));
if (pkeyCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
pkeyCtx->isProvider = true;
pkeyCtx->id = pkeyAlgInfo->algId;
pkeyCtx->key = keyRef;
pkeyCtx->extData = NULL;
pkeyCtx->method = pkeyAlgInfo->keyMgmtMethod;
BSL_SAL_ReferencesInit(&(pkeyCtx->references));
return pkeyCtx;
}
int32_t CRYPT_EAL_GetPkeyAlgInfo(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName,
CRYPT_EAL_PkeyMgmtInfo *pkeyAlgInfo)
{
CRYPT_EAL_AsyAlgFuncsInfo funcInfo = {0};
int32_t ret = CRYPT_EAL_ProviderGetAsyAlgFuncs(libCtx, algId, CRYPT_EAL_PKEY_UNKNOWN_OPERATE, attrName, &funcInfo);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = CRYPT_EAL_SetPkeyMethod(&(pkeyAlgInfo->keyMgmtMethod), funcInfo.funcsKeyMgmt, funcInfo.funcsAsyCipher,
funcInfo.funcsExch, funcInfo.funcSign, funcInfo.funcKem);
if (ret != CRYPT_SUCCESS) {
return ret;
}
pkeyAlgInfo->algId = algId;
pkeyAlgInfo->mgrCtx = funcInfo.mgrCtx;
return CRYPT_SUCCESS;
}
#endif /* HITLS_CRYPTO_CODECSKEY && CRYPT_EAL_PROVIDER */
|
2301_79861745/bench_create
|
crypto/eal/src/eal_keymgmt_util.c
|
C
|
unknown
| 2,358
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MAC)
#include <stdio.h>
#include <stdlib.h>
#include "crypt_eal_mac.h"
#include "securec.h"
#include "bsl_err_internal.h"
#include "bsl_sal.h"
#include "crypt_local_types.h"
#include "crypt_eal_mac.h"
#include "crypt_algid.h"
#include "crypt_errno.h"
#include "crypt_ealinit.h"
#include "eal_mac_local.h"
#include "eal_common.h"
#ifdef HITLS_CRYPTO_PROVIDER
#include "crypt_eal_implprovider.h"
#include "crypt_provider.h"
#endif
#define MAC_TYPE_INVALID 0
static CRYPT_EAL_MacCtx *MacNewCtxInner(int32_t algId, CRYPT_EAL_LibCtx *libCtx, const char *attrName, bool isProvider)
{
EAL_MacMethod *method = NULL;
CRYPT_EAL_MacCtx *macCtx = BSL_SAL_Malloc(sizeof(CRYPT_EAL_MacCtx));
if (macCtx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, algId, CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)memset_s(macCtx, sizeof(CRYPT_EAL_MacCtx), 0, sizeof(CRYPT_EAL_MacCtx));
void *provCtx = NULL;
if (!isProvider) {
method = EAL_MacFindMethod(algId, &macCtx->macMeth);
} else {
method = EAL_MacFindMethodEx(algId, libCtx, attrName, &macCtx->macMeth, &provCtx);
}
if (method == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, algId, CRYPT_EAL_ERR_METH_NULL_MEMBER);
BSL_SAL_Free(macCtx);
return NULL;
}
if (macCtx->macMeth.newCtx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, algId, CRYPT_NULL_INPUT);
BSL_SAL_Free(macCtx);
return NULL;
}
void *data = macCtx->macMeth.newCtx(provCtx, algId);
if (data == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, algId, CRYPT_MEM_ALLOC_FAIL);
BSL_SAL_Free(macCtx);
return NULL;
}
macCtx->ctx = data;
macCtx->id = algId;
macCtx->state = CRYPT_MAC_STATE_NEW;
return macCtx;
}
CRYPT_EAL_MacCtx *CRYPT_EAL_ProviderMacNewCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName)
{
return MacNewCtxInner(algId, libCtx, attrName, true);
}
CRYPT_EAL_MacCtx *CRYPT_EAL_MacNewCtx(CRYPT_MAC_AlgId id)
{
#if defined(HITLS_CRYPTO_ASM_CHECK)
if (CRYPT_ASMCAP_Mac(id) != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, id, CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return NULL;
}
#endif
return MacNewCtxInner(id, NULL, NULL, false);
}
void CRYPT_EAL_MacFreeCtx(CRYPT_EAL_MacCtx *ctx)
{
if (ctx == NULL) {
return;
}
if (ctx->macMeth.freeCtx != NULL) {
ctx->macMeth.freeCtx(ctx->ctx);
EAL_EventReport(CRYPT_EVENT_ZERO, CRYPT_ALGO_MAC, ctx->id, CRYPT_SUCCESS);
} else {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT);
}
BSL_SAL_Free(ctx);
return;
}
int32_t CRYPT_EAL_MacInit(CRYPT_EAL_MacCtx *ctx, const uint8_t *key, uint32_t len)
{
if (ctx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->macMeth.init == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = ctx->macMeth.init(ctx->ctx, key, len, NULL);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, ret);
return ret;
}
ctx->state = CRYPT_MAC_STATE_INIT;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_MacUpdate(CRYPT_EAL_MacCtx *ctx, const uint8_t *in, uint32_t len)
{
if (ctx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if ((ctx->state == CRYPT_MAC_STATE_FINAL) || (ctx->state == CRYPT_MAC_STATE_NEW)) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ERR_STATE);
return CRYPT_EAL_ERR_STATE;
}
if (ctx->macMeth.update == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = ctx->macMeth.update(ctx->ctx, in, len);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, ret);
return ret;
}
ctx->state = CRYPT_MAC_STATE_UPDATE;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_MacFinal(CRYPT_EAL_MacCtx *ctx, uint8_t *out, uint32_t *len)
{
if (ctx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if ((ctx->state == CRYPT_MAC_STATE_NEW) || (ctx->state == CRYPT_MAC_STATE_FINAL)) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ERR_STATE);
return CRYPT_EAL_ERR_STATE;
}
if (ctx->macMeth.final == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = ctx->macMeth.final(ctx->ctx, out, len);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, ret);
return ret;
}
ctx->state = CRYPT_MAC_STATE_FINAL;
return CRYPT_SUCCESS;
}
void CRYPT_EAL_MacDeinit(CRYPT_EAL_MacCtx *ctx)
{
if (ctx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT);
return;
}
if (ctx->macMeth.deinit == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return;
}
int32_t ret = ctx->macMeth.deinit(ctx->ctx);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, ret);
return;
}
ctx->state = CRYPT_MAC_STATE_NEW;
return;
}
int32_t CRYPT_EAL_MacReinit(CRYPT_EAL_MacCtx *ctx)
{
if (ctx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->state == CRYPT_MAC_STATE_NEW) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ERR_STATE);
return CRYPT_EAL_ERR_STATE;
}
if (ctx->macMeth.reinit == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = ctx->macMeth.reinit(ctx->ctx);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, ret);
return ret;
}
ctx->state = CRYPT_MAC_STATE_INIT;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_MacCtrl(CRYPT_EAL_MacCtx *ctx, int32_t cmd, void *val, uint32_t valLen)
{
if (ctx == NULL || ctx->macMeth.ctrl == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (cmd == CRYPT_CTRL_GET_MACLEN) {
return ctx->macMeth.ctrl(ctx->ctx, cmd, val, valLen);
}
if (ctx->state != CRYPT_MAC_STATE_INIT) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, ctx->id, CRYPT_EAL_ERR_STATE);
return CRYPT_EAL_ERR_STATE;
}
return ctx->macMeth.ctrl(ctx->ctx, cmd, val, valLen);
}
uint32_t CRYPT_EAL_GetMacLen(const CRYPT_EAL_MacCtx *ctx)
{
uint32_t result = 0;
int32_t ret = CRYPT_EAL_MacCtrl((CRYPT_EAL_MacCtx *)(uintptr_t)ctx,
CRYPT_CTRL_GET_MACLEN, &result, sizeof(uint32_t));
return (ret == CRYPT_SUCCESS) ? result : 0;
}
/* The function not support provider */
bool CRYPT_EAL_MacIsValidAlgId(CRYPT_MAC_AlgId id)
{
// 1. Check if the dependency method is valid
/**
* The dependency method is getted from the global static table:
* If the mac algorithm is HMAC, the method in mdMethod will be overwritten.
* If the mac algorithm is other than HMAC, the depMeth.method will be overwritten.
*/
EAL_MdMethod mdMethod = {0};
EAL_MacDepMethod depMeth = {.method = {.md = &mdMethod}};
int32_t ret = EAL_MacFindDepMethod(id, NULL, NULL, &depMeth, NULL, false);
if (ret != CRYPT_SUCCESS) {
return false;
}
// 2. Check if the mac method is valid
return EAL_MacFindDefaultMethod(id) != NULL;
}
int32_t CRYPT_EAL_MacSetParam(CRYPT_EAL_MacCtx *ctx, const BSL_Param *param)
{
if (ctx == NULL || param == NULL || ctx->macMeth.setParam == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MAC, CRYPT_MAC_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
return ctx->macMeth.setParam(ctx->ctx, param);
}
#endif
|
2301_79861745/bench_create
|
crypto/eal/src/eal_mac.c
|
C
|
unknown
| 9,152
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef EAL_MAC_LOCAL_H
#define EAL_MAC_LOCAL_H
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MAC)
#include <stdint.h>
#include "crypt_algid.h"
#include "crypt_local_types.h"
#ifdef __cplusplus
extern "C" {
#endif // __cplusplus
typedef enum {
CRYPT_MAC_STATE_NEW = 0,
CRYPT_MAC_STATE_INIT,
CRYPT_MAC_STATE_UPDATE,
CRYPT_MAC_STATE_FINAL
} CRYPT_MAC_WORKSTATE;
struct EAL_MacCtx {
EAL_MacMethod macMeth;
void *ctx; // MAC context
CRYPT_MAC_AlgId id;
CRYPT_MAC_WORKSTATE state;
};
/**
* @ingroup eal
* @brief Find the default MAC method by the algorithm ID.
*
* @param id The algorithm ID.
*
* @return The MAC method.
*/
const EAL_MacMethod *EAL_MacFindDefaultMethod(CRYPT_MAC_AlgId id);
/**
* @ingroup eal
* @brief Find MAC algorithm implementation method by algorithm ID
*
* This function retrieves the default implementation method for specified MAC algorithm ID.
* If the input method pointer is NULL, will allocate new memory for method structure. Otherwise,
* will initialize the provided method structure.
*
* @param id [IN] MAC algorithm identifier (e.g. CRYPT_MAC_HMAC, CRYPT_MAC_CMAC)
* @param method [IN/OUT] Pointer to method structure.
* If NULL, function will allocate new memory. Caller must free returned pointer when no longer needed.
* If not NULL, the method should be cleared before calling this function.
*
* @return Pointer to MAC method structure on success. NULL on failure (invalid ID or allocate fail).
* Note: When input method is NULL, returned pointer MUST be freed by caller.
* When input method is not NULL, returns the same pointer with initialized contents.
*/
EAL_MacMethod *EAL_MacFindMethod(CRYPT_MAC_AlgId id, EAL_MacMethod *method);
/**
* @ingroup eal
* @brief Find MAC algorithm implementation method by algorithm ID with provider context
*
* This function retrieves the default implementation method for specified MAC algorithm ID.
* If the input method pointer is NULL, will allocate new memory for method structure. Otherwise,
* will initialize the provided method structure.
*
* @param id [IN] MAC algorithm identifier (e.g. CRYPT_MAC_HMAC, CRYPT_MAC_CMAC)
* @param libCtx [IN] The library context.
* @param attrName [IN] The attribute name.
* @param method [IN/OUT] Pointer to method structure.
* If NULL, function will allocate new memory. Caller must free returned pointer when no longer needed.
* If not NULL, the method should be cleared before calling this function.
* @param provCtx [OUT] The provider context.
*
* @return Pointer to MAC method structure on success. NULL on failure (invalid ID or alloc fail).
* Note: When input method is NULL, returned pointer MUST be freed by caller.
* When input method is not NULL, returns the same pointer with initialized contents.
*/
EAL_MacMethod *EAL_MacFindMethodEx(CRYPT_MAC_AlgId id, void *libCtx, const char *attrName, EAL_MacMethod *method,
void **provCtx);
/**
* @ingroup eal
* @brief Find dependent algorithm methods for MAC calculation
*
* @param macId [IN] MAC algorithm identifier
* @param libCtx [IN] Library context (for provider operations)
* @param attrName [IN] Attribute name for provider selection
* @param depMeth [OUT] Structure containing dependent methods and algorithm IDs
* @param provCtx [OUT] The provider context.
* @param isProvider [IN] Whether to use the provider method.
*
* @return CRYPT_SUCCESS on success, error code on failure
*
* @note When macId is HMAC:
* - depMeth->method.md is NULL:
* - Function will allocate new EAL_MdMethod structure internally
* - Caller MUST free allocated method
* - depMeth->method.md is non-NULL:
* - Function will reuse existing method structure
* - Original contents will be overwritten
*/
int32_t EAL_MacFindDepMethod(CRYPT_MAC_AlgId macId, void *libCtx, const char *attrName, EAL_MacDepMethod *depMeth,
void **provCtx, bool isProvider);
#ifdef __cplusplus
}
#endif // __cplusplus
#endif // HITLS_CRYPTO_MAC
#endif // EAL_MAC_LOCAL_H
|
2301_79861745/bench_create
|
crypto/eal/src/eal_mac_local.h
|
C
|
unknown
| 4,785
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MAC)
#include <stdint.h>
#include "securec.h"
#include "crypt_local_types.h"
#include "crypt_algid.h"
#include "crypt_errno.h"
#include "bsl_sal.h"
#include "eal_mac_local.h"
#include "eal_cipher_local.h"
#include "eal_md_local.h"
#ifdef HITLS_CRYPTO_HMAC
#include "crypt_hmac.h"
#endif
#ifdef HITLS_CRYPTO_CMAC
#include "crypt_cmac.h"
#endif
#ifdef HITLS_CRYPTO_CBC_MAC
#include "crypt_cbc_mac.h"
#endif
#ifdef HITLS_CRYPTO_GMAC
#include "crypt_gmac.h"
#endif
#ifdef HITLS_CRYPTO_SIPHASH
#include "crypt_siphash.h"
#endif
#include "bsl_err_internal.h"
#include "eal_common.h"
#ifdef HITLS_CRYPTO_PROVIDER
#include "crypt_eal_implprovider.h"
#endif
#define CRYPT_MAC_IMPL_METHOD_DECLARE(name) \
EAL_MacMethod g_macMethod_##name = { \
(MacNewCtx)CRYPT_##name##_NewCtxEx, \
(MacInit)CRYPT_##name##_Init, \
(MacUpdate)CRYPT_##name##_Update, \
(MacFinal)CRYPT_##name##_Final, \
(MacDeinit)CRYPT_##name##_Deinit, \
(MacReinit)CRYPT_##name##_Reinit, \
(MacCtrl)CRYPT_##name##_Ctrl, \
(MacSetParam)CRYPT_##name##_SetParam, \
(MacFreeCtx)CRYPT_##name##_FreeCtx \
}
#ifdef HITLS_CRYPTO_HMAC
CRYPT_MAC_IMPL_METHOD_DECLARE(HMAC);
#endif
#ifdef HITLS_CRYPTO_CMAC
CRYPT_MAC_IMPL_METHOD_DECLARE(CMAC);
#endif
#ifdef HITLS_CRYPTO_CBC_MAC
CRYPT_MAC_IMPL_METHOD_DECLARE(CBC_MAC);
#endif
#ifdef HITLS_CRYPTO_GMAC
CRYPT_MAC_IMPL_METHOD_DECLARE(GMAC);
#endif
#ifdef HITLS_CRYPTO_SIPHASH
CRYPT_MAC_IMPL_METHOD_DECLARE(SIPHASH);
EAL_SiphashMethod g_siphash64Meth = {.hashSize = SIPHASH_MIN_DIGEST_SIZE,
.compressionRounds = DEFAULT_COMPRESSION_ROUND,
.finalizationRounds = DEFAULT_FINALIZATION_ROUND};
EAL_SiphashMethod g_siphash128Meth = {.hashSize = SIPHASH_MAX_DIGEST_SIZE,
.compressionRounds = DEFAULT_COMPRESSION_ROUND,
.finalizationRounds = DEFAULT_FINALIZATION_ROUND};
#endif
typedef enum {
CRYPT_MAC_HMAC = 0,
CRYPT_MAC_CMAC,
CRYPT_MAC_CBC_MAC,
CRYPT_MAC_SIPHASH,
CRYPT_MAC_GMAC,
CRYPT_MAC_INVALID
} CRYPT_MAC_ID;
static const EAL_MacMethod *g_macMethods[] = {
#ifdef HITLS_CRYPTO_HMAC
&g_macMethod_HMAC, // HMAC
#else
NULL,
#endif
#ifdef HITLS_CRYPTO_CMAC
&g_macMethod_CMAC, // CMAC
#else
NULL,
#endif
#ifdef HITLS_CRYPTO_CBC_MAC
&g_macMethod_CBC_MAC, // CBC-MAC
#else
NULL,
#endif
#ifdef HITLS_CRYPTO_SIPHASH
&g_macMethod_SIPHASH, // SIPHASH
#else
NULL,
#endif
#ifdef HITLS_CRYPTO_GMAC
&g_macMethod_GMAC, // GMAC
#else
NULL,
#endif
};
typedef struct {
uint32_t id;
CRYPT_MAC_ID macId;
union {
CRYPT_MD_AlgId mdId;
CRYPT_SYM_AlgId symId;
};
} EAL_MacAlgMap;
static const EAL_MacAlgMap CID_MAC_ALG_MAP[] = {
#ifdef HITLS_CRYPTO_HMAC
{.id = CRYPT_MAC_HMAC_MD5, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_MD5},
{.id = CRYPT_MAC_HMAC_SHA1, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA1},
{.id = CRYPT_MAC_HMAC_SHA224, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA224},
{.id = CRYPT_MAC_HMAC_SHA256, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA256},
{.id = CRYPT_MAC_HMAC_SHA384, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA384},
{.id = CRYPT_MAC_HMAC_SHA512, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA512},
{.id = CRYPT_MAC_HMAC_SHA3_224, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA3_224},
{.id = CRYPT_MAC_HMAC_SHA3_256, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA3_256},
{.id = CRYPT_MAC_HMAC_SHA3_384, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA3_384},
{.id = CRYPT_MAC_HMAC_SHA3_512, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SHA3_512},
{.id = CRYPT_MAC_HMAC_SM3, .macId = CRYPT_MAC_HMAC, .mdId = CRYPT_MD_SM3},
#endif // HITLS_CRYPTO_HMAC
#ifdef HITLS_CRYPTO_CMAC_AES
{.id = CRYPT_MAC_CMAC_AES128, .macId = CRYPT_MAC_CMAC, .symId = CRYPT_SYM_AES128},
{.id = CRYPT_MAC_CMAC_AES192, .macId = CRYPT_MAC_CMAC, .symId = CRYPT_SYM_AES192},
{.id = CRYPT_MAC_CMAC_AES256, .macId = CRYPT_MAC_CMAC, .symId = CRYPT_SYM_AES256},
#endif
#ifdef HITLS_CRYPTO_CMAC_SM4
{.id = CRYPT_MAC_CMAC_SM4, .macId = CRYPT_MAC_CMAC, .symId = CRYPT_SYM_SM4},
#endif
#ifdef HITLS_CRYPTO_CBC_MAC
{.id = CRYPT_MAC_CBC_MAC_SM4, .macId = CRYPT_MAC_CBC_MAC, .symId = CRYPT_SYM_SM4},
#endif
#ifdef HITLS_CRYPTO_GMAC
{.id = CRYPT_MAC_GMAC_AES128, .macId = CRYPT_MAC_GMAC, .symId = CRYPT_SYM_AES128},
{.id = CRYPT_MAC_GMAC_AES192, .macId = CRYPT_MAC_GMAC, .symId = CRYPT_SYM_AES192},
{.id = CRYPT_MAC_GMAC_AES256, .macId = CRYPT_MAC_GMAC, .symId = CRYPT_SYM_AES256},
#endif
#ifdef HITLS_CRYPTO_SIPHASH
{.id = CRYPT_MAC_SIPHASH64, .macId = CRYPT_MAC_SIPHASH},
{.id = CRYPT_MAC_SIPHASH128, .macId = CRYPT_MAC_SIPHASH}
#endif
};
static const EAL_MacAlgMap *EAL_FindMacAlgMap(CRYPT_MAC_AlgId id)
{
uint32_t num = sizeof(CID_MAC_ALG_MAP) / sizeof(CID_MAC_ALG_MAP[0]);
const EAL_MacAlgMap *macAlgMap = NULL;
for (uint32_t i = 0; i < num; i++) {
if (CID_MAC_ALG_MAP[i].id == id) {
macAlgMap = &CID_MAC_ALG_MAP[i];
break;
}
}
return macAlgMap;
}
#if defined(HITLS_CRYPTO_CMAC) || defined(HITLS_CRYPTO_CBC_MAC) || defined(HITLS_CRYPTO_GMAC)
static int32_t ConvertSymId2CipherId(CRYPT_SYM_AlgId algId)
{
switch (algId) {
case CRYPT_SYM_AES128:
return CRYPT_CIPHER_AES128_ECB;
case CRYPT_SYM_AES192:
return CRYPT_CIPHER_AES192_ECB;
case CRYPT_SYM_AES256:
return CRYPT_CIPHER_AES256_ECB;
case CRYPT_SYM_SM4:
return CRYPT_CIPHER_SM4_XTS;
default:
return CRYPT_CIPHER_MAX;
}
}
#endif
const EAL_MacMethod *EAL_MacFindDefaultMethod(CRYPT_MAC_AlgId id)
{
const EAL_MacAlgMap *macAlgMap = EAL_FindMacAlgMap(id);
if (macAlgMap == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID);
return NULL;
}
return g_macMethods[macAlgMap->macId];
}
EAL_MacMethod *EAL_MacFindMethod(CRYPT_MAC_AlgId id, EAL_MacMethod *method)
{
EAL_MacMethod *retMethod = method;
const EAL_MacMethod *findMethod = EAL_MacFindDefaultMethod(id);
if (findMethod == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID);
return NULL;
}
if (retMethod == NULL) {
retMethod = BSL_SAL_Malloc(sizeof(EAL_MacMethod));
if (retMethod == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)memset_s(retMethod, sizeof(EAL_MacMethod), 0, sizeof(EAL_MacMethod));
}
*retMethod = *findMethod;
return retMethod;
}
#ifdef HITLS_CRYPTO_PROVIDER
static int32_t SetMacMethod(const CRYPT_EAL_Func *funcs, EAL_MacMethod *method)
{
int32_t index = 0;
while (funcs[index].id != 0) {
switch (funcs[index].id) {
case CRYPT_EAL_IMPLMAC_NEWCTX:
method->newCtx = funcs[index].func;
break;
case CRYPT_EAL_IMPLMAC_INIT:
method->init = funcs[index].func;
break;
case CRYPT_EAL_IMPLMAC_UPDATE:
method->update = funcs[index].func;
break;
case CRYPT_EAL_IMPLMAC_FINAL:
method->final = funcs[index].func;
break;
case CRYPT_EAL_IMPLMAC_REINITCTX:
method->reinit = funcs[index].func;
break;
case CRYPT_EAL_IMPLMAC_DEINITCTX:
method->deinit = funcs[index].func;
break;
case CRYPT_EAL_IMPLMAC_CTRL:
method->ctrl = funcs[index].func;
break;
case CRYPT_EAL_IMPLMAC_FREECTX:
method->freeCtx = funcs[index].func;
break;
case CRYPT_EAL_IMPLMAC_SETPARAM:
method->setParam = funcs[index].func;
break;
default:
BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL);
return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL;
}
index++;
}
return CRYPT_SUCCESS;
}
static EAL_MacMethod *EAL_ProviderMacFindMethod(CRYPT_MAC_AlgId id, void *libCtx, const char *attrName,
EAL_MacMethod *method, void **provCtx)
{
EAL_MacMethod *retMethod = method;
const CRYPT_EAL_Func *funcs = NULL;
int32_t ret = CRYPT_EAL_ProviderGetFuncs(libCtx, CRYPT_EAL_OPERAID_MAC, id, attrName, &funcs, provCtx);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return NULL;
}
if (method == NULL) {
retMethod = (EAL_MacMethod *)BSL_SAL_Malloc(sizeof(EAL_MacMethod));
if (retMethod == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)memset_s(retMethod, sizeof(EAL_MacMethod), 0, sizeof(EAL_MacMethod));
}
ret = SetMacMethod(funcs, retMethod);
if (ret != CRYPT_SUCCESS) {
if (retMethod != method) {
BSL_SAL_Free(retMethod);
}
return NULL;
}
return retMethod;
}
#endif // HITLS_CRYPTO_PROVIDER
EAL_MacMethod *EAL_MacFindMethodEx(CRYPT_MAC_AlgId id, void *libCtx, const char *attrName, EAL_MacMethod *method,
void **provCtx)
{
#ifdef HITLS_CRYPTO_PROVIDER
return EAL_ProviderMacFindMethod(id, libCtx, attrName, method, provCtx);
#else
(void)libCtx;
(void)attrName;
(void)provCtx;
return EAL_MacFindMethod(id, method);
#endif
}
int32_t EAL_MacFindDepMethod(CRYPT_MAC_AlgId macId, void *libCtx, const char *attrName, EAL_MacDepMethod *depMeth,
void **provCtx, bool isProvider)
{
(void)libCtx;
(void)attrName;
(void)provCtx;
(void)isProvider;
const EAL_MacAlgMap *macAlgMap = EAL_FindMacAlgMap(macId);
if (macAlgMap == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID);
return CRYPT_EAL_ERR_ALGID;
}
#ifdef HITLS_CRYPTO_HMAC
EAL_MdMethod *mdMethod = NULL;
#endif
switch (macAlgMap->macId) {
#ifdef HITLS_CRYPTO_HMAC
case CRYPT_MAC_HMAC:
depMeth->id.mdId = macAlgMap->mdId;
mdMethod = isProvider ? EAL_MdFindMethodEx(macAlgMap->mdId, libCtx, attrName, depMeth->method.md, provCtx)
: EAL_MdFindMethod(macAlgMap->mdId, depMeth->method.md);
if (mdMethod == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID);
return CRYPT_EAL_ERR_ALGID;
}
if (depMeth->method.md == NULL) {
// if the md pointer is NULL, the md method will be allocated. The caller should free the md method.
depMeth->method.md = mdMethod;
} // if the md pointer is not NULL, the md method has been overwritten before.
return CRYPT_SUCCESS;
#endif
#if defined(HITLS_CRYPTO_CMAC) || defined(HITLS_CRYPTO_CBC_MAC) || defined(HITLS_CRYPTO_GMAC)
case CRYPT_MAC_CMAC:
case CRYPT_MAC_CBC_MAC:
case CRYPT_MAC_GMAC:
depMeth->id.symId = macAlgMap->symId;
// sym method is get from global, so no need to free it.
depMeth->method.sym = EAL_GetSymMethod(ConvertSymId2CipherId(macAlgMap->symId));
break;
#endif
#ifdef HITLS_CRYPTO_SIPHASH
case CRYPT_MAC_SIPHASH:
// sip method is get from global, so no need to free it.
depMeth->method.sip = (macId == CRYPT_MAC_SIPHASH64) ? &g_siphash64Meth : &g_siphash128Meth;
break;
#endif
default:
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID);
return CRYPT_EAL_ERR_ALGID;
}
if (depMeth->method.sym == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID);
return CRYPT_EAL_ERR_ALGID;
}
return CRYPT_SUCCESS;
}
#endif
|
2301_79861745/bench_create
|
crypto/eal/src/eal_mac_method.c
|
C
|
unknown
| 12,428
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MD)
#include <stdio.h>
#include <stdlib.h>
#include "securec.h"
#include "bsl_err_internal.h"
#include "bsl_sal.h"
#include "crypt_local_types.h"
#include "crypt_eal_md.h"
#include "crypt_algid.h"
#include "crypt_errno.h"
#include "eal_md_local.h"
#include "eal_common.h"
#include "crypt_ealinit.h"
#ifdef HITLS_CRYPTO_PROVIDER
#include "crypt_eal_implprovider.h"
#include "crypt_provider.h"
#endif
static CRYPT_EAL_MdCTX *MdNewCtxInner(CRYPT_MD_AlgId id, CRYPT_EAL_LibCtx *libCtx, const char *attrName, bool isProvider)
{
EAL_MdMethod *method = NULL;
CRYPT_EAL_MdCTX *ctx = BSL_SAL_Malloc(sizeof(CRYPT_EAL_MdCTX));
if (ctx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
void *provCtx = NULL;
// The ctx->method will be overwritten if the method is found.
(void)memset_s(&ctx->method, sizeof(ctx->method), 0, sizeof(ctx->method));
if (!isProvider) {
method = EAL_MdFindMethod(id, &ctx->method);
} else {
method = EAL_MdFindMethodEx(id, libCtx, attrName, &ctx->method, &provCtx);
}
if (method == NULL) {
BSL_SAL_Free(ctx);
return NULL;
}
if (ctx->method.newCtx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_NULL_INPUT);
BSL_SAL_Free(ctx);
return NULL;
}
void *data = ctx->method.newCtx(provCtx, id);
if (data == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_MEM_ALLOC_FAIL);
BSL_SAL_Free(ctx);
return NULL;
}
ctx->id = id;
ctx->state = CRYPT_MD_STATE_NEW;
ctx->data = data;
return ctx;
}
CRYPT_EAL_MdCTX *CRYPT_EAL_ProviderMdNewCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName)
{
return MdNewCtxInner(algId, libCtx, attrName, true);
}
CRYPT_EAL_MdCTX *CRYPT_EAL_MdNewCtx(CRYPT_MD_AlgId id)
{
#ifdef HITLS_CRYPTO_ASM_CHECK
if (CRYPT_ASMCAP_Md(id) != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return NULL;
}
#endif
return MdNewCtxInner(id, NULL, NULL, false);
}
bool CRYPT_EAL_MdIsValidAlgId(CRYPT_MD_AlgId id)
{
return EAL_MdFindDefaultMethod(id) != NULL;
}
int32_t CRYPT_EAL_MdGetId(CRYPT_EAL_MdCTX *ctx)
{
if (ctx == NULL) {
return CRYPT_MD_MAX;
}
return ctx->id;
}
int32_t CRYPT_EAL_MdCopyCtx(CRYPT_EAL_MdCTX *to, const CRYPT_EAL_MdCTX *from)
{
if (to == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (from == NULL || from->method.dupCtx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (to->data != NULL) {
if (to->method.freeCtx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
to->method.freeCtx(to->data);
to->data = NULL;
}
void *data = from->method.dupCtx(from->data);
if (data == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, from->id, CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
*to = *from;
to->data = data;
return CRYPT_SUCCESS;
}
CRYPT_EAL_MdCTX *CRYPT_EAL_MdDupCtx(const CRYPT_EAL_MdCTX *ctx)
{
if (ctx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT);
return NULL;
}
if (ctx->method.dupCtx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_NULL_INPUT);
return NULL;
}
CRYPT_EAL_MdCTX *newCtx = BSL_SAL_Malloc(sizeof(CRYPT_EAL_MdCTX));
if (newCtx == NULL) {
BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL);
return NULL;
}
*newCtx = *ctx;
newCtx->data = ctx->method.dupCtx(ctx->data);
if (newCtx->data == NULL) {
BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL);
BSL_SAL_Free(newCtx);
return NULL;
}
return newCtx;
}
void CRYPT_EAL_MdFreeCtx(CRYPT_EAL_MdCTX *ctx)
{
if (ctx == NULL) {
return;
}
if (ctx->method.freeCtx != NULL) {
ctx->method.freeCtx(ctx->data);
EAL_EventReport(CRYPT_EVENT_ZERO, CRYPT_ALGO_MD, ctx->id, CRYPT_SUCCESS);
} else {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT);
}
BSL_SAL_FREE(ctx);
return;
}
int32_t CRYPT_EAL_MdInit(CRYPT_EAL_MdCTX *ctx)
{
if (ctx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->method.init == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = ctx->method.init(ctx->data, NULL);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, ret);
return ret;
}
ctx->state = CRYPT_MD_STATE_INIT;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_MdUpdate(CRYPT_EAL_MdCTX *ctx, const uint8_t *data, uint32_t len)
{
if (ctx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->method.update == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
if ((ctx->state == CRYPT_MD_STATE_FINAL) || (ctx->state == CRYPT_MD_STATE_NEW)
|| (ctx->state == CRYPT_MD_STATE_SQUEEZE)) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ERR_STATE);
return CRYPT_EAL_ERR_STATE;
}
int32_t ret = ctx->method.update(ctx->data, data, len);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, ret);
return ret;
}
ctx->state = CRYPT_MD_STATE_UPDATE;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_MdFinal(CRYPT_EAL_MdCTX *ctx, uint8_t *out, uint32_t *len)
{
if (ctx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->method.final == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
if ((ctx->state == CRYPT_MD_STATE_NEW) || (ctx->state == CRYPT_MD_STATE_FINAL) ||
(ctx->state == CRYPT_MD_STATE_SQUEEZE)) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ERR_STATE);
return CRYPT_EAL_ERR_STATE;
}
// The validity of the buffer length that carries the output result (len > ctx->method->mdSize)
// is determined by the algorithm bottom layer and is not verified here.
int32_t ret = ctx->method.final(ctx->data, out, len);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, ret);
return ret;
}
ctx->state = CRYPT_MD_STATE_FINAL;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_MdSqueeze(CRYPT_EAL_MdCTX *ctx, uint8_t *out, uint32_t len)
{
if (ctx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->method.squeeze == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
if ((ctx->state == CRYPT_MD_STATE_NEW) || (ctx->state == CRYPT_MD_STATE_FINAL)) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, CRYPT_EAL_ERR_STATE);
return CRYPT_EAL_ERR_STATE;
}
int32_t ret = ctx->method.squeeze(ctx->data, out, len);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, ret);
return ret;
}
ctx->state = CRYPT_MD_STATE_SQUEEZE;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_MdDeinit(CRYPT_EAL_MdCTX *ctx)
{
if (ctx == NULL || ctx->method.deinit == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, CRYPT_MD_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
int32_t ret = ctx->method.deinit(ctx->data);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, ctx->id, ret);
return ret;
}
ctx->state = CRYPT_MD_STATE_NEW;
return CRYPT_SUCCESS;
}
typedef struct {
CRYPT_MD_AlgId id;
uint32_t digestSize;
} CRYPT_MD_DigestSizeMap;
static const CRYPT_MD_DigestSizeMap g_mdDigestSizeMap[] = {
{CRYPT_MD_SHA1, 20},
{CRYPT_MD_SHA224, 28},
{CRYPT_MD_SHA256, 32},
{CRYPT_MD_SHA384, 48},
{CRYPT_MD_SHA512, 64},
{CRYPT_MD_SHA3_224, 28},
{CRYPT_MD_SHA3_256, 32},
{CRYPT_MD_SHA3_384, 48},
{CRYPT_MD_SHA3_512, 64},
{CRYPT_MD_SHAKE128, 0},
{CRYPT_MD_SHAKE256, 0},
{CRYPT_MD_SM3, 32},
{CRYPT_MD_MD5, 16},
};
uint32_t CRYPT_EAL_MdGetDigestSize(CRYPT_MD_AlgId id)
{
for (uint32_t i = 0; i < sizeof(g_mdDigestSizeMap) / sizeof(g_mdDigestSizeMap[0]); i++) {
if (g_mdDigestSizeMap[i].id == id) {
return g_mdDigestSizeMap[i].digestSize;
}
}
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_EAL_ERR_ALGID);
return 0;
}
int32_t CRYPT_EAL_Md(CRYPT_MD_AlgId id, const uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen)
{
return EAL_Md(id, NULL, NULL, in, inLen, out, outLen);
}
#endif
|
2301_79861745/bench_create
|
crypto/eal/src/eal_md.c
|
C
|
unknown
| 10,152
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef EAL_MD_LOCAL_H
#define EAL_MD_LOCAL_H
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MD)
#include <stdint.h>
#include "crypt_algid.h"
#include "crypt_local_types.h"
#ifdef __cplusplus
extern "C" {
#endif // __cplusplus
typedef enum {
CRYPT_MD_STATE_NEW = 0,
CRYPT_MD_STATE_INIT,
CRYPT_MD_STATE_UPDATE,
CRYPT_MD_STATE_FINAL,
CRYPT_MD_STATE_SQUEEZE
} CRYPT_MD_WORKSTATE;
struct EAL_MdCtx {
EAL_MdMethod method; /* algorithm operation entity */
void *data; /* Algorithm ctx, mainly context */
uint32_t state;
CRYPT_MD_AlgId id;
};
/**
* @ingroup eal
* @brief Find the default MD method by the algorithm ID.
*
* @param id The algorithm ID.
*
* @return The MD method.
*/
const EAL_MdMethod *EAL_MdFindDefaultMethod(CRYPT_MD_AlgId id);
/**
* @ingroup eal
* @brief Find Md algorithm implementation method by algorithm ID
*
* This function retrieves the default implementation method for specified MD algorithm ID.
* If the input method pointer is NULL, will allocate new memory for method structure. Otherwise,
* will initialize the provided method structure.
*
* @param id [IN] MD algorithm identifier (e.g. CRYPT_MD_SHA256, CRYPT_MD_SHA384)
* @param method [IN/OUT] Pointer to method structure.
* If NULL, function will allocate new memory. Caller must free returned pointer when no longer needed.
* If not NULL, the method should be cleared before calling this function.
*
* @return Pointer to MD method structure on success. NULL on failure (invalid ID or alloc fail).
* Note: When input method is NULL, returned pointer MUST be freed by caller.
* When input method is valid, returns the same pointer with initialized contents.
*/
EAL_MdMethod *EAL_MdFindMethod(CRYPT_MD_AlgId id, EAL_MdMethod *method);
/**
* @ingroup eal
* @brief Find Md algorithm implementation method by algorithm ID with provider context
*
* This function retrieves the default implementation method for specified MD algorithm ID.
* If the input method pointer is NULL, will allocate new memory for method structure. Otherwise,
* will initialize the provided method structure.
*
* @param id [IN] MD algorithm identifier (e.g. CRYPT_MD_SHA256, CRYPT_MD_SHA384)
* @param libCtx [IN] The library context.
* @param attrName [IN] The attribute name.
* @param method [IN/OUT] Pointer to method structure.
* If NULL, function will allocate new memory. Caller must free returned pointer when no longer needed.
* If not NULL, the method should be cleared before calling this function.
* @param provCtx [OUT] The provider context.
*
* @return Pointer to MD method structure on success. NULL on failure (invalid ID or alloc fail).
* Note: When input method is NULL, returned pointer MUST be freed by caller.
* When input method is valid, returns the same pointer with initialized contents.
*/
EAL_MdMethod *EAL_MdFindMethodEx(CRYPT_MD_AlgId id, void *libCtx, const char *attrName, EAL_MdMethod *method,
void **provCtx);
/**
* @ingroup eal
* @brief Calculate the hash value
*
* @param id [IN] Algorithm ID
* @param libCtx [IN] Library context
* @param attr [IN] Attribute
* @param in [IN] Input data
* @param inLen [IN] Input data length
* @param out [OUT] Output data
* @param outLen [OUT] Output data length
*
* @return #CRYPT_SUCCESS Success.
* @return #CRYPT_EAL_ERR_ALGID Algorithm ID is invalid.
*/
int32_t EAL_Md(CRYPT_MD_AlgId id, void *libCtx, const char *attr, const uint8_t *in, uint32_t inLen, uint8_t *out,
uint32_t *outLen);
#ifdef __cplusplus
}
#endif // __cplusplus
#endif // HITLS_CRYPTO_MD
#endif // EAL_MD_LOCAL_H
|
2301_79861745/bench_create
|
crypto/eal/src/eal_md_local.h
|
C
|
unknown
| 4,333
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_MD)
#include "securec.h"
#include "crypt_local_types.h"
#include "crypt_algid.h"
#ifdef HITLS_CRYPTO_SHA2
#include "crypt_sha2.h"
#endif
#ifdef HITLS_CRYPTO_SHA1
#include "crypt_sha1.h"
#endif
#ifdef HITLS_CRYPTO_SM3
#include "crypt_sm3.h"
#endif
#ifdef HITLS_CRYPTO_SHA3
#include "crypt_sha3.h"
#endif
#ifdef HITLS_CRYPTO_MD5
#include "crypt_md5.h"
#endif
#include "bsl_err_internal.h"
#include "eal_common.h"
#include "bsl_sal.h"
#include "crypt_errno.h"
#ifdef HITLS_CRYPTO_PROVIDER
#include "crypt_eal_provider.h"
#include "crypt_eal_implprovider.h"
#endif
typedef struct {
uint32_t id;
EAL_MdMethod *mdMeth;
} EAL_CidToMdMeth;
#define CRYPT_MD_IMPL_METHOD_DECLARE(name, id) \
EAL_MdMethod g_mdMethod_##name = { \
id, \
CRYPT_##name##_BLOCKSIZE, CRYPT_##name##_DIGESTSIZE, \
(MdNewCtx)CRYPT_##name##_NewCtxEx, (MdInit)CRYPT_##name##_Init, \
(MdUpdate)CRYPT_##name##_Update, (MdFinal)CRYPT_##name##_Final, \
(MdDeinit)CRYPT_##name##_Deinit, (MdCopyCtx)CRYPT_##name##_CopyCtx, \
(MdDupCtx)CRYPT_##name##_DupCtx, (MdFreeCtx)CRYPT_##name##_FreeCtx, \
(MdGetParam)CRYPT_##name##_GetParam, (MdSqueeze)CRYPT_##name##_Squeeze \
}
#ifdef HITLS_CRYPTO_MD5
CRYPT_MD_IMPL_METHOD_DECLARE(MD5, CRYPT_MD_MD5);
#endif
#ifdef HITLS_CRYPTO_SHA1
CRYPT_MD_IMPL_METHOD_DECLARE(SHA1, CRYPT_MD_SHA1);
#endif
#ifdef HITLS_CRYPTO_SHA224
CRYPT_MD_IMPL_METHOD_DECLARE(SHA2_224, CRYPT_MD_SHA224);
#endif
#ifdef HITLS_CRYPTO_SHA256
CRYPT_MD_IMPL_METHOD_DECLARE(SHA2_256, CRYPT_MD_SHA256);
#endif
#ifdef HITLS_CRYPTO_SHA384
CRYPT_MD_IMPL_METHOD_DECLARE(SHA2_384, CRYPT_MD_SHA384);
#endif
#ifdef HITLS_CRYPTO_SHA512
CRYPT_MD_IMPL_METHOD_DECLARE(SHA2_512, CRYPT_MD_SHA512);
#endif
#ifdef HITLS_CRYPTO_SHA3
CRYPT_MD_IMPL_METHOD_DECLARE(SHA3_224, CRYPT_MD_SHA3_224);
CRYPT_MD_IMPL_METHOD_DECLARE(SHA3_256, CRYPT_MD_SHA3_256);
CRYPT_MD_IMPL_METHOD_DECLARE(SHA3_384, CRYPT_MD_SHA3_384);
CRYPT_MD_IMPL_METHOD_DECLARE(SHA3_512, CRYPT_MD_SHA3_512);
CRYPT_MD_IMPL_METHOD_DECLARE(SHAKE128, CRYPT_MD_SHAKE128);
CRYPT_MD_IMPL_METHOD_DECLARE(SHAKE256, CRYPT_MD_SHAKE256);
#endif
#ifdef HITLS_CRYPTO_SM3
CRYPT_MD_IMPL_METHOD_DECLARE(SM3, CRYPT_MD_SM3);
#endif
static const EAL_CidToMdMeth ID_TO_MD_METH_TABLE[] = {
#ifdef HITLS_CRYPTO_MD5
{CRYPT_MD_MD5, &g_mdMethod_MD5},
#endif
#ifdef HITLS_CRYPTO_SHA1
{CRYPT_MD_SHA1, &g_mdMethod_SHA1},
#endif
#ifdef HITLS_CRYPTO_SHA224
{CRYPT_MD_SHA224, &g_mdMethod_SHA2_224},
#endif
#ifdef HITLS_CRYPTO_SHA256
{CRYPT_MD_SHA256, &g_mdMethod_SHA2_256},
#endif
#ifdef HITLS_CRYPTO_SHA384
{CRYPT_MD_SHA384, &g_mdMethod_SHA2_384},
#endif
#ifdef HITLS_CRYPTO_SHA512
{CRYPT_MD_SHA512, &g_mdMethod_SHA2_512},
#endif
#ifdef HITLS_CRYPTO_SHA3
{CRYPT_MD_SHA3_224, &g_mdMethod_SHA3_224},
{CRYPT_MD_SHA3_256, &g_mdMethod_SHA3_256},
{CRYPT_MD_SHA3_384, &g_mdMethod_SHA3_384},
{CRYPT_MD_SHA3_512, &g_mdMethod_SHA3_512},
{CRYPT_MD_SHAKE128, &g_mdMethod_SHAKE128},
{CRYPT_MD_SHAKE256, &g_mdMethod_SHAKE256},
#endif
#ifdef HITLS_CRYPTO_SM3
{CRYPT_MD_SM3, &g_mdMethod_SM3},
#endif
};
const EAL_MdMethod *EAL_MdFindDefaultMethod(CRYPT_MD_AlgId id)
{
uint32_t num = sizeof(ID_TO_MD_METH_TABLE) / sizeof(ID_TO_MD_METH_TABLE[0]);
for (uint32_t i = 0; i < num; i++) {
if (ID_TO_MD_METH_TABLE[i].id == id) {
return ID_TO_MD_METH_TABLE[i].mdMeth;
}
}
return NULL;
}
EAL_MdMethod *EAL_MdFindMethod(CRYPT_MD_AlgId id, EAL_MdMethod *method)
{
EAL_MdMethod *retMethod = method;
const EAL_MdMethod *findMethod = EAL_MdFindDefaultMethod(id);
if (findMethod == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID);
return NULL;
}
if (retMethod == NULL) {
retMethod = BSL_SAL_Malloc(sizeof(EAL_MdMethod));
if (retMethod == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)memset_s(retMethod, sizeof(EAL_MdMethod), 0, sizeof(EAL_MdMethod));
}
*retMethod = *findMethod;
return retMethod;
}
#ifdef HITLS_CRYPTO_PROVIDER
static int32_t SetMdMethod(const CRYPT_EAL_Func *funcs, EAL_MdMethod *method)
{
int32_t index = 0;
while (funcs[index].id != 0) {
switch (funcs[index].id) {
case CRYPT_EAL_IMPLMD_NEWCTX:
method->newCtx = funcs[index].func;
break;
case CRYPT_EAL_IMPLMD_INITCTX:
method->init = funcs[index].func;
break;
case CRYPT_EAL_IMPLMD_UPDATE:
method->update = funcs[index].func;
break;
case CRYPT_EAL_IMPLMD_FINAL:
method->final = funcs[index].func;
break;
case CRYPT_EAL_IMPLMD_DEINITCTX:
method->deinit = funcs[index].func;
break;
case CRYPT_EAL_IMPLMD_DUPCTX:
method->dupCtx = funcs[index].func;
break;
case CRYPT_EAL_IMPLMD_GETPARAM:
method->getParam = funcs[index].func;
break;
case CRYPT_EAL_IMPLMD_FREECTX:
method->freeCtx = funcs[index].func;
break;
case CRYPT_EAL_IMPLMD_SQUEEZE:
method->squeeze = funcs[index].func;
break;
case CRYPT_EAL_IMPLMD_COPYCTX:
method->copyCtx = funcs[index].func;
break;
default:
BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL);
return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL;
}
index++;
}
return CRYPT_SUCCESS;
}
static EAL_MdMethod *EAL_ProviderMdFindMethod(CRYPT_MD_AlgId id, void *libCtx, const char *attrName,
EAL_MdMethod *method, void **provCtx)
{
EAL_MdMethod *retMethod = method;
const CRYPT_EAL_Func *funcs = NULL;
int32_t ret = CRYPT_EAL_ProviderGetFuncs(libCtx, CRYPT_EAL_OPERAID_HASH, id, attrName, &funcs, provCtx);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return NULL;
}
if (method == NULL) {
retMethod = (EAL_MdMethod *)BSL_SAL_Malloc(sizeof(EAL_MdMethod));
if (retMethod == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)memset_s(retMethod, sizeof(EAL_MdMethod), 0, sizeof(EAL_MdMethod));
}
ret = SetMdMethod(funcs, retMethod);
if (ret != CRYPT_SUCCESS) {
goto ERR;
}
if (retMethod->getParam == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_IMPL_NULL);
goto ERR;
}
BSL_Param params[] = {{0}, {0}, BSL_PARAM_END};
ret = BSL_PARAM_InitValue(¶ms[0], CRYPT_PARAM_MD_DIGEST_SIZE, BSL_PARAM_TYPE_UINT16, &retMethod->mdSize,
sizeof(retMethod->mdSize));
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
ret = BSL_PARAM_InitValue(¶ms[1], CRYPT_PARAM_MD_BLOCK_SIZE, BSL_PARAM_TYPE_UINT16, &retMethod->blockSize,
sizeof(retMethod->blockSize));
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
ret = retMethod->getParam(NULL, ¶ms[0]);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
retMethod->id = id;
return retMethod;
ERR:
if (retMethod != method) {
BSL_SAL_Free(retMethod);
}
return NULL;
}
#endif // HITLS_CRYPTO_PROVIDER
EAL_MdMethod *EAL_MdFindMethodEx(CRYPT_MD_AlgId id, void *libCtx, const char *attrName, EAL_MdMethod *method,
void **provCtx)
{
#ifdef HITLS_CRYPTO_PROVIDER
return EAL_ProviderMdFindMethod(id, libCtx, attrName, method, provCtx);
#else
(void)libCtx;
(void)attrName;
(void)provCtx;
return EAL_MdFindMethod(id, method);
#endif
}
int32_t EAL_Md(CRYPT_MD_AlgId id, void *libCtx, const char *attr, const uint8_t *in, uint32_t inLen, uint8_t *out,
uint32_t *outLen)
{
int32_t ret;
if (out == NULL || outLen == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (in == NULL && inLen != 0) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
EAL_MdMethod method = {0};
void *provCtx = NULL;
if (EAL_MdFindMethodEx(id, libCtx, attr, &method, &provCtx) == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_EAL_ERR_ALGID);
return CRYPT_EAL_ERR_ALGID;
}
if (method.newCtx == NULL || method.init == NULL || method.update == NULL || method.final == NULL ||
method.freeCtx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_EAL_MD_METH_NULL);
return CRYPT_EAL_MD_METH_NULL;
}
void *data = method.newCtx(provCtx, id);
if (data == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ret = method.init(data, NULL);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, ret);
goto EXIT;
}
if (inLen != 0) {
ret = method.update(data, in, inLen);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, ret);
goto EXIT;
}
}
ret = method.final(data, out, outLen);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_MD, id, ret);
goto EXIT;
}
if (method.mdSize != 0) {
*outLen = method.mdSize;
}
EXIT:
method.freeCtx(data);
return ret;
}
#endif
|
2301_79861745/bench_create
|
crypto/eal/src/eal_md_method.c
|
C
|
unknown
| 10,583
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY)
#include <securec.h>
#include "bsl_sal.h"
#include "crypt_errno.h"
#include "bsl_err_internal.h"
#include "eal_pkey_local.h"
#include "crypt_eal_pkey.h"
#include "eal_common.h"
int32_t CRYPT_EAL_PkeyComputeShareKey(const CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyCtx *pubKey,
uint8_t *share, uint32_t *shareLen)
{
if (pkey == NULL || pubKey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->id != pubKey->id) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_EAL_ERR_ALGID);
return CRYPT_EAL_ERR_ALGID;
}
if (pkey->method == NULL || pkey->method->computeShareKey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = pkey->method->computeShareKey(pkey->key, pubKey->key, share, shareLen);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, ret);
}
return ret;
}
#endif
|
2301_79861745/bench_create
|
crypto/eal/src/eal_pkey_computesharekey.c
|
C
|
unknown
| 1,751
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY)
#include <stdbool.h>
#include <securec.h>
#include "bsl_sal.h"
#include "crypt_eal_pkey.h"
#include "crypt_errno.h"
#include "eal_pkey_local.h"
#include "crypt_algid.h"
#include "bsl_err_internal.h"
#include "eal_common.h"
int32_t CRYPT_EAL_PkeyEncrypt(const CRYPT_EAL_PkeyCtx *pkey, const uint8_t *data, uint32_t dataLen,
uint8_t *out, uint32_t *outLen)
{
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->encrypt == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
return pkey->method->encrypt(pkey->key, data, dataLen, out, outLen);
}
int32_t CRYPT_EAL_PkeyDecrypt(const CRYPT_EAL_PkeyCtx *pkey, const uint8_t *data, uint32_t dataLen,
uint8_t *out, uint32_t *outLen)
{
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->decrypt == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
return pkey->method->decrypt(pkey->key, data, dataLen, out, outLen);
}
int32_t CRYPT_EAL_PkeyPairCheck(CRYPT_EAL_PkeyCtx *pubKey, CRYPT_EAL_PkeyCtx *prvKey)
{
if ((pubKey == NULL) || (prvKey == NULL)) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pubKey->method == NULL || prvKey->method == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pubKey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_NULL_INPUT;
}
if (pubKey->method->check == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pubKey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
return pubKey->method->check(CRYPT_PKEY_CHECK_KEYPAIR, pubKey->key, prvKey->key);
}
int32_t CRYPT_EAL_PkeyPrvCheck(CRYPT_EAL_PkeyCtx *prvKey)
{
if (prvKey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (prvKey->method == NULL || prvKey->method->check == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, prvKey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_NULL_INPUT;
}
return prvKey->method->check(CRYPT_PKEY_CHECK_PRVKEY, prvKey->key, NULL);
}
int32_t CRYPT_EAL_PkeyHEAdd(const CRYPT_EAL_PkeyCtx *pkey, const BSL_Param *input, uint8_t *out, uint32_t *outLen)
{
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->headd == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
return pkey->method->headd(pkey->key, input, out, outLen);
}
int32_t CRYPT_EAL_PkeyHEMul(const CRYPT_EAL_PkeyCtx *pkey, const BSL_Param *input, uint8_t *out, uint32_t *outLen)
{
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->hemul == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
return pkey->method->hemul(pkey->key, input, out, outLen);
}
#endif
|
2301_79861745/bench_create
|
crypto/eal/src/eal_pkey_crypt.c
|
C
|
unknown
| 4,356
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY)
#include <stdlib.h>
#include <stdbool.h>
#include "securec.h"
#include "eal_pkey_local.h"
#include "crypt_eal_pkey.h"
#include "crypt_errno.h"
#include "crypt_algid.h"
#include "crypt_local_types.h"
#include "crypt_types.h"
#include "bsl_sal.h"
#include "bsl_err_internal.h"
#include "crypt_utils.h"
#include "eal_md_local.h"
#include "eal_common.h"
#include "crypt_eal_implprovider.h"
#include "crypt_ealinit.h"
#include "bsl_err_internal.h"
#include "crypt_provider.h"
#include "bsl_params.h"
#include "crypt_params_key.h"
#include "eal_pkey.h"
static void EalPkeyCopyMethod(const EAL_PkeyMethod *method, EAL_PkeyUnitaryMethod *dest)
{
dest->newCtx = method->newCtx;
dest->dupCtx = method->dupCtx;
dest->freeCtx = method->freeCtx;
dest->setPara = method->setPara;
dest->getPara = method->getPara;
dest->gen = method->gen;
dest->ctrl = method->ctrl;
dest->setPub = method->setPub;
dest->setPrv = method->setPrv;
dest->getPub = method->getPub;
dest->getPrv = method->getPrv;
dest->sign = method->sign;
dest->signData = method->signData;
dest->verify = method->verify;
dest->verifyData = method->verifyData;
dest->recover = method->recover;
dest->computeShareKey = method->computeShareKey;
dest->encrypt = method->encrypt;
dest->decrypt = method->decrypt;
dest->headd = method->headd;
dest->hemul = method->hemul;
dest->check = method->check;
dest->cmp = method->cmp;
dest->encaps = method->encaps;
dest->decaps = method->decaps;
dest->blind = method->blind;
dest->unBlind = method->unBlind;
}
CRYPT_EAL_PkeyCtx *PkeyNewDefaultCtx(CRYPT_PKEY_AlgId id)
{
/* Obtain the method based on the algorithm ID. */
const EAL_PkeyMethod *method = CRYPT_EAL_PkeyFindMethod(id);
if (method == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, id, CRYPT_EAL_ERR_ALGID);
return NULL;
}
EAL_PkeyUnitaryMethod *temp = BSL_SAL_Calloc(1, sizeof(EAL_PkeyUnitaryMethod));
if (temp == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, id, CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
EalPkeyCopyMethod(method, temp);
/* Resource application and initialization */
CRYPT_EAL_PkeyCtx *pkey = BSL_SAL_Calloc(1, sizeof(CRYPT_EAL_PkeyCtx));
if (pkey == NULL) {
BSL_SAL_FREE(temp);
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, id, CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
pkey->key = method->newCtx();
if (pkey->key == NULL) {
BSL_SAL_FREE(temp);
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, id, CRYPT_MEM_ALLOC_FAIL);
goto ERR;
}
pkey->method = temp;
pkey->id = id;
BSL_SAL_ReferencesInit(&(pkey->references));
return pkey;
ERR:
CRYPT_EAL_PkeyFreeCtx(pkey);
return NULL;
}
CRYPT_EAL_PkeyCtx *CRYPT_EAL_PkeyNewCtx(CRYPT_PKEY_AlgId id)
{
#ifdef HITLS_CRYPTO_ASM_CHECK
if (CRYPT_ASMCAP_Pkey(id) != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, id, CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return NULL;
}
#endif
return PkeyNewDefaultCtx(id);
}
static int32_t PkeyCopyCtx(CRYPT_EAL_PkeyCtx *to, const CRYPT_EAL_PkeyCtx *from)
{
if (from->method == NULL || from->method->dupCtx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, from->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
EAL_PkeyUnitaryMethod *temp = to->method;
(void)memcpy_s(to, sizeof(CRYPT_EAL_PkeyCtx), from, sizeof(CRYPT_EAL_PkeyCtx));
to->key = from->method->dupCtx(from->key);
if (to->key == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, from->id, CRYPT_EAL_PKEY_DUP_ERROR);
return CRYPT_EAL_PKEY_DUP_ERROR;
}
if (temp == NULL) {
temp = BSL_SAL_Calloc(1, sizeof(EAL_PkeyUnitaryMethod));
if (temp == NULL) {
from->method->freeCtx(to->key);
to->key = NULL;
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, from->id, CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
}
to->method = temp;
*(EAL_PkeyUnitaryMethod *)(uintptr_t)to->method = *from->method;
BSL_SAL_ReferencesInit(&(to->references));
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_PkeyCopyCtx(CRYPT_EAL_PkeyCtx *to, const CRYPT_EAL_PkeyCtx *from)
{
if (to == NULL || from == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (to->key != NULL) {
if (to->method->freeCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
to->method->freeCtx(to->key);
to->key = NULL;
}
BSL_SAL_ReferencesFree(&(to->references));
return PkeyCopyCtx(to, from);
}
CRYPT_EAL_PkeyCtx *CRYPT_EAL_PkeyDupCtx(const CRYPT_EAL_PkeyCtx *pkey)
{
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return NULL;
}
CRYPT_EAL_PkeyCtx *newPkey = BSL_SAL_Calloc(1, sizeof(CRYPT_EAL_PkeyCtx));
if (newPkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
if (PkeyCopyCtx(newPkey, pkey) != CRYPT_SUCCESS) {
BSL_SAL_FREE(newPkey);
return NULL;
}
return newPkey;
}
void CRYPT_EAL_PkeyFreeCtx(CRYPT_EAL_PkeyCtx *pkey)
{
if (pkey == NULL) {
return;
}
if (pkey->method == NULL || pkey->method->freeCtx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
BSL_SAL_ReferencesFree(&(pkey->references));
BSL_SAL_FREE(pkey->method);
BSL_SAL_FREE(pkey);
return;
}
int ref = 0;
BSL_SAL_AtomicDownReferences(&(pkey->references), &ref);
if (ref > 0) {
return;
}
BSL_SAL_ReferencesFree(&(pkey->references));
pkey->method->freeCtx(pkey->key);
BSL_SAL_FREE(pkey->method);
BSL_SAL_FREE(pkey);
return;
}
static int32_t ParaIsVaild(const CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyPara *para)
{
bool isInputValid = (pkey == NULL) || (para == NULL);
if (isInputValid) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->id != para->id) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID);
return CRYPT_EAL_ERR_ALGID;
}
return CRYPT_SUCCESS;
}
static int32_t SetDsaParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_DsaPara *dsaPara)
{
BSL_Param param[4] = {
{CRYPT_PARAM_DSA_P, BSL_PARAM_TYPE_OCTETS, dsaPara->p, dsaPara->pLen, 0},
{CRYPT_PARAM_DSA_Q, BSL_PARAM_TYPE_OCTETS, dsaPara->q, dsaPara->qLen, 0},
{CRYPT_PARAM_DSA_G, BSL_PARAM_TYPE_OCTETS, dsaPara->g, dsaPara->gLen, 0},
BSL_PARAM_END
};
return pkey->method->setPara(pkey->key, param);
}
static int32_t SetRsaParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_RsaPara *rsaPara)
{
uint32_t bits = rsaPara->bits;
BSL_Param param[] = {
{CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, rsaPara->e, rsaPara->eLen, 0},
{CRYPT_PARAM_RSA_BITS, BSL_PARAM_TYPE_UINT32, &bits, sizeof(bits), 0},
BSL_PARAM_END
};
return pkey->method->setPara(pkey->key, param);
}
static int32_t SetDhParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_DhPara *dhPara)
{
BSL_Param param[4] = {
{CRYPT_PARAM_DH_P, BSL_PARAM_TYPE_OCTETS, dhPara->p, dhPara->pLen, 0},
{CRYPT_PARAM_DH_Q, BSL_PARAM_TYPE_OCTETS, dhPara->q, dhPara->qLen, 0},
{CRYPT_PARAM_DH_G, BSL_PARAM_TYPE_OCTETS, dhPara->g, dhPara->gLen, 0},
BSL_PARAM_END
};
return pkey->method->setPara(pkey->key, param);
}
static int32_t SetEccParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EccPara *eccPara)
{
BSL_Param param[8] = {
{CRYPT_PARAM_EC_P, BSL_PARAM_TYPE_OCTETS, eccPara->p, eccPara->pLen, 0},
{CRYPT_PARAM_EC_A, BSL_PARAM_TYPE_OCTETS, eccPara->a, eccPara->aLen, 0},
{CRYPT_PARAM_EC_B, BSL_PARAM_TYPE_OCTETS, eccPara->b, eccPara->bLen, 0},
{CRYPT_PARAM_EC_N, BSL_PARAM_TYPE_OCTETS, eccPara->n, eccPara->nLen, 0},
{CRYPT_PARAM_EC_H, BSL_PARAM_TYPE_OCTETS, eccPara->h, eccPara->hLen, 0},
{CRYPT_PARAM_EC_X, BSL_PARAM_TYPE_OCTETS, eccPara->x, eccPara->xLen, 0},
{CRYPT_PARAM_EC_Y, BSL_PARAM_TYPE_OCTETS, eccPara->y, eccPara->yLen, 0},
BSL_PARAM_END
};
return pkey->method->setPara(pkey->key, param);
}
static int32_t SetPaillierParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_PaillierPara *paillierPara)
{
uint32_t bits = paillierPara->bits;
BSL_Param param[4] = {
{CRYPT_PARAM_PAILLIER_P, BSL_PARAM_TYPE_OCTETS, paillierPara->p, paillierPara->pLen, 0},
{CRYPT_PARAM_PAILLIER_Q, BSL_PARAM_TYPE_OCTETS, paillierPara->q, paillierPara->qLen, 0},
{CRYPT_PARAM_PAILLIER_BITS, BSL_PARAM_TYPE_UINT32, &bits, sizeof(bits), 0},
BSL_PARAM_END
};
return pkey->method->setPara(pkey->key, param);
}
static int32_t SetElGamalParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_ElGamalPara *elgamalPara)
{
uint32_t bits = elgamalPara->bits;
uint32_t k_bits = elgamalPara->k_bits;
BSL_Param param[4] = {
{CRYPT_PARAM_ELGAMAL_Q, BSL_PARAM_TYPE_OCTETS, elgamalPara->q, elgamalPara->qLen, 0},
{CRYPT_PARAM_ELGAMAL_BITS, BSL_PARAM_TYPE_UINT32, &bits, sizeof(bits), 0},
{CRYPT_PARAM_ELGAMAL_KBITS, BSL_PARAM_TYPE_UINT32, &k_bits, sizeof(k_bits), 0},
BSL_PARAM_END
};
return pkey->method->setPara(pkey->key, param);
}
static int32_t GetDsaParams(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_DsaPara *dsaPara)
{
BSL_Param param[4] = {
{CRYPT_PARAM_DSA_P, BSL_PARAM_TYPE_OCTETS, dsaPara->p, dsaPara->pLen, 0},
{CRYPT_PARAM_DSA_Q, BSL_PARAM_TYPE_OCTETS, dsaPara->q, dsaPara->qLen, 0},
{CRYPT_PARAM_DSA_G, BSL_PARAM_TYPE_OCTETS, dsaPara->g, dsaPara->gLen, 0},
BSL_PARAM_END
};
int32_t ret = pkey->method->getPara(pkey->key, param);
if (ret == CRYPT_SUCCESS) {
dsaPara->pLen = param[0].useLen;
dsaPara->qLen = param[1].useLen;
dsaPara->gLen = param[2].useLen;
}
return ret;
}
static int32_t GetDhParams(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_DhPara *dhPara)
{
BSL_Param param[4] = {
{CRYPT_PARAM_DH_P, BSL_PARAM_TYPE_OCTETS, dhPara->p, dhPara->pLen, 0},
{CRYPT_PARAM_DH_Q, BSL_PARAM_TYPE_OCTETS, dhPara->q, dhPara->qLen, 0},
{CRYPT_PARAM_DH_G, BSL_PARAM_TYPE_OCTETS, dhPara->g, dhPara->gLen, 0},
BSL_PARAM_END
};
int32_t ret = pkey->method->getPara(pkey->key, param);
if (ret == CRYPT_SUCCESS) {
dhPara->pLen = param[0].useLen;
dhPara->qLen = param[1].useLen;
dhPara->gLen = param[2].useLen;
}
return ret;
}
static int32_t GetEccParams(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EccPara *eccPara)
{
BSL_Param param[8] = {
{CRYPT_PARAM_EC_P, BSL_PARAM_TYPE_OCTETS, eccPara->p, eccPara->pLen, 0},
{CRYPT_PARAM_EC_A, BSL_PARAM_TYPE_OCTETS, eccPara->a, eccPara->aLen, 0},
{CRYPT_PARAM_EC_B, BSL_PARAM_TYPE_OCTETS, eccPara->b, eccPara->bLen, 0},
{CRYPT_PARAM_EC_N, BSL_PARAM_TYPE_OCTETS, eccPara->n, eccPara->nLen, 0},
{CRYPT_PARAM_EC_H, BSL_PARAM_TYPE_OCTETS, eccPara->h, eccPara->hLen, 0},
{CRYPT_PARAM_EC_X, BSL_PARAM_TYPE_OCTETS, eccPara->x, eccPara->xLen, 0},
{CRYPT_PARAM_EC_Y, BSL_PARAM_TYPE_OCTETS, eccPara->y, eccPara->yLen, 0},
BSL_PARAM_END
};
int32_t ret = pkey->method->getPara(pkey->key, param);
if (ret == CRYPT_SUCCESS) {
eccPara->pLen = param[0].useLen;
eccPara->aLen = param[1].useLen;
eccPara->bLen = param[2].useLen;
eccPara->nLen = param[3].useLen;
eccPara->hLen = param[4].useLen;
eccPara->xLen = param[5].useLen;
eccPara->yLen = param[6].useLen;
}
return ret;
}
static int32_t CvtBslParamAndSetParams(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyPara *para)
{
int32_t ret = CRYPT_NOT_SUPPORT;
switch (pkey->id) {
case CRYPT_PKEY_DSA:
ret = SetDsaParams(pkey, ¶->para.dsaPara);
break;
case CRYPT_PKEY_RSA:
ret = SetRsaParams(pkey, ¶->para.rsaPara);
break;
case CRYPT_PKEY_DH:
ret = SetDhParams(pkey, ¶->para.dhPara);
break;
case CRYPT_PKEY_ECDSA:
case CRYPT_PKEY_ECDH:
ret = SetEccParams(pkey, ¶->para.eccPara);
break;
case CRYPT_PKEY_PAILLIER:
ret = SetPaillierParams(pkey, ¶->para.paillierPara);
break;
case CRYPT_PKEY_ELGAMAL:
ret = SetElGamalParams(pkey, ¶->para.elgamalPara);
break;
case CRYPT_PKEY_ED25519:
case CRYPT_PKEY_X25519:
case CRYPT_PKEY_SM2:
default:
return CRYPT_NOT_SUPPORT;
}
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
static int32_t CvtBslParamAndGetParams(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_PkeyPara *para)
{
int32_t ret = CRYPT_NOT_SUPPORT;
switch (pkey->id) {
case CRYPT_PKEY_DSA:
ret = GetDsaParams(pkey, ¶->para.dsaPara);
break;
case CRYPT_PKEY_DH:
ret = GetDhParams(pkey, ¶->para.dhPara);
break;
case CRYPT_PKEY_ECDSA:
case CRYPT_PKEY_ECDH:
ret = GetEccParams(pkey, ¶->para.eccPara);
break;
case CRYPT_PKEY_PAILLIER:
case CRYPT_PKEY_ELGAMAL:
case CRYPT_PKEY_RSA:
case CRYPT_PKEY_ED25519:
case CRYPT_PKEY_X25519:
case CRYPT_PKEY_SM2:
default:
return CRYPT_NOT_SUPPORT;
}
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
int32_t CRYPT_EAL_PkeySetPara(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyPara *para)
{
int32_t ret;
ret = ParaIsVaild(pkey, para);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, ret);
return ret;
}
if (pkey->method == NULL || pkey->method->setPara == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
ret = CvtBslParamAndSetParams(pkey, para);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
int32_t CRYPT_EAL_PkeySetParaEx(CRYPT_EAL_PkeyCtx *pkey, const BSL_Param *param)
{
if (pkey == NULL || param == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->setPara == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = pkey->method->setPara(pkey->key, param);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
int32_t CRYPT_EAL_PkeyGetPara(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_PkeyPara *para)
{
int32_t ret;
ret = ParaIsVaild(pkey, para);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, ret);
return ret;
}
if (pkey->method == NULL || pkey->method->getPara == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
ret = CvtBslParamAndGetParams(pkey, para);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
int32_t CRYPT_EAL_PkeyCtrl(CRYPT_EAL_PkeyCtx *pkey, int32_t opt, void *val, uint32_t len)
{
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->ctrl == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = pkey->method->ctrl(pkey->key, opt, val, len);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
int32_t CRYPT_EAL_PkeySetParaById(CRYPT_EAL_PkeyCtx *pkey, CRYPT_PKEY_ParaId id)
{
return CRYPT_EAL_PkeyCtrl(pkey, CRYPT_CTRL_SET_PARA_BY_ID, &id, sizeof(id));
}
int32_t CRYPT_EAL_PkeyGen(CRYPT_EAL_PkeyCtx *pkey)
{
int32_t ret;
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->gen == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
/* Invoke the algorithm entity to generate a key pair. */
ret = pkey->method->gen(pkey->key);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
return ret;
}
return CRYPT_SUCCESS;
}
static int32_t PriAndPubParamIsValid(const CRYPT_EAL_PkeyCtx *pkey, const void *key, bool isPriKey)
{
bool isInputValid = (pkey == NULL) || (key == NULL);
if (isInputValid) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
// false indicates the public key path, and true indicates the private key path
if (isPriKey == false) {
CRYPT_EAL_PkeyPub *keyParam = (CRYPT_EAL_PkeyPub *)(uintptr_t)key;
if (keyParam->id != pkey->id) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ERR_ALGID);
return CRYPT_EAL_ERR_ALGID;
}
} else {
CRYPT_EAL_PkeyPrv *keyParam = (CRYPT_EAL_PkeyPrv *)(uintptr_t)key;
if (keyParam->id != pkey->id) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ERR_ALGID);
return CRYPT_EAL_ERR_ALGID;
}
}
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_PkeySetPub(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyPub *key)
{
int32_t ret = PriAndPubParamIsValid(pkey, key, false);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, (pkey == NULL) ? CRYPT_PKEY_MAX : pkey->id, ret);
return ret;
}
if (pkey->method == NULL || pkey->method->setPub == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
switch (key->id) {
case CRYPT_PKEY_RSA: {
BSL_Param rsa[3] = {{CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, key->key.rsaPub.e, key->key.rsaPub.eLen, 0},
{CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, key->key.rsaPub.n, key->key.rsaPub.nLen, 0}, BSL_PARAM_END};
ret = pkey->method->setPub(pkey->key, &rsa);
break;
}
case CRYPT_PKEY_DSA: {
BSL_Param dsa[2] = {{CRYPT_PARAM_DSA_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.dsaPub.data,
key->key.dsaPub.len, 0}, BSL_PARAM_END};
ret = pkey->method->setPub(pkey->key, &dsa);
break;
}
case CRYPT_PKEY_ED25519:
case CRYPT_PKEY_X25519: {
BSL_Param para[2] = {{CRYPT_PARAM_CURVE25519_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.curve25519Pub.data,
key->key.curve25519Pub.len, 0}, BSL_PARAM_END};
ret = pkey->method->setPub(pkey->key, ¶);
break;
}
case CRYPT_PKEY_DH: {
BSL_Param dhParam[2] = {{CRYPT_PARAM_DH_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.dhPub.data,
key->key.dhPub.len, 0}, BSL_PARAM_END};
ret = pkey->method->setPub(pkey->key, &dhParam);
break;
}
case CRYPT_PKEY_ECDH:
case CRYPT_PKEY_ECDSA:
case CRYPT_PKEY_SM2: {
BSL_Param ecParam[2] = {{CRYPT_PARAM_EC_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.eccPub.data,
key->key.eccPub.len, 0}, BSL_PARAM_END};
ret = pkey->method->setPub(pkey->key, &ecParam);
break;
}
case CRYPT_PKEY_PAILLIER: {
BSL_Param paParam[4] = {{CRYPT_PARAM_PAILLIER_N, BSL_PARAM_TYPE_OCTETS, key->key.paillierPub.n,
key->key.paillierPub.nLen, 0},
{CRYPT_PARAM_PAILLIER_G, BSL_PARAM_TYPE_OCTETS, key->key.paillierPub.g, key->key.paillierPub.gLen, 0},
{CRYPT_PARAM_PAILLIER_N2, BSL_PARAM_TYPE_OCTETS, key->key.paillierPub.n2, key->key.paillierPub.n2Len,
0},
BSL_PARAM_END};
ret = pkey->method->setPub(pkey->key, &paParam);
break;
}
case CRYPT_PKEY_ML_KEM: {
BSL_Param paParam[2] = {{CRYPT_PARAM_ML_KEM_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.kemEk.data,
key->key.kemEk.len, 0},
BSL_PARAM_END};
ret = pkey->method->setPub(pkey->key, &paParam);
break;
}
case CRYPT_PKEY_ML_DSA: {
BSL_Param paParam[2] = {{CRYPT_PARAM_ML_DSA_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.mldsaPub.data,
key->key.mldsaPub.len, 0},
BSL_PARAM_END};
ret = pkey->method->setPub(pkey->key, &paParam);
break;
}
case CRYPT_PKEY_ELGAMAL: {
BSL_Param paParam[5] = {{CRYPT_PARAM_ELGAMAL_P, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPub.p,
key->key.elgamalPub.pLen, 0},
{CRYPT_PARAM_ELGAMAL_G, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPub.g, key->key.elgamalPub.gLen, 0},
{CRYPT_PARAM_ELGAMAL_Y, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPub.y, key->key.elgamalPub.pLen,
0},
{CRYPT_PARAM_ELGAMAL_Q, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPub.q, key->key.elgamalPub.qLen,
0},
BSL_PARAM_END};
ret = pkey->method->setPub(pkey->key, &paParam);
break;
}
case CRYPT_PKEY_SLH_DSA: {
BSL_Param slhDsaPub[3] = {{CRYPT_PARAM_SLH_DSA_PUB_SEED, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPub.seed,
key->key.slhDsaPub.len, 0},
{CRYPT_PARAM_SLH_DSA_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPub.root, key->key.slhDsaPub.len,
0},
BSL_PARAM_END};
ret = pkey->method->setPub(pkey->key, &slhDsaPub);
break;
}
case CRYPT_PKEY_XMSS: {
BSL_Param xmssPub[3] = {
{CRYPT_PARAM_XMSS_PUB_SEED, BSL_PARAM_TYPE_OCTETS, key->key.xmssPub.seed, key->key.xmssPub.len, 0},
{CRYPT_PARAM_XMSS_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, key->key.xmssPub.root, key->key.xmssPub.len, 0},
BSL_PARAM_END,
};
ret = pkey->method->setPub(pkey->key, &xmssPub);
break;
}
case CRYPT_PKEY_HYBRID_KEM: {
BSL_Param paParam[2] = {{CRYPT_PARAM_HYBRID_PUBKEY, BSL_PARAM_TYPE_OCTETS, key->key.kemEk.data,
key->key.kemEk.len, 0},
BSL_PARAM_END};
ret = pkey->method->setPub(pkey->key, &paParam);
break;
}
default:
ret = CRYPT_EAL_ALG_NOT_SUPPORT;
}
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
int32_t CRYPT_EAL_PkeySetPrv(CRYPT_EAL_PkeyCtx *pkey, const CRYPT_EAL_PkeyPrv *key)
{
int32_t ret = PriAndPubParamIsValid(pkey, key, true);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, (pkey == NULL) ? CRYPT_PKEY_MAX : pkey->id, ret);
return ret;
}
if (pkey->method == NULL || pkey->method->setPrv == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
switch(key->id) {
case CRYPT_PKEY_RSA: {
BSL_Param rsaParam[] = {{CRYPT_PARAM_RSA_D, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.d,
key->key.rsaPrv.dLen, 0},
{CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.n, key->key.rsaPrv.nLen, 0},
{CRYPT_PARAM_RSA_P, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.p, key->key.rsaPrv.pLen, 0},
{CRYPT_PARAM_RSA_Q, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.q, key->key.rsaPrv.qLen, 0},
{CRYPT_PARAM_RSA_DP, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.dP, key->key.rsaPrv.dPLen, 0},
{CRYPT_PARAM_RSA_DQ, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.dQ, key->key.rsaPrv.dQLen, 0},
{CRYPT_PARAM_RSA_QINV, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.qInv, key->key.rsaPrv.qInvLen, 0},
{CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, key->key.rsaPrv.e, key->key.rsaPrv.eLen, 0},
BSL_PARAM_END};
ret = pkey->method->setPrv(pkey->key, &rsaParam);
break;
}
case CRYPT_PKEY_DSA: {
BSL_Param dsaParam[2] = {{CRYPT_PARAM_DSA_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.dsaPrv.data,
key->key.dsaPrv.len, 0}, BSL_PARAM_END};
ret = pkey->method->setPrv(pkey->key, &dsaParam);
break;
}
case CRYPT_PKEY_ED25519:
case CRYPT_PKEY_X25519: {
BSL_Param para[2] = {{CRYPT_PARAM_CURVE25519_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.curve25519Prv.data,
key->key.curve25519Prv.len, 0}, BSL_PARAM_END};
ret = pkey->method->setPrv(pkey->key, ¶);
break;
}
case CRYPT_PKEY_DH: {
BSL_Param dhParam[2] = {{CRYPT_PARAM_DH_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.dhPrv.data,
key->key.dhPrv.len, 0}, BSL_PARAM_END};
ret = pkey->method->setPrv(pkey->key, &dhParam);
break;
}
case CRYPT_PKEY_ECDH:
case CRYPT_PKEY_ECDSA:
case CRYPT_PKEY_SM2: {
BSL_Param ecParam[2] = {{CRYPT_PARAM_EC_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.eccPrv.data,
key->key.eccPrv.len, 0}, BSL_PARAM_END};
ret = pkey->method->setPrv(pkey->key, &ecParam);
break;
}
case CRYPT_PKEY_PAILLIER: {
BSL_Param paParam[5] = {{CRYPT_PARAM_PAILLIER_N, BSL_PARAM_TYPE_OCTETS, key->key.paillierPrv.n,
key->key.paillierPrv.nLen, 0},
{CRYPT_PARAM_PAILLIER_LAMBDA, BSL_PARAM_TYPE_OCTETS, key->key.paillierPrv.lambda,
key->key.paillierPrv.lambdaLen, 0},
{CRYPT_PARAM_PAILLIER_MU, BSL_PARAM_TYPE_OCTETS, key->key.paillierPrv.mu, key->key.paillierPrv.muLen,
0},
{CRYPT_PARAM_PAILLIER_N2, BSL_PARAM_TYPE_OCTETS, key->key.paillierPrv.n2, key->key.paillierPrv.n2Len,
0},
BSL_PARAM_END};
ret = pkey->method->setPrv(pkey->key, &paParam);
break;
}
case CRYPT_PKEY_SLH_DSA: {
BSL_Param slhDsaParam[5] = {{CRYPT_PARAM_SLH_DSA_PRV_SEED, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPrv.seed,
key->key.slhDsaPrv.pub.len, 0},
{CRYPT_PARAM_SLH_DSA_PRV_PRF, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPrv.prf, key->key.slhDsaPrv.pub.len,
0},
{CRYPT_PARAM_SLH_DSA_PUB_SEED, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPrv.pub.seed, key->key.slhDsaPrv.pub.len,
0},
{CRYPT_PARAM_SLH_DSA_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, key->key.slhDsaPrv.pub.root, key->key.slhDsaPrv.pub.len,
0},
BSL_PARAM_END};
ret = pkey->method->setPrv(pkey->key, &slhDsaParam);
break;
}
case CRYPT_PKEY_XMSS: {
uint64_t index = key->key.xmssPrv.index;
BSL_Param xmssParam[6] = {
{CRYPT_PARAM_XMSS_PRV_SEED, BSL_PARAM_TYPE_OCTETS, key->key.xmssPrv.seed, key->key.xmssPrv.pub.len, 0},
{CRYPT_PARAM_XMSS_PRV_PRF, BSL_PARAM_TYPE_OCTETS, key->key.xmssPrv.prf, key->key.xmssPrv.pub.len, 0},
{CRYPT_PARAM_XMSS_PRV_INDEX, BSL_PARAM_TYPE_UINT64, &index, sizeof(index), 0},
{CRYPT_PARAM_XMSS_PUB_SEED, BSL_PARAM_TYPE_OCTETS, key->key.xmssPrv.pub.seed, key->key.xmssPrv.pub.len, 0},
{CRYPT_PARAM_XMSS_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, key->key.xmssPrv.pub.root, key->key.xmssPrv.pub.len, 0},
BSL_PARAM_END,
};
ret = pkey->method->setPrv(pkey->key, &xmssParam);
break;
}
case CRYPT_PKEY_ELGAMAL: {
BSL_Param paParam[4] = {
{CRYPT_PARAM_ELGAMAL_P, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPrv.p, key->key.elgamalPrv.pLen, 0},
{CRYPT_PARAM_ELGAMAL_G, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPrv.g, key->key.elgamalPrv.gLen, 0},
{CRYPT_PARAM_ELGAMAL_X, BSL_PARAM_TYPE_OCTETS, key->key.elgamalPrv.x, key->key.elgamalPrv.xLen, 0},
BSL_PARAM_END};
ret = pkey->method->setPrv(pkey->key, &paParam);
break;
}
case CRYPT_PKEY_ML_KEM: {
BSL_Param paParam[2] = {{CRYPT_PARAM_ML_KEM_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.kemDk.data,
key->key.kemDk.len, 0},
BSL_PARAM_END};
ret = pkey->method->setPrv(pkey->key, &paParam);
break;
}
case CRYPT_PKEY_ML_DSA: {
BSL_Param paParam[2] = {{CRYPT_PARAM_ML_DSA_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.mldsaPrv.data,
key->key.mldsaPrv.len, 0},
BSL_PARAM_END};
ret = pkey->method->setPrv(pkey->key, &paParam);
break;
}
case CRYPT_PKEY_HYBRID_KEM: {
BSL_Param paParam[2] = {{CRYPT_PARAM_HYBRID_PRVKEY, BSL_PARAM_TYPE_OCTETS, key->key.kemDk.data,
key->key.kemDk.len, 0},
BSL_PARAM_END};
ret = pkey->method->setPrv(pkey->key, &paParam);
break;
}
default:
ret = CRYPT_EAL_ALG_NOT_SUPPORT;
}
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
static int32_t GetRSAPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_RsaPub *pub)
{
BSL_Param param[3] = {{CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, pub->e, pub->eLen, 0},
{CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, pub->n, pub->nLen, 0}, BSL_PARAM_END};
int32_t ret = pkey->method->getPub(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
pub->eLen = param[0].useLen;
pub->nLen = param[1].useLen;
return CRYPT_SUCCESS;
}
static int32_t GetCommonPub(const CRYPT_EAL_PkeyCtx *pkey, int32_t paramKey, CRYPT_Data *pub)
{
BSL_Param param[2] = {{paramKey, BSL_PARAM_TYPE_OCTETS, pub->data, pub->len, 0},
BSL_PARAM_END};
int32_t ret = pkey->method->getPub(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
pub->len = param[0].useLen;
return CRYPT_SUCCESS;
}
static int32_t GetPaillierPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_PaillierPub *pub)
{
BSL_Param param[4] = {{CRYPT_PARAM_PAILLIER_N, BSL_PARAM_TYPE_OCTETS, pub->n, pub->nLen, 0},
{CRYPT_PARAM_PAILLIER_G, BSL_PARAM_TYPE_OCTETS, pub->g, pub->gLen, 0},
{CRYPT_PARAM_PAILLIER_N2, BSL_PARAM_TYPE_OCTETS, pub->n2, pub->n2Len, 0},
BSL_PARAM_END};
int32_t ret = pkey->method->getPub(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
pub->nLen = param[0].useLen;
pub->gLen = param[1].useLen;
pub->n2Len = param[2].useLen;
return CRYPT_SUCCESS;
}
static int32_t GetElGamalPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_ElGamalPub *pub)
{
BSL_Param param[5] = {{CRYPT_PARAM_ELGAMAL_P, BSL_PARAM_TYPE_OCTETS, pub->p, pub->pLen, 0},
{CRYPT_PARAM_ELGAMAL_G, BSL_PARAM_TYPE_OCTETS, pub->g, pub->gLen, 0},
{CRYPT_PARAM_ELGAMAL_Y, BSL_PARAM_TYPE_OCTETS, pub->y, pub->yLen, 0},
{CRYPT_PARAM_ELGAMAL_Q, BSL_PARAM_TYPE_OCTETS, pub->q, pub->qLen, 0},
BSL_PARAM_END};
int32_t ret = pkey->method->getPub(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
pub->pLen = param[0].useLen;
pub->gLen = param[1].useLen;
pub->yLen = param[2].useLen;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_PkeyGetPubEx(const CRYPT_EAL_PkeyCtx *pkey, BSL_Param *param)
{
if (pkey == NULL || param == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->getPub == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = pkey->method->getPub(pkey->key, param);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
int32_t CRYPT_EAL_PkeySetPubEx(CRYPT_EAL_PkeyCtx *pkey, const BSL_Param *param)
{
if (pkey == NULL || param == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->setPub == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = pkey->method->setPub(pkey->key, param);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
int32_t CRYPT_EAL_PkeyGetPrvEx(const CRYPT_EAL_PkeyCtx *pkey, BSL_Param *param)
{
if (pkey == NULL || param == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->getPrv == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = pkey->method->getPrv(pkey->key, param);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
int32_t CRYPT_EAL_PkeySetPrvEx(CRYPT_EAL_PkeyCtx *pkey, const BSL_Param *param)
{
if (pkey == NULL || param == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->setPrv == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = pkey->method->setPrv(pkey->key, param);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
static int32_t GetMlkemPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_KemEncapsKey *kemEk)
{
BSL_Param param[2] = {{CRYPT_PARAM_ML_KEM_PUBKEY, BSL_PARAM_TYPE_OCTETS, kemEk->data,
kemEk->len, 0},
BSL_PARAM_END};
int32_t ret = pkey->method->getPub(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
kemEk->len = param[0].useLen;
return CRYPT_SUCCESS;
}
static int32_t GetMldsaPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_MlDsaPub *dsaPub)
{
BSL_Param param[2] = {{CRYPT_PARAM_ML_DSA_PUBKEY, BSL_PARAM_TYPE_OCTETS, dsaPub->data,
dsaPub->len, 0},
BSL_PARAM_END};
int32_t ret = pkey->method->getPub(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
dsaPub->len = param[0].useLen;
return CRYPT_SUCCESS;
}
static int32_t GetHybridkemPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_KemEncapsKey *kemEk)
{
BSL_Param param[2] = {{CRYPT_PARAM_HYBRID_PUBKEY, BSL_PARAM_TYPE_OCTETS, kemEk->data,
kemEk->len, 0},
BSL_PARAM_END};
int32_t ret = pkey->method->getPub(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
kemEk->len = param[0].useLen;
return CRYPT_SUCCESS;
}
static int32_t GetSlhDsaPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_SlhDsaPub *pub)
{
BSL_Param param[3] = {{CRYPT_PARAM_SLH_DSA_PUB_SEED, BSL_PARAM_TYPE_OCTETS, pub->seed, pub->len, 0},
{CRYPT_PARAM_SLH_DSA_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, pub->root, pub->len, 0},
BSL_PARAM_END};
int32_t ret = pkey->method->getPub(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
pub->len = param[0].useLen;
return CRYPT_SUCCESS;
}
static int32_t GetXmssPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_XmssPub *pub)
{
BSL_Param param[3] = {
{CRYPT_PARAM_XMSS_PUB_SEED, BSL_PARAM_TYPE_OCTETS, pub->seed, pub->len, 0},
{CRYPT_PARAM_XMSS_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, pub->root, pub->len, 0},
BSL_PARAM_END,
};
int32_t ret = pkey->method->getPub(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
pub->len = param[0].useLen;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_PkeyGetPub(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_PkeyPub *key)
{
int32_t ret = PriAndPubParamIsValid(pkey, key, false);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, (pkey == NULL) ? CRYPT_PKEY_MAX : pkey->id, ret);
return ret;
}
if (pkey->method == NULL || pkey->method->getPub == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
switch (key->id) {
case CRYPT_PKEY_RSA:
ret = GetRSAPub(pkey, &key->key.rsaPub);
break;
case CRYPT_PKEY_DSA:
ret = GetCommonPub(pkey, CRYPT_PARAM_DSA_PUBKEY, &key->key.dsaPub);
break;
case CRYPT_PKEY_ED25519:
case CRYPT_PKEY_X25519:
ret = GetCommonPub(pkey, CRYPT_PARAM_CURVE25519_PUBKEY, &key->key.curve25519Pub);
break;
case CRYPT_PKEY_DH:
ret = GetCommonPub(pkey, CRYPT_PARAM_DH_PUBKEY, &key->key.dhPub);
break;
case CRYPT_PKEY_ECDH:
case CRYPT_PKEY_ECDSA:
case CRYPT_PKEY_SM2:
ret = GetCommonPub(pkey, CRYPT_PARAM_EC_PUBKEY, &key->key.eccPub);
break;
case CRYPT_PKEY_PAILLIER:
ret = GetPaillierPub(pkey, &key->key.paillierPub);
break;
case CRYPT_PKEY_ELGAMAL:
ret = GetElGamalPub(pkey, &key->key.elgamalPub);
break;
case CRYPT_PKEY_ML_KEM:
ret = GetMlkemPub(pkey, &key->key.kemEk);
break;
case CRYPT_PKEY_ML_DSA:
ret = GetMldsaPub(pkey, &key->key.mldsaPub);
break;
case CRYPT_PKEY_HYBRID_KEM:
ret = GetHybridkemPub(pkey, &key->key.kemEk);
break;
case CRYPT_PKEY_SLH_DSA:
ret = GetSlhDsaPub(pkey, &key->key.slhDsaPub);
break;
case CRYPT_PKEY_XMSS:
ret = GetXmssPub(pkey, &key->key.xmssPub);
break;
default:
ret = CRYPT_EAL_ALG_NOT_SUPPORT;
}
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
static int32_t GetRSAPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_RsaPrv *prv)
{
BSL_Param param[] = {{CRYPT_PARAM_RSA_D, BSL_PARAM_TYPE_OCTETS, prv->d, prv->dLen, 0},
{CRYPT_PARAM_RSA_N, BSL_PARAM_TYPE_OCTETS, prv->n, prv->nLen, 0},
{CRYPT_PARAM_RSA_P, BSL_PARAM_TYPE_OCTETS, prv->p, prv->pLen, 0},
{CRYPT_PARAM_RSA_Q, BSL_PARAM_TYPE_OCTETS, prv->q, prv->qLen, 0},
{CRYPT_PARAM_RSA_DP, BSL_PARAM_TYPE_OCTETS, prv->dP, prv->dPLen, 0},
{CRYPT_PARAM_RSA_DQ, BSL_PARAM_TYPE_OCTETS, prv->dQ, prv->dQLen, 0},
{CRYPT_PARAM_RSA_QINV, BSL_PARAM_TYPE_OCTETS, prv->qInv, prv->qInvLen, 0},
{CRYPT_PARAM_RSA_E, BSL_PARAM_TYPE_OCTETS, prv->e, prv->eLen, 0},
BSL_PARAM_END};
int32_t ret = pkey->method->getPrv(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
prv->dLen = param[0].useLen;
prv->nLen = param[1].useLen;
prv->pLen = param[2].useLen;
prv->qLen = param[3].useLen;
prv->dPLen = param[4].useLen;
prv->dQLen = param[5].useLen;
prv->qInvLen = param[6].useLen;
prv->eLen = param[7].useLen;
return CRYPT_SUCCESS;
}
static int32_t GetCommonPrv(const CRYPT_EAL_PkeyCtx *pkey, int32_t paramKey, CRYPT_Data *prv)
{
BSL_Param param[2] = {{paramKey, BSL_PARAM_TYPE_OCTETS, prv->data, prv->len, 0},
BSL_PARAM_END};
int32_t ret = pkey->method->getPrv(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
prv->len = param[0].useLen;
return CRYPT_SUCCESS;
}
static int32_t GetPaillierPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_PaillierPrv *prv)
{
BSL_Param param[5] = {{CRYPT_PARAM_PAILLIER_N, BSL_PARAM_TYPE_OCTETS, prv->n, prv->nLen, 0},
{CRYPT_PARAM_PAILLIER_LAMBDA, BSL_PARAM_TYPE_OCTETS, prv->lambda, prv->lambdaLen, 0},
{CRYPT_PARAM_PAILLIER_MU, BSL_PARAM_TYPE_OCTETS, prv->mu, prv->muLen, 0},
{CRYPT_PARAM_PAILLIER_N2, BSL_PARAM_TYPE_OCTETS, prv->n2, prv->n2Len, 0},
BSL_PARAM_END};
int32_t ret = pkey->method->getPrv(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
prv->nLen = param[0].useLen;
prv->lambdaLen = param[1].useLen;
prv->muLen = param[2].useLen;
prv->n2Len = param[3].useLen;
return CRYPT_SUCCESS;
}
static int32_t GetElGamalPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_ElGamalPrv *prv)
{
BSL_Param param[5] = {{CRYPT_PARAM_ELGAMAL_P, BSL_PARAM_TYPE_OCTETS, prv->p, prv->pLen, 0},
{CRYPT_PARAM_ELGAMAL_G, BSL_PARAM_TYPE_OCTETS, prv->g, prv->gLen, 0},
{CRYPT_PARAM_ELGAMAL_X, BSL_PARAM_TYPE_OCTETS, prv->x, prv->xLen, 0},
BSL_PARAM_END};
int32_t ret = pkey->method->getPrv(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
prv->pLen = param[0].useLen;
prv->gLen = param[1].useLen;
prv->xLen = param[2].useLen;
return CRYPT_SUCCESS;
}
static int32_t GetMlkemPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_KemDecapsKey *kemDk)
{
BSL_Param param[2] = {{CRYPT_PARAM_ML_KEM_PRVKEY, BSL_PARAM_TYPE_OCTETS, kemDk->data,
kemDk->len, 0},
BSL_PARAM_END};
int32_t ret = pkey->method->getPrv(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
kemDk->len = param[0].useLen;
return CRYPT_SUCCESS;
}
static int32_t GetMldsaPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_MlDsaPrv *dsaPrv)
{
BSL_Param param[2] = {{CRYPT_PARAM_ML_DSA_PRVKEY, BSL_PARAM_TYPE_OCTETS, dsaPrv->data,
dsaPrv->len, 0},
BSL_PARAM_END};
int32_t ret = pkey->method->getPrv(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
dsaPrv->len = param[0].useLen;
return CRYPT_SUCCESS;
}
static int32_t GetHybridkemPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_KemDecapsKey *kemDk)
{
BSL_Param param[2] = {{CRYPT_PARAM_HYBRID_PRVKEY, BSL_PARAM_TYPE_OCTETS, kemDk->data,
kemDk->len, 0},
BSL_PARAM_END};
int32_t ret = pkey->method->getPrv(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
kemDk->len = param[0].useLen;
return CRYPT_SUCCESS;
}
static int32_t GetSlhDsaPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_SlhDsaPrv *prv)
{
BSL_Param param[5] = {{CRYPT_PARAM_SLH_DSA_PRV_SEED, BSL_PARAM_TYPE_OCTETS, prv->seed, prv->pub.len, 0},
{CRYPT_PARAM_SLH_DSA_PRV_PRF, BSL_PARAM_TYPE_OCTETS, prv->prf, prv->pub.len, 0},
{CRYPT_PARAM_SLH_DSA_PUB_SEED, BSL_PARAM_TYPE_OCTETS, prv->pub.seed, prv->pub.len, 0},
{CRYPT_PARAM_SLH_DSA_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, prv->pub.root, prv->pub.len, 0},
BSL_PARAM_END};
int32_t ret = pkey->method->getPrv(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
prv->pub.len = param[0].useLen;
return CRYPT_SUCCESS;
}
static int32_t GetXmssPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_XmssPrv *prv)
{
BSL_Param param[6] = {
{CRYPT_PARAM_XMSS_PRV_SEED, BSL_PARAM_TYPE_OCTETS, prv->seed, prv->pub.len, 0},
{CRYPT_PARAM_XMSS_PRV_PRF, BSL_PARAM_TYPE_OCTETS, prv->prf, prv->pub.len, 0},
{CRYPT_PARAM_XMSS_PRV_INDEX, BSL_PARAM_TYPE_UINT64, &prv->index, sizeof(prv->index), 0},
{CRYPT_PARAM_XMSS_PUB_SEED, BSL_PARAM_TYPE_OCTETS, prv->pub.seed, prv->pub.len, 0},
{CRYPT_PARAM_XMSS_PUB_ROOT, BSL_PARAM_TYPE_OCTETS, prv->pub.root, prv->pub.len, 0},
BSL_PARAM_END,
};
int32_t ret = pkey->method->getPrv(pkey->key, ¶m);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
prv->pub.len = param[0].useLen;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_PkeyGetPrv(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_PkeyPrv *key)
{
int32_t ret = PriAndPubParamIsValid(pkey, key, true);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, (pkey == NULL) ? CRYPT_PKEY_MAX : pkey->id, ret);
return ret;
}
if (pkey->method == NULL || pkey->method->getPrv == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
switch(key->id) {
case CRYPT_PKEY_RSA:
ret = GetRSAPrv(pkey, &key->key.rsaPrv);
break;
case CRYPT_PKEY_DSA:
ret = GetCommonPrv(pkey, CRYPT_PARAM_DSA_PRVKEY, &key->key.dsaPrv);
break;
case CRYPT_PKEY_ED25519:
case CRYPT_PKEY_X25519:
ret = GetCommonPrv(pkey, CRYPT_PARAM_CURVE25519_PRVKEY, &key->key.curve25519Prv);
break;
case CRYPT_PKEY_DH:
ret = GetCommonPrv(pkey, CRYPT_PARAM_DH_PRVKEY, &key->key.dhPrv);
break;
case CRYPT_PKEY_ECDH:
case CRYPT_PKEY_ECDSA:
case CRYPT_PKEY_SM2:
ret = GetCommonPrv(pkey, CRYPT_PARAM_EC_PRVKEY, &key->key.eccPrv);
break;
case CRYPT_PKEY_PAILLIER:
ret = GetPaillierPrv(pkey, &key->key.paillierPrv);
break;
case CRYPT_PKEY_ELGAMAL:
ret = GetElGamalPrv(pkey, &key->key.elgamalPrv);
break;
case CRYPT_PKEY_ML_KEM:
ret = GetMlkemPrv(pkey, &key->key.kemDk);
break;
case CRYPT_PKEY_ML_DSA:
ret = GetMldsaPrv(pkey, &key->key.mldsaPrv);
break;
case CRYPT_PKEY_SLH_DSA:
ret = GetSlhDsaPrv(pkey, &key->key.slhDsaPrv);
break;
case CRYPT_PKEY_XMSS:
ret = GetXmssPrv(pkey, &key->key.xmssPrv);
break;
case CRYPT_PKEY_HYBRID_KEM:
ret = GetHybridkemPrv(pkey, &key->key.kemDk);
break;
default:
ret = CRYPT_EAL_ALG_NOT_SUPPORT;
}
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
uint32_t CRYPT_EAL_PkeyGetSignLen(const CRYPT_EAL_PkeyCtx *pkey)
{
int32_t result = 0;
int32_t ret = CRYPT_EAL_PkeyCtrl((CRYPT_EAL_PkeyCtx *)(uintptr_t)pkey,
CRYPT_CTRL_GET_SIGNLEN, &result, sizeof(result));
return ret == CRYPT_SUCCESS ? result : 0;
}
uint32_t CRYPT_EAL_PkeyGetKeyLen(const CRYPT_EAL_PkeyCtx *pkey)
{
int32_t result = 0;
int32_t ret = CRYPT_EAL_PkeyCtrl((CRYPT_EAL_PkeyCtx *)(uintptr_t)pkey,
CRYPT_CTRL_GET_BITS, &result, sizeof(result));
return ret == CRYPT_SUCCESS ? ((result + 7) >> 3) : 0; // bytes = (bits + 7) >> 3
}
uint32_t CRYPT_EAL_PkeyGetKeyBits(const CRYPT_EAL_PkeyCtx *pkey)
{
int32_t result = 0;
int32_t ret = CRYPT_EAL_PkeyCtrl((CRYPT_EAL_PkeyCtx *)(uintptr_t)pkey,
CRYPT_CTRL_GET_BITS, &result, sizeof(result));
return ret == CRYPT_SUCCESS ? result : 0;
}
uint32_t CRYPT_EAL_PkeyGetSecurityBits(const CRYPT_EAL_PkeyCtx *pkey)
{
int32_t result = 0;
int32_t ret = CRYPT_EAL_PkeyCtrl((CRYPT_EAL_PkeyCtx *)(uintptr_t)pkey,
CRYPT_CTRL_GET_SECBITS, &result, sizeof(result));
return ret == CRYPT_SUCCESS ? result : 0;
}
CRYPT_PKEY_AlgId CRYPT_EAL_PkeyGetId(const CRYPT_EAL_PkeyCtx *pkey)
{
if (pkey == NULL) {
return CRYPT_PKEY_MAX;
}
return pkey->id;
}
CRYPT_PKEY_ParaId CRYPT_EAL_PkeyGetParaId(const CRYPT_EAL_PkeyCtx *pkey)
{
int32_t result = 0;
int32_t ret = CRYPT_EAL_PkeyCtrl((CRYPT_EAL_PkeyCtx *)(uintptr_t)pkey, CRYPT_CTRL_GET_PARAID,
&result, sizeof(result));
return ret == CRYPT_SUCCESS ? result : CRYPT_PKEY_PARAID_MAX;
}
int32_t CRYPT_EAL_PkeyCmp(const CRYPT_EAL_PkeyCtx *a, const CRYPT_EAL_PkeyCtx *b)
{
if (a == NULL || b == NULL) {
if (a == b) {
return CRYPT_SUCCESS;
}
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (a->id != b->id) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_EAL_PKEY_CMP_DIFF_KEY_TYPE);
return CRYPT_EAL_PKEY_CMP_DIFF_KEY_TYPE;
}
if (a->method == NULL || b->method == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (a->method->cmp == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, a->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
return a->method->cmp(a->key, b->key);
}
// Set the user's personal data. The life cycle is processed by the user. The value of data can be NULL,
// which is used to release the personal data and is set NULL.
int32_t CRYPT_EAL_PkeySetExtData(CRYPT_EAL_PkeyCtx *pkey, void *data)
{
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
pkey->extData = data;
return CRYPT_SUCCESS;
}
// Obtain user's personal data.
void *CRYPT_EAL_PkeyGetExtData(const CRYPT_EAL_PkeyCtx *pkey)
{
if (pkey == NULL) {
return NULL;
}
return pkey->extData;
}
bool CRYPT_EAL_PkeyIsValidAlgId(CRYPT_PKEY_AlgId id)
{
return CRYPT_EAL_PkeyFindMethod(id) != NULL;
}
int32_t CRYPT_EAL_PkeyUpRef(CRYPT_EAL_PkeyCtx *pkey)
{
int i = 0;
if (pkey == NULL) {
return CRYPT_NULL_INPUT;
}
return BSL_SAL_AtomicUpReferences(&(pkey->references), &i);
}
#ifdef HITLS_CRYPTO_PROVIDER
static int32_t CRYPT_EAL_SetKeyMethod(const CRYPT_EAL_Func *funcsKeyMgmt, EAL_PkeyUnitaryMethod *method)
{
int32_t index = 0;
if (funcsKeyMgmt != NULL) {
while (funcsKeyMgmt[index].id != 0) {
switch (funcsKeyMgmt[index].id) {
case CRYPT_EAL_IMPLPKEYMGMT_NEWCTX:
method->provNewCtx = funcsKeyMgmt[index].func;
break;
case CRYPT_EAL_IMPLPKEYMGMT_SETPARAM:
method->setPara = funcsKeyMgmt[index].func;
break;
case CRYPT_EAL_IMPLPKEYMGMT_GETPARAM:
method->getPara = funcsKeyMgmt[index].func;
break;
case CRYPT_EAL_IMPLPKEYMGMT_GENKEY:
method->gen = funcsKeyMgmt[index].func;
break;
case CRYPT_EAL_IMPLPKEYMGMT_SETPRV:
method->setPrv = funcsKeyMgmt[index].func;
break;
case CRYPT_EAL_IMPLPKEYMGMT_SETPUB:
method->setPub = funcsKeyMgmt[index].func;
break;
case CRYPT_EAL_IMPLPKEYMGMT_GETPRV:
method->getPrv = funcsKeyMgmt[index].func;
break;
case CRYPT_EAL_IMPLPKEYMGMT_GETPUB:
method->getPub = funcsKeyMgmt[index].func;
break;
case CRYPT_EAL_IMPLPKEYMGMT_DUPCTX:
method->dupCtx = funcsKeyMgmt[index].func;
break;
case CRYPT_EAL_IMPLPKEYMGMT_CHECK:
method->check = funcsKeyMgmt[index].func;
break;
case CRYPT_EAL_IMPLPKEYMGMT_COMPARE:
method->cmp = funcsKeyMgmt[index].func;
break;
case CRYPT_EAL_IMPLPKEYMGMT_CTRL:
method->ctrl = funcsKeyMgmt[index].func;
break;
case CRYPT_EAL_IMPLPKEYMGMT_FREECTX:
method->freeCtx = funcsKeyMgmt[index].func;
break;
case CRYPT_EAL_IMPLPKEYMGMT_IMPORT:
method->import = funcsKeyMgmt[index].func;
break;
case CRYPT_EAL_IMPLPKEYMGMT_EXPORT:
method->export = funcsKeyMgmt[index].func;
break;
default:
BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL);
return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL;
}
index++;
}
}
return CRYPT_SUCCESS;
}
static int32_t CRYPT_EAL_SetCipherMethod(const CRYPT_EAL_Func *funcsAsyCipher, EAL_PkeyUnitaryMethod *method)
{
int32_t index = 0;
if (funcsAsyCipher != NULL) {
while (funcsAsyCipher[index].id != 0) {
switch (funcsAsyCipher[index].id) {
case CRYPT_EAL_IMPLPKEYCIPHER_ENCRYPT:
method->encrypt = funcsAsyCipher[index].func;
break;
case CRYPT_EAL_IMPLPKEYCIPHER_DECRYPT:
method->decrypt = funcsAsyCipher[index].func;
break;
case CRYPT_EAL_IMPLPKEYCIPHER_HEADD:
method->headd = funcsAsyCipher[index].func;
break;
case CRYPT_EAL_IMPLPKEYCIPHER_HEMUL:
method->hemul = funcsAsyCipher[index].func;
break;
default:
BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL);
return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL;
}
index++;
}
}
return CRYPT_SUCCESS;
}
static int32_t CRYPT_EAL_SetExchMethod(const CRYPT_EAL_Func *funcsExch, EAL_PkeyUnitaryMethod *method)
{
int32_t index = 0;
if (funcsExch != NULL) {
while (funcsExch[index].id != 0) {
switch (funcsExch[index].id) {
case CRYPT_EAL_IMPLPKEYEXCH_EXCH:
method->computeShareKey = funcsExch[index].func;
break;
default:
BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL);
return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL;
}
index++;
}
}
return CRYPT_SUCCESS;
}
static int32_t CRYPT_EAL_SetSignMethod(const CRYPT_EAL_Func *funcSign, EAL_PkeyUnitaryMethod *method)
{
int32_t index = 0;
if (funcSign != NULL) {
while (funcSign[index].id != 0) {
switch (funcSign[index].id) {
case CRYPT_EAL_IMPLPKEYSIGN_SIGN:
method->sign = funcSign[index].func;
break;
case CRYPT_EAL_IMPLPKEYSIGN_SIGNDATA:
method->signData = funcSign[index].func;
break;
case CRYPT_EAL_IMPLPKEYSIGN_VERIFY:
method->verify = funcSign[index].func;
break;
case CRYPT_EAL_IMPLPKEYSIGN_VERIFYDATA:
method->verifyData = funcSign[index].func;
break;
case CRYPT_EAL_IMPLPKEYSIGN_BLIND:
method->blind = funcSign[index].func;
break;
case CRYPT_EAL_IMPLPKEYSIGN_UNBLIND:
method->unBlind = funcSign[index].func;
break;
case CRYPT_EAL_IMPLPKEYSIGN_RECOVER:
method->recover = funcSign[index].func;
break;
default:
BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL);
return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL;
}
index++;
}
}
return CRYPT_SUCCESS;
}
static int32_t CRYPT_EAL_SetKemMethod(const CRYPT_EAL_Func *funcKem, EAL_PkeyUnitaryMethod *method)
{
int32_t index = 0;
if (funcKem != NULL) {
while (funcKem[index].id != 0) {
switch (funcKem[index].id) {
case CRYPT_EAL_IMPLPKEYKEM_ENCAPSULATE_INIT:
method->encapsInit = funcKem[index].func;
break;
case CRYPT_EAL_IMPLPKEYKEM_DECAPSULATE_INIT:
method->decapsInit = funcKem[index].func;
break;
case CRYPT_EAL_IMPLPKEYKEM_ENCAPSULATE:
method->encaps = funcKem[index].func;
break;
case CRYPT_EAL_IMPLPKEYKEM_DECAPSULATE:
method->decaps = funcKem[index].func;
break;
default:
BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL);
return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL;
}
index++;
}
}
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_SetPkeyMethod(EAL_PkeyUnitaryMethod **pkeyMethod, const CRYPT_EAL_Func *funcsKeyMgmt,
const CRYPT_EAL_Func *funcsAsyCipher, const CRYPT_EAL_Func *funcsExch, const CRYPT_EAL_Func *funcSign,
const CRYPT_EAL_Func *funcKem)
{
int32_t ret;
EAL_PkeyUnitaryMethod *method = BSL_SAL_Calloc(1, sizeof(EAL_PkeyUnitaryMethod));
if (method == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL);
return BSL_MALLOC_FAIL;
}
ret = CRYPT_EAL_SetKeyMethod(funcsKeyMgmt, method);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_FREE(method);
return ret;
}
ret = CRYPT_EAL_SetCipherMethod(funcsAsyCipher, method);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_FREE(method);
return ret;
}
ret = CRYPT_EAL_SetExchMethod(funcsExch, method);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_FREE(method);
return ret;
}
ret = CRYPT_EAL_SetSignMethod(funcSign, method);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_FREE(method);
return ret;
}
ret = CRYPT_EAL_SetKemMethod(funcKem, method);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_FREE(method);
return ret;
}
*pkeyMethod = method;
return CRYPT_SUCCESS;
}
static int32_t ProviderGetTargetFuncs(CRYPT_EAL_LibCtx *libCtx, int32_t operaId, int32_t algId,
const char *attrName, const CRYPT_EAL_Func **funcs, CRYPT_EAL_ProvMgrCtx **mgrCtx)
{
int32_t ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, operaId, algId, attrName, funcs, mgrCtx);
return ret == CRYPT_NOT_SUPPORT ? CRYPT_SUCCESS : ret;
}
int32_t CRYPT_EAL_ProviderGetAsyAlgFuncs(CRYPT_EAL_LibCtx *libCtx, int32_t algId, uint32_t pkeyOperType,
const char *attrName, CRYPT_EAL_AsyAlgFuncsInfo *funcs)
{
int32_t ret = CRYPT_PROVIDER_NOT_SUPPORT;
if (pkeyOperType == CRYPT_EAL_PKEY_UNKNOWN_OPERATE) {
RETURN_RET_IF_ERR(ProviderGetTargetFuncs(libCtx, CRYPT_EAL_OPERAID_ASYMCIPHER, algId,
attrName, &funcs->funcsAsyCipher, &funcs->mgrCtx), ret);
RETURN_RET_IF_ERR(ProviderGetTargetFuncs(libCtx, CRYPT_EAL_OPERAID_KEYEXCH, algId,
attrName, &funcs->funcsExch, &funcs->mgrCtx), ret);
RETURN_RET_IF_ERR(ProviderGetTargetFuncs(libCtx, CRYPT_EAL_OPERAID_SIGN, algId,
attrName, &funcs->funcSign, &funcs->mgrCtx), ret);
RETURN_RET_IF_ERR(ProviderGetTargetFuncs(libCtx, CRYPT_EAL_OPERAID_KEM, algId,
attrName, &funcs->funcKem, &funcs->mgrCtx), ret);
}
if ((pkeyOperType & CRYPT_EAL_PKEY_CIPHER_OPERATE) == CRYPT_EAL_PKEY_CIPHER_OPERATE) {
ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, CRYPT_EAL_OPERAID_ASYMCIPHER, algId, attrName,
&funcs->funcsAsyCipher, &funcs->mgrCtx);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
}
if ((pkeyOperType & CRYPT_EAL_PKEY_EXCH_OPERATE) == CRYPT_EAL_PKEY_EXCH_OPERATE) {
ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, CRYPT_EAL_OPERAID_KEYEXCH, algId, attrName,
&funcs->funcsExch, &funcs->mgrCtx);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
}
if ((pkeyOperType & CRYPT_EAL_PKEY_SIGN_OPERATE) == CRYPT_EAL_PKEY_SIGN_OPERATE) {
ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, CRYPT_EAL_OPERAID_SIGN, algId, attrName,
&funcs->funcSign, &funcs->mgrCtx);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
}
if ((pkeyOperType & CRYPT_EAL_PKEY_KEM_OPERATE) == CRYPT_EAL_PKEY_KEM_OPERATE) {
ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, CRYPT_EAL_OPERAID_KEM, algId, attrName,
&funcs->funcKem, &funcs->mgrCtx);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
}
ret = CRYPT_EAL_ProviderGetFuncsAndMgrCtx(libCtx, CRYPT_EAL_OPERAID_KEYMGMT, algId, attrName,
&funcs->funcsKeyMgmt, &funcs->mgrCtx);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
return ret;
}
CRYPT_EAL_PkeyCtx *CRYPT_EAL_ProviderPkeyNewCtxInner(CRYPT_EAL_LibCtx *libCtx, int32_t algId, uint32_t pkeyOperType,
const char *attrName)
{
void *provCtx = NULL;
CRYPT_EAL_AsyAlgFuncsInfo funcInfo = {NULL, NULL, NULL, NULL, NULL, NULL};
int32_t ret = CRYPT_EAL_ProviderGetAsyAlgFuncs(libCtx, algId, pkeyOperType, attrName, &funcInfo);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, algId, ret);
return NULL;
}
ret = CRYPT_EAL_ProviderCtrl(funcInfo.mgrCtx, CRYPT_PROVIDER_GET_USER_CTX, &provCtx, sizeof(provCtx));
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, algId, ret);
return NULL;
}
CRYPT_EAL_PkeyCtx *ctx = BSL_SAL_Calloc(1u, sizeof(CRYPT_EAL_PkeyCtx));
if (ctx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, algId, CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
ret = CRYPT_EAL_SetPkeyMethod(&(ctx->method), funcInfo.funcsKeyMgmt, funcInfo.funcsAsyCipher, funcInfo.funcsExch,
funcInfo.funcSign, funcInfo.funcKem);
if (ret != BSL_SUCCESS) {
BSL_SAL_FREE(ctx);
return NULL;
}
if (ctx->method->provNewCtx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, algId, CRYPT_PROVIDER_ERR_IMPL_NULL);
BSL_SAL_FREE(ctx->method);
BSL_SAL_FREE(ctx);
return NULL;
}
ctx->key = ctx->method->provNewCtx(provCtx, algId);
if (ctx->key == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, algId, CRYPT_MEM_ALLOC_FAIL);
BSL_SAL_FREE(ctx->method);
BSL_SAL_FREE(ctx);
return NULL;
}
ctx->isProvider = true;
ctx->id = algId;
BSL_SAL_ReferencesInit(&(ctx->references));
return ctx;
}
#endif // HITLS_CRYPTO_PROVIDER
CRYPT_EAL_PkeyCtx *CRYPT_EAL_ProviderPkeyNewCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, uint32_t pkeyOperType,
const char *attrName)
{
#ifdef HITLS_CRYPTO_PROVIDER
return CRYPT_EAL_ProviderPkeyNewCtxInner(libCtx, algId, pkeyOperType, attrName);
#else
(void)libCtx;
(void)pkeyOperType;
(void)attrName;
return CRYPT_EAL_PkeyNewCtx(algId);
#endif
}
#endif
|
2301_79861745/bench_create
|
crypto/eal/src/eal_pkey_gen.c
|
C
|
unknown
| 65,515
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY)
#include "securec.h"
#include "eal_pkey_local.h"
#include "crypt_eal_pkey.h"
#include "crypt_errno.h"
#include "bsl_sal.h"
#include "bsl_err_internal.h"
#include "bsl_params.h"
#include "eal_common.h"
#include "crypt_eal_md.h"
int32_t CRYPT_EAL_PkeyEncapsInit(CRYPT_EAL_PkeyCtx *pkey, BSL_Param *params)
{
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
int32_t ret = CRYPT_SUCCESS;
#ifdef HITLS_CRYPTO_PROVIDER
if (pkey->isProvider && pkey->method != NULL && pkey->method->encapsInit != NULL) {
ret = pkey->method->encapsInit(pkey->key, params);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
}
#else
(void)params;
#endif
return ret;
}
int32_t CRYPT_EAL_PkeyDecapsInit(CRYPT_EAL_PkeyCtx *pkey, BSL_Param *params)
{
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
int32_t ret = CRYPT_SUCCESS;
#ifdef HITLS_CRYPTO_PROVIDER
if (pkey->isProvider && pkey->method != NULL && pkey->method->decapsInit != NULL) {
ret = pkey->method->decapsInit(pkey->key, params);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
}
#else
(void)params;
#endif
return ret;
}
int32_t CRYPT_EAL_PkeyEncaps(const CRYPT_EAL_PkeyCtx *pkey, uint8_t *cipher, uint32_t *cipherLen, uint8_t *sharekey,
uint32_t *shareKeyLen)
{
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->encaps == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = pkey->method->encaps(pkey->key, cipher, cipherLen, sharekey, shareKeyLen);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
int32_t CRYPT_EAL_PkeyDecaps(const CRYPT_EAL_PkeyCtx *pkey, const uint8_t *cipher, uint32_t cipherLen,
uint8_t *sharekey, uint32_t *shareKeyLen)
{
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->decaps == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = pkey->method->decaps(pkey->key, cipher, cipherLen, sharekey, shareKeyLen);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
#endif
|
2301_79861745/bench_create
|
crypto/eal/src/eal_pkey_kem.c
|
C
|
unknown
| 3,575
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef EAL_PKEY_LOCAL_H
#define EAL_PKEY_LOCAL_H
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY)
#include <stdint.h>
#include "crypt_algid.h"
#include "crypt_local_types.h"
#include "crypt_eal_pkey.h"
#include "sal_atomic.h"
#ifdef __cplusplus
extern "C" {
#endif // __cplusplus
/**
* @ingroup EAL
*
* Pkey session structure
*/
struct EAL_PkeyCtx {
bool isProvider;
EAL_PkeyUnitaryMethod *method;
void *key;
void *extData;
CRYPT_PKEY_AlgId id;
BSL_SAL_RefCount references;
};
/**
* @ingroup crypt_method
* @brief Generate the default method of the signature algorithm.
*
* @param id [IN] Algorithm ID.
*
* @return success: Pointer to EAL_PkeyMethod
* For other error codes, see crypt_errno.h.
*/
const EAL_PkeyMethod *CRYPT_EAL_PkeyFindMethod(CRYPT_PKEY_AlgId id);
#ifdef __cplusplus
}
#endif // __cplusplus
#endif // HITLS_CRYPTO_PKEY
#endif // EAL_PKEY_LOCAL_H
|
2301_79861745/bench_create
|
crypto/eal/src/eal_pkey_local.h
|
C
|
unknown
| 1,485
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY)
#include "securec.h"
#include "crypt_local_types.h"
#include "crypt_algid.h"
#include "eal_pkey_local.h"
#ifdef HITLS_CRYPTO_RSA
#include "crypt_rsa.h"
#endif
#ifdef HITLS_CRYPTO_DSA
#include "crypt_dsa.h"
#endif
#ifdef HITLS_CRYPTO_CURVE25519
#include "crypt_curve25519.h"
#endif
#ifdef HITLS_CRYPTO_DH
#include "crypt_dh.h"
#endif
#ifdef HITLS_CRYPTO_ECDH
#include "crypt_ecdh.h"
#endif
#ifdef HITLS_CRYPTO_ECDSA
#include "crypt_ecdsa.h"
#endif
#ifdef HITLS_CRYPTO_SM2
#include "crypt_sm2.h"
#endif
#ifdef HITLS_CRYPTO_PAILLIER
#include "crypt_paillier.h"
#endif
#ifdef HITLS_CRYPTO_ELGAMAL
#include "crypt_elgamal.h"
#endif
#ifdef HITLS_CRYPTO_KEM
#include "crypt_mlkem.h"
#endif
#ifdef HITLS_CRYPTO_MLDSA
#include "crypt_mldsa.h"
#endif
#ifdef HITLS_CRYPTO_SLH_DSA
#include "crypt_slh_dsa.h"
#endif
#ifdef HITLS_CRYPTO_HYBRIDKEM
#include "crypt_hybridkem.h"
#endif
#ifdef HITLS_CRYPTO_XMSS
#include "crypt_xmss.h"
#endif
#include "bsl_err_internal.h"
#include "crypt_types.h"
#include "crypt_errno.h"
#include "eal_common.h"
#include "bsl_sal.h"
#define EAL_PKEY_METHOD_DEFINE(id, \
newCtx, dupCtx, freeCtx, setPara, getPara, gen, ctrl, setPub, setPrv, getPub, getPrv, \
sign, signData, verify, verifyData, recover, computeShareKey, encrypt, decrypt, \
headd, hemul, check, cmp, copyParam, encaps, decaps, blind, unBlind) { \
id, (PkeyNew)(newCtx), (PkeyDup)(dupCtx), (PkeyFree)(freeCtx), \
(PkeySetPara)(setPara), (PkeyGetPara)(getPara), (PkeyGen)(gen), (PkeyCtrl)(ctrl), \
(PkeySetPub)(setPub), (PkeySetPrv)(setPrv), (PkeyGetPub)(getPub), (PkeyGetPrv)(getPrv), \
(PkeySign)(sign), (PkeySignData)(signData), (PkeyVerify)(verify), (PkeyVerifyData)(verifyData), \
(PkeyRecover)(recover), (PkeyComputeShareKey)(computeShareKey), \
(PkeyCrypt)(encrypt), (PkeyCrypt)(decrypt), (PkeyHEOperation)(headd), (PkeyHEOperation)(hemul), \
(PkeyCheck)(check), (PkeyCmp)(cmp), (PkeyCopyParam)(copyParam), \
(PkeyEncapsulate)(encaps), (PkeyDecapsulate)(decaps), (PkeyBlind)(blind), (PkeyUnBlind)(unBlind)}
static const EAL_PkeyMethod METHODS[] = {
#ifdef HITLS_CRYPTO_DSA
EAL_PKEY_METHOD_DEFINE(
CRYPT_PKEY_DSA,
CRYPT_DSA_NewCtx,
CRYPT_DSA_DupCtx,
CRYPT_DSA_FreeCtx,
CRYPT_DSA_SetParaEx,
CRYPT_DSA_GetParaEx,
CRYPT_DSA_Gen,
CRYPT_DSA_Ctrl,
CRYPT_DSA_SetPubKeyEx,
CRYPT_DSA_SetPrvKeyEx,
CRYPT_DSA_GetPubKeyEx,
CRYPT_DSA_GetPrvKeyEx,
CRYPT_DSA_Sign,
CRYPT_DSA_SignData,
CRYPT_DSA_Verify,
CRYPT_DSA_VerifyData,
NULL, // recover
NULL, // computeShareKey
NULL, // encrypt
NULL, // decrypt
NULL, // headd
NULL, // hemul
#ifdef HITLS_CRYPTO_DSA_CHECK
CRYPT_DSA_Check,
#else
NULL, // check
#endif
CRYPT_DSA_Cmp,
NULL, // copyPara
NULL, // pkeyEncaps
NULL, // pkeyDecaps
NULL, // blind
NULL // unBlind
), // CRYPT_PKEY_DSA
#endif
#ifdef HITLS_CRYPTO_ED25519
EAL_PKEY_METHOD_DEFINE(
CRYPT_PKEY_ED25519,
CRYPT_ED25519_NewCtx,
CRYPT_CURVE25519_DupCtx,
CRYPT_CURVE25519_FreeCtx,
NULL, // setPara
NULL, // getPara
CRYPT_ED25519_GenKey,
CRYPT_CURVE25519_Ctrl,
CRYPT_CURVE25519_SetPubKeyEx,
CRYPT_CURVE25519_SetPrvKeyEx,
CRYPT_CURVE25519_GetPubKeyEx,
CRYPT_CURVE25519_GetPrvKeyEx,
CRYPT_CURVE25519_Sign,
NULL, // signData
CRYPT_CURVE25519_Verify,
NULL, // verifyData
NULL, // recover
NULL, // computeShareKey
NULL, // encrypt
NULL, // decrypt
NULL, // headd
NULL, // hemul
#ifdef HITLS_CRYPTO_ED25519_CHECK
CRYPT_ED25519_Check,
#else
NULL, // check
#endif
CRYPT_CURVE25519_Cmp,
NULL, // copyPara
NULL, // pkeyEncaps
NULL, // pkeyDecaps
NULL, // blind
NULL // unBlind
), // CRYPT_PKEY_ED25519
#endif
#ifdef HITLS_CRYPTO_X25519
EAL_PKEY_METHOD_DEFINE(
CRYPT_PKEY_X25519,
CRYPT_X25519_NewCtx,
CRYPT_CURVE25519_DupCtx,
CRYPT_CURVE25519_FreeCtx,
NULL, // setPara
NULL, // getPara
CRYPT_X25519_GenKey,
CRYPT_CURVE25519_Ctrl,
CRYPT_CURVE25519_SetPubKeyEx,
CRYPT_CURVE25519_SetPrvKeyEx,
CRYPT_CURVE25519_GetPubKeyEx,
CRYPT_CURVE25519_GetPrvKeyEx,
NULL, // sign
NULL, // signData
NULL, // verify
NULL, // verifyData
NULL, // recover
CRYPT_CURVE25519_ComputeSharedKey,
NULL, // encrypt
NULL, // decrypt
NULL, // headd
NULL, // hemul
#ifdef HITLS_CRYPTO_X25519_CHECK
CRYPT_X25519_Check,
#else
NULL, // check
#endif
CRYPT_CURVE25519_Cmp,
NULL, // copyPara
NULL, // pkeyEncaps
NULL, // pkeyDecaps
NULL, // blind
NULL // unBlind
), // CRYPT_PKEY_X25519
#endif
#ifdef HITLS_CRYPTO_RSA
EAL_PKEY_METHOD_DEFINE(
CRYPT_PKEY_RSA,
CRYPT_RSA_NewCtx,
CRYPT_RSA_DupCtx,
CRYPT_RSA_FreeCtx,
CRYPT_RSA_SetParaEx,
NULL, // getPara
#ifdef HITLS_CRYPTO_RSA_GEN
CRYPT_RSA_Gen,
#else
NULL, // gen
#endif
CRYPT_RSA_Ctrl,
CRYPT_RSA_SetPubKeyEx,
CRYPT_RSA_SetPrvKeyEx,
CRYPT_RSA_GetPubKeyEx,
CRYPT_RSA_GetPrvKeyEx,
#ifdef HITLS_CRYPTO_RSA_SIGN
CRYPT_RSA_Sign,
CRYPT_RSA_SignData,
#else
NULL, // sign
NULL, // signData
#endif
#ifdef HITLS_CRYPTO_RSA_VERIFY
CRYPT_RSA_Verify,
CRYPT_RSA_VerifyData,
CRYPT_RSA_Recover,
#else
NULL, // verify
NULL, // verifyData
NULL, // recover
#endif
NULL, // computeShareKey
#ifdef HITLS_CRYPTO_RSA_ENCRYPT
CRYPT_RSA_Encrypt,
#else
NULL, // encrypt
#endif
#ifdef HITLS_CRYPTO_RSA_DECRYPT
CRYPT_RSA_Decrypt,
#else
NULL, // decrypt
#endif
NULL, // headd
NULL, // hemul
#ifdef HITLS_CRYPTO_RSA_CHECK
CRYPT_RSA_Check,
#else
NULL, // check
#endif
CRYPT_RSA_Cmp,
NULL, // copyPara
NULL, // pkeyEncaps
NULL, // pkeyDecaps
#ifdef HITLS_CRYPTO_RSA_BSSA
#ifdef HITLS_CRYPTO_RSA_SIGN
CRYPT_RSA_Blind, // blind
#else
NULL, // blind
#endif
#ifdef HITLS_CRYPTO_RSA_VERIFY
CRYPT_RSA_UnBlind // unBlind
#else
NULL // unBlind
#endif
#else
NULL, // blind
NULL // unBlind
#endif
),
#endif
#ifdef HITLS_CRYPTO_DH
EAL_PKEY_METHOD_DEFINE(
CRYPT_PKEY_DH,
CRYPT_DH_NewCtx,
CRYPT_DH_DupCtx,
CRYPT_DH_FreeCtx,
CRYPT_DH_SetParaEx,
CRYPT_DH_GetParaEx,
CRYPT_DH_Gen,
CRYPT_DH_Ctrl,
CRYPT_DH_SetPubKeyEx,
CRYPT_DH_SetPrvKeyEx,
CRYPT_DH_GetPubKeyEx,
CRYPT_DH_GetPrvKeyEx,
NULL, // sign
NULL, // signData
NULL, // verify
NULL, // verifyData
NULL, // recover
CRYPT_DH_ComputeShareKey,
NULL, // encrypt
NULL, // decrypt
NULL, // headd
NULL, // hemul
#ifdef HITLS_CRYPTO_DH_CHECK
CRYPT_DH_Check,
#else
NULL, // check
#endif
CRYPT_DH_Cmp,
NULL,
NULL, // pkeyEncaps
NULL, // pkeyDecaps
NULL, // blind
NULL // unBlind
),
#endif
#ifdef HITLS_CRYPTO_ECDSA
EAL_PKEY_METHOD_DEFINE(
CRYPT_PKEY_ECDSA,
CRYPT_ECDSA_NewCtx,
CRYPT_ECDSA_DupCtx,
CRYPT_ECDSA_FreeCtx,
CRYPT_ECDSA_SetParaEx,
CRYPT_ECDSA_GetParaEx,
CRYPT_ECDSA_Gen,
CRYPT_ECDSA_Ctrl,
CRYPT_ECDSA_SetPubKeyEx,
CRYPT_ECDSA_SetPrvKeyEx,
CRYPT_ECDSA_GetPubKeyEx,
CRYPT_ECDSA_GetPrvKeyEx,
CRYPT_ECDSA_Sign,
CRYPT_ECDSA_SignData,
CRYPT_ECDSA_Verify,
CRYPT_ECDSA_VerifyData,
NULL, // recover
NULL, // computeShareKey
NULL, // encrypt
NULL, // decrypt
NULL, // headd
NULL, // hemul
#ifdef HITLS_CRYPTO_ECDSA_CHECK
CRYPT_ECDSA_Check,
#else
NULL, // check
#endif
CRYPT_ECDSA_Cmp,
NULL, // copyPara
NULL, // pkeyEncaps
NULL, // pkeyDecaps
NULL, // blind
NULL // unBlind
),
#endif
#ifdef HITLS_CRYPTO_ECDH
EAL_PKEY_METHOD_DEFINE(
CRYPT_PKEY_ECDH,
CRYPT_ECDH_NewCtx,
CRYPT_ECDH_DupCtx,
CRYPT_ECDH_FreeCtx,
CRYPT_ECDH_SetParaEx,
CRYPT_ECDH_GetParaEx,
CRYPT_ECDH_Gen,
CRYPT_ECDH_Ctrl,
CRYPT_ECDH_SetPubKeyEx,
CRYPT_ECDH_SetPrvKeyEx,
CRYPT_ECDH_GetPubKeyEx,
CRYPT_ECDH_GetPrvKeyEx,
NULL, // sign
NULL, // signData
NULL, // verify
NULL, // verifyData
NULL, // recover
CRYPT_ECDH_ComputeShareKey,
NULL, // encrypt
NULL, // decrypt
NULL, // headd
NULL, // hemul
#ifdef HITLS_CRYPTO_ECDH_CHECK
CRYPT_ECDH_Check,
#else
NULL, // check
#endif
CRYPT_ECDH_Cmp,
NULL, // copyPara
NULL, // pkeyEncaps
NULL, // pkeyDecaps
NULL, // blind
NULL // unBlind
),
#endif
#ifdef HITLS_CRYPTO_SM2
EAL_PKEY_METHOD_DEFINE(
CRYPT_PKEY_SM2,
CRYPT_SM2_NewCtx,
CRYPT_SM2_DupCtx,
CRYPT_SM2_FreeCtx,
NULL, // setPara
NULL, // getPara
CRYPT_SM2_Gen,
CRYPT_SM2_Ctrl,
CRYPT_SM2_SetPubKeyEx,
CRYPT_SM2_SetPrvKeyEx,
CRYPT_SM2_GetPubKeyEx,
CRYPT_SM2_GetPrvKeyEx,
#ifdef HITLS_CRYPTO_SM2_SIGN
CRYPT_SM2_Sign,
NULL,
CRYPT_SM2_Verify,
NULL,
#else
NULL, // sign
NULL, // signData
NULL, // verify
NULL, // verifyData
#endif
NULL, // recover
#ifdef HITLS_CRYPTO_SM2_EXCH
CRYPT_SM2_KapComputeKey, // compute share key
#else
NULL, // computeShareKey
#endif
#ifdef HITLS_CRYPTO_SM2_CRYPT
CRYPT_SM2_Encrypt, // encrypt
CRYPT_SM2_Decrypt, // decrypt
#else
NULL, // encrypt
NULL, // decrypt
#endif
NULL, // headd
NULL, // hemul
#ifdef HITLS_CRYPTO_SM2_CHECK
CRYPT_SM2_Check,
#else
NULL, // check
#endif
CRYPT_SM2_Cmp,
NULL, // copyPara
NULL, // pkeyEncaps
NULL, // pkeyDecaps
NULL, // blind
NULL // unBlind
), // CRYPT_PKEY_SM2
#endif
#ifdef HITLS_CRYPTO_PAILLIER
EAL_PKEY_METHOD_DEFINE(
CRYPT_PKEY_PAILLIER,
CRYPT_PAILLIER_NewCtx,
CRYPT_PAILLIER_DupCtx,
CRYPT_PAILLIER_FreeCtx,
CRYPT_PAILLIER_SetParaEx,
NULL,
CRYPT_PAILLIER_Gen,
CRYPT_PAILLIER_Ctrl,
CRYPT_PAILLIER_SetPubKeyEx,
CRYPT_PAILLIER_SetPrvKeyEx,
CRYPT_PAILLIER_GetPubKeyEx,
CRYPT_PAILLIER_GetPrvKeyEx,
NULL,
NULL,
NULL,
NULL,
NULL, // recover
NULL,
CRYPT_PAILLIER_Encrypt,
CRYPT_PAILLIER_Decrypt,
CRYPT_PAILLIER_Add,
NULL,
NULL,
NULL, // cmp
NULL, // copyPara
NULL, // pkeyEncaps
NULL, // pkeyDecaps
NULL, // blind
NULL // unBlind
), // CRYPT_PKEY_PAILLIER
#endif
#ifdef HITLS_CRYPTO_ELGAMAL
EAL_PKEY_METHOD_DEFINE(
CRYPT_PKEY_ELGAMAL,
CRYPT_ELGAMAL_NewCtx,
CRYPT_ELGAMAL_DupCtx,
CRYPT_ELGAMAL_FreeCtx,
CRYPT_ELGAMAL_SetParaEx,
NULL,
CRYPT_ELGAMAL_Gen,
CRYPT_ELGAMAL_Ctrl,
CRYPT_ELGAMAL_SetPubKeyEx,
CRYPT_ELGAMAL_SetPrvKeyEx,
CRYPT_ELGAMAL_GetPubKeyEx,
CRYPT_ELGAMAL_GetPrvKeyEx,
NULL,
NULL,
NULL,
NULL,
NULL, // recover
NULL,
CRYPT_ELGAMAL_Encrypt,
CRYPT_ELGAMAL_Decrypt,
NULL, // headd
NULL, // hemul
NULL,
NULL, // cmp
NULL, // copyPara
NULL, // pkeyEncaps
NULL, // pkeyDecaps
NULL, // blind
NULL // unBlind
), // CRYPT_PKEY_ELGAMAL
#endif
#ifdef HITLS_CRYPTO_MLKEM
EAL_PKEY_METHOD_DEFINE(
CRYPT_PKEY_ML_KEM,
CRYPT_ML_KEM_NewCtx,
CRYPT_ML_KEM_DupCtx,
CRYPT_ML_KEM_FreeCtx,
NULL, // setPara
NULL, // getPara
CRYPT_ML_KEM_GenKey,
CRYPT_ML_KEM_Ctrl,
CRYPT_ML_KEM_SetEncapsKeyEx,
CRYPT_ML_KEM_SetDecapsKeyEx,
CRYPT_ML_KEM_GetEncapsKeyEx,
CRYPT_ML_KEM_GetDecapsKeyEx,
NULL, // sign
NULL, // signData
NULL, // verify
NULL, // verifyData
NULL, // recover
NULL, // computeShareKey
NULL, // encrypt
NULL, // decrypt
NULL, // headd
NULL, // hemul
#ifdef HITLS_CRYPTO_MLKEM_CHECK
CRYPT_ML_KEM_Check,
#else
NULL, // check
#endif
CRYPT_ML_KEM_Cmp,
NULL, // copyPara
CRYPT_ML_KEM_Encaps,
CRYPT_ML_KEM_Decaps,
NULL, // blind
NULL // unBlind
),
#endif
#ifdef HITLS_CRYPTO_MLDSA
EAL_PKEY_METHOD_DEFINE(
CRYPT_PKEY_ML_DSA,
CRYPT_ML_DSA_NewCtx,
CRYPT_ML_DSA_DupCtx,
CRYPT_ML_DSA_FreeCtx,
NULL, // setPara
NULL, // getPara
CRYPT_ML_DSA_GenKey,
CRYPT_ML_DSA_Ctrl,
CRYPT_ML_DSA_SetPubKeyEx,
CRYPT_ML_DSA_SetPrvKeyEx,
CRYPT_ML_DSA_GetPubKeyEx,
CRYPT_ML_DSA_GetPrvKeyEx,
CRYPT_ML_DSA_Sign, // sign
NULL, // signData
CRYPT_ML_DSA_Verify, // verify
NULL, // verifyData
NULL, // recover
NULL, // computeShareKey
NULL, // encrypt
NULL, // decrypt
NULL, // headd
NULL, // hemul
#ifdef HITLS_CRYPTO_MLDSA_CHECK
CRYPT_ML_DSA_Check,
#else
NULL, // check
#endif
CRYPT_ML_DSA_Cmp,
NULL, // copyPara
NULL, // pkeyEncaps
NULL, // pkeyDecaps
NULL, // blind
NULL // unBlind
),
#endif
#ifdef HITLS_CRYPTO_SLH_DSA
EAL_PKEY_METHOD_DEFINE(
CRYPT_PKEY_SLH_DSA,
CRYPT_SLH_DSA_NewCtx,
NULL, // dupCtx
CRYPT_SLH_DSA_FreeCtx,
NULL, // setPara
NULL, // getPara
CRYPT_SLH_DSA_Gen,
CRYPT_SLH_DSA_Ctrl,
CRYPT_SLH_DSA_SetPubKeyEx,
CRYPT_SLH_DSA_SetPrvKeyEx,
CRYPT_SLH_DSA_GetPubKeyEx,
CRYPT_SLH_DSA_GetPrvKeyEx,
CRYPT_SLH_DSA_Sign,
NULL,
CRYPT_SLH_DSA_Verify,
NULL,
NULL,
NULL, // verifyData
NULL, // recover
NULL, // computeShareKey
NULL, // encrypt
NULL, // decrypt
#ifdef HITLS_CRYPTO_SLH_DSA_CHECK
CRYPT_SLH_DSA_Check,
#else
NULL, // check
#endif
NULL, // cmp
NULL, // copyPara
NULL, // pkeyEncaps
NULL, // pkeyDecaps
NULL, // blind
NULL // unBlind
),
#endif
#ifdef HITLS_CRYPTO_XMSS
EAL_PKEY_METHOD_DEFINE(
CRYPT_PKEY_XMSS,
CRYPT_XMSS_NewCtx,
NULL, // dupCtx
CRYPT_XMSS_FreeCtx,
NULL, // setPara
NULL, // getPara
CRYPT_XMSS_Gen,
CRYPT_XMSS_Ctrl,
CRYPT_XMSS_SetPubKey,
CRYPT_XMSS_SetPrvKey,
CRYPT_XMSS_GetPubKey,
CRYPT_XMSS_GetPrvKey,
CRYPT_XMSS_Sign,
NULL,
CRYPT_XMSS_Verify,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL
),
#endif
#ifdef HITLS_CRYPTO_HYBRIDKEM
EAL_PKEY_METHOD_DEFINE(
CRYPT_PKEY_HYBRID_KEM,
CRYPT_HYBRID_KEM_NewCtx,
NULL,
CRYPT_HYBRID_KEM_FreeCtx,
NULL, // setPara
NULL, // getPara
CRYPT_HYBRID_KEM_GenKey,
CRYPT_HYBRID_KEM_KeyCtrl,
CRYPT_HYBRID_KEM_SetEncapsKeyEx,
CRYPT_HYBRID_KEM_SetDecapsKeyEx,
CRYPT_HYBRID_KEM_GetEncapsKeyEx,
CRYPT_HYBRID_KEM_GetDecapsKeyEx,
NULL, // sign
NULL, // signData
NULL, // verify
NULL, // verifyData
NULL, // recover
NULL, // computeShareKey
NULL, // encrypt
NULL, // decrypt
NULL, // headd
NULL, // hemul
NULL, // check
NULL,
NULL, // copyPara
CRYPT_HYBRID_KEM_Encaps,
CRYPT_HYBRID_KEM_Decaps,
NULL, // blind
NULL // unBlind
),
#endif
};
const EAL_PkeyMethod *CRYPT_EAL_PkeyFindMethod(CRYPT_PKEY_AlgId id)
{
uint32_t num = sizeof(METHODS) / sizeof(METHODS[0]);
const EAL_PkeyMethod *pkeyMeth = NULL;
for (uint32_t i = 0; i < num; i++) {
if (METHODS[i].id == id) {
pkeyMeth = &METHODS[i];
return pkeyMeth;
}
}
return NULL;
}
#endif
|
2301_79861745/bench_create
|
crypto/eal/src/eal_pkey_method.c
|
C
|
unknown
| 17,564
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_PKEY)
#include <stdbool.h>
#include "securec.h"
#include "bsl_sal.h"
#include "crypt_eal_pkey.h"
#include "crypt_eal_md.h"
#include "crypt_errno.h"
#include "eal_md_local.h"
#include "eal_pkey_local.h"
#include "crypt_eal_rand.h"
#include "crypt_algid.h"
#include "bsl_err_internal.h"
#include "eal_common.h"
#include "crypt_utils.h"
int32_t CRYPT_EAL_PkeySignData(const CRYPT_EAL_PkeyCtx *pkey, const uint8_t *hash,
uint32_t hashLen, uint8_t *sign, uint32_t *signLen)
{
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->signData == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
if ((hash == NULL && hashLen != 0) || (hash != NULL && hashLen == 0)) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
int32_t ret = pkey->method->signData(pkey->key, hash, hashLen, sign, signLen);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
int32_t CRYPT_EAL_PkeySign(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_MD_AlgId id,
const uint8_t *data, uint32_t dataLen, uint8_t *sign, uint32_t *signLen)
{
// 1. Check the input parameter
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->sign == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = pkey->method->sign(pkey->key, id, data, dataLen, sign, signLen);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
int32_t CRYPT_EAL_PkeyVerify(const CRYPT_EAL_PkeyCtx *pkey, CRYPT_MD_AlgId id,
const uint8_t *data, uint32_t dataLen, const uint8_t *sign, uint32_t signLen)
{
// 1. Check the input parameter
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->verify == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
// 2. Hash the plaintext data and verify the hash value.
int32_t ret = pkey->method->verify(pkey->key, id, data, dataLen, sign, signLen);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
return ret;
}
return ret;
}
int32_t CRYPT_EAL_PkeyVerifyData(const CRYPT_EAL_PkeyCtx *pkey, const uint8_t *hash,
uint32_t hashLen, const uint8_t *sign, uint32_t signLen)
{
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->verifyData == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
if ((hash == NULL && hashLen != 0) || (hash != NULL && hashLen == 0)) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
int32_t ret = pkey->method->verifyData(pkey->key, hash, hashLen, sign, signLen);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
int32_t CRYPT_EAL_PkeyBlind(CRYPT_EAL_PkeyCtx *pkey, CRYPT_MD_AlgId id, const uint8_t *input, uint32_t inputLen,
uint8_t *out, uint32_t *outLen)
{
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->blind == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = pkey->method->blind(pkey->key, id, input, inputLen, out, outLen);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
int32_t CRYPT_EAL_PkeyUnBlind(CRYPT_EAL_PkeyCtx *pkey, const uint8_t *input, uint32_t inputLen,
uint8_t *out, uint32_t *outLen)
{
if (pkey == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, CRYPT_PKEY_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->method == NULL || pkey->method->unBlind == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, CRYPT_EAL_ALG_NOT_SUPPORT);
return CRYPT_EAL_ALG_NOT_SUPPORT;
}
int32_t ret = pkey->method->unBlind(pkey->key, input, inputLen, out, outLen);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_PKEY, pkey->id, ret);
}
return ret;
}
#endif
|
2301_79861745/bench_create
|
crypto/eal/src/eal_pkey_sign.c
|
C
|
unknown
| 5,882
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_DRBG)
#include <stdbool.h>
#include <securec.h>
#include "crypt_eal_rand.h"
#include "crypt_errno.h"
#include "bsl_errno.h"
#include "bsl_sal.h"
#include "crypt_algid.h"
#include "crypt_drbg.h"
#ifdef HITLS_CRYPTO_MD
#include "eal_md_local.h"
#endif
#ifdef HITLS_CRYPTO_MAC
#include "eal_mac_local.h"
#endif
#ifdef HITLS_CRYPTO_CIPHER
#include "eal_cipher_local.h"
#endif
#include "crypt_drbg_local.h"
#include "bsl_err_internal.h"
#include "crypt_types.h"
#include "crypt_utils.h"
#include "crypt_util_rand.h"
#include "eal_common.h"
#include "eal_entropy.h"
#include "sal_atomic.h"
#include "crypt_ealinit.h"
#include "crypt_eal_implprovider.h"
#include "crypt_eal_provider.h"
#include "crypt_provider.h"
#include "crypt_params_key.h"
#ifdef HITLS_CRYPTO_ENTROPY
static EAL_SeedDrbg g_seedDrbg = {HITLS_SEED_DRBG_INIT_RAND_ALG, NULL, NULL, {0}, {0}};
static BSL_SAL_ThreadLockHandle g_seedLock = NULL;
#endif
static CRYPT_EAL_RndCtx *EAL_RandNewDrbg(CRYPT_RAND_AlgId id, CRYPT_RandSeedMethod *seedMeth, void *seedCtx);
#define RETURN_RAND_LOCK(ctx, ret) \
do { \
(ret) = BSL_SAL_ThreadWriteLock(((ctx)->lock)); \
if ((ret) != BSL_SUCCESS) { \
BSL_ERR_PUSH_ERROR((ret)); \
return (ret); \
} \
} while (0)
#define RAND_UNLOCK(ctx) (void)BSL_SAL_ThreadUnlock(((ctx)->lock))
#if defined(HITLS_CRYPTO_RAND_CB)
static CRYPT_EAL_RandFunc g_rndFunc = NULL;
static CRYPT_EAL_RandFuncEx g_rndFuncEx = NULL;
#endif
static int32_t EAL_RandSetMeth(EAL_RandUnitaryMethod *meth, CRYPT_EAL_RndCtx *ctx)
{
EAL_RandUnitaryMethod *temp = BSL_SAL_Dump(meth, sizeof(EAL_RandUnitaryMethod));
if (temp == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ctx->meth = temp;
return CRYPT_SUCCESS;
}
static int32_t GetSeedParam(BSL_Param *seedParam, CRYPT_RandSeedMethod *seedMeth, void *seedCtx)
{
uint32_t iter = 0;
if (seedCtx != NULL) {
if (BSL_PARAM_InitValue(&seedParam[iter++], CRYPT_PARAM_RAND_SEEDCTX, BSL_PARAM_TYPE_CTX_PTR, seedCtx, 0)
!= CRYPT_SUCCESS) {
return CRYPT_DRBG_PARAM_ERROR;
}
}
if (seedMeth->getEntropy != NULL) {
if (BSL_PARAM_InitValue(&seedParam[iter++], CRYPT_PARAM_RAND_SEED_GETENTROPY, BSL_PARAM_TYPE_FUNC_PTR,
seedMeth->getEntropy, 0) != CRYPT_SUCCESS) {
return CRYPT_DRBG_PARAM_ERROR;
}
}
if (seedMeth->cleanEntropy != NULL) {
if (BSL_PARAM_InitValue(&seedParam[iter++], CRYPT_PARAM_RAND_SEED_CLEANENTROPY, BSL_PARAM_TYPE_FUNC_PTR,
seedMeth->cleanEntropy, 0) != CRYPT_SUCCESS) {
return CRYPT_DRBG_PARAM_ERROR;
}
}
if (seedMeth->getNonce != NULL) {
if (BSL_PARAM_InitValue(&seedParam[iter++], CRYPT_PARAM_RAND_SEED_GETNONCE, BSL_PARAM_TYPE_FUNC_PTR,
seedMeth->getNonce, 0) != CRYPT_SUCCESS) {
return CRYPT_DRBG_PARAM_ERROR;
}
}
if (seedMeth->cleanNonce != NULL) {
if (BSL_PARAM_InitValue(&seedParam[iter++], CRYPT_PARAM_RAND_SEED_CLEANNONCE, BSL_PARAM_TYPE_FUNC_PTR,
seedMeth->cleanNonce, 0) != CRYPT_SUCCESS) {
return CRYPT_DRBG_PARAM_ERROR;
}
}
return CRYPT_SUCCESS;
}
/* Initialize the global DRBG. */
static int32_t EAL_RandNew(CRYPT_RAND_AlgId id, CRYPT_RandSeedMethod *seedMeth, void *seedCtx, CRYPT_EAL_RndCtx *ctx)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->working == true) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_RAND_WORKING);
return CRYPT_EAL_ERR_RAND_WORKING;
}
BSL_Param seedParam[6] = {BSL_PARAM_END};
int32_t ret = GetSeedParam(seedParam, seedMeth, seedCtx);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ctx->ctx = ctx->meth->newCtx(NULL, id, seedParam);
if (ctx->ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_DRBG_INIT_FAIL);
return CRYPT_EAL_ERR_DRBG_INIT_FAIL;
}
return CRYPT_SUCCESS;
}
static void MethFreeCtx(CRYPT_EAL_RndCtx *ctx)
{
EAL_RandUnitaryMethod *meth = ctx->meth;
if (meth != NULL && meth->freeCtx != NULL) {
meth->freeCtx(ctx->ctx);
}
BSL_SAL_FREE(ctx->meth);
return;
}
#ifdef HITLS_CRYPTO_ENTROPY
int32_t EAL_SeedDrbgLockInit(void)
{
if (g_seedLock != NULL) {
return BSL_SUCCESS;
}
return BSL_SAL_ThreadLockNew(&g_seedLock);
}
void EAL_SeedDrbgLockDeInit(void)
{
if (g_seedLock == NULL) {
return;
}
BSL_SAL_ThreadLockFree(g_seedLock);
g_seedLock = NULL;
}
void EAL_SeedDrbgRandDeinit(CRYPT_EAL_RndCtx *rndCtx)
{
if (rndCtx == NULL) {
return;
}
rndCtx->working = false;
MethFreeCtx(rndCtx);
BSL_SAL_ThreadLockFree(rndCtx->lock);
BSL_SAL_FREE(rndCtx);
}
void EAL_SeedDrbgDeinit(bool isDefaultSeed)
{
if (!isDefaultSeed) {
return;
}
(void)BSL_SAL_ThreadWriteLock(g_seedLock);
int val = 0;
BSL_SAL_AtomicDownReferences(&(g_seedDrbg.references), &val);
if (val > 0) {
(void)BSL_SAL_ThreadUnlock(g_seedLock);
return;
}
if (g_seedDrbg.seed != NULL) {
EAL_SeedDrbgRandDeinit(g_seedDrbg.seed);
g_seedDrbg.seed = NULL;
CRYPT_EAL_SeedPoolFree(g_seedDrbg.seedCtx);
g_seedDrbg.seedCtx = NULL;
(void)memset_s(&(g_seedDrbg.seedMeth), sizeof(g_seedDrbg.seedMeth), 0, sizeof(g_seedDrbg.seedMeth));
BSL_SAL_ReferencesFree(&(g_seedDrbg.references));
}
(void)BSL_SAL_ThreadUnlock(g_seedLock);
}
#endif
void EAL_RandDeinit(CRYPT_EAL_RndCtx *ctx)
{
if (ctx == NULL) {
return;
}
BSL_SAL_ThreadLockHandle lock = ctx->lock;
ctx->lock = NULL;
if (BSL_SAL_ThreadWriteLock(lock) != BSL_SUCCESS) { // write lock
MethFreeCtx(ctx);
BSL_SAL_ThreadLockFree(lock);
#ifdef HITLS_CRYPTO_ENTROPY
EAL_SeedDrbgDeinit(ctx->isDefaultSeed);
#endif
BSL_SAL_FREE(ctx);
return;
}
ctx->working = false;
MethFreeCtx(ctx);
(void)BSL_SAL_ThreadUnlock(lock);
BSL_SAL_ThreadLockFree(lock); // free the lock resource
#ifdef HITLS_CRYPTO_ENTROPY
EAL_SeedDrbgDeinit(ctx->isDefaultSeed);
#endif
BSL_SAL_FREE(ctx);
return;
}
// Check whether the state of CTX is available.
static int32_t CheckRndCtxState(CRYPT_EAL_RndCtx *ctx)
{
if (ctx->working == false) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, ctx->id, CRYPT_EAL_ERR_RAND_NO_WORKING);
return CRYPT_EAL_ERR_RAND_NO_WORKING;
}
return CRYPT_SUCCESS;
}
#if defined(HITLS_CRYPTO_RAND_CB)
void CRYPT_EAL_SetRandCallBack(CRYPT_EAL_RandFunc func)
{
g_rndFunc = func;
CRYPT_RandRegist(func);
return;
}
void CRYPT_EAL_SetRandCallBackEx(CRYPT_EAL_RandFuncEx func)
{
g_rndFuncEx = func;
CRYPT_RandRegistEx(func);
return;
}
#endif
int32_t EAL_DrbgbytesWithAdin(CRYPT_EAL_RndCtx *ctx, uint8_t *byte, uint32_t len, uint8_t *addin,
uint32_t addinLen)
{
if (ctx == NULL || ctx->meth == NULL || ctx->meth->gen == NULL || byte == NULL || len == 0) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, CRYPT_RAND_ALGID_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
int32_t ret;
RETURN_RAND_LOCK(ctx, ret); // write lock
ret = CheckRndCtxState(ctx);
if (ret != CRYPT_SUCCESS) {
RAND_UNLOCK(ctx);
return ret;
}
ret = ctx->meth->gen(ctx->ctx, byte, len, addin, addinLen, NULL);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, ctx->id, ret);
}
RAND_UNLOCK(ctx);
return ret;
}
int32_t EAL_DrbgSeedWithAdin(CRYPT_EAL_RndCtx *ctx, uint8_t *addin, uint32_t addinLen)
{
if (ctx == NULL || ctx->meth == NULL || ctx->meth->reSeed == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, CRYPT_RAND_ALGID_MAX, CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
int32_t ret;
RETURN_RAND_LOCK(ctx, ret); // write lock
ret = CheckRndCtxState(ctx);
if (ret != CRYPT_SUCCESS) {
RAND_UNLOCK(ctx);
return ret;
}
ret = ctx->meth->reSeed(ctx->ctx, addin, addinLen, NULL);
if (ret != CRYPT_SUCCESS) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, ctx->id, ret);
}
RAND_UNLOCK(ctx);
return ret;
}
void EAL_RandDrbgFree(void *ctx)
{
if (ctx == NULL) {
return;
}
DRBG_Ctx *drbg = (DRBG_Ctx *)ctx;
DRBG_Free(drbg);
return;
}
#ifdef HITLS_CRYPTO_ENTROPY
static int32_t GetSeedDrbgEntropy(void *ctx, CRYPT_Data *entropy, uint32_t strength, CRYPT_Range *lenRange)
{
int32_t ret;
CRYPT_EAL_RndCtx *seed = (CRYPT_EAL_RndCtx *)ctx;
uint32_t strengthBytes = (strength + 7) / 8; // Figure out how many bytes needed.
entropy->len = ((strengthBytes > lenRange->min) ? strengthBytes : lenRange->min);
if (entropy->len > lenRange->max) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_RANGE_ERROR);
return CRYPT_ENTROPY_RANGE_ERROR;
}
entropy->data = BSL_SAL_Malloc(entropy->len);
if (entropy->data == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ret = EAL_DrbgbytesWithAdin(seed, entropy->data, entropy->len, NULL, 0);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_FREE(entropy->data);
}
return ret;
}
static void CleanSeedDrbgEntropy(void *ctx, CRYPT_Data *entropy)
{
(void)ctx;
BSL_SAL_CleanseData(entropy->data, entropy->len);
BSL_SAL_FREE(entropy->data);
}
void EAL_SeedDrbgEntropyMeth(CRYPT_RandSeedMethod *meth)
{
meth->getEntropy = GetSeedDrbgEntropy;
meth->cleanEntropy = CleanSeedDrbgEntropy;
meth->cleanNonce = CleanSeedDrbgEntropy;
meth->getNonce = GetSeedDrbgEntropy;
}
static int32_t SetSeedDrbgReseedInfo(CRYPT_EAL_RndCtx *rndCtx)
{
int32_t ret;
#if defined(HITLS_CRYPTO_DRBG_GM)
if (g_seedDrbg.id == CRYPT_RAND_SM3 || g_seedDrbg.id == CRYPT_RAND_SM4_CTR_DF) {
uint32_t gmLevel = 2; // Set gm level 2
ret = rndCtx->meth->ctrl(rndCtx->ctx, CRYPT_CTRL_SET_GM_LEVEL, &gmLevel, sizeof(uint32_t));
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
return ret;
}
#endif
uint32_t reseedInterval = DRBG_RESEED_INTERVAL;
ret = rndCtx->meth->ctrl(rndCtx->ctx, CRYPT_CTRL_SET_RESEED_INTERVAL, &reseedInterval, sizeof(uint32_t));
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
return ret;
}
int32_t EAL_SeedDrbgInit(EAL_SeedDrbg *seedDrbg)
{
CRYPT_RandSeedMethod seedMethond = {0};
int32_t ret = EAL_SetDefaultEntropyMeth(&seedMethond);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
CRYPT_EAL_SeedPoolCtx *seedPoolCtx = CRYPT_EAL_SeedPoolNew(false);
if (seedPoolCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_NEW_ERROR);
return CRYPT_SEED_POOL_NEW_ERROR;
}
CRYPT_EAL_RndCtx *rndCtx = EAL_RandNewDrbg(seedDrbg->id, &seedMethond, seedPoolCtx);
if (rndCtx == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = SetSeedDrbgReseedInfo(rndCtx);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = rndCtx->meth->inst(rndCtx->ctx, NULL, 0, NULL);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
rndCtx->working = true;
seedDrbg->seed = rndCtx;
seedDrbg->seedMeth = seedMethond;
seedDrbg->seedCtx = seedPoolCtx;
BSL_SAL_ReferencesInit(&(seedDrbg->references));
return CRYPT_SUCCESS;
EXIT:
CRYPT_EAL_SeedPoolFree(seedPoolCtx);
EAL_RandDeinit(rndCtx);
return ret;
}
int32_t EAL_GetDefaultSeed(CRYPT_RandSeedMethod *seedMeth, void **seedCtx)
{
EAL_SeedDrbgEntropyMeth(seedMeth);
(void)BSL_SAL_ThreadWriteLock(g_seedLock);
if (g_seedDrbg.seed != NULL) {
*seedCtx = g_seedDrbg.seed;
int val = 0;
BSL_SAL_AtomicUpReferences(&(g_seedDrbg.references), &val);
(void)BSL_SAL_ThreadUnlock(g_seedLock);
return CRYPT_SUCCESS;
}
int32_t ret = EAL_SeedDrbgInit(&g_seedDrbg);
if (ret != CRYPT_SUCCESS) {
(void)BSL_SAL_ThreadUnlock(g_seedLock);
return CRYPT_EAL_ERR_DRBG_INIT_FAIL;
}
*seedCtx = g_seedDrbg.seed;
(void)BSL_SAL_ThreadUnlock(g_seedLock);
return CRYPT_SUCCESS;
}
#endif
static CRYPT_EAL_RndCtx *EAL_RandNewDrbg(CRYPT_RAND_AlgId id, CRYPT_RandSeedMethod *seedMeth,
void *seedCtx)
{
#ifdef HITLS_CRYPTO_ASM_CHECK
if (CRYPT_ASMCAP_Drbg(id) != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return NULL;
}
#endif
CRYPT_RandSeedMethod seedMethTmp = {0};
CRYPT_RandSeedMethod *seedMethond = seedMeth;
EAL_RandUnitaryMethod *meth = NULL;
void *seedTmp = NULL;
int32_t ret;
CRYPT_EAL_RndCtx *randCtx = (CRYPT_EAL_RndCtx *)BSL_SAL_Calloc(1, sizeof(CRYPT_EAL_RndCtx));
if (randCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
randCtx->isDefaultSeed = false;
if (seedMeth == NULL || seedMeth->getEntropy == NULL) {
#ifdef HITLS_CRYPTO_ENTROPY
ret = EAL_GetDefaultSeed(&seedMethTmp, &seedTmp);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
seedCtx = seedTmp;
seedMethond = &seedMethTmp;
randCtx->isDefaultSeed = true;
#else
(void)seedMethTmp;
(void)seedTmp;
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
goto ERR;
#endif
}
meth = EAL_RandGetMethod();
// Apply for lock resources.
ret = BSL_SAL_ThreadLockNew(&(randCtx->lock));
if (ret != CRYPT_SUCCESS) {
goto ERR;
}
randCtx->isProvider = false;
randCtx->working = false;
randCtx->id = id;
ret = EAL_RandSetMeth(meth, randCtx);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
ret = EAL_RandNew(id, seedMethond, seedCtx, randCtx);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
return randCtx;
ERR:
EAL_RandDeinit(randCtx);
return NULL;
}
#ifdef HITLS_CRYPTO_DRBG
static CRYPT_EAL_RndCtx *g_globalRndCtx = NULL;
static int32_t DrbgParaIsValid(CRYPT_RAND_AlgId id, const CRYPT_RandSeedMethod *seedMeth, const void *seedCtx,
const uint8_t *pers, uint32_t persLen)
{
if (DRBG_GetIdMap(id) == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID);
return CRYPT_EAL_ERR_ALGID;
}
if (seedMeth == NULL && seedCtx != NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pers == NULL && persLen != 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (seedMeth != NULL && seedMeth->getEntropy == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_RandInit(CRYPT_RAND_AlgId id, CRYPT_RandSeedMethod *seedMeth, void *seedCtx,
const uint8_t *pers, uint32_t persLen)
{
CRYPT_EAL_RndCtx *ctx = NULL;
if (g_globalRndCtx != NULL) { // Prevent DRBG repeated Init
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_DRBG_REPEAT_INIT);
return CRYPT_EAL_ERR_DRBG_REPEAT_INIT;
}
int32_t ret = DrbgParaIsValid(id, seedMeth, seedCtx, pers, persLen);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ctx = EAL_RandNewDrbg(id, seedMeth, seedCtx);
if (ctx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, id, CRYPT_EAL_ERR_DRBG_INIT_FAIL);
return CRYPT_EAL_ERR_DRBG_INIT_FAIL;
}
ret = CRYPT_EAL_DrbgInstantiate(ctx, pers, persLen);
if (ret != CRYPT_SUCCESS) {
EAL_RandDeinit(ctx);
return ret;
}
CRYPT_RandRegist((CRYPT_EAL_RandFunc)CRYPT_EAL_Randbytes);
g_globalRndCtx = ctx;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_RandbytesWithAdin(uint8_t *byte, uint32_t len, uint8_t *addin, uint32_t addinLen)
{
if (g_globalRndCtx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, CRYPT_RAND_ALGID_MAX, CRYPT_EAL_ERR_GLOBAL_DRBG_NULL);
return CRYPT_EAL_ERR_GLOBAL_DRBG_NULL;
}
return EAL_DrbgbytesWithAdin(g_globalRndCtx, byte, len, addin, addinLen);
}
int32_t CRYPT_EAL_Randbytes(uint8_t *byte, uint32_t len)
{
#if defined(HITLS_CRYPTO_RAND_CB)
if (g_rndFunc != NULL) {
return g_rndFunc(byte, len);
}
#endif
return CRYPT_EAL_RandbytesWithAdin(byte, len, NULL, 0);
}
int32_t CRYPT_EAL_RandSeedWithAdin(uint8_t *addin, uint32_t addinLen)
{
if (g_globalRndCtx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, CRYPT_RAND_ALGID_MAX, CRYPT_EAL_ERR_GLOBAL_DRBG_NULL);
return CRYPT_EAL_ERR_GLOBAL_DRBG_NULL;
}
return EAL_DrbgSeedWithAdin(g_globalRndCtx, addin, addinLen);
}
int32_t CRYPT_EAL_RandSeed(void)
{
return CRYPT_EAL_RandSeedWithAdin(NULL, 0);
}
bool CRYPT_EAL_RandIsValidAlgId(CRYPT_RAND_AlgId id)
{
return (DRBG_GetIdMap(id) != NULL);
}
#endif // end of HITLS_CRYPTO_DRBG
int32_t CRYPT_EAL_DrbgInstantiate(CRYPT_EAL_RndCtx *rndCtx, const uint8_t *pers, uint32_t persLen)
{
if (rndCtx == NULL || rndCtx->meth == NULL || rndCtx->meth->inst == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
int32_t ret;
RETURN_RAND_LOCK(rndCtx, ret);
ret = rndCtx->meth->inst(rndCtx->ctx, pers, persLen, NULL);
if (ret != CRYPT_SUCCESS) {
RAND_UNLOCK(rndCtx);
return ret;
}
rndCtx->working = true;
RAND_UNLOCK(rndCtx);
return ret;
}
CRYPT_EAL_RndCtx *CRYPT_EAL_DrbgNew(CRYPT_RAND_AlgId id, CRYPT_RandSeedMethod *seedMeth, void *seedCtx)
{
if (seedMeth == NULL && seedCtx != NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, id, CRYPT_NULL_INPUT);
return NULL;
}
return EAL_RandNewDrbg(id, seedMeth, seedCtx);
}
int32_t CRYPT_EAL_DrbgSeedWithAdin(CRYPT_EAL_RndCtx *ctx, uint8_t *addin, uint32_t addinLen)
{
return EAL_DrbgSeedWithAdin(ctx, addin, addinLen);
}
int32_t CRYPT_EAL_DrbgSeed(CRYPT_EAL_RndCtx *ctx)
{
return CRYPT_EAL_DrbgSeedWithAdin(ctx, NULL, 0);
}
int32_t CRYPT_EAL_DrbgbytesWithAdin(CRYPT_EAL_RndCtx *ctx, uint8_t *byte, uint32_t len, uint8_t *addin,
uint32_t addinLen)
{
return EAL_DrbgbytesWithAdin(ctx, byte, len, addin, addinLen);
}
int32_t CRYPT_EAL_Drbgbytes(CRYPT_EAL_RndCtx *ctx, uint8_t *byte, uint32_t len)
{
return CRYPT_EAL_DrbgbytesWithAdin(ctx, byte, len, NULL, 0);
}
void CRYPT_EAL_DrbgDeinit(CRYPT_EAL_RndCtx *ctx)
{
EAL_RandDeinit(ctx);
return;
}
CRYPT_EAL_RndCtx *CRYPT_EAL_GetSeedCtx(bool isParentEntropy)
{
if (isParentEntropy) {
#ifdef HITLS_CRYPTO_ENTROPY
return g_seedDrbg.seed;
#else
return NULL;
#endif
}
return g_globalRndCtx;
}
static int32_t GetDrbgWorkingStatus(CRYPT_EAL_RndCtx *rndCtx, void *val, uint32_t len)
{
RETURN_RET_IF(val == NULL, CRYPT_NULL_INPUT);
RETURN_RET_IF(len != sizeof(uint32_t), CRYPT_INVALID_ARG);
*(uint32_t *)val = (uint32_t)(rndCtx->working);
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_DrbgCtrl(CRYPT_EAL_RndCtx *rndCtx, int32_t opt, void *val, uint32_t len)
{
if (rndCtx == NULL || rndCtx->meth == NULL || rndCtx->meth->ctrl == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (opt == CRYPT_CTRL_GET_WORKING_STATUS) {
return GetDrbgWorkingStatus(rndCtx, val, len);
}
int32_t ret;
RETURN_RAND_LOCK(rndCtx, ret);
if (rndCtx->working == true) {
RAND_UNLOCK(rndCtx);
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_RAND_WORKING);
return CRYPT_EAL_ERR_RAND_WORKING;
}
ret = rndCtx->meth->ctrl(rndCtx->ctx, opt, val, len);
RAND_UNLOCK(rndCtx);
return ret;
}
#ifdef HITLS_CRYPTO_PROVIDER
int32_t CRYPT_EAL_SetRandMethod(CRYPT_EAL_RndCtx *ctx, const CRYPT_EAL_Func *funcs)
{
int32_t index = 0;
EAL_RandUnitaryMethod *method = BSL_SAL_Calloc(1, sizeof(EAL_RandUnitaryMethod));
if (method == NULL) {
BSL_ERR_PUSH_ERROR(BSL_MALLOC_FAIL);
return BSL_MALLOC_FAIL;
}
while (funcs[index].id != 0) {
switch (funcs[index].id) {
case CRYPT_EAL_IMPLRAND_DRBGNEWCTX:
method->newCtx = funcs[index].func;
break;
case CRYPT_EAL_IMPLRAND_DRBGINST:
method->inst = funcs[index].func;
break;
case CRYPT_EAL_IMPLRAND_DRBGUNINST:
method->unInst = funcs[index].func;
break;
case CRYPT_EAL_IMPLRAND_DRBGGEN:
method->gen = funcs[index].func;
break;
case CRYPT_EAL_IMPLRAND_DRBGRESEED:
method->reSeed = funcs[index].func;
break;
case CRYPT_EAL_IMPLRAND_DRBGCTRL:
method->ctrl = funcs[index].func;
break;
case CRYPT_EAL_IMPLRAND_DRBGFREECTX:
method->freeCtx = funcs[index].func;
break;
default:
BSL_SAL_Free(method);
BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL);
return CRYPT_PROVIDER_ERR_UNEXPECTED_IMPL;
}
index++;
}
ctx->meth = method;
return CRYPT_SUCCESS;
}
static CRYPT_EAL_RndCtx *EAL_ProvRandInitDrbg(CRYPT_EAL_LibCtx *libCtx, CRYPT_RAND_AlgId id,
const char *attrName, BSL_Param *param)
{
const CRYPT_EAL_Func *funcs = NULL;
void *provCtx = NULL;
int32_t ret = CRYPT_EAL_ProviderGetFuncs(libCtx, CRYPT_EAL_OPERAID_RAND, id, attrName,
&funcs, &provCtx);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return NULL;
}
CRYPT_EAL_RndCtx *randCtx = BSL_SAL_Calloc(1, sizeof(CRYPT_EAL_RndCtx));
if (randCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
// Apply for lock resources.
ret = BSL_SAL_ThreadLockNew(&(randCtx->lock));
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
BSL_SAL_FREE(randCtx);
return NULL;
}
randCtx->isDefaultSeed = false;
randCtx->isProvider = true;
randCtx->working = false;
randCtx->id = id;
ret = CRYPT_EAL_SetRandMethod(randCtx, funcs);
if (ret != CRYPT_SUCCESS) {
goto ERR;
}
if (randCtx->meth->newCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
goto ERR;
}
randCtx->ctx = randCtx->meth->newCtx(provCtx, id, param);
if (randCtx->ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_DRBG_INIT_FAIL);
goto ERR;
}
return randCtx;
ERR:
BSL_SAL_ThreadLockFree(randCtx->lock); // free the lock resource
BSL_SAL_FREE(randCtx->meth);
BSL_SAL_FREE(randCtx);
return NULL;
}
int32_t CRYPT_EAL_ProviderRandInitCtxInner(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName,
const uint8_t *pers, uint32_t persLen, BSL_Param *param)
{
CRYPT_EAL_RndCtx *ctx = NULL;
CRYPT_EAL_LibCtx *localLibCtx = NULL;
localLibCtx = libCtx;
if (localLibCtx == NULL) {
localLibCtx = CRYPT_EAL_GetGlobalLibCtx();
}
if (localLibCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_INVALID_LIB_CTX);
return CRYPT_PROVIDER_INVALID_LIB_CTX;
}
if (localLibCtx->drbg != NULL) { // Prevent DRBG repeated Init
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, algId, CRYPT_EAL_ERR_DRBG_REPEAT_INIT);
return CRYPT_EAL_ERR_DRBG_REPEAT_INIT;
}
ctx = EAL_ProvRandInitDrbg(libCtx, algId, attrName, param);
if (ctx == NULL) {
EAL_ERR_REPORT(CRYPT_EVENT_ERR, CRYPT_ALGO_RAND, algId, CRYPT_EAL_ERR_DRBG_INIT_FAIL);
return CRYPT_EAL_ERR_DRBG_INIT_FAIL;
}
if (ctx->meth->inst == NULL) {
EAL_RandDeinit(ctx);
return CRYPT_EAL_ERR_DRBG_INIT_FAIL;
}
int32_t ret = ctx->meth->inst(ctx->ctx, pers, persLen, param);
if (ret != CRYPT_SUCCESS) {
EAL_RandDeinit(ctx);
return ret;
}
ctx->working = true;
CRYPT_RandRegistEx((CRYPT_EAL_RandFuncEx)CRYPT_EAL_RandbytesEx);
localLibCtx->drbg = ctx;
return CRYPT_SUCCESS;
}
#endif // end of HITLS_CRYPTO_PROVIDER
CRYPT_EAL_RndCtx *CRYPT_EAL_ProviderDrbgNewCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName,
BSL_Param *param)
{
#ifdef HITLS_CRYPTO_PROVIDER
return EAL_ProvRandInitDrbg(libCtx, algId, attrName, param);
#else
(void) libCtx;
(void) algId;
(void) attrName;
(void) param;
return NULL;
#endif
}
int32_t CRYPT_EAL_NoProviderRandInitCtxInner(int32_t algId,
const uint8_t *pers, uint32_t persLen, BSL_Param *param)
{
CRYPT_RandSeedMethod seedMeth = {0};
void *seedCtx = NULL;
const BSL_Param *temp = NULL;
int32_t ret;
bool hasEnt = false;
if ((temp = BSL_PARAM_FindParam(param, CRYPT_PARAM_RAND_SEED_GETENTROPY)) != NULL) {
GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_GETENTROPY, BSL_PARAM_TYPE_FUNC_PTR,
(void **)&(seedMeth.getEntropy), NULL), ret);
hasEnt = true;
}
if ((temp = BSL_PARAM_FindParam(param, CRYPT_PARAM_RAND_SEED_CLEANENTROPY)) != NULL) {
GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_CLEANENTROPY, BSL_PARAM_TYPE_FUNC_PTR,
(void **)&(seedMeth.cleanEntropy), NULL), ret);
hasEnt = true;
}
if ((temp = BSL_PARAM_FindParam(param, CRYPT_PARAM_RAND_SEED_GETNONCE)) != NULL) {
GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_GETNONCE, BSL_PARAM_TYPE_FUNC_PTR,
(void **)&(seedMeth.getNonce), NULL), ret);
hasEnt = true;
}
if ((temp = BSL_PARAM_FindParam(param, CRYPT_PARAM_RAND_SEED_CLEANNONCE)) != NULL) {
GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEED_CLEANNONCE, BSL_PARAM_TYPE_FUNC_PTR,
(void **)&(seedMeth.cleanNonce), NULL), ret);
hasEnt = true;
}
if ((temp = BSL_PARAM_FindParam(param, CRYPT_PARAM_RAND_SEEDCTX)) != NULL) {
GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_RAND_SEEDCTX, BSL_PARAM_TYPE_CTX_PTR, &seedCtx, NULL), ret);
}
if (hasEnt) {
ret = CRYPT_EAL_RandInit(algId, &seedMeth, seedCtx, pers, persLen);
} else {
ret = CRYPT_EAL_RandInit(algId, NULL, seedCtx, pers, persLen);
}
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
ERR:
return ret;
}
int32_t CRYPT_EAL_ProviderRandInitCtx(CRYPT_EAL_LibCtx *libCtx, int32_t algId, const char *attrName,
const uint8_t *pers, uint32_t persLen, BSL_Param *param)
{
#ifdef HITLS_CRYPTO_PROVIDER
return CRYPT_EAL_ProviderRandInitCtxInner(libCtx, algId, attrName, pers, persLen, param);
#else
(void) libCtx;
(void) attrName;
return CRYPT_EAL_NoProviderRandInitCtxInner(algId, pers, persLen, param);
#endif
}
void CRYPT_EAL_RandDeinitEx(CRYPT_EAL_LibCtx *libCtx)
{
#ifdef HITLS_CRYPTO_PROVIDER
CRYPT_EAL_LibCtx *localLibCtx = libCtx;
if (localLibCtx == NULL) {
localLibCtx = CRYPT_EAL_GetGlobalLibCtx();
}
if (localLibCtx == NULL) {
return;
}
EAL_RandDeinit(localLibCtx->drbg);
localLibCtx->drbg = NULL;
return;
#else
(void) libCtx;
CRYPT_EAL_RandDeinit();
return;
#endif
}
void CRYPT_EAL_RandDeinit(void)
{
EAL_RandDeinit(g_globalRndCtx);
g_globalRndCtx = NULL;
return;
}
#ifdef HITLS_CRYPTO_PROVIDER
int32_t CRYPT_EAL_RandbytesWithAdinEx(CRYPT_EAL_LibCtx *libCtx,
uint8_t *byte, uint32_t len, uint8_t *addin, uint32_t addinLen)
{
CRYPT_EAL_LibCtx *localCtx = libCtx;
if (localCtx == NULL) {
localCtx = CRYPT_EAL_GetGlobalLibCtx();
}
if (localCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_INVALID_LIB_CTX);
return CRYPT_PROVIDER_INVALID_LIB_CTX;
}
return EAL_DrbgbytesWithAdin((CRYPT_EAL_RndCtx *)localCtx->drbg, byte, len, addin, addinLen);
}
#endif
int32_t CRYPT_EAL_RandbytesEx(CRYPT_EAL_LibCtx *libCtx, uint8_t *byte, uint32_t len)
{
#ifdef HITLS_CRYPTO_PROVIDER
CRYPT_EAL_LibCtx *localCtx = libCtx;
if (localCtx == NULL) {
localCtx = CRYPT_EAL_GetGlobalLibCtx();
}
if (localCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_INVALID_LIB_CTX);
return CRYPT_PROVIDER_INVALID_LIB_CTX;
}
return EAL_DrbgbytesWithAdin((CRYPT_EAL_RndCtx *)localCtx->drbg, byte, len, NULL, 0);
#else
(void) libCtx;
return CRYPT_EAL_Randbytes(byte, len);
#endif
}
int32_t CRYPT_EAL_RandSeedEx(CRYPT_EAL_LibCtx *libCtx)
{
#ifdef HITLS_CRYPTO_PROVIDER
CRYPT_EAL_LibCtx *localCtx = libCtx;
if (localCtx == NULL) {
localCtx = CRYPT_EAL_GetGlobalLibCtx();
}
if (localCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_PROVIDER_INVALID_LIB_CTX);
return CRYPT_PROVIDER_INVALID_LIB_CTX;
}
return EAL_DrbgSeedWithAdin((CRYPT_EAL_RndCtx *)localCtx->drbg, NULL, 0);
#else
(void) libCtx;
return CRYPT_EAL_RandSeed();
#endif
}
#endif // end of HITLS_CRYPTO_EAL && HITLS_CRYPTO_DRBG
|
2301_79861745/bench_create
|
crypto/eal/src/eal_rand.c
|
C
|
unknown
| 30,091
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_DRBG)
#include <stdint.h>
#include <stdbool.h>
#include <securec.h>
#include "crypt_eal_rand.h"
#include "crypt_errno.h"
#include "bsl_errno.h"
#include "bsl_err_internal.h"
#include "bsl_sal.h"
#include "eal_common.h"
#include "crypt_types.h"
#include "crypt_local_types.h"
#include "crypt_algid.h"
#include "crypt_drbg.h"
#include "crypt_drbg_local.h"
#ifdef HITLS_CRYPTO_MD
#include "eal_md_local.h"
#endif
#ifdef HITLS_CRYPTO_MAC
#include "eal_mac_local.h"
#endif
#ifdef HITLS_CRYPTO_CIPHER
#include "eal_cipher_local.h"
#endif
static EAL_RandUnitaryMethod g_randMethod = {
.newCtx = (RandDrbgNewCtx)DRBG_New,
.inst = (RandDrbgInst)DRBG_Instantiate,
.unInst = (RandDrbgUnInst)DRBG_Uninstantiate,
.gen = (RandDrbgGen)DRBG_GenerateBytes,
.reSeed = (RandDrbgReSeed)DRBG_Reseed,
.ctrl = (RandDrbgCtrl)DRBG_Ctrl,
.freeCtx = (RandDrbgFreeCtx)DRBG_Free,
};
EAL_RandUnitaryMethod* EAL_RandGetMethod(void)
{
return &g_randMethod;
}
static int32_t GetRequiredMethod(const DrbgIdMap *map, EAL_RandMethLookup *lu)
{
switch (map->type) {
#ifdef HITLS_CRYPTO_DRBG_HASH
case RAND_TYPE_MD: {
const EAL_MdMethod *md = EAL_MdFindDefaultMethod(map->depId);
if (md == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID);
return CRYPT_EAL_ERR_ALGID;
}
lu->methodId = map->depId;
lu->method = md;
break;
}
#endif
#ifdef HITLS_CRYPTO_DRBG_HMAC
case RAND_TYPE_MAC: {
lu->method = EAL_MacFindDefaultMethod(map->depId);
if (lu->method == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID);
return CRYPT_EAL_ERR_ALGID;
}
lu->methodId = map->depId;
break;
}
#endif
#ifdef HITLS_CRYPTO_DRBG_CTR
case RAND_TYPE_SM4_DF:
case RAND_TYPE_AES:
case RAND_TYPE_AES_DF: {
const EAL_SymMethod *ciphMeth = EAL_GetSymMethod(map->depId);
if (ciphMeth == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID);
return CRYPT_EAL_ERR_ALGID;
}
lu->methodId = map->depId;
lu->method = ciphMeth;
break;
}
#endif
default:
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID);
return CRYPT_EAL_ERR_ALGID;
}
return CRYPT_SUCCESS;
}
int32_t EAL_RandFindMethod(CRYPT_RAND_AlgId id, EAL_RandMethLookup *lu)
{
if (lu == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
const DrbgIdMap *map = DRBG_GetIdMap(id);
if (map == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_ALGID);
return CRYPT_EAL_ERR_ALGID;
}
int32_t ret = GetRequiredMethod(map, lu);
if (ret != CRYPT_SUCCESS) {
return ret;
}
lu->type = map->type;
return CRYPT_SUCCESS;
}
#endif
|
2301_79861745/bench_create
|
crypto/eal/src/eal_rand_method.c
|
C
|
unknown
| 3,536
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_EALINIT_H
#define CRYPT_EALINIT_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ASM_CHECK
#include <stdint.h>
#ifdef __cplusplus
extern "C" {
#endif // __cplusplus
/**
* @ingroup crypt_asmcap
* @brief Check cpu capability for assembly implementation
*
* @param id [IN] algorithm id
* @retval CRYPT_SUCCESS Instantiation succeeded.
* @retval CRYPT_EAL_ALG_ASM_NOT_SUPPORT CPU is not supported for assembly implementation
*/
int32_t CRYPT_ASMCAP_Cipher(CRYPT_CIPHER_AlgId id);
/**
* @ingroup crypt_asmcap
* @brief Check cpu capability for assembly implementation
*
* @param id [IN] algorithm id
* @retval CRYPT_SUCCESS Instantiation succeeded.
* @retval CRYPT_EAL_ALG_ASM_NOT_SUPPORT CPU is not supported for assembly implementation
*/
int32_t CRYPT_ASMCAP_Md(CRYPT_MD_AlgId id);
/**
* @ingroup crypt_asmcap
* @brief Check cpu capability for assembly implementation
*
* @param id [IN] algorithm id
* @retval CRYPT_SUCCESS Instantiation succeeded.
* @retval CRYPT_EAL_ALG_ASM_NOT_SUPPORT CPU is not supported for assembly implementation
*/
int32_t CRYPT_ASMCAP_Pkey(CRYPT_PKEY_AlgId id);
/**
* @ingroup crypt_asmcap
* @brief Check cpu capability for assembly implementation
*
* @param id [IN] algorithm id
* @retval CRYPT_SUCCESS Instantiation succeeded.
* @retval CRYPT_EAL_ALG_ASM_NOT_SUPPORT CPU is not supported for assembly implementation
*/
int32_t CRYPT_ASMCAP_Mac(CRYPT_MAC_AlgId id);
/**
* @ingroup crypt_asmcap
* @brief Check cpu capability for assembly implementation
*
* @param id [IN] algorithm id
* @retval CRYPT_SUCCESS Instantiation succeeded.
* @retval CRYPT_EAL_ALG_ASM_NOT_SUPPORT CPU is not supported for assembly implementation
*/
int32_t CRYPT_ASMCAP_Drbg(CRYPT_RAND_AlgId id);
#ifdef __cplusplus
}
#endif // __cplusplus
#endif // HITLS_CRYPTO_ASM_CHECK
#endif // CRYPT_EALINIT_H
|
2301_79861745/bench_create
|
crypto/ealinit/include/crypt_ealinit.h
|
C
|
unknown
| 2,512
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ASM_CHECK
#ifdef __cplusplus
extern "c" {
#endif
#include "crypt_errno.h"
#include "crypt_utils.h"
#include "bsl_err_internal.h"
#include "asmcap_local.h"
#if defined(HITLS_CRYPTO_CIPHER)
#if defined(HITLS_CRYPTO_AES_ASM)
int32_t CRYPT_AES_AsmCheck(void)
{
#if defined(HITLS_CRYPTO_AES_X8664)
if (!IsSupportAVX() || !IsOSSupportAVX() ||
!IsSupportAES() || !IsSupportSSE2()) {
// SetEncryptKey256 uses AVX and SSE2.
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return CRYPT_EAL_ALG_ASM_NOT_SUPPORT;
}
#elif defined(HITLS_CRYPTO_AES_ARMV8)
if (!IsSupportPMULL() || !IsSupportAES()) {
// ARMV8 should support the PMULL instruction sets.
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return CRYPT_EAL_ALG_ASM_NOT_SUPPORT;
}
#endif
return CRYPT_SUCCESS;
}
#endif // HITLS_CRYPTO_AES_ASM
#if defined(HITLS_CRYPTO_CHACHA20_ASM)
int32_t CRYPT_CHACHA20_AsmCheck(void)
{
#if defined(HITLS_CRYPTO_CHACHA20_X8664)
if (!IsSupportAVX() || !IsOSSupportAVX() || !IsSupportAVX2()) {
// The CHACHA20_Update function uses the AVX and AVX2 instruction sets.
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return CRYPT_EAL_ALG_ASM_NOT_SUPPORT;
}
#endif
return CRYPT_SUCCESS;
}
#endif // HITLS_CRYPTO_CHACHA20
#if defined(HITLS_CRYPTO_CHACHA20POLY1305_ASM)
int32_t CRYPT_POLY1305_AsmCheck(void)
{
#if defined(HITLS_CRYPTO_CHACHA20POLY1305_X8664)
if (!IsSupportAVX() || !IsOSSupportAVX() ||
!IsSupportAVX2() || !IsSupportSSE2()) {
// The Poly1305BlockAVX2 function uses AVX, AVX2, and SSE2.
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return CRYPT_EAL_ALG_ASM_NOT_SUPPORT;
}
#endif
return CRYPT_SUCCESS;
}
#endif // HITLS_CRYPTO_CHACHA20POLY1305
#if defined(HITLS_CRYPTO_SM4_ASM)
int32_t CRYPT_SM4_AsmCheck(void)
{
#if defined(HITLS_CRYPTO_SM4_X8664)
if ((!IsSupportAVX()) || !IsOSSupportAVX() || !IsSupportAVX2() ||
(!IsSupportAES()) || (!IsSupportMOVBE())) {
// The AES instruction is used for the SBOX assembly in the XTS.
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return CRYPT_EAL_ALG_ASM_NOT_SUPPORT;
}
#elif (HITLS_CRYPTO_SM4_ARMV8)
if (!IsSupportAES()) {
// sbox uses the AES instruction.
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return CRYPT_EAL_ALG_ASM_NOT_SUPPORT;
}
#endif
return CRYPT_SUCCESS;
}
#endif // HITLS_CRYPTO_SM4
#if defined(HITLS_CRYPTO_GCM_ASM)
int32_t CRYPT_GHASH_AsmCheck(void)
{
#if defined(HITLS_CRYPTO_GCM_X8664)
if (!IsSupportAVX() || !IsOSSupportAVX()) {
// GcmTableGen4bit uses the AVX.
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return CRYPT_EAL_ALG_ASM_NOT_SUPPORT;
}
#elif defined(HITLS_CRYPTO_GCM_ARMV8)
if (!IsSupportPMULL()) {
// In ARMV8, GHASH_BLOCK must support the PMULL instruction set.
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return CRYPT_EAL_ALG_ASM_NOT_SUPPORT;
}
#endif
return CRYPT_SUCCESS;
}
#endif // HITLS_CRYPTO_GCM
#endif // HITLS_CRYPTO_CIPHER
#if defined(HITLS_CRYPTO_MD)
#if defined(HITLS_CRYPTO_MD5_ASM)
int32_t CRYPT_MD5_AsmCheck(void)
{
#if defined(HITLS_CRYPTO_MD5_X8664)
if (!IsSupportBMI1()) { // MD5_Compress uses the BMI1 instruction set.
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return CRYPT_EAL_ALG_ASM_NOT_SUPPORT;
}
#endif
return CRYPT_SUCCESS;
}
#endif // HITLS_CRYPTO_MD5
#if defined(HITLS_CRYPTO_SHA1_ASM)
int32_t CRYPT_SHA1_AsmCheck(void)
{
#if defined(HITLS_CRYPTO_SHA1_X8664)
if (!IsSupportAVX() || !IsOSSupportAVX() || !IsSupportAVX2() || !IsSupportBMI1() || !IsSupportBMI2()) {
// The SHA1_Step function uses the AVX, AVX2, BMI1, and BMI2 instruction sets.
return CRYPT_EAL_ALG_ASM_NOT_SUPPORT;
}
#endif
return CRYPT_SUCCESS;
}
#endif // HITLS_CRYPTO_SHA1
#if defined(HITLS_CRYPTO_SHA2_ASM)
int32_t CRYPT_SHA2_AsmCheck(void)
{
#if defined(HITLS_CRYPTO_SHA2_X8664)
if (!IsSupportAVX() || !IsOSSupportAVX() || !IsSupportAVX2() || !IsSupportBMI1() || !IsSupportBMI2()) {
// The SHA*CompressMultiBlocks_Asm function uses the AVX, AVX2, BMI1, and BMI2 instruction sets.
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return CRYPT_EAL_ALG_ASM_NOT_SUPPORT;
}
#endif
return CRYPT_SUCCESS;
}
#endif // HITLS_CRYPTO_SHA2
#if defined(HITLS_CRYPTO_SM3_ASM)
int32_t CRYPT_SM3_AsmCheck(void)
{
#if defined(HITLS_CRYPTO_SM3_X8664)
if (!IsSupportMOVBE()) {
// MOVBE is used in the SM3_CompressAsm function.
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return CRYPT_EAL_ALG_ASM_NOT_SUPPORT;
}
#endif
return CRYPT_SUCCESS;
}
#endif // HITLS_CRYPTO_SM3
#endif // HITLS_CRYPTO_MD
#if defined(HITLS_CRYPTO_PKEY)
#if defined(HITLS_CRYPTO_BN_ASM)
int32_t CRYPT_BN_AsmCheck(void)
{
return CRYPT_SUCCESS;
}
#endif // HITLS_CRYPTO_BN
#if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM)
int32_t CRYPT_ECP256_AsmCheck(void)
{
#if defined(HITLS_CRYPTO_ECC_X8664)
if (!IsSupportAVX() || !IsOSSupportAVX()) { // ECP256_OrdSqr uses AVX.
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return CRYPT_EAL_ALG_ASM_NOT_SUPPORT;
}
#endif
return CRYPT_SUCCESS;
}
#endif // HITLS_CRYPTO_ECC
#endif // HITLS_CRYPTO_PKEY
#ifdef __cplusplus
}
#endif
#endif // HITLS_CRYPTO_ASM_CHECK
|
2301_79861745/bench_create
|
crypto/ealinit/src/asmcap_alg_asm.c
|
C
|
unknown
| 6,038
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef ASMCAP_LOCAL_H
#define ASMCAP_LOCAL_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ASM_CHECK
#include "crypt_ealinit.h"
#ifdef __cplusplus
extern "c" {
#endif
#if defined(HITLS_CRYPTO_CIPHER)
#if defined(HITLS_CRYPTO_AES_ASM)
int32_t CRYPT_AES_AsmCheck(void);
#endif // HITLS_CRYPTO_AES_ASM
#if defined(HITLS_CRYPTO_CHACHA20_ASM)
int32_t CRYPT_CHACHA20_AsmCheck(void);
#endif // HITLS_CRYPTO_CHACHA20
#if defined(HITLS_CRYPTO_CHACHA20POLY1305_ASM)
int32_t CRYPT_POLY1305_AsmCheck(void);
#endif // HITLS_CRYPTO_CHACHA20POLY1305
#if defined(HITLS_CRYPTO_SM4_ASM)
int32_t CRYPT_SM4_AsmCheck(void);
#endif // HITLS_CRYPTO_SM4
#if defined(HITLS_CRYPTO_GCM_ASM)
int32_t CRYPT_GHASH_AsmCheck(void);
#endif // HITLS_CRYPTO_GCM
#endif // HITLS_CRYPTO_CIPHER
#if defined(HITLS_CRYPTO_MD)
#if defined(HITLS_CRYPTO_MD5_ASM)
int32_t CRYPT_MD5_AsmCheck(void);
#endif // HITLS_CRYPTO_MD5
#if defined(HITLS_CRYPTO_SHA1_ASM)
int32_t CRYPT_SHA1_AsmCheck(void);
#endif // HITLS_CRYPTO_SHA1
#if defined(HITLS_CRYPTO_SHA2_ASM)
int32_t CRYPT_SHA2_AsmCheck(void);
#endif // HITLS_CRYPTO_SHA2
#if defined(HITLS_CRYPTO_SM3_ASM)
int32_t CRYPT_SM3_AsmCheck(void);
#endif // HITLS_CRYPTO_SM3
#endif // HITLS_CRYPTO_MD
#if defined(HITLS_CRYPTO_PKEY)
#if defined(HITLS_CRYPTO_BN_ASM)
int32_t CRYPT_BN_AsmCheck(void);
#endif // HITLS_CRYPTO_BN_ASM
#if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM)
int32_t CRYPT_ECP256_AsmCheck(void);
#endif // HITLS_CRYPTO_ECC
#endif // HITLS_CRYPTO_PKEY
#ifdef __cplusplus
}
#endif
#endif // HITLS_CRYPTO_ASM_CHECK
#endif // ASMCAP_LOCAL_H
|
2301_79861745/bench_create
|
crypto/ealinit/src/asmcap_local.h
|
C
|
unknown
| 2,112
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "crypt_utils.h"
#ifdef __x86_64__
#include <cpuid.h>
#include "securec.h"
CpuInstrSupportState g_cpuState = {0};
/* Obtain whether the CPU supports the SIMD instruction set through the cpuid instruction. */
void GetCpuId(uint32_t eax, uint32_t ecx, uint32_t cpuId[CPU_ID_OUT_U32_CNT])
{
uint32_t eaxOut, ebxOut, ecxOut, edxOut;
__asm("cpuid": "=a"(eaxOut), "=b"(ebxOut), "=c"(ecxOut), "=d"(edxOut): "a"(eax), "c"(ecx):);
cpuId[EAX_OUT_IDX] = eaxOut;
cpuId[EBX_OUT_IDX] = ebxOut;
cpuId[ECX_OUT_IDX] = ecxOut;
cpuId[EDX_OUT_IDX] = edxOut;
}
/* Obtain whether the OS supports the SIMD instruction set by using the xgetbv instruction. */
static uint32_t GetExCtl(uint32_t ecx)
{
uint32_t ret = 0;
__asm("xgetbv": "=a"(ret): "c"(ecx):);
return ret;
}
bool IsSupportBMI1(void)
{
return g_cpuState.code7Out[EBX_OUT_IDX] & bit_BMI;
}
bool IsSupportMOVBE(void)
{
return g_cpuState.code1Out[ECX_OUT_IDX] & bit_MOVBE;
}
bool IsSupportBMI2(void)
{
return g_cpuState.code7Out[EBX_OUT_IDX] & bit_BMI2;
}
bool IsSupportADX(void)
{
return g_cpuState.code7Out[EBX_OUT_IDX] & bit_ADX;
}
bool IsSupportSSE(void)
{
return g_cpuState.code1Out[EDX_OUT_IDX] & bit_SSE;
}
bool IsSupportSSE2(void)
{
return g_cpuState.code1Out[EDX_OUT_IDX] & bit_SSE2;
}
bool IsSupportAVX(void)
{
return g_cpuState.code1Out[ECX_OUT_IDX] & bit_AVX;
}
bool IsSupportAES(void)
{
return g_cpuState.code1Out[ECX_OUT_IDX] & bit_AES;
}
bool IsSupportSSE3(void)
{
return g_cpuState.code1Out[ECX_OUT_IDX] & bit_SSE3;
}
bool IsSupportAVX2(void)
{
return g_cpuState.code7Out[EBX_OUT_IDX] & bit_AVX2;
}
bool IsSupportAVX512F(void)
{
return g_cpuState.code7Out[EBX_OUT_IDX] & bit_AVX512F;
}
bool IsSupportAVX512DQ(void)
{
return g_cpuState.code7Out[EBX_OUT_IDX] & bit_AVX512DQ;
}
bool IsSupportAVX512VL(void)
{
return g_cpuState.code7Out[EBX_OUT_IDX] & bit_AVX512VL;
}
bool IsSupportAVX512BW(void)
{
return g_cpuState.code7Out[EBX_OUT_IDX] & bit_AVX512BW;
}
bool IsSupportXSAVE(void)
{
return g_cpuState.code1Out[ECX_OUT_IDX] & bit_XSAVE;
}
bool IsSupportOSXSAVE(void)
{
return g_cpuState.code1Out[ECX_OUT_IDX] & bit_OSXSAVE;
}
bool IsOSSupportAVX(void)
{
return g_cpuState.osSupportAVX;
}
bool IsOSSupportAVX512(void)
{
return g_cpuState.osSupportAVX512;
}
/* ARM */
#elif defined(__arm__) || defined (__arm) || defined(__aarch64__)
#include "crypt_arm.h"
uint32_t g_cryptArmCpuInfo = 0;
#if defined(HITLS_CRYPTO_NO_AUXVAL)
#include <setjmp.h>
#include <signal.h>
static jmp_buf g_jump_buffer;
void signal_handler(int sig)
{
(void)sig;
longjmp(g_jump_buffer, 1);
}
void getarmcap(void)
{
struct sigaction sa, old_sa;
sa.sa_handler = signal_handler;
sigemptyset(&sa.sa_mask);
sa.sa_flags = 0;
sigaction(SIGILL, &sa, &old_sa);
// NEON
if (setjmp(g_jump_buffer) == 0) {
#if defined(__ARM_NEON) || defined(__aarch64__)
// ORR v0.16b, v0.16b, v0.16b
__asm__ volatile (".inst 0x4ea01c00" : : : "v0");
g_cryptArmCpuInfo |= CRYPT_ARM_NEON;
#endif
#if defined(__aarch64__)
// AES
if (setjmp(g_jump_buffer) == 0) {
// aese v0.16b, v0.16b
__asm__ volatile (".inst 0x4e284800" : : : "v0");
g_cryptArmCpuInfo |= CRYPT_ARM_AES;
}
// PMULL
if (setjmp(g_jump_buffer) == 0) {
// pmull v0.1q, v0.1d, v0.1d
__asm__ volatile (".inst 0x0ee0e000" : : : "v0");
g_cryptArmCpuInfo |= CRYPT_ARM_PMULL;
}
// SHA1
if (setjmp(g_jump_buffer) == 0) {
// sha1h s0, s0
__asm__ volatile (".inst 0x5e280800" : : : "s0");
g_cryptArmCpuInfo |= CRYPT_ARM_SHA1;
}
// SHA256
if (setjmp(g_jump_buffer) == 0) {
// sha256su0 v0.4s, v0.4s
__asm__ volatile (".inst 0x5e282800" : : : "v0");
g_cryptArmCpuInfo |= CRYPT_ARM_SHA256;
}
// SHA512
if (setjmp(g_jump_buffer) == 0) {
// sha512su0 v0.2d, v0.2d
__asm__ volatile (".inst 0xcec08000" : : : "v0");
g_cryptArmCpuInfo |= CRYPT_ARM_SHA512;
}
#endif
}
sigaction(SIGILL, &old_sa, NULL);
}
#else
#include <sys/auxv.h>
static bool g_supportNEON = {0};
bool IsSupportAES(void)
{
return g_cryptArmCpuInfo & CRYPT_ARM_AES;
}
bool IsSupportPMULL(void)
{
return g_cryptArmCpuInfo & CRYPT_ARM_PMULL;
}
bool IsSupportSHA1(void)
{
return g_cryptArmCpuInfo & CRYPT_ARM_SHA1;
}
bool IsSupportSHA256(void)
{
return g_cryptArmCpuInfo & CRYPT_ARM_SHA256;
}
bool IsSupportNEON(void)
{
return g_supportNEON;
}
#if defined(__aarch64__)
bool IsSupportSHA512(void)
{
return g_cryptArmCpuInfo & CRYPT_ARM_SHA512;
}
#endif // __aarch64__
#endif // HITLS_CRYPTO_NO_AUXVAL
#endif // x86_64 || __arm__ || __arm || __aarch64__
void GetCpuInstrSupportState(void)
{
#ifdef __x86_64__
uint32_t cpuId[CPU_ID_OUT_U32_CNT];
uint64_t xcr0;
/* SIMD CPU support */
GetCpuId(0x1, 0, cpuId);
(void)memcpy_s(g_cpuState.code1Out, CPU_ID_OUT_U32_CNT * sizeof(uint32_t), cpuId,
CPU_ID_OUT_U32_CNT * sizeof(uint32_t));
GetCpuId(0x7, 0, cpuId);
(void)memcpy_s(g_cpuState.code7Out, CPU_ID_OUT_U32_CNT * sizeof(uint32_t), cpuId,
CPU_ID_OUT_U32_CNT * sizeof(uint32_t));
/* SIMD OS support */
if (IsSupportXSAVE() && IsSupportOSXSAVE()) {
xcr0 = GetExCtl(0);
bool sse = xcr0 & XCR0_BIT_SSE;
bool avx = xcr0 & XCR0_BIT_AVX;
g_cpuState.osSupportAVX = sse && avx;
bool opmask = xcr0 & XCR0_BIT_OPMASK;
bool zmmLow = xcr0 & XCR0_BIT_ZMM_LOW;
bool zmmHigh = xcr0 & XCR0_BIT_ZMM_HIGH;
g_cpuState.osSupportAVX512 = opmask && zmmLow && zmmHigh;
}
#elif defined(__arm__) || defined (__arm) || defined(__aarch64__)
#if defined(HITLS_CRYPTO_NO_AUXVAL)
getarmcap();
#else // HITLS_CRYPTO_NO_AUXVAL
g_supportNEON = getauxval(CRYPT_CAP) & CRYPT_ARM_NEON;
if (g_supportNEON) {
g_cryptArmCpuInfo = (uint32_t)getauxval(CRYPT_CE);
}
#endif // HITLS_CRYPTO_NO_AUXVAL
#endif // defined(__arm__) || defined (__arm) || defined(__aarch64__)
}
|
2301_79861745/bench_create
|
crypto/ealinit/src/cpucap.c
|
C
|
unknown
| 6,773
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "bsl_init.h"
#include "bsl_err_internal.h"
#include "crypt_local_types.h"
#include "crypt_algid.h"
#include "crypt_errno.h"
#include "crypt_eal_rand.h"
#include "crypt_utils.h"
#include "asmcap_local.h"
#include "crypt_ealinit.h"
#include "crypt_util_rand.h"
#ifdef HITLS_CRYPTO_PROVIDER
#include "crypt_eal_provider.h"
#include "crypt_provider.h"
#endif
#include "crypt_eal_init.h"
static uint64_t g_ealInitOpts = 0;
#if defined(HITLS_CRYPTO_PROVIDER)
static int32_t ProviderModuleInit(uint64_t initOpt, int32_t alg)
{
(void) alg;
int32_t ret = CRYPT_SUCCESS;
if (initOpt & CRYPT_EAL_INIT_PROVIDER && (g_ealInitOpts & CRYPT_EAL_INIT_PROVIDER) == 0) {
ret = CRYPT_EAL_InitPreDefinedProviders();
if (ret != CRYPT_SUCCESS) {
return ret;
}
g_ealInitOpts |= CRYPT_EAL_INIT_PROVIDER;
}
#if defined(HITLS_CRYPTO_DRBG)
if (initOpt & CRYPT_EAL_INIT_PROVIDER_RAND && (g_ealInitOpts & CRYPT_EAL_INIT_PROVIDER_RAND) == 0) {
ret = CRYPT_EAL_ProviderRandInitCtx(NULL, alg, "provider=default", NULL, 0, NULL);
if (ret != CRYPT_SUCCESS) {
return ret;
}
g_ealInitOpts |= CRYPT_EAL_INIT_PROVIDER_RAND;
}
#endif
return ret;
}
static void ProviderModuleFree(uint64_t initOpt)
{
if (!(initOpt & CRYPT_EAL_INIT_PROVIDER) || (g_ealInitOpts & CRYPT_EAL_INIT_PROVIDER) == 0) {
return;
}
CRYPT_EAL_FreePreDefinedProviders();
}
#else
static int32_t ProviderModuleInit(uint64_t initOpt, int32_t alg)
{
(void) initOpt;
(void) alg;
return CRYPT_SUCCESS;
}
static void ProviderModuleFree(uint64_t initOpt)
{
(void) initOpt;
return;
}
#endif
#if defined(HITLS_BSL_INIT)
static int32_t BslModuleInit(uint64_t initOpt)
{
if (!(initOpt & CRYPT_EAL_INIT_BSL) || (g_ealInitOpts & CRYPT_EAL_INIT_BSL) != 0) {
return BSL_SUCCESS;
}
int32_t ret = BSL_GLOBAL_Init();
if (ret == BSL_SUCCESS) {
g_ealInitOpts |= CRYPT_EAL_INIT_BSL;
}
return ret;
}
static void BslModuleFree(uint64_t initOpt)
{
if (!(initOpt & CRYPT_EAL_INIT_BSL) || (g_ealInitOpts & CRYPT_EAL_INIT_BSL) == 0) {
return;
}
BSL_GLOBAL_DeInit();
}
#else
static int32_t BslModuleInit(uint64_t initOpt)
{
(void) initOpt;
return CRYPT_SUCCESS;
}
static void BslModuleFree(uint64_t initOpt)
{
(void) initOpt;
return;
}
#endif
#if defined(HITLS_CRYPTO_DRBG)
static void RandModuleFree(uint64_t initOpt)
{
if (!(initOpt & CRYPT_EAL_INIT_RAND) || (g_ealInitOpts & CRYPT_EAL_INIT_RAND) == 0) {
return;
}
CRYPT_EAL_RandDeinit();
}
static int32_t RandModuleInit(uint64_t initOpt, int32_t alg)
{
if (!(initOpt & CRYPT_EAL_INIT_RAND) || (g_ealInitOpts & CRYPT_EAL_INIT_RAND) != 0) {
return BSL_SUCCESS;
}
int32_t ret = CRYPT_EAL_RandInit(alg, NULL, NULL, NULL, 0);
if (ret == CRYPT_SUCCESS) {
g_ealInitOpts |= CRYPT_EAL_INIT_RAND;
}
return ret;
}
#else
static void RandModuleFree(uint64_t initOpt)
{
(void) initOpt;
return;
}
static int32_t RandModuleInit(uint64_t initOpt, int32_t alg)
{
(void) alg;
(void) initOpt;
return CRYPT_SUCCESS;
}
#endif
static int32_t GlobalLockInit(uint64_t initOpt, int32_t alg)
{
(void) alg;
if ((initOpt & CRYPT_EAL_INIT_LOCK) == 0 || (g_ealInitOpts & CRYPT_EAL_INIT_LOCK) != 0) {
return CRYPT_SUCCESS;
}
#ifdef HITLS_CRYPTO_ENTROPY
int32_t ret = EAL_SeedDrbgLockInit();
if (ret != CRYPT_SUCCESS) {
return ret;
}
#endif
g_ealInitOpts |= CRYPT_EAL_INIT_LOCK;
return CRYPT_SUCCESS;
}
static void GlobalLockFree(uint64_t initOpt)
{
if ((initOpt & CRYPT_EAL_INIT_LOCK) == 0 || (g_ealInitOpts & CRYPT_EAL_INIT_LOCK) == 0) {
return;
}
#ifdef HITLS_CRYPTO_ENTROPY
EAL_SeedDrbgLockDeInit();
#endif
return;
}
#if defined(HITLS_EAL_INIT_OPTS)
static bool g_ealInitOptsFlags = false;
#endif
#if defined(HITLS_EAL_INIT_OPTS)
__attribute__((constructor(102))) int32_t CRYPT_EAL_Init(uint64_t opts)
#else
int32_t CRYPT_EAL_Init(uint64_t opts)
#endif
{
int32_t ret = CRYPT_SUCCESS;
uint64_t initOpt = opts;
#if defined(HITLS_EAL_INIT_OPTS)
if (!g_ealInitOptsFlags) {
initOpt = HITLS_EAL_INIT_OPTS;
g_ealInitOptsFlags = true;
}
#endif
#if defined(HITLS_CRYPTO_INIT_RAND_ALG)
int32_t alg = HITLS_CRYPTO_INIT_RAND_ALG;
#else
int32_t alg = CRYPT_RAND_SHA256;
#endif
if ((initOpt & CRYPT_EAL_INIT_CPU) && (g_ealInitOpts & CRYPT_EAL_INIT_CPU) == 0) {
GetCpuInstrSupportState();
g_ealInitOpts |= CRYPT_EAL_INIT_CPU;
}
ret = BslModuleInit(initOpt);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = ProviderModuleInit(initOpt, alg);
if (ret != CRYPT_SUCCESS) {
BslModuleFree(initOpt);
return ret;
}
ret = RandModuleInit(initOpt, alg);
if (ret != CRYPT_SUCCESS) {
BslModuleFree(initOpt);
ProviderModuleFree(initOpt);
return ret;
}
ret = GlobalLockInit(initOpt, alg);
if (ret != CRYPT_SUCCESS) {
RandModuleFree(initOpt);
BslModuleFree(initOpt);
ProviderModuleFree(initOpt);
return ret;
}
return ret;
}
#if defined(HITLS_EAL_INIT_OPTS)
__attribute__((destructor(101))) void CRYPT_EAL_Cleanup(uint64_t opts)
#else
void CRYPT_EAL_Cleanup(uint64_t opts)
#endif
{
uint64_t initOpt = opts;
#if defined(HITLS_EAL_INIT_OPTS)
initOpt = HITLS_EAL_INIT_OPTS;
#endif
ProviderModuleFree(initOpt);
RandModuleFree(initOpt);
BslModuleFree(initOpt);
GlobalLockFree(initOpt);
g_ealInitOpts = 0;
}
#ifdef HITLS_CRYPTO_ASM_CHECK
typedef int (*HITLS_ASM_CHECK_CALLBACK)(void);
typedef struct EAL_CheckAsm {
uint32_t id;
HITLS_ASM_CHECK_CALLBACK callback[2];
} EAL_CheckAsm;
static int32_t CryptCheckCapId(const BslCid id, const EAL_CheckAsm asmlist[], uint32_t len)
{
for (uint32_t i = 0; i < len; i++) {
if (asmlist[i].id != id) {
continue;
}
for (uint32_t j = 0; j < 2; j++) { // 2 means Alg and Method
if (asmlist[i].callback[j] != NULL && asmlist[i].callback[j]() != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ALG_ASM_NOT_SUPPORT);
return CRYPT_EAL_ALG_ASM_NOT_SUPPORT;
}
}
}
return CRYPT_SUCCESS;
}
static const EAL_CheckAsm HITLS_ASM_SYM_ALG_CHECK[] = {
/* symmetric encryption/decryption combination algorithm ID */
#if defined(HITLS_CRYPTO_AES_ASM)
{.id = CRYPT_CIPHER_AES128_CBC, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES192_CBC, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES256_CBC, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES128_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES192_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES256_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES128_ECB, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES192_ECB, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES256_ECB, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES128_XTS, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES256_XTS, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES128_CCM, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES192_CCM, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES256_CCM, .callback = {CRYPT_AES_AsmCheck, NULL}},
#if defined(HITLS_CRYPTO_GCM_ASM)
{.id = CRYPT_CIPHER_AES128_GCM, .callback = {CRYPT_AES_AsmCheck, CRYPT_GHASH_AsmCheck}},
{.id = CRYPT_CIPHER_AES192_GCM, .callback = {CRYPT_AES_AsmCheck, CRYPT_GHASH_AsmCheck}},
{.id = CRYPT_CIPHER_AES256_GCM, .callback = {CRYPT_AES_AsmCheck, CRYPT_GHASH_AsmCheck}},
#endif // HITLS_CRYPTO_GCM_ASM
{.id = CRYPT_CIPHER_AES128_CFB, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES192_CFB, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES256_CFB, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES128_OFB, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES192_OFB, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_AES256_OFB, .callback = {CRYPT_AES_AsmCheck, NULL}},
#endif // HITLS_CRYPTO_AES_ASM
#if defined(HITLS_CRYPTO_CHACHA20_ASM) || defined(HITLS_CRYPTO_CHACHA20POLY1305_ASM)
{.id = CRYPT_CIPHER_CHACHA20_POLY1305, .callback = {CRYPT_CHACHA20_AsmCheck, CRYPT_POLY1305_AsmCheck}},
#endif // HITLS_CRYPTO_CHACHA20POLY1305_ASM
#if defined(HITLS_CRYPTO_SM4_ASM)
{.id = CRYPT_CIPHER_SM4_XTS, .callback = {CRYPT_SM4_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_SM4_CBC, .callback = {CRYPT_SM4_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_SM4_ECB, .callback = {CRYPT_SM4_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_SM4_CTR, .callback = {CRYPT_SM4_AsmCheck, NULL}},
#if defined(HITLS_CRYPTO_GCM_ASM)
{.id = CRYPT_CIPHER_SM4_GCM, .callback = {CRYPT_SM4_AsmCheck, CRYPT_GHASH_AsmCheck}},
#endif // HITLS_CRYPTO_GCM_ASM
{.id = CRYPT_CIPHER_SM4_CFB, .callback = {CRYPT_SM4_AsmCheck, NULL}},
{.id = CRYPT_CIPHER_SM4_OFB, .callback = {CRYPT_SM4_AsmCheck, NULL}},
#endif // HITLS_CRYPTO_SM4
{.id = CRYPT_CIPHER_MAX, .callback = {NULL, NULL}},
};
int32_t CRYPT_ASMCAP_Cipher(CRYPT_CIPHER_AlgId id)
{
return CryptCheckCapId((BslCid)id, HITLS_ASM_SYM_ALG_CHECK,
sizeof(HITLS_ASM_SYM_ALG_CHECK) / sizeof(EAL_CheckAsm));
}
#if defined(HITLS_CRYPTO_MD)
static const EAL_CheckAsm HITLS_ASM_MD_ALG_CHECK[] = {
/* hash algorithm ID */
#if defined(HITLS_CRYPTO_MD5_ASM)
{.id = CRYPT_MD_MD5, .callback = {CRYPT_MD5_AsmCheck, NULL}},
#endif
#if defined(HITLS_CRYPTO_SHA1_ASM)
{.id = CRYPT_MD_SHA1, .callback = {CRYPT_SHA1_AsmCheck, NULL}},
#endif
#if defined(HITLS_CRYPTO_SHA2_ASM)
{.id = CRYPT_MD_SHA224, .callback = {CRYPT_SHA2_AsmCheck, NULL}},
{.id = CRYPT_MD_SHA256, .callback = {CRYPT_SHA2_AsmCheck, NULL}},
{.id = CRYPT_MD_SHA384, .callback = {CRYPT_SHA2_AsmCheck, NULL}},
{.id = CRYPT_MD_SHA512, .callback = {CRYPT_SHA2_AsmCheck, NULL}},
#endif
#if defined(HITLS_CRYPTO_SM3_ASM)
{.id = CRYPT_MD_SM3, .callback = {CRYPT_SM3_AsmCheck, NULL}},
#endif
{.id = CRYPT_MD_MAX, .callback = {NULL, NULL}},
};
#endif
int32_t CRYPT_ASMCAP_Md(CRYPT_MD_AlgId id)
{
return CryptCheckCapId((BslCid)id, HITLS_ASM_MD_ALG_CHECK,
sizeof(HITLS_ASM_MD_ALG_CHECK) / sizeof(EAL_CheckAsm));
}
#if defined(HITLS_CRYPTO_PKEY)
static const EAL_CheckAsm HITLS_ASM_PKEY_ALG_CHECK[] = {
/* Asymmetric algorithm ID */
#if defined(HITLS_CRYPTO_BN_ASM)
{.id = CRYPT_PKEY_DSA, .callback = {CRYPT_BN_AsmCheck, NULL}},
{.id = CRYPT_PKEY_RSA, .callback = {CRYPT_BN_AsmCheck, NULL}},
{.id = CRYPT_PKEY_DH, .callback = {CRYPT_BN_AsmCheck, NULL}},
#if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM)
{.id = CRYPT_PKEY_ECDSA, .callback = {CRYPT_BN_AsmCheck, CRYPT_ECP256_AsmCheck}},
{.id = CRYPT_PKEY_ECDH, .callback = {CRYPT_BN_AsmCheck, CRYPT_ECP256_AsmCheck}},
#endif
{.id = CRYPT_PKEY_SM2, .callback = {CRYPT_BN_AsmCheck, NULL}},
#endif
{.id = CRYPT_PKEY_MAX, .callback = {NULL, NULL}},
};
int32_t CRYPT_ASMCAP_Pkey(CRYPT_PKEY_AlgId id)
{
return CryptCheckCapId((BslCid)id, HITLS_ASM_PKEY_ALG_CHECK,
sizeof(HITLS_ASM_PKEY_ALG_CHECK) / sizeof(EAL_CheckAsm));
}
#endif // HITLS_CRYPTO_PKEY
#if defined(HITLS_CRYPTO_DRBG)
static const EAL_CheckAsm HITLS_ASM_DRBG_ALG_CHECK[] = {
/* RAND algorithm ID */
#if defined(HITLS_CRYPTO_SHA1_ASM)
{.id = CRYPT_RAND_SHA1, .callback = {CRYPT_SHA1_AsmCheck, NULL}},
{.id = CRYPT_RAND_HMAC_SHA1, .callback = {CRYPT_SHA1_AsmCheck, NULL}},
#endif
#if defined(HITLS_CRYPTO_SHA2_ASM)
{.id = CRYPT_RAND_SHA224, .callback = {CRYPT_SHA2_AsmCheck, NULL}},
{.id = CRYPT_RAND_SHA256, .callback = {CRYPT_SHA2_AsmCheck, NULL}},
{.id = CRYPT_RAND_SHA384, .callback = {CRYPT_SHA2_AsmCheck, NULL}},
{.id = CRYPT_RAND_SHA512, .callback = {CRYPT_SHA2_AsmCheck, NULL}},
{.id = CRYPT_RAND_HMAC_SHA224, .callback = {CRYPT_SHA2_AsmCheck, NULL}},
{.id = CRYPT_RAND_HMAC_SHA256, .callback = {CRYPT_SHA2_AsmCheck, NULL}},
{.id = CRYPT_RAND_HMAC_SHA384, .callback = {CRYPT_SHA2_AsmCheck, NULL}},
{.id = CRYPT_RAND_HMAC_SHA512, .callback = {CRYPT_SHA2_AsmCheck, NULL}},
#endif
#if defined(HITLS_CRYPTO_SM3_ASM)
{.id = CRYPT_RAND_SM3, .callback = {CRYPT_SM3_AsmCheck, NULL}},
#endif
#if defined(HITLS_CRYPTO_AES_ASM)
{.id = CRYPT_RAND_AES128_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_RAND_AES192_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_RAND_AES256_CTR, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_RAND_AES128_CTR_DF, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_RAND_AES192_CTR_DF, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_RAND_AES256_CTR_DF, .callback = {CRYPT_AES_AsmCheck, NULL}},
#endif
#if defined(HITLS_CRYPTO_SM4_ASM)
{.id = CRYPT_RAND_SM4_CTR_DF, .callback = {CRYPT_SM4_AsmCheck, NULL}},
#endif
{.id = CRYPT_RAND_ALGID_MAX, .callback = {NULL, NULL}},
};
int32_t CRYPT_ASMCAP_Drbg(CRYPT_RAND_AlgId id)
{
return CryptCheckCapId((BslCid)id, HITLS_ASM_DRBG_ALG_CHECK,
sizeof(HITLS_ASM_DRBG_ALG_CHECK) / sizeof(EAL_CheckAsm));
}
#endif // HITLS_CRYPTO_DRBG
#if defined(HITLS_CRYPTO_MAC)
static const EAL_CheckAsm HITLS_ASM_MAC_ALG_CHECK[] = {
/* MAC algorithm ID */
#if defined(HITLS_CRYPTO_MD5_ASM)
{.id = CRYPT_MAC_HMAC_MD5, .callback = {CRYPT_MD5_AsmCheck, NULL}},
#endif
#if defined(HITLS_CRYPTO_SHA1_ASM)
{.id = CRYPT_MAC_HMAC_SHA1, .callback = {CRYPT_SHA1_AsmCheck, NULL}},
#endif
#if defined(HITLS_CRYPTO_SHA2_ASM)
{.id = CRYPT_MAC_HMAC_SHA224, .callback = {CRYPT_SHA2_AsmCheck, NULL}},
{.id = CRYPT_MAC_HMAC_SHA256, .callback = {CRYPT_SHA2_AsmCheck, NULL}},
{.id = CRYPT_MAC_HMAC_SHA384, .callback = {CRYPT_SHA2_AsmCheck, NULL}},
{.id = CRYPT_MAC_HMAC_SHA512, .callback = {CRYPT_SHA2_AsmCheck, NULL}},
#endif
#if defined(HITLS_CRYPTO_SM3_ASM)
{.id = CRYPT_MAC_HMAC_SM3, .callback = {CRYPT_SM3_AsmCheck, NULL}},
#endif
#if defined(HITLS_CRYPTO_AES_ASM)
{.id = CRYPT_MAC_CMAC_AES128, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_MAC_CMAC_AES192, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_MAC_CMAC_AES256, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_MAC_GMAC_AES128, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_MAC_GMAC_AES192, .callback = {CRYPT_AES_AsmCheck, NULL}},
{.id = CRYPT_MAC_GMAC_AES256, .callback = {CRYPT_AES_AsmCheck, NULL}},
#endif
{.id = CRYPT_MAC_MAX, .callback = {NULL, NULL}},
};
int32_t CRYPT_ASMCAP_Mac(CRYPT_MAC_AlgId id)
{
return CryptCheckCapId((BslCid)id, HITLS_ASM_MAC_ALG_CHECK,
sizeof(HITLS_ASM_MAC_ALG_CHECK) / sizeof(EAL_CheckAsm));
}
#endif // HITLS_CRYPTO_MAC
#endif /* HITLS_CRYPTO_ASM_CHECK */
|
2301_79861745/bench_create
|
crypto/ealinit/src/crypt_init.c
|
C
|
unknown
| 15,574
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_ECC_H
#define CRYPT_ECC_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ECC
#include "crypt_bn.h"
#include "crypt_algid.h"
#include "crypt_types.h"
#include "bsl_params.h"
#ifdef __cplusplus
extern "C" {
#endif
/**
* Elliptic Curve Point Information
*/
typedef struct EccPointInfo ECC_Point;
/**
* Elliptic Curve Parameter Information
*/
typedef struct EccPara ECC_Para;
/**
* Point information of elliptic curve scalar after recoding
*/
typedef struct {
int8_t *num;
uint32_t *wide;
uint32_t size;
uint32_t baseBits; // Indicates the offset start address of the first block.
uint32_t offset;
} ReCodeData;
/**
* @ingroup ecc
* @brief Creating curve parameters
*
* @param id [IN] Curve enumeration
*
* @retval Not NULL Success
* @retval NULL failure
*/
ECC_Para *ECC_NewPara(CRYPT_PKEY_ParaId id);
/**
* @ingroup ecc
* @brief Curve parameter release
*
* @param para [IN] Curve parameter information. The para is set NULL by the invoker.
*
* @retval None
*/
void ECC_FreePara(ECC_Para *para);
/**
* @ingroup ecc
* @brief Read the curve parameter ID.
*
* @param para [IN] Curve parameter information
*
* @retval Curve ID
*/
CRYPT_PKEY_ParaId ECC_GetParaId(const ECC_Para *para);
/**
* @ingroup ecc
* @brief Obtain the curve parameter ID based on the curve parameter information.
*
* @param eccpara [IN] Curve parameter information
*
* @retval Curve ID
*/
CRYPT_PKEY_ParaId GetCurveId(const CRYPT_EccPara *eccPara);
/**
* @ingroup ecc
* @brief Point creation
*
* @param para [IN] Curve parameter information
*
* @retval Not NULL Success
* @retval NULL failure
*/
ECC_Point *ECC_NewPoint(const ECC_Para *para);
/**
* @ingroup ecc
* @brief Point Release
*
* @param pt [IN] Point data, pt is set to null by the invoker.
*
* @retval none
*/
void ECC_FreePoint(ECC_Point *pt);
/**
* @ingroup ecc
* @brief Point copy
*
* @param dst [OUT] The copied point information
* @param src [IN] Input
*
* @retval Not NULL Success
* @retval NULL failure
*/
int32_t ECC_CopyPoint(ECC_Point *dst, const ECC_Point *src);
/**
* @ingroup ecc
* @brief Generate a point data with the same content.
*
* @param pt [IN] Input point information
*
* @retval Not NULL Success
* @retval NULL failure
*/
ECC_Point *ECC_DupPoint(const ECC_Point *pt);
/**
* @ingroup ecc
* @brief Check if a and b are the same point
*
* @param para [IN] Curve parameter information
* @param a [IN] Point a in Jacobian coordinate
* @param b [IN] Point b in Jacobian coordinate
*
* @retval CRYPT_SUCCESS The two points are the same.
* @retval CRYPT_ECC_POINT_NOT_EQUAL The two points are different.
* @retval For details about other errors, see crypt_errno.h.
*/
int32_t ECC_PointCmp(const ECC_Para *para, const ECC_Point *a, const ECC_Point *b);
/**
* @ingroup ecc
* @brief Convert the Jacobian coordinate point (x, y, z) to affine coordinate (x/z^2, y/z^3, 1) and get coordinates.
*
* @param para [IN] Curve parameter information
* @param pt [IN/OUT] Point (x, y, z) -> (x/z^2, y/z^3, 1)
* @param x [OUT] x/z^2
* @param y [OUT] y/z^3
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h.
*/
int32_t ECC_GetPoint(const ECC_Para *para, ECC_Point *pt, CRYPT_Data *x, CRYPT_Data *y);
/**
* @ingroup ecc
* @brief Convert the Jacobian coordinate point (x, y, z) to affine coordinate (x/z^2, y/z^3, 1) and get coordinats.
*
* @param para [IN] Curve parameter information
* @param pt [IN/OUT] Point (x, y, z) -> (x/z^2, y/z^3, 1)
* @param x [OUT] x/z^2
* @param y [OUT] y/z^3
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h.
*/
int32_t ECC_GetPoint2Bn(const ECC_Para *para, ECC_Point *pt, BN_BigNum *x, BN_BigNum *y);
/**
* @ingroup ecc
* @brief Convert the Jacobian coordinate point (x, y, z) to affine coordinate (x/z^2, y/z^3, 1) and get x/z^2
*
* @param para [IN] Curve parameter information
* @param pt [IN/OUT] Point (x, y, z) -> (x/z^2, y/z^3, 1)
* @param x [OUT] x/z^2
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h.
*/
int32_t ECC_GetPointDataX(const ECC_Para *para, ECC_Point *pt, BN_BigNum *x);
/**
* @ingroup ecc
* @brief Calculate r = k * pt. When pt is NULL, calculate r = k * G, where G is the generator
* The pre-computation table under the para parameter will be updated.
*
* @param para [IN] Curve parameter information
* @param r [OUT] Scalar multiplication
* @param k [IN] Scalar
* @param pt [IN] Point data, which can be NULL.
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h.
*/
int32_t ECC_PointMul(ECC_Para *para, ECC_Point *r,
const BN_BigNum *k, const ECC_Point *pt);
/**
* @ingroup ecc
* @brief Calculate r = k1 * G + k2 * pt, where G is the generator.
*
* @param para [IN] Curve parameter information
* @param r [OUT] Point k1 * G + k2 * pt
* @param k1 [IN] Scalar k1
* @param k2 [IN] Scalar k2
* @param pt [IN] Point pt
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h.
*/
int32_t ECC_PointMulAdd(ECC_Para *para, ECC_Point *r,
const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt);
/**
* @ingroup ecc
* @brief Convert the Jacobian coordinate point (x, y, z) to affine coordinate (x/z^2, y/z^3, 1) and encode point.
*
* @param para [IN] Curve parameter information
* @param pt [IN/OUT] Point (x, y, z) -> (x/z^2, y/z^3, 1)
* @param data [OUT] Data stream
* @param dataLen [IN/OUT] The input is the buff length of data and the output is the valid length of data.
* @param format [IN] Encoding format
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h.
*/
int32_t ECC_EncodePoint(const ECC_Para *para, ECC_Point *pt, uint8_t *data, uint32_t *dataLen,
CRYPT_PKEY_PointFormat format);
/**
* @ingroup ecc
* @brief Encode the data stream into point information.
*
* @param para [IN] Curve parameter information
* @param pt [OUT] Point in affine coordinate(z=1)
* @param data [IN] Data stream
* @param dataLen [IN] Data stream length
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h.
*/
int32_t ECC_DecodePoint(const ECC_Para *para, ECC_Point *pt, const uint8_t *data, uint32_t dataLen);
/**
* @ingroup ecc
* @brief Obtain the parameter value h based on the curve parameter.
*
* @param para [IN] Curve parameter information
*
* @retval Not NULL Success
* @retval NULL failure
*/
BN_BigNum *ECC_GetParaH(const ECC_Para *para);
/**
* @ingroup ecc
* @brief Obtain the parameter value n based on the curve parameter.
*
* @param para [IN] Curve parameter information
*
* @retval Not NULL Success
* @retval NULL failure
*/
BN_BigNum *ECC_GetParaN(const ECC_Para *para);
/**
* @ingroup ecc
* @brief Obtain the coefficient a based on curve parameters.
*
* @param para [IN] Curve parameter information
*
* @retval Not NULL Success
* @retval NULL failure
*/
BN_BigNum *ECC_GetParaA(const ECC_Para *para);
/**
* @ingroup ecc
* @brief Obtain the coefficient b based on curve parameters.
*
* @param para [IN] Curve parameter information
*
* @retval Not NULL Success
* @retval NULL failure
*/
BN_BigNum *ECC_GetParaB(const ECC_Para *para);
/**
* @ingroup ecc
* @brief Obtain the coordinate x of the base point G based on curve parameters.
*
* @param para [IN] Curve parameter information
*
* @retval Not NULL Success
* @retval NULL failure
*/
BN_BigNum *ECC_GetParaX(const ECC_Para *para);
/**
* @ingroup ecc
* @brief Obtain the coordinate y of the base point G based on curve parameters.
*
* @param para [IN] Curve parameter information
*
* @retval Not NULL Success
* @retval NULL failure
*/
BN_BigNum *ECC_GetParaY(const ECC_Para *para);
/**
* @ingroup ecc
* @brief Obtain bit length of parameter p based on the curve parameter.
*
* @param para [IN] Curve parameter information
*
* @retval Return the specification unit of the curve parameter is bits. 0 is returned when an error occurs.
*/
uint32_t ECC_ParaBits(const ECC_Para *para);
/**
* @ingroup ecc
* @brief Generate a curve parameter with the same content.
*
* @param para [IN] Curve parameter information
*
* @retval Not NULL Success
* @retval NULL failure
*/
ECC_Para *ECC_DupPara(const ECC_Para *para);
/**
* @ingroup ecc
* @brief Check whether the point is valid.
*
* @param pt [IN] Point information
*
* @retval CRYPT_SUCCESS This point is valid.
* @retval CRYPT_ECC_POINT_AT_INFINITY The point is an infinite point (0 point).
* @retval For details about other errors, see crypt_errno.h.
*/
int32_t ECC_PointCheck(const ECC_Point *pt);
/**
* @ingroup ecc
* @brief Obtain the generator(with z=1) based on curve parameters.
*
* @param para [IN] Curve parameters
*
* @retval Not NULL Success
* @retval NULL failure
*/
ECC_Point *ECC_GetGFromPara(const ECC_Para *para);
/**
* @ingroup ecc
* @brief Scalar re-encoding to obtain the encoded data whose window is the 'window'.
*
* @param k [IN] Curve parameters
* @param window [IN] Window size
*
* @retval Not NULL Success
* @retval NULL failure
*/
ReCodeData *ECC_ReCodeK(const BN_BigNum *k, uint32_t window);
/**
* @ingroup ecc
* @brief Release the encoded data.
*
* @param code [IN/OUT] Data to be released. The code is set NULL by the invoker.
*
* @retval None
*/
void ECC_ReCodeFree(ReCodeData *code);
/**
* @brief Calculate r = 1/a mod para->n
*
* @param para [IN] Curve parameter information
* @param r [OUT] Output modulus inverse value
* @param a [IN] Input BigNum that needs to be inverted.
*
* @retval CRYPT_SUCCESS set successfully.
* @retval For details about other errors, see crypt_errno.h.
*/
int32_t ECC_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a);
/**
* @ingroup ecc
* @brief Calculate addition r = a + b
*
* @param para [IN] Curve parameter
* @param r [OUT] Point r = a + b
* @param a [IN] Point a
* @param b [IN] Point b
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For other errors, see crypt_errno.h.
*/
int32_t ECC_PointAddAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b);
/**
* @ingroup ecc
* @brief ecc get security bits
*
* @param para [IN] ecc Context structure
*
* @retval security bits
*/
int32_t ECC_GetSecBits(const ECC_Para *para);
/**
* @ingroup ecc
* @brief Randomize z for preventing attack.
* Converting a point (x, y, z) -> (x/z0^2, y/z0^3, z*z0)
* @param para [IN] Curve parameters
* @param pt [IN/OUT] Point information
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECC_PointBlind(const ECC_Para *para, ECC_Point *pt);
/**
* @ingroup ecc
* @brief convert ecc point to mont form
* @param para [IN] Curve parameters
* @param pt [IN/OUT] Point information
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECC_PointToMont(const ECC_Para *para, ECC_Point *pt, BN_Optimizer *opt);
/**
* @ingroup ecc
* @brief recover ecc point from mont form
* @param para [IN] Curve parameters
* @param pt [IN/OUT] Point information
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
void ECC_PointFromMont(const ECC_Para *para, ECC_Point *r);
/**
* @ingroup ecc
* @brief convert ecc point to mont form
* @param para [IN] Curve parameters
* @param pt [IN/OUT] Point information
*
* @param libCtx [IN] Pointer to the library context
* @param para [OUT] Pointer to the elliptic curve parameters
*/
void ECC_SetLibCtx(void *libCtx, ECC_Para *para);
#ifdef __cplusplus
}
#endif
#endif // HITLS_CRYPTO_ECC
#endif // CRYPT_ECC_H
|
2301_79861745/bench_create
|
crypto/ecc/include/crypt_ecc.h
|
C
|
unknown
| 12,530
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_ECC_PKEY_H
#define CRYPT_ECC_PKEY_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ECC
#include "crypt_bn.h"
#include "crypt_ecc.h"
#include "crypt_algid.h"
#include "bsl_params.h"
#include "sal_atomic.h"
#include "bsl_params.h"
#ifdef __cplusplus
extern "C" {
#endif
#ifndef CRYPT_ECC_TRY_MAX_CNT
#define CRYPT_ECC_TRY_MAX_CNT 100 // Maximum number of attempts to generate keys and signatures
#endif
/* ECC key context */
typedef struct ECC_PkeyCtx {
BN_BigNum *prvkey; // Private key
ECC_Point *pubkey; // Public key
ECC_Para *para; // Key parameter
CRYPT_PKEY_PointFormat pointFormat; // Public key point format
uint32_t useCofactorMode; // Indicates whether to use the cofactor mode. 1 indicates yes, and 0 indicates no.
BSL_SAL_RefCount references;
void *libCtx;
char *mdAttr;
} ECC_Pkey;
/**
* @ingroup ecc
* @brief After the copied ECC context is used up, call the ECC_FreeCtx to release the memory.
*
* @param ctx [IN] Source ECC context
*
* @return ECC_Pkey ECC context pointer
* If the operation fails, null is returned.
*/
ECC_Pkey *ECC_DupCtx(ECC_Pkey *ctx);
/**
* @ingroup ecc
* @brief ecc Release the key context structure
*
* @param ctx [IN] Pointer to the context structure to be released. The ctx is set NULL by the invoker.
*/
void ECC_FreeCtx(ECC_Pkey *ctx);
/**
* @ingroup ecc
* @brief Obtain the valid length of the key, which is used before obtaining the private key.
*
* @param ctx [IN] Structure from which the key length is expected to be obtained
*
* @retval 0 The input is incorrect or the corresponding key structure does not have a valid key length.
* @retval uint32_t Valid key length greater than 0
*/
uint32_t ECC_PkeyGetBits(const ECC_Pkey *ctx);
/**
* @ingroup ecc
* @brief Obtain curve parameters.
*
* @param pkey [IN] Curve parameter information
* @param eccPara [OUT] Curve parameter information
*
* @retval CRYPT_SUCCESS
* @retval Other failure
*/
int32_t ECC_GetPara(const ECC_Pkey *pkey, CRYPT_EccPara *eccPara);
/**
* @ingroup ecc
* @brief Generate a public key from the public key.
*
* @param ctx [IN] ECC key context structure
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval ECC error code. Internal ECC calculation error
* @retval BN error code. An error occurred in the internal BigNum calculation.
* @retval CRYPT_SUCCESS The public key is successfully generated.
*/
int32_t ECC_GenPublicKey(ECC_Pkey *ctx);
/**
* @ingroup ecc
* @brief Generate the ECC key pair.
*
* @param ctx [IN] dh Context structure
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval ECC error code. Internal ECC calculation error
* @retval BN error code. An error occurred in the internal BigNum calculation.
* @retval CRYPT_SUCCESS The key pair is successfully generated.
*/
int32_t ECC_PkeyGen(ECC_Pkey *ctx);
/**
* @ingroup ecc
* @brief ECC Set the private key data.
*
* @param ctx [OUT] ECC context structure
* @param prv [IN] Private key data
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval BN error. An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS Set successfully.
*/
int32_t ECC_PkeySetPrvKey(ECC_Pkey *ctx, const CRYPT_EccPrv *prv);
/**
* @ingroup ecc
* @brief ECC Set the public key data.
*
* @param ctx [OUT] ECC context structure
* @param pub [IN] Public key data
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval BN error. An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS Set successfully.
*/
int32_t ECC_PkeySetPubKey(ECC_Pkey *ctx, const CRYPT_EccPub *pub);
/**
* @ingroup ecc
* @brief ECC Obtain the private key data.
*
* @param ctx [IN] ECC context structure
* @param prv [OUT] Private key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval ECC_Pkey_KEYINFO_ERROR The key information is incorrect.
* @retval BN error. An error occurred in the internal BigNum calculation.
* @retval CRYPT_SUCCESS Obtained successfully.
*/
int32_t ECC_PkeyGetPrvKey(const ECC_Pkey *ctx, CRYPT_EccPrv *prv);
/**
* @ingroup ecc
* @brief ECC Obtain the public key data.
*
* @param ctx [IN] ECC context structure
* @param pub [OUT] Public key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval ECC_Pkey_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient.
* @retval ECC_Pkey_KEYINFO_ERROR The key information is incorrect.
* @retval BN error. An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS Obtained successfully.
*/
int32_t ECC_PkeyGetPubKey(const ECC_Pkey *ctx, CRYPT_EccPub *pub);
#ifdef HITLS_BSL_PARAMS
/**
* @ingroup ecc
* @brief ECC Set the private key data.
*
* @param ctx [OUT] ECC context structure
* @param para [IN] Private key data
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval BN error. An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS Set successfully.
*/
int32_t ECC_PkeySetPrvKeyEx(ECC_Pkey *ctx, const BSL_Param *para);
/**
* @ingroup ecc
* @brief ECC Set the public key data.
*
* @param ctx [OUT] ECC context structure
* @param para [IN] Public key data
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval BN error. An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS Set successfully.
*/
int32_t ECC_PkeySetPubKeyEx(ECC_Pkey *ctx, const BSL_Param *para);
/**
* @ingroup ecc
* @brief ECC Obtain the private key data.
*
* @param ctx [IN] ECC context structure
* @param para [OUT] Private key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval ECC_Pkey_KEYINFO_ERROR The key information is incorrect.
* @retval BN error. An error occurred in the internal BigNum calculation.
* @retval CRYPT_SUCCESS Obtained successfully.
*/
int32_t ECC_PkeyGetPrvKeyEx(const ECC_Pkey *ctx, BSL_Param *para);
/**
* @ingroup ecc
* @brief ECC Obtain the public key data.
*
* @param ctx [IN] ECC context structure
* @param para [OUT] Public key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval ECC_Pkey_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient.
* @retval ECC_Pkey_KEYINFO_ERROR The key information is incorrect.
* @retval BN error. An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS Obtained successfully.
*/
int32_t ECC_PkeyGetPubKeyEx(const ECC_Pkey *ctx, BSL_Param *para);
/**
* @ingroup ecc
* @brief Obtain curve parameters.
*
* @param pkey [IN] Curve parameter information
* @param para [OUT] Curve parameter information
*
* @retval CRYPT_SUCCESS
* @retval Other failure
*/
int32_t ECC_GetParaEx(const ECC_Pkey *ctx, BSL_Param *para);
#endif
/**
* @ingroup ecc
* @brief ECC control interface
*
* @param ctx [IN/OUT] ECC context structure
* @param opt [IN] Operation mode. For details, see ECC_CtrlType.
* @param val [IN] Input parameter
* @param len [IN] val Length
*
* @retval CRYPT_SUCCESS Set successfully.
* @retval CRYPT_NULL_INPUT If any input parameter is empty
* @retval ECC_Pkey_ERR_UNSUPPORTED_CTRL_OPTION opt mode not supported
*/
int32_t ECC_PkeyCtrl(ECC_Pkey *ctx, int32_t opt, void *val, uint32_t len);
/**
* @ingroup ecc
* @brief ecc Create a context.
*
* @param id [IN] elliptic curve ID
* @return ECC_Pkey ECC context pointer
* If the operation fails, null is returned.
*/
ECC_Pkey *ECC_PkeyNewCtx(CRYPT_PKEY_ParaId id);
/**
* @ingroup ecc
* @brief ecc Compare public keys and parameters
*
* @param a [IN] ECC Context structure
* @param b [IN] ECC context structure
*
* @retval CRYPT_SUCCESS is the same
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_ECC_KEY_PUBKEY_NOT_EQUAL Public keys are not equal
* @retval CRYPT_ECC_POINT_ERR_CURVE_ID Parameter curve IDs are not equal.
* @retval CRYPT_ECC_ERR_POINT_FORMAT Point compression formats are not equal
* @retval For other error codes, see crypt_errno.h.
*/
int32_t ECC_PkeyCmp(const ECC_Pkey *a, const ECC_Pkey *b);
/**
* @ingroup ecc
* @brief Set the parameter of the ECC context
*
* @param ctx [IN] ECC context
* @param para [IN] ECC parameter
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h.
*/
int32_t ECC_SetPara(ECC_Pkey *ctx, ECC_Para *para);
#ifdef HITLS_CRYPTO_ECC_CHECK
/**
* @ingroup ecc
* @brief check the key pair consistency
*
* @param pkey1 [IN] ecc key context structure
* @param pkey2 [IN] ecc key context structure
* @param checkType [IN] check type
*
* @retval CRYPT_SUCCESS check success.
* Others. For details, see error code in errno.
*/
int32_t ECC_PkeyCheck(const ECC_Pkey *pkey1, const ECC_Pkey *pkey2, uint32_t checkType);
#endif // HITLS_CRYPTO_ECC_CHECK
#ifdef __cplusplus
}
#endif
#endif // HITLS_CRYPTO_ECC
#endif // CRYPT_ECC_PKEY_H
|
2301_79861745/bench_create
|
crypto/ecc/include/crypt_ecc_pkey.h
|
C
|
unknown
| 10,209
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_CURVE_NISTP256) && defined(HITLS_CRYPTO_NIST_USE_ACCEL)
#include "crypt_arm.h"
#include "ecp256_pre_comp_table.s"
.arch armv8-a+crypto
.file "ecp256_armv8.S"
.section .rodata
.align 4
.Lpoly: // P
.quad 0xffffffffffffffff,0x00000000ffffffff,0x0000000000000000,0xffffffff00000001
.Lone_mont: // R mod P, R = 2^256, = 2^256 - P
.quad 0x0000000000000001,0xffffffff00000000,0xffffffffffffffff,0x00000000fffffffe
.Lord: // Order, n
.quad 0xf3b9cac2fc632551,0xbce6faada7179e84,0xffffffffffffffff,0xffffffff00000000
.LordK: // (2^64 - ord[0]) * ordK = 1 // LordK * Lord, the lower 64 bits are all Fs.
// LordK * Lord, The lower 64 bits are all Fs, coincidence?
.quad 0xccd1c8aaee00bc4f
.Lone:
.quad 1, 0, 0, 0
/*
Initial z is not set to 1
0000000300000000, 00000001FFFFFFFE, FFFFFFFD00000002, FFFFFFFE00000003
*/
.text
.globl ECP256_GetPreCompTable
.type ECP256_GetPreCompTable,%function
.align 4
ECP256_GetPreCompTable:
AARCH64_PACIASP
adrp x0, g_preCompTable
add x0, x0, :lo12:g_preCompTable
AARCH64_AUTIASP
ret
.size ECP256_GetPreCompTable,.-ECP256_GetPreCompTable
.globl ECP256_FromMont
.type ECP256_FromMont,%function
.align 4
ECP256_FromMont:
AARCH64_PACIASP
stp x29, x30, [sp, #-32]!
add x29, sp , #0
stp x19, x20, [sp, #16]
ldp x4 , x5 , [x1]
ldp x6 , x7 , [x1, #16]
adrp x14, .Lpoly+8
add x14,x14,:lo12:.Lpoly+8
ldr x12,[x14]
ldr x13,[x14,#16]
adrp x2, .Lone // &bp[0]
add x2, x2, :lo12:.Lone
bl ECP256_MulCore
ldp x19, x20, [sp , #16]
ldp x29, x30, [sp], #32
AARCH64_AUTIASP
ret
.size ECP256_FromMont,.-ECP256_FromMont
.type ECP256_AddCore,%function
.align 4
ECP256_AddCore:
AARCH64_PACIASP
adds x14, x14, x8 // ret = a+b
adcs x15, x15, x9
adcs x16, x16, x10
adcs x17, x17, x11
adc x1 , xzr, xzr
// r -= p, p = 0xffffffffffffffff,0x00000000ffffffff,0x0000000000000000,0xffffffff00000001
adds x8 , x14, #1 // x8 = x14 - 0xffffffffffffffff = x14 + 1
sbcs x9 , x15, x12 // x9 = x15 - 0x00000000ffffffff
sbcs x10, x16, xzr // x10 = x16 - 0
sbcs x11, x17, x13 // x11 = x17 - 0xffffffff00000001
sbcs xzr, x1 , xzr // Determine whether r-p has borrowing
// r = r < p ? r : r-p
// x8~x11 saves r-p, x14~x17 saves r
csel x14, x14, x8 , lo
csel x15, x15, x9 , lo
csel x16, x16, x10, lo
csel x17, x17, x11, lo
stp x14, x15, [x0]
stp x16, x17, [x0, #16]
AARCH64_AUTIASP
ret
.size ECP256_AddCore,.-ECP256_AddCore
///////////////////////////////////////
// x14~x17 = a[0~3], x8~x11 = b[0~3] //
///////////////////////////////////////
.type ECP256_SubCore1,%function
.align 4
ECP256_SubCore1:
AARCH64_PACIASP
subs x14, x14, x8
sbcs x15, x15, x9
sbcs x16, x16, x10
sbcs x17, x17, x11
sbc x1 , xzr, xzr // x1 = CF
// r += p
subs x8 , x14, #1 // x8 = x14 + 0xffffffffffffffff = x14 - 1
adcs x9 , x15, x12 // x9 = x15 + 0x00000000ffffffff
adcs x10, x16, xzr // x10 = x16 + 0
adc x11, x17, x13 // x11 = x17 + 0xffffffff00000001
cmp x1 , xzr
// r = borrow==0 ? r : r+p
csel x14, x14, x8 , eq
csel x15, x15, x9 , eq
csel x16, x16, x10, eq
csel x17, x17, x11, eq
stp x14, x15, [x0]
stp x16, x17, [x0, #16]
AARCH64_AUTIASP
ret
.size ECP256_SubCore1,.-ECP256_SubCore1
.type ECP256_SubCore2,%function
.align 4
ECP256_SubCore2:
AARCH64_PACIASP
subs x14, x8 , x14
sbcs x15, x9 , x15
sbcs x16, x10, x16
sbcs x17, x11, x17
sbc x1 , xzr, xzr // x1 = CF
// r += p
subs x8 , x14, #1 // x8 = x14 + 0xffffffffffffffff = x14 - 1
adcs x9 , x15, x12 // x9 = x15 + 0x00000000ffffffff
adcs x10, x16, xzr // x10 = x16 + 0
adc x11, x17, x13 // x11 = x17 + 0xffffffff00000001
cmp x1 , xzr
// r = borrow==0 ? r : r+p
csel x14, x14, x8 , eq
csel x15, x15, x9 , eq
csel x16, x16, x10, eq
csel x17, x17, x11, eq
stp x14, x15, [x0]
stp x16, x17, [x0, #16]
AARCH64_AUTIASP
ret
.size ECP256_SubCore2,.-ECP256_SubCore2
.type ECP256_DivBy2Core,%function
.align 4
ECP256_DivBy2Core:
AARCH64_PACIASP
// a+p
subs x8 , x14, #1 // x8 = x14 + 0xffffffffffffffff = x14 - 1
adcs x9 , x15, x12 // x9 = x15 + 0x00000000ffffffff
adcs x10, x16, xzr // x10 = x16 + 0
adcs x11, x17, x13 // x11 = x17 + 0xffffffff00000001
adc x1 , xzr, xzr // x1 = CF
tst x14, #1 // Check whether a is an even number. eq indicates that a is an even number.
// a = a Is an even number ? a : a+p
csel x14, x14, x8 , eq
csel x15, x15, x9 , eq
csel x16, x16, x10, eq
csel x17, x17, x11, eq
csel x1 , xzr, x1 , eq // If a is still a, then x1, which holds the carry, is set to 0.
lsr x14, x14, #1 // r >>= 1, Divided by 2.
orr x14, x14, x15, lsl#63 // x15 is shifted leftward by 63 bits. The lower 63 bits become 0.
// The most significant bit is the least significant bit before the shift.
lsr x15, x15, #1 // The most significant bit of x14 is changed to the least significant bit of x15
// to achieve cyclic right shift.
orr x15, x15, x16, lsl#63
lsr x16, x16, #1
orr x16, x16, x17, lsl#63
lsr x17, x17, #1
orr x17, x17, x1 , lsl#63 // The most significant bit of the highest block is x1.
stp x14, x15, [x0]
stp x16, x17, [x0, #16]
AARCH64_AUTIASP
ret
.size ECP256_DivBy2Core,.-ECP256_DivBy2Core
.globl ECP256_Neg
.type ECP256_Neg,%function
.align 4
ECP256_Neg:
AARCH64_PACIASP
stp x29, x30, [sp, #-16]!
add x29, sp , #0
ldp x14, x15, [x1]
ldp x16, x17, [x1, #16]
mov x8 , xzr
mov x9 , xzr
mov x10, xzr
mov x11, xzr
adrp x7, .Lpoly+8
add x7,x7,:lo12:.Lpoly+8
ldr x12,[x7]
ldr x13,[x7,#16]
// -a = 0 - a
bl ECP256_SubCore2
ldp x29, x30, [sp], #16
AARCH64_AUTIASP
ret
.size ECP256_Neg,.-ECP256_Neg
.type ECP256_MulCore,%function
.align 4
ECP256_MulCore:
AARCH64_PACIASP
ldr x3 , [x2] // b[0]
mul x14, x4 , x3
umulh x8 , x4 , x3
mul x15, x5 , x3
umulh x9 , x5 , x3
mul x16, x6 , x3
umulh x10, x6 , x3
mul x17, x7 , x3
umulh x11, x7 , x3
adds x15, x15, x8
adcs x16, x16, x9
adcs x17, x17, x10
adc x19, xzr, x11 // x19 = x11 + CF
mov x20, xzr
lsl x8 , x14, #32 // In this case, x14 stores the lower 32 bits of the lo(a[0]*b[i]), x8 = lo(a[0]*b[i]).
// The lower 32 bits are shifted to the left by 32 bits, and 0s are padded to the lower bits.
lsr x9 , x14, #32 // x9 = The most significant 32 bits of lo(a[0]*b[i]) are shifted rightward by 32 bits
// and 0s are padded to the most significant bits.
subs x10, x14, x8
sbc x11, x14, x9
adds x14, x15, x8
adcs x15, x16, x9
adcs x16, x17, x10
adcs x17, x19, x11
adc x19, x20, xzr
ldr x3 , [x2, #8] // b[1]
// lo(a[0~3] * b[i])
mul x8 , x4 , x3
mul x9 , x5 , x3
mul x10, x6 , x3
mul x11, x7 , x3
adds x14, x14, x8
adcs x15, x15, x9
adcs x16, x16, x10
adcs x17, x17, x11
adc x19, x19, xzr
// hi(a[0~3] * b[i])
umulh x8 , x4 , x3
umulh x9 , x5 , x3
umulh x10, x6 , x3
umulh x11, x7 , x3
adds x15, x15, x8
adcs x16, x16, x9
adcs x17, x17, x10
adcs x19, x19, x11
adc x20, xzr, xzr
lsl x8 , x14, #32 // In this case, x14 stores the lower 32 bits of the lo(a[0]*b[i]),
// x8 = lo(a[0]*b[i]). The lower 32 bits are shifted to the left by 32 bits,
// and 0s are padded to the lower bits.
lsr x9 , x14, #32 // x9 = The most significant 32 bits of lo(a[0]*b[i]) are shifted rightward
// by 32 bits and 0s are padded to the most significant bits.
subs x10, x14, x8
sbc x11, x14, x9
adds x14, x15, x8
adcs x15, x16, x9
adcs x16, x17, x10
adcs x17, x19, x11
adc x19, x20, xzr
ldr x3 , [x2, #8*2] // b[2]
// lo(a[0~3] * b[i])
mul x8 , x4 , x3
mul x9 , x5 , x3
mul x10, x6 , x3
mul x11, x7 , x3
adds x14, x14, x8
adcs x15, x15, x9
adcs x16, x16, x10
adcs x17, x17, x11
adc x19, x19, xzr
// hi(a[0~3] * b[i])
umulh x8 , x4 , x3
umulh x9 , x5 , x3
umulh x10, x6 , x3
umulh x11, x7 , x3
adds x15, x15, x8
adcs x16, x16, x9
adcs x17, x17, x10
adcs x19, x19, x11
adc x20, xzr, xzr
lsl x8 , x14, #32 // x8 = lq<<32
lsr x9 , x14, #32 // x9 = hq
subs x10, x14, x8 // x10 = q - lq<<32
sbc x11, x14, x9 // x11 = q - hq
adds x14, x15, x8
adcs x15, x16, x9
adcs x16, x17, x10
adcs x17, x19, x11
adc x19, x20, xzr
ldr x3 , [x2, #8*3] // b[3]
// lo(a[0~3] * b[i])
mul x8 , x4 , x3
mul x9 , x5 , x3
mul x10, x6 , x3
mul x11, x7 , x3
adds x14, x14, x8
adcs x15, x15, x9
adcs x16, x16, x10
adcs x17, x17, x11
adc x19, x19, xzr
// hi(a[0~3] * b[i])
umulh x8 , x4 , x3
umulh x9 , x5 , x3
umulh x10, x6 , x3
umulh x11, x7 , x3
adds x15, x15, x8
adcs x16, x16, x9
adcs x17, x17, x10
adcs x19, x19, x11
adc x20, xzr, xzr
// last reduction
lsl x8 , x14, #32 // In this case, x14 stores the lower 32 bits of the lo(a[0]*b[i]),
// x8 = The lower 32 bits of (lo(a[0]*b[i])) are shifted to the left by 32 bits,
// and 0s are padded to the lower bits.
lsr x9 , x14, #32 // x9 = The most significant 32 bits of (lo(a[0]*b[i])) are shifted rightward
// by 32 bits and 0s are padded to the most significant bits.
subs x10, x14, x8
sbc x11, x14, x9
adds x14, x15, x8
adcs x15, x16, x9
adcs x16, x17, x10
adcs x17, x19, x11
adc x19, x20, xzr
// x8~x11 = r - p (r may be greater than p)
adds x8 , x14, #1 // x8 = x14 - 0xffffffffffffffff = x14 + 1
sbcs x9 , x15, x12 // x9 = x15 - 0x00000000ffffffff
sbcs x10, x16, xzr // x10 = x16 - 0
sbcs x11, x17, x13 // x11 = x17 - 0xffffffff00000001
sbcs xzr, x19, xzr // Determine whether to borrow
csel x14, x14, x8 , lo
csel x15, x15, x9 , lo
csel x16, x16, x10, lo
csel x17, x17, x11, lo
stp x14, x15, [x0]
stp x16, x17, [x0, #8*2]
AARCH64_AUTIASP
ret
.size ECP256_MulCore, .-ECP256_MulCore
.type ECP256_SqrCore,%function
.align 4
ECP256_SqrCore:
AARCH64_PACIASP
/******************************************
x7 x1 x20 x19 x17 x16 x15 x14
h0*1 l0*1
h0*2 l0*2
h0*3 l0*3
h1*2 l1*2
h1*3 l1*3
h2*3 l2*3
h3*3 l3*3 h2*2 l2*2 h1*1 l1*1 h0*0 l0*0
*******************************************/
// a[1~3] * a[0]
mul x15, x5 , x4 // lo(a[1] * a[0])
umulh x8 , x5 , x4 // hi(a[1] * a[0])
mul x16, x6 , x4 // lo(a[2] * a[0])
umulh x9 , x6 , x4 // hi(a[2] * a[0])
mul x17, x7 , x4 // lo(a[3] * a[0])
umulh x19, x7 , x4 // hi(a[3] * a[0])
adds x16, x16, x8
adcs x17, x17, x9
adc x19, x19, xzr // There will be no more carry.
// a[2~3] * a[1]
mul x8 , x6 , x5 // lo(a[2] * a[1])
umulh x9 , x6 , x5 // hi(a[2] * a[1])
mul x10, x7 , x5 // lo(a[3] * a[1])
umulh x11, x7 , x5 // hi(a[3] * a[1])
// a[3] * a[2]
mul x20, x7 , x6
umulh x1 , x7 , x6
// Add the results of the current round, and then add the acc (register in the note above).
adds x9 , x10, x9
adc x10, x11, xzr
adds x17, x17, x8
adcs x19, x19, x9
adcs x20, x20, x10
adc x1 , x1 , xzr // a[0-3] has been saved in x4 to x7.
// a[0~3] ^ 2
mul x14, x4 , x4
umulh x4 , x4 , x4
mul x8 , x5 , x5
umulh x5 , x5 , x5
mul x9 , x6 , x6
umulh x6 , x6 , x6
mul x10, x7 , x7
umulh x7 , x7 , x7
// acc[1~6] << 1
adds x15, x15, x15
adcs x16, x16, x16
adcs x17, x17, x17
adcs x19, x19, x19
adcs x20, x20, x20
adcs x1 , x1 , x1
adc x2 , xzr, xzr
// acc[] += a[] ^ 2
adds x15, x15, x4
adcs x16, x16, x8
adcs x17, x17, x5
adcs x19, x19, x9
adcs x20, x20, x6
adcs x1 , x1 , x10
adc x7 , x7 , x2
// Four rounds of reduce.
lsl x8 , x14, #32
lsr x9 , x14, #32
subs x10, x14, x8
sbc x11, x14, x9
adds x14, x15, x8
adcs x15, x16, x9
adcs x16, x17, x10
adc x17, x11, xzr
lsl x8 , x14, #32
lsr x9 , x14, #32
subs x10, x14, x8
sbc x11, x14, x9
adds x14, x15, x8
adcs x15, x16, x9
adcs x16, x17, x10
adc x17, x11, xzr
lsl x8 , x14, #32
lsr x9 , x14, #32
subs x10, x14, x8
sbc x11, x14, x9
adds x14, x15, x8
adcs x15, x16, x9
adcs x16, x17, x10
adc x17, x11, xzr
lsl x8 , x14, #32
lsr x9 , x14, #32
subs x10, x14, x8
sbc x11, x14, x9
adds x14, x15, x8
adcs x15, x16, x9
adcs x16, x17, x10
adc x17, x11, xzr
// Add acc[4-7]. x14~x19 is the current calculation result r.
adds x14, x14, x19
adcs x15, x15, x20
adcs x16, x16, x1
adcs x17, x17, x7
adc x19, xzr, xzr
// r -= p
adds x8 , x14, #1 // subs x8,x14,#-1
sbcs x9 , x15, x12
sbcs x10, x16, xzr
sbcs x11, x17, x13
sbcs xzr, x19, xzr // The set CF is used to determine the size relationship between r and p.
// r = r-p < 0 ? r : r-p
csel x14, x14, x8 , lo
csel x15, x15, x9 , lo
csel x16, x16, x10, lo
csel x17, x17, x11, lo
stp x14, x15, [x0]
stp x16, x17, [x0, #16]
AARCH64_AUTIASP
ret
.size ECP256_SqrCore,.-ECP256_SqrCore
.globl ECP256_Mul
.type ECP256_Mul,%function
.align 4
ECP256_Mul:
AARCH64_PACIASP
stp x29, x30, [sp, #-32]!
add x29, sp , #0
stp x19, x20, [sp, #16]
ldp x4 , x5 , [x1]
ldp x6 , x7 , [x1,#16]
adrp x3, .Lpoly+8
add x3,x3,:lo12:.Lpoly+8
ldr x12,[x3]
ldr x13,[x3,#16]
bl ECP256_MulCore
ldp x19, x20, [sp , #16]
ldp x29, x30, [sp], #32
AARCH64_AUTIASP
ret
.size ECP256_Mul,.-ECP256_Mul
.globl ECP256_Sqr
.type ECP256_Sqr,%function
.align 4
ECP256_Sqr:
AARCH64_PACIASP
stp x29, x30, [sp, #-32]!
add x29, sp , #0
stp x19, x20, [sp, #16]
ldp x4 , x5 , [x1]
ldp x6 , x7 , [x1, #16]
adrp x3, .Lpoly+8
add x3,x3,:lo12:.Lpoly+8
ldr x12,[x3]
ldr x13,[x3,#16]
bl ECP256_SqrCore
ldp x19, x20, [sp , #16]
ldp x29, x30, [sp], #32
AARCH64_AUTIASP
ret
.size ECP256_Sqr,.-ECP256_Sqr
# ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2007-bl
# Deal process:
# Z1Z1 = Z12
# U2 = X2*Z1Z1
# S2 = Y2*Z1*Z1Z1
# H = U2-X1
# HH = H2
# I = 4*HH
# J = H*I
# r = 2*(S2-Y1)
# V = X1*I
# X3 = r2-J-2*V
# Y3 = r*(V-X3)-2*Y1*J
# Z3 = (Z1+H)2-Z1Z1-HH
.globl ECP256_AddAffine
.type ECP256_AddAffine,%function
.align 5
ECP256_AddAffine:
AARCH64_PACIASP
stp x29, x30, [sp, #-80]!
add x29, sp , #0
stp x19, x20, [sp, #16]
stp x21, x22, [sp, #32]
stp x23, x24, [sp, #48]
stp x25, x26, [sp, #64]
sub sp , sp , #32*10 // Each coordinate is 256 bits, that is, 32 bytes, and a space of 10 coordinates is applied for.
// Based on C implementation, z1sqr and S2 lifecycles do not overlap.
// You can share one piece of memory and save an extra piece of memory.
// x0 to x2 will be used to invoke the interface to transfer parameters.
// Therefore, the initial input parameters are saved to x21 to x23.
// Obtains the structure members based on the address offset. Each member is 256 bits, that is, 32 bytes.
mov x21, x0 // CRYPT_P256_Point *r
mov x22, x1 // CRYPT_P256_Point *a
mov x23, x2 // CRYPT_P256_AffinePoint *b
adrp x14, .Lpoly+8 // p[1]
add x14,x14,:lo12:.Lpoly+8
ldr x12,[x14] // p[3]
ldr x13,[x14,#16]
ldp x4, x5, [x1, #64] // x1+64 = &(a->z[0]), a->z[0] is marked as z1[0]
ldp x6, x7, [x1, #64+16] // x1+64+16 = &(a->z[2])
orr x24, x4 , x5 // x24 = z1[0] | z1[1]
orr x24, x24, x6 // x24 |= z1[2]
orr x24, x24, x7 // x24 |= z1[3]
cmp x24, #0
csetm x24, ne // x24 = x24!=0 ? -1 : 0, it means ~iszero(z1),
// determine whether point a is (x, y, 0)
ldp x8 , x9 , [x2] // x2 = &(b->x[0]), b->x[0] is marked as x2[0]
ldp x10, x11, [x2, #16] // x2+16 = &(b->x[2])
ldp x14, x15, [x2, 32] // x2+32 = &(b->y[0])
ldp x16, x17, [x2, #32+16] // x2+32+16 = &(b->y[2])
// x25 = x2[0] | x2[1] | x2[2] | x2[3] | y2[0] | y2[1] | y2[2] | y2[3]
orr x25, x8 , x9
orr x25, x25, x10
orr x25, x25, x11
orr x25, x25, x14
orr x25, x25, x15
orr x25, x25, x16
orr x25, x25, x17
cmp x25, #0
csetm x25, ne // x25 = x25!=0 ? -1 : 0, it means ~iszero(x2|y2),
// Check whether point b is (0, 0).
add x0 , sp , #32*3 // zsqr = sp[32*3]
// x4~x7 = z1[0~3] (the value has been assigned.)
bl ECP256_SqrCore // zsqr = z1^2
// x14~x17 also temporarily stored results
// The next calculation requires the zsqr calculation result as the input.
// The calculation result is stored in x4 to x7 in advance to prevent x14 to x17 from being overwritten
// by the next calculation. Therefore, the calculation result needs to be read from the memory.
mov x4 , x14
mov x5 , x15
mov x6 , x16
mov x7 , x17
add x0 , sp , #32*4 // u2 = sp[32*4]
add x2 , x23, #0 // x2 points to b->x.
// x4~x7 * [x2]
bl ECP256_MulCore // u2 = z1^2 * x2
// x14~x17 also temporarily stored results.
ldp x8 , x9 , [x22] // a->x
ldp x10, x11, [x22, #16]
add x0 , sp , #32*5 // h = sp[32*5]
// x14~x17 - x8~x11
bl ECP256_SubCore1 // h = u2 - x1
ldp x4 , x5 , [sp, #32*3] // zsqr = sp[32*3]
ldp x6 , x7 , [sp, #32*3+16]
add x2 , x22, #64 // x2 points to a->z
add x0 , sp , #32*3 // s2 = sp[32*3], zsqr will not be used later.
// You can use this block memory to store and calculate s2.
bl ECP256_MulCore // s2 = zsqr * z1 = z1^3
ldp x4 , x5 , [sp, #32*5] // x4~x7 = h = sp[32*5]
ldp x6 , x7 , [sp, #32*5+16]
add x2 , x22, #64
add x0 , sp , #32*2 // x0 points to res_z.
bl ECP256_MulCore // res_z = h * z1
ldp x4 , x5 , [sp, #32*3] // x4~x7 = s2 = sp[32*3]
ldp x6 , x7 , [sp, #32*3+16]
add x2 , x23, #32 // x2 points to b->y.
add x0 , sp , #32*3 // s2 = sp[32*3]
bl ECP256_MulCore // s2 = s2 * y2 = y2 * z1^3
ldp x8 , x9 , [x22, #32]
ldp x10, x11, [x22, #32+16]
add x0 , sp , #32*6 // R = sp[32*6]
// x14~x17 - x8~x11
bl ECP256_SubCore1 // R = s2 - y1
// Rsqr = R^2 and hsqr = h^2 are independent of each other. The sequence can be adjusted.
// If Rsqr is calculated first, the memory can be read less once. (The pipeline bubble needs to be optimized.)
// In addition, the calculated hsqr can read less memory in hcub = hsqr x h.
mov x4 , x14
mov x5 , x15
mov x6 , x16
mov x7 , x17
add x0 , sp , #32*7 // Rsqr = sp[32*7]
bl ECP256_SqrCore // Rsqr = R^2
ldp x4 , x5 , [sp, #32*5] // h = sp[32*5]
ldp x6 , x7 , [sp, #32*5+16]
add x0 , sp , #32*8 // hsqr = sp[32*8]
bl ECP256_SqrCore // hsqr = h^2
// x14 to x17 stores the hsqr results and does not need to be read from the memory.
// (The pipeline bubble exists and needs to be optimized.)
mov x4 , x14
mov x5 , x15
mov x6 , x16
mov x7 , x17
add x2 , sp , #32*5 // h = sp[32*5]
add x0 , sp , #32*9 // hcub = sp[32*9]
bl ECP256_MulCore // hcub = hsqr * h = h^3
// Because the multiplication involves too many registers, the preceding hsqr cannot be backed up.
// If the registers after x19 are used, the hsqr needs to be pushed and popped at the beginning
// and end of the stack, which outweighs the gain. Therefore, the hsqr can only be read from the memory.
ldp x4 , x5 , [sp, #32*8] // hsqr = sp[32*8]
ldp x6 , x7 , [sp, #32*8+16]
add x2 , x22, #0 // x2 points to a->x
add x0 , sp , #32*4 // u2 = sp[32*4]
bl ECP256_MulCore // u2 = hsqr * x1
mov x8 , x14
mov x9 , x15
mov x10, x16
mov x11, x17
add x0 , sp , #32*8 // hsqr = sp[32*8]
// x14~x17 + x8~x11
bl ECP256_AddCore // hsqr = 2 * u2
// x14~x17 saves hsqr, so ECP256_SubCore2 is called.
ldp x8 , x9 , [sp, #32*7] // Rsqr = sp[32*7]
ldp x10, x11, [sp, #32*7+16]
// x8~x11 - x14~x17
add x0 , sp , #0 // x0 points to res_x
bl ECP256_SubCore2 // res_x = Rsqr - hsqr
// x14~x17 save res_x, so call ECP256_SubCore1
ldp x8 , x9 , [sp, #32*9] // hcub = sp[32*9]
ldp x10, x11, [sp, #32*9+16]
// x14~x17 - x8~x11
bl ECP256_SubCore1 // res_x = res_x - hcub
// x14~x17 save res_x, so call ECP256_SubCore2
ldp x8 , x9 , [sp, #32*4] // u2 = sp[32*4]
ldp x10, x11, [sp, #32*4+16]
add x0 , sp , #32*1
bl ECP256_SubCore2 // res_y = u2 - res_x
ldp x4 , x5 , [sp, #32*9] // hcub = sp[32*9]
ldp x6 , x7 , [sp, #32*9+16]
add x2 , x22, #32 // y1 = a->y
add x0 , sp , #32*3 // s2 = sp[32*3]
bl ECP256_MulCore // s2 = y1 * hcub
add x2 , sp , #32*6 // R = sp[32*6]
add x0 , sp , #32*1 // res_y = sp[32*1]
ldp x4 , x5 , [x0]
ldp x6 , x7 , [x0, #16]
bl ECP256_MulCore // res_y = res_y * R
// x14–x17 stores res_y, and x0 is still res_y. No value needs to be assigned again.
ldp x8 , x9 , [sp, #32*3] // s2 = sp[32*3]
ldp x10, x11, [sp, #32*3+16]
// x14~x17 - x8~x11
bl ECP256_SubCore1 // res_y = res_y - s2
// Four memory blocks are not read. (The pipeline bubble exists and needs to be optimized.)
// x14-x17 stores res_y. Therefore, res_y is judged and assigned a value.
// copy y
ldp x4 , x5 , [x23, #32] // in2_y, b->y
ldp x6 , x7 , [x23, #32+16]
ldp x8 , x9 , [x22, #32] // in1_y, a->y
ldp x10, x11, [x22, #32+16]
// res_y = in1infty == 0 ? res_y : in2_y
cmp x24, #0 // x24 = ~in1infty
csel x14, x14, x4 , ne
csel x15, x15, x5 , ne
csel x16, x16, x6 , ne
csel x17, x17, x7 , ne
// res_y = in2infty == 0 ? res_y : in1_y
cmp x25, #0 // x25 = ~in2infty
csel x14, x14, x8 , ne
csel x15, x15, x9 , ne
csel x16, x16, x10, ne
csel x17, x17, x11, ne
stp x14, x15, [x21, #32]
stp x16, x17, [x21, #32+16]
// copy x
ldp x4 , x5 , [x23] // in2_x, b->x
ldp x6 , x7 , [x23, #16]
ldp x8 , x9 , [x22] // in1_x, a->x
ldp x10, x11, [x22, #16]
ldp x14, x15, [sp] // res_x
ldp x16, x17, [sp , #16]
// res_x = in1infty == 0 ? res_x : in2_x
cmp x24, #0 // x24 = ~in1infty
csel x14, x14, x4 , ne
csel x15, x15, x5 , ne
csel x16, x16, x6 , ne
csel x17, x17, x7 , ne
// res_x = in2infty == 0 ? res_x : in1_x
cmp x25, #0 // x25 = ~in2infty
csel x14, x14, x8 , ne
csel x15, x15, x9 , ne
csel x16, x16, x10, ne
csel x17, x17, x11, ne
stp x14, x15, [x21]
stp x16, x17, [x21, #16]
// copy z
adrp x23, .Lone_mont
add x23, x23, :lo12:.Lone_mont
ldp x4 , x5 , [x23] // one_mont, 1 * RR * R' = R (mod p)
ldp x6 , x7 , [x23, #16]
ldp x8 , x9 , [x22, #64] // in1_z, a->z
ldp x10, x11, [x22, #64+16]
ldp x14, x15, [sp , #64] // res_z
ldp x16, x17, [sp , #64+16]
// res_z = in1infty == 0 ? res_z : ONE
cmp x24, #0 // x24 = ~in1infty
csel x14, x14, x4 , ne
csel x15, x15, x5 , ne
csel x16, x16, x6 , ne
csel x17, x17, x7 , ne
// res_z = in2infty == 0 ? res_z : in1_z
cmp x25, #0 // x25 = ~in2infty
csel x14, x14, x8 , ne
csel x15, x15, x9 , ne
csel x16, x16, x10, ne
csel x17, x17, x11, ne
stp x14, x15, [x21, #64]
stp x16, x17, [x21, #64+16]
add sp , x29, #0
ldp x19, x20, [x29, #16]
ldp x21, x22, [x29, #32]
ldp x23, x24, [x29, #48]
ldp x25, x26, [x29, #64]
ldp x29, x30, [sp], #80
AARCH64_AUTIASP
ret
.size ECP256_AddAffine,.-ECP256_AddAffine
# ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-1998-cmo
# Deal process:
# U1 = X1*Z22
# U2 = X2*Z12
# S1 = Y1*Z23
# S2 = Y2*Z13
# H = U2-U1
# r = S2-S1
# X3 = r2-H3-2*U1*H2
# Y3 = r*(U1*H2-X3)-S1*H3
# Z3 = Z1*Z2*H
.globl ECP256_PointAdd
.type ECP256_PointAdd,%function
.align 5
ECP256_PointAdd:
AARCH64_PACIASP
stp x29, x30, [sp, #-96]!
add x29, sp , #0
stp x19, x20, [sp, #16]
stp x21, x22, [sp, #32]
stp x23, x24, [sp, #48]
stp x25, x26, [sp, #64]
stp x27, x28, [sp, #80]
sub sp , sp , #32*12 // Each coordinate is 256 bits, that is, 32 bytes,
// and a space of 10 coordinates is applied for.
adrp x14, .Lpoly+8 // p[1]
add x14,x14,:lo12:.Lpoly+8
ldr x12,[x14] // p[3]
ldr x13,[x14,#16]
// Pointer to the initial backup input parameter.
// x0 to x2 are used to transfer parameters when the interface is invoked.
mov x21, x0
mov x22, x1
mov x23, x2
ldp x4 , x5 , [x22, #64] // z1
ldp x6 , x7 , [x22, #64+16]
// x24 = z1[0] | z1[1] | z1[2] | z1[3]
orr x24, x4 , x5
orr x24, x24, x6
orr x24, x24, x7 // x24 = ~in1infty
cmp x24, #0
csetm x24, ne // x24 = (x24 != 0) ? -1 : 0, that is ~iszero(z1),
// Determine whether point a is(x, y, 0)
// Because x4 to x7 exactly hold z1, z1^2 can be calculated first.
add x0 , sp , #0 // z1sqr = sp[32*0]
bl ECP256_SqrCore // z1sqr = z1^2
// x14 to x17 exactly save the z1sqr result (the pipeline bubble exists and needs to be optimized).
mov x4 , x14
mov x5 , x15
mov x6 , x16
mov x7 , x17
add x2 , x22, #64 // x2 points to z1, that is a->z
add x0 , sp , #32*1 // s2 = sp[32*1]
bl ECP256_MulCore // s2 = z1^3
// x14 to x17 exactly save the result of s2. (The pipeline bubble exists and needs to be optimized.)
mov x4 , x14
mov x5 , x15
mov x6 , x16
mov x7 , x17
add x2 , x23, #32 // x2 points to y2, that is b->y
// add x0 , sp , #32*1 // s2 = sp[32*1], x0 It is exactly s2 and does not need to be set.
// (There are pipeline bubbles to be optimized.)
bl ECP256_MulCore // s2 = y2 * z1^3
ldp x4 , x5 , [x23, #64] // z2
ldp x6 , x7 , [x23, #64+16]
// x25 = z2[0] | z2[1] | z2[2] | z2[3]
orr x25, x4 , x5
orr x25, x25, x6
orr x25, x25, x7 // x25 = ~in2infty
cmp x25, #0
csetm x25, ne // x25 = (x25 != 0) ? -1 : 0, that is ~iszero(z2),
// Check whether point b is(x, y, 0)
// Because x4~x7 happens to hold z2, z2^2 can be calculated
add x0 , sp , #32*2 // z2sqr = sp[32*2]
bl ECP256_SqrCore // z2sqr = z2^2
// x14 to x17 exactly save the z2sqr result. (There are pipeline bubbles to be optimized.)
mov x4 , x14
mov x5 , x15
mov x6 , x16
mov x7 , x17
add x2 , x23, #64 // x2 points to z2, that is b->z
add x0 , sp , #32*3 // s1 = sp[32*3]
bl ECP256_MulCore // s1 = z2^3
// x14 to x17 exactly save the result of s2. (The pipeline bubble exists and needs to be optimized.)
mov x4 , x14
mov x5 , x15
mov x6 , x16
mov x7 , x17
add x2 , x22, #32 // x2 points to y1, that is a->y
// add x0 , sp , #32*3 // s1 = sp[32*3], x0 is exactly s1 and does not need to be set.
// (There are pipeline bubbles to be optimized.)
bl ECP256_MulCore // s1 = y1 * z2^3
// x14 to x17 save the result of s1. Therefore, the ECP256_SubCore2 interface is selected.
ldp x8 , x9 , [sp, #32*1] // s2 = sp[32*1]
ldp x10, x11, [sp, #32*1+16]
// x8~x11 - x14~x17
add x0 , sp , #32*4 // R = sp[32*4]
bl ECP256_SubCore2 // R = s2 - s1
// x14 to x17 save the result of R, (R==0) <==> (s2 == s1)
orr x26, x14, x15
orr x26, x26, x16
orr x26, x26, x17 // x26 = ~(s1 == s2), The data of R is not read from the memory in advance.
ldp x4 , x5 , [x22] // Take x1, that is a->x
ldp x6 , x7 , [x22, #16]
add x2 , sp , #32*2 // z2sqr = sp[32*2]
add x0 , sp , #32*5 // u1 = sp[32*5]
bl ECP256_MulCore // u1 = x1 * z2sqr
ldp x4 , x5 , [x23] // Take x2, that is b->x
ldp x6 , x7 , [x23, #16]
add x2 , sp , #0 // z1sqr = sp[32*0]
add x0 , sp , #32*6 // u2 = sp[32*6]
bl ECP256_MulCore // u2 = x2 * z1sqr
// x14 to x17 save the result of u2. Therefore, the ECP256_SubCore1 interface is selected.
ldp x8 , x9 , [sp, #32*5] // u1 = sp[32*5]
ldp x10, x11, [sp, #32*5+16]
// x14~x17 - x8~x11
add x0 , sp , #32*7 // h = sp[32*7]
bl ECP256_SubCore1 // h = u2 - u1
// x14 to x17 save the result of h, (h==0) <==> (u2 == u1)
orr x14, x14, x15
orr x14, x14, x16
orr x14, x14, x17 // x14 = ~(u1 == u2), It is used for subsequent judgment.
// The data of h does not need to be read from the memory in advance.
// x24 = ~in2infty
// x25 = ~in1infty
// x26 = ~(s1 == s2) = ~is_equal(S1, S2)
// x14 = ~(u1 == u2) = ~is_equal(U1, U2)
// if(is_equal(U1, U2) & ~in1infty & ~in2infty & is_equal(S1, S2))
// 将(is_equal(U1, U2) & ~in1infty & ~in2infty & is_equal(S1, S2))记为flag
// <==>
// if ((~is_equal(U1, U2) | in1infty | in2infty | ~is_equal(S1, S2)) == 0)
// if (flag == 0)
mvn x27, x24 // x27 = in1infty
mvn x28, x25 // x28 = in2infty
orr x14, x14, x26
orr x14, x14, x27
orr x14, x14, x28
cbnz x14, .Lpoint_add // flag != 0, Continue calculation by C implementation
.Ladd_double:
mov x0 , x21 // x0 = r
mov x1 , x22 // x1 = a
ldp x23, x24, [x29, #48] // The double function uses only x19 to x22, and only x19 to x22
// is popped at the end. Therefore, x23 to x28 is popped in advance.
ldp x25, x26, [x29, #64]
ldp x27, x28, [x29, #80]
add sp , sp , #32*(12-4) // The size of the stack space used varies. The double function
// only releases 32 x 4. Therefore, you need to release part of the stack space in advance.
b .Lpoint_double
.align 4
.Lpoint_add:
ldp x4 , x5 , [sp, #32*4] // R = sp[32*4]
ldp x6 , x7 , [sp, #32*4+16]
add x0 , sp , #0 // Rsqr = sp[0], Because z1sqr will not be used later,
// this memory can be used to save Rsqr.
bl ECP256_SqrCore // Rsqr = R^2
ldp x4 , x5 , [sp, #32*7] // h = sp[32*7]
ldp x6 , x7 , [sp, #32*7+16]
add x2 , x22, #64 // x2 points to z1
add x0 , sp , #32*11 // res_z = sp[32*11]
bl ECP256_MulCore // res_z = h * z1
// The res_z result is stored in x14 to x17. (The pipeline bubble needs to be optimized.)
mov x4 , x14
mov x5 , x15
mov x6 , x16
mov x7 , x17
add x2 , x23, #64 // x2 points to z2
// x0 is still res_z and does not need to be reassigned.
// add x0 , sp , #32*11 // res_z = sp[32*11]
bl ECP256_MulCore // res_z = res_z * z2
ldp x4 , x5 , [sp, #32*7] // h = sp[32*7]
ldp x6 , x7 , [sp, #32*7+16]
add x0 , sp , #32*2 // hsqr = sp[32*2], Because z2sqr will not be used later,
// you can use this memory to save hsqr.
bl ECP256_SqrCore
// The hsqr result is stored in x14 to x17. (The pipeline bubble needs to be optimized.)
mov x4 , x14
mov x5 , x15
mov x6 , x16
mov x7 , x17
add x2 , sp , #32*7 // h = sp[32*7]
add x0 , sp , #32*8 // hcub = sp[32*8]
bl ECP256_MulCore // hcub = hsqr * h
ldp x4 , x5 , [sp, #32*5] // u1 = sp[32*5]
ldp x6 , x7 , [sp, #32*5+16]
add x2 , sp , #32*2 // hsqr = sp[32*2]
add x0 , sp , #32*6 // u2 = sp[32*6]
bl ECP256_MulCore // u2 = u1 * hsqr
// x14~x17 exactly save the result of u2.
mov x8 , x14
mov x9 , x15
mov x10, x16
mov x11, x17
// add x0 , sp , #32*2 // hsqr = sp[32*2]
// The previous operation x2 also saves the address of hsqr.
mov x0 , x2
// x14~x17 + x8~x11
bl ECP256_AddCore // hsqr = 2 * u2
// x14 to x17 save the hsqr result. Therefore, ECP256_SubCore2 is called.
ldp x8 , x9 , [sp] // Rsqr = sp[0]
ldp x10, x11, [sp, #16]
// x8~x11 - x14~x17
add x0 , sp , #32*9 // res_x = sp[32*9]
bl ECP256_SubCore2 // res_x = Rsqr - hsqr
// x14 to x17 exactly save the result of res_x, so ECP256_SubCore1 is called.
ldp x8 , x9 , [sp, #32*8] // hcub = sp[32*8]
ldp x10, x11, [sp, #32*8+16]
// x14~x17 - x8~11
// The previous operation x0 also stores the address of res_x.
bl ECP256_SubCore1 // res_x = res_x - hcub
// x14 to x17 exactly save the result of res_x. Therefore, ECP256_SubCore2 is called.
ldp x8 , x9 , [sp, #32*6] // u2 = sp[0]
ldp x10, x11, [sp, #32*6+16]
// x8~x11 - x14~x17
add x0 , sp , #32*10
bl ECP256_SubCore2 // res_y = u2 - res_x
ldp x4 , x5 , [sp, #32*3] // s1 = sp[32*3]
ldp x6 , x7 , [sp, #32*3+16]
add x2 , sp , #32*8 // hcub = sp[32*8]
add x0 , sp , #32*1 // s2 = sp[32*1]
bl ECP256_MulCore // s2 = s1 * hcub
add x2 , sp , #32*4 // R = sp[32*4]
add x0 , sp , #32*10 // res_y = sp[32*10]
ldp x4 , x5 , [x0] // res_y = sp[32*10], Borrowing x0 address without offset
ldp x6 , x7 , [x0, #16]
bl ECP256_MulCore // res_y = res_y * R
// x14 to x17 exactly save the result of res_y. Therefore, ECP256_SubCore1 is called.
ldp x8 , x9 , [sp, #32] // s2 = sp[32*1]
ldp x10, x11, [sp, #32+16]
// x14~x17 - x8~x11
// The previous operation x0 also stores the address of res_y.
bl ECP256_SubCore1 // res_y = res_y - s2
// Four memory blocks are not read. (The pipeline bubble exists and needs to be optimized.)
// x14-x17 stores res_y. Therefore, res_y is judged and assigned a value.
// copy y
ldp x4 , x5 , [x23, #32] // in2_y, b->y
ldp x6 , x7 , [x23, #32+16]
ldp x8 , x9 , [x22, #32] // in1_y, a->y
ldp x10, x11, [x22, #32+16]
// res_y = in1infty == 0 ? res_y : in2_y
cmp x24, #0 // x24 = ~in1infty
csel x14, x14, x4 , ne
csel x15, x15, x5 , ne
csel x16, x16, x6 , ne
csel x17, x17, x7 , ne
// res_y = in2infty == 0 ? res_y : in1_y
cmp x25, #0 // x25 = ~in2infty
csel x14, x14, x8 , ne
csel x15, x15, x9 , ne
csel x16, x16, x10, ne
csel x17, x17, x11, ne
stp x14, x15, [x21, #32]
stp x16, x17, [x21, #32+16]
// copy x
ldp x4 , x5 , [x23] // in2_x, b->x
ldp x6 , x7 , [x23, #16]
ldp x8 , x9 , [x22] // in1_x, a->x
ldp x10, x11, [x22, #16]
ldp x14, x15, [sp , #32*9] // res_x
ldp x16, x17, [sp , #32*9+16]
// res_x = in1infty == 0 ? res_x : in2_x
cmp x24, #0 // x24 = ~in1infty
csel x14, x14, x4 , ne
csel x15, x15, x5 , ne
csel x16, x16, x6 , ne
csel x17, x17, x7 , ne
// res_x = in2infty == 0 ? res_x : in1_x
cmp x25, #0 // x25 = ~in2infty
csel x14, x14, x8 , ne
csel x15, x15, x9 , ne
csel x16, x16, x10, ne
csel x17, x17, x11, ne
stp x14, x15, [x21]
stp x16, x17, [x21, #16]
// copy z
ldp x4 , x5 , [x23, #64] // in2_z, b->z
ldp x6 , x7 , [x23, #64+16]
ldp x8 , x9 , [x22, #64] // in1_z, a->z
ldp x10, x11, [x22, #64+16]
ldp x14, x15, [sp , #32*11] // res_z
ldp x16, x17, [sp , #32*11+16]
// res_z = in1infty == 0 ? res_z : in2_z
cmp x24, #0 // x24 = ~in1infty
csel x14, x14, x4 , ne
csel x15, x15, x5 , ne
csel x16, x16, x6 , ne
csel x17, x17, x7 , ne
// res_z = in2infty == 0 ? res_z : in1_z
cmp x25, #0 // x25 = ~in2infty
csel x14, x14, x8 , ne
csel x15, x15, x9 , ne
csel x16, x16, x10, ne
csel x17, x17, x11, ne
stp x14, x15, [x21, #64]
stp x16, x17, [x21, #64+16]
add sp , x29, #0 // Free temporary variable
ldp x19, x20, [x29, #16]
ldp x21, x22, [x29, #32]
ldp x23, x24, [x29, #48]
ldp x25, x26, [x29, #64]
ldp x27, x28, [x29, #80]
ldp x29, x30, [sp], #96
AARCH64_AUTIASP
ret
.size ECP256_PointAdd,.-ECP256_PointAdd
# ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#doubling-dbl-2001-b
# Deal process:
# delta = Z12
# gamma = Y12
# beta = X1*gamma
# alpha = 3*(X1-delta)*(X1+delta)
# X3 = alpha2-8*beta
# Z3 = (Y1+Z1)2-gamma-delta
# Y3 = alpha*(4*beta-X3)-8*gamma2
.globl ECP256_PointDouble
.type ECP256_PointDouble,%function
.align 5
ECP256_PointDouble:
AARCH64_PACIASP
stp x29, x30, [sp, #-96]! // Why is 96 space given here? Only x19~x22 is stacked. Theoretically, only [sp, #-48] is required.
add x29, sp , #0 // Whether it is related to the Lpoint_double jump of the ecp_nistz256_point_add interface
stp x19, x20, [sp, #16]
stp x21, x22, [sp, #32]
sub sp , sp , #32*4
.Lpoint_double:
ldp x14, x15, [x1 , #32] // a->y
ldp x16, x17, [x1 , #32+16]
// Back up the initial input parameter pointer r, a.
mov x21, x0
mov x22, x1
adrp x3, .Lpoly+8 // p[1]
add x3,x3,:lo12:.Lpoly+8
ldr x12,[x3] // p[3]
ldr x13,[x3,#16]
mov x8 , x14
mov x9 , x15
ldp x4 , x5 , [x22, #64] // a->z
mov x10, x16
mov x11, x17
ldp x6 , x7 , [x22, #64+16]
add x0 , sp , #0 // s = sp[0]
bl ECP256_AddCore // s = 2 * a->y
add x0 , sp , #32 // zsqr = sp[32*1]
bl ECP256_SqrCore // zsqr = (a->z)^2
// x14 to x17 save the result of s. Calculate s^2 first.
ldp x4 , x5 , [sp]
add x0 , sp , #0 // s = sp[0]
ldp x6 , x7 , [sp, #16]
bl ECP256_SqrCore // s = s^2
ldp x14, x15, [sp, #32] // a->x
ldp x8 , x9 , [x22] // a->x
ldp x16, x17, [sp, #32+16]
add x0 , sp , #64 // m = sp[32*2]
ldp x10, x11, [x22, #16]
bl ECP256_AddCore // m = a->x + zsqr
ldp x14 , x15 , [sp, #32] // a->x
ldp x8 , x9 , [x22] // a->x
ldp x16, x17, [sp, #32+16]
add x0 , sp , #32
ldp x10, x11, [x22, #16]
bl ECP256_SubCore2 // zsqr = a->x - zsqr
ldp x4 , x5 , [x22, #64] // a->z
ldp x6 , x7 , [x22, #64+16]
add x0 , x21, #64 // res_z
add x2 , x22, #32 // a->y
bl ECP256_MulCore // res_z = a->z * a->y
// x14 to x17 save the result of res_z.
mov x8 , x14
mov x9 , x15
ldp x4 , x5 , [sp] // s = sp[0]
mov x10, x16
mov x11, x17
ldp x6 , x7 , [sp, #16]
add x0 , x21, #64 // res_z
bl ECP256_AddCore // res_z = 2 * res_z
add x0 , x21, #32 // x0 points to res_y, that is r->y
bl ECP256_SqrCore // res_y = s^2
add x0 , x21, #32
bl ECP256_DivBy2Core // res_y = res_y / 2
ldp x4 , x5 , [sp, #64] // m = sp[64]
ldp x6 , x7 , [sp, #64+16]
add x2 , sp , #32 // zsqr = sp[32]
add x0 , sp , #64
bl ECP256_MulCore // m = m * zsqr
// x14–x17 saves the result of m. Save an extra copy to x4–x7.
mov x8 , x14
mov x4 , x14
mov x9 , x15
mov x5 , x15
mov x10, x16
mov x6 , x16
mov x11, x17
mov x7 , x17
add x0 , sp , #64
bl ECP256_AddCore // m = 2 * m
mov x8 , x4
mov x9 , x5
mov x10, x6
mov x11, x7
bl ECP256_AddCore // m = 3 * m
ldp x4 , x5 , [sp] // s = sp[0]
add x2 , x22, #0 // a->x
ldp x6 , x7 , [sp, #16]
add x0 , sp , #0 // s = sp[0]
bl ECP256_MulCore // s = s * a->x
// x14~x17 exactly saves the result of s
mov x8 , x14
mov x9 , x15
ldp x4 , x5 , [sp, #64]
mov x10, x16
mov x11, x17
ldp x6 , x7 , [sp, #64+16]
add x0 , sp , #96 // tmp = sp[96]
bl ECP256_AddCore // tmp = 2 * s
// x14~x17 exactly saves the result of m.
add x0 , x21, #0 // res_x = r->x
bl ECP256_SqrCore // res_x = m^2
// x14~x17 exactly saves the result of res_x.
ldp x8 , x9 , [sp, #96] // tmp = sp[96]
ldp x10, x11, [sp, #96+16]
bl ECP256_SubCore1 // res_x = res_x - tmp
// x14~x17 exactly saves the result of res_x, Therefore, ECP256_SubCore2 is invoked.
ldp x8 , x9 , [sp] // s = sp[0]
ldp x10, x11, [sp, #16]
add x0 , sp , #0
bl ECP256_SubCore2 // s = s - res_x
// x14~x17 exactly saves the result of s, x0 still points to s.
mov x4 , x14
mov x5 , x15
mov x6 , x16
mov x7 , x17
add x2 , sp , #64 // m = sp[64]
bl ECP256_MulCore // s = s * m
// x14 to x17 just save the result of s, so call ECP256_SubCore1.
add x0 , x21, #32 // x0 points to res_y
ldp x8 , x9 , [x0] // res_y
ldp x10, x11, [x0, #16]
bl ECP256_SubCore1 // res_y = s - res_y
add sp , x29, #0 // Free temporary variable
ldp x19, x20, [x29, #16]
ldp x21, x22, [x29, #32]
ldp x29, x30, [sp], #96
AARCH64_AUTIASP
ret
.size ECP256_PointDouble,.-ECP256_PointDouble
.globl ECP256_OrdMul
.type ECP256_OrdMul,%function
.align 4
ECP256_OrdMul:
AARCH64_PACIASP
stp x29, x30, [sp, #-64]!
add x29, sp , #0
stp x19, x20, [sp, #16]
stp x21, x22, [sp, #32]
stp x23, x24, [sp, #48]
adrp x23, .Lord
add x23, x23, :lo12:.Lord // x23 = &n
ldp x12, x13, [x23] // n[0~3]
ldp x21, x22, [x23, #16]
ldr x23, [x23, #32] // x23 = LordK
ldp x4 , x5 , [x1] // a[0~3]
ldp x6 , x7 , [x1, #16]
ldr x3 , [x2] // x3 = b[0]
mul x14, x4 , x3 // a[0~3] * b[0]
umulh x8 , x4 , x3
mul x15, x5 , x3
umulh x9 , x5 , x3
mul x16, x6 , x3
umulh x10, x6 , x3
mul x17, x7 , x3
umulh x11, x7 , x3
// a[0-3] * b[0] is stored in x14~x17, x19, x20.
adds x15, x15, x8
adcs x16, x16, x9
adcs x17, x17, x10
adc x19, xzr, x11 // x19 = x11 + CF
mov x20, xzr
// reduce
// n[0] = 0xf3b9cac2fc632551
// n[1] = 0xbce6faada7179e84
// n[2] = 0xffffffffffffffff, lo(q*n[2]) = -q , hi(q*n[2]) = q
// n[3] = 0xffffffff00000000, lo(q*n[3]) = -lq<<32, hi(q*n[3]) = q-hq
mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), Equivalent to q in Montgomery
// modular multiplication
lsl x8 , x24, #32 // lq << 32
lsr x9 , x24, #32 // hq
subs x16, x16, x24 // x16 = x16 + lo(q*n[2]) = x16 - q
sbcs x17, x17, x8 // x17 = x17 + lo(q*n[3]) = x17 - lq<<32
sbcs x19, x19, x9 // x19 = x19 - hq, Should have added q-hq, here first subtract hq, then add q.
sbc x20, x20, xzr // x20 = x20 - CF
umulh x9 , x12, x24 // hi(q*n[0])
mul x10, x13, x24 // lo(q*n[1])
umulh x11, x13, x24 // hi(q*n[1])
// First calculate the value to be added to the same accumulator.
subs xzr, x14, #1 // CF = (x14 < 1)?
adcs x10, x10, x9 // x10 = hi(q*n[0]) + lo(q*n[1])
adc x11, x11, xzr // x11 = hi(q*n[1]) + CF
// S /= r, accumulation of staggered blocks
adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1])
adcs x15, x16, x11 // x15 = x16 + hi(q*n[1])
adcs x16, x17, x24 // x16 = x17 + hi(q*n[2])
adcs x17, x19, x24 // x17 = x19 + q, hq has been subtracted from x19 in front,
// so here x17 = hi(q*n[3])
adc x19, x20, xzr // x19 = x20 + CF
ldr x3 , [x2, #8] // b[1]
mul x8 , x4 , x3
mul x9 , x5 , x3
mul x10, x6 , x3
mul x11, x7 , x3
// add lo(a[0~3] * b[i])
adds x14, x14, x8
adcs x15, x15, x9
adcs x16, x16, x10
adcs x17, x17, x11
adc x19, x19, xzr
umulh x8 , x4 , x3
umulh x9 , x5 , x3
umulh x10, x6 , x3
umulh x11, x7 , x3
// add hi(a[0~3] * b[i])
adds x15, x15, x8
adcs x16, x16, x9
adcs x17, x17, x10
adcs x19, x19, x11
adc x20, xzr, xzr
// reduce
mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q
// in Montgomery modular multiplication
lsl x8 , x24, #32
lsr x9 , x24, #32
subs x16, x16, x24
sbcs x17, x17, x8
sbcs x19, x19, x9
sbc x20, x20, xzr
umulh x9 , x12, x24 // hi(q*n[0])
mul x10, x13, x24 // lo(q*n[1])
umulh x11, x13, x24 // hi(q*n[1])
subs xzr, x14, #1
adcs x10, x10, x9
adc x11, x11, xzr
// S /= r, accumulation of staggered blocks
adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1])
adcs x15, x16, x11 // x15 = x16 + hi(q*n[1])
adcs x16, x17, x24 // x16 = x17 + hi(q*n[2])
adcs x17, x19, x24 // x17 = x19 + q, hq has been subtracted from x19 in front,
// so here x17 = hi(q*n[3])
adc x19, x20, xzr // x19 = x20 + CF
ldr x3 , [x2, #16] // b[2]
mul x8 , x4 , x3
mul x9 , x5 , x3
mul x10, x6 , x3
mul x11, x7 , x3
// adds lo(a[0~3] * b[i])
adds x14, x14, x8
adcs x15, x15, x9
adcs x16, x16, x10
adcs x17, x17, x11
adc x19, x19, xzr
umulh x8 , x4 , x3
umulh x9 , x5 , x3
umulh x10, x6 , x3
umulh x11, x7 , x3
// adds hi(a[0~3] * b[i])
adds x15, x15, x8
adcs x16, x16, x9
adcs x17, x17, x10
adcs x19, x19, x11
adc x20, xzr, xzr
// reduce
mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery
// modular multiplication
lsl x8 , x24, #32
lsr x9 , x24, #32
subs x16, x16, x24
sbcs x17, x17, x8
sbcs x19, x19, x9
sbc x20, x20, xzr
umulh x9 , x12, x24 // hi(q*n[0])
mul x10, x13, x24 // lo(q*n[1])
umulh x11, x13, x24 // hi(q*n[1])
subs xzr, x14, #1
adcs x10, x10, x9
adc x11, x11, xzr
// S /= r, accumulation of staggered blocks
adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1])
adcs x15, x16, x11 // x15 = x16 + hi(q*n[1])
adcs x16, x17, x24 // x16 = x17 + hi(q*n[2])
adcs x17, x19, x24 // x17 = x19 + q, hq has been subtracted from x19 in front,
// so here x17 = hi(q*n[3])
adc x19, x20, xzr // x19 = x20 + CF
ldr x3 , [x2, #24] // b[3]
mul x8 , x4 , x3
mul x9 , x5 , x3
mul x10, x6 , x3
mul x11, x7 , x3
// add lo(a[0~3] * b[i])
adds x14, x14, x8
adcs x15, x15, x9
adcs x16, x16, x10
adcs x17, x17, x11
adc x19, x19, xzr
umulh x8 , x4 , x3
umulh x9 , x5 , x3
umulh x10, x6 , x3
umulh x11, x7 , x3
// add hi(a[0~3] * b[i])
adds x15, x15, x8
adcs x16, x16, x9
adcs x17, x17, x10
adcs x19, x19, x11
adc x20, xzr, xzr
// reduce
mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery
// modular multiplication.
lsl x8 , x24, #32
lsr x9 , x24, #32
subs x16, x16, x24
sbcs x17, x17, x8
sbcs x19, x19, x9
sbc x20, x20, xzr
umulh x9 , x12, x24 // hi(q*n[0])
mul x10, x13, x24 // lo(q*n[1])
umulh x11, x13, x24 // hi(q*n[1])
subs xzr, x14, #1
adcs x10, x10, x9
adc x11, x11, xzr
// S /= r, Accumulation of staggered blocks
adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1])
adcs x15, x16, x11 // x15 = x16 + hi(q*n[1])
adcs x16, x17, x24 // x16 = x17 + hi(q*n[2])
adcs x17, x19, x24 // x17 = x19 + q, hq has been subtracted from x19 in front, so here x17 = hi(q*n[3])
adc x19, x20, xzr // x19 = x20 + CF
// So far, x14 to x17, and x19 retain the calculation results.
// x8~x11 save r -= n
subs x8 , x14, x12
sbcs x9 , x15, x13
sbcs x10, x16, x21
sbcs x11, x17, x22
sbcs xzr, x19, xzr // Finally, the CF bit is set to indicate whether r-n needs to be borrowed.
// r = r-n < 0 ? r : r-n
csel x14, x14, x8 , lo
csel x15, x15, x9 , lo
csel x16, x16, x10, lo
csel x17, x17, x11, lo
stp x14, x15, [x0] // Write the result to r
stp x16, x17, [x0, #16]
ldp x19, x20, [sp, #16]
ldp x21, x22, [sp, #32]
ldp x23, x24, [sp, #48]
ldr x29, [sp], #64
AARCH64_AUTIASP
ret
.size ECP256_OrdMul,.-ECP256_OrdMul
.globl ECP256_OrdSqr
.type ECP256_OrdSqr,%function
.align 4
ECP256_OrdSqr:
AARCH64_PACIASP
stp x29, x30, [sp, #-64]!
add x29, sp , #0
stp x19, x20, [sp, #16]
stp x21, x22, [sp, #32]
stp x23, x24, [sp, #48]
adrp x23, .Lord
add x23, x23, :lo12:.Lord // x23 = &n
ldp x12, x13, [x23] // n[0~3]
ldp x21, x22, [x23, #16]
ldr x23, [x23, #32] // x23 = LordK
ldp x4 , x5 , [x1] // x4~x7 = a[0~3]
ldp x6 , x7 , [x1, #16]
.align 4
.Lord_sqr:
sub x2 , x2 , #1
/******************************************
x7 x1 x20 x19 x17 x16 x15 x14
h0*1 l0*1
h0*2 l0*2
h0*3 l0*3
h1*2 l1*2
h1*3 l1*3
h2*3 l2*3
h3*3 l3*3 h2*2 l2*2 h1*1 l1*1 h0*0 l0*0
*******************************************/
// a[1~3] * a[0]
mul x15, x5 , x4 // lo(a[1] * a[0])
umulh x8 , x5 , x4 // hi(a[1] * a[0])
mul x16, x6 , x4 // lo(a[2] * a[0])
umulh x9 , x6 , x4 // hi(a[2] * a[0])
mul x17, x7 , x4 // lo(a[3] * a[0])
umulh x19, x7 , x4 // hi(a[3] * a[0])
adds x16, x16, x8
adcs x17, x17, x9
adc x19, x19, xzr // No more carry
// a[2~3] * a[1]
mul x8 , x6 , x5 // lo(a[2] * a[1])
umulh x9 , x6 , x5 // hi(a[2] * a[1])
mul x10, x7 , x5 // lo(a[3] * a[1])
umulh x11, x7 , x5 // hi(a[3] * a[1])
// a[3] * a[2]
mul x20, x7 , x6
umulh x1 , x7 , x6
// Add the calculation result of the current round,
// and then add the calculation result with the acc (register in the preceding note).
adds x9 , x10, x9
adc x10, x11, xzr
adds x17, x17, x8
adcs x19, x19, x9
adcs x20, x20, x10
adc x1 , x1 , xzr // a[0-3] has been saved in x4 to x7.
// a[0~3] ^ 2
mul x14, x4 , x4
umulh x4 , x4 , x4
mul x8 , x5 , x5
umulh x5 , x5 , x5
mul x9 , x6 , x6
umulh x6 , x6 , x6
mul x10, x7 , x7
umulh x7 , x7 , x7
// acc[1~6] << 1
adds x15, x15, x15
adcs x16, x16, x16
adcs x17, x17, x17
adcs x19, x19, x19
adcs x20, x20, x20
adcs x1 , x1 , x1
adc x3 , xzr, xzr
// acc[] += a[] ^ 2
adds x15, x15, x4
adcs x16, x16, x8
adcs x17, x17, x5
adcs x19, x19, x9
adcs x20, x20, x6
adcs x1 , x1 , x10
adc x7 , x7 , x3
// Four rounds of reduce
mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery
// modular multiplication
umulh x9 , x12, x24 // hi(q*n[0])
mul x10, x13, x24 // lo(q*n[1])
umulh x11, x13, x24 // hi(q*n[1])
// First calculate the value to be added to the same accumulator.
subs xzr, x14, #1 // CF = (x14 < 1)
adcs x10, x10, x9 // x10 = hi(q*n[0]) + lo(q*n[1])
adc x11, x11, xzr // x11 = hi(q*n[1]) + CF
// S /= r, accumulation of staggered blocks
adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1])
adcs x15, x16, x11 // x15 = x16 + hi(q*n[1])
adcs x16, x17, x24 // x16 = x17 + hi(q*n[2])
adc x17, xzr, x24 // x17 += q, Supposed to be add hi(q*n[3]) = q-hq, hq will be subtracted later.
lsl x8 , x24, #32 // lq << 32
lsr x9 , x24, #32 // hq
subs x15, x15, x24 // x15 = x15 + lo(q*n[2]) = x15 - q
sbcs x16, x16, x8 // x16 = x16 + lo(q*n[3]) = x16 - lq<<32
sbc x17, x17, x9 // x17 = x17 - hq, (remaining part of hi(q*n[3]))
// Round 2 reduce
mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery
// modular multiplication
umulh x9 , x12, x24 // hi(q*n[0])
mul x10, x13, x24 // lo(q*n[1])
umulh x11, x13, x24 // hi(q*n[1])
// First calculate the value to be added to the same accumulator.
subs xzr, x14, #1 // CF = (x14 < 1)
adcs x10, x10, x9 // x10 = hi(q*n[0]) + lo(q*n[1])
adc x11, x11, xzr // x11 = hi(q*n[1]) + CF
// S /= r, accumulation of staggered blocks
adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1])
adcs x15, x16, x11 // x15 = x16 + hi(q*n[1])
adcs x16, x17, x24 // x16 = x17 + hi(q*n[2])
adc x17, xzr, x24 // x17 += q, Supposed to be add hi(q*n[3]) = q-hq, hq will be subtracted later.
lsl x8 , x24, #32 // lq << 32
lsr x9 , x24, #32 // hq
subs x15, x15, x24 // x15 = x15 + lo(q*n[2]) = x15 - q
sbcs x16, x16, x8 // x16 = x16 + lo(q*n[3]) = x16 - lq<<32
sbc x17, x17, x9 // x17 = x17 - hq, (The remainder of the hi(q*n[3]))
// Round 3 reduce
mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery
// modular multiplication
umulh x9 , x12, x24 // hi(q*n[0])
mul x10, x13, x24 // lo(q*n[1])
umulh x11, x13, x24 // hi(q*n[1])
// First calculate the value to be added to the same accumulator.
subs xzr, x14, #1 // CF = (x14 < 1)
adcs x10, x10, x9 // x10 = hi(q*n[0]) + lo(q*n[1])
adc x11, x11, xzr // x11 = hi(q*n[1]) + CF
// S /= r, accumulation of staggered blocks
adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1])
adcs x15, x16, x11 // x15 = x16 + hi(q*n[1])
adcs x16, x17, x24 // x16 = x17 + hi(q*n[2])
adc x17, xzr, x24 // x17 += q, Supposed to be add hi(q*n[3]) = q-hq, hq will be subtracted later.
lsl x8 , x24, #32 // lq << 32
lsr x9 , x24, #32 // hq
subs x15, x15, x24 // x15 = x15 + lo(q*n[2]) = x15 - q
sbcs x16, x16, x8 // x16 = x16 + lo(q*n[3]) = x16 - lq<<32
sbc x17, x17, x9 // x17 = x17 - hq, (Remaining part of hi(q*n[3]))
// Round 4 reduce
mul x24, x14, x23 // x24 = lo(a[0]*b[0]*ordk), equivalent to q in Montgomery
// modular multiplication
umulh x9 , x12, x24 // hi(q*n[0])
mul x10, x13, x24 // lo(q*n[1])
umulh x11, x13, x24 // hi(q*n[1])
// First calculate the value to be added to the same accumulator.
subs xzr, x14, #1 // CF = (x14 < 1)
adcs x10, x10, x9 // x10 = hi(q*n[0]) + lo(q*n[1])
adc x11, x11, xzr // x11 = hi(q*n[1]) + CF
// S /= r, accumulation of staggered blocks
adds x14, x15, x10 // x14 = x15 + hi(q*n[0]) + lo(q*n[1])
adcs x15, x16, x11 // x15 = x16 + hi(q*n[1])
adcs x16, x17, x24 // x16 = x17 + hi(q*n[2])
adc x17, xzr, x24 // x17 += q, Supposed to be add hi(q*n[3]) = q-hq, hq will be subtracted later.
lsl x8 , x24, #32 // lq << 32
lsr x9 , x24, #32 // hq
subs x15, x15, x24 // x15 = x15 + lo(q*n[2]) = x15 - q
sbcs x16, x16, x8 // x16 = x16 + lo(q*n[3]) = x16 - lq<<32
sbc x17, x17, x9 // x17 = x17 - hq, (Remaining part of hi(q*n[3]))
// add acc[4-7], x14~x19 is the current calculation result r
adds x14, x14, x19
adcs x15, x15, x20
adcs x16, x16, x1
adcs x17, x17, x7
adc x19, xzr, xzr
// r -= p
subs x8 , x14, x12
sbcs x9 , x15, x13
sbcs x10, x16, x21
sbcs x11, x17, x22
sbcs xzr, x19, xzr // The set CF is used to determine the relationship between r and p.
// r = r-p < 0 ? r : r-p
// Use x4 to x7 to save the result. You can perform the square operation cyclically.
csel x4 , x14, x8 , lo
csel x5 , x15, x9 , lo
csel x6 , x16, x10, lo
csel x7 , x17, x11, lo
cbnz x2 , .Lord_sqr // Number of square operations, that is a^(2^rep)
stp x4 , x5 , [x0]
stp x6 , x7 , [x0, #16]
ldp x19, x20, [sp, #16]
ldp x21, x22, [sp, #32]
ldp x23, x24, [sp, #48]
ldr x29, [sp], #64
AARCH64_AUTIASP
ret
.size ECP256_OrdSqr,.-ECP256_OrdSqr
.globl ECP256_Scatterw5
.type ECP256_Scatterw5,%function
.align 4
ECP256_Scatterw5:
AARCH64_PACIASP
stp x29, x30, [sp, #-16]!
add x29, sp , #0
add x0 , x0 , x2 , lsl#3 // Needs x0 = x0 + (x2-1)*8 = x0 + x2*8 - 8
// The action of -8 is placed in the str instruction.
ldp x4 , x5 , [x1] // x
ldp x6 , x7 , [x1, #16]
str x4 , [x0, #128*0-8] // 8*16*0
str x5 , [x0, #128*1-8] // 8*16*1
str x6 , [x0, #128*2-8] // 8*16*2
str x7 , [x0, #128*3-8] // 8*16*3
add x0 , x0 , #64*8
ldp x4 , x5 , [x1, #32] // y
ldp x6 , x7 , [x1, #32+16]
str x4 , [x0, #128*0-8] // 8*16*0
str x5 , [x0, #128*1-8] // 8*16*1
str x6 , [x0, #128*2-8] // 8*16*2
str x7 , [x0, #128*3-8] // 8*16*3
add x0 , x0 , #64*8
ldp x4 , x5 , [x1, #64] // z
ldp x6 , x7 , [x1, #64+16]
str x4 , [x0, #128*0-8] // 8*16*0
str x5 , [x0, #128*1-8] // 8*16*1
str x6 , [x0, #128*2-8] // 8*16*2
str x7 , [x0, #128*3-8] // 8*16*3
ldr x29, [sp], #16
AARCH64_AUTIASP
ret
.size ECP256_Scatterw5,.-ECP256_Scatterw5
.globl ECP256_Gatherw5
.type ECP256_Gatherw5,%function
.align 4
ECP256_Gatherw5:
AARCH64_PACIASP
stp x29, x30, [sp, #-16]!
add x29, sp , #0
cmp x2 , xzr
csetm x3 , ne // x3 = (x2 == 0) ? 0 : -1
add x2 , x2 , x3 // x2 += x3, if x2 != 0, then x2 = x2 - 1, if not x2 = 0
add x1 , x1 , x2 , lsl#3 // x1 += x2*8, offset
ldr x4 , [x1, #128*0]
ldr x5 , [x1, #128*1]
ldr x6 , [x1, #128*2]
ldr x7 , [x1, #128*3]
csel x4 , x4 , xzr, ne // If x2 = 0, Then return to 0. Otherwise, returns the read point coordinates
csel x5 , x5 , xzr, ne
csel x6 , x6 , xzr, ne
csel x7 , x7 , xzr, ne
stp x4 , x5 , [x0] // r->x
stp x6 , x7 , [x0, #16]
add x1 , x1 , #64*8
ldr x4 , [x1, #128*0]
ldr x5 , [x1, #128*1]
ldr x6 , [x1, #128*2]
ldr x7 , [x1, #128*3]
csel x4 , x4 , xzr, ne // If x2 = 0, return 0. Otherwise, returns the read point coordinates
csel x5 , x5 , xzr, ne
csel x6 , x6 , xzr, ne
csel x7 , x7 , xzr, ne
stp x4 , x5 , [x0, #32] // r->y
stp x6 , x7 , [x0, #48]
add x1 , x1 , #64*8
ldr x4 , [x1, #128*0]
ldr x5 , [x1, #128*1]
ldr x6 , [x1, #128*2]
ldr x7 , [x1, #128*3]
csel x4 , x4 , xzr, ne // If x2 = 0, return 0. Otherwise, returns the read point coordinates
csel x5 , x5 , xzr, ne
csel x6 , x6 , xzr, ne
csel x7 , x7 , xzr, ne
stp x4 , x5 , [x0, #64] // r->z
stp x6 , x7 , [x0, #80]
ldr x29, [sp], #16
AARCH64_AUTIASP
ret
.size ECP256_Gatherw5,.-ECP256_Gatherw5
.globl ECP256_Scatterw7
.type ECP256_Scatterw7,%function
.align 4
ECP256_Scatterw7:
AARCH64_PACIASP
stp x29, x30, [sp, #-16]!
add x29, sp , #0
// add x0 , x0 , x2
sub x2 , x2 , #63 // x2 = x2 - 63
sub x0 , x0 , x2 // x0 = x0 - (x2(original) - 63) = x0 + (63 - x2(original))
mov x2 , #8 // Loop count
.Lscatter_w7:
ldr x3 , [x1], #8
subs x2 , x2 , #1
strb w3 , [x0, #64*0]
lsr x3 , x3 , #8
strb w3 , [x0, #64*1]
lsr x3 , x3 , #8
strb w3 , [x0, #64*2]
lsr x3 , x3 , #8
strb w3 , [x0, #64*3]
lsr x3 , x3 , #8
strb w3 , [x0, #64*4]
lsr x3 , x3 , #8
strb w3 , [x0, #64*5]
lsr x3 , x3 , #8
strb w3 , [x0, #64*6]
lsr x3 , x3 , #8
strb w3 , [x0, #64*7]
add x0 , x0 , #64*8
b.ne .Lscatter_w7
ldr x29, [sp], #16
AARCH64_AUTIASP
ret
.size ECP256_Scatterw7,.-ECP256_Scatterw7
// The anti-cache attack solution can be used together with ECP256_Scatterw7.
.globl ECP256_Gatherw7
.type ECP256_Gatherw7,%function
.align 4
ECP256_Gatherw7:
AARCH64_PACIASP
stp x29, x30, [sp, #-16]!
add x29, sp , #0
cmp x2 , xzr
csetm x3 , ne // x3 = (x2 == 0) ? 0 : -1
add x2 , x2 , x3 // x2 = (x2 == 0) ? 0 : (x2 - 1) (offset)
sub x2 , x2 , #63 // x2 = x2 - 63
sub x1 , x1 , x2 // x0 = x0 - (x2(original) - 63) = x0 + (63 - x2(original))
mov x2 , #8 // Indicates the number of cycles. The x and y coordinates contain 64 bytes in total,
// and 8 bytes are obtained at a time. Therefore, eight cycles are required.
nop
.Lgather_w7:
ldrb w4 , [x1, #64*0]
ldrb w5 , [x1, #64*1]
ldrb w6 , [x1, #64*2]
ldrb w7 , [x1, #64*3]
ldrb w8 , [x1, #64*4]
ldrb w9 , [x1, #64*5]
ldrb w10, [x1, #64*6]
ldrb w11, [x1, #64*7]
// x4 = x4 | x5 << 8
// x6 = x6 | x7 << 8
// x4 = x4 | x6 << 16
// x4 = [x7][x6][x5][x4]
orr x4 , x4 , x5 , lsl#8
orr x6 , x6 , x7 , lsl#8
orr x4 , x4 , x6 , lsl#16
// x8 = x8 | x9 << 8
// x10 = x10 | x11 << 8
// x8 = x8 | x10 << 16
// x8 = [x11][x10][x9][x8]
orr x8 , x8 , x9 , lsl#8
orr x10, x10, x11, lsl#8
orr x8 , x8 , x10, lsl#16
// x4 = x4 | x8 << 32
// x4 = [x11][x10][x9][x8]
orr x4 , x4 , x8 , lsl#32
and x4 , x4 , x3
str x4 , [x0], #8
add x1 , x1 , #64*8
subs x2 , x2, #1
b.ne .Lgather_w7
ldr x29,[sp],#16
AARCH64_AUTIASP
ret
.size ECP256_Gatherw7,.-ECP256_Gatherw7
#endif
|
2301_79861745/bench_create
|
crypto/ecc/src/asm/ecp256_armv8.S
|
Unix Assembly
|
unknown
| 71,139
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ECC
/*
* Base point pre-computation table, which contains 37 subtables of point multiplication results of each window.
* The size of each subtable is 64 x 64 bytes.
* Coordinates (x, y) of points in the subtable. Each column contains 32 bytes and is arranged in little-endian mode
* from top to bottom.
* The columns from right to left are the point multiplication results of window values starting from 1 and increasing.
*/
.section .rodata
.type g_preCompTable,%object
.balign 4096
g_preCompTable:
.byte 0x80,0xe5,0x91,0xcc,0x19,0x8e,0xf0,0x28,0x14,0x83,0x53,0x8d,0x04,0xc9,0x1a,0xd3,0x12,0x97,0xd9,0xbf,0x7c,0x06,0x01,0x91,0x3e,0x42,0xee,0xb5,0xb7,0xf5,0xd3,0x34,0xd8,0x89,0x43,0x32,0x1f,0xb4,0x08,0x9f,0x19,0x68,0x76,0x08,0x31,0xe8,0x7a,0x9d,0x80,0x5b,0x4a,0x09,0x68,0x04,0xc8,0xe8,0x8f,0x4f,0x4a,0xf5,0xcc,0x27,0x4d,0x3c
.byte 0x8b,0x1f,0x2f,0x04,0x6e,0xaa,0x82,0xca,0x7a,0x56,0xcf,0x4d,0x59,0x64,0x17,0xac,0xc6,0x60,0x90,0x79,0x89,0x7d,0xad,0x2e,0x9f,0xc1,0xc0,0x08,0x9b,0x7e,0x3c,0x45,0xa3,0xff,0xb3,0xe1,0xcd,0xfe,0x80,0x87,0x28,0x50,0x30,0xb2,0x7a,0x9a,0xa9,0x5c,0xfb,0x05,0x66,0xd7,0x77,0xe4,0x1e,0x20,0xa7,0x3b,0x66,0x61,0x8d,0xc1,0xd6,0x14
.byte 0x96,0xf9,0x96,0x4c,0x8a,0x46,0xea,0xca,0x8d,0x30,0x12,0x6c,0x44,0x3f,0x8c,0xf6,0xad,0xa7,0xee,0xcd,0x5a,0x8a,0x2b,0xd2,0x2e,0x59,0x63,0xce,0x21,0xc6,0xa2,0x66,0xe3,0x55,0x98,0x66,0x2c,0xe2,0x1f,0x37,0xd0,0xe4,0x6f,0x35,0x33,0x65,0xad,0x3c,0xc6,0x60,0xcf,0x2e,0x69,0x45,0xc2,0x4e,0x99,0x17,0x77,0x5c,0x91,0xeb,0xdd,0xa9
.byte 0x05,0x9f,0xa1,0x7f,0xed,0x5c,0xa7,0x7a,0x7e,0xe7,0xb2,0x54,0x83,0x3b,0x48,0x1f,0x77,0xca,0x49,0xd5,0xd5,0x24,0xed,0x2e,0xb8,0xa0,0x4d,0x8c,0xa8,0xde,0x7c,0x0f,0xc5,0x67,0x32,0xcb,0x17,0x97,0xed,0xd8,0x15,0x2d,0x2f,0xc1,0xd2,0xa5,0x56,0xd5,0x0b,0xbc,0xb0,0x4b,0xd2,0x62,0x9d,0x26,0x94,0xa0,0x3e,0xc4,0x46,0x4e,0x10,0x18
.byte 0xf3,0x31,0x75,0x1a,0x28,0xd6,0xe8,0xe7,0x40,0xf9,0x8e,0x38,0x6e,0x1c,0xd0,0x42,0x30,0x13,0xb1,0xcc,0x1f,0xfd,0xcf,0x49,0x1d,0x88,0xca,0xc5,0xd6,0x7f,0x14,0x56,0xcf,0x69,0xb1,0x6a,0xb7,0xf4,0x32,0xac,0xb2,0x53,0x35,0xec,0x29,0xba,0xc8,0xcb,0x65,0xb7,0x5b,0x63,0xa7,0x0a,0xd1,0x8f,0xd1,0x4e,0x37,0xae,0x0d,0x90,0xd4,0xd4
.byte 0x96,0xd9,0xf1,0xeb,0x68,0x4e,0x00,0x32,0x41,0xbb,0x5b,0x96,0xf3,0xec,0xc2,0x0b,0x41,0x75,0xb5,0x26,0x7c,0x3f,0x5c,0x60,0x68,0x94,0xc3,0x7b,0x58,0x84,0x20,0x14,0xfc,0x3c,0x1c,0xb4,0x3e,0x2a,0xad,0x19,0x83,0x76,0x11,0x4c,0x91,0x12,0x51,0x1d,0x0b,0xd8,0xa3,0x25,0x1a,0x26,0xdb,0x6e,0x4c,0x35,0x47,0x8a,0xb5,0x3f,0x46,0x30
.byte 0x6d,0xd3,0x35,0x67,0x1e,0xd4,0x6c,0xc8,0xc4,0x8b,0x42,0x35,0x92,0x8c,0xb9,0x95,0x34,0x3c,0x75,0xe4,0xfd,0xf2,0xb3,0x4d,0xd7,0xd8,0x2c,0x46,0x5e,0x16,0xab,0x15,0xc5,0xf7,0x24,0x5d,0x52,0x2c,0xe4,0xa3,0x38,0xf8,0xc6,0x2e,0x97,0xa9,0x3e,0x09,0x8b,0xbc,0x42,0xc4,0xb7,0x7d,0x18,0xc9,0xf1,0x46,0x39,0x1b,0xb0,0xac,0x00,0xe7
.byte 0xdb,0xb8,0xe5,0x36,0xdc,0x69,0xf2,0x3e,0x8f,0x25,0xa0,0x97,0x26,0x50,0x0f,0x21,0x6b,0x28,0x40,0x1e,0xec,0x4f,0x5f,0x62,0xe4,0xa9,0x8a,0x00,0x3d,0xfd,0xb6,0x87,0xd8,0xe2,0xb4,0x5e,0x4b,0x04,0x61,0xa4,0x6d,0xf4,0x0f,0x56,0x8a,0xfe,0x5f,0x97,0x80,0x72,0xa2,0xcc,0x04,0xea,0x2c,0x75,0x27,0x07,0x40,0xbe,0x74,0xff,0x85,0x79
.byte 0xb9,0xed,0xa7,0x84,0xc7,0xd1,0xaf,0x29,0x6a,0xe6,0x5f,0x79,0xc0,0x3f,0x78,0x09,0xa0,0x06,0xba,0x18,0xfb,0xfa,0xc7,0x22,0x3c,0x46,0xce,0x55,0x7f,0xb7,0x9d,0x03,0xbf,0xe6,0xa1,0x80,0x92,0x13,0x38,0xb0,0x35,0x6e,0x9a,0x7d,0xdc,0x6e,0x3e,0x7b,0x6b,0x4b,0xe3,0x0d,0x33,0xe0,0x39,0x41,0x55,0xf7,0x3e,0x7d,0x73,0xfb,0x7d,0x01
.byte 0x73,0x8e,0xf5,0x4f,0xd9,0x63,0x9a,0x5b,0xf3,0x5b,0x7c,0x46,0xf9,0xdf,0x52,0x69,0x03,0x39,0x9e,0x6e,0x10,0x73,0xa5,0x28,0xe1,0x93,0x48,0x8d,0xc5,0x76,0x84,0xf1,0xdf,0x17,0x65,0x58,0xa8,0x73,0x75,0x67,0x9a,0x1f,0x2a,0xf4,0x2b,0xa1,0x40,0x17,0x2e,0x7e,0x07,0xd3,0x5a,0xdf,0x81,0xa8,0x34,0x00,0xee,0x53,0xc1,0x81,0x82,0xb6
.byte 0x9f,0x51,0x58,0x40,0x89,0xd0,0x29,0x38,0x56,0xef,0x55,0xf2,0x45,0x5e,0x68,0xdc,0xd8,0xc8,0x6e,0x6c,0x91,0x88,0xa6,0x07,0x25,0x0b,0xe9,0x17,0x06,0x3e,0x91,0x68,0x79,0x30,0x4f,0x92,0xa6,0xbf,0xb1,0x6b,0xdd,0x2e,0x91,0x83,0x86,0xe1,0x8b,0x0a,0xfe,0xe2,0x97,0x6f,0x34,0x7f,0xcf,0xa7,0x9b,0x3c,0x6c,0xb9,0x23,0x7d,0x33,0xed
.byte 0x08,0xf0,0xed,0xa9,0x41,0xa8,0xe4,0xc7,0x95,0x07,0xf8,0x92,0xaf,0x1e,0x13,0x53,0xbb,0x36,0xa0,0x94,0xb2,0x87,0x1d,0x6f,0xdf,0xff,0x0f,0x7f,0x1b,0x23,0xa3,0x4b,0x40,0x47,0xb4,0x0d,0x30,0xae,0xd8,0xed,0x40,0x9e,0xe3,0x47,0x0f,0x25,0x8f,0xac,0x3f,0x56,0x7f,0x85,0xca,0x6e,0x0f,0x59,0x6f,0xd2,0x34,0x94,0xc6,0x08,0xa4,0x5f
.byte 0x13,0x00,0x61,0x21,0x36,0xd3,0x0d,0x57,0xca,0xbf,0x2e,0xc4,0x69,0xba,0xaa,0x84,0x29,0xa9,0x9a,0x0b,0xab,0xb4,0xe3,0xb5,0x0b,0x14,0x17,0x8c,0xbd,0x64,0xc6,0x7c,0x4c,0xe7,0x49,0x3a,0x28,0xd7,0x7a,0x9e,0x50,0xe8,0x23,0x65,0x8f,0xba,0x4d,0xb6,0x75,0xee,0xf7,0x69,0xf5,0x95,0x8a,0xed,0xc5,0x13,0x4f,0x9a,0xed,0x4a,0xc1,0xfc
.byte 0x09,0x48,0xe0,0x66,0x23,0xd5,0xc8,0xea,0xf3,0xa5,0x51,0x3f,0xc4,0xc0,0xfb,0x04,0x65,0x4f,0x33,0x94,0x94,0xbf,0xcb,0xe0,0x0f,0xe7,0x31,0x45,0xd0,0xe4,0xa5,0xae,0x90,0xf7,0x4e,0x96,0xcb,0x42,0x26,0xb4,0x75,0xa7,0xfa,0xb2,0x86,0x3a,0x96,0x24,0xe0,0x23,0x48,0x67,0xde,0x07,0x86,0xbf,0xb5,0x02,0x74,0x64,0xa6,0xf8,0xe3,0x95
.byte 0x0a,0x9c,0xd7,0x55,0xfc,0x00,0xca,0xfe,0x1f,0xee,0x2e,0x9c,0x0e,0x0b,0x8b,0xe7,0x49,0x62,0x5c,0x32,0x91,0xc5,0x55,0xdf,0x20,0x5a,0x23,0x36,0x91,0x2e,0xa7,0xce,0xfd,0x3c,0xa1,0xbe,0x23,0x6a,0xc9,0xc1,0x0d,0xc7,0x9f,0xe1,0x16,0x36,0xfc,0x76,0x82,0xcc,0x6e,0x35,0xde,0xe4,0xf9,0xe6,0x2a,0xd2,0xae,0xec,0x50,0x27,0x6a,0xba
.byte 0x38,0x03,0x6e,0x59,0x33,0x21,0x99,0x1b,0xbb,0x31,0x4f,0x5f,0x2e,0xe2,0xa7,0xff,0xa7,0x0a,0x78,0x00,0x00,0x80,0xa1,0x6f,0x83,0x6f,0x51,0xb6,0xc6,0x74,0xca,0x85,0xbe,0xdd,0xa3,0xf1,0x73,0xd3,0xe6,0x6f,0x6d,0x37,0xc9,0x74,0x59,0x68,0x4a,0xf1,0x58,0x03,0x12,0x0e,0xab,0x9d,0x98,0xab,0x46,0x2b,0x55,0x90,0x46,0xb0,0xaa,0x75
.byte 0x01,0x26,0x33,0x0a,0xbc,0x36,0xe1,0x38,0x44,0xc1,0x6c,0xd9,0xb7,0xd4,0x6a,0x27,0xbd,0xc7,0xe0,0x58,0xb0,0x81,0x8f,0x71,0x80,0x64,0x3b,0x06,0x6e,0xc8,0x94,0xb9,0x97,0x0d,0xcd,0xe2,0xeb,0xd7,0xfb,0xaf,0x9f,0x69,0x3d,0x30,0xba,0xac,0x79,0xff,0x49,0x70,0x60,0x11,0x5e,0xb5,0x49,0x00,0x6b,0x08,0xad,0x0c,0xf2,0x98,0xd9,0x10
.byte 0x1e,0xcb,0xa2,0xb5,0x39,0x7c,0x8b,0xaf,0x00,0x14,0xd5,0xac,0x28,0x18,0xfa,0x61,0x05,0xf2,0x25,0x7f,0xd3,0x59,0x2f,0x22,0x72,0x36,0xf3,0xd8,0x57,0xb4,0x8d,0x8a,0x01,0x60,0x7a,0xb9,0x53,0xfd,0xf6,0xf3,0x46,0x40,0xba,0x3b,0x83,0x41,0x29,0x2d,0xf5,0x93,0x26,0x98,0x38,0x1a,0x0b,0xeb,0xfc,0xbb,0xa3,0xc2,0x0a,0xbc,0x90,0x25
.byte 0xc6,0x82,0x89,0xce,0x1c,0xd1,0xd7,0x1e,0x60,0xc8,0xc4,0xc8,0x75,0x43,0xb1,0x76,0x88,0x5a,0xf8,0x47,0x81,0x74,0xa9,0xce,0xf2,0xfb,0x2e,0x77,0x57,0xc2,0x67,0x57,0xad,0xf7,0xc7,0x17,0xe1,0x4f,0x7f,0xf1,0x2b,0x58,0xf8,0x3f,0xd2,0x2c,0x2e,0xfe,0x83,0x81,0x83,0x9e,0x37,0xac,0x25,0xc8,0x2c,0x23,0x17,0x76,0x10,0xcb,0x14,0x62
.byte 0xc2,0x91,0x20,0x7e,0x67,0xa2,0x7e,0xfd,0x14,0x46,0x25,0xa8,0xc6,0x2f,0xd5,0x28,0x6d,0x71,0xab,0x57,0xe3,0x05,0x30,0x39,0x66,0x16,0x22,0xa6,0xd2,0xef,0x75,0x65,0xfe,0x3c,0x3a,0x03,0xcf,0x08,0x85,0x32,0x1d,0xa3,0xd2,0x5a,0x5d,0x75,0x41,0x2c,0x2c,0xe4,0xc6,0x55,0xee,0x8d,0x48,0x44,0xf0,0x0c,0x5b,0xd0,0xe8,0x87,0x8d,0x77
.byte 0x83,0x32,0xc0,0x53,0xe2,0xea,0xb6,0xe3,0x85,0x4a,0xf9,0xed,0x01,0x85,0x68,0xb2,0xa7,0xec,0x5b,0xe0,0x46,0x90,0x4c,0x15,0x4c,0x7d,0x85,0xae,0x10,0x34,0xa3,0xae,0x58,0x9d,0xcd,0x27,0xc0,0xeb,0xeb,0x33,0xf9,0xa2,0x85,0x6c,0xd9,0x77,0xab,0x75,0x7c,0x24,0x54,0x3f,0x9d,0x15,0xd6,0x04,0x2a,0xb5,0x1a,0xaa,0xac,0xdd,0x03,0x2b
.byte 0x0b,0x76,0xa4,0xf6,0x8f,0x27,0xe3,0x12,0x43,0x0e,0x6f,0x8b,0x32,0xeb,0xe2,0xd0,0xaa,0xaf,0x0d,0x8a,0x20,0xad,0x59,0x11,0x98,0x23,0xfd,0x8b,0xcb,0x41,0x73,0xc4,0x6a,0x68,0xd6,0x70,0x2e,0xc9,0xc5,0x99,0xcb,0x5f,0x06,0x50,0x99,0x22,0x47,0x39,0x2f,0x74,0xbf,0xd4,0xd2,0xa4,0x2c,0x9c,0xf0,0xaa,0x96,0xb5,0xac,0x77,0x05,0x73
.byte 0xa7,0xc3,0x7a,0xcd,0x6f,0x97,0x6f,0x82,0x84,0xeb,0x28,0x2e,0x5a,0x1d,0xfb,0x4c,0x1b,0x20,0x03,0x1e,0x0e,0xd9,0xe2,0xca,0x09,0x8f,0x63,0x74,0xe4,0x8e,0x06,0x09,0x6d,0xf5,0xf4,0x4a,0x08,0xd2,0xc7,0x95,0xd7,0x82,0x0b,0x2a,0x80,0x84,0xf2,0xf1,0xef,0x33,0x17,0xbc,0x09,0xf3,0x7d,0xc0,0x90,0x3e,0x0a,0x1c,0xda,0xad,0x22,0xfb
.byte 0x7d,0x95,0x17,0x71,0x02,0xcb,0xd6,0x06,0x6a,0x0d,0xc1,0x91,0x90,0xda,0xed,0xff,0x1a,0x6b,0xa1,0x1b,0x5f,0xb7,0xc2,0xee,0x89,0x06,0x74,0xc5,0x0a,0x0b,0x5b,0xac,0xbc,0x8e,0xc5,0x94,0x97,0x49,0x1a,0xe3,0x61,0xd0,0x6a,0x6d,0x04,0xb8,0xa6,0xb0,0xd5,0xee,0x17,0xbc,0x24,0x1f,0x73,0x2c,0x8f,0xf4,0xd5,0x94,0x0c,0x66,0x73,0x79
.byte 0xc7,0x8d,0x13,0xfa,0x15,0xb7,0xcd,0xcc,0x63,0xdd,0x51,0xb0,0x42,0x43,0xa7,0x2b,0xad,0xfd,0xdc,0x78,0x91,0x94,0x43,0x4f,0x27,0xac,0x6c,0xeb,0xc3,0x21,0x64,0x0c,0xa4,0xb4,0x3c,0x48,0x97,0x6a,0x10,0x2e,0x15,0x42,0xa4,0xfc,0x4e,0xfc,0xda,0x4e,0x23,0x09,0x2e,0x59,0x56,0x73,0x8f,0x6b,0x0d,0x03,0x73,0xc8,0x6b,0x7e,0x3b,0xc6
.byte 0x38,0x56,0xb4,0x35,0x99,0x53,0x02,0x8c,0xae,0x30,0xc8,0x34,0xe5,0xa4,0xab,0xdb,0x43,0x8b,0x31,0x32,0xd2,0x19,0xfe,0x61,0x32,0x86,0x3d,0x94,0x3d,0xe5,0x3e,0xb1,0x32,0x87,0xfc,0x3d,0xdb,0xc7,0xfb,0x2a,0x31,0xbf,0x58,0x62,0xfb,0xc3,0xeb,0x57,0xb7,0xda,0xc7,0xb7,0xe1,0x90,0x42,0xe1,0x23,0x3e,0x36,0x23,0x17,0x74,0x3a,0x55
.byte 0x9b,0xfc,0x39,0x83,0x6f,0xdd,0x8d,0xcf,0x51,0xb7,0x26,0x66,0xe5,0x3f,0x7e,0xb7,0x03,0xa7,0x29,0x82,0x8d,0xb0,0xfa,0x01,0xf7,0x31,0x60,0xa3,0x4a,0xa3,0x30,0x44,0x55,0xfc,0xb6,0x60,0xaa,0xf7,0xf2,0x43,0xfc,0x27,0x33,0x67,0x5b,0x97,0x80,0x7a,0x03,0xd3,0x12,0x95,0x83,0x9c,0xb3,0xc4,0x65,0x12,0x21,0x05,0xb0,0xff,0xcf,0x37
.byte 0x56,0x82,0xe5,0x9b,0xbc,0x8a,0x64,0x6a,0x74,0xa7,0xee,0x30,0xd0,0x5c,0x2b,0x4f,0x47,0xeb,0xa4,0x6d,0xa9,0x3d,0x5b,0xdb,0x75,0x36,0x7c,0xdf,0xd5,0x42,0xdd,0xf0,0x69,0xb1,0x52,0x48,0xf2,0x2e,0x55,0x65,0x2e,0x17,0xe9,0xc1,0xfe,0x28,0x6f,0x6c,0x91,0x0a,0xfd,0x53,0xcb,0x64,0x24,0xf0,0xb2,0xc3,0x54,0x89,0x41,0xb6,0x3d,0xa5
.byte 0x94,0x34,0x3a,0xa6,0xcd,0x1b,0x5f,0x30,0x4a,0x49,0xea,0x8d,0x34,0x0d,0xdb,0x08,0x02,0x74,0xc3,0x34,0xf6,0xdb,0xce,0x4f,0x00,0xc4,0xdc,0x87,0x6c,0x86,0xd4,0x68,0x77,0xf8,0xb5,0x59,0x6a,0x4b,0xa8,0xeb,0x2f,0x7c,0xe8,0xf4,0xb6,0x28,0x1b,0x0a,0x80,0x43,0x32,0xac,0x77,0xf1,0x47,0x80,0x1e,0x19,0x59,0x05,0xf5,0x3f,0xe4,0x76
.byte 0x83,0xa4,0xb0,0x44,0x4c,0xab,0x72,0x98,0x0c,0x84,0x0f,0x31,0x7f,0xbe,0xb8,0xe6,0x39,0x99,0x84,0x7d,0x25,0x85,0x89,0x0a,0x7b,0xe4,0xc7,0xa3,0x65,0x0b,0xdd,0x68,0x70,0xc4,0x8c,0xf9,0x6b,0xa5,0xaa,0x42,0x23,0xea,0x77,0xd9,0xee,0x5c,0xbd,0x5c,0x3c,0x0e,0x73,0x77,0xdf,0x90,0xc9,0x30,0x89,0x51,0x4b,0x96,0x62,0x6a,0x32,0x5f
.byte 0xfb,0x63,0xbc,0x4a,0x0c,0x2b,0x5f,0x32,0x3f,0xee,0x8a,0x3a,0xf7,0x0e,0xce,0xdb,0x40,0x96,0xc6,0x4f,0x34,0x9c,0x9c,0x10,0x2d,0x53,0xf0,0x63,0x69,0x64,0x82,0xec,0x22,0x8d,0x28,0x66,0x7f,0x8a,0x4b,0x67,0x7b,0x2c,0xc7,0xea,0xd1,0x54,0x5a,0xa3,0xd6,0xaa,0xae,0x84,0xe1,0x70,0x61,0x5b,0x63,0xba,0x07,0x07,0x73,0x93,0xbb,0x90
.byte 0x95,0x07,0x0d,0x99,0xd4,0x4c,0x30,0xc1,0xba,0x5c,0xbb,0xec,0x88,0xd2,0x0d,0xab,0xc8,0x4b,0xce,0xe9,0x5f,0x17,0x64,0x98,0x46,0x58,0xad,0x27,0x35,0xca,0xc9,0x33,0x39,0x94,0xd0,0xe2,0xe9,0x9f,0x99,0x96,0xf9,0xaf,0xfd,0xec,0xe2,0xfe,0x67,0xc1,0x54,0xe2,0xfa,0x73,0x4e,0x3e,0xcc,0xe0,0xb7,0x13,0x13,0xc9,0x57,0x26,0xf6,0x18
.byte 0x2f,0xba,0x8e,0x69,0xca,0x04,0x1b,0x59,0x2a,0xde,0x7e,0x64,0x7c,0xa3,0x10,0xe8,0xf1,0x0e,0x63,0x1a,0xda,0x6c,0x7a,0x8f,0x98,0x98,0xe5,0xb6,0x3a,0xa9,0x71,0xf1,0xf5,0x99,0xbc,0x99,0xa1,0x70,0x18,0x28,0xc7,0xa9,0x04,0xb9,0x5d,0x6b,0x1d,0x87,0x9b,0x5d,0x6b,0x7f,0x43,0x88,0x76,0x14,0x77,0x4d,0x4b,0x10,0xa6,0xeb,0xa5,0x0a
.byte 0xfe,0x76,0xe3,0x9b,0x75,0x67,0xb2,0x9e,0xf3,0x2b,0x10,0xb2,0x68,0x1e,0xb7,0x09,0xdf,0xd6,0x6e,0xa2,0x50,0x96,0x25,0x62,0x17,0x2f,0x65,0xeb,0xa0,0x6a,0xf9,0xc1,0x42,0x32,0x0a,0x88,0x3d,0x5e,0x80,0x62,0xcb,0x85,0x5f,0xe5,0x00,0x69,0x5a,0x99,0x3f,0xc4,0x58,0xe1,0x5b,0x4e,0x9e,0x33,0x49,0x9d,0xe4,0x4f,0xab,0xa7,0xe1,0x56
.byte 0xed,0x3e,0x32,0xeb,0x0e,0x42,0x3f,0xac,0x9a,0x18,0xd6,0x1c,0x64,0x24,0xe2,0x11,0x5a,0x21,0x58,0x2b,0x0d,0xa6,0xff,0x5c,0x65,0xc5,0x77,0x3c,0xcd,0xeb,0xb6,0x8e,0xef,0xa5,0x04,0x20,0xa8,0x89,0x24,0x96,0x4b,0x47,0x41,0x86,0x84,0x4c,0x48,0xe7,0xa2,0x83,0x5d,0x0e,0xbb,0x94,0xdd,0x5f,0x2d,0x5b,0x77,0xba,0xcb,0x83,0xbe,0x95
.byte 0x80,0x38,0xbb,0xdb,0xf8,0x15,0x62,0x2a,0x1f,0xa0,0xe7,0xc3,0x58,0x73,0x9a,0x5e,0x17,0xd9,0xc1,0x78,0x73,0x61,0xe9,0xa3,0xf2,0x63,0xfe,0x7d,0x94,0x8c,0x5d,0x3a,0xdb,0x4e,0x1c,0x5c,0xd1,0x09,0x1d,0xb4,0xb2,0x9e,0x35,0xe2,0x78,0xdc,0x5e,0x93,0x52,0x63,0x99,0xc0,0x1c,0x2b,0x80,0xa4,0x53,0x3f,0xd3,0xe7,0xe4,0xc9,0x61,0xce
.byte 0x12,0xd5,0x4e,0x19,0xbb,0x0c,0xc4,0xdb,0x5b,0xc5,0xd2,0x41,0x29,0xa7,0x89,0x28,0x66,0xcc,0xc9,0x96,0x87,0x62,0x7d,0xa2,0x88,0x23,0x3b,0x8a,0xbd,0x90,0x0b,0x2b,0x6d,0x81,0x2f,0x73,0x3e,0xba,0xe1,0xfe,0x50,0xfb,0xbb,0xb2,0x41,0xe7,0x72,0x46,0xd6,0x4f,0xb7,0x90,0xd9,0x61,0x78,0x7a,0xa9,0x30,0x20,0x4a,0x4c,0x1f,0xd3,0x57
.byte 0x65,0x04,0x42,0xf8,0x35,0xe9,0x1b,0xf2,0xc2,0x95,0x70,0x7f,0x8d,0x4e,0x80,0x92,0x9f,0x55,0x62,0xcb,0x66,0xb0,0x66,0xda,0xa1,0x7d,0x2d,0x44,0xae,0x01,0x00,0x83,0x3e,0xfe,0x8c,0x66,0x39,0xb7,0x14,0xc9,0xd7,0xa4,0x87,0xd4,0x1c,0xe9,0xbd,0x31,0x1b,0x52,0x2d,0x2b,0x12,0x85,0x40,0x77,0xa3,0xd0,0x62,0x9b,0xf2,0x5c,0x48,0x53
.byte 0x3c,0x7c,0xdc,0xfa,0xa1,0x84,0xed,0x09,0xca,0xb4,0x8f,0x16,0x7a,0x0b,0x9e,0x7c,0xf5,0x07,0xab,0x47,0xa0,0x41,0x58,0xb0,0x0b,0xd8,0xc3,0x2b,0xeb,0x3a,0x7b,0xc4,0xe2,0xe9,0xcc,0xdb,0x3d,0x00,0xcf,0x8d,0x51,0x60,0xa7,0x9d,0xef,0x36,0xa2,0x7d,0xf1,0xb8,0xb5,0x75,0xac,0x76,0x2b,0xb7,0x9d,0x47,0xd3,0x30,0x96,0x4c,0x36,0xf2
.byte 0x9a,0x70,0xe3,0xd7,0xaf,0xa0,0x33,0xb9,0xdf,0xea,0xc2,0x80,0xf6,0x37,0xbf,0x83,0x39,0x22,0x42,0xc7,0xbf,0xba,0xd1,0xb6,0xd9,0xe2,0x0e,0xa1,0xe5,0x65,0xfd,0x6a,0x09,0xd9,0xd5,0x98,0x1d,0x92,0x84,0x4b,0xa5,0x03,0x94,0xf2,0x82,0x2d,0x66,0x22,0xf2,0x40,0x27,0x35,0x0c,0x1a,0x0c,0x1e,0xf5,0x28,0x93,0xeb,0x2d,0xb0,0x2f,0xdd
.byte 0x82,0x97,0x1e,0x0d,0x2c,0xea,0xad,0x2a,0x4b,0xb4,0xaa,0xf2,0x62,0x65,0x96,0x5a,0xb7,0x13,0x2b,0xa5,0x7f,0xa8,0xae,0x47,0x34,0x76,0x09,0x50,0x13,0xd5,0x92,0xef,0x08,0x28,0x4a,0xa3,0x68,0x58,0x08,0x50,0x56,0x4a,0xa4,0x61,0xae,0xc5,0x3c,0x0e,0x87,0x25,0xc2,0xe3,0x37,0xc8,0x08,0xe3,0x15,0xdd,0xb5,0x2b,0x47,0x1a,0xf8,0x5c
.byte 0xaf,0x81,0x70,0x35,0xff,0xeb,0x19,0x78,0x21,0xa6,0x65,0x13,0x35,0x5f,0x9c,0x5b,0xc5,0xca,0x3f,0x33,0x3b,0xe5,0x50,0x9a,0x1c,0x88,0x04,0xd8,0xfe,0x52,0x6f,0xd5,0x99,0x60,0x9b,0x18,0x2a,0xfb,0xc5,0x39,0xe3,0x9f,0xfe,0x3c,0xcb,0x77,0x0b,0xb8,0x65,0x1b,0x37,0xd2,0x56,0x61,0xbe,0x45,0xba,0x7b,0x14,0x88,0xf4,0xfe,0x6f,0xe4
.byte 0xae,0x4e,0x06,0xd4,0xad,0x37,0x63,0x61,0xf2,0x27,0x62,0x21,0xdf,0x1a,0x44,0x64,0xd8,0xae,0xb4,0x2b,0x08,0xdc,0x2c,0x7e,0xab,0x82,0x38,0x20,0x2b,0x78,0x87,0x47,0x0a,0xeb,0xbf,0xfb,0x4b,0xb7,0x8a,0xf4,0xa1,0x29,0x23,0xbb,0xff,0xa9,0x4f,0x9c,0x0b,0xa4,0x22,0x2e,0x89,0x7f,0x3f,0x5d,0x9e,0xa6,0xff,0xeb,0xd6,0x61,0x23,0x19
.byte 0x8f,0x82,0x68,0xee,0x22,0xa8,0x7a,0xb6,0xb1,0x9e,0xe7,0x52,0x22,0x5e,0xa4,0xf4,0xb7,0x7b,0x5a,0xf7,0x4b,0xea,0xf3,0xc8,0x36,0x81,0xbf,0x6f,0x16,0x54,0x6f,0x58,0x48,0x98,0x06,0xa2,0x80,0xdd,0x62,0x43,0x88,0x27,0x4d,0x83,0xff,0xfb,0x8f,0xe8,0x4b,0x42,0x83,0x74,0xca,0xe5,0x38,0xce,0xcf,0x5d,0xad,0xe5,0xfa,0x08,0xeb,0xba
.byte 0xb9,0x30,0xef,0x80,0xa0,0xd3,0x3e,0x0d,0x86,0x87,0x44,0x6f,0xae,0x1c,0xe6,0x27,0xfb,0x10,0x66,0x69,0x6c,0x52,0x11,0x2e,0x8c,0x66,0x59,0x3e,0xd3,0x0c,0x1f,0x28,0x64,0xa2,0x1e,0x47,0xc7,0x6f,0x8b,0x12,0x49,0x9c,0x6a,0xc0,0x17,0x4a,0xaf,0x30,0x19,0x54,0x9e,0x90,0xf6,0x9e,0x91,0xed,0x7d,0xf2,0x53,0xef,0x71,0xad,0xcb,0xe4
.byte 0x6b,0xb9,0xe5,0x56,0x51,0xfc,0x53,0x06,0xdb,0x9f,0xc4,0x2f,0x2e,0x51,0x7a,0x7d,0xd7,0x4e,0x1d,0x44,0x44,0xd0,0x96,0x4d,0xe1,0xa7,0xb3,0xda,0x82,0x30,0xcb,0xd1,0x9b,0x1c,0x51,0x24,0xf9,0xc6,0x89,0x63,0x49,0xa4,0x2d,0xad,0xec,0x24,0x5c,0xbf,0xc3,0x35,0x56,0x83,0xd2,0x93,0x89,0x7b,0x32,0xf2,0x2b,0x68,0x84,0x47,0xd7,0xb8
.byte 0x72,0x98,0x72,0x3c,0xc6,0x8a,0x70,0x48,0xe0,0x75,0xe0,0xb8,0xb9,0xf1,0xde,0x14,0x26,0x94,0x43,0x25,0x23,0x82,0x35,0xf9,0xc6,0xc4,0xaa,0xad,0x4e,0x3c,0xa2,0x09,0x44,0x92,0x75,0x47,0xa7,0xd0,0x39,0xcc,0xea,0xfd,0x0c,0x0f,0xd4,0x06,0x2a,0x75,0x70,0x66,0x29,0x74,0x0e,0x0f,0x3a,0xaf,0xe3,0x42,0x9c,0xc5,0x62,0x3e,0x2c,0x4a
.byte 0x8f,0xac,0x64,0x47,0x12,0x77,0xfa,0x57,0x01,0xee,0x7e,0x3d,0x23,0x61,0xef,0x26,0x0b,0x9b,0x45,0xc5,0x04,0x4d,0x9b,0xb6,0x74,0x2e,0xcc,0xe7,0x93,0x31,0xbb,0x55,0x7e,0x2d,0xb6,0x90,0xa6,0x3b,0x5a,0x96,0x11,0xe5,0x64,0x1b,0xa2,0x58,0x4b,0x05,0x36,0xd7,0xbe,0x68,0x17,0x25,0xc4,0x56,0x21,0x67,0x29,0x73,0x17,0x58,0x15,0x8b
.byte 0xf8,0xe0,0xee,0xa2,0x96,0xf8,0x3e,0x01,0xac,0xca,0xb1,0x97,0x9e,0x62,0x46,0xd8,0xe3,0xd4,0x5d,0x81,0x17,0x18,0xcf,0xce,0x59,0x1c,0x9c,0x2c,0xc6,0xf7,0x26,0x74,0x40,0xfc,0x41,0x9f,0x1e,0xbb,0xf5,0xee,0x01,0x71,0xb5,0xa4,0x66,0xc1,0xba,0xbb,0x9e,0x97,0xdb,0xc1,0x66,0x3d,0xd2,0x1a,0xf0,0x95,0x11,0x68,0x2e,0x8e,0xbe,0x25
.byte 0x4b,0x0d,0xe9,0xbb,0xad,0x77,0xfb,0x7a,0x96,0x18,0x36,0xe1,0xc3,0x1c,0x3a,0x8e,0x75,0x93,0x83,0x0c,0x34,0xa3,0x14,0xd9,0x43,0x7b,0x31,0x46,0xa0,0x7a,0x94,0x15,0x2e,0x03,0xa4,0x61,0xb7,0x4c,0x44,0x31,0x75,0x2f,0x35,0x29,0x5e,0x08,0x7b,0x83,0x0e,0x47,0xe7,0x5b,0x6d,0x64,0xe5,0x2f,0xbb,0x41,0x9f,0x1f,0xd2,0xe9,0x2d,0xf3
.byte 0x42,0x23,0x4b,0x44,0x51,0xe4,0x5f,0x9b,0xb5,0xe5,0x19,0xaf,0xbe,0x68,0x14,0x81,0x9d,0xed,0xf7,0xf8,0x9d,0xe6,0x60,0x57,0xf5,0x4e,0x59,0x58,0x51,0x23,0x56,0x3f,0x9a,0x98,0x3a,0x7c,0x0c,0xeb,0xa9,0xb7,0xcb,0xac,0x3a,0xac,0xa9,0x95,0x84,0x18,0x58,0x8a,0x65,0x1f,0xde,0xad,0x9b,0xb1,0x60,0xc9,0x63,0x7a,0xdd,0x2e,0x04,0x21
.byte 0x78,0x91,0x81,0xda,0x4f,0x7c,0xbe,0xc7,0xa4,0x80,0x1d,0xdc,0x9b,0x82,0xcc,0xf7,0x52,0x5d,0x55,0xc7,0xd6,0xa5,0x90,0x1d,0x5e,0xe1,0x8e,0x15,0xe2,0x6b,0x3c,0x76,0xad,0x0c,0x9b,0x77,0x2d,0x78,0x5f,0xc9,0x93,0x71,0x15,0x7f,0x8a,0xe3,0x1b,0x0d,0xb1,0x77,0x2a,0xbd,0x8a,0x1e,0x77,0x88,0xbe,0x77,0xef,0x7e,0xe5,0x1a,0x92,0xdd
.byte 0xa0,0x8f,0x98,0x66,0xbd,0x01,0x2d,0x32,0xc2,0x68,0xa4,0xd2,0x4b,0x3d,0x6b,0x92,0xce,0x51,0xc0,0xde,0x7d,0x3b,0x0b,0x59,0xa3,0xfa,0xd6,0xe5,0xba,0x12,0xa3,0x4f,0x1a,0xfd,0x37,0x39,0x48,0x08,0x7b,0x59,0x31,0x13,0xda,0x3e,0x3f,0x9b,0x7f,0x7f,0x3b,0xde,0x3e,0x22,0xfa,0x89,0x65,0x9a,0x84,0xdc,0x4c,0x87,0xde,0x31,0x0e,0x88
.byte 0xa4,0x7c,0xff,0x84,0x04,0xf7,0x56,0x26,0x5b,0x6a,0x77,0xbc,0x01,0xe2,0x71,0xf5,0xf5,0x9d,0xb2,0xf6,0x24,0xcd,0xb2,0x32,0x6e,0x64,0x84,0xbc,0xc0,0xab,0x32,0x60,0x9c,0xed,0xda,0x69,0x8b,0xd1,0xe9,0x88,0xf0,0x8e,0x17,0x02,0xc5,0x5e,0x92,0x24,0x62,0xa6,0x19,0x64,0x8c,0xaa,0x2d,0x01,0x7b,0x3b,0xd4,0xa9,0x36,0x08,0xfb,0x86
.byte 0x10,0xbf,0x47,0x65,0x0a,0x51,0xab,0xab,0x9a,0xcf,0xf2,0x55,0x27,0xa5,0xb7,0x78,0x75,0x81,0xc8,0x2e,0x7a,0x91,0x00,0x77,0x25,0xb8,0xaa,0x3e,0x0a,0xe4,0x73,0x09,0x96,0xec,0x67,0x96,0x68,0x97,0xfd,0x06,0x69,0x06,0xe9,0x75,0x61,0x66,0x26,0x4e,0xc4,0xef,0xe4,0xd0,0x22,0x0d,0x7d,0x6e,0x3c,0x93,0x24,0x40,0x6c,0x82,0xa8,0xe8
.byte 0x80,0x92,0xdd,0xb6,0xc4,0x66,0x17,0xc5,0x4e,0xc2,0x3d,0xb1,0x5c,0x99,0x43,0x4d,0xa8,0x04,0x57,0x77,0x39,0x9e,0x4b,0xc6,0xab,0x47,0xbd,0xf6,0x45,0x24,0xc7,0xf9,0x7b,0xfa,0xd6,0x8a,0x4a,0x2d,0x14,0x12,0x76,0x48,0x9d,0x7a,0x91,0x85,0x26,0x2f,0x55,0x64,0xe8,0x7c,0x28,0x0c,0x5f,0x2b,0x12,0xef,0xf4,0x35,0x6b,0x78,0x19,0xd2
.byte 0x70,0x70,0x09,0xf3,0x32,0x8b,0x41,0x26,0x08,0xf4,0xeb,0x83,0x8d,0x2d,0x13,0x36,0xc2,0x27,0x65,0xb5,0x2a,0xa0,0x3d,0x7b,0x2f,0x08,0x4d,0xa8,0x26,0xf8,0xf8,0xc4,0xa4,0x45,0x72,0x1b,0x78,0x31,0xc7,0x68,0x8a,0x6f,0x74,0xa3,0xd0,0x7b,0x4d,0xd0,0x20,0xf4,0xbb,0x97,0xca,0x8e,0xb5,0x9b,0x76,0x67,0x5f,0x16,0x63,0x07,0x3b,0x85
.byte 0x49,0x9b,0xe0,0xdb,0xe8,0x7a,0x47,0x76,0x2c,0xf3,0x95,0x52,0x0f,0x4c,0x8c,0xfa,0x5c,0xfd,0xf8,0xe6,0xa4,0xdd,0x7d,0x4a,0x70,0x24,0xc3,0x88,0xa5,0x7a,0x74,0x63,0xc2,0x47,0x1f,0xe2,0x52,0xde,0x5a,0x99,0x7b,0x66,0xd0,0x7f,0xe0,0x59,0x39,0xc3,0xe2,0xad,0x1b,0xb7,0x8a,0xb8,0x4a,0x5f,0xdf,0x08,0xf7,0xe9,0xb8,0xcc,0x8a,0x5d
.byte 0x84,0x95,0xac,0x2b,0xe4,0xfb,0x67,0x01,0x6c,0x4c,0x95,0x46,0x0f,0xf5,0x62,0x47,0x32,0xdd,0xb7,0xd9,0x7b,0xb2,0xbc,0x88,0xaa,0x19,0x80,0x00,0x6d,0xb4,0x0d,0x2f,0x91,0x7b,0x60,0x3b,0x58,0x4b,0x2e,0xf7,0x73,0x77,0x5c,0x47,0xfe,0x12,0x02,0x74,0xef,0x79,0xaa,0xe7,0x23,0x25,0x3b,0x83,0x06,0x24,0x07,0xd1,0x5a,0x87,0x5b,0x88
.byte 0x0e,0x40,0x35,0x87,0xbb,0x46,0x56,0x00,0x02,0xf1,0xea,0x43,0x9c,0xa2,0xc3,0xf2,0x41,0x6d,0xc1,0x2c,0x38,0x95,0x89,0x03,0xd1,0x69,0x9c,0x62,0xdd,0x8b,0x57,0xc3,0x95,0x4d,0x51,0x2a,0x40,0xd8,0xd1,0x56,0xca,0x90,0x5d,0xc9,0xc5,0x6d,0x05,0x32,0x01,0x70,0x2e,0xc9,0x53,0xe1,0xeb,0xfd,0x77,0x6e,0x4a,0x2d,0x4c,0xe5,0x0a,0x25
.byte 0x44,0x01,0xff,0x80,0x09,0x98,0x94,0xc6,0x81,0x3f,0x3f,0x59,0x26,0x83,0x94,0x7e,0xe9,0x6e,0x38,0xfe,0x90,0x4f,0xe3,0xec,0x12,0xe5,0x80,0x43,0x11,0x62,0x0c,0x03,0x92,0x91,0xce,0x2a,0x5f,0x68,0x30,0xc3,0x5e,0x7b,0x07,0xf1,0xe1,0x25,0xd9,0x26,0xb2,0x0a,0xdc,0x69,0x95,0x23,0x54,0xcd,0xf2,0x15,0x6d,0xbb,0x39,0x29,0x51,0x18
.byte 0x20,0x6a,0xcf,0xc7,0x01,0x49,0x49,0xc6,0x76,0x01,0x6e,0xda,0xf2,0xe3,0x41,0x07,0xc7,0xf8,0xa3,0xcb,0x9f,0x5f,0xcf,0xfe,0x66,0xc0,0xc2,0x61,0x9e,0x01,0x10,0x43,0xd7,0xe8,0x45,0x14,0xcc,0x10,0x80,0x8d,0xc5,0x68,0x8d,0xd5,0x04,0xee,0xc7,0x12,0xf7,0x17,0x06,0x87,0x7c,0x00,0x9a,0x59,0x12,0xd9,0x91,0x76,0x4c,0x6a,0x77,0xff
.byte 0x67,0x87,0x60,0x1b,0x82,0x62,0x37,0x44,0x92,0xe8,0x55,0xa1,0xf2,0x31,0xd3,0x94,0xef,0xbf,0x3d,0x3a,0x62,0x79,0xa8,0x0b,0x46,0x0b,0xa4,0xb3,0x0b,0xa9,0x59,0x6c,0x31,0x8a,0x0d,0x98,0xb4,0x43,0x17,0x94,0x5d,0xd0,0x3e,0x86,0xe1,0x20,0x6f,0xd5,0xed,0x42,0x27,0xc0,0xf5,0x93,0x71,0x66,0xec,0xed,0xc9,0xa0,0xb1,0xf0,0xc5,0x71
.byte 0x29,0x90,0x6b,0x0d,0x04,0xa0,0x06,0xda,0x83,0x25,0x1a,0xfb,0x7e,0xd7,0xd7,0xd3,0x85,0x9b,0x03,0xd7,0xeb,0x47,0xf3,0xf7,0x03,0x0c,0xd9,0x58,0x48,0x2b,0xa1,0xb1,0x62,0xf3,0x46,0x37,0xa9,0x2d,0xed,0x7b,0x59,0x83,0x79,0xc0,0x5e,0xf7,0x6c,0xeb,0x64,0x20,0x15,0xfb,0x7f,0x68,0x78,0x08,0x56,0xea,0xa4,0x73,0x84,0xd5,0x78,0x85
.byte 0xd5,0x40,0xba,0x98,0xc0,0x69,0x7b,0xf9,0x7d,0x36,0xc1,0x9d,0xcf,0xaa,0xdd,0x22,0x50,0x59,0xd1,0x60,0x61,0xa7,0x76,0xba,0xc9,0x25,0x11,0xae,0x88,0x65,0x17,0x20,0xa2,0xc7,0x70,0x17,0xd7,0x31,0x1a,0x80,0xd3,0x00,0x94,0x62,0x83,0x2a,0x59,0x0c,0xb8,0x0a,0x08,0xe3,0xf1,0xdf,0x90,0x2c,0xdd,0x4f,0x17,0xe9,0x96,0xcd,0xfc,0x2a
.byte 0x21,0x3a,0xdb,0x12,0x4f,0x8e,0x1f,0xc3,0x0d,0x3d,0x76,0x1c,0xc5,0xd7,0x4b,0x57,0xea,0xe7,0x3e,0x06,0xa6,0xdb,0xbc,0x0e,0xed,0x52,0x35,0x90,0x64,0xb0,0x96,0xa8,0x35,0xc5,0x87,0x09,0xf2,0x6e,0x93,0x9a,0xd7,0x51,0x21,0xac,0xc0,0x84,0x33,0x54,0x26,0x04,0x61,0x8e,0xaf,0x84,0x9a,0x04,0x3a,0x3f,0x37,0x7d,0x92,0x93,0x46,0xd6
.byte 0xd7,0x54,0xee,0xbf,0xeb,0x5b,0xc7,0xea,0xef,0xef,0x5b,0x0c,0xa3,0x74,0x77,0x6c,0xc5,0x13,0xb0,0x81,0x04,0x53,0x61,0xe2,0xdf,0xbc,0x80,0x00,0xd9,0xe4,0xcd,0x8e,0x4b,0x72,0xc1,0xcc,0xef,0xf0,0x26,0xc6,0xe5,0x8c,0x84,0x3b,0x39,0xeb,0x92,0x63,0x79,0x74,0xa8,0x78,0xd7,0x89,0x36,0xa8,0xcc,0x91,0x4c,0xda,0x94,0xc2,0x69,0x2a
.byte 0xd5,0x16,0x39,0x97,0xac,0xea,0x31,0x00,0x3c,0x12,0xeb,0x76,0xd8,0xd1,0x83,0x77,0xc5,0xb9,0x94,0x31,0x6c,0xad,0xdf,0x9f,0x83,0xc1,0x19,0x09,0xe9,0xf8,0xbc,0x6a,0xab,0xa6,0xdc,0x09,0xd4,0x8b,0x17,0x0a,0x91,0xe9,0x39,0x80,0x63,0x46,0xd5,0x60,0xeb,0x5f,0x74,0xf1,0x8b,0x16,0x08,0x82,0x44,0x08,0xed,0xc2,0x39,0x6e,0x69,0x7a
.byte 0x62,0xc7,0x4d,0x06,0xee,0x1f,0x9c,0xc9,0x3b,0xca,0xcc,0x8b,0x57,0xb2,0x0f,0xc5,0xa1,0x14,0x69,0x81,0x4d,0x1b,0xd3,0xc2,0xf9,0x08,0xc7,0xec,0x4f,0x4b,0x33,0x2c,0xe5,0xf2,0x2e,0xac,0x9b,0xde,0xe2,0x27,0xe8,0x5c,0x09,0xf5,0x13,0xb0,0xe5,0xec,0xb9,0xc3,0xd4,0x04,0xf3,0x4b,0x5c,0x88,0xe1,0x20,0x3e,0x5b,0x10,0x6d,0xfa,0x81
.byte 0x98,0x09,0x63,0x5e,0xf1,0x25,0x6a,0xcc,0x53,0x79,0xdd,0x22,0xe3,0x47,0xe8,0x8e,0xbf,0xd0,0xbd,0xec,0x32,0x34,0x36,0x96,0x2c,0x04,0xbd,0x41,0x04,0xae,0xcd,0xdf,0xb0,0x72,0x75,0x64,0xd6,0xf1,0x4e,0x2e,0x7f,0x5a,0x61,0x08,0xd6,0x30,0xf1,0x67,0x24,0xd4,0x58,0x9e,0x6b,0x33,0x38,0x36,0x81,0x68,0xa5,0xfb,0x81,0x49,0x8f,0xcb
.byte 0x00,0x21,0xd3,0xcc,0x81,0x72,0x2f,0x07,0x52,0x1e,0x38,0xd9,0x26,0x7b,0xfe,0xdb,0xcf,0xfc,0x35,0x38,0x70,0x3f,0x07,0x7a,0xae,0xed,0x33,0x2e,0x2d,0xb3,0x03,0xd1,0x72,0x70,0x5c,0x50,0x32,0xcc,0xd0,0x22,0x02,0xa6,0x10,0x91,0x1b,0x39,0xcb,0x5c,0x2b,0x2d,0x4a,0x66,0x15,0xef,0xb2,0x21,0x70,0x52,0xd6,0x30,0xe3,0x0a,0x6d,0xc5
.byte 0x80,0xe2,0x21,0xef,0x5d,0xf7,0x20,0xa4,0xe6,0x42,0x9c,0x37,0x57,0x4b,0x5d,0xc7,0x84,0xa6,0x84,0x14,0xa3,0x8a,0xe4,0x40,0x29,0xa4,0xc0,0x30,0x46,0xec,0xc5,0x17,0x67,0xb8,0x3a,0x06,0x7b,0xdf,0x41,0xf4,0x32,0xb4,0xc5,0x43,0xb3,0xe3,0xe8,0x73,0x3d,0xac,0x0c,0x07,0xb3,0x8c,0x33,0xe5,0x4f,0xf2,0x35,0xb8,0x44,0x38,0x48,0x63
.byte 0x82,0x6c,0x6d,0x9e,0x42,0xbc,0x5c,0x48,0x81,0xde,0xb4,0xda,0x13,0x04,0x85,0x0c,0x81,0x93,0x46,0x43,0x17,0x5a,0xdb,0xd3,0x1a,0x6d,0xbe,0x30,0xc1,0x2b,0xa3,0x54,0xcf,0xe2,0xa5,0xfd,0x0f,0x01,0xfd,0xf6,0x78,0x5a,0x95,0x5f,0x01,0x6d,0xb0,0x8f,0x09,0x57,0x90,0xa2,0x46,0x38,0xf8,0x98,0xcf,0x95,0xa3,0xbe,0xb5,0xf5,0x6d,0x54
.byte 0xa1,0x3c,0xa4,0x63,0x0f,0x5f,0xfe,0x47,0x43,0xa5,0x0a,0x18,0x2b,0x5d,0x44,0x29,0x06,0xde,0xc5,0x40,0x6d,0x62,0x8c,0x5a,0x63,0x22,0xc3,0x68,0xa0,0x02,0x30,0xc2,0xaa,0xc5,0xc3,0x40,0xb6,0x39,0xec,0x54,0x76,0x0f,0x52,0xd4,0x47,0xe5,0x9f,0xcb,0x55,0xc9,0x5d,0x38,0xb1,0x96,0xb4,0x82,0x82,0x3d,0xd2,0xd3,0xb1,0x51,0xa5,0xff
.byte 0xd3,0xde,0x55,0x9d,0x6f,0xb7,0x6f,0xed,0xbb,0x7e,0xfc,0x5c,0xbb,0xa1,0x73,0x5f,0x96,0xf4,0x4c,0x4b,0x37,0x7b,0x77,0x2a,0x87,0x19,0x88,0xb0,0x82,0x53,0x77,0x2c,0xee,0x53,0x25,0x85,0x88,0x38,0x60,0x1e,0xa0,0xdd,0xd0,0x9b,0xb6,0xda,0x9b,0xf9,0xbe,0xea,0x4c,0x69,0x81,0x87,0x0e,0x27,0xbe,0xc9,0x0e,0xf8,0x1d,0x70,0xcb,0x62
.byte 0x5b,0xfe,0x04,0x21,0x5e,0xc5,0x29,0xe2,0x2b,0x3e,0x26,0x9b,0x2a,0xf3,0x85,0x2b,0x67,0x8f,0x63,0xde,0x5e,0x83,0x3f,0xe5,0x8d,0x27,0x88,0xed,0x81,0x2e,0xba,0xf2,0xf5,0x0d,0x88,0xc6,0x42,0xdd,0x36,0xf5,0x73,0x2d,0x49,0x37,0xdf,0x7b,0x53,0xe5,0xcd,0xfc,0xee,0xa8,0x1d,0x33,0x19,0xcd,0x87,0xea,0x3d,0x0f,0x36,0x8e,0xb9,0xac
.byte 0xa3,0x36,0x68,0x30,0x02,0xbd,0xa3,0x80,0x18,0x6c,0x85,0x11,0xc3,0xe8,0x02,0x62,0x4c,0x86,0xe3,0x07,0xb6,0xcc,0xc0,0xbb,0x34,0xdb,0x3b,0xcc,0x2e,0xc4,0xe4,0x3b,0x01,0xc8,0x2f,0x29,0x71,0x44,0xc8,0x25,0x17,0x1d,0x3e,0x1d,0x55,0x9a,0x9d,0xc2,0xb3,0x71,0x8f,0xaf,0xcb,0x17,0x9b,0xaf,0xd6,0x61,0xcf,0xdf,0x7b,0xa7,0xd8,0xb9
.byte 0x57,0xfd,0x2e,0x67,0x60,0xb3,0x5a,0x62,0x7b,0xc3,0x52,0xbb,0xec,0xd8,0x16,0x7e,0xf1,0x47,0x1d,0x65,0xd3,0x69,0x19,0x68,0x71,0x46,0x7b,0xa0,0xd5,0x34,0xed,0x0d,0x60,0x11,0x1f,0x37,0x67,0x8f,0xb2,0x6d,0x7d,0x87,0x35,0xd9,0x81,0x4a,0xea,0x59,0x8c,0xeb,0x8a,0x27,0xe4,0xce,0xc5,0xcf,0xa1,0xed,0x40,0x43,0x82,0xbd,0xc6,0xb6
.byte 0x33,0xca,0xcd,0xdb,0x25,0xec,0xf9,0x5f,0x4f,0xe3,0x6f,0xef,0x97,0x72,0x13,0x46,0xba,0xda,0xad,0xfa,0x10,0xc2,0xa6,0x71,0x43,0xb9,0xf9,0x78,0x53,0xa8,0x5d,0xb5,0x8b,0xcb,0xaf,0xc5,0xae,0xdf,0xbb,0x09,0x4b,0xec,0xe2,0x7d,0xff,0x84,0x0c,0xb2,0xf8,0x9a,0x04,0x4f,0x5e,0x1d,0x90,0x31,0xff,0x20,0x82,0xe6,0x63,0x3d,0xfb,0xf2
.byte 0x0c,0x9a,0x35,0xcb,0x36,0xae,0x01,0x83,0xd9,0x9e,0x74,0xc7,0x11,0x40,0x63,0xdc,0xd3,0x53,0xd9,0x9d,0x97,0x8e,0x13,0xf2,0xf8,0xd0,0xa9,0x22,0x4b,0x07,0x36,0xb2,0x1d,0xea,0x4b,0x27,0x88,0x1f,0x0b,0x34,0xf1,0x6c,0xb7,0x0b,0x39,0x8e,0xdb,0x50,0xbf,0x40,0xf8,0xc1,0x1b,0xe8,0x29,0xd9,0xd5,0xea,0x9f,0xd0,0x5b,0x73,0x50,0x7e
.byte 0xa4,0x14,0x0c,0x6f,0xc8,0xe5,0xa3,0x0d,0x00,0xf7,0x9f,0xc5,0xdd,0xed,0xa9,0xa9,0x42,0xe1,0xca,0x73,0x57,0x89,0x8f,0x89,0xd2,0x43,0x5e,0x90,0xe9,0x96,0x86,0x26,0x80,0x32,0xed,0x71,0x23,0xd2,0x18,0x91,0x61,0x8b,0xe0,0x81,0xab,0xfc,0x98,0xab,0x0b,0x23,0x80,0xc0,0x15,0xf0,0x80,0x40,0x72,0x6c,0xa5,0x41,0xf5,0x0a,0x15,0xb5
.byte 0xcd,0xe6,0xeb,0x8c,0x70,0xf0,0xc3,0x8e,0xf5,0x36,0x26,0xdb,0x88,0x07,0x69,0x25,0x09,0x68,0x20,0x02,0xe3,0x11,0xa2,0x9d,0xc8,0x2d,0xd0,0x96,0xe9,0xed,0x07,0x14,0x95,0x59,0x53,0x76,0xe7,0xe7,0x8e,0xa5,0xdd,0xe7,0x2e,0xc5,0x04,0xfd,0x9b,0xc6,0x64,0xec,0x4c,0x01,0xa9,0x20,0xac,0xa7,0x64,0xb2,0x3a,0x96,0xaf,0x14,0x5a,0x9d
.byte 0xa2,0x24,0xd7,0x1e,0x13,0x7f,0xce,0xc9,0x80,0xff,0x2c,0xf6,0xae,0xfa,0x4a,0xf4,0xd5,0x20,0xe4,0x3e,0x44,0xe3,0x6e,0x1d,0x29,0x8d,0xc6,0xc9,0x91,0x92,0xdb,0x29,0x5b,0x43,0xb1,0x22,0xa1,0x17,0x81,0xff,0xdf,0xa2,0xb4,0x63,0x96,0xf7,0x85,0x99,0xdd,0xc4,0x6d,0x3a,0x28,0x37,0x8e,0x97,0xdd,0xa6,0x54,0x8a,0x6e,0x49,0xf3,0xad
.byte 0x7a,0x68,0xf9,0xb8,0x75,0x88,0x53,0x1c,0x0e,0xcd,0xd6,0x19,0x31,0xd6,0x91,0x4f,0x0d,0xc3,0x00,0xcc,0x30,0x3a,0xc5,0xbf,0x74,0x75,0x85,0xfb,0x03,0x86,0x5d,0xb7,0x79,0xff,0x21,0xef,0x37,0x50,0x24,0x8f,0xc0,0x9b,0xef,0xca,0xe2,0x13,0x49,0x3f,0xe4,0x55,0xe8,0xe9,0xd6,0x26,0xc6,0xf5,0x0e,0x6c,0xe5,0x18,0x20,0xb8,0x90,0xb3
.byte 0x3b,0x52,0x65,0x16,0xd7,0x31,0x14,0x47,0xbe,0xb5,0x50,0xc8,0x7f,0x7f,0xae,0x70,0x03,0x79,0xfc,0xd8,0xf0,0x82,0xa4,0xb3,0x11,0x62,0xbc,0x32,0xd3,0xb3,0x55,0xba,0xe4,0x9d,0x74,0x8e,0xb4,0xad,0xe5,0xcb,0xb3,0x7f,0x5c,0x27,0xd2,0x9e,0xcf,0x9a,0xaf,0x82,0x24,0x34,0x41,0x9c,0x45,0xe0,0x6c,0xb4,0x05,0xba,0xed,0x8d,0x3e,0xa4
.byte 0xa8,0x68,0xfe,0xc1,0xd6,0x33,0x60,0xc3,0x52,0x98,0x3a,0x1b,0x7f,0xd4,0x24,0x7e,0x84,0x6d,0x23,0x15,0x98,0x27,0x21,0x0a,0x17,0xcd,0xae,0x59,0xdd,0x00,0x63,0x6c,0x7c,0xc2,0x3f,0x4c,0x61,0x5c,0x6d,0x48,0x97,0x0b,0x1d,0xe8,0x88,0x3a,0x34,0x4f,0x99,0xd7,0xc9,0xa3,0xac,0x94,0x61,0x0a,0x0b,0x38,0x4d,0x77,0x23,0x38,0x42,0xbb
.byte 0xf3,0x20,0xca,0x09,0x67,0xca,0xc0,0x54,0x87,0x81,0xa6,0x0d,0x0d,0xb7,0xb5,0x29,0x39,0x61,0xf4,0xb5,0x8c,0x1a,0xd9,0xb6,0x57,0x9e,0x68,0x02,0xb6,0xd3,0x8c,0x85,0x8f,0xda,0xd6,0x2d,0x94,0x77,0xef,0xa6,0x84,0x1f,0x8c,0x51,0x33,0xef,0x5b,0x73,0xf3,0xba,0xc7,0x47,0xa1,0xe6,0x9a,0x9a,0x89,0xed,0x0d,0xee,0x53,0x7e,0x3d,0x49
.byte 0x27,0xfb,0xc8,0xd0,0x4b,0x1a,0x5f,0xcc,0x83,0xe4,0x52,0x7f,0x6c,0xee,0xa1,0xd4,0x26,0x14,0x2c,0x10,0xed,0xd7,0x6d,0x43,0xaf,0x10,0x3d,0x1d,0x84,0x1c,0x79,0x03,0x72,0x22,0xeb,0x0d,0x15,0x10,0xa6,0x00,0xf8,0x25,0xfc,0xd6,0x7c,0x34,0x0c,0xb8,0xd0,0x4f,0xe3,0x8b,0x7b,0xf6,0x81,0x06,0x89,0x51,0x8c,0x31,0x3e,0x03,0x7e,0x37
.byte 0x85,0xa0,0x3e,0xe5,0x89,0x31,0x45,0xeb,0xfb,0x28,0x21,0x5b,0xfe,0xb1,0xd7,0x72,0x63,0x2e,0xdd,0xb2,0x1c,0x20,0xb4,0x7a,0x72,0x9b,0xeb,0xda,0x09,0xec,0xbc,0x39,0xda,0x3c,0x23,0x04,0x8c,0xef,0x87,0x7f,0x48,0x5f,0x1c,0x4f,0x42,0x76,0xc6,0x85,0x45,0xec,0x60,0x08,0x9e,0xec,0x14,0x7c,0x63,0xb0,0xb4,0x02,0x90,0xf6,0x2c,0x17
.byte 0x30,0xdc,0xfb,0xe2,0x05,0xa1,0x8a,0x72,0x9b,0x22,0x86,0x90,0x3e,0xaf,0x00,0xbb,0xa6,0x35,0x96,0xcf,0x70,0x61,0x47,0x72,0x92,0x75,0x19,0x68,0x1a,0x14,0xd3,0xee,0x81,0x69,0x47,0x5a,0xae,0x1e,0x78,0x52,0x4f,0x2a,0x81,0x10,0x04,0xa1,0x3c,0xbc,0xed,0x76,0x1e,0x68,0x69,0xcb,0xa0,0x10,0x78,0x27,0xb4,0xd5,0x42,0xdb,0x96,0xa6
.byte 0xf8,0x25,0xce,0x7c,0xe8,0xf0,0x49,0xb5,0x9c,0xb8,0x45,0xe6,0xbb,0xbd,0xe3,0xf7,0x16,0xdf,0x30,0xd8,0x22,0xe9,0xa6,0x0e,0x6d,0x51,0x39,0x0d,0x74,0xee,0x9c,0xf5,0xfb,0x08,0xf6,0x78,0x0a,0xd1,0xd5,0xb6,0x8c,0x3a,0xce,0x9c,0xb1,0x6c,0x40,0xa7,0x76,0x7b,0x6a,0x36,0x89,0x93,0xc4,0x59,0xd1,0x43,0x33,0xf6,0x1f,0x46,0xdd,0xd5
.byte 0xf6,0xda,0x00,0x1a,0x03,0x19,0x5f,0xdc,0x9e,0xc6,0x99,0x07,0xfd,0xed,0xd4,0x0c,0x47,0xcc,0xa0,0x28,0x64,0x55,0x2f,0x71,0x14,0x27,0x19,0xb8,0xb1,0x61,0xfc,0x04,0x41,0x44,0xb2,0xa1,0x57,0x58,0xe7,0x69,0x2a,0xce,0x08,0x50,0xa6,0x63,0xa4,0xa3,0x2f,0x8a,0x05,0xd9,0xfd,0xf5,0x2e,0xeb,0x3e,0xea,0xdd,0xbc,0xc2,0x59,0xc0,0x46
.byte 0x4e,0xa9,0x9e,0xe3,0x98,0xff,0x37,0x37,0x88,0x67,0x55,0x4b,0x1a,0xf9,0xaf,0xc1,0x9c,0x64,0x80,0xdd,0xbe,0xa3,0x33,0xef,0x67,0x5a,0x9d,0xd2,0x48,0x92,0x0e,0xae,0x2a,0x9d,0x47,0x80,0x89,0x97,0x51,0xdc,0xc0,0x34,0xeb,0xf6,0x4b,0x82,0x56,0xd5,0x30,0x61,0xde,0x38,0x9c,0xaf,0x62,0xf3,0x1a,0xbc,0xfb,0xaa,0xd2,0xb0,0x95,0x2c
.byte 0xe7,0x44,0xce,0xdd,0xb6,0x49,0x12,0x99,0x24,0xf9,0x9c,0x38,0x0d,0x9f,0xff,0x24,0x83,0xd6,0x6d,0x66,0xeb,0xf9,0x24,0x51,0x58,0x48,0x8a,0xfb,0x7b,0xf7,0x20,0x26,0xed,0xb9,0x3e,0x9f,0x47,0xa5,0xcc,0xac,0xee,0x84,0x84,0x75,0x08,0x8f,0x3c,0x13,0xe1,0xed,0x89,0x74,0x8f,0xfe,0x6d,0xb3,0x6e,0xdc,0xbb,0xa3,0x70,0x32,0xa1,0x1f
.byte 0x8a,0x45,0xa3,0xff,0x08,0x5d,0x99,0x96,0x6e,0xf4,0x04,0x75,0xb2,0x2b,0xc2,0xe9,0xb7,0x87,0xd2,0x60,0x64,0xb4,0xa5,0x5c,0xd1,0xc8,0xb8,0x32,0xab,0xa6,0xc3,0xfd,0x20,0xbd,0x38,0x3a,0x3d,0xc3,0x21,0x87,0xc2,0x4a,0x48,0x5d,0x19,0x76,0x58,0xcc,0x5f,0x59,0xc8,0x62,0x3a,0x56,0x78,0xdb,0xa2,0x62,0xd5,0x8a,0x23,0x4b,0x3d,0x31
.byte 0xb5,0x2a,0xbd,0xa3,0x26,0xbe,0xeb,0x0e,0x8e,0xaf,0x60,0x48,0x15,0x6f,0xeb,0x4b,0xe4,0xb1,0xee,0x1b,0xc3,0x8f,0x76,0xe4,0x18,0x75,0xc3,0x0c,0x80,0x16,0xa6,0x87,0x4a,0x37,0xa2,0xd2,0x1f,0xdf,0xe4,0x4e,0xf7,0x22,0xe0,0x5c,0x1e,0xb3,0x5e,0xf8,0x3c,0xb3,0x28,0xff,0x8f,0x5c,0x7a,0x0a,0xad,0x86,0x45,0x4e,0x94,0xee,0x7c,0xad
.byte 0x6b,0x06,0xa4,0xba,0x01,0x6f,0x87,0xcb,0x6a,0x7e,0x9e,0x86,0x39,0x8a,0xa5,0x31,0xc0,0x59,0xd2,0xbd,0x1c,0xcf,0x5d,0x21,0xb7,0x7a,0xe3,0xc1,0x7f,0xed,0xfd,0xba,0xe6,0x0f,0x9a,0x59,0xda,0x10,0xe6,0xb4,0x21,0x6f,0x0e,0x08,0xef,0x1c,0xb7,0x59,0x3d,0x60,0x40,0x65,0xe7,0x84,0x8d,0xb8,0xaa,0xaa,0x8e,0x0f,0xa1,0xd1,0x8b,0x6d
.byte 0xad,0x0b,0xf7,0xd3,0x83,0x64,0xba,0xc9,0xca,0xdb,0x7c,0xcd,0x40,0xfe,0x46,0x21,0x6d,0x0b,0x09,0xfe,0xd6,0x75,0xdc,0x42,0x9b,0x17,0x0e,0xa6,0x31,0x49,0x5e,0xe4,0x01,0xc2,0xd1,0x03,0x71,0xff,0x7b,0xcc,0xe6,0xc4,0xf4,0xc3,0x47,0xe6,0x85,0x76,0xfb,0x4a,0xa0,0x59,0x8b,0x8c,0x3a,0x8e,0x3c,0x2a,0xd2,0x11,0x85,0x68,0x5d,0x3b
.byte 0x6d,0xd6,0x9c,0x14,0x26,0xc8,0x91,0x30,0xca,0x7a,0x2f,0xa8,0x58,0x60,0xfa,0x89,0xde,0xc9,0xdb,0x9e,0x33,0x98,0x5b,0x9b,0x76,0xe4,0x8b,0x41,0xd3,0x86,0xe3,0xbe,0xec,0x99,0x46,0x65,0x98,0xec,0xa8,0x85,0x56,0xf5,0x19,0x2d,0xcd,0x09,0x81,0x21,0x64,0x6f,0x14,0x2a,0x74,0xe5,0xac,0xaa,0x48,0x5d,0x7f,0x49,0xd9,0xe3,0xfd,0xff
.byte 0x2e,0x91,0x2c,0xa9,0x05,0xe5,0x5d,0x8f,0x16,0xc4,0x3c,0x3b,0x70,0x37,0x7c,0xa1,0xe7,0x1d,0xa4,0x9c,0x77,0xff,0xac,0x09,0x69,0x9c,0xc4,0xf3,0x27,0x6a,0xe5,0x02,0x4f,0x28,0x26,0x52,0x7f,0xb1,0xbe,0xe2,0x37,0x25,0x74,0x1f,0xec,0x4e,0xd4,0xc5,0x37,0xed,0xb2,0xca,0xa0,0xfd,0x20,0x5e,0x63,0x72,0x13,0x9a,0xe0,0xca,0x3c,0xc2
.byte 0x81,0x62,0x60,0xaa,0xfc,0xaa,0x5e,0xe8,0x97,0xd0,0x82,0xaa,0x26,0x15,0xb7,0xae,0x94,0x50,0xe7,0x91,0x51,0x23,0x91,0x76,0xcf,0x49,0x48,0xda,0xd4,0xc6,0x2c,0xcc,0xd4,0xb6,0x0a,0x28,0xc0,0xa0,0x08,0x37,0xf4,0x61,0x81,0x38,0xc0,0xe0,0x2d,0x05,0xf4,0x26,0x2e,0xd8,0xc9,0x01,0xbe,0x1e,0x15,0x5c,0x73,0x32,0x2e,0xa9,0xb0,0x87
.byte 0x1a,0x52,0x7a,0xba,0xd2,0x13,0x93,0xc8,0x16,0x9d,0x8f,0x0b,0xaa,0x16,0x3d,0xc5,0xf7,0xb6,0x0b,0x45,0x5d,0xf8,0x18,0x52,0x3e,0x5f,0x07,0x46,0x15,0x63,0xfb,0x96,0x5c,0x2f,0x62,0x95,0x18,0xc8,0xd2,0xe0,0x73,0x7f,0x5d,0xc7,0x54,0xf4,0x1a,0xb3,0x62,0x49,0x66,0x85,0xb9,0x56,0xad,0x95,0x27,0x29,0xcc,0x65,0xaf,0xfd,0xfd,0x80
.byte 0x91,0x98,0xc1,0x3f,0xc0,0x2c,0x9a,0x16,0x75,0xe1,0xf4,0xc5,0x06,0xc5,0xc9,0x5d,0xf1,0xaf,0xf6,0xb0,0x7f,0x4a,0x59,0xca,0x05,0xb7,0x30,0x91,0x0e,0x10,0x0f,0xb6,0x68,0xe6,0xbf,0xc5,0x91,0xc9,0x27,0x75,0x55,0x82,0xf7,0x5f,0xcf,0x21,0xfc,0xc1,0x35,0x74,0xe2,0x09,0x29,0xff,0xfa,0x3e,0x6f,0xaf,0x04,0xfb,0xca,0xc4,0x73,0x7a
.byte 0x2a,0x25,0xdd,0xc5,0xcf,0x58,0xae,0x1b,0xc9,0x15,0xe7,0xc7,0xcd,0x18,0x52,0x0d,0xd5,0xf7,0xd7,0xd3,0x34,0x80,0x23,0xdf,0x83,0xb0,0x2d,0xd7,0xec,0x8f,0x06,0x9c,0x9f,0xf6,0xe7,0x98,0x86,0x6e,0xf1,0x05,0xaa,0x26,0xf1,0x7d,0x17,0x28,0x11,0x80,0x6f,0x12,0x57,0x7a,0x73,0x8b,0x33,0x98,0x27,0x6d,0xfa,0xf9,0xf2,0xb1,0xe6,0xb7
.byte 0x5b,0x45,0x73,0xee,0x12,0x80,0x19,0x61,0xd9,0xfa,0xf3,0xe0,0x47,0x13,0x50,0x92,0xce,0x26,0xf7,0xf4,0xc3,0x9b,0x01,0x59,0x82,0x3d,0xc1,0xa0,0x1e,0x14,0xc1,0xd6,0xad,0x24,0xfd,0xad,0x78,0x49,0x82,0x52,0x48,0xc0,0x41,0xbe,0x30,0xdc,0x87,0x54,0x2d,0xe3,0x47,0xb3,0x1f,0x14,0x30,0x78,0xfd,0xda,0xfd,0x20,0x6d,0xf3,0xa5,0xff
.byte 0x6c,0x35,0x87,0x85,0x92,0x99,0x4a,0x46,0x1a,0x7d,0x5c,0x5d,0x97,0x6c,0x3b,0xc9,0xa7,0x1b,0x22,0x1f,0x26,0x2a,0xdc,0xa1,0xab,0x0c,0x46,0x68,0x67,0x3e,0xa1,0x0f,0x50,0xce,0x3f,0xac,0xe2,0x05,0xd6,0xcf,0xb9,0x5e,0xc2,0x54,0xfb,0xcd,0x17,0x2a,0xb6,0x2d,0x03,0xb9,0x62,0xb3,0x2d,0x8e,0x77,0xdc,0x3f,0xb2,0x84,0xb2,0xfc,0x34
.byte 0x3d,0x75,0xcb,0xdf,0x30,0xe1,0x56,0x3c,0x53,0x2e,0x7d,0x90,0xdc,0x6c,0x65,0x05,0x2a,0xaa,0x06,0x1c,0xa8,0x44,0xc7,0x57,0x79,0xc1,0xa7,0xef,0x64,0x9f,0x55,0x82,0xff,0x7e,0xc8,0xa1,0x35,0x40,0xcd,0xdd,0x25,0x54,0x95,0x84,0x5d,0xc7,0x52,0xc1,0x51,0x91,0xe1,0xe9,0x2e,0xcc,0xba,0xb4,0x60,0x52,0x3b,0xd6,0x39,0xb0,0x9d,0x78
.byte 0xf4,0x28,0x7b,0x88,0x40,0x20,0x0b,0x37,0x38,0x03,0x91,0xc2,0xa7,0xf0,0x21,0xa7,0x62,0x7d,0x96,0xa2,0xce,0x5d,0xba,0x25,0xc4,0x79,0x07,0x1b,0x1a,0x86,0x55,0x06,0xa7,0x44,0x03,0x74,0xf6,0x28,0xb1,0x50,0x18,0x48,0xa9,0xd9,0x4a,0xa0,0x6e,0x4e,0x31,0x4b,0x37,0xd6,0xa9,0x2e,0x5a,0x11,0x2f,0x8e,0xc7,0x2d,0x72,0xfd,0x88,0x36
.byte 0x51,0xe9,0xe4,0x0f,0x39,0xe8,0x81,0x75,0xd8,0x23,0x43,0xfb,0x69,0xbf,0x1f,0xe3,0xd4,0x43,0x9d,0xdf,0xb9,0x57,0x72,0x7c,0x56,0x1e,0x7c,0x39,0xdb,0xfe,0x5b,0x04,0xcc,0x12,0xec,0x01,0x78,0xcc,0xd3,0xe4,0x40,0xdc,0x62,0xbf,0x85,0xa1,0x7e,0xd4,0x18,0x7f,0x98,0x42,0x95,0x17,0x81,0xb5,0xd9,0x2f,0xef,0xf6,0x4b,0xb0,0xc2,0xf3
.byte 0x60,0x7b,0x2e,0x50,0x3d,0x12,0x62,0xae,0x49,0x9b,0x90,0x40,0xc9,0xe6,0x16,0xa8,0xf4,0xe9,0x56,0x4b,0x44,0x4f,0x1a,0x40,0xb8,0x1a,0xbc,0xa1,0x1d,0xfc,0xe2,0x18,0xdd,0xd5,0x44,0xad,0xda,0xd6,0x75,0x89,0xa2,0xbe,0xc1,0xa7,0x33,0xc3,0xbc,0x64,0xf3,0x8d,0x8e,0x55,0x1c,0x41,0x17,0xa8,0x4c,0x75,0xc6,0x17,0xc6,0xa7,0xb7,0xea
.byte 0x28,0x1b,0x57,0x6d,0x94,0xaa,0xac,0x06,0x6c,0x69,0xd9,0xce,0x77,0x96,0xe6,0xf8,0xd0,0x70,0x7f,0x5d,0x56,0x22,0x4a,0xc6,0x5e,0xa6,0x06,0x0b,0xfc,0xcd,0xa4,0x12,0xd7,0x35,0xcb,0x09,0xfb,0x6e,0xa4,0x80,0x13,0x22,0x0a,0xfa,0x69,0x4d,0x3f,0x53,0x5a,0x1e,0xc4,0x9a,0x39,0xe2,0xa2,0x63,0x92,0xd2,0x2a,0x83,0x2c,0x01,0x04,0x6f
.byte 0xde,0x28,0x01,0x83,0xa6,0xdb,0xc6,0xa6,0x86,0x45,0x6b,0xb0,0x22,0x7a,0x71,0x8b,0x5c,0x81,0xf4,0x42,0xd5,0x23,0xff,0x8d,0xc5,0x4f,0x75,0xae,0x8d,0xfb,0x99,0x53,0x3e,0x35,0x56,0xfa,0x35,0xee,0x16,0x18,0xc0,0x6a,0x5b,0x20,0x89,0x41,0xc9,0xfe,0x7b,0xe2,0xe8,0x3d,0x1d,0x74,0x31,0xe6,0xe6,0xba,0x86,0xd1,0x19,0x50,0x07,0xb4
.byte 0xd8,0x27,0xdf,0x51,0xc2,0x94,0x69,0xab,0xe1,0x6a,0x69,0x52,0x15,0x71,0x0a,0xc5,0xec,0x84,0x29,0xd3,0x48,0x79,0x53,0x95,0xb2,0xd7,0xf3,0x3a,0x92,0xec,0x51,0x85,0xfd,0xe3,0xf1,0x5c,0xac,0x73,0xf7,0x19,0x72,0xdc,0x46,0x31,0xf6,0xcd,0x8b,0xfe,0xf3,0x59,0x8a,0xe8,0x37,0x78,0x65,0xc5,0x3c,0xcc,0xf2,0x5a,0xf8,0x6e,0xaa,0x38
.byte 0xc4,0x3b,0x48,0x07,0xe1,0xbd,0x4e,0x2c,0xad,0x02,0xf4,0x19,0xd8,0xd0,0x58,0x5a,0xfe,0x0a,0xc7,0x07,0x55,0x26,0x84,0x58,0xf4,0xfc,0x57,0x4b,0x5b,0xb3,0x37,0xe9,0x97,0x7c,0xe9,0xbf,0x1d,0x8d,0x63,0xf7,0x85,0x5c,0x56,0xb0,0xf9,0x5f,0x5b,0x45,0xe5,0x5a,0x74,0x72,0xa8,0x8a,0xf5,0xf2,0x6e,0xda,0x1e,0xea,0x12,0xc4,0x05,0xb1
.byte 0x96,0xf1,0x75,0xee,0xd0,0xab,0xd4,0x50,0x51,0xae,0x01,0x23,0x55,0xa2,0xbc,0x30,0xac,0x0c,0x96,0x76,0xa2,0xc6,0xdf,0x03,0xb0,0x67,0x6d,0x77,0x9c,0xa7,0x0b,0x12,0x2d,0x57,0x6b,0x55,0x54,0x4f,0x9b,0x0f,0x87,0xbb,0xc5,0x17,0xda,0x94,0x10,0x13,0x9c,0x70,0xac,0xf9,0x10,0x9a,0xa4,0x03,0x46,0x17,0xf5,0xc3,0x63,0x3a,0x23,0xd6
.byte 0xf9,0x90,0x8c,0x66,0x1f,0xf7,0x3b,0x35,0x71,0x1f,0x87,0x7a,0x78,0x0e,0xa4,0x7a,0x59,0x70,0x72,0xd5,0x55,0xec,0x62,0x91,0x21,0xa1,0x6e,0x8d,0xd4,0x00,0xf7,0x02,0x0c,0xff,0x4f,0x0b,0xe1,0x1b,0x43,0x87,0x63,0xb1,0xc4,0xa5,0x47,0x54,0x05,0x68,0xd7,0xfc,0x80,0x4c,0x4d,0x4c,0xdb,0x8a,0x0a,0x0b,0x31,0x52,0xae,0x2e,0xf5,0x75
.byte 0x41,0x1a,0x01,0x1b,0xc2,0x1a,0x1c,0x9b,0x39,0x8b,0xa8,0x73,0x87,0x10,0x57,0x64,0xf1,0xd8,0xd7,0x19,0xad,0x9e,0x61,0x35,0x1c,0x00,0x7c,0x63,0x5f,0xc1,0x75,0x69,0x64,0x88,0xc9,0x29,0x41,0xae,0x84,0xa8,0x45,0xa0,0xbb,0xee,0xfb,0x37,0x58,0x5e,0xc7,0x59,0x62,0x0b,0x21,0x61,0x42,0x0d,0x98,0x21,0xf5,0x41,0x47,0x74,0x1f,0x6d
.byte 0xcc,0x7b,0x2b,0xc7,0x90,0xf3,0xe8,0x68,0xe2,0x0c,0x17,0x06,0x95,0x04,0xfc,0xb0,0xf3,0xbd,0x5f,0xaf,0xe0,0x3b,0xe2,0x83,0x79,0xd3,0x43,0xa5,0x5d,0x97,0x53,0xc2,0xd2,0x6b,0x67,0x5a,0x36,0x7b,0xb6,0xc9,0xb3,0x5f,0x21,0x4b,0x23,0x94,0xa0,0x04,0x0b,0x5a,0x28,0xb8,0x6b,0x1b,0x27,0xcc,0xfe,0xe7,0xf9,0xed,0x8f,0x93,0x58,0x26
.byte 0xdc,0x66,0x2b,0x8d,0x2a,0x40,0x8f,0xaa,0x17,0x68,0x13,0x84,0xa6,0x7a,0x74,0xa0,0x95,0xe3,0x92,0xe5,0xc6,0x4d,0x05,0xad,0xf7,0x62,0x48,0xb8,0xcc,0xfb,0xd9,0xdf,0x0f,0xdc,0x72,0x2d,0x8f,0xad,0xb1,0x96,0x03,0xae,0x09,0x37,0xd0,0x37,0xe7,0x87,0xbd,0x57,0x74,0x3e,0x1e,0xf0,0x9d,0x31,0xa7,0x10,0x3f,0x3c,0x0b,0xf5,0xce,0xaa
.byte 0x4b,0xec,0xa9,0xd9,0x19,0x8f,0x8a,0x47,0xc9,0x40,0xeb,0x70,0xbc,0x4d,0x35,0x73,0x52,0xc8,0xe5,0x5f,0x80,0x1c,0x99,0x0e,0x5e,0xc0,0xfc,0xc6,0x93,0x2c,0x11,0xa5,0x46,0xfb,0xaf,0x08,0x73,0xb5,0x9d,0xaa,0x1c,0x25,0x12,0x95,0x69,0xd5,0x47,0xbd,0xd5,0xe2,0x87,0xc2,0xe5,0xbc,0x20,0x16,0x05,0x22,0x40,0x7e,0x7c,0x6d,0xf6,0xf8
.byte 0x4e,0xb4,0xe3,0xfd,0x76,0x63,0x45,0x4f,0x07,0x4d,0xe0,0x26,0x2a,0xce,0x53,0xa8,0x07,0xfa,0x15,0x84,0xa7,0xb1,0x5f,0x32,0x25,0xa8,0x1a,0xd7,0x31,0xf1,0xf6,0x09,0xf9,0xf2,0xe9,0x84,0x5f,0xb9,0xb6,0x69,0x84,0x8f,0x97,0xac,0x59,0xf1,0xc8,0x7f,0x0f,0x0e,0xf2,0xfd,0x35,0x68,0xbb,0xe2,0x1f,0x32,0xa2,0x4a,0x08,0x56,0x53,0x88
.byte 0xe2,0x2e,0x00,0x16,0xdc,0x76,0x1d,0xb6,0xc4,0xbf,0x9f,0xde,0xb3,0xa5,0x12,0x77,0x06,0xbd,0x27,0x10,0x20,0xdd,0x26,0xdc,0x15,0x0f,0xa9,0xa4,0xa3,0xc2,0x1b,0x9a,0xf4,0x75,0xb5,0x80,0xe4,0xaa,0x13,0xe3,0x41,0xb9,0xcf,0x92,0xd9,0x5f,0x60,0x89,0x89,0xbc,0x06,0x72,0xb4,0x98,0x0f,0x71,0x2d,0x82,0xf5,0x9c,0x01,0xe6,0x5e,0x81
.byte 0xe1,0x0e,0x46,0x45,0xf1,0xfc,0xd1,0x9b,0x37,0x0d,0x44,0x43,0x88,0xe2,0xbc,0x8c,0x3e,0x82,0xca,0x48,0x42,0xe7,0x3b,0x55,0x49,0x0f,0xea,0x0b,0x74,0x30,0x0e,0x0f,0x82,0x05,0x6b,0x9b,0xda,0x0a,0xf1,0xc7,0x3a,0xb9,0x33,0x26,0x91,0x55,0x82,0x2f,0x66,0x2d,0x6b,0xdf,0x47,0x4c,0xaa,0xe2,0x90,0x1e,0x73,0x57,0x62,0xb3,0x4d,0x00
.byte 0x0a,0x94,0xa8,0x71,0x37,0x1d,0x9d,0x4d,0x60,0x55,0x9a,0xcf,0x51,0x0b,0xe1,0x9a,0x95,0x64,0x26,0x54,0x84,0xa0,0xe6,0x9c,0x3d,0x75,0xcf,0x88,0x36,0x71,0x16,0x16,0xeb,0x19,0xc0,0x41,0xc0,0xe0,0xf0,0x1f,0x65,0xfc,0x8d,0x64,0x7d,0xb3,0xdb,0x58,0xec,0xed,0x18,0x4f,0x49,0x54,0x55,0x11,0xb1,0xd5,0xbc,0x7d,0x96,0x39,0x91,0xec
.byte 0xc0,0xff,0x09,0x05,0x13,0xa8,0x7f,0xae,0xc1,0x48,0xed,0x62,0x38,0x9b,0xdd,0x4e,0x52,0x5f,0x26,0xf7,0x1d,0xfb,0xdf,0x57,0xba,0x4c,0x87,0xbd,0x3d,0x3c,0x4a,0xfa,0x26,0xbd,0x7b,0x67,0x3a,0x1d,0xdb,0xd8,0xea,0x2f,0xc2,0xb1,0x0b,0xef,0x58,0xb1,0x20,0xde,0x22,0xbb,0x3a,0x5e,0xe3,0x1e,0xb0,0x12,0xfc,0x14,0x91,0xf2,0xeb,0x20
.byte 0x2e,0x3a,0xd3,0x70,0xf1,0xf5,0x46,0x14,0x6e,0x7a,0xe2,0xa2,0xa2,0x4e,0x15,0xca,0x35,0x34,0xdb,0x73,0x64,0x22,0x45,0xb9,0x56,0x87,0x15,0x07,0xd5,0x9b,0x35,0x7f,0x14,0x93,0xfd,0x1c,0xb1,0xf1,0xb3,0x6c,0x2b,0x68,0x20,0xb9,0x84,0x6e,0x4d,0xfe,0x6b,0xd4,0x40,0x33,0xf5,0xe3,0xe9,0xc1,0x94,0x79,0xe0,0x6a,0x1f,0x75,0x49,0xd3
.byte 0x31,0xa8,0x2f,0x3d,0x09,0x13,0x8b,0x90,0x01,0x34,0x3f,0x12,0x9e,0x91,0x90,0xc9,0x93,0x8d,0xf2,0xf7,0xa7,0xda,0xc0,0x9d,0x59,0xf3,0xd7,0xf3,0x95,0xa4,0x57,0x6f,0x24,0x66,0x2d,0x0f,0x94,0xb4,0x59,0xa5,0x47,0x93,0x35,0x36,0x22,0x1b,0x4d,0x8e,0xaf,0xf1,0xc2,0x1c,0x55,0x33,0x2c,0x77,0xc7,0x7f,0xd5,0x29,0xc6,0xf6,0x9d,0x38
.byte 0xe7,0x33,0x73,0x5a,0xb2,0x1f,0x7c,0xf8,0x2d,0x5a,0xbd,0xa9,0x89,0xa1,0xc0,0x00,0x8d,0x6e,0xef,0xbb,0x0a,0x91,0x3a,0x0a,0xaa,0x4d,0x5b,0x1c,0xc9,0xce,0x0a,0x66,0x3a,0x72,0x8b,0xa4,0x67,0x61,0x53,0x74,0xa0,0xd6,0x71,0xf0,0x92,0x15,0x7b,0x7f,0xfd,0x72,0xf1,0x5c,0xd2,0xa2,0xdb,0x75,0xf1,0xa3,0x34,0x0d,0x7d,0x4a,0x39,0xfa
.byte 0x20,0x0d,0xdd,0xb6,0x6e,0x78,0xe0,0x57,0xdd,0xf2,0xd7,0xe1,0xba,0x49,0x92,0x71,0x5b,0x76,0xc2,0x26,0x79,0xef,0x52,0x54,0x18,0x66,0x44,0xcf,0x40,0x28,0x50,0xc7,0x02,0x7a,0x76,0x8f,0x77,0xe6,0x26,0x2c,0x2e,0x68,0xf9,0x2d,0x65,0xb3,0x95,0x98,0x5a,0xd5,0xaa,0x63,0xf3,0x7b,0x97,0xf8,0xc1,0x30,0x69,0x81,0xe3,0xd4,0xfd,0xb3
.byte 0x5e,0x83,0x8b,0xe2,0xa4,0xac,0x15,0xa7,0xf1,0xc4,0x65,0x56,0x1c,0x31,0x7d,0xd6,0x6f,0xef,0x4d,0x2d,0xcd,0x61,0x4c,0x06,0x48,0x0e,0x64,0x9a,0xab,0x04,0x7c,0xf6,0x38,0x86,0x16,0xd9,0x3d,0x1f,0xe3,0x74,0xf8,0x46,0xd3,0x84,0x5a,0x56,0x73,0x81,0x19,0xd2,0x8b,0xef,0x2a,0xb1,0xe2,0x24,0x41,0x9f,0x6b,0x65,0x9e,0x34,0xf9,0x85
.byte 0x4c,0x38,0xe4,0x6d,0x63,0xcb,0x7c,0x13,0x88,0xb3,0x62,0xfd,0xa7,0x91,0x16,0x4f,0x77,0xcc,0xb5,0x68,0x58,0x1f,0xd6,0xfc,0x63,0x0f,0xa0,0x55,0x7e,0xfb,0x0f,0x84,0x76,0x24,0xa7,0xe0,0x53,0x4c,0x3a,0x36,0x0c,0x30,0x46,0x58,0x14,0x31,0x88,0x96,0xf7,0xaf,0x39,0x6d,0x7a,0x6e,0xcf,0x62,0xa3,0x2e,0x2e,0x94,0x77,0x2e,0x36,0x64
.byte 0x58,0x13,0x66,0x39,0x59,0x70,0x4c,0x81,0x4d,0x56,0x46,0x00,0x96,0x1b,0x60,0xfd,0xbf,0xfe,0x7f,0xe5,0x59,0xc1,0x09,0xd1,0x38,0x74,0xbe,0x98,0x97,0x61,0x6f,0xcf,0xbd,0x49,0x60,0x7e,0xe3,0x6c,0x65,0xbc,0x6b,0xa1,0x79,0x65,0x59,0xc3,0xa1,0xdd,0x77,0x3d,0x32,0xed,0xbe,0x51,0x12,0x19,0x61,0x84,0x52,0x8d,0xe3,0xf7,0x3b,0x6e
.byte 0x6a,0x16,0x24,0x0f,0xc8,0xa7,0x17,0xb9,0xda,0xe9,0x81,0xa7,0x56,0x46,0xa9,0xd6,0x5a,0x82,0x73,0xfe,0xd3,0xd4,0x8b,0x1a,0x61,0x2f,0x63,0xb8,0x8d,0x47,0x8b,0x4e,0xa9,0xce,0x10,0x86,0x07,0xe0,0xad,0xe8,0xb3,0x39,0x27,0xbe,0x39,0xac,0xdd,0xa5,0x09,0x4a,0x22,0x56,0x1d,0xab,0x4b,0xd4,0x03,0xf9,0xe5,0x1b,0xfc,0x3a,0x62,0xe7
.byte 0x74,0x79,0x8c,0x37,0x48,0x35,0x54,0x5b,0x66,0xdb,0x0f,0x00,0x5b,0x6c,0x22,0xd6,0x3c,0xb6,0xdf,0xb7,0xcd,0x12,0xc0,0xf2,0x22,0x1f,0xa1,0x2f,0x08,0x56,0x8c,0xed,0x6a,0xe1,0x18,0xea,0x8c,0x47,0x39,0x53,0x90,0xdc,0x93,0x74,0x33,0x71,0xe1,0xaa,0x77,0xf4,0x07,0xfd,0x8b,0xa3,0x1b,0x44,0x89,0xab,0x77,0x85,0x65,0xc3,0xfe,0x12
.byte 0xa8,0xf5,0xff,0x09,0x9f,0xce,0x10,0xd0,0xd0,0xc8,0x27,0x4c,0x59,0x99,0xc2,0x87,0xe5,0x61,0xe1,0x68,0xd5,0x6e,0x53,0xc8,0xc5,0xc7,0x7a,0x49,0x64,0x19,0xa2,0x6c,0x40,0xdb,0xfc,0x5f,0xe0,0x4f,0x12,0x53,0x8e,0x65,0x28,0xb9,0x61,0x01,0xac,0xb4,0xbf,0xee,0x6e,0x13,0x9b,0x06,0x20,0x8c,0x17,0x7c,0x3a,0x22,0x01,0x15,0xb0,0xd1
.byte 0xa7,0xa5,0x00,0xa0,0xe8,0x1c,0xf0,0x82,0xaa,0x63,0x99,0x8d,0x10,0x7b,0x24,0xef,0x2c,0xb9,0x9a,0x1d,0xd5,0x14,0x59,0x2c,0x2c,0x70,0xb6,0x5d,0x91,0xfc,0xfb,0xd1,0xed,0xe4,0x61,0xfe,0x26,0xcf,0x87,0x27,0xe5,0xa3,0xfe,0x30,0x3d,0xa5,0xec,0x5c,0xfa,0x57,0x76,0x98,0xbd,0x7e,0x48,0x8e,0x36,0x8a,0xda,0x73,0x0f,0xf6,0x79,0xf8
.byte 0x35,0xca,0x8e,0xbd,0xc7,0x58,0x32,0xe4,0xea,0xcc,0xf0,0x18,0xb7,0xda,0x8c,0x0e,0x05,0x92,0x49,0x7c,0x14,0x9e,0x49,0x73,0x0b,0xcc,0xf2,0x50,0x90,0xd4,0x6d,0x43,0xa1,0x17,0xd1,0x64,0x99,0x79,0x43,0x90,0xe7,0x06,0x73,0xa6,0x37,0x2e,0xde,0x6c,0x8f,0xd8,0x31,0x6c,0x72,0x2b,0xe5,0x9d,0x42,0xaf,0x18,0x12,0x9e,0x35,0xc0,0xf8
.byte 0x70,0x3f,0xd7,0xc7,0x61,0x39,0x7c,0x85,0x5d,0x77,0xad,0x7c,0xde,0x02,0xf1,0xa1,0x7b,0x6d,0x36,0xf8,0x31,0xe7,0x97,0x9d,0x2e,0x23,0xb6,0x9b,0xb3,0x24,0xcc,0x0f,0x3d,0x49,0x8a,0x18,0x1c,0xbb,0xbb,0xed,0xb5,0x96,0x22,0xd0,0x63,0x17,0x65,0x3a,0x83,0x98,0xa0,0x10,0x4a,0x37,0x74,0x07,0x61,0x83,0x6c,0xa0,0x5d,0xec,0x9f,0x52
.byte 0xdc,0x12,0xcc,0xec,0x9e,0xb2,0x27,0x98,0xd3,0x41,0xf7,0x52,0xca,0x4e,0x29,0xda,0x35,0xba,0x96,0xc7,0x37,0x83,0xdf,0x26,0x4c,0x6b,0x24,0xb7,0x60,0xe6,0x4d,0x09,0x30,0xb8,0x6a,0xf6,0x34,0x8b,0x4c,0xa0,0x15,0xf8,0x47,0xf3,0x40,0x80,0x2a,0x41,0xeb,0xed,0xfc,0x53,0xb7,0xc7,0x2f,0x4d,0xfd,0xab,0xcd,0xf4,0x49,0x0e,0xe1,0x1c
.byte 0xb9,0xd2,0x11,0xf0,0xa9,0xf6,0x3a,0x8a,0x7a,0x90,0x4d,0xf9,0xfd,0x3a,0x75,0xc2,0x60,0x8b,0x25,0xae,0x1d,0x3a,0xf5,0x81,0xb4,0x2b,0xf7,0x4d,0x27,0xbe,0x85,0x2d,0x65,0x60,0xf6,0xdb,0x2e,0x29,0xa7,0xee,0x26,0x07,0x07,0x17,0xfa,0x4a,0x93,0x72,0xad,0x97,0x5c,0x7d,0x4f,0xd2,0x29,0x37,0x0c,0x5e,0xbb,0xbd,0xbd,0x11,0xfd,0x77
.byte 0xa1,0x6b,0xf9,0x4b,0x75,0x9b,0x02,0xb4,0x65,0xcf,0xe2,0x92,0xb2,0xef,0xf8,0x7e,0x71,0xf5,0x1b,0x6f,0xb5,0x54,0x9f,0x63,0xf4,0x6b,0xb2,0x2e,0xb6,0x4a,0xb8,0x9c,0xa0,0xb0,0xa8,0x4b,0x6a,0x1a,0x2a,0x7e,0x46,0x85,0x24,0x64,0x68,0xea,0x36,0x52,0x67,0xe5,0x42,0x82,0xa9,0x6f,0x9c,0x95,0x60,0xbf,0xc3,0x33,0x9d,0x40,0x23,0xdb
.byte 0x4e,0x8a,0xf2,0x3d,0xb8,0x8e,0xfb,0xd2,0xf1,0x99,0x6f,0x96,0x38,0xe2,0xd6,0x68,0x40,0x11,0x39,0xf7,0xa1,0x07,0xe4,0xc9,0x14,0x61,0x5b,0x8c,0xc5,0x95,0xa2,0xfb,0x86,0x51,0xd1,0xd3,0x2e,0x1f,0xf7,0x42,0xd2,0xc8,0xbd,0x8c,0xc3,0x24,0x0f,0x1c,0x61,0xfa,0xee,0x64,0xca,0xc0,0x12,0xab,0xdc,0xd4,0x08,0x31,0x7f,0xea,0x3b,0x24
.byte 0x7e,0x4b,0x14,0x58,0x8a,0x48,0x9b,0xf2,0x04,0x7a,0x5b,0xec,0x49,0xaa,0xf9,0x33,0x72,0x8e,0x3e,0x06,0x80,0xe1,0xb5,0x1c,0x18,0x5c,0xe9,0x01,0xf4,0x78,0xeb,0x61,0x14,0x5f,0x52,0x1a,0x22,0x7e,0xbc,0x8f,0x38,0xa9,0x32,0xdf,0x9b,0x9d,0x96,0x13,0xc8,0xd1,0x5f,0xcf,0x51,0xbe,0xee,0xa4,0x04,0x31,0xc9,0xd1,0x0e,0xd9,0x54,0x3e
.byte 0x26,0x6d,0x25,0x98,0x65,0x83,0x53,0x4e,0xc6,0x01,0xb1,0x02,0x94,0x36,0x62,0xa2,0x6f,0x8b,0x1f,0x52,0x35,0x9c,0xa1,0xc7,0x50,0x54,0x27,0x96,0x51,0x4d,0xa8,0x85,0xc2,0xbd,0xe8,0x20,0xd7,0x55,0x14,0x89,0x64,0xe4,0xe1,0x70,0xcd,0xf0,0x40,0xfa,0x8e,0x35,0x20,0x53,0xec,0x73,0x3e,0x75,0x36,0xa3,0x69,0xf0,0xe0,0x0b,0x26,0x4d
.byte 0x9b,0xf8,0x03,0x72,0xb4,0x11,0x5f,0x5f,0x67,0xc1,0x7f,0xe1,0x71,0x94,0x14,0x96,0x7a,0xc4,0x81,0xab,0x26,0x15,0x7d,0xf9,0xa3,0xd7,0xab,0xaa,0x53,0xfd,0x42,0xb4,0xc4,0x79,0x1e,0xd4,0xed,0x14,0x83,0x00,0x5a,0x8d,0x86,0x6d,0xa0,0xef,0x29,0x03,0x2d,0xb1,0xf2,0xc1,0x97,0xa6,0xe8,0x23,0x6c,0x6a,0x56,0xe0,0x7a,0x4e,0xef,0x6d
.byte 0x8c,0x46,0x06,0x06,0x17,0xb0,0xcf,0x86,0xca,0x0f,0x8f,0x42,0x84,0xe5,0xb1,0xeb,0x3f,0x75,0x50,0x51,0x57,0xca,0x5f,0x49,0xdb,0x8b,0xc8,0x66,0xd5,0x86,0x86,0x9d,0x2e,0x9a,0x23,0x31,0xc4,0x5a,0xc0,0x7b,0x14,0x22,0xae,0xe4,0x52,0x8e,0x55,0xd9,0x01,0xf9,0x9c,0x7a,0x96,0x6d,0x74,0xf1,0x31,0x2a,0xfd,0xda,0x4e,0xa3,0x82,0x2f
.byte 0x54,0xc5,0x25,0x1d,0x85,0x6c,0xdc,0xa7,0x78,0x01,0x73,0x3e,0xcd,0x2d,0x53,0xc0,0xbf,0x23,0x05,0x19,0x93,0xbf,0x73,0x7f,0xdf,0x0a,0x38,0x9f,0x0d,0xae,0xb7,0x23,0xe6,0xb0,0x17,0xc0,0x2d,0xd4,0xd4,0x47,0x9c,0xc7,0xb6,0x42,0x8a,0xdc,0xa9,0x36,0x4f,0x07,0x02,0x1f,0x87,0x89,0xe8,0x48,0x33,0x7f,0x24,0x84,0x28,0xde,0x84,0x4a
.byte 0xb9,0xf9,0xe1,0xe5,0x4b,0xd7,0xf9,0x1a,0x44,0x4d,0xf9,0x4a,0xfc,0x97,0x03,0x03,0x71,0x2b,0xfe,0x04,0xfa,0x6c,0x52,0x07,0x54,0xb4,0xd2,0x60,0x34,0xb8,0x36,0x6f,0xc7,0x3c,0x64,0x37,0x8d,0x30,0x20,0x3e,0x66,0xac,0x1e,0x75,0x2d,0x76,0x3a,0x95,0xbb,0x23,0x7a,0x43,0x63,0xba,0xc9,0x7d,0x85,0x01,0xd9,0x65,0x20,0xc1,0x95,0x68
.byte 0xcf,0x8a,0x4f,0x57,0x87,0x70,0x8e,0xe5,0x20,0xdb,0xd3,0x37,0x4c,0x03,0xc0,0x44,0x17,0x4c,0x2a,0x30,0x91,0xd9,0xb8,0x04,0xaa,0xcb,0xe9,0x8f,0x8f,0xe0,0x9a,0x79,0x1e,0x40,0x65,0x47,0x3d,0x4f,0x0e,0x7e,0xfc,0x8f,0x0c,0x20,0xe3,0xc6,0x5c,0x90,0xa8,0x09,0x41,0xbd,0x4b,0x55,0x4e,0xcc,0xeb,0xba,0x48,0x69,0xa2,0x5b,0xa0,0x41
.byte 0x15,0xa6,0x1f,0x6b,0x6f,0xa0,0x26,0x2b,0x07,0xbd,0xb2,0x49,0xda,0xa0,0x97,0x22,0x37,0xcc,0xc3,0x05,0x4c,0x73,0x8f,0xb2,0x81,0xcf,0xe3,0xa4,0x23,0x96,0xe8,0x3d,0x29,0x00,0xbd,0xfe,0xec,0x97,0x65,0x94,0xf8,0x89,0x51,0x35,0x1b,0x72,0xff,0x6a,0x85,0x8c,0x53,0x35,0x7a,0x4f,0x11,0x5e,0x95,0xcf,0x9e,0x0f,0xef,0xbc,0x64,0xee
.byte 0x3a,0x6e,0xa1,0x4f,0x29,0x41,0x99,0x33,0xdc,0x7b,0x33,0xc4,0x82,0x8a,0x23,0x62,0x59,0x2c,0x2e,0x11,0x6e,0xec,0x6a,0xfb,0xe1,0x28,0x20,0xf4,0x38,0x48,0xf8,0x69,0xae,0x53,0x2b,0xd8,0x60,0x3b,0x37,0xf4,0xb1,0xa4,0xeb,0x80,0xd1,0x1f,0x11,0xd4,0x12,0x62,0x9f,0x1a,0x93,0xf7,0xfe,0x08,0x22,0x72,0x1b,0x51,0xa4,0x12,0x6e,0xe3
.byte 0x59,0x23,0xeb,0xf4,0x6e,0x03,0xe6,0x1e,0x7e,0x94,0xfe,0x21,0xa2,0xb6,0x41,0x75,0xb2,0x8f,0x24,0x41,0xa3,0x08,0x33,0xec,0xf7,0x45,0x3c,0x55,0xd2,0xb9,0x5f,0x7e,0x61,0x37,0x17,0x45,0x9d,0xf9,0x87,0x26,0x07,0x65,0xee,0x7c,0x82,0x4e,0x96,0x53,0xea,0x50,0xa4,0x99,0xb9,0xe4,0xe1,0x79,0x02,0xd2,0x1f,0xa3,0x1f,0x1c,0x13,0x48
.byte 0xf3,0x36,0x56,0x84,0x56,0x58,0xbd,0x52,0x06,0x21,0x95,0x0a,0xe1,0x45,0x43,0xe6,0x9f,0xfa,0xbd,0x1a,0x60,0x3f,0x6b,0x93,0x8c,0x22,0x17,0x4f,0xc9,0x13,0xdf,0x94,0x3e,0xd8,0x1f,0x22,0xf8,0xc4,0xaf,0xe3,0xcb,0x03,0x67,0x23,0x90,0xee,0x36,0x8e,0x3f,0xc6,0x0d,0xaf,0xd5,0x0f,0x41,0xd8,0x22,0xe3,0xf7,0x6d,0x19,0x99,0x25,0x51
.byte 0x12,0x8d,0xa1,0x19,0xc6,0x26,0xa3,0x1a,0xce,0x9b,0x0f,0xae,0xbf,0xd5,0x80,0x9b,0x4a,0x6c,0xc9,0xa7,0xd7,0x65,0x67,0xb7,0x71,0x77,0xae,0xa1,0x31,0x8b,0x3a,0x0d,0x33,0x43,0xb1,0x08,0x6c,0x97,0xd4,0x41,0xe1,0x83,0x50,0xc8,0xc5,0x44,0x5a,0x6d,0xab,0xa5,0x89,0x5f,0x87,0xb4,0xfc,0x5a,0x29,0xa0,0xb3,0x6c,0x62,0x46,0x58,0x55
.byte 0xd0,0x60,0x3f,0x6b,0x1b,0x1b,0x47,0x0d,0x02,0x2c,0xd7,0x92,0x37,0xc6,0x80,0xf1,0x0c,0xf8,0x91,0xb5,0x20,0x49,0xdd,0x56,0x59,0xb2,0xd6,0x00,0x1d,0x1c,0x87,0xbd,0x99,0x17,0xab,0x5f,0x47,0xaf,0x0e,0x87,0xf1,0xca,0x59,0xec,0xa1,0x3d,0x1e,0x60,0x3e,0xcb,0x23,0xe6,0x26,0x9e,0xc5,0xf6,0xaf,0xab,0x4b,0x9f,0xac,0xae,0x09,0xd9
.byte 0x4b,0xfa,0x24,0x55,0xfc,0xae,0x02,0x29,0xba,0xbb,0xd6,0x13,0x0d,0x4e,0xef,0x8b,0x44,0xe2,0x84,0xd4,0xef,0x5b,0x9a,0xca,0xe7,0x2a,0xdd,0x49,0xdb,0xc9,0xf6,0x77,0xdf,0xff,0x3b,0x79,0x7c,0x0b,0x11,0x30,0x36,0x84,0xf0,0xe4,0x97,0x5e,0x7c,0x48,0x9a,0xd6,0x40,0x63,0xec,0x8e,0x92,0x1b,0x44,0x83,0xaa,0x3c,0x47,0x49,0x9b,0x21
.byte 0x35,0x73,0x41,0x78,0xdc,0x06,0xa5,0x18,0xe0,0x0b,0xb9,0xab,0xf3,0x0d,0xdc,0x84,0x1c,0x52,0xef,0xc1,0x4d,0xad,0xdb,0x71,0xf0,0x33,0x4e,0xaf,0xc3,0x0c,0x8e,0x28,0x92,0xf8,0xbd,0xae,0x8f,0x2d,0x36,0x8a,0xda,0xff,0xc5,0x7f,0x27,0xdc,0xb0,0xd3,0x03,0xae,0xb8,0xdd,0x20,0xf8,0x5c,0x31,0xac,0xbc,0x36,0x71,0xde,0xc9,0x71,0x7d
.byte 0x21,0x68,0xcd,0xb0,0xfc,0x9d,0x96,0x6b,0xfa,0xb0,0x3a,0xfb,0x05,0xc7,0x89,0xd1,0x50,0x7a,0x50,0x52,0x53,0x29,0xb6,0x25,0x8f,0x96,0x75,0xb3,0x66,0xac,0x1c,0xf9,0x04,0xe0,0xe7,0x9f,0x0d,0x1d,0x65,0x84,0xb2,0x47,0x08,0xfe,0x7b,0xaa,0x15,0xf0,0x35,0x4a,0x68,0x74,0x9d,0xfe,0x05,0x4d,0xe4,0x0a,0x4e,0xc1,0xba,0x84,0x37,0x95
.byte 0x6e,0xd3,0x22,0xd6,0xc4,0x6c,0x57,0xb7,0x0d,0xf9,0x55,0x76,0xec,0x4e,0x4d,0x32,0xd2,0x7f,0xd4,0xec,0x8c,0xff,0x32,0xe9,0xd5,0x83,0x13,0x43,0x85,0x67,0x0c,0x36,0x2a,0x3f,0x6d,0xf4,0xfe,0x4a,0xf8,0xd8,0xd8,0x23,0x77,0x51,0x87,0x0c,0x82,0x70,0x88,0xd8,0x8c,0xe2,0x9a,0x4a,0x9b,0xf0,0xbd,0x56,0xc6,0xa7,0x64,0x65,0xf6,0x61
.byte 0x5e,0xc1,0x8a,0x03,0x36,0xda,0x9f,0x22,0xa1,0xac,0x48,0x91,0x98,0x28,0x33,0x76,0x87,0x0d,0x5b,0x58,0xa3,0x09,0xb3,0xdd,0xcf,0xff,0x12,0x19,0x35,0x66,0x07,0xa7,0x62,0xdb,0x0d,0xd5,0xbd,0x17,0x3d,0x8a,0xb0,0x3e,0x77,0x72,0xf6,0xe6,0xc5,0xb2,0xd6,0x09,0xa8,0xf1,0x7c,0xbb,0x89,0x56,0x3d,0x27,0x37,0x03,0x45,0x68,0x23,0x71
.byte 0x6e,0x13,0xc6,0x12,0xef,0x52,0x69,0x83,0xe4,0x11,0xdb,0x18,0x4a,0x54,0xce,0xf4,0x40,0x33,0x89,0x9a,0x5b,0x6e,0xa4,0xf7,0xa8,0x9a,0x74,0x39,0xff,0x32,0xe4,0xee,0xe0,0xdb,0xf8,0x0c,0x05,0x53,0x55,0x46,0x4d,0xa3,0x9e,0x9a,0x25,0x8f,0x24,0xbc,0xc2,0x91,0xa8,0x80,0x14,0xb0,0xcf,0xb2,0x69,0x75,0x7d,0x1a,0x8e,0x42,0x2e,0x6c
.byte 0x93,0x6d,0xe4,0x49,0x6d,0x8c,0x72,0x16,0xf4,0x36,0x94,0xb6,0x30,0x1d,0x83,0x5f,0x53,0x56,0xb3,0xcf,0x84,0x94,0x1a,0xd8,0x07,0xc9,0x0f,0x0d,0xf5,0xf8,0xd2,0x50,0x8e,0xa9,0x47,0xa4,0x66,0xbf,0xa5,0x2a,0x4c,0x23,0x02,0xac,0xdb,0x1d,0xa5,0xa3,0x04,0xa6,0xaa,0x78,0xf0,0x66,0xc8,0x02,0xef,0x6b,0x8d,0x38,0x8e,0xb9,0x14,0x2a
.byte 0x8f,0x43,0x83,0xb6,0x90,0x64,0x15,0x35,0x36,0x17,0x1e,0xb7,0x98,0x39,0x43,0x73,0xb0,0xfe,0x1e,0x75,0xf5,0xda,0x51,0x7a,0xb5,0x5a,0x6e,0xa4,0x68,0xbc,0x84,0x19,0x7a,0x6f,0xe3,0xf4,0x05,0x1f,0x3c,0x4a,0x18,0x7d,0x97,0x9a,0xcb,0x9b,0xe1,0x53,0x90,0xaa,0x37,0xcc,0xf5,0x1d,0x39,0xa6,0x7e,0x3a,0x47,0x75,0x70,0x97,0xa1,0xb1
.byte 0x8c,0x8d,0xb2,0xb0,0xa3,0xdd,0x4f,0x44,0xaf,0x47,0xc2,0x44,0x06,0x61,0x2a,0x40,0x87,0x9e,0x98,0x0f,0x2f,0xe7,0xb4,0xf9,0xd3,0x02,0x71,0x15,0x50,0x43,0x64,0x2c,0xbb,0x55,0xc8,0xc7,0x1d,0xc5,0xb5,0xd7,0xd9,0xea,0x12,0x5e,0xf5,0x97,0xf0,0xa0,0x30,0x88,0x73,0x44,0x6e,0xe6,0x3a,0xbd,0x1c,0x0e,0xee,0xe4,0xc4,0x8c,0xb6,0xcd
.byte 0x6a,0x95,0xf4,0x93,0xa1,0x30,0xe8,0x10,0x76,0x8d,0xc8,0xba,0x1b,0xd0,0xba,0xe9,0xe1,0x0a,0x67,0x99,0x0a,0xbd,0xa0,0xa3,0x14,0xd9,0x20,0xdf,0x9e,0x12,0x71,0x29,0x9d,0xd8,0x88,0x91,0xb6,0x30,0xe7,0x38,0xdb,0x77,0xcd,0xcb,0x9b,0xa6,0x58,0x64,0xf8,0xc7,0x41,0x3c,0x4f,0xc8,0x64,0x1c,0x5d,0x87,0xdf,0x38,0x2a,0xd3,0x96,0x83
.byte 0xcc,0xe4,0x8d,0xdd,0x27,0xfb,0x9d,0x23,0x1c,0xbc,0x2a,0xf1,0xce,0xb2,0x63,0xf8,0x52,0xd3,0xfc,0x8f,0xe4,0x72,0x88,0xd6,0xdb,0x27,0x10,0x96,0xd6,0x05,0xc3,0xd9,0x0c,0x94,0x6f,0xb2,0x9a,0x3b,0x6f,0x3c,0xda,0xfb,0xc8,0x34,0x81,0xf8,0x9b,0x75,0x24,0x1b,0x50,0xfa,0xe4,0xbe,0x7a,0xbf,0xfc,0x33,0xdb,0x7f,0x31,0x95,0xd5,0x12
.byte 0x31,0x76,0xe5,0xdb,0x52,0x01,0x83,0x8a,0xeb,0x70,0xc7,0x26,0x71,0xd2,0xec,0xd0,0x05,0x94,0x7e,0x48,0x88,0x1b,0x8b,0xbe,0x0c,0x91,0x43,0x24,0x5a,0x18,0xd3,0xb4,0xd8,0x78,0xde,0x0f,0xe5,0x00,0xd8,0x70,0xd5,0xf6,0xe2,0x91,0x7a,0x6e,0x8c,0x8c,0x5d,0x07,0x27,0x3f,0x73,0x75,0x47,0x20,0x8a,0xb8,0x4f,0xe9,0xe6,0xad,0xcf,0x63
.byte 0xdf,0xcd,0xa4,0x27,0xde,0xb7,0x8b,0x30,0xec,0x29,0x2c,0x87,0xe1,0xf3,0xd9,0x05,0x44,0xfd,0x36,0xf3,0x70,0xe3,0x55,0x9a,0xf9,0x04,0x8c,0xc2,0x3a,0x9f,0xbb,0x07,0x7f,0xed,0x6f,0xdb,0x1f,0x7a,0xd2,0x6c,0x54,0xa5,0x18,0xe5,0x83,0x00,0xd4,0x51,0xee,0x67,0xbc,0xf6,0x17,0x2d,0x4e,0xe2,0x89,0x94,0x5a,0x5b,0x90,0x13,0x14,0x19
.byte 0xdc,0xaf,0x3f,0x09,0x45,0xd1,0x6b,0x40,0x48,0x6f,0xee,0x1c,0x9b,0x92,0xa0,0xf1,0x32,0x34,0xd5,0xd5,0x7f,0xf2,0x55,0xbd,0xd8,0x3b,0xc2,0xc5,0x06,0x37,0x29,0xb3,0xdb,0xbf,0xc3,0x92,0x1f,0x25,0x38,0xa2,0x76,0xcd,0x5e,0x71,0x49,0x26,0xb8,0xef,0x5e,0x03,0xf4,0x81,0x00,0x0b,0xc9,0x69,0xa1,0xf5,0xa0,0x34,0xdf,0x62,0x0b,0x64
.byte 0x41,0x80,0x78,0x7b,0x89,0x9f,0x19,0x28,0x8f,0x75,0xbb,0x49,0xf7,0x4e,0x2b,0x31,0x4c,0xf9,0x50,0xd0,0x17,0xa4,0xcc,0xe3,0xda,0xe3,0x95,0xf7,0x6b,0x01,0x41,0x11,0xae,0x2f,0x9c,0xdd,0x55,0xb2,0xd5,0x7b,0x99,0x71,0x30,0x5d,0x02,0x8d,0xdf,0xca,0xe9,0xcb,0x84,0x69,0x69,0x30,0x3c,0x2c,0x4f,0x50,0xf7,0x33,0x9a,0x75,0xac,0xe1
.byte 0xc2,0xb0,0x39,0x68,0x41,0xfb,0x30,0xf2,0x3f,0x7d,0xc0,0xde,0xbd,0x11,0xf9,0x09,0x62,0x51,0x05,0x82,0x78,0x80,0xd5,0x4d,0x0b,0x63,0xc0,0x20,0xff,0x01,0x41,0xdc,0x01,0x41,0xd9,0x0d,0xa8,0x68,0xd5,0xa1,0x3d,0x2a,0xf9,0x04,0x09,0x78,0x90,0x86,0xff,0xe6,0xb3,0x25,0x0c,0x29,0x96,0x61,0x4f,0x9f,0x93,0x82,0x1e,0x5c,0x5a,0x50
.byte 0xb5,0x8f,0x8b,0x15,0x62,0x52,0x7a,0xa3,0xaf,0xac,0xbd,0xf1,0x21,0xfe,0x5c,0xc0,0x21,0x54,0x3a,0xba,0xbd,0xee,0xdb,0x92,0xc5,0x2b,0xff,0x4c,0xda,0xa0,0x0d,0x56,0x6c,0x23,0x9b,0x73,0x86,0xee,0xab,0x9b,0xf9,0x67,0xbb,0xf0,0xde,0x97,0xf5,0x1a,0x13,0xaf,0x0e,0x7c,0xe9,0xef,0x78,0xf9,0xd1,0x6b,0x01,0x85,0xa7,0x4e,0x33,0x2e
.byte 0x04,0x21,0x59,0x34,0x57,0x2c,0xe5,0x96,0x92,0x08,0x8d,0xe9,0x44,0xd6,0x37,0x13,0xc8,0x6b,0x28,0x1f,0xbd,0x3b,0x52,0x3f,0x8e,0xa0,0x2e,0x84,0xfc,0xb7,0x8f,0x43,0xbc,0x69,0x47,0xc1,0xf6,0x91,0x0d,0xa9,0xd5,0x7d,0x5c,0x34,0xd8,0x1c,0x6b,0xb7,0x76,0xa9,0xad,0x6b,0x12,0xb4,0xfe,0x42,0x05,0xa2,0xbc,0x22,0xfb,0x1a,0xc6,0x82
.byte 0x4d,0xc2,0x98,0x34,0x5f,0xa0,0xc1,0x18,0x22,0xbe,0xc3,0xaa,0x14,0xd5,0xe9,0x6e,0x7c,0x24,0x19,0x95,0x40,0xeb,0x87,0x9d,0x47,0xd4,0xc8,0x46,0x35,0xf8,0x31,0x75,0xd3,0x21,0x75,0xd9,0x9d,0x09,0xb0,0x05,0x18,0x25,0x09,0x09,0xd1,0x8a,0x85,0x54,0x4b,0x57,0x64,0x42,0xf4,0xa4,0x9e,0x17,0x68,0xae,0xc8,0xa4,0x25,0x56,0xaa,0xa8
.byte 0xf8,0xd9,0xc2,0x3a,0xe9,0x4c,0x25,0x86,0x4b,0x4c,0x5a,0xd7,0x69,0xc5,0xc8,0x3e,0xbf,0x8d,0x7e,0x11,0xbb,0xf9,0x78,0xc1,0xbd,0x14,0x79,0xa4,0x14,0xad,0x78,0x17,0x2e,0x26,0x58,0x69,0xea,0x94,0x8c,0x3e,0xbb,0xac,0x61,0xbb,0x4f,0x90,0x06,0x82,0x6e,0xea,0xd3,0x1a,0xbc,0xbd,0xf0,0xee,0x89,0xc6,0x75,0x1b,0x57,0x09,0xa6,0x3f
.byte 0x8a,0xd4,0x78,0x9b,0x9f,0x99,0xc8,0x9d,0x99,0x1a,0x79,0xb4,0x2d,0x69,0xce,0x3a,0xb7,0x2d,0xed,0xf4,0xe5,0xeb,0x09,0xe6,0x57,0xd3,0x66,0xb2,0xf3,0xfb,0xfb,0xda,0xdc,0xfa,0x1c,0x2e,0xa9,0xd8,0x68,0x5e,0x3d,0x2f,0x2c,0x11,0x2a,0x60,0xb4,0x08,0xa9,0x2d,0x9e,0x41,0x8a,0x02,0x82,0x73,0x58,0x25,0xba,0xca,0x4f,0x46,0x5e,0xbf
.byte 0x86,0xb5,0x09,0xa9,0xde,0x86,0x91,0x47,0x8c,0xa2,0x8f,0xc0,0xc1,0xff,0xc0,0x18,0xdb,0x00,0x5c,0xab,0x20,0xe4,0xbd,0x00,0xaa,0x19,0x32,0x4c,0xf0,0xa7,0x0b,0x8e,0xec,0x91,0x50,0x87,0x8c,0x73,0x68,0xe4,0x47,0xd3,0xd9,0x4e,0x5f,0xc0,0x62,0xd0,0xa4,0x01,0x2f,0xe0,0x1e,0x5a,0x63,0x6b,0xca,0xd0,0xdf,0xda,0x9f,0x89,0xd5,0x73
.byte 0xfb,0x3f,0x98,0x20,0x6c,0x30,0x5a,0xd9,0xa6,0x41,0x47,0x82,0xde,0x2d,0x74,0x3f,0xcd,0x6a,0xe7,0x95,0x99,0x8c,0x52,0xa8,0xf9,0x45,0x29,0x40,0xbf,0x8a,0x3b,0x87,0x74,0x92,0x69,0x69,0x8d,0x41,0x84,0xa9,0x7d,0x44,0xd6,0x1d,0x0e,0xee,0x56,0xef,0x3e,0xac,0xa9,0x20,0x16,0xaa,0xf8,0xd0,0x21,0xf6,0x16,0x7d,0x4b,0x7f,0x1d,0xcc
.byte 0x5e,0xad,0x25,0xec,0xd9,0x56,0x8a,0x1e,0xc8,0xd5,0x40,0xb5,0x21,0x48,0xbe,0xfe,0xfa,0x4e,0x3c,0x88,0x7f,0x59,0xcd,0x40,0xe5,0xd8,0xac,0x98,0xde,0xba,0xd9,0x6a,0xbe,0x7b,0x07,0xd7,0xfb,0x0f,0xd3,0xb9,0x14,0x6a,0x85,0xcb,0x99,0x6f,0xd9,0xb5,0x22,0x78,0xab,0xa4,0x42,0x6b,0x33,0x4f,0x3c,0xfd,0xcd,0xe1,0x68,0x73,0x08,0x66
.byte 0x34,0xe8,0xa5,0x51,0xfd,0x6f,0xdc,0x84,0x77,0x67,0x2e,0x07,0x1b,0xb4,0xc8,0xda,0x22,0x24,0xab,0x61,0x85,0x17,0xd8,0xa1,0x50,0x28,0xd0,0x3b,0xd6,0xb3,0x6a,0x7a,0x08,0xba,0x34,0x49,0x47,0x1c,0x1a,0x4a,0xd1,0x7e,0x6b,0xdb,0x74,0x26,0x9c,0x0a,0xbd,0x3d,0x29,0x93,0x81,0x02,0xd3,0x08,0x20,0xb5,0x56,0x0b,0x3d,0xf2,0xf3,0x31
.byte 0x6f,0x28,0xe2,0x61,0x81,0x17,0xbc,0xcd,0x7b,0xaa,0x49,0xb9,0x74,0xb5,0x88,0x6a,0xce,0xe3,0x6b,0xbe,0xa8,0x08,0x9c,0xf4,0xe2,0xe7,0xf4,0xfa,0x5b,0x89,0x9c,0xaa,0x12,0xdb,0xd0,0x54,0x1e,0xb7,0xa3,0x66,0x56,0xf8,0x58,0xb5,0xe7,0x5b,0x04,0xb4,0x12,0xb4,0x85,0xfd,0x22,0xde,0x8f,0xc8,0x60,0x1d,0x84,0xc7,0xae,0xae,0xbd,0x63
.byte 0x0a,0x17,0xae,0x64,0x1e,0x31,0xaa,0xdd,0xd7,0xf4,0xe4,0xf7,0x3b,0x00,0x42,0xde,0xa6,0xc6,0x77,0x75,0xa7,0xbd,0x3b,0x92,0x97,0x10,0xad,0x5a,0x9a,0x40,0xa3,0xbb,0x5a,0xe0,0x4e,0x10,0x94,0xa7,0xbd,0x6f,0x0f,0xbe,0xc2,0xd9,0x7d,0xf9,0x5e,0x8c,0xfe,0x1b,0x6f,0xb9,0xd0,0xa8,0xfd,0x8f,0x21,0x69,0x1e,0xc5,0x55,0xa4,0xe8,0x4b
.byte 0x99,0x5c,0x35,0xba,0xc9,0x93,0xf0,0x59,0x9e,0xd9,0x1b,0x1d,0xcd,0x0f,0x8b,0xcc,0x55,0x34,0x2e,0xee,0x06,0xaa,0xb4,0xce,0xc1,0xc3,0xb3,0xa3,0x54,0x9b,0x21,0xdf,0xc3,0x3b,0xe5,0x4e,0x89,0x0a,0x81,0xfa,0x3e,0x08,0x66,0xe5,0x2a,0x08,0x60,0xba,0xdf,0xe1,0x81,0x98,0x7b,0xba,0xd3,0x00,0x00,0x3d,0xbc,0x3c,0x5f,0x94,0xa0,0x25
.byte 0x63,0x66,0x52,0x0d,0x20,0x06,0x6e,0x59,0xbf,0x06,0x0a,0xf9,0xd0,0xbe,0xfb,0x31,0x41,0x22,0x36,0x27,0x4f,0xd1,0x16,0x8d,0x29,0xc8,0x2e,0x76,0xae,0xc6,0x26,0xa5,0x35,0x56,0x78,0x75,0x84,0x5b,0xcf,0xc1,0x0a,0x69,0xe4,0x53,0x62,0x6e,0xc7,0xb3,0x0c,0xdf,0xe0,0xb6,0x38,0x8b,0x6f,0x76,0x05,0x80,0x84,0xf8,0xe9,0x9e,0x86,0xf6
.byte 0xcb,0xe0,0xdd,0x7c,0xde,0xab,0xe6,0xbf,0x9d,0x44,0x55,0x3a,0x71,0xc5,0x91,0x07,0xef,0x50,0x23,0x14,0x5d,0x80,0x6b,0x07,0x55,0xba,0x76,0x77,0x31,0x85,0xf7,0x8a,0x1f,0x34,0xba,0x87,0x10,0x53,0xb6,0xec,0x09,0x7a,0x30,0x91,0x1b,0x4e,0x82,0x5d,0x53,0x51,0x88,0xfe,0x2a,0x40,0x63,0xd1,0x0b,0x14,0x51,0x0f,0x15,0xb6,0x2a,0x38
.byte 0x62,0x72,0x27,0x18,0x80,0x6b,0x7f,0x73,0x4c,0xcf,0xde,0xaa,0x5f,0x33,0x43,0x12,0x37,0x8c,0xc5,0xab,0xf0,0x7e,0x69,0xaf,0xc8,0x84,0x7a,0x1b,0x13,0xce,0x17,0xb0,0x67,0xb2,0x83,0xdb,0x1b,0x71,0x67,0xd6,0x86,0x3d,0xa5,0xfc,0x51,0xc9,0xcf,0x94,0x9a,0xaa,0x8a,0xf8,0xff,0x44,0x9c,0x80,0x73,0x35,0xd1,0x8c,0xb4,0x78,0xc1,0xcc
.byte 0xb9,0xd5,0x02,0x28,0x44,0x85,0x8b,0x4b,0x74,0xc2,0x2b,0x60,0xa1,0xbf,0x5d,0xe5,0x98,0xec,0x24,0x8a,0x68,0xf3,0xa2,0x37,0x0b,0xbc,0xbb,0x5d,0xe0,0x87,0xe9,0xec,0x9f,0x9f,0x6e,0x62,0x7f,0x0a,0x11,0x41,0xa4,0x1d,0x1e,0xde,0x45,0xe8,0x3e,0x05,0x73,0xd7,0xe3,0x53,0xb6,0x7f,0x94,0x13,0xef,0x33,0xfa,0x91,0x94,0x1c,0x3d,0xe8
.byte 0xb9,0xb3,0x0e,0xff,0xda,0x17,0x49,0x15,0x51,0x59,0x05,0xef,0x16,0xf5,0x10,0xcf,0x88,0xdd,0x1f,0x6d,0xe9,0x53,0xc2,0x13,0xe4,0xb3,0x01,0xff,0x75,0xe6,0xa9,0x4d,0x46,0x0c,0x79,0x76,0x4a,0xa2,0xf0,0x38,0xa0,0x89,0xda,0x92,0x79,0x22,0xa3,0x46,0xb6,0x7f,0x04,0xae,0xfc,0xa0,0xdc,0xf1,0x40,0xe6,0x46,0x0b,0x1e,0x37,0x00,0xae
.byte 0x61,0x4d,0xb5,0x7f,0x7e,0x00,0x6c,0x94,0xea,0x89,0x94,0x30,0x8b,0xa5,0x2f,0x6a,0xcb,0x0d,0x08,0xd4,0x50,0xf4,0xa0,0x1e,0xf8,0x83,0xd3,0x25,0xb7,0xcd,0xc2,0x29,0x1a,0xc0,0x34,0x1d,0xeb,0xc9,0xcc,0x9a,0x8d,0x66,0x36,0x05,0xa0,0xc2,0xee,0x0e,0xe5,0x8c,0x41,0xc0,0x55,0xfd,0x2a,0x9f,0x30,0x09,0x08,0x94,0xb1,0xc6,0x79,0xae
.byte 0x4e,0xbe,0x84,0xdb,0xe4,0x81,0xce,0x0c,0x44,0xb6,0x33,0x6c,0xcd,0x6f,0x91,0x36,0x28,0x5b,0xe3,0x60,0x3e,0xfe,0xc5,0x4d,0xee,0x89,0x70,0x57,0xf0,0xba,0x74,0xcb,0xcb,0xb8,0xf3,0x91,0x74,0x97,0xe3,0x2d,0x8c,0x75,0x6c,0xa9,0xa5,0x27,0x36,0x90,0x2e,0x41,0x19,0xdd,0x37,0xbe,0x2b,0xef,0x1f,0x75,0x8f,0x14,0xcc,0x94,0x9d,0xa7
.byte 0xef,0x1e,0x62,0x93,0xdb,0x2b,0xa8,0xef,0xf5,0xe8,0xbd,0x11,0x2e,0x59,0xd6,0x81,0x42,0x2b,0x90,0xe0,0xcc,0xb5,0x0b,0xf4,0xb6,0xcb,0xc9,0xc7,0xe5,0xc4,0x9d,0x70,0x40,0xa8,0xf0,0x24,0xb8,0x57,0xcf,0x4a,0xfa,0xf8,0xc0,0x97,0x0f,0x84,0xd0,0x59,0x5c,0x86,0x9e,0xfd,0x39,0x54,0x13,0x00,0x0d,0xb7,0xb0,0x8b,0xf7,0x75,0xb8,0xef
.byte 0x6f,0xcf,0xc1,0xec,0x5a,0x3d,0xf4,0x0d,0x74,0xa3,0x81,0x7e,0x71,0xe1,0x67,0xf3,0x5a,0xde,0xe8,0xea,0xe3,0x18,0x7f,0x85,0x4d,0x0f,0x2c,0xbe,0x59,0xfa,0x97,0x1c,0xd5,0x6c,0x97,0x8a,0xfe,0x97,0x7c,0x47,0x2a,0x8f,0x8a,0x8d,0x84,0x61,0x0d,0x5c,0x8f,0x72,0x2e,0x89,0x50,0xff,0x85,0x40,0x6f,0x03,0x1f,0x15,0x47,0xf5,0x5f,0x3a
.byte 0x52,0x26,0xbd,0x04,0x82,0x8c,0xee,0x22,0x23,0x84,0x6b,0x7d,0x35,0x28,0x2d,0xa9,0xaf,0x89,0x30,0xc3,0x8a,0x8c,0xbf,0xc3,0xa5,0x34,0x73,0xbe,0xaf,0x29,0x3c,0x26,0xed,0xa9,0x53,0x5e,0x1c,0x54,0x51,0xd5,0x20,0x34,0x4a,0x93,0x0d,0xd3,0xaa,0x26,0x37,0xce,0x5d,0x12,0xb7,0xea,0x80,0x38,0x5d,0x46,0x0b,0x72,0x63,0x5a,0x0f,0x08
.byte 0x9a,0x65,0xdf,0xa4,0xb7,0xe5,0x24,0x8f,0x08,0xb1,0xed,0x5a,0x0d,0x78,0x2c,0xa9,0xf3,0xee,0x6a,0xf8,0x73,0x39,0x61,0x6d,0x50,0x61,0x23,0x88,0x82,0x28,0x91,0xdb,0xbb,0xae,0x9c,0x39,0xe2,0xc2,0xe7,0x42,0xef,0xf9,0xdb,0xa7,0x32,0x19,0x98,0x0d,0xbb,0x67,0x68,0xe9,0x68,0x17,0xb2,0x54,0xf7,0xec,0x0c,0x35,0x05,0x76,0x73,0x26
.byte 0x79,0xb5,0x6d,0xc6,0xc8,0x84,0x80,0x84,0xf9,0xbb,0x95,0xfb,0x39,0xf9,0xaf,0x2d,0xb5,0xd6,0x72,0xad,0x77,0x35,0x09,0x32,0xaf,0xcc,0xc3,0x62,0xd9,0x02,0x33,0x1c,0x9f,0xc0,0xf1,0x18,0x54,0xdf,0xaf,0x0b,0x94,0x52,0xab,0xac,0x7e,0x62,0xab,0x07,0x11,0x83,0xe5,0x7b,0x1e,0xb5,0x3d,0xa3,0x8a,0xdc,0x43,0xf4,0x9c,0x39,0x3a,0x72
.byte 0x01,0x94,0xe5,0xfd,0x0a,0x3d,0x64,0x73,0x56,0x37,0x14,0xc6,0x7b,0x1d,0x81,0xd2,0x62,0x8f,0xe9,0x5f,0x8e,0xb8,0xb4,0xfa,0xfb,0x36,0xa1,0x63,0xe6,0x89,0x87,0x0c,0x87,0x2b,0xa9,0x5f,0x97,0x29,0x0c,0xd2,0x19,0x91,0x83,0x46,0x1f,0x93,0xdb,0x89,0x2c,0xf6,0x32,0x46,0x8b,0x47,0x52,0xad,0x86,0x74,0xda,0x26,0x71,0x6c,0xf4,0x25
.byte 0xa6,0x57,0x89,0xa4,0xd5,0xd8,0x67,0xf7,0x49,0x2a,0xd8,0x6b,0xb9,0xd7,0x97,0xf7,0x66,0xfd,0xf8,0xc2,0x39,0x5f,0xac,0xd3,0xab,0x84,0xac,0x1b,0x6c,0x04,0x00,0xe6,0x0b,0x5e,0xe8,0xc0,0xa3,0x5e,0xe5,0x83,0xb2,0x6a,0x97,0x0e,0xb0,0xa6,0x13,0x77,0xb2,0xc4,0xbb,0x2c,0x27,0x3c,0xca,0x41,0xc4,0x43,0xda,0x92,0xa8,0x0d,0xc8,0x09
.byte 0x8e,0x84,0x46,0x9a,0xd5,0x88,0x3c,0x85,0x3a,0xcd,0x27,0xd3,0x0c,0xaa,0x29,0x74,0xeb,0x3d,0x7d,0x10,0x03,0xc4,0xa7,0x95,0x90,0xb6,0x95,0xf2,0xe4,0xc4,0x35,0x3c,0x9f,0x1b,0x6d,0xd4,0x4e,0xdd,0x44,0xb3,0x59,0x5a,0x75,0xc7,0x2b,0x82,0x3e,0x71,0x34,0x97,0x16,0x86,0x83,0x26,0x2c,0x23,0xc8,0x92,0x3c,0xfe,0xaf,0xcf,0x7c,0x8f
.byte 0x0d,0xe7,0x8a,0xa2,0x55,0x56,0x20,0xa3,0xdf,0x5b,0x77,0x08,0xbe,0x3d,0x5c,0x07,0xfe,0xb9,0x14,0xd7,0xec,0x30,0x41,0xcc,0x17,0x4f,0x63,0x34,0xad,0x7d,0xe7,0xac,0x36,0xb6,0x1c,0xc7,0x10,0xc0,0x5a,0x18,0xe0,0xc1,0x50,0x6b,0xb0,0x91,0x11,0xa7,0x02,0x4c,0xdf,0x1f,0x62,0x0e,0xa3,0x3e,0xd0,0xc3,0xbf,0x27,0x6a,0xe3,0xde,0x36
.byte 0x19,0x06,0x4f,0x53,0x5d,0xd3,0x94,0xac,0x4b,0x28,0x72,0x46,0xd8,0x17,0xd8,0xf1,0x47,0xcb,0xd7,0x8d,0xdd,0x85,0x57,0x23,0xf6,0x9d,0x53,0x8f,0x67,0x02,0x68,0x9b,0xf2,0x8e,0x23,0xce,0x27,0xbe,0xef,0xc0,0xd1,0x0d,0x49,0xae,0x4d,0xd3,0xa1,0xc6,0x54,0xfa,0x38,0xc0,0xf7,0xc2,0xb0,0x5c,0xd9,0x6c,0x92,0xb8,0x37,0x91,0xfc,0xf6
.byte 0x52,0x2d,0x3a,0x48,0x92,0xdb,0xcd,0x8e,0x7b,0xa6,0xe7,0xe0,0x27,0x77,0xda,0x0d,0x34,0xff,0x33,0xe2,0x26,0xc2,0xfa,0xea,0x50,0xdd,0x13,0x05,0x7c,0x79,0x40,0x05,0x69,0x31,0x4e,0x32,0x73,0x67,0x21,0x5f,0x18,0xc1,0x18,0x1b,0xea,0x19,0x24,0xc7,0xa3,0x55,0x44,0xcc,0xd3,0x5e,0x83,0x4e,0xea,0x3f,0xc6,0x58,0x9f,0x0b,0x0e,0xc6
.byte 0x29,0x00,0x98,0x99,0xc8,0x71,0xab,0x55,0x77,0x1f,0xdc,0xd0,0xab,0x78,0xd7,0x9b,0x37,0x8f,0x35,0xc0,0x64,0x41,0x6b,0x2c,0x07,0x43,0x0a,0xc3,0x4d,0x8f,0xdc,0xa2,0x18,0x94,0xe3,0xd0,0xc3,0xb2,0xd2,0x84,0xe3,0x12,0x4b,0x31,0x20,0xcb,0x10,0x8b,0x74,0x57,0xf5,0x30,0x29,0x5e,0x37,0x8c,0xc7,0xb7,0xda,0x47,0xc7,0xca,0x59,0xf5
.byte 0x6d,0x61,0x32,0x90,0xb3,0x85,0x2f,0xf8,0x1d,0x5d,0x82,0x2d,0x4a,0x93,0xb9,0x8a,0xbb,0x84,0xce,0x19,0xa4,0x8a,0xa5,0xfc,0x4e,0xa4,0x4c,0xa7,0x54,0x79,0x3a,0x7c,0x9d,0x32,0x74,0x80,0x63,0x98,0xdc,0x78,0x8a,0x0e,0xe8,0x79,0xa3,0x51,0x7b,0x1c,0x4c,0x5a,0xe6,0x3d,0x3f,0x68,0xd4,0x9b,0xc8,0xc2,0x96,0x82,0x5f,0x3c,0xab,0x1c
.byte 0xb8,0x09,0xfe,0xa1,0x2d,0x95,0x8c,0xf3,0x74,0xa4,0xb6,0x6d,0x96,0xa8,0x81,0xcc,0x0a,0x46,0xaf,0xce,0xfb,0xb3,0x6a,0x18,0x68,0xc0,0x73,0xc8,0xe7,0x3b,0x3f,0x55,0xda,0xde,0x69,0x1f,0x8d,0x2b,0xd4,0x9f,0x63,0xed,0xde,0xe5,0x6d,0xae,0xa1,0xdd,0xed,0xbe,0x58,0xc7,0x30,0x30,0x50,0x04,0x45,0x54,0x3a,0x5d,0xbc,0xac,0x33,0x13
.byte 0x41,0x0f,0x07,0x1e,0xec,0x4c,0xf2,0x16,0x80,0x49,0x43,0x5a,0xbd,0xb5,0xc4,0x78,0x61,0x86,0xff,0xa2,0xef,0xbf,0x37,0x1f,0x6b,0xf3,0xaa,0x74,0x3e,0x77,0x63,0x47,0x86,0xd5,0x73,0x44,0xe6,0xf6,0x9c,0xef,0x69,0x5d,0xb6,0xe4,0x64,0x94,0x9b,0x4e,0xdd,0x0b,0x69,0xe9,0x7a,0xfd,0x8a,0x89,0xff,0x2d,0x0e,0x5b,0xdc,0xcd,0x3c,0xdb
.byte 0xec,0xb8,0x0c,0xe0,0x22,0x09,0x63,0xd7,0x50,0xec,0x42,0xa1,0x2b,0x1c,0xd9,0xa6,0xb5,0xd9,0x16,0x38,0x63,0xa8,0x59,0xda,0xe7,0xbb,0x27,0xca,0xbf,0x39,0x61,0xd9,0xae,0x8f,0xbd,0x27,0xa3,0xfc,0x7c,0x10,0x3b,0x5e,0xbc,0xb0,0xc3,0xf1,0x46,0x8e,0x66,0x7d,0xe0,0x5e,0xad,0x48,0x9f,0xfc,0x5c,0xc0,0x85,0xab,0xd2,0x3a,0x6f,0x60
.byte 0x0c,0x5c,0x1b,0xd8,0x66,0xf5,0x87,0xda,0x0f,0xdc,0x39,0xee,0xdf,0x85,0xf7,0xb8,0xfa,0xd3,0xe2,0xbe,0x7a,0x06,0xda,0xf4,0x55,0xb9,0x10,0xfd,0xb6,0xe9,0xe8,0x94,0xf0,0x66,0x17,0xf2,0x87,0x55,0x99,0xa8,0x65,0x23,0x0f,0xf0,0x41,0xe1,0x9d,0xf2,0x03,0xf4,0xa9,0xc8,0x31,0xa4,0x88,0xa9,0x32,0xcf,0x02,0xd3,0x8a,0xdb,0x9b,0x12
.byte 0xa2,0x41,0xea,0x19,0xff,0x2a,0x18,0x53,0xba,0x51,0xb2,0xe3,0x01,0xbf,0xc0,0x45,0xce,0x16,0xb5,0x66,0xd0,0x61,0x4a,0x1d,0xdf,0x8e,0x35,0x9d,0xeb,0x40,0xcc,0xcd,0x0f,0x4f,0x57,0xd3,0xbc,0x44,0x73,0xf9,0x2a,0xf1,0x85,0x1c,0x06,0x5c,0xde,0xa1,0x2d,0xe4,0x68,0xf4,0xc7,0x79,0x5c,0xf4,0xd7,0x33,0x47,0xdf,0xcd,0xa2,0xe8,0x13
.byte 0x7c,0x0f,0xcb,0x81,0x42,0xa6,0x35,0xf9,0x60,0xcb,0xf3,0x6a,0xf8,0x3c,0x8d,0xff,0xb1,0xdf,0x40,0x22,0x86,0xdb,0xd1,0x59,0x05,0x2a,0xbc,0x04,0x87,0xad,0xe9,0xcd,0x45,0x7e,0xa9,0x5b,0x9a,0xad,0x24,0xf0,0x10,0xac,0xdc,0x16,0xa3,0x4c,0x3a,0x17,0x5d,0x79,0xc6,0xc7,0xcb,0xa0,0x6f,0x34,0xb0,0x9c,0x6a,0xc1,0xd3,0x50,0x0b,0xac
.byte 0x2a,0xb1,0xb8,0x96,0xb6,0x82,0xc8,0x71,0xf7,0x34,0x10,0xa3,0x64,0x6f,0x3e,0x2c,0x5c,0x7a,0xec,0x50,0x6e,0xdc,0x65,0x7d,0xb0,0x7d,0xd5,0x9e,0xd0,0x6e,0x78,0xfd,0x6f,0xb8,0x8f,0x07,0xdb,0xf2,0x40,0x9d,0x90,0x7d,0x67,0xf7,0x89,0xa7,0x2d,0x1f,0xf2,0xa9,0xeb,0x3e,0x3e,0x31,0xd1,0xcf,0xec,0xd9,0x32,0x94,0x0c,0x3b,0x24,0xf7
.byte 0xff,0xdc,0x3c,0xe8,0x8b,0x06,0xae,0xc4,0x8b,0x96,0x86,0x97,0xef,0x64,0x53,0xc3,0xf3,0xa4,0xf1,0xfe,0x7f,0xf5,0xb7,0xa3,0x76,0x3b,0x6b,0x91,0x8b,0xbe,0xa2,0xb1,0x76,0xe4,0x50,0x86,0x09,0x2d,0x85,0xba,0x69,0x47,0x9e,0x02,0x13,0x07,0x46,0x9e,0xc5,0x98,0xc5,0xb8,0xd0,0x06,0x97,0x17,0x81,0x6c,0xac,0x90,0x75,0x95,0x03,0xb4
.byte 0x7f,0x76,0x87,0xd7,0x6b,0x76,0xbb,0x93,0xf3,0xe2,0x75,0x8f,0xc3,0x01,0x08,0xbd,0x19,0x1d,0x2f,0x4c,0xee,0x35,0x02,0xd0,0xf1,0x38,0x5e,0xea,0x3d,0x38,0x38,0x9d,0x56,0x38,0xf1,0xcb,0x41,0xc7,0xde,0xbd,0x2f,0xda,0x60,0x58,0x82,0xbf,0xc0,0x46,0xee,0xb2,0xcd,0x6a,0x57,0xf9,0x48,0x9f,0xcc,0xf2,0x15,0x53,0xcb,0xcb,0xad,0xfa
.byte 0xb2,0x65,0x62,0xf1,0x41,0x19,0xac,0xb0,0xc3,0x64,0x4e,0xeb,0x65,0x94,0xae,0x22,0x0e,0x24,0x99,0x9c,0x9c,0xa6,0x45,0xdc,0xa7,0x2e,0xd6,0x1b,0x76,0x37,0x42,0x98,0x59,0xb1,0x16,0x7a,0xd7,0xa5,0xd1,0x53,0x58,0xec,0x6e,0xbe,0x5d,0x98,0x37,0x06,0xda,0x5d,0xf7,0xbe,0xa9,0x78,0xb3,0x5a,0x96,0x44,0xa5,0x3a,0x9f,0x08,0x29,0x3b
.byte 0xff,0xc5,0x74,0xab,0xe7,0x7e,0x87,0x34,0x71,0x3b,0x45,0xa3,0x1a,0xc5,0x34,0xe7,0xe6,0xff,0xb7,0x27,0xe7,0xf9,0x91,0x9a,0x6d,0x0e,0xb5,0xfd,0xba,0x33,0xa9,0xd5,0xd7,0x2a,0xd2,0xb3,0x51,0x43,0x86,0x37,0xeb,0x06,0x23,0x31,0xfa,0x85,0x8b,0x4f,0x68,0x81,0xaf,0xf4,0x9c,0x6f,0x04,0x35,0x19,0x78,0xf0,0xd2,0xdb,0x2f,0xf5,0x35
.byte 0x62,0xe5,0x31,0xfc,0xfc,0xff,0x0f,0x7b,0x1d,0xde,0xb8,0xb0,0x8c,0x83,0x8a,0xc2,0x9d,0x0e,0x50,0x2a,0x58,0xe8,0xeb,0xbf,0x51,0x50,0xf1,0xec,0xb9,0xad,0x07,0x1b,0x51,0xa3,0xe1,0x68,0x33,0x4d,0xfd,0xaf,0xd5,0x3c,0x25,0xc6,0x95,0x8f,0xf4,0x5f,0xa9,0xde,0x5a,0xa6,0x5a,0x5f,0x3e,0xeb,0x47,0x91,0x1c,0x5d,0x3f,0x8f,0x23,0xeb
.byte 0x30,0x89,0x2b,0x3c,0x48,0x4f,0xa8,0xab,0x09,0x6a,0x8a,0x75,0x3e,0xb0,0x83,0xd9,0x44,0x60,0xb5,0xd4,0x2e,0x21,0x7f,0x24,0xec,0xfc,0xd2,0x6d,0xd6,0x90,0xf4,0x1b,0x52,0x03,0xd9,0x7a,0x48,0x0b,0x32,0x40,0x70,0xc3,0x63,0x8d,0x6d,0xc7,0x23,0xea,0xf9,0x17,0x49,0x1f,0xfe,0xe5,0x50,0xbe,0xab,0x82,0xc9,0x31,0x30,0x28,0xc8,0x40
.byte 0x37,0xfe,0x9f,0x37,0xdc,0x7c,0x54,0xc7,0x02,0xf1,0xa4,0x1e,0xdd,0x52,0x11,0xa5,0xb9,0x71,0xfd,0xb8,0x41,0xed,0x82,0x1e,0xc7,0x57,0xed,0xf8,0x80,0x5d,0x92,0x49,0xfc,0x0b,0x24,0xdb,0xa7,0x97,0xbb,0xf9,0x4a,0x06,0xd8,0x4d,0x3d,0xbc,0x8d,0xe0,0x42,0x7d,0x5f,0xf9,0xa7,0x46,0xe8,0x10,0xed,0x89,0xe4,0x68,0x8e,0x1a,0xdb,0x29
.byte 0x9d,0x59,0x22,0x2d,0xe3,0x40,0x8d,0x4b,0x5b,0x6e,0x72,0xde,0xd1,0xd3,0x83,0x02,0x0e,0x7a,0x53,0xe1,0xd2,0x98,0x15,0x6e,0xdd,0x52,0xeb,0x91,0x12,0x0a,0x12,0xb1,0xd0,0xef,0xa1,0x92,0x4d,0x53,0x84,0xfd,0xf8,0x00,0xc6,0xee,0x8e,0xf1,0x07,0x78,0x31,0xdc,0x13,0x3c,0x97,0x63,0xf2,0xfe,0x24,0x3f,0x25,0x3d,0xb0,0xcf,0xa5,0xe8
.byte 0xf1,0x92,0x93,0x13,0xd7,0x9a,0x9d,0x64,0x62,0xb8,0x7d,0x83,0x6e,0xc6,0x1d,0x72,0x7f,0xd4,0xe9,0x24,0x32,0xe4,0xad,0x0d,0x2d,0x77,0x3d,0x19,0xc6,0x4c,0xb2,0xd8,0xe8,0xd0,0xda,0xef,0x13,0xa7,0x9b,0x1d,0xf5,0xea,0x36,0xdb,0xcd,0xcb,0x5c,0xdb,0xb6,0x77,0x8b,0x3e,0xbc,0x9e,0xf5,0x91,0x18,0x77,0x8c,0x62,0x18,0x43,0xbe,0xee
.byte 0x79,0xff,0x2d,0x4e,0x69,0xe3,0xf2,0x19,0x9b,0x26,0x85,0x1c,0x71,0x50,0x31,0x33,0x15,0x0a,0xa1,0x0e,0xff,0xca,0xe6,0x32,0x7a,0x5b,0x22,0x8e,0x4d,0xf3,0x2a,0xa3,0x2b,0x73,0xda,0xaf,0x60,0x48,0xa0,0x13,0x09,0xb2,0x93,0xbd,0x8f,0x22,0x7c,0xfb,0x67,0xc1,0x37,0x4e,0x41,0xa7,0x08,0x6c,0x61,0xd1,0xab,0x66,0x44,0xcf,0x98,0x37
.byte 0xe5,0x82,0xdc,0x0d,0x8c,0x77,0xe0,0x69,0x0f,0xa7,0x84,0xcc,0xd1,0xcf,0x08,0xf5,0x14,0xa0,0x87,0x30,0x59,0x37,0xbe,0x53,0xbb,0x1c,0x24,0x8d,0x2d,0xbc,0x9d,0x08,0xc0,0x17,0x61,0xdd,0xe3,0xbe,0xdc,0xfc,0xf7,0x32,0xd9,0x6f,0x48,0xf2,0x37,0x2a,0x68,0x59,0x45,0x1c,0x0c,0xb1,0x78,0x0e,0xf3,0x95,0x49,0x7a,0x2f,0x2c,0xfe,0x80
.byte 0x32,0x69,0xed,0xa5,0x99,0x70,0x96,0xe0,0xd5,0x94,0xce,0x14,0x91,0x30,0xcb,0xb5,0xdb,0x54,0x3b,0xb5,0x04,0x71,0x97,0x00,0x53,0x62,0x9e,0x68,0x38,0xf6,0x1b,0x01,0xd8,0x45,0x23,0x64,0x24,0xe6,0x3a,0xdc,0x39,0x87,0x31,0xdc,0x97,0x58,0xe5,0x24,0x10,0xa6,0xa6,0x3c,0xd5,0x90,0x6e,0x1e,0x55,0xdd,0x4f,0xe3,0x05,0x58,0x9a,0x88
.byte 0x1b,0xbb,0x8d,0x21,0xd6,0xb2,0x2c,0x30,0x33,0x0c,0x43,0x98,0x72,0xad,0xc4,0x71,0xf8,0x97,0x61,0x7b,0x9b,0x70,0x1e,0x71,0x55,0xad,0x53,0xf2,0xfe,0x23,0x3c,0xda,0x84,0x37,0x11,0x47,0xa7,0x70,0xb5,0x0b,0x97,0xbe,0xd8,0x9b,0x69,0x71,0x52,0xfc,0x60,0xec,0x94,0x7a,0xc0,0xa7,0xdb,0x31,0x5d,0x19,0xde,0xc0,0xff,0x14,0xb7,0xc7
.byte 0x74,0x8b,0x65,0x33,0x31,0x4c,0x63,0xf5,0x96,0x08,0xc2,0xf5,0x56,0x3b,0x15,0xbf,0x39,0x1b,0x6b,0x59,0xe5,0x39,0x56,0xb6,0x57,0x7a,0x2b,0xcd,0x46,0x9c,0xd1,0x0e,0x49,0xe1,0x9f,0x07,0x0f,0xea,0xd5,0xb9,0x27,0x76,0x04,0x09,0x92,0x6d,0x37,0x78,0x36,0xd7,0xf8,0xa0,0x96,0x88,0x8c,0x3f,0xff,0x88,0x95,0x85,0x14,0x24,0x82,0x85
.byte 0x47,0x68,0x58,0x11,0xd0,0x21,0x5e,0x1a,0x61,0xe3,0x0f,0x3f,0xd3,0xea,0x14,0xb9,0xd6,0x98,0x10,0x7f,0x38,0x00,0xf5,0xd1,0x73,0xc0,0x71,0x7e,0x75,0xbb,0x5c,0xcc,0xf0,0x83,0x48,0x89,0x16,0xbf,0xd1,0x82,0x36,0x13,0x5d,0x05,0x43,0x18,0xb9,0xf1,0xd4,0xa3,0xcf,0xb3,0x24,0xe8,0x74,0x91,0xee,0x27,0x7c,0xe0,0x20,0xa8,0xde,0x4e
.byte 0x7d,0x26,0xef,0x61,0xae,0xe3,0xa9,0xd3,0xde,0xfb,0x37,0xc2,0x06,0xbc,0x1e,0x4d,0xbf,0x3b,0x56,0xca,0x03,0x9f,0x82,0x44,0xfa,0x7c,0x1d,0xa6,0xbd,0xd8,0xcf,0x2f,0x08,0xc9,0x73,0xf3,0x0b,0xf3,0xd8,0xb7,0x93,0xd3,0xd4,0x8b,0xc1,0xce,0x4e,0x88,0xb6,0xd0,0x7e,0xbe,0x7f,0x9f,0x8e,0x98,0xa0,0xf4,0xc1,0x9a,0x65,0xe9,0xe5,0xf2
.byte 0xb5,0xbc,0x64,0xa8,0xdc,0xf0,0x00,0x59,0xc9,0x83,0xbf,0x33,0x54,0x6b,0x12,0xfc,0x61,0xc3,0x2d,0x53,0xfa,0x24,0x39,0x83,0x3a,0x8f,0xaa,0xf8,0xbd,0xff,0x74,0x15,0x10,0x3a,0x3b,0xc7,0x72,0x20,0xed,0x1a,0x79,0x0c,0x12,0xaf,0xb6,0x00,0x54,0x05,0xd7,0xde,0xe2,0x00,0x4f,0x96,0x9c,0xab,0x77,0x71,0x65,0xe1,0x2d,0xee,0x2f,0xbd
.byte 0x4e,0x9a,0x0f,0xe9,0xca,0x4f,0x4c,0xdd,0xb8,0x22,0xdb,0x1c,0x5f,0x49,0x8e,0x69,0x3c,0x70,0x79,0xc1,0x20,0xd8,0xda,0x61,0x55,0x0a,0x0e,0xd0,0xb5,0xfb,0x1c,0x56,0xd2,0x85,0x82,0x7b,0xb0,0x58,0xdc,0xf0,0x8b,0x0c,0xfa,0x0c,0xce,0xe3,0x15,0x8b,0x68,0x49,0x09,0x0c,0x9b,0x80,0x17,0x92,0x19,0x08,0xe2,0x7b,0x3e,0x60,0x96,0xc3
.byte 0x81,0x5b,0x4d,0x63,0x04,0x47,0x0e,0xff,0x43,0xb1,0x71,0xb0,0x6c,0x02,0x85,0x2f,0x5b,0xdf,0xba,0xb7,0xe5,0x34,0xb6,0x7e,0xa3,0x74,0xec,0x44,0xe8,0x35,0xc7,0x10,0xa6,0xe6,0x31,0x50,0x29,0x69,0x11,0x91,0x3c,0x31,0x3b,0xb2,0x17,0x21,0xdd,0x92,0x2c,0x71,0x0a,0x45,0xe7,0x7d,0xf0,0x38,0x41,0xa6,0x09,0x72,0xcf,0xbc,0x56,0xff
.byte 0x81,0x79,0xaf,0x68,0x80,0xc5,0xa6,0xb1,0xb7,0x3d,0x0d,0xc5,0x9c,0xb2,0x32,0x7f,0xcc,0x66,0x8d,0x86,0x84,0x38,0xa5,0x66,0x7c,0x4d,0x4c,0xdf,0xa7,0x1a,0x7e,0x66,0x95,0xf7,0x5e,0xe9,0x4c,0x61,0x7a,0x05,0x66,0x78,0xae,0x2b,0xef,0x6b,0x6a,0xc5,0x6d,0xbb,0x35,0xef,0x9f,0x0c,0x1c,0x00,0x45,0x2a,0xad,0x79,0x84,0x8b,0x28,0x81
.byte 0x0d,0xe8,0xef,0x49,0xaf,0x59,0xb0,0x9f,0xec,0x58,0x32,0xc9,0x49,0xb2,0xf8,0xc5,0xae,0x92,0xb8,0xde,0xec,0xc2,0xc4,0xf9,0xc8,0x28,0x99,0x07,0x39,0x71,0xed,0x06,0xcc,0x46,0x14,0xd1,0xf4,0xad,0x8d,0x72,0xa4,0x3f,0xea,0x35,0x6f,0x84,0xa8,0xc7,0xcd,0xfd,0x16,0xf8,0x66,0x16,0xb9,0xd2,0x31,0x57,0x1b,0x5c,0x50,0xec,0x8f,0x15
.byte 0xf8,0x4f,0x65,0xd0,0xdb,0x0f,0x29,0x3d,0x03,0xba,0x7b,0x56,0x95,0xfe,0x97,0x95,0xff,0x8f,0x87,0x3c,0xc5,0x70,0xbb,0x96,0x37,0x69,0xd4,0xe6,0xbd,0xd1,0x93,0x95,0x7e,0x1a,0x80,0xde,0x9f,0x2a,0x00,0x18,0x5d,0xcf,0x8d,0xcc,0x31,0x3b,0xe3,0xc9,0x07,0x20,0xf3,0x87,0xc4,0x62,0x6a,0xc2,0xbe,0x09,0xb0,0x57,0xf7,0x8d,0x56,0x4c
.byte 0x6b,0xb1,0xa8,0x65,0x3c,0xff,0xfa,0x95,0x20,0xed,0xca,0x36,0x3f,0xba,0x5f,0xe1,0x03,0x6e,0xe1,0xbd,0xce,0xa0,0x68,0xaf,0x51,0x65,0x65,0x10,0xfe,0xdd,0xb4,0x33,0x49,0x57,0x69,0x60,0xad,0x8f,0x84,0x88,0xeb,0x0d,0x46,0xf2,0x2b,0x5d,0x79,0x1e,0x42,0xc5,0x9d,0x3e,0xef,0xb9,0x60,0xa9,0xc6,0x34,0x81,0xb5,0x09,0x42,0xf3,0xa8
.byte 0xf0,0x8f,0xc7,0xbc,0x05,0xc8,0xe9,0xa7,0x47,0x15,0xf7,0x41,0xe2,0xe8,0x0a,0x01,0x67,0x18,0xfb,0x63,0x5a,0x37,0xf4,0x45,0xc2,0x2d,0xcf,0xd0,0x28,0xd3,0xc1,0x2b,0x1c,0x8a,0x40,0x64,0xee,0xf6,0x2c,0x2a,0x37,0x26,0xe2,0x3d,0x76,0x27,0xa2,0x92,0x29,0xd3,0x17,0x4c,0x67,0x1b,0x1d,0xe9,0x38,0x1c,0x38,0x36,0xd5,0xa0,0x91,0xc5
.byte 0xae,0x67,0x0c,0xa3,0x1d,0x34,0x11,0xda,0xe7,0x93,0xe0,0xaa,0xa8,0xa1,0x00,0x5d,0x21,0x34,0x90,0x7d,0xff,0x25,0x46,0x64,0x55,0x56,0x1d,0x58,0xf2,0x49,0xa4,0x19,0x1a,0xe7,0x63,0x75,0xac,0x37,0xb3,0xf1,0x3c,0x14,0x46,0xd6,0x33,0x11,0xfb,0x35,0x84,0x34,0xf7,0x0d,0x99,0x49,0x21,0x8c,0x20,0xf0,0x7b,0x0d,0x4e,0x9a,0xc5,0xc3
.byte 0x16,0x1e,0x73,0x06,0xd8,0x1b,0xe0,0x08,0x5d,0x5a,0x78,0x6f,0x5b,0x18,0x85,0x76,0x41,0xdf,0xa1,0x70,0xea,0xab,0xb5,0xa0,0x4d,0x07,0x66,0x0b,0xb8,0x19,0xf1,0xe7,0x3a,0x68,0xac,0xb9,0x06,0x9e,0x74,0x6a,0x20,0xa6,0x47,0x72,0xd9,0x2d,0x80,0x15,0x0c,0xfb,0x58,0x00,0x3d,0x41,0x48,0x3e,0x72,0xf6,0x08,0xdf,0x14,0x72,0x60,0xf5
.byte 0xd4,0x34,0x7d,0x61,0x42,0xa6,0x40,0xdf,0x54,0xc8,0x37,0xa4,0x39,0x4f,0x1e,0x4c,0x1d,0xae,0x0a,0xb3,0xc8,0x8f,0xed,0x42,0xfc,0xce,0x1d,0x4b,0x31,0x49,0x48,0xe6,0xa0,0x2e,0xd5,0x50,0x13,0xdd,0xc8,0x11,0x4d,0x53,0xce,0x5a,0x41,0x30,0xa7,0xfd,0x09,0xd4,0x1e,0xb3,0xd8,0xd4,0x52,0xc1,0xc5,0x65,0x64,0x96,0xf8,0x02,0xdb,0xcb
.byte 0x0e,0xf5,0x28,0xde,0x01,0x34,0x7f,0xe0,0x12,0xdd,0xfa,0x1d,0xda,0xfd,0xdc,0xd3,0xd4,0x87,0x27,0x0f,0x9a,0xb5,0x59,0xe0,0x3f,0xc2,0x38,0xdf,0x13,0xfb,0xdc,0x37,0x54,0xf4,0xf0,0xc8,0xcf,0xd2,0xd1,0xf2,0xf1,0x45,0xf8,0x50,0xb8,0xa6,0xae,0xa0,0x4f,0xaa,0x20,0xc2,0x81,0x2f,0x4e,0xdc,0xc4,0xf3,0x54,0x33,0xf0,0x9f,0x0a,0x75
.byte 0x2d,0xd4,0x43,0x0c,0x1b,0x9f,0xf1,0x82,0x75,0x2b,0x9a,0x6c,0xfd,0xf9,0xa7,0xda,0xa4,0xdc,0xe1,0xd3,0x93,0x14,0x26,0x7c,0x5f,0x20,0x83,0x85,0x38,0xfc,0x87,0xf0,0xbd,0xbd,0xd8,0x80,0xd0,0x10,0x6b,0x23,0xfd,0x52,0x25,0x4d,0xfc,0xfb,0x13,0xb7,0xf7,0xb2,0xed,0xe2,0xd7,0xf9,0x87,0x7b,0x85,0x0c,0xe4,0x6a,0xbd,0xc7,0x59,0xff
.byte 0x7a,0xb5,0xfe,0x8c,0x80,0x16,0x2e,0x43,0xb4,0x90,0xff,0xa9,0x71,0x3c,0xee,0xb6,0xa5,0xaa,0x2e,0xa8,0x97,0x9f,0x0c,0xcc,0x31,0xe8,0x2a,0xd9,0xab,0x60,0x88,0xc2,0x29,0xc3,0x4d,0xc5,0x2d,0xf4,0x40,0xc8,0xfd,0x3c,0xe4,0xf7,0x67,0x35,0xf0,0xb6,0xa8,0x4c,0xec,0x30,0xfd,0x54,0xd8,0x25,0x50,0x8e,0x24,0x61,0x7e,0x54,0x0c,0x5b
.byte 0x88,0xb9,0x70,0xef,0xc6,0xa7,0x23,0xd7,0xb2,0xec,0x3f,0x51,0xce,0x29,0x74,0x35,0xc2,0x32,0xda,0x1e,0x13,0xc2,0x20,0x3a,0x35,0xee,0x40,0xf4,0x00,0x3a,0xf1,0xa4,0xf3,0xd1,0x58,0x57,0xa6,0x83,0xb1,0x01,0x2d,0x15,0x1e,0x08,0xf8,0x9b,0xb5,0x35,0xee,0x33,0xba,0x5b,0x8d,0x26,0x00,0xee,0x95,0xaf,0xca,0x7e,0x98,0xd5,0x58,0x40
.byte 0xb5,0xa2,0x7d,0x8e,0x0e,0x1b,0x72,0x88,0x1c,0x4b,0x52,0x65,0x6e,0x60,0x62,0x46,0x1c,0x41,0x81,0xd2,0x83,0xc0,0x2d,0xbc,0x5d,0x58,0xc7,0xf8,0x43,0xd9,0x11,0x05,0x50,0x6d,0xc2,0x81,0x29,0xac,0xe8,0x44,0xfb,0x2d,0xf3,0xf4,0x17,0x9b,0x01,0xae,0xb1,0x8a,0x61,0xbf,0x20,0x75,0x12,0x3b,0xb4,0xf5,0xc5,0xff,0x5b,0xf5,0xa8,0x6f
.byte 0xec,0x7d,0x04,0x9f,0x63,0xbc,0xb7,0xcc,0xce,0x96,0x7b,0x31,0x09,0x06,0x25,0x90,0x4e,0xd2,0xf5,0x60,0xa3,0x61,0x61,0x8d,0x3e,0x97,0x54,0x24,0x1c,0x25,0x3a,0x2e,0x6c,0xa9,0x97,0xa4,0x69,0xe5,0xdd,0xc1,0xdb,0xb2,0xf5,0xc4,0x8b,0x23,0x20,0xe5,0x68,0x85,0x78,0x08,0x2c,0x95,0x85,0xc5,0x4b,0xf1,0xfa,0xb1,0xf2,0x32,0x28,0x4e
.byte 0x1c,0x7b,0x3d,0xfc,0x59,0x52,0x15,0xd5,0x74,0x86,0xea,0xde,0xd5,0x1c,0x5d,0xcb,0x22,0x4a,0x2e,0xbd,0xb4,0x5f,0x59,0xd6,0xaf,0x49,0x7b,0x0c,0xce,0x78,0x4b,0xc9,0xd2,0x2e,0x22,0x7d,0xe2,0x7b,0x05,0x0d,0xa1,0xca,0x24,0x91,0x11,0xa0,0xf2,0xbd,0x77,0x60,0xe9,0xfe,0x5d,0x5c,0xea,0x88,0xf9,0xbf,0xe1,0x26,0xd3,0x65,0x4a,0xa1
.byte 0xb0,0xbe,0x72,0x49,0xfc,0x96,0xd1,0x4b,0xc9,0xb3,0xe0,0x74,0x0e,0xff,0xb6,0x3f,0xed,0xe1,0xdc,0x92,0xe3,0x65,0xaa,0x14,0x2a,0xb9,0x2f,0xc5,0x7c,0x4b,0x30,0x1a,0xc5,0x85,0xc7,0xa4,0x8c,0xba,0xff,0xf3,0xdc,0xf8,0x75,0x4b,0x35,0x36,0x6c,0x91,0x04,0x28,0x3c,0x94,0xc3,0x23,0xd5,0x89,0xbf,0x88,0x3c,0xc8,0xf2,0xec,0x14,0x3f
.byte 0x5f,0xf3,0x0c,0x6c,0x89,0x10,0xe1,0x6f,0xef,0xcc,0xd1,0x20,0x32,0xe7,0x59,0xd1,0xab,0xe8,0xe2,0x5f,0xa4,0xc3,0xe6,0x85,0x44,0x31,0xed,0x34,0xa7,0xef,0xff,0xb4,0x28,0x07,0x2f,0xc2,0x75,0x7d,0x72,0x80,0xa9,0x56,0xc1,0x6d,0x7e,0x5c,0xb7,0xdb,0x14,0x1d,0x27,0x0b,0xc7,0x5c,0xd4,0x97,0x35,0x29,0x58,0xb3,0xf0,0xd5,0x4a,0xc8
.byte 0x73,0x01,0xbc,0x86,0xb1,0xff,0xc0,0x5c,0x9d,0xc1,0x19,0xbf,0xeb,0x6d,0x60,0x0b,0x8f,0x2c,0xf4,0x90,0x10,0x43,0xe7,0x2d,0x46,0x95,0x1a,0xf8,0x09,0xc8,0x30,0xff,0x98,0xf2,0xd8,0xee,0x42,0xfb,0x44,0x1b,0xd8,0xa7,0x04,0x87,0x83,0xe2,0x5b,0x5b,0x75,0xf3,0xec,0xa0,0x92,0x64,0x48,0x2d,0x53,0xa5,0x3e,0xeb,0x3b,0x1c,0xc7,0xe8
.byte 0x09,0x66,0xae,0xaf,0x94,0x2b,0xf6,0x16,0x9f,0x07,0x01,0x46,0xcf,0xd2,0x0c,0x7e,0x7f,0x0d,0x02,0xac,0x03,0xd0,0xb8,0xa0,0xe8,0xbf,0x5f,0x57,0x07,0x09,0x38,0xde,0xab,0xac,0xe3,0xae,0x59,0x70,0x5d,0xa5,0x32,0x31,0x80,0xb9,0xbb,0x5f,0x8b,0xcc,0xe2,0x2c,0x2e,0x1a,0x78,0xa6,0xf9,0x1b,0x2d,0x7f,0xd4,0xa1,0xf4,0xd8,0x1f,0x35
.byte 0x5b,0x05,0xc9,0x41,0x8e,0x44,0x32,0x00,0xef,0x01,0x42,0x8f,0x16,0xf8,0xc0,0x8c,0x53,0xba,0x95,0xab,0x85,0xa7,0xe0,0x5b,0x28,0x2d,0xee,0xae,0xac,0x68,0xb6,0x2e,0x51,0x60,0x31,0xb3,0x2b,0xec,0x2f,0xe3,0x9b,0x20,0xb7,0x2d,0x21,0x40,0xab,0x64,0xe4,0x0f,0x2e,0x52,0xb3,0x7b,0x0a,0x3a,0x82,0x50,0xa6,0x53,0x37,0x5f,0x4c,0xca
.byte 0x1f,0x68,0x26,0x51,0x2c,0x35,0x4e,0xc9,0x32,0x83,0x7d,0x6c,0xdd,0xd4,0x75,0x58,0xd9,0x6e,0x2a,0x54,0x98,0x94,0xe8,0x5a,0xff,0xcc,0xa5,0x01,0xce,0xc9,0x7c,0xc6,0xd2,0x84,0x74,0x87,0xa9,0x3e,0xb3,0xfb,0x8f,0x7a,0xc3,0x9b,0x48,0xd9,0x91,0x18,0xae,0xa4,0xbe,0xef,0x5c,0xce,0x84,0x14,0xa0,0x8e,0x97,0xd4,0xd8,0xe1,0x3f,0xe0
.byte 0x06,0x3d,0x2d,0x7f,0x76,0x58,0xb0,0x18,0xbd,0x25,0x8c,0x75,0x66,0x9e,0x50,0x3a,0x1a,0x94,0xf8,0x9a,0x9d,0xa1,0x19,0x0b,0x95,0xe0,0xdd,0xbf,0x37,0xa8,0x93,0xf6,0xd0,0x63,0xee,0xc5,0x66,0xec,0xe2,0x2d,0xd4,0x82,0x62,0x22,0xd2,0x05,0x28,0xff,0x62,0x4a,0x93,0x24,0x54,0xa3,0xf9,0xba,0xe2,0x5e,0xad,0x0a,0x54,0x82,0x20,0x95
.byte 0xc6,0xa1,0xd9,0xff,0xaf,0x83,0x14,0x4a,0x00,0xb6,0x05,0x1f,0xca,0x4e,0xb9,0x76,0x87,0x19,0xef,0x7b,0x8f,0x09,0xac,0x28,0x64,0x6e,0xd6,0xa0,0xf3,0xa0,0x58,0xc2,0x51,0xf1,0x9c,0x82,0xb7,0x36,0xfc,0xfb,0x77,0x77,0xad,0x9e,0x9f,0xdf,0xf0,0x12,0xfe,0xa2,0xd6,0x92,0xae,0xbe,0xe6,0xcd,0xc8,0xe7,0x6e,0x14,0xa3,0xcf,0xb3,0x02
.byte 0xaa,0xe2,0x39,0x0e,0x34,0xb7,0x62,0xd5,0x6a,0xcf,0xcb,0x7b,0x2b,0x9e,0xce,0x53,0x86,0xfc,0xe4,0xb6,0xa2,0xd6,0x20,0xe4,0x49,0xa5,0xa5,0x56,0x56,0xff,0x3c,0xc2,0x7c,0xb9,0xee,0x7f,0x92,0x45,0xcd,0x77,0xf0,0xd1,0x8f,0x73,0x2f,0x5d,0x14,0x5e,0x89,0xef,0xae,0xaa,0x7c,0xae,0x1e,0x9a,0xa6,0xea,0x18,0x85,0xcf,0x3a,0x98,0x0f
.byte 0xca,0x59,0xa5,0x35,0x99,0x23,0x2c,0x92,0x4f,0xea,0xf8,0x6e,0xa9,0x1e,0xea,0x12,0x81,0xcb,0x30,0xff,0xfb,0x26,0xfe,0x09,0x11,0x5c,0x3f,0xef,0x7e,0x3c,0x5a,0xf6,0x08,0x49,0xcf,0x4e,0xdb,0xb6,0xf2,0x8f,0xcf,0x10,0x6d,0x84,0x55,0xb3,0xba,0x48,0x7e,0x73,0x2c,0x33,0x4f,0xc5,0xd4,0xe8,0xd8,0x57,0xb3,0x94,0x71,0x30,0x24,0x1c
.byte 0x41,0xda,0xef,0x66,0x0e,0x54,0xec,0xa3,0x4a,0xf4,0x97,0x86,0x7b,0xc8,0x9b,0x75,0x5a,0x47,0x65,0xe7,0x15,0x59,0x3d,0xa1,0xb9,0xe9,0xea,0x76,0x24,0x23,0x8c,0x05,0xc0,0x06,0x6f,0x0b,0xc5,0x6b,0x25,0x24,0x40,0xee,0xa1,0xe1,0x92,0xbe,0x17,0x2c,0x5f,0x68,0xec,0xc1,0xf6,0x4c,0x76,0x7c,0x4a,0xb3,0x7c,0x5b,0xad,0x72,0x66,0x1d
.byte 0x16,0x98,0x92,0x20,0x12,0xa2,0xaa,0xea,0x77,0x78,0xb9,0x3b,0xbe,0x39,0xec,0x61,0x0d,0x8a,0x01,0x98,0x91,0xdc,0xd8,0x4e,0x61,0x73,0x0b,0xe9,0x6a,0x24,0x35,0x11,0x32,0xa1,0x27,0x3f,0x96,0x63,0x2e,0xde,0xab,0x03,0xac,0x1c,0x4b,0xd8,0xe6,0xb4,0x4b,0x3b,0x47,0x32,0x8b,0xf4,0x40,0x92,0x89,0x4e,0xe1,0x63,0x86,0xa6,0x3b,0xb8
.byte 0x94,0x47,0x3c,0x34,0xc0,0x18,0x9a,0x53,0xaa,0x3a,0x64,0x96,0x1f,0x98,0x93,0x13,0x1e,0x44,0x9e,0xcb,0x92,0xc3,0x25,0x17,0xb7,0xe1,0x3e,0x91,0xbd,0x14,0x42,0x33,0xb0,0xf2,0x2f,0xcc,0x40,0x7d,0xac,0x45,0x3d,0xe1,0xe1,0xfa,0x03,0x05,0x0b,0xe7,0x9a,0x26,0x4f,0xab,0xb4,0xe8,0x42,0x9f,0x38,0x81,0xef,0x59,0xfa,0xd1,0x3b,0x27
.byte 0x87,0x23,0x17,0xd0,0xcd,0x25,0xda,0xc9,0x5e,0x21,0x26,0x2f,0x0c,0x33,0x46,0xd1,0xb2,0xf1,0x89,0xad,0xbe,0xe8,0x71,0x37,0xc7,0x27,0x5c,0xaa,0xdd,0x1f,0xd7,0x34,0x31,0x46,0x00,0xd7,0xb5,0x29,0xc2,0x35,0x58,0x07,0x74,0xb0,0x44,0xde,0x08,0x8e,0x51,0x52,0x97,0x8d,0x01,0xe7,0x13,0x18,0x6a,0xd3,0x82,0x2a,0x76,0x67,0x70,0x14
.byte 0x5d,0x1d,0x6b,0xd5,0x8b,0x3a,0x28,0xbd,0x3b,0x13,0xb0,0x43,0xde,0xf3,0x3c,0xc6,0x0f,0x32,0x77,0x7e,0xab,0x28,0xdd,0x8b,0x57,0xab,0xb7,0x65,0x56,0x5c,0x2e,0x05,0x8a,0x3f,0x4b,0xdb,0x22,0xcd,0xfb,0x99,0x06,0x38,0x6e,0x4f,0x7e,0x23,0x54,0xca,0x47,0x2f,0x33,0x18,0x79,0xdf,0x69,0xe9,0x63,0xfb,0x6e,0x9f,0x1a,0xa0,0xc2,0x15
.byte 0xc3,0x5f,0xe8,0xc1,0x35,0x5a,0x60,0xb7,0xd4,0xd4,0x5c,0xc0,0x4f,0x28,0x6d,0xea,0xe9,0xe0,0xa7,0x4a,0xfb,0x66,0x75,0x04,0xae,0xd7,0x30,0x42,0x9b,0x9b,0x0e,0xe8,0x67,0x40,0x8f,0x8e,0x0c,0x39,0xd6,0xa1,0x13,0x69,0x58,0xf3,0x09,0xdf,0x43,0x6a,0x41,0x6c,0x03,0x0d,0xc2,0x38,0x55,0x87,0x7f,0x88,0xed,0x01,0xa6,0x5f,0x1a,0x20
.byte 0xa7,0x7b,0x3a,0x59,0x1f,0x26,0xcc,0x62,0x42,0x48,0xa3,0x60,0x49,0xb0,0x62,0x8f,0xe0,0x66,0x2a,0xa1,0x21,0x6e,0x6b,0x93,0xdd,0x7b,0x89,0x65,0xf0,0xc4,0xf6,0xba,0xf5,0x8d,0x3b,0xd9,0x09,0xc0,0xe0,0xf6,0xf3,0x58,0x9d,0x47,0x0a,0x69,0x09,0x61,0x02,0x8d,0xda,0xf2,0x63,0x82,0x5b,0x50,0x36,0x6e,0x29,0xc2,0x8d,0x5d,0x7a,0x4f
.byte 0xd3,0x8d,0xd3,0xfc,0x30,0x94,0xe1,0x7b,0xf7,0x0a,0xe5,0x7b,0x89,0x69,0x17,0x6b,0x07,0x90,0x28,0xa1,0xb1,0x01,0xbc,0xf9,0x3f,0x50,0xf5,0x4c,0xa2,0x9a,0x46,0x0c,0x7c,0xf0,0x68,0xdc,0x75,0x13,0x4c,0x22,0x02,0xe8,0x6f,0xcc,0x0a,0xcf,0x66,0xb7,0x86,0xb8,0x5b,0xe2,0x11,0x26,0x26,0x7b,0x07,0xc0,0xa2,0xf8,0xc6,0x5f,0x10,0x82
.byte 0xe6,0x6c,0x2a,0xb5,0x3f,0xf8,0x1e,0xe0,0x26,0x7f,0x88,0x5d,0x75,0xc1,0x0f,0x4c,0x8f,0x9d,0x87,0xab,0xe6,0x2b,0x07,0xc7,0xa2,0x28,0xef,0x05,0x02,0x55,0xee,0x79,0x7b,0x37,0x29,0x3f,0x90,0xb8,0x09,0x7c,0x62,0xae,0xad,0x0b,0xe1,0xd6,0x5c,0x6a,0x28,0xa9,0x2c,0x78,0x4b,0x37,0x6c,0xfe,0x4f,0x2a,0x59,0xdf,0xd5,0x91,0x37,0x99
.byte 0x0e,0x20,0xf2,0x74,0xe6,0xd6,0x17,0xd9,0x21,0x8f,0xdb,0xd6,0xff,0x5d,0x6b,0x2b,0xa1,0x21,0xd2,0xc9,0xb2,0x37,0x1c,0x69,0xbb,0x9e,0x4f,0x28,0xae,0x4a,0x41,0x7d,0x87,0xcb,0x6a,0xfa,0xbf,0x9f,0x23,0xd2,0x68,0x8f,0xb2,0xa4,0x15,0x60,0xf9,0x6e,0x20,0xb6,0xd7,0x5e,0xa1,0x21,0x05,0x81,0x4c,0x34,0x58,0x7b,0x55,0xae,0x85,0x7f
.byte 0xe5,0x3a,0xe3,0xe0,0xf8,0x43,0x73,0xdd,0x85,0xdb,0x2e,0x2f,0x20,0x65,0xea,0x76,0xa1,0x6a,0xde,0xcf,0x76,0x22,0x8d,0x1c,0x22,0x7b,0x93,0x42,0xf3,0x2b,0x93,0x85,0x20,0xc7,0x20,0x53,0xd4,0xd9,0x51,0xba,0x2e,0xc7,0x84,0x09,0x65,0xa0,0x1c,0x58,0xf0,0xa8,0x46,0xef,0xf3,0x4b,0xc7,0x27,0xcb,0x93,0x4e,0x74,0xdc,0x0c,0xb5,0x06
.byte 0xba,0x25,0xf0,0x15,0x47,0x3d,0xf5,0x86,0x9b,0xec,0xc7,0x44,0xec,0x0f,0x7b,0x3c,0xfc,0xec,0x3c,0x71,0x00,0x75,0x42,0xae,0x25,0x5b,0x1c,0xfe,0x1c,0xdf,0x74,0x95,0xb6,0xc0,0xfc,0xd7,0x67,0xa5,0xf5,0x71,0x62,0xcc,0x04,0xab,0x46,0x39,0xfe,0x03,0x72,0x7c,0x01,0x85,0x8b,0x9d,0x9d,0xda,0xd5,0xa4,0xaf,0xbc,0x54,0x96,0x57,0x02
.byte 0x56,0xc2,0x9f,0xe2,0x9d,0x30,0x51,0xc0,0xa5,0x4b,0x86,0xb5,0xb6,0xe9,0xed,0x81,0xa7,0xb2,0x3f,0x2e,0x33,0x0a,0xa0,0x78,0x93,0x94,0x49,0x5e,0x2f,0x54,0x06,0x2c,0x98,0x0e,0xf4,0xcc,0xc2,0xbd,0x5f,0xd6,0x7c,0x81,0xb8,0xb1,0x85,0x93,0xf2,0xb4,0xb3,0x0d,0xa7,0xb8,0x9b,0xb7,0x04,0x2d,0x76,0x35,0xeb,0x4f,0x15,0x68,0xc8,0x43
.byte 0x03,0x4c,0xa7,0x67,0x0a,0xc6,0xc2,0x5b,0xdf,0xc0,0x86,0xde,0xe5,0x72,0x37,0x0e,0xbb,0xe8,0xd0,0x52,0xe1,0xb6,0x87,0xb1,0x1b,0x63,0x94,0x03,0x8a,0x3e,0x40,0x3d,0x39,0x1a,0x41,0xc6,0xb7,0x05,0x81,0x24,0x43,0x4e,0x67,0x1f,0x19,0x00,0x7b,0xd7,0x26,0x55,0x27,0xf4,0x89,0x2b,0x91,0xf4,0x0e,0x5c,0x65,0xcb,0xca,0x96,0x6b,0x92
.byte 0x58,0xba,0xa5,0xf6,0x99,0x99,0x1a,0xf2,0x66,0x6d,0xf1,0xa3,0xbe,0x1d,0x27,0x9c,0x80,0xb8,0x8f,0x01,0xfb,0x67,0x97,0x9a,0xf2,0x55,0xe2,0x04,0xac,0x1a,0x45,0xa0,0xae,0x43,0x7a,0x87,0xaa,0x6e,0xa1,0x36,0xa0,0x27,0xad,0xc8,0x86,0xa2,0xa5,0x39,0xac,0x44,0xae,0xd0,0xe0,0x15,0x04,0x5c,0xb7,0x84,0xe3,0xb3,0x1d,0x7f,0xd8,0xb6
.byte 0x65,0x45,0x1e,0xe9,0x9e,0x77,0xfe,0x6f,0x07,0x80,0x0b,0xe7,0x1a,0xc1,0xd6,0x3f,0x2b,0x32,0xda,0x75,0x50,0xd6,0xbc,0x98,0x42,0xa5,0x2f,0x83,0xb5,0xbe,0x10,0x25,0x01,0xfc,0x0d,0xbb,0x42,0xe1,0x37,0xcc,0x0d,0x53,0x83,0x0c,0x0a,0x7d,0xbf,0x0b,0x1e,0xb9,0x16,0x8e,0x36,0x7e,0x85,0x37,0x3f,0x4a,0x38,0x5b,0x44,0xb5,0x58,0x28
.byte 0x2e,0x46,0xe4,0x12,0x68,0x81,0x52,0x0f,0x4a,0x35,0x4c,0xeb,0x8a,0x7e,0xe7,0x7e,0xfd,0xb6,0x0e,0x8e,0x18,0xa0,0xc6,0x5a,0x53,0x19,0xb8,0xb1,0x39,0x44,0x3f,0xe7,0x03,0xb8,0x20,0x60,0xde,0xc7,0x80,0x01,0xb1,0x86,0x88,0x76,0x3d,0xd1,0x25,0xd1,0x98,0xd1,0xb5,0x96,0x92,0x41,0xe0,0x17,0x94,0xcd,0xf3,0xce,0x8b,0x34,0x92,0x68
.byte 0x04,0x79,0xe8,0xf7,0x07,0xcf,0x53,0x9f,0x05,0x20,0x5d,0xdd,0xbf,0xb0,0xf0,0xa6,0x00,0x1d,0xe2,0x92,0x28,0x07,0xb4,0xbf,0x34,0x7c,0x0b,0xa4,0x13,0xc4,0x57,0xc8,0xd5,0x94,0xc2,0x46,0x2c,0x8e,0x73,0xab,0x05,0xa3,0x48,0xb4,0xcb,0x66,0x52,0x97,0xd0,0x14,0x5d,0xe3,0xfd,0xea,0xe8,0xdb,0x9f,0x02,0x16,0xb3,0x59,0x41,0xb4,0x20
.byte 0xfd,0x08,0x10,0xe6,0x3a,0x96,0xf4,0x77,0x45,0xf5,0x3e,0xa2,0x6c,0xb1,0x6d,0xb9,0xb5,0x78,0x31,0x83,0x15,0xe2,0x9d,0x6b,0xa3,0x27,0xbb,0xc7,0x0d,0x91,0x04,0xed,0x96,0x2f,0xcc,0x4f,0x93,0x96,0x9c,0x8e,0xc8,0x84,0xdb,0xe3,0x26,0x23,0xfa,0x0d,0xc8,0x09,0x21,0x0f,0x0a,0x2d,0x0a,0x04,0x8b,0xcd,0xae,0xdd,0x9c,0xac,0xd1,0x57
.byte 0x22,0x9e,0x0c,0x00,0xd4,0x56,0x97,0xee,0xfd,0x87,0xd5,0x69,0xdb,0x1e,0x22,0xf4,0x67,0x2f,0x7d,0x4f,0x00,0x4e,0x6b,0x1d,0x4a,0x98,0x62,0xde,0xff,0x18,0xc3,0xf5,0xb3,0x14,0x8a,0xb6,0xd6,0x4b,0x11,0xc2,0x7b,0x5b,0x3d,0xbf,0x48,0x39,0x98,0xeb,0xeb,0x17,0xf9,0x57,0xda,0xcf,0xe2,0x59,0x8b,0xbb,0x67,0x73,0x27,0xda,0xcc,0x23
.byte 0x33,0x38,0x0d,0x02,0x43,0x9e,0xa9,0x5e,0x6b,0x85,0x82,0xff,0xe1,0xab,0x5b,0xe1,0xcd,0xa1,0xb0,0x2e,0x89,0x34,0xeb,0x4f,0x6d,0xfc,0xaf,0x39,0x9d,0xa4,0x54,0xd8,0x0f,0x32,0x33,0xe6,0xb0,0x10,0xef,0x69,0x6a,0x83,0x9c,0x73,0x7d,0x69,0x7d,0x5f,0x85,0xc4,0x0e,0x14,0xc6,0xe7,0xba,0x0a,0xb6,0xf1,0xad,0x91,0x3b,0x8e,0xda,0x11
.byte 0x64,0x58,0xdd,0x86,0x4f,0x61,0x3f,0x65,0x12,0x5d,0xa6,0x7d,0x87,0xfa,0xb7,0x3f,0x95,0xfd,0x50,0x3a,0x97,0x0a,0xfd,0x56,0x55,0xaa,0x89,0x96,0x83,0xed,0x9d,0xcd,0xc0,0xc3,0x3a,0x21,0x5a,0x0d,0x6b,0xa1,0x07,0x6f,0x36,0xa2,0xd6,0x0a,0x5c,0x1e,0xa7,0x1f,0x21,0x73,0xcb,0x76,0xc9,0xcf,0xa8,0x54,0x5e,0x8a,0x77,0xa4,0xbc,0xe1
.byte 0x8d,0xff,0x25,0xbd,0x2f,0x71,0x6e,0xff,0x36,0x99,0x62,0x07,0xfb,0x4a,0xc7,0x7c,0x27,0xd4,0xbb,0x27,0xec,0x1b,0x52,0x58,0xfe,0xa1,0x7a,0xe6,0xc7,0x04,0xff,0x76,0xc5,0xe3,0x7a,0x20,0xed,0x7c,0xbb,0x77,0x0f,0xf2,0xc7,0x93,0x11,0x85,0xe2,0x77,0xca,0xfc,0x81,0x8e,0xec,0x1c,0xf5,0x96,0xba,0xde,0x87,0x68,0xb9,0xd6,0xde,0xd7
.byte 0x69,0xd8,0xd7,0x0c,0x9e,0x04,0x23,0xcc,0x5e,0x4a,0x9b,0x53,0x78,0x3b,0x58,0x71,0x7f,0x0f,0x75,0xe7,0x81,0x75,0xce,0x90,0x80,0xf0,0x37,0xb0,0x69,0xd7,0x54,0xc4,0x57,0x14,0xf4,0x08,0xf9,0x79,0xb1,0x28,0xaa,0x0f,0xa2,0x09,0xe2,0xc9,0x04,0xd3,0xa7,0x85,0x52,0x56,0x91,0x1f,0x29,0xd8,0x10,0x89,0x13,0x7f,0x23,0x56,0x14,0x97
.byte 0x59,0x17,0xd2,0x52,0x68,0x0a,0xff,0xd1,0x0d,0xd3,0x3d,0xa2,0x22,0x7f,0x17,0x82,0x38,0x0d,0x7e,0xed,0x35,0x05,0x7e,0xfa,0x9c,0x43,0xac,0x87,0xb5,0xaa,0xe1,0xc5,0x42,0x85,0x3a,0xe9,0x18,0x34,0x73,0xfa,0x9a,0xc3,0x8a,0xca,0xd8,0xca,0xc0,0x87,0xd4,0x0c,0x70,0xc0,0xb0,0x64,0x13,0xf7,0x35,0xfa,0xd3,0x90,0x99,0x36,0xdf,0x90
.byte 0x9f,0xd5,0x01,0xfd,0x1f,0x51,0xf8,0x09,0x9d,0xec,0xea,0x79,0x70,0xae,0xc5,0x39,0x20,0xff,0x6a,0xea,0x09,0xcf,0x50,0x49,0xfd,0x6b,0xd8,0x68,0xf2,0x13,0xb1,0x58,0x73,0xbb,0xcf,0x9a,0xba,0x28,0xda,0x63,0xbf,0x02,0x75,0x8f,0x88,0x9f,0xc5,0x16,0xa9,0x58,0x34,0x46,0x42,0x59,0x13,0x22,0xb0,0xe8,0x0c,0xea,0xd3,0xbd,0x57,0xaa
.byte 0x67,0x88,0xf9,0x88,0x04,0x7b,0x5f,0xf1,0x8f,0x71,0x31,0x22,0x8f,0x8a,0x3b,0x0e,0xf7,0x65,0xe4,0xd3,0xf5,0xec,0x32,0x4e,0x61,0x91,0x9f,0xa5,0x3d,0x88,0x02,0x1d,0xa6,0x7a,0x75,0x3f,0xd9,0x10,0xba,0x76,0x43,0xd4,0x31,0x3c,0x39,0x6d,0x60,0x7a,0xe9,0x19,0xe5,0x21,0x97,0xcc,0xb4,0xe6,0x1f,0x4c,0xb4,0x39,0xfc,0x36,0x29,0xec
.byte 0x19,0x72,0x28,0x25,0x09,0x30,0x9d,0x7d,0x8a,0x3a,0xd4,0x31,0x65,0x53,0x61,0x05,0x07,0xd2,0x9d,0xbb,0x77,0xde,0x54,0xde,0xbb,0x5b,0xe4,0xae,0xa4,0xc7,0x75,0xfe,0x72,0x2a,0x89,0xfb,0x60,0x15,0x06,0x83,0x4e,0x38,0xfd,0x21,0x28,0x6a,0xaf,0xa2,0x58,0xd5,0x38,0x05,0xd2,0xcf,0xcd,0x48,0x7a,0xed,0x0b,0x54,0x9e,0x74,0x85,0x14
.byte 0xa6,0x84,0x2d,0xa2,0x92,0x5e,0x74,0xef,0x4f,0x6d,0x2a,0xcf,0xed,0x17,0x91,0xd8,0x97,0x25,0x37,0xe3,0xff,0x8b,0xc9,0x1f,0x25,0xa5,0x85,0x52,0xe9,0xb5,0x3a,0xa9,0xe6,0x0d,0x12,0x6b,0x46,0x51,0xf5,0xb0,0x8f,0x3d,0x9a,0x0b,0x9d,0x7c,0x9a,0x65,0xdf,0xc6,0x9c,0x17,0xd1,0x0b,0xdc,0xe3,0xd0,0x75,0xef,0xa7,0xbf,0x1d,0xae,0xe4
.byte 0x50,0x9f,0x03,0x3e,0x90,0x3a,0xa5,0x5b,0x38,0x9f,0x0b,0x02,0x35,0x5f,0x1f,0x26,0xd3,0x2a,0x6f,0x1c,0x75,0x11,0xb2,0xd3,0x65,0x3a,0x96,0x3d,0xfe,0x5e,0x8d,0xef,0x04,0xe8,0xe7,0xb3,0x6e,0x7c,0xee,0x2e,0x8f,0x0d,0x9f,0xf7,0x0b,0xed,0x01,0x82,0xdb,0x54,0x0c,0x01,0x5a,0xea,0xd9,0xeb,0x9e,0x25,0x54,0x95,0x36,0xfc,0xc4,0x09
.byte 0x15,0xee,0x88,0xb4,0x16,0xf6,0xc9,0x79,0xd7,0x79,0xf4,0x94,0x7a,0x5e,0x28,0x19,0xe7,0x2d,0x94,0xd1,0xed,0x48,0x12,0x15,0xba,0xbd,0x90,0xad,0x64,0xec,0x6a,0x52,0xa0,0x33,0xfb,0x13,0xa6,0xe7,0x30,0x04,0xfb,0x7b,0x69,0x07,0x6e,0xfc,0x1c,0xe4,0x0d,0x8b,0x8f,0x38,0x6f,0x59,0xe8,0x5a,0x0a,0x67,0x28,0xd3,0x3c,0xe4,0xd7,0xf2
.byte 0xae,0x0d,0x90,0xac,0x2a,0x9f,0xb6,0x5f,0xfb,0x30,0x5e,0x6d,0xad,0x19,0x86,0x58,0xa4,0x4c,0x2a,0x10,0xdd,0x9a,0x65,0x6e,0x07,0x4f,0x14,0xf6,0xe8,0x7b,0x43,0xb9,0x18,0x2c,0xa4,0xa7,0x2a,0xa2,0xc4,0xf9,0x4e,0x43,0x4e,0xfe,0xf6,0x57,0xbf,0x50,0xc5,0x36,0x7a,0x63,0xac,0x30,0xb3,0x7c,0x78,0x63,0xd2,0xd0,0x1d,0xe3,0x68,0xa2
.byte 0x79,0xa2,0xf3,0x29,0x54,0x04,0x31,0x47,0xf8,0x8c,0x60,0xa5,0x47,0x70,0xa8,0x86,0x89,0xfb,0x7e,0x7e,0xb1,0xc0,0xa5,0xec,0x39,0x3b,0xb5,0xb8,0xb9,0x92,0xd0,0x06,0xfb,0xed,0x39,0x56,0xa6,0x11,0xf6,0x5e,0xe9,0x04,0xb7,0xe4,0x9a,0xf0,0x61,0x3e,0x53,0xda,0xf1,0x61,0x1d,0x1e,0xc8,0xe5,0x46,0x1d,0x73,0xd3,0x33,0xc1,0xab,0xf9
.byte 0x93,0x4f,0x31,0x02,0x4d,0xab,0xd8,0x45,0xa1,0x4d,0x9b,0x37,0xc4,0xd9,0x40,0x58,0x5b,0x56,0x0b,0x46,0x69,0x0e,0xfc,0x27,0xa0,0x44,0xd7,0xf4,0xb0,0xcd,0x2a,0xd1,0xf9,0xf3,0x65,0x8a,0x3b,0xcc,0xdc,0x92,0x25,0xb6,0x8a,0x13,0xb3,0xbc,0x35,0xc8,0xd9,0xc1,0xbf,0x31,0xbb,0x27,0x96,0xa0,0xc2,0x34,0x1c,0x6c,0x33,0xda,0x24,0xac
.byte 0x1e,0x0a,0x9e,0x2e,0x07,0xc7,0xc2,0xcc,0xcc,0xf6,0xd0,0x0a,0xf2,0x40,0xe0,0x20,0xce,0xf1,0xcf,0xf0,0x05,0x46,0x06,0xfc,0x33,0x8f,0x19,0x13,0x4e,0x34,0x21,0xa9,0x51,0x6c,0xcf,0x7f,0x6a,0x80,0x4a,0x32,0x6d,0x3d,0xb1,0x63,0xa8,0x2c,0x74,0x13,0x8f,0xf7,0xa1,0xfe,0x6e,0xbd,0xb4,0x80,0xc2,0x2b,0xc7,0x1c,0x99,0x26,0xd0,0x56
.byte 0x98,0x77,0x83,0xc8,0xa7,0x3e,0xe2,0x02,0xfc,0xa8,0x45,0x0d,0xcc,0xe6,0x8c,0x6f,0x07,0x03,0x93,0xdc,0x51,0xce,0xbd,0xe7,0x89,0xc8,0x7f,0x8a,0x06,0x8a,0x81,0x13,0x88,0x12,0x7f,0xd4,0xa9,0x63,0x10,0x0b,0xc2,0x82,0xbe,0x51,0x5c,0x66,0x14,0xb3,0x0f,0x3c,0x6d,0x8a,0xf7,0xec,0xe6,0x3c,0x9f,0x20,0xc8,0x02,0xe3,0xbb,0x59,0x53
.byte 0xc9,0x97,0x29,0xf0,0xa0,0xb1,0x50,0xf7,0x63,0x95,0x96,0x35,0xd0,0x81,0xb3,0xf0,0x44,0x5a,0xf5,0x55,0x10,0x3d,0xe8,0x76,0x21,0x62,0x49,0x1a,0xbb,0x8c,0x1a,0xff,0x75,0x39,0x3c,0x26,0x9e,0xee,0xef,0xaa,0x3d,0xa1,0x21,0xb0,0x47,0xb5,0x15,0x54,0x59,0x11,0x47,0x0c,0x1c,0x53,0x4e,0x0e,0x54,0x38,0xa5,0xed,0x8d,0x1f,0x4e,0x91
.byte 0xfc,0xd7,0x78,0xff,0x9c,0xfe,0xe3,0x86,0xd5,0x8d,0xc6,0xf2,0x03,0x01,0xbb,0xf7,0x89,0x25,0x19,0xb9,0xab,0xd8,0xd0,0x72,0xff,0x69,0x04,0x97,0x77,0xe4,0x43,0x0e,0xe8,0xb6,0xc3,0x57,0xab,0x96,0xe3,0x53,0xfa,0x5c,0x5e,0xfd,0xbd,0xf0,0xba,0xc9,0xfd,0xd5,0x12,0x4f,0xa9,0x72,0xfb,0xf4,0x6d,0xd2,0x74,0xef,0x29,0xd8,0x73,0x27
.byte 0x62,0xd8,0xe1,0x4c,0xd5,0xb0,0x1d,0xfa,0xf5,0x67,0x02,0xed,0x38,0xbe,0xa7,0x0c,0x3f,0xe1,0xad,0xc3,0x8f,0x4e,0x81,0x73,0xe1,0x65,0x7b,0xcc,0x41,0x16,0x2d,0x5b,0xeb,0xaf,0x14,0x96,0x7b,0x53,0x7b,0xcf,0xb7,0x98,0x28,0x92,0x88,0xc5,0x17,0xfe,0xcc,0xce,0x4e,0xe2,0x53,0xfd,0x38,0xd3,0x15,0xfb,0x31,0xd6,0x8e,0x69,0xd4,0xda
.byte 0xae,0x72,0x71,0xe1,0x93,0xf9,0x2e,0x28,0x80,0x2a,0xc2,0x8a,0xaa,0x5c,0xba,0x64,0xad,0x2e,0x64,0x2a,0xb1,0x3d,0x71,0x03,0x10,0x2e,0x9a,0x93,0xca,0x85,0xaa,0x77,0xd8,0x80,0x1c,0xe0,0xf9,0x5a,0xfe,0xa3,0xc9,0x8a,0x2d,0xb9,0x45,0xc8,0x9f,0xa9,0x61,0x85,0x81,0xe7,0x1d,0x7d,0xf8,0x11,0x14,0x57,0x51,0xc4,0x84,0xf8,0xb5,0xc9
.byte 0xb9,0xa0,0x3f,0xd1,0xa2,0xcd,0x87,0xaa,0x76,0x2a,0xba,0xab,0xd4,0xb0,0x9d,0xf3,0x83,0x4e,0xcb,0x44,0xf0,0x4b,0xd9,0xce,0xb0,0x2b,0xca,0x92,0xf8,0x3c,0x4a,0x5c,0x8b,0x20,0xc3,0xfc,0x4b,0xca,0xe4,0x2f,0x35,0xfc,0xfc,0xcd,0xf9,0xc5,0x6f,0x75,0x63,0x07,0xf4,0xe1,0xe6,0x4c,0x5f,0x10,0x05,0xe3,0xb5,0xec,0x4c,0x4f,0xd8,0xda
.byte 0x64,0xeb,0x7b,0x9c,0xae,0xe4,0x7c,0x3f,0x31,0x1b,0x71,0x8b,0x48,0x52,0x88,0x99,0x8f,0x5f,0x31,0xf3,0x7c,0x6e,0x15,0x4c,0x38,0x96,0xab,0xfb,0x4f,0xeb,0xee,0x3c,0xff,0x8d,0xce,0xab,0xb2,0x96,0x00,0x3b,0x8a,0xb3,0x10,0x3b,0xa5,0xc3,0x5e,0x8f,0x9d,0x2b,0x78,0x18,0x80,0x62,0x8c,0xa6,0x3c,0xeb,0x4c,0x92,0x2d,0x67,0x7e,0xdb
.byte 0xc6,0x26,0x58,0x73,0x65,0x0c,0x03,0x07,0x28,0x0d,0xe7,0x9a,0x03,0x3d,0x81,0xc2,0x32,0x76,0x1d,0x27,0xef,0x6e,0xea,0x02,0x7b,0xca,0x3f,0x07,0x63,0x69,0xed,0x30,0x44,0xde,0x2b,0x7f,0x32,0x42,0x28,0x7a,0xc5,0x24,0xf9,0xb6,0x0b,0x24,0xca,0x61,0x17,0x8f,0x80,0xda,0xe7,0x86,0xf0,0xc5,0xca,0xd9,0x6a,0x9a,0x56,0xd4,0x80,0xe3
.byte 0x34,0x9e,0xae,0x9e,0x80,0xf9,0xe4,0x1f,0xa9,0x0d,0x66,0x0d,0x7c,0x31,0xad,0xeb,0x61,0xf1,0xef,0xe5,0xcf,0xfc,0x46,0xbf,0x11,0xb0,0xd1,0x4d,0x9f,0x66,0x11,0xb9,0xba,0x3a,0x32,0x9a,0x0e,0x87,0x56,0x9d,0x03,0x03,0x42,0x19,0xb8,0x4f,0x6e,0x1f,0xc9,0x70,0x69,0x78,0x1e,0x61,0xcc,0x05,0x81,0xea,0xad,0x33,0x7f,0x33,0xcc,0xfe
.byte 0x29,0x42,0x02,0xc6,0xc6,0x8f,0x0c,0x02,0x80,0x11,0x1b,0x7b,0x9a,0x43,0xdc,0x66,0x22,0x6a,0x76,0xd5,0x9c,0xd2,0xbb,0xd6,0x52,0x0d,0x7a,0x93,0x24,0x54,0x6f,0x57,0x99,0x55,0xbe,0x1a,0xb6,0xa3,0x06,0xc4,0xff,0xbe,0x8c,0x2b,0x77,0xba,0x4f,0x0d,0xe6,0x34,0xc1,0xea,0x1f,0xca,0xe8,0xb7,0x77,0x84,0x69,0x77,0xa2,0x6c,0x95,0x1e
.byte 0x6d,0xbf,0x45,0x59,0x8a,0x9d,0x1e,0x0f,0xf2,0xf2,0x6a,0x03,0x81,0x26,0xbd,0x2a,0x6c,0xe9,0x1e,0xd3,0xa8,0x99,0xc6,0x89,0xaa,0xce,0x1a,0x4c,0xfd,0x4b,0x88,0xe0,0x5d,0xe3,0xc7,0x0b,0xe3,0xce,0x0a,0x71,0x96,0x03,0x31,0x0c,0xc0,0xdc,0xb0,0x31,0x44,0x5a,0x33,0xde,0xd3,0x4f,0x41,0x8d,0x60,0xa9,0x7f,0x6a,0xa1,0xb2,0xc4,0x00
.byte 0x31,0x1d,0xb4,0x62,0x45,0x17,0xd9,0x05,0x55,0x7d,0x3a,0x76,0x38,0x62,0x65,0x16,0x94,0xf2,0x4f,0x7d,0x31,0x6d,0x17,0x79,0x54,0xd4,0x0a,0x5d,0x12,0x12,0xab,0xba,0xc6,0x60,0x9b,0xb2,0x42,0x55,0x2c,0x5b,0x93,0xc9,0x8a,0x11,0x66,0xd8,0x34,0x47,0x6b,0x33,0x13,0xff,0x12,0x25,0xeb,0x21,0x31,0x1a,0x70,0xb0,0x77,0xec,0xc8,0xb7
.byte 0xd6,0xc9,0x91,0x4b,0xfe,0x71,0x40,0x09,0x50,0x9d,0xf0,0xf2,0xb3,0xbd,0x4b,0x02,0x5b,0x6a,0x9e,0x30,0xed,0x31,0xd3,0x6d,0xb6,0xa8,0xed,0x9e,0x28,0xc8,0xb3,0x42,0xe4,0xbe,0x79,0x01,0x96,0x86,0x9a,0xeb,0xfb,0x7e,0x51,0x4b,0x79,0x8d,0xf9,0x8f,0x62,0xf6,0x66,0x75,0xa4,0x2e,0x9a,0x93,0x3f,0x4d,0x29,0xf9,0x8e,0xd3,0x40,0x34
.byte 0xd3,0x60,0xf6,0x68,0x61,0xe9,0x62,0xe6,0xca,0x8c,0x15,0xc3,0xac,0xde,0x40,0x61,0x02,0xcd,0x1a,0x96,0x3c,0xa6,0x4d,0x08,0x66,0x9d,0x35,0x15,0x5a,0x7a,0x38,0x24,0x64,0xb6,0xb6,0xed,0x03,0x4c,0xdd,0x7b,0xe5,0x2f,0x84,0x48,0x6b,0x31,0xc2,0x2e,0xe9,0x70,0xe1,0xaa,0x10,0x55,0x5a,0x18,0x95,0x0b,0xcd,0xa9,0xdb,0x9e,0x87,0x07
.byte 0xae,0x73,0x0c,0x87,0xd0,0xd5,0xc5,0x92,0x48,0xc5,0xa1,0x13,0x80,0xf5,0xe0,0xdc,0xa0,0x61,0x7b,0xba,0x95,0x43,0x38,0x64,0xc0,0x13,0x1b,0x3f,0x14,0x1b,0xcd,0x24,0x1e,0xf7,0x7e,0x9e,0x5d,0x05,0xeb,0xb2,0xe0,0xb8,0x34,0x8c,0xe0,0x25,0xde,0xcc,0x72,0x06,0xc1,0x4c,0x41,0x2f,0xfc,0xb1,0xc2,0x60,0x01,0x09,0xcf,0x44,0x5f,0x7e
.byte 0xeb,0x79,0x15,0x89,0x8c,0xaf,0xcb,0xc6,0xcf,0x3f,0xc4,0xae,0xcc,0x82,0x1f,0x08,0x3b,0x97,0x9c,0x74,0x09,0x4c,0x24,0x79,0xea,0x4f,0xd6,0x29,0x9a,0xec,0xb7,0xbd,0xb7,0x09,0x23,0x37,0xd5,0x7d,0x3e,0x7f,0xce,0x33,0xc3,0xe2,0x6c,0xff,0x1e,0xe0,0xcf,0x88,0xca,0x51,0x77,0x9c,0xc6,0xc3,0x13,0xa0,0x7e,0x4a,0x70,0xe8,0xb3,0xe2
.byte 0x65,0x82,0x61,0xb9,0x00,0x96,0xf5,0xa8,0x78,0xba,0x4d,0x5c,0xce,0x1f,0x67,0x1e,0xc1,0xbc,0x60,0xf4,0x40,0x04,0xb6,0xd9,0xe6,0x6c,0x6e,0xbc,0x68,0xf8,0x0e,0x0c,0x93,0x2b,0xf6,0x4a,0x9b,0xfa,0x04,0xe2,0x94,0x4a,0x40,0xe3,0xc2,0x69,0xcb,0xd0,0x64,0x3f,0x4b,0x8a,0xcf,0x6e,0x50,0xde,0x54,0x6e,0xf8,0xc6,0xab,0x03,0xb9,0x88
.byte 0x4e,0xaf,0xfc,0xcc,0x90,0xfa,0x74,0x8f,0xb5,0x8f,0x8f,0xc6,0x17,0xf3,0xc9,0x7a,0x06,0x68,0x2d,0x77,0x91,0xcf,0x52,0xcd,0xf2,0x8d,0xc8,0xac,0x6f,0x4d,0x4a,0xb7,0xfd,0x7e,0x46,0xb7,0x4d,0x4d,0x92,0x05,0xc3,0x68,0xcf,0xf2,0x27,0x2b,0x9a,0x57,0xeb,0xcc,0x4d,0x5d,0xef,0x86,0xe0,0xfe,0xd9,0x43,0x66,0x88,0xb8,0x42,0x1d,0xb2
.byte 0x5e,0x80,0xbe,0x96,0x00,0x9a,0x69,0x7f,0x27,0xcf,0x15,0x44,0x6e,0x5d,0x8b,0x76,0xf9,0xd0,0xb6,0xfd,0xeb,0x56,0x39,0x4c,0x94,0x1b,0x3e,0x09,0xf8,0x59,0x03,0xc9,0x7d,0x1c,0x66,0x4e,0x7c,0xd5,0x87,0xd1,0xeb,0xcf,0x53,0xaa,0xda,0x08,0x26,0x65,0x22,0x15,0x42,0x7c,0x13,0x4d,0xfa,0x50,0xd8,0x52,0xe9,0x71,0x57,0xd9,0x29,0xd2
.byte 0x02,0xb3,0xbd,0x1c,0x1b,0x06,0x77,0x68,0xb2,0xd5,0x3a,0x7c,0x9e,0x54,0x3a,0x75,0xc7,0xa8,0x9d,0x0e,0x5f,0x89,0x20,0x46,0x20,0xdd,0x21,0xb1,0xac,0x96,0xa6,0xd4,0xdf,0x9f,0xe9,0xd4,0x06,0x52,0xc3,0x34,0x43,0x61,0xdc,0x5f,0x85,0x75,0xa1,0xc5,0x10,0x67,0x6f,0xf2,0xba,0xcd,0x64,0x9e,0x69,0x44,0xdd,0x15,0xea,0x05,0x5a,0xbb
.byte 0xb3,0xa3,0x8d,0xe6,0xbf,0x4d,0xb0,0x29,0x81,0x81,0x56,0x95,0xc8,0x81,0xcd,0xc1,0x63,0x7b,0x9c,0xa1,0xf8,0x89,0xea,0xf0,0x19,0x05,0x1e,0xe9,0xbe,0xf8,0x9e,0x58,0xae,0xaa,0xf4,0xca,0x45,0x68,0x81,0x18,0x38,0xd7,0x27,0x81,0x14,0xcb,0x68,0x81,0x61,0x37,0x38,0x67,0xc3,0x4e,0xb7,0x30,0x2c,0x9f,0x00,0x6b,0x55,0x87,0xdd,0xb5
.byte 0x54,0x00,0x65,0x85,0x33,0xf6,0xde,0xe6,0x0b,0xee,0x2c,0x64,0xc7,0x14,0xbc,0xf2,0x95,0x31,0x8c,0x63,0x51,0x9d,0x41,0x72,0x14,0x3f,0x60,0x50,0xb7,0x15,0xd4,0xf4,0x8e,0x50,0x9e,0xe9,0x6a,0x94,0x3a,0x0e,0x7e,0x36,0x74,0xcb,0xdb,0xe8,0xe3,0xba,0xd9,0xe2,0x5b,0xdb,0x87,0xf8,0x17,0xd9,0x5e,0x5c,0x4d,0xca,0xc8,0x13,0xae,0xfa
.byte 0x24,0x72,0xef,0xda,0x10,0xf6,0xf9,0xe9,0xe0,0xde,0xfe,0xc6,0x9b,0x76,0xfe,0x52,0xc7,0xe0,0xe1,0xf7,0x31,0xa9,0x54,0x5a,0x8e,0xb9,0x6b,0x2c,0x3a,0x18,0x57,0xe9,0x4b,0x39,0x11,0x30,0x4e,0xb5,0x85,0xb6,0xa7,0xee,0x37,0x1a,0xfe,0x60,0x64,0xf5,0x7f,0x46,0x9e,0x82,0x2d,0xcb,0x74,0x4e,0x95,0xc3,0xa0,0x87,0x94,0x85,0x84,0x54
.byte 0x28,0xe3,0x14,0x93,0xb6,0xa2,0x28,0x2c,0x14,0x68,0x8c,0x88,0x82,0xc5,0x75,0x1b,0x25,0x8e,0x50,0xf0,0xad,0xb7,0xfb,0x31,0xb2,0x24,0xf1,0x29,0x5e,0x65,0x58,0x9a,0x8c,0x2b,0x9b,0x6d,0xa4,0x07,0x08,0x0d,0x60,0x7d,0xd9,0xb4,0xe0,0x01,0x93,0x07,0xf3,0x8f,0xde,0x70,0x76,0x10,0x80,0x1d,0xe3,0x1b,0x21,0x58,0xba,0x4a,0xbe,0x9c
.byte 0x04,0xdc,0x53,0x64,0x6d,0x12,0x37,0xea,0xa5,0xdf,0xa7,0x1a,0x1d,0x13,0x53,0x87,0xb0,0x98,0xa6,0x1f,0x48,0x5f,0xc2,0x56,0xf2,0x98,0x76,0xd1,0x5f,0x78,0x5e,0xb8,0x6b,0xf0,0x29,0x66,0xa6,0xb2,0x91,0x57,0xde,0xbf,0xc1,0xf1,0xd5,0x8c,0xa4,0x62,0x88,0x2c,0x40,0x53,0x0d,0x46,0x20,0x5c,0x82,0x75,0x03,0x91,0x79,0x6f,0x95,0xd0
.byte 0x95,0xda,0xab,0xd0,0x8a,0x20,0x1c,0x36,0x94,0x7c,0x12,0xe7,0xbe,0x9e,0x1f,0x99,0x7b,0x4b,0x79,0x6e,0xed,0x3e,0x7d,0x77,0x32,0x0b,0x0c,0x54,0xd3,0x22,0xe8,0xcd,0xe7,0x10,0xd7,0xe9,0xd4,0x4a,0xb5,0x68,0x61,0x29,0x1b,0x9f,0x0f,0x72,0xdd,0xaf,0xb2,0xc7,0x57,0x50,0x45,0x8d,0x45,0x6d,0xd2,0x70,0x7b,0x89,0x78,0xeb,0xb9,0x2d
.byte 0xf9,0x82,0xb3,0xa3,0xc0,0x9d,0x96,0xf0,0x29,0x0c,0x4d,0xc2,0x03,0x3a,0xee,0x59,0x4e,0x26,0xe7,0x6a,0x88,0xae,0x4e,0x47,0x0d,0x18,0xce,0x71,0x01,0x79,0xf7,0xa3,0x04,0x64,0x54,0x53,0x7e,0x1f,0xb3,0x4f,0x83,0x9f,0x39,0xb8,0xfe,0x1e,0x0c,0x3e,0x9e,0x50,0xc8,0x6f,0xdf,0xf6,0x00,0x4d,0x7b,0xa3,0x0b,0x44,0x6f,0xbe,0x4f,0xf6
.byte 0x47,0x50,0xe5,0x02,0x58,0x5e,0x87,0x9a,0x18,0xc0,0xa0,0x89,0x8b,0x33,0x57,0x1a,0x31,0xab,0x6d,0xd0,0x87,0x54,0xee,0x66,0xca,0xf7,0xb9,0xe6,0x27,0x9c,0xbd,0x48,0x98,0x58,0xa5,0xcc,0x9e,0xe7,0xce,0x88,0x95,0x0e,0x1a,0x35,0x3a,0xee,0xe4,0x0c,0x7e,0xfa,0x87,0x86,0xb4,0x09,0xd7,0x10,0xdc,0x39,0x47,0x68,0xae,0x8b,0xf8,0xc4
.byte 0xf6,0x91,0x6e,0xbb,0x95,0xbf,0xba,0x41,0xd9,0xe3,0xb3,0x40,0x6b,0x3b,0xa3,0x0e,0x8f,0x6b,0xad,0x4b,0x1b,0x44,0x0d,0x35,0x7d,0xdf,0xfc,0x65,0xec,0xa7,0x73,0x14,0x2a,0xf9,0x26,0x24,0x5b,0x22,0x6e,0x97,0x65,0xdf,0x78,0x59,0xd3,0xb3,0xd9,0x68,0xbb,0x0c,0x4e,0x4d,0x4b,0x77,0xc3,0x4a,0xfa,0x0a,0xe4,0x99,0x9d,0x53,0x60,0x0f
.byte 0x09,0x1c,0xcd,0x5d,0x74,0xd0,0x50,0x71,0xaa,0x2b,0x15,0xb4,0x73,0xe0,0xf9,0x66,0x54,0x7d,0x9b,0x74,0x9f,0x7f,0xf7,0x9c,0xa2,0x9c,0x91,0xeb,0xaf,0xc6,0xb7,0xb7,0x2f,0x7f,0x7a,0x25,0x6c,0xc4,0xad,0x08,0xde,0x01,0xe0,0x90,0x90,0x23,0x32,0xf9,0x3e,0x48,0x27,0xa4,0x37,0x96,0x53,0xf1,0x00,0xfe,0x6f,0xc2,0xdb,0xde,0xb3,0x63
.byte 0xab,0x6a,0xa5,0x2d,0x29,0x00,0x7d,0xbd,0x10,0xa4,0xf7,0x88,0x46,0x23,0xfb,0x05,0x5f,0x92,0x43,0x5d,0x3c,0x7c,0xbc,0x90,0x66,0x77,0xda,0x08,0x9b,0x87,0xd2,0x69,0xba,0x84,0x7b,0x7b,0x66,0x97,0x22,0xd6,0xce,0x5a,0x9d,0xc6,0xd2,0x7c,0x13,0x25,0x86,0x1b,0x4c,0x36,0x1f,0x73,0x09,0xdc,0xb3,0x96,0xd9,0x10,0xdc,0xcc,0x80,0x4c
.byte 0xd9,0x72,0xed,0xa5,0x44,0x65,0x10,0x80,0xee,0x5e,0xfa,0x24,0x7a,0x23,0xb3,0xc7,0x61,0x93,0x6b,0xe4,0x0b,0x4a,0x4b,0x4a,0xa5,0xd8,0x51,0x76,0xf1,0xd9,0x92,0x2b,0x17,0x20,0x0c,0x9a,0xba,0xc3,0x4a,0x29,0x27,0x5c,0x34,0x5b,0xcf,0x44,0x17,0x16,0x61,0x52,0x41,0x3b,0x6e,0x99,0x14,0x94,0xa9,0x5f,0x9b,0x2b,0x1e,0xcf,0xdd,0xcc
.byte 0xff,0xc0,0x7a,0xce,0x0a,0x1c,0xf5,0x33,0xaf,0xcb,0xde,0x92,0x56,0x36,0x81,0x98,0xa6,0x70,0x4c,0x49,0x4a,0xd8,0x88,0x0a,0xb8,0x5d,0x5a,0xbe,0x03,0x98,0xba,0xe1,0xf2,0x11,0x44,0x65,0x02,0xd8,0xef,0x8c,0x84,0x0f,0x48,0xa1,0xf1,0x61,0xff,0xef,0x18,0xf1,0x29,0x4a,0x7b,0x8b,0xb2,0xb2,0xa1,0x50,0x26,0xa9,0x86,0x2a,0x06,0x8a
.byte 0x33,0x05,0x9f,0x20,0x5b,0x06,0xc3,0x50,0x79,0x20,0x34,0xe5,0x88,0xc0,0xfc,0xff,0xb6,0xa0,0x7c,0x0a,0xe2,0x43,0xc1,0xd2,0xf4,0xb2,0xdf,0xa6,0x51,0x98,0x67,0x6f,0x3e,0xc0,0xae,0xd3,0x35,0xd2,0x5f,0x73,0x71,0x2b,0x3e,0xa7,0x0d,0x8a,0x4c,0xa3,0xba,0xe4,0xac,0xc2,0xfe,0xb4,0x82,0x0e,0xe5,0x76,0x82,0x0f,0x9a,0xd3,0x54,0x24
.byte 0x21,0x01,0x34,0x4c,0xa1,0x0c,0x6e,0x80,0xe0,0x99,0xb1,0x4b,0x40,0xce,0x29,0x33,0xe3,0x5a,0x9c,0x15,0x33,0x06,0x1c,0xdf,0xea,0x01,0x3f,0x2f,0x9a,0x9a,0x34,0x07,0x53,0xc6,0x7c,0x0f,0xbd,0x17,0x06,0xa3,0x47,0x44,0x0f,0xd4,0xb4,0x96,0xf7,0xc5,0x71,0x4c,0xe0,0xc1,0xb7,0x42,0x0f,0x30,0xbb,0x09,0x17,0xc3,0xc4,0xaf,0x30,0x22
.byte 0x45,0x13,0x91,0x55,0x5e,0xde,0x31,0x19,0x0c,0xfc,0x85,0xd7,0x08,0x99,0x0b,0x30,0xbf,0xa7,0x15,0x26,0x2f,0x09,0x2d,0x2d,0xe0,0x60,0x7d,0x88,0x71,0xf4,0x97,0xa7,0x65,0x8d,0x5b,0x59,0x71,0x4d,0xc2,0xf0,0x46,0x2a,0x58,0xe1,0x23,0x78,0x33,0xd6,0x85,0xdd,0x1a,0x02,0x60,0x12,0xdd,0x45,0x8d,0xab,0xdb,0xe6,0x26,0x67,0xbe,0x12
.byte 0xb2,0xff,0xcb,0x20,0x79,0x09,0x5a,0x44,0x92,0x93,0xae,0x74,0x59,0x9d,0x20,0x96,0x81,0xe1,0x53,0x2d,0xf8,0x10,0xc8,0x69,0x4d,0xc8,0xe4,0x60,0x32,0x46,0xf1,0xba,0x6d,0x73,0x8d,0x70,0x8e,0x24,0xf1,0xb7,0x80,0x1b,0x77,0x70,0x3e,0x16,0xa1,0x15,0xb7,0x25,0xd2,0x11,0x41,0x7d,0xd8,0x7d,0x42,0xa0,0x81,0x02,0x61,0xd0,0x6d,0x3a
.byte 0xb9,0xc2,0x97,0xda,0x0f,0xf0,0x20,0x23,0x45,0xd4,0xe9,0xf5,0xf4,0x15,0x4c,0x84,0x47,0x2e,0x97,0xce,0x57,0xec,0xcf,0xc3,0x6a,0x54,0x87,0xeb,0xee,0x7c,0x5b,0x9e,0x9f,0xde,0x25,0x5d,0x60,0x7d,0xbe,0xd9,0xb4,0xb9,0x41,0x57,0x9b,0xe2,0xeb,0x21,0x09,0x60,0xb5,0xb0,0x55,0xaa,0xb0,0x15,0xa4,0x0b,0x83,0x98,0xee,0x81,0x7a,0x08
.byte 0xfb,0xe6,0xf1,0xd8,0x02,0x87,0x85,0x15,0x59,0x4b,0xc7,0x6d,0x73,0x4f,0xac,0xf8,0x18,0x9e,0xd8,0x00,0xff,0x3b,0xec,0x44,0xaa,0x4a,0x1d,0x85,0x4b,0x52,0xd6,0xdd,0x88,0x6c,0xc1,0xb0,0x67,0x78,0xcd,0xa3,0xda,0xa1,0x30,0x18,0x7d,0xa6,0x14,0xc8,0x51,0xc1,0x03,0xeb,0x97,0x0b,0x03,0x94,0xcc,0x73,0x95,0xbd,0xea,0x44,0xe2,0xb2
.byte 0x20,0xa4,0x20,0x9a,0x58,0x44,0x75,0x92,0x1f,0xac,0x75,0xf3,0x61,0xea,0xc1,0x9c,0xf7,0x7c,0xf7,0x6b,0x79,0x41,0xb4,0x53,0x32,0x8a,0xb0,0xfe,0x06,0xef,0xb0,0xf9,0x87,0xdb,0x31,0x9a,0xa0,0x84,0xe3,0xa3,0x8b,0x36,0xcb,0xe7,0xb4,0x1e,0xf2,0x21,0x3d,0x06,0x37,0x1a,0xb2,0x96,0xc6,0x94,0x67,0xc5,0x50,0x84,0x06,0xcf,0x57,0x66
.byte 0x1a,0x7d,0x84,0xd6,0xa9,0xed,0x04,0xb3,0x83,0xa3,0xd4,0x55,0x4a,0x71,0x87,0x76,0x79,0xa4,0x9a,0x70,0x50,0x10,0x53,0x66,0x0e,0x7c,0xca,0xcb,0xac,0xcd,0x54,0x37,0x2e,0xe0,0x75,0x2d,0x75,0x06,0x92,0x50,0x0f,0x77,0xaf,0x87,0x71,0x1a,0x13,0x92,0xf9,0x7c,0x19,0x1c,0x3f,0x40,0xcb,0x14,0xbd,0x2e,0xe5,0x27,0x0d,0x1c,0x19,0xe3
.byte 0x0f,0xda,0xca,0xc4,0x58,0xc6,0x98,0x14,0x89,0xc7,0xb2,0x6d,0x21,0x32,0x1d,0x17,0xd2,0x5d,0x40,0x04,0x56,0xd1,0x47,0xa6,0xc6,0x89,0xc9,0x28,0x0e,0x33,0x09,0x15,0xca,0x70,0x2b,0x7f,0xde,0x83,0x5b,0x32,0x83,0x99,0xa9,0xac,0xe9,0xb3,0xb8,0x07,0xc8,0xdf,0xd3,0x16,0x0a,0x42,0x03,0x9c,0x26,0x5e,0x97,0x55,0x4f,0xf7,0x5d,0x64
.byte 0x83,0x8d,0x8f,0x14,0x89,0xed,0xd2,0xd3,0x67,0x92,0x1b,0x71,0x1f,0xef,0x17,0xcf,0xe6,0xa7,0xd7,0x3f,0xf2,0xab,0x5d,0x81,0x4b,0xfb,0x55,0x13,0xf5,0x56,0xf7,0xae,0xc3,0xae,0x40,0xbb,0xb4,0x70,0xfd,0xbc,0x6e,0xcf,0x17,0xea,0x94,0x07,0xec,0xba,0xd0,0xf9,0xc2,0x1c,0x40,0x48,0xf1,0x16,0x31,0x09,0x25,0x9a,0xe1,0xe1,0xdd,0x32
.byte 0xf1,0x9f,0x00,0x6e,0xd7,0xac,0x14,0x7a,0xa0,0xf7,0xd0,0xcc,0x0e,0x25,0x9f,0xfa,0x1d,0x4b,0xc0,0x36,0x3f,0x68,0x01,0xd3,0xca,0x48,0x93,0xfb,0xc6,0x7b,0xdb,0xcb,0xe4,0x13,0x41,0x0c,0x24,0x45,0x7d,0x5a,0x9b,0x17,0xc2,0x7a,0x73,0x7c,0x03,0x9d,0x5c,0x71,0x54,0x68,0x9a,0x5d,0xf9,0x6e,0x5f,0x13,0x79,0x6d,0x65,0xca,0x7f,0xef
.byte 0xb2,0xa9,0x5a,0x77,0xc8,0x4a,0x4a,0x91,0x17,0xb1,0xb1,0x8c,0x28,0x22,0xe0,0xff,0xcb,0x00,0xa3,0xb6,0xe2,0x36,0xc2,0x5f,0xd9,0x7f,0x5f,0x85,0xef,0xe7,0x46,0x00,0xc7,0x08,0x8b,0xf3,0x1f,0x63,0x0f,0x23,0xff,0xe3,0x21,0x58,0x73,0xf7,0xaa,0xff,0x2d,0x9a,0x02,0xe5,0x18,0x66,0x34,0x65,0xfd,0x68,0xbf,0xd9,0x3b,0xfc,0xdc,0xc0
.byte 0xa8,0xf7,0x2b,0xc2,0x37,0x01,0x7e,0x3d,0x6e,0x44,0x73,0xc8,0x6b,0x53,0xc3,0x19,0x51,0x84,0x3a,0x28,0xbe,0x5f,0x5a,0x1c,0xcf,0xd3,0xfb,0x25,0x43,0x99,0x9b,0x24,0x58,0xdb,0xc0,0x27,0xf4,0xfc,0xe6,0x2f,0x17,0x48,0xbb,0xf3,0x33,0xc1,0x0a,0x3e,0xb2,0x41,0x9b,0x24,0x16,0xcb,0x0c,0x2a,0x87,0x7f,0x34,0x70,0x4f,0xf0,0xb7,0x6e
.byte 0x39,0x18,0x3b,0xca,0x8f,0xcb,0x2c,0x51,0x68,0x5b,0x60,0xeb,0xeb,0x05,0xeb,0x96,0x77,0xca,0x60,0x0c,0x9c,0x88,0xc8,0x09,0x68,0x0d,0x7a,0x89,0x52,0xd7,0x8c,0x3f,0x71,0x71,0x21,0x89,0x4e,0xef,0x77,0x0a,0xdf,0xb7,0xfd,0x08,0x59,0x54,0x24,0x99,0x48,0x1f,0x27,0xca,0x7d,0x1b,0x46,0x2b,0x81,0x56,0xae,0x5a,0x02,0xd8,0x8e,0x1f
.byte 0x2a,0xc1,0xd8,0x9b,0xb5,0xeb,0xfd,0xae,0xe5,0x35,0x0d,0x33,0x3d,0x49,0x9e,0x0a,0x62,0x01,0xfb,0xd0,0x25,0xd6,0x9f,0x7d,0x70,0xd9,0x6e,0xda,0x19,0x97,0x5d,0x46,0x67,0x8c,0x21,0xd3,0xe5,0xe5,0x50,0xaf,0x47,0x16,0xb3,0xea,0x21,0xe1,0xee,0x1c,0x93,0x14,0xd0,0x4a,0x1e,0xfb,0x19,0xa9,0x26,0x71,0x53,0x9b,0x17,0xda,0x8f,0x28
.byte 0xf5,0x35,0xf6,0x59,0x75,0xb1,0xeb,0xec,0x5a,0x92,0xc0,0xed,0xc1,0x48,0xaa,0xd8,0xb6,0x54,0x32,0x96,0x58,0x34,0x09,0x75,0x5e,0x0c,0x58,0x8d,0xc1,0x42,0xf1,0xfb,0x41,0xe1,0x23,0x84,0x25,0x3a,0x83,0x4c,0x13,0x0e,0x67,0x33,0xf9,0xfb,0x5b,0xa8,0xbb,0xbb,0x92,0x0a,0xca,0x5c,0x9e,0x7a,0x58,0xab,0x51,0x16,0xfc,0xf2,0x4d,0xee
.byte 0xa1,0x2d,0xaa,0x2d,0xb6,0xaf,0x30,0xca,0x4a,0xec,0x63,0xd6,0xf0,0xee,0x81,0xfd,0x9e,0xe7,0x71,0xb1,0x5f,0x3a,0x8e,0xa0,0xd1,0xa9,0xe0,0x61,0xdc,0x9e,0x78,0xbd,0x2b,0xaf,0x93,0xf9,0x61,0xf7,0x70,0x5e,0x9a,0xe9,0x9a,0x31,0x9c,0x81,0x66,0x5d,0x33,0xe4,0xc9,0xf0,0x28,0xfb,0xd7,0xa4,0x10,0x31,0x38,0x83,0x9b,0x96,0x7d,0xfd
.byte 0xd5,0x0e,0x23,0x62,0xa4,0x3b,0x6f,0x63,0xb7,0xbc,0x28,0xca,0xca,0xc5,0x14,0x1b,0xc5,0x3d,0x00,0x58,0xeb,0xf8,0x65,0x09,0x7f,0x0e,0x89,0xcf,0x6a,0x7d,0x0e,0x17,0xdc,0x74,0xde,0x8c,0xfd,0xe4,0x26,0x44,0xe4,0xce,0x2f,0x47,0x66,0x57,0x6f,0x4b,0x86,0x91,0xca,0x36,0xe3,0xeb,0x18,0xd3,0x48,0x63,0x5f,0x3f,0xc6,0xb5,0x38,0x5a
.byte 0x7d,0x20,0xe8,0xc1,0x9b,0xb4,0xc0,0x4e,0xe8,0x93,0x5e,0xd0,0x34,0xa3,0x30,0xf6,0xd6,0x51,0x0c,0x46,0x27,0x2c,0xac,0x91,0x01,0x10,0x8f,0xed,0xcb,0x16,0xf3,0x28,0xfb,0x44,0x55,0xac,0x5e,0xdd,0xf0,0xf6,0xe8,0xbf,0x7f,0xdb,0x14,0x7e,0x40,0x5e,0xa7,0x14,0x52,0x69,0xea,0xd6,0x03,0x76,0x3a,0x10,0x64,0xea,0xe8,0x0c,0x76,0x04
.byte 0xc9,0x18,0x5e,0x22,0xe8,0x1c,0x19,0x2f,0xbe,0x72,0x61,0xe6,0xdc,0xbe,0x95,0x0b,0x95,0x39,0x3d,0x5a,0x34,0x43,0xca,0xb6,0x4b,0xa6,0xf5,0xd3,0x22,0xcc,0xa0,0x35,0x0d,0x06,0x89,0xd1,0xde,0x96,0x49,0x06,0x7e,0x62,0xa1,0x18,0xbd,0x78,0x65,0x2c,0x84,0x22,0xc0,0xea,0x9b,0x7c,0x5c,0xdd,0x97,0x20,0x60,0xc4,0xf1,0xdd,0x68,0xb7
.byte 0x4b,0x30,0x17,0xcb,0xb7,0xbd,0x3c,0xb5,0x66,0xa7,0xad,0xc2,0x9a,0x31,0x79,0x09,0xff,0x4d,0xd5,0xd6,0x35,0x02,0xa6,0x0b,0x8a,0x8a,0xbb,0x54,0xe1,0xea,0xc8,0xa9,0x67,0xfc,0x1a,0x23,0x8d,0xdb,0xc5,0xe5,0x8d,0x1b,0x6f,0x20,0x57,0xbb,0xbb,0xda,0xfa,0x5b,0x07,0x3e,0x3e,0x84,0x2e,0x00,0x36,0x06,0x5c,0x85,0xa3,0x08,0x4a,0x59
.byte 0x48,0x4c,0x7c,0xcc,0x63,0x49,0xde,0xb0,0x59,0xa2,0xb9,0x26,0x8c,0xb2,0x91,0xf8,0xf8,0x07,0xb8,0xba,0x16,0xdb,0xc7,0x6c,0x66,0x5f,0x91,0xc1,0xb8,0x24,0x97,0x1a,0xfb,0x95,0xf6,0x40,0xb0,0x5d,0xd7,0x55,0x40,0x8d,0x75,0x35,0xbf,0xd6,0xcf,0xe4,0xe8,0x6d,0x33,0x10,0xd7,0x8b,0xf3,0xc0,0x00,0x47,0xbb,0x90,0x51,0xd2,0xf5,0x56
.byte 0xf8,0x82,0xb6,0x50,0xea,0x88,0x44,0x0b,0x46,0x53,0xc4,0x10,0x80,0x03,0xfa,0x63,0xa7,0x92,0x38,0x7c,0x62,0xbe,0x90,0xea,0x9d,0x0d,0x09,0x6e,0x08,0x34,0x61,0x41,0x7f,0xe7,0xaf,0x45,0x3f,0xa5,0xbf,0x7a,0xae,0xc0,0xa8,0xfc,0x64,0x4a,0x73,0x85,0x08,0xce,0xf3,0x7b,0xcc,0x0d,0xf8,0xa4,0xa0,0x9f,0x48,0x28,0x81,0xf9,0xe4,0xb5
.byte 0xdd,0x6c,0x32,0xbb,0x1a,0x36,0xe6,0x78,0x8d,0x85,0x4a,0x8b,0xfb,0xf1,0x14,0xfe,0xde,0x15,0x92,0x8b,0xd6,0xee,0x73,0x43,0xc0,0x83,0x37,0xf2,0x0a,0xb7,0xc9,0x3b,0x25,0x2b,0x08,0x7a,0x54,0x49,0x21,0x5f,0xd4,0x78,0xc1,0x30,0x10,0x1c,0xad,0xfd,0xbd,0xb4,0xb1,0x6c,0xd8,0xd1,0x17,0x3e,0x61,0x2b,0x80,0x82,0x63,0x93,0x2d,0x0b
.byte 0x0e,0xcc,0xaf,0xa9,0xc3,0x2d,0xb7,0xc7,0x25,0x37,0x5f,0x3e,0x61,0x94,0xe1,0x2c,0xd3,0x31,0x84,0x9f,0x48,0x9c,0xb2,0x73,0x7d,0xd5,0x84,0xba,0xb8,0x1c,0xa4,0x88,0x4c,0x9e,0x14,0x89,0x09,0x25,0xf1,0x47,0xc1,0x20,0x45,0xfd,0x1a,0x1f,0x25,0x33,0xeb,0x9f,0xa8,0x17,0x93,0xd4,0x41,0x24,0xbd,0xd2,0x08,0x90,0x68,0xad,0x76,0x43
.byte 0xa4,0xd9,0x35,0x68,0x0f,0x28,0xd4,0x2d,0x1e,0xcd,0x52,0x0d,0xf5,0x70,0x92,0x42,0x58,0xbb,0xa6,0xec,0xe9,0x71,0x04,0x66,0xf2,0x16,0x0d,0x3a,0xc0,0x6b,0x85,0x67,0x84,0x12,0x2d,0x02,0xa4,0x17,0x34,0x33,0x91,0x0b,0xa2,0x04,0x0c,0xe3,0xa4,0x80,0x5a,0x83,0xef,0x76,0xe7,0x9a,0xa8,0xa6,0xb8,0x41,0xe3,0x06,0xa7,0x9a,0xc7,0xe6
.byte 0x56,0xa0,0x21,0x53,0x0c,0x5c,0x38,0xad,0xa2,0x87,0x3d,0x7d,0x38,0x50,0xe1,0x49,0xb7,0x56,0xf7,0xfc,0xc4,0x60,0x9e,0xb9,0x4a,0x68,0x18,0x1b,0x84,0xea,0x9a,0x30,0x01,0x53,0xf8,0xd3,0x25,0xb1,0xd0,0x3d,0x23,0x71,0x21,0x19,0xdf,0xe0,0xe4,0xdb,0xba,0xcc,0x92,0xe8,0x97,0x56,0xba,0x4f,0x63,0x77,0xaf,0xbb,0xe9,0x30,0x09,0x40
.byte 0xbf,0x3c,0xf4,0xb6,0x0c,0x8b,0x1f,0x22,0x73,0x6e,0x49,0x1e,0x29,0x4f,0x92,0xa1,0x90,0xf7,0x2a,0x55,0xee,0xb3,0x36,0xe8,0x69,0x2c,0xc0,0x60,0xaa,0x1c,0xa6,0x84,0x0a,0x90,0xfa,0x5e,0x48,0x14,0x3a,0xf7,0x1e,0xe2,0x24,0xe7,0xae,0x2e,0x1f,0xdb,0xa6,0xc6,0xcb,0x6e,0x4b,0xae,0x88,0x4e,0x66,0xa9,0x96,0x23,0xa8,0xd7,0x94,0x3a
.byte 0xae,0xa5,0xdc,0xdd,0xfb,0xbd,0x1c,0xbf,0xa6,0xe0,0x29,0xe2,0xd1,0xa5,0x1b,0xd9,0x6d,0x38,0xd1,0x84,0x6f,0xf7,0x46,0x72,0xf0,0x89,0x72,0x4f,0x7f,0xb6,0xf3,0xf9,0x91,0x61,0x68,0x12,0x48,0xfb,0x1b,0x74,0xc7,0x7a,0x6b,0x4c,0x5d,0xbd,0x4b,0x89,0xfb,0x43,0xa7,0xd7,0xd0,0xc2,0x88,0x86,0x9b,0xcf,0x0e,0x94,0xc3,0x49,0x47,0x82
.byte 0xd6,0x06,0x54,0xa4,0xb4,0x81,0xdb,0x07,0x38,0x5e,0x9e,0xc6,0x39,0x57,0x05,0x14,0x18,0xf9,0x68,0x6c,0x27,0x32,0xcf,0x90,0xd9,0xc8,0x7c,0xc4,0x1b,0xab,0xa8,0xc0,0x75,0x34,0x35,0x32,0xde,0x8e,0x20,0x09,0x6a,0x90,0x2a,0x67,0x86,0x61,0x08,0x9a,0x53,0xfc,0x6a,0x9a,0x0d,0x87,0x8b,0xa2,0xa3,0x72,0x6f,0xfa,0xc3,0xd0,0x9c,0x7a
.byte 0xc6,0x9e,0x1e,0xb4,0x2e,0xaf,0x4a,0x39,0x95,0x07,0x4f,0xbb,0xb4,0x52,0x7f,0xea,0x54,0x21,0x79,0x7e,0x2b,0x7a,0xea,0xec,0xcd,0xa5,0xdc,0xfd,0x8c,0x3c,0x9b,0x1d,0x7d,0x15,0x5b,0x05,0x95,0x7a,0x14,0xa8,0x3c,0xdd,0x91,0x0e,0x25,0xfc,0xa6,0x91,0xd8,0x2d,0xa5,0xf7,0xcc,0x26,0x77,0x2e,0x08,0xda,0x56,0xb9,0xc8,0x0e,0x78,0x79
.byte 0xda,0x1d,0x56,0x41,0x1f,0x17,0x36,0x68,0x1c,0x16,0xcf,0x36,0xdf,0xb3,0x53,0xf9,0xf7,0x34,0x92,0x86,0x03,0xfe,0x67,0x8b,0x8b,0x4c,0xc3,0xfd,0xd0,0x44,0xce,0x91,0x57,0x3b,0x96,0x42,0x22,0xae,0xfc,0xf5,0xd7,0xcd,0x22,0x3e,0x91,0x05,0xf6,0x28,0xa7,0x6b,0xc7,0x0f,0xb8,0x67,0x26,0x84,0xa8,0x73,0x44,0xa5,0xd4,0x58,0x07,0x0a
.byte 0xcc,0xaa,0xd6,0x49,0xff,0x1a,0xce,0x30,0x14,0x62,0x9a,0xcc,0x6e,0x98,0xb5,0x6d,0xb4,0xa4,0x5d,0x71,0x10,0xd1,0x64,0x84,0x70,0x51,0xb5,0xe1,0xfc,0x78,0xe4,0x70,0x88,0x2a,0xcf,0x41,0xcc,0x45,0x34,0xa2,0xef,0x9b,0xf0,0x8b,0x27,0x11,0x81,0x89,0xee,0x5d,0x37,0x8e,0x6d,0xe3,0x72,0x89,0x65,0x23,0x88,0x97,0x03,0xab,0xb3,0x90
.byte 0x76,0xf1,0x27,0x1b,0xa7,0xf0,0x5d,0xe4,0x83,0xda,0x4e,0x5b,0xbc,0x95,0xec,0x6f,0xdf,0x00,0xbf,0x2d,0xda,0xda,0x50,0x80,0xba,0xef,0x99,0x2b,0x6d,0xf7,0x61,0x01,0xcf,0xdb,0x9e,0x3d,0x65,0x22,0x03,0x5b,0x1d,0x0c,0x4a,0x08,0x83,0x78,0xd0,0x2b,0xe5,0x92,0x0d,0x53,0x50,0x0d,0xc0,0xdb,0x2d,0x8a,0x77,0xfe,0xb1,0x42,0x99,0xe1
.byte 0xcb,0x1e,0x07,0x51,0x39,0x7e,0x75,0xa1,0xf2,0x73,0xea,0x0e,0x5e,0x1d,0xe9,0x60,0xc1,0x18,0xe7,0x5f,0xc6,0x37,0x49,0xb0,0xd5,0xc0,0xfb,0x0b,0xbd,0xa7,0x0f,0xe1,0x07,0xea,0x99,0xad,0x98,0xee,0xa1,0xa3,0xfd,0x4b,0x94,0x35,0xd3,0xe9,0x16,0xbf,0xf3,0x91,0x80,0xc2,0x9b,0x22,0xdc,0x47,0xef,0xad,0x15,0x12,0x2c,0x3d,0x5d,0x04
.byte 0x7a,0xcc,0x43,0xf1,0xe6,0xb8,0x1a,0xe8,0xc1,0x81,0x1d,0x84,0x3a,0x42,0x92,0xc3,0xb6,0x76,0x07,0x89,0x2b,0x78,0xd0,0x0e,0xca,0xef,0xaa,0x7d,0xd1,0xe8,0x66,0xed,0xbf,0x5c,0x5e,0x2d,0x8d,0x3e,0xc2,0xbb,0xb9,0x53,0x27,0x98,0x0b,0xa1,0x5d,0x9e,0x7d,0x65,0x25,0x1f,0x3c,0xb1,0x37,0x6c,0xde,0x5e,0x02,0xbe,0x75,0x26,0x5b,0x2a
.byte 0x25,0x21,0xa1,0x4f,0x95,0xda,0x29,0x61,0x1c,0xff,0x2b,0xc5,0xdc,0x2d,0x8f,0x54,0x4b,0x19,0x06,0x0c,0xb6,0x6c,0xe7,0xd4,0xc3,0x4b,0xa5,0xf5,0xc3,0xe2,0x42,0x90,0x36,0x61,0xb1,0x57,0x19,0xb7,0xca,0x7d,0xcb,0x31,0xbe,0x8d,0xb7,0x5a,0x9d,0x81,0xf2,0xf0,0x18,0x45,0xc8,0xcb,0x3c,0x71,0x42,0xe5,0x6a,0xfe,0x00,0x9f,0x4d,0x59
.byte 0x32,0xaa,0x0b,0x2c,0xed,0x1c,0xfe,0xe7,0xbd,0xce,0xc3,0x2c,0xb2,0x3e,0xdf,0xb3,0x0e,0x96,0xbe,0xe9,0xd1,0xf0,0xe2,0x31,0xf6,0xeb,0xa9,0x7b,0x32,0xbe,0x42,0x55,0xf3,0x80,0x71,0xfb,0x1f,0x6e,0x5f,0xd3,0xc8,0xdf,0x64,0x7b,0x3e,0xf2,0x00,0x60,0x7f,0x49,0x5a,0x97,0xa9,0xf1,0x8f,0x82,0x6d,0x33,0xbf,0x2f,0x34,0xc7,0xbe,0x24
.byte 0x27,0xe8,0xe2,0x88,0xfb,0x3b,0xe3,0xaa,0x86,0x90,0x8d,0x69,0x0e,0xb4,0x83,0xea,0xdc,0xc8,0xce,0x8c,0x53,0xb0,0xcc,0xcc,0x2a,0xe6,0xb0,0xee,0xde,0xe6,0x0c,0x7f,0xce,0x73,0x6f,0xa9,0xa2,0x3e,0xf6,0x66,0xc5,0x83,0xfe,0xa1,0xab,0x80,0x90,0xd5,0x58,0x98,0x22,0xb0,0x4c,0x21,0x27,0xb7,0x19,0x68,0xa7,0x18,0x6b,0xb4,0x82,0x76
.byte 0xff,0xb1,0xb1,0xa5,0x14,0x06,0x5b,0xfe,0xe4,0xd2,0xb8,0x4f,0x21,0x2a,0x74,0x17,0x01,0x78,0x74,0xf3,0x2a,0xa0,0xec,0x36,0x5c,0x9e,0xae,0x7f,0x27,0x2f,0x79,0xb1,0x2a,0x70,0x27,0x82,0xdf,0xf1,0x52,0x00,0xfe,0xce,0x04,0x47,0xda,0x8e,0x2c,0xa4,0x71,0x65,0x54,0xb3,0x81,0xbd,0x0f,0x9f,0x6b,0x5a,0x0e,0x91,0xb3,0x07,0x36,0x65
.byte 0x86,0x75,0x75,0xfb,0x96,0x10,0x8f,0xd7,0x96,0xf5,0x0d,0xa7,0x4d,0x41,0x0c,0x8f,0x28,0xbc,0xda,0xf9,0xe7,0x41,0xcd,0xfd,0xb9,0x2c,0x44,0x13,0xe4,0xde,0xa6,0xd4,0x5e,0x4c,0x17,0xfa,0x0e,0x11,0x45,0xf4,0xbb,0xad,0x58,0x0d,0xec,0x2f,0xf8,0x14,0xca,0x18,0x2d,0x04,0x38,0xdf,0x1c,0x47,0x63,0xa4,0x31,0xb9,0x18,0xf7,0x79,0xee
.byte 0x15,0x4a,0xd1,0x6e,0x61,0xe7,0x05,0x5d,0x0e,0x99,0xa5,0x7d,0xfe,0x67,0x29,0x21,0x2b,0x07,0xaa,0xed,0xf0,0x54,0x37,0x79,0x5b,0xe7,0x38,0x21,0x0b,0x29,0x6e,0x34,0xe4,0xdb,0xe9,0xe3,0x6e,0xea,0x34,0x6a,0xbb,0x39,0x2a,0x5d,0x34,0x7b,0xee,0x5d,0x68,0x62,0x34,0x66,0xcf,0x3f,0x1c,0x61,0x94,0x7b,0x69,0x71,0x92,0x23,0x6e,0xc9
.byte 0xec,0x34,0xe4,0xb4,0xa3,0xc4,0x3c,0x62,0x4f,0x4c,0xc8,0x5e,0xb1,0x9c,0xcc,0x0d,0x6b,0x62,0x55,0x1b,0xdd,0xa9,0xa2,0x0a,0x69,0x79,0x1d,0x2d,0x4e,0xf1,0xb3,0xbb,0x50,0x9e,0x48,0xf2,0x71,0x1e,0x09,0x63,0x57,0x54,0xc6,0xa9,0x9f,0x1f,0xe8,0x21,0x96,0xd3,0x37,0x09,0xae,0x68,0xe9,0xd7,0x4f,0xf4,0x8c,0x49,0x13,0xb1,0x56,0x4a
.byte 0x36,0x43,0x5e,0x19,0xf5,0x7a,0x2a,0xe9,0xcf,0x3e,0x01,0x44,0xb1,0xa4,0xb2,0x77,0xf5,0x53,0x00,0xe3,0x51,0x57,0x63,0x48,0xba,0xb6,0x0f,0xbd,0xec,0x2b,0xaa,0xf5,0x52,0xa1,0xd2,0x0e,0x37,0x06,0x9e,0x6e,0x06,0xb0,0x65,0x56,0x5b,0x97,0x4f,0x2b,0x87,0xd9,0x0c,0x98,0x7a,0x3c,0x1b,0xd7,0x04,0xd5,0x68,0x60,0x46,0x1b,0x0c,0x9d
.byte 0x4d,0x41,0x9d,0xff,0x80,0xf3,0xb2,0x3b,0x2e,0xb0,0x1f,0x92,0x85,0x65,0xb1,0xcf,0x5c,0xa2,0xa5,0x0b,0x83,0xa1,0x1b,0xbd,0xd2,0x8e,0x8a,0x33,0x9d,0xb4,0x06,0x62,0x24,0x49,0x4e,0x00,0x8a,0xa4,0x9a,0x2c,0x84,0x3f,0xe4,0x03,0x3d,0xf2,0x30,0x90,0x1c,0x37,0x38,0xf8,0xd4,0x04,0xd2,0xdf,0x69,0xd0,0xb5,0xda,0xbc,0x41,0x38,0xe0
.byte 0xaf,0x32,0x87,0xe1,0x98,0x21,0xb7,0x1b,0x3b,0x2b,0x3e,0x92,0x74,0xe8,0x44,0xdb,0x5c,0x39,0x9a,0x5c,0x71,0x60,0x48,0x95,0x5c,0x47,0xa4,0xa8,0x12,0x3b,0xbf,0x75,0x22,0x0a,0xf1,0x73,0x42,0xbc,0x8a,0x54,0x19,0x04,0xad,0x7a,0xbc,0x9c,0x35,0x53,0x52,0x4b,0x13,0x94,0x5c,0xe7,0x10,0x12,0x49,0xa8,0xb3,0x85,0x02,0x09,0x25,0xcd
.byte 0xd1,0xdc,0xb5,0xe0,0xab,0x93,0x8c,0xf1,0x78,0xac,0x6c,0xa8,0x72,0x12,0x16,0x80,0x4d,0x76,0xcb,0x04,0xba,0x50,0x3a,0xf5,0x8f,0x5f,0x82,0xa8,0x83,0x6f,0x16,0xd2,0x85,0x67,0xe2,0x81,0xc7,0x5d,0x82,0x2c,0xea,0x6a,0xd7,0xc4,0xaf,0x9b,0x22,0x21,0x05,0x29,0x92,0xd7,0xe6,0x60,0xc6,0xdc,0x4c,0x15,0xde,0x46,0x4a,0xda,0xe3,0x4a
.byte 0x7d,0x9f,0x7d,0x45,0x51,0x81,0xa3,0x78,0xfc,0x34,0x91,0x93,0xae,0xa9,0xb0,0x34,0x56,0x12,0x8c,0xec,0xe7,0x75,0x14,0x43,0xa5,0x0d,0xe4,0x91,0x3c,0xbb,0x64,0xb8,0x3d,0xd3,0xf9,0x55,0x5f,0x1f,0x30,0x3e,0xf8,0x84,0x8f,0xa3,0x5c,0x91,0xaa,0xa4,0x1a,0x16,0xef,0xcf,0x45,0xd4,0xa0,0xf6,0x56,0x9d,0xd2,0x88,0x50,0x0e,0x40,0xa5
.byte 0xde,0xbe,0x80,0x83,0x71,0xfc,0xfe,0xc7,0xe5,0xf7,0xda,0x51,0x86,0xc3,0xde,0xeb,0x54,0x17,0x7e,0xf6,0x20,0xd4,0x80,0xed,0xc0,0xc4,0x67,0xb5,0x26,0x03,0x98,0x26,0xa2,0xd2,0x0c,0x0a,0xf3,0xb0,0x65,0xd7,0x7e,0x26,0xf0,0x74,0x75,0xff,0x9e,0xfd,0x6f,0x1b,0xd2,0x49,0x4b,0x79,0xf7,0xb2,0x5d,0x02,0xfa,0x17,0x51,0x5e,0xc7,0x5e
.byte 0xf8,0x0e,0x99,0xc4,0x94,0x42,0x37,0x74,0x74,0xa6,0x04,0x4e,0xe1,0x1c,0x2a,0x79,0x1f,0x0a,0xba,0xd8,0x24,0xe2,0xed,0x65,0x33,0xdb,0xb6,0x2d,0x1d,0x30,0xec,0x18,0x7c,0x8f,0x82,0xf1,0xad,0x30,0x97,0xc5,0x9e,0xd8,0xa6,0x64,0x5f,0xcd,0xaa,0xd7,0xce,0xd0,0xd5,0x32,0xb6,0x4e,0xe0,0xe0,0xdd,0x03,0x04,0x63,0x76,0x83,0xda,0x4b
.byte 0x63,0x28,0x73,0x63,0x02,0x76,0x02,0xde,0x96,0x6a,0xea,0x21,0x00,0x25,0x5a,0xc8,0x52,0x0a,0xcb,0x5e,0x76,0xe9,0xd8,0x61,0xd3,0xda,0xdd,0x36,0x9c,0xa1,0x8e,0xf2,0x8d,0xc8,0xa1,0xe9,0xa2,0x1d,0xd3,0x53,0xb5,0x43,0x39,0x59,0x7e,0x12,0xd5,0x51,0x3b,0x71,0x66,0x6e,0x0d,0x6a,0x68,0x56,0x47,0x9c,0x95,0x7f,0xeb,0xff,0xf3,0x3f
.byte 0x88,0x13,0x36,0x43,0xff,0x56,0xc3,0x28,0xa8,0x10,0x70,0xd3,0x04,0x8a,0x45,0xb7,0xe4,0x71,0x79,0xa1,0x20,0x70,0xab,0x7c,0xc1,0x20,0xb7,0xaf,0x67,0x86,0x6f,0x1d,0x2e,0x84,0xca,0x68,0x97,0x42,0xa1,0x9b,0x1c,0x10,0xbd,0x76,0xed,0x54,0x46,0x50,0x13,0xa9,0x2d,0x43,0x43,0x82,0x84,0x2c,0xee,0x8f,0x42,0x2f,0x75,0xe1,0x37,0x46
.byte 0xaa,0x6d,0xc4,0x03,0xb6,0x6c,0xd2,0xe7,0x3a,0x45,0x5d,0xe8,0x2e,0x99,0x11,0x7d,0x61,0x8f,0x10,0x37,0x45,0x49,0x29,0xa7,0x28,0xca,0x78,0x53,0xab,0xed,0x70,0xfa,0xd9,0x1b,0xf4,0x08,0x96,0x77,0xd8,0xd9,0xdb,0x03,0xff,0x9e,0xe3,0xd1,0x03,0xc3,0xd5,0x54,0xac,0x11,0xfc,0xd0,0x7c,0x9a,0x11,0x1d,0xc9,0xbc,0x7f,0xfd,0x2d,0xb6
.byte 0x8e,0x2a,0xc7,0x35,0xde,0x5a,0x2c,0x4f,0xcd,0x29,0xb0,0x8b,0x06,0xd2,0xa7,0x20,0xc5,0x27,0xe8,0x2a,0x93,0x70,0x40,0x01,0xaa,0x9b,0x71,0x93,0x98,0xcb,0xc6,0xe1,0x2e,0x0e,0xc6,0x4c,0x4f,0xb5,0x7d,0x26,0x39,0x99,0x8d,0x9d,0x91,0x26,0xf2,0x6a,0xb9,0x8c,0x92,0x63,0x26,0x4b,0xd4,0x3b,0xf6,0xba,0x17,0x9c,0xc6,0x8c,0x60,0x52
.byte 0x16,0x5a,0xcd,0xc4,0xdb,0x5c,0x17,0xf6,0x7a,0x32,0x3e,0x13,0x88,0x5d,0x2c,0x26,0x13,0x08,0x5e,0x51,0x8d,0x20,0x88,0xbf,0x70,0x4a,0x9a,0x56,0xff,0xf6,0x25,0x59,0x58,0xaa,0x7e,0xa5,0xc7,0x2c,0x89,0x3e,0x30,0x93,0x3b,0x6c,0x02,0x6e,0xe3,0x84,0xe4,0x05,0xc6,0x69,0x84,0xcb,0xe0,0x67,0x77,0xf3,0x4d,0x8e,0xfa,0x02,0xae,0xa7
.byte 0x7c,0x75,0x5b,0xdf,0xdc,0x01,0xbe,0x70,0xfa,0x47,0x80,0x64,0x3b,0xd6,0x0c,0x6a,0x7f,0x8f,0xff,0x52,0x11,0x90,0x0b,0x40,0x78,0xf6,0xa5,0xa0,0x4e,0xcd,0xc2,0x0d,0x2f,0xb8,0x3c,0x3c,0xc3,0x15,0xf2,0xa3,0x5f,0xf3,0x40,0x96,0x6f,0x89,0x91,0x32,0xbe,0x0e,0x63,0x4f,0xea,0xa2,0xc0,0x5d,0x30,0xb9,0x6d,0x21,0xeb,0x34,0xe4,0x65
.byte 0x64,0xa4,0xd5,0x29,0x68,0xa6,0x17,0x00,0x82,0x5c,0x65,0xf0,0xeb,0x74,0xa1,0x9b,0xdd,0x1a,0xf4,0xd8,0x00,0x1b,0xb0,0x0d,0xc7,0xe4,0x23,0x62,0xf6,0x81,0x9f,0xd8,0x81,0x3f,0xd8,0x0b,0xca,0x2e,0xd4,0x3c,0x10,0x44,0x14,0x66,0x1e,0xbc,0x1c,0xc8,0x0e,0xd5,0x0c,0x22,0x18,0xd1,0xec,0xf8,0x87,0x55,0x89,0x53,0x2a,0xf0,0x66,0xca
.byte 0x88,0x98,0x9c,0x1e,0xa8,0x56,0x2e,0x5e,0x24,0xd2,0xd8,0x8d,0x6e,0x0c,0x81,0x55,0xf0,0x8d,0xa5,0x8c,0x3a,0x27,0xbc,0x2e,0xab,0xdd,0x6e,0x55,0xce,0xd7,0x9a,0x6b,0x2b,0x03,0x18,0x6b,0xf7,0x78,0x79,0x6c,0x64,0xb1,0xaa,0xff,0xd4,0x34,0xac,0x61,0xfd,0x51,0x03,0x41,0xd8,0x4b,0xad,0xd7,0xd2,0xfc,0x17,0x91,0xd0,0x90,0x15,0xd3
.byte 0xcf,0x3f,0x55,0x3d,0x8c,0x70,0x7a,0xda,0x0c,0x04,0x0a,0x29,0x5c,0x08,0x56,0xa8,0x60,0xea,0xd1,0xe7,0xff,0x53,0xc7,0x27,0xe3,0x21,0xe9,0xdc,0xb7,0x6c,0xc1,0x6a,0x4c,0x62,0xb2,0x67,0x79,0x24,0x8f,0x7d,0x96,0xd6,0x4c,0xa7,0x54,0xbe,0x07,0x85,0x53,0x9f,0xc9,0xbd,0x99,0x98,0x13,0x2a,0x49,0xcc,0xe5,0x70,0x56,0x90,0xbe,0xd3
.byte 0xd5,0x17,0x44,0x2e,0x11,0x3e,0x96,0x0b,0xc1,0x66,0x0d,0x36,0x2d,0x28,0x68,0xbd,0x8c,0x46,0x71,0x39,0x8f,0xd5,0xe3,0xd1,0x74,0xde,0x85,0x26,0x3c,0x8e,0xde,0x79,0xbe,0xf4,0x20,0xfc,0x3c,0x8b,0x73,0x0d,0x82,0xc0,0xa8,0x48,0x9f,0x4e,0x9f,0xb8,0xcd,0xc2,0x70,0xa7,0x54,0xe5,0x22,0x86,0x3a,0xf1,0xf0,0xbc,0x8b,0x74,0xea,0x9e
.byte 0x45,0xbd,0xa5,0x54,0xc5,0x75,0x30,0xfa,0x5e,0x05,0x4b,0xc2,0xe3,0x09,0x4b,0x3d,0xfb,0x84,0x0c,0x96,0x36,0x2b,0xbf,0xcc,0xe2,0x15,0x39,0x6f,0xc8,0x91,0x56,0x0b,0xf8,0x4b,0x1b,0x61,0xa4,0x68,0xc0,0x06,0xaa,0xa9,0xef,0xea,0x69,0xdb,0xda,0x6a,0x50,0xa9,0x5a,0xb4,0x9b,0xf5,0xf0,0xbe,0x2f,0x34,0x20,0x96,0x84,0x70,0x0d,0xfe
.byte 0x00,0x16,0x77,0x45,0x5b,0xf4,0x29,0xf1,0x41,0xb5,0x71,0x3e,0x91,0x5d,0x96,0x21,0xb4,0xb2,0x61,0x23,0x96,0xcd,0x28,0xaf,0x23,0xf0,0x45,0xc7,0xaf,0xd3,0x9e,0xb4,0x29,0xd7,0x68,0x5b,0x01,0xaa,0x5f,0x06,0x78,0x61,0xc4,0x61,0x49,0x01,0x0a,0xcc,0x2d,0xe1,0x03,0x27,0x07,0x11,0x9b,0x46,0x7b,0x8f,0xe0,0xfd,0xd6,0x72,0x14,0x1e
.byte 0x0f,0xd0,0xbc,0x5d,0xd7,0xb5,0x86,0x86,0xd3,0x02,0xcc,0xd4,0x2a,0xaa,0x47,0x01,0x82,0x97,0x07,0x9b,0x11,0xb3,0xba,0x8d,0x40,0x6d,0x0b,0x71,0xe1,0xa0,0xd2,0x27,0x4c,0x04,0x4f,0x33,0x4b,0xe3,0xc4,0xb6,0x60,0x8d,0x0c,0x9b,0xbc,0xfb,0x21,0x8c,0x7a,0x59,0xf1,0xf5,0xfc,0x84,0x4c,0x98,0x97,0x36,0x6d,0x38,0x1c,0x2a,0x39,0x9d
.byte 0x0c,0x0c,0x4d,0xf1,0xba,0x24,0x3f,0x05,0x3b,0x9e,0x39,0xc4,0xd2,0xec,0xbe,0x31,0x6a,0x6b,0xc6,0xff,0xe8,0x75,0x1a,0xad,0x2f,0xbd,0xa5,0xf6,0x4b,0xbd,0xb9,0x26,0x89,0xb0,0x99,0x47,0xb9,0x10,0xcf,0x20,0x4a,0xfb,0xa4,0xeb,0x9d,0xbe,0x90,0x15,0xed,0xba,0x43,0xf3,0xcc,0x2e,0x68,0x09,0x39,0xb3,0x53,0xc6,0xac,0xe5,0x5c,0x97
.byte 0x75,0x95,0x4d,0x49,0x84,0x2c,0x00,0xfc,0x1d,0x58,0x61,0x88,0x3c,0x0c,0x84,0x5d,0x60,0x6d,0x86,0x6c,0x2c,0x49,0xcc,0x6a,0xee,0xc3,0xb3,0x23,0x85,0xba,0x55,0x56,0x95,0x43,0x7b,0x74,0x22,0x9f,0x7c,0x91,0x2b,0xf6,0xeb,0x4c,0xc6,0x47,0x69,0x4a,0x41,0x80,0xee,0x81,0x8f,0xe8,0xd5,0x80,0x6c,0x0b,0x1b,0x0c,0x22,0x60,0x60,0x05
.byte 0x0a,0x9f,0x53,0x6f,0xca,0xcf,0x82,0xf7,0xd4,0x3d,0x44,0x66,0x7a,0x99,0x34,0xf1,0xf2,0xec,0xfe,0x08,0x2d,0x24,0x5f,0x32,0x45,0xb9,0x43,0x97,0x58,0xf4,0x8d,0x15,0xaf,0x27,0x19,0xc4,0xdb,0x73,0xfe,0xee,0x87,0x02,0xb3,0xeb,0xb2,0x9f,0x8d,0x1b,0x13,0xaa,0x19,0xbf,0x76,0x8b,0x3f,0xce,0xea,0x84,0xe9,0xc0,0x59,0x02,0x03,0xc0
.byte 0x88,0x54,0xa2,0x3e,0x90,0x45,0xcb,0x13,0xc3,0x8f,0x57,0xd7,0x29,0xd0,0xee,0x5e,0xe6,0xe2,0x76,0xf3,0xb3,0xd0,0x6c,0x98,0x80,0x8e,0x39,0xfb,0xd8,0x2b,0x6c,0x1a,0xab,0xba,0xb1,0x32,0x2a,0x9b,0xdd,0x30,0x6c,0xd9,0xb6,0xb7,0x75,0x90,0x05,0x7b,0x93,0xec,0x62,0x2b,0x90,0xd1,0xf4,0xc6,0x35,0x92,0x07,0x5b,0x45,0x9b,0x79,0x74
.byte 0x64,0xb0,0x25,0x1f,0xd1,0x38,0x76,0x39,0xa0,0x59,0x9d,0x22,0x97,0x73,0x24,0x86,0x55,0xbf,0xbc,0x4c,0x15,0xb3,0xb7,0x77,0x14,0x03,0x15,0x60,0xea,0xaf,0x72,0x84,0xbf,0x38,0x3c,0x6d,0xe0,0xa9,0xc7,0x3e,0xef,0xf4,0x44,0x43,0x5e,0xda,0x2a,0x1d,0x3d,0xc9,0x1d,0xf0,0xb6,0xb0,0x6b,0x11,0x50,0xa6,0x2d,0xed,0x75,0xd3,0x50,0xd5
.byte 0x7a,0xe5,0x96,0xf4,0x65,0x55,0x5a,0x89,0x69,0xf8,0xb8,0xa5,0x6f,0x68,0x7f,0xdf,0x1e,0x25,0xc7,0xe3,0xbe,0x50,0x5e,0x45,0x78,0x58,0xff,0xf5,0x45,0x6e,0xa5,0x10,0xfc,0xdc,0x0f,0x84,0x92,0x00,0xc2,0x01,0x50,0x66,0xfd,0x5c,0xfc,0x87,0xf9,0x80,0xfa,0x01,0xc1,0xc5,0x2e,0x5e,0xaf,0xbe,0xce,0xf2,0x11,0x7c,0xf2,0x67,0x10,0xf3
.byte 0xcc,0x16,0x0c,0xd8,0xe0,0xdf,0x68,0x37,0xef,0x50,0xba,0x16,0x72,0x79,0x9f,0xa7,0xb5,0x82,0x7f,0x6b,0x36,0x47,0x56,0x9d,0xbd,0xb6,0xc9,0xcf,0x79,0x11,0x0a,0x27,0xaa,0x3a,0x1c,0x58,0xc7,0x69,0x23,0xf1,0xcc,0xeb,0xea,0x15,0x7b,0xb5,0x75,0x32,0xb8,0x7f,0x65,0x74,0xca,0x1e,0x92,0x29,0x5a,0x24,0x4f,0xdd,0x8d,0x69,0x89,0xa6
.byte 0x83,0x75,0xa3,0x92,0x5c,0xba,0xa3,0x19,0xde,0x2c,0x8f,0xbd,0x97,0x80,0x2f,0xd7,0x57,0xde,0x95,0x0f,0x21,0x72,0xf8,0xe7,0xcf,0xc8,0xbc,0x3c,0x9d,0x8e,0xfb,0x34,0x41,0xee,0xe9,0x34,0x5b,0x25,0x48,0x3e,0x1b,0x64,0xd0,0x1a,0x6c,0x13,0xe3,0x69,0x49,0x51,0x97,0x81,0x62,0xef,0xa1,0xd9,0xef,0x7b,0xd6,0xc2,0x63,0x25,0x6c,0x50
.byte 0x8e,0xd0,0xfe,0x07,0xe6,0xc3,0xbc,0x47,0x6b,0x3d,0x20,0x3a,0x83,0x40,0x90,0x53,0xfb,0xa5,0x9a,0x36,0x1d,0x5d,0xbf,0xf7,0x60,0x27,0xef,0x59,0xd4,0x3c,0xbf,0xb0,0x22,0x15,0xea,0x9e,0xa4,0x59,0x9d,0x74,0x52,0x21,0xe0,0x37,0xda,0x2d,0x66,0xa3,0x9d,0x8e,0x9d,0x45,0xb3,0x2f,0x0a,0x60,0x0b,0xfa,0x09,0x8f,0x3f,0x33,0xc9,0xe3
.byte 0x54,0xfd,0xa2,0x7f,0x58,0xf9,0xcd,0xbf,0xa2,0xd6,0xe0,0x37,0x62,0x5d,0x0c,0xb5,0xf2,0x0a,0x2a,0xa3,0x29,0x96,0xb5,0x96,0x6b,0xba,0x53,0x3d,0xd4,0x11,0xe9,0x43,0x6b,0x44,0x43,0x9f,0xea,0x52,0x92,0xa4,0x13,0x91,0xc1,0x77,0xc3,0x31,0x25,0xe2,0xb5,0x53,0x82,0x7e,0x35,0x58,0x36,0x03,0x61,0x69,0xba,0x27,0x2b,0x65,0x42,0x40
.byte 0x4e,0xd7,0xc2,0x90,0xad,0x52,0x0b,0x66,0x07,0xb1,0x5f,0x07,0x4a,0x67,0x4a,0x61,0x90,0xbd,0x50,0x39,0xf8,0x11,0x59,0xc3,0x41,0xfb,0x1a,0x7f,0xcb,0xf7,0x99,0xc2,0x27,0x33,0x28,0x37,0xa1,0xff,0x1b,0x23,0x46,0x96,0xc1,0x4e,0x03,0x41,0x77,0x27,0xa7,0x68,0x60,0xaf,0xb8,0x7a,0x80,0xb9,0xc2,0xa6,0x9e,0x61,0xa5,0x90,0xa1,0x6a
.byte 0xe3,0xb1,0xd1,0x28,0x9f,0x9f,0xf7,0xf7,0xc9,0xff,0x02,0x82,0xdc,0x81,0x96,0x3a,0x61,0xf4,0x37,0x91,0xc2,0x58,0x48,0x54,0xaf,0xd6,0x0c,0x2d,0x2e,0xbd,0xe9,0x13,0x07,0xf7,0xc5,0x71,0xe9,0xa9,0x9d,0x93,0xa4,0x61,0x29,0x10,0x29,0xfb,0x79,0x9e,0x2c,0x1a,0x3e,0xae,0x7d,0x0e,0xcf,0x52,0xaa,0xdc,0xf2,0xeb,0x5c,0xcc,0x9e,0x42
.byte 0xcf,0x2f,0xf1,0xe8,0x91,0x6a,0x07,0x15,0xb8,0x78,0x6e,0x42,0xd5,0x5f,0x3e,0x53,0x70,0xd6,0x93,0xd4,0xc0,0x43,0x25,0x49,0x54,0xb0,0x13,0xa1,0xc1,0x68,0xdb,0xa6,0xdc,0xf4,0xa6,0x7c,0x8a,0x1c,0xc8,0xaf,0x34,0xc5,0x9f,0x30,0x7a,0xe9,0x4c,0xc9,0x27,0x41,0x7c,0xa5,0xd3,0x7f,0xee,0x17,0x9a,0x3b,0x82,0x15,0xef,0x85,0x3d,0x2b
.byte 0xba,0xc7,0xb8,0x8c,0x13,0xf6,0x0d,0x53,0x33,0x04,0x0a,0x6b,0x8c,0xe5,0xf3,0xc5,0x5f,0xf6,0x7b,0xdb,0x6d,0xa4,0x63,0xef,0xe3,0xcd,0x32,0xb2,0x11,0xab,0x0a,0x01,0x9b,0xc7,0x95,0x51,0x3d,0x34,0x25,0x51,0x2a,0x63,0x73,0x99,0xa7,0x62,0x6d,0x71,0x23,0x83,0xd5,0x25,0x02,0x96,0x26,0xbb,0x25,0x35,0xb9,0x20,0xb3,0x25,0x84,0x07
.byte 0x39,0x9c,0x45,0x67,0xfb,0x89,0x61,0x38,0xb5,0xdf,0x0a,0x9d,0x9f,0xad,0x2f,0x80,0xe2,0x9c,0x6b,0x88,0x84,0xf3,0xea,0xbd,0x75,0x00,0x71,0x21,0x41,0xfe,0xdc,0x2c,0x7b,0xb1,0x3c,0x40,0x99,0xc3,0xf9,0x2b,0xab,0x40,0xf9,0x2e,0x3a,0x65,0x58,0xe5,0x42,0x30,0x5c,0x05,0xf4,0x89,0x2b,0x72,0x54,0x7c,0xce,0x1a,0xa7,0xd4,0xf0,0xc2
.byte 0x05,0x63,0x1a,0x67,0x31,0xb3,0x55,0xdc,0x9f,0x07,0x99,0xa3,0xed,0x84,0x53,0x94,0x7c,0x5f,0x63,0x1d,0xdb,0x51,0xfa,0x92,0xc4,0x5d,0xb7,0x96,0xef,0x26,0x2a,0x09,0x8b,0x5a,0xa5,0xca,0x63,0x41,0x33,0x9e,0xd1,0x00,0x5e,0xaf,0x71,0xfe,0x3a,0x97,0xa4,0xaf,0xe8,0xae,0xce,0xfa,0x82,0x90,0x39,0x00,0x6f,0xd6,0xc4,0x54,0x84,0xf9
.byte 0x0f,0x96,0xfc,0xe8,0x6e,0xce,0xc4,0x55,0xdf,0xcd,0xd3,0xfa,0x65,0xcd,0xc4,0x42,0xe3,0x9f,0xab,0xbd,0xcf,0xc7,0xd3,0xe2,0xa8,0xc4,0xc5,0x06,0xc2,0xf5,0xe7,0x86,0xa4,0xd0,0x7e,0xf6,0x1c,0xd0,0x3c,0x4d,0x15,0x30,0x50,0x43,0x02,0xce,0xd2,0xf1,0xc4,0x28,0xe6,0x54,0xfc,0x21,0x6a,0xd5,0xdd,0xc3,0x39,0xf8,0x57,0x79,0x36,0xec
.byte 0x11,0x24,0x30,0xa6,0xcb,0xa7,0xa4,0x18,0x2e,0x71,0xe5,0x2e,0x31,0xf0,0x0b,0xd1,0xa4,0x77,0x4d,0xbf,0x9f,0x8d,0xb6,0x53,0x49,0x62,0xb0,0xba,0x29,0xde,0xb9,0xc6,0xdd,0x62,0x09,0x0e,0x1e,0xe2,0x78,0xd1,0x3e,0xef,0x9d,0x5d,0x91,0xf1,0x1a,0xd9,0xb8,0x81,0x4b,0x3c,0xfd,0xe9,0x54,0x4a,0x80,0xc9,0x7c,0x37,0xde,0xca,0x92,0xe2
.byte 0x0c,0x66,0xa5,0xfc,0xf1,0xe4,0x9c,0xb3,0xdb,0x15,0x11,0xb4,0xc2,0x21,0x5a,0x4e,0xb1,0x54,0xd1,0x0d,0x78,0x9c,0xaa,0xc2,0x8d,0x10,0xf7,0x24,0x3a,0xb7,0xef,0x2b,0x5b,0x1e,0xa6,0x13,0xcd,0xa9,0x06,0x48,0x98,0x80,0x61,0x67,0xca,0xef,0x76,0x10,0x83,0xe8,0x98,0x43,0xe2,0xa6,0x00,0x5a,0x3c,0xde,0x19,0x6a,0x71,0x21,0x16,0x8d
.byte 0x76,0xe7,0xa1,0x82,0x8b,0xb9,0x21,0x93,0x97,0xbd,0xe2,0xac,0xb9,0xa3,0x57,0x97,0x2a,0xcb,0x27,0xcc,0xcb,0x74,0x87,0xa2,0xa1,0x37,0x63,0xda,0xec,0x64,0x9c,0x56,0x62,0x8f,0xc9,0x5f,0xd3,0x26,0x4b,0xae,0x90,0xc1,0x1a,0xda,0x3c,0x59,0xf1,0xc0,0x47,0xf1,0xa3,0xba,0xd0,0xd5,0x30,0x97,0x3f,0xfc,0x2c,0x88,0x14,0x05,0x34,0x56
.byte 0x8c,0x61,0x21,0xce,0x71,0xb5,0x60,0x62,0x1d,0x68,0x63,0x07,0x3a,0xee,0xf4,0x19,0x6c,0x59,0xdc,0xb8,0x0e,0x67,0xc0,0x74,0x58,0x13,0xe0,0x18,0xb1,0xf0,0x54,0x5c,0x83,0xdf,0xff,0x65,0x6c,0xa6,0xf7,0xff,0xc1,0x50,0x47,0x87,0xf0,0xea,0xa5,0x76,0x19,0x70,0x91,0xaa,0xc0,0x87,0x0f,0x31,0xbb,0xd6,0x7b,0x52,0xb2,0xd6,0x49,0xc1
.byte 0x41,0xdd,0xec,0x9a,0x41,0x22,0xf6,0xc5,0x80,0x80,0xbb,0x2f,0xb9,0x45,0xbd,0x6e,0xef,0x14,0x48,0x96,0xfa,0x9c,0x87,0xb2,0x0b,0x68,0xbf,0xcb,0xe3,0xe3,0x97,0x13,0xf9,0x43,0x66,0x65,0xad,0x18,0x60,0x96,0xc5,0x70,0x91,0x29,0x0d,0x91,0x8c,0xcb,0xcb,0x03,0x6c,0xd2,0xfa,0xf6,0x96,0x19,0x18,0x20,0x15,0x8e,0x77,0x9b,0x74,0xa5
.byte 0x3d,0x6e,0x76,0xc6,0x3c,0x8f,0x6f,0x72,0xe2,0x8b,0xcd,0xa6,0x17,0x26,0x00,0x36,0xac,0x91,0x19,0x1e,0x5c,0x17,0x55,0x6f,0xde,0x0c,0x31,0xe4,0xec,0xd1,0x90,0x1d,0xea,0xea,0x77,0x2f,0x8a,0xee,0x44,0xea,0x39,0xeb,0x00,0x1d,0xde,0xa6,0x37,0x40,0x3d,0x97,0xd2,0x88,0x0e,0xbc,0xbd,0x2c,0xef,0xda,0x3c,0x2e,0x8e,0x0d,0xf3,0xfc
.byte 0x88,0xcb,0x34,0x89,0x3f,0x86,0xec,0xfe,0xf0,0xcd,0x0b,0x80,0xd4,0x02,0xdb,0xd6,0x06,0xf3,0xbe,0x52,0x9a,0xf0,0x1b,0xe7,0x36,0x7d,0xcc,0x84,0xf5,0x02,0x11,0xf6,0xdf,0xb6,0x67,0x3f,0x8a,0xdd,0x5a,0x32,0x12,0xf0,0x3e,0x72,0x55,0xf6,0xac,0xae,0xe4,0x4b,0xbd,0xc5,0x90,0xba,0xfe,0xc0,0x39,0x17,0x24,0xad,0x8b,0xb3,0x93,0x4e
.byte 0x15,0xcc,0xd7,0xcc,0x5c,0x46,0x0e,0x61,0x7a,0x70,0x7f,0x01,0x23,0x7d,0x38,0xbc,0x27,0xb1,0x47,0x25,0x5b,0x9f,0x9c,0x53,0x95,0x40,0x94,0x33,0x16,0xfa,0x31,0xf1,0xb4,0xa3,0xb8,0x50,0x68,0x0d,0x47,0x1d,0x55,0xb3,0x26,0xfd,0xdc,0x4c,0xa8,0xc0,0x02,0xc1,0x53,0x56,0xd9,0x09,0xd8,0xdb,0xfa,0x4f,0xeb,0x33,0x00,0x57,0x28,0x34
.byte 0xf1,0x43,0x5b,0x1d,0xd0,0x13,0xa1,0x90,0x87,0x96,0x97,0xb9,0x28,0xe1,0xa2,0xc0,0xcf,0xae,0xe0,0x7e,0x53,0x3d,0xe3,0xfe,0x35,0x33,0xa9,0x54,0x36,0xb3,0xfb,0x03,0xfc,0x76,0x23,0xf3,0xce,0x58,0x90,0x8a,0x90,0xa5,0x7c,0x99,0x06,0xfc,0x65,0x67,0x13,0xde,0x0c,0x6a,0x38,0x7a,0x9a,0xc1,0xc3,0x3a,0x66,0x99,0x4c,0xed,0x0a,0x15
.byte 0xb1,0xf0,0x9e,0xd0,0x06,0x0e,0xce,0x84,0xe1,0xd7,0xa8,0xe3,0x12,0xb4,0x1a,0xb3,0x5d,0x86,0xda,0xcb,0xd7,0xd2,0x6c,0x1c,0xfa,0x2d,0x4e,0xc3,0x8d,0xe0,0x9d,0x8b,0xa3,0x9d,0xd7,0xf1,0xc5,0x29,0xa5,0x69,0x59,0xea,0x9d,0x85,0x78,0x05,0x14,0x31,0xed,0x91,0x8b,0x80,0xb6,0xd3,0xf5,0x9f,0x5f,0xa1,0x7b,0xe7,0x83,0x81,0xfa,0xa5
.byte 0x4c,0x4d,0x2a,0xae,0xf0,0x09,0x87,0x4e,0x69,0x4f,0x12,0xf7,0xbf,0x0f,0xaf,0x1f,0x9d,0xdb,0x98,0xbf,0xed,0xfe,0xea,0x0a,0xe2,0x8c,0x7d,0x20,0x04,0x85,0x12,0x15,0xf2,0x05,0x93,0x88,0xa7,0x85,0x49,0xbe,0xdf,0x33,0x96,0xc0,0x4a,0x7a,0xfc,0x89,0x01,0xdb,0x09,0xdb,0xef,0xf3,0x43,0x48,0x5b,0x2f,0x41,0x6f,0x10,0x77,0x2f,0x5b
.byte 0xaa,0xaa,0x9c,0x51,0x69,0xf8,0x9b,0x6d,0x82,0xaa,0xaa,0x00,0x5d,0xfa,0xdf,0x74,0x35,0xcd,0xd1,0xf7,0xbe,0xcd,0x39,0xbf,0x94,0x5b,0x9a,0x22,0xd4,0x08,0x57,0x17,0xfa,0x89,0x40,0x44,0x9c,0x36,0x8d,0x0d,0xe5,0x1c,0x9c,0xc1,0xca,0x47,0x86,0xc2,0x3c,0xc3,0x93,0x75,0xcd,0x4c,0x3c,0xf5,0xb9,0xbe,0x2d,0x78,0x2c,0x08,0xaa,0xbf
.byte 0x4d,0x4c,0xac,0x64,0x89,0xfe,0xf3,0x41,0x4a,0xc3,0xec,0x3e,0x5f,0x1e,0x78,0x20,0x4e,0x49,0x9d,0xe5,0xa0,0x18,0xb6,0x00,0x0e,0x51,0x17,0x6e,0x56,0xc3,0x75,0xca,0x77,0x61,0xea,0x6e,0x52,0xa8,0x2c,0xdc,0xdd,0x8d,0x5f,0x2b,0xd5,0x30,0x0d,0x08,0x41,0x5c,0x8d,0x97,0xc9,0xee,0x7b,0xa2,0x10,0x5f,0x3c,0x57,0x68,0xa2,0x2c,0xc8
.byte 0x3e,0xde,0x4b,0x10,0x68,0xaf,0x7d,0xd1,0xdc,0x30,0x33,0xf7,0xff,0x7a,0x23,0x66,0x86,0x56,0x24,0xc1,0x45,0xff,0x92,0x28,0xe4,0xd8,0xb0,0x18,0x63,0x1a,0x16,0xc2,0x59,0x32,0x7b,0x52,0x89,0xa5,0xac,0x71,0x61,0x28,0xc1,0xef,0xcb,0xcc,0x65,0xc3,0x4e,0x62,0xf0,0xed,0xef,0xdf,0x40,0x2b,0x69,0x62,0xe2,0xc4,0x31,0x4f,0x73,0xa8
.byte 0xff,0x17,0x87,0xd2,0x45,0xc2,0x18,0x13,0xbe,0x7f,0x64,0x3e,0x6d,0x61,0xf2,0x18,0x16,0x5a,0x02,0x98,0xf1,0x47,0x5c,0xd4,0x76,0xcf,0x5b,0x29,0x0e,0x9d,0xf9,0x82,0x5b,0x46,0xf9,0x76,0x53,0xcd,0xa0,0xa4,0xf3,0xd8,0x33,0xb2,0xcb,0x3d,0x51,0xf2,0xce,0x07,0xea,0x7d,0x8b,0x65,0xba,0xe0,0xee,0x28,0x37,0x1a,0x31,0xbe,0x70,0x4a
.byte 0x69,0xac,0x35,0x32,0x4d,0xfa,0xb2,0x72,0x0d,0xde,0x26,0x1c,0x44,0xc0,0x20,0x54,0x73,0xce,0xa2,0x9d,0x9a,0xe2,0x13,0x8f,0xcd,0x5e,0x45,0x2c,0x32,0x2d,0x47,0x1d,0x4b,0x0f,0x78,0xa9,0xa2,0xe3,0xbb,0xcc,0x75,0x6f,0xbe,0xf6,0x76,0xfd,0xa2,0x58,0x44,0x31,0xe4,0xb3,0x9a,0xc4,0x82,0xeb,0x9a,0x73,0x0d,0x21,0x5d,0x0b,0x01,0xf1
.byte 0xfc,0xc7,0x4e,0xfc,0x26,0xb8,0x2d,0x04,0x59,0x1a,0xc4,0x42,0x4a,0x7c,0x67,0xc4,0xe5,0x26,0x81,0x81,0xd6,0x28,0x3b,0x43,0xac,0xbb,0x5f,0x31,0x4d,0x14,0x68,0xb8,0x2c,0x3a,0xb3,0xe4,0x72,0x7d,0x07,0x80,0x22,0x80,0xaf,0x42,0xb4,0x0f,0x2b,0x79,0x7e,0xac,0x16,0xed,0x66,0x93,0x9c,0x90,0xe0,0xc1,0x33,0x51,0xd5,0x4a,0x16,0x4d
.byte 0x5f,0x55,0x7b,0x19,0x21,0x8e,0xe2,0x51,0x3d,0x94,0xf7,0x49,0x65,0x03,0x85,0xed,0x7c,0x3f,0xa9,0x28,0x96,0x20,0x95,0x44,0x62,0x8c,0xc8,0x88,0x59,0x40,0xf2,0x3e,0x05,0xa2,0x4d,0x7e,0xe5,0x9d,0xb8,0x01,0x9f,0x07,0x83,0x93,0x6d,0x0b,0x84,0xeb,0xe1,0x01,0xc0,0xc0,0xd1,0xb4,0x24,0xe4,0x43,0xdb,0x3f,0x2c,0x4b,0xe3,0x61,0x11
.byte 0xb5,0x7a,0x6a,0xf0,0xe7,0xc6,0x96,0x78,0x51,0x4b,0x21,0xec,0xb5,0x20,0xec,0xc4,0x18,0x79,0x84,0x14,0x07,0x33,0x82,0x31,0x9f,0x9e,0xb3,0xe0,0x8f,0x7b,0x84,0x2d,0xef,0xb5,0x73,0x17,0xaa,0x81,0x07,0xd2,0x21,0xd6,0x85,0x7b,0x07,0x61,0x57,0xd3,0x27,0x6c,0x5b,0x8a,0x72,0x65,0xfe,0xbb,0x10,0x1a,0xd9,0xce,0xf0,0xf8,0x70,0x55
.byte 0xe7,0xf5,0xd7,0xf7,0x4c,0xe1,0x5f,0xab,0x58,0xfd,0x8b,0x5f,0xe4,0x84,0x20,0xd9,0x6b,0x35,0x65,0xb2,0x9f,0x38,0xe7,0x6d,0xa5,0x69,0x64,0x64,0x6a,0x6e,0xf9,0x6c,0x42,0x0b,0x1f,0xbd,0xe3,0x0c,0xb4,0x62,0xf6,0x68,0x72,0x4b,0x58,0x24,0xd4,0x9d,0x91,0x66,0x9e,0x73,0x2b,0x69,0xe5,0xee,0xf5,0xb6,0x57,0x4c,0x24,0xef,0xc2,0xe5
.byte 0x33,0xb1,0x96,0xb4,0xf9,0x53,0x25,0xb3,0x1c,0xe8,0x59,0x17,0xe4,0x85,0x24,0xd1,0x9e,0x13,0x35,0x47,0x8e,0x01,0x06,0x42,0x4f,0x8f,0xd0,0x2f,0x0d,0x5a,0x8b,0x96,0xd0,0xbd,0x8e,0x67,0xce,0x47,0x40,0x49,0x17,0x7c,0xe4,0x89,0xca,0x63,0x4e,0xef,0x99,0xf9,0xbc,0x20,0xf1,0xf0,0xca,0xe4,0xe2,0xb1,0x0c,0xfe,0x68,0xc1,0xe8,0xae
.byte 0x27,0x11,0x59,0x1b,0xd4,0x3e,0xb9,0xbe,0x6c,0x25,0x59,0x36,0xc1,0xf6,0x27,0x21,0x47,0x32,0xe8,0x05,0xec,0xc4,0x07,0x22,0xbd,0xcb,0x12,0x72,0x9f,0x1c,0xdd,0xc9,0xbe,0x2f,0xb4,0x84,0x2c,0xf3,0xfb,0x91,0xe4,0xe8,0x5b,0x96,0xe1,0xa1,0x7a,0xa6,0x6d,0xfe,0x94,0xd3,0x2a,0x94,0x86,0x7f,0xfc,0xa2,0x48,0xb3,0xc7,0x60,0xb2,0x97
.byte 0x27,0x4d,0xe3,0xd2,0x2b,0x8e,0x44,0x96,0x57,0x11,0x8a,0x78,0xba,0x12,0x91,0x9d,0x3d,0x1e,0x87,0xcb,0xdc,0x79,0xef,0x9a,0x37,0xd8,0x62,0x52,0xd2,0x0b,0xb7,0x3e,0xf0,0x8c,0xac,0xd1,0xfb,0x9c,0x3a,0x63,0x4b,0x0f,0x92,0xf0,0x1e,0x56,0x33,0xb1,0xfb,0xc3,0x2b,0x51,0xbd,0x30,0x4c,0xc0,0x65,0x21,0xeb,0x98,0x71,0x64,0xa3,0x6b
.byte 0x31,0xe2,0xd9,0x52,0x53,0xc9,0x4c,0xc9,0x93,0x00,0xd0,0x26,0x57,0x3e,0x72,0x4a,0xb2,0x43,0x33,0x9d,0xb6,0xbc,0x68,0x9f,0x28,0xd7,0x00,0x77,0xcc,0x1c,0x0c,0xf1,0x91,0x91,0x77,0x63,0x1e,0xcf,0x8f,0x89,0x89,0xf5,0xe0,0x71,0xa3,0x59,0x49,0x79,0xad,0x7a,0x3d,0x1f,0xcc,0xc0,0x74,0x11,0x56,0x56,0x8d,0x04,0x1c,0xef,0xba,0xec
.byte 0x05,0x85,0x82,0x0c,0x67,0xae,0xa3,0x40,0x4e,0x79,0x65,0xcf,0x72,0xd4,0x79,0xcc,0x96,0x0f,0x89,0xea,0x9a,0xbf,0x52,0x25,0x76,0x08,0x6e,0xdc,0x51,0x92,0xb3,0x6d,0x75,0x01,0x7b,0x13,0xa2,0x62,0xff,0x56,0x1d,0xbb,0xf1,0x8e,0x37,0x35,0x23,0x08,0xb3,0x05,0xd4,0xcc,0x74,0x35,0x63,0xae,0x67,0x51,0x10,0xc2,0xb6,0xf6,0x7f,0xc5
.byte 0x92,0x1a,0x11,0xb0,0x73,0x28,0x08,0xf0,0xee,0x32,0xab,0x3d,0x67,0xd5,0x96,0xc1,0x3a,0x55,0x3a,0x7a,0x59,0xf3,0x42,0x5e,0x8c,0xc6,0x8f,0x17,0xf6,0x30,0xdf,0x8f,0x06,0x6a,0xe3,0x92,0x02,0x20,0x69,0xc3,0x45,0x4b,0x04,0x7c,0x5f,0x5b,0x42,0x30,0x33,0xd5,0x11,0x66,0x57,0x76,0x24,0x7f,0xa7,0xa9,0x79,0x24,0x17,0x84,0x43,0xfd
.byte 0xbc,0x44,0xee,0xfc,0xe9,0xeb,0xeb,0x61,0x6b,0xdc,0x32,0x9b,0x6f,0xf0,0x5b,0x9e,0x00,0x02,0x18,0x9c,0xb8,0xe2,0x2e,0x23,0x6a,0xf8,0x28,0x99,0x6d,0x03,0x87,0x4a,0x71,0xdb,0x00,0x13,0x38,0x86,0x2d,0x77,0xb6,0xd5,0xaf,0xf2,0x62,0x3b,0xe6,0xfc,0x75,0x77,0x39,0xee,0xbc,0x1c,0xc7,0xcd,0x9f,0xbf,0xa1,0xb2,0x86,0x0c,0xcc,0x4d
.byte 0x47,0xbd,0xcd,0x3d,0x65,0xe4,0xd9,0x6e,0x2f,0xeb,0x1b,0x4f,0x49,0x05,0xd9,0x85,0x25,0xa1,0xdd,0xdd,0xc5,0x80,0x91,0x39,0x46,0x47,0x93,0x2a,0x31,0x56,0xe3,0xbf,0x7f,0x71,0x5b,0xc9,0x64,0x25,0x36,0x06,0xc8,0xf9,0xd6,0xad,0x5d,0x6f,0xe3,0x6d,0xbf,0xd5,0x68,0xb6,0x36,0x9a,0xae,0xa4,0x6c,0x65,0xc8,0x10,0xc0,0x04,0x88,0x4a
.byte 0xf1,0x9c,0x45,0x63,0xfb,0xc1,0xc6,0x7f,0x63,0x1d,0xe9,0xe4,0xa9,0x2e,0xd9,0x5b,0xab,0x89,0x31,0x70,0xa7,0xe2,0x08,0x23,0xcf,0x43,0x25,0x28,0x89,0x9b,0xb8,0x2a,0xe8,0xc9,0x02,0x9d,0x2b,0xf0,0x1e,0xe6,0x50,0xf7,0xb6,0x1e,0xe1,0xf1,0x65,0x22,0x86,0xa8,0x91,0xfd,0xc5,0x8b,0x0f,0xa0,0xd5,0x89,0xa4,0x9b,0xd1,0xb0,0x27,0x37
.byte 0x46,0x77,0x00,0x64,0xfd,0x93,0x8c,0x44,0x84,0x3d,0xb3,0xc4,0xd1,0x68,0x2a,0x00,0x2c,0xc2,0x35,0xc7,0x31,0x96,0x73,0xef,0x05,0x8c,0x47,0x94,0x09,0x83,0xbc,0xc0,0x9f,0x5b,0x70,0x1d,0xe0,0xed,0x9d,0x1a,0x07,0xb2,0xa3,0x20,0xfd,0xa1,0x6b,0xa7,0xee,0xb2,0xd3,0x25,0x33,0x63,0x9e,0x12,0xce,0x00,0xb3,0xad,0xb6,0x56,0xc3,0xd4
.byte 0x94,0xe7,0x3d,0x45,0x9d,0xcb,0x76,0x0c,0x74,0xf0,0x26,0x9f,0x56,0x10,0x58,0xf0,0xf7,0x6f,0x09,0xc8,0x9f,0x84,0x69,0x64,0x7b,0xdb,0xd9,0x89,0xe4,0xa3,0x9c,0x3b,0xc7,0x94,0x46,0x41,0x58,0xb0,0xa4,0x44,0xaa,0x27,0x11,0xfc,0x16,0x24,0x57,0x36,0xca,0xf7,0x55,0x76,0x0e,0x9f,0x72,0x37,0x61,0x46,0xe5,0xe5,0x9d,0x83,0xac,0x18
.byte 0xdf,0x81,0xf1,0xa4,0xa3,0x3b,0x92,0x1d,0x33,0x9f,0x25,0xf0,0x6a,0x87,0x15,0x62,0x6d,0x4c,0x72,0x68,0xe0,0x0a,0x74,0x62,0x27,0x00,0xd6,0xee,0xdd,0x16,0xef,0xb4,0x4e,0x3f,0xad,0xe0,0x03,0xed,0x64,0xc4,0xbd,0x66,0x9d,0x3e,0xf4,0xec,0xd6,0x06,0x96,0x5d,0x11,0x0d,0x87,0x5e,0x62,0xba,0xdb,0xff,0x9c,0xb5,0x08,0x84,0xa3,0x54
.byte 0x22,0x60,0x07,0x9e,0x45,0xa4,0x9f,0x8b,0xb3,0x3f,0x50,0x20,0x76,0x21,0x8a,0xc4,0xf1,0xb8,0x5c,0x1d,0xe2,0x88,0x0e,0xf6,0x8c,0x3e,0x75,0x85,0x8f,0xa1,0x71,0x72,0xf2,0x74,0x24,0x69,0x43,0x10,0xef,0x7b,0xb0,0x8d,0x1a,0x1f,0x1a,0x24,0xaa,0xdf,0xaa,0xbe,0x70,0x60,0x34,0xf0,0x91,0x03,0x72,0x20,0x19,0x8d,0xa5,0xaf,0xed,0xa8
.byte 0xd7,0xe4,0x12,0xad,0x09,0x32,0x85,0x63,0x79,0x3a,0xf4,0x72,0xde,0x27,0x76,0xa1,0x8e,0x73,0xc8,0x04,0xf9,0xd0,0x09,0x03,0x44,0xbb,0xb8,0x5a,0x0f,0x36,0x51,0x8f,0x22,0xb4,0xaf,0xb0,0xc9,0xc0,0xcb,0x43,0x78,0xac,0x75,0x4a,0xf4,0x42,0x31,0x7e,0x25,0x92,0x73,0x10,0xfb,0x66,0x94,0xe9,0xd8,0xc6,0xcb,0xd2,0xc2,0xb1,0xa6,0x2c
.byte 0x34,0x86,0xb9,0x9a,0xb1,0xc5,0x86,0x0d,0xb7,0xbd,0xee,0x6b,0x94,0x94,0xc6,0x30,0x62,0xda,0x90,0xc7,0xef,0xbd,0xc7,0x3c,0x99,0x0a,0x0b,0xbf,0x7a,0xfa,0xa7,0xd7,0xca,0x4a,0xe7,0x33,0x6e,0xfa,0x81,0xb1,0xb9,0x3a,0xb9,0x9f,0x20,0x53,0xb7,0x62,0xe6,0x99,0xd7,0x17,0x09,0x64,0xe8,0x81,0xac,0x39,0xde,0x4f,0x03,0x24,0x8e,0x8f
.byte 0x24,0x0f,0x24,0x54,0xe8,0x1e,0xfb,0x31,0x36,0xdc,0x22,0x43,0xba,0x69,0x2c,0xf6,0x98,0xcf,0x1f,0xd4,0x45,0x17,0x92,0x50,0xda,0x85,0x59,0x7b,0x11,0x01,0x32,0x4b,0x73,0xd9,0xc8,0x4c,0x1b,0x22,0x96,0x27,0x4a,0x2f,0x26,0x9d,0xf5,0x8d,0x43,0xb3,0x2f,0x62,0x5a,0x1d,0x19,0x78,0x51,0xcf,0x65,0x09,0x88,0x7a,0x09,0x2b,0x81,0xc2
.byte 0x5b,0x03,0xee,0x13,0x1b,0xb9,0x4f,0x6d,0x6d,0xb6,0x58,0xdf,0x87,0xc3,0x24,0x01,0x48,0x9d,0xe1,0xf0,0x6d,0x04,0x9e,0x88,0xab,0x11,0x4e,0x46,0x32,0xf3,0xfd,0xb3,0x9c,0x01,0x3d,0xd2,0x09,0x35,0x3e,0xf2,0xb0,0x97,0x65,0x47,0x9a,0x14,0x15,0xd0,0x90,0xf2,0x6c,0x66,0xb2,0x66,0xf5,0x97,0xe2,0x69,0x23,0xd8,0xdb,0xbe,0xcd,0x4c
.byte 0x88,0x78,0x1a,0x8f,0x5b,0xb6,0xcd,0xd0,0xd3,0x65,0x03,0x76,0x63,0x59,0xd1,0xdf,0xed,0x55,0x1b,0xae,0xd3,0xf6,0x59,0x41,0xb5,0x2c,0xf6,0x62,0x6c,0x48,0xc1,0x77,0xc8,0x78,0x94,0xd8,0xa7,0xf4,0xa3,0x8c,0x75,0x25,0xe7,0xf3,0xf4,0x5b,0xaf,0x6c,0xf6,0xb0,0x88,0xac,0x30,0x76,0x87,0x71,0x10,0x49,0x70,0x90,0x31,0x28,0x39,0x75
.byte 0x7c,0x43,0x41,0x05,0x3b,0x51,0x35,0x2e,0xe6,0x9c,0xa9,0xcf,0x4a,0xfc,0xa8,0xc7,0xb5,0xd7,0x5a,0xa8,0x4b,0x51,0x75,0xab,0x40,0x19,0xc7,0xa0,0xbc,0x6d,0x3f,0xb0,0x1b,0x2b,0x85,0x51,0x04,0xae,0xb2,0x7a,0xbd,0x3b,0xd2,0x04,0xb5,0x2a,0x69,0xed,0x7d,0x24,0x15,0x76,0xca,0x25,0x15,0xd8,0x69,0x1c,0xd4,0xc3,0x3f,0x14,0x07,0x78
.byte 0x6b,0xf6,0x5a,0x37,0xaf,0x4a,0x73,0x52,0xa2,0xe6,0x82,0xb6,0xc7,0xd2,0x6a,0x20,0x58,0xc4,0x2b,0x9b,0x95,0x81,0x5e,0xdf,0x37,0x9d,0xbc,0x76,0x9b,0xee,0x36,0x82,0x9f,0xe2,0x0a,0x7f,0xb5,0xb1,0xb4,0x2c,0x89,0xc1,0xe4,0x97,0x2d,0x01,0xc3,0x7e,0xe4,0x39,0x07,0xed,0x5a,0xa7,0x06,0x6d,0xce,0xe9,0xa8,0x2f,0x5d,0x16,0x2e,0x1f
.byte 0xfc,0x20,0x34,0x32,0x8b,0xd7,0xd0,0xd1,0xbc,0x3d,0x0a,0xa8,0x1e,0x7c,0xc8,0x68,0x37,0x3a,0xa5,0xcb,0xee,0x56,0xc3,0x9f,0xb1,0xb4,0x92,0x00,0x6a,0xd9,0x9b,0x0c,0x4a,0x6a,0xd0,0xdf,0x7d,0xa4,0x2f,0x96,0x85,0xe8,0x4a,0x2a,0x34,0x77,0xfe,0xc3,0xaa,0x35,0xb0,0xd1,0xf2,0x4d,0xeb,0x1c,0x9f,0x17,0x44,0xca,0x4e,0x53,0x2b,0xc4
.byte 0xe6,0x8e,0x97,0xfb,0x2b,0xb2,0x50,0xba,0x9b,0x79,0x72,0x3a,0x52,0x3f,0x5c,0xf2,0xef,0xee,0xe2,0x13,0xdc,0x2a,0x9b,0x7f,0x48,0xec,0xad,0xf1,0xa2,0xcf,0x38,0x36,0xe6,0x67,0x16,0x2c,0x9d,0x13,0x33,0xc9,0x45,0x10,0x9a,0x70,0x7d,0xf9,0xcb,0x7b,0xe5,0x00,0x20,0xbd,0x7d,0xc0,0x6c,0xde,0xae,0x87,0xb9,0x3a,0x18,0xf5,0x9e,0xd3
.byte 0x65,0x32,0x97,0x50,0x9c,0x47,0xb2,0x3f,0xe3,0xa4,0x76,0xfb,0xc8,0x4d,0x8b,0xf3,0x8c,0x19,0x1e,0x18,0xf1,0x3d,0x52,0x13,0xbf,0xfd,0x25,0x50,0xc5,0x07,0xc7,0x8f,0x9e,0x5e,0xac,0x0a,0xfa,0x35,0xfa,0x3b,0xd4,0x74,0x6d,0x42,0xb1,0x7b,0x98,0x6c,0xe4,0xe5,0x26,0xf3,0xf7,0x08,0x44,0xa8,0x2e,0x7d,0x11,0x05,0x72,0x63,0x39,0x27
.byte 0x4f,0x60,0x2e,0xbf,0x78,0xa9,0x5e,0x41,0x33,0x36,0x01,0x55,0x8b,0xba,0x7f,0x6c,0x53,0x38,0xfe,0x98,0x9e,0x9f,0x0f,0x7f,0x01,0xda,0x62,0xc6,0x5c,0x11,0x3f,0x21,0xfa,0xf6,0x15,0xda,0xb1,0x41,0xe5,0xc8,0x9f,0x77,0xb2,0xa7,0xc5,0x4e,0xfe,0xce,0x40,0xc8,0x76,0xc1,0xa2,0x68,0x93,0x4a,0x81,0xd2,0x92,0xd1,0x21,0x81,0x42,0x9e
.byte 0x44,0x4a,0x45,0xa3,0x9f,0xbf,0xa1,0x8a,0x68,0x27,0xcf,0x27,0x60,0xcb,0x28,0xd0,0x56,0x97,0xd2,0x2b,0xf4,0x3c,0xb9,0x5e,0x9e,0xa8,0xdd,0x35,0xbe,0x0e,0x7f,0xf6,0x37,0x4d,0x8a,0xb5,0xd1,0x31,0xec,0x50,0xfd,0x54,0xc5,0xf8,0xc5,0x83,0xce,0xfb,0x35,0x79,0x37,0x1e,0x8f,0xaf,0x3f,0x7d,0x82,0x2d,0x01,0x8c,0x09,0x27,0xe9,0xcb
.byte 0x6a,0xfd,0x66,0x99,0x22,0x2d,0x8f,0xe2,0xb4,0x28,0x1d,0x17,0x23,0x85,0x2e,0x15,0x20,0x84,0x93,0xcc,0x3c,0x26,0x83,0x9e,0x5a,0x20,0x22,0xf4,0x9a,0x38,0x97,0xaf,0x7d,0xb9,0xb9,0x5e,0x06,0x30,0x67,0xc6,0x3b,0xf8,0x2e,0xe0,0x96,0xdc,0xa4,0x4e,0xb7,0xf5,0xe0,0x93,0xc3,0xcc,0x03,0xcf,0x69,0x18,0x0b,0x69,0x9c,0xb2,0xe2,0x71
.byte 0xb5,0x58,0xde,0xf1,0xa9,0x43,0x30,0x62,0x98,0x75,0x29,0x48,0xca,0x84,0x72,0xdc,0xf8,0xfa,0x10,0x67,0x15,0x08,0xb6,0x5d,0x91,0xd6,0xfb,0xf2,0xe3,0x3c,0x0b,0xe4,0x96,0xe1,0xe8,0xe6,0x26,0x0d,0xc6,0x6a,0x82,0x65,0x66,0xbf,0x77,0xb7,0x3b,0xe3,0xb5,0xdd,0x10,0x6b,0xb4,0xb7,0xcc,0xc2,0x54,0xbd,0xec,0x18,0x19,0xb7,0xe6,0xa8
.byte 0xdb,0xde,0xc7,0x97,0x1f,0xa5,0xee,0xc3,0x06,0x3e,0x45,0x10,0x97,0x0c,0xc4,0xe1,0xe0,0x22,0xbe,0x36,0x86,0x20,0x44,0x29,0x6e,0x75,0xbc,0xaf,0x6d,0xf9,0xb0,0xec,0x16,0x77,0x65,0xb0,0xf1,0xfc,0xa5,0x30,0x04,0x94,0x25,0x6f,0x7c,0x32,0x51,0xed,0x38,0x77,0xd7,0x3f,0x34,0x02,0x04,0x35,0x97,0xa8,0x06,0x0d,0x62,0x53,0x67,0x6e
.byte 0x94,0xe4,0x0e,0x34,0x3e,0x5b,0x16,0x56,0x52,0x70,0xf1,0x49,0x0f,0x75,0x60,0x4f,0xd2,0x32,0xf8,0xd2,0x33,0x08,0xd4,0x44,0xa6,0x7c,0x9b,0xa1,0xca,0x3f,0x6c,0x6f,0x53,0xdc,0xd1,0x46,0xa4,0x37,0x38,0xf6,0xd7,0x08,0xcb,0x08,0xa6,0xe5,0xa6,0xe9,0x3c,0xb1,0x98,0x7e,0x44,0x9e,0x8e,0x4e,0xca,0xa5,0xc5,0x24,0xb7,0xe3,0x05,0xf1
.byte 0xc0,0x91,0x3b,0x97,0x6d,0x76,0x56,0x65,0x5f,0x1b,0x92,0x92,0x49,0x1e,0x3b,0xb2,0x86,0x23,0x67,0xfd,0x37,0x74,0x71,0x0a,0x16,0x19,0x7e,0x54,0x0b,0xa4,0x4d,0xc0,0x1d,0xb1,0x3f,0xe2,0x2f,0x98,0x85,0x97,0xad,0x10,0x76,0xf2,0x7e,0x42,0x78,0x81,0x98,0xab,0xd5,0xc9,0x3a,0x5b,0x69,0xc1,0xce,0x10,0xa4,0x9e,0x1c,0xd4,0xa9,0xc3
.byte 0x68,0x5b,0x82,0x3b,0x90,0x65,0x80,0x6d,0x96,0xbb,0x03,0x33,0xbf,0xb9,0xd2,0x5e,0x42,0xc9,0x7b,0x4e,0x27,0x42,0xe4,0x20,0x9f,0xc4,0x69,0x16,0x23,0xa1,0x98,0x28,0x38,0xfe,0xdf,0x19,0x7c,0xf5,0xbf,0xa3,0x8e,0xe0,0x06,0xb2,0xa4,0x63,0x06,0x03,0x45,0x26,0x51,0xe9,0xcf,0x0c,0xe1,0x2f,0x67,0xb9,0x83,0xe9,0x5b,0xf1,0x7e,0x5a
.byte 0xea,0xa5,0x31,0xec,0x7d,0x2c,0x8a,0x6e,0xc0,0xb9,0x98,0x60,0xc2,0x71,0xbf,0x0f,0x1d,0xfd,0xb5,0x41,0xd6,0x6f,0xae,0xcd,0x04,0x29,0xcf,0xd9,0xf6,0x71,0xdd,0xab,0x52,0x9e,0x14,0x81,0x0d,0xb4,0x27,0xcc,0x68,0x65,0xc8,0x65,0x1f,0xfc,0xb7,0x44,0x31,0xaf,0x03,0xfe,0x9c,0xf4,0xf8,0x80,0x91,0x90,0xc5,0x0e,0xe0,0xe3,0x4f,0x46
.byte 0x33,0x84,0x51,0xea,0x2a,0x50,0xb8,0x09,0x6e,0x0f,0x6b,0xd8,0x86,0x0a,0xf5,0xfc,0xda,0xc7,0x8c,0x8f,0xec,0x15,0x61,0x57,0x30,0xdd,0xda,0x40,0xb5,0x99,0xd6,0x0d,0x34,0xb0,0x55,0xab,0x90,0xc3,0x1e,0x7e,0xac,0x90,0x75,0x49,0x54,0xc4,0xa3,0x2e,0x9d,0xd0,0xac,0xcd,0x01,0x03,0x1d,0x3f,0xf4,0xf0,0xcb,0x36,0xc2,0xe4,0xb1,0x1a
.byte 0x62,0x91,0x08,0x4f,0xd2,0x91,0x22,0xf5,0x0e,0x37,0x18,0xcc,0xde,0xf4,0xbc,0x58,0x6a,0x52,0x91,0x1b,0x6a,0x22,0x5e,0xe8,0xd7,0xb4,0x87,0xfd,0xbe,0x9c,0xff,0x1a,0xb9,0x9c,0xba,0x20,0x75,0xcc,0xc7,0x3c,0x6a,0xd4,0x9a,0xfa,0xfe,0xb8,0xdc,0x7f,0x85,0x79,0x20,0x72,0x31,0x53,0xb1,0xb9,0x83,0xd9,0x2c,0x61,0x56,0x0c,0x97,0x7a
.byte 0x10,0x88,0xdf,0x2d,0xa3,0xdd,0x83,0x7e,0xd9,0x63,0xf3,0xd7,0x18,0x69,0x49,0x4c,0xd5,0x6b,0x26,0xee,0xf6,0xcb,0x1d,0x44,0x0d,0xeb,0xe3,0x9b,0xfd,0xa9,0x7c,0x9d,0x69,0x82,0x11,0x17,0x32,0x0f,0x17,0xb0,0x8a,0x96,0xd9,0x78,0x0c,0x90,0x43,0x0a,0x8b,0x64,0xa4,0x61,0xdc,0xe8,0xc8,0x3c,0xa0,0xda,0x97,0x66,0x7e,0xa0,0xb7,0x1c
.byte 0xd4,0xa2,0x05,0xbc,0xb8,0x60,0x10,0x5d,0xb8,0x83,0x4d,0x02,0xce,0xc4,0x30,0xf2,0x9f,0xfb,0xa7,0x15,0xed,0x2b,0x4a,0xb0,0x0e,0x6f,0x96,0xfb,0x06,0x58,0x8d,0xb4,0xde,0x96,0x88,0xfd,0xa2,0xf0,0xff,0xa4,0x4e,0xc5,0x92,0x60,0x81,0x52,0x19,0xdf,0xbc,0xd5,0x4d,0x74,0x54,0x04,0x05,0x33,0x39,0x64,0xfe,0x44,0x7e,0xb0,0x5c,0xd1
.byte 0x68,0xde,0xdf,0x3e,0x05,0xea,0xab,0x45,0xf7,0x33,0x95,0xd4,0xa1,0xc6,0x1d,0x73,0x8a,0x19,0xff,0x20,0xd8,0x48,0x08,0xc6,0x1b,0x07,0x6d,0x78,0xe7,0xe3,0x2e,0xe7,0xcd,0xc9,0x1f,0x49,0x99,0x9c,0xab,0xa3,0x4a,0x77,0x48,0x91,0xea,0xe3,0xdb,0xf6,0x7a,0x91,0x3a,0xda,0x79,0xee,0x90,0x41,0x79,0x68,0xac,0xb9,0x56,0x46,0xae,0xf1
.byte 0xd9,0xdf,0x58,0x09,0xfe,0x42,0xe7,0xe2,0x44,0xd4,0x63,0xf4,0x67,0x5d,0xeb,0x6b,0x0e,0xe4,0x56,0xfa,0x01,0xc8,0xc5,0x58,0xfa,0xb7,0xe8,0x3a,0xb1,0xa1,0xde,0x94,0x88,0x21,0x06,0xd3,0x5c,0xa7,0x89,0x68,0x7b,0x8e,0xb2,0x86,0xe3,0x9a,0x9e,0xca,0x63,0x78,0xcb,0xb6,0x1a,0x35,0x16,0x43,0x4b,0x09,0xd1,0xb4,0x71,0xef,0xb6,0xb2
.byte 0x2e,0xa5,0x2b,0x4e,0x18,0xac,0x8f,0xc0,0xfe,0x86,0xcc,0x63,0xc6,0x0c,0x3c,0xee,0x22,0x92,0x7c,0xca,0xab,0x1a,0xbf,0x21,0x20,0xf2,0xd6,0xba,0x99,0x17,0xca,0x1e,0x00,0x39,0xa9,0xe4,0x65,0xa8,0xdd,0xae,0x2a,0x29,0xb1,0xa6,0xaf,0x22,0x2a,0x94,0x6c,0x68,0x66,0xb4,0x11,0x92,0x03,0x7c,0xf6,0x49,0x88,0xac,0x91,0x14,0xb7,0x1d
.byte 0x06,0x8c,0x82,0xf9,0x56,0x3c,0x54,0xa3,0x31,0xb1,0x56,0x69,0x09,0x7b,0xf1,0x9d,0x01,0x10,0x1a,0xaa,0x82,0x52,0x36,0x7d,0x28,0x6d,0xc1,0x18,0xdd,0xdb,0xc5,0x99,0x1c,0x69,0xd6,0x81,0xb8,0x1b,0x63,0x44,0xe9,0x5d,0xac,0x0e,0xd2,0xa4,0x4a,0x38,0x17,0xb5,0x41,0xca,0x81,0x96,0xe2,0x5b,0x2c,0xd2,0xd1,0xdc,0xbf,0x8a,0x57,0x46
.byte 0x7d,0x48,0x1b,0xc0,0x11,0xce,0x09,0x23,0x06,0x73,0xd0,0x2f,0x8f,0x7f,0x4e,0xaf,0x92,0xff,0x5d,0x52,0x20,0xfc,0x12,0x7d,0x7f,0x6a,0xd0,0xf3,0x20,0xc2,0xf9,0x05,0x20,0x56,0x9f,0x97,0xa3,0x64,0x5c,0x4c,0x8d,0xab,0x76,0x84,0x2b,0x6b,0xea,0x3c,0x4f,0x2a,0x2c,0x0b,0x45,0x7c,0x7b,0x73,0x6d,0x91,0x7e,0x7c,0xc0,0x2d,0x32,0x5a
.byte 0xb7,0xa7,0x1e,0x15,0x17,0x18,0xfb,0xbc,0x64,0x67,0xd3,0x0c,0x28,0xc5,0xaf,0x9e,0xe5,0x89,0x36,0xdd,0x16,0xef,0x21,0x70,0xe9,0x26,0x95,0xab,0xdd,0x5b,0xce,0xd4,0x57,0xe9,0x49,0xb3,0x08,0x9b,0x19,0x74,0x70,0x3b,0x8f,0xf6,0x95,0x38,0x92,0x24,0xb1,0xf8,0x27,0xc1,0xa3,0xa3,0x87,0x71,0x42,0xca,0x95,0x05,0x0e,0x06,0x51,0x11
.byte 0x2d,0x43,0x83,0x83,0x01,0xb3,0xcd,0xf9,0xb9,0xff,0xf6,0x5c,0x8d,0xc1,0xc9,0x05,0x49,0x77,0x93,0xff,0x66,0x79,0xf6,0x7c,0xea,0x11,0x5c,0x5e,0xd4,0x82,0x36,0x28,0xc7,0xbb,0x00,0x00,0xc3,0x90,0xda,0xa2,0xef,0x95,0x45,0x6c,0x74,0xbc,0xd8,0x11,0xe6,0x73,0x1f,0xb9,0xa7,0x2b,0x79,0x62,0xbf,0xc1,0xa2,0x5c,0x10,0xfd,0x3d,0x72
.byte 0x00,0xc9,0xb6,0x05,0x9c,0xec,0x70,0x30,0x68,0x7b,0x46,0x86,0x47,0x19,0x95,0x07,0x1b,0x49,0xde,0x25,0x6b,0x34,0xea,0x75,0x28,0xdf,0xa7,0xf9,0x59,0xbc,0x79,0xab,0xaf,0x67,0x9f,0xa1,0xe0,0x39,0xe3,0xd8,0x6e,0xbd,0xfe,0x1d,0xd3,0xec,0x2d,0x3b,0x7b,0x21,0xde,0x06,0x72,0x63,0x61,0xf3,0xd0,0xdb,0xae,0x32,0xc9,0x73,0x90,0xa1
.byte 0xb3,0xdc,0xc3,0xaf,0x2b,0x43,0x12,0x72,0x5a,0xef,0x5a,0x6a,0x44,0xbc,0x38,0x65,0x8c,0x25,0x32,0x96,0xe8,0x17,0xd3,0x96,0x4c,0xf2,0x95,0x29,0x90,0xd9,0x1c,0x6d,0x86,0x60,0xef,0x1a,0x25,0xdf,0x71,0xa1,0x8a,0x3d,0x08,0x08,0x01,0x01,0x6e,0x07,0xff,0x23,0x71,0x98,0x49,0xd6,0x3c,0xd4,0x3f,0x67,0xf1,0xe5,0xc4,0x4b,0x10,0x68
.byte 0x58,0xa8,0xa5,0x33,0xbb,0x6e,0x51,0x80,0xa3,0xec,0x17,0xdf,0x18,0x6f,0xe1,0x33,0x70,0x25,0x65,0xbd,0x19,0x12,0x4f,0xf5,0x30,0x4b,0x2d,0x30,0xac,0xa8,0x64,0x70,0x9a,0x6c,0xbf,0xb3,0xdb,0xdf,0x1b,0xb3,0x75,0x19,0x1f,0x70,0x8d,0xd2,0xdb,0x1c,0xca,0x72,0xca,0xb5,0xe3,0x34,0x4f,0x16,0x72,0x3f,0x12,0x2f,0x61,0x57,0x9f,0x6c
.byte 0xbc,0x2e,0x2f,0x27,0x26,0xac,0x0d,0x54,0xfc,0x78,0x58,0xdf,0x86,0x9c,0xfc,0x8b,0xaf,0x99,0x04,0x17,0x19,0xbf,0x9a,0xf9,0x03,0xea,0x3c,0xd8,0x9d,0x2e,0xd7,0xd2,0x51,0x01,0xe0,0x1e,0xbf,0x3d,0x85,0xa0,0x73,0xa6,0xcc,0x20,0x56,0x42,0x16,0xb1,0x9d,0xa9,0x1a,0xfc,0x0d,0x20,0x8c,0x04,0x55,0xbe,0x33,0xd1,0x86,0xab,0x3c,0x95
.byte 0x9b,0x86,0x84,0xf2,0x99,0xe6,0xab,0xee,0x34,0xd3,0xfd,0xf7,0xb8,0xe7,0x44,0x58,0x36,0xdb,0xc5,0xb5,0x81,0x31,0xbc,0x21,0xe0,0xd0,0x6e,0x2e,0xff,0x86,0xf5,0xb6,0x22,0x69,0x1f,0x23,0xb6,0x24,0x52,0x13,0xdd,0xc3,0xb9,0x76,0xef,0xda,0x22,0x5b,0xfb,0x68,0xfe,0xd2,0xc8,0xcc,0x9e,0x51,0xe3,0x93,0xd8,0x7c,0x6f,0xd5,0x4a,0xdd
.byte 0x71,0x23,0x14,0xf5,0x0c,0xce,0xd6,0x7a,0xfd,0xda,0x03,0x36,0x4b,0xa0,0x3f,0x0d,0xc9,0xd6,0x35,0x31,0x3a,0x68,0x15,0x85,0x31,0x12,0x72,0x15,0xb3,0xb4,0xbb,0x42,0xe9,0x54,0xcd,0x93,0x78,0x28,0x31,0xcd,0xb6,0x36,0xe7,0xac,0x1f,0x5d,0x64,0x60,0x93,0x67,0x82,0x02,0xda,0x46,0x74,0xa2,0x55,0x6a,0xae,0x66,0x07,0x08,0x45,0x67
.byte 0x3e,0xa7,0x5c,0x6a,0x2a,0xe5,0x8a,0x3a,0x92,0x18,0x2f,0x63,0x36,0x49,0x37,0xa9,0x02,0x3c,0x24,0x3e,0x83,0x5c,0x7e,0xae,0x41,0x95,0x65,0x50,0x90,0x45,0xa1,0xc5,0xdd,0x8c,0x72,0xd2,0x24,0x74,0xfd,0x69,0x75,0x76,0x7a,0xd7,0x79,0xfb,0x02,0x7c,0x27,0x2b,0xdb,0x3b,0xa9,0x5f,0x32,0x03,0x25,0x8e,0x8b,0xe7,0xe7,0x64,0x85,0x47
.byte 0x58,0xfc,0xce,0x40,0xa2,0xeb,0xab,0xfd,0x4e,0xda,0x58,0x87,0x40,0xb8,0x22,0x29,0xff,0xa7,0x02,0x8c,0xdb,0x90,0xf5,0x14,0x62,0xec,0x21,0xfa,0x4e,0x52,0x2e,0xfb,0xa8,0x56,0x8a,0x68,0xdf,0xb1,0xa0,0x78,0x43,0x99,0xd8,0x45,0x6e,0xd6,0x94,0x62,0x5a,0x19,0x0f,0x47,0xdd,0x5b,0x05,0x8e,0xe2,0x4c,0x2d,0x3b,0xd9,0xfd,0x24,0x98
.byte 0x9d,0xc0,0x34,0x33,0x76,0xae,0xd9,0x82,0xcf,0x77,0x85,0x2a,0xb0,0xbd,0x98,0xc7,0xfa,0x2c,0xcd,0x91,0xb5,0x94,0x2b,0xb7,0xac,0xc9,0x7f,0xd7,0xcc,0xe0,0x77,0x18,0xce,0x44,0x7e,0x21,0x2e,0x86,0x0f,0xb5,0x3c,0xe4,0x07,0x86,0x33,0x8f,0x78,0x4a,0x6a,0x66,0x4b,0x6f,0xb8,0x54,0xfc,0x3c,0x44,0x76,0x36,0x4e,0x04,0x3f,0x37,0x46
.byte 0xc4,0x9d,0xba,0x1f,0x7e,0xf2,0x24,0xae,0x40,0x56,0x55,0xc0,0xed,0x8e,0xbc,0x2e,0x4b,0xf1,0x74,0xb5,0x99,0x73,0x62,0xb2,0x6b,0x0c,0xd2,0x8a,0xcc,0x01,0x8f,0x16,0x35,0xc2,0xad,0x03,0xdb,0x07,0x68,0x56,0x5b,0x46,0x49,0x32,0x11,0xe3,0xd5,0x6a,0xa6,0x1f,0xf5,0xde,0xf6,0xac,0x53,0x43,0xf1,0xf4,0x25,0x97,0xbc,0x27,0xbc,0x3a
.byte 0x3d,0x84,0x3e,0xc6,0xe0,0x68,0x69,0x22,0x4d,0x99,0x11,0xb5,0xce,0xa4,0x0c,0xaf,0x2b,0x1c,0x26,0x8d,0xd2,0xc4,0xab,0x67,0x52,0x6b,0xac,0xc5,0x7c,0x22,0xee,0xa9,0xbd,0x61,0x79,0xbb,0x71,0x02,0xfa,0x52,0x72,0xb2,0x6a,0xb5,0x0f,0xa0,0x9f,0xba,0x35,0x8c,0xd8,0xa1,0x74,0x96,0x78,0xbf,0xc4,0xf5,0x83,0x21,0xba,0xd3,0x69,0xd1
.byte 0x3d,0xb2,0x7e,0x06,0xc6,0x10,0x7a,0xa6,0x66,0xed,0xbe,0x3c,0x42,0x89,0x2f,0xc5,0xee,0x61,0x10,0x2d,0x51,0x8f,0x34,0x03,0x32,0x4f,0x01,0x77,0x02,0xfb,0x30,0xa3,0x95,0x74,0xb9,0x97,0xc2,0xc4,0xa7,0x1e,0x52,0x94,0x29,0x31,0x21,0x8b,0xb4,0x41,0x5f,0xb0,0xf2,0x89,0x54,0xb2,0x0a,0x9b,0x06,0xba,0xb4,0xb5,0x5b,0xc9,0xad,0xeb
.byte 0xdd,0x62,0x97,0xf2,0xfc,0xe9,0xc5,0xcf,0x4b,0x87,0x4e,0x46,0xfa,0x58,0x38,0x62,0x0f,0xa1,0x5e,0x32,0xa2,0x52,0x2c,0x8f,0xb7,0xc2,0x90,0xdd,0x29,0xfb,0xb2,0x8d,0x38,0x85,0x4b,0x9c,0xc2,0x94,0xfd,0x0a,0xf3,0xd2,0x73,0xda,0xc6,0xdc,0xd0,0xa5,0xa5,0x3b,0x79,0x5e,0xd0,0x72,0x9d,0x06,0x6d,0x6f,0x6c,0x97,0x08,0xd1,0xc9,0xf2
.byte 0xe7,0xd7,0xfe,0x2a,0x39,0xe4,0xf6,0xa1,0x5a,0xc7,0xe3,0x2a,0x40,0x0f,0x9b,0x5b,0xf3,0x85,0xfc,0xc9,0x23,0xa2,0xdf,0x44,0x0a,0x20,0x3c,0xc1,0x7b,0xeb,0x95,0x22,0x04,0x37,0x0a,0x77,0x2c,0xa5,0xbd,0xad,0x4b,0xf5,0xef,0x00,0xa1,0x53,0x45,0x06,0xe5,0xbb,0x6e,0x18,0x43,0xef,0xbc,0x4d,0x6e,0xae,0x2a,0xa2,0x7b,0x41,0xd2,0x92
.byte 0x68,0x92,0x98,0x0c,0xc7,0x63,0x61,0x9b,0x9c,0xaa,0x63,0x0a,0x78,0x6b,0xf2,0xde,0x60,0x2e,0xc0,0x5e,0x60,0xca,0x68,0x87,0x82,0x13,0x2c,0x9f,0x2d,0x70,0x1b,0xcb,0xe3,0xfd,0x12,0x4b,0x48,0x83,0x9c,0x7c,0xea,0xde,0x19,0xe6,0xa3,0x23,0x9b,0xcd,0xeb,0xef,0x74,0x85,0xb0,0x55,0x2d,0x3f,0xa9,0xac,0xef,0x1f,0xd6,0xbc,0xd8,0x33
.byte 0x58,0xa9,0x73,0x7c,0x9a,0xee,0x08,0x06,0x3d,0x4b,0xa5,0xee,0x37,0x9f,0xf6,0x6e,0x61,0xc9,0x42,0x94,0x89,0x4d,0x36,0x8d,0x23,0x96,0x57,0x17,0x0f,0x91,0xb1,0xea,0x0d,0x33,0xc5,0x00,0xb8,0x02,0xab,0x9e,0x68,0x75,0xf0,0x80,0x79,0x78,0xae,0xe5,0x59,0x58,0x9b,0xd4,0x1a,0x62,0x37,0x7c,0x61,0xa0,0x43,0x76,0x6a,0x00,0x44,0xc7
.byte 0x5e,0xf4,0x88,0x39,0x43,0x32,0xcb,0xd7,0x78,0x16,0xcf,0x12,0x1b,0x4e,0xae,0xb3,0x6a,0x0b,0xb1,0x52,0x4b,0x3c,0x4f,0xd5,0x44,0x95,0x3f,0x5c,0x84,0x15,0x25,0x1c,0x97,0x6b,0x5a,0x05,0x1b,0x45,0x7e,0x1d,0x28,0x24,0x8b,0x8a,0x6d,0xe9,0x11,0xe2,0xdc,0x83,0x3e,0xc4,0x7b,0xb0,0xd9,0x5a,0x0e,0x11,0x5c,0x3d,0xa9,0x78,0xcb,0xcd
.byte 0x3a,0x1f,0x5e,0x57,0x5e,0x59,0xae,0xc5,0xb6,0x37,0x80,0x2f,0x63,0x7c,0xef,0xc2,0x8e,0x81,0xbb,0x6f,0xf0,0x1b,0xbf,0xbc,0x71,0xa5,0x97,0x59,0x98,0x87,0xac,0x7d,0x55,0x79,0x4a,0x47,0x32,0x6c,0x9d,0x79,0x91,0x6b,0x22,0x9b,0xec,0xf7,0x9d,0xd4,0x87,0xd1,0x57,0xb6,0x13,0x91,0x54,0x8f,0x88,0x14,0x19,0x08,0x93,0xe7,0x29,0x26
.byte 0x01,0x09,0x0d,0x44,0x16,0xc8,0x90,0x99,0x80,0x04,0x5b,0xbf,0x5a,0xa0,0x73,0xd3,0x85,0xdc,0x9c,0xa9,0xbb,0x8f,0x59,0x5e,0x28,0x01,0x6c,0x13,0xce,0x92,0xe8,0x10,0x85,0x81,0x5f,0xc8,0x5f,0x52,0x84,0x33,0x87,0x28,0x5f,0x52,0xc7,0x68,0xc6,0x49,0x9f,0xa6,0x4b,0x0e,0x11,0x7b,0x94,0xf7,0x87,0xd2,0x8e,0xdb,0x5e,0x6b,0x6b,0xe5
.byte 0x40,0x12,0xc2,0xf1,0x57,0xa3,0x72,0x7a,0xbf,0x8b,0xee,0xe7,0xd2,0x84,0x53,0xae,0x06,0x7c,0xf8,0x85,0x3a,0x2a,0x0f,0x45,0xf9,0xe1,0x61,0x15,0x59,0xc7,0x2e,0x64,0xe1,0xbe,0x95,0xe1,0x64,0x1a,0xca,0xcd,0x2c,0xb9,0x71,0x63,0xa9,0xea,0xdb,0x49,0xcd,0xdb,0x36,0x1f,0x9e,0x1f,0x93,0x01,0xdd,0xe0,0x42,0xe7,0x59,0xe7,0x24,0xcd
.byte 0x57,0x4a,0x16,0xbd,0x91,0x4f,0xbf,0x05,0x54,0xea,0xed,0x9b,0xfd,0xd0,0xb8,0xcf,0xad,0x54,0xfc,0xac,0x0c,0x10,0x4f,0xbc,0x9e,0xe0,0xb5,0x79,0x0a,0x64,0xa9,0x41,0xc1,0x6c,0xd0,0x19,0x7e,0x45,0x76,0x3f,0x1f,0x58,0xab,0x6f,0xd5,0x85,0x70,0x89,0x1d,0x11,0xc7,0x93,0x31,0x5c,0x4f,0xae,0xa8,0xc6,0xde,0x81,0x04,0xe1,0x93,0x9c
.byte 0x82,0x44,0x23,0x5d,0x0e,0x23,0xf7,0x3a,0x94,0x01,0x3f,0xe2,0x69,0x3f,0xfc,0x72,0x37,0xd2,0x51,0x73,0xbb,0xd2,0x67,0xa9,0xac,0xb1,0xea,0xa5,0x09,0xdf,0x65,0x4e,0x08,0x6a,0xff,0x3f,0xdf,0x12,0xb8,0x65,0x04,0x2c,0xb4,0x91,0xd0,0x0b,0x4e,0x16,0xec,0x9c,0x7f,0xe6,0x1c,0xec,0x7d,0x83,0x68,0x63,0x0d,0x40,0xb9,0x38,0xda,0xa9
.byte 0x8d,0x3c,0xfd,0xd2,0x54,0x26,0xa0,0x83,0x94,0x48,0xe1,0xb0,0x12,0x5d,0x1b,0x5c,0x66,0xad,0x6e,0xbc,0xf5,0x84,0x9e,0x13,0xb2,0x6b,0x1d,0x5f,0x8a,0xaf,0xf7,0x22,0x76,0x2b,0xf2,0x4b,0x37,0xb7,0x9d,0xea,0x10,0xb2,0x2d,0x01,0x5a,0x9a,0x11,0x29,0x7c,0xb2,0x6e,0x39,0x02,0xab,0x18,0x0d,0x47,0x15,0x13,0xfa,0x9f,0x35,0x38,0xc7
.byte 0x1b,0x74,0x7d,0xe0,0xd8,0x4d,0xa4,0xc9,0x10,0x5e,0xd1,0x88,0x7d,0x14,0x40,0xda,0xd0,0x22,0x92,0x6a,0x44,0x0d,0x73,0xc1,0xb2,0xac,0x43,0xa9,0x0a,0x19,0xc6,0xf1,0x5e,0x8b,0xf0,0x9d,0xb4,0x93,0x71,0x5f,0x7a,0x2b,0xd7,0x3e,0x42,0x1f,0x5f,0x80,0x60,0x3a,0x40,0x04,0x3f,0x21,0x1b,0x07,0xd5,0xd8,0xc6,0x15,0x9a,0x31,0xac,0x81
.byte 0x3c,0xa2,0x42,0xba,0x63,0xc4,0x84,0x15,0x0a,0x79,0xdb,0xd9,0x8b,0xde,0x6f,0x35,0x74,0x7c,0x06,0x66,0x9a,0xec,0x4d,0xd3,0x0c,0xaa,0x16,0xb3,0x68,0x02,0xb7,0xd8,0x93,0x7f,0xa2,0x86,0x05,0x3f,0x32,0xe0,0x29,0x86,0x32,0x6f,0xc3,0xd1,0x59,0x68,0xf5,0x6d,0x50,0x5b,0xc0,0xe8,0x0e,0xed,0xe4,0x4a,0x50,0xbd,0x24,0x50,0xcb,0x2b
.byte 0x9e,0xad,0x0d,0xbc,0x90,0x90,0xf7,0x23,0x32,0xfe,0x01,0xba,0x7c,0x27,0xc9,0x44,0xd3,0x25,0xc5,0xa0,0x74,0x9b,0xf3,0x22,0xb1,0xf9,0x22,0x62,0x10,0x2d,0x18,0xf5,0x35,0xe8,0xa7,0x4c,0x80,0xdb,0x27,0xb2,0x09,0x80,0x70,0x7d,0x25,0xd6,0x57,0xf6,0xdb,0x91,0x4b,0xfa,0x5c,0x33,0x80,0x4e,0x08,0x0a,0x60,0x06,0xdc,0x65,0xc8,0x29
.byte 0x3c,0x0c,0xbd,0xca,0x6a,0x4c,0x0d,0x84,0x3a,0x73,0xd4,0x66,0xa4,0xab,0xa8,0x03,0x3f,0x9d,0xaf,0x61,0xae,0x2d,0xd7,0x91,0xad,0xef,0xa5,0x8f,0x84,0xb4,0x3a,0xd0,0x25,0x58,0x95,0x0c,0x9a,0x6a,0x3c,0x74,0xef,0xcd,0x81,0x2d,0x32,0x2a,0x4c,0x4a,0xfb,0xb0,0xfd,0xd4,0xed,0xbb,0xb4,0x7c,0xe5,0xda,0x0e,0xf2,0xfb,0xc5,0x77,0x22
.byte 0x47,0xfa,0x9a,0x17,0x62,0x8b,0xc9,0x4b,0xfe,0x20,0x20,0x02,0x1e,0x11,0x9c,0xd5,0x67,0x8f,0x5a,0xf3,0x69,0xc1,0x9b,0xd9,0xfa,0xbb,0x2c,0x68,0xe0,0xe6,0xfc,0xb3,0xa9,0xf6,0xf1,0xe9,0x1b,0x8e,0x4b,0x5d,0x95,0x39,0x39,0x58,0xaf,0x82,0x19,0x07,0xd3,0x97,0x46,0xbd,0xce,0xc7,0x9d,0xbe,0x15,0x7f,0x5a,0xe6,0xea,0x37,0x1d,0xdc
.byte 0x17,0x13,0x83,0xd0,0x3a,0x3e,0x87,0x5f,0x01,0xad,0xa1,0x20,0x1f,0x01,0xac,0x19,0x77,0x45,0x6e,0x5b,0xeb,0xdf,0x66,0xce,0xff,0xc5,0x7e,0x46,0x47,0xca,0x4c,0xda,0xdf,0x50,0x74,0xef,0x82,0x43,0x76,0xa0,0xbe,0x39,0xea,0x48,0x38,0x56,0xdd,0x9d,0x5c,0x27,0x3f,0x40,0x54,0xe1,0xce,0xff,0x38,0x78,0x02,0x3b,0xc1,0x8b,0xa2,0x7f
.byte 0x31,0x11,0x8d,0x8e,0x35,0x88,0x9f,0xe8,0xe7,0x30,0x72,0xa2,0x76,0x83,0x56,0x8c,0x4c,0x3f,0x43,0xaa,0x35,0x64,0x83,0xbc,0xec,0x17,0x8b,0x50,0xd9,0x5b,0xb0,0x9f,0x67,0xd5,0xd1,0xb7,0x93,0x39,0xe2,0xc2,0xb1,0xb9,0xcd,0x0e,0x70,0xec,0x77,0x64,0x59,0x9e,0xd0,0x44,0xa7,0x79,0x82,0xa8,0x54,0xfa,0x42,0x99,0x26,0xfe,0x40,0x53
.byte 0x21,0x58,0xe4,0x2e,0x06,0x96,0x84,0x8b,0x80,0xf4,0xe8,0xf0,0x94,0xc3,0xcf,0x86,0xce,0xea,0x1d,0x82,0x67,0xcf,0xf8,0x79,0x54,0x83,0x10,0xb9,0xa5,0xea,0xce,0xeb,0x82,0x62,0xcf,0x45,0x8a,0x9d,0xeb,0x9c,0xb1,0xa0,0xf3,0xe8,0xff,0x96,0x14,0x33,0x7c,0x51,0x75,0x4d,0x00,0x0a,0xe6,0x50,0x15,0x28,0xc8,0x31,0x75,0x71,0xb5,0x8e
.byte 0xab,0xe2,0x61,0x06,0xa3,0xf6,0x03,0x12,0xb2,0x73,0x67,0xd7,0x66,0xcc,0x24,0x45,0xfb,0x9b,0x22,0x42,0x3b,0xef,0x1d,0x42,0xcc,0xc9,0xd4,0xb0,0xa5,0x3c,0x66,0xcd,0x8b,0xb4,0xf1,0xcc,0x58,0xcd,0xea,0xa2,0x0a,0x88,0xc0,0x7c,0x1b,0x6d,0x72,0x35,0x57,0x90,0x7b,0xb8,0xd4,0x17,0xe8,0x83,0x15,0x30,0x5d,0x8c,0xb7,0x1a,0x42,0x98
.byte 0xb6,0xea,0xc9,0x53,0x27,0x50,0x1d,0x2f,0x39,0xeb,0xd6,0xc1,0x62,0x8d,0x1e,0xe1,0xde,0xb1,0xae,0xac,0xde,0x46,0x7b,0x66,0xa4,0xa6,0x79,0x55,0x79,0xf0,0x89,0x41,0xa3,0x01,0xba,0xbb,0x19,0x0c,0xdc,0xff,0x86,0x23,0xe3,0xca,0x60,0x88,0xc2,0x50,0x32,0xe2,0xd8,0x7e,0x5a,0x41,0x68,0x0f,0x5e,0x80,0x6a,0x9f,0x0b,0x33,0x8e,0x91
.byte 0x99,0xd8,0x3f,0x81,0xe9,0x8a,0xaf,0xa7,0x0a,0xe5,0xa9,0x23,0x1c,0xe0,0x19,0x7e,0x88,0xd6,0xbc,0x08,0x13,0xa5,0x49,0x07,0x86,0x5a,0xef,0x30,0x33,0xd8,0xcc,0x6e,0x2e,0x1b,0x17,0xa6,0x8c,0xff,0x08,0x7a,0xf3,0x99,0xab,0x64,0x69,0xf6,0x77,0xa8,0xeb,0x88,0x98,0xbe,0xea,0x9f,0x5e,0xe1,0xb6,0x8c,0x68,0xc1,0xdd,0x9b,0x91,0xd3
.byte 0x7c,0x30,0x62,0xc2,0x61,0xa1,0xcf,0x66,0x1a,0x8e,0xe8,0x91,0x48,0x33,0x7a,0xe1,0x71,0x27,0x3f,0xbf,0x47,0x78,0x31,0x9e,0xf8,0x38,0xc4,0xff,0x92,0x2a,0x0a,0x0d,0x32,0x7f,0x9d,0xa1,0xcc,0xe9,0xf2,0xfd,0xa9,0xf0,0xdc,0xd6,0xbc,0xe5,0xec,0xe9,0x26,0x91,0x0b,0x34,0xcb,0x3a,0x16,0x76,0xb1,0x90,0x08,0x14,0xec,0x6b,0x01,0xa6
.byte 0xa7,0x45,0x18,0x38,0x94,0x38,0x15,0x9a,0x4a,0x4d,0x16,0x03,0x17,0xfe,0x09,0x93,0x2d,0xbe,0xff,0x10,0xc5,0xad,0xb8,0x47,0x6e,0x5e,0x59,0x24,0x6a,0x55,0xef,0x86,0x57,0x1c,0xba,0x8a,0x0c,0xe3,0xe3,0xdc,0xc5,0x3a,0x2e,0xe8,0x89,0x6c,0xb4,0x85,0x22,0xf0,0x6d,0x6e,0x94,0x28,0xd8,0x06,0x72,0x1c,0xa7,0x9b,0x67,0x21,0x35,0x69
.byte 0xa2,0x0a,0x22,0x09,0x55,0xe7,0x9c,0x17,0x56,0x15,0x76,0x7e,0x2e,0x29,0xf1,0x5f,0x4b,0x1f,0xff,0x58,0x58,0xeb,0xc1,0x42,0x47,0x40,0x98,0x5b,0x34,0x6c,0x4c,0xa3,0x0a,0x3e,0x01,0xf3,0xf1,0x61,0x57,0x91,0x23,0xc8,0x48,0x0f,0x66,0x9d,0x08,0xc8,0x3b,0x18,0xc3,0x78,0xc7,0xb4,0x9a,0x89,0xe7,0x49,0x72,0x26,0xd3,0x16,0xe4,0xcf
.byte 0xb0,0xde,0x5b,0x01,0xd9,0xb9,0xc7,0x83,0x1a,0x64,0x65,0xf8,0x0c,0x49,0xad,0x60,0xd5,0x2c,0x6b,0x75,0xe0,0x3f,0x8a,0x64,0x81,0xbb,0xee,0x7b,0xae,0x53,0x94,0x2b,0xc6,0x76,0x23,0x84,0xa2,0xb2,0x33,0xb3,0xae,0x02,0x1f,0xeb,0x3c,0x27,0x22,0xc0,0x54,0xdc,0x1c,0x18,0xa2,0x04,0x12,0x4f,0xd7,0x24,0xa9,0x49,0x44,0xd9,0xbf,0xd8
.byte 0x0c,0xb9,0x49,0xe3,0x84,0x29,0x27,0xd0,0x8d,0xb1,0x52,0x27,0xfc,0x0e,0xd7,0x88,0x39,0x64,0x76,0x49,0xd0,0x43,0xc4,0x3c,0x87,0x65,0x5f,0x90,0x49,0xde,0x27,0xc0,0xd4,0x1b,0xd4,0xdb,0x3f,0xfd,0x66,0x73,0x19,0x30,0x0b,0x29,0x00,0x5e,0xbc,0xbf,0x5b,0xd4,0x5c,0x54,0x0a,0xbb,0xa9,0xc7,0x09,0xd5,0x2d,0x89,0x0d,0x1c,0x9b,0x76
.byte 0xf2,0xea,0x5e,0x68,0x7f,0xdf,0xce,0xcd,0xdb,0x0e,0x93,0x98,0xa7,0xa3,0xc2,0xb1,0x66,0xa6,0xb8,0xfc,0xcd,0xf1,0x3b,0x7d,0x49,0x8f,0xc6,0x25,0x56,0x3c,0x04,0x46,0xb5,0x12,0x89,0xc1,0x0a,0xc3,0x70,0x42,0x4b,0x4c,0x5c,0x0c,0x7d,0x4d,0x9c,0x4b,0xfd,0x7f,0xa1,0xbc,0xb6,0x5a,0x5b,0xe1,0xa0,0x07,0xa8,0x57,0x95,0x73,0x4e,0x2d
.byte 0x88,0x41,0xba,0xcd,0xbe,0x20,0xfa,0x73,0x87,0x7c,0x66,0x8c,0x5f,0x73,0x8d,0xd5,0x6b,0x81,0xd3,0xed,0x4c,0xce,0x70,0x76,0x8d,0x98,0xb8,0xf1,0x31,0xa3,0x10,0x71,0xf8,0x5e,0x20,0xdb,0x9d,0xf4,0x1b,0x54,0xcf,0xe1,0x32,0x3b,0x74,0x91,0xf5,0x0f,0x35,0xca,0x2d,0x59,0x15,0x47,0x78,0xf8,0x2f,0x5f,0xb4,0x23,0xd6,0x8f,0x61,0x85
.byte 0xf8,0x6b,0x6f,0xc6,0xe0,0x04,0x63,0xcc,0x05,0x8f,0x8d,0x8a,0xaa,0xbb,0x8a,0xa5,0x6a,0x04,0x55,0x1c,0x3d,0x73,0x06,0xf4,0x2f,0x07,0xd4,0x84,0x8a,0x6a,0x4c,0x1f,0x4e,0x1b,0xf2,0xfd,0x26,0x7a,0x5b,0xb0,0x5d,0xcb,0x86,0xb4,0xe8,0xb1,0x68,0x41,0xc9,0xb0,0x47,0x72,0xc0,0x2a,0x7f,0xda,0x30,0x79,0x08,0xd9,0xc0,0x38,0xc3,0x46
.byte 0xc2,0xdf,0xb4,0xe8,0xe2,0x3f,0xc4,0xcd,0x32,0x10,0xe0,0x32,0x3d,0x40,0xbf,0x77,0xf5,0x14,0xfd,0x89,0x2c,0x7b,0x51,0x2d,0xdb,0x8f,0x40,0x9a,0xb2,0xa7,0x43,0x9b,0x80,0x1b,0x77,0xb2,0x2c,0xe0,0x56,0xb6,0x51,0xea,0xbb,0xe7,0x45,0x3c,0xdb,0xfc,0xc4,0x98,0x1f,0x9d,0x70,0xfd,0xbe,0x9d,0xac,0x4c,0xe5,0xa9,0x9d,0xbb,0x56,0x24
.byte 0xb3,0x85,0xe7,0x37,0x26,0x2a,0x75,0x5d,0x3d,0xd8,0xb6,0x55,0xa2,0x24,0x44,0xee,0x50,0xb5,0xfd,0xd5,0x3e,0xc3,0x5d,0x78,0xb5,0xc1,0x8a,0x35,0xf9,0x4d,0x57,0xc5,0x77,0xea,0x7a,0x15,0x18,0x3c,0x33,0x1e,0x39,0x9b,0xb4,0x7b,0xc7,0xcd,0xd7,0x13,0x46,0xe3,0xf1,0x21,0xf4,0x8f,0x35,0x66,0xd6,0x0e,0xa1,0x72,0x17,0x0b,0x7a,0x43
.byte 0xa3,0xcd,0x56,0x93,0x9b,0x2b,0xf6,0x7d,0xd5,0xec,0xa4,0x9c,0x6e,0xad,0x5f,0xc4,0xd2,0xe6,0xc2,0xdf,0x59,0x1e,0x92,0x27,0x87,0x39,0xb8,0x5e,0x84,0x3f,0xc9,0x72,0x79,0xcf,0x48,0xcb,0x22,0x4e,0xd8,0x09,0xf8,0x1f,0x76,0x63,0x9b,0x03,0xb4,0x21,0x06,0x86,0xa3,0xe5,0x67,0xf2,0x97,0x09,0x9d,0xba,0x99,0x8d,0x99,0x5d,0x70,0xff
.byte 0x48,0x0f,0xee,0xa9,0x3b,0xc6,0xf9,0xc7,0x36,0x84,0x8d,0x66,0xe1,0xa5,0x03,0x60,0xc9,0x07,0x48,0x1c,0xf2,0x62,0x3b,0xf2,0x2c,0x34,0x62,0x99,0xbc,0x6c,0xb3,0x6a,0xbf,0x93,0xfa,0x59,0x33,0x34,0x5b,0xb7,0xf0,0xe0,0xaf,0x17,0x05,0xfe,0xc5,0xe5,0x08,0x8e,0x3b,0x80,0x3e,0xe1,0xe2,0x08,0x43,0x57,0x29,0x46,0x39,0x82,0xfa,0xc5
.byte 0x5c,0x5e,0x24,0xba,0x01,0xbf,0xbb,0x2f,0x14,0x08,0xbc,0x21,0x85,0xf4,0x98,0xaa,0xa8,0xed,0x31,0xd2,0xfd,0x1f,0x32,0x0c,0x4b,0x61,0xbd,0x2e,0x7d,0xcd,0xcb,0x67,0xe0,0x4b,0xd2,0x3b,0x0d,0x80,0x8c,0xdd,0xc4,0x6d,0x3b,0xf0,0x25,0xd3,0x95,0xb4,0x69,0x64,0x51,0x63,0x09,0x0d,0x0f,0x7d,0x63,0x12,0xb5,0x21,0x95,0xad,0xff,0xff
.byte 0xc0,0xc7,0x97,0x6b,0x5a,0x24,0x6a,0xa5,0x97,0x40,0xc6,0xb0,0xb2,0x35,0x10,0x2e,0x4f,0x5a,0xb8,0x04,0x80,0x81,0x9a,0x09,0xf3,0xcf,0xa2,0xe9,0xd7,0xc7,0x6a,0x43,0x2b,0x74,0x70,0x26,0x66,0x50,0x1e,0xcd,0x1d,0x9e,0x78,0x7a,0xb6,0x6c,0x4d,0xce,0x9b,0xae,0x9e,0xd1,0x14,0x8a,0x63,0xb0,0x9b,0xd1,0xf3,0xec,0x05,0xed,0x72,0xf3
.byte 0x38,0xfb,0x96,0x31,0xfa,0x12,0xd5,0x97,0x10,0x71,0xc8,0x20,0x5a,0x21,0x62,0xc7,0xdd,0x70,0x41,0x7e,0xf5,0x40,0x5e,0x7c,0xdd,0x15,0xea,0x9c,0xce,0x9d,0x92,0x50,0xf6,0x4a,0x56,0x43,0xdd,0xeb,0xc3,0xfc,0x3f,0x3c,0x8a,0xac,0x70,0x06,0xd4,0x30,0xc4,0x1c,0xfd,0xcf,0x08,0x40,0xfc,0x19,0xb9,0xce,0x25,0x21,0x65,0x8d,0x50,0x24
.byte 0xad,0x17,0xa7,0x42,0x9d,0x19,0x75,0xd0,0x70,0x6f,0xee,0x15,0xb4,0x8e,0xb2,0x70,0xef,0x59,0x20,0x6a,0x2f,0xd7,0x23,0x38,0xe7,0x25,0x0c,0x5c,0x70,0xd0,0x21,0xee,0x1a,0x9e,0x13,0x2e,0x0b,0x63,0x64,0x9a,0xb3,0xd7,0x55,0xf1,0xfb,0xac,0x47,0x4a,0x24,0xa9,0x0b,0x64,0xc5,0x24,0xf1,0xb9,0x82,0xf0,0x93,0x7a,0x32,0x73,0x66,0x17
.byte 0x8c,0x6d,0xaa,0xc2,0xd1,0x08,0xd8,0xfa,0x47,0xfd,0x0e,0xc2,0x9e,0x47,0xce,0x9e,0xbd,0x10,0xb9,0x4c,0x47,0xa6,0x00,0x37,0xaf,0x6b,0x34,0x7e,0x86,0xb2,0x30,0xac,0x05,0x60,0x7b,0xfc,0x6d,0x47,0xab,0x45,0x66,0x81,0x59,0xb2,0x13,0x84,0xc2,0x07,0x64,0x17,0x64,0x20,0x9a,0x62,0xfa,0x0e,0x7b,0xf1,0x3d,0x87,0xa3,0x0d,0xaa,0x99
.byte 0x08,0x96,0x01,0x5a,0x47,0x0c,0x70,0x01,0x5f,0x16,0xdf,0x79,0xfd,0xce,0x47,0x1e,0xe0,0xb6,0xbe,0x52,0x17,0x7f,0xd7,0x05,0x8b,0xa7,0x3c,0xb0,0xe8,0xfb,0x22,0xee,0x7c,0xfc,0xb2,0x33,0xb5,0xd4,0x7e,0x87,0xd3,0xcb,0x22,0x91,0x1b,0x59,0xe5,0xbf,0x79,0xb8,0x90,0xfc,0xf5,0xa1,0xc9,0x3b,0x71,0x47,0x84,0x52,0x32,0x18,0x2c,0x91
.byte 0x81,0xa4,0xfe,0xdc,0x5e,0xf6,0x69,0xbf,0x2a,0x33,0x7b,0xc3,0xc3,0xdb,0xe7,0xe2,0xb4,0x4d,0xc5,0x47,0x62,0x74,0x84,0xb3,0xd5,0x41,0x95,0x94,0x26,0xc1,0x4a,0x27,0xd3,0x46,0xec,0x9f,0xb6,0x0e,0x79,0x1b,0x24,0x5f,0xa4,0xdf,0x33,0x2d,0x89,0xb5,0x96,0x2a,0xb9,0x2c,0x0a,0x1b,0xf2,0xd6,0x38,0xc4,0x73,0x58,0xb2,0xc4,0x9b,0x3e
.byte 0x2f,0x73,0xbc,0xdb,0x6f,0xb6,0x7f,0x7e,0x68,0x18,0xc4,0x49,0x41,0xcb,0xff,0x45,0x67,0x1d,0x41,0xa0,0xc3,0x17,0x5c,0x1e,0x4d,0xa7,0xdd,0x25,0x4b,0xe2,0xf7,0xfc,0x53,0x9f,0xf6,0xf9,0x1a,0x73,0xfc,0xc0,0xcd,0x93,0x38,0x4d,0x02,0x4e,0x33,0xf8,0x6f,0x0b,0x5b,0x33,0x52,0xff,0x20,0xe1,0xea,0x37,0x44,0x82,0x26,0xa8,0xf3,0x91
.byte 0x33,0xa5,0x60,0x92,0xfc,0xe1,0x7e,0x14,0x8f,0xd1,0xd6,0xda,0xdb,0x3f,0x37,0xf1,0xf1,0xed,0x91,0x5b,0x60,0x2a,0x9d,0x31,0xd3,0xb5,0xd8,0xe8,0x78,0x8d,0x59,0x0b,0x85,0xdc,0x45,0x02,0x33,0x9a,0x5e,0x43,0x9b,0x54,0x09,0x4f,0xac,0x79,0x7e,0xa7,0x64,0xe1,0xbb,0x67,0x27,0xb7,0x34,0x0a,0xd3,0xa3,0x57,0x0b,0x8c,0x46,0x9a,0xc7
.byte 0xe2,0x4e,0xb1,0xf5,0x2b,0x91,0xbf,0x5d,0xc2,0xf7,0x21,0xb6,0x74,0x42,0xf9,0xfb,0x01,0x97,0x0d,0x65,0x93,0x14,0x6f,0x60,0x5b,0x49,0x33,0x6e,0xb4,0x3b,0x1c,0x02,0x96,0x91,0x2e,0x32,0x29,0x66,0x44,0x52,0xc0,0xab,0x2f,0x27,0x27,0xa0,0x80,0xe6,0xc9,0x63,0x08,0x34,0x23,0x5e,0xb4,0x20,0x24,0x2b,0x84,0x94,0xbf,0x29,0xef,0x86
.byte 0x8a,0xb2,0x1d,0xaf,0x98,0xc0,0xf6,0x81,0xd0,0x81,0x18,0xd1,0x2e,0x53,0xae,0xd2,0xe4,0xc6,0x7d,0x0b,0x13,0x62,0x83,0xe7,0xe5,0xc7,0x93,0x34,0xd3,0xd2,0x4c,0x0f,0x44,0x7f,0x20,0xf0,0x12,0x0d,0x71,0x26,0x45,0x97,0xda,0xee,0x9b,0x69,0x3d,0x32,0x41,0x7f,0x21,0x19,0x42,0xfc,0x8b,0x96,0xb6,0xdd,0xcb,0x7a,0x41,0x57,0x24,0xd6
.byte 0xd6,0xd2,0x39,0xf4,0xad,0x4e,0xfb,0x0e,0x88,0x8e,0x8a,0xd5,0xb2,0xa3,0x7b,0x66,0x66,0xb9,0x47,0x55,0xd4,0xa2,0x4c,0x3e,0xe6,0x85,0x2e,0xaf,0x1b,0x6b,0x9b,0xb1,0xf9,0x66,0xfc,0xdd,0xb7,0xab,0x50,0x43,0xe4,0x5e,0x35,0x0f,0x59,0x8c,0x4f,0x5a,0xc2,0xe2,0xf6,0x65,0x8e,0x7c,0x8c,0x4b,0x0e,0x92,0x71,0x53,0x1d,0xde,0xd3,0xcb
.byte 0x6b,0x73,0x56,0xdb,0x7f,0xde,0x51,0x61,0xff,0xbd,0x07,0xdb,0xd4,0xbd,0x78,0x55,0xf3,0xe6,0x26,0x45,0x4a,0x55,0x8c,0xf0,0xc1,0x95,0x2e,0x20,0xc3,0x26,0x6f,0x2e,0x0b,0xba,0x7c,0x5e,0x64,0xc1,0x74,0xb7,0x5c,0x0a,0x84,0x76,0x95,0xe6,0x3f,0x00,0x67,0x08,0x82,0xb0,0x9a,0x24,0x32,0xa7,0x47,0x94,0xf3,0x0f,0xee,0xe0,0xef,0x39
.byte 0x90,0x0a,0x29,0xac,0xe3,0xbb,0xac,0xa8,0xd8,0x5b,0xc1,0xf0,0x5b,0xcf,0xe8,0x29,0x65,0x2a,0xc7,0x2b,0x05,0x05,0xf4,0xce,0xed,0x01,0x75,0x53,0x1f,0x12,0x49,0x73,0xeb,0x43,0xdf,0x6d,0x2e,0x21,0xab,0x43,0x20,0x79,0x69,0xbb,0xc1,0x92,0x41,0x07,0xe8,0x65,0x77,0xde,0x78,0x92,0x3a,0x1d,0x4d,0x93,0xd0,0xa7,0x72,0xb0,0xa4,0x9c
.byte 0x7e,0xa7,0x3b,0x60,0x7d,0x6e,0xa9,0x3e,0x25,0xdb,0xfe,0x4f,0x4b,0xb5,0x45,0x2e,0x84,0x49,0x38,0x1e,0x97,0x4c,0xd3,0x2f,0x1f,0x16,0x52,0x9e,0xe4,0xed,0x8a,0x9e,0x98,0xa1,0x19,0x07,0xf3,0xe2,0x1d,0x51,0xb8,0xe9,0xc6,0xaa,0x44,0x4a,0x71,0x21,0xdf,0xab,0xe2,0x31,0x5e,0x6e,0x33,0xe5,0x2d,0xc7,0xf2,0x14,0x92,0x5b,0x2f,0x79
.byte 0x1b,0xd1,0xa7,0xe0,0x00,0x12,0xa0,0x88,0x71,0xfa,0x27,0x86,0x23,0x47,0x35,0xe5,0x95,0xdd,0xae,0xfa,0x22,0xea,0x08,0x83,0x85,0xc4,0x35,0x37,0xdf,0xdf,0xc2,0x41,0xa9,0x44,0x5d,0x30,0x6e,0xa0,0xdb,0xd4,0x97,0x07,0x43,0x9e,0x7b,0x95,0x50,0xf5,0x88,0x9a,0x26,0x9c,0xf9,0x85,0x6d,0x4e,0x92,0x0c,0xbe,0x04,0xd6,0x1a,0x32,0xda
.byte 0x47,0x0c,0x04,0xab,0xdb,0xc4,0xd6,0x49,0x61,0xf9,0x4a,0x90,0x5b,0x75,0x98,0xb2,0x69,0xa3,0x01,0x47,0xf4,0x60,0x03,0xc5,0x55,0x71,0x26,0x0f,0xe3,0xc3,0xb7,0xae,0xe9,0x2a,0xe8,0x3b,0x0a,0x24,0xff,0x6b,0x3b,0x6d,0x53,0xf9,0x03,0xf5,0x12,0xd7,0xf8,0xb8,0xd2,0x33,0xfd,0xcc,0x61,0xd7,0x75,0x80,0xa9,0x30,0x38,0x6f,0x78,0x5e
.byte 0xa3,0x37,0xa0,0xc6,0xf5,0x84,0x12,0x56,0xdd,0x62,0x24,0xf7,0x8a,0xf6,0x31,0xf5,0xc0,0xd5,0x94,0xa5,0x92,0xfe,0xe5,0x19,0xe7,0x97,0x6d,0x4a,0xbc,0xb6,0xab,0x05,0xa1,0x36,0x9f,0xb5,0x2f,0xf3,0x0c,0x8e,0x61,0xab,0xdc,0xe5,0x2c,0xcc,0xc7,0xd4,0x49,0xf9,0x56,0xea,0xa0,0x93,0x4a,0x0c,0x66,0xfa,0xc5,0xa2,0xfa,0x75,0x31,0x1e
.byte 0x27,0x69,0x45,0x8e,0x15,0x8d,0x3c,0xde,0x86,0xd9,0x95,0xc7,0x95,0x7a,0xde,0x97,0xbe,0x8b,0x7a,0xa9,0x8b,0xc5,0x2d,0xea,0x96,0xde,0xf0,0xad,0x5c,0x7d,0xd0,0xfb,0x9a,0x34,0xbe,0x2f,0x35,0x48,0x79,0xd7,0xff,0x6b,0x10,0x28,0x08,0x9d,0xa6,0x7e,0x8b,0xdd,0xdd,0xcb,0xc5,0xc4,0xfe,0x29,0xd4,0x8e,0x36,0xa6,0x2a,0x16,0xbd,0xfc
.byte 0x8e,0x67,0x9b,0x9a,0x37,0xe3,0x08,0x11,0xbb,0x02,0x09,0x49,0x15,0x67,0xa3,0x23,0x3b,0xb3,0x2c,0xc0,0x3b,0x88,0x33,0xf7,0x06,0x83,0x86,0x65,0xc8,0xb2,0x2a,0x43,0xd5,0xd8,0xd1,0x65,0x7c,0x87,0xa6,0xb5,0x93,0x3a,0x44,0xc2,0xbd,0xd9,0x78,0x23,0xf6,0xa3,0xff,0x3b,0xbe,0x8b,0xf1,0x74,0x95,0xa0,0x1e,0xa9,0xe3,0xa8,0x27,0xd4
.byte 0x0d,0xb2,0x18,0x90,0x61,0x4a,0xa3,0x8a,0x57,0x5a,0xc3,0x5f,0xf2,0x8a,0x86,0x03,0xa7,0x6e,0xd1,0x48,0xa0,0x1f,0x89,0x32,0x96,0xe6,0x85,0xbc,0xbc,0xd5,0x91,0x89,0xb0,0xb4,0x58,0x0c,0xfe,0x64,0x1c,0x55,0xba,0xcf,0x03,0x49,0x60,0x4f,0x4a,0x50,0x24,0xdb,0x02,0x2a,0x56,0xc1,0x57,0xa6,0x3b,0xbe,0xa6,0x21,0xff,0x8b,0xc3,0x63
.byte 0xb2,0xca,0x47,0xfe,0xd1,0xdc,0x90,0xba,0x24,0x0c,0x15,0x23,0xec,0xf1,0x35,0x4a,0xab,0x3a,0xf3,0xf0,0xf0,0xb4,0x04,0x58,0x16,0x4f,0xf9,0xe3,0x06,0x9b,0x3f,0xd1,0x9f,0x95,0xc7,0xcf,0x0e,0x93,0x87,0x30,0x49,0x0a,0x18,0x8a,0xc4,0x58,0x10,0x07,0x93,0xa7,0x85,0xd5,0x2a,0xe7,0x4c,0xd0,0x54,0x1d,0x8b,0x40,0x3e,0xb9,0x94,0xc7
.byte 0x3f,0xc5,0xad,0x38,0x5a,0xf4,0x87,0x60,0xda,0x5e,0x74,0x5d,0x3d,0x81,0x85,0xba,0x68,0xee,0x71,0xda,0x9e,0x4b,0x6b,0x8f,0x56,0x0d,0xe5,0x31,0x3a,0x03,0x73,0x28,0x4f,0x8b,0x50,0xf8,0x15,0x63,0x42,0x45,0x65,0xb3,0x7b,0x00,0x0f,0x24,0x01,0x09,0x4b,0x74,0x09,0x28,0xdf,0x02,0x36,0x58,0xec,0x15,0x18,0xba,0x45,0x30,0x33,0x95
.byte 0xac,0xe2,0x8d,0x8c,0x20,0xdf,0xba,0x4d,0x8f,0x1d,0x1f,0x05,0x25,0x7e,0x8c,0xea,0xa3,0x92,0x8b,0x19,0xd9,0x51,0xa6,0x35,0x39,0x35,0xd4,0x8b,0x35,0x7d,0x1a,0xc0,0x84,0x3d,0x1b,0x21,0x28,0x3b,0x12,0x73,0x92,0xc7,0xf6,0xf4,0x86,0xc5,0xba,0x9e,0x2d,0x30,0xf0,0x9b,0xe7,0xf1,0x65,0x54,0x66,0x93,0xd2,0x1c,0x59,0x02,0x15,0xb5
.byte 0x56,0x34,0xdd,0x6e,0x28,0xe1,0x54,0xe4,0x94,0x70,0x08,0x2f,0xda,0xa9,0x8b,0x44,0x5a,0x4b,0xca,0x94,0x4b,0x53,0xc0,0x30,0xd1,0x78,0x15,0x60,0x9e,0x92,0xed,0x19,0xe0,0xbc,0x0f,0xbb,0x10,0x64,0xf6,0x84,0xe2,0x4d,0x96,0x57,0x1a,0x28,0xd4,0x6f,0xe1,0x7b,0x4b,0x71,0xb7,0x01,0x7d,0x39,0x8f,0x4b,0x77,0x3f,0x04,0xf1,0x3d,0xdd
.byte 0x0d,0x21,0xd9,0x94,0x9e,0x85,0x64,0x6d,0x86,0x24,0x60,0xd8,0xa0,0x87,0xdb,0xde,0x21,0xb7,0xdb,0x36,0xf6,0x6c,0xef,0x51,0x5f,0xf5,0x46,0x26,0x9d,0xda,0x9c,0x2a,0x13,0x58,0x44,0x7b,0xd3,0x91,0xbf,0x7d,0x16,0x11,0x04,0xbb,0x01,0x17,0xbe,0x2b,0x20,0x72,0xb5,0xc6,0x5d,0x27,0x3a,0x10,0x46,0x1e,0x72,0x00,0x87,0xd4,0xb0,0x54
.byte 0x4b,0x9f,0xb8,0xcb,0x52,0xf9,0xeb,0x7a,0x72,0x13,0x80,0xb2,0xdf,0x79,0x46,0xa7,0x0c,0x0b,0x70,0x32,0xf4,0x42,0x66,0x35,0x70,0xb5,0xb5,0x48,0x8a,0x43,0x65,0xaa,0xb8,0x29,0xe3,0xcf,0x39,0x62,0xf1,0xba,0xe6,0xee,0x08,0x13,0xcd,0x25,0x20,0xfa,0xdf,0x29,0xb1,0xe5,0x9e,0xc7,0xc7,0xa5,0xe3,0x74,0xdf,0x3c,0xea,0x33,0xda,0xed
.byte 0x6b,0x66,0xd5,0x16,0x89,0x2e,0xe7,0x7a,0x9f,0x60,0xcd,0x96,0x4e,0x81,0xcd,0x31,0x24,0xcc,0x5c,0x24,0x44,0x83,0xe5,0xd5,0x22,0xd0,0xca,0x7c,0x17,0x32,0xa5,0x13,0xaf,0xbd,0xd2,0x91,0x7b,0x3c,0x9b,0x54,0xaf,0x0b,0x51,0xf7,0x80,0x01,0x77,0x96,0x71,0x0c,0xa1,0x6a,0x15,0x91,0xe5,0x20,0xe1,0x0a,0x02,0x94,0xb3,0x2b,0x29,0x4f
.byte 0x13,0xbf,0x48,0x61,0x78,0x4f,0x6a,0x82,0x28,0x1b,0x82,0xa7,0xa0,0x28,0xfa,0x7e,0x7b,0x67,0x76,0x7c,0xc1,0x7e,0x89,0x91,0x5f,0x63,0xf7,0x26,0x60,0x10,0x01,0xff,0xe6,0xc7,0xea,0xed,0xce,0x6d,0xe6,0x15,0x4d,0x17,0x84,0x1c,0xc9,0xb1,0x76,0x80,0xa5,0x33,0x2c,0x9d,0xdf,0x20,0x55,0x46,0xbe,0xde,0xc6,0x76,0x7c,0x11,0x31,0xac
.byte 0xdb,0x06,0xd0,0xe5,0x29,0xdb,0x3d,0x6e,0x8f,0xbf,0x0b,0x6a,0x6e,0x83,0xcb,0x7b,0x09,0x9d,0x1f,0x53,0x17,0x67,0x99,0x34,0xb2,0x24,0xa8,0x12,0x09,0xf1,0xaf,0xf7,0x58,0xd0,0x0a,0x9e,0x50,0xa1,0x81,0xdb,0xce,0xf3,0x24,0x40,0x45,0xfc,0xa0,0x47,0xd8,0x09,0x8a,0x2b,0x7d,0x74,0x77,0x0f,0xcc,0xf8,0xd7,0xee,0xad,0x0c,0x71,0x0b
.byte 0x60,0x0b,0x0d,0x14,0x67,0x57,0xb2,0xde,0xbb,0x4d,0xdf,0x4e,0x60,0xbf,0xdb,0x93,0x87,0x60,0xb3,0x29,0x73,0x45,0xd3,0x3c,0x04,0x15,0x94,0x6b,0x29,0xf0,0x10,0x1c,0xd5,0x4b,0x2c,0xb4,0x43,0xda,0x9d,0x8f,0x41,0xb1,0xe4,0xe4,0x57,0x39,0x74,0xda,0x62,0xce,0x75,0xc8,0x2f,0xab,0xe8,0x93,0x73,0xf3,0xa7,0x4e,0x43,0xf3,0xf2,0xb8
.byte 0x46,0x05,0xac,0xe5,0x1e,0x3f,0xae,0x70,0x8a,0xee,0xff,0x1e,0xe0,0xc2,0x21,0x56,0x14,0xb2,0xb5,0x36,0x1c,0xd6,0x0d,0x1d,0x03,0xd6,0xbf,0x0c,0x2e,0xb2,0xa9,0xf0,0x3f,0x1e,0xbf,0x4f,0xe0,0x82,0x60,0x08,0xc3,0x7a,0xc1,0x0b,0xe2,0xe6,0x28,0x21,0x6b,0x20,0x56,0x74,0x02,0x13,0x43,0x4c,0xe6,0x0c,0xd6,0x82,0x81,0xc6,0xd5,0x63
.byte 0xb5,0xe7,0xbf,0x43,0x25,0xde,0xeb,0xa9,0x34,0xfd,0x8e,0xe5,0x67,0xc8,0xc6,0x5e,0x12,0xba,0xfa,0x66,0x50,0xed,0x61,0xe0,0x94,0x31,0xd6,0x71,0x30,0x2f,0x42,0x71,0x98,0xa0,0x5e,0x31,0x27,0x19,0xe9,0x81,0xd9,0x14,0x7c,0x09,0xa2,0x60,0x31,0x2f,0x9a,0x1c,0x77,0xee,0xf7,0x46,0x93,0x32,0x66,0x82,0xbb,0x50,0xce,0x32,0x81,0x6b
.byte 0xe4,0x46,0xc2,0xf9,0x78,0xdd,0x7a,0x19,0xbd,0x0e,0xf8,0x40,0x11,0x85,0xbb,0xe1,0x06,0x82,0xe9,0x88,0x45,0x25,0x35,0x80,0x60,0x0b,0xf0,0xf1,0x6e,0x99,0xab,0x32,0x04,0x90,0xc9,0x50,0x82,0x49,0xc9,0x75,0xf3,0xe4,0x7d,0x22,0x3e,0x48,0x70,0xa0,0xcb,0x33,0x91,0xe6,0x8f,0x2b,0x8c,0xd4,0x9a,0x13,0x0b,0x5d,0x66,0x62,0xf5,0x16
.byte 0x8d,0x90,0x2e,0x84,0x8e,0xa1,0x90,0xfc,0x4b,0x62,0x2d,0xc3,0x1b,0x09,0x6f,0x61,0x90,0xee,0x43,0x2a,0x49,0x0b,0x16,0xea,0xa8,0x09,0x9a,0x4c,0xc1,0x73,0x8c,0xa1,0x98,0x3c,0x99,0x07,0x0c,0x55,0x4f,0x93,0xb6,0xde,0xbb,0xf0,0x26,0x92,0x43,0x63,0x83,0x7e,0xfe,0x8e,0xfe,0xbf,0xe7,0x27,0xb8,0x7d,0xbc,0xba,0xb6,0xfb,0x27,0xb5
.byte 0xfd,0xde,0x3d,0xd7,0xe9,0x46,0x9a,0x17,0xd9,0xd7,0x84,0x9d,0x75,0x58,0x26,0x6c,0x96,0x70,0x74,0xb1,0x46,0x46,0xac,0x48,0xa2,0xce,0x6a,0x95,0xea,0xbe,0xd6,0x87,0xd6,0x48,0xc1,0x70,0x07,0xbc,0xd2,0x26,0xef,0xaf,0xdf,0x04,0xa0,0xe7,0x94,0xc8,0x94,0xcf,0x85,0xf2,0xc1,0x20,0x70,0xac,0xf2,0x0f,0x61,0x3c,0x6a,0xff,0x80,0x5f
.byte 0xa6,0x1e,0x7d,0x07,0x1a,0xd4,0xb9,0x5e,0x99,0x35,0x65,0x5c,0xef,0x45,0x59,0x45,0x18,0x6e,0x48,0x5c,0x18,0x96,0xd1,0xda,0xb0,0xfb,0xb7,0x71,0xa6,0x80,0x7b,0x88,0x65,0x73,0xab,0x2f,0xc1,0x8b,0x00,0x1e,0x16,0x9f,0x16,0x50,0x1d,0x7d,0x75,0xee,0x17,0x5f,0x52,0xba,0xca,0xc4,0xe9,0xfb,0xb5,0x1c,0x8f,0xf8,0x7e,0xd8,0xf4,0x7e
.byte 0x11,0xb6,0xf5,0x38,0x84,0x37,0x3a,0x24,0xb5,0x07,0x1c,0x7f,0x70,0xaf,0xe9,0x17,0x33,0x89,0x92,0xb1,0xb3,0xec,0x60,0x41,0x61,0xe1,0x0a,0xf9,0x11,0x7b,0xe0,0x7e,0xca,0x32,0x4e,0xa5,0xcd,0xf7,0x95,0x2c,0x6e,0x3d,0x3f,0xe4,0xa8,0x25,0xa6,0xb4,0x6d,0xb4,0xa3,0x5e,0xb1,0x9c,0x6b,0x19,0xc4,0xdc,0x02,0xec,0xfa,0x9d,0x42,0x69
.byte 0x1e,0x48,0x3a,0xfa,0x51,0x43,0x5c,0x14,0xea,0x74,0xec,0xa6,0xf0,0xea,0x42,0xf5,0x32,0xfe,0x74,0x44,0x09,0xcb,0xa4,0xee,0xf8,0xc5,0x9a,0x66,0xbf,0xa0,0xc6,0x73,0xc0,0x29,0xfe,0xec,0x8a,0xa9,0x85,0xa5,0xa7,0x8e,0x54,0xfb,0x87,0x01,0x59,0x9c,0xb2,0x17,0x62,0xd0,0xea,0xe8,0x17,0x4d,0x67,0x82,0xa9,0xfc,0xc1,0x12,0x0c,0xfc
.byte 0x3a,0xe9,0xab,0x78,0x70,0x96,0x68,0xe4,0x10,0xd1,0x70,0x61,0xbb,0x07,0xe4,0xdc,0x8c,0xc4,0xae,0x07,0x90,0xd6,0xee,0xa5,0x43,0x0c,0xc5,0xc9,0x0a,0x55,0x42,0x90,0x70,0x18,0x31,0x13,0x3c,0x00,0x89,0xa0,0x30,0xaf,0xa1,0x91,0x33,0xe6,0xd0,0xe1,0xb4,0x99,0x2b,0x27,0xee,0x25,0x95,0x1f,0xfe,0x19,0x3a,0xdb,0x2e,0x59,0x2e,0xa0
.byte 0x12,0xfb,0x34,0x20,0x72,0x34,0xa8,0x2b,0xeb,0xbe,0xdb,0xc3,0xab,0xdf,0x82,0x68,0x37,0x7f,0x76,0xcd,0x15,0xd5,0xf8,0x1c,0x6f,0x7a,0x33,0x51,0x86,0xf8,0x38,0x77,0x96,0x7b,0x15,0xa0,0x2a,0x6f,0xdb,0xad,0xfb,0x0a,0x86,0xac,0xee,0xc2,0xde,0xf3,0x81,0x6b,0xc3,0x09,0x93,0xaa,0x57,0x2d,0x6a,0xff,0xba,0xa0,0x93,0x75,0xc7,0x6e
.byte 0xef,0x59,0xaf,0x57,0x32,0xf6,0x0b,0x57,0x60,0x12,0x01,0x20,0xce,0xcb,0x1c,0x88,0xd1,0xe3,0x49,0x88,0xbe,0x5e,0xdf,0xc1,0x81,0x5b,0xf7,0x15,0xac,0xa8,0xc8,0x10,0x2d,0x98,0xae,0x75,0xef,0x4e,0x17,0x10,0x3c,0x95,0x92,0xf6,0xd6,0xd7,0xdd,0x0a,0xe2,0x42,0x40,0x28,0x68,0xc2,0x27,0xac,0xd3,0xca,0xa1,0xc0,0x64,0x05,0x17,0x64
.byte 0x99,0x26,0xd3,0xb3,0xac,0x77,0xf4,0x40,0xd1,0x00,0xa9,0xc6,0x6d,0x45,0x47,0xa3,0x53,0xb7,0x13,0x61,0xc6,0x11,0xc0,0xa4,0xc9,0x2a,0x5a,0xa2,0x3a,0x27,0x0a,0x84,0xff,0xb5,0xb0,0x45,0xfe,0x38,0xb4,0xec,0x95,0x8b,0xd5,0x1a,0xf3,0xc6,0x0b,0x62,0xfa,0xeb,0xd1,0x90,0x11,0x7e,0x36,0xee,0x5c,0xe6,0xb6,0xf3,0x62,0xbf,0xe7,0xc9
.byte 0x77,0x66,0x7b,0xb5,0x1c,0x9e,0x6b,0x21,0x84,0x8c,0x19,0xa7,0xf0,0x3b,0x9d,0xb0,0xfe,0xe6,0x0d,0x64,0xc5,0xdc,0xa2,0x4f,0x7c,0xcb,0x09,0x0a,0x2b,0x9f,0xd7,0x31,0xa5,0xc7,0xba,0x2a,0xc9,0x36,0x1f,0xc5,0x5b,0x8a,0x5b,0x9e,0x10,0x2f,0x2c,0x27,0x11,0x5c,0x9c,0x71,0x45,0x33,0x53,0xed,0x0e,0xdd,0xd0,0xb4,0x28,0x59,0x36,0xf1
.byte 0xa3,0x97,0x20,0xf4,0x27,0x85,0x02,0x01,0x46,0xf4,0xd3,0xbc,0xf6,0xc9,0x33,0xa8,0xe1,0x13,0x99,0x2b,0x74,0x68,0x20,0xcf,0x0e,0xfb,0xba,0x0d,0xaa,0x1f,0x76,0x66,0x6e,0xa7,0x56,0x71,0x80,0x7f,0xe5,0x2d,0x60,0x53,0x5b,0x56,0x2d,0xf1,0x3b,0x95,0x95,0x94,0x8c,0x9d,0x37,0x90,0x60,0x9b,0x29,0x84,0x6e,0x93,0x22,0xb4,0x85,0xd0
.byte 0xea,0x51,0x2d,0x80,0x7d,0xa0,0x50,0x57,0x8e,0xc3,0x58,0x37,0x75,0x05,0x37,0x4a,0xce,0x6e,0x10,0x9a,0x4c,0xce,0xfb,0x8e,0x82,0xed,0xb3,0x93,0x00,0xce,0x38,0x09,0xde,0xa1,0x92,0x23,0xd3,0xe1,0x33,0xc4,0xca,0xcb,0x42,0xc2,0x95,0x04,0x90,0xfd,0x32,0x43,0x6a,0x2c,0x8c,0x76,0xbf,0xca,0xe6,0x60,0xed,0x48,0x30,0x47,0xbc,0xba
.byte 0xff,0x00,0xfc,0xa8,0x53,0x17,0x45,0xc6,0xa2,0xc2,0xb3,0x3c,0xf1,0x1f,0x4c,0x95,0x73,0xc5,0xa3,0x6f,0x59,0xd0,0xb3,0x1e,0x12,0x27,0x0a,0xc7,0x70,0x27,0xfa,0x33,0x22,0x6a,0x25,0x3c,0x34,0x83,0x03,0x37,0xb8,0xdb,0xa9,0xc2,0xfb,0x64,0x3d,0x77,0x96,0x37,0x54,0xcf,0x18,0x31,0xce,0xe8,0xc1,0x19,0x85,0x81,0xd2,0x1b,0xcd,0x08
.byte 0xdb,0x53,0xa2,0x61,0x18,0xf2,0xe7,0x33,0x1b,0xe3,0x21,0xd5,0x52,0x8d,0x51,0x2e,0x4d,0xf2,0x95,0x1b,0x5e,0x2f,0xcb,0xe7,0x12,0xc9,0x74,0xce,0x44,0x93,0x57,0x51,0x2b,0x9c,0x03,0x9e,0x20,0x17,0x75,0xf0,0x24,0xb3,0x1f,0x38,0x1b,0xef,0x12,0x8f,0x6f,0x79,0xbc,0xce,0x40,0xa5,0x6c,0x86,0xe9,0x92,0x90,0x53,0xd2,0x28,0x40,0x77
.byte 0x44,0xa0,0x6f,0x11,0xf8,0x7b,0xf1,0xd8,0xd5,0x04,0x88,0x5a,0xf3,0xc6,0xa3,0xbc,0xcb,0xef,0x85,0x56,0x6d,0xa1,0x84,0x34,0xcf,0xaa,0x52,0xb1,0x76,0xed,0x2b,0x67,0x73,0xa7,0xc7,0x2b,0xfb,0x7a,0x9c,0xf9,0xdf,0xfa,0x92,0xd8,0x93,0xe9,0xd6,0xd1,0x66,0xe6,0xed,0x82,0x80,0x00,0xa3,0x40,0x3d,0xef,0xf4,0xf9,0x6c,0x6a,0xaa,0x73
.byte 0x7c,0xc5,0xed,0x3d,0xf5,0xf5,0x9e,0x3f,0x1a,0x9a,0x29,0xd0,0xb4,0xac,0x96,0x55,0x61,0xca,0x37,0xc0,0x60,0xea,0xc5,0xc7,0x96,0x35,0xa0,0xa8,0xab,0xf7,0xeb,0x5e,0x3b,0x7e,0x54,0xb0,0x29,0x50,0xde,0x11,0x9f,0x71,0x3c,0xa5,0x32,0x32,0xe3,0xf8,0x1f,0x19,0x08,0x89,0xe6,0xc7,0x1b,0xb8,0xda,0xe3,0x98,0xd7,0xed,0x76,0x0f,0xa5
.byte 0xc1,0x24,0x0d,0xea,0x10,0x13,0xcd,0x72,0xf4,0x44,0xb5,0x56,0xf6,0x4c,0xad,0xb7,0x43,0x6f,0x0a,0xc0,0x36,0x40,0x48,0xe1,0x4a,0x4c,0x9c,0x23,0xfd,0xde,0xaa,0x79,0x62,0xc0,0xec,0xfb,0x37,0x7f,0xbb,0xbc,0xfb,0x38,0xd0,0xaa,0x4a,0x5d,0x08,0x1c,0xa5,0x3d,0xb0,0x02,0xdc,0x5f,0xfc,0x9a,0x2a,0x6e,0x82,0x4d,0xf8,0x67,0x9d,0x2c
.byte 0x6a,0x01,0x55,0xad,0xf4,0x1d,0x02,0x3e,0xc8,0x55,0x42,0xc7,0x39,0x7b,0xcd,0xa8,0x0c,0xd2,0x46,0xc2,0x1a,0x78,0x4a,0xf1,0xb6,0xd8,0x38,0xbd,0x0a,0x9b,0x53,0xdb,0xd8,0xaa,0x1f,0x30,0x9f,0x97,0xf7,0xbf,0xff,0xf1,0x3d,0x1d,0xf2,0x3b,0xc1,0x7c,0x3a,0x63,0x5c,0xb3,0x67,0x02,0xcd,0x67,0x0a,0xf9,0x6e,0xf2,0x36,0x3b,0x36,0xa9
.byte 0xce,0xf1,0x66,0x13,0xb7,0x8e,0xc8,0x36,0x30,0x34,0xde,0x32,0x68,0xc7,0x62,0x60,0x13,0x34,0x7d,0x66,0x32,0x69,0xe7,0x7a,0x0a,0x20,0x24,0x86,0x85,0x72,0x3c,0x7d,0x5f,0xea,0x6c,0xaf,0x70,0xde,0xfe,0x94,0xc2,0x6e,0xb3,0x0f,0xa1,0x2a,0x51,0x40,0xd5,0x5c,0xaf,0xdd,0xd9,0x7d,0x09,0x9b,0x31,0x45,0xae,0x48,0x67,0xfa,0x2d,0x11
.byte 0x77,0xed,0x92,0x79,0x7e,0x27,0x27,0x3b,0x1c,0xa7,0xee,0x88,0xaf,0xfe,0x71,0xa7,0x0e,0x9e,0xa8,0xa5,0x11,0xd2,0x88,0x25,0x12,0x49,0x8a,0x89,0x19,0xc7,0xa8,0xa3,0xa9,0xc6,0x48,0x57,0x21,0x23,0x91,0x07,0xfe,0xb3,0x6e,0x0b,0x70,0x08,0x7b,0x1c,0xe4,0x15,0x13,0x3e,0x8a,0x43,0x80,0x1b,0xb6,0x72,0xd6,0x62,0xfe,0x3a,0x7a,0x5f
.byte 0xb9,0xd4,0x00,0xce,0x5b,0x05,0xa0,0x81,0xe5,0x9d,0x56,0x65,0xb6,0xa2,0xb7,0x2f,0xa8,0x95,0xed,0x15,0x70,0x3e,0xb4,0xbd,0x62,0xde,0xde,0x59,0x9d,0x99,0x07,0xe8,0x0b,0x83,0x2e,0x55,0x96,0x63,0x0a,0x06,0x2a,0xf4,0xcb,0xd2,0x72,0x28,0x71,0xc8,0xb3,0x22,0xa0,0x35,0xaa,0x9f,0x73,0x21,0x8b,0xd9,0x25,0x41,0x46,0xbd,0x65,0x74
.byte 0x40,0xcb,0xf4,0x83,0xa1,0xf1,0x73,0x75,0xe0,0xe2,0xee,0x1d,0xc4,0x6a,0x11,0x55,0x50,0x18,0xdb,0x94,0x58,0xbc,0xaf,0x2a,0x18,0x20,0x44,0x15,0xff,0xbd,0x67,0x19,0x64,0x39,0xab,0x35,0x72,0x34,0x83,0x66,0xd5,0x5d,0xcc,0xc7,0x68,0x4f,0x6b,0x05,0x81,0xfc,0x47,0x0d,0xe8,0xbe,0x7c,0xdd,0x27,0xd7,0xc6,0x74,0x9a,0xc1,0x5a,0x28
.byte 0x45,0x58,0x9f,0x52,0xc8,0x8f,0x7b,0x13,0xab,0x9e,0x72,0xda,0xdf,0x10,0x3a,0xe3,0x5f,0x9b,0xf8,0x59,0x2d,0xc5,0x40,0x31,0x12,0xe9,0xc4,0x1f,0x46,0xa0,0x8a,0x98,0xd7,0xbf,0x16,0xe5,0x2d,0xe8,0x51,0xc0,0x8b,0x40,0x9d,0xd6,0x5b,0x4c,0xa5,0x95,0xd2,0x18,0x1e,0x0b,0x7e,0xd2,0xfc,0x0c,0x8c,0x1a,0x8b,0x61,0x45,0x77,0xf4,0x96
.byte 0xef,0xc8,0x13,0x0b,0x93,0x27,0x35,0x9b,0x4a,0xc4,0x86,0x13,0x8e,0x86,0xf0,0xde,0x2b,0x45,0x8f,0x9a,0x22,0x31,0x50,0xa5,0x3c,0x26,0xcb,0x86,0xc1,0x88,0x18,0xb2,0x82,0xe6,0x88,0x71,0x49,0x2a,0x5c,0x2f,0x96,0x49,0x1e,0xc0,0x86,0x8a,0xe9,0x84,0x16,0x74,0xf2,0x29,0x99,0xdc,0x26,0xc4,0x3b,0xc7,0x1d,0xdd,0xbb,0x3a,0xe6,0x7a
.byte 0xac,0x06,0xb9,0x91,0x23,0xae,0x46,0x2e,0x4f,0x36,0x42,0x7e,0x84,0xae,0xbd,0x0c,0x21,0x6b,0xa3,0xf0,0xd0,0x1e,0xb1,0xf4,0x38,0xde,0xa0,0x2e,0xd4,0x0d,0xdb,0x00,0x17,0xd4,0x01,0xe7,0x45,0x50,0x58,0x0d,0x0b,0x5a,0xf5,0x02,0x4b,0xeb,0x23,0xc2,0xbd,0x54,0xe8,0x2e,0x92,0xe3,0xc3,0xfe,0x32,0xa0,0xc0,0x09,0x85,0x97,0x74,0x96
.byte 0x60,0x6c,0xd5,0x6a,0xf6,0xee,0xef,0xa5,0x25,0xa8,0x6e,0xb6,0x59,0xa7,0xf9,0xad,0xf5,0x9d,0x45,0x83,0x98,0x33,0x26,0x53,0x89,0xb4,0x6d,0x45,0xb2,0x25,0xb4,0xd1,0x35,0xe0,0x28,0x77,0xcb,0x45,0x5f,0xc4,0x9d,0x8d,0x43,0xbb,0x49,0x68,0x06,0x6e,0x3d,0x48,0x3c,0xdb,0xbc,0x6f,0xfe,0x90,0xdb,0xde,0xe9,0xfb,0xca,0x29,0x7f,0x86
.byte 0xaf,0xdd,0x1f,0xcc,0x81,0x74,0x4f,0xe6,0x13,0x91,0x23,0x8b,0x99,0x04,0xec,0x73,0x7e,0x88,0x1e,0x0f,0x38,0xa6,0xd3,0x21,0xb7,0x22,0x70,0xf9,0xfd,0x28,0x65,0xda,0xa6,0x96,0x04,0x7c,0x62,0xb2,0x94,0xc9,0xe1,0x08,0xb8,0x1b,0xca,0xc7,0x07,0x1b,0x7f,0xc7,0x07,0xfd,0x3a,0x6e,0xb3,0x70,0x0b,0x29,0xa2,0xe4,0x9e,0x78,0xea,0x9a
.byte 0xa8,0xe4,0x87,0xe6,0x6f,0x03,0x7c,0x88,0x45,0xf4,0x92,0x11,0xa8,0xfc,0x3c,0xae,0x51,0x66,0x82,0x59,0xb1,0xa8,0x98,0xeb,0x9a,0xb6,0x63,0x9c,0xa5,0x5e,0x10,0xf5,0x63,0x1e,0xa8,0x16,0xbf,0x8d,0xc8,0xbb,0xf7,0xcb,0xd9,0xc1,0x5d,0x2e,0x0e,0x4e,0x65,0x3c,0x20,0x77,0xe7,0x85,0xfe,0x7d,0x84,0xbe,0x1d,0x4d,0x00,0x80,0xc4,0x58
.byte 0x73,0x46,0x3e,0xc3,0x35,0xef,0x92,0xbb,0x8b,0xde,0x95,0xd9,0xf9,0x8a,0x3b,0x2d,0x59,0xab,0xd0,0x08,0x84,0x76,0x81,0xcd,0x5b,0xa0,0x98,0xf9,0xd6,0x12,0xc5,0x8e,0x91,0x18,0xfd,0x35,0x90,0x68,0x7d,0x30,0x5f,0xe9,0xdd,0x3a,0xe6,0xd3,0x94,0xdb,0xa7,0xdb,0xe7,0xb9,0x79,0xfb,0x2a,0x16,0xa3,0x8d,0x0b,0xd6,0x0d,0xb3,0xbf,0x79
.byte 0x51,0x26,0x9b,0x56,0x74,0x04,0x8a,0x20,0x58,0x2c,0xb3,0x60,0xdd,0x1d,0xcb,0x44,0x7f,0x17,0x7a,0x3f,0xe1,0x98,0x73,0xaf,0x21,0x06,0x6f,0x2f,0xbd,0x67,0xc1,0xcb,0x61,0x18,0x87,0xda,0xf2,0xab,0xe6,0xa6,0xac,0xf4,0x81,0x06,0x40,0x5a,0xb7,0x98,0x96,0x1a,0xa7,0x4b,0x0e,0x16,0x9a,0x70,0x0f,0x9c,0x2b,0x22,0xbf,0x09,0x3b,0xf3
.byte 0x49,0xde,0x71,0x07,0xc4,0xa3,0x9a,0x68,0x66,0x56,0x5b,0xad,0x53,0x4c,0xf0,0x03,0xd6,0x25,0x7f,0xbe,0xd1,0x96,0x29,0xe3,0x09,0x8c,0xcc,0xae,0x35,0x2b,0x62,0xfe,0x9f,0x8f,0x0f,0x1a,0x8d,0x91,0x0c,0xc0,0xbb,0xf1,0x85,0xaa,0xf1,0x86,0x9b,0x99,0x7f,0xad,0xbc,0xfe,0xfa,0x33,0xb3,0x59,0x42,0x31,0x83,0x53,0x50,0x07,0xb0,0x61
.byte 0x78,0x38,0x1e,0x4f,0x1f,0xa9,0x32,0x92,0xec,0x2b,0xa6,0xfb,0xf0,0x9b,0x73,0x06,0x45,0x20,0xc3,0x34,0x50,0x73,0xbd,0xdf,0x61,0xb4,0xd3,0x6b,0xde,0x63,0xc4,0xb4,0xbc,0xcf,0x64,0x1d,0xcc,0xf8,0xa0,0x3f,0x42,0x2c,0x06,0xa2,0x2a,0xbd,0xc8,0xc5,0xf6,0xf5,0xdd,0x27,0x0b,0xf7,0x00,0xf6,0x50,0xcf,0x96,0x2b,0x9a,0xf7,0xbb,0x82
.byte 0x71,0xc2,0x95,0x7f,0x2f,0xcf,0xfb,0xb3,0x1d,0x0e,0xf3,0xf6,0x6d,0x77,0x63,0x9f,0x33,0x8a,0xce,0x91,0x39,0x2a,0x08,0x42,0x2a,0x0b,0xfe,0xee,0xf7,0x5e,0x1c,0x97,0x43,0x0a,0x3f,0xbc,0x23,0x20,0xc5,0x59,0xe5,0x84,0xec,0x2f,0xb1,0x1b,0x23,0x4b,0x8b,0xa1,0x56,0x6a,0xd3,0x77,0x09,0xef,0xbc,0x70,0xf9,0x89,0x1d,0x7c,0xd2,0x2a
.byte 0xfe,0x2f,0x94,0x0a,0x22,0x2e,0x99,0x57,0x3f,0xe5,0x7c,0xa3,0xeb,0xd3,0x90,0x30,0xce,0x1c,0x94,0xc6,0xf6,0xd1,0x58,0x19,0xdf,0x6c,0xfa,0x3e,0xe5,0x4d,0x5f,0x42,0xb3,0xe5,0x06,0xe3,0xdd,0x65,0xb6,0x35,0x7c,0x9f,0x50,0x6a,0xa1,0xab,0x95,0xab,0x3b,0x6d,0x87,0x07,0xaf,0x4f,0x4c,0xcc,0xd8,0x4d,0xde,0xb8,0xc6,0x0b,0xa0,0x1c
.byte 0x7b,0xc5,0xda,0x29,0x92,0x8b,0x54,0x37,0xec,0xbf,0xbe,0xf6,0x99,0x64,0x61,0xce,0xdd,0xdd,0x20,0x97,0x31,0xc3,0x82,0x87,0x86,0x1e,0x6d,0xde,0x6b,0x1b,0x3b,0x82,0xf5,0x40,0xbe,0x63,0x2f,0x03,0x04,0x71,0x2b,0x04,0x78,0x19,0xe0,0xc1,0x90,0xaf,0x52,0xb7,0xb8,0xc3,0xa8,0xa4,0x61,0x88,0xb4,0xf9,0xb5,0xd0,0xfa,0xe6,0x16,0x39
.byte 0x1b,0xfc,0x9c,0xcc,0x9b,0x67,0x58,0x84,0x5d,0x21,0x82,0x06,0x77,0xc8,0xe5,0xa2,0xaa,0x37,0xc8,0x83,0xf2,0x59,0x85,0x6f,0xb4,0x13,0x8d,0xe8,0x57,0xe6,0xe6,0x83,0x10,0x4e,0xca,0x4e,0x0e,0xd9,0x15,0x58,0x05,0xaa,0xb0,0x61,0xd1,0xfe,0x19,0xc1,0x2e,0xd8,0x32,0x9e,0x19,0xf5,0x30,0x35,0x2b,0x4a,0x4b,0x4e,0xb8,0xaf,0xc5,0x4d
.byte 0x48,0x9e,0x66,0xd7,0xb6,0xd3,0xd8,0x77,0x12,0x0d,0x90,0x48,0x5b,0xee,0x7d,0xb2,0xcc,0x48,0x9a,0xe3,0x0a,0x1f,0x3a,0xf5,0x4f,0x3d,0x40,0x38,0x14,0x20,0x7c,0x70,0x20,0x2a,0xea,0x55,0x97,0x45,0xca,0x7d,0x26,0xd4,0x00,0x67,0xeb,0x2c,0x92,0x9b,0xb1,0x1e,0x79,0xb0,0x57,0x68,0x2b,0x42,0x46,0x26,0x91,0x96,0xc8,0xac,0x2f,0x28
.byte 0x74,0x1d,0xf9,0xfa,0x06,0xd4,0x64,0xba,0xe6,0x07,0xae,0x11,0x78,0x75,0x3b,0xc8,0x2f,0x10,0xc6,0xe2,0x93,0x27,0x6d,0x71,0x7a,0x17,0x77,0x45,0xd7,0xe2,0x91,0x6b,0xaf,0xdf,0x5f,0x47,0x56,0xc0,0xb9,0x09,0x22,0x44,0x43,0x0c,0xa7,0x6b,0xc2,0x05,0x50,0x5a,0xb9,0x2d,0x86,0xea,0x99,0x96,0xd5,0x4d,0x90,0x4e,0x7c,0xc1,0x92,0xbb
.byte 0xb6,0x06,0xe9,0xaf,0x38,0x6e,0x00,0xe9,0x19,0x4b,0x2d,0x2a,0x17,0x5f,0xb5,0xc8,0xec,0x65,0xb6,0x6d,0x67,0x42,0x79,0x92,0x13,0x17,0x76,0xa5,0x4e,0x3a,0x66,0x13,0x58,0xcf,0xa7,0x4b,0xb9,0x8e,0x84,0x66,0xb8,0x4b,0x66,0xd3,0x87,0x6a,0x65,0xd4,0x0a,0x97,0xe8,0x15,0x32,0x15,0xd4,0x2e,0x9a,0x80,0x40,0xfc,0x02,0x6d,0x4f,0x9e
.byte 0x68,0x3f,0x18,0x61,0x70,0x38,0xb7,0x5a,0xda,0xe1,0x74,0xdd,0x79,0x71,0x95,0x4b,0x50,0x19,0x0c,0x93,0xc9,0x1d,0x02,0x66,0xa2,0x35,0x88,0x91,0x9e,0x4b,0x62,0x5f,0xfe,0x65,0x09,0xf7,0x71,0x98,0xa3,0xcd,0xe1,0x2b,0xcf,0x2e,0x5f,0x38,0x41,0x47,0x1b,0x94,0x61,0x5d,0xce,0xbc,0x4b,0x69,0x70,0x7e,0xe7,0x74,0x8a,0x69,0x99,0xe8
.byte 0x58,0xda,0xd4,0xb4,0xae,0x3c,0xae,0xa0,0x78,0xed,0x72,0x51,0xb7,0xc1,0x95,0x20,0x43,0x34,0x77,0x12,0xa2,0xc5,0xe9,0xad,0xb4,0x6d,0x15,0x0d,0x3c,0x1b,0x2e,0x45,0x42,0xd6,0x7a,0x4f,0xe9,0x0e,0xe3,0x70,0xbd,0xe8,0x10,0x31,0xa9,0x09,0xc7,0x32,0x0c,0xcb,0x3e,0x54,0x6d,0x52,0xc2,0xed,0x57,0xbf,0xd1,0xbb,0xfe,0xd8,0x34,0x08
.byte 0x40,0xc1,0xb8,0x86,0xf7,0x0c,0xa8,0x3c,0x11,0xbf,0x96,0xc2,0x86,0x64,0x99,0x27,0x2a,0x68,0x3b,0x29,0xca,0xc2,0xd6,0x59,0xf7,0x77,0x66,0x91,0x26,0x96,0x87,0x84,0xf1,0x01,0xe4,0x04,0x82,0xd4,0xf0,0xe5,0x72,0x40,0x3a,0x5b,0x0b,0x65,0xa1,0x78,0x91,0x8a,0x7e,0x16,0x82,0x3c,0x00,0x07,0x19,0x14,0x3d,0x01,0xc6,0xa9,0x62,0x83
.byte 0x65,0x6a,0x66,0x02,0x6c,0xa9,0x77,0xaa,0x91,0xe1,0xbc,0x85,0x73,0xad,0xeb,0xca,0x01,0x2f,0x40,0xeb,0x14,0xa5,0x3f,0x78,0xec,0x90,0x39,0xab,0xc2,0x9d,0xce,0x55,0xf2,0xaf,0xbc,0x45,0x56,0x92,0x18,0x2b,0x74,0x15,0x7d,0xbd,0x77,0xdc,0xa3,0x56,0x8f,0xa5,0xf1,0xe4,0x8a,0xb4,0xbd,0x8b,0xa9,0x73,0x23,0x93,0xe3,0x84,0x1a,0x15
.byte 0xae,0x28,0x8d,0x9e,0xca,0x2d,0xd9,0xfd,0x40,0xd0,0x92,0x2f,0x51,0x76,0xde,0x59,0xb7,0xc8,0x88,0x16,0xc1,0x7c,0xb7,0x6f,0x07,0x95,0x53,0x38,0xf8,0x42,0xea,0x80,0x0a,0xd7,0x43,0xa2,0xbc,0xd1,0x39,0xf7,0x99,0xd5,0xb9,0x17,0x8d,0xbe,0x8f,0x6f,0x5b,0x66,0x52,0x8e,0x28,0xfd,0x21,0x4f,0x16,0xef,0x83,0x83,0x62,0x50,0x6c,0x63
.byte 0xeb,0x27,0xf5,0x9c,0x59,0xe6,0xba,0xae,0xf0,0xcf,0xba,0xad,0xcc,0x04,0xba,0x7b,0x11,0x10,0xfb,0xc3,0x97,0x68,0x3c,0xff,0x9c,0x46,0x16,0x75,0x06,0x47,0x52,0x55,0x40,0x8a,0x2f,0xb6,0x88,0xc3,0x6f,0xef,0xce,0xc5,0x38,0x98,0xf8,0x65,0x64,0x5c,0xeb,0xa4,0x86,0x90,0x83,0xf9,0xd1,0xc5,0x0b,0x02,0x9c,0x76,0xe0,0x0a,0xc1,0x48
.byte 0x1d,0x2b,0x6a,0x40,0x24,0xdf,0x67,0x6c,0xb1,0xf8,0x86,0x5c,0xc3,0x5d,0x8d,0xb2,0x68,0x54,0x76,0x42,0x77,0x71,0xdc,0x72,0xed,0x00,0xa0,0xc7,0x30,0x86,0xae,0x0e,0x2e,0xa9,0x39,0x19,0x02,0xb3,0x21,0xe6,0xd4,0xab,0x5a,0x1b,0x4e,0x8a,0x2f,0x3f,0x09,0xdf,0x4e,0x82,0x79,0xa5,0x98,0x94,0x1c,0xb8,0xb6,0xa1,0x25,0x86,0x5c,0xdd
.byte 0x4e,0x71,0x4b,0x6b,0x5a,0x24,0x7b,0x32,0x07,0x7e,0xcc,0xad,0x26,0x3c,0x85,0xfd,0x2a,0x7e,0x99,0x5a,0xa7,0x5f,0x51,0x23,0xa1,0x19,0x33,0x58,0xd9,0xbd,0x37,0x9d,0x0f,0xf0,0x9b,0xc7,0xb8,0xdf,0x35,0x32,0xe6,0xce,0xac,0x93,0x1e,0xef,0xa6,0x83,0x80,0x10,0xed,0x5e,0x86,0x7a,0xda,0x85,0x18,0xbd,0x1c,0x9e,0x7d,0x25,0x0d,0xbc
.byte 0x7d,0x08,0xa4,0xaf,0xee,0x2b,0xc5,0xd4,0x38,0xe0,0xa9,0xd3,0x8e,0x28,0x36,0x2e,0xdc,0x2e,0x0d,0xe0,0x62,0xcb,0xd1,0x78,0xff,0x22,0xa0,0xbd,0x36,0xed,0x44,0x9e,0xdf,0x1f,0xca,0x07,0xbc,0x04,0x00,0x0d,0xda,0x56,0x9d,0x31,0xcb,0xc4,0x5a,0x05,0x88,0x82,0xa4,0x2e,0xe0,0x09,0xa1,0x0d,0x68,0x02,0x76,0x26,0x03,0xc4,0x8b,0xca
.byte 0x86,0xfe,0x26,0x07,0x17,0xc4,0xee,0x93,0x67,0x4a,0xa8,0x84,0xa4,0x44,0x5c,0xe3,0x8b,0x02,0x59,0xba,0x7e,0x7b,0x19,0x1a,0x42,0xf9,0x6f,0x78,0xcb,0x6b,0xf2,0xd6,0x4b,0xbe,0x7a,0xaa,0x6e,0x9a,0x6c,0x86,0xf4,0xf1,0xb3,0x4a,0xe9,0x7b,0xe5,0x36,0x75,0x02,0xc4,0x6f,0xfb,0xe6,0xbf,0x0d,0x2a,0xed,0x5e,0x86,0xf5,0x8a,0x2c,0xed
.byte 0x8c,0x83,0xd4,0xa4,0x52,0xe5,0x08,0xe5,0x4a,0xac,0xa0,0xa7,0x17,0x91,0x9e,0x48,0x59,0x94,0x59,0x60,0xac,0x79,0x62,0xcb,0xd0,0xe6,0x72,0xd2,0xca,0xd1,0x05,0xc7,0x5f,0x31,0xd0,0x8d,0xe8,0x55,0x98,0x8c,0xd2,0xc6,0x4a,0xf5,0x2a,0x5d,0xc9,0x2d,0x16,0x06,0xe1,0x6d,0xa8,0xf0,0xc4,0x4d,0x41,0x33,0x3d,0xc4,0xbf,0xba,0xc6,0xf1
.byte 0xc4,0x92,0x17,0xff,0xa8,0x3f,0x2d,0xf1,0x90,0x2a,0xae,0xf5,0x64,0x2a,0xa5,0x08,0xac,0xbe,0x48,0x6a,0x27,0x05,0x91,0x33,0x7b,0x6d,0x0b,0x58,0xca,0x9b,0x29,0xf1,0xa8,0x18,0x1a,0xe4,0x9a,0xcc,0xbd,0x2a,0x09,0x15,0xe3,0x72,0xdc,0x80,0x60,0x8d,0x4a,0xac,0x3e,0x35,0xc4,0x94,0x7e,0xc8,0x78,0x43,0x9b,0xfc,0xe5,0xe7,0x57,0x83
.byte 0x21,0x49,0x74,0x9f,0x9c,0x10,0x77,0x3b,0xda,0x11,0xe8,0x13,0x88,0x71,0xb2,0xa5,0xf1,0xa8,0x6c,0x19,0xee,0xc6,0x8a,0x96,0xe2,0x34,0xec,0xbc,0x4c,0x7e,0x72,0xdc,0xde,0xbf,0x09,0x0a,0x1e,0xce,0xbc,0x10,0xbe,0xfd,0x8d,0x0c,0x5c,0x40,0x4f,0x30,0x82,0xe3,0x99,0x72,0x91,0x6f,0xc8,0x3c,0x1c,0xe2,0xd3,0xae,0xbf,0x09,0x3a,0xec
.byte 0x28,0x81,0x10,0x80,0xf6,0x2e,0xb9,0x29,0xde,0x00,0x2c,0xf6,0xd9,0x03,0x47,0xea,0x0f,0x3c,0x02,0x92,0x80,0x50,0x76,0x2b,0x60,0x0e,0x15,0xbd,0x69,0x10,0x7b,0xce,0xbf,0x40,0x15,0xd3,0xd9,0x4c,0xd2,0x6a,0x6e,0x10,0x18,0x00,0x34,0x55,0x8d,0x66,0xaf,0xf7,0x14,0x12,0xe8,0x67,0x4d,0xe7,0xfe,0x4d,0xc1,0xc5,0x05,0x6f,0xcf,0x16
.byte 0x1b,0x65,0x32,0xab,0x89,0x86,0x3e,0xe5,0x3e,0xba,0x8a,0xc1,0x5e,0x41,0xbb,0x23,0x76,0x8c,0xea,0x77,0x6e,0x1f,0x3c,0x4c,0xe4,0x98,0x9c,0xe5,0x73,0x0c,0x08,0x48,0x83,0xb6,0x24,0x24,0xe6,0xac,0xc2,0x4e,0xe1,0x67,0x33,0x01,0x33,0x85,0x59,0x34,0x35,0xd7,0xdd,0xc4,0x04,0xff,0x53,0x78,0xd4,0xb5,0xe9,0x65,0x88,0xfc,0x41,0x6f
.byte 0x06,0xfb,0xfa,0x58,0x67,0xa1,0x1d,0x78,0xd9,0xad,0xf2,0x92,0x34,0x87,0x8c,0xd2,0x96,0x95,0x1d,0xc7,0x52,0xcb,0x64,0x5f,0xb2,0xe7,0x3c,0x31,0xe0,0x61,0xbb,0xab,0x34,0xef,0xd4,0x4f,0xe6,0x0b,0x3e,0x58,0x53,0x30,0x92,0xba,0x8c,0x72,0x88,0xb5,0xf5,0x8d,0xc2,0xa2,0xdf,0x86,0x7f,0x15,0xeb,0x8f,0xc1,0x62,0xe0,0x56,0x92,0x00
.byte 0xea,0xf7,0x27,0x73,0xac,0x9f,0x1d,0x13,0xcd,0x33,0xb3,0xd5,0x31,0x29,0x42,0x1e,0x28,0xc2,0xfd,0xd1,0xec,0xb0,0x32,0x83,0xec,0x22,0xda,0xae,0xab,0x7b,0x4f,0x76,0xa9,0xa0,0x0f,0xc3,0x39,0xb1,0xfe,0x63,0x2e,0x72,0xb9,0x41,0x03,0xfd,0x7a,0x33,0xbd,0x1e,0x0e,0xe1,0xd3,0x2b,0xbc,0x68,0x8c,0xd9,0x12,0x02,0xf7,0x9e,0x7f,0xc8
.byte 0x30,0xa2,0x60,0xc0,0x85,0x2a,0xae,0xfd,0xed,0xd0,0x88,0x66,0xef,0xfc,0xe8,0xaf,0x41,0xda,0xd1,0x99,0x8a,0x4e,0x7d,0xaa,0xf5,0x9a,0x56,0xac,0x18,0x14,0xf7,0x6e,0xea,0xad,0xcd,0xed,0x19,0xa6,0x28,0x41,0x2b,0x1d,0xcb,0xa5,0x84,0xfd,0x34,0x84,0x2a,0x05,0x8c,0x74,0x6a,0x43,0x34,0x28,0xf4,0x35,0x60,0x91,0x32,0xd2,0x66,0xc6
.byte 0x3b,0xaa,0xde,0x8a,0xdc,0x73,0xab,0x98,0xeb,0xeb,0xe9,0x97,0xd6,0xe2,0xf4,0xbf,0xbf,0x45,0x62,0x75,0xb2,0xd3,0xad,0x38,0x62,0xdd,0x9b,0x63,0xe1,0x27,0x6a,0x25,0xbf,0xe9,0x26,0xc1,0x9f,0x0e,0x92,0xeb,0xb9,0xdb,0x72,0xea,0xcc,0x11,0x4f,0x4d,0x2a,0x2a,0x7f,0xfd,0xf5,0x2d,0xdc,0x53,0xdf,0x56,0xcf,0x3e,0xf6,0x48,0x1b,0x5d
.byte 0x51,0xb8,0x9d,0xc6,0xe3,0xd5,0xcb,0x0d,0x0b,0xb9,0x6e,0x34,0x07,0x90,0xdc,0xe7,0xd1,0x61,0x85,0x6b,0x58,0xd6,0xa2,0x58,0x5f,0xf4,0x6c,0xb9,0x3a,0x11,0x1e,0x2a,0x03,0x80,0x8d,0xc8,0x8c,0x24,0xd1,0xa2,0x53,0x63,0x50,0x66,0x01,0xed,0x0e,0xd3,0xfb,0x57,0x59,0x31,0xeb,0x2e,0x37,0xff,0xc0,0x28,0xfc,0xbb,0x6f,0x61,0xfd,0x69
.byte 0x35,0x94,0xa9,0xed,0x5e,0xca,0xa6,0x37,0x5a,0x01,0xd9,0xcf,0xe4,0x91,0xb3,0x2e,0x2a,0x97,0x46,0x46,0x26,0xd9,0x85,0x01,0xfa,0xcb,0x93,0xdf,0xb4,0x2a,0x86,0x81,0x93,0x2f,0x1b,0x56,0x3f,0xe5,0xd9,0x90,0x2e,0x2b,0xe4,0xc8,0x76,0x96,0x1b,0x91,0x9c,0x6a,0x17,0x42,0x1b,0x63,0x74,0x55,0xbc,0xe0,0xed,0x2e,0x6c,0xd0,0x61,0x37
.byte 0x5b,0xac,0x66,0x2e,0x2b,0x3d,0x47,0xa9,0x7a,0x7d,0xa6,0xfa,0xb4,0xa8,0x18,0x4b,0x65,0x31,0xbb,0xe3,0xe6,0x0e,0x76,0x91,0xe2,0x54,0xfd,0x4a,0xa5,0x35,0x70,0xe4,0xd0,0xbd,0x59,0x75,0xc8,0xca,0x46,0x58,0xf4,0xe5,0x57,0xd2,0x12,0x93,0x14,0x78,0x5f,0xe6,0xee,0x96,0x6e,0xe9,0xf6,0x10,0x41,0x61,0x38,0xf8,0x1e,0x5b,0x69,0x2c
.byte 0xc1,0x54,0x8e,0x12,0x23,0xa7,0xc0,0x42,0x18,0x3e,0x4c,0x7b,0x90,0x96,0x03,0x3e,0x4d,0x5c,0xac,0x4d,0xe6,0xed,0xcd,0xe2,0xf5,0x35,0x0c,0xde,0xf7,0x70,0x07,0xa9,0xb1,0xe8,0x0c,0xf3,0x64,0xec,0xf5,0x18,0x0f,0x5a,0x70,0x03,0xcf,0x38,0xe9,0x38,0x83,0x13,0xaa,0x9c,0x6b,0xcd,0x5f,0x4e,0x03,0x04,0x33,0x0c,0x27,0x8c,0x5e,0x3e
.byte 0x69,0x49,0xc7,0xc3,0x5f,0x1c,0x5f,0x78,0x55,0x2a,0x40,0xec,0xe9,0x80,0x66,0xb9,0x05,0x60,0xb6,0xa2,0xe1,0x29,0x36,0xe3,0xb7,0x87,0x09,0x3c,0x2f,0x42,0x12,0x53,0xf0,0x6f,0x4b,0xa3,0x05,0x35,0x8b,0xcd,0x18,0xbe,0xe7,0xa2,0xce,0xda,0xbc,0x83,0x0f,0x68,0xc0,0xdc,0xbb,0xa4,0x4a,0x7b,0xae,0x74,0x1f,0xe6,0x13,0x82,0x2f,0xa1
.byte 0x88,0x4f,0x64,0x7e,0x16,0xad,0xbb,0x0d,0x41,0x1c,0xb8,0x3b,0xba,0xc2,0x7a,0xed,0x05,0x54,0x85,0x41,0xf0,0xeb,0xa4,0x0c,0xb7,0x51,0xf5,0x9c,0x36,0x0e,0xea,0x13,0x03,0x91,0x9a,0x60,0x68,0xac,0xc3,0x34,0xc6,0xf1,0xdf,0xb3,0x0f,0x76,0x88,0x9a,0x62,0x01,0xf3,0x15,0xf0,0xaf,0xd7,0x5a,0x66,0x83,0xa8,0x31,0xa5,0x5f,0x97,0x87
.byte 0x10,0xe7,0xb9,0x4d,0xe5,0x87,0x64,0xb1,0x9d,0x9d,0x21,0xcb,0xab,0xeb,0x4b,0x3d,0x10,0x3d,0x9d,0x49,0xfe,0xc2,0x22,0x11,0x23,0x8a,0x0a,0x16,0x12,0xc5,0xed,0x24,0x16,0xbc,0x16,0xd3,0x03,0xa0,0x23,0xe1,0xa1,0x57,0x78,0x9d,0xb8,0x08,0xb9,0x41,0xeb,0xb9,0x8a,0xf6,0x1f,0x70,0xa1,0x99,0xe8,0x93,0x78,0x55,0x76,0xae,0x17,0x7a
.byte 0x87,0xb2,0x53,0xf2,0xe9,0xbb,0x4a,0x96,0x32,0x8d,0x59,0x23,0x86,0xb3,0xba,0xaa,0xa2,0x68,0x56,0x5d,0xc9,0x83,0x29,0xe8,0x24,0xf1,0xc4,0x02,0x87,0xcf,0x58,0xeb,0x08,0xaf,0xf1,0x00,0x56,0xa5,0xd6,0x97,0x34,0x49,0x9e,0x93,0x39,0x66,0xf9,0xd9,0xfc,0x0c,0x16,0x9b,0x1f,0xe4,0x7e,0xec,0x03,0x5e,0x53,0xdf,0x2f,0x55,0xa0,0x05
.byte 0x36,0x7f,0x4a,0x4e,0x48,0x76,0xe5,0x5f,0xeb,0xe3,0x00,0x3e,0x25,0x23,0x12,0x44,0x92,0x01,0x44,0xb7,0xb3,0x46,0xb2,0xe4,0xcc,0xcb,0xa3,0x53,0xcd,0x64,0x10,0x65,0xc7,0x6c,0x92,0x07,0x39,0xf8,0x4c,0x6d,0x2c,0x33,0xb5,0x98,0x1b,0x74,0x35,0xad,0x2a,0x35,0x6c,0x51,0x47,0xee,0x1d,0xb5,0x70,0x36,0x2f,0xd4,0x23,0xdc,0xf5,0x4a
.byte 0x66,0xa4,0x83,0x50,0xc5,0xb7,0x59,0x96,0x22,0xec,0x5d,0x33,0x7e,0x9d,0xcd,0xe6,0xd4,0x01,0x61,0xaa,0xb0,0x47,0x05,0x11,0x6b,0x27,0xae,0xd2,0xf1,0xe6,0x49,0xe0,0x95,0xa1,0xfd,0x76,0xa2,0xdb,0xa4,0x9d,0x02,0xe6,0x42,0xe0,0x2e,0x36,0x84,0x0f,0x31,0x1e,0xb9,0x8d,0x11,0xc0,0xb8,0xd5,0xcf,0xc8,0x0d,0x97,0xc0,0x5e,0x0b,0xf0
.byte 0x16,0xad,0xc0,0x9e,0x3e,0x38,0xd1,0xbf,0x47,0x77,0x9c,0xcd,0x6b,0xae,0x1c,0x8a,0x51,0x75,0xc4,0x74,0x78,0x5b,0x9d,0x16,0xec,0xc6,0x4b,0x1f,0x53,0xff,0x4e,0xb0,0x1b,0x03,0xdd,0xbf,0x32,0x32,0x55,0xe9,0xcc,0xe7,0xc0,0xde,0x01,0xbd,0x7d,0xb3,0x29,0xae,0xed,0xb8,0x5b,0xa0,0x96,0xc0,0x45,0xb2,0x5d,0xf7,0xa6,0x43,0xc7,0x56
.byte 0x4a,0xc0,0x16,0xbf,0x0e,0xf0,0x77,0x94,0xd0,0x52,0x7e,0xb3,0x45,0xd2,0x16,0x30,0x11,0xc0,0xd6,0xd3,0x61,0xfe,0xdb,0xed,0xa6,0x16,0x4f,0x88,0xce,0x17,0x64,0x02,0xa0,0xc1,0x42,0x47,0x19,0x0b,0xc6,0xea,0x9b,0xf1,0xf0,0xab,0x7c,0xd5,0xf9,0x73,0x9b,0xcc,0xc4,0xce,0x69,0xaf,0xc1,0x48,0xbc,0x13,0xe9,0xad,0xdc,0x6b,0x15,0xb7
.byte 0x3b,0x85,0x05,0x17,0x66,0x35,0x05,0xe6,0xf7,0x99,0xfd,0x04,0x0f,0xd3,0xbd,0xc5,0x0a,0x3f,0x7c,0x49,0x63,0xe5,0xe3,0xa7,0x7a,0x03,0xe3,0xb1,0x3c,0x7d,0x4b,0x04,0x2e,0x94,0x2d,0x9a,0x55,0x18,0xd1,0x7c,0xc5,0x06,0xbc,0xf2,0x68,0xa9,0x9a,0xd9,0xf5,0xb4,0x15,0x66,0x0a,0x8c,0x68,0xa3,0xb6,0x41,0xb1,0x57,0x55,0xac,0x5c,0x2a
.byte 0xff,0xb0,0x30,0x11,0x31,0x1f,0xe4,0x05,0x91,0xe3,0xf9,0x2d,0x9a,0xd6,0x2a,0x73,0xdf,0x34,0x1d,0xf0,0xbe,0x46,0x60,0xce,0xa7,0x81,0xf1,0x8b,0x52,0x42,0x1d,0xa7,0x97,0x8c,0x92,0xe2,0xe2,0x00,0x5a,0xce,0xc2,0x70,0x52,0x02,0xa4,0x35,0xb6,0xe8,0x3f,0x22,0x75,0x4e,0xf0,0xc8,0x08,0x54,0x1b,0x52,0x21,0xe2,0x26,0x11,0x92,0x98
.byte 0xb1,0x26,0x23,0x58,0xeb,0xb8,0x97,0xcd,0xb3,0x2d,0x9b,0x4b,0x6e,0xcf,0x28,0xd5,0x0f,0x12,0x89,0x1f,0x90,0x7c,0x96,0x98,0xee,0xc0,0x29,0xed,0x6d,0xcb,0xca,0x07,0x10,0xe0,0x23,0xe4,0x28,0x97,0x8e,0x47,0x46,0x4a,0xde,0x6c,0x3b,0xff,0x75,0xfc,0x38,0x78,0xe8,0x27,0xba,0x5e,0xd2,0x9a,0xa4,0xf6,0xcd,0xef,0xf4,0x74,0x61,0x8f
.byte 0x20,0x99,0x60,0x2a,0x97,0x42,0x34,0xa8,0x70,0x5d,0xe7,0xa6,0xc9,0x80,0xc8,0x15,0x11,0x5b,0xf0,0x50,0x5f,0x44,0xa2,0x01,0x63,0x32,0x11,0x89,0xaa,0x36,0x38,0xc4,0xba,0x08,0xbf,0x2a,0x9c,0x69,0x2b,0x84,0x2c,0x14,0x97,0x60,0xc3,0x5d,0x04,0xe3,0x9d,0xcb,0x9a,0xa2,0x15,0x3f,0xa6,0x28,0x24,0xde,0x00,0xee,0x1e,0x11,0x95,0xb4
.byte 0x12,0xb8,0xff,0x3e,0x31,0xf2,0xc4,0x06,0xf1,0x9c,0x44,0xc5,0x59,0xa5,0xf8,0xc0,0x33,0x59,0x97,0x2d,0x6d,0x97,0xdb,0x33,0xba,0x30,0xd2,0xa9,0xc2,0x1e,0xb6,0x8f,0x3d,0x83,0x4c,0x82,0x04,0xeb,0x50,0xdd,0x42,0x31,0x1d,0x3e,0x35,0xb4,0x32,0xaf,0x16,0x50,0xb3,0x05,0xbe,0x8a,0x80,0x14,0x8a,0x3f,0x2f,0x8d,0x70,0xc0,0x60,0xa6
.byte 0x5d,0x8e,0x38,0x94,0x47,0xab,0x1b,0xf6,0x9e,0x9e,0xf1,0x84,0xa5,0xdb,0xab,0x6a,0x71,0xc5,0x36,0x86,0xe0,0xb5,0x7e,0xd5,0x7f,0x1b,0xdb,0xa0,0x9d,0x1a,0xe3,0x84,0xc9,0x59,0xac,0x24,0x2b,0xa5,0x18,0x70,0xf9,0xf0,0xe8,0x2c,0xad,0x54,0x62,0x99,0x2a,0x56,0xbf,0x76,0x89,0x0e,0x93,0x55,0xea,0x83,0xc7,0xa1,0x2d,0x6c,0x4d,0x00
.byte 0x9f,0xa9,0x9d,0x97,0x4e,0x76,0x20,0x9d,0x09,0x24,0x97,0xfe,0xa6,0xd6,0xda,0x66,0x39,0x27,0x0a,0x05,0x52,0xee,0xc8,0x70,0x0a,0x65,0xea,0x0f,0xa3,0xe0,0x10,0xbb,0xe4,0x87,0xb1,0x18,0x75,0x72,0xe7,0x6b,0xd6,0x88,0x91,0x6c,0xd0,0x7c,0xda,0x10,0xdf,0xd6,0xc7,0xcd,0x33,0x7d,0x28,0x9d,0x6d,0x2c,0xc2,0x59,0xc3,0xf5,0xb4,0x55
.byte 0xe2,0x8b,0x65,0x92,0x4b,0x49,0x62,0x3a,0x49,0x00,0x62,0x79,0x9c,0xbd,0x99,0x7a,0x7f,0x71,0x19,0x90,0x77,0x56,0x94,0x2d,0xce,0x93,0x69,0xa6,0x56,0xde,0x75,0xdb,0x43,0x0f,0xae,0x1a,0x93,0x79,0x6c,0x2c,0x03,0xe3,0xfc,0x7d,0x90,0xd6,0x10,0xca,0x97,0x53,0x63,0x9e,0x6c,0x13,0xcf,0x4b,0x1a,0x76,0xf4,0x5b,0x57,0x27,0x20,0x76
.byte 0xe5,0xee,0xfc,0x5d,0x12,0x67,0x88,0x37,0xf4,0xb5,0xf5,0x39,0x23,0x90,0xf3,0x31,0xad,0x1d,0xc3,0x98,0xaf,0x49,0x64,0x2a,0x75,0x4d,0x34,0x8c,0xf1,0x50,0x82,0xda,0xe9,0x17,0x63,0xbb,0xe8,0x54,0x36,0xd4,0x38,0x57,0x4c,0xe3,0xfd,0x11,0x02,0xbc,0xc7,0xb6,0x65,0xe2,0xd7,0x84,0x38,0xbf,0xf1,0xea,0xac,0x23,0x89,0xa5,0x3d,0xa8
.byte 0x4d,0x5b,0x97,0x01,0x23,0xcd,0x8d,0xfc,0x28,0xc9,0xc2,0x06,0x06,0x6c,0x0d,0x07,0x0f,0x7f,0x7d,0xcf,0xcf,0x67,0xc7,0xe0,0xe1,0x4d,0xe8,0xee,0x6d,0x9a,0x1c,0x92,0xa6,0x4f,0xaf,0x4c,0xc3,0xa0,0xe7,0x73,0xa2,0x7b,0x4a,0x43,0xc2,0x94,0x6c,0xc6,0xb0,0x87,0x36,0xa0,0x3e,0x31,0x6e,0x77,0xc2,0xc1,0x90,0xb1,0x78,0x2c,0x52,0x44
.byte 0x9f,0xaf,0xc8,0x2e,0xca,0x90,0x60,0xc7,0xf8,0xa8,0xdd,0x91,0x42,0x1f,0x13,0x97,0x10,0x27,0xa1,0x74,0x51,0x71,0xeb,0xef,0xa6,0x83,0x7c,0xa0,0xd7,0x5f,0x59,0x54,0xf3,0xff,0xa2,0xfb,0x58,0xbc,0xbf,0x02,0xa8,0x44,0xca,0xf6,0x61,0xda,0x47,0xaa,0x02,0x3b,0xb4,0x2f,0xc4,0x12,0xbd,0xd7,0x24,0x56,0xe2,0x6e,0x51,0x34,0xdb,0x1c
.byte 0x3d,0xd1,0xc5,0x90,0xfc,0xfd,0xe0,0xf0,0x99,0x3c,0x75,0x58,0xeb,0xb0,0xb2,0x97,0x60,0x81,0xd5,0x79,0xce,0x20,0xd2,0x20,0x50,0x46,0x20,0x96,0x98,0xdc,0x38,0x7f,0x38,0x80,0x91,0xf1,0xa1,0x26,0xa0,0xc5,0x14,0x96,0xe0,0x1f,0x96,0xf5,0x91,0x09,0xac,0xab,0xad,0x5e,0x96,0xa3,0xcb,0xfb,0x4c,0xb9,0x5f,0x30,0x0a,0x24,0x1f,0x65
.byte 0x23,0x23,0x58,0x02,0xaa,0xb0,0x2c,0xe8,0xca,0xf1,0x0d,0x7e,0xe2,0xc5,0xee,0x1a,0x19,0x94,0x48,0xeb,0xee,0x71,0xbc,0x67,0xf2,0x39,0x1e,0xff,0xb1,0x35,0x60,0x8d,0xb4,0x97,0x06,0x89,0xa6,0xca,0xee,0xb8,0x5c,0xdf,0x3e,0x52,0x5c,0xa4,0x91,0x08,0x66,0xdf,0x20,0xbf,0xbe,0xfa,0xe3,0x58,0xd0,0x47,0xeb,0x3f,0xa1,0xfd,0x07,0x68
.byte 0x35,0x7d,0x5c,0x67,0x13,0x7e,0x28,0x51,0x69,0x20,0x60,0x20,0x9c,0xf3,0x3a,0x23,0x8c,0x7c,0x95,0x0e,0x18,0x43,0xdf,0xe8,0xb1,0x71,0x4a,0x58,0x71,0x22,0x04,0xa4,0xad,0xab,0x77,0xa3,0xe5,0x01,0xb4,0x4a,0x4f,0x2f,0x6c,0x74,0x67,0x48,0x22,0x15,0xb0,0x10,0x6f,0xc4,0x95,0x11,0x09,0xa6,0x1a,0x2e,0x40,0x58,0xcb,0x5e,0x37,0xce
.byte 0xbb,0xd3,0x5e,0xc8,0xcb,0xde,0x4e,0x1e,0x7a,0xb8,0xb4,0x27,0x45,0xb7,0x63,0xce,0x92,0xf8,0x31,0xd4,0xaf,0x3a,0x91,0x32,0x5f,0x27,0x67,0x94,0xf2,0x76,0xb7,0xd5,0x92,0xd2,0xe8,0x75,0xce,0x58,0x84,0xbb,0xf7,0xbb,0xa2,0x15,0x5a,0xd1,0x6e,0x83,0x5f,0x47,0xdb,0x73,0xdb,0x04,0xcd,0x55,0x15,0x6e,0x42,0xcf,0x8b,0x04,0x1b,0xfa
.byte 0x82,0xf9,0xb5,0x9b,0xa0,0x2b,0x6b,0x7d,0x31,0x12,0x63,0x2e,0x27,0xdb,0x87,0x88,0x95,0xb8,0xf5,0x16,0xec,0x16,0xac,0xf1,0xa4,0x7f,0x51,0x99,0xc5,0x8a,0xf2,0x5c,0xbe,0xe2,0xe9,0xe2,0x03,0x76,0xfc,0xdd,0xaf,0x69,0x61,0x92,0xef,0xf7,0x07,0x17,0x3f,0x48,0xfa,0x04,0x8e,0xb4,0x56,0xa1,0x07,0xec,0x98,0xad,0x72,0xd5,0x91,0x52
.byte 0x4b,0xe4,0x0a,0x51,0x10,0x4f,0xad,0x99,0xfd,0x89,0xa1,0x19,0xe3,0x52,0x15,0xc8,0x8c,0x10,0xc6,0x9f,0x94,0x5b,0xf0,0xbd,0x67,0x20,0xcc,0xa1,0x9c,0x06,0x8c,0xa6,0x47,0x5d,0x1d,0x22,0x0b,0xa3,0x2c,0x59,0x18,0xfb,0x46,0xf2,0xa3,0x6a,0x3c,0x08,0xeb,0x42,0xad,0x3a,0x01,0xeb,0xfd,0x9b,0x54,0x4e,0x6e,0x60,0xee,0x94,0x04,0x42
.byte 0x75,0x5e,0xdf,0x51,0x4f,0x92,0xac,0x2e,0x6d,0xaf,0x87,0x7f,0x0a,0xdc,0x7d,0x58,0x62,0xdb,0xc8,0x15,0x1f,0xef,0x8d,0xbf,0x9f,0x80,0xf9,0x3d,0x39,0x2c,0x63,0x94,0x36,0xf2,0xda,0xf5,0x63,0x5a,0x8e,0x1e,0x28,0x12,0xbc,0xa3,0x9e,0x31,0x34,0x11,0xca,0xd0,0xc0,0x67,0x58,0xcf,0xb6,0x1d,0x68,0xa4,0xae,0x2d,0x73,0x0d,0x7b,0x02
.byte 0xc6,0x01,0xc5,0xa8,0x22,0xf0,0x7a,0x97,0x97,0x93,0xbe,0x52,0xb9,0xa2,0xdd,0x49,0x33,0x1a,0xab,0xc1,0x6e,0xc5,0x7f,0x71,0xdc,0xbf,0x1e,0x28,0x3d,0xf6,0x50,0xe2,0x66,0x01,0x21,0xc5,0x42,0xf2,0x3e,0x4e,0x8b,0x8a,0x07,0xfc,0x42,0xeb,0x78,0x0f,0xd0,0x0f,0x2a,0x4e,0x41,0x7c,0xa5,0x49,0x7b,0x0f,0x88,0x49,0x51,0x7c,0x0f,0x5e
.byte 0xcd,0x9b,0x8b,0xc8,0x13,0xfd,0x16,0xfd,0xa4,0x77,0xf2,0x5b,0x02,0x02,0x38,0x5c,0xf0,0x5a,0x49,0xd8,0x80,0x48,0x10,0xa4,0x3c,0xcd,0x3b,0x6c,0x38,0x53,0x63,0xba,0xbf,0xb2,0x80,0x68,0x96,0x47,0x44,0xf3,0xa0,0xe3,0x85,0xe2,0x17,0xbb,0xfc,0x0f,0xa2,0x67,0x04,0x28,0x79,0x7f,0x05,0x84,0x5b,0x62,0x80,0x09,0x2c,0xb6,0x6f,0x76
.byte 0x18,0xba,0x83,0x39,0x82,0xa7,0x0b,0x63,0x34,0x87,0xa1,0xa1,0xa0,0xe1,0xda,0x0d,0x7b,0xe6,0xd7,0xcd,0xca,0x02,0x45,0x66,0xe5,0x30,0xc8,0xac,0x81,0xdf,0xfe,0x74,0xe5,0x45,0xd9,0x99,0x04,0xa6,0xcf,0x3c,0x10,0x73,0xfb,0xd7,0xe0,0xc0,0x44,0x54,0xda,0x9b,0x9a,0x64,0x90,0x6f,0x42,0x1a,0xda,0x65,0x24,0x3d,0xb6,0x70,0x8d,0xe1
.byte 0x33,0xf9,0xb2,0xda,0xa4,0x2e,0x7d,0x90,0x2b,0x14,0x16,0xd1,0x13,0xd4,0x1a,0xe6,0x25,0xa8,0x66,0x0b,0xed,0xed,0xa0,0x62,0x9c,0xb4,0x24,0x03,0x6f,0x36,0x7a,0x93,0x42,0xbc,0xf7,0x23,0x6b,0x0e,0xee,0xdf,0x80,0xd3,0xc1,0xc4,0x8e,0x3f,0xd9,0x1a,0x6f,0x37,0xc9,0x71,0xf4,0x3f,0x7e,0xa8,0x7d,0xbe,0x8d,0x53,0x11,0x35,0x16,0x0b
.byte 0x63,0xdb,0x99,0xa5,0x3b,0x17,0x7b,0x97,0xdb,0x81,0x36,0x43,0x33,0xde,0x31,0xc1,0xc8,0xb2,0x99,0x86,0xd0,0x2f,0x57,0x89,0x91,0xd7,0x3b,0x1f,0x5b,0xd5,0xb4,0x42,0x77,0x66,0x9a,0xaa,0x65,0x9d,0x5c,0x12,0xbf,0xeb,0xa4,0xb3,0xc8,0x4c,0xdb,0xf2,0x4c,0xe5,0xe8,0xb6,0xaa,0xc1,0xe2,0xd7,0xd2,0x14,0x03,0x27,0x04,0x0a,0xf9,0x54
.byte 0x07,0xcc,0x50,0xbb,0xd6,0xfc,0x68,0x01,0xc3,0x79,0xb2,0x0c,0x4c,0x8e,0x65,0x41,0x91,0x7d,0x91,0x33,0x64,0xfa,0xeb,0x1a,0xbc,0x08,0x29,0x14,0x61,0x08,0xc8,0xd4,0xbb,0x64,0xe7,0xb1,0x2d,0xe0,0x1d,0xc6,0xae,0x78,0x20,0x81,0x8f,0x8d,0x20,0xb7,0x9d,0x7e,0x55,0x6e,0xbe,0x39,0x72,0x6e,0xc9,0xd8,0x6c,0x5c,0xa6,0x4c,0x48,0x2b
.byte 0x4e,0x14,0x98,0x76,0x7b,0x6e,0x8b,0x1d,0x50,0xc8,0x30,0xa6,0x3a,0xe6,0xa4,0xf1,0x6c,0x67,0x7d,0x10,0x28,0x93,0x4d,0xe6,0x93,0x2c,0x1e,0xc1,0xbc,0x9a,0xff,0x21,0x00,0x66,0xeb,0x72,0xe1,0x57,0xe0,0x03,0x55,0x0f,0x56,0x27,0x36,0xbb,0x75,0x01,0x02,0xcd,0xad,0x6b,0xf2,0xa2,0xec,0x18,0x62,0xa3,0xd6,0x10,0x5e,0x2c,0xf6,0xa5
.byte 0xec,0x67,0xcc,0xfe,0xe8,0xa2,0x9e,0x0d,0xf0,0x11,0xf1,0x32,0xd7,0x4e,0x3a,0xbd,0xea,0xec,0xa9,0x72,0x98,0x82,0x00,0xa4,0x49,0xe2,0xa8,0xfc,0xf3,0x3c,0x3c,0x0e,0x2d,0x2c,0xc9,0xf8,0x72,0x04,0x67,0x4b,0x00,0xf9,0xd4,0x77,0x90,0x8e,0xf8,0x62,0xdc,0x23,0xc1,0x7a,0x2d,0xb3,0x40,0x47,0x7b,0x0b,0xac,0x5f,0x2a,0x67,0x84,0xed
.byte 0xf4,0x75,0x9c,0xf4,0x20,0x83,0xa8,0xed,0x3e,0x14,0x28,0xbb,0xc5,0xb1,0x1f,0x25,0x46,0x32,0xd3,0x9f,0x1b,0xa8,0x2d,0xf7,0x07,0x9c,0x82,0x25,0x25,0x5c,0x75,0x03,0x32,0xce,0x6a,0x51,0x60,0xde,0xf7,0x54,0x10,0x97,0xdf,0x28,0x19,0x59,0xe9,0x62,0x81,0xd1,0x20,0xbe,0x9a,0x2d,0xf4,0x42,0xb3,0x2b,0x7c,0x5e,0x83,0xfe,0xd6,0xfc
.byte 0xac,0xe5,0x5d,0x27,0xb0,0x50,0xee,0xca,0x12,0xcd,0x3d,0xe9,0x24,0x77,0xee,0x61,0xec,0xb7,0x0e,0xd1,0x10,0x9a,0xa7,0x7d,0x8a,0x77,0x9f,0xc9,0x70,0x02,0x02,0xbf,0xc7,0x9c,0xcb,0xc2,0xff,0x77,0xd2,0x7a,0x37,0x3d,0xb4,0xad,0xb8,0x4e,0xc3,0x87,0x1d,0x93,0x77,0xb4,0xab,0x7f,0x6c,0xca,0x48,0xfd,0x31,0x88,0x05,0x2d,0xc4,0xe6
.byte 0x97,0xe8,0xe7,0x39,0xab,0xe4,0xd5,0xd4,0xa8,0xc5,0x81,0xcc,0xe2,0xa3,0x48,0x49,0x9c,0x4e,0xb0,0x1c,0x80,0xbb,0xc3,0xfe,0xa2,0x04,0xcf,0xdd,0x01,0x26,0x25,0x78,0x65,0x51,0xb1,0x40,0x02,0x6e,0x58,0x90,0x59,0xad,0xe8,0x59,0xc3,0x1b,0x59,0xb1,0x34,0x38,0x32,0x66,0xd7,0x15,0xc3,0x50,0xe5,0xb1,0x54,0x23,0xd0,0xc7,0x92,0xa3
.byte 0xb3,0x66,0x07,0x49,0xc5,0xdf,0x46,0x06,0x16,0xb4,0xe1,0xca,0xb5,0x15,0xa4,0x77,0xf0,0x4a,0xba,0xfe,0xd9,0xd9,0x9b,0x11,0xdb,0x71,0xe6,0x73,0xc3,0x9a,0xaa,0x96,0xb6,0xb8,0x8f,0x2a,0xcf,0x90,0xad,0x4e,0x7c,0x3c,0xe1,0x67,0x4a,0x97,0x1a,0xce,0x7d,0x0b,0xa8,0xb3,0x6a,0xa2,0x18,0x45,0xcc,0xa7,0xe6,0x3f,0x5e,0xb4,0x51,0xc7
.byte 0xa7,0x78,0xc5,0x08,0x64,0xea,0x9d,0x1a,0x63,0x25,0x12,0x89,0xb3,0xde,0x3e,0x56,0x4a,0x9f,0x0f,0x6a,0x76,0xb0,0xa1,0xe2,0x47,0xb9,0x6a,0x2a,0xa8,0x80,0xcd,0x2a,0x30,0x75,0xd7,0x7c,0x07,0xfb,0xd3,0xf2,0xc9,0xf7,0x2a,0xb5,0x8d,0x99,0xf0,0xbd,0xbe,0xae,0x3a,0x54,0x22,0x5b,0xd9,0x21,0x3a,0x80,0xac,0x44,0xfb,0xe3,0x30,0xf5
.byte 0x22,0x07,0xc3,0xe6,0x4b,0xba,0x95,0x0f,0xd6,0x94,0x0f,0x2d,0x0c,0x65,0x92,0x18,0x9a,0xec,0xb3,0x0d,0x72,0x3b,0xb0,0x50,0xa1,0x6b,0x7f,0xc3,0x4d,0x5e,0x04,0x90,0x95,0x67,0xa5,0xa6,0xe6,0xb4,0xaa,0x00,0x4a,0x16,0x6b,0x0e,0xc9,0x67,0xad,0x73,0x39,0x93,0xf5,0xe0,0x4d,0xe1,0x92,0xd1,0xeb,0x3a,0x97,0xe5,0xb2,0xf8,0xce,0x53
.byte 0x3e,0x43,0x45,0x97,0x69,0xa2,0xd5,0xc2,0x49,0xb5,0x1e,0xad,0x76,0xc3,0x7e,0xbf,0xe7,0x36,0xa5,0x5a,0xb5,0x2d,0x0e,0xc5,0xa2,0x1b,0xdb,0x3d,0x3d,0xb1,0x9a,0x84,0x43,0x3e,0x5a,0xb9,0x36,0x68,0x28,0x6a,0x60,0x33,0x1b,0xff,0xde,0xd5,0x0a,0x1b,0xe8,0xb2,0xa7,0x1f,0x52,0x97,0xf8,0x8c,0x54,0xba,0x44,0x97,0x0d,0xd4,0x40,0x0d
.byte 0x40,0x18,0x06,0xc5,0xc7,0xcd,0x4b,0xb3,0x38,0xb1,0x23,0x85,0x19,0x0c,0xd5,0x6c,0xc7,0xed,0xbe,0xeb,0x66,0x10,0x1b,0x40,0x65,0x1d,0x3a,0x0b,0xb4,0x88,0x41,0x48,0xfb,0x63,0x45,0xbe,0xdc,0x97,0x73,0x10,0x18,0x55,0xac,0x54,0xfe,0x1d,0x16,0xe9,0x79,0x1c,0xc8,0x1e,0x58,0x9c,0x9c,0xaa,0x49,0xe8,0xb3,0xab,0x4f,0xdf,0xcd,0xeb
.byte 0xb6,0xdb,0x03,0xa7,0xee,0x4b,0x7f,0x22,0x54,0x58,0xa5,0x82,0x69,0xf6,0xaf,0x00,0x9b,0x6b,0xf8,0xfb,0x0f,0xfd,0xc3,0x6f,0x91,0xcb,0x47,0xee,0x79,0xdf,0x7c,0x01,0xb3,0xd8,0x0d,0x44,0x8c,0xbb,0xc7,0xa2,0x9c,0x74,0xcb,0xc7,0xc8,0x4b,0x3d,0x4e,0x83,0xe7,0x2c,0x7a,0xe9,0xca,0x71,0x30,0x05,0x33,0x71,0x3a,0x2e,0x9f,0xef,0xbd
.byte 0xa8,0xfc,0xc9,0x9a,0xc4,0x5b,0x43,0x1d,0xf9,0x36,0xd7,0xde,0x61,0x39,0xa2,0x75,0x8b,0xca,0xcd,0x83,0x2f,0x05,0x13,0x3f,0x51,0xad,0x8f,0x65,0x95,0x50,0x40,0x56,0xc1,0x13,0x1d,0xda,0xd9,0x6d,0xe7,0x3d,0x75,0x13,0x01,0x65,0x0c,0xfe,0x6b,0xaf,0x14,0x5e,0x09,0xa3,0xfa,0x28,0x39,0xdd,0xd4,0xec,0x17,0x43,0x04,0xe1,0x12,0x5f
.byte 0x5e,0xf9,0x3d,0x75,0x19,0x5e,0x08,0x17,0xe7,0xff,0x7a,0xf7,0x68,0x8e,0x05,0x37,0x65,0xb1,0x73,0xf1,0xb8,0xec,0x85,0x06,0xee,0x0a,0x43,0x2f,0xfb,0x93,0x51,0x50,0xb3,0xae,0xca,0xa2,0x8a,0xf0,0xd7,0x31,0x7f,0x1f,0x83,0x98,0x9e,0x06,0xce,0x12,0x32,0xb1,0xba,0x84,0x7d,0x8e,0xc9,0xe7,0x84,0x5b,0x52,0xe8,0x91,0x90,0x76,0xf4
.byte 0x00,0xce,0x8a,0x94,0x84,0x18,0x24,0x07,0xb4,0x42,0x1d,0xe1,0x8c,0x3b,0xf7,0xc8,0xa1,0xbd,0x74,0xdc,0xfd,0xe5,0x5b,0xf2,0xd6,0x12,0xb9,0x41,0x8c,0xa6,0x26,0x9a,0x01,0x1f,0x8e,0x87,0xa9,0xf0,0xfd,0xcb,0x70,0xb5,0xc7,0x42,0x22,0x1f,0x77,0xf0,0x89,0x83,0x22,0xde,0x0d,0x8f,0x37,0x7a,0x42,0x96,0xb9,0x99,0x3b,0xf6,0x25,0xd5
.byte 0xc4,0x81,0xbe,0xbf,0xc1,0x72,0x84,0x14,0x2d,0x40,0xe1,0x65,0xaf,0x46,0xd9,0x23,0x47,0x3b,0x13,0x15,0x83,0xe4,0x66,0x07,0x20,0x38,0xec,0xc8,0x62,0x81,0x9e,0x9c,0xcc,0xf7,0x3e,0x5d,0x2c,0xbc,0x67,0x0d,0x8c,0x3b,0xd5,0x46,0x37,0xef,0x0e,0x79,0x68,0x57,0xa3,0xa9,0x09,0xfc,0xe8,0xa4,0x75,0xd3,0x0a,0x8f,0xfd,0xb0,0xd7,0xbd
.byte 0x26,0xf7,0xb7,0x1f,0x18,0xbc,0xff,0x02,0xc3,0x1b,0x00,0xea,0x3b,0xf5,0x04,0x00,0x53,0x94,0xc6,0x09,0x08,0x20,0x37,0xcd,0x6c,0xa8,0x9d,0x79,0xcf,0xe9,0x27,0x5e,0x12,0x9a,0xa1,0xcd,0x7d,0x92,0x52,0x52,0xc4,0xbf,0x54,0x45,0xb8,0x99,0x20,0x0d,0xdb,0xb7,0x6c,0x25,0x00,0xa2,0xd3,0x1a,0x8e,0x3a,0x60,0x2f,0x5e,0x16,0x04,0xcb
.byte 0x04,0xc9,0x63,0xf9,0x3d,0x66,0xfd,0xb8,0x73,0x70,0x60,0xdd,0xfa,0x6b,0x96,0xfb,0xb1,0x6c,0x34,0xa2,0x76,0xea,0x40,0xa7,0x24,0xac,0x31,0xb6,0xef,0xe6,0xbb,0xfb,0xcf,0xfc,0xff,0x88,0xa4,0x79,0xdc,0xa7,0xe1,0x52,0xd7,0x6f,0x1c,0xf4,0x40,0x2b,0xcd,0xf7,0x95,0x3f,0x9c,0xbd,0xae,0xba,0xb3,0x9b,0xbe,0xf7,0x5f,0xc4,0x8b,0xe8
.byte 0x85,0x74,0xdc,0x51,0xe5,0x7f,0x4f,0xd7,0x54,0x93,0x7b,0x4b,0x52,0x48,0x48,0x99,0x75,0x92,0x97,0x3c,0xf3,0x4e,0x37,0x9c,0x15,0xd5,0xc3,0xeb,0xec,0x8e,0xe5,0x26,0x85,0x5c,0x95,0x23,0x09,0x1d,0x98,0x4b,0x65,0x7c,0xac,0x84,0xb9,0xc5,0xad,0x07,0xad,0x8b,0x4d,0xd9,0xc2,0x54,0x64,0x24,0x4f,0xb3,0xb8,0x04,0xca,0x35,0x20,0x70
.byte 0x92,0xe1,0x4b,0x0a,0x93,0x8e,0x25,0x68,0x78,0xcf,0xa1,0xbd,0x25,0x81,0x49,0x78,0x2f,0x78,0x67,0x40,0xef,0xa6,0x46,0x87,0x07,0xb2,0x56,0xbf,0x16,0xfd,0x64,0x24,0xf6,0x60,0xbf,0x54,0x66,0xc0,0xcc,0x99,0x6b,0x4e,0x39,0x9a,0x27,0x67,0xaf,0x1d,0x6e,0x46,0x6c,0x5c,0xd8,0xf4,0x8b,0xee,0x1b,0x3f,0xe8,0xe6,0xf8,0xbd,0xae,0x9a
.byte 0x96,0x12,0xb4,0xe9,0x47,0x4b,0xfe,0x32,0x9e,0x84,0x44,0x51,0x14,0xe6,0xea,0x03,0xaf,0x45,0xc5,0x2c,0xc3,0x1c,0xc6,0x76,0x81,0xaa,0x38,0x1c,0x37,0x02,0x35,0x36,0x72,0xc1,0xa5,0x9b,0xf5,0x17,0xaf,0xe4,0xdb,0x95,0x2a,0x6e,0xb4,0xb2,0xdd,0x6e,0x02,0xa9,0x74,0xd7,0x51,0xb9,0x21,0x8f,0x34,0x74,0xdf,0xd4,0x70,0x13,0x9c,0x33
.byte 0x4e,0x9b,0x5d,0x6b,0x1c,0xd0,0x3c,0xd1,0x0d,0x47,0xc7,0xb3,0x8d,0x2c,0x40,0x3a,0x35,0xf2,0xab,0x83,0x4b,0x1a,0x04,0x29,0xd3,0xae,0x28,0x45,0x1f,0x85,0xf2,0x63,0x01,0x47,0x2b,0xe0,0xf5,0xc4,0xc3,0x11,0xa5,0x09,0x11,0x23,0xd2,0xfc,0xde,0xd4,0xf7,0x42,0x28,0x78,0x87,0x37,0xc0,0xe5,0x7b,0x79,0xb0,0xe4,0xed,0x4c,0x6f,0x13
.byte 0xa6,0xda,0x66,0x69,0xef,0x42,0xe4,0x04,0x09,0xca,0xef,0x35,0x13,0x2d,0x33,0x2f,0x6f,0xe1,0x46,0x40,0x75,0x5f,0xbf,0x35,0xb1,0xbc,0x86,0x95,0x16,0x37,0xaa,0x92,0x86,0x6f,0xdd,0x96,0x1e,0x13,0x88,0x75,0xc5,0xeb,0x29,0x1a,0x91,0xae,0xd3,0x0b,0xa1,0x14,0x4a,0xad,0x39,0xa4,0xd2,0xf1,0x51,0x61,0x9e,0x54,0xc6,0x8d,0x36,0xdf
.byte 0x95,0x1d,0x9c,0xf7,0x73,0x64,0x71,0xca,0xd2,0x6b,0xde,0x8c,0xa1,0x0d,0x4a,0x07,0x79,0x35,0x5f,0x4b,0xde,0xeb,0xb6,0x36,0xd1,0xe0,0xb3,0x32,0x00,0x62,0x03,0x0a,0x01,0x4a,0x95,0xeb,0x1d,0x6a,0xcc,0x9b,0xec,0xaf,0x76,0x70,0x04,0xd3,0xbd,0x3b,0x11,0xc6,0xd6,0xf1,0xf5,0x0d,0x08,0xdd,0xaa,0x8d,0x40,0xb1,0xfd,0x09,0xda,0x01
.byte 0x32,0x13,0xe0,0x5a,0x46,0x82,0x10,0x26,0x2e,0xe5,0xd8,0xed,0xbc,0x03,0x1d,0x0f,0xd2,0x45,0x5c,0xda,0xd7,0x7e,0xb2,0xde,0x68,0x7a,0x3a,0x5a,0x4d,0x37,0xcb,0xae,0x0b,0x4a,0x92,0x7d,0x47,0x6e,0x19,0x93,0x62,0x3e,0x09,0xfe,0x0b,0x78,0x22,0xcf,0x62,0xa3,0x03,0x9e,0xa5,0x05,0x7b,0x81,0x3d,0x86,0x2e,0x00,0x4f,0xb9,0xdc,0x5c
.byte 0x5e,0x38,0x37,0x98,0x9c,0x2c,0xf2,0xd4,0x2e,0xe3,0xc7,0x62,0x9f,0x62,0xbe,0xfa,0x6b,0xd6,0x2c,0x9f,0x89,0xed,0x2f,0xb0,0x50,0x29,0xa6,0x71,0x5c,0x92,0xea,0x6d,0xc7,0x77,0x36,0x43,0xbf,0x89,0x49,0xfe,0x3f,0x95,0x66,0xe6,0xfe,0x39,0xda,0x8b,0xda,0x5a,0x8f,0xf3,0x0b,0x5d,0xb0,0x2f,0x8c,0xb3,0xb4,0xbd,0x8c,0x18,0xb9,0xf8
.byte 0x70,0x2a,0xa2,0x23,0xe6,0x6b,0x21,0x26,0x07,0x60,0x00,0xa7,0xf5,0xa8,0x2f,0x57,0x35,0x06,0xe2,0x42,0x40,0xbd,0x39,0xda,0xb9,0x13,0x1b,0x29,0x6e,0x9b,0x16,0x40,0x1d,0xe8,0x5e,0xc1,0xa0,0x01,0x4b,0x70,0x95,0x11,0xb9,0xc3,0x6c,0xd0,0xe1,0x2f,0x5e,0x44,0x92,0xb5,0x2d,0x2e,0xdd,0xe8,0xfa,0xfa,0x0f,0xff,0xcc,0x9e,0x6c,0x81
.byte 0x56,0x75,0xc6,0xb8,0x92,0x58,0x83,0xd1,0x05,0x8d,0x5a,0x19,0xeb,0x43,0xbd,0xea,0xc4,0xac,0x8a,0x54,0xab,0x7c,0xc6,0x41,0x60,0x9f,0x36,0x9a,0x11,0xbe,0x10,0x0c,0x39,0x05,0xf0,0x7d,0xad,0xbe,0xcd,0x5d,0x14,0x24,0x4a,0x0f,0xa6,0x86,0x72,0x15,0xcc,0xd7,0xd3,0xc1,0x26,0xd7,0x90,0xb0,0xf7,0x62,0x31,0x73,0xa9,0xcb,0x85,0xeb
.byte 0xa4,0x03,0x41,0xcc,0x60,0x4b,0x46,0xf4,0x9f,0xe6,0xc0,0x0e,0x69,0xf8,0x4c,0x4a,0x51,0xe2,0x2a,0x42,0xc2,0x32,0xcd,0x57,0x81,0xfb,0x6a,0x6e,0x01,0x12,0xe6,0xe3,0x58,0xd2,0xaf,0x28,0x64,0x56,0xb8,0x27,0xa2,0x73,0xba,0xe4,0x83,0x57,0x0d,0x5d,0xd1,0x15,0xd0,0x62,0xb8,0x79,0x97,0xc9,0x0b,0xb4,0x42,0xe1,0x2d,0xb8,0x58,0x2c
.byte 0xa6,0x8a,0x68,0x78,0x05,0x6c,0x95,0x25,0x9d,0x8f,0x14,0x0c,0x76,0xe6,0xb4,0x0e,0x40,0xf7,0xb8,0xbe,0x5d,0xc6,0x08,0xe5,0x74,0x5b,0xb0,0xf7,0x68,0x0c,0x71,0xa9,0x1b,0x2f,0x39,0x64,0xf2,0xb9,0x2d,0xbc,0x38,0xdd,0x93,0x06,0xe9,0x23,0x31,0xe4,0xf4,0xdb,0x66,0x50,0x3a,0x23,0xce,0xee,0x69,0xfd,0x39,0xe5,0xb5,0x15,0xf0,0x14
.byte 0x59,0xa3,0xa1,0x78,0xb5,0x51,0x96,0x07,0x29,0x15,0x48,0x36,0xf1,0xef,0xf4,0xeb,0x90,0xea,0x3d,0xdd,0x43,0x3c,0x6e,0x85,0x8c,0xe7,0x2f,0x68,0xc4,0x16,0x82,0xf4,0x22,0x45,0xf8,0xdb,0x23,0x2c,0xb0,0xa6,0x73,0xed,0x99,0x16,0xac,0x57,0xf4,0x9d,0x5f,0x3c,0x82,0x49,0xdd,0x57,0xba,0x36,0xec,0xfc,0xd7,0x6a,0x0b,0x8a,0x24,0x80
.byte 0xbc,0x4a,0x0d,0x7b,0xae,0x54,0x76,0x70,0x93,0x5f,0x0b,0xff,0x8b,0x67,0xf1,0xb6,0x79,0xa8,0xf9,0x8e,0x06,0xb4,0x4d,0x3f,0x01,0x4e,0x17,0x97,0xeb,0xf2,0x65,0xec,0xee,0x42,0xd1,0x67,0x66,0x33,0x6a,0x6b,0xb1,0xdf,0x59,0xef,0x86,0xb5,0xda,0xaf,0x57,0x12,0x17,0x8f,0xbc,0xeb,0xcb,0x29,0x28,0x69,0x67,0x5e,0x5d,0x11,0x4d,0x18
.byte 0xaa,0xd8,0xd6,0x27,0xb8,0x9f,0x41,0x37,0x8a,0xde,0x99,0x50,0xb1,0x58,0x45,0x22,0x95,0x84,0xec,0x73,0xb6,0xa6,0xc3,0xf8,0xe7,0xc1,0xe3,0x88,0x27,0x91,0x33,0xae,0x15,0xba,0x8b,0x04,0xf8,0x96,0x2e,0x8b,0x78,0x21,0x6b,0x86,0x23,0x82,0xde,0xd6,0xb2,0x86,0xfe,0xb5,0xfc,0x57,0x1b,0x45,0x69,0xd1,0x6a,0xb3,0x64,0x11,0xdc,0xf7
.byte 0x22,0x25,0x50,0xc1,0xc7,0xc1,0x72,0x92,0xf9,0x27,0x1e,0x41,0x1a,0xd9,0x5b,0x42,0xac,0x8b,0x5c,0x32,0x03,0x2f,0x45,0xb5,0xb1,0xa5,0x13,0xd9,0x9c,0x47,0x18,0xdc,0xb9,0x46,0xd6,0x15,0xbc,0x8d,0xaa,0x91,0x0a,0xa7,0xf8,0xc5,0x0f,0xb5,0x76,0x17,0xf3,0xd6,0x51,0xd7,0x8a,0x3d,0x6f,0x03,0x2f,0xcf,0x38,0xd0,0xe4,0xac,0x0e,0x0f
.byte 0xbc,0xe2,0x12,0x52,0x6b,0xd5,0x3e,0x85,0x0a,0x19,0xd5,0x47,0xdd,0x17,0x7e,0x5a,0x5d,0x5f,0xf0,0x1a,0xac,0x21,0x96,0x3d,0x62,0xc7,0x6c,0x47,0x7e,0x25,0x77,0x6b,0x24,0x4d,0xf2,0x39,0xb6,0xb9,0xaa,0x92,0x94,0x79,0x81,0xd9,0x13,0x07,0x8f,0x51,0xe6,0x16,0x80,0x36,0x3b,0x97,0x8e,0x96,0x41,0xaf,0x28,0x2d,0x1f,0x41,0x00,0x7a
.byte 0x42,0x0c,0x1b,0x59,0xc1,0xee,0xae,0x1a,0xa2,0x3f,0x76,0x4e,0x25,0xb0,0x75,0xd2,0x65,0xdd,0xfb,0xcf,0xee,0x11,0xd7,0xac,0xff,0x62,0x00,0xd2,0x76,0x24,0x98,0x0c,0xdb,0x52,0x83,0xb8,0x5c,0xa2,0x3e,0xe8,0xad,0x45,0xd5,0xfa,0x12,0xcb,0xe8,0x64,0x3a,0x41,0x2c,0x34,0x04,0xe9,0x9b,0xea,0x6c,0xa6,0xcc,0x72,0x1d,0x28,0x79,0x43
.byte 0x59,0x0c,0xdf,0xa7,0xf8,0x7e,0x2c,0xf2,0x6a,0xd5,0xe9,0x5f,0xdf,0x5a,0xcc,0x66,0x3a,0x99,0x68,0xec,0x5b,0xa9,0x1f,0xd8,0x80,0x7a,0x5a,0x8a,0xa1,0xf0,0x80,0x8d,0x17,0xfd,0xd7,0xab,0x9e,0x3a,0xc6,0x4b,0xc8,0x1d,0xf9,0xba,0x29,0x15,0xc2,0x73,0xa7,0xab,0x83,0x56,0x9d,0x5e,0x91,0x3a,0xce,0xe0,0x31,0x64,0x00,0x06,0x42,0x70
.byte 0x5f,0x4d,0x08,0xe7,0xf0,0x5b,0x10,0x71,0x0c,0xf8,0x93,0x34,0x9b,0xef,0x4a,0x78,0xc3,0x24,0xa9,0xb5,0xe0,0x3a,0xf0,0xf3,0xf3,0xf1,0x7d,0xb2,0x1d,0x25,0xeb,0x51,0xa3,0xd3,0x26,0xcd,0xaa,0x41,0xd0,0x64,0xbc,0x14,0x99,0x24,0xb3,0x17,0x4b,0x6d,0xa7,0xa7,0x3c,0xff,0xe9,0xfb,0x60,0x24,0x86,0x9c,0x44,0x91,0xc9,0xf0,0x85,0xbd
.byte 0x4c,0x09,0xee,0x6e,0x43,0x49,0xb9,0xc3,0xf6,0xce,0xee,0x01,0x3e,0x44,0x76,0x76,0xa3,0xd3,0x41,0xf6,0xdf,0xcf,0x0f,0x5e,0xfa,0x83,0xdc,0x7f,0xa1,0x89,0xc4,0xbb,0x3b,0xa4,0xf9,0xbb,0x87,0x3a,0x04,0xfc,0x9d,0x21,0xa7,0xe0,0x1e,0xca,0x7c,0x61,0xf6,0x91,0xdb,0xa9,0x29,0xa2,0xed,0x81,0x23,0xd7,0x8d,0x48,0x8b,0x18,0xbf,0x74
.byte 0x71,0x9e,0x65,0x65,0xca,0x2c,0x88,0xcb,0x3c,0xcf,0xda,0xc8,0xf5,0x02,0x83,0x5e,0xdd,0x6c,0xbe,0x1d,0x53,0xe3,0xe1,0xd2,0xb1,0xc5,0xf8,0xce,0x0e,0x67,0xb8,0x87,0xf0,0xee,0x86,0xde,0x06,0xc9,0xec,0xe0,0x81,0x98,0xde,0xb6,0x4d,0xb2,0x80,0x04,0xc8,0x68,0x34,0xf9,0x27,0xeb,0xd6,0x3b,0xb3,0x99,0x8d,0xa0,0xf5,0xa3,0xe6,0x87
.byte 0x29,0xe0,0x9b,0x5b,0xa1,0x18,0x82,0x04,0xd3,0xb9,0xfd,0xe3,0xe6,0x9a,0xaf,0xde,0x69,0x93,0x3d,0x9a,0x6e,0x77,0xf1,0xa9,0xf5,0x00,0x59,0x20,0xba,0x25,0x84,0xd8,0xfd,0x6f,0x0d,0x61,0x0c,0x2f,0x6f,0xe5,0xe1,0x92,0xc9,0x62,0x0c,0xb3,0xef,0x52,0xcf,0x61,0x9b,0x74,0x39,0xb5,0x84,0xdc,0x96,0xb4,0x54,0xb2,0x96,0x98,0xf2,0x4e
.byte 0xb9,0x45,0x6f,0x39,0x3a,0x60,0x5d,0x42,0xc5,0x4a,0x68,0x86,0x55,0xd3,0x5f,0x3d,0x26,0xe0,0x7d,0x46,0xcd,0xb5,0x56,0x4e,0x03,0xaa,0x29,0xec,0x5e,0xb7,0x86,0xc0,0x9a,0xa0,0xaf,0xe1,0xb7,0x90,0xd4,0xd3,0x6b,0xb4,0x26,0x3f,0x93,0x32,0x49,0x73,0x40,0x8c,0xd1,0x6f,0x57,0xe9,0x4a,0x8b,0x04,0xd3,0x25,0x57,0x95,0xf5,0x64,0x4c
.byte 0xed,0xa5,0xdf,0xf5,0xf6,0xa1,0xff,0xba,0xb2,0x0d,0x63,0x6c,0x54,0x12,0xf7,0x6f,0xa3,0x57,0x3d,0xf0,0xcd,0x9b,0xb8,0x02,0x1e,0xf6,0x52,0x79,0x57,0x43,0x2e,0x9d,0xc4,0xc2,0xc1,0x3e,0x6c,0xa5,0x32,0x42,0x00,0x35,0xaa,0x6a,0xe4,0x1d,0xa5,0x5a,0x83,0x59,0xb4,0xe7,0x3a,0xca,0xeb,0xe5,0xcd,0xf8,0x24,0xc8,0x05,0xf4,0xea,0x6a
.byte 0x82,0xbb,0x89,0xa5,0xb2,0xdf,0x5d,0x69,0x9b,0x73,0x0d,0x26,0xd1,0x5d,0x8f,0xaa,0x4a,0x4e,0x7f,0xe1,0x25,0x07,0x67,0x9f,0x2c,0x59,0xa7,0x4d,0x4c,0x44,0x67,0x5b,0xff,0xac,0xaf,0x9a,0x1c,0xc8,0xa8,0x6c,0x34,0xd4,0xfe,0x90,0x2a,0x24,0xd5,0xbf,0xb4,0xa4,0xe3,0x51,0x94,0x38,0xf9,0xd0,0xad,0x3f,0xc5,0x1e,0x72,0x56,0xdf,0xda
.byte 0x31,0xbe,0xf0,0x8d,0x79,0xa9,0x96,0x23,0x27,0x0a,0x61,0x3a,0x6c,0xb5,0xd6,0x37,0x51,0xd0,0x5c,0xbb,0x33,0x34,0x36,0x81,0xcb,0x37,0xfb,0x89,0x00,0x97,0x0e,0x98,0xb8,0xe1,0x3a,0x83,0x40,0x98,0xff,0xaf,0x9c,0x3b,0xfa,0xda,0xa6,0x80,0x6d,0xb0,0xd5,0xe6,0xa2,0xaf,0xbc,0x15,0xc1,0xc3,0xad,0x2d,0x5d,0x76,0x11,0xf3,0x09,0x0b
.byte 0xfa,0x92,0x7f,0x92,0xd6,0x7a,0xf1,0xf8,0x75,0xa4,0x46,0x20,0xcb,0x4a,0x63,0x48,0x88,0x0e,0x1a,0x28,0xbc,0x3a,0xfe,0x62,0xf3,0x17,0x75,0x00,0x47,0x7a,0xea,0xcb,0x17,0x6d,0xfc,0xf1,0x17,0xfc,0x19,0xfd,0xd8,0xaa,0xc2,0x64,0x59,0x84,0x14,0x56,0x61,0xa4,0x6d,0xe8,0xae,0xe1,0x8a,0x15,0x10,0xe4,0x98,0x88,0x4e,0x89,0xdc,0xba
.byte 0xbd,0x8b,0x79,0xe0,0xec,0xcd,0x3d,0x7a,0x14,0x11,0xd1,0x71,0xf3,0xc1,0xb8,0xf8,0x2e,0x7e,0x83,0x42,0x62,0xea,0x01,0x6f,0xdd,0x2c,0xc6,0xc4,0x52,0x94,0x8d,0x52,0x59,0x41,0xb3,0x42,0xf2,0x15,0xc5,0x16,0xf6,0x1c,0xa8,0xd2,0x2e,0xa2,0x91,0x97,0x5e,0xc8,0x5c,0x29,0x3b,0xa2,0x91,0xaf,0x55,0xf1,0x42,0x5b,0xbc,0x2f,0x95,0x91
.byte 0x68,0x00,0x48,0x7d,0xd5,0x4e,0x3e,0x1b,0xba,0x03,0x41,0x1f,0x0b,0xd8,0x9a,0x04,0x3c,0x3d,0x45,0xff,0xe8,0xd5,0x81,0x06,0xb1,0x96,0x27,0x46,0x14,0x31,0xe1,0x11,0xc6,0x46,0x59,0x97,0x24,0xd9,0x92,0x98,0x04,0x32,0xb1,0x2b,0x2b,0xe6,0x12,0xbd,0x9a,0x72,0xcc,0xff,0x26,0x8c,0x07,0x19,0x1c,0x1c,0xf1,0x66,0xf0,0x60,0x12,0x28
.byte 0x61,0x64,0x73,0xdf,0x4e,0x95,0x14,0x46,0x32,0xb1,0x62,0xf2,0xcc,0xd2,0xcf,0xeb,0x50,0x05,0x3d,0x5a,0xf1,0x6b,0xfb,0xe2,0x7f,0xeb,0xbc,0x91,0x15,0x86,0x36,0x18,0xde,0x72,0x3a,0x9e,0x81,0xa4,0xcb,0x7a,0xdc,0x11,0x73,0xb4,0xf8,0x3d,0xa8,0xcb,0x87,0xcd,0xdc,0x18,0x51,0x64,0x90,0x29,0xbe,0xdc,0xcf,0x3c,0xc8,0xe0,0xe8,0xb3
.byte 0x9a,0x15,0x38,0x00,0x22,0xd9,0x2d,0x18,0x9a,0xdd,0x69,0x3b,0x04,0x0b,0xa7,0xb6,0x5d,0x12,0xd2,0x4b,0xf2,0x8c,0x4d,0x6f,0xef,0x39,0x2d,0xe9,0xfe,0xec,0xb3,0x99,0x87,0x1e,0x54,0xa7,0xc9,0x99,0xa1,0x70,0x70,0x34,0x04,0xc8,0xa2,0x4c,0x6b,0x43,0x83,0x6f,0x60,0xf7,0xef,0x01,0xd8,0x9a,0x01,0x55,0xa7,0x3e,0x52,0xbf,0x3d,0x5f
.byte 0xba,0xc7,0x3d,0x4f,0xc9,0xad,0x47,0xf9,0x07,0x8a,0x88,0x13,0x80,0x69,0x4b,0xb8,0x41,0x9d,0xc7,0x93,0xc3,0xc0,0xc0,0x64,0xda,0x8f,0x9e,0xa7,0xb7,0x52,0x67,0x81,0x50,0x42,0x7c,0x2b,0x35,0x37,0x1f,0xfe,0x0a,0x15,0xa5,0xa0,0xe3,0xcd,0xe9,0x9d,0xbc,0xd7,0xcc,0xec,0x35,0x74,0xef,0x61,0xf9,0xb2,0x32,0x32,0x84,0x0c,0x6c,0x6e
.byte 0x52,0x84,0x01,0x45,0x05,0x84,0xd8,0x58,0x73,0x0a,0xda,0x1f,0x90,0x91,0x40,0xcd,0xdd,0x5d,0xa9,0xfc,0x03,0x2f,0xd0,0xa5,0xa7,0xa8,0x2c,0x3e,0x73,0xcc,0x58,0xc3,0xd0,0x2b,0xa9,0x20,0x14,0x11,0x63,0x13,0x84,0x60,0x05,0x76,0x89,0x1e,0x59,0x9b,0x0e,0xfa,0x4c,0x7f,0x29,0x79,0xda,0x83,0xfa,0xe1,0xbe,0x38,0xa0,0x7a,0xf2,0xd2
.byte 0x41,0x72,0xe8,0xa4,0xa2,0x38,0x78,0xc8,0x4a,0xee,0x3d,0x5b,0xe8,0x63,0x0e,0xf1,0x53,0x30,0x87,0x0d,0x4f,0xe0,0x21,0xf4,0x91,0xc9,0xc2,0x5e,0x23,0x41,0xee,0x7b,0xd3,0x4e,0x7d,0x2d,0xa6,0x5f,0x3a,0x5c,0xb4,0xfa,0x25,0x32,0x3e,0x57,0x8d,0x99,0xa5,0xe5,0x10,0xe9,0x86,0x32,0xd5,0x94,0xb5,0xc3,0xc4,0xa8,0x98,0x17,0x9b,0x8b
.byte 0x10,0xa8,0x3f,0x4c,0x55,0xc7,0xa0,0x3f,0x77,0x4e,0x89,0x85,0x95,0x41,0xdf,0x2c,0x37,0xe4,0xc0,0x57,0x77,0x60,0x90,0xce,0xfc,0x86,0x87,0x9f,0x8c,0xfb,0x34,0xef,0xe4,0x33,0x7b,0x65,0xd4,0x56,0xe4,0xf1,0xa6,0x17,0x3b,0xda,0xf9,0xcb,0x7d,0xd5,0x41,0x77,0x0a,0x15,0x20,0xf6,0x0d,0x10,0x4b,0xc6,0x93,0x3d,0xe3,0x30,0x37,0xf1
.byte 0x65,0x31,0x66,0x75,0xaf,0xec,0x76,0x31,0xcb,0xd1,0xc3,0xd4,0x49,0xb3,0x69,0x1a,0x37,0x76,0xa0,0x7f,0x21,0x39,0x53,0xc2,0xa8,0xd4,0xb2,0x7c,0xf6,0x82,0xf0,0x98,0x7b,0xf1,0xd2,0xc2,0x5f,0x07,0x78,0x67,0xb4,0xaa,0x55,0xb4,0x53,0xed,0x7a,0x5b,0xed,0x10,0x2e,0x13,0x93,0xf6,0xaa,0xec,0xe7,0x6c,0xa1,0x97,0xd2,0x7e,0x87,0xd2
.byte 0xa6,0xad,0x1a,0x31,0xee,0xa8,0xa3,0x7d,0x02,0x3c,0xe7,0x10,0xef,0x3d,0x2f,0x59,0x13,0x00,0x69,0x9d,0x79,0xba,0xa2,0xb9,0x39,0xa1,0x7a,0x7d,0x6d,0xe8,0x01,0x68,0x59,0x16,0x81,0xd3,0x63,0x94,0xd1,0x55,0x57,0x55,0xaf,0x1e,0x38,0xff,0x07,0x3a,0xb1,0x91,0xd6,0xd3,0xce,0x76,0x41,0x40,0x67,0x9e,0xf5,0x13,0xa0,0x63,0x44,0xeb
.byte 0x16,0xe8,0x33,0xc2,0x56,0x03,0xc9,0xc0,0x32,0xa7,0x04,0xe1,0x5b,0x50,0xd6,0x15,0xa1,0xdd,0x8f,0x35,0x0f,0xe5,0xed,0xb2,0xb5,0xeb,0x22,0x45,0xce,0x0c,0xb6,0x18,0x46,0x38,0xcf,0x8d,0x89,0xc2,0x8d,0x14,0x25,0xb3,0x69,0x8e,0x23,0xb5,0xa4,0x83,0xac,0x21,0x5d,0x34,0xea,0xbb,0x49,0xa6,0x4e,0xfb,0x60,0xdd,0x4a,0xe3,0x1b,0xdb
.byte 0x22,0xf7,0x9c,0x09,0x0d,0xa4,0x00,0xc0,0x7e,0x6f,0xb2,0x7a,0x59,0xc9,0x8a,0x53,0xdf,0x4b,0xf2,0x31,0xdd,0xd7,0xe0,0x4a,0xea,0x1e,0xc1,0x71,0x3a,0x7c,0xef,0xad,0x7f,0xf5,0x3f,0xbb,0x81,0x52,0x67,0x60,0x46,0xaf,0x14,0xc9,0x77,0x63,0xa1,0xb0,0xc5,0xac,0x24,0x52,0x9f,0x32,0xf8,0x9e,0xc0,0x04,0x4d,0x6b,0xfd,0x7a,0xd4,0x1c
.byte 0x68,0xaa,0xc8,0xc1,0x8b,0x41,0x31,0x69,0xbd,0x9d,0x46,0x17,0xc1,0x8a,0xdf,0x3c,0x78,0xa2,0xca,0x28,0x1b,0xf8,0xab,0xe3,0x61,0x5e,0xb2,0x31,0xac,0xf2,0xd1,0x01,0xe7,0x24,0x46,0x96,0xa6,0x81,0xb3,0x4a,0xc0,0x0e,0x23,0x52,0x7f,0xa9,0x49,0x98,0xfa,0x6b,0xfd,0x0a,0x7b,0xb7,0xc5,0xcf,0x85,0x74,0xe1,0x3b,0xde,0x37,0xa9,0x22
.byte 0x63,0xbb,0xfc,0xd3,0x02,0x90,0x87,0xb5,0x2d,0x71,0x69,0x25,0x9a,0x0c,0xaf,0x68,0x4f,0xf0,0x71,0x86,0xcc,0x1b,0xc6,0x2d,0xb5,0x6c,0x68,0x00,0x37,0x07,0xcf,0x62,0x00,0x00,0xee,0x7d,0x8e,0xf2,0x88,0xa5,0x21,0x2f,0x33,0xf8,0x7c,0xe9,0xb3,0xe3,0xd8,0xa4,0x21,0x1c,0x81,0x4b,0x62,0xcc,0x99,0xa4,0xc6,0xfe,0x49,0x65,0x35,0xd5
.byte 0x92,0xe7,0x42,0xa2,0x8e,0xb3,0x02,0xba,0xc4,0x49,0x3a,0x26,0x4a,0x66,0xbd,0x4e,0x75,0x67,0x44,0x08,0x52,0x14,0x06,0xfa,0xf9,0x01,0xa2,0x03,0xbc,0x5c,0x41,0xe4,0x65,0x2f,0x5d,0xf9,0xd9,0xe4,0xc7,0x30,0xbd,0xe4,0xa4,0xcb,0x77,0x2f,0x2d,0x72,0x07,0x4f,0x0b,0x2f,0x6c,0x3f,0xfd,0x0b,0x5c,0x69,0x71,0xda,0x4f,0x13,0xf1,0xa9
.byte 0xb6,0x97,0x5f,0x7a,0x4b,0x9b,0x26,0xe2,0xe8,0x52,0x6a,0x07,0x10,0xf7,0x12,0x2d,0x0b,0x1f,0x47,0xf0,0x45,0x90,0x8a,0x5f,0xf3,0xdf,0x71,0x38,0x5d,0xf2,0x13,0x9e,0x00,0x92,0xd2,0xe9,0xa9,0x21,0x3d,0xe1,0x60,0x18,0xd6,0x06,0x11,0xed,0x80,0xeb,0x3c,0x70,0x62,0x29,0xb0,0xff,0x67,0x6e,0xe1,0x6f,0xd0,0x73,0x10,0x61,0x6d,0x03
.byte 0x03,0x6c,0xe9,0xf4,0xba,0xe2,0x31,0x50,0xc4,0x48,0x65,0x6a,0xa8,0xb0,0xc2,0x41,0x73,0xb9,0x71,0x35,0x21,0xc3,0xff,0x96,0x07,0x7a,0x75,0x62,0xfe,0x7e,0xbe,0xfb,0xed,0x8e,0x56,0xf7,0xaf,0x0f,0xcd,0xaa,0xde,0x4a,0xd7,0xfc,0xac,0x00,0xe7,0xf0,0xc8,0xe7,0xe1,0xb1,0x03,0xb8,0x0a,0x5b,0x78,0x1d,0xc8,0x1e,0x3a,0x47,0x6d,0xf1
.byte 0x8d,0xb4,0x5d,0x71,0x15,0x7d,0xda,0x5a,0x4b,0x87,0xfa,0xaf,0x59,0x25,0x33,0x4f,0x46,0x27,0x54,0xe2,0x72,0xd2,0xe9,0x5d,0xb7,0xc3,0x1f,0x26,0xdf,0xff,0xed,0x8f,0xc1,0x91,0xa0,0x67,0xb8,0x69,0xe1,0xeb,0x6a,0xef,0x16,0xe5,0x63,0x39,0xa2,0x14,0x0c,0x20,0x1d,0xe2,0xfc,0x14,0xe4,0x6d,0xf6,0x96,0xd5,0x1a,0xfe,0x77,0x2c,0x26
.byte 0x90,0xc4,0x7f,0xc9,0xe1,0xb1,0xc0,0xeb,0xed,0x54,0xcc,0x6a,0x94,0x4e,0x5f,0xfb,0x05,0xa5,0xd7,0x8b,0xca,0x6d,0x94,0x15,0xdd,0xb6,0xf6,0x7b,0xc3,0x66,0x33,0x16,0xa1,0xe5,0x90,0x3e,0x8f,0x72,0x5a,0x18,0x4c,0xe7,0x7d,0xd0,0x80,0xf5,0xb6,0x26,0xa6,0x6a,0xab,0xa8,0x9e,0x8f,0x2f,0xc8,0xba,0xe6,0xeb,0x8b,0x5b,0x09,0xb6,0x95
.byte 0x46,0xb7,0x01,0x4e,0xbf,0x7f,0x6f,0x5d,0x64,0xfd,0x8b,0x5d,0xfe,0x2d,0xd6,0x6d,0x3f,0x34,0xc2,0xa1,0x97,0xf1,0x7a,0x1e,0x83,0x0a,0x06,0x09,0x75,0xc2,0x27,0x18,0x80,0x49,0xc9,0x7b,0xd2,0x40,0xfb,0x48,0x54,0xb4,0x22,0x30,0x7f,0xea,0x87,0x70,0x59,0xfb,0xa7,0xb6,0x63,0x33,0xb2,0x5a,0x3c,0x47,0x83,0x3c,0x81,0x34,0x50,0x2f
.byte 0x0e,0x95,0xb1,0xdc,0x44,0x67,0x94,0xf4,0x0c,0x1e,0x12,0xb8,0xfb,0xc6,0xd3,0x9f,0xaa,0xa8,0x77,0x80,0x71,0x4d,0xb0,0xb8,0x90,0x69,0x1b,0x45,0x88,0x7a,0x0f,0x60,0x7c,0x06,0x64,0x64,0x5e,0x2b,0x3a,0xf5,0xee,0x34,0x8a,0xbb,0x67,0x72,0x38,0x97,0xfd,0x8b,0x3d,0xe9,0x08,0x74,0x2e,0x9a,0xca,0xc8,0x74,0x5f,0x6f,0xd5,0xf7,0xfb
.byte 0xd8,0x3f,0x49,0x81,0x44,0x68,0xe0,0xbe,0x11,0xee,0x81,0x19,0xab,0x0e,0xe5,0x18,0x7a,0xbc,0x64,0xc9,0x88,0x4b,0xd1,0x72,0x7d,0xfa,0x57,0x5d,0x52,0xbe,0x36,0x85,0xb6,0x28,0xec,0xce,0xbd,0x68,0xa7,0xc0,0x43,0x15,0xcf,0x89,0xe9,0x13,0x72,0x23,0xa7,0x2e,0x12,0x03,0x87,0x0b,0xcd,0xe3,0x67,0xe6,0xbf,0x92,0x69,0x06,0xd1,0x51
.byte 0x1d,0x0a,0xea,0x48,0xdb,0x27,0x95,0x55,0xa6,0xca,0x44,0x62,0x66,0xa5,0xaa,0x36,0xfa,0x42,0x7c,0x16,0xb9,0x8f,0x07,0x78,0x2f,0x03,0xf3,0x58,0x8a,0x15,0x82,0x35,0xb4,0xa9,0x2e,0x4e,0xb1,0x86,0xf2,0xc8,0xaf,0x94,0xdf,0x4a,0xf9,0xaf,0xa6,0x6c,0xf0,0x6d,0x32,0x9b,0x61,0xc5,0xa7,0x64,0xc3,0xf7,0x51,0xe0,0xc1,0x8b,0xd1,0x12
.byte 0x43,0x3a,0xab,0x59,0x64,0xa4,0xa9,0xc9,0x6f,0xb7,0x30,0x1c,0x4b,0x77,0xa7,0x15,0x98,0x76,0xb5,0xf2,0x8f,0xba,0xce,0xb5,0x8e,0x2e,0x3f,0xe4,0xaa,0xdb,0xe3,0x10,0xb4,0x42,0xbb,0x3f,0x16,0x1c,0xec,0x10,0x68,0xcd,0xf8,0x16,0x19,0x80,0xb2,0xb4,0xfc,0x9d,0x52,0x48,0x09,0xda,0x94,0xb9,0xf1,0x00,0xfe,0x99,0xad,0x5c,0xae,0x5a
.byte 0xa9,0x65,0xb7,0x7d,0xaf,0xec,0xd1,0x09,0xa3,0x5e,0x77,0x01,0x86,0x78,0x79,0xaa,0x07,0x31,0x6b,0x13,0x11,0xec,0x73,0x02,0xf8,0x0c,0xa5,0x61,0xaa,0xe7,0x7c,0x4a,0xb2,0x6b,0xba,0xb5,0x5f,0xc8,0x8d,0x2b,0x2c,0xf4,0x75,0xdc,0xbc,0x84,0x01,0x4b,0x02,0x0e,0xea,0xcb,0xe1,0x87,0xb4,0xa5,0x1c,0x79,0x5e,0x3e,0xe1,0xab,0x33,0x74
.byte 0x11,0xf6,0x9f,0x89,0x12,0x04,0x46,0xd2,0xf3,0xac,0x14,0xe8,0x32,0x54,0x26,0x78,0x61,0x8b,0x93,0xd0,0x3d,0x02,0xda,0x47,0xac,0x26,0x36,0x52,0xca,0xeb,0x9f,0xc9,0xa9,0xb4,0xcb,0xaf,0xea,0xdb,0x6e,0xfb,0x93,0x49,0x30,0x4d,0x26,0xff,0xe1,0x31,0x48,0x94,0x7a,0x81,0x69,0x0d,0x51,0x0e,0x0f,0x97,0x32,0x6d,0xd7,0xd2,0x99,0xd8
.byte 0x40,0x68,0x97,0xf9,0xe7,0xb4,0x99,0x80,0x6f,0x3a,0x7c,0xba,0x8e,0x25,0x4e,0x22,0xb2,0x65,0x6c,0xde,0x46,0x04,0x6b,0xf7,0x18,0x44,0x68,0x73,0xab,0xbd,0x75,0xff,0xe2,0xc4,0xbc,0x95,0xfe,0x53,0x20,0xb0,0xf7,0x6f,0xea,0x63,0xf7,0xb4,0x0b,0x7f,0xf1,0x95,0x4b,0xbf,0x9f,0x58,0xf6,0xb5,0x05,0x55,0x50,0x00,0x66,0x83,0x64,0xf5
.byte 0xb8,0x36,0xfa,0xe5,0x3f,0x58,0x71,0x0b,0x51,0xac,0x7b,0xba,0x1d,0xfb,0xd2,0xc3,0xb2,0xb8,0xa3,0x88,0x80,0x5d,0x38,0x27,0x5c,0x12,0xb4,0x9f,0x4d,0xa7,0x25,0x41,0x1f,0xf5,0x93,0xc0,0x6b,0xb8,0x2a,0x27,0xa2,0xa7,0x9e,0xcc,0xa0,0xb9,0xbf,0x18,0x31,0x62,0x31,0x4f,0x71,0xaf,0x6f,0xda,0xe4,0x75,0x08,0xcf,0x6b,0xfc,0x96,0xa9
.byte 0xd9,0x7b,0xc5,0xc1,0x80,0x93,0xd8,0x47,0x1f,0x57,0x56,0x23,0x00,0x2c,0xc4,0x71,0x4e,0x17,0xc6,0xc1,0xff,0x8b,0x78,0xe1,0xcd,0x74,0xc1,0x42,0xc9,0x02,0x57,0xaa,0x04,0x4a,0xbe,0x1a,0xd3,0x2a,0x94,0x47,0xbd,0x0e,0x25,0x05,0x4e,0x1f,0xf2,0x19,0x1e,0x97,0xdb,0xfa,0xb1,0x4c,0x6c,0x6e,0x7d,0xf0,0x94,0x5a,0xd0,0x46,0x90,0xc7
.byte 0x6c,0xa2,0xc6,0x20,0xd4,0x49,0x04,0xb0,0x56,0xda,0x86,0x2f,0x09,0xa7,0xc1,0xf5,0xaa,0x0f,0xbc,0x0b,0x6a,0xd5,0x41,0x5f,0x32,0xa3,0x27,0xe6,0xa1,0x03,0x58,0x28,0x06,0xb4,0xad,0x55,0x0a,0x2b,0x19,0x05,0x00,0x1c,0x98,0xbd,0xbf,0x5d,0x14,0x28,0xb0,0x7c,0x86,0x14,0xf9,0x73,0x33,0xc7,0xbc,0xd2,0x00,0x37,0x72,0xac,0x30,0x25
.byte 0x30,0xeb,0xe2,0xb8,0xcd,0xf3,0x1e,0xad,0x93,0xf4,0xa3,0xac,0x03,0x37,0xe5,0x6d,0x73,0x80,0x4d,0x9e,0xc7,0xb4,0xad,0x7d,0xbe,0xe1,0x79,0x34,0x23,0x9f,0xbf,0x5c,0x02,0x6a,0x03,0x04,0xe3,0xd0,0x55,0x65,0x3d,0xc7,0x66,0xf3,0xfb,0xba,0x9c,0xed,0x88,0x9f,0xae,0xc4,0x83,0x69,0x99,0xd3,0x0f,0xac,0x46,0x22,0xcd,0x4e,0x56,0x27
.byte 0x73,0x7c,0x10,0xcf,0xbe,0x34,0xe5,0x06,0xfb,0xa7,0xe4,0x28,0x59,0x0a,0x0d,0xba,0xf0,0x52,0xe9,0xf7,0xbb,0x00,0x58,0x65,0x77,0x3b,0x83,0x67,0xaf,0xd8,0x88,0x9e,0xe8,0xa8,0xda,0x76,0x4d,0xb8,0x8e,0x40,0x70,0xe3,0x95,0x3e,0xe8,0xf1,0xaf,0x5d,0x54,0x54,0x65,0x6e,0xc1,0x58,0x06,0xd0,0xc9,0x0f,0x5e,0x63,0x0a,0xfe,0x50,0xc7
.byte 0xca,0x16,0x7d,0xd8,0x34,0xcc,0xf6,0xd2,0xb1,0x8d,0xf1,0xd9,0xe5,0xf7,0x3d,0x5f,0xe4,0x7f,0x64,0xb8,0xc3,0xba,0xc2,0x4f,0xd7,0x3a,0x78,0xed,0x8a,0x54,0xc9,0x72,0xf0,0xec,0x64,0x2e,0x20,0x27,0x97,0xea,0x8e,0x6b,0xaa,0xb2,0x52,0x13,0x67,0x66,0x89,0xc1,0x8c,0x5b,0x64,0x9f,0xd1,0x3c,0x9b,0x4f,0x9e,0x96,0x93,0xa2,0xf3,0xa8
.byte 0x7c,0x94,0xd2,0xfa,0xd6,0xc3,0x48,0xca,0x1e,0x89,0x1a,0x62,0x52,0x92,0x01,0xc5,0x9e,0x2d,0x8b,0x4f,0xf5,0xd4,0x10,0x6b,0x33,0x0e,0x8b,0xfa,0x0c,0x80,0x05,0x50,0x0d,0x84,0x3b,0xb0,0xe4,0x27,0x63,0xc3,0x46,0x40,0xf0,0x2b,0x31,0x31,0xd3,0xf5,0x07,0xb8,0x7c,0xec,0x83,0xb8,0xff,0x9e,0x5a,0xb9,0x57,0x4a,0xe5,0x85,0xaf,0x47
.byte 0x7c,0x36,0xb1,0x5e,0xe9,0xf6,0xe8,0x02,0xfb,0x33,0xb5,0xa5,0x6f,0x03,0x76,0x26,0x20,0x03,0x1f,0xac,0x26,0x7c,0x29,0xf2,0xbf,0xcf,0xf9,0x31,0xcc,0xa0,0xdb,0x8a,0xd1,0x06,0xc2,0x6b,0x57,0x8d,0x6a,0x02,0x02,0x37,0x84,0xa4,0xd0,0x4c,0x56,0x4c,0xfd,0x18,0x30,0x86,0x9e,0xb2,0x71,0xc2,0xc8,0xe8,0x4f,0xd7,0xeb,0xa7,0x6e,0x77
.byte 0xeb,0x89,0xb4,0x6b,0x19,0x46,0x65,0xdf,0x74,0x10,0x82,0xe7,0xd2,0xbf,0x70,0x11,0x41,0x1a,0x87,0xc8,0xcb,0xc0,0xd8,0x2e,0xfd,0x36,0x24,0x92,0x91,0x67,0xb6,0x2d,0xc1,0x81,0xa0,0x6a,0xf9,0xb7,0x06,0x21,0x55,0x0d,0xa2,0x74,0xd9,0x24,0x35,0x00,0x42,0xd3,0x08,0xdb,0xcc,0x28,0x56,0xd4,0x9b,0x38,0x9c,0x2d,0x98,0xb1,0x56,0x96
.byte 0x30,0xe9,0x7a,0xde,0x8a,0xbd,0x13,0xee,0x2b,0xb9,0x10,0x88,0x1a,0x7a,0x29,0x0e,0x9b,0x45,0x7b,0x37,0x14,0x7a,0xf4,0x40,0xe9,0x60,0x16,0x6c,0x0c,0x64,0x6c,0x15,0xd8,0xf8,0xc4,0xcd,0x9e,0x9a,0xa2,0xa7,0xf5,0xe3,0xd8,0xbb,0x40,0x31,0x75,0x34,0x98,0x85,0xed,0xe5,0xaf,0xfb,0x6a,0x64,0x32,0x75,0x25,0xba,0x35,0x79,0xcf,0x9e
.byte 0xb7,0x8f,0xde,0x18,0x97,0xe5,0x31,0x4f,0x52,0x69,0x50,0x05,0x94,0x8e,0xb6,0x56,0xb1,0x94,0xa6,0xa2,0x36,0x7e,0x17,0x3d,0x5e,0xb9,0xc7,0xee,0x0e,0x33,0xd4,0xeb,0x58,0xc9,0x6a,0xb8,0x3b,0x32,0x53,0xbf,0x61,0xf7,0x3f,0xec,0x7d,0x8d,0x20,0x4d,0xb4,0x38,0x68,0x3a,0x21,0x28,0x89,0x19,0x10,0xe3,0x2f,0xf5,0x74,0x77,0x39,0xe8
.byte 0xb3,0x72,0xaf,0x50,0x30,0x36,0x1e,0xc7,0x57,0x66,0x31,0xe2,0x84,0xe1,0x05,0x94,0xd6,0xbf,0x91,0x97,0xe0,0x22,0x26,0xcf,0xeb,0x06,0x33,0x70,0x22,0x19,0x58,0xc7,0x80,0x0b,0xe8,0x26,0x35,0xbc,0x8d,0xc3,0xb0,0x97,0x7d,0x8d,0x70,0xf9,0x66,0x76,0x52,0x71,0x46,0x1b,0x6a,0x4e,0x9a,0xd1,0xa1,0xfd,0xda,0x6a,0x1b,0x6f,0x2e,0xff
.byte 0xd1,0xe4,0x23,0xd5,0xa9,0xc6,0x6a,0x5e,0x84,0x5c,0x2f,0x26,0x55,0x4b,0xbb,0xb1,0xf2,0x79,0xa5,0xfb,0xfb,0x29,0xcd,0x57,0xd2,0xef,0x45,0xbe,0x3f,0xc1,0x6c,0x4c,0xbc,0xca,0xe0,0x0b,0x6a,0x8e,0xb9,0x8a,0x2f,0x3b,0x86,0x42,0xb7,0xf5,0xa5,0x38,0x99,0x97,0xaa,0xf5,0x36,0x87,0x97,0x56,0xe1,0x03,0x76,0xb5,0xcc,0x84,0xad,0x31
.byte 0x29,0xad,0xc4,0x93,0x47,0x07,0x00,0x91,0x47,0x0e,0x8a,0x32,0x43,0x9c,0xba,0x02,0x59,0xe5,0x62,0xc6,0xdd,0xd5,0xcf,0x0a,0xd7,0x33,0x6a,0x76,0x6a,0xa9,0x1d,0xfc,0xfc,0x0b,0x0a,0x4e,0x4e,0xed,0x8a,0xdf,0x8f,0x97,0x50,0xb2,0x1d,0xbe,0x31,0x04,0x6d,0x04,0x5c,0xf9,0x95,0x36,0xcc,0x7c,0xa2,0xaf,0x2a,0x6a,0x50,0xbc,0xf0,0xe5
.byte 0xdd,0x1f,0xc2,0x90,0xc0,0xa0,0x33,0xcb,0x90,0x5c,0x02,0x87,0xf6,0xa1,0xf8,0xa6,0x03,0xca,0xfb,0x89,0x8e,0xff,0x82,0x6f,0x5c,0x16,0x25,0xa1,0x2c,0x0e,0xd6,0xa0,0xab,0x64,0xa0,0x4b,0x66,0x9b,0x08,0x64,0x97,0x93,0xa2,0xdb,0xf5,0xac,0x78,0x57,0x8d,0x32,0x16,0x44,0x3a,0xb9,0xd2,0xe6,0xc4,0xf3,0xb9,0x44,0x45,0x15,0x57,0x33
.byte 0xfa,0x98,0x61,0x17,0x8b,0x7c,0x2f,0xd7,0x0c,0x14,0xf2,0xb4,0xe3,0xa7,0x50,0x71,0x57,0x1d,0xd0,0x9b,0xab,0x8d,0x4f,0x42,0x08,0x7c,0x54,0x58,0xc7,0xbf,0x17,0x15,0x64,0x91,0x7a,0xd4,0xaf,0xf6,0x6a,0x45,0xdc,0x2d,0xfc,0x80,0xd6,0x5d,0x4b,0xea,0xd7,0x45,0xe7,0xd4,0x20,0xa3,0x5f,0xda,0x73,0xa1,0x87,0x8b,0xf2,0x93,0x50,0x5c
.byte 0x20,0x89,0xbd,0xb2,0xe0,0x47,0xe6,0xf0,0x6c,0x42,0x2b,0xe1,0x1e,0xa0,0x2d,0x0f,0xf1,0x05,0x28,0xa2,0xd4,0x5d,0x12,0x95,0x0a,0x6e,0x62,0x11,0x34,0x56,0x29,0xe9,0x9d,0x45,0x5f,0x55,0xcb,0xaa,0x3a,0x59,0xe5,0x17,0xb3,0x12,0xcf,0x2a,0x10,0xa9,0x71,0x22,0x06,0xfa,0xec,0x99,0x6f,0x80,0xa3,0xfe,0x5c,0xc5,0x65,0xb9,0x34,0x19
.byte 0xd3,0x62,0x58,0xce,0x33,0x47,0x03,0x44,0xc6,0xa0,0xd4,0x51,0x58,0xaf,0xbb,0xe1,0xaf,0x53,0xf5,0xe7,0xee,0x6f,0x70,0x7a,0x15,0xf6,0x96,0xbf,0x4a,0xbe,0x7a,0x5d,0xbb,0x54,0xe6,0x8a,0xeb,0x48,0xaa,0x96,0xad,0xde,0x1e,0x96,0xe0,0x2a,0x0a,0x09,0x01,0xfe,0x39,0xfe,0x1f,0x3a,0xef,0x2f,0xa9,0xfc,0x33,0xf1,0xec,0x05,0x24,0x5e
.byte 0xb3,0x35,0xd3,0x56,0x07,0x8b,0xe5,0xba,0xbd,0x2a,0x8c,0xf0,0x59,0xe0,0xef,0xd6,0x7c,0xe2,0x26,0xd8,0x2d,0x38,0x17,0x06,0x11,0x90,0xe1,0x01,0x14,0x7e,0xcb,0x0f,0x0f,0x60,0x01,0x26,0x4f,0x21,0x24,0xad,0x15,0xd0,0x69,0x85,0xe6,0xbc,0xe6,0x47,0x52,0x40,0xec,0xe3,0x14,0xf7,0x8c,0xcc,0x93,0x1d,0xef,0xb4,0xa5,0xa5,0x21,0x93
.byte 0x37,0x09,0x86,0xac,0x28,0x45,0x1d,0x11,0xb8,0xaa,0xa8,0x5a,0x9f,0xb1,0x66,0x4b,0x57,0xa2,0xd9,0x22,0xcf,0xbf,0x69,0xa6,0x20,0x1f,0x7e,0x35,0x32,0x83,0x20,0x6d,0x2a,0x4b,0x14,0x71,0xd1,0x3b,0x11,0x9d,0xc8,0x7f,0x9d,0x2c,0xf6,0x75,0xd9,0x08,0xac,0xa4,0xd3,0x14,0x8b,0xf3,0x14,0xff,0x03,0x88,0xeb,0xb9,0xb9,0x9e,0x83,0x64
.byte 0xfe,0x8a,0x97,0x0b,0xa1,0x7c,0x50,0x11,0x6b,0xc1,0x6e,0x77,0x56,0x25,0x6e,0x32,0xfc,0x54,0xc1,0x99,0xc0,0x31,0xef,0x65,0xb3,0x67,0xd0,0x7c,0x12,0x62,0xfd,0x8f,0x71,0x5c,0xfc,0xf9,0x26,0x29,0x2d,0x50,0x28,0xbd,0x26,0x40,0x63,0x43,0x79,0x78,0x07,0xa8,0xb4,0x19,0x06,0x25,0xd8,0xe5,0xad,0x75,0x6f,0xe0,0xb4,0xef,0x1f,0xe9
.byte 0x5b,0xa0,0xf8,0x32,0xec,0xe5,0xc1,0x75,0x04,0x88,0x1f,0xad,0x30,0x16,0xe2,0x05,0x8c,0xee,0x81,0x80,0x9b,0x0c,0x8d,0xd1,0xfb,0x55,0x0b,0x8d,0xdf,0x67,0x91,0x05,0xb2,0xfc,0x1e,0x99,0x12,0xb3,0x7c,0x33,0x4a,0x39,0x5f,0xbb,0xd9,0xe8,0xbb,0x17,0xd9,0x4b,0x8b,0xd6,0x6d,0x90,0xa8,0xbf,0xb7,0xd8,0xe0,0x83,0x93,0x16,0x5b,0x0f
.byte 0x8b,0xc8,0x14,0x7d,0x24,0xf5,0xc7,0x33,0x21,0xa6,0xa0,0x1c,0x37,0xea,0xab,0x74,0x86,0xb8,0xe0,0xb7,0x57,0x4d,0x5e,0x2a,0x2c,0x4c,0xbb,0x06,0x0b,0x44,0xe4,0xab,0xb9,0xcd,0x94,0xa9,0x33,0x40,0xc6,0x20,0x90,0xe2,0x7b,0xf6,0x84,0x23,0x59,0x52,0x72,0x83,0x45,0x33,0x5d,0x91,0x93,0xa8,0x32,0xa1,0xe4,0x26,0x13,0xd8,0xf6,0x21
.byte 0x85,0x02,0x66,0xad,0xbf,0x18,0x41,0x50,0xd3,0xda,0xa4,0xee,0x3b,0xd8,0xc1,0x2d,0xe6,0xa6,0x40,0x97,0xeb,0xd4,0x2f,0x7e,0x70,0x1a,0x7a,0xf1,0xc2,0x24,0xf8,0xef,0x43,0xef,0x0b,0xf9,0x87,0x6b,0xe7,0x10,0xa1,0x17,0x75,0x03,0x30,0x33,0xca,0xa4,0xb5,0x8d,0x70,0x7d,0xec,0x2c,0xe8,0x07,0x42,0x11,0x9d,0x29,0x23,0x31,0x8f,0x9d
.byte 0x83,0x71,0xeb,0x39,0x2d,0x80,0x15,0xd2,0xcf,0x42,0xc9,0x06,0x6d,0x90,0x73,0x8b,0xcb,0xeb,0x9d,0xb6,0xc8,0x61,0xcc,0x84,0x2d,0xa7,0xf2,0x35,0xbc,0xc8,0x14,0xe9,0x89,0xb5,0x47,0xe5,0x5c,0xdb,0x0c,0x98,0xc9,0xec,0x20,0x61,0x63,0x2c,0x58,0xbb,0x8e,0x46,0xb1,0xca,0x6a,0xbb,0x11,0x73,0xb6,0x5e,0x88,0x50,0xce,0xcf,0x14,0x60
.byte 0x5c,0xc8,0x59,0x81,0xb2,0x8f,0xde,0x36,0x57,0x5a,0x18,0xf7,0xa5,0x57,0xf7,0x71,0xd3,0x92,0x5a,0xb5,0x41,0x4d,0xcc,0x74,0xe8,0xdb,0xfd,0x15,0x1b,0xb8,0x40,0x91,0x04,0x12,0x74,0x84,0xcb,0x1f,0x3c,0x13,0xa4,0xa2,0xde,0x52,0xaf,0xdd,0x3b,0x1e,0x88,0x6e,0x86,0xd0,0xe9,0xb7,0x10,0x3b,0x29,0xef,0xce,0xa3,0xf9,0x85,0x0d,0x27
.byte 0x1d,0x21,0x74,0x0e,0x06,0x66,0xfa,0xcb,0xad,0x88,0x58,0x79,0xdb,0x3f,0x8a,0xbe,0x4d,0x56,0x4b,0x45,0xae,0x6f,0x0c,0x6a,0x8c,0x73,0x5b,0x61,0xde,0x41,0x03,0x9b,0xef,0xdd,0x35,0xde,0x57,0x96,0x11,0x8a,0x56,0x6b,0xa5,0x57,0x7e,0xb1,0xa7,0x12,0x4a,0x79,0xb9,0xc4,0x04,0xd5,0x7b,0x8c,0xad,0xf2,0x83,0xff,0x7d,0xdc,0xcf,0x22
.byte 0x25,0x5d,0x6f,0xfc,0xd7,0x7b,0xac,0x53,0x80,0x1d,0x7e,0xff,0x89,0x95,0x48,0x38,0xc0,0x48,0xd8,0xb9,0x3b,0x5e,0xc3,0x99,0xc8,0xc6,0x6d,0xd2,0x0e,0xd8,0xc2,0x9e,0x3d,0x9e,0xf4,0xa7,0x5f,0xc4,0x9a,0xd1,0x0c,0x49,0xb8,0x5a,0x66,0x94,0x69,0x71,0x19,0xba,0x9b,0xe6,0x4f,0xa9,0xcf,0x70,0x7d,0xe2,0x60,0xea,0x06,0xd7,0x94,0xe1
.byte 0xb6,0x23,0x7f,0x2c,0x2c,0xe4,0xf4,0xdf,0xcc,0x1a,0x25,0xfa,0x47,0xef,0xf2,0x37,0x32,0xd4,0xf2,0xdd,0xc9,0x13,0xb8,0x09,0x85,0x33,0x5c,0xa2,0xa2,0x20,0x11,0xd1,0x3b,0x6e,0x9d,0x11,0xb6,0xb8,0x75,0xf1,0x47,0x6f,0x93,0x35,0x55,0x55,0xa5,0x11,0x4d,0xbf,0xc1,0x0a,0x99,0x84,0x65,0x91,0x16,0xc1,0x64,0x1a,0xdb,0x15,0xcf,0x2f
.byte 0x93,0x0e,0x6b,0xe0,0x8c,0x70,0xfa,0x5e,0xa2,0x5c,0xd8,0x43,0x2f,0x93,0x22,0x9e,0xdc,0xad,0xf6,0x39,0x15,0x2b,0x50,0xa0,0xdb,0x51,0xfc,0x00,0xda,0x8b,0x7a,0xa9,0x14,0x07,0x79,0x25,0x8c,0x7d,0x71,0x3f,0x8d,0x51,0x20,0x81,0xdc,0x4a,0x92,0x71,0x4c,0xb2,0xc6,0x5c,0x8a,0x18,0xa1,0xaa,0xb0,0x2e,0x06,0xb4,0xd4,0x6a,0xd4,0xa8
.byte 0xd1,0x31,0x81,0x22,0xe3,0x22,0xc9,0x75,0x84,0xc1,0x95,0xae,0xa6,0xa2,0xb4,0x93,0x4b,0x9c,0xea,0xc6,0x4c,0xdc,0x25,0xd9,0xeb,0x12,0x64,0xf9,0x42,0x8e,0x72,0x47,0xd9,0x89,0xd6,0xc4,0xf9,0xa7,0xc6,0x64,0x53,0x05,0x40,0xf5,0x9c,0xab,0x53,0x45,0xa4,0xe5,0x3e,0x2f,0xf7,0x69,0x06,0xc1,0x7e,0xb0,0xec,0x4c,0x22,0xfe,0x89,0x6c
.byte 0x4c,0x80,0x5d,0x51,0x0a,0x20,0xaa,0x71,0x68,0x9c,0x3e,0x29,0xf2,0x82,0xd4,0x81,0x6c,0x8b,0x11,0x42,0x00,0x86,0x70,0x74,0xe0,0x94,0xcf,0xee,0x2f,0xbd,0x8a,0xab,0xee,0xfc,0xd8,0x8e,0x87,0x2e,0xce,0x89,0xaf,0x29,0xc2,0x2b,0xcd,0xa3,0xc4,0x47,0xa2,0x1f,0x2e,0xc3,0x2d,0x9f,0x89,0xbb,0x57,0xa6,0x00,0xc3,0x4a,0x91,0x2e,0xfd
.byte 0xbf,0xbb,0x4a,0xb5,0x3c,0xa1,0x4d,0x96,0x2d,0x62,0xf6,0xda,0x9f,0x75,0xef,0x84,0x18,0x5c,0x31,0x31,0xcc,0xe4,0x82,0xd4,0xb6,0x7a,0xd7,0x6b,0x6e,0x32,0xb6,0xdb,0x90,0x16,0x5a,0xc0,0x4e,0xe4,0x48,0x69,0xd3,0xe3,0xf2,0xfa,0xed,0x17,0x4b,0x06,0xe0,0xd8,0x4d,0xa9,0xee,0x19,0x98,0x65,0xf5,0xb3,0x69,0xe2,0x23,0x23,0x04,0xca
.byte 0x52,0x7b,0x7b,0xaa,0xb9,0x03,0x71,0x1b,0x37,0x17,0x16,0xe0,0xb7,0x5a,0x75,0xa9,0x97,0xbe,0x44,0xa9,0xb2,0xef,0x5a,0x5c,0x17,0x31,0x77,0xe3,0x15,0x4f,0xb6,0x4c,0xff,0xf9,0x10,0xdd,0x41,0xab,0xfa,0xf0,0xed,0xe7,0xa6,0x74,0x6f,0x7e,0xc9,0x71,0x66,0x16,0xed,0x68,0xb0,0x74,0x85,0xeb,0xb2,0xc5,0x73,0xc1,0x00,0x33,0xb3,0x9d
.byte 0xd9,0x7f,0x0e,0x9d,0x17,0xf2,0x0b,0x55,0xb6,0x68,0x9b,0xe9,0xc9,0x46,0xa5,0x97,0xe3,0xe9,0xb6,0xc3,0xa3,0x10,0x57,0x11,0xd6,0xc1,0x7a,0xfe,0x05,0xa5,0xcb,0x15,0x75,0x92,0xd8,0x69,0xdd,0xe0,0x67,0x5a,0x8c,0x50,0x6d,0x66,0xd5,0x79,0xf6,0xb6,0x7e,0xf1,0x04,0x95,0x45,0x03,0x84,0x0e,0x8a,0xa6,0x27,0x87,0x9b,0x6b,0x58,0x46
.byte 0x52,0xfb,0x36,0xd8,0x90,0x14,0xcd,0x68,0xa9,0xb7,0x51,0x2e,0xb5,0xc5,0x3b,0x4d,0xee,0x86,0x65,0x94,0xec,0x94,0x8e,0x26,0x01,0xe8,0xcd,0x0a,0xa0,0xb8,0x7c,0x76,0xe7,0xd7,0x65,0xa4,0x0c,0xe5,0x6f,0xfc,0x3d,0xad,0xc0,0x94,0x44,0xb4,0x98,0xc9,0x01,0x71,0x03,0x96,0x12,0x77,0x0d,0xbf,0xb7,0x05,0xe1,0x95,0xff,0x01,0x0c,0x26
.byte 0x13,0xbe,0x09,0xf6,0x35,0xee,0x44,0x33,0x86,0xf4,0xb4,0x65,0x72,0xbd,0x66,0x1a,0xcf,0x89,0xa5,0xe0,0x3a,0xe7,0x1a,0x2a,0x1e,0x73,0xf0,0xef,0x74,0xdb,0xaf,0x02,0x4c,0xd4,0x0f,0xfd,0x5e,0x20,0x4f,0xd7,0x19,0x36,0xeb,0x00,0x2e,0xce,0x56,0xe7,0xba,0x6d,0xae,0x73,0x27,0x7e,0xc5,0x28,0x94,0xc6,0xbf,0x9b,0xca,0xb4,0x52,0x04
.byte 0xd3,0xd1,0x4f,0x61,0x5b,0xcd,0x97,0x12,0x35,0xc0,0x10,0x12,0x15,0x05,0x02,0x1a,0xae,0x0e,0xf9,0xc7,0x5d,0xeb,0xea,0xcd,0x3c,0x10,0x51,0xf2,0x0c,0x48,0x6f,0x45,0xa2,0x50,0xa9,0x95,0x21,0x7c,0xd3,0x91,0x5f,0x72,0x59,0xa8,0x2b,0xfb,0xe8,0xb1,0xd9,0xdb,0x46,0x1e,0xe8,0x25,0x78,0x2c,0x01,0xbb,0x35,0x3f,0x95,0x04,0x84,0x96
.byte 0x1f,0x55,0xa4,0x46,0x2a,0x8c,0x58,0xb6,0xfc,0x2e,0xfa,0xa4,0xb8,0x4d,0x5d,0x0b,0x5f,0xa4,0x93,0x06,0xae,0x62,0x6a,0x6a,0xce,0xa5,0xc7,0x06,0xf0,0x05,0xf8,0xd7,0x3a,0x0b,0xb8,0x80,0xa6,0x2f,0x73,0xbd,0xbc,0x31,0x33,0x96,0xf9,0x8b,0x52,0x7e,0x3f,0x64,0x48,0x1d,0xca,0x23,0x71,0xe6,0xf3,0x2b,0x03,0x20,0xa0,0x2b,0xec,0x5b
.byte 0xca,0x5e,0x31,0x7c,0x01,0xf4,0x58,0xdc,0x27,0x57,0x8e,0x41,0xfc,0xa6,0x10,0x09,0xc3,0xbd,0x89,0x7b,0xfb,0x09,0x85,0xa5,0xa3,0xbe,0x15,0x94,0x41,0x7a,0x86,0xfe,0xab,0x9d,0xcf,0x56,0x60,0xa1,0xb3,0xee,0x9a,0x69,0xf9,0x2f,0xb7,0x92,0x7a,0x7b,0xb6,0x23,0xf3,0xca,0x9c,0xbe,0xb6,0x51,0x04,0x3d,0x2a,0x17,0xdd,0x13,0x9b,0x9b
.byte 0x1c,0x50,0xe4,0x11,0x5b,0xce,0x0e,0x54,0x7c,0x25,0xdd,0xc1,0x91,0x90,0xe4,0xb5,0xa6,0x84,0x22,0x44,0x46,0x68,0x7b,0x16,0x23,0xc0,0x69,0x64,0xc4,0x12,0x03,0x8c,0x85,0xe2,0x4c,0x83,0xdb,0xb1,0xe3,0x35,0x15,0x6a,0xd3,0x56,0x73,0xa1,0x51,0xad,0xd2,0x15,0xc5,0xa9,0xb3,0x7e,0x81,0xa1,0x16,0x19,0xbe,0x8b,0x98,0x2f,0x31,0xaf
.byte 0x51,0x67,0x4c,0x09,0xae,0x4d,0x77,0xa4,0xcd,0x28,0xbf,0xd0,0x0e,0x17,0x57,0x15,0xcf,0x48,0x8b,0x90,0xb1,0xb5,0x59,0x43,0xac,0x34,0x34,0xa1,0x4b,0x36,0x20,0x0d,0x40,0x6d,0x81,0xa2,0x40,0x5e,0x7b,0xd8,0xf3,0xf5,0x33,0x3b,0x14,0x19,0x55,0x07,0xfc,0x53,0x22,0x7e,0x4f,0xe2,0xde,0xb7,0x8b,0x2d,0x10,0x0c,0xc1,0xc7,0x0d,0x3c
.byte 0xc0,0x8a,0x91,0xfa,0xf5,0x9b,0xcd,0x25,0xe8,0x8f,0x10,0x4b,0x9a,0x07,0x94,0xa9,0xc0,0xb4,0x18,0x6c,0x9a,0x88,0x94,0x4d,0x33,0xc7,0xf5,0x20,0x8c,0x02,0x9a,0xde,0x90,0x11,0xbd,0x90,0x14,0xb0,0x72,0xaf,0x8e,0xef,0x9c,0x22,0x2b,0x6a,0xd7,0x75,0xae,0x6e,0x97,0x46,0x3f,0xef,0xb3,0x4d,0x34,0x0b,0x41,0x35,0xc9,0xb4,0xaa,0x18
.byte 0xfb,0x95,0x09,0x64,0xe0,0xff,0x51,0xa0,0xf4,0x8f,0xa9,0x5f,0x8f,0x51,0xa6,0x5b,0x86,0x0d,0x83,0x26,0x1e,0x00,0xab,0x6f,0x73,0xf6,0x98,0x24,0x4b,0xb2,0xe0,0xfe,0xbc,0x03,0x7f,0x6c,0x88,0xe8,0x36,0xea,0x10,0xe7,0x73,0xa0,0x96,0x88,0xad,0x0f,0x88,0xb6,0x9f,0xa7,0xe4,0x38,0x35,0xa3,0x29,0x9a,0x34,0xd1,0x00,0x1c,0x61,0x93
.byte 0x90,0x12,0xc3,0xcb,0x72,0x62,0x0a,0xc8,0xad,0x9c,0x0d,0x19,0x6c,0xe2,0x53,0xf0,0xf0,0x2f,0x2c,0x72,0x0f,0xf1,0xb1,0xd1,0x56,0xd4,0x87,0xbc,0x73,0x63,0xfe,0x2c,0x7b,0x9b,0xaa,0x6c,0xa6,0x79,0xfd,0xfa,0x20,0x83,0xb2,0x6d,0x4e,0xe4,0xae,0x73,0xf8,0xb5,0x6c,0x1a,0x97,0x07,0x8a,0x6f,0xe8,0x33,0xc5,0xea,0x61,0x18,0x53,0x56
.byte 0xa4,0x11,0x32,0xe1,0x8c,0xae,0x69,0xac,0xed,0x35,0xe0,0x6f,0x7d,0x97,0x8b,0xa3,0x12,0xa4,0x92,0x42,0xcf,0x43,0xef,0xc3,0x8e,0x99,0x12,0x0a,0xb6,0xa6,0xcc,0xae,0xca,0x1c,0xe3,0xa1,0x65,0x74,0x79,0x6a,0x5f,0xa2,0x3e,0x6d,0xb6,0x45,0xa5,0x40,0xc8,0x59,0xa0,0x31,0xa9,0x07,0x35,0x81,0xaf,0xee,0x35,0x07,0xa0,0xe3,0x26,0x4c
.byte 0x57,0x08,0xa0,0x01,0xc3,0x8b,0xd8,0x9a,0xba,0xe4,0x73,0x7f,0xcb,0xc4,0x0a,0x65,0xb3,0x16,0xf5,0x36,0x35,0xd3,0x2f,0x15,0x61,0xa6,0x90,0xa6,0xa5,0x4c,0xc6,0x57,0xd4,0xd0,0x80,0xfb,0x68,0x52,0xd4,0x09,0x24,0x39,0x29,0xa1,0x39,0xf2,0x3d,0xbc,0xc6,0x7c,0x95,0x3c,0xa4,0xe1,0xeb,0x33,0x94,0xfe,0xda,0x92,0x75,0x7f,0x76,0xe0
.byte 0x61,0xa9,0x27,0x2d,0x43,0xf9,0x4f,0xd6,0x61,0x12,0x89,0x12,0x46,0x79,0xb6,0x6c,0xa1,0x6d,0xcb,0xcb,0x12,0x1b,0x82,0xa6,0x41,0xa8,0xf5,0x43,0x46,0xdd,0x8b,0x43,0x5f,0x5f,0xce,0x7b,0xc1,0xec,0x55,0x8d,0x37,0xe5,0x78,0x4c,0x2e,0x3a,0x64,0xcf,0xef,0x8c,0x76,0x04,0x75,0x42,0x0d,0xb5,0xaa,0x5f,0xd1,0x55,0xbc,0x54,0x26,0x9e
.byte 0xc6,0xa0,0x8c,0x36,0x39,0x23,0x54,0x66,0x34,0x83,0xed,0x1e,0xf4,0xca,0x7e,0x11,0xb4,0xd1,0x0c,0xcd,0x67,0xa6,0xbb,0x02,0x30,0x61,0xd9,0x3f,0xbf,0x83,0x5c,0x15,0x60,0xa4,0x1b,0x73,0x67,0xa0,0x54,0x07,0x2a,0xc4,0x11,0x4e,0xfb,0xe8,0x85,0xda,0x78,0xbb,0x91,0x98,0xb8,0xf4,0x7c,0x6c,0x0b,0x32,0xad,0x6d,0x1b,0x29,0x2a,0x2e
.byte 0x36,0xef,0xd8,0xdd,0xa3,0xdd,0x6d,0x45,0xf0,0x90,0xa9,0xf8,0xb5,0x1f,0x3b,0xaa,0xe2,0x88,0x97,0x46,0xc1,0x86,0x8e,0xb7,0x6b,0x01,0x5f,0xac,0xa4,0xfa,0x35,0xef,0xfb,0xa4,0x0a,0x31,0xaa,0x80,0x81,0x98,0x78,0xcf,0xe5,0x25,0xbf,0x4a,0x84,0xd1,0x11,0x92,0x0a,0xc6,0x98,0xd2,0x99,0xa8,0x42,0x46,0x20,0x04,0x95,0xa1,0xad,0xef
.byte 0x86,0x1f,0xe3,0x4d,0x6f,0xed,0x01,0xf4,0x42,0x54,0xe4,0x34,0xec,0x64,0x97,0x48,0x1f,0x41,0xe1,0x50,0x85,0x86,0xe3,0x85,0xdb,0xd0,0x8b,0xe4,0xc9,0x91,0xea,0xa4,0x5d,0x65,0xd2,0x98,0x52,0x0a,0x0d,0xde,0x71,0xb4,0x86,0xaa,0xfc,0xa7,0x1b,0x7b,0x1a,0xa1,0x1c,0x5a,0xea,0x82,0x97,0x03,0x43,0x88,0xcd,0x96,0xf6,0x55,0x87,0x6f
.byte 0xb9,0x85,0xed,0x9c,0x17,0x89,0x31,0x7e,0x72,0x96,0x0f,0x2f,0xb7,0xcb,0x45,0xe4,0x46,0x4d,0xf3,0x38,0xc2,0xe2,0x24,0xdb,0x7e,0x1e,0x1d,0xae,0x56,0x34,0x7e,0xf5,0xc7,0x17,0x08,0x22,0xab,0xb6,0x3c,0xf3,0x3f,0xe1,0xd6,0xd3,0x71,0xb5,0x58,0xad,0x88,0x41,0xab,0x1b,0x2c,0x90,0xd2,0x94,0x65,0x0c,0x02,0x7f,0x9c,0x01,0xbc,0x14
.byte 0x89,0x4d,0xca,0x3e,0x57,0xc5,0x00,0xe7,0x61,0x81,0x5c,0x07,0x39,0x18,0xc9,0xaa,0xd9,0xa1,0x3d,0xa9,0x9e,0xe2,0xec,0xaa,0x15,0x34,0xf8,0xd5,0x7b,0x20,0xbb,0x19,0xe2,0xc8,0x95,0xbe,0x46,0xfa,0xa1,0xde,0x22,0x18,0xbc,0x28,0xf6,0x72,0x2a,0xc7,0x4a,0x26,0x4c,0xe2,0xdb,0xcf,0xc1,0xa2,0x41,0x9e,0xb8,0xfb,0x93,0x65,0x8f,0xc8
.byte 0x38,0x6a,0x8a,0x4e,0xea,0x35,0xed,0xc6,0x1a,0xcd,0x77,0x4f,0xc1,0x7c,0x08,0xd3,0xc6,0x50,0xab,0x08,0x34,0x76,0xbc,0x65,0x8f,0x88,0xa8,0xa7,0x03,0x18,0x4a,0xdf,0x64,0x35,0xad,0xa0,0x1a,0x91,0xee,0x41,0x1e,0xe7,0x70,0x9f,0x6e,0x46,0xd5,0xc6,0xda,0x1b,0x17,0x5c,0x11,0x56,0x55,0x5c,0xdd,0x24,0xb7,0x15,0xc8,0xa6,0x02,0x33
.byte 0xa6,0x10,0xd6,0x9b,0x67,0xc0,0x20,0x46,0x25,0xf8,0xd0,0xab,0x25,0xbb,0x00,0x3a,0xcc,0x00,0x30,0xad,0xa9,0x60,0x28,0xc9,0xfd,0x8c,0x0d,0x02,0x95,0x47,0xff,0x30,0xa5,0x52,0x91,0xc4,0xef,0x73,0x28,0x93,0x08,0x37,0xe7,0x81,0x8f,0xd5,0x0c,0xd8,0x6b,0xc6,0x73,0xe7,0xfe,0x3f,0xc8,0xe0,0xd8,0xa7,0x68,0xa2,0xa9,0xd8,0xa3,0xa3
.byte 0x90,0x7e,0xa5,0x30,0x61,0xac,0xfc,0xe9,0x56,0x07,0x49,0xc6,0xf6,0x0d,0x21,0x86,0xa5,0xc8,0x7b,0x3a,0xfb,0xa7,0x59,0x3f,0xd0,0xe7,0x2b,0x90,0x40,0x71,0x76,0x06,0x34,0x03,0x32,0xb9,0x93,0x02,0xa4,0xa8,0x17,0x27,0xa3,0x47,0x40,0x79,0xed,0x8c,0x6f,0x12,0x7f,0x32,0x7d,0x9f,0x3a,0x39,0xfb,0xb6,0x75,0x66,0x60,0x66,0x6f,0x84
.byte 0x79,0xd6,0xce,0x6a,0x78,0x55,0x60,0x6b,0x1d,0x81,0xed,0x29,0x48,0x56,0x62,0x21,0xe0,0x8e,0xf8,0x63,0xad,0x6a,0x08,0xcc,0x9d,0x25,0x77,0x50,0x57,0x87,0x7d,0x52,0x8b,0x85,0x27,0x1c,0x10,0x68,0xe5,0xb7,0xfa,0x75,0xd2,0xfe,0x7d,0x89,0x1a,0x17,0xb7,0x0b,0x6c,0xe8,0x50,0xcf,0x42,0x51,0x77,0x27,0x75,0x2b,0x15,0xdb,0xc8,0x10
.byte 0x7a,0xd5,0x32,0x90,0x08,0x31,0x16,0x18,0x26,0x22,0xdb,0xfb,0x98,0xe1,0x49,0x71,0x7b,0x63,0x6f,0xb8,0x5e,0xd0,0x70,0x59,0xa0,0x26,0xd4,0xe0,0x01,0x0f,0xd2,0xb1,0x8a,0x94,0x94,0xa1,0x31,0x61,0xf8,0xbb,0x9a,0xe3,0x9b,0x3d,0xe8,0x55,0x4b,0x49,0xc0,0x71,0x57,0xfe,0x39,0xef,0x53,0x35,0xec,0x0c,0xf7,0x71,0x9f,0x18,0x66,0xe1
.byte 0x46,0x29,0x2c,0xc6,0x74,0xd2,0x20,0xf5,0xb2,0x64,0xa2,0x20,0x99,0x19,0x43,0x36,0x33,0x7d,0x85,0xcb,0x09,0x65,0x18,0xc5,0x7c,0x9f,0xf9,0xae,0x0a,0x1a,0x47,0xf6,0x65,0x4a,0x43,0x13,0x4e,0xcf,0x2b,0x9f,0x0d,0x9b,0x8a,0x5e,0xc6,0xf8,0xc2,0x26,0x88,0xc1,0x4e,0xde,0xa2,0x08,0xdd,0x0e,0xeb,0x46,0x3d,0x93,0xae,0xeb,0xd8,0xc0
.byte 0x29,0x2a,0x11,0x56,0x7c,0x97,0x10,0xae,0x6e,0x02,0xc9,0xc8,0xed,0x78,0x68,0x8d,0xa7,0x93,0x74,0x4c,0x7a,0x67,0xd4,0xb8,0x97,0x2d,0x0d,0xc0,0x33,0x96,0xb7,0xbc,0x4a,0x02,0x5f,0xa7,0xd7,0x1e,0x92,0xfd,0xf4,0x2f,0xd3,0x44,0x41,0x80,0x11,0x76,0x95,0x93,0x9d,0xf5,0xfb,0x98,0xc1,0xb6,0x11,0x3e,0x05,0x3b,0x7f,0x4a,0xa7,0xde
.byte 0x3a,0x8b,0xff,0x0c,0x13,0x5a,0x93,0xa8,0x34,0x64,0x85,0x6c,0x63,0x67,0x71,0x45,0x83,0xbb,0x27,0x9f,0xda,0xf7,0x66,0x92,0x7e,0xb7,0x1f,0xcf,0x23,0x38,0x1f,0xe4,0x7c,0x39,0xcc,0x30,0x34,0x14,0x3b,0x6f,0x02,0x52,0xd8,0xac,0xcf,0x72,0xb6,0x95,0xf7,0xc0,0x64,0x36,0x31,0x08,0x45,0x8d,0x17,0x17,0x9c,0x75,0xec,0x21,0x5c,0x87
.byte 0x4f,0x94,0x64,0x24,0xb6,0x07,0x7f,0x13,0xee,0x62,0x67,0x62,0xab,0x2d,0xf1,0xfa,0x06,0x21,0x92,0xb8,0xa3,0x1e,0xc0,0x62,0x85,0x2e,0x3b,0xe5,0xbb,0x08,0xd5,0x18,0xb6,0x0c,0xd7,0x5d,0x2e,0xd6,0xfc,0xd4,0x05,0x49,0x82,0x19,0x17,0xdd,0xd0,0xd3,0xb6,0xc3,0x2e,0x72,0x59,0x2e,0x29,0xf0,0xf3,0x57,0xef,0x43,0xb6,0x1d,0x10,0x2a
.byte 0x34,0xd5,0x52,0x9d,0xdc,0x8f,0x14,0xf9,0x52,0x9c,0x30,0xd9,0x49,0x39,0xe1,0x20,0x0e,0x04,0x79,0x8a,0x4a,0x17,0xd9,0xa9,0xf7,0x66,0x73,0xbd,0x40,0x3f,0x1a,0xff,0x38,0x63,0xe7,0x9c,0xfe,0xf1,0xd8,0x30,0xbf,0x76,0x8f,0x43,0x8f,0x18,0x72,0xd2,0x1d,0x7d,0x4a,0x2d,0xee,0xcb,0x4d,0xc5,0x96,0x19,0x5e,0x23,0xdc,0x7a,0xb9,0x69
.byte 0x94,0xe3,0xf6,0x8a,0x66,0xe6,0x68,0x1f,0x36,0x2f,0xca,0xb2,0xca,0x4a,0x3f,0xcd,0x7d,0x70,0xe1,0x0d,0x41,0x5f,0x46,0x26,0x5f,0xee,0xb9,0x78,0xaa,0xa2,0xd1,0xc1,0x27,0xb8,0x4d,0x3d,0x52,0xaa,0x1e,0x8b,0x3c,0xc0,0x4e,0x26,0xcc,0xa9,0x99,0x1b,0x0d,0x58,0xdd,0x6d,0xde,0x25,0x9e,0x3c,0x3b,0xab,0xcb,0x68,0x5d,0xfe,0x58,0xaa
.byte 0x98,0x37,0xe8,0xbf,0xc4,0x99,0x60,0xc7,0x96,0xf2,0xc7,0x2e,0x2f,0x61,0x14,0x28,0x4b,0x8e,0x05,0x0f,0x3b,0xb9,0x7a,0xa5,0xf8,0xbe,0x01,0x4a,0x68,0x44,0x7f,0xf8,0xc1,0xdf,0x18,0xe8,0x5a,0xc3,0x67,0xe0,0xf8,0x3b,0x17,0x51,0x03,0xfb,0xc1,0x6b,0xa8,0x65,0x4a,0x5f,0xe0,0xd2,0x69,0xa9,0x6c,0xb2,0xe8,0x2f,0xeb,0x90,0xab,0xe5
.byte 0x6d,0xdb,0xb2,0x1d,0xda,0x58,0x76,0xa2,0xb7,0x76,0x6f,0xbf,0x96,0xe8,0x97,0x7b,0x49,0xa6,0x5f,0x29,0xdd,0x02,0x09,0x0f,0x2b,0x09,0xf3,0xbd,0xa0,0xca,0x2b,0xfa,0x82,0x52,0x42,0x93,0xb6,0x53,0x33,0xb7,0x4d,0xa8,0x91,0x81,0x5c,0x88,0x51,0xf6,0xcc,0x65,0x6e,0x76,0xd1,0x07,0xb5,0x19,0xc4,0x90,0x6f,0xd7,0x5a,0xf7,0x34,0x00
.byte 0xba,0x0d,0x1f,0x64,0x66,0x87,0x25,0xcf,0xac,0xd0,0x60,0x44,0xdf,0x29,0x9b,0x84,0xf2,0x37,0xf5,0x17,0xaa,0x75,0xba,0x0a,0x5d,0x71,0xe4,0x50,0xaf,0x87,0x76,0x18,0x21,0x94,0xe1,0x0f,0x9a,0x2f,0xb1,0x10,0x8a,0x49,0x13,0x43,0x92,0xc6,0xf3,0xa3,0x68,0x2b,0x52,0x91,0x91,0x41,0xeb,0x33,0xfd,0x45,0xea,0x9c,0x6e,0x32,0x3b,0x9d
.byte 0x1e,0xe0,0x97,0xb7,0xa2,0x83,0xd1,0xf4,0x2f,0xb9,0xe8,0x5a,0x7d,0x5a,0xe1,0xc4,0xec,0x4b,0x1b,0x22,0xf5,0xc8,0x87,0x74,0xdd,0xe4,0xb5,0x8c,0x4e,0x69,0x33,0x50,0xe7,0x31,0x36,0xef,0xf7,0xb2,0x29,0xc6,0x31,0x1f,0xde,0xa7,0x7b,0xae,0xa8,0xae,0x57,0xf4,0x17,0xf9,0xbd,0x9e,0x1d,0x83,0x98,0x70,0x00,0x1f,0xb6,0x14,0xdb,0xb3
.byte 0xc5,0x4d,0x7b,0xdd,0x36,0x4d,0x94,0xff,0xec,0x24,0x6b,0xb8,0xa7,0xaa,0x32,0x2d,0xff,0xcc,0x6c,0xdb,0x26,0x95,0x47,0x69,0xdf,0xf0,0xa2,0xc0,0xc3,0x98,0x30,0x29,0x40,0x97,0x45,0x84,0x3b,0x3b,0x4c,0x36,0x2c,0xdf,0xe7,0x8e,0x03,0x8b,0x60,0xc7,0xb5,0x24,0x19,0x56,0x98,0xd5,0x23,0xfa,0xce,0x30,0xb3,0x5f,0xef,0x74,0x3a,0xf7
.byte 0x49,0x57,0x6d,0xad,0xb6,0x97,0x54,0xbb,0x85,0x80,0x52,0x5c,0x44,0x7e,0x2e,0x2c,0xd4,0xd5,0x05,0xd2,0xf1,0xd2,0xb1,0xc0,0xda,0xde,0xf3,0x46,0xe4,0xde,0x59,0x85,0x39,0xa8,0x5c,0xf0,0x10,0x9e,0xa0,0x99,0x68,0x5b,0x00,0xe7,0x2a,0x60,0x65,0xe7,0x69,0x24,0xb0,0xdc,0xd3,0x7d,0x98,0xd6,0x1f,0x75,0x37,0x5a,0x14,0x3c,0xe2,0x8d
.byte 0xe9,0xf4,0x73,0x5d,0xd7,0xde,0xf6,0x74,0xb0,0x07,0x51,0xee,0x5c,0x4c,0x72,0x72,0x16,0xf2,0xfb,0x44,0xac,0x26,0x20,0xaa,0xe8,0x96,0xc5,0xdc,0x5e,0xea,0xf9,0x62,0x76,0x96,0x1b,0xe3,0xc3,0x50,0xc0,0xc6,0xc4,0x07,0xc6,0x32,0x3c,0xc2,0x8e,0x4e,0xfc,0xcb,0xa2,0x22,0x24,0xa2,0x58,0x3c,0x0f,0xce,0x5b,0xb4,0x27,0xaf,0x67,0xed
.byte 0x81,0xf1,0x9c,0x26,0x38,0x80,0xc5,0xfc,0xfa,0xd1,0xae,0xfe,0x12,0xe7,0xb4,0x49,0x34,0x8f,0x52,0x5f,0x49,0xd7,0x0c,0x14,0x6e,0x93,0xc2,0x7e,0x3f,0x26,0x50,0x6d,0xc4,0xcb,0x55,0x76,0x52,0x95,0xd8,0x5b,0x81,0x0c,0x97,0x34,0xf0,0xaa,0x46,0x60,0x52,0x7a,0x53,0x99,0x74,0xf7,0xdc,0x3e,0xa4,0xbb,0xe2,0xca,0x5f,0x06,0x29,0x0d
.byte 0xde,0x28,0x8a,0x40,0x9a,0x7c,0x12,0x7b,0x7d,0x8d,0xd6,0x59,0xa3,0x7b,0x36,0x15,0x1e,0xdf,0x6e,0xed,0x90,0x4a,0xa5,0x0c,0xb6,0xb1,0x8c,0x84,0xd2,0x14,0xab,0x85,0xb3,0xaa,0xb5,0x48,0xa3,0x91,0xe4,0x6e,0x46,0x69,0x2e,0x55,0xf1,0xbb,0x1d,0xa9,0xfa,0xae,0xcd,0xfa,0xf4,0xf1,0xca,0x74,0x2d,0x1b,0x8d,0x29,0x99,0x15,0x58,0x01
.byte 0xf2,0x8b,0x0d,0x2b,0x1b,0x27,0x91,0x48,0x26,0x50,0x1d,0xf0,0x72,0x3f,0xff,0xe3,0x1f,0x68,0x16,0x0c,0x4a,0xbd,0x35,0xa5,0x61,0xd0,0xd4,0xb2,0x21,0xc6,0x5a,0x49,0x4f,0x7c,0x0a,0x28,0x8f,0x57,0xc4,0xcf,0x74,0x42,0xdd,0x0a,0x7c,0x42,0x21,0x96,0x8a,0xcb,0xc4,0xc7,0x1d,0xc9,0xe0,0xc9,0x1f,0x62,0xfb,0x96,0x52,0xc4,0xbc,0xb5
.byte 0xc2,0x32,0x08,0x66,0xbf,0x27,0x6b,0x60,0xdd,0x29,0x65,0x98,0x40,0x5f,0x0a,0x41,0xb7,0x7b,0x9e,0xd1,0xb8,0x99,0x46,0xc0,0xf4,0x89,0x4f,0xc9,0x2c,0x3c,0xaf,0xc9,0xe4,0x86,0xa6,0xf9,0xeb,0x13,0x99,0x62,0x26,0xec,0x75,0xc5,0x42,0x0f,0x64,0xf8,0x43,0x96,0x4a,0xe0,0x3c,0xb9,0x00,0x83,0x41,0x71,0xcf,0xdb,0x5d,0xa0,0xc0,0xa0
.byte 0xe5,0x2c,0x75,0x6b,0xbe,0x87,0xbc,0xb3,0x1a,0xef,0x4c,0x65,0x34,0xc8,0x98,0x19,0xa2,0xed,0xf1,0xbe,0xe8,0x7c,0xd4,0xbd,0x5a,0x32,0x30,0x63,0xe0,0x86,0xef,0x63,0x98,0xa3,0x4a,0xfb,0xfe,0xd5,0x6e,0xe2,0x9c,0x54,0xc1,0xe9,0xd2,0x40,0xcf,0xc6,0x54,0x59,0xb4,0x8c,0x1a,0x11,0x7f,0x16,0xb4,0x1c,0x49,0x45,0x44,0x91,0xea,0xcf
.byte 0xa5,0xf4,0x7b,0x3a,0x83,0x05,0xc9,0xb6,0x69,0x3b,0xe1,0x5b,0x24,0x63,0x90,0x59,0x66,0x5c,0xe4,0x00,0x6b,0x4d,0xe3,0xa6,0x90,0xe1,0x3a,0xad,0x5d,0x4a,0xfb,0x32,0x87,0xed,0xd3,0xc1,0xab,0x22,0x3b,0x9c,0x0e,0x38,0xa1,0x67,0x66,0x33,0x7b,0x6d,0x7f,0x95,0x20,0xf7,0x07,0x82,0xa7,0xf8,0x57,0xdb,0xc8,0xb2,0x69,0xe5,0xcc,0x54
.byte 0x6b,0xb5,0x70,0xbf,0x06,0xd0,0xa7,0x0c,0xb8,0x2a,0xe6,0xca,0x86,0xce,0x27,0x55,0xff,0xb2,0x25,0x88,0x4d,0xda,0x51,0xe3,0x50,0x73,0xfa,0x9c,0x15,0x2e,0x1b,0x5c,0x46,0x61,0x12,0x29,0x5a,0x04,0x39,0xf2,0x18,0xe8,0x50,0x69,0xcc,0x0f,0x69,0x27,0xae,0xdb,0x30,0xce,0xf4,0x61,0xc7,0x41,0xd3,0xbd,0x92,0xab,0x8e,0xf9,0x47,0xc8
.byte 0x06,0xc1,0x94,0x05,0xcb,0xf5,0x71,0x68,0xf2,0x74,0xca,0x0f,0x8a,0xfe,0x92,0x1e,0x0e,0xd5,0x42,0x19,0x6a,0x69,0x7e,0xa9,0x79,0xfa,0x3b,0x43,0xe3,0xee,0x71,0x66,0xbe,0x39,0xb2,0x70,0x6c,0x74,0x12,0xcf,0x56,0xae,0x98,0xaa,0x19,0xf0,0x80,0xff,0xf1,0x8a,0x23,0x5e,0x86,0xc7,0xfc,0x5c,0x74,0x0d,0xfa,0x23,0x5d,0x65,0x44,0x80
.byte 0xea,0x83,0xf1,0x2b,0xf5,0xe0,0xb0,0x16,0x3b,0x4c,0xdb,0x62,0xdd,0x50,0x05,0xd0,0x84,0xc0,0xda,0x14,0xd4,0xc7,0x5e,0x41,0xe3,0xb1,0x05,0xa2,0xbe,0xe6,0x7e,0x3f,0x77,0x8a,0x89,0x77,0xff,0x59,0xeb,0x43,0x57,0xe1,0x70,0xee,0x9c,0xb3,0x75,0x46,0x4d,0x33,0x26,0x8c,0x88,0xaf,0x49,0xad,0x97,0xa9,0x03,0x16,0xe9,0x55,0xae,0x1b
.byte 0xda,0x80,0xa4,0x52,0x7e,0xbc,0xef,0x17,0x27,0x94,0x09,0x94,0x05,0xab,0xdc,0x6d,0x24,0xa4,0xae,0x43,0x78,0x2e,0x18,0x0d,0xf5,0x85,0x43,0xba,0x3b,0x36,0x2a,0x43,0x3b,0xd6,0x2e,0xc9,0x97,0x29,0x87,0xf3,0x98,0x80,0xc5,0xe6,0xc3,0xa3,0xeb,0x36,0x0b,0x5a,0xc5,0x6c,0x0f,0x53,0xdf,0x7d,0xb9,0xc0,0xdb,0x57,0xde,0xbb,0x89,0x7b
.byte 0xb3,0x3b,0x9b,0x9b,0xe3,0x16,0x95,0xf1,0x44,0x0b,0x96,0x51,0x56,0x37,0x74,0xcb,0x6d,0x59,0x26,0x8b,0xb3,0xa8,0xdc,0xf4,0x7c,0x32,0xa7,0xcb,0x06,0x79,0xbf,0x09,0x5f,0xca,0xd5,0xa4,0x05,0x60,0xba,0xc1,0x2e,0xc7,0x35,0xc7,0xe4,0xe4,0x91,0xd1,0x4f,0x1b,0x1d,0x5e,0x3b,0x59,0x0e,0x7e,0xb6,0x5d,0xbb,0x99,0x20,0xc3,0xf5,0x28
.byte 0xc7,0xc7,0xc5,0x8c,0x14,0xd0,0xea,0x9a,0x6c,0xb0,0x2f,0x40,0xfb,0xb3,0xd6,0x8c,0xc2,0x8f,0xcb,0x5b,0xb9,0xdf,0xd8,0xae,0x48,0x8e,0x1a,0x2a,0xdd,0x8b,0x2b,0x14,0xf8,0xff,0x51,0xd2,0x73,0xed,0xbe,0x14,0x09,0x9d,0x50,0x28,0x18,0xe6,0xc4,0xba,0x6a,0xf9,0xc3,0xb5,0x23,0x91,0x5a,0x10,0x5b,0xd6,0x69,0x99,0x76,0x1b,0x6a,0xea
.byte 0xc8,0x93,0x39,0x47,0xd0,0xc4,0x23,0xf7,0xb4,0xa2,0xc3,0x31,0xc3,0xca,0x13,0x12,0x7c,0x30,0x5c,0x73,0x32,0x6c,0xe2,0x48,0x6d,0xe5,0x9f,0xfc,0xd8,0x8b,0xef,0xf2,0xa7,0xc4,0x00,0xe7,0xc9,0x7b,0x93,0xb9,0x47,0x68,0xae,0xe6,0x6c,0xf2,0xfb,0x60,0xb4,0x51,0xa2,0x09,0x19,0x81,0x3e,0x34,0xb6,0xcd,0x41,0xd7,0xe2,0x4f,0xf5,0xf8
.byte 0x08,0xe4,0x88,0xb1,0x0f,0x19,0x6e,0x9e,0xf2,0x88,0x9b,0x7e,0xfe,0x46,0x9e,0x27,0xb3,0xc7,0xaf,0x1d,0xb7,0xc3,0x31,0x9c,0x96,0x54,0x0a,0x10,0xd1,0x62,0x3f,0xa1,0x17,0x77,0xf5,0xbc,0xf5,0x53,0x87,0x68,0x18,0x17,0x32,0x62,0x7b,0x66,0x88,0x28,0xf9,0x60,0xba,0xbe,0xa8,0xe6,0xa7,0x9c,0x15,0x15,0xe8,0x3f,0x09,0xb4,0x7b,0xa0
.byte 0x14,0x8f,0x5a,0xfe,0xbf,0xc2,0xc5,0xce,0x40,0x2e,0x23,0xae,0xa2,0xa9,0x88,0xea,0x0a,0xef,0x8a,0xa4,0x63,0x19,0x80,0x06,0x90,0x7e,0x5c,0x28,0x97,0x20,0x78,0xd6,0xf2,0xb0,0xea,0xb3,0xef,0x22,0x4c,0x35,0x46,0x44,0xa0,0x84,0xba,0x29,0xee,0xf5,0xa7,0x75,0x6a,0x9d,0xe8,0x67,0xbf,0xd9,0xf4,0x9e,0xa7,0x09,0x46,0x77,0x7c,0x76
.byte 0xa6,0x1d,0x2c,0x1d,0xcb,0x95,0xa0,0x2c,0x45,0x50,0x6e,0x2c,0xdd,0xe2,0x9c,0xbc,0xa5,0xc1,0x72,0x48,0x19,0xdd,0xe0,0x21,0x90,0xf7,0x66,0xa7,0x43,0x94,0x32,0x6d,0x7d,0xe2,0x6f,0x6b,0x8f,0x38,0x97,0x4e,0xd0,0xbf,0x41,0xd2,0x24,0xba,0xd0,0xe7,0xd1,0x56,0x74,0x58,0x41,0xbc,0x7b,0xe7,0xbd,0x39,0x43,0xdb,0x2d,0x1a,0x66,0xb8
.byte 0xc8,0xef,0x3f,0x6d,0xcd,0x5d,0x2d,0x1b,0xd7,0xb9,0x53,0x92,0x23,0xa2,0x5c,0x6f,0xd9,0x37,0xf4,0x43,0x6b,0x2d,0xb3,0xd5,0x7b,0x6c,0x87,0xb4,0xdd,0x05,0x39,0xa7,0x04,0x58,0xa9,0x7a,0xbe,0x08,0xf3,0x2e,0x79,0x7d,0x90,0xce,0x3d,0x2d,0x9d,0xf0,0xad,0xe6,0x28,0x44,0x7d,0x61,0x05,0xc1,0xc8,0x5e,0x2e,0x07,0x6c,0xd4,0x9c,0xbe
.byte 0x3f,0xd8,0xfc,0x46,0xe5,0xbe,0x7c,0x12,0x30,0x55,0xc9,0x6b,0xa0,0xac,0x17,0x0e,0xd0,0x65,0x70,0xc9,0xd6,0x5e,0xb3,0x97,0x58,0x43,0x8e,0xce,0x18,0x48,0xc7,0xa6,0xdc,0x0c,0x14,0xef,0xbf,0x1b,0xaf,0xca,0xbe,0x2a,0x96,0x27,0x82,0x3d,0xec,0x9b,0x0c,0xc8,0x40,0x7b,0x3f,0x03,0x93,0x70,0x87,0x50,0x24,0xc5,0x1b,0x10,0x91,0x66
.byte 0x9f,0xbd,0xc2,0x9b,0xa0,0xee,0x5d,0xd3,0x65,0x17,0x03,0x4e,0x32,0xe3,0xb1,0x62,0xf7,0xe8,0x22,0x79,0x55,0xea,0xd9,0x3b,0x27,0x77,0x65,0x3d,0x44,0xde,0xbe,0x79,0x2d,0xfa,0x0b,0x59,0x08,0xf0,0x9b,0xc5,0xe0,0x78,0x6b,0x57,0x4f,0x75,0x32,0x92,0x6f,0xb1,0x4c,0x70,0x98,0x26,0xd1,0x07,0x2d,0xb7,0x8e,0x32,0x16,0x96,0xd7,0x0e
.byte 0xde,0x61,0x49,0x46,0x65,0x92,0xdd,0xb3,0xd0,0x98,0x1b,0xed,0x30,0x6f,0xfd,0x02,0x8e,0xf8,0x7f,0x84,0x95,0x6d,0xe9,0x25,0x01,0xef,0xc9,0x03,0x7b,0xe1,0xf9,0x4f,0xd9,0x19,0xbb,0xa6,0x46,0x89,0xdf,0x36,0x01,0x40,0x08,0xfa,0x0b,0x93,0x2e,0x4b,0xdd,0xd0,0x1d,0x37,0xb9,0x14,0x4c,0x09,0xf1,0x7a,0x95,0x6c,0xd7,0xde,0xdc,0xcd
.byte 0xd0,0xdc,0xeb,0x84,0x59,0x24,0xa1,0x1e,0xc2,0xa0,0x52,0x6b,0x74,0x2a,0x6b,0xef,0xe2,0x37,0x94,0xef,0x6e,0x3e,0x79,0x7c,0xba,0x90,0x3d,0xda,0x2d,0x96,0xf6,0x7b,0x59,0xa9,0x12,0xa2,0x90,0x72,0x18,0xde,0xbd,0xaf,0xa2,0x4a,0x1f,0x50,0x6c,0xb4,0x03,0xb8,0x29,0xa8,0x6e,0x07,0x7a,0xbe,0xee,0x79,0x6f,0x03,0x29,0x4b,0xf5,0x76
.byte 0x06,0x41,0x5a,0x14,0xf6,0x9c,0xd4,0xa0,0xf2,0x86,0x34,0x10,0x0c,0x12,0x6e,0x3b,0x6f,0x3b,0xb2,0x29,0xde,0xa9,0xa1,0x3e,0x32,0xe9,0xd7,0x26,0x12,0x73,0x0d,0xcc,0x5e,0x4d,0x0d,0xdf,0xa7,0xe0,0x2c,0x16,0x78,0x3f,0x76,0x7a,0x90,0x98,0x95,0x7c,0x18,0x28,0x64,0x9e,0xcf,0x7f,0x02,0xa6,0xc2,0x57,0xdd,0xaf,0x81,0xa8,0x60,0x34
.byte 0x8f,0x60,0x7e,0x62,0x6d,0xb1,0xb6,0x36,0x3e,0xb4,0xa9,0xad,0xfc,0x88,0x22,0x6b,0x50,0x26,0xd1,0xc4,0xa0,0xfc,0x58,0x30,0x1b,0xb3,0xec,0x0e,0x9a,0xd8,0x44,0x34,0xc5,0x63,0x74,0x28,0xe6,0x35,0x05,0xc0,0x0a,0x0e,0x3b,0x75,0x13,0x94,0xbf,0x21,0xb3,0xba,0x90,0xca,0xc2,0x0b,0xcd,0x39,0xe3,0xcb,0xf4,0x52,0x31,0xe4,0xb1,0x31
.byte 0xf8,0x62,0x77,0x69,0x37,0x5c,0x45,0xc8,0xe7,0x14,0x35,0x45,0x41,0x03,0x5b,0x1e,0x81,0x6a,0x18,0xe9,0xc2,0x17,0xe5,0xbd,0x8a,0x33,0x29,0xe4,0x93,0x3a,0xa2,0x23,0xd4,0x5d,0xef,0x72,0x1c,0x6e,0x94,0x64,0x48,0xfc,0x53,0xd3,0x90,0x1a,0xd2,0xc8,0xa6,0x1f,0x83,0x3b,0x23,0x5d,0x7e,0x4a,0x89,0x4d,0x51,0xf6,0x1c,0x65,0x17,0xf5
.byte 0xdf,0xfb,0x6c,0x61,0xaa,0x1d,0xfd,0xf3,0xe8,0x9e,0x05,0x87,0x1b,0x70,0xde,0x1a,0x19,0xce,0x21,0xf3,0x2a,0x21,0xd1,0x16,0x19,0xc8,0x7f,0x19,0xa1,0x30,0x9f,0xd3,0x39,0x54,0x21,0x06,0x08,0x7d,0x74,0x1d,0x1e,0x04,0xfd,0x96,0xef,0xf7,0x59,0x92,0x0e,0x71,0x31,0x1b,0x86,0x86,0x8b,0xdc,0x3a,0x43,0xfa,0x2e,0x62,0x9d,0xec,0xd7
.byte 0x7a,0x96,0x1d,0xaa,0x30,0x92,0xf4,0xbf,0x05,0xa5,0xa9,0xff,0x42,0x7f,0xa7,0xae,0xe2,0x25,0x5d,0x79,0x5c,0xc2,0xbe,0xcf,0x6a,0x0e,0x08,0xa4,0x3b,0x30,0xe2,0x17,0x24,0x3d,0x4e,0xb8,0xd6,0xcd,0x03,0x01,0xaf,0xc0,0xcb,0x3f,0x32,0xb6,0x5b,0x2d,0xb4,0x66,0x51,0xe1,0x70,0x2a,0x2f,0x0e,0xda,0x68,0xe4,0x4e,0x32,0xa0,0x9a,0x50
.byte 0x0a,0x8a,0xfe,0x9f,0x5e,0xb3,0x3c,0x7b,0xc9,0x71,0xff,0xab,0x39,0xa8,0x46,0x03,0x7f,0xce,0xb9,0x3f,0x70,0x23,0x81,0xc1,0xac,0x25,0xdb,0x83,0xd6,0xd1,0x15,0x4a,0x8d,0x89,0x7e,0x8f,0x49,0xff,0x39,0x29,0xb9,0x2c,0xfe,0x50,0x2e,0xcc,0x4e,0x82,0x35,0x90,0x09,0x47,0x7f,0x67,0x1a,0xd3,0xf3,0xe8,0x8d,0x5c,0xaa,0x1c,0xbc,0x49
.byte 0xce,0x2f,0xdd,0x8f,0xe9,0x6f,0xb1,0x07,0xea,0x40,0x56,0xe9,0x86,0x04,0x4b,0xe1,0x4c,0xc6,0x6f,0x69,0x87,0x11,0x67,0xed,0x15,0xfc,0x23,0x26,0x70,0xaa,0xd2,0x0e,0x4d,0x22,0x67,0xa4,0xa2,0x6e,0x71,0xb8,0x1d,0x86,0xe8,0xc1,0x1c,0x23,0xf9,0xc1,0xae,0x0a,0xd9,0x15,0x28,0x25,0x01,0xb7,0x71,0xa8,0x5a,0x8e,0xc1,0x6a,0xad,0x39
.byte 0x75,0xee,0x1a,0xdf,0xb3,0x4d,0x22,0x79,0x2e,0xbb,0x87,0xa1,0x43,0x2a,0xdb,0x54,0x32,0xeb,0x1d,0x4c,0xbd,0x77,0xa7,0xfd,0x16,0x11,0x90,0xe0,0x38,0xc5,0xef,0x72,0xe6,0x5e,0xb9,0x77,0xfc,0xd8,0x00,0xe2,0xa5,0x11,0xc2,0x84,0x94,0xa4,0xdd,0xa9,0xea,0xc1,0x5a,0xb7,0x9a,0x07,0x14,0xd0,0x74,0x2c,0x44,0x01,0x58,0x0a,0xca,0x8d
.byte 0x3b,0x27,0xda,0x02,0xeb,0x40,0x91,0x5f,0xd4,0x47,0x87,0xdf,0x5e,0x88,0xbe,0x8f,0x23,0xde,0x28,0x61,0xb5,0x93,0x74,0x47,0x14,0x1b,0x3e,0x03,0xa3,0x38,0x71,0x06,0xe8,0xf1,0x60,0xd8,0xc4,0x6d,0x91,0x42,0x72,0xdf,0xd7,0xe4,0xf8,0xce,0xdc,0xae,0x55,0xb6,0xee,0x2a,0x60,0xe7,0xc6,0x86,0x3c,0x6a,0xf4,0x05,0x09,0xf2,0xdd,0xb0
.byte 0xf5,0x9d,0x4d,0x49,0xc2,0xc1,0xb6,0x6a,0x00,0xac,0x6c,0xf5,0xc1,0x03,0xb2,0x2c,0x16,0x9b,0x16,0xe3,0x98,0x3b,0x79,0x1a,0x07,0xed,0x55,0x9d,0x0a,0x48,0x7b,0x22,0x75,0x9a,0x20,0x98,0x3a,0x8c,0x93,0xdd,0xe4,0x9e,0x1b,0xc3,0xf1,0x1f,0x64,0x63,0xa5,0x37,0x51,0x7f,0xaf,0x10,0xb3,0x35,0x9b,0xba,0x7f,0x78,0xf1,0xd8,0x9f,0x65
.byte 0x1c,0x8a,0x03,0x05,0x88,0x2d,0xd9,0x1c,0x8a,0xd3,0x52,0x71,0x20,0xf7,0xb7,0x47,0xef,0x9a,0xea,0xa4,0xd0,0x58,0x3f,0x4b,0x0e,0xe3,0xe4,0x88,0xb4,0xdc,0x75,0x31,0xa4,0xb6,0xf0,0x33,0x2f,0xc4,0xa2,0x0f,0x59,0x2e,0xa7,0x14,0x60,0x03,0x68,0xce,0x4f,0x41,0xf1,0x2c,0x49,0x18,0x34,0x70,0xbb,0x35,0xa7,0xcc,0x09,0x60,0x7b,0x0e
.byte 0xc1,0x4e,0xdb,0xb6,0xfe,0x19,0x7a,0xeb,0x9b,0x9d,0x9c,0x6e,0x21,0x69,0xa5,0x8c,0xc5,0x0e,0x27,0x13,0x52,0xa2,0xaa,0x83,0x72,0x73,0xac,0xc3,0xd3,0x8b,0x92,0xd0,0xdc,0x79,0x22,0xcd,0x81,0x94,0xc3,0xb1,0xd3,0xf0,0xbb,0x0a,0x43,0x33,0xdc,0xf5,0x8e,0xd7,0x48,0xfa,0xbb,0x3c,0x47,0xd4,0x95,0xad,0x25,0xf0,0x39,0xf0,0x69,0x3d
.byte 0xbb,0xf7,0xf3,0x0d,0x60,0x42,0x3e,0x50,0xff,0xa3,0xf3,0x54,0x4f,0xdb,0x5e,0xfa,0x3c,0x17,0xc8,0x4c,0xcf,0xe8,0x2d,0xcc,0xa7,0x73,0x15,0x6c,0xe6,0x5c,0x90,0xa1,0xce,0xef,0xc5,0xd5,0x1f,0x1f,0xc5,0xe0,0x6d,0xb2,0xd6,0xde,0x68,0x8f,0x73,0xa2,0x48,0x15,0xbf,0xd7,0x86,0x6a,0x11,0x36,0xde,0x60,0x69,0x86,0xb0,0x42,0xec,0xa6
.byte 0xd5,0x5d,0xfc,0x51,0x20,0xd3,0x48,0xcf,0x22,0x2f,0x3c,0x87,0x07,0x57,0x44,0xec,0x63,0x2c,0xbd,0x14,0x21,0xa2,0x4f,0x2e,0xf2,0xce,0xb4,0x25,0xf8,0x66,0xd9,0xd5,0x16,0x10,0x1d,0x3f,0x00,0xfa,0x95,0xf8,0xb6,0xb3,0x67,0x23,0x2e,0xfb,0x65,0xfd,0x16,0x80,0x81,0xc0,0x62,0xbd,0x68,0x60,0x94,0xc1,0x49,0x50,0x63,0xe7,0xf5,0xc6
.byte 0x87,0x6a,0xaf,0xbf,0x6f,0x88,0x7a,0xbb,0x9d,0x59,0xf0,0x94,0x1b,0xed,0x6e,0x52,0x52,0xd7,0xea,0x3a,0x89,0xa3,0x86,0xab,0xf2,0x32,0x28,0xf7,0xe3,0x50,0x6f,0xbe,0x9b,0xab,0x73,0x0f,0xe2,0x9c,0x0b,0xaa,0xba,0xb7,0xfb,0x99,0x09,0xe6,0x76,0xa5,0x4e,0x2a,0x56,0xdc,0x07,0xca,0x7c,0xfa,0xc5,0x36,0x89,0xe3,0xaf,0x9c,0x67,0x9f
.byte 0xbc,0x94,0x35,0xb8,0xee,0xf9,0xf5,0x04,0x20,0xe0,0xed,0xc2,0x3c,0x7a,0x4a,0xc0,0x9b,0x28,0xf0,0x14,0xd2,0x08,0x40,0x3a,0x6e,0xc3,0xce,0xcc,0x4f,0x8f,0x3d,0xd9,0xca,0x8b,0xf7,0x5d,0xe5,0x0f,0x7a,0x85,0xaf,0xa1,0x9d,0xbd,0x28,0x07,0xee,0x54,0x2e,0x23,0x18,0x1d,0xc9,0x6b,0x67,0x2b,0x12,0x33,0x0d,0x8b,0xf4,0x7f,0x34,0x47
.byte 0xfb,0x2c,0x55,0x3c,0x66,0x32,0xe6,0xa0,0x97,0x3b,0x8a,0x1e,0xc8,0xcf,0xd3,0x72,0x76,0x87,0x8c,0x8e,0x0f,0xfa,0x3a,0x37,0x99,0x0f,0x2b,0xfd,0x1c,0x5c,0x4f,0x81,0x87,0x80,0x2d,0x02,0xb9,0xeb,0xe3,0x66,0xe3,0xa0,0x09,0x38,0x2c,0x48,0xbc,0x91,0x38,0x3a,0x7b,0x2a,0x63,0x0d,0x67,0x27,0xd8,0xde,0xe9,0xab,0x1a,0xf2,0x46,0x53
.byte 0xcc,0x80,0x5a,0x02,0x61,0xd1,0x18,0xd6,0x05,0x66,0xec,0x48,0x51,0x5d,0x91,0xa8,0x55,0x52,0x8d,0x56,0xa6,0x89,0xf2,0xe5,0x99,0x87,0x09,0x59,0x70,0x1f,0x11,0x1d,0x0d,0x3d,0x67,0x8f,0x9a,0x82,0x4f,0x81,0x21,0x0f,0xe6,0xeb,0x52,0xd0,0x21,0xb1,0x55,0xeb,0x59,0xfa,0x49,0x1e,0xb7,0x03,0x5b,0xe0,0x50,0xd4,0xf9,0xfd,0x41,0xa9
.byte 0x7a,0x5a,0xee,0xca,0x0b,0xdc,0xa1,0x32,0xd2,0x7f,0x72,0x1e,0xae,0x93,0x01,0xc0,0x34,0x79,0x32,0xaf,0x5f,0x60,0xba,0xc6,0x34,0xda,0xe3,0x85,0x0f,0xe1,0xe3,0x66,0xcd,0x3d,0xe4,0xfd,0xbc,0x1f,0x23,0x29,0x38,0x5e,0x8e,0x24,0xff,0x8d,0x23,0xaf,0x7d,0xd7,0x7f,0xd6,0xb2,0xca,0x1d,0xda,0x22,0xb1,0x2a,0x73,0x8e,0x3b,0xf3,0xee
.byte 0xbb,0x60,0x6f,0x7b,0xfd,0x84,0x2c,0x8c,0xcb,0x13,0x31,0x5c,0x7c,0x77,0x57,0x39,0x0f,0x03,0x12,0xc9,0xa1,0x2f,0x72,0x62,0x3f,0x0e,0x70,0xd2,0x62,0x40,0x60,0xb6,0x24,0xbc,0x12,0xa4,0x24,0xbb,0x77,0x94,0xce,0x0a,0xd5,0x4a,0xba,0x9b,0x5e,0xa2,0x04,0xcd,0xe5,0x3d,0x2b,0x3b,0xa0,0x76,0x0f,0xfd,0xe7,0x0a,0x46,0x2a,0x98,0x09
.byte 0x9f,0x7c,0xd7,0xc3,0x33,0x4c,0x34,0xa4,0x2f,0x55,0x38,0x93,0xfb,0x9a,0xd5,0x75,0x22,0xdd,0x84,0x32,0x15,0xbe,0x43,0x73,0xa2,0xbe,0x23,0x1c,0x8e,0x3e,0xee,0xad,0xa7,0x54,0x8b,0xbe,0x9b,0xc8,0x6a,0x78,0x62,0xf1,0xb2,0x36,0x0e,0x00,0xfd,0xd0,0x9f,0x70,0xcc,0x2a,0x94,0x3e,0xe7,0x8c,0x60,0x4b,0xe6,0xc1,0x8c,0x65,0x0b,0x1a
.byte 0xe2,0xfd,0xfd,0xe8,0xa0,0x85,0x8f,0x1d,0x2c,0x5b,0x34,0x30,0x1a,0x6f,0xe6,0xe9,0x75,0xbc,0xcf,0xc4,0x6d,0x12,0xb5,0xff,0x3d,0x56,0x4a,0x08,0xbf,0xbd,0x8b,0xd1,0xfe,0x37,0x31,0x2b,0xe8,0x7d,0x6b,0x97,0x99,0x80,0xd9,0x22,0x2f,0x4c,0xc4,0xa6,0x98,0x24,0x42,0x07,0x4b,0xbc,0x4f,0x14,0x6b,0x15,0x90,0x27,0xf6,0x9f,0x2f,0x42
.byte 0xfd,0xcc,0x51,0x1c,0xf0,0x8e,0x28,0xf6,0xea,0x3f,0xc0,0x65,0x17,0xc8,0xf7,0x90,0xf4,0x54,0x9d,0xc5,0x53,0x11,0x5c,0x90,0xcb,0xa8,0xe8,0xd2,0x0c,0x6b,0xb7,0x15,0x0d,0x2c,0x6d,0x7c,0x2e,0xb9,0xc9,0xde,0x31,0xec,0x85,0x74,0x93,0x95,0x06,0x1d,0x0c,0xed,0xd4,0x77,0x65,0x91,0x3f,0xa4,0xa5,0x90,0x63,0x63,0xcd,0x73,0x13,0xe7
.byte 0xad,0x39,0x22,0x37,0x41,0x7b,0xf8,0x64,0x14,0xe6,0xe0,0x93,0xc2,0x91,0x4f,0x34,0x0b,0x01,0xef,0x9a,0x27,0x0e,0xe7,0xf5,0x0b,0x7e,0xb1,0x13,0xa5,0x24,0xcf,0xdb,0x54,0xf8,0x32,0xae,0x01,0x2e,0x61,0x0e,0x73,0x36,0x4a,0x17,0x6c,0xdb,0x9a,0x80,0x6e,0x91,0x54,0x7b,0xa9,0x85,0x27,0x08,0x75,0xb3,0x1f,0x82,0xa5,0x3d,0x67,0x99
.byte 0x7b,0x38,0xb9,0x21,0x3f,0xa1,0x06,0x7d,0xde,0xc9,0xef,0x4d,0xca,0x8d,0xa2,0x5a,0xa1,0x85,0x03,0xe2,0x8b,0x8f,0x4f,0xc5,0x47,0x8d,0xb6,0x8d,0xd3,0x8d,0x0a,0x11,0xa5,0x45,0x7b,0x2e,0x38,0x1b,0xb6,0x23,0x17,0x89,0x06,0xe5,0x25,0x5c,0x5e,0x95,0x2f,0x61,0x48,0x5a,0x55,0x40,0x7e,0x0f,0x2b,0xd8,0x2b,0x7e,0xfb,0x3b,0xa9,0xf4
.byte 0x26,0x65,0x70,0x46,0xdb,0x1f,0xa7,0x16,0xfa,0xd4,0x5e,0x6c,0xaa,0x7c,0x2e,0x69,0xf1,0x55,0xb2,0x99,0x1e,0xed,0x54,0x5e,0xb4,0x70,0x42,0xf1,0xa5,0x68,0xd4,0x02,0x59,0x07,0x82,0x35,0x67,0xe6,0x21,0x08,0xb6,0x23,0x2d,0xa0,0xe3,0xe5,0xef,0x4c,0xe0,0x7f,0xb0,0x30,0xa5,0xc1,0x5e,0xea,0x5d,0xeb,0xe3,0x97,0x9f,0x5c,0xf7,0x91
.byte 0x8e,0x8d,0xac,0xe3,0xdc,0xd6,0x94,0x93,0x0f,0xaf,0x07,0x21,0x0c,0x20,0x0d,0x73,0xe2,0x0e,0x9f,0x77,0xb8,0xd5,0x0c,0xd8,0x64,0x49,0x34,0xe0,0xa1,0xe7,0x42,0xfb,0xfd,0x30,0x03,0x2e,0x2c,0xb7,0x9a,0x17,0xe5,0xa6,0x34,0x8d,0xe4,0xcf,0xf8,0x47,0xb7,0xf0,0xc1,0xb4,0xee,0x2b,0xbe,0x07,0x7c,0x99,0x48,0xb3,0x42,0xb6,0xf1,0x98
.byte 0x45,0xd4,0x53,0xff,0x27,0x26,0x2e,0xa5,0x74,0xfc,0xa8,0x09,0x37,0x16,0xf6,0xb2,0xad,0x5b,0xee,0x51,0xcc,0x09,0x90,0x4e,0x5f,0xd0,0x72,0xd7,0xbb,0xd6,0x85,0xd6,0xe4,0xab,0xf8,0x7d,0x02,0xe0,0xc2,0x51,0xce,0xac,0x8b,0xf1,0x91,0x63,0xb4,0x2e,0xb5,0xe2,0x3a,0xac,0xf6,0xb0,0xd9,0x4a,0x90,0xef,0x66,0x19,0x2c,0xbd,0x87,0xae
.byte 0xa1,0xee,0x08,0x5e,0x88,0xde,0x1c,0x47,0xeb,0x07,0x20,0x95,0xb2,0xdf,0xfc,0xd7,0xe2,0x44,0x45,0xbc,0x56,0x48,0x46,0x26,0xef,0xce,0xf9,0x0f,0xf6,0xab,0x33,0xf0,0x35,0xc8,0x39,0xd6,0x91,0x9e,0x02,0xe7,0xc5,0x30,0x3a,0x1d,0x78,0x51,0xa7,0x48,0xc9,0xc9,0x7c,0x09,0x0e,0xa1,0x89,0x0b,0x54,0xbb,0xc6,0x65,0x16,0xb6,0xb1,0x82
.byte 0xa6,0x53,0x8b,0x20,0x25,0xf2,0xfb,0x6d,0x4e,0x5e,0xf6,0x62,0xe9,0x14,0xbc,0x0a,0x68,0x09,0xa7,0x79,0xc1,0xad,0x9d,0x45,0x75,0xbd,0x96,0x3b,0x27,0x93,0x10,0x10,0x34,0x98,0x96,0xf6,0x0e,0x24,0x92,0x1f,0x00,0xf4,0x9e,0x55,0x08,0x76,0x83,0xef,0xd8,0xad,0xcb,0xcc,0x82,0x25,0xe3,0x7d,0xd3,0xb3,0xc5,0x35,0x8f,0x5d,0x9a,0x56
.byte 0xe7,0x03,0xf2,0xa2,0x40,0x44,0x5c,0x1e,0xb6,0x53,0x1f,0xe1,0x65,0xa9,0xa1,0x06,0xa1,0x1b,0x96,0x2e,0xcc,0xce,0x99,0x11,0x26,0x2b,0x1b,0xd6,0x38,0x45,0x56,0x87,0x3d,0xf3,0x42,0xe2,0xa4,0x57,0x11,0x95,0x8c,0x07,0xd0,0xb0,0x82,0xcc,0x75,0x30,0x5c,0x61,0x72,0x5a,0x22,0xd7,0xa2,0xb3,0xa1,0x1c,0xa2,0xfa,0xaa,0x71,0x31,0xc2
.byte 0xde,0xf5,0x3f,0x52,0x02,0x25,0x86,0x37,0x1c,0x1e,0x67,0x3f,0x8b,0x1a,0xe9,0x0a,0x5e,0xe5,0xef,0x14,0xe0,0x69,0x47,0x6d,0xb3,0xbd,0xd2,0x44,0xbf,0x1a,0xdc,0x71,0xe6,0xd8,0xf8,0x7a,0x1e,0xf6,0x67,0xdb,0x96,0x2f,0xab,0x8d,0xfa,0x4b,0x16,0x02,0xf9,0xdd,0x9a,0x5d,0xd3,0xf1,0x34,0x9f,0x78,0xf0,0x30,0xdd,0x5f,0x59,0x24,0x39
.byte 0xa2,0x4b,0xc4,0x66,0xf5,0xc9,0xbd,0x4c,0x0e,0xd3,0x54,0x01,0x50,0x3a,0x12,0xd9,0xd9,0x25,0x56,0xf2,0x29,0x74,0xd8,0x3b,0x7d,0xf8,0x5d,0x60,0xc7,0x72,0x4b,0xb9,0xb0,0xb2,0xc9,0x5f,0xdf,0x4e,0x6d,0x6e,0x0f,0x97,0x19,0xe6,0xaf,0x1d,0xfb,0x70,0xc5,0x62,0xb9,0xb1,0xa4,0x4b,0x3d,0x26,0xe9,0xd2,0x3d,0x44,0x61,0x1d,0xbe,0xe0
.byte 0x3e,0x7d,0xe4,0x77,0x41,0x37,0xa0,0x9b,0x60,0x57,0x62,0x05,0x4c,0x04,0x68,0xfb,0x47,0xcf,0x48,0x48,0xa0,0x86,0x22,0xea,0x9f,0x49,0x89,0xc3,0x7c,0x4c,0x5c,0xde,0x31,0xad,0x85,0xf7,0x99,0x00,0x4e,0x64,0xbd,0xd1,0x6e,0xa0,0xd8,0xfb,0x71,0x08,0x44,0x7d,0x22,0x75,0x78,0x5f,0xe4,0x6b,0xce,0x28,0xd8,0x47,0x9d,0xb1,0x31,0x68
.byte 0x1a,0x91,0x4f,0x94,0x25,0x6d,0x9f,0xc8,0x21,0x77,0xaf,0x4e,0x98,0xc5,0x9d,0xf9,0x52,0x5f,0x0a,0x23,0x61,0x0e,0xda,0x11,0xad,0x43,0xae,0x82,0x07,0x5b,0xc8,0x1f,0xee,0x15,0x65,0xf0,0x30,0xb4,0x97,0x55,0xdd,0xbd,0xcf,0x01,0x37,0x14,0xd5,0x6e,0x12,0xe4,0xa5,0x20,0x38,0xea,0x4c,0x61,0x68,0x8c,0x47,0x68,0xfd,0xd5,0xda,0x36
.byte 0x8c,0x18,0x31,0x7c,0x5a,0xde,0x03,0x1d,0xb3,0xe2,0x17,0xe8,0x5a,0x7b,0x9b,0x0f,0x2a,0xac,0x1d,0x79,0x8d,0xb4,0xbe,0x41,0x00,0x0a,0x8e,0x75,0xa6,0x69,0x7a,0x17,0xe7,0x29,0xd4,0xcd,0xd5,0xbc,0x5c,0x17,0x53,0x17,0x3c,0x58,0x4b,0x44,0x39,0xa8,0x6b,0x7b,0x01,0x05,0xe3,0x33,0xd8,0x8e,0xb8,0x25,0xe6,0xe5,0x15,0xe3,0x2d,0xb4
.byte 0x75,0x2e,0x4e,0x7c,0xd5,0x19,0x56,0x9d,0x55,0xca,0xf7,0xd0,0x40,0x2d,0x98,0x4d,0x17,0x29,0xec,0x87,0x0e,0xb1,0x9b,0x80,0xb6,0x34,0xe6,0xe8,0xdf,0x2b,0x91,0x5a,0x4f,0x68,0x1e,0x2d,0x99,0x9f,0xf8,0x94,0xab,0x58,0xa8,0x02,0x99,0x52,0x42,0xf9,0xb0,0xe1,0x21,0x0d,0xb6,0xad,0x1f,0xce,0x77,0x53,0x1f,0x37,0x7b,0x19,0xf9,0x1c
.byte 0x84,0xfb,0x7a,0x81,0x37,0xd5,0xd7,0x28,0xfe,0x11,0x03,0x1b,0xd1,0x75,0x68,0x85,0x4a,0x59,0x42,0x8a,0xca,0x48,0x32,0x54,0x1b,0x5d,0x4d,0xa0,0x8f,0xc2,0x01,0xf5,0xab,0x53,0xb0,0xa2,0x64,0xfe,0x0f,0x82,0x0b,0xeb,0xdb,0xd5,0xfc,0xf1,0x8a,0xf8,0xf4,0x71,0x16,0xc4,0xe7,0x0f,0x61,0xe5,0x04,0xb1,0xdc,0x47,0xed,0x3e,0xe7,0x5d
.byte 0x22,0x65,0x4e,0xc9,0xd9,0x37,0x1d,0x0f,0xc9,0xee,0x86,0x47,0xa0,0x59,0x32,0x80,0x76,0xd1,0xf8,0x23,0x36,0xca,0x5d,0x26,0x6f,0x19,0x62,0x0c,0x23,0xaa,0xb3,0xa9,0x4f,0xc9,0x78,0x6d,0x1e,0xa6,0xf6,0xc2,0x88,0xbc,0x7e,0x38,0xaa,0x88,0x8f,0xad,0x95,0x13,0x80,0x5b,0x0a,0x95,0x5d,0x2d,0x2d,0xb0,0x81,0xf7,0x54,0x98,0xa8,0xfd
.byte 0x4b,0x67,0x66,0x96,0xc2,0x58,0x5f,0xef,0x7f,0xc2,0xa5,0x2d,0xf1,0xdc,0x6e,0xf3,0x70,0x23,0x2b,0xe6,0xad,0x9f,0x52,0x58,0xa0,0x68,0x44,0xdb,0xf8,0x8e,0x9e,0x74,0xe5,0x84,0xc2,0xfa,0xd6,0x0c,0x16,0x22,0x0c,0x7b,0xf1,0x33,0x29,0x9a,0x6c,0x19,0xab,0xe0,0x61,0x81,0x02,0x6c,0x3b,0xe6,0xb9,0x5d,0x8a,0xb3,0x85,0x88,0x95,0x17
.byte 0x73,0x55,0x6a,0xd6,0xe4,0xa3,0xbc,0x36,0x7e,0x87,0x5f,0x63,0x6d,0x76,0x5f,0xba,0x29,0x20,0x98,0xc6,0x60,0x30,0xc3,0xa8,0x07,0x48,0xcf,0x0c,0x47,0x76,0x17,0xf3,0xa9,0x5b,0x3b,0xd7,0x57,0x3c,0xde,0x7f,0x00,0xd2,0x4f,0xba,0xdc,0x45,0xd1,0xbd,0xf4,0x6b,0x87,0xbd,0x48,0x4f,0xb4,0x7d,0x7a,0xd7,0xf7,0xda,0x96,0xd7,0xe0,0x7c
.byte 0x3c,0x6b,0x27,0x89,0x69,0x53,0x78,0x75,0xf6,0xb6,0x1b,0x92,0xd1,0x99,0x5c,0xdb,0xda,0xbf,0x48,0x59,0x7e,0x24,0xb6,0xa9,0x33,0xd9,0x8b,0x09,0xcb,0x15,0xe4,0xd8,0x72,0xcc,0xfb,0x1d,0x0b,0xc9,0x0a,0x78,0xec,0x2e,0xc1,0x58,0x0b,0xd2,0x78,0xa1,0xf0,0x1c,0x67,0x9f,0x9d,0xe2,0xce,0x04,0x33,0xa3,0x7e,0xc5,0x40,0x62,0x8b,0x8b
.byte 0x2f,0x72,0x66,0x8f,0x57,0x43,0xe5,0x06,0x28,0x43,0x24,0xdc,0xa1,0x12,0x07,0x27,0xfa,0xd2,0xb8,0x92,0xe8,0xc5,0x33,0x1e,0xa1,0x2c,0xf2,0x94,0x5b,0x9a,0x5f,0xbe,0x05,0x51,0xa8,0x6e,0x4a,0xa4,0x10,0x9d,0xa7,0x9e,0x97,0x97,0x1b,0x91,0x1c,0x85,0x8a,0x96,0x6e,0xc7,0x02,0x8e,0x59,0x38,0x8b,0xea,0xf7,0xc5,0xeb,0xa7,0xd2,0xfb
.byte 0xde,0xdd,0x47,0x61,0xbc,0x08,0x03,0xbe,0x48,0xcc,0xd4,0x11,0xe4,0x5a,0xd9,0x6a,0x58,0x0c,0x7e,0xd8,0x53,0x04,0xaa,0x27,0xfe,0x90,0x99,0x08,0x16,0x1e,0x88,0xf1,0x60,0x3b,0xba,0xfc,0xf2,0x04,0x14,0x4a,0x3d,0x57,0x40,0x56,0xc3,0x76,0x01,0xf5,0x8c,0x1a,0xde,0xd9,0x6e,0x1d,0x37,0xf7,0xa6,0xd6,0x57,0xcf,0xa1,0xea,0xf7,0x26
.byte 0xdc,0x85,0x76,0x61,0x47,0xcc,0x4b,0xce,0x00,0x04,0x4b,0xbe,0xbd,0x17,0x61,0x49,0x17,0x18,0xb4,0x17,0xcd,0x19,0x03,0xb6,0x78,0x1d,0x8b,0xa6,0xf2,0xed,0xb2,0x38,0xf4,0xf1,0x7f,0x15,0xb3,0x3e,0x1e,0x5f,0xa0,0xe5,0x0b,0xf3,0xc3,0xb0,0xdd,0x0a,0xda,0x78,0x06,0xc6,0xe3,0x9c,0xee,0xaa,0xe3,0x93,0x08,0x9c,0x8f,0xc7,0x03,0x5f
.byte 0xad,0x66,0xc2,0xf3,0x9f,0xce,0x24,0x81,0x93,0xfa,0xc0,0x9f,0xda,0x5c,0x38,0xcf,0x69,0x0e,0x0d,0x9b,0x22,0xc7,0xa1,0x62,0x94,0xf1,0x7a,0xf6,0x54,0x14,0xcc,0xc1,0xa4,0xd6,0xd0,0xb6,0x12,0x94,0x97,0x96,0x4d,0xa6,0xce,0x84,0x7f,0x0f,0x19,0xf2,0x6d,0xba,0x3e,0xf2,0x50,0x06,0xc7,0x53,0x62,0xb4,0x9b,0xf4,0x82,0x48,0x85,0x2b
.byte 0xa6,0xab,0x65,0xff,0x18,0x4e,0x72,0x2f,0xfb,0x9f,0x73,0x08,0x80,0x12,0xe6,0x6b,0x81,0xf9,0x70,0x9d,0x38,0xbb,0x59,0x65,0x60,0xb6,0x89,0xbc,0xd5,0xf9,0xbd,0xbd,0xb5,0x17,0xcb,0x41,0xb8,0x29,0x87,0x11,0xd2,0xe5,0x06,0xfa,0x60,0x11,0x75,0xd8,0x83,0xcb,0x65,0x6c,0xb7,0xaf,0x86,0x41,0xb8,0x0d,0x4a,0x6c,0x48,0xf2,0x21,0x06
.byte 0xab,0xd5,0xa5,0xef,0x62,0x51,0xbe,0x29,0xb0,0x02,0x77,0x0e,0xba,0xc8,0xac,0x77,0x97,0xeb,0x3f,0x83,0x17,0x54,0xa9,0xe6,0x1f,0xfd,0xc8,0xb2,0x64,0x89,0x78,0x39,0xe7,0xb9,0x4f,0xd4,0x6e,0x00,0xc3,0x8d,0x9a,0x11,0x4a,0x2a,0x3a,0x0d,0xa2,0x5a,0xe5,0xe3,0xf3,0xa3,0xa9,0x77,0x91,0xdd,0xa5,0x7d,0x1a,0xe9,0xa4,0xf1,0x78,0xaa
.byte 0x4e,0x93,0xb7,0x89,0x03,0x1a,0xba,0xa4,0x1b,0x2e,0xe6,0xfc,0xdf,0x3f,0x99,0xda,0x1d,0xa1,0xec,0x4a,0xc8,0x4b,0x28,0x24,0xb3,0xe5,0x1e,0xbf,0x85,0x74,0x8b,0xba,0xd5,0x5b,0x6c,0xd1,0x59,0x55,0x95,0xb3,0x6a,0x5f,0xd6,0xee,0x7a,0xf7,0x69,0xf5,0xb9,0xda,0xe6,0xdf,0x37,0xa3,0x61,0x4f,0x87,0xe8,0x13,0x1e,0x7a,0xab,0x98,0x79
.byte 0xd2,0xd6,0x0b,0x1d,0x2a,0x9c,0xe4,0x09,0x82,0x75,0x0b,0x45,0xa1,0xf2,0xa9,0x01,0x51,0x71,0x32,0xf6,0x23,0xaf,0xd4,0xe6,0x69,0xf1,0x08,0x0f,0x68,0x1c,0x47,0xe1,0x34,0xb8,0xd4,0x9a,0x98,0xb5,0x5a,0x95,0x24,0x1f,0x78,0xaa,0x51,0x63,0x95,0x61,0xc2,0xd3,0xcd,0x88,0xfb,0x8a,0x8c,0x75,0x94,0x0d,0x34,0x3f,0x7e,0xb0,0x40,0xaf
.byte 0x45,0x65,0xe4,0x70,0xb9,0x86,0xf2,0x5d,0x4b,0x96,0xa4,0x0c,0x33,0xe0,0x6a,0x54,0x3a,0x21,0xae,0xd2,0x66,0x12,0x96,0x15,0x22,0xbb,0x08,0x3e,0xcf,0xd7,0x55,0x82,0x33,0x0a,0x6c,0x82,0xa1,0x2c,0x0d,0x08,0x96,0x7a,0xc4,0xc0,0x46,0x32,0x28,0xf3,0x59,0xbf,0xc7,0xfd,0x47,0xe7,0xc7,0x11,0x97,0x2b,0xa3,0xdf,0x44,0x30,0xe8,0x26
.byte 0xa4,0xfe,0x90,0x21,0x31,0xb6,0xed,0xe0,0x39,0x1f,0xfb,0x0b,0x94,0x00,0x2c,0x30,0x80,0x89,0xde,0x36,0x8c,0x73,0x7b,0x96,0x03,0x27,0xe0,0x99,0x37,0x63,0xc6,0xc5,0x49,0xa9,0xe9,0xca,0x88,0x3e,0xcb,0x87,0x23,0x84,0xa5,0xc8,0xa7,0xf4,0x1c,0x45,0xae,0x63,0xf8,0xca,0x58,0x4e,0x5b,0xa1,0x02,0x9a,0xd5,0xc1,0xb4,0xa7,0x2f,0xe4
.byte 0xab,0x54,0x3e,0x50,0x7d,0xcb,0x40,0x5d,0x13,0x8d,0x06,0xdf,0x1a,0xe9,0x35,0x32,0xac,0xa9,0x66,0x75,0x32,0x9b,0x4b,0x61,0x5d,0x3d,0x0a,0x8c,0xfe,0xfb,0x5f,0xc8,0xc0,0xcd,0xa8,0x81,0xd0,0xfb,0x45,0xb7,0x7b,0x86,0x58,0xb0,0x3d,0x77,0x27,0x76,0x1b,0x10,0x5f,0x8d,0xe0,0x54,0x89,0xab,0x51,0x41,0x11,0x9a,0x7b,0xe5,0xa5,0xee
.byte 0xa7,0xfe,0x31,0x63,0xf9,0x66,0xf6,0x83,0x20,0x2c,0xe9,0x25,0x2e,0x75,0xff,0x9e,0x1b,0x81,0xe0,0xdc,0x55,0xa2,0x34,0x9c,0xaa,0x1c,0x6e,0xfc,0x98,0x10,0x99,0xce,0x31,0xe1,0x5f,0xb6,0x0b,0xab,0xa4,0x7c,0xd0,0x48,0xfd,0xd1,0xd6,0xf3,0x6a,0x4c,0xfc,0xba,0x4a,0x70,0x19,0xe1,0x5a,0x9b,0x1d,0x93,0xf5,0x8f,0x32,0x83,0xbc,0x04
.byte 0xe0,0x25,0xf8,0x41,0x16,0x10,0x88,0x30,0xa9,0x7a,0x47,0x40,0xad,0x88,0x43,0x20,0xe0,0x21,0x81,0xfb,0xbe,0xff,0xd2,0xad,0x37,0x9f,0xf7,0x5c,0xfb,0x89,0x46,0xc0,0x48,0xde,0x0a,0x06,0x94,0xec,0x2d,0xce,0x60,0xf0,0x58,0x62,0x55,0xf9,0x4b,0x61,0xff,0xc9,0x75,0x90,0x38,0x13,0x72,0xb4,0xd4,0x84,0x93,0x0b,0xff,0xfd,0x4d,0xbf
.byte 0xce,0x5c,0xac,0x31,0x78,0x1d,0x19,0x3e,0xf1,0xcc,0x28,0x14,0x40,0x19,0x0f,0x5f,0x77,0x13,0x11,0xa1,0x96,0x3a,0xe5,0xb6,0xec,0x4f,0x12,0x98,0x81,0x11,0x9e,0x8c,0xd5,0xa3,0xb6,0xa1,0x62,0x63,0x02,0x28,0xec,0x3c,0x4a,0x65,0x69,0xab,0xd6,0xc3,0xcf,0x73,0xa6,0xaa,0x9e,0xa1,0xb9,0x70,0x61,0xfe,0xd3,0x48,0x9f,0xe3,0xc2,0x8f
.byte 0x76,0x91,0xc1,0x7c,0xef,0x2e,0x3a,0x35,0x35,0xe4,0x6a,0x4c,0x94,0x11,0x92,0x72,0xde,0x7c,0xaa,0x76,0xa4,0x59,0x31,0xd7,0x83,0x12,0x67,0x45,0x0a,0x78,0xe5,0x90,0x06,0x4e,0x73,0x04,0x57,0x53,0x9b,0xa2,0x01,0x7c,0x54,0xfb,0xfe,0xb7,0xd2,0x46,0x3a,0x7f,0xc7,0x38,0xb2,0x94,0xcb,0x37,0x3a,0xd8,0x29,0x3b,0x02,0xfa,0x29,0xd7
.byte 0x68,0xed,0x3a,0x8e,0x6e,0x28,0x6d,0x93,0x2d,0x72,0xd2,0xb0,0xf9,0x8c,0x55,0xf6,0x2e,0x87,0x2c,0xce,0x7d,0x8f,0xe5,0x45,0xf5,0x88,0x03,0x19,0xc4,0x1c,0x93,0x0a,0x92,0x60,0x02,0xf8,0x1b,0xc5,0xba,0xf3,0x01,0x55,0xfd,0xd3,0xc1,0xe0,0xb7,0x23,0x7e,0x06,0xb5,0xe2,0x2c,0xbb,0x09,0xba,0xc3,0x03,0xf9,0xa1,0xd1,0x84,0xfe,0xd0
.byte 0xf6,0xac,0x99,0xff,0x08,0xe7,0x49,0x35,0x3a,0x06,0x33,0x15,0x2f,0xf6,0x4a,0xce,0xfe,0x4c,0xc4,0x8f,0x76,0xbf,0x86,0x49,0x3e,0xb0,0x93,0xa7,0x25,0xa3,0xc8,0x7b,0xfb,0x55,0x12,0x0c,0x36,0x93,0x3b,0x3d,0x04,0xd2,0xc3,0x85,0xb8,0xa5,0xa3,0x62,0x1e,0x74,0x1a,0xcb,0x81,0x89,0x38,0x59,0x06,0x8f,0x4a,0x71,0xd0,0x80,0xda,0x02
.byte 0xaa,0xdb,0x88,0xc8,0xf3,0x33,0x52,0x30,0x29,0x15,0xd9,0xfb,0x19,0x9e,0x4e,0xcd,0x9c,0x7c,0x43,0x42,0xe1,0x24,0x37,0x55,0x75,0x5a,0x0a,0x64,0xf8,0x8b,0x9f,0x45,0x89,0x61,0x0a,0xc1,0xc8,0x3a,0x92,0x59,0x2c,0x9e,0xdc,0x69,0xe1,0xad,0xe0,0x67,0xd5,0x64,0x82,0x8c,0x76,0xf4,0x9c,0x57,0x06,0xe4,0xa9,0x05,0xb2,0xab,0x6d,0x20
.byte 0x35,0x3d,0x85,0xf2,0x83,0xb6,0xc7,0xa8,0xb6,0xc2,0xc1,0x04,0xe9,0x56,0xde,0xb8,0x29,0xf9,0x4e,0x1f,0x7e,0xbe,0xbb,0xa2,0x07,0x7a,0xdd,0xfc,0xe5,0xf9,0x4a,0xfc,0x85,0x4b,0x94,0x84,0x22,0x1f,0x18,0xbc,0x61,0xb3,0x2d,0x4f,0xd8,0x64,0x9c,0x6e,0x07,0x35,0x0a,0x90,0xf8,0x54,0xf1,0x51,0x5f,0xa1,0xc0,0x0c,0x2b,0xfb,0x27,0x07
.byte 0x9a,0x85,0x29,0x3e,0x9a,0x1c,0x6b,0xbb,0xd9,0x13,0x70,0x27,0x92,0xb4,0x17,0xba,0x27,0x7e,0x2a,0xfe,0xaf,0x4b,0x47,0x5f,0x78,0x03,0xe4,0xba,0x6f,0xb4,0xaf,0xe2,0x3a,0xc8,0xc8,0xd0,0x5c,0x5b,0x6e,0x1a,0xf1,0x55,0xb8,0x7a,0x82,0xf5,0x38,0x3f,0xda,0x29,0xa2,0xce,0xf0,0xe8,0x1f,0x61,0xf1,0x3a,0x1a,0x3c,0x2f,0x2f,0xeb,0xe3
.byte 0x04,0x2e,0x88,0x4d,0x57,0x58,0xeb,0xa9,0xd2,0xb0,0x2c,0x99,0xfe,0x13,0xc0,0x0b,0x89,0xbb,0xaa,0x6d,0x45,0x76,0xf2,0xe3,0xea,0x9e,0x3d,0xed,0x4d,0x8e,0x99,0x41,0x55,0xc1,0xae,0xbb,0xd9,0x55,0xe8,0x64,0x5d,0x2e,0x53,0xd1,0x86,0x4c,0x67,0x4d,0xbc,0xa1,0xb5,0xaf,0x17,0xb7,0x4b,0x3a,0x26,0xb2,0xec,0x7b,0x6d,0x5b,0x64,0xb7
.byte 0xaa,0xf2,0x93,0xfb,0x87,0x6c,0x4b,0x37,0x45,0x68,0x9e,0xc9,0x99,0xa1,0x73,0x6a,0xa9,0x3d,0xa4,0xb0,0x89,0x98,0x61,0xbf,0x0b,0xa0,0x23,0xdb,0xed,0x12,0xe2,0x38,0x83,0x52,0xa4,0x3f,0xc0,0x23,0xe7,0xf3,0x9f,0xf6,0x81,0x2e,0x41,0x54,0xec,0x77,0xcc,0x36,0xb0,0x35,0x3a,0x2f,0x74,0x42,0x93,0x08,0xa6,0x3a,0xaa,0x76,0x7a,0x4f
.byte 0xe5,0x12,0x8f,0x8e,0xb5,0x93,0x56,0x7e,0xd1,0x8d,0x68,0x13,0x50,0x63,0xd6,0x43,0xb0,0xc0,0xd1,0x0d,0x64,0xbd,0x69,0x99,0x9c,0xf7,0x4e,0x83,0xff,0x9b,0x3c,0x88,0x65,0x0a,0x55,0xa7,0xf9,0x39,0xbb,0x6a,0x10,0xa2,0x9e,0x13,0xc8,0x5b,0xd5,0x4e,0xc2,0x27,0x7c,0xba,0xd2,0x99,0xde,0xaa,0x6f,0xc5,0xda,0x4b,0x6c,0x53,0x1d,0xe8
.byte 0xa9,0xa4,0xd6,0xad,0x94,0x9f,0x3b,0x0a,0x21,0xe0,0xf3,0xc2,0x96,0x63,0x4a,0x37,0x17,0x24,0x31,0x01,0x59,0x90,0xce,0x5e,0xed,0x06,0x22,0x80,0x67,0x73,0xcd,0xd4,0xcc,0x85,0x20,0x95,0x97,0xfe,0x99,0xd4,0x93,0x17,0x3d,0x15,0x15,0x4e,0x89,0x7c,0x6a,0x7b,0x2b,0xc4,0x8e,0x34,0xaa,0xf8,0x27,0xf6,0x0b,0xd5,0x64,0x21,0x96,0x37
.byte 0x04,0xd9,0x01,0x13,0x6d,0xd6,0x2d,0x5b,0xef,0xc1,0xac,0x5f,0x96,0xdb,0x14,0x0f,0x1e,0xc7,0x2a,0x96,0x32,0x07,0xd3,0x98,0x5a,0xab,0x75,0xda,0x4f,0x13,0xf0,0x7f,0xf5,0x4e,0xe1,0x6c,0x1f,0x0e,0xe8,0x5b,0x04,0x64,0x50,0x1f,0x18,0xf9,0x72,0x25,0x5e,0x95,0xa5,0x22,0x13,0xd6,0x21,0xeb,0xbe,0xfa,0x5c,0xb3,0x2a,0x0d,0x54,0xa2
.byte 0x0b,0x99,0xb5,0xa4,0xf4,0x5d,0x57,0x71,0x35,0x03,0xf5,0x1d,0x64,0x12,0xe4,0xba,0x2a,0x1d,0xd7,0x10,0xf1,0x5e,0xb5,0xc4,0x48,0x66,0x23,0xc4,0xcc,0x29,0x7f,0x18,0x70,0x8b,0xaa,0xb2,0xf0,0xe0,0x2b,0x8c,0xd1,0x07,0x49,0x1f,0x6e,0xd0,0x97,0xcb,0xe1,0x0e,0x3f,0x87,0xad,0x11,0xbe,0x09,0x14,0x47,0x3a,0xbe,0x5e,0xe5,0xcd,0x9c
.byte 0x7e,0xa7,0xd7,0x2d,0xf9,0xf1,0xd1,0xa1,0xde,0x3b,0xf4,0xa6,0x9f,0x90,0xe5,0x61,0x65,0x9f,0xa1,0x1c,0x89,0xbe,0xae,0xd9,0x03,0xc4,0x96,0x15,0x43,0x80,0xbb,0x9a,0xaa,0x57,0x34,0xa9,0x66,0x1f,0xef,0xc7,0x70,0xe1,0xd4,0x35,0x71,0xaf,0x8c,0x23,0x01,0xf5,0x7e,0x63,0x84,0x8f,0xc0,0x8b,0x28,0xf7,0xbc,0x2f,0x07,0x65,0x80,0x4c
.byte 0x84,0xbc,0x4c,0x95,0x5f,0xf9,0x08,0xc3,0x03,0xf3,0x31,0x35,0x4a,0x66,0xea,0x49,0x95,0xe4,0xce,0xcc,0x9c,0x9e,0x3f,0xf6,0x24,0x23,0xa5,0xf7,0xb0,0x4a,0x20,0x81,0xe5,0xc4,0xf0,0xe8,0xae,0xea,0xbf,0xcc,0x50,0xa2,0x9b,0xfe,0x97,0xfe,0x6b,0x1b,0xe0,0x56,0x90,0x0b,0x0e,0x47,0x6b,0x92,0x2e,0x49,0xed,0x99,0x1b,0x3d,0x42,0x3d
.byte 0x3e,0xf6,0x7d,0x6d,0x6c,0xc4,0xc6,0xae,0xa6,0x98,0xfd,0xeb,0xa5,0x57,0x05,0x00,0x44,0xbb,0xf3,0xa3,0x00,0x29,0x3d,0xcd,0x45,0xc1,0xa8,0x7d,0x34,0xaf,0x8b,0x53,0x49,0x5f,0x42,0x6e,0xcd,0x51,0x67,0x3d,0x75,0x82,0x17,0x65,0x1d,0x13,0xef,0x2d,0xc3,0xf2,0x87,0xbf,0x95,0x43,0x05,0xfb,0x3c,0x35,0xd7,0xbb,0x35,0x7f,0xbe,0x13
.byte 0x10,0x06,0xdd,0x17,0xe7,0x39,0xa1,0x8f,0x8f,0xf2,0xba,0xe2,0x27,0x83,0x6e,0x86,0x01,0x8c,0x04,0xa3,0xc8,0x6e,0xf9,0x51,0x3f,0xf2,0x36,0xe6,0x0a,0x48,0xf3,0x72,0x56,0xb7,0xd7,0x8f,0x43,0x17,0x60,0x9b,0xaf,0xcf,0x74,0x43,0xc9,0x27,0x40,0x10,0x28,0x13,0x04,0x6a,0xb3,0xa4,0xf8,0x41,0xfe,0xd5,0xd2,0xcd,0xe7,0x12,0x1d,0x82
.byte 0x91,0x6d,0x3e,0xce,0x30,0x74,0x39,0x2b,0xbb,0xed,0x46,0x3d,0x0b,0x98,0x6f,0x76,0x20,0x01,0xc0,0x50,0x25,0xa2,0x02,0x7b,0xbc,0x31,0x2b,0x2b,0xb5,0xd4,0xad,0x38,0xe2,0x20,0xdb,0x4d,0x8e,0x1e,0x21,0x3d,0x80,0x1b,0x77,0xc0,0x7d,0xfd,0x88,0xac,0x85,0xed,0xc9,0xfd,0xf0,0xa2,0x60,0xcd,0xc6,0x35,0x88,0x5d,0x22,0xfa,0x7f,0x0c
.byte 0xad,0x67,0xee,0xdf,0xd8,0xce,0x10,0x1e,0xb3,0x6f,0xe7,0xe0,0x5c,0x56,0xae,0x08,0xd1,0x65,0x68,0xc1,0xfd,0x17,0xaf,0xc0,0x89,0x77,0xb1,0x12,0x78,0x4e,0xb3,0x39,0x4a,0x95,0x74,0xcb,0x72,0xd9,0xee,0x0b,0x30,0x8f,0x02,0xb4,0x7f,0x15,0x9a,0x13,0x3f,0x02,0x1c,0xb0,0x80,0xaa,0xb0,0xa1,0x14,0x1a,0x93,0x69,0xde,0x83,0x89,0xa1
.byte 0x83,0x48,0x27,0x5a,0x22,0xb8,0xd1,0xf6,0x25,0x81,0xb0,0xe9,0xb6,0x3f,0x17,0xa1,0xe1,0x37,0x46,0x6b,0xa5,0x5f,0x85,0xcc,0x39,0x19,0x45,0xe1,0x95,0x21,0xe9,0x5b,0x09,0xa6,0x9a,0xe0,0x11,0xed,0x10,0x20,0x40,0xb3,0xfd,0xd0,0x48,0x3a,0x9f,0x85,0x92,0x37,0x12,0xa8,0x44,0xa7,0x22,0x45,0x1c,0x57,0xe4,0x36,0x79,0xe0,0x08,0xd8
.byte 0x40,0xa2,0x66,0x7b,0x2d,0xe7,0xb1,0x56,0x62,0xd6,0xaa,0x33,0xdd,0xbd,0x74,0x3f,0x26,0x04,0x0d,0xc1,0x45,0xf4,0xaa,0x70,0xbb,0x8a,0x24,0x4a,0x60,0x01,0x5b,0xc2,0x79,0xb1,0x0e,0x24,0x46,0x4b,0x15,0x02,0xda,0x9a,0x24,0x0e,0x1d,0xa1,0xb4,0xa3,0xc1,0x31,0xfb,0x3d,0x7b,0x69,0xd2,0x22,0x52,0x37,0x9f,0xc0,0xb8,0xd4,0x36,0x01
.byte 0xe7,0xe2,0x99,0x93,0xec,0x96,0x0d,0x8c,0xbe,0xa9,0x92,0xa0,0x25,0xe3,0x66,0x26,0x2e,0xae,0x44,0xbf,0x9e,0xa0,0x20,0x97,0x41,0x2f,0x19,0x80,0xbc,0x78,0x19,0x8e,0x08,0xea,0x55,0x7f,0x88,0x74,0x4a,0x78,0xfb,0x6b,0x33,0x51,0x54,0xb4,0xa3,0x82,0x3b,0xa6,0xa7,0x5a,0x6d,0x01,0xa7,0x59,0x2f,0xf1,0xba,0x35,0x8e,0xbd,0xe4,0xb4
.byte 0xc3,0x37,0xc7,0x1c,0xcf,0x5b,0x26,0x02,0x2d,0x64,0xe5,0xb4,0x61,0xea,0x56,0xcf,0x6a,0x53,0x7a,0x1b,0x8c,0xc7,0x4f,0x32,0x6d,0x57,0xd9,0xde,0xf1,0xd3,0x8f,0x95,0x52,0xc6,0xab,0x43,0xc3,0x57,0x3e,0x04,0xb3,0xf9,0x0c,0x66,0x82,0xf4,0x19,0xa5,0xd4,0xc5,0x3a,0xc1,0xe0,0x00,0x11,0x36,0x51,0x38,0x97,0x3a,0x62,0x10,0xd5,0x81
.byte 0xec,0x16,0x34,0xd5,0xff,0x8a,0x01,0xb1,0x25,0x44,0xf6,0xcb,0xda,0x2d,0xbd,0x42,0xb5,0xd1,0x8a,0xf4,0xab,0xe4,0xae,0x18,0x72,0x66,0x93,0xef,0xfa,0x8d,0xdb,0x43,0x46,0xb3,0x68,0xa0,0x15,0x93,0xce,0x33,0xa9,0x29,0x12,0xf0,0x69,0x74,0x34,0x6a,0xea,0xfc,0x05,0x35,0x7a,0x0e,0xfe,0x89,0x73,0xb8,0x47,0x5b,0x6c,0x1b,0xd2,0x41
.byte 0xaf,0xca,0xcd,0x67,0x00,0x44,0xf6,0xc9,0xcf,0x80,0x73,0xda,0x90,0x41,0xd1,0x35,0x75,0x67,0xfe,0x30,0x61,0x8f,0xa7,0x88,0x7f,0x1b,0x39,0x3d,0x41,0x41,0x8d,0xf8,0x04,0x0b,0x8c,0x25,0x2b,0xb6,0xd5,0xe3,0xb9,0xeb,0xd9,0xb1,0x99,0x0c,0x45,0x12,0x9f,0x19,0xce,0xc3,0xd6,0x02,0x3e,0x4c,0xdf,0xf9,0x61,0x41,0x50,0x7b,0x38,0x7e
.byte 0x40,0x43,0x90,0x2a,0xb0,0x2e,0x16,0x33,0x32,0xa2,0x34,0xb8,0xc5,0x76,0xdc,0xda,0x71,0x07,0x45,0x9b,0x1f,0x6b,0xd7,0x92,0x69,0x04,0x02,0xa2,0x50,0x55,0xd3,0x96,0x10,0xaa,0x22,0x1e,0xb7,0x6a,0x84,0x8b,0xc6,0x7a,0xdb,0xe5,0xc6,0x25,0x9a,0x7b,0xa4,0x3a,0x06,0xc9,0x2f,0x95,0xb2,0x9b,0xac,0xfc,0xbb,0xb2,0x9a,0x39,0x84,0x6d
.byte 0xce,0x56,0x62,0x34,0x61,0x48,0x34,0x31,0x6b,0x29,0xaa,0x5c,0xdd,0x52,0xae,0x8e,0x9f,0x36,0x3b,0xec,0xd9,0xc2,0x3d,0x13,0x61,0xc7,0x74,0x58,0xf9,0x2b,0x87,0x05,0x07,0x3c,0xd7,0x37,0x7f,0x59,0x54,0x32,0x95,0x19,0xc8,0x38,0x69,0x6e,0xc9,0x88,0x77,0x65,0x20,0x2c,0xf4,0xaf,0x57,0xc1,0x7d,0xe2,0xb4,0xdc,0x4e,0x74,0x77,0x92
.byte 0x83,0xee,0x4a,0x7d,0x74,0x6f,0x19,0x74,0x8f,0xb5,0x76,0x5d,0x79,0x4a,0x16,0xb9,0xaf,0x2a,0x2d,0xd9,0xeb,0xd2,0xad,0x70,0x37,0x5d,0xff,0x96,0xfc,0xe2,0x9c,0xed,0x45,0x4f,0x56,0x59,0x9a,0xdb,0x81,0x3f,0x3f,0xc3,0x47,0x81,0x46,0x7d,0x14,0xdd,0x45,0xee,0x50,0x25,0xae,0xd4,0x61,0x8e,0x4d,0x58,0x35,0xf5,0x62,0xc0,0xa8,0x25
.byte 0xb1,0xf1,0xd4,0x86,0xd5,0x67,0x8d,0x50,0xfc,0xfb,0x8d,0x18,0x82,0xc9,0x34,0xbe,0xe0,0x0b,0x6a,0xcb,0x2f,0xf0,0xd1,0x32,0x40,0x35,0xf9,0x4c,0xa8,0xd2,0x92,0x53,0x90,0xc1,0x44,0xb4,0x59,0xb2,0x8c,0xc7,0xb9,0xb7,0x5d,0xf9,0xa0,0x9b,0x8c,0xcd,0x32,0x36,0x72,0xce,0xa8,0x49,0xbe,0xba,0x46,0x5e,0x43,0xa0,0xd5,0xf3,0x81,0xa5
.byte 0xbe,0xf4,0x37,0x22,0x27,0x5e,0x56,0x52,0x00,0x1b,0x79,0xf8,0x17,0xa5,0x61,0x92,0x7a,0xfb,0x0d,0xf9,0xaf,0x4a,0x9c,0x7c,0x09,0xda,0xab,0xda,0x8a,0xdb,0x6a,0x25,0xcc,0x60,0x79,0x48,0x11,0x3f,0xd9,0x0d,0x30,0x4b,0xaf,0xa3,0x48,0xb9,0x80,0x9b,0x43,0x94,0x1a,0x2d,0xdf,0x1d,0x74,0x1c,0x17,0x9f,0xbb,0x52,0xbc,0x9c,0x2f,0xaa
.byte 0x7a,0x0a,0x8d,0xc9,0x2c,0xbb,0x33,0xf0,0xc2,0x25,0x34,0x9d,0x1a,0x5c,0x11,0x38,0x95,0xeb,0x65,0xce,0x85,0xe6,0xa8,0xd1,0x20,0x7c,0x8f,0xd3,0xb6,0x42,0xb9,0x97,0x4f,0x94,0xc6,0xfe,0xcc,0x8b,0x90,0x9a,0x18,0x46,0xdb,0xdc,0x2e,0x45,0xd5,0xe4,0x11,0xb6,0xb0,0x9b,0xf6,0x0b,0x53,0x0e,0x44,0xf5,0x33,0x9a,0xdc,0xd3,0x36,0x52
.byte 0x3f,0xe3,0x3e,0x3a,0xfc,0x6b,0xaf,0x31,0xf8,0x21,0x19,0x54,0x68,0x5e,0x37,0x95,0x9f,0xba,0x83,0x8c,0x53,0xa3,0xda,0x26,0x48,0x2a,0x4a,0xe0,0x73,0x82,0x51,0x68,0x1c,0x60,0x5e,0x3d,0x95,0x61,0x2b,0xb7,0x94,0x7a,0x94,0x03,0x50,0x4e,0xa2,0x3e,0xa7,0xc8,0x29,0x79,0x3a,0x12,0x82,0x71,0x7e,0x3c,0x35,0xed,0x24,0x9f,0x90,0xb1
.byte 0x04,0xec,0x83,0xeb,0x4f,0x91,0x54,0x44,0x7c,0xb2,0x14,0x44,0xde,0x73,0x69,0x84,0x4b,0x9c,0x12,0x13,0x27,0xe8,0x1a,0x6b,0x39,0xce,0xad,0x56,0x17,0x99,0x1a,0x6c,0x54,0x21,0xe2,0x6f,0x0d,0xe6,0x2a,0xff,0x7d,0x22,0xfa,0xdf,0xa6,0x32,0xf0,0xfd,0xa7,0xa4,0xe9,0xaa,0x33,0x8e,0xd6,0x36,0x7f,0xfd,0xf8,0x13,0x7e,0xb5,0x16,0xdb
.byte 0xea,0x61,0xf3,0x18,0x36,0xfd,0xf3,0xa4,0x11,0x5d,0x93,0x86,0xfb,0xaa,0x86,0xd5,0xd6,0x24,0xfb,0x00,0x8a,0x8a,0x78,0x28,0xdf,0x8e,0x2a,0x51,0x65,0xd3,0xb2,0x6f,0x02,0xb8,0xa4,0x03,0x42,0xf5,0xf9,0x61,0x00,0x17,0x34,0x32,0x83,0x20,0x0c,0xee,0x2a,0xe7,0x04,0x65,0x52,0xe0,0x0c,0xaf,0x77,0xa7,0x72,0x44,0xa8,0xb1,0x85,0x73
.byte 0x9f,0x8b,0x99,0x10,0xf9,0x5b,0x68,0xfc,0xe6,0xae,0xdb,0x65,0x99,0x09,0x01,0x4a,0x80,0xd6,0xe2,0xd6,0x86,0xb1,0xf0,0x5f,0xb3,0x12,0xf4,0xdd,0x53,0x0d,0x9c,0x61,0x6d,0x8a,0x68,0xca,0x36,0x65,0xf0,0x7d,0x71,0xa3,0x62,0xd6,0x15,0x73,0x5b,0x8b,0x84,0x29,0x1f,0xde,0x24,0x22,0x4f,0xe3,0xd3,0xee,0x68,0xb4,0xf0,0x0c,0xa8,0x33
.byte 0xde,0x82,0x74,0x9b,0x65,0x7d,0x96,0xce,0x52,0x2f,0x41,0xe2,0xa9,0x2a,0x62,0xd1,0x2a,0xf4,0x52,0xa0,0xbc,0x0d,0x88,0xd4,0xbe,0x0d,0x7b,0x2d,0xf0,0x3c,0xc9,0x76,0x69,0x44,0x88,0x4f,0x75,0x73,0x77,0xd8,0xec,0x7d,0x01,0x95,0xab,0x2f,0x29,0x99,0xb8,0xdb,0xa3,0xf0,0xea,0x57,0x2b,0x91,0xf9,0x6c,0x4d,0x59,0xae,0x09,0x52,0x08
.byte 0x89,0xa2,0x32,0x2b,0x7e,0xca,0xae,0x30,0x8e,0xa5,0x66,0x88,0x79,0x9e,0xb3,0xd4,0xe2,0xe2,0x0e,0x5d,0xf6,0x17,0x66,0x77,0x09,0x84,0xf3,0x00,0x59,0xfb,0xfc,0x5c,0xb0,0x0f,0x2f,0xa7,0x5a,0xbd,0xf7,0x7e,0x74,0xd1,0x86,0x9d,0x9c,0x7f,0x00,0x16,0xa1,0x2b,0x90,0xe7,0x3e,0x94,0xab,0x7e,0xf5,0x18,0x1c,0x77,0x8e,0xf8,0x4d,0x43
.byte 0x6b,0xfd,0xa8,0x26,0xbb,0xb2,0x05,0x01,0xa2,0x95,0xcc,0x9a,0x54,0xad,0x5e,0xa2,0xc2,0xa8,0x82,0x5b,0x43,0xef,0xbf,0x87,0x61,0xcb,0x21,0x12,0x56,0xef,0x55,0x09,0xeb,0x22,0x49,0xf8,0x13,0x8d,0x1a,0x84,0x0c,0xf6,0xeb,0xbc,0xf3,0x09,0x5c,0xe7,0x61,0xcf,0xb4,0x84,0x8d,0x95,0x6f,0xa8,0x10,0xc7,0x99,0xd5,0x21,0x59,0x7e,0xe9
.byte 0xd2,0x05,0xf6,0xab,0x40,0xe5,0x5b,0xb1,0xe1,0x64,0xdb,0x38,0x1e,0x9e,0xe2,0x0c,0xd7,0xe5,0xa2,0xe4,0x51,0x4b,0xff,0x8b,0x10,0x79,0x21,0xaf,0xa9,0xdd,0x40,0x43,0x56,0x57,0x01,0xa3,0xe0,0x40,0x94,0xe5,0x85,0x6c,0xa5,0x93,0x0f,0x28,0x97,0xaa,0x82,0x3c,0x01,0x77,0x1e,0x18,0x6c,0xdd,0xff,0x32,0x23,0x7b,0x0b,0x9c,0x95,0x66
.byte 0x62,0xb8,0xa0,0x94,0xcb,0x0e,0xdc,0xed,0xb1,0x44,0x1f,0xa8,0xcd,0x1f,0xf7,0xb7,0x41,0x7b,0x0c,0x96,0x08,0x75,0x98,0xd2,0x6e,0xb4,0x8a,0x24,0xf1,0x21,0x18,0x0c,0x2b,0x9f,0xef,0xd9,0x7b,0x3a,0x46,0x05,0xac,0xe4,0x5f,0xad,0x1d,0x2d,0xd0,0x34,0x83,0xfb,0x2c,0xd9,0xaa,0x59,0x86,0x6d,0x06,0x07,0x2e,0x2d,0x61,0x78,0x85,0xba
.byte 0x7d,0x50,0xde,0x4f,0x55,0x83,0x4d,0xdf,0xfb,0x56,0x81,0xa7,0xf1,0x63,0x97,0xd0,0xf2,0x69,0x7d,0x14,0xf3,0x7b,0xc2,0xf5,0xcf,0x44,0x39,0x9e,0x3b,0x1c,0x65,0x09,0xfb,0xdb,0xa6,0xb8,0xe4,0x20,0xc5,0x21,0xc8,0xe7,0x51,0xe8,0xf9,0xd7,0x29,0xf8,0xee,0xfd,0xbd,0xff,0x15,0x91,0x7c,0x92,0xcd,0x89,0xe9,0x9e,0xde,0x24,0xdc,0x67
.byte 0xcf,0x51,0x94,0xff,0xb0,0x21,0x30,0x8c,0xea,0x38,0x08,0xf8,0x02,0x31,0x5d,0x57,0x99,0x15,0x2f,0xf2,0xd5,0x7e,0xe5,0x87,0x5a,0xfa,0xee,0xa2,0x34,0x2e,0x24,0xcd,0x53,0xe7,0x89,0x51,0x9b,0x1c,0x88,0xd6,0x3c,0x12,0xe4,0xe0,0xf7,0xb6,0x39,0x3b,0x26,0x9a,0x0d,0xb7,0xfc,0x5e,0x74,0x58,0x74,0x78,0x3d,0x3b,0xc8,0xc0,0xb0,0xfe
.byte 0x82,0x15,0x1e,0x38,0x75,0x1d,0x85,0xd7,0x07,0xc2,0xc4,0x79,0x73,0xef,0x67,0xf0,0x56,0xf3,0x2f,0xce,0x8c,0x58,0x98,0x64,0x2b,0x7b,0x41,0xfa,0x32,0xba,0x6e,0x1c,0xa5,0xf4,0xc0,0x66,0x26,0x85,0x6d,0x65,0x7e,0x83,0x17,0xc4,0x8a,0x82,0xe2,0xc9,0x1d,0x5e,0x06,0xc7,0xbe,0xe5,0x49,0x66,0x9d,0x7f,0x75,0xa3,0x5d,0x02,0xb7,0x23
.byte 0xc9,0x94,0x81,0xb5,0xe6,0x0c,0xf0,0x5e,0x70,0xbb,0x69,0xf2,0xd9,0xc5,0x96,0xe2,0x35,0x6b,0xf1,0xd4,0x42,0xfb,0x0f,0xc0,0x35,0x93,0xb1,0x73,0x3d,0xeb,0xdd,0x85,0x03,0xd5,0x8d,0x41,0x35,0x6f,0xf5,0x0f,0x7b,0xe0,0x03,0xc8,0x6d,0xae,0x1f,0x5d,0x58,0xf1,0xf1,0xc8,0x97,0x3a,0x1a,0x4a,0x0e,0x23,0xa3,0x72,0x3a,0xdd,0xf3,0x9d
.byte 0xd3,0x1b,0xcd,0x5f,0xb8,0x49,0x07,0x2d,0x49,0xc1,0xbb,0x40,0x32,0x86,0x00,0xe8,0x95,0xa0,0x34,0x25,0x1f,0xac,0x30,0x4e,0x41,0xde,0x6d,0x94,0xb6,0xb0,0xf9,0x9f,0x3a,0x12,0xf9,0x80,0xc4,0xf7,0x57,0x3d,0x53,0x38,0x0c,0x7f,0x80,0xfb,0xdd,0x5b,0x7c,0xe4,0x6f,0x47,0x30,0x16,0x56,0x37,0x01,0x49,0x9c,0xd9,0x89,0x34,0xa1,0x29
.byte 0x20,0x57,0xb5,0x7c,0xbd,0xcc,0x90,0xec,0xb2,0xcc,0x39,0xad,0xc2,0xbe,0x06,0xd0,0x60,0x30,0xc0,0xe9,0x4c,0x7d,0x30,0x86,0x53,0x80,0x8b,0x35,0x70,0x2c,0x35,0x3d,0xb2,0x3a,0x9a,0xca,0x69,0x40,0x11,0x71,0x75,0x4b,0x68,0x5b,0x9c,0x03,0x48,0x4c,0x9c,0x68,0xce,0xe7,0x5a,0x65,0x98,0xed,0xa1,0xe5,0x20,0xe4,0x0f,0x54,0x0c,0x0e
.byte 0x50,0x97,0xa3,0xf2,0x67,0x97,0xea,0x74,0x93,0x73,0x82,0x60,0xa4,0x29,0xb6,0xa3,0x9d,0xc1,0x2f,0x31,0x30,0xb9,0x1f,0xfd,0xc3,0x4f,0xbe,0xa1,0xb1,0xc4,0xbc,0x88,0x78,0x27,0x85,0xb1,0xa1,0x91,0x3e,0x61,0x3b,0xd5,0x0f,0x8d,0x28,0x80,0xf1,0x4b,0x8e,0xdf,0x34,0x22,0x45,0x6b,0x62,0xb8,0xac,0xd9,0xe3,0xff,0xce,0xfc,0x2e,0x34
.byte 0x81,0x70,0xc1,0xb8,0x51,0xa2,0xa2,0x1a,0x7a,0xbc,0xf0,0x56,0x12,0x7a,0xf4,0x3b,0x34,0xc7,0xcf,0x63,0x66,0xc9,0x36,0x77,0x52,0xfd,0xc5,0x87,0xa6,0x97,0x9a,0x39,0x7f,0x4c,0xdf,0x0d,0xfe,0x8f,0x57,0xbe,0x75,0x6b,0x79,0x86,0x57,0x40,0x88,0x7e,0x63,0xb6,0xe9,0x1a,0x07,0xa4,0xa0,0x15,0xee,0xb4,0xb6,0x18,0x23,0x7b,0x9f,0x2f
.byte 0xba,0x2c,0x8c,0x7f,0x7b,0xbf,0xab,0x21,0x5b,0x45,0xc7,0x61,0xd2,0xa5,0x0b,0x13,0x1a,0x63,0x6a,0x69,0x4f,0x06,0x78,0x22,0xe6,0x98,0xbc,0xaa,0xd1,0x67,0xc5,0x2c,0x05,0x38,0x57,0xfb,0x28,0xfd,0x09,0x29,0x02,0x12,0x0c,0xab,0x2a,0xd8,0xf1,0x6c,0x9d,0xdf,0x9c,0x76,0x4b,0xf8,0x18,0x80,0xa3,0xfc,0xbb,0x82,0xe2,0xb5,0x1d,0xcf
.byte 0x23,0xf9,0xe1,0x6d,0x97,0xe9,0x4d,0xfe,0xe7,0x8c,0x2f,0x05,0x1d,0x03,0xaf,0xcd,0x00,0x2c,0xe0,0xec,0x2a,0xa8,0x36,0x96,0xaf,0x5c,0xe3,0x70,0x37,0x2c,0xa5,0xf1,0x4e,0x3c,0x98,0x0f,0xcb,0xea,0x9b,0x2d,0xdd,0x56,0xfb,0x5f,0xa8,0xf5,0x92,0x4f,0x35,0x5b,0x1f,0x80,0xb5,0x86,0x05,0x90,0xac,0x53,0x5f,0xc4,0x67,0x41,0x9f,0x93
.byte 0x9d,0x9e,0xe4,0x12,0x7b,0xee,0x6d,0x77,0xe6,0x47,0xf8,0x31,0xcb,0x21,0xc1,0x2e,0xd7,0xdc,0x28,0x98,0x27,0x91,0xbe,0x91,0xfd,0x99,0xae,0x54,0x28,0xfc,0x84,0x13,0xe7,0x8a,0xf0,0xc9,0xd8,0xd6,0xa5,0xfa,0x57,0x7a,0x84,0xee,0xf1,0xb1,0x90,0x19,0xc5,0x43,0x6b,0x35,0x48,0xd9,0xfe,0x49,0xdf,0xf9,0xc8,0x27,0xfb,0xea,0x08,0x60
.byte 0xe2,0x38,0xca,0xc7,0x8e,0xc4,0x8c,0xc0,0x9c,0xf9,0x1e,0xa6,0xea,0xda,0x0f,0x61,0xdb,0x45,0x81,0xd1,0xed,0x07,0x61,0x2d,0x43,0x54,0x56,0xc4,0xbd,0x29,0x5a,0x8f,0x41,0xa3,0xc3,0x1b,0x7d,0x52,0xab,0x2b,0x5f,0xa3,0xff,0x9a,0xb0,0x9d,0xb2,0x18,0xdc,0x61,0xea,0x4c,0x25,0xd6,0xe5,0x2d,0xc7,0xbe,0x3c,0x0b,0x15,0xa9,0x46,0x07
.byte 0x36,0x92,0x9e,0x43,0x8f,0xf9,0x5e,0x35,0x5c,0x3f,0xfe,0xae,0x87,0x91,0xdb,0xa8,0x4a,0x05,0x2e,0x51,0xdf,0x36,0xf5,0x39,0x03,0x50,0x8a,0xc3,0xd3,0x1b,0xa4,0x1e,0xe1,0xfb,0xbc,0x53,0x3b,0xd3,0x6b,0x22,0x72,0xd0,0x5c,0x67,0x61,0xca,0x85,0x37,0x17,0xa5,0x8e,0x10,0xd1,0x58,0xb1,0x8b,0x17,0x43,0xb0,0xc6,0xc5,0xdc,0xde,0x45
.byte 0x1f,0x18,0x25,0x72,0x89,0x36,0x09,0xa5,0xd7,0x9e,0x8b,0x11,0xce,0xbf,0x31,0xee,0xee,0x6f,0x6d,0xf9,0x94,0x23,0x17,0x11,0xc5,0x53,0xb8,0xfc,0x8f,0xf4,0xdc,0x56,0x6c,0x7d,0x4d,0x42,0x32,0x30,0xb2,0xbb,0x8d,0x69,0xf8,0xb5,0x3b,0x77,0x38,0x04,0xcf,0x49,0x4f,0xec,0x40,0x61,0xbb,0x13,0x9c,0xc4,0xcc,0x7c,0xe8,0x90,0x27,0x91
.byte 0x9e,0x95,0xf8,0x87,0x63,0x94,0xa9,0xc5,0x78,0x78,0x38,0xa1,0xf7,0x21,0x7a,0xec,0x91,0xaf,0x2f,0x2f,0xa4,0x52,0x16,0x5f,0x7f,0x27,0xea,0xce,0xb4,0x1f,0x38,0xe4,0xd9,0xb1,0x24,0xce,0xe5,0xd2,0xd1,0x09,0x2f,0x04,0x65,0xf3,0x54,0x1c,0xac,0xad,0x3d,0x97,0x21,0x83,0x12,0x9c,0x08,0xb8,0x2b,0xd6,0x7e,0x91,0xc5,0xdf,0xa7,0x13
.byte 0x3f,0x4b,0x60,0x52,0xb8,0x1a,0x28,0x44,0x8d,0x8a,0x41,0x6f,0x02,0xf8,0x62,0x6a,0xe4,0xad,0xcc,0x81,0x48,0x44,0x9a,0xed,0x7a,0x87,0x60,0x3a,0x65,0x10,0x49,0x7b,0x90,0x60,0xd9,0xe7,0x67,0x8d,0xff,0xef,0xdf,0x7e,0x07,0x46,0x67,0xfc,0xcd,0xbc,0xae,0x3d,0x39,0xfb,0x5f,0xf9,0x36,0x7a,0xaa,0x80,0x48,0x9d,0x6d,0x98,0x82,0xf9
.byte 0x76,0x08,0xe6,0x5c,0x2f,0xde,0x9d,0xd2,0xb6,0x18,0x4f,0x1f,0x98,0x23,0x91,0x41,0x89,0xcd,0xfa,0x8d,0x5d,0x50,0xcb,0x6a,0x57,0xf0,0x34,0x57,0x68,0x00,0xca,0x4b,0xe4,0xc6,0x1a,0x82,0x6c,0x57,0xad,0xfb,0x37,0xc0,0x2e,0x39,0xd7,0x8e,0x6f,0x36,0x28,0x82,0x99,0x3f,0x9a,0xeb,0xdc,0x1f,0x63,0x34,0xb1,0x14,0xad,0x33,0xdd,0xfc
.byte 0x92,0x4a,0x15,0xa8,0xb8,0x48,0x3f,0x11,0xef,0x58,0x17,0xa0,0xe6,0x7b,0x54,0x44,0xaa,0x7c,0x21,0x3e,0xfc,0x23,0x98,0xbb,0x18,0x28,0x37,0x00,0x31,0xb3,0xec,0x90,0x89,0x6f,0x5c,0xaa,0x3a,0x95,0x22,0x6c,0xb7,0x73,0x6d,0x2b,0x94,0xa5,0xda,0x37,0xb7,0x5f,0x0e,0x5a,0x51,0xee,0xec,0xde,0x80,0xeb,0xd7,0x84,0x4e,0x24,0xba,0x97
.byte 0xf0,0x8e,0x6e,0x0c,0x51,0x94,0xb4,0x9b,0x2d,0xa3,0x93,0xf1,0x73,0x96,0xd4,0xf0,0x6a,0x42,0x83,0xde,0x72,0xc9,0x12,0x42,0x2d,0xab,0x2f,0xf5,0x9c,0x21,0x6f,0x6a,0xc3,0xfd,0x01,0x18,0xba,0x3d,0xb0,0x9e,0x64,0x4b,0xab,0xfa,0x2d,0xff,0x13,0x0a,0xab,0xd4,0x4b,0xaf,0x06,0x38,0x8b,0x79,0xd3,0xa6,0x03,0x38,0xa6,0xe2,0x39,0xa9
.byte 0x0b,0xc1,0x83,0xd6,0x56,0x72,0xcd,0x10,0x35,0xbc,0xa3,0xe6,0x8c,0xf7,0x0e,0x70,0xbf,0xb8,0x4f,0xe2,0x37,0x88,0xf3,0x79,0x79,0x12,0xa5,0x4b,0x87,0x73,0x39,0x0b,0x25,0x4b,0x56,0x47,0x38,0x6d,0x03,0xa7,0xff,0x32,0x2a,0xd2,0x03,0x2c,0xe6,0xe0,0x73,0x1b,0x7c,0xeb,0x47,0xb5,0x4e,0x65,0x6c,0xd8,0x0f,0x08,0xbf,0x98,0xbf,0x5e
.byte 0xae,0x69,0x0e,0x13,0xc6,0xfd,0x33,0x78,0x58,0xe9,0xe7,0x52,0x4c,0xb1,0x68,0x46,0x35,0x8c,0x1f,0x10,0xf5,0xeb,0x2f,0xaa,0xf3,0xdb,0x1a,0x2c,0x54,0xe1,0x3d,0x49,0x65,0x90,0x80,0xce,0x55,0x19,0xab,0xf9,0x05,0x3f,0xa8,0xf9,0x40,0x11,0x2a,0x84,0x82,0xbc,0x6f,0x95,0xad,0x66,0xff,0x6c,0xc8,0x84,0xb9,0xc7,0x74,0xa8,0xf3,0x5b
.byte 0x48,0x8d,0x6a,0xef,0xec,0x58,0x5a,0x96,0x35,0xcd,0xc8,0xbf,0x6e,0xc3,0x23,0x81,0x0b,0x5d,0x80,0x98,0x4d,0xe7,0xf5,0xb5,0x4a,0x1e,0x0a,0xfd,0x04,0xc6,0x10,0x50,0x79,0x7a,0x34,0x72,0xfa,0xaf,0x2c,0xf2,0xfd,0xfb,0xc7,0xb1,0x46,0x8a,0x0f,0xc2,0xee,0xa9,0x54,0x83,0x5b,0x84,0x20,0x88,0x74,0x98,0xcc,0x8f,0x77,0x8a,0x1a,0xf4
.byte 0x07,0x5c,0xf2,0x1b,0x1f,0xdc,0x03,0x76,0x96,0xf7,0x98,0xc9,0xbd,0x54,0xb1,0x61,0x46,0xbb,0x07,0xab,0xce,0x83,0x90,0xd9,0x3d,0x53,0x9b,0x65,0xa2,0x89,0x29,0x7b,0x75,0x1c,0x46,0x41,0x46,0x3d,0x83,0x2f,0x1d,0x67,0x32,0x0a,0xc6,0x4a,0x6c,0x8d,0x47,0x2a,0xc7,0xb7,0xe6,0xef,0x27,0x7a,0xff,0x86,0x1f,0xcc,0x8f,0xbb,0x48,0xda
.byte 0x70,0x49,0xbf,0xdd,0xf0,0x2c,0x30,0x9a,0x63,0xf8,0x1f,0xae,0xdd,0xb3,0x1f,0x50,0x75,0x15,0xf6,0x94,0x60,0x17,0xd4,0x99,0x82,0xef,0xb1,0x19,0xef,0x9a,0x3f,0x73,0x7e,0xb2,0x30,0x47,0x8e,0x3f,0xf3,0x78,0x53,0x72,0x2b,0xb5,0x34,0xcb,0xa4,0x8f,0xf0,0x1c,0x3f,0x3d,0xde,0x77,0x40,0x0b,0x14,0xb1,0x94,0x1e,0x72,0x94,0x24,0xdd
.byte 0x3a,0x5b,0x02,0xb8,0x88,0x8f,0x28,0x29,0x3f,0x3b,0x8d,0xc2,0xff,0x0d,0x74,0x77,0x6f,0x70,0x0e,0x92,0x32,0x2c,0x62,0xe7,0x16,0xf3,0x0b,0xdd,0x58,0xd7,0x7b,0x10,0x1a,0x73,0x49,0x57,0x37,0xcc,0x69,0xd6,0xd2,0xda,0xc8,0x85,0xd8,0x64,0x62,0xae,0x21,0x11,0x75,0xb6,0x39,0xa4,0x18,0x02,0x46,0x48,0x10,0x46,0x5c,0x4a,0x86,0xd7
.byte 0x1d,0xbe,0x0e,0x4b,0x6d,0x4e,0xe2,0xbe,0x22,0xd7,0xd5,0x3d,0x1f,0x77,0x7d,0x30,0x13,0xac,0xf4,0x38,0x93,0x85,0x55,0x47,0xaf,0xa5,0x16,0x28,0xc4,0xd0,0xb9,0x04,0xa3,0x27,0xd0,0xdf,0x1d,0x77,0xdd,0xd5,0xf6,0x8f,0x35,0x56,0x47,0xc5,0xb6,0x21,0xf8,0xea,0x5e,0xe4,0xa4,0xbc,0x20,0xc3,0x73,0x30,0xc7,0x2f,0x92,0x89,0x65,0x8b
.byte 0x6b,0x12,0xa6,0xc7,0x14,0xa8,0xd8,0xfb,0x99,0xe0,0x1d,0x95,0x90,0xd2,0x66,0xc3,0xf4,0x9b,0x03,0x59,0x2f,0x96,0xbc,0xdc,0x17,0x82,0x56,0x4e,0xf6,0xe9,0x0a,0xe1,0x25,0xb3,0xa5,0x13,0x70,0xd7,0xc8,0xd3,0x12,0x67,0xa9,0xdc,0xde,0x1c,0x3e,0x18,0x26,0x70,0x24,0xf4,0x17,0xf6,0xed,0xa0,0xb3,0xa1,0x38,0x6f,0x95,0x34,0x79,0x43
.byte 0x7e,0xc5,0x9e,0xb7,0x48,0x13,0x5c,0x8b,0x66,0x8e,0xad,0x69,0x02,0x00,0x3c,0xb6,0x76,0x37,0x0c,0x72,0x5a,0xe9,0xc3,0x94,0xc6,0xb5,0x1a,0x51,0x9f,0xb0,0xda,0x0c,0x57,0x5d,0x8d,0x99,0x1d,0xb3,0x12,0xd8,0x87,0x2f,0xbc,0x97,0xb5,0x76,0x30,0x11,0x29,0x59,0xa3,0x61,0xf7,0x61,0xcd,0x9a,0xc4,0xb6,0x2a,0x34,0x0f,0xc8,0x6a,0x08
.byte 0x52,0x14,0x63,0xcf,0x54,0xdb,0xb9,0x7c,0xf2,0x8b,0xa8,0x04,0xef,0x7d,0x9a,0x4d,0x00,0x2e,0x17,0xa4,0x2d,0x83,0x33,0x00,0xa4,0x58,0xda,0x5b,0x95,0x22,0x32,0x69,0xc9,0x6c,0x44,0x19,0x92,0x4b,0xa4,0x24,0xfe,0xc2,0x46,0x88,0x3e,0x8d,0x54,0x88,0x11,0xeb,0x36,0x32,0x03,0x87,0x55,0x8b,0x95,0x35,0x9c,0x04,0xd2,0x07,0x35,0xe0
.byte 0x7a,0x70,0x6c,0x18,0x56,0xaa,0x85,0xf1,0xa2,0x13,0xfb,0xef,0x12,0x0f,0xb9,0x42,0x7f,0xd5,0xa1,0xd0,0xdd,0x29,0x62,0x08,0xe1,0x4c,0x20,0xb6,0xee,0x44,0x45,0x61,0x0b,0xeb,0x40,0x6e,0xef,0xea,0x60,0xfc,0x55,0xa0,0x74,0x45,0x27,0x51,0x90,0x0d,0x1d,0xbc,0x62,0xfb,0xed,0xca,0x7f,0x88,0x85,0x8a,0xfa,0x5c,0x89,0xf6,0x79,0x5b
.byte 0xe3,0x3c,0xfd,0x19,0xa9,0xba,0x33,0xc4,0x7a,0x89,0x5b,0x11,0xe2,0xda,0x92,0xd1,0x3d,0x3e,0x9c,0x66,0xa5,0x1d,0xcb,0x9b,0x0a,0x46,0x84,0x93,0x3f,0xc4,0xbf,0x52,0x06,0x49,0xe2,0x46,0x0e,0x2b,0x39,0x67,0x1c,0x8f,0x4f,0xf3,0x53,0xce,0x2a,0x33,0x74,0xc4,0xe9,0x44,0x99,0x01,0xf0,0x55,0xcc,0x0a,0xed,0xa9,0xce,0x76,0x52,0x4d
.byte 0x85,0x52,0x26,0x82,0x75,0x3d,0x47,0xfb,0xb1,0xc4,0xfd,0x07,0xa6,0x79,0xff,0x3f,0xda,0xc2,0xa9,0xab,0xc7,0x88,0xa2,0xa1,0x5d,0xf2,0x03,0xe3,0xdc,0xbf,0xa6,0x90,0xfd,0xe0,0x43,0x69,0x88,0x78,0x50,0x99,0xb0,0x7d,0x18,0xca,0x4d,0xb5,0x04,0x8e,0x1a,0xbb,0x22,0xe5,0xc4,0xc6,0x85,0xe3,0x62,0xa9,0xce,0x50,0x83,0x9b,0xa0,0xf0
.byte 0x1a,0x07,0x10,0x90,0x3a,0x31,0x74,0x11,0x69,0x23,0xd2,0x08,0xce,0xfe,0xb1,0x21,0x64,0x62,0x05,0x3b,0x4c,0x8d,0xe3,0x8b,0x42,0x27,0xbf,0x93,0x06,0xf1,0x99,0x00,0x20,0xdf,0xe3,0xd3,0x4b,0x8e,0xb2,0x12,0xb6,0x2c,0x63,0xd0,0x4e,0xd1,0x38,0x8c,0x49,0x69,0x60,0x83,0x02,0xbb,0x8c,0x96,0x0f,0xe9,0x24,0x46,0x85,0xc9,0xf9,0x3f
.byte 0x58,0x1b,0x7e,0x72,0x26,0x81,0xb9,0xfb,0xe4,0x41,0xbf,0xd8,0x1b,0xd8,0x36,0x16,0x92,0xf4,0x78,0x0e,0xd4,0x95,0x92,0x20,0x33,0x83,0x65,0x21,0x97,0x92,0x19,0x0f,0x12,0x1c,0x4e,0xd5,0x3c,0xb9,0x54,0xd4,0x6a,0x4d,0x6d,0x89,0x7b,0xf0,0x07,0xf4,0x50,0xb2,0xa1,0xd8,0x4a,0x9e,0xf3,0x3a,0x99,0x65,0x67,0x61,0x09,0xc2,0xf5,0xd5
.byte 0x97,0x36,0xcb,0xe6,0x95,0xa0,0x19,0x2e,0xcf,0x4c,0xce,0xc9,0x4e,0x3b,0x55,0xd1,0xba,0x47,0x4f,0xb5,0xbd,0x29,0xa1,0x8c,0xcd,0xd8,0x9d,0xcf,0xf8,0x1c,0xa5,0x37,0x91,0x66,0x6d,0x3d,0xfc,0x03,0x8b,0x85,0xa9,0x51,0xaa,0x30,0xf7,0x0e,0x44,0x82,0x77,0x5f,0x84,0x60,0x6c,0xc2,0x95,0x4e,0xca,0x16,0x23,0xf2,0x66,0x97,0x45,0x05
.byte 0x90,0xdb,0xb8,0xbf,0x8e,0xaa,0xc8,0x41,0x1e,0x23,0xd0,0xbe,0xc7,0x6c,0x5f,0x39,0x18,0x61,0x1d,0xa2,0x15,0xe5,0x15,0x58,0xd0,0x36,0x99,0xe7,0xdc,0x90,0x5e,0x9a,0x67,0xee,0x92,0xb1,0x61,0xbd,0xe9,0x70,0x04,0x00,0x07,0xc9,0xab,0x74,0x1e,0x0f,0x84,0x45,0x1f,0x49,0xbb,0x49,0xec,0x03,0x00,0x47,0x38,0xfd,0x09,0xbe,0x23,0x3e
.byte 0xa8,0x80,0x21,0xf9,0x92,0x5e,0xd6,0x51,0x91,0x7e,0x21,0x5d,0x1e,0xfc,0xbb,0x60,0x9a,0xf5,0x0a,0x3b,0x41,0x4a,0xfa,0xfa,0x26,0xb2,0x54,0x6a,0x61,0xe4,0x13,0x9e,0xc5,0x50,0x29,0xf1,0x29,0xa5,0x76,0xb7,0xce,0x2c,0xe6,0x98,0x88,0xb5,0x87,0xcf,0x49,0x6b,0xa4,0x54,0x94,0x34,0x73,0xec,0xde,0xe4,0x6c,0xe9,0x1e,0x07,0x60,0x8c
.byte 0xb4,0x47,0x87,0x82,0xb0,0x51,0xbc,0xb6,0xeb,0x5c,0xbc,0x78,0x94,0x8f,0xe9,0xd9,0xd1,0xc4,0xfe,0x51,0x57,0xdd,0x7b,0x4a,0x9b,0xbf,0xfb,0xe4,0x04,0x49,0xc4,0x29,0x1e,0xc3,0xf6,0xd5,0xf9,0x42,0xed,0x5d,0x57,0x8f,0x5d,0x1e,0x29,0x69,0xb6,0xf9,0x11,0x36,0x65,0x53,0x07,0xaf,0x8d,0xd3,0xa3,0xb4,0x75,0xeb,0x7a,0xbb,0xc0,0x35
.byte 0xe5,0xfa,0x42,0xab,0xda,0xd8,0x83,0x65,0xc2,0x97,0x61,0x76,0xbb,0x96,0x8d,0x8f,0x8b,0xb0,0xa5,0x6f,0x3a,0x3c,0x19,0x84,0x7f,0x20,0x0e,0x97,0x2e,0xd9,0xee,0x2e,0xd6,0x29,0x01,0x94,0x67,0x0d,0x4d,0x43,0x24,0xe5,0xa6,0x92,0x77,0x85,0x49,0xdb,0xb9,0x62,0xb2,0xb8,0xd2,0x2f,0xc3,0x9a,0xe5,0xc0,0x23,0xac,0xd7,0x02,0xf9,0xf7
.byte 0x8b,0x64,0x19,0x44,0xfc,0x2d,0x57,0x3f,0x3e,0x32,0x0d,0xdf,0x2c,0xc9,0x38,0x47,0xa2,0x24,0xab,0x30,0x53,0x7b,0x51,0xf2,0xc4,0xf3,0x18,0x4d,0x4b,0x0e,0xf2,0x09,0x0b,0x0f,0xa3,0x01,0x0a,0x92,0x71,0x2a,0x37,0xca,0x03,0x2e,0x17,0x17,0x64,0x40,0xdf,0x5d,0xdb,0xee,0x71,0xae,0xb8,0xbe,0x3b,0x06,0x03,0x66,0xa7,0x93,0x42,0x1e
.byte 0x15,0x1c,0x26,0x51,0x22,0x15,0x7f,0xab,0x2d,0x64,0xe6,0xde,0xb9,0x25,0x2b,0xa3,0xa7,0xbc,0x26,0xad,0x12,0x2c,0x36,0x12,0x7b,0x7d,0x5a,0x44,0x4e,0xe1,0x6b,0x26,0x8b,0x54,0xe8,0x8f,0x94,0x24,0x7e,0x3c,0xd9,0xe2,0x28,0x64,0x40,0xeb,0xaf,0xbf,0xe0,0xbc,0xd1,0xc2,0xfe,0xc3,0xc3,0x0f,0x0c,0x30,0x2d,0xf6,0xf2,0xc2,0x9a,0xe9
.byte 0xdc,0x2c,0x63,0x9d,0x1a,0xc2,0xfc,0x94,0xe7,0xfa,0x6e,0x9f,0x3c,0xd5,0x51,0x18,0x62,0x46,0xcc,0xab,0xbd,0x26,0xe6,0x85,0x9b,0x4d,0x5d,0xf5,0x16,0xe1,0x5e,0xf0,0x40,0x44,0x90,0xf6,0x98,0x06,0x68,0xdc,0x7c,0xcb,0x26,0x78,0xde,0xe9,0xbd,0xa1,0xfd,0xe9,0x43,0x8c,0xcf,0xe0,0x8b,0xf3,0xca,0x65,0x19,0xc1,0x93,0x18,0x13,0x5d
.byte 0x0f,0xce,0x0b,0x2b,0x6f,0x68,0x38,0x82,0x79,0x68,0x82,0x0a,0x24,0x40,0x77,0xa5,0xcd,0x98,0x36,0xf5,0x0d,0x03,0xd1,0x0f,0xed,0xaa,0x24,0xe1,0xe2,0x8f,0x5a,0xf0,0x3c,0xce,0xbd,0x65,0x4e,0x40,0xd3,0xcc,0x89,0xd3,0xa8,0x5f,0xbf,0xcc,0x77,0x75,0x61,0x1e,0x78,0x70,0x3d,0x41,0xdf,0xb8,0x13,0x0d,0x58,0x37,0x94,0x67,0x89,0xc3
.byte 0x52,0x19,0xb5,0x59,0x83,0xb4,0xf5,0x54,0x57,0x93,0x9a,0xc6,0x40,0x8c,0x85,0x7f,0xd2,0x42,0x6a,0xaf,0xb2,0xae,0xcf,0x57,0x99,0xbf,0x4d,0xa4,0xb0,0x1f,0x50,0x58,0x3a,0xc0,0xf1,0xdc,0x91,0x8c,0x67,0xc3,0x2a,0xce,0x46,0x4c,0x66,0x39,0xa9,0xd0,0xa7,0x5e,0xd8,0x0d,0x08,0x0f,0x9f,0xb0,0xd2,0x38,0x22,0xb5,0xdb,0xba,0x0f,0xcd
.byte 0x1a,0x62,0x73,0xc4,0xb6,0x6b,0xc5,0x0b,0x54,0xe6,0x83,0xae,0xb5,0x5e,0x73,0x1e,0xb2,0x4a,0xe5,0x2c,0xa6,0x6b,0x1b,0xe7,0x63,0xa3,0xa1,0xe9,0x7d,0xab,0xa9,0x87,0x6e,0xaa,0x43,0x55,0x6f,0x95,0xee,0x81,0xa0,0x45,0x1a,0x56,0xce,0x70,0xe6,0x1f,0x7f,0xd8,0x18,0x52,0x25,0x3b,0x58,0x65,0xbe,0xbf,0x90,0x35,0xee,0x76,0x8b,0x7c
.byte 0x1f,0x2f,0x9e,0x35,0xcf,0xc7,0x29,0xea,0x62,0x66,0x0b,0xe1,0xd0,0xcc,0x29,0xc6,0x6e,0xd4,0xbd,0x46,0x4b,0x02,0x96,0xd3,0x30,0xc3,0x71,0x60,0x73,0x06,0x3a,0x25,0x71,0x9b,0x63,0x82,0x3f,0xac,0xd4,0xdb,0x69,0xbc,0x7c,0x39,0xb7,0x71,0x98,0xa1,0x68,0x7c,0x0c,0x13,0xf7,0xef,0x5b,0xba,0xd9,0x45,0x3a,0x5e,0xa2,0x65,0x1a,0xbf
.byte 0x6e,0x5a,0xa3,0x2f,0x7c,0xf8,0xe4,0x43,0x3f,0xa3,0x53,0x26,0x05,0x2a,0x63,0x21,0x71,0x4f,0x40,0x9e,0xc9,0xd1,0xb1,0x9a,0x0b,0xf2,0x04,0xed,0xc8,0xb8,0x93,0x0f,0xa9,0xad,0x3f,0x30,0x39,0xc8,0x94,0xa3,0x9b,0x77,0x35,0x18,0xb3,0x82,0x1b,0xe5,0xab,0x86,0x9c,0x99,0xaf,0x52,0x6f,0x7a,0xf5,0x3b,0x8e,0x83,0x4a,0x8c,0xfc,0xa0
.byte 0x72,0x10,0x1d,0xb4,0xd3,0xdb,0x38,0x82,0x11,0x5f,0x22,0xc1,0x9d,0x63,0xf2,0x50,0xc9,0x6d,0x1f,0xc4,0x57,0x52,0x53,0x79,0xb2,0x24,0x7b,0x38,0x43,0x26,0xe0,0xdc,0xeb,0x6a,0x5b,0xd2,0xff,0xfc,0xb5,0xd9,0x69,0xf2,0x80,0xaf,0x71,0x33,0xdf,0x33,0x35,0xb0,0xef,0x5f,0xdc,0x37,0xb6,0x36,0xe9,0xae,0x03,0xbc,0x4d,0xa8,0x40,0xc1
.byte 0x7d,0x2c,0xf0,0xf4,0x3b,0x53,0x90,0xf7,0xcb,0xa1,0xd2,0x21,0x8f,0xff,0xfc,0x0c,0x61,0x85,0x53,0x04,0x30,0x0b,0x8c,0xf5,0x6b,0x60,0x73,0xff,0x88,0x29,0x5b,0xfc,0xeb,0xec,0x81,0x10,0xf0,0x56,0x00,0xd8,0x86,0xf0,0xbe,0xbd,0x50,0xf5,0xc9,0x27,0xa4,0x18,0x4c,0xd6,0x3a,0xe6,0x12,0x21,0x8c,0xe9,0x5e,0xba,0x30,0x03,0x4d,0x9e
.byte 0x16,0x60,0x77,0x9c,0x3f,0xa6,0xd5,0x0c,0x82,0x39,0xaf,0xfa,0x7e,0xcf,0x50,0xcb,0x87,0xe2,0x35,0xaf,0x24,0x96,0x2c,0x02,0x70,0xb9,0x21,0x00,0x2f,0xdb,0x3f,0xfd,0xe8,0xa5,0x40,0x87,0xfe,0xfc,0x7b,0x05,0xcf,0xa8,0xae,0x0d,0x71,0x22,0xd1,0xdc,0x7e,0x4f,0x2d,0xd3,0x0f,0x5d,0x0f,0xff,0xdf,0x4f,0xea,0x88,0x4c,0xe7,0x84,0xb6
.byte 0x7d,0xb0,0x74,0x37,0xdb,0x75,0xfa,0x95,0xe7,0xee,0x58,0xb5,0xd4,0x1d,0xe7,0xcc,0x1f,0x3a,0xd0,0x59,0xb8,0x93,0xbf,0xe6,0x33,0x59,0x7b,0x96,0x80,0x77,0x06,0xf3,0xf7,0xab,0x91,0xcd,0x0a,0x4c,0x48,0xc0,0x35,0x07,0x3d,0x9a,0x32,0x90,0x50,0xde,0x22,0x1c,0x40,0x7b,0x19,0x7d,0x98,0x50,0x8a,0x0d,0x19,0xd1,0x97,0xcc,0x42,0xbf
.byte 0xb3,0x81,0x09,0x4f,0x14,0x8d,0xb2,0xfd,0x7d,0xee,0x76,0x97,0xb9,0x99,0x2c,0xbd,0x94,0xd2,0x29,0x6d,0x3c,0x91,0x29,0x64,0x2f,0x6c,0xdb,0x4e,0x26,0x55,0xef,0x55,0x6b,0xb6,0x34,0xf4,0xeb,0x13,0x96,0x5f,0xac,0xcf,0x31,0x72,0x6b,0x9f,0x06,0xb0,0x80,0xc4,0x56,0x33,0x75,0x57,0xdd,0x8e,0x07,0x82,0xe5,0x13,0x20,0xef,0xee,0x4d
.byte 0x8d,0x8b,0xc7,0x73,0x1d,0x7f,0x49,0xdf,0xa4,0x29,0xcf,0xe7,0x9f,0x40,0x8a,0x05,0xba,0x73,0x16,0xdc,0xe9,0x6f,0xdd,0xae,0x79,0xd9,0x44,0x59,0x26,0xd3,0x7c,0xa2,0xcd,0x57,0xc9,0x9d,0x90,0x38,0x73,0x65,0x82,0xc6,0x18,0x77,0xba,0xe2,0xbc,0xea,0x25,0x43,0xc5,0xf6,0xad,0x6c,0x95,0x4c,0x86,0x3f,0x50,0x56,0x28,0x79,0x3e,0x68
.byte 0xf9,0xc3,0xb8,0x52,0x65,0x35,0x6c,0xd8,0x8e,0x06,0xaa,0xec,0x80,0x46,0xdb,0xa8,0xcd,0xbc,0x5b,0xe2,0x30,0x3a,0x3b,0xcb,0x2a,0xec,0xbc,0xe7,0x09,0x84,0xf7,0x9f,0x31,0xbc,0xef,0xdc,0xa9,0xb8,0x87,0x9d,0x4f,0xe1,0xd2,0x1b,0x9f,0x3f,0xd8,0xdc,0x2c,0xc7,0x73,0x08,0x2c,0xaa,0xbe,0x06,0x78,0x8f,0xb1,0x64,0x1b,0x3d,0xb5,0xad
.byte 0x62,0x60,0x7f,0xc4,0x64,0x43,0x18,0xd4,0x8d,0x27,0xb3,0x32,0xae,0x28,0x47,0xdd,0x5d,0xdf,0x08,0x0b,0x0e,0xfb,0xba,0x92,0x55,0x33,0x92,0x02,0xf6,0xc2,0x2e,0xd2,0x70,0xaa,0xfb,0x88,0x9c,0x5e,0x9b,0x26,0x32,0x98,0xf8,0xe6,0x98,0x5c,0xf9,0xd7,0x3f,0xb9,0x74,0x5b,0x10,0x51,0x01,0x6e,0x44,0x71,0x91,0x3e,0x2d,0x06,0x68,0x97
.byte 0xe8,0xe3,0xf5,0xdd,0x46,0xc1,0x10,0x61,0xa9,0xa9,0x96,0x27,0x2a,0x25,0x7b,0x16,0x4a,0xbc,0x61,0x4b,0x32,0x6c,0x44,0x94,0x10,0x04,0x8e,0x0f,0xe6,0x8e,0x15,0xbc,0xb6,0x1b,0x66,0x19,0xff,0x2e,0x70,0x80,0xb2,0x9a,0x51,0x82,0x1a,0xc9,0x98,0x6b,0x7e,0x4f,0x4c,0xf9,0x93,0x2a,0x8e,0xb4,0x44,0x3b,0x75,0xc9,0x28,0xd1,0x63,0xd9
.byte 0x13,0xc8,0x68,0x60,0xad,0x4a,0xbe,0x03,0x1f,0xe2,0xe3,0xe5,0x99,0x11,0x4f,0xc6,0xbe,0x32,0xfa,0xb8,0xde,0x69,0x28,0x4b,0x11,0x4e,0xdd,0x0e,0x45,0x6e,0x43,0xe1,0xe6,0x7c,0x8f,0x8c,0xee,0x57,0xef,0x29,0xb4,0xb9,0x3c,0x9e,0x3a,0xc7,0xe0,0x98,0xce,0x29,0x44,0x1c,0x72,0x68,0x33,0x04,0xd4,0x9a,0x42,0xe1,0x77,0xa0,0x5b,0x1f
.byte 0x11,0x5d,0x82,0x8c,0xb6,0xb1,0x3b,0xce,0x4e,0xa9,0xaa,0x05,0xf2,0x67,0x6c,0x0c,0xa3,0x08,0x9a,0xe0,0x14,0x92,0x82,0x51,0x98,0x7f,0x01,0x0a,0x77,0x35,0xa9,0xc0,0xbe,0x0a,0xde,0x13,0xf0,0x89,0xc9,0x54,0x9c,0x1e,0xc7,0x57,0xad,0x6b,0x36,0x8e,0x91,0x95,0x70,0x78,0x43,0x64,0x0e,0x0b,0x5c,0x97,0xc7,0xc5,0xc0,0xb6,0x4e,0x80
.byte 0x6e,0x20,0xa6,0xe7,0xfb,0xd1,0xc1,0x57,0x86,0x81,0xd8,0x8f,0x59,0x8c,0xd4,0xa8,0x8b,0x8c,0x2b,0x50,0x6a,0x90,0xdf,0xef,0x14,0x53,0x18,0x2f,0xbc,0x39,0xf8,0x1f,0xa6,0xc3,0x23,0x0f,0x0f,0xcf,0x75,0x7a,0xad,0x12,0xfd,0x22,0x24,0x56,0x51,0xb5,0x94,0x90,0x08,0xb2,0x1c,0x01,0x09,0xa4,0xe3,0xa0,0x65,0x3a,0xda,0xd7,0xe5,0xf2
.byte 0x78,0x4f,0xe6,0x55,0x37,0xc4,0x9c,0x9e,0xb0,0xb8,0xbe,0x89,0x61,0x7e,0x46,0xf3,0x51,0xdd,0x2c,0x87,0x48,0x0f,0x04,0xe7,0x96,0x3a,0xcb,0x4d,0x8b,0x9d,0xa0,0xfb,0x6c,0xe8,0xa4,0xc2,0x92,0x4c,0x97,0x05,0xd3,0x23,0x3f,0x07,0x3c,0xba,0x64,0xa8,0xdb,0x09,0x81,0x7d,0xea,0x66,0x1a,0x8e,0x7c,0x35,0x28,0xce,0xe3,0xce,0xbf,0x7c
.byte 0x02,0x4f,0x39,0xac,0x38,0xd8,0x34,0x71,0xe4,0xfa,0x26,0x6e,0xf1,0xd9,0x53,0xd6,0x50,0xce,0x21,0xeb,0x4c,0x98,0x97,0xeb,0x21,0x29,0x4f,0xd8,0x49,0x34,0xd1,0xc9,0x32,0x7c,0x82,0x53,0xc2,0xec,0x41,0x5d,0x42,0x39,0x11,0x17,0x41,0x54,0x3d,0x60,0x8b,0xb4,0x42,0x99,0x68,0x16,0xbd,0x50,0xb2,0x4a,0xba,0xca,0x42,0x59,0xb0,0x7e
.byte 0x88,0xab,0x18,0x6b,0x1d,0xe4,0x68,0x2e,0xeb,0x95,0xb5,0xc6,0x3b,0x64,0x38,0xbd,0x15,0x61,0xac,0x1a,0x79,0xd0,0x73,0xde,0x31,0xfc,0xd8,0x43,0x54,0xca,0x97,0xdb,0xa7,0x16,0xf8,0x34,0xa6,0x86,0xce,0x3f,0x82,0xbc,0x92,0xf9,0x82,0x8e,0xef,0xc5,0x6b,0xa4,0xa0,0x83,0x7f,0xe9,0xf5,0x1f,0xdd,0x24,0xdc,0x88,0x08,0xf2,0x93,0x36
.byte 0x4a,0x9c,0xaa,0x8a,0x51,0xf7,0x10,0x03,0x35,0x9e,0x44,0x29,0x15,0x94,0x46,0x71,0xc7,0x2a,0x8a,0x14,0x48,0xde,0x11,0x67,0xb1,0x8b,0xb4,0x5a,0x0a,0x76,0xc7,0xd8,0x1c,0x17,0xee,0x78,0x12,0xcc,0x93,0x0f,0xab,0x17,0x9f,0xb0,0x90,0x31,0x46,0x76,0x10,0xb3,0x37,0x26,0xe8,0x60,0x21,0x9a,0xd6,0x63,0x41,0xbe,0x8c,0x51,0x96,0xb0
.byte 0x0d,0x44,0x99,0x32,0xef,0x54,0xf7,0xf4,0xb2,0x65,0x3e,0x2c,0x39,0x72,0x06,0xd7,0x57,0x0b,0x61,0x12,0xe2,0x90,0xbf,0x45,0xe2,0xd6,0xd3,0x27,0x9f,0xbe,0x3f,0x83,0x58,0x6a,0xe7,0x03,0x3f,0xeb,0x82,0x9f,0xad,0xe3,0x12,0x9c,0x0b,0x65,0x32,0x28,0xee,0x93,0xf9,0x1a,0xd2,0xda,0xd0,0x41,0xad,0xb4,0x9d,0x37,0xc7,0xd5,0x44,0x9a
.byte 0x48,0x42,0x29,0x89,0x21,0xa5,0x2e,0xf9,0x92,0x55,0xa2,0x64,0xdf,0x63,0x23,0x7b,0x03,0xce,0xb7,0x4e,0x4d,0x84,0x83,0xf2,0x07,0x3e,0xf4,0x51,0x5c,0xb5,0xce,0x49,0xf4,0xff,0x66,0x1d,0xcc,0x3a,0x45,0x36,0x7a,0xae,0x00,0xfa,0x56,0x84,0x3c,0x3f,0x51,0xb0,0x16,0x79,0x0d,0xa5,0x02,0x25,0x3c,0xcd,0x22,0x2e,0x4c,0xde,0x5c,0xf0
.byte 0xf3,0x44,0x4f,0xb3,0xbc,0x42,0x19,0x2f,0x9c,0xbd,0xd9,0x3f,0xa4,0xfe,0x21,0xab,0x82,0x97,0x76,0x16,0xed,0x20,0xa4,0x93,0x4b,0x21,0x70,0xed,0xc1,0x10,0x7a,0x27,0x1b,0xfc,0x99,0x52,0xa0,0x75,0xc6,0xb2,0x1d,0x97,0x83,0x73,0xe7,0x0b,0xa9,0x03,0xd5,0xba,0x51,0xb9,0x4f,0xa6,0x61,0xfc,0x45,0xff,0xe3,0x82,0xd6,0xab,0xc5,0x36
.byte 0x1c,0x63,0xcb,0x09,0x14,0xee,0x5a,0x5a,0xe8,0x20,0xa2,0xde,0x4b,0x1a,0x8a,0xcf,0xb4,0xd8,0x6f,0x5c,0x98,0x21,0x66,0xfb,0x5d,0x8a,0xc1,0xbe,0xdd,0x69,0x9e,0x1e,0xeb,0xa0,0x81,0xea,0x8b,0x2a,0xb6,0x80,0xff,0xb9,0x32,0x0a,0xfc,0xb6,0xb7,0xd8,0xa2,0x5d,0xbf,0xc3,0xe1,0x73,0xba,0x4b,0xbc,0xaa,0x31,0x7e,0xc9,0xe7,0xd0,0x9e
.byte 0xde,0xdc,0xb5,0xfa,0x9d,0x9d,0x8c,0xed,0xe6,0x44,0x3a,0x81,0x37,0xd7,0x2c,0xee,0x3f,0xe4,0xed,0xc5,0x43,0xcc,0x2e,0x02,0xdd,0xfc,0xae,0xd1,0x2d,0xb3,0x75,0xdd,0x7c,0x85,0xfa,0x2d,0x8a,0xec,0x05,0xd3,0x45,0x8b,0x3a,0x6d,0x78,0x36,0x04,0x71,0xe2,0x10,0xb8,0x13,0xb2,0xbd,0xc6,0x0e,0xb7,0xda,0xfa,0xf8,0x47,0x9b,0x7d,0x14
.byte 0xe2,0xaa,0x82,0xfc,0x23,0xd2,0xef,0xff,0xaa,0x94,0x67,0x82,0xf6,0x31,0xfa,0x5e,0xbd,0xd1,0x78,0xee,0x07,0xb2,0xcd,0x0f,0x73,0x36,0xeb,0xb3,0x7c,0x6e,0x66,0x73,0x85,0x5a,0x23,0x26,0x2d,0x5b,0xb0,0x6c,0x04,0x1f,0x70,0x0a,0x67,0xff,0x02,0x77,0x66,0x51,0xbf,0x0b,0xe2,0x90,0x96,0x79,0xe2,0xac,0x21,0xa4,0x58,0x51,0x7c,0xb2
.byte 0x03,0xb1,0x64,0xb1,0x51,0x95,0xad,0x3e,0x4b,0x76,0xf1,0xb0,0x87,0x02,0x82,0x4b,0x18,0xb3,0x87,0xc1,0xc1,0x49,0xf3,0xd2,0x71,0x69,0x0a,0xef,0x5b,0x8d,0x89,0x80,0x98,0x9a,0xee,0xc5,0xab,0x9b,0x04,0x9b,0x1a,0x51,0x53,0xc6,0xaa,0x3f,0x84,0xe8,0x60,0xf4,0x15,0xff,0xb4,0xc8,0x1b,0xe1,0x8d,0x3f,0xe9,0x6c,0x79,0x74,0xc3,0xef
.byte 0x1a,0xb8,0xdd,0xb5,0x92,0xba,0xf9,0x29,0xa1,0x0c,0x0d,0x88,0x08,0xd8,0x8c,0xb9,0xad,0xdf,0x62,0x03,0x27,0x79,0x69,0xca,0x21,0x24,0x00,0x3f,0x9e,0xcd,0xc6,0x8f,0x66,0xee,0x0d,0x6f,0x29,0xa5,0xf7,0x51,0x7c,0xa8,0xfd,0xa9,0xce,0x75,0xcd,0xdb,0xa6,0x86,0x43,0x16,0xc7,0xf0,0xea,0xfd,0xf8,0x08,0xd4,0x4e,0x7b,0x10,0xd2,0x5b
.byte 0xcf,0x4f,0xf0,0x71,0x72,0xc4,0x31,0x90,0x93,0x09,0x69,0xfb,0xd6,0x1c,0x41,0x62,0x58,0x5c,0x60,0xbb,0x89,0x28,0xc1,0x57,0xa2,0x52,0x8d,0x48,0x98,0x0b,0xd8,0x7c,0xb1,0x7c,0x92,0x1c,0x2a,0xec,0x0a,0x61,0xa6,0x36,0x3b,0xf5,0x24,0xe4,0xb4,0xc3,0x09,0x99,0x89,0x8b,0x7a,0x9f,0x61,0x3c,0xc1,0x8b,0x1b,0xda,0xb2,0x44,0xab,0xbb
.byte 0x8a,0xad,0xcb,0x17,0xe5,0x2e,0x74,0x23,0x39,0x76,0x10,0x0f,0xd5,0xa8,0x4f,0xc2,0x14,0xa5,0xb6,0x47,0x48,0xfb,0xb2,0x52,0x9e,0x0a,0xfc,0x0f,0x95,0x04,0xa8,0x71,0xa7,0xca,0xb7,0x01,0x67,0x39,0xd1,0xc7,0xf6,0x15,0xc4,0x8b,0xe8,0xa5,0xb9,0x5c,0x7e,0x83,0x26,0xd5,0x37,0x4c,0x44,0xff,0x0b,0xa3,0x53,0x3b,0x6c,0xb7,0xbb,0x10
.byte 0xbc,0x33,0xb8,0xd0,0x4c,0x00,0x3b,0x62,0x6b,0x43,0x4e,0x91,0x2f,0xa5,0x08,0x35,0x6f,0xc3,0x03,0xa1,0x10,0xbc,0xb1,0x31,0x8d,0x51,0x0f,0x2f,0x42,0xfb,0x45,0x55,0xac,0x1e,0x05,0x05,0xbc,0xc9,0xe8,0x23,0xd5,0xe8,0x68,0x32,0xa7,0x10,0xa0,0x7d,0x72,0x02,0xc1,0xcd,0x0a,0xdc,0x2f,0x4b,0xbc,0x34,0x94,0x25,0x9b,0xc8,0x25,0x4a
.byte 0xc7,0x1a,0xc6,0x62,0xeb,0xa5,0x4b,0x8b,0x0e,0x2b,0x93,0x88,0xbf,0xa6,0xb9,0x73,0xae,0x7f,0xa5,0x6d,0xce,0xc3,0xf5,0x9a,0xcb,0xed,0x69,0xc7,0x34,0x39,0xcf,0xde,0x86,0xf3,0xa8,0x0e,0x5d,0xdc,0x76,0x0d,0x60,0x96,0x62,0x2e,0x61,0xe6,0x69,0xc6,0xd8,0xb9,0x86,0xda,0x4f,0xa0,0x78,0x03,0xa7,0x1a,0x52,0xb4,0x1b,0xb8,0x57,0xca
.byte 0xed,0x92,0x6c,0xbc,0x3c,0x83,0xbd,0x8d,0xbd,0xe3,0xa9,0x08,0xe1,0x8a,0xab,0x30,0x39,0xc8,0x50,0xe8,0xda,0x6e,0xa6,0xc6,0xc4,0xe7,0x13,0x7d,0xa7,0x77,0xea,0x3b,0xe1,0xa3,0x4a,0x8e,0x48,0xf3,0x52,0xa7,0x82,0x40,0x76,0x99,0x3e,0x45,0x60,0x6e,0xf1,0x59,0xa5,0x22,0x7c,0x3d,0xac,0x72,0x00,0xbc,0xc6,0x37,0x62,0x58,0x63,0x63
.byte 0xd8,0xe9,0x47,0x2f,0x1c,0x89,0xaf,0xc9,0x3b,0x73,0xdf,0xbe,0x6c,0x96,0x1a,0x87,0x20,0xd7,0xf7,0x1b,0xce,0xa6,0x08,0x46,0x44,0x0a,0x1a,0xe4,0x87,0x6b,0x94,0x1a,0x35,0x70,0xec,0x2b,0xdd,0xf9,0xbb,0xd3,0xd3,0x2a,0x63,0xd3,0x07,0x7e,0xab,0x18,0xa8,0x2f,0x64,0x00,0x7e,0x08,0xaf,0x46,0x39,0x8b,0x29,0xf2,0x50,0xd3,0xa9,0xf1
.byte 0xf0,0xe0,0x38,0x32,0xe5,0x82,0x88,0x8d,0xa7,0x79,0x88,0x20,0x56,0x01,0xf5,0x6c,0x99,0xe6,0xbf,0x89,0xd7,0x1c,0xfa,0xfd,0xd1,0x86,0xfd,0x5d,0xdf,0x04,0x95,0xda,0xe6,0x99,0x64,0x80,0x68,0xda,0x36,0x97,0x65,0x81,0x1f,0xed,0xb4,0xba,0x21,0xb0,0x87,0x01,0x7c,0x96,0xe7,0x6f,0xea,0x36,0x20,0x65,0xa9,0x73,0x6c,0x03,0xa6,0x03
.byte 0x9c,0x82,0xbb,0xbf,0x3b,0x3d,0x9e,0x0d,0x31,0x1a,0x08,0x46,0x02,0xb5,0x43,0xe7,0xa1,0xfe,0xdb,0x35,0x13,0x6f,0x28,0x87,0x14,0x53,0x38,0xdf,0xda,0x88,0x0e,0xd1,0xac,0xe3,0xd4,0xea,0xd3,0x09,0xb8,0xc6,0x6f,0x9b,0x51,0x82,0xa8,0xc5,0x18,0x1d,0x8d,0x9c,0xc8,0xde,0x98,0x57,0xa8,0x3f,0xaf,0x8d,0x09,0xeb,0xab,0xa9,0x63,0x98
.byte 0x5a,0x6d,0x05,0x45,0xcc,0xb7,0x0c,0xb7,0xd0,0x59,0x11,0x25,0x51,0x63,0xba,0x61,0x4a,0x1a,0x86,0x68,0x3e,0xb1,0xfa,0xb9,0xab,0x9b,0x78,0xbe,0x8f,0xde,0x4e,0xf9,0x22,0x4b,0xaa,0x19,0x2c,0xad,0x17,0xa9,0xb2,0x9b,0x40,0x8c,0xeb,0xb6,0x42,0xbc,0x14,0xa8,0xa2,0xd2,0x21,0x6e,0x19,0xe8,0xd3,0x07,0x82,0x0a,0x22,0xd9,0xf3,0x09
.byte 0x29,0x68,0x34,0xb0,0xbb,0xad,0x25,0x17,0x3d,0x3b,0xf9,0x29,0xe3,0x8e,0x30,0x9d,0xb4,0xb8,0x51,0xa9,0x67,0x6f,0xe9,0xca,0x05,0xf0,0xd5,0xc2,0xd0,0x73,0x83,0x61,0x97,0x50,0x90,0x4c,0x6f,0x95,0xe6,0x62,0xcf,0xc0,0xe5,0x2c,0x42,0x45,0xd6,0xc9,0x01,0x74,0x19,0xaa,0x7a,0x53,0x9f,0xb6,0xab,0xa9,0xd3,0x19,0x80,0x10,0xd7,0xe2
.byte 0x68,0xaa,0x17,0x60,0x47,0x8b,0x64,0x1f,0x69,0x16,0x2b,0xd5,0x7d,0x04,0x1a,0x3c,0x25,0x68,0xb6,0x0b,0x85,0x1b,0x4b,0x8b,0x11,0xde,0x57,0x97,0x03,0xcb,0x91,0x03,0x65,0xc9,0x2d,0x0b,0x59,0xd0,0x8e,0x98,0x91,0x3a,0x00,0x83,0xd6,0x41,0xb1,0x3b,0x2c,0x34,0x84,0x57,0x0d,0xf0,0xc4,0x25,0xa6,0xf1,0xa6,0x41,0xdf,0x0e,0xad,0x06
.byte 0x03,0x13,0xcb,0x63,0x68,0xf7,0x07,0x1e,0xec,0xe1,0x36,0x4a,0x4d,0x50,0xc1,0x48,0xc5,0x95,0x22,0x10,0xf8,0xb7,0x45,0xc7,0xa4,0x35,0x40,0x8e,0x7c,0x9f,0x8b,0xa2,0x22,0x6b,0x2d,0xbb,0x52,0x33,0x13,0xfc,0x08,0x59,0x13,0xd0,0x3c,0x0e,0x2b,0x80,0xab,0x02,0xc3,0x92,0x3f,0x94,0x41,0x86,0x47,0xf8,0x27,0xa2,0xf8,0x0b,0xf2,0x45
.byte 0x33,0x23,0xfa,0xd0,0xf0,0xa1,0x74,0x02,0x60,0x4f,0x1b,0xdd,0xba,0x2d,0xbe,0xd6,0xf3,0x6b,0xbe,0x4d,0x6b,0x66,0xe2,0x4c,0x4e,0x03,0xc2,0xd9,0xe4,0x52,0xbd,0x4d,0xdd,0x0d,0x46,0x9c,0x97,0x68,0xdc,0xd6,0xfb,0xfe,0x19,0xdd,0x69,0xd1,0x6e,0xbb,0x8b,0x58,0x5c,0x5c,0x2c,0x4d,0x5c,0x63,0x6e,0x01,0x60,0xf3,0x9b,0xb1,0x63,0x70
.byte 0x3e,0x55,0xeb,0xc0,0x5f,0x12,0x1f,0x06,0x6d,0xbb,0xed,0x53,0x5c,0x25,0x4f,0x5b,0x1d,0x84,0xb7,0xab,0xaa,0x11,0x75,0xc7,0xb0,0x66,0xd9,0x32,0xec,0xb4,0xe3,0x3d,0x8d,0x9f,0x44,0xa1,0x03,0xbc,0xf2,0x9d,0x62,0x7d,0xbd,0x80,0x0d,0xa1,0xfa,0xe8,0xd0,0x91,0xe2,0xd5,0x20,0xe1,0xb8,0xdb,0xd8,0xa8,0x15,0x47,0x09,0x00,0x7e,0x29
.byte 0xf2,0x5c,0x93,0x04,0x79,0x81,0x7e,0x22,0xd0,0x86,0x1c,0xf3,0x42,0x11,0xff,0xdc,0x9a,0x35,0x4c,0x9f,0xa4,0x7f,0xf3,0x0a,0xe8,0x63,0xb9,0x79,0x59,0xcc,0x8d,0xfd,0x27,0xbb,0x2d,0x1b,0x72,0xd6,0xac,0x5f,0x6e,0x13,0xbc,0xc3,0xff,0x84,0xf5,0x58,0x00,0x8a,0x71,0xdb,0x69,0xf4,0xd4,0xc8,0xbc,0x12,0x84,0xf7,0x07,0x4d,0x5b,0xd0
.byte 0x7d,0x6c,0xec,0x01,0xe6,0x39,0x07,0x15,0x1c,0xca,0x49,0x62,0xe2,0xe9,0xf7,0xd2,0x81,0xd8,0x13,0x9f,0xaf,0xb3,0x1f,0xf5,0xf1,0x8d,0x61,0xa1,0x02,0x03,0x21,0xce,0x07,0xe2,0xd5,0xec,0x8d,0xfc,0xd4,0x51,0xd6,0x7a,0xc5,0x50,0x38,0x9d,0x91,0x0e,0xfe,0x97,0x63,0x19,0xb8,0x43,0x75,0xd2,0xfb,0xde,0xbd,0x84,0x1d,0xb7,0xdf,0xab
.byte 0xa9,0x86,0x69,0x2d,0x11,0x18,0xec,0x00,0x88,0xf0,0x86,0xa2,0xd5,0x07,0x9d,0x60,0x52,0x39,0x6d,0xae,0x30,0x5d,0x01,0xa2,0xd8,0xc9,0xc3,0xf8,0xc7,0xbe,0x04,0xe1,0x80,0x4e,0x7a,0xaa,0x3d,0xd2,0xb3,0x2f,0x91,0x9a,0xa8,0xbf,0xef,0x6d,0x61,0xf6,0x33,0x3e,0xf4,0xe6,0x0e,0x82,0x88,0x6f,0xef,0x55,0x97,0xf2,0xda,0x52,0xf1,0x3b
.byte 0x46,0x5d,0x23,0xe5,0x7e,0x7c,0x8b,0x51,0x56,0x96,0xf4,0x77,0xc5,0xa0,0x3c,0x14,0x3d,0xc2,0x3a,0xc1,0xaf,0xfe,0x6d,0xec,0x80,0x79,0xba,0x19,0x5f,0x26,0x8c,0x7d,0xb6,0xd2,0x27,0xf0,0xcf,0xa4,0x04,0x31,0x7d,0x8c,0xf5,0xa0,0xcc,0x04,0xd5,0x6e,0x4f,0xe0,0x35,0x0f,0x20,0xec,0x53,0xad,0x02,0xb8,0xdb,0x4c,0x4e,0xda,0x73,0x5a
.byte 0xc5,0x46,0xe5,0x10,0xbd,0xa2,0xb5,0xbf,0x71,0xc1,0x3a,0x83,0x58,0x6c,0x74,0x32,0xed,0xd3,0xcc,0xa5,0x6d,0x65,0x5b,0x5c,0xfe,0xcd,0x68,0x02,0xad,0xcf,0x54,0x4c,0x1d,0xad,0xdf,0xeb,0xa0,0xda,0xb0,0x12,0x5c,0xba,0x7b,0xa2,0x5d,0x5e,0xf3,0x6f,0x42,0x2d,0x83,0xf3,0x28,0xaa,0xcf,0x6c,0x85,0x6a,0x6b,0x80,0xc0,0x28,0x2e,0x1b
.byte 0x68,0xfa,0xe7,0xdc,0x1e,0x97,0x8d,0xca,0x1b,0xed,0xca,0xde,0x8f,0x52,0x73,0x54,0x57,0xaf,0xf0,0xb8,0x91,0x08,0xec,0x01,0x42,0x97,0x26,0x27,0xdd,0xfc,0x53,0x81,0x4c,0xbe,0x95,0xb5,0x67,0x51,0x35,0xb2,0xa5,0x8f,0x62,0x10,0x7a,0x1a,0x0e,0xcc,0xf1,0x9c,0xc4,0xa3,0xff,0xda,0xe4,0x23,0x12,0xf9,0x73,0x6f,0xeb,0xb1,0x82,0x00
.byte 0x5f,0x35,0xaf,0x2e,0x6e,0x88,0x31,0xc0,0xb9,0x1a,0xce,0x27,0x5f,0xbc,0xcf,0x6d,0x03,0x12,0xfb,0xe9,0xae,0x3e,0xff,0x1c,0xa5,0x28,0x9d,0x19,0xd3,0xfe,0xca,0xd0,0x3c,0x04,0xd1,0x64,0xea,0xdd,0x2d,0x4a,0x0f,0x23,0xcc,0xd4,0xe5,0xf9,0xad,0x95,0xe4,0x91,0xb0,0xaa,0xb7,0x1e,0x28,0x9f,0xac,0xbc,0x9f,0xa3,0x62,0xb0,0x37,0xaf
.byte 0xdd,0xe6,0xcd,0x65,0xb4,0xea,0x31,0xbe,0xca,0x44,0x93,0x16,0x74,0x46,0x5a,0x3d,0x78,0x8d,0x9d,0x01,0x6b,0xf6,0xa7,0xf3,0xdd,0x1b,0x92,0xc1,0x74,0xf0,0xe4,0x32,0x90,0xc5,0x4d,0xdb,0x3e,0xab,0x0d,0x4c,0x1e,0x82,0x2f,0x82,0xe2,0xf7,0xe6,0x13,0xa8,0x8c,0xd6,0xaa,0x59,0xee,0x5c,0xc6,0x1c,0x67,0xd6,0x6f,0xf8,0x92,0xce,0xf0
.byte 0xfa,0xde,0x15,0xdb,0x86,0x79,0x6e,0xaf,0x03,0x10,0x91,0x3f,0x6b,0xc4,0x6a,0x23,0x2d,0x01,0x36,0xbf,0xb4,0xff,0x99,0x46,0x92,0x64,0x45,0xd5,0xb0,0x1d,0xaf,0x13,0xa0,0xe0,0xf4,0x21,0x5d,0x98,0x47,0x04,0xef,0x06,0x81,0xd1,0x7c,0xf1,0x1d,0x4d,0x6d,0x04,0x9f,0x3b,0xf7,0xf9,0x27,0x6c,0x91,0x15,0xf3,0xf0,0x48,0x63,0x9d,0x56
.byte 0xb1,0x8a,0xdb,0x27,0xf4,0x83,0x4e,0xfa,0x4b,0x15,0xc5,0x38,0xdf,0x4b,0xd5,0xcc,0xd4,0x15,0x21,0xc0,0xd8,0xbe,0xda,0x9e,0xe6,0x35,0xa6,0x4e,0x76,0x27,0xc6,0x10,0x02,0xf4,0xa1,0x9d,0x71,0xe5,0x77,0xdc,0xcd,0xbd,0xda,0xdb,0x46,0xd7,0xc7,0xa0,0x71,0xd5,0x0e,0xfd,0x4e,0xe7,0xe0,0xb9,0x69,0x9b,0x31,0x12,0x16,0x04,0x71,0x0d
.byte 0xac,0x6e,0xb7,0x66,0x1e,0xfd,0x9b,0x0d,0x57,0xd9,0x8f,0xd6,0x2e,0x13,0xb4,0x5b,0xd4,0x6e,0xa3,0xeb,0x7a,0x10,0x62,0x21,0xdc,0x0f,0x5c,0x29,0x37,0xd0,0x81,0x0e,0x14,0xc2,0xb6,0x2f,0x26,0x8b,0x1b,0x2d,0x72,0xb4,0x85,0x28,0xad,0x90,0x29,0x44,0x4e,0x1c,0x0e,0x1e,0x31,0xf8,0x54,0x8b,0x54,0x35,0x36,0x1c,0x3c,0xc9,0x1f,0x0e
.byte 0xf8,0xee,0x35,0xec,0x04,0x65,0xf8,0x13,0xb3,0x5a,0x73,0xfc,0x12,0xd6,0x35,0x19,0x7a,0x20,0x91,0x86,0xef,0x26,0xae,0x8b,0x03,0x11,0xb1,0x3a,0xa0,0xfc,0xee,0x6d,0xf2,0xfc,0x46,0x34,0x60,0x16,0xeb,0x4a,0xdb,0xcc,0xfb,0xa5,0xf1,0xde,0x19,0x62,0x9a,0x07,0xee,0x88,0xfe,0xdc,0x2e,0xc6,0x96,0x72,0x83,0x62,0x60,0x75,0xb9,0x88
.byte 0x96,0x18,0xd9,0x03,0x80,0xd0,0x24,0x80,0x1d,0x04,0x2d,0xee,0x63,0x96,0xd6,0xfc,0xc7,0x01,0x71,0xb1,0xfc,0x8b,0xc4,0x88,0xcf,0x01,0x25,0xa7,0x51,0xbc,0xe6,0xaa,0x48,0x77,0xbb,0x70,0xe6,0x8d,0xfe,0x83,0x33,0xae,0x29,0xd9,0x1d,0x44,0xff,0x18,0xcf,0x91,0xe8,0x0d,0xdc,0x8b,0xdd,0x6b,0xec,0x35,0x16,0xfc,0xe1,0x0b,0xb2,0x70
.byte 0xad,0x4a,0xa4,0x2c,0x23,0xa7,0xb8,0x64,0x2f,0x4a,0x7d,0x13,0xf6,0xa6,0x57,0x26,0x4d,0x08,0x6c,0x39,0x72,0xbe,0xdb,0x59,0xa8,0xe1,0x60,0x00,0x03,0xa6,0x56,0xa3,0x89,0x56,0xf1,0xe9,0x81,0x31,0x32,0xfd,0xba,0xd6,0x5f,0x38,0x89,0x92,0x88,0xd6,0xf0,0xb5,0x3c,0x46,0xed,0xec,0x9d,0x5a,0x42,0xe0,0x9a,0x6e,0xed,0x98,0x6a,0xec
.byte 0x97,0x22,0x5b,0x93,0xba,0xa5,0xc4,0x71,0x86,0x1f,0x32,0xa0,0x2a,0x50,0xb3,0x56,0x7e,0x62,0xb2,0xe1,0x84,0x5a,0xbd,0xdb,0x2f,0x38,0xd0,0x12,0x79,0x57,0xe8,0xf7,0x45,0xd9,0x71,0x4e,0x1a,0x0a,0x08,0xa0,0xc7,0xea,0x9d,0x74,0xc7,0xa6,0xaa,0x62,0x17,0xa2,0xba,0x23,0x26,0x41,0x1a,0xe4,0x02,0x98,0xd1,0xbb,0x32,0xa2,0xa1,0xcf
.byte 0x55,0x3c,0x2d,0xef,0xa6,0x69,0x4f,0xed,0x15,0x43,0x34,0xfa,0x40,0x8c,0xa2,0x0c,0xcf,0x2c,0xda,0x4d,0x08,0x34,0x3e,0xae,0x98,0xbd,0x2c,0x75,0x40,0x77,0xd7,0x7e,0x6e,0x09,0x64,0x39,0x0a,0x84,0x79,0x5e,0xe7,0x72,0x96,0x9d,0xc2,0x17,0x0a,0x3c,0x6d,0x76,0xf0,0x4b,0x75,0x12,0x45,0x19,0x55,0x84,0x06,0x6b,0x27,0x44,0xe5,0xf4
.byte 0x89,0xbc,0xd4,0x50,0x0e,0x89,0xfd,0x9f,0xd6,0x3b,0xfb,0xa5,0x88,0xef,0x1d,0xd2,0x58,0x2b,0xc7,0x6b,0x07,0xb8,0x6a,0x40,0xe9,0x29,0x5a,0x9d,0x20,0xad,0xfd,0x9b,0x36,0x7e,0x8d,0x1f,0x81,0xd9,0x06,0x03,0x47,0x70,0x3f,0x7d,0x89,0x03,0x57,0xa7,0x46,0xc4,0x4b,0x9a,0xc8,0x57,0x35,0x02,0x2d,0xe0,0x89,0x0a,0xd1,0x67,0xe1,0x7a
.byte 0xe2,0x2f,0xcd,0xe3,0x2e,0xbc,0x2a,0xf5,0x1a,0xb1,0x6c,0xc3,0x89,0x5c,0xda,0x63,0xc4,0xc6,0x8e,0xca,0x97,0xf4,0x5d,0x02,0xfc,0x37,0x46,0x72,0x07,0xca,0x3a,0x4a,0xa2,0xc4,0x90,0x14,0x0c,0x3c,0x9c,0x6d,0xb2,0x33,0xe8,0x94,0xfd,0x5e,0xb5,0x53,0x19,0xa5,0xfa,0x2a,0x99,0x26,0x8b,0x34,0x7e,0x8b,0xe3,0xc6,0x50,0x6c,0x3c,0x3f
.byte 0xda,0xe0,0xa4,0x50,0x34,0xa0,0x6a,0xdc,0x06,0xac,0xee,0x77,0x9a,0xa0,0xc1,0x8b,0x4f,0x82,0x71,0x1b,0x5e,0x3d,0xef,0xcd,0xcf,0x19,0x44,0x01,0x80,0x65,0x1a,0x1c,0xbd,0x5f,0x50,0x4a,0x6c,0xa2,0x7f,0x82,0x74,0xa6,0x59,0x39,0x46,0xc1,0x87,0x5b,0xcb,0x70,0x21,0x5e,0xcf,0x1e,0x61,0x73,0x01,0xe6,0x1b,0x0e,0x94,0xf9,0x16,0x91
.byte 0x1b,0x42,0x99,0xee,0x62,0x62,0xc3,0x02,0xbb,0xaf,0x5f,0xcc,0x98,0x09,0xd5,0xd7,0xdf,0xb8,0xed,0xb9,0xb3,0xde,0x4a,0xfc,0x22,0x8b,0x47,0xc2,0x60,0x31,0x89,0x4f,0x6a,0xbb,0x88,0xc4,0x02,0x25,0x65,0x7b,0x7c,0x2b,0x47,0xf5,0x83,0x99,0x0e,0x0a,0xf5,0x49,0x8c,0x32,0xd5,0x04,0x05,0x7f,0xe0,0x59,0xd5,0xb8,0x9a,0xf7,0xa0,0x3d
.byte 0x67,0xed,0x1c,0xc1,0x62,0xb2,0x48,0x8a,0x64,0xa4,0x97,0x74,0x3b,0x9e,0xec,0x04,0xf9,0xa3,0x40,0x85,0xd4,0x39,0x37,0xe1,0x1a,0x64,0x6e,0x9d,0x2a,0xbb,0x6b,0xf5,0xb9,0x65,0xfd,0x1b,0x14,0x23,0x85,0xcc,0xfa,0x69,0x69,0xca,0x09,0xf1,0x64,0x11,0x3b,0x03,0x29,0x46,0x53,0x0b,0x06,0x29,0x29,0x86,0x03,0x40,0x5c,0xa8,0x5b,0xbe
.byte 0xd5,0xa6,0x04,0x2d,0x05,0x91,0x88,0xb5,0x85,0x37,0x37,0x26,0xed,0xf5,0xdd,0x58,0x98,0x53,0xf9,0x26,0x08,0x80,0xae,0x37,0x65,0x42,0xe1,0x4a,0x7b,0x75,0xeb,0x73,0x14,0x27,0x13,0xee,0x40,0xe0,0x39,0x62,0x09,0xaa,0x0a,0xe9,0x22,0x4a,0x6b,0x23,0x10,0x9a,0x60,0xc0,0x24,0x71,0xb5,0xb6,0x92,0xe5,0x2e,0x64,0x0f,0xae,0x23,0x6f
.byte 0x49,0x48,0x60,0x3b,0xe5,0xf7,0xdd,0xc2,0x01,0xb4,0xb0,0xf6,0xf9,0xfb,0x68,0x59,0x79,0x24,0xc3,0x4c,0x16,0xed,0x00,0xcc,0xa9,0x6f,0x83,0x43,0xf7,0x6c,0x1b,0x2e,0x9c,0x52,0xd3,0x0a,0x4a,0x10,0x5c,0xb8,0xbc,0xe9,0xe0,0xa0,0x69,0x1d,0x4c,0x5f,0x20,0xd8,0xba,0x16,0xc5,0x82,0xad,0x79,0x76,0x53,0x4c,0x4b,0x0e,0xb0,0x98,0xa6
.byte 0xdd,0xd7,0x8b,0x1b,0x2f,0x9a,0xa5,0x6d,0x5b,0x11,0x97,0x3b,0x90,0x61,0xde,0x44,0x9a,0xe4,0xda,0xc7,0x15,0x32,0xea,0x0e,0x5e,0xc2,0x3c,0x88,0xb1,0x78,0x67,0xdb,0xb4,0x1a,0x65,0xa1,0x14,0x7c,0xb7,0xe6,0x7c,0x34,0xf4,0xb1,0xa0,0x1a,0xdf,0x8e,0x50,0x1e,0x6f,0x64,0x84,0xdb,0x91,0x3d,0x9f,0x03,0xa3,0x62,0xa8,0x05,0x48,0x32
.byte 0xbd,0xee,0x64,0xde,0xd7,0xf4,0x65,0x30,0x48,0x6c,0x66,0x8f,0x31,0x93,0xc3,0x25,0xd4,0xe0,0x9e,0xd5,0x61,0xb7,0x6c,0xe5,0x8b,0x79,0x4b,0x5f,0x2b,0xa8,0x8f,0x17,0x31,0xef,0x1e,0x93,0x8f,0xcf,0x2b,0x49,0x01,0x6a,0x72,0xe8,0x83,0x95,0xc6,0x91,0xff,0x79,0x6f,0x50,0xeb,0xa5,0x69,0xe4,0x0e,0xcf,0x68,0x5d,0x19,0xc3,0xe4,0x73
.byte 0xf4,0x08,0x5b,0x0d,0xd4,0x27,0xa7,0xc0,0x06,0xd8,0xa5,0x5e,0x56,0x1a,0xdd,0xf3,0x5e,0xd5,0x83,0x54,0x86,0xb4,0xbc,0x6c,0xc4,0xf4,0x34,0x6a,0x85,0xd9,0x29,0x67,0x90,0xaa,0xb4,0xaa,0x85,0xaf,0x04,0x90,0x3c,0x33,0xb7,0x7c,0x77,0xeb,0xcc,0xab,0xc0,0x4b,0xe0,0xd4,0xb6,0x40,0x24,0x7c,0x85,0x7c,0xd8,0xf3,0xfc,0x32,0xad,0xbd
.byte 0x43,0xcd,0x54,0xa9,0x94,0x51,0xba,0x0f,0x1e,0xbb,0x79,0xf5,0x31,0x29,0xf0,0x8e,0x20,0x62,0xd1,0x38,0x99,0x32,0x05,0x81,0x88,0x64,0x51,0x50,0x31,0xa4,0x38,0x55,0x31,0x86,0x77,0x0b,0x0f,0xcf,0x00,0xe4,0x50,0x9d,0x26,0x98,0xc1,0x3d,0x0c,0x7e,0xec,0x99,0xbe,0x18,0x38,0xf0,0xcd,0xc9,0x98,0x80,0x1c,0x56,0xb4,0xf9,0x15,0xb4
.byte 0xdd,0x74,0xb5,0x37,0xd2,0x2b,0x24,0xb1,0x18,0xfd,0x40,0x48,0xba,0xa3,0x1a,0xec,0x71,0x01,0xcf,0xd9,0xe2,0x1c,0x4d,0x1f,0xad,0x91,0x1e,0x6f,0x15,0x99,0xe6,0xd3,0x40,0x92,0xa9,0xfd,0xb5,0x6e,0xf6,0xfc,0x0a,0xff,0x07,0x19,0x2f,0xd7,0x5f,0x1b,0x62,0xb7,0x66,0x5c,0x51,0xff,0x36,0x5d,0x97,0x23,0x51,0xa5,0x29,0x2c,0xe5,0xce
.byte 0x21,0xd4,0xa3,0xdc,0x31,0xaf,0xf0,0xfe,0xa0,0x71,0xc0,0xa3,0xeb,0xdc,0xd6,0x17,0x1d,0xa5,0xd0,0xc2,0xdd,0x21,0x9d,0x91,0x3f,0x9d,0xee,0xa2,0xe1,0x7e,0xfa,0x4c,0xe0,0x8b,0x13,0x3e,0x76,0x7e,0xc0,0x62,0xf5,0x6f,0x79,0x0e,0xda,0xc9,0xc6,0x74,0xd0,0xe1,0xae,0x03,0x51,0xe3,0x7b,0x46,0x65,0x7d,0x0e,0x7b,0xb4,0x18,0xf6,0x7e
.byte 0x28,0x0a,0xbd,0xc5,0xfd,0xb6,0xff,0x20,0x88,0xdb,0xa0,0x65,0x87,0xa6,0x0b,0x3d,0xb5,0xa3,0x36,0x9c,0x26,0x50,0x8d,0xad,0x7f,0x19,0x78,0xd3,0x4f,0x34,0x2b,0xae,0x09,0xb1,0xf5,0x1b,0x6d,0xa0,0xed,0x83,0x90,0xc2,0x52,0xfe,0x72,0x46,0xf2,0xca,0xd8,0x42,0x39,0x76,0xce,0x99,0xcd,0x68,0x8f,0xc8,0x3b,0x25,0x54,0x1d,0x32,0x4a
.byte 0xd5,0x93,0x01,0xbd,0x6d,0xa8,0xcc,0x66,0x49,0xc7,0x5d,0x8f,0xd3,0x85,0x08,0xcb,0xa8,0x70,0x2b,0xa9,0x8f,0xed,0xb9,0x9d,0xea,0xe5,0x75,0x9f,0x8f,0x1e,0x8f,0xff,0x4b,0x4f,0x00,0xd3,0x3a,0x2a,0xd4,0x68,0x15,0xae,0x6e,0xe5,0x5d,0x80,0x74,0x78,0x97,0x90,0x7b,0x1e,0x2a,0x9a,0x4b,0x53,0x07,0xe9,0x58,0x24,0x7f,0x42,0x9c,0xc8
.byte 0xfc,0x0f,0x51,0xb7,0xbc,0xde,0x1e,0xf0,0x43,0xb0,0x48,0x61,0xd3,0x7f,0x89,0x3f,0x65,0x44,0x14,0x86,0xfe,0x24,0x5f,0xcd,0xf4,0xda,0xac,0x8d,0xc5,0xdb,0xa5,0x3d,0x9c,0x5d,0xa8,0xee,0x75,0xc0,0x0b,0x3d,0x93,0x2e,0x6b,0xd6,0x71,0xf7,0x8a,0x48,0xcf,0xbd,0xd5,0x38,0xb5,0x0b,0x8b,0x44,0x3f,0x86,0x59,0x07,0x25,0x2e,0x75,0xe6
.byte 0x16,0xe7,0x78,0x5a,0x8a,0xfc,0x4f,0x48,0x27,0x30,0x2f,0x32,0x4a,0xf1,0xa6,0xe0,0x44,0x85,0xbc,0x50,0xbc,0x0e,0xab,0x1b,0xf7,0x64,0x1a,0xd2,0x25,0xe9,0xf7,0xaf,0x32,0x14,0x33,0xa7,0xbc,0xa5,0xd7,0xb0,0x3c,0xc8,0x42,0xdd,0x2d,0x91,0xde,0xed,0xdc,0x89,0x57,0x91,0xb1,0x9a,0x5b,0x7d,0x63,0xbb,0xcb,0x4b,0xe2,0x04,0xf2,0x32
.byte 0x1a,0xdf,0xaf,0x96,0xc9,0xbc,0x50,0x51,0x57,0xcd,0xac,0x9e,0xa5,0x21,0x99,0x81,0xaa,0x2a,0x93,0xbc,0x79,0x7d,0x52,0x0c,0x5c,0x73,0x41,0x48,0x47,0x4b,0x9f,0x71,0xfe,0x8b,0xef,0x65,0xa4,0x18,0x8b,0xe9,0x42,0x62,0x09,0x9d,0x1d,0x4f,0x01,0x51,0xc4,0xfd,0x44,0xb0,0xf4,0x02,0x16,0x9a,0xef,0xa2,0xa8,0xa8,0x15,0xca,0xcf,0x55
.byte 0x14,0x4a,0x7f,0x3a,0xc2,0x2d,0x46,0xcf,0xc7,0x5a,0xa1,0xeb,0x69,0x1a,0xbf,0xf7,0x54,0xa6,0x16,0xdf,0x4c,0xf2,0xf2,0xb0,0xa9,0xc2,0x2f,0xcd,0x64,0x50,0xac,0x4e,0x43,0x02,0xe1,0x4e,0xd4,0xdf,0x01,0x36,0xaa,0x2b,0xb2,0x05,0xcf,0x22,0xcc,0x3e,0x0a,0x7f,0x25,0x17,0xa3,0x12,0x72,0x94,0x51,0xe8,0x32,0x20,0x05,0x36,0xee,0x8f
.byte 0x19,0xf2,0xd6,0xe3,0x78,0x4c,0xa9,0x57,0xc0,0xa6,0xea,0xef,0xc4,0x25,0x65,0xb8,0x92,0x17,0x99,0xa9,0xa3,0x8f,0x60,0xb9,0x5b,0x65,0x1e,0x1d,0x6e,0x6c,0x11,0x6f,0x9f,0x49,0x97,0x15,0x5c,0xbf,0x9b,0x7e,0x6b,0x4d,0xdb,0x0b,0xb6,0xb8,0xf6,0xe0,0xd8,0x05,0x67,0x78,0xfc,0x27,0xf3,0x0b,0xf7,0x98,0xc1,0x2d,0x46,0x46,0x15,0x22
.byte 0x66,0xff,0x9d,0x31,0x12,0x56,0xcb,0x5a,0xc1,0xed,0x2f,0x9f,0xc7,0xff,0xd6,0x46,0x64,0x70,0x7c,0xa7,0xd5,0x84,0xd5,0x8d,0x6a,0x02,0xc9,0x9d,0x76,0xb0,0x9c,0xe5,0xd2,0x66,0x07,0x1d,0x64,0xb5,0x21,0xb3,0x61,0x1d,0x3b,0x19,0x85,0xfa,0xe6,0xdb,0x81,0xa1,0x22,0xf2,0x23,0x7c,0x56,0x2a,0x4c,0x21,0xfd,0x3e,0x45,0x9e,0x86,0x9c
.byte 0x12,0xec,0x8a,0x13,0xa2,0xe1,0xf2,0xd5,0xd4,0x1f,0x35,0xdc,0xd9,0x48,0x8a,0xd1,0xa6,0x78,0xf6,0x7b,0xc7,0x69,0x23,0xec,0x3e,0x10,0xd6,0x31,0xf6,0xdf,0xfb,0x06,0xa3,0x5d,0x21,0x4e,0xe8,0xe6,0xcc,0x7a,0x60,0x12,0x87,0x03,0x1d,0x28,0xd5,0x1a,0xaf,0x79,0x30,0xbe,0x8c,0xdd,0x8c,0x32,0x49,0x8d,0xfd,0x54,0xc6,0x50,0xf8,0x9a
.byte 0x54,0xa6,0xc3,0x72,0x17,0x13,0x1c,0xe1,0x1a,0x93,0x57,0xc0,0x5a,0xd5,0x93,0x90,0x0e,0x74,0x82,0x2a,0xc4,0x8a,0x14,0xc1,0x77,0x23,0xf5,0xcd,0x62,0x86,0x86,0xf4,0x7c,0x0c,0xd7,0x82,0x21,0xe7,0x7e,0x49,0x4f,0x35,0xbc,0xdf,0xd7,0x28,0x2f,0xd7,0xd9,0x51,0x51,0x68,0xff,0x21,0x4f,0xea,0xd4,0x72,0x6b,0xc3,0xb2,0x5d,0xf1,0xa7
.byte 0xa4,0x4e,0xf2,0xa6,0xe0,0xe9,0xa2,0xd1,0xd6,0x42,0xdf,0x87,0x38,0x78,0xa5,0xb6,0xee,0x15,0xaf,0xd6,0x84,0x0d,0xba,0x3c,0xdb,0x5a,0x18,0x90,0xdf,0xee,0xb1,0xa2,0x19,0xfd,0xa9,0x7c,0xdc,0x62,0x79,0xf2,0xc5,0x75,0x7b,0xb8,0x6d,0xc8,0x97,0x38,0xc0,0xaf,0x2d,0xbb,0xa7,0xaf,0x2a,0x9e,0x87,0x08,0xce,0xa0,0xd3,0xfc,0xe2,0xc4
.byte 0xa5,0x77,0x4b,0xfe,0xbb,0x10,0x22,0x78,0x2c,0xb6,0x2c,0x57,0xef,0xb1,0xde,0x54,0xa0,0x08,0xc8,0xee,0xeb,0xd1,0x7c,0x58,0x62,0xd8,0xa4,0xa8,0xe6,0x99,0x9a,0xaa,0x97,0x66,0xac,0x6e,0xc4,0x24,0xfe,0x62,0xca,0xfb,0x61,0xac,0x7b,0x74,0x8b,0x30,0x80,0x8e,0x29,0xb3,0x5a,0xca,0x37,0x4b,0xfb,0xbc,0x99,0x7f,0x66,0xf6,0xa5,0xed
.byte 0xe5,0xb6,0x4c,0x7b,0x99,0x58,0x9f,0x95,0x8e,0xbd,0xfc,0x84,0x66,0x03,0xe2,0x7d,0x45,0x1d,0xc2,0x8b,0xd5,0xd6,0x48,0x8f,0x8b,0x95,0x98,0xf4,0x5f,0xe1,0x3e,0x5b,0x62,0xf0,0x5c,0xaa,0x88,0xa6,0x57,0x01,0x98,0xaa,0xbb,0xf9,0x52,0x13,0x1f,0xa1,0xb9,0xaf,0xc9,0x55,0xb9,0xb5,0x78,0x8c,0xa9,0x20,0x96,0x97,0xf8,0xbb,0xed,0x5a
.byte 0x13,0x4a,0xfc,0xe4,0x22,0x16,0x04,0xac,0x57,0xcb,0xcf,0xd1,0xf5,0xf1,0xc3,0xa3,0x85,0xb8,0x43,0xed,0x68,0x72,0xe4,0x55,0x50,0xe1,0x8d,0x49,0xcd,0xc7,0x60,0xc4,0x3d,0x06,0xe6,0x2c,0xd1,0xaa,0x31,0xaf,0x4a,0x39,0x5b,0x25,0xbf,0x14,0x9c,0xa5,0x0e,0x6e,0xb4,0xea,0xdf,0x46,0x7c,0x9c,0x24,0xa9,0xca,0x58,0x92,0x2e,0xf9,0xe2
.byte 0xc6,0x37,0x33,0x33,0xe0,0x1f,0xf3,0xf2,0x81,0x0c,0xef,0xae,0xa4,0x0e,0xff,0x8b,0xdd,0x06,0x09,0x3a,0x26,0x3f,0x18,0x8c,0x09,0x76,0x27,0x90,0x5f,0x4c,0xb4,0x74,0x8a,0x00,0xbf,0x7d,0x57,0x5d,0x4d,0x8b,0x6f,0x0f,0x4c,0x02,0x37,0x7d,0xb3,0x6a,0x1b,0xb5,0x15,0x3f,0xc3,0x57,0x10,0x0c,0xeb,0x34,0x9b,0xf2,0xa4,0x09,0x3f,0x60
.byte 0xcb,0xf9,0x23,0x79,0x7f,0x06,0xd4,0xb0,0xff,0x53,0xb6,0x4f,0x53,0xa2,0x59,0xe5,0x6a,0x56,0x72,0x51,0x8d,0xc9,0x67,0xb7,0xdc,0xbd,0xd9,0x8c,0xa3,0x59,0x12,0xef,0x4a,0x65,0x26,0x4a,0x64,0x60,0xfc,0x98,0x23,0x2d,0x89,0xf5,0x30,0x2d,0x2b,0x19,0x71,0xa7,0x21,0x6d,0x97,0xe7,0x37,0xcb,0x80,0x84,0x16,0xa1,0xdd,0x14,0xfb,0xc3
.byte 0xb6,0x03,0xa4,0x33,0x72,0xa5,0x3a,0x30,0xf8,0x1a,0x19,0x7f,0x7d,0xb1,0xce,0x66,0x17,0x0f,0x39,0x59,0xf9,0xa6,0xbe,0x13,0xe3,0xaf,0xe6,0x37,0x8d,0x0d,0x52,0xa1,0xc6,0x7f,0xe7,0xc0,0x0d,0x86,0x4e,0xfb,0x22,0x50,0x3e,0xdc,0x18,0xc9,0xb9,0x0d,0x1f,0x99,0xb9,0x44,0xb1,0x07,0xcc,0xa7,0x70,0x58,0x33,0x88,0xde,0x93,0x9a,0xbf
.byte 0x7e,0x37,0x8b,0x97,0x6a,0xda,0x27,0xd8,0x67,0xb4,0xba,0xb8,0x49,0x93,0x68,0x59,0x77,0xc2,0x72,0x4a,0x5f,0xe6,0x94,0xf9,0x30,0xd5,0xdc,0x55,0x50,0x35,0x44,0x5e,0x46,0xfa,0x48,0xa9,0xa7,0xd4,0xd0,0x1d,0xbb,0xb2,0x53,0x3f,0x43,0xf7,0xf0,0xae,0x2c,0xc8,0x03,0xca,0x8a,0x5d,0x8e,0x98,0x85,0x3d,0x62,0x7a,0x7a,0xde,0x9b,0xb6
.byte 0xe1,0x3f,0x49,0xe1,0x81,0x54,0x66,0x10,0x20,0x92,0x52,0xbc,0xf9,0xba,0x85,0xa3,0xdb,0x32,0x57,0x89,0x8b,0xe1,0xd7,0x0b,0xe8,0xb3,0x5a,0x38,0x65,0x7f,0x47,0xd8,0x4b,0x2b,0xca,0x54,0x47,0xbf,0x0f,0x82,0xfb,0x88,0xcc,0x29,0xfb,0xe4,0xf5,0x7a,0x89,0x9d,0xca,0x23,0x2b,0xe9,0xd1,0xaa,0xe2,0x32,0xd9,0x5e,0xc7,0x89,0x59,0xe9
.byte 0xc1,0x58,0x0b,0xa7,0x0f,0x18,0x00,0xc1,0x75,0x73,0x09,0xb0,0xd4,0x17,0xe2,0x98,0xe5,0x52,0xf9,0x42,0xe3,0xbb,0xe1,0x38,0xb7,0x3a,0x0a,0x1b,0x40,0xf5,0x96,0x41,0x5a,0x2a,0x0d,0x06,0xf3,0xc7,0xa0,0xcd,0x5c,0xa1,0x86,0xb4,0x2b,0x90,0x73,0xda,0x96,0xef,0x81,0x4e,0xc4,0x33,0x20,0x5a,0x60,0xb4,0x49,0xe7,0x3b,0x0b,0x2e,0x8c
.byte 0x1c,0x45,0xb1,0x02,0x19,0xb3,0x77,0x4e,0x7d,0x25,0x7c,0x5f,0x10,0x7b,0xe7,0x5d,0x66,0xe5,0xd0,0x7a,0x65,0xea,0x13,0xa9,0x55,0x10,0xe1,0xb6,0xeb,0x79,0x14,0x06,0xd2,0xb2,0x07,0x90,0x8b,0x9e,0xea,0x47,0xbb,0x47,0x82,0x03,0xd7,0x97,0xc5,0xfb,0x54,0x16,0xd1,0x68,0x54,0xbe,0x66,0x5c,0xfd,0xc5,0xfb,0xd8,0x05,0x0c,0x5c,0x78
.byte 0xa6,0x41,0xa1,0x64,0x33,0xd2,0x74,0xe6,0x44,0x35,0xb8,0xf4,0x68,0x57,0xe4,0x33,0x9b,0x1e,0xb9,0xd0,0x19,0x00,0x6e,0xda,0x76,0xa8,0x73,0xd8,0xca,0xab,0x6d,0x85,0x43,0xfb,0xc3,0xa2,0x38,0x6c,0xbd,0x66,0x00,0x59,0x30,0x2b,0x25,0xf5,0xd8,0xb5,0xb9,0x73,0xca,0x05,0x81,0x78,0x2a,0x37,0x0c,0x03,0xaa,0xd4,0x72,0x24,0x51,0x1a
.byte 0x7e,0x56,0x36,0x76,0x4f,0x0c,0x08,0x20,0x45,0x82,0xc0,0x29,0xb5,0xa6,0xde,0x17,0xc4,0x99,0x90,0x4b,0xd8,0xd8,0x3e,0xaf,0x31,0x38,0xfc,0x92,0x5c,0x50,0x70,0x32,0x77,0xc0,0x90,0xaa,0x7a,0x9a,0xf3,0xb1,0x68,0xa8,0xd8,0xe1,0xc7,0x34,0x08,0x41,0x0a,0xef,0x08,0x81,0x16,0x0c,0x0c,0xc4,0x8e,0x21,0xa6,0xb5,0x29,0x8e,0xf6,0x5a
.byte 0x49,0x6e,0xf7,0x2e,0x29,0xdf,0xe7,0xab,0x90,0xea,0x97,0x50,0x97,0x6b,0xc1,0x78,0x72,0x0d,0x39,0x31,0x7a,0xca,0x7c,0xc8,0x74,0x69,0x9d,0x7b,0x49,0x33,0x6b,0xae,0x24,0x50,0x72,0xa5,0x8b,0xbb,0x2b,0xdb,0x06,0x15,0x69,0xb0,0x78,0x98,0xe6,0x10,0x78,0x34,0x89,0xf4,0xcf,0xc4,0x57,0x81,0x48,0x62,0x2d,0xa1,0x78,0x42,0x17,0x07
.byte 0x55,0x95,0x68,0x13,0xc2,0xf1,0x93,0x5a,0x50,0x46,0x68,0x1d,0x64,0x30,0x55,0xa2,0x66,0x75,0xf5,0x6d,0x1a,0x12,0x82,0xeb,0xcf,0xad,0x13,0xf3,0x8c,0x63,0x51,0x66,0xd0,0xd3,0x1c,0xd1,0x6b,0xb7,0xb2,0x7d,0xe9,0xbb,0xd9,0x5c,0xb5,0xb5,0x2c,0x77,0xc8,0x2c,0x38,0x86,0xb0,0x6d,0x6b,0x30,0x4d,0x93,0xd4,0x1f,0xea,0xbd,0xab,0x95
.byte 0x1d,0x91,0x8e,0x6b,0xcc,0x6d,0x98,0x99,0x21,0x21,0x2d,0x6b,0x46,0x91,0x1b,0x8d,0xcb,0xb3,0x4c,0x3b,0x28,0x5d,0x14,0xba,0xd2,0xd1,0x48,0x48,0xdf,0xca,0xc5,0xfa,0xc4,0xda,0x39,0xb3,0xa8,0x72,0x8a,0x1a,0x59,0x18,0xc7,0x17,0x6d,0xd6,0x3f,0x8c,0xf2,0xe5,0x3d,0x9c,0x49,0x1f,0x3b,0x5f,0xfb,0x8e,0x86,0x96,0x3a,0x56,0xe0,0x51
.byte 0x13,0x4f,0x4f,0xff,0x35,0x01,0x8e,0xd0,0x62,0xc8,0xf1,0x23,0x73,0x85,0xaa,0xcc,0x71,0xd7,0x04,0x7f,0x15,0xf7,0x6c,0xc0,0xf6,0x8d,0xd9,0xe9,0x65,0x79,0x76,0xfb,0x69,0xd7,0x7e,0x3f,0xed,0xfd,0x6f,0x33,0x0c,0x21,0x15,0x2e,0x1e,0xe2,0x37,0xdf,0x05,0xc0,0x16,0xae,0xa5,0x1e,0xff,0x10,0xed,0xaf,0xd2,0xc6,0x1a,0x72,0xc2,0x42
.byte 0x33,0x86,0x27,0xf4,0x63,0xc0,0xbb,0x48,0x78,0x87,0x60,0x5f,0x89,0xad,0x60,0xfd,0x1b,0xab,0xba,0xf7,0x07,0xd5,0x24,0x43,0xfa,0x47,0x24,0x5b,0x89,0x30,0xa8,0x2c,0x84,0xdf,0x09,0x6f,0x86,0x46,0xb5,0xe6,0x0b,0x62,0x69,0xc5,0xb6,0x67,0x14,0xe0,0xb9,0x00,0x7c,0xb4,0x55,0x1c,0xac,0x75,0x7b,0xc0,0x04,0x7a,0xc1,0xf1,0x28,0xe6
.byte 0xd5,0x50,0x2e,0x9f,0xbe,0xde,0xfd,0x9a,0x6f,0x0c,0xbc,0xfc,0x21,0xa0,0x63,0xbf,0x77,0x51,0x4a,0x82,0x11,0x17,0xef,0xd3,0x55,0xcb,0xc3,0x6b,0x62,0x4a,0x12,0xa9,0x33,0x96,0x2e,0x8f,0x13,0x89,0x72,0x60,0x74,0xfa,0x44,0x64,0xd7,0xe8,0x05,0xb7,0xdb,0x86,0x9a,0x7d,0x92,0xe2,0x45,0x0f,0xb8,0x9a,0x94,0x5c,0x4c,0x64,0x49,0xf4
.byte 0xde,0x6d,0x4b,0x0d,0xc5,0x50,0xe5,0xcd,0xaa,0x8d,0x30,0xb1,0xa6,0x14,0xb3,0xc7,0x1d,0xd9,0x88,0xb5,0xce,0xf1,0xb5,0x69,0x03,0xd5,0x21,0xbd,0xa9,0x59,0xd4,0x7d,0xe4,0xad,0xe7,0x6e,0x60,0xfb,0x71,0xb9,0x77,0xf4,0xc2,0xbf,0xe5,0xc3,0xb8,0x18,0x92,0x8a,0x17,0xf2,0x06,0xf8,0xd8,0xc9,0xcd,0xbf,0xfa,0xed,0x1b,0xf0,0xa4,0x32
.byte 0x7e,0x52,0x1d,0x44,0x45,0x3d,0xc6,0x29,0x05,0xd9,0xaa,0xc6,0x94,0xa2,0x7c,0xfb,0x42,0x32,0xf2,0x42,0xc6,0xac,0x26,0xf1,0x69,0xe3,0x43,0xe2,0xe1,0xff,0xa9,0xda,0xf7,0xf9,0x69,0x47,0xcd,0x24,0xa5,0x4c,0x9a,0xe0,0x15,0xa8,0xb3,0x08,0xfb,0xb3,0x07,0x81,0x18,0x62,0xb5,0x2f,0xd0,0xf1,0x59,0x8d,0xc2,0xf3,0x93,0xd2,0x4d,0x17
.byte 0xaf,0x22,0x5f,0x98,0x47,0x83,0x14,0x77,0x05,0x05,0x9c,0x0b,0x04,0x6f,0x83,0x83,0x68,0x86,0x95,0x8e,0x03,0xe7,0x5d,0x54,0xdf,0x6e,0x05,0xb6,0x12,0x9a,0x69,0x3a,0x88,0xcc,0x66,0xff,0x0c,0xa1,0x4f,0x09,0x5a,0xfd,0x58,0xd0,0xbb,0xa8,0x00,0x26,0xa2,0xfe,0xaa,0x2a,0xc1,0x22,0x9b,0x5e,0xc2,0x93,0xa0,0x08,0x34,0x93,0x47,0x48
.byte 0x9e,0x48,0xfd,0x0a,0x9f,0x3e,0xdb,0xe1,0xcf,0x4c,0xc4,0x07,0x74,0xf6,0xc8,0x30,0x39,0x35,0x23,0x8f,0x7c,0x9f,0xf8,0xd5,0xeb,0x93,0xb6,0x5d,0x50,0x14,0xcf,0xf5,0x3d,0x95,0x2e,0x41,0x06,0xb1,0x48,0x33,0x8f,0x0f,0x05,0xba,0x60,0xf9,0x14,0xd9,0x09,0x24,0x18,0x1b,0xe7,0xef,0xd9,0x57,0xd7,0xef,0xec,0x73,0xe7,0xf3,0xfd,0xa8
.byte 0xd3,0x3f,0x48,0xbe,0x17,0xf2,0x1d,0x00,0x2f,0x98,0xc7,0x76,0xda,0x1c,0x97,0x28,0x07,0xfe,0xe8,0xcb,0xfc,0xa0,0x6e,0x61,0x6c,0xb3,0x28,0x72,0xa8,0xb6,0x5f,0x78,0xa1,0x24,0x46,0xb0,0xff,0x7f,0x56,0xad,0x9a,0x52,0x2d,0xc3,0x40,0xf4,0xd3,0x65,0x63,0x4e,0xa1,0xb9,0x48,0x33,0x75,0x50,0xbb,0x18,0x06,0x07,0xa3,0xa7,0xe4,0x56
.byte 0x69,0xbc,0xa3,0xd8,0x20,0xa3,0xba,0x3e,0xc2,0x2f,0xe2,0x2c,0xe1,0xc9,0x74,0x75,0x56,0x2b,0xa8,0xde,0xc8,0x40,0x64,0x7f,0x60,0xfa,0x35,0x6f,0x2d,0x6f,0x14,0xb0,0xb3,0x45,0x3c,0x5d,0xcd,0x84,0x4f,0xb8,0xc6,0xbf,0xaa,0x49,0xfd,0xd4,0xbf,0x14,0xe2,0x1e,0x12,0xbf,0x67,0x78,0xf9,0xee,0x1e,0x75,0x96,0xe1,0x89,0x89,0xbe,0xc7
.byte 0x2f,0x33,0x6c,0xa4,0x38,0xc2,0x2d,0x0f,0xc0,0xa5,0x4e,0xd4,0xf8,0x65,0xc6,0x5b,0xd8,0x4d,0x5a,0xbb,0x1b,0xfa,0x56,0x37,0x72,0x6f,0x4f,0xd9,0x0f,0x22,0xdf,0x98,0x2b,0x92,0x68,0x83,0xb7,0xe4,0x01,0x1e,0x4a,0x2e,0xa6,0xf6,0x8e,0x4f,0xdc,0x45,0xac,0x5b,0xc9,0x47,0xad,0x96,0x22,0xce,0x72,0x66,0xc0,0xe3,0x5e,0xcf,0x1c,0x9d
.byte 0x1b,0x96,0x99,0x08,0x6e,0x17,0x6c,0x46,0x77,0x4c,0x4e,0xe3,0x68,0xa5,0xf2,0x84,0xea,0x64,0xaf,0xe6,0x36,0x55,0xdd,0x0b,0xd6,0xe4,0x06,0x4d,0xc4,0x2b,0x34,0xbb,0x49,0xf9,0xac,0xe4,0xb2,0xbc,0xb3,0xa5,0x48,0x39,0xe5,0xc6,0x8e,0xc1,0xfb,0xe9,0x26,0x47,0x81,0x8c,0xcb,0xad,0xa0,0xbf,0xa9,0xf2,0xb3,0xfb,0xbb,0x14,0x52,0x7a
.byte 0xf1,0xa4,0x01,0x88,0x06,0x30,0x7e,0x69,0x1c,0x97,0xff,0xfc,0x1c,0x0d,0x2b,0x69,0xaf,0x93,0xa0,0x0f,0x04,0xa3,0x9c,0xf2,0xde,0x61,0xa7,0x45,0x1c,0xa6,0x9c,0x2f,0x58,0x35,0x59,0x95,0x3f,0xff,0xbd,0xbc,0xc9,0xe5,0x2c,0xe3,0x48,0x1e,0xdc,0x36,0xe1,0xbe,0x30,0xc2,0xcb,0x80,0x8f,0x17,0x90,0xcd,0x0f,0x2d,0x94,0x3b,0x44,0xb5
.byte 0x6a,0x62,0xf1,0x93,0x2f,0xbd,0xf5,0x55,0xed,0xf6,0xfb,0xae,0x01,0x99,0x5a,0xc9,0xe3,0xed,0x78,0x39,0x65,0x81,0x06,0x5f,0xc3,0xb3,0x2e,0x8c,0xcf,0x59,0x47,0x75,0xbe,0x56,0x25,0x22,0x05,0xd8,0x0a,0x1b,0xbe,0x60,0xb2,0x8a,0xac,0x28,0xaf,0xb1,0x84,0x38,0x6e,0xba,0xc5,0x91,0x17,0x3a,0x63,0xa9,0xff,0x89,0x56,0xed,0x36,0x32
.byte 0xde,0x12,0xa8,0x38,0x92,0xbb,0x51,0xdd,0x6b,0x5e,0x97,0x68,0x8d,0x27,0x10,0xd9,0x83,0x98,0x02,0xd2,0x8b,0x75,0x88,0xae,0xd0,0x22,0x69,0x95,0xc1,0x6d,0x2d,0xec,0x01,0xd9,0x06,0xc4,0xd0,0xa2,0x45,0xc9,0xd6,0x48,0x49,0xeb,0xdb,0xd5,0x83,0x7a,0x06,0xc5,0x88,0xd9,0x6f,0xb4,0xba,0xc2,0xbc,0x83,0x23,0x0a,0x9f,0xe1,0x4f,0x54
.byte 0x34,0x80,0x78,0x2f,0x82,0xd2,0x86,0x20,0xa6,0x73,0xb7,0x4e,0x93,0x6c,0x8a,0xd4,0xe8,0x46,0xed,0xa8,0xe2,0xd5,0x1e,0xe3,0xb3,0xdb,0xde,0xbc,0x94,0x02,0xb7,0x37,0x10,0x94,0x1e,0x0b,0xc7,0xbd,0x60,0x38,0x04,0x29,0x92,0xef,0x01,0xe0,0x20,0x55,0xb3,0x0d,0x50,0xc9,0x0f,0x6a,0x46,0x5f,0x55,0x73,0xd5,0xec,0x2e,0x1e,0xa4,0x0f
.byte 0xf4,0x3c,0xbe,0x5c,0xb7,0x81,0x78,0x0c,0xf0,0x7d,0x38,0x32,0x6a,0x9c,0x43,0x19,0x0f,0x51,0xe6,0x2f,0xe6,0xcd,0x09,0x07,0x92,0x93,0xfd,0x22,0x1b,0xec,0x75,0xfe,0x3a,0xf4,0xbe,0x8b,0xb6,0x9c,0x58,0xca,0xf8,0x9f,0xe5,0x8f,0x47,0x37,0xfb,0x6e,0xc9,0xe2,0xd7,0xb4,0x78,0xcf,0x0c,0x06,0xa8,0x30,0xd0,0x54,0x2e,0x84,0x79,0x44
.byte 0xc2,0x32,0xd3,0x8f,0x47,0xb6,0xa3,0x57,0x30,0xe5,0x72,0x44,0x54,0xd4,0xfb,0xe4,0x84,0xf8,0x4d,0x0e,0xbe,0xc8,0xf5,0xda,0xbb,0xb6,0x03,0xa2,0x47,0xaf,0xab,0x85,0xb2,0x3b,0x05,0x0b,0xb1,0x95,0x8c,0x3c,0x33,0x0e,0xee,0x5a,0x01,0x82,0x18,0x9b,0x8a,0x31,0x9e,0xde,0x75,0xed,0x0a,0x1e,0x0d,0x84,0x69,0x8a,0x51,0x57,0x12,0xc0
.byte 0x73,0x9f,0x24,0x65,0xe6,0x73,0xdb,0x2a,0x10,0x2a,0x76,0xc6,0x82,0xd7,0x06,0x68,0x03,0x78,0x83,0xf1,0xcb,0x32,0x80,0xf8,0x48,0xdf,0x2e,0x37,0xee,0x35,0xe2,0xd9,0x62,0x18,0xf5,0x54,0xbe,0x75,0x94,0x59,0x2b,0xa4,0xae,0x74,0x2e,0xaf,0xdf,0xc2,0xec,0x9d,0xe0,0x60,0x27,0x4b,0xef,0xb3,0x0b,0xa1,0x88,0x20,0x17,0x4f,0x07,0x83
.byte 0xfa,0x9a,0x30,0x3e,0x8a,0xc0,0xcf,0x4d,0x39,0xdd,0x92,0x46,0x62,0x9d,0x20,0x80,0x77,0x82,0x12,0x01,0x08,0x99,0x38,0xa8,0x92,0xa7,0xc0,0x61,0x75,0x6e,0x97,0xb4,0x4c,0x89,0x5a,0xf5,0x9f,0xee,0x08,0x56,0x66,0x0f,0x86,0xc3,0x49,0xee,0x3f,0x63,0x47,0x74,0xca,0x4c,0xc8,0x8a,0x8e,0x5a,0x70,0x80,0x65,0x10,0xb6,0x55,0x55,0x1f
.byte 0x75,0x6a,0xf5,0x3b,0xfb,0x43,0xf2,0x21,0xd7,0xa6,0x5d,0x84,0xc1,0x56,0x8e,0x03,0x99,0x32,0xbd,0xf2,0x98,0xc4,0xdd,0x0e,0xf8,0xf1,0x33,0xbf,0xfb,0x2c,0xff,0x48,0x1a,0xd9,0x03,0x14,0x0a,0x88,0x4f,0x74,0xc4,0x7f,0x54,0x1b,0xa4,0x7c,0x52,0x84,0x24,0x89,0x16,0xc3,0xd7,0x4c,0x02,0xd4,0x4c,0xab,0x0d,0x07,0xf8,0xd8,0xe8,0x28
.byte 0xa3,0x04,0x14,0x5b,0xca,0xc3,0x72,0x86,0x0b,0x42,0x1b,0x5d,0x1a,0xbb,0x0d,0xa4,0xc6,0x0c,0x25,0xa2,0xdb,0x23,0x4b,0xa9,0x7c,0xdb,0xb5,0x09,0x08,0xed,0x23,0x01,0x3d,0x7b,0xa3,0xe2,0x24,0xa5,0xbd,0x56,0xe6,0xb5,0x13,0x32,0x0a,0x68,0xb3,0x14,0x0a,0xd6,0xf5,0xe6,0xc9,0x7a,0xb6,0xb6,0x31,0x47,0x15,0x66,0x7b,0x08,0xfb,0x20
.byte 0xa4,0x3f,0xca,0xc9,0x02,0x3a,0x5a,0x4e,0x1f,0x30,0x50,0x5c,0xc6,0x20,0x50,0x02,0x1e,0xf3,0x5f,0x62,0x0c,0x70,0x72,0xa8,0x5c,0x51,0x47,0x88,0x0a,0x06,0x1a,0x5a,0xa6,0x4a,0xe3,0x05,0x99,0xc8,0x0e,0x26,0x32,0x22,0x78,0x58,0x36,0x84,0x42,0x71,0xb4,0x3e,0x26,0x7d,0xe1,0x3d,0x76,0xd4,0xde,0x54,0xd0,0x78,0x17,0xe7,0x01,0xd7
.byte 0x93,0xae,0x58,0x77,0xde,0xc4,0xa6,0xfd,0x15,0xbf,0x21,0x59,0x19,0x8d,0xc4,0xf4,0xd5,0xf0,0x9a,0x22,0xe8,0x92,0x2f,0x9d,0x84,0x96,0x19,0xbb,0xc8,0xf4,0x76,0xfe,0xb4,0x43,0xa1,0xc9,0x87,0x65,0xf0,0x8d,0x95,0xeb,0x13,0xa3,0x9a,0xdc,0x42,0x8b,0xb6,0x2d,0xfa,0x94,0xb8,0xc1,0x51,0x75,0xdb,0xaa,0xe5,0x19,0xf3,0x05,0x66,0xf1
.byte 0x24,0xa7,0xf8,0x56,0x49,0x6d,0xe0,0xbc,0x9f,0xf7,0x39,0x1d,0xcb,0xec,0x7e,0x39,0xda,0x73,0xee,0x50,0x0f,0x19,0x2e,0xc4,0x54,0x44,0x06,0x1a,0x9b,0x46,0x9a,0x68,0x96,0xdf,0x3e,0x3a,0x23,0x9f,0x5d,0xac,0x92,0x51,0x9d,0xe5,0xcf,0x5f,0x7f,0xb4,0xd8,0x93,0xe3,0xd8,0x80,0xe9,0x96,0xd2,0x04,0x94,0x37,0x6e,0x49,0x44,0xff,0xb3
.byte 0xa5,0x97,0x35,0xb7,0x2e,0x04,0xae,0x2d,0xf2,0x77,0xc7,0x19,0x3a,0xd9,0x35,0x9a,0x91,0x18,0xe1,0xb9,0xb0,0x22,0x99,0x76,0xb7,0x69,0xe6,0xc6,0xf1,0xee,0xdf,0xce,0x35,0xd5,0xbe,0xc7,0x02,0x57,0x2b,0x4a,0x72,0x6a,0xe3,0xd7,0x75,0xab,0xa5,0x2a,0x6a,0xeb,0x76,0x92,0xab,0x37,0x41,0x64,0x4d,0x0a,0x99,0x82,0xc3,0xe1,0xab,0x70
.byte 0x4c,0xaa,0x85,0x90,0xc2,0x2f,0x5a,0x91,0x31,0x93,0xeb,0x8e,0x1f,0xec,0x30,0x40,0xb3,0x95,0xc8,0xef,0x06,0x74,0xc5,0xb6,0x65,0xf9,0x10,0xe7,0xce,0x9b,0x12,0xee,0xe8,0x02,0x5f,0xa5,0x0b,0x42,0x34,0x38,0xb3,0x7b,0x89,0x30,0xac,0x25,0x81,0x2c,0x48,0x22,0xa6,0xa8,0x4e,0x6b,0x1a,0x53,0x2b,0x35,0xa9,0xbe,0x5d,0x4e,0x97,0xc6
.byte 0xc2,0x9a,0x51,0xff,0xcc,0x21,0x42,0x98,0x85,0x64,0x37,0x79,0x3e,0x33,0x10,0xbc,0x26,0x0b,0x71,0xb0,0x15,0x01,0xc7,0x21,0x1f,0x62,0x55,0x8d,0x91,0x57,0x10,0x6d,0x3e,0x95,0xa8,0x38,0xb2,0x9d,0x8e,0x90,0x73,0x4a,0x2f,0x48,0x08,0x09,0xfb,0x76,0x24,0xc4,0x91,0x7d,0x56,0x60,0xd4,0x96,0x46,0x61,0xc9,0xc8,0x3e,0xd0,0xc4,0x51
.byte 0xc5,0x03,0x2e,0xb6,0xec,0x64,0x56,0x54,0xbe,0x7a,0x77,0x19,0x0d,0xbc,0xdb,0x77,0x67,0x23,0xb2,0x32,0xd3,0x39,0xe8,0x9b,0xf0,0xe7,0xc0,0xf1,0x35,0x9a,0x9d,0x13,0x3f,0x10,0x0d,0xb6,0x89,0x49,0x93,0x64,0x9c,0x64,0x6f,0xdf,0x4d,0x6c,0x50,0x4a,0xfb,0x87,0x2f,0x58,0xcd,0xe7,0x12,0x89,0xe8,0x3d,0x14,0xf2,0xff,0xc3,0x51,0xe0
.byte 0x33,0x8a,0x98,0x37,0xc2,0x71,0xea,0x61,0xde,0x64,0xa3,0xae,0xad,0xff,0x70,0xe9,0x7f,0x89,0x7a,0xee,0x3e,0xec,0x71,0xa2,0xd5,0xa2,0xa3,0x46,0xde,0x93,0x35,0x78,0x18,0x43,0xd5,0xa0,0x61,0x0b,0x82,0x4b,0x59,0x80,0xb7,0xc4,0x63,0xb2,0xf6,0x45,0xe3,0x4e,0x73,0x94,0xdb,0xdf,0x86,0xec,0x32,0x5a,0x0c,0x7d,0xc7,0xf1,0xda,0x35
.byte 0xb8,0xdf,0x5b,0x31,0xfc,0x85,0x7b,0xcf,0xe6,0x19,0xc2,0x13,0xab,0xee,0x06,0x1f,0x30,0xa7,0x6f,0x50,0xfe,0x38,0x84,0x83,0xd5,0x08,0x2c,0x13,0x81,0x7d,0x5d,0x2d,0x7d,0xa5,0x9c,0x56,0x77,0xb8,0x0e,0xc0,0x4e,0x7e,0x16,0x0b,0x79,0xa5,0x87,0x64,0x9f,0x7c,0x8e,0x44,0x3f,0x6d,0x24,0x62,0x6c,0xc7,0x24,0x23,0x08,0x03,0x5f,0xd1
.byte 0x7c,0x3e,0x63,0x69,0xff,0x7d,0xbf,0xe2,0xc7,0xc0,0xdf,0x77,0x9c,0x02,0x5d,0xaf,0xb9,0x80,0xaa,0x50,0x66,0xd7,0xb4,0x2b,0xc9,0xef,0x3f,0xbc,0xf5,0x35,0x92,0xc7,0xea,0xcc,0xf6,0x5a,0x4f,0xe6,0xcd,0x09,0x0f,0xb9,0x1f,0xe7,0x05,0xb1,0x2d,0xe3,0xc1,0x08,0xf7,0x59,0xe1,0x7c,0x74,0xad,0xbc,0x25,0x03,0x97,0xba,0x72,0xe8,0x0e
.byte 0x78,0x18,0xf1,0x42,0xc2,0x7e,0xbf,0x4e,0x89,0x07,0xe3,0x80,0xfa,0x25,0x09,0x0f,0x3f,0xac,0xce,0xea,0xe0,0xe5,0x15,0xff,0x7a,0xb4,0xc7,0x7f,0x58,0x17,0x89,0x55,0x7f,0x85,0xeb,0x07,0x38,0x92,0x68,0x03,0x6d,0x33,0x5c,0x2b,0xfd,0xd6,0x53,0x8d,0x1f,0xbc,0xac,0x82,0xda,0x88,0xc6,0xf3,0x1f,0xa3,0x25,0x0a,0xa4,0xae,0x94,0x91
.byte 0x06,0xda,0xe7,0x04,0x9b,0x84,0x08,0x01,0x79,0xa0,0x79,0x20,0xf8,0x4b,0xd9,0x94,0x24,0xa8,0x59,0x59,0xd6,0xaf,0xe9,0xc1,0xcd,0xb4,0x8b,0xf0,0x49,0xda,0x13,0x9a,0x4e,0x53,0x31,0x74,0xbb,0x8c,0x51,0xfa,0x95,0x9a,0x27,0x73,0x0c,0xde,0x58,0x73,0x12,0x4b,0x3c,0xe6,0x69,0x48,0x9e,0x63,0xbf,0xe5,0x2e,0xf7,0x2e,0x6a,0xe3,0x05
.byte 0x5f,0x70,0xa6,0xfa,0x29,0x9c,0x12,0x2d,0x2d,0xb1,0x32,0xc0,0x52,0xbd,0x1a,0x88,0xae,0x0d,0x92,0x4d,0x17,0xa8,0x02,0x81,0xf6,0xca,0x1a,0x46,0x70,0x58,0xc6,0x6f,0x45,0x50,0x64,0x9a,0x1b,0x36,0x3e,0x40,0x68,0x84,0x3a,0xb1,0xb7,0xc5,0xe9,0xb5,0x60,0xe4,0x75,0x4e,0x8c,0x27,0xc4,0xd3,0xcd,0xe5,0xa9,0x0c,0x23,0x85,0x3e,0x22
.byte 0xcf,0xa6,0x62,0x29,0x82,0xd4,0x37,0x6e,0x98,0x67,0x43,0xc7,0x43,0x67,0xfd,0xa6,0x0c,0x7f,0x76,0xa8,0x18,0xf0,0xa9,0x76,0x69,0x9a,0x8f,0x1c,0x88,0x7e,0x22,0xce,0x1c,0x3e,0xf2,0x0b,0x3a,0xf1,0xd0,0xf6,0xcc,0xfe,0xf5,0x58,0xef,0x50,0x7c,0xe4,0x3f,0xef,0xb4,0x5b,0xce,0xbc,0x55,0x5b,0x9e,0x9e,0x49,0xa5,0x5d,0xd5,0x0b,0xe7
.byte 0x71,0x0b,0xbf,0x7c,0x82,0xee,0x2c,0xd7,0x7e,0x97,0x75,0x9c,0xea,0x04,0x7c,0xde,0x16,0x96,0x0b,0x89,0x50,0x83,0xf2,0xd2,0x1d,0xba,0x2b,0x0d,0x4f,0x79,0x5f,0x29,0xb0,0xf5,0x07,0x68,0x19,0x5d,0x5d,0xc8,0x31,0x95,0xe8,0x50,0x15,0x76,0x7d,0xab,0x3b,0x9a,0xa8,0x8a,0xea,0x5b,0xaf,0xc6,0xfc,0x1a,0x2d,0x4d,0x14,0xee,0x7c,0x2b
.byte 0x6e,0xaa,0xe1,0xc4,0x0e,0x17,0x87,0x30,0x67,0xca,0x19,0xa5,0xb7,0xed,0x3b,0x8e,0xca,0x98,0xd0,0xa7,0x0b,0x0e,0x0f,0xd8,0x40,0x9b,0xb6,0x7c,0xef,0xd1,0x83,0xb7,0xaf,0x43,0x64,0x9e,0x66,0x9a,0xdf,0xb6,0x5c,0xf0,0x36,0xea,0xfb,0xea,0x0a,0x03,0x8e,0xde,0x3d,0x3f,0x69,0x3a,0x38,0x91,0x62,0x41,0x8e,0x70,0x11,0xd7,0x59,0x05
.byte 0x3e,0x52,0x36,0x43,0x6e,0x09,0x67,0x35,0x8e,0x0c,0x6d,0x3b,0xb4,0x6b,0xc7,0x8f,0xe8,0x53,0x77,0x6d,0x4d,0xa9,0x0d,0x2a,0x96,0xd3,0x1b,0xe8,0x3a,0x8f,0xfa,0xd2,0x17,0xfd,0x1f,0xce,0x90,0x99,0xb0,0xda,0x15,0x1c,0xe0,0xe9,0xff,0xc8,0x8b,0x5a,0x1a,0x0d,0x83,0x1a,0x99,0xaa,0x73,0x43,0xb1,0x68,0x10,0xed,0xf5,0xbd,0x67,0xdb
.byte 0x1f,0x1c,0x12,0x9b,0xa2,0x91,0x3b,0xe6,0x72,0x9a,0xc8,0x55,0x23,0x5a,0x05,0x4b,0x7b,0x9c,0xa2,0x28,0xc6,0xcb,0x0a,0xac,0x59,0x25,0xb2,0x7a,0xb2,0x02,0xae,0xc4,0x61,0x7d,0x5c,0x90,0x1e,0xcd,0xce,0xd6,0x9f,0x6f,0x1b,0x93,0x6d,0xec,0xb6,0xa0,0xcf,0x6e,0xea,0x4e,0xfb,0x23,0xf2,0x39,0xab,0x7f,0x45,0x40,0x16,0x4f,0xf6,0x0e
.byte 0x09,0xf7,0x85,0x03,0xee,0x3c,0xaa,0xb1,0x0e,0x07,0x2b,0xee,0x65,0xca,0x9a,0xa9,0xc8,0x78,0x97,0x77,0x38,0xaf,0x32,0x97,0x0a,0x2f,0xd4,0x7a,0xf8,0x04,0xc7,0xcc,0xce,0xe6,0x9d,0x10,0xe7,0xf6,0xc1,0x4c,0x24,0xd1,0xcc,0x79,0x53,0x5a,0xc8,0xf9,0xfc,0x08,0x2a,0xe1,0xb4,0x51,0xc4,0x12,0x3e,0x50,0xf9,0x73,0x9d,0x42,0x85,0x4b
.byte 0x4e,0x68,0x7c,0x7b,0x8f,0xe1,0xc6,0xe2,0x07,0xa9,0xc1,0xca,0x35,0x56,0x58,0x40,0x8a,0xc7,0x6d,0x7f,0x9d,0x91,0xff,0x32,0xc3,0xc9,0x58,0x56,0x67,0xc5,0x51,0x2d,0x3f,0x98,0x16,0x4b,0x95,0x4e,0xed,0x83,0x7a,0xe5,0x6b,0x21,0x91,0x4a,0x8d,0xcc,0x26,0x21,0x59,0x4e,0xe6,0x05,0x6a,0xd2,0x83,0xba,0x6b,0x8a,0x4f,0xe5,0x03,0xd1
.byte 0x81,0x5b,0x84,0x07,0x9a,0xe1,0xf5,0x55,0x5c,0xfa,0x9f,0xad,0x15,0x20,0x7f,0xc6,0xc8,0x3a,0x7e,0xd8,0x2e,0x56,0x96,0x38,0xc2,0xe8,0xae,0xfb,0x28,0x44,0x6e,0x23,0x64,0xdd,0xfd,0x2e,0x86,0xea,0x7a,0x97,0xa4,0x50,0xdb,0x1f,0xa5,0x8e,0xaa,0x54,0x56,0x41,0x51,0x91,0x47,0xf7,0x5b,0xb5,0x33,0x74,0x65,0x41,0x9c,0xc8,0x19,0xde
.byte 0x66,0x2d,0x18,0xb2,0x05,0xc6,0x24,0xd1,0xd5,0xd5,0x4e,0xba,0x25,0x8c,0x28,0x7d,0xf4,0xb5,0x2a,0xc4,0xef,0xac,0xa0,0x82,0x78,0x96,0xe3,0x7a,0x5f,0xca,0xd9,0xc4,0x38,0xa9,0xb8,0xfa,0x7e,0x04,0x16,0x5f,0x4e,0x02,0xf5,0x45,0x6c,0x7f,0xbe,0x8e,0x94,0x45,0xaa,0x85,0x5a,0x74,0x36,0x47,0xb7,0xc5,0x2b,0xfd,0xc3,0x70,0x4b,0x39
.byte 0x66,0x9c,0x84,0x45,0x32,0xb9,0x32,0xd6,0x1f,0x72,0xdb,0x81,0x81,0x72,0x6d,0x54,0x55,0x0f,0x83,0x92,0xca,0x8e,0xd1,0xf9,0x18,0x4d,0x24,0xd0,0x9a,0xa6,0xc4,0xfb,0x36,0x34,0xe6,0x9a,0xac,0xe6,0x25,0xe5,0x28,0xf0,0x09,0xd7,0x10,0x41,0x66,0xd5,0xf3,0x43,0xa8,0x03,0xcb,0x8e,0x5a,0x1b,0x3a,0x70,0x9e,0x33,0x79,0x42,0xe3,0xea
.byte 0x74,0x45,0x44,0x64,0x89,0xa1,0xf9,0x0f,0xe8,0x8f,0x40,0xcb,0x60,0x63,0x0d,0x11,0xe3,0xda,0x37,0x94,0x4d,0x8f,0x84,0x89,0x92,0x46,0x4a,0xf3,0x9f,0xce,0xfc,0xaa,0x4c,0x0c,0xfc,0x8d,0xff,0x6f,0x73,0x91,0xce,0x55,0x47,0x4f,0x7c,0xcc,0x01,0x27,0xd1,0x4f,0xbe,0x70,0x05,0xbb,0xee,0xb4,0xdd,0x4f,0xf5,0xca,0xb3,0xab,0x7e,0x68
.byte 0x8b,0x21,0x03,0x8a,0xfe,0x63,0x43,0xfd,0x06,0xf6,0x0a,0xa2,0xae,0x5b,0x88,0xed,0x4c,0xbd,0xa4,0xf7,0x84,0x0b,0x43,0xba,0xed,0xf1,0x58,0x7e,0xea,0x5c,0xc0,0x90,0x1c,0x50,0x60,0x6b,0x06,0x93,0xe5,0x3f,0xe1,0xec,0x5e,0x3e,0xd0,0x14,0x15,0x04,0x6a,0x13,0x4c,0x28,0xa7,0x7b,0x7b,0xeb,0xb0,0x59,0xa2,0x08,0x33,0x73,0xa2,0xc5
.byte 0x57,0x51,0x8e,0xd3,0x8b,0xbd,0x83,0xe4,0xd3,0x5b,0x6f,0x6b,0x61,0xf7,0x7d,0x17,0xed,0x7f,0xea,0xcf,0x56,0x03,0x87,0x2f,0x50,0xbc,0x73,0xc8,0x84,0x7c,0xb1,0xfd,0xe6,0x6c,0x95,0x79,0x97,0x7f,0xd9,0x8d,0x0d,0x4e,0x21,0xde,0x82,0x5c,0xb7,0x96,0x22,0xff,0x2f,0xaa,0x85,0x25,0x62,0x65,0x8b,0xc1,0x3a,0xa9,0xa3,0xef,0xc6,0x27
.byte 0x1f,0xfe,0xc5,0x5d,0x27,0xee,0xe0,0x5a,0x7b,0xa2,0xdc,0x6d,0xad,0xa1,0x60,0xcd,0xcc,0x8f,0x6e,0xa2,0xfd,0xaa,0x64,0x12,0x86,0x61,0x5a,0x61,0x93,0x3e,0x9c,0x0d,0xe5,0x1a,0x8a,0xb4,0x00,0xbb,0xc6,0x31,0x0f,0xb5,0x9b,0x1c,0x75,0x3e,0xdf,0x02,0x86,0x9c,0xf4,0x3e,0x10,0xf2,0x5e,0x47,0xb4,0x1f,0x73,0xb9,0x09,0xe4,0xcc,0x3d
.byte 0x45,0xe0,0xa7,0xa9,0x27,0xc9,0x26,0x13,0x81,0x81,0x94,0xed,0x16,0x16,0x44,0x22,0x74,0x9b,0x0c,0x98,0x8b,0xbc,0x88,0x01,0x26,0x0e,0x04,0xa4,0x74,0x85,0xa7,0x7e,0x65,0x1e,0x83,0xa5,0xb5,0x73,0xbb,0xa7,0xd8,0x54,0xf6,0xa7,0xc3,0xb7,0x75,0x7c,0x56,0x6b,0x26,0x11,0x2f,0x4f,0x14,0x56,0x39,0x58,0x2a,0xee,0xf1,0x33,0x9f,0x7b
.byte 0x76,0x9b,0xf6,0xcc,0xa6,0x3f,0xd7,0xc5,0x0a,0x3d,0xfa,0x20,0x5a,0x79,0xf5,0x1e,0x51,0xa6,0x5c,0xcf,0xab,0x41,0xbf,0x30,0x91,0x85,0xb2,0x84,0x8d,0xd8,0x69,0xa2,0x4e,0xd6,0x8d,0x57,0x2e,0xaa,0x6b,0x68,0x24,0xd7,0x4d,0xf7,0xb2,0x23,0x1b,0x37,0x4e,0x8e,0xc6,0xbb,0x00,0x95,0x06,0x84,0x99,0x10,0x15,0xa3,0xcc,0x33,0x6e,0x69
.byte 0x5f,0x5b,0xb0,0x0f,0xd4,0x76,0x1f,0x5d,0xba,0x05,0x87,0x49,0xbd,0x35,0x11,0x8b,0x57,0x4d,0xa0,0x17,0x3d,0xc2,0xc3,0xde,0x61,0x0f,0x75,0x4a,0x92,0x44,0xc0,0x4b,0x6c,0xa0,0x78,0x95,0xa7,0xf5,0x0b,0x8b,0xf9,0x20,0xb1,0x01,0xdc,0x67,0x37,0x68,0xd7,0x41,0xb2,0xe7,0x9d,0x24,0x6f,0x14,0x36,0x74,0xe4,0x23,0x0b,0x9e,0xec,0xe0
.byte 0xaa,0xa2,0x4a,0x1f,0x69,0x1a,0xac,0x52,0xf5,0x67,0x11,0x76,0x7b,0xed,0x07,0x73,0xd6,0x5d,0x94,0xd6,0xab,0x9e,0x85,0xdc,0xfc,0xa8,0xa6,0x40,0x15,0xa2,0x56,0xcf,0x74,0x22,0x25,0xcd,0xf5,0x9c,0x39,0x8c,0xf5,0x89,0xd9,0x2d,0x82,0x82,0x59,0x30,0x8c,0xe7,0x0b,0x85,0x93,0xad,0x42,0x6a,0x49,0x9a,0x19,0x54,0x12,0xcf,0xf8,0xb7
.byte 0x33,0xc2,0x75,0xf7,0xcf,0x91,0xdb,0xda,0x8e,0x4e,0xc5,0xc0,0xe5,0xe6,0x52,0x03,0xdd,0x11,0x18,0x5b,0x21,0xa2,0x7e,0x6c,0x43,0xd3,0x38,0xa2,0x92,0x55,0x6f,0xd4,0xf6,0x8f,0x95,0xf1,0x70,0x1b,0xf3,0x86,0x53,0x5e,0xd7,0x17,0x5f,0x81,0x7f,0x58,0x53,0x35,0x53,0x40,0x95,0x0b,0x46,0x13,0x8e,0x9e,0x6e,0x4c,0xc4,0xe0,0x11,0x4d
.byte 0xb7,0xf8,0x68,0x89,0xfa,0xe5,0x60,0x33,0xe2,0xc3,0xf8,0x8e,0xcf,0xf9,0xc9,0xd8,0x06,0xd0,0x0b,0x25,0xcd,0x4d,0x2f,0xbe,0x5e,0x81,0xe0,0x02,0x74,0x93,0xd0,0x8a,0x33,0x77,0xab,0xe6,0x17,0xd5,0xb1,0x53,0x6b,0xfc,0x94,0x88,0x1f,0xc4,0xf3,0x42,0x3e,0x16,0x54,0xf6,0xa5,0x05,0x58,0xe4,0x91,0x79,0x51,0x9d,0x29,0xd1,0xd1,0x69
.byte 0xa9,0xb5,0xd1,0x2c,0xe5,0x47,0xea,0x2d,0x67,0x59,0xea,0xa4,0x0e,0x1f,0xde,0xfb,0xe2,0x16,0xe1,0xc2,0xb2,0x36,0x3b,0x15,0x84,0x19,0xc1,0xee,0x37,0x49,0x8f,0x1c,0xf8,0x3d,0xc7,0x94,0x39,0xab,0xf2,0xdc,0x7c,0x53,0xc1,0xb4,0x89,0x65,0x73,0xe0,0x91,0x8a,0xa3,0xa7,0xb4,0x05,0x7d,0x18,0x9d,0x2d,0x13,0x76,0x9d,0xfc,0x9d,0xef
.byte 0x0b,0x02,0x61,0xc0,0x2d,0xa0,0x6e,0x2b,0x0b,0xbb,0x9f,0x53,0xc1,0x20,0xcc,0x58,0xbe,0xf3,0x56,0xb4,0x68,0x82,0x30,0xfc,0xb6,0x4f,0x7d,0x03,0x56,0x37,0x68,0x97,0xa8,0xea,0x9d,0x20,0x2b,0x46,0xd7,0xdc,0xce,0x8b,0x1a,0x29,0x5c,0xa0,0x35,0x34,0x86,0xcb,0xbb,0xdb,0x8b,0xc4,0x6b,0x2b,0x4f,0xab,0xc5,0x8b,0x34,0x92,0x5c,0xbd
.byte 0x2f,0xf4,0xd6,0x40,0xf8,0xc7,0x0e,0x4b,0x1e,0x8d,0xf6,0x45,0x2e,0xa9,0xb0,0xec,0xdb,0xe0,0x71,0x23,0xe4,0x89,0xa9,0x22,0x89,0x20,0x12,0x94,0xa0,0x00,0xca,0xb0,0xf3,0xac,0xda,0x27,0x4d,0xcf,0x76,0xd3,0xa9,0x2b,0xc4,0x0a,0x5d,0xd0,0x7f,0xf8,0x8f,0xa7,0xb3,0x5e,0xf6,0xb8,0x36,0xc0,0x50,0x6e,0x23,0xb8,0xb8,0x55,0x0e,0xf9
.byte 0x3c,0xed,0x24,0xde,0xf0,0xb3,0x83,0x09,0xae,0xfa,0xed,0x71,0xb1,0xd8,0xd1,0x9e,0x35,0xf6,0x2c,0x83,0x89,0xc7,0x86,0x25,0xb1,0xc3,0xac,0x09,0xf9,0x52,0xe4,0xf1,0xc7,0x82,0x54,0x33,0xa4,0xbe,0xc6,0x92,0xa2,0x54,0x43,0x25,0x51,0x6a,0xa3,0x87,0x45,0x32,0x9f,0x46,0x37,0xf2,0x55,0xbd,0xb5,0x54,0x7b,0xcf,0xfb,0xf8,0x3e,0x80
.byte 0x35,0xb6,0x76,0xc0,0x4c,0xe7,0xf7,0xd8,0x69,0x4c,0xa7,0x53,0xb5,0x5a,0xbf,0xa4,0x6d,0x99,0xc0,0x54,0x92,0x16,0x9b,0x89,0x57,0x32,0x20,0x71,0x31,0xa9,0x72,0xb8,0xca,0x69,0x0b,0x3f,0x82,0xaf,0x72,0xa6,0x99,0x08,0x17,0x02,0x9e,0xc1,0xa5,0x83,0x53,0xa7,0xea,0x11,0x17,0x23,0x1d,0xbf,0x82,0x29,0x93,0x49,0x15,0xe8,0x60,0xc6
.byte 0xf2,0x04,0x9a,0xa3,0x34,0x1e,0xa2,0x4f,0xe1,0xa8,0x4d,0xd4,0xc2,0x92,0x84,0x6a,0xa9,0x15,0x68,0x91,0xd3,0x73,0x8f,0x6f,0xab,0x24,0x63,0x8a,0x9d,0x51,0x79,0x8f,0x90,0x74,0x4d,0x67,0xeb,0x21,0x12,0x07,0x6d,0xee,0x7f,0x9e,0x07,0xbb,0xfc,0xe6,0xad,0x02,0x69,0x85,0x02,0x48,0x44,0x32,0x39,0xf7,0xd5,0x1c,0xd9,0xb2,0xe7,0xdd
.byte 0x5a,0x92,0x42,0x3d,0x75,0x7f,0x06,0x14,0x18,0xda,0x1e,0x9d,0xa0,0x36,0x8b,0xe8,0xf3,0x69,0x1c,0x2a,0x93,0xc5,0x98,0x0c,0xd3,0xe0,0x5c,0x08,0xbb,0x21,0x02,0xfb,0xa9,0x5e,0xe8,0x18,0x44,0x01,0xb6,0x61,0x17,0x9c,0x2e,0xff,0x61,0xc1,0xe4,0xf6,0x08,0xbe,0x08,0xaa,0x74,0xaa,0x7d,0x8e,0x51,0x49,0xc4,0x52,0xd0,0xe7,0xc4,0xfc
.byte 0xf0,0x05,0x6f,0xff,0x47,0x64,0xda,0x13,0xcb,0x7f,0x74,0x45,0x35,0x67,0x3c,0xe4,0x2f,0xd3,0xd8,0x6c,0xc3,0xb9,0x71,0x9f,0xe0,0xc8,0x8c,0x21,0xb9,0x4f,0xdf,0x2f,0xfe,0x5b,0x26,0x0d,0x0e,0x9f,0xa5,0x38,0x1b,0x9a,0xc8,0xca,0x63,0x37,0xd1,0xf3,0x8e,0x78,0xcb,0x29,0x28,0xc2,0x24,0x67,0xb2,0xa9,0xc5,0xb0,0xc0,0xc0,0xb7,0xb9
.byte 0xcb,0xb9,0x1d,0x31,0x76,0xc8,0x84,0x8e,0x99,0x0b,0xec,0x90,0x56,0x45,0xed,0xe7,0x11,0x2f,0x01,0x93,0x22,0x13,0x21,0x33,0x75,0x41,0xf3,0xf4,0x1d,0xb6,0x0d,0x60,0x65,0xe8,0xf2,0x0d,0x91,0x02,0x8c,0xa2,0x95,0xa8,0x82,0x65,0xd7,0x9b,0x7d,0xeb,0x6c,0x8a,0x77,0x04,0x79,0x6d,0x89,0x9d,0xf6,0x0e,0x47,0x10,0x1f,0x0d,0x8d,0x87
.byte 0x47,0x72,0xce,0x3e,0x7e,0xa5,0xc4,0x67,0x46,0x18,0x67,0xc2,0xb6,0xee,0xe4,0xad,0xdd,0xb1,0x40,0x96,0xf0,0x5d,0x46,0x3f,0x23,0xc8,0xef,0x06,0x26,0xd2,0xf7,0x88,0x6f,0xb2,0x3d,0xf3,0xd7,0x9c,0x1b,0x11,0x65,0xf9,0xdd,0xbd,0x67,0x18,0x6c,0x2a,0x1f,0x00,0xef,0xf3,0x64,0x42,0x9e,0x96,0x5e,0x9e,0xe8,0xeb,0x39,0x5f,0x3f,0x87
.byte 0xce,0xb7,0x1f,0x8f,0x3b,0xff,0xd8,0x93,0x9a,0xc7,0xbb,0xb4,0xc7,0xb5,0xa9,0xaa,0xcb,0x80,0x03,0x96,0x04,0xdd,0xce,0x60,0x28,0xe0,0x9d,0x74,0xf1,0x7f,0x8a,0x44,0xe4,0x10,0x42,0x12,0xd4,0xaa,0x7a,0x43,0x24,0x3b,0xaf,0x20,0x7f,0xaa,0x0f,0xda,0x00,0x14,0xe3,0x30,0x55,0x18,0xd0,0xcf,0x03,0x23,0xe2,0x56,0x94,0xa7,0xc3,0xca
.byte 0xde,0x1b,0x80,0xad,0x36,0x61,0x23,0xf1,0x2c,0xc3,0x05,0x18,0x82,0xb7,0x55,0x91,0xe7,0x51,0x92,0x6c,0xe5,0xdb,0x5f,0x1e,0xf3,0xfd,0x72,0x49,0xb4,0xe7,0xa4,0x03,0x21,0xfb,0xb5,0x75,0xe4,0xd2,0x9f,0x17,0x64,0x36,0x5b,0x8b,0x9a,0x33,0xeb,0x02,0xa7,0xfe,0xbd,0xb2,0x03,0x89,0xe7,0xba,0x65,0x96,0x56,0x9e,0x9f,0xde,0xbc,0xed
.byte 0xa5,0x4c,0x69,0xed,0x04,0x42,0x5b,0x1d,0x20,0x37,0x45,0x10,0xbd,0xf7,0x14,0x92,0x58,0x41,0xb5,0x87,0xf9,0x47,0xb5,0xa6,0xa8,0xc1,0x53,0x71,0x59,0xcb,0x9d,0xa4,0xa9,0x7d,0x42,0x64,0x2a,0x74,0xa9,0x64,0x1b,0x08,0xca,0x9a,0x30,0x92,0xfc,0x48,0xff,0x30,0x63,0x88,0x12,0xa7,0x48,0x03,0xb9,0x5a,0xf6,0xa1,0x51,0x4e,0x51,0xe1
.byte 0x82,0xe3,0xe7,0x5d,0x6d,0xab,0x53,0x06,0xbd,0x85,0x43,0xb1,0x67,0x1a,0xf3,0x14,0xe7,0x0a,0x15,0x93,0x3a,0x0d,0xac,0x30,0x1d,0xe0,0x2c,0xae,0x54,0xef,0x60,0x0b,0xb0,0xee,0x20,0x14,0x71,0xc2,0x27,0x4e,0x08,0x6e,0x0f,0x32,0x53,0x2a,0xb0,0x22,0x15,0xe0,0x11,0xd1,0x76,0x65,0xbf,0x3c,0x9c,0x05,0x1e,0x00,0xba,0x58,0x2a,0xdc
.byte 0xac,0xb4,0x8c,0x12,0xe3,0x56,0xca,0xc1,0x6b,0x10,0x11,0x64,0x1c,0x58,0xfe,0xb5,0x6b,0x7f,0xb1,0x67,0x01,0xd8,0x38,0x3e,0x18,0x49,0x0d,0x04,0x9c,0xb4,0x9a,0x34,0xdd,0x18,0x87,0xfc,0x69,0x0d,0xe1,0x9b,0x5c,0x48,0xda,0xa6,0xa3,0x39,0x8a,0xc1,0x5d,0x7a,0x43,0xa2,0xad,0x83,0x6f,0x9c,0x4d,0x90,0xe7,0x87,0x10,0x35,0x39,0xb8
.byte 0xa2,0x19,0xa5,0x42,0xb2,0x8f,0x50,0xf4,0x1e,0xa4,0x08,0x7b,0x16,0x99,0xa1,0xa5,0x07,0x52,0xc8,0x62,0xa5,0x2c,0xc1,0x10,0xb1,0x81,0xa9,0x50,0x4e,0x66,0x5e,0x65,0xca,0x28,0x9b,0x5a,0x3f,0xe9,0xc2,0x68,0xb9,0xc3,0x5f,0xe8,0x11,0x27,0xac,0x05,0xbf,0x1b,0x0b,0xcd,0x84,0xa3,0x73,0xdd,0x6f,0x70,0x5c,0xbe,0x54,0xc1,0xbd,0x03
.byte 0x15,0xe2,0x5f,0x6b,0x12,0x6f,0xb0,0xa4,0x33,0xfc,0x32,0x14,0xcd,0xbc,0x39,0x17,0x68,0xc9,0x00,0x60,0xd4,0x6b,0xf6,0xc3,0x67,0x3e,0xd4,0x09,0xb7,0xf6,0x04,0x3c,0xc5,0x80,0xeb,0xca,0x1e,0xd2,0xc9,0x7c,0x36,0x10,0xc1,0x1e,0xe3,0x52,0x54,0x5d,0xe6,0x34,0x46,0x26,0x7c,0xdd,0x4d,0xa3,0xc2,0x6b,0x73,0x5e,0xa7,0xcf,0x91,0x34
.byte 0xf7,0xea,0xa8,0x09,0xf3,0xd3,0x14,0x5b,0x0e,0x72,0x0f,0xb7,0xd5,0xfb,0xbd,0xe6,0x19,0x32,0x5d,0x58,0xe1,0x6e,0x5b,0xed,0x4b,0x3b,0x8f,0x94,0x29,0x6c,0x0f,0xac,0xd5,0x69,0x4e,0xa4,0x9d,0xf7,0xbf,0xe0,0x8d,0x5f,0x14,0x66,0x81,0x0b,0xa5,0x3e,0xc6,0xb3,0x90,0x84,0x0e,0xb3,0x40,0x89,0xa0,0x4c,0x7d,0x0b,0x4f,0x15,0x9a,0x1c
.byte 0xe3,0xcb,0x68,0xa5,0x94,0xae,0x67,0xab,0xcd,0x58,0xdf,0x32,0xc7,0x83,0x26,0x1a,0x38,0x7e,0x22,0xe6,0x21,0x7d,0x93,0x94,0xa3,0x20,0xdf,0x47,0x14,0x5d,0x1f,0x71,0x5f,0xb1,0xb6,0xf7,0xe6,0xaa,0xbe,0x09,0x29,0x37,0x06,0xa7,0xda,0x97,0x65,0x76,0xb8,0xaf,0xbc,0x38,0x74,0xea,0x0b,0x8d,0x53,0x27,0x72,0x8e,0x07,0x42,0x2f,0x98
.byte 0xf8,0x50,0xc0,0x3e,0x68,0x15,0x89,0xb8,0x0e,0xf9,0x47,0xea,0xdd,0x0a,0x94,0x6b,0x88,0x15,0xed,0xc6,0xab,0xc5,0x5b,0x79,0x4f,0x78,0xb7,0x99,0x55,0x69,0x69,0xf0,0x91,0xc0,0xa8,0x32,0x42,0x36,0x4e,0x41,0xb1,0x02,0xdf,0xb8,0xa8,0x64,0x29,0x6b,0x52,0x3f,0x89,0x53,0x8e,0x2a,0x51,0xc9,0x05,0xca,0x9f,0x41,0xc4,0xc0,0x70,0x51
.byte 0x8a,0x5a,0x2b,0x83,0xa5,0xc9,0x9b,0xf4,0xd2,0x5a,0xb1,0xa2,0xcc,0x51,0x2b,0x74,0x5d,0xc0,0xf2,0x23,0xcb,0x91,0x12,0x3e,0xb8,0x73,0xd3,0x62,0x53,0x25,0x0e,0x58,0x55,0x2f,0xdf,0x7b,0x0e,0x3c,0xbf,0xb6,0xe6,0xd2,0xad,0x20,0x1b,0xea,0xac,0xfc,0xdd,0xe9,0x35,0x49,0x5f,0x90,0x7d,0x4f,0x09,0xb0,0xc5,0x8a,0x11,0x2a,0x2d,0xa1
.byte 0xf1,0x84,0xca,0x91,0xc9,0x9a,0x7a,0xe0,0x81,0x3e,0x92,0x07,0x32,0xb0,0x3f,0x59,0x1f,0xec,0x07,0x8e,0x8a,0x73,0x12,0x85,0x52,0x3a,0x7c,0xc3,0x1f,0xfe,0x27,0xd7,0x45,0x1a,0xf6,0x97,0x82,0x5a,0x97,0xdc,0x9e,0x70,0x37,0xe9,0xbe,0x35,0x76,0xae,0x15,0x0c,0x9a,0x66,0x69,0xb6,0xbd,0xcc,0x55,0xc9,0x44,0xb5,0x59,0x09,0xe9,0x0b
.byte 0x03,0xa0,0x5e,0x37,0xd1,0xff,0xd9,0xcb,0x5e,0x2a,0x97,0x6f,0x3a,0xee,0xb9,0xc4,0xc9,0xe0,0xb9,0xc8,0xc2,0x9e,0x66,0x0c,0xee,0x05,0x1e,0x12,0xa7,0x2c,0x61,0x7f,0x61,0x1c,0x90,0xbb,0x6a,0xb9,0xd9,0xf3,0x9a,0x5e,0xae,0xfc,0x18,0x15,0x46,0xa8,0x12,0xdd,0x81,0x66,0x44,0x91,0x84,0xbe,0xa8,0x20,0x9a,0x3c,0x0a,0x57,0x32,0xe1
.byte 0x22,0x3f,0x5d,0xa7,0x11,0xa3,0xeb,0xdc,0xaf,0x93,0xbb,0x2e,0xae,0x64,0x6e,0xbb,0x08,0xa8,0x83,0xb8,0xc2,0xfe,0x25,0x22,0x99,0x08,0x68,0xa8,0x6e,0xda,0xee,0xb2,0x78,0xc9,0x59,0x6b,0xac,0x48,0x5d,0x2d,0x1d,0x8c,0xa8,0xd3,0x4b,0x2d,0x27,0x65,0x01,0x5a,0xe4,0x4b,0x90,0x7c,0xe7,0x23,0xbe,0x90,0xf7,0xf9,0x15,0x2f,0xc1,0x70
.byte 0x41,0x80,0x54,0xbf,0xfe,0xb0,0x44,0xfa,0x0e,0x3b,0x07,0xa5,0x85,0x40,0x8e,0x21,0x72,0x1d,0x22,0x0c,0x78,0xcf,0x67,0xdb,0xb2,0xbb,0xec,0x78,0x6f,0xcf,0xcd,0x96,0x16,0xf4,0x82,0x56,0xd6,0xa0,0x0c,0x7f,0xb8,0x3b,0xa7,0x4d,0xc4,0x1c,0x6c,0x8f,0xa4,0xe7,0xd2,0x35,0x43,0x17,0xd0,0x0a,0x56,0xc3,0xa6,0xd6,0xf6,0x27,0x95,0xf1
.byte 0xa6,0x9d,0x5c,0x9c,0xb4,0x41,0x36,0xb5,0x36,0xcc,0xcb,0xbf,0x89,0xbc,0x63,0x21,0x7e,0x08,0x9c,0xdb,0x3f,0x60,0x7d,0x00,0xd0,0xbd,0xb0,0x20,0x2e,0xca,0x82,0x05,0xf0,0xff,0x57,0x56,0xc4,0x4e,0x50,0x58,0x5b,0x54,0x43,0x30,0x90,0x9a,0xf5,0x37,0x34,0x08,0xd7,0x57,0xc8,0x17,0x03,0x42,0x0d,0x42,0x04,0xaa,0xdb,0xc7,0xa7,0xdc
.byte 0x7b,0x10,0xc3,0x87,0x6c,0x0d,0x8d,0x43,0x1b,0x50,0xfa,0x71,0x2e,0x76,0x5f,0x27,0x73,0x0b,0x7f,0x01,0x28,0xb4,0xea,0x3a,0x1e,0x04,0x74,0xb4,0x18,0xa0,0xdd,0x8d,0x41,0x1a,0x20,0x09,0x11,0x9e,0x02,0xe4,0x50,0x37,0xb0,0x20,0x49,0x69,0xfb,0x30,0x82,0xd5,0x03,0x88,0x9b,0x03,0xa0,0x92,0xb1,0x51,0x63,0xcb,0x6a,0x4f,0xa4,0x74
.byte 0xc9,0x93,0xed,0x13,0x3c,0x6a,0xdc,0x43,0x57,0x87,0x56,0xb8,0xe3,0x30,0x4f,0x63,0x2d,0x7b,0x23,0x8e,0xe3,0x80,0x30,0x03,0x62,0x59,0x9b,0xbd,0xbe,0xc5,0xa9,0x40,0xbd,0x01,0xac,0x2f,0xbf,0x90,0x46,0x30,0x53,0x20,0x74,0x45,0xe4,0x21,0x17,0x72,0x54,0x7f,0x4d,0x90,0xd8,0x72,0x7f,0x7b,0x6c,0x83,0x5b,0x00,0xa6,0x17,0x7d,0x42
.byte 0x60,0xb5,0xd1,0x0b,0xf2,0x57,0xb4,0x13,0x45,0x7d,0xe4,0x9b,0x29,0x12,0x1b,0x29,0x76,0xd0,0xc0,0x59,0x9f,0x1e,0xa2,0xd7,0x76,0x05,0xe5,0x42,0x73,0x65,0xd3,0xb0,0x58,0x18,0x7a,0x00,0x4c,0xdb,0x0f,0xb2,0xb0,0xb4,0x4c,0xef,0x59,0xfd,0x20,0xca,0x45,0x51,0x82,0xf6,0x4d,0x20,0x96,0x5c,0x11,0x7f,0x33,0x67,0x38,0xea,0x1b,0x1a
.byte 0x10,0x9f,0x60,0x6a,0xe1,0xd3,0x77,0x27,0x1d,0x5d,0x29,0x3c,0x55,0xc3,0x34,0x51,0x37,0x0d,0xe2,0x55,0xf9,0xc3,0xb9,0x7f,0x06,0x68,0x07,0x84,0x05,0x18,0x18,0x64,0xfb,0x44,0xc7,0x62,0x22,0xdb,0x23,0xb3,0x70,0x40,0x73,0xf7,0x3e,0xa7,0xd7,0xe5,0x40,0xad,0xa7,0x54,0x18,0x41,0x95,0x56,0xda,0x80,0xe4,0x5e,0xca,0x0b,0x15,0x6d
.byte 0xc1,0xf5,0xf6,0x30,0x08,0x30,0x21,0x81,0x1c,0x27,0x62,0x2e,0x1a,0xde,0xf9,0x2c,0xec,0x4f,0x70,0x3a,0x6b,0x63,0x1a,0xbb,0x99,0x1b,0xb4,0x82,0xc5,0x81,0xef,0xc3,0x6f,0x12,0xf4,0x22,0xc4,0x32,0x11,0x11,0xba,0x56,0x71,0x47,0x10,0xd7,0xf7,0xe8,0x5b,0x07,0xb6,0x2f,0xa9,0xa9,0xfd,0x4d,0x42,0xe8,0xb7,0x2a,0xbf,0x93,0xb1,0xef
.byte 0x09,0x8e,0xa3,0x6b,0x40,0xcc,0xb1,0x63,0x10,0xb7,0x8f,0x9e,0xd1,0x02,0x2b,0x86,0x86,0xbf,0x44,0x89,0x22,0xf9,0xe5,0xf7,0xad,0x10,0xda,0xd8,0xdf,0xef,0xa0,0x98,0x42,0xad,0x21,0xa8,0x42,0x6f,0x47,0x08,0xf2,0x62,0x9e,0x2b,0xaf,0xc2,0xac,0x71,0x3d,0xd6,0x43,0x65,0x85,0x60,0x17,0xc6,0xa2,0xa2,0x3a,0xd9,0x34,0xeb,0x0b,0x6d
.byte 0x04,0xf7,0x6f,0xa5,0x39,0xf5,0xfa,0x71,0x58,0x9d,0xe9,0xe5,0x44,0x8c,0xd3,0xf0,0x62,0x8a,0x2f,0x73,0xf6,0xab,0xf4,0x09,0xe1,0xd1,0x23,0x0f,0x7c,0x5c,0x63,0xa4,0x34,0x26,0xeb,0xca,0xe5,0x96,0x1c,0x31,0x61,0xcc,0xa1,0x1f,0x95,0x9c,0xd9,0xb5,0x2d,0x19,0x9e,0x9a,0x5d,0x99,0x4f,0x78,0xb7,0x7a,0x36,0xde,0x3c,0x77,0xe3,0xb8
.byte 0x55,0xcc,0x27,0x14,0xc3,0x69,0xf9,0x23,0xea,0xc6,0x07,0x12,0x94,0xc9,0x1e,0x28,0xab,0xaa,0xf3,0x28,0x35,0x8c,0xb5,0xa4,0x8d,0x1d,0xa6,0xa3,0xb0,0xfe,0xca,0x8e,0x44,0xd1,0x96,0x47,0xf3,0x04,0x77,0xea,0x9e,0xbc,0xaf,0xda,0xed,0x77,0x6b,0x80,0x9d,0x32,0x4f,0xff,0xda,0xd6,0x61,0x1f,0x57,0x66,0xa7,0xfb,0x54,0x78,0x0a,0x43
.byte 0xaf,0xf7,0x31,0x47,0xd9,0xf4,0x6e,0x70,0x9f,0x1c,0xe0,0x71,0xba,0x11,0x2a,0x0e,0x83,0xba,0xa2,0xc4,0x8b,0x64,0x1e,0xcf,0x17,0xfc,0xb5,0x72,0xa3,0x4e,0x03,0xc7,0x6f,0xa6,0xf6,0x6f,0xe7,0xb7,0x09,0x1a,0x6f,0x09,0xa6,0x45,0xd5,0x20,0x2f,0xbd,0x5a,0xc8,0xae,0x02,0xf3,0x00,0xf7,0xb4,0xd9,0x05,0x38,0x23,0x64,0x27,0x0b,0x27
.byte 0xc3,0x54,0xea,0x6f,0x85,0x68,0x10,0xa8,0xcd,0xb6,0xf3,0xb6,0x7a,0x55,0xba,0x7e,0x5f,0x6d,0x0e,0x33,0xf3,0x98,0xef,0xd3,0x9b,0x30,0x5c,0x2b,0xd3,0x10,0x89,0xe7,0x34,0x95,0x4f,0x58,0xb5,0xe6,0x7f,0x84,0x3f,0x71,0x3b,0xae,0xc7,0xcd,0x2e,0x93,0xff,0x72,0x33,0x6f,0xf7,0x8b,0x25,0xd4,0x48,0xa4,0x66,0xe9,0xc1,0xe7,0x1a,0xf7
.byte 0x2d,0x63,0x67,0x5e,0x6c,0x96,0x9c,0x93,0x52,0xe9,0x0f,0xf6,0x1a,0x78,0xa9,0xa0,0xa1,0x96,0x95,0x49,0x69,0xfd,0x78,0xf6,0x65,0x49,0xc6,0x1c,0x44,0x3d,0xbd,0xb5,0x04,0x5f,0xaf,0x69,0x1c,0x3e,0xc1,0xea,0x53,0x3b,0x2e,0x40,0x61,0xf2,0x66,0x24,0x90,0x4a,0x86,0xf0,0x74,0xec,0xdb,0x95,0x68,0x9e,0x83,0x11,0xfc,0x5a,0x51,0x66
.byte 0x51,0x09,0x71,0x6c,0x32,0xbe,0x5d,0x1d,0x04,0xb2,0xba,0x90,0xfa,0xcb,0xd5,0xa4,0xa7,0x26,0x4e,0xe1,0x1e,0x32,0x7c,0x18,0x40,0x6d,0x40,0xed,0x8d,0xcc,0xa3,0x8a,0xc2,0x29,0x73,0x73,0x94,0x0b,0x09,0x43,0xd4,0x2c,0x0f,0xc5,0x92,0x3c,0x47,0x25,0x41,0x96,0xa6,0x2b,0xb0,0xae,0x98,0x82,0x72,0xd3,0x2f,0x7f,0xcc,0x2a,0x22,0x18
.byte 0xaf,0x07,0xfc,0x64,0x9f,0x72,0x4d,0x61,0x88,0x59,0x6f,0xaa,0x27,0x8d,0x42,0x21,0x5f,0x25,0xbe,0xa3,0x29,0x4d,0x06,0x2d,0xd5,0xaa,0xb3,0xb5,0xbe,0xa5,0x6c,0x1e,0xdb,0x2e,0xb2,0xc0,0x9d,0x03,0x0f,0xce,0xfa,0xc6,0x45,0xff,0xac,0xc8,0x22,0xb6,0x90,0x40,0x88,0xae,0xc0,0x9e,0xcb,0xf2,0x2b,0xa3,0x74,0x34,0xe1,0xb0,0xe3,0xdb
.byte 0x46,0x88,0xb8,0x67,0x24,0x6b,0x53,0xf7,0x18,0x2e,0x52,0x44,0x24,0x23,0x4d,0x33,0x94,0x4d,0x58,0x47,0x0e,0xcc,0xae,0x46,0x56,0x49,0x76,0xfc,0x62,0x9e,0x3d,0x05,0x14,0xe7,0xaa,0x1a,0x44,0x8b,0x02,0x0c,0x8a,0x8b,0x9c,0x5b,0x8d,0x99,0x10,0xb3,0x4a,0x8d,0x9c,0x5f,0x9f,0xe9,0x35,0x10,0x67,0x1a,0xfe,0x1f,0xb9,0x5e,0x02,0xeb
.byte 0x05,0xe2,0xbe,0xa6,0xea,0x81,0x64,0x2d,0x8e,0x8b,0xf4,0xe5,0x02,0x98,0x21,0xa9,0x9d,0xc7,0xc1,0x4b,0x74,0x33,0x8a,0x1e,0x7b,0xbc,0x15,0x27,0xda,0xe8,0x35,0xa5,0x36,0xa5,0xe4,0xad,0x1c,0xa0,0x7c,0x1d,0xc9,0x1e,0x7e,0x88,0xa7,0x59,0x88,0x1c,0xb6,0x0a,0x07,0x94,0xbb,0x5d,0xa1,0x00,0xdd,0x85,0x70,0xac,0x60,0xcb,0xc8,0x70
.byte 0x2c,0x8f,0x4e,0x2e,0x85,0xdf,0xf4,0x6d,0x78,0x16,0x03,0x50,0xed,0xe8,0x13,0x79,0x64,0x89,0xf7,0xf0,0x42,0xf6,0xc9,0x78,0xe6,0x23,0x36,0xdd,0xaf,0x13,0xee,0xc4,0x94,0x81,0xc3,0x68,0xe8,0x88,0xb3,0xd4,0x16,0x05,0x43,0x52,0xab,0x60,0x8f,0x04,0xee,0x9c,0xb3,0x22,0x63,0x25,0xe0,0x9d,0xd3,0xc0,0xa4,0x79,0x75,0xac,0xba,0x16
.byte 0xea,0x43,0x18,0x9c,0x9a,0x9a,0x9b,0xbf,0x51,0xa0,0xd1,0xf2,0x64,0x0d,0x3c,0x8f,0xaa,0xb2,0x25,0x30,0x35,0xf9,0x87,0xf8,0x1d,0xc2,0xbd,0x3a,0xa1,0x28,0xb7,0xaa,0x55,0xc0,0x79,0xc8,0xb4,0x21,0x8e,0x44,0x7e,0xc1,0xd5,0x7f,0xe8,0x18,0xfc,0xab,0xff,0x22,0x6d,0xc8,0x25,0x8a,0xe0,0x96,0xa4,0xf2,0xde,0x49,0xf2,0x4c,0xfe,0x5b
.byte 0x56,0x3b,0xa0,0x35,0x5e,0xbe,0xf7,0x47,0x66,0xff,0x62,0xfb,0xe9,0x27,0xd6,0x0a,0x98,0x99,0xb7,0x76,0xe8,0x67,0x05,0x70,0xd5,0x43,0xcd,0x28,0x9b,0xf5,0x9f,0xa4,0x80,0x31,0x1a,0x02,0xd6,0x67,0x05,0x61,0xd0,0xcb,0x15,0xe0,0xec,0xe3,0x41,0x53,0xb0,0x0f,0x21,0x65,0x56,0x47,0x49,0x9f,0x16,0x29,0x1a,0xca,0xe0,0x50,0x54,0xd2
.byte 0x46,0x9b,0xae,0x68,0x06,0x61,0x0b,0xd7,0x46,0x93,0x79,0x06,0x0a,0xc9,0xc5,0x8f,0x33,0xfe,0x63,0xf8,0x2d,0x87,0xa6,0x95,0x01,0x87,0x2c,0x15,0xd3,0xbc,0x03,0x02,0x7f,0x75,0xf1,0xbe,0x78,0xe2,0x8b,0x03,0x6a,0xea,0xb1,0x74,0xd3,0xc7,0xef,0x2e,0x8b,0xa2,0xd9,0xe3,0x8e,0xfd,0x6a,0x1a,0x6b,0xf5,0x9f,0x5b,0x9c,0x9b,0x78,0x58
.byte 0x81,0xba,0xb0,0x63,0x5e,0xd4,0x36,0xe1,0xd4,0xb4,0x9d,0x90,0x77,0x08,0xc7,0xc8,0x09,0x64,0x54,0x35,0x16,0xc6,0x9c,0xe2,0xc2,0x40,0x39,0x00,0x65,0x8d,0x7d,0x90,0x9b,0xdb,0xb3,0xac,0xe8,0x17,0xe3,0x78,0x4a,0x26,0x42,0xf8,0xb8,0xb8,0x3b,0x55,0x7f,0x8d,0xed,0xee,0x88,0xaa,0xa7,0x05,0xa9,0x72,0xc1,0x58,0x21,0x1b,0x9e,0x6f
.byte 0xf2,0xf3,0x8d,0x72,0x8c,0x3a,0xab,0x21,0x8d,0xcb,0x33,0x53,0xa1,0x9c,0x6d,0x41,0xef,0xf8,0xae,0xcf,0x0c,0xf7,0xca,0x7f,0x38,0x17,0x28,0xa4,0xab,0xb5,0xf4,0x5d,0x96,0xf4,0x36,0x13,0x50,0xb6,0xe5,0x9a,0xeb,0x3f,0xe2,0x64,0x94,0xc0,0xd5,0x9c,0x60,0x87,0xff,0xf5,0x8a,0x60,0x83,0x3d,0x02,0xfc,0x7f,0xc0,0x20,0x24,0x4e,0x0c
.byte 0xf3,0x31,0x1d,0x07,0x67,0x90,0xa6,0xbd,0x1f,0x6e,0xb0,0xbd,0x24,0x53,0x31,0x50,0x72,0xdb,0xb1,0xdd,0xb2,0xfd,0x77,0x68,0x75,0x7a,0x7d,0x66,0x52,0x40,0xab,0x48,0x5a,0xf2,0x94,0xc6,0x54,0xcf,0xfe,0x2a,0xe7,0x80,0x67,0x34,0x93,0x72,0x85,0x6c,0x48,0x1c,0x00,0x62,0xf8,0x6f,0x2e,0xb1,0x85,0x42,0x5b,0x6b,0xe8,0xf5,0x69,0x05
.byte 0xaf,0x59,0x1a,0x43,0x0a,0xfe,0x49,0x8c,0x35,0xbc,0xf7,0xb8,0x2d,0x9c,0x89,0x64,0x37,0x5e,0xfa,0x05,0x15,0x9d,0x3c,0x80,0xc4,0x41,0x5a,0x00,0xcb,0xdc,0x9c,0x60,0xfe,0x3a,0x2e,0x45,0x16,0xb3,0x4b,0x81,0xbb,0xed,0xfe,0x09,0x99,0x0b,0xb3,0x13,0xa4,0x36,0xe0,0xe0,0xaa,0x5f,0x7b,0x76,0x7c,0x64,0x54,0x85,0x53,0xf7,0x82,0x8c
.byte 0x8d,0xc6,0xf2,0x89,0xc6,0x26,0xa3,0x9b,0x26,0x2a,0xbe,0xed,0x39,0xcf,0x4a,0x16,0xec,0x75,0xca,0x08,0x3a,0x2a,0x1b,0x29,0x27,0x71,0x41,0xe2,0xd2,0x83,0xa0,0xd5,0x20,0x28,0x92,0xb8,0xbd,0xe5,0x3d,0x45,0x94,0x5f,0x83,0x70,0xb0,0x44,0x14,0x05,0xac,0xc3,0x88,0xad,0xe6,0x6a,0x95,0x7f,0x63,0x5d,0xb8,0x2d,0x0f,0x08,0x50,0x1e
.byte 0xc2,0x28,0x20,0xcf,0x35,0xd9,0x37,0x72,0x97,0x03,0x33,0x7a,0x28,0xf4,0x96,0x6d,0x77,0xb7,0x1d,0xd8,0x67,0xf4,0xce,0xd8,0x2c,0xd6,0x84,0xc0,0xcf,0x56,0xb4,0xe1,0xdd,0xbb,0xbc,0xf2,0x72,0xff,0x69,0x4c,0x16,0x45,0x58,0x99,0x82,0x69,0x7a,0x86,0xa3,0xe2,0xdd,0x16,0xd2,0x65,0x65,0x7f,0x7e,0x55,0x54,0x16,0xda,0xfe,0x3a,0x49
.byte 0xfa,0x9e,0x0f,0xfa,0xdc,0x1c,0x25,0x46,0xa9,0xca,0x4f,0xf7,0x15,0x2c,0xd2,0xe2,0xf4,0x79,0x0f,0xb5,0x61,0x0a,0xb3,0xbb,0x2a,0x9e,0xa1,0xf7,0x9b,0x85,0xa7,0xb9,0xf3,0x36,0x29,0x4e,0x5d,0xee,0xab,0x46,0x9f,0xf8,0x4a,0xf7,0xbe,0x9b,0x51,0x1b,0x55,0x1b,0x91,0x78,0x06,0xbf,0x2c,0xec,0x3d,0xcc,0xe0,0x89,0x99,0xf9,0xea,0xc4
.byte 0x94,0x92,0x12,0x1e,0xa9,0x1b,0x4f,0x7d,0xd0,0xd8,0xc1,0x6f,0xcd,0x6e,0x51,0x3a,0xb1,0xab,0x04,0x32,0xbe,0xa7,0x57,0xf3,0x5c,0x08,0x30,0xef,0x02,0x11,0x8e,0x55,0x9a,0x62,0x7a,0x4c,0x54,0x9e,0xc0,0x30,0x8e,0x24,0xc2,0x38,0x83,0x4d,0xd1,0x66,0x2a,0x86,0x40,0x70,0x7c,0xb3,0xf8,0x85,0x3b,0x3c,0x98,0xe3,0x7a,0x54,0xb8,0xf5
.byte 0xf4,0xda,0x5e,0x43,0xfb,0x44,0x74,0xe7,0x81,0x82,0xfe,0xa6,0x2f,0xb0,0x18,0x3e,0x17,0xd3,0xfc,0xe7,0xbd,0x5e,0xf0,0x69,0x0f,0x70,0x78,0x95,0x18,0xcb,0xde,0x44,0xa3,0xf4,0xa2,0x05,0xac,0x70,0xcb,0x89,0xbc,0x24,0x53,0x1f,0xfe,0x0e,0xa7,0x4e,0x67,0xab,0x48,0x6d,0xbe,0x77,0xe0,0xa5,0x46,0xcb,0x06,0x70,0x99,0xa9,0x40,0xd7
.byte 0x9e,0xd9,0xc3,0xff,0x86,0xca,0x0c,0x29,0x72,0x90,0x9b,0x72,0xc7,0xd3,0x51,0x23,0x8c,0xca,0xa2,0xdf,0x4f,0x01,0xb5,0x56,0xa4,0x99,0x6f,0xb2,0x57,0x5f,0x67,0x84,0x99,0xce,0xd9,0x86,0x25,0x82,0x53,0x15,0xb0,0x37,0x19,0xfa,0xad,0x9e,0x76,0x52,0xa0,0xb2,0xbd,0xc5,0x1f,0xee,0xdb,0x2d,0x0d,0xea,0x1d,0x3c,0xb4,0x5c,0xfe,0xfb
.byte 0x95,0xea,0x56,0x65,0x9f,0xca,0xa0,0xd6,0xe3,0x2c,0xb5,0xd1,0x12,0x38,0xca,0x53,0x09,0x76,0x1b,0x77,0xb0,0x0b,0x54,0x59,0x38,0xd5,0xe9,0x08,0xa9,0x17,0x1c,0x88,0xe8,0x7a,0xd6,0x03,0xee,0x7c,0x46,0x3e,0x3c,0xeb,0x2c,0xa6,0x16,0x7b,0x7d,0xd5,0x30,0xea,0x12,0xfc,0x16,0x5d,0xcd,0xa9,0x73,0xfb,0xba,0xac,0xc6,0x8d,0xe4,0x87
.byte 0x3a,0x46,0x5f,0x35,0x4f,0x8f,0x53,0xe0,0x22,0xd3,0x7b,0x9a,0x2c,0x5e,0x06,0x05,0x1e,0xb1,0x87,0x80,0x75,0xa3,0x4d,0x32,0xc8,0xa0,0xd8,0x41,0x47,0xde,0x01,0x8a,0x56,0x0f,0xf8,0x3e,0x8a,0xde,0x1f,0x1f,0xd9,0xab,0xc2,0xcd,0x9a,0xd7,0xa5,0x2c,0x5c,0x42,0x9f,0x43,0x43,0x75,0x8d,0x1e,0x2b,0xe7,0x1a,0xaf,0x98,0xf4,0xc1,0xab
.byte 0xb4,0x1b,0x09,0x89,0x94,0xe3,0x42,0xd4,0xd0,0xdb,0x35,0xdf,0xce,0xb6,0x96,0xb8,0x2b,0xe2,0x51,0xa0,0xdc,0x92,0x3d,0x4c,0x6e,0x69,0xc1,0xe6,0xd5,0xec,0xda,0x51,0xe9,0x54,0x7e,0x56,0xe2,0x47,0xeb,0x37,0xce,0xce,0xbd,0xc2,0xf0,0x97,0x27,0x40,0x66,0x67,0xda,0xdf,0x86,0xcb,0xda,0x5e,0x03,0xe0,0x38,0x54,0x44,0x62,0xfe,0xb2
.byte 0xfa,0xc3,0x6d,0xa5,0x8b,0x89,0xc5,0x84,0xbe,0x86,0x41,0x0c,0x52,0x0c,0x75,0x71,0xf5,0x74,0xed,0x2c,0x01,0xf2,0x55,0xef,0x85,0x14,0x84,0x3b,0x11,0x38,0xda,0xcd,0x59,0x15,0x80,0xd7,0x61,0xe9,0x89,0x3d,0xeb,0xad,0x43,0x44,0x30,0x14,0xe3,0x4d,0xbd,0xc9,0x80,0xdb,0x2d,0xd7,0x40,0x94,0xc7,0x56,0x35,0x62,0x23,0xfb,0x8f,0xe2
.byte 0x87,0x9c,0xd9,0x07,0xc0,0x7e,0xc7,0x74,0x44,0x1d,0x98,0x3b,0xa1,0xa7,0xd1,0x05,0x66,0x69,0x59,0x58,0xc1,0x55,0x2a,0x6e,0x33,0x31,0xc1,0x3e,0xdf,0x03,0x4c,0x9a,0x9d,0xd1,0xff,0x43,0x6a,0x87,0x92,0xd0,0xdf,0x6b,0x51,0x22,0x68,0xa8,0xda,0xe8,0x8c,0xe0,0xb2,0xdc,0x61,0xdf,0x5d,0x08,0x27,0xe8,0xf9,0xdd,0xe8,0xe7,0xe5,0x2b
.byte 0x89,0xf3,0x03,0x44,0xe4,0x51,0x8b,0x5a,0x23,0xc2,0x3e,0xde,0x1d,0xa7,0x82,0x66,0xd6,0xb7,0xe6,0xa4,0xc8,0x8a,0x65,0x72,0xe8,0x30,0x77,0x55,0x52,0x78,0x1b,0x9d,0x39,0x2b,0xa0,0x27,0x70,0x39,0xff,0x66,0x49,0x43,0x37,0xd1,0xc1,0x1a,0x95,0xc3,0xa3,0x34,0xad,0xe9,0x34,0x08,0x14,0x5d,0x20,0xbc,0x96,0x7b,0x25,0x44,0xc3,0x5f
.byte 0xb8,0x4b,0x82,0x88,0xff,0x9e,0xee,0xec,0x4c,0xd4,0x06,0xb3,0x2f,0xc3,0xe6,0xae,0x0e,0xa8,0xa6,0xb1,0xef,0x16,0xc5,0x82,0x34,0x8e,0x51,0xd1,0xaf,0x9f,0xee,0x33,0x3c,0xa8,0x8c,0x42,0x2f,0xe7,0x40,0x1d,0xbc,0xb7,0x24,0xb0,0xd7,0xa5,0x42,0x7f,0x3f,0x1a,0xe3,0xf8,0x58,0x86,0xe3,0x0b,0x4a,0xe9,0xe3,0x5d,0x09,0x9a,0xb0,0x10
.byte 0x8f,0x00,0xc3,0x5f,0xa2,0xce,0x77,0x01,0x0a,0xae,0x46,0x68,0x65,0xc0,0x2c,0x7e,0x79,0xb1,0x80,0x8a,0x24,0x1a,0x2c,0x34,0xbe,0xa6,0x30,0x41,0xee,0xf5,0xee,0xa0,0xfe,0x47,0x1f,0xf4,0xae,0xd8,0xb3,0xa5,0xdc,0x5a,0xab,0xf6,0xf9,0x64,0xa1,0xe6,0xc2,0x73,0xee,0xf9,0x33,0xdb,0xe4,0xc8,0xa2,0x23,0x48,0x68,0xe2,0x94,0xef,0xc5
.byte 0xe4,0xc7,0x9a,0x18,0x88,0x42,0xed,0xa0,0x2d,0x3d,0x05,0x92,0xe4,0x71,0xf8,0x90,0xd9,0x9e,0xf3,0x74,0x0c,0xa5,0x66,0x4d,0x40,0x8a,0x22,0x8e,0x0d,0x0e,0xfb,0x18,0xc4,0x06,0xed,0x4e,0xcb,0x7b,0xd5,0x6e,0xf0,0xe6,0x0e,0x7e,0x2c,0xe8,0xf1,0xa8,0x41,0x83,0x02,0xf2,0xb2,0xfa,0x5f,0x21,0xb8,0x4e,0x20,0x81,0xbf,0xbe,0x0f,0xd4
.byte 0xc2,0x6e,0x2c,0xfb,0x67,0xcc,0xe7,0x7f,0x24,0x36,0x0e,0xa2,0xf5,0xf5,0x4b,0x80,0xb6,0x7f,0x53,0x09,0x77,0xe1,0x51,0x16,0x92,0xc5,0xa8,0x22,0xa9,0x89,0x11,0xab,0x6b,0x90,0xeb,0x75,0x51,0xe4,0x9d,0x39,0xaa,0xab,0x98,0x21,0x1c,0xa9,0x3a,0x7f,0x04,0x3e,0xfd,0xa6,0xa3,0x91,0xa8,0x51,0xfe,0x30,0x26,0x2e,0x44,0xde,0x5d,0x41
.byte 0x91,0x35,0x65,0x5d,0x17,0x1e,0x71,0xb5,0xc5,0xb9,0x3c,0x3a,0xcc,0x06,0xa2,0x2b,0xef,0x02,0xe4,0x0e,0x42,0x82,0x4d,0x2b,0x91,0x9a,0x38,0x49,0xc6,0xba,0x15,0x08,0x2c,0xe6,0x38,0x10,0x06,0xbe,0x59,0xa0,0xf7,0x78,0xbb,0xc3,0x4c,0x4b,0xe8,0x14,0x0f,0x7d,0x92,0x14,0x34,0x67,0x17,0x37,0x49,0xcf,0xf4,0x77,0xc2,0x41,0x47,0x16
.byte 0x70,0x63,0x38,0x81,0xe0,0x2b,0x8b,0xfe,0x15,0x59,0x0b,0x3f,0xaa,0xf1,0x2d,0x21,0x66,0x85,0x03,0xb7,0x09,0x6f,0x28,0xfa,0xc8,0x09,0x26,0x93,0x0d,0x3b,0xa4,0x96,0xb2,0x87,0x44,0x21,0xb9,0xec,0x30,0xf4,0xb4,0x8a,0x7c,0x84,0x7c,0x47,0xf4,0x01,0x48,0x42,0xa0,0xd0,0xf7,0x52,0xb5,0xdb,0xf9,0x24,0x02,0x7b,0xa8,0x97,0x54,0x89
.byte 0x6a,0x4d,0x5c,0xac,0xfc,0x61,0x69,0x4b,0x79,0x7a,0xae,0x72,0x9f,0x3f,0xea,0x09,0x50,0xd7,0x16,0x1f,0x0d,0x58,0x00,0x02,0x27,0xfd,0x2a,0x52,0x41,0x0d,0x1e,0xf3,0xe3,0x5f,0x93,0x01,0x51,0xc5,0xea,0x11,0x7b,0xd3,0x31,0x8b,0xcc,0x21,0xd7,0x17,0xb4,0x04,0xb8,0x30,0xc0,0xf7,0xf8,0x65,0x23,0x3f,0x8e,0x04,0x62,0x38,0x37,0x09
.byte 0x06,0xde,0xe5,0xfb,0xa5,0x2a,0xc7,0xba,0x52,0x89,0xc6,0x9a,0xb2,0x0c,0xe4,0x89,0x3b,0xe8,0xc2,0x33,0xa4,0x48,0x8d,0x6d,0x35,0x3e,0xbf,0xef,0x15,0x9a,0x05,0x6c,0xdf,0x4f,0xa2,0x96,0xeb,0x75,0xc5,0x26,0x5b,0x9c,0xc8,0x22,0xab,0x8b,0xf9,0xbe,0x2e,0x8e,0x70,0xd2,0x60,0xf6,0x6f,0xa0,0x3f,0x24,0xe4,0x76,0x67,0xa5,0x5d,0x65
.byte 0x9d,0xc7,0x7f,0xab,0x69,0xdd,0xd5,0x5d,0xcc,0xf7,0xab,0x60,0x57,0x18,0x1f,0x1c,0x79,0x2f,0x37,0x44,0x37,0x54,0x13,0xd5,0x7f,0x51,0x5b,0x59,0x1c,0x2b,0x0c,0x43,0xeb,0x05,0x25,0xf4,0xa8,0xbf,0x76,0x7a,0xb4,0xc8,0x54,0x3f,0xe5,0x1b,0xd4,0x85,0x9a,0x6e,0x52,0x49,0x68,0xcd,0x90,0xcc,0xa5,0x36,0x9d,0xa9,0xe8,0x4f,0xc3,0xbd
.byte 0x8a,0x83,0x65,0x57,0xe1,0x5f,0x09,0xdc,0xb3,0x06,0x61,0xe0,0x61,0x34,0xf7,0x72,0xaa,0xb2,0x14,0xfe,0xf7,0xae,0xb4,0x59,0x90,0x83,0x64,0xc0,0x64,0xe5,0x1d,0x35,0x7b,0x40,0xbb,0x20,0xaa,0x63,0xfe,0x7d,0xbb,0xed,0x26,0x93,0x95,0x8a,0x85,0x20,0x98,0x83,0x14,0xec,0xef,0x74,0xb8,0x1e,0x2c,0x6e,0x3d,0x34,0xdc,0x6a,0xd7,0x7f
.byte 0x7b,0xdb,0x57,0x15,0x28,0xb2,0xf3,0xa0,0x6b,0x26,0x5d,0xe6,0xd5,0x0d,0x07,0x4d,0xa6,0xc5,0x9b,0x5e,0xbe,0x48,0x0d,0x99,0x91,0x14,0x41,0x3a,0x4c,0xc9,0xef,0x37,0x6c,0x8f,0x4e,0xdc,0x93,0xae,0xb0,0x80,0x70,0x35,0x5e,0x7c,0xee,0x6e,0xb2,0xab,0xc1,0xed,0x30,0x4f,0x90,0x7b,0xfc,0xa3,0xf5,0x12,0x38,0xbf,0x8f,0x54,0x46,0x6d
.byte 0x13,0xf4,0x7f,0xcb,0x35,0xfd,0xd0,0xbb,0xe4,0x40,0xb2,0x9a,0x2a,0x5a,0x16,0xe0,0xbc,0x77,0x31,0xa0,0x04,0x71,0x6b,0x1a,0x37,0x7c,0xdf,0x68,0x02,0x43,0x73,0x8d,0x53,0xd4,0x58,0x6e,0x05,0x94,0x97,0x45,0xf9,0xb1,0x55,0x7a,0x6a,0x99,0x5c,0x8b,0xb0,0x8e,0x35,0x23,0x5a,0x2d,0xd0,0x3c,0xd1,0x16,0xb6,0x81,0xc3,0x88,0x6b,0x8e
.byte 0x2c,0x08,0xf8,0x90,0x6a,0x40,0x7b,0xf5,0x26,0xaa,0xdc,0xa2,0xdd,0x0f,0x38,0x68,0x0c,0xeb,0xe4,0x50,0xfd,0xc6,0x3a,0xd6,0x2b,0x3d,0x59,0x45,0xfb,0x64,0x5e,0x65,0x81,0x0e,0x66,0xed,0xbc,0x49,0x52,0x14,0x51,0x75,0x8c,0x47,0x88,0x76,0x95,0x0b,0x2e,0x02,0x3d,0xce,0x20,0x83,0x34,0x56,0xfe,0xf8,0x50,0x7d,0x9a,0x93,0xb5,0x0f
.byte 0x88,0x0a,0xea,0x7e,0x50,0x98,0xdf,0x93,0x5d,0xa9,0xba,0x1c,0x6f,0x58,0x8d,0xb0,0x7a,0x37,0x86,0xba,0x49,0x12,0x35,0x99,0x16,0x6a,0x1d,0x02,0x03,0xfc,0xef,0x7a,0x4a,0x8e,0x54,0x7b,0xc4,0xd4,0x6b,0x6c,0xe5,0x7c,0xc0,0xa9,0x20,0x26,0x6f,0x2e,0x71,0xb9,0x6b,0x3e,0x26,0x9e,0x02,0x7a,0xeb,0x87,0x6b,0xf2,0xc1,0x8e,0x8f,0xe8
.byte 0x26,0x23,0x86,0xcd,0xdc,0x8f,0xbd,0xe9,0xeb,0x80,0x7f,0x0d,0xbd,0x8f,0x05,0x3c,0xa7,0xbc,0x0b,0x9c,0x03,0xb7,0x82,0xbd,0xc7,0x7a,0xd5,0x4d,0xb0,0x0d,0xd1,0xac,0xba,0x90,0x3e,0xa1,0xef,0x79,0xfc,0x50,0x7d,0xbf,0x8c,0x52,0x13,0x6c,0x91,0x9e,0xb4,0x2b,0xa8,0x96,0x95,0x04,0xe6,0x2e,0x17,0x43,0x43,0x23,0x91,0x63,0xd4,0x1a
.byte 0xe2,0xb7,0x16,0xdf,0x3a,0x39,0xca,0x80,0x92,0x0a,0x00,0x52,0x50,0x75,0xde,0x1c,0x2e,0x91,0x0a,0xf2,0x28,0xb8,0x94,0x16,0x2b,0x0c,0xc0,0x11,0xc4,0x47,0x35,0x4f,0x59,0x03,0x6f,0xcd,0x99,0x23,0xdc,0x24,0xe5,0x68,0x7f,0x82,0x0c,0x28,0xba,0x57,0xa7,0x7c,0x75,0xd9,0x0d,0x34,0x23,0x7e,0x53,0x61,0xad,0xef,0x63,0xdc,0xa4,0xb0
.byte 0xa0,0xa7,0x54,0xec,0xc9,0xf8,0x80,0x13,0x2c,0xd9,0xc4,0x42,0xec,0xd3,0xd8,0xac,0x04,0xa1,0x61,0x5a,0xdd,0x3e,0xa5,0x29,0x70,0x8f,0xa3,0x44,0x04,0x14,0x7d,0x2b,0x34,0x38,0x89,0x53,0xf4,0x89,0x5a,0x9b,0xa2,0xf5,0x30,0x0b,0x17,0x0a,0xda,0x4e,0x9c,0xca,0xb6,0xa8,0xbb,0x0a,0x1b,0xa0,0x48,0x6d,0x85,0x48,0x70,0x7b,0x98,0xbd
.byte 0x82,0x09,0x1f,0xbf,0xf9,0xe7,0xe7,0x4a,0x9e,0xa6,0x9a,0xf4,0x61,0xd7,0xfa,0x45,0x3e,0xd6,0x29,0xf7,0x4c,0x23,0x32,0x76,0x56,0x2d,0xa7,0x88,0xc5,0x63,0xc0,0x99,0x69,0x85,0x69,0x98,0x1d,0xfb,0x8f,0x5a,0x2c,0x0d,0xd8,0x44,0xae,0x12,0xff,0x28,0xa2,0x12,0x12,0x05,0xe2,0xb9,0x06,0x38,0xfb,0x0b,0x1e,0x5f,0x38,0x04,0x37,0xe6
.byte 0x1b,0x87,0xe2,0xaf,0x7a,0x01,0x34,0x72,0xc0,0xf6,0x36,0x6c,0x62,0x22,0x5f,0xdd,0x22,0xb9,0xef,0x15,0x51,0x76,0xaa,0x18,0xa9,0xba,0xc0,0x4d,0x5b,0x72,0x73,0xcd,0x25,0x79,0xc0,0x81,0xdd,0x38,0xab,0x75,0x9f,0x53,0xe6,0xfd,0xbe,0x94,0x99,0xac,0x93,0xb6,0x85,0x96,0x04,0xc2,0xf2,0x52,0xbc,0x3b,0x47,0x91,0xdd,0xa0,0x36,0xbe
.byte 0x63,0x70,0x72,0x55,0x61,0xc0,0x2c,0x09,0x16,0xa5,0xc9,0xaa,0x1f,0x0e,0x62,0xae,0x3c,0xf0,0xf2,0xa6,0xd2,0xd1,0xaa,0xdb,0xc1,0x75,0xfd,0x55,0x8c,0x99,0xd1,0x07,0xb7,0xd4,0x0e,0x24,0x89,0x0f,0xc8,0x05,0xe4,0x2e,0x20,0x8a,0x56,0x26,0xe0,0x24,0x0f,0xf8,0xc6,0xc5,0x17,0xcc,0xac,0x4e,0xbe,0x03,0x81,0xe2,0xd5,0x9c,0x33,0x5f
.byte 0x86,0xb2,0xc4,0x66,0x08,0x78,0xc2,0x41,0x91,0x1e,0xa2,0x66,0xfb,0x12,0x24,0x41,0x5f,0x34,0x73,0xc7,0x9d,0x4b,0xaa,0x19,0x8e,0x6b,0x42,0x17,0x97,0x96,0xef,0x2b,0xb6,0x33,0xaf,0xe4,0x86,0xd0,0x68,0x57,0xf3,0x75,0x65,0x72,0x90,0x36,0xb0,0x18,0xba,0xcf,0x98,0x25,0xe7,0x81,0x42,0xfc,0x1b,0x6a,0x34,0x08,0xa5,0x41,0xb6,0x22
.byte 0x49,0x27,0x8f,0xd1,0xa1,0xda,0x01,0x88,0x9a,0x0c,0xd7,0x48,0xf4,0xbb,0xa0,0x79,0x91,0x6b,0x41,0x46,0x1c,0x2e,0xc7,0x4f,0x18,0xcc,0x11,0x20,0x84,0xc7,0xfe,0x2c,0x3a,0xf6,0x15,0xdf,0xcd,0x8b,0x69,0xda,0xd0,0xd8,0x2d,0xf6,0x7b,0x82,0x7b,0x65,0xcb,0x6a,0x3d,0x20,0x8b,0x35,0xe5,0x6f,0x69,0xa4,0x8d,0x76,0x96,0xe6,0x70,0x67
.byte 0xa2,0xca,0x56,0x23,0x0e,0x3c,0x62,0x47,0x36,0xb4,0xd5,0x79,0xa4,0x4e,0x35,0xa8,0x1a,0x46,0x7a,0x78,0x6d,0x9a,0xd9,0xbc,0x90,0xff,0xa8,0xb0,0x13,0x1d,0x42,0xb2,0xf2,0xa9,0xc4,0x0c,0x8e,0x16,0x1c,0x60,0xcf,0x3d,0xfe,0x5e,0xbb,0x7c,0xe5,0xd5,0x3c,0xb3,0x32,0x86,0xcb,0xa4,0xff,0xe5,0x9b,0x26,0xf7,0xc2,0x5a,0x3f,0xa0,0x9d
.byte 0x2d,0x2d,0xb5,0x4a,0x08,0x80,0xf4,0x04,0xf8,0x85,0x0c,0xed,0x52,0x75,0xab,0xbb,0x4b,0x16,0xf7,0xa8,0x21,0xa9,0x47,0x80,0x9c,0x54,0xee,0x8f,0x77,0xb1,0x93,0xd4,0x11,0x52,0x3d,0xe7,0xa5,0x30,0x8d,0x9e,0xef,0x82,0x93,0x5e,0x62,0xdb,0x52,0x64,0x8c,0x3a,0x0f,0x9a,0xfa,0x0c,0x9c,0x54,0x5d,0x7c,0xd6,0xc3,0xf6,0xca,0xe6,0x60
.byte 0x15,0xbd,0x97,0xac,0x0e,0x54,0x5e,0x9a,0x2c,0x58,0xd1,0x87,0xcd,0x36,0xef,0x0d,0x87,0xf8,0x57,0x3e,0x95,0x1c,0x9c,0xac,0x76,0xb9,0x63,0x17,0x6a,0x20,0x94,0xcf,0x2b,0xb2,0xa4,0x2c,0x67,0x31,0x92,0x31,0x76,0xc6,0x89,0xbd,0xd6,0xa5,0xd1,0x36,0x42,0xc7,0xb4,0x92,0x83,0xb1,0xb5,0xd8,0xa0,0x77,0xc8,0xd5,0x24,0x57,0x98,0xd8
.byte 0x18,0x9a,0xe5,0x5c,0xfa,0xe0,0x29,0xfe,0x18,0x4d,0x67,0xaf,0x6b,0x51,0xdc,0xaa,0xc5,0x05,0x3d,0xe7,0xda,0x81,0x66,0xc1,0x93,0x78,0x70,0x9a,0x4a,0xbe,0x32,0x0d,0x92,0x28,0x5a,0x1e,0xf3,0x53,0x1c,0x1a,0x5c,0x08,0x42,0xe4,0xc0,0x83,0xb0,0x89,0x19,0xd9,0xeb,0xf8,0xf3,0x60,0x4c,0xce,0x78,0x2d,0x05,0x21,0xd3,0xea,0xdb,0xc4
.byte 0x35,0xcb,0xe7,0x08,0x03,0xec,0x4c,0x32,0xcf,0x51,0xae,0x01,0x47,0xe9,0xaa,0x0d,0x69,0x9a,0xf0,0x5e,0x30,0x78,0xa5,0x49,0xdf,0x1e,0x4c,0xa5,0x86,0xb3,0x8a,0xf4,0x14,0x4a,0x9a,0xf7,0x22,0xd0,0x90,0x1f,0x1f,0xe3,0x57,0x6c,0xdb,0x83,0xea,0x74,0xd6,0xd3,0x62,0x19,0x02,0x93,0x6b,0x32,0x62,0x8b,0xd0,0xa5,0x21,0xaa,0x8f,0x7f
.byte 0x36,0xc4,0x9c,0x1f,0x61,0x3a,0xd8,0xab,0x92,0xd3,0x09,0xe3,0xad,0xcc,0xdc,0x0d,0x04,0xaf,0xa7,0x57,0xff,0x3a,0x5e,0x50,0x7d,0x96,0x6d,0xcf,0x87,0x17,0x0a,0xec,0x70,0x9a,0xb0,0x98,0xa8,0xe4,0xf5,0x32,0x09,0x76,0xf3,0x59,0x50,0x48,0x34,0x25,0x14,0xef,0x85,0x45,0x1e,0xb8,0x1f,0x66,0x6b,0x45,0x6a,0xfa,0xd4,0x48,0xd2,0x59
.byte 0xd7,0x4c,0xf3,0x27,0x43,0x3d,0xf7,0x69,0x7f,0x64,0x8d,0xf3,0x55,0x82,0x05,0x5c,0xef,0x89,0x29,0x2c,0x35,0x22,0x8b,0xce,0x2f,0xcf,0xca,0x55,0x04,0x39,0xa0,0xda,0x37,0x3c,0xdd,0x32,0x99,0x8e,0xc7,0xcc,0x87,0x4a,0x47,0xd8,0xb2,0x9a,0x30,0x43,0x5c,0xe5,0xc7,0x44,0x87,0x9e,0x19,0x29,0xff,0xc8,0xea,0x43,0x87,0xf6,0xf3,0x3b
.byte 0x4e,0x1c,0xff,0xf3,0xd2,0x6b,0x04,0x03,0x52,0x83,0x97,0x59,0x4e,0x57,0x7b,0x8d,0x5d,0x8a,0xa7,0x7c,0xc1,0x88,0x52,0x7c,0x13,0xda,0x7e,0x80,0x64,0x03,0x30,0x83,0xbc,0xd1,0x3e,0x79,0xee,0xd4,0x23,0xc8,0xe5,0x5c,0xf1,0x3b,0xa5,0x1e,0xa4,0x0d,0x20,0x8f,0x8b,0x87,0x18,0x63,0x7e,0x6c,0x17,0x1b,0x01,0x0b,0xd5,0x47,0x89,0x43
.byte 0x84,0x0d,0x2a,0x80,0x1e,0x54,0xab,0x8a,0x0c,0x94,0xa5,0x0b,0x24,0x5e,0xcd,0xde,0x1c,0x00,0x8f,0x2a,0x29,0x01,0xf5,0xcc,0xca,0x54,0xa1,0xce,0x37,0xef,0xe5,0x4e,0x53,0x8e,0xc1,0x13,0x1a,0x75,0xf7,0x8f,0xec,0xf8,0xe9,0x5c,0xc8,0xe6,0x28,0x89,0x6e,0xb8,0x4b,0x39,0x24,0x73,0x28,0x3d,0x56,0xaf,0x8b,0x3b,0x61,0x70,0xae,0x3b
.byte 0xc7,0xe8,0xab,0x47,0xe7,0x16,0xce,0xb8,0xac,0x82,0xac,0x51,0x0b,0x70,0xec,0x6e,0xda,0x0a,0x7e,0x9a,0x6f,0xe1,0xff,0x83,0xb4,0x89,0xec,0x49,0xda,0x48,0xb0,0x3e,0xdb,0x64,0xf6,0x7b,0xc5,0x33,0x02,0x7d,0xae,0x37,0xf1,0x3e,0x03,0x6d,0xf8,0xa3,0x86,0xb3,0xde,0x6a,0x57,0x1b,0xd8,0x85,0xbd,0x9c,0x07,0x84,0xea,0x17,0x4c,0x38
.byte 0x27,0xfe,0x4e,0x2f,0x94,0x09,0xa8,0x7d,0xe0,0x51,0xea,0x6c,0x32,0x2a,0x54,0x2e,0xc1,0xc1,0x21,0x44,0x0b,0x8d,0xc5,0xbd,0x25,0xaf,0xdc,0x45,0x77,0x39,0xbf,0xea,0x60,0x0f,0xb8,0x30,0x74,0xdf,0xd4,0xd6,0x79,0xcf,0x6c,0x2d,0x23,0x21,0xce,0x68,0x16,0x4e,0x9c,0x47,0xc1,0xa7,0x77,0xb8,0x9e,0xe7,0x5c,0x72,0x73,0xab,0xd1,0x56
.byte 0x6e,0x50,0x6d,0xe6,0xd6,0xd3,0x13,0x92,0xed,0x98,0x85,0x4a,0x7d,0xc8,0x9f,0x50,0xb6,0x42,0x9c,0x0a,0x8b,0xc1,0x23,0x46,0x20,0xa9,0xd9,0x20,0x2a,0x38,0x5e,0x39,0xfc,0x46,0x9e,0xbe,0x82,0x5c,0x73,0x33,0x7d,0x8a,0xfd,0x2c,0x1d,0x84,0xa9,0x5e,0x64,0xea,0x3f,0xbf,0x82,0xe4,0xd8,0x70,0xc9,0x7d,0x01,0xca,0x71,0xfb,0x63,0xe8
.byte 0xd8,0x75,0x25,0xd0,0xa3,0x80,0x43,0x8c,0x2a,0x70,0x4f,0x7f,0x04,0x99,0x1d,0xe3,0x73,0x7d,0x6c,0x3f,0xf7,0xf7,0x2f,0xd8,0x0e,0xa4,0x60,0xf6,0x22,0xb1,0xf1,0x2f,0x5a,0x1f,0xd4,0xdb,0xae,0xdb,0x97,0x94,0x16,0xe6,0xd2,0xf2,0xc1,0x9f,0xb8,0xc5,0xb3,0xed,0x41,0x12,0x40,0xe1,0x09,0xaf,0xe3,0x52,0x97,0x63,0xa3,0x41,0x63,0x93
.byte 0x6f,0x6e,0x07,0xa7,0x92,0xa9,0x94,0x60,0x38,0x60,0x1e,0xff,0x05,0x0c,0xed,0xdc,0x78,0xfb,0x6e,0xa4,0x08,0x21,0x31,0xaa,0xf9,0x6f,0xed,0xaf,0xc6,0x5d,0xfe,0xbe,0xab,0x76,0x4f,0x78,0xb9,0xaa,0x21,0x4d,0xdd,0xb2,0x14,0xf5,0x32,0x03,0xa2,0x6e,0x57,0xc6,0x54,0x65,0x81,0x1f,0xdc,0x1a,0xc5,0xba,0xee,0x26,0xa2,0x90,0xc8,0xb6
.byte 0x47,0xc6,0xbb,0x9a,0xaa,0x19,0x72,0x8d,0x19,0xbc,0x21,0xe5,0x93,0x58,0xf8,0x1f,0x00,0x28,0x6f,0x66,0x45,0x5e,0x02,0xeb,0x44,0x69,0x87,0xd1,0x1b,0x73,0xb7,0xc7,0xc8,0xf6,0x20,0x30,0x85,0x77,0xc3,0x2d,0x0e,0x55,0x7d,0x80,0x14,0x50,0xff,0x5e,0x79,0x6b,0x1f,0xff,0x76,0x33,0x7d,0x7d,0x34,0x01,0xaf,0xfb,0x73,0x8a,0x89,0x6d
.byte 0x2f,0x0b,0xdb,0xc3,0xea,0x17,0x94,0x06,0x59,0x2e,0x0f,0x34,0x1c,0x75,0x42,0x42,0x83,0xb0,0x18,0xe5,0x6e,0x3c,0x22,0x59,0xce,0x45,0xb8,0x77,0x99,0x92,0x55,0x34,0x45,0x2e,0x04,0x1f,0xd4,0x4f,0x03,0x64,0x92,0x99,0x9c,0x8b,0xd8,0xd7,0x36,0x7c,0xdb,0x2a,0x30,0xb6,0x17,0xba,0x85,0x9d,0x1b,0xc4,0xc7,0x13,0x76,0xe4,0x0b,0xe6
.byte 0x28,0x8a,0x3a,0x7f,0x96,0x27,0x1c,0xea,0x9e,0x06,0x29,0xe2,0x88,0x22,0xd4,0xda,0x0e,0x19,0x3e,0x42,0xea,0x55,0xf3,0x4d,0x3e,0xf6,0x0b,0xcd,0x05,0x0c,0x5d,0x8a,0x46,0x3e,0x7a,0x3c,0x95,0x55,0x42,0x83,0x32,0x4c,0x5f,0x91,0x4e,0x7d,0x0a,0x8a,0x90,0xbe,0x7d,0x01,0xd7,0x4f,0x21,0xe9,0x24,0x25,0xd3,0x76,0xe8,0x54,0x97,0x44
.byte 0xdc,0x7e,0x89,0xe5,0x74,0xc4,0xfe,0x41,0x39,0x95,0x81,0x7e,0x3f,0x4c,0xca,0x84,0x7a,0xb8,0x24,0x3d,0x3c,0x86,0xa1,0x49,0x4c,0xec,0x55,0x59,0x11,0x7d,0x1a,0x2e,0xa3,0x36,0x70,0x36,0x9c,0x69,0x47,0x96,0xc1,0x85,0xb0,0xc5,0x9f,0x85,0x1a,0x5a,0x4e,0x77,0x64,0x91,0x73,0x19,0x41,0x59,0x6a,0xb6,0xae,0x37,0x65,0xa2,0x7d,0x2f
.byte 0xef,0x24,0xab,0x48,0xbc,0x20,0x4c,0x57,0x49,0x08,0xc6,0x2f,0x26,0x8c,0xb5,0xa0,0x55,0xf6,0x95,0xfc,0x14,0xb2,0xa3,0x28,0xf1,0x98,0x24,0x67,0xeb,0x7d,0x49,0x6d,0xf2,0x63,0x16,0x99,0xb3,0x67,0xdd,0xd2,0x7e,0xaf,0xcb,0x6c,0x76,0xcd,0x05,0xc8,0x8b,0xec,0x56,0x7d,0x00,0xf9,0x89,0x64,0x15,0xbb,0xa2,0xb8,0x8b,0xdb,0xd2,0x86
.byte 0xaf,0xf7,0x85,0x0a,0x50,0x4c,0xca,0x65,0xc3,0x31,0xca,0xdc,0x81,0xea,0xd3,0x89,0xd8,0xb3,0x91,0x90,0x8c,0x7b,0xff,0x20,0x62,0xac,0xad,0x06,0x47,0xdd,0x22,0xa5,0xb9,0xd0,0x4f,0xee,0x30,0x69,0x51,0x7d,0x7d,0x32,0x4f,0xbb,0x03,0x43,0xec,0x39,0xac,0x8e,0xab,0xcf,0xc2,0x72,0x67,0x68,0x84,0x61,0x3b,0x4d,0x77,0x6b,0xab,0xe9
.byte 0x04,0x9c,0x82,0x46,0xef,0x58,0x92,0x94,0x6c,0x33,0xfa,0x61,0x61,0x15,0xb2,0x4d,0xfc,0x49,0x91,0xad,0x67,0xb2,0x6a,0xa9,0x0c,0x06,0x20,0xc7,0x5e,0xc0,0xd3,0xb0,0x20,0x36,0xd7,0x76,0x7d,0x3c,0x1b,0x6a,0xfa,0xab,0x2d,0xb7,0x1f,0xad,0xb9,0x43,0x45,0x48,0x2b,0x09,0x29,0x80,0x14,0x2d,0x17,0x42,0x4e,0x1d,0x53,0x57,0x67,0xe3
.byte 0xca,0xc7,0x92,0xd1,0x4d,0x07,0xac,0xcf,0x08,0x0e,0xd1,0xd2,0xd5,0xbf,0x18,0x01,0xd2,0x2f,0x79,0x3b,0xd2,0x51,0x7a,0xdc,0x69,0x40,0x51,0x3e,0x57,0xa2,0x3c,0x5f,0x55,0x9b,0xfc,0x0e,0x45,0x96,0xa3,0x8f,0xa2,0x3d,0x64,0x40,0x12,0x07,0x7e,0x0b,0x1d,0x33,0x4f,0xd8,0xd0,0x93,0x8c,0xd9,0x2e,0xd4,0xa9,0xb4,0x08,0x28,0x21,0x52
.byte 0xda,0xd4,0x86,0x19,0x3b,0x71,0xe4,0x37,0x22,0x5b,0x2a,0x8f,0x83,0x9f,0xd6,0x42,0x85,0xc9,0x30,0x4c,0x5d,0xe4,0x14,0xa9,0xec,0x19,0x8e,0x0a,0x0a,0x29,0xe0,0x00,0x23,0x0b,0xbd,0xc2,0xd4,0xe8,0x6a,0xcb,0xf8,0xdf,0xd0,0x50,0x69,0x0d,0x40,0xe9,0x69,0x31,0xfb,0x64,0x4a,0x6b,0x47,0xba,0x24,0x46,0xf1,0x29,0x80,0x0b,0x75,0x92
.byte 0x4e,0x9c,0x59,0xd5,0xf4,0x49,0x32,0x5f,0x92,0xdb,0x1e,0x76,0xa9,0x35,0xe3,0x94,0xcf,0xe8,0x1d,0x47,0x6f,0x82,0xe8,0x75,0xaa,0x41,0xd2,0xa0,0x26,0xfc,0x9d,0x0c,0x02,0x93,0xd5,0xd1,0x14,0x96,0x7c,0xa5,0x9d,0x44,0xec,0x8d,0xa6,0x02,0x17,0x12,0x32,0xb9,0xe4,0x8a,0x91,0xfd,0x23,0xc3,0x64,0x13,0xcd,0x57,0x84,0x8e,0x81,0xb5
.byte 0xa0,0x36,0x22,0x88,0xc0,0x45,0xe5,0xbf,0xb2,0xa6,0xe6,0xa8,0x1c,0xe8,0x8b,0xc8,0x55,0x7f,0xbe,0x45,0x17,0x76,0xe3,0x87,0x67,0x3a,0xd6,0xa0,0x62,0xc1,0x54,0xef,0xaa,0x53,0xd0,0x6d,0x6c,0x33,0xdf,0x7f,0x03,0xa5,0xa3,0x36,0x7d,0xab,0x55,0xbf,0x04,0x43,0xa5,0x59,0xcc,0x6f,0x1c,0xaf,0xfc,0x0e,0x46,0x7f,0x23,0xda,0x89,0xf7
.byte 0x4d,0xe7,0xfe,0x1e,0xb4,0x08,0x7a,0xea,0x61,0xf5,0xcd,0x1f,0xee,0x70,0xe2,0xfb,0xb1,0xe3,0xb1,0x57,0x65,0x29,0xa0,0xa9,0x11,0x20,0xba,0x29,0x2c,0x68,0x37,0x38,0x07,0x9b,0x58,0x20,0x81,0x4e,0x3c,0x07,0x91,0x93,0xf7,0x1c,0x28,0x59,0x72,0x55,0x50,0xe1,0x23,0xca,0x28,0x32,0xa4,0x5b,0xdf,0xc7,0xd2,0x6b,0x3e,0xdc,0x21,0xec
.byte 0xe3,0xb7,0xae,0x10,0x4d,0x86,0xa9,0xc7,0x43,0xc2,0x84,0xd8,0xb8,0x5e,0x2c,0x4b,0xf3,0xad,0x4f,0xd0,0x1e,0xe9,0xdd,0x4c,0xcc,0x7a,0x02,0xc2,0x43,0xd0,0x32,0x80,0xc5,0x97,0x05,0xaa,0xef,0x67,0xe2,0xde,0xaf,0xf4,0x41,0xa1,0x98,0xc6,0xe6,0xb6,0x03,0x06,0xec,0x56,0xe7,0x90,0x5e,0xba,0x67,0x4b,0xa1,0x52,0xb4,0xfd,0xa0,0x32
.byte 0x19,0xb5,0x1c,0x8f,0x11,0xc7,0xa7,0xb6,0xa3,0x29,0x83,0x94,0x8f,0x41,0x6b,0xc2,0x60,0xa0,0x3d,0x61,0xe2,0x51,0x2d,0x1f,0xe3,0xa6,0x71,0x72,0x1b,0x3e,0x5b,0xdd,0x0f,0xc4,0xfc,0x3c,0xc1,0xfd,0x2b,0x7b,0x30,0x5c,0x73,0x95,0x53,0x12,0x68,0x22,0x4e,0x71,0xbf,0xbe,0x87,0x67,0xe0,0xc8,0x5d,0x7b,0xd3,0x3b,0xba,0x2a,0xd5,0x5c
.byte 0x61,0x92,0x04,0xd2,0x64,0x5b,0xd0,0x04,0x99,0xe3,0x38,0x0a,0x27,0x7b,0xe0,0xf0,0x04,0xa5,0x15,0x8b,0x4b,0x0e,0x20,0x6e,0x22,0x22,0xa6,0x02,0xf2,0x40,0x74,0x6e,0xce,0x8f,0x56,0x42,0xbc,0xd3,0x55,0x9b,0xbb,0xa2,0x8e,0x26,0x84,0xda,0xea,0xf9,0xf6,0xb1,0x1c,0x93,0xe5,0x65,0xb6,0x0c,0x69,0x28,0x83,0x58,0x05,0xc7,0x44,0x66
.byte 0xbc,0x84,0x2a,0xc4,0x8c,0x78,0x80,0xa2,0x62,0x75,0x25,0x32,0x44,0xb8,0xd0,0x5e,0x76,0xc0,0x70,0x3d,0x18,0xb3,0x5c,0xe1,0x18,0xf6,0x08,0xef,0x13,0x97,0x02,0x6a,0x4c,0xac,0x86,0x57,0x0b,0xf2,0x7a,0xdb,0xc0,0xf5,0xf0,0xa1,0xfd,0x48,0x96,0x85,0xac,0x66,0x2d,0x49,0xeb,0x1c,0x56,0x46,0x2f,0x4b,0x01,0x98,0x1e,0xbc,0x74,0x57
.byte 0x6e,0x2e,0x11,0x9a,0xa5,0x94,0x8f,0x02,0x89,0x21,0x52,0x73,0x9a,0x8d,0x0e,0xba,0x7c,0x7c,0x2a,0xbe,0x84,0x36,0x3d,0x4a,0x14,0xb3,0x63,0x71,0x66,0xb6,0xf6,0x1f,0x95,0x73,0xe2,0x4b,0xa9,0xdb,0xe3,0x91,0x06,0xc3,0xfe,0x42,0xa5,0xae,0x60,0x6b,0x59,0xf5,0x25,0x77,0xc1,0x27,0xc0,0xbf,0x48,0xc4,0xe5,0x48,0x44,0xee,0xd4,0x51
.byte 0x25,0x56,0xf8,0x55,0x6a,0x8f,0x73,0xd4,0x9d,0xa1,0x12,0xfc,0x4e,0xb4,0x22,0x07,0x7c,0x90,0xa6,0x47,0x14,0xd0,0x42,0xec,0x74,0xb8,0xed,0x10,0xaf,0x85,0xb5,0x73,0xa2,0x70,0x97,0xee,0xfe,0xdd,0x49,0x65,0x62,0x8e,0x83,0x61,0xc7,0x37,0x79,0x84,0xa7,0x1f,0x2b,0xec,0x86,0x53,0xf0,0x78,0x06,0x96,0x42,0xb1,0xf8,0x07,0xf7,0x78
.byte 0x8b,0x75,0x35,0x59,0xce,0xaf,0x89,0x47,0x3c,0x64,0xae,0xda,0x35,0x53,0xe2,0x73,0x0f,0x58,0x92,0x74,0x08,0x3e,0xfb,0x07,0xad,0x41,0xeb,0x47,0xc7,0x64,0xf7,0x62,0x52,0x34,0x36,0x23,0xba,0x2f,0x3d,0x57,0xf4,0x4b,0xad,0xb6,0x3a,0x94,0x9c,0x31,0x07,0xf4,0x1d,0xd7,0xf1,0x6e,0xbb,0x9c,0x42,0x4b,0x7a,0x87,0x10,0xe8,0x9b,0xdb
.byte 0x8b,0x7b,0x8b,0x16,0xd4,0x4c,0x5b,0xcb,0xe6,0x7e,0x0f,0xe1,0x64,0x14,0xc0,0xef,0x63,0x7c,0x71,0x92,0xc4,0x4f,0xd4,0x11,0x0e,0x26,0x08,0xb0,0xe9,0xdc,0xb6,0x75,0xe7,0x97,0xde,0x0e,0xed,0xe5,0x87,0xfb,0x59,0xeb,0x5c,0x70,0x02,0xad,0xfb,0x00,0x17,0x32,0x0d,0x15,0xfd,0xce,0xfe,0xa3,0x11,0x2f,0xf4,0xd1,0xbe,0xbf,0xee,0x50
.byte 0xd7,0xaf,0x4c,0xe8,0x0f,0x2a,0xfd,0x59,0x5f,0x23,0xe3,0x8c,0x49,0x60,0xa4,0xe0,0x80,0x1a,0x2f,0xc0,0x38,0xb3,0x1b,0x3f,0xa5,0xc6,0xa4,0xb6,0x53,0x3b,0xe2,0xb0,0xc2,0x55,0xba,0x84,0xa2,0xe3,0x6e,0x16,0x6b,0x2f,0x11,0xea,0xdd,0x52,0x77,0xd7,0x25,0xfa,0x12,0x36,0xd5,0x72,0x94,0x5a,0xc0,0x56,0xdf,0xd3,0xef,0x77,0x2a,0x2f
.byte 0x87,0x02,0x06,0x9a,0x00,0x7e,0x80,0xf2,0x90,0xea,0xfd,0x93,0x6e,0x0c,0x0d,0xbd,0xe5,0x9d,0x8c,0x4e,0xdf,0x9c,0x87,0x89,0xf9,0xde,0xff,0xc4,0x49,0xc9,0xb6,0x3c,0xe1,0xcd,0xce,0xfb,0x59,0xd0,0x5a,0x97,0x67,0x62,0x63,0x19,0xcc,0x54,0x3c,0xf4,0x97,0x4e,0x77,0xb3,0xbc,0x42,0x15,0x95,0x27,0x54,0x41,0xad,0x21,0x25,0xc7,0x36
.byte 0x07,0x58,0xa5,0xca,0x7c,0x27,0xa5,0x6a,0xc1,0x90,0xcc,0x06,0x39,0x10,0x1b,0x20,0x46,0x55,0xd6,0x3a,0xe7,0xec,0x6b,0xba,0x7f,0x99,0x8b,0xd3,0xab,0xaa,0x1a,0x4e,0x7c,0x5e,0x01,0x8e,0xa4,0x99,0x0b,0x41,0x22,0x1a,0x3a,0xeb,0x3b,0xe6,0xfb,0x0b,0x9c,0x65,0xe1,0xcb,0x61,0xf1,0xb0,0x18,0xee,0x52,0xb5,0xbb,0x46,0xf4,0xca,0xae
.byte 0xe9,0xa0,0xe3,0xe9,0xea,0x84,0x88,0x95,0x6d,0xd2,0xe9,0x82,0x0f,0x40,0x5f,0xeb,0xcb,0x51,0x34,0xf1,0x5c,0x1b,0xac,0x75,0xc3,0x0f,0x14,0x6b,0xc9,0xb3,0xa2,0x40,0xbb,0x0e,0x71,0x3b,0x7a,0xee,0xe8,0x25,0xf5,0x64,0xa0,0x3a,0x94,0xeb,0xfb,0x4d,0x9c,0x72,0xbb,0x85,0x22,0x44,0x53,0x19,0x0e,0xc7,0x68,0xa6,0x12,0x6d,0xaf,0xd7
.byte 0x13,0x0d,0x02,0xd9,0xe8,0xd4,0x8c,0xc2,0x83,0x5b,0x68,0x42,0xbc,0x22,0x9a,0x2b,0x2a,0x4f,0x3e,0x1c,0x52,0x21,0x14,0x58,0x75,0x1e,0x31,0xcf,0xac,0xaa,0xa3,0xd7,0x31,0x0e,0x73,0x79,0x31,0xf6,0xbe,0x3d,0xe2,0x27,0x23,0x58,0xda,0xc2,0xb5,0xce,0xd8,0x91,0x76,0x97,0x3c,0x64,0x4b,0x95,0xce,0x93,0x52,0x32,0xfe,0x33,0x3b,0xef
.byte 0xa4,0xed,0xdf,0x81,0x18,0xc7,0x08,0x51,0x81,0xf2,0xfb,0xf8,0x2d,0xcf,0x69,0x21,0x05,0x15,0xed,0x9d,0xf7,0x87,0x64,0xeb,0x9b,0x0b,0x2c,0x9b,0xf3,0xbf,0x32,0x21,0x27,0x38,0x20,0xc3,0x5f,0xb8,0xfe,0x17,0xf5,0x8f,0x3f,0xac,0xda,0x49,0x3d,0x54,0x14,0x9e,0xd5,0x89,0xdb,0x20,0xda,0x43,0x67,0x84,0x4b,0xb7,0x11,0xd3,0x08,0x2f
.byte 0x56,0x8f,0x95,0x79,0x82,0x28,0xec,0x45,0x3c,0xc5,0xa7,0xd7,0xad,0xaa,0x82,0xda,0x87,0xb3,0x32,0x3e,0x27,0xf4,0x3d,0x27,0xcf,0x2d,0x04,0x00,0x22,0x13,0x36,0x57,0x8c,0x84,0x10,0x4a,0x7c,0xbb,0x57,0x13,0x1f,0x4d,0x64,0x60,0x14,0x64,0x85,0x9a,0x05,0x46,0xfc,0x10,0x6f,0x67,0x82,0x5a,0xb9,0x65,0xd5,0x00,0xfa,0x07,0xb3,0x70
.byte 0x18,0x94,0x3a,0x4f,0xef,0x6e,0x4d,0x13,0xf3,0x63,0x5a,0xa1,0xe1,0x19,0xbf,0xc0,0x2e,0xf5,0x1f,0x53,0x7c,0x33,0xc3,0x5b,0xab,0xbd,0xdf,0x90,0xca,0x2d,0x20,0xb4,0x4e,0x6a,0xea,0xa5,0xad,0x62,0x20,0x8a,0xbf,0xf4,0xc4,0x90,0x5b,0xa8,0xe5,0xea,0xe9,0x53,0x42,0x33,0x29,0xce,0x46,0x69,0x4f,0x58,0x18,0xab,0x15,0xc2,0x5f,0x50
.byte 0x6f,0x31,0xcf,0x09,0x23,0x2e,0xf5,0x29,0xef,0xad,0xcb,0x36,0x7c,0xf1,0x5d,0x0c,0xf6,0xfc,0xfb,0x17,0x08,0x31,0xa7,0xa9,0xc9,0x56,0x51,0xcf,0x27,0xea,0x25,0x15,0x89,0xe1,0xe4,0x1c,0x18,0x30,0x4c,0xd4,0x2a,0x0e,0x68,0xd6,0x07,0x19,0x51,0x95,0xdd,0x70,0x60,0x98,0x1d,0x21,0xab,0x59,0x36,0xb3,0x2c,0xc2,0xbf,0xdb,0x79,0xbe
.byte 0xd6,0x32,0xff,0x86,0xa0,0xfc,0xa9,0x7a,0xb7,0x08,0x40,0xb8,0x6d,0x44,0x78,0xe6,0xae,0x52,0x3d,0x60,0x48,0x0c,0xd3,0x72,0x30,0x1c,0x51,0x1e,0x5f,0x1d,0x34,0x7c,0xfb,0x08,0x04,0x1d,0xcc,0x6e,0xec,0x67,0xd8,0x65,0xae,0x63,0xba,0x7b,0xeb,0xd6,0x15,0xbe,0x69,0x41,0xdc,0x67,0x09,0x20,0x6e,0xa5,0x19,0xc7,0xc2,0xd2,0x12,0x74
.byte 0x1e,0x27,0xed,0xc4,0x61,0x23,0xcc,0xb8,0xc0,0x1c,0xb9,0xb2,0xc4,0x4c,0x9b,0x04,0x4b,0x41,0x63,0x2a,0x04,0xef,0xe9,0x12,0x14,0x9f,0xbf,0x36,0x0f,0x73,0x68,0x14,0xdb,0x12,0x5c,0x27,0xcc,0xd3,0xb4,0x2a,0xa9,0x45,0xeb,0x7e,0x72,0xab,0x22,0x23,0x0f,0xa2,0x7c,0x67,0xa6,0x3e,0x74,0xb6,0x84,0xb0,0xab,0x65,0xe2,0x4e,0x31,0x5a
.byte 0xec,0x30,0x52,0x94,0x58,0x08,0x26,0x1f,0x7a,0x3c,0xed,0x38,0xcb,0x2d,0x3d,0x13,0xab,0x2c,0x37,0xb5,0x68,0x5a,0xb5,0x35,0xb6,0xc6,0xa5,0x20,0xdb,0x2f,0x66,0xb4,0xf3,0xae,0x3a,0xf8,0x22,0x86,0x6b,0x09,0x98,0xce,0x8f,0x2b,0x9c,0x1a,0xa2,0x47,0x05,0xbb,0xf1,0xf5,0x2d,0x5c,0xfb,0xc4,0x6e,0xeb,0x1f,0x4c,0x40,0x3d,0x97,0x1d
.byte 0x86,0xf0,0xf8,0x17,0xd6,0xd9,0x3f,0x65,0x33,0x30,0x85,0x37,0x5a,0xf6,0x7d,0x39,0xac,0x87,0x99,0xeb,0x76,0xcc,0x79,0xe2,0xda,0xe9,0xc4,0x62,0x4d,0x4a,0xbf,0x67,0x22,0x10,0x91,0xbe,0x25,0x8f,0xd7,0x28,0x75,0xbc,0x52,0x2c,0x66,0x3e,0xc0,0x35,0x4c,0x02,0x37,0x96,0x6b,0x90,0x00,0xaf,0x23,0x49,0x90,0x4d,0x97,0x90,0x9f,0x06
.byte 0xde,0x9b,0x63,0x57,0x88,0x33,0x40,0xd5,0xd7,0xcc,0xf2,0xa8,0x9e,0x5f,0x40,0xb6,0x17,0xae,0xe5,0xda,0x4c,0x2f,0x9d,0xc7,0xfd,0x1a,0x62,0x8e,0x99,0x8e,0x47,0x96,0x31,0xc1,0xb9,0x72,0x73,0xd4,0x7f,0x31,0xa3,0xfb,0x67,0xed,0x3c,0x44,0x9b,0x9c,0x21,0x4b,0xaf,0x91,0x80,0xfc,0x8f,0x4a,0x6c,0x83,0x4f,0xb3,0xb0,0x2f,0x5c,0xee
.byte 0xeb,0x9b,0x8d,0xb0,0x18,0x46,0xcb,0xfc,0x0a,0x46,0x4a,0xe5,0x88,0xb0,0x08,0x75,0x78,0x61,0x2f,0x1a,0x26,0x70,0x43,0xcf,0x5a,0xbb,0xb4,0x1a,0x65,0x19,0xbb,0xe7,0xe1,0x23,0xd3,0x39,0x79,0x76,0xb7,0x1c,0xe2,0x05,0x90,0x43,0x8c,0xb6,0xa0,0xca,0x05,0x28,0xa5,0xd7,0x42,0x02,0x2f,0x2c,0xc1,0x6c,0x29,0xaf,0xfe,0x68,0x71,0x82
.byte 0x43,0x9d,0x55,0xd6,0x6e,0x49,0xdb,0xf0,0x3c,0x7b,0x10,0x22,0x77,0x16,0xe7,0x75,0xe8,0x54,0x47,0x49,0xae,0x3b,0x4b,0xc8,0x97,0xa4,0xf2,0x63,0xff,0x2a,0xd1,0x01,0x18,0x24,0x13,0x18,0x27,0x02,0xfd,0xe2,0xf5,0xc7,0x21,0xb8,0x15,0x45,0x9a,0xb5,0x82,0xd6,0xde,0x08,0x44,0x4c,0xb2,0x4f,0xa0,0xd6,0x4f,0x84,0x04,0x83,0xe1,0xf5
.byte 0xce,0xa5,0x6f,0xa8,0x24,0x91,0xf6,0x52,0x8b,0x5e,0x2f,0x66,0x58,0x74,0xbc,0xd3,0x91,0xe7,0x25,0x2d,0x2d,0x69,0xf3,0x6a,0xe9,0x96,0x18,0x64,0x59,0x7b,0x62,0x13,0x4b,0x3e,0x15,0xbd,0xe0,0xff,0xe3,0xa9,0x70,0x9a,0xba,0xcd,0x90,0xcd,0xf0,0x89,0x2b,0xa6,0x38,0x7b,0xe1,0x67,0x89,0x85,0x0c,0x2e,0x16,0xea,0x97,0x2d,0x6e,0x6f
.byte 0x1f,0x9c,0x0a,0xf3,0xe5,0x95,0x03,0xc2,0xe4,0x84,0xc8,0x0d,0x08,0xb7,0x59,0x25,0x5b,0x77,0x7f,0x7c,0x43,0x16,0xb7,0x27,0x38,0xf1,0x71,0x50,0x0d,0xed,0xa8,0xc6,0x27,0x36,0xf1,0xaa,0xa6,0x43,0x3f,0x1f,0xc1,0xa2,0xc5,0x23,0x46,0xf8,0x9c,0xe5,0x5f,0xb9,0x25,0x3b,0x71,0xb3,0xe2,0xc7,0xa5,0x7e,0x30,0xc5,0xe9,0x3b,0x4e,0xa1
.byte 0xd6,0x33,0x3c,0x8b,0xb9,0x08,0x93,0x3c,0xc5,0x4c,0x7c,0x7c,0x8b,0xe9,0xa7,0x46,0xa8,0x9e,0x97,0xc5,0x71,0x7e,0x81,0xa6,0x22,0x49,0xb0,0x25,0xa8,0x74,0xba,0x7b,0xce,0xf8,0xd6,0xe8,0xf1,0xa1,0x0f,0x03,0xe6,0x8a,0x30,0x02,0xba,0xde,0xaa,0x16,0x0d,0x7a,0x4a,0x86,0xf8,0xd0,0x80,0xf6,0xde,0x9e,0x70,0xe2,0xa9,0x7c,0x98,0xde
.byte 0x6b,0x8b,0x04,0xa3,0xb4,0xa9,0xfb,0x15,0x5e,0x40,0x92,0xa0,0xb7,0x36,0xab,0x8d,0x02,0xb0,0x95,0x4c,0x3f,0x5d,0xa6,0x17,0xd3,0x98,0x41,0xe0,0xfb,0xf2,0x49,0x3b,0xf6,0xb5,0xfe,0xc7,0x8d,0x77,0xa7,0x1e,0xcb,0x10,0x32,0xf0,0x55,0x7e,0x44,0x6e,0xa8,0xc6,0x2c,0x52,0x09,0xda,0xe6,0x02,0x7c,0xc2,0xfe,0xe7,0x05,0xc8,0x37,0xc4
.byte 0x90,0x5a,0xed,0x54,0xaa,0x29,0xbd,0x3c,0x22,0x34,0xd7,0x41,0x5b,0xf5,0x89,0x1e,0x22,0x87,0xc3,0x51,0x90,0xc4,0xe5,0x77,0x41,0x6b,0xcc,0x23,0x61,0x6c,0x89,0x55,0x79,0x15,0xdc,0x3b,0x3f,0x52,0x2f,0x67,0x8c,0x0f,0x56,0xbb,0x8b,0x06,0x72,0x62,0x76,0xf7,0xa2,0xe2,0x00,0x70,0x78,0x3f,0x52,0xc5,0xcb,0x10,0x22,0x59,0x44,0x81
.byte 0x5d,0x05,0xd2,0x92,0x72,0x6e,0x8b,0x3e,0x52,0x54,0x06,0x5b,0x51,0x55,0x08,0x81,0x5a,0x1c,0x82,0x86,0x30,0x7c,0x0e,0x66,0xdd,0x17,0xad,0x1f,0x54,0x85,0xd6,0x4f,0x9b,0x4d,0x49,0x42,0xdf,0x6c,0xa1,0x6a,0x18,0x00,0x38,0xb6,0xf7,0x8d,0xbb,0xce,0x7a,0xbb,0xcb,0x59,0x03,0x2d,0x7e,0x56,0x33,0x54,0x5f,0x46,0x7a,0xba,0x24,0x17
.byte 0x22,0x3b,0xb4,0x86,0x1d,0xa7,0x92,0xea,0x85,0x99,0x67,0x85,0x9a,0x45,0x53,0xce,0x9f,0x44,0xea,0xb2,0xac,0x24,0x8e,0x0c,0x0b,0x8c,0x21,0x00,0xe8,0xd5,0x08,0xe3,0xbe,0x1a,0xd5,0x3e,0xaa,0x62,0xf0,0xcd,0x5f,0xae,0x5b,0xef,0x89,0xf0,0xc0,0x48,0xa4,0xdc,0xd4,0x60,0xd3,0xd5,0x05,0x42,0x7f,0xb1,0xec,0x1d,0x62,0x0e,0xe8,0xe4
.byte 0x4d,0x20,0x9e,0x25,0xc0,0xa5,0x7c,0xe4,0x5f,0xf7,0xfa,0xf1,0x50,0x3b,0x39,0x62,0x10,0x09,0x46,0x24,0x47,0x49,0x75,0xf7,0xae,0x2b,0x2c,0x79,0x23,0xfe,0xcd,0x81,0xdf,0x0b,0x94,0xe3,0x4d,0x2e,0xe8,0x4a,0x87,0x70,0xec,0xfe,0xa8,0xda,0x06,0x86,0x62,0x30,0x00,0x0c,0x76,0xa4,0xd1,0x48,0x6d,0xdb,0xa6,0xb5,0x65,0x35,0xcd,0xa2
.byte 0xd7,0x95,0x9b,0x0e,0x3e,0x7d,0xe6,0xd3,0x3a,0x6b,0x26,0x9a,0x50,0xd6,0x12,0xe5,0x76,0xff,0xa6,0xfd,0xbf,0xb7,0xba,0xee,0x42,0x09,0xa4,0x2b,0x10,0x64,0xab,0x43,0xaa,0xe0,0x1d,0xe5,0x35,0xf4,0xc7,0xa3,0xb0,0xc4,0x1a,0xd3,0x8b,0x03,0x9f,0xd0,0x2b,0xa5,0x26,0x70,0x92,0x0d,0xe5,0x3b,0xb8,0x62,0x6b,0x4a,0xc5,0x93,0x6b,0xc8
.byte 0xbe,0x66,0x51,0x0b,0x56,0xed,0xee,0x6c,0xf1,0xf3,0x05,0xc1,0x7a,0xae,0xf6,0x26,0xe5,0x4d,0x1e,0x0b,0xf9,0x29,0xc4,0xd7,0x80,0x75,0x3f,0x5c,0x60,0xa6,0x06,0x09,0x58,0x4b,0xfd,0xa3,0xc2,0x76,0xd8,0x43,0x66,0x04,0xdd,0x84,0x9f,0x5e,0x15,0x87,0xe8,0xf7,0xa4,0x56,0xf4,0x81,0x88,0x98,0x26,0xa4,0x24,0x3c,0xfb,0x7e,0xb6,0xbf
.byte 0xe8,0x0f,0x12,0x31,0xe5,0x84,0xa9,0x3b,0x73,0x48,0x03,0x7c,0x0b,0x8c,0x52,0x2d,0x6c,0xa3,0x66,0x1e,0x00,0xc7,0x1d,0xe2,0x41,0x68,0x04,0x0a,0x66,0x13,0xe9,0x17,0xca,0x16,0x79,0x44,0x17,0xaf,0x41,0x0e,0x50,0x4f,0x1f,0x28,0x3e,0x68,0x80,0xb1,0x62,0x20,0x9e,0x1c,0xaa,0x18,0xa8,0x1d,0x09,0xed,0xe2,0x97,0xc2,0x9c,0xec,0x99
.byte 0xd6,0x12,0xde,0xd1,0x48,0x9c,0x1e,0xdf,0x0c,0xb5,0x6c,0x17,0x3d,0x59,0xe6,0xfc,0xe6,0xd5,0x1a,0x70,0x66,0x49,0xf5,0x09,0x30,0x11,0x5b,0x5d,0x1a,0xeb,0xc7,0xf8,0xe5,0x44,0xf5,0x3f,0x93,0xde,0xf5,0x2a,0x00,0x72,0x19,0xae,0xde,0xe9,0x7f,0xc7,0x30,0x9c,0x95,0x17,0x33,0xca,0x2c,0xd5,0x75,0xcf,0xb7,0x1b,0xd0,0x4d,0x58,0x1e
.byte 0x07,0x23,0xa8,0x8d,0x63,0x9d,0x95,0x92,0x8b,0xbd,0x77,0xe3,0xa0,0xd0,0xe0,0x43,0xeb,0x9d,0xdf,0x96,0xb2,0x4e,0xac,0x37,0x74,0xf3,0x54,0x9b,0x48,0x32,0x49,0x80,0x9d,0x68,0x7b,0x9f,0x2c,0x74,0xbb,0x31,0x22,0x71,0xf1,0x3c,0xaa,0xf3,0x07,0x64,0x4d,0x55,0xb9,0x18,0xb3,0xe5,0x02,0xce,0x07,0xec,0xfc,0x6d,0x73,0xc8,0x48,0xc8
.byte 0xab,0x6b,0x3a,0x8a,0xa2,0x06,0x37,0x7d,0xf7,0x8f,0xc8,0x6f,0xc1,0xc0,0x28,0x0e,0x66,0x79,0xdf,0x76,0x51,0x48,0x3d,0x0d,0x94,0x48,0x0c,0xae,0x05,0xa6,0xf3,0x2b,0xa4,0x71,0x22,0xb0,0x38,0x81,0x45,0xc3,0x68,0x4b,0x0d,0xec,0x06,0xad,0xa8,0x5b,0x25,0x25,0x1c,0xda,0xfe,0xc2,0xe5,0x6a,0x81,0xd5,0xe2,0x3f,0x8d,0x9d,0xcb,0xb0
.byte 0x5c,0xb4,0xdb,0x14,0xa9,0x61,0x3c,0x77,0xe6,0x1b,0xc8,0x18,0xfa,0xc7,0xf2,0x03,0x96,0xd0,0xcb,0xd8,0x38,0xfd,0xcf,0x3c,0xf0,0xc4,0xd6,0xe4,0xff,0x86,0x11,0x03,0x85,0x30,0xee,0x57,0xf7,0x53,0xf8,0xbe,0x81,0x88,0x54,0x4f,0x57,0x63,0x36,0x6b,0xbb,0x44,0x21,0x84,0xa1,0x5d,0x03,0x01,0xc4,0xca,0xe2,0x89,0xec,0x8e,0x55,0xe0
.byte 0xb7,0x24,0x9a,0xd8,0x43,0x51,0xc3,0xe7,0xbe,0xa7,0x40,0xcb,0x35,0xa9,0x3c,0xa0,0x03,0x71,0x51,0x22,0x03,0x0f,0xc7,0x3e,0xcb,0x33,0xab,0xb5,0xfb,0x91,0x0e,0x21,0x51,0x0d,0x67,0x66,0x89,0xac,0xa8,0xd3,0xda,0x25,0x78,0xa4,0xd7,0x16,0x0e,0x48,0xee,0xc8,0x89,0xc4,0x4b,0x99,0xe2,0x55,0x0c,0x69,0x0c,0xc4,0xe8,0xd7,0xee,0x2d
.byte 0x5a,0x5f,0x56,0xf7,0x9a,0xad,0x61,0x32,0x9c,0x73,0x91,0x9a,0x60,0xb2,0xbe,0x36,0xfe,0xb1,0x54,0x89,0x6d,0x32,0x10,0x5b,0xc4,0x60,0xe1,0x9d,0xbb,0x12,0xf0,0xaa,0x73,0x69,0x2c,0x4d,0xb6,0xce,0x0a,0x47,0x5a,0x5c,0x4c,0x25,0x7e,0xb9,0x56,0x79,0x55,0x67,0x98,0x3e,0xc0,0xdd,0xe4,0x97,0xe7,0x6b,0x1a,0xa5,0x8d,0x26,0xfb,0x7e
.byte 0x85,0x7e,0x0a,0xa3,0x43,0xbc,0x99,0xa7,0x34,0x82,0xda,0xd9,0x92,0x58,0x79,0x8d,0x3b,0xa6,0x08,0x47,0xdd,0x18,0x33,0x68,0xdd,0x97,0x6b,0x14,0x9e,0xa4,0x7b,0x3e,0x48,0xf4,0x3f,0x44,0x18,0x07,0xc1,0xef,0x15,0xbb,0xba,0x5e,0x2d,0x92,0xdc,0x20,0xc9,0x87,0x06,0x8d,0x0b,0x69,0xed,0x94,0x98,0xe6,0x1a,0x5b,0x0c,0xb2,0xaf,0x54
.byte 0x27,0x49,0x1e,0x9a,0xc3,0x5d,0xf7,0xc5,0x82,0x8c,0xa0,0xfd,0xf2,0xc3,0x68,0x60,0xf7,0x88,0xb9,0x04,0x6c,0xb2,0xeb,0x9a,0xcd,0x9f,0xe9,0xd8,0xfc,0xbd,0xed,0x72,0x11,0xf6,0xb4,0x7b,0xd8,0x64,0x5e,0x55,0xc7,0x19,0xcf,0xd7,0xb3,0x47,0xdd,0xb2,0x3e,0x18,0x7b,0xb2,0xc7,0x5c,0x9d,0x99,0x05,0x2d,0x22,0x94,0xc2,0x0e,0xab,0x0b
.byte 0x7f,0x1f,0xc4,0x3f,0x63,0xcf,0x52,0x43,0x2e,0x92,0x76,0xff,0x8a,0xce,0x61,0x4b,0xf3,0x44,0x91,0x7e,0x11,0x7d,0x73,0x06,0xda,0xde,0x54,0xad,0x7a,0x09,0x85,0xfd,0x58,0x24,0xee,0xae,0x0c,0x86,0xca,0x39,0x12,0xe2,0x5b,0xe6,0x65,0x0e,0x9e,0x94,0xe0,0xfa,0x41,0x56,0x9e,0x73,0x1a,0xd8,0x09,0xe4,0xb3,0xe9,0x8f,0xb0,0x35,0x69
.byte 0x61,0x9f,0xe9,0x9f,0x19,0x11,0x1a,0x41,0x06,0xc3,0x6f,0xc1,0x73,0xb7,0x14,0x0b,0x31,0x4e,0xc5,0x54,0xd3,0xef,0x17,0x2b,0xad,0xe3,0xaa,0xcd,0x42,0xd9,0xe9,0xba,0x77,0x48,0xaf,0x86,0x68,0xaa,0x69,0x56,0xc2,0xfd,0x82,0xcc,0xd5,0xa1,0x98,0x17,0x5f,0x2d,0x5f,0xee,0x3b,0xb2,0x11,0x56,0x36,0xdb,0x88,0xd7,0xed,0x21,0x67,0x4d
.byte 0xe4,0x78,0x38,0xab,0x97,0xaa,0xd6,0x41,0x70,0x82,0x8e,0x65,0x3e,0xd2,0x6d,0xb3,0xad,0x6b,0xcc,0x0c,0x0e,0x2c,0x3d,0xdd,0xf9,0xaf,0x21,0xc9,0x65,0x2c,0x4c,0xd8,0x95,0xe2,0x35,0xa8,0xe1,0x67,0xd9,0x93,0x22,0xd4,0x37,0x5e,0x8b,0x15,0x5c,0x2e,0xa0,0x1f,0x10,0x58,0x58,0x84,0x87,0xb3,0x2a,0xd6,0x7c,0xcd,0x3e,0x9b,0x13,0x4f
.byte 0x16,0x19,0x5d,0x99,0xa0,0x0b,0x3b,0x7a,0x5e,0x5b,0xfa,0x64,0x7d,0x0c,0x2b,0xfb,0x32,0x76,0xc7,0x95,0x40,0x52,0x1d,0x5a,0x71,0xb5,0xfc,0xeb,0xc6,0x93,0x45,0x55,0x24,0xa8,0x9f,0x5d,0x5c,0x22,0xe4,0x1d,0xda,0x7c,0xcf,0x06,0x6d,0xcf,0x8b,0xd0,0x11,0x96,0xcd,0x57,0xb5,0xa9,0x3c,0xfe,0x6c,0xf2,0x1e,0xa3,0x22,0x5f,0x7c,0x62
.byte 0xdd,0x01,0xe2,0x2e,0xb7,0xda,0x79,0x93,0x69,0xd5,0xf0,0x9e,0xeb,0xa3,0xf7,0x18,0xd6,0x92,0x13,0xfe,0x24,0xb3,0x83,0x65,0x07,0xe5,0x80,0x28,0x52,0xc0,0x3b,0x4e,0x99,0xcf,0x53,0x75,0xe9,0xd5,0xa3,0xea,0x79,0x69,0x54,0x71,0xd6,0x25,0x43,0x1d,0x36,0xc4,0x74,0xa6,0x20,0xa4,0x0b,0xd7,0x24,0xb2,0xc5,0xee,0x49,0xae,0x8e,0xe4
.byte 0xc3,0x18,0x47,0xc0,0xb5,0x49,0x9a,0xf4,0x39,0x35,0xe4,0xb9,0xb0,0x5f,0xbb,0x81,0xf4,0xc7,0x1e,0x2b,0x24,0x93,0xae,0x5d,0xd9,0x13,0xea,0xa7,0xfd,0xdd,0x80,0xe7,0x90,0x70,0x4f,0x43,0xbe,0x72,0x32,0x73,0xb4,0x08,0x14,0x90,0x08,0xa4,0x1f,0x11,0x9b,0x80,0x1e,0x0e,0x5f,0x5c,0x46,0x9b,0xe9,0xe5,0x88,0x17,0x3b,0x7b,0xc3,0x9a
.byte 0xfb,0xf0,0x37,0x06,0xb9,0x18,0x5c,0x1f,0x07,0x84,0x1e,0x74,0x6c,0x94,0xa7,0x52,0xbc,0xf1,0x76,0xd3,0xfd,0xab,0x47,0xea,0x2d,0x58,0x51,0x4a,0x87,0xc4,0x5b,0xc0,0x93,0xb1,0x31,0x96,0xec,0xe5,0xe2,0xea,0xdd,0x84,0xb1,0xf7,0x5f,0x38,0x2e,0x98,0x52,0xdc,0xb8,0x3b,0x69,0xde,0x09,0xa3,0x24,0x65,0x2d,0x44,0x36,0x26,0xbe,0xcc
.byte 0xb2,0xaa,0x30,0x67,0xad,0x96,0x39,0xa7,0xe7,0x92,0x59,0x69,0x2a,0x46,0x51,0x48,0x25,0x11,0x81,0xe5,0xf8,0x59,0x77,0x14,0xc5,0x14,0x4e,0x93,0x75,0xc0,0xb5,0xf1,0xbb,0x90,0xf1,0xa9,0xd9,0x72,0x43,0x8f,0xfb,0xe8,0xbe,0x69,0x80,0xb7,0x51,0x71,0x9d,0x70,0xdd,0x01,0x95,0x84,0x78,0xd1,0xf0,0x86,0xc9,0x06,0xa8,0xaf,0x5d,0xbd
.byte 0xdd,0x68,0xbf,0x8a,0x4b,0x64,0xe6,0x1a,0x48,0xc4,0x34,0x3f,0xce,0x7b,0x04,0x2c,0xa4,0x12,0x62,0x69,0xfe,0x05,0x12,0x2d,0x16,0x49,0x2f,0xa1,0x69,0xd4,0x9e,0x95,0x61,0xa2,0x24,0x34,0xfc,0x51,0xb7,0x89,0x3a,0x2a,0x80,0xce,0x3b,0xe5,0x16,0x8f,0x6e,0x35,0x19,0x1d,0x78,0x27,0x1c,0x81,0x52,0xf3,0x93,0x83,0x83,0x94,0x95,0x5d
.byte 0xaa,0x94,0x28,0xc6,0xd5,0xec,0x38,0x95,0x50,0x12,0x9d,0xc2,0xc2,0x28,0x2c,0xf8,0x30,0xa5,0x79,0x19,0x79,0xf4,0x71,0xd3,0xc0,0xfd,0xc3,0x64,0x1a,0x95,0x5c,0x79,0xef,0x73,0x8d,0x66,0xbb,0x63,0x53,0x24,0x5d,0xb2,0xf9,0x94,0xe6,0xcc,0xf3,0xe9,0xf4,0x94,0xcf,0x77,0xbe,0x25,0x0e,0x2c,0x5e,0xed,0xdd,0x49,0x25,0xd3,0x15,0x54
.byte 0x68,0x49,0x15,0x27,0x7d,0x1e,0xa2,0x95,0x8d,0xf7,0xea,0xe5,0x1c,0x33,0x90,0x4f,0x83,0x06,0x17,0xd4,0x5e,0x6e,0xe6,0x3a,0x90,0xda,0x4b,0x31,0x57,0x0e,0xab,0x98,0x1d,0x87,0x63,0x20,0x9e,0xd7,0x00,0xa0,0x1e,0x77,0xef,0x22,0xf4,0x4b,0xd2,0x58,0xaf,0xfd,0xe1,0xa2,0xb0,0xb9,0x9b,0x2a,0x75,0x6a,0xc7,0x51,0xe3,0x3b,0x66,0x83
.byte 0x65,0x9c,0x87,0x09,0x56,0xd0,0x09,0xa8,0x6b,0x08,0x77,0x46,0x86,0x3f,0xe6,0x63,0x62,0xdc,0x82,0xd1,0x04,0xe5,0xa8,0x36,0x70,0xa8,0xe8,0xb3,0xb0,0x85,0xac,0x5a,0x11,0x54,0xd2,0x68,0x35,0xfa,0x4c,0x5e,0x15,0x64,0x77,0x6c,0x25,0xf4,0x19,0x8b,0x7e,0xe2,0xb1,0x7d,0x1d,0x63,0x5b,0x8c,0xa6,0x42,0x72,0x60,0x1e,0xe3,0x54,0x3a
.byte 0x5b,0x9c,0x8d,0x6c,0x4b,0x28,0x2d,0xf6,0xd2,0x80,0x66,0xbe,0x79,0x91,0x64,0x11,0xe6,0x3e,0x5c,0x3e,0x8b,0x71,0x40,0x06,0x7f,0x26,0x8d,0xf3,0xce,0xc9,0x6d,0x9c,0x94,0xf4,0x22,0xff,0xac,0xeb,0x5a,0xb2,0x99,0x86,0x66,0x66,0xb5,0xfd,0x62,0xcc,0xf6,0x20,0xca,0xb9,0xb5,0xc4,0xc7,0xe9,0xca,0x23,0x59,0x2b,0xa6,0xae,0x53,0x8e
.byte 0xdf,0xd5,0xc1,0x0e,0x52,0x8c,0x35,0x7c,0xb3,0x03,0x41,0x7c,0xdc,0x87,0x4a,0x59,0x56,0x5c,0x88,0x6c,0xa9,0x10,0x6b,0xd5,0x04,0x42,0x5d,0x60,0xef,0xc2,0xc1,0x28,0x36,0x91,0xd8,0xd0,0x62,0x30,0xa4,0xaf,0x5b,0x06,0xb0,0x86,0xc1,0xb2,0xff,0xc3,0x3d,0x41,0xb8,0xe9,0x12,0xde,0xab,0x4a,0xaf,0x57,0xfb,0xdf,0xb0,0x15,0xd1,0x1e
.byte 0xed,0x69,0xb5,0x79,0x5a,0x3d,0xeb,0xd3,0x3c,0x33,0x27,0x71,0x7a,0x7c,0xf2,0x28,0x50,0xe3,0x96,0x0d,0x6d,0x18,0x7d,0x7d,0xe2,0xb3,0x9b,0x9b,0x49,0x7f,0xe3,0xba,0xd1,0xf1,0xbc,0x9c,0xae,0x73,0xf8,0x35,0x71,0xbd,0xc1,0x4b,0xbc,0x36,0x08,0xf9,0x9e,0x78,0x57,0xc5,0xd0,0x52,0xc9,0x93,0xb4,0x7f,0x06,0x6b,0xc2,0x2e,0x8a,0x9b
.byte 0x8a,0x8b,0xf5,0x69,0xc4,0xaf,0x61,0xbb,0xc3,0x79,0x40,0xa2,0x8f,0xd6,0x76,0xcd,0x51,0x4b,0x91,0x75,0xfa,0x9f,0x19,0x8d,0x29,0xe2,0x25,0xae,0x8d,0x34,0x31,0xeb,0x26,0x42,0xca,0x69,0x1c,0xba,0x37,0xa0,0x6d,0x5f,0x60,0x04,0xc3,0x96,0xad,0xdc,0x8f,0xf0,0x51,0x54,0x89,0xc8,0x71,0xe6,0x9d,0x7b,0x11,0xad,0xc9,0xbe,0x38,0x40
.byte 0x4f,0x90,0x7c,0x6c,0xa1,0x1f,0x2d,0x92,0x29,0xf1,0x37,0x8b,0x55,0x20,0xf0,0x85,0x93,0x93,0x6f,0x72,0x4a,0x11,0x60,0x06,0x4d,0xd9,0xf0,0x0e,0xf8,0xf8,0xea,0x2e,0x4a,0x31,0x48,0xa3,0x9c,0xf7,0xac,0x64,0x84,0x59,0x91,0x5f,0x0d,0xd5,0x54,0x05,0x01,0x63,0x89,0x4b,0x11,0x72,0x52,0x0f,0xa4,0x13,0x8e,0x3c,0xb9,0x25,0x2c,0xb6
.byte 0x48,0x11,0xe7,0xe7,0xc1,0x5f,0xca,0x0c,0x2a,0xf0,0xe3,0xcf,0x29,0x5b,0x99,0xe0,0x05,0xae,0x59,0x14,0x97,0xba,0x31,0x1f,0xf4,0xc4,0x45,0xb0,0x89,0x22,0x68,0x29,0x97,0xf3,0xf9,0x2f,0x68,0x1a,0x3f,0xb3,0x6b,0x88,0xa9,0x8e,0x20,0x31,0xc5,0x63,0x13,0x6b,0x2d,0x52,0x18,0x98,0xc8,0x34,0x07,0x85,0x14,0xb2,0x6c,0xcc,0x78,0xdb
.byte 0xb5,0xee,0x08,0xb5,0xfa,0xb7,0x40,0x98,0x2d,0x1c,0x46,0xa7,0x2e,0x78,0xad,0x6f,0x95,0x02,0x57,0xbc,0xfd,0x5f,0xf4,0xe0,0xbd,0x7f,0xae,0x0e,0x52,0xf4,0x34,0x9b,0x6a,0xbe,0xba,0x6a,0x30,0x86,0x7a,0x47,0x60,0x86,0xa1,0x9a,0x48,0xe1,0xea,0xca,0xab,0x4d,0x2f,0xdf,0x84,0x1c,0x51,0x44,0xfa,0x8a,0xc2,0x59,0x0b,0x86,0xc0,0x73
.byte 0xed,0x72,0xa2,0x22,0x73,0x93,0x69,0xfe,0x39,0x07,0x5f,0x75,0x6f,0xf8,0x30,0x7c,0xea,0xea,0xda,0x30,0xfd,0x22,0x31,0xf8,0xd9,0x68,0x3d,0x75,0x93,0xc0,0xb0,0x5a,0x1d,0xa1,0x62,0x35,0x43,0xab,0xdc,0x82,0x4b,0xa8,0x40,0x0d,0x7f,0xeb,0x02,0x90,0x55,0x10,0x47,0xfd,0xfc,0x2f,0xe7,0x8f,0xe0,0x48,0x41,0x14,0x1a,0xaa,0x51,0x25
.byte 0xad,0x79,0x23,0x6c,0x08,0x44,0x31,0xff,0x0f,0x4a,0x57,0x58,0x76,0x08,0xa0,0x28,0x56,0x9e,0x70,0x3a,0x3a,0xd0,0x00,0xc6,0xa6,0x7f,0x5e,0xfd,0x88,0xcb,0x12,0x51,0x3b,0x97,0xb0,0xe9,0x8a,0x57,0x8f,0x4c,0x2e,0xba,0xc7,0x8f,0x47,0x05,0x4e,0xb0,0x98,0x22,0x85,0x80,0x43,0x09,0xc9,0xda,0x90,0x86,0x14,0xc3,0x5c,0x00,0x2f,0x39
.byte 0x2f,0xc0,0xf9,0x37,0xe6,0xee,0x56,0xee,0xa2,0x05,0x14,0xe6,0x63,0xbd,0x6d,0x8f,0x21,0x46,0xbd,0x7f,0x67,0x0e,0x14,0xaa,0x11,0xf5,0x1b,0xfb,0x06,0x6b,0xbf,0x82,0x25,0xaa,0x8d,0x15,0xc3,0x86,0x1c,0xb5,0xcb,0xdf,0xa1,0x9d,0xd8,0xd6,0x0b,0x89,0x76,0x71,0xb8,0x5d,0x16,0xde,0x1d,0x04,0x17,0xb3,0x0f,0x26,0xc8,0xc5,0x95,0x35
.byte 0xcf,0xf4,0x6b,0x71,0x38,0xa2,0x87,0xcf,0xca,0xda,0x67,0x2b,0x01,0x37,0xbc,0x35,0x33,0x0c,0xff,0xe2,0x1e,0x33,0x96,0xb4,0x10,0x7f,0x8f,0x9c,0x42,0x07,0x73,0x4c,0xfc,0x47,0xf4,0xa5,0x1a,0x8d,0xd8,0x65,0x97,0x16,0x89,0xb6,0x25,0x50,0xd2,0x40,0x31,0x56,0x9d,0x30,0xf6,0xe3,0xcc,0x79,0x83,0xcb,0xf6,0xf7,0xdb,0x8e,0xe0,0xc9
.byte 0x6d,0xac,0xca,0x6c,0xfe,0x1c,0xc1,0xde,0x4e,0xa8,0xea,0x06,0x33,0x96,0x98,0x99,0xe1,0xe9,0x28,0xe0,0x0c,0x15,0xcd,0x75,0x1b,0x4c,0xc3,0x9b,0xea,0x86,0xd2,0xeb,0xd3,0x92,0x4e,0xdb,0xc5,0x41,0x20,0x52,0xf9,0x11,0xf8,0x17,0xb0,0x78,0x07,0xf3,0x99,0x53,0xee,0x24,0x05,0xc2,0xc7,0x44,0x66,0x8b,0xa0,0x5c,0x90,0x6a,0xc6,0xa6
.byte 0xe8,0x95,0x88,0x60,0xf7,0x9f,0x5e,0x64,0x7c,0x24,0xbb,0x3f,0x51,0x61,0x7a,0xc0,0x89,0x6d,0x49,0xfe,0x41,0x95,0xee,0x13,0x80,0x2d,0xeb,0x5b,0x60,0xc4,0x3d,0xb2,0xce,0xd0,0x29,0x24,0xb4,0xc7,0xc5,0xa6,0x4b,0x2e,0x80,0x38,0x68,0x41,0x4c,0x72,0x71,0xc1,0x08,0xf8,0x72,0x93,0x28,0x1c,0x7d,0xb3,0xf5,0x41,0xd2,0x7d,0x3a,0xc4
.byte 0x20,0x95,0x9c,0x52,0x7e,0x4f,0x5c,0x5e,0x72,0x2d,0x98,0xbc,0xd4,0x7a,0x31,0x30,0x1c,0x4d,0xe8,0x79,0xf6,0x65,0xcc,0x22,0xfe,0xc9,0xc7,0x61,0xcc,0xbe,0x21,0xd4,0xb4,0x18,0xde,0xaa,0xe5,0xc8,0x61,0x00,0xb5,0xc0,0x89,0xf2,0x19,0x88,0xb8,0xfe,0xe3,0x2b,0xb0,0xfa,0xf2,0x35,0x4e,0xf9,0xce,0x43,0xd4,0xc3,0xc3,0xf6,0xc5,0x60
.byte 0x8f,0xd3,0x12,0x32,0xe9,0xbc,0x1e,0xbd,0x4f,0x4c,0xdf,0x2e,0xc4,0x4a,0xd9,0x28,0x81,0xca,0x17,0x36,0xc9,0xbd,0x21,0xea,0xf1,0xdf,0x73,0x91,0xbe,0x8c,0x24,0x3c,0x74,0xf4,0x42,0x0f,0x5c,0xa1,0x42,0x83,0x73,0x3c,0x01,0x09,0x80,0x06,0x2a,0x91,0x63,0x59,0x6f,0xf4,0x09,0xb0,0x94,0x8c,0xc3,0xcc,0x7d,0xb2,0xf7,0x0b,0xa4,0x29
.byte 0x87,0x8b,0x9d,0x6c,0x8f,0x57,0x7d,0x45,0xee,0xc7,0x1b,0x4d,0x61,0xc5,0x66,0x7f,0x59,0xe5,0xbc,0x8f,0x45,0x33,0x05,0xc9,0xe6,0xf2,0xbb,0x5a,0x61,0xe6,0x5c,0x41,0x44,0x70,0x55,0xaf,0xb5,0xa0,0x3c,0xb5,0x4a,0xf2,0xe8,0x50,0x4e,0x94,0x01,0x56,0xc4,0x7f,0x08,0x7d,0x64,0x18,0x8b,0x14,0x15,0x15,0x54,0x23,0x49,0x4f,0x9b,0x48
.byte 0x99,0x48,0x9f,0x57,0x48,0x58,0xd1,0xe9,0x07,0x5c,0xe2,0x98,0x90,0xd7,0xc0,0x09,0xd7,0x5c,0x6f,0x0c,0x68,0xf7,0x68,0x66,0x78,0x46,0x7d,0xf6,0xaf,0x86,0x87,0x0a,0x5e,0x47,0xb2,0x9a,0xe8,0x52,0x00,0x48,0x66,0x76,0xe0,0xf7,0xa8,0x9d,0xe1,0xff,0xad,0x77,0x31,0x3f,0x28,0x2f,0x08,0x26,0xd6,0x79,0x31,0x4a,0xac,0x58,0xa8,0x98
.byte 0x56,0xd0,0x83,0x66,0x4f,0x05,0x20,0x43,0xe7,0x6b,0x1f,0x9c,0x90,0x79,0x6a,0x6c,0xb2,0xff,0xd3,0xee,0x51,0x32,0x57,0x34,0xdc,0x1b,0x61,0xf7,0x86,0xd2,0x78,0xdb,0xb1,0x91,0x6b,0xd7,0x8e,0x9a,0xab,0x71,0x8b,0x77,0x4b,0xda,0xe0,0x74,0xe4,0x80,0x47,0xad,0xd1,0x76,0x31,0xdc,0xfa,0xa9,0xb0,0xd8,0x0f,0x35,0xc1,0x06,0xdf,0x87
.byte 0x5f,0x0c,0x02,0xef,0x38,0xe0,0x1b,0x4c,0xcd,0xc4,0x2a,0x20,0xd5,0xbe,0x59,0x5e,0x11,0xe4,0x71,0xa6,0x2c,0xdb,0x53,0x35,0xac,0x1f,0xae,0x45,0xa7,0x6c,0x58,0x62,0x5d,0xbe,0x5f,0x21,0x23,0x28,0x0e,0x2c,0xcd,0x7d,0xc2,0xdf,0xcb,0x0d,0xd4,0x7c,0xda,0x88,0x26,0x97,0x88,0x13,0x3c,0x51,0xcb,0x91,0x96,0xd6,0xf4,0x63,0x21,0xe1
.byte 0x61,0x8e,0xbf,0x09,0x3f,0x00,0x1e,0xa4,0x2c,0x43,0x86,0x5f,0x5a,0x18,0xcb,0x66,0x8c,0x56,0x26,0xa4,0x5b,0x1d,0xf6,0x0d,0xd9,0x40,0xe8,0xef,0x13,0xcd,0x71,0xd1,0x4c,0x48,0xfc,0xb3,0xfe,0x20,0xb0,0x72,0x3e,0xd8,0x76,0xc5,0x87,0xb4,0xd6,0xfc,0xcc,0xf6,0x0f,0x3a,0xd5,0x98,0x1d,0x0f,0xa6,0xd7,0x63,0x32,0x1e,0xf9,0x1b,0x5a
.byte 0x7c,0xce,0x7f,0x90,0xd2,0x2d,0x2c,0xa9,0x9e,0x01,0x46,0x47,0x80,0x8c,0xf3,0x5e,0xfe,0x8e,0x41,0xdc,0x33,0xd5,0x11,0xf9,0xbc,0xc1,0x4a,0xbf,0xd9,0xc0,0xeb,0x43,0xe6,0x8e,0x04,0x5c,0xea,0xcb,0x53,0x2f,0x43,0x3f,0xe9,0xfe,0x04,0xaa,0x15,0xf1,0x38,0x46,0x70,0xbf,0x74,0x01,0xfa,0x5f,0x50,0xf3,0xb2,0x35,0x97,0x44,0x2a,0xad
.byte 0x49,0x1e,0x19,0x76,0x48,0x32,0x74,0xc2,0xc9,0x72,0x8b,0x44,0x2c,0x59,0x77,0xa9,0xf1,0x36,0x0a,0xa7,0xe7,0x69,0x6f,0x2b,0xcc,0x3f,0xa7,0x5c,0x39,0xc0,0x38,0xd2,0x85,0x02,0x6a,0x1f,0xdf,0x21,0x34,0x66,0xfe,0x56,0x2a,0xf8,0xac,0x4e,0xe1,0x1a,0x14,0x12,0xd5,0xc1,0x41,0x0b,0x1f,0x18,0xf3,0x0a,0x52,0x96,0xbb,0xaa,0x78,0x59
.byte 0x16,0xe1,0xbf,0xa5,0x87,0x26,0x19,0x0d,0x68,0x0e,0xc0,0x4b,0xfd,0xd4,0xf8,0x60,0x9c,0xf4,0x6e,0x64,0xf2,0xbe,0x24,0x2a,0x3a,0x4e,0x05,0x01,0x26,0xe7,0x15,0xb5,0x14,0x06,0xeb,0x6e,0x21,0x88,0x4b,0x86,0x1b,0xcd,0xc5,0x29,0xaf,0x68,0xd1,0x94,0x25,0xbc,0x5c,0xf5,0xd3,0xd7,0x20,0x40,0x4e,0xad,0x9b,0x82,0xdf,0x46,0xe6,0x10
.byte 0x35,0x3e,0xbc,0x53,0x60,0x5a,0x1e,0x91,0xa0,0xcb,0xd7,0x09,0xd9,0x54,0xf4,0x2e,0xc8,0x4d,0x1e,0x8f,0x76,0xc4,0x67,0xed,0xb6,0x00,0xe4,0x97,0xb2,0xf9,0x21,0x98,0x3a,0xea,0xb3,0x53,0x79,0x98,0xfd,0x32,0x9a,0x76,0xb9,0x3c,0x74,0x09,0x37,0x60,0xfd,0xf6,0x36,0x58,0x40,0x19,0x4f,0x73,0x5b,0x27,0xed,0x3a,0xa8,0x58,0x27,0xf0
.byte 0xd0,0x11,0xee,0x20,0x94,0x0e,0x41,0x7d,0x47,0x85,0x27,0x45,0xae,0x3f,0x14,0x75,0xda,0x5d,0x8d,0xd9,0x31,0x58,0x99,0x40,0x9a,0xfe,0x1e,0x9c,0x7e,0x42,0x2f,0xe7,0xcd,0x43,0xb3,0x08,0xa9,0x71,0x5f,0x92,0x34,0x01,0xde,0x05,0x40,0xae,0x08,0xe3,0x62,0x36,0x71,0x7a,0xd4,0x75,0xf3,0xee,0x71,0x84,0x41,0xce,0xf3,0xca,0xa6,0x69
.byte 0xc2,0x13,0x2c,0x75,0x85,0xb4,0x43,0x8c,0x08,0x6c,0x1b,0xfb,0x87,0x1a,0xe2,0x74,0x22,0x86,0x2e,0x9e,0x3e,0x85,0xaa,0x34,0xb3,0x5f,0x43,0xf2,0xe5,0x6b,0x87,0x84,0x1a,0xce,0x70,0x1e,0x08,0x24,0xd8,0x16,0xe0,0x1a,0x78,0xd5,0x93,0xf7,0xe5,0x7b,0x49,0xff,0x8c,0x14,0x44,0xa6,0x2c,0xab,0x58,0xe6,0x59,0xb7,0x56,0x00,0xcd,0x1e
.byte 0x53,0xd2,0xc2,0xa4,0x1a,0x56,0xbc,0x08,0x08,0xac,0xa7,0x95,0xbe,0xbb,0xdc,0xc8,0xdf,0xe3,0xa8,0x35,0x42,0x60,0x8a,0x1c,0xa6,0xf0,0xf3,0xa4,0xdc,0xcb,0x6b,0xb4,0x0a,0x6f,0x45,0xfa,0x6f,0x9c,0x92,0x15,0xe2,0x0b,0x0a,0xdd,0xb1,0xa9,0x68,0x54,0x3c,0x3b,0x9f,0xa3,0x9f,0x93,0x50,0xca,0xd4,0x8f,0xd5,0x09,0x0d,0xe8,0x94,0x18
.byte 0xce,0x5b,0x28,0xd9,0xd1,0xce,0x3f,0xc7,0x3d,0x42,0x11,0xd7,0x47,0x2c,0x8b,0x6c,0x6b,0x43,0x52,0xd2,0xdf,0xbb,0xe9,0xb4,0x4c,0x39,0xc6,0xf8,0x9e,0xc8,0xa5,0xa8,0x70,0x92,0xea,0x83,0x78,0xf9,0x40,0x57,0x43,0x58,0x8c,0xe6,0x08,0x34,0x01,0xf8,0xc6,0x8c,0xa9,0x93,0x0f,0x2f,0x91,0x95,0x90,0xb9,0xe4,0xb8,0x4f,0x89,0xb2,0xfa
.byte 0x4e,0x30,0x4b,0x6e,0x91,0x69,0x80,0x0a,0xc5,0x2a,0x62,0x44,0x18,0x15,0xcf,0x93,0x9c,0x0f,0x55,0x44,0x4a,0x71,0xf2,0x72,0x87,0x88,0x38,0xff,0x79,0xc6,0xe9,0xe8,0xb6,0xd9,0xcb,0xd5,0x27,0x8b,0xc1,0x71,0xeb,0x42,0x12,0xbf,0x3b,0xeb,0x45,0x75,0xe1,0x80,0xcd,0xd4,0xdc,0xf6,0x2b,0x82,0x93,0x0c,0xad,0xc9,0x3a,0x31,0xb6,0xec
.byte 0x38,0xee,0x3e,0xc0,0x5c,0x98,0xf9,0xe3,0xf5,0x82,0xf9,0x83,0x57,0xbb,0xed,0x1d,0x7a,0x48,0x10,0x1d,0x18,0xd8,0xab,0x2c,0xfd,0xf6,0x67,0x61,0x26,0x37,0x74,0x33,0x0f,0x9e,0x82,0x8e,0xaf,0x22,0x7f,0x57,0x5d,0xf7,0x53,0x9e,0xf9,0x20,0x98,0xf5,0x1f,0xbe,0x60,0xd9,0x81,0x5f,0xba,0x9b,0x36,0x07,0x65,0x9e,0x65,0xb5,0x2f,0x3f
.byte 0x2b,0x0d,0xef,0x1a,0xf8,0xf7,0x6e,0x16,0x09,0x00,0xef,0xed,0x95,0x38,0xec,0x1b,0xf3,0xf6,0xa2,0x9f,0xb2,0x21,0x6a,0xc8,0x0f,0x59,0xf2,0xe8,0x6c,0x92,0x35,0x99,0x56,0x3f,0xa4,0xd9,0xcd,0x5c,0x72,0xfb,0x0a,0xea,0x3e,0xa2,0x58,0x33,0x85,0x48,0x53,0xcc,0xba,0x92,0x5e,0x81,0xa3,0x46,0xe3,0x1d,0xe8,0xc4,0x22,0x10,0x57,0x0a
.byte 0xa1,0xba,0x5a,0x4e,0xc8,0xfb,0x14,0x9a,0x36,0x9d,0x61,0x5b,0x0d,0x2e,0x25,0x46,0x18,0x38,0x8c,0x20,0x51,0xd7,0xd1,0xe0,0x73,0xdb,0x76,0xaa,0xb3,0xa8,0x54,0xdc,0xb5,0x38,0xf2,0x5a,0x75,0x66,0x28,0xd3,0x5d,0x4a,0x8f,0x02,0x40,0x7e,0x88,0xfe,0x80,0x83,0x44,0x11,0xad,0xe8,0x52,0x70,0xa3,0x50,0x3d,0x22,0xc2,0x8a,0x83,0xef
.byte 0xda,0xd7,0xae,0x04,0xb8,0x98,0x4e,0x9f,0xf6,0xb7,0x39,0xa5,0x72,0x29,0x61,0xbd,0xdf,0xd9,0xdc,0xe2,0x10,0x9b,0x8a,0x5f,0x42,0x4e,0x41,0x49,0x41,0x81,0xa2,0xc7,0x81,0x30,0xe9,0xfb,0x7f,0x10,0x1a,0x44,0xaa,0x79,0x70,0x1a,0x9d,0xe4,0xbd,0x98,0x25,0x75,0xff,0x45,0x5a,0x79,0x5d,0xe3,0x8d,0x58,0x87,0x2c,0x05,0xfd,0x34,0x98
.byte 0x06,0x90,0x55,0x24,0x6d,0xde,0xed,0x38,0xd4,0xf2,0xfa,0x55,0x43,0x34,0x73,0x83,0x82,0x47,0x0c,0x4c,0x1a,0xff,0xf8,0x9a,0xd3,0x57,0x75,0x8d,0x1d,0xf3,0x8e,0xde,0x96,0x29,0xce,0xd1,0x73,0xb1,0xe4,0x1c,0x24,0x3b,0xdf,0xed,0xd8,0xef,0x4a,0x5f,0xdb,0xe5,0x42,0x55,0x58,0x86,0xb7,0x01,0x6d,0x14,0x40,0x2c,0xb8,0x08,0x9f,0x9a
.byte 0x46,0x9c,0xfd,0x85,0xcf,0x2d,0x5e,0x07,0x41,0xf9,0xb7,0x9f,0x6a,0xa8,0xaf,0x23,0xdc,0xdf,0x46,0x54,0xdb,0xd4,0xb0,0x03,0xef,0x82,0x26,0x8f,0x00,0x6e,0xf6,0x26,0x99,0xda,0xeb,0xab,0xc2,0x1e,0x49,0x8e,0x40,0x42,0x85,0x0b,0xc6,0x51,0xa9,0xe4,0x1f,0x63,0xf7,0x56,0x46,0xf4,0x4d,0x95,0x16,0x4a,0x38,0xc7,0x28,0x52,0x03,0xd6
.byte 0x5e,0x90,0x09,0xaf,0x31,0xc0,0x5b,0x32,0x52,0x1d,0x6b,0xb7,0xf7,0x17,0x86,0x6d,0x90,0x1d,0x78,0xf3,0xae,0xf6,0x96,0xe3,0x02,0x6d,0xe3,0xd6,0xdf,0xb9,0xfc,0x7a,0xfd,0x04,0xa5,0xbe,0x42,0x19,0x5c,0xd9,0x44,0x60,0x1e,0xb5,0xca,0xd7,0x99,0xa9,0x98,0x52,0x4b,0x9a,0x2c,0x05,0x08,0x88,0x06,0x12,0x30,0xe2,0xca,0x14,0xb9,0x30
.byte 0x7d,0x22,0xd8,0xaa,0x58,0x4c,0x80,0x10,0x39,0xa6,0x2b,0x7d,0x17,0xfe,0x72,0xe2,0x2f,0xa8,0x85,0x03,0x91,0xae,0xa0,0xe5,0xed,0xe0,0x02,0x40,0xf4,0x93,0x0c,0xf9,0x73,0xc7,0x8b,0x3e,0x26,0x1b,0xc6,0xf8,0x34,0x5d,0xda,0x74,0xf4,0x72,0xb2,0xcd,0x89,0xd2,0xdb,0xdc,0x60,0x84,0xa8,0xa5,0x40,0x9a,0x5e,0x6b,0x47,0x17,0x75,0x81
.byte 0x89,0x1b,0xec,0x18,0xd2,0x09,0x2c,0x57,0x1d,0xce,0x41,0x6e,0x14,0x99,0x2f,0x52,0x43,0x77,0xf7,0xdd,0x72,0xeb,0x8b,0x39,0x72,0x4b,0xcb,0x92,0x92,0xfc,0x55,0xbd,0xfd,0xd1,0xd6,0xd3,0xbb,0xa1,0x23,0x21,0x5a,0x41,0x2b,0x4e,0xe6,0xcf,0x9b,0x33,0x1e,0x0b,0xab,0xa5,0x69,0x96,0x32,0x4c,0x40,0xbe,0xfa,0x48,0x40,0x0c,0xbf,0x2f
.byte 0x9d,0xd4,0xb0,0xfe,0x74,0x3e,0x9f,0xb6,0x08,0xb0,0x71,0x32,0xa6,0xeb,0x62,0x2a,0xbc,0xdd,0xca,0x68,0x41,0xe4,0xcd,0x52,0xfb,0x4f,0x09,0xdc,0xb8,0x26,0xad,0xfd,0x23,0x9d,0x65,0x80,0x00,0xd8,0xd2,0x27,0xfb,0x80,0xd0,0x06,0xfa,0xe8,0xbc,0x70,0x54,0x5a,0xb7,0x30,0x9a,0xec,0x38,0x02,0x76,0x0f,0xda,0x41,0x1e,0xfe,0xe9,0xa0
.byte 0x77,0x6e,0xef,0xfb,0x2e,0xf9,0x35,0x5a,0xcb,0x2d,0xdf,0x57,0x68,0xc3,0xb5,0xd9,0xef,0x72,0xb2,0xac,0xcb,0x60,0x90,0x17,0x70,0x8f,0xe6,0x70,0x52,0x13,0xa1,0xb2,0xe8,0x80,0xee,0x77,0x87,0xf2,0x72,0xeb,0x53,0xf0,0xcc,0x37,0xc2,0xe5,0x8c,0x0a,0x50,0x00,0x67,0x9f,0xf0,0xa6,0x2c,0xde,0xe9,0xd6,0xde,0x8a,0x96,0x50,0x6c,0x9e
.byte 0xb0,0xd3,0x6a,0x8a,0xd0,0xd7,0x1d,0x53,0x63,0x58,0xef,0xfc,0xd3,0x74,0xe2,0x46,0x51,0xf7,0x78,0x69,0xb9,0x3e,0x6a,0xa3,0xdb,0x1b,0x7c,0x1c,0xc6,0x25,0xf7,0x36,0xba,0x27,0xd5,0x96,0x70,0x24,0x81,0xe1,0x7f,0x44,0x82,0x57,0xc7,0x37,0x71,0x00,0x6b,0xd1,0x99,0x12,0xb1,0x84,0xc9,0x65,0x03,0x3f,0x9b,0x36,0x4b,0x37,0x21,0x5d
.byte 0x12,0x96,0x5d,0x64,0xdf,0x2c,0xe4,0x7a,0x1a,0x1e,0xf3,0xdf,0xc3,0xbb,0xb9,0x35,0x36,0x5f,0x71,0xe5,0xca,0x76,0x02,0x95,0x8e,0x2d,0x87,0x32,0xf2,0x78,0x0e,0x01,0xe1,0xb2,0x4c,0x11,0x26,0x70,0x4d,0x9b,0x9f,0xa1,0x65,0x7d,0x9c,0x2f,0xa6,0x01,0x2b,0xdc,0x3f,0x72,0xd1,0xe8,0xb1,0xd2,0x04,0x6b,0x8b,0xbf,0x43,0xba,0xbb,0xb9
.byte 0xec,0x86,0x2a,0x87,0xb5,0xee,0x82,0x40,0x96,0xde,0xd7,0xcc,0x07,0x66,0x38,0x90,0x70,0x20,0x03,0x51,0x5b,0xf2,0x54,0x87,0x5c,0x29,0x8c,0xb1,0xa1,0xf0,0x56,0x1f,0xb4,0x4c,0x69,0x3b,0x4e,0x6d,0x6a,0x39,0x0c,0xde,0x1b,0x32,0x15,0xbe,0xb0,0xc5,0x4c,0x9b,0x4b,0xf0,0x47,0x8a,0x30,0x6e,0xa9,0xbc,0xf1,0xa0,0x73,0x14,0x5c,0xea
.byte 0x73,0x7c,0x0d,0x80,0x02,0xed,0x74,0xe7,0x77,0x42,0x2b,0x4a,0xc6,0xdd,0x70,0xd7,0x5d,0x4c,0xe9,0xfd,0x62,0x41,0xc1,0x55,0xd7,0xee,0x81,0x81,0x16,0xb5,0x3f,0x9f,0x6c,0x8a,0xb9,0x90,0x1c,0xd3,0xba,0x32,0x6b,0xa7,0xa6,0xa7,0x8f,0xd9,0xfa,0x18,0xfd,0x25,0x91,0x6e,0xc4,0x35,0xde,0x07,0x89,0x92,0x4e,0xfe,0x4a,0xb7,0x09,0x66
.byte 0xb0,0x58,0x32,0xe2,0xa3,0xa8,0x4e,0x7f,0x10,0xab,0xb8,0xe0,0x87,0xf1,0xaa,0x59,0x8e,0x71,0x62,0x47,0x93,0x19,0x82,0x8a,0xf9,0x0c,0x2d,0x9f,0x5d,0x6d,0xd2,0xa4,0x1f,0x96,0x36,0x3c,0x41,0x94,0xa2,0x87,0x68,0xcd,0x03,0x65,0x8c,0xbc,0x92,0xa9,0xa1,0xda,0x9c,0xcb,0x64,0x56,0xdd,0x06,0x82,0xc8,0xbb,0x20,0xb0,0xd3,0xf0,0x8e
.byte 0x47,0xb7,0x71,0xf8,0x7c,0xc3,0x74,0x54,0x38,0xd2,0xa6,0x3c,0x7e,0xcb,0x27,0xcb,0xef,0xe9,0x7b,0xda,0xca,0x08,0x47,0x4b,0x35,0x45,0xff,0x64,0xae,0x6c,0x37,0xe9,0x5d,0xf5,0x00,0x51,0x71,0xf4,0x30,0x60,0x8c,0x22,0x5c,0xae,0x8a,0x03,0xc7,0xd3,0x91,0x7d,0x0f,0xf9,0x91,0xb5,0x2d,0xdc,0x36,0x61,0x4a,0x94,0xf8,0xc0,0x12,0xcf
.byte 0x3e,0xf6,0xea,0x15,0x9c,0xe0,0x35,0x09,0xfb,0xca,0x1b,0x53,0x7e,0x4f,0x12,0xbc,0x2c,0xa8,0x1b,0x78,0x54,0xa1,0x7f,0x08,0x47,0xe3,0x0c,0x0e,0x84,0xd5,0x9e,0x49,0x91,0xf6,0x8d,0x30,0x5a,0x94,0xcf,0x50,0x62,0x26,0xc7,0x6b,0xad,0xa0,0x3a,0x45,0x12,0x0d,0x31,0xb1,0x64,0xcb,0xa1,0xda,0xc3,0x57,0x41,0x3b,0x03,0x43,0xe0,0xe9
.byte 0xa5,0xc5,0x4c,0x56,0x82,0xef,0x9f,0x1b,0xb4,0xd7,0xb3,0xc9,0xf5,0xca,0x0e,0xfa,0xc5,0xf2,0x4c,0xf3,0x20,0x0b,0x95,0xe1,0xeb,0xcc,0xb1,0x96,0xd8,0x55,0x68,0x23,0xda,0x30,0x98,0xe3,0x85,0x45,0xa7,0xc0,0xa8,0xe1,0xd6,0x3f,0x4b,0x7e,0x71,0x4b,0xdc,0x46,0x66,0x90,0xd1,0x6d,0x04,0x6b,0xb5,0xa4,0x6f,0x81,0x2c,0x9e,0x20,0xb2
.byte 0xad,0x80,0x57,0xd9,0x86,0x42,0xc2,0xab,0xfc,0x61,0x29,0x04,0x32,0xfc,0x77,0x12,0xa5,0xd8,0x58,0x97,0xf0,0x47,0xd2,0x60,0x51,0x86,0xcb,0xce,0x0a,0x2d,0x8b,0xdb,0xa3,0x38,0x32,0xc4,0xef,0xa1,0x7d,0xb8,0x56,0x72,0xd1,0xbc,0x1c,0xf7,0xfc,0xda,0xca,0x6b,0x61,0x13,0xb1,0x73,0x0c,0xb2,0x37,0xcb,0x68,0x69,0x19,0xcc,0xda,0x21
.byte 0xf1,0x3a,0x63,0x50,0x3c,0xfd,0x24,0x6e,0x66,0xbb,0x0d,0xfa,0xf3,0xe8,0xfa,0xb1,0x81,0x8a,0x4b,0x00,0x98,0x32,0x56,0x5c,0xaa,0xd0,0x13,0xe4,0x37,0xe2,0x7a,0xdd,0x00,0x6b,0x5d,0xc8,0x6f,0x25,0xd8,0xd8,0x36,0x24,0xeb,0x20,0x60,0x8e,0xbf,0x41,0x4f,0xab,0xc1,0xfc,0xc8,0x38,0xd6,0xf8,0xd6,0x27,0x52,0xac,0x2a,0x9a,0xf0,0x00
.byte 0x56,0xe8,0xdb,0xd1,0x14,0x68,0xb2,0xdc,0xbb,0x6f,0x18,0x93,0x52,0xe5,0x20,0x14,0x98,0x08,0x51,0xc8,0x89,0xee,0xaf,0x1e,0x78,0xcc,0x6a,0x92,0xcc,0x49,0xd4,0xfd,0xbe,0xa5,0x88,0x7b,0x07,0xcb,0x30,0x79,0x56,0xd6,0x0e,0x39,0x0b,0xc0,0x9e,0x1d,0xdf,0x5c,0x12,0x87,0x9d,0x9e,0x1f,0x0e,0xf1,0x6f,0xee,0x6d,0x71,0x18,0x63,0x72
.byte 0x57,0x3c,0x01,0xb9,0x69,0xb2,0xf3,0x4f,0x2a,0x2d,0x69,0x39,0x52,0xcd,0xac,0x3d,0xd9,0x9d,0xdb,0x2c,0xa9,0x51,0x52,0xd0,0xc2,0x61,0x78,0x87,0xef,0x74,0xc9,0x70,0x6e,0x73,0x37,0xa4,0x15,0xcd,0xb0,0xd9,0xac,0x59,0xfc,0xf8,0xcb,0xb6,0x6c,0xa6,0xa6,0xfa,0xf4,0x0d,0x87,0xe1,0xe3,0x5a,0x72,0xfe,0xfa,0xa6,0xab,0x34,0xd0,0x24
.byte 0xba,0xa8,0xa1,0x7e,0xbe,0xc0,0xec,0xd7,0x84,0x26,0x15,0xaf,0xf8,0xd6,0x73,0x61,0xa0,0xd8,0x2c,0x60,0x60,0xbe,0x34,0x1d,0x57,0x12,0xce,0x1b,0x24,0xea,0xca,0x8e,0x18,0x7f,0xe9,0x9e,0xc1,0x8b,0x09,0x11,0x9c,0x96,0x1c,0xf1,0xb3,0xa0,0x19,0x6a,0x17,0x42,0x32,0x46,0xc8,0x72,0xbc,0x6b,0x83,0x58,0x42,0xe9,0x87,0x0e,0x1b,0xeb
.byte 0xbb,0xea,0x5f,0xe4,0xcf,0xff,0xc3,0xf9,0x59,0xd5,0xc4,0x3c,0xfa,0x84,0xb2,0xa7,0x7b,0x49,0x9d,0xd8,0x68,0x45,0x07,0x0a,0x21,0x8a,0x75,0x80,0x94,0x2e,0xb9,0x36,0x01,0x0c,0xd0,0xde,0x88,0xed,0x62,0x55,0xc2,0x49,0x92,0xf5,0xa4,0x51,0x5b,0xcd,0x3a,0x56,0x0a,0x85,0x36,0x14,0xea,0x23,0x79,0x48,0xea,0x6e,0x67,0x20,0xcc,0x2b
.byte 0x2d,0xb8,0xfb,0x01,0x89,0xf3,0x9a,0x22,0x0c,0x6e,0xb9,0x47,0x3a,0x07,0xef,0x11,0x88,0xd4,0xc0,0xab,0x39,0x2e,0xee,0x8d,0x1f,0x44,0x0e,0x2c,0x32,0xba,0x54,0x60,0x03,0x70,0xed,0x11,0x01,0x2d,0x08,0x5a,0x69,0xea,0x62,0x46,0xdb,0xf5,0x99,0xa6,0x69,0x1c,0x43,0x95,0x4b,0xf6,0x02,0xb1,0xd1,0x38,0xe9,0xd3,0x96,0x7d,0xae,0x0f
.byte 0x46,0x0d,0x9c,0x73,0xe3,0x90,0x9a,0x23,0xc2,0x34,0xb0,0x53,0x04,0x88,0xd0,0x61,0x82,0x46,0xef,0xe1,0x54,0xca,0x54,0x32,0xc1,0xaa,0x1f,0x3d,0x9b,0xac,0x8c,0x78,0x0d,0x0d,0x53,0xba,0x81,0x48,0x7c,0xda,0x9c,0x49,0x07,0x38,0x0d,0xc0,0xa3,0xb2,0xc0,0x4a,0xae,0x29,0x3b,0x0a,0x78,0x0c,0x4b,0xf5,0x9e,0xb3,0x4c,0x42,0xa0,0x52
.byte 0xb6,0x6f,0xc5,0x77,0xd8,0xed,0xae,0x4d,0x45,0x09,0xe5,0xc8,0xd2,0xbe,0x5b,0x12,0x1d,0x6f,0x5c,0x3a,0x7e,0x5f,0x7a,0x04,0xbf,0x67,0x4d,0x76,0xdf,0x00,0x42,0x18,0xcd,0x65,0x6d,0x64,0x97,0x85,0x09,0x80,0xb6,0x13,0xc0,0x9b,0x8c,0x25,0x52,0x6b,0x03,0x88,0x2f,0xba,0x4c,0xbe,0xab,0xf9,0x3a,0x3b,0x4a,0x87,0x42,0xc0,0xe5,0x61
.byte 0x37,0x4b,0x1a,0xb9,0x68,0x1a,0x50,0xde,0xf2,0xaf,0xdd,0xf4,0xa4,0xa0,0x97,0xf6,0xec,0x70,0xbe,0x6e,0xe5,0x7a,0x14,0x8a,0xfe,0x49,0x54,0x18,0x21,0x30,0xc3,0x3e,0xa8,0xa0,0xbc,0xd0,0x32,0x48,0x8b,0x67,0x47,0x39,0x10,0x1b,0x5f,0x67,0xe1,0x3c,0xf2,0xfc,0xe5,0xb9,0x23,0x96,0xdd,0xeb,0xc5,0x76,0x5a,0xc9,0xee,0xe2,0x09,0x43
.byte 0xfe,0x4b,0x6e,0x99,0x17,0x24,0xfc,0x30,0x02,0x2f,0x4c,0x3d,0x52,0xe7,0xdf,0xd5,0x20,0x5d,0x13,0x3b,0x4a,0xfd,0xb4,0x78,0x3b,0x91,0x58,0x52,0x2e,0x3c,0x8a,0xad,0xfc,0x64,0xb9,0xc2,0xcd,0xdd,0x58,0xf5,0xce,0x1f,0x50,0xdf,0xd9,0x8f,0x39,0x93,0x17,0xe4,0xac,0x7d,0x6b,0xf6,0x7f,0x72,0xd2,0x9e,0xa5,0x8c,0x4f,0x16,0x29,0xf8
.byte 0xca,0xb2,0xf3,0xb2,0x94,0x08,0x91,0x74,0xf9,0x1a,0x01,0xa1,0x15,0xb4,0x79,0xb3,0xb9,0x18,0x91,0x34,0xa5,0x2b,0x45,0xd3,0xbf,0xf7,0x11,0x42,0xbd,0x63,0x08,0xf9,0x89,0xab,0xbe,0x02,0xab,0xda,0xfc,0xc6,0xba,0x57,0xd8,0x60,0x1d,0x03,0x12,0x57,0x01,0x9f,0x88,0xc1,0x3b,0xa5,0xa3,0x09,0xd5,0xb5,0x37,0x32,0x86,0xe6,0xf0,0x1d
.byte 0xf2,0x37,0x57,0xdd,0x05,0x56,0xfe,0x2d,0x7c,0x95,0x52,0x93,0x21,0x1c,0x8b,0xfe,0xda,0xea,0xee,0xd9,0xc4,0xec,0x54,0x2e,0x35,0xb3,0x64,0x72,0xf2,0x7a,0x4a,0x1c,0xc9,0x33,0x07,0xda,0xc9,0xd8,0x7d,0x5d,0xeb,0xef,0x23,0x91,0xb5,0x68,0x8e,0xf5,0x4e,0xb9,0xd3,0xff,0x7b,0x72,0x27,0xbf,0x9e,0xf7,0x16,0x8a,0x42,0x4f,0x3a,0x0a
.byte 0x09,0xfe,0x0b,0xf9,0x64,0xfd,0xa6,0xf2,0xaa,0x29,0x45,0xeb,0xe1,0x4c,0xf8,0x84,0x9d,0x19,0xf9,0x18,0xf6,0x72,0x9e,0x5f,0xf6,0x91,0xca,0xf7,0xda,0x88,0x0a,0x2c,0xb0,0xea,0x33,0x34,0xd0,0xa9,0x4c,0xd5,0x1f,0x91,0x08,0x74,0xc7,0x62,0x66,0xb4,0x60,0xdb,0x76,0x3e,0x17,0x43,0x73,0xdd,0x67,0x71,0xaa,0xc0,0x6c,0xe2,0x1c,0x54
.byte 0xfe,0x97,0x5e,0xf9,0x1b,0xa7,0x61,0xf2,0x40,0x96,0xc1,0x06,0x14,0xc8,0x7f,0xe5,0xec,0x66,0x2d,0xca,0x53,0xd1,0xf8,0x49,0x59,0xce,0xfd,0x79,0x20,0xe0,0xd4,0x3d,0x4f,0x25,0x7e,0x43,0x51,0x58,0x84,0x7e,0x23,0x29,0x4d,0xc3,0x4f,0x60,0x11,0xbb,0xc4,0x7b,0x67,0x32,0xd4,0x33,0x70,0x65,0x16,0x02,0x0f,0xdd,0x19,0xde,0xc2,0x1c
.byte 0x69,0xd2,0x39,0x79,0xd0,0x81,0x91,0xc0,0x3d,0xb3,0xee,0x79,0xcc,0xdd,0x81,0x0a,0x7c,0x92,0x5f,0x23,0x4e,0x66,0xbc,0x0a,0xc4,0xab,0xf4,0xf4,0x31,0x74,0x46,0xd9,0x74,0x18,0xe3,0x68,0xc2,0xc9,0x04,0x73,0x5a,0xb4,0xd3,0x87,0xda,0x56,0xe7,0x60,0xb2,0x2b,0x1e,0xd3,0x20,0x72,0x33,0x40,0xa6,0x4b,0x26,0x6f,0xcc,0x05,0x57,0x62
.byte 0x17,0x0d,0x7d,0x14,0x5d,0xe8,0x7c,0xa9,0x1e,0x2e,0xbb,0x6f,0xb4,0x2f,0x3e,0xec,0x3b,0x62,0x1c,0xae,0x9d,0x2d,0x6c,0x9f,0x1f,0xed,0xd0,0xb1,0x99,0x71,0xd0,0x79,0x0b,0x80,0x68,0x3b,0xeb,0x47,0xb0,0xf4,0xec,0x8a,0x1f,0x9f,0x55,0xb6,0xf4,0xfc,0xd0,0xb5,0x7d,0xa8,0xd0,0x70,0x73,0x32,0x87,0x5e,0xb9,0x61,0x5c,0xc1,0xdc,0x5d
.byte 0x2e,0x1f,0xfb,0x83,0x82,0xaf,0xfa,0xa9,0x6b,0x61,0x4b,0xe4,0x4a,0xa7,0x50,0x28,0x8d,0x7f,0x27,0x1b,0x8e,0xb1,0x81,0x1a,0x60,0xa5,0x1e,0x79,0x0a,0xcf,0xc6,0x4e,0x0e,0xdf,0x67,0xe2,0x08,0xb5,0xbb,0xa7,0xa2,0x5a,0xcf,0xa2,0xc2,0xd3,0xdf,0x7f,0xb8,0xbb,0x06,0x44,0xd9,0xfb,0xa9,0xa4,0x3b,0x8e,0x93,0x64,0xce,0x54,0x9c,0x6d
.byte 0xce,0x2d,0xca,0xb7,0xbf,0xb1,0x13,0x8c,0x53,0x25,0x7b,0xcb,0x4d,0x15,0x99,0xe8,0x3e,0xdd,0xf9,0x0a,0x64,0xd0,0x52,0xc1,0xd9,0x08,0xb7,0x6c,0x47,0xcb,0x76,0x9f,0xda,0x38,0x5c,0x8d,0x81,0xd2,0x74,0xc7,0xa5,0xb2,0x44,0x1d,0xa5,0x92,0xb8,0x0d,0x99,0x97,0xd7,0x16,0x30,0x22,0xaf,0xac,0xcf,0x5a,0x5f,0x32,0x0e,0x18,0xce,0xfa
.byte 0xec,0x52,0x36,0xa5,0x03,0x00,0xc6,0xe6,0x4e,0x7c,0x22,0x97,0xbb,0xbd,0x19,0x60,0xec,0xc7,0xb3,0xb4,0xee,0x74,0x9a,0x66,0x6b,0x19,0x6c,0x41,0x02,0xd7,0x15,0x68,0xf9,0x13,0x9f,0xa4,0xf4,0xf1,0x58,0x0d,0x9e,0xf5,0x00,0x2d,0xce,0x6d,0xbb,0x2b,0x0a,0xcc,0x52,0xcb,0x17,0x6f,0xfa,0x22,0xfd,0x5b,0x01,0x3a,0x5b,0xee,0x48,0x71
.byte 0xbf,0xe8,0xad,0x7b,0x95,0xd8,0x6b,0x96,0x36,0x80,0x4b,0xf6,0x92,0x0d,0x86,0x8d,0xc3,0xeb,0x8f,0xe8,0x90,0x2f,0x21,0x16,0xb4,0x9b,0x89,0xbc,0x2d,0x72,0x7c,0x17,0xdb,0x35,0x07,0x0d,0x67,0x7e,0x99,0x04,0x89,0x14,0xcb,0x95,0xd7,0x35,0x58,0xbd,0x63,0x28,0x24,0x8c,0x05,0xea,0xab,0x75,0xd8,0xa9,0x14,0x2c,0xda,0xc8,0xcf,0x21
.byte 0x1e,0xaf,0xa9,0x7a,0x39,0x7a,0xc6,0x26,0x27,0xa5,0x62,0x51,0xe6,0x51,0xf2,0x9b,0xe8,0x02,0xa7,0x97,0xb5,0x8f,0x2f,0xff,0xf0,0xf0,0x7e,0x93,0x8d,0xd1,0x0c,0x5f,0x01,0xb7,0xb9,0x36,0x89,0x47,0xd4,0x30,0x02,0xf2,0xaa,0x28,0x3c,0x8e,0x25,0x8e,0x19,0x8e,0xfa,0x54,0x25,0x57,0xf2,0x38,0xbc,0x06,0xa5,0xcd,0x93,0xf4,0x9e,0x77
.byte 0x3d,0x58,0x8f,0x69,0x10,0xab,0xcc,0x38,0xb1,0xa8,0x2c,0x3e,0xde,0x80,0x6b,0xa6,0xd7,0x7e,0xbd,0x07,0xfe,0x8a,0x10,0xd8,0x1f,0x37,0x77,0xed,0x29,0x6c,0x45,0x6c,0x0d,0xb9,0xab,0xcf,0x4c,0x04,0x8c,0x0d,0xce,0x10,0x3a,0xfb,0x16,0xd3,0x89,0x53,0x5f,0x41,0xc0,0x18,0x6a,0x5e,0xd6,0xdd,0xc4,0x46,0x19,0x3b,0xbe,0x25,0xd5,0x03
.byte 0x27,0xfe,0x00,0x76,0x45,0x95,0x89,0x19,0x9c,0x2f,0x70,0xa7,0xb6,0x87,0x85,0x5e,0xd0,0xe4,0x2f,0x48,0x0f,0x52,0x3d,0x25,0x3a,0x45,0x5d,0x0b,0x55,0xcb,0xec,0x6d,0x97,0xaa,0xe9,0x7e,0xae,0x70,0x72,0xe2,0xbd,0x06,0xd7,0x4c,0x1d,0x1d,0x56,0xa7,0x24,0x09,0x4b,0xcb,0x09,0xc6,0x65,0xf1,0x5e,0x3d,0xeb,0x0a,0xc1,0x9c,0xc7,0x12
.byte 0xfd,0xd9,0xdb,0xe7,0xe2,0x52,0x5a,0x68,0x4f,0x90,0xf3,0xf8,0xa4,0xe1,0x46,0x30,0x47,0x31,0x54,0x67,0xbc,0xdc,0x77,0xd6,0x73,0xe7,0x55,0xc9,0x2e,0xbe,0xe9,0xb6,0x6f,0x7f,0x0f,0xd8,0x30,0x50,0x95,0x03,0x3e,0x8f,0x8a,0x3c,0x4c,0x86,0x63,0xb6,0x44,0xae,0x1b,0xbc,0x1d,0x90,0x1a,0x76,0x4e,0x92,0x98,0xba,0x59,0x73,0xf8,0xff
.byte 0x07,0xdb,0xc4,0x90,0x17,0x0d,0xf1,0x58,0x13,0x64,0x88,0xcc,0x16,0x30,0xec,0x70,0x87,0x20,0xfc,0x3e,0xf6,0x70,0x2e,0x92,0xcb,0x42,0x47,0x5b,0xb3,0xf1,0x89,0xf1,0xd7,0xf5,0x16,0x89,0xed,0xf5,0x04,0x1a,0x85,0x9e,0xe7,0x74,0x8c,0xd6,0x79,0x26,0x2c,0x21,0xcd,0xff,0x53,0xea,0xf9,0xff,0x69,0x82,0x35,0xdb,0xc1,0x2a,0x36,0xf6
.byte 0xf6,0x98,0x08,0x7c,0xcd,0x31,0x32,0x8e,0xb3,0xf5,0xe9,0xe4,0x38,0xec,0x38,0x08,0xa8,0xbc,0x83,0x3f,0xfa,0xbe,0xb6,0xd6,0x20,0x10,0xaa,0x3e,0x5d,0x6c,0x96,0x4f,0x31,0x63,0xf2,0x90,0xce,0x0a,0x4c,0x94,0x63,0xb7,0xb5,0xd1,0x4a,0xcb,0xf1,0xd6,0x21,0x23,0x07,0x49,0x80,0x6c,0xe6,0x4a,0x6a,0xa4,0x9c,0x10,0x31,0x34,0xe3,0xf5
.byte 0x3c,0x8c,0x53,0x7d,0x56,0x3e,0xc7,0x91,0x99,0x7c,0xd3,0x0a,0xa0,0x81,0x50,0x54,0x4c,0x8c,0x8f,0x53,0x6a,0xda,0x39,0x9e,0xc4,0xf5,0xa9,0x26,0xa0,0xc3,0x1f,0xb2,0x79,0x9b,0x51,0x0a,0x18,0x2a,0xe8,0xf5,0x94,0x30,0xa3,0x4e,0x27,0xc3,0xdb,0x8c,0xc6,0xa1,0x8f,0x4f,0xef,0x94,0x11,0x74,0xb6,0x05,0x9e,0xd8,0xc1,0x8f,0x8a,0x0f
.byte 0x38,0x36,0x70,0x68,0x66,0x56,0x14,0xf1,0xda,0xda,0xc2,0xe1,0xc8,0xaf,0x1f,0x85,0x95,0xa7,0xaf,0x17,0xdc,0x38,0x7e,0x05,0x23,0x1e,0x37,0x05,0x6c,0xde,0x1c,0x91,0x64,0x0d,0xd5,0x74,0xe7,0xef,0xee,0x01,0xac,0x85,0xbb,0xca,0x06,0x7c,0xab,0x8d,0xaa,0xb4,0xaa,0xd4,0xb8,0x0c,0xb8,0xcf,0x13,0x9b,0xd2,0x9d,0x22,0xa5,0x44,0x51
.byte 0xd5,0x87,0xdf,0x74,0xe1,0x70,0x8b,0xef,0x24,0x04,0xe8,0x3a,0x74,0xf1,0x35,0x89,0xc3,0x20,0x81,0xc7,0xaa,0x1e,0x51,0x5f,0x28,0x42,0x37,0xbc,0xaf,0x81,0xe3,0x4d,0xc5,0x10,0xcc,0xb4,0x6d,0xf6,0x81,0x73,0x1f,0xc5,0x59,0x78,0x7d,0xce,0x7d,0xab,0x20,0x4f,0x86,0x06,0xb9,0xa3,0xc5,0x97,0x76,0x5d,0xeb,0xc4,0x9f,0x22,0xb8,0x7b
.byte 0xc1,0x35,0x6c,0xd6,0x4e,0x12,0x26,0xf1,0xda,0xae,0x15,0xab,0xab,0xbc,0xd5,0x07,0x5b,0xf1,0x9a,0xf0,0xbd,0x7f,0x08,0x15,0xd1,0x12,0x23,0x7f,0x78,0x9e,0x89,0x54,0xd8,0x16,0x96,0xa1,0x14,0x45,0x12,0xce,0xda,0xad,0x41,0xa4,0x70,0xdf,0xfc,0xa3,0xdc,0x27,0xc2,0xa3,0x11,0x8d,0x25,0x8b,0x6d,0xda,0xd7,0x03,0x7d,0x32,0x32,0x3c
.byte 0x8a,0x97,0x8f,0x10,0xcc,0x40,0x89,0x17,0x5e,0x30,0x2b,0xd1,0xb6,0x44,0xb4,0x6c,0x44,0xe7,0xe0,0xd1,0xfb,0xe1,0x68,0xf5,0xc9,0xa8,0x3c,0xa6,0x0b,0x30,0xb5,0x7a,0x0a,0x15,0x43,0x57,0xbd,0x0a,0xcc,0x02,0x05,0x47,0xfb,0x10,0x30,0x07,0x8b,0x9e,0xae,0xd8,0x03,0x18,0x06,0x26,0x35,0xa8,0xae,0x1e,0x51,0x71,0xa8,0x4d,0x27,0x6e
.byte 0x25,0x27,0x77,0xb5,0x79,0x43,0x03,0x04,0xaf,0x61,0x04,0xbc,0x29,0x3e,0x6e,0xfe,0x35,0xc9,0x41,0xfc,0x8a,0x3c,0xd8,0xe4,0xa3,0x34,0x40,0x49,0x36,0x9b,0x18,0x8c,0x6a,0x34,0xa6,0x4c,0xed,0x51,0x8f,0x3a,0xaa,0xa2,0x3f,0xc6,0xce,0xa8,0x53,0x5a,0xa8,0x4e,0xc1,0x84,0x5d,0x2a,0x0b,0x24,0xe5,0x46,0x8e,0xc4,0x55,0x52,0xf4,0xf3
.byte 0x0c,0xa5,0x24,0x10,0x7e,0xfc,0xed,0x42,0x11,0x39,0xfd,0x3d,0x4a,0x07,0xaf,0x21,0x35,0x4a,0x51,0xcd,0xfb,0x98,0x9a,0x5f,0x15,0x3a,0xab,0xb0,0x56,0x39,0x17,0xcd,0xb9,0xa6,0x6d,0x73,0xbc,0x63,0x95,0xf8,0x78,0x65,0x6f,0x47,0xe9,0x5d,0x12,0x62,0x52,0xb6,0xb2,0x86,0x49,0x1b,0x53,0x3d,0x27,0xc4,0x17,0xa4,0x56,0xc9,0x85,0xbe
.byte 0xe1,0x54,0xed,0x72,0x03,0xd9,0x67,0x6f,0xd0,0xea,0xf7,0x5b,0x39,0x61,0x42,0x48,0xd5,0x8d,0xfb,0xe6,0x3b,0x93,0x16,0x42,0x29,0x0b,0x27,0x1d,0x1f,0xae,0x78,0x16,0x59,0xa6,0x33,0x36,0x86,0x8d,0x31,0x30,0x9e,0xa0,0x82,0xdd,0x02,0x1c,0xde,0x01,0x0f,0x87,0x85,0x2e,0xbb,0x68,0x46,0x8e,0xfc,0xfe,0x32,0x78,0xe4,0x27,0x4f,0xb2
.byte 0x12,0x94,0x95,0x93,0xba,0x09,0xb4,0x58,0x5c,0x0e,0xa4,0x8a,0x6f,0x0a,0xfc,0xac,0x9f,0x99,0x8a,0x06,0xaa,0x9f,0x69,0x4f,0x3c,0xec,0xe5,0x52,0x60,0x60,0xb8,0xfe,0xf6,0x27,0x47,0xff,0xc9,0x2f,0xec,0xed,0x50,0x07,0xe5,0x3e,0x28,0x65,0xb3,0x36,0x52,0x5c,0xa9,0x4c,0x64,0x65,0x5f,0xfe,0xe3,0xe6,0x19,0x4b,0xdc,0xa0,0x3f,0xab
.byte 0xff,0xca,0x37,0x03,0x83,0xb1,0xe2,0x35,0x69,0x08,0x6d,0x08,0xe4,0xa8,0xc5,0x04,0xe0,0x00,0x66,0x70,0x96,0x16,0x21,0x07,0xe2,0xbc,0x92,0x30,0x31,0x6d,0x02,0xeb,0xbf,0x5a,0x8c,0x39,0x7a,0xd6,0xba,0x15,0x52,0xf6,0xf7,0x30,0x08,0x04,0x5a,0x84,0x56,0x7d,0x8c,0xf1,0x3b,0x87,0xc9,0xfd,0x76,0xd0,0x6d,0x28,0x93,0x4f,0x23,0x9b
.byte 0xf7,0x26,0x7a,0xfe,0xc2,0xde,0xf4,0xb6,0x9c,0x29,0xcc,0x45,0x1a,0x50,0x52,0xab,0xa2,0xef,0x38,0x69,0xe7,0x73,0x54,0xa1,0xf3,0xce,0x31,0xe6,0xa3,0x8a,0x26,0xa5,0x37,0x39,0x88,0xa4,0xf0,0x39,0xb5,0x52,0x2c,0x3d,0xc7,0x60,0xe0,0x9e,0xfe,0xa4,0x4e,0x00,0xf3,0x58,0x4b,0x8a,0xb0,0x9a,0xfc,0x31,0xc5,0x1a,0xd5,0x80,0x37,0x06
.byte 0x35,0xc2,0x52,0xff,0xa3,0xff,0xd6,0xb5,0xbd,0x66,0x3b,0x61,0x00,0x1e,0x0a,0x9c,0xea,0x8b,0xb1,0x89,0x8a,0x5d,0xe2,0x4f,0x9a,0xf5,0x45,0xe8,0x76,0xa1,0xcf,0x12,0x57,0x74,0x00,0x8f,0xd4,0xc7,0x69,0xef,0x81,0x0e,0x87,0x0c,0xd9,0x54,0x59,0x73,0xed,0x37,0xb8,0xd6,0x90,0x6a,0xae,0x35,0x60,0x77,0x3f,0xd8,0xb6,0x07,0x6e,0x7a
.byte 0x80,0x6b,0x51,0x7a,0xbe,0xd3,0x7c,0xe3,0xaf,0x75,0xee,0x25,0x84,0x14,0x74,0x64,0xed,0xc1,0x06,0x44,0xf8,0x1d,0x92,0x95,0x3e,0xfa,0x7b,0x01,0x5c,0x07,0xda,0x3e,0xb1,0x25,0x25,0xf2,0xf9,0x4f,0x07,0x91,0x96,0xf9,0x22,0x39,0x79,0x4e,0x5b,0x82,0xb1,0xb1,0x4c,0x28,0xba,0x13,0x76,0xd1,0x74,0xda,0x52,0xf9,0x2b,0x08,0x05,0x81
.byte 0x9b,0xa2,0xf1,0x17,0x96,0x23,0x37,0x37,0x4f,0xc4,0x81,0x30,0xff,0xfe,0xb2,0x3a,0xc3,0x73,0x91,0xd3,0x75,0xaf,0x99,0xc1,0x8e,0x18,0x9e,0x73,0xef,0xad,0x37,0xc4,0x1f,0xeb,0x67,0x3b,0xba,0x5d,0xc8,0x65,0x7a,0x8f,0xdf,0x1c,0x3e,0x6e,0xca,0xca,0x48,0x67,0x6b,0x10,0xad,0x43,0x06,0xe8,0xd5,0xfc,0xf5,0x5f,0x10,0x20,0x43,0x20
.byte 0x5e,0x84,0x49,0x15,0x13,0x0d,0xf2,0x4e,0x9f,0xcf,0x66,0xab,0x6d,0x52,0x43,0x62,0xc3,0x84,0x8a,0xee,0x99,0x3f,0x2f,0xbf,0x05,0x72,0x0d,0xad,0x97,0x5e,0x58,0x09,0xe7,0x88,0xe6,0x79,0xe4,0x2e,0xa4,0x10,0x0f,0x1e,0x8e,0xb4,0x01,0x24,0xf0,0x3e,0x16,0xad,0xf4,0x77,0x87,0x86,0xff,0xb6,0x32,0xa3,0x98,0xc4,0xb3,0xd6,0x6e,0x55
.byte 0xca,0x93,0x18,0x5d,0x55,0xd4,0x08,0x73,0x42,0x32,0xc0,0xa2,0x92,0x33,0xa8,0xdf,0x7e,0xd9,0x99,0x3d,0x4a,0x88,0xf6,0xff,0x78,0xbd,0x94,0xd5,0x70,0x11,0x29,0x00,0x89,0xe8,0x76,0xe2,0x98,0x53,0xaf,0x8e,0x30,0x63,0x43,0x35,0x68,0x96,0xbc,0xdd,0xb8,0xca,0xca,0x23,0x9b,0xb8,0x05,0xbe,0x63,0xa0,0x16,0x53,0xef,0x2d,0x8d,0x6c
.byte 0xaa,0xba,0x77,0xd1,0xcf,0xde,0x04,0xbb,0x8a,0xd2,0xc1,0x0e,0xbf,0x4e,0x21,0x8b,0xf3,0x25,0x2f,0xe3,0xef,0x3f,0xd6,0xd2,0x73,0xf1,0xb2,0x1c,0x82,0x19,0xd1,0xb0,0x71,0x5a,0x87,0xcc,0x67,0x22,0x7f,0x3f,0xeb,0xfe,0x9c,0x30,0x65,0x48,0xbd,0xe0,0x9b,0x10,0x22,0xe3,0x36,0xab,0xf4,0x69,0x62,0x24,0xb7,0xc7,0x51,0xe3,0x33,0x7e
.byte 0x1a,0x05,0xad,0x3a,0xf5,0x63,0x21,0xcb,0x87,0x30,0xa1,0xb4,0xf6,0xd1,0xfd,0x30,0x73,0x32,0x4a,0xf5,0x20,0xe8,0x29,0xa1,0x37,0xed,0x5e,0xcb,0xf8,0x3e,0x03,0x7f,0x2f,0x4c,0x56,0xaa,0x35,0xf3,0xd3,0x4b,0xda,0xe6,0x49,0xf3,0x3a,0x62,0x88,0x31,0x76,0x09,0x60,0xf8,0x22,0x0b,0x1c,0x2f,0x3a,0xf9,0x64,0xc4,0xce,0x68,0x41,0xc7
.byte 0x85,0x25,0xdc,0x81,0xe7,0x60,0x36,0x48,0x44,0xdb,0x64,0x72,0x00,0xe4,0x98,0x53,0x2a,0x48,0x21,0xbe,0xb9,0x52,0xc8,0xc5,0xaa,0xb1,0x2b,0x0f,0xeb,0x24,0xd1,0x4f,0x0d,0x4e,0x52,0xf0,0x8f,0xa8,0x13,0x94,0x0d,0x01,0xea,0xdd,0xeb,0x4c,0xb8,0xcb,0x31,0x2e,0xe4,0x5d,0x1f,0x37,0x86,0xfd,0x52,0x10,0xf3,0x02,0xf6,0x32,0xf5,0x34
.byte 0xb7,0xa9,0x87,0x43,0xf1,0x46,0x06,0x8e,0xa7,0x1c,0x8c,0x34,0x17,0xaa,0xf7,0x59,0x33,0x2f,0xdd,0x27,0x37,0x9e,0x44,0x65,0x81,0x29,0x86,0x44,0xa8,0xdf,0xc7,0x3d,0x67,0x9f,0x14,0x50,0xd7,0xe0,0x59,0x7f,0xd9,0xdb,0xdf,0x19,0xe9,0x03,0x81,0xae,0xf8,0xa9,0x36,0x3b,0x7c,0x3c,0x30,0x6a,0x4f,0x76,0x07,0xfb,0x0d,0xa8,0xaf,0x4d
.byte 0x97,0x2f,0x2c,0x0f,0x73,0x45,0xba,0x60,0xd0,0x50,0xf7,0xf7,0xba,0x04,0xf0,0x8c,0xdb,0x68,0x04,0xbb,0xa2,0xf5,0x6a,0x58,0xeb,0xec,0x7e,0x68,0x3e,0x6c,0x69,0x6f,0x32,0x9c,0x74,0xb6,0x4a,0x8f,0x34,0x3c,0x36,0xb2,0xfc,0xfb,0xbb,0x9b,0xd9,0xbc,0x00,0x31,0x59,0x0d,0x85,0x66,0x1c,0xfb,0x99,0x55,0x78,0xdd,0x0d,0x92,0xec,0x85
.byte 0x97,0xc1,0x6f,0xf5,0x6b,0x25,0xed,0x6f,0x09,0xef,0x50,0xdd,0xc2,0x90,0xb1,0x7d,0xa0,0x27,0x7b,0xa8,0x5f,0x35,0x0c,0x51,0x54,0x6e,0x64,0x4f,0x5d,0xcf,0x2f,0x5f,0xe7,0x99,0xb5,0xc1,0x91,0x4c,0xc0,0x24,0x01,0x4b,0x44,0x95,0xfc,0xd1,0x9f,0xa5,0xd0,0xe1,0x4f,0xb0,0x56,0x99,0x8b,0x03,0x44,0xf9,0x5e,0xfe,0xbe,0xa2,0xcc,0x58
.byte 0x3b,0x69,0xbf,0x44,0x67,0x8e,0xd1,0xb2,0x66,0x3c,0x8e,0x68,0x6b,0x1b,0x5c,0xfb,0xeb,0x84,0xf2,0x92,0x43,0x8d,0x7c,0x64,0x11,0xc8,0xf5,0xda,0xf5,0x4f,0xeb,0x8b,0x91,0xac,0x6b,0x47,0xe0,0xfc,0xaa,0x89,0xe8,0xd2,0xba,0x58,0x43,0xbb,0x9e,0x13,0x20,0xa1,0xfe,0xf7,0xa5,0x15,0x82,0x0d,0xbb,0xc3,0x60,0x40,0xf5,0x49,0xd5,0xea
.byte 0x71,0xad,0xd7,0x7d,0x8c,0x90,0xd2,0xe5,0x51,0x8a,0x01,0x3d,0xbf,0x59,0x00,0x41,0x59,0x65,0xba,0x18,0x30,0x86,0x2a,0xcb,0x41,0x24,0x9a,0x44,0x54,0xac,0x07,0xf2,0xcf,0xe9,0x3c,0xec,0xd0,0x7d,0x91,0x0e,0xb5,0xbd,0xed,0xc4,0xf2,0x90,0x27,0x2f,0x31,0x31,0x96,0xd2,0xfc,0xe2,0x6e,0x70,0x61,0x81,0x7b,0xc8,0x8d,0x78,0x41,0xb9
.byte 0x56,0x64,0x01,0x37,0x86,0x54,0xec,0x2b,0xdb,0xd5,0xef,0xf7,0xf4,0x73,0x8d,0x84,0xdd,0x5c,0xd4,0x00,0x23,0x2b,0x4c,0x4c,0x04,0x4b,0x4b,0x61,0xd0,0x4b,0x38,0x8f,0x5e,0x56,0xb2,0xc5,0xc7,0x72,0x04,0x33,0xed,0xd7,0x91,0x99,0x22,0xee,0xdf,0xe5,0x65,0x55,0x9a,0xcb,0x32,0x22,0x48,0x6d,0x55,0xe8,0x9f,0xf9,0x95,0x62,0x45,0xdc
.byte 0x21,0x6e,0xc5,0xb2,0x8e,0x4d,0x9a,0xf2,0x2b,0x2e,0x6f,0x40,0xd1,0x2f,0x4d,0xda,0xbd,0x85,0xb1,0x6f,0x04,0x39,0x09,0xfa,0xa1,0x3b,0x86,0xe6,0xdb,0x3e,0x50,0x27,0x48,0x51,0x2c,0x1e,0xe5,0xf0,0x82,0xb6,0xfc,0xd7,0xc3,0x3f,0x3f,0x16,0xa6,0xbc,0x85,0x60,0x8f,0x6e,0xd9,0xd7,0xbd,0x93,0x33,0xf4,0xd2,0xb6,0xb4,0x9f,0x73,0xef
.byte 0xa5,0x59,0x32,0x4c,0x89,0x1f,0xb0,0x0b,0x71,0xf1,0xa1,0xa3,0xdb,0x4d,0xed,0xcc,0x59,0xfe,0xe9,0x6f,0x60,0x96,0xa3,0x11,0x46,0xc5,0x3d,0x60,0x53,0x39,0x3e,0x6c,0x87,0xbb,0x14,0x85,0xe6,0x0f,0x80,0x8c,0x7d,0x63,0xdc,0x34,0x20,0xc0,0x5d,0x7f,0xb4,0x19,0xdd,0xb2,0xe5,0x36,0x86,0xb9,0x88,0x7b,0x18,0x81,0x2e,0xc9,0xdd,0xf9
.byte 0x8a,0xb8,0xc9,0x21,0x16,0x5f,0xd3,0x8c,0x49,0xdc,0xe0,0x65,0x9f,0x41,0xe4,0x5a,0x52,0x07,0x1e,0x35,0xbb,0x6f,0x06,0x42,0xc7,0x91,0x66,0xc8,0x93,0xe1,0x89,0x39,0x43,0x3a,0x76,0xdb,0x14,0x41,0x91,0x90,0xcf,0x55,0x78,0x36,0xbd,0x52,0x5f,0x23,0x9e,0x59,0x45,0xad,0x00,0xdf,0xac,0x50,0xc3,0xe1,0xa4,0xca,0x5b,0x3e,0xf7,0x7d
.byte 0x51,0x21,0xb0,0x61,0xc6,0x3d,0xca,0xc0,0x06,0x9d,0x16,0xd3,0x7c,0x08,0x56,0x5f,0xc6,0xf2,0x27,0xe6,0x60,0x39,0x8f,0xf7,0x41,0xd4,0x3c,0xb9,0x25,0x1c,0xa2,0xb8,0xc6,0x73,0x6e,0x71,0x92,0xb6,0x3d,0xed,0x9d,0x1c,0x76,0xd3,0x8d,0x56,0xd7,0xc6,0xd6,0x1f,0x6a,0x0d,0x3c,0x91,0xeb,0x3a,0x7b,0x38,0x6b,0x18,0xcb,0x91,0x56,0xc2
.byte 0xf6,0xa6,0xb2,0x5f,0x36,0x31,0xa2,0xd9,0xdf,0x49,0xb3,0xeb,0xf5,0x60,0xbe,0x95,0x57,0xa1,0x22,0x3e,0xb5,0x81,0x0a,0x58,0xc7,0x65,0x3d,0xb8,0x89,0x5b,0x91,0x5d,0x21,0x29,0x87,0xa9,0x03,0xdb,0x4c,0x36,0x4c,0x4f,0xf0,0xe5,0x4a,0x73,0x34,0x97,0x62,0x40,0x4e,0x2b,0x66,0x71,0xfc,0x4f,0xa2,0x99,0xbb,0xe6,0x59,0x82,0xca,0x6d
.byte 0x61,0x35,0x6e,0xb3,0x2c,0x3c,0xb6,0xa0,0xb5,0x91,0xb2,0xe1,0x11,0x7d,0x8a,0xfd,0x32,0xff,0x67,0xbd,0xe7,0x98,0xcb,0x25,0x8a,0xea,0x03,0xbe,0xd0,0xf2,0x14,0x97,0x7a,0xc0,0x8a,0x4f,0x04,0x26,0x26,0x01,0x24,0xd4,0x50,0x57,0x73,0xdb,0xe9,0xc2,0xbc,0xc8,0x47,0x08,0x64,0x16,0x33,0xa1,0x5e,0xac,0x2c,0xa3,0x8e,0x88,0x88,0x66
.byte 0x0a,0x3b,0x11,0x39,0x44,0x3c,0xab,0xb1,0x69,0xe0,0x42,0xc2,0xda,0xda,0x0d,0xdd,0x4d,0x66,0xc2,0xdf,0xb7,0xa1,0xa0,0xb3,0x82,0x95,0xe3,0x62,0x2e,0x29,0xb4,0x97,0x75,0x6a,0x3a,0x23,0x29,0x67,0x69,0x53,0xd5,0x9a,0xba,0xc8,0x42,0xfe,0x54,0xba,0xca,0x4f,0x8f,0xaa,0xb0,0x76,0x69,0x83,0x84,0x0d,0x3b,0xf8,0x15,0x37,0xbc,0x86
.byte 0x15,0x98,0x89,0xc6,0x8c,0x40,0x52,0xf9,0xe7,0x87,0xdb,0x19,0x64,0xb7,0x1f,0x32,0xdb,0x41,0xe8,0x7a,0xcf,0x4c,0x98,0xc0,0xfb,0x33,0xbd,0x84,0x6d,0x9c,0xbd,0x1c,0xdb,0xba,0x1b,0x3b,0xb1,0x22,0x3e,0x6f,0x74,0x36,0xe2,0x54,0xb3,0x87,0x70,0x27,0x4c,0x5f,0xb9,0xe4,0x90,0x8b,0x63,0x0c,0x3d,0xed,0xa0,0xb0,0x36,0x2c,0x96,0xd6
.byte 0xc7,0x49,0x3e,0x29,0xc7,0x62,0x5a,0x3b,0x57,0x9c,0x91,0x68,0x8f,0x4e,0x80,0x18,0x9c,0xba,0xd1,0xcc,0x5a,0xdf,0xa0,0x88,0xbc,0x8f,0x31,0xaa,0xbc,0xd0,0xde,0x43,0x57,0x20,0x12,0x3e,0x88,0x58,0x1f,0xd5,0x68,0xba,0x87,0x38,0x94,0x6f,0x24,0x03,0xf4,0xe0,0x34,0xab,0xab,0x35,0x71,0xad,0xb0,0xaf,0x0f,0x9a,0x29,0xfa,0xde,0x69
.byte 0xe8,0xcc,0xcd,0xaa,0x28,0xfe,0x85,0xdd,0xba,0xcf,0xdf,0x71,0xdc,0x12,0x77,0x94,0x70,0xd7,0x27,0xe6,0xab,0xa9,0xb3,0x8a,0x73,0x58,0x90,0x86,0x9a,0x0e,0xe1,0xae,0x8e,0x3c,0x07,0x8f,0xb4,0x9d,0x87,0x8f,0xb2,0xa3,0x3b,0x49,0x76,0x63,0xbf,0x6b,0x75,0x52,0x54,0x66,0x4c,0xa8,0xa9,0xb2,0xd4,0x4f,0xb0,0xd0,0x9e,0xfd,0x26,0x23
.byte 0x57,0x4f,0xa5,0x99,0x1c,0xbe,0x67,0xbb,0x26,0xd2,0xcb,0x1a,0x18,0xd6,0x5f,0xfa,0x91,0xfd,0x30,0x3b,0xf4,0x02,0xa2,0x36,0x0c,0xfe,0x30,0xb2,0xc8,0x96,0xe1,0xa9,0x75,0xad,0xf3,0xb7,0x20,0x9b,0x47,0xee,0x5c,0xae,0x7b,0xfe,0xbd,0x38,0x8b,0x2b,0x7d,0xb8,0x92,0x59,0xd7,0x3b,0x91,0x40,0x5e,0xa8,0x20,0x6f,0x45,0xd8,0xd4,0x5f
.byte 0x33,0x8f,0x6a,0xd3,0x67,0x9e,0x46,0x17,0xb8,0x02,0x31,0xc0,0xdc,0x5e,0x35,0xfa,0x22,0xb6,0x7e,0xbf,0xd6,0xc9,0x4e,0x66,0xa1,0xd2,0xd8,0x2a,0x84,0x2c,0xd6,0xb1,0x15,0xda,0xdb,0x3e,0xc4,0x61,0x93,0x08,0x64,0x8d,0xf0,0x61,0x9d,0xeb,0x12,0xcc,0xd1,0x3b,0xf7,0x9f,0x1a,0x18,0xe7,0xc8,0x00,0x6b,0xfd,0x84,0xd6,0xed,0xb5,0x40
.byte 0x69,0x72,0xd3,0x19,0x7d,0x24,0x7b,0x19,0xf2,0x57,0x58,0x19,0x75,0xec,0x26,0xe7,0x90,0x9d,0xe5,0x9d,0x91,0xa6,0x64,0x2e,0x29,0x15,0xc6,0x7f,0x7c,0x05,0x35,0xd5,0xe5,0x8e,0x36,0xce,0x49,0xc7,0xcd,0x69,0xa2,0xf9,0x1b,0xd5,0x84,0x13,0x4b,0x4a,0xb1,0x6c,0x15,0x6e,0xf2,0xf1,0x47,0xef,0x8a,0x18,0x6f,0xbc,0x36,0xfe,0xc3,0x85
.byte 0x2b,0x46,0x7b,0x1c,0x31,0xa6,0x41,0x33,0xaa,0x62,0x6f,0x17,0xae,0xd4,0x23,0x9b,0x93,0x79,0xdc,0xac,0x53,0x01,0x83,0x81,0x2b,0xef,0x5b,0x79,0x6a,0x8a,0x82,0xfe,0x9c,0xe3,0x08,0x06,0x57,0x2d,0xf0,0xc1,0x3a,0xa9,0x8c,0x57,0xa9,0xa6,0x13,0xf5,0xfc,0x2c,0xef,0x96,0xaa,0x3b,0xe9,0x5b,0xf0,0xb9,0x38,0x3d,0xe3,0x8c,0xa2,0xaa
.byte 0x2c,0x75,0xca,0xc5,0x0a,0x72,0x8b,0x48,0xc7,0x97,0xd3,0x06,0x38,0x13,0x52,0xde,0x38,0xed,0x20,0xd1,0x43,0x24,0xee,0xd7,0x97,0x56,0x2c,0x46,0x09,0x38,0x13,0xd9,0x0a,0xa3,0x45,0x01,0x29,0x2b,0xf4,0xff,0x8e,0x87,0x94,0x4e,0xaf,0x35,0xdb,0x17,0x49,0xa7,0x53,0x0e,0x0f,0x8f,0xee,0x08,0xa1,0xee,0x54,0x73,0x66,0x6f,0xd3,0x17
.byte 0xec,0x72,0x51,0x54,0x5e,0x06,0xaa,0x10,0x1f,0x2c,0xe0,0x34,0xd9,0x4d,0x34,0x0f,0xbd,0x9e,0x18,0x33,0x83,0xdb,0xbe,0x9a,0x9d,0x44,0xd4,0xef,0x8e,0x9d,0x5e,0xe5,0x29,0x2b,0x98,0xfc,0xfc,0x7a,0xb4,0xd7,0x34,0x81,0x43,0xae,0x46,0x01,0x81,0xb9,0xb7,0x93,0x00,0x35,0x55,0x72,0x7a,0x54,0xc2,0x59,0xda,0xe7,0x14,0xee,0x9e,0x04
.byte 0xe2,0x60,0x5a,0x71,0x58,0xb5,0xdc,0x98,0xf2,0xc7,0xce,0x37,0x7a,0x31,0xcf,0x5a,0x25,0x56,0x5c,0x1c,0x97,0x22,0x70,0xc2,0x91,0xf7,0xb2,0xff,0x69,0x8e,0x5b,0xaf,0xf8,0xd3,0x3e,0x35,0x0a,0x69,0x3c,0xd5,0x79,0xb6,0xef,0xbe,0xf8,0x47,0xe5,0xc5,0x82,0xca,0x12,0xde,0x86,0x1d,0xbe,0xbe,0xe1,0xc3,0x37,0xdd,0xb9,0x3e,0x6b,0xbf
.byte 0xe7,0x37,0xc2,0x6d,0xe5,0xa0,0x57,0xd8,0x5d,0x7e,0xff,0x9e,0x4b,0xb9,0x04,0x0c,0x3b,0x40,0x64,0xc8,0x50,0x68,0x7b,0x9d,0xbe,0x64,0x31,0x8f,0x8b,0x4d,0x74,0xa8,0x09,0xd3,0x36,0x0f,0x9e,0x56,0xdd,0xb7,0xee,0x81,0x88,0x06,0x12,0xf8,0xf6,0xca,0x7f,0x97,0x04,0xc8,0x23,0xea,0xc2,0x07,0x3e,0x22,0xca,0x2a,0xe2,0xf3,0x4f,0xfe
.byte 0x42,0x09,0x78,0x13,0xe5,0x4e,0x91,0xc7,0x33,0x5d,0xf4,0xf4,0x07,0x85,0x7b,0xd4,0x79,0x31,0xd1,0xcb,0xac,0xc9,0x54,0x53,0x39,0x37,0x82,0x6b,0x54,0xbe,0x30,0x7b,0x7d,0x8d,0xe7,0xc6,0x04,0xc2,0xa9,0x27,0x27,0x0c,0x38,0xd5,0x6d,0x32,0x6f,0xe1,0xa0,0xe2,0x41,0x6e,0x11,0x1e,0xe7,0x32,0x9d,0xa2,0x3e,0x16,0xaa,0x96,0xd9,0xd1
.byte 0x78,0xde,0xd3,0x42,0xcf,0x27,0xba,0xea,0x82,0xdc,0xf8,0x32,0xa6,0xb9,0x19,0x6a,0x9a,0x0c,0x21,0xae,0xb2,0x0f,0x5c,0x5b,0x64,0x6f,0x29,0xcc,0x5c,0x59,0xc6,0x9d,0x42,0x9b,0x60,0xb0,0x64,0x5e,0xbe,0x22,0xa1,0x00,0xc1,0xc4,0x8f,0x5e,0x3c,0x2a,0x34,0x63,0x41,0x66,0xa7,0x38,0x50,0x57,0xd3,0xd4,0x88,0xb1,0x82,0xaf,0x48,0x29
.byte 0x48,0x6d,0x31,0x21,0x76,0x71,0xfb,0xea,0x95,0xdd,0xe0,0xd6,0xa4,0xf9,0x3f,0x09,0xf0,0x8f,0x9c,0xdc,0x67,0x8d,0x11,0xf6,0xad,0x00,0x93,0x71,0x5d,0x2b,0xe1,0xb6,0x7a,0x1a,0x80,0xbd,0x1f,0x01,0xe7,0xd5,0xbb,0x9a,0x42,0x75,0x29,0x83,0xe4,0x4f,0x54,0x67,0xbf,0x16,0xf5,0x6c,0x67,0x5b,0x0d,0xb6,0x24,0xb6,0x36,0xa5,0x9c,0xfe
.byte 0xa5,0xfe,0x3e,0x72,0xf4,0x1b,0x3e,0x6d,0xd9,0xd7,0xe3,0xb4,0x44,0x36,0xc1,0x87,0x56,0xe2,0x77,0x61,0xea,0xc6,0xfe,0xf6,0xfb,0x48,0xd0,0xa4,0x99,0xf7,0x1a,0x85,0x4a,0xd1,0x6d,0xad,0x84,0xeb,0xd3,0x6d,0x1d,0xfd,0xaf,0x3f,0xde,0x3c,0x26,0xae,0x55,0xad,0x97,0x42,0xd5,0x6e,0xd7,0x7e,0x6b,0x42,0x7f,0x3a,0xa6,0xa8,0x27,0x0a
.byte 0x68,0xbf,0x6e,0x41,0x51,0x1d,0x01,0x1a,0x93,0x50,0xc5,0xd8,0x4f,0xbf,0x42,0xca,0x37,0x07,0x01,0xe8,0xd1,0xf1,0x2a,0x3a,0xa2,0xc3,0x2a,0xc8,0x4b,0xde,0x66,0xf4,0x38,0xc5,0x36,0x4e,0xe9,0x3b,0xad,0xcd,0x5f,0xe1,0x40,0xc3,0xea,0x93,0x7d,0x45,0xfb,0xab,0xde,0x52,0x9b,0x96,0x90,0xfe,0x67,0xf5,0x43,0x6e,0x1a,0x3f,0xf8,0x47
.byte 0x68,0xf7,0x9e,0x08,0x70,0x45,0x4f,0xbc,0x5c,0x0b,0x4c,0x01,0xe8,0x96,0xfd,0xae,0xe4,0x41,0x75,0xe6,0xb0,0x66,0x68,0x2f,0x43,0xcd,0x55,0x20,0x99,0xd0,0x48,0x34,0x38,0x0b,0xb7,0x77,0x3a,0x4c,0x3e,0xb5,0x57,0xaa,0x11,0xbb,0xc9,0xcf,0x04,0x78,0xbb,0x49,0x41,0xee,0x6d,0x39,0xfa,0x09,0xe7,0x13,0xf3,0x23,0x41,0xdc,0x2e,0x93
.byte 0x65,0xc8,0xda,0x1b,0x18,0x99,0x07,0xaf,0x67,0x6e,0xcd,0xf1,0x66,0xab,0x1f,0x89,0x4b,0x8f,0x2c,0x09,0x2f,0x87,0xe1,0xd0,0xb0,0x6d,0x2c,0xa4,0x16,0x6c,0x9e,0x9f,0x8f,0x92,0x0e,0x21,0xf1,0x06,0x67,0x93,0x53,0x51,0xd4,0xcb,0xa2,0x12,0xf4,0xd4,0x87,0x2e,0x12,0xd5,0x98,0xba,0x95,0xe3,0xd3,0xbe,0x3f,0x20,0x39,0xe5,0xbb,0x9e
.byte 0xaf,0xcc,0xa0,0x71,0xd8,0x8d,0x35,0x4b,0xf0,0x98,0x71,0x57,0x00,0xd3,0xb3,0xba,0xe3,0x04,0x24,0xb9,0xee,0x75,0x40,0x83,0xb4,0x11,0x0d,0x0d,0xf6,0xe0,0x10,0xf0,0x30,0x4c,0x45,0x71,0x5a,0x2e,0xd0,0xc8,0xcc,0xa9,0x5a,0xc8,0x10,0xb3,0x7c,0x07,0xf7,0x0b,0x8d,0x1e,0xe1,0xf1,0xa0,0x82,0xfd,0x1d,0xe4,0xad,0x8a,0x37,0xa3,0x81
.byte 0xff,0x14,0x12,0x74,0x42,0x81,0x7f,0x5c,0x89,0x47,0xcc,0x3c,0x27,0x92,0xf9,0xfa,0x9f,0xb8,0x6f,0xfe,0x36,0x23,0x1d,0x94,0xf3,0x43,0x09,0x82,0x87,0x46,0x92,0x8c,0x6a,0xbb,0x41,0x42,0xef,0x4d,0xa5,0x55,0x8a,0x48,0x13,0xd8,0x86,0x03,0x5b,0x48,0x3a,0x2b,0xcf,0xfd,0x35,0xb2,0xd4,0xf8,0x61,0x9c,0x0b,0x70,0x65,0x67,0x54,0x46
.byte 0x8d,0x2f,0xc6,0x97,0x12,0xff,0xfe,0xc9,0x23,0x64,0xcd,0xb7,0x14,0xa5,0x41,0x43,0xf3,0x0d,0x08,0xe4,0xf0,0x41,0x46,0x57,0x4b,0xdb,0x42,0xac,0xd5,0x0d,0xc8,0x33,0x84,0xa9,0x57,0x05,0x03,0xaf,0xbd,0x4f,0x48,0x5f,0xc2,0x3c,0xb9,0x07,0x79,0x47,0x2c,0x3c,0x71,0x1b,0x74,0xb9,0xc3,0x5a,0x65,0xc7,0xff,0x70,0xfb,0xc0,0x63,0x98
.byte 0x81,0x3d,0xd0,0x57,0x42,0x79,0xa2,0xdb,0xe6,0x2a,0xe0,0x00,0x4e,0xdf,0x3d,0x9d,0xc9,0x40,0x09,0x01,0x30,0x0d,0xa8,0xce,0x40,0x55,0x95,0xaf,0x01,0x48,0x74,0x16,0x99,0xa3,0xdf,0x63,0xa6,0x56,0xd8,0xe8,0x1e,0x8a,0xa7,0x7d,0x18,0xe6,0x37,0xe0,0xf8,0xd9,0xf4,0xb6,0x3f,0x92,0x7b,0xe1,0x17,0x57,0x3c,0x26,0x33,0x1d,0xf2,0x9e
.byte 0xfc,0x26,0xd5,0x5a,0x34,0xcf,0xc4,0xaf,0x7b,0x11,0xe3,0x77,0x95,0x51,0x93,0x8a,0x56,0x68,0x80,0xf8,0x62,0x6c,0xc0,0x4e,0xe8,0x39,0x46,0x7f,0x56,0x27,0x26,0x25,0x2b,0x88,0xdb,0x38,0x62,0xa5,0xbc,0x96,0x16,0xed,0xd1,0xc7,0x0f,0x47,0xec,0x72,0x83,0xb0,0xbe,0xb0,0x46,0x54,0xab,0xa7,0x60,0xd4,0xb3,0x63,0xa9,0x3a,0x67,0x7f
.byte 0x68,0x94,0x8a,0x54,0xf0,0x79,0x38,0x2a,0x67,0x7f,0x29,0xb4,0x7b,0xdf,0x0f,0x24,0xfb,0x21,0x0e,0xf5,0xc5,0x47,0x41,0x93,0xb5,0xe3,0x85,0xff,0x84,0x34,0x2b,0x12,0x73,0x5f,0x37,0x32,0xb6,0xce,0x73,0x27,0xe6,0x5a,0x6e,0x62,0xdd,0x7f,0x49,0x59,0xe2,0x3d,0x80,0xda,0xc3,0x29,0x70,0x40,0x70,0x25,0x8b,0xa5,0xc0,0xb0,0x18,0xa2
.byte 0xe0,0x5d,0xb6,0x52,0x14,0x8f,0xaa,0x17,0x68,0x80,0xa1,0x26,0xd2,0xbb,0xb4,0x2c,0x9a,0x41,0xfa,0x53,0x74,0xfb,0x7b,0x99,0x82,0xc1,0xff,0x77,0xa5,0xe0,0xea,0x64,0xb0,0x9c,0x48,0xce,0xb0,0x7a,0x05,0xa6,0x80,0x8d,0x92,0x92,0x47,0x1a,0x50,0xce,0x62,0xed,0xbd,0x41,0x59,0xe7,0xe6,0x3b,0xfb,0xe4,0xa4,0xb2,0xd4,0xb0,0x0b,0xe2
.byte 0x82,0xff,0x4d,0xb3,0xa6,0x43,0x4b,0xbf,0x7a,0xf7,0xfa,0x3c,0x38,0xd5,0xb2,0xf1,0xce,0x71,0x07,0xa4,0x6a,0xe3,0x7a,0x78,0xdf,0x56,0x1c,0xa1,0xf6,0x5d,0xeb,0xcc,0xb4,0xa7,0xca,0xaf,0x19,0xd0,0xb8,0x11,0x85,0xc7,0xf3,0x8a,0x23,0x6e,0xb8,0x92,0xd0,0xfc,0x61,0x9b,0x38,0x28,0x7b,0xa4,0xff,0x0d,0x32,0xf5,0xc5,0x31,0x5b,0x69
.byte 0xbd,0x6b,0xa5,0x46,0xd2,0x26,0x2c,0xe2,0x36,0xba,0x7c,0x42,0x8d,0xbe,0xfe,0x7c,0xbd,0x38,0x14,0x47,0x9a,0x6d,0xc7,0x20,0xda,0xd4,0x9d,0x05,0x31,0xdb,0xe7,0xda,0xac,0x27,0x14,0x7f,0xca,0x23,0xc1,0x5e,0x7e,0x26,0x04,0xf0,0xf3,0xb7,0xf7,0xdd,0xd4,0x05,0x7b,0xc5,0x7e,0x4a,0xeb,0x78,0x35,0x5e,0xb4,0xda,0xec,0xb5,0x46,0x96
.byte 0x63,0x56,0x17,0x55,0xfa,0xe8,0x11,0xd0,0xac,0xfd,0x5c,0xc8,0x99,0x2d,0xf7,0x4a,0x76,0xed,0x06,0xa2,0x77,0xfc,0x0f,0x13,0xe6,0xbc,0x79,0xae,0x15,0x23,0x17,0x0d,0xc3,0x01,0xee,0x36,0xe4,0x21,0x33,0x22,0x03,0x56,0x51,0x81,0xb4,0x5b,0x70,0xc7,0x6e,0xc4,0x54,0x93,0xcc,0x46,0x60,0x76,0x0e,0xc6,0x10,0x8c,0x52,0x6b,0x75,0x6a
.byte 0xd9,0x27,0x04,0x0a,0x56,0x80,0x1b,0xfd,0x59,0x88,0xd5,0x03,0x99,0x01,0x5e,0xc6,0x2f,0x74,0xf0,0x90,0xae,0x10,0x9e,0x52,0x39,0xcd,0xa4,0x69,0x4d,0xb9,0x8d,0xbc,0xaa,0xf2,0xe4,0x25,0xdb,0x85,0x00,0x82,0x95,0xe3,0x8e,0x72,0xba,0xd0,0xf3,0xfe,0xb0,0x6e,0xb8,0xcd,0x2d,0x7c,0xae,0x95,0x62,0x1f,0xe9,0xf8,0x71,0x23,0xd5,0x3e
.byte 0x33,0x30,0xb8,0x2d,0xf6,0xf5,0x45,0x1a,0x1b,0xf6,0xf1,0x6a,0x9a,0x7d,0xd4,0x76,0x27,0x6e,0x29,0x57,0xe6,0x90,0x36,0x83,0x4c,0x6b,0x00,0x77,0xf0,0x3d,0xb5,0xfe,0x19,0xb8,0x6f,0x76,0x58,0x7a,0x6c,0x2c,0xd0,0x22,0x5f,0x23,0x46,0x15,0xaf,0xbb,0xa0,0x40,0x37,0xba,0xb2,0x7f,0x6d,0xe2,0xa8,0x79,0x65,0x7a,0xb7,0xb0,0x51,0x04
.byte 0x77,0xec,0xed,0x58,0xd0,0x37,0x43,0xc4,0x95,0xe9,0xcb,0x82,0x8e,0x17,0xba,0x7a,0x8b,0xc0,0x71,0x6e,0x8a,0x5d,0x5d,0xe9,0xbd,0x28,0x0d,0xda,0xd9,0x4a,0xd6,0x71,0x58,0x3c,0x31,0x69,0x34,0x48,0x48,0xe1,0x50,0xc6,0x69,0x28,0x0d,0x24,0x45,0x15,0x13,0x1d,0x00,0xd6,0xd4,0x6b,0x05,0x56,0xf9,0xb7,0xf7,0xbc,0x26,0x37,0x51,0x65
.byte 0x91,0xf3,0xc6,0x50,0x44,0xce,0xa6,0x35,0xd9,0x0a,0xb2,0xd8,0xf3,0x6c,0x60,0x63,0x20,0xa3,0x18,0x34,0x83,0x1f,0x0d,0xc9,0x97,0xab,0x1f,0xb5,0x1f,0x6d,0x28,0xd4,0x84,0x1d,0xd4,0x08,0x45,0x83,0xa2,0x18,0x26,0x98,0xf6,0x1a,0x1c,0x9c,0xd9,0x79,0x92,0xef,0xdb,0x86,0x7b,0xb2,0x7b,0x30,0x64,0xeb,0x9d,0x7c,0xf0,0xf0,0x22,0x1e
.byte 0x65,0x2d,0x22,0x11,0x0a,0x73,0x9b,0x82,0x21,0xb0,0x0f,0xa4,0xb4,0xdf,0x5d,0x72,0x61,0x56,0x60,0x27,0xab,0x84,0xe2,0xdc,0x63,0x74,0xd3,0xbf,0x45,0x93,0xc3,0x05,0x17,0x16,0x69,0xcd,0xfa,0xf7,0x5d,0xcb,0x29,0x04,0x88,0xf1,0x67,0x94,0xce,0x1d,0xa1,0x7f,0xc4,0xd1,0xca,0x09,0x39,0x54,0xf2,0x1d,0x32,0x99,0x49,0x89,0x95,0xe3
.byte 0x8b,0xc6,0x4a,0x41,0xbc,0x13,0x60,0xbc,0xff,0x2a,0xa0,0xc8,0xb2,0xc0,0x42,0x52,0x7a,0x8f,0x77,0xcb,0xc8,0x79,0xfd,0x0f,0x08,0x40,0xd6,0x39,0x1e,0xcd,0x87,0x12,0x09,0x6e,0x9b,0xc9,0x5f,0xfa,0x79,0xd1,0x83,0x63,0xcb,0xa6,0x7b,0x0c,0x4d,0x41,0x9f,0x30,0x70,0x35,0x48,0x0a,0x64,0xdd,0x4f,0x4f,0x28,0x19,0x8a,0x29,0xff,0xa2
.byte 0x5c,0xe9,0x1e,0x4c,0x68,0xdf,0x6a,0x3c,0x85,0x82,0x6b,0x0b,0x8a,0x63,0x6f,0x02,0x86,0x9f,0xe4,0x0a,0xf8,0xb5,0xae,0x65,0x64,0x55,0xb5,0x3f,0xb3,0xaa,0x0f,0xda,0x10,0xb0,0xeb,0xb5,0x5c,0x70,0x93,0xea,0x92,0x27,0x30,0x4e,0x73,0x4f,0x2d,0x25,0x88,0xa5,0x39,0x84,0xf7,0xf7,0x3a,0x4b,0x42,0x75,0xa1,0x87,0x75,0x9f,0xb0,0x08
.byte 0xda,0xb4,0x45,0x62,0x20,0x65,0x40,0x37,0x79,0xc9,0xdb,0x1d,0xbe,0x79,0x32,0x62,0x37,0x48,0x3c,0xc5,0xbf,0xb6,0xe4,0xb9,0x71,0xdb,0x88,0x16,0x2a,0xd3,0xec,0x50,0x94,0x52,0x65,0x41,0x84,0x94,0x58,0x6c,0xe5,0x95,0x44,0x3f,0x79,0x5e,0x71,0xbd,0x22,0x14,0x7d,0x8a,0x7d,0xd5,0x63,0x2d,0xce,0xfb,0x63,0xfc,0x0c,0xe5,0x99,0xd0
.byte 0x64,0xb5,0x00,0x80,0x26,0xa1,0xa1,0x40,0xa7,0x58,0xcc,0x32,0xc1,0xa5,0x27,0x16,0x9f,0x74,0xf2,0x01,0x59,0xf8,0x79,0x50,0x4f,0xef,0x0a,0xb9,0x79,0xf7,0x00,0xa4,0x9e,0x4f,0xa7,0x75,0x46,0x0e,0x25,0x5c,0x57,0x20,0xf2,0x08,0x57,0x82,0xc6,0xc3,0x57,0xdc,0xb4,0x65,0xdc,0x0f,0x17,0x17,0x36,0xef,0x49,0x05,0xf1,0x33,0xef,0x24
.byte 0x28,0xba,0xce,0xbc,0x4e,0xfd,0x0b,0xd5,0xce,0xe0,0xcb,0x38,0x16,0xcf,0x89,0xbb,0xc3,0x34,0xd0,0x1b,0xf0,0x4a,0x63,0x8a,0xcb,0x7c,0x46,0x7a,0xca,0x9e,0x9e,0xc9,0x03,0xa6,0x25,0xd1,0x22,0xeb,0xe7,0x1a,0x16,0x04,0x20,0x33,0x2a,0xf8,0xbc,0xca,0xb4,0xfc,0xff,0x95,0x31,0xdf,0xaa,0x0a,0xf7,0x60,0xf7,0x72,0x1f,0x53,0xd8,0x0a
.byte 0x73,0xa6,0x27,0x55,0xdf,0x21,0xc8,0x41,0x1c,0x27,0xe3,0xe6,0x10,0x29,0xcf,0xd1,0x72,0x71,0x9b,0xcc,0xe6,0xf4,0x9f,0x2b,0xec,0x5d,0x6b,0xab,0xf6,0x09,0xff,0xd8,0x5e,0xf0,0x38,0x7a,0x67,0xb3,0xbe,0xa5,0x82,0xa5,0xc1,0x2e,0xa4,0xd6,0x42,0x07,0xc7,0x96,0x0d,0x11,0x2f,0x09,0x12,0x3c,0x81,0xaf,0xe6,0x52,0x31,0x2a,0x00,0x68
.byte 0x24,0x6e,0x28,0xc5,0x6e,0x3a,0x93,0x6f,0x01,0x3d,0xbc,0xc0,0xc0,0xca,0x92,0xb8,0x99,0x77,0xde,0x1a,0x38,0x24,0xdd,0xe4,0x1e,0x8c,0xf2,0x73,0xad,0x0b,0x79,0x8d,0xce,0xfa,0xf4,0x50,0xb6,0x64,0xab,0xf5,0x93,0x3a,0x73,0xba,0xe0,0x50,0x56,0x49,0xf3,0x08,0xf2,0x9d,0xec,0xe0,0x50,0xf1,0x26,0x08,0x2f,0x66,0x09,0xa1,0x45,0xb7
.byte 0x7b,0x3e,0xb4,0xfb,0xce,0xfe,0x69,0xfb,0x85,0x6d,0xc4,0x4b,0x15,0x87,0x8c,0x22,0x08,0x12,0x0f,0x46,0x9b,0xfa,0x32,0xae,0x7f,0xd1,0xa2,0x2c,0x65,0x0b,0xf0,0x62,0xa7,0x6a,0x8e,0xdc,0x10,0x56,0x86,0x84,0x14,0x77,0x6d,0x9f,0xd3,0x72,0x09,0xd9,0xdc,0x28,0xfe,0x15,0x9d,0xfb,0x10,0x0d,0xda,0x9e,0xbe,0x4b,0xcb,0xd9,0xf9,0x9c
.byte 0xff,0xd5,0x19,0x18,0x6e,0x4f,0x33,0x21,0xfb,0x50,0x05,0x3c,0xbf,0x69,0xb2,0x91,0x07,0x5b,0xdb,0x2e,0x99,0x6c,0x20,0xc9,0x68,0x51,0x25,0x90,0xb2,0xcc,0x45,0x50,0x11,0x09,0xca,0xe2,0x19,0x04,0x5b,0x0c,0x99,0x34,0x7b,0x1e,0xc6,0x22,0xec,0xc4,0x5e,0x46,0x28,0xd2,0x08,0xf9,0x33,0xb4,0x9f,0xd0,0x56,0x52,0x97,0xa7,0x88,0xcf
.byte 0x90,0xd7,0xe0,0xc4,0xcd,0xef,0xba,0x3f,0x56,0xb9,0x00,0x21,0x5b,0xc8,0xcd,0xc7,0x43,0x00,0xde,0x24,0xca,0x44,0xe5,0x9e,0xe5,0x7a,0x08,0xe5,0x7b,0x19,0x86,0x62,0xa1,0xff,0x8d,0x69,0xbf,0xea,0xee,0xae,0x7d,0x76,0x63,0x04,0xa7,0x56,0xb5,0x5d,0x08,0x98,0xd3,0x34,0x4c,0xa1,0x1f,0x26,0x41,0x8f,0xd5,0xd4,0x7f,0xb5,0x9d,0xce
.byte 0x70,0xf1,0xbf,0xc5,0xa2,0x44,0x3c,0x30,0x89,0xbf,0xba,0x04,0xb5,0x0e,0x7e,0xe1,0x1d,0x1c,0xbb,0x29,0x83,0xa8,0x16,0x98,0x7d,0x8c,0xb4,0x03,0xb5,0x85,0x85,0x3a,0xcb,0xc1,0x54,0xf0,0xda,0xa7,0x89,0x81,0xe6,0xd1,0xe0,0x95,0xb6,0x9e,0x30,0xf8,0x2b,0xd1,0xbc,0x7d,0xcd,0xab,0xa2,0x1b,0xc3,0x8d,0x1d,0x2c,0x83,0xf9,0xe1,0xa7
.byte 0x92,0x94,0x9f,0x9e,0xdf,0xa7,0xe5,0x14,0x03,0x6a,0x6a,0x60,0x8b,0x01,0x02,0xae,0xea,0x1e,0x05,0xce,0xcd,0x2b,0x29,0xca,0x0f,0x94,0xf8,0xbd,0xc8,0x55,0x6d,0x4c,0x95,0x26,0x04,0x4f,0xf8,0x75,0xcb,0x43,0xab,0x76,0x0c,0x88,0x10,0x56,0xdf,0x66,0x16,0xcc,0xf1,0x1b,0x13,0xa9,0x93,0x9c,0xc4,0x63,0xac,0x44,0xf4,0x13,0xf3,0xdb
.byte 0xcf,0xff,0xef,0x9d,0x89,0x9f,0xef,0x5b,0xa4,0x84,0xb4,0x0d,0x92,0x3b,0x76,0x03,0x3f,0x1d,0xdd,0xb1,0x5f,0x24,0xd5,0xa9,0xa5,0xdc,0x44,0x3a,0x3b,0xef,0xf2,0x8b,0x27,0xfa,0x83,0xdc,0x2d,0x4c,0xd8,0xb0,0xf8,0x7f,0x1e,0xea,0x3f,0x90,0x81,0xe1,0xc0,0x97,0x7a,0xfc,0xe1,0x00,0xf3,0x11,0xfc,0xc1,0xc2,0xa7,0x1a,0xf0,0x2c,0x41
.byte 0x49,0xc9,0x65,0xbe,0xe1,0x0f,0x54,0xdf,0xd5,0x39,0xe8,0x7a,0x48,0x81,0xdc,0x21,0x8f,0x8f,0xd2,0x16,0x6f,0xf4,0xfa,0x43,0xdd,0xfb,0x72,0xfb,0x5a,0xd7,0x62,0x0b,0x3e,0x92,0x82,0x2d,0x27,0x04,0x7d,0x5a,0x48,0x60,0x19,0x15,0x01,0x27,0x9d,0x05,0xf2,0x6c,0xaa,0x0c,0x7c,0x79,0x14,0xdc,0x3e,0x75,0x28,0xd2,0x9d,0x3b,0x28,0xc2
.byte 0x35,0x6c,0x73,0x4c,0x77,0x5f,0x36,0x7e,0xf8,0x3e,0xaf,0x1d,0x55,0x80,0x29,0x14,0xa4,0x48,0x80,0x82,0xb2,0x82,0xb9,0x3e,0x02,0xd6,0xd1,0xae,0x6a,0x0d,0x3d,0xfd,0xc1,0x57,0xf4,0xe6,0x90,0x8b,0x57,0x0d,0xde,0xd8,0xb7,0x15,0x71,0x82,0xe9,0x18,0x76,0x23,0xcd,0x93,0x41,0x17,0x83,0x5e,0xcd,0x6a,0x31,0x52,0x8d,0xff,0xb1,0x98
.byte 0x6d,0x47,0x96,0x6f,0x57,0x99,0xd7,0xe8,0x70,0xd2,0x68,0x8d,0x3e,0x26,0xfd,0x86,0x5c,0x64,0xb8,0x55,0x9b,0x4a,0xcf,0x75,0x39,0x97,0x73,0x77,0x30,0x06,0xea,0x55,0x2a,0x4f,0x3c,0x78,0x98,0x85,0x37,0x81,0x5b,0xc6,0x2c,0x90,0xaf,0xb3,0xc1,0xd5,0xf1,0x81,0xce,0x7d,0xe7,0xa5,0xee,0x74,0x3f,0x1e,0xec,0x2f,0xca,0x36,0x7c,0xd2
.byte 0x0f,0xce,0x9f,0x81,0x45,0x26,0x05,0x0e,0xeb,0xfc,0x5d,0x81,0x6d,0x05,0x22,0x75,0xdf,0x45,0x38,0x1c,0x33,0x27,0x48,0xe3,0x7c,0x18,0x9d,0x6d,0x39,0x53,0x75,0x1b,0x8a,0xcf,0xc1,0xf6,0x95,0xa7,0x30,0x43,0x71,0x62,0xe1,0x23,0xd5,0xb1,0xf4,0x5c,0xda,0x71,0x26,0x47,0xd2,0x76,0xec,0x11,0x3e,0xa5,0x00,0xcd,0x85,0x0e,0x1a,0xa7
.byte 0xe5,0x58,0x8e,0x67,0xc8,0x73,0x1d,0xd0,0xd9,0x0d,0x43,0x04,0x41,0x4a,0xde,0xbb,0x1a,0x75,0x0d,0xb3,0xa3,0xa2,0x20,0xf2,0x14,0xf2,0xe0,0x22,0xc0,0xec,0xd3,0x7b,0x8e,0x98,0x4e,0xf5,0xe9,0x88,0x64,0x6d,0xd6,0xeb,0xf9,0xb7,0xa1,0xd3,0x9f,0x3c,0xdd,0xdb,0x91,0xe0,0x92,0x52,0x3b,0x07,0xa4,0x40,0x47,0x04,0x11,0x95,0xdd,0xc9
.byte 0x33,0x24,0xe2,0xd5,0xa5,0x99,0xd2,0x0b,0xb5,0xb7,0xb7,0x59,0x24,0x2c,0x3e,0xff,0xc0,0xbc,0x11,0x55,0xf6,0x27,0x8e,0xd4,0xa8,0x23,0xf0,0x68,0x0b,0xd7,0x15,0xb7,0xe4,0x7d,0xc3,0x5c,0x3d,0xef,0x95,0xb4,0xad,0xe9,0x14,0x63,0xf7,0x3a,0x55,0x5f,0x6a,0x10,0x4a,0x3e,0x27,0xd1,0x7c,0xfc,0x4a,0x1a,0xab,0x2f,0x8f,0x4d,0x28,0x4b
.byte 0xd4,0xe1,0x0b,0xeb,0xa1,0x85,0xea,0x68,0xd5,0x08,0x56,0x79,0x5f,0xbd,0x2a,0x7e,0xbf,0x44,0x05,0x05,0x10,0xf3,0x22,0x58,0xa5,0x0c,0x38,0x81,0xa4,0x95,0x19,0x51,0xf7,0x7c,0x4c,0x3f,0xcf,0x55,0xf7,0x90,0xbc,0xc5,0xec,0xd0,0x6a,0x22,0xf8,0xc9,0x1e,0x62,0x17,0x86,0x24,0x04,0x5e,0x50,0xb2,0xb5,0x94,0x18,0x48,0x96,0xb8,0x21
.byte 0x5e,0x63,0xc9,0xd7,0x29,0xc6,0x74,0xf5,0x28,0x36,0xa1,0x56,0x45,0xd6,0x60,0x4d,0x84,0xd5,0x57,0xc2,0xb6,0x9d,0xbd,0x3f,0xb4,0xac,0xf1,0x53,0x1b,0x79,0x7d,0x73,0xf5,0x61,0x5e,0x2b,0x10,0x97,0x88,0xcc,0x7d,0xe4,0xa6,0x38,0x46,0x1c,0xc0,0xa8,0x58,0x1f,0x7b,0xf4,0xf5,0x52,0x8f,0x58,0x9a,0x17,0x49,0x5a,0xd2,0x38,0x3a,0xfd
.byte 0x66,0xcb,0xf5,0x4b,0x28,0x8b,0x8d,0x7c,0xb2,0x42,0x8e,0xa5,0x2a,0x08,0x72,0xfc,0x9b,0x85,0x0d,0xe6,0x85,0xf8,0x76,0xe2,0x73,0x6a,0x53,0xc2,0x3a,0x79,0x97,0x31,0xa9,0x52,0x70,0x75,0x3a,0xe3,0xfe,0xe5,0xbc,0x95,0x8e,0xf0,0xc9,0x97,0x17,0xdc,0x26,0x78,0x24,0xd1,0xe7,0x87,0x29,0x75,0x8e,0xd8,0x3f,0x56,0xde,0x46,0x97,0x7c
.byte 0xcd,0xd4,0x01,0x57,0x6f,0xb5,0xd7,0xe7,0xbb,0xd1,0x0d,0x6f,0x0e,0x1b,0xf1,0x34,0x2a,0xcf,0x93,0x79,0x4d,0x47,0x0b,0xd4,0x69,0x77,0xc6,0x72,0x78,0x65,0xc8,0xec,0xb1,0x21,0x8a,0xfd,0x71,0xa9,0xc5,0xd7,0x89,0xa9,0xb0,0x9c,0xed,0xb8,0xc6,0x99,0x57,0xe0,0x13,0x6f,0x0e,0x85,0xea,0xc8,0x08,0xa7,0x38,0xdf,0x87,0xb3,0x46,0x80
.byte 0xfa,0xc6,0xe8,0x6a,0x45,0x71,0x13,0x20,0xd7,0xeb,0x6c,0x3a,0x43,0x56,0x36,0x1f,0xe2,0xf4,0x65,0x2f,0x04,0x7e,0x24,0x24,0xfe,0xe0,0x8f,0x1e,0x96,0x6e,0x01,0xfe,0x4e,0x11,0x9c,0x07,0x3e,0x5a,0x29,0x04,0x21,0x6a,0xe5,0x74,0x0b,0x93,0xa3,0xb2,0xe2,0x3e,0x0b,0x39,0x97,0xf6,0xdb,0x3d,0xb8,0x0e,0x8e,0xe2,0xd9,0xf0,0xbe,0x56
.byte 0x6f,0x6c,0xb2,0x49,0xe0,0xe0,0xc4,0x02,0xe7,0xbc,0x40,0x03,0x3d,0x5d,0xd9,0x1b,0x06,0x08,0x7b,0x0c,0x8e,0x78,0x6d,0x17,0x06,0x87,0x46,0x1e,0xfd,0xcd,0xa3,0x83,0xdf,0x67,0x25,0x54,0x2a,0xc2,0xf4,0xf9,0x73,0xf5,0xd8,0xa5,0xe5,0xc0,0xd6,0x39,0x04,0x5b,0x0e,0xd1,0x71,0x47,0xed,0x7d,0x34,0x76,0x62,0x9a,0x7d,0x6f,0x26,0xba
.byte 0x69,0x0b,0x0e,0xb2,0xbe,0xad,0xa9,0x5f,0xdd,0xe8,0x05,0xbe,0xb5,0xa5,0x2e,0xba,0x2f,0x27,0x17,0x81,0xdb,0x9c,0x38,0xd2,0xf7,0xcd,0x77,0x75,0x41,0xda,0x65,0xd1,0xf6,0x0d,0xaa,0xc4,0x43,0x69,0x2a,0xd8,0x38,0x89,0x1b,0x77,0x16,0x26,0xa7,0xcd,0x46,0x68,0x7e,0x2a,0xbc,0xbb,0x8a,0xad,0xc0,0x7c,0xd8,0x14,0xc7,0x0f,0x76,0x97
.byte 0x33,0x0e,0x30,0xd8,0x10,0x7f,0xd1,0x38,0x5a,0x86,0xf2,0xfa,0x13,0x7a,0xd3,0x04,0x35,0x92,0x0f,0xc7,0x85,0x91,0xaa,0xe1,0xd2,0xa5,0xde,0x9a,0x0a,0xf2,0x77,0x99,0x94,0x5e,0x9d,0x67,0xf3,0x0d,0xb8,0x39,0x70,0x96,0xea,0x6c,0x82,0x59,0xe1,0x4c,0xca,0xf7,0x8c,0x26,0x42,0x1d,0x06,0xd9,0x26,0x32,0x76,0xde,0xf2,0xd2,0x8d,0xb6
.byte 0x6f,0x58,0x57,0x0e,0xcc,0x46,0x68,0x30,0x37,0xab,0x27,0xd9,0x84,0x52,0x7f,0x67,0x64,0xaa,0xa6,0x90,0x1e,0x36,0xbe,0x70,0x35,0xd3,0x3e,0xf6,0x4e,0xee,0xa1,0xa0,0x44,0x7c,0xb0,0x22,0x75,0x1f,0x83,0x67,0xc9,0x75,0x78,0x4c,0xe6,0x6c,0x08,0xab,0x01,0x74,0xfc,0x4c,0xff,0x4e,0x1c,0x9d,0xdd,0x24,0x6c,0x4f,0xad,0x8a,0xa0,0xe3
.byte 0xb4,0x9b,0x2f,0xfa,0xd5,0x2b,0xa0,0xb2,0x32,0xa7,0x98,0x35,0xa0,0x58,0x26,0x22,0x4a,0x63,0xf5,0x3c,0x54,0x2c,0xbc,0xa6,0x7e,0xdb,0x1c,0xf1,0xd4,0x35,0xf6,0xb7,0x62,0xd4,0x84,0xbe,0xb8,0x59,0x32,0x33,0x8a,0x17,0xb9,0x59,0xa0,0x62,0xa7,0x00,0xfb,0x72,0xc4,0xe1,0x1e,0x6c,0xec,0x64,0xea,0x97,0xeb,0xf7,0x24,0x5f,0xb2,0xdb
.byte 0xfc,0x28,0x35,0x81,0x2b,0x5a,0x73,0xd1,0x0b,0x4b,0x68,0x5d,0xa2,0x55,0x41,0xb1,0x9e,0xdf,0x35,0xed,0x7e,0x39,0xd7,0xe6,0x45,0xe8,0xe2,0x4d,0xcd,0x82,0x26,0x72,0x0a,0xa6,0x4f,0x7b,0x27,0x55,0xc1,0x7c,0xee,0x83,0x2b,0x50,0x70,0xfa,0x6b,0xf5,0x2f,0x13,0xc1,0xf7,0xa4,0x79,0xac,0x1e,0x46,0x45,0x24,0xb2,0x61,0x58,0xd6,0xea
.byte 0x11,0x72,0x83,0xa8,0x76,0x62,0x49,0x42,0x1c,0x11,0x18,0x9e,0x32,0x20,0x4b,0xc1,0x09,0xe4,0x62,0x8e,0x19,0xc7,0xda,0xed,0x57,0x12,0x20,0x59,0x53,0xa0,0x7b,0x0e,0x1f,0xc5,0x7d,0x43,0x82,0xd8,0xbd,0x33,0x09,0xb4,0x33,0x9e,0x73,0xf7,0x8c,0xea,0x34,0xe4,0x84,0x9a,0x67,0x15,0x80,0x9d,0x3d,0x77,0x30,0x9f,0xc4,0xd7,0x08,0x64
.byte 0xce,0x90,0xd5,0x81,0xda,0xbd,0x6d,0x4d,0x0c,0x57,0x73,0xba,0x90,0xa7,0x28,0x10,0xc1,0x53,0xf3,0xfe,0x94,0x43,0x90,0xaf,0xc2,0xd7,0xdc,0xe9,0x02,0xe2,0xe4,0x67,0x98,0xa7,0x5b,0x5e,0xe2,0x40,0xcd,0x0d,0xc7,0xbb,0x46,0xab,0xd2,0x75,0x24,0x47,0x85,0xa3,0x34,0x03,0x5c,0xc6,0x7c,0xb4,0xbd,0x07,0xc0,0xa7,0x60,0xb5,0xe7,0x45
.byte 0xac,0xb7,0x6a,0xfe,0x56,0x5a,0x08,0xc0,0x86,0xf8,0x14,0x59,0xee,0x0e,0x68,0x8f,0xa1,0xd5,0x67,0x4d,0x08,0x19,0xc8,0x29,0xcf,0x72,0xf5,0x9a,0x9a,0xf3,0x0a,0xb7,0xeb,0x31,0xd0,0x6b,0x9f,0xc3,0x26,0x58,0x9e,0x69,0x9b,0x60,0x0b,0x7e,0x43,0x0b,0xed,0x7b,0xd2,0xc8,0x6d,0x22,0xf1,0xfb,0xc9,0x82,0x50,0xec,0xf0,0xb3,0x40,0x02
.byte 0xfd,0xc8,0xac,0x46,0x5c,0x49,0x17,0x98,0x8b,0x07,0x7e,0x9c,0x6a,0xa4,0xcf,0x46,0x4d,0x01,0x4a,0x9f,0x7a,0x39,0x81,0xf7,0xef,0x7f,0x59,0x35,0xd3,0x1a,0x71,0x1f,0x84,0xa6,0xd0,0x1b,0x47,0x9c,0xea,0x1a,0x29,0x46,0xaa,0xe3,0xa3,0xfc,0xfd,0xd2,0x4d,0xda,0x10,0x5b,0xdc,0x56,0x81,0x31,0x4d,0x01,0xb1,0x5e,0x39,0x77,0x8d,0x78
.byte 0x5b,0x61,0xb8,0xc2,0xd9,0xe4,0xe0,0xab,0xe8,0x3e,0xb7,0x0f,0xc5,0xf8,0xad,0x2a,0xe5,0x1a,0xa3,0x66,0x69,0x78,0x66,0x4b,0xc2,0xe3,0x44,0x04,0xe8,0x51,0x59,0x2b,0xbf,0x19,0xe9,0x36,0x13,0xfd,0x1b,0x1c,0x45,0x46,0x65,0x61,0xcb,0x9e,0x98,0x03,0x40,0xf7,0xc1,0x76,0xf4,0x47,0xd3,0x69,0xef,0x63,0x36,0x0c,0x30,0x91,0xaf,0x1c
.byte 0x69,0xd5,0x93,0x41,0x8a,0x47,0x61,0xe9,0x31,0xaa,0x12,0xa4,0x99,0xa9,0x0c,0x7c,0xce,0x72,0x7d,0x9b,0xc3,0xe4,0x2d,0xb2,0x5a,0xce,0xae,0x8e,0xa1,0x54,0x75,0x20,0xed,0x9b,0xd1,0x5e,0x5e,0x55,0x9c,0x02,0x5d,0x70,0x3c,0x63,0xf4,0x60,0xb3,0x3e,0x0a,0x4d,0x29,0xf4,0x1f,0x5b,0x08,0xce,0xa5,0x06,0xdc,0xb8,0x5f,0x4d,0x6b,0xef
.byte 0x60,0xda,0xb7,0x70,0xa8,0xcd,0x2a,0x77,0xaa,0xf2,0x0f,0x77,0xb1,0xec,0xc8,0xe9,0xc0,0xed,0xb9,0x26,0xa8,0xfe,0x5e,0x60,0x1b,0x8d,0xea,0x67,0x38,0x3d,0xa5,0x5f,0xf0,0x4d,0x9d,0x75,0xc8,0xb2,0x9e,0x40,0xf8,0x7d,0x25,0xc0,0xcc,0x89,0x94,0x93,0xd6,0x3e,0x3b,0xf6,0x58,0xbf,0x5b,0xf9,0x6f,0x64,0x69,0x97,0xf4,0x9f,0xf3,0xc5
.byte 0x98,0xe6,0xb2,0x9c,0x1d,0xb8,0xd3,0x6d,0xdb,0xf4,0x49,0x75,0x67,0x0b,0x1f,0xac,0x89,0x6c,0x16,0xc1,0x4e,0xfe,0x8f,0x8b,0x61,0x4e,0x99,0x04,0x86,0xea,0x77,0x63,0x38,0x27,0x92,0xe0,0xcd,0xdd,0x33,0x7c,0xaf,0x41,0xce,0x37,0x21,0xd9,0x37,0x08,0x38,0x55,0xfc,0x04,0x2a,0x67,0x49,0xd0,0x6a,0x71,0xac,0xc8,0x95,0x01,0xb3,0x49
.byte 0x7c,0x19,0x05,0xdb,0xd9,0xc3,0xe6,0x81,0x3e,0x0e,0x79,0x24,0xc3,0x3d,0x95,0x6a,0x1b,0xb4,0x38,0xfa,0xcb,0x16,0xd3,0x0c,0x00,0xf7,0x85,0x4c,0x38,0x4a,0x50,0xe1,0x64,0x45,0x38,0x54,0xfa,0x85,0x04,0xe6,0x5a,0x02,0x80,0x6a,0x04,0xc2,0x28,0xb8,0x18,0xa1,0x1d,0xa1,0x88,0x18,0x30,0x8b,0x4c,0xfa,0xda,0xdd,0xe0,0x3f,0xae,0x81
.byte 0xaf,0xa6,0xcd,0xc3,0xe9,0x33,0x46,0xd3,0x17,0xab,0x74,0xf6,0xee,0x24,0xa7,0x8c,0xfa,0x5d,0x18,0xe0,0xa7,0x23,0x06,0x71,0x87,0x26,0x6a,0xd1,0xc7,0x1f,0x53,0xa8,0x53,0x7a,0xdb,0x83,0xfe,0x77,0x9c,0x68,0x84,0xe4,0xbf,0xa7,0x87,0x1e,0xd1,0xd7,0x44,0xb1,0x83,0x5b,0x20,0x69,0xe3,0xc9,0x8a,0x97,0x53,0x22,0x71,0xef,0x4d,0xb4
.byte 0x52,0x64,0x89,0x05,0x14,0x1d,0x00,0xd2,0xc4,0x89,0x46,0xc1,0xf6,0x6f,0x08,0x10,0xe8,0x51,0x7c,0xc8,0xc0,0xaa,0xc3,0xd8,0xd4,0x0d,0xfa,0x7d,0x26,0xa4,0xc8,0x33,0x32,0x62,0x64,0x01,0xa9,0x72,0x86,0x62,0xe2,0xbf,0xb3,0x71,0xbf,0x6d,0x91,0xc1,0x96,0xb1,0x57,0x4b,0x7b,0x87,0xe8,0xa2,0x58,0xc3,0x77,0x7b,0x75,0x60,0xa1,0xcf
.byte 0xe2,0xf2,0x1f,0x48,0x22,0xd0,0x35,0x91,0x68,0x16,0xdd,0x71,0x2b,0xa5,0x2f,0xa6,0x54,0x0c,0xe1,0x8e,0x8c,0xb9,0x3f,0x94,0x48,0xc7,0x2f,0xfd,0xbe,0x4a,0x29,0x8b,0xdc,0x1a,0xef,0x95,0x1e,0xdf,0xa0,0x11,0x7e,0x74,0x22,0xf1,0xaf,0x6a,0xdd,0x65,0x0f,0x38,0x87,0x83,0x9b,0x03,0x6b,0xa0,0x9d,0xbe,0x94,0x1d,0x0b,0x97,0x1f,0xcd
.byte 0x0e,0x77,0xcf,0x56,0x2e,0xd2,0xda,0xd1,0xf5,0xc7,0xc3,0x17,0x43,0xee,0x42,0xb3,0xda,0x9c,0xf5,0x39,0xe1,0x01,0x55,0x4a,0x3f,0x28,0xdb,0x5f,0x80,0x32,0xbd,0xc8,0xba,0x51,0xf6,0xc5,0x56,0x74,0x9f,0xa6,0x28,0x14,0xcc,0x6c,0x81,0xd6,0xfe,0x31,0xf6,0xae,0xeb,0x19,0x70,0xfa,0xb5,0x77,0xf9,0xfd,0x43,0x49,0xd7,0x83,0x57,0xe8
.byte 0x81,0x03,0xa2,0x91,0x15,0xfd,0x83,0x72,0xd1,0x5a,0xdb,0xcb,0x09,0xe3,0x63,0x36,0xbb,0x64,0x47,0x70,0x65,0xf1,0x3e,0x7f,0x93,0xfb,0x00,0x47,0x64,0x1e,0xe0,0xad,0x49,0xc8,0x4d,0x95,0xb8,0xc7,0x58,0x00,0xd1,0x92,0x84,0x59,0x79,0x45,0x6f,0xfa,0x8c,0x2a,0xf8,0x25,0x77,0xa6,0x03,0x6c,0xa2,0xd6,0xfb,0xab,0xe5,0xcf,0x72,0xdd
.byte 0x2c,0xa5,0xcc,0x09,0x74,0xfa,0x18,0xe5,0x02,0xaf,0x05,0x2b,0xc1,0xb3,0x99,0x50,0xfb,0x6c,0xf4,0x35,0x6e,0xd2,0x50,0x6a,0xb2,0xa0,0x05,0x5c,0x82,0x71,0x58,0x05,0x71,0x99,0x46,0xd9,0xfd,0x1c,0xdf,0x1f,0x1f,0x8c,0xf1,0x7a,0xe1,0x92,0x08,0x52,0x4a,0x1b,0x52,0x61,0x2c,0xd0,0x2d,0xb1,0x6c,0x48,0x23,0x7f,0x0f,0x45,0x98,0x04
.byte 0xbb,0x91,0x40,0x28,0x3c,0xf9,0x01,0xd9,0xdf,0xd9,0x0c,0x31,0xec,0x58,0xe1,0xd0,0x55,0xcb,0x4a,0xb2,0xfe,0x09,0x97,0xaa,0xbe,0x01,0xd9,0xe9,0xf3,0x76,0x48,0xd9,0x75,0x0d,0xba,0x54,0xaa,0x2e,0x99,0x0a,0xbf,0x4c,0x5b,0xae,0xf0,0x27,0xd2,0xe5,0x1c,0x9d,0x74,0xf9,0x7f,0xc6,0x88,0x7c,0xa4,0x0f,0x96,0x2c,0xe7,0xc5,0xfd,0x26
.byte 0x59,0xe5,0xcc,0x86,0xb2,0x93,0xae,0x17,0x59,0x39,0x3b,0xa6,0xf0,0xff,0x07,0xa0,0x6e,0xff,0x39,0x01,0x71,0x50,0x5f,0x4f,0x12,0x13,0xcf,0x44,0x85,0xe6,0xd8,0x89,0x4f,0xa6,0x21,0xb2,0x32,0xbd,0x37,0x9f,0x1d,0x35,0x9d,0x30,0x49,0x7d,0x29,0x60,0x07,0xdd,0x06,0x05,0x21,0x44,0x22,0xaf,0x1d,0xc9,0xc7,0x31,0x60,0x88,0x2d,0x4d
.byte 0x71,0x88,0x4d,0x5b,0x7c,0xc6,0x68,0x09,0x54,0x01,0xc0,0xe9,0xda,0xa0,0x08,0x75,0x6f,0x3c,0xdb,0xf7,0xa4,0x1c,0x9d,0x8d,0x49,0xb6,0x30,0x38,0x22,0xe6,0x08,0xf9,0x00,0xa5,0xaa,0xf2,0x83,0xd3,0xb1,0x37,0xdb,0x2a,0xd4,0x65,0x94,0x98,0xd6,0xe1,0xc9,0xf6,0xc0,0xd1,0xbe,0x28,0x92,0x6b,0x2f,0x13,0x8d,0xc6,0x62,0x82,0xf2,0x5a
.byte 0xe1,0x62,0x74,0x08,0x72,0x28,0xa4,0xca,0x83,0x84,0x42,0xca,0xc6,0x17,0xf4,0xa7,0xf5,0x4e,0x57,0x9e,0x50,0x9c,0x9b,0x96,0x88,0x28,0x39,0xb1,0x1d,0x71,0x6d,0x6a,0x41,0x1c,0x63,0x85,0xa0,0xf6,0x38,0x3b,0x74,0x5b,0xe9,0xfa,0x67,0x63,0xd2,0x54,0x1c,0x22,0x12,0x4c,0x1d,0x56,0xf2,0x29,0x55,0xfb,0x4a,0x18,0x50,0xb3,0x2f,0xa7
.byte 0x0f,0x53,0x9b,0x2b,0x0e,0xae,0xfc,0xda,0xfc,0xa3,0x98,0x47,0x50,0x38,0x24,0xc0,0x3d,0xd6,0x4b,0x44,0x4f,0x9e,0xdb,0x0a,0xaf,0xc7,0x2c,0xc2,0x5e,0x7e,0x97,0x21,0xa5,0x62,0x07,0x5f,0x97,0xe9,0x95,0x41,0x88,0x13,0xe9,0x53,0x6a,0xd6,0x59,0x8b,0x69,0xe2,0x02,0x1b,0x73,0x5d,0xb8,0xa6,0xd3,0x9d,0x76,0x6c,0x86,0xc5,0x73,0xf0
.byte 0x45,0x68,0x0c,0xc1,0x5b,0x38,0x3d,0x64,0x92,0xfc,0x1a,0x2a,0x28,0x85,0x2b,0xfc,0x6a,0xf0,0x66,0x6a,0x8c,0xdc,0x7c,0xd9,0x65,0xe0,0x68,0xa2,0x36,0x0e,0x5f,0xe8,0xbe,0x16,0x6b,0x72,0xa2,0xcc,0x3e,0xef,0x1f,0xbe,0x98,0x0f,0x49,0x22,0x6a,0x5e,0xbc,0x88,0x2f,0xd6,0x54,0x7f,0xff,0xb9,0xab,0xc9,0x68,0xd7,0xd5,0x2f,0xb1,0x6b
.byte 0x65,0x26,0x7c,0xd7,0x97,0x2c,0x6a,0x15,0x15,0x88,0x95,0x54,0x55,0x7b,0x56,0xab,0x16,0x6b,0xc7,0xa9,0xa3,0xbc,0xf2,0xaa,0xc3,0xff,0x11,0xb5,0xee,0x55,0x61,0x34,0x50,0x0c,0xe1,0xec,0xa6,0x5d,0x03,0x95,0x7d,0xca,0x00,0x80,0x02,0x44,0x8a,0x00,0x9b,0x16,0x02,0x7c,0x35,0xed,0xae,0x62,0xdd,0x20,0xfc,0x99,0x82,0x58,0x85,0x94
.byte 0x7b,0x2b,0xfb,0x7b,0xdf,0x99,0x69,0x7f,0x7e,0xf0,0x96,0xc5,0x48,0x27,0x90,0x32,0x88,0x96,0x89,0x95,0x9c,0x45,0x0e,0x90,0x94,0x54,0xa6,0x94,0x36,0xf7,0xc1,0x01,0xee,0xcb,0xfb,0x4e,0x62,0xd0,0x34,0x95,0xd6,0xb5,0xa4,0xa6,0xae,0x2b,0x0e,0x1f,0x03,0x87,0x6c,0x54,0x77,0x7d,0xf7,0x22,0xd1,0x63,0xb2,0x57,0x05,0xd1,0x8d,0xaf
.byte 0x35,0xca,0x23,0x8d,0x66,0x79,0xa0,0xed,0x9a,0x4a,0xbc,0xd8,0x20,0xe6,0x44,0x3e,0x6f,0x1d,0xf7,0xf3,0x43,0x83,0x5b,0xb6,0xdf,0x43,0x12,0xef,0x5c,0xfa,0xd5,0x8d,0x94,0x48,0xf8,0x2b,0x9b,0xfe,0xd0,0xab,0x88,0xa4,0x7d,0xa7,0xed,0x1d,0x53,0xd1,0x28,0x64,0x92,0xca,0x21,0x47,0x8b,0x2d,0xcd,0xf2,0xfb,0x1a,0xd1,0x6b,0x10,0x38
.byte 0x8b,0x23,0xa5,0x85,0x0c,0x8f,0x2d,0x8f,0xcd,0x64,0x21,0x2d,0xc9,0x69,0xad,0xe3,0x17,0xf7,0x36,0x94,0x13,0xd1,0x8c,0x66,0x2e,0x72,0xc1,0x12,0x0b,0x52,0xce,0xb5,0x1c,0x5e,0x93,0xb5,0x80,0x5d,0x95,0xe2,0x0c,0x2f,0x08,0x92,0x47,0xb3,0x90,0x19,0x44,0x8b,0x9b,0x3b,0xb7,0xa2,0xaf,0xf7,0xfa,0x6e,0x40,0xa4,0x50,0x11,0x87,0x15
.byte 0x75,0x75,0xad,0x55,0xa9,0x34,0xd0,0x1f,0x0f,0x76,0x79,0x55,0x5b,0x1a,0x22,0x3c,0x20,0x50,0x70,0xeb,0x2f,0x9c,0xd2,0xb0,0x16,0xd3,0xa5,0xdd,0xec,0xbf,0x69,0x29,0xdf,0xcf,0xa2,0x2c,0x73,0xa8,0xd2,0xe9,0x99,0x81,0x19,0x07,0x0a,0x3e,0x34,0x90,0x34,0x5b,0x7b,0xd6,0x5b,0x03,0xc4,0xcc,0x1a,0x68,0xb4,0x6a,0xf7,0x13,0x00,0x6c
.byte 0xbe,0xbd,0x45,0xf1,0x70,0x29,0xc9,0x59,0xfb,0x88,0xb3,0x60,0x55,0x65,0xd1,0x97,0x24,0xfe,0x5d,0xb3,0x7a,0x13,0x2a,0x32,0xe6,0x68,0x74,0x47,0x8f,0x90,0x85,0x20,0x10,0x88,0x78,0x7d,0xb5,0x20,0x21,0x05,0x8b,0xd2,0xc6,0x1e,0xbe,0xad,0xd5,0xba,0x44,0x48,0xee,0xa5,0xcd,0x9b,0xf6,0x91,0xce,0x73,0x5d,0x3d,0xa7,0x9b,0xa7,0x7f
.byte 0xbe,0xa7,0x8c,0xd1,0x76,0x23,0xa4,0xab,0xc0,0x3f,0x3b,0x35,0xce,0x3f,0xe5,0x91,0x4a,0x93,0x21,0xcd,0x74,0xea,0xc5,0x0b,0x4d,0x21,0xd0,0xf6,0x8d,0x51,0xfe,0x8d,0x7d,0xab,0xd1,0x61,0x8b,0xda,0x8b,0x66,0x58,0x52,0xc1,0x63,0xc4,0xca,0x41,0x72,0x87,0x54,0x69,0x5d,0xa8,0xcf,0x38,0x5f,0xf8,0x52,0x99,0x5f,0x5e,0x4e,0x01,0x4d
.byte 0xdf,0x53,0xe3,0xac,0x5d,0x62,0xb9,0x4e,0xea,0x73,0x1b,0x4b,0xeb,0x7d,0x9c,0x6f,0xa4,0xbf,0xba,0xee,0x31,0x55,0x85,0xed,0x5a,0x28,0x34,0xca,0x8d,0xcd,0x0d,0xe6,0xc6,0xfb,0xb1,0x4b,0x0d,0x30,0xfa,0x12,0x46,0x1e,0x4e,0x5e,0xcf,0x73,0xd1,0x49,0x58,0x69,0x6f,0x41,0xf2,0x33,0xff,0x06,0xc3,0xac,0x86,0x0d,0xd7,0x8e,0xab,0x15
.byte 0xf7,0xa4,0xfe,0x1f,0xfd,0x48,0xa1,0x39,0x2b,0x72,0x8b,0xa3,0x49,0xb6,0xfe,0x06,0x1c,0xe3,0x39,0x0c,0xf0,0xfb,0x3e,0xd9,0x7f,0xa6,0x49,0x85,0x18,0xbc,0x37,0xc2,0xba,0xf7,0xc6,0x84,0x9b,0xeb,0x85,0xfe,0xea,0xd5,0xcd,0x0f,0x86,0x4a,0xa9,0xdc,0xfd,0x57,0x3f,0xa5,0x2a,0xc6,0x95,0xcf,0x72,0xd6,0x5b,0xca,0x39,0x2f,0x87,0x27
.byte 0x72,0x33,0x4d,0x2a,0x53,0x83,0x02,0x96,0x0a,0x4a,0x0a,0x16,0x07,0xd6,0xb4,0xbe,0xff,0xa0,0x72,0x31,0x8b,0xc7,0x9b,0xfd,0x4b,0xdc,0x95,0x00,0x82,0x2a,0x56,0x93,0x31,0x08,0xbf,0xb5,0x6f,0xc4,0xca,0x9c,0x13,0xe8,0x57,0xc9,0x22,0xe6,0x89,0x7a,0x81,0xaa,0xf4,0x7c,0x59,0xd6,0x8c,0x71,0x78,0xeb,0x0d,0xa0,0x64,0xef,0x7a,0xcc
.byte 0xea,0x45,0xcc,0xe9,0xfc,0xf5,0x83,0x38,0x3b,0x4f,0x2e,0x47,0x13,0xb5,0xb1,0x09,0xb5,0x94,0xb4,0x74,0x31,0x77,0xc3,0xdb,0xf3,0xfe,0xfe,0x3d,0x4d,0xc6,0xfa,0x5a,0xbc,0xee,0xaa,0x5f,0x03,0x09,0xdc,0x19,0x83,0x1f,0xe3,0x81,0xca,0xb9,0x59,0x4a,0x0d,0xde,0xda,0xf1,0xd0,0x21,0x7d,0x90,0x05,0x4e,0xee,0x63,0xc3,0x20,0x20,0x1f
.byte 0x9f,0xdf,0x99,0x09,0x5f,0x61,0xab,0xbb,0x47,0xd7,0x20,0x79,0x81,0x69,0xb2,0xfe,0xb7,0xc1,0x27,0xcb,0x07,0xce,0x47,0xb6,0x32,0x8f,0x8b,0x06,0x0f,0x3c,0x34,0xe5,0x27,0xdd,0x20,0x42,0x63,0xed,0x9d,0x5f,0x36,0x31,0xf6,0xdb,0xfe,0x2c,0x50,0x9a,0x9c,0x2e,0x42,0xa1,0x1d,0x37,0xc5,0x63,0xd4,0xf6,0xc5,0x53,0xba,0x21,0x88,0x5b
.byte 0xd6,0xc1,0x10,0xaf,0x22,0x21,0xeb,0x7f,0x1b,0x65,0x2b,0x0d,0x54,0xa8,0x0d,0x29,0xdf,0xbc,0x2f,0xd0,0xc0,0xa3,0x52,0x78,0x0c,0x76,0x56,0xf1,0x1f,0x22,0xa7,0x6f,0xb7,0xf7,0xd5,0xcf,0x0c,0xd3,0xbd,0x2f,0x84,0x53,0xae,0xef,0xb1,0xa3,0x38,0x0c,0x80,0x4b,0xef,0x88,0x59,0x2d,0x1f,0x79,0x92,0xfe,0xcc,0xd1,0x75,0x33,0x59,0xde
.byte 0x74,0xd2,0xec,0x7c,0xad,0x8e,0xc7,0x8d,0xb8,0x2a,0x46,0xe0,0xa6,0xb9,0x10,0xf4,0x88,0x58,0x0e,0x68,0xba,0x31,0xaf,0x7b,0x7c,0x00,0xc5,0x9f,0x48,0x16,0x3c,0x92,0xa1,0xa2,0x02,0xf5,0xfd,0xbb,0x3f,0x85,0x9a,0x96,0xc5,0x24,0x36,0xc1,0x18,0x2e,0x85,0x27,0xa0,0xa0,0x69,0x40,0x35,0xe9,0xee,0xdc,0xbf,0x25,0xb1,0x2f,0xa8,0x30
.byte 0x7e,0x36,0x4d,0x74,0xb8,0x73,0xf9,0xaa,0xfd,0xf7,0xb3,0x4d,0x6b,0xbb,0x1b,0x5e,0xfd,0x45,0xca,0xc3,0xa6,0xe2,0x95,0xd3,0xba,0xcb,0x63,0x2a,0x1a,0xd3,0x50,0x1c,0x73,0x6c,0xb6,0x54,0x1c,0xf5,0xf7,0x8b,0x64,0x10,0x07,0x9c,0xc9,0x2a,0xfc,0x97,0x1c,0x21,0x2d,0x80,0xe7,0x5c,0x2d,0xcc,0x4e,0x0b,0x79,0x73,0xd0,0x1b,0xfe,0x92
.byte 0x05,0x95,0x9a,0x93,0xb5,0xbf,0x2f,0x09,0xa6,0x22,0x73,0xf9,0xb6,0x76,0xf5,0x90,0x6a,0x04,0xd2,0x5f,0xc4,0xb5,0x07,0xfc,0x46,0xf4,0xf0,0xcd,0xef,0x80,0xc7,0xf8,0x3d,0x1e,0xf5,0x85,0xfa,0xd7,0x17,0x57,0xba,0x74,0x9d,0xc2,0x73,0x6c,0xf6,0xa6,0x10,0x8d,0x03,0x82,0xee,0xbe,0xe3,0x03,0x0c,0xa5,0x68,0x20,0xf3,0x1e,0xaa,0xcc
.byte 0x2b,0x8a,0xb4,0x76,0xb5,0x97,0x0b,0xa2,0xb0,0xf1,0xa5,0xfd,0xdf,0x0b,0xc2,0xce,0x93,0x75,0x46,0x28,0x53,0xf5,0x19,0x52,0xc6,0x7f,0xbd,0x1e,0x34,0xf8,0xbb,0x11,0x25,0xab,0x0f,0xed,0xd2,0x5e,0xdf,0x67,0x60,0xec,0x3c,0x5c,0x30,0xf0,0x42,0x21,0x97,0x47,0x09,0x77,0x58,0xf6,0x50,0x72,0xd9,0xc6,0xd6,0x71,0x8c,0xf9,0xaa,0x95
.byte 0x45,0x79,0xc6,0x5f,0xae,0xc9,0x36,0x8e,0x48,0x7a,0x56,0x94,0x97,0xed,0x0d,0x51,0xa0,0x54,0xb7,0x64,0x3d,0x3d,0x28,0x31,0x74,0xe9,0x1a,0x11,0x9a,0x5d,0x74,0x40,0x28,0x3c,0x7a,0x12,0xa8,0xbd,0x34,0x13,0xae,0x4b,0xb8,0xba,0xfb,0x84,0xee,0xd7,0x7f,0x6a,0xe4,0x2c,0x77,0xe6,0xf0,0x2f,0x94,0x32,0xd3,0xc2,0x29,0x23,0x55,0x82
.byte 0x17,0x2f,0x69,0x42,0xd2,0x8c,0xa4,0xc9,0xfc,0x6c,0x4d,0x30,0x85,0x23,0x1d,0x63,0xd4,0xc5,0x84,0x8c,0xcb,0xcb,0x68,0xb4,0x10,0x2d,0x44,0x33,0xd2,0xeb,0x45,0x6f,0x6e,0x7f,0x39,0xf3,0xbd,0xc1,0x63,0x49,0x43,0x51,0x64,0x40,0xf8,0xba,0x94,0x0f,0x6f,0x95,0x0d,0x51,0x64,0x68,0x44,0x73,0x3b,0xfc,0x8b,0x52,0x13,0xdd,0x07,0x4f
.byte 0x73,0x97,0xf0,0x9a,0xde,0x5e,0x4b,0x6a,0xe8,0x62,0x25,0x62,0x29,0x67,0x54,0x37,0x11,0xfd,0x3a,0xa1,0xec,0xf2,0xdd,0xd2,0x09,0xb0,0x6c,0x84,0x87,0x32,0xac,0x29,0x68,0x86,0x39,0xf9,0x64,0xa9,0xb6,0xb8,0xd5,0x64,0x8f,0x9c,0xf8,0xae,0x9d,0x84,0x45,0x85,0xf8,0x29,0xba,0xfd,0xb4,0xcb,0x62,0xfd,0xaa,0xb2,0xd0,0x17,0xf0,0x86
.byte 0x92,0xbe,0x69,0x18,0xfa,0x56,0x94,0xbe,0x0f,0xa5,0x47,0x9c,0x6f,0x54,0xe4,0xa8,0x86,0x6a,0xf7,0x16,0x1d,0xd2,0xbd,0x8b,0xb2,0x03,0x01,0x23,0xa4,0x2b,0x91,0x8f,0x30,0xe7,0xc3,0x2a,0xbd,0x82,0xdd,0x2c,0x60,0xb8,0x9f,0x3f,0x03,0x91,0x47,0x37,0x8c,0x1e,0x83,0x23,0x4b,0xe9,0x17,0xf9,0xca,0x86,0x95,0xbe,0x21,0x2a,0x69,0x66
.byte 0x7a,0x2f,0x7f,0xba,0x73,0xa7,0xc3,0xb9,0x6f,0x77,0x5d,0xa9,0x97,0x82,0xff,0xba,0x37,0x72,0xee,0x52,0xe5,0x27,0xeb,0x5e,0xf3,0x88,0x0a,0x29,0xe1,0x7e,0xec,0x2a,0xf2,0xce,0xbd,0x3e,0x55,0x5c,0x22,0x29,0xce,0x35,0x68,0x68,0x12,0x5f,0x0d,0x8f,0x4c,0xa5,0xde,0x49,0xc9,0xb7,0x52,0x85,0x1f,0x81,0x42,0x65,0x4d,0x24,0xf8,0xe9
.byte 0x71,0x0f,0x37,0xdc,0xff,0x2f,0x07,0xf3,0x4c,0x15,0x66,0x24,0xf7,0xeb,0x13,0x25,0x24,0x33,0x47,0xbb,0x3e,0x45,0x31,0x61,0x6a,0x30,0x44,0xe2,0x43,0x2c,0xf1,0x46,0x1c,0x08,0x71,0x70,0xeb,0xa3,0xd1,0x03,0xcb,0x45,0x02,0xe8,0x46,0x5c,0x25,0x25,0x75,0x8f,0x0a,0x89,0x30,0x2e,0xbe,0x48,0xb4,0xb2,0x89,0xa2,0x56,0x87,0x32,0x19
.byte 0x85,0xe5,0x5c,0x69,0x6d,0xee,0xaf,0x64,0x22,0x93,0xe4,0x61,0x84,0xaf,0x36,0xee,0x4c,0xae,0x26,0x37,0xda,0x6b,0x78,0x64,0x2c,0x1b,0x9a,0xd2,0x8f,0x40,0xb9,0xf1,0xd0,0xbd,0xd6,0x67,0x16,0x42,0x2b,0xc0,0xfd,0x77,0x9a,0x69,0x69,0x44,0xbf,0x2c,0xfb,0x81,0xf0,0x96,0x29,0x31,0x35,0xae,0x8b,0x87,0x22,0x2a,0xa7,0x56,0xc8,0x85
.byte 0xd4,0xc8,0x32,0x3b,0xab,0x15,0x98,0x55,0xe3,0x13,0x77,0xd4,0x1b,0xa3,0xeb,0x89,0xe3,0x16,0xc4,0x0d,0xa8,0xde,0x54,0x0b,0x63,0xc5,0x77,0x1d,0x1a,0x0d,0xfb,0x15,0xb3,0x83,0x94,0xab,0x7a,0x7d,0xf3,0xf5,0xd5,0x4f,0x83,0xa2,0xf5,0xd9,0x09,0xa5,0xa7,0xb2,0x79,0xc4,0xbb,0xaf,0x66,0x09,0xd2,0xcd,0x05,0xe8,0xf3,0xcf,0xcc,0xd8
.byte 0x40,0xdb,0x9e,0xc3,0xb4,0xf0,0x1e,0x08,0x0d,0x41,0x75,0xae,0x7c,0x6e,0x19,0x1a,0xf9,0x27,0x6c,0x86,0xc6,0x97,0x99,0xc6,0xc0,0x39,0xbb,0xee,0x85,0x49,0xb8,0x29,0xef,0x3b,0xa4,0x35,0x68,0x4b,0x85,0xaa,0xfd,0xa1,0x5f,0x60,0x9b,0xee,0xca,0x09,0xd2,0xc4,0xe7,0x03,0xd2,0x29,0x78,0x56,0xd0,0x24,0x1e,0xf7,0x57,0x80,0x91,0x0c
.byte 0x09,0xe8,0x03,0x36,0xaf,0x57,0xc5,0x94,0x04,0x13,0xa7,0x44,0x33,0x4e,0x27,0xe4,0xf0,0x05,0xb9,0xab,0x68,0x7d,0x4a,0x67,0x18,0x8f,0xdd,0x57,0x7b,0x83,0xb3,0x48,0x36,0x8a,0xbe,0x88,0xd8,0x86,0xe1,0x51,0x09,0x7e,0xd8,0x83,0x68,0x06,0x1a,0x4a,0x49,0x97,0x89,0x5b,0xc5,0x41,0x59,0xfc,0xb9,0xdc,0x3f,0x09,0x90,0x9d,0x94,0x86
.byte 0xd8,0xcd,0x07,0x46,0x8c,0xb5,0x73,0xd1,0x0b,0x5f,0x67,0x71,0x6f,0xf5,0xc2,0xbd,0x9f,0x7b,0xcb,0x0d,0x7f,0x9c,0xc3,0x92,0xb6,0x23,0xd8,0x84,0xea,0x7f,0xba,0xd6,0x6c,0x3e,0x79,0x8b,0x9f,0x96,0xda,0x9d,0x6f,0x3b,0x05,0x33,0x83,0xf2,0x0a,0x6d,0xac,0x7c,0xce,0xa5,0xc7,0x62,0x43,0x24,0x02,0x79,0x0a,0xad,0x92,0xe8,0x5b,0x36
.byte 0x4e,0x66,0xd6,0x1d,0x09,0x40,0x6f,0x3f,0x0e,0xb3,0x6c,0x9f,0x78,0x77,0xc0,0x78,0x59,0x93,0x70,0xa7,0xf9,0x16,0xf2,0x0b,0x53,0x96,0x89,0x4b,0x1e,0x32,0xbb,0x53,0x29,0xf8,0x55,0x46,0xa1,0x29,0x01,0x34,0x52,0xd1,0xc9,0x8f,0xb4,0x4a,0x49,0x5f,0x46,0x97,0x49,0xf4,0xd5,0x60,0xc7,0x78,0x14,0xde,0x5c,0x8e,0x8f,0xcf,0x28,0xee
.byte 0x8b,0x82,0x71,0xdc,0xbb,0x7c,0x3d,0xda,0x0f,0x01,0x31,0x74,0x9d,0x84,0xca,0x57,0x2b,0x5f,0x2a,0x02,0x52,0x9d,0xb1,0x26,0x7d,0xc3,0x58,0xc6,0x6c,0x8e,0xf2,0x2f,0x10,0x48,0xdf,0x7c,0xd3,0xdb,0x01,0x6d,0x45,0xe4,0xc2,0x62,0xfe,0x60,0x26,0x39,0xd6,0x29,0xe0,0x51,0xfd,0x1f,0xf0,0xd2,0x3f,0xc7,0xc8,0x65,0x14,0xa1,0xb0,0xe8
.byte 0x36,0x61,0x0e,0x11,0xa3,0x37,0x48,0xa8,0xa9,0x35,0xb7,0x38,0x71,0xbe,0xd3,0xb0,0x8a,0xb2,0x96,0x13,0xb3,0xe0,0x44,0xa9,0xd4,0x8a,0x46,0x58,0xa7,0xf4,0x90,0xee,0xde,0x57,0x96,0xaf,0xeb,0x4c,0xd0,0x1b,0xed,0xe4,0xd1,0x8b,0x2e,0xd4,0x93,0xb3,0xc9,0x01,0x36,0xdc,0xdb,0x6d,0x23,0xfb,0xa1,0xdc,0xe8,0x2c,0x9e,0x49,0xaf,0x42
.byte 0x14,0xf1,0xbb,0xf8,0x44,0x85,0x2a,0x0d,0x28,0xe1,0x6e,0x30,0xb6,0x50,0xbf,0x77,0x77,0x8e,0x3c,0x67,0xb7,0x3a,0x0c,0x45,0x6b,0x6c,0x6c,0x9c,0x3e,0x5b,0xe6,0x9e,0x1c,0xbd,0xd2,0x46,0x72,0xe8,0xb4,0x52,0x7f,0x1e,0xea,0x6c,0x24,0x48,0xc7,0x7c,0xb5,0x78,0xf5,0x6a,0x18,0xaf,0xe0,0xa5,0xb3,0x55,0xd6,0x3f,0xf2,0x6c,0xaf,0x6c
.byte 0x30,0x80,0x1f,0x57,0xe0,0xd3,0x6d,0xf6,0xb2,0xf8,0x9f,0x7a,0xcd,0x18,0xd8,0x3d,0x01,0x60,0x26,0x7f,0xdb,0xdd,0x86,0x42,0x1c,0xe7,0x65,0x86,0xe3,0x02,0x60,0x12,0x21,0x0d,0x4c,0x07,0xc0,0xdc,0xb7,0xb7,0x05,0x1e,0xca,0xe7,0x40,0x70,0x63,0xc4,0xa6,0x1c,0x27,0xcf,0x03,0xe8,0xba,0x07,0xd3,0xa1,0x8e,0xf5,0x27,0xc2,0xaa,0x89
.byte 0xdd,0x36,0x46,0x39,0xaf,0x60,0xdd,0x99,0x7f,0x42,0xb1,0xfd,0x7d,0xe5,0x1e,0x5a,0x6b,0x97,0xa9,0xfc,0x58,0xcd,0xac,0x63,0x23,0x66,0xe8,0xf7,0x5e,0x41,0x6b,0x2b,0x77,0xf3,0xf1,0xa7,0x3b,0xa4,0xbc,0xe9,0x0a,0x80,0x57,0x2b,0x62,0xb9,0x02,0x26,0xa9,0xfa,0xb5,0xd5,0x2d,0x5e,0x19,0x77,0x63,0xcd,0x7f,0x4d,0xdf,0x71,0x5e,0x2d
.byte 0xce,0xfd,0x45,0x99,0x8c,0x46,0xc2,0x9d,0x89,0x3e,0xd0,0xac,0x39,0x0f,0x15,0x6b,0xfc,0x99,0x24,0x8c,0xcf,0xf9,0x55,0xf8,0x79,0xb3,0x8e,0xa9,0xf8,0xb6,0x81,0x49,0xda,0x95,0xda,0xce,0xdd,0x5f,0x94,0xb8,0x24,0x41,0xae,0xf3,0xc2,0x7c,0x6b,0xb8,0x7a,0xb9,0x0c,0xb2,0x34,0x2b,0x0e,0x90,0xc8,0x69,0xc3,0xd1,0x53,0x83,0x70,0xc2
.byte 0x6f,0x72,0x3a,0x1a,0xd4,0x68,0x0d,0x8d,0xff,0xa4,0xc5,0xd4,0x04,0xd6,0xca,0x18,0x04,0x7d,0xd1,0xc5,0x02,0xae,0x58,0x07,0x22,0x30,0xf3,0x7e,0xd4,0x3c,0x04,0x61,0xc4,0x24,0xee,0x0e,0x8d,0x48,0x7a,0xc7,0x28,0xe7,0x33,0xed,0x3a,0xe9,0x52,0x52,0x13,0x7e,0x89,0xe3,0x2b,0x5e,0xe3,0x28,0x7b,0x8f,0x87,0x80,0xc8,0x9c,0x4c,0x13
.byte 0x7a,0x2d,0xcd,0x68,0x60,0xcd,0xea,0x27,0x45,0x25,0xef,0x43,0xe7,0x65,0xc9,0xb4,0x81,0xeb,0xbc,0x71,0x0b,0xcf,0xbf,0xcf,0x6a,0xa8,0x70,0x4f,0x92,0xf4,0x8b,0xa2,0x82,0x8d,0x5c,0x73,0xdb,0x1f,0x9b,0xe3,0x81,0xe0,0x07,0x28,0x51,0x77,0x41,0xee,0x83,0xc5,0xcc,0x35,0x07,0x9a,0x20,0x13,0x2c,0x55,0x7c,0x97,0xc0,0xda,0x1e,0x41
.byte 0x56,0x80,0x15,0x26,0x10,0x66,0x12,0xdc,0x82,0xdd,0x1a,0x3f,0xd2,0x72,0xe4,0x80,0xd7,0x47,0x2a,0xa9,0x50,0xa4,0xa4,0xf1,0x6c,0xbe,0x6e,0x69,0x61,0x46,0xae,0x17,0x72,0x96,0xc8,0xcb,0x1c,0x89,0x0b,0x9e,0x0c,0x24,0x90,0x93,0xf6,0xf6,0x9c,0x5c,0x0b,0xeb,0x39,0xde,0xa7,0x64,0x88,0x18,0xc3,0x32,0x92,0xd5,0x06,0x6d,0x88,0xfd
.byte 0xd0,0x99,0xe2,0x65,0x23,0xc3,0x24,0x16,0x2d,0x56,0x47,0x96,0x1c,0x8a,0x09,0xbf,0x23,0x1e,0x36,0x12,0x3b,0xba,0xac,0x13,0xf4,0x82,0xb2,0x0f,0xb4,0x73,0xf8,0x1e,0x96,0xaa,0x5a,0x31,0x48,0x70,0x4e,0x5a,0xf1,0x9b,0xf7,0xf5,0xd3,0x88,0xdd,0x35,0x7c,0xbe,0x85,0x62,0x8d,0x5d,0xc8,0x52,0x41,0x8a,0x24,0xe1,0xae,0x02,0xbe,0x4d
.byte 0xe6,0x15,0x70,0x43,0xed,0x01,0xcb,0xa7,0xf0,0x31,0x10,0x0c,0xc0,0x25,0x02,0x74,0xa9,0x2e,0x34,0xbd,0x77,0xd5,0x00,0x89,0x24,0xa4,0x30,0x36,0x52,0xe9,0x51,0x47,0xe8,0x79,0xe3,0x7a,0x2e,0xe6,0x43,0x6b,0xa4,0x48,0xd7,0x3f,0x75,0x6c,0x64,0x4f,0xc7,0xf9,0x90,0x17,0x8f,0xbc,0x52,0x67,0x34,0x16,0xad,0x35,0x64,0x2c,0xa0,0xf0
.byte 0x67,0x4e,0x2b,0xf8,0x27,0xe0,0xa4,0x4a,0xba,0xe5,0xcb,0x17,0xd9,0x9f,0xc6,0x64,0x68,0xf4,0xe0,0xfc,0x0c,0x5c,0x3b,0xc7,0xc4,0xc0,0x88,0xa5,0x23,0xf3,0x48,0x7a,0x7e,0xa5,0x10,0x97,0x61,0xa2,0x45,0xf5,0xe8,0xe6,0xe9,0x48,0x25,0x78,0xcb,0x6b,0x42,0x5f,0x18,0x26,0xb3,0xb7,0xb1,0x34,0x57,0xf1,0xbc,0x13,0x7a,0xb4,0x01,0xda
.byte 0x9f,0x72,0x91,0xb3,0x4d,0x27,0xff,0x90,0x22,0x5c,0xb2,0xef,0xef,0xd6,0x9c,0x41,0xf3,0x29,0x8d,0x92,0xd9,0x03,0xbe,0x24,0x64,0x99,0xb0,0x8f,0xbb,0x85,0xd2,0x2c,0xda,0x9b,0xb1,0x81,0x52,0x5a,0x0b,0xdf,0x8d,0x70,0x94,0xec,0x72,0x2e,0x58,0x0a,0x38,0x78,0xa1,0x51,0x8a,0x72,0xaf,0x49,0x6e,0xdf,0x8d,0xbc,0xce,0xd2,0xab,0x13
.byte 0x57,0x50,0x40,0xad,0xb8,0x3a,0x17,0x1c,0x61,0xb8,0x06,0xd3,0x2f,0x46,0xa6,0x57,0x4f,0x3a,0xe5,0xcb,0x96,0x48,0x37,0x9e,0xd9,0xb4,0x12,0xb3,0x15,0x10,0xe4,0x4a,0x36,0x6e,0xc5,0x4a,0xd8,0x6a,0xcb,0x96,0xfd,0xef,0xdd,0x1a,0xdb,0x80,0x92,0x93,0x5a,0xc4,0x2a,0x7b,0xe3,0x2d,0x6f,0x83,0x3e,0x50,0xb7,0x66,0xc5,0x66,0xca,0x42
.byte 0x97,0x6e,0x32,0x81,0x31,0x18,0xb9,0xc5,0xfa,0xae,0xb8,0xdd,0x5c,0x91,0xa1,0xc6,0x69,0xa5,0x2a,0xe0,0x1f,0xa4,0xaf,0x0d,0x92,0x4e,0x12,0x60,0xe1,0x0f,0x92,0xcb,0x78,0x49,0xbc,0xcf,0x64,0x4c,0xd8,0xa0,0x2b,0x70,0x7c,0x8b,0xa6,0x64,0x97,0x1b,0x22,0x22,0x3c,0x82,0x8d,0x08,0xfa,0xc4,0x8c,0x18,0xe3,0x1b,0xe9,0xd0,0xd9,0x10
.byte 0xca,0x9b,0x53,0x9c,0x3a,0xe2,0x1e,0xa8,0x00,0x4d,0xe1,0x58,0x55,0x6c,0xd9,0x88,0xda,0xb8,0x3c,0xbe,0x3c,0x65,0xfa,0x4d,0xdd,0x0b,0xde,0xf4,0xaf,0x50,0x9c,0xe4,0xa5,0xae,0xe3,0xc2,0x1a,0x53,0xfb,0x32,0xff,0x7e,0xf0,0x29,0x0c,0xac,0xa2,0xf5,0x68,0xc8,0xd8,0x04,0x7b,0x5f,0xe3,0xe0,0x57,0x0d,0x9e,0xcd,0x58,0xda,0x2a,0x44
.byte 0x49,0x3b,0x1d,0xd9,0x75,0x6b,0x41,0xf7,0xe6,0x7e,0x0c,0x49,0x20,0xc0,0xb5,0x67,0xdf,0xc4,0x28,0xcf,0x21,0x0b,0xa0,0x8e,0xde,0xff,0x5c,0x9f,0x34,0xdf,0xab,0xb9,0x70,0xa0,0xfd,0x80,0x54,0xb6,0xaf,0xc9,0xc4,0x10,0x5c,0x0a,0xc8,0xe1,0x91,0x5d,0xfc,0x24,0xab,0x12,0xdc,0x48,0x45,0xd5,0xc4,0x95,0xbb,0xe0,0x83,0x3a,0x5d,0xb7
.byte 0x8c,0xf1,0xf0,0xc6,0x56,0xed,0x3c,0x31,0x79,0xf2,0x75,0x81,0x3f,0xf0,0x4a,0x3f,0x44,0x99,0xdb,0x9a,0x48,0x44,0xaa,0x4c,0xff,0xea,0xfd,0xc0,0xd3,0xaf,0x46,0xad,0xd2,0x96,0xc5,0x6b,0xd7,0x2b,0x39,0xe5,0xef,0xc6,0xa6,0xe9,0x37,0x5a,0x25,0x0f,0x00,0x05,0x09,0x30,0xbd,0xb0,0x16,0x9f,0x1e,0x15,0x62,0x20,0xd1,0x01,0x4f,0xb7
.byte 0x20,0xb8,0xd2,0x6b,0x2b,0x18,0x66,0x45,0xac,0xad,0x33,0x14,0x4a,0x7f,0x74,0x8b,0xfa,0xa6,0x20,0xef,0x2e,0xd7,0xf6,0x84,0x03,0xb8,0x20,0x76,0x01,0x2b,0x20,0xf9,0x17,0x59,0xc4,0x09,0xe1,0x8b,0x43,0xf1,0x32,0xf2,0xc9,0xe8,0x00,0x37,0x77,0x10,0xd0,0x4d,0x89,0xc4,0x69,0x14,0x24,0xf6,0x30,0xc2,0xfb,0xcc,0x6c,0x6c,0x1d,0xdb
.byte 0x7c,0xd7,0x32,0x1f,0x54,0x1b,0x50,0x39,0x2a,0xd3,0xb4,0x5e,0x0f,0xff,0x7a,0x04,0x5b,0xeb,0xf1,0xcb,0xea,0x5c,0xab,0xaa,0x73,0xb7,0x43,0xe5,0xf1,0xdc,0xc7,0xe4,0xb6,0x53,0x04,0xa5,0xb4,0xb2,0xf5,0xc6,0x93,0xa5,0x24,0x67,0xf3,0xd4,0xbb,0x3d,0x24,0xa2,0x30,0x4c,0x35,0x38,0x9c,0x5b,0x4b,0xba,0xfd,0x69,0x25,0xca,0xff,0x1a
.byte 0xf6,0xc1,0x9b,0xd4,0xd7,0x29,0x9e,0x1c,0x57,0xb5,0x7e,0xa8,0x23,0x0b,0x8f,0x54,0x12,0x36,0x07,0x83,0x15,0xde,0x08,0x17,0xf2,0x65,0xb2,0x36,0xa3,0x55,0x6b,0x2d,0x0b,0xc2,0xf9,0x7a,0xab,0x39,0x9e,0x24,0x31,0x94,0x31,0x21,0xe2,0x1c,0x46,0x69,0x07,0x15,0xd3,0x42,0x42,0x7a,0x60,0x75,0x7e,0x48,0x46,0xc8,0xa5,0xee,0x3f,0xea
.byte 0x97,0x5d,0xb1,0x80,0xbe,0x03,0x29,0xb5,0xf5,0xde,0xae,0xdb,0xf2,0x83,0x7f,0xc1,0x7f,0xb5,0xd5,0xb5,0x18,0x64,0xec,0x90,0xab,0x48,0xed,0xfb,0x75,0x30,0x13,0x2c,0x56,0xbc,0x2c,0xc3,0xc4,0x9d,0xf4,0x50,0xaa,0x08,0x59,0x9a,0x4b,0xc1,0x78,0x8f,0xe9,0xd4,0x3b,0x14,0x48,0x67,0x3e,0x78,0xf5,0xc8,0xba,0xbf,0x92,0xf3,0x23,0x94
.byte 0x35,0x7b,0x0a,0x7d,0xdd,0x21,0xde,0x9d,0x36,0xed,0xb1,0x72,0x0a,0x3a,0x93,0xc7,0x66,0x91,0xf6,0xc1,0xe0,0xf3,0x53,0x5f,0xb5,0xfb,0xa2,0xb7,0x91,0x06,0xf3,0xba,0xb7,0xf9,0x41,0x58,0xc6,0x4b,0x8e,0x63,0x35,0xd1,0xb5,0x6d,0x86,0x3e,0xd9,0x66,0xe1,0x1c,0xb7,0x02,0xc9,0x19,0x82,0xaa,0xda,0x04,0xce,0xe0,0xd0,0xa4,0x7a,0xd3
.byte 0xa2,0x3b,0x18,0x5b,0xfc,0x63,0xea,0xf5,0x8e,0xbb,0x57,0x9e,0x7c,0xe6,0x14,0x03,0xf7,0xe0,0xfe,0xf8,0xee,0x47,0x2a,0x3d,0x71,0x4b,0xe4,0x22,0x88,0x2f,0x7c,0x97,0x9c,0xb7,0x89,0x64,0xc4,0xc9,0xe9,0xa3,0xbd,0xbd,0xa4,0x73,0x98,0xd5,0x48,0x9f,0x2f,0x46,0x1a,0xc6,0xa1,0xce,0x84,0xb6,0x0a,0xb2,0xcb,0xbb,0xde,0x56,0xc3,0x1f
.byte 0x81,0x07,0x08,0xc3,0x50,0xd8,0xcf,0xe8,0x17,0x79,0x4d,0x82,0x09,0x90,0x8b,0xde,0xdb,0x71,0x49,0xb9,0xb0,0x6a,0x82,0x22,0x78,0xbc,0xcf,0x48,0x94,0x76,0xa1,0x6f,0x31,0xe9,0x8a,0x33,0xac,0x6b,0x9e,0xc4,0xa0,0x12,0x9c,0x38,0x82,0xe1,0x70,0xac,0xc8,0x2a,0x2b,0x13,0x87,0xf2,0xc1,0xd3,0xc4,0x5b,0x77,0x37,0x82,0x28,0x4a,0xa1
.byte 0x7a,0x39,0xff,0x8a,0xdd,0x38,0x74,0xb0,0x88,0x83,0x71,0xe5,0x25,0xaf,0x04,0x19,0x99,0x1c,0x8d,0xa0,0x57,0x96,0x36,0xd5,0x28,0x83,0x30,0xd5,0x12,0x78,0x74,0x9f,0x9c,0xbf,0xee,0x68,0x95,0xec,0x56,0x67,0x77,0x54,0x35,0xb3,0xce,0xcf,0x29,0x2f,0xcf,0xec,0x14,0xa1,0x58,0x67,0x95,0xdd,0xc9,0x29,0xe4,0x0a,0xce,0x72,0x9a,0x5f
.byte 0x3d,0x21,0x96,0x0f,0xf3,0x97,0x3a,0x60,0x82,0x1d,0xc5,0xbd,0x45,0x9a,0xe5,0x45,0x71,0x92,0xa3,0x3d,0xb3,0x13,0xf4,0x2a,0x71,0xcd,0x4f,0x70,0xbc,0x16,0x8c,0x35,0xcd,0xaf,0xf9,0x98,0xef,0xa7,0xc4,0x36,0x4e,0x65,0x89,0xaa,0xfc,0x9b,0x58,0x51,0x63,0x8e,0xd3,0x22,0x5b,0xf2,0x5d,0x13,0x6f,0xc8,0xa8,0x67,0x9c,0x8f,0x34,0xfd
.byte 0xfe,0xf5,0xb7,0x84,0xcb,0x87,0x3d,0xb5,0x24,0xb8,0x19,0xa7,0x00,0x03,0x6d,0xc6,0x4f,0x1f,0xb9,0x57,0xff,0xdc,0x65,0xa4,0xe9,0x8e,0xc3,0x6b,0xfa,0x57,0x51,0x3d,0xf0,0x07,0x95,0xaa,0x00,0x31,0xdc,0x08,0x21,0xa1,0x73,0x9c,0xc9,0x46,0x3f,0xf4,0x0f,0xfd,0xec,0xcd,0xf2,0x76,0x73,0xa6,0xc2,0x15,0xeb,0x9b,0x9d,0xfb,0x6e,0xe5
.byte 0xe2,0x6e,0xaa,0x1a,0x30,0x82,0x02,0xad,0x56,0x67,0x3f,0x50,0x76,0x2f,0x04,0x4f,0x79,0xd5,0xfd,0x50,0x39,0xc1,0xe1,0xd5,0x1d,0x6f,0xb8,0x15,0x25,0xa6,0x4c,0x97,0x90,0x93,0x0f,0x34,0x46,0xda,0x99,0x2f,0x0e,0x4e,0xf7,0x09,0x2d,0x30,0xa7,0x74,0x95,0x8c,0x84,0x69,0x60,0x93,0x17,0x66,0xa3,0xff,0x4b,0xed,0xc7,0x5b,0x16,0x51
.byte 0x6a,0x39,0xc4,0x7f,0xd8,0x48,0x92,0xbd,0xc3,0x58,0xfd,0x87,0x8e,0x34,0xac,0xcc,0x2a,0xbb,0x40,0xd5,0x80,0x57,0x12,0x89,0x56,0x77,0x64,0xe3,0xf9,0x25,0x7d,0xd6,0xfe,0xd2,0xeb,0x9d,0x6c,0x20,0x12,0x7f,0xa4,0x19,0x45,0x27,0x36,0x22,0x3b,0x4c,0x1f,0x45,0xab,0x95,0xad,0xed,0x53,0xd8,0xce,0x84,0xde,0xbe,0xb7,0x93,0x6a,0x05
.byte 0x09,0xe4,0x57,0x38,0xb1,0xa9,0x7a,0x34,0x3e,0x43,0x03,0xa6,0xdb,0x60,0x15,0xdf,0x6f,0x26,0xf1,0x41,0xf2,0x83,0x1b,0xc9,0x15,0xf3,0xab,0xfa,0x33,0x19,0x87,0xac,0x55,0x7b,0xb6,0xbd,0x0a,0xbc,0xa5,0x08,0xfa,0xf4,0x7e,0x89,0x49,0x06,0x21,0x6c,0x44,0x27,0xf5,0x7c,0x46,0x6e,0x95,0x50,0x93,0x81,0xae,0xef,0x93,0x50,0x1c,0x4e
.byte 0x7e,0x8c,0x3c,0xf4,0x41,0xbd,0x4a,0xfa,0x11,0x2e,0xed,0x6f,0x84,0x94,0xe1,0x0e,0xe4,0x5b,0x1f,0x0d,0xe0,0x2b,0xa1,0xa2,0xf8,0xa2,0x56,0x3b,0x52,0x41,0xf9,0x0a,0xe4,0x5b,0x82,0xa6,0xaa,0xd6,0x09,0x18,0x14,0x7a,0x36,0x66,0x01,0x47,0x7c,0x20,0xc6,0xf0,0xb3,0x24,0x29,0xb3,0x03,0x54,0x74,0x7d,0xee,0x28,0x6e,0xd8,0x4a,0x1a
.byte 0x02,0x1d,0x86,0x11,0x16,0x4b,0x0f,0x92,0x31,0x6e,0x7b,0x8b,0x47,0x73,0xd8,0x46,0xf6,0x7b,0x82,0xfe,0xcd,0xe8,0x01,0x49,0x32,0xb7,0xa3,0xf1,0xc0,0xb9,0x0a,0x86,0xf7,0x6d,0xee,0xf3,0xed,0x66,0x8a,0x35,0x73,0xfb,0xb7,0xfd,0xff,0x0d,0xd1,0xd5,0x1b,0x4e,0x59,0x1a,0x84,0x0f,0x73,0x9c,0xfd,0x36,0xb0,0x81,0x79,0xec,0x46,0x94
.byte 0x32,0x1f,0x7a,0x98,0x1f,0xc7,0x99,0xc9,0x1d,0x54,0x8b,0xda,0x80,0x7a,0x38,0x38,0x8f,0x9e,0x2a,0xfc,0x24,0x2b,0x58,0x17,0xa6,0x2c,0x31,0x37,0xcd,0x14,0xb5,0x67,0xcb,0xdc,0x59,0x9b,0xd2,0x77,0x31,0xa1,0x6d,0xbe,0x09,0xd2,0x12,0x34,0x70,0x81,0xb0,0x19,0xbf,0xd6,0xb2,0x63,0x75,0xc1,0x1b,0xaa,0x8c,0xdc,0x59,0x79,0x12,0x5d
.byte 0x20,0x43,0xd8,0x1a,0x03,0x87,0xb3,0x8f,0x52,0x0b,0xdc,0x69,0xa5,0xf2,0x19,0x07,0x6d,0xe2,0xfd,0x52,0xc9,0x7b,0x9a,0x37,0x48,0x1b,0xb1,0xd2,0x6b,0xd9,0x4e,0x6c,0xfd,0xc1,0x94,0xf2,0x36,0x21,0x89,0x5e,0x89,0x5e,0x87,0x09,0xa1,0x9b,0x6b,0x67,0xd1,0xde,0x85,0x2f,0xd5,0x6c,0x19,0x78,0xe7,0x61,0xd3,0x53,0x6e,0xb5,0x1c,0x23
.byte 0x5e,0x4d,0x32,0x73,0x25,0xa6,0x29,0xa2,0xb9,0x1b,0xc0,0x07,0x54,0x38,0x17,0xdf,0xc0,0xcc,0xb1,0x47,0xb9,0x07,0x1d,0xbd,0x8f,0x97,0xab,0x3f,0x7f,0x5b,0xff,0x34,0x01,0x3a,0x2c,0x6a,0x15,0x1d,0x77,0x36,0x32,0x55,0xf5,0x5c,0x84,0xfc,0xd6,0x54,0x22,0xfb,0x6a,0xce,0xb2,0x62,0x03,0x7f,0x96,0xf6,0x37,0xce,0xcc,0x08,0xcf,0x68
.byte 0x66,0x42,0x27,0x80,0x27,0x99,0x3d,0xbd,0xf8,0x60,0x4e,0x49,0x06,0x8a,0xd2,0x6b,0x1d,0x80,0xe0,0xfe,0xe4,0x2a,0x75,0x8e,0xd1,0xdf,0x26,0x69,0x55,0xe5,0xbb,0xa8,0xf3,0x3d,0xdd,0x54,0x90,0x90,0xd8,0x5d,0x86,0x9c,0xdc,0x41,0x71,0xac,0xd4,0x48,0x8f,0x15,0xc6,0xca,0x7e,0x03,0x95,0x81,0x56,0xdb,0xb6,0xe5,0x27,0xb3,0x60,0x51
.byte 0x93,0x21,0x9a,0x68,0x1e,0xb2,0x5c,0xf8,0xf1,0xdd,0x19,0x02,0xaa,0x5f,0x16,0xaa,0x13,0xa6,0xe7,0xcf,0xfb,0x7c,0xd4,0xe7,0x55,0x8a,0x5d,0xf3,0xec,0x3d,0xca,0xf8,0x34,0x32,0xaa,0xd8,0x47,0x11,0x25,0xe4,0xf1,0xbd,0x7a,0x1d,0xe9,0xa3,0xce,0x2e,0x44,0xe1,0xa4,0xbe,0x70,0x68,0x49,0xa4,0x14,0x7b,0xde,0xa6,0x9e,0xe1,0x32,0x01
.byte 0xb3,0xed,0xc4,0x15,0x0c,0x84,0xb1,0xd4,0xef,0xa5,0xbc,0x2e,0xc8,0x79,0x6b,0xf1,0xf8,0x61,0xae,0x55,0xa3,0xd5,0x0e,0xf5,0xc0,0xb8,0x9c,0xdf,0x7f,0x12,0x19,0xc2,0x73,0x22,0xc2,0xc5,0x77,0x76,0xb0,0x36,0xe5,0x89,0x7e,0x5a,0x4a,0xb4,0xa0,0x4d,0x8e,0x1b,0xbe,0x52,0xd1,0xf5,0x3b,0x84,0xf8,0x44,0x76,0x26,0xbb,0x31,0x38,0xd1
.byte 0x24,0xa7,0xb7,0xb5,0xcb,0xa6,0xa7,0x9c,0x15,0xeb,0x31,0x57,0x93,0x3f,0x1c,0x48,0xe9,0x3b,0x20,0x21,0x46,0xe9,0xe2,0xe1,0xd3,0xf4,0xd9,0xcb,0xe7,0xa1,0xa9,0x75,0x7e,0x70,0x95,0x33,0x43,0x86,0xb2,0xd1,0x01,0x8e,0xcb,0xb5,0x1c,0xc5,0xe8,0xcb,0xec,0x1d,0xf2,0xd1,0xe9,0x3b,0xf0,0x8f,0x1a,0x30,0x79,0x83,0x31,0xd6,0x29,0x18
.byte 0xe7,0x80,0xaf,0xd3,0x1d,0x48,0x59,0x14,0x1e,0x94,0x4f,0x32,0xaa,0x8c,0x40,0x37,0xad,0xed,0x30,0xe3,0x5a,0xc5,0x2c,0xdf,0xf5,0xa4,0xcc,0x52,0xdb,0x48,0x90,0xc3,0xbb,0xff,0x65,0x9b,0x86,0xec,0x06,0xac,0xec,0x3c,0x67,0xdc,0x82,0x57,0xb5,0xd4,0x19,0x19,0x68,0x73,0xad,0xd7,0xa9,0x9c,0x3f,0x8e,0xe8,0x7c,0x92,0x4c,0x66,0xbe
.byte 0xe1,0xa6,0x9c,0x1c,0x85,0xcc,0xcf,0xfa,0x86,0xeb,0x34,0xe5,0xf1,0x14,0x09,0xa7,0xde,0xf5,0x2f,0xc0,0xc9,0xb4,0xab,0x92,0x8f,0x76,0xf0,0x78,0x02,0x8d,0x8d,0x44,0x3c,0x2c,0x57,0xfe,0x40,0xb5,0xd2,0xea,0x67,0x1c,0x30,0xb4,0x75,0xbb,0xeb,0xd4,0xf7,0x53,0x0a,0x09,0x29,0x0c,0x02,0x40,0x4b,0x22,0x98,0xe7,0x70,0xa7,0x6b,0xcf
.byte 0xf3,0xa1,0xed,0x50,0xec,0xbb,0xbc,0x24,0x48,0x20,0x03,0x64,0xac,0x03,0xf7,0x9a,0xb5,0x8e,0x16,0xee,0x36,0xb1,0xa7,0x82,0xf4,0x21,0x77,0x79,0xa8,0x07,0x57,0xb4,0xb5,0x59,0x84,0x62,0x29,0xcd,0xb4,0xb8,0x78,0x3c,0x20,0x96,0xe5,0x43,0x8f,0x21,0x38,0xff,0x32,0xa5,0x4f,0x23,0x4b,0xf4,0x5d,0x96,0xc4,0x74,0xe4,0xc1,0x9e,0x72
.byte 0xb1,0x37,0x2a,0x7c,0xa7,0xd1,0xa9,0xf0,0x9e,0x90,0xdd,0xfa,0x3b,0x47,0x7d,0x31,0x08,0x7a,0xbd,0xe7,0x0b,0x0c,0x78,0x92,0x85,0xb4,0x7f,0x33,0xe0,0x7c,0x14,0x92,0x3f,0x3b,0x2e,0x6a,0x61,0x4a,0x81,0xf1,0x76,0x53,0x1f,0x24,0x95,0xe7,0xc2,0xd0,0x7d,0xb4,0x3c,0x59,0x85,0x55,0x0b,0x46,0xd0,0xc3,0x0b,0x0c,0xe1,0x34,0xd9,0x67
.byte 0xfc,0x6b,0x98,0x67,0xdb,0x24,0x08,0xd3,0x15,0x9d,0xb5,0x31,0x22,0x7e,0xe7,0x77,0x7c,0x7e,0x49,0x48,0x6c,0x3e,0xd5,0xda,0x4f,0x46,0x94,0xf9,0x59,0x5d,0xb6,0x4e,0xec,0x76,0xfe,0x5e,0x10,0x63,0x92,0x89,0x3e,0x56,0x18,0x94,0x6c,0xac,0xc1,0x2d,0xba,0xf4,0x1f,0xd4,0x09,0xa0,0x00,0x39,0x8f,0x9e,0xfb,0x63,0xa0,0x34,0x71,0x23
.byte 0xdf,0xaf,0x0d,0x88,0x75,0x37,0x92,0xd0,0x17,0xcb,0x20,0xad,0x94,0xa9,0x94,0x9f,0xce,0x1c,0x19,0xe2,0xdb,0x36,0xe0,0xa6,0x68,0xa4,0x1d,0x16,0xb6,0x16,0xb2,0xf4,0xe4,0x3e,0xfc,0x3b,0xda,0x10,0x57,0xc9,0x81,0x58,0x28,0x43,0xf8,0x45,0x38,0x5c,0xb1,0xd6,0x54,0x16,0x45,0x36,0x46,0xe2,0x60,0xa5,0x47,0x9a,0x29,0x85,0x54,0x45
.byte 0xdc,0x1a,0x63,0xe6,0xae,0x3b,0xdf,0xa9,0xd4,0x10,0x63,0x19,0x91,0x81,0x8e,0x90,0xb4,0x1f,0x25,0x5a,0x46,0xff,0x41,0x1e,0x25,0x1f,0x98,0xb5,0x69,0x2b,0x5e,0x5d,0x7d,0x0a,0x27,0x13,0x3f,0x70,0xe8,0xae,0xa1,0x89,0xb7,0x4a,0x5c,0xef,0x03,0x08,0x7f,0x66,0xa4,0xa7,0x6a,0x27,0x27,0xfc,0x8c,0xe4,0x61,0x8e,0x9e,0x19,0x6d,0x98
.byte 0x2f,0xd0,0x31,0xdf,0xb5,0x86,0xa5,0x23,0xe0,0x82,0x8c,0x26,0xf7,0x96,0x7f,0xca,0xab,0xba,0xcb,0x54,0x5e,0x05,0x9a,0x0a,0x75,0xbe,0xbf,0x25,0x80,0x18,0xac,0xd8,0x4e,0x9c,0xd3,0xb7,0x34,0x73,0xfa,0x73,0x17,0x89,0xc7,0xe2,0x94,0x59,0xc1,0xca,0x78,0x48,0x6d,0x63,0x2c,0xce,0x70,0x90,0x6a,0xbd,0x6b,0xb8,0xaa,0xac,0x5f,0x09
.byte 0xf3,0x96,0xac,0x07,0xe0,0x12,0xdc,0xf7,0x12,0x61,0xa7,0x9d,0x7c,0x7b,0x63,0x02,0x59,0x43,0xd4,0xcb,0xa4,0x32,0x7e,0x3e,0x27,0xf5,0x37,0xf5,0x75,0x35,0xc4,0x17,0xa4,0x98,0xae,0x04,0xe8,0x28,0x18,0x84,0xf1,0x57,0xff,0x1a,0xa8,0xaa,0x31,0xc2,0x5f,0xd9,0x38,0x11,0xdc,0x49,0x59,0x28,0x8a,0x43,0x04,0xd2,0x83,0x96,0x66,0xe3
.byte 0x26,0x56,0x5e,0x4a,0x8f,0x11,0xcc,0x30,0xd4,0x11,0x52,0xdf,0x95,0x46,0xb6,0x8a,0x9a,0x80,0xa5,0x9f,0xae,0xeb,0x06,0x38,0x14,0x7d,0x6a,0x25,0x7b,0xf8,0xf8,0xa1,0x2e,0xeb,0x84,0xc3,0x25,0x63,0xa4,0xe4,0xf8,0x9b,0x4b,0xfb,0xb1,0xb4,0x18,0x54,0xfa,0x74,0xc5,0x5a,0x59,0x79,0xf5,0x19,0x2a,0x51,0x4c,0xe0,0x30,0xe5,0x43,0x71
.byte 0xda,0x37,0xb3,0xca,0x1c,0x6f,0xa3,0xf5,0xa1,0xd9,0x6c,0xaa,0xca,0xb5,0xae,0x9f,0x51,0xef,0x17,0xc3,0xaa,0x4c,0xe1,0x3b,0x2a,0x61,0x85,0xdf,0xb4,0x6b,0x18,0x9f,0x1e,0x0d,0x4a,0xe6,0xaf,0x72,0x4a,0xa0,0xad,0x5b,0x44,0xf5,0xa4,0x00,0x91,0x4a,0x33,0xf8,0x8d,0x83,0x51,0x83,0x6b,0x1d,0xca,0xcd,0x94,0x04,0x0b,0x5f,0x3d,0x60
.byte 0x26,0xbf,0x9f,0xa5,0xac,0xaf,0x66,0x5c,0x2a,0x37,0xa6,0xfc,0x11,0x1b,0xa6,0x8b,0x02,0xe5,0x4e,0x0f,0x1f,0x7a,0x0d,0x49,0x22,0xb9,0x66,0x97,0xbd,0xee,0x82,0xc7,0x78,0xba,0x77,0x50,0x54,0x68,0xf6,0xc8,0xc9,0x73,0x82,0x93,0x1f,0xfe,0x6b,0x49,0x9b,0x63,0xad,0x6c,0xaa,0x78,0x07,0x9f,0xda,0x11,0xb2,0x36,0xb7,0xcb,0xea,0x27
.byte 0x83,0x66,0xa3,0x20,0x20,0xf8,0x29,0x56,0xb8,0xcf,0x93,0xcd,0x40,0x94,0x94,0xef,0x3e,0xda,0x3d,0x4e,0xff,0xef,0xea,0x29,0xc3,0xd2,0x6e,0x2d,0x74,0x27,0xe4,0x31,0xd0,0xcb,0x76,0x48,0xf2,0x9b,0xf7,0x59,0x95,0x15,0x33,0xc1,0x2f,0x88,0xf3,0xa8,0xdf,0xc9,0x86,0xcf,0x37,0xf1,0x08,0xb9,0x76,0xe6,0x09,0x48,0x44,0x25,0x9b,0x98
.byte 0xbe,0xab,0x20,0xa1,0x21,0xe9,0xf9,0x9b,0x31,0xf1,0xfd,0x49,0xaa,0xb5,0xf0,0xbf,0xec,0x8d,0x1c,0xf4,0xaa,0xa9,0x23,0xe5,0x0c,0x1b,0xd7,0xad,0xbd,0x97,0x16,0xdf,0x4f,0x7a,0xd4,0x68,0xd6,0xc2,0xba,0x92,0x17,0x5c,0x80,0xf6,0x4a,0xf1,0x26,0x50,0x58,0xd0,0x11,0xed,0x98,0x55,0x75,0x44,0xb2,0xb5,0x96,0x22,0xe6,0x4f,0xc8,0xba
.byte 0x97,0x3a,0x3e,0xce,0xc5,0x8c,0xf2,0x8c,0xf1,0x91,0xb6,0xb3,0xcd,0xae,0x2c,0x80,0x2a,0x15,0x7e,0x65,0x28,0x35,0x50,0xae,0x36,0x03,0x8b,0x38,0x8f,0x51,0x20,0x8d,0x38,0x19,0x68,0x6e,0x25,0x28,0xd7,0x2c,0x74,0x7f,0xac,0xa8,0x02,0xed,0x01,0x08,0x01,0x1a,0xc4,0x7d,0x18,0x6c,0xf5,0xce,0x25,0xea,0x1f,0xdc,0x85,0xf2,0x8c,0x56
.byte 0x60,0xe6,0x5c,0x5f,0x08,0x2c,0x43,0xe2,0x53,0x5c,0xd0,0xa7,0x78,0xec,0x2a,0x75,0xb4,0x18,0x4f,0x80,0x19,0xca,0x30,0x13,0x67,0xcd,0x73,0xba,0xf9,0xba,0x54,0x39,0x0b,0x4b,0x03,0x7d,0xfd,0x21,0xac,0x14,0x54,0x56,0xba,0x6f,0x0b,0x59,0xbf,0x52,0x19,0xb2,0xb7,0x18,0x57,0xaa,0xaa,0xb2,0x07,0x6b,0xf7,0x13,0x37,0xe1,0xff,0x5a
.byte 0x1d,0x54,0xdf,0xf0,0x57,0xb4,0x14,0x93,0x03,0x31,0xe3,0xaa,0x53,0xa5,0x8e,0x39,0xbc,0x17,0x83,0xd1,0xc3,0x4d,0x5f,0x8d,0xa0,0x08,0x09,0xf2,0xde,0x5b,0x47,0x72,0xad,0x9f,0x22,0x59,0x8d,0x7c,0x8f,0x4b,0x78,0xd2,0x35,0x49,0x34,0x23,0x89,0xa4,0xa1,0x15,0xb0,0xed,0xc0,0x60,0x53,0x68,0xf6,0x3b,0x35,0xca,0x75,0xf6,0x04,0xde
.byte 0x2f,0x0c,0x8c,0xd8,0x75,0xd1,0x7c,0xa1,0x62,0x6b,0x2c,0x2d,0x10,0x1b,0x38,0x81,0x10,0x82,0xcb,0xb8,0x75,0xfa,0x3f,0xfd,0x41,0xd5,0x6d,0x88,0x12,0x5e,0xc5,0x23,0xb3,0x8e,0x37,0x01,0xd9,0xee,0x25,0x32,0xda,0x3c,0x3b,0x50,0xa7,0xef,0xe3,0xac,0xfd,0x50,0x4e,0x55,0x94,0x2d,0xcc,0x41,0x07,0x6e,0x3f,0x8f,0x1a,0x21,0x4d,0x79
.byte 0x42,0x1c,0x8e,0x23,0x4c,0x43,0x02,0x5c,0xf8,0x59,0xc8,0x88,0x64,0x93,0x30,0x25,0xf7,0xea,0xeb,0x2c,0xe5,0x10,0x47,0x36,0xd8,0x32,0xe7,0xf3,0x5e,0x1b,0xcc,0x78,0xda,0xe7,0xc9,0xb6,0xf9,0x24,0x50,0x5a,0x6c,0xfb,0x30,0xc7,0x25,0xa4,0x54,0xdb,0xdc,0xc7,0xf3,0x64,0x9f,0x79,0xc5,0x6c,0xef,0xa2,0x12,0xb3,0x18,0xff,0x97,0xe8
.byte 0x79,0xaa,0x33,0xf1,0xb2,0x69,0x48,0x61,0x71,0x4c,0x8b,0x87,0x50,0x00,0xc1,0x90,0xc4,0x16,0x2a,0x52,0xca,0xf3,0x30,0x51,0xd0,0x8b,0x19,0x46,0x1c,0xb1,0xa3,0x56,0x8a,0x18,0xd8,0x04,0x9f,0x4d,0x3e,0xd7,0xcb,0x15,0x07,0x08,0x45,0x29,0x0d,0xf1,0x94,0x35,0xea,0xc2,0x89,0x0d,0x32,0x01,0x53,0xe3,0x8b,0xba,0xbf,0x39,0x36,0xe4
.byte 0x3a,0x9b,0x0b,0x8f,0x3b,0xbd,0x15,0x47,0x81,0x68,0x99,0xc3,0x40,0xc4,0xad,0x44,0x8f,0x02,0xe8,0x77,0x32,0x4d,0x8e,0xfe,0xf3,0xa0,0x95,0xef,0x8b,0x1b,0xd6,0xbc,0xac,0xe5,0x2b,0x05,0x5d,0xcd,0x1f,0xe6,0xac,0x80,0x62,0x91,0x54,0x6c,0x6f,0xcc,0xab,0x09,0x83,0x1d,0xcc,0xf2,0x40,0x91,0xc1,0x6b,0x41,0x19,0x33,0x36,0x8b,0x81
.byte 0xfb,0x97,0x2b,0x6f,0x28,0xc7,0xc2,0x69,0x7e,0x36,0x60,0x5d,0x89,0x8c,0xee,0xe0,0x0a,0xbf,0x38,0x6e,0xc4,0x9b,0xe4,0x93,0x33,0x96,0x80,0xf4,0x56,0x00,0xf4,0xa5,0xe5,0x29,0x04,0x13,0x83,0x0d,0x5d,0xcb,0x6a,0x09,0x90,0xc9,0xb4,0xe9,0xa4,0x13,0x3a,0x0e,0x64,0x18,0x2d,0x33,0x19,0x67,0x5f,0x89,0xd1,0x86,0x3d,0x8f,0x9d,0xb3
.byte 0x0c,0x7b,0x90,0x6e,0x9a,0x09,0xa2,0xb6,0x8a,0xc6,0x03,0x16,0xcf,0xe7,0xe0,0xe3,0x29,0xad,0x59,0x29,0x78,0xdd,0x26,0xcd,0x32,0xd7,0xb4,0x43,0xb8,0x18,0xa9,0x8f,0x79,0xe8,0xbc,0xe1,0x4d,0x16,0xa5,0x09,0x88,0x5c,0x37,0x50,0x88,0xee,0xcd,0x35,0x0d,0xd4,0xe4,0x14,0xd0,0x1b,0x9b,0x1f,0xd7,0x44,0x36,0x9a,0xe8,0x82,0x5b,0xb3
.byte 0xb3,0xea,0xcf,0x05,0x78,0xd8,0x94,0xd4,0x63,0x7f,0x45,0x0e,0xb2,0x96,0x7b,0x97,0xf0,0xde,0x85,0x2a,0x70,0xc3,0xb1,0x17,0xd2,0xf0,0x3a,0xb7,0xde,0xa5,0x5f,0xbc,0xda,0xa5,0x93,0xd2,0xd8,0x2c,0x74,0xd3,0xad,0x25,0xbd,0xda,0x80,0xd9,0x13,0xff,0x07,0x3f,0x56,0xa7,0x27,0x72,0x45,0xa9,0x06,0x44,0x3f,0x28,0xc4,0xb6,0x20,0x9d
.byte 0xcd,0xb7,0xba,0x53,0xbc,0xe0,0xb6,0x91,0x8b,0x9d,0x2b,0x3d,0x0a,0x35,0xdb,0x9f,0xed,0x47,0x29,0x54,0xc1,0xbf,0x33,0xc2,0x69,0x0f,0x5b,0x7d,0xa1,0xe8,0x8b,0xd0,0x4f,0x69,0xf1,0x32,0x68,0x2a,0x2a,0x83,0xd0,0xe9,0xe3,0x73,0xbd,0xcd,0x6e,0x5c,0x33,0xab,0xf0,0xed,0xc3,0xf4,0x03,0xa2,0x8c,0xb8,0x53,0x91,0xb5,0x79,0x7a,0xfb
.byte 0xc4,0x99,0xb8,0x06,0xf1,0xdf,0x4e,0x65,0xf2,0x0c,0xc6,0xd2,0x3f,0xe6,0xc2,0x4c,0xb3,0xfd,0xa8,0x24,0x27,0x5c,0xae,0x16,0xf1,0x99,0x12,0x8b,0xc9,0xf0,0x96,0xb2,0xcf,0x13,0x92,0x62,0xfb,0xf6,0x66,0xf4,0x87,0x1a,0x8b,0x09,0x4c,0xac,0x1b,0x6b,0x8b,0xa8,0x9d,0x14,0x36,0x90,0xe1,0xdc,0x6e,0x14,0x2e,0xa0,0x81,0xeb,0xd9,0x2c
.byte 0xe0,0x2d,0x83,0x99,0x91,0xe5,0x79,0xca,0x61,0xfb,0x44,0x8e,0x63,0x52,0x85,0x27,0x1a,0x2e,0x63,0x34,0xdb,0x96,0xe7,0x39,0x0d,0x7e,0x64,0xc8,0x71,0x65,0xe0,0xb5,0x4a,0x03,0xe1,0x05,0xf0,0x23,0xf9,0x0a,0xc1,0xcb,0x8b,0x6f,0xee,0x47,0x99,0x63,0xac,0xb6,0x7b,0x12,0x68,0x45,0x8d,0x51,0x03,0xfa,0x3e,0x18,0xed,0xba,0x35,0x3a
.byte 0xd7,0x6d,0x32,0xca,0x04,0x04,0x24,0xba,0x95,0x52,0x97,0x35,0x91,0x1c,0x9f,0xf2,0x83,0x4d,0xe3,0x3f,0xcd,0x71,0xf8,0xc2,0xe0,0xbe,0xcb,0x32,0x1e,0xa3,0x00,0xf6,0x53,0x9d,0x22,0x33,0xb1,0x4c,0x2a,0x9f,0x03,0x98,0xba,0x72,0x63,0x6b,0xa3,0x3a,0xe4,0x27,0xc6,0xec,0xfb,0x6a,0x35,0xae,0x56,0x7e,0xf2,0x26,0x43,0xad,0x04,0x26
.byte 0xc8,0xcd,0x3b,0xa7,0xf4,0xab,0xb4,0x8c,0xc3,0xde,0xd8,0xce,0x51,0xa8,0x35,0xc9,0x87,0x68,0x72,0x35,0xb7,0x87,0x37,0xe2,0x7f,0x02,0x06,0xce,0x32,0x0f,0xe7,0x7b,0x5f,0x41,0x58,0x6f,0xe6,0xef,0xd8,0x4f,0x45,0x9f,0x92,0xe2,0x8a,0x37,0xd0,0xdd,0xe5,0xa9,0x56,0x41,0xc2,0xea,0x93,0xfc,0x9f,0xfb,0x42,0x73,0x8b,0x9e,0xd4,0x4b
.byte 0xb4,0x3b,0x30,0x33,0x36,0x50,0x7a,0x0a,0xdd,0x9c,0x65,0x78,0x8f,0xb4,0x91,0x9f,0xc3,0x90,0x4b,0x7a,0xed,0x8a,0xe2,0xe6,0x63,0x8b,0x51,0x1d,0x3d,0xef,0x62,0x27,0x21,0xaa,0xc4,0x7a,0xc1,0xea,0x66,0xed,0xb6,0x73,0x4a,0x6e,0x0c,0xec,0xae,0xf7,0xd5,0x3e,0x63,0xb3,0xbc,0x04,0x3e,0x9e,0xa8,0x27,0xa4,0xb1,0x48,0x5b,0x56,0x0a
.byte 0x9d,0xfb,0xdb,0xd1,0x08,0x10,0xa5,0x46,0x80,0x03,0x7c,0x23,0x94,0x06,0x71,0xd0,0x47,0x45,0xe5,0x83,0x7f,0x06,0x94,0xdc,0xcb,0x0e,0xd0,0xd1,0xfb,0x04,0xa3,0x0c,0x30,0x07,0x37,0xc0,0x1d,0x90,0x6f,0xbc,0x71,0x4a,0xce,0x2d,0x9e,0x8c,0x2f,0x98,0x2c,0x31,0x73,0x67,0x68,0xdf,0x01,0xaa,0x49,0x40,0xfc,0x71,0xfd,0xbd,0x67,0xdf
.byte 0x6c,0xe6,0x37,0x64,0x88,0x8f,0x05,0x04,0x59,0x0c,0x16,0x4e,0x6f,0x0c,0xff,0x11,0xcb,0xac,0x9d,0x42,0xb7,0xfc,0xf4,0xda,0x77,0xdf,0x62,0xe7,0x80,0x9d,0x37,0x50,0x86,0x16,0xb2,0xf3,0x86,0x8f,0x04,0xe0,0xb7,0x2b,0x2d,0x82,0x9a,0xe5,0x34,0x31,0x9a,0x77,0x63,0x60,0x7a,0xfe,0x5b,0x9b,0x32,0xf9,0x4d,0x66,0x5e,0x01,0x05,0xd4
.byte 0xc1,0x74,0xb5,0x41,0x3d,0x0c,0xab,0x98,0xdf,0xdd,0x42,0x62,0x78,0xb2,0x42,0x20,0x66,0x19,0x9e,0x83,0x9c,0xbf,0x32,0x4d,0x96,0x78,0x56,0x9b,0xa0,0xb6,0xce,0x67,0x3a,0xfc,0x34,0x92,0x39,0xe3,0x8f,0x8a,0x8a,0x81,0x1d,0x5b,0xf7,0xfb,0x15,0xba,0x2b,0x2e,0x20,0x3b,0x82,0xfb,0x59,0x90,0xb7,0x2f,0xd4,0x60,0x79,0x58,0x64,0xee
.byte 0xb8,0xcd,0x4e,0x1c,0xac,0x58,0x43,0xce,0x5c,0xc9,0xe7,0xce,0xb1,0xc8,0x78,0x85,0x19,0x02,0x5d,0x86,0x1b,0xed,0x0b,0x7a,0x27,0x24,0xc2,0x90,0xae,0x5e,0x66,0xad,0x3b,0xc6,0xb5,0xe4,0xaf,0xc5,0xf2,0x0d,0x87,0x63,0x7a,0xcd,0x32,0x77,0x24,0xf8,0x67,0x84,0xbb,0xc1,0x09,0xf1,0x1c,0x41,0x7b,0x4d,0xb3,0x6e,0x58,0x02,0xf0,0x2d
.byte 0x09,0x78,0x4b,0x86,0xd3,0xb2,0x3a,0x52,0x15,0x86,0xde,0x47,0xb0,0x85,0x1e,0x01,0xe8,0xe8,0xeb,0x71,0x96,0x23,0x4a,0xb9,0x32,0xc6,0x51,0x93,0x5d,0x60,0x40,0x5e,0xb8,0xb4,0x85,0x6b,0x0c,0xe6,0xfb,0x02,0x16,0xd8,0x4b,0xaf,0x7f,0xa2,0x48,0x0c,0x43,0x55,0x5a,0x9a,0xd0,0x24,0x88,0xbe,0xcf,0x97,0x4b,0x79,0xf3,0x7a,0xb8,0x3a
.byte 0x6d,0xcd,0x8d,0x84,0x72,0xd7,0xd8,0xb4,0x54,0x68,0xa9,0x3d,0x72,0x53,0x51,0x42,0xca,0x11,0x2e,0xc8,0xe1,0xce,0x40,0x65,0x3e,0x5f,0x34,0x37,0xa3,0xee,0x2d,0x8a,0x68,0xcb,0xf0,0x96,0xc9,0x34,0xe3,0x5b,0x5c,0x4b,0xd6,0x48,0xdb,0x0c,0x79,0xbb,0x26,0xe4,0xa5,0x60,0x5a,0x21,0xec,0x2a,0x2d,0x64,0xe8,0xef,0xd9,0x9d,0x6e,0x9c
.byte 0xdf,0xfe,0xbc,0x40,0x2d,0x6f,0xfe,0x55,0x7a,0x51,0x43,0x87,0xc8,0x03,0xd7,0x23,0x4f,0xf0,0xb9,0x31,0x70,0x9b,0xdb,0xf8,0x6c,0xad,0x45,0xe8,0x81,0x25,0x72,0x5d,0x6e,0xc1,0x68,0x9d,0xd7,0x5a,0x94,0xe3,0xab,0xa1,0x37,0x71,0xcb,0x2a,0x70,0x86,0x73,0x8b,0x52,0x1f,0x2d,0xe7,0xd3,0xc1,0xdd,0x7d,0x3a,0x32,0x0f,0x0c,0x0e,0x1f
.byte 0xd9,0xfb,0x11,0xbe,0x40,0x17,0x89,0x8f,0x24,0x23,0x19,0xa0,0x53,0x7d,0x90,0x6e,0xfb,0x11,0xfa,0xc7,0x05,0x02,0xca,0x42,0xcf,0x00,0x58,0xeb,0xfb,0x4d,0xe7,0x8a,0x75,0x84,0x41,0x50,0xf8,0x5d,0x47,0x23,0x45,0x45,0x2e,0x77,0x47,0xc4,0x59,0x6f,0x91,0x98,0xbc,0xdf,0x91,0xef,0x2a,0x7a,0xe7,0x48,0x02,0xc6,0x4d,0x4b,0x21,0xe6
.byte 0xc8,0xcf,0x50,0x6a,0xe5,0xa4,0x6f,0x76,0x6f,0xb2,0xbe,0xb8,0x26,0xe8,0xea,0x8e,0x4e,0xf3,0xcc,0x09,0x29,0x5b,0x5a,0x4e,0xa0,0x0c,0x95,0xf2,0xf8,0x8d,0x07,0xa0,0x85,0x1d,0x2c,0x15,0x94,0xa6,0xdc,0x80,0x40,0x4a,0x95,0xfd,0x24,0x02,0x6b,0xf1,0xfc,0x55,0x51,0x45,0x5e,0x45,0x53,0x9c,0x45,0x84,0x7c,0x90,0xeb,0x84,0xf8,0x04
.byte 0x07,0x86,0x75,0x74,0x88,0xd8,0x2a,0x43,0xd2,0x55,0xda,0xfe,0x78,0xb0,0xc5,0xd1,0x18,0x71,0x20,0x6a,0xc2,0x74,0xc5,0x17,0x1d,0x03,0xa4,0x2f,0x2c,0xba,0xbd,0xdf,0xd0,0x24,0x83,0xbb,0x75,0xa9,0xd4,0xb3,0xc7,0x1e,0xb2,0x20,0x6b,0xe7,0x66,0x41,0x1c,0x1f,0xc5,0xa5,0x00,0x97,0x49,0x55,0xe2,0xde,0x6b,0x90,0x9d,0x1e,0xb6,0x7d
.byte 0x42,0x9e,0x2d,0x76,0xa3,0x78,0x3a,0x46,0x96,0x99,0x25,0xb9,0x30,0xdb,0xe9,0x17,0xce,0x26,0x0e,0x90,0x5c,0x25,0x74,0xeb,0x0e,0xf4,0x7d,0x22,0x66,0xcd,0x48,0xe6,0x2e,0xa6,0xbd,0xff,0x46,0x19,0xb4,0x6d,0x6f,0xe1,0xc5,0x8b,0x18,0x13,0xde,0x22,0x9b,0xe2,0x98,0x97,0x4c,0xde,0x93,0xf4,0x3d,0xe8,0x8d,0xe5,0x0f,0x0d,0x8b,0xe9
.byte 0x1a,0x5a,0xf4,0x32,0x5e,0xad,0x54,0xd2,0x4a,0xd5,0x15,0xb0,0xdc,0xdf,0xb1,0x5f,0xde,0x76,0x3b,0x10,0x2f,0x47,0xc4,0xd4,0x7c,0x8b,0x57,0xf9,0xf2,0x15,0x97,0x25,0x8b,0x59,0x92,0x78,0xb0,0x55,0x2a,0x98,0xfc,0x31,0x73,0x71,0xd4,0xe4,0x5b,0x05,0xf7,0xd1,0xc0,0x4c,0xb4,0x3c,0x4c,0xe2,0x1d,0xd0,0xa4,0x46,0x62,0x1e,0x8a,0x06
.byte 0xba,0xe4,0x89,0x40,0x1c,0x91,0x4a,0x30,0xdb,0x2b,0x51,0x2b,0x28,0x4d,0x06,0xa6,0xd7,0x0c,0xb9,0xc7,0xdc,0x8d,0xea,0x4e,0x89,0xae,0x3d,0x98,0xb6,0x39,0x9a,0x46,0x74,0xac,0xd1,0x88,0xe5,0x86,0xa7,0x6e,0x7d,0x5c,0x0a,0xfc,0x77,0x3f,0xba,0xd4,0xef,0x51,0x93,0x4b,0x24,0xe5,0x57,0xd2,0xdd,0xdc,0x04,0x4e,0x4a,0xa0,0xe8,0x8d
.byte 0x40,0x11,0xcc,0x8b,0xaa,0x6d,0x26,0x68,0xb2,0x60,0x0c,0x7e,0x2d,0xd8,0x5a,0x56,0xaa,0x81,0xbe,0x7d,0x1e,0xb7,0x9b,0xe0,0x1f,0x8a,0xd7,0xd3,0xe8,0x5a,0xa9,0x21,0x5c,0x75,0xa0,0x6a,0x12,0x35,0xa3,0x60,0xb0,0x5a,0x04,0xe5,0xb3,0x11,0xf3,0xb8,0x52,0x8b,0xab,0xff,0x1b,0xf8,0x51,0xd9,0x81,0xef,0xb8,0x66,0x16,0xed,0xd5,0x72
.byte 0x6d,0xf6,0x9b,0x03,0x3d,0x7c,0xc2,0xdf,0x00,0x13,0x24,0xb9,0x05,0xad,0x31,0x3c,0x0e,0x53,0x25,0xdb,0x86,0xbd,0xd9,0x0a,0xdd,0x0f,0x33,0x96,0x6a,0x72,0xd0,0x47,0xb2,0xee,0x1d,0xa4,0x92,0x3d,0xd8,0x33,0xed,0x2f,0xca,0xa1,0x9b,0x51,0xdd,0xbf,0x3f,0xfc,0x4b,0x6b,0xfe,0xd9,0xde,0x3a,0xa7,0x9b,0x3b,0xfb,0x94,0xc9,0xea,0x25
.byte 0xc6,0x24,0xd1,0xe3,0x47,0x89,0xc7,0x12,0xd1,0x7c,0xc6,0x10,0x3a,0xaf,0xb6,0x68,0x11,0xef,0x1a,0x16,0xd8,0xd9,0x9f,0x48,0xbb,0xba,0x44,0x97,0x69,0x34,0xf1,0xf0,0x7c,0xe0,0x27,0x59,0x2b,0x8a,0x2d,0x69,0xca,0xdb,0xae,0x07,0x21,0xbe,0xb6,0xa7,0xc1,0xbb,0xe6,0x07,0xdc,0x46,0x46,0x77,0xe2,0x98,0x1c,0xf8,0x73,0xdf,0xd9,0x93
.byte 0x52,0x70,0x09,0xf8,0xcc,0x2e,0x5e,0xff,0x87,0x0c,0xc6,0x9e,0x90,0x4b,0xfa,0x2b,0x49,0xb6,0xe6,0xb8,0xcb,0xfd,0xec,0x21,0xd6,0x04,0x9f,0xe4,0x90,0x11,0xa4,0x9c,0xd3,0x29,0xf6,0x9b,0x01,0xd3,0x7c,0xbc,0x00,0xb0,0x38,0x08,0x70,0x7c,0x6a,0x13,0xa7,0x2b,0x5f,0xd2,0x1f,0xf0,0x7b,0x9f,0xd6,0x48,0x43,0x66,0x6a,0x7e,0x9f,0x44
.byte 0x1c,0x63,0xdd,0xeb,0xd5,0x4e,0xdd,0x7d,0x47,0x36,0x93,0xe2,0xdb,0x93,0x26,0x35,0x47,0x4a,0x25,0x51,0x19,0xce,0xcb,0xbb,0x31,0x90,0xbf,0xe5,0x94,0xb5,0x06,0x95,0xe5,0x88,0xbd,0x0a,0x65,0x8f,0x5c,0x1a,0x78,0x9c,0xd4,0xfd,0xd3,0xc4,0xb2,0xde,0x90,0x06,0xb1,0x34,0x81,0x65,0xb3,0xfc,0xeb,0x2b,0x76,0x1e,0xac,0x88,0xec,0x42
.byte 0xf7,0xf4,0xbb,0x1a,0x21,0xee,0x68,0xd8,0x4e,0x02,0x54,0xae,0x49,0x66,0x83,0x2a,0xb3,0x8d,0x5f,0xfb,0xca,0x13,0x3b,0xaa,0xd8,0x3b,0x16,0x44,0xe8,0xb8,0xc0,0xdc,0x58,0xbf,0xe3,0x01,0xe2,0xae,0x45,0x9d,0xbf,0xfe,0x2e,0x7d,0xaa,0xee,0xbc,0xd8,0x9b,0x73,0xf9,0x01,0x0f,0x32,0x45,0x51,0x4b,0x60,0xfa,0xd4,0xdb,0x75,0x2d,0xbc
.byte 0x95,0x1c,0x74,0xd5,0x24,0x56,0x38,0x7e,0x4e,0xab,0x05,0xe8,0x98,0xfb,0xe2,0x1e,0x53,0xef,0xbb,0x8f,0xef,0x07,0xcf,0xcc,0xf5,0xb9,0x0c,0xca,0xaf,0xe1,0x89,0xfe,0x72,0xf2,0xe9,0x11,0x7a,0x8a,0x9f,0x2c,0x60,0x55,0x25,0xe7,0x82,0x64,0xe6,0x75,0xa4,0xdd,0x49,0x05,0xd2,0x04,0xd4,0x4b,0xdc,0xb2,0xa8,0x62,0x7b,0x51,0xf1,0xdf
.byte 0xd4,0xa6,0x3d,0xb4,0x19,0xf5,0x2a,0x19,0x77,0x0c,0x11,0x46,0x82,0x9d,0x19,0xa6,0xfc,0x17,0xff,0x77,0x3f,0x61,0xe5,0x91,0x51,0x2d,0x57,0x70,0x51,0xc0,0x09,0xfd,0x31,0x43,0x76,0x22,0x89,0xc4,0x77,0x8f,0x63,0x5d,0x9e,0xe8,0xe9,0x17,0x52,0x05,0x5c,0x16,0x2b,0x24,0x83,0xe1,0xb1,0x2f,0x78,0x45,0x16,0x80,0x92,0x62,0x0e,0x1a
.byte 0x6f,0x78,0xb4,0xb7,0x1b,0x0a,0x2c,0xf4,0x9d,0xb0,0xda,0x32,0x88,0xc4,0x0c,0x2e,0xdc,0xfa,0x3d,0x54,0x2c,0x74,0x4e,0x14,0xa6,0x3d,0x39,0x2c,0x6d,0x44,0x71,0x51,0xb0,0xc0,0x7a,0xff,0x26,0x07,0x09,0xad,0x2c,0x1e,0x0a,0xb9,0xe3,0xdd,0x1d,0x76,0x66,0x57,0x38,0xa1,0xcc,0xe7,0x2d,0xe8,0xf5,0x8c,0x1e,0xa3,0xc6,0x4b,0x07,0x8b
.byte 0xda,0x95,0x50,0x5d,0xac,0xac,0xb2,0xf7,0xd2,0x42,0xe2,0x4d,0xbb,0x72,0x55,0x94,0xf9,0xff,0x3d,0xfd,0x9a,0x52,0xc3,0x32,0x76,0xdc,0x63,0xb1,0x19,0xdc,0xd8,0x32,0xc4,0x85,0xb5,0x29,0x5d,0x27,0x8d,0x93,0xa3,0x29,0xcb,0x3d,0x93,0x39,0x3d,0x81,0x98,0xde,0x47,0x97,0x0c,0xe6,0xd8,0x1c,0xa0,0x87,0xe0,0x4e,0x03,0x21,0x6a,0x1b
.byte 0x64,0x22,0xa3,0x25,0x4c,0xe0,0xd9,0xd0,0x37,0x94,0x3b,0x2b,0xd2,0x07,0x6c,0xaa,0x32,0x3b,0x09,0xde,0x38,0xbf,0xc8,0x63,0x0c,0x5d,0xf2,0x31,0x3a,0x40,0xcb,0xca,0xc2,0xe1,0x11,0x01,0x75,0x85,0x9d,0x0e,0x72,0xcc,0x3b,0x70,0xa5,0xd7,0xdd,0xa1,0xb9,0xf3,0x8d,0xca,0xba,0xc7,0x9f,0xe8,0xe7,0x34,0x72,0x27,0x0f,0xb6,0x87,0x3a
.byte 0x52,0x50,0xdb,0x0a,0xc8,0x1d,0x39,0x0d,0x86,0xb6,0x1a,0xce,0x19,0xf7,0x20,0x5e,0xb6,0xe4,0xcc,0x06,0xaf,0x66,0xf3,0x19,0x23,0x5d,0xec,0x11,0x80,0x67,0x40,0x9f,0xcc,0xa5,0x89,0xe3,0xd6,0x06,0xd1,0x40,0xc9,0xf5,0x9d,0xa7,0xa2,0x3e,0x08,0x7a,0xef,0x8b,0xff,0x09,0x6f,0xd0,0x23,0x73,0x2c,0x46,0xd4,0x73,0x9e,0x69,0xcc,0x05
.byte 0x27,0x3d,0x8a,0x22,0x9d,0x92,0x84,0x40,0x07,0x81,0x65,0x03,0x6a,0x59,0xe9,0x57,0x4c,0x93,0x1a,0xaf,0xc2,0x12,0x7d,0x23,0x1a,0xd8,0xad,0xcb,0x51,0x8b,0xce,0x28,0xc5,0x8e,0xb8,0xab,0xa4,0x50,0xc3,0xe7,0xb9,0x8f,0xc3,0x99,0xc2,0x7b,0x86,0x9f,0xb3,0x4e,0x4d,0x14,0x66,0xe4,0xdf,0x40,0xdf,0xd8,0xdd,0x05,0x9f,0x96,0x3b,0x7e
.byte 0x9f,0x72,0xc9,0x11,0x98,0x73,0x40,0x72,0x2e,0xbc,0x2c,0xc7,0x0c,0x70,0xcf,0xbc,0x3c,0x25,0x43,0xec,0x36,0x5f,0xb9,0x80,0x19,0x79,0xd3,0x29,0x6e,0xe8,0x35,0x0b,0x1a,0x75,0xfa,0x4a,0x08,0xda,0xaf,0x1d,0xb5,0x06,0x6b,0x44,0xe4,0xde,0xe7,0x16,0x59,0xe5,0xad,0x23,0xc1,0x8e,0x87,0x27,0x03,0xc2,0xad,0x20,0xf7,0xdd,0x05,0x39
.byte 0x16,0xc8,0x6b,0x32,0x99,0x8b,0x39,0xb4,0x6e,0x16,0xa5,0x4e,0x5d,0xe1,0xf0,0x91,0xf2,0xfd,0x5e,0xbf,0x0a,0xf7,0x33,0x82,0xaf,0x8a,0xaa,0x99,0xac,0x24,0xdf,0x43,0x84,0x8f,0x82,0x56,0x8a,0xae,0xbd,0x2e,0x5b,0x1b,0x95,0x0f,0xc1,0x7c,0xa1,0x4e,0xda,0x11,0x21,0x0c,0x7e,0xa2,0x5b,0x30,0x89,0xbb,0x52,0x4a,0x8d,0x9f,0x95,0xd9
.byte 0x0e,0x6b,0x74,0xb4,0x0b,0x2a,0x37,0x21,0x9e,0xb6,0x00,0x9f,0x09,0x71,0xf8,0xd2,0x98,0x47,0x65,0x33,0x88,0x16,0x6b,0x5a,0x61,0x8c,0xdf,0x4d,0xbe,0xb0,0xde,0xc9,0x35,0xa3,0xa8,0x9f,0xf6,0xe7,0x93,0x29,0x29,0x66,0x43,0x5e,0xcc,0x1e,0x8b,0xf7,0x8d,0x3c,0xc2,0xfa,0x52,0xfc,0x44,0x71,0x02,0xfc,0x54,0x74,0xc2,0x10,0x84,0xc1
.byte 0xfb,0xd0,0x65,0x05,0x5c,0x16,0xd3,0x65,0x1a,0x8c,0xae,0x45,0xb8,0x70,0x8a,0x27,0x66,0xaf,0x7f,0x6b,0xcf,0x71,0x33,0x14,0xdd,0xe4,0xd7,0xdf,0x81,0xcb,0xd5,0x6b,0x67,0x82,0x52,0x6c,0xbc,0xb7,0xd8,0x19,0x24,0x74,0xdd,0x7f,0x06,0x04,0x76,0x36,0x5a,0x63,0x9e,0x6e,0x36,0xc3,0xc6,0xa7,0x4c,0xa8,0x1b,0x6c,0x45,0x14,0x4d,0x6e
.byte 0x62,0x88,0x27,0x6e,0xb8,0x00,0x11,0x93,0x6a,0xee,0xa6,0xcf,0xcb,0x6b,0x6a,0x2d,0x67,0x32,0x61,0x0b,0xea,0xb6,0xfd,0x9a,0x4a,0x34,0x02,0x79,0x80,0x0c,0x3d,0x3f,0x69,0x9f,0xb5,0xcf,0xda,0x6a,0xdf,0x4d,0xba,0xf4,0x63,0xf3,0x4f,0xc0,0x86,0x1c,0x41,0x3b,0xd6,0x43,0x35,0x1b,0xee,0xfc,0xac,0x6c,0x27,0x94,0xa9,0x98,0xe3,0x07
.byte 0x83,0xb2,0x19,0x9e,0x75,0x84,0x1f,0x70,0xe0,0x3c,0x49,0x77,0x82,0xb5,0xc0,0x52,0x80,0x06,0xce,0xb7,0x1c,0x9b,0x08,0x47,0x5e,0x7f,0xe1,0x8e,0x90,0x4f,0x29,0xdc,0x50,0xbd,0x0e,0x64,0xfb,0x93,0xa6,0x5e,0x6d,0xa4,0x2d,0x36,0xf2,0xe1,0x65,0xed,0x13,0xbe,0xf4,0x8c,0x46,0x3b,0x24,0x96,0xaf,0x47,0xe1,0x13,0xe1,0x7b,0x4c,0xf7
.byte 0x7d,0x8c,0x1c,0x41,0x6e,0xa7,0xcd,0x1e,0x0a,0x5c,0x44,0xc0,0xf7,0x1d,0x53,0xff,0x1f,0xe4,0x64,0x92,0xa7,0xe4,0x68,0x7b,0xaa,0xb0,0x76,0x88,0x21,0x1d,0x43,0x9b,0x9d,0x7c,0xdb,0x6e,0x91,0x90,0xd6,0xbe,0x9a,0xb8,0x2b,0x8e,0x73,0xe9,0x07,0x09,0x2f,0x85,0x7d,0x63,0x75,0x25,0x1d,0xb5,0x39,0xbc,0x1e,0x27,0xd7,0xf8,0x40,0xda
.byte 0xe5,0x45,0xb5,0x02,0x9c,0x7e,0x0a,0x4b,0x5e,0xb5,0x88,0xbb,0x86,0x3a,0x35,0xb8,0xb9,0x0b,0x39,0x85,0xbd,0x18,0xb7,0x58,0xcd,0x6b,0xdc,0x25,0x86,0xee,0x17,0x9d,0x3d,0xd8,0xb4,0x33,0x09,0x1c,0x57,0x52,0x7c,0x0e,0xb3,0x61,0x07,0x5c,0xea,0xf5,0x05,0x1b,0x43,0x20,0x14,0x87,0x15,0xfb,0x9c,0x3f,0x0d,0xa9,0xfc,0xf6,0xa7,0x66
.byte 0x46,0x54,0x8c,0x2c,0x2d,0x22,0x72,0x8f,0x2d,0x00,0x1d,0x1b,0x0c,0x84,0xb4,0x21,0xd6,0x3f,0x3d,0x5f,0xfd,0x22,0xe3,0xd7,0x72,0xa7,0xd1,0x98,0x7f,0x53,0xf0,0xcf,0x6b,0xb9,0xe4,0x40,0x1c,0x23,0x94,0xa9,0x8e,0x9f,0x00,0x0e,0x65,0x59,0x2a,0xcf,0x2d,0xb6,0x15,0xa8,0x97,0x9a,0x75,0xac,0x88,0xf7,0xe7,0xe4,0x1e,0x56,0x38,0xc7
.byte 0xb7,0x68,0xaf,0x15,0x48,0x9c,0xa6,0xca,0x3e,0x67,0x11,0xca,0x7f,0x3a,0x9c,0xc7,0x1a,0xff,0xcc,0x10,0x10,0x67,0x5f,0x62,0x72,0xca,0xd8,0xf2,0x4b,0x7a,0xc5,0xf0,0xc9,0x40,0x45,0xc9,0xe4,0xef,0x50,0x18,0xf8,0x38,0xca,0x93,0x68,0x74,0xdb,0x3e,0x92,0x77,0xf6,0xc1,0x81,0x33,0xaf,0x6f,0x62,0xb3,0x5e,0x67,0x66,0xca,0x53,0xe5
.byte 0xc2,0x37,0x4e,0x97,0xa8,0xac,0x5e,0xf5,0x36,0x48,0xa5,0xb4,0x9e,0x07,0x38,0x7b,0x2a,0xb5,0xb6,0x3c,0xc6,0x04,0x90,0x38,0x52,0x07,0xc3,0x26,0xd2,0x08,0x55,0x6f,0x7d,0xda,0x53,0xf2,0x3e,0x09,0xa7,0x3e,0xe6,0x6b,0x31,0x72,0xc3,0xcb,0x30,0x3a,0x5b,0x0e,0xca,0x4c,0x94,0x7e,0x18,0x27,0xe3,0xb2,0x40,0x7b,0x68,0xa2,0xa7,0x2b
.byte 0x80,0xf1,0x36,0xc9,0xb0,0x52,0x71,0x59,0x1c,0x41,0xcd,0xe9,0x4b,0x3a,0x89,0x9e,0xc4,0x5c,0x0c,0xfe,0x96,0x02,0xbd,0x3c,0xbd,0xe9,0xf1,0x78,0xe3,0x89,0xab,0xe3,0x7d,0x8b,0xc8,0xc6,0x40,0x2c,0xd5,0xfe,0xc9,0x02,0x1a,0x69,0x72,0x50,0x49,0x16,0x8a,0x9a,0x79,0x25,0x69,0x84,0xc7,0xc0,0xae,0xd1,0x7d,0xd0,0x28,0x88,0x12,0xee
.byte 0x22,0x86,0xec,0xea,0xe2,0x74,0x19,0xae,0x54,0x78,0xd1,0xc1,0x64,0x90,0x04,0x6f,0x0a,0xa3,0x60,0x14,0x63,0xe3,0x6a,0xed,0x7e,0xd5,0x36,0x0a,0x3c,0x72,0x2c,0xde,0xbd,0x01,0xff,0x22,0xe8,0x4c,0x55,0xbf,0xa6,0x24,0x18,0xbe,0x23,0x12,0xfa,0x91,0x30,0xa6,0x09,0xcd,0xc2,0x43,0x59,0x0c,0xab,0xc0,0x99,0x20,0xf1,0xbc,0x5e,0xab
.byte 0x72,0x85,0x72,0x2f,0x1c,0x21,0xcc,0x38,0xa3,0xa2,0xbe,0x40,0x70,0xf1,0x80,0x4d,0x18,0x1d,0xb4,0x61,0x84,0x19,0xc1,0xd0,0xcd,0xae,0xa8,0x74,0x46,0xe3,0x4e,0x0e,0x54,0xc6,0xc3,0x80,0x17,0x32,0x62,0x80,0x9a,0x8c,0x7a,0x7b,0x94,0xb2,0x1a,0xa4,0xa5,0xcc,0x65,0x46,0xa9,0xe6,0x62,0xf7,0x04,0x43,0x75,0x0e,0x48,0xf6,0xdb,0xc7
.byte 0xad,0x2f,0xad,0x0c,0x19,0xce,0xe6,0x03,0xcf,0x9b,0x33,0x99,0x90,0x8a,0x5f,0xf0,0x84,0xe6,0xe9,0xda,0xaa,0x6f,0x45,0xdc,0xab,0x9e,0xc6,0xd8,0x6f,0xc4,0xa2,0xea,0x17,0x8f,0xa7,0x0c,0xbf,0x79,0x2e,0x06,0xa7,0x84,0x41,0x80,0x85,0x25,0xdc,0x40,0xf9,0x11,0x45,0xfb,0x6d,0x43,0x3c,0x84,0x64,0xf4,0xa2,0xdc,0xa3,0x0d,0xa1,0x0a
.byte 0x49,0x34,0x10,0x63,0x3a,0xef,0xe7,0x08,0xe9,0xf4,0xff,0x0e,0x2d,0x3b,0xf6,0xa7,0x62,0x8e,0xe5,0x61,0x32,0x3d,0xaa,0x01,0xd0,0xa3,0x54,0xf1,0xdf,0x1f,0x8a,0x58,0xfd,0x2d,0x81,0x8b,0x3b,0xe8,0x95,0x2e,0x92,0x58,0x5c,0x23,0x95,0x29,0xe7,0x3c,0x3c,0x09,0xbb,0xdc,0x55,0x37,0xf4,0xa6,0x14,0xc8,0xff,0x6b,0xff,0x17,0xb8,0x81
.byte 0xf7,0xa1,0x96,0xb6,0xd0,0xea,0x35,0x1b,0x3e,0x81,0xf4,0xf2,0x88,0x03,0x97,0xbf,0x1d,0x06,0xa1,0xa4,0xa9,0x9f,0x81,0xa3,0x36,0x3a,0x58,0x2c,0x9d,0x5c,0x44,0xcb,0x10,0x5e,0xa6,0x62,0x3e,0xb6,0xf9,0x1d,0x24,0xa4,0xb8,0xb8,0xa7,0x13,0x14,0x1f,0xab,0x29,0x64,0xaf,0xa8,0x48,0xa4,0xc9,0x31,0xb7,0x1d,0xb2,0xd0,0x88,0xe1,0x14
.byte 0x87,0x26,0x65,0x47,0x61,0x4e,0xd2,0xf1,0x48,0x32,0x06,0xb4,0x39,0x49,0xed,0x68,0xa8,0x71,0x83,0xfd,0x77,0xdf,0x69,0x88,0x36,0x34,0x4a,0x11,0xfd,0xa0,0x11,0x87,0xe4,0xe7,0x02,0x52,0x34,0xfe,0xfe,0x77,0xbf,0x21,0x33,0x77,0x4d,0x85,0x57,0xd6,0xbb,0x07,0xdc,0x63,0xb1,0x53,0xc4,0x9f,0x7c,0x05,0x6f,0x23,0xe8,0xb7,0x49,0x1e
.byte 0xd9,0xdb,0xc7,0xff,0x99,0x2a,0xc1,0xef,0x93,0x09,0x3c,0x13,0xf7,0x49,0xdb,0x72,0x16,0x68,0xb2,0x37,0x39,0x43,0x43,0x4a,0x75,0xdb,0x77,0x3a,0x7c,0x8f,0x6f,0xe1,0x47,0x65,0xbe,0xe7,0x3e,0xec,0xf8,0xe9,0xff,0x6b,0x71,0x7c,0x3b,0x56,0x57,0xea,0x9e,0x51,0x13,0xe3,0xdc,0x59,0xa1,0x81,0x84,0xd0,0xfc,0x12,0xf4,0x2e,0x2b,0xba
.byte 0xed,0xb9,0x13,0x76,0x63,0xee,0x42,0x6f,0x74,0x71,0x06,0x26,0x7a,0x03,0x39,0x5f,0xb1,0x54,0x6a,0xf9,0xf0,0xdf,0x8f,0x9f,0xca,0x58,0x5e,0x4d,0x72,0xa8,0x76,0x2f,0xa1,0x9e,0xa3,0x0f,0x73,0x31,0x8c,0xe8,0x90,0x53,0xd6,0x2b,0xa1,0x35,0xd9,0x6a,0xae,0x56,0x5f,0xd4,0xfc,0x9b,0xae,0x1d,0xdc,0x21,0x50,0x39,0x7c,0xfe,0xd2,0x80
.byte 0x7b,0x9e,0x20,0xde,0x30,0x79,0x5c,0xc6,0x8d,0x10,0xb4,0xb1,0x3c,0xf0,0x1d,0x48,0x6f,0x0f,0x2d,0xd7,0x0a,0x2f,0x62,0x1f,0xdc,0x24,0x7b,0x8b,0xe8,0xf2,0xb4,0x3f,0xd5,0xb3,0x69,0x87,0x65,0x38,0xff,0x63,0xc2,0xb0,0xc8,0x50,0x8f,0x1c,0x17,0xaa,0xd7,0x0f,0x14,0x27,0xb2,0xc5,0xf7,0xe0,0x18,0x9c,0x35,0xa7,0xe0,0xf9,0xad,0x74
.byte 0xec,0xe0,0x0c,0xda,0x79,0x7f,0x58,0xa3,0xb9,0x07,0x76,0x1e,0x64,0x20,0x99,0x17,0x32,0xfd,0xe7,0x6a,0xd9,0xcb,0x7b,0x2f,0xd8,0x57,0xd4,0xfa,0x4e,0x3a,0xbc,0x0b,0xdd,0x90,0x04,0xdb,0x3d,0xc9,0x8a,0xb0,0x6a,0x72,0x42,0xff,0x0c,0x08,0x88,0xfc,0xa4,0x59,0x07,0x2a,0x32,0x2f,0x02,0xb1,0x78,0x13,0x1b,0x05,0x38,0x73,0xa5,0xf1
.byte 0x98,0xee,0xd4,0x1f,0x83,0x63,0x90,0x9c,0x74,0xa5,0x3d,0x7d,0x32,0x29,0x08,0xa4,0x01,0x8a,0xc7,0x26,0x86,0x85,0xd2,0xa1,0x0b,0xaf,0x92,0x0a,0x28,0x8b,0x5f,0x90,0x99,0x56,0xec,0xe8,0x9b,0x0e,0x9a,0x4d,0xc2,0xdc,0xf4,0x27,0x04,0x1b,0xc5,0xe8,0x6d,0xa6,0x1f,0x94,0xa7,0xd1,0xbe,0xf7,0xe9,0xc0,0x39,0x0a,0x85,0xa4,0xbf,0x30
.byte 0x43,0x4b,0xf8,0x28,0x6d,0x6d,0xb9,0xa2,0x7f,0x64,0x0d,0x04,0x8b,0xd3,0xc5,0xab,0xe9,0xb0,0xa1,0x4c,0x85,0xe6,0x3d,0x3e,0x37,0xad,0x3e,0x27,0x72,0xaf,0x60,0x5a,0xd3,0xa3,0xf0,0x6a,0x67,0xfb,0xda,0xc5,0x41,0x81,0x2e,0xcb,0x75,0x00,0xf7,0xdf,0xf5,0xef,0x19,0x03,0x81,0x4f,0x70,0xc9,0xa4,0x40,0xbf,0xeb,0x39,0xff,0x14,0xf5
.byte 0xaf,0xcf,0x21,0x77,0x65,0x4e,0x96,0xf6,0xb3,0x9c,0x9a,0xb9,0xfe,0xe3,0x37,0x3f,0xf8,0x6e,0xc5,0x51,0x3f,0xd0,0xfa,0xef,0x7c,0x07,0x72,0xb6,0xca,0xcb,0xf8,0x20,0x94,0x74,0x8c,0xe9,0x0d,0x6b,0xfb,0x98,0x0a,0xec,0x90,0x05,0x33,0xc4,0x7d,0xfc,0x7b,0x95,0xd9,0xc3,0x67,0x0b,0xd7,0xdd,0xd8,0x67,0x3c,0xf1,0x84,0xf4,0x51,0x78
.byte 0x29,0xff,0x51,0x86,0xc8,0x84,0x6e,0x31,0x3c,0x6d,0xaf,0x8b,0xe0,0x2d,0xb0,0xc7,0xf5,0x19,0x87,0xe6,0x76,0xc7,0x5b,0xb7,0xd3,0xe0,0xb6,0x4c,0x65,0x95,0x74,0xaf,0x6e,0x5f,0x9c,0x67,0x98,0x1f,0x7c,0xec,0xd5,0xf8,0x47,0x24,0x1d,0x95,0xbf,0x95,0x6e,0x64,0x89,0xad,0x42,0x0a,0xe5,0x7f,0xc0,0x2e,0xc5,0x93,0xc2,0x06,0x20,0xe7
.byte 0xc2,0x3e,0x04,0x51,0x3b,0x61,0xce,0xda,0x84,0x95,0xba,0x59,0x2b,0x88,0x21,0x68,0xed,0x64,0xd7,0x13,0xb7,0x1b,0x5c,0xa2,0xbd,0xa6,0xd4,0x38,0x68,0xf3,0xd8,0x66,0x29,0x51,0x88,0x02,0xc7,0x87,0xa6,0x5b,0x29,0x5b,0x8e,0xb8,0xbf,0xff,0xc7,0x8c,0x98,0xe7,0xc5,0xc2,0x93,0x6a,0xc0,0xb4,0x04,0x8f,0x1a,0x2d,0xd4,0xea,0x1f,0x2a
.byte 0xfd,0xf3,0x30,0x50,0xda,0xbe,0x81,0x0a,0x76,0xad,0x73,0xfc,0xd1,0x7d,0x06,0x58,0xeb,0x77,0x55,0x3c,0x8e,0xef,0x25,0x4d,0x78,0x0e,0xda,0x00,0x8c,0x8b,0x94,0xed,0x65,0x3d,0x51,0xbe,0xd2,0xa0,0x3d,0x8c,0xde,0x2e,0xd0,0xe5,0x8b,0x7c,0x1f,0x15,0x35,0x27,0xe4,0x62,0xa5,0xcb,0x40,0x29,0x63,0x51,0x35,0xbe,0x6b,0x0c,0xec,0xdd
.byte 0xb8,0x35,0x89,0x03,0xdf,0x50,0x85,0xbc,0x93,0x34,0x83,0x65,0x7b,0xfc,0x34,0x7a,0x72,0x90,0x44,0xec,0x3e,0x6b,0xda,0x65,0x6a,0xaf,0x90,0xe3,0xcc,0x86,0xb4,0x1e,0x26,0x68,0x34,0x91,0xfd,0xcb,0x5d,0xac,0x04,0xff,0xdd,0x7a,0xe4,0x5c,0xd7,0x05,0x7b,0x4c,0xbc,0x26,0x31,0xb9,0xbc,0x9b,0xd0,0x0b,0x1e,0x1b,0x4b,0x0a,0x25,0x58
.byte 0x9b,0x11,0x66,0x16,0x07,0x15,0xd1,0x3a,0x68,0xfc,0xdb,0x88,0xcc,0x91,0x4b,0x2e,0xd7,0xe6,0x9d,0x13,0x3c,0x8c,0x0c,0x35,0x4d,0xc9,0xfc,0xc7,0xb6,0x7e,0xaf,0x02,0x7c,0xd4,0x8c,0xf9,0xf4,0x63,0x87,0x2f,0x0a,0xd1,0xf7,0x1f,0xd9,0xa8,0xd6,0x5c,0x1e,0xee,0xe7,0xb6,0x3b,0xa2,0x93,0x9e,0xa7,0x5b,0x66,0x38,0xb6,0xd3,0x39,0x6a
.byte 0xb7,0xc4,0x34,0xf1,0x5d,0x50,0x45,0x32,0x59,0x90,0x5b,0x05,0xd8,0xed,0x6d,0x01,0xdb,0x1f,0x37,0x59,0x1b,0x42,0xc2,0x4c,0xc4,0x32,0xa1,0xc4,0xdf,0xa0,0x45,0x64,0x33,0x26,0x9b,0x6a,0x91,0x5f,0x8f,0x9a,0x21,0x8b,0xdc,0xed,0x5c,0xbb,0xcc,0xdc,0x75,0x21,0x14,0xbc,0x49,0x1a,0x3a,0xc7,0x5f,0xba,0x11,0xae,0x37,0x3f,0x9f,0x66
.byte 0xd4,0xf9,0x25,0xb6,0x7b,0xa8,0x85,0x9b,0x27,0x6a,0x3b,0xcc,0x87,0x72,0xa1,0xf1,0x41,0x15,0x98,0x37,0xea,0x63,0xb9,0xd3,0x44,0x81,0x26,0xec,0x7a,0xaa,0x5b,0xe9,0xe1,0xe1,0xd3,0x6b,0x31,0x38,0x7f,0xc4,0xd3,0xb1,0xcf,0xc8,0x61,0x70,0x49,0xe1,0xac,0x08,0xd3,0x64,0x4a,0xbc,0x1a,0xe4,0x76,0xa5,0xf1,0x12,0x42,0xbb,0x97,0x52
.byte 0x7d,0xf0,0x42,0xbb,0xc0,0x1c,0xda,0x40,0x04,0x98,0xa9,0x3f,0x0e,0xf2,0x6d,0x82,0x8e,0x52,0x7c,0xc1,0x91,0x54,0xe8,0xc0,0x69,0x09,0x25,0xc1,0xe8,0xea,0x57,0x8c,0x76,0x55,0x03,0xfc,0x39,0x1f,0x90,0x6b,0xb9,0x98,0xc3,0xc1,0x73,0x4f,0x4e,0xbf,0xc5,0x64,0x95,0x1e,0xba,0x7e,0x73,0x51,0x22,0xee,0x24,0xce,0x12,0x66,0x3e,0x84
.byte 0x4a,0x27,0x2e,0x45,0xc6,0x3d,0x4a,0x3a,0xbe,0xf9,0xb6,0x14,0x0a,0xf0,0xa5,0x94,0x14,0x69,0x2d,0x25,0x7d,0x60,0x9b,0x77,0x79,0xc5,0xd2,0xfd,0x1f,0x66,0xc5,0xad,0x99,0x7f,0x42,0x08,0xe2,0xc6,0x40,0xa8,0x8c,0x07,0xd2,0xa9,0x10,0x30,0x8d,0x80,0x4c,0x41,0xc5,0x42,0x67,0x09,0xbe,0x60,0xbf,0x0d,0xba,0x94,0x4f,0xb0,0x78,0xed
.byte 0x60,0x91,0x26,0x99,0x9a,0x50,0x30,0x65,0xe3,0xa4,0x7b,0x76,0x32,0x85,0x29,0xeb,0x47,0x17,0x88,0xd4,0x05,0xf5,0xd9,0x6a,0xec,0x90,0x44,0x40,0x06,0xc7,0x77,0x45,0x9c,0x17,0xf8,0x25,0xcd,0x0f,0xeb,0xb3,0xcc,0x78,0x09,0x98,0xc5,0x68,0xb4,0xd8,0x9d,0x35,0xa6,0x33,0xf3,0xdd,0xee,0x8a,0xb5,0x3c,0x93,0xee,0x08,0xcf,0x1d,0xd1
.byte 0xf1,0x96,0x81,0xc0,0x3a,0xa1,0x5a,0x2b,0x69,0x6d,0x6a,0x4d,0x8d,0x5a,0xed,0xb3,0xd1,0x7a,0x29,0x99,0xa2,0x65,0x05,0x33,0x95,0xd8,0x2e,0xd8,0x73,0x3b,0x4e,0xc2,0x94,0x80,0x77,0x34,0xcb,0x0b,0x92,0x01,0x1e,0xaa,0x2b,0x1d,0xe6,0x03,0xc0,0xb4,0xb7,0x1f,0xed,0xf1,0x4b,0xb2,0x82,0x65,0x13,0x9a,0x9e,0x35,0x8d,0xe5,0xb8,0xb0
.byte 0xc8,0x93,0x04,0x1e,0x83,0xbb,0xcb,0x91,0x2b,0x8d,0x18,0x22,0xd0,0x73,0x4f,0xae,0x54,0x5f,0x8a,0x20,0x4a,0xa5,0x98,0x9e,0x37,0x68,0x5d,0xcc,0x41,0x86,0x2d,0xb3,0xe5,0x09,0xdb,0xbd,0xa1,0x27,0xbf,0x7a,0x69,0x05,0xb4,0xf2,0x06,0x11,0x80,0x57,0xbd,0x92,0xed,0xb5,0x26,0x3a,0x1a,0xea,0x70,0x99,0x04,0x90,0x07,0x4e,0xa7,0xc2
.byte 0x78,0x49,0x70,0x80,0x97,0x10,0xb8,0xd7,0x45,0x8a,0x23,0x99,0x80,0xa3,0x1c,0x66,0x26,0xdb,0xdc,0x82,0x3a,0x09,0x0c,0x1e,0x61,0x78,0x70,0x68,0x81,0x85,0x91,0x82,0x68,0x8e,0xed,0xeb,0xad,0xd1,0x6b,0xe7,0x52,0x29,0xca,0x5f,0x3c,0xd3,0x55,0xeb,0x11,0x19,0x99,0xe0,0xf0,0x33,0xdc,0x9f,0x53,0x52,0xeb,0xda,0xfd,0x35,0x89,0xc3
.byte 0xc8,0xa6,0x7c,0xd2,0xf3,0xab,0x8b,0xe1,0xbf,0xca,0xa7,0x24,0xd2,0xd4,0xa2,0xa5,0x94,0x2a,0x9e,0x90,0x82,0xb4,0xcd,0x9f,0xe8,0x1e,0x70,0xdb,0x67,0x60,0xb8,0x2b,0x3d,0x74,0x25,0x5c,0xd6,0xbd,0xc2,0x92,0xfb,0xdd,0x3f,0x1d,0x24,0xa0,0xbd,0xbe,0x42,0xc6,0x78,0xde,0xf7,0xa0,0x1a,0x6a,0x6a,0xd0,0x05,0xcc,0xec,0xf0,0x4c,0xa9
.byte 0x52,0x68,0xb0,0x41,0x7e,0xd8,0x73,0xf0,0x45,0x65,0xa4,0x6e,0xf1,0x9c,0xdc,0xa8,0x22,0x7f,0x50,0x67,0xb8,0x90,0xd5,0x1b,0x57,0x36,0x4d,0x16,0x98,0xf3,0xef,0x03,0xd7,0x76,0x31,0x1b,0xd3,0x22,0x56,0x30,0xda,0xaf,0x72,0xa8,0xf1,0xa4,0x88,0xee,0xfd,0x0b,0x46,0x26,0x9b,0x37,0xa2,0xc6,0x1d,0x42,0xb1,0x86,0xe3,0xef,0xaf,0xe6
.byte 0xfb,0xc9,0x90,0xbe,0x58,0xe1,0xea,0xe1,0xa6,0xd3,0xc0,0xf2,0xf3,0x31,0x09,0xc0,0x73,0x04,0xfb,0x96,0x53,0xb2,0xd5,0xb2,0x4a,0xeb,0xd2,0x7d,0xd3,0xcb,0x49,0xba,0xbd,0x1f,0xe6,0x00,0x16,0x84,0x4e,0xc0,0x63,0x00,0xe3,0xb5,0x47,0xa1,0x2c,0xda,0x72,0xb4,0x4b,0xc8,0x52,0x93,0x65,0x73,0xf0,0xce,0x84,0x6c,0x99,0xda,0x0a,0x00
.byte 0x06,0x60,0xa2,0x9d,0x95,0xe0,0x44,0x05,0x02,0x57,0x65,0x5a,0xa7,0x4f,0x9d,0x3c,0x9f,0x58,0xbd,0x5e,0x70,0x05,0xaa,0x05,0x14,0xb0,0x10,0xe4,0x6f,0xfa,0xd6,0xff,0xde,0x5f,0x1b,0x71,0x3e,0x0c,0x75,0x20,0xd4,0xe3,0xfc,0x3b,0xc0,0x0d,0xb0,0xad,0x64,0xea,0x46,0x38,0x0a,0x93,0xf4,0xcb,0x5b,0x16,0xd4,0x17,0xbe,0x69,0x13,0x6e
.byte 0xe8,0x1d,0x6d,0xb0,0x2b,0x51,0xae,0x66,0xbb,0xf2,0xda,0x0a,0xea,0x21,0xba,0x01,0x41,0x51,0x00,0xe4,0x1a,0x72,0xf7,0x11,0xdf,0xc4,0x6d,0x9f,0x82,0xb6,0xde,0x3b,0xaa,0x32,0x8b,0x52,0x09,0x25,0x9d,0x84,0xc7,0xc2,0xa9,0xe4,0x8e,0x09,0x8f,0x38,0xf9,0x83,0xe7,0xa6,0xf2,0x88,0xbb,0x94,0x80,0xa1,0xce,0x7f,0x8e,0x91,0xfd,0xcb
.byte 0xae,0xf2,0x71,0x57,0xa9,0x22,0x82,0xe2,0xb6,0xc8,0x08,0x7b,0x9b,0x85,0x7f,0x51,0x2b,0x03,0xd0,0x94,0x2d,0x2f,0x89,0xef,0x91,0xaa,0x0d,0xde,0xcc,0x0d,0xe9,0xb8,0x6f,0xed,0xed,0x0d,0x43,0x41,0x9c,0x3b,0x6b,0x52,0x41,0x09,0x49,0xad,0xff,0xd7,0x93,0x15,0x2e,0xae,0x54,0x07,0x42,0x13,0x59,0xe6,0xed,0x3a,0x68,0x42,0x1e,0x4b
.byte 0xe8,0x5c,0xe3,0xa8,0x4f,0x1c,0x0e,0x7a,0xc8,0x62,0x5f,0x53,0x04,0x3c,0x86,0x3b,0xf7,0x8d,0x64,0xf6,0x1e,0x11,0x83,0x02,0x44,0xaa,0xf4,0xaa,0x5a,0xc8,0x57,0x98,0xd9,0xc2,0xc5,0xd7,0x06,0xc2,0xe7,0x56,0x9f,0xcd,0xa3,0x4a,0x8c,0xc1,0xb2,0xa3,0xc6,0x9f,0xd3,0x6c,0x4b,0x38,0xfd,0x23,0x98,0x42,0x78,0xca,0xd8,0x6c,0xfa,0x08
.byte 0xb8,0x87,0x0e,0x34,0x9b,0xc5,0xe1,0x15,0x98,0xf7,0x06,0xd3,0xc7,0x25,0xe4,0x0d,0x44,0x2a,0xe4,0xdb,0x45,0xae,0x41,0x80,0xac,0x15,0x45,0x16,0x51,0x59,0xe5,0x98,0x68,0xbd,0x9d,0x0d,0x96,0x42,0xbb,0xb5,0x48,0x67,0x7c,0x79,0x3d,0xee,0x73,0xe6,0x4f,0x87,0xd5,0x34,0x91,0xdb,0x0e,0x7b,0xdb,0x2d,0xb5,0xea,0x5d,0xe3,0xf7,0x64
.byte 0x47,0x41,0x95,0x75,0x3a,0x61,0x87,0x87,0xc6,0x51,0xeb,0x50,0xee,0x25,0x8d,0xc0,0xc5,0xb6,0x6f,0x67,0xca,0x45,0xb9,0xe0,0xad,0x2d,0x0c,0xe2,0x80,0xc2,0xf6,0xef,0xb7,0xa9,0xe3,0x44,0x76,0xe9,0x10,0x6f,0xc3,0x42,0xf5,0xa0,0x7b,0x15,0xd4,0x0f,0xde,0x72,0x1e,0x10,0x95,0xa0,0x03,0xbe,0x80,0xb0,0x24,0x06,0x84,0x24,0x1b,0x90
.byte 0x8d,0xe5,0xb7,0xa9,0xab,0x69,0xdf,0x4a,0xf4,0x69,0x63,0x6a,0x9b,0x19,0x6d,0x47,0xe9,0xd1,0xe6,0xcd,0x2c,0xff,0x5b,0xf9,0x73,0xe8,0xd7,0xa3,0x3c,0xbd,0x42,0x47,0xf1,0xcf,0xf6,0xdd,0x58,0x09,0x81,0x7d,0x67,0x43,0x07,0x0d,0xb1,0x24,0x07,0xdf,0xc8,0x1d,0x0a,0xb3,0x97,0x37,0xef,0xc6,0x42,0xe9,0xf4,0x46,0xf6,0x35,0xfd,0x26
.byte 0x11,0x0c,0xea,0x2f,0x34,0x96,0xe3,0x64,0x1a,0xca,0xaa,0x40,0x71,0xbe,0x00,0x43,0xd3,0x15,0x79,0x87,0x6a,0x78,0xfe,0x8b,0x20,0xd3,0x10,0xde,0xb1,0x49,0xf5,0xc6,0x14,0x4a,0x41,0xd0,0xf3,0xf1,0x61,0x00,0x0a,0xd6,0xf7,0x68,0x09,0x70,0xe9,0xd3,0xd2,0xf6,0x3c,0x0b,0x62,0x71,0xa4,0xd5,0x9d,0xfe,0xa1,0x7e,0x0c,0x52,0x44,0x1c
.byte 0x4f,0x5d,0x11,0x20,0xa1,0x9c,0x35,0x10,0xc1,0xab,0x22,0x94,0x95,0xe5,0xac,0x92,0x30,0x4b,0x59,0x30,0x33,0xbb,0x36,0xd0,0xd6,0xde,0x6b,0x89,0x58,0x25,0xbb,0x20,0x86,0x00,0x24,0x40,0x79,0x53,0xea,0x73,0xb1,0xa3,0x05,0x0f,0x88,0xe8,0x35,0x19,0xd3,0xca,0x42,0x68,0xe0,0x5e,0x6f,0x1e,0xe2,0x75,0x9b,0x65,0xa7,0xf8,0x21,0x41
.byte 0x14,0x6e,0xf9,0xa5,0x28,0x12,0x8a,0xd4,0x75,0xfe,0x8d,0xef,0x0b,0x1f,0xd7,0x5e,0x9f,0x79,0xf9,0x8f,0xbb,0x78,0xf9,0xe6,0x5f,0x94,0x4b,0x5f,0xe7,0xdd,0xc9,0xa2,0x15,0x16,0xbf,0x47,0x45,0xd1,0x8c,0x05,0x59,0x7e,0xd9,0xf0,0x5a,0x70,0x52,0x01,0x72,0x90,0xef,0xe7,0x96,0xf5,0x0b,0xf3,0xa5,0x97,0xdc,0x3a,0xb8,0x9c,0x5c,0x57
.byte 0x34,0x65,0x35,0xfb,0xe1,0xde,0x62,0x45,0x08,0xc2,0xc5,0x8a,0x7a,0x88,0x66,0xdd,0x66,0xee,0xc6,0xc0,0xab,0xf7,0x7e,0x63,0x91,0x51,0xd9,0xe9,0x00,0xba,0x7e,0xfa,0x9e,0x61,0x5b,0xb8,0x18,0x67,0x15,0x02,0x3e,0xf2,0x73,0xd5,0x3e,0x71,0xc7,0x6f,0x8c,0x74,0x1c,0xd6,0xb6,0x1c,0xc1,0x27,0x67,0xae,0x96,0xc6,0x57,0x80,0x52,0x3c
.byte 0x54,0x33,0xb5,0x14,0x05,0x68,0xe3,0x16,0x94,0xac,0x85,0x7a,0x57,0x76,0xe1,0xe5,0x49,0xe6,0xe0,0x56,0x5d,0xb2,0xf2,0x9e,0x01,0x7d,0x79,0xbe,0x83,0x9f,0x00,0x8a,0x69,0x68,0x8a,0xfd,0x5c,0x5d,0xea,0x87,0x1b,0x5f,0x55,0x36,0xf1,0x47,0xf3,0x5a,0x64,0xb2,0x13,0xd3,0xac,0x13,0xbb,0xfe,0xe3,0xb6,0x69,0xdf,0x25,0x1d,0x9e,0x00
.byte 0x90,0xc2,0x21,0x96,0x2f,0x0f,0x9f,0xe6,0x37,0x23,0xd6,0xe0,0x00,0xbc,0xa5,0xb0,0x01,0x54,0xbd,0x70,0xbb,0x53,0xd7,0x80,0x38,0x6b,0xc0,0xa8,0x50,0x64,0x1f,0x94,0xf0,0xb4,0x67,0x62,0x62,0xad,0x91,0x0a,0x1e,0x5b,0x15,0xa8,0x65,0xea,0x8a,0xaf,0xf0,0xe7,0x76,0xce,0x36,0x16,0x97,0xf8,0x1c,0x5c,0x90,0x04,0xa3,0xbe,0x5a,0x64
.byte 0x9f,0xd3,0x1d,0x7b,0x25,0x91,0x5b,0xbc,0xce,0xc3,0x15,0xf0,0x7f,0xe8,0xa2,0x6b,0x54,0xe4,0x61,0x88,0x18,0xee,0x5c,0x13,0xa8,0xae,0x16,0x94,0x48,0x1c,0x67,0x2c,0xc4,0x9f,0x5d,0x01,0x36,0x21,0x5f,0xf4,0x64,0x60,0x8e,0x1a,0xc5,0x61,0x18,0xea,0x44,0x6a,0xcc,0xd4,0xf2,0x2c,0xb0,0xa6,0x6b,0x54,0x3e,0xcd,0xa4,0x55,0x26,0x55
.byte 0x94,0xa1,0x26,0xc1,0xb1,0x81,0xa1,0xcb,0xbe,0x74,0x1b,0x64,0x5b,0x91,0x73,0x94,0xc8,0xaa,0xfa,0xc0,0x22,0xc5,0xb0,0xc6,0x59,0x23,0xb2,0x95,0x41,0x04,0x62,0x98,0x9c,0x3a,0x6a,0x78,0xd2,0xc0,0x74,0xbf,0x65,0x15,0xac,0x66,0x0c,0x84,0xa2,0x66,0xdf,0xf7,0x69,0xd5,0x8b,0x79,0x87,0x5a,0x77,0xa1,0xe8,0x43,0x5d,0x01,0x1b,0x13
.byte 0x2b,0x4e,0x69,0x5f,0x07,0xa4,0x3d,0xb7,0xc7,0xd0,0x6c,0xcc,0x2e,0xe0,0x87,0x9d,0x23,0xec,0x15,0xbe,0xe3,0xbe,0x53,0x21,0x2d,0x2e,0x22,0xa4,0x47,0x6e,0xff,0xc6,0x57,0xe6,0xe6,0x41,0xb3,0x08,0x02,0xa1,0x8c,0x6d,0xb1,0xd9,0x61,0xfe,0xc5,0x55,0xf5,0xf3,0xea,0x97,0x6d,0x7f,0xc7,0x36,0x6f,0x00,0xb7,0x80,0x9c,0xb3,0x04,0x55
.byte 0xf5,0xf8,0x29,0xae,0x88,0x46,0x4f,0x78,0xb5,0x81,0x59,0x4b,0x33,0x98,0x19,0x08,0xc2,0xce,0x61,0x0f,0x66,0x45,0x07,0x2f,0x73,0xbd,0x10,0xa6,0x32,0x3c,0xdf,0x3a,0xa5,0x07,0x6e,0xf8,0xa8,0x0d,0xb8,0xb2,0x78,0xd1,0x9f,0x50,0x9e,0x35,0x1a,0x6e,0xcb,0xd9,0x76,0x40,0xb9,0x48,0xa4,0x8f,0x91,0x52,0x66,0xa3,0xc5,0x4f,0x69,0x07
.byte 0xed,0xe0,0xd7,0xd8,0xc1,0x72,0x62,0x9a,0x52,0xbc,0x17,0x1e,0x26,0xdc,0x06,0xde,0xa2,0x04,0x4a,0x67,0x24,0x30,0xca,0xff,0x01,0x50,0x20,0xf1,0xfe,0xaf,0x70,0x8d,0xdf,0x86,0x0f,0x8e,0x94,0x92,0xa6,0x41,0x69,0x96,0x0f,0x20,0xd9,0xba,0xab,0x68,0x69,0x8a,0x7e,0x6f,0xda,0x48,0x7a,0xc8,0x53,0xb0,0x8f,0xe5,0x8f,0x6f,0x29,0xc2
.byte 0x72,0xf1,0x6f,0x7f,0x41,0x1f,0xd3,0x8f,0x66,0xe1,0x17,0xe1,0x91,0xd8,0x60,0x7f,0x52,0xf0,0x50,0xa5,0xcd,0xa1,0x92,0x9a,0x8f,0x45,0x0f,0x84,0x6a,0x95,0x25,0x7e,0x22,0x2d,0xb0,0x74,0x2c,0x60,0x62,0x69,0x17,0x8b,0x08,0x41,0x5c,0xbf,0x4f,0x5c,0x7b,0x99,0x21,0xe0,0xcd,0x26,0x24,0xf4,0x4f,0x72,0xbf,0x9a,0x80,0x13,0x4b,0xcf
.byte 0x5a,0x60,0xd3,0x35,0x1c,0xf2,0x54,0xdd,0x99,0x12,0x8b,0xfa,0x6d,0xa2,0xf0,0xb3,0x02,0xac,0x1a,0xfc,0x2d,0xfe,0x35,0x5d,0x33,0xd4,0x41,0x2b,0x75,0xfb,0xbd,0x4a,0xd6,0x60,0x99,0xfb,0x8e,0xa5,0x4b,0x2a,0x38,0x6b,0x31,0x40,0xfe,0x38,0xc0,0xec,0xe1,0xf7,0x17,0x0b,0x13,0x61,0xda,0x9e,0x26,0xea,0x16,0x46,0x62,0x12,0xb6,0xa3
.byte 0x01,0x2d,0x40,0x84,0x9b,0x91,0x42,0xed,0x04,0x2a,0xd8,0x90,0xbd,0xc3,0x8f,0xb4,0xfb,0x6f,0xa3,0xb8,0x76,0x77,0xe0,0xe7,0xa6,0x99,0xde,0x16,0x8a,0x0a,0x84,0x12,0xc6,0xd6,0xea,0xfa,0x7d,0x81,0x39,0xff,0xb8,0x70,0xa5,0x7e,0xda,0x19,0x6e,0xb7,0x94,0x57,0xa9,0xa3,0xea,0xf2,0x77,0x49,0xf6,0xb4,0x82,0x1b,0x58,0xa7,0x65,0xdb
.byte 0x27,0x00,0xb6,0x30,0xba,0x25,0xbe,0x07,0x5c,0x1a,0x66,0x4a,0xd3,0x5c,0xa2,0x31,0x4d,0x38,0xfe,0xf5,0xcb,0xef,0xa1,0x80,0xa0,0x53,0x8f,0x7b,0xae,0xe3,0xe0,0x2d,0x93,0x09,0xd0,0xc6,0x43,0x4d,0xe7,0x58,0x6c,0x45,0xa7,0x74,0x51,0xe9,0x57,0xd0,0xbf,0x11,0xcd,0x12,0x25,0xce,0x0c,0xaa,0xdd,0xa3,0xed,0x25,0x58,0xbb,0xdb,0x94
.byte 0x21,0x06,0x08,0x78,0x80,0x5f,0x14,0xc4,0x4f,0x25,0xb2,0xa1,0x8e,0x58,0x9d,0xc7,0x63,0xf0,0xef,0x66,0xc8,0x03,0x74,0x3a,0x3a,0xea,0x65,0x5a,0xb6,0x02,0x88,0xbc,0xbe,0x60,0x57,0xdf,0x5c,0x72,0xc6,0x06,0xbd,0x4b,0x9b,0x90,0x78,0xc1,0x97,0xdf,0xf4,0xa4,0xe7,0x75,0xed,0x3f,0xf6,0x4a,0x33,0x31,0xd7,0xed,0xa3,0x1f,0xb9,0x52
.byte 0x4e,0x59,0x03,0x66,0x89,0xee,0x9b,0xaa,0xfd,0x67,0xd0,0x3a,0xb4,0xfe,0x86,0xfe,0x14,0x7c,0x71,0x4a,0x2f,0xff,0x11,0x85,0x25,0x8e,0xc5,0x72,0xb9,0x8c,0x78,0x91,0x17,0x27,0xcf,0x0e,0xc0,0x46,0xaa,0x08,0x2d,0x49,0x84,0x4e,0xdf,0x9a,0xbc,0x50,0xa2,0x50,0x1f,0x52,0x0a,0x36,0x32,0x1f,0x1f,0x7d,0xf4,0x15,0x2b,0x01,0x34,0x50
.byte 0xa8,0xa3,0x98,0xa6,0xd0,0x44,0x20,0x44,0x55,0x8f,0xf0,0x99,0xc1,0xaf,0x0f,0x54,0xee,0xea,0xb8,0xb6,0xf4,0x14,0xdb,0x4f,0x9d,0x31,0x66,0x7d,0x08,0x92,0xfb,0x20,0xda,0x3e,0x6e,0xfe,0xb9,0x57,0x41,0x63,0xb8,0x10,0x8e,0x7c,0x12,0x01,0xa3,0x0b,0x0c,0x19,0xce,0x14,0xc7,0x13,0xc6,0x72,0xf6,0x6f,0x4d,0x8d,0x2b,0xaf,0x96,0x1c
.byte 0xfc,0xcc,0x38,0x0b,0x7e,0xb7,0x44,0x1e,0x37,0xc6,0x2d,0x72,0xfb,0x20,0x40,0x07,0xa9,0x97,0xb3,0x17,0xc1,0x0a,0x65,0x75,0x57,0xda,0xc9,0xdc,0xcb,0x6a,0x3b,0xaa,0xd6,0x57,0x45,0xdb,0x22,0x9f,0x9c,0x0b,0x53,0xb3,0x08,0x9f,0xe3,0x79,0x0f,0xb1,0xa9,0x18,0xcc,0x96,0xf2,0xd0,0x8d,0xb0,0x4f,0x50,0x2d,0xec,0x03,0x26,0x8e,0x8b
.byte 0xeb,0x9b,0x52,0xa5,0xfc,0x2e,0xcc,0xcf,0x7b,0x1b,0x11,0x44,0x01,0x71,0x8b,0x03,0x5d,0x08,0x56,0x67,0x3a,0xe0,0x9d,0xb5,0xec,0x3f,0xce,0x7d,0x0f,0xb3,0x2b,0x1f,0xcc,0x0e,0xba,0xa8,0x69,0x22,0xa7,0x14,0x8a,0x7b,0x7c,0xa8,0x81,0x62,0x03,0x9c,0x3d,0x1e,0x27,0x09,0x4f,0xda,0x8b,0x0f,0x71,0xbc,0x87,0x9b,0xa9,0x48,0xed,0xa0
.byte 0xf3,0x52,0xa1,0x4d,0xdd,0x57,0xa5,0x4f,0x38,0xdc,0x5a,0xd4,0x24,0x7a,0x9c,0x62,0xf3,0x51,0x54,0x28,0x1f,0xef,0x92,0x81,0x9c,0x80,0x1d,0xa3,0xe1,0xb8,0xb4,0xf4,0xb9,0xa1,0x43,0x27,0xc8,0x99,0x10,0x36,0x22,0xf8,0x7f,0x86,0xe2,0x5f,0x2f,0x21,0xe2,0x7e,0x16,0x9a,0xe7,0x29,0x3e,0x6b,0x03,0x32,0xcf,0x64,0x86,0xa1,0x8a,0x1e
.byte 0xce,0x15,0x12,0x8c,0xa9,0x71,0x2e,0x96,0x2b,0x70,0x94,0x51,0xeb,0xf9,0x59,0xa0,0x69,0xa7,0x1a,0xec,0x21,0x8b,0xea,0xa6,0xd5,0x8b,0x60,0x17,0x51,0x88,0xe5,0x5f,0xf5,0xc5,0x6c,0x0f,0xf3,0x32,0xef,0xab,0x5f,0x25,0x14,0x36,0x61,0x41,0x7d,0x7c,0x94,0x3a,0x3f,0xa5,0xbb,0xf1,0x52,0x2a,0xd1,0x9b,0xbe,0x5e,0x93,0xa1,0x9d,0xd3
.byte 0xb7,0x19,0x7f,0x86,0x32,0x62,0xbc,0x5b,0x53,0x8a,0x41,0x0c,0x45,0x5b,0xc4,0xfd,0x78,0xfc,0xc2,0x6f,0x90,0xef,0xea,0xbd,0xd6,0x63,0x27,0xc8,0xcf,0x8a,0x7f,0xb1,0x04,0x10,0xe0,0x30,0xd9,0xba,0x57,0x24,0x6d,0x3d,0x9a,0x2a,0x90,0xfc,0x7e,0x49,0x28,0xda,0x89,0x89,0xcb,0xab,0x23,0xfb,0x85,0xbd,0x2c,0xca,0xf2,0x6b,0x59,0x7d
.byte 0x9c,0x06,0x88,0xd3,0xc5,0x5e,0xbd,0xa3,0xb5,0xbe,0x59,0xba,0xd9,0x73,0x43,0x99,0xf4,0xd1,0xf0,0x78,0x76,0xff,0x13,0x6b,0xc9,0x91,0x7e,0xad,0x4a,0x00,0xf3,0x05,0xa5,0x8d,0x17,0xf7,0xd8,0x5b,0xad,0x34,0x23,0x74,0xed,0xb6,0xa7,0x1a,0x0b,0x6a,0xf1,0xe8,0x8a,0xe5,0x81,0x0e,0xc2,0xe3,0xa0,0x8b,0x8e,0xca,0xed,0x50,0x03,0x8b
.byte 0xc0,0x0c,0xee,0x7c,0xde,0x3f,0xbc,0xd8,0x58,0x87,0x97,0x0c,0x12,0xed,0x08,0xa4,0xf0,0x12,0x6d,0xea,0xae,0x9f,0xc8,0x3e,0x7c,0xfa,0x7d,0x19,0x8d,0xad,0x38,0xdd,0x61,0x2e,0x58,0x05,0x23,0x92,0x83,0x63,0xe6,0x8e,0x86,0xbb,0xba,0xf3,0xe8,0x4b,0xf8,0xe6,0x6b,0xfd,0xeb,0x1d,0x6a,0xd5,0x8e,0x78,0x77,0x30,0xd5,0xb4,0x32,0x86
.byte 0xd0,0xa6,0x26,0xf7,0xc6,0xd3,0xfc,0xd1,0x65,0x65,0xae,0xe2,0x2c,0x52,0xf7,0x36,0x4f,0xff,0xe2,0x6a,0x2a,0xd5,0x8c,0x85,0x5e,0xbf,0xbc,0xda,0x38,0x56,0xb2,0xc3,0x6c,0x5d,0x0f,0xdf,0xe4,0xb8,0x6a,0x43,0xd6,0x8b,0x55,0x5e,0xf5,0x38,0x46,0x26,0x25,0xe1,0x01,0x67,0x09,0xc8,0xc2,0xa7,0x23,0x30,0xf3,0x6d,0x25,0xf0,0x2e,0xa2
.byte 0x51,0x2d,0x00,0x72,0x8d,0x47,0x0e,0xdd,0xa1,0xd8,0x88,0x06,0xbb,0x49,0x33,0xa1,0x07,0x62,0x3d,0xa5,0x31,0x9c,0x62,0x71,0xde,0x89,0xd2,0xcf,0xcf,0x53,0x24,0x54,0x86,0x52,0xae,0xdf,0x4a,0xff,0x5b,0x80,0x66,0xf5,0xd3,0xc0,0x56,0x76,0xc9,0xd0,0x53,0xd7,0xd8,0xd8,0x1d,0x39,0xfb,0xb3,0x06,0x89,0x07,0x5d,0x68,0xf0,0xc8,0x0b
.byte 0x90,0xbe,0x5b,0x95,0xac,0x3c,0x7d,0x81,0x6e,0x10,0xf6,0x77,0x35,0x72,0x31,0x12,0x5f,0x3b,0x2d,0xd5,0x7e,0x68,0x02,0xde,0x06,0xd9,0xa8,0xc5,0xb8,0x9b,0xa0,0xbd,0x24,0x3a,0xdc,0xea,0x3d,0xb7,0x44,0x87,0x70,0xe7,0x07,0x6d,0xf1,0xa4,0xe8,0xbd,0x1a,0xa9,0x12,0xf3,0xfa,0x62,0x6f,0x68,0x42,0xe5,0xbf,0x1f,0xb6,0x6e,0x35,0xa3
.byte 0xc8,0xc3,0x11,0xb0,0x09,0x68,0xbe,0x99,0xf7,0x2e,0xac,0x2d,0x55,0x81,0x0d,0xbc,0xcc,0xec,0xbf,0x52,0x50,0x22,0xf2,0x7a,0x10,0x2d,0xe7,0x46,0xd6,0x9d,0xee,0xb7,0xa1,0xa0,0xaa,0xc9,0xa2,0x32,0x0c,0x99,0x6e,0x76,0x36,0x53,0x0e,0x0f,0x00,0x96,0x0b,0x5f,0x6b,0x80,0xc5,0xe2,0xcf,0x1d,0xe3,0x97,0x54,0x07,0x9b,0x3e,0xf3,0x74
.byte 0xee,0x1e,0x93,0xaa,0x68,0xbd,0x7b,0x39,0x6e,0x4d,0x2c,0x67,0xe2,0x45,0xcb,0x35,0x3a,0x04,0x53,0x49,0x74,0xde,0xfb,0xfd,0x80,0xa1,0x0b,0x8d,0xb9,0x9e,0x9a,0x6f,0x4d,0x09,0x4b,0x4e,0x90,0x30,0xf4,0xe2,0x53,0x00,0xc3,0x33,0x59,0x0e,0x56,0x6c,0xd6,0xb9,0x4f,0xc1,0x44,0x6b,0x79,0x85,0x9e,0x2a,0x37,0x0f,0xc2,0xa7,0x63,0xca
.byte 0x6d,0x18,0x2e,0xd7,0x24,0xf3,0xc3,0x08,0xe9,0xf8,0x29,0x32,0x8a,0xb3,0x28,0x1a,0x93,0x7a,0x47,0xff,0xd0,0x9a,0xe4,0x97,0xef,0x4a,0x23,0xb5,0x61,0x1d,0x64,0x7c,0x69,0x90,0x5b,0xba,0x70,0x41,0xa6,0x51,0x08,0xf3,0x48,0x8e,0x0c,0xba,0x30,0x54,0x17,0x26,0xc7,0xd0,0x85,0x27,0x45,0x92,0x80,0xb1,0xe7,0xf2,0x1e,0xae,0x35,0x1e
.byte 0x29,0x61,0x74,0x2d,0x55,0x22,0x04,0xfd,0xa2,0xf0,0x7c,0x15,0x9a,0x3e,0xee,0x5a,0xa3,0x1b,0x83,0xc0,0x45,0x1e,0x49,0x81,0xb1,0xa1,0xff,0x78,0x69,0xcf,0x95,0xc8,0x8d,0x3b,0x0f,0xfe,0x2e,0xde,0x6e,0x57,0x69,0x87,0xaf,0x30,0x88,0xbc,0x70,0x8c,0x79,0x84,0x9f,0x52,0x46,0x9d,0x34,0x3a,0xe5,0xe4,0x98,0x9f,0x43,0x77,0x40,0x99
.byte 0x58,0xae,0x60,0xfd,0xef,0xc9,0x62,0x9e,0x89,0x7f,0xe3,0x2f,0x4e,0xdc,0xb8,0xb8,0x8d,0xdf,0x31,0x5f,0x73,0xed,0x42,0xdf,0x58,0xd0,0xe1,0x50,0x60,0xf1,0x04,0xab,0x3c,0x5c,0xe4,0x5f,0xc1,0xa1,0xeb,0x51,0x61,0x5b,0xab,0x47,0x71,0xbb,0xcc,0x14,0x6c,0xeb,0x84,0x4f,0x87,0xde,0x11,0x7d,0xb7,0x37,0x99,0x35,0xdb,0x31,0x4f,0x0e
.byte 0xfe,0xbb,0x16,0x7b,0x9c,0x62,0x33,0x33,0x98,0xaf,0x86,0x29,0x69,0xe7,0xc9,0x64,0x87,0x81,0xff,0xf5,0xbd,0xf0,0xe2,0x41,0xf9,0x24,0xe3,0xd3,0x55,0xa5,0xdc,0xf3,0x35,0xb4,0x3d,0x55,0x31,0x51,0x77,0xbd,0x1c,0xe4,0x46,0xe8,0x2b,0x5c,0xc9,0x35,0x7f,0x84,0xde,0x25,0x8c,0x61,0xff,0x09,0xd4,0x5f,0xd8,0x3b,0xa8,0x8b,0xa5,0xa9
.byte 0xe8,0xa8,0xe2,0xef,0x82,0x6d,0x60,0x3e,0xc6,0x48,0x73,0x03,0x04,0x81,0x11,0x10,0xee,0x41,0xdb,0xc3,0xb9,0x78,0xd9,0xf0,0x32,0xa1,0xcc,0xa5,0x4a,0x67,0xe7,0x6b,0x21,0x6c,0x64,0x06,0x2c,0x8c,0x52,0x53,0xaa,0xb5,0x28,0x4d,0xd6,0xc6,0xa5,0x09,0x43,0x37,0xd6,0x73,0xfc,0xe7,0xf6,0x88,0x50,0xbc,0x81,0x7b,0xa5,0x92,0xa7,0x0b
.byte 0x86,0x5d,0x20,0x0c,0xbf,0x4d,0x1f,0x47,0xd1,0xd6,0x48,0xf4,0x64,0x55,0x99,0x7c,0x74,0x15,0x21,0xa8,0xeb,0x35,0xf2,0x86,0xc1,0x5e,0xbf,0x80,0x34,0x4b,0x44,0x38,0x21,0xd2,0x01,0x7d,0xf7,0x51,0x0c,0x02,0x03,0xe9,0x60,0xdf,0x80,0x36,0x40,0xfc,0x0a,0x96,0xbc,0x2e,0x88,0x8e,0xa4,0xa7,0x1c,0xc8,0x42,0x34,0xb5,0xd9,0xda,0xd7
.byte 0x74,0x19,0xf7,0xff,0x0f,0x56,0x2c,0x02,0x48,0x92,0x5c,0x82,0xb3,0x7d,0x1d,0xef,0xd1,0xec,0x86,0x9b,0x3f,0xa8,0xb7,0xfa,0x02,0x44,0xb5,0x19,0x0c,0xce,0xd8,0x66,0xc6,0x48,0xbe,0x97,0xbd,0x4c,0x65,0x3a,0x09,0x5a,0x79,0xb9,0xa1,0x48,0xb4,0x2a,0x5d,0x10,0x61,0xac,0x17,0xd3,0xf6,0x13,0x1d,0x71,0x08,0x86,0xc8,0x4e,0xab,0xb9
.byte 0x0d,0x6f,0x7f,0x79,0xe8,0xf8,0x85,0x68,0x8f,0xac,0x98,0x93,0xbf,0xe5,0xf6,0x84,0x5e,0x47,0x9d,0xc4,0x21,0xb6,0xf8,0x17,0x1a,0xb9,0xff,0x8f,0xfd,0xd8,0xc1,0x6f,0xb8,0x74,0xb9,0xfa,0x55,0xd9,0x33,0x3e,0x98,0x3d,0x0e,0x3b,0xfa,0x2c,0x13,0xf4,0xcb,0x2a,0x4e,0x74,0x33,0x6a,0x50,0x49,0xeb,0xb6,0x87,0xb2,0x8d,0x24,0x38,0xc2
.byte 0x01,0x80,0xf7,0x7c,0x4e,0x8d,0xa5,0x79,0xed,0x43,0xd6,0x82,0x6a,0x2e,0x0a,0x6c,0xe3,0x58,0x26,0x7a,0xc2,0x68,0x84,0x78,0x5c,0x67,0x33,0x97,0x97,0xd8,0x7e,0xeb,0x40,0x9d,0x61,0x25,0x6a,0x2f,0x63,0x9c,0xae,0x05,0xcf,0xb5,0x39,0x4e,0xb0,0xdb,0xc9,0x2e,0x14,0x3c,0x6b,0xda,0x02,0x6f,0xf8,0x73,0xab,0xe4,0x1e,0xaa,0x2c,0x62
.byte 0x41,0x65,0x5f,0x2c,0x5b,0xcb,0x56,0x8e,0x61,0x6a,0x57,0x21,0x8d,0xe5,0x8e,0x44,0x4f,0xfb,0x69,0x45,0x46,0x62,0xe3,0x12,0xe6,0x36,0x00,0x82,0x6a,0xa5,0x5e,0xfd,0x01,0xde,0xd1,0x9e,0xd7,0x3c,0x88,0x44,0x66,0x5d,0x0c,0x9f,0x0a,0x03,0xc8,0x79,0x96,0x54,0xf3,0x33,0x69,0x1e,0x98,0xe9,0x85,0x4a,0x8a,0xf7,0x3a,0x5e,0x02,0xe7
.byte 0x88,0x23,0x41,0x08,0x4f,0x4b,0xf5,0xde,0x3a,0xbc,0x0d,0xfa,0xec,0xf2,0x74,0x63,0x51,0x4a,0x49,0xae,0x82,0xc0,0x9b,0x08,0x96,0x99,0x6b,0x13,0xb8,0x47,0x55,0x63,0x80,0xc0,0x41,0x83,0xf3,0x77,0x6b,0x76,0x0d,0xd6,0x32,0xbb,0x6f,0xfb,0xa9,0xfa,0x86,0x6e,0xe2,0xa3,0x0d,0x34,0x3c,0x8a,0x0d,0x06,0xbb,0x34,0x98,0xf2,0xad,0x2c
.byte 0x81,0xb8,0xd5,0x8e,0x78,0xa6,0x63,0xbd,0x3c,0x9e,0xb5,0x3b,0x2e,0xf4,0x28,0x57,0x06,0xe0,0xcf,0xef,0x4b,0x3e,0xfd,0x2e,0x6f,0xb8,0xff,0x5b,0x78,0x2e,0xa2,0x05,0xa5,0xcd,0x43,0x6f,0xf5,0xfe,0xe9,0xcd,0xda,0x48,0xfd,0x8f,0x74,0x0e,0x60,0x47,0x04,0xed,0x17,0xd8,0x67,0x7a,0x65,0x7f,0x45,0x0c,0x5f,0xf0,0x3a,0x6a,0x88,0x14
.byte 0xb2,0x04,0xf6,0x95,0x1b,0x20,0xf3,0x94,0x77,0xaa,0xf3,0x57,0x09,0xbf,0x7e,0x1f,0x51,0x08,0x7e,0x7f,0x7c,0x9f,0xfd,0x33,0x47,0xb1,0x94,0x36,0x67,0x54,0x8c,0x2b,0x6c,0xb0,0x32,0xc5,0xc3,0x9b,0x9f,0x5b,0x71,0x94,0x20,0x86,0xc9,0x16,0x82,0xa9,0xe7,0xe4,0x58,0x63,0x7a,0x6a,0x25,0x0e,0x9f,0x00,0xc8,0x65,0x14,0xbf,0xf0,0x4e
.byte 0x33,0x9f,0x0e,0xe7,0x10,0x61,0x21,0x6c,0x9c,0xf0,0x42,0x52,0xb6,0x5c,0xcd,0xbf,0xe6,0x20,0xe6,0xa7,0x20,0xe9,0x94,0x8b,0x29,0x1f,0x33,0x93,0x1a,0xc6,0x49,0xfb,0x1c,0xb6,0x2c,0x12,0x4a,0x2a,0x31,0xc7,0xc9,0xd1,0x73,0x53,0xbe,0x02,0x6d,0x58,0x9b,0x0e,0xfa,0x90,0x84,0x40,0x58,0x06,0x99,0x6b,0xfe,0x4d,0xbb,0xe2,0x9d,0x09
.byte 0x74,0x4f,0xf8,0x5d,0x59,0xbf,0xac,0x39,0xe5,0xf0,0xa2,0x89,0xf3,0x78,0xbe,0xb1,0x85,0x48,0xd6,0x1c,0x92,0x2b,0x85,0x87,0xc4,0xa6,0x81,0x64,0xf0,0xd1,0xe0,0x40,0xc8,0xd9,0x66,0xb9,0x06,0x21,0x8e,0x02,0x27,0x93,0xac,0xc3,0x79,0x20,0x43,0x62,0xa8,0xe1,0xcd,0x52,0x19,0xe5,0xf1,0x10,0x7a,0xc5,0x3e,0xe0,0x20,0xd0,0xc8,0x5f
.byte 0x47,0x41,0x97,0xe4,0x65,0x6f,0x89,0xf6,0x51,0x4c,0xd6,0x1b,0x71,0xd2,0x9a,0x1c,0xca,0x5a,0x9a,0xf2,0x44,0xed,0x3f,0x50,0xf2,0xf6,0x11,0x48,0x23,0xf9,0x82,0x90,0x5c,0x65,0x1a,0x2a,0xfc,0x9e,0x8b,0x64,0xa6,0x46,0x16,0x80,0xd4,0xcc,0xe2,0xd0,0xcd,0x7f,0x30,0xfd,0xd2,0x11,0xa1,0x5c,0x6f,0x7e,0x4b,0x81,0x03,0x98,0x85,0x44
.byte 0x54,0x8a,0x9d,0x1b,0x5c,0x6c,0xe4,0xe3,0x61,0xe5,0x85,0xa7,0xfe,0x03,0x34,0xe0,0xed,0xff,0x46,0xba,0x0f,0xac,0x79,0x6d,0x47,0x60,0x08,0xba,0x95,0x8c,0xe6,0x7d,0x33,0xca,0x82,0x8a,0xe6,0x1e,0x1f,0xb4,0xba,0x49,0x51,0x05,0x2b,0x18,0xb3,0x7c,0x5f,0x12,0xa2,0x2f,0x96,0x28,0xab,0xe8,0x16,0xac,0xfe,0xa0,0x83,0xbd,0x86,0x1b
.byte 0x53,0xc1,0xab,0xed,0x42,0x2a,0x8b,0xaa,0x90,0x3f,0xcd,0x20,0xd7,0x9e,0xb8,0x3b,0xcd,0x5a,0xc9,0xea,0xbe,0xb2,0x7b,0x38,0xe4,0x16,0x95,0xaa,0xee,0xf6,0x1e,0xbd,0x1a,0x0f,0x89,0x96,0x35,0x0b,0x61,0xa9,0x87,0xca,0x35,0x27,0x25,0x1a,0xd6,0x31,0x8f,0xc4,0x10,0xf6,0xb7,0xff,0x3a,0x6a,0xb0,0xb7,0x7f,0x44,0x4c,0x08,0xaf,0x17
.byte 0xe4,0x4a,0x0a,0x52,0x83,0x3e,0x11,0x53,0x7f,0x86,0x09,0x23,0xc7,0x46,0x3c,0x6d,0x66,0x2b,0xd0,0x82,0x08,0x02,0xa3,0x41,0x21,0x29,0x5e,0x68,0xa3,0x11,0xa9,0x8f,0x91,0xb9,0x60,0x87,0x22,0x37,0xfe,0x04,0xea,0x09,0x9f,0x96,0x6c,0x1e,0x67,0x31,0x9f,0x81,0xa9,0xeb,0xb0,0x1f,0xe0,0xb0,0xf4,0xf4,0xb9,0xa1,0x3f,0xb8,0xc7,0x83
.byte 0x53,0x74,0x34,0x7b,0xfb,0xcd,0xf2,0x6e,0xe6,0xa3,0x26,0x86,0x57,0xb7,0x57,0xa2,0x24,0x43,0xd2,0xdd,0x9e,0x30,0xeb,0x3f,0xf5,0xa2,0x84,0x97,0xc0,0x23,0x63,0xee,0x84,0x8e,0x01,0xa2,0x57,0xf2,0xa1,0x48,0x6f,0x0f,0x19,0x31,0xae,0x26,0x08,0x4a,0x13,0x7e,0xde,0x85,0xb8,0x72,0xea,0x69,0x17,0x51,0x94,0x17,0x96,0xc1,0xc6,0x93
.byte 0x10,0x38,0x0c,0xba,0xd1,0x86,0x57,0x5e,0x39,0xd5,0x7f,0x50,0x0e,0x94,0x8b,0xc4,0x1b,0x3d,0x40,0x3c,0xfb,0x49,0x48,0xf9,0xf4,0xd8,0x0d,0xb2,0x3a,0xa9,0xd9,0x29,0x31,0x57,0xc7,0x65,0x1e,0x86,0x77,0x9d,0x53,0x8c,0x60,0x83,0xb0,0xea,0x19,0x76,0x8e,0x02,0x73,0x69,0x2c,0xd6,0x25,0xbd,0x83,0xd1,0xf3,0xfd,0xb7,0x51,0x95,0x07
.byte 0x51,0xf8,0x36,0xc9,0x8d,0xc1,0xec,0x47,0x3f,0xfa,0x19,0x8c,0xd5,0x07,0x20,0xd1,0x9f,0xff,0xb2,0x25,0x2d,0xe0,0xe4,0xa2,0xa3,0x29,0xbd,0x81,0x34,0xbf,0x60,0x04,0x8c,0x80,0x68,0xce,0x8b,0xbf,0xfa,0x50,0x12,0xdf,0x26,0x6c,0x9c,0x90,0x68,0xd9,0xfd,0x3b,0xc5,0x10,0xb3,0xd2,0xdf,0x17,0xae,0xf8,0xb0,0xe5,0xf3,0x44,0x5f,0x01
.byte 0xbc,0x86,0x11,0x74,0xda,0x06,0x4b,0xac,0x49,0x75,0x77,0x65,0x38,0x97,0x1c,0x7c,0x8c,0x69,0x5b,0x9e,0x17,0x30,0x14,0x4f,0xf0,0x2d,0xd5,0xd6,0x78,0x56,0x27,0x96,0xe4,0xb8,0x69,0x1f,0xd5,0xaa,0x27,0x50,0x80,0x09,0xed,0x14,0x8f,0x36,0x48,0x32,0xfd,0x66,0x47,0x10,0xd9,0x8c,0xcf,0xa6,0xe6,0xd5,0x21,0x6a,0xe3,0x40,0xaa,0x4c
.byte 0xa2,0x0a,0xd6,0x2c,0x6f,0x79,0x10,0x8b,0x06,0xb4,0x01,0x91,0xce,0x62,0xfc,0xa0,0x53,0x3a,0xa0,0x65,0xe5,0xd4,0xe9,0xd6,0x91,0x04,0x55,0xa7,0xa9,0x75,0xc7,0x9c,0x13,0x45,0x16,0xcb,0x13,0x88,0xf4,0x08,0xa6,0xe9,0x8e,0x8a,0x84,0xd6,0x8c,0x83,0x5b,0xc5,0xf9,0xbf,0x1d,0xae,0x44,0xd3,0x74,0xa7,0x5d,0x29,0x03,0xf2,0x01,0xad
.byte 0xdb,0x3d,0xa2,0xcd,0xf0,0xf9,0xa1,0x27,0xe1,0xbb,0xe6,0x22,0x97,0x0e,0xb4,0x3a,0x09,0xba,0xaf,0x41,0xd5,0x6b,0x67,0x67,0x42,0x1c,0x93,0x52,0x5e,0x79,0x85,0x9b,0x59,0xaf,0x98,0xbb,0x3e,0xbe,0x18,0x0f,0x2a,0x52,0xd1,0xc9,0xb5,0x21,0x04,0x9f,0xee,0xe9,0x30,0x97,0x74,0x7f,0x71,0xfd,0xec,0x0d,0xfa,0x0e,0x32,0x75,0x8f,0x31
.byte 0x3a,0x90,0x90,0xe4,0x0a,0x4b,0xb9,0xfc,0x55,0x02,0xfa,0x1c,0xbc,0xd7,0x30,0x24,0x1a,0x72,0x30,0x22,0xe9,0x61,0xf0,0xdd,0x60,0x55,0x69,0x8d,0x97,0xc1,0xfe,0x81,0x6a,0x16,0x8f,0x46,0x0b,0x1d,0xf5,0xc1,0xf7,0xf2,0xb6,0xf1,0x12,0x23,0x59,0x19,0xbd,0x3a,0xcd,0x57,0x34,0xfe,0x3b,0x1d,0xce,0xe5,0xe5,0xb7,0x90,0x65,0x2f,0x81
.byte 0xcc,0xae,0x07,0x0d,0xe6,0xfa,0x5d,0x7c,0x5f,0x4f,0x45,0xed,0x90,0x05,0xe5,0xfc,0x10,0xb9,0x4d,0x2a,0x03,0x09,0xf9,0x9c,0x7a,0xd6,0x20,0xf2,0xb2,0x87,0xc0,0xde,0xba,0xea,0x78,0x69,0x8f,0x4d,0x6a,0x5d,0xc1,0x20,0x59,0x39,0x8a,0x9f,0x9d,0x8e,0xc4,0xad,0x93,0x4e,0x4f,0x03,0x6e,0x79,0xf7,0x5a,0x21,0x7d,0xa0,0xd4,0xce,0xe3
.byte 0x0e,0xea,0xbd,0xd2,0x0e,0x16,0x89,0x0e,0x7f,0xec,0xc3,0x2a,0x21,0x86,0xb3,0x4f,0xb7,0xc4,0x1b,0x60,0xda,0x18,0xdb,0x73,0xda,0xbc,0x79,0xab,0xea,0xef,0xab,0xa2,0x59,0x89,0x76,0xce,0x72,0x51,0x41,0xf8,0xfe,0xa0,0xbb,0x38,0xf8,0x99,0xcd,0x9d,0x58,0xb9,0x6a,0xb5,0x5f,0xb7,0xa1,0x69,0xe3,0xb9,0x1d,0xfb,0x7a,0x1c,0xc8,0x21
.byte 0x4d,0x11,0x57,0x1d,0xc0,0x45,0x21,0xba,0xa2,0xa3,0xbb,0x1a,0x34,0x17,0xaa,0xa1,0x0b,0x81,0xa1,0xb9,0xf0,0xba,0xf8,0xbf,0xb8,0x6a,0x8a,0x3c,0x75,0xf9,0x48,0x66,0x34,0x29,0xc3,0xc5,0x77,0x58,0x2e,0xdd,0xc1,0xd3,0x38,0x23,0xe0,0x92,0xe6,0x77,0xe5,0xf8,0xf4,0x70,0xe9,0x81,0xad,0x94,0xd3,0xce,0x69,0x97,0x2c,0x4b,0xc1,0xcf
.byte 0x83,0xc6,0xfb,0x89,0x7f,0xa7,0x28,0xfa,0xce,0xa4,0x6e,0x24,0x15,0x80,0x3b,0x9b,0x14,0x0d,0xc4,0x82,0x3f,0xdf,0xe9,0x40,0x81,0x7f,0xcc,0xb1,0xbb,0xa4,0xdf,0xee,0x56,0x7e,0xf7,0xe3,0x34,0xb2,0xfd,0xed,0x58,0x48,0xcc,0x1e,0x05,0x21,0x9f,0x30,0xf3,0xa9,0x24,0xe6,0xc3,0xdb,0x2c,0x72,0xfb,0xd6,0x0b,0xd7,0x84,0x64,0xd4,0x9b
.byte 0xf5,0x55,0xe5,0xb1,0xdf,0x01,0x07,0x5f,0xb7,0xd7,0xde,0x99,0x63,0x55,0x90,0x02,0x5d,0xef,0x86,0x91,0xa8,0x70,0x87,0x58,0xde,0xe8,0xa8,0xf1,0xf4,0x09,0x2d,0x44,0x19,0x4e,0x45,0x30,0x72,0xf9,0xc3,0xaa,0xc9,0x12,0x71,0xa5,0x63,0xa0,0x38,0x0b,0x77,0xa5,0x0a,0xef,0xf5,0xbb,0xbc,0xec,0xfd,0xb8,0x75,0x9c,0xfb,0x70,0x2a,0xe8
.byte 0x71,0x3f,0xf7,0x39,0x56,0x69,0xe0,0x37,0xf7,0x94,0xfe,0x3a,0x7b,0x78,0x49,0x35,0x11,0x99,0xa2,0x70,0x66,0xbe,0xae,0x21,0x26,0xff,0x75,0x03,0x87,0xc2,0x7c,0xd7,0x29,0x5a,0x36,0x3f,0x73,0xba,0xba,0x08,0x5d,0x4b,0xc0,0xe0,0x76,0xb6,0x15,0x1b,0x9f,0xbb,0x01,0x0a,0xf6,0xf7,0x98,0x8b,0x4b,0x0e,0xbc,0x71,0x7a,0xd2,0x69,0x87
.byte 0xe3,0x45,0xa6,0x41,0xd9,0x9d,0x64,0x90,0x7c,0x9d,0x12,0xf8,0xf0,0xc9,0x52,0x50,0x11,0x18,0x6b,0x9f,0x94,0x31,0x14,0x70,0x59,0xc3,0xb3,0xad,0x73,0x01,0x70,0xa7,0xb3,0xc7,0xcc,0xae,0x8a,0xc1,0x4e,0x62,0x1e,0xb1,0x4b,0x34,0xc9,0x11,0x73,0xb1,0x3f,0xbf,0xe2,0xe3,0xed,0xf1,0xab,0x07,0x87,0x3a,0xfb,0x1f,0x32,0x75,0x74,0x39
.byte 0xba,0x2a,0xa6,0x82,0x33,0x27,0x60,0x94,0xc1,0x91,0x4e,0xaa,0x4d,0x99,0xcb,0xb2,0x5e,0xfa,0xdd,0x2d,0xf7,0xc3,0xf1,0x66,0x7d,0x0a,0xc3,0x8e,0x10,0x56,0x2e,0xde,0xc7,0xca,0x48,0xe7,0xaa,0x90,0x11,0x4b,0x60,0x57,0x2f,0xae,0xa5,0xe3,0x95,0x16,0xe3,0xac,0xab,0xc5,0x68,0xd3,0x71,0x2c,0xe0,0xdc,0x9d,0x48,0xe7,0x73,0x25,0xc9
.byte 0xf7,0x16,0x3c,0x7f,0x25,0x4b,0x75,0x21,0xe1,0x20,0x1b,0x95,0xde,0xf8,0xba,0xa9,0x51,0xe9,0xce,0xec,0xa1,0x44,0x66,0x05,0x46,0xeb,0x6d,0x48,0x32,0x1f,0x13,0x25,0x61,0x2d,0xfc,0xb9,0x4d,0x88,0x70,0xdc,0x37,0xaf,0x1f,0xb4,0xb2,0x14,0x28,0x06,0xf4,0x51,0xcf,0x09,0x25,0xef,0x7d,0x68,0xac,0xb0,0x47,0x30,0x0a,0x33,0x32,0x05
.byte 0xd7,0xbc,0xae,0x4a,0x92,0x8f,0xc8,0xe2,0xd4,0xec,0x03,0xe5,0xa2,0x92,0x78,0xd3,0xe8,0x9a,0x4a,0x07,0xe9,0x46,0x02,0x42,0xbc,0x9d,0x0f,0x63,0xf3,0x5a,0xba,0xec,0x0d,0x21,0x29,0x35,0x29,0xa5,0xfa,0x10,0xb6,0x29,0xf3,0xf7,0xd2,0xd3,0xb0,0x41,0xba,0x08,0x3f,0x52,0x21,0x74,0xe2,0x32,0x16,0x92,0x77,0x2b,0xca,0xeb,0xbe,0xe2
.byte 0x15,0xda,0x39,0x4d,0x8c,0x4b,0x0d,0xf9,0xa1,0xa5,0x0f,0x2b,0xbd,0x17,0xe9,0x5c,0x8a,0x87,0x60,0xae,0xdb,0x1c,0x39,0x49,0x80,0x03,0x1c,0xc3,0xcc,0xd7,0xad,0xf9,0x92,0x38,0x08,0xc8,0x0c,0x38,0xff,0x84,0x29,0x5c,0x75,0xb2,0xf6,0x64,0x00,0x07,0x6c,0xb1,0x62,0x40,0x21,0xfb,0x7e,0xa0,0xb5,0xb4,0xbd,0x47,0x22,0x07,0x4b,0xdf
.byte 0x42,0x94,0x43,0x5a,0xe9,0x5b,0x61,0x16,0xdc,0x1a,0xb8,0x35,0x51,0x17,0x87,0xf9,0xac,0xee,0x4b,0x2c,0x03,0x53,0xc0,0xb4,0xd6,0x13,0x11,0xb5,0x1b,0x10,0x0c,0x54,0x1b,0x74,0xd9,0xf8,0x15,0x1e,0xc5,0x92,0x6c,0x4c,0x30,0x67,0x78,0xef,0xb9,0xd8,0xd7,0x5a,0xf2,0x4b,0x87,0x3c,0x65,0xd9,0xfd,0xa1,0xb0,0x2b,0xaf,0x69,0xc4,0x8c
.byte 0xbc,0x79,0x10,0x10,0xa2,0x43,0xfe,0x0a,0x2d,0xb3,0x6b,0xc8,0x7d,0x5c,0x80,0xab,0x9e,0xfd,0x4c,0x9b,0x32,0x50,0x2a,0x78,0x2f,0xfb,0xdc,0xc0,0x2e,0x61,0xff,0xbb,0xad,0xb8,0xfc,0x2b,0x8a,0x92,0x7b,0xdc,0xb9,0x1c,0x7e,0x89,0x5c,0xf5,0x4f,0xd8,0x69,0xf5,0x4f,0xe9,0x8e,0x5d,0x6e,0x52,0xa3,0x63,0x00,0x52,0xb6,0xbd,0x68,0x8f
.byte 0x63,0xb2,0x8a,0xc7,0xc8,0x37,0xd0,0xed,0x36,0x4a,0x18,0xba,0xb8,0x6b,0x0e,0x93,0xf5,0xca,0x86,0xcd,0x99,0xe4,0x8e,0xe1,0x20,0x23,0xe0,0xc1,0x06,0x73,0xae,0x21,0x25,0x36,0xdd,0xb8,0x52,0xb6,0x69,0x12,0x01,0xad,0xc5,0x72,0x22,0xa1,0xe0,0xae,0x19,0x56,0x0e,0xb5,0xcb,0xeb,0xc9,0x8a,0xf3,0x28,0x8b,0x8c,0x09,0x86,0xa0,0x8c
.byte 0x86,0xef,0xeb,0x73,0xbd,0x57,0x20,0xa7,0xe2,0x1e,0xa2,0x62,0x0e,0xa8,0xdf,0x2a,0x03,0x6a,0xe2,0x48,0xea,0xd2,0x6a,0xb1,0xa1,0x85,0x51,0xc7,0xb0,0xb0,0x45,0x17,0x24,0xef,0x0a,0x72,0xfa,0xb9,0x89,0x10,0x9e,0x47,0x5d,0xce,0x62,0x54,0xca,0xae,0x77,0x95,0xf0,0x65,0xb9,0xcd,0x6f,0xd6,0x81,0xdd,0xf7,0x6f,0x76,0x22,0xa4,0x2e
.byte 0x6c,0x14,0x2f,0xb8,0x4f,0x2b,0x5b,0xa5,0x2f,0xa8,0x07,0x15,0x20,0xf5,0xcc,0x7d,0x6f,0x2d,0x3e,0x8b,0x15,0x90,0xcd,0x73,0x34,0xec,0xfd,0x81,0x9a,0x09,0xa6,0x67,0xa0,0x4f,0xd7,0xff,0x3b,0xbd,0x5d,0x39,0xde,0xbf,0x26,0xd8,0xc1,0x3b,0x32,0x78,0x71,0x56,0x73,0x43,0xa2,0x16,0x7a,0xbf,0xc6,0xb3,0xfa,0xfe,0x96,0xfa,0xd4,0xc9
.byte 0xbf,0xda,0x2a,0x16,0x35,0xb4,0x3f,0x46,0x12,0xb5,0xc2,0x7f,0xae,0xee,0x4e,0x06,0x67,0xa0,0x00,0x0c,0xd0,0x2e,0xa7,0xbe,0xd5,0x28,0x6b,0x95,0x59,0x4c,0x3a,0x42,0xb6,0x39,0x49,0x26,0x43,0x1e,0xe9,0x46,0x1c,0x7d,0x7f,0x45,0x9b,0x4c,0x2f,0x9f,0xa4,0x48,0xb2,0x20,0xe4,0x76,0x4c,0x58,0x19,0x69,0xda,0x98,0x92,0xbd,0x78,0x52
.byte 0x57,0xe3,0xcd,0x77,0xf3,0x57,0x6f,0x97,0x6d,0x63,0xd0,0xee,0xae,0x93,0x19,0xbc,0xff,0xe2,0x66,0x72,0xbc,0xd3,0x75,0x65,0x1f,0xe6,0xbc,0xad,0x92,0x37,0x8d,0xa6,0xb8,0xca,0xf0,0xee,0x1d,0xa0,0xc4,0x9c,0x3c,0xa3,0x45,0x87,0x14,0x1e,0x06,0xab,0x97,0xd6,0x8c,0x7a,0xae,0xcd,0x8b,0xa6,0x60,0x7b,0x0f,0x2a,0x30,0xbe,0x34,0x41
.byte 0xfd,0xf2,0x1f,0xc1,0x1e,0x4e,0x52,0xbf,0x32,0x3b,0x55,0xbf,0x12,0xb3,0x24,0x79,0x63,0xc7,0x48,0x4c,0x87,0x04,0xed,0x3c,0xf2,0x1b,0x95,0x32,0x0f,0x1c,0x60,0xfe,0x5a,0xc7,0x6a,0xbb,0x29,0x36,0x57,0x22,0x3c,0x6f,0x74,0xac,0x6e,0x40,0x12,0x17,0x4c,0x47,0x27,0xc9,0x03,0xdb,0x08,0xc6,0x84,0x15,0x83,0x63,0xe1,0xc8,0x00,0x3f
.byte 0xfc,0xe6,0x9c,0x66,0x0f,0x0c,0x8e,0xae,0x0c,0x5d,0xde,0x9f,0xba,0x11,0x35,0xe3,0x0d,0xba,0x18,0xbe,0x0b,0xbc,0x39,0xc3,0x84,0xa0,0xfd,0xc9,0x79,0x65,0xde,0x2f,0x80,0x38,0x34,0x16,0xc0,0x29,0xfe,0xf6,0x9e,0x7e,0x97,0x47,0x6f,0xd7,0xa0,0x79,0x3a,0xa7,0x3f,0x12,0x7a,0x0c,0x99,0x41,0x3d,0x75,0xd2,0x0e,0x38,0x56,0xb8,0xe6
.byte 0x1d,0x3c,0x32,0xe0,0xa2,0xb6,0xee,0xd6,0xf3,0xaf,0x5a,0xe3,0xf6,0x27,0x42,0x68,0xfb,0x99,0xbe,0xc9,0xab,0x2d,0x90,0x53,0xd8,0x28,0x3a,0x7b,0x5f,0xad,0x83,0xea,0x86,0x6a,0x9c,0x22,0x96,0x0c,0x13,0xb6,0xb0,0x38,0xbb,0x67,0x89,0xba,0x82,0x8e,0xa7,0xf7,0xeb,0x93,0xaa,0x8c,0xd4,0x00,0xb0,0x62,0x57,0x84,0xf1,0x46,0xdb,0x3d
.byte 0x1b,0xdc,0x74,0xc4,0x8e,0x86,0x5a,0xd5,0x5d,0xd2,0xdd,0x17,0xf8,0x4f,0xcc,0x8d,0x4a,0x43,0xe5,0xd6,0x58,0x14,0xa3,0x61,0xf3,0xc3,0x52,0xe2,0x6a,0xce,0xd8,0x44,0x60,0x67,0xf2,0xcd,0xa1,0xb2,0xf6,0xb9,0xe0,0xc9,0x88,0xd4,0x1a,0xa2,0xd0,0x1d,0xe6,0x7b,0x20,0x20,0x89,0x80,0xdb,0x39,0x20,0x3d,0x4f,0xc2,0x58,0x2b,0x3c,0xd4
.byte 0x90,0x20,0xea,0x43,0x9b,0xe3,0x64,0x1a,0xd3,0xd3,0xdc,0x40,0xb4,0x88,0x4b,0xca,0x23,0x66,0x9c,0x08,0x1f,0x9f,0xfb,0xca,0x9d,0xa1,0x88,0xe1,0x4f,0xb5,0xaf,0x43,0x00,0x02,0x0b,0x42,0xc5,0xd5,0xaa,0x27,0xcf,0xa0,0xdb,0x0d,0x60,0xbc,0x99,0xfb,0xdc,0xa9,0xb9,0xe3,0x3a,0x6a,0x49,0x02,0x16,0x41,0x43,0xf0,0x75,0x63,0xca,0xad
.byte 0xd6,0x93,0xc7,0x28,0xb7,0xb6,0x5b,0xf4,0x7d,0x5a,0x24,0x5c,0xa9,0xd8,0x7d,0xd4,0x7d,0x1c,0x8d,0x6f,0xab,0x0f,0x7f,0x38,0x4e,0x0c,0x68,0xca,0x1e,0x88,0xed,0x11,0x8d,0xd4,0x37,0xfd,0xce,0x6d,0xb1,0x77,0x2b,0x49,0xc6,0x10,0xde,0x6f,0x93,0x28,0xf6,0x2b,0x50,0x1f,0xf5,0x56,0x35,0x0e,0x7c,0xc5,0x52,0xc5,0x75,0xc4,0x2e,0x30
.byte 0x3d,0x17,0xa9,0x41,0x45,0x29,0x77,0x3f,0x33,0xd8,0x7f,0xb9,0xd2,0x82,0x25,0xe9,0x51,0x6c,0xba,0x03,0x83,0xd1,0x48,0x7c,0x81,0x03,0x26,0x8e,0xad,0x58,0x8b,0xd1,0xda,0x94,0x32,0x17,0x67,0x98,0xac,0x1e,0x7b,0x06,0xc8,0x9a,0x5c,0x83,0xbc,0xbe,0x4b,0x5c,0x7d,0xce,0x76,0x2a,0xa0,0x24,0x5c,0x4e,0x9c,0x16,0x62,0xac,0xe5,0xa9
.byte 0x38,0x60,0xcc,0xc1,0x51,0xb2,0xca,0xaf,0xac,0x33,0xe3,0x58,0x35,0x65,0x17,0x18,0x55,0x3f,0xd6,0xbc,0xfc,0xa0,0x48,0x65,0x31,0x41,0x6a,0x70,0x63,0x0b,0xc2,0xdb,0x12,0xc4,0xb2,0x20,0xbc,0xde,0x53,0xc4,0x12,0xb5,0xa9,0x77,0x23,0x99,0xc8,0x9c,0xe8,0x2b,0xc6,0x46,0xc3,0x64,0xc0,0x10,0xee,0xc7,0x24,0xd1,0xfb,0xd2,0xc6,0x62
.byte 0xd2,0x7a,0x2b,0x5b,0xbb,0xfd,0x71,0xf9,0xf7,0xa7,0xb3,0xf6,0xe1,0xef,0x71,0xfc,0x5e,0xd9,0x69,0xe5,0x64,0x05,0xb1,0xcd,0x1e,0xa3,0x10,0x52,0xa3,0x95,0xf1,0x19,0xc5,0x50,0x57,0x5e,0xc8,0x76,0xd0,0xa7,0xc8,0xe7,0xa6,0x74,0x02,0x01,0x07,0x7a,0x27,0x17,0x55,0x46,0xd3,0x39,0xd5,0xea,0x12,0xc4,0x8c,0xcc,0xb8,0x13,0x8f,0x94
.byte 0xde,0x5b,0x97,0x5e,0x2a,0x75,0x6e,0x45,0x05,0x7f,0x1f,0xea,0xab,0x48,0x62,0x3e,0x75,0xd6,0x58,0x6c,0xeb,0x18,0xad,0xcd,0x1d,0x6e,0x4a,0x54,0xf1,0x49,0x05,0x4f,0x2a,0x86,0x20,0x66,0xc6,0xd5,0xfd,0xc5,0xef,0x66,0x06,0x2b,0xe6,0x19,0x81,0xb6,0xda,0xcc,0xed,0x10,0x0c,0x4f,0x05,0xcd,0x0b,0xe2,0xf7,0x89,0x73,0xc7,0x7c,0x72
.byte 0xc3,0xa4,0xf6,0xbf,0x88,0x27,0xff,0x24,0xdf,0x37,0xfb,0x86,0x9c,0x5f,0xba,0x2a,0xc1,0x5d,0x0d,0x40,0x8a,0x23,0x09,0x76,0x34,0x8e,0x6d,0x48,0x50,0xaa,0x1f,0x8b,0xfd,0x48,0xee,0xa0,0x7c,0xcf,0x45,0x42,0x0d,0x1f,0x04,0x09,0x1f,0x4b,0xe2,0x33,0xd1,0x24,0x71,0xc9,0xdc,0xd6,0xac,0x4d,0x01,0xc7,0xab,0x62,0xc1,0x42,0x99,0x5a
.byte 0x7d,0xb5,0x76,0xb5,0xf2,0xac,0x10,0x92,0xdb,0x7a,0x91,0x0b,0xd9,0xba,0x09,0x41,0x8f,0x13,0xfb,0xbf,0xdc,0x5a,0xbc,0x19,0x8d,0x92,0xa0,0xf6,0x9a,0xdb,0xde,0xbc,0xc0,0x7c,0x50,0xd2,0x8a,0x8e,0x5a,0x48,0xf5,0xf4,0x8e,0x0d,0xbe,0xfc,0x12,0xda,0xc2,0x33,0x05,0xa8,0x28,0x64,0xc3,0x14,0xc5,0xc4,0x6d,0x7c,0xa8,0x02,0xd3,0xf0
.byte 0x58,0xf6,0x80,0x7e,0xbf,0xde,0x0e,0xe9,0x96,0xac,0xd1,0x12,0xd6,0x19,0x01,0xbb,0x20,0xcb,0x4b,0x10,0x7e,0xee,0xf9,0x79,0xab,0x03,0x01,0x0d,0x51,0xa9,0x94,0x0d,0xf5,0x2c,0xe6,0xb1,0x2e,0xf9,0x58,0x44,0x12,0xe5,0xc9,0xe5,0x73,0xbf,0xdf,0x6e,0xe6,0xfa,0x76,0x07,0x8a,0x00,0x58,0x0d,0x63,0x5f,0x09,0x98,0xec,0xd6,0x04,0x80
.byte 0xb5,0x8d,0x30,0xb9,0xbd,0x99,0x80,0xb2,0xc3,0xd1,0x7e,0x15,0xfa,0xbf,0xb9,0x80,0x7e,0x5b,0xff,0xaf,0x81,0x47,0x6a,0xdc,0x39,0xb9,0xcb,0x1b,0x62,0x6f,0xbd,0xfd,0xbc,0xf7,0x42,0xf8,0x5c,0x70,0xea,0xaa,0x2a,0x6b,0x4e,0x4e,0xf3,0x8f,0x41,0x13,0x13,0xbc,0x8e,0x39,0x94,0x34,0xf1,0xb1,0x2b,0xbc,0x98,0x2d,0xf7,0xaf,0xec,0xc9
.byte 0xb4,0x2f,0x4c,0x17,0x45,0xfd,0x9f,0x3c,0x39,0xdd,0xa5,0xe0,0x65,0x7a,0x9b,0xec,0x4e,0xe1,0xc5,0x97,0xda,0xc5,0x8b,0x9a,0x1a,0xbd,0xd6,0x69,0x84,0x58,0xde,0x36,0x6a,0x66,0xce,0x70,0xe4,0x71,0x0f,0x4b,0x02,0x48,0x7f,0x37,0x98,0x93,0x4a,0x63,0x96,0x7d,0x2d,0xf6,0xb1,0x54,0x8f,0x21,0xdd,0xf7,0x45,0xaf,0x31,0x7a,0x6b,0x43
.byte 0xfb,0x38,0x92,0x48,0x29,0x93,0xcb,0x62,0x76,0x86,0x2d,0xf9,0x9d,0x73,0x3d,0x58,0xdb,0x8d,0x68,0xa9,0x98,0xa0,0xcb,0x51,0x86,0x14,0x2b,0x42,0x8b,0x00,0x2e,0x45,0x84,0x5a,0x73,0x99,0x31,0xbf,0x21,0x4e,0x71,0x0d,0xd0,0x43,0xbe,0x32,0xc5,0x35,0x3d,0xf7,0x9a,0x4f,0xf9,0x44,0xdf,0xc1,0xb4,0x9f,0x75,0x88,0xe8,0x42,0xb1,0xb1
.byte 0x49,0x2e,0x0b,0xac,0xfd,0x67,0x1d,0xc4,0x3b,0xc5,0x60,0xc7,0x61,0x44,0x0a,0x35,0xc2,0x28,0x8f,0xe8,0x95,0x44,0xf8,0xf4,0xa4,0x41,0x14,0xac,0xe0,0xf0,0x36,0x30,0xa4,0xab,0x0c,0x13,0xeb,0x86,0xdf,0x9e,0x10,0x2c,0x29,0x4a,0x7b,0xad,0xe8,0x31,0x37,0xe0,0xcb,0xcb,0x8a,0xb7,0xcb,0xee,0x68,0x32,0x1f,0x10,0xc3,0xda,0x1d,0xeb
.byte 0x3b,0x69,0x1b,0xd5,0x40,0xb4,0x3d,0x03,0x0c,0xfb,0x8d,0x1d,0x04,0xbd,0xe9,0x08,0x61,0x4c,0x0d,0x36,0x6d,0x2c,0x67,0x97,0x1c,0xc7,0x4d,0x9d,0x06,0x0e,0x3c,0x04,0x6c,0x26,0xf9,0x1e,0xde,0xb5,0x31,0x28,0x35,0xb7,0x64,0x27,0xd1,0x46,0x47,0x2e,0xff,0x15,0xf1,0x13,0x0d,0x02,0x42,0xba,0xba,0xbe,0x4b,0xf5,0x3c,0x17,0xea,0x62
.byte 0x62,0x90,0xa5,0xc7,0xb7,0x29,0xde,0xaa,0x1c,0x14,0x0d,0x6f,0x7c,0xc6,0xe0,0x68,0x5d,0xbf,0x73,0x12,0xe5,0xe3,0xdb,0x39,0x4a,0xb0,0x97,0xbc,0xee,0x3a,0x41,0x91,0xd7,0x4e,0x90,0x32,0x51,0xd7,0x34,0xea,0x97,0x12,0x8b,0xc9,0x27,0x40,0x73,0x6c,0xe9,0x9d,0x09,0x6b,0x4f,0x6f,0x85,0xdc,0x1e,0xda,0xb3,0xcf,0x27,0x46,0xcf,0x68
.byte 0x5f,0xfa,0x4c,0x95,0x5d,0x26,0xf6,0x56,0xdb,0x96,0x3e,0x4d,0x93,0x62,0xe1,0xa9,0x4b,0x7c,0xcf,0xff,0x67,0xb4,0x76,0x1f,0xaa,0x44,0xb3,0xb8,0xf1,0xf3,0x3e,0x7f,0x38,0x46,0xab,0x49,0x1c,0x2f,0x50,0x47,0xb3,0x94,0xaa,0x8b,0x18,0xbf,0x3f,0xa8,0xa6,0x27,0xb7,0x72,0xb0,0xfa,0xd6,0xb8,0xc5,0x9d,0xc0,0xe6,0x16,0x75,0xc5,0xe9
.byte 0x62,0x40,0x5b,0x0c,0x18,0x71,0x9c,0xcf,0xb7,0x77,0x02,0x03,0x94,0x20,0x23,0x45,0x8a,0xab,0x00,0x10,0x3b,0x89,0x74,0x6e,0x19,0x91,0xb9,0xcd,0x65,0x15,0x59,0xec,0x21,0x3a,0x26,0x20,0x6e,0x2d,0x98,0xa9,0x79,0x35,0xec,0x60,0x47,0x86,0xef,0x71,0x59,0x86,0x95,0x6e,0x2a,0x28,0xed,0x8a,0x68,0xfa,0xf8,0x2d,0x33,0x5c,0x2b,0x06
.byte 0x07,0x2d,0x2a,0x45,0xd7,0xcf,0x18,0xb3,0x03,0x40,0x76,0x4c,0x79,0xa4,0x13,0x96,0xf2,0x9d,0x57,0x3e,0x1d,0x39,0x9c,0xcd,0x5b,0x9e,0xad,0xdf,0x72,0x4e,0x13,0x29,0xac,0xce,0xa1,0x79,0xfb,0xc4,0x24,0xe9,0x48,0xb2,0x05,0x83,0xa8,0x37,0xb6,0xa3,0xd7,0x76,0x08,0xd4,0x90,0x05,0x87,0x05,0x66,0x60,0x8f,0x4c,0xf6,0xc9,0x8f,0x3b
.byte 0x8d,0xe0,0x4a,0x54,0xc4,0xea,0x62,0x5c,0xac,0xde,0x56,0xdd,0xa7,0x4c,0x57,0x40,0xce,0xab,0x0b,0x21,0x66,0x43,0x48,0x29,0xec,0x4e,0x89,0x0c,0x87,0x26,0x9d,0xaa,0xd8,0x26,0xea,0x29,0x44,0x12,0x0e,0xd9,0xb1,0xb8,0x7b,0x13,0x5b,0xf6,0x17,0x69,0x3c,0x97,0x09,0xd1,0xf4,0xca,0xb0,0x74,0x32,0xea,0x94,0xda,0x74,0xb7,0x2e,0xe5
.byte 0xa0,0x15,0x81,0xaf,0x4a,0x47,0x11,0xbb,0xf5,0x25,0xb0,0x13,0x83,0xde,0xdd,0xb9,0x59,0x1d,0x21,0x2d,0xff,0x5a,0x38,0x7f,0xde,0xff,0xd2,0x3f,0x51,0xdc,0x62,0x50,0x51,0xb4,0x86,0xda,0xe2,0x0f,0xc1,0xa1,0x6c,0x42,0xe5,0xcf,0x9a,0xd3,0x51,0x70,0x19,0xb7,0xd1,0x30,0xa3,0xad,0xb3,0x0e,0xcd,0x2a,0x6f,0xcc,0x44,0x65,0xc8,0x54
.byte 0x44,0x5e,0xb2,0xf8,0x81,0xec,0xb5,0xc5,0x12,0x29,0x8f,0x4f,0x66,0x98,0x1b,0x03,0x98,0x03,0x9f,0x42,0x9c,0x87,0x2c,0x7c,0x9d,0xa4,0xbf,0x3e,0x91,0x1d,0xd0,0x4b,0xea,0x6c,0x33,0x5c,0x93,0xcf,0x8c,0x9b,0xcd,0x62,0x05,0x3d,0xf4,0x42,0xba,0x0b,0x15,0x45,0x50,0x9f,0x86,0xbb,0xb6,0x60,0x03,0x5a,0xbf,0x2b,0x17,0x30,0x5b,0x39
.byte 0xfd,0x3f,0x80,0xc0,0x6a,0xee,0x36,0x82,0x09,0x28,0x10,0xd8,0x4a,0x86,0x3b,0xd9,0xaa,0x83,0xb6,0x83,0x69,0x31,0x32,0xcc,0x80,0x8a,0x79,0x23,0x60,0xf5,0x8d,0x01,0xaf,0x4e,0xe0,0x12,0xba,0xcc,0x31,0x04,0x6c,0x6a,0x8d,0x60,0xca,0xa1,0x14,0x01,0xf1,0xa3,0x7c,0x8b,0xcf,0xfa,0x3f,0x5a,0xac,0x83,0x73,0x2a,0xe4,0x31,0xb0,0x4f
.byte 0x62,0x18,0x29,0xc5,0x9a,0xdd,0x53,0xd3,0xa9,0x2a,0xc0,0x38,0x9a,0x54,0x99,0x4f,0x0f,0xf0,0x35,0x94,0x53,0x81,0xd6,0x32,0x66,0x17,0x14,0x74,0x5e,0x40,0xaf,0x4d,0x43,0x41,0x7b,0xe5,0x56,0x7b,0x30,0xbc,0x21,0x80,0x7b,0x88,0x16,0xfc,0x0b,0xb7,0x2c,0xd3,0x69,0x99,0x2d,0xb6,0xd0,0xdd,0x5b,0x87,0x4c,0xf9,0x34,0xde,0xd2,0xb1
.byte 0xb7,0xd3,0x3b,0x06,0x60,0xb2,0x73,0x7e,0xd4,0x24,0x20,0x30,0xf0,0x9c,0x15,0x05,0x03,0xf5,0xc1,0x24,0x58,0x34,0x38,0x39,0x93,0x4b,0x39,0x01,0x98,0x61,0x6e,0x01,0xd4,0xf8,0x08,0xbe,0xe1,0xbd,0x61,0xde,0x2f,0x94,0xea,0x83,0xa1,0x39,0x2f,0xe6,0x26,0x03,0x43,0xf4,0x00,0x0b,0x64,0xcc,0xcb,0xcb,0x13,0xf0,0x02,0xa3,0x93,0xf6
.byte 0xe9,0x3d,0xef,0x84,0x84,0xc3,0xb1,0x56,0x9e,0x4a,0x9c,0xea,0x94,0xce,0xae,0xa6,0xaf,0xbb,0x37,0xc1,0x63,0x06,0xa5,0x3c,0x32,0x9a,0x86,0x54,0xae,0xf4,0x6d,0x06,0x4c,0x72,0x5a,0xc3,0x28,0x35,0x1d,0xc8,0xa8,0x85,0x72,0x9e,0xaa,0x70,0x36,0x44,0xd2,0x80,0x0d,0xa0,0x42,0xfc,0xf0,0x89,0x0b,0x45,0x4e,0x79,0xc4,0x17,0x47,0x2c
.byte 0x9d,0x64,0x61,0x31,0xc0,0xcb,0x6b,0x34,0x5c,0xe7,0x45,0xea,0x6f,0x61,0x5e,0x9b,0x34,0x3a,0x6d,0xbc,0x92,0x0c,0x52,0x7e,0x4d,0x7f,0xe9,0xec,0x93,0x2e,0x76,0xbb,0x34,0x2b,0x97,0x49,0x2e,0xfb,0x5f,0x83,0xf8,0x8e,0x78,0xc8,0x18,0xb6,0x81,0x67,0x63,0xe3,0x19,0xab,0x7f,0xd3,0x86,0xbb,0x4e,0x74,0x45,0xf6,0xc3,0xbf,0xf4,0x24
.byte 0x5b,0xae,0x5b,0xa0,0x6f,0xc4,0x30,0x19,0x70,0xfb,0x71,0x37,0x8b,0x80,0xd5,0xb6,0xfc,0xb0,0x3a,0xeb,0x29,0xfd,0xcf,0xfb,0x7e,0x1f,0x94,0xdf,0x34,0xa6,0x6f,0xfe,0x45,0x96,0x7e,0xa5,0x1b,0x1c,0xd1,0x7f,0x04,0x74,0xb1,0xc3,0x85,0x26,0xea,0xa2,0x25,0x80,0x07,0x21,0x2a,0x4c,0xf6,0x21,0xf7,0xad,0x3d,0xfe,0xca,0x98,0x7f,0xad
.byte 0xd6,0x83,0xf5,0x3f,0x9d,0xf3,0x3e,0x18,0x4b,0xff,0x8c,0xd7,0x8c,0xeb,0x9b,0xf0,0xd4,0xfe,0x65,0xd3,0x0f,0x49,0xfe,0x9c,0x2f,0x09,0xfb,0xcc,0xca,0x5c,0x73,0x22,0x75,0x98,0x6e,0x94,0xb7,0xe6,0xef,0xe4,0xf8,0xc7,0x40,0xa6,0x0a,0xbc,0x0b,0x0f,0x70,0x34,0xcf,0x5e,0xb6,0x07,0x1c,0xaf,0x79,0xf5,0xf0,0x9e,0x89,0x98,0x51,0x75
.byte 0xe4,0x78,0x78,0x1b,0x32,0x65,0x5a,0x31,0xea,0x0f,0x17,0x3d,0x77,0x75,0x8e,0x99,0xd6,0x23,0xf6,0x26,0x5c,0x19,0x20,0xde,0xf7,0x64,0xdb,0xce,0x80,0x8b,0x5e,0xfc,0x64,0xf9,0x26,0xee,0xf8,0x17,0x38,0xf9,0x92,0x35,0xf1,0x9d,0x1a,0x5c,0x26,0xd9,0x9b,0x72,0x07,0x98,0xac,0xc3,0x07,0x33,0x62,0x17,0xae,0x0f,0x79,0x23,0x3d,0x1d
.byte 0x3e,0xc8,0x2f,0xc9,0xc4,0xe9,0x2c,0x64,0x9d,0xfe,0x70,0x28,0x7a,0x89,0xb7,0xa4,0xbd,0xfe,0x61,0x7b,0x64,0x6b,0xa3,0x38,0x59,0x70,0x0b,0xe6,0x6a,0x1f,0x0a,0xb5,0xcb,0xf8,0x0e,0x7a,0xb9,0x87,0x1a,0x44,0xf7,0xcd,0x20,0xcd,0x7e,0xeb,0x22,0x44,0x3f,0x5a,0x42,0xe1,0x8a,0xe4,0x22,0x13,0x2a,0xf1,0x34,0x81,0xa7,0xf8,0x76,0xfe
.byte 0x4c,0xeb,0x54,0xe3,0xe9,0xfc,0xe4,0xc5,0x68,0xf0,0x00,0x36,0x8a,0xad,0x7d,0xe5,0x16,0x7f,0xda,0xe8,0x88,0x55,0x25,0x98,0x6b,0x3c,0x3e,0xdc,0xe7,0xf3,0xe2,0x1d,0x66,0xde,0xf9,0xd8,0x08,0x25,0x81,0x4d,0xdc,0x76,0x1c,0xec,0x8b,0x13,0x83,0x47,0x8c,0x6c,0xd4,0x4e,0xce,0x28,0xdd,0x16,0x6a,0x10,0xa8,0x9b,0x21,0xce,0x70,0xfa
.byte 0xf6,0x3b,0x0e,0x8f,0x30,0x34,0xad,0xc8,0xe1,0x93,0xf6,0x2b,0xa3,0xb6,0xec,0x8c,0x65,0x03,0x34,0x20,0xba,0xea,0xac,0xad,0x11,0x47,0xa5,0x98,0xf4,0xd3,0x7f,0x53,0xa5,0xc3,0xe3,0x9f,0x6a,0xd5,0xaa,0xe2,0xf8,0x67,0xfe,0xec,0x30,0x8e,0x24,0x01,0x89,0x95,0x42,0x34,0x5b,0xfc,0x7d,0xff,0xb1,0xd4,0x5e,0x5c,0x1a,0x07,0xff,0xd1
.byte 0xd8,0x95,0x43,0x97,0xc9,0xff,0x19,0x21,0xde,0x71,0x91,0x3f,0xfa,0xde,0x00,0xe0,0x7e,0xcc,0x32,0x95,0xb5,0xcb,0x56,0x1f,0x85,0xba,0x02,0x43,0xa8,0xad,0xb2,0xfe,0xdc,0x09,0xee,0xe9,0xb4,0x5b,0x13,0xbb,0x94,0xd3,0xad,0xa2,0x6a,0x6a,0x31,0x64,0x11,0xe0,0x7c,0x36,0xb9,0x21,0x8e,0x24,0xf8,0x85,0xa3,0xe8,0xc3,0x58,0xc6,0x63
.byte 0x4c,0x4a,0x60,0x73,0x99,0xd0,0x83,0x48,0x49,0x1c,0xe9,0x52,0x56,0x51,0x02,0x12,0xc9,0xb8,0x4b,0x7b,0x13,0x83,0xd8,0x64,0xe0,0x21,0xde,0xb5,0xd1,0xe1,0x38,0x25,0x41,0xb7,0xfb,0x04,0x77,0xa0,0x76,0xd6,0x37,0xed,0xe9,0xcb,0x7a,0xae,0xd4,0xcf,0xb3,0x06,0xce,0x52,0x56,0xb8,0x41,0x35,0xf4,0x48,0x34,0xcc,0xde,0x8a,0xc2,0x0d
.byte 0x64,0x71,0xa7,0xd4,0x46,0x96,0x23,0x96,0xe9,0x5d,0x17,0x36,0x07,0xb1,0xa6,0xb3,0xda,0xc5,0x0f,0xdd,0xf2,0x35,0x14,0x40,0xab,0x05,0x08,0xf1,0xd1,0xa8,0xc0,0x1b,0xc3,0xa6,0x20,0xa5,0xea,0xd6,0xd7,0x5a,0xa4,0xec,0xa9,0x4a,0xe3,0x4a,0x66,0xc1,0xa0,0xcb,0x35,0x5e,0xc7,0x5f,0xdd,0xb6,0x0e,0xbb,0xa4,0x06,0xf9,0x43,0x8d,0x7d
.byte 0xec,0x3b,0xbb,0xd6,0x87,0xb6,0x1c,0x4c,0xd2,0x70,0x84,0x5f,0xed,0x53,0x9e,0xf5,0x9b,0x40,0xda,0xe9,0xbd,0x3f,0x70,0xa6,0x0f,0x91,0xa3,0x56,0xb2,0x83,0xb1,0x1b,0x85,0x4c,0x88,0xb8,0x81,0x37,0x43,0xdc,0x44,0x2a,0x68,0xc0,0xd9,0xc2,0xd5,0xa5,0x7f,0x09,0xab,0xa2,0x00,0x5b,0xb6,0xaf,0x41,0x40,0x65,0xe0,0x83,0x4e,0x72,0x13
.byte 0x92,0x76,0x06,0x31,0xae,0xf8,0xf6,0x31,0xcf,0x12,0xe3,0xa4,0xa3,0x25,0xc1,0xf1,0x4e,0x28,0x59,0x30,0x72,0xb8,0x33,0x69,0x47,0xd7,0x4b,0xbe,0xe8,0xc3,0x36,0xa4,0xc1,0x3d,0xfc,0x59,0xdc,0x4a,0x94,0x3d,0x63,0x08,0xe8,0x56,0xd9,0x08,0x0e,0xdb,0x74,0x57,0x38,0x58,0xcc,0x98,0x07,0x0e,0xf8,0xe5,0xf1,0x9b,0x2c,0x1b,0x35,0xe5
.byte 0xc4,0xee,0xc0,0x61,0xd8,0xc9,0x36,0xea,0x72,0x5e,0x55,0xe2,0xec,0xb0,0x1d,0x13,0xd7,0xd1,0x3f,0x11,0x2b,0x58,0xf4,0xdd,0x25,0xba,0x95,0x27,0xfd,0xdc,0x49,0x7e,0xb6,0x87,0x34,0x72,0x7d,0x21,0x8a,0x4e,0x26,0x62,0x9a,0x8a,0xd6,0xe4,0x8c,0x56,0x3f,0x19,0x0d,0x80,0xbb,0x5d,0xc5,0x73,0x56,0xf4,0x1d,0x9f,0xb0,0x8e,0x87,0x64
.byte 0x51,0xf6,0xab,0xa1,0xa5,0x8c,0xf8,0xf4,0x39,0x8e,0x34,0xbb,0x54,0x49,0x2b,0xca,0x9e,0x47,0xbe,0xb5,0xc4,0x70,0xca,0x59,0x10,0x9d,0x57,0xd5,0x7c,0x48,0xdf,0x46,0xa3,0xf0,0xfd,0x9a,0x99,0x3c,0x84,0x95,0x36,0x39,0xbb,0x41,0xd3,0xab,0x6f,0x18,0x65,0x4b,0x10,0xe6,0x80,0xd2,0xd6,0xce,0x6a,0xd7,0xf6,0xd3,0x73,0x7e,0x35,0x9f
.byte 0x7b,0xe7,0x89,0x00,0x17,0x71,0xfd,0x15,0xf2,0x85,0xa9,0x93,0xbb,0x77,0x13,0xb2,0xf4,0xbb,0x9e,0x37,0x0a,0x5d,0x4d,0x25,0x53,0x38,0xf3,0xee,0x92,0xa3,0x02,0x56,0x2a,0xb8,0x1a,0x54,0x06,0x7b,0x65,0x37,0x5c,0x90,0x39,0x3e,0x67,0x97,0x21,0xd1,0xac,0xd3,0xab,0x6e,0xa6,0x2a,0x19,0xc6,0x26,0xf8,0x12,0xc2,0xd5,0x9a,0x22,0xd8
.byte 0x9d,0x42,0x32,0x4b,0xe1,0x22,0x8c,0x3c,0x2a,0xe8,0x81,0x0d,0x05,0x87,0xce,0xf0,0x30,0x05,0x57,0xf0,0xef,0x18,0x52,0x62,0x28,0xd5,0x89,0xed,0x54,0x64,0xa4,0x1d,0x62,0x75,0x09,0x85,0x48,0x95,0xfe,0x84,0x3c,0x85,0x4e,0xa7,0x27,0x38,0x3e,0x83,0x0e,0x0c,0xfe,0xa7,0x6d,0x1e,0x2f,0x3f,0x7b,0xa5,0x44,0xc7,0xd9,0x10,0xdc,0xa9
.byte 0x27,0x16,0xda,0x75,0x49,0x12,0xde,0xa8,0x3e,0x3b,0x29,0x92,0x93,0xb1,0x0b,0xa7,0xc2,0x74,0xb4,0x0a,0x35,0xbc,0xac,0x29,0x87,0xde,0xd3,0x3f,0x73,0x4f,0xab,0x6a,0xd8,0x35,0x49,0x47,0xc7,0x07,0x85,0x53,0x48,0xe9,0x31,0xe3,0x4c,0x9f,0x64,0x5e,0xcd,0x01,0x82,0xbd,0x61,0xdc,0x47,0x82,0xc4,0x9b,0x4d,0xa4,0x6a,0xe4,0xc5,0x02
.byte 0x90,0x3f,0xd6,0x42,0x58,0xe2,0x7a,0xed,0x23,0x47,0x3e,0x93,0x6c,0xa4,0xf9,0xb8,0x60,0x5b,0x35,0xe2,0x8a,0x4d,0xdd,0x18,0x75,0xee,0x0f,0xd7,0x47,0x6a,0x9b,0x32,0xda,0x62,0x90,0x12,0x77,0x9b,0x00,0x30,0x3a,0x78,0x3d,0x70,0x30,0xde,0x5d,0x3d,0xe4,0x4f,0xef,0x9d,0x06,0x97,0x93,0x1e,0xfe,0x10,0xf7,0xd6,0x23,0x93,0x2f,0x52
.byte 0xd7,0x22,0xd0,0x45,0xe8,0x4d,0x28,0x9d,0x52,0x2f,0x11,0x64,0x0e,0x99,0xa3,0x40,0x93,0x3a,0x02,0xf9,0x4c,0xee,0xd9,0x59,0x33,0x0b,0x06,0xef,0xda,0x0c,0x35,0x74,0xfe,0x42,0x34,0xdd,0x64,0xf0,0x08,0x46,0x92,0xc4,0x40,0x12,0x58,0x3f,0xa9,0x2e,0x72,0x25,0x93,0xdf,0x39,0xe1,0x8d,0xb5,0x1a,0xf8,0xe0,0x70,0x8b,0x38,0x12,0xc0
.byte 0xa2,0x2e,0xa2,0x4e,0x33,0x82,0x6f,0xe4,0xe0,0xf3,0x91,0x5c,0x79,0x23,0xf4,0x05,0x77,0x09,0x0b,0x78,0x29,0x85,0x1b,0x99,0xa4,0xc5,0x6c,0x90,0xb3,0x2c,0xb6,0x79,0xe7,0xa8,0xe5,0xa8,0x5a,0xd5,0x10,0xc7,0xca,0x12,0x84,0x18,0x37,0x83,0x79,0x5a,0xa2,0x9d,0xd4,0xe8,0xc0,0xd2,0x88,0xf9,0x24,0x87,0x18,0x0e,0x8c,0x28,0xd6,0x8f
.byte 0x58,0x50,0x10,0xcc,0x1d,0x20,0x76,0x8d,0x1a,0xf0,0x2a,0x99,0xa3,0x81,0xb6,0xa8,0x88,0x3d,0xcf,0xc0,0x60,0xc4,0x44,0xb7,0x04,0xb6,0x2a,0x18,0xf5,0xf4,0x63,0xf9,0x7d,0x64,0x93,0x98,0xcf,0x48,0x80,0xc6,0xdc,0xf6,0x39,0x0c,0x62,0x85,0x51,0xea,0xe2,0x4c,0x9f,0x82,0x5e,0x89,0x39,0xd7,0x97,0x72,0x34,0x36,0x98,0xad,0x79,0x65
.byte 0x56,0x22,0x59,0xe9,0x9f,0x4d,0x05,0x04,0x6a,0xc7,0xde,0x2b,0x61,0xe1,0xe0,0x05,0x49,0xb8,0xc7,0x4c,0x08,0x92,0xf5,0xdc,0x2f,0xc0,0x66,0x40,0x35,0xdb,0xab,0x1a,0xfb,0xbb,0x5c,0xe1,0x83,0xc9,0x88,0x4c,0xa0,0x65,0x8f,0x25,0xb6,0x15,0x93,0x11,0xbc,0x32,0x45,0x22,0x52,0x62,0x4d,0xc0,0xc1,0xb1,0xc3,0x60,0x65,0xda,0xf9,0x09
.byte 0x52,0xe7,0x9c,0xcf,0x75,0x28,0x37,0x30,0x06,0xdf,0x3b,0x63,0x30,0x06,0x27,0x28,0xea,0x48,0x76,0x10,0x9b,0x69,0x99,0x99,0xd5,0x9b,0x0b,0x01,0x57,0xdb,0xdb,0x50,0x6d,0x54,0xf3,0x52,0xf6,0x9b,0x02,0x2d,0x10,0x70,0x37,0x37,0xbe,0x07,0x44,0xc5,0xd0,0xa5,0x1b,0x3d,0x42,0xba,0xeb,0x4a,0x87,0xdf,0x36,0x1e,0xe3,0x9d,0x77,0x63
.byte 0xc7,0xd5,0x97,0xdf,0x24,0x95,0x6f,0xf3,0x94,0xc6,0xb1,0xf1,0xc7,0x60,0x3e,0x98,0x74,0x63,0x24,0x9c,0xb9,0x5f,0x04,0x41,0xbf,0x7c,0xf4,0x6d,0x20,0x30,0x6b,0xde,0x1b,0x01,0x31,0x05,0x33,0x10,0xb1,0xec,0x9d,0x2f,0xfe,0xe9,0x8c,0x1a,0x04,0x24,0x14,0x71,0x11,0xcc,0x21,0x30,0x27,0x3e,0x9c,0x98,0x88,0xfa,0x7b,0xd5,0xe2,0x43
.byte 0x1f,0x61,0xd7,0x57,0x66,0x0c,0x34,0x7a,0x1d,0x96,0x06,0x90,0x7b,0xca,0xf1,0x01,0x1e,0x20,0x6d,0x1e,0x19,0x1e,0x5f,0xde,0xe2,0xaa,0xfb,0x9c,0xd9,0x00,0x65,0x2b,0x90,0x02,0x9a,0x84,0x66,0xd7,0x7f,0x65,0x3f,0x03,0xf2,0x03,0xf3,0xd8,0x17,0xda,0xf9,0x04,0x82,0x11,0x72,0x90,0x0c,0x44,0x6d,0xde,0x51,0xae,0xa5,0xaf,0x19,0x50
.byte 0xc5,0x41,0x5d,0x05,0xb4,0x9f,0x48,0x20,0xbe,0x7d,0x48,0xb7,0xda,0x1f,0x90,0x77,0xe3,0x53,0x25,0xc7,0xed,0x3b,0x85,0xa5,0x7e,0x4d,0xe8,0x1f,0xa3,0x6f,0x2f,0x72,0x92,0x1f,0xe5,0x7c,0x34,0xcb,0xbc,0xd7,0xbf,0x01,0x20,0x9d,0xc6,0x7e,0xec,0x6d,0x51,0xf7,0x6d,0xd8,0xe6,0xb8,0xbe,0x32,0x8e,0x65,0xaf,0xea,0xae,0xcb,0x03,0x74
.byte 0x1f,0xb6,0x7a,0xdf,0xfc,0xcf,0x19,0xcf,0x75,0x3d,0xd6,0xda,0xee,0xf7,0xde,0xcf,0x1d,0xc2,0xbb,0x2e,0x30,0xf0,0x3d,0xda,0x18,0xaf,0xcd,0x7f,0x06,0x17,0xea,0x7f,0x4d,0xda,0x9b,0x9a,0xcb,0xcd,0x4d,0x3d,0x6b,0xb2,0x57,0x4e,0x8b,0x0e,0x5f,0x6b,0x58,0x13,0x6b,0xef,0x2e,0x66,0x26,0x0d,0x6b,0xd8,0xf8,0xbe,0x83,0xc9,0xd0,0x48
.byte 0xed,0xe4,0x03,0x05,0x81,0x13,0x82,0x64,0x9e,0x5c,0xc9,0xaf,0x84,0x90,0xd5,0x4b,0xec,0x02,0x1c,0xcd,0x32,0x3f,0x0b,0xc6,0x39,0x2c,0xcf,0xf7,0x86,0xbd,0xc0,0x06,0xe8,0x75,0x4b,0x45,0xa8,0x47,0xfc,0x19,0x6b,0x93,0x87,0xb3,0x4a,0x80,0x18,0xcd,0xba,0x1e,0x05,0xf6,0x16,0xb5,0xae,0xbd,0x40,0xd0,0xf1,0xd5,0xe9,0x0c,0xf5,0x89
.byte 0x0c,0x6f,0x9c,0x4e,0x75,0x72,0x48,0x7a,0x00,0x78,0xcb,0xf8,0xd7,0xce,0xb8,0x85,0xa6,0x62,0x6d,0x38,0x9c,0x83,0x64,0x03,0x4e,0xee,0xe6,0x62,0xe4,0x2a,0x40,0x86,0x99,0x62,0x76,0x0e,0x43,0x02,0x70,0x78,0x2d,0xa4,0xb5,0x6c,0x87,0x43,0xcc,0x04,0x4b,0xf5,0x46,0xdc,0x79,0x55,0x7e,0x27,0x0a,0x22,0x5a,0x2c,0x53,0xc3,0x23,0x48
.byte 0x17,0x16,0x44,0xf0,0x1d,0x40,0xa2,0x10,0x13,0x5d,0x44,0x54,0x14,0x77,0x6f,0x04,0xa2,0xa7,0x08,0x92,0xaa,0xd5,0x82,0xb4,0x74,0xa7,0xe1,0xe4,0x17,0x5e,0x9c,0x9c,0x88,0xab,0x24,0x9e,0x60,0xe7,0xe8,0xb2,0xf3,0x11,0x28,0xa9,0x9e,0x5f,0x21,0x14,0xe3,0x4d,0xc3,0x29,0xd2,0xc6,0x84,0x17,0x1b,0xa3,0x65,0x6d,0x4e,0x93,0xc7,0x61
.byte 0x30,0x53,0xd9,0x6b,0xc0,0x82,0xf4,0x7e,0xf4,0x79,0xff,0x59,0x06,0x6e,0xe1,0xea,0x45,0x3c,0x0f,0xfe,0x89,0x0d,0xa1,0x5e,0xbc,0x98,0x0c,0x0e,0xb9,0x21,0xc3,0xe8,0xd2,0xf1,0xd9,0x90,0x3c,0x9c,0xee,0x89,0xbd,0xb2,0xa6,0x21,0xfd,0xfc,0x1a,0xd2,0x3e,0x05,0xc5,0xb5,0x92,0xb1,0xb8,0xf2,0xab,0xb8,0x19,0x2b,0x83,0x80,0x8c,0xda
.byte 0x43,0xef,0x16,0xef,0xed,0x15,0xe4,0x62,0xab,0x31,0x55,0x29,0xd5,0x2b,0xad,0x3b,0xb6,0x5a,0xc3,0x72,0x25,0x0c,0xfd,0x54,0x9e,0x4e,0x34,0x6f,0x77,0x6c,0x80,0x85,0x4a,0x7c,0xe3,0xb0,0x36,0x59,0x6b,0x3c,0xd9,0xf9,0x44,0x65,0xb6,0x4f,0x99,0x54,0xa4,0x73,0xef,0x4a,0xa8,0x41,0xab,0x66,0x42,0xfb,0x0e,0x3d,0x6f,0x8d,0xed,0x98
.byte 0x8f,0xdb,0xa1,0x51,0x5b,0xdc,0x16,0xc9,0x38,0xbf,0x07,0x1c,0x6d,0xb0,0x1f,0x23,0x3f,0xc5,0x9d,0xc4,0x6c,0xcf,0xd5,0xad,0x7d,0x8c,0xc6,0x59,0xe1,0x7d,0x65,0x0c,0x7c,0xd1,0x57,0x4b,0x92,0x30,0xe8,0xcd,0x81,0x4f,0xba,0x49,0xcc,0xb4,0x54,0xe8,0xc4,0x1e,0x73,0x3b,0x86,0x4f,0xfb,0x4d,0xcd,0xbc,0x13,0x8c,0x64,0x3d,0xdd,0xd5
.byte 0xed,0xb0,0xd3,0xdd,0x4f,0x1b,0x53,0xeb,0xc7,0x20,0xac,0xcd,0x69,0xa6,0xf0,0xfd,0xe5,0xfc,0xe6,0x68,0x17,0xcc,0xa9,0x97,0x44,0xe4,0x56,0x14,0xc6,0xa3,0x89,0xc0,0x0e,0xaa,0x64,0xd0,0x6b,0xbb,0xd3,0xcc,0xca,0xf2,0xe0,0x13,0x1a,0x46,0x39,0x71,0x60,0x91,0xe1,0xda,0x63,0xb5,0xd3,0xd9,0x02,0xa1,0x4d,0xc0,0x4d,0xc6,0x25,0xf8
.byte 0x8a,0xc5,0xf3,0x9c,0x64,0x74,0xb8,0xbf,0x31,0x4a,0xb6,0xbe,0xd3,0x63,0x5e,0x3f,0xce,0x57,0x37,0x43,0xff,0xb9,0x84,0xdc,0x6b,0x8d,0xfc,0xe3,0x7c,0x01,0x2a,0x81,0x2b,0x8c,0x78,0xf4,0x7e,0xe4,0x80,0x26,0xc5,0xd8,0x01,0x87,0x3f,0xe3,0x33,0x46,0x96,0x67,0xda,0x9c,0x2b,0x41,0x3e,0x9a,0x3e,0x51,0xef,0x63,0x73,0x36,0x4e,0x30
.byte 0x65,0x37,0xd1,0xb2,0x50,0xad,0xa7,0xf1,0xca,0x5b,0x11,0xeb,0x56,0x23,0xee,0x65,0x1d,0x5d,0x08,0x68,0x0f,0xb9,0xcf,0xca,0x16,0x7b,0x02,0xf0,0x47,0xe5,0x99,0x14,0xa0,0x67,0xf3,0xfc,0x86,0xf9,0x82,0xdf,0x20,0xd4,0xf9,0x7c,0x4d,0x08,0x06,0x0f,0x1a,0x9d,0x11,0x08,0x13,0xfd,0xb5,0xc5,0x3f,0xff,0xce,0xcf,0x68,0x5f,0xe8,0xae
.byte 0x3e,0x9d,0x04,0x94,0xde,0xe2,0x49,0x45,0x6c,0xd7,0xb0,0x79,0xbd,0xc3,0xba,0xb8,0x58,0xbf,0x4f,0x0f,0x56,0xb5,0x39,0x92,0x36,0xd9,0x8e,0x7e,0xac,0x4d,0x9c,0xf9,0x30,0x97,0x71,0xcd,0x1b,0x40,0xf5,0xb8,0xb3,0xeb,0x33,0xf7,0xd9,0xde,0xb3,0x1c,0x7a,0xe1,0xda,0x00,0x43,0xe3,0x17,0x40,0x80,0x49,0x42,0x64,0xe9,0xf6,0x7e,0xe9
.byte 0xeb,0xc7,0xcd,0xf2,0x5e,0xcf,0xfd,0x60,0x08,0xd4,0x13,0x48,0xa9,0x4d,0x38,0xc9,0x14,0x48,0x98,0xef,0x74,0x50,0xa0,0xe4,0x2c,0xdb,0xba,0xb3,0x9a,0xbc,0xd1,0xc6,0x36,0xc3,0x5e,0xa7,0x8e,0xec,0x38,0x8d,0x95,0x32,0x8c,0x90,0x48,0xe0,0x26,0x81,0xe9,0xe3,0xfb,0xdb,0xbf,0x61,0x4f,0xa4,0x69,0x2e,0x57,0x90,0x9b,0xb2,0x0a,0x91
.byte 0x59,0x0b,0x83,0xed,0x15,0x3c,0xad,0xdf,0x99,0x59,0xc6,0x2f,0x8a,0xc6,0xcf,0xb4,0x3f,0xef,0x6e,0xe7,0x03,0x8a,0x95,0x34,0x32,0xbd,0xb4,0xda,0x23,0x64,0xae,0x5b,0xcf,0x95,0xa7,0x8d,0x55,0xd2,0x8c,0x3f,0x0a,0xcb,0x43,0x9f,0xf2,0xf2,0xa7,0x53,0xcd,0x7b,0xa7,0xa3,0x63,0x6d,0xae,0x87,0xec,0x01,0x19,0x6f,0x30,0x32,0x88,0xaf
.byte 0xda,0x33,0x09,0xc7,0xf3,0x04,0xed,0xb9,0xc4,0x26,0x5e,0x59,0x9a,0x36,0xc6,0xb0,0x48,0x3b,0x6f,0x47,0x77,0x9e,0xaa,0x65,0x4b,0x3b,0xad,0x61,0x83,0x9a,0x60,0xb0,0xd3,0x1a,0x3a,0x75,0x60,0x6a,0x97,0x48,0xb5,0xc4,0x52,0x7f,0x21,0xef,0x81,0x56,0xc8,0x5c,0x45,0x38,0x32,0xa9,0x01,0xc3,0xdb,0xc3,0x3a,0xcf,0xa6,0x0d,0xcd,0x8b
.byte 0x05,0xf8,0x8a,0x9b,0xca,0x54,0x5c,0x54,0x9b,0x34,0x04,0x79,0x22,0xdc,0xe4,0x02,0x8f,0x8c,0x90,0x62,0xd6,0x4e,0xb2,0x25,0xfd,0xab,0x73,0xcc,0xa8,0x4b,0x2a,0xf8,0x2f,0x95,0x94,0x53,0x1f,0xf4,0x7c,0x5a,0x47,0xaa,0x36,0xfa,0xba,0xcd,0x00,0x69,0xa1,0xdb,0x55,0xbd,0x2f,0xb9,0x2b,0x17,0x04,0x6b,0x54,0xe1,0x5d,0xa6,0x63,0x81
.byte 0x2e,0x70,0x73,0xff,0x00,0xdf,0xa7,0x26,0x1d,0x7b,0x18,0xdb,0x49,0xbe,0xaa,0x87,0x91,0x0c,0xbb,0xed,0x87,0x8e,0x55,0x8b,0x3c,0x70,0x95,0x31,0xd2,0x1f,0x15,0x65,0xaa,0x5f,0xe0,0xb2,0x14,0x03,0x2f,0x99,0xff,0xaa,0xfe,0x83,0x5b,0x4c,0xdb,0xa9,0xce,0x28,0x78,0x71,0xf2,0x2e,0x1b,0x6f,0xa8,0x53,0x0b,0xa3,0x8f,0x9e,0xb0,0xd1
.byte 0x94,0xed,0x24,0x0c,0x5d,0xa6,0xf8,0x06,0xd6,0xf1,0xb5,0x3d,0x59,0x4f,0x6a,0x87,0x23,0xc9,0x75,0xb5,0x84,0xee,0xb0,0x23,0x43,0x3e,0x77,0x66,0x73,0x7c,0x8f,0xe4,0x1d,0x79,0x34,0x6d,0x11,0xfa,0xd8,0xe3,0x28,0xa0,0x25,0x91,0x73,0x18,0xec,0xb7,0x67,0xa6,0x02,0xa0,0x3f,0xac,0x02,0x13,0x09,0xfa,0xca,0x7f,0xea,0x46,0xaf,0x10
.byte 0x61,0x15,0xf2,0x53,0xec,0xe3,0xb3,0x8b,0x0b,0xac,0x4c,0xbb,0x57,0x28,0x40,0x7b,0xef,0xf6,0x40,0xf1,0x2b,0xaa,0xe7,0x28,0xad,0xf6,0x95,0xca,0x1f,0x10,0x0e,0x8e,0xc8,0x79,0xfb,0xa8,0x92,0x25,0xfd,0xdb,0x0e,0x23,0x11,0x56,0xa9,0x94,0x01,0xa6,0xa3,0x02,0x74,0xd3,0xdd,0x38,0x27,0x33,0x03,0xb6,0x60,0x10,0x37,0x31,0xa8,0xd7
.byte 0x0b,0x01,0x9f,0xe4,0xbe,0x0e,0xb9,0x87,0xb5,0x91,0x6f,0xc7,0xd6,0x02,0x6f,0x8e,0xba,0x89,0x9a,0xd3,0x55,0x7c,0x04,0x10,0x92,0xa9,0xe4,0x50,0xfb,0x4a,0x60,0xca,0xc7,0x87,0x02,0x34,0x43,0xc3,0x14,0x98,0x62,0x3f,0xea,0x94,0x92,0x70,0xd8,0x91,0xe5,0xf7,0xdc,0x91,0x4b,0xb7,0xfc,0x6c,0x7f,0xb6,0x55,0xfb,0x91,0xdf,0x91,0x2e
.byte 0x22,0x89,0xbb,0xf3,0x5f,0xb3,0x15,0x33,0x1e,0x8f,0x0a,0x98,0x28,0x61,0x15,0x0a,0x3b,0x0a,0xd1,0x21,0x85,0xfd,0x60,0x9a,0x51,0x5a,0x05,0x4f,0x57,0x59,0xdf,0xda,0x9f,0x08,0xe4,0xe1,0x0e,0xee,0x7b,0x3a,0x71,0x05,0x0b,0xad,0xb0,0xd1,0xbb,0x5b,0xe3,0x05,0xe6,0x25,0x42,0xf4,0x82,0x4d,0x5f,0x1d,0x23,0xe6,0x16,0xc8,0x60,0x20
.byte 0x37,0x27,0xca,0x65,0xe7,0x12,0xa8,0x0b,0xbc,0x37,0x93,0xe9,0xec,0xae,0x98,0x17,0xd1,0x96,0xe7,0xfe,0xf6,0xda,0x18,0x40,0xab,0x81,0x38,0x6e,0x83,0xcd,0x49,0x3c,0xe5,0xcc,0xf6,0x97,0x45,0xf9,0x4d,0x31,0x33,0x40,0xf2,0x07,0xef,0xae,0x9b,0x1f,0xab,0xde,0x07,0xb9,0xa1,0x43,0x86,0x80,0xd0,0x54,0xb1,0x44,0xce,0x91,0xaf,0x0c
.byte 0xdc,0xa7,0x83,0xda,0x73,0x44,0xb2,0x5c,0xe2,0xf0,0xf5,0x88,0x95,0xe1,0x36,0xcb,0x37,0x0a,0x61,0x6d,0x56,0x69,0xdf,0x95,0x79,0x97,0xb0,0x86,0x8b,0x96,0xbf,0xe8,0x89,0xfc,0x8f,0xc9,0x41,0xe3,0xe4,0xd3,0xf0,0xed,0xd1,0x97,0xd1,0x5e,0xa8,0xcf,0x71,0x4d,0xd5,0x72,0xd0,0x94,0x48,0x86,0xba,0x0d,0x6c,0xe0,0xf1,0x81,0x74,0x6a
.byte 0x0d,0x75,0xc8,0xd3,0xbc,0xd8,0x8d,0xa9,0xf5,0x44,0xc2,0x5f,0x45,0xa7,0xd1,0x9a,0xd1,0x5a,0xc7,0x39,0x9a,0x62,0x0d,0x85,0xba,0x25,0xa7,0xf4,0xcc,0x24,0xe0,0x02,0xdf,0x50,0xab,0xea,0x2f,0xc3,0x0d,0x7d,0xce,0x15,0x9d,0x8c,0x6c,0x16,0x4f,0xde,0x72,0xb2,0x40,0xef,0x9c,0x36,0xcf,0xeb,0x3b,0x17,0x88,0xd5,0xc1,0x3e,0x35,0x8b
.byte 0xa3,0xe6,0x38,0xfd,0xac,0x9b,0x15,0x3c,0x8c,0x34,0x31,0x7b,0x47,0x31,0x06,0x1f,0xfc,0x23,0x34,0xa9,0x2d,0x7b,0x0a,0xe6,0x17,0xbf,0x2c,0x1d,0xf6,0xd3,0xa4,0xcf,0x47,0x63,0x58,0x83,0x63,0xcf,0xc1,0x57,0x01,0xb7,0xe6,0x4c,0xe5,0x7b,0xc6,0x40,0xa9,0x18,0x1c,0xc0,0x3c,0xca,0x87,0xd5,0xf7,0x72,0xe5,0xc6,0x24,0x4b,0xc6,0x06
.byte 0x60,0x50,0x5b,0x36,0x66,0x47,0x28,0xdc,0x4a,0xea,0x2d,0x6a,0x8f,0x1e,0xfe,0x26,0xdd,0x76,0xb4,0x33,0x20,0x90,0x3f,0x0c,0xa8,0xaa,0x12,0x80,0x72,0x0a,0x9c,0xe1,0x95,0xb1,0x9c,0xbb,0xdd,0x66,0x04,0xa9,0x3b,0xad,0xc4,0xaa,0xd0,0x38,0xb0,0x62,0x8b,0x12,0x60,0x7f,0x73,0x67,0x2e,0xb8,0x85,0xfd,0x61,0x37,0xa6,0xdf,0xa7,0x9e
.byte 0x3d,0x98,0xe2,0xc2,0x2d,0xff,0x56,0x4f,0x9b,0x96,0x2d,0x21,0xca,0xc8,0x4c,0x75,0x2d,0xac,0x3b,0x2d,0x73,0x2e,0xe3,0xe8,0x6a,0x98,0x86,0x39,0x25,0x7f,0x08,0x44,0x31,0x35,0x8c,0x43,0xbc,0xf7,0x12,0xd8,0x3e,0x3a,0x9e,0xe7,0x2a,0xf9,0x49,0x96,0x95,0x14,0xb2,0xa9,0xb3,0x85,0x46,0x43,0x3b,0x31,0x37,0xe9,0xf3,0x93,0x3e,0x7e
.byte 0xba,0x13,0x28,0x8a,0x67,0x16,0x8f,0x5e,0x4a,0xe5,0x52,0x67,0xdc,0x86,0xab,0x26,0x6d,0x23,0x25,0xb3,0xa3,0x46,0x29,0x73,0x72,0x38,0x7b,0x4a,0xe1,0xa7,0xeb,0x18,0xd1,0xdd,0xa1,0xe6,0xcd,0x00,0xdf,0x72,0x93,0xea,0xae,0xf2,0x27,0x49,0x01,0xdc,0x9d,0xc7,0xbd,0x4e,0xd5,0x7f,0x88,0x50,0xa8,0x3d,0xc3,0xb7,0x10,0xee,0x3f,0xe2
.byte 0x87,0xc2,0x95,0x48,0xdb,0xf0,0x95,0x8e,0xac,0x9d,0xde,0x3e,0xe6,0x4a,0xc6,0xe5,0x42,0xab,0x10,0xc2,0xd9,0xc6,0x43,0x9b,0xeb,0xd9,0xa6,0x39,0x86,0xfb,0x9a,0x3b,0x33,0x31,0x19,0x7e,0x8b,0x77,0x2f,0x75,0x53,0x63,0xbd,0xa3,0x84,0x8a,0xb9,0x09,0xcd,0x2e,0x58,0x75,0xcb,0x40,0x87,0xc9,0x7f,0x66,0x30,0x9f,0x21,0xb5,0x42,0x44
.byte 0x7f,0xcc,0x89,0x0b,0x01,0x8a,0x8f,0x5d,0x83,0x12,0x65,0x19,0x4f,0xd9,0x50,0x14,0x3a,0x42,0xaf,0xa2,0x75,0x91,0x6b,0xc5,0x15,0xb3,0x6f,0x3b,0x4f,0xdf,0xd9,0xe3,0x67,0xf0,0x0d,0x5b,0x0e,0x45,0x25,0xd3,0x01,0x7e,0x7f,0xc9,0x32,0x46,0xb6,0xd0,0x15,0x2e,0xfa,0xdf,0x5c,0xa4,0x2d,0x73,0x19,0x49,0xed,0xdb,0x09,0xde,0x7f,0x6b
.byte 0x2e,0xce,0xa5,0xeb,0x0b,0xc9,0xf6,0x03,0x6f,0x52,0x2e,0x01,0xab,0x09,0xd5,0x0c,0x74,0x2b,0x73,0x9a,0xf1,0xe7,0x3f,0x5d,0xdb,0x15,0x8e,0x36,0x1f,0x88,0x42,0xdb,0x49,0xd8,0xcf,0x0c,0x63,0x3a,0x60,0x0b,0x10,0xa2,0xbf,0xc1,0xb0,0x7c,0x91,0xf5,0x16,0x9b,0x66,0x3e,0x41,0x03,0x5e,0x5a,0x8e,0x0f,0x98,0x34,0x44,0x5b,0xde,0x1a
.byte 0x74,0xff,0x47,0xc8,0x27,0xdf,0x01,0xc2,0x94,0xce,0x38,0xbc,0x06,0xb9,0xef,0x93,0xd2,0x55,0x6e,0x4a,0x45,0xfb,0x42,0xd0,0xc1,0xac,0x0c,0xae,0xfb,0x76,0x2d,0xb4,0xcd,0x33,0x33,0x53,0xcc,0xd4,0x41,0xab,0x99,0xaf,0xbe,0x26,0x05,0x77,0x43,0xfc,0x3d,0xf2,0x70,0xea,0x44,0xf8,0x21,0x67,0xad,0x4b,0xfe,0xce,0xca,0x35,0x02,0x1c
.byte 0xd1,0xec,0xa5,0x5f,0xc6,0xe0,0x54,0xca,0xf7,0x8f,0xaf,0x8b,0xc1,0xe5,0x87,0x90,0x0e,0x6b,0x5f,0xf4,0x07,0xe9,0xb5,0x66,0xd8,0x89,0x12,0x32,0x9c,0x62,0x7d,0x4a,0x84,0x27,0xb1,0xd7,0x01,0x68,0x84,0x94,0x85,0xa4,0x9e,0xba,0x9c,0x29,0x5a,0x1c,0xb6,0x3c,0xeb,0x5b,0x82,0x2d,0xec,0x12,0x73,0x4f,0x1f,0x78,0xa2,0xc5,0x84,0xfb
.byte 0x1c,0xfa,0xdb,0x7d,0xd8,0x4e,0xd5,0x37,0xc5,0x70,0xe1,0x09,0x05,0xc7,0xfe,0x9d,0xe5,0x3d,0x64,0x9c,0xf9,0xce,0x74,0x4c,0xac,0xaf,0x35,0xd0,0x5e,0xac,0x3d,0x11,0x81,0x96,0x31,0x0b,0x46,0x66,0x1c,0x72,0xbf,0x7e,0x0d,0xc9,0xb6,0x61,0x06,0xd2,0x7e,0x23,0xfe,0xc1,0xaa,0x62,0x96,0x03,0x72,0x72,0x4b,0xca,0x9e,0x17,0xdc,0xdc
.byte 0x31,0xd7,0x68,0xaf,0xb9,0xc7,0xb7,0x4a,0x6c,0x15,0xca,0x1f,0x43,0x76,0xcf,0x1a,0xcd,0xbd,0x2e,0xf5,0xe7,0xd5,0x2e,0x0d,0x6e,0x59,0xf8,0xc8,0x35,0x78,0x23,0x82,0xbe,0x70,0x0f,0x40,0xc0,0x55,0x8a,0x08,0x81,0xf1,0x74,0xd2,0x37,0x5d,0xe9,0x22,0xff,0x18,0x1d,0x9f,0x2e,0x98,0xe0,0x97,0x09,0x18,0x62,0xe8,0x2a,0x10,0xfc,0x28
.byte 0x7c,0x27,0xe9,0x0f,0x86,0xf6,0xc0,0xe5,0xeb,0x45,0x5a,0xd9,0x81,0x25,0x0d,0x06,0x54,0xdf,0xde,0x46,0xd3,0x6e,0x08,0x69,0xf9,0x76,0x63,0x66,0x9d,0xfb,0x9c,0xca,0xb2,0x32,0x08,0x96,0x7f,0xab,0xa0,0x65,0xf0,0xac,0x1e,0xce,0x74,0x63,0xaf,0x1b,0xf3,0xdc,0x12,0x0c,0x59,0x86,0xbe,0x74,0xc6,0x80,0x66,0x74,0x78,0x9c,0x0c,0x1e
.byte 0x6e,0xf6,0xdf,0x39,0x79,0xfb,0x8e,0x8c,0x28,0x85,0x6f,0xfc,0x16,0xb0,0x39,0xea,0x67,0xf6,0x1c,0x41,0x10,0x90,0x0f,0x80,0x63,0x84,0x04,0xaa,0x6e,0x8e,0xfa,0xe2,0x2b,0x5c,0xa7,0x52,0x43,0x93,0xa5,0x16,0xd6,0x6c,0x9c,0x07,0x25,0xd8,0xa3,0xd5,0xb0,0xba,0x2a,0xd3,0xea,0xdc,0x9b,0xb6,0xc1,0x07,0x7d,0xd0,0xb5,0x28,0x52,0xdc
.byte 0x1b,0xf7,0xeb,0xb0,0x5b,0xd2,0x20,0x0b,0xab,0xf5,0x96,0x83,0x3f,0x2b,0x7d,0xab,0x7e,0x61,0x13,0x7e,0xd8,0x07,0x2b,0xee,0xbe,0xe7,0x78,0x66,0xec,0x7d,0xc2,0xfd,0x41,0xd8,0x18,0x8b,0x8b,0x3b,0x46,0x9d,0xc8,0xd6,0xe7,0x75,0xc2,0x2d,0xf3,0xdb,0x20,0x2d,0x8c,0x8e,0x74,0xf4,0xe2,0x69,0xad,0xde,0x99,0x0b,0xf1,0xaa,0xa1,0x57
.byte 0xb0,0xd9,0x4e,0x0e,0xf5,0xfc,0x8a,0xf2,0xff,0xf2,0xbc,0xdb,0xf4,0x8b,0xff,0xf0,0xd9,0x20,0x5f,0x0f,0x80,0x43,0xaa,0x1d,0x76,0x3c,0x7d,0xad,0xf3,0x93,0x6b,0xab,0xd3,0x8d,0x35,0x1c,0x03,0xe0,0x76,0x25,0xa8,0x1f,0xdb,0x19,0x48,0x8c,0x33,0x21,0xae,0x34,0xae,0x34,0x54,0xe2,0x42,0x66,0x67,0xdb,0x90,0x21,0x46,0x16,0x1a,0xac
.byte 0xf6,0x4f,0x77,0x66,0x50,0x52,0x68,0x80,0xeb,0x79,0x27,0xb1,0x24,0x81,0x75,0xde,0xe4,0x13,0x0c,0xff,0xd0,0xed,0x0a,0x98,0x04,0x70,0x05,0x2e,0xd9,0x67,0x4c,0x4e,0x93,0x49,0x08,0xb4,0x97,0x3e,0xc1,0x7c,0xc3,0xc1,0x42,0x40,0x69,0x53,0xd6,0x90,0xf5,0x85,0x39,0xa4,0x8d,0x8f,0xd2,0xf1,0x50,0x87,0x10,0x3e,0x5b,0x86,0xb3,0xd6
.byte 0xee,0x60,0x05,0x4c,0x83,0x9f,0x27,0xa9,0xfc,0x1e,0x67,0xa5,0x68,0x02,0xc7,0xe0,0xc5,0x58,0x60,0x68,0x5f,0x59,0xb9,0x8f,0x91,0x5b,0xa0,0xe5,0xf8,0xca,0x95,0x69,0xeb,0x0a,0xdb,0x87,0xd5,0x61,0xca,0x48,0xa0,0x1a,0xdc,0x96,0x02,0xd1,0x86,0x41,0xce,0xe8,0xa8,0xcd,0x24,0x36,0x9a,0x31,0x0e,0x9f,0xbf,0xc1,0x9e,0x85,0x2f,0x64
.byte 0xff,0xa8,0xb5,0xe1,0xef,0x16,0x1e,0xcd,0x93,0x7e,0x30,0x28,0x97,0x7d,0x59,0x30,0x4f,0x24,0x40,0x51,0x31,0x32,0xde,0x7b,0x1e,0x72,0x0e,0x91,0x95,0xa2,0x3f,0x87,0x49,0xb1,0x82,0xaf,0x66,0x0a,0x54,0x92,0xe9,0x5c,0x3d,0xfe,0x47,0xcf,0x27,0xf6,0x0d,0xd1,0x69,0x97,0x89,0x62,0xea,0xdb,0x44,0x39,0xf4,0x36,0x73,0x31,0x79,0xcb
.byte 0x73,0x16,0x80,0x2d,0x49,0x8a,0x97,0x87,0xda,0x38,0x64,0xd9,0xc3,0x6f,0x4f,0x9b,0xa3,0xf2,0x9a,0xcd,0x2f,0xca,0x7e,0x5f,0xf7,0xf7,0x66,0xc5,0xb7,0x25,0x8d,0x9f,0xf4,0x5a,0x96,0x97,0x7c,0xd3,0x15,0xd8,0x3b,0x12,0xbd,0x09,0xf0,0x0d,0xc9,0x05,0x28,0x6b,0x43,0x62,0x3e,0x58,0x2f,0x8f,0x97,0xe7,0x72,0x8b,0x94,0x62,0xd0,0x3a
.byte 0x64,0x30,0x2c,0x4d,0xd2,0xa7,0x12,0x90,0x27,0x17,0x57,0xf7,0xc8,0x8b,0x9d,0xb5,0x89,0x3e,0xb8,0x69,0x3c,0x68,0x21,0xc9,0xfa,0xed,0x83,0x22,0x89,0x70,0x64,0x0f,0xd5,0x3c,0x5c,0x9f,0xea,0x68,0x59,0xfc,0x18,0x56,0x6d,0x91,0xe7,0x8c,0xed,0x2a,0xa2,0x3a,0x21,0x5a,0x66,0x2b,0xeb,0x83,0xc0,0x79,0xf7,0x4f,0xdf,0xd2,0x62,0x88
.byte 0xe0,0x18,0x33,0xb0,0x50,0x5d,0xf5,0x81,0x1c,0x6b,0xd2,0x44,0x24,0xc0,0x5d,0xfa,0x3d,0x1a,0x26,0xb5,0x92,0x31,0xd2,0xb7,0x2f,0x98,0xfd,0xbf,0x6e,0xaf,0x1b,0x12,0x46,0xa3,0x6c,0x76,0x5a,0x50,0xb2,0x81,0x55,0x3d,0x47,0x32,0x61,0x0b,0x1d,0x86,0x90,0x72,0x87,0x66,0x89,0x0e,0x64,0xdb,0xdb,0x3b,0xa3,0x4e,0x49,0xa6,0xbe,0x42
.byte 0x73,0x0f,0x45,0x73,0x47,0x1c,0xb8,0x4a,0xb1,0x3f,0x98,0x15,0x8e,0x75,0xf5,0x33,0xc9,0x65,0x77,0x66,0xb8,0xd5,0x20,0x61,0x23,0xbe,0x40,0xd9,0xe7,0xbc,0xeb,0xff,0xcd,0xb6,0x2c,0x2b,0x76,0x3a,0xf1,0xef,0x38,0x6d,0xe3,0xcd,0x70,0x6e,0xe0,0x29,0xad,0xca,0x6d,0x03,0xfe,0x5a,0x1d,0x69,0x2f,0xf7,0xde,0xfd,0xf4,0x6b,0xb3,0xc5
.byte 0xe5,0xac,0xf3,0xd2,0x95,0x02,0xf2,0x6a,0x58,0x4c,0x5b,0xeb,0x1f,0x0b,0x7f,0x9d,0x0a,0x0e,0xb3,0xf0,0x41,0x50,0x04,0x65,0xf3,0xc0,0x68,0xc9,0x1f,0x0b,0xdb,0xd0,0xd6,0x19,0x4b,0xa8,0x72,0xb2,0x60,0xf2,0x1c,0xbd,0x99,0xb5,0x7d,0xe0,0x1e,0xe3,0xfd,0x42,0x8a,0x62,0xe3,0x8f,0xd6,0xcf,0x45,0x16,0x94,0x76,0x73,0xb7,0xa1,0x2a
.byte 0x67,0x25,0x02,0x73,0x0e,0xf6,0x10,0xcf,0x57,0x0a,0x74,0xeb,0x5a,0x4d,0x07,0x04,0x7b,0x1c,0x7e,0xf4,0x55,0xda,0x39,0x76,0xeb,0x11,0xfb,0x04,0xf5,0x32,0xdf,0x63,0x58,0xd0,0xc4,0xa4,0x76,0x76,0xd8,0xaf,0xc6,0xe4,0x21,0x97,0x51,0x6a,0xc1,0xab,0x81,0xd8,0x65,0xac,0x28,0x54,0xcd,0x36,0xcb,0xba,0xfc,0x08,0x3f,0xb1,0x81,0x69
.byte 0xbe,0x42,0x79,0x17,0x74,0x23,0x5f,0x28,0x59,0x60,0x84,0xa3,0x3c,0x57,0x9b,0xc9,0x77,0x24,0xe2,0xcf,0x51,0xb6,0x31,0x46,0xe2,0xd2,0x30,0xb9,0x76,0xcc,0xb4,0xca,0x8a,0xd5,0xa6,0x1c,0x3c,0xcc,0x39,0x1e,0xae,0x54,0x2a,0xde,0x0a,0x76,0x7e,0xaa,0x78,0xd2,0xaa,0xa0,0xe0,0xda,0x05,0x6d,0x1a,0x2a,0x44,0x8f,0x75,0x37,0x8f,0x4f
.byte 0x38,0xaa,0x9b,0x30,0x79,0x98,0x0a,0xe2,0x5d,0x4d,0x0a,0x91,0x18,0xb1,0x0e,0x3b,0xa6,0xd5,0x72,0x00,0xc4,0xbe,0x09,0x7e,0xd0,0xe5,0xf3,0x98,0x28,0x9c,0x34,0x44,0xdd,0x35,0x2c,0x7d,0x06,0x22,0x59,0x98,0x7b,0x50,0x7d,0xc6,0xb2,0xd4,0xa2,0xaa,0x4f,0xad,0x50,0x72,0xbb,0xbb,0xb5,0x79,0x25,0x40,0x8e,0x43,0x6a,0x09,0x3f,0x60
.byte 0x28,0x67,0x47,0x8c,0xbd,0xc8,0x12,0x50,0x9b,0xdc,0xd4,0x03,0x99,0x3d,0x7c,0x08,0xd6,0xe3,0xfd,0xfa,0x5d,0xba,0x85,0xb4,0x0e,0xea,0xf6,0x70,0x82,0x18,0xc6,0x05,0xc6,0xb9,0x0d,0x81,0x6a,0xc0,0x40,0x7f,0x26,0xfc,0xe0,0x49,0x5e,0x1d,0x28,0xc5,0x91,0xd4,0xb5,0x6d,0x6c,0xe8,0x8a,0x59,0x30,0x1d,0x0a,0x8e,0xb2,0x6c,0x2b,0x03
.byte 0xfb,0x20,0x60,0xb2,0x9d,0xd4,0xb0,0xe1,0xa4,0x9d,0xb0,0x84,0x3f,0xfd,0x82,0x1d,0xeb,0x93,0x66,0xa8,0x1d,0x94,0x69,0x99,0x8f,0x3e,0x16,0x1a,0x36,0x4c,0xc4,0x6f,0x14,0x04,0xa7,0xcf,0x0a,0x0b,0x6e,0xd6,0x29,0x49,0x8d,0x9d,0x11,0xa4,0xf7,0x58,0x25,0x39,0x6e,0x68,0x7a,0xca,0xf7,0x3b,0x6e,0x2b,0x1c,0xc3,0xef,0xca,0x97,0x83
.byte 0x4b,0xf3,0x48,0x9a,0xc6,0x23,0x63,0x72,0x40,0x44,0x40,0xc3,0xf0,0x5b,0x80,0xff,0xd7,0x7e,0x37,0xc2,0x54,0xda,0xa4,0x2a,0xdd,0x65,0xc8,0x48,0x89,0x8c,0xea,0x5f,0xd2,0x46,0xfe,0xe9,0xbf,0xce,0x4a,0x80,0x3b,0xd0,0x51,0xcd,0x83,0x5f,0xfb,0x27,0xab,0x05,0x25,0x44,0xeb,0xe1,0x57,0x18,0x50,0xfc,0xb0,0x83,0x79,0xdc,0xa0,0xd3
.byte 0xc4,0xfb,0xc1,0xef,0xd2,0x44,0x2f,0x87,0x4f,0xef,0xed,0x3a,0x55,0x07,0xe6,0x67,0xe0,0x22,0xa0,0xaf,0x9e,0xb9,0xef,0x32,0x2e,0x81,0xe6,0x30,0x25,0xe4,0x4d,0xa0,0x34,0x1e,0x7d,0x6b,0xb9,0x21,0x4d,0xae,0xfd,0x51,0xe0,0xee,0xf6,0xe2,0x0d,0x9c,0xf6,0x63,0x73,0x93,0xc0,0xbb,0x88,0x0c,0x06,0xb9,0xa0,0xf3,0xfc,0x26,0x64,0x91
.byte 0x84,0xd1,0x77,0x21,0xf9,0xf1,0x4c,0x48,0x65,0x15,0x56,0xd7,0xd2,0x86,0x26,0x6f,0xf5,0xce,0x81,0x1d,0x9d,0xa7,0x83,0xd0,0x2a,0x4e,0x01,0x79,0xd6,0x1d,0xee,0x10,0x66,0x6f,0xf8,0x80,0x47,0x6c,0xed,0x18,0xc1,0xb5,0x39,0xec,0x2d,0x42,0xf1,0xd5,0x2c,0xd9,0x9c,0xd5,0xaa,0xbf,0xc1,0x67,0xf3,0xf9,0xd6,0xd2,0x44,0x20,0x27,0x7b
.byte 0x40,0x04,0x0c,0x77,0x64,0xef,0x5c,0x1b,0xc8,0x2c,0x25,0x3e,0x9d,0x63,0xbb,0x94,0x78,0x02,0x14,0x46,0xfc,0xa6,0x09,0x0e,0xc5,0x81,0x34,0x1b,0x11,0xdf,0xb4,0xb6,0x8e,0x40,0x0e,0xf3,0x05,0x0a,0xf5,0x28,0x58,0x5a,0x2a,0xb5,0x6c,0x9d,0xe5,0x50,0x0d,0x3e,0xcf,0xb6,0xc5,0x3b,0xc8,0x56,0x50,0x8c,0xda,0x83,0x8d,0x4d,0xce,0x22
.byte 0xb9,0x5b,0x14,0x76,0x88,0x84,0xdf,0xa3,0x93,0x79,0x21,0x8c,0xfa,0x42,0x98,0xda,0x0d,0x2a,0x4e,0x43,0x41,0x0d,0xac,0xe6,0x9e,0x11,0x14,0x81,0xcc,0xcf,0x72,0x84,0xb5,0x8e,0x99,0x0e,0x64,0xad,0xbc,0x35,0x9d,0x04,0x56,0xae,0x33,0x8e,0x3a,0x2a,0x56,0x91,0xa7,0x9c,0xe4,0xba,0xfc,0xe9,0x65,0x14,0xbf,0x07,0xf8,0x85,0x45,0xe1
.byte 0x1d,0x29,0x4c,0x10,0xde,0x5e,0x6c,0xb6,0x28,0xad,0x9a,0xb8,0x18,0xeb,0x77,0x2d,0x7b,0x6e,0x26,0x51,0xee,0x84,0x40,0x00,0x0f,0xed,0xb2,0x28,0x11,0x34,0xca,0xc7,0x33,0xf8,0x67,0x96,0xce,0x93,0x1d,0x4d,0x42,0x0f,0x55,0x5d,0x34,0x88,0x55,0xdd,0x8f,0x43,0xaa,0xfb,0xfe,0xea,0x53,0xee,0x69,0x10,0xcd,0xc3,0x94,0xab,0xe1,0xff
.byte 0x89,0xb1,0x35,0xd2,0x21,0x0d,0x3a,0xa3,0x85,0xfa,0x42,0xb7,0xb1,0x16,0x97,0xb8,0xe3,0x1a,0xfa,0xab,0x86,0x1b,0x9c,0x66,0xf8,0xe6,0xae,0x1e,0x68,0x84,0xf5,0xef,0xb6,0x5c,0x72,0x86,0xa3,0x27,0x9a,0x65,0xff,0x54,0xe7,0x83,0xfe,0xd7,0x00,0xe9,0x63,0x1e,0x05,0xe3,0xe1,0x10,0x7a,0x19,0xee,0xb3,0xc8,0xf0,0x1c,0x2e,0x3c,0x79
.byte 0x05,0xf7,0x5e,0xcc,0x01,0x88,0xc8,0x1f,0x0b,0xbd,0xda,0x44,0xfd,0x97,0x53,0x58,0xa6,0xab,0xf7,0x89,0xb1,0x52,0x29,0x73,0xff,0xb1,0xfa,0x66,0x8a,0x56,0x22,0xe5,0x9c,0xbb,0xab,0x55,0x37,0x4a,0x3e,0xc3,0xeb,0x09,0xbe,0x40,0x77,0xcd,0xf9,0x0f,0xcf,0xa7,0x14,0x4b,0xe7,0x19,0x8c,0x12,0x31,0x2f,0x34,0x45,0x1d,0x1a,0x4f,0xf0
.byte 0xc5,0x24,0x78,0x39,0x2e,0x96,0x13,0x5b,0x47,0xcc,0xb9,0xb3,0xa6,0x16,0x4f,0xa3,0x2b,0xca,0x79,0x98,0x0d,0x89,0xad,0x65,0xdb,0x1c,0xf8,0x61,0x18,0x28,0x21,0x47,0x28,0x11,0x77,0xb5,0x33,0xf5,0xbd,0x92,0xb8,0xa6,0xdc,0xfe,0x67,0x20,0x3c,0x05,0xe5,0x14,0xc9,0xb9,0x40,0xc3,0x15,0x8e,0xd9,0xbf,0xef,0xcb,0x4d,0x0a,0xf7,0xbd
.byte 0xc2,0x48,0x7c,0xdc,0x23,0x13,0xc2,0xc1,0x94,0x4a,0x8c,0xb8,0x62,0x2c,0xb5,0xd6,0x49,0x7e,0xaa,0x99,0x61,0xdc,0xae,0x18,0x5f,0xce,0xb4,0xe4,0x57,0xf1,0x48,0x7b,0xc3,0xc1,0x63,0x6b,0xa6,0xc3,0xbc,0xa8,0x93,0xd3,0x51,0xd7,0xfc,0x5a,0x89,0x73,0x4d,0xbe,0x48,0x75,0x51,0xaf,0x75,0x0d,0x48,0xf7,0x3c,0x34,0xdc,0xae,0xf5,0xf9
.byte 0xc1,0xb0,0x53,0x50,0x85,0xcd,0xf9,0xa9,0x37,0x48,0x14,0x6c,0x7f,0x7b,0x9c,0xa1,0xf5,0xb2,0xf4,0x38,0xbf,0x4b,0x39,0x8e,0xb5,0x2b,0xb5,0x1e,0x22,0xa8,0x52,0xad,0x1b,0x57,0x69,0xdc,0xb1,0xca,0xb6,0x2a,0x0b,0x42,0x6e,0xde,0xc6,0xb2,0xec,0x30,0x05,0x00,0x87,0xeb,0x7e,0x77,0x14,0x07,0x35,0x6e,0x11,0x09,0xc0,0xd9,0xc4,0xaa
.byte 0x96,0xa4,0xa8,0xb6,0xd9,0x6d,0xf8,0xc5,0x52,0x7f,0x85,0x25,0xc2,0x81,0x1d,0x67,0x76,0x4a,0x45,0xa3,0xd5,0x40,0xaf,0x63,0x75,0xe5,0xcc,0xb0,0x46,0x0f,0xe6,0x7c,0xf8,0x5b,0x2e,0x09,0x98,0x89,0xc9,0x1b,0x8c,0x49,0x91,0xd9,0xcd,0x56,0x02,0x8d,0xcc,0x67,0x5c,0xa1,0x69,0x76,0x16,0x7a,0x93,0x44,0x04,0xb1,0x3b,0x19,0x28,0x15
.byte 0x73,0x11,0x81,0x92,0x42,0x5a,0x91,0x10,0xf4,0x36,0xed,0x7a,0x90,0x5c,0x74,0xb8,0x96,0x97,0xde,0xd7,0x5e,0x1e,0x78,0xb1,0x33,0xbc,0x0f,0x66,0x65,0x0e,0x68,0xb1,0x47,0x16,0xdc,0x89,0xc8,0x80,0x9e,0x44,0xc0,0x85,0x86,0xed,0xc7,0x74,0xc8,0xf4,0x3f,0xbe,0x2e,0xe7,0xa5,0x85,0x6f,0xf7,0x08,0x0e,0x40,0xec,0xc5,0x15,0xcc,0x63
.byte 0x13,0x91,0x75,0xc2,0x7b,0xbc,0xa4,0xf1,0xf6,0xa2,0xec,0xae,0x8b,0x60,0x08,0x2d,0xc0,0x17,0x3b,0x9e,0x34,0x15,0xe7,0x7c,0xb4,0x86,0xd3,0x69,0x7e,0xb0,0xa3,0x17,0x50,0x2d,0x64,0x7c,0x99,0x87,0x61,0x50,0x86,0x90,0x87,0x50,0xdd,0x5f,0x83,0x1f,0xc0,0x9c,0x14,0x44,0xed,0x96,0xce,0x41,0xe5,0xe6,0x38,0xc2,0xfb,0x5e,0xf1,0x3e
.byte 0x31,0x82,0xbb,0x4c,0x59,0x23,0x47,0x6f,0x3e,0x55,0x76,0x4b,0xb1,0x39,0x53,0x3e,0x16,0xaf,0xbd,0x33,0x9f,0x05,0x05,0xa4,0x9a,0x10,0x83,0xa1,0xfc,0xf1,0x45,0x29,0x30,0x91,0x0f,0xb6,0xc0,0x32,0x23,0xd0,0xd8,0xcc,0x91,0x63,0x70,0x39,0x9a,0x95,0x0b,0xb0,0x47,0x8b,0x47,0x57,0x53,0x33,0xb3,0x51,0x9c,0x3c,0xf0,0x71,0xd0,0xf6
.byte 0x91,0x14,0xb4,0x05,0x2e,0x65,0x4d,0x1e,0xb6,0xce,0xf6,0xd2,0xb9,0x06,0x59,0xac,0x25,0xe7,0x9f,0x44,0x9d,0x53,0x3a,0x06,0xad,0x19,0xaf,0xb1,0xc3,0x6a,0x10,0xf7,0xc1,0xa1,0x31,0x7a,0x42,0x38,0x3f,0x81,0x22,0x8a,0x56,0xc6,0x68,0x0f,0x18,0x84,0xb9,0x5b,0xd1,0x6e,0x7f,0xae,0xa6,0xfe,0xb0,0x2d,0x91,0x20,0x49,0xb1,0xe2,0x19
.byte 0x4b,0x91,0x5f,0x5e,0x77,0x8b,0xd5,0x47,0x0c,0x15,0x36,0x12,0x91,0x01,0xef,0xc8,0x3a,0x39,0x22,0x03,0x9f,0x49,0x93,0x00,0x11,0xda,0x4b,0x6f,0xcd,0x3c,0xb2,0xc0,0xe5,0x78,0xa0,0xeb,0x61,0x56,0x97,0x28,0x53,0x3b,0xec,0x04,0x83,0x7e,0x77,0x78,0x50,0xf6,0xe0,0x0c,0x1f,0x5c,0xd5,0x0c,0x5b,0x45,0xfa,0xee,0xd0,0x26,0x5b,0xfb
.byte 0x44,0x5e,0x49,0x04,0x17,0x97,0xbb,0xaa,0x69,0x1f,0x89,0xcb,0xc1,0xf2,0x53,0xaa,0x5f,0x4f,0x3e,0x49,0xca,0x74,0x51,0x60,0x0c,0x04,0xec,0x74,0xdb,0x58,0x18,0xc0,0x77,0xfd,0x26,0xe7,0x69,0x6d,0x44,0x93,0x89,0x32,0x89,0x88,0xde,0xe2,0x6d,0x9b,0x63,0xfc,0xe0,0xc1,0x92,0x0b,0x52,0xf9,0xef,0x17,0x0f,0x46,0xa0,0xa0,0x98,0x44
.byte 0x58,0xbd,0xe1,0x88,0x45,0x3c,0xf1,0xd6,0x5e,0x5b,0xd1,0x94,0x6e,0xe4,0xac,0x98,0xc0,0x44,0x7c,0x21,0xac,0xd0,0xa4,0x13,0x2e,0x5a,0x6d,0x54,0x2f,0x07,0x2b,0xca,0xa1,0xeb,0x81,0x4f,0xee,0xa2,0x4e,0x09,0xdb,0x28,0x2d,0x67,0x87,0x00,0xf6,0x52,0xb0,0xbe,0xed,0xa5,0x54,0xff,0x7d,0x27,0xb0,0x1e,0x49,0x9d,0x98,0xc4,0xf3,0xf3
.byte 0xd9,0x33,0xef,0x61,0x53,0x11,0xd3,0x8a,0x10,0x05,0xde,0xe3,0x39,0xf1,0x4a,0x17,0x9a,0xbd,0x76,0xbc,0xf6,0xd0,0x43,0xcb,0xe4,0xa7,0x26,0x29,0xc8,0x89,0x05,0xf2,0x26,0x19,0x4c,0x11,0x05,0xcb,0x73,0x3d,0x2d,0x2d,0x4a,0x7a,0x0b,0x87,0x23,0x86,0x18,0xd8,0x53,0x91,0xb4,0x73,0xea,0xa3,0xf4,0xb9,0x15,0x2c,0x36,0xba,0xc7,0xf1
.byte 0x3f,0x92,0xd7,0xde,0xc5,0xfc,0xe5,0x91,0x29,0xa7,0x0c,0x1a,0xf7,0x09,0x49,0xad,0x88,0xde,0x47,0xf1,0x5d,0x01,0x08,0x2d,0x20,0xc6,0x39,0x08,0x9f,0x02,0x3f,0x20,0xe2,0x21,0x68,0xa0,0x0d,0x1b,0xcf,0xbf,0xb2,0x2f,0x13,0x5c,0x88,0xae,0xc1,0x29,0xa7,0x54,0x4f,0xa3,0x37,0xf1,0xa5,0x0b,0x4f,0x1b,0xa4,0x39,0x0b,0x99,0x0d,0x65
.byte 0xfa,0xf1,0x43,0x46,0xc3,0xfd,0xcc,0x3b,0x7d,0x3c,0xd4,0x15,0x32,0x51,0xf4,0xbe,0xf8,0x46,0x01,0x62,0xa6,0xe2,0x44,0x1c,0x78,0x4c,0x57,0x13,0x2c,0x9d,0x8a,0xea,0xe0,0xfc,0x2e,0xe7,0x80,0x6f,0x90,0x67,0x00,0xf0,0x13,0xbb,0x05,0xe0,0xbd,0xf8,0x11,0x9d,0x7e,0x9d,0x01,0x61,0x3a,0x13,0x9a,0x02,0xfb,0x24,0xea,0x91,0x0c,0xe5
.byte 0xeb,0xe3,0x80,0x22,0xb6,0xac,0xe1,0x13,0x95,0x65,0x22,0xeb,0xf7,0x91,0xa3,0xe6,0x4b,0x54,0x1e,0xf8,0x7b,0xcd,0x27,0x7c,0xca,0xb7,0x88,0x52,0xdf,0xba,0x9e,0xf6,0xed,0x03,0xb4,0xac,0xab,0x17,0xe7,0xb0,0x5e,0x1a,0x19,0xee,0x61,0xdf,0xa5,0x23,0x28,0xd6,0x63,0xe3,0x45,0xea,0x92,0x70,0x94,0x31,0x32,0x8f,0x47,0xad,0xee,0x9e
.byte 0x6a,0x2c,0x18,0x66,0x55,0xd1,0xd9,0xc6,0xd4,0x08,0x5a,0x7c,0xe8,0x09,0xcc,0x62,0x1e,0x24,0xed,0x2f,0x3e,0x1b,0x84,0x92,0x73,0x14,0x22,0xbc,0xb7,0xf0,0xed,0x3f,0x12,0x98,0x49,0x52,0xb5,0x29,0x5e,0x2d,0xca,0x23,0xeb,0x8a,0xb1,0xea,0x3c,0x6c,0x93,0x68,0x7f,0x84,0x4f,0x49,0x9c,0x9b,0xb8,0xc7,0xfd,0x6a,0xb7,0xf1,0xde,0xf9
.byte 0xc1,0x72,0x26,0xd1,0xfb,0x40,0x72,0x78,0xb0,0xa3,0xce,0xa8,0xab,0x3b,0x0f,0x8c,0x2b,0x13,0xe2,0xe3,0x86,0x9a,0xa0,0x69,0x46,0x85,0xdf,0x50,0x5b,0x60,0x9a,0xb7,0x4f,0xa9,0x76,0x70,0xd6,0xeb,0xbb,0x97,0xb7,0x63,0xed,0xec,0xbe,0x93,0x9f,0x79,0xff,0xcf,0x2c,0x09,0x85,0x22,0x1f,0x0e,0xbd,0xd4,0xb7,0x7b,0x1e,0x0e,0xc3,0x99
.byte 0x55,0x1b,0x50,0xc0,0xb9,0x68,0xe3,0xa9,0x59,0x73,0xa4,0xe6,0x86,0x6c,0xda,0xc5,0xba,0x76,0xab,0x56,0x94,0xa5,0x11,0xdf,0x1b,0x09,0x67,0xde,0x20,0x9f,0xf4,0xb8,0x6f,0x64,0xb1,0x9b,0xac,0x59,0xf9,0xcc,0xd8,0xc1,0x41,0xe9,0xdd,0x00,0xda,0x6a,0x11,0x3b,0xad,0x04,0x81,0x39,0x87,0x8e,0xf3,0x99,0xcf,0xde,0x29,0x7b,0x25,0x91
.byte 0x6e,0x2e,0x1d,0x83,0x9c,0xb6,0xa7,0xff,0x65,0x88,0xe8,0xc1,0xe7,0xca,0x7e,0x46,0xf0,0xc0,0xe7,0x55,0x36,0x76,0xa7,0xc5,0x25,0x06,0xc4,0x77,0x7b,0xff,0x61,0x1d,0x5a,0x77,0xa0,0xbc,0xa5,0x6f,0xda,0x3d,0xfe,0x92,0xd3,0x8e,0xc4,0x95,0xea,0x13,0xbd,0x18,0xff,0x8f,0xcd,0x7c,0x18,0xe1,0x88,0xee,0x5d,0xcc,0x8d,0xea,0x9e,0x21
.byte 0xe5,0x8f,0x8c,0x6b,0x51,0xbb,0xab,0x9d,0x64,0x53,0x70,0x5b,0x0b,0x5c,0xa0,0xde,0x4d,0x56,0x82,0xb0,0xa8,0x3b,0x91,0x0c,0xe6,0x8c,0x7b,0x24,0xdd,0x32,0xb9,0xf2,0x06,0xc0,0xce,0xcb,0x11,0x4f,0x5b,0x70,0xc3,0x09,0x37,0x5b,0xd9,0x69,0x97,0x0b,0x9b,0x37,0x14,0xb3,0x95,0x4f,0x5c,0x0a,0x3c,0x4f,0x79,0x65,0x22,0x07,0xd3,0xd6
.byte 0xe9,0x55,0x42,0xfa,0x47,0xe8,0x7c,0x5c,0x63,0x24,0xe5,0xd0,0x91,0x28,0x87,0x0f,0xe0,0x21,0x79,0x85,0x7a,0x8b,0xb9,0x37,0xa0,0x86,0x7c,0xfc,0x52,0x04,0xb1,0x1b,0x62,0x9e,0xc3,0x18,0x59,0x87,0xb1,0x86,0x17,0xac,0x0d,0xb7,0xca,0xa9,0x37,0x18,0x30,0x67,0x76,0x90,0x84,0x78,0xcb,0x62,0x26,0x24,0xf6,0x1b,0xfe,0xb8,0xc0,0x1f
.byte 0xdc,0x1d,0x2f,0x52,0xe5,0x64,0xbc,0xd5,0x43,0x87,0xb9,0x66,0x2d,0xa9,0x5c,0x98,0x2c,0x2a,0xf9,0xf9,0x78,0xa7,0x0f,0x23,0xe0,0x11,0x36,0xa0,0x4e,0x40,0x2c,0x79,0xca,0x1c,0x44,0x76,0x3f,0x61,0x34,0x9e,0x01,0x8c,0x61,0x2f,0x84,0x52,0x15,0x22,0xb3,0x53,0x27,0x14,0x5f,0x54,0x09,0x24,0x83,0x47,0x90,0x43,0xc3,0xdf,0xad,0x66
.byte 0x9c,0x7a,0xa1,0x4b,0x53,0xc1,0x91,0xc5,0x48,0xfa,0xc4,0x6b,0x4a,0xc9,0xdc,0x85,0xb4,0xe2,0x21,0x88,0xda,0x27,0xcd,0x54,0xac,0xcf,0xb4,0x09,0x1d,0x5a,0x7f,0x23,0x2c,0x23,0xa4,0x98,0x96,0x29,0xa8,0xc7,0x33,0x45,0x79,0xd4,0x35,0x9d,0x78,0xbb,0x00,0x5f,0xca,0xcc,0x62,0x65,0x47,0xa3,0x8b,0x3b,0xd1,0x6b,0x18,0xb3,0xf4,0x1d
.byte 0xac,0x9c,0x9b,0x90,0xbb,0xb0,0x0d,0x8a,0x7d,0x2e,0x3b,0xbd,0x52,0x35,0x11,0xfc,0xcd,0x59,0x76,0x2c,0x9d,0xf4,0x6b,0x29,0x6d,0x63,0x51,0xc9,0x3b,0x73,0x9b,0xcc,0x33,0x4f,0x0e,0xcd,0xf1,0x06,0xf0,0xe7,0xcf,0x93,0x66,0x51,0x34,0xb0,0x98,0x50,0x2f,0xa4,0xf8,0x37,0xdb,0x78,0xc2,0x36,0x20,0x9d,0x58,0xf1,0x52,0x35,0x7d,0x8a
.byte 0xd0,0x43,0xab,0x46,0x0d,0x59,0xdb,0xf2,0x8e,0xe7,0x79,0xbf,0xf5,0x00,0xc8,0xbe,0x1b,0x98,0xf8,0x1e,0x53,0x1b,0x17,0xa9,0x2d,0x7c,0x7a,0xef,0x14,0x33,0x70,0x65,0x7b,0x55,0x82,0xe1,0x63,0x8e,0xf0,0x15,0xf6,0xb4,0x2b,0x18,0xe2,0x40,0x30,0x96,0x74,0xf7,0x91,0x82,0x83,0xef,0x74,0x38,0x89,0xea,0xaf,0x6f,0xd6,0x89,0x80,0x1c
.byte 0x46,0xa2,0xaa,0xcd,0x60,0x84,0xa2,0x65,0x8a,0xc7,0x03,0x07,0xa0,0xc9,0x00,0xd7,0x34,0x54,0x33,0x08,0xba,0x1a,0xab,0x49,0x93,0x7f,0xd2,0x51,0xe4,0xcf,0x96,0x35,0x48,0xd0,0x91,0xa5,0x10,0x65,0x95,0xe2,0x01,0x3b,0x1c,0xa1,0x4b,0x8d,0x62,0x09,0x49,0xdf,0x67,0xde,0xe5,0x8e,0xcc,0xa6,0x99,0xc1,0x8b,0x6a,0x29,0xeb,0xa0,0xe4
.byte 0xaa,0x2a,0xd4,0xe9,0x28,0xb5,0xd1,0x39,0x78,0xe1,0xae,0x0f,0xc5,0x05,0x64,0xc8,0x62,0x27,0xf6,0x67,0xb5,0x79,0x52,0xd6,0x0d,0xbd,0x42,0xbd,0xa2,0x5d,0x00,0xd9,0xbe,0x5b,0x26,0x4c,0x20,0xdc,0xa2,0x33,0x9c,0x8e,0xd5,0x3c,0x75,0x7f,0x25,0xa2,0x04,0x70,0xfb,0x2a,0xb2,0xc6,0xb3,0xc0,0x1d,0xc5,0x58,0xe7,0xc1,0xd9,0x67,0x8c
.byte 0x2c,0x30,0x93,0x97,0x84,0x72,0xdf,0x5f,0x49,0xac,0x9e,0x09,0x0a,0x35,0xfd,0x69,0x50,0xf4,0x45,0x34,0x8e,0x07,0x9f,0x09,0x4c,0x2d,0xd8,0x7d,0x47,0xc2,0x7b,0xd7,0x67,0xb7,0xcb,0x60,0x46,0x8b,0x4c,0xe1,0x81,0x88,0x56,0x8e,0x3d,0x32,0x10,0x77,0xb4,0x33,0xba,0x2c,0xcd,0x20,0x73,0x46,0xdb,0xfa,0x83,0x27,0x43,0x3e,0xc4,0xd4
.byte 0xd3,0x86,0x26,0x67,0x9f,0x1e,0xc8,0x1d,0x3c,0x5d,0x5b,0xcb,0xef,0x1a,0xcf,0x79,0xfd,0xce,0x72,0x8e,0xb7,0xce,0xc8,0x02,0x5c,0xde,0xe3,0x1c,0x78,0xb6,0xc1,0xb1,0xcd,0xee,0xf7,0x5a,0x57,0xa9,0xa7,0x37,0xfa,0x71,0x41,0xdd,0x1c,0xcb,0xb3,0xde,0x6f,0xbb,0xbd,0x43,0xa1,0xcd,0xc8,0x23,0x30,0xb6,0x03,0x18,0xb5,0x6f,0x20,0xc6
.byte 0xce,0x22,0x8a,0xf2,0x01,0x30,0x74,0x1c,0x27,0x9e,0x44,0xce,0xad,0x7d,0xbc,0x93,0x5c,0xaf,0xdc,0x05,0xda,0x41,0x92,0x7c,0x6b,0x47,0x62,0xb4,0x94,0xe4,0x2e,0x70,0x7e,0x86,0xdd,0xfd,0x61,0xbc,0xdd,0x9b,0xc6,0x8e,0xbb,0x7b,0x4f,0xd9,0x0a,0x74,0x8a,0xb7,0xb1,0x19,0x0b,0x37,0xbe,0xa6,0x7c,0x48,0x1b,0xcd,0x04,0x49,0x98,0x3b
.byte 0x48,0x93,0x0c,0x2d,0x34,0xf4,0xdc,0x1d,0xa8,0x29,0xd1,0x70,0x32,0x5f,0x38,0xf6,0x5d,0xde,0xee,0x96,0xf9,0x48,0x15,0xb3,0xbc,0x10,0x65,0x0b,0x95,0xd8,0xee,0xac,0xa4,0x32,0xa8,0x06,0xee,0xe9,0xce,0x6f,0x9a,0xef,0x4f,0xa1,0x16,0x25,0xc5,0x21,0x10,0x52,0x8f,0x95,0xbe,0xd3,0x53,0x21,0x14,0xca,0xf0,0xe2,0xb8,0xf5,0x61,0x88
.byte 0x71,0xfe,0x2e,0xa7,0xf1,0xf7,0xfc,0xba,0xf4,0x09,0xbf,0xec,0x5d,0xb2,0xc1,0xa7,0x93,0x43,0x19,0xcd,0x09,0xf8,0x46,0x99,0x89,0x07,0x92,0xd8,0xb6,0x3d,0x7f,0x7d,0xc3,0xd9,0x53,0x4f,0xba,0x86,0x02,0xe6,0xd4,0x1f,0x43,0xd7,0xb3,0x35,0x59,0x7e,0x76,0x71,0xe5,0x02,0x74,0x95,0x7d,0x20,0xab,0x4b,0xfe,0x41,0x35,0xed,0x40,0x8c
.byte 0xeb,0x54,0x50,0xe4,0x1a,0xec,0xe5,0x2f,0xa9,0xba,0x7e,0x89,0x94,0xc4,0x72,0xec,0x20,0x46,0x3a,0xea,0xc3,0x1c,0xd6,0x27,0x9a,0xca,0xa6,0x05,0x48,0xef,0x6d,0xad,0x1c,0xde,0xcb,0x33,0x0a,0x02,0x8c,0x5c,0x54,0x8c,0xba,0x0e,0x94,0x6a,0xb3,0xa6,0x66,0x5b,0xfc,0xd8,0xe4,0xb9,0xc4,0xd4,0x03,0xf7,0xc0,0xd7,0x16,0xab,0x58,0x04
.byte 0xe8,0x95,0xc4,0x25,0x79,0xe8,0x18,0xb5,0x54,0x32,0xd4,0x75,0xf6,0x80,0xda,0x35,0xac,0x09,0xbf,0x37,0x1b,0xed,0x6e,0xdb,0xa1,0x42,0x14,0x49,0x11,0x4c,0x7a,0xda,0xed,0xc9,0x9d,0xe1,0x21,0x04,0x37,0x7a,0xbd,0x26,0x2d,0x40,0xc8,0x88,0x69,0x4d,0xd2,0x52,0x93,0xa2,0x6d,0x9a,0xd4,0xb0,0xdf,0x9a,0xc1,0x84,0xc5,0x08,0x5a,0xd9
.byte 0x1f,0xbe,0x57,0x97,0x81,0x38,0x46,0x32,0xce,0xe3,0x0b,0x93,0x25,0x04,0xe5,0x7b,0xac,0xfd,0x37,0xc6,0x48,0x91,0x3c,0xef,0x5d,0x09,0xea,0x29,0xa9,0xc7,0x50,0x4b,0x47,0xe6,0xba,0xbd,0x96,0xe3,0x8e,0x9a,0x0f,0x8c,0x49,0xf4,0xe6,0xdf,0x3c,0xbb,0x51,0x12,0x8f,0x90,0x5e,0x77,0xd1,0x2e,0xd4,0xea,0x1f,0x34,0xac,0x6d,0xcf,0x74
.byte 0xb6,0xd4,0xaa,0x89,0xe0,0xa6,0x37,0x77,0x34,0xad,0x1a,0x7d,0x97,0x63,0x13,0x83,0x82,0x67,0x61,0xed,0xd6,0xbf,0xda,0x6a,0x09,0xce,0x0f,0x53,0xef,0x42,0x22,0x69,0x0f,0x8e,0xbb,0x6d,0xa5,0x57,0xcb,0xe3,0x3c,0xbe,0xd7,0x2e,0xc1,0x67,0x32,0xc0,0xa8,0xbf,0xbf,0x11,0xdd,0xdf,0xfd,0xc6,0x44,0xbb,0xca,0x4e,0xd1,0x2d,0x61,0x3c
.byte 0xef,0xb4,0x8b,0xcd,0x76,0xa6,0x00,0xe0,0xb8,0x66,0x0c,0xed,0xd6,0x20,0xd3,0x27,0x33,0xcb,0x5e,0x76,0x33,0xbe,0xb4,0x3c,0x77,0x8b,0x14,0xec,0x93,0x16,0x54,0x1d,0x87,0x7d,0xeb,0xca,0x49,0xd3,0x2b,0xa6,0xbd,0xa5,0xe7,0x1a,0x3a,0x94,0xd9,0xb9,0xe0,0xaa,0x23,0x83,0x7c,0xe5,0xff,0x17,0xfd,0x14,0x63,0x8f,0xb8,0xff,0x93,0x8f
.byte 0xc7,0xa7,0x7b,0x43,0x31,0xd4,0xa8,0xf4,0x6c,0xab,0x2c,0x44,0xd4,0x7d,0x80,0x79,0x33,0x4c,0x15,0x41,0x20,0x14,0x02,0x04,0xcd,0x3b,0x66,0xe7,0xd7,0x0f,0x87,0xda,0xb1,0x45,0x74,0x14,0xa6,0xc4,0xaa,0x19,0xa6,0x8d,0x7e,0x51,0xed,0x5a,0x42,0xa4,0xb9,0x7b,0x8c,0x87,0xfd,0xe1,0x4a,0x58,0x15,0xf5,0x1d,0xcf,0x59,0xe5,0xbc,0x11
.byte 0x10,0x7c,0xba,0x6b,0x47,0x9a,0xef,0x69,0x40,0xaf,0x3f,0x06,0x53,0x9f,0x96,0x55,0x30,0x83,0x9b,0x6a,0xfb,0xd3,0x93,0xf0,0x38,0x43,0xcb,0x5b,0xe4,0x23,0x0d,0x2c,0x1e,0xa9,0xe6,0xaf,0xd9,0xa9,0x19,0xf1,0xda,0x57,0x4b,0xd7,0x31,0x23,0x60,0x00,0x1b,0x88,0x15,0x68,0xe4,0xf1,0x26,0x1b,0x65,0xf5,0x6d,0xc8,0xc8,0x32,0x0e,0x65
.byte 0x2e,0x49,0xbd,0x88,0x5a,0xc2,0x05,0xf9,0xee,0x07,0xf2,0x27,0x9b,0xeb,0x54,0x23,0x8a,0x10,0xe6,0x7d,0x5a,0xeb,0xb4,0xc5,0x34,0x4e,0xdf,0xa8,0x05,0xf2,0x35,0x68,0x74,0x83,0xf3,0x90,0x36,0x2c,0x46,0xcd,0x6d,0x27,0xe5,0x40,0x07,0xb8,0x34,0x6f,0x80,0xcf,0x17,0x9b,0xae,0x68,0x59,0x25,0xed,0x70,0x9e,0xb9,0xfa,0x89,0x44,0x10
.byte 0x4d,0x6e,0xef,0x22,0x08,0x99,0x5e,0x07,0x9b,0xb7,0x31,0xfe,0x89,0x1c,0x7e,0x0c,0x0e,0xdf,0x4e,0xdc,0x04,0x43,0x67,0x27,0xfb,0x1d,0xd9,0x97,0x75,0xad,0x1d,0x6d,0x14,0x90,0x33,0x64,0x8c,0xbb,0xa4,0x61,0xcf,0x00,0x93,0xf4,0x4c,0xc2,0x49,0xda,0xc1,0xcd,0x55,0xba,0x39,0xa8,0x82,0x93,0xc5,0x3a,0xc9,0x4a,0x68,0x31,0x00,0x1b
.byte 0xcf,0x7a,0xaf,0xff,0x0c,0x86,0x92,0x2a,0xda,0x71,0x55,0xcc,0xba,0x50,0x61,0x0c,0xb0,0x6e,0xe9,0xac,0x21,0x29,0x70,0x5c,0xbd,0xc6,0x4c,0x8f,0x96,0xa8,0x5f,0x51,0x8b,0xec,0x9d,0x32,0x13,0x09,0x7e,0x1b,0xa2,0xec,0x14,0x66,0x90,0xae,0x04,0xe8,0x90,0xe3,0x46,0x82,0x17,0x69,0xa5,0x22,0xb0,0x28,0x1a,0x24,0xe6,0x27,0xd6,0x8b
.byte 0x97,0x54,0xbd,0x49,0xfb,0xb7,0xa7,0x17,0x6f,0xdd,0x84,0x1d,0x10,0x1a,0x40,0x79,0x98,0x40,0x4e,0xa5,0xa6,0x17,0x0d,0xe9,0x48,0xfe,0x73,0x95,0x2e,0x3f,0xb5,0x23,0x59,0x87,0x66,0x8a,0xa7,0x6a,0x98,0x6f,0x49,0x05,0x02,0x5a,0x6b,0x5f,0x46,0xdd,0x89,0xd1,0x4a,0x11,0x10,0xcf,0x0d,0x76,0x2e,0x4c,0xa4,0x15,0xd6,0xbd,0x2a,0xaf
.byte 0xff,0xe0,0x9b,0xd8,0x35,0x46,0x15,0xa5,0xf8,0x92,0xe1,0x5f,0x05,0x2a,0x45,0xe0,0x51,0x47,0x41,0x36,0xaf,0xbf,0x33,0x1b,0x8d,0xd8,0xf2,0x83,0xfd,0x01,0x4d,0x10,0xe7,0x60,0xd8,0x94,0x1b,0x51,0xcc,0x87,0x80,0xe8,0x59,0x87,0x4f,0x03,0x2c,0xef,0xbf,0xd6,0x0a,0x23,0xe8,0xb5,0x24,0x4c,0xe7,0x97,0xf0,0x83,0x95,0x25,0x42,0x0f
.byte 0xda,0xb8,0xd6,0x88,0x63,0x61,0x69,0xb5,0x0f,0xf6,0x31,0x3d,0xc6,0xc6,0x82,0xd8,0xc4,0xe5,0xce,0x09,0x30,0x4c,0xc7,0x87,0x39,0x47,0xae,0x18,0x46,0x23,0x11,0x8c,0x58,0x15,0xa8,0x22,0x63,0x16,0x44,0xe3,0x68,0x92,0x9a,0xac,0xec,0xdd,0x6d,0x17,0xbe,0xdd,0x73,0x14,0x7d,0xb0,0x7e,0xdf,0x75,0xa5,0x96,0xfd,0x7d,0x4e,0xa6,0xee
.byte 0x35,0x21,0x9a,0x16,0x22,0x89,0x69,0xcd,0x26,0xfd,0xbb,0x1a,0x76,0xb8,0xed,0x33,0x38,0x41,0x13,0x3d,0xce,0xd3,0xdd,0x99,0xa9,0xc4,0x4d,0x5b,0xd4,0x76,0xd7,0xbb,0x6e,0x59,0x78,0x43,0x43,0xb2,0x32,0x0d,0x30,0xe7,0xa7,0x90,0x7d,0xb0,0x5a,0x5a,0x99,0x7b,0xb3,0x7d,0x43,0x91,0x91,0xbc,0x2f,0x55,0x3f,0x6e,0x69,0x87,0x29,0x89
.byte 0xd8,0xe8,0x0c,0x65,0x3e,0xab,0x21,0xee,0x1c,0xe1,0xc0,0x9e,0x2a,0xc7,0x3e,0xa9,0x94,0x58,0xad,0x74,0xf4,0x61,0x1f,0xdd,0x24,0xba,0x39,0x46,0x7e,0x11,0x1b,0x88,0xe6,0x69,0x28,0xfe,0xd0,0x38,0x61,0xc6,0x74,0x8b,0x33,0x89,0x32,0xe4,0x71,0xa2,0xd0,0xac,0x15,0x62,0x51,0xb4,0x55,0xbf,0xa1,0x1f,0x17,0x42,0x10,0x14,0x77,0x38
.byte 0x9f,0xb8,0x14,0x2b,0x2f,0xf5,0x11,0xfc,0x1e,0x9b,0xa9,0xee,0x03,0xc3,0xc9,0x06,0x42,0xa7,0xa0,0xe1,0x76,0x8e,0xc5,0x6c,0x2f,0xec,0xeb,0x6d,0xb4,0xd8,0x56,0xeb,0x99,0x04,0x0d,0x1a,0xae,0x54,0xe5,0x47,0x91,0xcc,0xaa,0xc4,0x26,0x77,0x1b,0x89,0x0d,0xe7,0x7f,0x25,0x42,0x14,0x55,0x87,0x17,0x75,0x53,0x64,0x6c,0xf3,0x52,0x71
.byte 0x2d,0xd2,0x17,0x80,0xca,0x52,0xb3,0x93,0x58,0xac,0xa0,0x8e,0x2b,0x8a,0xe7,0xbd,0x29,0xd7,0xd0,0xfa,0x3a,0xcb,0xc2,0x61,0x8e,0x04,0xc6,0x63,0xff,0x9c,0x31,0x36,0xcf,0x51,0x95,0xe9,0xd0,0xfe,0x6f,0x8b,0xe0,0x9a,0x9e,0x70,0x4e,0x29,0x1e,0xd3,0xec,0xde,0x9c,0x85,0x82,0xca,0x36,0xd4,0xf1,0x58,0x0e,0x38,0xc7,0x9b,0x61,0x87
.byte 0x24,0x05,0xc5,0xeb,0xe1,0xa7,0xa7,0x65,0x2d,0x73,0x10,0x85,0x90,0xe6,0x3c,0x18,0x22,0x9a,0x59,0x8e,0xdc,0xfd,0xc9,0x3f,0x76,0x7c,0xe5,0xb6,0x9d,0xd5,0x84,0x9a,0xcc,0x02,0xa8,0x94,0xf0,0xa5,0xff,0x16,0x4a,0xe1,0x9f,0x23,0x5d,0x6e,0xc7,0x4d,0x93,0xfa,0x5f,0xa4,0x76,0xa4,0x91,0x64,0x95,0x67,0x3c,0x47,0x8a,0xe0,0x5f,0x93
.byte 0x6b,0xa7,0x3e,0x56,0xfa,0xf1,0x1e,0xeb,0x03,0x45,0x17,0x2a,0xa2,0x78,0xe9,0x6d,0x0e,0x77,0x71,0x6f,0x40,0x94,0xce,0x28,0x16,0xa3,0xa9,0x44,0xa3,0x87,0x56,0xb1,0xf7,0xa7,0x9c,0x4c,0x22,0x69,0x8d,0x89,0x89,0xdb,0x2c,0xed,0x23,0x19,0x40,0x29,0x71,0xcd,0xf7,0xfa,0x9d,0xfe,0x04,0xb5,0xc0,0x8d,0xb0,0xb5,0x19,0x31,0x0b,0x1e
.byte 0xeb,0x2d,0x1d,0x13,0xab,0xee,0x8b,0x9f,0x87,0x04,0xc8,0xe3,0xaa,0xf6,0xb3,0xf0,0x44,0xa1,0xb0,0x8b,0xea,0xde,0x8b,0xfb,0x6d,0x93,0xdd,0x49,0x6a,0xab,0x6f,0xae,0xad,0xf6,0x5e,0x2a,0xe8,0xb5,0xb3,0x03,0x3f,0x09,0xe8,0x69,0x38,0xc7,0xb9,0xf9,0x56,0x94,0x50,0x73,0x31,0x21,0x4b,0x6e,0xd3,0x0f,0x5e,0x8f,0xcb,0x6a,0x06,0x08
.byte 0x80,0x5b,0xd0,0x5d,0x5f,0x09,0xa0,0x31,0x46,0x4d,0x79,0x49,0xfc,0x4e,0x89,0x83,0xbb,0x6c,0x6d,0xc5,0x69,0x8f,0xb6,0xa6,0x99,0x0b,0xe5,0x0d,0xb5,0xa9,0xa7,0xc9,0x15,0xde,0x52,0xb3,0xa4,0x3f,0x3e,0xb2,0xb7,0x0c,0xe6,0x84,0x66,0x67,0x4c,0xa6,0x1a,0xbf,0xff,0x31,0xfb,0x69,0xee,0xc4,0xab,0x95,0xb6,0x5f,0x49,0x21,0x62,0x09
.byte 0x70,0xb9,0xa0,0x41,0xca,0x23,0xd2,0xc0,0xde,0x5d,0x2e,0x3e,0x41,0x33,0x7a,0xa8,0x23,0x3a,0x11,0xf9,0x2d,0x3f,0x86,0xe8,0x46,0xbb,0xc1,0xa6,0xb3,0x63,0xf9,0x9e,0xbc,0xbd,0x90,0xef,0x11,0x94,0xda,0xbd,0x92,0xba,0x36,0x96,0x27,0x66,0x87,0x12,0x13,0xe7,0x04,0x25,0x01,0xa8,0x20,0xcb,0x34,0xfd,0x6a,0x97,0x48,0x36,0xf4,0xa1
.byte 0x2d,0x56,0x61,0x72,0x9f,0x59,0x61,0x30,0xb4,0xb1,0x94,0xa8,0x71,0x08,0xd2,0x0b,0xa5,0x9c,0x3d,0x70,0xa4,0x54,0x61,0x82,0x4d,0x00,0x2a,0x7c,0x10,0x61,0x64,0x8e,0xd9,0x96,0x7d,0xdb,0xa0,0xcc,0x34,0xb4,0x24,0xea,0x46,0x12,0x81,0x65,0x52,0x68,0xb4,0xa1,0x56,0xdd,0x51,0x8b,0x4d,0x15,0xd9,0x72,0x9b,0x87,0x89,0xf3,0x31,0x6d
.byte 0x83,0xb5,0xa6,0xb5,0x91,0xbe,0x9a,0xb8,0x1e,0x1e,0x5e,0xec,0xe0,0x6c,0xd7,0x3e,0xcc,0x0b,0x9d,0x5b,0x26,0xcc,0xb8,0xfe,0x17,0x14,0x68,0xa3,0xb5,0x6b,0x0d,0x68,0x75,0x06,0x14,0x22,0x3e,0xc8,0x28,0xa6,0x2c,0xc7,0xd4,0x08,0xe7,0xa5,0x8e,0xe5,0x76,0xb6,0x3c,0xce,0xb2,0x54,0xcb,0x27,0x39,0x9d,0x49,0xfc,0x1c,0x9d,0xf4,0xa3
.byte 0x46,0x98,0xae,0xd8,0x9b,0xed,0x85,0x17,0xe0,0xa4,0xd4,0xad,0xd3,0xed,0x1b,0x43,0x04,0xc5,0x10,0x36,0x8f,0x5e,0x06,0xfb,0x17,0x96,0x95,0xe5,0x8c,0x11,0x8c,0xb4,0xb0,0x6a,0xdf,0x8a,0xf8,0x75,0xe8,0x03,0xce,0xc2,0x43,0x26,0x98,0x48,0x3a,0x77,0x0b,0x34,0x22,0x78,0xee,0xc1,0x13,0x29,0x71,0xdd,0xde,0xd3,0x65,0x35,0xc2,0x28
.byte 0xe2,0x8f,0x21,0xde,0x45,0xa1,0x14,0xff,0x79,0x0b,0xad,0x7b,0x9a,0x57,0x2c,0x08,0x4d,0x09,0x62,0x85,0x01,0xf0,0x9f,0xc3,0xf2,0xbd,0xfc,0x1a,0x4d,0xaa,0x89,0xbf,0xe1,0xb1,0x72,0x27,0x04,0x2d,0x6b,0x7d,0x18,0x73,0x10,0xee,0x32,0xbe,0x4b,0x0d,0xe7,0xd6,0x2b,0x68,0x2f,0xda,0x46,0x0e,0x6d,0x07,0x3f,0xea,0x46,0x0e,0x57,0x58
.byte 0x71,0xa0,0x23,0x78,0x21,0x2a,0x8b,0xcc,0x2c,0x6b,0xcc,0x90,0xf6,0xb0,0x3a,0x70,0xef,0x7c,0x89,0x71,0xcc,0xc2,0x0b,0xab,0x8b,0x10,0xa9,0xf9,0x8e,0xca,0xf8,0xbf,0xa1,0x6a,0x20,0xf8,0x87,0x34,0x63,0x57,0x5f,0x5c,0x3a,0x71,0x6e,0x91,0x5f,0x4b,0xf6,0xc6,0x75,0xa7,0x98,0xdf,0x6a,0x57,0xb7,0x8c,0xbc,0xc3,0x26,0x35,0xd0,0x93
.byte 0x3b,0xb1,0x51,0x95,0x1a,0x6f,0xae,0x6a,0x5e,0x55,0x27,0xae,0xe4,0x99,0x5d,0xb2,0x73,0x35,0xc1,0x37,0xae,0xc7,0x68,0xf3,0x62,0xdd,0xca,0xa3,0x9f,0x39,0x02,0xc7,0xdf,0x3c,0x97,0x96,0x5a,0xd4,0xea,0xea,0xb7,0x6b,0xc3,0x08,0x49,0x93,0xdb,0x9b,0xe5,0x7f,0x7e,0xc0,0x0a,0xf3,0x35,0x9e,0xe4,0x40,0x72,0x27,0x0f,0xc1,0x7b,0x8c
.byte 0x23,0xa6,0x52,0xa3,0xac,0xd7,0x63,0x10,0x83,0x86,0x36,0x2e,0x99,0xf0,0x75,0x53,0xa2,0x2e,0x7f,0xaa,0x22,0x39,0xf9,0xe5,0x6a,0x9b,0x72,0xa9,0xa2,0xc3,0x7c,0xce,0xd6,0x1b,0x1e,0xfe,0xd1,0xd4,0x52,0x58,0xe5,0xad,0x7c,0xbd,0x67,0xf0,0xa9,0x1f,0x5a,0xed,0xf3,0x4f,0x29,0x17,0x12,0x2c,0xbe,0x01,0x54,0x88,0x3d,0x4d,0xb4,0xd7
.byte 0xd0,0xad,0x46,0x9d,0xfa,0x62,0xab,0xf3,0x3d,0xcf,0x4a,0x89,0xd7,0x60,0xa8,0xde,0x73,0xfe,0xa6,0x2f,0xad,0xf7,0x4d,0x03,0xff,0xbc,0x3c,0xf7,0x3d,0x58,0xc2,0xf1,0xe5,0x80,0xd3,0xf0,0x7a,0x90,0x2c,0xd2,0xf3,0x85,0xb8,0x30,0xbd,0xc2,0x35,0xd0,0x30,0xe1,0xdd,0x6c,0x31,0x08,0xbf,0x75,0x61,0xe1,0x79,0x07,0xa9,0xe4,0x46,0x80
.byte 0x0b,0xf8,0x74,0xbf,0x7a,0x71,0x95,0x87,0x4f,0xc3,0x7e,0x32,0x9a,0x41,0xb5,0xa6,0x46,0x3c,0x07,0x1a,0x84,0x6a,0xf2,0xf2,0xc4,0xb1,0x0d,0x01,0xb4,0x9f,0x48,0x13,0xa3,0x8b,0x4d,0xbf,0x64,0x00,0x01,0xec,0x9d,0x35,0x1d,0xdc,0x62,0x92,0x19,0x48,0x3c,0x97,0x8e,0xee,0x29,0x6d,0x63,0x6c,0xb2,0x84,0x9b,0x16,0x84,0x89,0x6f,0x97
.byte 0xd3,0x3e,0x98,0xb8,0x93,0x5d,0xd4,0xdd,0xc5,0x7d,0x55,0x4c,0x53,0x4e,0xf7,0x4b,0x32,0xa3,0xae,0x67,0xdc,0xe9,0x7c,0x7d,0x9f,0x62,0x4e,0xf9,0x59,0xff,0xf8,0xd9,0x81,0x54,0x2f,0xaf,0xbc,0xad,0xbe,0xc4,0xf5,0x2f,0x71,0x34,0x1c,0x79,0x21,0xb4,0xaf,0x6c,0x1d,0xc8,0xb0,0xd3,0x8b,0x8d,0x04,0xcb,0xf1,0x35,0xa8,0xde,0xa5,0xfb
.byte 0x9d,0xe5,0x98,0x8b,0xd2,0xd2,0x99,0x10,0x23,0xf7,0x0c,0x94,0xfd,0x9a,0x8a,0x4d,0x39,0x7e,0x79,0x2b,0x4a,0xe1,0x81,0x22,0x0d,0xb7,0x44,0xb1,0x9f,0x7b,0xd5,0xa6,0x7e,0x62,0x5c,0x3d,0x0f,0x00,0xf8,0x82,0xd0,0x30,0x05,0x05,0xc8,0x6e,0xc3,0x5c,0xdd,0xf8,0x18,0x7d,0x44,0xaf,0x28,0x5d,0x84,0x21,0xd2,0x5a,0x78,0x52,0x65,0x15
.byte 0x13,0xfb,0x25,0xb3,0xa4,0x7d,0x2f,0x5c,0xef,0xf6,0x6d,0xb4,0x9f,0xb6,0x21,0x9e,0xec,0xa5,0x15,0xc9,0xf0,0x92,0x92,0x36,0x49,0x46,0xea,0xe3,0x4b,0x38,0x5b,0xfa,0xc1,0x87,0x75,0x79,0x82,0xa0,0x37,0x30,0xca,0x0c,0xec,0x5b,0x5b,0xcd,0x1d,0x30,0xeb,0x63,0x11,0x66,0xb3,0x5f,0x81,0xfd,0x69,0x32,0x80,0x08,0x06,0xcf,0xbf,0xb0
.byte 0x31,0xec,0xa9,0x8f,0x66,0x00,0x05,0x55,0x04,0x0d,0xcf,0xb9,0x3f,0xcc,0x5b,0x1a,0x11,0xb4,0x96,0x39,0x70,0x26,0xd2,0x4d,0x4e,0xac,0x2b,0x36,0x4c,0x77,0x0b,0xc2,0x9b,0xd0,0xc6,0x03,0xc6,0xec,0xdd,0x74,0x53,0xe5,0x8a,0x9c,0x17,0xe0,0x1b,0xe8,0x1e,0xfb,0x9a,0x11,0x61,0x68,0xe0,0xf5,0x3e,0xe2,0x3a,0x4a,0x20,0xa0,0xe1,0x40
.byte 0xbe,0xdd,0xec,0x5e,0x1f,0x0f,0x87,0x9f,0x5d,0xc6,0x4b,0x2e,0x81,0x52,0x25,0x59,0x3e,0x3d,0xbb,0xb5,0x32,0x88,0xc0,0x3a,0x15,0x0d,0x77,0x9e,0x9e,0x31,0x26,0x61,0x24,0xa4,0xe6,0x35,0x50,0xca,0x61,0x55,0x8f,0x0a,0xaa,0x7c,0x3f,0x9e,0x30,0x04,0x03,0xa2,0x3c,0x2a,0x02,0xf4,0x70,0x9e,0xe7,0xa5,0x6e,0xb7,0x9b,0x4c,0x47,0xe5
.byte 0x1b,0xa7,0x91,0x36,0x1c,0xed,0x84,0xab,0xf4,0x33,0x56,0xb6,0x94,0xb8,0xa0,0x68,0x34,0x15,0x87,0xc6,0x7b,0x36,0xea,0x51,0x94,0xeb,0xde,0x6e,0xfd,0xde,0xe1,0x3c,0x44,0x04,0x8e,0xb1,0x35,0x4b,0x8c,0x2b,0xd2,0x4b,0x63,0x48,0x0c,0xbd,0x92,0x61,0x39,0x4d,0xdd,0xc9,0xb9,0x1f,0xf6,0xc8,0x70,0xfd,0x9c,0xd2,0xef,0x71,0x6c,0x32
.byte 0x99,0x2c,0xa5,0x8e,0xa9,0xb5,0x0f,0xeb,0x8d,0x9a,0xbc,0x2a,0x3f,0x11,0x68,0xb6,0xdf,0x93,0x4d,0xd3,0x6c,0x00,0x45,0xc3,0x5a,0xad,0xaa,0xe7,0x31,0x9c,0xad,0x9a,0xe4,0xf7,0xda,0xa0,0x5b,0x0b,0x23,0x78,0x40,0x92,0x12,0xe9,0x66,0x7c,0x04,0x60,0xbd,0xd2,0x74,0xcf,0xc9,0xd7,0xae,0x47,0x69,0x4b,0x5b,0x16,0x64,0x48,0xca,0x03
.byte 0x27,0x30,0x4c,0x65,0x0c,0xbf,0x74,0x03,0x81,0xaf,0xa2,0xb4,0x45,0xfe,0x9e,0x66,0x3a,0xa2,0xc8,0xce,0xc3,0x5e,0x6b,0xc7,0x70,0x51,0xfa,0xe3,0xce,0xc3,0x18,0x7b,0x39,0xfc,0x6f,0xae,0x31,0x09,0x2d,0x63,0xb7,0xb8,0x43,0x5c,0x78,0xa9,0x35,0xae,0x87,0x2a,0xf0,0xbc,0xc1,0xd8,0x21,0x02,0x2e,0x11,0x6b,0x41,0xa9,0x21,0x8d,0x94
.byte 0x70,0x85,0x08,0x22,0x9e,0xae,0x38,0x23,0x07,0x97,0x72,0xd5,0xa6,0x3c,0xb2,0xb9,0xaf,0x2e,0x8f,0xd3,0x25,0xaa,0xc4,0xee,0x77,0x72,0x17,0xe4,0xa8,0x4a,0xf4,0x79,0x8c,0x37,0xa1,0x80,0xbb,0x82,0x29,0x3a,0x7c,0x8a,0x6f,0x3a,0x83,0xaa,0x94,0xf3,0x95,0x66,0x0e,0xdd,0x51,0x09,0x12,0xf8,0x1d,0xb9,0xa8,0x83,0x2d,0x29,0x34,0xd5
.byte 0x53,0xcd,0xeb,0x22,0x31,0x22,0xea,0x65,0xb4,0x8c,0x0c,0x1b,0xf7,0x72,0x54,0xed,0xd3,0x2e,0xd6,0xc2,0xed,0xe9,0x12,0x61,0x7a,0x51,0xc8,0x50,0x01,0xf9,0xe8,0x12,0x43,0x4e,0x58,0x29,0xec,0xeb,0xdb,0xcd,0x94,0xba,0xaa,0x87,0x4d,0xbf,0x20,0x3e,0x31,0x05,0x7b,0x5a,0xfa,0x9a,0x16,0x14,0x11,0x2c,0x9f,0x96,0xe6,0x38,0xff,0xfa
.byte 0x4e,0x05,0x3f,0xcb,0x13,0xdd,0x4e,0x70,0x41,0xce,0xb8,0xae,0xc2,0xf7,0x67,0xa0,0x68,0xb5,0x8d,0x03,0x72,0x4a,0x0e,0x27,0x99,0xef,0x09,0x32,0x3c,0x77,0xde,0x9c,0xfd,0x6c,0x65,0xcd,0x6b,0x10,0x42,0x08,0x12,0x30,0xa4,0x0c,0xdd,0xc9,0x86,0xc6,0xe8,0x84,0x6d,0x69,0x71,0x45,0x6b,0xb5,0xcb,0x74,0x81,0xe9,0x34,0xa5,0xf1,0x66
.byte 0x2e,0x31,0xcb,0xf8,0xec,0x9e,0x97,0x7e,0x3d,0x16,0xd7,0xab,0x5b,0xc8,0xf7,0x4f,0x59,0xbe,0x1f,0x12,0xfa,0x0d,0xb1,0x76,0x2d,0xe4,0x00,0xd9,0x30,0x3e,0x73,0x0a,0xa7,0xf7,0x19,0x06,0xe7,0xd4,0x81,0x2f,0xf0,0x8b,0x44,0xa9,0xaf,0xc8,0x95,0xd8,0xbb,0x92,0xb8,0x2f,0xd3,0x2c,0xcb,0x3e,0x5f,0x4e,0x42,0x2f,0x98,0x88,0xbc,0xf4
.byte 0x46,0x94,0x1d,0x5a,0x23,0xc8,0xb2,0x28,0x67,0xa7,0x26,0x1e,0x37,0x21,0x8a,0x7f,0xdc,0x8e,0x1c,0xa3,0x50,0x95,0x07,0xdf,0x8d,0x7b,0xab,0x29,0xc1,0x87,0x69,0x6a,0x8e,0xdf,0xcf,0x5f,0xb7,0x1b,0x8f,0xc7,0xc4,0x63,0x27,0x43,0x17,0x3d,0x29,0x94,0x71,0xa5,0xcc,0x1c,0xbf,0xc5,0x4a,0xd5,0x5e,0xe9,0x6d,0xa6,0x00,0x0b,0x41,0xe0
.byte 0x91,0x73,0xc9,0x22,0xf3,0xb2,0x5b,0x95,0xc8,0x5c,0x43,0xe2,0x48,0x3a,0x7e,0x67,0xf1,0x95,0x49,0xd9,0x47,0x68,0xc5,0xbf,0x28,0x2e,0x8c,0xcf,0x26,0xc2,0x23,0xec,0xb2,0xef,0xff,0x29,0x3d,0x7f,0x3f,0x4c,0xfb,0x7a,0x0d,0x80,0x89,0x0c,0x6d,0x45,0xf8,0xb9,0x72,0xa9,0x5b,0xbe,0x51,0x46,0x3b,0xe2,0x08,0x73,0x87,0x72,0x3e,0x1b
.byte 0x7e,0x05,0x9d,0xce,0xc7,0x14,0xbe,0x36,0xa9,0xf8,0x5f,0x3e,0x3c,0x82,0x83,0x75,0xd7,0x96,0x9e,0x1b,0x6d,0x5b,0x2b,0x7d,0xdd,0xb9,0x42,0x19,0xbe,0x57,0xe3,0x9b,0xcc,0x3d,0x26,0x80,0xec,0x68,0x52,0x8f,0x85,0xd2,0x12,0x7b,0xe1,0x31,0x64,0xd6,0xde,0xe1,0xc1,0x8e,0x8c,0x66,0x8c,0x6b,0xb2,0x5f,0x75,0x9a,0x1b,0x96,0x78,0xb5
.byte 0x79,0x53,0xbb,0x70,0x4c,0x5e,0x8e,0x60,0xfa,0x1e,0xee,0xde,0x8d,0xd1,0x33,0xf6,0x36,0x95,0x00,0x6f,0xba,0xc7,0xf4,0xd1,0x96,0x33,0xf8,0xa2,0x20,0x65,0xf3,0x97,0x7d,0x0b,0x68,0x23,0x3d,0x39,0x54,0x67,0xb5,0xfc,0xff,0x48,0x04,0xb0,0xd2,0xea,0x09,0x1b,0xff,0x41,0x00,0xff,0x2d,0xc6,0x9f,0x8b,0x37,0xc9,0x35,0x37,0x38,0xd7
.byte 0x68,0x0e,0xa9,0x9b,0x19,0x25,0x17,0x94,0x55,0x0b,0x09,0x7f,0xc5,0x2f,0xb5,0x93,0x61,0x91,0x30,0xe5,0x46,0x09,0xff,0xf7,0x9d,0x7d,0x5e,0x9a,0x0e,0x5f,0xc1,0x2f,0xf3,0x09,0xc6,0xb2,0x86,0xca,0x0e,0x6f,0x3e,0x17,0x43,0x7d,0x4d,0x51,0x33,0x2b,0x57,0xf8,0xd0,0x1a,0x0e,0x8e,0xe6,0xc3,0x87,0x35,0xe4,0x53,0x3c,0xdf,0x9a,0xc9
.byte 0x5a,0x5d,0x40,0x80,0x90,0x97,0x7f,0x8c,0x55,0xbe,0x19,0x57,0x96,0x55,0x2e,0x7b,0x27,0x79,0x19,0xeb,0x8e,0x7a,0x27,0xf0,0xc4,0x9a,0x16,0x12,0xc9,0x41,0xdd,0xec,0x12,0x58,0x95,0xca,0xc7,0x77,0xd8,0xd8,0x17,0xa5,0x9b,0x79,0x8c,0xcb,0x04,0x07,0x69,0x06,0xf2,0x71,0x33,0x5e,0x96,0x56,0x90,0x75,0xa3,0x1b,0x4b,0x1b,0x18,0x71
.byte 0x18,0x25,0xc2,0x81,0x16,0xb6,0xd1,0x35,0x53,0x58,0x2f,0x49,0x4e,0xf0,0xab,0x23,0xa9,0xc8,0x28,0xc8,0x8a,0x2a,0x94,0x55,0x72,0xa2,0xf0,0x25,0x47,0x30,0x85,0x79,0xba,0x91,0x38,0xfe,0xbf,0x9d,0x05,0x8d,0xf7,0xd5,0x77,0x71,0x06,0x22,0x14,0x8b,0xb6,0x42,0x90,0x39,0xca,0x23,0x78,0xde,0x54,0x0e,0xe8,0xc5,0xb4,0xd6,0x07,0xf6
.byte 0x4e,0xa9,0xb4,0x9a,0xa1,0x03,0x36,0x83,0xb9,0x69,0x29,0xf5,0xc6,0x98,0x9f,0x47,0x53,0x46,0x13,0xf3,0xe5,0x93,0x28,0x20,0x5d,0x1f,0x0f,0x6a,0xee,0xa8,0xc1,0x96,0x7f,0xcb,0xf4,0xc3,0x17,0x95,0x6a,0xe5,0xc7,0xb3,0x77,0x0e,0xa8,0x9f,0x91,0xfd,0xb2,0x4b,0x7d,0xf7,0x78,0x57,0x9e,0x87,0xd7,0xf4,0x3e,0x81,0xc4,0x91,0x71,0xd9
.byte 0x6b,0x21,0x78,0x82,0x8a,0x03,0x5b,0x2e,0x89,0xc9,0xd4,0xca,0x5d,0x32,0x57,0x43,0xb0,0xe5,0xe3,0x9f,0x93,0xb5,0x4d,0x52,0xce,0xe6,0x46,0x05,0xe8,0x36,0x26,0x35,0x90,0x69,0x0c,0x8e,0xf0,0x65,0x03,0x65,0x32,0x10,0xae,0xdd,0x85,0xdd,0xef,0x84,0x0e,0xd1,0x03,0x51,0x02,0x0b,0x37,0x0f,0xdf,0x95,0xbb,0x5b,0xe2,0x25,0xda,0xd6
.byte 0x0a,0x55,0x55,0x8a,0x3a,0x72,0xca,0xc3,0x6f,0x84,0xe9,0x09,0xad,0x2f,0x73,0x1b,0x99,0xa6,0x22,0xc4,0xc5,0xf2,0x40,0x44,0xd8,0x4b,0x7a,0x75,0x82,0x06,0x9c,0x0f,0x73,0x89,0xa3,0x57,0x3a,0xf7,0x36,0xcf,0x86,0x34,0x2f,0x37,0x01,0xcf,0x4b,0x4d,0x83,0xe4,0xe3,0x92,0x1c,0xe7,0x67,0x01,0x72,0xec,0x50,0xe0,0x9f,0x0a,0xa9,0x41
.byte 0xe2,0x4d,0x43,0x01,0x14,0xe0,0xbc,0x11,0x4f,0xf8,0xdb,0xab,0x6f,0x07,0x5a,0x71,0x28,0xb9,0xaf,0x6e,0xd1,0x3d,0x3c,0x6e,0xd9,0xa9,0xe4,0xe2,0x71,0x40,0x31,0x9d,0x48,0xcb,0x76,0x3e,0x5d,0x0d,0xb4,0x11,0x0c,0x4d,0x89,0xba,0x16,0x8a,0xd6,0x43,0x99,0x65,0xec,0xbd,0xdd,0xae,0x4a,0xb4,0x6c,0x77,0x36,0x5b,0xef,0x51,0x33,0xcd
.byte 0x3f,0x55,0xc5,0x00,0x25,0x85,0x0b,0x83,0xd6,0x22,0x70,0xb5,0x32,0x7f,0xb0,0x02,0x7b,0x8d,0x8c,0x09,0x37,0xf6,0x26,0x95,0xe2,0xb2,0x4c,0x7f,0x18,0x50,0xe9,0x96,0x65,0xe8,0x1a,0x70,0xff,0xbb,0x1e,0x35,0xda,0x41,0xbd,0x89,0xa8,0x7f,0xb0,0x85,0x05,0xd7,0xd1,0x11,0x66,0x2f,0xf6,0x66,0x50,0x05,0x66,0x58,0xb2,0x2a,0x5d,0xad
.byte 0x42,0x60,0x14,0x7c,0xad,0xba,0x03,0xf8,0xce,0x29,0x6b,0x13,0xb3,0xdf,0xd1,0x5a,0x7a,0x11,0x8a,0x8b,0x6c,0x62,0x12,0xc3,0x77,0x28,0xcc,0x34,0x18,0x67,0x46,0xb5,0xda,0x87,0x1f,0x65,0x01,0xe7,0xe3,0x55,0x17,0xaf,0xd3,0x40,0x32,0x23,0x16,0x0a,0x57,0x86,0xab,0xdb,0xd8,0x18,0x71,0x96,0x11,0x1c,0xc1,0x87,0xaf,0xc9,0x7a,0xfa
.byte 0x07,0x2a,0xdc,0x95,0x08,0xff,0xea,0x78,0x84,0x63,0x18,0xd5,0x54,0x6e,0x85,0x8e,0xcd,0xd6,0xff,0xea,0x8c,0xad,0xc4,0xdb,0x4f,0x33,0xcb,0x5c,0x01,0x6c,0xc4,0x60,0x04,0x43,0x7b,0x53,0x29,0x99,0xff,0xcd,0x4c,0xf1,0x82,0x11,0x85,0x84,0xf4,0xe5,0x29,0x65,0x6c,0x9f,0xb1,0x2b,0xa5,0xb5,0xc1,0xd6,0x5f,0xb7,0x0c,0x7b,0xf6,0x17
.byte 0xb7,0x80,0xaf,0xd2,0x9e,0x20,0x6e,0x01,0x5c,0x09,0x6b,0xd5,0xe3,0x4a,0x43,0x60,0x7e,0xc8,0xb4,0x1c,0x08,0x79,0x8e,0x48,0x71,0x22,0x81,0xd9,0x81,0x19,0x0a,0x04,0x29,0xce,0x09,0x70,0x82,0x49,0xc0,0xc0,0x3f,0xcc,0x9f,0x18,0x9a,0xd5,0x5e,0xde,0x70,0xdb,0x85,0xd8,0x53,0x71,0x7f,0x03,0xf1,0xf3,0x07,0x52,0x79,0x44,0xea,0xac
.byte 0xd9,0xf3,0x0c,0x1e,0xb5,0x57,0xf8,0xfb,0x41,0x69,0xf1,0xf5,0x40,0xc7,0xd7,0x94,0x06,0x95,0x3a,0x49,0x0c,0x09,0x84,0xa7,0x1c,0x42,0x52,0x65,0xb9,0xef,0x6f,0x9b,0x37,0x5e,0xc3,0x3e,0x6b,0x96,0x93,0x02,0x94,0x9a,0xdc,0x04,0xb2,0x85,0x3c,0xa9,0x5b,0xa0,0x55,0x2e,0xaa,0x06,0xfd,0xc6,0xbc,0x73,0x32,0x08,0x26,0x5b,0x0a,0xa2
.byte 0x42,0xf2,0x61,0xb8,0x09,0xf0,0xaa,0xee,0xb7,0x35,0x63,0xe5,0xb2,0xfe,0xec,0xe7,0xae,0x62,0xf2,0x43,0x12,0xde,0xb4,0x8f,0xc1,0x06,0x72,0xde,0x7d,0x75,0x54,0x07,0x4a,0x99,0x83,0x39,0x97,0x9c,0x1e,0xd4,0xaf,0x2a,0x8c,0xb4,0x92,0xb5,0x9a,0xf7,0x87,0x8f,0x60,0xda,0xe5,0x01,0xca,0xc6,0x61,0x3d,0xb1,0xbe,0x33,0x58,0x2e,0xb1
.byte 0x7e,0xa1,0x3b,0x93,0x8d,0x25,0xe3,0xb4,0xea,0x94,0x26,0xbe,0xa9,0xf9,0xa1,0x2f,0x61,0xf4,0x7c,0x32,0x31,0x2e,0x99,0xdb,0xa4,0x3f,0xbf,0xd9,0xdb,0xca,0xd8,0x3d,0xda,0x44,0xe0,0x14,0x39,0x18,0xff,0x3e,0x5b,0xd2,0xc9,0x91,0xe1,0xa1,0xea,0x3f,0x1b,0x0e,0xd6,0x82,0xa6,0xb1,0xa2,0x6f,0x85,0x51,0xfc,0xa8,0x47,0xd7,0x87,0x28
.byte 0xc6,0x2f,0x2a,0x9f,0xad,0x7e,0xcc,0xd9,0xd2,0xfa,0x4c,0x28,0xca,0x66,0x55,0x1e,0x26,0x6d,0x19,0xe4,0x47,0x25,0x18,0x12,0xc5,0xe1,0x12,0x43,0x7c,0x96,0xb7,0x52,0xa6,0x07,0x04,0x83,0x44,0x82,0xcd,0x4e,0x79,0x07,0x0c,0x01,0xe4,0x81,0x25,0x98,0xce,0x2e,0x07,0x3c,0x76,0x39,0x37,0xc0,0xd0,0x54,0x14,0xaf,0x6c,0x87,0x99,0x1e
.byte 0xf2,0xa3,0xd6,0x32,0x40,0xd1,0xe4,0x8d,0x60,0x32,0xf7,0xb0,0xaf,0x05,0x10,0x04,0xaa,0x99,0xfa,0xea,0x39,0x58,0x5f,0x30,0x06,0x2b,0x6d,0xd6,0x68,0x1c,0x85,0xcf,0xda,0xa9,0xd6,0xc3,0x05,0xd7,0xe3,0x3b,0x8c,0xc1,0xfe,0xf8,0x58,0x1d,0x1f,0x7b,0x80,0xcc,0xf3,0x4b,0x6f,0x3c,0x52,0x62,0x97,0x15,0xeb,0x5b,0x0f,0xaa,0x77,0x6c
.byte 0x82,0x63,0x5e,0x84,0xbe,0xc5,0xb5,0x50,0x48,0x7c,0x56,0xbf,0x3a,0x8c,0xb4,0xbc,0x3e,0x8e,0xcf,0x2d,0xa2,0x26,0x3d,0xde,0x9d,0x4b,0xda,0xa4,0xd9,0x9b,0x6d,0xeb,0x35,0x44,0xa9,0x06,0x20,0x39,0x83,0xd5,0xeb,0x09,0xf0,0x45,0xdb,0xbb,0x9d,0x53,0x4d,0xbe,0xe3,0x3e,0x66,0xee,0xb2,0xce,0x3a,0xf0,0x75,0x92,0x58,0x79,0x5a,0xba
.byte 0x1b,0x75,0x6b,0x83,0x0a,0xb6,0xe0,0x52,0xd3,0x61,0x2a,0xc0,0xa9,0x41,0x15,0x8c,0xd9,0x6b,0x87,0x94,0xda,0x31,0x0c,0x14,0x3e,0x37,0xd2,0xed,0xf6,0x40,0x57,0x70,0xc5,0xf5,0x0e,0xc4,0x3b,0x51,0xdf,0x4c,0xd2,0x42,0xbc,0xa5,0x3b,0x88,0x78,0x85,0x16,0x6c,0xaf,0x19,0xcf,0xb0,0x6a,0x42,0x07,0x66,0xf6,0xa7,0x4a,0x77,0x87,0x5f
.byte 0x81,0x78,0x84,0xea,0x86,0xeb,0xe9,0x86,0xba,0x00,0xb4,0xe2,0xe7,0xd0,0x91,0x3d,0x9c,0x80,0xd6,0x37,0x86,0x96,0x80,0xcc,0xa0,0x8d,0xaa,0xc3,0x4f,0x79,0x9d,0xb8,0xa6,0xfb,0x0e,0x34,0x0d,0x54,0x1d,0xc1,0x51,0x62,0xb1,0x7b,0x8a,0x63,0x2c,0xbd,0xac,0xc7,0x6d,0x03,0xa2,0xdc,0xba,0xc9,0x70,0x9b,0x34,0x19,0x26,0x7f,0xd1,0x1e
.byte 0xf7,0x47,0x38,0x3c,0x50,0x28,0xf8,0xba,0x0e,0xa0,0xfb,0x03,0xa1,0xb4,0x5e,0xf7,0x77,0xec,0x5d,0x94,0x6e,0xe6,0x40,0x1d,0xe4,0x0d,0x23,0x9f,0xe1,0x8c,0x7f,0xfa,0x83,0xd9,0x39,0x67,0xbd,0x41,0x82,0x37,0x7c,0x6a,0xc5,0x74,0x0d,0x41,0x35,0x55,0x64,0x7f,0x4c,0x3e,0x13,0xfc,0x41,0x4f,0x5e,0x1b,0xd8,0x4d,0x02,0x28,0x29,0x20
.byte 0x4c,0xcd,0x1b,0x5f,0xe7,0x51,0x68,0x2d,0x05,0xea,0x35,0x20,0xac,0x5b,0x44,0x70,0x02,0x55,0x20,0x17,0xcb,0xb5,0xd0,0xbf,0x79,0x33,0x02,0x69,0xa1,0xb0,0x24,0x10,0x62,0x0a,0x66,0x7c,0x0b,0xb2,0x50,0xa0,0xf6,0x94,0xf1,0x98,0xc7,0x8c,0x4a,0xef,0x03,0xb1,0x7e,0xe7,0x60,0xc0,0x38,0x7e,0xbf,0xbd,0x7a,0xa8,0x0b,0xe5,0x2d,0xed
.byte 0x68,0xb0,0x37,0xa2,0x9b,0x6e,0x20,0x06,0xd2,0x7c,0xf7,0x50,0x03,0x19,0x74,0xf5,0xc8,0x84,0x44,0xeb,0x63,0x3f,0x10,0x63,0x36,0x62,0x48,0x96,0x4d,0xde,0xf2,0x08,0xc6,0xf4,0x09,0xeb,0x37,0xe8,0x0f,0x29,0xb5,0x9f,0xe6,0x58,0x86,0xf5,0xeb,0x18,0xa8,0xe0,0x28,0xf4,0x79,0x1f,0x98,0x60,0x82,0x67,0x06,0xfd,0x21,0x04,0x4d,0x33
.byte 0x17,0xc5,0x2f,0x3e,0x0d,0x8d,0x02,0x37,0x9b,0x66,0xb0,0x06,0x09,0xe0,0x92,0x10,0xb9,0x04,0x3a,0xc6,0x42,0x34,0x70,0xcb,0x51,0xd0,0x78,0xd3,0x0e,0x83,0x65,0x00,0xcf,0x95,0x83,0x51,0xca,0x62,0xfe,0x3e,0x3f,0xc4,0x7f,0x10,0x5b,0x85,0x00,0x5f,0x7d,0x38,0x93,0xf3,0xb7,0x33,0xbd,0x4c,0x1d,0xcd,0xc9,0xfa,0x05,0xb6,0x31,0x78
.byte 0xc8,0xc8,0x51,0x34,0xd6,0xb5,0x1a,0xa2,0xdb,0x7f,0x3d,0x8a,0x1b,0x49,0x36,0xaf,0x49,0x99,0x10,0x65,0xbe,0x19,0xf9,0x9f,0xaa,0xd6,0xc6,0x69,0x52,0x42,0x79,0x6b,0x64,0x53,0x90,0xb7,0x7f,0x7f,0xd2,0xde,0xe2,0xda,0x5f,0x3e,0xa6,0x5d,0xf2,0xcc,0x8a,0x88,0x2f,0x44,0xcf,0x07,0x77,0x7b,0x20,0x55,0xcc,0xa4,0x48,0x7d,0x87,0x6a
.byte 0x25,0x35,0x07,0x7c,0x37,0x02,0xb5,0x7c,0x5f,0x2d,0xc2,0x92,0x1d,0xe5,0xb2,0x55,0x85,0xdd,0x58,0x24,0xc3,0x2a,0x11,0xca,0x02,0x36,0x44,0x96,0x7a,0xf3,0x42,0xfd,0x05,0xf8,0xe1,0xa0,0x06,0xd8,0x3f,0x37,0x4e,0x15,0xca,0x1c,0xe8,0x8d,0x20,0xed,0x83,0xa2,0x42,0x9a,0xe5,0x51,0xf0,0xae,0x43,0x9d,0xa8,0x76,0xb8,0xf6,0xca,0x06
.byte 0x5d,0xa1,0x61,0x36,0x4c,0x13,0x75,0xe5,0xbf,0x5c,0x40,0x43,0xa0,0x50,0x4e,0xf7,0xea,0x35,0xa2,0x43,0x38,0x6b,0x20,0x3a,0x8b,0x05,0x28,0xbe,0x72,0x16,0x48,0x9c,0xbf,0x2d,0xff,0x1e,0x0f,0x08,0x3b,0xaa,0x49,0x42,0x72,0x92,0x3b,0x4f,0x28,0x8b,0xab,0x4e,0xa0,0xaf,0x36,0xba,0x7e,0x19,0xa7,0xc7,0xfd,0xd4,0xe2,0x80,0x33,0x2b
.byte 0xb9,0x2d,0x81,0x65,0x43,0xe1,0x3e,0xab,0xa5,0x36,0x00,0x68,0xb8,0xd8,0x27,0x64,0x85,0x10,0x67,0x68,0xd0,0x66,0xeb,0x2f,0xf2,0xa0,0x6e,0x6b,0xd5,0xc3,0x5f,0xa3,0x95,0xc8,0x5e,0x0f,0x3d,0x61,0xb3,0x12,0x99,0xd6,0x9a,0xe5,0x40,0x47,0xb4,0xcf,0x83,0xf2,0x79,0x31,0x18,0x54,0x6e,0x9c,0x32,0x63,0x2f,0x06,0x94,0x7a,0xd7,0x46
.byte 0x5b,0xd4,0xe3,0x58,0xbf,0x54,0xeb,0x47,0x85,0x47,0xe1,0x47,0x11,0x08,0x20,0x75,0x33,0x5c,0xed,0x58,0x26,0x5b,0x0f,0x4e,0x0f,0x8c,0x25,0x8c,0x36,0x28,0x03,0x73,0x93,0xb0,0xc8,0x9f,0x5e,0xd7,0x9e,0x57,0x88,0x07,0x92,0x1a,0xa0,0xfe,0xd0,0xc6,0x1c,0x7c,0x48,0x34,0x52,0x10,0xd1,0x3a,0x82,0x8d,0xe9,0x52,0xa1,0xfe,0x87,0x0f
.byte 0x04,0x6a,0xb0,0x67,0xc6,0xd7,0x09,0x00,0x66,0x35,0x6a,0x67,0x12,0x92,0xf5,0xbb,0xc5,0x16,0x0d,0x20,0x71,0x52,0x30,0xbe,0x03,0xb2,0x36,0xcf,0x88,0x11,0xb0,0x93,0x4a,0x4f,0xb3,0xc5,0x7f,0xbe,0xff,0xc0,0x68,0xd7,0x44,0x6e,0x98,0x42,0x4b,0x21,0xbe,0xe3,0x33,0x30,0xa3,0xa5,0x3c,0x66,0x79,0xaf,0xe6,0x58,0x42,0x5e,0xc6,0xf9
.byte 0x5e,0xea,0x0a,0x5f,0x08,0x2d,0x96,0xa3,0xcc,0x17,0xf6,0xac,0x67,0xba,0xc4,0xf7,0x40,0xca,0xc3,0x66,0x36,0x01,0x29,0xcf,0xc2,0x1e,0xfa,0xe2,0xba,0x44,0x36,0xda,0xf6,0xc5,0x53,0x35,0x64,0x74,0x0d,0x16,0x75,0x2a,0x82,0x3a,0x4e,0x5a,0x2c,0x62,0x23,0x2a,0x66,0x0f,0xad,0xdc,0x44,0x77,0x2f,0x78,0x74,0x82,0xe2,0xbf,0x3e,0x19
.byte 0x00,0x58,0xb7,0x65,0xb0,0x24,0x87,0xc5,0xe0,0x7c,0xbd,0x3a,0x97,0x30,0xa7,0xd4,0x79,0x91,0x96,0x7e,0x7d,0x75,0xf5,0x9d,0xb3,0x0e,0x2a,0xde,0x08,0x96,0xb6,0xdc,0xa4,0xf6,0xf7,0xa4,0xde,0xb7,0x9b,0xc5,0x75,0xdf,0xa6,0xe1,0x6f,0x5a,0x9f,0xaf,0x1d,0x60,0xac,0xde,0x1a,0xb9,0x02,0x0b,0xc5,0x6e,0x24,0x59,0xf9,0xc8,0xdc,0x97
.byte 0x53,0xf4,0x1b,0xf8,0x53,0x80,0x34,0xaa,0x53,0xaf,0x06,0x79,0xeb,0x39,0x72,0xd4,0x1d,0xf2,0xb7,0x26,0x41,0x8c,0xc5,0x6d,0x86,0xf8,0x34,0x98,0x98,0xa0,0x19,0x2e,0x9f,0xb0,0x0b,0xe8,0x3d,0xef,0xe1,0xb6,0x18,0xc3,0x63,0xc4,0x0e,0x6e,0x92,0x41,0x43,0x9a,0x2a,0xe3,0x3a,0x9f,0xac,0xac,0x0a,0xe8,0x6a,0xa4,0xa6,0x97,0x0e,0xd9
.byte 0xbd,0x97,0x57,0x38,0x6c,0x2c,0xa4,0x62,0xdb,0xea,0xb6,0x90,0x4c,0x7c,0x29,0xd2,0x06,0x24,0x57,0x5d,0x2c,0x71,0xb4,0xa5,0x13,0x5e,0x6e,0xb5,0x42,0x7e,0xb5,0x3f,0xd0,0x49,0xa5,0xd2,0xf6,0xe5,0xc8,0x86,0xef,0xae,0xcc,0x98,0x5f,0x0d,0x43,0x20,0x2f,0xe4,0x90,0xd1,0x1d,0x66,0xc4,0x38,0x7f,0x63,0xea,0x39,0x8b,0x16,0xfa,0x19
.byte 0x77,0x8c,0xbf,0x28,0x4c,0xce,0x6c,0x08,0x98,0x7b,0x6a,0xf8,0xb3,0xc9,0x41,0xb1,0xf4,0xf4,0x05,0xbd,0xdb,0xd9,0xf8,0x0d,0x74,0xfe,0x3a,0x07,0xe7,0x11,0xbd,0x33,0xc2,0xd6,0x59,0x62,0x4f,0x22,0x86,0xf6,0xf2,0x9a,0x19,0x81,0xe7,0x17,0xfb,0xe7,0xfa,0x7f,0x6a,0xcf,0xf1,0x71,0xe7,0xf0,0xbb,0x6b,0xe1,0xc1,0x26,0x6e,0x41,0xfd
.byte 0xa4,0x83,0xd9,0x68,0xcd,0xc4,0x7b,0x04,0x7a,0x3f,0x18,0xa9,0x73,0x21,0xa2,0x38,0xc2,0xf4,0x88,0x7e,0xa6,0x20,0xaf,0x60,0xb9,0xb9,0xf0,0x74,0x52,0x3a,0x09,0xe6,0x22,0xc8,0xa0,0x0f,0xf1,0xa4,0x02,0x2a,0x80,0x17,0x40,0x83,0x26,0x5e,0xe5,0x78,0xc3,0x78,0x5b,0x9d,0x74,0xf4,0x4f,0x58,0x5a,0xfc,0xde,0x11,0xf7,0xee,0xdc,0x68
.byte 0x57,0x1a,0x54,0x0a,0xe3,0xf2,0x77,0xe1,0x36,0x4d,0xa4,0x9e,0xad,0x86,0x81,0x54,0xd9,0xa5,0x90,0x0e,0xa9,0xfb,0x95,0xaa,0x98,0xea,0x0d,0xc7,0x33,0x40,0x62,0x67,0xf2,0xdf,0x54,0x64,0x82,0xd0,0x21,0xd9,0x87,0xcb,0x47,0xff,0x3b,0xde,0x53,0x61,0x4f,0x33,0xb2,0x4a,0x76,0xd6,0xa2,0x66,0x93,0x39,0x8b,0xee,0xbc,0x0d,0x54,0x8e
.byte 0xe4,0xfe,0x4b,0xae,0x2f,0x05,0xcf,0xfc,0x0e,0xa7,0xc8,0x8d,0x43,0x66,0xc7,0xc8,0x64,0x49,0x57,0xca,0xe2,0x1a,0xac,0x11,0xc2,0x17,0xf2,0x6a,0xc5,0x97,0xb9,0x28,0xe0,0xe7,0x3b,0x6f,0x78,0x99,0x5c,0xec,0x30,0xb7,0x1c,0x9f,0x2f,0xac,0x4d,0x1d,0x90,0x8e,0x6a,0x0d,0x20,0xe6,0x43,0xf3,0x1e,0xa6,0xc8,0x00,0x0e,0x5e,0x62,0x9d
.byte 0xea,0x58,0x23,0x46,0x43,0x29,0xc6,0x1f,0x0c,0x9a,0x3e,0x19,0x53,0xf2,0x3f,0xd8,0x13,0x68,0x90,0x98,0xa3,0xcf,0x22,0x3c,0x55,0xfc,0x36,0x15,0x14,0x39,0x8b,0x32,0xa7,0x81,0x96,0xb1,0x3e,0xf2,0x2c,0xf8,0xea,0xf6,0x10,0xe5,0x89,0x30,0xa5,0xa4,0xc7,0x5b,0x41,0xfd,0x0c,0x39,0x60,0x9c,0x0d,0x49,0x36,0xa8,0xe6,0xe7,0x9c,0xbe
.byte 0x8e,0x23,0x7c,0xb2,0x86,0x6e,0x6b,0x0e,0xa7,0xa7,0xc5,0x42,0xcf,0x14,0xf1,0x88,0xb9,0x7b,0x1f,0xfd,0x5b,0xd6,0xbe,0xa7,0x19,0x15,0x29,0x34,0x44,0x40,0xc8,0xfa,0xde,0x69,0xde,0xec,0xa6,0x39,0xfe,0xce,0x44,0xa9,0x39,0x5d,0x6e,0xac,0x75,0x77,0x32,0xc5,0x28,0xfd,0x18,0xa0,0x2a,0x3e,0x1f,0x30,0x63,0x8e,0x46,0x15,0x49,0x49
.byte 0x15,0xb4,0x1b,0x69,0x83,0x92,0xac,0x3b,0x76,0x75,0x52,0x18,0xbf,0x0c,0xc0,0x55,0x80,0xac,0xf0,0x4f,0x49,0x00,0x6e,0xd2,0x46,0xcc,0x9d,0x4b,0xb3,0x75,0x6a,0x4b,0x43,0x29,0xf4,0x8f,0x9f,0x61,0x51,0xd8,0x59,0x8e,0x9d,0x9c,0x95,0x69,0xdc,0xba,0x73,0x03,0x55,0x65,0x19,0xc1,0x94,0x31,0xde,0x5e,0x26,0xd7,0x3c,0xde,0xae,0xf6
.byte 0xa0,0xf5,0xc4,0x9c,0x7c,0x3a,0x8d,0xe4,0x90,0x71,0xd6,0xc1,0x84,0xd9,0xb3,0x80,0xae,0x78,0x96,0xec,0x30,0x6d,0x2d,0x74,0x37,0x14,0x2b,0x6c,0x88,0x2c,0xcd,0xd3,0x50,0x15,0x38,0xf5,0xe2,0x85,0xaa,0x95,0xdd,0xed,0x8e,0xe4,0x6d,0xa5,0x6b,0x27,0xee,0x4b,0xaf,0x9e,0xbc,0xae,0xf9,0xc7,0x85,0x0e,0x30,0x30,0x10,0xde,0x9e,0xe5
.byte 0x05,0xd8,0xd9,0xaa,0x3c,0x6c,0x59,0x7d,0xc2,0x59,0x33,0xb5,0x94,0xc1,0xa8,0x27,0xff,0x7d,0xdd,0x6e,0x8b,0xc5,0x09,0x52,0x04,0x72,0x72,0x81,0x6e,0xaf,0xe0,0x15,0x42,0x4a,0xb3,0x46,0xdc,0xfb,0x8c,0x5a,0xe4,0xcc,0xfb,0x94,0x47,0xd7,0xe3,0x8e,0x6a,0x73,0x23,0x12,0xdb,0x2e,0x2b,0x7e,0x7a,0x25,0x7c,0x75,0x0e,0xa2,0x7e,0x20
.byte 0xdc,0xc9,0xc3,0xd5,0x63,0x96,0x19,0x25,0xb7,0xa4,0x8e,0x1a,0x5a,0x92,0x62,0xcb,0xa8,0x5b,0x80,0x61,0x26,0x1b,0x6d,0xab,0x1e,0x09,0xd4,0x06,0xd4,0x96,0xc9,0xc8,0x51,0xb9,0xfd,0x19,0xca,0xc6,0x65,0x74,0xf5,0x4d,0xee,0xc8,0x52,0xb4,0x17,0xff,0x63,0x46,0x45,0xdf,0x8f,0xd1,0x49,0x05,0xe3,0x36,0x76,0xdd,0x47,0x8a,0x7e,0x43
.byte 0x6d,0x0a,0x11,0x78,0xbc,0x56,0x6d,0x5e,0x62,0x5e,0x6d,0xfc,0x03,0x9c,0x53,0x25,0x10,0xc4,0xd4,0x48,0xf9,0x67,0xa4,0xb5,0x71,0xe7,0x08,0x42,0x37,0x1b,0xe1,0x9c,0xe6,0xb5,0xbc,0xf5,0xc6,0x56,0xab,0xd1,0x45,0x93,0x2c,0xbe,0x87,0x52,0x27,0xa1,0xe3,0x38,0x1a,0x4d,0xae,0x98,0xb3,0xf8,0x4d,0x00,0x76,0xe3,0x31,0x62,0x83,0x04
.byte 0xee,0x62,0x35,0x70,0xb4,0x98,0x4c,0x5a,0x0f,0xcf,0x94,0xf3,0x4f,0xab,0xd7,0xbc,0xa0,0x9f,0x5e,0xe7,0x58,0x40,0xb5,0x9f,0xf8,0xd3,0x86,0x25,0x13,0x12,0xb3,0x0a,0x72,0x1f,0xef,0x39,0x07,0xf4,0x1c,0x6c,0x38,0xb7,0xd5,0x5b,0xda,0x68,0xd5,0x68,0xc7,0xa6,0x2b,0x94,0x33,0x11,0xff,0x71,0x15,0x86,0x58,0xb5,0x62,0xdc,0x7a,0x1b
.byte 0xdb,0xc5,0x81,0x24,0xcb,0xcb,0xbd,0x03,0x15,0x8d,0xdb,0xdb,0x20,0x51,0x0e,0x2d,0xc3,0xa2,0x3d,0x3a,0x3d,0x00,0xdb,0xbd,0xf0,0xe4,0x82,0x8f,0x9c,0xf7,0xdb,0x82,0xac,0x50,0xe5,0x2b,0x35,0x65,0xee,0x7a,0x61,0x4d,0x29,0x32,0x60,0xd0,0x02,0x40,0x45,0x75,0xc7,0x48,0xa7,0x0f,0x1e,0x1c,0xb4,0xd9,0x06,0xd4,0x31,0x72,0x24,0x33
.byte 0x57,0xe6,0xe6,0x3d,0x3a,0xde,0xbd,0xc0,0xbc,0xfd,0x78,0xe5,0x8c,0x8f,0x36,0x33,0xba,0x70,0xea,0x78,0x30,0x50,0xb6,0x79,0xb5,0x63,0x43,0xea,0x88,0x6c,0x8c,0x9a,0x42,0x44,0x15,0xb9,0xdc,0xdf,0xaa,0xfa,0xe7,0x76,0x26,0x32,0x98,0x96,0xdc,0x0c,0x3f,0xf9,0xff,0x9e,0x09,0xba,0x19,0xef,0x10,0x35,0x93,0x3c,0xb8,0x48,0x39,0x05
.byte 0x98,0xaa,0x74,0x53,0xf3,0x2b,0x62,0xdd,0xa1,0x28,0xe8,0x0d,0x52,0x51,0x89,0x80,0x68,0x1d,0xb9,0x86,0x01,0x69,0x9b,0x53,0x5f,0xe8,0x05,0xe5,0x34,0x62,0xfa,0x70,0x9d,0xcd,0x00,0x74,0xf6,0xc3,0x68,0xb9,0x8d,0x7b,0xff,0x05,0x70,0xf9,0xa5,0xc8,0xa2,0x42,0xc0,0xc2,0x2e,0xb2,0xc1,0x33,0xfd,0x5c,0xf2,0x05,0x82,0xf2,0x29,0x0f
.byte 0xd1,0x05,0x13,0xba,0xe0,0xbd,0x00,0x89,0xbe,0x04,0xb3,0x09,0x1b,0xd5,0x3e,0x56,0x74,0xf9,0xb5,0xf5,0x46,0x13,0x1c,0x2f,0x90,0xd6,0x24,0xa1,0x5a,0x94,0x65,0x78,0x30,0x67,0x0e,0xe2,0xc9,0x9a,0x3f,0xe6,0xdc,0xdc,0xca,0x11,0xf4,0xd0,0x04,0xe4,0x14,0xef,0xc6,0x7b,0x11,0x14,0x29,0xc4,0xde,0xe7,0x25,0xeb,0x44,0x74,0x7e,0xdb
.byte 0x71,0x0b,0x58,0xdb,0x1f,0x15,0x85,0xb3,0x43,0x6d,0x3c,0xda,0x69,0x3c,0x84,0xf4,0x41,0x55,0xd0,0x99,0x4f,0x9b,0x8d,0x68,0x18,0x2c,0x2a,0x58,0xc8,0xc2,0xac,0xa5,0x30,0x37,0xa6,0x44,0xd0,0xd6,0x92,0xe4,0xa3,0x0d,0x2b,0xc4,0xa3,0x54,0xc2,0x3d,0xaa,0xf0,0x03,0x66,0x1e,0xac,0x05,0x5a,0xb5,0x46,0x96,0xc5,0x09,0x93,0xa7,0x98
.byte 0x16,0x5a,0xb7,0xfb,0x9f,0x70,0xcc,0xe5,0x03,0x74,0x66,0x2c,0xac,0x7b,0x11,0xfd,0x9d,0xf3,0x2d,0xaa,0xf0,0xea,0x4f,0x00,0x9d,0x11,0x20,0xa4,0x2b,0x3e,0x8e,0x2f,0xcd,0xfd,0x8d,0xaf,0xbe,0x8b,0x72,0xc3,0xd7,0x18,0x2c,0x88,0xdd,0xae,0x2e,0xf6,0xd9,0xb9,0x9e,0x68,0xb7,0xe5,0xde,0x83,0xeb,0x16,0x19,0x43,0x21,0xbb,0x24,0x33
.byte 0xc4,0xce,0xb2,0xb4,0x13,0x52,0xf5,0x62,0xfe,0xd1,0x37,0xf2,0xee,0xd4,0xa9,0x4b,0x35,0xf5,0xfd,0x7b,0xb0,0x85,0xee,0xb7,0x96,0x32,0x49,0x07,0x5f,0x98,0x8d,0x5e,0x16,0xdd,0xbb,0x88,0x82,0x1f,0x35,0x25,0x24,0x09,0x62,0x4d,0x82,0x09,0xa4,0x13,0x91,0x51,0xc9,0x85,0xae,0xee,0x2f,0x6a,0x9c,0xcc,0x73,0x8c,0x7c,0x61,0x05,0xc3
.byte 0x18,0xa1,0xc1,0x7b,0x3d,0x85,0x0e,0x03,0x30,0xa5,0x5f,0x0b,0x33,0xd6,0xc8,0x1a,0x37,0xb0,0x3e,0xc7,0x7e,0x24,0x53,0x7f,0xfe,0x64,0x91,0x46,0xf9,0x6a,0x4a,0x87,0x92,0x0e,0x4d,0x62,0xb8,0x70,0xf9,0xa3,0x76,0x5e,0xc1,0x45,0x24,0x46,0xe9,0x0a,0xf0,0x50,0x21,0x3c,0x6a,0x3a,0x90,0x1b,0x36,0x5d,0xc6,0xd5,0x48,0x78,0x09,0xe0
.byte 0x24,0xd8,0x16,0xc0,0xec,0x3a,0xb5,0x12,0x8c,0x7c,0xc0,0xb1,0xf7,0x00,0x63,0x96,0x37,0x44,0xc2,0x8f,0xad,0xdc,0xda,0xa4,0x3a,0x5c,0x04,0x14,0x60,0xc4,0xf5,0x64,0xdd,0xf1,0xd9,0x04,0x6f,0xc6,0x0b,0x3d,0x7d,0x40,0x32,0xcc,0x79,0xb5,0x2f,0x99,0xc3,0xf7,0x7b,0xd9,0x54,0x60,0x49,0x46,0x92,0xd8,0x71,0x3e,0xca,0xfe,0x8c,0xb3
.byte 0x52,0x3b,0xbf,0x42,0xec,0xab,0x71,0x0d,0xa6,0xb9,0x53,0x37,0xed,0x01,0x58,0xbc,0x00,0x55,0x5d,0x0d,0x0d,0xb0,0x62,0x53,0xbf,0x76,0xba,0xfa,0x15,0xe7,0x22,0x69,0x9d,0x1c,0x23,0xfc,0x2d,0x65,0xa0,0x6d,0xba,0x39,0x3e,0x51,0x51,0x4b,0x50,0x10,0x59,0x04,0x82,0x92,0x75,0xa1,0x24,0x62,0xe3,0x5b,0x85,0xb1,0xfa,0xc4,0xc0,0xe9
.byte 0x26,0x19,0x63,0x2e,0xa9,0x16,0xda,0xae,0x45,0x1c,0x84,0x4c,0x94,0x6a,0xd0,0xd1,0xd2,0xb0,0x6c,0xb0,0x3b,0x3a,0x90,0x9e,0x7a,0xa7,0xb6,0x1b,0x2c,0x1d,0x7d,0xfe,0xfe,0xc7,0x7d,0x4d,0xf2,0xdf,0x23,0x54,0xea,0xb1,0xcf,0xd0,0xd1,0x1d,0xaf,0x01,0x86,0x73,0x18,0x1a,0x66,0xc1,0x66,0x32,0xd9,0xf3,0x07,0x65,0x6d,0xe9,0xae,0xfd
.byte 0xb3,0x8e,0x18,0x7a,0xb4,0x5d,0x53,0xb0,0x26,0x51,0x08,0x40,0x42,0x8e,0xcc,0xdc,0xdf,0x39,0x36,0xa5,0xbe,0x91,0x41,0xe4,0x78,0x29,0x76,0x54,0x61,0x43,0xa4,0xb7,0x94,0x0e,0x17,0x7f,0x46,0xad,0x5a,0x3d,0x6b,0xfc,0xf9,0xa0,0x3a,0xe5,0x86,0x75,0xc3,0xff,0xab,0xbc,0x99,0xeb,0x9f,0x85,0xb8,0x0c,0x9c,0x9b,0x6f,0xd3,0x74,0xf6
.byte 0x58,0x72,0x96,0x5c,0x49,0x31,0x4f,0x61,0x4f,0x78,0x8b,0x94,0x40,0x75,0xf4,0x66,0xcc,0xd9,0x27,0x9c,0x6d,0xac,0xef,0xa7,0x4e,0xd8,0xb7,0xf9,0x3a,0xf7,0x63,0xb5,0xec,0xc7,0xad,0xe5,0x2c,0x87,0xed,0xae,0x1e,0xdd,0x05,0x1b,0xf0,0x61,0x82,0xf3,0x40,0xc2,0x1b,0xe2,0xc7,0xce,0x2d,0x4c,0xbe,0x3a,0x51,0x63,0xef,0xe0,0xf2,0xae
.byte 0x0d,0xfd,0x6a,0x38,0x1f,0xc2,0xf1,0x91,0xc1,0x12,0x74,0x88,0x32,0x61,0xa7,0x65,0xea,0x30,0xfa,0x4c,0x93,0x61,0xef,0xa9,0x49,0x74,0xe7,0xfb,0x7a,0x3d,0xf9,0xbf,0xfe,0xdd,0x17,0x29,0xe5,0xdf,0xab,0x3a,0xf1,0xc2,0x1a,0x53,0x82,0xd0,0xe3,0x46,0x85,0x87,0x69,0xdf,0xb1,0x64,0xc3,0x39,0x24,0x27,0x29,0x16,0x66,0xb2,0x55,0xcf
.byte 0x2c,0xab,0x9e,0x35,0x4a,0x86,0x06,0x51,0x9d,0x1d,0x07,0x61,0x7f,0x71,0xa8,0x6f,0xef,0xf9,0x9d,0xf3,0x56,0xef,0x97,0x4a,0x6a,0x07,0x70,0xd7,0x80,0xcc,0x33,0x98,0x87,0x8e,0xa6,0xc3,0x18,0x58,0xfd,0xe9,0x4d,0x7d,0x07,0x8e,0x7d,0xae,0x30,0x1d,0x2d,0x1c,0x34,0x98,0x01,0xb9,0x13,0x86,0x13,0x26,0x55,0x15,0xe6,0x87,0x6f,0xc8
.byte 0x3c,0x4d,0x1e,0x70,0xdc,0x44,0x40,0xb0,0x69,0xe7,0xb4,0xf5,0x81,0x66,0xef,0x70,0x15,0xee,0x6e,0xb4,0x44,0x9e,0xbb,0x40,0x6f,0x5b,0x36,0x96,0xd4,0x52,0x8d,0x9e,0x0f,0x9a,0x97,0xea,0xd1,0x37,0x7e,0x9a,0x30,0xb4,0xe9,0x1f,0x01,0x0d,0x26,0xa6,0xb1,0x74,0x90,0x6e,0xe1,0xe0,0x67,0x7c,0x76,0x6c,0xed,0xbd,0x62,0x61,0x8d,0x66
.byte 0x7e,0x71,0x07,0x9a,0xcd,0x9e,0x7d,0xc7,0x78,0x39,0xaa,0xc8,0x83,0xdd,0xb7,0x28,0xb8,0xce,0x05,0x29,0x50,0x06,0xd0,0xe5,0xc2,0x01,0x31,0x7a,0x41,0x3a,0xdf,0x4f,0x7d,0xb3,0xa2,0x2a,0x5b,0x1e,0x39,0x1d,0xfd,0xbf,0x3c,0x9c,0xe3,0x17,0xfb,0x21,0x5d,0xdc,0x48,0x05,0xf1,0x36,0xac,0x98,0x9b,0xd2,0xb2,0xbd,0x97,0x2a,0x19,0x9b
.byte 0xfc,0x05,0x85,0x87,0x69,0x60,0x2c,0x83,0xfa,0x39,0xda,0x0e,0x3e,0x80,0xc9,0xf4,0x5a,0x6b,0xe3,0xda,0x72,0xed,0x42,0x39,0x67,0x00,0x38,0x7e,0x84,0xdd,0x5c,0x06,0x9c,0xee,0x4a,0xf3,0x75,0x32,0x6f,0x69,0x9a,0xa6,0x5e,0xb8,0x10,0x7d,0xe8,0x35,0x5e,0xa1,0x86,0x69,0x2a,0x48,0xa7,0x53,0xef,0xce,0x90,0x49,0xce,0x82,0x92,0x20
.byte 0xfd,0x71,0xe7,0xb4,0xce,0x81,0x01,0xf9,0xaf,0x36,0xd9,0xe2,0x28,0xe9,0xd0,0x9f,0x0f,0xf0,0x2f,0xca,0xa4,0x2b,0x90,0xdd,0x21,0x66,0x1c,0xbc,0x3f,0x80,0x89,0xcc,0x53,0xe5,0x72,0x91,0x45,0x9f,0x62,0x57,0x70,0x29,0xb9,0x6d,0x41,0xa3,0x67,0xf3,0x99,0xac,0x0e,0x3c,0x43,0x1f,0x92,0xf0,0xd5,0xca,0x86,0xad,0x0a,0xd4,0x2b,0xf4
.byte 0x3f,0x8f,0x90,0xcf,0x05,0x9f,0x07,0x07,0xac,0x36,0x5c,0x7d,0xb6,0xcb,0x9b,0x77,0x1a,0x11,0xed,0x0a,0x4e,0x1f,0x7b,0x68,0x39,0x88,0xb2,0x5d,0x8a,0x37,0x83,0x25,0xd6,0xc7,0x98,0x0a,0x1a,0x14,0x9a,0x1f,0x1e,0x66,0xd4,0x4f,0xd6,0x3f,0x88,0x7b,0x4a,0x18,0x06,0x27,0x79,0x40,0xc7,0xc8,0x54,0x8b,0xc8,0xc3,0x2e,0x56,0xf8,0x92
.byte 0xda,0xac,0x74,0x5b,0xaf,0x02,0x0d,0xe7,0xc4,0xf4,0x72,0xab,0xb1,0x83,0x4b,0x7a,0xe0,0xe1,0xe2,0xac,0xe7,0x20,0xbd,0xc3,0xda,0xae,0x10,0x47,0x68,0x3b,0xd1,0xc5,0xd7,0x28,0x8e,0x31,0xcf,0xba,0xe3,0x33,0x56,0x5e,0x8c,0x44,0xe4,0x41,0x9b,0xbb,0x8a,0x80,0x98,0xb8,0xc6,0x66,0x2c,0xa1,0x26,0x42,0xb4,0x90,0x42,0xf9,0xc5,0x4b
.byte 0x7c,0xaa,0xf1,0x70,0x8a,0x00,0x80,0x31,0xf9,0x0b,0x5e,0xec,0x25,0x36,0x2a,0x98,0x0c,0x05,0x97,0x23,0xd3,0x9e,0xf6,0xa9,0x11,0x8e,0xee,0x0a,0xda,0x8e,0xd3,0x65,0xc7,0x50,0x55,0xba,0x08,0x7e,0x78,0x1a,0x04,0x91,0x43,0x3a,0x14,0xfb,0x88,0x65,0x59,0xfe,0xf3,0xa6,0xde,0x3f,0x98,0xc4,0x7e,0x67,0x05,0x79,0x1f,0x26,0xce,0x9d
.byte 0xee,0x2c,0x86,0x81,0xf9,0x35,0x47,0x52,0x7b,0x35,0x6d,0xda,0x5f,0xd8,0x91,0x59,0x9d,0x8d,0x91,0xe7,0x3f,0x79,0x0c,0xca,0xc5,0x08,0xfd,0x59,0x24,0xaf,0x6c,0x3a,0x2a,0xd9,0xb6,0xaa,0x46,0x1b,0x9d,0x2e,0x17,0x5a,0x94,0x56,0xd4,0xb8,0xc9,0xb3,0xa5,0x4b,0xc7,0xfa,0x2d,0xd0,0x37,0x83,0xf1,0x53,0x27,0x42,0x8d,0x98,0x02,0x73
.byte 0x26,0x18,0x5d,0x32,0xf5,0xda,0xac,0x5d,0x45,0x10,0x58,0xec,0x0a,0xdd,0x8a,0xf0,0x65,0x03,0x6e,0x0f,0xd3,0x6d,0x83,0x2e,0x28,0x2c,0xd6,0x31,0x52,0x2b,0xb5,0x49,0x43,0x81,0xfd,0xd6,0x7c,0x72,0x19,0x9d,0x02,0x9f,0x15,0xca,0xfa,0x34,0xbe,0x10,0xf3,0x2d,0x93,0xcd,0xde,0x4f,0xb7,0xe9,0x74,0xb5,0x85,0xb6,0x1f,0xc5,0x14,0x1a
.byte 0x54,0x48,0x8d,0x0b,0x16,0x2c,0x62,0x15,0x64,0x55,0x7f,0x8e,0x59,0x10,0x53,0x98,0x2f,0x5d,0x92,0x7d,0x98,0x17,0x80,0x57,0x2d,0x5a,0x59,0x1b,0x97,0x46,0x59,0x1c,0x7c,0x3d,0x5b,0x4b,0x27,0x14,0xf3,0xfe,0x76,0x4e,0x1f,0xd6,0x2c,0x84,0x6e,0x8e,0xec,0xa7,0x0f,0x18,0x8f,0x96,0xd8,0xdf,0xba,0x1d,0x2d,0x41,0xd3,0xcf,0x2e,0xcc
.byte 0x52,0xdd,0xf9,0xd3,0x1b,0x6b,0xf9,0x4d,0x99,0xf9,0x19,0x58,0xc9,0x3f,0x4d,0xe9,0xad,0xd2,0xe8,0xd6,0x87,0x82,0xf0,0xcf,0x0d,0x17,0x30,0x85,0x9e,0x0e,0xca,0x15,0xa5,0x8e,0x88,0x27,0x7c,0xf7,0x3b,0xf3,0x43,0x5e,0xa6,0x3f,0x8d,0x86,0x5c,0x21,0x3b,0x20,0xf9,0xe4,0x55,0x37,0x8a,0x8c,0x41,0xcf,0x2c,0x8e,0xa9,0x17,0x96,0xaf
.byte 0x3a,0x8f,0x4b,0x3d,0x9d,0xb9,0x17,0xe9,0x46,0x2d,0xf5,0x4c,0xfd,0x0d,0xee,0xbe,0x25,0x84,0x75,0xda,0xaf,0x0c,0x87,0xb0,0x7a,0x29,0xd9,0x6a,0x0d,0x8a,0xad,0xb0,0xc5,0xac,0xf0,0xad,0x2c,0xec,0x2b,0x91,0x36,0xc5,0xbc,0xfe,0x92,0xa8,0x84,0xff,0xa5,0xf1,0x07,0xfc,0xeb,0xe4,0xd8,0x39,0x63,0x2e,0x4f,0xfd,0x46,0x64,0x3c,0xd1
.byte 0x3a,0x8d,0xab,0x8c,0xa1,0xd8,0x46,0xc2,0xf4,0xcf,0xa1,0x75,0xc3,0x50,0x97,0x8b,0x7c,0xdb,0x45,0x36,0x8c,0x85,0x0f,0xb9,0xfc,0x37,0xdd,0x64,0x68,0xe2,0xa8,0x9e,0x03,0x02,0x30,0x43,0x9f,0xb1,0xfe,0xe8,0x95,0xbf,0xfb,0x34,0x14,0x62,0xbf,0x0a,0x20,0x56,0x52,0x69,0xd5,0x2e,0x2f,0xff,0x4d,0xe2,0x27,0x99,0x32,0xb6,0x49,0xe9
.byte 0xa8,0xcf,0xe4,0x81,0xef,0x36,0x75,0x13,0x83,0x82,0x59,0x43,0x22,0x3c,0xfd,0xe7,0xf1,0x51,0x5d,0x1e,0x08,0xde,0xc6,0x6b,0x2d,0xd4,0x71,0xf8,0xe9,0xae,0x32,0x64,0x10,0x5d,0x96,0xf9,0xc2,0x2a,0x45,0x35,0x64,0x1e,0xdf,0xb9,0x24,0xf1,0x8d,0x75,0x95,0x2c,0x0b,0x9f,0x3f,0x12,0xe3,0x31,0xe4,0x8b,0x2d,0x1e,0xd2,0x9e,0xe7,0xde
.byte 0xc3,0x45,0x6f,0xe0,0xe0,0x7d,0xed,0x95,0xad,0xe7,0xca,0x27,0xee,0xc7,0x18,0x6d,0xcf,0x1d,0x2a,0x6c,0x37,0xc2,0xa6,0x82,0x26,0xb8,0x8e,0x6d,0x00,0x99,0x82,0x24,0xda,0xe3,0x9a,0x84,0x12,0x31,0xc3,0x3d,0x4b,0x44,0xde,0x8a,0x2b,0x64,0xc9,0xea,0xa9,0x73,0xd1,0xc6,0x75,0x3f,0x60,0xb9,0xdd,0x06,0x55,0xae,0x44,0x16,0x30,0xb8
.byte 0x02,0x07,0xe9,0x4f,0x23,0x1b,0x02,0x4f,0x2e,0xaa,0x43,0x34,0x44,0xca,0xf5,0x68,0x85,0xcc,0x50,0xc3,0x43,0x71,0xc8,0x24,0x6a,0x30,0x48,0xee,0xeb,0xd2,0xf3,0x18,0x7f,0xb0,0x89,0x68,0x80,0xa3,0xbb,0x06,0xf9,0x04,0xaa,0xda,0xd0,0xfb,0x47,0xd7,0xea,0x3e,0xf8,0x61,0x57,0x8f,0x1e,0xb7,0xc1,0x9e,0x09,0x7e,0x49,0x08,0x2f,0x8a
.byte 0xdf,0x04,0x85,0x40,0x6f,0xfa,0xc1,0x0b,0x0d,0x60,0xc4,0x88,0x58,0x99,0xbc,0xcc,0x67,0xba,0xab,0x39,0xeb,0x32,0x6e,0xe8,0xb6,0x82,0x78,0x15,0xc3,0x51,0xda,0x53,0x32,0x70,0xc7,0x0f,0x56,0x31,0x71,0xac,0xc8,0x62,0x04,0x58,0x2e,0x9e,0xcb,0x0f,0xb1,0x05,0x82,0x50,0x53,0xdd,0xa2,0x03,0x78,0x1a,0x4e,0x70,0x57,0x24,0xfa,0xa2
.byte 0x69,0xfa,0xd3,0x6c,0xd6,0x90,0x2b,0xed,0x7b,0x39,0xe8,0xed,0xa5,0x5d,0xf8,0xf2,0xbb,0xe5,0x09,0xa5,0x89,0x37,0x9a,0x3b,0xdc,0xae,0xd3,0xba,0x88,0xad,0x0b,0x41,0xf0,0x72,0x8a,0x40,0x32,0x98,0x77,0x3f,0x3a,0x37,0xa6,0x15,0x58,0xbd,0xf2,0x04,0x17,0x3d,0xcb,0x23,0x1f,0x49,0x19,0x62,0xc8,0x97,0x44,0xbd,0xf1,0x69,0x17,0x5f
.byte 0x08,0xee,0x0b,0x1c,0x71,0x46,0x5f,0x2a,0x40,0x74,0x0b,0xb0,0x8a,0xb3,0x15,0x8c,0xbc,0x8e,0x9c,0x53,0x8a,0x5f,0xd1,0x10,0xc7,0xbc,0x7a,0x85,0x6e,0x8a,0x35,0xd9,0x2c,0xf1,0xa2,0x16,0xdf,0xf0,0xaf,0x09,0x4b,0x9d,0xe6,0x22,0x5f,0xac,0x91,0x18,0x4b,0x3b,0x96,0xd8,0x2d,0x4e,0x03,0x81,0xe3,0xd8,0x8d,0x15,0x83,0x09,0xca,0xa7
.byte 0x1b,0x4a,0x4e,0x36,0xbb,0x05,0x36,0xf2,0xb6,0x81,0x50,0xa4,0xaf,0x6c,0x5e,0xce,0x11,0x83,0x71,0x8e,0xcd,0x41,0x61,0x0e,0x27,0xaf,0xa4,0x9e,0xcd,0xe6,0xc8,0xb5,0x69,0x88,0xf7,0x9a,0xcb,0x7d,0xa2,0x30,0x20,0xdb,0xb6,0x5c,0x15,0xa2,0xf4,0x02,0x53,0x82,0x4a,0x6b,0x39,0xdb,0x3a,0x5e,0xa0,0x3d,0xbf,0xcf,0x1e,0x26,0x17,0xae
.byte 0x34,0x8c,0xd7,0x7e,0x45,0xbd,0x53,0xcf,0x0d,0xb3,0x47,0x6c,0xef,0x3b,0xde,0xf6,0x40,0x04,0x11,0x1d,0x1c,0x93,0x48,0xba,0xf1,0x13,0x9d,0x03,0x60,0xab,0x10,0x5f,0x72,0x00,0xf9,0x71,0x7c,0xe1,0xb7,0xd4,0xbf,0xb1,0x1e,0x7f,0x2b,0x99,0x54,0x81,0x56,0xfd,0x9f,0x60,0x81,0x3f,0x7e,0xbf,0xc0,0x01,0xb0,0x12,0x1b,0xca,0x9f,0x09
.byte 0xc8,0x6d,0x44,0xdf,0xd3,0xbc,0xd3,0xb5,0xeb,0x09,0x24,0xec,0xde,0x50,0xe0,0xb2,0xc7,0x0b,0x3f,0x41,0xad,0x10,0xaa,0xc4,0xf0,0x79,0x25,0xc0,0x75,0x08,0x9f,0xe2,0xde,0xe3,0x12,0x20,0x0e,0x81,0x2c,0x27,0x68,0x53,0x40,0xa1,0xf1,0xf2,0x12,0x25,0x3c,0x16,0xe3,0x27,0x8a,0x18,0x1a,0x5b,0xfd,0xc5,0xd1,0x1e,0x4b,0x85,0xcb,0xd0
.byte 0xbf,0x3e,0xd3,0x4e,0xfd,0x79,0xc9,0xb0,0xf3,0x88,0x24,0x38,0xe4,0xd5,0xe1,0xfd,0x92,0xe0,0x21,0xea,0x50,0x59,0x01,0xa3,0xfd,0x43,0xfb,0x3f,0xc3,0x24,0x0a,0x18,0x98,0x1f,0xc1,0x1e,0x9b,0xd5,0x80,0xa3,0xca,0x5f,0x49,0xf0,0x1b,0xe1,0x2a,0xa9,0xe0,0xca,0xf9,0x5e,0x15,0x0f,0x59,0x04,0x18,0x09,0x75,0xb7,0x33,0xf8,0x79,0xf1
.byte 0x3b,0xb9,0xc5,0x60,0xcd,0x1d,0xb8,0xd0,0xc6,0x68,0x65,0xa9,0xdd,0x83,0x67,0x3c,0x21,0x8e,0x1f,0x4b,0xfd,0x4f,0x2f,0x31,0x63,0x5f,0xfc,0xb4,0x6b,0x7a,0x08,0x46,0x06,0x88,0x2d,0xf9,0x72,0xc4,0x59,0x13,0x80,0x0c,0xe1,0x74,0x82,0x48,0x0c,0xb3,0x04,0x37,0xd0,0xf7,0xe1,0x38,0x83,0xb9,0xd9,0x79,0x65,0xab,0x7f,0x9e,0xb8,0xc6
.byte 0x72,0xf3,0xca,0x3f,0x46,0xe7,0x4a,0x6a,0xb2,0x3e,0xe2,0xf4,0xdb,0x60,0xc4,0x95,0x7e,0x9e,0xe8,0x1f,0x87,0x6c,0x20,0x46,0xfd,0x91,0xa0,0xd7,0x9a,0x64,0xa5,0xf0,0x28,0xe1,0x87,0xda,0x61,0xd5,0x1e,0x55,0x56,0x93,0x68,0x94,0xcb,0x64,0x79,0xa4,0xbf,0x75,0x3a,0x6a,0x3a,0x29,0x73,0xb7,0x87,0x8a,0x98,0x1a,0xa5,0xc7,0xe9,0xea
.byte 0x42,0x0a,0x9f,0x9c,0xcd,0xf5,0xcb,0xdd,0xad,0xe4,0xb2,0xdd,0xa5,0x8b,0xf8,0x4a,0x12,0x86,0xec,0x2d,0xe8,0xe9,0xa1,0x8b,0x95,0x51,0xfd,0x31,0x8e,0xf9,0xb3,0x30,0x5f,0xab,0xc8,0xf6,0xdd,0xec,0x7a,0x12,0x7c,0xcf,0xf4,0x6d,0x1b,0x5e,0xba,0x8a,0xa4,0xe4,0x79,0xa0,0x97,0xf6,0x44,0x46,0x81,0xcb,0xeb,0x1b,0x3a,0x06,0xe8,0xb5
.byte 0xbf,0xc3,0xe3,0x64,0x9f,0xeb,0xef,0x88,0x6c,0xc0,0x35,0x8b,0x9b,0x0c,0x5b,0x3c,0x99,0xce,0x7b,0x34,0xe3,0x06,0xda,0x19,0xbb,0x81,0x1d,0xa2,0xa9,0xb8,0x1f,0xf1,0xc8,0x1f,0x8a,0x29,0xae,0xd6,0x82,0x9b,0xaf,0x68,0x27,0x01,0x14,0x1a,0x1f,0xfd,0xdc,0xcf,0xcd,0x95,0x6b,0x67,0xde,0x3c,0x75,0x11,0xbe,0x4f,0xa6,0x9d,0x83,0x5f
.byte 0x23,0xc6,0xfd,0x21,0x78,0x90,0x22,0x25,0xd5,0x48,0xef,0xf0,0x26,0x73,0x05,0xad,0x8b,0xa3,0x4c,0xdd,0xff,0xfb,0xa0,0xc2,0xc4,0x76,0xcc,0x9f,0x75,0x3e,0x16,0xe6,0x28,0x04,0xae,0x5d,0xb0,0x2f,0x19,0xa5,0x53,0x2d,0x30,0x45,0x1a,0x5c,0x09,0xa3,0xd3,0xbc,0x71,0xd4,0xa7,0xf2,0xb0,0x19,0xd7,0xf4,0x28,0xad,0xdf,0xf6,0xd7,0x37
.byte 0xa0,0x73,0x8a,0x7b,0x33,0xdc,0xb4,0xb0,0x68,0xa7,0x78,0x76,0xde,0x53,0x6a,0xf8,0x12,0x9d,0x26,0xe4,0x9e,0x5a,0xd3,0x60,0xf9,0x44,0x99,0xd1,0x38,0x60,0x2b,0x69,0xec,0xec,0xd2,0x68,0xfc,0xdb,0x3d,0xed,0x4e,0xf8,0x85,0x84,0x48,0xb7,0xa3,0x05,0x9e,0x11,0xdd,0x42,0xa7,0x6e,0x09,0x93,0xa6,0x17,0x76,0x29,0x13,0xed,0xbc,0x14
.byte 0x91,0x11,0x47,0x47,0xca,0x4e,0xc9,0xd5,0x6c,0x06,0x7d,0xcb,0xbf,0x87,0x56,0x36,0xe8,0x1f,0x57,0xe0,0xdf,0x21,0xd5,0xa2,0x46,0x12,0x54,0x04,0xc2,0x81,0x3a,0xb6,0xb1,0xaa,0x59,0x52,0xbf,0xb3,0x1c,0x8f,0x74,0xb1,0x9c,0x0a,0xda,0x69,0x8b,0xe6,0x68,0x6b,0xf5,0x1f,0x91,0x16,0x56,0x6b,0x13,0x06,0x51,0x0e,0x81,0x8f,0x5f,0xa5
.byte 0x26,0x20,0xb8,0xfe,0x40,0x4e,0x31,0xdc,0x35,0xa0,0x76,0x3c,0x33,0x19,0xe2,0xda,0xb0,0xda,0xc4,0xe4,0xc4,0xe4,0xfb,0x66,0xef,0x28,0x69,0x0e,0x54,0x09,0x5b,0x8a,0x83,0x7f,0xc4,0x9d,0x5d,0xa1,0xa5,0xf1,0x75,0x05,0xda,0x8a,0xf5,0xa0,0x70,0xb4,0x62,0x99,0x54,0x3a,0x99,0x4d,0xa4,0xe4,0x3a,0xd5,0x46,0x5d,0x5d,0x13,0x14,0x7a
.byte 0x45,0xf4,0x91,0x2f,0xe0,0x96,0xaf,0xd0,0x76,0xa5,0xd7,0x49,0x61,0x0a,0x87,0x05,0xcc,0x6e,0xf5,0xc9,0x29,0xe9,0x5a,0x89,0x13,0xd2,0x69,0x9a,0xd5,0x75,0xf6,0x9c,0xc2,0x9e,0xc3,0xe4,0xd7,0xce,0x87,0x36,0xc6,0xb6,0xab,0x7d,0x81,0xb5,0x0f,0x3d,0xd5,0x5a,0x3a,0x87,0x89,0xa6,0x10,0xa6,0xca,0x1d,0x86,0x54,0x02,0x7d,0x6f,0x8f
.byte 0x14,0x16,0xbd,0xe5,0xce,0x08,0x34,0x11,0xf3,0xd7,0x6d,0x91,0xc5,0xdf,0x15,0x22,0x13,0xc3,0x55,0xeb,0x6b,0xc4,0xf2,0xfa,0x39,0xd8,0x64,0x29,0x4f,0x5c,0x3a,0xf8,0x7e,0xd9,0x73,0x27,0xf7,0x8f,0xb4,0x55,0xe0,0xcb,0xdf,0xcb,0x4f,0x42,0xc2,0x9b,0xd8,0x1b,0xfc,0x6d,0x4a,0x8d,0x83,0xa4,0x02,0x86,0x7f,0x07,0x9f,0xdc,0x5a,0x70
.byte 0x2a,0xf3,0xbc,0x3f,0x78,0xf9,0x6b,0xac,0x73,0xbf,0x6f,0x89,0x60,0x67,0x4b,0xd9,0xe1,0x57,0x41,0x35,0x56,0xdf,0x74,0xab,0x89,0x1a,0x10,0xe8,0x24,0xd6,0x64,0x22,0x46,0xb8,0xca,0x33,0x9e,0x6f,0x15,0xf3,0x4a,0x42,0x2a,0x61,0x70,0x1a,0x78,0x5f,0x3a,0x74,0xd2,0x05,0xff,0x70,0xee,0x5d,0x15,0x98,0x38,0x4d,0xed,0x8a,0x14,0x60
.byte 0x00,0x41,0x6d,0x6a,0x29,0xb6,0xb2,0xd1,0x2e,0x1f,0xd2,0xde,0x71,0x97,0x4b,0x26,0xd8,0x20,0x92,0x5e,0x0a,0x52,0x16,0x84,0x65,0x43,0xde,0x8b,0xf9,0x1e,0x5c,0xec,0xfb,0x71,0x42,0xcc,0xca,0x99,0xbc,0x34,0x07,0xa1,0x32,0x4d,0xc7,0x95,0xfd,0xe7,0x56,0x9c,0x35,0xd5,0xbb,0x96,0x41,0xbf,0x60,0xac,0xe2,0xe7,0xda,0x1f,0x8c,0xb5
.byte 0x15,0x12,0x94,0xbf,0x8e,0x41,0x5c,0x67,0x51,0x02,0xc5,0x82,0x34,0x15,0xbe,0xd4,0x49,0x41,0x1b,0xfd,0x24,0x8a,0x11,0xff,0x01,0x86,0xab,0xbc,0x80,0xc6,0x7f,0xec,0x31,0xcf,0x06,0xc1,0xa2,0x02,0x3b,0x21,0x26,0xd3,0x1d,0xd3,0xe3,0x99,0xf6,0x29,0x6c,0x6c,0xf4,0xd3,0x6f,0x8e,0xf1,0x4e,0x87,0x57,0x7b,0x43,0xf8,0x03,0x3d,0x20
.byte 0x3d,0x99,0x90,0x5d,0x9b,0xf2,0x19,0xb9,0x3b,0x98,0x09,0xd1,0xe3,0xcf,0x10,0xd1,0xa5,0xc3,0x74,0x64,0xbe,0x68,0xb0,0xc5,0x90,0xf0,0x42,0x84,0xdc,0x14,0xbe,0xa8,0x23,0x62,0xfa,0x5e,0x7c,0xfd,0x82,0xdc,0x05,0x17,0x22,0x17,0x12,0xfa,0xd7,0xb8,0x71,0xdf,0x84,0x8e,0x41,0x3e,0x6d,0x1e,0x66,0x57,0x40,0x51,0x0c,0x00,0xea,0x64
.byte 0x99,0x39,0xb6,0x41,0xcd,0xd1,0xf9,0x52,0x39,0xce,0x49,0x08,0x9a,0x8e,0x41,0x1e,0x58,0xd2,0x78,0x4a,0x73,0x7f,0xa5,0x1f,0x40,0xbe,0xec,0x61,0x6d,0xb6,0x53,0xc5,0x7a,0x87,0xc6,0xd7,0x95,0x51,0x3f,0x95,0x4c,0x61,0xb0,0x89,0xb1,0x7f,0xad,0x93,0x7d,0x98,0xfa,0x4e,0x91,0xd2,0xb1,0x70,0xd2,0x3b,0x78,0x50,0x34,0x55,0x67,0x30
.byte 0x51,0x72,0x4c,0x9f,0xd3,0x98,0xf0,0x75,0xf2,0xd1,0x5a,0x79,0x46,0x78,0x5b,0x92,0xed,0x7b,0x9a,0xc8,0xa8,0x66,0xba,0x1b,0x28,0xc9,0xd7,0x14,0x48,0x02,0xd8,0x13,0x50,0x24,0x23,0xda,0x34,0x27,0x39,0xd5,0xa3,0x37,0x27,0x16,0x69,0x24,0x7b,0xd4,0x00,0xdc,0x88,0x0b,0x12,0xc8,0x0f,0x16,0xd6,0xe1,0xe5,0xe1,0x38,0x1c,0xfb,0xfa
.byte 0xc0,0x42,0x54,0x2e,0x1c,0x89,0x95,0xf5,0x34,0x9a,0x65,0x1f,0x67,0x5d,0x6f,0xe8,0xcc,0x72,0x81,0xec,0x44,0x7c,0x61,0xa1,0xac,0xd5,0x69,0x53,0x1c,0xd1,0xba,0xb7,0x93,0xef,0x4e,0x2d,0xab,0x4a,0xe8,0xb2,0x17,0x48,0x34,0x53,0x72,0x15,0x94,0x58,0x62,0x88,0x80,0xdd,0x70,0x6a,0x77,0x7f,0x2b,0xc8,0xe1,0xac,0x83,0xce,0xe5,0xed
.byte 0xd0,0xc3,0x24,0x09,0x5e,0x4c,0x9c,0x95,0x4a,0x4b,0xdf,0xe6,0x69,0x8e,0xb0,0x2a,0x0c,0x5c,0x08,0x2c,0xe3,0xd5,0xc8,0x3f,0x48,0x40,0xf6,0xf5,0x72,0x83,0xb8,0xd2,0x1a,0x78,0x70,0x75,0x23,0x9a,0x6f,0x11,0x1f,0xdb,0x5c,0x42,0x4f,0xab,0xbc,0x0e,0x44,0xf6,0xfb,0x73,0x85,0x2e,0x2f,0x20,0xc4,0x28,0x0d,0x44,0xfa,0xb0,0x79,0x85
.byte 0xf2,0xce,0x2f,0xc3,0xaa,0x93,0xbd,0xfc,0xe8,0x5b,0xc4,0x9f,0x3f,0xf8,0x9e,0xd2,0xec,0xf2,0xca,0xe0,0xd4,0x82,0xe2,0x9e,0x1e,0xee,0x22,0x74,0x81,0xb3,0x26,0x36,0x02,0x94,0xcf,0x04,0xee,0x7a,0x99,0x43,0xa1,0x3a,0x26,0xbc,0x05,0x9d,0x67,0x7c,0xe7,0x95,0xa7,0x73,0x7e,0x0a,0x54,0x7b,0x6a,0x53,0x95,0xce,0x9a,0x0c,0x20,0x4c
.byte 0x9c,0x61,0x91,0x6e,0x43,0x1c,0x4e,0xa0,0x99,0x98,0xcc,0x90,0x29,0xb1,0xc7,0x4f,0x40,0x1c,0xe5,0x7a,0xb8,0x9f,0x50,0x52,0x8b,0xde,0x5e,0x32,0xf1,0x52,0x9a,0xab,0x55,0x40,0xfb,0x75,0x45,0x87,0x49,0x43,0x9d,0x45,0x51,0x8a,0x5c,0x6d,0x86,0xdf,0x9c,0x74,0x7c,0xc1,0xe0,0xe7,0xe9,0x87,0x7d,0xae,0x06,0xe1,0xf3,0x23,0xa9,0x32
.byte 0xda,0xcb,0x37,0xca,0x6c,0x51,0x78,0x53,0x74,0x36,0x13,0xc4,0x92,0x1c,0x40,0x4a,0xeb,0xab,0x95,0xb2,0x97,0xb0,0xef,0x11,0x35,0x11,0x29,0x55,0xff,0x71,0x8c,0xdb,0x2b,0xea,0x8c,0x15,0xaf,0x2c,0x0d,0x25,0xe4,0xc3,0x7b,0xd7,0x2e,0xaf,0xd3,0xf8,0xb9,0xdc,0x19,0x71,0xac,0x66,0x9d,0x22,0x56,0x8c,0x15,0x89,0x43,0xf7,0xa7,0xf7
.byte 0x8c,0x5d,0xc4,0xbe,0x51,0xf8,0xa9,0xaf,0x41,0x6b,0x8f,0x81,0xdb,0xf5,0x23,0xf4,0x45,0x61,0x7c,0x8d,0x30,0x16,0xc9,0xf4,0xb5,0x7c,0x15,0x20,0xed,0xe2,0x2e,0x9c,0x14,0xe9,0x7e,0x98,0x11,0x4f,0xe1,0x99,0x14,0x8c,0xa9,0xae,0x7d,0x28,0x10,0x87,0x63,0x40,0xcf,0x16,0x42,0x30,0xd9,0xbe,0xdb,0xf9,0xd0,0xc5,0x69,0x8c,0x6b,0x5e
.byte 0x54,0xd9,0xe3,0xbd,0x28,0x8f,0x71,0xc9,0xd5,0x93,0x10,0x29,0xd8,0xee,0x69,0xe2,0x98,0xb0,0x21,0x1c,0x3e,0xf1,0x3e,0xb4,0x77,0x98,0x15,0x9b,0x4e,0x48,0xe7,0xd3,0xcf,0x26,0x5b,0x97,0x3d,0xad,0x32,0x57,0x56,0x2b,0xbd,0xef,0x85,0x7f,0x2e,0x12,0xb7,0xfc,0xc5,0xc6,0xa8,0x05,0x5e,0x91,0xae,0xd1,0xc6,0x7c,0x62,0x07,0x5e,0xda
.byte 0x84,0x34,0xc2,0x6b,0x7c,0xa5,0x07,0xb0,0x02,0xf7,0x02,0x7b,0x8e,0x90,0x34,0xa1,0x4f,0x15,0x79,0x87,0xd5,0x76,0xac,0xf2,0x94,0xed,0xb5,0x49,0x82,0xb8,0xea,0x0c,0x06,0xec,0xa6,0x8a,0x46,0xfe,0x3a,0xdf,0x14,0x67,0xc9,0x63,0xc3,0x53,0xee,0x3f,0xf5,0x4a,0x96,0x54,0x61,0x5c,0x53,0x52,0x96,0xdc,0x2b,0xe9,0x85,0xb6,0x72,0xf3
.byte 0xe7,0x69,0x9a,0x25,0x88,0x0e,0x64,0xac,0x04,0xb7,0xb2,0xbc,0x8a,0xd4,0x24,0x2b,0xa4,0xf9,0x58,0xdb,0x36,0x0b,0x05,0x4a,0xba,0x84,0x7f,0x95,0x58,0x46,0x23,0x7b,0x3c,0xcf,0xaa,0xa6,0x77,0xe6,0x1f,0xc8,0x5a,0xd5,0x82,0x09,0x87,0x3a,0x36,0xb7,0xb5,0x4c,0xdc,0xa0,0x40,0x6e,0xd7,0x61,0x1f,0xed,0xf7,0x81,0x32,0xbf,0xaa,0xd4
.byte 0xfa,0xc5,0xd7,0x62,0x9a,0x73,0x24,0x6c,0xb9,0x5b,0x5e,0x9b,0x8d,0xe1,0x4e,0x89,0x0d,0x1c,0xc9,0x7b,0xfe,0xcc,0x95,0x97,0xec,0xba,0x35,0x5d,0xbc,0x06,0x37,0xcf,0x8d,0x02,0x28,0xa1,0x0b,0xca,0xe9,0xee,0x23,0x65,0xd2,0x01,0xe2,0x49,0x2a,0x58,0x4c,0x12,0x4d,0x44,0x19,0x10,0x4c,0x4e,0xbb,0xb2,0xe9,0x43,0xa6,0x0b,0x70,0x87
.byte 0x22,0xf0,0x1a,0x66,0x08,0xf1,0xb2,0x50,0x3c,0x36,0xfc,0x4f,0x39,0xa8,0xce,0x8e,0x9c,0xb1,0x29,0xd8,0x6d,0xce,0x5d,0x77,0x94,0xff,0x64,0x81,0x10,0x47,0xa3,0xa0,0x87,0x15,0x22,0x4f,0x88,0x72,0x3f,0x99,0x39,0x85,0x5c,0xe8,0x77,0x10,0xce,0xd0,0xa5,0xd7,0x47,0x14,0xd9,0x43,0x20,0x88,0x68,0xc4,0xe7,0xd9,0x22,0x05,0xeb,0x54
.byte 0xbc,0x7c,0xb7,0x8c,0x78,0xa3,0xde,0x76,0xb8,0x85,0x0d,0x30,0xd8,0x7b,0x84,0x28,0x4b,0xad,0xb7,0x16,0x11,0x12,0x1a,0x36,0x12,0xe7,0x4f,0x12,0xaf,0x5a,0xce,0x4e,0x11,0xd4,0x7d,0xd7,0xdf,0x00,0x9a,0x74,0xab,0x60,0x40,0xa0,0x07,0x9c,0x07,0x5e,0x48,0x0c,0x72,0x82,0x3e,0x5a,0xc6,0xd1,0x64,0x10,0x63,0xd3,0x17,0x4d,0x1f,0x65
.byte 0x2f,0x3c,0x87,0x23,0x39,0x86,0xd9,0x94,0xfd,0x81,0xe0,0x2e,0x94,0xec,0x2e,0x39,0xcd,0x4b,0x48,0x00,0x8d,0x03,0xc2,0xe4,0x31,0xba,0x37,0x4a,0x1b,0x69,0x52,0x27,0xcd,0xd2,0x1b,0x0b,0x32,0xbd,0x80,0x36,0x20,0xcc,0x01,0x51,0xf3,0x78,0x8e,0xae,0xab,0x49,0x42,0xa2,0x79,0x6b,0xc1,0x0d,0xf8,0x5f,0x14,0xf8,0x95,0x53,0x33,0x97
.byte 0x50,0x5f,0x99,0x3a,0x89,0x21,0x5e,0x32,0x15,0xa9,0xa9,0x19,0x28,0x1a,0xa4,0xb0,0x25,0x2e,0xcf,0x60,0x7d,0xc7,0xc0,0x21,0x18,0xb2,0xca,0x8b,0x30,0xfe,0x2d,0x86,0xb4,0xc8,0xc7,0xd6,0xa1,0x71,0x0f,0xf1,0x54,0xe7,0x64,0x0a,0xfc,0x7c,0x73,0xb1,0xb8,0x26,0x01,0x37,0x94,0x9c,0x97,0x9b,0x6d,0x37,0x2e,0xe0,0x22,0x5b,0xe1,0x25
.byte 0x82,0x91,0x12,0x7d,0x9f,0xb0,0xc4,0x01,0x32,0x16,0xea,0x38,0x22,0x3c,0xa9,0xb2,0xc6,0x20,0x7d,0x58,0x50,0xec,0x3f,0x3b,0x43,0xdd,0xb3,0xd2,0x31,0x37,0x30,0x6b,0x40,0x28,0x83,0x99,0xf4,0x41,0xc8,0x05,0x3b,0x87,0x45,0xb3,0x21,0xe7,0xac,0x4d,0xe7,0x5c,0x76,0xf1,0x85,0x8c,0xfc,0xbf,0x8e,0xad,0xa5,0xb8,0x10,0x3b,0x37,0x86
.byte 0xa1,0x15,0xa2,0x48,0x1f,0x9d,0x61,0xbe,0xa8,0xa4,0xb6,0xb3,0x71,0xcb,0x71,0x80,0x12,0x39,0xcc,0x6f,0xe7,0x8a,0x06,0x79,0x6b,0x8d,0xfd,0xf9,0x00,0x6d,0x28,0x82,0x3f,0xf3,0x3c,0xfb,0x06,0x19,0x63,0xdd,0x36,0xfc,0x5c,0xd9,0x6f,0x34,0xfc,0xc3,0xdd,0x77,0x71,0x53,0xa4,0x9b,0xce,0xc2,0xb2,0x06,0xec,0xa4,0xfc,0x36,0xd8,0x0c
.byte 0x72,0x19,0x58,0xad,0xea,0x02,0x55,0x21,0x3a,0xb1,0x56,0x04,0xc7,0x58,0x5a,0xc1,0x18,0x9d,0xbb,0xc4,0x75,0x11,0x7c,0x30,0x94,0xd5,0xa3,0x80,0x57,0x6e,0xca,0xaf,0xec,0xdc,0x5e,0x58,0x5d,0xaa,0x2f,0x73,0x50,0x3e,0x2c,0x17,0xa4,0xa3,0x77,0xa0,0x5e,0x18,0x77,0x8b,0xf4,0xe5,0x09,0xa3,0x43,0xce,0x39,0xc5,0x70,0x16,0xf5,0xb5
.byte 0xf5,0xe3,0xc0,0x70,0xdd,0xb2,0x03,0xc8,0x43,0x48,0xc6,0xc1,0xbb,0xcc,0x04,0xb1,0x87,0xf6,0xde,0xd7,0x78,0xc9,0x8b,0xc2,0xa6,0xaa,0xea,0x1a,0x00,0x91,0x56,0x09,0x91,0xb7,0x24,0xf6,0x81,0x06,0x80,0x3e,0x2f,0xde,0x22,0xd7,0xf2,0x23,0xc5,0xde,0xf5,0x1f,0x30,0x4e,0xd7,0xed,0x3f,0x97,0x48,0x5c,0x1b,0x62,0x41,0x0e,0x7d,0xdc
.byte 0xdf,0xfb,0xdd,0xea,0x99,0x26,0xf7,0x8d,0xbf,0xd0,0x0f,0x38,0x06,0xe0,0x35,0x74,0x58,0xec,0x5f,0x13,0x58,0xe6,0x33,0x8e,0x90,0x39,0xff,0x3a,0xaa,0xd8,0x81,0xf3,0x6a,0x6e,0xbd,0xa9,0x5c,0xcc,0x1c,0x61,0x41,0xcb,0xd7,0x0a,0x4f,0x10,0xcd,0x84,0xd2,0x84,0x0a,0x1b,0xd6,0xf5,0x48,0xdc,0x1a,0x7f,0x41,0x11,0xd5,0x13,0xf5,0xc0
.byte 0xa9,0xe0,0xd9,0x58,0xc6,0x96,0x4a,0xf5,0x46,0xe1,0x1d,0x87,0xe4,0x91,0x01,0x01,0x64,0xad,0x7c,0x4b,0x2f,0xa9,0x9a,0x95,0xf9,0x71,0x06,0x76,0xa6,0x09,0x6d,0x80,0xe7,0x9a,0xb2,0xa3,0xc1,0x8d,0x6d,0x2c,0x72,0xd6,0xf8,0xfa,0xc8,0xb1,0x70,0xf7,0x73,0xec,0x55,0x0a,0x3e,0xc6,0xc4,0xe8,0x5b,0x8b,0x84,0x9b,0x3d,0xf1,0xcc,0x5b
.byte 0xbd,0x79,0xe3,0x29,0x59,0x18,0x24,0x3f,0x5f,0x25,0x63,0xed,0xc9,0x59,0xa2,0xa5,0xe0,0x4d,0x1c,0xa4,0xb2,0x04,0x6b,0x20,0x58,0xe9,0x84,0xc8,0x36,0xbb,0x4d,0x46,0x70,0x2f,0x41,0x47,0x23,0xdf,0x09,0xb1,0x63,0x7e,0x29,0x76,0xed,0xc9,0x34,0x68,0xc6,0x51,0xd2,0x76,0xe8,0xd3,0xb6,0x5a,0xfe,0xeb,0xa6,0xe9,0xd6,0x1e,0x80,0x2f
.byte 0xc0,0xc0,0x13,0xd8,0x00,0x50,0x31,0x25,0xb7,0x6c,0x84,0xc3,0x87,0x26,0xf9,0x9d,0x43,0x1b,0x09,0x42,0x6d,0xbf,0xaf,0x7c,0xda,0x93,0x8a,0xe2,0x81,0xa5,0x05,0x78,0xdf,0xc5,0xa0,0x70,0x89,0x38,0x61,0x3c,0xb7,0x27,0x36,0x57,0x10,0x7a,0xc9,0xc3,0x9e,0xe6,0xa2,0x81,0x30,0x52,0xd3,0x62,0x0e,0xd4,0xff,0x59,0x81,0xee,0x50,0x35
.byte 0x72,0xa7,0x06,0x93,0xf7,0x5a,0xde,0x46,0xb1,0xe7,0x47,0x61,0x6a,0x31,0xb6,0x87,0x51,0xfe,0x49,0x39,0xea,0x33,0xc1,0xf3,0x19,0xa3,0xa8,0x58,0x68,0x5e,0x11,0xa3,0xc2,0x37,0xff,0xe4,0x36,0xa8,0x3d,0x2a,0x6e,0xaf,0xed,0x8b,0x36,0x77,0x0d,0xa0,0xda,0x4a,0x1d,0x9e,0x4d,0xae,0xf8,0xe8,0x40,0xef,0x2f,0xf9,0x6d,0x82,0x21,0x6c
.byte 0xb3,0xad,0x96,0x0d,0x68,0xb7,0x57,0x11,0x5d,0xbe,0xd9,0x5d,0xa2,0xad,0x6f,0xdc,0xf6,0x1d,0x51,0x7d,0x44,0xd1,0x79,0x40,0x18,0x1f,0x2d,0xc7,0xde,0x01,0xc4,0xde,0x53,0xa9,0x54,0x11,0xa4,0xea,0x0d,0x10,0xbb,0x4e,0x0a,0x42,0xfa,0xc2,0x47,0x91,0xef,0xaf,0xf7,0x3b,0xff,0xc9,0xb4,0x86,0xb2,0xe1,0x7f,0xc9,0x2e,0x9e,0x2e,0xa9
.byte 0x58,0x1a,0xde,0x61,0x68,0xce,0xe8,0x6f,0x21,0x81,0xc0,0x3f,0xa3,0xc3,0x7b,0x93,0xce,0x4c,0xe0,0xa7,0xe1,0x09,0x47,0xe8,0xb4,0x6d,0x3f,0xde,0xdd,0x17,0x8d,0x72,0x75,0xb6,0x18,0x85,0x61,0xbe,0x75,0xac,0xfa,0x23,0xd5,0xd3,0x43,0xc9,0x82,0x9a,0xfa,0xfd,0x0c,0xf9,0xee,0xce,0x63,0x9b,0x79,0xa2,0x03,0x0e,0xcc,0x99,0xf7,0x32
.byte 0x61,0xb0,0xd2,0x65,0x8e,0x02,0x7e,0xa0,0x63,0x3c,0xd8,0x78,0x2e,0x9f,0xd2,0x16,0x16,0xf1,0xf0,0xc3,0x43,0x34,0x2f,0x16,0x9a,0x3f,0xdf,0x4d,0x1c,0x0d,0x9a,0x0c,0x4e,0x85,0xd2,0x5f,0x0d,0x63,0x57,0x7d,0xc3,0x69,0xe8,0x7d,0x4f,0x12,0x27,0x85,0x8c,0xb4,0x4d,0xf9,0xf9,0xfc,0x5a,0x43,0x63,0x80,0x7c,0xfd,0xae,0xb4,0x7f,0x48
.byte 0xb8,0xbd,0xac,0xf9,0xfa,0xd9,0x3a,0x31,0xaf,0x53,0xcd,0x47,0xf1,0x8c,0x15,0x66,0x55,0xa6,0x04,0x27,0x73,0x19,0x39,0x85,0xf9,0x96,0x48,0x2b,0x8c,0x64,0x14,0x7a,0xad,0xe3,0x34,0xd6,0xf5,0x4c,0x62,0x33,0x23,0x68,0x16,0x39,0x57,0x09,0x16,0x20,0x74,0xc3,0x98,0x24,0x69,0xc3,0x15,0xf7,0x05,0x45,0x30,0xf7,0x8f,0x7a,0x1d,0xb0
.byte 0x71,0x96,0x5a,0xaa,0xd6,0xa6,0x2f,0x95,0x15,0xdd,0x58,0x9e,0xc6,0x6e,0xb4,0xab,0x0d,0x1c,0x74,0x97,0xe3,0xb4,0x03,0xa8,0xba,0x27,0xe4,0xe3,0xf7,0x9d,0x7d,0x83,0x81,0x89,0x88,0x86,0xb3,0x4b,0x14,0xc0,0xd6,0xf3,0x2c,0xc2,0x17,0xac,0xb6,0xa1,0x7f,0xa6,0x98,0x42,0x72,0xa5,0xaf,0x4e,0xbb,0x9f,0x85,0x62,0xa5,0xaa,0xe0,0x27
.byte 0x9b,0x08,0x07,0xc8,0x37,0x37,0x33,0x30,0x1e,0x81,0xa0,0xbe,0x71,0x30,0xbf,0x70,0xf8,0x1b,0x28,0x91,0xc5,0xfc,0x37,0x0e,0x98,0x87,0x6a,0xdb,0xaa,0x26,0x31,0xcc,0x4e,0xd4,0xb9,0x5d,0xce,0x07,0x9e,0x48,0x15,0xf2,0xc0,0x56,0x44,0x36,0xe1,0xd0,0x56,0x3e,0x46,0xc0,0xec,0xd6,0x25,0x58,0x1b,0x66,0x3c,0xd2,0x5f,0xe0,0xca,0x69
.byte 0x5f,0xe4,0x00,0x4a,0x77,0x91,0x87,0xb0,0xb6,0x13,0x93,0xed,0x86,0x9f,0xef,0x6b,0x99,0xe6,0x6f,0xb8,0x2d,0x82,0xc6,0x71,0x30,0x3d,0x10,0xd1,0x55,0xb4,0xa3,0xbf,0x48,0x0e,0x69,0x1f,0xc3,0x5a,0x28,0xd2,0x7b,0x19,0xb1,0xf3,0x35,0x02,0xde,0x9b,0xd1,0x39,0x53,0xa6,0x9e,0x30,0xd7,0x08,0x96,0xb4,0x67,0x90,0x9f,0x27,0xe4,0x8f
.byte 0x07,0x5f,0x69,0xb0,0x4b,0x2c,0x88,0x4d,0x9a,0x20,0x48,0x60,0x53,0xac,0x6f,0x81,0x53,0x1f,0xec,0x88,0x95,0x4d,0xc3,0xcf,0x52,0x13,0xa1,0x69,0x52,0x85,0xda,0x73,0x6e,0x6e,0xec,0x88,0xda,0xed,0xea,0xf5,0x9c,0x0b,0xc9,0xac,0x31,0x44,0x12,0x68,0xec,0x0d,0xc6,0x3c,0x05,0xef,0xec,0xff,0x6b,0x99,0xda,0xc9,0x3b,0x41,0x7d,0x4c
.byte 0xdd,0xd2,0x83,0xca,0x52,0xc8,0x0d,0xe5,0xf8,0x76,0x34,0x06,0x98,0xa0,0xcd,0x74,0xc1,0xd5,0x44,0x60,0xeb,0xd4,0x67,0x67,0xda,0xff,0xe9,0x41,0x39,0x22,0xde,0x9b,0x9d,0x36,0xfe,0x6d,0xb1,0xc8,0xfe,0x39,0xe4,0x80,0x5b,0x3d,0x34,0x51,0x3d,0x3c,0xbc,0x8e,0xaa,0x1e,0x80,0xa9,0x20,0x98,0xa2,0x86,0x91,0x13,0x9a,0x2c,0xa7,0xf9
.byte 0x82,0x92,0xac,0x4c,0xf1,0x8b,0x9e,0xc2,0x27,0x4a,0xbd,0xb3,0xde,0x40,0x33,0x05,0x6d,0x6b,0xcd,0xfd,0x99,0x45,0x81,0xdc,0x98,0x69,0xc8,0xc3,0xc6,0x1d,0x4d,0x52,0x2e,0xf3,0x3b,0x5a,0x8f,0xce,0x89,0x77,0x74,0x0b,0x63,0x3a,0x70,0x7a,0x79,0x86,0x87,0x33,0x2a,0x67,0x9d,0xc0,0x1e,0xd8,0xa6,0xbd,0x7f,0x3e,0x7d,0x36,0x12,0xf2
.byte 0x2b,0x04,0x6c,0x5e,0x60,0x74,0x2b,0x05,0xa1,0x7a,0x67,0x2d,0xd7,0x50,0x9d,0xe7,0xce,0xbd,0x26,0xda,0xe7,0xab,0x63,0xc5,0x41,0x85,0x33,0x30,0x59,0x0a,0xfd,0xd6,0x27,0xbe,0x96,0x4b,0xe8,0xc1,0x98,0xa7,0xe2,0x5c,0xd9,0x8d,0xfd,0x1d,0x2e,0xcc,0x08,0x7f,0x3a,0xcf,0x0c,0x4f,0xc0,0xdc,0x70,0x5b,0x74,0x28,0xe7,0x79,0x04,0x55
.byte 0x59,0x91,0x8b,0xb1,0x6a,0x37,0x9e,0xf5,0xd4,0x61,0x4a,0xbe,0xd6,0x6e,0x23,0xc9,0xc9,0xcc,0xc2,0xbd,0xe6,0x85,0xc7,0xfc,0x58,0x81,0x90,0x0d,0x71,0xa1,0xfe,0x9d,0xb5,0x6b,0xa3,0x42,0x1d,0x34,0x7e,0x13,0xb1,0x17,0x75,0xff,0x99,0x25,0x67,0xb7,0x6b,0x43,0xb8,0x34,0x59,0x22,0x4f,0xa5,0xf0,0xd0,0x00,0xc9,0x25,0x2d,0xe6,0xba
.byte 0x3a,0x67,0x50,0x01,0x74,0x7f,0x6e,0xbd,0x59,0x0d,0x90,0xe9,0xf8,0x00,0xea,0xab,0x40,0x79,0x5a,0xbb,0x32,0xb3,0x99,0x21,0xc1,0xca,0x0a,0x21,0x93,0x56,0x62,0xfe,0x87,0x98,0x27,0xbc,0x29,0x59,0x16,0x4f,0x40,0x43,0xed,0x3f,0x78,0xbd,0x5e,0x88,0x1b,0x33,0x37,0x4b,0xba,0x7c,0xd2,0x90,0xf5,0xf9,0xa6,0x54,0x87,0xac,0x3e,0xe1
.byte 0xf3,0x46,0xab,0xa1,0x93,0xe1,0xe1,0xbb,0xbe,0xa3,0x46,0x06,0x2d,0xed,0xeb,0x9b,0x13,0xb4,0x3b,0xc6,0x5f,0x8a,0xdf,0x0b,0xc4,0x3a,0x9b,0x12,0x82,0x81,0x86,0xbd,0x0f,0x94,0xd2,0xa4,0x52,0xd6,0x06,0x15,0xef,0xaf,0xa2,0x90,0x32,0xe5,0xa2,0x0d,0x38,0x1f,0xe9,0x78,0xac,0xec,0x95,0x71,0xca,0x93,0xd6,0xc8,0x6c,0x1d,0x24,0x8e
.byte 0xe0,0x8d,0x80,0x3f,0x6d,0x2f,0x09,0x59,0xaa,0xd2,0x68,0x0c,0xe4,0x5f,0x25,0x7e,0x57,0x90,0xf8,0xcf,0xc0,0x1a,0x22,0xfc,0x66,0x48,0x8f,0xaf,0x26,0x8d,0xa0,0xa8,0x83,0x9b,0x89,0xb8,0xaf,0xd6,0xed,0xcf,0xa0,0x9a,0xbe,0x29,0xf1,0xa7,0x36,0xb0,0x46,0x1e,0x6c,0x18,0x90,0xed,0x0c,0xde,0xb6,0xd5,0xd0,0xfb,0xb6,0xce,0xd9,0xd0
.byte 0x2e,0x76,0x89,0xfb,0xa7,0x8c,0x49,0x22,0xda,0x4c,0x5c,0x8e,0xc7,0x2e,0xf8,0x41,0x21,0x30,0x0e,0x39,0xec,0xa3,0x0c,0x18,0x1b,0x72,0x85,0x33,0xaf,0x72,0x2b,0x02,0x4a,0xb8,0xcb,0x7d,0x79,0xbd,0x09,0x42,0x0a,0xe2,0x2f,0x1f,0x7a,0xec,0xda,0x65,0xc2,0xb5,0x9b,0x94,0xd1,0xed,0x1f,0x3d,0x39,0x13,0xe9,0x85,0xe0,0xb0,0x25,0xfa
.byte 0x03,0x82,0x6c,0x4b,0x2a,0x9f,0x60,0xdd,0x16,0x94,0xfd,0x7d,0xbc,0x6f,0x0a,0xdc,0x55,0xec,0x25,0x0d,0xe6,0x83,0xb3,0x57,0xfd,0x0f,0x58,0xa5,0x5b,0x6d,0x79,0x80,0x51,0xdd,0xa7,0xfa,0x21,0x03,0x39,0xaf,0x86,0xa6,0x55,0x49,0x58,0xc4,0x86,0x4d,0xf3,0xe7,0x8d,0xb9,0xb9,0x6c,0x12,0xee,0x6e,0x6d,0x78,0x70,0xeb,0x6c,0x90,0x45
.byte 0x23,0x40,0x4f,0xe1,0x05,0x46,0xa0,0xe8,0xe8,0xb8,0x94,0xeb,0xf2,0x47,0x6c,0x80,0x66,0x45,0xea,0xd2,0x99,0x7b,0x5d,0x40,0x6b,0x60,0xad,0xba,0xc2,0xd2,0x5d,0xa8,0xff,0xdd,0x7d,0xbe,0xa1,0xbc,0x99,0xd2,0xb1,0x6d,0x24,0x94,0xdd,0x3e,0xf1,0x1f,0x78,0x53,0xf3,0xa9,0x79,0xc1,0xe7,0x58,0x8e,0x97,0xcb,0xdc,0x84,0xbb,0x44,0x4b
.byte 0x95,0xe7,0xf5,0x9d,0xba,0x80,0x56,0x26,0x07,0x39,0xf3,0xc0,0xb1,0xfb,0xaa,0x9c,0xd8,0x80,0xcf,0x6b,0x68,0x61,0x79,0x88,0x14,0x9a,0x71,0x78,0x8b,0x46,0xb5,0x63,0xc6,0xed,0xde,0x1a,0x1d,0xaa,0xe0,0x23,0x96,0x8b,0x6e,0x3d,0x16,0xf1,0xe0,0x3d,0xe1,0x60,0x5a,0xcd,0x1e,0x95,0x9a,0x20,0x32,0xe7,0xc9,0xae,0x63,0x91,0xdf,0x34
.byte 0x35,0xc9,0xe7,0xf2,0x55,0x31,0xf4,0xad,0x0c,0x26,0x1a,0x3f,0x46,0x43,0x88,0xef,0x17,0x01,0xa6,0x46,0xdf,0x22,0x76,0x47,0x7c,0xfb,0xe2,0x53,0x74,0x51,0x3a,0x28,0xe5,0x70,0xaa,0x33,0x74,0x9e,0xe2,0xcb,0x44,0x89,0xc7,0xfa,0xa6,0x2a,0xae,0x1e,0xce,0x2b,0xc3,0xd2,0x58,0x83,0x94,0x40,0x0d,0xc9,0xe1,0xe7,0xea,0x90,0xac,0x99
.byte 0x27,0x30,0x2b,0x30,0x5e,0xe9,0x10,0x27,0x1e,0x29,0x4e,0x61,0xe3,0x50,0xdb,0xdd,0x51,0xe4,0x32,0x01,0xf4,0x72,0xfe,0x16,0xc1,0xa5,0x45,0xa9,0xd2,0x6c,0x15,0xa2,0x93,0x9c,0x7a,0x2c,0x79,0xb4,0xc0,0x88,0x07,0x7c,0x90,0x97,0xd7,0x9c,0x6c,0xc1,0x97,0x83,0x1d,0xec,0xa4,0xf0,0x74,0x6c,0x6c,0xa4,0x43,0xfd,0x5c,0x0c,0x7c,0x6f
.byte 0x30,0xeb,0x84,0xf4,0x98,0xc2,0xd9,0x8f,0x54,0x41,0x3d,0x3e,0x3c,0x9d,0xae,0x81,0x8d,0x24,0xae,0x74,0xe5,0xa0,0x6f,0xd5,0x4f,0x89,0x46,0x74,0x3b,0xef,0x2a,0x8a,0x1c,0xe5,0x94,0xeb,0x05,0xec,0xc9,0x42,0xf5,0x1e,0x67,0x95,0x38,0x8b,0xaa,0x1c,0x44,0xfb,0xf9,0xbb,0xec,0x0f,0xd3,0x28,0x68,0x28,0x8d,0x04,0x23,0x92,0xff,0x99
.byte 0x76,0x8a,0x87,0x9b,0x36,0x87,0x52,0x15,0x5d,0xc8,0x4a,0xda,0x2e,0xca,0x9c,0x45,0x13,0x80,0x88,0x1a,0xe9,0xfb,0xfe,0x08,0xab,0x8b,0x23,0xba,0x3a,0xfe,0xed,0x70,0xea,0x0d,0x99,0x69,0xea,0xa6,0xd5,0xbf,0x5c,0x1f,0x22,0x40,0xa4,0x09,0xd6,0x3a,0x69,0x39,0xe9,0x81,0x5f,0x19,0xdf,0x26,0x70,0x55,0xb0,0x2d,0x11,0x67,0x06,0x6a
.byte 0x32,0xcc,0xa4,0x9d,0xa5,0xa2,0x48,0x53,0x92,0x3a,0x52,0x6e,0xcf,0x23,0x96,0x82,0x4d,0x62,0xc5,0x72,0xd5,0x52,0x89,0xb7,0x08,0x86,0x14,0x54,0xc3,0xa7,0x44,0xb9,0x8e,0xe2,0xb1,0x10,0x20,0x15,0xc6,0xcf,0xa4,0x5e,0x66,0xa4,0x2d,0xca,0xf7,0x93,0xcb,0xd5,0x99,0x48,0x1e,0xde,0xec,0xc1,0xd3,0xd3,0xf5,0xcb,0x4a,0x24,0x31,0x5d
.byte 0x5a,0xaa,0x32,0x89,0x3e,0x1a,0x2f,0x1e,0xb6,0xc3,0x5f,0x09,0x50,0x7a,0x6f,0x46,0x01,0x0e,0xeb,0x10,0x23,0x1b,0x49,0x9e,0xa9,0x2b,0xed,0xf2,0x2d,0x34,0xe9,0x45,0x2a,0xdb,0xa9,0xc5,0xf7,0x84,0x8a,0xa1,0xe5,0xc7,0xd0,0x56,0x35,0xab,0x7a,0x55,0x66,0x14,0x28,0x38,0x6a,0x0f,0xb7,0xb1,0xc8,0x28,0xce,0xbe,0xe2,0xdf,0x5a,0x45
.byte 0x50,0x87,0xc5,0x31,0x92,0x89,0x59,0x7e,0x18,0x97,0x22,0x2e,0x9d,0xea,0xce,0x29,0x07,0xef,0x06,0xc4,0xab,0xe8,0x85,0xe4,0x36,0x6f,0x0a,0x38,0xe5,0x54,0xc6,0x1d,0x19,0xdd,0x68,0xc9,0xfe,0x8a,0x50,0xe4,0xaf,0x4e,0xf1,0x4a,0xc8,0xf0,0xe0,0xa8,0x62,0x9e,0xbf,0xab,0x50,0xde,0x77,0x87,0x5f,0x7e,0xb5,0xdc,0x45,0x23,0xef,0xaa
.byte 0xc4,0x92,0x6b,0x65,0xed,0xbf,0xa9,0x39,0xa6,0x7a,0xdb,0x32,0x89,0xbe,0xd9,0x51,0x4e,0x25,0x1d,0x98,0x1f,0x58,0xa4,0xcf,0xbf,0xc0,0x1c,0xa4,0xb7,0x4c,0xbf,0xc9,0xc4,0xea,0xee,0x13,0xd2,0xde,0x56,0x32,0x66,0xb9,0x65,0xbf,0xe9,0xd3,0x80,0x0a,0x1e,0x61,0xc8,0xb2,0x1d,0x94,0xec,0x5f,0x89,0x1c,0x27,0x47,0x58,0x22,0x23,0xa8
.byte 0x21,0x95,0x3d,0xc6,0x22,0xcd,0x77,0xfb,0x59,0xbe,0xa5,0x97,0xfc,0xe8,0x9a,0xa9,0xbc,0xa3,0x7a,0xbd,0x68,0xdd,0x33,0x1f,0x3c,0xc3,0x24,0x6e,0x57,0xc8,0x6a,0x54,0xdc,0x8c,0xdb,0xe8,0x8c,0xc2,0xd8,0xb6,0xbf,0x15,0xa3,0xff,0x57,0xca,0xd9,0xe7,0xe3,0xda,0x83,0x79,0x27,0x8f,0x72,0x17,0xcf,0x95,0x44,0x65,0x18,0x63,0xcd,0x8d
.byte 0xa7,0x74,0x66,0x5c,0xd3,0x71,0xd4,0x7f,0x06,0x6f,0xc1,0x3e,0x1d,0x06,0x7e,0x0d,0x45,0x9c,0x04,0x7a,0xbd,0x50,0x2d,0xc2,0x4c,0x27,0x32,0x3c,0x86,0x57,0xc1,0x9a,0x2a,0x74,0xe9,0x39,0x21,0x91,0xa0,0xc9,0x3f,0x47,0xf2,0xa5,0x4c,0xda,0x0f,0xe0,0x25,0x02,0xad,0x19,0x54,0xec,0xdb,0xb2,0x06,0xe0,0xc6,0x77,0xc1,0x8d,0xf7,0xcb
.byte 0xe1,0x43,0xad,0x0f,0xb1,0x0f,0x7e,0x5b,0xba,0x1c,0x02,0xfa,0x60,0x9c,0xdc,0x89,0xdb,0xb2,0xc5,0x74,0xc3,0x5f,0x82,0x55,0x0a,0xbc,0x08,0x13,0xdf,0xac,0x35,0x7a,0xcc,0xdb,0x9e,0xbf,0xd7,0xde,0xfc,0x64,0x58,0xfb,0x33,0xd7,0xc3,0x39,0x4d,0x38,0x65,0xe7,0x98,0x83,0xbe,0x12,0x6d,0xb0,0xda,0x23,0xc0,0x7d,0xa8,0x64,0x75,0x33
.byte 0x7f,0xe9,0xa7,0xa1,0x41,0x85,0x50,0xcc,0xaa,0x3c,0xc1,0xd8,0xda,0xa1,0x53,0x0c,0xac,0xca,0x6a,0x8c,0xbd,0xb0,0x2b,0xd9,0x2f,0x4c,0x3d,0x3d,0xec,0x9d,0x70,0x6c,0x67,0xff,0x1d,0x95,0xb0,0xaa,0x46,0xaa,0xd6,0x6c,0x3c,0x4c,0x65,0x36,0x47,0xea,0x5e,0x46,0x25,0x38,0x8f,0xbe,0x7d,0x3d,0x80,0x39,0x0f,0x05,0x06,0x1e,0xbe,0xe1
.byte 0x9f,0xd4,0xc8,0x7d,0x11,0x8d,0x78,0x0d,0x26,0xe7,0x9a,0x47,0x8f,0x63,0x5a,0xe5,0x91,0xc0,0x81,0xa1,0xe6,0xff,0xa5,0x1f,0x38,0x0b,0x46,0x5b,0xc8,0x31,0xf3,0x56,0x5a,0x40,0x68,0x43,0x45,0xe0,0x83,0xf3,0x9a,0xc2,0x2e,0x62,0x4e,0xf9,0xd4,0xe8,0x13,0xe0,0x16,0x2d,0xa7,0x33,0xae,0xb5,0xc9,0x77,0xd6,0x5f,0xb1,0x28,0xa8,0xf7
.byte 0x40,0x03,0x1b,0xe1,0x2a,0x3d,0xd6,0xe5,0x60,0x64,0x5e,0xe2,0x59,0xbb,0xb1,0x36,0x0b,0xeb,0xf7,0x8e,0x60,0x5a,0x3a,0x4a,0x78,0x9c,0x2d,0xef,0xe6,0x9e,0x1c,0x4f,0x53,0xea,0xc3,0xab,0x88,0x36,0x8e,0x08,0x3e,0x18,0xcc,0xb4,0xa2,0x60,0x5c,0xae,0x64,0xf6,0x6c,0x3c,0xcf,0x34,0xa4,0x6d,0xfd,0xb5,0x2f,0xfa,0x93,0x8f,0xf7,0xc1
.byte 0x96,0xfe,0xa9,0x8c,0x85,0xec,0x65,0xc1,0x26,0x86,0x4f,0x36,0x1b,0xda,0xe0,0x47,0xb6,0xe4,0x34,0xf6,0xaf,0xce,0x56,0xdd,0xcf,0xad,0x94,0x1b,0x78,0xd3,0x17,0x00,0xf4,0x66,0x8e,0x8a,0x1d,0x11,0x1b,0xa2,0x7e,0x31,0xfc,0xda,0xc5,0x39,0x8a,0xc4,0x7d,0xee,0x53,0xe0,0x39,0x2d,0x53,0x2a,0x63,0x6b,0x0a,0x76,0xd0,0x2e,0xde,0x8d
.byte 0xf7,0x79,0x78,0xea,0x25,0x75,0x23,0x7f,0x17,0x93,0xfc,0xd3,0xfb,0x0e,0x51,0x3f,0x84,0x49,0xd4,0xbd,0x73,0x21,0x30,0x56,0x58,0x63,0x7a,0x20,0xfd,0x59,0x00,0xfd,0x42,0x82,0x69,0xd4,0x8e,0x69,0x4f,0xc8,0xf4,0x45,0x6d,0x8a,0x5c,0xa2,0xba,0x7d,0x69,0xcd,0xb5,0xf2,0x24,0x85,0x03,0x10,0xb3,0x3f,0xa6,0x9a,0xeb,0xe3,0x0d,0x75
.byte 0x82,0x8d,0xe7,0xfb,0x9f,0x9b,0x7b,0x5b,0x33,0x1d,0xba,0xe8,0xde,0x01,0xfd,0xd3,0x38,0x16,0xb4,0x65,0xb7,0x53,0xdd,0xd5,0x4b,0x13,0x3e,0x1a,0x87,0xbe,0x34,0xbb,0xe2,0xbb,0x03,0x0a,0xc9,0xdf,0x47,0xa8,0x10,0x5f,0x3e,0x74,0xab,0x1a,0x7d,0x98,0x26,0xd1,0xc9,0xb7,0x8e,0xb8,0x3b,0x71,0x10,0x90,0x0a,0x91,0x86,0xef,0x22,0xec
.byte 0x3e,0x70,0x3d,0x05,0x75,0xb8,0x91,0xf6,0x77,0x54,0x5b,0x91,0x13,0x58,0xf9,0x29,0xbb,0x94,0x50,0xe7,0x8a,0xb5,0x31,0xa5,0xe3,0x07,0x7d,0x53,0xc0,0xe5,0x58,0x38,0x27,0x84,0xf0,0x96,0x99,0xef,0x60,0x07,0x05,0xdd,0x46,0x64,0xed,0xa8,0xc4,0x3e,0xde,0xac,0x6a,0xfe,0x2c,0x1a,0x9d,0x47,0x88,0x37,0x16,0xf5,0xb2,0x9e,0x78,0x21
.byte 0x6e,0xd4,0x81,0x00,0x29,0xa1,0xcb,0x03,0x32,0x1e,0x45,0xbd,0xc9,0x86,0x97,0x56,0x34,0x2e,0xe5,0x91,0x2b,0x8d,0xf0,0x22,0xe9,0x13,0x0a,0x31,0xd8,0x82,0xbc,0x1a,0x7e,0x97,0x08,0x71,0x08,0xb0,0x82,0x8c,0x24,0x90,0x43,0x09,0x28,0x2d,0xcd,0xf1,0x31,0x9c,0x70,0x54,0x2b,0x13,0x07,0x33,0x4d,0x29,0x1d,0xbd,0x37,0x7d,0x95,0x07
.byte 0x7b,0x23,0x67,0x59,0x34,0x0c,0x85,0xae,0x55,0x94,0xe3,0xfe,0xbf,0xd2,0x38,0x0b,0x2f,0x4f,0xc7,0x4c,0xb7,0x1d,0xfe,0x97,0x2a,0x22,0xf1,0xa4,0x2d,0x02,0xb6,0xdf,0xc7,0x9b,0x0a,0xf5,0x6c,0xcf,0x91,0xee,0x44,0xd5,0x2a,0xe5,0xa7,0x64,0xf7,0x37,0x59,0x85,0x8e,0xef,0xa3,0x0d,0xfe,0xcc,0x80,0xb9,0x5c,0x8d,0x01,0x0f,0xbc,0x5d
.byte 0xd5,0x47,0xff,0xa0,0x32,0xc7,0xac,0xb8,0xf8,0x43,0x3f,0x6d,0x68,0xa8,0xed,0x20,0x04,0x3b,0xa6,0x70,0x7a,0x75,0x84,0x50,0x7a,0x5f,0xab,0xa0,0x98,0xdf,0xa1,0x45,0x82,0x22,0xe7,0xf4,0xf5,0xc9,0x85,0x43,0xda,0x3b,0x18,0x40,0x38,0xfb,0x66,0x14,0xa4,0x51,0x26,0xe3,0xd8,0x2e,0x05,0x9d,0xd2,0x38,0xd5,0xca,0xd2,0xd9,0x87,0x4a
.byte 0x06,0xb1,0x12,0xa3,0x16,0xa2,0xea,0x96,0x8c,0xee,0x78,0xc5,0x57,0x0c,0xbb,0x45,0x38,0xd3,0x9b,0xb3,0x66,0xe0,0x0d,0x00,0x48,0x4d,0xfc,0xa1,0x59,0x31,0x30,0x77,0xdc,0x26,0x3a,0xe0,0xc6,0x53,0x42,0x50,0xac,0x50,0xa3,0x4d,0xd8,0x70,0xcf,0xdc,0x3a,0xd0,0xcc,0xab,0x5d,0x1e,0xda,0x30,0x32,0x7c,0xf1,0x5a,0x15,0x6a,0x92,0xb3
.byte 0x32,0xce,0x4b,0xf7,0xa4,0x8b,0x62,0xaa,0xad,0xa0,0x46,0xed,0x2a,0xb3,0x01,0xaf,0x9f,0x4a,0x5a,0xce,0xcf,0xb4,0xe6,0x34,0xd0,0xad,0xdc,0xce,0x2a,0x32,0xee,0x60,0x3d,0xb4,0xd3,0xc6,0x0e,0x72,0xdf,0xe5,0xea,0x15,0x58,0x19,0x72,0xfa,0x78,0x55,0x1d,0x57,0x62,0xe9,0xa0,0x13,0xbf,0x64,0x17,0xae,0x42,0xce,0xf7,0x70,0x2a,0xd0
.byte 0xf2,0xd8,0x3e,0xef,0x25,0x2f,0xf8,0x93,0xc1,0xc3,0xf5,0x35,0x6d,0x43,0x49,0xfd,0xda,0x97,0x3b,0x6c,0x04,0xe2,0xe0,0xae,0x92,0x2b,0xc7,0x24,0x3c,0x76,0xc5,0x29,0xd2,0x3f,0x35,0x9a,0x5b,0xc2,0x16,0x6a,0x34,0x44,0x10,0x36,0x32,0xb1,0xcc,0xc0,0x42,0xff,0x1a,0x3d,0xaf,0x66,0x52,0xda,0xe5,0xf8,0x74,0xda,0x7a,0x1e,0x29,0x35
.byte 0x47,0xc8,0xe1,0x8d,0x7a,0x2f,0x0d,0x1c,0x12,0x5e,0xe6,0x56,0x15,0x74,0x6e,0x85,0x68,0xf5,0x17,0xd3,0x21,0x04,0x85,0x01,0x02,0xe4,0xfa,0x3f,0x69,0x29,0xd7,0x39,0x86,0x94,0x6f,0x81,0xa1,0x81,0x04,0x29,0xde,0xe2,0x0a,0x9b,0xd7,0x57,0xdc,0x77,0x2e,0x77,0x93,0x59,0x54,0xd3,0xf1,0xd5,0x11,0x07,0xe0,0x01,0x71,0xb5,0xb3,0xc0
.byte 0xdb,0x17,0x4b,0x5b,0x58,0xfc,0x32,0xf9,0x75,0x8e,0xdf,0x60,0x88,0x8f,0xf9,0xb0,0xe3,0x64,0x75,0xd5,0x5e,0xb1,0xec,0x57,0xa3,0xd4,0xe2,0x05,0xf1,0xf9,0xa9,0x51,0x6b,0x84,0xc3,0x78,0x74,0xe9,0x36,0xd0,0xb6,0x14,0xcd,0xa3,0x05,0xb6,0xa2,0x5c,0x2c,0x11,0x53,0x10,0x60,0x8c,0x2c,0xd8,0x7b,0xc0,0x00,0xf1,0x64,0x35,0xdc,0x7b
.byte 0xf5,0x9b,0xd0,0x82,0xa8,0x00,0xe6,0x17,0xb9,0x5a,0x80,0xe1,0xee,0xb0,0x0c,0x3d,0x9a,0xae,0xaf,0xd8,0x70,0x2e,0x85,0xf0,0x0e,0xb4,0x5e,0x92,0x96,0x33,0xa5,0xa9,0x07,0x12,0x95,0xf1,0x4b,0x67,0x25,0x51,0x40,0x91,0xda,0xb9,0x4d,0x5b,0x6b,0x07,0x7e,0x52,0xa8,0xa6,0xf9,0xd1,0xeb,0x8e,0x47,0xd0,0xf8,0x7a,0x17,0x6f,0x04,0x41
.byte 0x2b,0x65,0x3c,0x3b,0x0f,0xbc,0xef,0x26,0xc1,0x63,0x24,0x33,0x40,0x40,0xf2,0x1f,0x34,0xaf,0xba,0x1d,0x94,0x72,0xd6,0x44,0xe2,0x6f,0x1b,0x83,0x87,0xd6,0x2c,0xc9,0x4c,0x2e,0xa3,0x98,0xc4,0x86,0x16,0xfe,0xc2,0xa3,0xdc,0xb4,0x86,0xfd,0x66,0xd2,0xc3,0x09,0xfd,0x8e,0xa7,0xb9,0xd2,0x5c,0x57,0x5e,0xd6,0x15,0xc4,0x12,0xa0,0xe3
.byte 0x52,0x54,0x7c,0x26,0x93,0x28,0xdc,0x13,0x97,0xff,0x1e,0x79,0x2d,0x83,0xbb,0xf2,0x9c,0xf1,0x51,0xf9,0xd7,0x26,0x78,0x69,0xfe,0x9b,0x07,0x91,0x0d,0xef,0x29,0x28,0xf0,0xd5,0x94,0xed,0xb8,0x45,0xe2,0xe1,0xde,0xe9,0x9a,0x01,0xc5,0x00,0x77,0xdf,0x40,0x61,0x52,0xbe,0x9e,0x82,0x8c,0x04,0x0e,0x92,0xab,0x67,0x96,0xdf,0xc7,0xa7
.byte 0x01,0x55,0x66,0x73,0x6c,0xaa,0x47,0x2e,0xb6,0x98,0x64,0x0d,0x7e,0x45,0xa2,0xda,0x34,0x2d,0x1a,0x7b,0x35,0x49,0xee,0xc5,0x91,0x05,0xe0,0x14,0x19,0xdd,0xb7,0x2b,0x43,0x07,0x5a,0xb5,0xb2,0x6a,0x6a,0x7d,0xf1,0x17,0x3a,0x26,0x95,0x3a,0xff,0x9c,0xa8,0x19,0xe0,0x03,0x11,0x26,0xb9,0x07,0xfc,0x01,0xe3,0xa2,0x4a,0xeb,0x92,0xc0
.byte 0x26,0x0a,0x88,0xdf,0x5b,0x67,0xc6,0xca,0xe0,0x98,0x0a,0x94,0x1e,0x93,0x32,0x49,0x64,0x7b,0xe5,0x8d,0x39,0x7c,0xb7,0xf0,0x4b,0xf0,0x46,0x62,0x47,0xcb,0x09,0x6f,0x01,0x09,0xbb,0x13,0x89,0xb3,0xc5,0xa8,0xa0,0xbb,0x05,0x61,0x62,0x07,0xdb,0xd8,0x4f,0x6a,0xc0,0xdc,0xaf,0xfe,0x97,0xb3,0x38,0x74,0xe0,0xa6,0x13,0xa9,0xb0,0x27
.byte 0x1d,0xb7,0x2d,0xb1,0xa3,0x7c,0x22,0x7f,0x99,0x67,0x5a,0x7e,0x1c,0xd9,0xf4,0x45,0xa1,0xfe,0x12,0xa7,0x9d,0x43,0x1d,0x1c,0x29,0xfe,0x95,0x33,0x79,0xe7,0xb9,0xa2,0x7e,0x50,0x50,0xa4,0x52,0x92,0xd0,0x44,0x2b,0x4c,0x78,0x77,0xfa,0xd8,0x6f,0x81,0xe8,0xfb,0x50,0x9c,0xfc,0x80,0x61,0x91,0x25,0x3d,0x66,0x11,0xd0,0xc3,0x77,0x83
.byte 0x20,0xee,0xf9,0x38,0x24,0x2f,0x63,0x6b,0x9e,0xca,0xda,0x49,0xd2,0xba,0x10,0x80,0xfe,0x77,0xf6,0x79,0x1b,0x95,0x30,0x16,0xec,0x90,0xde,0x4a,0xb4,0x7d,0x35,0x20,0x4c,0xac,0x23,0xaf,0xe4,0xfb,0xbb,0x8f,0xe8,0xc6,0xf5,0xc5,0xf9,0x0f,0x74,0x25,0x7c,0x37,0x96,0x81,0x21,0x4f,0xe9,0x56,0x28,0x5c,0xd1,0xf2,0x94,0xb4,0xf6,0x6b
.byte 0x34,0x9e,0xd9,0x37,0x41,0xeb,0x9c,0x71,0x4e,0xeb,0xc6,0xd3,0x7b,0x5b,0xc7,0x3e,0x07,0x59,0xe1,0xc5,0x81,0x72,0x7e,0x30,0xdb,0x35,0xcf,0xce,0x47,0x9f,0x36,0x74,0x34,0x00,0xa1,0xde,0x9f,0xae,0xba,0xe9,0x16,0xf7,0xf3,0xa7,0x24,0xf5,0x81,0xfa,0x40,0x80,0x9b,0x48,0xcf,0x97,0xc4,0xde,0xeb,0x7a,0x07,0xbc,0xf5,0xeb,0x5c,0x38
.byte 0x6d,0x64,0xaa,0xc3,0x81,0x66,0x41,0xc8,0x3b,0xaa,0x8b,0x69,0x22,0x0b,0x19,0x6d,0x0f,0xd8,0xcb,0xea,0x2a,0x98,0x03,0x4b,0x42,0x4c,0x0a,0x7b,0x92,0xdf,0x59,0xa0,0xfd,0x27,0x0e,0x0f,0x98,0xa6,0xc9,0x31,0xe1,0x8f,0x9c,0x57,0x29,0x07,0x01,0x0f,0x26,0xf3,0xc6,0x43,0xdf,0x1d,0xe4,0xa6,0xd6,0xb0,0x56,0xfd,0xf7,0x9c,0xc1,0x0b
.byte 0x2f,0x9b,0xc3,0xbe,0xc0,0x09,0x14,0x0f,0x19,0x70,0xd3,0x5a,0x7f,0xe1,0x64,0xbb,0x47,0x04,0xb9,0x2a,0xfc,0x49,0x68,0xba,0x14,0xfa,0x65,0xc9,0x9b,0x46,0xd1,0x0c,0x03,0x3b,0x20,0x36,0x47,0x05,0xb0,0x89,0xd9,0xc0,0x36,0xe8,0xe2,0xfa,0xb3,0x2a,0xf9,0x2f,0x23,0x40,0x26,0xf3,0xe0,0x61,0xdf,0x6d,0x47,0xc4,0xe2,0xb9,0xdd,0x44
.byte 0x9a,0x34,0xcf,0x1f,0xdb,0x72,0x28,0x23,0xf0,0x56,0x65,0xcb,0x43,0xad,0x7d,0x42,0xa5,0x73,0x97,0x62,0x7c,0x2d,0x6e,0x51,0x8f,0x94,0x07,0xe9,0x14,0xa8,0x48,0xdd,0xc5,0x63,0x4b,0xfd,0x73,0x46,0xc3,0xe2,0x55,0x66,0xe2,0x58,0x32,0x00,0x68,0xaf,0x1c,0xd4,0xf3,0x8c,0x59,0x89,0x6f,0x08,0xc5,0xb3,0x47,0x09,0x56,0x90,0x05,0xd1
.byte 0xf8,0xc6,0x20,0x4a,0xb8,0x69,0xd4,0x87,0x5d,0x3d,0x89,0x6d,0xf4,0x10,0xcd,0x5c,0xba,0x3f,0x48,0x7a,0x26,0xb8,0x4d,0x9a,0x0e,0x22,0x2e,0x9e,0x70,0x5d,0xff,0xf9,0xf2,0xec,0xe8,0xb0,0xfc,0xbb,0xcf,0xfe,0x8e,0xc9,0x8d,0x2f,0xda,0x25,0x46,0xcb,0xe4,0x6a,0x33,0xce,0xbb,0x02,0x72,0x58,0xee,0x6d,0x40,0x86,0xc9,0x8d,0x06,0x62
.byte 0x8f,0x6b,0x81,0x60,0xeb,0x78,0x46,0x32,0xe8,0xc6,0xde,0x86,0x4f,0x11,0xa9,0xad,0x62,0xb0,0x15,0xb6,0x09,0xa9,0x3c,0xe1,0x6b,0x12,0xb0,0x39,0x59,0x26,0xde,0xc6,0x7a,0x95,0xaf,0x00,0xd6,0xb7,0xc5,0xe4,0x43,0xde,0xc6,0xcf,0x2f,0xa0,0x8d,0xfd,0x54,0xd7,0xc6,0xed,0x64,0x16,0xa1,0x9b,0x39,0xe3,0xc6,0x9c,0x1e,0x60,0x6c,0x03
.byte 0x3f,0xac,0x24,0x99,0x59,0x5a,0x4e,0x95,0x01,0x5d,0x2e,0x03,0xd0,0xb5,0xdf,0x19,0x85,0x4a,0x5e,0x70,0x6d,0x46,0x00,0xfb,0xbb,0xf5,0xb1,0x35,0x11,0xcb,0xda,0x4b,0x31,0x1a,0x0b,0xa3,0x58,0x9c,0xcf,0x09,0x79,0xd7,0x31,0x4e,0x6c,0xbc,0x16,0x6f,0x14,0xa3,0xbf,0xcf,0x05,0xe4,0xf8,0x2f,0x3b,0x5f,0xb7,0xc4,0xa4,0xbf,0x80,0xac
.byte 0x53,0xb5,0xf8,0x7c,0xf5,0x16,0x7c,0x5e,0x16,0x47,0xd1,0x01,0x34,0xd6,0xb9,0x8a,0xc9,0xff,0xe3,0x7d,0x80,0xe4,0xcd,0x83,0xfe,0x8a,0x49,0x34,0xa5,0xc0,0xf3,0xe7,0xff,0x09,0xbd,0xf4,0x84,0x36,0x19,0xc6,0xc7,0x4d,0x50,0xd2,0x3f,0xa7,0xdb,0xea,0x3d,0x74,0x15,0x45,0xe3,0x0f,0x6c,0x6a,0xcc,0x2a,0x16,0x40,0xef,0xaf,0x64,0x2d
.byte 0x76,0xa0,0xdc,0x74,0xa9,0xb5,0x70,0x6f,0x27,0xf5,0x3c,0xd0,0xa1,0x46,0xfb,0x9d,0x4c,0xb3,0xda,0x01,0x02,0xc0,0xbd,0x9f,0x4a,0x21,0xb7,0xdb,0xd9,0x89,0xe9,0x90,0x62,0xfb,0x89,0xb8,0x84,0x4b,0x2b,0x1c,0x5e,0x67,0xde,0x9d,0x59,0x3a,0xd0,0x15,0xc0,0xba,0xdf,0x12,0xf2,0x9e,0x07,0x2f,0xb0,0x9c,0x7f,0xf3,0x73,0x89,0x84,0x26
.byte 0xb8,0x7f,0x2d,0xad,0x18,0xf7,0x06,0x10,0x9d,0xe9,0x09,0x4f,0x7b,0xa5,0xa0,0x96,0x2f,0x3d,0x8e,0x65,0x0b,0xe4,0x65,0xa2,0x7a,0x10,0x81,0xb1,0xb9,0xc8,0x4c,0x27,0x53,0x70,0xc7,0x25,0x5f,0x2c,0x03,0x7f,0xe4,0xff,0xc3,0x20,0x89,0x2e,0x4d,0xe8,0xab,0x0a,0x27,0x26,0x0e,0xe4,0x35,0xb5,0x43,0x5e,0x80,0xdd,0x18,0x53,0x3a,0xb7
.byte 0x17,0x6b,0xc5,0x68,0x2b,0x13,0x0e,0xa7,0x93,0x9e,0xfb,0x6c,0x48,0xe8,0x57,0xf5,0xd5,0x2a,0xd8,0x5d,0x56,0xb1,0x5b,0x5a,0x1f,0x6a,0xc0,0x7e,0x55,0x01,0x80,0xcb,0xa9,0xf3,0x20,0x06,0x74,0xa6,0x73,0xe5,0xcb,0x1e,0xc6,0xf4,0x81,0xf7,0x8d,0x8c,0x18,0xfc,0xa2,0x9b,0xe2,0xb6,0x1d,0xd6,0x5c,0xbe,0x82,0xda,0x2c,0xa7,0x08,0x8f
.byte 0x58,0x2f,0x32,0x99,0x9c,0xa0,0x8f,0x22,0xfd,0x00,0xcf,0xef,0x4b,0xc5,0x49,0x11,0xf3,0x0a,0xa0,0x67,0x3b,0xf5,0x6a,0x2e,0x18,0xd1,0x3d,0xd1,0xee,0xd2,0xc3,0xc0,0x4f,0xbd,0x6a,0xd3,0xab,0x7b,0x56,0x92,0xd7,0x63,0x9f,0x87,0x44,0x0d,0x2a,0x67,0x44,0x17,0x48,0xa1,0xb8,0x99,0x3d,0xa7,0x57,0x46,0x3d,0x65,0x04,0x58,0xb0,0x43
.byte 0xa4,0x73,0x95,0xd4,0xb2,0xbb,0x8f,0x65,0xea,0x4d,0x55,0xcd,0xe5,0xb6,0xa2,0x15,0x0d,0x74,0x6c,0x3f,0xe5,0x06,0x9a,0x75,0xc3,0x51,0xa0,0x1a,0x66,0x36,0x30,0xff,0x7a,0xdf,0x27,0x22,0x70,0x02,0x20,0x2d,0x52,0x6f,0x6d,0x34,0xb5,0x74,0x3a,0x88,0xf6,0xec,0x7d,0x34,0x02,0x27,0x1e,0x58,0xcc,0x50,0x88,0x4a,0x13,0x98,0x97,0xf9
.byte 0x8f,0x6e,0x38,0x3b,0xed,0x2f,0x17,0x2e,0x44,0xb3,0xb4,0x93,0x14,0xe0,0xda,0xfd,0x29,0x02,0xb6,0xc5,0x80,0xa0,0xe2,0x1d,0x89,0x57,0xec,0xe8,0x15,0x43,0x7c,0xca,0x8b,0xb6,0x19,0x32,0x1c,0xf7,0x75,0x07,0xf7,0x37,0x4b,0x03,0x84,0x75,0xab,0x64,0x7a,0xa7,0xae,0x52,0xcb,0xe9,0xb1,0xc9,0x36,0xe9,0x49,0x60,0x82,0xc8,0xb9,0xcd
.byte 0x37,0x1d,0x2a,0x9a,0x76,0x8a,0x4a,0x26,0xcd,0xff,0xac,0x48,0xc6,0x28,0x00,0xdb,0x2b,0x87,0x77,0x17,0xf7,0x57,0x93,0xb7,0x68,0xa8,0xf9,0xec,0x7b,0xaf,0xb0,0xad,0xe1,0x31,0x09,0x5b,0xf6,0x11,0x09,0x4e,0x96,0x53,0x3c,0x5a,0xb1,0x99,0x1d,0xfb,0x3f,0x25,0x1b,0xcf,0x61,0x08,0x2d,0x98,0xcb,0x76,0xa7,0xe9,0x77,0xc6,0x3d,0xe0
.byte 0x0c,0xc7,0x2e,0x34,0x57,0x57,0x4f,0x0b,0xb3,0x66,0xb4,0x57,0x3d,0x66,0xe4,0x3d,0x86,0x8a,0x3c,0x4f,0x19,0x97,0x3a,0x28,0x74,0x1a,0xa0,0xef,0x0d,0x10,0x51,0x58,0xb7,0xe2,0x2d,0x6a,0x6f,0x75,0xc3,0x67,0x9d,0xaf,0x76,0x6d,0x89,0x5d,0xd0,0x78,0xcd,0x03,0x48,0xb4,0x50,0x0b,0x5b,0x94,0x78,0x7a,0xe3,0x52,0xf6,0x4f,0x70,0x4c
.byte 0xc3,0xe2,0x89,0xc9,0x33,0x75,0x83,0xc4,0x65,0x79,0x4d,0x8f,0xff,0x0e,0x11,0xb1,0x9e,0x87,0x9c,0xe4,0xd1,0x31,0x36,0xd4,0xef,0xa8,0x41,0x78,0xd7,0xad,0x47,0xbb,0x3d,0x0b,0xf5,0xd7,0x2a,0xf3,0xe5,0x3b,0x7c,0x90,0xa5,0xe6,0x71,0x89,0x55,0x88,0x5e,0x48,0x88,0x18,0xca,0xec,0x08,0x41,0x27,0xd5,0xe1,0x9f,0xb4,0x3c,0xdf,0x11
.byte 0x57,0x9f,0x5a,0x54,0x4e,0xfb,0x6c,0xc9,0xb2,0x98,0x65,0xa3,0xe2,0xd5,0x91,0x52,0x4a,0x87,0x30,0xc8,0x9e,0xcb,0xe7,0x9e,0x00,0x78,0x9e,0x3f,0x9d,0xe1,0x46,0x5b,0xdd,0xf3,0x3e,0xf4,0x36,0x94,0x97,0x06,0x78,0x46,0x53,0xb9,0x0d,0x8f,0x94,0x42,0x60,0x76,0xc7,0xc3,0x4d,0x48,0x06,0xee,0xf1,0xb9,0x58,0xe4,0xe7,0x11,0x68,0x41
.byte 0x51,0xd9,0x98,0xd1,0x26,0x3b,0xcb,0xd1,0x4f,0xce,0x89,0x20,0x76,0x1d,0x58,0x70,0xc7,0x0b,0xe4,0x70,0xf1,0xd0,0x33,0x1b,0x17,0x9a,0xda,0x47,0x7e,0xfc,0xec,0x34,0x0a,0xf8,0x24,0xf1,0xec,0x83,0xe4,0x0d,0x91,0x6d,0x46,0x82,0x33,0xf6,0x25,0xa3,0x26,0x7c,0x2a,0x78,0xef,0x7c,0x6c,0x0e,0x6a,0xd5,0x88,0x97,0xe4,0x76,0x4a,0x2c
.byte 0x36,0xa2,0xa0,0x06,0xe2,0x20,0x7c,0x94,0xe2,0x0a,0xee,0x5b,0xc7,0x21,0x4e,0x60,0x24,0x32,0x46,0x09,0x69,0x56,0x6c,0xf5,0x62,0xe7,0xab,0x0d,0x64,0x7e,0x6a,0xa2,0x1b,0x15,0x33,0xb8,0x41,0x0f,0x96,0x16,0x2f,0x7b,0x97,0xdd,0x14,0x6a,0xec,0xfb,0xbf,0xc8,0x3d,0x99,0x72,0xa7,0x14,0xaa,0xae,0xf2,0x10,0xd5,0x4a,0xaa,0xd0,0xb1
.byte 0xb9,0xbb,0x5f,0xa9,0x51,0x96,0x91,0xc0,0x1a,0x31,0xad,0xa1,0x7e,0xb8,0x55,0x90,0x1a,0x17,0x37,0x4d,0x62,0x8c,0x75,0x19,0xfc,0x84,0x54,0x3d,0x5e,0x0a,0xaf,0x27,0xe0,0x5f,0xe2,0x76,0xad,0x9d,0xda,0x43,0xac,0x23,0x5c,0xb9,0xf7,0x2a,0xac,0x55,0xea,0x9b,0x07,0x4c,0x06,0x9a,0xba,0x4c,0x25,0x20,0xee,0x2a,0x37,0xb5,0x7d,0xa0
.byte 0x4f,0x3a,0xb8,0xc7,0x7c,0x2b,0x0f,0xb7,0x1e,0x26,0xe1,0xc3,0x17,0xf2,0x60,0x2b,0x47,0x06,0x7f,0xa3,0x7b,0x80,0xd0,0x48,0xf1,0x8e,0x5a,0x3d,0xcd,0x6a,0x49,0x0f,0x60,0xe5,0x3a,0x7f,0xa8,0x10,0x4b,0x0e,0x29,0x74,0x4e,0xe8,0xe1,0xae,0xe3,0x46,0xa5,0x87,0x7d,0xe2,0xd3,0x98,0x63,0x1e,0xc4,0xba,0x31,0x7e,0xd5,0xe2,0xbf,0x95
.byte 0x2d,0x8d,0x3b,0x1c,0xc8,0x5a,0xd3,0x42,0xe5,0x5e,0x26,0xfa,0xa3,0xcf,0x7b,0x68,0x43,0x5a,0xf6,0x86,0x06,0xd7,0x08,0xeb,0x70,0xa9,0x17,0xf6,0xcb,0xfc,0x9e,0xbe,0x82,0x69,0xe2,0x58,0xb3,0x5f,0x16,0xed,0xf1,0xea,0xaa,0xe4,0xbd,0x5c,0xcd,0x88,0xd6,0x48,0x18,0xfd,0x65,0xd1,0x44,0x77,0x06,0x8e,0x82,0x93,0x88,0x97,0x05,0xad
.byte 0xc5,0x62,0x1b,0x6f,0xcd,0x23,0x45,0x86,0xcd,0x19,0x9a,0x90,0x6f,0x54,0x33,0x1b,0x35,0x01,0x05,0x50,0x09,0x7d,0x61,0x4e,0xc3,0x79,0x27,0xe0,0xf7,0xf6,0xf3,0x8c,0x3f,0xd2,0x77,0x09,0xa7,0x9c,0xb4,0xb9,0x2b,0x2e,0x5a,0x34,0x2c,0x60,0xc5,0xcf,0xa6,0x5f,0xf9,0x16,0x8a,0xd8,0xd7,0xab,0x2d,0xe7,0x0b,0x90,0x97,0xb0,0x45,0xf1
.byte 0xc5,0xe7,0xb2,0x50,0x5c,0x4f,0x3a,0xfe,0x7d,0x6b,0xbf,0xe7,0x8d,0x9d,0x9a,0x0d,0xaa,0x3f,0x58,0x09,0x7c,0x0f,0x3a,0xe5,0xff,0x05,0xa7,0x2f,0x78,0x0d,0x5f,0xa3,0x3e,0xf8,0xc5,0x51,0x98,0xc7,0x6b,0x98,0x53,0xe3,0xdd,0x69,0xa6,0x20,0x64,0x99,0x41,0xd7,0x78,0xcf,0x83,0x11,0xc4,0x9a,0x85,0x32,0x12,0xe7,0xff,0x8e,0x4e,0xce
.byte 0x17,0xe6,0xb4,0x33,0x24,0x1c,0x99,0xba,0x1e,0xf8,0x3c,0xf3,0xb8,0x2e,0x80,0x89,0xa1,0x26,0x55,0xfc,0x22,0xde,0x5b,0x66,0xbb,0xf2,0x3b,0xd7,0xad,0x11,0xd6,0x5e,0x67,0xb2,0x34,0x6f,0x0c,0x7b,0x09,0xa9,0x7f,0x6f,0x88,0xe3,0xef,0x11,0x85,0x76,0x23,0x32,0x78,0x0b,0xa7,0x81,0xc0,0xdd,0xb0,0xac,0x59,0xe8,0xc8,0xde,0x13,0xa5
.byte 0x75,0x30,0xfb,0xac,0xaf,0x13,0x0f,0xb9,0x32,0xf9,0x41,0xfb,0x36,0x29,0x19,0x11,0xd3,0x6d,0xf5,0xd1,0xf0,0xf3,0x99,0x16,0xf5,0x04,0x01,0x41,0x94,0x8d,0x89,0xc6,0x9c,0xf2,0x39,0x9d,0x07,0x74,0x12,0x70,0x89,0xff,0x16,0xc1,0x79,0x30,0xf5,0x27,0x24,0x75,0x48,0x51,0xcd,0x81,0x15,0xcd,0x70,0x54,0x58,0x9b,0xe5,0x80,0x9c,0x2b
.byte 0xdc,0x99,0x69,0x8f,0x14,0xbe,0xee,0x21,0x96,0xa8,0xd4,0x6b,0xf5,0x60,0xa4,0x2c,0x11,0x01,0xff,0x07,0x99,0x72,0x4b,0x5b,0xca,0xb5,0x10,0xfc,0x32,0xdc,0xbc,0x56,0x91,0xe9,0xec,0xb5,0x51,0x0a,0xa1,0x46,0x2c,0x8e,0x74,0xd7,0x63,0x42,0x76,0x41,0x8e,0xc1,0x7d,0x5d,0x86,0xf9,0x8c,0xbe,0x9b,0x52,0xce,0xf1,0x5b,0x04,0x8c,0x62
.byte 0x8c,0xb7,0x62,0x0e,0x62,0x46,0xaf,0xc0,0xb0,0x8c,0x94,0x8e,0xff,0x17,0x83,0x45,0x45,0x19,0x01,0x49,0xf5,0x97,0x13,0xb7,0x9c,0xe5,0x8d,0x62,0xc0,0x25,0x01,0xcb,0xcc,0x23,0xd1,0xfd,0xdb,0xc6,0x4d,0xca,0xe2,0x50,0x3c,0x77,0x1a,0x48,0xb2,0x3e,0x66,0x6b,0x80,0xff,0x7e,0x26,0x23,0x21,0x1b,0xa3,0x1e,0x17,0x3d,0x13,0x7f,0x43
.byte 0x51,0x97,0xfc,0x56,0x1e,0xaf,0x79,0x43,0xd8,0x2a,0x32,0x4f,0x28,0x28,0xe2,0x34,0x19,0x2a,0x64,0x13,0xae,0xf8,0xaf,0x18,0xc7,0x97,0x5d,0xab,0xd4,0xa4,0x3d,0x1f,0xa1,0x13,0x60,0x17,0x63,0x8c,0xb7,0x6a,0x36,0x57,0xab,0x23,0xcb,0x87,0xad,0x4d,0x6b,0xce,0x7f,0xc2,0x65,0xf9,0x30,0xbc,0x22,0xb9,0x8a,0x6e,0x82,0xb9,0xcf,0xd5
.byte 0xe6,0xa7,0x8d,0x6c,0x50,0x6f,0x98,0x15,0xe3,0x38,0x37,0x7a,0x23,0x47,0xed,0xac,0xb8,0xa3,0xa3,0xe7,0x5c,0x51,0x2f,0x9e,0x69,0x49,0xea,0xaf,0x9b,0x6d,0x6f,0x64,0x54,0xcc,0xa4,0x23,0x7b,0x5b,0xa0,0x30,0x5a,0xcd,0xb7,0xa4,0xe5,0x02,0x13,0x36,0x21,0x58,0x96,0xa2,0xfd,0xeb,0x00,0x78,0x5c,0x71,0x63,0x32,0x80,0x63,0x8c,0x67
.byte 0xac,0xe7,0xe0,0x92,0x5b,0x27,0x49,0x9d,0xa6,0x84,0x64,0x2e,0x51,0x5d,0x87,0x83,0xbe,0xce,0xba,0x56,0x33,0x8f,0x5c,0xed,0xb6,0xc0,0x90,0x80,0x17,0x98,0x8a,0x7c,0xe5,0x51,0xaf,0x8d,0xc0,0x76,0x19,0x6b,0xc8,0x7e,0xa1,0x9d,0x94,0x18,0x25,0xd6,0xf4,0xc0,0x19,0x75,0x34,0xaa,0x83,0xfd,0x8c,0x8f,0xeb,0x08,0x63,0xcc,0x39,0xa8
.byte 0xf7,0xe6,0x75,0x53,0x01,0xed,0xb0,0x43,0x8c,0x54,0x37,0xea,0x1d,0x55,0x88,0x38,0x46,0x30,0x37,0xa2,0x85,0x4d,0xf8,0xdf,0xd4,0x42,0xd1,0xb8,0xac,0x1b,0x23,0x4d,0x49,0xd8,0x07,0xe0,0x0f,0x8a,0x24,0x73,0xb7,0xd1,0x0a,0x2c,0x1c,0x72,0x19,0x5b,0x84,0xac,0xe9,0xcb,0xd5,0xa0,0x2f,0x5d,0x2f,0xca,0xe7,0x25,0x5e,0x22,0x3d,0x37
.byte 0x22,0xfe,0x53,0xbb,0xb3,0xf3,0xc4,0x73,0x3a,0x43,0x1f,0xd7,0x73,0x82,0x5f,0x1d,0x94,0x54,0xfc,0xfc,0x7b,0xc5,0x27,0x6c,0x31,0x12,0x0c,0x20,0x59,0x43,0xd6,0xc2,0xeb,0xea,0x38,0x4e,0xa2,0xd8,0xe4,0x4a,0x07,0x36,0xe8,0x37,0x77,0xbd,0x14,0x5b,0xdb,0x7e,0x2b,0x77,0x08,0x4f,0x29,0x96,0xf9,0x11,0x80,0x6e,0x91,0x10,0xe6,0x9b
.byte 0xef,0x18,0xf9,0x73,0x16,0xbf,0xd4,0x18,0x8e,0x9e,0x29,0x6e,0xbf,0x38,0xea,0xa7,0x23,0xc2,0x85,0xe0,0x96,0xb5,0xd7,0x61,0x3b,0xfe,0xca,0xe6,0x03,0xdd,0xf2,0x67,0xfb,0x1f,0xb9,0x8b,0x73,0xca,0x1e,0xe7,0xd3,0xc4,0x5b,0xd2,0x35,0x01,0x77,0xfa,0x1e,0xea,0x6c,0x2a,0x8b,0xb3,0x9d,0x83,0x6d,0xef,0x1b,0x84,0x2b,0x7e,0xa4,0xc0
.byte 0x64,0x4d,0xea,0x44,0xce,0x23,0x63,0x5d,0x98,0xe4,0xfe,0x86,0x8e,0xe3,0x35,0xb4,0x4d,0x18,0x53,0x15,0xbc,0xaa,0x23,0x0b,0x0d,0xe4,0xa9,0x83,0xae,0xbe,0x43,0x57,0x33,0xf6,0xa4,0x95,0xf4,0x68,0xba,0xc7,0xf3,0xfe,0x83,0x3b,0x32,0xd3,0x65,0xb7,0x02,0x16,0x8f,0xb4,0xc8,0x4a,0x6d,0xf5,0x9c,0x58,0xa4,0xdc,0xe2,0x6c,0xaf,0xc9
.byte 0x7a,0x46,0xac,0x39,0x82,0x23,0x00,0xfd,0x49,0x2f,0x83,0xca,0x15,0xd6,0xfd,0x05,0xd4,0x50,0x9a,0xd3,0xee,0x31,0x78,0x7b,0x34,0xe1,0x96,0x83,0x22,0xaa,0xd8,0xc7,0xe4,0xee,0x76,0xb0,0x35,0x9e,0x26,0x97,0xb8,0x40,0xc2,0xe4,0x83,0x7b,0x3f,0x1c,0x01,0x6c,0x6d,0x0f,0x95,0x47,0x53,0x04,0x6d,0xa6,0x73,0xc0,0x8f,0x06,0xf8,0x86
.byte 0x84,0x96,0xe2,0x3e,0x38,0x17,0x50,0xbe,0x60,0x35,0x80,0x3a,0xba,0x24,0x3b,0x38,0xdc,0x15,0x49,0xfd,0xef,0xbd,0x33,0xe2,0xf6,0x21,0xfd,0x15,0xc2,0x34,0xce,0xe2,0xf2,0xe5,0xfa,0x68,0x4c,0xf0,0x38,0xda,0x9f,0xcc,0x65,0x3a,0x1c,0xe4,0x30,0x1e,0x01,0x89,0x6e,0x96,0xd5,0x45,0x27,0xb5,0x82,0x98,0xaa,0xbb,0xee,0xcc,0xb5,0xe4
.byte 0xbf,0xc6,0x7e,0x26,0x0a,0x7e,0x70,0x5c,0x52,0xc2,0x64,0xbc,0x49,0x37,0x50,0x78,0x81,0xdb,0xd9,0x80,0x68,0xad,0x1d,0x3e,0xa7,0xca,0x95,0x93,0x7c,0x18,0x0b,0xa9,0x92,0xd9,0xf8,0x8c,0xf4,0x58,0x40,0x4f,0x74,0xed,0xbc,0x0e,0x64,0x7c,0x8a,0x44,0x04,0x8e,0x33,0x27,0x46,0xa2,0x37,0xb3,0xce,0xff,0xc6,0x0b,0xb2,0x6c,0x41,0x01
.byte 0xe6,0x0d,0x6c,0xbe,0x60,0xd1,0x1e,0xde,0xb0,0x81,0x57,0x4f,0xa2,0xf8,0x02,0x5b,0x00,0x3d,0xca,0x9c,0x43,0x4a,0xf7,0xbe,0xab,0x3b,0xc0,0xc9,0xaf,0xab,0x1e,0xa7,0xf2,0x10,0xb1,0xb7,0x73,0x6b,0x43,0xf2,0x75,0xe1,0x7c,0xc7,0xb8,0x91,0x5d,0xc6,0xb8,0xb4,0xd8,0x2b,0x95,0xf5,0x8b,0xe3,0x9e,0x3e,0x5a,0x7a,0x55,0x05,0x7f,0xd2
.byte 0x83,0x36,0xb0,0xfc,0xc5,0x73,0x2a,0xa5,0x6c,0xcb,0x72,0xeb,0xae,0x38,0x38,0x05,0xdd,0xab,0xe2,0xa2,0x92,0x11,0xed,0xd5,0x2a,0x27,0x52,0x6b,0xba,0xae,0x56,0xf0,0x1b,0x60,0x53,0x9b,0x21,0xa6,0x62,0xfb,0x06,0x28,0xfe,0x94,0x26,0x38,0x72,0x80,0xed,0x76,0x61,0x5c,0x43,0xe2,0xee,0xfc,0x4f,0x37,0x52,0x00,0xc7,0xb6,0x51,0xcd
.byte 0xb4,0x9d,0x4f,0x28,0x31,0x44,0x14,0xba,0xe4,0x3b,0x79,0x63,0x8c,0x48,0x71,0x38,0xc2,0xeb,0x86,0x4f,0x5b,0x0a,0xc6,0x2e,0xbc,0x7a,0xea,0x09,0x11,0xc4,0x95,0x25,0x35,0x36,0x2a,0x08,0x2c,0xc5,0xc3,0xf0,0x94,0xaa,0xce,0xdc,0x48,0x42,0x7d,0xf6,0x36,0x21,0x58,0x89,0x5b,0x5f,0x11,0xaf,0x8d,0x5e,0x72,0x38,0x6b,0xda,0xe6,0xd6
.byte 0xde,0x5c,0xfb,0x64,0xbb,0x9b,0xb6,0xe1,0x8d,0x25,0x00,0xa6,0x75,0x13,0x2d,0xa4,0xbe,0xf7,0xdf,0xe2,0x15,0x50,0xfa,0x11,0xe8,0xe7,0x85,0x92,0x3b,0xcd,0x10,0x2c,0x91,0xfa,0xb7,0x88,0xed,0x80,0x8f,0xec,0x91,0x15,0x70,0x51,0x2f,0x3d,0x52,0x01,0xd8,0xc8,0x76,0x9c,0x4c,0xdb,0x13,0x02,0x6c,0x30,0xcb,0x3f,0xea,0x3b,0xa6,0x26
.byte 0x89,0x12,0x1f,0x34,0x04,0x46,0x05,0xff,0xa7,0x71,0x41,0xf7,0x88,0xa1,0x53,0x3e,0x2d,0x8e,0x5b,0xad,0xe6,0xab,0xb4,0x4d,0x0a,0x9d,0x40,0x6c,0x12,0xfc,0xd8,0x49,0xeb,0x7e,0x91,0xb9,0xca,0xac,0x60,0x93,0x28,0x44,0x91,0x6f,0x54,0xf6,0x7b,0x67,0x8c,0xed,0x43,0x2b,0x36,0x56,0x1e,0x91,0xc3,0x67,0xac,0xd6,0x51,0x00,0xcc,0x97
.byte 0xfa,0xde,0x4d,0x74,0x1e,0x62,0xd6,0x8a,0x2a,0xb5,0xc3,0x53,0x81,0xcd,0x2a,0xb2,0xc8,0xb7,0x95,0x99,0xba,0x6c,0xb8,0xde,0xe1,0x93,0x39,0x6f,0xe8,0xb7,0x3f,0x6c,0x41,0x10,0x44,0xd9,0x9d,0x7e,0xe6,0x8d,0xdb,0xbb,0x70,0x4f,0xe8,0x44,0x8f,0x7d,0x1d,0x0f,0x8a,0xa4,0xb8,0xa7,0xdc,0x82,0x59,0xb6,0x23,0x16,0x26,0xf9,0xc1,0x92
.byte 0xe0,0xbf,0x9c,0x38,0xc1,0x9f,0xd9,0x1e,0x07,0x74,0x8c,0x0d,0x93,0xdd,0x5d,0x25,0x2a,0xa9,0xbc,0x74,0x97,0x5f,0x39,0xc7,0x25,0x11,0x5c,0x89,0x78,0x39,0xa1,0xf1,0x11,0x16,0xca,0x08,0xcc,0x12,0x09,0x17,0x7f,0x1b,0x86,0x47,0xce,0x95,0xf3,0x0a,0x5e,0x75,0x52,0xed,0x5c,0x7c,0xae,0x1c,0x93,0x3e,0x44,0x1e,0x11,0xed,0x7b,0xff
.byte 0x92,0x27,0x30,0x1c,0xfe,0x33,0xa5,0x52,0x39,0x44,0x20,0x08,0x02,0x22,0x58,0x47,0xc4,0x63,0xec,0xd8,0xc4,0x29,0x04,0x44,0xa7,0x94,0xbc,0x8f,0xba,0x84,0xc8,0x16,0x85,0xe3,0xc3,0x58,0x9a,0xf6,0xdc,0x3e,0x15,0x58,0x06,0x04,0xc8,0x78,0xe6,0xb7,0x94,0x2c,0xce,0xb0,0x42,0x3c,0xbe,0x56,0xb4,0x82,0x84,0xb1,0xe7,0xb2,0xad,0x42
.byte 0x58,0x48,0x6e,0xd5,0x94,0x78,0xc3,0x5e,0xd8,0xb0,0xd3,0xa5,0x4c,0xe0,0xaf,0x77,0x0f,0x93,0xa3,0x03,0xf5,0xa6,0x50,0x19,0xb4,0xef,0x9f,0x57,0x84,0x24,0x12,0xb0,0xec,0xb0,0xb0,0x9a,0x9d,0x51,0x69,0xcb,0xd0,0x04,0x13,0x1e,0xfb,0xc1,0xc9,0x66,0xe7,0xb2,0x4c,0x75,0x25,0xbb,0xef,0x21,0x7b,0x00,0x3d,0x3f,0x4c,0x44,0x42,0xbf
.byte 0x45,0xeb,0x42,0x28,0xbb,0x88,0x41,0xfc,0x9a,0xc8,0x04,0x1e,0xff,0x79,0xb0,0x12,0x7f,0xf6,0xb2,0xcd,0x34,0xaa,0xaa,0x83,0x8a,0xb1,0x1b,0x13,0xe2,0xb1,0x9e,0xcd,0xe7,0x87,0x4c,0x0e,0x14,0xd4,0x00,0x65,0x95,0x9c,0x5f,0x76,0x94,0x63,0xb6,0x1e,0x7c,0xe0,0x97,0xe9,0x87,0x6e,0x86,0x7a,0xba,0xa1,0xea,0x60,0x62,0xb1,0x93,0x7a
.byte 0x08,0xba,0x85,0x18,0x61,0x1e,0x9b,0x63,0x09,0xea,0xf5,0x06,0xb8,0xc6,0x1b,0x24,0x3d,0x86,0x70,0x4a,0x6d,0xfa,0xb9,0xf2,0xb0,0xc8,0x59,0xa2,0xa6,0xde,0x78,0xf5,0x55,0xd4,0x91,0x57,0x56,0x53,0x8f,0x0f,0x4f,0x76,0xf9,0x57,0xa8,0x66,0xde,0xd6,0x33,0x30,0xb8,0x0c,0xb5,0x0a,0xea,0x84,0x9a,0xe5,0xcd,0x03,0x57,0xcb,0x8b,0x47
.byte 0xf5,0xe3,0x67,0xc1,0x69,0x42,0x7c,0xa3,0x91,0xa4,0x25,0x22,0x5a,0xf2,0x15,0x43,0xca,0x3a,0x62,0x2c,0xcd,0x9a,0x99,0xfb,0xb0,0xfc,0x2c,0x41,0xa6,0x84,0x51,0x93,0xc7,0x64,0xd8,0x95,0x8a,0xe7,0x0c,0xa4,0xd1,0x0d,0x57,0x4c,0x00,0xa6,0x55,0x3f,0x5b,0x9a,0x88,0xd3,0x39,0xf8,0xfe,0x30,0xf5,0xff,0xa7,0xcf,0x66,0x33,0xaa,0x20
.byte 0x2f,0x20,0xc6,0x47,0x33,0x36,0xac,0xf8,0x8b,0xca,0x83,0xa3,0xc3,0x5f,0x97,0xe5,0x9f,0x88,0x27,0x34,0x90,0xa1,0xfc,0x94,0xdc,0x5c,0x20,0x13,0x92,0x7c,0x9b,0x8b,0xe5,0x76,0xc2,0xb0,0x42,0x31,0x7c,0x0c,0xdd,0xbc,0xc5,0xcb,0xcd,0x72,0xaa,0xfc,0x89,0xbf,0x9d,0x79,0x19,0x9c,0x1b,0xca,0x19,0xe5,0x57,0xb3,0xbd,0x54,0x92,0xd4
.byte 0xbc,0x93,0x82,0x05,0x0b,0xc9,0x92,0x18,0x78,0xc1,0x23,0xff,0x65,0x7a,0x27,0x93,0xae,0xb6,0xf9,0x28,0x70,0x80,0xfe,0x97,0x73,0x06,0xe5,0x66,0x2b,0xb9,0xd9,0x20,0xe0,0x4a,0xf4,0xa6,0xa2,0xd1,0x6e,0x97,0x2b,0x90,0xa5,0x34,0x80,0x2c,0x25,0x3f,0x92,0xf2,0x41,0x50,0x5c,0x32,0x3d,0xe2,0xf0,0x6e,0x07,0x3c,0xc1,0x13,0x2d,0x04
.byte 0x2e,0x39,0xc6,0x19,0x74,0xe4,0x1d,0x4e,0x85,0xc8,0x3b,0x91,0x44,0x01,0xbc,0x86,0xdb,0xcb,0x0f,0xe5,0x54,0x6d,0xec,0xac,0xa9,0xdf,0x34,0xa2,0x9c,0xa9,0x77,0xe8,0x84,0x7f,0x82,0x67,0xf8,0xd1,0xce,0x7d,0xc8,0xc0,0x29,0xf8,0x59,0x03,0xea,0x6d,0x7d,0x21,0x07,0xe4,0x7e,0xf0,0xb1,0x13,0x8d,0x20,0x6d,0xa0,0xe9,0x98,0x3f,0x73
.byte 0xaf,0x8b,0x28,0x34,0xe9,0x12,0x57,0xaf,0x9a,0xd3,0xc7,0xb5,0xb0,0x60,0x26,0x72,0xae,0x39,0xf1,0x4a,0x38,0xa6,0xd5,0x07,0x7e,0xc1,0x37,0x1f,0x45,0x40,0x89,0x6f,0x1e,0x31,0x4d,0x6a,0x20,0x65,0x5e,0xd7,0x04,0x3d,0x9a,0x94,0x31,0x07,0xf7,0x20,0xef,0x1c,0xa6,0xcd,0xde,0x7e,0xcb,0x45,0x55,0x1e,0xe3,0x7f,0x3a,0x8f,0xf2,0xdf
.byte 0xa3,0x55,0xcb,0xfd,0xc2,0x51,0x49,0x07,0xda,0xb4,0x64,0xac,0x82,0xa3,0xb5,0x0f,0x87,0x6e,0xf6,0x6d,0xfd,0x9e,0x5f,0xf8,0xe5,0x74,0xa4,0xd4,0x61,0x6d,0x9e,0xea,0x41,0xc1,0xa7,0xa4,0x8d,0x13,0xdf,0x0c,0x8d,0x1d,0xe5,0x19,0xa3,0xd3,0xc1,0xf5,0xb5,0xe5,0x09,0xc7,0x52,0x2d,0x23,0x74,0x9e,0xa2,0xcd,0xe2,0x58,0x24,0x62,0xd8
.byte 0xcd,0x60,0x24,0x1d,0xf6,0x84,0xec,0x35,0x35,0xfc,0x6e,0x78,0x96,0xea,0xfa,0x40,0xff,0x10,0x05,0x8e,0xfa,0x4c,0xae,0xe4,0x41,0x71,0xf2,0x4d,0x81,0x6c,0x2c,0xc3,0x60,0xcf,0x2f,0xaa,0xcf,0xda,0xe9,0x2d,0x58,0x2c,0xec,0x4f,0x04,0x03,0xa5,0xbe,0xb2,0x40,0x11,0x5c,0x85,0xae,0xf9,0x1a,0x43,0x62,0x90,0xd6,0xa1,0xdf,0x34,0x59
.byte 0xf4,0x8e,0x1b,0x1e,0x89,0x8e,0xba,0x82,0xa5,0x3b,0x96,0xa7,0x4c,0x24,0x72,0x00,0x25,0x7a,0x36,0xa1,0x81,0x61,0x1d,0x62,0x57,0x7d,0x8b,0x32,0xe2,0xdb,0x31,0xe3,0x68,0xb4,0xb8,0xac,0x83,0x95,0x9a,0xbb,0x7a,0x54,0x42,0x08,0xd8,0x68,0xf6,0x97,0x9d,0x3a,0x94,0x7e,0x9b,0xa4,0x13,0x72,0x51,0x3d,0x90,0x32,0xa7,0x21,0x21,0x96
.byte 0xc4,0x67,0x3d,0x0b,0x4e,0x7d,0x8b,0x58,0x6b,0x8d,0x0e,0xcf,0x6d,0xbb,0x6b,0xe8,0xc9,0x47,0xc8,0x3d,0x59,0xa5,0x48,0xc6,0x74,0x61,0xd9,0x98,0xa6,0xba,0xa6,0x75,0x19,0x02,0xb6,0x15,0xd9,0xe0,0xa2,0x4a,0x1b,0xe0,0xe0,0x83,0xb8,0xcb,0x7b,0xf2,0x54,0x02,0xc9,0xcd,0x77,0x51,0xd2,0xce,0x9f,0x47,0x4a,0x32,0x7a,0x85,0x91,0xab
.byte 0x24,0x46,0x5b,0x50,0xa1,0x7b,0x7f,0x28,0xd4,0x09,0x62,0xce,0x15,0x9b,0x71,0xed,0x54,0x32,0xc6,0xb0,0x5d,0x11,0xfc,0x79,0x2e,0xfa,0xba,0x63,0xf5,0x56,0xe7,0xfe,0x93,0xce,0xb3,0x41,0xd8,0x3e,0x55,0xcb,0xfd,0x67,0x02,0x82,0xf7,0xc8,0x5f,0xd4,0x5a,0xee,0x80,0xe4,0x6c,0x2a,0xfe,0x2c,0x27,0x33,0x82,0x88,0x40,0x59,0x78,0x8e
.byte 0xfe,0x46,0x57,0xd1,0xd6,0xe1,0x51,0xf3,0x26,0xb3,0x87,0xeb,0xbd,0xce,0x67,0x27,0x0a,0x6d,0x9f,0xdc,0x41,0xf9,0xf8,0xcb,0x8f,0x78,0xdc,0x9d,0x8e,0x62,0x31,0x78,0x4c,0x6b,0xef,0xec,0x1a,0xd0,0xfb,0xf9,0x9d,0xc1,0x84,0xd7,0xeb,0x68,0x7d,0x8b,0x01,0x7a,0xca,0xc9,0x25,0x40,0x9b,0x0b,0x2b,0xa6,0x93,0x7d,0xe2,0xa2,0x40,0x0e
.byte 0x4e,0x1e,0x12,0x5d,0x62,0x0b,0x92,0x72,0x06,0x04,0x7d,0xdf,0x68,0x64,0xf1,0x99,0x88,0x38,0x73,0x23,0xe3,0xf5,0xbf,0x06,0x88,0x65,0x9b,0xc2,0xee,0x66,0xf5,0x6e,0xa3,0x03,0x04,0x5c,0x2e,0x7a,0xac,0x3e,0x31,0x59,0x6c,0x9e,0x3b,0x09,0xb0,0x80,0x7f,0x05,0x6b,0x6a,0xc0,0xc4,0xfb,0x24,0x71,0x49,0xa2,0xdd,0x7c,0x88,0xb9,0x21
.byte 0xcb,0xc0,0x86,0xf0,0x49,0xbd,0x46,0x06,0xbd,0x5d,0xd1,0x4c,0x64,0x9c,0x99,0x33,0x36,0xf3,0x23,0x74,0x85,0x75,0xc2,0xba,0x20,0x5f,0x20,0xbd,0x75,0x4f,0x83,0x28,0xae,0x91,0x68,0xb2,0xf2,0xc3,0x0f,0xd3,0xf8,0xaa,0x3b,0x42,0xfa,0x79,0xfb,0x7d,0x19,0xa5,0xbb,0x51,0xc1,0x91,0x5b,0x38,0xac,0x8c,0xd9,0x0f,0xe3,0x35,0x60,0xff
.byte 0x3d,0xa6,0x28,0x43,0x5d,0x7d,0xfe,0xb5,0xae,0xf3,0x47,0xc5,0xfa,0xe4,0x16,0x4b,0xb9,0xd2,0x51,0x39,0x9f,0x44,0xd8,0x50,0x70,0xab,0xe3,0xab,0xa8,0x63,0x31,0xe4,0xd3,0xeb,0x60,0x25,0x1d,0x67,0x8f,0x33,0x34,0xef,0x07,0xd4,0x92,0xce,0xbf,0x33,0xa8,0x3c,0x62,0x9a,0x09,0x22,0x42,0x12,0xba,0x80,0xb1,0x5b,0x98,0xec,0xbd,0x1b
.byte 0x84,0x3f,0x52,0x4f,0xc8,0x9f,0x85,0xc9,0x03,0x4e,0x34,0xa9,0x62,0xe6,0x0d,0x81,0x0e,0x01,0x14,0x3b,0x8b,0x3e,0x4f,0xf0,0xca,0xb5,0xbb,0x6d,0x0f,0x2c,0x43,0xb9,0x84,0x03,0x5a,0xee,0x5b,0x63,0xac,0xb9,0x55,0x96,0x3c,0x53,0xc4,0xd5,0xe6,0xe0,0xd4,0x51,0x1e,0x3c,0x86,0x92,0x9f,0x86,0xa4,0x74,0xd7,0x8e,0x6d,0x23,0x71,0xcf
.byte 0xaf,0xfe,0xf2,0x39,0x7b,0x41,0x9e,0x7e,0x1f,0x91,0xeb,0x7c,0xd0,0x18,0x67,0x7d,0xaf,0x24,0x87,0x40,0xab,0x0a,0x08,0xcc,0x00,0xee,0x3a,0xdc,0x02,0x70,0x94,0x74,0xdb,0x27,0x72,0xcd,0xff,0xf1,0x03,0xcf,0x00,0xc9,0x9b,0x56,0x3b,0x40,0x65,0xd5,0x80,0x9a,0xa7,0x17,0xb2,0x50,0x79,0x41,0x0d,0xe2,0x22,0x93,0xaf,0x7e,0xab,0x1b
.byte 0xa0,0x61,0x27,0x8a,0x67,0xae,0x56,0x96,0xd2,0x0d,0x49,0x02,0xe3,0x6b,0x13,0xe8,0x7d,0x53,0xd3,0x5a,0x19,0x68,0x07,0x1e,0x5c,0xaf,0x5e,0xa2,0x2f,0x14,0xbe,0xbd,0xa5,0x8d,0x90,0xf4,0x7a,0x86,0x06,0x03,0x68,0x82,0xb1,0xd3,0x69,0x7f,0xd1,0x23,0x24,0xf9,0xfa,0xde,0xfa,0x08,0x98,0x0b,0x23,0xf1,0xf7,0xdb,0xe0,0x58,0x6c,0xb7
.byte 0xb1,0x5e,0x98,0xe6,0x15,0xc9,0xaf,0x86,0x64,0x95,0xab,0xb3,0x7e,0x07,0xd1,0x10,0x71,0x21,0xcc,0xef,0x27,0xc1,0x96,0xe5,0xf1,0xa8,0x35,0x57,0x10,0xe3,0xd4,0x1a,0x32,0x56,0x5e,0x1e,0xb3,0xdd,0xa5,0xe9,0x80,0x4d,0x84,0x43,0x04,0xf0,0x71,0xba,0xb6,0x2e,0xf3,0x5c,0x3d,0xbc,0xa9,0x50,0x24,0xc3,0xdf,0x5d,0xb4,0x2c,0x20,0x60
.byte 0x10,0x1a,0x6e,0x44,0x0d,0x2b,0xa4,0x31,0xdc,0xd3,0x5d,0xa6,0x8d,0xde,0x48,0x99,0x0e,0xb4,0xc2,0x4a,0x1b,0x4f,0x45,0x54,0x9c,0x54,0x5b,0xd6,0x63,0xb2,0xb1,0x3a,0xa7,0x2a,0x42,0x70,0xfe,0xd8,0x33,0x1f,0x95,0xfc,0x26,0x82,0xc5,0x78,0x86,0xf5,0x93,0x07,0x31,0x31,0x74,0x5b,0x44,0xa4,0x5a,0xb2,0x8d,0xfc,0x38,0x99,0xde,0xbd
.byte 0xcd,0x26,0xe6,0xdf,0xd1,0x26,0x4e,0x9d,0x73,0xe7,0xa0,0x4e,0x31,0x3d,0x3e,0xea,0x4d,0xb9,0xc1,0x37,0xe3,0xba,0x32,0xd9,0xfd,0x3b,0x94,0x12,0xb0,0x84,0xd3,0xd9,0x73,0xe7,0xc3,0xc6,0xc4,0x2c,0xa2,0x21,0xeb,0xe7,0xd9,0xe5,0x53,0xe9,0xe7,0x4c,0x04,0xab,0xc4,0x70,0xd4,0xd4,0x11,0xba,0x18,0xf6,0xb4,0xcb,0xab,0xa0,0x6c,0x3f
.byte 0x9c,0x03,0xe8,0x97,0x68,0x22,0xa1,0x55,0xe8,0x3d,0x8d,0x44,0x5f,0x10,0x1e,0x57,0x9c,0xb1,0xca,0xf2,0xc7,0xce,0xea,0xe7,0x45,0x26,0xbc,0xd7,0x30,0x51,0x18,0xd7,0x70,0xa5,0xad,0xe4,0x7f,0x46,0xdd,0x8b,0xd8,0x0e,0x19,0x59,0x22,0xdc,0x89,0xd2,0xc4,0xbc,0x07,0xc1,0xab,0xaf,0x70,0xd5,0x55,0xe9,0x04,0x2c,0x28,0xd7,0x17,0xd7
.byte 0xc1,0x6b,0x79,0x4d,0x7f,0x8c,0x14,0xd9,0x47,0x15,0x21,0xa5,0xac,0x55,0x52,0x3b,0xf5,0x64,0x50,0x0a,0x94,0x4d,0x1a,0x23,0xcf,0x29,0x53,0xaa,0x2d,0xf1,0xc2,0x1b,0x19,0xc6,0x46,0x5a,0xd0,0x9e,0x7a,0x01,0xb5,0xe8,0xc7,0x6f,0xee,0xbd,0x61,0x12,0x0b,0x25,0x13,0x94,0xee,0x35,0xc9,0x68,0xe3,0x6c,0x4c,0xcd,0xd9,0x81,0x63,0x8b
.byte 0x57,0x86,0xc7,0xb2,0x8a,0xfc,0xb0,0x19,0x8c,0x64,0x78,0x05,0x29,0xc6,0x00,0x4d,0xdd,0x4f,0x34,0x5e,0xc1,0xb1,0xa0,0x86,0xe3,0x13,0x65,0x5f,0xec,0x54,0xc0,0xe8,0xbb,0x6c,0xec,0x56,0x11,0x38,0x5b,0x7c,0x55,0x35,0x67,0xf1,0xae,0x86,0x93,0x69,0x59,0x7e,0x8c,0x84,0x8e,0x1d,0xdd,0x99,0x19,0x95,0xb0,0xd2,0x42,0xf2,0x0a,0x43
.byte 0xb8,0x82,0x87,0x9e,0x6d,0x83,0x33,0xed,0x9f,0xef,0x10,0x8e,0x17,0x25,0x17,0xe9,0x84,0x56,0x16,0x55,0x28,0x07,0x40,0xf0,0xdc,0xff,0xc7,0x67,0x32,0xb9,0x32,0xe2,0xd5,0x20,0x82,0xee,0xfd,0x37,0xe8,0x54,0x8a,0xf7,0x76,0x42,0x78,0xde,0x53,0x4f,0xd5,0xfe,0x15,0x7a,0xf5,0xa6,0xe8,0x19,0x89,0xab,0x7f,0xc1,0x43,0xed,0xdd,0xa2
.byte 0x53,0xc4,0xb5,0x0a,0x6c,0xa5,0x83,0x9d,0x09,0x55,0xde,0xbe,0xa5,0xc2,0x00,0x93,0x92,0x8e,0x6d,0xbb,0xfc,0x0c,0x80,0x1f,0x7c,0x16,0x77,0xf9,0xb1,0xde,0x82,0x0b,0xf9,0x98,0xbc,0x49,0x68,0x5f,0xcf,0xb0,0xde,0xe3,0xc9,0xa5,0x35,0xa6,0xe3,0x4a,0x61,0xa3,0x34,0x51,0x64,0x64,0x1a,0x05,0x51,0x87,0xfb,0x04,0xe5,0xcb,0x6b,0xa9
.byte 0x04,0x4a,0xfe,0x19,0xcd,0xbd,0xad,0x9c,0x7e,0xe8,0x36,0x54,0x95,0xea,0x78,0x69,0xf5,0x3f,0xc5,0x11,0x42,0xc1,0x36,0xc3,0x72,0xe3,0xaa,0x15,0x30,0x40,0x73,0xae,0xc0,0x0f,0x3e,0xd8,0xe1,0xe6,0xb8,0xc6,0x81,0x79,0x72,0x2d,0xa2,0x1c,0x19,0x8a,0x31,0xcf,0x7a,0xfb,0x3b,0x51,0xee,0x25,0x50,0xea,0x43,0x0f,0xca,0x07,0xbc,0xde
.byte 0x3e,0x24,0xb1,0x57,0xb1,0xe2,0xc5,0xe3,0xc9,0x50,0x72,0x82,0xfc,0xf7,0xf6,0xfb,0x8c,0xd3,0x1a,0xa1,0xbb,0x71,0x40,0x71,0xf8,0xdc,0x14,0x8d,0x45,0xca,0x7b,0x5a,0xd7,0xfb,0x84,0x63,0xc3,0x60,0xf0,0xd1,0xca,0xdb,0x63,0xa2,0x74,0x75,0x42,0xaa,0x03,0x2b,0xc4,0xe8,0xc9,0xa8,0x95,0x8c,0x8f,0x06,0x6f,0x58,0x98,0x14,0x54,0xb4
.byte 0x4d,0x2f,0x5e,0x67,0x57,0xbf,0xe5,0xdc,0x8e,0xb8,0x6b,0x8d,0xb6,0x92,0xad,0x45,0x6f,0xda,0xec,0x8c,0xbc,0x30,0xde,0xcf,0x07,0x90,0xef,0xfd,0x6a,0xb6,0x24,0x0a,0xcf,0x53,0x87,0x7d,0xf1,0x7a,0x75,0x6e,0x5b,0x35,0xc6,0x70,0x24,0x8f,0xac,0xcd,0x78,0xe3,0x2b,0xd8,0x6c,0x35,0x55,0x0e,0xb7,0xb6,0xe1,0x3a,0x1c,0x96,0x4d,0x11
.byte 0x91,0x5c,0x40,0x87,0x02,0x91,0x12,0x6c,0x01,0x26,0x01,0xa7,0x9e,0x75,0xb7,0x22,0x31,0x81,0xa2,0x1e,0x6f,0xa1,0xd4,0x24,0x55,0xc9,0xc6,0x21,0xbc,0x94,0xe1,0xdd,0x6b,0xcf,0x27,0xfc,0xb0,0xd6,0xbd,0xa5,0x8d,0x7c,0xeb,0x04,0xcd,0x36,0x2b,0x09,0x6f,0x40,0x99,0x91,0x7b,0x30,0x4c,0x2b,0x84,0x62,0xeb,0xaf,0x0a,0x38,0xee,0x5d
.byte 0xeb,0xb8,0xe9,0xbf,0x24,0xc7,0x2f,0xde,0x4d,0x6f,0xaa,0x69,0xf6,0xae,0x01,0xb6,0x93,0x88,0x96,0xc4,0xaa,0x5b,0x80,0xfb,0xf1,0x08,0x93,0xbe,0x99,0x26,0x8b,0x27,0x56,0xd1,0x81,0x66,0x90,0x04,0x9f,0x09,0xda,0x93,0x22,0x65,0x98,0x4f,0x89,0x3b,0x2e,0xe1,0xbc,0x05,0x38,0xfe,0xb6,0xed,0xdd,0x48,0xa7,0x12,0x07,0x55,0x0c,0x1f
.byte 0xd1,0x45,0x03,0x06,0x72,0x2a,0xa6,0xb3,0x56,0x66,0x8b,0x4e,0x7d,0x72,0xe4,0x35,0xcf,0x83,0x12,0x99,0xe0,0x28,0x69,0xc5,0x1e,0x58,0xc0,0x94,0x58,0xa5,0xae,0x6e,0xfe,0x9e,0x05,0xca,0xae,0xfa,0x91,0x48,0x86,0x93,0x46,0x2f,0xe4,0x7c,0xac,0x16,0xb5,0xd2,0xbe,0xd9,0xf8,0x96,0x3b,0x57,0xfc,0x0b,0xd2,0x5c,0x50,0x0a,0xb2,0xcd
.byte 0xc9,0xcf,0x0c,0xca,0x9a,0x84,0xf2,0x2a,0xa8,0xe1,0x3d,0xab,0xc8,0x36,0x8f,0x8a,0x81,0x9b,0x52,0xd5,0x3b,0x1c,0x64,0xf2,0x74,0xc5,0x31,0x39,0xe1,0x84,0x7a,0xd0,0xd2,0xbe,0xb8,0x04,0x53,0x03,0x18,0xe6,0xa8,0x17,0x62,0xb5,0x8d,0x54,0xfc,0xd8,0x55,0x68,0x4a,0x8f,0x8e,0xf0,0x8b,0x17,0xce,0x83,0x8a,0xf4,0xb7,0x93,0xc9,0x95
.byte 0xdd,0xdf,0x7b,0x78,0x5f,0x6b,0x32,0x5e,0xcd,0xbd,0x44,0x8a,0x1f,0xfc,0x97,0xff,0x15,0xca,0x6b,0x2a,0x84,0x89,0x4c,0x6e,0x8a,0x45,0x53,0x81,0xc3,0x51,0x61,0x7e,0xb8,0x57,0xb7,0x2a,0x5d,0xc1,0xe6,0x2f,0x5e,0x7b,0xb5,0xc2,0x15,0x25,0xa3,0xe4,0x3a,0x85,0x59,0x43,0x4e,0x38,0x0b,0xeb,0x4d,0x61,0x62,0xd2,0xe8,0x06,0x54,0x45
.byte 0xeb,0x43,0xe7,0x22,0x61,0x27,0x85,0xdf,0x8c,0x19,0xd6,0xb8,0x52,0xa1,0xd4,0x34,0x52,0x3e,0xa5,0xf8,0x6c,0x3c,0xc3,0x53,0xec,0x77,0x80,0x53,0x1a,0xea,0x3b,0x00,0xfa,0xac,0x4c,0xfb,0x03,0xf0,0x03,0xcc,0x4d,0xfd,0x02,0x96,0x68,0x9e,0xab,0x8e,0xb0,0x9f,0x9f,0x0b,0x3d,0x27,0x21,0xd5,0x5a,0x5f,0x40,0x14,0xf2,0x21,0x2f,0x9d
.byte 0x1d,0x4b,0x48,0xec,0x59,0x68,0x9b,0x26,0xc6,0xab,0x10,0xd6,0xf6,0x83,0x5d,0x0d,0xf4,0x91,0xb4,0x3b,0x83,0xce,0xbf,0x84,0x4c,0xc1,0x0c,0x75,0x45,0x32,0xec,0xb8,0x82,0x17,0xc7,0x43,0x18,0x78,0x16,0x98,0x0b,0xdb,0xfa,0x3d,0x83,0x2a,0xa8,0x2e,0xad,0x9d,0x39,0x63,0xbf,0xc0,0xbb,0xc6,0x4c,0x81,0x60,0xe6,0x58,0xbe,0xc0,0x85
.byte 0x77,0x68,0xb5,0xfe,0xd8,0x0d,0xd8,0xc2,0x92,0x49,0x76,0x74,0x91,0x62,0x1c,0x20,0xc1,0x93,0x3c,0x4b,0xdb,0x9e,0x5a,0x97,0x6b,0xc8,0xb6,0x4f,0x3f,0x3c,0x2a,0xe8,0xeb,0x0b,0x1f,0x05,0x04,0xb4,0xbf,0xac,0x2a,0xc5,0x04,0xf2,0xda,0xfb,0xba,0x08,0x9e,0xf6,0x78,0xd9,0xb1,0xde,0xce,0xfa,0x7d,0x8e,0x22,0x83,0x23,0x5b,0x2a,0x35
.byte 0x62,0x2f,0x15,0x6f,0x4a,0x44,0x06,0x11,0xde,0xd4,0xea,0xb4,0x05,0xd0,0xd4,0x7f,0x3a,0x20,0x6e,0x01,0xa6,0x79,0xd6,0x67,0x19,0xec,0x76,0xfd,0xaa,0x00,0x28,0x6b,0xf3,0xef,0xdd,0xef,0xec,0xf4,0x99,0xc2,0x25,0xf8,0x3c,0x18,0xcf,0x65,0xf0,0xd3,0x30,0xd3,0xeb,0xc7,0x4c,0xa1,0x3e,0x3d,0xa4,0xe7,0x20,0x78,0xe0,0xbe,0x9f,0x48
.byte 0xbb,0x51,0x30,0x62,0x16,0xe9,0x3a,0x4d,0x5c,0x6e,0xa5,0x4f,0xa8,0x77,0x92,0xd7,0x87,0x4e,0xf9,0xb9,0x43,0xeb,0x4e,0xd2,0x2f,0xc0,0x29,0x22,0xfe,0x37,0xc4,0x58,0x36,0x71,0x1c,0x18,0x05,0x44,0xd2,0x24,0x01,0x25,0x65,0x1b,0xc7,0xfd,0xd4,0xef,0x15,0xeb,0x91,0x06,0x26,0x74,0x2e,0x28,0xb2,0x46,0xb5,0xb5,0xaf,0xeb,0xaa,0x9a
.byte 0xc8,0x9a,0xd0,0x34,0xb9,0xf4,0xce,0x6e,0x7a,0xca,0x63,0xf0,0x46,0xad,0xfb,0x53,0xa8,0x2b,0xc4,0x2f,0xed,0x7c,0xab,0x63,0x1c,0xb6,0xfe,0xb7,0x53,0x53,0x3f,0x5a,0x5f,0x45,0xd9,0x50,0x79,0x43,0xa3,0x56,0x0a,0x9e,0x6e,0x22,0xf5,0x85,0x6f,0xe9,0x81,0x94,0xa6,0xc5,0x0d,0x8b,0xef,0x3e,0x0f,0x68,0xbf,0x20,0x86,0x0d,0xd8,0x32
.byte 0xde,0xab,0xf0,0x0b,0x96,0xce,0xc2,0xad,0x8d,0xe1,0x3b,0x37,0xd1,0x06,0xec,0x38,0xec,0x42,0x06,0x3a,0xb1,0xc6,0xb8,0xc0,0xc5,0xea,0x8f,0xcb,0x5f,0xf0,0x15,0x1f,0x77,0x37,0x46,0x10,0xfb,0xc3,0x55,0x7d,0x53,0x41,0xb9,0xb6,0x31,0xe6,0xab,0x0d,0xeb,0x45,0xfe,0x45,0x65,0x46,0xa9,0xbc,0xd9,0xcd,0x3f,0x26,0xce,0x32,0xd2,0x0d
.byte 0x7b,0x8f,0xfd,0x6f,0x70,0x33,0x98,0xab,0x3e,0xdb,0x16,0x24,0x63,0x96,0x55,0x04,0x3e,0xb1,0x06,0x1b,0xf3,0xca,0x9e,0xb2,0x47,0x42,0x51,0x5c,0xdc,0xff,0x40,0x72,0x45,0x09,0xdf,0xeb,0x50,0x57,0xf5,0xcb,0xe8,0xb6,0x0c,0xe3,0x13,0xb1,0xdf,0x0e,0x40,0x90,0x6d,0x51,0xee,0xc7,0x0e,0x6e,0xa7,0x67,0xcd,0x59,0xef,0x09,0x3c,0x9c
.byte 0x81,0x66,0xf7,0xfb,0x4a,0x14,0x08,0x14,0xc4,0x72,0x79,0x55,0xaa,0x99,0xa5,0xe1,0xfe,0x12,0xf7,0x07,0x05,0x27,0xc7,0xf8,0x18,0xaa,0xf8,0x20,0xac,0xc7,0x23,0x28,0x58,0x38,0xc4,0x1d,0x88,0x8d,0x5a,0x33,0xa1,0x04,0xaa,0xb4,0x7e,0x9c,0xe5,0x60,0x25,0xb1,0xa4,0x75,0x61,0xba,0xa7,0xf5,0x9e,0x2a,0xc4,0x26,0x28,0x7f,0xb0,0x56
.byte 0xaa,0x0a,0x6a,0xd8,0xab,0xfb,0x7a,0x30,0x3c,0x26,0xa9,0x38,0x21,0x9d,0x7d,0x3c,0xef,0x81,0xbf,0x50,0x5c,0x7e,0x1e,0x4a,0xa6,0xec,0x16,0x6b,0xac,0x74,0xf8,0xdb,0x8b,0x1b,0xa6,0xd8,0x48,0xc9,0x25,0x3e,0xa0,0x7b,0x39,0x52,0x17,0x17,0xc2,0xf3,0xc6,0xfa,0xcb,0x4d,0xdf,0xdc,0xf9,0x37,0x00,0x08,0xb6,0x5f,0x12,0x81,0xed,0x6e
.byte 0xc5,0x22,0xb3,0xcd,0x57,0x81,0xf7,0x72,0x32,0x9a,0x1c,0x5b,0x96,0xd5,0xb2,0x65,0x6a,0xbc,0x8a,0x6d,0xa4,0xe0,0x54,0x65,0x7e,0x82,0xce,0xa3,0xd9,0x59,0xb8,0x46,0xff,0x18,0x83,0xb0,0x40,0x17,0x84,0x39,0xea,0x32,0xaa,0x52,0xd7,0xb9,0xc1,0x92,0xe5,0xaf,0x42,0x7d,0xde,0xc7,0x71,0xa2,0x0e,0x02,0x04,0x7c,0x92,0x91,0x6e,0xbb
.byte 0x91,0xc7,0x38,0x36,0xe6,0xef,0x2f,0x87,0x73,0xe8,0xce,0x04,0x58,0xe4,0xc7,0x0f,0xfb,0x69,0x77,0xf6,0x01,0x41,0x13,0x1d,0xc9,0x59,0x7a,0xf3,0xc2,0x20,0xf7,0xd8,0xfd,0xd9,0xe7,0xd1,0x14,0xe1,0xf1,0x1a,0x35,0x1f,0x8e,0x3f,0x78,0x1e,0xe2,0x01,0x92,0x07,0x3f,0xf4,0x73,0x4f,0x36,0x48,0xb3,0x4c,0x51,0xbe,0xea,0x24,0x20,0x7d
.byte 0xaa,0x54,0xe0,0xea,0xf7,0xde,0xaa,0x43,0xa1,0x22,0x85,0xd4,0xf7,0x50,0x47,0x68,0xe9,0x92,0x41,0x84,0xe4,0xa9,0x1f,0x96,0x43,0xb5,0x3b,0x8b,0x23,0xdd,0x2f,0xd1,0xcc,0x5e,0xcb,0xf5,0x77,0xd8,0xc9,0xc0,0xfe,0x1e,0x6c,0xac,0xb3,0x6f,0xc1,0x6c,0x5a,0x33,0x35,0x7b,0x09,0xe7,0x4b,0x2e,0xbf,0x9f,0xb1,0x68,0x56,0xb5,0x17,0x2d
.byte 0x77,0xc6,0x76,0xbc,0x47,0xf4,0x41,0x3f,0x35,0xb3,0x41,0xff,0xb8,0xc6,0xe2,0x1e,0xfc,0x2f,0x3f,0x26,0x30,0x10,0xb9,0x37,0x8e,0xa9,0x59,0xff,0x7f,0x74,0x3d,0x99,0x0c,0x65,0x62,0xa4,0xc9,0xed,0xaf,0x72,0xb4,0x7a,0x17,0xab,0xbb,0x33,0xda,0x24,0xde,0x97,0xfb,0xa8,0x9d,0x10,0x6c,0x1e,0x9a,0x13,0xec,0x7e,0xb8,0xa5,0xe6,0x0d
.byte 0x92,0x96,0xbe,0x91,0x8c,0x69,0x07,0x78,0xe0,0x02,0x7e,0x97,0x61,0x2f,0xf8,0x0f,0x17,0x3d,0x7d,0x09,0x13,0xb9,0x1c,0xcf,0xd0,0x9e,0x85,0x35,0x3c,0xa3,0x06,0x82,0xb2,0xb2,0x1c,0x09,0xe3,0x91,0x43,0x13,0xff,0x9d,0xa7,0x05,0xd7,0x69,0x4a,0xe1,0xa7,0x1a,0xaa,0x57,0x1f,0xcf,0xcb,0x43,0xac,0x40,0x34,0xd2,0xb8,0xff,0xf8,0x0f
.byte 0x82,0xf7,0xa8,0x9d,0x5f,0x5f,0xb9,0xf9,0x78,0x89,0xe4,0x65,0xa8,0x54,0x5f,0x47,0xb4,0x53,0xe4,0x73,0x2a,0x29,0xe0,0xa0,0x70,0x79,0x22,0x51,0x3a,0x5a,0xc6,0x42,0x8c,0x74,0xdc,0xf7,0x85,0xce,0x1f,0x2a,0x1b,0x4d,0x83,0xcb,0xd2,0xce,0x5a,0x4f,0xde,0x18,0x48,0x64,0x4c,0xe8,0x17,0xb2,0x55,0xfe,0x6c,0x5f,0x31,0xa7,0x03,0x4a
.byte 0xae,0x8f,0x40,0x47,0x7e,0x92,0xa2,0x19,0x7c,0x53,0x32,0xaa,0x8c,0xc2,0x06,0x79,0xc3,0xc7,0x45,0x02,0x77,0x23,0x12,0x37,0x2b,0x8e,0x84,0xf5,0x8b,0x1a,0x4c,0xd3,0x10,0x0e,0xba,0x33,0x8f,0x2e,0x02,0x21,0x63,0xa8,0x3f,0x02,0x6e,0x42,0x49,0x0a,0x5a,0xf4,0xf0,0xe8,0xed,0x53,0x1f,0x99,0x73,0x65,0x88,0xe3,0xfc,0x60,0x34,0x4e
.byte 0x91,0xa5,0x0c,0xbe,0x1d,0xbb,0x95,0x57,0xff,0x7a,0xa1,0xec,0x34,0xe7,0xb6,0x63,0x8d,0xb2,0x3a,0x01,0xa3,0x31,0x50,0xaa,0x8a,0xef,0x97,0x9d,0xe5,0xd7,0xf9,0x8e,0xc1,0x5d,0xcb,0xd3,0x8d,0xc1,0x3e,0x05,0x95,0xfc,0x63,0x14,0xe4,0x44,0x58,0xee,0x3d,0x30,0x04,0x80,0x0c,0x63,0x1d,0x14,0xd2,0xc3,0xc1,0xe1,0x67,0x51,0x64,0x8a
.byte 0x23,0xaf,0x31,0x05,0x46,0x4f,0xf7,0x88,0x80,0xcb,0xba,0x47,0x31,0x40,0x3f,0xa0,0xfb,0xe7,0x8e,0x34,0xc1,0xe4,0x69,0xbd,0xb1,0x07,0x2b,0x55,0x27,0x0d,0x04,0xe8,0x74,0x93,0x04,0x15,0x62,0x1f,0x9a,0x66,0xe9,0x8d,0xa1,0xd6,0xc1,0x50,0xd8,0x8e,0x6a,0xe3,0x7c,0x9a,0xb7,0xa0,0x6f,0xf6,0xee,0x2e,0x03,0x67,0x1c,0x06,0x08,0x92
.byte 0x83,0xf5,0x4f,0xa1,0xf7,0x23,0x01,0x1a,0xf8,0xda,0x80,0xca,0xce,0x2a,0x01,0x59,0xee,0xeb,0xbe,0xc4,0x95,0xf2,0xfd,0x7e,0x15,0xb6,0xbe,0x69,0x6b,0x4b,0x33,0x5b,0x83,0x89,0x1a,0x29,0xac,0x23,0x31,0x29,0xd8,0x29,0xea,0x87,0xf3,0x12,0x40,0x4b,0xcc,0xb6,0x07,0x0d,0xbf,0xf4,0x72,0x52,0x74,0x95,0xc9,0x15,0x0a,0x09,0x93,0xdf
.byte 0xd6,0x7e,0x4a,0x3c,0xd0,0xf6,0xfc,0xcf,0x75,0x7e,0x65,0x4e,0x5a,0x49,0x72,0xbd,0x46,0xbe,0x5e,0x26,0xc5,0x09,0xdb,0xea,0x5c,0x44,0xcc,0xaf,0x92,0x54,0x58,0x6b,0x5f,0xa8,0xf3,0xe6,0xed,0xb0,0x41,0x1c,0xb1,0x9b,0x1d,0x8b,0x3a,0x27,0x31,0x50,0xf0,0x76,0xaf,0xbf,0xd7,0x40,0x4f,0x23,0x59,0xcb,0x4e,0xa9,0x12,0xd9,0x16,0x5e
.byte 0x8d,0x70,0xb0,0x36,0xd7,0xf6,0xde,0xa0,0x62,0x4b,0x8b,0xea,0xf1,0x7c,0x82,0x05,0x80,0x17,0x8d,0x14,0xf3,0xb4,0x9a,0x42,0xa1,0xa2,0x64,0x28,0xf8,0x38,0x0e,0x8e,0xb6,0x0e,0xb9,0x6e,0xfa,0x77,0xf3,0xec,0x28,0x6f,0x56,0x93,0x13,0x1c,0x5e,0x01,0x31,0x8d,0x65,0x46,0xc9,0xff,0x46,0x5e,0xc3,0xbf,0x75,0x45,0x19,0xb4,0x8e,0x8e
.byte 0xf1,0x90,0xda,0x83,0x57,0x6c,0x30,0x49,0xf2,0x67,0x64,0x0a,0xf5,0xb5,0x51,0xac,0x91,0xa0,0x5a,0x9f,0x19,0xbd,0x02,0xb2,0x0d,0x5d,0x1f,0xbe,0xc2,0x76,0xf1,0xcb,0x59,0xf8,0xd1,0x90,0x67,0x17,0xda,0xd1,0xd8,0x9f,0x33,0x00,0x61,0x5d,0xd7,0x90,0xd6,0xd6,0xcd,0x16,0xf7,0x35,0xef,0xcb,0x2f,0xbb,0xc0,0x9e,0x2a,0xc8,0xf6,0x03
.byte 0x7a,0x1d,0x4c,0xac,0xde,0xf1,0x25,0x9a,0x3e,0xb1,0xae,0xbb,0x59,0xab,0xe7,0x81,0xa5,0x3f,0x42,0x07,0x4f,0x66,0x8f,0x7c,0x93,0xf6,0xab,0x44,0x2e,0x9a,0x68,0x95,0x16,0xc8,0x59,0x5b,0x0e,0x00,0xdc,0xc8,0x2a,0x97,0x20,0xca,0xdf,0xb1,0x6c,0x1f,0x64,0xe4,0xed,0xd3,0xae,0xea,0x47,0x2a,0xfd,0x52,0x30,0x13,0x05,0xe6,0xc7,0xc6
.byte 0xca,0xde,0xec,0xe3,0xe2,0x58,0x99,0xbf,0xaa,0xff,0x64,0xfc,0xda,0x55,0x3c,0x29,0x00,0xc6,0x60,0xde,0x33,0xbe,0xec,0xe0,0x14,0x2c,0xb6,0x30,0x9f,0xec,0x46,0x11,0x9a,0x36,0x64,0xab,0x2c,0xcb,0x39,0xe9,0x87,0x6a,0x73,0xe4,0xe8,0x6b,0x81,0x1b,0x61,0xc1,0x1a,0xbe,0x1e,0x66,0x76,0x6b,0xaf,0xab,0xb0,0xaf,0x59,0xa9,0xb9,0x54
.byte 0x84,0xe0,0xca,0x10,0x5e,0xe1,0xc1,0x9d,0xed,0x23,0x5b,0xeb,0xa6,0x9f,0x7a,0x0c,0x94,0x97,0x21,0xf4,0xee,0xec,0x69,0x47,0x05,0xfc,0x21,0xbf,0x79,0x47,0x63,0x4e,0x78,0x99,0x07,0xf0,0x53,0xbc,0x3a,0xc3,0xcd,0x36,0xdf,0x33,0x7b,0xa0,0x91,0x39,0xdd,0x7f,0x49,0xaa,0xde,0xdd,0xa2,0x93,0x8f,0x36,0xca,0xaa,0xad,0xd2,0x3d,0xd1
.byte 0x1a,0xdb,0x7e,0x97,0xce,0xe7,0xb3,0xda,0x3e,0x25,0x0d,0xc7,0x0d,0xdb,0x54,0x93,0x20,0xf1,0x10,0xdd,0xb5,0xc9,0x75,0x67,0x61,0xa3,0x24,0x41,0x42,0xb9,0x67,0x03,0x0c,0x52,0xe4,0xf1,0x68,0x07,0x90,0x7a,0xf9,0xe9,0x33,0x19,0x0e,0x11,0xb3,0xda,0xe8,0x5a,0x84,0xf3,0x41,0x77,0x43,0x6c,0xea,0x98,0x23,0xd8,0xae,0xf6,0xdd,0x5a
.byte 0xc7,0x4f,0xf4,0x06,0x80,0xd9,0x84,0x90,0x27,0xf5,0x0e,0x85,0x44,0xa8,0x2f,0x03,0x02,0xca,0xa6,0x8f,0x44,0x7a,0x3c,0xb8,0x2f,0x32,0xab,0x9d,0xd7,0xde,0xee,0x1c,0x33,0x91,0x95,0x96,0x66,0xb2,0x03,0xb3,0x95,0x8d,0x45,0x41,0xd3,0xb9,0x19,0xf1,0x93,0xc7,0xe8,0xce,0x16,0x8b,0x69,0xe0,0xdb,0x6b,0x2d,0x44,0xe3,0xff,0x92,0x8f
.byte 0x16,0x97,0x3e,0xc1,0x4d,0xc3,0x0b,0x5a,0xff,0x6e,0xe2,0x83,0x91,0x13,0xe5,0xc2,0xac,0x4a,0x97,0x81,0xd0,0x37,0x83,0x10,0x78,0xce,0xd9,0xed,0xe7,0x7f,0x74,0x23,0x22,0x42,0x72,0x12,0x50,0xf2,0xef,0x04,0xf5,0xf1,0x86,0xdd,0x7d,0x5c,0xea,0x81,0x7c,0xfb,0x66,0x2b,0x7e,0xfa,0x84,0xa7,0x4c,0x42,0x08,0x2d,0xa4,0x92,0xc5,0x21
.byte 0xf3,0x1d,0x22,0x76,0x09,0x3f,0xba,0x1a,0x3d,0xaf,0x3d,0xae,0x33,0x8f,0xd7,0x52,0x18,0x7c,0x9e,0xcf,0x39,0xb1,0x84,0x0b,0xc6,0x26,0xc0,0x5b,0x6e,0xd2,0xae,0x6b,0xa4,0xe9,0x6f,0x74,0x51,0x47,0x17,0x1b,0x6e,0xdf,0xd0,0x6c,0xce,0x46,0x3f,0xda,0x9d,0xda,0xa3,0xdd,0x50,0x0d,0x94,0xa2,0x82,0x16,0x6b,0x1d,0x9e,0x39,0x69,0x96
.byte 0x40,0x42,0x87,0xba,0xb6,0xae,0xe5,0x0c,0xee,0x9f,0xf5,0x8a,0x66,0x94,0x68,0x40,0xd3,0x76,0xea,0x27,0x5f,0xf8,0xe2,0x6e,0xb6,0xb2,0xf2,0xb6,0x46,0x9c,0xef,0x18,0xb4,0xd9,0x7f,0xa8,0x86,0xae,0xb1,0xd3,0xe9,0xc5,0xa9,0x18,0x36,0xdf,0x26,0x19,0x5e,0xa6,0x29,0x3a,0xc0,0x4c,0x1b,0x58,0x2d,0xc1,0x33,0xc7,0x06,0x4f,0x14,0x42
.byte 0x17,0x2c,0x62,0x81,0x7e,0x76,0xd6,0xfc,0xa4,0x8e,0xeb,0x56,0x8f,0xac,0x57,0xa1,0x73,0xb2,0x53,0x18,0xa8,0x06,0x9a,0x20,0x33,0x8a,0xe8,0x40,0x68,0x45,0x31,0xc3,0xb8,0xc0,0xd8,0xf4,0x2e,0x11,0xd3,0xf3,0x7d,0xc7,0x45,0x2f,0x58,0xb7,0xce,0x52,0x9d,0x87,0x1a,0x45,0x1e,0x0b,0x17,0x55,0xb7,0x74,0xec,0x2c,0xb4,0xac,0x83,0xc9
.byte 0xff,0x77,0xbd,0x39,0x99,0xce,0x12,0x44,0x80,0x84,0xcd,0x56,0x23,0x24,0x8a,0x77,0x45,0xd9,0x7c,0xdb,0x23,0xa4,0x72,0xd0,0xbf,0x4d,0x5e,0x37,0x21,0xe3,0xd4,0x48,0x2b,0xb9,0x73,0x49,0x82,0xa1,0x54,0x61,0x5d,0x8b,0xae,0x14,0x89,0x20,0x62,0x43,0x6d,0x16,0x34,0x9a,0x0e,0x73,0xf0,0x29,0x3c,0xa2,0xcb,0x66,0x15,0xcc,0xb4,0x49
.byte 0xde,0x22,0x93,0xde,0xce,0x84,0x9c,0x19,0xda,0x16,0x62,0x62,0xca,0xae,0x71,0xde,0x36,0x7d,0x3f,0x9f,0x9a,0x51,0x2b,0x18,0x91,0xa3,0xf9,0x47,0x7f,0x8f,0x45,0x9a,0x12,0xe0,0xdb,0x20,0xa5,0x44,0x52,0x99,0x36,0xac,0xe9,0x1c,0x61,0x5e,0xd6,0x51,0xc1,0xbb,0x2b,0x75,0xd6,0x28,0xab,0x22,0x11,0x40,0x24,0x77,0x56,0x8d,0x62,0x8c
.byte 0x41,0x17,0x06,0x4d,0x2f,0x8b,0x0d,0x6c,0x44,0x00,0x62,0xee,0xfd,0x4b,0x61,0xb3,0xe6,0x40,0xa3,0x54,0x51,0x67,0x26,0x18,0x06,0x4f,0xd4,0x4b,0x73,0xbf,0xee,0x53,0x50,0x7a,0x6e,0xc2,0x42,0x7f,0x78,0x34,0xd6,0xcb,0xdf,0x49,0xe0,0x8e,0xef,0xd6,0x3c,0x19,0x77,0x8a,0xcd,0x48,0xdf,0x71,0x07,0x0e,0xf0,0xe8,0x09,0x91,0xe7,0xaf
.byte 0x2f,0xf7,0x17,0xb5,0x9e,0x3f,0xe1,0x37,0xbf,0xb1,0xa2,0x89,0xd2,0x08,0x9d,0x67,0xb2,0x1e,0xe6,0x18,0xc0,0xfc,0x91,0xdc,0x79,0x32,0x13,0x32,0xf4,0x07,0x1b,0xf9,0x7e,0x2c,0xa5,0xf8,0xbe,0x57,0xce,0xfd,0x84,0xdc,0x85,0x6c,0x42,0x32,0x20,0x6a,0x91,0xbd,0xba,0xf9,0x83,0x0a,0x53,0x0a,0x3e,0x58,0x36,0x80,0x1f,0xde,0x8b,0xee
.byte 0x95,0x2a,0x74,0xbb,0x6e,0x06,0x28,0x40,0xb3,0x3d,0xf5,0x1c,0x65,0x0d,0xf7,0xcc,0x5e,0x1a,0x01,0xfe,0xb2,0x39,0x92,0x49,0x32,0xad,0x5a,0x9a,0xbb,0x06,0x48,0x7b,0xb0,0x4f,0x16,0x10,0xf7,0x46,0x98,0xe5,0xe7,0xdc,0xf8,0x3c,0x3d,0xa6,0x96,0x4f,0x25,0x2e,0xa7,0x99,0x5a,0xe9,0x17,0x35,0x48,0x56,0x48,0x5d,0xea,0x3c,0x4f,0x9a
.byte 0x7a,0x0c,0x28,0xaf,0x64,0x56,0xb0,0x4a,0x34,0xa1,0xfc,0xef,0xb8,0x50,0xe5,0x71,0x3f,0x8d,0xda,0x3c,0x75,0xb8,0x22,0x8a,0x89,0x36,0xd5,0xea,0x2f,0xfd,0xfb,0xf3,0x94,0xf2,0xed,0xbc,0xde,0xee,0x6d,0xc0,0x65,0x47,0x8a,0x11,0x52,0xaf,0xf4,0xf0,0x89,0x4d,0x68,0xa5,0x90,0x6d,0x30,0x46,0x0d,0xc6,0x38,0x19,0xe2,0x2a,0x62,0xe9
.byte 0xb3,0x68,0x9a,0x26,0x4b,0x01,0x83,0xbb,0x9d,0x6c,0x23,0x38,0xee,0xe1,0x72,0x60,0xb5,0x30,0xda,0x27,0xd6,0x12,0xe0,0xe4,0x65,0x01,0xc5,0x4b,0xc6,0xbf,0xee,0xe9,0x47,0xf4,0xa7,0x64,0xec,0x61,0x34,0xa9,0xda,0x16,0xa0,0xcc,0x0d,0xdc,0xa4,0xe8,0x8f,0xdc,0xcb,0x4e,0xe7,0xc9,0x7f,0x29,0xc4,0x89,0xbb,0xc2,0x83,0xc8,0x3e,0x28
.byte 0x02,0x73,0x7e,0x63,0x9c,0x88,0xc6,0x35,0x51,0x54,0x17,0xed,0x81,0xbb,0x3a,0x29,0x07,0xe4,0xa6,0xa3,0x28,0x28,0x65,0x40,0x9d,0x86,0xad,0x02,0x7e,0x8b,0x26,0x54,0x32,0x79,0x38,0x24,0xef,0x4a,0xfc,0xaf,0xc0,0x6b,0xd2,0x11,0x86,0x40,0x54,0xe8,0x56,0x9c,0xd8,0xc4,0xab,0xab,0x86,0xd4,0x2d,0xef,0x58,0x22,0x10,0xe0,0xb3,0x89
.byte 0xb7,0x44,0x35,0x5f,0x7f,0x6f,0xd3,0x11,0x66,0x75,0xd5,0x45,0x95,0x93,0x8c,0x05,0x32,0x97,0xad,0x92,0xe3,0xef,0x03,0xb0,0xae,0x28,0x00,0xca,0xac,0x4b,0x36,0xa5,0xa5,0x4a,0x70,0x69,0xe6,0xeb,0x61,0xfc,0xb8,0xc8,0xca,0x88,0x13,0x50,0x14,0xf6,0x5a,0x86,0x41,0x1d,0x84,0xd4,0x59,0x8c,0xae,0xbc,0x68,0xc0,0x33,0x4b,0x13,0x28
.byte 0x89,0xb2,0x63,0x2d,0x85,0xc8,0x33,0x15,0x2e,0x9f,0xeb,0x3b,0xf8,0x26,0xd2,0x79,0x42,0xa9,0x70,0xb7,0x52,0x00,0xdf,0x1a,0x36,0xae,0x85,0x3b,0xf5,0x73,0x80,0xc1,0x7c,0xb4,0x7e,0xbf,0x6b,0xde,0xa1,0xc2,0x9f,0x85,0x86,0x3f,0xff,0x55,0x2d,0x4a,0x6f,0x2d,0x25,0x3c,0x01,0x54,0x92,0x3f,0x63,0x68,0x61,0x4a,0x8c,0xcf,0x34,0xd7
.byte 0x3b,0xcc,0x5e,0x6f,0x80,0x38,0x2f,0xda,0xb3,0x70,0x60,0x35,0x8e,0x3d,0x92,0x4f,0xc8,0xaf,0x4e,0xcd,0x69,0xa8,0x0e,0x62,0xb7,0xbe,0x9b,0xa8,0x09,0x67,0x68,0x08,0xf0,0x39,0x00,0x5e,0x04,0x11,0x64,0x21,0x75,0xf4,0x2a,0xdd,0x3a,0x81,0x95,0xe1,0xa2,0x26,0x4e,0xc2,0x17,0x7e,0xe3,0x27,0x8b,0x80,0x01,0xdf,0xe6,0xfd,0x8e,0x24
.byte 0xe6,0x0c,0xa4,0xdb,0x1e,0x8d,0x03,0x63,0x5a,0xa1,0x00,0x6b,0xcc,0x34,0x75,0x63,0x84,0x91,0x9d,0x4f,0x4f,0xfb,0xbb,0xa3,0x06,0x4c,0xad,0x32,0x62,0x34,0x3c,0x74,0x4a,0x19,0x2c,0x87,0x65,0xb6,0xbb,0x84,0x8f,0x06,0x4d,0x80,0x4e,0x54,0xc5,0xd6,0xe1,0xb3,0x5f,0xf7,0xa1,0xb7,0xb8,0x09,0x7d,0x72,0x36,0x9d,0x14,0x26,0x05,0x6e
.byte 0x9a,0x0f,0xfd,0x8a,0x81,0x83,0xa2,0x94,0xf9,0xee,0x5d,0xfe,0x08,0xd7,0xcc,0x8e,0x47,0x7c,0x07,0xbf,0xfe,0x14,0xf9,0x39,0x89,0x47,0x85,0x23,0xab,0x58,0x46,0x06,0x8b,0x81,0x37,0xe7,0x80,0x8c,0x72,0x51,0x3f,0x78,0xa5,0x88,0x41,0x4a,0x20,0x27,0x6d,0xd0,0x41,0xa2,0xb5,0xb1,0x78,0x48,0x39,0x8c,0x77,0xd8,0x77,0x94,0xd1,0x3d
.byte 0xa5,0x4f,0x14,0x5e,0x10,0x70,0xba,0x26,0x34,0x4e,0x4d,0xe1,0xee,0xe8,0x3b,0x0b,0xe5,0x58,0x7a,0x00,0x94,0x62,0x24,0xff,0x05,0x14,0xff,0xe4,0xa5,0x9c,0xe3,0x0e,0x4f,0xbf,0x7e,0xcc,0x60,0x74,0x8d,0xfa,0x44,0xaa,0xd9,0x66,0x79,0x24,0x6d,0x18,0x5b,0xcf,0xd3,0xa7,0x2f,0xd6,0x20,0xe4,0x5d,0xed,0x1f,0xe6,0xad,0x59,0xe4,0xa7
.byte 0x44,0xb9,0x8e,0x4e,0xa2,0x41,0x73,0xb6,0x38,0x6b,0x7f,0x4e,0x15,0x0a,0x41,0x3c,0x57,0xa3,0x21,0xe2,0xbf,0x19,0xf9,0x43,0x61,0x11,0x7c,0xa9,0xdb,0x25,0xce,0x10,0x74,0x6f,0x35,0xfb,0xfc,0x9b,0x0e,0x2c,0xb7,0x42,0x25,0x97,0x07,0xb5,0xba,0x51,0xbc,0xc7,0x6e,0xa0,0x60,0x65,0x8d,0xcb,0x4a,0x94,0xbe,0x99,0x28,0x7b,0x9e,0x7a
.byte 0x0e,0x57,0xa2,0x74,0x68,0x76,0x75,0x7c,0x28,0xb5,0x1f,0xf4,0x5a,0x2f,0x00,0xae,0xbe,0xe8,0xc6,0xf6,0x9e,0x16,0x96,0x06,0xed,0xea,0x73,0xfb,0xd8,0x46,0xb3,0xb0,0xdd,0xc4,0x64,0x9b,0xd3,0xe0,0xd5,0x2b,0xbc,0xb6,0xd8,0x05,0xbf,0xf7,0x92,0x11,0x18,0xc6,0xe1,0x55,0x50,0x42,0x72,0x93,0x6e,0xf1,0x85,0x9e,0x0a,0x2e,0x2a,0xee
.byte 0x51,0xa7,0x44,0xe1,0x2a,0xdd,0x58,0x3b,0x00,0x72,0xaf,0xb3,0x14,0x11,0xcf,0xc9,0xcf,0xa5,0x7c,0x6c,0x8a,0x75,0x42,0x39,0x6e,0x99,0x3d,0xed,0xbe,0xd3,0x69,0xbb,0x7b,0xb1,0x00,0x6b,0xa9,0x84,0xdd,0x38,0x30,0xdf,0x20,0xed,0x50,0x78,0xc2,0xc7,0xae,0x47,0xdb,0x87,0x2a,0xe7,0x58,0x83,0x2b,0xc9,0xf1,0x34,0xbe,0x2d,0xfa,0x6c
.byte 0xf9,0x8c,0x73,0x58,0xb5,0x53,0x1b,0x8a,0xa0,0x86,0xa3,0x03,0x56,0xf8,0x35,0x00,0xd5,0xb7,0x5b,0xa5,0x4a,0x28,0x68,0xf6,0x3b,0x32,0xf4,0xdc,0xad,0xf0,0x24,0x0c,0xc9,0x5e,0xb4,0x32,0xdb,0xb8,0x4a,0x8d,0x19,0xec,0xf0,0x32,0x06,0xc9,0x84,0xc0,0x99,0x0b,0x14,0xf6,0x64,0x88,0x99,0xbc,0x4c,0x90,0x07,0x49,0x18,0x1b,0x05,0x15
.byte 0x3f,0x43,0x42,0xf1,0x43,0x89,0xa3,0x14,0x78,0xdb,0xea,0xe9,0x90,0xde,0x3c,0x71,0x14,0x77,0xc1,0xab,0x29,0x1a,0x20,0x9e,0xd6,0xdd,0x73,0x32,0xf9,0xf7,0x2f,0x58,0x3f,0x59,0x80,0x36,0xe8,0xf7,0x79,0xa2,0xe8,0x38,0xdf,0xd9,0xb2,0xbf,0x97,0x95,0xf4,0x9c,0xec,0xc4,0x23,0x7d,0x5d,0x13,0x68,0x79,0x7e,0xe7,0x88,0xcb,0xd8,0x2b
.byte 0x14,0x2d,0x56,0xcf,0x36,0x59,0x67,0xb7,0x62,0xd5,0xb2,0x70,0x01,0x7c,0x96,0x8a,0x72,0xab,0x09,0x83,0xa2,0x4c,0xfe,0xe3,0xc0,0xbe,0x8a,0xa2,0xa5,0x35,0xc4,0xea,0xd6,0x56,0x50,0x43,0x09,0xf5,0x49,0xf3,0x7a,0x70,0x39,0x29,0xc1,0x47,0xcc,0x82,0xf5,0x96,0x0f,0x94,0xb0,0xa5,0x81,0x8f,0x79,0xa4,0xdc,0x65,0x3d,0x32,0x67,0xe7
.byte 0xdc,0x67,0xb3,0x9a,0x44,0xa7,0xf6,0x61,0x97,0xa9,0x01,0xc7,0x0a,0xf2,0xd3,0xc2,0x16,0x12,0x18,0x18,0x67,0xca,0xc8,0x0c,0x04,0x70,0x7b,0x43,0xa9,0xea,0x15,0x11,0x08,0xe8,0x5b,0x2a,0xc8,0x2c,0xc7,0x17,0xb1,0x65,0x8d,0xe7,0xca,0x18,0x1e,0x10,0xbe,0xd0,0xa6,0xe6,0xcd,0x79,0xcd,0xef,0x4b,0x45,0x7c,0x4e,0x52,0x49,0x69,0xc2
.byte 0x57,0x72,0xf6,0xa9,0x4e,0x1c,0xb1,0x91,0x87,0x45,0x5c,0xc0,0xa1,0xb5,0x11,0x40,0xc2,0x6c,0xa8,0x6e,0xb7,0xd5,0x59,0x64,0x2f,0x42,0x55,0x56,0xd7,0x3c,0x53,0x98,0x2f,0xfa,0xd1,0x8e,0x13,0x1b,0x67,0xdb,0x12,0x37,0x98,0xd9,0x6d,0xf1,0xea,0x0a,0x13,0x14,0xf6,0xb6,0x86,0x8e,0xa0,0x95,0xa9,0x80,0x58,0x2e,0x02,0x02,0x63,0x07
.byte 0x32,0xff,0x57,0xb2,0xd5,0x4f,0xa9,0xd2,0x60,0x65,0x9c,0x15,0x8f,0xff,0x9b,0xe4,0x79,0x29,0x19,0xa7,0x8b,0x98,0xfa,0x68,0x2c,0x3a,0x1c,0x63,0xb5,0x95,0x3c,0x1d,0xa1,0xfe,0x67,0xa8,0xaf,0x48,0x35,0x80,0xc7,0x3f,0x53,0xb4,0x61,0xa4,0xb8,0x39,0xa4,0xce,0x32,0xff,0x98,0xc3,0x75,0xb0,0x82,0x52,0x59,0x64,0xfc,0xc5,0x8e,0x50
.byte 0x67,0xbd,0x57,0x48,0x06,0x05,0x87,0xaf,0x6e,0x26,0xf1,0x91,0x76,0xac,0x7d,0x67,0xd7,0xea,0xd6,0x54,0xf2,0x43,0x5c,0x57,0x71,0x02,0x27,0x6e,0x24,0xd8,0x46,0x82,0x30,0x76,0xa1,0xd7,0xc9,0xc0,0xc0,0x2a,0x35,0x87,0x2c,0xf5,0x0b,0xb9,0x2d,0x3d,0xdf,0xd4,0x9b,0xd5,0x68,0x68,0x5c,0x00,0x55,0x74,0x6c,0x09,0x6b,0x82,0x96,0x4c
.byte 0xf4,0xfd,0xf9,0x8f,0x43,0x29,0x12,0xee,0xf6,0xfb,0xcf,0xdf,0x9b,0x4f,0xed,0x42,0xca,0x52,0x54,0xa2,0xf5,0x49,0x20,0x54,0x8f,0x34,0x76,0xba,0x68,0xf1,0x62,0x56,0x9d,0xc7,0xe1,0xfa,0xff,0x6b,0xf6,0x7e,0xab,0xfe,0x40,0x6d,0x0d,0xb1,0x44,0x16,0x84,0x28,0xbe,0x78,0x00,0xe3,0xe1,0x8c,0x6c,0x49,0x02,0x41,0xcd,0x07,0xd7,0x1d
.byte 0xba,0x63,0xed,0x91,0xb8,0x74,0xae,0xa2,0x12,0x3c,0xac,0x31,0xe1,0xb9,0x46,0x9b,0x3a,0x0d,0xc8,0x6a,0xf3,0x83,0xa7,0x68,0x48,0x5c,0xc4,0xc8,0xc7,0x0f,0x81,0x0c,0x6d,0x29,0x4b,0xac,0x91,0xfa,0x7e,0x8e,0x08,0xd3,0xdc,0x8b,0x30,0x25,0x36,0xba,0xae,0x61,0x98,0x84,0xfb,0x2d,0x3b,0x97,0xa2,0x46,0x8f,0xf2,0x50,0xae,0xbf,0x8a
.byte 0x52,0x46,0xf8,0x87,0x8e,0x8e,0xff,0x2e,0x73,0x8f,0x90,0x8f,0x0e,0x3f,0x0a,0x4b,0x9a,0x3c,0x80,0xef,0x0a,0x3d,0xaf,0xd8,0x3d,0xc3,0x8b,0x71,0x1d,0x5b,0x37,0xe5,0x62,0x5f,0xde,0xc2,0x14,0xac,0x2c,0x13,0x6e,0x49,0x0c,0xc3,0x31,0x58,0x35,0x1e,0xf0,0xe5,0x16,0x84,0xe1,0xe8,0x60,0x98,0x2d,0x1a,0x1d,0x1f,0x58,0x57,0xb8,0x40
.byte 0xd7,0xcf,0xac,0xef,0x0d,0x4e,0xf4,0x4e,0x62,0x1e,0x97,0x81,0x88,0x26,0xb9,0xeb,0x02,0x67,0x0e,0x89,0xfe,0x65,0x5e,0x04,0xc6,0xc1,0xe1,0x25,0xa6,0xd6,0x81,0x86,0x76,0xcd,0x23,0x5b,0x64,0x61,0x75,0x5d,0x4c,0xfa,0x43,0xa2,0x21,0xd2,0x4b,0x62,0xc3,0x13,0x39,0x12,0xa6,0x9c,0x16,0x87,0x62,0x5e,0xaf,0xff,0xf3,0x76,0x7d,0xed
.byte 0x05,0x11,0x56,0xa0,0x63,0x10,0x1a,0xed,0x0e,0x90,0x14,0xa1,0xef,0x0a,0xcf,0x1b,0xcd,0xe4,0x29,0xf6,0x4d,0xee,0x04,0xea,0xd5,0x7f,0xa4,0x67,0xf7,0xe2,0x2e,0x35,0x1a,0xab,0x64,0x1c,0x47,0x78,0x65,0x39,0xff,0x65,0x5a,0xd8,0xd1,0x9f,0xca,0xe4,0xec,0xb7,0xf7,0xe2,0x90,0x66,0xa6,0x72,0xd4,0xd7,0x71,0xa2,0x3a,0x9d,0x9b,0xc5
.byte 0x22,0xce,0x45,0x8f,0x6d,0xe1,0xd1,0xd9,0x96,0x1c,0x9b,0xc0,0xb8,0x03,0x3b,0x3c,0x69,0x49,0xb3,0x66,0x2b,0x00,0x70,0x99,0x6f,0x3a,0x17,0x93,0x28,0xec,0x4d,0x2d,0x0f,0x66,0x11,0x26,0x98,0x66,0x60,0xa5,0x8d,0xe8,0x13,0xaa,0xd6,0xe7,0x10,0x9e,0x5d,0x52,0x76,0xcc,0xd0,0xd7,0x67,0x19,0x33,0xc7,0xe0,0xff,0x11,0x3a,0x94,0x57
.byte 0xc0,0xd1,0x2e,0x3c,0x8d,0x39,0x3e,0xf9,0x62,0x97,0xcb,0x8e,0xf5,0x0c,0x62,0x8c,0x79,0xad,0x06,0xec,0x51,0x0c,0x03,0xc0,0xf0,0x5c,0xd6,0x61,0x7d,0x0b,0xd8,0xf5,0x65,0x7b,0xb4,0x05,0x6c,0x62,0xa7,0xab,0x42,0xe5,0x8b,0x82,0x6d,0xa0,0xcc,0xe2,0x83,0xa3,0xe3,0x63,0x68,0x61,0x48,0x74,0x2b,0x3f,0x1b,0x10,0x85,0x61,0x48,0xcf
.byte 0x19,0xba,0x82,0xa9,0xde,0xc9,0xfd,0xa6,0x1e,0xed,0x2c,0xc7,0xef,0xaa,0x77,0xbb,0x61,0xb5,0xea,0x73,0x85,0x72,0xf6,0x1f,0x5c,0x3d,0xbe,0x99,0x70,0x1f,0x19,0x8a,0x39,0x41,0x07,0xda,0x1e,0x35,0x15,0xa8,0x80,0x2c,0xf3,0xe9,0xe6,0x0e,0x81,0x71,0xf8,0x1f,0xee,0x35,0xd5,0xd4,0xf8,0xbb,0x93,0xf5,0x19,0x26,0xb5,0xea,0x98,0x5f
.byte 0x92,0xae,0xcd,0x5c,0x0a,0x2f,0x8e,0x12,0x55,0x29,0xa6,0xc6,0x0e,0xde,0x50,0x83,0xa0,0x5a,0xb9,0x05,0x0d,0x7c,0x96,0xfd,0x41,0xd2,0xb2,0x2b,0xea,0x14,0x9f,0x8b,0x77,0x20,0x83,0xc8,0xf7,0xe6,0xd6,0x8d,0x43,0x00,0x0b,0xf0,0xde,0xcf,0x6c,0x46,0xb0,0xd3,0x02,0xe1,0x7f,0x89,0x1c,0xe7,0x8d,0x7d,0x5c,0x59,0xa1,0xf7,0x17,0x04
.byte 0xd6,0x1c,0x85,0x8c,0x6a,0x4f,0x74,0xd2,0x1c,0x7b,0x4a,0xcb,0x8a,0x42,0x2a,0x35,0x17,0x08,0xe7,0xa3,0x6a,0x00,0xdd,0x28,0x8e,0x12,0x8a,0x03,0x99,0x29,0x34,0x69,0x84,0xec,0x98,0xef,0x31,0x21,0x23,0xeb,0xf8,0x44,0x15,0xdc,0xab,0x7e,0x7f,0x7b,0x0a,0xb6,0x4c,0xfb,0x21,0xe4,0x5b,0xe6,0xf0,0x3e,0xe5,0x81,0x8a,0xc9,0x84,0x76
.byte 0xb7,0xf7,0xa2,0x05,0x14,0x91,0xb2,0x0d,0x90,0xa0,0x32,0xdc,0x1c,0xf4,0xdd,0x1b,0x70,0x06,0xf5,0xb9,0xb1,0x20,0xd7,0xcd,0x58,0x04,0xfd,0xb7,0xa9,0xc7,0x4d,0xbf,0xa3,0xce,0xc8,0xa7,0x0c,0x8d,0x1f,0x96,0xfa,0x8c,0xa7,0xe0,0x99,0x6c,0x4d,0x71,0xa4,0x3d,0x67,0xb1,0x59,0xa7,0xe3,0xdb,0xbb,0x59,0xa5,0x1c,0xdf,0xfd,0x3a,0x05
.byte 0xc4,0xd8,0xe6,0xde,0x42,0x5a,0x0c,0x88,0xe6,0xe3,0x52,0xb7,0xcb,0xa0,0xdc,0xc5,0x8a,0x70,0xa5,0xd1,0x99,0xd8,0x18,0xec,0xd9,0x8d,0x7d,0x54,0xca,0xf3,0x1c,0xdb,0x1f,0xc5,0x74,0xeb,0xd3,0xbf,0x96,0x6e,0xa4,0xc9,0x62,0x8b,0xff,0x64,0x4b,0x63,0x65,0x97,0x83,0xe7,0x02,0x64,0x70,0x56,0x0d,0x78,0xcc,0x75,0x30,0xf1,0xd2,0xb6
.byte 0x69,0x9d,0xe2,0x56,0x63,0xb3,0x9a,0xa2,0x7b,0x91,0xad,0x24,0xbb,0x61,0x3b,0xea,0xcd,0xb2,0xce,0xd7,0xa8,0xb0,0x9e,0xc3,0xac,0x67,0x01,0x57,0x0b,0xb3,0xc5,0x47,0xf7,0xb2,0x32,0xdc,0x25,0x18,0x22,0x1d,0xef,0x88,0xe0,0x47,0x67,0xeb,0xad,0x09,0xd8,0xb8,0x17,0x17,0xc7,0xc5,0x3d,0xa2,0x51,0x9b,0xa5,0xd4,0x0b,0x6c,0xe5,0x39
.byte 0x30,0xed,0x6e,0xf9,0x15,0xc2,0xaa,0x2c,0xb2,0x86,0x1c,0x33,0xca,0x0d,0x27,0xe8,0x68,0xb2,0x11,0xad,0x8b,0x9e,0x69,0xb9,0x3f,0xdb,0x54,0xf3,0x46,0xb4,0xc3,0x9d,0x47,0x32,0x1e,0x5b,0x49,0xc5,0xa2,0x2d,0xaf,0x37,0x8a,0x53,0xfd,0x96,0x70,0xfc,0x0b,0x55,0xaa,0x35,0x22,0x9e,0xb1,0x09,0xf6,0xae,0x9f,0x47,0x5f,0x5f,0xd7,0x9e
.byte 0xc2,0x13,0x7a,0x82,0x32,0x1a,0xdc,0xdc,0x87,0x7d,0x9c,0x00,0xc0,0xef,0xef,0x71,0x76,0xf9,0x48,0x17,0x95,0x69,0x30,0x30,0x36,0xf6,0x24,0xc9,0x11,0xd5,0xd7,0xbd,0x1b,0x23,0xd9,0x9f,0x57,0xf4,0xf3,0x01,0x9d,0x22,0x91,0x92,0xa0,0x0f,0xb5,0x88,0xe6,0x3d,0xa7,0x2b,0x19,0x7a,0x65,0x73,0x34,0xc5,0x16,0x1d,0x93,0xeb,0x08,0x71
.byte 0x46,0x98,0x2b,0x21,0x70,0x9b,0x83,0x15,0x9b,0x4e,0x1f,0x6c,0xf0,0x6e,0xde,0x6d,0xd1,0x40,0x17,0x8d,0x18,0xc2,0x5f,0x91,0x97,0xb0,0x66,0xe8,0x77,0xf7,0x22,0xdf,0x10,0x5f,0xb2,0xc2,0x3b,0x37,0x59,0x52,0xf1,0xea,0x0c,0x6f,0xd4,0xa5,0x40,0xa5,0xb6,0x38,0xe9,0x81,0x5b,0x81,0xc8,0x9d,0xf5,0xbe,0xbf,0x4d,0x7d,0xc2,0x53,0x9f
.byte 0xac,0xa6,0xf0,0x7a,0x22,0x9c,0x16,0xa9,0x1f,0xb9,0x54,0x25,0xf9,0xd3,0x6e,0x42,0xe8,0xc2,0xf4,0x9d,0xa7,0x25,0x95,0xab,0x7e,0x9a,0xaa,0x4a,0xcc,0x89,0xc5,0x73,0x4f,0xe2,0xed,0x2e,0x22,0x6d,0xb0,0x22,0x5f,0x79,0x9b,0xf2,0x0d,0x9d,0xd2,0xa2,0x7e,0xbf,0x2a,0xe0,0xe4,0xf2,0x2c,0xec,0x52,0xd7,0xac,0x63,0xac,0x82,0xa5,0xbf
.byte 0x02,0xda,0x3a,0x9e,0x36,0x8f,0xdf,0x39,0xbc,0x96,0xdf,0xbc,0x38,0x39,0x84,0xe6,0x7e,0x6e,0x65,0x1b,0x48,0x58,0x24,0x54,0x25,0x6b,0x70,0xd5,0xe4,0x33,0x59,0x1c,0x12,0xca,0xe7,0xbf,0x21,0xa7,0xc0,0x96,0x85,0x52,0x0e,0x53,0xc5,0xea,0xdc,0xd4,0x37,0xb7,0x02,0x38,0x41,0xf5,0x3e,0x39,0x3a,0x65,0x4e,0x93,0xe3,0xe6,0x9d,0x8b
.byte 0x15,0x1f,0xdf,0x6f,0xaa,0x4b,0x6f,0x11,0xfd,0xb6,0x47,0x3b,0xc8,0xb1,0x01,0x25,0x9b,0xbf,0x7c,0xae,0x75,0x9b,0xab,0xec,0x93,0xdc,0x28,0x42,0x92,0xb5,0x3d,0xdc,0xdc,0xa1,0x82,0xdb,0x2a,0x05,0xec,0xaf,0xa9,0xfa,0x34,0xca,0xaa,0x6d,0xa1,0x6a,0x4b,0xe5,0x43,0x73,0x31,0xde,0xb0,0x5d,0xc2,0xdb,0xd0,0x3a,0xb7,0x9f,0xe2,0x86
.byte 0xfd,0x96,0xa9,0x93,0x5e,0xe7,0x5d,0xa6,0x24,0xe4,0x72,0x16,0xb8,0x27,0x06,0x95,0xbe,0x87,0x78,0xb7,0xba,0xa3,0xcb,0x7e,0x2b,0xfc,0x3a,0x24,0x1c,0x3c,0x16,0x03,0xd4,0xe1,0x28,0x25,0xac,0xb2,0x73,0xcb,0xff,0xf1,0x0c,0x65,0xc7,0x44,0x84,0xe0,0x19,0xe8,0x58,0x4f,0xc4,0xa0,0x19,0x5a,0x64,0x41,0xf7,0xaf,0x4a,0x87,0xf3,0xc2
.byte 0xc3,0xa6,0x11,0xd2,0xf2,0xd3,0x18,0x13,0x38,0xec,0x26,0xf3,0xcd,0x17,0x9b,0xaf,0x9a,0x40,0x10,0xb9,0x0c,0x60,0x82,0xd2,0x62,0xe2,0xae,0xba,0x4d,0x95,0x44,0xea,0x19,0xff,0x21,0xca,0xba,0x31,0x38,0xa0,0x8d,0xcd,0xde,0xae,0x50,0x93,0x96,0xfe,0x39,0x50,0x97,0x79,0xd9,0xcd,0x68,0x56,0xc9,0xe3,0x3c,0x85,0x7c,0xb8,0x1d,0x01
.byte 0x92,0x72,0xf2,0x35,0x26,0x5e,0xf0,0x38,0x85,0xd9,0x05,0xd1,0xe9,0x18,0x1f,0xf5,0xd1,0xf3,0xc3,0xc5,0x43,0xe6,0x87,0xcb,0xf7,0x25,0x89,0xb3,0x17,0xea,0x58,0xa1,0x5f,0x61,0x28,0x37,0x72,0x65,0x44,0xde,0x53,0xa8,0xd8,0x80,0x35,0x14,0x1d,0x02,0x64,0x68,0x2f,0xc9,0x1c,0x75,0x44,0xec,0x07,0x4e,0xba,0x49,0xa0,0xe8,0x3b,0x3c
.byte 0x63,0x32,0x66,0x62,0xa8,0xe3,0x39,0x3c,0xe7,0x70,0x20,0x6d,0x1e,0x2e,0x74,0x91,0xb4,0x8f,0xdf,0x59,0xc2,0x0e,0x1e,0x43,0x9b,0x26,0x7b,0x36,0x7b,0xe8,0x96,0x61,0x81,0x96,0x16,0x12,0xeb,0xd9,0x8e,0xd8,0xd8,0x04,0x1f,0x00,0x90,0x81,0x9f,0xbe,0x59,0x83,0x83,0x7d,0x83,0x56,0x41,0x78,0x1d,0xac,0x64,0x7b,0xdd,0xea,0x2f,0x34
.byte 0x2e,0xf4,0x58,0x21,0x8b,0x39,0x82,0x90,0x80,0x75,0x63,0xd9,0x2e,0xf9,0x4a,0x75,0x77,0xa8,0x66,0xa9,0x95,0x88,0x38,0xd7,0x1f,0xd9,0xae,0xf9,0xba,0x29,0x65,0x29,0x3d,0xd6,0x3c,0x47,0xb7,0x22,0x37,0x65,0xce,0x81,0xf3,0x70,0xc9,0xeb,0x5c,0x02,0x65,0x71,0x65,0x8a,0x93,0xcc,0x02,0xe5,0x21,0x2c,0x38,0x69,0xad,0xb6,0x89,0x7d
.byte 0x46,0x37,0x44,0x67,0x87,0xb0,0x41,0x85,0x7d,0xae,0x82,0x05,0xc0,0x28,0x29,0xf3,0x76,0xa6,0x54,0x4a,0x15,0x84,0x49,0xb6,0xce,0x82,0x45,0x5a,0x2d,0x46,0xae,0xf8,0x8a,0xe6,0x82,0x27,0xe7,0xc0,0xe4,0x6c,0xce,0xd7,0x2e,0x7f,0xd7,0x69,0x97,0x22,0x69,0x1f,0x0f,0xdb,0x6e,0x4e,0x21,0x31,0x9b,0x9b,0xdb,0x33,0xcb,0x7f,0x1f,0x2d
.byte 0x08,0x16,0xb8,0x1e,0x87,0x2f,0x39,0x87,0xc2,0xe9,0x6f,0xd8,0x14,0xbc,0xe9,0x09,0x17,0x66,0xab,0x09,0xe6,0x69,0xe9,0x75,0xca,0xa9,0xe5,0xc6,0xbf,0x6d,0xce,0x5d,0xb5,0x86,0xe4,0xf1,0x59,0x73,0xfd,0xf5,0xc7,0xcf,0xf0,0xa7,0xb2,0xcf,0xe7,0x2b,0x4a,0x57,0x99,0x48,0xf8,0x49,0x31,0x9a,0xdc,0xd3,0x05,0x7c,0x00,0xbc,0x47,0x3e
.byte 0x22,0x6d,0x45,0xe3,0x13,0x1b,0x75,0x0f,0xac,0xc7,0xc9,0xed,0x4a,0xd8,0xc6,0xf5,0x16,0x30,0x16,0xcc,0x6b,0x1f,0x8b,0xb4,0x7a,0x28,0xa7,0x90,0xd4,0x6b,0xab,0x6a,0x6e,0x02,0x03,0x75,0x08,0x40,0x82,0x64,0x3a,0xbe,0xbb,0x3c,0x46,0xab,0x47,0xc2,0x08,0xbb,0xa4,0xd0,0x95,0x5d,0x1f,0x1f,0x5b,0xa3,0x7d,0x47,0x2f,0x1c,0xee,0x10
.byte 0x1b,0xbd,0xf8,0xd2,0x86,0x78,0x72,0x6c,0x2f,0x7b,0xba,0x5c,0x8a,0x0a,0x0e,0x13,0x9c,0x4e,0x33,0x6b,0xa1,0x47,0xdd,0xe5,0x66,0x4e,0x23,0x82,0x18,0x83,0xb8,0xe7,0xb2,0x9b,0x75,0x29,0xef,0x95,0x5a,0xb2,0xbe,0x06,0x4d,0x44,0x7c,0xdf,0x31,0x04,0x92,0xe6,0x5b,0x52,0x0c,0x98,0xac,0x85,0xee,0x04,0x8d,0x87,0x55,0x59,0x3d,0x7e
.byte 0xa2,0x19,0xdd,0xdb,0xbd,0xb2,0x9c,0x6d,0x51,0x67,0x42,0xdd,0xb8,0xb7,0x51,0x7b,0x93,0xb1,0x69,0x22,0x10,0x94,0x46,0x6f,0xc4,0xcc,0x53,0xf0,0x66,0x26,0x56,0xf8,0x95,0x52,0xba,0xf2,0xac,0xe1,0x34,0x47,0x9c,0x7a,0xae,0x56,0x8b,0x77,0x81,0xc6,0x25,0x96,0xda,0xe9,0x87,0x85,0xda,0x1b,0x0f,0x24,0x7f,0x46,0x99,0xe0,0x9e,0x4b
.byte 0xb1,0x01,0xe2,0xc0,0x58,0xbd,0xb4,0xb4,0x09,0xa0,0xfe,0x82,0xd8,0xde,0x9e,0x2f,0x0e,0x03,0xbd,0x35,0x1b,0x46,0x9b,0x14,0xff,0x5c,0x5f,0xf0,0xab,0x56,0x8c,0x38,0xae,0x7e,0x36,0x73,0x0d,0x85,0xe4,0x54,0x40,0xcc,0xe7,0x11,0xcf,0x46,0x9f,0x58,0x56,0x45,0xa8,0xce,0x35,0xe7,0x41,0x15,0xce,0xeb,0x36,0xca,0x42,0xfe,0x13,0x25
.byte 0x57,0xff,0xdd,0xe0,0x7a,0xde,0x67,0xa7,0xbc,0x5f,0x32,0xaa,0x87,0xe6,0xb8,0x3a,0xfd,0x86,0xa7,0x64,0x0d,0x69,0x66,0x2b,0xd1,0xae,0x55,0x63,0x4b,0x36,0x19,0x3d,0x69,0xde,0x6b,0x27,0x6a,0xfb,0x4b,0x73,0xac,0xf7,0xa0,0x13,0x2e,0xf0,0x37,0x15,0xd8,0x71,0xf3,0x1e,0xca,0x00,0x60,0x61,0xee,0xc1,0x5e,0x18,0xc3,0x3d,0x5c,0xca
.byte 0x60,0xbe,0x40,0xac,0x22,0xd0,0xba,0x2a,0xbb,0xdc,0x57,0x33,0x05,0x1a,0x33,0xf7,0x58,0x97,0x4e,0x88,0xb3,0x70,0x91,0x05,0xa9,0x92,0x1b,0x22,0x3c,0x4a,0xcf,0x20,0x15,0x5e,0xad,0xa7,0x77,0x37,0xc7,0x57,0x20,0xbc,0xaf,0xd8,0x02,0x2a,0x01,0x93,0xbc,0xc7,0x29,0x21,0xdf,0x9a,0xe4,0x39,0x0e,0xa8,0x91,0x03,0x92,0x25,0xc9,0x2c
.byte 0x63,0x78,0x49,0xe7,0x37,0xa2,0x36,0xff,0x5a,0x44,0x84,0xf1,0xe5,0x30,0xcd,0x9b,0x72,0xe2,0x70,0xb9,0x4c,0x9a,0xef,0x1f,0xcf,0x7e,0x4c,0xdb,0x79,0xde,0xd5,0x7a,0x87,0x93,0x31,0x26,0x42,0x67,0x34,0xa2,0x1e,0xae,0x39,0x84,0xaf,0xe8,0xf5,0x49,0xe0,0xd2,0x16,0xb8,0x28,0x4a,0x7c,0xb4,0x58,0xef,0x5d,0xf3,0x6c,0xe6,0x89,0xa2
.byte 0x5b,0x19,0x5e,0xc3,0x1d,0x7b,0xcb,0x60,0x3b,0x48,0xc3,0xb2,0x98,0x41,0x22,0xac,0x8a,0x86,0x0f,0x29,0xb7,0xa9,0xe8,0x7d,0x1e,0xce,0x7e,0x7f,0xd2,0x4f,0x59,0x70,0x18,0xb9,0x43,0xb3,0x09,0xa5,0xcf,0x8d,0xa7,0x74,0x62,0xf9,0x92,0xf6,0x99,0xc8,0xed,0x2d,0x32,0xa3,0xe8,0x51,0x8a,0x9e,0x55,0xf3,0x9e,0xef,0xdf,0x90,0xe0,0xbe
.byte 0x1b,0x36,0x0e,0x3a,0x28,0x99,0x21,0x1c,0x14,0x2c,0xa1,0x7e,0xf6,0x51,0x7f,0x19,0x96,0xe4,0xcc,0xd4,0xbf,0xdd,0xaa,0x0a,0x06,0xa3,0x05,0x2c,0x8b,0x17,0x85,0xef,0xfb,0x76,0xa3,0xd0,0x90,0xb3,0xb9,0x6c,0x2d,0xf9,0xba,0x51,0xbf,0x13,0xd4,0xf3,0x23,0x5b,0x8e,0x6e,0x8a,0x03,0x02,0x70,0x01,0xf8,0x54,0x41,0x09,0x12,0x57,0x31
.byte 0x0c,0x30,0x11,0xf2,0x10,0x2d,0xc3,0x90,0xac,0xc8,0x01,0x7f,0x2f,0xc0,0x8b,0x56,0xd5,0xb5,0x1d,0xd7,0x85,0xe3,0x26,0x90,0x0a,0x47,0xbe,0xee,0xeb,0xea,0x62,0x6d,0x95,0xe2,0x0e,0x04,0x21,0x65,0xd8,0x1b,0x88,0xc8,0x5e,0xec,0x3a,0xc7,0x2b,0x12,0x4f,0x2d,0xfb,0xc8,0x56,0x1b,0x6f,0xe5,0xf7,0x03,0xa6,0x94,0x29,0x3e,0xd7,0xf1
.byte 0x46,0x91,0x26,0xbf,0x3c,0x8f,0x55,0x71,0x39,0xaf,0x1f,0x4f,0x96,0xdc,0x9f,0xaa,0xef,0xc2,0xcb,0xc4,0x97,0xa8,0xf5,0x82,0xaa,0x36,0x47,0x80,0x80,0x10,0x1b,0x68,0x88,0x29,0x8e,0x8e,0x14,0x4f,0xf2,0x3f,0xb6,0x16,0x2a,0x42,0xe8,0x8f,0x7b,0xd6,0xb9,0x1f,0x3a,0x56,0x7a,0x3f,0xad,0x5d,0x68,0x34,0x6d,0x65,0xde,0x13,0x4d,0xa9
.byte 0xf9,0x4f,0x37,0x49,0xc0,0x63,0xc4,0x28,0x42,0x4c,0x77,0xae,0x78,0x38,0x31,0x87,0xf4,0x9f,0x4a,0x16,0xbb,0x6e,0x06,0x9a,0xa1,0x1c,0xe2,0x97,0xc9,0xf9,0xfb,0x3a,0xe1,0x25,0x4e,0x4e,0xc3,0xfe,0x9a,0xef,0x1f,0x43,0xfb,0x69,0xb1,0x06,0x09,0x4b,0x33,0xf3,0x9c,0x40,0x05,0x83,0x17,0x71,0x81,0xd6,0x87,0xb5,0xd1,0xa7,0x59,0x38
.byte 0x1f,0xbc,0x6c,0x64,0xb6,0x85,0xee,0xce,0x39,0xb4,0xfe,0x3a,0xf2,0x9e,0x02,0x84,0xc4,0xf9,0x2c,0x56,0xeb,0xd1,0x06,0x8d,0xf4,0x25,0x91,0x98,0xf0,0x49,0xb1,0xa5,0xcd,0x06,0x43,0x74,0xfe,0xea,0x50,0xeb,0x8c,0x42,0x47,0x2d,0x33,0x3a,0xc6,0x4d,0xe4,0x9d,0xa5,0xea,0xc2,0x26,0x90,0xa7,0x17,0xb7,0x8a,0x0c,0x3e,0x0d,0x31,0xeb
.byte 0xe5,0xfe,0x98,0xc9,0x43,0x15,0x2b,0x36,0x06,0x68,0x52,0x12,0xf6,0xa8,0xcb,0x61,0xa8,0xb3,0xc1,0xcc,0xe3,0xf7,0xb4,0x05,0x1c,0xea,0x67,0x48,0xb8,0xe8,0x6f,0x08,0xc3,0x9d,0x48,0xdc,0x06,0xbc,0xae,0xbe,0x35,0x49,0x58,0xe9,0x33,0xbe,0xe5,0xbb,0x5c,0x25,0x79,0x2e,0xde,0xc6,0x7c,0x2d,0xdf,0x53,0xb4,0xa9,0xc3,0x00,0x86,0xe6
.byte 0xe8,0x1f,0x2b,0x83,0x7c,0xb5,0x90,0xba,0x29,0x63,0x26,0xbf,0x04,0x4a,0xee,0xb9,0xa5,0xd1,0x34,0xc5,0x2f,0x18,0xb8,0xc3,0xdc,0xa1,0x30,0x83,0x8b,0xe7,0x84,0x1b,0x96,0x7b,0x93,0xe9,0xe8,0x15,0x6e,0x3f,0xf7,0x6e,0xe4,0x44,0x0f,0xcf,0x98,0x74,0x63,0x35,0x36,0x29,0xaf,0xc1,0x14,0x98,0xcb,0x7a,0x38,0x37,0xc3,0x0d,0x11,0x43
.byte 0x7e,0xda,0x34,0x22,0x86,0xb8,0x96,0x6d,0x36,0xfb,0xd4,0x36,0x6e,0x10,0x06,0x41,0xa6,0x80,0xd5,0x1b,0x96,0x1b,0x06,0x71,0x08,0x97,0x17,0x1e,0x2d,0x62,0x3f,0x8d,0xd8,0x46,0xbd,0x5d,0x31,0x74,0x04,0x48,0xaa,0x2c,0xd2,0xb3,0x5e,0xbd,0x60,0x60,0xa4,0x81,0x5c,0xda,0x13,0xd5,0xd6,0x96,0x76,0x2f,0x9c,0x7f,0x40,0x23,0x9f,0x5c
.byte 0x49,0x58,0x2f,0x34,0xb0,0xbb,0xf0,0xb1,0x67,0x8e,0x95,0xeb,0x92,0xee,0xba,0xcf,0x16,0xe2,0x85,0x22,0x67,0x6f,0xd8,0xb7,0x4c,0x17,0x34,0x68,0x5d,0xea,0x4a,0xa3,0xa5,0xad,0x8f,0xf0,0x86,0xdf,0x79,0xa1,0x84,0xb3,0xf2,0x4f,0xbe,0xae,0x55,0x60,0x4c,0xd5,0x44,0x3f,0xe9,0xe3,0x9d,0xf2,0x3c,0x42,0x1b,0x35,0x95,0x3b,0x5f,0x6c
.byte 0x76,0xdb,0x5c,0x8a,0x67,0x10,0x15,0x52,0xde,0x50,0x62,0x87,0x66,0x0f,0x36,0xdb,0x14,0x8f,0xda,0x13,0x35,0x9f,0xce,0x90,0x22,0xcd,0x78,0xe5,0xc5,0xcb,0xb4,0x4a,0x23,0x49,0x30,0xe9,0x3a,0xfd,0x9d,0x63,0x98,0xd7,0x9e,0x2f,0x32,0x8b,0xb9,0x34,0x4e,0xaa,0x20,0xe9,0xbc,0x72,0x85,0x2b,0xee,0x2c,0xc3,0xb6,0x31,0x81,0x3e,0x56
.byte 0x9c,0xda,0x4d,0x9f,0x19,0x36,0xe7,0x47,0x46,0x8f,0x9d,0x83,0xcd,0xa1,0xcc,0xcf,0x69,0xfc,0xbd,0x5d,0x7d,0xd8,0xa8,0x71,0xb5,0xc0,0x6c,0xe5,0xbb,0x5b,0xe3,0xd0,0x6b,0x38,0x53,0x51,0x9b,0x3d,0x0d,0x93,0x95,0x5c,0xc1,0x82,0xbd,0x59,0x8b,0x2a,0xef,0xb8,0x07,0x92,0x3d,0x0f,0x34,0x3c,0xc8,0x39,0x91,0x8e,0x9b,0x72,0x7f,0x51
.byte 0x61,0xdd,0xce,0x98,0x71,0xde,0xdc,0xdd,0x14,0x0c,0x77,0x48,0x8e,0x26,0xc0,0xc7,0xa0,0x22,0xa5,0xb2,0x36,0xe1,0x2f,0x1b,0x43,0x6b,0xd8,0x8e,0xb2,0x18,0x5d,0xc3,0xba,0xcc,0xae,0xf6,0xb8,0x4a,0x79,0xb2,0x95,0x4b,0xfe,0x15,0x4c,0xc6,0x17,0x4f,0x0f,0x65,0xe2,0xc2,0xc7,0xbf,0x53,0x89,0xa3,0x64,0xbb,0x93,0x58,0x47,0x2a,0xcb
.byte 0x5c,0xc6,0x9c,0x69,0x83,0x2e,0x82,0x92,0xe2,0xcd,0xff,0xfa,0x3f,0xe3,0x4e,0x45,0xce,0x7f,0x71,0x60,0x98,0x06,0x1a,0x4d,0x21,0x26,0x1e,0x3c,0x1d,0xef,0xd5,0xbb,0x10,0x33,0x45,0xdf,0xed,0xd9,0x89,0x32,0x68,0x91,0x3f,0xee,0xc7,0x6a,0x43,0xef,0x33,0xcf,0x3e,0x1e,0x0f,0xa2,0x3e,0x81,0x06,0xc8,0x85,0x7f,0x42,0x23,0xd9,0x85
.byte 0x8b,0x9a,0xbb,0x11,0x3b,0x26,0xb7,0x21,0x45,0xe8,0x28,0x34,0x32,0x86,0x32,0x18,0x84,0x74,0x27,0x33,0x7e,0xd7,0x07,0x84,0x26,0x50,0x7f,0xc0,0xce,0x1d,0x17,0x1a,0x99,0x5a,0xeb,0x15,0xd2,0x6a,0xaf,0xea,0x89,0xcf,0x11,0xa2,0x9d,0x76,0x70,0x07,0xb2,0x73,0x7a,0x9b,0xad,0xf7,0x3a,0x02,0xf3,0xdb,0x7b,0xdc,0x28,0xec,0xb6,0x6e
.byte 0x0e,0xee,0xae,0xe6,0x20,0xa3,0xc9,0xb1,0x21,0xc7,0x7b,0xb4,0xba,0x5d,0x0c,0xc0,0x1c,0xab,0xea,0xf7,0xfb,0x5b,0x78,0xbe,0x91,0x2d,0x48,0x4a,0x56,0x59,0x90,0x0e,0x4e,0xf1,0xda,0xa9,0x46,0x5a,0x76,0x96,0xa6,0x14,0x7f,0xeb,0x75,0xe5,0x86,0x7a,0x63,0xbe,0x74,0xbc,0xcb,0x9e,0xee,0x03,0x6e,0x98,0xb5,0x62,0xf8,0x27,0x8e,0x46
.byte 0x37,0xe6,0x7a,0x12,0x45,0xad,0x0f,0xc1,0x2d,0xef,0xad,0x8f,0xc1,0xf6,0xcc,0x97,0x88,0x14,0x0e,0xea,0xbf,0xe3,0x14,0x26,0x0c,0xaf,0xe2,0x9e,0xca,0x30,0xc6,0x51,0x36,0x35,0x6f,0x8b,0x37,0x8d,0x09,0x8f,0x48,0x18,0xea,0xa6,0x13,0x01,0x38,0x04,0xcc,0xa5,0x71,0x91,0x07,0x43,0xc8,0x76,0x1f,0x88,0x57,0xaa,0xd6,0x44,0x3b,0xf0
.byte 0x17,0xca,0x2d,0x30,0x36,0x41,0xfc,0x24,0x3c,0xbc,0xa3,0x4b,0x10,0x03,0xd2,0xa9,0xef,0xe1,0x98,0x3e,0x88,0xcc,0x7f,0x64,0xb5,0xb7,0x25,0xac,0xf6,0xf6,0xc6,0xd9,0xe4,0x73,0xc3,0xe9,0x21,0x6e,0xee,0x24,0xb3,0xf6,0xa0,0x3f,0xa0,0xdf,0x1c,0xf7,0x66,0x7a,0x87,0x7d,0x8a,0x21,0xd0,0xce,0x2a,0x34,0xef,0xd8,0x83,0x34,0xcb,0x97
.byte 0xc7,0xb8,0xb5,0xa8,0x9d,0x06,0x2d,0x35,0x70,0x6a,0x3f,0x91,0x81,0x37,0x3d,0xae,0x43,0xb2,0xff,0x6b,0x81,0x44,0x69,0xba,0x81,0xf4,0xb5,0xf6,0xf4,0xea,0x17,0xb5,0x7f,0x0a,0x02,0x2c,0x7a,0x3f,0x6c,0x7a,0x07,0xea,0xd5,0x48,0x17,0x75,0x80,0xa0,0x35,0x03,0x59,0xe9,0x45,0x4f,0x18,0xd7,0xd3,0xed,0x48,0x2b,0xa2,0x17,0xd6,0x35
.byte 0xc6,0x2f,0x7a,0x9c,0x08,0x83,0x12,0xe6,0x1e,0xc8,0xc7,0x02,0x8f,0xf8,0x15,0x2a,0x79,0xe5,0x1f,0xd2,0x1f,0x05,0x34,0xe4,0xb4,0x7e,0xb8,0x05,0xb7,0xae,0x44,0x5c,0x35,0x6c,0x2e,0x69,0xde,0x09,0x2d,0x71,0xe3,0x40,0x7e,0x50,0xb7,0x09,0xdf,0xe8,0x87,0x19,0x82,0x17,0x7b,0x46,0x5b,0xa4,0x23,0x62,0x0b,0x79,0x59,0x5f,0x3a,0x19
.byte 0x0a,0xc1,0x90,0x79,0x0d,0xce,0x9b,0xc0,0xaa,0xb5,0x6a,0x71,0xe3,0x88,0x31,0x66,0x0c,0x0d,0x8c,0xaa,0xd6,0xf0,0x61,0x71,0x09,0xb4,0xbe,0x61,0x8b,0x9e,0xf3,0xb3,0x9e,0x8b,0x5a,0x50,0x55,0x13,0x0f,0xbe,0x9b,0xa6,0x76,0x34,0xbc,0xae,0xa1,0x7f,0x72,0x21,0xac,0x6c,0x58,0x74,0x5b,0x19,0x16,0x53,0xa9,0x0f,0x0f,0x0f,0x15,0xc9
.byte 0x2b,0xbb,0x80,0x97,0x5e,0x37,0x8b,0xef,0xf7,0xb5,0x4f,0xf0,0x01,0x77,0xce,0x03,0x86,0x8e,0xe7,0x7b,0x9e,0x52,0x2e,0x3b,0xbb,0x17,0xf5,0x12,0xd5,0xac,0xb2,0x0d,0xe1,0xb4,0xcd,0x04,0xe8,0xfa,0x65,0xea,0x95,0xa5,0xf6,0x82,0x75,0x28,0x90,0xfe,0xef,0x2c,0xd1,0xbb,0x9e,0x71,0x47,0xfc,0xf1,0x63,0x5a,0xd0,0x49,0x4d,0xfe,0xf9
.byte 0x5d,0x22,0xbf,0x80,0x8d,0x07,0x50,0xde,0x57,0x9e,0x0c,0xc5,0x00,0xad,0xfa,0x57,0x8f,0xcd,0x53,0x70,0x37,0x25,0x22,0x56,0x2b,0xea,0x8e,0x62,0x41,0xe8,0xac,0x3b,0x1f,0xef,0x46,0xd4,0x8d,0xf7,0x4d,0x89,0xb1,0x61,0x1b,0xb8,0x74,0x1a,0x40,0x80,0xbc,0x62,0x71,0x76,0x90,0x37,0x9c,0x91,0x3c,0xfb,0x0c,0xc5,0x18,0x63,0x9a,0xcf
.byte 0xe1,0x43,0xd0,0x01,0xe3,0xcc,0xc6,0x93,0xc7,0x4f,0x04,0x5f,0x07,0x33,0x1f,0xd8,0x5d,0xb0,0xe7,0xa1,0xa1,0xfc,0xbf,0xff,0x4f,0x3e,0x38,0x38,0x14,0x1c,0x90,0xc0,0x77,0x60,0x85,0x4c,0x11,0x75,0xca,0xe5,0x87,0xbb,0x0a,0x49,0xb1,0xd8,0x12,0x06,0x00,0xa0,0xe9,0xe6,0x8a,0x34,0xd5,0x8f,0x56,0xd1,0x6f,0xfc,0xcb,0x6a,0xbd,0x4a
.byte 0x68,0x4a,0xbc,0x90,0xf0,0x1c,0x9f,0x36,0x68,0xab,0x26,0xc9,0x7f,0x48,0xe9,0xf6,0x8a,0x68,0x85,0x95,0x30,0x31,0xdb,0x02,0xc8,0x48,0xbf,0x1a,0x76,0x85,0x23,0xde,0xc6,0xa3,0x83,0x02,0x5f,0x7f,0x1e,0x57,0x7c,0x1b,0x4c,0x77,0x72,0x76,0xb9,0xe3,0x09,0xd6,0x73,0xe1,0x0c,0x03,0x51,0x55,0xe9,0xfc,0xab,0x79,0x9f,0xc5,0x00,0xd9
.byte 0xcf,0x5c,0x61,0x6a,0x30,0x83,0xd8,0x38,0xc8,0x41,0x8e,0xb9,0x6a,0xbc,0x33,0x02,0x03,0x0b,0x03,0x3a,0xf1,0x8e,0xfc,0xb8,0xa8,0xf9,0x4f,0x6b,0x87,0x21,0x23,0x60,0x33,0x53,0xa4,0x38,0x0c,0x95,0x07,0x31,0x14,0x8a,0x71,0x2c,0xd8,0x58,0x67,0xa0,0x78,0x6f,0x9f,0xac,0xf0,0xe3,0xcd,0x9a,0x63,0x5b,0x3b,0xa9,0xae,0x7f,0xf8,0x94
.byte 0x4f,0x81,0x21,0x8a,0xd9,0xe9,0x65,0xe4,0x98,0xb4,0x8b,0xad,0xfc,0x47,0xf3,0xe4,0x38,0xe1,0x90,0x74,0xfa,0xa8,0xab,0xbd,0xac,0x3d,0xb7,0x93,0x8f,0x99,0x10,0x3e,0x9a,0xb1,0xba,0x9b,0xb0,0xe9,0x43,0x34,0x3c,0x20,0x03,0x65,0x50,0x37,0x9b,0xe1,0xcf,0x64,0x94,0xaf,0xd4,0x9c,0x07,0xad,0x68,0xc4,0xaf,0x2c,0xda,0xd7,0xdd,0x49
.byte 0xb6,0xed,0xcd,0xcb,0x1e,0x8a,0x4b,0x6e,0x7f,0x5f,0x54,0x79,0x12,0x30,0xbe,0xfe,0x8a,0xeb,0x84,0xd8,0x48,0xc2,0x5d,0x83,0x09,0x5c,0xfd,0x3f,0x80,0xfd,0x68,0x78,0xc3,0xa4,0x90,0xae,0xb7,0x1d,0x9a,0xd3,0x57,0x8b,0x5e,0x3d,0xc9,0xda,0xff,0x52,0xca,0x3f,0xf7,0x5f,0x84,0x25,0x1f,0xa3,0x64,0x68,0x69,0xb9,0x84,0xb1,0xd7,0x0c
.byte 0x4c,0xbc,0xd3,0x66,0xcc,0x28,0xab,0xa7,0x9b,0x1f,0xd0,0xe5,0xac,0x54,0xf3,0x5a,0x1f,0xdb,0xcf,0x9e,0xa3,0x26,0xfd,0x2e,0xd7,0x02,0x89,0xa5,0xb6,0x8c,0x81,0xac,0xa8,0x54,0x4e,0xa7,0x6c,0x1d,0x5d,0x31,0x0e,0xdf,0xf7,0x32,0x77,0x83,0x00,0x81,0xd2,0x3b,0x39,0xd9,0xda,0xbf,0x0d,0xdc,0xab,0x46,0xb1,0xdc,0x1f,0x8a,0x6d,0xe9
.byte 0x20,0xf8,0xf3,0xe9,0xdc,0x94,0x15,0x5e,0xe9,0x62,0x44,0xf0,0xbc,0x76,0x64,0x92,0x31,0xb7,0xf1,0x27,0xbb,0x83,0x16,0xfa,0x6e,0xc4,0xc4,0x03,0x50,0x8a,0x08,0x54,0x1d,0xfb,0x3d,0x66,0x05,0x83,0x93,0x62,0x25,0xc3,0xff,0x2d,0x84,0x12,0x98,0x1a,0x61,0x37,0xc5,0x09,0x00,0xdc,0x08,0xa5,0xd5,0x08,0xde,0x78,0x73,0x54,0x1a,0x54
.byte 0x98,0xc6,0x97,0xec,0x52,0x4c,0x90,0x46,0xa0,0xf5,0xec,0x90,0x8d,0x7e,0xb3,0x8b,0x41,0x5a,0xad,0xd7,0x73,0x8c,0xdc,0x2e,0xc1,0xd6,0xbb,0x95,0x76,0x09,0x32,0x17,0x6e,0x14,0x6a,0x84,0xb2,0xc4,0xa3,0x9c,0x96,0x8d,0x57,0x62,0x43,0xb7,0x75,0x3d,0xd1,0x79,0x0f,0x75,0x13,0xfe,0x63,0x75,0xe6,0x83,0xde,0xc8,0xa2,0x11,0x4d,0x93
.byte 0x92,0xc7,0x4d,0xfc,0xaf,0x35,0x0f,0x98,0x76,0x22,0xe1,0x95,0x27,0x3a,0xb0,0x62,0x67,0xb2,0x62,0x9f,0x34,0x47,0xb8,0x41,0xa8,0xc9,0x82,0xbd,0xed,0x5b,0xf7,0x33,0xd0,0xcc,0x60,0xef,0xe4,0x47,0xfe,0x6d,0xf8,0xa5,0xee,0x5b,0x3d,0x00,0xc8,0x22,0x7d,0xcf,0x81,0xe3,0xac,0xf9,0x26,0x77,0x26,0x11,0x85,0x99,0xa0,0x77,0x19,0x7d
.byte 0x67,0x80,0x74,0xc7,0xbb,0xe6,0xbb,0x8d,0x16,0x2b,0x50,0x81,0x08,0x89,0x32,0x21,0x20,0xd4,0x7b,0x80,0xd7,0x20,0x53,0x4a,0x0c,0x18,0xb3,0xec,0x49,0x2f,0x3b,0x9b,0x9f,0x69,0x99,0xb5,0x85,0x74,0x0b,0x54,0x61,0x9a,0xe9,0xa1,0xd6,0x98,0x20,0x52,0x82,0x78,0x30,0x5a,0x66,0x02,0x43,0xbf,0x5c,0x5e,0x36,0x3a,0x3b,0xaf,0x7e,0x92
.byte 0xbc,0x64,0x62,0x2a,0x20,0x65,0xd5,0x1b,0x64,0x6a,0x00,0x88,0xec,0x9b,0xe8,0xd7,0x61,0x80,0x38,0x9e,0x4e,0x55,0x1b,0x5b,0x85,0x7b,0xa0,0x2f,0xc3,0xbe,0x73,0x09,0xfd,0x24,0xbe,0xa6,0x9b,0x81,0x3b,0x3c,0x0c,0xd7,0x23,0xb0,0xe1,0x7b,0x26,0xda,0x54,0x39,0x2e,0x85,0x44,0xe2,0x8b,0x50,0x00,0x31,0x37,0x02,0x68,0x06,0xf1,0x47
.byte 0x62,0xf9,0x09,0x07,0xbf,0x80,0xd6,0x36,0x8b,0xb7,0x8b,0x28,0x0c,0x2b,0x28,0x4d,0xfc,0xa4,0xc9,0x96,0x90,0xf9,0x12,0xab,0xb2,0xa3,0x91,0x78,0xf4,0x3a,0x6c,0xea,0x29,0xb5,0x9d,0xe5,0x2c,0xd5,0x28,0xdf,0xdd,0xb6,0x0a,0xbe,0xff,0x60,0x23,0x88,0x5b,0x0d,0x98,0xbe,0xb5,0x7c,0xb8,0x4d,0x5c,0x2b,0x2d,0xeb,0xc3,0xce,0xca,0x21
.byte 0x11,0x2c,0x34,0xef,0xc7,0xce,0xb7,0x11,0x6d,0x46,0x6d,0xcb,0x58,0x2b,0x73,0xae,0xc0,0x9c,0xf6,0x75,0xe1,0x2c,0xbf,0xab,0x9d,0x9f,0x0e,0xd4,0xba,0xf1,0x1f,0xd7,0x8b,0xd2,0x2e,0x00,0xd0,0x01,0xc9,0xe5,0x3a,0xd6,0x2e,0x98,0x79,0x6d,0x04,0xd8,0x39,0xb5,0xd7,0x47,0x48,0x78,0xa6,0xfa,0xbe,0xe3,0x73,0xd9,0x60,0x50,0xc0,0x32
.byte 0xc2,0xa9,0x08,0xaf,0xce,0xc1,0xda,0x17,0xf6,0xc0,0xa6,0xa8,0x1d,0x58,0xff,0xb1,0x2e,0x3a,0x14,0xa8,0x75,0x8b,0x2e,0xcb,0x0d,0x9d,0x2a,0xe2,0x16,0xc3,0xa6,0x2f,0x48,0xa9,0xe6,0xe7,0xfb,0x85,0xd2,0x75,0xfb,0x7f,0x42,0x4a,0x78,0xa9,0x03,0x43,0xc5,0x9d,0xf3,0xfe,0xd0,0x0a,0xd0,0xb3,0x4c,0xc9,0xad,0x3e,0xd9,0x17,0x3c,0x93
.byte 0xde,0x05,0x5b,0xb3,0xbb,0x7f,0x79,0x40,0x42,0xe6,0x32,0x6e,0x5e,0xee,0x8a,0xa1,0x8c,0xc6,0x3b,0x50,0x1f,0x46,0x91,0x10,0x21,0xbb,0xa9,0x45,0x5e,0x59,0xe8,0x27,0xb4,0x4a,0x55,0x10,0xae,0xe2,0xfc,0xa3,0x0e,0x62,0x3c,0x47,0xc6,0x65,0x5c,0xcf,0x5d,0x02,0x5c,0x53,0x5c,0x03,0xc0,0xce,0x8a,0x57,0x10,0xe8,0xb6,0xab,0xc1,0xa3
.byte 0x0b,0x81,0xb2,0x93,0xef,0x48,0x5e,0x79,0x4e,0x79,0x9b,0xfe,0xd6,0x6c,0xef,0xd0,0xe7,0x9d,0x7d,0x74,0x6c,0xb5,0x44,0x34,0xa6,0x8c,0x38,0x3d,0x90,0xd9,0xf2,0x53,0x15,0x60,0xdd,0xb9,0xde,0x7d,0x66,0x93,0xae,0xef,0xa2,0xd8,0xce,0x48,0x3e,0x32,0x13,0x0e,0xd0,0x36,0x42,0xe0,0xc9,0x40,0x3b,0xc3,0xe6,0x37,0x3d,0x7f,0xf6,0xe0
.byte 0x11,0x51,0xda,0xba,0x10,0x59,0xa2,0xcb,0x96,0x69,0xe2,0x84,0x2d,0x7b,0x1b,0x4b,0x81,0x5f,0xd2,0x8f,0xfc,0x2b,0x7c,0xdd,0xd6,0xcf,0xcf,0x98,0xac,0xe5,0x52,0x07,0xbf,0xe9,0xe7,0x0d,0x2d,0x6b,0xf1,0x69,0x5e,0xc8,0xaf,0xd0,0x70,0xb2,0xca,0xe6,0xc6,0x37,0x29,0x75,0xbf,0xca,0x6f,0x69,0x27,0x8c,0x15,0x3d,0x69,0x83,0xee,0x2b
.byte 0x10,0x9d,0x1d,0xd5,0xad,0x36,0x5a,0x15,0x78,0x1f,0x6c,0x92,0xca,0x5a,0x84,0x1c,0x35,0x49,0x2b,0x33,0x79,0x0f,0xc2,0x84,0x54,0x24,0x3c,0xae,0xac,0x0a,0x76,0xe1,0x22,0x48,0xed,0x8f,0x89,0xeb,0x05,0xfe,0x32,0x6b,0x83,0x00,0x8c,0x36,0xee,0xff,0x1b,0xa0,0x71,0x0e,0xd8,0xe9,0x29,0xa3,0xbb,0x5b,0x8e,0xbf,0x10,0x4f,0xc3,0xeb
.byte 0x3b,0x85,0x3a,0xb3,0x63,0xbb,0x77,0x1a,0x07,0x7a,0x47,0xfa,0x76,0xf5,0x05,0xc4,0xd7,0xe1,0x8f,0xd0,0x4a,0xf9,0x96,0xda,0xcb,0x84,0x43,0xe8,0x61,0xe4,0x2d,0xa8,0x1f,0x4e,0x81,0xaa,0x50,0x2a,0x66,0x2a,0x8c,0xc8,0x0f,0x1c,0x57,0x79,0xdc,0x02,0xbf,0xfb,0x1c,0x68,0xe9,0x02,0x34,0x9b,0xe6,0x2e,0xba,0x60,0x61,0x7c,0x5f,0xc1
.byte 0xa6,0x7a,0x6c,0x2d,0x02,0xb8,0x6c,0xf2,0x91,0xe3,0xf0,0xed,0xbe,0xe8,0x2d,0x03,0x5a,0x4b,0xcb,0xe5,0x3b,0x3f,0x24,0x30,0x09,0x4d,0x22,0x76,0xf6,0x20,0x9c,0x07,0x1a,0x75,0x2a,0xb3,0xd1,0x9e,0x69,0x6a,0xca,0xc4,0x54,0x5d,0xd8,0x23,0x70,0x5f,0x27,0x94,0x7b,0x0f,0x90,0x12,0xc2,0xbc,0x9c,0x5b,0x02,0x15,0x14,0x4f,0x32,0x0d
.byte 0xef,0xf3,0xa5,0x2a,0xab,0xb3,0xf0,0xe9,0xdc,0x2c,0x66,0x65,0x41,0x67,0x04,0x75,0x81,0x3b,0xb0,0x53,0x42,0x88,0x74,0x26,0x7a,0x9c,0x3f,0x39,0x40,0x25,0xb6,0x4f,0x54,0x86,0xa0,0xea,0x8d,0x78,0xb5,0x43,0x5e,0xfc,0x2d,0x4d,0x14,0xcd,0x4b,0x5f,0x2e,0x37,0x0b,0x28,0xbe,0xbf,0x91,0x60,0xa5,0x40,0xdf,0x73,0xbb,0xa7,0x8e,0xc1
.byte 0xcc,0xdb,0x8e,0x3a,0xfc,0x7a,0x21,0xac,0x84,0x79,0x33,0x50,0x41,0xa1,0xad,0xb3,0x2e,0xbc,0x74,0xbd,0x66,0x3e,0x36,0x2d,0xf6,0xfd,0xba,0xc4,0x51,0x95,0xaa,0x49,0x92,0xc4,0x6a,0x56,0x9a,0x70,0x5e,0x93,0x74,0x2f,0x6b,0x15,0x60,0x1b,0x3c,0xa9,0x05,0xc4,0xe2,0x0b,0xb9,0x9e,0x86,0x60,0x29,0xb5,0x70,0xe2,0x63,0x10,0xc5,0xfa
.byte 0x73,0xc3,0xb1,0x89,0xcf,0x3d,0xf0,0xf9,0x28,0xa4,0x94,0x9b,0xcd,0xd2,0x9b,0x47,0x4d,0xd4,0x0e,0xb6,0x95,0x68,0x94,0x5b,0x8d,0xcb,0x77,0xa5,0x41,0xf1,0x74,0xb0,0x43,0x9d,0x40,0x1c,0xf3,0x1d,0x66,0x6e,0x00,0x23,0x5f,0x3c,0x00,0xdd,0x9d,0x89,0x8f,0xdf,0x58,0x18,0x9c,0x2d,0xc9,0xaf,0xd5,0x73,0x38,0x23,0x5c,0x2c,0xf6,0x27
.byte 0x69,0x0d,0xc5,0xe6,0x99,0xb1,0x64,0xa5,0x60,0x74,0x1f,0x7b,0xd2,0x9c,0x1e,0x9f,0x49,0x78,0x17,0x32,0x18,0xce,0xac,0x55,0x6d,0x91,0x7a,0x69,0xed,0xa4,0xa7,0x5f,0x1f,0x5e,0xa1,0xae,0x03,0x6f,0x0e,0xe7,0xed,0x44,0xdd,0xe4,0x9b,0x25,0x4b,0xbf,0x63,0x8b,0x87,0x73,0xb5,0x6f,0x1a,0x1b,0xdc,0xb1,0xf1,0x6b,0xc8,0xb6,0x15,0x84
.byte 0xc5,0x6b,0x17,0xdc,0x8a,0x20,0xa1,0xeb,0x5b,0x60,0xb4,0x65,0x3a,0x0d,0xe2,0x42,0x97,0x2d,0x93,0xbc,0x93,0x23,0xb0,0x9a,0xa4,0x06,0xa9,0x0e,0xaf,0xa1,0xbc,0xfa,0xe8,0x8e,0xa7,0xa6,0x85,0xc2,0x8d,0x8e,0x70,0xfe,0xa7,0xac,0x8b,0x94,0x8e,0xea,0x6c,0xa6,0xf2,0x6c,0x0e,0x91,0xb6,0xc2,0x6f,0xa4,0x71,0x61,0x05,0xd9,0xb2,0xfa
.byte 0x1a,0x19,0x23,0x4f,0x8f,0x41,0xec,0x9a,0x88,0x2b,0xc7,0x8d,0xf3,0x19,0x21,0xd0,0x40,0x12,0xa9,0x3b,0x44,0x54,0x26,0xc2,0x19,0x35,0x05,0xb0,0x70,0x4a,0xc5,0x91,0x63,0x1e,0x4e,0x74,0x79,0x53,0xd3,0xc8,0x3f,0x39,0x46,0x7a,0x6b,0x74,0x64,0xd3,0xa0,0x97,0x61,0xc2,0x1b,0xe5,0x7f,0x88,0xb1,0xb9,0xf7,0xae,0xbf,0x67,0xc3,0x19
.byte 0xde,0x41,0xc9,0xbf,0xd1,0x5e,0xc7,0xee,0xc9,0x54,0x02,0x8c,0x92,0xe4,0x6a,0x91,0x60,0x59,0x7f,0x88,0xef,0x0a,0xfc,0x1c,0x09,0x1c,0x9f,0xb4,0x22,0xa2,0x95,0x81,0x81,0x47,0x27,0xee,0x8b,0x7a,0x4c,0x66,0xff,0x15,0xea,0x3e,0xbb,0x41,0x1f,0x6a,0xdf,0x07,0x9e,0xb6,0x43,0xe6,0x88,0x78,0xd4,0x02,0xa7,0x0f,0x88,0x0a,0x1d,0xf3
.byte 0xe0,0x30,0x06,0x89,0xfc,0x85,0x37,0xef,0xc2,0x03,0xa6,0x2b,0xe8,0xd9,0x35,0x03,0x59,0x93,0x82,0x2b,0x54,0x2f,0x1f,0xee,0x50,0xab,0xa2,0xbf,0xcb,0x07,0xed,0x6a,0xab,0x37,0xf9,0x7e,0x21,0xf6,0xa5,0xe1,0xec,0x06,0x55,0x0e,0x78,0x60,0x18,0x80,0x07,0x62,0x56,0xee,0x3e,0x75,0x94,0x59,0x04,0xe1,0x8c,0x1d,0x07,0x22,0xa3,0x2f
.byte 0x97,0xe6,0xeb,0x62,0x6d,0x3e,0xcc,0x63,0xcf,0xcb,0x53,0xd2,0x5c,0xc6,0xdf,0x9b,0x00,0xb8,0x86,0xaf,0x3d,0xdf,0x6c,0xe9,0xe0,0xf1,0xd6,0xeb,0xf0,0xe3,0xe3,0x37,0x70,0x55,0x14,0x07,0x86,0xf4,0x07,0x00,0x96,0x1b,0x7e,0xd9,0xa8,0x4b,0x15,0xa4,0xf0,0x87,0x20,0x1b,0xdb,0x6c,0xa4,0x37,0x52,0x31,0xb6,0x59,0xaf,0xc4,0x00,0xc2
.byte 0xfa,0x7c,0xc7,0xc4,0x9e,0xdf,0xd8,0x61,0x90,0x52,0xd9,0x0b,0xcf,0xe3,0xe3,0x82,0x9e,0x3d,0xb4,0xf7,0xc8,0x7b,0x17,0x1a,0xf6,0x48,0x62,0x2e,0x84,0x89,0x07,0xe1,0x8a,0xb4,0xdd,0xa5,0x46,0x9f,0x5d,0x91,0x16,0x23,0xc2,0x81,0x99,0x4f,0x3c,0xb9,0x24,0xd6,0xcc,0xfd,0x16,0xde,0x83,0x10,0xaa,0x69,0xed,0xe4,0x36,0xed,0x54,0xd8
.byte 0xe3,0xec,0x4e,0x3d,0x19,0xa5,0x09,0xd2,0xd6,0xd2,0x54,0x51,0x95,0xbe,0xf0,0x23,0xcc,0xeb,0x50,0x77,0x0b,0x94,0xa3,0x71,0xee,0x70,0x83,0x3b,0x87,0x07,0x53,0x89,0x0a,0x3c,0x60,0xb2,0xb8,0x2b,0x7e,0xf8,0x91,0xf9,0xc2,0xd5,0xad,0x2f,0x2d,0x9e,0xa2,0xfb,0xad,0xee,0x16,0x9d,0x0a,0x7e,0xaf,0x94,0x37,0x86,0x94,0xd2,0x09,0xcf
.byte 0xf9,0xe3,0xfe,0x26,0xd8,0xde,0xdf,0x73,0xa0,0xcb,0x75,0x6c,0x78,0xef,0x42,0xa0,0xb4,0x25,0x2d,0x1e,0xf2,0x77,0x8e,0xd0,0x91,0xdb,0xde,0xb5,0x3b,0x32,0xfb,0x4a,0x92,0x69,0x68,0xba,0x37,0xba,0xe7,0xc4,0x3c,0xe6,0xc2,0x7f,0xc9,0x33,0xbb,0x3d,0x10,0xae,0xff,0x75,0x99,0xe7,0x2a,0x92,0xc4,0x7e,0x03,0x10,0xb1,0xa7,0x71,0x88
.byte 0x8b,0xc9,0xfe,0x73,0x17,0x44,0x06,0x6c,0x87,0xd3,0x09,0xfd,0xd2,0x9d,0x7e,0x0a,0xba,0xdc,0xab,0xd0,0xa1,0x28,0x2c,0x92,0x57,0xa3,0xfc,0x89,0xba,0xbc,0x10,0x44,0x8e,0xb6,0x86,0x20,0x1a,0xc3,0xcf,0x93,0x1d,0x33,0x08,0xf8,0x06,0x47,0x5c,0x5e,0xda,0x8e,0x2d,0x36,0xff,0xf8,0xf2,0x07,0x8d,0x99,0x6c,0xbd,0xd2,0xa0,0xe7,0x74
.byte 0x0c,0x67,0x4a,0x66,0x06,0x02,0xa5,0x01,0x51,0x0b,0x28,0xaa,0x39,0x2e,0x62,0x8b,0x2c,0xcb,0x2b,0xec,0xec,0xe3,0xbf,0x77,0x28,0x06,0x9a,0x6c,0x2c,0xb2,0xf1,0xd5,0x65,0x37,0x4f,0x46,0x5f,0xef,0x50,0x20,0xd4,0x95,0x12,0xdd,0x38,0x21,0x34,0xe5,0x21,0xd3,0x4c,0x42,0xec,0xc4,0x9c,0x4c,0x79,0xb1,0x03,0x14,0x60,0x09,0xd3,0x52
.byte 0x0e,0x10,0x1c,0x39,0xf1,0xeb,0x2f,0x77,0x9a,0xc2,0x4f,0xe8,0x71,0x0c,0xdd,0x3b,0x61,0x09,0xf3,0x63,0x11,0x56,0xde,0x54,0x13,0x82,0x18,0x38,0x40,0x92,0x81,0x4a,0xe5,0x3b,0x41,0x4c,0x37,0x9d,0xd9,0x87,0x9a,0x8b,0x2a,0x25,0xfb,0x0a,0x33,0xc8,0x33,0x30,0x54,0x6d,0x1a,0xda,0xea,0xa3,0x23,0x0f,0x2c,0x94,0x74,0x12,0xa3,0x96
.byte 0x3d,0x0d,0xad,0xe0,0xe9,0x85,0xef,0xe6,0x3b,0xb3,0x52,0xcb,0x36,0xd4,0x4a,0x50,0xf3,0x08,0xf6,0x10,0x91,0xed,0x13,0x2f,0x0f,0x02,0x61,0x72,0x8a,0x73,0x49,0x3c,0x07,0x8d,0x80,0x4b,0xb7,0xdf,0x43,0x4f,0x31,0x95,0x67,0x25,0x11,0x37,0x6e,0x79,0x6d,0xbd,0x59,0xb6,0x53,0xf1,0x0c,0x86,0x79,0x7b,0xb6,0x9a,0x34,0x92,0xaf,0x01
.byte 0x3e,0x25,0x90,0xc9,0x3f,0x73,0x67,0xb3,0x33,0xd5,0xa6,0xef,0x0d,0x85,0xcb,0xc3,0xec,0x5b,0x9a,0xcc,0x5d,0x8b,0xac,0x60,0x81,0x1f,0xea,0x12,0xac,0x27,0xc2,0xf6,0x49,0xcd,0xc2,0xe2,0xd8,0x67,0x0a,0x0d,0x65,0x5a,0x46,0x19,0x8e,0x68,0x37,0xbb,0x6d,0x2b,0x2f,0x9f,0x7a,0xaf,0x27,0x19,0x26,0xeb,0x47,0x16,0xdf,0x70,0x07,0x84
.byte 0x69,0x4b,0xb8,0xdf,0x77,0x85,0x13,0x44,0xda,0x65,0xac,0xeb,0x23,0x71,0x0b,0x45,0x8a,0xc0,0x8c,0x12,0x42,0xb2,0x24,0x8c,0x13,0x64,0x30,0x47,0x80,0x69,0x73,0xb7,0xb2,0xd7,0xb0,0x11,0x6d,0x37,0x05,0xfd,0xbc,0xf2,0x42,0xc6,0x00,0x3d,0xd8,0x17,0x58,0x38,0x3a,0xf2,0x11,0x72,0x14,0xbf,0x4a,0x90,0xf7,0x83,0x59,0x41,0x7c,0xe6
.byte 0xfb,0xf6,0x87,0x52,0xe2,0xa1,0x76,0xa8,0xb4,0x5f,0x35,0xb8,0x6d,0xee,0x27,0x50,0x55,0x8a,0xbe,0xda,0x6d,0xa1,0xe2,0x3e,0xf6,0xaf,0x6a,0x67,0xc2,0x9e,0x5c,0x13,0xd1,0x2f,0xdc,0xca,0x29,0x96,0xee,0x8e,0xac,0x04,0x6b,0x44,0x99,0x92,0x81,0x2c,0x73,0xa5,0x5d,0xcd,0xaa,0x20,0x51,0x36,0x62,0xc8,0xac,0x24,0x54,0x40,0x8e,0xd4
.byte 0x5e,0xd9,0xb7,0x88,0x64,0xb9,0x9a,0xcc,0xfe,0x78,0xbe,0xd7,0x95,0x33,0xa3,0x5f,0xff,0x3f,0xcd,0x90,0x83,0xd0,0xb6,0xcf,0x90,0x9e,0x7f,0xf1,0x3b,0x25,0xa0,0xa1,0x3f,0xfb,0xcf,0x0d,0x36,0x36,0x90,0x24,0x73,0x1d,0xeb,0x2b,0x67,0xd0,0xf9,0x01,0xe9,0x3f,0xb0,0xa4,0xd3,0xf5,0x56,0xd9,0xb0,0x17,0xe4,0x78,0x90,0x1c,0x16,0xe2
.byte 0xb4,0xd8,0x1a,0xb6,0x48,0xa3,0xc6,0x06,0xee,0x0c,0xea,0x07,0xc1,0x48,0x11,0xe5,0x9e,0x2f,0xb8,0x47,0xcf,0xac,0x32,0x35,0x8b,0xce,0x4f,0xe4,0x1a,0x8b,0xc9,0x7b,0x9b,0x07,0x27,0xf4,0x8e,0x2c,0xb5,0x61,0xef,0x85,0x7a,0x39,0xb3,0x03,0x7a,0xac,0x8f,0x64,0x53,0xd8,0x3b,0x4d,0xf5,0x80,0xab,0x2b,0x81,0xa1,0xb1,0xf0,0x2d,0x46
.byte 0xfc,0x8d,0x80,0x62,0x48,0xe0,0xee,0xee,0x87,0xc6,0xdb,0xda,0xc4,0xb5,0xe7,0x10,0xc3,0x70,0x3a,0xbe,0x8d,0x34,0xa8,0x8b,0x02,0xf6,0x11,0xbc,0x92,0x66,0x58,0x89,0x83,0xff,0x43,0xd1,0x89,0x02,0x69,0xea,0xc7,0xc8,0x4f,0x97,0xca,0x22,0x29,0x1d,0x2c,0x74,0x5e,0x21,0xdc,0x40,0x02,0xe9,0x7f,0x66,0x4e,0x9e,0x7d,0x59,0xae,0xa7
.byte 0xd4,0x1f,0xde,0xf3,0x70,0xcf,0x81,0xea,0x3c,0xab,0x4e,0xb1,0x12,0x80,0x22,0xc0,0x36,0x7c,0xb9,0x15,0x9a,0x01,0x72,0x67,0xd5,0xbd,0xef,0x68,0x37,0x18,0x94,0xb9,0xec,0x09,0xf9,0x47,0x8e,0x38,0x2e,0xe0,0xb1,0xe8,0x63,0xae,0x44,0x84,0xf2,0xc8,0x15,0x5d,0xff,0x58,0xf4,0x9b,0x48,0x4a,0x30,0x1b,0xb9,0xea,0x1a,0xce,0xc7,0xaa
.byte 0xd2,0x3d,0x0e,0x3a,0x08,0xa7,0x5b,0x57,0x15,0x4f,0xfd,0x96,0xd0,0xa3,0xd3,0x98,0x9e,0xd3,0xc3,0xc3,0x00,0xc2,0xf3,0xdc,0xf8,0x25,0x59,0x42,0x09,0x19,0xa3,0x6c,0xb6,0xcf,0x22,0x4c,0xb7,0x0d,0xd3,0x8f,0xf0,0x49,0xae,0xb8,0xcd,0xdc,0x0c,0x99,0x26,0x58,0x9f,0x6b,0x59,0xbb,0xa2,0xc3,0x6b,0xd6,0xb6,0xf0,0xe1,0xfa,0x94,0x67
.byte 0xe9,0x21,0x92,0x95,0xe1,0xa3,0x76,0x07,0x98,0x43,0x29,0x98,0x3e,0xc5,0x58,0x88,0x7a,0xbb,0xb0,0x58,0x18,0x53,0x35,0xde,0x47,0xf9,0x05,0xa2,0x46,0x67,0x1c,0x09,0x9c,0x16,0x10,0x2e,0xb1,0xd3,0xda,0xea,0x20,0x34,0xf7,0xeb,0x35,0xfb,0x9b,0x74,0x38,0xbf,0xc1,0x97,0xd3,0x7e,0xe8,0xc1,0xf6,0x83,0x76,0xc0,0x94,0xa0,0xa1,0x7d
.byte 0x48,0x13,0x9a,0x08,0xe8,0x8e,0xa4,0x2b,0x95,0x61,0x12,0xaf,0xbd,0xc9,0x81,0x26,0xef,0x87,0x06,0x7b,0xc3,0x52,0xc2,0xd5,0xde,0xf3,0x55,0x34,0x71,0xc6,0xe3,0xe9,0xf7,0x5e,0x0b,0x6e,0xd4,0xee,0xeb,0xb3,0xa0,0xf9,0x99,0x33,0x14,0x5d,0x28,0x1a,0x57,0xcf,0xf5,0xa9,0x92,0x08,0xa6,0x10,0x6d,0x5a,0xd5,0x6b,0xe0,0x15,0x17,0x06
.byte 0x72,0x32,0xcd,0xc7,0x79,0x1b,0x4c,0x12,0x78,0xea,0x88,0xb3,0x1a,0x4c,0x9a,0x3c,0xbe,0x41,0xe9,0x69,0xb5,0xe3,0x4c,0xd7,0xce,0x86,0x3b,0xca,0x3f,0xf6,0xaa,0xa2,0xc4,0x34,0x41,0x89,0x2c,0x9d,0xdd,0x0e,0x01,0x0c,0x35,0xa0,0xe8,0x7f,0x26,0xcd,0x0c,0x27,0x16,0x70,0xaf,0x8d,0x30,0xcf,0xe5,0x22,0x21,0x95,0xf6,0x98,0x84,0x2e
.byte 0x03,0xf2,0xdc,0x7a,0x00,0x1a,0xed,0x6c,0x5f,0x8d,0xb6,0xed,0xa9,0x84,0xb0,0x12,0x35,0xbf,0x55,0xe2,0xe5,0xae,0x52,0x03,0x9a,0xf9,0x69,0x30,0xd5,0x58,0x1b,0x88,0xf2,0x63,0xff,0xfd,0x47,0x47,0x86,0xae,0x7b,0x18,0xd1,0x67,0xcf,0x49,0xb6,0xfd,0x8b,0x76,0xbe,0x2d,0x91,0x6c,0x52,0xd4,0x85,0xec,0xd9,0x1b,0x73,0x0b,0x3f,0xfa
.byte 0x83,0x70,0x0a,0x5f,0xd6,0x91,0x52,0x33,0xe0,0x92,0x0b,0x99,0x52,0xa8,0x59,0xe1,0x71,0xfa,0x45,0x29,0x25,0x56,0xd1,0xc2,0xf9,0x66,0x5c,0x48,0x41,0x2a,0xe8,0x1e,0x34,0x04,0xbd,0xd8,0xe6,0x7f,0x87,0x88,0x37,0x14,0x91,0xea,0x48,0x30,0x0b,0x93,0x68,0x37,0x8c,0x75,0x8c,0x3d,0x3d,0x36,0xa2,0x83,0xf4,0x4c,0x27,0x59,0xef,0x9e
.byte 0x8d,0x98,0xcc,0x97,0x0c,0x49,0x7b,0x32,0xa7,0x32,0x50,0x7d,0x47,0x6e,0x53,0xca,0xa2,0xec,0xa7,0x62,0x6b,0x08,0x50,0x72,0x5c,0x92,0x71,0x35,0xde,0x0b,0xde,0x15,0xc6,0x46,0xa1,0x3a,0x82,0x09,0xe7,0xcd,0x7b,0x11,0x1e,0x34,0x6d,0x7f,0x3e,0x8c,0xc9,0x27,0x88,0xc9,0x35,0xe7,0x1d,0x0a,0xb1,0x5e,0x85,0xfa,0x6e,0x47,0xa3,0x4f
.byte 0x22,0x84,0x16,0x36,0x84,0x1b,0x28,0xe8,0x28,0xdb,0x0b,0x41,0xca,0xf1,0x93,0xd9,0x3f,0x3c,0xe9,0xbc,0x46,0x0b,0x8c,0x34,0x04,0x3a,0xd4,0xfc,0x87,0x1b,0xd6,0x9a,0xe4,0x01,0x9e,0xf0,0xa9,0x83,0xca,0x72,0xfe,0x25,0xb3,0xc8,0x9a,0x07,0x84,0x61,0xea,0x6a,0x11,0x3f,0xaa,0x85,0x19,0x89,0xa7,0x1b,0x47,0x85,0x1e,0x72,0x29,0xc3
.byte 0x43,0x2a,0xc7,0xcc,0x6d,0xec,0x16,0x12,0xfa,0xa3,0xa0,0xce,0x3f,0x64,0xb2,0x40,0x90,0x57,0x0f,0x0b,0xd7,0x21,0xe8,0x9d,0x12,0xf8,0x77,0xd8,0x88,0xf9,0xb7,0xdc,0x82,0xb4,0x07,0x52,0x01,0xdf,0xb5,0x58,0x5f,0x39,0x53,0x66,0x52,0xaf,0xb0,0xa5,0x3a,0xa3,0x8b,0xc2,0xca,0xd7,0x46,0x31,0x95,0xcc,0xa6,0xfb,0xb0,0x2b,0x1e,0x1e
.byte 0x3a,0x99,0xc0,0x67,0x98,0x0d,0xb0,0x61,0x58,0x10,0x1f,0x47,0x7d,0x4d,0x11,0x69,0xf5,0xe5,0x6a,0xbf,0xbc,0x83,0x4c,0xef,0xef,0x8f,0x15,0x08,0x32,0xae,0x47,0x0c,0x9f,0xfd,0x10,0xa5,0xc6,0xe1,0x11,0x26,0x20,0xfe,0xb4,0xd6,0x7a,0xd3,0x16,0x5c,0xaf,0x0f,0xd6,0x12,0x44,0x1e,0x99,0x46,0x6d,0x22,0x35,0x52,0x90,0xb7,0xe7,0xc9
.byte 0xb4,0xdd,0x18,0x86,0x4f,0x94,0xa2,0x7c,0x10,0xb1,0x00,0xb9,0xea,0x30,0x6a,0xfe,0x84,0xb8,0x18,0x28,0xd0,0xa3,0x1b,0xfa,0x65,0xbe,0x67,0x0f,0x0d,0x28,0x32,0x05,0x3c,0xf1,0x15,0x9c,0x54,0x92,0x41,0x4f,0x7d,0x32,0x01,0x49,0x8d,0x83,0x01,0x51,0x70,0x24,0x7e,0x53,0xf8,0x69,0x96,0x56,0xd4,0xe5,0xe7,0x37,0xd5,0x5b,0x9a,0x2d
.byte 0x41,0x33,0x52,0x84,0x1c,0x13,0xae,0x67,0x96,0x9f,0x96,0x5f,0x6a,0xc4,0x55,0x4d,0x68,0x7c,0x27,0x0b,0xc9,0x15,0x01,0x47,0x40,0x42,0x45,0xaf,0x33,0x20,0x62,0x53,0xed,0xe0,0x0e,0x84,0xaa,0x26,0x76,0x30,0x0d,0x4d,0x64,0x5b,0x68,0x4c,0x04,0xe1,0xe3,0x57,0x66,0x88,0xd7,0xe5,0x3b,0x5c,0x7d,0x70,0x56,0xe1,0x18,0x48,0x18,0x80
.byte 0xab,0x4d,0xd8,0x16,0xdb,0x31,0x58,0x6a,0xea,0xd7,0xca,0x80,0x42,0xa0,0x02,0x4c,0x99,0xdc,0xff,0xa4,0x4e,0x99,0x8e,0xba,0xae,0x9b,0xc4,0xe5,0x80,0xce,0x51,0x26,0x5c,0x83,0xa4,0xdb,0x4c,0x98,0x20,0xc6,0x09,0xd1,0x11,0xab,0x29,0x48,0xc9,0x58,0xb4,0xa8,0xd0,0x8c,0xe5,0x5f,0xa8,0x80,0x19,0xc3,0x8c,0xb1,0xb6,0xae,0xfc,0x80
.byte 0x99,0x35,0x49,0xfb,0x8c,0xae,0xb0,0x28,0x74,0x6a,0xf5,0xc4,0x2a,0x23,0x6e,0x09,0x1e,0xe6,0xdb,0x97,0x65,0x89,0x4f,0x45,0xbd,0x45,0x35,0x08,0x34,0x3f,0x13,0x59,0xf8,0x78,0x26,0xc0,0x26,0x00,0x24,0xa1,0xda,0x66,0xd8,0x87,0x03,0x3a,0x31,0xd1,0x66,0xc1,0xdc,0x7b,0x2a,0x67,0x57,0x5b,0xfb,0xfb,0x07,0xe9,0xdc,0x3a,0x2e,0x03
.byte 0x3f,0x63,0x1c,0x1d,0x28,0x85,0x8e,0xbf,0xec,0xc6,0xcd,0x6c,0xf6,0x86,0x12,0x0f,0x92,0x03,0x70,0x14,0x5c,0x48,0x1c,0x13,0xe8,0xbd,0x32,0xfd,0xa5,0xfd,0x93,0xa8,0x64,0x50,0x5d,0x35,0xcd,0x08,0x31,0x90,0xd2,0x33,0xb4,0x42,0x92,0xb5,0x45,0x42,0x32,0x1b,0x25,0x29,0x18,0x04,0xf2,0xea,0x41,0x8b,0xcd,0x8c,0xb2,0xc6,0x30,0x06
.byte 0xd6,0x57,0x69,0x5f,0x34,0xf4,0xcd,0xc9,0xf5,0x36,0x7d,0x91,0x11,0x71,0x8c,0xa1,0xda,0x5f,0xca,0xd9,0x23,0xf0,0x77,0x7d,0xcc,0x01,0x70,0x3b,0x9e,0x3d,0x65,0xb0,0x44,0x41,0x5d,0x4e,0x91,0x4b,0xfd,0x8b,0x47,0xc7,0x36,0x41,0xf1,0x58,0xb0,0xd9,0xb6,0x62,0x3e,0xd6,0x24,0xa6,0x87,0xfe,0x63,0x0b,0x29,0x3c,0x80,0xd4,0x93,0x81
.byte 0x4a,0x41,0x85,0x9d,0xe6,0x36,0xd0,0xdc,0x0b,0xb5,0x5d,0x8b,0x22,0x7e,0xaf,0x11,0xb9,0xd1,0x49,0xdf,0xdb,0xde,0xa8,0xc7,0x9c,0x01,0x6b,0xd7,0x86,0xf0,0x79,0x3b,0x3a,0x89,0xd0,0x02,0x34,0x55,0x1d,0x27,0x17,0xca,0x44,0x47,0xc2,0x06,0x69,0x77,0xc4,0x63,0x80,0x05,0x99,0x2e,0x7b,0x57,0x3c,0x86,0x5f,0x38,0xe1,0xb2,0x4c,0x33
.byte 0x30,0x4b,0x90,0x68,0xc0,0xe1,0x20,0x12,0x25,0xda,0xfc,0xc3,0x49,0x16,0x96,0x80,0xd2,0xae,0xcd,0x5e,0x1a,0x02,0x07,0x97,0xaf,0x97,0xf9,0xd0,0x0c,0x23,0x27,0x08,0x14,0x19,0xdc,0xe9,0x11,0x6c,0x58,0x3c,0xfb,0xbc,0xd4,0x18,0x0d,0x44,0xa8,0x2b,0xe9,0x66,0x3e,0x06,0xe4,0xb6,0xdd,0x00,0xd6,0xd1,0x7b,0xce,0xcd,0xe1,0xf0,0x35
.byte 0x1c,0x96,0xff,0xf1,0x62,0x95,0x35,0x35,0xcf,0x37,0x8c,0xdc,0x09,0xac,0xaa,0x95,0x0f,0x7e,0x9f,0xc0,0xbe,0x06,0xe8,0xf6,0x2c,0x1c,0x19,0xb5,0xdf,0x0a,0xd9,0xfc,0x83,0x99,0xad,0xdb,0x5e,0x8f,0x7f,0x1d,0x3e,0x25,0x7a,0x3e,0x25,0xf8,0xb3,0x43,0xfe,0x13,0x8c,0x58,0xb7,0x5a,0xc8,0xf6,0x7a,0x4a,0x63,0x57,0x2c,0x53,0x06,0x2d
.byte 0xae,0x16,0xb5,0xac,0x1d,0x21,0x34,0xbb,0x26,0x8a,0x09,0x93,0x2c,0x1c,0x38,0x86,0xda,0x49,0x24,0x83,0xdd,0xa8,0x32,0xdf,0xcb,0x74,0x00,0x10,0xe0,0x87,0x48,0xdb,0xfb,0xce,0xd9,0xe8,0xd3,0x73,0xcb,0x6c,0x7f,0xbf,0xba,0xe4,0x7f,0x78,0xb1,0x65,0xf7,0xdc,0x0e,0x71,0x1d,0xdb,0x1f,0x3e,0x4e,0x2d,0x56,0x12,0x7e,0x53,0xe9,0x77
.byte 0x24,0xa7,0xf4,0x02,0x47,0xf1,0xa1,0x0f,0xc7,0xe2,0x5c,0x4b,0xf1,0x8b,0xda,0x05,0xe6,0x66,0x08,0x1c,0x84,0xa5,0x75,0x3a,0x6f,0xc7,0xd3,0x50,0x5d,0xce,0x09,0x9e,0x8e,0xa8,0x1a,0xc7,0x1d,0x28,0x13,0x80,0x3b,0x36,0x0c,0x3b,0x9c,0xea,0x53,0xe6,0xe4,0x35,0x5e,0x15,0x1a,0xa5,0x28,0x70,0x9c,0xde,0xbc,0xd6,0x04,0x94,0xcb,0xd8
.byte 0x29,0xe5,0xc6,0x94,0x61,0xe0,0x73,0x61,0x66,0xa9,0x85,0x23,0xb5,0x3e,0x7f,0x4b,0x54,0x20,0x49,0x05,0x88,0x09,0xe4,0xee,0x25,0xeb,0x86,0x5a,0x17,0xed,0xed,0xe7,0x25,0xfe,0x4f,0x89,0x05,0x2f,0xfb,0x1c,0x19,0x5c,0x66,0x47,0xf9,0x53,0x30,0xa8,0x64,0x97,0x4a,0x39,0x9a,0x4a,0x88,0x30,0xce,0xdf,0x67,0xae,0xa9,0x2c,0x0e,0xf3
.byte 0x12,0xe0,0x6a,0xaa,0xa1,0x2e,0x85,0x0f,0x96,0xe6,0x6a,0x33,0xb6,0xf0,0x16,0xb6,0x1e,0x44,0xac,0xdf,0x16,0xd5,0x8e,0xaf,0x65,0x9c,0xe9,0x65,0xea,0xe8,0x35,0x91,0xca,0x2e,0x8d,0xc7,0x6b,0x2f,0xae,0xbc,0xc5,0x49,0xfd,0x2a,0x2d,0xec,0xd8,0x67,0x56,0x68,0xa2,0xdd,0x5d,0x51,0x75,0x30,0x2e,0x56,0x50,0x4d,0xa4,0x6f,0xe1,0xb4
.byte 0xa5,0x9b,0x35,0x3b,0xc8,0x1a,0xd5,0x78,0x22,0x49,0x44,0x27,0xe7,0x67,0x60,0x91,0xb0,0x08,0x1c,0x83,0x3c,0x64,0x27,0x15,0xcf,0xbd,0x69,0xfe,0x56,0xff,0xab,0x56,0x1d,0x79,0xe6,0xc3,0xbd,0xce,0x75,0xf0,0x4f,0xa7,0x7a,0x9a,0x2e,0x7a,0xd7,0xf7,0xac,0xfb,0x87,0x8e,0x87,0xc6,0x10,0x3c,0x4c,0xb2,0xe3,0xf7,0xae,0x7d,0xaa,0x0c
.byte 0x46,0x17,0xce,0x61,0xce,0x73,0xc5,0x0d,0xdb,0x8e,0x8c,0x21,0x7b,0x7c,0x09,0x34,0x5d,0x3f,0x44,0xf0,0x16,0x7c,0xe2,0xdd,0xf2,0x07,0xd6,0x53,0x3c,0x0a,0xe9,0xfd,0x7a,0x41,0x13,0xcf,0x7c,0xa2,0x11,0xca,0xb5,0xdb,0x10,0x21,0x68,0x02,0x85,0xb6,0xe3,0xd4,0xb9,0xf7,0x9c,0xdf,0x54,0xaf,0x48,0x67,0x3e,0xd2,0x04,0xde,0xce,0x53
.byte 0x1a,0x9b,0x6b,0xd4,0x5e,0xb2,0xd0,0xa5,0xc8,0x7b,0x2e,0xb3,0xd8,0x46,0xc2,0x57,0x69,0x69,0xe6,0x54,0xee,0xf9,0x48,0x04,0x4e,0x11,0x2e,0x80,0x53,0x87,0x61,0xc7,0x1b,0x75,0xab,0xac,0x5f,0x17,0xda,0x25,0x5f,0x66,0xa0,0x59,0xfb,0xc2,0xf0,0xbf,0xc2,0x53,0xdc,0x8e,0x2d,0x41,0x13,0x7c,0x29,0xf0,0x80,0x70,0xb5,0x07,0x14,0x6c
.byte 0x5f,0x3a,0x66,0x1a,0xf8,0x7f,0xb4,0x8e,0x55,0xe8,0x2d,0x5b,0xec,0x65,0xe6,0x7b,0xf2,0xde,0xa2,0x51,0x45,0x9a,0x8a,0xfa,0xba,0x0c,0xcb,0x28,0x27,0x2c,0x01,0x81,0x38,0x5b,0x2e,0xbb,0x31,0x37,0x77,0xe7,0x52,0x2c,0xf9,0xb8,0x42,0x76,0x49,0x81,0xd4,0x64,0xd0,0x86,0xd4,0x3d,0x2c,0x74,0xca,0x4d,0xbb,0xa6,0x99,0x9d,0x79,0xd6
.byte 0x52,0x5e,0xfd,0xd4,0xc2,0x50,0x48,0x2e,0x4d,0x9c,0x4e,0xe6,0xbe,0x57,0xdb,0x28,0xf2,0xc0,0x25,0x9f,0x26,0x0e,0xc7,0x61,0xa0,0x77,0x7c,0x3d,0xf4,0xec,0x70,0x6c,0x06,0x37,0x3f,0xa2,0x3c,0x70,0xca,0x53,0xcb,0x56,0x51,0x0f,0x30,0x20,0x16,0x21,0xac,0x3a,0xe5,0x78,0x4c,0xe2,0x8e,0x9f,0x6e,0x36,0xb2,0x3d,0xb2,0x15,0x10,0x06
.byte 0x8e,0xff,0xa4,0x62,0x8e,0xa7,0x61,0x56,0xe7,0x27,0xa6,0x72,0x24,0x0b,0x47,0xca,0xa6,0x6b,0x74,0x5f,0x5e,0x80,0x64,0x47,0x1f,0x95,0x20,0x99,0x13,0x66,0x99,0x92,0xe7,0x82,0xdb,0xa1,0x97,0xdc,0x2d,0x35,0xa2,0xc9,0x91,0xf4,0x12,0x91,0xdd,0xb3,0xb4,0x7a,0x34,0xa0,0xd6,0x02,0xb1,0x38,0x42,0xad,0x53,0xd4,0xd1,0x82,0xd0,0x3f
.byte 0xb4,0x32,0x7a,0x70,0xe2,0x6e,0xae,0x9c,0x99,0xe3,0x62,0x6e,0x7d,0x01,0xcd,0x3b,0x4e,0xb0,0x57,0x9d,0x47,0x6f,0x2a,0x62,0x12,0x44,0x28,0xfd,0x78,0x00,0x08,0x9a,0x2b,0x5b,0x3f,0x62,0x24,0x94,0x75,0x5c,0x1e,0x8b,0xc4,0x3c,0xbc,0x7d,0xe8,0x10,0xbf,0x9d,0x23,0x52,0xc8,0x65,0xe8,0x39,0x8a,0x97,0x70,0xbb,0xa4,0x09,0xf8,0x29
.byte 0xd2,0x36,0x7a,0x46,0x4a,0x19,0x68,0xe8,0x57,0xc8,0x3c,0x88,0xa2,0x8c,0x01,0xa5,0x21,0x32,0xff,0x6c,0xa7,0x6f,0x07,0x94,0xc3,0x07,0xfc,0x09,0x1a,0x0c,0xe4,0x01,0x41,0x51,0x80,0xf2,0x47,0x41,0xe7,0x8d,0x97,0x34,0xe4,0xdf,0x21,0x17,0x27,0x41,0x8c,0x31,0x03,0x5e,0xee,0x36,0xaf,0x37,0x4f,0x89,0x92,0x6b,0x03,0xb1,0x19,0xc1
.byte 0x26,0xb1,0x32,0x68,0x6f,0x9e,0x1c,0xc4,0x7f,0xce,0x1f,0xa9,0xd7,0xd8,0x19,0xd4,0x76,0xd5,0xe5,0xe6,0xeb,0x99,0x45,0xe6,0x72,0x2e,0xdb,0x13,0x2b,0x4d,0xdd,0x39,0x2a,0xd4,0x0f,0x26,0x49,0x81,0xaa,0x9d,0x6a,0xad,0x0e,0x58,0x81,0xc8,0x74,0x60,0xb3,0x29,0x92,0xc4,0x2e,0x3c,0x2b,0xdd,0x7f,0x13,0x91,0x84,0xa4,0xc5,0x8e,0x75
.byte 0xcd,0x83,0x4b,0x9f,0xfa,0x6e,0x29,0x1d,0xa5,0xfd,0x97,0x6e,0x36,0xcb,0x50,0x3f,0x68,0xac,0xec,0xee,0x00,0xb8,0x38,0xb9,0xcb,0x8b,0xf6,0x1c,0x45,0x28,0x8d,0x6f,0x5a,0x97,0x64,0x9c,0x52,0x40,0xff,0xbb,0xf6,0x46,0x1f,0xcc,0xad,0x93,0xcb,0x3a,0xce,0xc9,0xae,0x03,0x04,0xe0,0x9b,0x54,0xde,0xe0,0xdc,0xbf,0x9f,0x4e,0xb6,0xc4
.byte 0x0f,0x1b,0x95,0x92,0xbc,0x8e,0x70,0x2b,0xbf,0x8d,0xf1,0xdd,0x4c,0xad,0xb6,0x5d,0xbd,0x36,0x5a,0x3c,0x0e,0x0b,0x83,0x1a,0x5d,0x0a,0xaf,0x0b,0x69,0x46,0xb4,0x42,0x3c,0x5c,0xe2,0x7d,0x75,0x3c,0x6b,0x03,0x32,0x1b,0xd0,0xe9,0xe7,0xe3,0x87,0xe8,0xd2,0x39,0x3b,0xe0,0x5f,0x8e,0xf7,0xeb,0x89,0x2e,0x0f,0x3f,0x1e,0xf3,0x34,0x0d
.byte 0x86,0x6b,0x28,0xbb,0x7c,0x7a,0x61,0xb2,0xab,0xfe,0xbc,0xba,0xaf,0xf5,0xab,0x2d,0xe9,0x9b,0x88,0x8b,0xd0,0x2d,0x3e,0xf6,0x12,0x25,0x24,0x63,0x60,0xfb,0x32,0x23,0x5a,0xbf,0x1a,0x3e,0x07,0xb9,0x46,0xe6,0x09,0x30,0xa8,0x59,0x87,0x14,0xcc,0x94,0x0b,0xa4,0xac,0x31,0x51,0x04,0xde,0xda,0xe4,0x50,0x5a,0xa2,0x9e,0xae,0x3f,0xed
.byte 0xaf,0x9d,0xc7,0x6f,0xf3,0x05,0x2b,0xb8,0xd9,0xcc,0xe9,0xc1,0x7e,0x9c,0xbb,0x86,0xe3,0x3b,0xa0,0xc3,0x0b,0x38,0x28,0xf1,0x83,0x50,0xc8,0xf2,0x1f,0x05,0xcc,0x1b,0xd1,0x59,0xff,0x73,0xb0,0x13,0x75,0x59,0x22,0x4d,0xac,0x65,0x75,0x47,0x3b,0x37,0x91,0xf1,0x40,0x6b,0x7b,0xe8,0x72,0xe5,0x11,0x12,0x23,0x5a,0x2c,0x9c,0xa2,0xe5
.byte 0x14,0x5b,0x17,0xb5,0x41,0x95,0xdd,0x0d,0x0b,0x70,0xba,0xbc,0xb7,0x55,0x37,0x77,0x1e,0x32,0xf4,0xba,0x57,0x81,0x0b,0x64,0xf6,0x1f,0x57,0x99,0xeb,0xb2,0x06,0x9c,0x6c,0x4f,0x1c,0xbf,0xca,0x79,0xeb,0xff,0x6e,0x32,0xaf,0x0e,0x2b,0xf3,0xbb,0x75,0xf8,0x80,0x9f,0x95,0xb3,0x35,0x63,0xe0,0x92,0x8f,0x50,0xa3,0x41,0x38,0xb7,0x7b
.byte 0xa1,0x3b,0xde,0x69,0x85,0x36,0xb7,0x44,0xb3,0xb2,0xc5,0x85,0xd3,0x9a,0x78,0x26,0x97,0xc1,0x58,0xfd,0x0f,0x27,0x74,0x93,0x0e,0x54,0x23,0x6f,0x5c,0x48,0x38,0xb9,0xb5,0x7d,0x17,0x23,0x5a,0x36,0x32,0xdd,0x40,0x7e,0x1c,0xb4,0x65,0x84,0x83,0xcc,0x6e,0xa0,0x3a,0xa6,0xbe,0xf8,0xca,0x55,0xf4,0x0a,0x65,0x83,0x52,0x14,0x9d,0x10
.byte 0x4a,0x31,0xe7,0x05,0x99,0x01,0xb3,0x01,0x47,0x64,0xa2,0xee,0x8f,0xf1,0x77,0x91,0x94,0xa3,0xad,0xfc,0xfa,0x7e,0x92,0x90,0x41,0xb6,0x2a,0xb7,0xa1,0xfa,0xf3,0x74,0x8f,0x27,0xe1,0x48,0xe1,0x96,0xff,0x85,0xd4,0x40,0x76,0x15,0x2a,0x6c,0xce,0xdb,0x72,0x0b,0xf6,0x33,0x5f,0xa0,0x72,0xf1,0xf1,0x92,0xaa,0xfc,0x75,0xef,0x11,0x2b
.byte 0x71,0x2f,0x6b,0xe4,0x70,0x13,0xa3,0xbe,0xfc,0xa4,0x35,0xc5,0xa7,0x2a,0x94,0x34,0x7a,0x15,0x7e,0x0d,0x8b,0x92,0xe6,0xfb,0x12,0x77,0xf9,0xe3,0x0e,0xce,0x1e,0x84,0xcd,0x3a,0xce,0x44,0x65,0xe8,0x6c,0x0b,0x86,0x70,0xe9,0x66,0x18,0x37,0x3d,0xc0,0xc0,0xcb,0xe0,0x7b,0x16,0xda,0x89,0xc9,0x8e,0x83,0xc4,0x21,0x40,0x65,0xd2,0xe8
.byte 0x3f,0xa5,0xda,0xe9,0x4b,0x2e,0x1d,0x89,0x4d,0x3b,0x84,0x4b,0xfd,0x0e,0x2c,0x50,0xe2,0x01,0x7d,0xec,0x12,0x81,0x49,0x9b,0xe3,0x14,0xd8,0xb4,0xe3,0x44,0x06,0x7f,0xbf,0x92,0xd4,0xb8,0x65,0x1f,0xdb,0x7a,0xb4,0xd6,0x9e,0x0c,0xe0,0xc2,0xc9,0xe8,0xc9,0xf8,0x34,0xff,0x7b,0x1a,0x0d,0xc9,0xc7,0x77,0xf2,0x44,0x79,0xdb,0xef,0x31
.byte 0x61,0xd4,0x85,0x0d,0x0f,0x11,0x29,0xfb,0x07,0xe0,0x83,0x11,0x81,0xbb,0xe0,0x6e,0x1c,0x0a,0x31,0xe3,0x29,0x53,0x91,0xab,0xea,0xc8,0x2f,0xaf,0x96,0xe7,0x64,0x8b,0xfd,0x4f,0x49,0xf5,0x1f,0x93,0x3b,0x32,0xdf,0x0c,0x1d,0x8e,0x33,0x15,0x00,0x7c,0x0c,0x4b,0x95,0xd5,0x09,0x8f,0x48,0xc3,0x6e,0xdc,0xd8,0x5d,0x36,0x53,0xc2,0x19
.byte 0xef,0xd7,0x50,0x0d,0xa2,0xc9,0x39,0xd1,0xef,0xe4,0x26,0x30,0x27,0x77,0x79,0x85,0x18,0x39,0xb7,0xb7,0xb6,0xba,0xf2,0x1f,0xa4,0xee,0x53,0x7b,0x43,0xff,0xd6,0x1c,0xa8,0x32,0xb7,0xfb,0x9b,0x45,0x6f,0x0f,0x60,0x62,0x5c,0xfe,0x02,0x5d,0x11,0xeb,0xe5,0x27,0xde,0x75,0xd4,0x11,0xbb,0xa4,0x7f,0xa0,0xb6,0x23,0x8a,0xbb,0x75,0x3c
.byte 0xba,0x8b,0x3d,0x61,0x93,0xc2,0x1b,0x6f,0x79,0x93,0xc2,0x22,0x4c,0x48,0xe9,0x94,0x6e,0xed,0x2c,0x1d,0x51,0x0e,0xa6,0x69,0x1d,0x62,0xeb,0x67,0x47,0x5d,0x2f,0xa8,0x47,0x4f,0xe7,0x2f,0x65,0x92,0xd7,0x55,0xc1,0x46,0xfe,0x1d,0xfc,0xef,0x26,0xaf,0x3a,0x18,0x63,0x02,0x4d,0x8b,0xf4,0x24,0x99,0x3f,0x1a,0x74,0xd2,0x8e,0xd8,0x9e
.byte 0xd6,0x3b,0xf9,0xce,0x67,0xa3,0xa6,0x0a,0x74,0x21,0x4e,0x0e,0x15,0x07,0xb6,0xbf,0xa2,0xcf,0x6e,0xf7,0xfa,0x49,0x98,0xfa,0xa0,0xf7,0xf0,0xd8,0x50,0xbf,0x6f,0x64,0x93,0xac,0xe0,0x88,0x04,0x04,0x74,0xa4,0xdd,0x9f,0x75,0xfe,0x30,0x37,0x77,0x09,0x1c,0xfc,0x54,0x47,0x4d,0x3f,0xda,0xfe,0x14,0x50,0x19,0x5e,0x88,0x4a,0xe9,0xcb
.byte 0x5e,0x60,0x4e,0xef,0x5b,0x15,0x10,0x3b,0x1d,0x98,0x43,0xe4,0xbe,0x92,0xc6,0x8f,0x04,0x0e,0x04,0x16,0x68,0x82,0x1c,0xfe,0x30,0x9a,0xd2,0x4b,0x25,0xd7,0xed,0x19,0x22,0x06,0x09,0x3b,0x26,0xa6,0x9a,0x17,0x65,0x01,0x8f,0x70,0x8a,0x83,0x2a,0xa3,0xbf,0xeb,0xf9,0x3f,0xf3,0x5a,0x3f,0x62,0x86,0x6a,0x3b,0x3b,0xe3,0x43,0xc8,0x4c
.byte 0x79,0x46,0xd3,0x9f,0x98,0x0d,0xac,0x11,0xf9,0xa3,0x46,0xe1,0xea,0x8c,0x1d,0x26,0x5e,0xca,0xd1,0x84,0x3b,0x01,0xb2,0x3d,0xe8,0xe5,0x8f,0x78,0x41,0x76,0xe9,0x18,0xcd,0x34,0xd9,0x48,0xb0,0x34,0xda,0xc2,0x34,0x3a,0x58,0x9d,0x12,0xa7,0x2a,0x73,0x40,0xc5,0x28,0x67,0xef,0x1a,0x7a,0x39,0x45,0x86,0x02,0x47,0xb8,0xde,0xc9,0x6b
.byte 0x78,0x7a,0x01,0x48,0xa8,0xc6,0xc4,0x57,0x52,0xa9,0xad,0x8e,0x4e,0x22,0x1a,0xc5,0x21,0x65,0x98,0x0a,0x1d,0xf5,0x68,0x13,0xd8,0xef,0xb9,0x40,0x49,0x98,0x02,0x76,0x54,0x0f,0x36,0xf8,0x8f,0x88,0xfc,0xec,0xe1,0x73,0xc0,0x45,0xe1,0x1a,0x92,0x86,0x7b,0x78,0x63,0x7e,0x06,0xce,0x16,0x39,0x57,0xbc,0x96,0x63,0x32,0x99,0xad,0xff
.byte 0xeb,0x63,0x33,0x35,0xef,0x33,0x08,0xca,0x0c,0xac,0x4b,0xc1,0x26,0xa1,0x7a,0x71,0x8e,0x2d,0x18,0x8b,0x6c,0x4a,0x18,0xa1,0x6c,0x15,0x9b,0xb8,0xc1,0xa1,0xc2,0x01,0x6e,0x65,0x40,0x6b,0x8c,0xf7,0x61,0x93,0x3f,0xe3,0xf0,0x56,0xe3,0x3d,0xa1,0x59,0xd9,0x80,0x6b,0x0c,0xe2,0x84,0x56,0xb5,0x06,0xc0,0x83,0xc3,0xf3,0xdd,0xfc,0xc9
.byte 0xad,0xa0,0x0e,0x5f,0x3b,0x36,0x79,0x46,0xc3,0x0e,0x6c,0x74,0xb0,0xc1,0x75,0xd1,0xe4,0x0b,0xd6,0x8e,0xbd,0x32,0x68,0x8f,0x77,0x0e,0xd4,0xdc,0xa1,0xa8,0x02,0x07,0xef,0x7d,0x5b,0x88,0x29,0x3f,0x7a,0x0a,0x46,0xf1,0x6b,0xfd,0x87,0x59,0x61,0x13,0x69,0x66,0x92,0x3a,0xd9,0x45,0xb7,0x76,0x10,0xad,0x31,0xe0,0x36,0x7e,0x6e,0x57
.byte 0x65,0x95,0x53,0xc6,0xd3,0xbb,0x6d,0xd2,0x5f,0xd6,0xed,0xbe,0x83,0x7e,0x51,0x0b,0x54,0xc4,0xf7,0xda,0xe1,0x3b,0x96,0xae,0x86,0x90,0x7f,0x1d,0x16,0x37,0xfa,0x7c,0x2e,0x9b,0x27,0x4e,0xf5,0x44,0xf3,0x72,0xec,0xd4,0xa1,0xc8,0xcf,0xb6,0xda,0x26,0x95,0x37,0xbf,0xdc,0x2e,0x3b,0xd4,0xf1,0x09,0x14,0x58,0x8e,0x01,0xcb,0x8c,0x28
.byte 0x18,0xdd,0x71,0x99,0x7b,0xdf,0x94,0x77,0xc6,0x39,0xea,0x61,0x8a,0x71,0x9a,0xe3,0xd2,0x14,0x6c,0xec,0xfc,0xc6,0x6e,0xf8,0xe2,0x5b,0x55,0xe5,0x58,0xfc,0x06,0x65,0xdb,0xbc,0x9f,0x22,0x30,0x98,0x40,0xc5,0xcf,0xa8,0x97,0xab,0x2e,0x15,0x79,0xe0,0x30,0xb5,0x28,0xd5,0x32,0xec,0x2d,0x4b,0x2c,0x00,0x47,0xdf,0xc5,0xc2,0x19,0x3d
.byte 0xf5,0xc9,0xff,0x7b,0x7a,0x97,0x5f,0x8c,0xd9,0x0f,0x8c,0xa5,0x84,0x1f,0xd6,0x2b,0x36,0x94,0xf9,0xf2,0x92,0x46,0xb9,0x3d,0x67,0xc6,0x4a,0x14,0x57,0xb6,0x16,0x90,0x31,0xd9,0x8e,0xb7,0xbf,0x7b,0x74,0xde,0x7f,0x0e,0x34,0x14,0xb8,0x83,0x7e,0x31,0x15,0xb0,0xa1,0xc8,0xfc,0x28,0x3f,0x7e,0x2b,0xe8,0xc3,0xf6,0x49,0x2d,0x03,0xc6
.byte 0x94,0x8f,0xe8,0x97,0x46,0x2b,0x83,0x1c,0xe2,0xab,0xe3,0xf1,0xc4,0x20,0x0c,0xa6,0xca,0x78,0x89,0x66,0xb1,0xce,0x8e,0x0d,0x07,0x97,0x9a,0xce,0x8f,0x63,0x9b,0x5a,0x2f,0x51,0x38,0x40,0x37,0xa1,0x8b,0x13,0x51,0xe0,0x4c,0x86,0x8f,0x90,0xe8,0x00,0x1b,0xef,0xb7,0x98,0x7e,0xb8,0xf4,0x29,0xe8,0xa6,0xba,0x58,0x19,0x5f,0x13,0x5e
.byte 0xd6,0x21,0x48,0x8b,0x64,0xee,0xd5,0xc9,0xbd,0x12,0xf4,0xf1,0x2b,0x89,0xaf,0x50,0xab,0x0c,0x9a,0xaa,0x78,0x62,0x90,0x71,0x3f,0xa8,0x19,0x92,0xb3,0x28,0xa9,0x37,0x93,0xbc,0x4c,0xf6,0xde,0xa5,0x02,0x22,0xc1,0x24,0x80,0x03,0x09,0x2a,0x9c,0xdb,0x5a,0xd0,0xf1,0x25,0xe1,0x46,0x0c,0xbf,0xed,0x4b,0x05,0xa1,0xde,0x40,0x71,0xb4
.byte 0xa9,0x3e,0xf4,0xf1,0x8e,0x00,0x17,0x09,0xa8,0x2c,0xcc,0xbc,0xfe,0x6e,0x9f,0xb6,0x2c,0x53,0x2c,0x12,0x67,0xad,0xa8,0xcc,0xfb,0x46,0xe6,0x00,0x6b,0xb7,0x9b,0xe0,0xd8,0x39,0x4d,0xbe,0xa0,0x14,0x25,0xd6,0xe4,0xc3,0x04,0xde,0xfb,0x85,0x14,0x46,0x5a,0x01,0x64,0x2f,0xb7,0x66,0x31,0x20,0x3e,0x06,0xf8,0x4a,0x68,0xf2,0xa1,0xa1
.byte 0xe6,0x0b,0xd8,0x3d,0x93,0xb3,0x72,0xff,0x36,0xf8,0xcc,0xa6,0x4f,0x32,0x9d,0xcb,0x25,0x2f,0x4f,0x78,0xb6,0xd3,0xb1,0x58,0x98,0x95,0xc1,0xbf,0xfe,0x08,0x92,0x55,0xf8,0x8a,0x8f,0x65,0xa8,0x51,0xb5,0x69,0x76,0xb0,0x03,0x05,0x93,0xef,0xf3,0x7d,0xfd,0x1e,0xda,0x7e,0x59,0x2c,0x84,0xaf,0x1c,0xd3,0xf0,0x3c,0xe6,0x83,0x4d,0x92
.byte 0xce,0x62,0x42,0x1b,0xbd,0x81,0xa5,0x5d,0xfe,0xaf,0x47,0xd4,0xf0,0x00,0x95,0x19,0x6c,0xbd,0x9d,0x86,0xdc,0xd9,0xc2,0x67,0x52,0x48,0xa7,0x0c,0x5b,0x4c,0xc1,0x31,0x1e,0xd1,0x1d,0x8b,0x1b,0x01,0x92,0x41,0x4e,0x32,0xbd,0x8e,0x61,0x84,0x02,0x57,0x7f,0x24,0x7c,0xb4,0x02,0x6e,0x2d,0xe2,0x6e,0x44,0xa5,0x2a,0xcc,0xed,0xf6,0xc6
.byte 0x1f,0x59,0x64,0xad,0x3f,0xc5,0xd4,0x07,0x83,0x32,0xfb,0xd2,0x7e,0xb8,0x50,0x3f,0x2a,0x06,0x7c,0xdd,0x61,0x5f,0xad,0x89,0x57,0x61,0xce,0x75,0xe5,0xa8,0x8b,0x33,0xb1,0x87,0xe3,0x3b,0x64,0xab,0xac,0xb7,0x7e,0xd5,0xbe,0xfa,0x28,0xc4,0x2b,0xe5,0x4b,0x49,0xcd,0x27,0x41,0xcc,0xe3,0x3d,0x6a,0xb7,0x0b,0xf5,0x6f,0xa3,0x1b,0x18
.byte 0xe2,0x03,0xd9,0x88,0x6a,0xf3,0x05,0x39,0x02,0x79,0xf8,0x2f,0x28,0xbc,0xed,0x39,0xf3,0x14,0xe6,0xfd,0x73,0x4c,0xf0,0x5f,0xd9,0xc9,0x7a,0x6c,0x1c,0xcf,0x38,0x0b,0xae,0xfa,0x34,0x02,0x21,0xc6,0xb3,0x88,0xda,0x96,0xe2,0xe0,0x68,0x75,0x7a,0x98,0x88,0x0d,0x1c,0x92,0xee,0xca,0xac,0x18,0x28,0x89,0x40,0xd7,0x1b,0x6f,0x59,0x21
.byte 0xd3,0x30,0x4c,0x0c,0x2c,0xca,0x41,0x46,0x8e,0x7d,0xe9,0x76,0x81,0x70,0xc3,0x10,0x42,0x64,0xaf,0x52,0x3e,0x78,0x38,0xcd,0xab,0x88,0xa5,0x32,0xbe,0xbe,0x55,0x39,0xc4,0xc6,0xce,0x53,0xfc,0x11,0x1b,0x0b,0x83,0xd3,0x3e,0x7b,0x71,0x3a,0x58,0x5d,0x70,0xfb,0x49,0x41,0x7d,0xe8,0x1e,0x37,0x17,0x3f,0x80,0x34,0x3a,0x81,0x65,0xb9
.byte 0x27,0x3c,0xfa,0xdb,0xc1,0xb8,0x5e,0x4c,0x80,0xf7,0x1e,0x89,0x2a,0x04,0xf0,0xfd,0x14,0xf2,0xbc,0x72,0xbb,0x36,0x9d,0x79,0xa5,0x7c,0xed,0x0f,0xf7,0x4f,0x69,0x7d,0xaf,0x8f,0xfc,0xcd,0x14,0x4c,0x29,0x55,0xb5,0xcd,0xb9,0x7c,0xa7,0xd4,0x83,0x28,0xcd,0x9c,0x35,0x75,0x00,0x0f,0xaa,0x3b,0x18,0xa5,0x0f,0x2e,0x97,0xa3,0x38,0xca
.byte 0xb5,0x8a,0x8f,0x9e,0x47,0xc8,0xde,0x82,0x72,0xe0,0xb2,0x14,0xfc,0x28,0xa5,0xf9,0x76,0x38,0xf5,0x42,0xd2,0x87,0x82,0xfe,0x49,0x4d,0xb1,0x32,0x30,0x37,0xdf,0xc4,0x11,0x10,0x30,0xf8,0x51,0x5f,0x5f,0x59,0x02,0x17,0x90,0x5c,0xe6,0x6b,0xec,0x5b,0x14,0xb0,0xde,0xa9,0xca,0xe4,0x00,0x8c,0xe0,0xdb,0xf8,0xd2,0x2b,0x08,0x30,0xbb
.byte 0x37,0xb2,0xd1,0x0e,0x8d,0xba,0xe6,0x60,0x4b,0xe7,0xe3,0x23,0xb6,0x31,0x5f,0x8c,0xb5,0x34,0x7b,0x6f,0x61,0xae,0xeb,0xc7,0xf6,0x0b,0x94,0x28,0xae,0x76,0x81,0xeb,0x44,0xcc,0x51,0xd5,0x5e,0xba,0x97,0x36,0xd3,0xc3,0xc9,0x03,0xe9,0x08,0x92,0x98,0x83,0x2a,0x7b,0x14,0x36,0xd0,0x27,0x5a,0x60,0xa5,0xc0,0xc6,0x12,0x42,0x44,0x85
.byte 0x8a,0xc7,0x2e,0x5d,0x2a,0xf4,0x25,0x50,0x7d,0x91,0x1c,0x95,0xb6,0x4f,0x1d,0x77,0x80,0x83,0x1c,0x4e,0x55,0xf8,0x1f,0x16,0xee,0xc3,0x8b,0xf5,0x96,0x25,0x1e,0xb6,0x34,0x5c,0xd7,0xd4,0xfa,0xff,0xa1,0x5b,0xd8,0x03,0xc2,0xe9,0x85,0x16,0xde,0x9d,0xef,0x37,0xc4,0x4c,0x82,0xdb,0xe4,0xf9,0x0f,0xcb,0x5e,0x9b,0x75,0xc1,0x3d,0x72
.byte 0xdd,0xa3,0x31,0xbe,0x19,0x90,0x3d,0x7f,0x5e,0xed,0xa4,0xa4,0xc6,0x5c,0x96,0xfe,0x87,0x44,0x50,0x10,0x9d,0x70,0xf7,0x50,0x11,0xb3,0x20,0x6b,0x48,0xf5,0x5e,0x26,0xed,0x30,0x69,0x91,0x66,0x83,0xf7,0x45,0xa1,0x0e,0x60,0x68,0xae,0x8a,0x84,0x8c,0x6a,0x7d,0x27,0x34,0xc0,0x85,0xaf,0xb5,0x47,0xcd,0x5b,0xab,0xbc,0xb9,0xf8,0x14
.byte 0xb1,0x81,0xd3,0xd9,0x26,0x5d,0xda,0xb1,0x8b,0x50,0x3f,0xa5,0x88,0x2c,0xc0,0x31,0x14,0x9a,0x5a,0xef,0x24,0x18,0xcf,0x8d,0x1e,0x25,0x38,0x30,0xa9,0x5f,0x8c,0xc6,0xc1,0x85,0x7f,0xec,0xa3,0xb3,0xf8,0xf2,0x48,0x1a,0x9a,0xef,0x21,0xc5,0x13,0xfb,0x89,0xc6,0xec,0xb6,0x81,0xd1,0xef,0xd7,0x2e,0x1d,0x06,0x5a,0x51,0x9b,0xbb,0x44
.byte 0xce,0x14,0x83,0xb7,0x04,0xf2,0x61,0x47,0x2a,0xff,0x4f,0xe6,0x6d,0x6e,0xd9,0x95,0x48,0x36,0x89,0x96,0x7d,0xfa,0xaf,0xb8,0xf1,0x80,0x66,0x3d,0x01,0x20,0x42,0x76,0xe7,0x58,0xb3,0xbf,0xc7,0xde,0xfb,0x12,0xfa,0x21,0xfb,0x63,0x3e,0xa0,0x7e,0x21,0x90,0xd7,0xf1,0x37,0xa4,0x43,0xbc,0x1b,0xf9,0x51,0x81,0xd0,0x88,0x42,0xf0,0xec
.byte 0x82,0xce,0x92,0x81,0x19,0x77,0x50,0x5b,0xa3,0xd8,0xbd,0x50,0x7b,0xec,0x4d,0x63,0x99,0x29,0x89,0x28,0x9c,0xe4,0x90,0xfb,0x05,0x7e,0x0c,0xc8,0xb9,0xd7,0xc4,0xc6,0x11,0x82,0x22,0xaa,0xe9,0x60,0x20,0x72,0xd6,0x5b,0xa8,0x8e,0x04,0x0b,0x14,0xfc,0x38,0x50,0x7e,0x8b,0x55,0x13,0xe3,0x4a,0x25,0x03,0x88,0x50,0x17,0x73,0x3c,0x0a
.size g_preCompTable,.-g_preCompTable
#endif
|
2301_79861745/bench_create
|
crypto/ecc/src/asm/ecp256_pre_comp_table.s
|
Motorola 68K Assembly
|
unknown
| 777,850
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_CURVE_NISTP256) && defined(HITLS_CRYPTO_NIST_USE_ACCEL)
#include "ecp256_pre_comp_table.s"
.file "ecp256_x86.S"
.data
.align 64
.Lpoly: // P
.quad 0xffffffffffffffff, 0x00000000ffffffff, 0x0000000000000000, 0xffffffff00000001
.LrrModP: // Indicates the calculated value of R * R mod p, which is used in montgomery modular multiplication.
.quad 0x0000000000000003, 0xfffffffbffffffff, 0xfffffffffffffffe, 0x00000004fffffffd
.Lone_mont: // R mod P, R = 2^256, = 2^256 - P
.quad 0x0000000000000001, 0xffffffff00000000, 0xffffffffffffffff, 0x00000000fffffffe
.Lord: // order, n
.quad 0xf3b9cac2fc632551, 0xbce6faada7179e84, 0xffffffffffffffff, 0xffffffff00000000
.LordK: // (2^64 - ord[0]) * ordK = 1 (mod 2^64)) LordK = -(ord[0])^(-1) (mod 2^64) LordK * Lord,
// The lower 64 bits are all Fs.
.quad 0xccd1c8aaee00bc4f
.LOne:
.quad 0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000
.text
/**
* Function description: Returns the address of the field calculation table of the ECP256 field.
* Function prototype: const ECP256_TableRow *ECP256_GetPreCompTable(void);
* Input register: None
* Change register: None
* Output register: rax
* Function/Macro Call: None
*/
.globl ECP256_GetPreCompTable
.type ECP256_GetPreCompTable,@function
.align 32
ECP256_GetPreCompTable:
.cfi_startproc
leaq g_preCompTable(%rip), %rax
ret
.cfi_endproc
.size ECP256_GetPreCompTable, .-ECP256_GetPreCompTable
/**
* Function description: Addition of the ECP256 field. res = a + b mod P
* Function prototype: void ECP256_Add(Coord *r, const Coord *a, const Coord *b);
* Input register:
* rdi: Pointer to the output Coord structure
* rsi: Address pointing to input data a
* rdx: Address pointing to input data b
* Change register: rsi, rdx, rcx, rax, r8, r9, r10, r11, r12, r13
* Output register: None
* Function/Macro call: Addition can be implemented by calling ECP256_AddCore.
*/
.globl ECP256_Add
.type ECP256_Add,@function
.align 32
ECP256_Add:
.cfi_startproc
pushq %r12
pushq %r13
movq (%rsi), %r8 // a[0]
movq 8(%rsi), %r9 // a[1]
xorq %r13, %r13 // Save carry
movq 16(%rsi), %r10 // a[2]
movq 24(%rsi), %r11 // a[3]
leaq .Lpoly(%rip), %rsi // P
addq (%rdx), %r8 // c[0] = a[0] + b[0]
adcq 8(%rdx), %r9 // c[1] = a[1] + b[1] + carry
movq %r8, %rax // save c[0]
adcq 16(%rdx), %r10 // c[2] = a[2] + b[2] + carry
adcq 24(%rdx), %r11 // c[3] = a[3] = b[3] + carry
movq %r9, %rcx // save c[1]
adcq $0, %r13 // save carry value to r13
subq $-1, %r8 // d[0] = c[0] - P[0]
movq %r10, %rdx // save c[2]
sbbq 8(%rsi), %r9 // d[1] = c[1] - P[1] - borrow
sbbq $0, %r10 // d[2] = c[2] - P[2] - borrow
movq %r11, %r12 // save c[3]
sbbq 24(%rsi), %r11 // d[3] = c[3] - P[3] - borrow
sbbq $0, %r13 // r13 = 0 + carry - borrow
cmovcq %rax, %r8 // res[0] = (r13 < 0) ? c[0]: d[0]
cmovcq %rcx, %r9 // res[1] = (r13 < 0) ? c[1]: d[1]
movq %r8, (%rdi)
cmovcq %rdx, %r10 // res[2] = (r13 < 0) ? c[2]: d[2]
movq %r9, 8(%rdi)
cmovcq %r12, %r11 // res[3] = (r13 < 0) ? c[3]: d[3]
movq %r10, 16(%rdi)
movq (%rsp), %r13
movq %r11, 24(%rdi)
movq 8(%rsp), %r12
leaq 16(%rsp), %rsp
ret
.cfi_endproc
.size ECP256_Add, .-ECP256_Add
/**
* Function description: Addition core part of the ECP256 field, a + b mod P; Outputs r8-r11, r14,15 are P[1] and P[3]
* Input register:
* r8-r11:256-bit input data a
* rdx: points to the input 256-bit data b.
* r14:P[1]
* r15:P[3]
* Change register: rdx, rcx, rax, r8, r9, r10, r11, r12, r13
* Output register: r8-r11
*/
.type ECP256_AddCore,@function
.align 32
ECP256_AddCore:
.cfi_startproc
xorq %r13, %r13
addq (%rdx), %r8 // Addition result.
adcq 8(%rdx), %r9
movq %r8, %rax
adcq 16(%rdx), %r10
adcq 24(%rdx), %r11
movq %r9, %rcx
adcq $0, %r13 // Save carry value to r13.
subq $-1, %r8 // Mod P.
movq %r10, %rdx
sbbq %r14, %r9
sbbq $0, %r10
movq %r11, %r12
sbbq %r15, %r11
sbbq $0, %r13
cmovcq %rax, %r8 // Obtain mod P result.
cmovcq %rcx, %r9
movq %r8, (%rdi)
cmovcq %rdx, %r10
movq %r9, 8(%rdi)
cmovcq %r12, %r11
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
ret
.cfi_endproc
.size ECP256_AddCore, .-ECP256_AddCore
/**
* Function description: Subtraction of the ECP256 field. Res = a - b mod P
* Function prototype: void ECP256_Sub(Coord *r, const Coord *a, const Coord *b);
* Input register:
* rdi: Pointer to the output Coord structure
* rsi: Address pointing to input data a
* rdx: Address pointing to input data b
* Change register: rsi, rdx, rcx, rax, r8, r9, r10, r11, r12, r13
* Output register: None
* Function/Macro call: Subtraction can be implemented by calling ECP256_SubCore.
*/
.globl ECP256_Sub
.type ECP256_Sub,@function
.align 32
ECP256_Sub:
.cfi_startproc
pushq %r12
pushq %r13
movq (%rsi), %r8 // a[0]
movq 8(%rsi), %r9 // a[1]
xorq %r13, %r13 // Save borrow
movq 16(%rsi), %r10 // a[3]
movq 24(%rsi), %r11 // a[4]
leaq .Lpoly(%rip), %rsi // P
subq (%rdx), %r8 // c[0] = a[0] - b[0]
sbbq 8(%rdx), %r9 // c[1] = a[1] - b[1] - borrow
movq %r8, %rax // save c[0]
sbbq 16(%rdx), %r10 // c[2] = a[2] - b[2] - borrow
sbbq 24(%rdx), %r11 // c[3] = a[3] - b[3] - borrow
movq %r9, %rcx // save c[1]
sbbq $0, %r13 // save borrow value to r13
addq $-1, %r8 // d[0] = c[0] + P[0]
movq %r10, %rdx // save c[2]
adcq 8(%rsi), %r9 // d[1] = c[1] + P[1] + carry
adcq $0, %r10 // d[2] = c[2] + P[2] + carry
movq %r11, %r12 // save c[3]
adcq 24(%rsi), %r11 // d[3] = c[3] + P[3] + carry
testq %r13, %r13
cmovzq %rax, %r8 // res[0] = (r13 == 0) ? c[0] : d[0]
cmovzq %rcx, %r9 // res[1] = (r13 == 0) ? c[1] : d[1]
movq %r8, (%rdi)
cmovzq %rdx, %r10 // res[2] = (r13 == 0) ? c[2] : d[2]
movq %r9, 8(%rdi)
cmovzq %r12, %r11 // res[3] = (r13 == 0) ? c[3] : d[3]
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
movq (%rsp), %r13
movq 8(%rsp), %r12
leaq 16(%rsp), %rsp
ret
.cfi_endproc
.size ECP256_Sub, .-ECP256_Sub
/**
* Function description: subtraction core part of the ECP256 field, a-b mod P; no writeback
* Input register:
* r8-r11:256-bit input data a
* rdx:Points to the input 256-bit data b.
* r14:P[1]
* r15:P[3]
* Change register: rdx, rcx, rax, r8, r9, r10, r11, r12, r13
* Output register: r8-r11
*/
.type ECP256_SubCore,@function
.align 32
ECP256_SubCore:
.cfi_startproc
xorq %r13, %r13
subq (%rdx), %r8 // Subtraction results.
sbbq 8(%rdx), %r9
movq %r8, %rax // Save Results.
sbbq 16(%rdx), %r10
sbbq 24(%rdx), %r11
movq %r9, %rcx
sbbq $0, %r13 // Borrowing saved in r13.
addq $-1, %r8 // a - b + P
movq %r10, %rdx
adcq %r14, %r9
adcq $0, %r10
movq %r11, %r12
adcq %r15, %r11
testq %r13, %r13
cmovzq %rax, %r8 // If r13 is equal to 0, a-b is used. Otherwise, a-b+P is used.
cmovzq %rcx, %r9
cmovzq %rdx, %r10
cmovzq %r12, %r11
ret
.cfi_endproc
.size ECP256_SubCore, .-ECP256_SubCore
/**
* Function description: negation of the ECP256 field. res = -a mod P
* Function prototype: void ECP256_Neg(Coord *r, const Coord *a);
* Input register:
* rdi: Pointer to the output Coord structure
* rsi: Address pointing to input data a
* Change register: rsi, rdx, rcx, rax, r8, r9, r10, r11, r12, r13
* Output register: None
* Function/Macro Call:
*/
.globl ECP256_Neg
.type ECP256_Neg,@function
.align 32
ECP256_Neg:
.cfi_startproc
pushq %r12
pushq %r13
xorq %r8, %r8 // -a = 0 - a
xorq %r9, %r9
xorq %r13, %r13
leaq .Lpoly(%rip), %rdx
xorq %r10, %r10
xorq %r11, %r11
subq (%rsi),%r8
sbbq 8(%rsi),%r9
movq %r8, %rax
sbbq 16(%rsi),%r10
sbbq 24(%rsi),%r11
movq %r9, %rcx
sbbq $0, %r13
addq $-1, %r8
movq %r10, %rsi
adcq 8(%rdx), %r9
adcq $0, %r10
movq %r11, %r12
adcq 24(%rdx), %r11
testq %r13, %r13 // Choost result
cmovzq %rax, %r8
cmovzq %rcx, %r9
movq %r8, (%rdi)
cmovzq %rsi, %r10
movq %r9, 8(%rdi)
cmovzq %r12, %r11
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
movq (%rsp), %r13
movq 8(%rsp), %r12
leaq 16(%rsp), %rsp
ret
.cfi_endproc
.size ECP256_Neg, .-ECP256_Neg
/**
* Function description: multiplication of the ECP256 field: res = a * b * 2^-256 mod P
* Function prototype: void ECP256_Mul(Coord *r, const Coord *a, const Coord *b);
* Input register:
* rdi: Pointer to the output Coord structure
* rsi: Address pointing to input data a
* rdx: Address pointing to input data b
* Change register: rax, rbx, rcx, rdx, rbp, r8, r9, r10, r11, r12, r13, r14, r15
* Output register: None
* Function/macro call: Multiplication can be implemented by calling ECP256_MulCore.
*/
.globl ECP256_Mul
.type ECP256_Mul,@function
.align 32
ECP256_Mul:
.cfi_startproc
pushq %rbx
pushq %rbp
pushq %r12
pushq %r13
pushq %r14
pushq %r15
movq %rdx, %rcx // rdx is for mul
movq .Lpoly+8(%rip), %r14
movq .Lpoly+24(%rip), %r15
call ECP256_MulCore_q
movq (%rsp), %r15
movq 8(%rsp), %r14
movq 16(%rsp), %r13
movq 24(%rsp), %r12
movq 32(%rsp), %rbp
movq 40(%rsp), %rbx
leaq 48(%rsp), %rsp
ret
.cfi_endproc
.size ECP256_Mul, .-ECP256_Mul
/**
* Function description: Montgomery multiplication of the ECP256 field
* Input register:
* rdi: Return address.
* rsi: Factor address.
* rcx: Factor address.
* Change register: rax,rbx,rcx,rdx,rbp,r8-r13
* Output register: None.
*/
.type ECP256_MulCore_q,@function
.align 32
ECP256_MulCore_q:
.cfi_startproc
movq (%rcx), %rax // b[0]
movq %rax, %rbp // save b[0]
mulq (%rsi) // a[0] * b[0]
movq %rax, %r10
movq %rbp, %rax // b[0]
movq %rdx, %r11
mulq 8(%rsi) // a[1] * b[0]
addq %rax, %r11
movq %rbp, %rax
adcq $0, %rdx // a[1:0] * b[0] < 2^192, no overflow
movq %rdx, %r12
mulq 16(%rsi) // a[2] * b[0]
addq %rax, %r12
movq %rbp, %rax
adcq $0, %rdx
movq %rdx, %r13
mulq 24(%rsi) // a[3] * b[0]
addq %rax, %r13
adcq $0, %rdx
movq %rdx, %r8 // result: r8 r13 r12 r11 r10
xorq %r9, %r9
movq %r10, %rax // first reduction
movq %r10, %rbp
shlq $32, %r10 // r10 * 2^96 low
mulq %r15 // r10 * 0xffffffff00000001
shrq $32, %rbp // r10 * 2^96 high
addq %r10, %r11
adcq %rbp, %r12
adcq %rax, %r13
adcq %rdx, %r8
movq 8(%rcx), %rax
adcq $0, %r9
xorq %r10, %r10
movq %rax, %rbp
mulq (%rsi)
addq %rax, %r11
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rbx
mulq 8(%rsi)
addq %rbx, %r12
adcq $0, %rdx
addq %rax, %r12
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rbx
mulq 16(%rsi)
addq %rbx, %r13
adcq $0, %rdx
addq %rax, %r13
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rbx
mulq 24(%rsi)
addq %rbx, %r8
adcq $0, %rdx
addq %rax, %r8
adcq %rdx, %r9
adcq $0, %r10
movq %r11, %rbp
movq %r11, %rax
shlq $32, %r11 // r11 * 2^96 low
mulq %r15 // r11 * 0xffffffff00000001
shrq $32, %rbp // r11 * 2^96 high
addq %r11, %r12
adcq %rbp, %r13
movq 16(%rcx), %rbp
adcq %rax, %r8
adcq %rdx, %r9
movq %rbp, %rax
adcq $0, %r10
xorq %r11, %r11
mulq (%rsi) // a[0] * b[2]
addq %rax, %r12
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rbx
mulq 8(%rsi)
addq %rbx, %r13
adcq $0, %rdx
addq %rax, %r13
movq %rbp, %rax
adcq $0, %rdx
movq %rdx, %rbx
mulq 16(%rsi)
addq %rbx, %r8
adcq $0, %rdx
addq %rax, %r8
movq %rbp, %rax
adcq $0, %rdx
movq %rdx, %rbx
mulq 24(%rsi)
addq %rbx, %r9
adcq $0, %rdx
addq %rax, %r9
adcq %rdx, %r10
movq %r12, %rbp
adcq $0, %r11
movq %r12, %rax // third reduction
shlq $32, %r12 // r12 * 2^96 low
mulq %r15 // r12 * 0xffffffff00000001
shrq $32, %rbp // r12 * 2^96 high
addq %r12, %r13
adcq %rbp, %r8
movq 24(%rcx), %rbp
adcq %rax, %r9
adcq %rdx, %r10
movq %rbp, %rax
adcq $0, %r11
xorq %r12, %r12
mulq (%rsi) // a[0] * b[3]
addq %rax, %r13
adcq $0, %rdx
movq %rdx, %rbx
movq %rbp, %rax
mulq 8(%rsi)
addq %rbx, %r8
adcq $0, %rdx
addq %rax, %r8
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rbx
mulq 16(%rsi)
addq %rbx, %r9
adcq $0, %rdx
addq %rax, %r9
movq %rbp, %rax
adcq $0, %rdx
movq %rdx, %rbx
mulq 24(%rsi)
addq %rbx, %r10
adcq $0, %rdx
addq %rax, %r10
adcq %rdx, %r11
adcq $0, %r12
movq %r13, %rbp
movq %r13, %rax // last reduction
shlq $32, %r13 // r13 * 2^96 low
mulq %r15 // r13 * 0xffffffff00000001
shrq $32, %rbp // r13 * 2^96 high
addq %r13, %r8
adcq %rbp, %r9
adcq %rax, %r10
adcq %rdx, %r11
movq %r8, %rbx
movq %r9, %rbp
adcq $0, %r12
movq %r10, %rax
movq %r11, %rdx
subq $-1, %r8
sbbq %r14, %r9
sbbq $0, %r10
sbbq %r15, %r11
sbbq $0, %r12
cmovcq %rbx, %r8
cmovcq %rbp, %r9
cmovcq %rax, %r10
movq %r8, (%rdi)
movq %r9, 8(%rdi)
cmovcq %rdx, %r11
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
ret
.cfi_endproc
.size ECP256_MulCore_q, .-ECP256_MulCore_q
/**
* Function description: ECP256 Montgomery form
* Function prototype: void ECP256_ToMont(Coord *r, const Coord *a);
* Input register:
* rdi: pointer to the output Coord structure
* rsi: address pointing to input data a
* Change register: rax,rbx,rcx,rdx,rbp,r8-r13
* Output register: None
* Function/Macro invoking: This function can be implemented by calling ECP256_Mul.
*/
.globl ECP256_ToMont
.type ECP256_ToMont,@function
.align 32
ECP256_ToMont:
.cfi_startproc
leaq .LrrModP(%rip),%rcx
pushq %rbx
pushq %rbp
pushq %r12
pushq %r13
pushq %r14
pushq %r15
movq .Lpoly+8(%rip), %r14
movq .Lpoly+24(%rip), %r15
call ECP256_MulCore_q
movq (%rsp), %r15
movq 8(%rsp), %r14
movq 16(%rsp), %r13
movq 24(%rsp), %r12
movq 32(%rsp), %rbp
movq 40(%rsp), %rbx
leaq 48(%rsp), %rsp
ret
.cfi_endproc
.size ECP256_ToMont, .-ECP256_ToMont
/**
* Function description: ECP256 Montgomery form converted to normal form
* Function prototype: void ECP256_FromMont(Coord *r, const Coord *a);
* Input register:
* rdi: Pointer to the output Coord structure.
* rsi: Address pointing to input data a.
* Change register: rax,rcx,rdx,r8-r13
* Output register: None.
* Function/Macro Call:
*/
.globl ECP256_FromMont
.type ECP256_FromMont,@function
.align 32
ECP256_FromMont:
.cfi_startproc
pushq %r12
pushq %r13
movq .Lpoly+8(%rip), %r12
movq .Lpoly+24(%rip), %r13
movq (%rsi), %r8
movq 8(%rsi), %r9
movq 16(%rsi), %r10
movq 24(%rsi), %r11
movq %r8, %rax
movq %r8, %rcx
shlq $32, %r8
mulq %r13 // 0xff * 0xff = 0xfe01
shrq $32, %rcx
addq %r8, %r9
adcq %rcx, %r10
movq %r9, %rcx
adcq %rax, %r11
adcq $0, %rdx // rdx + 1 <= 0xff
movq %r9, %rax
movq %rdx, %r8
shlq $32, %r9
mulq %r13
shrq $32, %rcx
addq %r9, %r10
adcq %rcx, %r11
movq %r10, %rcx
adcq %rax, %r8
adcq $0, %rdx
movq %r10, %rax
movq %rdx, %r9
shlq $32, %r10
mulq %r13
shrq $32, %rcx
addq %r10, %r11
adcq %rcx, %r8
movq %r11, %rcx
adcq %rax, %r9
adcq $0, %rdx
movq %r11, %rax
movq %rdx, %r10
shlq $32, %r11
mulq %r13
shrq $32, %rcx
addq %r11, %r8
adcq %rcx, %r9
movq %r8, %rsi
adcq %rax, %r10
adcq $0, %rdx
movq %rdx, %r11 // r8 r9 r10 r11
movq %r9, %rdx
subq $-1, %r8
movq %r10, %rcx
sbbq %r12, %r9
movq %r11, %rax
sbbq $0, %r10
sbbq %r13, %r11
cmovcq %rsi, %r8 // < P
cmovcq %rdx, %r9
movq %r8, (%rdi)
cmovcq %rcx, %r10
movq %r9, 8(%rdi)
cmovcq %rax, %r11
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
movq (%rsp), %r13
movq 8(%rsp), %r12
leaq 16(%rsp), %rsp
ret
.cfi_endproc
.size ECP256_FromMont, .-ECP256_FromMont
/**
* Function description: Multiplication of the ECP256 field:res = a*b*2^-256 mod P
* Function prototype: void ECP256_Sqr(Coord *r, const Coord *a);
* Input register:
* rdi: pointer to the output Coord structure
* rsi: address pointing to input data a
* Change register: rax, rbx, rcx, rdx, rsi, rdi, rbp, r8, r9, r10, r11, r12, r13, r14, r15
* Output register: None
* Function/Macro Call: Multiplication can be implemented by calling ECP256_SqrCore_q.
*/
.globl ECP256_Sqr
.type ECP256_Sqr,@function
.align 32
ECP256_Sqr:
.cfi_startproc
pushq %rbx
pushq %rbp
pushq %r12
pushq %r13
pushq %r14
pushq %r15
nop // add this instruction to improve performance, movq %rsi, %rdx is ok
movq (%rsi), %rax // a[0]
movq 8(%rsi), %r14 // a[1]
movq 16(%rsi), %rbp // a[2]
movq 24(%rsi), %r15 // a[3]
call ECP256_SqrCore_q
movq (%rsp), %r15
movq 8(%rsp), %r14
movq 16(%rsp), %r13
movq 24(%rsp), %r12
movq 32(%rsp), %rbp
movq 40(%rsp), %rbx
leaq 48(%rsp), %rsp
ret
.cfi_endproc
.size ECP256_Sqr, .-ECP256_Sqr
/**
* Function description: Montgomery square of the ECP256 field
* Input register:
* rdi: Return address
* rsi: Factor address
* Change register: rax, rbx, rcx, rdx, rbp, rsi, r8-r15
* Output register: None
*/
.type ECP256_SqrCore_q,@function
.align 32
ECP256_SqrCore_q:
.cfi_startproc
movq %rax, %r8
mulq %r14 // rdx:rax = a[0] * a[1]
xorq %rcx, %rcx
movq %rax, %r9 // r9 = rax
xorq %r11, %r11
xorq %r12, %r12
movq %r8, %rax
xorq %r13, %r13
xorq %rbx, %rbx
movq %rdx, %r10 // r10:r9 = a[0] * a[1]
mulq %rbp // rdx:rax = a[0] * a[2]
addq %rax, %r10 // r10 += rax
movq %r8, %rax // a[0] --> rax
adcq %rdx, %r11 // a[0] * (a[2] * 2^64 + a[1]) < 2^196, no overflow
mulq %r15 // rdx:rax = a[0] * a[3]
addq %rax, %r11 // r11 += rax
movq %r14, %rax // a[0] --> rax
adcq %rdx, %r12 // a[0] * (a[3] * 2^128 + a[2] * 2^64 + a[1]) < 2^256, no overflow
mulq %rbp // rdx:rax = a[1] * a[2]
addq %rax, %r11
movq %r14, %rax
adcq %rdx, %r12
adcq $0, %r13
mulq %r15 // rdx:rax = a[1] * a[3]
addq %rax, %r12
movq %rbp, %rax
adcq %rdx, %r13
adcq $0, %rbx
mulq %r15 // rdx:rax = a[2] * a[3]
addq %rax, %r13
adcq %rdx, %rbx // rbx not overflow
movq %r8, %rax
addq %r9, %r9 // twice
adcq %r10, %r10
adcq %r11, %r11
adcq %r12, %r12
adcq %r13, %r13
adcq %rbx, %rbx
adcq $0, %rcx
mulq %rax // rdx:rax = a[0] * a[0]
movq %rax, %r8
movq %r14, %rax
movq %rdx, %rsi
mulq %rax // rdx:rax = a[1] * a[1]
addq %rsi, %r9
adcq %rax, %r10
movq %rbp, %rax
adcq $0, %rdx
movq %rdx, %rsi
mulq %rax // rdx:rax = a[2] * a[2]
addq %rsi, %r11
adcq %rax, %r12
movq %r15, %rax
adcq $0, %rdx
movq %rdx, %rsi
mulq %rax // rdx:rax = a[3] * a[3]
addq %rsi, %r13
adcq %rax, %rbx
movq %r8, %rax
adcq %rdx, %rcx // rcx not overflow
movq .Lpoly+8(%rip), %r14
movq .Lpoly+24(%rip), %r15
movq %r8, %rbp // First reduction
shlq $32, %r8 // l32[r8 << 96]
mulq %r15
shrq $32, %rbp // h32[r8 << 96]
addq %r8, %r9
adcq %rbp, %r10
adcq %rax, %r11
adcq $0, %rdx
movq %r9, %rax
movq %r9, %rbp
movq %rdx, %r8 // r8 r11 r10 r9 0
shlq $32, %r9 // Second reduction
mulq %r15
shrq $32, %rbp
addq %r9, %r10
adcq %rbp, %r11
adcq %rax, %r8
adcq $0, %rdx
movq %r10, %rax
movq %r10, %rbp
movq %rdx, %r9 // r9 r8 r11 r10 0
shlq $32, %r10 // Third reduction
mulq %r15
shrq $32, %rbp
addq %r10, %r11
adcq %rbp, %r8
adcq %rax, %r9
adcq $0, %rdx
movq %r11, %rax
movq %r11, %rbp
movq %rdx, %r10 // r10 r9 r8 r11 0
shlq $32, %r11 // Last reduction
mulq %r15
shrq $32, %rbp
addq %r11, %r8
adcq %rbp, %r9
adcq %rax, %r10
adcq $0, %rdx // rdx r10 r9 r8 0
xorq %rsi, %rsi // Add the reduction result
addq %r8, %r12
adcq %r9, %r13
movq %r12, %r8
adcq %r10, %rbx
adcq %rdx, %rcx
movq %r13, %r9
adcq $0, %rsi // Reserve carry value
subq $-1, %r8
movq %rbx, %r10
sbbq %r14, %r9
sbbq $0, %r10
movq %rcx, %r11
sbbq %r15, %r11
sbbq $0, %rsi
cmovcq %r12, %r8
cmovcq %r13, %r9
movq %r8, (%rdi)
cmovcq %rbx, %r10
movq %r9, 8(%rdi)
cmovcq %rcx, %r11
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
ret
.cfi_endproc
.size ECP256_SqrCore_q, .-ECP256_SqrCore_q
/**
* Function description: Multiplication of the ECP256 field: res = a*b*2^-256 mod Order(P)
* Function prototype: void ECP256_OrdSqr(Coord *r, const Coord *a, int32_t repeat);
* Input register:
* rdi: Pointer to the output Coord structure
* rsi: Address pointing to input data a
* rdx:Repeat
* Change register: rax, rbx, rcx, rdx, rsi, rbp, r8, r9, r10, r11, r12, r13, r14, r15
* Output register: None
* Function/Macro Call:
*/
.globl ECP256_OrdSqr
.type ECP256_OrdSqr,@function
.align 32
ECP256_OrdSqr:
.cfi_startproc
pushq %rbx
pushq %rbp
pushq %r12
pushq %r13
pushq %r14
pushq %r15
movq (%rsi), %r8
movq 8(%rsi), %rax
movq 16(%rsi), %r14
movq 24(%rsi), %r15
leaq .Lord(%rip), %rbp // ptr(N) --> rbp
movq %rdx, %rbx
.align 32
.Lord_sqr_loop:
movq %rax, %rsi
mulq %r8 // rdx:rax = acc[0] * acc[1]
movq %rax, %r9 // r9 = rax
vmovq %rsi, %xmm1 // save acc[1] -> xmm1
movq %r14, %rax // acc[2] --> rax
movq %rdx, %r10 // r10:r9 = acc[0] * acc[1]
mulq %r8 // rdx:rax = acc[0] * acc[2]
addq %rax, %r10 // r10 += rax
vmovq %r14, %xmm2 // save acc[2] -> xmm2
adcq $0, %rdx // acc[0] * (acc[2] * 2^64 + acc[1]) < 2^196, no overflow
movq %r15, %rax // acc[3] --> rax
movq %rdx, %r11
mulq %r8 // rdx:rax = a[0] * a[3]
addq %rax, %r11 // r11 += rax
vmovq %r15, %xmm3 // Save acc[3] -> xmm3
adcq $0, %rdx // acc[0] * (acc[3] * 2^128 + acc[2] * 2^64 + acc[1]) < 2^256, no overflow
movq %r15, %rax // acc[1] --> rax
movq %rdx, %r12
mulq %r14
movq %rax, %r13
movq %r14, %rax
movq %rdx, %r14
mulq %rsi
addq %rax, %r11
movq %r15, %rax
adcq $0, %rdx
movq %rdx, %r15
mulq %rsi
addq %rax, %r12
adcq $0, %rdx
addq %r15, %r12
adcq %rdx, %r13
movq %r8, %rax // acc[0] --> rax
adcq $0, %r14 // r14 r13 r12 r11 r10 r9
xorq %r15, %r15 // 0 --> r15
addq %r9, %r9 // twice
adcq %r10, %r10
adcq %r11, %r11
adcq %r12, %r12
adcq %r13, %r13
adcq %r14, %r14
adcq $0, %r15 // result: r15 r14 r13 r12 r11 r10 r9
mulq %rax // rdx:rax = acc[0] * acc[0]
movq %rax, %r8 // rax --> r8
vmovq %xmm1, %rax // acc[1] --> rax
movq %rdx, %rcx // save rdx to rcx
mulq %rax // rdx:rax = acc[1] * acc[1]
addq %rcx, %r9 // r9 += rcx
adcq %rax, %r10 // r10 += rax
adcq $0, %rdx // no overflow
vmovq %xmm2, %rax // acc[2] --> rax
movq %rdx, %rcx // save rdx to rcx
mulq %rax // rdx:rax = a[2] * a[2]
addq %rcx, %r11 // r11 += rcx
adcq %rax, %r12 // r12 += rax
movq %r8, %rsi // acc[0] --> rsi
adcq $0, %rdx // no overflow
vmovq %xmm3, %rax // acc[3] --> rax
movq %rdx, %rcx // save rcx to rdx
imulq 32(%rbp), %r8 // m = acc[0] * LordK (mod 2^64) --> r8
mulq %rax // rdx:rax = a[3] * a[3]
addq %rcx, %r13 // r13 += rcx
adcq %rax, %r14 // r14 += r
movq (%rbp), %rax // N[0] --> rax
adcq %rdx, %r15 // r15 not overflow
/* Result acc[8:0] = r15 r14 r13 r12 r11 r10 r9 r8; */
/* The first reduction */
mulq %r8 // rdx:rax = m * N[0]
addq %rax, %rsi // rsi = 0
movq %r8, %rcx // m --> rcx
adcq %rdx, %rsi // rsi = rdx + carry --> acc[1]
subq %r8, %r10 // acc[2] - m
sbbq $0, %rcx // m - borrwo, to acc[3]
movq 8(%rbp), %rax // N[1] --> rax
mulq %r8 // rdx:rax = m * N[1]
addq %rsi, %r9 // acc[1] += high[m * N[0]]
adcq $0, %rdx // save carry
addq %rax, %r9 // acc[1] += low[m * N[1]]
movq %r8, %rax // m --> rax
adcq %rdx, %r10 // acc[2] += high[m * N[1]]
movq %r9, %rsi // acc[1] --> rsi
movq %r8, %rdx // m --> rdx
adcq $0, %rcx // m - borrwoto acc[3]
imulq 32(%rbp), %r9 // m = acc[1] * LordK --> r9
shlq $32, %rax // low(m) --> rax low(m * 2^228)
shrq $32, %rdx // high(m) --> rdx high(m * 2^228)
subq %rax, %r11 // acc[3] - low(m * 2^228)
movq (%rbp), %rax // N[0] --> rax
sbbq %rdx, %r8 // m - high(m * 2^228) to acc[4]
addq %rcx, %r11 // acc[3] += m + carry - borrow
adcq $0, %r8 // to acc[4]
/* Second reduction */
mulq %r9 // rdx:rax = m * N[0]
addq %rax, %rsi // acc[1] += rax --> 0
movq %r9, %rcx // m --> rcx
adcq %rdx, %rsi // rsi = high[m * N[0]] + carry --> acc[2]
movq 8(%rbp), %rax // N[1] --> rax
subq %r9, %r11 // acc[3] -= m
sbbq $0, %rcx // m - borrow --> rcx
mulq %r9 // rdx:rax = m * N[1]
addq %rsi, %r10 // acc[2] += high[m * N[1]] + carry
adcq $0, %rdx // rdx += carry, no overflow
addq %rax, %r10 // acc[2] += rax
movq %r9, %rax // m --> rax
adcq %rdx, %r11 // acc[3] += rdx
movq %r10, %rsi // acc[2] --> rsi
movq %r9, %rdx // m --> rdx
adcq $0, %rcx // m - borrow + carry --> rcx
imulq 32(%rbp), %r10 // m = acc[2] * LordK --> r10
shlq $32, %rax // low(m * 2^228)
shrq $32, %rdx // high(m * 2^228)
subq %rax, %r8 // t0 acc[4] - low(m * 2^228)
movq (%rbp), %rax // N[0] --> rax
sbbq %rdx, %r9 // m - high(m * 2^228) to acc[5]
addq %rcx, %r8 // to acc[4]
adcq $0, %r9 // to acc[5]
/* Third reduction */
mulq %r10 // rdx:rax = m * N[0]
movq %r10, %rcx // m --> rcx
addq %rax, %rsi // acc[2] += rax --> 0
adcq %rdx, %rsi // rsi = high[m * N[0]] + carry --> acc[3]
movq 8(%rbp), %rax // N[1] --> rax
subq %r10, %r8 // to acc[4] -= m
sbbq $0, %rcx // m - borrow --> rcx
mulq %r10 // rdx:rax = m * N[1]
addq %rsi, %r11 // acc[3] += high[m * N[1]] + carry
adcq $0, %rdx // rdx += carry, no overflow
addq %rax, %r11 // acc[3] += rax
movq %r10, %rax // m --> rax
adcq %rdx, %r8 // to acc[4] += rdx
movq %r11, %rsi // acc[3] --> rsi
movq %r10, %rdx // m --> rdx
adcq $0, %rcx // m - borrow + carry --> rcx
imulq 32(%rbp), %r11 // m = acc[3] * LordK --> r11
shlq $32, %rax // low(m * 2^228)
shrq $32, %rdx // high(m * 2^228)
subq %rax, %r9 // to acc[5]: - low(m * 2^228)
sbbq %rdx, %r10 // to acc[6]: m - high(m * 2^228)
movq (%rbp), %rax // N[0] --> rax
addq %rcx, %r9 // to acc[5]
adcq $0, %r10 // to acc[6]
/* Last reduction */
mulq %r11 // rdx:rax = m * N[0]
addq %rax, %rsi // acc[3] += rax --> 0
movq %r11, %rcx // m --> rcx
adcq %rdx, %rsi // rsi = high[m * N[0]] + carry --> acc[4]
movq 8(%rbp), %rax // N[1] --> rax
subq %r11, %r9 // to acc[5] : -= m
sbbq $0, %rcx // to acc[6] : m - borrow
mulq %r11 // rdx:rax = m * N[1]
addq %rsi, %r8 // to acc[4]: += high[m * N[1]] + carry
adcq $0, %rdx // rdx += carry, no overflow
addq %rax, %r8 // to acc[4]: += rax
movq %r11, %rax // m --> rax
adcq %rdx, %r9 // to acc[5]: += rdx
movq %r11, %rdx // m --> rdx
adcq $0, %rcx // m - borrow + carry --> rcx
shlq $32, %rax // low(m * 2^228)
shrq $32, %rdx // high(m * 2^228)
subq %rax, %r10 // to acc[6]: - low(m * 2^228)
sbbq %rdx, %r11 // to acc[7]: m - high(m * 2^228)
addq %rcx, %r10 // to acc[6]
adcq $0, %r11 // to acc[7]
/* r15 r14 r13 r12 + r11 r10 r9 r8 */
xorq %rdx, %rdx
addq %r12, %r8
adcq %r13, %r9
movq %r8, %r12
adcq %r14, %r10
adcq %r15, %r11
movq %r9, %rax
adcq $0, %rdx
subq (%rbp), %r8
movq %r10, %r14
sbbq 8(%rbp), %r9
sbbq 16(%rbp), %r10
movq %r11, %r15
sbbq 24(%rbp), %r11
sbbq $0, %rdx
cmovcq %r12, %r8
cmovncq %r9, %rax
cmovncq %r10, %r14
cmovncq %r11, %r15 // r8 rax r14 r15
decq %rbx
jnz .Lord_sqr_loop
movq %r8, (%rdi)
movq %rax, 8(%rdi)
vpxor %xmm2, %xmm2, %xmm2
movq %r14, 16(%rdi)
vpxor %xmm3, %xmm3, %xmm3
movq %r15, 24(%rdi)
vpxor %xmm1, %xmm1, %xmm1
movq (%rsp), %r15
movq 8(%rsp), %r14
movq 16(%rsp), %r13
movq 24(%rsp), %r12
movq 32(%rsp), %rbp
movq 40(%rsp), %rbx
leaq 48(%rsp), %rsp
ret
.cfi_endproc
.size ECP256_OrdSqr, .-ECP256_OrdSqr
/**
* Function description: half calculation of the ECP256 field: res = a/2 mod P
* Input register:
* rdi: Pointer to the output Coord structure
* r8: a[0]
* r9: a[1]
* r10:a[2]
* r11:a[3]
* r14:P[1]
* r15:P[3]
* Change register: rax, rcx, rdx, rsi, r8, r9, r10, r11, r12, r13
* Output register: r8, r9, r10, r11
*/
.type ECP256_DivBy2Core,@function
ECP256_DivBy2Core:
.cfi_startproc
xorq %r13, %r13
movq %r8, %rax
movq %r9, %rcx
addq $-1, %r8
movq %r10, %rdx
adcq %r14, %r9
movq %r11, %r12
adcq $0, %r10
adcq %r15, %r11
adcq $0, %r13
xorq %rsi, %rsi
testq $1, %rax
cmovzq %rax, %r8
cmovzq %rcx, %r9
cmovzq %rdx, %r10
cmovzq %r12, %r11
movq %r9, %rcx
cmovzq %rsi, %r13
movq %r10, %rdx
movq %r11, %r12
shrq $1, %r8
shlq $63, %rcx
shrq $1, %r9
shlq $63, %rdx
shrq $1, %r10
orq %rcx, %r8
shlq $63, %r12
shrq $1, %r11
shlq $63, %r13
orq %rdx, %r9
orq %r12, %r10
orq %r13, %r11
movq %r8, (%rdi)
movq %r9, 8(%rdi)
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
ret
.cfi_endproc
.size ECP256_DivBy2Core, .-ECP256_DivBy2Core
/**
* Function description: Half calculation of the ECP256 field: res = a/2 mod P
* Function prototype: void ECP256_DivBy2(Coord *r, const Coord *a);
* Input register:
* rdi: Pointer to the output Coord structure
* rsi: Address pointing to input data a
* Change register: rax, rcx, rdx, rsi, r8, r9, r10, r11, r12, r13, r14, r15
* Output register: None
* Function/macro call: Call ECP256_DivBy2Core to implement half calculation.
*/
.globl ECP256_DivBy2
.type ECP256_DivBy2, @function
ECP256_DivBy2:
.cfi_startproc
pushq %r12
pushq %r13
pushq %r14
pushq %r15
movq (%rsi), %r8
movq 8(%rsi), %r9
movq 16(%rsi), %r10
movq 24(%rsi), %r11
movq 8+.Lpoly(%rip), %r14
movq 24+.Lpoly(%rip), %r15
call ECP256_DivBy2Core
movq (%rsp), %r15
movq 8(%rsp), %r14
movq 16(%rsp), %r13
movq 24(%rsp), %r12
leaq 32(%rsp), %rsp
ret
.cfi_endproc
.size ECP256_DivBy2, .-ECP256_DivBy2
/* r14 = .Lpoly[1], r15 = .Lpoly[3] */
.type ECP256_MulBy2Core,@function
.align 32
ECP256_MulBy2Core:
.cfi_startproc
xorq %r13, %r13
addq %r8, %r8
adcq %r9, %r9
movq %r8, %rax
adcq %r10, %r10
adcq %r11, %r11
movq %r9, %rcx
adcq $0, %r13
subq $-1, %r8
movq %r10, %rdx
sbbq %r14, %r9
movq %r11, %r12
sbbq $0, %r10
sbbq %r15, %r11
sbbq $0, %r13
cmovcq %rax, %r8 // Obtain mod P result
cmovcq %rcx, %r9
movq %r8, (%rdi)
cmovcq %rdx, %r10
movq %r9, 8(%rdi)
cmovcq %r12, %r11
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
ret
.cfi_endproc
.size ECP256_MulBy2Core, .-ECP256_MulBy2Core
.globl ECP256_MulBy2
.type ECP256_MulBy2,@function
.align 32
ECP256_MulBy2:
.cfi_startproc
pushq %r12
pushq %r13
movq (%rsi), %r8
movq 8(%rsi), %r9
movq 16(%rsi), %r10
movq 24(%rsi), %r11
xorq %r13, %r13
leaq .Lpoly(%rip), %rsi
addq %r8, %r8
adcq %r9, %r9
movq %r8, %rax
adcq %r10, %r10
adcq %r11, %r11
movq %r9, %rcx
adcq $0, %r13
subq $-1, %r8
movq %r10, %rdx
sbbq 8(%rsi), %r9
movq %r11, %r12
sbbq $0, %r10
sbbq 24(%rsi), %r11
sbbq $0, %r13
cmovcq %rax, %r8 // Obtain mod P result
cmovcq %rcx, %r9
movq %r8, (%rdi)
cmovcq %rdx, %r10
movq %r9, 8(%rdi)
cmovcq %r12, %r11
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
movq 0(%rsp), %r13
movq 8(%rsp), %r12
leaq 16(%rsp), %rsp
ret
.cfi_endproc
.size ECP256_MulBy2, .-ECP256_MulBy2
/* r14 = .Lpoly[1], r15 = .Lpoly[3] */
.type ECP256_MulBy3Core,@function
.align 32
ECP256_MulBy3Core:
.cfi_startproc
xorq %r13, %r13
addq %r8, %r8
adcq %r9, %r9
movq %r8, %rax
adcq %r10, %r10
adcq %r11, %r11
movq %r9, %rcx
adcq $0, %r13
subq $-1, %r8
movq %r10, %rdx
sbbq %r14, %r9
movq %r11, %r12
sbbq $0, %r10
sbbq %r15, %r11
sbbq $0, %r13
cmovcq %rax, %r8 // Obtain mod P result
cmovcq %rcx, %r9
cmovcq %rdx, %r10
cmovcq %r12, %r11
xorq %r13, %r13
addq (%rsi), %r8
adcq 8(%rsi), %r9
movq %r8, %rax
adcq 16(%rsi), %r10
adcq 24(%rsi), %r11
movq %r9, %rcx
adcq $0, %r13
subq $-1, %r8
movq %r10, %rdx
sbbq %r14, %r9
sbbq $0, %r10
movq %r11, %r12
sbbq %r15, %r11
sbbq $0, %r13
cmovcq %rax, %r8 // Obtain mod P result
cmovcq %rcx, %r9
movq %r8, (%rdi)
cmovcq %rdx, %r10
movq %r9, 8(%rdi)
cmovcq %r12, %r11
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
ret
.cfi_endproc
.size ECP256_MulBy3Core, .-ECP256_MulBy3Core
.globl ECP256_MulBy3
.type ECP256_MulBy3,@function
.align 32
ECP256_MulBy3:
.cfi_startproc
pushq %r12
pushq %r13
pushq %r14
pushq %r15
movq (%rsi), %r8
movq 8(%rsi), %r9
movq 16(%rsi), %r10
movq 24(%rsi), %r11
movq 8+.Lpoly(%rip), %r14
movq 24+.Lpoly(%rip), %r15
call ECP256_MulBy3Core
movq (%rsp), %r15
movq 8(%rsp), %r14
movq 16(%rsp), %r13
movq 24(%rsp), %r12
leaq 32(%rsp), %rsp
ret
.cfi_endproc
.size ECP256_MulBy3, .-ECP256_MulBy3
/**
* Function description: This function is used to calculate the Montgomery multiplication of the ord(P256) field:
* res = a * b * 2^(-256) mod ord(P)
* Input register:
* rdi: Pointer to the output Coord structure
* rsi: Address pointing to input data a
* rdx: Address pointing to input data b
* Change register: rax, rbx, rcx, rdx, rbp, r8, r9, r10, r11, r12, r13, r14, r15
* Function/Macro invoking: The calculation can be implemented by calling ECP256_OrdMulCore.
*/
.globl ECP256_OrdMul
.type ECP256_OrdMul,@function
.align 32
ECP256_OrdMul:
.cfi_startproc
pushq %rbx
pushq %rbp
pushq %r12
pushq %r13
pushq %r14
pushq %r15
movq %rdx, %rcx // rdx used to output the mul multiplication result.
// The rcx saves the b address.
leaq .Lord(%rip), %r15
movq .LordK(%rip), %r14
movq (%rdx), %rax // b[0]
//a[0-3] * b[0]
movq %rax, %rbp // save b[0]
mulq (%rsi) // a[0] * b[0]
movq %rax, %r8
movq %rbp, %rax // b[0]
movq %rdx, %r9
mulq 8(%rsi) // a[1] * b[0]
addq %rax, %r9
movq %rbp, %rax
adcq $0, %rdx // a[1:0] * b[0] The result must be less than 2 ^ 192,
// So no carry is required.
movq %rdx, %r10
mulq 16(%rsi) // a[2] * b[0]
addq %rax, %r10
movq %rbp, %rax
adcq $0, %rdx
movq %rdx, %r11
mulq 24(%rsi) // a[3] * b[0]
addq %rax, %r11
adcq $0, %rdx
movq %r8, %r13
movq %rdx, %r12 // First round multiplication results r12 r11 r10 r9 r8
// First round of reduction
// n[0] = 0xf3b9cac2fc632551
// n[1] = 0xbce6faada7179e84
// n[2] = 0xffffffffffffffff, lo(q*n[2]) = -q , hi(q*n[2]) = q
// n[3] = 0xffffffff00000000, lo(q*n[3]) = -lq<<32, hi(q*n[3]) = q-hq
imulq %r14, %r8 // r8 = r8 * ordK = q
movq %r8, %rax
mulq (%r15) // n[0] * q
addq %rax, %r13 // %r13 must be 0.
adcq $0, %rdx // hi(n[0]*q) + 1 < 2^32 + 1 < 2^64 No further carry is required.
movq %r8, %rax
movq %rdx, %rbp // %rbp = hi(n[0]*q)
mulq 8(%r15) // n[1] * q
addq %rbp, %rax // %rax = lo(n[1]*q)+hi(n[0]*q)
adcq $0, %rdx // %rdx = hi(n[1]*q), be the same as the above hi(n[1]*q) + 1 < 2^64
// No further carry is required.
movq %r8, %rbx
subq %r8, %r10 // r10 = r[2] - q
sbbq $0, %rbx // When q>0, rbx - 1 = q - 1 >= 0, when q=0 (r[2]-q) does not borrow,
// rbx = rbx - 0 >= 0, so the following formula does not borrow
addq %rax, %r9 // r9 = r[1] + lo(n[1]*q) + hi(n[0]*q)
adcq %rdx, %r10 // r10 = r[2] - q + hi(n[1]*q)
movq %r8, %rax
adcq $0, %rbx // Overflowing is not possible.
movq %r8, %rdx
shrq $32, %rax // rax = hq
shlq $32, %rdx // rdx = lq<<32
subq %rdx, %rbx // q - lq<<32
sbbq %rax, %r8 // r8 = q - hq = hq * 2^32 + lq - hq >= lq,
// When lq!=0, The following formula does not borrow.
// When lq==0, the upper formula does not borrow.
adcq %rbx, %r11
movq 8(%rcx), %rax
adcq %r8, %r12
movq %rax, %rbp
adcq $0, %r13
// a[0-3] * b[1]
mulq (%rsi)
addq %rax, %r9
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rbx
mulq 8(%rsi)
addq %rbx, %r10
adcq $0, %rdx
addq %rax, %r10
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rbx
mulq 16(%rsi)
addq %rbx, %r11
adcq $0, %rdx
addq %rax, %r11
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rbx
xorq %r8, %r8 // r8 = 0
mulq 24(%rsi)
addq %rbx, %r12
adcq $0, %rdx
addq %rax, %r12
adcq %rdx, %r13
movq %r9, %rbx
adcq $0, %r8 // Second round of multiplication results r9,r10,r11,r12,r13,r8
// Second round of reduction
imulq %r14, %r9 // r9 = r9 * ordK = q
movq %r9, %rax
mulq (%r15) // n[0] * q
addq %rax, %rbx // %rbx must be 0
adcq $0, %rdx // hi(n[0]*q) + 1 < 2^32 + 1 < 2^64 No further carry is required
movq %r9, %rax
movq %rdx, %rbp // %rbp = hi(n[0]*q)
mulq 8(%r15) // n[1] * q
addq %rbp, %rax // %rax = lo(n[1]*q)+hi(n[0]*q)
adcq $0, %rdx // %rdx = hi(n[1]*q), be the same as the above hi(n[1]*q) + 1 < 2^64
// No further carry is required
movq %r9, %rbx
subq %r9, %r11 // r11 = r[2] - q
sbbq $0, %rbx // when q>0 rbx - 1 = q - 1 >= 0,
// When q=0 (r[2]-q) does not borrow, rbx = rbx - 0 >= 0,
// So the following equation does not borrow
addq %rax, %r10 // r10 = r[1] + lo(n[1]*q) + hi(n[0]*q)
adcq %rdx, %r11 // r11 = r[2] - q + hi(n[1]*q)
movq %r9, %rax
adcq $0, %rbx // Overflowing is not possible.
movq %r9, %rdx
shrq $32, %rax // rax = hq
shlq $32, %rdx // rdx = lq<<32
subq %rdx, %rbx // q - lq<<32
sbbq %rax, %r9 // r9 = q - hq = hq * 2^32 + lq - hq >= lq,
// When lq!=0, The following formula does not borrow.
// When lq==0, the preceding formula does not borrow.
movq 16(%rcx), %rax
adcq %rbx, %r12
adcq %r9, %r13
adcq $0, %r8
// a[0-3] * b[2]
movq %rax, %rbp
mulq (%rsi) // a[0] * b[2]
addq %rax, %r10
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rbx
mulq 8(%rsi)
addq %rbx, %r11
adcq $0, %rdx
addq %rax, %r11
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rbx
mulq 16(%rsi)
addq %rbx, %r12
adcq $0, %rdx
addq %rax, %r12
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rbx
xorq %r9, %r9
mulq 24(%rsi)
addq %rbx, %r13
adcq $0, %rdx
addq %rax, %r13
adcq %rdx, %r8
movq %r10, %rbx
adcq $0, %r9
// Third round reduction
imulq %r14, %r10 // r10 = r10 * ordK = q
movq %r10, %rax
mulq (%r15) // n[0] * q
addq %rax, %rbx // %rbx must be 0
adcq $0, %rdx // hi(n[0]*q) + 1 < 2^32 + 1 < 2^64 no further carry is required.
movq %r10, %rax
movq %rdx, %rbp // %rbp = hi(n[0]*q)
mulq 8(%r15) // n[1] * q
addq %rbp, %rax // %rax = lo(n[1]*q)+hi(n[0]*q)
adcq $0, %rdx // %rdx = hi(n[1]*q), same as above hi(n[1]*q) + 1 < 2^64 no further carry is required.
movq %r10, %rbx
subq %r10, %r12 // r12 = r[2] - q
sbbq $0, %rbx // if q>0, rbx - 1 = q - 1 >= 0.
// if q=0, (r[2]-q) Won't borrow , rbx = rbx - 0 >= 0,
// the following formula will not borrow.
addq %rax, %r11 // r11 = r[1] + lo(n[1]*q) + hi(n[0]*q)
adcq %rdx, %r12 // r12 = r[2] - q + hi(n[1]*q)
movq %r10, %rax
adcq $0, %rbx // Overflowing is not possible.
movq %r10, %rdx
shrq $32, %rax // rax = hq
shlq $32, %rdx // rdx = lq<<32
subq %rdx, %rbx // q - lq<<32
sbbq %rax, %r10 // r10 = q - hq = hq * 2^32 + lq - hq >= lq,
// if lq!=0, the following formula does not borrow,
// if lq==0, The above formula does not borrow.
movq 24(%rcx), %rax
adcq %rbx, %r13
adcq %r10, %r8
adcq $0, %r9
// a[0-3] * b[3]
movq %rax, %rbp
mulq (%rsi) // a[0] * b[3]
addq %rax, %r11
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rbx
mulq 8(%rsi)
addq %rbx, %r12
adcq $0, %rdx
addq %rax, %r12
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rbx
mulq 16(%rsi)
addq %rbx, %r13
adcq $0, %rdx
addq %rax, %r13
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rbx
xorq %r10, %r10
mulq 24(%rsi)
addq %rbx, %r8
adcq $0, %rdx
addq %rax, %r8
adcq %rdx, %r9
movq %r11, %rbx
adcq $0, %r10
// last round reduction.
imulq %r14, %r11 // r11 = r11 * ordK = q
movq %r11, %rax
mulq (%r15) // n[0] * q
addq %rax, %rbx // %rbx must be 0
adcq $0, %rdx // hi(n[0]*q) + 1 < 2^32 + 1 < 2^64 no further carry is required.
movq %r11, %rax
movq %rdx, %rbp // %rbp = hi(n[0]*q)
mulq 8(%r15) // n[1] * q
addq %rbp, %rax // %rax = lo(n[1]*q)+hi(n[0]*q)
adcq $0, %rdx // %rdx = hi(n[1]*q), same as above,
// hi(n[1]*q) + 1 < 2^64 no further carry is required.
movq %r11, %rbx
subq %r11, %r13 // r13 = r[2] - q
sbbq $0, %rbx // When q>0 rbx - 1 = q - 1 >= 0,
// When q=0,(r[2]-q)No borrowing, rbx = rbx - 0 >= 0,
// so the following formula does not borrow.
addq %rax, %r12 // r12 = r[1] + lo(n[1]*q) + hi(n[0]*q)
adcq %rdx, %r13 // r13 = r[2] - q + hi(n[1]*q)
movq %r11, %rax
adcq $0, %rbx // Overflowing is not possible.
movq %r11, %rdx
shrq $32, %rax // rax = hq
shlq $32, %rdx // rdx = lq<<32
subq %rdx, %rbx // q - lq<<32
sbbq %rax, %r11 // r11 = q - hq = hq * 2^32 + lq - hq >= lq,
// when lq!=0, the following formula does not borrow.
// When lq==0, the preceding formula does not borrow.
adcq %rbx, %r8
adcq %r11, %r9
adcq $0, %r10
// mod n
movq %r12, %rbx
movq %r13, %rbp
movq %r8, %rax
movq %r9, %rdx
subq (%r15), %r12
sbbq 8(%r15), %r13
sbbq 16(%r15), %r8
sbbq 24(%r15), %r9
sbbq $0, %r10
cmovcq %rbx, %r12
cmovcq %rbp, %r13
cmovcq %rax, %r8
cmovcq %rdx, %r9
movq %r12, (%rdi)
movq %r13, 8(%rdi)
movq %r8, 16(%rdi)
movq %r9, 24(%rdi)
movq (%rsp), %r15
movq 8(%rsp), %r14
movq 16(%rsp), %r13
movq 24(%rsp), %r12
movq 32(%rsp), %rbp
movq 40(%rsp), %rbx
leaq 48(%rsp), %rsp
ret
.cfi_endproc
.size ECP256_OrdMul, .-ECP256_OrdMul
/**
* Function description: Calculate the point doubling of an elliptic curve: res = 2*a
* Function prototype: void ECP256_PointDouble(P256_Point *r, const P256_Point *a);
* Input register:
* rdi: pointer to the output P256_POINT structure
* rsi: address pointing to input data a
* Change register: rax, rbx, rcx, rdx, rbp, rsi, r8, r9, r10, r11, r12, r13, r14, r15
* Function/Macro Call: ECP256_MulBy2Core, ECP256_SqrCore_q, ECP256_AddCore, ECP256_MulCore_q, ECP256_SubCore
* ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#doubling-dbl-2001-b
* Deal process:
* delta = Z12
* gamma = Y12
* beta = X1*gamma
* alpha = 3*(X1-delta)*(X1+delta)
* X3 = alpha2-8*beta
* Z3 = (Y1+Z1)2-gamma-delta
* Y3 = alpha*(4*beta-X3)-8*gamma2
*/
.globl ECP256_PointDouble
.type ECP256_PointDouble,@function
.align 32
ECP256_PointDouble:
.cfi_startproc
pushq %rbx
pushq %rbp
pushq %r12
pushq %r13
pushq %r14
pushq %r15
subq $168, %rsp // Create 32 x 5 + 8 stack space.
.Lpoint_double_core:
vmovdqu (%rsi), %xmm0 // Save x to stack
vmovdqu 16(%rsi), %xmm1
vmovdqa %xmm0, (%rsp)
vmovdqa %xmm1, 16(%rsp)
vmovq %rsi, %xmm3 // Backup a
vmovq %rdi, %xmm0 // Backup &r->x, &r->y, &r->z
leaq 32(%rdi), %r12
leaq 64(%rdi), %r13
vmovq %r12, %xmm1
vmovq %r13, %xmm2
movq 32(%rsi), %r8 // Read a->y
movq 40(%rsi), %r9
movq 48(%rsi), %r10
movq 56(%rsi), %r11
movq 8+.Lpoly(%rip), %r14 // Read P[1], P[3]
movq 24+.Lpoly(%rip), %r15
leaq 32(%rsp), %rdi
call ECP256_MulBy2Core // ECP256_MulBy2(S, &a->y), Not overwritten rsi
movq 64(%rsi), %rax
movq 72(%rsi), %r14
movq 80(%rsi), %rbp
movq 88(%rsi), %r15
leaq 64(%rsi), %rsi // Setting Input Parameters
leaq 64(%rsp), %rdi // Z2 = rsp + 64
call ECP256_SqrCore_q // ECP256_Sqr(Z2, &a->z)
leaq (%rsp), %rdx
leaq 96(%rsp), %rdi // M = rsp + 96
call ECP256_AddCore // ECP256_Add(M, a->x, Z2)
movq 32(%rsp), %rax
movq 40(%rsp), %r14
movq 48(%rsp), %rbp
movq 56(%rsp), %r15
leaq 32(%rsp), %rdi // S = rsp + 32
call ECP256_SqrCore_q // ECP256_Sqr(S, S)
vmovq %xmm3, %rcx
leaq 32(%rcx), %rsi
leaq 64(%rcx), %rcx
vmovq %xmm2, %rdi
call ECP256_MulCore_q // ECP256_Mul(r->z, a->y, a->z)
call ECP256_MulBy2Core // ECP256_MulBy2(r->z, r->z)
movq (%rsp), %r8
movq 8(%rsp), %r9
movq 16(%rsp), %r10
movq 24(%rsp), %r11
leaq 64(%rsp), %rdx
call ECP256_SubCore // ECP256_SubCore(Z2,a->x,Z2)
movq %r8, 64(%rsp)
movq %r9, 72(%rsp)
movq %r10, 80(%rsp)
movq %r11, 88(%rsp)
movq 32(%rsp), %rax
movq 40(%rsp), %r14
movq 48(%rsp), %rbp
movq 56(%rsp), %r15
vmovq %xmm1, %rdi
call ECP256_SqrCore_q // ECP256_Sqr(r->y,S)
call ECP256_DivBy2Core // ECP256_Div(r->y,r->y)
leaq 96(%rsp), %rdi
leaq 96(%rsp), %rsi
leaq 64(%rsp), %rcx
call ECP256_MulCore_q // ECP256_MulCore_q(M,M,Z2)
call ECP256_MulBy3Core // ECP256_MulBy3Core(M,M)
leaq (%rsp), %rcx
leaq 32(%rsp), %rsi
leaq 32(%rsp), %rdi
call ECP256_MulCore_q // ECP256_MulCore_q(S, S, a->x)
leaq 128(%rsp), %rdi // T = 128 + rsp
call ECP256_MulBy2Core // ECP256_MulBy2Core(T, S)
movq 96(%rsp), %rax
movq 104(%rsp), %r14
movq 112(%rsp), %rbp
movq 120(%rsp), %r15
vmovq %xmm0, %rdi
call ECP256_SqrCore_q // ECP256_Sqr(r->x, M)
leaq 128(%rsp), %rdx
call ECP256_SubCore // ECP256_SubCore(r->x, r->x, T)
movq %r8, (%rdi)
movq %r9, 8(%rdi)
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
xorq %rsi, %rsi // ECP256_SubCore(S, S, r->x), output %r12, %r13, %r8, %r9
movq 32(%rsp), %rax
movq 40(%rsp), %rbx
movq 48(%rsp), %rcx
subq %r8, %rax
sbbq %r9, %rbx
movq 56(%rsp), %rdx
movq %rax, %r12
sbbq %r10, %rcx
sbbq %r11, %rdx
movq %rbx, %r13
movq %rcx, %r8
sbbq $0, %rsi
addq $-1, %rax
movq %rdx, %r9
adcq %r14, %rbx
adcq $0, %rcx
adcq %r15, %rdx
testq %rsi, %rsi
cmovnzq %rax, %r12
cmovnzq %rbx, %r13
cmovnzq %rcx, %r8
cmovnzq %rdx, %r9
movq %r12, 32(%rsp)
movq %r13, 40(%rsp)
movq %r8, 48(%rsp)
movq %r9, 56(%rsp)
leaq 32(%rsp), %rdi
leaq 32(%rsp), %rsi
leaq 96(%rsp), %rcx
call ECP256_MulCore_q // ECP256_MulCore_q(S, S, M)
vmovq %xmm1, %rdx
vmovq %xmm1, %rdi
call ECP256_SubCore // ECP256_SubCore(r->y, S, r->y)
movq %r8, (%rdi)
movq %r9, 8(%rdi)
leaq 168+48(%rsp), %rsi
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
movq -48(%rsi), %r15
movq -40(%rsi), %r14
movq -32(%rsi), %r13
movq -24(%rsi), %r12
movq -16(%rsi), %rbp
movq -8(%rsi), %rbx
leaq (%rsi), %rsp
ret
.cfi_endproc
.size ECP256_PointDouble, .-ECP256_PointDouble
/**
* Function description: Elliptic curve point addition calculation: res = a + b
* Function prototype: void ECP256_PointAdd(P256_Point *r, const P256_Point *a, const P256_Point *b);
* Input register:
* rdi: Pointer to the output P256_POINT structure
* rsi: Address pointing to input data a
* rdx: Address pointing to input data b
* Change register: rax, rbx, rcx, rdx, rbp, rsi, r8, r9, r10, r11, r12, r13, r14, r15
* Function/Macro Call: ECP256_PointDouble, ECP256_SqrCore_q, ECP256_MulCore_q, ECP256_SubCore, ECP256_MulBy2Core
* ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-1998-cmo
* Deal process:
* U1 = X1*Z22
* U2 = X2*Z12
* S1 = Y1*Z23
* S2 = Y2*Z13
* H = U2-U1
* r = S2-S1
* X3 = r2-H3-2*U1*H2
* Y3 = r*(U1*H2-X3)-S1*H3
* Z3 = Z1*Z2*H
*/
.globl ECP256_PointAdd
.type ECP256_PointAdd,@function
.align 32
ECP256_PointAdd:
.cfi_startproc
pushq %rbx
pushq %rbp
pushq %r12
pushq %r13
pushq %r14
pushq %r15
subq $640+8, %rsp // Create 32 x 20 + 8 stack space.
vmovdqu (%rsi), %xmm0
vmovdqu 16(%rsi), %xmm1
vmovdqu 32(%rsi), %xmm2
vmovdqu 48(%rsi), %xmm3
vmovdqu 64(%rsi), %xmm4
vmovdqu 80(%rsi), %xmm5
movq %rsi, %rcx
movq %rdx, %rsi
vmovdqu %xmm0, (%rsp) // Save a on the stack, a_cpy: 0~96(%rsp)
vmovdqu %xmm1, 16(%rsp)
vmovdqu %xmm2, 32(%rsp)
vmovdqu %xmm3, 48(%rsp)
vmovdqu %xmm4, 64(%rsp)
vmovdqu %xmm5, 80(%rsp)
vpor %xmm4, %xmm5, %xmm5 // xmm5 = (Za[3]|Za[1], Za[2]|Za[0])
vmovdqu (%rsi), %xmm0
vpshufd $0xb1, %xmm5, %xmm3 // xmm3 = ((lo(Za[3]|Za[1])<<32) | hi(Za[3]|Za[1]), (lo(Za[2]|Za[0])<<32) | hi(Za[2]|Za[0]))
vmovdqu 16(%rsi), %xmm1
vmovdqu 32(%rsi), %xmm2
vpor %xmm3, %xmm5, %xmm5 // xmm5 = ((lo(Za[3]|Za[1])|hi(Za[3]|Za[1]))##~, (lo(Za[2]|Za[0])|hi(Za[2]|Za[0]))##~)
vmovdqu 48(%rsi), %xmm3
movq 64(%rsi), %rax // Read b.z, then calculate (b.z)^2
movq 72(%rsi), %r14
movq 80(%rsi), %rbp
movq 88(%rsi), %r15
vmovdqu %xmm0, 96(%rsp) // Save b on the stack. b_cpy: 96–192(%rsp)
vpshufd $0x1e, %xmm5, %xmm4 // xmm4 = ((lo(Za[2]|Za[0])|hi(Za[2]|Za[0]))##~, (lo(Za[3]|Za[1])|hi(Za[3]|Za[1]))##~)
vmovdqu %xmm1, 112(%rsp)
vmovdqu 64(%rsi), %xmm0
vmovdqu 80(%rsi), %xmm1
vmovdqu %xmm2, 128(%rsp)
vmovdqu %xmm3, 144(%rsp)
vpor %xmm4, %xmm5, %xmm5 // xmm5 = ((lo(Za[0]|Za[1]|Za[2]|Za[3])|hi(Za[0]|Za[1]|Za[2]|Za[3]))##~##~##~)
vpxor %xmm4, %xmm4, %xmm4
vpor %xmm0, %xmm1, %xmm1
vmovq %rdi, %xmm0 // Backup rdi
movq %rax, 160(%rsp)
movq %r14, 168(%rsp)
leaq 192(%rsp), %rdi // Zb^2: 192~224(%rsp)
movq %rbp, 176(%rsp)
movq %r15, 184(%rsp)
vmovq %rcx, %xmm2 // Backup a
call ECP256_SqrCore_q // sqr(Zb^2, Zb)
vpcmpeqd %xmm4, %xmm5, %xmm5 // a_infty, Whether a is an infinity point (Za == 0)
vpshufd $0xb1, %xmm1, %xmm4
vpor %xmm1, %xmm4, %xmm4
vpshufd $0x1e, %xmm4, %xmm3
vpor %xmm3, %xmm4, %xmm4
vpxor %xmm3, %xmm3, %xmm3
vpcmpeqd %xmm3, %xmm4, %xmm4 // b_infty, Whether b is an infinity point (Zb == 0)
movq 64(%rsp), %rax
movq 72(%rsp), %r14
leaq 224(%rsp), %rdi // Za^2: 224~256(%rsp)
movq 80(%rsp), %rbp
movq 88(%rsp), %r15
call ECP256_SqrCore_q // sqr(Za^2, Za)
leaq 160(%rsp), %rsi // Zb
leaq 192(%rsp), %rcx // Zb^2
leaq 256(%rsp), %rdi // S1: 256~288(%rsp)
call ECP256_MulCore_q // mul(S1, Zb, Zb^2)
leaq 64(%rsp), %rsi // Za
leaq 224(%rsp), %rcx // Za^2
leaq 288(%rsp), %rdi // S2: 288~320(%rsp)
call ECP256_MulCore_q // mul(S2, Za, Za^2)
leaq 32(%rsp), %rsi // Ya
leaq 256(%rsp), %rcx // S1
leaq 256(%rsp), %rdi // S1
call ECP256_MulCore_q // mul(S1,S1,Ya)
leaq 128(%rsp), %rsi // Yb
leaq 288(%rsp), %rcx // S2
leaq 288(%rsp), %rdi // S2
call ECP256_MulCore_q // mul(S2,S2,Yb)
leaq 256(%rsp), %rdx // S1
call ECP256_SubCore // sub(R,S2,S1)
movq %r8, 320(%rsp) // R: 320~352(%rsp)
movq %r9, 328(%rsp)
movq %r10, 336(%rsp)
movq %r11, 344(%rsp)
orq %r9, %r8
vmovdqa %xmm4, %xmm1
orq %r10, %r8
orq %r11, %r8
vpor %xmm5, %xmm1, %xmm1 // a_infty | b_infty
vmovq %r8, %xmm3
leaq (%rsp), %rsi // Xa
leaq 192(%rsp), %rcx // Zb^2
leaq 352(%rsp), %rdi // U1: 352~384(%rsp)
call ECP256_MulCore_q // Mul(U1, Xa, Zb^2)
leaq 96(%rsp), %rsi // Xb
leaq 224(%rsp), %rcx // Za^2
leaq 384(%rsp), %rdi // U2: 384~416(%rsp)
call ECP256_MulCore_q // Mul(U2, Xb, Za^2)
leaq 352(%rsp), %rdx // U1
leaq 416(%rsp), %rdi // H: 416~448(%rsp)
call ECP256_SubCore // sub(H,U2,U1)
movq %r8, 416(%rsp)
movq %r9, 424(%rsp)
movq %r10, 432(%rsp)
movq %r11, 440(%rsp)
orq %r9, %r8
vmovq %xmm1, %r12
orq %r10, %r8
vmovq %xmm3, %r13
orq %r11, %r8
orq %r12, %r8
orq %r13, %r8
jnz .Lpoint_add
.Lequal_point:
vmovq %xmm0, %rdi
vmovq %xmm2, %rsi
addq $640-32*5, %rsp
jmp .Lpoint_double_core
.align 32
.Lpoint_add:
movq 320(%rsp), %rax // R
movq 328(%rsp), %r14
leaq 448(%rsp), %rdi // R^2: 448~480(%rsp)
movq 336(%rsp), %rbp
movq 344(%rsp), %r15
call ECP256_SqrCore_q // sqr(R^2,R)
leaq 64(%rsp), %rsi // Za
leaq 416(%rsp), %rcx // H
leaq 480(%rsp), %rdi // Zr:480~512(%rsp)
call ECP256_MulCore_q // Mul(Zr,H,Za)
movq 416(%rsp), %rax // H
movq 424(%rsp), %r14
leaq 512(%rsp), %rdi // H^2:512~544(%rsp)
movq 432(%rsp), %rbp
movq 440(%rsp), %r15
call ECP256_SqrCore_q // sqr(H^2, H)
leaq 480(%rsp), %rdi // Zr
leaq 480(%rsp), %rsi // Zr
leaq 160(%rsp), %rcx // Zb
call ECP256_MulCore_q // Mul(Zr, Zr, Zb)
leaq 544(%rsp), %rdi // H3:544~576(%rsp)
leaq 512(%rsp), %rsi // H2
leaq 416(%rsp), %rcx // H
call ECP256_MulCore_q // mul(H^3,H,H^2)
leaq 384(%rsp), %rdi // U2
leaq 352(%rsp), %rsi // U1
leaq 512(%rsp), %rcx // H2
call ECP256_MulCore_q // mul(U2,U1,H^2)
leaq 512(%rsp), %rdi // H^2
call ECP256_MulBy2Core // mulby2(H^2,U2)
movq 448(%rsp), %rax // sub(Xr,R^2,H^2)
movq 456(%rsp), %rbx
xorq %rsi, %rsi
movq 464(%rsp), %rcx
movq 472(%rsp), %rdx
subq %r8, %rax
sbbq %r9, %rbx
movq %rax, %r8
sbbq %r10, %rcx
sbbq %r11, %rdx
movq %rbx, %r9
sbbq $0, %rsi
addq $-1, %r8
movq %rcx, %r10
adcq %r14, %r9
adcq $0, %r10
movq %rdx, %r11
adcq %r15, %r11
testq %rsi, %rsi
cmovzq %rax, %r8
cmovzq %rbx, %r9
cmovzq %rcx, %r10
cmovzq %rdx, %r11
leaq 576(%rsp), %rdi // Xr: 576~608(%rsp)
leaq 544(%rsp), %rdx // H^3
call ECP256_SubCore // sub(Xr, Xr, H^3)
movq %r8, 576(%rsp)
movq %r9, 584(%rsp)
movq %r10, 592(%rsp)
movq %r11, 600(%rsp)
movq 384(%rsp), %rax // sub(Yr, U2, Xr)
movq 392(%rsp), %rbx
xorq %rsi, %rsi
movq 400(%rsp), %rcx
movq 408(%rsp), %rdx
subq %r8, %rax
sbbq %r9, %rbx
movq %rax, %r8
sbbq %r10, %rcx
sbbq %r11, %rdx
movq %rbx, %r9
sbbq $0, %rsi
addq $-1, %r8
movq %rcx, %r10
adcq %r14, %r9
adcq $0, %r10
movq %rdx, %r11
adcq %r15, %r11
testq %rsi, %rsi
cmovzq %rax, %r8
cmovzq %rbx, %r9
cmovzq %rcx, %r10
cmovzq %rdx, %r11
movq %r8, 608(%rsp) // Yr: 608~640(%rsp)
movq %r9, 616(%rsp)
movq %r10, 624(%rsp)
movq %r11, 632(%rsp)
leaq 288(%rsp), %rdi // S2
leaq 256(%rsp), %rsi // S1
leaq 544(%rsp), %rcx // H^3
call ECP256_MulCore_q // Mul(S2, S1, H^3)
leaq 608(%rsp), %rdi // Yr
leaq 608(%rsp), %rsi
leaq 320(%rsp), %rcx // r
call ECP256_MulCore_q // Mul(Yr, Yr, R)
leaq 608(%rsp), %rdi // Yr
leaq 288(%rsp), %rdx // S2
call ECP256_SubCore // sub(Yr,Yr,S2)
movq %r8, 608(%rsp)
movq %r9, 616(%rsp)
movq %r10, 624(%rsp)
movq %r11, 632(%rsp)
vmovq %xmm0, %rdi
vmovdqa %xmm5, %xmm0 // a_infty
vmovdqa %xmm5, %xmm1
vpandn 576(%rsp), %xmm0, %xmm0 // !a_infty & Xr
vpandn 592(%rsp), %xmm1, %xmm1
vmovdqa %xmm5, %xmm2
vmovdqa %xmm5, %xmm3
vpand 96(%rsp), %xmm2, %xmm2 // a_infty & Xb
vpand 112(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2 // a_infty ? Xb : Xr
vpor %xmm1, %xmm3, %xmm3
vmovdqa %xmm4, %xmm0 // b_infty
vmovdqa %xmm4, %xmm1
vpandn %xmm2, %xmm0, %xmm0 // !b_infty & (a_infty ? Xb : Xr)
vpandn %xmm3, %xmm1, %xmm1
vmovdqa %xmm4, %xmm2
vmovdqa %xmm4, %xmm3
vpand (%rsp), %xmm2, %xmm2 // b_infty & Xa
vpand 16(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2 // b_infty ? Xa : (a_infty ? Xb : Xr)
vpor %xmm1, %xmm3, %xmm3
vmovdqu %xmm2, (%rdi)
vmovdqu %xmm3, 16(%rdi)
vmovdqa %xmm5, %xmm0 // a_infty
vmovdqa %xmm5, %xmm1
vpandn 608(%rsp), %xmm0, %xmm0 // !a_infty & Yr
vpandn 624(%rsp), %xmm1, %xmm1
vmovdqa %xmm5, %xmm2
vmovdqa %xmm5, %xmm3
vpand 128(%rsp), %xmm2, %xmm2 // a_infty & Yb
vpand 144(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2 // a_infty ? Yb : Yr
vpor %xmm1, %xmm3, %xmm3
vmovdqa %xmm4, %xmm0 // b_infty
vmovdqa %xmm4, %xmm1
vpandn %xmm2, %xmm0, %xmm0 // !b_infty & (a_infty ? Yb : Yr)
vpandn %xmm3, %xmm1, %xmm1
vmovdqa %xmm4, %xmm2
vmovdqa %xmm4, %xmm3
vpand 32(%rsp), %xmm2, %xmm2 // b_infty & Ya
vpand 48(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2 // b_infty ? Ya : (a_infty ? Yb : Yr)
vpor %xmm1, %xmm3, %xmm3
vmovdqu %xmm2, 32(%rdi)
vmovdqu %xmm3, 48(%rdi)
vmovdqa %xmm5, %xmm0 // a_infty
vmovdqa %xmm5, %xmm1
vpandn 480(%rsp), %xmm0, %xmm0 // !a_infty & Zr
vpandn 496(%rsp), %xmm1, %xmm1
vmovdqa %xmm5, %xmm2
vmovdqa %xmm5, %xmm3
vpand 160(%rsp), %xmm2, %xmm2 // a_infty & Zb
vpand 176(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2 // a_infty ? Zb : Zr
vpor %xmm1, %xmm3, %xmm3
vmovdqa %xmm4, %xmm0 // b_infty
vmovdqa %xmm4, %xmm1
vpandn %xmm2, %xmm0, %xmm0 // !b_infty & (a_infty ? Zb : Zr)
vpandn %xmm3, %xmm1, %xmm1
vmovdqa %xmm4, %xmm2
vmovdqa %xmm4, %xmm3
vpand 64(%rsp), %xmm2, %xmm2 // b_infty & Za
vpand 80(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2 // b_infty ? Za : (a_infty ? Zb : Zr)
vpor %xmm1, %xmm3, %xmm3
vmovdqu %xmm2, 64(%rdi)
vmovdqu %xmm3, 80(%rdi)
leaq 640+56(%rsp), %rsi
movq -48(%rsi), %r15
movq -40(%rsi), %r14
movq -32(%rsi), %r13
movq -24(%rsi), %r12
movq -16(%rsi), %rbp
movq -8(%rsi), %rbx
leaq (%rsi), %rsp
ret
.cfi_endproc
.size ECP256_PointAdd, .-ECP256_PointAdd
/**
* Function description: Point addition of normal coordinates and affine coordinates assembly implementation
* Function prototype: void ECP256_AddAffine(P256_Point *r, const P256_Point *a, const P256_AffinePoint *b);
* Input register:
* rdi: Points to the returned P256_Point.
* rsi: Points to the input P256_Point.
* rdx: P256_AffinePoint that points to the input
* Change register: rax, rbx, rcx, rdx, rsi, rdi, rbp, r8, r9, r10, r11, r12, r13, r14, r15
* Output register: None
* Function/Macro Call: ECP256_MulBy2Core, ECP256_SqrCore_q, ECP256_AddCore, ECP256_MulCore_q, ECP256_SubCore
* ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2007-bl
* Deal process:
* Z1Z1 = Z12
* U2 = X2*Z1Z1
* S2 = Y2*Z1*Z1Z1
* H = U2-X1
* HH = H2
* I = 4*HH
* J = H*I
* r = 2*(S2-Y1)
* V = X1*I
* X3 = r2-J-2*V
* Y3 = r*(V-X3)-2*Y1*J
* Z3 = (Z1+H)2-Z1Z1-HH
*/
.globl ECP256_AddAffine
.type ECP256_AddAffine,@function
.align 32
ECP256_AddAffine:
.cfi_startproc
pushq %rbp
pushq %rbx
pushq %r12
pushq %r13
pushq %r14
pushq %r15
subq $488, %rsp // open up stack space 32 * 15 + 8 = 488
vmovdqu 0(%rsi), %xmm0 // X1[1]X1[0] --> xmm0
vmovdqu 16(%rsi), %xmm1 // X1[3]X1[2]
vmovdqu 32(%rsi), %xmm2 // Y1[1]Y1[0]
vmovdqu 48(%rsi), %xmm3 // Y1[3]Y1[2]
movq 72(%rsi), %r14 // Z1[1] 64 + 8
movq 64(%rsi), %rax // Z1[0] 64 + 0
vmovdqu 64(%rsi), %xmm4 // Z1[1]Z1[0]
movq 88(%rsi), %r15 // Z1[3] 64 + 24
movq 80(%rsi), %rbp // Z1[2] 64 + 16
vmovdqu 80(%rsi), %xmm5 // Z1[3]Z1[2]
vmovdqa %xmm0, 320(%rsp) // save X1[1]X1[0] to stack
vmovdqa %xmm1, 336(%rsp) // save X1[3]X1[2] to stack
vmovdqa %xmm2, 352(%rsp) // save Y1[1]Y1[0] to stack
vmovdqa %xmm3, 368(%rsp) // save Y1[3]Y1[2] to stack
vmovdqa %xmm4, 384(%rsp) // save Z1[1]Z1[0] to stack
vmovdqa %xmm5, 400(%rsp) // save Z1[3]Z1[2] to stack
vpor %xmm4, %xmm5, %xmm5 // Z1[1]Z1[0] | Z1[3]Z1[2]
vmovdqu (%rdx), %xmm0 // X2[1]X2[0] --> xmm0
vpshufd $0xb1, %xmm5, %xmm3 // Order(10 11 00 01) --> [2 3 0 1] with 32bit
vmovdqu 16(%rdx), %xmm1 // X2[3]X2[2] --> xmm1
vmovdqu 32(%rdx), %xmm2 // Y2[1]Y2[0] --> xmm2
vpor %xmm3, %xmm5, %xmm5 // [2 3 0 1] | [3 2 1 0]
vmovdqu 48(%rdx), %xmm3 // Y2[3]Y2[2] --> xmm3
vmovdqa %xmm0, 416(%rsp) // save X2[1]X2[0] to stack
vpshufd $0x1e, %xmm5, %xmm4 // Order(00 01 11 10) --> [0 1 3 2]
vmovdqa %xmm1, 432(%rsp) // save X2[3]X2[1] to stack
vpor %xmm0, %xmm1, %xmm1 // X2[1]X2[0] | X2[3]X2[2]
vmovq %rdi, %xmm0 // save rdi to xmm0
vmovdqa %xmm2, 448(%rsp) // save X2[1]X2[0] to stack
vmovdqa %xmm3, 464(%rsp) // save X2[3]X2[2] to stack
vpor %xmm2, %xmm3, %xmm3 // Y2[1]Y2[0] | Y2[3]Y2[2]
vpor %xmm4, %xmm5, %xmm5
vpxor %xmm4, %xmm4, %xmm4 // 0
vpor %xmm1, %xmm3, %xmm3 // X2[1]X2[0] | X2[3]X2[2] | Y2[1]Y2[0] | Y2[3]Y2[2]
.balign 32
/* Z1Z1 = Z1 ^ 2 */
leaq 64(%rsi), %rsi // addr(z)
leaq 32(%rsp), %rdi // save Z1Z1 to stack
call ECP256_SqrCore_q // Output: r8 - r11 P[1] --> r14 P[3] --> r15
vpcmpeqd %xmm4, %xmm5, %xmm5
vpshufd $0xb1, %xmm3, %xmm4 // Order(10 11 00 01)
vpor %xmm3, %xmm4, %xmm4
vpshufd $0, %xmm5, %xmm5 // Order(00 00 00 00)
vpshufd $0x1e, %xmm4, %xmm3 // Order(00 01 11 10)
vpor %xmm3, %xmm4, %xmm4
vpxor %xmm3, %xmm3, %xmm3
vpcmpeqd %xmm3, %xmm4, %xmm4
vpshufd $0, %xmm4, %xmm4
/* U2 = X2 * Z1Z1 */
leaq 416(%rsp), %rcx // addr of X2 in stack
leaq 32(%rsp), %rsi // read Z1Z1 from stack
leaq (%rsp), %rdi // save U2 to stack
call ECP256_MulCore_q // ouput: r8 - r11 P[1] --> r14 P[3] --> r15
/* H = U2 - X1 */
leaq 320(%rsp), %rdx // read X1 from stack
leaq 64(%rsp), %rdi // save H to stack
call ECP256_SubCore // input: rdx, r8 - r11 P[1] --> r14 P[3] --> r15
movq %r8, (%rdi)
movq %r9, 8(%rdi)
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
/* Z1Z1Z1 = Z1Z1 * Z1 */
leaq 384(%rsp), %rcx // read Z1 from stack
leaq 32(%rsp), %rsi // read Z1Z1 from stack
leaq 32(%rsp), %rdi // save Z1Z1Z1 to stack
call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15
movq %r8, (%rdi)
movq %r9, 8(%rdi)
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
/* Z3/2 = H * Z1 */
leaq 384(%rsp), %rcx // read Z1 from stack
leaq 64(%rsp), %rsi // read H from stack
leaq 288(%rsp), %rdi // save Z3/2 to stack
call ECP256_MulCore_q // P[1] --> r14 P[3] --> r15
/* S2 = Y2 * Z1Z1Z1 */
leaq 448(%rsp), %rcx // read Y2 from stack
leaq 32(%rsp), %rsi // read Z1Z1Z1 from stack
leaq 32(%rsp), %rdi // save S2 to stack
call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15
/* r/2 = (S2 - Y1) */
leaq 352(%rsp), %rdx // read Y1 from stack
leaq 96(%rsp), %rdi // save r/2 to stack
call ECP256_SubCore // output: r8-r11 P[1] --> r14 P[3] --> r15
movq %r8, (%rdi) // save r/2 to stack
movq %r9, 8(%rdi)
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
/* I/4 = H ^ 2 */
leaq 64(%rsp), %rsi // read H from stack
movq (%rsi), %rax // a[0]
movq 8(%rsi), %r14 // a[1]
movq 16(%rsi), %rbp // a[2]
movq 24(%rsi), %r15 // a[3]
leaq 128(%rsp), %rdi // save I/4 to stack
call ECP256_SqrCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15
/* (r/2)^2 = (r^2)/4 */
leaq 96(%rsp), %rsi // read r/2 from stack
movq (%rsi), %rax // a[0]
movq 8(%rsi), %r14 // a[1]
movq 16(%rsi), %rbp // a[2]
movq 24(%rsi), %r15 // a[3]
leaq 192(%rsp), %rdi // save (r^2)/4 to stack
call ECP256_SqrCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15
/* J/4 = I/4 * H */
leaq 128(%rsp), %rcx // read I/4 from stack
leaq 64(%rsp), %rsi // read H from stack
leaq 160(%rsp), %rdi // save J/4 to stack
call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15
/* V/4 = X1 * I */
leaq 320(%rsp), %rcx // read X1 from stack
leaq 128(%rsp), %rsi // read I/4 from stack
leaq (%rsp), %rdi // save V/4 to stack
call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15
xorq %r12, %r12
addq %r8, %r8
adcq %r9, %r9
movq %r8, %rax
adcq %r10, %r10
adcq %r11, %r11
movq %r9, %rbp
adcq $0, %r12
subq $-1, %r8
movq %r10, %rcx
sbbq %r14, %r9
sbbq $0, %r10
movq %r11, %r13
sbbq %r15, %r11
sbbq $0, %r12
leaq 192(%rsp), %rsi // read (r^2)/4 from
cmovcq %rax,%r8 // b[0] V/2 --> r8-r11
cmovcq %rbp,%r9 // b[1]
cmovcq %rcx,%r10 // b[2]
cmovcq %r13,%r11 // b[3]
/* (r^2 - 2 * V)/4 = (r^2)/4 - V/2 */
xorq %r13, %r13
movq (%rsi), %rax // a[0]
movq 8(%rsi), %rcx // a[1]
movq 16(%rsi), %rdx // a[2]
movq 24(%rsi), %r12 // a[3]
subq %r8, %rax
sbbq %r9, %rcx
movq %rax, %r8
sbbq %r10, %rdx
sbbq %r11, %r12
movq %rcx, %r9
sbbq $0, %r13
addq $-1, %r8 // a - b + P
movq %rdx, %r10
adcq %r14, %r9
adcq $0, %r10
movq %r12, %r11
adcq %r15, %r11
testq %r13, %r13
cmovzq %rax, %r8
cmovzq %rcx, %r9
cmovzq %rdx, %r10
cmovzq %r12, %r11 // output: r8-r11 P[1] --> r14 P[3] --> r15
/* X3/4 = (r^2 - 2 * V - J)/4 = (r^2 - 2 * V)/4 - J/4 */
leaq 160(%rsp), %rdx // read J/4 from stack
leaq 224(%rsp), %rdi // save (r^2 - 2 * V - J)/4 to stack
call ECP256_SubCore // output: r8-r11 P[1] --> r14 P[3] --> r15
movq %r8, (%rdi) // b[0]
movq %r9, 8(%rdi) // b[1]
movq %r10, 16(%rdi) // b[2]
movq %r11, 24(%rdi) // b[3]
/* (V - X3)/4 = V/4 - X3/4 */
leaq (%rsp), %rsi // read (r^2 - 2 * V)/4 from stack
xorq %r13, %r13
movq (%rsi), %rax // a[0]
movq 8(%rsi), %rcx // a[1]
movq 16(%rsi), %rdx // a[2]
movq 24(%rsi), %r12 // a[3]
subq %r8, %rax
sbbq %r9, %rcx
movq %rax, %r8
sbbq %r10, %rdx
sbbq %r11, %r12
movq %rcx, %r9
sbbq $0, %r13
movq %rdx, %r10
movq %r12, %r11
addq $-1, %r8 // a - b + P
adcq %r14, %r9
adcq $0, %r10
adcq %r15, %r11
testq %r13, %r13
cmovzq %rax, %r8
cmovzq %rcx, %r9
cmovzq %rdx, %r10
cmovzq %r12, %r11
leaq 64(%rsp), %rdi // save (V - X3)/4 from stack
movq %r8, (%rdi)
movq %r9, 8(%rdi)
movq %r10, 16(%rdi)
movq %r11, 24(%rdi) // output: r8-r11 P[1] --> r14 P[3] --> r15
/* (J * Y1)/4 = Y1 * J/4 */
leaq 352(%rsp), %rcx // read Y1 from stack
leaq 160(%rsp), %rsi // read J/4 from stack
leaq 32(%rsp), %rdi // save (J * Y1)/4 to stack
call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15
/* (r * (V - X3)/8) = (V - X3)/4 * r/2 */
leaq 96(%rsp), %rcx // read r/2 from stack
leaq 64(%rsp), %rsi // read (V - X3)/4 from stack
leaq 64(%rsp), %rdi // save (r * (V - X3)/8) to stack
call ECP256_MulCore_q // output: r8-r11 P[1] --> r14 P[3] --> r15
/* Y3/8 = (r * (V - X3)/8) - (J * Y1)/4 */
leaq 32(%rsp), %rdx // read (J * Y1)/4 from stack
leaq 256(%rsp), %rdi // save Y3/8
call ECP256_SubCore
movq %r8, (%rdi)
movq %r9, 8(%rdi)
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
vmovq %xmm0, %rdi
vmovdqa %xmm5, %xmm0
vmovdqa %xmm5, %xmm1
vpandn 288(%rsp), %xmm0, %xmm0
vmovdqa %xmm5, %xmm2
vpandn 304(%rsp), %xmm1, %xmm1
vmovdqa %xmm5, %xmm3
vpand .Lone_mont(%rip), %xmm2, %xmm2
vpand .Lone_mont+16(%rip), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqa %xmm4, %xmm0
vmovdqa %xmm4, %xmm1
vpandn %xmm2, %xmm0, %xmm0
vmovdqa %xmm4, %xmm2
vpandn %xmm3, %xmm1, %xmm1
vmovdqa %xmm4, %xmm3
vpand 384(%rsp), %xmm2, %xmm2
vpand 400(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqu %xmm2, 64(%rdi)
vmovdqu %xmm3, 80(%rdi)
vmovdqa %xmm5, %xmm0
vmovdqa %xmm5, %xmm1
vpandn 224(%rsp), %xmm0, %xmm0
vmovdqa %xmm5, %xmm2
vpandn 224+16(%rsp), %xmm1, %xmm1
vmovdqa %xmm5, %xmm3
vpand 416(%rsp), %xmm2, %xmm2
vpand 416+16(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqa %xmm4, %xmm0
vmovdqa %xmm4, %xmm1
vpandn %xmm2, %xmm0, %xmm0
vmovdqa %xmm4, %xmm2
vpandn %xmm3, %xmm1, %xmm1
vmovdqa %xmm4, %xmm3
vpand 320(%rsp), %xmm2, %xmm2
vpand 336(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqu %xmm2, 0(%rdi)
vmovdqu %xmm3, 16(%rdi)
vmovdqa %xmm5, %xmm0
vmovdqa %xmm5, %xmm1
vpandn 256(%rsp), %xmm0, %xmm0
vmovdqa %xmm5, %xmm2
vpandn 272(%rsp), %xmm1, %xmm1
vmovdqa %xmm5, %xmm3
vpand 448(%rsp), %xmm2, %xmm2
vpand 464(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqa %xmm4, %xmm0
vmovdqa %xmm4, %xmm1
vpandn %xmm2, %xmm0, %xmm0
vmovdqa %xmm4, %xmm2
vpandn %xmm3, %xmm1, %xmm1
vmovdqa %xmm4, %xmm3
vpand 352(%rsp), %xmm2, %xmm2
vpand 368(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqu %xmm2, 32(%rdi)
vmovdqu %xmm3, 48(%rdi)
addq $488, %rsp
popq %r15
popq %r14
popq %r13
popq %r12
popq %rbx
popq %rbp
ret
.cfi_endproc
.size ECP256_AddAffine, .-ECP256_AddAffine
/**
* Function description: This interface is used to store the G-16G pre-computation table discretely.
* Function prototype: void ECP256_Scatterw5(P256_Point *table, const P256_Point *point, uint32_t index);
* Input register:
* rdi: Points to the base address of the pre-computation table.
* rsi: Points to P256_Point.
* rdx: Index value. The value ranges from 1 to 16.
* Change register: rdx, rsi, rdi, r8, r9, r10, r11
* Output register: None
* Function/Macro Call:
*/
.globl ECP256_Scatterw5
.type ECP256_Scatterw5,@function
.align 32
ECP256_Scatterw5:
.cfi_startproc
subq $1, %rdx // index - 1
movq (%rsi), %r8 // x[0]
movq 8(%rsi), %r9 // x[1]
movq 16(%rsi), %r10 // x[2]
movq 24(%rsi), %r11 // x[3]
leaq (%rdi, %rdx, 8), %rdi // base = base + (index - 1) * 8 . offset for table
movq %r8, (%rdi) // x[0] --> base + 0 * 128
movq %r9, 128(%rdi) // x[1] --> base + 1 * 128
movq %r10, 256(%rdi) // x[2] --> base + 2 * 128
movq %r11, 384(%rdi) // x[3] --> base + 3 * 128
leaq 512(%rdi), %rdi // base + 128 * 4
leaq 32(%rsi), %rsi // addr(y) --> rsi
movq (%rsi), %r8 // y[0]
movq 8(%rsi), %r9 // y[1]
movq 16(%rsi), %r10 // y[2]
movq 24(%rsi), %r11 // y[3]
movq %r8, (%rdi) // y[0] --> base + 4 * 128
movq %r9, 128(%rdi) // y[1] --> base + 5 * 128
movq %r10, 256(%rdi) // y[2] --> base + 6 * 128
movq %r11, 384(%rdi) // y[3] --> base + 7 * 128
leaq 512(%rdi), %rdi // base + 128 * 8
leaq 32(%rsi), %rsi // addr(z) --> rsi
movq (%rsi), %r8 // z[0]
movq 8(%rsi), %r9 // z[1]
movq 16(%rsi), %r10 // z[2]
movq 24(%rsi), %r11 // z[3]
movq %r8, (%rdi) // z[0] --> base + 8 * 128
movq %r9, 128(%rdi) // z[1] --> base + 9 * 128
movq %r10, 256(%rdi) // z[2] --> base + 10 * 128
movq %r11, 384(%rdi) // z[3] --> base + 11 * 128
ret
.cfi_endproc
.size ECP256_Scatterw5, .-ECP256_Scatterw5
/**
* Function description: This interface is used to obtain the G-16G pre-computation table discretely.
* Function prototype: void ECP256_Gatherw5(P256_Point *point, const P256_Point *table, uint32_t index);
* Input register:
* rdi: points to P256_Point.
* rsi: points to the base address of the pre-computation table.
* edx: index value
* Change register: edx, rsi, rdi, r8, r9, r10, r11
* Output register: None
* Function/Macro Call:
*/
.globl ECP256_Gatherw5
.type ECP256_Gatherw5,@function
.align 32
ECP256_Gatherw5:
.cfi_startproc
movq $-1, %rax
xorq %rcx, %rcx
cmp $0, %rdx
cmovzq %rcx, %rax // rax = (rdx == 0) ? 0 : -1
add %rax, %rdx // rdx = (rdx == 0) ? rdx : (rdx - 1)
leaq (%rsi, %rdx, 8), %rsi // Calculate offset. base = base + (index -1) * 8
movq (%rsi), %r8 // x[0]
movq 128(%rsi), %r9 // x[1]
movq 256(%rsi), %r10 // x[2]
movq 384(%rsi), %r11 // x[3]
leaq 512(%rsi), %rsi // base += 512
andq %rax, %r8
andq %rax, %r9
andq %rax, %r10
andq %rax, %r11
movq %r8, (%rdi) // Write back
movq %r9, 8(%rdi)
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
leaq 32(%rdi), %rdi // Write back point offset
movq (%rsi), %r8 // y[0]
movq 128(%rsi), %r9 // y[1]
movq 256(%rsi), %r10 // y[2]
movq 384(%rsi), %r11 // y[3]
leaq 512(%rsi), %rsi // base += 512
andq %rax, %r8
andq %rax, %r9
andq %rax, %r10
andq %rax, %r11
movq %r8, (%rdi) // Write back
movq %r9, 8(%rdi)
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
leaq 32(%rdi), %rdi // Write back point offset
movq (%rsi), %r8 // z[0]
movq 128(%rsi), %r9 // z[1]
movq 256(%rsi), %r10 // z[2]
movq 384(%rsi), %r11 // z[3]
andq %rax, %r8
andq %rax, %r9
andq %rax, %r10
andq %rax, %r11
movq %r8, (%rdi) // Write back
movq %r9, 8(%rdi)
movq %r10, 16(%rdi)
movq %r11, 24(%rdi)
ret
.cfi_endproc
.size ECP256_Gatherw5, .-ECP256_Gatherw5
/**
* Function description: Discretely obtains affine points in the precomputation table.
* Function prototype: void ECP256_Gatherw7(P256_AffinePoint *point, const P256_AffinePoint *table, uint32_t index);
* Input register:
* rdi: points to the returned P256_AffinePoint.
* rsi: points to the base address of the pre-computation table.
* rdx: index value
* Change register: rax, rcx, rdx, rsi, rdi, rbp, r8, r9, r10
* Output register: None
* Function/Macro Call:
*/
.globl ECP256_Gatherw7
.type ECP256_Gatherw7,@function
.align 32
ECP256_Gatherw7:
.cfi_startproc
movq $-1, %rax
xorq %rcx, %rcx
cmp $0, %rdx
cmovzq %rcx, %rax // rax = (rdx == 0) ? 0 : -1
addq %rax, %rdx // rdx = (rdx == 0) ? rdx : (rdx - 1)
subq $63, %rdx // rdx = (rdx == 0) ? (rdx - 63) : (rdx - 1 - 63)
subq %rdx, %rsi // rsi = (rdx == 0) ? (rsi + 63 - rdx) : (rsi + 64 - rdx)
movq $8, %r10 // Loop value
.Lgather_w7_loop:
xorq %r8, %r8 // Empty reg for data low 32
xorq %r9, %r9 // Empty reg for data high 32
movb 192(%rsi), %r8b // r8 = [0 0 0 byte(3)]
movb 448(%rsi), %r9b // r9 = [0 0 0 byte(7)]
shlq $8, %r8 // r8 = [0 0 byte(3) 0]
shlq $8, %r9 // r9 = [0 0 byte(7) 0]
movb 128(%rsi), %r8b // r8 = [0 0 byte(3) byte(2)]
movb 384(%rsi), %r9b // r9 = [0 0 byte(7) byte(6)]
shlq $8, %r8 // r8 = [0 byte(3) byte(2) 0]
shlq $8, %r9 // r9 = [0 byte(7) byte(6) 0]
movb 64(%rsi), %r8b // r8 = [0 byte(3) byte(2) byte(1)]
movb 320(%rsi), %r9b // r9 = [0 byte(7) byte(6) byte(5)]
shlq $8, %r8 // r8 = [byte(3) byte(2) byte(1) 0]
shlq $8, %r9 // r9 = [byte(7) byte(6) byte(5) 0]
movb (%rsi), %r8b // r8 = [byte(3) byte(2) byte(1) byte(0)]
movb 256(%rsi), %r9b // r9 = [byte(7) byte(6) byte(5) byte(4)]
leaq 512(%rsi), %rsi // base += 64 * 8
shlq $32, %r9 // r9 = [byte(7) byte(6) byte(5) byte(4) 0 0 0 0]
orq %r9, %r8 // r8 = [byte(7) byte(6) byte(5) byte(4) byte(3) byte(2) byte(1) byte(0)]
andq %rax, %r8
movq %r8, (%rdi)
leaq 8(%rdi), %rdi
subq $1, %r10
jnz .Lgather_w7_loop
ret
.cfi_endproc
.size ECP256_Gatherw7, .-ECP256_Gatherw7
#endif
|
2301_79861745/bench_create
|
crypto/ecc/src/asm/ecp256_x86_64.S
|
Unix Assembly
|
unknown
| 94,871
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_CURVE_SM2
#include "crypt_arm.h"
.file "ecp_sm2_armv8.S"
#define s0 x7
#define s1 x8
#define s2 x9
#define s3 x10
#define s4 x11
#define s5 x12
#define s6 x13
#define s7 x14
.section .rodata
# The polynomial
.align 4
.Lpoly:
.quad 0xffffffffffffffff, 0xffffffff00000000, 0xffffffffffffffff, 0xfffffffeffffffff
# The order of polynomial
.Lord:
.quad 0x53bbf40939d54123, 0x7203df6b21c6052b, 0xffffffffffffffff, 0xfffffffeffffffff
.Lpoly_div_2:
.quad 0x8000000000000000, 0xffffffff80000000, 0xffffffffffffffff, 0x7fffffff7fffffff
.Lord_div_2:
.quad 0xa9ddfa049ceaa092, 0xb901efb590e30295, 0xffffffffffffffff, 0x7fffffff7fffffff
.Lzero:
.quad 0, 0, 0, 0
.Lord_1div4:
.quad 0xd4eefd024e755049, 0xdc80f7dac871814a, 0xffffffffffffffff, 0x3fffffffbfffffff
.Lord_2div4:
.quad 0xa9ddfa049ceaa092, 0xb901efb590e30295, 0xffffffffffffffff, 0x7fffffff7fffffff
.Lord_3div4:
.quad 0x7eccf706eb5ff0db, 0x9582e790595483e0, 0xffffffffffffffff, 0xbfffffff3fffffff
.Lpoly_1div4:
.quad 0x4000000000000000, 0xffffffffc0000000, 0xffffffffffffffff, 0x3fffffffbfffffff
.Lpoly_2div4:
.quad 0x8000000000000000, 0xffffffff80000000, 0xffffffffffffffff, 0x7fffffff7fffffff
.Lpoly_3div4:
.quad 0xc000000000000000, 0xffffffff40000000, 0xffffffffffffffff, 0xbfffffff3fffffff
.LRR: // 2^512 mod P precomputed for sm2 polynomial
.quad 0x0000000200000003, 0x00000002ffffffff, 0x0000000100000001, 0x0000000400000002
.Lone_mont:
.quad 0x0000000000000001, 0x00000000ffffffff, 0x0000000000000000, 0x0000000100000000
.Lone:
.quad 1,0,0,0
.text
### Right shift: in >> 1 ###
# void ECP_Sm2Div2(BN_UINT *r, BN_UINT *a);
# 1-bit right shift
.globl ECP_Sm2Div2
.type ECP_Sm2Div2, %function
.align 4
ECP_Sm2Div2:
AARCH64_PACIASP
# Load inputs
ldp x9, x10, [x1]
ldp x11, x12, [x1, #16]
# Right shift
extr x9, x10, x9, #1
extr x10, x11, x10, #1
extr x11, x12, x11, #1
lsr x12, x12, #1
# Store results
stp x9, x10, [x0]
stp x11, x12, [x0, #16]
AARCH64_AUTIASP
ret
.size ECP_Sm2Div2, .-ECP_Sm2Div2
### Right shift: in >> 2 ###
# void ECP_Sm2Div4(BN_UINT *r, BN_UINT *a);
# 2-bit right shift
.globl ECP_Sm2Div4
.type ECP_Sm2Div4, %function
.align 4
ECP_Sm2Div4:
AARCH64_PACIASP
# Load inputs
ldp x7, x8, [x1]
ldp x9, x10, [x1, #16]
# Right shift
extr x7, x8, x7, #2
extr x8, x9, x8, #2
extr x9, x10, x9, #2
lsr x10, x10, #2
# Store results
stp x7, x8, [x0]
stp x9, x10, [x0, #16]
AARCH64_AUTIASP
ret
.size ECP_Sm2Div4, .-ECP_Sm2Div4
### Sub: r = a-b ###
.globl ECP_Sm2BnSub
.type ECP_Sm2BnSub, %function
.align 4
ECP_Sm2BnSub:
AARCH64_PACIASP
# Load inputs
ldp x7, x8, [x1]
ldp x11, x12, [x2]
ldp x9, x10, [x1, #16]
ldp x13, x14, [x2, #16]
# Sub
subs x7,x7,x11
sbcs x8,x8,x12
sbcs x9,x9,x13
sbc x10,x10,x14
# Store results
stp x7, x8, [x0]
stp x9, x10, [x0, #16]
AARCH64_AUTIASP
ret
.size ECP_Sm2BnSub, .-ECP_Sm2BnSub
### Add: r = a+b ###
.globl ECP_Sm2BnAdd
.type ECP_Sm2BnAdd, %function
.align 4
ECP_Sm2BnAdd:
AARCH64_PACIASP
# Load inputs
ldp x7, x8, [x1]
ldp x11, x12, [x2]
ldp x9, x10, [x1, #16]
ldp x13, x14, [x2, #16]
# Add
adds x7,x7,x11
adcs x8,x8,x12
adcs x9,x9,x13
adc x10,x10,x14
# Store results
stp x7, x8, [x0]
stp x9, x10, [x0, #16]
AARCH64_AUTIASP
ret
.size ECP_Sm2BnAdd, .-ECP_Sm2BnAdd
### Modular div by 2: res = in/2 mod p ###
# void ECP_Sm2Div2ModP(BN_UINT *r, BN_UINT *a)
.globl ECP_Sm2Div2ModP
.type ECP_Sm2Div2ModP, %function
.align 4
ECP_Sm2Div2ModP:
AARCH64_PACIASP
# Load inputs
ldp x3, x4, [x1]
ldp x5, x6, [x1, #16]
# Save last bit
mov x11, x3
# Right shift 1
extr x3, x4, x3, #1
extr x4, x5, x4, #1
extr x5, x6, x5, #1
lsr x6, x6, #1
# Load polynomial
adrp x1, .Lpoly_div_2
add x1,x1,:lo12:.Lpoly_div_2
ldp x7, x8, [x1]
ldp x9, x10, [x1, #16]
# Parity check
tst x11, #1
csel x7,xzr,x7,eq
csel x8,xzr,x8,eq
csel x9,xzr,x9,eq
csel x10,xzr,x10,eq
# Add
adds x3,x3,x7
adcs x4,x4,x8
adcs x5,x5,x9
adc x6,x6,x10
# Store results
stp x3, x4, [x0]
stp x5, x6, [x0, #16]
AARCH64_AUTIASP
ret
.size ECP_Sm2Div2ModP, .-ECP_Sm2Div2ModP
### Modular div by 2: res = in/2 mod n, where n = ord(p) ###
# void ECP_Sm2Div2ModOrd(BN_UINT *r, BN_UINT *a)
.globl ECP_Sm2Div2ModOrd
.type ECP_Sm2Div2ModOrd, %function
.align 4
ECP_Sm2Div2ModOrd:
AARCH64_PACIASP
# Load inputs
ldp x3, x4, [x1]
ldp x5, x6, [x1, #16]
# Save last bit
mov x11, x3
# Right shift 1
extr x3, x4, x3, #1
extr x4, x5, x4, #1
extr x5, x6, x5, #1
lsr x6, x6, #1
# Load polynomial
adrp x1, .Lord_div_2
add x1,x1,:lo12:.Lord_div_2
ldp x7, x8, [x1]
ldp x9, x10, [x1, #16]
# Parity check
tst x11, #1
csel x7,xzr,x7,eq
csel x8,xzr,x8,eq
csel x9,xzr,x9,eq
csel x10,xzr,x10,eq
# Add
adds x3,x3,x7
adcs x4,x4,x8
adcs x5,x5,x9
adc x6,x6,x10
# Store results
stp x3, x4, [x0]
stp x5, x6, [x0, #16]
AARCH64_AUTIASP
ret
.size ECP_Sm2Div2ModOrd, .-ECP_Sm2Div2ModOrd
### Modular div by 4: res = in/4 mod p ###
# void ECP_Sm2Div4ModP(BN_UINT *r, BN_UINT *a)
.globl ECP_Sm2Div4ModP
.type ECP_Sm2Div4ModP, %function
.align 4
ECP_Sm2Div4ModP:
AARCH64_PACIASP
# Load inputs
ldp x3, x4, [x1]
ldp x5, x6, [x1, #16]
# Save last 2 bits
and x11, x3, 0x3
# Right shift 2
extr x3, x4, x3, #2
extr x4, x5, x4, #2
extr x5, x6, x5, #2
lsr x6, x6, #2
# Load polynomial
adrp x12, .Lzero
add x12,x12,:lo12:.Lzero
adrp x13, .Lpoly_1div4
add x13,x13,:lo12:.Lpoly_1div4
adrp x14, .Lpoly_2div4
add x14,x14,:lo12:.Lpoly_2div4
adrp x15, .Lpoly_3div4
add x15,x15,:lo12:.Lpoly_3div4
cmp x11, #1
csel x1,x12,x13,cc
cmp x11, #2
csel x1,x1,x14,cc
cmp x11, #3
csel x1,x1,x15,cc
ldp x7, x8, [x1]
ldp x9, x10, [x1, #16]
# Add
adds x3,x3,x7
adcs x4,x4,x8
adcs x5,x5,x9
adc x6,x6,x10
# Store results
stp x3, x4, [x0]
stp x5, x6, [x0, #16]
AARCH64_AUTIASP
ret
.size ECP_Sm2Div4ModP, .-ECP_Sm2Div4ModP
### Modular div by 4: res = in/4 mod n, where n = ord(p) ###
# void ECP_Sm2Div4ModOrd(BN_UINT *r, BN_UINT *a)
.globl ECP_Sm2Div4ModOrd
.type ECP_Sm2Div4ModOrd, %function
.align 4
ECP_Sm2Div4ModOrd:
AARCH64_PACIASP
# Load inputs
ldp x3, x4, [x1]
ldp x5, x6, [x1, #16]
# Save last 2 bits
and x11, x3, 0x3
# Right shift 2
extr x3, x4, x3, #2
extr x4, x5, x4, #2
extr x5, x6, x5, #2
lsr x6, x6, #2
# Load polynomial
adrp x12, .Lzero
add x12,x12,:lo12:.Lzero
adrp x13, .Lord_1div4
add x13,x13,:lo12:.Lord_1div4
adrp x14, .Lord_2div4
add x14,x14,:lo12:.Lord_2div4
adrp x15, .Lord_3div4
add x15,x15,:lo12:.Lord_3div4
cmp x11, #1
csel x1,x12,x13,cc
cmp x11, #2
csel x1,x1,x14,cc
cmp x11, #3
csel x1,x1,x15,cc
ldp x7, x8, [x1]
ldp x9, x10, [x1, #16]
# Add
adds x3,x3,x7
adcs x4,x4,x8
adcs x5,x5,x9
adc x6,x6,x10
# Store results
stp x3, x4, [x0]
stp x5, x6, [x0, #16]
AARCH64_AUTIASP
ret
.size ECP_Sm2Div4ModOrd, .-ECP_Sm2Div4ModOrd
#define bn_mod_add(mod) \
/* Load inputs */ \
ldp x3,x4,[x1]; \
ldp x5,x6,[x1,#0x10]; \
/* Addition */ \
ldp x7,x8,[x2]; \
ldp x9,x10,[x2,#0x10]; \
adds x3,x3,x7; \
adcs x4,x4,x8; \
adcs x5,x5,x9; \
adcs x6,x6,x10; \
adc x15,xzr,xzr; \
mov x11,x3; \
mov x12,x4; \
mov x13,x5; \
mov x14,x6; \
/* Sub polynomial */ \
adrp x2, mod; \
add x2, x2, :lo12:mod; \
ldp x7,x8,[x2]; \
ldp x9,x10,[x2,#0x10]; \
subs x11,x11,x7; \
sbcs x12,x12,x8; \
sbcs x13,x13,x9; \
sbcs x14,x14,x10; \
sbcs x15,x15,xzr; \
csel x3,x3,x11,cc; \
csel x4,x4,x12,cc; \
csel x5,x5,x13,cc; \
csel x6,x6,x14,cc; \
/* Store results */ \
stp x3,x4,[x0]; \
stp x5,x6,[x0,#0x10]; \
#define bn_mod_sub(mod) \
/* Load inputs */ \
ldp x3,x4,[x1]; \
ldp x5,x6,[x1,#0x10]; \
/* Addition */ \
ldp x7,x8,[x2]; \
ldp x9,x10,[x2,#0x10]; \
subs x3,x3,x7; \
sbcs x4,x4,x8; \
sbcs x5,x5,x9; \
sbcs x6,x6,x10; \
sbc x15,xzr,xzr; \
mov x11,x3; \
mov x12,x4; \
mov x13,x5; \
mov x14,x6; \
/* Add polynomial */ \
adrp x2, mod; \
add x2, x2, :lo12:mod; \
ldp x7,x8,[x2]; \
ldp x9,x10,[x2,#0x10]; \
adds x11,x11,x7; \
adcs x12,x12,x8; \
adcs x13,x13,x9; \
adcs x14,x14,x10; \
tst x15,x15; \
csel x3,x3,x11,eq; \
csel x4,x4,x12,eq; \
csel x5,x5,x13,eq; \
csel x6,x6,x14,eq; \
/* Store results */ \
stp x3,x4,[x0]; \
stp x5,x6,[x0,#0x10]; \
### Modular add: r = a+b mod p ###
.globl ECP_Sm2AddModP
.type ECP_Sm2AddModP, @function
.align 4
ECP_Sm2AddModP:
AARCH64_PACIASP
bn_mod_add(.Lpoly);
AARCH64_AUTIASP
ret
.size ECP_Sm2AddModP, .-ECP_Sm2AddModP
### Modular sub: r = p - r ###
.globl ECP_Sm2Neg
.type ECP_Sm2Neg, @function
.align 4
ECP_Sm2Neg:
AARCH64_PACIASP
ldp x11, x12, [x1]
mov x7, #0xffffffff00000000
ldp x13, x14, [x1, #16]
mov x8, #0xfffffffeffffffff
mov x10, #-1
subs x9,x10,x11
sbcs x7,x7,x12
sbcs x10,x10,x13
sbc x8,x8,x14
stp x9, x7, [x0]
stp x10, x8, [x0, #16]
AARCH64_AUTIASP
ret
.size ECP_Sm2Neg, .-ECP_Sm2Neg
### Modular sub: r = a-b mod p ###
.globl ECP_Sm2SubModP
.type ECP_Sm2SubModP, @function
.align 4
ECP_Sm2SubModP:
AARCH64_PACIASP
bn_mod_sub(.Lpoly);
AARCH64_AUTIASP
ret
.size ECP_Sm2SubModP, .-ECP_Sm2SubModP
### Modular add: r = a+b mod n/p, where n = ord(p) ###
.globl ECP_Sm2AddModOrd
.type ECP_Sm2AddModOrd, @function
.align 4
ECP_Sm2AddModOrd:
AARCH64_PACIASP
bn_mod_add(.Lord);
AARCH64_AUTIASP
ret
.size ECP_Sm2AddModOrd, .-ECP_Sm2AddModOrd
### Modular sub: r = a-b mod n/p, where n = ord(p) ###
.globl ECP_Sm2SubModOrd
.type ECP_Sm2SubModOrd, @function
.align 4
ECP_Sm2SubModOrd:
AARCH64_PACIASP
bn_mod_sub(.Lord);
AARCH64_AUTIASP
ret
.size ECP_Sm2SubModOrd, .-ECP_Sm2SubModOrd
.macro RDC
# registers map
# x3 x4 x5 x6 x15
# rsi rax rcx rdx rbx
# r = a mod sm2
# a = a15 | a14 | ... | a0, where ai are 32–bit quantities
# | a7 | a6 | a5 | a4 | a3 | a2 | a1 | a0 | (+)
# | a8 | a11 | a10 | a9 | a8 | 0 | a9 | a8 | (+)
# | a9 | a14 | a13 | a12 | a11 | 0 | a10 | a9 | (+)
# | a10 | a15 | a14 | a13 | a12 | 0 | a11 | a10 | (+)
# | a11 | 0 | a15 | a14 | a13 | 0 | a12 | a11 | (+)
# | a12 | 0 | a15 | a14 | a13 | 0 | a13 | a12 | (+)
# | a12 | 0 | 0 | a15 | a14 | 0 | a14 | a13 | (+)
# | a13 | 0 | 0 | 0 | a15 | 0 | a14 | a13 | (+)
# | a13 | 0 | 0 | 0 | 0 | 0 | a15 | a14 | (+)
# | a14 | 0 | 0 | 0 | 0 | 0 | a15 | a14 | (+)
# | a14 | 0 | 0 | 0 | 0 | 0 | 0 | a15 | (+)
# | a15 | 0 | 0 | 0 | 0 | 0 | 0 | a15 | (+)
# | a15 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | (+)
# | a15 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | (+)
# | 0 | 0 | 0 | 0 | 0 | a8 | 0 | 0 | (-)
# | 0 | 0 | 0 | 0 | 0 | a9 | 0 | 0 | (-)
# | 0 | 0 | 0 | 0 | 0 | a13 | 0 | 0 | (-)
# | 0 | 0 | 0 | 0 | 0 | a14 | 0 | 0 | (-)
# | U[7]| U[6]| U[5]| U[4]| U[3]| U[2]| U[1]| U[0]|
# | V[3] | V[2] | V[1] | V[0] |
# until r < sm2
# s7 (a15|a14), s6 (a13|a12), s5 (a11|a10), s4 (a9|a8)
# s3 (a7|a6), s2 (a5|a4), s1 (a3|a2), s0 (a1|a0)
# 1. 64-bit addition
eor x3, x3, x3 // to store all carry
eor x4, x4, x4
mov x5, s6 // rcx <- s6
mov x6, s4 // rdx <- s4
# a13 | a12
adds x5, x5, s7 // rcx <- s6 + s7
adcs x4, xzr, xzr // rax <- carry(s6+s7)
adds x5, x5, s7 // rcx <- s6 + 2*s7
adcs x4, x4, xzr
# a9 | a8
mov x15, x4 // rbx <- carry (rax)
adds x6, x6, x5 // rdx <- s4 + s6 + 2*s7
adcs x15, x15, xzr
adds x6, x6, s5 // rdx <- s4 + s5 + s6 + 2*s7
adcs x15, x15, xzr
# sum
adds s0, s0, x6 // s0 <- s0 + s4 + s5 + s6 + 2*s7
adcs s1, s1, x15 // s1 <- s1 + rbx + carry
adcs s2, s2, x5 // s2 <- s2 + s6 + 2*s7 + carry
adcs s3, s3, s7
adcs x3, xzr, xzr
# add carry
adds s3, s3, x4
adcs x3, x3, xzr // all carry
stp s0, s1, [sp, #32]
stp s2, s3, [sp, #48]
# 2. 4 -> 8 64-bit to 32-bit spread
mov x4, #0xffffffff
mov s0, s4
mov s1, s5
mov s2, s6
mov s3, s7
and s0, s0, x4 // a8
and s1, s1, x4 // a10
and s2, s2, x4 // a12
and s3, s3, x4 // a14
lsr s4, s4, #32 // a9
lsr s5, s5, #32 // a11
lsr s6, s6, #32 // a13
lsr s7, s7, #32 // a15
# 3. 32-bit addition
mov x4, s3
add x4, x4, s2 // rax <- a12 + a14
mov x15, s3
add x15, x15, s1 // rbx <- a10 + a14
mov x5, s7
add x5, x5, s6 // rcx <- a13 + a15
mov x6, s0
add x6, x6, s4 // rdx <- a8 + a9
add s7, s7, s5 // s7 <- a11 + a15
mov s2, x5 // s2 <- a13 + a15
add s2, s2, x4 // s2 <- a12 + a13 + a14 + a15
add s1, s1, s2 // s1 <- a10 + a12 + a13 + a14 + a15
add s1, s1, s2 // s1 <- a10 + 2*(a12 + a13 + a14 + a15)
add s1, s1, x6 // s1 <- a8 + a9 + a10 + 2*(a12 + a13 + a14 + a15)
add s1, s1, s5 // s1 <- a8 + a9 + a10 + a11 + 2*(a12 + a13 + a14 + a15)
add s2, s2, s6 // s2 <- a12 + 2*a13 + a14 + a15
add s2, s2, s5 // s2 <- a11 + a12 + 2*a13 + a14 + a15
add s2, s2, s0 // s2 <- a8 + a11 + a12 + 2*a13 + a14 + a15
add x6, x6, s3 // rdx <- a8 + a9 + a14
add x6, x6, s6 // rdx <- a8 + a9 + a13 + a14
add s4, s4, x5 // s4 <- a9 + a13 + a15
add s5, s5, s4 // s5 <- a9 + a11 + a13 + a15
add s5, s5, x5 // s5 <- a9 + a11 + 2*(a13 + a15)
add x4, x4, x15 // rax <- a10 + a12 + 2*a14
# U[0] s5 a9 + a11 + 2*(a13 + a15)
# U[1] %rax a10 + a12 + 2*a14
# U[2]
# U[3] s2 a8 + a11 + a12 + 2*a13 + a14 + a15
# U[4] s4 a9 + a13 + a15
# U[5] %rbx a10 + a14
# U[6] s7 a11 + a15
# U[7] s1 a8 + a9 + a10 + a11 + 2*(a12 + a13 + a14 + a15)
# sub %rdx a8 + a9 + a13 + a14
# s0 s3 s6 %rcx
# 4. 8 -> 4 32-bit to 64-bit
# sub %rdx
mov s0, x4
lsl s0, s0, #32
extr x4, s2, x4, #32
extr s2, x15, s2, #32
extr x15, s1, x15, #32
lsr s1, s1, #32
# 5. 64-bit addition
adds s5, s5, s0
adcs x4, x4, xzr
adcs s4, s4, s2
adcs s7, s7, x15
adcs x3, x3, s1
# V[0] s5
# V[1] %rax
# V[2] s4
# V[3] s7
# carry %rsi
# sub %rdx
# 5. ADD & SUB
ldp s0, s1, [sp, #32]
ldp s2, s3, [sp, #48]
# ADD
adds s0, s0, s5
adcs s1, s1, x4
adcs s2, s2, s4
adcs s3, s3, s7
adcs x3, x3, xzr
# SUB
subs s1, s1, x6
sbcs s2, s2, xzr
sbcs s3, s3, xzr
sbcs x3, x3, xzr
# 6. MOD
# First Mod
mov x4, x3
lsl x4, x4, #32
mov x5, x4
subs x4, x4, x3
adds s0, s0, x3
adcs s1, s1, x4
adcs s2, s2, xzr
adcs s3, s3, x5
# Last Mod
# return y - p if y > p else y
mov s4, s0
mov s5, s1
mov s6, s2
mov s7, s3
adrp x3, .Lpoly
add x3, x3, :lo12:.Lpoly
ldp x4, x15, [x3]
ldp x16, x17, [x3, #16]
eor x5, x5, x5
adcs x5, xzr, xzr
subs s0, s0, x4
sbcs s1, s1, x15
sbcs s2, s2, x16
sbcs s3, s3, x17
sbcs x5, x5, xzr
csel s0, s0, s4, cs
csel s1, s1, s5, cs
csel s2, s2, s6, cs
csel s3, s3, s7, cs
stp s0, s1, [x0]
stp s2, s3, [x0, #16]
.endm
### Modular mul: r = a*b mod p ###
# void ECP_Sm2Mul(uint64_t *r, const uint64_t *a, const uint64_t *b)
# 256-bit modular multiplication in SM2
# r %rdi
# a %rsi
# b %rdx
# registers map
# s0 s1 s2 s3 s4 s5 s6 s7
# x7 x8 x9 x10 x11 x12 x13 x14 x3 x4 x5 x6 x15
# r8 r9 r10 r11 r12 r13 r14 r15 rax rdx rbx rcx rsi
.globl ECP_Sm2Mul
.type ECP_Sm2Mul, @function
.align 4
ECP_Sm2Mul:
AARCH64_PACIASP
# Store scalar registers
stp x29, x30, [sp, #-80]!
add x29, sp, #0
stp x16, x17, [sp, #16]
stp x18, x19, [sp, #64]
# Load inputs
ldp s0, s1, [x1]
ldp s2, s3, [x1, #16]
ldp s4, s5, [x2]
ldp s6, s7, [x2, #16]
### multiplication ###
# ========================
# s7 s6 s5 s4
# * s3 s2 s1 s0
# ------------------------
# + s0 s0 s0 s0
# * * * *
# s7 s6 s5 s4
# s1 s1 s1 s1
# * * * *
# s7 s6 s5 s4
# s2 s2 s2 s2
# * * * *
# s7 s6 s5 s4
# s3 s3 s3 s3
# * * * *
# s7 s6 s5 s4
# ------------------------
# s7 s6 s5 s4 s3 s2 s1 s0
# ========================
### s0*s4 ###
mul x16, s0, s4
umulh x5, s0, s4
eor x6, x6, x6
### s1*s4 + s0*s5 ###
mul x3, s1, s4
umulh x4, s1, s4
adds x5, x5, x3
adcs x6, x6, x4
eor x15, x15, x15
mul x3, s0, s5
umulh x4, s0, s5
adds x5, x5, x3
adcs x6, x6, x4
adcs x15, x15, xzr
mov x17, x5
eor x5, x5, x5
### s2 * s4 + s1 * s5 + s0 *s6 ###
mul x3, s2, s4
umulh x4, s2, s4
adds x6, x6, x3
adcs x15, x15, x4
mul x3, s1, s5
umulh x4, s1, s5
adds x6, x6, x3
adcs x15, x15, x4
adcs x5, x5, xzr
mul x3, s0, s6
umulh x4, s0, s6
adds x6, x6, x3
adcs x15, x15, x4
adcs x5, x5, xzr
mov x18, x6
eor x6, x6, x6
### s3*s4 + s2*s5 + s1*s6 + s0*s7 ###
mul x3, s3, s4
umulh x4, s3, s4
adds x15, x15, x3
adcs x5, x5, x4
adcs x6, x6, xzr
mul x3, s2, s5
umulh x4, s2, s5
adds x15, x15, x3
adcs x5, x5, x4
adcs x6, x6, xzr
mul x3, s1, s6
umulh x4, s1, s6
adds x15, x15, x3
adcs x5, x5, x4
adcs x6, x6, xzr
mul x3, s0 ,s7
umulh x4, s0, s7
adds x15, x15, x3
adcs x5, x5, x4
adcs x6, x6, xzr
mov x19, x15
eor x15, x15, x15
### s3*s5 + s2*s6 + s1*s7 ###
mul x3, s3, s5
umulh x4, s3, s5
adds x5, x5, x3
adcs x6, x6, x4
# carry
adcs x15, x15, xzr
mul x3, s2, s6
umulh x4, s2, s6
adds x5, x5, x3
adcs x6, x6, x4
adcs x15, x15, xzr
mul x3, s1, s7
umulh x4, s1, s7
adds x5, x5, x3
adcs x6, x6, x4
adcs x15, x15, xzr
mov s4, x5
eor x5, x5, x5
### s3*s6 + s2*s7 ###
mul x3, s3, s6
umulh x4, s3, s6
adds x6, x6, x3
adcs x15, x15, x4
adcs x5, x5, xzr
mul x3, s2, s7
umulh x4, s2, s7
adds x6, x6, x3
adcs x15, x15, x4
adcs x5, x5, xzr
mov s5, x6
### s3*s7 ###
mul x3, s3, s7
umulh x4, s3, s7
adds x15, x15, x3
adcs x5, x5, x4
mov s6, x15
mov s7, x5
mov s0, x16
mov s1, x17
mov s2, x18
mov s3, x19
# result of mul: s7 s6 s5 s4 s3 s2 s1 s0
### Reduction ###
RDC
# Restore scalar registers
ldp x16, x17, [sp, #16]
ldp x18, x19, [sp, #64]
ldp x29, x30, [sp], #80
AARCH64_AUTIASP
ret
.size ECP_Sm2Mul, .-ECP_Sm2Mul
### Modular sqr: r = a^2 mod p ###
# void ECP_Sm2Sqr(uint64_t *r, const uint64_t *a)
# 256-bit modular multiplication in SM2 ###
# r %rdi
# a %rsi
# registers map
# s0 s1 s2 s3 s4 s5 s6 s7
# x7 x8 x9 x10 x11 x12 x13 x14 x3 x4 x5 x6 x15 x16 x17
# r8 r9 r10 r11 r12 r13 r14 r15 rax rdx rbx rcx rsi rbp rdi
.globl ECP_Sm2Sqr
.type ECP_Sm2Sqr, @function
.align 4
ECP_Sm2Sqr:
AARCH64_PACIASP
# Store scalar registers
stp x29, x30, [sp, #-64]!
add x29, sp, #0
stp x16, x17, [sp, #16]
# Load inputs
ldp s4, s5, [x1]
ldp s6, s7, [x1, #16]
### square ###
# ========================
# s7 s6 s5 s4
# * s7 s6 s5 s4
# ------------------------
# + s4 s4 s4 s4
# * * * *
# s7 s6 s5 s4
# s5 s5 s5 s5
# * * * *
# s7 s6 s5 s4
# s6 s6 s6 s6
# * * * *
# s7 s6 s5 s4
# s7 s7 s7 s7
# * * * *
# s7 s6 s5 s4
# ------------------------
# s7 s6 s5 s4 s3 s2 s1 s0
# ========================
### s1 <- s4*s5, s2 <- carry ###
mul s1, s4, s5
umulh s2, s4, s5
eor s3, s3, s3
### s2 <- s4*s6 + carry(s2), s3 <- carry ###
mul x3, s6, s4
umulh s3, s6, s4
adds s2, s2, x3
adcs s3, s3, xzr
eor s0, s0, s0
### s3 <- s4*s7 + s5*s6 + carry(s3), s0 <- carry ###
mul x3, s7, s4
umulh x4, s7, s4
adds s3, s3, x3
adcs s0, s0, x4
eor x5, x5, x5
mul x3, s6, s5
umulh x4, s6, s5
adds s3, s3, x3
adcs s0, s0, x4
adcs x5, xzr, xzr
### s0 <- s5*s7 + carry(s0), rbx <- carry ###
mul x3, s7, s5
umulh x4, s7, s5
adds s0, s0, x3
adcs x5, x5, x4
eor x6, x6, x6
### rbx <- s6*s7 + carry(rbx), rcx <- carry ###
mul x3, s7, s6
umulh x4, s7, s6
adds x5, x5, x3
adcs x6, x6, x4
eor x15, x15, x15
### 2*s0|1|2|3 ###
adds s1, s1, s1
adcs s2, s2, s2
adcs s3, s3, s3
adcs s0, s0, s0
adcs x5, x5, x5
# update carry
adcs x6, x6, x6
adcs x15, xzr, xzr
### rbp <- s4*s4, carry <- rdi ###
mul x16, s4, s4
umulh x17, s4, s4
### s4 <- s5*s5, carry <- s5 ###
mul s4, s5, s5
umulh s5, s5, s5
### s6*s6 ###
mul x3, s6, s6
umulh x4, s6, s6
# s1 += carry(s4*s4)
adds s1, s1, x17
# s2 += s5*s5
adcs s2, s2, s4
# s3 += carry(s5*s5)
adcs s3, s3, s5
# s4(s0) += s6*s6
adcs s0, s0, x3
# s5(rbx) += carry(s6*s6)
adcs x5, x5, x4
adcs x6, x6, xzr
adcs x15, x15, xzr
### s7*s7 ###
mul x3, s7, s7
umulh x4, s7, s7
# s6(rcx) += s7*s7
adds x6, x6, x3
# s7(rsi) += carry(s7*s7)
adcs x15, x15, x4
mov s4, s0
mov s0, x16
mov s5, x5
mov s6, x6
mov s7, x15
# result of mul: s7 s6 s5 s4 s3 s2 s1 s0=
### Reduction ###
RDC
# Restore scalar registers
ldp x16, x17, [sp, #16]
ldp x29, x30, [sp], #64
AARCH64_AUTIASP
ret
.size ECP_Sm2Sqr, .-ECP_Sm2Sqr
.globl ECP_Sm2ToMont
.type ECP_Sm2ToMont,%function
.align 4
ECP_Sm2ToMont:
AARCH64_PACIASP
stp x29, x30,[sp, #-32]!
add x29,sp, #0
stp x19, x20,[sp, #16]
adrp x3, .LRR // bp[0]
add x3, x3,:lo12:.LRR
ldr x3,[x3]
ldp x4, x5,[x1]
ldp x6, x7,[x1, #16]
adrp x14, .Lpoly+8
add x14, x14,:lo12:.Lpoly+8
ldr x14,[x14]
adrp x15, .Lpoly+24
add x15, x15,:lo12:.Lpoly+24
ldr x15,[x15]
adrp x2, .LRR
add x2, x2,:lo12:.LRR
bl ECP_Sm2MulMont
ldp x19, x20,[sp, #16]
ldp x29, x30,[sp], #32
AARCH64_AUTIASP
ret
.size ECP_Sm2ToMont,.-ECP_Sm2ToMont
.globl ECP_Sm2FromMont
.type ECP_Sm2FromMont,%function
.align 4
ECP_Sm2FromMont:
AARCH64_PACIASP
stp x29, x30,[sp, #-32]!
add x29,sp, #0
stp x19, x20,[sp, #16]
adrp x2, .Lone
add x2, x2,:lo12:.Lone
ldr x3, [x2]
ldp x4, x5,[x1]
ldp x6, x7,[x1, #16]
adrp x14, .Lpoly+8
add x14, x14,:lo12:.Lpoly+8
ldr x14, [x14]
adrp x15, .Lpoly+24
add x15, x15,:lo12:.Lpoly+24
ldr x15, [x15]
bl ECP_Sm2MulMont
ldp x19, x20,[sp, #16]
ldp x29, x30,[sp], #32
AARCH64_AUTIASP
ret
.size ECP_Sm2FromMont,.-ECP_Sm2FromMont
.type ECP_Sm2MulMont,%function
.align 4
ECP_Sm2MulMont:
AARCH64_PACIASP
// a[0~3] * b[0]
mul x8, x4, x3
umulh x16, x4, x3
mul x9, x5, x3
umulh x17, x5, x3
mul x10, x6, x3
umulh x19, x6, x3
mul x11, x7, x3
umulh x20, x7, x3
adds x9, x9, x16
adcs x10, x10, x17
adcs x11, x11, x19
adc x12, xzr, x20
ldr x3, [x2, #8] // get b[1]
// begin 1st reduce
lsl x19, x8, #32
lsr x20, x8, #32
subs x16, x8, x19
sbcs x17, xzr, x20
sbcs x19, xzr, x19
sbc x20, x8, x20
mov x13, xzr
adds x8, x9, x16
adcs x9, x10, x17
adcs x10, x11, x19
adcs x11, x12, x20
adc x12, x13, xzr
// lo(a[0~3]) * b[1]
mul x16, x4, x3
mul x17, x5, x3
mul x19, x6, x3
mul x20, x7, x3
adds x8, x8, x16
adcs x9, x9, x17
adcs x10, x10, x19
adcs x11, x11, x20
adc x12, x12, xzr
// hi(a[0~3]) * b[1]
umulh x16, x4, x3
umulh x17, x5, x3
umulh x19, x6, x3
umulh x20, x7, x3
adds x9, x9, x16
adcs x10, x10, x17
adcs x11, x11, x19
adcs x12, x12, x20
adc x13, xzr, xzr
ldr x3, [x2, #8*2] // get b[2]
// begin 2st reduce
lsl x19, x8, #32
lsr x20, x8, #32
subs x16, x8, x19
sbcs x17, xzr, x20
sbcs x19, xzr, x19
sbc x20, x8, x20
adds x8, x9, x16
adcs x9, x10, x17
adcs x10, x11, x19
adcs x11, x12, x20
adc x12, x13, xzr
// lo(a[0~3] * b[2])
mul x16, x4, x3
mul x17, x5, x3
mul x19, x6, x3
mul x20, x7, x3
adds x8, x8, x16
adcs x9, x9, x17
adcs x10, x10, x19
adcs x11, x11, x20
adc x12, x12, xzr
// hi(a[0~3] * b[2])
umulh x16, x4, x3
umulh x17, x5, x3
umulh x19, x6, x3
umulh x20, x7, x3
adds x9, x9, x16
adcs x10, x10, x17
adcs x11, x11, x19
adcs x12, x12, x20
adc x13, xzr, xzr
ldr x3,[x2, #8*3] // get b[3]
// begin 3st reduce
lsl x19, x8, #32
lsr x20, x8, #32
subs x16, x8, x19
sbcs x17, xzr, x20
sbcs x19, xzr, x19
sbc x20, x8, x20
adds x8, x9, x16
adcs x9, x10, x17
adcs x10, x11, x19
adcs x11, x12, x20
adc x12, x13, xzr
// lo(a[0~3] * b[3])
mul x16, x4, x3
mul x17, x5, x3
mul x19, x6, x3
mul x20, x7, x3
adds x8, x8, x16
adcs x9, x9, x17
adcs x10, x10, x19
adcs x11, x11, x20
adc x12, x12, xzr
// hi(a[0~3] * b[3])
umulh x16, x4, x3
umulh x17, x5, x3
umulh x19, x6, x3
umulh x20, x7, x3
adds x9, x9, x16
adcs x10, x10, x17
adcs x11, x11, x19
adcs x12, x12, x20
adc x13, xzr, xzr
lsl x19, x8, #32
lsr x20, x8, #32
// begin 4st reduce
subs x16, x8, x19
sbcs x17, xzr, x20
sbcs x19, xzr, x19
sbc x20, x8, x20
adds x8, x9, x16
adcs x9, x10, x17
adcs x10, x11, x19
adcs x11, x12, x20
adc x12, x13, xzr
// for cal res - p
adds x16, x8, #1 // - (0xffffffffffffffff) = (+1)
sbcs x17, x9, x14
adcs x19, x10, xzr
sbcs x20, x11, x15
sbcs xzr, x12, xzr
csel x8, x8, x16, lo
csel x9, x9, x17, lo
csel x10, x10, x19, lo
csel x11, x11, x20, lo
stp x8, x9,[x0]
stp x10, x11,[x0, #8*2]
AARCH64_AUTIASP
ret
.size ECP_Sm2MulMont,.-ECP_Sm2MulMont
.type ECP_Sm2SqrMont,%function
.align 4
ECP_Sm2SqrMont:
AARCH64_PACIASP
// a[1~3] * a[0]
mul x9, x5, x4
umulh x17, x5, x4
mul x10, x6, x4
umulh x19, x6, x4
mul x11, x7, x4
umulh x12, x7, x4
adds x10, x10, x17
adcs x11, x11, x19
adc x12, x12, xzr
// a[2~3] * a[1]
mul x16, x6, x5
umulh x17, x6, x5
mul x19, x7, x5
umulh x20, x7, x5
// a[3] * a[2]
mul x13, x7, x6
umulh x1, x7, x6
adds x17, x17, x19
adc x19, x20, xzr
adds x11, x11, x16
adcs x12, x12, x17
adcs x13, x13, x19
adc x1, x1, xzr
// a[0] * a[0]
mul x8, x4, x4
umulh x4, x4, x4
// a[1] * a[1]
mul x17, x5, x5
umulh x5, x5, x5
adds x9, x9, x9
adcs x10, x10, x10
adcs x11, x11, x11
adcs x12, x12, x12
adcs x13, x13, x13
adcs x1, x1, x1
adc x2, xzr, xzr
// a[2] * a[2]
mul x19, x6, x6
umulh x6, x6, x6
// a[3] * a[3]
mul x20, x7, x7
umulh x7, x7, x7
adds x9, x9, x4
adcs x10, x10, x17
adcs x11, x11, x5
adcs x12, x12, x19
adcs x13, x13, x6
adcs x1, x1, x20
adc x2, x2, x7
// begin 1st reduce
lsl x19, x8, #32
lsr x20, x8, #32
subs x16, x8, x19
sbcs x17, xzr, x20
sbcs x19, xzr, x19
sbc x20, x8, x20
adds x8, x9, x16
adcs x9, x10, x17
adcs x10, x11, x19
adc x11, xzr, x20
// begin 2st reduce
lsl x19, x8, #32
lsr x20, x8, #32
subs x16, x8, x19
sbcs x17, xzr, x20
sbcs x19, xzr, x19
sbc x20, x8, x20
adds x8, x9, x16
adcs x9, x10, x17
adcs x10, x11, x19
adc x11, xzr, x20
// begin 3st reduce
lsl x19, x8, #32
lsr x20, x8, #32
subs x16, x8, x19
sbcs x17, xzr, x20
sbcs x19, xzr, x19
sbc x20, x8, x20
adds x8, x9, x16
adcs x9, x10, x17
adcs x10, x11, x19
adc x11, xzr, x20
// begin 4st reduce
lsl x19, x8, #32
lsr x20, x8, #32
subs x16, x8, x19
sbcs x17, xzr, x20
sbcs x19, xzr, x19
sbc x20, x8, x20
adds x8, x9, x16
adcs x9, x10, x17
adcs x10, x11, x19
adc x11, xzr, x20
adds x8, x8, x12
adcs x9, x9, x13
adcs x10, x10, x1
adcs x11, x11, x2
adc x12, xzr, xzr
// for cal res - p
adds x16, x8, #1
sbcs x17, x9, x14
adcs x19, x10, xzr
sbcs x20, x11, x15
sbcs xzr, x12, xzr
csel x8, x8, x16, lo
csel x9, x9, x17, lo
csel x10, x10, x19, lo
csel x11, x11, x20, lo
stp x8, x9,[x0]
stp x10, x11,[x0, #16]
AARCH64_AUTIASP
ret
.size ECP_Sm2SqrMont,.-ECP_Sm2SqrMont
.type ECP_Sm2AddCore,%function
.align 4
ECP_Sm2AddCore:
AARCH64_PACIASP
adds x8, x8, x16
adcs x9, x9, x17
adcs x10, x10, x19
adcs x11, x11, x20
adc x1, xzr, xzr
// sum - p
adds x16, x8, #1
sbcs x17, x9, x14 // x14 = 0xffffffff00000000
adcs x19, x10, xzr
sbcs x20, x11, x15 // x15 = 0xfffffffeffffffff
sbcs xzr, x1, xzr
csel x8, x8, x16,lo
csel x9, x9, x17,lo
csel x10, x10, x19,lo
csel x11, x11, x20,lo
stp x8, x9, [x0]
stp x10, x11, [x0, #16]
AARCH64_AUTIASP
ret
.size ECP_Sm2AddCore,.-ECP_Sm2AddCore
.type ECP_Sm2DivBy2Core,%function
.align 4
ECP_Sm2DivBy2Core:
AARCH64_PACIASP
subs x16, x8, #1
adcs x17, x9, x14
sbcs x19, x10, xzr
adcs x20, x11, x15
adc x1, xzr, xzr
tst x8, #1
csel x8, x8, x16, eq
csel x9, x9, x17, eq
csel x10, x10, x19, eq
csel x11, x11, x20 ,eq
csel x1, xzr, x1, eq
lsr x8, x8, #1
orr x8, x8, x9, lsl#63
lsr x9, x9, #1
orr x9, x9, x10, lsl#63
lsr x10, x10, #1
orr x10, x10, x11, lsl#63
lsr x11, x11, #1
orr x11, x11, x1, lsl#63
stp x8, x9,[x0]
stp x10, x11, [x0, #16]
AARCH64_AUTIASP
ret
.size ECP_Sm2DivBy2Core,.-ECP_Sm2DivBy2Core
.type ECP_Sm2SubAB,%function
.align 4
ECP_Sm2SubAB:
AARCH64_PACIASP
ldp x16, x17,[x2]
ldp x19, x20,[x2, #16]
subs x8, x8, x16
sbcs x9, x9, x17
sbcs x10, x10, x19
sbcs x11, x11, x20
csetm x16, cc
adds x8, x8, x16
and x17, x16, x14
adcs x9, x9, x17
adcs x10, x10, x16
and x19, x16, x15
adc x11, x11, x19
stp x8, x9,[x0]
stp x10, x11,[x0, #16]
AARCH64_AUTIASP
ret
.size ECP_Sm2SubAB,.-ECP_Sm2SubAB
.type ECP_Sm2SubBA,%function
.align 4
ECP_Sm2SubBA:
AARCH64_PACIASP
ldp x16, x17,[x2]
ldp x19, x20,[x2, #16]
subs x8, x16, x8
sbcs x9, x17, x9
sbcs x10, x19, x10
sbcs x11, x20, x11
csetm x16, cc
adds x8, x8, x16
and x17, x16, x14
adcs x9, x9, x17
adcs x10, x10, x16
and x19, x16, x15
adc x11, x11, x19
stp x8, x9,[x0]
stp x10, x11,[x0, #16]
AARCH64_AUTIASP
ret
.size ECP_Sm2SubBA,.-ECP_Sm2SubBA
# ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#doubling-dbl-2001-b
# Deal process:
# delta = Z12
# gamma = Y12
# beta = X1*gamma
# alpha = 3*(X1-delta)*(X1+delta)
# X3 = alpha2-8*beta
# Z3 = (Y1+Z1)2-gamma-delta
# Y3 = alpha*(4*beta-X3)-8*gamma2
.globl ECP_Sm2PointDoubleMont
.type ECP_Sm2PointDoubleMont,%function
.align 4
ECP_Sm2PointDoubleMont:
AARCH64_PACIASP
stp x29, x30,[sp, #-80]!
mov x29, sp
stp x19, x20,[sp, #16]
stp x21, x22,[sp, #32]
sub sp, sp, #32*4
.Lpoint_double:
ldp x8, x9,[x1, #32] // a->y
ldp x10, x11,[x1, #32+16]
mov x21, x0
mov x22, x1 // backup point a
adrp x14, .Lpoly+8
add x14, x14,:lo12:.Lpoly+8 // p[1]
ldr x14, [x14]
adrp x15, .Lpoly+24
add x15, x15,:lo12:.Lpoly+24 // p[3]
ldr x15, [x15]
mov x16, x8
mov x17, x9
mov x19, x10
mov x20, x11
ldp x4, x5, [x22, #64] // a->z
ldp x6, x7, [x22, #64+16]
mov x0, sp
bl ECP_Sm2AddCore // s = 2 * a->y
add x0, sp, #64
bl ECP_Sm2SqrMont // zsqr = (a->z)^2
ldp x16, x17, [x22]
ldp x19, x20, [x22, #16]
mov x4, x8
mov x5, x9
mov x6, x10
mov x7, x11
add x0, sp, #32
bl ECP_Sm2AddCore // m = a->x + zsqr
add x2, x22, #0
mov x8, x4
mov x9, x5
ldp x4, x5,[sp, #0]
mov x10, x6
mov x11, x7
ldp x6, x7,[sp, #16]
add x0, sp, #64
bl ECP_Sm2SubBA // zsqr = a->x - zsqr
add x0, sp, #0
bl ECP_Sm2SqrMont // s = s^2
ldr x3, [x22, #32]
ldp x4, x5,[x22, #64]
ldp x6, x7,[x22, #64+16]
add x2, x22, #32 // a->y
add x0, sp, #96
bl ECP_Sm2MulMont // res_z = a->z * a->y
mov x16, x8
mov x17, x9
ldp x4, x5, [sp, #0]
mov x19, x10
mov x20, x11
ldp x6, x7, [sp, #16]
add x0, x21, #64
bl ECP_Sm2AddCore // res_z = 2 * res_z
add x0, sp, #96
bl ECP_Sm2SqrMont // res_y = s^2
ldr x3, [sp, #64]
ldp x4, x5, [sp, #32]
ldp x6, x7, [sp, #32+16]
add x0, x21, #32
bl ECP_Sm2DivBy2Core // res_y = res_y / 2
add x2, sp, #64
add x0, sp, #32
bl ECP_Sm2MulMont // m = m * zsqr
mov x16, x8
mov x17, x9
mov x19, x10
mov x20, x11
mov x4, x8
mov x5, x9
mov x6, x10
mov x7, x11
add x0, sp, #32
bl ECP_Sm2AddCore
mov x16, x4
mov x17, x5
ldr x3, [x22]
mov x19, x6
ldp x4, x5, [sp, #0]
mov x20, x7
ldp x6, x7, [sp, #16]
bl ECP_Sm2AddCore // m = 3 * m
mov x2, x22
add x0, sp, #0
bl ECP_Sm2MulMont // s = s * a->x
mov x16, x8
mov x17, x9
ldp x4, x5, [sp, #32]
mov x19, x10
mov x20, x11
ldp x6, x7, [sp, #32+16]
add x0, sp, #96
bl ECP_Sm2AddCore // tmp = 2 * s
mov x0, x21
bl ECP_Sm2SqrMont // res_x = m^2
add x2, sp, #96
bl ECP_Sm2SubAB // res_x = res_x - tmp
add x2, sp, #0
add x0, sp, #0
bl ECP_Sm2SubBA // s = s - res_x
ldr x3, [sp, #32]
mov x4, x8
mov x5, x9
mov x6, x10
mov x7, x11
add x2, sp, #32
bl ECP_Sm2MulMont // s = s * m
add x2, x21, #32
add x0, x21, #32
bl ECP_Sm2SubAB // res_y = s - res_y
mov sp, x29
ldp x19, x20,[x29, #16]
ldp x21, x22,[x29, #32]
ldp x29, x30,[sp], #80
AARCH64_AUTIASP
ret
.size ECP_Sm2PointDoubleMont,.-ECP_Sm2PointDoubleMont
# ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-1998-cmo
# Deal process:
# U1 = X1*Z22
# U2 = X2*Z12
# S1 = Y1*Z23
# S2 = Y2*Z13
# H = U2-U1
# r = S2-S1
# X3 = r2-H3-2*U1*H2
# Y3 = r*(U1*H2-X3)-S1*H3
# Z3 = Z1*Z2*H
.globl ECP_Sm2PointAddMont
.type ECP_Sm2PointAddMont,%function
.align 4
ECP_Sm2PointAddMont:
AARCH64_PACIASP
stp x29, x30,[sp, #-80]!
mov x29, sp
stp x19, x20,[sp, #16]
stp x21, x22,[sp, #32]
stp x23, x24,[sp, #48]
stp x25, x26,[sp, #64]
sub sp,sp, #32*12
ldp x4, x5,[x2, #64]
ldp x6, x7,[x2, #64+16]
mov x21, x0
mov x22, x1 // backup points
mov x23, x2
adrp x14, .Lpoly+8
add x14, x14,:lo12:.Lpoly+8 // p[1]
ldr x14, [x14]
adrp x15, .Lpoly+24
add x15, x15,:lo12:.Lpoly+24 // p[3]
ldr x15, [x15]
orr x16, x4, x5
orr x19, x6, x7
orr x25, x16, x19
cmp x25, #0
csetm x25, ne // check the point is(x, y, 0)
add x0, sp, #128
bl ECP_Sm2SqrMont // z1sqr = z1^2
ldp x4, x5,[x22, #64]
ldp x6, x7,[x22, #64+16]
orr x16, x4, x5
orr x19, x6, x7
orr x24, x16, x19
cmp x24, #0
csetm x24, ne // check the point is(x, y, 0)
add x0, sp, #224
bl ECP_Sm2SqrMont // z2sqr = z2^2
ldr x3, [x23, #64]
ldp x4, x5,[sp, #128]
ldp x6, x7,[sp, #128+16]
add x2, x23, #64
add x0,sp, #320
bl ECP_Sm2MulMont // s2 = z1^3
ldr x3,[x22, #64]
ldp x4, x5,[sp, #224]
ldp x6, x7,[sp, #224+16]
add x2, x22, #64
add x0,sp, #352
bl ECP_Sm2MulMont // s2 = y2 * z1^3
ldr x3,[x22, #32]
ldp x4, x5,[sp, #320]
ldp x6, x7,[sp, #320+16]
add x2, x22, #32
add x0,sp, #320
bl ECP_Sm2MulMont
ldr x3,[x23, #32]
ldp x4, x5,[sp, #352]
ldp x6, x7,[sp, #352+16]
add x2, x23, #32
add x0,sp, #352
bl ECP_Sm2MulMont
add x2,sp, #320
ldr x3,[sp, #128]
ldp x4, x5,[x22]
ldp x6, x7,[x22, #16]
add x0,sp, #96
bl ECP_Sm2SubAB
orr x8, x8, x9
orr x10, x10, x11
orr x26, x8, x10
add x2,sp, #128
add x0,sp, #256
bl ECP_Sm2MulMont
ldr x3,[sp, #224]
ldp x4, x5,[x23]
ldp x6, x7,[x23, #16]
add x2,sp, #224
add x0,sp, #288
bl ECP_Sm2MulMont
add x2,sp, #256
ldp x4, x5,[sp, #96]
ldp x6, x7,[sp, #96+16]
add x0,sp, #192
bl ECP_Sm2SubAB
orr x8, x8, x9
orr x10, x10, x11
orr x8, x8, x10
tst x8, x8
b.ne .Ladd_proceed
tst x24, x25
b.eq .Ladd_proceed
tst x26, x26
b.eq .Ladd_double
stp xzr, xzr,[x21]
stp xzr, xzr,[x21, #16]
stp xzr, xzr,[x21, #32]
stp xzr, xzr,[x21, #48]
stp xzr, xzr,[x21, #64]
stp xzr, xzr,[x21, #80]
b .Ladd_done
.align 4
.Ladd_double:
mov x1, x22
mov x0, x21
ldp x23, x24,[x29, #48]
ldp x25, x26,[x29, #64]
add sp,sp, #32*(12-4)
b .Lpoint_double
.align 4
.Ladd_proceed:
add x0,sp, #128
bl ECP_Sm2SqrMont
ldr x3,[x22, #64]
ldp x4, x5,[sp, #192]
ldp x6, x7,[sp, #192+16]
add x2, x22, #64
add x0,sp, #64
bl ECP_Sm2MulMont
ldp x4, x5,[sp, #192]
ldp x6, x7,[sp, #192+16]
add x0,sp, #224
bl ECP_Sm2SqrMont
ldr x3,[x23, #64]
ldp x4, x5,[sp, #64]
ldp x6, x7,[sp, #64+16]
add x2, x23, #64
add x0,sp, #64
bl ECP_Sm2MulMont
ldr x3,[sp, #192]
ldp x4, x5,[sp, #224]
ldp x6, x7,[sp, #224+16]
add x2,sp, #192
add x0,sp, #160
bl ECP_Sm2MulMont
ldr x3,[sp, #224]
ldp x4, x5,[sp, #256]
ldp x6, x7,[sp, #256+16]
add x2,sp, #224
add x0,sp, #288
bl ECP_Sm2MulMont
mov x16, x8
mov x17, x9
mov x19, x10
mov x20, x11
add x0,sp, #224
bl ECP_Sm2AddCore
add x2,sp, #128
add x0,sp, #0
bl ECP_Sm2SubBA
add x2,sp, #160
bl ECP_Sm2SubAB
add x2,sp, #288
ldr x3,[sp, #160]
ldp x4, x5,[sp, #320]
ldp x6, x7,[sp, #320+16]
add x0,sp, #32
bl ECP_Sm2SubBA
add x2,sp, #160
add x0,sp, #352
bl ECP_Sm2MulMont
ldr x3,[sp, #96]
ldp x4, x5,[sp, #32]
ldp x6, x7,[sp, #32+16]
add x2,sp, #96
add x0,sp, #32
bl ECP_Sm2MulMont
add x2,sp, #352
bl ECP_Sm2SubAB
ldp x4, x5,[sp, #0]
ldp x6, x7,[sp, #16]
ldp x16, x17,[x23]
ldp x19, x20,[x23, #16]
ldp x8, x9,[x22, #0]
cmp x24, #0
csel x16, x4, x16,ne
csel x17, x5, x17,ne
csel x19, x6, x19,ne
csel x20, x7, x20,ne
cmp x25, #0
csel x8, x16, x8,ne
csel x9, x17, x9,ne
csel x10, x19, x10,ne
csel x11, x20, x11,ne
stp x8, x9,[x21, #0]
stp x10, x11,[x21, #16]
ldp x10, x11,[x22, #16]
ldp x4, x5,[sp, #32]
ldp x6, x7,[sp, #48]
ldp x16, x17,[x23, #32]
ldp x19, x20,[x23, #48]
ldp x8, x9,[x22, #32]
cmp x24, #0
csel x16, x4, x16,ne
csel x17, x5, x17,ne
csel x19, x6, x19,ne
csel x20, x7, x20,ne
cmp x25, #0
csel x8, x16, x8,ne
csel x9, x17, x9,ne
csel x10, x19, x10,ne
csel x11, x20, x11,ne
stp x8, x9,[x21, #32]
stp x10, x11,[x21, #32+16]
ldp x10, x11,[x22, #32+16]
ldp x8, x9, [x22, #64]
ldp x16, x17,[x23, #32+32]
ldp x19, x20,[x23, #32+48]
ldp x4, x5,[sp, #32+32]
ldp x6, x7,[sp, #32+48]
cmp x24, #0
ldp x10, x11,[x22, #64+16]
csel x16, x4, x16,ne
csel x17, x5, x17,ne
csel x19, x6, x19,ne
csel x20, x7, x20,ne
cmp x25, #0
csel x8, x16, x8, ne
csel x9, x17, x9, ne
csel x10, x19, x10, ne
csel x11, x20, x11, ne
stp x8, x9,[x21, #64]
stp x10, x11,[x21, #64+16]
.Ladd_done:
mov sp, x29
ldp x19, x20,[x29, #16]
ldp x21, x22,[x29, #32]
ldp x23, x24,[x29, #48]
ldp x25, x26,[x29, #64]
ldp x29, x30,[sp], #80
AARCH64_AUTIASP
ret
.size ECP_Sm2PointAddMont,.-ECP_Sm2PointAddMont
# ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2007-bl
# Deal process:
# Z1Z1 = Z12
# U2 = X2*Z1Z1
# S2 = Y2*Z1*Z1Z1
# H = U2-X1
# HH = H2
# I = 4*HH
# J = H*I
# r = 2*(S2-Y1)
# V = X1*I
# X3 = r2-J-2*V
# Y3 = r*(V-X3)-2*Y1*J
# Z3 = (Z1+H)2-Z1Z1-HH
.globl ECP_Sm2PointAddAffineMont
.type ECP_Sm2PointAddAffineMont,%function
.align 4
ECP_Sm2PointAddAffineMont:
AARCH64_PACIASP
stp x29, x30,[sp, #-80]!
mov x29, sp
stp x19, x20,[sp, #16]
stp x21, x22,[sp, #32]
stp x23, x24,[sp, #48]
stp x25, x26,[sp, #64]
sub sp, sp, #32*10
mov x21, x0 // backup r
mov x22, x1 // point a
mov x23, x2 // point b
adrp x14, .Lpoly+8
add x14, x14,:lo12:.Lpoly+8
ldr x14,[x14]
adrp x15, .Lpoly+24
add x15, x15,:lo12:.Lpoly+24
ldr x15,[x15]
ldp x4, x5,[x1, #64] // &(a->z[0]), a->z[0] is marked as z1[0]
ldp x6, x7,[x1, #64+16] // &(a->z[2])
orr x16, x4, x5
orr x19, x6, x7
orr x24, x16, x19
cmp x24, #0
csetm x24, ne // check is (x, y 0)
ldp x8, x9, [x2] // &(b->x[0])
ldp x10, x11, [x2, #16] // &(b->x[2])
ldp x16, x17, [x2, #32] // &(b->y[0])
ldp x19, x20, [x2, #48] // &(b->y[2])
orr x8, x8, x9
orr x10, x10, x11
orr x16, x16, x17
orr x19, x19, x20
orr x8, x8, x10
orr x16, x16, x19
orr x25, x8, x16
cmp x25, #0
csetm x25, ne // check is (x, y 0)
add x0, sp, #128
bl ECP_Sm2SqrMont // zsqr = z1^2
mov x4, x8
mov x5, x9
mov x6, x10
mov x7, x11
ldr x3, [x23]
mov x2, x23
add x0, sp, #96
bl ECP_Sm2MulMont // u2 = z1^2 * x2
mov x2, x22
ldr x3, [x22, #64]
ldp x4, x5, [sp, #128]
ldp x6, x7, [sp, #128+16]
add x0,sp, #160
bl ECP_Sm2SubAB
add x2, x22, #64
add x0,sp, #128
bl ECP_Sm2MulMont
ldr x3,[x22, #64]
ldp x4, x5,[sp, #160]
ldp x6, x7,[sp, #160+16]
add x2, x22, #64
add x0,sp, #64
bl ECP_Sm2MulMont
ldr x3,[x23, #32]
ldp x4, x5,[sp, #128]
ldp x6, x7,[sp, #128+16]
add x2, x23, #32
add x0,sp, #128
bl ECP_Sm2MulMont
add x2, x22, #32
ldp x4, x5,[sp, #160]
ldp x6, x7,[sp, #160+16]
add x0,sp, #192
bl ECP_Sm2SubAB
add x0,sp, #224
bl ECP_Sm2SqrMont
ldp x4, x5,[sp, #192]
ldp x6, x7,[sp, #192+16]
add x0,sp, #288
bl ECP_Sm2SqrMont
ldr x3,[sp, #160]
ldp x4, x5,[sp, #224]
ldp x6, x7,[sp, #224+16]
add x2,sp, #160
add x0,sp, #256
bl ECP_Sm2MulMont
ldr x3,[x22]
ldp x4, x5,[sp, #224]
ldp x6, x7,[sp, #224+16]
mov x2, x22
add x0,sp, #96
bl ECP_Sm2MulMont
mov x16, x8
mov x17, x9
mov x19, x10
mov x20, x11
add x0,sp, #224
bl ECP_Sm2AddCore
add x2,sp, #288
add x0,sp, #0
bl ECP_Sm2SubBA
add x2,sp, #256
bl ECP_Sm2SubAB
add x2,sp, #96
ldr x3,[x22, #32]
ldp x4, x5,[sp, #256]
ldp x6, x7,[sp, #256+16]
add x0,sp, #32
bl ECP_Sm2SubBA
add x2, x22, #32
add x0,sp, #128
bl ECP_Sm2MulMont
ldr x3,[sp, #192]
ldp x4, x5,[sp, #32]
ldp x6, x7,[sp, #32+16]
add x2,sp, #192
add x0,sp, #32
bl ECP_Sm2MulMont
add x2,sp, #128
bl ECP_Sm2SubAB
ldp x4, x5,[sp, #0]
ldp x6, x7,[sp, #16]
ldp x16, x17,[x23]
ldp x19, x20,[x23, #16]
ldp x8, x9,[x22, #0]
cmp x24, #0
ldp x10, x11,[x22, #16]
csel x16, x4, x16, ne
csel x17, x5, x17, ne
csel x19, x6, x19, ne
csel x20, x7, x20, ne
cmp x25, #0
csel x8, x16, x8,ne
csel x9, x17, x9,ne
csel x10, x19, x10,ne
csel x11, x20, x11,ne
ldp x4, x5,[sp, #32]
ldp x6, x7,[sp, #48]
ldp x16, x17,[x23, #32]
ldp x19, x20,[x23, #48]
stp x8, x9,[x21, #0]
stp x10, x11,[x21, #16]
ldp x8, x9,[x22, #32]
cmp x24, #0
ldp x10, x11,[x22, #32+16]
csel x16, x4, x16,ne
csel x17, x5, x17,ne
csel x19, x6, x19,ne
csel x20, x7, x20,ne
cmp x25, #0
csel x8, x16, x8,ne
csel x9, x17, x9,ne
csel x10, x19, x10,ne
csel x11, x20, x11,ne
stp x8, x9,[x21, #32]
stp x10, x11,[x21, #32+16]
ldp x4, x5,[sp, #32+32]
ldp x6, x7,[sp, #32+48]
adrp x23, .Lone_mont
add x23,x23,:lo12:.Lone_mont
ldp x16, x17,[x23]
ldp x19, x20,[x23, #16]
ldp x8, x9,[x22, #64]
ldp x10, x11,[x22, #64+16]
cmp x24, #0
csel x16, x4, x16, ne
csel x17, x5, x17, ne
csel x19, x6, x19, ne
csel x20, x7, x20, ne
cmp x25, #0
csel x8, x16, x8, ne
csel x9, x17, x9, ne
csel x10, x19, x10, ne
csel x11, x20, x11, ne
stp x8, x9, [x21, #64]
stp x10, x11, [x21, #64+16]
mov sp, x29
ldp x19, x20,[x29, #16]
ldp x21, x22,[x29, #32]
ldp x23, x24,[x29, #48]
ldp x25, x26,[x29, #64]
ldp x29, x30,[sp], #80
AARCH64_AUTIASP
ret
.size ECP_Sm2PointAddAffineMont,.-ECP_Sm2PointAddAffineMont
#endif
|
2301_79861745/bench_create
|
crypto/ecc/src/asm/ecp_sm2_armv8.S
|
Unix Assembly
|
unknown
| 42,773
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_CURVE_SM2
.file "ecp_sm2_x86_64.S"
.text
.set s0,%r8
.set s1,%r9
.set s2,%r10
.set s3,%r11
.set s4,%r12
.set s5,%r13
.set s6,%r14
.set s7,%r15
.macro REGISTER_SAVE
pushq %r12
pushq %r13
pushq %r14
pushq %r15
pushq %rbx
pushq %rbp
.endm
.macro REGISTER_POP
popq %rbp
popq %rbx
popq %r15
popq %r14
popq %r13
popq %r12
.endm
# The polynomial
.align 64
.Lpoly:
.quad 0xffffffffffffffff, 0xffffffff00000000, 0xffffffffffffffff, 0xfffffffeffffffff
# The order of polynomial
.Lord:
.quad 0x53bbf40939d54123, 0x7203df6b21c6052b, 0xffffffffffffffff, 0xfffffffeffffffff
.Lpoly_div_2:
.quad 0x8000000000000000, 0xffffffff80000000, 0xffffffffffffffff, 0x7fffffff7fffffff
.Lord_div_2:
.quad 0xa9ddfa049ceaa092, 0xb901efb590e30295, 0xffffffffffffffff, 0x7fffffff7fffffff
.Lzero:
.quad 0, 0, 0, 0
.Lord_1div4:
.quad 0xd4eefd024e755049, 0xdc80f7dac871814a, 0xffffffffffffffff, 0x3fffffffbfffffff
.Lord_2div4:
.quad 0xa9ddfa049ceaa092, 0xb901efb590e30295, 0xffffffffffffffff, 0x7fffffff7fffffff
.Lord_3div4:
.quad 0x7eccf706eb5ff0db, 0x9582e790595483e0, 0xffffffffffffffff, 0xbfffffff3fffffff
.Lpoly_1div4:
.quad 0x4000000000000000, 0xffffffffc0000000, 0xffffffffffffffff, 0x3fffffffbfffffff
.Lpoly_2div4:
.quad 0x8000000000000000, 0xffffffff80000000, 0xffffffffffffffff, 0x7fffffff7fffffff
.Lpoly_3div4:
.quad 0xc000000000000000, 0xffffffff40000000, 0xffffffffffffffff, 0xbfffffff3fffffff
.LRR:// 2^512 mod P precomputed for sm2 polynomial
.quad 0x0000000200000003, 0x00000002ffffffff, 0x0000000100000001, 0x0000000400000002
.Lone_mont:
.quad 0x0000000000000001, 0x00000000ffffffff, 0x0000000000000000, 0x0000000100000000
.Lone:
.quad 1,0,0,0
.LOne:
.long 1,1,1,1,1,1,1,1
.globl ECP_Sm2Div2
.type ECP_Sm2Div2,@function
.align 64
ECP_Sm2Div2:
movq (%rdi),%r8
movq 8(%rdi),%r9
movq 16(%rdi),%r10
movq 24(%rdi),%r11
shrdq $1,%r9,%r8
shrdq $1,%r10,%r9
shrdq $1,%r11,%r10
shrq $1,%r11
movq %r8,(%rdi)
movq %r9,8(%rdi)
movq %r10,16(%rdi)
movq %r11,24(%rdi)
ret
.size ECP_Sm2Div2, .-ECP_Sm2Div2
.globl ECP_Sm2Div4
.type ECP_Sm2Div4,@function
.align 64
ECP_Sm2Div4:
movq (%rdi),%r8
movq 8(%rdi),%r9
movq 16(%rdi),%r10
movq 24(%rdi),%r11
shrdq $2,%r9,%r8
shrdq $2,%r10,%r9
shrdq $2,%r11,%r10
shrq $2,%r11
movq %r8,(%rdi)
movq %r9,8(%rdi)
movq %r10,16(%rdi)
movq %r11,24(%rdi)
ret
.size ECP_Sm2Div4, .-ECP_Sm2Div4
.globl ECP_Sm2Neg
.type ECP_Sm2Neg,@function
.align 64
ECP_Sm2Neg:
movq (%rdi),%r8
xorq %rax,%rax
movq $-1,%r8
movq $0xffffffff00000000,%r9
movq $0xfffffffeffffffff,%r11
movq $-1,%r10
subq 0(%rsi),%r8
sbbq 8(%rsi),%r9
sbbq 16(%rsi),%r10
sbbq 24(%rsi),%r11
movq %r8,(%rdi)
movq %r9,8(%rdi)
movq %r10,16(%rdi)
movq %r11,24(%rdi)
ret
.size ECP_Sm2Neg, .-ECP_Sm2Neg
.globl ECP_Sm2BnSub
.type ECP_Sm2BnSub,@function
.align 64
ECP_Sm2BnSub:
movq (%rsi),%r8
movq 8(%rsi),%r9
movq 16(%rsi),%r10
movq 24(%rsi),%r11
subq (%rdx),%r8
sbbq 8(%rdx),%r9
sbbq 16(%rdx),%r10
sbbq 24(%rdx),%r11
movq %r8,(%rdi)
movq %r9,8(%rdi)
movq %r10,16(%rdi)
movq %r11,24(%rdi)
ret
.size ECP_Sm2BnSub, .-ECP_Sm2BnSub
.globl ECP_Sm2BnAdd
.type ECP_Sm2BnAdd,@function
.align 64
ECP_Sm2BnAdd:
movq (%rsi),%r8
movq 8(%rsi),%r9
movq 16(%rsi),%r10
movq 24(%rsi),%r11
addq (%rdx),%r8
adcq 8(%rdx),%r9
adcq 16(%rdx),%r10
adcq 24(%rdx),%r11
movq %r8,(%rdi)
movq %r9,8(%rdi)
movq %r10,16(%rdi)
movq %r11,24(%rdi)
ret
.size ECP_Sm2BnAdd, .-ECP_Sm2BnAdd
.globl ECP_Sm2Div2ModP
.type ECP_Sm2Div2ModP,@function
.align 64
ECP_Sm2Div2ModP:
subq $24,%rsp
movq %rbx,(%rsp)
movq %r12,8(%rsp)
movq %r13,16(%rsp)
xorq %r12,%r12
movq (%rsi),%r8
movq 8(%rsi),%r9
movq 16(%rsi),%r10
movq 24(%rsi),%r11
movq %r8,%r13
andq $1,%r13
shrdq $1,%r9,%r8
shrdq $1,%r10,%r9
shrdq $1,%r11,%r10
shrdq $1,%r12,%r11
leaq .Lzero(%rip),%rax
leaq .Lpoly_div_2(%rip),%rbx
cmpq $1,%r13
cmoveq %rbx,%rax
addq (%rax),%r8
adcq 8(%rax),%r9
adcq 16(%rax),%r10
adcq 24(%rax),%r11
movq %r8,(%rdi)
movq %r9,8(%rdi)
movq %r10,16(%rdi)
movq %r11,24(%rdi)
movq (%rsp),%rbx
movq 8(%rsp),%r12
movq 16(%rsp),%r13
addq $24,%rsp
ret
.size ECP_Sm2Div2ModP, .-ECP_Sm2Div2ModP
.globl ECP_Sm2Div2ModOrd
.type ECP_Sm2Div2ModOrd,@function
.align 64
ECP_Sm2Div2ModOrd:
subq $24,%rsp
movq %rbx,(%rsp)
movq %r12,8(%rsp)
movq %r13,16(%rsp)
xorq %r12,%r12
movq (%rsi),%r8
movq 8(%rsi),%r9
movq 16(%rsi),%r10
movq 24(%rsi),%r11
movq %r8,%r13
andq $1,%r13
shrdq $1,%r9,%r8
shrdq $1,%r10,%r9
shrdq $1,%r11,%r10
shrdq $1,%r12,%r11
leaq .Lzero(%rip),%rax
leaq .Lord_div_2(%rip),%rbx
cmpq $1,%r13
cmoveq %rbx,%rax
addq (%rax),%r8
adcq 8(%rax),%r9
adcq 16(%rax),%r10
adcq 24(%rax),%r11
movq %r8,(%rdi)
movq %r9,8(%rdi)
movq %r10,16(%rdi)
movq %r11,24(%rdi)
movq (%rsp),%rbx
movq 8(%rsp),%r12
movq 16(%rsp),%r13
addq $24,%rsp
ret
.size ECP_Sm2Div2ModOrd, .-ECP_Sm2Div2ModOrd
.globl ECP_Sm2Div4ModP
.type ECP_Sm2Div4ModP,@function
.align 64
ECP_Sm2Div4ModP:
subq $24,%rsp
movq %rbx,(%rsp)
movq %r12,8(%rsp)
movq %r13,16(%rsp)
xorq %r12,%r12
movq (%rsi),%r8
movq 8(%rsi),%r9
movq 16(%rsi),%r10
movq 24(%rsi),%r11
movq %r8,%r13
andq $3,%r13
shrdq $2,%r9,%r8
shrdq $2,%r10,%r9
shrdq $2,%r11,%r10
shrdq $2,%r12,%r11
leaq .Lzero(%rip),%rax
leaq .Lpoly_1div4(%rip),%rbx
leaq .Lpoly_2div4(%rip),%rcx
leaq .Lpoly_3div4(%rip),%rdx
cmpq $1,%r13
cmoveq %rbx,%rax
cmpq $2,%r13
cmoveq %rcx,%rax
cmpq $3,%r13
cmoveq %rdx,%rax
addq (%rax),%r8
adcq 8(%rax),%r9
adcq 16(%rax),%r10
adcq 24(%rax),%r11
movq %r8,(%rdi)
movq %r9,8(%rdi)
movq %r10,16(%rdi)
movq %r11,24(%rdi)
movq (%rsp),%rbx
movq 8(%rsp),%r12
movq 16(%rsp),%r13
addq $24,%rsp
ret
.size ECP_Sm2Div4ModP, .-ECP_Sm2Div4ModP
.globl ECP_Sm2Div4ModOrd
.type ECP_Sm2Div4ModOrd,@function
.align 64
ECP_Sm2Div4ModOrd:
subq $24,%rsp
movq %rbx,(%rsp)
movq %r12,8(%rsp)
movq %r13,16(%rsp)
xorq %r12,%r12
movq (%rsi),%r8
movq 8(%rsi),%r9
movq 16(%rsi),%r10
movq 24(%rsi),%r11
movq %r8,%r13
andq $3,%r13
shrdq $2,%r9,%r8
shrdq $2,%r10,%r9
shrdq $2,%r11,%r10
shrdq $2,%r12,%r11
leaq .Lzero(%rip),%rax
leaq .Lord_1div4(%rip),%rbx
leaq .Lord_2div4(%rip),%rcx
leaq .Lord_3div4(%rip),%rdx
cmpq $1,%r13
cmoveq %rbx,%rax
cmpq $2,%r13
cmoveq %rcx,%rax
cmpq $3,%r13
cmoveq %rdx,%rax
addq (%rax),%r8
adcq 8(%rax),%r9
adcq 16(%rax),%r10
adcq 24(%rax),%r11
movq %r8,(%rdi)
movq %r9,8(%rdi)
movq %r10,16(%rdi)
movq %r11,24(%rdi)
movq (%rsp),%rbx
movq 8(%rsp),%r12
movq 16(%rsp),%r13
addq $24,%rsp
ret
.size ECP_Sm2Div4ModOrd, .-ECP_Sm2Div4ModOrd
#define bn_mod_add(mod) \
/* Store scalar registers */ \
subq $32, %rsp; \
movq %r12, (%rsp); \
movq %r13, 8(%rsp); \
movq %r14, 16(%rsp); \
movq %r15, 24(%rsp); \
xorq %rax, %rax; \
/* Load inputs */ \
movq (%rsi), %r8; \
movq 8(%rsi), %r9; \
movq 16(%rsi), %r10; \
movq 24(%rsi), %r11; \
/* Addition */ \
addq (%rdx), %r8; \
adcq 8(%rdx), %r9; \
adcq 16(%rdx), %r10; \
adcq 24(%rdx), %r11; \
/* Store carry */ \
adcq $0, %rax; \
movq %r8, %r12; \
movq %r9, %r13; \
movq %r10, %r14; \
movq %r11, %r15; \
/* Sub polynomial */ \
leaq mod, %rsi; \
subq 0(%rsi), %r8; \
sbbq 8(%rsi), %r9; \
sbbq 16(%rsi), %r10; \
sbbq 24(%rsi), %r11; \
sbbq $0, %rax; \
cmovcq %r12, %r8; \
cmovcq %r13, %r9; \
cmovcq %r14, %r10; \
cmovcq %r15, %r11; \
/* Store results */ \
movq %r8, (%rdi); \
movq %r9, 8(%rdi); \
movq %r10, 16(%rdi); \
movq %r11, 24(%rdi); \
/* Restore scalar registers */ \
movq (%rsp), %r12; \
movq 8(%rsp), %r13; \
movq 16(%rsp), %r14; \
movq 24(%rsp), %r15; \
addq $32, %rsp; \
#define bn_mod_sub(mod) \
/* Store scalar registers */ \
subq $32, %rsp; \
movq %r12, (%rsp); \
movq %r13, 8(%rsp); \
movq %r14, 16(%rsp); \
movq %r15, 24(%rsp); \
xorq %rax, %rax; \
/* Load inputs */ \
movq (%rsi), %r8; \
movq 8(%rsi), %r9; \
movq 16(%rsi), %r10; \
movq 24(%rsi), %r11; \
/* Subtraction */ \
subq (%rdx), %r8; \
sbbq 8(%rdx), %r9; \
sbbq 16(%rdx), %r10; \
sbbq 24(%rdx), %r11; \
sbbq $0, %rax; \
movq %r8, %r12; \
movq %r9, %r13; \
movq %r10, %r14; \
movq %r11, %r15; \
/* Add polynomial */ \
leaq mod, %rsi; \
addq 0(%rsi), %r8; \
adcq 8(%rsi), %r9; \
adcq 16(%rsi), %r10; \
adcq 24(%rsi), %r11; \
testq %rax, %rax; \
cmovzq %r12, %r8; \
cmovzq %r13, %r9; \
cmovzq %r14, %r10; \
cmovzq %r15, %r11; \
/* Store results */ \
movq %r8, (%rdi); \
movq %r9, 8(%rdi); \
movq %r10, 16(%rdi); \
movq %r11, 24(%rdi); \
/* Restore scalar registers */ \
movq (%rsp), %r12; \
movq 8(%rsp), %r13; \
movq 16(%rsp), %r14; \
movq 24(%rsp), %r15; \
addq $32, %rsp; \
### Modular add: r = a+b mod n/p, where n = ord(p) ###
# void ECP_Sm2AddModP(uint64_t *r, const uint64_t *a, const uint64_t *b)
# Modular poly add
# r %rdi
# a %rsi
# b %rdx
.globl ECP_Sm2AddModP
.type ECP_Sm2AddModP, @function
.align 64
ECP_Sm2AddModP:
bn_mod_add(.Lpoly(%rip))
ret
.size ECP_Sm2AddModP, .-ECP_Sm2AddModP
# void ECP_Sm2AddModOrd(uint64_t *r, const uint64_t *a, const uint64_t *b)
# Modular order add
# r %rdi
# a %rsi
# b %rdx
.globl ECP_Sm2AddModOrd
.type ECP_Sm2AddModOrd, @function
.align 64
ECP_Sm2AddModOrd:
bn_mod_add(.Lord(%rip))
ret
.size ECP_Sm2AddModOrd, .-ECP_Sm2AddModOrd
### Modular sub: r = a-b mod n/p, where n = ord(p) ###
# void ECP_Sm2SubModP(uint64_t *r, const uint64_t *a, const uint64_t *b)
# Modular poly sub
# r %rdi
# a %rsi
# b %rdx
.globl ECP_Sm2SubModP
.type ECP_Sm2SubModP, @function
.align 64
ECP_Sm2SubModP:
bn_mod_sub(.Lpoly(%rip))
ret
.size ECP_Sm2SubModP, .-ECP_Sm2SubModP
# void ECP_Sm2SubModOrd(uint64_t *r, const uint64_t *a, const uint64_t *b)
# Modular order sub
# r %rdi
# a %rsi
# b %rdx
.globl ECP_Sm2SubModOrd
.type ECP_Sm2SubModOrd, @function
.align 64
ECP_Sm2SubModOrd:
bn_mod_sub(.Lord(%rip))
ret
.size ECP_Sm2SubModOrd, .-ECP_Sm2SubModOrd
.macro RDC
# r = a mod p256
# a = a15 | a14 | ... | a0, where ai are 32–bit quantities
# | a7 | a6 | a5 | a4 | a3 | a2 | a1 | a0 | (+)
# | a8 | a11 | a10 | a9 | a8 | 0 | a9 | a8 | (+)
# | a9 | a14 | a13 | a12 | a11 | 0 | a10 | a9 | (+)
# | a10 | a15 | a14 | a13 | a12 | 0 | a11 | a10 | (+)
# | a11 | 0 | a15 | a14 | a13 | 0 | a12 | a11 | (+)
# | a12 | 0 | a15 | a14 | a13 | 0 | a13 | a12 | (+)
# | a12 | 0 | 0 | a15 | a14 | 0 | a14 | a13 | (+)
# | a13 | 0 | 0 | 0 | a15 | 0 | a14 | a13 | (+)
# | a13 | 0 | 0 | 0 | 0 | 0 | a15 | a14 | (+)
# | a14 | 0 | 0 | 0 | 0 | 0 | a15 | a14 | (+)
# | a14 | 0 | 0 | 0 | 0 | 0 | 0 | a15 | (+)
# | a15 | 0 | 0 | 0 | 0 | 0 | 0 | a15 | (+)
# | a15 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | (+)
# | a15 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | (+)
# | 0 | 0 | 0 | 0 | 0 | a8 | 0 | 0 | (-)
# | 0 | 0 | 0 | 0 | 0 | a9 | 0 | 0 | (-)
# | 0 | 0 | 0 | 0 | 0 | a13 | 0 | 0 | (-)
# | 0 | 0 | 0 | 0 | 0 | a14 | 0 | 0 | (-)
# | U[7]| U[6]| U[5]| U[4]| U[3]| U[2]| U[1]| U[0]|
# | V[3] | V[2] | V[1] | V[0] |
# until r < p256
# s7 (a15|a14), s6 (a13|a12), s5 (a11|a10), s4 (a9|a8)
# s3 (a7|a6), s2 (a5|a4), s1 (a3|a2), s0 (a1|a0)
# 1. 64-bit addition
xorq %rsi, %rsi # to store all carry
xorq %rax, %rax
movq s6, %rcx # rcx <- s6
movq s4, %rdx # rdx <- s4
# a13 | a12
addq s7, %rcx # rcx <- s6 + s7
adcq $0, %rax # rax <- carry(s6+s7)
addq s7, %rcx # rcx <- s6 + 2*s7
adcq $0, %rax
# a9 | a8
movq %rax, %rbx # rbx <- carry (rax)
addq %rcx, %rdx # rdx <- s4 + s6 + 2*s7
adcq $0, %rbx
addq s5, %rdx # rdx <- s4 + s5 + s6 + 2*s7
adcq $0, %rbx
# sum
addq %rdx, s0 # s0 <- s0 + s4 + s5 + s6 + 2*s7
adcq %rbx, s1 # s1 <- s1 + rbx + carry
adcq %rcx, s2 # s2 <- s2 + s6 + 2*s7 + carry
adcq s7, s3 # s3 <- s3 + s7 + carry
adcq $0, %rsi
# add carry
addq %rax, s3
adcq $0, %rsi # rsi <- carry
# store registers
movq s0, (%rsp)
movq s1, 8(%rsp)
movq s2, 16(%rsp)
movq s3, 24(%rsp)
# 2. 4 -> 8 64-bit to 32-bit spread
movq $0xffffffff, %rax
movq s4, s0
movq s5, s1
movq s6, s2
movq s7, s3
andq %rax, s0 # a8
andq %rax, s1 # a10
andq %rax, s2 # a12
andq %rax, s3 # a14
shrq $32, s4 # a9
shrq $32, s5 # a11
shrq $32, s6 # a13
shrq $32, s7 # a15
# 3. 32-bit addition
movq s3, %rax
addq s2, %rax # rax <- a12 + a14
movq s3, %rbx
addq s1, %rbx # rbx <- a10 + a14
movq s7, %rcx
addq s6, %rcx # rcx <- a13 + a15
movq s0, %rdx
addq s4, %rdx # rdx <- a8 + a9
addq s5, s7 # s7 <- a11 + a15
movq %rcx, s2 # s2 <- a13 + a15
addq %rax, s2 # s2 <- a12 + a13 + a14 + a15
addq s2, s1 # s1 <- a10 + a12 + a13 + a14 + a15
addq s2, s1 # s1 <- a10 + 2*(a12 + a13 + a14 + a15)
addq %rdx, s1 # s1 <- a8 + a9 + a10 + 2*(a12 + a13 + a14 + a15)
addq s5, s1 # s1 <- a8 + a9 + a10 + a11 + 2*(a12 + a13 + a14 + a15)
addq s6, s2 # s2 <- a12 + 2*a13 + a14 + a15
addq s5, s2 # s2 <- a11 + a12 + 2*a13 + a14 + a15
addq s0, s2 # s2 <- a8 + a11 + a12 + 2*a13 + a14 + a15
addq s3, %rdx # rdx <- a8 + a9 + a14
addq s6, %rdx # rdx <- a8 + a9 + a13 + a14
addq %rcx, s4 # s4 <- a9 + a13 + a15
addq s4, s5 # s5 <- a9 + a11 + a13 + a15
addq %rcx, s5 # s5 <- a9 + a11 + 2*(a13 + a15)
addq %rbx, %rax # rax <- a10 + a12 + 2*a14
# U[0] s5 a9 + a11 + 2*(a13 + a15)
# U[1] %rax a10 + a12 + 2*a14
# U[2]
# U[3] s2 a8 + a11 + a12 + 2*a13 + a14 + a15
# U[4] s4 a9 + a13 + a15
# U[5] %rbx a10 + a14
# U[6] s7 a11 + a15
# U[7] s1 a8 + a9 + a10 + a11 + 2*(a12 + a13 + a14 + a15)
# sub %rdx a8 + a9 + a13 + a14
# vacant registers: s0 s3 s6 %rcx
# 4. 8 -> 4 32-bit to 64-bit
# sub %rdx
movq %rax, s0
shlq $32, s0 # U[1]'(s0) <- U[1] << 32
shrd $32, s2, %rax # U[3]'(%rax) <- U[3]U[1] >> 32
shrd $32, %rbx, s2 # U[5]'(s2) <- U[5]U[3] >> 32
shrd $32, s1, %rbx # U[7]'(%rbx) <- U[7]U[5] >> 32
shrq $32, s1 # U[7](s1) <- U[7] >> 32 (carry)
# 5. 64-bit addition
addq s0, s5 # U[0] <- U[1]' + U[0]
adcq $0, %rax # U[3]' <- 0 + U[3]'
adcq s2, s4 # U[4] <- U[5]' + U[4]
adcq %rbx, s7 # U[6] <- U[7]' + U[6]
adcq s1, %rsi # rsi <- U[7]carry + carry
# V[0] s5
# V[1] %rax
# V[2] s4
# V[3] s7
# carry %rsi
# sub %rdx
# 5. ADD & SUB
movq (%rsp), s0
movq 8(%rsp), s1
movq 16(%rsp), s2
movq 24(%rsp), s3
# ADD
addq s5, s0
adcq %rax, s1
adcq s4, s2
adcq s7, s3
adcq $0, %rsi
# SUB
subq %rdx, s1
sbbq $0, s2
sbbq $0, s3
sbbq $0, %rsi
# 6. MOD
# First Mod
movq %rsi, %rax # rax <- carry (rsi) +out[0]
shlq $32, %rax # rax <- carry << 32
movq %rax, %rcx # rcx <- rax +out[3]
subq %rsi, %rax # rax <- carry << 32 - carry +out[1]
addq %rsi, s0
adcq %rax, s1
adcq $0, s2
adcq %rcx, s3
# Last Mod
# return r - p if r > p else r
movq s0, s4
movq s1, s5
movq s2, s6
movq s3, s7
leaq .Lpoly(%rip), %rsi
movq $0, %rcx
adcq $0, %rcx
subq 0(%rsi), s0
sbbq 8(%rsi), s1
sbbq 16(%rsi), s2
sbbq 24(%rsi), s3
sbbq $0, %rcx
cmovcq s4, s0
cmovcq s5, s1
cmovcq s6, s2
cmovcq s7, s3
movq s0, (%rdi)
movq s1, 8(%rdi)
movq s2, 16(%rdi)
movq s3, 24(%rdi)
.endm
### Modular mul: r = a*b mod p ###
# void ECP_Sm2Mul(uint64_t *r, const uint64_t *a, const uint64_t *b)
# 256-bit modular multiplication in SM2
# r %rdi
# a %rsi
# b %rdx
.globl ECP_Sm2Mul
.type ECP_Sm2Mul, @function
.align 64
ECP_Sm2Mul:
# Store scalar registers
subq $72, %rsp
movq %rbx, 32(%rsp)
movq %r12, 40(%rsp)
movq %r13, 48(%rsp)
movq %r14, 56(%rsp)
movq %r15, 64(%rsp)
# Load inputs
movq (%rsi), s0
movq 8(%rsi), s1
movq 16(%rsi), s2
movq 24(%rsi), s3
movq (%rdx), s4
movq 8(%rdx), s5
movq 16(%rdx), s6
movq 24(%rdx), s7
### multiplication ###
# ========================
# s7 s6 s5 s4
# * s3 s2 s1 s0
# ------------------------
# + s0 s0 s0 s0
# * * * *
# s7 s6 s5 s4
# s1 s1 s1 s1
# * * * *
# s7 s6 s5 s4
# s2 s2 s2 s2
# * * * *
# s7 s6 s5 s4
# s3 s3 s3 s3
# * * * *
# s7 s6 s5 s4
# ------------------------
# s7 s6 s5 s4 s3 s2 s1 s0
# ========================
### s0*s4 ###
movq s0, %rax
mulq s4
movq %rax, (%rsp)
movq %rdx, %rbx
xorq %rcx, %rcx
### s1*s4 + s0*s5 ###
movq s1, %rax
mulq s4
addq %rax, %rbx
adcq %rdx, %rcx
xorq %rsi, %rsi
movq s0, %rax
mulq s5
addq %rax, %rbx
adcq %rdx, %rcx
adcq $0, %rsi
movq %rbx, 8(%rsp)
xorq %rbx, %rbx
### s2 * s4 + s1 * s5 + s0 *s6 ###
movq s2, %rax
mulq s4
addq %rax, %rcx
adcq %rdx, %rsi
movq s1, %rax
mulq s5
addq %rax, %rcx
adcq %rdx, %rsi
adcq $0, %rbx
movq s0, %rax
mulq s6
addq %rax, %rcx
adcq %rdx, %rsi
adcq $0, %rbx
movq %rcx, 16(%rsp)
xorq %rcx, %rcx
### s3*s4 + s2*s5 + s1*s6 + s0*s7 ###
movq s3, %rax
mulq s4
addq %rax, %rsi
adcq %rdx, %rbx
adcq $0, %rcx
movq s2, %rax
mulq s5
addq %rax, %rsi
adcq %rdx, %rbx
adcq $0, %rcx
movq s1, %rax
mulq s6
addq %rax, %rsi
adcq %rdx, %rbx
adcq $0, %rcx
movq s0, %rax
mulq s7
addq %rax, %rsi
adcq %rdx, %rbx
adcq $0, %rcx
movq %rsi, 24(%rsp)
xorq %rsi, %rsi
### s3*s5 + s2*s6 + s1*s7 ###
movq s3, %rax
mulq s5
addq %rax, %rbx
adcq %rdx, %rcx
# carry
adcq $0, %rsi
movq s2, %rax
mulq s6
addq %rax, %rbx
adcq %rdx, %rcx
adcq $0, %rsi
movq s1, %rax
mulq s7
addq %rax, %rbx
adcq %rdx, %rcx
adcq $0, %rsi
movq %rbx, s4
xorq %rbx, %rbx
### s3*s6 + s2*s7 ###
movq s3, %rax
mulq s6
addq %rax, %rcx
adcq %rdx, %rsi
# carry
adcq $0, %rbx
movq s2, %rax
mulq s7
addq %rax, %rcx
adcq %rdx, %rsi
adcq $0, %rbx
movq %rcx, s5
### s3*s7 ###
movq s3, %rax
mulq s7
addq %rax, %rsi
adcq %rdx, %rbx
movq %rsi, s6
movq %rbx, s7
movq (%rsp), s0
movq 8(%rsp), s1
movq 16(%rsp), s2
movq 24(%rsp), s3
# result of mul: s7 s6 s5 s4 s3 s2 s1 s0
### Reduction ###
RDC
# Restore scalar registers
movq 32(%rsp), %rbx
movq 40(%rsp), %r12
movq 48(%rsp), %r13
movq 56(%rsp), %r14
movq 64(%rsp), %r15
addq $72, %rsp
ret
.size ECP_Sm2Mul, .-ECP_Sm2Mul
### Modular sqr: r = a^2 mod p ###
# void ECP_Sm2Sqr(uint64_t *r, const uint64_t *a)
# 256-bit modular multiplication in SM2 ###
# r %rdi
# a %rsi
.globl ECP_Sm2Sqr
.type ECP_Sm2Sqr, @function
.align 64
ECP_Sm2Sqr:
# Store scalar registers
subq $88, %rsp
movq %rbx, 32(%rsp)
movq %r12, 40(%rsp)
movq %r13, 48(%rsp)
movq %r14, 56(%rsp)
movq %r15, 64(%rsp)
movq %rbp, 72(%rsp)
movq %rdi, 80(%rsp)
# Load inputs
movq (%rsi), s4
movq 8(%rsi), s5
movq 16(%rsi), s6
movq 24(%rsi), s7
### square ###
# ========================
# s7 s6 s5 s4
# * s7 s6 s5 s4
# ------------------------
# + s4 s4 s4 s4
# * * * *
# s7 s6 s5 s4
# s5 s5 s5 s5
# * * * *
# s7 s6 s5 s4
# s6 s6 s6 s6
# * * * *
# s7 s6 s5 s4
# s7 s7 s7 s7
# * * * *
# s7 s6 s5 s4
# ------------------------
# s7 s6 s5 s4 s3 s2 s1 s0
# ========================
### s1 <- s4*s5, s2 <- carry ###
movq s5, %rax
mulq s4
movq %rax, s1
movq %rdx, s2
xorq s3, s3
### s2 <- s4*s6 + carry(s2), s3 <- carry ###
movq s6, %rax
mulq s4
addq %rax, s2
adcq %rdx, s3
xorq s0, s0
### s3 <- s4*s7 + s5*s6 + carry(s3), s0 <- carry ###
movq s7, %rax
mulq s4
addq %rax, s3
adcq %rdx, s0
xorq %rbx, %rbx
movq s6, %rax
mulq s5
addq %rax, s3
adcq %rdx, s0
adcq $0, %rbx
### s0 <- s5*s7 + carry(s0), rbx <- carry ###
movq s7, %rax
mulq s5
addq %rax, s0
adcq %rdx, %rbx
xorq %rcx, %rcx
### rbx <- s6*s7 + carry(rbx), rcx <- carry ###
movq s7, %rax
mulq s6
addq %rax, %rbx
adcq %rdx, %rcx
xorq %rsi, %rsi
### 2*s0|1|2|3 ###
addq s1, s1
adcq s2, s2
adcq s3, s3
adcq s0, s0
adcq %rbx, %rbx
# update carry
adcq %rcx, %rcx
adcq $0, %rsi
### rbp <- s4*s4, carry <- rdi ###
movq s4, %rax
mulq s4
movq %rax, %rbp
movq %rdx, %rdi
### s4 <- s5*s5, carry <- s5 ###
movq s5, %rax
mulq s5
movq %rax, s4
movq %rdx, s5
### s6*s6 ###
movq s6, %rax
mulq s6
# s1 += carry(s4*s4)
addq %rdi, s1
# s2 += s5*s5
adcq s4, s2
# s3 += carry(s5*s5)
adcq s5, s3
# s4(s0) += s6*s6
adcq %rax, s0
# s5(rbx) += carry(s6*s6)
adcq %rdx, %rbx
adcq $0, %rcx
adcq $0, %rsi
### s7*s7 ###
movq s7, %rax
mulq s7
# s6(rcx) += s7*s7
addq %rax, %rcx
# s7(rsi) += carry(s7*s7)
adcq %rdx, %rsi
movq s0, s4
movq %rbp, s0
movq %rbx, s5
movq %rcx, s6
movq %rsi, s7
# Restore rdi
movq 80(%rsp), %rdi
# result of mul: s7 s6 s5 s4 s3 s2 s1 s0
### Reduction ###
RDC
# Restore scalar registers
movq 32(%rsp), %rbx
movq 40(%rsp), %r12
movq 48(%rsp), %r13
movq 56(%rsp), %r14
movq 64(%rsp), %r15
movq 72(%rsp), %rbp
addq $88, %rsp
ret
.size ECP_Sm2Sqr, .-ECP_Sm2Sqr
.globl ECP_Sm2ToMont
.type ECP_Sm2ToMont,@function
.align 32
ECP_Sm2ToMont:
leaq .LRR(%rip), %rdx
REGISTER_SAVE
movq 0(%rsi), %r9
movq 8(%rsi), %r10
movq 16(%rsi), %r11
movq 24(%rsi), %r12
movq %rdx, %rbx
movq 0(%rdx), %rax
call ECP_Sm2MulMont
REGISTER_POP
ret
.size ECP_Sm2ToMont,.-ECP_Sm2ToMont
.type ECP_Sm2MulMont,@function
.align 32
ECP_Sm2MulMont:
// a[0~3] * b[0]
movq %rax, %rbp
mulq %r9
movq %rax, %r8
movq %rdx, %r9
movq %rbp, %rax
mulq %r10
addq %rax, %r9
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %r10
mulq %r11
addq %rax, %r10
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %r11
mulq %r12
addq %rax, %r11
adcq $0, %rdx
movq %rdx, %r12
movq %r8, %rax
movq %r8, %r14
xorq %r13, %r13
// begin 1st reduce
shlq $32, %rax
shrq $32, %r14
movq %r8, %rcx
subq %rax, %rcx
movq $0, %rdx
sbbq %r14, %rdx
movq %rdx, %rbp
movq $0, %rdx
sbbq %rax, %rdx
movq %rdx, %rax
sbbq %r14, %r8
movq %r8, %rdx
movq %rcx, %r8
addq %r9, %r8
movq %rbp, %r9
adcq %r10, %r9
movq %rax, %r10
adcq %r11, %r10
movq %rdx, %r11
adcq %r12, %r11
movq $0, %r12
adcq %r13, %r12
movq 8(%rbx), %rax // b[1]
movq %rax, %rbp
mulq 0(%rsi)
addq %rax, %r8
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rcx
mulq 8(%rsi)
addq %rcx, %r9
adcq $0, %rdx
addq %rax, %r9
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rcx
mulq 16(%rsi)
addq %rcx, %r10
adcq $0, %rdx
addq %rax, %r10
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rcx
mulq 24(%rsi)
addq %rcx, %r11
adcq $0, %rdx
addq %rax, %r11
movq %r9, %rax
adcq %rdx, %r12
adcq $0, %r13
movq %r8, %rax
movq %r8, %r14
// begin 2st reduce
shlq $32, %rax
shrq $32, %r14
movq %r8, %rcx
subq %rax, %rcx
movq $0, %rdx
sbbq %r14, %rdx
movq %rdx, %rbp
movq $0, %rdx
sbbq %rax, %rdx
movq %rdx, %rax
sbbq %r14, %r8
movq %r8, %rdx
movq %rcx, %r8
addq %r9, %r8
movq %rbp, %r9
adcq %r10, %r9
movq %rax, %r10
adcq %r11, %r10
movq %rdx, %r11
adcq %r12, %r11
movq $0, %r12
adcq %r13, %r12
movq 16(%rbx), %rax // b[2]
movq %rax, %rbp
mulq 0(%rsi)
addq %rax, %r8
movq %rbp, %rax
adcq $0, %rdx
movq %rdx, %rcx
mulq 8(%rsi)
addq %rcx, %r9
adcq $0, %rdx
addq %rax, %r9
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rcx
mulq 16(%rsi)
addq %rcx, %r10
adcq $0, %rdx
addq %rax, %r10
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rcx
mulq 24(%rsi)
addq %rcx, %r11
adcq $0, %rdx
addq %rax, %r11
movq %r9, %rax
adcq %rdx, %r12
adcq $0, %r13
movq %r8, %rax
movq %r8, %r14
// begin 3st reduce
shlq $32, %rax
shrq $32, %r14
movq %r8, %rcx
movq $0, %rdx
subq %rax, %rcx
sbbq %r14, %rdx
movq %rdx, %rbp
movq $0, %rdx
sbbq %rax, %rdx
sbbq %r14, %r8
movq %rdx, %rax
movq %r8, %rdx
movq %rcx, %r8
addq %r9, %r8
movq %rbp, %r9
adcq %r10, %r9
movq %rax, %r10
adcq %r11, %r10
movq %rdx, %r11
adcq %r12, %r11
movq $0, %r12
adcq %r13, %r12
movq 24(%rbx), %rax // b[3]
movq %rax, %rbp
mulq 0(%rsi)
addq %rax, %r8
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rcx
mulq 8(%rsi)
addq %rcx, %r9
adcq $0, %rdx
addq %rax, %r9
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rcx
mulq 16(%rsi)
addq %rcx, %r10
adcq $0, %rdx
addq %rax, %r10
adcq $0, %rdx
movq %rbp, %rax
movq %rdx, %rcx
mulq 24(%rsi)
addq %rcx, %r11
adcq $0, %rdx
addq %rax, %r11
adcq %rdx, %r12
adcq $0, %r13
movq %r9, %rax
movq %r8, %rax
movq %r8, %r14
// last reduction begin
shlq $32, %rax
shrq $32, %r14
movq %r8, %rcx
subq %rax, %rcx
movq $0, %rdx
sbbq %r14, %rdx
movq %rdx, %rbp
movq $0, %rdx
sbbq %rax, %rdx
movq %rdx, %rax
sbbq %r14, %r8
movq %r8, %rdx
movq %rcx, %r8
addq %r9, %r8
movq %rbp, %r9
adcq %r10, %r9
movq %rax, %r10
adcq %r11, %r10
movq %rdx, %r11
adcq %r12, %r11
movq $0, %rcx
adcq %r13, %rcx
// last reduction end
// ret - p
movq %r8, %r12
subq $-1, %r12
movq .Lpoly+8(%rip), %r14
movq %r9, %r13
sbbq %r14, %r13
movq %r10, %rbp
sbbq $-1, %rbp
movq .Lpoly+24(%rip), %r15
movq %r11, %rdx
sbbq %r15, %rdx
sbbq $0, %rcx
cmovcq %r8, %r12
cmovcq %r9, %r13
cmovcq %r10, %rbp
movq %r12,(%rdi)
movq %r13,8(%rdi)
cmovcq %r11, %rdx
movq %rbp,16(%rdi)
movq %rdx,24(%rdi)
movq %rbp, %r8
movq %rdx, %r9
ret
.size ECP_Sm2MulMont, .-ECP_Sm2MulMont
.globl ECP_Sm2FromMont
.type ECP_Sm2FromMont,@function
.align 32
ECP_Sm2FromMont:
leaq .Lone(%rip), %rdx
REGISTER_SAVE
movq %rdx, %rbx
movq 0(%rsi), %r9
movq 8(%rsi), %r10
movq 16(%rsi), %r11
movq 24(%rsi), %r12
movq 0(%rdx), %rax
call ECP_Sm2MulMont
REGISTER_POP
ret
.size ECP_Sm2FromMont,.-ECP_Sm2FromMont
.type ECP_Sm2SqrMont,@function
.align 32
ECP_Sm2SqrMont:
movq %rax, %r13
mulq %r14 // a[0] * a[1]
movq %rax, %r9
movq %rdx, %r10
movq %r15, %rax
mulq %r13 // a[0] * a[2]
addq %rax, %r10
adcq $0, %rdx
movq %r8, %rax
movq %rdx, %r11
mulq %r13 // a[0] * a[3]
addq %rax, %r11
adcq $0, %rdx
movq %r15, %rax
movq %rdx, %r12
mulq %r14 // a[1] * a[2]
addq %rax, %r11
adcq $0, %rdx
movq %r8, %rax
movq %rdx, %rbp
mulq %r14 // a[1] * a[3]
addq %rax, %r12
adcq $0, %rdx
addq %rbp, %r12
movq %rdx, %r13
movq %r8, %rax
adcq $0, %r13
mulq %r15 // a[2] * a[3]
addq %rax, %r13
movq (%rsi), %rax
movq %rdx, %r14
adcq $0, %r14
movq $0, %r15
addq %r9, %r9
adcq %r10, %r10
adcq %r11, %r11
adcq %r12, %r12
adcq %r13, %r13
adcq %r14, %r14
adcq $0, %r15
mulq %rax // cal a[0] * a[0]
movq %rax, %r8
movq 8(%rsi), %rax // get a[1]
movq %rdx, %rcx
mulq %rax // a[1] * a[1]
addq %rcx, %r9
adcq %rax, %r10
adcq $0, %rdx
movq 16(%rsi), %rax
movq %rdx, %rcx
mulq %rax // a[2] * a[2]
addq %rcx, %r11
adcq %rax, %r12
adcq $0, %rdx
movq 24(%rsi), %rax
movq %rdx, %rcx
mulq %rax // a[3] * a[3]
addq %rcx, %r13
adcq %rax, %r14
movq %r8, %rax
adcq %rdx, %r15
movq %r8, %rax
movq %r8, %rsi
// begin 1st reduce
shlq $32, %rax
shrq $32, %rsi
movq %r8, %rcx
subq %rax, %rcx
movq $0, %rdx
sbbq %rsi, %rdx
movq %rdx, %rbp
movq $0, %rdx
sbbq %rax, %rdx
movq %rdx, %rax
sbbq %rsi, %r8
movq %r8, %rdx
movq %rcx, %r8
addq %r9, %r8
movq %rbp, %r9
adcq %r10, %r9
movq %rax, %r10
adcq %r11, %r10
movq %rdx, %r11
adcq $0, %r11
movq %r8, %rax
movq %r8, %rsi
// begin 2st reduce
shlq $32, %rax
shrq $32, %rsi
movq %r8, %rcx
subq %rax, %rcx
movq $0, %rdx
sbbq %rsi, %rdx
movq %rdx, %rbp
movq $0, %rdx
sbbq %rax, %rdx
movq %rdx, %rax
sbbq %rsi, %r8
movq %r8, %rdx
movq %rcx, %r8
addq %r9, %r8
movq %rbp, %r9
adcq %r10, %r9
movq %rax, %r10
adcq %r11, %r10
movq %rdx, %r11
adcq $0, %r11
movq %r8, %rax
movq %r8, %rsi
// begin 3st reduce
shlq $32, %rax
shrq $32, %rsi
movq %r8, %rcx
subq %rax, %rcx
movq $0, %rdx
sbbq %rsi, %rdx
movq %rdx, %rbp
movq $0, %rdx
sbbq %rax, %rdx
movq %rdx, %rax
sbbq %rsi, %r8
movq %r8, %rdx
movq %rcx, %r8
addq %r9, %r8
movq %rbp, %r9
adcq %r10, %r9
movq %rax, %r10
adcq %r11, %r10
movq %rdx, %r11
adcq $0, %r11
movq %r8, %rax
movq %r8, %rsi
// begin 4st reduce
shlq $32, %rax
shrq $32, %rsi
movq %r8, %rcx
subq %rax, %rcx
movq $0, %rdx
sbbq %rsi, %rdx
movq %rdx, %rbp
movq $0, %rdx
sbbq %rax, %rdx
movq %rdx, %rax
sbbq %rsi, %r8
movq %r8, %rdx
movq %rcx, %r8
addq %r9, %r8
movq %rbp, %r9
adcq %r10, %r9
movq %rax, %r10
adcq %r11, %r10
movq %rdx, %r11
adcq $0, %r11
movq .Lpoly+8(%rip), %rsi
movq .Lpoly+24(%rip), %rbp
addq %r8, %r12
adcq %r9, %r13
adcq %r10, %r14
adcq %r11, %r15
movq $0, %r11
adcq $0, %r11
// ret - q
movq %r12, %rax
subq $-1, %rax
movq %r13, %rcx
sbbq %rsi, %rcx
movq %r14, %r8
sbbq $-1, %r8
movq %r15, %rdx
sbbq %rbp, %rdx
sbbq $0, %r11
cmovncq %rax, %r12
cmovncq %rcx, %r13
cmovncq %r8, %r14
movq %r12,(%rdi)
movq %r13,8(%rdi)
cmovncq %rdx, %r15
movq %r14,16(%rdi)
movq %r15,24(%rdi)
ret
.size ECP_Sm2SqrMont,.-ECP_Sm2SqrMont
.type ECP_Sm2AddCore,@function
.align 32
ECP_Sm2AddCore:
addq (%rbx), %r12
adcq 8(%rbx), %r13
movq %r12, %rcx
adcq 16(%rbx), %r8
adcq 24(%rbx), %r9
movq $0, %r11
movq %r13, %rbp
adcq $0, %r11
subq $-1, %r12 // + 0xffffffffffffffff = -(-1)
movq %r8, %rax
sbbq %r14, %r13
sbbq $-1, %r8
movq %r9, %r10
sbbq %r15, %r9
sbbq $0, %r11
cmovcq %rcx, %r12
cmovcq %rbp, %r13
movq %r12, 0(%rdi)
cmovcq %rax, %r8
movq %r13, 8(%rdi)
cmovcq %r10, %r9
movq %r8, 16(%rdi)
movq %r9, 24(%rdi)
ret
.size ECP_Sm2AddCore,.-ECP_Sm2AddCore
.type ECP_Sm2SubBA,@function
.align 32
ECP_Sm2SubBA:
subq %r12, %rcx
sbbq %r13, %rbp
movq %rcx, %r12
sbbq %r8, %rax
sbbq %r9, %r10
movq %rbp, %r13
sbbq %r11, %r11
addq $-1, %rcx
movq %rax, %r8
adcq %r14, %rbp
adcq $-1, %rax
movq %r10, %r9
adcq %r15, %r10
testq %r11, %r11
cmovnzq %rcx, %r12
cmovnzq %rbp, %r13
cmovnzq %rax, %r8
cmovnzq %r10, %r9
ret
.size ECP_Sm2SubBA,.-ECP_Sm2SubBA
.type ECP_Sm2SubAB,@function
.align 32
ECP_Sm2SubAB:
subq 0(%rbx), %r12
sbbq 8(%rbx), %r13
sbbq 16(%rbx), %r8
sbbq 24(%rbx), %r9
sbbq %r11, %r11
movq %r14, %rbp
andq %r11, %rbp
movq %r11, %rax
btrq $32, %rax
addq %r11, %r12
adcq %rbp, %r13
adcq %r11, %r8
adcq %rax, %r9
movq %r12, (%rdi)
movq %r13, 8(%rdi)
movq %r8, 16(%rdi)
movq %r9, 24(%rdi)
ret
.size ECP_Sm2SubAB,.-ECP_Sm2SubAB
.type ECP_Sm2MulBy2Core,@function
.align 32
ECP_Sm2MulBy2Core:
addq %r12, %r12
adcq %r13, %r13
movq %r12, %rcx
adcq %r8, %r8
adcq %r9, %r9
movq $0, %r11
movq %r13, %rbp
adcq $0, %r11
subq $-1, %r12 // + 0xffffffffffffffff = -(-1)
movq %r8, %rax
sbbq %r14, %r13
sbbq $-1, %r8
movq %r9, %r10
sbbq %r15, %r9
sbbq $0, %r11
cmovcq %rcx, %r12
cmovcq %rbp, %r13
cmovcq %rax, %r8
cmovcq %r10, %r9
movq %r12, (%rdi)
movq %r13, 8(%rdi)
movq %r8, 16(%rdi)
movq %r9, 24(%rdi)
ret
.size ECP_Sm2MulBy2Core,.-ECP_Sm2MulBy2Core
# ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#doubling-dbl-2001-b
# Deal process:
# delta = Z12
# gamma = Y12
# beta = X1*gamma
# alpha = 3*(X1-delta)*(X1+delta)
# X3 = alpha2-8*beta
# Z3 = (Y1+Z1)2-gamma-delta
# Y3 = alpha*(4*beta-X3)-8*gamma2
.globl ECP_Sm2PointDoubleMont
.type ECP_Sm2PointDoubleMont,@function
.align 32
ECP_Sm2PointDoubleMont:
REGISTER_SAVE
subq $168, %rsp
.Lpoint_double:
vmovdqu 0(%rsi), %xmm0
vmovdqu 16(%rsi), %xmm1
vmovdqa %xmm0,96(%rsp)
vmovdqa %xmm1,96+16(%rsp)
movq %rsi, %rbx
leaq 32(%rdi), %r10
leaq 64(%rdi), %r11
vmovq %rdi, %xmm0
vmovq %r10, %xmm1
vmovq %r11, %xmm2
movq 32(%rsi), %r12
movq 40(%rsi), %r13
movq 48(%rsi), %r8
movq 56(%rsi), %r9
movq .Lpoly+8(%rip), %r14
movq .Lpoly+24(%rip), %r15
leaq (%rsp), %rdi
call ECP_Sm2MulBy2Core
movq 64(%rsi), %rax
movq 72(%rsi), %r14
movq 80(%rsi), %r15
movq 88(%rsi), %r8
leaq 64(%rsi), %rsi // Setting Input Parameters
leaq 64(%rsp), %rdi // store the result
call ECP_Sm2SqrMont
movq (%rsp), %rax
movq 8(%rsp), %r14
movq 16(%rsp), %r15
movq 24(%rsp), %r8
leaq (%rsp), %rsi
leaq (%rsp), %rdi
call ECP_Sm2SqrMont
movq 32(%rbx), %rax
movq 64(%rbx), %r9
movq 72(%rbx), %r10
movq 80(%rbx), %r11
movq 88(%rbx), %r12
leaq 64(%rbx), %rsi
leaq 32(%rbx), %rbx
vmovq %xmm2, %rdi
call ECP_Sm2MulMont
call ECP_Sm2MulBy2Core
movq 96(%rsp), %r12
movq 104(%rsp), %r13
movq 112(%rsp), %r8
movq 120(%rsp), %r9
leaq 32(%rsp), %rdi
leaq 64(%rsp), %rbx
call ECP_Sm2AddCore
movq 96(%rsp), %r12
movq 104(%rsp), %r13
movq 112(%rsp), %r8
movq 120(%rsp), %r9
leaq 64(%rsp), %rbx // intput
leaq 64(%rsp), %rdi // output
call ECP_Sm2SubAB
movq (%rsp), %rax
movq 8(%rsp), %r14
movq 16(%rsp), %r15
movq 24(%rsp), %r8
leaq (%rsp), %rsi
vmovq %xmm1, %rdi
call ECP_Sm2SqrMont
movq %r12, %rcx
addq $-1, %r12
movq %r13, %r10
adcq %rsi, %r13
movq %r14, %rax
adcq $-1, %r14
movq $0, %r9
movq %r15, %r8
adcq %rbp, %r15
adcq $0, %r9
xorq %rsi, %rsi
testq $1, %rcx
cmovzq %rcx, %r12
cmovzq %r10, %r13
cmovzq %rax, %r14
cmovzq %r8, %r15
cmovzq %rsi, %r9
movq %r13, %rcx
shrq $1, %r12
shlq $63, %rcx
shrq $1, %r13
movq %r14, %r10
orq %rcx, %r12
shlq $63, %r10
movq %r15, %rax
shrq $1, %r14
orq %r10, %r13
shlq $63, %rax
movq %r12,0(%rdi)
shrq $1, %r15
movq %r13,8(%rdi)
shlq $63, %r9
orq %rax, %r14
orq %r9, %r15
movq %r14,16(%rdi)
movq %r15,24(%rdi)
movq 64(%rsp), %rax
leaq 64(%rsp), %rbx
movq 32(%rsp), %r9
movq 40(%rsp), %r10
leaq 32(%rsp), %rsi
movq 48(%rsp), %r11
movq 56(%rsp), %r12
leaq 32(%rsp), %rdi
call ECP_Sm2MulMont
leaq 128(%rsp), %rdi
call ECP_Sm2MulBy2Core
leaq 32(%rsp), %rbx
leaq 32(%rsp), %rdi
call ECP_Sm2AddCore
movq 96(%rsp), %rax
leaq 96(%rsp), %rbx
movq (%rsp), %r9
movq 8(%rsp), %r10
leaq (%rsp), %rsi
movq 16(%rsp), %r11
movq 24(%rsp), %r12
leaq 0(%rsp), %rdi
call ECP_Sm2MulMont
leaq 128(%rsp), %rdi
call ECP_Sm2MulBy2Core
movq 32(%rsp), %rax
movq 40(%rsp), %r14
leaq 32(%rsp), %rsi
movq 48(%rsp), %r15
movq 56(%rsp), %r8
vmovq %xmm0, %rdi
call ECP_Sm2SqrMont
leaq 128(%rsp), %rbx
movq %r14, %r8
movq %r15, %r9
movq %rsi, %r14
movq %rbp, %r15
call ECP_Sm2SubAB
movq (%rsp), %rcx
movq 8(%rsp), %rbp
movq 16(%rsp), %rax
movq 24(%rsp), %r10
leaq 0(%rsp), %rdi
call ECP_Sm2SubBA
movq 32(%rsp), %rax
leaq 32(%rsp), %rbx
movq %r12, %r14
xorl %ecx, %ecx
movq %r12,(%rsp)
movq %r13, %r10
movq %r13,8(%rsp)
cmovzq %r8, %r11
movq %r8,16(%rsp)
cmovzq %r9, %r12
movq %r9,24(%rsp)
movq %r14, %r9
leaq 0(%rsp), %rsi
leaq 0(%rsp), %rdi
call ECP_Sm2MulMont
vmovq %xmm1, %rbx
vmovq %xmm1, %rdi
call ECP_Sm2SubAB
leaq 168(%rsp), %rsp
REGISTER_POP
ret
.size ECP_Sm2PointDoubleMont,.-ECP_Sm2PointDoubleMont
# ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-1998-cmo
# Deal process:
# U1 = X1*Z22
# U2 = X2*Z12
# S1 = Y1*Z23
# S2 = Y2*Z13
# H = U2-U1
# r = S2-S1
# X3 = r2-H3-2*U1*H2
# Y3 = r*(U1*H2-X3)-S1*H3
# Z3 = Z1*Z2*H
.globl ECP_Sm2PointAddMont
.type ECP_Sm2PointAddMont,@function
.align 32
ECP_Sm2PointAddMont:
REGISTER_SAVE
subq $584, %rsp
vmovdqu 0(%rsi), %xmm0
vmovdqu 16(%rsi), %xmm1
vmovdqu 32(%rsi), %xmm2
vmovdqu 48(%rsi), %xmm3
vmovdqu 64(%rsi), %xmm4
vmovdqu 80(%rsi), %xmm5
movq %rsi, %rbx
movq %rdx, %rsi
vmovdqa %xmm0,384(%rsp)
vmovdqa %xmm1,384+16(%rsp)
vmovdqa %xmm2,416(%rsp)
vmovdqa %xmm3,416+16(%rsp)
vmovdqa %xmm4,448(%rsp)
vmovdqa %xmm5,448+16(%rsp)
vpor %xmm4, %xmm5, %xmm5
vmovdqu 0(%rsi), %xmm0
vpshufd $0xb1, %xmm5, %xmm3
vmovdqu 16(%rsi), %xmm1
vmovdqu 32(%rsi), %xmm2
vpor %xmm3, %xmm5, %xmm5
vmovdqu 48(%rsi), %xmm3
movq 64(%rsi), %rax
movq 72(%rsi), %r14
movq 80(%rsi), %r15
movq 88(%rsi), %r8
vmovdqa %xmm0,480(%rsp)
vpshufd $0x1e, %xmm5, %xmm4
vmovdqa %xmm1,480+16(%rsp)
vmovdqu 64(%rsi), %xmm0
vmovdqu 80(%rsi), %xmm1
vmovdqa %xmm2,512(%rsp)
vmovdqa %xmm3,512+16(%rsp)
vpor %xmm4, %xmm5, %xmm5
vpxor %xmm4, %xmm4, %xmm4
vpor %xmm0, %xmm1, %xmm1
vmovq %rdi, %xmm0
leaq 64(%rsi), %rsi
movq %rax,544(%rsp)
movq %r14,544+8(%rsp)
movq %r15,544+16(%rsp)
movq %r8,544+24(%rsp)
leaq 96(%rsp), %rdi
call ECP_Sm2SqrMont
vpcmpeqd %xmm4, %xmm5, %xmm5
vpshufd $0xb1, %xmm1, %xmm4
vpor %xmm1, %xmm4, %xmm4
vpshufd $0, %xmm5, %xmm5
vpshufd $0x1e, %xmm4, %xmm3
vpor %xmm3, %xmm4, %xmm4
vpxor %xmm3, %xmm3, %xmm3
vpcmpeqd %xmm3, %xmm4, %xmm4
vpshufd $0, %xmm4, %xmm4
movq 64(%rbx), %rax
movq 72(%rbx), %r14
movq 80(%rbx), %r15
movq 88(%rbx), %r8
vmovq %rbx, %xmm1
leaq 64(%rbx), %rsi
leaq 32(%rsp), %rdi
call ECP_Sm2SqrMont
movq 544(%rsp), %rax
leaq 544(%rsp), %rbx
movq 96(%rsp), %r9
movq 104(%rsp), %r10
leaq 96(%rsp), %rsi
movq 112(%rsp), %r11
movq 120(%rsp), %r12
leaq 224(%rsp), %rdi
call ECP_Sm2MulMont
movq 448(%rsp), %rax
leaq 448(%rsp), %rbx
movq 32(%rsp), %r9
movq 40(%rsp), %r10
leaq 32(%rsp), %rsi
movq 48(%rsp), %r11
movq 56(%rsp), %r12
leaq 256(%rsp), %rdi
call ECP_Sm2MulMont
movq 416(%rsp), %rax
leaq 416(%rsp), %rbx
movq 224(%rsp), %r9
movq 232(%rsp), %r10
leaq 224(%rsp), %rsi
movq 240(%rsp), %r11
movq 248(%rsp), %r12
leaq 224(%rsp), %rdi
call ECP_Sm2MulMont
movq 512(%rsp), %rax
leaq 512(%rsp), %rbx
movq 256(%rsp), %r9
movq 264(%rsp), %r10
leaq 256(%rsp), %rsi
movq 272(%rsp), %r11
movq 280(%rsp), %r12
leaq 256(%rsp), %rdi
call ECP_Sm2MulMont
leaq 224(%rsp), %rbx
leaq 64(%rsp), %rdi
call ECP_Sm2SubAB
orq %r13, %r12
vmovdqa %xmm4, %xmm2
orq %r8, %r12
orq %r9, %r12
vpor %xmm5, %xmm2, %xmm2
vmovq %r12, %xmm3
movq 384(%rsp), %rax
leaq 384(%rsp), %rbx
movq 96(%rsp), %r9
movq 104(%rsp), %r10
leaq 96(%rsp), %rsi
movq 112(%rsp), %r11
movq 120(%rsp), %r12
leaq 160(%rsp), %rdi
call ECP_Sm2MulMont
movq 480(%rsp), %rax
leaq 480(%rsp), %rbx
movq 32(%rsp), %r9
movq 40(%rsp), %r10
leaq 32(%rsp), %rsi
movq 48(%rsp), %r11
movq 56(%rsp), %r12
leaq 192(%rsp), %rdi
call ECP_Sm2MulMont
leaq 160(%rsp), %rbx
leaq 0(%rsp), %rdi
call ECP_Sm2SubAB
orq %r13, %r12
orq %r8, %r12
orq %r9, %r12
vmovq %xmm2, %r8
vmovq %xmm3, %r9
orq %r8, %r12
orq %r9, %r12
jnz .Lpoint_add
.Ladd_double:
vmovq %xmm1, %rsi
vmovq %xmm0, %rdi
addq $416, %rsp
jmp .Lpoint_double
.align 32
.Lpoint_add:
movq 64(%rsp), %rax
movq 72(%rsp), %r14
leaq 64(%rsp), %rsi
movq 80(%rsp), %r15
movq 88(%rsp), %r8
leaq 96(%rsp), %rdi
call ECP_Sm2SqrMont
movq 448(%rsp), %rax
leaq 448(%rsp), %rbx
movq (%rsp), %r9
movq 8(%rsp), %r10
leaq (%rsp), %rsi
movq 16(%rsp), %r11
movq 24(%rsp), %r12
leaq 352(%rsp), %rdi
call ECP_Sm2MulMont
movq (%rsp), %rax
movq 8(%rsp), %r14
leaq (%rsp), %rsi
movq 16(%rsp), %r15
movq 24(%rsp), %r8
leaq 32(%rsp), %rdi
call ECP_Sm2SqrMont
movq 544(%rsp), %rax
leaq 544(%rsp), %rbx
movq 352(%rsp), %r9
movq 360(%rsp), %r10
leaq 352(%rsp), %rsi
movq 368(%rsp), %r11
movq 24+352(%rsp), %r12
leaq 352(%rsp), %rdi
call ECP_Sm2MulMont
movq (%rsp), %rax
leaq (%rsp), %rbx
movq 32(%rsp), %r9
movq 40(%rsp), %r10
leaq 32(%rsp), %rsi
movq 48(%rsp), %r11
movq 56(%rsp), %r12
leaq 128(%rsp), %rdi
call ECP_Sm2MulMont
movq 160(%rsp), %rax
leaq 160(%rsp), %rbx
movq 32(%rsp), %r9
movq 40(%rsp), %r10
leaq 32(%rsp), %rsi
movq 48(%rsp), %r11
movq 56(%rsp), %r12
leaq 192(%rsp), %rdi
call ECP_Sm2MulMont
leaq 96(%rsp), %rsi
movq $0, %r11
addq %r12, %r12
adcq %r13, %r13
movq %r12, %rcx
adcq %r8, %r8
adcq %r9, %r9
movq %r13, %rbp
adcq $0, %r11
subq $-1, %r12
movq %r8, %rax
sbbq %r14, %r13
sbbq $-1, %r8
movq %r9, %r10
sbbq %r15, %r9
sbbq $0, %r11
cmovcq %rcx, %r12
movq (%rsi), %rcx
cmovcq %rbp, %r13
movq 8(%rsi), %rbp
cmovcq %rax, %r8
movq 16(%rsi), %rax
cmovcq %r10, %r9
movq 24(%rsi), %r10
call ECP_Sm2SubBA
leaq 128(%rsp), %rbx
leaq 288(%rsp), %rdi
call ECP_Sm2SubAB
movq 192(%rsp), %rcx
movq 200(%rsp), %rbp
movq 208(%rsp), %rax
movq 216(%rsp), %r10
leaq 320(%rsp), %rdi
call ECP_Sm2SubBA
movq %r12,(%rdi)
movq %r13,8(%rdi)
movq %r8,16(%rdi)
movq %r9,24(%rdi)
movq 128(%rsp), %rax
leaq 128(%rsp), %rbx
movq 224(%rsp), %r9
movq 232(%rsp), %r10
leaq 224(%rsp), %rsi
movq 240(%rsp), %r11
movq 248(%rsp), %r12
leaq 256(%rsp), %rdi
call ECP_Sm2MulMont
movq 320(%rsp), %rax
leaq 320(%rsp), %rbx
movq 64(%rsp), %r9
movq 72(%rsp), %r10
leaq 64(%rsp), %rsi
movq 80(%rsp), %r11
movq 88(%rsp), %r12
leaq 320(%rsp), %rdi
call ECP_Sm2MulMont
leaq 256(%rsp), %rbx
leaq 320(%rsp), %rdi
call ECP_Sm2SubAB
vmovq %xmm0, %rdi
vmovdqa %xmm5, %xmm0
vmovdqa %xmm5, %xmm1
vpandn 352(%rsp), %xmm0, %xmm0
vmovdqa %xmm5, %xmm2
vpandn 368(%rsp), %xmm1, %xmm1
vmovdqa %xmm5, %xmm3
vpand 544(%rsp), %xmm2, %xmm2
vpand 560(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqa %xmm4, %xmm0
vmovdqa %xmm4, %xmm1
vpandn %xmm2, %xmm0, %xmm0
vmovdqa %xmm4, %xmm2
vpandn %xmm3, %xmm1, %xmm1
vmovdqa %xmm4, %xmm3
vpand 448(%rsp), %xmm2, %xmm2
vpand 464(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqu %xmm2,64(%rdi)
vmovdqu %xmm3,80(%rdi)
vmovdqa %xmm5, %xmm0
vmovdqa %xmm5, %xmm1
vpandn 288(%rsp), %xmm0, %xmm0
vmovdqa %xmm5, %xmm2
vpandn 304(%rsp), %xmm1, %xmm1
vmovdqa %xmm5, %xmm3
vpand 480(%rsp), %xmm2, %xmm2
vpand 496(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqa %xmm4, %xmm0
vmovdqa %xmm4, %xmm1
vpandn %xmm2, %xmm0, %xmm0
vmovdqa %xmm4, %xmm2
vpandn %xmm3, %xmm1, %xmm1
vmovdqa %xmm4, %xmm3
vpand 384(%rsp), %xmm2, %xmm2
vpand 400(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqu %xmm2,(%rdi)
vmovdqu %xmm3,16(%rdi)
vmovdqa %xmm5, %xmm0
vmovdqa %xmm5, %xmm1
vpandn 320(%rsp), %xmm0, %xmm0
vmovdqa %xmm5, %xmm2
vpandn 336(%rsp), %xmm1, %xmm1
vmovdqa %xmm5, %xmm3
vpand 512(%rsp), %xmm2, %xmm2
vpand 528(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqa %xmm4, %xmm0
vmovdqa %xmm4, %xmm1
vpandn %xmm2, %xmm0, %xmm0
vmovdqa %xmm4, %xmm2
vpandn %xmm3, %xmm1, %xmm1
vmovdqa %xmm4, %xmm3
vpand 416(%rsp), %xmm2, %xmm2
vpand 432(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqu %xmm2,32(%rdi)
vmovdqu %xmm3,48(%rdi)
.Ladd_done:
leaq 584(%rsp), %rsp
REGISTER_POP
ret
.size ECP_Sm2PointAddMont,.-ECP_Sm2PointAddMont
# ref. https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2007-bl
# Deal process:
# Z1Z1 = Z12
# U2 = X2*Z1Z1
# S2 = Y2*Z1*Z1Z1
# H = U2-X1
# HH = H2
# I = 4*HH
# J = H*I
# r = 2*(S2-Y1)
# V = X1*I
# X3 = r2-J-2*V
# Y3 = r*(V-X3)-2*Y1*J
# Z3 = (Z1+H)2-Z1Z1-HH
.globl ECP_Sm2PointAddAffineMont
.type ECP_Sm2PointAddAffineMont,@function
.align 32
ECP_Sm2PointAddAffineMont:
REGISTER_SAVE
subq $488, %rsp
vmovdqu (%rsi), %xmm0
vmovdqu 16(%rsi), %xmm1
vmovdqu 32(%rsi), %xmm2
vmovdqu 48(%rsi), %xmm3
vmovdqu 64(%rsi), %xmm4
vmovdqu 80(%rsi), %xmm5
movq %rdx, %rbx
movq 64(%rsi), %rax
movq 72(%rsi), %r14
movq 80(%rsi), %r15
movq 88(%rsi), %r8
vmovdqa %xmm0,320(%rsp)
vmovdqa %xmm1,336(%rsp)
vmovdqa %xmm2,352(%rsp)
vmovdqa %xmm3,368(%rsp)
vmovdqa %xmm4,384(%rsp)
vmovdqa %xmm5,400(%rsp)
vpor %xmm4, %xmm5, %xmm5
vmovdqu (%rbx), %xmm0
vpshufd $0xb1, %xmm5, %xmm3
vmovdqu 16(%rbx), %xmm1
vmovdqu 32(%rbx), %xmm2
vpor %xmm3, %xmm5, %xmm5
vmovdqu 48(%rbx), %xmm3
vmovdqa %xmm0, 416(%rsp)
vpshufd $0x1e, %xmm5, %xmm4
vmovdqa %xmm1, 416+16(%rsp)
vpor %xmm0, %xmm1, %xmm1
vmovq %rdi, %xmm0
vmovdqa %xmm2, 448(%rsp)
vmovdqa %xmm3, 464(%rsp)
vpor %xmm2, %xmm3, %xmm3
vpor %xmm4, %xmm5, %xmm5
vpxor %xmm4, %xmm4, %xmm4
vpor %xmm1, %xmm3, %xmm3
leaq 64(%rsi), %rsi
leaq 32(%rsp), %rdi
call ECP_Sm2SqrMont
vpcmpeqd %xmm4, %xmm5, %xmm5
vpshufd $0xb1, %xmm3, %xmm4
vpor %xmm3, %xmm4, %xmm4
vpshufd $0, %xmm5, %xmm5
vpshufd $0x1e, %xmm4, %xmm3
vpor %xmm3, %xmm4, %xmm4
vpxor %xmm3, %xmm3, %xmm3
vpcmpeqd %xmm3, %xmm4, %xmm4
vpshufd $0, %xmm4, %xmm4
movq (%rbx), %rax
movq %r12, %r9
movq %r13, %r10
movq %r14, %r11
leaq 32(%rsp), %rsi
movq %r15, %r12
leaq (%rsp), %rdi
call ECP_Sm2MulMont
leaq 320(%rsp), %rbx
leaq 64(%rsp), %rdi
call ECP_Sm2SubAB
movq 384(%rsp), %rax
leaq 384(%rsp), %rbx
movq 32(%rsp), %r9
movq 40(%rsp), %r10
leaq 32(%rsp), %rsi
movq 48(%rsp), %r11
movq 56(%rsp), %r12
leaq 32(%rsp), %rdi
call ECP_Sm2MulMont
movq 384(%rsp), %rax
leaq 384(%rsp), %rbx
movq 64(%rsp), %r9
movq 72(%rsp), %r10
leaq 64(%rsp), %rsi
movq 80(%rsp), %r11
movq 88(%rsp), %r12
leaq 288(%rsp), %rdi
call ECP_Sm2MulMont
movq 448(%rsp), %rax
leaq 448(%rsp), %rbx
movq 32(%rsp), %r9
movq 40(%rsp), %r10
leaq 32(%rsp), %rsi
movq 48(%rsp), %r11
movq 56(%rsp), %r12
leaq 32(%rsp), %rdi
call ECP_Sm2MulMont
leaq 352(%rsp), %rbx
leaq 96(%rsp), %rdi
call ECP_Sm2SubAB
movq 64(%rsp), %rax
movq 72(%rsp), %r14
leaq 64(%rsp), %rsi
movq 80(%rsp), %r15
movq 88(%rsp), %r8
leaq 128(%rsp), %rdi
call ECP_Sm2SqrMont
movq 96(%rsp), %rax
movq 104(%rsp), %r14
leaq 96(%rsp), %rsi
movq 112(%rsp), %r15
movq 120(%rsp), %r8
leaq 192(%rsp), %rdi
call ECP_Sm2SqrMont
movq 128(%rsp), %rax
leaq 128(%rsp), %rbx
movq 64(%rsp), %r9
movq 72(%rsp), %r10
leaq 64(%rsp), %rsi
movq 80(%rsp), %r11
movq 88(%rsp), %r12
leaq 160(%rsp), %rdi
call ECP_Sm2MulMont
movq 320(%rsp), %rax
leaq 320(%rsp), %rbx
movq 128(%rsp), %r9
movq 136(%rsp), %r10
leaq 128(%rsp), %rsi
movq 144(%rsp), %r11
movq 152(%rsp), %r12
leaq (%rsp), %rdi
call ECP_Sm2MulMont
leaq 192(%rsp), %rsi
movq $0, %r11
addq %r12, %r12
adcq %r13, %r13
movq %r12, %rcx
adcq %r8, %r8
adcq %r9, %r9
movq %r13, %rbp
adcq $0, %r11
subq $-1, %r12
movq %r8, %rax
sbbq %r14, %r13
sbbq $-1, %r8
movq %r9, %r10
sbbq %r15, %r9
sbbq $0, %r11
cmovcq %rcx, %r12
movq (%rsi), %rcx
cmovcq %rbp, %r13
movq 8(%rsi), %rbp
cmovcq %rax, %r8
movq 16(%rsi), %rax
cmovcq %r10, %r9
movq 24(%rsi), %r10
call ECP_Sm2SubBA
leaq 160(%rsp), %rbx
leaq 224(%rsp), %rdi
call ECP_Sm2SubAB
movq (%rsp), %rcx
movq 8(%rsp), %rbp
movq 16(%rsp), %rax
movq 24(%rsp), %r10
leaq 64(%rsp), %rdi
call ECP_Sm2SubBA
movq %r12,(%rdi)
movq %r13,8(%rdi)
movq %r8,16(%rdi)
movq %r9,24(%rdi)
movq 352(%rsp), %rax
leaq 352(%rsp), %rbx
movq 160(%rsp), %r9
movq 168(%rsp), %r10
leaq 160(%rsp), %rsi
movq 176(%rsp), %r11
movq 184(%rsp), %r12
leaq 32(%rsp), %rdi
call ECP_Sm2MulMont
movq 96(%rsp), %rax
leaq 96(%rsp), %rbx
movq 64(%rsp), %r9
movq 72(%rsp), %r10
leaq 64(%rsp), %rsi
movq 80(%rsp), %r11
movq 88(%rsp), %r12
leaq 64(%rsp), %rdi
call ECP_Sm2MulMont
leaq 32(%rsp), %rbx
leaq 256(%rsp), %rdi
call ECP_Sm2SubAB
vmovq %xmm0, %rdi
vmovdqa %xmm5, %xmm0
vmovdqa %xmm5, %xmm1
vpandn 288(%rsp), %xmm0, %xmm0
vmovdqa %xmm5, %xmm2
vpandn 304(%rsp), %xmm1, %xmm1
vmovdqa %xmm5, %xmm3
vpand .Lone_mont(%rip), %xmm2, %xmm2
vpand .Lone_mont+16(%rip), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqa %xmm4, %xmm0
vmovdqa %xmm4, %xmm1
vpandn %xmm2, %xmm0, %xmm0
vmovdqa %xmm4, %xmm2
vpandn %xmm3, %xmm1, %xmm1
vmovdqa %xmm4, %xmm3
vpand 384(%rsp), %xmm2, %xmm2
vpand 400(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqu %xmm2,64(%rdi)
vmovdqu %xmm3,80(%rdi)
vmovdqa %xmm5, %xmm0
vmovdqa %xmm5, %xmm1
vpandn 224(%rsp), %xmm0, %xmm0
vmovdqa %xmm5, %xmm2
vpandn 240(%rsp), %xmm1, %xmm1
vmovdqa %xmm5, %xmm3
vpand 416(%rsp), %xmm2, %xmm2
vpand 432(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqa %xmm4, %xmm0
vmovdqa %xmm4, %xmm1
vpandn %xmm2, %xmm0, %xmm0
vmovdqa %xmm4, %xmm2
vpandn %xmm3, %xmm1, %xmm1
vmovdqa %xmm4, %xmm3
vpand 320(%rsp), %xmm2, %xmm2
vpand 336(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqu %xmm2,(%rdi)
vmovdqu %xmm3,16(%rdi)
vmovdqa %xmm5, %xmm0
vmovdqa %xmm5, %xmm1
vpandn 256(%rsp), %xmm0, %xmm0
vmovdqa %xmm5, %xmm2
vpandn 272(%rsp), %xmm1, %xmm1
vmovdqa %xmm5, %xmm3
vpand 448(%rsp), %xmm2, %xmm2
vpand 464(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqa %xmm4, %xmm0
vmovdqa %xmm4, %xmm1
vpandn %xmm2, %xmm0, %xmm0
vmovdqa %xmm4, %xmm2
vpandn %xmm3, %xmm1, %xmm1
vmovdqa %xmm4, %xmm3
vpand 352(%rsp), %xmm2, %xmm2
vpand 368(%rsp), %xmm3, %xmm3
vpor %xmm0, %xmm2, %xmm2
vpor %xmm1, %xmm3, %xmm3
vmovdqu %xmm2,32(%rdi)
vmovdqu %xmm3,48(%rdi)
leaq 488(%rsp), %rsp
REGISTER_POP
ret
.size ECP_Sm2PointAddAffineMont,.-ECP_Sm2PointAddAffineMont
#endif
|
2301_79861745/bench_create
|
crypto/ecc/src/asm/ecp_sm2_x86_64.S
|
Unix Assembly
|
unknown
| 48,837
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE)
#include <stdint.h>
#include "crypt_errno.h"
#include "crypt_bn.h"
#include "ecp_nistp256.h"
#include "crypt_ecc.h"
#include "ecc_local.h"
#include "bsl_err_internal.h"
#include "asm_ecp_nistp256.h"
static const Coord g_rrModOrder = {{
0x83244c95be79eea2,
0x4699799c49bd6fa6,
0x2845b2392b6bec59,
0x66e12d94f3d95620
}};
static int32_t ECP256_ModOrderInvCheck(const ECC_Para *para, const BN_BigNum *r, const BN_BigNum *a)
{
if (para == NULL || r == NULL || a == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != CRYPT_ECC_NISTP256) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
if (BN_IsZero(a)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_INVERSE_INPUT_ZERO);
return CRYPT_ECC_INVERSE_INPUT_ZERO;
}
return CRYPT_SUCCESS;
}
static int32_t Bn2CoordArray(const ECC_Para *para, Coord *aArr, const BN_BigNum *a)
{
int32_t ret = CRYPT_SUCCESS;
uint32_t bits = BN_Bits(para->n);
BN_Optimizer *opt = BN_OptimizerCreate();
BN_BigNum *aTemp = BN_Create(bits);
if (opt == NULL || aTemp == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
if (BN_Cmp(a, para->n) >= 0) {
ret = BN_Mod(aTemp, a, para->n, opt);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
if (BN_IsZero(aTemp)) { // If x and m are coprime, the module inverse cannot be obtained.
BSL_ERR_PUSH_ERROR(CRYPT_BN_ERR_NO_INVERSE);
ret = CRYPT_BN_ERR_NO_INVERSE;
goto EXIT;
}
} else {
ret = BN_Copy(aTemp, a);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
}
(void)BN_BN2Array(aTemp, aArr->value, P256_SIZE);
EXIT:
BN_OptimizerDestroy(opt);
BN_Destroy(aTemp);
return ret;
}
// r = a^(-1) mod n, a cannot be 0
// a^(-1) mod n = a^(n-2) mod n
// n = 0xffffffff 00000000 ffffffff ffffffff bce6faad a7179e84 f3b9cac2 fc632551
// n-2 = 0xffffffff 00000000 ffffffff ffffffff bce6faad a7179e84 f3b9cac2 fc63254f
// Split the file into binary files as follows:
// 11111111111111111111111111111111---------0xffffffff
// 00000000000000000000000000000000---------0x00000000
// 11111111111111111111111111111111---------0xffffffff
// 11111111111111111111111111111111---------0xffffffff
// 101111 00 111 00 11 0 1111 10101 0 101 101
// 101 00 111 000 101111 00 1111 0 1 0000 1 00
// 1111 00 111 0 111 00 111 00 101 0 11 0000 10(1111): append four 1s
// (1111) 11 000 11 000 11 00 1 00 10101 00 1111
// To calculate the power of a, the exponent list is { 1, 10, 11, 101, 111, 1010, 1111, 10101, 101010, 101111, ffffffff}
// To calculate a^(0xffffffff), a^(0xffff) is required. The former requires a^(0xff), the latter requires a^(0x3f).
// The above is the optimal multiplication chain of a^(n-2)
// https://briansmith.org/ecc-inversion-addition-chains-01#p256_scalar_inversion
int32_t ECP256_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a)
{
int32_t ret = ECP256_ModOrderInvCheck(para, r, a);
if (ret != CRYPT_SUCCESS) {
return ret;
}
const Coord one = {{1}};
Coord aArr, res;
Coord table[14];
enum {
bin1 = 0, bin10, bin11, bin101, bin111, bin1010, bin1111,
bin10101, bin101010, bin101111, hex3f, hexff, hexffff, hexffffffff
};
static const uint8_t mulMap[26] = { // The lower 128 bits of n-2 can be split into 26 binary numbers.
bin101111, bin111, bin11, bin1111, bin10101, bin101,
bin101, bin101, bin111, bin101111, bin1111, bin1,
bin1, bin1111, bin111, bin111, bin111, bin101,
bin11, bin101111, bin11, bin11, bin11, bin1,
bin10101, bin1111
};
static const uint8_t sqrRep[26] = { // The lower 128 bits of n-2 can be split into 26 binary numbers.
6, 5, 4, 5, 5, 4,
3, 3, 5, 9, 6, 2,
5, 6, 5, 4, 5, 5,
3, 10, 2, 5, 5, 3,
7, 6
};
ret = Bn2CoordArray(para, &aArr, a);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ECP256_OrdMul(&table[bin1], &aArr, &g_rrModOrder); // table[bin1] = a, to the field with Montgomery
ECP256_OrdSqr(&table[bin10], &table[bin1], 1); // table[bin10] = a^(0b10)
ECP256_OrdMul(&table[bin11], &table[bin1], &table[bin10]); // table[bin11] = a^(0b11)
ECP256_OrdMul(&table[bin101], &table[bin11], &table[bin10]); // table[bin101] = a^(0b101)
ECP256_OrdMul(&table[bin111], &table[bin101], &table[bin10]); // table[bin111] = a^(0b111)
ECP256_OrdSqr(&table[bin1010], &table[bin101], 1); // table[bin1010] = a^(0b1010)
ECP256_OrdMul(&table[bin1111], &table[bin1010], &table[bin101]); // table[bin1111] = a^(0b1111)
ECP256_OrdSqr(&table[bin10101], &table[bin1010], 1); // table[bin10101] = a^(0b10100)
ECP256_OrdMul(&table[bin10101], &table[bin10101], &table[bin1]); // table[bin10101] = a^(0b10101)
ECP256_OrdSqr(&table[bin101010], &table[bin10101], 1); // table[bin101010] = a^(0b101010)
ECP256_OrdMul(&table[bin101111], &table[bin101010], &table[bin101]); // table[bin101111] = a^(0b101111)
ECP256_OrdMul(&table[hex3f], &table[bin101010], &table[bin10101]); // table[hex3f] = a^(0b0011 1111) = a^(0x3f)
ECP256_OrdSqr(&table[hexff], &table[hex3f], 2); // left shift by 2 bits, table[hexff] = a^(0b1111 1100) = a^(0xfc)
ECP256_OrdMul(&table[hexff], &table[hexff], &table[bin11]); // table[hexff] = a^(0b1111 1111) = a^(0xff)
ECP256_OrdSqr(&table[hexffff], &table[hexff], 8); // left shift by 8 bits, table[hexffff] = a^(0xff00)
ECP256_OrdMul(&table[hexffff], &table[hexffff], &table[hexff]); // table[hexffff] = a^(0xffff)
// left shift by 16 bits, table[hexffffffff] = a^(0xffff0000)
ECP256_OrdSqr(&table[hexffffffff], &table[hexffff], 16);
ECP256_OrdMul(&table[hexffffffff], &table[hexffffffff], &table[hexffff]); // table[hexffffffff] = a^(0xffffffff)
ECP256_OrdSqr(&res, &table[hexffffffff], 64); // res = a^(0xffffffff 00000000 00000000), left shift by 64 bits
ECP256_OrdMul(&res, &res, &table[hexffffffff]); // res = a^(0xffffffff 00000000 ffffffff)
ECP256_OrdSqr(&res, &res, 32); // res = a^(0xffffffff 00000000 ffffffff 00000000), left shift by 32 bits
ECP256_OrdMul(&res, &res, &table[hexffffffff]); // res = a^(0xffffffff 00000000 ffffffff ffffffff)
for (uint32_t i = 0; i < sizeof(mulMap); i++) {
ECP256_OrdSqr(&res, &res, sqrRep[i]);
ECP256_OrdMul(&res, &res, &table[mulMap[i]]);
}
// Multiplied by 1 can be converted back to the normal real number field, which is equivalent to a reduce.
// For details, see Montgomery modular multiplication.
ECP256_OrdMul(&res, &res, &one);
(void)BN_Array2BN(r, res.value, P256_SIZE);
return ret;
}
#endif
|
2301_79861745/bench_create
|
crypto/ecc/src/asm64_ecp_nistp256.c
|
C
|
unknown
| 7,694
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE)
#include <stdlib.h>
#include <stdint.h>
#include <stdbool.h>
#include "securec.h"
#include "crypt_errno.h"
#include "crypt_bn.h"
#include "ecp_nistp256.h"
#include "crypt_ecc.h"
#include "ecc_local.h"
#include "bsl_err_internal.h"
#include "asm_ecp_nistp256.h"
#if defined(HITLS_SIXTY_FOUR_BITS)
// 1 is on the field with Montgomery, 1 * RR * R' mod P = R mod P = R - P
static const Coord g_oneMont = {{
0x0000000000000001,
0xffffffff00000000,
0xffffffffffffffff,
0x00000000fffffffe
}};
static const Coord g_rrModP = {{
0x0000000000000003,
0xfffffffbffffffff,
0xfffffffffffffffe,
0x00000004fffffffd
}};
#elif defined(HITLS_THIRTY_TWO_BITS)
// 1 is on the field with Montgomery, 1 * RR * R' mod P = R mod P = R - P
static const Coord g_oneMont = {{
0x00000001,
0x00000000,
0x00000000,
0xffffffff,
0xffffffff,
0xffffffff,
0xfffffffe,
0x00000000
}};
static const Coord g_rrModP = {{
0x00000003,
0x00000000,
0xffffffff,
0xfffffffb,
0xfffffffe,
0xffffffff,
0xfffffffd,
0x00000004
}};
#else
#error BN_UINT MUST be 4 or 8
#endif
// If the value is 0, all Fs are returned. If the value is not 0, 0 is returned.
static BN_UINT IsZero(const Coord *a)
{
BN_UINT ret = a->value[0];
for (uint32_t i = 1; i < P256_SIZE; i++) {
ret |= a->value[i];
}
return BN_IsZeroUintConsttime(ret);
}
// r = cond == 0 ? r : a, the input parameter cond can only be 0 or 1.
// If cond is 0, the value remains unchanged. If cond is 1, copy a.
static void CopyConditional(Coord *r, const Coord *a, BN_UINT cond)
{
BN_UINT mask1 = ~cond & (cond - 1);
BN_UINT mask2 = ~mask1;
for (uint32_t i = 0; i < P256_SIZE; i++) {
r->value[i] = (r->value[i] & mask1) ^ (a->value[i] & mask2);
}
}
// Jacobian affine -> Jacobian projection, (X,Y)->(X,Y,Z)
static void Affine2Jproj(P256_Point *r, const P256_AffinePoint *a, BN_UINT mask)
{
for (uint32_t i = 0; i < P256_SIZE; i++) {
r->x.value[i] = a->x.value[i] & mask;
r->y.value[i] = a->y.value[i] & mask;
r->z.value[i] = g_oneMont.value[i] & mask;
}
}
// r = a^-1 mod p = a^(p-2) mod p
// p-2 = 0xffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff fffffffd
static void ECP256_ModInverse(Coord *r, const Coord *a)
{
// a^(0x3), a^(0xc) = a^(0b1100), a^(0xf), a^(0xf0), a^(0xff)
// a^(0xff00), a^(0xffff), a^(0xffff0000), a^(0xffffffff)
Coord a3, ac, af, af0, a2f, a2f20, a4f, a4f40, a8f, ans;
uint32_t i;
// 0x3 = 0b11 = 0b10 + 0b01
ECP256_Sqr(&a3, a); // a^2
ECP256_Mul(&a3, &a3, a); // a^3 = a^2 * a
// 0xf = 0b1111 = 0b1100 + 0b11, 0b11->0b1100 requires *4, and the exponent*4(2^2) requires twice square operations
ECP256_Sqr(&af, &a3); // a^6 = (a^3)^2
ECP256_Sqr(&ac, &af); // a^12 = (a^3)^2 = a^(0xc)
ECP256_Mul(&af, &ac, &a3); // a^f = a^15 = a^12 * a^3
// 0xff = 0b11111111 = 0b11110000 + 0b1111, 0b1111->0b11110000 requires *16,
// the exponent*16(2^4) requires 4 times square operations
ECP256_Sqr(&a2f, &af); // a^(0b11110) = (a^f)^2
ECP256_Sqr(&a2f, &a2f); // a^(0b111100) = (a^(0b11110))^2
ECP256_Sqr(&a2f, &a2f); // a^(0b1111000) = (a^(0b111100))^2
ECP256_Sqr(&af0, &a2f); // a^(0xf0) = a^(0b11110000) = (a^(0b1111000))^2
ECP256_Mul(&a2f, &af0, &af); // a^(0xff) = a^(0xf0) * a^(0xf)
// a^(0xffff)
ECP256_Sqr(&a2f20, &a2f);
for (i = 1; i < 8; i++) { // need to left shift by 8 bits
ECP256_Sqr(&a2f20, &a2f20);
}
// When the loop ends, &a2f20 = a^(0xff00)
ECP256_Mul(&a4f, &a2f20, &a2f); // a^(0xffff) = a^(0xff00) * a^(0xff)
// a^(0xffffffff)
ECP256_Sqr(&a4f40, &a4f);
for (i = 1; i < 16; i++) { // need to left shift by 16 bits
ECP256_Sqr(&a4f40, &a4f40);
}
// When the loop ends, &a4f40 = a^(0xffff0000)
ECP256_Mul(&a8f, &a4f40, &a4f); // a^(0xffffffff) = a^(0xffff0000) * a^(0xffff)
// a^(0xffffffff 00000001)
ECP256_Sqr(&ans, &a8f);
for (i = 1; i < 32; i++) { // need to left shift by 32 bits
ECP256_Sqr(&ans, &ans);
}
ECP256_Mul(&ans, &ans, a); // a^(0xffffffff 00000001) = a^(0xffffffff 00000000) * a
// a^(0xffffffff 00000001 00000000 00000000 00000000 ffffffff)
for (i = 0; i < 32 * 4; i++) { // need to left shift by 32 * 4 bits
ECP256_Sqr(&ans, &ans);
}
ECP256_Mul(&ans, &ans, &a8f);
// a^(0xffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff)
for (i = 0; i < 32; i++) { // need to left shift by 32 bits
ECP256_Sqr(&ans, &ans);
}
ECP256_Mul(&ans, &ans, &a8f);
// a^(0xffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff fffffffd)
for (i = 0; i < 32; i++) { // need to left shift by 32 bits
ECP256_Sqr(&ans, &ans);
}
// a^(0xffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff 00000000)
ECP256_Mul(&ans, &ans, &a4f40); // a^(0xffff0000)
ECP256_Mul(&ans, &ans, &a2f20); // a^(0xff00)
ECP256_Mul(&ans, &ans, &af0); // a^(0xf0)
ECP256_Mul(&ans, &ans, &ac); // a^(0xc)
ECP256_Mul(r, &ans, a); // a^(0x1)
}
static int32_t ECP256_GetAffine(ECC_Point *r, const P256_Point *pt)
{
Coord zInv3;
Coord zInv2;
Coord res_x;
Coord res_y;
int32_t ret;
if (IsZero(&(pt->z)) != 0) {
ret = CRYPT_ECC_POINT_AT_INFINITY;
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ECP256_ModInverse(&zInv3, &(pt->z)); // zInv
ECP256_Sqr(&zInv2, &zInv3); // zInv^2
ECP256_Mul(&zInv3, &zInv2, &zInv3); // zInv^3
ECP256_Mul(&res_x, &(pt->x), &zInv2); // xMont = x / (z^2)
ECP256_Mul(&res_y, &(pt->y), &zInv3); // yMont = y / (z^3)
ECP256_FromMont(&res_x, &res_x);
ECP256_FromMont(&res_y, &res_y);
ret = BN_Array2BN(&r->x, res_x.value, P256_SIZE);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ret = BN_Array2BN(&r->y, res_y.value, P256_SIZE);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ret = BN_SetLimb(&r->z, 1);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
return ret;
}
static void ECP256_P256Point2EccPoint(ECC_Point *r, const P256_Point *pt)
{
Coord xTemp;
Coord yTemp;
Coord zTemp;
ECP256_FromMont(&xTemp, &(pt->x));
ECP256_FromMont(&yTemp, &(pt->y));
ECP256_FromMont(&zTemp, &(pt->z));
(void)BN_Array2BN(&r->x, xTemp.value, P256_SIZE);
(void)BN_Array2BN(&r->y, yTemp.value, P256_SIZE);
(void)BN_Array2BN(&r->z, zTemp.value, P256_SIZE);
}
static void ECP256_EccPoint2P256Point(P256_Point *r, const ECC_Point *pt)
{
(void)BN_BN2Array(&pt->x, r->x.value, P256_SIZE);
(void)BN_BN2Array(&pt->y, r->y.value, P256_SIZE);
(void)BN_BN2Array(&pt->z, r->z.value, P256_SIZE);
ECP256_Mul(&(r->x), &(r->x), &g_rrModP);
ECP256_Mul(&(r->y), &(r->y), &g_rrModP);
ECP256_Mul(&(r->z), &(r->z), &g_rrModP);
}
int32_t ECP256_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt)
{
if (r == NULL || pt == NULL || para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != CRYPT_ECC_NISTP256 || r->id != CRYPT_ECC_NISTP256 || pt->id != CRYPT_ECC_NISTP256) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
P256_Point temp;
ECP256_EccPoint2P256Point(&temp, pt);
return ECP256_GetAffine(r, &temp);
}
// The value of 'in' contains a maximum of six bits. The input parameter must be & 0b111111 in advance.
static uint32_t Recodew5(uint32_t in)
{
// Shift rightwards by 5 bits to get the most significant bit, check whether the most significant bit is 1.
uint32_t sign = (in >> 5) - 1;
uint32_t data = (1 << 6) - 1 - in; // (6 Ones)0b111111 - in
data = (data & ~sign) | (in & sign);
data = (data >> 1) + (data & 1);
return (data << 1) + (~sign & 1);
}
// The value of 'in' contains a maximum of six bits. The input parameter must be & 0b11111111 in advance.
static uint32_t Recodew7(uint32_t in)
{
// Shift rightwards by 7 bits to get the most significant bit, check whether the most significant bit is 1.
uint32_t sign = (in >> 7) - 1;
uint32_t data = (1 << 8) - 1 - in; // (8 Ones)0b11111111 - in
data = (data & ~sign) | (in & sign);
data = (data >> 1) + (data & 1);
return (data << 1) + (~sign & 1);
}
static void ECP256_PreCompWindow(P256_Point table[16], P256_Point *pt)
{
P256_Point temp[4];
ECP256_Scatterw5(table, pt, 1);
ECP256_PointDouble(&temp[0], pt); // 2G
ECP256_Scatterw5(table, &temp[0], 2); // Discretely save temp[0] to the 2nd position of the table.
ECP256_PointAdd(&temp[1], &temp[0], pt); // temp[0] = 3G = 2G + G
ECP256_Scatterw5(table, &temp[1], 3); // Discretely saves temp[1] to the 3rd position of the table.
ECP256_PointDouble(&temp[2], &temp[0]); // temp[2] = 4G = 2G * 2
ECP256_Scatterw5(table, &temp[2], 4); // Discretely save temp[2] to the 4th position in the table.
ECP256_PointAdd(&temp[3], &temp[2], pt); // temp[3] = 5G = 4G + G = = temp[2] + pt
ECP256_Scatterw5(table, &temp[3], 5); // Discretely save temp[3] to the 5th position in the table.
ECP256_PointDouble(&temp[0], &temp[1]); // temp[0] = 6G = 3G * 2
ECP256_Scatterw5(table, &temp[0], 6); // Discretely save temp[0] to the 6th position in the table.
ECP256_PointAdd(&temp[1], &temp[0], pt); // temp[1] = 7G = 6G + G
ECP256_Scatterw5(table, &temp[1], 7); // Discretely save temp[1] to the 7th position in the table.
ECP256_PointDouble(&temp[2], &temp[2]); // temp[2] = 8G = 4G * 2
ECP256_Scatterw5(table, &temp[2], 8); // Discretely save temp[2] to the 8th position in the table.
ECP256_PointDouble(&temp[3], &temp[3]); // temp[3] = 10G = 5G * 2
ECP256_Scatterw5(table, &temp[3], 10); // Discretely save temp[3] to the 10th position in the table.
ECP256_PointAdd(&temp[3], &temp[3], pt); // temp[3] = 11G = 10G + G
ECP256_Scatterw5(table, &temp[3], 11); // Discretely save temp[3] to the 11th position in the table.
ECP256_PointDouble(&temp[0], &temp[0]); // temp[0] = 12G = 6G * 2
ECP256_Scatterw5(table, &temp[0], 12); // Discretely save temp[0] to the 12th position in the table.
ECP256_PointAdd(&temp[3], &temp[2], pt); // temp[3] = 9G = 8G + G = temp[2] + pt
ECP256_Scatterw5(table, &temp[3], 9); // Discretely save temp[3] to the 9th position in the table.
ECP256_PointAdd(&temp[3], &temp[0], pt); // temp[3] = 13G = 12G + G
ECP256_Scatterw5(table, &temp[3], 13); // Discretely save temp[3] to the 13th position of the table.
ECP256_PointDouble(&temp[1], &temp[1]); // temp[1] = 14G = 7G * 2
ECP256_Scatterw5(table, &temp[1], 14); // Discretely saves temp[1] to the 14th position of the table.
ECP256_PointAdd(&temp[0], &temp[1], pt); // temp[0] = 15G = 14G + G = temp[1] + pt
ECP256_Scatterw5(table, &temp[0], 15); // Discretely save temp[0] to the 15th position of the table.
ECP256_PointDouble(&temp[1], &temp[2]); // temp[1] = 16G = 8G * 2 = temp[2] * 2
ECP256_Scatterw5(table, &temp[1], 16); // Discretely saves temp[1] to the 16th position of the table.
}
static void CRYPT_ECP256_PointDouble5Times(P256_Point *r)
{
ECP256_PointDouble(r, r);
ECP256_PointDouble(r, r);
ECP256_PointDouble(r, r);
ECP256_PointDouble(r, r);
ECP256_PointDouble(r, r);
}
// r = k*point
// Ensure that m is not empty and is in the range (0, n-1)
static void ECP256_WindowMul(P256_Point *r, const BN_BigNum *k, const ECC_Point *point)
{
uint8_t kOctets[33]; // m big endian byte stream. Apply for 33 bytes and reserve one byte for the following offset.
uint32_t mLen = BN_Bytes(k);
// Offset during byte stream conversion. Ensure that the valid data of the mOctet is in the upper bits.
uint32_t offset = sizeof(kOctets) - mLen;
P256_Point table[16]; // The pre-computation window is 2 ^ (5 - 1) = 16 points
P256_Point temp; // Apply for temporary space of two points.
Coord tempY;
(void)BN_Bn2Bin(k, kOctets + offset, &mLen);
for (uint32_t i = 0; i < offset; i++) {
kOctets[i] = 0;
}
ECP256_EccPoint2P256Point(&temp, point);
ECP256_PreCompWindow(table, &temp);
// The first byte is the first two bits of kOctets[1].
// The subscript starts from 0. Therefore, it is bit 0 + 8 and bit 1 + 8 = 9.
uint32_t scans = 9;
uint32_t index; // position of the byte to be scanned.
// Number of bits to be shifted rightwards by the current byte.
// Each byte needs to be moved backward by a maximum of 7 bits.
uint32_t shift = 7 - (scans % 8);
uint32_t w = 5; // Window size = 5
// the recode mask, the window size is 5, thus the value is 6 bits, mask = 0b111111 = 0x3f
uint32_t mask = (1u << (w + 1)) - 1;
uint32_t wCode = kOctets[1];
wCode = (wCode >> shift) & mask;
wCode = Recodew5(wCode);
ECP256_Gatherw5(&temp, table, wCode >> 1);
(void)memcpy_s(r, sizeof(P256_Point), &temp, sizeof(P256_Point));
// 5 bits is obtained each time. The total number of bits is 256 + 8 (1 byte reserved) = 264 bits.
// Therefore, the last time can be scanned to 264-5 = 259 bits.
while (scans < 259) {
// Double the point for 5 times
CRYPT_ECP256_PointDouble5Times(r);
scans += w; // Number of bits in the next scan.
index = scans / 8; // Location of the byte to be scanned. (1 byte = 8 bits)
// Number of bits to be shifted rightwards by the current byte.
// Each byte needs to be moved backward by a maximum of 7 bits. (1 byte = 8 bits)
shift = 7 - (scans % 8);
// Shift the upper byte by 8 bits to left, concatenate the current byte, and then shift to get the current wCode
wCode = kOctets[index] | (kOctets[index - 1] << 8);
wCode = (wCode >> shift) & mask;
wCode = Recodew5(wCode);
ECP256_Gatherw5(&temp, table, wCode >> 1);
ECP256_Neg(&tempY, &(temp.y));
// If the least significant bit of the code is 1, plus -(wCode >> 1) times point.
CopyConditional(&(temp.y), &tempY, wCode & 1);
ECP256_PointAdd(r, r, &temp);
}
// Special processing of the last block
CRYPT_ECP256_PointDouble5Times(r);
wCode = kOctets[32]; // Obtain the last byte, that is, kOctets[32].
wCode = (wCode << 1) & mask;
wCode = Recodew5(wCode);
ECP256_Gatherw5(&temp, table, wCode >> 1);
ECP256_Neg(&tempY, &(temp.y));
// If the least significant bit of the code is 1, plus -(wCode >> 1) times point.
CopyConditional(&(temp.y), &tempY, wCode & 1);
ECP256_PointAdd(r, r, &temp);
}
static void ComputeK1G(P256_Point *k1G, const BN_BigNum *k1)
{
uint8_t kOctets[33]; // applies for 33 bytes and reserves one byte for the following offset. 256 bits are 32 bytes.
Coord tempY;
P256_AffinePoint k1GAffine;
const ECP256_TableRow *preCompTable = NULL; // precompute window size is 2 ^(7 - 1) = 64
preCompTable = ECP256_GetPreCompTable();
uint32_t kLen = BN_Bytes(k1);
// Offset during byte stream conversion. Ensure that the valid data of the mOctet is in the upper bits.
uint32_t offset = sizeof(kOctets) - kLen;
(void)BN_Bn2Bin(k1, kOctets + offset, &kLen);
for (uint32_t i = 0; i < offset; i++) {
kOctets[i] = 0;
}
uint32_t w = 7; // Window size = 7
// the recode mask, the window size is 7, thus 8 bits are used (one extra bit is the sign bit).
// mask = 0b11111111 = 0xff
uint32_t mask = (1u << (w + 1)) - 1;
uint32_t wCode = (kOctets[32] << 1) & mask; // Last byte kOctets[32] is the least significant 7 bits.
wCode = Recodew7(wCode);
ECP256_Gatherw7(&k1GAffine, preCompTable[0], wCode >> 1);
ECP256_Neg(&tempY, &(k1GAffine.y));
// If the least significant bit of the code is 1, plus -(wCode >> 1) times point.
CopyConditional(&(k1GAffine.y), &tempY, wCode & 1);
// If the x and y coordinates of k1GAffine are both 0, then the infinity is all Fs; otherwise, the infinity is 0.
BN_UINT infinity = IsZero(&(k1GAffine.x)) & IsZero(&(k1GAffine.y));
Affine2Jproj(k1G, &k1GAffine, ~infinity);
uint32_t scans = 0;
uint32_t index, shift;
// pre-computation table is table[37][64]. The table is queried every 7 bits (valid bits) of 256 bits. 256/7 = 36.57
for (uint32_t i = 1; i < 37; i++) {
scans += w;
index = 32 - ((scans - 1) / 8); // The subscript of the last byte is 32, and 8 means 8 bits(1byte)
shift = (scans - 1) % 8; // 8 means 8 bits(1byte)
wCode = kOctets[index] | (kOctets[index - 1] << 8); // 8 means 8 bits(1byte)
wCode = (wCode >> shift) & mask;
wCode = Recodew7(wCode);
ECP256_Gatherw7(&k1GAffine, preCompTable[i], wCode >> 1);
ECP256_Neg(&tempY, &(k1GAffine.y));
// If the least significant bit of the code is 1, plus -(wCode >> 1) times point.
CopyConditional(&(k1GAffine.y), &tempY, wCode & 1);
ECP256_AddAffine(k1G, k1G, &k1GAffine);
}
}
static int32_t ECP256_PointMulCheck(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt)
{
bool flag = (para == NULL || r == NULL || k == NULL);
uint32_t bits;
if (flag) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != CRYPT_ECC_NISTP256 || r->id != CRYPT_ECC_NISTP256) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
if (pt != NULL) {
if (pt->id != CRYPT_ECC_NISTP256) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
// Special processing for the infinite point.
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
}
bits = BN_Bits(k);
if (bits > 256) { // 256 is the number of bits in the curve mode
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_MUL_ERR_K_LEN);
return CRYPT_ECC_POINT_MUL_ERR_K_LEN;
}
return CRYPT_SUCCESS;
}
// if pt == NULL, r = k * G, otherwise r = k * pt
int32_t ECP256_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt)
{
P256_Point rTemp;
int32_t ret = ECP256_PointMulCheck(para, r, k, pt);
if (ret != CRYPT_SUCCESS) {
return ret;
}
if (pt == NULL) {
ComputeK1G(&rTemp, k);
} else {
ECP256_WindowMul(&rTemp, k, pt);
}
ECP256_P256Point2EccPoint(r, &rTemp);
return ret;
}
static int32_t ECP256_PointMulAddCheck(
ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt)
{
bool flag = (para == NULL || r == NULL || k1 == NULL || k2 == NULL || pt == NULL);
uint32_t bits1, bits2;
if (flag) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != CRYPT_ECC_NISTP256 || r->id != CRYPT_ECC_NISTP256 || pt->id != CRYPT_ECC_NISTP256) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
// Special processing of the infinite point.
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
bits1 = BN_Bits(k1);
bits2 = BN_Bits(k2);
if (bits1 > 256 || bits2 > 256) { // 256 is the number of bits in the curve mode
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_MUL_ERR_K_LEN);
return CRYPT_ECC_POINT_MUL_ERR_K_LEN;
}
return CRYPT_SUCCESS;
}
// r = k1 * G + k2 * pt
int32_t ECP256_PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2,
const ECC_Point *pt)
{
int32_t ret = ECP256_PointMulAddCheck(para, r, k1, k2, pt);
if (ret != CRYPT_SUCCESS) {
return ret;
}
P256_Point k2Pt;
P256_Point k1G;
ECP256_WindowMul(&k2Pt, k2, pt);
ComputeK1G(&k1G, k1);
ECP256_PointAdd(&k1G, &k1G, &k2Pt);
ECP256_P256Point2EccPoint(r, &k1G);
return ret;
}
#endif /* defined(HITLS_CRYPTO_CURVE_NISTP256) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) */
|
2301_79861745/bench_create
|
crypto/ecc/src/asm_ecp_nistp256.c
|
C
|
unknown
| 21,703
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef ASM_ECP_NISTP256_H
#define ASM_ECP_NISTP256_H
#include "hitls_build.h"
#ifdef __cplusplus
extern "C" {
#endif
#define P256_BYTES 32
#define P256_SIZE (P256_BYTES / sizeof(BN_UINT))
typedef struct {
BN_UINT value[P256_SIZE];
} Coord; // Point Coordinates
typedef struct p256_point {
Coord x;
Coord y;
Coord z;
} P256_Point;
typedef struct p256_pointaffine {
Coord x;
Coord y;
} P256_AffinePoint;
#if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE)
typedef P256_AffinePoint ECP256_TableRow[64];
const ECP256_TableRow *ECP256_GetPreCompTable(void);
void ECP256_FromMont(Coord *r, const Coord *a);
void ECP256_Mul(Coord *r, const Coord *a, const Coord *b);
void ECP256_Sqr(Coord *r, const Coord *a);
void ECP256_Neg(Coord *r, const Coord *a);
void ECP256_OrdMul(Coord *r, const Coord *a, const Coord *b);
void ECP256_OrdSqr(Coord *r, const Coord *a, int32_t repeat);
void ECP256_PointDouble(P256_Point *r, const P256_Point *a);
void ECP256_PointAdd(P256_Point *r, const P256_Point *a, const P256_Point *b);
void ECP256_AddAffine(P256_Point *r, const P256_Point *a, const P256_AffinePoint *b);
void ECP256_Scatterw5(P256_Point *table, const P256_Point *point, uint32_t index);
void ECP256_Gatherw5(P256_Point *point, const P256_Point *table, uint32_t index);
void ECP256_Gatherw7(P256_AffinePoint *point, const P256_AffinePoint *table, uint32_t index);
#endif /* HITLS_CRYPTO_CURVE_NISTP256_ASM && HITLS_CRYPTO_NIST_ECC_ACCELERATE */
#ifdef __cplusplus
}
#endif
#endif
|
2301_79861745/bench_create
|
crypto/ecc/src/asm_ecp_nistp256.h
|
C
|
unknown
| 2,116
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_CURVE_SM2) && defined(HITLS_SIXTY_FOUR_BITS)
#include <stdint.h>
#include "securec.h"
#include "crypt_ecc.h"
#include "ecc_local.h"
#include "crypt_utils.h"
#include "crypt_errno.h"
#include "bsl_sal.h"
#include "bsl_err_internal.h"
#include "asm_ecp_sm2.h"
#define SM2_MASK2 0xff
#define WINDOW_SIZE 4
#define PRECOMPUTED_TABLE_SIZE (1 << WINDOW_SIZE)
#define WINDOW_HALF_TABLE_SIZE 8
#define SM2_NUMTOOFFSET(num) (((num) < 0) ? (WINDOW_HALF_TABLE_SIZE - 1 - (((num) - 1) >> 1)) : (((num) - 1) >> 1))
static const BN_UINT g_sm2p[SM2_LIMBS] = {
0xffffffffffffffff, 0xffffffff00000000,
0xffffffffffffffff, 0xfffffffeffffffff
};
static const BN_UINT g_sm2ord[SM2_LIMBS] = {
0x53bbf40939d54123, 0x7203df6b21c6052b,
0xffffffffffffffff, 0xfffffffeffffffff
};
static const BN_UINT g_one[SM2_LIMBS] = {1, 0, 0, 0};
#define FDIV(uout, uin, xout, xin, div, mod) \
do { \
ECP_Sm2Div##div(uout, uin); \
ECP_Sm2Div##div##Mod##mod(xout, xin); \
} while (0)
#define FSUB(uout, uin, xout, xin, mod) \
do { \
ECP_Sm2BnSub(uout, uout, uin); \
ECP_Sm2SubMod##mod(xout, xout, xin); \
} while (0)
#define FSUB_DIV(u, v, x1, x2, div, mod) \
do { \
if (IsGreater(u, v) == 1) { \
FSUB(u, v, x1, x2, mod); \
FDIV(u, u, x1, x1, div, mod); \
} else { \
FSUB(v, u, x2, x1, mod); \
FDIV(v, v, x2, x2, div, mod); \
} \
} while (0)
static uint32_t IsZero(BN_UINT a)
{
BN_UINT t = a;
t |= (0 - t);
t = ~t;
t >>= (BN_UNIT_BITS - 1);
return (uint32_t)t;
}
static uint32_t IsZeros(const BN_UINT *a)
{
BN_UINT res = a[0] ^ 0;
for (uint32_t i = 1; i < SM2_LIMBS; i++) {
res |= a[i] ^ 0;
}
return IsZero(res);
}
static uint32_t IsEqual(const BN_UINT *a, const BN_UINT *b)
{
BN_UINT res = a[0] ^ b[0];
for (uint32_t i = 1; i < SM2_LIMBS; i++) {
res |= a[i] ^ b[i];
}
return IsZero(res);
}
#define IS_ONE(a) IsEqual(a, g_one)
static int32_t IsGreater(const BN_UINT *a, const BN_UINT *b)
{
for (int32_t i = (int32_t)(SM2_LIMBS - 1); i >= 0; --i) {
if (a[i] > b[i]) {
return 1;
}
if (a[i] < b[i]) {
return -1;
}
}
return 0;
}
/*
* Radix-4 Binary algorithm for modular inversion in Fp
* ref. <Ultra High-Speed SM2 ASIC Implementation>
*/
/* Modular inv: out = in^(-1) mod p */
static void ECP_Sm2ModInverse(BN_UINT *out, const BN_UINT *in)
{
BN_UINT u[SM2_LIMBS] ALIGN32;
BN_UINT v[SM2_LIMBS] ALIGN32;
BN_UINT x1[SM2_LIMBS] ALIGN32 = {1, 0, 0, 0};
BN_UINT x2[SM2_LIMBS] ALIGN32 = {0};
BN_UINT c;
BN_UINT d;
if (IsZeros(in) != 0) {
return;
}
(void)memcpy_s(u, SM2_BYTES_NUM, in, SM2_BYTES_NUM);
(void)memcpy_s(v, SM2_BYTES_NUM, g_sm2p, SM2_BYTES_NUM);
while (((!IS_ONE(u)) != 0) && ((!IS_ONE(v)) != 0)) {
c = u[0] & 0x3; // Use 0x03 to obtain the last two bits.
d = v[0] & 0x3;
if (c == 0) {
FDIV(u, u, x1, x1, 4, P);
} else if (d == 0) {
FDIV(v, v, x2, x2, 4, P);
} else if (c == d) {
FSUB_DIV(u, v, x1, x2, 4, P);
} else if (c == 2) { // if c == 2
FDIV(u, u, x1, x1, 2, P);
FSUB_DIV(u, v, x1, x2, 2, P);
} else if (d == 2) { // if d == 2
FDIV(v, v, x2, x2, 2, P);
FSUB_DIV(u, v, x1, x2, 2, P);
} else {
FSUB_DIV(u, v, x1, x2, 2, P);
}
}
if (IS_ONE(u) != 0) {
(void)memcpy_s(out, SM2_BYTES_NUM, x1, SM2_BYTES_NUM);
} else {
(void)memcpy_s(out, SM2_BYTES_NUM, x2, SM2_BYTES_NUM);
}
}
/* Modular inv: out = in^(-1) mod n, where n = ord(p) */
static void ECP_Sm2InvModOrd(BN_UINT *out, const BN_UINT *in)
{
BN_UINT u[SM2_LIMBS] ALIGN32;
BN_UINT v[SM2_LIMBS] ALIGN32;
BN_UINT x1[SM2_LIMBS] ALIGN32 = {1, 0, 0, 0};
BN_UINT x2[SM2_LIMBS] ALIGN32 = {0};
BN_UINT c;
BN_UINT d;
if (IsZeros(in) != 0) {
return;
}
(void)memcpy_s(u, SM2_BYTES_NUM, in, SM2_BYTES_NUM);
(void)memcpy_s(v, SM2_BYTES_NUM, g_sm2ord, SM2_BYTES_NUM);
while (((!IS_ONE(u)) != 0) && ((!IS_ONE(v)) != 0)) {
c = u[0] & 0x3; // Use 0x03 to obtain the last two bits.
d = v[0] & 0x3;
if (c == 0) {
FDIV(u, u, x1, x1, 4, Ord);
} else if (d == 0) {
FDIV(v, v, x2, x2, 4, Ord);
} else if (c == d) {
FSUB_DIV(u, v, x1, x2, 4, Ord);
} else if (c == 2) { // if c == 2
FDIV(u, u, x1, x1, 2, Ord);
FSUB_DIV(u, v, x1, x2, 2, Ord);
} else if (d == 2) { // if d == 2
FDIV(v, v, x2, x2, 2, Ord);
FSUB_DIV(u, v, x1, x2, 2, Ord);
} else {
FSUB_DIV(u, v, x1, x2, 2, Ord);
}
}
if (IS_ONE(u) != 0) {
(void)memcpy_s(out, SM2_BYTES_NUM, x1, SM2_BYTES_NUM);
} else {
(void)memcpy_s(out, SM2_BYTES_NUM, x2, SM2_BYTES_NUM);
}
}
static int32_t ECP_Sm2Point2Array(SM2_point *r, const ECC_Point *p)
{
int32_t ret;
uint32_t len = SM2_LIMBS;
GOTO_ERR_IF_EX(BN_Bn2U64Array(&p->x, (BN_UINT *)&r->x, &len), ret);
GOTO_ERR_IF_EX(BN_Bn2U64Array(&p->y, (BN_UINT *)&r->y, &len), ret);
GOTO_ERR_IF_EX(BN_Bn2U64Array(&p->z, (BN_UINT *)&r->z, &len), ret);
ERR:
return ret;
}
static int32_t ECP_Sm2Array2Point(ECC_Point *r, const SM2_point *a)
{
int32_t ret;
GOTO_ERR_IF_EX(BN_U64Array2Bn(&r->x, (const BN_UINT *)a->x, SM2_LIMBS), ret);
GOTO_ERR_IF_EX(BN_U64Array2Bn(&r->y, (const BN_UINT *)a->y, SM2_LIMBS), ret);
GOTO_ERR_IF_EX(BN_U64Array2Bn(&r->z, (const BN_UINT *)a->z, SM2_LIMBS), ret);
ERR:
return ret;
}
int32_t ECP_Sm2GetAffine(SM2_AffinePoint *r, const SM2_point *a)
{
BN_UINT zInv3[SM2_LIMBS] ALIGN32 = {0};
BN_UINT zInv2[SM2_LIMBS] ALIGN32 = {0};
if (IsZeros(a->z) != 0) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
if (IsEqual(a->z, g_one) != 0) {
(void)memcpy_s(r->x, sizeof(r->x), a->x, sizeof(r->x));
(void)memcpy_s(r->y, sizeof(r->y), a->y, sizeof(r->x));
return CRYPT_SUCCESS;
}
ECP_Sm2ModInverse(zInv3, a->z);
ECP_Sm2Sqr(zInv2, zInv3);
ECP_Sm2Mul(r->x, a->x, zInv2);
ECP_Sm2Mul(zInv3, zInv3, zInv2);
ECP_Sm2Mul(r->y, a->y, zInv3);
return CRYPT_SUCCESS;
}
int32_t ECP_Sm2Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a)
{
if (r == NULL || a == NULL || para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != CRYPT_ECC_SM2 || r->id != CRYPT_ECC_SM2 || a->id != CRYPT_ECC_SM2) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
SM2_point temp = {0};
SM2_AffinePoint rTemp = {0};
int32_t ret;
GOTO_ERR_IF_EX(ECP_Sm2Point2Array(&temp, a), ret);
GOTO_ERR_IF_EX(ECP_Sm2GetAffine(&rTemp, &temp), ret);
GOTO_ERR_IF_EX(BN_Array2BN(&r->x, rTemp.x, SM2_LIMBS), ret);
GOTO_ERR_IF_EX(BN_Array2BN(&r->y, rTemp.y, SM2_LIMBS), ret);
GOTO_ERR_IF_EX(BN_SetLimb(&r->z, 1), ret);
ERR:
return ret;
}
int32_t ECP_Sm2PointDouble(const ECC_Para *para, ECC_Point *r, const ECC_Point *a)
{
return ECP_NistPointDouble(para, r, a);
}
int32_t ECP_Sm2PointAddAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b)
{
return ECP_NistPointAddAffine(para, r, a, b);
}
static void ECP_Sm2ScalarMulG(SM2_point *r, const BN_UINT *k)
{
const BN_UINT *precomputed = ECP_Sm2Precomputed();
uint32_t index;
for (int32_t i = SM2_BYTES_NUM - 1; i >= 0; --i) {
index = (k[i / sizeof(BN_UINT)] >> (SM2_BITSOFBYTES * (i % sizeof(BN_UINT)))) & SM2_MASK2;
#ifndef HITLS_SM2_PRECOMPUTE_512K_TBL
ECP_Sm2PointDoubleMont(r, r);
ECP_Sm2PointDoubleMont(r, r);
ECP_Sm2PointDoubleMont(r, r);
ECP_Sm2PointDoubleMont(r, r);
ECP_Sm2PointDoubleMont(r, r);
ECP_Sm2PointDoubleMont(r, r);
ECP_Sm2PointDoubleMont(r, r);
ECP_Sm2PointDoubleMont(r, r);
#endif
if (index != 0) {
#ifdef HITLS_SM2_PRECOMPUTE_512K_TBL
index = index + i * SM2_BITS;
#endif
index = index * SM2_BITSOFBYTES;
ECP_Sm2PointAddAffineMont(r, r, (const SM2_AffinePoint *)&precomputed[index]);
}
}
}
static int32_t ECP_Sm2WnafMul(SM2_point *r, const BN_BigNum *k, SM2_point p)
{
ReCodeData *recodeK = ECC_ReCodeK(k, WINDOW_SIZE);
if (recodeK == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
SM2_point doublePoint;
SM2_point precomputed[PRECOMPUTED_TABLE_SIZE] ALIGN64;
ECP_Sm2ToMont(precomputed[0].x, p.x);
ECP_Sm2ToMont(precomputed[0].y, p.y);
ECP_Sm2ToMont(precomputed[0].z, p.z);
ECP_Sm2PointDoubleMont(&doublePoint, &precomputed[0]);
(void)memcpy_s(precomputed[WINDOW_HALF_TABLE_SIZE].x, SM2_BYTES_NUM, precomputed[0].x, SM2_BYTES_NUM);
ECP_Sm2Neg(precomputed[WINDOW_HALF_TABLE_SIZE].y, precomputed[0].y);
(void)memcpy_s(precomputed[WINDOW_HALF_TABLE_SIZE].z, SM2_BYTES_NUM, precomputed[0].z, SM2_BYTES_NUM);
for (uint32_t i = 1; i < WINDOW_HALF_TABLE_SIZE; i++) {
ECP_Sm2PointAddMont(&precomputed[i], &precomputed[i - 1], &doublePoint); // 1, 3, 5, 7, 9, 11, 13, 15
(void)memcpy_s(precomputed[i + WINDOW_HALF_TABLE_SIZE].x, SM2_BYTES_NUM, precomputed[i].x, SM2_BYTES_NUM);
ECP_Sm2Neg(precomputed[i + WINDOW_HALF_TABLE_SIZE].y, precomputed[i].y);
(void)memcpy_s(precomputed[i + WINDOW_HALF_TABLE_SIZE].z, SM2_BYTES_NUM, precomputed[i].z, SM2_BYTES_NUM);
}
int8_t index = SM2_NUMTOOFFSET(recodeK->num[0]);
(void)memcpy_s(r, sizeof(SM2_point), &precomputed[index], sizeof(SM2_point));
uint32_t w = recodeK->wide[0];
while (w != 0) {
ECP_Sm2PointDoubleMont(r, r);
w--;
}
for (uint32_t i = 1; i < recodeK->size; i++) {
index = SM2_NUMTOOFFSET(recodeK->num[i]);
ECP_Sm2PointAddMont(r, r, &precomputed[index]);
w = recodeK->wide[i];
while (w != 0) {
ECP_Sm2PointDoubleMont(r, r);
w--;
}
}
ECC_ReCodeFree(recodeK);
return CRYPT_SUCCESS;
}
int32_t ECP_Sm2PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *scalar, const ECC_Point *pt)
{
if (para == NULL || r == NULL || scalar == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != CRYPT_ECC_SM2 || r->id != CRYPT_ECC_SM2 || (pt != NULL && (pt->id != CRYPT_ECC_SM2))) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
if (pt != NULL && BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
if (BN_IsZero(scalar)) {
return BN_Zeroize(&r->z);
}
int32_t ret;
BN_UINT k[SM2_LIMBS] = {0};
uint32_t klen = SM2_LIMBS;
SM2_point re = {0};
SM2_point sm2Pt = {0};
GOTO_ERR_IF_EX(BN_Bn2U64Array(scalar, k, &klen), ret);
if (pt == NULL) {
// calculate k*G
ECP_Sm2ScalarMulG(&re, k);
} else {
// point 2 affine
GOTO_ERR_IF_EX(ECP_Sm2Point2Array(&sm2Pt, pt), ret);
GOTO_ERR_IF_EX(ECP_Sm2WnafMul(&re, scalar, sm2Pt), ret);
}
ECP_Sm2FromMont(re.x, re.x);
ECP_Sm2FromMont(re.y, re.y);
ECP_Sm2FromMont(re.z, re.z);
// SM2_point 2 ECC_Point
GOTO_ERR_IF_EX(ECP_Sm2Array2Point(r, &re), ret);
ERR:
return ret;
}
int32_t ECP_Sm2PointMulFast(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt)
{
return ECP_Sm2PointMul(para, r, k, pt);
}
int32_t ECP_Sm2OrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a)
{
if (para == NULL || r == NULL || a == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (BN_IsZero(a)) {
BSL_ERR_PUSH_ERROR(CRYPT_BN_ERR_DIVISOR_ZERO);
return CRYPT_BN_ERR_DIVISOR_ZERO;
}
int32_t ret = BN_Extend(r, SM2_LIMBS);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ECP_Sm2InvModOrd(r->data, a->data);
r->size = SM2_LIMBS;
BN_FixSize(r);
if (BN_IsZero(r)) {
BSL_ERR_PUSH_ERROR(CRYPT_BN_ERR_NO_INVERSE);
return CRYPT_BN_ERR_NO_INVERSE;
}
return CRYPT_SUCCESS;
}
static int32_t ECP_Sm2PointMulAddCheck(
ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt)
{
bool flag = (para == NULL || r == NULL || k1 == NULL || k2 == NULL || pt == NULL);
uint32_t bits1;
uint32_t bits2;
if (flag) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != CRYPT_ECC_SM2 || r->id != CRYPT_ECC_SM2 || pt->id != CRYPT_ECC_SM2) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
// Special processing of the infinite point.
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
bits1 = BN_Bits(k1);
bits2 = BN_Bits(k2);
if (bits1 > SM2_BITS || bits2 > SM2_BITS) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_MUL_ERR_K_LEN);
return CRYPT_ECC_POINT_MUL_ERR_K_LEN;
}
return CRYPT_SUCCESS;
}
// r = k1 * G + k2 * pt
int32_t ECP_Sm2PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt)
{
int32_t ret = ECP_Sm2PointMulAddCheck(para, r, k1, k2, pt);
if (ret != CRYPT_SUCCESS) {
return ret;
}
BN_UINT k1Uint[SM2_LIMBS] = {0};
uint32_t k1Len = SM2_LIMBS;
SM2_point k1G = {0};
SM2_point k2Pt = {0};
SM2_point sm2Pt = {0};
GOTO_ERR_IF_EX(BN_Bn2U64Array(k1, k1Uint, &k1Len), ret);
GOTO_ERR_IF_EX(ECP_Sm2Point2Array(&sm2Pt, pt), ret);
// k1 * G
ECP_Sm2ScalarMulG(&k1G, k1Uint);
// k2 * pt
GOTO_ERR_IF_EX(ECP_Sm2WnafMul(&k2Pt, k2, sm2Pt), ret);
ECP_Sm2PointAddMont(&k2Pt, &k1G, &k2Pt);
ECP_Sm2FromMont(k2Pt.x, k2Pt.x);
ECP_Sm2FromMont(k2Pt.y, k2Pt.y);
ECP_Sm2FromMont(k2Pt.z, k2Pt.z);
GOTO_ERR_IF_EX(ECP_Sm2Array2Point(r, &k2Pt), ret);
ERR:
return ret;
}
#endif
|
2301_79861745/bench_create
|
crypto/ecc/src/asm_ecp_sm2.c
|
C
|
unknown
| 15,270
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef ASM_ECP_SM2_H
#define ASM_ECP_SM2_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_CURVE_SM2
#include <stdint.h>
#include "crypt_bn.h"
#ifdef __cplusplus
extern "C" {
#endif
#define SM2_BITS 256
#define SM2_BITSOFBYTES 8
#define SM2_BYTES_NUM 32
#define SM2_LIMBS (SM2_BYTES_NUM / sizeof(BN_UINT)) /* = 4 or 8 */
typedef struct SM2_point {
BN_UINT x[SM2_LIMBS];
BN_UINT y[SM2_LIMBS];
BN_UINT z[SM2_LIMBS];
} SM2_point;
typedef struct SM2_pointaffine {
BN_UINT x[SM2_LIMBS];
BN_UINT y[SM2_LIMBS];
} SM2_AffinePoint;
/* Right shift: a >> 1 */
void ECP_Sm2BnRshift1(BN_UINT *a);
/* Finite field operations */
/* Modular div by 2: r = a/2 mod p */
void ECP_Sm2DivBy2(BN_UINT *r, const BN_UINT *a);
/* Modular add: r = a+b mod p */
void ECP_Sm2AddModP(BN_UINT *r, const BN_UINT *a, const BN_UINT *b);
/* Modular add: r = a+b mod n, where n = ord(p) */
void ECP_Sm2AddModOrd(BN_UINT *r, const BN_UINT *a, const BN_UINT *b);
/* Modular sub: r = a-b mod p */
void ECP_Sm2SubModP(BN_UINT *r, const BN_UINT *a, const BN_UINT *b);
/* Modular sub: r = a-b mod n, where n = ord(p) */
void ECP_Sm2SubModOrd(BN_UINT *r, const BN_UINT *a, const BN_UINT *b);
/* Modular mul by 3: r = 3*a mod p */
void ECP_Sm2MulBy3(BN_UINT *r, const BN_UINT *a);
/* Modular mul: r = a*b mod p */
void ECP_Sm2Mul(BN_UINT *r, const BN_UINT *a, const BN_UINT *b);
/* Modular sqr: r = a^2 mod p */
void ECP_Sm2Sqr(BN_UINT *r, const BN_UINT *a);
/* sub: r = p - b */
void ECP_Sm2Neg(BN_UINT *r, const BN_UINT *b);
const BN_UINT *ECP_Sm2Precomputed(void);
/* Right shift 1: r = a >> 1 */
void ECP_Sm2Div2(BN_UINT *r, BN_UINT *a);
/* Right shift 2: r = a >> 2 */
void ECP_Sm2Div4(BN_UINT *r, BN_UINT *a);
/* Sub: r = a - b */
void ECP_Sm2BnSub(BN_UINT *r, const BN_UINT *a, const BN_UINT *b);
/* Add: r = a + b */
void ECP_Sm2BnAdd(BN_UINT *r, const BN_UINT *a, const BN_UINT *b);
/* Finite field operations */
/* Modular div by 2: r = a/2 mod p */
void ECP_Sm2Div2ModP(BN_UINT *r, const BN_UINT *a);
/* Modular div by 2: r = a/2 mod n, where n = ord(p) */
void ECP_Sm2Div2ModOrd(BN_UINT *r, const BN_UINT *a);
/* Modular div by 4: r = a/4 mod p */
void ECP_Sm2Div4ModP(BN_UINT *r, BN_UINT *a);
/* Modular div by 4: r = a/4 mod n, where n = ord(p) */
void ECP_Sm2Div4ModOrd(BN_UINT *r, const BN_UINT *a);
/* Convert to Montgomery domain */
void ECP_Sm2ToMont(BN_UINT *r, const BN_UINT *a);
/* Convert from Montgomery domain */
void ECP_Sm2FromMont(BN_UINT *r, const BN_UINT *a);
/* Point double in Montgomery domain: r <- a + a */
void ECP_Sm2PointDoubleMont(SM2_point *r, const SM2_point *a);
/* Point add affine in Montgomery domain: R <- a + b */
void ECP_Sm2PointAddAffineMont(SM2_point *r, const SM2_point *a, const SM2_AffinePoint *b);
/* Point add in Montgomery domain: r <- a + b */
void ECP_Sm2PointAddMont(SM2_point *r, const SM2_point *a, const SM2_point *b);
#ifdef __cplusplus
}
#endif
#endif
#endif
|
2301_79861745/bench_create
|
crypto/ecc/src/asm_ecp_sm2.h
|
C
|
unknown
| 3,462
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ECC
#include "securec.h"
#include "bsl_sal.h"
#include "bsl_err_internal.h"
#include "crypt_utils.h"
#include "crypt_errno.h"
#include "ecc_local.h"
#include "crypt_ecc.h"
ECC_Point *ECC_NewPoint(const ECC_Para *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return NULL;
}
int32_t ret;
uint32_t words = BITS_TO_BN_UNIT(BN_Bits(para->p));
ECC_Point *pt = BSL_SAL_Calloc(sizeof(ECC_Point), 1u);
if (pt == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
pt->id = para->id;
GOTO_ERR_IF(BN_Extend(&pt->x, words), ret);
GOTO_ERR_IF(BN_Extend(&pt->y, words), ret);
GOTO_ERR_IF(BN_Extend(&pt->z, words), ret);
return pt;
ERR:
ECC_FreePoint(pt);
return NULL;
}
void ECC_FreePoint(ECC_Point *pt)
{
if (pt == NULL) {
return;
}
BSL_SAL_CleanseData((void *)(pt->x.data), pt->x.size * sizeof(BN_UINT));
BSL_SAL_FREE(pt->x.data);
BSL_SAL_CleanseData((void *)(pt->y.data), pt->y.size * sizeof(BN_UINT));
BSL_SAL_FREE(pt->y.data);
BSL_SAL_CleanseData((void *)(pt->z.data), pt->z.size * sizeof(BN_UINT));
BSL_SAL_FREE(pt->z.data);
BSL_SAL_Free(pt);
}
void ECC_SetLibCtx(void *libCtx, ECC_Para *para)
{
para->libCtx = libCtx;
}
int32_t ECC_CopyPoint(ECC_Point *dst, const ECC_Point *src)
{
if (dst == NULL || src == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (dst->id != src->id) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
int32_t ret;
GOTO_ERR_IF(BN_Copy(&dst->x, &src->x), ret);
GOTO_ERR_IF(BN_Copy(&dst->y, &src->y), ret);
GOTO_ERR_IF(BN_Copy(&dst->z, &src->z), ret);
ERR:
return ret;
}
ECC_Point *ECC_DupPoint(const ECC_Point *pt)
{
if (pt == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return NULL;
}
int32_t ret;
ECC_Point *newPt = BSL_SAL_Calloc(sizeof(ECC_Point), 1u);
if (newPt == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
newPt->id = pt->id;
GOTO_ERR_IF(BN_Extend(&newPt->x, pt->x.room), ret);
GOTO_ERR_IF(BN_Extend(&newPt->y, pt->y.room), ret);
GOTO_ERR_IF(BN_Extend(&newPt->z, pt->z.room), ret);
(void)BN_Copy(&newPt->x, &pt->x);
(void)BN_Copy(&newPt->y, &pt->y);
(void)BN_Copy(&newPt->z, &pt->z);
return newPt;
ERR:
ECC_FreePoint(newPt);
return NULL;
}
// Convert to Cartesian coordinates
int32_t ECC_GetPoint(const ECC_Para *para, ECC_Point *pt, CRYPT_Data *x, CRYPT_Data *y)
{
int32_t ret;
uint32_t pBytes;
if (para == NULL || pt == NULL || x == NULL || x->data == NULL ||
((y != NULL) && (y->data == NULL))) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != pt->id) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
pBytes = BN_Bytes(para->p);
if ((x->len < pBytes) || ((y != NULL) && (y->len < pBytes))) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_BUFF_LEN_NOT_ENOUGH);
return CRYPT_ECC_BUFF_LEN_NOT_ENOUGH;
}
if (BN_IsZero(&pt->z)) { // infinity point
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
if (para->method->point2Affine == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT);
return CRYPT_ECC_NOT_SUPPORT;
}
GOTO_ERR_IF(para->method->point2Affine(para, pt, pt), ret);
GOTO_ERR_IF(BN_Bn2BinFixZero(&pt->x, x->data, pBytes), ret);
x->len = pBytes;
if (y != NULL) {
GOTO_ERR_IF(BN_Bn2BinFixZero(&pt->y, y->data, pBytes), ret);
y->len = pBytes;
}
ERR:
return ret;
}
int32_t ECC_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a)
{
if (para == NULL || r == NULL || a == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != a->id || para->id != r->id) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
if (BN_IsZero(&a->z)) { // infinity point
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
if (para->method->point2Affine == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT);
return CRYPT_ECC_NOT_SUPPORT;
}
int32_t ret = para->method->point2Affine(para, r, a);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
return ret;
}
int32_t ECC_GetPoint2Bn(const ECC_Para *para, ECC_Point *pt, BN_BigNum *x, BN_BigNum *y)
{
int32_t ret;
GOTO_ERR_IF(ECC_GetPointDataX(para, pt, x), ret);
if (y != NULL) {
GOTO_ERR_IF(BN_Copy(y, &pt->y), ret);
}
ERR:
return ret;
}
int32_t ECC_GetPointDataX(const ECC_Para *para, ECC_Point *pt, BN_BigNum *x)
{
int32_t ret;
if (x == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
GOTO_ERR_IF(ECP_PointAtInfinity(para, pt), ret);
if (para->method->point2Affine == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT);
return CRYPT_ECC_NOT_SUPPORT;
}
GOTO_ERR_IF(para->method->point2Affine(para, pt, pt), ret);
GOTO_ERR_IF(BN_Copy(x, &pt->x), ret);
ERR:
return ret;
}
ECC_Point *ECC_GetGFromPara(const ECC_Para *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return NULL;
}
ECC_Point *pt = ECC_NewPoint(para);
if (pt == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)BN_Copy(&pt->x, para->x);
(void)BN_Copy(&pt->y, para->y);
(void)BN_SetLimb(&pt->z, 1);
return pt;
}
int32_t ECC_PointMulAdd(ECC_Para *para, ECC_Point *r,
const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->method->pointMulAdd == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT);
return CRYPT_ECC_NOT_SUPPORT;
}
return para->method->pointMulAdd(para, r, k1, k2, pt);
}
int32_t ECC_PointMul(ECC_Para *para, ECC_Point *r,
const BN_BigNum *k, const ECC_Point *pt)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->method->pointMul == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT);
return CRYPT_ECC_NOT_SUPPORT;
}
return para->method->pointMul(para, r, k, pt);
}
int32_t ECC_PointCmp(const ECC_Para *para, const ECC_Point *a, const ECC_Point *b)
{
// Currently, only prime number curves are supported. Other curves need to be expanded.
return ECP_PointCmp(para, a, b);
}
ECC_Para *ECC_DupPara(const ECC_Para *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return NULL;
}
ECC_Para *newPara = ECC_NewPara(para->id);
if (newPara != NULL) {
newPara->libCtx = para->libCtx;
}
return newPara;
}
uint32_t ECC_ParaBits(const ECC_Para *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return 0;
}
return BN_Bits(para->p);
}
BN_BigNum *ECC_GetParaH(const ECC_Para *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return NULL;
}
return BN_Dup(para->h);
}
BN_BigNum *ECC_GetParaN(const ECC_Para *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return NULL;
}
return BN_Dup(para->n);
}
BN_BigNum *ECC_GetParaA(const ECC_Para *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return NULL;
}
BN_BigNum *dupA = BN_Dup(para->a);
if (dupA == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
goto ERR;
}
if (para->method->bnMontDec != NULL) {
para->method->bnMontDec(dupA, para->montP);
}
return dupA;
ERR:
BN_Destroy(dupA);
return NULL;
}
BN_BigNum *ECC_GetParaB(const ECC_Para *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return NULL;
}
BN_BigNum *dupB = BN_Dup(para->b);
if (dupB == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
goto ERR;
}
if (para->method->bnMontDec != NULL) {
para->method->bnMontDec(dupB, para->montP);
}
return dupB;
ERR:
BN_Destroy(dupB);
return NULL;
}
BN_BigNum *ECC_GetParaX(const ECC_Para *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return NULL;
}
return BN_Dup(para->x);
}
BN_BigNum *ECC_GetParaY(const ECC_Para *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return NULL;
}
return BN_Dup(para->y);
}
int32_t ECC_EncodePoint(const ECC_Para *para, ECC_Point *pt, uint8_t *data, uint32_t *dataLen,
CRYPT_PKEY_PointFormat format)
{
// Currently, only prime number curves are supported. Other curves need to be expanded.
return ECP_EncodePoint(para, pt, data, dataLen, format);
}
int32_t ECC_DecodePoint(const ECC_Para *para, ECC_Point *pt, const uint8_t *data, uint32_t dataLen)
{
// Currently, only prime number curves are supported. Other curves need to be expanded.
return ECP_DecodePoint(para, pt, data, dataLen);
}
int32_t ECC_PointCheck(const ECC_Point *pt)
{
if (pt == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
return CRYPT_SUCCESS;
}
int32_t ECC_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->method->modOrdInv == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT);
return CRYPT_ECC_NOT_SUPPORT;
}
return para->method->modOrdInv(para, r, a);
}
int32_t ECC_PointToMont(const ECC_Para *para, ECC_Point *pt, BN_Optimizer *opt)
{
if (para == NULL || pt == NULL || opt == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->method->bnMontEnc == NULL) {
return CRYPT_SUCCESS;
}
int32_t ret;
GOTO_ERR_IF(para->method->bnMontEnc(&pt->x, para->montP, opt, false), ret);
GOTO_ERR_IF(para->method->bnMontEnc(&pt->y, para->montP, opt, false), ret);
GOTO_ERR_IF(para->method->bnMontEnc(&pt->z, para->montP, opt, false), ret);
ERR:
return ret;
}
void ECC_PointFromMont(const ECC_Para *para, ECC_Point *r)
{
if (para == NULL || r == NULL || para->method->bnMontDec == NULL) {
return;
}
para->method->bnMontDec(&r->x, para->montP);
para->method->bnMontDec(&r->y, para->montP);
para->method->bnMontDec(&r->z, para->montP);
}
/*
Prime curve, point addition r = a + b
Calculation formula:
X3 = (Y2*Z1^3-Y1)^2 - (X2*Z1^2-X1)^2 * (X1+X2*Z1^2)
Y3 = (Y2*Z1^3-Y1) * (X1*(X2*Z1^2-X1)^2-X3) - Y1 * (X2*Z1^2-X1)^3
Z3 = (X2*Z1^2-X1) * Z1
*/
int32_t ECC_PointAddAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b)
{
int32_t ret;
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->method->pointAddAffine == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT);
return CRYPT_ECC_NOT_SUPPORT;
}
BN_Optimizer *opt = BN_OptimizerCreate();
ECC_Point *affineb = ECC_NewPoint(para);
ECC_Point *dupA = ECC_DupPoint(a);
if (affineb == NULL || opt == NULL || dupA == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
goto ERR;
}
GOTO_ERR_IF(ECC_Point2Affine(para, affineb, b), ret);
GOTO_ERR_IF(ECC_PointToMont(para, dupA, opt), ret);
GOTO_ERR_IF(ECC_PointToMont(para, affineb, opt), ret);
GOTO_ERR_IF(para->method->pointAddAffine(para, r, dupA, affineb), ret);
ECC_PointFromMont(para, r);
ERR:
BN_OptimizerDestroy(opt);
ECC_FreePoint(dupA);
ECC_FreePoint(affineb);
return ret;
}
typedef struct {
uint32_t ecKeyLen;
uint32_t secBits;
} ComparableStrengths;
/* See the standard document
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf
Table 2: Comparable strengths */
const ComparableStrengths g_strengthsTable[] = {
{512, 256},
{384, 192},
{256, 128},
{224, 112},
{160, 80}
};
int32_t ECC_GetSecBits(const ECC_Para *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return 0;
}
uint32_t bits = BN_Bits(para->n);
for (size_t i = 0; i < (sizeof(g_strengthsTable) / sizeof(g_strengthsTable[0])); i++) {
if (bits >= g_strengthsTable[i].ecKeyLen) {
return g_strengthsTable[i].secBits;
}
}
return bits / 2;
}
#endif /* HITLS_CRYPTO_ECC */
|
2301_79861745/bench_create
|
crypto/ecc/src/ecc.c
|
C
|
unknown
| 13,714
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef ECC_LOCAL_H
#define ECC_LOCAL_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ECC
#include "crypt_ecc.h"
#include "crypt_bn.h"
#ifdef __cplusplus
extern "C" {
#endif
#define ECC_MAX_BIT_LEN 521
#define PRE_COMPUTE_WINDOW 5 // Default Window Size
#define PRE_COMPUTE_MAX_TABLELEN (1 << 5) // Maximum specifications of the pre-calculation table
/**
* Elliptic Curve Implementation Method
*/
typedef struct {
// Calculate r = k1 * G + k2 * pt
int32_t (*pointMulAdd)(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt);
// Calculate r = k * pt. If pt is null, calculate r = k * G. This is the ConstTime processing function.
int32_t (*pointMul)(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt);
// Calculate r = k * pt. If pt is null, calculate r = k * G
int32_t (*pointMulFast)(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt);
// point addition r = a + b, a all can be the jacobi coordinate, b must be an affine point
int32_t (*pointAddAffine)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b);
// point addition r = a + b, a, b all can be the jacobi coordinate.
int32_t (*pointAdd)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b);
// point double r = a + a, a can be the jacobi coordinate.
int32_t (*pointDouble)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a);
// point Multi-double Calculate r = (2^m)*a, a can be the jacobi coordinate.
int32_t (*pointMultDouble)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m);
// Module inverse
int32_t (*modInv)(BN_BigNum *r, const BN_BigNum *a, const BN_BigNum *p, BN_Optimizer *opt);
// Convert points to affine coordinates based on the given module inverse information.
int32_t (*point2AffineWithInv)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const BN_BigNum *inv);
// Convert the point information to affine coordinates.
int32_t (*point2Affine)(const ECC_Para *para, ECC_Point *r, const ECC_Point *a);
// Calculate r = (a*b) % mod
int32_t (*bnModNistEccMul)(BN_BigNum *r, const BN_BigNum *a, const BN_BigNum *b,
void *mod, BN_Optimizer *opt);
// Calculate r = (a^2) % mod
int32_t (*bnModNistEccSqr)(BN_BigNum *r, const BN_BigNum *a, void *mod, BN_Optimizer *opt);
// Inverse mode order.
int32_t (*modOrdInv)(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a);
// convert date to Montgomery form
int32_t (*bnMontEnc)(BN_BigNum *r, BN_Mont *mont, BN_Optimizer *opt, bool consttime);
// convert Montgomery form to common form
void (*bnMontDec)(BN_BigNum *r, BN_Mont *mont);
} ECC_Method;
/**
* Elliptic Curve Point Information
*/
struct EccPointInfo {
BN_BigNum x;
BN_BigNum y;
BN_BigNum z;
CRYPT_PKEY_ParaId id;
};
/**
* Elliptic curve parameter information
*/
struct EccPara {
BN_BigNum *p;
BN_BigNum *a;
BN_BigNum *b;
BN_BigNum *n;
BN_BigNum *h;
BN_BigNum *x;
BN_BigNum *y;
// Currently, the 5-bit window is used. Only odd multiple points are calculated.
// The total number of pre-calculated data is (2 ^ 5)/2, that is 16 points.
ECC_Point *tableG[16];
const ECC_Method *method;
CRYPT_PKEY_ParaId id;
BN_Mont *montP;
void *libCtx;
};
/**
* @ingroup ecc
* @brief Check whether the checkpoint is at infinity.
*
* @param para [IN] Curve parameters
* @param pt [IN] Point information
*
* @retval CRYPT_SUCCESS succeeded, indicating that the point is not at infinity.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_PointAtInfinity(const ECC_Para *para, const ECC_Point *pt);
/**
* @ingroup ecc
* @brief Check whether the point is on the curve.
* The determined point must be on the Cartesian coordinate, which is used to check the validity of the point input.
*
* @param para [IN] Curve parameters
* @param pt [IN] Point information
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_PointOnCurve(const ECC_Para *para, const ECC_Point *pt);
/**
* @ingroup ecc
* @brief Add salt to the pt point and add random z information.
*
* @param para [IN] Curve parameters
* @param pt [IN/OUT] Point information
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_PointBlind(const ECC_Para *para, ECC_Point *pt);
/**
* @ingroup ecc
* @brief Convert the point information pt to the affine coordinate system and synchronize the data to r.
*
* @param para [IN] Curve parameters
* @param r [OUT] Output point information
* @param pt [IN] Input point information
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt);
/**
* @ingroup ecc
* @brief Converts all point information on pt to affine coordinate system,
* which is used for the coordinate system conversion of the pre-computation table.
*
* @attention pt[0] cannot be an infinite point.
*
* @param para [IN] Curve parameters
* @param pt [IN/OUT] Point information
* @param ptNums [IN] Number of pts
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_Points2Affine(const ECC_Para *para, ECC_Point *pt[], uint32_t ptNums);
/**
* @ingroup ecc
* @brief Calculated r = -a
*
* @attention point a must be a point in the Cartesian coordinate system
*
* @param para [IN] Curve parameters
* @param r [OUT] Output point information
* @param pt [IN] Input point information
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_PointInvertAtAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a);
/**
* @ingroup ecc
* @brief Convert the point information pt to the affine coordinate system and refresh the data to r.
* The inverse information of z is provided by the user.
*
* @attention The validity of inv is guaranteed by the user.
*
* @param para [IN] Curve parameters
* @param r [OUT] Output point information
* @param pt [IN] Input point information
* @param inv [IN] inverse information of z
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_Point2AffineWithInv(
const ECC_Para *para, ECC_Point *r, const ECC_Point *pt, const BN_BigNum *inv);
/**
* @ingroup ecc
* @brief Calculate r = k1 * G + k2 * pt
*
* @param para [IN] Curve parameters
* @param r [OUT] Output point information
* @param k1 [IN] Scalar 1
* @param k2 [IN] Scalar 2
* @param pt [IN] Point data
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_PointMulAdd(
ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt);
/**
* @ingroup ecc
* @brief Check whether a is consistent with b.
*
* @param para [IN] Curve parameter information
* @param a [IN] Input point information
* @param b [IN] Input point information
*
* @retval CRYPT_SUCCESS The two points are the same.
* @retval CRYPT_ECC_POINT_NOT_EQUAL The two points are different.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_PointCmp(const ECC_Para *para, const ECC_Point *a, const ECC_Point *b);
/**
* @ingroup ecc
* @brief Calculate r = k * pt. When pt is NULL, calculate r = k * G
* The pre-computation table under para will be updated.
*
* @param para [IN] Curve parameter information
* @param r [OUT] Output point information
* @param k [IN] Scalar
* @param pt [IN] Point data, which can be set to NULL
*
* @retval CRYPT_SUCCESS set successfully
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_PointMul(ECC_Para *para, ECC_Point *r,
const BN_BigNum *k, const ECC_Point *pt);
/**
* @ingroup ecc
* @brief Calculate r = k * pt. When pt is NULL, calculate r = k * G
* The pre-computation table under para will be updated.
* Non-consttime calculation
*
* @param para [IN] Curve parameter information
* @param r [OUT] Output point information
* @param k [IN] Scalar
* @param pt [IN] Point data, which can be set to NULL
*
* @retval CRYPT_SUCCESS set successfully
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_PointMulFast(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt);
/**
* @ingroup ecc
* @brief Obtaining a prime number curve (p + 1)/2
*
* @param p [IN] Input module
*
* @retval non-NULL succeeded.
* @retval NULL failed
*/
BN_BigNum *ECP_HalfPGet(const BN_BigNum *p);
/**
* @ingroup ecc
* @brief Search implementation method by curve ID
*
* @param id [IN] Curve enumeration
*
* @retval non-NULL succeeded.
* @retval NULL failed
*/
const ECC_Method *ECC_FindMethod(CRYPT_PKEY_ParaId id);
/**
* @ingroup ecc
* @brief nist Calculation of multiplication(double) of points of prime curve: r = a + a
*
* @param para [IN] Curve parameters
* @param r [OUT] Output point information
* @param a [IN] Input point information
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_NistPointDouble(const ECC_Para *para, ECC_Point *r, const ECC_Point *a);
/**
* @ingroup ecc
* @brief nist Calculation of multi-double of points of prime curve: r = (2^m)*a
*
* @param para [IN] Curve parameters
* @param r [OUT] Output point information
* @param a [IN] Input point information
* @param m [IN] Exponential information of point multiplication scalar
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_NistPointMultDouble(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m);
/**
* @ingroup ecc
* @brief nist Calculation of multiplication(double) of points of prime curve: r = a + b
*
* @param para [IN] Curve parameters
* @param r [OUT] Output point information
* @param a [IN] Input point information, a can be the jacobi coordinate.
* @param b [IN] Input point information, b must be the affine coordinate.
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_NistPointAddAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b);
/**
* @ingroup ecc
* @brief nist Calculation of multiplication(double) of points of prime curve: r = a + b
*
* @param para [IN] Curve parameters
* @param r [OUT] Output point information
* @param a [IN] Input point information, a can be the jacobi coordinate.
* @param b [IN] Input point information, b can be the jacobi coordinate.
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_NistPointAdd(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b);
/**
* @ingroup ecc
* @brief Convert the point to the affine coordinate and encode the point information as a data stream.
*
* @param para [IN] Curve parameter information
* @param pt [IN/OUT] Point data
* @param data [OUT] data stream
* @param dataLen [IN/OUT] The input is the buff length of data and the output is the valid length of data.
* @param format [IN] Encoding format
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_EncodePoint(const ECC_Para *para, ECC_Point *pt, uint8_t *data, uint32_t *dataLen,
CRYPT_PKEY_PointFormat format);
/**
* @ingroup ecc
* @brief Encode the data stream into point information.
*
* @param para [IN] Curve parameter information
* @param pt [OUT] Point data
* @param data [IN] data stream
* @param dataLen [IN] data stream length
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_DecodePoint(const ECC_Para *para, ECC_Point *pt, const uint8_t *data, uint32_t dataLen);
/**
* @brief Calculate r = 1/a mod para->n
*
* @param para [IN] Curve parameter information
* @param r [OUT] Output modulus inverse value
* @param a [IN] BigNum that needs to be inverted.
*
* @retval CRYPT_SUCCESS set successfully
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a);
#ifdef HITLS_CRYPTO_CURVE_MONT
/**
* The nist curve is based on Montgomery's calculation of double points.
* r = a + a
*/
int32_t ECP_NistPointDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a);
/**
* The nist curve is based on Montgomery's calculation of multi-double points.
* r = m * (a + a)
*/
int32_t ECP_NistPointMultDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m);
/**
* The nist curve is based on Montgomery's calculation of add points.
* r = a + b, b must be an affine point.
*/
int32_t ECP_NistPointAddAffineMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b);
/**
* The nist curve is based on Montgomery's calculation of add points.
* r = a + b
*/
int32_t ECP_NistPointAddMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b);
/**
* The nist curve is based on Montgomery's calculation of turn an point to an affine point.
* r = a -> affine a
*/
int32_t ECP_Point2AffineMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt);
/**
* The nist curve is based on Montgomery's calculation of turn an point to an affine point.
* r = a -> affine a
*/
int32_t ECP_PrimePointDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a);
/**
* The prime curve is based on Montgomery's calculation of multi-double points.
* r = m * (a + a)
*/
int32_t ECP_PrimePointMultDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m);
/**
* The prime curve is based on Montgomery's calculation of add points.
* r = a + b, b must be an affine point.
*/
int32_t ECP_PrimePointAddAffineMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b);
/**
* The prime curve is based on Montgomery's calculation of add points.
* r = a + b
*/
int32_t ECP_PrimePointAddMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b);
/**
* The prime curve is based on Montgomery's calculation of k * pt.
* The implementation is based on the Montgomery ladder.
*/
int32_t ECP_PointMulMont(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt);
#endif // HITLS_CRYPTO_CURVE_MONT
#ifdef __cplusplus
}
#endif
#endif // HITLS_CRYPTO_ECC
#endif // ECC_LOCAL_H
|
2301_79861745/bench_create
|
crypto/ecc/src/ecc_local.h
|
C
|
unknown
| 15,618
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ECC
#include "ecc_local.h"
#include "bsl_err_internal.h"
#include "ecp_nistp224.h"
#include "ecp_nistp256.h"
#include "ecp_nistp521.h"
#include "ecp_sm2.h"
typedef struct {
uint32_t id;
const ECC_Method *ecMeth;
} ECC_MethodMap;
#if defined(HITLS_SIXTY_FOUR_BITS)
#if (((defined(HITLS_CRYPTO_CURVE_NISTP224) || defined(HITLS_CRYPTO_CURVE_NISTP521)) && \
!defined(HITLS_CRYPTO_NIST_USE_ACCEL)) || \
defined(HITLS_CRYPTO_CURVE_NISTP384) || \
(defined(HITLS_CRYPTO_CURVE_NISTP256) && (!defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) || \
(!defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE))) && (!defined(HITLS_CRYPTO_NIST_USE_ACCEL))))
static const ECC_Method EC_METHOD_NIST = {
.pointMulAdd = ECP_PointMulAdd,
.pointMul = ECP_PointMul,
.pointMulFast = ECP_PointMulFast,
.pointAddAffine = ECP_NistPointAddAffine,
.pointDouble = ECP_NistPointDouble,
.pointMultDouble = ECP_NistPointMultDouble,
.modInv = BN_ModInv,
.point2AffineWithInv = ECP_Point2AffineWithInv,
.point2Affine = ECP_Point2Affine,
.bnModNistEccMul = BN_ModNistEccMul,
.bnModNistEccSqr = BN_ModNistEccSqr,
.modOrdInv = ECP_ModOrderInv,
.pointAdd = ECP_NistPointAdd,
};
#endif
#endif // HITLS_SIXTY_FOUR_BITS
#ifdef HITLS_CRYPTO_CURVE_MONT_NIST
static const ECC_Method EC_METHOD_NIST_MONT = {
.pointMulAdd = ECP_PointMulAdd,
.pointMul = ECP_PointMulMont,
.pointMulFast = ECP_PointMulFast,
.pointDouble = ECP_NistPointDoubleMont,
.pointMultDouble = ECP_NistPointMultDoubleMont,
.modInv = BN_ModInv,
.point2Affine = ECP_Point2AffineMont,
.bnModNistEccMul = BN_EcPrimeMontMul,
.bnModNistEccSqr = BN_EcPrimeMontSqr,
.modOrdInv = ECP_ModOrderInv,
.pointAdd = ECP_NistPointAddMont,
.pointAddAffine = ECP_NistPointAddAffineMont,
.bnMontEnc = BnMontEnc,
.bnMontDec = BnMontDec,
};
#endif // HITLS_CRYPTO_CURVE_MONT_NIST
#ifdef HITLS_CRYPTO_CURVE_SM2_ASM
// method implementation of SM2
static const ECC_Method EC_METHOD_SM2_ASM = {
.pointMulAdd = ECP_Sm2PointMulAdd,
.pointMul = ECP_Sm2PointMul,
.pointMulFast = ECP_Sm2PointMulFast,
.pointAddAffine = ECP_Sm2PointAddAffine,
.pointDouble = ECP_Sm2PointDouble,
.pointMultDouble = ECP_NistPointMultDouble,
.modInv = BN_ModInv,
.point2AffineWithInv = ECP_Point2AffineWithInv,
.point2Affine = ECP_Sm2Point2Affine,
.bnModNistEccMul = BN_ModSm2EccMul,
.bnModNistEccSqr = BN_ModSm2EccSqr,
.modOrdInv = ECP_Sm2OrderInv,
.pointAdd = ECP_NistPointAdd,
};
#endif
#if defined(HITLS_CRYPTO_CURVE_SM2) && !defined(HITLS_CRYPTO_CURVE_SM2_ASM) && defined(HITLS_SIXTY_FOUR_BITS)
static const ECC_Method EC_METHOD_SM2_NIST = {
.pointMulAdd = ECP_PointMulAdd,
.pointMul = ECP_PointMul,
.pointMulFast = ECP_PointMulFast,
.pointAddAffine = ECP_NistPointAddAffine,
.pointDouble = ECP_NistPointDouble,
.pointMultDouble = ECP_NistPointMultDouble,
.modInv = BN_ModInv,
.point2AffineWithInv = ECP_Point2AffineWithInv,
.point2Affine = ECP_Point2Affine,
.bnModNistEccMul = BN_ModSm2EccMul,
.bnModNistEccSqr = BN_ModSm2EccSqr,
.modOrdInv = ECP_ModOrderInv,
.pointAdd = ECP_NistPointAdd,
};
#endif
#if defined(HITLS_CRYPTO_CURVE_BP256R1) || defined(HITLS_CRYPTO_CURVE_BP384R1) || \
defined(HITLS_CRYPTO_CURVE_BP512R1)
// Montgomery Ladder Optimization for General Curves in Prime Domain
static const ECC_Method EC_METHOD_PRIME_MONT = {
.pointMulAdd = ECP_PointMulAdd,
.pointMul = ECP_PointMulMont,
.pointDouble = ECP_PrimePointDoubleMont,
.pointMulFast = ECP_PointMulFast,
.pointMultDouble = ECP_PrimePointMultDoubleMont,
.modInv = BN_ModInv,
.point2Affine = ECP_Point2AffineMont,
.bnModNistEccMul = BN_EcPrimeMontMul,
.bnModNistEccSqr = BN_EcPrimeMontSqr,
.modOrdInv = ECP_ModOrderInv,
.pointAdd = ECP_PrimePointAddMont,
.pointAddAffine = ECP_PrimePointAddAffineMont,
.bnMontEnc = BnMontEnc,
.bnMontDec = BnMontDec,
};
#endif
#ifdef HITLS_CRYPTO_NIST_USE_ACCEL
#ifdef HITLS_CRYPTO_CURVE_NISTP224
static const ECC_Method EC_METHOD_NIST_P224 = {
.pointMulAdd = ECP224_PointMulAdd,
.pointMul = ECP224_PointMul,
.pointMulFast = ECP224_PointMul,
.pointAddAffine = ECP_NistPointAddAffine,
.pointDouble = ECP_NistPointDouble,
.pointMultDouble = ECP_NistPointMultDouble,
.modInv = BN_ModInv,
.point2AffineWithInv = ECP_Point2AffineWithInv,
.point2Affine = ECP224_Point2Affine,
.bnModNistEccMul = BN_ModNistEccMul,
.bnModNistEccSqr = BN_ModNistEccSqr,
.modOrdInv = ECP_ModOrderInv,
.pointAdd = ECP_NistPointAdd,
};
#endif
#ifdef HITLS_CRYPTO_CURVE_NISTP521
static const ECC_Method EC_METHOD_NIST_P521 = {
.pointMulAdd = ECP521_PointMulAdd,
.pointMul = ECP521_PointMul,
.pointMulFast = ECP521_PointMul,
.pointAddAffine = ECP_NistPointAddAffine,
.pointDouble = ECP_NistPointDouble,
.pointMultDouble = ECP_NistPointMultDouble,
.modInv = BN_ModInv,
.point2AffineWithInv = ECP_Point2AffineWithInv,
.point2Affine = ECP521_Point2Affine,
.bnModNistEccMul = BN_ModNistEccMul,
.bnModNistEccSqr = BN_ModNistEccSqr,
.modOrdInv = ECP_ModOrderInv,
.pointAdd = ECP_NistPointAdd,
};
#endif
#endif // HITLS_CRYPTO_NIST_USE_ACCEL
#ifdef HITLS_CRYPTO_CURVE_NISTP256
#if ((defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE)) || \
(!defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_USE_ACCEL)))
static const ECC_Method EC_METHOD_NIST_P256 = {
.pointMulAdd = ECP256_PointMulAdd,
.pointMul = ECP256_PointMul,
.pointMulFast = ECP256_PointMul,
.pointAddAffine = ECP_NistPointAddAffine,
.pointDouble = ECP_NistPointDouble,
.pointMultDouble = ECP_NistPointMultDouble,
.modInv = BN_ModInv,
.point2AffineWithInv = ECP_Point2AffineWithInv,
.point2Affine = ECP256_Point2Affine,
.bnModNistEccMul = BN_ModNistEccMul,
.bnModNistEccSqr = BN_ModNistEccSqr,
.modOrdInv = ECP256_ModOrderInv,
.pointAdd = ECP_NistPointAdd,
};
#endif
#endif
static const ECC_MethodMap EC_METHODS[] = {
// p224
#ifdef HITLS_CRYPTO_CURVE_NISTP224
#ifdef HITLS_CRYPTO_NIST_USE_ACCEL
{ CRYPT_ECC_NISTP224, &EC_METHOD_NIST_P224 }, // Depends on uint128.
#elif defined(HITLS_SIXTY_FOUR_BITS)
{ CRYPT_ECC_NISTP224, &EC_METHOD_NIST }, // Common nist cal + fast modulus reduction of Bn
#else
{ CRYPT_ECC_NISTP224, &EC_METHOD_NIST_MONT },
#endif
#endif
// p256
#ifdef HITLS_CRYPTO_CURVE_NISTP256
#if defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_ECC_ACCELERATE)
{ CRYPT_ECC_NISTP256, &EC_METHOD_NIST_P256 }, // The ECC assembly optimization does not depend on uint128.
#elif (!defined(HITLS_CRYPTO_CURVE_NISTP256_ASM) && defined(HITLS_CRYPTO_NIST_USE_ACCEL))
{ CRYPT_ECC_NISTP256, &EC_METHOD_NIST_P256 }, // Non-assembled ECC optimization based on uint128
#elif defined(HITLS_SIXTY_FOUR_BITS)
{ CRYPT_ECC_NISTP256, &EC_METHOD_NIST }, // Common nist calculation + fast modulus reduction of Bn
#else
{ CRYPT_ECC_NISTP256, &EC_METHOD_NIST_MONT },
#endif
#endif
// p384
#ifdef HITLS_CRYPTO_CURVE_NISTP384
#if defined(HITLS_SIXTY_FOUR_BITS)
{ CRYPT_ECC_NISTP384, &EC_METHOD_NIST }, // Common nist calculation + fast modulus reduction of Bn
#else
{ CRYPT_ECC_NISTP384, &EC_METHOD_NIST_MONT },
#endif
#endif
// p521
#ifdef HITLS_CRYPTO_CURVE_NISTP521
#ifdef HITLS_CRYPTO_NIST_USE_ACCEL
{ CRYPT_ECC_NISTP521, &EC_METHOD_NIST_P521 }, // Non-assembly optimization, depending on uint128
#elif defined(HITLS_SIXTY_FOUR_BITS)
{ CRYPT_ECC_NISTP521, &EC_METHOD_NIST }, // nist calculation + fast modulus reduction of Bn
#else
{ CRYPT_ECC_NISTP521, &EC_METHOD_NIST_MONT },
#endif
#endif
// bp256
#ifdef HITLS_CRYPTO_CURVE_BP256R1
{ CRYPT_ECC_BRAINPOOLP256R1, &EC_METHOD_PRIME_MONT },
#endif
// bp384
#ifdef HITLS_CRYPTO_CURVE_BP384R1
{ CRYPT_ECC_BRAINPOOLP384R1, &EC_METHOD_PRIME_MONT },
#endif
// bp512
#ifdef HITLS_CRYPTO_CURVE_BP512R1
{ CRYPT_ECC_BRAINPOOLP512R1, &EC_METHOD_PRIME_MONT },
#endif
#ifdef HITLS_CRYPTO_CURVE_SM2
#ifdef HITLS_CRYPTO_CURVE_SM2_ASM
{ CRYPT_ECC_SM2, &EC_METHOD_SM2_ASM },
#elif defined(HITLS_SIXTY_FOUR_BITS)
{ CRYPT_ECC_SM2, &EC_METHOD_SM2_NIST },
#else
{ CRYPT_ECC_SM2, &EC_METHOD_NIST_MONT },
#endif
#endif
};
const ECC_Method *ECC_FindMethod(CRYPT_PKEY_ParaId id)
{
for (uint32_t i = 0; i < sizeof(EC_METHODS) / sizeof(EC_METHODS[0]); i++) {
if (EC_METHODS[i].id == id) {
return EC_METHODS[i].ecMeth;
}
}
return NULL;
}
#endif /* HITLS_CRYPTO_ECC */
|
2301_79861745/bench_create
|
crypto/ecc/src/ecc_method.c
|
C
|
unknown
| 9,358
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ECC
#include "securec.h"
#include "bsl_sal.h"
#include "bsl_err_internal.h"
#include "crypt_utils.h"
#include "crypt_errno.h"
#include "ecc_local.h"
#include "crypt_types.h"
#include "crypt_params_key.h"
#include "crypt_ecc_pkey.h"
typedef struct {
const uint8_t *data;
uint32_t dataLen;
} ECC_ReadData;
typedef struct {
ECC_ReadData p;
ECC_ReadData a;
ECC_ReadData b;
ECC_ReadData n;
ECC_ReadData h;
ECC_ReadData x;
ECC_ReadData y;
} CURVE_Para;
#if defined(HITLS_CRYPTO_CURVE_NISTP224) || defined(HITLS_CRYPTO_CURVE_NISTP256) || \
defined(HITLS_CRYPTO_CURVE_NISTP384) || defined(HITLS_CRYPTO_CURVE_NISTP521) || \
defined(HITLS_CRYPTO_CURVE_SM2)
static const uint8_t NIST_P_H[] = {
0x01
};
#endif
#ifdef HITLS_CRYPTO_CURVE_NISTP224
static const uint8_t NIST_P224_P[] = {
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01
};
static const uint8_t NIST_P224_A[] = {
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe
};
static const uint8_t NIST_P224_B[] = {
0xb4, 0x05, 0x0a, 0x85, 0x0c, 0x04, 0xb3, 0xab, 0xf5, 0x41, 0x32, 0x56, 0x50, 0x44, 0xb0, 0xb7,
0xd7, 0xbf, 0xd8, 0xba, 0x27, 0x0b, 0x39, 0x43, 0x23, 0x55, 0xff, 0xb4
};
static const uint8_t NIST_P224_X[] = {
0xb7, 0x0e, 0x0c, 0xbd, 0x6b, 0xb4, 0xbf, 0x7f, 0x32, 0x13, 0x90, 0xb9, 0x4a, 0x03, 0xc1, 0xd3,
0x56, 0xc2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xd6, 0x11, 0x5c, 0x1d, 0x21
};
static const uint8_t NIST_P224_Y[] = {
0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6, 0xcd, 0x43, 0x75, 0xa0,
0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99, 0x85, 0x00, 0x7e, 0x34
};
static const uint8_t NIST_P224_N[] = {
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x16, 0xa2,
0xe0, 0xb8, 0xf0, 0x3e, 0x13, 0xdd, 0x29, 0x45, 0x5c, 0x5c, 0x2a, 0x3d
};
#endif
#ifdef HITLS_CRYPTO_CURVE_NISTP256
static const uint8_t NIST_P256_P[] = {
0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff
};
static const uint8_t NIST_P256_A[] = {
0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc
};
static const uint8_t NIST_P256_B[] = {
0x5a, 0xc6, 0x35, 0xd8, 0xaa, 0x3a, 0x93, 0xe7, 0xb3, 0xeb, 0xbd, 0x55, 0x76, 0x98, 0x86, 0xbc,
0x65, 0x1d, 0x06, 0xb0, 0xcc, 0x53, 0xb0, 0xf6, 0x3b, 0xce, 0x3c, 0x3e, 0x27, 0xd2, 0x60, 0x4b
};
static const uint8_t NIST_P256_X[] = {
0x6b, 0x17, 0xd1, 0xf2, 0xe1, 0x2c, 0x42, 0x47, 0xf8, 0xbc, 0xe6, 0xe5, 0x63, 0xa4, 0x40, 0xf2,
0x77, 0x03, 0x7d, 0x81, 0x2d, 0xeb, 0x33, 0xa0, 0xf4, 0xa1, 0x39, 0x45, 0xd8, 0x98, 0xc2, 0x96
};
static const uint8_t NIST_P256_Y[] = {
0x4f, 0xe3, 0x42, 0xe2, 0xfe, 0x1a, 0x7f, 0x9b, 0x8e, 0xe7, 0xeb, 0x4a, 0x7c, 0x0f, 0x9e, 0x16,
0x2b, 0xce, 0x33, 0x57, 0x6b, 0x31, 0x5e, 0xce, 0xcb, 0xb6, 0x40, 0x68, 0x37, 0xbf, 0x51, 0xf5
};
static const uint8_t NIST_P256_N[] = {
0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xbc, 0xe6, 0xfa, 0xad, 0xa7, 0x17, 0x9e, 0x84, 0xf3, 0xb9, 0xca, 0xc2, 0xfc, 0x63, 0x25, 0x51
};
#endif
#ifdef HITLS_CRYPTO_CURVE_NISTP384
static const uint8_t NIST_P384_P[] = {
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe,
0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff
};
static const uint8_t NIST_P384_A[] = {
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe,
0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xfc
};
static const uint8_t NIST_P384_B[] = {
0xb3, 0x31, 0x2f, 0xa7, 0xe2, 0x3e, 0xe7, 0xe4, 0x98, 0x8e, 0x05, 0x6b, 0xe3, 0xf8, 0x2d, 0x19,
0x18, 0x1d, 0x9c, 0x6e, 0xfe, 0x81, 0x41, 0x12, 0x03, 0x14, 0x08, 0x8f, 0x50, 0x13, 0x87, 0x5a,
0xc6, 0x56, 0x39, 0x8d, 0x8a, 0x2e, 0xd1, 0x9d, 0x2a, 0x85, 0xc8, 0xed, 0xd3, 0xec, 0x2a, 0xef
};
static const uint8_t NIST_P384_X[] = {
0xaa, 0x87, 0xca, 0x22, 0xbe, 0x8b, 0x05, 0x37, 0x8e, 0xb1, 0xc7, 0x1e, 0xf3, 0x20, 0xad, 0x74,
0x6e, 0x1d, 0x3b, 0x62, 0x8b, 0xa7, 0x9b, 0x98, 0x59, 0xf7, 0x41, 0xe0, 0x82, 0x54, 0x2a, 0x38,
0x55, 0x02, 0xf2, 0x5d, 0xbf, 0x55, 0x29, 0x6c, 0x3a, 0x54, 0x5e, 0x38, 0x72, 0x76, 0x0a, 0xb7
};
static const uint8_t NIST_P384_Y[] = {
0x36, 0x17, 0xde, 0x4a, 0x96, 0x26, 0x2c, 0x6f, 0x5d, 0x9e, 0x98, 0xbf, 0x92, 0x92, 0xdc, 0x29,
0xf8, 0xf4, 0x1d, 0xbd, 0x28, 0x9a, 0x14, 0x7c, 0xe9, 0xda, 0x31, 0x13, 0xb5, 0xf0, 0xb8, 0xc0,
0x0a, 0x60, 0xb1, 0xce, 0x1d, 0x7e, 0x81, 0x9d, 0x7a, 0x43, 0x1d, 0x7c, 0x90, 0xea, 0x0e, 0x5f
};
static const uint8_t NIST_P384_N[] = {
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc7, 0x63, 0x4d, 0x81, 0xf4, 0x37, 0x2d, 0xdf,
0x58, 0x1a, 0x0d, 0xb2, 0x48, 0xb0, 0xa7, 0x7a, 0xec, 0xec, 0x19, 0x6a, 0xcc, 0xc5, 0x29, 0x73
};
#endif
#ifdef HITLS_CRYPTO_CURVE_NISTP521
static const uint8_t NIST_P521_P[] = {
0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff
};
static const uint8_t NIST_P521_A[] = {
0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xfc
};
static const uint8_t NIST_P521_B[] = {
0x00, 0x51, 0x95, 0x3e, 0xb9, 0x61, 0x8e, 0x1c, 0x9a, 0x1f, 0x92, 0x9a, 0x21, 0xa0, 0xb6, 0x85,
0x40, 0xee, 0xa2, 0xda, 0x72, 0x5b, 0x99, 0xb3, 0x15, 0xf3, 0xb8, 0xb4, 0x89, 0x91, 0x8e, 0xf1,
0x09, 0xe1, 0x56, 0x19, 0x39, 0x51, 0xec, 0x7e, 0x93, 0x7b, 0x16, 0x52, 0xc0, 0xbd, 0x3b, 0xb1,
0xbf, 0x07, 0x35, 0x73, 0xdf, 0x88, 0x3d, 0x2c, 0x34, 0xf1, 0xef, 0x45, 0x1f, 0xd4, 0x6b, 0x50,
0x3f, 0x00
};
static const uint8_t NIST_P521_X[] = {
0x00, 0xc6, 0x85, 0x8e, 0x06, 0xb7, 0x04, 0x04, 0xe9, 0xcd, 0x9e, 0x3e, 0xcb, 0x66, 0x23, 0x95,
0xb4, 0x42, 0x9c, 0x64, 0x81, 0x39, 0x05, 0x3f, 0xb5, 0x21, 0xf8, 0x28, 0xaf, 0x60, 0x6b, 0x4d,
0x3d, 0xba, 0xa1, 0x4b, 0x5e, 0x77, 0xef, 0xe7, 0x59, 0x28, 0xfe, 0x1d, 0xc1, 0x27, 0xa2, 0xff,
0xa8, 0xde, 0x33, 0x48, 0xb3, 0xc1, 0x85, 0x6a, 0x42, 0x9b, 0xf9, 0x7e, 0x7e, 0x31, 0xc2, 0xe5,
0xbd, 0x66
};
static const uint8_t NIST_P521_Y[] = {
0x01, 0x18, 0x39, 0x29, 0x6a, 0x78, 0x9a, 0x3b, 0xc0, 0x04, 0x5c, 0x8a, 0x5f, 0xb4, 0x2c, 0x7d,
0x1b, 0xd9, 0x98, 0xf5, 0x44, 0x49, 0x57, 0x9b, 0x44, 0x68, 0x17, 0xaf, 0xbd, 0x17, 0x27, 0x3e,
0x66, 0x2c, 0x97, 0xee, 0x72, 0x99, 0x5e, 0xf4, 0x26, 0x40, 0xc5, 0x50, 0xb9, 0x01, 0x3f, 0xad,
0x07, 0x61, 0x35, 0x3c, 0x70, 0x86, 0xa2, 0x72, 0xc2, 0x40, 0x88, 0xbe, 0x94, 0x76, 0x9f, 0xd1,
0x66, 0x50
};
static const uint8_t NIST_P521_N[] = {
0x01, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xfa, 0x51, 0x86, 0x87, 0x83, 0xbf, 0x2f, 0x96, 0x6b, 0x7f, 0xcc, 0x01, 0x48, 0xf7, 0x09,
0xa5, 0xd0, 0x3b, 0xb5, 0xc9, 0xb8, 0x89, 0x9c, 0x47, 0xae, 0xbb, 0x6f, 0xb7, 0x1e, 0x91, 0x38,
0x64, 0x09
};
#endif
#if defined(HITLS_CRYPTO_CURVE_BP256R1) || defined(HITLS_CRYPTO_CURVE_BP384R1) || defined(HITLS_CRYPTO_CURVE_BP512R1)
static const uint8_t BRAINPOOL_P_H[] = {
0x01
};
#endif
#ifdef HITLS_CRYPTO_CURVE_BP256R1
static const uint8_t BRAINPOOL_P256R1_P[] = {
0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x72,
0x6e, 0x3b, 0xf6, 0x23, 0xd5, 0x26, 0x20, 0x28, 0x20, 0x13, 0x48, 0x1d, 0x1f, 0x6e, 0x53, 0x77
};
static const uint8_t BRAINPOOL_P256R1_A[] = {
0x7d, 0x5a, 0x09, 0x75, 0xfc, 0x2c, 0x30, 0x57, 0xee, 0xf6, 0x75, 0x30, 0x41, 0x7a, 0xff, 0xe7,
0xfb, 0x80, 0x55, 0xc1, 0x26, 0xdc, 0x5c, 0x6c, 0xe9, 0x4a, 0x4b, 0x44, 0xf3, 0x30, 0xb5, 0xd9
};
static const uint8_t BRAINPOOL_P256R1_B[] = {
0x26, 0xdc, 0x5c, 0x6c, 0xe9, 0x4a, 0x4b, 0x44, 0xf3, 0x30, 0xb5, 0xd9, 0xbb, 0xd7, 0x7c, 0xbf,
0x95, 0x84, 0x16, 0x29, 0x5c, 0xf7, 0xe1, 0xce, 0x6b, 0xcc, 0xdc, 0x18, 0xff, 0x8c, 0x07, 0xb6
};
static const uint8_t BRAINPOOL_P256R1_X[] = {
0x8b, 0xd2, 0xae, 0xb9, 0xcb, 0x7e, 0x57, 0xcb, 0x2c, 0x4b, 0x48, 0x2f, 0xfc, 0x81, 0xb7, 0xaf,
0xb9, 0xde, 0x27, 0xe1, 0xe3, 0xbd, 0x23, 0xc2, 0x3a, 0x44, 0x53, 0xbd, 0x9a, 0xce, 0x32, 0x62
};
static const uint8_t BRAINPOOL_P256R1_Y[] = {
0x54, 0x7e, 0xf8, 0x35, 0xc3, 0xda, 0xc4, 0xfd, 0x97, 0xf8, 0x46, 0x1a, 0x14, 0x61, 0x1d, 0xc9,
0xc2, 0x77, 0x45, 0x13, 0x2d, 0xed, 0x8e, 0x54, 0x5c, 0x1d, 0x54, 0xc7, 0x2f, 0x04, 0x69, 0x97
};
static const uint8_t BRAINPOOL_P256R1_N[] = {
0xa9, 0xfb, 0x57, 0xdb, 0xa1, 0xee, 0xa9, 0xbc, 0x3e, 0x66, 0x0a, 0x90, 0x9d, 0x83, 0x8d, 0x71,
0x8c, 0x39, 0x7a, 0xa3, 0xb5, 0x61, 0xa6, 0xf7, 0x90, 0x1e, 0x0e, 0x82, 0x97, 0x48, 0x56, 0xa7
};
#endif
#ifdef HITLS_CRYPTO_CURVE_BP384R1
static const uint8_t BRAINPOOL_P384R1_P[] = {
0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf,
0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb4, 0x12, 0xb1, 0xda, 0x19, 0x7f, 0xb7, 0x11, 0x23,
0xac, 0xd3, 0xa7, 0x29, 0x90, 0x1d, 0x1a, 0x71, 0x87, 0x47, 0x00, 0x13, 0x31, 0x07, 0xec, 0x53
};
static const uint8_t BRAINPOOL_P384R1_A[] = {
0x7b, 0xc3, 0x82, 0xc6, 0x3d, 0x8c, 0x15, 0x0c, 0x3c, 0x72, 0x08, 0x0a, 0xce, 0x05, 0xaf, 0xa0,
0xc2, 0xbe, 0xa2, 0x8e, 0x4f, 0xb2, 0x27, 0x87, 0x13, 0x91, 0x65, 0xef, 0xba, 0x91, 0xf9, 0x0f,
0x8a, 0xa5, 0x81, 0x4a, 0x50, 0x3a, 0xd4, 0xeb, 0x04, 0xa8, 0xc7, 0xdd, 0x22, 0xce, 0x28, 0x26
};
static const uint8_t BRAINPOOL_P384R1_B[] = {
0x04, 0xa8, 0xc7, 0xdd, 0x22, 0xce, 0x28, 0x26, 0x8b, 0x39, 0xb5, 0x54, 0x16, 0xf0, 0x44, 0x7c,
0x2f, 0xb7, 0x7d, 0xe1, 0x07, 0xdc, 0xd2, 0xa6, 0x2e, 0x88, 0x0e, 0xa5, 0x3e, 0xeb, 0x62, 0xd5,
0x7c, 0xb4, 0x39, 0x02, 0x95, 0xdb, 0xc9, 0x94, 0x3a, 0xb7, 0x86, 0x96, 0xfa, 0x50, 0x4c, 0x11
};
static const uint8_t BRAINPOOL_P384R1_X[] = {
0x1d, 0x1c, 0x64, 0xf0, 0x68, 0xcf, 0x45, 0xff, 0xa2, 0xa6, 0x3a, 0x81, 0xb7, 0xc1, 0x3f, 0x6b,
0x88, 0x47, 0xa3, 0xe7, 0x7e, 0xf1, 0x4f, 0xe3, 0xdb, 0x7f, 0xca, 0xfe, 0x0c, 0xbd, 0x10, 0xe8,
0xe8, 0x26, 0xe0, 0x34, 0x36, 0xd6, 0x46, 0xaa, 0xef, 0x87, 0xb2, 0xe2, 0x47, 0xd4, 0xaf, 0x1e
};
static const uint8_t BRAINPOOL_P384R1_Y[] = {
0x8a, 0xbe, 0x1d, 0x75, 0x20, 0xf9, 0xc2, 0xa4, 0x5c, 0xb1, 0xeb, 0x8e, 0x95, 0xcf, 0xd5, 0x52,
0x62, 0xb7, 0x0b, 0x29, 0xfe, 0xec, 0x58, 0x64, 0xe1, 0x9c, 0x05, 0x4f, 0xf9, 0x91, 0x29, 0x28,
0x0e, 0x46, 0x46, 0x21, 0x77, 0x91, 0x81, 0x11, 0x42, 0x82, 0x03, 0x41, 0x26, 0x3c, 0x53, 0x15
};
static const uint8_t BRAINPOOL_P384R1_N[] = {
0x8c, 0xb9, 0x1e, 0x82, 0xa3, 0x38, 0x6d, 0x28, 0x0f, 0x5d, 0x6f, 0x7e, 0x50, 0xe6, 0x41, 0xdf,
0x15, 0x2f, 0x71, 0x09, 0xed, 0x54, 0x56, 0xb3, 0x1f, 0x16, 0x6e, 0x6c, 0xac, 0x04, 0x25, 0xa7,
0xcf, 0x3a, 0xb6, 0xaf, 0x6b, 0x7f, 0xc3, 0x10, 0x3b, 0x88, 0x32, 0x02, 0xe9, 0x04, 0x65, 0x65
};
#endif
#ifdef HITLS_CRYPTO_CURVE_BP512R1
static const uint8_t BRAINPOOL_P512R1_P[] = {
0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07,
0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x71,
0x7d, 0x4d, 0x9b, 0x00, 0x9b, 0xc6, 0x68, 0x42, 0xae, 0xcd, 0xa1, 0x2a, 0xe6, 0xa3, 0x80, 0xe6,
0x28, 0x81, 0xff, 0x2f, 0x2d, 0x82, 0xc6, 0x85, 0x28, 0xaa, 0x60, 0x56, 0x58, 0x3a, 0x48, 0xf3
};
static const uint8_t BRAINPOOL_P512R1_A[] = {
0x78, 0x30, 0xa3, 0x31, 0x8b, 0x60, 0x3b, 0x89, 0xe2, 0x32, 0x71, 0x45, 0xac, 0x23, 0x4c, 0xc5,
0x94, 0xcb, 0xdd, 0x8d, 0x3d, 0xf9, 0x16, 0x10, 0xa8, 0x34, 0x41, 0xca, 0xea, 0x98, 0x63, 0xbc,
0x2d, 0xed, 0x5d, 0x5a, 0xa8, 0x25, 0x3a, 0xa1, 0x0a, 0x2e, 0xf1, 0xc9, 0x8b, 0x9a, 0xc8, 0xb5,
0x7f, 0x11, 0x17, 0xa7, 0x2b, 0xf2, 0xc7, 0xb9, 0xe7, 0xc1, 0xac, 0x4d, 0x77, 0xfc, 0x94, 0xca
};
static const uint8_t BRAINPOOL_P512R1_B[] = {
0x3d, 0xf9, 0x16, 0x10, 0xa8, 0x34, 0x41, 0xca, 0xea, 0x98, 0x63, 0xbc, 0x2d, 0xed, 0x5d, 0x5a,
0xa8, 0x25, 0x3a, 0xa1, 0x0a, 0x2e, 0xf1, 0xc9, 0x8b, 0x9a, 0xc8, 0xb5, 0x7f, 0x11, 0x17, 0xa7,
0x2b, 0xf2, 0xc7, 0xb9, 0xe7, 0xc1, 0xac, 0x4d, 0x77, 0xfc, 0x94, 0xca, 0xdc, 0x08, 0x3e, 0x67,
0x98, 0x40, 0x50, 0xb7, 0x5e, 0xba, 0xe5, 0xdd, 0x28, 0x09, 0xbd, 0x63, 0x80, 0x16, 0xf7, 0x23
};
static const uint8_t BRAINPOOL_P512R1_X[] = {
0x81, 0xae, 0xe4, 0xbd, 0xd8, 0x2e, 0xd9, 0x64, 0x5a, 0x21, 0x32, 0x2e, 0x9c, 0x4c, 0x6a, 0x93,
0x85, 0xed, 0x9f, 0x70, 0xb5, 0xd9, 0x16, 0xc1, 0xb4, 0x3b, 0x62, 0xee, 0xf4, 0xd0, 0x09, 0x8e,
0xff, 0x3b, 0x1f, 0x78, 0xe2, 0xd0, 0xd4, 0x8d, 0x50, 0xd1, 0x68, 0x7b, 0x93, 0xb9, 0x7d, 0x5f,
0x7c, 0x6d, 0x50, 0x47, 0x40, 0x6a, 0x5e, 0x68, 0x8b, 0x35, 0x22, 0x09, 0xbc, 0xb9, 0xf8, 0x22
};
static const uint8_t BRAINPOOL_P512R1_Y[] = {
0x7d, 0xde, 0x38, 0x5d, 0x56, 0x63, 0x32, 0xec, 0xc0, 0xea, 0xbf, 0xa9, 0xcf, 0x78, 0x22, 0xfd,
0xf2, 0x09, 0xf7, 0x00, 0x24, 0xa5, 0x7b, 0x1a, 0xa0, 0x00, 0xc5, 0x5b, 0x88, 0x1f, 0x81, 0x11,
0xb2, 0xdc, 0xde, 0x49, 0x4a, 0x5f, 0x48, 0x5e, 0x5b, 0xca, 0x4b, 0xd8, 0x8a, 0x27, 0x63, 0xae,
0xd1, 0xca, 0x2b, 0x2f, 0xa8, 0xf0, 0x54, 0x06, 0x78, 0xcd, 0x1e, 0x0f, 0x3a, 0xd8, 0x08, 0x92
};
static const uint8_t BRAINPOOL_P512R1_N[] = {
0xaa, 0xdd, 0x9d, 0xb8, 0xdb, 0xe9, 0xc4, 0x8b, 0x3f, 0xd4, 0xe6, 0xae, 0x33, 0xc9, 0xfc, 0x07,
0xcb, 0x30, 0x8d, 0xb3, 0xb3, 0xc9, 0xd2, 0x0e, 0xd6, 0x63, 0x9c, 0xca, 0x70, 0x33, 0x08, 0x70,
0x55, 0x3e, 0x5c, 0x41, 0x4c, 0xa9, 0x26, 0x19, 0x41, 0x86, 0x61, 0x19, 0x7f, 0xac, 0x10, 0x47,
0x1d, 0xb1, 0xd3, 0x81, 0x08, 0x5d, 0xda, 0xdd, 0xb5, 0x87, 0x96, 0x82, 0x9c, 0xa9, 0x00, 0x69
};
#endif
#ifdef HITLS_CRYPTO_CURVE_SM2
static const uint8_t NIST_SM2_P[] = {
0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff
};
static const uint8_t NIST_SM2_A[] = {
0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc
};
static const uint8_t NIST_SM2_B[] = {
0x28, 0xe9, 0xfa, 0x9e, 0x9d, 0x9f, 0x5e, 0x34, 0x4d, 0x5a, 0x9e, 0x4b, 0xcf, 0x65, 0x09, 0xa7,
0xf3, 0x97, 0x89, 0xf5, 0x15, 0xab, 0x8f, 0x92, 0xdd, 0xbc, 0xbd, 0x41, 0x4d, 0x94, 0x0e, 0x93
};
static const uint8_t NIST_SM2_X[] = {
0x32, 0xc4, 0xae, 0x2c, 0x1f, 0x19, 0x81, 0x19, 0x5f, 0x99, 0x04, 0x46, 0x6a, 0x39, 0xc9, 0x94,
0x8f, 0xe3, 0x0b, 0xbf, 0xf2, 0x66, 0x0b, 0xe1, 0x71, 0x5a, 0x45, 0x89, 0x33, 0x4c, 0x74, 0xc7
};
static const uint8_t NIST_SM2_Y[] = {
0xbc, 0x37, 0x36, 0xa2, 0xf4, 0xf6, 0x77, 0x9c, 0x59, 0xbd, 0xce, 0xe3, 0x6b, 0x69, 0x21, 0x53,
0xd0, 0xa9, 0x87, 0x7c, 0xc6, 0x2a, 0x47, 0x40, 0x02, 0xdf, 0x32, 0xe5, 0x21, 0x39, 0xf0, 0xa0
};
static const uint8_t NIST_SM2_N[] = {
0xff, 0xff, 0xff, 0xfe, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0x72, 0x03, 0xdf, 0x6b, 0x21, 0xc6, 0x05, 0x2b, 0x53, 0xbb, 0xf4, 0x09, 0x39, 0xd5, 0x41, 0x23
};
#endif
#if defined(HITLS_CRYPTO_CURVE_NISTP224) || defined(HITLS_CRYPTO_CURVE_NISTP256) || \
defined(HITLS_CRYPTO_CURVE_NISTP384) || defined(HITLS_CRYPTO_CURVE_NISTP521) || \
defined(HITLS_CRYPTO_CURVE_SM2)
#define CRYPT_CURVE_PARA_DECLARE(name) \
static const CURVE_Para paraNist##name = { \
.p.data = NIST_##name##_P, \
.p.dataLen = sizeof(NIST_##name##_P), \
.a.data = NIST_##name##_A, \
.a.dataLen = sizeof(NIST_##name##_A), \
.b.data = NIST_##name##_B, \
.b.dataLen = sizeof(NIST_##name##_B), \
.n.data = NIST_##name##_N, \
.n.dataLen = sizeof(NIST_##name##_N), \
.h.data = NIST_P_H, \
.h.dataLen = sizeof(NIST_P_H), \
.x.data = NIST_##name##_X, \
.x.dataLen = sizeof(NIST_##name##_X), \
.y.data = NIST_##name##_Y, \
.y.dataLen = sizeof(NIST_##name##_Y) \
}
#endif
#if defined(HITLS_CRYPTO_CURVE_BP256R1) || defined(HITLS_CRYPTO_CURVE_BP384R1) || defined(HITLS_CRYPTO_CURVE_BP512R1)
#define CRYPT_CURVE_BRAINPOOL_PARA_DECLARE(name) \
static const CURVE_Para paraBrainpool##name = { \
.p.data = BRAINPOOL_##name##_P, \
.p.dataLen = sizeof(BRAINPOOL_##name##_P), \
.a.data = BRAINPOOL_##name##_A, \
.a.dataLen = sizeof(BRAINPOOL_##name##_A), \
.b.data = BRAINPOOL_##name##_B, \
.b.dataLen = sizeof(BRAINPOOL_##name##_B), \
.n.data = BRAINPOOL_##name##_N, \
.n.dataLen = sizeof(BRAINPOOL_##name##_N), \
.h.data = BRAINPOOL_P_H, \
.h.dataLen = sizeof(BRAINPOOL_P_H), \
.x.data = BRAINPOOL_##name##_X, \
.x.dataLen = sizeof(BRAINPOOL_##name##_X), \
.y.data = BRAINPOOL_##name##_Y, \
.y.dataLen = sizeof(BRAINPOOL_##name##_Y) \
}
#endif
#ifdef HITLS_CRYPTO_CURVE_NISTP224
CRYPT_CURVE_PARA_DECLARE(P224);
#endif
#ifdef HITLS_CRYPTO_CURVE_NISTP256
CRYPT_CURVE_PARA_DECLARE(P256);
#endif
#ifdef HITLS_CRYPTO_CURVE_NISTP384
CRYPT_CURVE_PARA_DECLARE(P384);
#endif
#ifdef HITLS_CRYPTO_CURVE_NISTP521
CRYPT_CURVE_PARA_DECLARE(P521);
#endif
#ifdef HITLS_CRYPTO_CURVE_BP256R1
CRYPT_CURVE_BRAINPOOL_PARA_DECLARE(P256R1);
#endif
#ifdef HITLS_CRYPTO_CURVE_BP384R1
CRYPT_CURVE_BRAINPOOL_PARA_DECLARE(P384R1);
#endif
#ifdef HITLS_CRYPTO_CURVE_BP512R1
CRYPT_CURVE_BRAINPOOL_PARA_DECLARE(P512R1);
#endif
#ifdef HITLS_CRYPTO_CURVE_SM2
CRYPT_CURVE_PARA_DECLARE(SM2);
#endif
typedef struct {
uint32_t id;
const CURVE_Para *curvePara;
} CURVE_ParaMap;
static const CURVE_ParaMap CURVE_PARAS[] = {
#ifdef HITLS_CRYPTO_CURVE_NISTP224
{ CRYPT_ECC_NISTP224, ¶NistP224 },
#endif
#ifdef HITLS_CRYPTO_CURVE_NISTP256
{ CRYPT_ECC_NISTP256, ¶NistP256 },
#endif
#ifdef HITLS_CRYPTO_CURVE_NISTP384
{ CRYPT_ECC_NISTP384, ¶NistP384 },
#endif
#ifdef HITLS_CRYPTO_CURVE_NISTP521
{ CRYPT_ECC_NISTP521, ¶NistP521 },
#endif
#ifdef HITLS_CRYPTO_CURVE_BP256R1
{ CRYPT_ECC_BRAINPOOLP256R1, ¶BrainpoolP256R1 },
#endif
#ifdef HITLS_CRYPTO_CURVE_BP384R1
{ CRYPT_ECC_BRAINPOOLP384R1, ¶BrainpoolP384R1 },
#endif
#ifdef HITLS_CRYPTO_CURVE_BP512R1
{ CRYPT_ECC_BRAINPOOLP512R1, ¶BrainpoolP512R1 },
#endif
#ifdef HITLS_CRYPTO_CURVE_SM2
{ CRYPT_ECC_SM2, ¶NistSM2 },
#endif
};
static const CURVE_Para *GetCurvePara(CRYPT_PKEY_ParaId id)
{
for (uint32_t i = 0; i < sizeof(CURVE_PARAS) / sizeof(CURVE_PARAS[0]); i++) {
if (CURVE_PARAS[i].id == id) {
return CURVE_PARAS[i].curvePara;
}
}
BSL_ERR_PUSH_ERROR(CRYPT_ECDH_ERR_UNSUPPORT_CURVE_TYPE);
return NULL;
}
static int32_t InitMontPara(ECC_Para *para)
{
if (para->method->bnMontEnc == NULL) {
return CRYPT_SUCCESS;
}
BN_Optimizer *opt = BN_OptimizerCreate();
para->montP = BN_MontCreate(para->p);
if (para->montP == NULL || opt == NULL) {
BN_OptimizerDestroy(opt); // The montP is freed by the caller.
return CRYPT_MEM_ALLOC_FAIL;
}
int32_t ret;
GOTO_ERR_IF(para->method->bnMontEnc(para->a, para->montP, opt, false), ret);
GOTO_ERR_IF(para->method->bnMontEnc(para->b, para->montP, opt, false), ret);
ERR:
BN_OptimizerDestroy(opt);
return ret;
}
ECC_Para *ECC_NewPara(CRYPT_PKEY_ParaId id)
{
const CURVE_Para *curve = GetCurvePara(id);
if (curve == NULL) {
return NULL;
}
const ECC_Method *method = ECC_FindMethod(id);
if (method == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_NOT_SUPPORT);
return NULL;
}
ECC_Para *para = BSL_SAL_Malloc(sizeof(ECC_Para));
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)memset_s(para, sizeof(ECC_Para), 0, sizeof(ECC_Para));
para->method = method;
uint32_t bits = curve->p.dataLen * 8; // bits = bytes * 8
para->id = id;
para->p = BN_Create(bits);
para->a = BN_Create(bits);
para->b = BN_Create(bits);
para->n = BN_Create(bits);
para->h = BN_Create(1); // The cofactor is usually 1.
para->x = BN_Create(bits);
para->y = BN_Create(bits);
if (para->p == NULL || para->a == NULL || para->b == NULL || para->n == NULL ||
para->h == NULL || para->x == NULL || para->y == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
goto ERR;
}
int32_t ret;
GOTO_ERR_IF(BN_Bin2Bn(para->p, curve->p.data, curve->p.dataLen), ret);
GOTO_ERR_IF(BN_Bin2Bn(para->a, curve->a.data, curve->a.dataLen), ret);
GOTO_ERR_IF(BN_Bin2Bn(para->b, curve->b.data, curve->b.dataLen), ret);
GOTO_ERR_IF(BN_Bin2Bn(para->n, curve->n.data, curve->n.dataLen), ret);
GOTO_ERR_IF(BN_Bin2Bn(para->h, curve->h.data, curve->h.dataLen), ret);
GOTO_ERR_IF(BN_Bin2Bn(para->x, curve->x.data, curve->x.dataLen), ret);
GOTO_ERR_IF(BN_Bin2Bn(para->y, curve->y.data, curve->y.dataLen), ret);
GOTO_ERR_IF(InitMontPara(para), ret);
return para;
ERR:
ECC_FreePara(para);
return NULL;
}
CRYPT_PKEY_ParaId GetCurveId(const CRYPT_EccPara *eccPara)
{
if (eccPara == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_PKEY_PARAID_MAX;
}
int32_t ret;
BN_BigNum *a = BN_Create(ECC_MAX_BIT_LEN);
BN_BigNum *b = BN_Create(ECC_MAX_BIT_LEN);
for (uint32_t i = 0; i < sizeof(CURVE_PARAS) / sizeof(CURVE_ParaMap); i++) {
const CURVE_Para *curve = GetCurvePara(CURVE_PARAS[i].id);
if (curve == NULL) {
continue;
}
GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->p, eccPara->pLen), ret);
GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->p.data, curve->p.dataLen), ret);
if (BN_Cmp(a, b) != 0) {
continue;
}
GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->a, eccPara->aLen), ret);
GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->a.data, curve->a.dataLen), ret);
BREAK_IF(BN_Cmp(a, b) != 0);
GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->b, eccPara->bLen), ret);
GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->b.data, curve->b.dataLen), ret);
BREAK_IF(BN_Cmp(a, b) != 0);
GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->h, eccPara->hLen), ret);
GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->h.data, curve->h.dataLen), ret);
BREAK_IF(BN_Cmp(a, b) != 0);
GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->n, eccPara->nLen), ret);
GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->n.data, curve->n.dataLen), ret);
BREAK_IF(BN_Cmp(a, b) != 0);
GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->x, eccPara->xLen), ret);
GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->x.data, curve->x.dataLen), ret);
BREAK_IF(BN_Cmp(a, b) != 0);
GOTO_ERR_IF_EX(BN_Bin2Bn(a, eccPara->y, eccPara->yLen), ret);
GOTO_ERR_IF_EX(BN_Bin2Bn(b, curve->y.data, curve->y.dataLen), ret);
BREAK_IF(BN_Cmp(a, b) != 0);
BN_Destroy(a);
BN_Destroy(b);
return CURVE_PARAS[i].id;
}
ERR:
BN_Destroy(a);
BN_Destroy(b);
return CRYPT_PKEY_PARAID_MAX;
}
int32_t ECC_GetPara(const ECC_Pkey *pkey, CRYPT_EccPara *eccPara)
{
if (pkey == NULL || eccPara == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->para == NULL || pkey->para->method == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_EMPTY_KEY);
return CRYPT_ECC_PKEY_ERR_EMPTY_KEY;
}
int32_t ret;
BN_BigNum *paraA = BN_Dup(pkey->para->a);
BN_BigNum *paraB = BN_Dup(pkey->para->b);
if (paraA == NULL || paraB == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
goto ERR;
}
if (pkey->para->method->bnMontDec != NULL) {
pkey->para->method->bnMontDec(paraA, pkey->para->montP);
pkey->para->method->bnMontDec(paraB, pkey->para->montP);
}
GOTO_ERR_IF(BN_Bn2Bin(paraA, eccPara->a, &eccPara->aLen), ret);
GOTO_ERR_IF(BN_Bn2Bin(paraB, eccPara->b, &eccPara->bLen), ret);
GOTO_ERR_IF(BN_Bn2Bin(pkey->para->h, eccPara->h, &eccPara->hLen), ret);
GOTO_ERR_IF(BN_Bn2Bin(pkey->para->n, eccPara->n, &eccPara->nLen), ret);
GOTO_ERR_IF(BN_Bn2Bin(pkey->para->p, eccPara->p, &eccPara->pLen), ret);
GOTO_ERR_IF(BN_Bn2Bin(pkey->para->x, eccPara->x, &eccPara->xLen), ret);
GOTO_ERR_IF(BN_Bn2Bin(pkey->para->y, eccPara->y, &eccPara->yLen), ret);
ERR:
BN_Destroy(paraA);
BN_Destroy(paraB);
return ret;
}
#ifdef HITLS_BSL_PARAMS
int32_t ECC_GetParaEx(const ECC_Pkey *ctx, BSL_Param *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_EccPara eccPara = {0};
BSL_Param *paramP = GetParamValue(para, CRYPT_PARAM_EC_P, &(eccPara.p), &(eccPara.pLen));
BSL_Param *paramA = GetParamValue(para, CRYPT_PARAM_EC_A, &(eccPara.a), &(eccPara.aLen));
BSL_Param *paramB = GetParamValue(para, CRYPT_PARAM_EC_B, &(eccPara.b), &(eccPara.bLen));
BSL_Param *paramN = GetParamValue(para, CRYPT_PARAM_EC_N, &(eccPara.n), &(eccPara.nLen));
BSL_Param *paramH = GetParamValue(para, CRYPT_PARAM_EC_H, &(eccPara.h), &(eccPara.hLen));
BSL_Param *paramX = GetParamValue(para, CRYPT_PARAM_EC_X, &(eccPara.x), &(eccPara.xLen));
BSL_Param *paramY = GetParamValue(para, CRYPT_PARAM_EC_Y, &(eccPara.y), &(eccPara.yLen));
int32_t ret = ECC_GetPara(ctx, &eccPara);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
paramP->useLen = eccPara.pLen;
paramA->useLen = eccPara.aLen;
paramB->useLen = eccPara.bLen;
paramN->useLen = eccPara.nLen;
paramH->useLen = eccPara.hLen;
paramX->useLen = eccPara.xLen;
paramY->useLen = eccPara.yLen;
return CRYPT_SUCCESS;
}
#endif
void ECC_FreePara(ECC_Para *para)
{
if (para == NULL) {
return;
}
BN_Destroy(para->p);
BN_Destroy(para->a);
BN_Destroy(para->b);
BN_Destroy(para->n);
BN_Destroy(para->h);
BN_Destroy(para->x);
BN_Destroy(para->y);
uint32_t i;
for (i = 0; i < sizeof(para->tableG) / sizeof(ECC_Point *); i++) {
// clear pre-computation table
ECC_FreePoint(para->tableG[i]);
}
BN_MontDestroy(para->montP);
BSL_SAL_Free(para);
}
CRYPT_PKEY_ParaId ECC_GetParaId(const ECC_Para *para)
{
if (para == NULL) {
return CRYPT_PKEY_PARAID_MAX;
}
return para->id;
}
int32_t ECC_SetPara(ECC_Pkey *ctx, ECC_Para *para)
{
if (ctx == NULL || para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
// Refresh the public and private keys.
BN_Destroy(ctx->prvkey);
ctx->prvkey = NULL;
ECC_FreePoint(ctx->pubkey);
ctx->pubkey = NULL;
ECC_FreePara(ctx->para);
ctx->para = para;
ECC_SetLibCtx(ctx->libCtx, ctx->para);
return CRYPT_SUCCESS;
}
#endif /* HITLS_CRYPTO_ECC */
|
2301_79861745/bench_create
|
crypto/ecc/src/ecc_para.c
|
C
|
unknown
| 29,213
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ECC
#include <stdbool.h>
#include "crypt_errno.h"
#include "crypt_types.h"
#include "crypt_utils.h"
#include "securec.h"
#include "bsl_sal.h"
#include "bsl_err_internal.h"
#include "crypt_bn.h"
#include "crypt_ecc.h"
#include "ecc_local.h"
#include "crypt_ecc_pkey.h"
#include "crypt_params_key.h"
typedef struct {
const char *name; /* elliptic curve NIST name */
CRYPT_PKEY_ParaId id; /* elliptic curve ID */
} EC_NAME;
void ECC_FreeCtx(ECC_Pkey *ctx)
{
int ret = 0;
if (ctx == NULL) {
return;
}
BSL_SAL_AtomicDownReferences(&(ctx->references), &ret);
if (ret > 0) {
return;
}
BSL_SAL_ReferencesFree(&(ctx->references));
BN_Destroy(ctx->prvkey);
ECC_FreePoint(ctx->pubkey);
ECC_FreePara(ctx->para);
BSL_SAL_FREE(ctx->mdAttr);
BSL_SAL_Free(ctx);
return;
}
ECC_Pkey *ECC_DupCtx(ECC_Pkey *ctx)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return NULL;
}
ECC_Pkey *newCtx = BSL_SAL_Calloc(1u, sizeof(ECC_Pkey));
if (newCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
newCtx->useCofactorMode = ctx->useCofactorMode;
newCtx->pointFormat = ctx->pointFormat;
BSL_SAL_ReferencesInit(&(newCtx->references));
GOTO_ERR_IF_SRC_NOT_NULL(newCtx->prvkey, ctx->prvkey, BN_Dup(ctx->prvkey), CRYPT_MEM_ALLOC_FAIL);
GOTO_ERR_IF_SRC_NOT_NULL(newCtx->pubkey, ctx->pubkey, ECC_DupPoint(ctx->pubkey), CRYPT_MEM_ALLOC_FAIL);
GOTO_ERR_IF_SRC_NOT_NULL(newCtx->para, ctx->para, ECC_DupPara(ctx->para), CRYPT_MEM_ALLOC_FAIL);
GOTO_ERR_IF_SRC_NOT_NULL(newCtx->mdAttr, ctx->mdAttr, BSL_SAL_Dump(ctx->mdAttr, strlen(ctx->mdAttr) + 1),
CRYPT_MEM_ALLOC_FAIL);
newCtx->libCtx = ctx->libCtx;
return newCtx;
ERR:
ECC_FreeCtx(newCtx);
return NULL;
}
// GetBits applies to both public and private keys.
// The public key requires the largest space. Therefore, the public key space prevails.
uint32_t ECC_PkeyGetBits(const ECC_Pkey *ctx)
{
if ((ctx == NULL) || (ctx->para == NULL)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return 0;
}
// The length of ECC_ParaBits is internally specified and can ensure that the length is not 0. 1 byte = 8 bits.
uint32_t bytes = ((ECC_ParaBits(ctx->para) - 1) / 8) + 1;
// The public key contains 2 coordinates. The public key flag occupies is 1 byte. 1 byte = 8 bits.
return (bytes * 2 + 1) * 8;
}
int32_t ECC_PkeySetPrvKey(ECC_Pkey *ctx, const CRYPT_EccPrv *prv)
{
if ((ctx == NULL) || (ctx->para == NULL) || (prv == NULL) || (prv->data == NULL) || (prv->len == 0)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
int32_t ret;
BN_BigNum *paraN = ECC_GetParaN(ctx->para);
BN_BigNum *newPrvKey = BN_Create(ECC_ParaBits(ctx->para));
if ((paraN == NULL) || (newPrvKey == NULL)) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
ret = BN_Bin2Bn(newPrvKey, prv->data, prv->len);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
if (ctx->para->id == CRYPT_ECC_SM2) {
(void)BN_SubLimb(paraN, paraN, 1);
}
if (BN_IsZero(newPrvKey) || (BN_Cmp(newPrvKey, paraN)) >= 0) {
ret = CRYPT_ECC_PKEY_ERR_INVALID_PRIVATE_KEY;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
BN_Destroy(ctx->prvkey);
ctx->prvkey = newPrvKey;
BN_Destroy(paraN);
return CRYPT_SUCCESS;
ERR:
BN_Destroy(newPrvKey);
BN_Destroy(paraN);
return ret;
}
/**
* In NIST.SP.800-56 Ar3, the FFC Full Public-Key Validation Routine needs to check nQ = Ø.
* For performance considerations, we perform Partial public-key Validation (Section 5.6.2.3.4) when
* setting the Public Key.
*/
int32_t ECC_PkeySetPubKey(ECC_Pkey *ctx, const CRYPT_EccPub *pub)
{
if ((ctx == NULL) || (ctx->para == NULL) || (pub == NULL) || (pub->data == NULL) || (pub->len == 0)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
ECC_Point *newPubKey = ECC_NewPoint(ctx->para);
if (newPubKey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
int32_t ret = ECC_DecodePoint(ctx->para, newPubKey, pub->data, pub->len);
if (ret == CRYPT_SUCCESS) {
ECC_FreePoint(ctx->pubkey);
ctx->pubkey = newPubKey;
return ret;
}
ECC_FreePoint(newPubKey);
return ret;
}
int32_t ECC_PkeyGetPrvKey(const ECC_Pkey *ctx, CRYPT_EccPrv *prv)
{
if ((ctx == NULL) || (prv == NULL) || (prv->data == NULL) || (prv->len == 0)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->prvkey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_EMPTY_KEY);
return CRYPT_ECC_PKEY_ERR_EMPTY_KEY;
}
return BN_Bn2Bin(ctx->prvkey, prv->data, &prv->len);
}
int32_t ECC_PkeyGetPubKey(const ECC_Pkey *ctx, CRYPT_EccPub *pub)
{
if ((ctx == NULL) || (ctx->para == NULL) || (pub == NULL) || (pub->data == NULL) || (pub->len == 0)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->pubkey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_EMPTY_KEY);
return CRYPT_ECC_PKEY_ERR_EMPTY_KEY;
}
return ECC_EncodePoint(ctx->para, ctx->pubkey, pub->data, &pub->len, ctx->pointFormat);
}
#ifdef HITLS_BSL_PARAMS
int32_t ECC_PkeySetPrvKeyEx(ECC_Pkey *ctx, const BSL_Param *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_EccPrv prv = {0};
(void)GetConstParamValue(para, CRYPT_PARAM_EC_PRVKEY, &prv.data, &prv.len);
return ECC_PkeySetPrvKey(ctx, &prv);
}
int32_t ECC_PkeySetPubKeyEx(ECC_Pkey *ctx, const BSL_Param *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_EccPub pub = {0};
if (GetConstParamValue(para, CRYPT_PARAM_EC_PUBKEY, &pub.data, &pub.len) == NULL) {
(void)GetConstParamValue(para, CRYPT_PARAM_PKEY_ENCODE_PUBKEY, (uint8_t **)&pub.data, &pub.len);
}
return ECC_PkeySetPubKey(ctx, &pub);
}
int32_t ECC_PkeyGetPrvKeyEx(const ECC_Pkey *ctx, BSL_Param *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_EccPrv prv = {0};
BSL_Param *paramPrv = GetParamValue(para, CRYPT_PARAM_EC_PRVKEY, &prv.data, &(prv.len));
int32_t ret = ECC_PkeyGetPrvKey(ctx, &prv);
if (ret != CRYPT_SUCCESS) {
return ret;
}
paramPrv->useLen = prv.len;
return CRYPT_SUCCESS;
}
int32_t ECC_PkeyGetPubKeyEx(const ECC_Pkey *ctx, BSL_Param *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_EccPub pub = {0};
BSL_Param *paramPub = GetParamValue(para, CRYPT_PARAM_EC_PUBKEY, &pub.data, &(pub.len));
if (paramPub == NULL) {
paramPub = GetParamValue(para, CRYPT_PARAM_PKEY_ENCODE_PUBKEY, &pub.data, &(pub.len));
}
int32_t ret = ECC_PkeyGetPubKey(ctx, &pub);
if (ret != CRYPT_SUCCESS) {
return ret;
}
paramPub->useLen = pub.len;
return CRYPT_SUCCESS;
}
#endif
static int32_t GenPrivateKey(ECC_Pkey *ctx)
{
int32_t ret = CRYPT_SUCCESS;
uint32_t tryCount = 0;
uint32_t paraBits = ECC_ParaBits(ctx->para);
BN_BigNum *paraN = NULL;
if (ctx->para->id == CRYPT_ECC_SM2) {
paraN = BN_Create(paraBits);
if (paraN == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
(void)BN_SubLimb(paraN, ctx->para->n, 1);
} else {
paraN = ctx->para->n;
}
if (ctx->prvkey == NULL) {
ctx->prvkey = BN_Create(paraBits);
if (ctx->prvkey == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
goto EXIT;
}
}
do {
ret = BN_RandRangeEx(ctx->libCtx, ctx->prvkey, paraN);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
tryCount += 1;
} while ((BN_IsZero(ctx->prvkey) == true) && (tryCount < CRYPT_ECC_TRY_MAX_CNT));
if (tryCount == CRYPT_ECC_TRY_MAX_CNT) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_TRY_CNT);
ret = CRYPT_ECC_PKEY_ERR_TRY_CNT;
}
EXIT:
if (paraN != ctx->para->n) {
BN_Destroy(paraN);
}
return ret;
}
int32_t ECC_GenPublicKey(ECC_Pkey *ctx)
{
if (ctx->pubkey != NULL) {
return CRYPT_SUCCESS;
}
ctx->pubkey = ECC_NewPoint(ctx->para);
if (ctx->pubkey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
int32_t ret = ECC_PointMul(ctx->para, ctx->pubkey, ctx->prvkey, NULL);
if (ret != CRYPT_SUCCESS) {
ECC_FreePoint(ctx->pubkey);
ctx->pubkey = NULL;
}
return ret;
}
static int32_t GenPublicKey(ECC_Pkey *ctx)
{
if (ctx->prvkey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->pubkey == NULL) {
ctx->pubkey = ECC_NewPoint(ctx->para);
if (ctx->pubkey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
}
return ECC_PointMul(ctx->para, ctx->pubkey, ctx->prvkey, NULL);
}
int32_t ECC_PkeyGen(ECC_Pkey *ctx)
{
if ((ctx == NULL) || (ctx->para == NULL)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
int32_t ret = GenPrivateKey(ctx);
if (ret != CRYPT_SUCCESS) {
goto ERR;
}
ret = GenPublicKey(ctx);
if (ret != CRYPT_SUCCESS) {
goto ERR;
}
return CRYPT_SUCCESS;
ERR:
BN_Zeroize(ctx->prvkey);
BN_Destroy(ctx->prvkey);
ctx->prvkey = NULL;
ECC_FreePoint(ctx->pubkey);
ctx->pubkey = NULL;
return ret;
}
#ifdef HITLS_CRYPTO_ECC_CHECK
static int32_t EccKeyPairCheck(const ECC_Pkey *pub, const ECC_Pkey *prv)
{
int32_t ret;
if (prv == NULL || pub == NULL || pub->para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pub->pubkey == NULL || prv->prvkey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_EMPTY_KEY);
return CRYPT_ECC_PKEY_ERR_EMPTY_KEY;
}
ECC_Point *point = ECC_NewPoint(pub->para);
if (point == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ret = ECC_PointMul(pub->para, point, prv->prvkey, NULL);
if (ret != CRYPT_SUCCESS) {
ECC_FreePoint(point);
return ret;
}
if (ECC_PointCmp(pub->para, point, pub->pubkey) != 0) {
ret = CRYPT_ECC_PAIRWISE_CHECK_FAIL;
BSL_ERR_PUSH_ERROR(ret);
}
ECC_FreePoint(point);
return ret;
}
static int32_t EccPrvKeyCheck(const ECC_Pkey *pkey)
{
if (pkey == NULL || pkey->para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pkey->prvkey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_EMPTY_KEY);
return CRYPT_ECC_PKEY_ERR_EMPTY_KEY;
}
int32_t ret = CRYPT_SUCCESS;
BN_BigNum *paraN = ECC_GetParaN(pkey->para);
if (pkey->para->id == CRYPT_ECC_SM2) {
(void)BN_SubLimb(paraN, paraN, 1);
/* GB/T 32918.2-2016 for check sm2 prv key, 0 < key < n - 1 is valid */
if (BN_IsZero(pkey->prvkey) == true || BN_IsNegative(pkey->prvkey) == true ||
(BN_Cmp(pkey->prvkey, paraN) >= 0)) {
ret = CRYPT_ECC_INVALID_PRVKEY;
BSL_ERR_PUSH_ERROR(CRYPT_ECC_INVALID_PRVKEY);
}
} else {
/* SP800-56a 5.6.2.1.2 for check an ecc private key. 0 < key <= n - 1 is valid. */
if (BN_IsZero(pkey->prvkey) == true || BN_IsNegative(pkey->prvkey) == true ||
(BN_Cmp(pkey->prvkey, paraN) >= 0)) {
ret = CRYPT_ECC_INVALID_PRVKEY;
BSL_ERR_PUSH_ERROR(CRYPT_ECC_INVALID_PRVKEY);
}
}
BN_Destroy(paraN);
return ret;
}
int32_t ECC_PkeyCheck(const ECC_Pkey *pkey1, const ECC_Pkey *pkey2, uint32_t checkType)
{
switch (checkType) {
case CRYPT_PKEY_CHECK_KEYPAIR:
return EccKeyPairCheck(pkey1, pkey2);
case CRYPT_PKEY_CHECK_PRVKEY:
return EccPrvKeyCheck(pkey1);
default:
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
}
#endif // HITLS_CRYPTO_ECC_CHECK
static const char *EcCurveId2nist(CRYPT_PKEY_ParaId id)
{
static EC_NAME nistCurves[] = {
{"P-224", CRYPT_ECC_NISTP224},
{"P-256", CRYPT_ECC_NISTP256},
{"P-384", CRYPT_ECC_NISTP384},
{"P-521", CRYPT_ECC_NISTP521}
};
for (uint32_t i = 0; i < sizeof(nistCurves) / sizeof(nistCurves[0]); i++) {
if (nistCurves[i].id == id) {
return nistCurves[i].name;
}
}
return NULL;
}
static int32_t ECC_GetPubXYBnBin(ECC_Pkey *ctx, int32_t opt, void *val, uint32_t len)
{
if (ctx->para == NULL || len != sizeof(CRYPT_Data) || val == NULL || ((CRYPT_Data *)val)->data == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
int32_t ret;
uint32_t bits = BN_Bits(ctx->para->p);
BN_BigNum *x = BN_Create(bits);
BN_BigNum *y = BN_Create(bits);
do {
if (x == NULL || y == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
ret = CRYPT_MEM_ALLOC_FAIL;
break;
}
ret = ECC_GetPoint2Bn(ctx->para, ctx->pubkey, x, y);
if (ret != CRYPT_SUCCESS) {
break;
}
if (opt == CRYPT_CTRL_GET_ECC_PUB_X_BIN) {
ret = BN_Bn2Bin(x, ((CRYPT_Data *)val)->data, &((CRYPT_Data *)val)->len);
} else {
ret = BN_Bn2Bin(y, ((CRYPT_Data *)val)->data, &((CRYPT_Data *)val)->len);
}
} while (0);
BN_Destroy(x);
BN_Destroy(y);
return ret;
}
static uint32_t GetOrderBits(const ECC_Pkey *ctx)
{
if (ctx->para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_PARA);
return 0;
}
return BN_Bits(ctx->para->n);
}
static uint32_t ECC_GetKeyLen(const ECC_Pkey *ctx)
{
if ((ctx == NULL) || (ctx->para == NULL)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return 0;
}
return BN_Bytes(ctx->para->p);
}
static uint32_t ECC_GetPubKeyLen(const ECC_Pkey *ctx)
{
uint32_t keylen = ECC_GetKeyLen(ctx);
if (keylen == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return 0;
}
if (ctx->pointFormat == CRYPT_POINT_COMPRESSED) {
return (keylen + 1);
}
return (keylen * 2 + 1);
}
static int32_t GetEccName(ECC_Pkey *ctx, void *val, uint32_t len)
{
if (ctx->para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (memcpy_s(val, len, EcCurveId2nist(ctx->para->id), strlen("P-521") + 1) != EOK) {
BSL_ERR_PUSH_ERROR(CRYPT_SECUREC_FAIL);
return CRYPT_SECUREC_FAIL;
}
return CRYPT_SUCCESS;
}
static int32_t SetEccPointFormat(ECC_Pkey *ctx, void *val, uint32_t len)
{
if (len != sizeof(uint32_t)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_CTRL_LEN);
return CRYPT_ECC_PKEY_ERR_CTRL_LEN;
}
uint32_t pointFormat = *(uint32_t *)val;
if (pointFormat >= CRYPT_POINT_MAX) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_INVALID_POINT_FORMAT);
return CRYPT_ECC_PKEY_ERR_INVALID_POINT_FORMAT;
}
ctx->pointFormat = pointFormat;
return CRYPT_SUCCESS;
}
static int32_t SetEccUseCofactorMode(ECC_Pkey *ctx, void *val, uint32_t len)
{
if (len != sizeof(uint32_t)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_CTRL_LEN);
return CRYPT_ECC_PKEY_ERR_CTRL_LEN;
}
ctx->useCofactorMode = *(uint32_t *)val;
return CRYPT_SUCCESS;
}
int32_t ECC_PkeyCtrl(ECC_Pkey *ctx, int32_t opt, void *val, uint32_t len)
{
if (ctx == NULL || (val == NULL && opt != CRYPT_CTRL_GEN_ECC_PUBLICKEY)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
switch (opt) {
case CRYPT_CTRL_GET_ECC_NAME:
return GetEccName(ctx, val, len);
case CRYPT_CTRL_GET_ECC_PUB_X_BIN:
case CRYPT_CTRL_GET_ECC_PUB_Y_BIN:
return ECC_GetPubXYBnBin(ctx, opt, val, len);
case CRYPT_CTRL_SET_ECC_POINT_FORMAT:
return SetEccPointFormat(ctx, val, len);
case CRYPT_CTRL_SET_ECC_USE_COFACTOR_MODE:
return SetEccUseCofactorMode(ctx, val, len);
case CRYPT_CTRL_GEN_ECC_PUBLICKEY:
return GenPublicKey(ctx);
case CRYPT_CTRL_GET_ECC_ORDER_BITS:
return GetUintCtrl(ctx, val, len, (GetUintCallBack)GetOrderBits);
case CRYPT_CTRL_GET_PUBKEY_LEN:
return GetUintCtrl(ctx, val, len, (GetUintCallBack)ECC_GetPubKeyLen);
case CRYPT_CTRL_GET_PRVKEY_LEN:
case CRYPT_CTRL_GET_SHARED_KEY_LEN:
return GetUintCtrl(ctx, val, len, (GetUintCallBack)ECC_GetKeyLen);
case CRYPT_CTRL_UP_REFERENCES:
if (len != (uint32_t)sizeof(int)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_CTRL_LEN);
return CRYPT_ECC_PKEY_ERR_CTRL_LEN;
}
return BSL_SAL_AtomicUpReferences(&(ctx->references), (int *)val);
default:
BSL_ERR_PUSH_ERROR(CRYPT_ECC_PKEY_ERR_UNSUPPORTED_CTRL_OPTION);
return CRYPT_ECC_PKEY_ERR_UNSUPPORTED_CTRL_OPTION;
}
}
ECC_Pkey *ECC_PkeyNewCtx(CRYPT_PKEY_ParaId id)
{
ECC_Para *para = ECC_NewPara(id);
if (para == NULL) {
return NULL;
}
ECC_Pkey *key = BSL_SAL_Calloc(1u, sizeof(ECC_Pkey));
if (key == NULL) {
ECC_FreePara(para);
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
key->para = para;
key->pointFormat = CRYPT_POINT_UNCOMPRESSED;
BSL_SAL_ReferencesInit(&(key->references));
return key;
}
int32_t ECC_PkeyCmp(const ECC_Pkey *a, const ECC_Pkey *b)
{
RETURN_RET_IF(a == NULL || b == NULL, CRYPT_NULL_INPUT);
// Compare public keys.
RETURN_RET_IF(ECC_PointCmp(a->para, a->pubkey, b->pubkey), CRYPT_ECC_KEY_PUBKEY_NOT_EQUAL);
// Compare parameters.
RETURN_RET_IF(b->para == NULL || a->para->id != b->para->id, CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_SUCCESS;
}
#endif /* HITLS_CRYPTO_ECC */
|
2301_79861745/bench_create
|
crypto/ecc/src/ecc_pkey.c
|
C
|
unknown
| 19,162
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef ECC_UTILS_H
#define ECC_UTILS_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ECC
#include "crypt_ecc.h"
#include "ecc_local.h"
#include "crypt_errno.h"
#ifdef __cplusplus
extern "C" {
#endif
/* the window length of common point multiplication */
#define WINDOW_SIZE 5
/*
* Decoded from a 6-bit signed code to obtain the sign and value. The upper five bits are the complement of the value,
* and the least significant bit is the carry (positive) of the next group of numbers.
* Output:
* sign = 0 or 1
* 0 <= value <= 16
*/
inline static void DecodeScalarCode(uint32_t *sign, uint32_t *value, uint32_t code)
{
uint32_t s, v;
s = 0 - (code >> WINDOW_SIZE); // Bit 5 is the sign bit, and the negative number is all 1s.
// Take its value and add a carry. Because the symbol is obtained and then the carry is added, v may be + 16 or - 0.
v = (code >> 1) + (code & 1);
// Find the Take its value and add a carry. If the number is positive, v is the Take its value and add a carry.
// If the number is negative, v is inverted + 1.
v = (~s & v) | (s & (~v + 1));
*sign = s & 1;
*value = v & ((1 << WINDOW_SIZE) - 1); // Five bits are intercepted.
}
inline static int32_t CheckParaValid(const ECC_Para *para, CRYPT_PKEY_ParaId id)
{
if (para == NULL) {
return CRYPT_NULL_INPUT;
}
if (para->id != id) {
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
return CRYPT_SUCCESS;
}
inline static int32_t CheckPointValid(const ECC_Point *pt, CRYPT_PKEY_ParaId id)
{
if (pt == NULL) {
return CRYPT_NULL_INPUT;
}
if (pt->id != id) {
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
return CRYPT_SUCCESS;
}
inline static int32_t CheckBnValid(const BN_BigNum *k, uint32_t maxBits)
{
if (k == NULL) {
return CRYPT_NULL_INPUT;
}
if (BN_Bits(k) > maxBits) { // If K is greater than maxBits, it is considered too long.
return CRYPT_ECC_POINT_MUL_ERR_K_LEN;
}
return CRYPT_SUCCESS;
}
#ifdef __cplusplus
}
#endif
#endif // HITLS_CRYPTO_ECC
#endif // ECC_UTILS_H
|
2301_79861745/bench_create
|
crypto/ecc/src/ecc_utils.h
|
C
|
unknown
| 2,642
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_ECC) && defined(HITLS_CRYPTO_CURVE_MONT)
#include "securec.h"
#include "bsl_sal.h"
#include "bsl_err_internal.h"
#include "crypt_utils.h"
#include "crypt_errno.h"
#include "ecc_local.h"
#ifdef HITLS_CRYPTO_CURVE_MONT_NIST
// Jacobian coordinate double the point
int32_t ECP_NistPointDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a)
{
if (a == NULL || r == NULL || para == NULL) {
return CRYPT_NULL_INPUT;
}
BN_Optimizer *opt = BN_OptimizerCreate();
if (opt == NULL) {
return CRYPT_MEM_ALLOC_FAIL;
}
(void)OptimizerStart(opt);
int32_t ret;
BN_BigNum *halfP = ECP_HalfPGet(para->p);
BN_BigNum *t1 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t2 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t3 = OptimizerGetBn(opt, a->x.room);
if (t1 == NULL || t2 == NULL || t3 == NULL || halfP == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
goto ERR;
}
GOTO_ERR_IF(para->method->bnMontEnc(halfP, para->montP, opt, false), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &a->z, para->montP, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(t2, &a->x, t1, para->p, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(t1, &a->x, t1, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, t1, para->montP, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(t3, t2, t2, para->p, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(t2, t3, t2, para->p, opt), ret); // t2 = 3*t2
GOTO_ERR_IF(BN_ModAddQuick(&r->y, &a->y, &a->y, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &r->y, &a->z, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->y, &r->y, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(t3, &r->y, &a->x, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, t2, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->y, &r->y, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, halfP, para->montP, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(t1, t3, t3, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(t1, t3, &r->x, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, t2, para->montP, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(&r->y, t1, &r->y, para->p, opt), ret);
ERR:
BN_OptimizerDestroy(opt);
BN_Destroy(halfP);
return ret;
}
// Jacobian coordinate multi-double the point: r = (2^m) * pt
int32_t ECP_NistPointMultDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m)
{
if (a == NULL || r == NULL || para == NULL) {
return CRYPT_NULL_INPUT;
}
uint32_t tm = m;
BN_Optimizer *opt = BN_OptimizerCreate();
if (opt == NULL) {
return CRYPT_MEM_ALLOC_FAIL;
}
int32_t ret;
(void)OptimizerStart(opt);
BN_BigNum *ta = OptimizerGetBn(opt, a->x.room);
BN_BigNum *tb = OptimizerGetBn(opt, a->x.room);
BN_BigNum *tc = OptimizerGetBn(opt, a->x.room);
BN_BigNum *tw = OptimizerGetBn(opt, a->x.room);
BN_BigNum *halfP = ECP_HalfPGet(para->p);
if (ta == NULL || tb == NULL || tc == NULL || tw == NULL || halfP == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
goto ERR;
}
GOTO_ERR_IF(BN_Copy(&r->x, &a->x), ret);
GOTO_ERR_IF(BN_ModAddQuick(&r->y, &a->y, &a->y, para->p, opt), ret);
GOTO_ERR_IF(BN_Copy(&r->z, &a->z), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(tw, &a->z, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(tw, tw, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnMontEnc(halfP, para->montP, opt, false), ret);
while (tm > 0) {
// 3.1
// ta = 3*(x^2 - tw)
GOTO_ERR_IF(para->method->bnModNistEccSqr(ta, &r->x, para->montP, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(tc, ta, tw, para->p, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(ta, tc, tc, para->p, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(ta, ta, tc, para->p, opt), ret);
// tb = x*(y^2)
GOTO_ERR_IF(para->method->bnModNistEccSqr(tc, &r->y, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(tb, tc, &r->x, para->montP, opt), ret);
// 3.2
// x = ta^2 - 2*tb
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, ta, para->montP, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, tb, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, tb, para->p, opt), ret);
// z = zy
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &r->z, &r->y, para->montP, opt), ret);
// 3.3
// tc = y^4
GOTO_ERR_IF(para->method->bnModNistEccSqr(tc, &r->y, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(tc, tc, para->montP, opt), ret);
// m = m - 1, if bit > 0, tw = tw * (y^4)
tm--;
if (tm > 0) {
GOTO_ERR_IF(para->method->bnModNistEccMul(tw, tw, tc, para->montP, opt), ret);
}
// 3.4
// y = 2*ta*(tb - x) - (y^4)
GOTO_ERR_IF(BN_ModSubQuick(&r->y, tb, &r->x, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, ta, para->montP, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(&r->y, &r->y, &r->y, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(&r->y, &r->y, tc, para->p, opt), ret);
}
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, halfP, para->montP, opt), ret);
ERR:
BN_Destroy(halfP);
BN_OptimizerDestroy(opt); // no need to end opt.
return ret;
}
// Point addition calculation (Jacobian point a plus Jacobian point b)
// https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-1998-cmo
int32_t ECP_NistPointAddMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b)
{
if (para == NULL || r == NULL || a == NULL || b == NULL) {
return CRYPT_NULL_INPUT;
}
if (BN_IsZero(&a->z)) {
// If point a is an infinity point, r = b
return ECC_CopyPoint(r, b);
}
if (BN_IsZero(&b->z)) {
// If point b is an infinity point, r = a
return ECC_CopyPoint(r, a);
}
BN_Optimizer *opt = BN_OptimizerCreate();
if (opt == NULL) {
return CRYPT_MEM_ALLOC_FAIL;
}
(void)OptimizerStart(opt);
BN_BigNum *t1 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t2 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t3 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t4 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t5 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t6 = OptimizerGetBn(opt, a->x.room);
if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t5 == NULL || t6 == NULL) {
BN_OptimizerDestroy(opt); // no need to end opt.
return CRYPT_MEM_ALLOC_FAIL;
}
int32_t ret;
GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &b->z, para->montP, opt), ret); // Z2^2
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t1, &b->z, para->montP, opt), ret); // Z2^3
GOTO_ERR_IF(para->method->bnModNistEccMul(t5, t1, &a->x, para->montP, opt), ret); // U1 = X1*Z2^2
GOTO_ERR_IF(para->method->bnModNistEccMul(t6, t2, &a->y, para->montP, opt), ret); // S1 = Y1*Z2^3
GOTO_ERR_IF(para->method->bnModNistEccSqr(t3, &a->z, para->montP, opt), ret); // T3 = Z1^2
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &a->z, &b->y, para->montP, opt), ret); // r->y = Y2*Z1
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &a->z, &b->z, para->montP, opt), ret); // r->z = Z2*Z1
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, t3, &r->y, para->montP, opt), ret); // S2 = Y2 * Z1^3
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->x, t3, &b->x, para->montP, opt), ret); // U2 = Z1^2 * X2
GOTO_ERR_IF(BN_ModSubQuick(t1, &r->x, t5, para->p, opt), ret); // H = U2 - U1
GOTO_ERR_IF(BN_ModSubQuick(t2, &r->y, t6, para->p, opt), ret); // r = S2 - S1
if (BN_IsZero(t1) && BN_IsZero(t2)) {
GOTO_ERR_IF(para->method->pointDouble(para, r, b), ret);
goto ERR;
}
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, t1, &r->z, para->montP, opt), ret); // r->z = H * Z2*Z1
GOTO_ERR_IF(para->method->bnModNistEccSqr(t3, t1, para->montP, opt), ret); // t3 = H^2
GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, t3, para->montP, opt), ret); // t1 = H^3
GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t3, t5, para->montP, opt), ret); // t3 = H^2 * U1
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, t2, para->montP, opt), ret); // r->x = r ^ 2
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t3, para->p, opt), ret); // r ^ 2 - H^2*U1
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t3, para->p, opt), ret); // r ^ 2 - 2*H^2 * U1
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret); // r ^ 2 - 2*H^2*U1 - H^3
GOTO_ERR_IF(BN_ModSubQuick(t3, t3, &r->x, para->p, opt), ret); // H^2 * U1 - X3
GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t2, t3, para->montP, opt), ret); // r * (H^2 * U1 - X3)
GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, t6, para->montP, opt), ret); // t1 = H^3 * S1
GOTO_ERR_IF(BN_ModSubQuick(&r->y, t3, t1, para->p, opt), ret); // r * (H^2 * U1 - X3) - H^3 * S1
ERR:
BN_OptimizerDestroy(opt); // no need to end opt.
return ret;
}
// cal r = a + b (b->z = 1)
// https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2004-hmv
int32_t ECP_NistPointAddAffineMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b)
{
int32_t ret;
if (a == NULL || b == NULL || r == NULL || para == NULL) {
return CRYPT_NULL_INPUT;
}
if (BN_IsZero(&a->z)) { // if point a is an infinity point, r = b,
return ECC_CopyPoint(r, b);
}
BN_Optimizer *opt = BN_OptimizerCreate();
if (opt == NULL) {
return CRYPT_MEM_ALLOC_FAIL;
}
(void)OptimizerStart(opt);
BN_BigNum *t1 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t2 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t3 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t4 = OptimizerGetBn(opt, a->x.room);
if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
goto ERR;
}
GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &a->z, para->montP, opt), ret); // T1 = Z1^2
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t1, &a->z, para->montP, opt), ret); // T2 = Z1^3
GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, &b->x, para->montP, opt), ret); // T1 = X2*T1
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, &b->y, para->montP, opt), ret); // T2 = Y2*T2
GOTO_ERR_IF(BN_ModSubQuick(t1, t1, &a->x, para->p, opt), ret); // T1 = T1-X1
GOTO_ERR_IF(BN_ModSubQuick(t2, t2, &a->y, para->p, opt), ret); // T2 = T2-Y1
if (BN_IsZero(t1)) {
if (BN_IsZero(t2)) {
// If two points are equal, use double for calculation.
GOTO_ERR_IF(para->method->pointDouble(para, r, b), ret);
} else {
// Obtain the infinite point.
GOTO_ERR_IF(BN_SetLimb(&r->z, 0), ret);
}
goto ERR;
}
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &a->z, t1, para->montP, opt), ret); // Z3 = Z1 * T1
GOTO_ERR_IF(para->method->bnModNistEccSqr(t3, t1, para->montP, opt), ret); // T3 = T1 ^ 2
GOTO_ERR_IF(para->method->bnModNistEccMul(t4, t1, t3, para->montP, opt), ret); // T4 = T3 * T1
GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t3, &a->x, para->montP, opt), ret); // T3 = T3 * X1
GOTO_ERR_IF(BN_ModAddQuick(t1, t3, t3, para->p, opt), ret); // T1 = 2 * T3
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, t2, para->montP, opt), ret); // X3 = T2 ^ 2
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret); // X3 = X3 - T1
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t4, para->p, opt), ret); // X3 = X3 - T4
GOTO_ERR_IF(BN_ModSubQuick(t3, t3, &r->x, para->p, opt), ret); // T3 = T3 - X3
GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t3, t2, para->montP, opt), ret); // T3 = T3 * T2
GOTO_ERR_IF(para->method->bnModNistEccMul(t4, t4, &a->y, para->montP, opt), ret); // T4 = T4 * Y1
GOTO_ERR_IF(BN_ModSubQuick(&r->y, t3, t4, para->p, opt), ret); // Y3 = T3 - T4
ERR:
BN_OptimizerDestroy(opt); // no need to end opt.
return ret;
}
#endif
#ifdef HITLS_CRYPTO_CURVE_MONT_PRIME
/*
prime curves point multi-double r = (2^m)*a
Calculation procedure:
1. If the point is an infinity point, return the infinity point.
2. Y = 2*Y, W = Z^4
3. If m > 0, repeat the following steps:
A = 3*X^2 + a*W
B = X*Y^2
X = A^2 - 2*B
Z = Z*Y
m = m - 1
if m > 0 then W = W*Y^4
Y = 2*A*(B-X)-Y^4
4. Return (X, Y/2, Z)
*/
int32_t ECP_PrimePointDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a)
{
if (para == NULL || r == NULL || a == NULL) {
return CRYPT_NULL_INPUT;
}
BN_Optimizer *opt = BN_OptimizerCreate();
if (opt == NULL) {
return CRYPT_MEM_ALLOC_FAIL;
}
int32_t ret;
(void)OptimizerStart(opt);
BN_BigNum *t1 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t2 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t3 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *halfP = ECP_HalfPGet(para->p);
if (t1 == NULL || t2 == NULL || t3 == NULL || halfP == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
goto ERR;
}
GOTO_ERR_IF(para->method->bnMontEnc(halfP, para->montP, opt, false), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &a->z, para->montP, opt), ret); // Z1^2
GOTO_ERR_IF(para->method->bnModNistEccSqr(t2, t1, para->montP, opt), ret); // Z1^4
GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t2, para->a, para->montP, opt), ret); // a*Z1^4
GOTO_ERR_IF(para->method->bnModNistEccSqr(t2, &a->x, para->montP, opt), ret); // X1^2
GOTO_ERR_IF(BN_ModAddQuick(t3, t2, t2, para->p, opt), ret); // 2*X1^2
GOTO_ERR_IF(BN_ModAddQuick(t2, t3, t2, para->p, opt), ret); // 3*X1^2
GOTO_ERR_IF(BN_ModAddQuick(t2, t1, t2, para->p, opt), ret); // t2 = 3*X1^2 + a*Z1^4
GOTO_ERR_IF(BN_ModAddQuick(&r->y, &a->y, &a->y, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &r->y, &a->z, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->y, &r->y, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(t3, &r->y, &a->x, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->y, &r->y, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, halfP, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, t2, para->montP, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(t1, t3, t3, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(t1, t3, &r->x, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, t2, para->montP, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(&r->y, t1, &r->y, para->p, opt), ret);
ERR:
BN_Destroy(halfP);
BN_OptimizerDestroy(opt); // no need to end opt.
return ret;
}
// Point addition calculation (Jacobian point a plus Jacobian point b)
// https://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian.html#addition-add-2007-bl
int32_t ECP_PrimePointAddMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a,
const ECC_Point *b)
{
bool flag = (para == NULL) || (r == NULL) || (a == NULL) || (b == NULL);
if (flag) {
return CRYPT_NULL_INPUT;
}
if (BN_IsZero(&a->z)) {
return ECC_CopyPoint(r, b);
}
if (BN_IsZero(&b->z)) {
return ECC_CopyPoint(r, a);
}
BN_Optimizer *opt = BN_OptimizerCreate();
if (opt == NULL) {
return CRYPT_MEM_ALLOC_FAIL;
}
(void)OptimizerStart(opt);
BN_BigNum *t0 = OptimizerGetBn(opt, para->p->size);
BN_BigNum *t1 = OptimizerGetBn(opt, para->p->size);
BN_BigNum *t2 = OptimizerGetBn(opt, para->p->size);
BN_BigNum *t3 = OptimizerGetBn(opt, para->p->size);
BN_BigNum *t4 = OptimizerGetBn(opt, para->p->size);
BN_BigNum *t5 = OptimizerGetBn(opt, para->p->size);
flag = (t0 == NULL) || (t1 == NULL) || (t2 == NULL) || (t3 == NULL) || (t4 == NULL) || (t5 == NULL);
if (flag) {
BN_OptimizerDestroy(opt); // no need to end opt.
return CRYPT_MEM_ALLOC_FAIL;
}
int32_t ret;
GOTO_ERR_IF(para->method->bnModNistEccSqr(t0, &a->z, para->montP, opt), ret); // z1z1 = z1^2
GOTO_ERR_IF(para->method->bnModNistEccSqr(t5, &b->z, para->montP, opt), ret); // z2z2 = z2^2
GOTO_ERR_IF(para->method->bnModNistEccMul(t1, &a->x, t5, para->montP, opt), ret); // u1 = x1*z2z2
GOTO_ERR_IF(para->method->bnModNistEccMul(t3, &b->x, t0, para->montP, opt), ret); // u2 = x2*z1z1
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, &b->z, t5, para->montP, opt), ret); // z2 * z2z2
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, &a->y, t2, para->montP, opt), ret); // s1 = y1 * z2 * z2z2
GOTO_ERR_IF(para->method->bnModNistEccMul(t4, &a->z, t0, para->montP, opt), ret); // z1 * z1z1
GOTO_ERR_IF(para->method->bnModNistEccMul(t4, &b->y, t4, para->montP, opt), ret); // s2 = y2 * z1 * z1z1
GOTO_ERR_IF(BN_ModAddQuick(t0, t0, t5, para->p, opt), ret); // z1z1 + z2z2
GOTO_ERR_IF(BN_ModSubQuick(t3, t3, t1, para->p, opt), ret); // h = u2 - u1
GOTO_ERR_IF(BN_ModSubQuick(t4, t4, t2, para->p, opt), ret); // s2 - s1
if (BN_IsZero(t3) && BN_IsZero(t4)) {
GOTO_ERR_IF(para->method->pointDouble(para, r, b), ret);
goto ERR;
}
GOTO_ERR_IF(BN_ModAddQuick(t5, t3, t3, para->p, opt), ret); // 2h
GOTO_ERR_IF(BN_ModAddQuick(&r->y, t4, t4, para->p, opt), ret); // r = 2(s2 - s1)
GOTO_ERR_IF(para->method->bnModNistEccSqr(t5, t5, para->montP, opt), ret); // i = (2h)^2
GOTO_ERR_IF(para->method->bnModNistEccMul(t4, t3, t5, para->montP, opt), ret); // j = h*i
GOTO_ERR_IF(para->method->bnModNistEccMul(t5, t1, t5, para->montP, opt), ret); // v = u1 * i
GOTO_ERR_IF(BN_ModAddQuick(t1, t5, t5, para->p, opt), ret); // 2 * v
GOTO_ERR_IF(BN_ModAddQuick(t1, t1, t4, para->p, opt), ret); // 2 * v + j
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, &r->y, para->montP, opt), ret); // rr ^ 2
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret); // r->x = rr ^ 2 - j - z * v
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, t4, para->montP, opt), ret); // s1 * j
GOTO_ERR_IF(BN_ModAddQuick(t2, t2, t2, para->p, opt), ret); // 2 * s1 * j
GOTO_ERR_IF(BN_ModSubQuick(t5, t5, &r->x, para->p, opt), ret); // v = v - x3
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, t5, para->montP, opt), ret); // r * (v - x3)
GOTO_ERR_IF(BN_ModSubQuick(&r->y, &r->y, t2, para->p, opt), ret); // r * (v - x3) - 2 * s1 * j
GOTO_ERR_IF(BN_ModAddQuick(&r->z, &a->z, &b->z, para->p, opt), ret); // z1 + z2
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->z, &r->z, para->montP, opt), ret); // (z1 + z2) ^ 2
GOTO_ERR_IF(BN_ModSubQuick(&r->z, &r->z, t0, para->p, opt), ret); // (z1 + z2) ^ 2 - z1z1 - z2z2
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &r->z, t3, para->montP, opt), ret); // r->z * h
ERR:
BN_OptimizerDestroy(opt); // no need to end opt.
return ret;
}
// Jacobian coordinate multi-double the point: r = (2^m) * pt
int32_t ECP_PrimePointMultDoubleMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m)
{
if (para == NULL || r == NULL || a == NULL) {
return CRYPT_NULL_INPUT;
}
uint32_t tm = m;
int32_t ret;
BN_Optimizer *opt = BN_OptimizerCreate();
if (opt == NULL) {
return CRYPT_MEM_ALLOC_FAIL;
}
(void)OptimizerStart(opt);
BN_BigNum *t1 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t2 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *ta = OptimizerGetBn(opt, a->x.room);
BN_BigNum *tb = OptimizerGetBn(opt, a->x.room);
BN_BigNum *tw = OptimizerGetBn(opt, a->x.room);
BN_BigNum *halfP = ECP_HalfPGet(para->p);
if (t1 == NULL || t2 == NULL || ta == NULL || tb == NULL || tw == NULL || halfP == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
goto ERR;
}
GOTO_ERR_IF(BN_Copy(&r->x, &a->x), ret);
GOTO_ERR_IF(BN_ModAddQuick(&r->y, &a->y, &a->y, para->p, opt), ret);
GOTO_ERR_IF(BN_Copy(&r->z, &a->z), ret);
GOTO_ERR_IF(para->method->bnMontEnc(halfP, para->montP, opt, false), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(tw, &a->z, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(tw, tw, para->montP, opt), ret); // Z^4
while (tm > 0) {
// A = 3*X^2 + a*W
GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &r->x, para->montP, opt), ret); // X^2
GOTO_ERR_IF(BN_ModAddQuick(ta, t1, t1, para->p, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(ta, ta, t1, para->p, opt), ret); // 3*X^2
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, para->a, tw, para->montP, opt), ret); // a*W
GOTO_ERR_IF(BN_ModAddQuick(ta, ta, t2, para->p, opt), ret); // A = 3*X^2 + a*W
GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &r->y, para->montP, opt), ret); // t1 = Y^2
GOTO_ERR_IF(para->method->bnModNistEccMul(tb, t1, &r->x, para->montP, opt), ret); // B = X*Y^2
GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, t1, para->montP, opt), ret); // t1 = Y^4
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, ta, para->montP, opt), ret); // A^2
GOTO_ERR_IF(BN_ModAddQuick(t2, tb, tb, para->p, opt), ret); // 2*B
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t2, para->p, opt), ret); // X = A^2 - 2*B
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &r->z, &r->y, para->montP, opt), ret);
// m = m - 1
tm--;
if (tm > 0) {
GOTO_ERR_IF(para->method->bnModNistEccMul(tw, tw, t1, para->montP, opt), ret);
}
GOTO_ERR_IF(BN_ModSubQuick(&r->y, tb, &r->x, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, ta, para->montP, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(&r->y, &r->y, &r->y, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(&r->y, &r->y, t1, para->p, opt), ret);
}
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, halfP, para->montP, opt), ret);
ERR:
BN_Destroy(halfP);
BN_OptimizerDestroy(opt);
return ret;
}
/*
prime curve point addition r = a + b, , depending on the method->pointDouble point operation.
Calculation formula:
X3 = (Y2*Z1^3-Y1)^2 - (X2*Z1^2-X1)^2 * (X1+X2*Z1^2)
Y3 = (Y2*Z1^3-Y1) * (X1*(X2*Z1^2-X1)^2-X3) - Y1 * (X2*Z1^2-X1)^3
Z3 = (X2*Z1^2-X1) * Z1
*/
int32_t ECP_PrimePointAddAffineMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b)
{
if (para == NULL || r == NULL || a == NULL || b == NULL) {
return CRYPT_NULL_INPUT;
}
if (BN_IsZero(&a->z)) { // if point a is an infinity point, r = b,
return ECC_CopyPoint(r, b);
}
BN_Optimizer *opt = BN_OptimizerCreate();
if (opt == NULL) {
return CRYPT_MEM_ALLOC_FAIL;
}
(void)OptimizerStart(opt);
BN_BigNum *t1 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t2 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t3 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t4 = OptimizerGetBn(opt, a->x.room);
if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL) {
BN_OptimizerDestroy(opt);
return CRYPT_MEM_ALLOC_FAIL;
}
int32_t ret;
GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &a->z, para->montP, opt), ret); // Z1^2
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t1, &a->z, para->montP, opt), ret); // Z1^3
GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, &b->x, para->montP, opt), ret); // X2*Z1^2
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, &b->y, para->montP, opt), ret); // Y2*Z1^3
GOTO_ERR_IF(BN_ModSubQuick(t1, t1, &a->x, para->p, opt), ret); // X2*Z1^2 - X1
GOTO_ERR_IF(BN_ModSubQuick(t2, t2, &a->y, para->p, opt), ret); // Y2*Z1^3 - Y1
if (BN_IsZero(t1)) {
if (BN_IsZero(t2)) {
// If two points are equal, use double for calculation.
GOTO_ERR_IF(para->method->pointDouble(para, r, b), ret);
} else {
// Obtain the infinite point.
GOTO_ERR_IF(BN_SetLimb(&r->z, 0), ret);
}
goto ERR;
}
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &a->z, t1, para->montP, opt), ret); // Z3 = (X2*Z1^2 - X1)*Z1
GOTO_ERR_IF(para->method->bnModNistEccSqr(t3, t1, para->montP, opt), ret); // (X2*Z1^2 - X1)^2
GOTO_ERR_IF(para->method->bnModNistEccMul(t4, t1, t3, para->montP, opt), ret); // (X2*Z1^2 - X1)^3
GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t3, &a->x, para->montP, opt), ret); // X1*(X2*Z1^2 - X1)^2
GOTO_ERR_IF(BN_ModAddQuick(t1, t3, t3, para->p, opt), ret); // 2*X1*(X2*Z1^2 - X1)^2
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, t2, para->montP, opt), ret); // (Y2*Z1^3 - Y1)^2
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret); // (Y2*Z1^3-Y1)^2 - 2*X1*(X2*Z1^2-X1)^2
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t4, para->p, opt), ret); // X3
GOTO_ERR_IF(BN_ModSubQuick(t3, t3, &r->x, para->p, opt), ret); // X1*(X2*Z1^2-X1)^2 - X3
// (Y2*Z1^3-Y1)*(X1*(X2*Z1^2-X1)^2-X3)
GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t3, t2, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(t4, t4, &a->y, para->montP, opt), ret); // Y1*(X2*Z1^2 - X1)^3
GOTO_ERR_IF(BN_ModSubQuick(&r->y, t3, t4, para->p, opt), ret); // Y3
ERR:
BN_OptimizerDestroy(opt);
return ret;
}
#endif
int32_t ECP_Point2AffineMont(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt)
{
if (pt == NULL || r == NULL || para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != r->id || para->id != pt->id) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
if (BN_IsOne(&pt->z)) {
return ECC_CopyPoint(r, pt);
}
uint32_t bits = BN_Bits(para->p);
BN_BigNum *inv = BN_Create(bits);
BN_BigNum *zz = BN_Create(bits);
BN_Optimizer *opt = BN_OptimizerCreate();
ECC_Point *base = ECC_DupPoint(pt);
int32_t ret;
if (inv == NULL || zz == NULL || opt == NULL || base == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
GOTO_ERR_IF(para->method->modInv(inv, &base->z, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnMontEnc(&base->x, para->montP, opt, false), ret);
GOTO_ERR_IF(para->method->bnMontEnc(&base->y, para->montP, opt, false), ret);
GOTO_ERR_IF(para->method->bnMontEnc(inv, para->montP, opt, false), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(zz, inv, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->x, &base->x, zz, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(zz, zz, inv, para->montP, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &base->y, zz, para->montP, opt), ret);
GOTO_ERR_IF(BN_SetLimb(&r->z, 1), ret);
para->method->bnMontDec(&r->x, para->montP);
para->method->bnMontDec(&r->y, para->montP);
ERR:
BN_Destroy(zz);
BN_Destroy(inv);
ECC_FreePoint(base);
BN_OptimizerDestroy(opt);
return ret;
}
/*
* XZ coordinates for short Weierstrass curves
* https://hyperelliptic.org/EFD/g1p/auto-shortw-xz.html#ladder-mladd-2002-bj-3
* MontLadderDoubleAndAdd return:
* r2 = 2 * r2
* r3 = r2 + r3
*/
static int32_t MontLadderDoubleAndAdd(ECC_Para *para, ECC_Point *r2, ECC_Point *r3, ECC_Point *p, BN_Optimizer *opt)
{
int32_t ret;
(void)OptimizerStart(opt);
BN_BigNum *t0 = OptimizerGetBn(opt, p->x.room);
BN_BigNum *t1 = OptimizerGetBn(opt, p->x.room);
BN_BigNum *t2 = OptimizerGetBn(opt, p->x.room);
BN_BigNum *t3 = OptimizerGetBn(opt, p->x.room);
BN_BigNum *t4 = OptimizerGetBn(opt, p->x.room);
BN_BigNum *t5 = OptimizerGetBn(opt, p->x.room);
if (t0 == NULL || t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t5 == NULL) {
OptimizerEnd(opt);
return CRYPT_MEM_ALLOC_FAIL; // 不需要释放其他大数,统一交给大数优化器管理
}
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r2->y, &r2->x, para->montP, opt), ret); // x2 ^ 2
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r3->y, &r2->z, para->montP, opt), ret); // z2 ^ 2
GOTO_ERR_IF(para->method->bnModNistEccMul(t0, &r2->x, &r2->z, para->montP, opt), ret); // X2 * Z2
GOTO_ERR_IF(BN_ModAddQuick(t0, t0, t0, para->p, opt), ret); // 2 * X2 * Z2
GOTO_ERR_IF(BN_ModAddQuick(t0, t0, t0, para->p, opt), ret); // 4 * X2 * Z2
GOTO_ERR_IF(para->method->bnModNistEccMul(t1, para->a, &r3->y, para->montP, opt), ret); // aZZ = a * ZZ
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, &r2->x, &r3->x, para->montP, opt), ret); // X2 * X3
GOTO_ERR_IF(para->method->bnModNistEccMul(t3, &r2->z, &r3->z, para->montP, opt), ret); // Z2 * Z3
GOTO_ERR_IF(para->method->bnModNistEccMul(t4, &r2->x, &r3->z, para->montP, opt), ret); // X2 * Z3
GOTO_ERR_IF(para->method->bnModNistEccMul(t5, &r2->z, &r3->x, para->montP, opt), ret); // Z2 * X3
GOTO_ERR_IF(BN_ModSubQuick(&r2->x, &r2->y, t1, para->p, opt), ret); // XX - aZZ
GOTO_ERR_IF(BN_ModAddQuick(&r2->z, &r2->y, t1, para->p, opt), ret); // XX + aZZ
GOTO_ERR_IF(para->method->bnModNistEccMul(&r2->z, t0, &r2->z, para->montP, opt), ret); // E * (XX + aZZ)
GOTO_ERR_IF(para->method->bnModNistEccMul(t0, t0, &r3->y, para->montP, opt), ret); // E * ZZ
GOTO_ERR_IF(para->method->bnModNistEccMul(t0, t0, para->b, para->montP, opt), ret); // b * E * ZZ
GOTO_ERR_IF(BN_ModAddQuick(t0, t0, t0, para->p, opt), ret); // 2b * E * ZZ
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r2->x, &r2->x, para->montP, opt), ret); // (XX - aZZ) ^ 2
GOTO_ERR_IF(BN_ModSubQuick(&r2->x, &r2->x, t0, para->p, opt), ret); // (XX - aZZ) ^ 2 - 2b * E * ZZ
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r3->y, &r3->y, para->montP, opt), ret); // ZZ ^ 2
GOTO_ERR_IF(para->method->bnModNistEccMul(&r3->y, &r3->y, para->b, para->montP, opt), ret); // b * ZZ^2
GOTO_ERR_IF(BN_ModAddQuick(&r3->y, &r3->y, &r3->y, para->p, opt), ret); // 2 * b * ZZ^2
GOTO_ERR_IF(BN_ModAddQuick(&r3->y, &r3->y, &r3->y, para->p, opt), ret); // 4 * b * ZZ^2
GOTO_ERR_IF(BN_ModAddQuick(&r2->z, &r2->z, &r3->y, para->p, opt), ret); // E * (XX + aZZ) + 4 * b * ZZ^2
GOTO_ERR_IF(para->method->bnModNistEccMul(&r3->x, para->a, t3, para->montP, opt), ret); // a * B
GOTO_ERR_IF(BN_ModSubQuick(&r3->x, t2, &r3->x, para->p, opt), ret); // A - a * B
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r3->x, &r3->x, para->montP, opt), ret); // (A - a * B) ^ 2
GOTO_ERR_IF(BN_ModAddQuick(t2, t4, t5, para->p, opt), ret); // C + D
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, t3, para->montP, opt), ret); // B * (C + D)
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, para->b, para->montP, opt), ret); // b * B * (C + D)
GOTO_ERR_IF(BN_ModAddQuick(t2, t2, t2, para->p, opt), ret); // 2 * b * B * (C + D)
GOTO_ERR_IF(BN_ModAddQuick(t2, t2, t2, para->p, opt), ret); // 4 * b * B * (C + D)
GOTO_ERR_IF(BN_ModSubQuick(&r3->x, &r3->x, t2, para->p, opt), ret); // (A - a * B) ^ 2 - 4 * b * B * (C + D)
GOTO_ERR_IF(BN_ModSubQuick(t4, t4, t5, para->p, opt), ret); // C - D
GOTO_ERR_IF(para->method->bnModNistEccSqr(t4, t4, para->montP, opt), ret); // (C - D) ^ 2
GOTO_ERR_IF(para->method->bnModNistEccMul(&r3->z, &p->x, t4, para->montP, opt), ret); // px * (C + D) ^ 2
ERR:
OptimizerEnd(opt);
return ret;
}
/*
* ref <Weierstraß Elliptic Curves and side-Channel Attacks> formula 8.
* XZ coordinates [database entry] represent x y as X Z satisfying the following equations:
* x = X / Z
* MontLadderRecoverYAndToMont return:
* r1->x = r1->x / r1->z
* r1->y = (2b + (a + x*x1)*(x + x1) - x2(x - x1)^2) / (2*y)
* = (2b*z2*(z1^2) + z2(a*z1 + x*x1)(x*z1 + x1) - x2(x*z1 - x1) ^ 2) / (2y*z2*(z1^2))
*/
static int32_t MontLadderRecoverYAndToMont(ECC_Para *para, ECC_Point *r1, ECC_Point *r2, ECC_Point *p,
BN_Optimizer *opt)
{
int32_t ret;
if (BN_IsZero(&r1->z)) {
para->method->bnMontDec(&r1->x, para->montP);
para->method->bnMontDec(&r1->y, para->montP);
return CRYPT_SUCCESS;
}
if (BN_IsZero(&r2->z)) {
GOTO_ERR_IF(ECC_CopyPoint(r1, p), ret); // r2 = r1 + p = 0 -> r1 = -p
GOTO_ERR_IF(BN_Sub(&r1->y, para->p, &r1->y), ret);
para->method->bnMontDec(&r1->x, para->montP);
para->method->bnMontDec(&r1->y, para->montP);
GOTO_ERR_IF(BN_SetLimb(&r1->z, 1), ret);
return CRYPT_SUCCESS;
}
(void)OptimizerStart(opt);
BN_BigNum *t0 = OptimizerGetBn(opt, p->x.room);
BN_BigNum *t1 = OptimizerGetBn(opt, p->x.room);
BN_BigNum *t2 = OptimizerGetBn(opt, p->x.room);
BN_BigNum *t3 = OptimizerGetBn(opt, p->x.room);
if (t0 == NULL || t1 == NULL || t2 == NULL || t3 == NULL) {
OptimizerEnd(opt);
return CRYPT_MEM_ALLOC_FAIL; // Other bn do not need to be released. They are managed by the opt.
}
GOTO_ERR_IF(para->method->bnModNistEccSqr(t0, &r1->z, para->montP, opt), ret); // t0 = z1 ^ 2
GOTO_ERR_IF(para->method->bnModNistEccMul(t0, t0, &r2->z, para->montP, opt), ret); // t0 = z2 * z1^2
GOTO_ERR_IF(BN_ModAddQuick(t1, para->b, para->b, para->p, opt), ret); // 2b
GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t0, t1, para->montP, opt), ret); // t1 = 2b*z2*z1^2
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, para->a, &r1->z, para->montP, opt), ret); // t2 = a*z1
GOTO_ERR_IF(para->method->bnModNistEccMul(&r2->y, &p->x, &r1->x, para->montP, opt), ret); // r2->y = x*x1
GOTO_ERR_IF(para->method->bnModNistEccMul(&r1->y, &p->x, &r1->z, para->montP, opt), ret); // t4 = x*z1
GOTO_ERR_IF(BN_ModAddQuick(t2, t2, &r2->y, para->p, opt), ret); // a*z1 + x*x1
GOTO_ERR_IF(BN_ModAddQuick(&r1->y, &r1->y, &r1->x, para->p, opt), ret); // x*z1 + x1
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, &r2->z, para->montP, opt), ret); // (a*z1 + x*x1) * z2
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, &r1->y, para->montP, opt), ret); // t2=(a*z1+x*x1)*z2*(x*z1+x1)
GOTO_ERR_IF(para->method->bnModNistEccMul(&r2->y, &p->x, &r1->z, para->montP, opt), ret); // x * z1
GOTO_ERR_IF(BN_ModSubQuick(&r2->y, &r2->y, &r1->x, para->p, opt), ret); // x * z1 - x1
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r2->y, &r2->y, para->montP, opt), ret); // (x * z1 - x1) ^ 2
GOTO_ERR_IF(para->method->bnModNistEccMul(&r2->y, &r2->y, &r2->x, para->montP, opt), ret); // x2 * (x * z1 - x1) ^ 2
GOTO_ERR_IF(BN_ModAddQuick(t1, t1, t2, para->p, opt), ret); // 2b*z2*z1^2 + t2
GOTO_ERR_IF(BN_ModSubQuick(t1, t1, &r2->y, para->p, opt), ret); // 2b*z2*z1^2 + t2 - r2->y
GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, &r1->z, para->montP, opt), ret); // (2b*z2*z1^2 - t2 - r2->y) * z1
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t0, &p->y, para->montP, opt), ret); // t2 = z2 * z1^2 * y
GOTO_ERR_IF(BN_ModAddQuick(t2, t2, t2, para->p, opt), ret); // 2 * y * z2 * z1^2
GOTO_ERR_IF(para->method->bnModNistEccMul(t0, &r1->x, t2, para->montP, opt), ret); // x * (2 * y * z2 * z1^2)
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, &r1->z, para->montP, opt), ret); // (2 * y * z2 * z1^2) * z1
para->method->bnMontDec(t2, para->montP);
GOTO_ERR_IF(para->method->modInv(t2, t2, para->p, opt), ret); // (2 * y * z2 * z1^2) * -1
GOTO_ERR_IF(para->method->bnMontEnc(t2, para->montP, opt, false), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(&r1->x, t0, t2, para->montP, opt), ret); // x1 / z1
// (2b*z2*z1^2 - t2 - t3) * ((2 * y * z2 * z1^2)
GOTO_ERR_IF(para->method->bnModNistEccMul(&r1->y, t1, t2, para->montP, opt), ret);
para->method->bnMontDec(&r1->x, para->montP);
para->method->bnMontDec(&r1->y, para->montP);
GOTO_ERR_IF(BN_SetLimb(&r1->z, 1), ret); // x * (2 * y * z2 * z1^2)
ERR:
OptimizerEnd(opt);
return ret;
}
/*
* XZ coordinates for short Weierstrass curves
* 2M + 5S + 1*b2 + 1*a + 1*b4
* https://hyperelliptic.org/EFD/g1p/auto-shortw-xz.html#doubling-dbl-2002-bj-3
* p->z = 1, the above formula can reduce the calculation amount.
* MontLadderDouble return:
* r = 2 * p
*/
static int32_t MontLadderDouble(const ECC_Para *para, ECC_Point *r, ECC_Point *p, BN_Optimizer *opt)
{
int32_t ret;
(void)OptimizerStart(opt);
BN_BigNum *t0 = OptimizerGetBn(opt, p->x.room);
if (t0 == NULL) {
return CRYPT_MEM_ALLOC_FAIL;
}
GOTO_ERR_IF(para->method->bnModNistEccSqr(t0, &p->x, para->montP, opt), ret); // x^2
GOTO_ERR_IF(BN_ModAddQuick(&r->y, &p->x, &p->x, para->p, opt), ret); // 2 * x
GOTO_ERR_IF(BN_ModAddQuick(&r->y, &r->y, &r->y, para->p, opt), ret); // ry = 4 * x * z = 4 * x (z = 1)
GOTO_ERR_IF(BN_ModSubQuick(&r->x, t0, para->a, para->p, opt), ret); // t0 - a
GOTO_ERR_IF(BN_ModAddQuick(&r->z, t0, para->a, para->p, opt), ret); // t0 + a
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, &r->x, para->montP, opt), ret); // (t0 - a)^2
GOTO_ERR_IF(para->method->bnModNistEccMul(t0, para->b, &r->y, para->montP, opt), ret); // b * ry
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t0, para->p, opt), ret); // (t0 - a)^2 - b * ry
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t0, para->p, opt), ret); // (t0 - a)^2 - 2 * b * ry
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &r->y, &r->z, para->montP, opt), ret); // ry * (t0 + a)
GOTO_ERR_IF(BN_ModAddQuick(t0, para->b, para->b, para->p, opt), ret); // 2 * b
GOTO_ERR_IF(BN_ModAddQuick(t0, t0, t0, para->p, opt), ret); // 4 * b
GOTO_ERR_IF(BN_ModAddQuick(&r->z, &r->z, t0, para->p, opt), ret); // ry * (t0 + a) + 4 * b
ERR:
OptimizerEnd(opt);
return ret;
}
static int32_t ECP_PointSwapWithMask(ECC_Point *a, ECC_Point *b, BN_UINT mask)
{
int32_t ret;
GOTO_ERR_IF(BN_SwapWithMask(&a->x, &b->x, mask), ret);
GOTO_ERR_IF(BN_SwapWithMask(&a->y, &b->y, mask), ret);
GOTO_ERR_IF(BN_SwapWithMask(&a->z, &b->z, mask), ret);
ERR:
return ret;
}
/*
* ref <Weierstraß Elliptic Curves and side-Channel Attacks>
* Montgomery ladder to achieve k * Pt
*/
int32_t ECP_PointMulMont(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt)
{
if (para == NULL || r == NULL || k == NULL) {
return CRYPT_NULL_INPUT;
}
if (((pt != NULL) && (para->id != pt->id)) || (para->id != r->id)) {
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
if (pt != NULL && BN_IsZero(&pt->z)) {
return CRYPT_ECC_POINT_AT_INFINITY;
}
if (BN_IsZero(k)) {
BN_Zeroize(&r->z);
return CRYPT_SUCCESS;
}
if (BN_Cmp(k, para->n) == 0 && pt != NULL) {
return ECP_PointMulFast(para, r, para->n, pt);
}
int32_t ret;
BN_UINT mask1 = 0;
BN_UINT mask2 = 0;
BN_UINT tmp;
uint32_t bits;
ECC_Point *base = (pt != NULL) ? ECC_DupPoint(pt) : ECC_GetGFromPara(para);
ECC_Point *r1 = ECC_NewPoint(para);
BN_Optimizer *opt = BN_OptimizerCreate();
if (base == NULL || r1 == NULL || opt == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
// Convert base to affine.
GOTO_ERR_IF(ECP_Point2Affine(para, base, base), ret);
GOTO_ERR_IF(ECC_PointToMont(para, base, opt), ret);
GOTO_ERR_IF(ECC_CopyPoint(r, base), ret); // r = base
GOTO_ERR_IF(MontLadderDouble(para, r1, r, opt), ret);
bits = BN_Bits(k);
for (uint32_t i = bits - 1; i > 0; i--) {
tmp = BN_GetBit(k, i - 1);
mask2 = (-tmp) & BN_MASK;
GOTO_ERR_IF(ECP_PointSwapWithMask(r, r1, mask2 ^ mask1), ret);
GOTO_ERR_IF(MontLadderDoubleAndAdd(para, r, r1, base, opt), ret);
mask1 ^= (mask2 ^ mask1);
}
GOTO_ERR_IF(ECP_PointSwapWithMask(r, r1, mask1), ret);
GOTO_ERR_IF(MontLadderRecoverYAndToMont(para, r, r1, base, opt), ret);
ERR:
BN_OptimizerDestroy(opt);
ECC_FreePoint(r1);
ECC_FreePoint(base);
return ret;
}
#endif /* HITLS_CRYPTO_ECC */
|
2301_79861745/bench_create
|
crypto/ecc/src/ecp_mont.c
|
C
|
unknown
| 41,082
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ECC
#include "securec.h"
#include "bsl_sal.h"
#include "bsl_err_internal.h"
#include "crypt_utils.h"
#include "crypt_errno.h"
#include "ecc_local.h"
#if defined(HITLS_CRYPTO_CURVE_NISTP224) || defined(HITLS_CRYPTO_CURVE_NISTP256) || \
defined(HITLS_CRYPTO_CURVE_NISTP384) || defined(HITLS_CRYPTO_CURVE_NISTP521) || defined(HITLS_CRYPTO_CURVE_SM2)
static int32_t CreatTmpBn(BN_BigNum **t1, BN_BigNum **t2, BN_BigNum **t3, BN_BigNum **t4, uint32_t bits)
{
*t1 = BN_Create(bits);
*t2 = BN_Create(bits);
*t3 = BN_Create(bits);
*t4 = BN_Create(bits);
if (*t1 == NULL || *t2 == NULL || *t3 == NULL || *t4 == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
return CRYPT_SUCCESS;
}
static void DestroyTmpBn(
BN_BigNum *t1, BN_BigNum *t2, BN_BigNum *t3, BN_BigNum *t4)
{
BN_Destroy(t1);
BN_Destroy(t2);
BN_Destroy(t3);
BN_Destroy(t4);
}
// Jacobian coordinate double the point
int32_t ECP_NistPointDouble(const ECC_Para *para, ECC_Point *r, const ECC_Point *a)
{
if (para == NULL || r == NULL || a == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
int32_t ret;
uint32_t bits = BN_Bits(para->p);
BN_Optimizer *opt = BN_OptimizerCreate();
BN_BigNum *t1 = BN_Create(bits);
BN_BigNum *t2 = BN_Create(bits);
BN_BigNum *t3 = BN_Create(bits);
BN_BigNum *halfP = ECP_HalfPGet(para->p);
if (t1 == NULL || t2 == NULL || t3 == NULL || halfP == NULL || opt == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &a->z, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(t2, &a->x, t1, para->p, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(t1, &a->x, t1, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, t1, para->p, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(t3, t2, t2, para->p, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(t2, t3, t2, para->p, opt), ret); // t2 = 3*t2
GOTO_ERR_IF(BN_ModAddQuick(&r->y, &a->y, &a->y, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &r->y, &a->z, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->y, &r->y, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(t3, &r->y, &a->x, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->y, &r->y, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, halfP, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, t2, para->p, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(t1, t3, t3, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(t1, t3, &r->x, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, t2, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(&r->y, t1, &r->y, para->p, opt), ret);
ERR:
BN_Destroy(t1);
BN_Destroy(t2);
BN_Destroy(t3);
BN_Destroy(halfP);
BN_OptimizerDestroy(opt);
return ret;
}
// Jacobian coordinate multi-double the point: r = (2^m) * pt
int32_t ECP_NistPointMultDouble(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, uint32_t m)
{
if (para == NULL || r == NULL || a == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
uint32_t tm = m;
int32_t ret;
uint32_t bits = BN_Bits(para->p);
BN_BigNum *ta = NULL, *tb = NULL, *tc = NULL, *tw = NULL;
BN_BigNum *halfP = ECP_HalfPGet(para->p);
BN_Optimizer *opt = BN_OptimizerCreate();
GOTO_ERR_IF_EX(CreatTmpBn(&ta, &tb, &tc, &tw, bits), ret);
if (halfP == NULL || opt == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
GOTO_ERR_IF(BN_Copy(&r->x, &a->x), ret);
GOTO_ERR_IF(BN_ModAddQuick(&r->y, &a->y, &a->y, para->p, opt), ret);
GOTO_ERR_IF(BN_Copy(&r->z, &a->z), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(tw, &a->z, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(tw, tw, para->p, opt), ret);
while (tm > 0) {
// 3.1
// ta = 3*(x^2 - tw)
GOTO_ERR_IF(para->method->bnModNistEccSqr(ta, &r->x, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(tc, ta, tw, para->p, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(ta, tc, tc, para->p, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(ta, ta, tc, para->p, opt), ret);
// tb = x*(y^2)
GOTO_ERR_IF(para->method->bnModNistEccSqr(tc, &r->y, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(tb, tc, &r->x, para->p, opt), ret);
// 3.2
// x = ta^2 - 2*tb
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, ta, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, tb, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, tb, para->p, opt), ret);
// z = zy
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &r->z, &r->y, para->p, opt), ret);
// 3.3
// tc = y^4
GOTO_ERR_IF(para->method->bnModNistEccSqr(tc, &r->y, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(tc, tc, para->p, opt), ret);
// m = m - 1, if bit > 0, tw = tw * (y^4)
tm--;
if (tm > 0) {
GOTO_ERR_IF(para->method->bnModNistEccMul(tw, tw, tc, para->p, opt), ret);
}
// 3.4
// y = 2*ta*(tb - x) - (y^4)
GOTO_ERR_IF(BN_ModSubQuick(&r->y, tb, &r->x, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, ta, para->p, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(&r->y, &r->y, &r->y, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(&r->y, &r->y, tc, para->p, opt), ret);
}
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &r->y, halfP, para->p, opt), ret);
ERR:
DestroyTmpBn(ta, tb, tc, tw);
BN_Destroy(halfP);
BN_OptimizerDestroy(opt);
return ret;
}
// Point addition calculation (Jacobian point a plus affine point b)
// Algorithm Reference ECP_NistPointAddAffineMont.
int32_t ECP_NistPointAddAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a,
const ECC_Point *b)
{
if (para == NULL || r == NULL || a == NULL || b == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (BN_IsZero(&a->z)) {
// If point a is an infinity point, r = b
return ECC_CopyPoint(r, b);
}
int32_t ret;
uint32_t bits = BN_Bits(para->p);
BN_Optimizer *opt = BN_OptimizerCreate();
BN_BigNum *t1 = NULL, *t2 = NULL, *t3 = NULL, *t4 = NULL;
GOTO_ERR_IF_EX(CreatTmpBn(&t1, &t2, &t3, &t4, bits), ret);
if (opt == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &a->z, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t1, &a->z, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, &b->x, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t2, &b->y, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(t1, t1, &a->x, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(t2, t2, &a->y, para->p, opt), ret);
if (BN_IsZero(t1)) {
if (BN_IsZero(t2)) {
// If two points are equal, use double the point for calculation.
GOTO_ERR_IF(ECP_NistPointDouble(para, r, b), ret);
goto ERR;
} else {
// Obtain the infinity point.
GOTO_ERR_IF(BN_SetLimb(&r->z, 0), ret);
goto ERR;
}
}
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &a->z, t1, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(t3, t1, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(t4, t1, t3, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t3, &a->x, para->p, opt), ret);
GOTO_ERR_IF(BN_ModAddQuick(t1, t3, t3, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, t2, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t4, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(t3, t3, &r->x, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t3, t2, para->p, opt), ret);
GOTO_ERR_IF(para->method->bnModNistEccMul(t4, t4, &a->y, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSubQuick(&r->y, t3, t4, para->p, opt), ret);
ERR:
DestroyTmpBn(t1, t2, t3, t4);
BN_OptimizerDestroy(opt);
return ret;
}
// Point addition calculation (Jacobian point a plus Jacobian point b)
// Algorithm Reference ECP_NistPointAddMont.
int32_t ECP_NistPointAdd(const ECC_Para *para, ECC_Point *r, const ECC_Point *a,
const ECC_Point *b)
{
if (para == NULL || r == NULL || a == NULL || b == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (BN_IsZero(&a->z)) {
// If point a is an infinity point, r = b
return ECC_CopyPoint(r, b);
}
if (BN_IsZero(&b->z)) {
// If point b is an infinity point, r = a
return ECC_CopyPoint(r, a);
}
int32_t ret;
BN_Optimizer *opt = BN_OptimizerCreate();
if (opt == NULL) {
return CRYPT_MEM_ALLOC_FAIL;
}
(void)OptimizerStart(opt);
BN_BigNum *t1 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t2 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t3 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t4 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t5 = OptimizerGetBn(opt, a->x.room);
BN_BigNum *t6 = OptimizerGetBn(opt, a->x.room);
if (t1 == NULL || t2 == NULL || t3 == NULL || t4 == NULL || t5 == NULL || t6 == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
ret = CRYPT_MEM_ALLOC_FAIL;
goto ERR;
}
GOTO_ERR_IF(para->method->bnModNistEccSqr(t1, &b->z, para->p, opt), ret); // Z2^2
GOTO_ERR_IF(para->method->bnModNistEccMul(t2, t1, &b->z, para->p, opt), ret); // Z2^3
GOTO_ERR_IF(para->method->bnModNistEccMul(t5, t1, &a->x, para->p, opt), ret); // U1 = X1*Z2^2
GOTO_ERR_IF(para->method->bnModNistEccMul(t6, t2, &a->y, para->p, opt), ret); // S1 = Y1*Z2^3
GOTO_ERR_IF(para->method->bnModNistEccSqr(t3, &a->z, para->p, opt), ret); // T3 = Z1^2
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, &a->z, &b->y, para->p, opt), ret); // r->y = Y2*Z1
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, &a->z, &b->z, para->p, opt), ret); // r->z = Z2*Z1
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->y, t3, &r->y, para->p, opt), ret); // S2 = Y2 * Z1^3
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->x, t3, &b->x, para->p, opt), ret); // U2 = Z1^2 * X2
GOTO_ERR_IF(BN_ModSubQuick(t1, &r->x, t5, para->p, opt), ret); // H = U2 - U1
GOTO_ERR_IF(BN_ModSubQuick(t2, &r->y, t6, para->p, opt), ret); // r = S2 - S1
if (BN_IsZero(t1) && BN_IsZero(t2)) {
GOTO_ERR_IF(para->method->pointDouble(para, r, b), ret);
goto ERR;
}
GOTO_ERR_IF(para->method->bnModNistEccMul(&r->z, t1, &r->z, para->p, opt), ret); // r->z = H * Z2*Z1
GOTO_ERR_IF(para->method->bnModNistEccSqr(t3, t1, para->p, opt), ret); // t3 = H^2
GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, t3, para->p, opt), ret); // t1 = H^3
GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t3, t5, para->p, opt), ret); // t3 = H^2 * U1
GOTO_ERR_IF(para->method->bnModNistEccSqr(&r->x, t2, para->p, opt), ret); // r->x = r ^ 2
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t3, para->p, opt), ret); // r ^ 2 - H^2*U1
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t3, para->p, opt), ret); // r ^ 2 - 2*H^2 * U1
GOTO_ERR_IF(BN_ModSubQuick(&r->x, &r->x, t1, para->p, opt), ret); // r ^ 2 - 2*H^2*U1 - H^3
GOTO_ERR_IF(BN_ModSubQuick(t3, t3, &r->x, para->p, opt), ret); // H^2 * U1 - X3
GOTO_ERR_IF(para->method->bnModNistEccMul(t3, t2, t3, para->p, opt), ret); // r * (H^2 * U1 - X3)
GOTO_ERR_IF(para->method->bnModNistEccMul(t1, t1, t6, para->p, opt), ret); // t1 = H^3 * S1
GOTO_ERR_IF(BN_ModSubQuick(&r->y, t3, t1, para->p, opt), ret); // r * (H^2 * U1 - X3) - H^3 * S1
ERR:
BN_OptimizerDestroy(opt);
return ret;
}
#endif
int32_t ECP_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a)
{
int32_t ret;
BN_Optimizer *opt = NULL;
if (para == NULL || r == NULL || a == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
opt = BN_OptimizerCreate();
if (opt == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ret = BN_ModInv(r, a, para->n, opt);
BN_OptimizerDestroy(opt);
return ret;
}
#endif /* HITLS_CRYPTO_ECC */
|
2301_79861745/bench_create
|
crypto/ecc/src/ecp_nist.c
|
C
|
unknown
| 13,482
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_CURVE_NISTP224) && defined(HITLS_CRYPTO_NIST_USE_ACCEL)
#include <stdbool.h>
#include "securec.h"
#include "bsl_err_internal.h"
#include "crypt_errno.h"
#include "crypt_utils.h"
#include "crypt_bn.h"
#include "crypt_ecc.h"
#include "ecc_local.h"
#include "ecc_utils.h"
#include "bsl_util_internal.h"
#ifndef __SIZEOF_INT128__
#error "This nistp224 implementation require the compiler support 128-bits integer."
#endif
/* field element definition */
#define FELEM_BITS 224
#define FELEM_BYTES 28
#define LIMB_BITS (sizeof(uint64_t) << 3)
#define LIMB_NUM 4
#define BASE_BITS 56
#define BASE_MASK 0x00ffffffffffffff
/* The pre-calculation table of the G table has 16 points. */
#define TABLE_G_SIZE 16
/* The pre-calculation table of the P table has 17 points. */
#define TABLE_P_SIZE 17
/*
* field elements, stored as arrays, all represented in little endian.
* Each element of the array is called a digit, and each digit represents an extended 2^56-number-system digit,
* that is, Felem can be expressed as:
* f_0 + f_1 * 2^56 + f_2 * 2^112 + f_3 * 2^168
* LongFelem is the same, but twice the width of Felem.
* It is used to store the result of multiplication of field elements.
* Point is a point represented as a Jacobian coordinate
*/
typedef struct {
uint64_t data[LIMB_NUM];
} Felem;
typedef struct {
uint128_t data[LIMB_NUM * 2 - 1];
} LongFelem;
typedef struct {
Felem x;
Felem y;
Felem z;
} Point;
/* ------------------------------------------------------------ */
/* ECP224 field order p, the value is 2^224 - 2^96 + 1, little endian. */
static const Felem FIELD_ORDER = {
{0x0000000000000001, 0x00ffff0000000000, 0x00ffffffffffffff, 0x00ffffffffffffff}
};
/*
* A pre-calculated table of the base point G, which contains the (X, Y, Z) coordinates of k*G
*
* PRE_MUL_G divides all bits into four equal parts.
* index Corresponding bit value of k
* 0 0 0 0 0 0 + 0 + 0 + 0
* 1 0 0 0 1 0 + 0 + 0 + 1
* 2 0 0 1 0 0 + 0 + 2^56 + 0
* 3 0 0 1 1 0 + 0 + 2^56 + 1
* 4 0 1 0 0 0 + 2^112 + 0 + 0
* 5 0 1 0 1 0 + 2^112 + 0 + 1
* 6 0 1 1 0 0 + 2^112 + 2^56 + 0
* 7 0 1 1 1 0 + 2^112 + 2^56 + 1
* 8 1 0 0 0 2^168 + 0 + 0 + 0
* 9 1 0 0 1 2^168 + 0 + 0 + 1
* 10 1 0 1 0 2^168 + 0 + 2^56 + 0
* 11 1 0 1 1 2^168 + 0 + 2^56 + 1
* 12 1 1 0 0 2^168 + 2^112 + 0 + 0
* 13 1 1 0 1 2^168 + 2^112 + 0 + 1
* 14 1 1 1 0 2^168 + 2^112 + 2^56 + 0
* 15 1 1 1 1 2^168 + 2^112 + 2^56 + 1
*/
static const Point PRE_MUL_G[TABLE_G_SIZE] = {
{
{{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}},
{{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}},
{{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x003280d6115c1d21, 0x00c1d356c2112234, 0x007f321390b94a03, 0x00b70e0cbd6bb4bf}},
{{0x00d5819985007e34, 0x0075a05a07476444, 0x00fb4c22dfe6cd43, 0x00bd376388b5f723}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x00fd9675666ebbe9, 0x00bca7664d40ce5e, 0x002242df8d8a2a43, 0x001f49bbb0f99bc5}},
{{0x0029e0b892dc9c43, 0x00ece8608436e662, 0x00dc858f185310d0, 0x009812dd4eb8d321}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x006d3e678d5d8eb8, 0x00559eed1cb362f1, 0x0016e9a3bbce8a3f, 0x00eedcccd8c2a748}},
{{0x00f19f90ed50266d, 0x00abf2b4bf65f9df, 0x00313865468fafec, 0x005cb379ba910a17}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x000641966cab26e3, 0x0091fb2991fab0a0, 0x00efec27a4e13a0b, 0x000499aa8a5f8ebe}},
{{0x007510407766af5d, 0x0084d929610d5450, 0x0081d77aae82f706, 0x006916f6d4338c5b}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x00ea95ac3b1f15c6, 0x00086000905e82d4, 0x00dd323ae4d1c8b1, 0x00932b56be7685a3}},
{{0x009ef93dea25dbbf, 0x0041665960f390f0, 0x00fdec76dbe2a8a7, 0x00523e80f019062a}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x00822fdd26732c73, 0x00a01c83531b5d0f, 0x00363f37347c1ba4, 0x00c391b45c84725c}},
{{0x00bbd5e1b2d6ad24, 0x00ddfbcde19dfaec, 0x00c393da7e222a7f, 0x001efb7890ede244}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x004c9e90ca217da1, 0x00d11beca79159bb, 0x00ff8d33c2c98b7c, 0x002610b39409f849}},
{{0x0044d1352ac64da0, 0x00cdbb7b2c46b4fb, 0x00966c079b753c89, 0x00fe67e4e820b112}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x00e28cae2df5312d, 0x00c71b61d16f5c6e, 0x0079b7619a3e7c4c, 0x0005c73240899b47}},
{{0x009f7f6382c73e3a, 0x0018615165c56bda, 0x00641fab2116fd56, 0x0072855882b08394}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x000469182f161c09, 0x0074a98ca8d00fb5, 0x00b89da93489a3e0, 0x0041c98768fb0c1d}},
{{0x00e5ea05fb32da81, 0x003dce9ffbca6855, 0x001cfe2d3fbf59e6, 0x000e5e03408738a7}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x00dab22b2333e87f, 0x004430137a5dd2f6, 0x00e03ab9f738beb8, 0x00cb0c5d0dc34f24}},
{{0x00764a7df0c8fda5, 0x00185ba5c3fa2044, 0x009281d688bcbe50, 0x00c40331df893881}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x00b89530796f0f60, 0x00ade92bd26909a3, 0x001a0c83fb4884da, 0x001765bf22a5a984}},
{{0x00772a9ee75db09e, 0x0023bc6c67cec16f, 0x004c1edba8b14e2f, 0x00e2a215d9611369}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x00571e509fb5efb3, 0x00ade88696410552, 0x00c8ae85fada74fe, 0x006c7e4be83bbde3}},
{{0x00ff9f51160f4652, 0x00b47ce2495a6539, 0x00a2946c53b582f4, 0x00286d2db3ee9a60}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x0040bbd5081a44af, 0x000995183b13926c, 0x00bcefba6f47f6d0, 0x00215619e9cc0057}},
{{0x008bc94d3b0df45e, 0x00f11c54a3694f6f, 0x008631b93cdfe8b5, 0x00e7e3f4b0982db9}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x00b17048ab3e1c7b, 0x00ac38f36ff8a1d8, 0x001c29819435d2c6, 0x00c813132f4c07e9}},
{{0x002891425503b11f, 0x0008781030579fea, 0x00f5426ba5cc9674, 0x001e28ebf18562bc}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x009f31997cc864eb, 0x0006cd91d28b5e4c, 0x00ff17036691a973, 0x00f1aef351497c58}},
{{0x00dd1f2d600564ff, 0x00dead073b1402db, 0x0074a684435bd693, 0x00eea7471f962558}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}
};
/*
* A pre-calculated table of the base point G, which contains the (X, Y, Z) coordinates of k*G
*
* PRE_MUL_G2[] = PRE_MUL_G[] * 2^28
* index Corresponding bit value of k
* 0 0 0 0 0 0 + 0 + 0 + 0
* 1 0 0 0 1 0 + 0 + 0 + 2^28
* 2 0 0 1 0 0 + 0 + 2^84 + 0
* 3 0 0 1 1 0 + 0 + 2^84 + 2^28
* 4 0 1 0 0 0 + 2^140 + 0 + 0
* 5 0 1 0 1 0 + 2^140 + 0 + 2^28
* 6 0 1 1 0 0 + 2^140 + 2^84 + 0
* 7 0 1 1 1 0 + 2^140 + 2^84 + 2^28
* 8 1 0 0 0 2^196 + 0 + 0 + 0
* 9 1 0 0 1 2^196 + 0 + 0 + 2^28
* 10 1 0 1 0 2^196 + 0 + 2^84 + 0
* 11 1 0 1 1 2^196 + 0 + 2^84 + 2^28
* 12 1 1 0 0 2^196 + 2^140 + 0 + 0
* 13 1 1 0 1 2^196 + 2^140 + 0 + 2^28
* 14 1 1 1 0 2^196 + 2^140 + 2^84 + 0
* 15 1 1 1 1 2^196 + 2^140 + 2^84 + 2^28
*/
static const Point PRE_MUL_G2[TABLE_G_SIZE] = {
{
{{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}},
{{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}},
{{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x009665266dddf554, 0x009613d78b60ef2d, 0x00ce27a34cdba417, 0x00d35ab74d6afc31}},
{{0x0085ccdd22deb15e, 0x002137e5783a6aab, 0x00a141cffd8c93c6, 0x00355a1830e90f2d}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x001a494eadaade65, 0x00d6da4da77fe53c, 0x00e7992996abec86, 0x0065c3553c6090e3}},
{{0x00fa610b1fb09346, 0x00f1c6540b8a4aaf, 0x00c51a13ccd3cbab, 0x0002995b1b18c28a}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x007874568e7295ef, 0x0086b419fbe38d04, 0x00dc0690a7550d9a, 0x00d3966a44beac33}},
{{0x002b7280ec29132f, 0x00beaa3b6a032df3, 0x00dc7dd88ae41200, 0x00d25e2513e3a100}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x00924857eb2efafd, 0x00ac2bce41223190, 0x008edaa1445553fc, 0x00825800fd3562d5}},
{{0x008d79148ea96621, 0x0023a01c3dd9ed8d, 0x00af8b219f9416b5, 0x00d8db0cc277daea}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x0076a9c3b1a700f0, 0x00e9acd29bc7e691, 0x0069212d1a6b0327, 0x006322e97fe154be}},
{{0x00469fc5465d62aa, 0x008d41ed18883b05, 0x001f8eae66c52b88, 0x00e4fcbe9325be51}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x00825fdf583cac16, 0x00020b857c7b023a, 0x00683c17744b0165, 0x0014ffd0a2daf2f1}},
{{0x00323b36184218f9, 0x004944ec4e3b47d4, 0x00c15b3080841acf, 0x000bced4b01a28bb}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x0092ac22230df5c4, 0x0052f33b4063eda8, 0x00cb3f19870c0c93, 0x0040064f2ba65233}},
{{0x00fe16f0924f8992, 0x00012da25af5b517, 0x001a57bb24f723a6, 0x0006f8bc76760def}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x004a7084f7817cb9, 0x00bcab0738ee9a78, 0x003ec11e11d9c326, 0x00dc0fe90e0f1aae}},
{{0x00cf639ea5f98390, 0x005c350aa22ffb74, 0x009afae98a4047b7, 0x00956ec2d617fc45}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x004306d648c1be6a, 0x009247cd8bc9a462, 0x00f5595e377d2f2e, 0x00bd1c3caff1a52e}},
{{0x00045e14472409d0, 0x0029f3e17078f773, 0x00745a602b2d4f7d, 0x00191837685cdfbb}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x005b6ee254a8cb79, 0x004953433f5e7026, 0x00e21faeb1d1def4, 0x00c4c225785c09de}},
{{0x00307ce7bba1e518, 0x0031b125b1036db8, 0x0047e91868839e8f, 0x00c765866e33b9f3}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x003bfece24f96906, 0x004794da641e5093, 0x00de5df64f95db26, 0x00297ecd89714b05}},
{{0x00701bd3ebb2c3aa, 0x007073b4f53cb1d5, 0x0013c5665658af16, 0x009895089d66fe58}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x000fef05f78c4790, 0x002d773633b05d2e, 0x0094229c3a951c94, 0x00bbbd70df4911bb}},
{{0x00b2c6963d2c1168, 0x00105f47a72b0d73, 0x009fdf6111614080, 0x007b7e94b39e67b0}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x00ad1a7d6efbe2b3, 0x00f012482c0da69d, 0x006b3bdf12438345, 0x0040d7558d7aa4d9}},
{{0x008a09fffb5c6d3d, 0x009a356e5d9ffd38, 0x005973f15f4f9b1c, 0x00dcd5f59f63c3ea}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x00acf39f4c5ca7ab, 0x004c8071cc5fd737, 0x00c64e3602cd1184, 0x000acd4644c9abba}},
{{0x006c011a36d8bf6e, 0x00fecd87ba24e32a, 0x0019f6f56574fad8, 0x00050b204ced9405}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x00ed4f1cae7d9a96, 0x005ceef7ad94c40a, 0x00778e4a3bf3ef9b, 0x007405783dc3b55e}},
{{0x0032477c61b6e8c6, 0x00b46a97570f018b, 0x0091176d0a7e95d1, 0x003df90fbc4c7d0e}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}
};
/* --------------------------helper function-------------------------- */
/*
* Convert big endian byte stream to Felem
*/
static void Bin2Felem(Felem *out, const uint8_t in[FELEM_BYTES])
{
int32_t offset;
for (int32_t i = LIMB_NUM - 1; i >= 0; --i) {
offset = 7 * (LIMB_NUM - 1 - i); // 56bits occupy 7 bytes.
out->data[i] = ((uint64_t)in[offset + 0] << 48) | // Byte 0 is shifted by 48 bits to the left.
((uint64_t)in[offset + 1] << 40) | // The 1st byte is shifted leftward by 40 bits.
((uint64_t)in[offset + 2] << 32) | // The 2nd byte is shifted leftward by 32 bits.
((uint64_t)in[offset + 3] << 24) | // The 3rd byte is shifted leftward by 24 bits.
((uint64_t)in[offset + 4] << 16) | // The 4th byte is shifted leftward by 16 bits.
((uint64_t)in[offset + 5] << 8) | // The 5th byte is shifted leftward by 8 bits.
((uint64_t)in[offset + 6]); // No shift is required for the 6th byte.
}
}
/*
* Convert Felem to big-endian byte stream
* Input:
* in[] < 2^56
* Output:
* the length of out is 28
*/
static void Felem2Bin(uint8_t out[FELEM_BYTES], const Felem *in)
{
int32_t offset;
for (int32_t i = LIMB_NUM - 1; i >= 0; --i) {
offset = 7 * (LIMB_NUM - 1 - i); // 56bits occupy 7 bytes.
out[offset + 0] = (uint8_t)(in->data[i] >> 48); // out[i + 0] get 48~55 bits
out[offset + 1] = (uint8_t)(in->data[i] >> 40); // out[i + 1] get 40~47 bits
out[offset + 2] = (uint8_t)(in->data[i] >> 32); // out[i + 2] get 32~39 bits
out[offset + 3] = (uint8_t)(in->data[i] >> 24); // out[i + 3] get 24~31 bits
out[offset + 4] = (uint8_t)(in->data[i] >> 16); // out[i + 4] get 16~23 bits
out[offset + 5] = (uint8_t)(in->data[i] >> 8); // out[i + 5] get 8~15 bits
out[offset + 6] = (uint8_t)in->data[i]; // out[i + 6] get 0~7 bits
}
}
/*
* Convert BN to Felem
* Output:
* out[] < 2^56
*/
static int32_t BN2Felem(Felem *out, const BN_BigNum *in)
{
int32_t retVal;
uint8_t bin[FELEM_BYTES];
uint32_t len = FELEM_BYTES;
GOTO_ERR_IF(BN_Bn2Bin(in, bin, &len), retVal);
for (uint32_t i = 0; i < FELEM_BYTES; ++i) {
bin[FELEM_BYTES - 1 - i] = i < len ? bin[len - 1 - i] : 0;
}
Bin2Felem(out, bin);
ERR:
return retVal;
}
/*
* Convert Felem to BN
* Input:
* in[] < 2^56
*/
static int32_t Felem2BN(BN_BigNum *out, const Felem *in)
{
int32_t retVal;
uint8_t bin[FELEM_BYTES];
Felem2Bin(bin, in);
GOTO_ERR_IF(BN_Bin2Bn(out, bin, FELEM_BYTES), retVal);
ERR:
return retVal;
}
/* ---------------------------field operation--------------------------- */
/*
* Assignment
*/
static inline void FelemAssign(Felem *out, const Felem *in)
{
out->data[0] = in->data[0]; // out->data[0] takes the value
out->data[1] = in->data[1]; // out->data[1] takes the value
out->data[2] = in->data[2]; // out->data[2] takes the value
out->data[3] = in->data[3]; // out->data[3] takes the value
}
/*
* Copy bits by mask. If the corresponding bit is 1, copy the bit. If the corresponding bit is 0, retain the bit.
*/
static inline void FelemAssignWithMask(Felem *out, const Felem *in, const uint64_t mask)
{
uint64_t rmask = ~mask;
out->data[0] = (in->data[0] & mask) | (out->data[0] & rmask); // out->data[0] get a new value or remain unchanged.
out->data[1] = (in->data[1] & mask) | (out->data[1] & rmask); // out->data[1] get a new value or remain unchanged.
out->data[2] = (in->data[2] & mask) | (out->data[2] & rmask); // out->data[2] get a new value or remain unchanged.
out->data[3] = (in->data[3] & mask) | (out->data[3] & rmask); // out->data[3] get a new value or remain unchanged.
}
/*
* Set the lowest digit
*/
static inline void FelemSetLimb(Felem *out, const uint64_t in)
{
out->data[0] = in; // out->data[0] takes the value
out->data[1] = 0; // out->data[1] clear to 0
out->data[2] = 0; // out->data[2] clear to 0
out->data[3] = 0; // out->data[3] clear to 0
}
/*
* Zero judgment: is input less than(2^224 + 2^(16 + 192)). Only 0 and p need to be judged.
* Input:
* in[] < 2^56 + 2^16
* - in[0] < 2^56
* - in[1] < 2^56
* - in[2] < 2^56
* - in[3] < 2^56 + 2^16
*/
static inline uint64_t FelemIsZero(const Felem *in)
{
uint64_t isZero, isP;
// Check whether digits 0, 1, 2, and 3 of in are all 0.
isZero = in->data[0] | in->data[1] | in->data[2] | in->data[3];
isZero -= 1; // If in == 0, the most significant bit is 1.
// Determine that in is equal to the field order.
isP = (in->data[0] ^ FIELD_ORDER.data[0]) | // Determines whether the digits 0 are equal.
(in->data[1] ^ FIELD_ORDER.data[1]) | // Determines whether the digits 1 are equal.
(in->data[2] ^ FIELD_ORDER.data[2]) | // Determines whether the digits 2 are equal.
(in->data[3] ^ FIELD_ORDER.data[3]); // Determines whether the digits 3 are equal.
isP -= 1; // If in == p, the most significant bit is 1
return (isZero | isP) >> (LIMB_BITS - 1);
}
/*
* Obtain the bit string whose length is len at idx in Felem.
* Input:
* in[i] < 2^56
* 0 < len <= 64
*/
static uint64_t FelemGetBits(const Felem *in, int32_t idx, uint32_t len)
{
uint64_t ret;
uint32_t lower, upper;
uint64_t mask;
lower = (uint32_t)idx;
// when 0 <= lower < 224, the most significant bit is 1. Obtain the most significant bit by right shifted by 31 bits
mask = (uint64_t)0 - ((~lower & (lower - 224)) >> 31);
ret = (in->data[(lower / BASE_BITS) & mask] & BASE_MASK & mask) >> (lower % BASE_BITS);
upper = (uint32_t)idx + BASE_BITS; // Next Unary Block
// when 0 <= upper < 224, the most significant bit is 1. Obtain the most significant bit by right shifted by 31 bits
mask = (uint64_t)0 - ((~upper & (upper - 224)) >> 31);
ret |= (in->data[(upper / BASE_BITS) & mask] & BASE_MASK & mask) << (BASE_BITS - upper % BASE_BITS);
ret &= ((uint64_t)1 << len) - 1; // All 1s of the len length
return ret;
}
/*
* field element reduction, retain the lower 56 bits of each Limb in the 4-ary Felem,
* perform reduction on the upper bits, and perform modulo operation to reduce all Limbs to [0, 2 ^ 56 + 2 ^ 7).
* Input:
* in[] < 2^63
* Output:
* out[] < 2^56 + 2^7
* - out[0] < 2^56
* - out[1] < 2^56
* - out[2] < 2^56
* - out[3] < 2^56 + 2^7
*/
static void FelemReduce(Felem *out, const Felem *in)
{
uint64_t carryLimb = in->data[3] >> BASE_BITS;
const uint64_t borrow = (uint64_t)1 << 56;
const uint64_t lend = 1;
// reduction carryLimb * (2^96 - 1), because it's the non-negative number, it must can be borrowed.
// Calculate out->data[0]
out->data[0] = in->data[0] + borrow - carryLimb; // carryLimb * (-1)
// Calculate out->data[1]
out->data[1] = in->data[1] + (out->data[0] >> BASE_BITS) + (carryLimb << 40) - lend; // carryLimb * 2^(56 + 40)
// Calculate out->data[2]
out->data[2] = in->data[2] + (out->data[1] >> BASE_BITS);
// Calculate out->data[3]
out->data[3] = (in->data[3] & BASE_MASK) + (out->data[2] >> BASE_BITS); // < 2^56 + 2^7
out->data[0] &= BASE_MASK; // out->data[0] Take the lower bits.
out->data[1] &= BASE_MASK; // out->data[1] Take the lower bits.
out->data[2] &= BASE_MASK; // out->data[2] Take the lower bits.
}
/*
* field element reduction, convert 7-ary LongFelem to 4-ary Felem,
* and modulo reduction to all Limbs to [0, 2 ^ 56 + 2 ^ 16)
* Input:
* in[] < 2^126
* Output:
* out[] < 2^56 + 2^16
* - out[0] < 2^56
* - out[1] < 2^56
* - out[2] < 2^56
* - out[3] < 2^56 + 2^16
*/
static void LongFelemReduce(Felem *out, const LongFelem *in)
{
const uint128_t *pi = in->data;
// p shifts left by 15
static const LongFelem zeroBase = {
{
(((uint128_t)1 << 112) - ((uint128_t)1 << 96) + 1) << 15, // 2^127 - 2^111 + 2^15
(((uint128_t)1 << 112) - ((uint128_t)1 << 56)) << 15, // 2^127 - 2^71
(((uint128_t)1 << 112) - ((uint128_t)1 << 56)) << 15, // 2^127 - 2^71
0,
0,
0,
0,
}
};
uint128_t lout[4] = {
zeroBase.data[0] + pi[0], // < 2^127 + 2^126 - 2^111 + 2^15
zeroBase.data[1] + pi[1], // < 2^127 + 2^126 - 2^71
zeroBase.data[2] + pi[2], // < 2^127 + 2^126 - 2^71
pi[3] // < 2^126
};
uint128_t carryLimb = pi[4]; // < 2^126
// n = n / a * (a - b) ≡ n / a * b (mod (a - b))
// It can be obtained from the above formula:
// 2^n = 2^(n - 128) - 2^(n - 224) (mod (2^224 - 2^96 + 1))
//
// The following equation can be listed:
// 2^224 mod p
// = 2^96 - 1
//
// 2^280 mod p
// = 2^152 - 2^56
//
// 2^336 mod p
// = 2^208 - 2^112
// reduce pi[6] and obtain the part higher 16 bits.
carryLimb += pi[6] >> 16;
// lout[3], reduce pi[6], shift leftwards by 40 bits then truncate; reduce pi[5] and obtain the part higher 16 bits.
lout[3] += ((pi[6] << 40) & BASE_MASK) + (pi[5] >> 16);
// lout[2], reduce pi[5], leftshift by 40bit then truncate; reduce carryLimb, obtain the higher 16bits. reduce pi[6]
lout[2] += ((pi[5] << 40) & BASE_MASK) + (carryLimb >> 16) - pi[6];
// lout[1], reduce carryLimb, shift leftwards by 40 bits then truncate; reduce pi[5]
lout[1] += ((carryLimb << 40) & BASE_MASK) - pi[5];
// lout[0], reduce carryLimb
lout[0] -= carryLimb;
// Range after reduction:
// carryLimb < 2^126 + 2^110
// lout[3] < 2^126 + 2^56 + 2^110 < 2^127
// lout[2] < (2^127 + 2^126 - 2^71) + 2^56 + (2^110 + 2^94) < 2^128
// lout[1] < (2^127 + 2^126 - 2^71) + 2^56
// lout[0] < 2^127 + 2^126 - 2^111 + 2^15 < 2^128
// carry
lout[3] += lout[2] >> BASE_BITS; // lout[3] < 2^127 + 2^72 < 2^128
carryLimb = lout[3] >> BASE_BITS; // carryLimb < 2^72
lout[2] &= BASE_MASK; // lout[2] < 2^56
lout[3] &= BASE_MASK; // lout[3] < 2^56
// reduce carryLimb
// lout[2],reduce carryLimb and obtain the part higher 16 bits.
lout[2] += carryLimb >> 16;
// lout[1],reduce carryLimb, shift leftwards by 40 bits then truncate;
lout[1] += (carryLimb << 40) & BASE_MASK;
// lout[0],reduce carryLimb
lout[0] -= carryLimb;
// Range after reduction:
// lout[2] < 2^56 + 2^56
// lout[1] < (2^127 + 2^126 - 2^71 + 2^56) + 2^56
// lout[0] < 2^128
// carry
lout[1] += lout[0] >> BASE_BITS; // lout[1] < (2^127 + 2^126 - 2^71 + 2^57 - 2^41) + 2^72
lout[2] += lout[1] >> BASE_BITS; // lout[2] < 2^57 + (2^71 + 2^70 + 2^16 - 2^15 + 1) < 2^72
out->data[0] = (uint64_t)lout[0] & BASE_MASK; // out->data[0] < 2^56
out->data[1] = (uint64_t)lout[1] & BASE_MASK; // out->data[1] < 2^56
out->data[2] = (uint64_t)lout[2] & BASE_MASK; // out->data[2] < 2^56
out->data[3] = (uint64_t)lout[3] + (uint64_t)(lout[2] >> BASE_BITS); // out->data[3] < 2^56 + 2^16
}
/*
* field element modulo in [0, p), call FelemReduce or LongFelemReduce in advance.
* Input:
* in[] < 2^56 + 2^16
* - in[0] < 2^56
* - in[1] < 2^56
* - in[2] < 2^56
* - in[3] < 2^56 + 2^16
* Output:
* out < p, out[i] < 2^56
*/
static void FelemContract(Felem *out, const Felem *in)
{
Felem tmp = {{in->data[0], in->data[1], in->data[2], in->data[3] & BASE_MASK}}; // tmp[] < 2^56
uint64_t carryLimb = in->data[3] >> BASE_BITS; // 0 or 1, because of in[3] < 2^56 + 2^16
uint64_t mask; // Check the mask greater than or equal to p.
const uint64_t lower40Mask = 0x000000ffffffffff; // Lower 40-bit mask
const uint64_t borrow = (uint64_t)1 << BASE_BITS;
const uint64_t lend = 1;
// Check whether tmp is greater than or equal to p. The upper 128 bits of p are all 1s and the lower 96 bits are 1.
// If the upper 128 bits (digit 3, 2, and 1) are all 1s, the value is 1. Otherwise, the value is 0.
mask = ((tmp.data[3] & tmp.data[2] & (tmp.data[1] | lower40Mask)) + 1) >> BASE_BITS;
// If the lower 96 bits are not zero, the value is 1. Otherwise, the value is 0.
mask &= (0 - ((tmp.data[1] & lower40Mask) | tmp.data[0])) >> (LIMB_BITS - 1);
mask = 0 - mask; // If tmp is greater than or equal to p, the value is 1. Otherwise, the value is 0.
// reduce carryLimb or subtract p. Note that carryLimb and mask cannot be true at the same time.
// p_0 = 0x0000000000000001
tmp.data[0] = (tmp.data[0] ^ borrow) - carryLimb - (mask & FIELD_ORDER.data[0]);
// p_1 = 0x00ffff0000000000
tmp.data[1] += carryLimb << 40; // reduction carryLimb * 2^(56 + 40)
// If the value is less than p, remains unchanged. If it's greater than or equal to p, subtract 0x00ffff0000000000.
// That is, the lower 40 bits remain unchanged, and other bits are set to 0.
tmp.data[1] &= ~mask | lower40Mask;
// Lend to the low bit: if reduce it, then 2^96 - 1 > 0, if minus p, then tmp[1] + tmp[0] > p_1 + p_2
tmp.data[1] -= lend;
// If the value is less than p, remains unchanged. If it's greater than or equal to p, subtract 0x00ffffffffffffff.
// That is, set to 0.
tmp.data[2] &= ~mask; // p_2 = 0x00ffffffffffffff
// If the value is less than p, remains unchanged. If it's greater than or equal to p, subtract 0x00ffffffffffffff.
// That is, set to 0.
tmp.data[3] &= ~mask; // p_3 = 0x00ffffffffffffff
// carry 0 -> 1 -> 2 -> 3
out->data[0] = tmp.data[0] & BASE_MASK; // tmp.data[0] get the lower bits.
out->data[1] = (tmp.data[1] += tmp.data[0] >> BASE_BITS) & BASE_MASK; // tmp.data[1] plus carry & get the lower bits
out->data[2] = (tmp.data[2] += tmp.data[1] >> BASE_BITS) & BASE_MASK; // tmp.data[2] plus carry & get the lower bits
out->data[3] = (tmp.data[3] += tmp.data[2] >> BASE_BITS) & BASE_MASK; // tmp.data[3] plus carry & get the lower bits
}
/*
* field Addition
*/
static inline void FelemAdd(Felem *out, const Felem *a, const Felem *b)
{
out->data[0] = a->data[0] + b->data[0]; // out->data[0] takes the value
out->data[1] = a->data[1] + b->data[1]; // out->data[1] takes the value
out->data[2] = a->data[2] + b->data[2]; // out->data[2] takes the value
out->data[3] = a->data[3] + b->data[3]; // out->data[3] takes the value
}
/*
* field element negation(NOT)
* Input:
* in[] <= 2^57 - 2^41 - 2^1
* Output:
* out[] <= 2^57 + 2^1 + in[] < 2^64
*/
static inline void FelemNeg(Felem *out, const Felem *in)
{
static const Felem zeroBase = {{
(((uint64_t)1 << 56) + 1) << 1,
(((uint64_t)1 << 56) - ((uint64_t)1 << 40) - 1) << 1,
(((uint64_t)1 << 56) - 1) << 1,
(((uint64_t)1 << 56) - 1) << 1,
}};
out->data[0] = zeroBase.data[0] - in->data[0]; // out->data[0] takes the value
out->data[1] = zeroBase.data[1] - in->data[1]; // out->data[1] takes the value
out->data[2] = zeroBase.data[2] - in->data[2]; // out->data[2] takes the value
out->data[3] = zeroBase.data[3] - in->data[3]; // out->data[3] takes the value
}
/*
* field subtraction
* Input:
* a[] < 2^64 - 2^60 - 2^4,b[] <= 2^60 - 2^44 - 2^4
* Output:
* out[] <= 2^60 + 2^4 + a[] < 2^64
*/
static inline void FelemSub(Felem *out, const Felem *a, const Felem *b)
{
static const Felem zeroBase = {{
(((uint64_t)1 << 56) + 1) << 4,
(((uint64_t)1 << 56) - ((uint64_t)1 << 40) - 1) << 4,
(((uint64_t)1 << 56) - 1) << 4,
(((uint64_t)1 << 56) - 1) << 4,
}};
out->data[0] = zeroBase.data[0] + a->data[0] - b->data[0]; // out->data[0] takes the value
out->data[1] = zeroBase.data[1] + a->data[1] - b->data[1]; // out->data[1] takes the value
out->data[2] = zeroBase.data[2] + a->data[2] - b->data[2]; // out->data[2] takes the value
out->data[3] = zeroBase.data[3] + a->data[3] - b->data[3]; // out->data[3] takes the value
}
/*
* field subtraction, input LongFelem directly.
* Input:
* a[] < 2^128 - 2^124,b[] <= 2^124 - 2^68 - 2^52
* Output:
* out[] <= 2^124 + a[] < 2^128
*/
static void LongFelemSub(LongFelem *out, const LongFelem *a, const LongFelem *b)
{
// p shift left (8 + 56 * 3)
static const LongFelem zeroBase = {{
((uint128_t)1 << 112) << 12,
(((uint128_t)1 << 112) - ((uint128_t)1 << 56)) << 12,
(((uint128_t)1 << 112) - ((uint128_t)1 << 56)) << 12,
(((uint128_t)1 << 112) - ((uint128_t)1 << 56)) << 12,
(((uint128_t)1 << 112) - ((uint128_t)1 << 56) + 1) << 12, // 1
(((uint128_t)1 << 112) - ((uint128_t)1 << 56) - ((uint128_t)1 << 40)) << 12, // -2^96
(((uint128_t)1 << 112) - ((uint128_t)1 << 56)) << 12, // 2^224
}};
out->data[0] = zeroBase.data[0] + a->data[0] - b->data[0]; // out->data[0] takes the value
out->data[1] = zeroBase.data[1] + a->data[1] - b->data[1]; // out->data[1] takes the value
out->data[2] = zeroBase.data[2] + a->data[2] - b->data[2]; // out->data[2] takes the value
out->data[3] = zeroBase.data[3] + a->data[3] - b->data[3]; // out->data[3] takes the value
out->data[4] = zeroBase.data[4] + a->data[4] - b->data[4]; // out->data[4] takes the value
out->data[5] = zeroBase.data[5] + a->data[5] - b->data[5]; // out->data[5] takes the value
out->data[6] = zeroBase.data[6] + a->data[6] - b->data[6]; // out->data[6] takes the value
}
/*
* field element magnification
* Use only a small magnification factor to ensure that in[]*scalar does not overflow.
*/
static inline void FelemScale(Felem *out, const Felem *in, const uint32_t scalar)
{
out->data[0] = in->data[0] * scalar; // out->data[0] takes the value
out->data[1] = in->data[1] * scalar; // out->data[1] takes the value
out->data[2] = in->data[2] * scalar; // out->data[2] takes the value
out->data[3] = in->data[3] * scalar; // out->data[3] takes the value
}
/*
* field element magnification, input LongFelem directly.
* Use only a small magnification factor to ensure that in[]*scalar does not overflow.
*/
static inline void LongFelemScale(LongFelem *out, const LongFelem *in, const uint32_t scalar)
{
out->data[0] = in->data[0] * scalar; // out->data[0] takes the value
out->data[1] = in->data[1] * scalar; // out->data[1] takes the value
out->data[2] = in->data[2] * scalar; // out->data[2] takes the value
out->data[3] = in->data[3] * scalar; // out->data[3] takes the value
out->data[4] = in->data[4] * scalar; // out->data[4] takes the value
out->data[5] = in->data[5] * scalar; // out->data[5] takes the value
out->data[6] = in->data[6] * scalar; // out->data[6] takes the value
}
/*
* field Multiplication
* Input:
* a[] < 2^62, b[] < 2^62
* output:
* out[] < a[] * b[] * 4 < 2^126
* - out[0] < 2^124
* - out[1] < 2^124 * 2
* - out[2] < 2^124 * 3
* - out[3] < 2^124 * 4
* - out[4] < 2^124 * 3
* - out[5] < 2^124 * 2
* - out[6] < 2^124
*/
static void FelemMul(LongFelem *out, const Felem *a, const Felem *b)
{
// out[0] = a[0]*b[0]
// out[1] = a[0]*b[1] + a[1]*b[0]
// out[2] = a[0]*b[2] + a[1]*b[1] + a[2]*b[0]
// out[3] = a[0]*b[3] + a[1]*b[2] + a[2]*b[1] + a[3]*b[0]
// out[4] = a[1]*b[3] + a[2]*b[2] + a[3]*b[1]
// out[5] = a[2]*b[3] + a[3]*b[2]
// out[6] = a[3]*b[3]
uint128_t *po = out->data;
const uint64_t *pa = a->data;
const uint64_t *pb = b->data;
po[0] = (uint128_t)pa[0] * pb[0];
po[1] = (uint128_t)pa[0] * pb[1] + (uint128_t)pa[1] * pb[0];
po[2] = (uint128_t)pa[0] * pb[2] + (uint128_t)pa[1] * pb[1] + (uint128_t)pa[2] * pb[0];
po[3] = (uint128_t)pa[0] * pb[3] + (uint128_t)pa[1] * pb[2] + (uint128_t)pa[2] * pb[1] + (uint128_t)pa[3] * pb[0];
po[4] = (uint128_t)pa[1] * pb[3] + (uint128_t)pa[2] * pb[2] + (uint128_t)pa[3] * pb[1];
po[5] = (uint128_t)pa[2] * pb[3] + (uint128_t)pa[3] * pb[2];
po[6] = (uint128_t)pa[3] * pb[3];
}
/*
* field Square
* Input:
* a[] < 2^62
* output:
* out[] < a[] * a[] * 4 < 2^126
* - out[0] < 2^124
* - out[1] < 2^124 * 2
* - out[2] < 2^124 * 3
* - out[3] < 2^124 * 4
* - out[4] < 2^124 * 3
* - out[5] < 2^124 * 2
* - out[6] < 2^124
*/
static void FelemSqr(LongFelem *out, const Felem *a)
{
// out[0] = a[0]*a[0]
// out[1] = a[0]*a[1]*2
// out[2] = a[0]*a[2]*2 + a[1]*a[1]
// out[3] = a[0]*a[3]*2 + a[1]*a[2]*2
// out[4] = a[1]*a[3]*2 + a[2]*a[2]
// out[5] = a[2]*a[3]*2
// out[6] = a[3]*a[3]
const uint64_t *pa = a->data;
uint64_t a1x2 = pa[1] << 1;
uint64_t a2x2 = pa[2] << 1;
out->data[0] = (uint128_t)pa[0] * pa[0];
out->data[1] = (uint128_t)pa[0] * a1x2;
out->data[2] = (uint128_t)pa[0] * a2x2 + (uint128_t)pa[1] * pa[1];
out->data[3] = ((uint128_t)pa[0] * pa[3] + (uint128_t)pa[1] * pa[2]) << 1;
out->data[4] = (uint128_t)pa[3] * a1x2 + (uint128_t)pa[2] * pa[2];
out->data[5] = (uint128_t)pa[3] * a2x2;
out->data[6] = (uint128_t)pa[3] * pa[3];
}
static inline void FelemMulReduce(Felem *out, const Felem *a, const Felem *b)
{
LongFelem ltmp;
FelemMul(<mp, a, b);
LongFelemReduce(out, <mp);
}
static inline void FelemSqrReduce(Felem *out, const Felem *in)
{
LongFelem ltmp;
FelemSqr(<mp, in);
LongFelemReduce(out, <mp);
}
/*
* field element inversion
* From Fermat's little theorem, in^(p - 2) = in^(-1) (mod p)
* in^(-1) = in^(2^224 - 2^96 + 1 - 2) (mod p)
* Input:
* in[i] < 2^63
* Output:
* reduce(out[i])
*/
static void FelemInv(Felem *out, const Felem *in)
{
Felem inE1, inE6, inE24, inE96; // inEx indicates in^(2^(0)+2^(1)+'''+2^(x-1))
uint32_t i;
// Construct inE1
FelemReduce(out, in);
FelemAssign(&inE1, out);
// Construct inE2
FelemSqrReduce(out, out);
FelemMulReduce(out, out, &inE1);
// Construct inE4, and store it in inE6
FelemAssign(&inE6, out);
FelemSqrReduce(&inE6, &inE6);
FelemSqrReduce(&inE6, &inE6);
FelemMulReduce(&inE6, out, &inE6); // inE6 is temporarily stored in inE4
// Construct in^6
FelemSqrReduce(&inE6, &inE6);
FelemSqrReduce(&inE6, &inE6);
FelemMulReduce(&inE6, out, &inE6);
// Construct inE12
FelemAssign(out, &inE6);
for (i = 0; i < 6; ++i) { // Moves the out by 6 digits to the left.
FelemSqrReduce(out, out);
}
FelemMulReduce(out, &inE6, out);
// Construct inE24
FelemAssign(&inE96, out);
for (i = 0; i < 12; ++i) { // Moves the out by 12 digits to the left.
FelemSqrReduce(out, out);
}
FelemMulReduce(&inE24, &inE96, out);
// Construct inE48
FelemAssign(out, &inE24);
for (i = 0; i < 24; ++i) { // Moves the out by 24 digits to the left.
FelemSqrReduce(out, out);
}
FelemMulReduce(out, &inE24, out);
// Construct inE96
FelemAssign(&inE96, out);
for (i = 0; i < 48; ++i) { // Moves the out by 48 digits to the left.
FelemSqrReduce(out, out);
}
FelemMulReduce(&inE96, &inE96, out);
// Construct inE7, and store it in inE6
FelemSqrReduce(&inE6, &inE6);
FelemMulReduce(&inE6, &inE6, &inE1);
// Construct inE31, and store it in inE24
for (i = 0; i < 7; ++i) { // Moves the inE24 by 7 digits to the left.
FelemSqrReduce(&inE24, &inE24);
}
FelemMulReduce(&inE24, &inE6, &inE24);
// Construct inE127, and store it in inE24
FelemAssign(out, &inE96);
for (i = 0; i < 31; ++i) { // Moves the out by 31 digits to the left.
FelemSqrReduce(out, out);
}
FelemMulReduce(&inE24, &inE24, out);
// Move inE127 by 97 bits to the left and add inE97 to obtain inE(2^224 - 2^96 + 1 - 2)
for (i = 0; i < 97; ++i) { // shifts inE24 to the left by 97 bits, and inE24 stores inE127.
FelemSqrReduce(&inE24, &inE24);
}
FelemMulReduce(out, &inE96, &inE24);
}
/* --------------------------Point group operation-------------------------- */
static inline void PtAssign(Point *out, const Point *in)
{
FelemAssign(&out->x, &in->x);
FelemAssign(&out->y, &in->y);
FelemAssign(&out->z, &in->z);
}
static inline void PtAssignWithMask(Point *out, const Point *in, const uint64_t mask)
{
FelemAssignWithMask(&out->x, &in->x, mask);
FelemAssignWithMask(&out->y, &in->y, mask);
FelemAssignWithMask(&out->z, &in->z, mask);
}
/*
* double the point
* Algorithm reference: http://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#doubling-dbl-2001-b
* Number of field operations: 3M + 5S
* delta = Z^2
* gamma = Y^2
* beta = X * gamma
* alpha = 3 * (X - delta) * (X + delta)
* X' = alpha^2 - 8 * beta
* Z' = (Y + Z)^2 - gamma - delta
* Y' = alpha * (4 * beta - X') - 8 * gamma^2
* Input:
* in->x[] < 2^59, in->y[] < 2^61, in->z[] < 2^61
* Output:
* reduce(out->x), reduce(out->y), out->z[] < 2^61
*/
static void PtDouble(Point *out, const Point *in)
{
Felem delta, gamma, beta, alpha;
Felem tmp, tmp2;
LongFelem ltmp, ltmp2;
// delta = Z^2
FelemSqrReduce(&delta, &in->z);
// gamma = Y^2
FelemSqrReduce(&gamma, &in->y);
// beta = X * gamma
FelemMulReduce(&beta, &in->x, &gamma);
// alpha = 3 * (X - delta) * (X + delta)
FelemAdd(&tmp, &in->x, &delta); // tmp[] < 2^59 + 2^57 < 2^60
FelemScale(&tmp, &tmp, 3); // tmp[] < 2^60 * 3 < 2^62
FelemSub(&tmp2, &in->x, &delta); // tmp2[] < 2^60 + 2^4 + 2^59 < 2^61
FelemMulReduce(&alpha, &tmp, &tmp2);
// X' = alpha^2 - 8 * beta
FelemSqrReduce(&tmp, &alpha); // alpha^2, tmp[] < 2^56 + 2^16
FelemScale(&tmp2, &beta, 8); // tmp2[] < (2^56 + 2^16) * 8 = 2^59 + 2^19
FelemSub(&out->x, &tmp, &tmp2); // xout[] < 2^60 + 2^4 + 2^56 + 2^16 < 2^61
FelemReduce(&out->x, &out->x); // xout[] < 2^56 + 2^7
// Z' = (Y + Z)^2 - gamma - delta
FelemAdd(&tmp, &in->y, &in->z); // < 2^61 + 2^61 = 2^62
FelemSqrReduce(&tmp, &tmp); // (Y + Z)^2, tmp[] < 2^56 + 2^16
FelemAdd(&tmp2, &gamma, &delta); // (gamma + delta), tmp2[] < (2^56 + 2^16) * 2 = 2^57 + 2^17
FelemSub(&out->z, &tmp, &tmp2); // zout[] < 2^60 + 2^4 + 2^56 + 2^16 < 2^61
// Y' = alpha * (4 * beta - X') - 8 * gamma^2
FelemScale(&tmp, &beta, 4); // tmp[] < (2^56 + 2^16) * 4 = 2^58 + 2^18
FelemSub(&tmp, &tmp, &out->x); // tmp[] < 2^60 + 2^4 + 2^58 + 2^18 < 2^61
FelemMul(<mp, &alpha, &tmp); // alpha * (4 * beta - X'), ltmp[] < 2^(61 * 2) * 4 = 2^124
FelemSqr(<mp2, &gamma); // gamma < 2^57, ltmp2[] < 2^(57 * 2) * 4 = 2^116
LongFelemScale(<mp2, <mp2, 8); // 8 * gamma^2, ltmp2[] < 2^116 * 8 = 2^119
LongFelemSub(<mp, <mp, <mp2); // ltmp[] < 2^124 + 2^124 < 2^125
LongFelemReduce(&out->y, <mp); // yout[] < 2^56 + 2^16
}
/*
* point addition
* Algorithm reference: http://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-2007-bl
* Infinity point calculation is not supported.
* Number of field operations: 11M + 5S
* Z1Z1 = Z1^2
* Z2Z2 = Z2^2
* U1 = X1 * Z2Z2
* U2 = X2 * Z1Z1
* S1 = Y1 * Z2 * Z2Z2
* S2 = Y2 * Z1 * Z1Z1
* H = U2 - U1
* I = (2 * H)^2
* J = H * I
* r = 2 * (S2 - S1)
* V = U1 * I
* X3 = r^2 - J - 2 * V
* Y3 = r * (V - X3) - 2 * S1 * J
* Z3 = ((Z1 + Z2)^2 - Z1Z1 - Z2Z2) * H
* Input:
* a->x[] < 2^64, a->y[] < 2^64, a->z[] < 2^61
* reduce(b->x), b->y[] < 2^58, reduce(b->z)
* Output:
* out->x[] < max(reduce(out->x), a->x[])
* out->y[] < max(reduce(out->y), a->y[], b->y[])
* out->z[] < max(reduce(out->z), a->z[])
*/
static void PtAdd(Point *out, const Point *a, const Point *b)
{
Point result;
Felem z1sqr, z2sqr, u1, u2, s1, s2, h, i, j, r, v;
Felem tmp;
LongFelem ltmp, ltmp2;
uint64_t isZ1Zero, isZ2Zero;
// Z1Z1 = Z1^2
FelemSqrReduce(&z1sqr, &a->z);
// Z2Z2 = Z2^2
FelemSqrReduce(&z2sqr, &b->z);
isZ1Zero = 0 - FelemIsZero(&z1sqr);
isZ2Zero = 0 - FelemIsZero(&z2sqr);
// U1 = X1 * Z2Z2
FelemMulReduce(&u1, &a->x, &z2sqr);
// U2 = X2 * Z1Z1
FelemMulReduce(&u2, &b->x, &z1sqr);
// S1 = Y1 * Z2 * Z2Z2
FelemMulReduce(&s1, &b->z, &z2sqr); // Z2 * Z2Z2
FelemMulReduce(&s1, &a->y, &s1);
// S2 = Y2 * Z1 * Z1Z1
FelemMulReduce(&s2, &a->z, &z1sqr); // Z1 * Z1Z1
FelemMulReduce(&s2, &b->y, &s2);
// H = U2 - U1
FelemSub(&h, &u2, &u1);
FelemReduce(&h, &h);
// r = 2 * (S2 - S1)
FelemSub(&r, &s2, &s1);
FelemScale(&r, &r, 2); // 2 * (S2 - S1)
FelemReduce(&r, &r);
// H and r can determine whether x and y of the affine coordinates of two points are equal.
// If the values are equal, double the values.
if (isZ1Zero == 0 && isZ2Zero == 0 && FelemIsZero(&h) != 0 && FelemIsZero(&r) != 0) {
// Use the smaller b point
PtDouble(out, b);
return;
}
// I = (2 * H)^2
FelemScale(&tmp, &h, 2);
FelemSqrReduce(&i, &tmp);
// J = H * I
FelemMulReduce(&j, &h, &i);
// V = U1 * I
FelemMulReduce(&v, &u1, &i);
// X3 = r^2 - (J + 2 * V)
FelemSqrReduce(&result.x, &r); // r^2
FelemScale(&tmp, &v, 2); // tmp[] < (2^56 + 2^16) * 2 = 2^57 + 2^17
FelemAdd(&tmp, &tmp, &j); // J + 2 * V, tmp[] < (2^57 + 2^17) + (2^56 + 2^16) < 2^58
FelemSub(&result.x, &result.x, &tmp); // result.x[] < (2^60 + 2^4) + (2^56 + 2^16) < 2^61
FelemReduce(&result.x, &result.x); // result.x[] < 2^56 + 2^7
// Y3 = r * (V - X3) - 2 * S1 * J
FelemSub(&tmp, &v, &result.x); // tmp < (2^60 + 2^4) + (2^56 + 2^16) < 2^61
FelemMul(<mp, &r, &tmp); // r * (V - X3), ltmp[] < 2^57 * 2^61 * 4 = 2^120
FelemMul(<mp2, &s1, &j); // ltmp2[] < 2^57 * 2^57 * 4 = 2^116
LongFelemScale(<mp2, <mp2, 2); // 2 * S1 * J, ltmp2[] < 2^117
LongFelemSub(<mp, <mp, <mp2); // ltmp[] < 2^124 + 2^120 < 2^125
LongFelemReduce(&result.y, <mp); // result.y[] < 2^56 + 2^16
// Z3 = ((Z1 + Z2)^2 - Z1Z1 - Z2Z2) * H
FelemAdd(&result.z, &a->z, &b->z); // Z1 + Z2, result.z[] < 2^61 + 2^57 < 2^62
FelemSqrReduce(&result.z, &result.z); // (Z1 + Z2)^2
FelemAdd(&tmp, &z1sqr, &z2sqr); // Z1Z1 + Z2Z2
FelemSub(&result.z, &result.z, &tmp); // ((Z1 + Z2)^2 - Z1Z1 - Z2Z2)
FelemMulReduce(&result.z, &result.z, &h); // result.z[] < 2^56 + 2^16
// Special case processing for infinity points
PtAssignWithMask(&result, a, isZ2Zero);
PtAssignWithMask(&result, b, isZ1Zero);
PtAssign(out, &result);
}
/*
* mixed addition of point
* Algorithm reference: http://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2007-bl
* Infinity point calculation is not supported.
* Number of field operations: 7M + 4S
* Z1Z1 = Z1^2
* U2 = X2 * Z1Z1
* S2 = Y2 * Z1 * Z1Z1
* H = U2 - X1
* HH = H^2
* I = 4 * HH
* J = H * I
* r = 2 * (S2 - Y1)
* V = X1 * I
* X3 = r^2 - J - 2 * V
* Y3 = r * (V - X3) - 2 * Y1 * J
* Z3 = (Z1 + H)^2 - Z1Z1 - HH
* Input:
* a->x[] <= 2^60 - 2^44 - 2^4, a->y[] <= 2^60 - 2^44 - 2^4, a->z[] < 2^61
* b->x < p, b->y < p, b->z = 0 or 1
* Output:
* out->x[] < max(reduce(out->x), a->x[])
* out->y[] < max(reduce(out->y), a->y[])
* out->z[] < 2^61
*/
static void PtAddMixed(Point *out, const Point *a, const Point *b)
{
Point result;
Felem z1sqr, u2, s2, h, hsqr, i, j, r, v;
Felem tmp;
LongFelem ltmp, ltmp2;
uint64_t isZ1Zero, isZ2Zero;
// Z1Z1 = Z1^2
FelemSqrReduce(&z1sqr, &a->z);
isZ1Zero = 0 - FelemIsZero(&z1sqr);
// The Z coordinate of point b can only be 0 or 1, that is, the bit 0 can only be 0 or 1, and the other bits are 0.
isZ2Zero = b->z.data[0] - 1;
// U2 = X2 * Z1Z1
FelemMulReduce(&u2, &b->x, &z1sqr);
// S2 = Y2 * Z1 * Z1Z1
FelemMulReduce(&s2, &a->z, &z1sqr); // Z1 * Z1Z1
FelemMulReduce(&s2, &b->y, &s2);
// H = U2 - X1
FelemSub(&h, &u2, &a->x);
FelemReduce(&h, &h);
// r = 2 * (S2 - Y1)
FelemSub(&r, &s2, &a->y); // r[] < (2^60 + 2^4) + (2^56 + 2^16) < 2^61
FelemScale(&r, &r, 2); // r[] < 2^62
FelemReduce(&r, &r);
// H and r can determine whether x and y of the affine coordinates of two points are equal.
// If they are equal, double the point.
if (isZ1Zero == 0 && isZ2Zero == 0 && FelemIsZero(&h) != 0 && FelemIsZero(&r) != 0) {
// Use the smaller b point
PtDouble(out, b);
return;
}
// HH = H^2
FelemSqrReduce(&hsqr, &h);
// I = 4 * HH
FelemScale(&i, &hsqr, 4); // i[] < (2^56 + 2^16) * 4 = 2^58 + 2^18
// J = H * I
FelemMulReduce(&j, &h, &i);
// V = X1 * I
FelemMulReduce(&v, &a->x, &i);
// X3 = r^2 - J - 2 * V
FelemSqrReduce(&result.x, &r); // r^2
FelemScale(&tmp, &v, 2); // 2 * V, tmp[] < (2^56 + 2^16) * 2 = 2^57 + 2^17
FelemAdd(&tmp, &j, &tmp); // J + 2 * V, tmp[] < (2^56 + 2^16) + (2^57 + 2^17) < 2^58
FelemSub(&result.x, &result.x, &tmp); // result.x[] < (2^60 + 2^4) + (2^56 + 2^16) < 2^61
FelemReduce(&result.x, &result.x); // result.x[] < 2^56 + 2^7
// Y3 = r * (V - X3) - 2 * Y1 * J
FelemSub(&tmp, &v, &result.x); // V - X3, tmp[] < (2^60 + 2^4) + (2^56 + 2^16) < 2^61
FelemMul(<mp, &r, &tmp); // r * (V - X3), ltmp[] < 2^57 * 2^61 * 4 = 2^120
FelemMul(<mp2, &a->y, &j); // Y1 * J, ltmp2[] < 2^61 * 2^57 * 4 = 2^120
LongFelemScale(<mp2, <mp2, 2); // 2 * Y1 * J, ltmp2[] < 2^120 * 2 = 2^121
LongFelemSub(<mp, <mp, <mp2); // ltmp[] < 2^124 + 2^120 < 2^125
LongFelemReduce(&result.y, <mp); // result.y[] < 2^56 + 2^16
// Z3 = (Z1 + H)^2 - Z1Z1 - HH
FelemAdd(&result.z, &a->z, &h); // Z1 + H, result.z[] < 2^61 + (2^56 + 2^7) = 2^62
FelemSqrReduce(&result.z, &result.z);
FelemAdd(&tmp, &z1sqr, &hsqr); // Z1Z1 + HH, tmp[] < (2^56 + 2^16) + (2^56 + 2^16) < 2^58
FelemSub(&result.z, &result.z, &tmp); // result.z[] < (2^60 + 2^4) + 2^58 < 2^61
// Special case processing for infinity points
PtAssignWithMask(&result, a, isZ2Zero);
PtAssignWithMask(&result, b, isZ1Zero);
PtAssign(out, &result);
}
/* Select the point that subscript is index in the table and place it in the Point *point.
The anti-side channel processing exists. */
static inline void GetPointFromTable(Point *point, const Point table[], uint32_t pointNum, const uint32_t index)
{
uint64_t mask;
for (uint32_t i = 0; i < pointNum; i++) {
/* If i is equal to index, the last mask is all Fs. Otherwise, the last mask is all 0s. */
mask = (0 - (i ^ index)) >> 31; // shifted rightwards by 31 bits to get the most significant bit
mask--;
/* Conditional value assignment, valid only when i == index */
PtAssignWithMask(point, &table[i], mask);
}
}
/*
* Input:
* k1 < n
* 0 <= i < 28
* Output:
* out->x < p, out->y < p, out->z = 0 OR 1
*/
static inline void GetUpperPrecomputePtOfG(Point *out, const Felem *k1, int32_t curBit)
{
uint32_t bits;
uint32_t i = (uint32_t)curBit;
// The i bit of the upper half of digit 0. (BASE_BITS/2) is half-wide.
bits = (uint32_t)(k1->data[0] >> (i + BASE_BITS / 2)) & 1;
// The i bit of the upper half of digit 1. (BASE_BITS/2) is half-wide.
bits |= ((uint32_t)(k1->data[1] >> (i + BASE_BITS / 2)) & 1) << 1;
// The i bit of the upper half of digit 2. (BASE_BITS/2) is half-wide.
bits |= ((uint32_t)(k1->data[2] >> (i + BASE_BITS / 2)) & 1) << 2;
// The i bit of the upper half of digit 3. (BASE_BITS/2) is half-wide.
bits |= ((uint32_t)(k1->data[3] >> (i + BASE_BITS / 2)) & 1) << 3;
GetPointFromTable(out, PRE_MUL_G2, TABLE_G_SIZE, bits);
}
/*
* Input:
* k1 < n
* 0 <= i < 28
* Output:
* out->x < p, out->y < p, out->z = 0 or 1
*/
static inline void GetLowerPrecomputePtOfG(Point *out, const Felem *k1, int32_t curBit)
{
uint32_t bits;
uint32_t i = (uint32_t)curBit;
bits = (uint32_t)(k1->data[0] >> i) & 1; // The i bit of the lower half of digit 0.
bits |= ((uint32_t)(k1->data[1] >> i) & 1) << 1; // The i bit of the lower half of digit 1.
bits |= ((uint32_t)(k1->data[2] >> i) & 1) << 2; // The i bit of the lower half of digit 2.
bits |= ((uint32_t)(k1->data[3] >> i) & 1) << 3; // The i bit of the lower half of digit 3.
GetPointFromTable(out, PRE_MUL_G, TABLE_G_SIZE, bits);
}
/*
* Input:
* k2 < n
* 0 <= i <= 220
* The coordinates of each point of preMulPt are reduced.
* Output:
* reduce(out->x)
* out->y[] < max(reduce(out->y), negY)
* reduce(out->z)
*/
static inline void GetPrecomputePtOfP(Point *out, const Felem *k2, int32_t curBit, const Point preMulPt[TABLE_P_SIZE])
{
uint32_t bits;
uint32_t sign, value; // the grouping sign and actual value.
Felem negY;
// Obtain the 5-bit signed code and read the sign bits of the next group of numbers
// to determine whether there is a carry. The total length is 6.
bits = (uint32_t)FelemGetBits(k2, curBit - 1, WINDOW_SIZE + 1);
DecodeScalarCode(&sign, &value, bits);
GetPointFromTable(out, preMulPt, TABLE_P_SIZE, value);
// out->y < 2^56 + 2^16
FelemNeg(&negY, &out->y); // negY[] < (2^57 + 2^1) + (2^56 + 2^16) < 2^58
FelemAssignWithMask(&out->y, &negY, (uint64_t)0 - sign);
}
/*
* Calculate k1 * G + k2 * P
* Input:
* k1 < n
* k2 < n
* The coordinates of each point of preMulPt are reduced.
* Output:
* out->x < p, out->y < p, out->z < p
*/
static void PtMul(Point *out, const Felem *k1, const Felem *k2, const Point preMulPt[TABLE_P_SIZE])
{
Point ptQ = {}; // ptQ stores result
Point ptPre = {}; // ptPre stores the points obtained from the table.
bool isGMul = k1 != NULL;
bool isPtMul = k2 != NULL && preMulPt != NULL;
int32_t curBit;
// Initialize the Q point.
if (isPtMul) {
curBit = 220; // Start from 220th bit.
// From k2's (_, 223, 222, 221, 220, 219) bit coding to select the initial point
GetPrecomputePtOfP(&ptQ, k2, curBit, preMulPt);
} else if (isGMul) {
curBit = 27; // Start from 27th.
// From k1's (195, 139, 83, 27) bit coding to select the initial point
GetLowerPrecomputePtOfG(&ptQ, k1, curBit);
// From k1's (195 + 28, 139 + 28, 83 + 28, 27 + 28) bit to select the pre-calculation point
// and adds it to the point Q.
GetUpperPrecomputePtOfG(&ptPre, k1, curBit);
PtAddMixed(&ptQ, &ptQ, &ptPre);
} else {
// k1 and k2 are all NULL, and the infinite point is output.
(void)memset_s((void *)out, sizeof(Point), 0, sizeof(Point));
return;
}
// Operation chain: point Q output range:
// x[] y[] z[]
// Initialization the value reduced reduced < 2^61
// ↓
// Double ←↑ reduced reduced < 2^61
// ↓ ↑
// mixed add ↑ reduced reduced < 2^61
// ↓ ↑
// mixed add →↑ reduced reduced < 2^61
// ↓ ↑
// negation of Y ↑ reduced < 2^58 < 2^61
// ↓ ↑
// add →↑ reduced < 2^58 < 2^61
while (--curBit >= 0) {
// Start to shift right bit by bit. Due to the initialization of the most significant bit,
// common point multiplication starts from 219th bit and base point multiplication starts from 26th bit.
// Whether G-point multiplication is performed in the current cycle,
// calculated once in each cycle starting from bit 27.
bool isStepGMul = curBit <= 27;
// Whether the current cycle is a common point multiplication, calculated once every 5 cycles
bool isStepPtMul = curBit % WINDOW_SIZE == 0;
PtDouble(&ptQ, &ptQ);
// Generator G multiplication part
// Divide k1 into eight segments, from high bits to low bits,
// select bits from each segment and combine them together, and read the pre-computation table.
// To reduce the precomputation table,
// the divided eight segments are combined according to the upper half and the lower half
if (isGMul && isStepGMul) {
// Add the point multiplication result of the current bit of the eight-segment to the point Q
GetLowerPrecomputePtOfG(&ptPre, k1, curBit);
PtAddMixed(&ptQ, &ptQ, &ptPre);
GetUpperPrecomputePtOfG(&ptPre, k1, curBit);
PtAddMixed(&ptQ, &ptQ, &ptPre);
}
// Common point multiplication part
// Use the sliding window signed encoding method
// to group the most significant bits to the least significant bits every five bits.
// Each group of numbers is regarded as a signed number. 00000 to 01111 are decimal numbers 0 to 15,
// and 10000 to 11111 are decimal numbers (32-16) to (32-1).
// This is equivalent to the set the number in complement form after the number carries 1.
// for example
// 11011(Complement) = 100000 - 00101
if (isPtMul && isStepPtMul) {
// Add the point multiplication result of the current group to the point Q.
GetPrecomputePtOfP(&ptPre, k2, curBit, preMulPt);
PtAdd(&ptQ, &ptQ, &ptPre);
}
}
// Refer to the output range of the operation chain. Reduce the Y and Z coordinates.
FelemReduce(&ptQ.y, &ptQ.y);
FelemReduce(&ptQ.z, &ptQ.z);
// do the modulo operation then output.
FelemContract(&ptQ.x, &ptQ.x);
FelemContract(&ptQ.y, &ptQ.y);
FelemContract(&ptQ.z, &ptQ.z);
PtAssign(out, &ptQ);
}
/*
* Convert Jacobian coordinates to affine coordinates by a given module inverse
*/
static void PtMakeAffineWithInv(Point *out, const Point *in, const Felem *zInv)
{
Felem tmp;
// 1/Z^2
FelemSqrReduce(&tmp, zInv);
// X/Z^2
FelemMulReduce(&out->x, &in->x, &tmp);
FelemContract(&out->x, &out->x);
// 1/Z^3
FelemMulReduce(&tmp, &tmp, zInv);
// Y/Z^3
FelemMulReduce(&out->y, &in->y, &tmp);
FelemContract(&out->y, &out->y);
FelemSetLimb(&out->z, 1);
}
/*
* Obtain the pre-multiplication table of the input point pt, including 0pt-16pt.
* The coordinates of all points are reduced.
*/
static int32_t GetPreMulPt(Point preMulPt[TABLE_P_SIZE], const ECC_Point *pt)
{
int32_t ret;
// 0pt
(void)memset_s((void *)&preMulPt[0], sizeof(Point), 0, sizeof(Point));
// 1pt
GOTO_ERR_IF_EX(BN2Felem(&preMulPt[1].x, &pt->x), ret);
GOTO_ERR_IF_EX(BN2Felem(&preMulPt[1].y, &pt->y), ret);
GOTO_ERR_IF_EX(BN2Felem(&preMulPt[1].z, &pt->z), ret);
// 2pt ~ 15pt
for (uint32_t i = 2; i < 15; i += 2) {
PtDouble(&preMulPt[i], &preMulPt[i >> 1]);
// Z coordinate after the doubled point is reduced.
FelemReduce(&preMulPt[i].z, &preMulPt[i].z);
PtAdd(&preMulPt[i + 1], &preMulPt[i], &preMulPt[1]);
}
// 16pt
PtDouble(&preMulPt[16], &preMulPt[16 >> 1]);
// Z coordinate of the 16pt after the doubled point 16pt is reduced.
FelemReduce(&preMulPt[16].z, &preMulPt[16].z);
ERR:
return ret;
}
int32_t ECP224_PointMulAdd(
ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt)
{
int32_t retVal;
Felem fK1;
Felem fK2;
Point preMulPt[TABLE_P_SIZE];
Point out;
// Check the input parameters.
GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP224), retVal);
GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP224), retVal);
GOTO_ERR_IF(CheckBnValid(k1, FELEM_BITS), retVal);
GOTO_ERR_IF(CheckBnValid(k2, FELEM_BITS), retVal);
GOTO_ERR_IF(CheckPointValid(pt, CRYPT_ECC_NISTP224), retVal);
// Special treatment of infinity points
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
GOTO_ERR_IF_EX(BN2Felem(&fK1, k1), retVal);
GOTO_ERR_IF_EX(BN2Felem(&fK2, k2), retVal);
GOTO_ERR_IF_EX(GetPreMulPt(preMulPt, pt), retVal);
PtMul(&out, &fK1, &fK2, preMulPt);
GOTO_ERR_IF_EX(Felem2BN(&r->x, &out.x), retVal);
GOTO_ERR_IF_EX(Felem2BN(&r->y, &out.y), retVal);
GOTO_ERR_IF_EX(Felem2BN(&r->z, &out.z), retVal);
ERR:
return retVal;
}
int32_t ECP224_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt)
{
int32_t retVal;
Felem felemK;
Point preMulPt[TABLE_P_SIZE];
Point out;
// Check the input parameters.
GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP224), retVal);
GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP224), retVal);
GOTO_ERR_IF(CheckBnValid(k, FELEM_BITS), retVal);
if (pt != NULL) {
GOTO_ERR_IF(CheckPointValid(pt, CRYPT_ECC_NISTP224), retVal);
// Special treatment of infinity points
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
}
GOTO_ERR_IF_EX(BN2Felem(&felemK, k), retVal);
// When pt is NULL, r = k * G
if (pt == NULL) {
PtMul(&out, &felemK, NULL, NULL);
} else { // If pt is not null, r = k * pt
GOTO_ERR_IF_EX(GetPreMulPt(preMulPt, pt), retVal);
PtMul(&out, NULL, &felemK, preMulPt);
}
GOTO_ERR_IF_EX(Felem2BN(&r->x, &out.x), retVal);
GOTO_ERR_IF_EX(Felem2BN(&r->y, &out.y), retVal);
GOTO_ERR_IF_EX(Felem2BN(&r->z, &out.z), retVal);
ERR:
return retVal;
}
int32_t ECP224_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt)
{
int32_t retVal;
Point out;
Felem zInv;
// Check the input parameters.
GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP224), retVal);
GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP224), retVal);
GOTO_ERR_IF(CheckPointValid(pt, CRYPT_ECC_NISTP224), retVal);
// Special treatment of infinity points
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
GOTO_ERR_IF_EX(BN2Felem(&out.x, &pt->x), retVal);
GOTO_ERR_IF_EX(BN2Felem(&out.y, &pt->y), retVal);
GOTO_ERR_IF_EX(BN2Felem(&out.z, &pt->z), retVal);
FelemInv(&zInv, &out.z);
PtMakeAffineWithInv(&out, &out, &zInv);
GOTO_ERR_IF_EX(Felem2BN(&r->x, &out.x), retVal);
GOTO_ERR_IF_EX(Felem2BN(&r->y, &out.y), retVal);
GOTO_ERR_IF_EX(Felem2BN(&r->z, &out.z), retVal);
ERR:
return retVal;
}
#endif /* defined(HITLS_CRYPTO_CURVE_NISTP224) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) */
|
2301_79861745/bench_create
|
crypto/ecc/src/ecp_nistp224.c
|
C
|
unknown
| 62,396
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef ECP_NISTP224_H
#define ECP_NISTP224_H
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_CURVE_NISTP224) && defined(HITLS_CRYPTO_NIST_USE_ACCEL)
#include "ecc_local.h"
#ifdef __cplusplus
extern "C" {
#endif
/**
* @brief Convert the point information pt to the affine coordinate system and refresh the data to r.
*
* @param para [IN] Curve parameters
* @param r [OUT] Output point information
* @param pt [IN] Input point information
*
* @retval CRYPT_SUCCESS succeeded
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP224_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt);
/**
* @brief Calculate r = k1 * G + k2 * pt
*
* @param para [IN] Curve parameters
* @param r [OUT] Output point information
* @param k1 [IN] Scalar 1, with a maximum of 224 bits
* @param k2 [IN] Scalar 2, with a maximum of 224 bits
* @param pt [IN] Point data
*
* @retval CRYPT_SUCCESS succeeded
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP224_PointMulAdd(
ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt);
/**
* @brief If pt != NULL, calculate r = k * pt; otherwise, calculate r = k * G
*
* @param para [IN] Curve parameter information
* @param r [OUT] Output point information
* @param k [IN] scalar with a maximum of 224 bits.
* @param pt [IN] Point data, which can be set to NULL.
*
* @retval CRYPT_SUCCESS set successfully
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP224_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt);
#ifdef __cplusplus
}
#endif
#endif /* defined(HITLS_CRYPTO_CURVE_NISTP224) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) */
#endif
|
2301_79861745/bench_create
|
crypto/ecc/src/ecp_nistp224.h
|
C
|
unknown
| 2,337
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef ECP_NISTP256_H
#define ECP_NISTP256_H
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_CURVE_NISTP256)
#include "ecc_local.h"
#ifdef __cplusplus
extern "C" {
#endif
/**
* @brief Convert the point information pt to the affine coordinate system and refresh the data to r.
*
* @param para [IN] Curve parameters
* @param r [OUT] Output point information
* @param pt [IN] Input point information
*
* @retval CRYPT_SUCCESS succeeded
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP256_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt);
/**
* @brief Calculate r = k1 * G + k2 * pt
*
* @param para [IN] Curve parameters
* @param r [OUT] Output point information
* @param k1 [IN] Scalar 1, with a maximum of 256 bits
* @param k2 [IN] Scalar 2, with a maximum of 256 bits
* @param pt [IN] Point data
*
* @retval CRYPT_SUCCESS succeeded
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP256_PointMulAdd(ECC_Para *para, ECC_Point *r,
const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt);
/**
* @brief If pt != NULL, calculate r = k * pt; Otherwise, calculate r = k * G
*
* @param para [IN] Curve parameter information
* @param r [OUT] Output point information
* @param k [IN] Scalar, with a maximum of 256 bits
* @param pt [IN] Point data, which can be set to NULL.
*
* @retval CRYPT_SUCCESS succeeded
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP256_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt);
/**
* @brief Calculate r = 1/a mod para->n
*
* @param para [IN] Curve parameter information
* @param r [OUT] Output modulus inverse value
* @param a [IN] input BigNum that needs to be inverted.
*
* @retval CRYPT_SUCCESS succeeded
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP256_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a);
#ifdef __cplusplus
}
#endif
#endif /* defined(HITLS_CRYPTO_CURVE_NISTP256) */
#endif
|
2301_79861745/bench_create
|
crypto/ecc/src/ecp_nistp256.h
|
C
|
unknown
| 2,671
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_CURVE_NISTP521) && defined(HITLS_CRYPTO_NIST_USE_ACCEL)
#include <stdint.h>
#include "bsl_err_internal.h"
#include "crypt_bn.h"
#include "crypt_errno.h"
#include "crypt_utils.h"
#include "crypt_ecc.h"
#include "ecc_local.h"
#include "ecc_utils.h"
#include "bsl_util_internal.h"
#ifndef __SIZEOF_INT128__
#error "This nistp521 implementation require the compiler support 128-bits integer."
#endif
#define FELEM_BITS 521
/* Each element of a BigNum array is carried by 2 ^ 58 */
#define BASE_BITS 58
/* The length of a BigNum array is 9: 58 * 9 = 522 > 521 */
#define NUM_LIMBS 9
/* Mask with 58 bits */
#define MASK_58BITS ((uint64_t)0x3FFFFFFFFFFFFFF)
/* Mask with 57 bits */
#define MASK_57BITS ((uint64_t)0x1FFFFFFFFFFFFFF)
/* The pre-calculation table of the G table has 16 points. */
#define TABLE_G_SIZE 16
/* The pre-calculation table of the P table has 17 points. */
#define TABLE_P_SIZE 17
/* Forcibly convert to uint128_t */
#define U128(x) ((uint128_t)(x))
/* Obtain the nth bit of a BigNum. The BigNum is stored in the uint64_t array in little-endian order. */
#define GET_ARRAY64_BIT(k, n) ((((k)->data)[(n) / 64] >> ((n) & 63)) & 1)
typedef struct {
uint64_t data[NUM_LIMBS];
} Array64;
typedef struct {
uint64_t data[NUM_LIMBS];
} Felem;
typedef struct {
uint128_t data[NUM_LIMBS];
} LongFelem;
typedef struct {
Felem x, y, z; /* Each point contains three coordinates x, y, and z. */
} Point;
/*
* The point type (Point) contains three field elements (Felem) (x, y, and z).
* Each field element consists of nine 64-bit data blocks (uint64_t).
* Point :pt
* Felem :x
* uint64_t :x[9]
* Felem :y
* uint64_t :y[9]
* Felem :z
* uint64_t :z[9]
*/
static inline void FelemToArray64(Array64 *array, const Felem *felem)
{
uint32_t shift = 0;
for (int32_t i = 0; i + 1 < NUM_LIMBS; i++) {
array->data[i] = (felem->data[i] >> shift) | (felem->data[i + 1] << (BASE_BITS - shift)); // i < 8, shift < 48
/* Felem is carried 1 every 58 bits, and array is carried 1 every 64 bits. The difference is 6 bits. */
shift += 6;
}
array->data[8] = felem->data[8] >> shift; /* felem->data[8] is the last data block. */
}
static inline void Array64ToFelem(Felem *felem, const Array64 *array)
{
uint32_t shift = 0;
felem->data[0] = array->data[0] & MASK_58BITS;
for (int32_t i = 1; i < NUM_LIMBS; i++) {
/* Felem is carried 1 every 58 bits, and array is carried 1 every 64 bits. The difference is 6 bits. */
shift += 6;
felem->data[i] = ((array->data[i - 1] >> (64 - shift)) | (array->data[i] << shift)) & MASK_58BITS;
}
}
static inline void FelemAssign(Felem *r, const Felem *a)
{
r->data[0] = a->data[0]; // r->data[0] take the value
r->data[1] = a->data[1]; // r->data[1] take the value
r->data[2] = a->data[2]; // r->data[2] take the value
r->data[3] = a->data[3]; // r->data[3] take the value
r->data[4] = a->data[4]; // r->data[4] take the value
r->data[5] = a->data[5]; // r->data[5] take the value
r->data[6] = a->data[6]; // r->data[6] take the value
r->data[7] = a->data[7]; // r->data[7] take the value
r->data[8] = a->data[8]; // r->data[8] take the value
}
static inline void FelemPointAssign(Point *ptR, const Point *ptIn)
{
FelemAssign(&ptR->x, &ptIn->x);
FelemAssign(&ptR->y, &ptIn->y);
FelemAssign(&ptR->z, &ptIn->z);
}
static inline void FelemAssignWithMask(Felem *r, const Felem *a, uint64_t mask)
{
uint64_t rmask = ~mask;
r->data[0] = (a->data[0] & mask) | (r->data[0] & rmask); // r->data[0] Obtain a new value or remain unchanged.
r->data[1] = (a->data[1] & mask) | (r->data[1] & rmask); // r->data[1] Obtain a new value or remain unchanged.
r->data[2] = (a->data[2] & mask) | (r->data[2] & rmask); // r->data[2] Obtain a new value or remain unchanged.
r->data[3] = (a->data[3] & mask) | (r->data[3] & rmask); // r->data[3] Obtain a new value or remain unchanged.
r->data[4] = (a->data[4] & mask) | (r->data[4] & rmask); // r->data[4] Obtain a new value or remain unchanged.
r->data[5] = (a->data[5] & mask) | (r->data[5] & rmask); // r->data[5] Obtain a new value or remain unchanged.
r->data[6] = (a->data[6] & mask) | (r->data[6] & rmask); // r->data[6] Obtain a new value or remain unchanged.
r->data[7] = (a->data[7] & mask) | (r->data[7] & rmask); // r->data[7] Obtain a new value or remain unchanged.
r->data[8] = (a->data[8] & mask) | (r->data[8] & rmask); // r->data[8] Obtain a new value or remain unchanged.
}
static inline void FelemPointAssignWithMask(Point *ptR, const Point *ptIn, uint64_t mask)
{
FelemAssignWithMask(&ptR->x, &ptIn->x, mask);
FelemAssignWithMask(&ptR->y, &ptIn->y, mask);
FelemAssignWithMask(&ptR->z, &ptIn->z, mask);
}
static inline void FelemSetLimb(Felem *felem, const uint64_t a)
{
felem->data[0] = a; // r->data[0] take the value of a
felem->data[1] = 0; // r->data[1] clear to 0
felem->data[2] = 0; // r->data[2] clear to 0
felem->data[3] = 0; // r->data[3] clear to 0
felem->data[4] = 0; // r->data[4] clear to 0
felem->data[5] = 0; // r->data[5] clear to 0
felem->data[6] = 0; // r->data[6] clear to 0
felem->data[7] = 0; // r->data[7] clear to 0
felem->data[8] = 0; // r->data[8] clear to 0
}
static inline void LongFelemMulLimb(LongFelem *r, const LongFelem *a, uint64_t limb)
{
r->data[0] = a->data[0] * limb; // r->data[0] take the value
r->data[1] = a->data[1] * limb; // r->data[1] take the value
r->data[2] = a->data[2] * limb; // r->data[2] take the value
r->data[3] = a->data[3] * limb; // r->data[3] take the value
r->data[4] = a->data[4] * limb; // r->data[4] take the value
r->data[5] = a->data[5] * limb; // r->data[5] take the value
r->data[6] = a->data[6] * limb; // r->data[6] take the value
r->data[7] = a->data[7] * limb; // r->data[7] take the value
r->data[8] = a->data[8] * limb; // r->data[8] take the value
}
static inline void FelemMulLimb(Felem *r, const Felem *a, uint64_t b)
{
r->data[0] = a->data[0] * b; // r->data[0] take the value
r->data[1] = a->data[1] * b; // r->data[1] take the value
r->data[2] = a->data[2] * b; // r->data[2] take the value
r->data[3] = a->data[3] * b; // r->data[3] take the value
r->data[4] = a->data[4] * b; // r->data[4] take the value
r->data[5] = a->data[5] * b; // r->data[5] take the value
r->data[6] = a->data[6] * b; // r->data[6] take the value
r->data[7] = a->data[7] * b; // r->data[7] take the value
r->data[8] = a->data[8] * b; // r->data[8] take the value
}
static inline void FelemAdd(Felem *r, const Felem *a, const Felem *b)
{
r->data[0] = a->data[0] + b->data[0]; // r->data[0] take the value
r->data[1] = a->data[1] + b->data[1]; // r->data[1] take the value
r->data[2] = a->data[2] + b->data[2]; // r->data[2] take the value
r->data[3] = a->data[3] + b->data[3]; // r->data[3] take the value
r->data[4] = a->data[4] + b->data[4]; // r->data[4] take the value
r->data[5] = a->data[5] + b->data[5]; // r->data[5] take the value
r->data[6] = a->data[6] + b->data[6]; // r->data[6] take the value
r->data[7] = a->data[7] + b->data[7]; // r->data[7] take the value
r->data[8] = a->data[8] + b->data[8]; // r->data[8] take the value
}
/*
* input:
* a->data[i] < 7*2^61
* b->data[i] < 2^60 - 2^3
* output:
* r->data[i] <= max(a->data[i]) + 2^61 - 2^3
*/
static inline void FelemSub(Felem *r, const Felem *a, const Felem *b)
{
r->data[0] = a->data[0] + (MASK_58BITS << 3) - b->data[0]; // b->data[0] < 2^61 - 2^3
r->data[1] = a->data[1] + (MASK_58BITS << 3) - b->data[1]; // b->data[1] < 2^61 - 2^3
r->data[2] = a->data[2] + (MASK_58BITS << 3) - b->data[2]; // b->data[2] < 2^61 - 2^3
r->data[3] = a->data[3] + (MASK_58BITS << 3) - b->data[3]; // b->data[3] < 2^61 - 2^3
r->data[4] = a->data[4] + (MASK_58BITS << 3) - b->data[4]; // b->data[4] < 2^61 - 2^3
r->data[5] = a->data[5] + (MASK_58BITS << 3) - b->data[5]; // b->data[5] < 2^61 - 2^3
r->data[6] = a->data[6] + (MASK_58BITS << 3) - b->data[6]; // b->data[6] < 2^61 - 2^3
r->data[7] = a->data[7] + (MASK_58BITS << 3) - b->data[7]; // b->data[7] < 2^61 - 2^3
r->data[8] = a->data[8] + (MASK_57BITS << 3) - b->data[8]; // b->data[8] < 2^60 - 2^3
}
/*
* input:
* r->data[i] < 2^127
* a->data[i] < 2^64 - 2^6
* output:
* r->data[i] <= r->data[i] + 2^64 - 2^6
*/
static inline void LongFelemDiff(LongFelem *r, const Felem *a)
{
r->data[0] += (MASK_58BITS << 6) - a->data[0]; // a->data[0] < 2^64 - 2^6
r->data[1] += (MASK_58BITS << 6) - a->data[1]; // a->data[1] < 2^64 - 2^6
r->data[2] += (MASK_58BITS << 6) - a->data[2]; // a->data[2] < 2^64 - 2^6
r->data[3] += (MASK_58BITS << 6) - a->data[3]; // a->data[3] < 2^64 - 2^6
r->data[4] += (MASK_58BITS << 6) - a->data[4]; // a->data[4] < 2^64 - 2^6
r->data[5] += (MASK_58BITS << 6) - a->data[5]; // a->data[5] < 2^64 - 2^6
r->data[6] += (MASK_58BITS << 6) - a->data[6]; // a->data[6] < 2^64 - 2^6
r->data[7] += (MASK_58BITS << 6) - a->data[7]; // a->data[7] < 2^64 - 2^6
r->data[8] += (MASK_57BITS << 6) - a->data[8]; // a->data[8] < 2^63 - 2^6
}
static inline void FelemNeg(Felem *r, const Felem *a)
{
r->data[0] = (MASK_58BITS << 3) - a->data[0]; // a->data[0], r->data[0] < 2^61 - 2^3
r->data[1] = (MASK_58BITS << 3) - a->data[1]; // a->data[1], r->data[1] < 2^61 - 2^3
r->data[2] = (MASK_58BITS << 3) - a->data[2]; // a->data[2], r->data[2] < 2^61 - 2^3
r->data[3] = (MASK_58BITS << 3) - a->data[3]; // a->data[3], r->data[3] < 2^61 - 2^3
r->data[4] = (MASK_58BITS << 3) - a->data[4]; // a->data[4], r->data[4] < 2^61 - 2^3
r->data[5] = (MASK_58BITS << 3) - a->data[5]; // a->data[5], r->data[5] < 2^61 - 2^3
r->data[6] = (MASK_58BITS << 3) - a->data[6]; // a->data[6], r->data[6] < 2^61 - 2^3
r->data[7] = (MASK_58BITS << 3) - a->data[7]; // a->data[7], r->data[7] < 2^61 - 2^3
r->data[8] = (MASK_57BITS << 3) - a->data[8]; // a->data[8], r->data[8] < 2^60 - 2^3
}
/* Calculate r = a / 2, which can be regarded as a cyclic right shift by one bit in the modulo P(2^521-1) field. */
static inline void FelemDivTwo(Felem *r, const Felem *a)
{
const uint64_t *pa = a->data;
r->data[0] = (pa[0] >> 1) + ((pa[1] & 1) << 57); // The 57th bit plus the LSB of pa[1]
r->data[1] = (pa[1] >> 1) + ((pa[2] & 1) << 57); // The 57th bit plus the LSB of pa[2]
r->data[2] = (pa[2] >> 1) + ((pa[3] & 1) << 57); // The 57th bit plus the LSB of pa[3]
r->data[3] = (pa[3] >> 1) + ((pa[4] & 1) << 57); // The 57th bit plus the LSB of pa[4]
r->data[4] = (pa[4] >> 1) + ((pa[5] & 1) << 57); // The 57th bit plus the LSB of pa[5]
r->data[5] = (pa[5] >> 1) + ((pa[6] & 1) << 57); // The 57th bit plus the LSB of pa[6]
r->data[6] = (pa[6] >> 1) + ((pa[7] & 1) << 57); // The 57th bit plus the LSB of pa[7]
r->data[7] = (pa[7] >> 1) + ((pa[8] & 1) << 57); // The 57th bit plus the LSB of pa[8]
r->data[8] = (pa[8] >> 1) + ((pa[0] & 1) << 56); // The 56th bit plus the LSB of pa[0]
}
/*
* reduce to prevent subsequent calculation overflow.
* input:
* in[i] < 2^128
* output:
* out[i] < 2^59 + 2^14
*/
static void FelemReduce(Felem *r, const LongFelem *a)
{
uint64_t tmp;
const uint32_t shift2 = BASE_BITS * 2; // 116 = 58 * 2
r->data[0] = (uint64_t)(a->data[0] & MASK_58BITS); // r->data[0] < 2^58
r->data[1] = (uint64_t)(a->data[1] & MASK_58BITS); // r->data[1] < 2^58
r->data[2] = (uint64_t)(a->data[2] & MASK_58BITS); // r->data[2] < 2^58
r->data[3] = (uint64_t)(a->data[3] & MASK_58BITS); // r->data[3] < 2^58
r->data[4] = (uint64_t)(a->data[4] & MASK_58BITS); // r->data[4] < 2^58
r->data[5] = (uint64_t)(a->data[5] & MASK_58BITS); // r->data[5] < 2^58
r->data[6] = (uint64_t)(a->data[6] & MASK_58BITS); // r->data[6] < 2^58
r->data[7] = (uint64_t)(a->data[7] & MASK_58BITS); // r->data[7] < 2^58
r->data[8] = (uint64_t)(a->data[8] & MASK_58BITS); // r->data[8] < 2^58
r->data[1] += (uint64_t)(a->data[0] >> BASE_BITS) & MASK_58BITS; // r->data[1] < 2^59
r->data[2] += (uint64_t)(a->data[1] >> BASE_BITS) & MASK_58BITS; // r->data[2] < 2^59
r->data[3] += (uint64_t)(a->data[2] >> BASE_BITS) & MASK_58BITS; // r->data[3] < 2^59
r->data[4] += (uint64_t)(a->data[3] >> BASE_BITS) & MASK_58BITS; // r->data[4] < 2^59
r->data[5] += (uint64_t)(a->data[4] >> BASE_BITS) & MASK_58BITS; // r->data[5] < 2^59
r->data[6] += (uint64_t)(a->data[5] >> BASE_BITS) & MASK_58BITS; // r->data[6] < 2^59
r->data[7] += (uint64_t)(a->data[6] >> BASE_BITS) & MASK_58BITS; // r->data[7] < 2^59
r->data[8] += (uint64_t)(a->data[7] >> BASE_BITS) & MASK_58BITS; // r->data[8] < 2^59
// a->data[8] The most significant bits above 58bits correspond to the most significant bits above 522 bits.
tmp = (uint64_t)(a->data[8] >> BASE_BITS) & MASK_58BITS;
r->data[0] += tmp << 1; // r->data[0] < 3*2^58
r->data[2] += (uint64_t)(a->data[0] >> shift2); // r->data[2] < 2^59 + 2^6
r->data[3] += (uint64_t)(a->data[1] >> shift2); // r->data[3] < 2^59 + 2^6
r->data[4] += (uint64_t)(a->data[2] >> shift2); // r->data[4] < 2^59 + 2^6, add the upper bits of a[2]116 bits.
r->data[5] += (uint64_t)(a->data[3] >> shift2); // r->data[5] < 2^59 + 2^6, add the upper bits of a[3]116 bits.
r->data[6] += (uint64_t)(a->data[4] >> shift2); // r->data[6] < 2^59 + 2^6, add the upper bits of a[4]116 bits.
r->data[7] += (uint64_t)(a->data[5] >> shift2); // r->data[7] < 2^59 + 2^6, add the upper bits of a[5]116 bits.
r->data[8] += (uint64_t)(a->data[6] >> shift2); // r->data[8] < 2^59 + 2^6, add the upper bits of a[6]116 bits.
// a->data[7] The most significant bits above 116bits correspond to the most significant bits above 522 bits.
tmp = (uint64_t)(a->data[7] >> shift2);
r->data[0] += tmp << 1; // r->data[0] < 3*2^58 + 2^13
// a->data[8] The most significant bits above 116bits correspond to the most significant bits above 580 bits.
tmp = (uint64_t)(a->data[8] >> shift2);
r->data[1] += tmp << 1; // r->data[1] < 2^59 + 2^13
/* Considering that out[0] may be too large, carry needs to be continued. */
r->data[1] += r->data[0] >> BASE_BITS; // r->data[1] < 2^59 + 2^14
r->data[0] &= MASK_58BITS; // r->data[0] < 2^58
}
/*
* Reduce the number of bits to less than 58 to prevent subsequent operation overflow.
* input:
* felem->data[i] < 2^64 - 2^6
* output:
* felem->data[i] < 2^58
*/
static void FelemShrink(Felem *felem)
{
uint64_t carry = 0; /* Carry value between Limb */
/* Reduce each limb to less than 58 bits */
for (int32_t i = 0; i < NUM_LIMBS - 1; i++) {
felem->data[i] += carry; /* plus the carry of the previous block */
carry = (uint64_t)(felem->data[i] >> BASE_BITS); /* Take the carry of this block. */
felem->data[i] &= MASK_58BITS; /* 58 bits reserved */
}
felem->data[NUM_LIMBS - 1] += carry;
carry = felem->data[NUM_LIMBS - 1] >> 57; /* 521 = 58 * 8 + 57, carry the upper bits to the lower bits */
felem->data[NUM_LIMBS - 1] &= MASK_57BITS; /* The upper bits are discarded, only the lower 521 bits are retained */
/* Add the bits above 521 to the lower bits. */
for (int32_t i = 0; i < NUM_LIMBS; i++) {
felem->data[i] += carry; /* plus the carry of the previous block */
carry = (uint64_t)(felem->data[i] >> BASE_BITS); /* Take the carry of this block. */
felem->data[i] &= MASK_58BITS; /* 58 bits reserved */
}
}
/*
* Reduce felem to a unique value less than P.
* input:
* felem->data[i] < 2^64 - 2^6
* output:
* felem->data[i] < 2^58
* Return value:
* If felem is 0, the mask is all 1s. Otherwise, the mask is 0.
*/
static uint64_t FelemContract(Felem *felem)
{
uint64_t notP = 0;
uint64_t notZero = 0;
uint64_t mask;
uint64_t carry;
FelemShrink(felem);
/* After the shrink command is executed, felem->data[i] < 2^58, but it may still be greater than 521 bits. */
carry = felem->data[NUM_LIMBS - 1] >> 57; /* 521 = 58 * 8 + 57, carry the upper bits to the lower bits */
felem->data[NUM_LIMBS - 1] &= MASK_57BITS;
/* Add the bits above 521 to the lower bits. */
for (int32_t i = 0; i < NUM_LIMBS; i++) {
felem->data[i] += carry; /* plus the carry of the previous block */
carry = (uint64_t)(felem->data[i] >> BASE_BITS); /* Take the carry of this block. */
felem->data[i] &= MASK_58BITS; /* 58 bits reserved */
}
/* Check whether the value is P. */
for (int32_t i = 0; i < NUM_LIMBS - 1; i++) {
notP |= felem->data[i] ^ MASK_58BITS; /* If the value of felem is P, the value remains 0. */
}
notP |= felem->data[NUM_LIMBS - 1] ^ MASK_57BITS;
/* The most significant bit is 1 only when notP = 0. In this case, the mask is 0. */
mask = 0 - ((0 - notP) >> 63); /* Shift rightwards by 63 bits and get the most significant bit. */
for (int32_t i = 0; i < NUM_LIMBS; i++) {
felem->data[i] &= mask; /* If the value is P, clear all the bits to 0 */
notZero |= felem->data[i]; /* an determine whether the value is zero. */
}
/* only when notZero == 0, the most significant bit is 1. In this case, each bit of the mask is all 1s. */
mask = ((0 - notZero) >> 63) - 1; /* Shift rightwards by 63 bits and get the most significant bit. */
return mask;
}
/* Convert a BigNum to the Felem *. Note that the value cannot be a negative number and cannot be greater than P. */
static int32_t BN2Felem(Felem *r, const BN_BigNum *a)
{
int32_t ret;
Array64 array = {0};
uint32_t len = NUM_LIMBS;
ret = BN_Bn2U64Array(a, array.data, &len);
if (ret != CRYPT_SUCCESS) {
return ret;
}
Array64ToFelem(r, &array);
return CRYPT_SUCCESS;
}
/* Felem * Convert to BigNum */
static int32_t Felem2BN(BN_BigNum *r, const Felem *a)
{
Array64 array = {0};
uint32_t len = NUM_LIMBS;
Felem felem;
FelemAssign(&felem, a);
FelemContract(&felem);
FelemToArray64(&array, &felem);
return BN_U64Array2Bn(r, array.data, len);
}
/*
* Calculate r = a * b
* input:
* a->data[i] < 2^63
* b->data[i] < 2^128 / (17*a[i])
* output:
* r->data[i] < 17(max(a[i]*b[i]))
*/
static void FelemMul(LongFelem *r, const Felem *a, const Felem *b)
{
Felem ax2;
const uint64_t *pa = a->data;
const uint64_t *pb = b->data;
const uint64_t *p2 = ax2.data;
/* Because the modulo P is 2^521 - 1, the higher bits above the 521 bits
can be truncated and then added to the lower bits. */
FelemMulLimb(&ax2, a, 2);
r->data[0] = U128(pa[0]) * pb[0] + U128(p2[1]) * pb[8] + U128(p2[2]) * pb[7] + // 0 = 0+0, 1+8, 2+7 (mod 9)
U128(p2[3]) * pb[6] + U128(p2[4]) * pb[5] + U128(p2[5]) * pb[4] + // 0 = 3+6, 4+5, 5+4 (mod 9)
U128(p2[6]) * pb[3] + U128(p2[7]) * pb[2] + U128(p2[8]) * pb[1]; // 0 = 6+3, 7+2, 8+1 (mod 9)
r->data[1] = U128(pa[0]) * pb[1] + U128(pa[1]) * pb[0] + U128(p2[2]) * pb[8] + // 1 = 0+1, 1+0, 2+8 (mod 9)
U128(p2[3]) * pb[7] + U128(p2[4]) * pb[6] + U128(p2[5]) * pb[5] + // 1 = 3+7, 4+6, 5+5 (mod 9)
U128(p2[6]) * pb[4] + U128(p2[7]) * pb[3] + U128(p2[8]) * pb[2]; // 1 = 6+4, 7+3, 8+2 (mod 9)
r->data[2] = U128(pa[0]) * pb[2] + U128(pa[1]) * pb[1] + U128(pa[2]) * pb[0] + // 2 = 0+2, 1+1, 2+0 (mod 9)
U128(p2[3]) * pb[8] + U128(p2[4]) * pb[7] + U128(p2[5]) * pb[6] + // 2 = 3+8, 4+7, 5+6 (mod 9)
U128(p2[6]) * pb[5] + U128(p2[7]) * pb[4] + U128(p2[8]) * pb[3]; // 2 = 6+5, 7+4, 8+3 (mod 9)
r->data[3] = U128(pa[0]) * pb[3] + U128(pa[1]) * pb[2] + U128(pa[2]) * pb[1] + // 3 = 0+3, 1+2, 2+1 (mod 9)
U128(pa[3]) * pb[0] + U128(p2[4]) * pb[8] + U128(p2[5]) * pb[7] + // 3 = 3+0, 4+8, 5+7 (mod 9)
U128(p2[6]) * pb[6] + U128(p2[7]) * pb[5] + U128(p2[8]) * pb[4]; // 3 = 6+6, 7+5, 8+4 (mod 9)
r->data[4] = U128(pa[0]) * pb[4] + U128(pa[1]) * pb[3] + U128(pa[2]) * pb[2] + // 4 = 0+4, 1+3, 2+2 (mod 9)
U128(pa[3]) * pb[1] + U128(pa[4]) * pb[0] + U128(p2[5]) * pb[8] + // 4 = 3+1, 4+0, 5+8 (mod 9)
U128(p2[6]) * pb[7] + U128(p2[7]) * pb[6] + U128(p2[8]) * pb[5]; // 4 = 6+7, 7+6, 8+5 (mod 9)
r->data[5] = U128(pa[0]) * pb[5] + U128(pa[1]) * pb[4] + U128(pa[2]) * pb[3] + // 5 = 0+5, 1+4, 2+3 (mod 9)
U128(pa[3]) * pb[2] + U128(pa[4]) * pb[1] + U128(pa[5]) * pb[0] + // 5 = 3+2, 4+1, 5+0 (mod 9)
U128(p2[6]) * pb[8] + U128(p2[7]) * pb[7] + U128(p2[8]) * pb[6]; // 5 = 6+8, 7+7, 8+6 (mod 9)
r->data[6] = U128(pa[0]) * pb[6] + U128(pa[1]) * pb[5] + U128(pa[2]) * pb[4] + // 6 = 0+6, 1+5, 2+4 (mod 9)
U128(pa[3]) * pb[3] + U128(pa[4]) * pb[2] + U128(pa[5]) * pb[1] + // 6 = 3+3, 4+2, 5+1 (mod 9)
U128(pa[6]) * pb[0] + U128(p2[7]) * pb[8] + U128(p2[8]) * pb[7]; // 6 = 6+0, 7+8, 8+7 (mod 9)
r->data[7] = U128(pa[0]) * pb[7] + U128(pa[1]) * pb[6] + U128(pa[2]) * pb[5] + // 7 = 0+7, 1+6, 2+5 (mod 9)
U128(pa[3]) * pb[4] + U128(pa[4]) * pb[3] + U128(pa[5]) * pb[2] + // 7 = 3+4, 4+3, 5+2 (mod 9)
U128(pa[6]) * pb[1] + U128(pa[7]) * pb[0] + U128(p2[8]) * pb[8]; // 7 = 6+1, 7+0, 8+8 (mod 9)
r->data[8] = U128(pa[0]) * pb[8] + U128(pa[1]) * pb[7] + U128(pa[2]) * pb[6] + // 8 = 0+8, 1+7, 2+6 (mod 9)
U128(pa[3]) * pb[5] + U128(pa[4]) * pb[4] + U128(pa[5]) * pb[3] + // 8 = 3+5, 4+4, 5+3 (mod 9)
U128(pa[6]) * pb[2] + U128(pa[7]) * pb[1] + U128(pa[8]) * pb[0]; // 8 = 6+2, 7+1, 8+0 (mod 9)
}
/*
* Calculate r = a^2
* input:
* a->data[i] < 2^62 - 2^57
* output:
* r->data[i] < 17*max(a[i]*a[i])
*/
static void FelemSqr(LongFelem *r, const Felem *a)
{
Felem ax2;
Felem ax4;
const uint64_t *pa = a->data;
const uint64_t *p2 = ax2.data;
const uint64_t *p4 = ax4.data;
/* Because the modulo P is 2^521 - 1, the higher bits above the 521 bits
can be truncated and then added to the lower bits. */
FelemMulLimb(&ax2, a, 2); /* ax2 is twice the value of a */
FelemMulLimb(&ax4, a, 4); /* ax4 is 4 times the value of a */
r->data[0] = U128(pa[0]) * pa[0]; // 0 = 0+0 (mod 9)
r->data[1] = U128(p2[5]) * pa[5]; // 1 = 5+5 (mod 9)
r->data[2] = U128(pa[1]) * pa[1]; // 2 = 1+1 (mod 9)
r->data[3] = U128(p2[6]) * pa[6]; // 3 = 6+6 (mod 9)
r->data[4] = U128(pa[2]) * pa[2]; // 4 = 2+2 (mod 9)
r->data[5] = U128(p2[7]) * pa[7]; // 5 = 7+7 (mod 9)
r->data[6] = U128(pa[3]) * pa[3]; // 6 = 3+3 (mod 9)
r->data[7] = U128(p2[8]) * pa[8]; // 7 = 8+8 (mod 9)
r->data[8] = U128(pa[4]) * pa[4]; // 8 = 4+4 (mod 9)
// r->data[0] < 17*49*2^114 < 2^124
// 0 = 1+8, 2+7, 3+6, 4+5 (mod 9)
r->data[0] += U128(p4[1]) * pa[8] + U128(p4[2]) * pa[7] + U128(p4[3]) * pa[6] + U128(p4[4]) * pa[5];
// 1 = 0+1, 2+8, 3+7, 4+6 (mod 9)
r->data[1] += U128(p2[0]) * pa[1] + U128(p4[2]) * pa[8] + U128(p4[3]) * pa[7] + U128(p4[4]) * pa[6];
// 2 = 0+2, 3+8, 4+7, 5+6 (mod 9)
r->data[2] += U128(p2[0]) * pa[2] + U128(p4[3]) * pa[8] + U128(p4[4]) * pa[7] + U128(p4[5]) * pa[6];
// 3 = 0+3, 1+2, 4+8, 5+7 (mod 9)
r->data[3] += U128(p2[0]) * pa[3] + U128(p2[1]) * pa[2] + U128(p4[4]) * pa[8] + U128(p4[5]) * pa[7];
// 4 = 0+4, 1+3, 5+8, 6+7 (mod 9)
r->data[4] += U128(p2[0]) * pa[4] + U128(p2[1]) * pa[3] + U128(p4[5]) * pa[8] + U128(p4[6]) * pa[7];
// 5 = 0+5, 1+4, 2+3, 6+8 (mod 9)
r->data[5] += U128(p2[0]) * pa[5] + U128(p2[1]) * pa[4] + U128(p2[2]) * pa[3] + U128(p4[6]) * pa[8];
// 6 = 0+6, 1+5, 2+4, 7+8 (mod 9)
r->data[6] += U128(p2[0]) * pa[6] + U128(p2[1]) * pa[5] + U128(p2[2]) * pa[4] + U128(p4[7]) * pa[8];
// 7 = 0+7, 1+6, 2+5, 3+4 (mod 9)
r->data[7] += U128(p2[0]) * pa[7] + U128(p2[1]) * pa[6] + U128(p2[2]) * pa[5] + U128(p2[3]) * pa[4];
// 8 = 0+8, 1+7, 2+6, 3+5 (mod 9)
r->data[8] += U128(p2[0]) * pa[8] + U128(p2[1]) * pa[7] + U128(p2[2]) * pa[6] + U128(p2[3]) * pa[5];
}
// Multiply and reduce
static inline void FelemMulReduce(Felem *r, const Felem *a, const Felem *b)
{
LongFelem tmp;
FelemMul(&tmp, a, b);
FelemReduce(r, &tmp);
}
// Square and reduce
static inline void FelemSqrReduce(Felem *r, const Felem *in)
{
LongFelem tmp;
FelemSqr(&tmp, in);
FelemReduce(r, &tmp);
}
/*
* Calculate r = 1/a (mod P)
* Fermat's Little Theorem:
* a^p = a mod p
* a^(p-1) = 1 mod p
* a^(p-2) = a^(-1) mod p
* Calculate the inverse modulus value according to this formula and:
* p = 2^521 - 1
* p - 2 = 2^521 - 3 = (2^519 - 1) << 2 + 1
*/
static void FelemInv(Felem *r, const Felem *a)
{
Felem tmp1, tmp2, tmp3;
int32_t bits;
/* Calculate a^e and update the e value until e = p - 2 */
FelemSqrReduce(&tmp1, a); /* (10) */
FelemMulReduce(&tmp1, &tmp1, a); /* (11) */
FelemSqrReduce(&tmp2, &tmp1); /* (110) */
FelemMulReduce(&tmp3, &tmp2, a); /* (111) is stored in tmp3 */
FelemSqrReduce(&tmp2, &tmp2); /* (1100) */
FelemMulReduce(&tmp1, &tmp2, &tmp1); /* (1111) */
FelemSqrReduce(&tmp2, &tmp1); /* (0001 1110) */
FelemSqrReduce(&tmp2, &tmp2); /* (0011 1100) */
FelemSqrReduce(&tmp2, &tmp2); /* (0111 1000) */
FelemMulReduce(&tmp3, &tmp2, &tmp3); /* (0111 1111) is stored in tmp3 */
FelemSqrReduce(&tmp2, &tmp2); /* (1111 0000) */
FelemMulReduce(&tmp1, &tmp2, &tmp1); /* 2^8 - 1 */
/* The current value of e is (11111111) The value consists of 8 bits */
bits = 8;
/* Perform the square & multiplication until the value of e becomes 2 ^ 512 - 1, that is, 512 bits */
while (bits < 512) {
FelemAssign(&tmp2, &tmp1);
for (int32_t i = 0; i < bits; i++) { /* e value shifts to the left */
FelemSqrReduce(&tmp2, &tmp2);
}
FelemMulReduce(&tmp1, &tmp2, &tmp1); /* e Change the lower bits 0 to 1, e = 2^bits - 1 */
/* In this case, the bit length of the e value becomes twice (* 2). */
bits *= 2;
}
/* In this case, the value of e is 2^512-1 */
for (int32_t i = 0; i < 7; i++) { /* e value shifts to the left by 7 bits */
FelemSqrReduce(&tmp1, &tmp1);
}
FelemMulReduce(&tmp1, &tmp1, &tmp3); /* 2^519 - 1, plus the previous &tmp3 */
FelemSqrReduce(&tmp1, &tmp1);
FelemSqrReduce(&tmp1, &tmp1); /* (2^519 - 1) << 2 */
FelemMulReduce(r, &tmp1, a); /* p - 2 */
}
/*
* "dbl-2001-b"
* delta = Z1^2
* gamma = Y1^2
* beta = X1*gamma
* alpha = 3*(X1-delta)*(X1+delta)
* X3 = alpha^2-8*beta
* Z3 = (Y1+Z1)^2-gamma-delta
* Y3 = alpha*(4*beta-X3)-8*gamma^2
*/
/* Calculate the double point coordinates. */
static void FelemPointDouble(Point *pointOut, const Point *pointIn)
{
Felem delta, gamma, beta, alpha;
Felem tmp1, tmp2;
LongFelem ltmp1;
/* delta = Z1^2 */
FelemSqrReduce(&delta, &pointIn->z); // delta[i] < 2^59 + 2^14
/* gamma = Y1^2 */
FelemSqrReduce(&gamma, &pointIn->y); // gamma[i] < 2^59 + 2^14
/* beta = X1*gamma */
FelemMulReduce(&beta, &pointIn->x, &gamma); // beta[i] < 2^59 + 2^14
/* X1 - delta */
FelemSub(&tmp1, &pointIn->x, &delta); // tmp1[i] < 9*2^59 + 2^14
/* X1 + delta */
FelemAdd(&tmp2, &pointIn->x, &delta); // tmp2[i] < 2^60 + 2^15
/* 3*(X1 + delta) */
FelemMulLimb(&tmp2, &tmp2, 3); // tmp2[i] < 6*(2^59 + 2^14)
/* alpha = 3*(X1-delta)*(X1+delta) */
FelemMulReduce(&alpha, &tmp1, &tmp2); // alpha[i] < 2^59 + 2^14
/* alpha^2 */
FelemSqr(<mp1, &alpha); // ltmp1[i] < 2^125
/* 8*beta */
FelemMulLimb(&tmp2, &beta, 8); // tmp2[i] < 2^62 + 2^17
/* alpha^2-8*beta */
LongFelemDiff(<mp1, &tmp2); // ltmp1[i] < 2^126
/* X3 = alpha^2-8*beta */
FelemReduce(&pointOut->x, <mp1);
/* Y1+Z1 */
FelemAdd(&tmp1, &pointIn->y, &pointIn->z); // tmp1[i] < 2^60 + 2^15
/* (Y1+Z1)^2 */
FelemSqr(<mp1, &tmp1); // ltmp1[i] < 17*(2^60 + 2^15)
/* gamma+delta */
FelemAdd(&tmp2, &gamma, &delta); // tmp2[i] < 2^60 + 2^15
/* (Y1+Z1)^2 - gamma - delta */
LongFelemDiff(<mp1, &tmp2);
/* Z3 = (Y1+Z1)^2-gamma-delta */
FelemReduce(&pointOut->z, <mp1);
/* 4*beta */
FelemMulLimb(&tmp2, &beta, 4); // tmp2[i] < 2^61 + 2^16
/* 4*beta-X3 */
FelemSub(&tmp1, &tmp2, &pointOut->x); // tmp1[i] < 2^62 + 2^16
FelemShrink(&tmp1); // Subtraction and reduction process can be optimized
/* alpha*(4*beta-X3) */
FelemMul(<mp1, &alpha, &tmp1); // ltmp1[i] < 2^128
/* gamma^2 */
FelemSqrReduce(&tmp2, &gamma); // tmp2[i] < 2^59 + 2^14
/* 8*gamma^2 */
FelemMulLimb(&tmp1, &tmp2, 8); // tmp1[i] < 2^62 + 2^17
/* alpha*(4*beta-X3)-8*gamma^2 */
LongFelemDiff(<mp1, &tmp1);
/* Y3 = alpha*(4*beta-X3)-8*gamma^2 */
FelemReduce(&pointOut->y, <mp1);
}
/*
* "add-2007-bl"
* Z1Z1 = Z1^2
* Z2Z2 = Z2^2
* U1 = X1*Z2Z2
* S1 = Y1*Z2*Z2Z2
* U2 = X2*Z1Z1
* S2 = Y2*Z1*Z1Z1
* H = U2-U1
* r = 2*(S2-S1)
* I = (2*H)^2
* J = H*I
* V = U1*I
* X3 = r^2-J-2*V
* Y3 = r*(V-X3)-2*S1*J
* Z3 = ((Z1+Z2)^2-Z1Z1-Z2Z2)*H
*/
/* Calculate the point addition coordinates, pt3 = pt1 + pt2 */
static void FelemPointAdd(Point *pt3, const Point *pt1, const Point *pt2)
{
uint64_t pointEqual, xEqual, yEqual, z1Zero, z2Zero;
Felem z1z1, z2z2, u1, u2, s1, s2, h, r, i, j, v, tmp1;
Point res;
LongFelem ltmp1;
/* Z1Z1 = Z1^2 */
FelemSqrReduce(&z1z1, &pt1->z);
z1Zero = FelemContract(&z1z1); // z1z1[i] < 2^58
/* Z2Z2 = Z2^2 */
FelemSqrReduce(&z2z2, &pt2->z);
z2Zero = FelemContract(&z2z2); // z2z2[i] < 2^58
/* U1 = X1*Z2Z2 */
FelemMulReduce(&u1, &pt1->x, &z2z2); // u1[i] < 2^59 + 2^14
/* S1 = Y1*Z2*Z2Z2 */
FelemMulReduce(&tmp1, &pt1->y, &pt2->z);
FelemMulReduce(&s1, &tmp1, &z2z2); // s1[i] < 2^59 + 2^14
/* U2 = X2*Z1Z1 */
FelemMulReduce(&u2, &pt2->x, &z1z1); // u2[i] < 2^59 + 2^14
/* S2 = Y2*Z1*Z1Z1 */
FelemMulReduce(&tmp1, &pt2->y, &pt1->z);
FelemMulReduce(&s2, &tmp1, &z1z1); // s2[i] < 2^59 + 2^14
/* H = U2-U1 */
FelemSub(&h, &u2, &u1);
xEqual = FelemContract(&h); // h[i] < 2^58
/* r = 2*(S2-S1) */
FelemSub(&tmp1, &s2, &s1);
yEqual = FelemContract(&tmp1);
/* If the coordinates are equal, use the double point formula. */
pointEqual = (xEqual & yEqual & (~z1Zero) & (~z2Zero));
if (pointEqual != 0) {
FelemPointDouble(pt3, pt1);
return;
}
FelemMulLimb(&r, &tmp1, 2); // r[i] < 2^59
/* I = (2*h)^2 */
FelemMulLimb(&tmp1, &h, 2); // tmp1[i] < 2^59
FelemSqrReduce(&i, &tmp1);
/* J = H*I */
FelemMulReduce(&j, &h, &i); // j[i] < 2^59 + 2^14
/* v = U1*I */
FelemMulReduce(&v, &u1, &i); // v[i] < 2^59 + 2^14
/* X3 = r^2-j-2*v */
FelemSqr(<mp1, &r); // ltmp1[i] < 17*2^118
FelemMulLimb(&tmp1, &v, 2); // tmp1[i] < 2^60 + 2^15
FelemAdd(&tmp1, &tmp1, &j); // tmp1[i] < 3*(2^59 + 2^14)
LongFelemDiff(<mp1, &tmp1); // ltmp1 < 2^123
FelemReduce(&res.x, <mp1); // x[i] < 2^59 + 2^14
/* Y3 = r*(v-X3)-2*S1*j */
FelemSub(&tmp1, &v, &res.x); // tmp1[i] < 5*2^59 + 2^14
FelemMul(<mp1, &r, &tmp1); // ltmp1[i] < 17*(5*2^59 + 2^14)*(2^59) < 2^125
FelemMulReduce(&tmp1, &s1, &j); // tmp1[i] < 2^59 + 2^14
FelemMulLimb(&tmp1, &tmp1, 2); // tmp1[i] < 2^60 + 2^15
LongFelemDiff(<mp1, &tmp1); // ltmp1[i] < 2^125 + 2^64 - 2^6
FelemReduce(&res.y, <mp1); // y3[i] < 2^59 + 2^14
/* Z3 = ((Z1+Z2)^2-Z1Z1-Z2Z2)*H */
FelemAdd(&tmp1, &pt1->z, &pt2->z); // tmp1[i] < 2^60 + 2^15
FelemSqr(<mp1, &tmp1); // ltmp1[i] < 17*(2^120 + 2^76 + 2^30)
FelemAdd(&tmp1, &z1z1, &z2z2); // tmp1[i] < 2^59
LongFelemDiff(<mp1, &tmp1); // ltmp1[i] < 2^125
FelemReduce(&tmp1, <mp1); // tmp1[i] < 2^59 + 2^14
FelemMulReduce(&res.z, &tmp1, &h); // z3[i] < 2^59 + 2^14
FelemPointAssignWithMask(&res, pt2, z1Zero);
FelemPointAssignWithMask(&res, pt1, z2Zero);
FelemPointAssign(pt3, &res);
}
/*
* "madd-2007-bl"
* Z1Z1 = Z1^2
* U2 = X2*Z1Z1
* S2 = Y2*Z1*Z1Z1
* H = U2-X1
* r = 2*(S2-Y1)
* HH = H^2
* I = 4*HH
* J = H*I
* V = X1*I
* X3 = r^2-J-2*V
* Y3 = r*(V-X3)-2*Y1*J
* Z3 = (Z1+H)^2-Z1Z1-HH
*/
/* Calculate the points coordinates addition in the mixed coordinate system, pt3 = pt1 + pt2, z2 == 1 */
static void FelemPointMixAdd(Point *pt3, const Point *pt1, const Point *pt2)
{
uint64_t pointEqual, xEqual, yEqual, z1Zero, z2Zero;
Felem z1z1, h, hh, r, i, j, v, tmp1, tmp2;
Point res;
LongFelem ltmp1;
/* Z1Z1 = Z1^2 */
FelemSqrReduce(&z1z1, &pt1->z);
z1Zero = FelemContract(&z1z1); // z1z1[i] < 2^58
FelemAssign(&tmp1, &pt2->z);
z2Zero = FelemContract(&tmp1);
/* U2 = X2*Z1Z1 */
FelemMulReduce(&tmp2, &pt2->x, &z1z1); // tmp2[i] < 2^59 + 2^14
/* S2 = Y2*Z1*Z1Z1 */
FelemMulReduce(&tmp1, &pt2->y, &pt1->z);
FelemMulReduce(&tmp1, &tmp1, &z1z1); // tmp1[i] < 2^59 + 2^14
/* H = U2-X1 */
FelemSub(&h, &tmp2, &pt1->x);
xEqual = FelemContract(&h); // h[i] < 2^58
/* r = 2*(S2-Y1) */
FelemSub(&tmp1, &tmp1, &pt1->y);
yEqual = FelemContract(&tmp1);
/* If the coordinates are equal, use the double point formula. */
pointEqual = (xEqual & yEqual & (~z1Zero) & (~z2Zero));
if (pointEqual != 0) {
FelemPointDouble(pt3, pt1);
return;
}
FelemMulLimb(&r, &tmp1, 2); // r[i] < 2^59
/* HH = H^2 */
FelemSqrReduce(&hh, &h); // hh[i] < 2^59 + 2^14
/* I = 4*HH */
FelemMulLimb(&i, &hh, 4); // i[i] < 2^61 + 2^16
/* J = H*I */
FelemMulReduce(&j, &h, &i); // j[i] < 2^59 + 2^14
/* V = X1*I */
FelemMulReduce(&v, &pt1->x, &i); // v[i] < 2^59 + 2^14
/* X3 = r^2-J-2*V */
FelemMulLimb(&tmp1, &v, 2); // tmp1[i] < 2^60 + 2^15
FelemAdd(&tmp2, &j, &tmp1); // tmp2[i] < 3*2^59 + 3*2^14
FelemSqr(<mp1, &r); // ltmp1[i] < 17*2^118
LongFelemDiff(<mp1, &tmp2); // ltmp1[i] < 2^123
FelemReduce(&res.x, <mp1); // x3[i] < 2^59 + 2^14
/* Y3 = r*(V-X3)-2*Y1*J */
FelemSub(&tmp1, &v, &res.x); // tmp1[i] < 5*2^59 + 2^14
FelemMul(<mp1, &r, &tmp1); // ltmp1[i] < 17*(5*2^59 + 2^14)*(2^59) < 2^125
FelemMulReduce(&tmp2, &pt1->y, &j); // tmp2[i] < 2^59 + 2^14
FelemMulLimb(&tmp1, &tmp2, 2); // tmp1[i] < 2^60 + 2^15
LongFelemDiff(<mp1, &tmp1); // ltmp1[i] < 2^125 + 2^64 - 2^6
FelemReduce(&res.y, <mp1); // y3[i] < 2^59 + 2^14
/* Z3 = (Z1+H)^2-Z1Z1-HH */
FelemAdd(&tmp1, &pt1->z, &h); // tmp1[i] < 3*2^59 + 2^14
FelemSqr(<mp1, &tmp1); // ltmp1[i] < 17*(9*2^118 + 3*2^74 + 2^28)
FelemAdd(&tmp2, &z1z1, &hh); // tmp2[i] < 3*2^59 + 2^14
LongFelemDiff(<mp1, &tmp2); // ltmp1[i] < 2^126
FelemReduce(&res.z, <mp1); // z3[i] < 2^59 + 2^14
FelemPointAssignWithMask(&res, pt2, z1Zero);
FelemPointAssignWithMask(&res, pt1, z2Zero);
FelemPointAssign(pt3, &res);
}
/*
* Y = 2*Y
* W = Z^4
* while (m > 0) {
* A = 3*(X^2-W)
* B = X*Y^2
* X = A^2-2*B
* Z = Z*Y
* m = m-1
* if (m > 0) {
* W = W*Y^4
* }
* Y = 2*A*(B-X)-Y^4
* }
* Y = Y/2
*/
static void FelemPointMultDouble(Point *pointOut, const Point *pointIn, int32_t m)
{
Felem x, y, z;
Felem w, a, b;
Felem tmp1, tmp2, tmp3;
LongFelem ltmp1;
int32_t left = m;
if (left == 1) {
FelemPointDouble(pointOut, pointIn);
return;
}
FelemAssign(&x, &pointIn->x);
FelemAssign(&z, &pointIn->z);
/* Y = 2*Y */
FelemMulLimb(&y, &pointIn->y, 2); // y[i] < 2^60 + 2^15
/* W = Z^4 */
FelemSqrReduce(&tmp1, &pointIn->z);
FelemSqrReduce(&w, &tmp1); // w[i] < 2^59 + 2^14
while (left > 0) {
/* A = 3*(X^2-W) */
FelemSqr(<mp1, &x); // ltmp1[i] < 17*(2^118 + 2^74 + 2^28) < 17*(2^118 + 2^75)
LongFelemDiff(<mp1, &w); // ltmp1[i] < 18*2^118
LongFelemMulLimb(<mp1, <mp1, 3); // ltmp1[i] < 3*18*2^118 < 2^124
FelemReduce(&a, <mp1); // a[i] < 2^59 + 2^14
/* B = X*Y^2 */
FelemSqrReduce(&tmp3, &y); // tmp3[i] < 2^59 + 2^14, tmp3 = Y^2
FelemMulReduce(&b, &x, &tmp3); // b[i] < 2^59 + 2^14
/* X = A^2-2*B */
FelemSqr(<mp1, &a); // ltmp1[i] < 17*(2^118 + 2^74 + 2^28) < 17*(2^118 + 2^75)
FelemMulLimb(&tmp1, &b, 2); // tmp1[i] < 2^60 + 2^15
LongFelemDiff(<mp1, &tmp1); // ltmp1[i] < 18*2^118
FelemReduce(&x, <mp1); // x[i] < 2^59 + 2^14
/* Z = Z*Y */
FelemMulReduce(&z, &z, &y); // z[i] < 2^59 + 2^14
FelemSqrReduce(&tmp3, &tmp3); // tmp3[i] < 2^59 + 2^14, tmp3 = Y^4
left--;
if (left > 0) {
/* W = W*Y^4 */
FelemMulReduce(&w, &tmp3, &w); // w[i] < 2^59 + 2^14
}
/* Y = 2*A*(B-X)-Y^4 */
FelemMulLimb(&tmp1, &a, 2); // tmp1[i] < 2^60 + 2^15
FelemSub(&tmp2, &b, &x); // b[i] < 5*2^59 + 2^14
FelemMul(<mp1, &tmp1, &tmp2); // ltmp1[i] < 17*(5*2^119 + 6*2^74 + 2^29) < 2^126
LongFelemDiff(<mp1, &tmp3); // ltmp1[i] < 2^126 + 2^64
FelemReduce(&y, <mp1);
}
/* Y = Y/2 */
FelemDivTwo(&pointOut->y, &y);
FelemAssign(&pointOut->x, &x);
FelemAssign(&pointOut->z, &z);
}
/*
* Pre-computation table of base point G, which contains the X, Y, Z coordinates of n*G.
*
* index corresponding bit Value of n
* 0 0 0 0 0 0 + 0 + 0 + 0
* 1 0 0 0 1 0 + 0 + 0 + 1
* 2 0 0 1 0 0 + 0 + 2^130 + 0
* 3 0 0 1 1 0 + 0 + 2^130 + 1
* 4 0 1 0 0 0 + 2^260 + 0 + 0
* 5 0 1 0 1 0 + 2^260 + 0 + 1
* 6 0 1 1 0 0 + 2^260 + 2^130 + 0
* 7 0 1 1 1 0 + 2^260 + 2^130 + 1
* 8 1 0 0 0 2^390 + 0 + 0 + 0
* 9 1 0 0 1 2^390 + 0 + 0 + 1
* 10 1 0 1 0 2^390 + 0 + 2^130 + 0
* 11 1 0 1 1 2^390 + 0 + 2^130 + 1
* 12 1 1 0 0 2^390 + 2^260 + 0 + 0
* 13 1 1 0 1 2^390 + 2^260 + 0 + 1
* 14 1 1 1 0 2^390 + 2^260 + 2^130 + 0
* 15 1 1 1 1 2^390 + 2^260 + 2^130 + 1
*/
static const Point PRE_COMPUTE_G[TABLE_G_SIZE] = {
{
{{0, 0, 0, 0, 0, 0, 0, 0, 0}},
{{0, 0, 0, 0, 0, 0, 0, 0, 0}},
{{0, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x017e7e31c2e5bd66, 0x022cf0615a90a6fe, 0x00127a2ffa8de334,
0x01dfbf9d64a3f877, 0x006b4d3dbaa14b5e, 0x014fed487e0a2bd8,
0x015b4429c6481390, 0x03a73678fb2d988e, 0x00c6858e06b70404}},
{{0x00be94769fd16650, 0x031c21a89cb09022, 0x039013fad0761353,
0x02657bd099031542, 0x03273e662c97ee72, 0x01e6d11a05ebef45,
0x03d1bd998f544495, 0x03001172297ed0b1, 0x011839296a789a3b}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x0373faacbc875bae, 0x00f325023721c671, 0x00f666fd3dbde5ad,
0x01a6932363f88ea7, 0x01fc6d9e13f9c47b, 0x03bcbffc2bbf734e,
0x013ee3c3647f3a92, 0x029409fefe75d07d, 0x00ef9199963d85e5}},
{{0x011173743ad5b178, 0x02499c7c21bf7d46, 0x035beaeabb8b1a58,
0x00f989c4752ea0a3, 0x0101e1de48a9c1a3, 0x01a20076be28ba6c,
0x02f8052e5eb2de95, 0x01bfe8f82dea117c, 0x0160074d3c36ddb7}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x012f3fc373393b3b, 0x03d3d6172f1419fa, 0x02adc943c0b86873,
0x00d475584177952b, 0x012a4d1673750ee2, 0x00512517a0f13b0c,
0x02b184671a7b1734, 0x0315b84236f1a50a, 0x00a4afc472edbdb9}},
{{0x00152a7077f385c4, 0x03044007d8d1c2ee, 0x0065829d61d52b52,
0x00494ff6b6631d0d, 0x00a11d94d5f06bcf, 0x02d2f89474d9282e,
0x0241c5727c06eeb9, 0x0386928710fbdb9d, 0x01f883f727b0dfbe}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x019b0c3c9185544d, 0x006243a37c9d97db, 0x02ee3cbe030a2ad2,
0x00cfdd946bb51e0d, 0x0271c00932606b91, 0x03f817d1ec68c561,
0x03f37009806a369c, 0x03c1f30baf184fd5, 0x01091022d6d2f065}},
{{0x0292c583514c45ed, 0x0316fca51f9a286c, 0x00300af507c1489a,
0x0295f69008298cf1, 0x02c0ed8274943d7b, 0x016509b9b47a431e,
0x02bc9de9634868ce, 0x005b34929bffcb09, 0x000c1a0121681524}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x0286abc0292fb9f2, 0x02665eee9805b3f7, 0x01ed7455f17f26d6,
0x0346355b83175d13, 0x006284944cd0a097, 0x0191895bcdec5e51,
0x02e288370afda7d9, 0x03b22312bfefa67a, 0x01d104d3fc0613fe}},
{{0x0092421a12f7e47f, 0x0077a83fa373c501, 0x03bd25c5f696bd0d,
0x035c41e4d5459761, 0x01ca0d1742b24f53, 0x00aaab27863a509c,
0x018b6de47df73917, 0x025c0b771705cd01, 0x01fd51d566d760a7}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x01dd92ff6b0d1dbd, 0x039c5e2e8f8afa69, 0x0261ed13242c3b27,
0x0382c6e67026e6a0, 0x01d60b10be2089f9, 0x03c15f3dce86723f,
0x03c764a32d2a062d, 0x017307eac0fad056, 0x018207c0b96c5256}},
{{0x0196a16d60e13154, 0x03e6ce74c0267030, 0x00ddbf2b4e52a5aa,
0x012738241bbf31c8, 0x00ebe8dc04685a28, 0x024c2ad6d380d4a2,
0x035ee062a6e62d0e, 0x0029ed74af7d3a0f, 0x00eef32aec142ebd}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x00c31ec398993b39, 0x03a9f45bcda68253, 0x00ac733c24c70890,
0x00872b111401ff01, 0x01d178c23195eafb, 0x03bca2c816b87f74,
0x0261a9af46fbad7a, 0x0324b2a8dd3d28f9, 0x00918121d8f24e23}},
{{0x032bc8c1ca983cd7, 0x00d869dfb08fc8c6, 0x01693cb61fce1516,
0x012a5ea68f4e88a8, 0x010869cab88d7ae3, 0x009081ad277ceee1,
0x033a77166d064cdc, 0x03955235a1fb3a95, 0x01251a4a9b25b65e}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x00148a3a1b27f40b, 0x0123186df1b31fdc, 0x00026e7beaad34ce,
0x01db446ac1d3dbba, 0x0299c1a33437eaec, 0x024540610183cbb7,
0x0173bb0e9ce92e46, 0x02b937e43921214b, 0x01ab0436a9bf01b5}},
{{0x0383381640d46948, 0x008dacbf0e7f330f, 0x03602122bcc3f318,
0x01ee596b200620d6, 0x03bd0585fda430b3, 0x014aed77fd123a83,
0x005ace749e52f742, 0x0390fe041da2b842, 0x0189a8ceb3299242}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x012a19d6b3282473, 0x00c0915918b423ce, 0x023a954eb94405ae,
0x00529f692be26158, 0x0289fa1b6fa4b2aa, 0x0198ae4ceea346ef,
0x0047d8cdfbdedd49, 0x00cc8c8953f0f6b8, 0x001424abbff49203}},
{{0x0256732a1115a03a, 0x0351bc38665c6733, 0x03f7b950fb4a6447,
0x000afffa94c22155, 0x025763d0a4dab540, 0x000511e92d4fc283,
0x030a7e9eda0ee96c, 0x004c3cd93a28bf0a, 0x017edb3a8719217f}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x011de5675a88e673, 0x031d7d0f5e567fbe, 0x0016b2062c970ae5,
0x03f4a2be49d90aa7, 0x03cef0bd13822866, 0x03f0923dcf774a6c,
0x0284bebc4f322f72, 0x016ab2645302bb2c, 0x01793f95dace0e2a}},
{{0x010646e13527a28f, 0x01ca1babd59dc5e7, 0x01afedfd9a5595df,
0x01f15785212ea6b1, 0x0324e5d64f6ae3f4, 0x02d680f526d00645,
0x0127920fadf627a7, 0x03b383f75df4f684, 0x0089e0057e783b0a}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x00f334b9eb3c26c6, 0x0298fdaa98568dce, 0x01c2d24843a82292,
0x020bcb24fa1b0711, 0x02cbdb3d2b1875e6, 0x0014907598f89422,
0x03abe3aa43b26664, 0x02cbf47f720bc168, 0x0133b5e73014b79b}},
{{0x034aab5dab05779d, 0x00cdc5d71fee9abb, 0x0399f16bd4bd9d30,
0x03582fa592d82647, 0x02be1cdfb775b0e9, 0x0034f7cea32e94cb,
0x0335a7f08f56f286, 0x03b707e9565d1c8b, 0x0015c946ea5b614f}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x024676f6cff72255, 0x00d14625cac96378, 0x00532b6008bc3767,
0x01fc16721b985322, 0x023355ea1b091668, 0x029de7afdc0317c3,
0x02fc8a7ca2da037c, 0x02de1217d74a6f30, 0x013f7173175b73bf}},
{{0x0344913f441490b5, 0x0200f9e272b61eca, 0x0258a246b1dd55d2,
0x03753db9ea496f36, 0x025e02937a09c5ef, 0x030cbd3d14012692,
0x01793a67e70dc72a, 0x03ec1d37048a662e, 0x006550f700c32a8d}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x00d3f48a347eba27, 0x008e636649b61bd8, 0x00d3b93716778fb3,
0x004d1915757bd209, 0x019d5311a3da44e0, 0x016d1afcbbe6aade,
0x0241bf5f73265616, 0x0384672e5d50d39b, 0x005009fee522b684}},
{{0x029b4fab064435fe, 0x018868ee095bbb07, 0x01ea3d6936cc92b8,
0x000608b00f78a2f3, 0x02db911073d1c20f, 0x018205938470100a,
0x01f1e4964cbe6ff2, 0x021a19a29eed4663, 0x01414485f42afa81}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x01612b3a17f63e34, 0x03813992885428e6, 0x022b3c215b5a9608,
0x029b4057e19f2fcb, 0x0384059a587af7e6, 0x02d6400ace6fe610,
0x029354d896e8e331, 0x00c047ee6dfba65e, 0x0037720542e9d49d}},
{{0x02ce9eed7c5e9278, 0x0374ed703e79643b, 0x01316c54c4072006,
0x005aaa09054b2ee8, 0x002824000c840d57, 0x03d4eba24771ed86,
0x0189c50aabc3bdae, 0x0338c01541e15510, 0x00466d56e38eed42}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x007efd8330ad8bd6, 0x02465ed48047710b, 0x0034c6606b215e0c,
0x016ae30c53cbf839, 0x01fa17bd37161216, 0x018ead4e61ce8ab9,
0x005482ed5f5dee46, 0x037543755bba1d7f, 0x005e5ac7e70a9d0f}},
{{0x0117e1bb2fdcb2a2, 0x03deea36249f40c4, 0x028d09b4a6246cb7,
0x03524b8855bcf756, 0x023d7d109d5ceb58, 0x0178e43e3223ef9c,
0x0154536a0c6e966a, 0x037964d1286ee9fe, 0x0199bcd90e125055}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}
};
/*
* Pre-computation table of base point G, which contains the X, Y, Z coordinates of n*G.
*
* index corresponding bit value of n
* 0 0 0 0 0 0 + 0 + 0 + 0
* 1 0 0 0 1 0 + 0 + 0 + 2^65
* 2 0 0 1 0 0 + 0 + 2^195 + 0
* 3 0 0 1 1 0 + 0 + 2^195 + 2^65
* 4 0 1 0 0 0 + 2^325 + 0 + 0
* 5 0 1 0 1 0 + 2^325 + 0 + 2^65
* 6 0 1 1 0 0 + 2^325 + 2^195 + 0
* 7 0 1 1 1 0 + 2^325 + 2^195 + 2^65
* 8 1 0 0 0 2^455 + 0 + 0 + 0
* 9 1 0 0 1 2^455 + 0 + 0 + 2^65
* 10 1 0 1 0 2^455 + 0 + 2^195 + 0
* 11 1 0 1 1 2^455 + 0 + 2^195 + 2^65
* 12 1 1 0 0 2^455 + 2^325 + 0 + 0
* 13 1 1 0 1 2^455 + 2^325 + 0 + 2^65
* 14 1 1 1 0 2^455 + 2^325 + 2^195 + 0
* 15 1 1 1 1 2^455 + 2^325 + 2^195 + 2^65
*/
static const Point PRE_COMPUTE_G2[TABLE_G_SIZE] = {
{
{{0, 0, 0, 0, 0, 0, 0, 0, 0}},
{{0, 0, 0, 0, 0, 0, 0, 0, 0}},
{{0, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x0192b0164b374ff4, 0x037b520497f54a7c, 0x00ac45dfa717d3aa,
0x012692d390795d21, 0x013153d4af815b65, 0x01dda688f88c3a92,
0x0205e32bd883b127, 0x025156b962597ab5, 0x00a54cc9cfcf7717}},
{{0x00fe2ea43f30741f, 0x0144a9495978f5d7, 0x035adaea005bd79c,
0x009dff281db66901, 0x00166a36786b2593, 0x01d7f68c07aa0052,
0x013e05225075d36d, 0x03181b67caeea6b5, 0x009004fc6adc182a}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x0287bbca1236bec1, 0x03aaf618239ad718, 0x013ef15fcd3c6c16,
0x031f697f988c94c6, 0x01ac806cb8d4ee71, 0x0035f8035894c512,
0x00a16689152cf169, 0x02236a87815c0f48, 0x014f6480d486bbf5}},
{{0x03f70ab3fe2753e3, 0x03d291808faf7e0d, 0x00d7d89caf63a562,
0x029ead2c77ee5cd6, 0x022c8c3421387422, 0x02e384f360359525,
0x01901927d338b4bd, 0x0010c294d54a76b1, 0x00c739a28761a676}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x0321984bf604e26a, 0x00a0a4346e1beaa6, 0x03959055560b38f4,
0x001c383384c9b58c, 0x013212bf16c0badc, 0x00fc4f13c1530004,
0x0297632bcdf70503, 0x0306dbd604f5574d, 0x016c53a4d13a129b}},
{{0x03534a0ccd1d6c44, 0x02279af4660bfa03, 0x030eb700f21771d7,
0x01134017e2c6529e, 0x0237abadf41d7409, 0x03547fae79ff1ce6,
0x027b74026ac60650, 0x038912af6d6a8213, 0x00c3257758f97db5}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x037d9850fb6f765b, 0x01b6f2b4333f3817, 0x025e9d97d6f42afe,
0x00a0ddfdfa42799a, 0x02bfc71aab1b4029, 0x0378d9bd912c361e,
0x012c4f53cffd5151, 0x03a0621175f5d2ca, 0x0017e0822ef93f88}},
{{0x03f7c1d7104d2069, 0x03848b7b03f6c63f, 0x003395646b614e53,
0x0342d1dd97dbc1e9, 0x022cb3def43f2341, 0x02a5f4833f79b757,
0x037b25687d324787, 0x031f409c8d51daf2, 0x010bb03f98dc9303}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x03efcaf76c0f7bd7, 0x015b1ffdf6ccf484, 0x0263903e662a439d,
0x036dfdd7c185fe97, 0x015b51f55e640b08, 0x01b1764270cbce73,
0x01e346d1bb5c8f2a, 0x03199be2199e0b68, 0x004adb8d3d68e650}},
{{0x019bce039c0da6bf, 0x0280560629ade3b2, 0x01418eb6001c82e3,
0x01e464b38910b655, 0x02b21034d1a402e4, 0x028c2df0b056c5fa,
0x032be9714380fe04, 0x01f9ecd5a9a2fcca, 0x015aa21ec32e0387}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x036ad61ba5561dd5, 0x02dab309a8810a66, 0x037393ceee004b75,
0x001e6bf8a4921c61, 0x0316b2aa5307a051, 0x0014c93b7032e644,
0x03f6b33b796d11e2, 0x023d7387badaa578, 0x003387854547b6ca}},
{{0x002d4c5b57434eda, 0x01d6e1888a73d938, 0x0018f0f64605d2fa,
0x028a20eeb35b0cc6, 0x03b68c858d509955, 0x01141d740c8bd567,
0x010750725080144c, 0x023d6ac06393f441, 0x0042923f464fb5d1}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x037549a3c618e088, 0x008b414778fa66e4, 0x00723b6b05db1367,
0x013e930419c79520, 0x0191ed1c4447ff41, 0x00bee132be6a81cb,
0x02fa7516973beafc, 0x02e25b501cead6d6, 0x01fdb7d1dc08792c}},
{{0x039cb1f8f679b9d1, 0x0083db2827d85eaf, 0x03b023aa80726182,
0x022a7457eb1c3efa, 0x03caef438de54158, 0x033997a18583466f,
0x02d7bffa14e33c59, 0x001b92a9cd69ce59, 0x0113258b03a75ad8}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x0324c5b4c56caae5, 0x0151cedc6869fdbe, 0x039370cf6ff1d385,
0x00d2d6b3a7948969, 0x0126b6384f3cdb06, 0x02f045c111b79e63,
0x00519f9f1ede134e, 0x03baffa03938dd55, 0x0179812e76db6349}},
{{0x00b69f323b354956, 0x01e0bb3f034a976c, 0x02befa0dff80f27c,
0x0098b221eb08aecb, 0x030ca3bf38ae8e58, 0x01327945cb922185,
0x0308de377b1b7b43, 0x03ab15750b28636d, 0x0091c1b0482a4305}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x02c1b0be6b746613, 0x00478b27bfbe1387, 0x03ac86e5d9c6a2d3,
0x034f25d578d34127, 0x014e05b75ec6fecc, 0x01f44f38b4e2189f,
0x00660fddda38b664, 0x03d587c9195d6412, 0x00e9dcec7d477b78}},
{{0x03321366097b5fe6, 0x011364f5be162f87, 0x03d074359e750aaa,
0x01d55171921585a2, 0x022527bb5c6eb7c7, 0x01428f6af0426fe3,
0x0036bb94e1d4d74e, 0x03c7c757a44dbe6a, 0x0088a86c9ed6cbef}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x02bff33e6cbff097, 0x019cccbe703a64a6, 0x01e7d4c24e09e350,
0x021908a33eaf46a0, 0x01a07762f8cc7516, 0x01e12df29d8644c9,
0x0098c656997c8284, 0x0373d9622e713265, 0x01ff6b101932f0be}},
{{0x0048f9e92e2c1256, 0x033fae66bf45eb34, 0x0341ddb09e352f2b,
0x0019a6a6560f97fe, 0x02cda473f1bd03ab, 0x013c344018f55636,
0x00329598b2276e7e, 0x0388a96e2249b63f, 0x00b6d123f38483d2}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x02a97232bae87062, 0x0069587df4826cd5, 0x021402a5fdf14035,
0x026f406d0b49dc31, 0x01efc862b95739c4, 0x00a6e35dc23a4083,
0x0385b4e2faa85fd8, 0x01deae552ff5231e, 0x019e03275123852a}},
{{0x0120d17ebd7a996d, 0x00a56e635a2ab069, 0x03a2d775353348fe,
0x02c60edc1e521033, 0x01078fbf7ab9fefc, 0x0375262d1601e76e,
0x00d963629d272a65, 0x027c82575888f1bb, 0x013629c8c2a9841f}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x02634027d95abe73, 0x01c2e2ef1799e9c6, 0x02eedf3cf13b5ffc,
0x0060e6a5de211043, 0x01a7806f233bb516, 0x0355633a88a8638c,
0x01dcbcc58d7d5dcc, 0x02071903acda896f, 0x01dce602b80ca444}},
{{0x013c47920922ddb6, 0x013f221e68d728d8, 0x0128ca5192ab3cb8,
0x002a19a405f6d544, 0x0074330020d40403, 0x0085611df0ce1a97,
0x028fda4edff5fc93, 0x0303b834136862a5, 0x00f443f3b7cd86cf}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x00f5614d1673ed2e, 0x03e442a78b43dbb3, 0x02408ebf00c8324c,
0x0043b6f94f69ea8b, 0x02a32bb5a7c8f6ac, 0x02b7758b243883fa,
0x00f4bd68881089bf, 0x03f61eb91693a587, 0x001d298cf9f11b0b}},
{{0x00ee97751d8d6f36, 0x0318dcb929941397, 0x022cf9840311e590,
0x02fc6b1da06aae09, 0x0134298323032dcf, 0x00d7b9072d9bb059,
0x01a099906260485b, 0x037d9ca3796ce405, 0x0147a49ba1ca4467}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x030993f7ba6f7b2c, 0x019720e705ec5bc1, 0x001c9ee10167839e,
0x0378869753d92351, 0x02bb1ace9f456b2e, 0x0336d504d809599d,
0x02d549f9910bffd0, 0x019c6284b1ec6150, 0x00c67a7fcc4ffb2c}},
{{0x022fe778c100a1dc, 0x01d14e5e8e693cb1, 0x03c139f63d3a44d9,
0x01d0b45344a8a5c9, 0x0253f5e630be559d, 0x01eaad81980912b1,
0x003febb5458d1ece, 0x01c6d59feaae8cfd, 0x01c3558976ca7dd7}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}, {
{{0x01ec0d67348526ae, 0x0334bb61a85f8ed5, 0x0286ba7fecf2d764,
0x01600344518c0c0c, 0x034e83852188ae46, 0x023d71754d3c015c,
0x010eeccfb5a5a825, 0x004247e9a02cded9, 0x0187b9aa607ca24c}},
{{0x00e77b967bc701ac, 0x022a2a00ef91bdc3, 0x01fa7bfaf46148d2,
0x003feb6276929d54, 0x028ad7f3a3f075ca, 0x035f6ba48b87bd53,
0x03fd400e74a80040, 0x0150a714837d88b5, 0x003969fa95c4e093}},
{{1, 0, 0, 0, 0, 0, 0, 0, 0}}
}
};
/* Select the point with subscript index in the table and place it in the point.
The anti-side channel processing exists. */
static void GetPointFromTable(Point *point, const Point table[],
uint32_t pointNum, const uint64_t index)
{
uint64_t mask, i;
for (i = 0; i < pointNum; i++) {
/* If i is equal to index, the last mask is all Fs. Otherwise, the last mask is all 0s. */
/* Shift rightwards by 63 bits and get the most significant bit. */
mask = (0 - (i ^ index)) >> 63;
mask--;
/* Conditionally assign a value, which takes effect only when i = index. */
FelemPointAssignWithMask(point, &table[i], mask);
}
}
/*
* Four bits at a fixed interval are intercepted from the scalar k1,
and then decoded to obtain the index of the precomputation table G
* input:
* k1 indicates a array of scalars, consisting of nine 64-bit data in little-endian order.
* i Corresponding bit. The value is an integer ranging [0, 65]
* output:
* Value range: 0–15, indicating the index of the pre-computation table.
*/
static void GetIndexOfTableG(uint64_t *value1, uint64_t *value2, const Array64 *k1, uint32_t i)
{
// The scalar k1 contains a maximum of 521 bits. 521 = 65 * 4 * 2 + 1. Therefore, one bit needs special processing.
if (i == 0) {
*value1 = k1->data[0] & 1; // get the least significant bit of the scalar
*value2 = 0;
} else {
uint64_t bits1, bits2;
bits1 = GET_ARRAY64_BIT(k1, i + 390) << 3; // 3rd corresponds to the scalar k1 bit: [391, 455]
bits1 |= GET_ARRAY64_BIT(k1, i + 260) << 2; // 2nd corresponds to the scalar k1 bit: [261, 325]
bits1 |= GET_ARRAY64_BIT(k1, i + 130) << 1; // 1st corresponds to the scalar k1 bit: [131, 195]
bits1 |= GET_ARRAY64_BIT(k1, i); // 0th corresponds to the scalar k1 bit: [1 , 65]
*value1 = bits1;
bits2 = GET_ARRAY64_BIT(k1, i + 455) << 3; // 3rd corresponds to the scalar k1 bit: [456, 520]
bits2 |= GET_ARRAY64_BIT(k1, i + 325) << 2; // 2nd corresponds to the scalar k1 bit: [326, 390]
bits2 |= GET_ARRAY64_BIT(k1, i + 195) << 1; // 1st corresponds to the scalar k1 bit: [196, 260]
bits2 |= GET_ARRAY64_BIT(k1, i + 65); // 0th corresponds to the scalar k1 bit: [66 , 130]
*value2 = bits2;
}
}
/*
* Six consecutive bits (i-1 to i+4) are intercepted from the scalar k2,
and then decoded to obtain an index of the precomputation table P and a sign of a point
* input:
* k2 indicates a array of scalars, consisting of nine 64-bit data in little-endian order.
* i Corresponding bit. The value range is [0, 520], which can be exactly divisible by 5.
* output:
* sign 0 or 1: indicates whether the corresponding point needs negation.
* value 0-16: indicates the index of the pre-computation table.
*/
static void GetIndexOfTableP(uint64_t *sign, uint64_t *value, const Array64 *k2, uint32_t i)
{
uint32_t s, v;
uint64_t bits;
if (i == 0) {
// When i is the least significant bit, only the four least significant bits of k2 are truncated.
bits = k2->data[0] << 1;
} else {
uint32_t num = (i - 1) / 64; // Each uint64_t contains 64 bits.
uint32_t shift = (i - 1) % 64; // Each uint64_t contains 64 bits.
bits = (k2->data[num] >> shift);
if (shift + 6 > 64) { // (64 - shift) bits have been truncated. If it is less than 6 bits, continue truncating.
bits |= k2->data[num + 1] << (64 - shift);
}
}
// truncates six bits. (5-bit signed number complement + 1-bit low-order carry flag)
bits &= (1 << (WINDOW_SIZE + 1)) - 1;
DecodeScalarCode(&s, &v, (uint32_t)bits);
*sign = s;
*value = v;
}
/*
* Calculation point coordinate r = k1 * G + k2 * P
* input:
* k1 a scalar multiplied by point G. If k1 is null, it will be not calculated.
* k2 a scalar multiplied by point P. If k1 is null, it will be not calculated.
* preCompute P-point precalculation table (0P, 1P, ... 16P) 17 points in total.
* output:
* r Point of the calculation result
*/
static void FelemPointMul(Point *r, const Array64 *k1, const Array64 *k2,
const Point preCompute[TABLE_P_SIZE])
{
Point res = {0}; // res is initialized to 0.
Point tmp = {0};
Felem negY;
uint64_t mask, sign, index, index2;
bool computeG = k1 != NULL;
bool computeP = k2 != NULL;
bool isZero = true; // Whether the res point is zero.
int32_t step = computeP ? 5 : 1; // Times of one cycle multiple the point
/* P point multiplication requires 520 times, and G point multiplication requires 65 times. */
for (int32_t i = computeP ? 520 : 65; i >= 0; i -= step) {
/* If the point out remains zero, the double point operation has no effect, skipping */
if (!isZero) {
FelemPointMultDouble(&res, &res, step);
}
// Calculate the multiplication of point G. i starts calculation in the range [0, 65].
if (computeG && (i <= 65)) {
/* If the G-point multiplication starts, the step of the multiple point needs to be changed to 1. */
step = 1;
/* Obtain the corresponding bits. */
GetIndexOfTableG(&index, &index2, k1, (uint32_t)i);
/* Add the points in Table 1 */
if (isZero) {
/* If the point out is zero, the point addition operation is equivalent to direct assignment. */
GetPointFromTable(&res, PRE_COMPUTE_G, TABLE_G_SIZE, index);
isZero = false;
} else {
GetPointFromTable(&tmp, PRE_COMPUTE_G, TABLE_G_SIZE, index);
// precomputation table G is all affine coordinates, use the hybrid coordinates for acceleration.
FelemPointMixAdd(&res, &res, &tmp);
}
/* Add the points in Table 2 */
if (i != 0) {
GetPointFromTable(&tmp, PRE_COMPUTE_G2, TABLE_G_SIZE, index2);
// precomputation table G2 is all affine coordinates, use the hybrid coordinates for acceleration.
FelemPointMixAdd(&res, &res, &tmp);
}
}
// Calculate the multiplication of point P. The calculation is performed every 5 bits.
if (computeP && (i % 5 == 0)) {
/* Obtain the corresponding bits. */
GetIndexOfTableP(&sign, &index, k2, (uint32_t)i);
GetPointFromTable(&tmp, preCompute, TABLE_P_SIZE, index);
/* If the value is a negative number, the point is also negative. */
FelemNeg(&negY, &tmp.y);
mask = 0 - sign;
FelemAssignWithMask(&tmp.y, &negY, mask);
/* execute point addition */
if (isZero) {
/* If the point out is zero, the point addition operation is equivalent to direct assignment. */
FelemPointAssign(&res, &tmp);
isZero = false;
} else {
// precomputation table P is not necessarily affine coordinates, using Jacobian coordinates addition.
FelemPointAdd(&res, &res, &tmp);
}
}
}
FelemPointAssign(r, &res);
}
/*
* calculate pre-calculation table for the P point
* input:
* pt P point
* output:
* preCompute precalculation table of P point, (0P, 1P, ... 16P) 17 points in total
*/
static int32_t InitPreComputeTable(Point preCompute[TABLE_P_SIZE], const ECC_Point *pt)
{
int32_t ret;
/* zero point */
FelemSetLimb(&preCompute[0].x, 0);
FelemSetLimb(&preCompute[0].y, 0);
FelemSetLimb(&preCompute[0].z, 0);
/* 1x point */
GOTO_ERR_IF_EX(BN2Felem(&preCompute[1].x, &pt->x), ret);
GOTO_ERR_IF_EX(BN2Felem(&preCompute[1].y, &pt->y), ret);
GOTO_ERR_IF_EX(BN2Felem(&preCompute[1].z, &pt->z), ret);
/* 2 to 16x points */
for (uint32_t i = 2; i < TABLE_P_SIZE; i++) {
if ((i & 1) == 0) {
/* If multiple for even times, use the multiple point formula (2n)*P = 2*(n*P), where i == 2n */
FelemPointDouble(&preCompute[i], &preCompute[i / 2]);
} else {
/* If multiple for odd times, use the point addition formula n*P = P + (n-1)*P, where i == n */
FelemPointAdd(&preCompute[i], &preCompute[1], &preCompute[i - 1]);
}
}
ERR:
return ret;
}
static int32_t ComputePointMulAdd(Point *out, const Array64 *binG, const Array64 *binP, const ECC_Point *pt)
{
// The stack space of a function cannot exceed 4096 bytes.
// Therefore, the precomputation table is allocated by the function.
Point preCompute[TABLE_P_SIZE]; /* Pre-calculation table of point pt */
int32_t ret = InitPreComputeTable(preCompute, pt);
if (ret != CRYPT_SUCCESS) {
return ret;
}
FelemPointMul(out, binG, binP, preCompute);
return CRYPT_SUCCESS;
}
/* Calculate r = k1 * G + k2 * pt */
int32_t ECP521_PointMulAdd(ECC_Para *para, ECC_Point *r,
const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt)
{
int32_t ret;
Array64 binG = {0};
Array64 binP = {0};
Point out;
uint32_t len;
/* Input parameter check */
GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP521), ret);
GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP521), ret);
GOTO_ERR_IF(CheckBnValid(k1, FELEM_BITS), ret);
GOTO_ERR_IF(CheckBnValid(k2, FELEM_BITS), ret);
GOTO_ERR_IF(CheckPointValid(pt, CRYPT_ECC_NISTP521), ret);
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
/* Convert the input BigNum */
len = NUM_LIMBS;
GOTO_ERR_IF(BN_Bn2U64Array(k1, binG.data, &len), ret);
len = NUM_LIMBS;
GOTO_ERR_IF(BN_Bn2U64Array(k2, binP.data, &len), ret);
/* Calculate */
GOTO_ERR_IF_EX(ComputePointMulAdd(&out, &binG, &binP, pt), ret);
/* Output result */
GOTO_ERR_IF_EX(Felem2BN(&r->x, &out.x), ret);
GOTO_ERR_IF_EX(Felem2BN(&r->y, &out.y), ret);
GOTO_ERR_IF_EX(Felem2BN(&r->z, &out.z), ret);
ERR:
return ret;
}
/* Calculate r = k * pt; If pt is NULL, calculate r = k * G. This is the ConstTime processing function. */
int32_t ECP521_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt)
{
int32_t ret;
Array64 bin = {0};
uint32_t len = NUM_LIMBS;
Point preCompute[TABLE_P_SIZE]; /* Pre-calculation table of Point pt */
Point out;
/* Input parameter check */
GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP521), ret);
GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP521), ret);
GOTO_ERR_IF(CheckBnValid(k, FELEM_BITS), ret);
if (pt != NULL) {
if (pt->id != CRYPT_ECC_NISTP521) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
}
/* Convert the input BigNum */
GOTO_ERR_IF(BN_Bn2U64Array(k, bin.data, &len), ret);
/* Calculate */
if (pt != NULL) {
GOTO_ERR_IF_EX(InitPreComputeTable(preCompute, pt), ret);
FelemPointMul(&out, NULL, &bin, preCompute);
} else {
FelemPointMul(&out, &bin, NULL, NULL);
}
/* Output result */
GOTO_ERR_IF_EX(Felem2BN(&r->x, &out.x), ret);
GOTO_ERR_IF_EX(Felem2BN(&r->y, &out.y), ret);
GOTO_ERR_IF_EX(Felem2BN(&r->z, &out.z), ret);
ERR:
return ret;
}
static int32_t MakeAffineWithInv(ECC_Point *r, const ECC_Point *a, const Felem *zInv)
{
int32_t ret;
Felem x, y, tmp;
GOTO_ERR_IF_EX(BN2Felem(&x, &a->x), ret);
GOTO_ERR_IF_EX(BN2Felem(&y, &a->y), ret);
FelemMulReduce(&y, &y, zInv); // y/z
FelemSqrReduce(&tmp, zInv); // 1/(z^2)
FelemMulReduce(&x, &x, &tmp); // x/(z^2)
FelemMulReduce(&y, &y, &tmp); // y/(z^3)
GOTO_ERR_IF_EX(Felem2BN(&r->x, &x), ret);
GOTO_ERR_IF_EX(Felem2BN(&r->y, &y), ret);
GOTO_ERR_IF_EX(BN_SetLimb(&r->z, 1), ret);
ERR:
return ret;
}
/* Convert a point to affine coordinates. */
int32_t ECP521_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt)
{
int32_t ret;
Felem z, zInv;
/* Input parameter check */
GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP521), ret);
GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP521), ret);
GOTO_ERR_IF(CheckPointValid(pt, CRYPT_ECC_NISTP521), ret);
/* Special data processing */
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
/* Convert the input data. */
GOTO_ERR_IF_EX(BN2Felem(&z, &pt->z), ret);
/* Calculate and output result */
FelemInv(&zInv, &z);
GOTO_ERR_IF_EX(MakeAffineWithInv(r, pt, &zInv), ret);
ERR:
return ret;
}
#endif /* defined(HITLS_CRYPTO_CURVE_NISTP521) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) */
|
2301_79861745/bench_create
|
crypto/ecc/src/ecp_nistp521.c
|
C
|
unknown
| 69,838
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef ECP_NISTP521_H
#define ECP_NISTP521_H
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_CURVE_NISTP521) && defined(HITLS_CRYPTO_NIST_USE_ACCEL)
#include "ecc_local.h"
#ifdef __cplusplus
extern "C" {
#endif
/**
* @brief Convert the point information pt to the affine coordinate system and refresh the data to r.
*
* @param para [IN] Curve parameters
* @param r [OUT] Output point information
* @param pt [IN] Input point information
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP521_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt);
/**
* @brief Calculate r = k1 * G + k2 * pt
*
* @param para [IN] Curve parameters
* @param r [OUT] Output point information
* @param k1 [IN] Scalar 1, with a maximum of 521 bits
* @param k2 [IN] Scalar 2, with a maximum of 521 bits
* @param pt [IN] Point data
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP521_PointMulAdd(ECC_Para *para, ECC_Point *r,
const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt);
/**
* @brief If pt != NULL, calculate r = k * pt; Otherwise, calculate r = k * G
*
* @param para [IN] Curve parameter information
* @param r [OUT] Output point information
* @param k [IN] A scalar with a maximum of 521 bits.
* @param pt [IN] Point data, which can be set to NULL.
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP521_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt);
#ifdef __cplusplus
}
#endif
#endif
#endif
|
2301_79861745/bench_create
|
crypto/ecc/src/ecp_nistp521.h
|
C
|
unknown
| 2,274
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ECC
#include "securec.h"
#include "bsl_sal.h"
#include "bsl_err_internal.h"
#include "crypt_utils.h"
#include "crypt_errno.h"
#include "ecc_local.h"
static bool BN_IsZeroOrOne(const BN_BigNum *bn)
{
return (BN_IsZero(bn) || BN_IsOne(bn));
}
int32_t ECP_PointAtInfinity(const ECC_Para *para, const ECC_Point *pt)
{
if (para == NULL || pt == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != pt->id) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
// If z is 0, the point is the infinite point (0 point).
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
return CRYPT_SUCCESS;
}
// Check whether the point is on the curve.
int32_t ECP_PointOnCurve(const ECC_Para *para, const ECC_Point *pt)
{
int32_t ret = 0;
uint32_t nistList[] = {CRYPT_ECC_NISTP224, CRYPT_ECC_NISTP256, CRYPT_ECC_NISTP384, CRYPT_ECC_NISTP521};
ret = ECP_PointAtInfinity(para, pt);
if (ret != CRYPT_SUCCESS) {
return ret;
}
// Do not check the point on the Jacobian coordinate system.
if (!BN_IsOne(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_NOT_AFFINE);
return CRYPT_ECC_POINT_NOT_AFFINE;
}
uint32_t bits = BN_Bits(para->p);
BN_Optimizer *opt = BN_OptimizerCreate();
BN_BigNum *y = BN_Create(bits);
BN_BigNum *x = BN_Create(bits);
BN_BigNum *dupA = BN_Dup(para->a);
BN_BigNum *dupB = BN_Dup(para->b);
if (opt == NULL || x == NULL || y == NULL || dupA == NULL || dupB == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
goto ERR;
}
if (para->method->bnMontDec != NULL) {
para->method->bnMontDec(dupA, para->montP);
para->method->bnMontDec(dupB, para->montP);
}
GOTO_ERR_IF(BN_ModSqr(x, &pt->x, para->p, opt), ret); // x^2
GOTO_ERR_IF(BN_ModMul(x, x, &pt->x, para->p, opt), ret); // x^3
if (ParamIdIsValid(para->id, nistList, sizeof(nistList) / sizeof(nistList[0]))) {
// Currently, only the NIST curve is supported(calculating x^3 - 3x).
// Other curves need to be expanded in the future.
GOTO_ERR_IF(BN_ModSub(x, x, &pt->x, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSub(x, x, &pt->x, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSub(x, x, &pt->x, para->p, opt), ret); // x^3 - 3x
} else {
// General implementation
GOTO_ERR_IF(BN_ModMul(y, dupA, &pt->x, para->p, opt), ret);
GOTO_ERR_IF(BN_ModAdd(x, x, y, para->p, opt), ret); // x^3 + ax
}
GOTO_ERR_IF(BN_ModAdd(x, x, dupB, para->p, opt), ret); // x^3 - 3x + b
GOTO_ERR_IF(BN_ModSqr(y, &pt->y, para->p, opt), ret); // y^2
if (BN_Cmp(x, y) != 0) {
ret = CRYPT_ECC_POINT_NOT_ON_CURVE;
BSL_ERR_PUSH_ERROR(ret);
}
ERR:
BN_Destroy(x);
BN_Destroy(y);
BN_Destroy(dupA);
BN_Destroy(dupB);
BN_OptimizerDestroy(opt);
return ret;
}
int32_t ECP_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt)
{
if (para == NULL || r == NULL || pt == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != pt->id || para->id != r->id) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
if (BN_IsOne(&pt->z)) {
return ECC_CopyPoint(r, pt);
}
int32_t ret;
uint32_t bits = BN_Bits(para->p);
BN_Optimizer *opt = BN_OptimizerCreate();
BN_BigNum *zz = BN_Create(bits);
BN_BigNum *inv = BN_Create(bits);
if (opt == NULL || zz == NULL || inv == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
GOTO_ERR_IF(BN_ModInv(inv, &pt->z, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSqr(zz, inv, para->p, opt), ret);
GOTO_ERR_IF(BN_ModMul(&r->x, &pt->x, zz, para->p, opt), ret);
GOTO_ERR_IF(BN_ModMul(zz, zz, inv, para->p, opt), ret);
GOTO_ERR_IF(BN_ModMul(&r->y, &pt->y, zz, para->p, opt), ret);
GOTO_ERR_IF(BN_SetLimb(&r->z, 1), ret);
ERR:
BN_Destroy(zz);
BN_Destroy(inv);
BN_OptimizerDestroy(opt);
return ret;
}
static int32_t Points2AffineParaCheck(const ECC_Para *para, ECC_Point *pt[], uint32_t ptNums)
{
if (para == NULL || pt == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ptNums == 0 || ptNums > PRE_COMPUTE_MAX_TABLELEN) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_WINDOW_TOO_MAX);
return CRYPT_ECC_POINT_WINDOW_TOO_MAX;
}
if (BN_IsZero(&pt[0]->z)) {
// If the first point is an infinite point, exit directly.
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
// Check whether the point ID matches.
uint32_t i;
for (i = 0; i < ptNums; i++) {
if (para->id != pt[i]->id) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
}
return CRYPT_SUCCESS;
}
static int32_t Points2AffineCreatTmpData(BN_BigNum *pt[PRE_COMPUTE_MAX_TABLELEN], uint32_t ptNums,
BN_BigNum **inv, BN_Optimizer **opt, const BN_BigNum *p)
{
uint32_t bits = BN_Bits(p);
*opt = BN_OptimizerCreate();
*inv = BN_Create(bits);
if (*opt == NULL || *inv == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
uint32_t i;
// Apply for pre-calculation table data.
for (i = 0; i < ptNums; i++) {
pt[i] = BN_Create(bits);
if (pt[i] == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
}
return CRYPT_SUCCESS;
}
static void Points2AffineDestroyTmpData(BN_BigNum *pt[PRE_COMPUTE_MAX_TABLELEN], uint32_t ptNums,
BN_BigNum *inv, BN_Optimizer *opt)
{
for (uint32_t i = 0; i < ptNums; i++) {
BN_Destroy(pt[i]);
}
BN_Destroy(inv);
BN_OptimizerDestroy(opt);
}
// Multiple points are converted to the affine coordinate system. pt[0] cannot be infinite.
int32_t ECP_Points2Affine(const ECC_Para *para, ECC_Point *pt[], uint32_t ptNums)
{
int32_t ret = Points2AffineParaCheck(para, pt, ptNums);
if (ret != CRYPT_SUCCESS) {
return ret;
}
BN_BigNum *t[PRE_COMPUTE_MAX_TABLELEN] = { 0 }; // pre-calculation table
BN_BigNum *inv = NULL;
BN_Optimizer *opt = NULL;
GOTO_ERR_IF(Points2AffineCreatTmpData(t, ptNums, &inv, &opt, para->p), ret);
// t[i] = z[0] * z[1]* ... * z[i]
GOTO_ERR_IF(BN_Copy(t[0], &pt[0]->z), ret);
uint32_t i;
for (i = 1; i < ptNums; i++) {
if (BN_IsZeroOrOne(&pt[i]->z)) {
GOTO_ERR_IF(BN_Copy(t[i], t[i - 1]), ret); // copy last one
continue;
}
GOTO_ERR_IF(BN_ModMul(t[i], t[i - 1], &pt[i]->z, para->p, opt), ret);
}
// inv = 1 / (z[0] * z[1] * .... * z[ptNums - 1])
GOTO_ERR_IF(BN_ModInv(inv, t[ptNums - 1], para->p, opt), ret);
// t[i] = 1/z[i]
for (i = ptNums - 1; i > 0; i--) {
if (BN_IsZeroOrOne(&pt[i]->z)) {
continue;
}
// t[i] *= z[0]*z[1]*...*z[i - 1] = 1/z[i]
GOTO_ERR_IF(BN_ModMul(t[i], t[i - 1], inv, para->p, opt), ret);
// inv *= z[i] = 1/(z[0]*z[1]*...z[i - 1])
GOTO_ERR_IF(BN_ModMul(inv, &pt[i]->z, inv, para->p, opt), ret);
}
GOTO_ERR_IF(BN_Copy(t[0], inv), ret); // inv = 1/z[0]
// Calculate x = x/(z^2); y = y/(z^3)
for (i = 0; i < ptNums; i++) {
if (BN_IsZeroOrOne(&pt[i]->z)) {
continue;
}
GOTO_ERR_IF(ECP_Point2AffineWithInv(para, pt[i], pt[i], t[i]), ret);
}
ERR:
Points2AffineDestroyTmpData(t, ptNums, inv, opt);
return ret;
}
// consttime
static int32_t ECP_PointCopyWithMask(ECC_Point *r, const ECC_Point *a, const ECC_Point *b, BN_UINT mask)
{
int32_t ret;
GOTO_ERR_IF(BN_CopyWithMask(&r->x, &a->x, &b->x, mask), ret);
GOTO_ERR_IF(BN_CopyWithMask(&r->y, &a->y, &b->y, mask), ret);
GOTO_ERR_IF(BN_CopyWithMask(&r->z, &a->z, &b->z, mask), ret);
ERR:
return ret;
}
int32_t ECP_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt)
{
if (para == NULL || r == NULL || k == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if ((para->id != r->id) || ((pt != NULL) && (para->id != pt->id))) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
if (pt != NULL && BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
if (BN_IsZero(k)) {
(void)BN_Zeroize(&r->z);
return CRYPT_SUCCESS;
}
if (BN_Cmp(k, para->n) == 0 && pt != NULL) {
// In this case, the consttime calculation is not required
// for checking whether the public key information is valid.
return ECP_PointMulFast(para, r, para->n, pt);
}
uint32_t i;
int32_t ret;
BN_UINT mask;
uint32_t bits;
ECC_Point *base = (pt != NULL) ? ECC_DupPoint(pt) : ECC_GetGFromPara(para);
ECC_Point *t = ECC_NewPoint(para);
BN_Optimizer *opt = BN_OptimizerCreate();
if (base == NULL || t == NULL || opt == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
// Convert base to affine.
GOTO_ERR_IF(ECP_Point2Affine(para, base, base), ret);
// Add salt to prevent side channels.
GOTO_ERR_IF(ECC_PointToMont(para, base, opt), ret);
GOTO_ERR_IF(ECC_CopyPoint(r, base), ret);
GOTO_ERR_IF(ECC_PointBlind(para, r), ret);
bits = BN_Bits(k);
for (i = bits - 1; i > 0; i--) {
GOTO_ERR_IF(para->method->pointDouble(para, r, r), ret);
GOTO_ERR_IF(para->method->pointAddAffine(para, t, r, base), ret);
mask = BN_GetBit(k, i - 1) ? 0 : BN_MASK;
// The last bit must be 1, and r must be updated to the latest data.
GOTO_ERR_IF(ECP_PointCopyWithMask(r, t, r, mask), ret);
}
ECC_PointFromMont(para, r);
ERR:
ECC_FreePoint(t);
ECC_FreePoint(base);
BN_OptimizerDestroy(opt);
return ret;
}
// Generate a BigNum equal to (p + 1) / 2
BN_BigNum *ECP_HalfPGet(const BN_BigNum *p)
{
int32_t ret;
uint32_t bits = BN_Bits(p);
BN_BigNum *halfP = BN_Create(bits + 1);
if (halfP == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
GOTO_ERR_IF_EX(BN_AddLimb(halfP, p, 1), ret);
GOTO_ERR_IF_EX(BN_Rshift(halfP, halfP, 1), ret);
return halfP;
ERR:
BN_Destroy(halfP);
return NULL;
}
// The z coordinate of point pt multiplied by z.
int32_t ECP_Point2AffineWithInv(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt, const BN_BigNum *inv)
{
if (para == NULL || r == NULL || pt == NULL || inv == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != pt->id || para->id != r->id) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
if (BN_IsZero(&pt->z)) {
// Infinite point multiplied by z is meaningless.
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
BN_Optimizer *opt = BN_OptimizerCreate();
if (opt == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
int32_t ret;
GOTO_ERR_IF(BN_ModSqr(&r->z, inv, para->p, opt), ret); // z = inv^2
GOTO_ERR_IF(BN_ModMul(&r->x, &pt->x, &r->z, para->p, opt), ret); // x = x * (inv^2)
GOTO_ERR_IF(BN_ModMul(&r->y, &pt->y, inv, para->p, opt), ret);
GOTO_ERR_IF(BN_ModMul(&r->y, &r->y, &r->z, para->p, opt), ret); // y = y * (inv^3)
GOTO_ERR_IF(BN_SetLimb(&r->z, 1), ret); // z = 1
ERR:
BN_OptimizerDestroy(opt);
return ret;
}
// Convert (x, y, z) to (x/z0^2, y/z0^3, z*z0)
static int32_t ECP_PointJacMulZ(const ECC_Para *para, ECC_Point *pt, const BN_BigNum *z, BN_Optimizer *opt)
{
if (BN_IsZero(&pt->z)) {
// Infinite point multiplied by z is meaningless.
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
uint32_t bits = BN_Bits(para->p);
BN_BigNum *t = BN_Create(bits);
if (t == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
int32_t ret;
GOTO_ERR_IF(BN_ModMul(&pt->z, &pt->z, z, para->p, opt), ret); // z = z * z0
GOTO_ERR_IF(BN_ModMul(&pt->y, &pt->y, z, para->p, opt), ret); // y = y * z0
GOTO_ERR_IF(BN_ModSqr(t, z, para->p, opt), ret); // t = z0^2
GOTO_ERR_IF(BN_ModMul(&pt->x, &pt->x, t, para->p, opt), ret); // x = x * (z0^2)
GOTO_ERR_IF(BN_ModMul(&pt->y, &pt->y, t, para->p, opt), ret); // y = y * (z0^3)
ERR:
BN_Destroy(t);
return ret;
}
/*
* relate to the paper "Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems"
* chapter 5.3 Third Countermeasure: Randomized Projective Coordinates
* reference: http://www.crypto-uni.lu/jscoron/publications/dpaecc.pdf
*/
int32_t ECC_PointBlind(const ECC_Para *para, ECC_Point *pt)
{
if (para == NULL || pt == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != pt->id) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
int32_t ret;
uint32_t bits = BN_Bits(para->p);
BN_BigNum *blind = BN_Create(bits);
BN_Optimizer *opt = BN_OptimizerCreate();
if (blind == NULL || opt == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
// Generate random numbers to randomize z.
GOTO_ERR_IF(BN_RandRangeEx(para->libCtx, blind, para->p), ret);
if (BN_IsZero(blind)) {
ret = CRYPT_ECC_POINT_BLIND_WITH_ZERO;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
GOTO_ERR_IF_EX(ECP_PointJacMulZ(para, pt, blind, opt), ret);
ERR:
BN_Destroy(blind);
BN_OptimizerDestroy(opt);
return ret;
}
int32_t ECP_PointCmp(const ECC_Para *para, const ECC_Point *a, const ECC_Point *b)
{
if (para == NULL || a == NULL || b == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != a->id || para->id != b->id) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
// If both points are infinite points, equality is returned.
if (BN_IsZero(&a->z) && BN_IsZero(&b->z)) {
return CRYPT_SUCCESS;
}
if (BN_IsZero(&a->z) || BN_IsZero(&b->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_NOT_EQUAL);
return CRYPT_ECC_POINT_NOT_EQUAL;
}
int32_t ret;
BN_Optimizer *opt = BN_OptimizerCreate();
ECC_Point *az = ECC_DupPoint(a);
ECC_Point *bz = ECC_DupPoint(b);
if (opt == NULL || az == NULL || bz == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
// Transfer a and b to the same z.
GOTO_ERR_IF(ECP_PointJacMulZ(para, az, &b->z, opt), ret);
GOTO_ERR_IF(ECP_PointJacMulZ(para, bz, &a->z, opt), ret);
if ((BN_Cmp(&az->x, &bz->x) != 0) || (BN_Cmp(&az->y, &bz->y) != 0)) {
ret = CRYPT_ECC_POINT_NOT_EQUAL;
BSL_ERR_PUSH_ERROR(ret);
}
ERR:
ECC_FreePoint(az);
ECC_FreePoint(bz);
BN_OptimizerDestroy(opt);
return ret;
}
int32_t ECP_PointCopy(const ECC_Para *para, ECC_Point *a, const ECC_Point *b)
{
(void)para;
int32_t ret;
a->id = b->id;
GOTO_ERR_IF(BN_Copy(&a->x, &b->x), ret);
GOTO_ERR_IF(BN_Copy(&a->y, &b->y), ret);
GOTO_ERR_IF(BN_Copy(&a->z, &b->z), ret);
ERR:
return ret;
}
// Cartesian coordinate point inversion.
int32_t ECP_PointInvertAtAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a)
{
if (para == NULL || r == NULL || a == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != r->id || para->id != a->id) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
if (BN_IsZero(&a->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
int32_t ret;
GOTO_ERR_IF(ECC_CopyPoint(r, a), ret);
GOTO_ERR_IF(BN_Sub(&r->y, para->p, &r->y), ret);
ERR:
return ret;
}
// The default ECP window length is 5 bits and only odd points are calculated.
#define WINDOW_TABLE_SIZE (PRE_COMPUTE_MAX_TABLELEN >> 1)
static int32_t ECP_PointPreCompute(const ECC_Para *para, ECC_Point *windows[], const ECC_Point *pt)
{
int32_t ret;
ECC_Point *doubleP = ECC_NewPoint(para);
windows[0] = ECC_DupPoint(pt);
BN_Optimizer *opt = NULL;
uint32_t i;
for (i = 1; i < WINDOW_TABLE_SIZE; i++) {
windows[i] = ECC_NewPoint(para);
}
if (doubleP == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
for (i = 0; i < WINDOW_TABLE_SIZE; i++) {
if (windows[i] == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
}
opt = BN_OptimizerCreate();
if (opt == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
GOTO_ERR_IF(ECC_PointToMont(para, windows[0], opt), ret);
GOTO_ERR_IF(para->method->pointDouble(para, doubleP, windows[0]), ret);
for (i = 1; i < (WINDOW_TABLE_SIZE >> 1); i++) {
GOTO_ERR_IF(para->method->pointAdd(para, windows[i], windows[i - 1], doubleP), ret);
}
for (i = WINDOW_TABLE_SIZE >> 1; i < WINDOW_TABLE_SIZE; i++) {
GOTO_ERR_IF(ECP_PointInvertAtAffine(para, windows[i], windows[i - (WINDOW_TABLE_SIZE >> 1)]), ret);
}
BN_OptimizerDestroy(opt);
ECC_FreePoint(doubleP);
return ret;
ERR:
for (i = 0; i < WINDOW_TABLE_SIZE; i++) {
ECC_FreePoint(windows[i]);
windows[i] = NULL;
}
BN_OptimizerDestroy(opt);
ECC_FreePoint(doubleP);
return ret;
}
static int32_t ECP_ParaPrecompute(ECC_Para *para)
{
if (para->tableG[0] != NULL) {
// The pre-computation table already exists.
return CRYPT_SUCCESS;
}
int32_t ret;
ECC_Point *pt = ECC_GetGFromPara(para);
if (pt == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
GOTO_ERR_IF(ECP_PointPreCompute(para, para->tableG, pt), ret);
ERR:
ECC_FreePoint(pt);
return ret;
}
void ECC_ReCodeFree(ReCodeData *code)
{
if (code == NULL) {
return;
}
BSL_SAL_FREE(code->num); // The encoded data is insensitive and does not need to be set to 0.
BSL_SAL_FREE(code->wide);
BSL_SAL_FREE(code);
}
static ReCodeData *WinCodeNew(uint32_t len)
{
ReCodeData *code = BSL_SAL_Malloc(sizeof(ReCodeData));
if (code == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
code->num = BSL_SAL_Malloc(len * sizeof(int8_t));
code->wide = BSL_SAL_Malloc(len * sizeof(uint32_t));
if (code->num == NULL || code->wide == NULL) {
ECC_ReCodeFree(code);
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
return code;
}
// Shift the recoded data. If the shift fails, release the code data.
static int32_t RecodeKMove(ReCodeData *code, uint32_t len, uint32_t offset)
{
// Data shift. The value assignment starts from the tail and moves the data to the left to start position.
if (memmove_s(code->num, len * sizeof(int8_t), &(code->num[offset]), code->size * sizeof(int8_t)) != EOK ||
memmove_s(code->wide, len * sizeof(uint32_t), &(code->wide[offset]), code->size * sizeof(uint32_t)) != EOK) {
ECC_ReCodeFree(code);
BSL_ERR_PUSH_ERROR(CRYPT_SECUREC_FAIL);
return CRYPT_SECUREC_FAIL;
}
return CRYPT_SUCCESS;
}
// Recode scalar data, remove the most significant bit 1 of the data in the window.
ReCodeData *ECC_ReCodeK(const BN_BigNum *k, uint32_t window)
{
if (k == NULL || window == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return NULL;
}
int8_t max = (1 << window);
uint32_t bits = BN_Bits(k);
uint32_t len = (bits / window) + 1;
ReCodeData *code = WinCodeNew(len);
if (code == NULL) {
// The internal function WinCodeNew has executed push_err.
return NULL;
}
uint32_t offset = len;
uint32_t base = 0;
bool carry = false;
uint32_t lastWide = 0;
while (base != bits) {
offset--;
// Find the start bit of the new item.
while (BN_GetBit(k, base) == carry) {
base++;
lastWide++;
}
int8_t num = 0;
uint32_t shift = 0;
// Obtain the item of the window length.
while ((shift < window) && (base != bits)) {
int8_t add = (((BN_GetBit(k, base) ? 1 : 0)) << shift);
num += add;
base++;
shift++;
}
// If there is a carry, perform carry processing.
num += (carry ? 1 : 0);
// Refresh carry.
carry = num >= (max / 2); // Check whether the value >= (max/2). If yes, convert the value.
// If the value of a new carry item exists, convert it to -(2^win - num)
num = carry ? (-(max - num)) : num;
code->num[offset] = num;
code->wide[offset] = lastWide;
lastWide = shift;
}
// If carry information exists, store data 1 in the most significant bit.
if (carry) {
offset--;
code->num[offset] = 1;
code->wide[offset] = lastWide;
}
code->baseBits = carry ? bits : (bits - lastWide);
code->size = len - offset;
// Data shift. The value assignment starts from the tail and moves the data to the left to start position.
if (RecodeKMove(code, len, offset) != CRYPT_SUCCESS) {
// If the operation fails, the RecodeKMove releases the code data.
return NULL;
}
return code;
}
// Layout format of the pre-computation table.
// This macro is used to convert values into corresponding offsets.
// layout rules (1, 3, 5, 7... 15, -1, -3, ... -15)
#define NUMTOOFFSET(num) (((num) < 0) ? (WINDOW_TABLE_SIZE / 2 - 1 - (((num) - 1) / 2)) : (((num) - 1) / 2))
typedef struct {
uint32_t baseBits;
uint32_t bit;
uint32_t bit1;
uint32_t bit2;
uint32_t offsetK1;
uint32_t offsetK2;
ReCodeData *codeK1;
ReCodeData *codeK2;
} MulAddOffData;
static int32_t GetFirstData(const ECC_Para *para, ECC_Point *t, MulAddOffData *offData,
ECC_Point **windowsP)
{
int32_t ret;
ECC_Point *const *windowsG = para->tableG;
// Obtain the maximum start offset of the first item.
offData->baseBits = (offData->codeK1->baseBits > offData->codeK2->baseBits) ?
offData->codeK1->baseBits : offData->codeK2->baseBits;
// If they are equal, the initial value is the sum of the two first items.
// Otherwise, the initial value is the item with a larger offset among the two items.
if (offData->codeK1->baseBits == offData->codeK2->baseBits) {
int8_t offset1 = NUMTOOFFSET(offData->codeK1->num[offData->offsetK1]);
int8_t offset2 = NUMTOOFFSET(offData->codeK2->num[offData->offsetK2]);
GOTO_ERR_IF(para->method->pointAdd(para, t, windowsG[offset1], windowsP[offset2]), ret);
offData->offsetK1++;
offData->offsetK2++;
offData->bit1 = offData->codeK1->wide[offData->offsetK1 - 1];
offData->bit2 = offData->codeK2->wide[offData->offsetK2 - 1];
} else if (offData->codeK1->baseBits > offData->codeK2->baseBits) {
int8_t offset = NUMTOOFFSET(offData->codeK1->num[offData->offsetK1]);
GOTO_ERR_IF(ECC_CopyPoint(t, windowsG[offset]), ret);
offData->offsetK1++;
offData->bit1 = offData->codeK1->wide[offData->offsetK1 - 1];
offData->bit2 = offData->baseBits - offData->codeK2->baseBits;
} else {
int8_t offset = NUMTOOFFSET(offData->codeK2->num[offData->offsetK2]);
GOTO_ERR_IF(ECC_CopyPoint(t, windowsP[offset]), ret);
offData->offsetK2++;
offData->bit1 = offData->baseBits - offData->codeK1->baseBits;
offData->bit2 = offData->codeK2->wide[offData->offsetK2 - 1];
}
ERR:
return ret;
}
static int32_t PointMulAddParaCheck(const ECC_Para *para, const ECC_Point *r, const BN_BigNum *k1,
const BN_BigNum *k2, const ECC_Point *pt)
{
if (para == NULL || r == NULL || k1 == NULL || k2 == NULL || pt == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if ((para->id != r->id) || (para->id != pt->id)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
return CRYPT_SUCCESS;
}
// NotConstTime r = order*pt
int32_t ECP_PointMulFast(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt)
{
if (para == NULL || r == NULL || k == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if ((para->id != r->id) || ((pt != NULL) && (para->id != pt->id))) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
if (BN_IsZero(k)) {
(void)BN_Zeroize(&r->z);
return CRYPT_SUCCESS;
}
int32_t ret;
ReCodeData *codeK = NULL;
int8_t offset;
ECC_Point *windowsP[WINDOW_TABLE_SIZE] = { 0 };
ECC_Point **windows = NULL;
if (pt == NULL) {
GOTO_ERR_IF(ECP_ParaPrecompute(para), ret);
windows = para->tableG;
} else {
GOTO_ERR_IF(ECP_PointPreCompute(para, windowsP, pt), ret);
windows = windowsP;
}
codeK = ECC_ReCodeK(k, PRE_COMPUTE_WINDOW);
if (codeK == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
ret = CRYPT_MEM_ALLOC_FAIL;
goto ERR;
}
offset = NUMTOOFFSET(codeK->num[0]);
GOTO_ERR_IF(ECC_CopyPoint(r, windows[offset]), ret);
GOTO_ERR_IF(para->method->pointMultDouble(para, r, r, codeK->wide[0]), ret);
for (uint32_t i = 1; i < codeK->size; i++) {
offset = NUMTOOFFSET(codeK->num[i]);
GOTO_ERR_IF(para->method->pointAdd(para, r, r, windows[offset]), ret);
GOTO_ERR_IF(para->method->pointMultDouble(para, r, r, codeK->wide[i]), ret);
}
ECC_PointFromMont(para, r);
ERR:
for (uint32_t i = 0; i < WINDOW_TABLE_SIZE; i++) {
// Clear the pre-computation table.
ECC_FreePoint(windowsP[i]);
}
ECC_ReCodeFree(codeK);
return ret;
}
static int32_t KZeroHandle(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1,
const BN_BigNum *k2, const ECC_Point *pt)
{
if (BN_IsZero(k1) && BN_IsZero(k2)) {
// When k1 and k2 are both 0, the result is infinity.
(void)BN_Zeroize(&r->z);
return CRYPT_SUCCESS;
}
if (BN_IsZero(k1)) {
return ECP_PointMulFast(para, r, k2, pt);
}
// k2 is 0
return ECP_PointMulFast(para, r, k1, NULL);
}
// wNaf NotConstTime
int32_t ECP_PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1,
const BN_BigNum *k2, const ECC_Point *pt)
{
int32_t ret = PointMulAddParaCheck(para, r, k1, k2, pt);
if (ret != CRYPT_SUCCESS) {
return ret;
}
if (BN_IsZero(k1) || BN_IsZero(k2)) {
return KZeroHandle(para, r, k1, k2, pt);
}
MulAddOffData offData = { 0 };
ECC_Point *windowsP[WINDOW_TABLE_SIZE] = { 0 };
ECC_Point **windowsG = NULL;
GOTO_ERR_IF(ECP_ParaPrecompute(para), ret);
GOTO_ERR_IF(ECP_PointPreCompute(para, windowsP, pt), ret);
windowsG = para->tableG;
offData.codeK1 = ECC_ReCodeK(k1, PRE_COMPUTE_WINDOW);
offData.codeK2 = ECC_ReCodeK(k2, PRE_COMPUTE_WINDOW);
if (offData.codeK1 == NULL || offData.codeK2 == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
// Obtain the initial point data.
GOTO_ERR_IF(GetFirstData(para, r, &offData, windowsP), ret);
while (offData.baseBits != 0) {
// Slide window
offData.bit1 = (offData.bit1 == 0) ? (offData.codeK1->wide[offData.offsetK1 - 1]) : (offData.bit1);
offData.bit2 = (offData.bit2 == 0) ? (offData.codeK2->wide[offData.offsetK2 - 1]) : (offData.bit2);
offData.bit = (offData.bit1 < offData.bit2) ? (offData.bit1) : (offData.bit2);
GOTO_ERR_IF(para->method->pointMultDouble(para, r, r, offData.bit), ret);
if (offData.bit == offData.bit1 && offData.offsetK1 < offData.codeK1->size) {
int8_t offset = NUMTOOFFSET(offData.codeK1->num[offData.offsetK1]);
GOTO_ERR_IF(para->method->pointAdd(para, r, r, windowsG[offset]), ret);
offData.offsetK1++;
}
if (offData.bit == offData.bit2 && offData.offsetK2 < offData.codeK2->size) {
int8_t offset = NUMTOOFFSET(offData.codeK2->num[offData.offsetK2]);
GOTO_ERR_IF(para->method->pointAdd(para, r, r, windowsP[offset]), ret);
offData.offsetK2++;
}
offData.bit1 -= offData.bit;
offData.bit2 -= offData.bit;
offData.baseBits -= offData.bit;
}
ECC_PointFromMont(para, r);
ERR:
for (uint32_t i = 0; i < WINDOW_TABLE_SIZE; i++) {
// Clear the pre-computation table.
ECC_FreePoint(windowsP[i]);
}
ECC_ReCodeFree(offData.codeK1);
ECC_ReCodeFree(offData.codeK2);
return ret;
}
static int32_t PointParaCheck(const ECC_Para *para, const ECC_Point *pt, int32_t format)
{
int32_t ret = ECP_PointAtInfinity(para, pt);
if (ret != CRYPT_SUCCESS) {
return ret;
}
if (format < CRYPT_POINT_COMPRESSED || format > CRYPT_POINT_HYBRID) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_POINT_FORMAT);
return CRYPT_ECC_ERR_POINT_FORMAT;
}
return CRYPT_SUCCESS;
}
static int32_t EncodePointParaCheck(const ECC_Para *para, const ECC_Point *pt, const uint8_t *data,
const uint32_t *dataLen, CRYPT_PKEY_PointFormat format)
{
int32_t ret = PointParaCheck(para, pt, format);
if (ret != CRYPT_SUCCESS) {
return ret;
}
if (data == NULL || dataLen == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
uint32_t curveBytes = BN_Bytes(para->p);
// Obtain the required buff length based on the compression format.
uint32_t needBytes = (format == CRYPT_POINT_COMPRESSED) ? (curveBytes + 1) : ((curveBytes << 1) + 1);
if (needBytes > *dataLen) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_BUFF_LEN_NOT_ENOUGH);
return CRYPT_ECC_BUFF_LEN_NOT_ENOUGH;
}
return CRYPT_SUCCESS;
}
int32_t ECP_EncodePoint(const ECC_Para *para, ECC_Point *pt, uint8_t *data, uint32_t *dataLen,
CRYPT_PKEY_PointFormat format)
{
int32_t ret;
bool z = 0;
uint32_t bytes, off, lastLen, i, curveBytes;
GOTO_ERR_IF(EncodePointParaCheck(para, pt, data, dataLen, format), ret);
// Convert the point to affine.
GOTO_ERR_IF(para->method->point2Affine(para, pt, pt), ret);
z = BN_GetBit(&pt->y, 0);
bytes = BN_Bytes(&pt->x);
curveBytes = BN_Bytes(para->p);
off = curveBytes - bytes;
for (i = 0; i < off; i++) {
// Padded 0s to the most significant bits.
data[i + 1] = 0;
}
lastLen = *dataLen - off - 1;
GOTO_ERR_IF(BN_Bn2Bin(&pt->x, &data[off + 1], &lastLen), ret);
/**
* ANS X9.62–2005 A.5.5
* If the compressed form is used PC is either 02 or 03.
* If the uncompressed form is used Verify that PC is 04.
* If the hybrid form is used Verify that PC is either 06 or 07
*/
if (format == CRYPT_POINT_COMPRESSED) {
// Set the bit zP to be equal to 0 if PC = 02, or 1 if PC = 03.
data[0] = z ? 0x03 : 0x02;
*dataLen = curveBytes + 1;
return CRYPT_SUCCESS;
} else if (format == CRYPT_POINT_UNCOMPRESSED) {
data[0] = 0x04;
} else if (format == CRYPT_POINT_HYBRID) {
// Set the bit zP to be equal to 0 if PC = 06, or 1 if PC = 07.
data[0] = z ? 0x07 : 0x06;
}
bytes = BN_Bytes(&pt->y);
off = curveBytes - bytes;
for (i = 0; i < off; i++) {
// Padded 0s to the most significant bits.
data[i + curveBytes + 1] = 0;
}
lastLen = *dataLen - off - curveBytes - 1;
GOTO_ERR_IF(BN_Bn2Bin(&pt->y, &data[off + curveBytes + 1], &lastLen), ret);
*dataLen = (curveBytes << 1) + 1;
ERR:
return ret;
}
// Calculate the y coordinate based on the x coordinate.
// Currently, only the y^2 = x^3 + a*x + b curve equation can be solved.
static int32_t GetYData(const ECC_Para *para, ECC_Point *pt, bool pcBit)
{
uint32_t bits = BN_Bits(para->p);
BN_BigNum *t1 = BN_Create(bits);
BN_BigNum *t2 = BN_Create(bits);
BN_BigNum *dupA = BN_Dup(para->a);
BN_BigNum *dupB = BN_Dup(para->b);
BN_Optimizer *opt = BN_OptimizerCreate();
int32_t ret;
if (t1 == NULL || t2 == NULL || opt == NULL || dupA == NULL || dupB == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
if (para->method->bnMontDec != NULL) {
para->method->bnMontDec(dupA, para->montP);
para->method->bnMontDec(dupB, para->montP);
}
BN_OptimizerSetLibCtx(para->libCtx, opt);
GOTO_ERR_IF(BN_ModSqr(t1, &pt->x, para->p, opt), ret);
GOTO_ERR_IF(BN_ModMul(t1, t1, &pt->x, para->p, opt), ret);
GOTO_ERR_IF(BN_ModMul(t2, dupA, &pt->x, para->p, opt), ret);
GOTO_ERR_IF(BN_ModAdd(t1, t1, t2, para->p, opt), ret);
GOTO_ERR_IF(BN_ModAdd(t1, t1, dupB, para->p, opt), ret);
GOTO_ERR_IF(BN_ModSqrt(&pt->y, t1, para->p, opt), ret);
if (BN_GetBit(&pt->y, 0) != pcBit) { // if parity is inconsistent, y = -y
GOTO_ERR_IF(BN_ModSub(&pt->y, para->p, &pt->y, para->p, opt), ret);
}
ERR:
BN_Destroy(t1);
BN_Destroy(t2);
BN_Destroy(dupA);
BN_Destroy(dupB);
BN_OptimizerDestroy(opt);
return ret;
}
// Check whether the parsed data is valid during point decoding and provide compression information.
static int32_t GetFormatAndCheckLen(const uint8_t *data, uint32_t dataLen, CRYPT_PKEY_PointFormat *format,
uint32_t curveBytes)
{
if (dataLen < curveBytes + 1) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_POINT_CODE);
return CRYPT_ECC_ERR_POINT_CODE;
}
uint8_t pc = data[0];
/**
* ANS X9.62–2005 A.5.5
* If the compressed form is used PC is either 02 or 03.
* If the uncompressed form is used Verify that PC is 04.
* If the hybrid form is used Verify that PC is either 06 or 07
*/
if (pc == 0x04) {
// uncompressed
if (dataLen != (curveBytes << 1) + 1) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_POINT_CODE);
return CRYPT_ECC_ERR_POINT_CODE;
}
*format = CRYPT_POINT_UNCOMPRESSED;
return CRYPT_SUCCESS;
} else if (pc == 0x02 || pc == 0x03) {
// compressed
if (dataLen != curveBytes + 1) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_POINT_CODE);
return CRYPT_ECC_ERR_POINT_CODE;
}
*format = CRYPT_POINT_COMPRESSED;
return CRYPT_SUCCESS;
} else if (pc == 0x06 || pc == 0x07) {
// hybriid
if (dataLen != (curveBytes << 1) + 1) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_POINT_CODE);
return CRYPT_ECC_ERR_POINT_CODE;
}
*format = CRYPT_POINT_HYBRID;
return CRYPT_SUCCESS;
}
BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_POINT_CODE);
return CRYPT_ECC_ERR_POINT_CODE;
}
int32_t ECP_DecodePoint(const ECC_Para *para, ECC_Point *pt, const uint8_t *data, uint32_t dataLen)
{
if (para == NULL || pt == NULL || data == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != pt->id) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
int32_t ret;
uint32_t curveBytes = BN_Bytes(para->p);
CRYPT_PKEY_PointFormat format = CRYPT_POINT_UNCOMPRESSED;
bool pcBit = ((data[0] & 0x01) == 1); // Parity check. If it's odd, return true. If it's even, return false.
GOTO_ERR_IF(GetFormatAndCheckLen(data, dataLen, &format, curveBytes), ret);
GOTO_ERR_IF(BN_SetLimb(&pt->z, 1), ret);
if (format == CRYPT_POINT_COMPRESSED) {
GOTO_ERR_IF(BN_Bin2Bn(&pt->x, &data[1], curveBytes), ret);
// The y-coordinate information is obtained through calculation.
GOTO_ERR_IF(GetYData(para, pt, pcBit), ret);
} else if (format == CRYPT_POINT_UNCOMPRESSED) {
GOTO_ERR_IF(BN_Bin2Bn(&pt->x, &data[1], curveBytes), ret);
GOTO_ERR_IF(BN_Bin2Bn(&pt->y, &data[1 + curveBytes], curveBytes), ret);
} else if (format == CRYPT_POINT_HYBRID) {
GOTO_ERR_IF(BN_Bin2Bn(&pt->x, &data[1], curveBytes), ret);
GOTO_ERR_IF(BN_Bin2Bn(&pt->y, &data[1 + curveBytes], curveBytes), ret);
// The parity information on the coded information is inconsistent.
if (BN_GetBit(&pt->y, 0) != pcBit) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_POINT_CODE);
ret = CRYPT_ECC_ERR_POINT_CODE;
goto ERR;
}
}
// Check whether the value on the point exceeds the modulus field.
if ((BN_Cmp(para->p, &pt->y) <= 0) || (BN_Cmp(para->p, &pt->x) <= 0)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_NOT_ON_CURVE);
ret = CRYPT_ECC_POINT_NOT_ON_CURVE;
goto ERR;
}
if (format != CRYPT_POINT_COMPRESSED) {
// Check whether the point is on the curve.
GOTO_ERR_IF(ECP_PointOnCurve(para, pt), ret);
}
return ret;
ERR:
// Ensure that pt is not NULL. Therefore, pt->z is not NULL. This invoking does not fail.
(void)BN_Zeroize(&pt->z);
return ret;
}
#endif /* HITLS_CRYPTO_ECC */
|
2301_79861745/bench_create
|
crypto/ecc/src/ecp_simple.c
|
C
|
unknown
| 38,983
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef ECP_SM2_H
#define ECP_SM2_H
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_ECC) && defined(HITLS_CRYPTO_SM2)
#include "crypt_ecc.h"
#include "crypt_bn.h"
#ifdef __cplusplus
extern "C" {
#endif
/**
* @ingroup sm2
* @brief Calculate r = k * pt. When pt is NULL, calculate r = k * G
*
* @param para [IN] Curve parameter information
* @param r [OUT] Output point information
* @param k [IN] Scalar
* @param pt [IN] Point data, which can be set to NULL.
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_Sm2PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *scalar, const ECC_Point *pt);
/**
* @ingroup sm2
* @brief Calculate r = a + b, where a is the Jacobian coordinate system and b is the affine coordinate system.
*
* @param para [IN] Curve parameter information
* @param r [OUT] Output point information
* @param a,b [IN] Point data
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_Sm2PointAddAffine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a, const ECC_Point *b);
/**
* @ingroup sm2
* @brief Calculate r = 2*a, where a is the Jacobian coordinate system.
*
* @param para [IN] Curve parameter information
* @param r [OUT] Output point information
* @param a [IN] Point data
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_Sm2PointDouble(const ECC_Para *para, ECC_Point *r, const ECC_Point *a);
/**
* @ingroup sm2
* @brief Convert the point information pt to the affine coordinate system and refresh the data to r.
*
* @param para [IN] Curve parameters
* @param r [OUT] Output point information
* @param a [IN] Input point information
*
* @retval CRYPT_SUCCESS succeeded
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_Sm2Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *a);
/**
* @ingroup sm2
* @brief Calculate r = k * pt,
* Non-consttime calculation
*
* @param para [IN] Curve parameter information
* @param r [OUT] Output point information
* @param k [IN] Scalar
* @param pt [IN] Point data, which can be set to NULL.
*
* @retval CRYPT_SUCCESS succeeded.
* @retval For details about other errors, see crypt_errno.h
*/
int32_t ECP_Sm2PointMulFast(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt);
int32_t ECP_Sm2OrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a);
int32_t ECP_Sm2PointMulAdd(ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2,
const ECC_Point *pt);
#ifdef __cplusplus
}
#endif
#endif
#endif
|
2301_79861745/bench_create
|
crypto/ecc/src/ecp_sm2.h
|
C
|
unknown
| 3,305
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_CURVE_NISTP256) && defined(HITLS_CRYPTO_NIST_USE_ACCEL)
#include <stdbool.h>
#include "securec.h"
#include "bsl_err_internal.h"
#include "crypt_errno.h"
#include "crypt_utils.h"
#include "crypt_bn.h"
#include "crypt_ecc.h"
#include "ecc_local.h"
#include "ecc_utils.h"
#include "bsl_util_internal.h"
#ifndef __SIZEOF_INT128__
#error "This nistp256 implementation require the compiler support 128-bits integer."
#endif
/* field element definition */
#define FELEM_BITS 256
#define FELEM_BYTES 32
#define LIMB_BITS (sizeof(uint128_t) << 3)
#define LIMB_NUM 4
#define BASE_BITS 64
/* The pre-calculation table of the G table has 16 points. */
#define TABLE_G_SIZE 16
/* The pre-calculation table of the P table has 17 points. */
#define TABLE_P_SIZE 17
/*
* Field elements, stored as arrays, all represented in little endian.
* Each element of the array is called a digit. Each digit represents an extended 2 ^ 64-bit.
* That is, Felem can be expressed as:
* f_0 + f_1 * 2^64 + f_2 * 2^128 + f_3 * 2^192
* LongFelem is used to store the result of multiplication of field elements and is twice the width of Felem.
* Point is a point represented as a Jacobian coordinate
*/
typedef struct {
uint128_t data[LIMB_NUM];
} Felem;
typedef struct {
uint128_t data[LIMB_NUM * 2];
} LongFelem;
typedef struct {
Felem x;
Felem y;
Felem z;
} Point;
/* ------------------------------------------------------------ */
/* ECP256 field order p. The value is 2^256 - 2^224 + 2^192 + 2^96 - 1, little endian */
static const Felem FIELD_ORDER = {
{0xffffffffffffffff, 0x00000000ffffffff, 0x0000000000000000, 0xffffffff00000001}
};
/*
* Pre-computation table of the base point G, which contains the (X, Y, Z) coordinates of k*G
*
* PRE_MUL_G divides all bits into four equal parts.
* index corresponding bit value of k
* 0 0 0 0 0 0 + 0 + 0 + 0
* 1 0 0 0 1 0 + 0 + 0 + 1
* 2 0 0 1 0 0 + 0 + 2^64 + 0
* 3 0 0 1 1 0 + 0 + 2^64 + 1
* 4 0 1 0 0 0 + 2^128 + 0 + 0
* 5 0 1 0 1 0 + 2^128 + 0 + 1
* 6 0 1 1 0 0 + 2^128 + 2^64 + 0
* 7 0 1 1 1 0 + 2^128 + 2^64 + 1
* 8 1 0 0 0 2^192 + 0 + 0 + 0
* 9 1 0 0 1 2^192 + 0 + 0 + 1
* 10 1 0 1 0 2^192 + 0 + 2^64 + 0
* 11 1 0 1 1 2^192 + 0 + 2^64 + 1
* 12 1 1 0 0 2^192 + 2^128 + 0 + 0
* 13 1 1 0 1 2^192 + 2^128 + 0 + 1
* 14 1 1 1 0 2^192 + 2^128 + 2^64 + 0
* 15 1 1 1 1 2^192 + 2^128 + 2^64 + 1
*
*/
static const Point PRE_MUL_G[TABLE_G_SIZE] = {
{
{{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}},
{{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}},
{{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0xf4a13945d898c296, 0x77037d812deb33a0, 0xf8bce6e563a440f2, 0x6b17d1f2e12c4247}},
{{0xcbb6406837bf51f5, 0x2bce33576b315ece, 0x8ee7eb4a7c0f9e16, 0x4fe342e2fe1a7f9b}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x90e75cb48e14db63, 0x29493baaad651f7e, 0x8492592e326e25de, 0x0fa822bc2811aaa5}},
{{0xe41124545f462ee7, 0x34b1a65050fe82f5, 0x6f4ad4bcb3df188b, 0xbff44ae8f5dba80d}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x93391ce2097992af, 0xe96c98fd0d35f1fa, 0xb257c0de95e02789, 0x300a4bbc89d6726f}},
{{0xaa54a291c08127a0, 0x5bb1eeada9d806a5, 0x7f1ddb25ff1e3c6f, 0x72aac7e0d09b4644}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x57c84fc9d789bd85, 0xfc35ff7dc297eac3, 0xfb982fd588c6766e, 0x447d739beedb5e67}},
{{0x0c7e33c972e25b32, 0x3d349b95a7fae500, 0xe12e9d953a4aaff7, 0x2d4825ab834131ee}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x13949c932a1d367f, 0xef7fbd2b1a0a11b7, 0xddc6068bb91dfc60, 0xef9519328a9c72ff}},
{{0x196035a77376d8a8, 0x23183b0895ca1740, 0xc1ee9807022c219c, 0x611e9fc37dbb2c9b}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0xcae2b1920b57f4bc, 0x2936df5ec6c9bc36, 0x7dea6482e11238bf, 0x550663797b51f5d8}},
{{0x44ffe216348a964c, 0x9fb3d576dbdefbe1, 0x0afa40018d9d50e5, 0x157164848aecb851}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0xe48ecafffc5cde01, 0x7ccd84e70d715f26, 0xa2e8f483f43e4391, 0xeb5d7745b21141ea}},
{{0xcac917e2731a3479, 0x85f22cfe2844b645, 0x0990e6a158006cee, 0xeafd72ebdbecc17b}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x6cf20ffb313728be, 0x96439591a3c6b94a, 0x2736ff8344315fc5, 0xa6d39677a7849276}},
{{0xf2bab833c357f5f4, 0x824a920c2284059b, 0x66b8babd2d27ecdf, 0x674f84749b0b8816}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x2df48c04677c8a3e, 0x74e02f080203a56b, 0x31855f7db8c7fedb, 0x4e769e7672c9ddad}},
{{0xa4c36165b824bbb0, 0xfb9ae16f3b9122a5, 0x1ec0057206947281, 0x42b99082de830663}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x6ef95150dda868b9, 0xd1f89e799c0ce131, 0x7fdc1ca008a1c478, 0x78878ef61c6ce04d}},
{{0x9c62b9121fe0d976, 0x6ace570ebde08d4f, 0xde53142c12309def, 0xb6cb3f5d7b72c321}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x7f991ed2c31a3573, 0x5b82dd5bd54fb496, 0x595c5220812ffcae, 0x0c88bc4d716b1287}},
{{0x3a57bf635f48aca8, 0x7c8181f4df2564f3, 0x18d1b5b39c04e6aa, 0xdd5ddea3f3901dc6}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0xe96a79fb3e72ad0c, 0x43a0a28c42ba792f, 0xefe0a423083e49f3, 0x68f344af6b317466}},
{{0xcdfe17db3fb24d4a, 0x668bfc2271f5c626, 0x604ed93c24d67ff3, 0x31b9c405f8540a20}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0xd36b4789a2582e7f, 0x0d1a10144ec39c28, 0x663c62c3edbad7a0, 0x4052bf4b6f461db9}},
{{0x235a27c3188d25eb, 0xe724f33999bfcc5b, 0x862be6bd71d70cc8, 0xfecf4d5190b0fc61}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x74346c10a1d4cfac, 0xafdf5cc08526a7a4, 0x123202a8f62bff7a, 0x1eddbae2c802e41a}},
{{0x8fa0af2dd603f844, 0x36e06b7e4c701917, 0x0c45f45273db33a0, 0x43104d86560ebcfc}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x9615b5110d1d78e5, 0x66b0de3225c4744b, 0x0a4a46fb6aaf363a, 0xb48e26b484f7a21c}},
{{0x06ebb0f621a01b2d, 0xc004e4048b7b0f98, 0x64131bcdfed6f668, 0xfac015404d4d3dab}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}
};
/*
* Pre-computation table of the base point G, which contains the (X, Y, Z) coordinates of k*G
*
* PRE_MUL_G2[] = PRE_MUL_G[] * 2^32
* index corresponding bit value of k
* 0 0 0 0 0 0 + 0 + 0 + 0
* 1 0 0 0 1 0 + 0 + 0 + 2^32
* 2 0 0 1 0 0 + 0 + 2^96 + 0
* 3 0 0 1 1 0 + 0 + 2^96 + 2^32
* 4 0 1 0 0 0 + 2^160 + 0 + 0
* 5 0 1 0 1 0 + 2^160 + 0 + 2^32
* 6 0 1 1 0 0 + 2^160 + 2^96 + 0
* 7 0 1 1 1 0 + 2^160 + 2^96 + 2^32
* 8 1 0 0 0 2^224 + 0 + 0 + 0
* 9 1 0 0 1 2^224 + 0 + 0 + 2^32
* 10 1 0 1 0 2^224 + 0 + 2^96 + 0
* 11 1 0 1 1 2^224 + 0 + 2^96 + 2^32
* 12 1 1 0 0 2^224 + 2^160 + 0 + 0
* 13 1 1 0 1 2^224 + 2^160 + 0 + 2^32
* 14 1 1 1 0 2^224 + 2^160 + 2^96 + 0
* 15 1 1 1 1 2^224 + 2^160 + 2^96 + 2^32
*/
static const Point PRE_MUL_G2[TABLE_G_SIZE] = {
{
{{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}},
{{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}},
{{0x0000000000000000, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x3a5a9e22185a5943, 0x1ab919365c65dfb6, 0x21656b32262c71da, 0x7fe36b40af22af89}},
{{0xd50d152c699ca101, 0x74b3d5867b8af212, 0x9f09f40407dca6f1, 0xe697d45825b63624}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0xa84aa9397512218e, 0xe9a521b074ca0141, 0x57880b3a18a2e902, 0x4a5b506612a677a6}},
{{0x0beada7a4c4f3840, 0x626db15419e26d9d, 0xc42604fbe1627d40, 0xeb13461ceac089f1}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0xf9faed0927a43281, 0x5e52c4144103ecbc, 0xc342967aa815c857, 0x0781b8291c6a220a}},
{{0x5a8343ceeac55f80, 0x88f80eeee54a05e3, 0x97b2a14f12916434, 0x690cde8df0151593}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0xaee9c75df7f82f2a, 0x9e4c35874afdf43a, 0xf5622df437371326, 0x8a535f566ec73617}},
{{0xc5f9a0ac223094b7, 0xcde533864c8c7669, 0x37e02819085a92bf, 0x0455c08468b08bd7}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x0c0a6e2c9477b5d9, 0xf9a4bf62876dc444, 0x5050a949b6cdc279, 0x06bada7ab77f8276}},
{{0xc8b4aed1ea48dac9, 0xdebd8a4b7ea1070f, 0x427d49101366eb70, 0x5b476dfd0e6cb18a}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x7c5c3e44278c340a, 0x4d54606812d66f3b, 0x29a751b1ae23c5d8, 0x3e29864e8a2ec908}},
{{0x142d2a6626dbb850, 0xad1744c4765bd780, 0x1f150e68e322d1ed, 0x239b90ea3dc31e7e}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x78c416527a53322a, 0x305dde6709776f8e, 0xdbcab759f8862ed4, 0x820f4dd949f72ff7}},
{{0x6cc544a62b5debd4, 0x75be5d937b4e8cc4, 0x1b481b1b215c14d3, 0x140406ec783a05ec}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x6a703f10e895df07, 0xfd75f3fa01876bd8, 0xeb5b06e70ce08ffe, 0x68f6b8542783dfee}},
{{0x90c76f8a78712655, 0xcf5293d2f310bf7f, 0xfbc8044dfda45028, 0xcbe1feba92e40ce6}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0xe998ceea4396e4c1, 0xfc82ef0b6acea274, 0x230f729f2250e927, 0xd0b2f94d2f420109}},
{{0x4305adddb38d4966, 0x10b838f8624c3b45, 0x7db2636658954e7a, 0x971459828b0719e5}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x4bd6b72623369fc9, 0x57f2929e53d0b876, 0xc2d5cba4f2340687, 0x961610004a866aba}},
{{0x49997bcd2e407a5e, 0x69ab197d92ddcb24, 0x2cf1f2438fe5131c, 0x7acb9fadcee75e44}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x254e839423d2d4c0, 0xf57f0c917aea685b, 0xa60d880f6f75aaea, 0x24eb9acca333bf5b}},
{{0xe3de4ccb1cda5dea, 0xfeef9341c51a6b4f, 0x743125f88bac4c4d, 0x69f891c5acd079cc}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0xeee44b35702476b5, 0x7ed031a0e45c2258, 0xb422d1e7bd6f8514, 0xe51f547c5972a107}},
{{0xa25bcd6fc9cf343d, 0x8ca922ee097c184e, 0xa62f98b3a9fe9a06, 0x1c309a2b25bb1387}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x9295dbeb1967c459, 0xb00148833472c98e, 0xc504977708011828, 0x20b87b8aa2c4e503}},
{{0x3063175de057c277, 0x1bd539338fe582dd, 0x0d11adef5f69a044, 0xf5c6fa49919776be}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0x8c944e760fd59e11, 0x3876cba1102fad5f, 0xa454c3fad83faa56, 0x1ed7d1b9332010b9}},
{{0xa1011a270024b889, 0x05e4d0dcac0cd344, 0x52b520f0eb6a2a24, 0x3a2b03f03217257a}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}, {
{{0xf20fc2afdf1d043d, 0xf330240db58d5a62, 0xfc7d229ca0058c3b, 0x15fee545c78dd9f6}},
{{0x501e82885bc98cda, 0x41ef80e5d046ac04, 0x557d9f49461210fb, 0x4ab5b6b2b8753f81}},
{{0x0000000000000001, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000}}
}
};
/* --------------------------helper function-------------------------- */
/*
* Convert big-endian byte stream to Felem
*/
static inline void Bin2Felem(Felem *out, const uint8_t in[FELEM_BYTES])
{
// Write the input data to 128-bit digits every 64 bits.
out->data[3] = (uint128_t)Uint64FromBeBytes(in); // Index 3 read 0~7 bytes
out->data[2] = (uint128_t)Uint64FromBeBytes(in + 8); // Index 2 read 8~15 bytes
out->data[1] = (uint128_t)Uint64FromBeBytes(in + 16); // Index 1 read 16~23 bytes
out->data[0] = (uint128_t)Uint64FromBeBytes(in + 24); // Index 0 read 24~31 bytes
}
/*
* Convert Felem to big-endian byte stream
* Input:
* in[] < 2^64
* Output:
* out length is 32
*/
static inline void Felem2Bin(uint8_t out[FELEM_BYTES], const Felem *in)
{
Uint64ToBeBytes((uint64_t)in->data[3], out); // Index 3 write 0~7 bytes
Uint64ToBeBytes((uint64_t)in->data[2], out + 8); // Index 2 write 8~15 bytes
Uint64ToBeBytes((uint64_t)in->data[1], out + 16); // Index 1 write 16~23 bytes
Uint64ToBeBytes((uint64_t)in->data[0], out + 24); // Index 0 write 24~31 bytes
}
/*
* Convert BN to Felem
* Output:
* out[] < 2^64
*/
static int32_t BN2Felem(Felem *out, const BN_BigNum *in)
{
int32_t ret;
uint8_t bin[FELEM_BYTES];
uint32_t len = FELEM_BYTES;
GOTO_ERR_IF(BN_Bn2Bin(in, bin, &len), ret);
for (uint32_t i = 0; i < FELEM_BYTES; ++i) {
bin[FELEM_BYTES - 1 - i] = i < len ? bin[len - 1 - i] : 0;
}
Bin2Felem(out, bin);
ERR:
return ret;
}
/*
* Convert Felem to BN
* Input:
* in[] < 2^64
*/
static int32_t Felem2BN(BN_BigNum *out, const Felem *in)
{
int32_t ret;
uint8_t bin[FELEM_BYTES];
Felem2Bin(bin, in);
GOTO_ERR_IF(BN_Bin2Bn(out, bin, FELEM_BYTES), ret);
ERR:
return ret;
}
/* ---------------------------field operation--------------------------- */
/*
* Assignment
*/
static inline void FelemAssign(Felem *out, const Felem *in)
{
out->data[0] = in->data[0]; // out->data[0] get the value
out->data[1] = in->data[1]; // out->data[1] get the value
out->data[2] = in->data[2]; // out->data[2] get the value
out->data[3] = in->data[3]; // out->data[3] get the value
}
/*
* Copy each digit by mask. If the corresponding bit is 1, copy it. If the corresponding bit is 0, retain it.
*/
static inline void FelemAssignWithMask(Felem *out, const Felem *in, const uint128_t mask)
{
uint128_t rmask = ~mask;
// The value of out->data[0] is changed or remains unchanged.
out->data[0] = (in->data[0] & mask) | (out->data[0] & rmask);
// The value of out->data[1] is changed or remains unchanged.
out->data[1] = (in->data[1] & mask) | (out->data[1] & rmask);
// The value of out->data[2] is changed or remains unchanged.
out->data[2] = (in->data[2] & mask) | (out->data[2] & rmask);
// The value of out->data[3] is changed or remains unchanged.
out->data[3] = (in->data[3] & mask) | (out->data[3] & rmask);
}
/*
* Set the lowest digit
*/
static inline void FelemSetLimb(Felem *out, const uint128_t in)
{
out->data[0] = in; // out->data[0] get the value
out->data[1] = 0; // out->data[1] clear to 0
out->data[2] = 0; // out->data[2] clear to 0
out->data[3] = 0; // out->data[3] clear to 0
}
/*
* Zero judgment: input less than 2 ^ 256, only 0 and p need to be judged.
* Input:
* in[] < 2^64
*/
static inline uint128_t FelemIsZero(const Felem *in)
{
uint128_t isZero, isP;
// Check whether digits 0, 1, 2, and 3 are all 0.
isZero = in->data[0] | in->data[1] | in->data[2] | in->data[3];
isZero -= 1; // If in == 0, the most significant bit is 1.
// Determine that in is equal to the field order.
isP = (in->data[0] ^ FIELD_ORDER.data[0]) | // Determine whether the digits 0 is equal to the order
(in->data[1] ^ FIELD_ORDER.data[1]) | // Determine whether the digits 1 is equal to the order
(in->data[2] ^ FIELD_ORDER.data[2]) | // Determine whether the digits 2 is equal to the order
(in->data[3] ^ FIELD_ORDER.data[3]); // Determine whether the digits 3 is equal to the order
isP -= 1; // If in == p, the most significant bit is 1.
return (isZero | isP) >> (LIMB_BITS - 1);
}
/*
* Obtain the bit string whose length is len at idx in Felem.
* Input:
* in[] < 2^64
* 0 < len <= 64
*/
static uint64_t FelemGetBits(const Felem *in, int32_t idx, uint32_t len)
{
uint128_t ret;
uint32_t lower, upper;
uint64_t mask;
lower = (uint32_t)idx;
// When 0 <= lower < 256, the most significant bit is 1, obtain the most significant bit by right shifted by 31 bits
mask = (uint64_t)0 - ((~lower & (lower - 256)) >> 31);
ret = (uint64_t)in->data[(lower / BASE_BITS) & mask] & mask;
upper = (uint32_t)idx + BASE_BITS; // next unary block
// When 0 <= upper < 256, the most significant bit is 1, obtain the most significant bit by right shifted by 31 bits
mask = (uint64_t)0 - ((~upper & (upper - 256)) >> 31);
ret |= (uint128_t)((uint64_t)in->data[(upper / BASE_BITS) & mask] & mask) << BASE_BITS;
// Take the lower six bits, that is, mod 64, regardless of the positive and negative values of "lower".
ret >>= lower & (BASE_BITS - 1);
ret &= ((uint64_t)1 << len) - 1; // All 1-bit string with the len length
return (uint64_t)ret;
}
/*
* Field element reduction, retains the base bit (64 bits) of each digit in the 4-ary Felem, and reduce the high bit.
* Should be called before modular multiplication, modulus square, or modulus
* Input:
* in[] < 2^127
* Output:
* out[] < 2^64
*/
static void FelemReduce(Felem *out, const Felem *in)
{
uint128_t *po = out->data;
const uint128_t *pi = in->data;
const uint128_t borrow = (uint128_t)1 << 96; // 2 ^ 96 borrowed from low to high
const uint128_t lend = (uint128_t)1 << 32; // 2 ^ 32 lent from high to low
uint128_t carryLimb, carryLimbTotal;
// Process the carry of each digit first: 0 -> 1 -> 2 -> 3
po[1] = pi[1] + (pi[0] >> BASE_BITS); // po[1] takes the input value and adds the carry of digit 0.
po[2] = pi[2] + (po[1] >> BASE_BITS); // po[2] takes the input value and adds the carry of digit 1.
po[3] = pi[3] + (po[2] >> BASE_BITS); // po[3] takes the input value and adds the carry of digit 2.
po[0] = (uint64_t)pi[0]; // po[0] takes the basic digit.
po[1] = (uint64_t)po[1]; // po[1] takes the basic digit.
po[2] = (uint64_t)po[2]; // po[2] takes the basic digit.
// Now reduce the highest digit. Only need to reduce the carry of the highest digit three times.
// Note the carry bit of out[3] as carryLimb.
// It can be known from the equation:
// carryLimb * 2^256 = carryLimb * (2^224 - 2^192 - 2^96 + 1) (mod 2^256 - 2^224 + 2^192 + 2^96 - 1)
// The part of carryLimb * (2^224 - 2^192) needs to be placed in out[3]
//
// First reduction: po[3] < 2^128 ---> po[3] < 2^96
// Assume that po[3] = 0x ffffffffffffffff ffffffffffffffff
// 0x 0000000000000000 ffffffffffffffff -> po[3] basic digit(unit)
// + 0x 00000000ffffffff ffffffff00000000 -> carryLimb * 2^32
// - 0x 0000000000000000 ffffffffffffffff -> carryLimb
// -----------------------------------------
// = 0x 00000000ffffffff ffffffff00000000 -> po[3] <= 2^96 - 2^32 < 2^96
// Second reduction: po[3] < 2^96 ---> po[3] < 2^65 - 2^33
// Assume that po[3] = 0x 00000000ffffffff ffffffffffffffff
// 0x 0000000000000000 ffffffffffffffff
// + 0x 0000000000000000 ffffffff00000000
// - 0x 0000000000000000 00000000ffffffff
// -----------------------------------------
// = 0x 0000000000000001 fffffffe00000000 -> po[3] <= 2^65 - 2^33 < 2^65 - 2^33
// Third reduction: po[3] < 2^65 - 2^32 ---> po[3] < 2^64
// Assume that po[3] = 0x 0000000000000001 ffffffff00000000
// 0x 0000000000000000 ffffffff00000000
// + 0x 0000000000000000 0000000100000000
// - 0x 0000000000000000 0000000000000001
// -----------------------------------------
// = 0x 0000000000000000 ffffffffffffffff -> po[3] < 2^64
//
// In addition, use carryLimbTotal to store the sum of carry bits.
// In this way, carryLimbTotal*(-2^96 + 1) can be calculated at a time.
// The simple conclusion is that when out[3] is the maximum, carryLimbTotal is the maximum.
// Consider the maximum value of out[3].
// 0x 7fffffffffffffff ffffffffffffffff -> Maximum value of pi[3] (pi[3] < 2^127)
// + 0x 0000000000000000 8000000000000000 -> Maximum value of carry of pi[2]
// -----------------------------------------
// = 0x 8000000000000000 7fffffffffffffff -> Maximum value of po[3]
// Use the value to perform three reduction:
// carryLimbTotal = 0x8000000000000000 + 0x7fffffff + 0x1 = 0x8000000080000000 < 2^64
carryLimbTotal = carryLimb = po[3] >> BASE_BITS; // Reduce carryLimb and take the carry of po[3].
po[3] = (uint64_t)po[3] + (carryLimb << 32) - carryLimb; // The reduction factor on po[3] is (2 ^ 32 - 1).
carryLimbTotal += (carryLimb = po[3] >> BASE_BITS); // Reduce carryLimb and take the carry of po[3].
po[3] = (uint64_t)po[3] + (carryLimb << 32) - carryLimb; // The reduction factor on po[3] is (2 ^ 32 - 1).
carryLimbTotal += (carryLimb = po[3] >> BASE_BITS); // Reduce carryLimb and take the carry of po[3].
po[3] = (uint64_t)po[3] + (carryLimb << 32) - carryLimb; // The reduction factor on po[3] is (2 ^ 32 - 1).
// Calculate the remaining carryLimbTotal * (-2^96 + 1) <= 0
// In this case, it is impossible to carry out[4]. Therefore, po[3] < 2^64.
// If carryLimbTotal > 0, po[3] must be equal to at least 2 ^ 32 - 1. (i.e., po[3] = 2^64 in the last step)
// In this case, it is obvious that (2^32 - 1) * 2^192 > |carryLimbTotal * (-2^96 + 1)|
po[0] += carryLimbTotal; // reduction of carryLimbTotal which the coefficient is 1
// po[1] + po[0] carry + Borrowed Bits - Reduction Factor 2^32
po[1] += ((po[0] >> BASE_BITS) ^ borrow) - (carryLimbTotal << 32);
// po[2] + po[1] carry + Borrowing Bits - Lending Bits
po[2] += ((po[1] >> BASE_BITS) ^ borrow) - lend;
// po[3] + po[2] carry - Lending Bits
po[3] += (po[2] >> BASE_BITS) - lend;
po[0] = (uint64_t)po[0]; // po[0] takes the basic digit.
po[1] = (uint64_t)po[1]; // po[1] takes the basic digit.
po[2] = (uint64_t)po[2]; // po[2] takes the basic digit.
}
/*
* Field element reduction, converting 8-ary LongFelem to 4-ary Felem
* Input:
* in[] < 2^80
* Output:
* out[] < 2^115
* - out[0] < (2^114 + 2^82 - 2^50) + 2^(80 + 32) + 2 * 2^80 < 2^115
* - out[1] < (2^114 + 2^82 - 2^50) + 2^(80 + 33) + 2 * 2^80 < 2^115
* - out[2] < (2^114 + 2^82 - 2^50) + 2^(80 + 33) + 4 * 2^80 < 2^115
* - out[3] < (2^114 + 2^82 - 2^50) + 2^(80 + 32) + 4 * 2^80 < 2^115
* out[] > 0
* - out[0] > (2^114 - 2^82) - 2 * 2^(80 + 32) - 2 * 2^80 > 0
* - out[1] > (2^114 - 2^82) - 2^(80 + 32) - 2^80 > 0
* - out[2] > (2^114 - 2^82) - 2^(80 + 32) - 2^80 > 0
* - out[3] > (2^114 - 2^82) - 2 * 2^(80 + 32) - 2^80 > 0
*/
static void LongFelemReduce(Felem *out, const LongFelem *in)
{
// n ≡ n / a * (a - b) ≡ n / a * b (mod (a - b))
// The following formula can be obtained:
// 2^n ≡ 2^(n - 256) * (2^224 - 2^192 - 2^96 + 1) (mod (2^256 - 2^224 + 2^192 + 2^96 - 1))
//
// 2^256 mod p
// = 2^224 - 2^192 - 2^96 + 1
//
// 2^288 mod p
// = 2^256 - 2^224 - 2^128 + 2^32
// = -2^192 - 2^128 - 2^96 + 2^32 + 1
//
// 2^320 mod p
// = 2^288 - 2^256 - 2^160 + 2^64
// = -2^224 - 2^160 - 2^128 + 2^64 + 2^32
//
// 2^352 mod p
// = 2^320 - 2^288 - 2^192 + 2^96
// = -2^224 - 2^160 + 2 * 2^96 + 2^64 - 1
//
// 2^384 mod p
// = 2^352 - 2^320 - 2^224 + 2^128
// = -2^224 + 2 * 2^128 + 2 * 2^96 - 2^32 - 1
//
// 2^416 mod p
// = 2^384 - 2^352 - 2^256 + 2^160
// = -2^224 + 2^192 + 2 * 2^160 + 2 * 2^128 + 2^96 - 2^64 - 2^32 - 1
//
// 2^448 mod p
// = 2^416 - 2^384 - 2^288 + 2^192
// = 3 * 2^192 + 2 * 2^160 + 2^128 - 2^64 - 2^32 - 1
//
// 2^480 mod p
// = 2^448 - 2^416 - 2^320 + 2^224
// = 3 * 2^224 + 2 * 2^192 + 2^160 - 2^96 - 2^64 - 2^32
static const Felem zeroBase = {
{
(((uint128_t)1 << 64) - 1) << 50,
(((uint128_t)1 << 64) + ((uint128_t)1 << 32) - 1) << 50,
(((uint128_t)1 << 64) - 1) << 50,
(((uint128_t)1 << 64) - ((uint128_t)1 << 32)) << 50,
}
};
uint128_t *po = out->data;
const uint128_t *pi = in->data;
// Add the term reduced by pi[4]*2^256, pi[5]*2^320, pi[6]*2^384, pi[7]*2^448 to the corresponding digit.
// Assign a value after zero adjustment.
// Adjust to zero of digit 0. Take the input value pi[0].
// The reduction item list is (pi[4], pi[5]*2^32, -pi[6] - pi[6]*2^32, -pi[7] - pi[7]*2^32)
po[0] = zeroBase.data[0] + pi[0] + pi[4] + (pi[5] << 32) - pi[6] - (pi[6] << 32) - pi[7] - (pi[7] << 32);
// Adjust to zero of digit 1. Take the input value pi[1].
// The reduction item list is (-pi[4]*2^32, pi[5], pi[6]*2^33, -pi[7])
po[1] = zeroBase.data[1] + pi[1] - (pi[4] << 32) + pi[5] + (pi[6] << 33) - pi[7];
// Adjust to zero of digit 2. Take the input value pi[2].
// The reduction item list is (0, -pi[5] - pi[5]*2^32, -pi[6]*2, pi[7] + pi[7]*2^33)
po[2] = zeroBase.data[2] + pi[2] - pi[5] - (pi[5] << 32) + (pi[6] << 1) + pi[7] + (pi[7] << 33);
// Adjust to zero of digit 3. Take the input value pi[3].
// The reduction item list is (-pi[4] + pi[4]*2^32, -pi[5]*2^32, -pi[6]*2^32, pi[7]*3)
po[3] = zeroBase.data[3] + pi[3] - pi[4] + (pi[4] << 32) - (pi[5] << 32) - (pi[6] << 32) + (pi[7] * 3);
}
/*
* field element modulo: convert the field element to a unique value within [0, p)
* Input:
* in[] < 2^64
* Output:
* out < p, out[] < 2^64
*/
static void FelemContract(Felem *out, const Felem *in)
{
uint128_t *po = out->data;
const uint128_t *pi = in->data;
const uint128_t borrow = (uint128_t)1 << BASE_BITS;
const uint128_t lend = 1;
bool isGreaterOrEqual = true;
for (int32_t i = 3; i >= 0; i--) {
if (pi[i] > FIELD_ORDER.data[i]) {
break;
} else if (pi[i] < FIELD_ORDER.data[i]) {
isGreaterOrEqual = false;
break;
}
}
if (isGreaterOrEqual) {
// p_3 = 0xffffffff00000001
po[3] = (pi[3] - lend) - FIELD_ORDER.data[3];
// p_2 = 0x0000000000000000
po[2] = (borrow ^ pi[2]) - lend;
// p_1 = 0x00000000ffffffff
po[1] = ((borrow ^ pi[1]) - lend) - FIELD_ORDER.data[1];
// p_0 = 0xffffffffffffffff
po[0] = (borrow ^ pi[0]) - FIELD_ORDER.data[0];
}
// Process carry 0 -> 1 -> 2 -> 3
po[1] += po[0] >> BASE_BITS; // po[1] + po[0] carry
po[2] += po[1] >> BASE_BITS; // po[2] + po[1] carry
po[3] += po[2] >> BASE_BITS; // po[3] + po[2] carry
po[0] = (uint64_t)po[0]; // po[0] takes the basic digit.
po[1] = (uint64_t)po[1]; // po[1] takes the basic digit.
po[2] = (uint64_t)po[2]; // po[2] takes the basic digit.
}
/*
* Field Addition
*/
static inline void FelemAdd(Felem *out, const Felem *a, const Felem *b)
{
out->data[0] = a->data[0] + b->data[0]; // out->data[0] get the value
out->data[1] = a->data[1] + b->data[1]; // out->data[1] get the value
out->data[2] = a->data[2] + b->data[2]; // out->data[2] get the value
out->data[3] = a->data[3] + b->data[3]; // out->data[3] get the value
}
/*
* Field element negation
* Input:
* in[] <= 2^124 - 2^92
* Output:
* out[] <= 2^124 + 2^92 - 2^60 + in[]
*/
static inline void FelemNeg(Felem *out, const Felem *in)
{
static const Felem zeroBase = {{
(((uint128_t)1 << 64) - 1) << 60,
(((uint128_t)1 << 64) + ((uint128_t)1 << 32) - 1) << 60,
(((uint128_t)1 << 64) - 1) << 60,
(((uint128_t)1 << 64) - ((uint128_t)1 << 32)) << 60,
}};
out->data[0] = zeroBase.data[0] - in->data[0]; // out->data[0] get the value
out->data[1] = zeroBase.data[1] - in->data[1]; // out->data[1] get the value
out->data[2] = zeroBase.data[2] - in->data[2]; // out->data[2] get the value
out->data[3] = zeroBase.data[3] - in->data[3]; // out->data[3] get the value
}
/*
* Field subtraction
* Input:
* a[] < 2^128 - 2^124 - 2^92 + 2^60,b[] <= 2^124 - 2^92
* Output:
* out[] <= 2^124 + 2^92 - 2^60 + a[] < 2^128
*/
static inline void FelemSub(Felem *out, const Felem *a, const Felem *b)
{
static const Felem zeroBase = {{
(((uint128_t)1 << 64) - 1) << 60,
(((uint128_t)1 << 64) + ((uint128_t)1 << 32) - 1) << 60,
(((uint128_t)1 << 64) - 1) << 60,
(((uint128_t)1 << 64) - ((uint128_t)1 << 32)) << 60,
}};
out->data[0] = zeroBase.data[0] + a->data[0] - b->data[0]; // out->data[0] get the value
out->data[1] = zeroBase.data[1] + a->data[1] - b->data[1]; // out->data[1] get the value
out->data[2] = zeroBase.data[2] + a->data[2] - b->data[2]; // out->data[2] get the value
out->data[3] = zeroBase.data[3] + a->data[3] - b->data[3]; // out->data[3] get the value
}
/*
* Field subtraction. Input LongFelem directly.
* Input:
* a[] < 2^128 - 2^74 - 2^42 + 2^10,b[] <= 2^74 - 2^42
* Output:
* out[] <= 2^74 + 2^42 - 2^10 + a[] < 2^128
*/
static void LongFelemSub(LongFelem *out, const LongFelem *a, const LongFelem *b)
{
static const LongFelem zeroBase = {{
((uint128_t)1 << 64) << 10,
(((uint128_t)1 << 64) - 1) << 10,
(((uint128_t)1 << 64) - 1) << 10,
(((uint128_t)1 << 64) - 1) << 10,
(((uint128_t)1 << 64) - 2) << 10,
(((uint128_t)1 << 64) + ((uint128_t)1 << 32) - 1) << 10,
(((uint128_t)1 << 64) - 1) << 10,
(((uint128_t)1 << 64) - ((uint128_t)1 << 32)) << 10,
}};
out->data[0] = zeroBase.data[0] + a->data[0] - b->data[0]; // out->data[0] get the value
out->data[1] = zeroBase.data[1] + a->data[1] - b->data[1]; // out->data[1] get the value
out->data[2] = zeroBase.data[2] + a->data[2] - b->data[2]; // out->data[2] get the value
out->data[3] = zeroBase.data[3] + a->data[3] - b->data[3]; // out->data[3] get the value
out->data[4] = zeroBase.data[4] + a->data[4] - b->data[4]; // out->data[4] get the value
out->data[5] = zeroBase.data[5] + a->data[5] - b->data[5]; // out->data[5] get the value
out->data[6] = zeroBase.data[6] + a->data[6] - b->data[6]; // out->data[6] get the value
out->data[7] = zeroBase.data[7] + a->data[7] - b->data[7]; // out->data[7] get the value
}
/*
* Scale the field element
* Use only a small magnification(scale) factor to ensure that in[] * scalar does not overflow.
*/
static inline void FelemScale(Felem *out, const Felem *in, const uint32_t scalar)
{
out->data[0] = in->data[0] * scalar; // out->data[0] get the value
out->data[1] = in->data[1] * scalar; // out->data[1] get the value
out->data[2] = in->data[2] * scalar; // out->data[2] get the value
out->data[3] = in->data[3] * scalar; // out->data[3] get the value
}
/*
* Scale the field element. Input LongFelem directly.
* Use only a small magnification(scale) factor to ensure that in[] * scalar does not overflow.
*/
static inline void LongFelemScale(LongFelem *out, const LongFelem *in, const uint32_t scalar)
{
out->data[0] = in->data[0] * scalar; // out->data[0] get the value
out->data[1] = in->data[1] * scalar; // out->data[1] get the value
out->data[2] = in->data[2] * scalar; // out->data[2] get the value
out->data[3] = in->data[3] * scalar; // out->data[3] get the value
out->data[4] = in->data[4] * scalar; // out->data[4] get the value
out->data[5] = in->data[5] * scalar; // out->data[5] get the value
out->data[6] = in->data[6] * scalar; // out->data[6] get the value
out->data[7] = in->data[7] * scalar; // out->data[7] get the value
}
/*
* Field Multiplication
* Input:
* a[] < 2^64, b[] < 2^64
* Output:
* out[] < 2^67
* - out[0] < 2^64
* - out[1] < 2^64 * 3
* - out[2] < 2^64 * 5
* - out[3] < 2^64 * 7
* - out[4] < 2^64 * 7
* - out[5] < 2^64 * 5
* - out[6] < 2^64 * 3
* - out[7] < 2^64
*/
static void FelemMul(LongFelem *out, const Felem *a, const Felem *b)
{
// out[0] = a[0]*b[0]
// out[1] = a[0]*b[1] + a[1]*b[0]
// out[2] = a[0]*b[2] + a[1]*b[1] + a[2]*b[0]
// out[3] = a[0]*b[3] + a[1]*b[2] + a[2]*b[1] + a[3]*b[0]
// out[4] = a[1]*b[3] + a[2]*b[2] + a[3]*b[1]
// out[5] = a[2]*b[3] + a[3]*b[2]
// out[6] = a[3]*b[3]
const uint64_t a64[4] = {(uint64_t)a->data[0], (uint64_t)a->data[1], (uint64_t)a->data[2], (uint64_t)a->data[3]};
const uint64_t b64[4] = {(uint64_t)b->data[0], (uint64_t)b->data[1], (uint64_t)b->data[2], (uint64_t)b->data[3]};
uint128_t limbMul;
// out[0] = a[0]*b[0]
limbMul = (uint128_t)a64[0] * b64[0]; // a[0] * b[0]
out->data[0] = (uint64_t)limbMul; // Digit 0 plus the basic digit
out->data[1] = limbMul >> BASE_BITS; // Digit 1 plus the carry
// out[1] = a[0]*b[1] + a[1]*b[0]
limbMul = (uint128_t)a64[0] * b64[1]; // a[0] * b[1]
out->data[1] += (uint64_t)limbMul; // Digit 1 plus the basic digit
out->data[2] = limbMul >> BASE_BITS; // Digit 2 plus the carry
limbMul = (uint128_t)a64[1] * b64[0]; // a[1] * b[0]
out->data[1] += (uint64_t)limbMul; // Digit 1 plus the basic digit
out->data[2] += limbMul >> BASE_BITS; // Digit 2 plus the carry
// out[2] = a[0]*b[2] + a[1]*b[1] + a[2]*b[0]
limbMul = (uint128_t)a64[0] * b64[2]; // a[0] * b[2]
out->data[2] += (uint64_t)limbMul; // Digit 2 plus the basic digit
out->data[3] = limbMul >> BASE_BITS; // Digit 3 plus the carry
limbMul = (uint128_t)a64[1] * b64[1]; // a[1] * a[1]
out->data[2] += (uint64_t)limbMul; // Digit 2 plus the basic digit
out->data[3] += limbMul >> BASE_BITS; // Digit 3 plus the carry
limbMul = (uint128_t)a64[2] * b64[0]; // a[2] * b[0]
out->data[2] += (uint64_t)limbMul; // Digit 2 plus the basic digit
out->data[3] += limbMul >> BASE_BITS; // Digit 3 plus the carry
// out[3] = a[0]*b[3] + a[1]*b[2] + a[2]*b[1] + a[3]*b[0]
limbMul = (uint128_t)a64[0] * b64[3]; // a[0] * b[3]
out->data[3] += (uint64_t)limbMul; // Digit 3 plus the basic digit
out->data[4] = limbMul >> BASE_BITS; // Digit 4 plus the carry
limbMul = (uint128_t)a64[1] * b64[2]; // a[1] * b[2]
out->data[3] += (uint64_t)limbMul; // Digit 3 plus the basic digit
out->data[4] += limbMul >> BASE_BITS; // Digit 4 plus the carry
limbMul = (uint128_t)a64[2] * b64[1]; // a[2] * b[1]
out->data[3] += (uint64_t)limbMul; // Digit 3 plus the basic digit
out->data[4] += limbMul >> BASE_BITS; // Digit 4 plus the carry
limbMul = (uint128_t)a64[3] * b64[0]; // a[3] * b[0]
out->data[3] += (uint64_t)limbMul; // Digit 3 plus the basic digit
out->data[4] += limbMul >> BASE_BITS; // Digit 4 plus the carry
// out[4] = a[1]*b[3] + a[2]*b[2] + a[3]*b[1]
limbMul = (uint128_t)a64[1] * b64[3]; // a[1] * b[3]
out->data[4] += (uint64_t)limbMul; // Digit 4 plus the basic digit
out->data[5] = limbMul >> BASE_BITS; // Digit 5 plus the carry
limbMul = (uint128_t)a64[2] * b64[2]; // a[2] * b[2]
out->data[4] += (uint64_t)limbMul; // Digit 4 plus the basic digit
out->data[5] += limbMul >> BASE_BITS; // Digit 5 plus the carry
limbMul = (uint128_t)a64[3] * b64[1]; // a[3] * b[1]
out->data[4] += (uint64_t)limbMul; // Digit 4 plus the basic digit
out->data[5] += limbMul >> BASE_BITS; // Digit 5 plus the carry
// out[5] = a[2]*b[3] + a[3]*b[2]
limbMul = (uint128_t)a64[2] * b64[3]; // a[2] * b[3]
out->data[5] += (uint64_t)limbMul; // Digit 5 plus the basic digit
out->data[6] = limbMul >> BASE_BITS; // Digit 6 plus the carry
limbMul = (uint128_t)a64[3] * b64[2]; // a[3] * b[2]
out->data[5] += (uint64_t)limbMul; // Digit 5 plus the basic digit
out->data[6] += limbMul >> BASE_BITS; // Digit 6 plus the carry
// out[6] = a[3]*b[3]
limbMul = (uint128_t)a64[3] * b64[3]; // a[3] * b[3]
out->data[6] += (uint64_t)limbMul; // Digit 6 plus the basic digit
out->data[7] = limbMul >> BASE_BITS; // Digit 7 plus the carry
}
/*
* Field square
* Input:
* a[] < 2^64
* Output:
* out[] < 2^67
* - out[0] < 2^64
* - out[1] < 2^64 * 2
* - out[2] < 2^64 * 4
* - out[3] < 2^64 * 5
* - out[4] < 2^64 * 6
* - out[5] < 2^64 * 4
* - out[6] < 2^64 * 3
* - out[7] < 2^64
*/
static void FelemSqr(LongFelem *out, const Felem *a)
{
// out[0] = a[0]*a[0]
// out[1] = a[0]*a[1]*2
// out[2] = a[0]*a[2]*2 + a[1]*a[1]
// out[3] = a[0]*a[3]*2 + a[1]*a[2]*2
// out[4] = a[1]*a[3]*2 + a[2]*a[2]
// out[5] = a[2]*a[3]*2
// out[6] = a[3]*a[3]
const uint64_t a64[4] = {(uint64_t)a->data[0], (uint64_t)a->data[1], (uint64_t)a->data[2], (uint64_t)a->data[3]};
uint128_t limbMul;
// out[0] = a[0]*a[0]
limbMul = (uint128_t)a64[0] * a64[0]; // a[0] * a[0]
out->data[0] = (uint64_t)limbMul; // Digit 0 plus the basic digit
out->data[1] = limbMul >> BASE_BITS; // Digit 1 plus the carry
// out[1] = a[0]*a[1]*2
limbMul = (uint128_t)a64[0] * a64[1]; // a[0] * a[1]
out->data[1] += (uint64_t)limbMul << 1; // basic digit after the product is left shifted by 1bit, add to digit 1
out->data[2] = limbMul >> (BASE_BITS - 1); // carry after product shift, add to digit 2
// out[2] = a[0]*a[2]*2 + a[1]*a[1]
limbMul = (uint128_t)a64[0] * a64[2]; // a[0] * a[2]
out->data[2] += (uint64_t)limbMul << 1; // basic digit after the product is left shifted by 1bit, add to digit 2
out->data[3] = limbMul >> (BASE_BITS - 1); // carry after product shift, add to digit 3
limbMul = (uint128_t)a64[1] * a64[1]; // a[1] * a[1]
out->data[2] += (uint64_t)limbMul; // Digit 2 plus the basic digit
out->data[3] += limbMul >> BASE_BITS; // Digit 3 plus the carry
// out[3] = a[0]*a[3]*2 + a[1]*a[2]*2
limbMul = (uint128_t)a64[0] * a64[3]; // a[0] * a[3]
out->data[3] += (uint64_t)limbMul << 1; // basic digit after the product is left shifted by 1bit, add to digit 3
out->data[4] = limbMul >> (BASE_BITS - 1); // carry after product shift, add to digit 4
limbMul = (uint128_t)a64[1] * a64[2]; // a[1] * a[2]
out->data[3] += (uint64_t)limbMul << 1; // basic digit after the product is left shifted by 1bit, add to digit 3
out->data[4] += limbMul >> (BASE_BITS - 1); // carry after product shift, add to digit 4
// out[4] = a[1]*a[3]*2 + a[2]*a[2]
limbMul = (uint128_t)a64[1] * a64[3]; // a[1] * a[3]
out->data[4] += (uint64_t)limbMul << 1; // basic digit after the product is left shifted by 1bit, add to digit 4
out->data[5] = limbMul >> (BASE_BITS - 1); // carry after product shift, add to digit 5
limbMul = (uint128_t)a64[2] * a64[2]; // a[2] * a[2]
out->data[4] += (uint64_t)limbMul; // Digit 4 plus the basic digit
out->data[5] += limbMul >> BASE_BITS; // Digit 5 plus the carry
// out[5] = a[2]*a[3]*2
limbMul = (uint128_t)a64[2] * a64[3]; // a[2] * a[3]
out->data[5] += (uint64_t)limbMul << 1; // basic digit after the product is left shifted by 1bit, add to digit 5
out->data[6] = limbMul >> (BASE_BITS - 1); // carry after product shift, add to digit 6
// out[6] = a[3]*a[3]
limbMul = (uint128_t)a64[3] * a64[3]; // a[3] * a[3]
out->data[6] += (uint64_t)limbMul; // Digit 6 plus the basic digit
out->data[7] = limbMul >> BASE_BITS; // Digit 7 plus the carry
}
static inline void FelemMulReduce(Felem *out, const Felem *a, const Felem *b)
{
LongFelem ltmp;
FelemMul(<mp, a, b);
LongFelemReduce(out, <mp);
}
static inline void FelemSqrReduce(Felem *out, const Felem *in)
{
LongFelem ltmp;
FelemSqr(<mp, in);
LongFelemReduce(out, <mp);
}
static inline void FelemMulReduceToBase(Felem *out, const Felem *a, const Felem *b)
{
LongFelem ltmp;
FelemMul(<mp, a, b);
LongFelemReduce(out, <mp);
FelemReduce(out, out);
}
static inline void FelemSqrReduceToBase(Felem *out, const Felem *in)
{
LongFelem ltmp;
FelemSqr(<mp, in);
LongFelemReduce(out, <mp);
FelemReduce(out, out);
}
/*
* Field element inversion
* From Fermat's little theorem, in^(p - 2) = in^(-1) (mod p)
* in^(-1) = in^(2^256 - 2^224 + 2^192 + 2^96 - 1 - 2) (mod p)
* Input:
* in[] < 2^64
* Output:
* out[] < 2^64
*/
static void FelemInv(Felem *out, const Felem *in)
{
Felem inE3, inEf, inEff, inEffff, inEffffffff, inEfx16Lsh32, inEfffffffd;
// Construct in^(p - 2) by moving left and adding.
// The value of p - 2 is as follows:
// ffffffff 00000001
// 00000000 00000000
// 00000000 ffffffff
// ffffffff fffffffd
// Construct the {1, 3, f, ff, ffff, ffffffff} power of in by left shift and addition.
// Construct in^1
FelemAssign(out, in); // in^1
// Construct in^3
FelemSqrReduceToBase(out, out); // in^2
FelemMulReduceToBase(out, out, in); // in^3
FelemAssign(&inE3, out);
// Construct in^f
FelemSqrReduceToBase(out, out); // in^6
FelemSqrReduceToBase(out, out); // in^c
FelemMulReduceToBase(&inEfffffffd, out, in); // inEfffffffd = in^d
FelemMulReduceToBase(out, out, &inE3); // in^f
FelemAssign(&inEf, out);
// Construct in^ff
FelemSqrReduceToBase(out, out); // in^1e
FelemSqrReduceToBase(out, out); // in^3c
FelemSqrReduceToBase(out, out); // in^78
FelemSqrReduceToBase(out, out); // in^f0
FelemMulReduceToBase(&inEfffffffd, out, &inEfffffffd); // inEfffffffd = in^fd
FelemMulReduceToBase(out, out, &inEf); // in^ff
FelemAssign(&inEff, out);
// Construct in^ffff and shift ff to the left by 8 bits to obtain ff00
for (int32_t i = 0; i < 8; ++i) {
FelemSqrReduceToBase(out, out);
} // in^ff00
FelemMulReduceToBase(&inEfffffffd, out, &inEfffffffd); // inEfffffffd = in^fffd
FelemMulReduceToBase(out, out, &inEff); // in^ffff
FelemAssign(&inEffff, out);
// Construct in^ffffffff and shift ffff to the left by 16 bits to obtain ffff0000
for (int32_t i = 0; i < 16; ++i) {
FelemSqrReduceToBase(out, out);
} // in^ffff0000
FelemMulReduceToBase(&inEfffffffd, out, &inEfffffffd); // inEfffffffd = in^fffffffd
FelemMulReduceToBase(out, out, &inEffff); // in^ffffffff
FelemAssign(&inEffffffff, out);
// Construct in^ffffffff ffffffff 00000000
// Obtain in^ffffffff 00000000 and shift ffffffff to the left by 32 bits.
for (int32_t i = 0; i < 32; ++i) {
FelemSqrReduceToBase(out, out);
} // in^ffffffff 00000000
FelemAssign(&inEfx16Lsh32, out);
// Then obtain ffffffff 00000000 00000000 and shift it leftwards by 32 bits.
for (int32_t i = 0; i < 32; ++i) {
FelemSqrReduceToBase(out, out);
} // out = in^ffffffff 00000000 00000000
FelemMulReduceToBase(&inEfx16Lsh32, out, &inEfx16Lsh32); // inEfx16Lsh32 = in^ffffffff ffffffff 00000000
// Construct in^ffffffff 00000001 00000000
FelemMulReduceToBase(out, out, &inEffffffff); // in^ffffffff 00000000 ffffffff
FelemMulReduceToBase(out, out, in); // in^ffffffff 00000001 00000000
// Shift leftward by 160 bits to the top.
for (int32_t i = 0; i < 160; ++i) {
FelemSqrReduceToBase(out, out);
} // in^ffffffff 00000001 00000000 00000000 00000000 00000000 00000000 00000000
// Construct in^ffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff 00000000
FelemMulReduceToBase(out, out, &inEfx16Lsh32);
// Construct in^ffffffff 00000001 00000000 00000000 00000000 ffffffff ffffffff fffffffd
FelemMulReduceToBase(out, out, &inEfffffffd);
}
/* --------------------------Point group operation-------------------------- */
static inline void PtAssign(Point *out, const Point *in)
{
FelemAssign(&out->x, &in->x);
FelemAssign(&out->y, &in->y);
FelemAssign(&out->z, &in->z);
}
static inline void PtAssignWithMask(Point *out, const Point *in, const uint128_t mask)
{
FelemAssignWithMask(&out->x, &in->x, mask);
FelemAssignWithMask(&out->y, &in->y, mask);
FelemAssignWithMask(&out->z, &in->z, mask);
}
/*
* point double
* Algorithm reference: http://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#doubling-dbl-2001-b
* Number of field operations: 3M + 5S
* delta = Z^2
* gamma = Y^2
* beta = X * gamma
* alpha = 3 * (X - delta) * (X + delta)
* X' = alpha^2 - 8 * beta
* Z' = (Y + Z)^2 - gamma - delta
* Y' = alpha * (4 * beta - X') - 8 * gamma^2
* Input:
* in->x[], in->y[], in->z[] < 2^64
* Output:
* out->x[], out->y[], out->z[] < 2^64
*/
static void PtDouble(Point *out, const Point *in)
{
Felem delta, gamma, beta, alpha;
Felem tmp, tmp2;
LongFelem ltmp, ltmp2;
// delta = Z^2
FelemSqrReduce(&delta, &in->z); // delta[] < 2^115
// gamma = Y^2
FelemSqrReduceToBase(&gamma, &in->y);
// beta = X * gamma
FelemMulReduce(&beta, &in->x, &gamma); // beta[] < 2^115
// alpha = 3 * (X - delta) * (X + delta)
FelemAdd(&tmp, &in->x, &delta); // tmp[] < 2^64 + 2^115
FelemScale(&tmp, &tmp, 3); // 3 * (X + delta), tmp[] < (2^64 + 2^115) * 3 < 2^117
FelemSub(&tmp2, &in->x, &delta); // tmp2[] < (2^124 + 2^92 - 2^60) + 2^64 < 2^125
FelemReduce(&tmp, &tmp);
FelemReduce(&tmp2, &tmp2);
FelemMulReduceToBase(&alpha, &tmp, &tmp2);
// X' = alpha^2 - 8 * beta
FelemSqrReduce(&tmp, &alpha); // alpha^2, tmp[] < 2^115
FelemScale(&tmp2, &beta, 8); // 8 * beta, tmp2[] < 2^115 * 8 = 2^119
FelemSub(&out->x, &tmp, &tmp2); // out->x[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125
FelemReduce(&out->x, &out->x); // out->x[] < 2^64
// Z' = (Y + Z)^2 - gamma - delta
FelemAdd(&tmp, &in->y, &in->z);
FelemReduce(&tmp, &tmp);
FelemSqrReduce(&tmp, &tmp); // (Y + Z)^2, tmp[] < 2^115
FelemAdd(&tmp2, &gamma, &delta); // (gamma + delta), tmp2[] < 2^64 + 2^115 < 2^116
FelemSub(&out->z, &tmp, &tmp2); // out->z[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125
FelemReduce(&out->z, &out->z); // out->z[] < 2^64
// Y' = alpha * (4 * beta - X') - 8 * gamma^2
FelemScale(&beta, &beta, 4); // beta[] < 2^115 * 4 = 2^117
FelemSub(&tmp, &beta, &out->x);
FelemReduce(&tmp, &tmp);
FelemMul(<mp, &alpha, &tmp); // alpha * (4 * beta - X'), ltmp[] < 2^67
FelemSqr(<mp2, &gamma);
LongFelemScale(<mp2, <mp2, 8); // 8 * gamma^2, ltmp2[] < 2^67 * 8 < 2^70
LongFelemSub(<mp, <mp, <mp2); // ltmp[] < (2^74 + 2^42 - 2^10) + 2^67 < 2^75
LongFelemReduce(&out->y, <mp); // out->y[] < 2^115
FelemReduce(&out->y, &out->y); // out->y[] < 2^64
}
/*
* point addition
* Algorithm reference: http://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-add-2007-bl
* Infinity point calculation is not supported.
* Number of field operations: 11M + 5S
* Z1Z1 = Z1^2
* Z2Z2 = Z2^2
* U1 = X1 * Z2Z2
* U2 = X2 * Z1Z1
* S1 = Y1 * Z2 * Z2Z2
* S2 = Y2 * Z1 * Z1Z1
* H = U2 - U1
* I = (2 * H)^2
* J = H * I
* r = 2 * (S2 - S1)
* V = U1 * I
* X3 = r^2 - J - 2 * V
* Y3 = r * (V - X3) - 2 * S1 * J
* Z3 = ((Z1 + Z2)^2 - Z1Z1 - Z2Z2) * H
* Input:
* a->x[], a->y[], a->z[] < 2^64
* b->x[], b->y[], b->z[] < 2^64
* Output:
* out->x[], out->y[], out->z[] < 2^64
*/
static void PtAdd(Point *out, const Point *a, const Point *b)
{
Point result;
Felem z1sqr, z2sqr, u1, u2, s1, s2, h, i, j, r, v;
Felem tmp;
LongFelem ltmp, ltmp2;
uint128_t isZ1Zero, isZ2Zero;
// Z1Z1 = Z1^2
FelemSqrReduceToBase(&z1sqr, &a->z);
// Z2Z2 = Z2^2
FelemSqrReduceToBase(&z2sqr, &b->z);
isZ1Zero = 0 - FelemIsZero(&z1sqr);
isZ2Zero = 0 - FelemIsZero(&z2sqr);
// U1 = X1 * Z2Z2
FelemMulReduceToBase(&u1, &a->x, &z2sqr);
// U2 = X2 * Z1Z1
FelemMulReduce(&u2, &b->x, &z1sqr); // u2[] < 2^115
// S1 = Y1 * Z2 * Z2Z2
FelemMulReduceToBase(&s1, &b->z, &z2sqr);
FelemMulReduceToBase(&s1, &a->y, &s1);
// S2 = Y2 * Z1 * Z1Z1
FelemMulReduceToBase(&s2, &a->z, &z1sqr);
FelemMulReduce(&s2, &b->y, &s2); // s2[] < 2^115
// H = U2 - U1
FelemSub(&h, &u2, &u1); // h[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125
FelemReduce(&h, &h);
// r = 2 * (S2 - S1)
FelemSub(&r, &s2, &s1); // r[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125
FelemScale(&r, &r, 2); // r[] < 2^126
FelemReduce(&r, &r);
// H and r can determine whether x and y of the affine coordinates of two points are equal.
// If the values are equal, use double().
if (isZ1Zero == 0 && isZ2Zero == 0 && FelemIsZero(&h) != 0 && FelemIsZero(&r) != 0) {
// Use a smaller b point
PtDouble(out, b);
return;
}
// I = (2 * H)^2
FelemSqrReduce(&i, &h); // H^2, i[] < 2^115
FelemScale(&i, &i, 4); // 4 * H^2, i[] < 2^117
FelemReduce(&i, &i);
// J = H * I
FelemMulReduceToBase(&j, &h, &i);
// V = U1 * I
FelemMulReduce(&v, &u1, &i); // v[] < 2^115
// X3 = r^2 - (J + 2 * V)
FelemSqrReduce(&result.x, &r); // result.x[] < 2^115
FelemScale(&tmp, &v, 2); // tmp[] < 2^115 * 2 = 2^116
FelemAdd(&tmp, &j, &tmp); // tmp[] < 2^64 + 2^116 < 2^117
FelemSub(&result.x, &result.x, &tmp); // result.x[] < (2^124 + 2^90 - 2^60) + 2^115 < 2^125
FelemReduce(&result.x, &result.x); // result.x[] < 2^64
// Y3 = r * (V - X3) - 2 * S1 * J
FelemSub(&tmp, &v, &result.x);
FelemReduce(&tmp, &tmp);
FelemMul(<mp, &r, &tmp); // r * (V - X3), ltmp[] < 2^67
FelemMul(<mp2, &s1, &j); // ltmp2[] < 2^67
LongFelemScale(<mp2, <mp2, 2); // 2 * S1 * J, ltmp2[] < 2^68
LongFelemSub(<mp, <mp, <mp2); // ltmp[] < (2^74 + 2^42 - 2^10) + 2^67 < 2^75
LongFelemReduce(&result.y, <mp); // result.y[] < 2^115
FelemReduce(&result.y, &result.y); // result.y[] < 2^64
// Z3 = ((Z1 + Z2)^2 - Z1Z1 - Z2Z2) * H
FelemAdd(&result.z, &a->z, &b->z);
FelemReduce(&result.z, &result.z);
FelemSqrReduce(&result.z, &result.z); // (Z1 + Z2)^2
FelemAdd(&tmp, &z1sqr, &z2sqr); // Z1Z1 + Z2Z2
FelemSub(&result.z, &result.z, &tmp); // ((Z1 + Z2)^2 - Z1Z1 - Z2Z2)
FelemReduce(&result.z, &result.z);
FelemMulReduceToBase(&result.z, &result.z, &h); // result.z[] < 2^64
// Special case processing for infinity points
PtAssignWithMask(&result, a, isZ2Zero);
PtAssignWithMask(&result, b, isZ1Zero);
PtAssign(out, &result);
}
/*
* Mixed point addition
* Algorithm reference: http://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-3.html#addition-madd-2007-bl
* Infinity point calculation is not supported.
* Number of field operations: 7M + 4S
* Z1Z1 = Z1^2
* U2 = X2 * Z1Z1
* S2 = Y2 * Z1 * Z1Z1
* H = U2 - X1
* HH = H^2
* I = 4 * HH
* J = H * I
* r = 2 * (S2 - Y1)
* V = X1 * I
* X3 = r^2 - J - 2 * V
* Y3 = r * (V - X3) - 2 * Y1 * J
* Z3 = (Z1 + H)^2 - Z1Z1 - HH
* Input:
* a->x[] < 2^64, a->y[] < 2^64, a->z[] < 2^64
* b->x < p, b->y < p, b->z = 0 或 1
* Output:
* out->x[] < 2^64
* out->y[] < 2^64
* out->z[] < 2^64
*/
static void PtAddMixed(Point *out, const Point *a, const Point *b)
{
Point result;
Felem z1sqr, u2, s2, h, hsqr, i, j, r, v;
Felem tmp;
LongFelem ltmp, ltmp2;
uint128_t isZ1Zero, isZ2Zero;
// Z1Z1 = Z1^2
FelemSqrReduceToBase(&z1sqr, &a->z);
isZ1Zero = 0 - FelemIsZero(&z1sqr);
// The Z coordinate of point b can only be 0 or 1, that is, digit 0 can only be 0 or 1, and the other digits are 0.
isZ2Zero = b->z.data[0] - 1;
// U2 = X2 * Z1Z1
FelemMulReduce(&u2, &b->x, &z1sqr); // u2[] < 2^115
// S2 = Y2 * Z1 * Z1Z1
FelemMulReduceToBase(&s2, &a->z, &z1sqr);
FelemMulReduce(&s2, &b->y, &s2); // s2[] < 2^115
// H = U2 - X1
FelemSub(&h, &u2, &a->x); // h[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125
FelemReduce(&h, &h);
// r = 2 * (S2 - Y1)
FelemSub(&r, &s2, &a->y); // r[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125
FelemScale(&r, &r, 2); // r[] < 2^126
FelemReduce(&r, &r);
// H and r can determine whether x and y of the affine coordinates of two points are equal.
// If the values are equal, use double().
if (isZ1Zero == 0 && isZ2Zero == 0 && FelemIsZero(&h) != 0 && FelemIsZero(&r) != 0) {
// Use a smaller b point
PtDouble(out, b);
return;
}
// HH = H^2
FelemSqrReduce(&hsqr, &h); // hsqr[] < 2^115
// I = 4 * HH
FelemScale(&i, &hsqr, 4); // i[] < 2^117
FelemReduce(&i, &i);
// J = H * I
FelemMulReduceToBase(&j, &h, &i);
// V = X1 * I
FelemMulReduce(&v, &a->x, &i); // v[] < 2^115
// X3 = r^2 - J - 2 * V
FelemSqrReduce(&result.x, &r);
FelemScale(&tmp, &v, 2); // tmp[] < 2^116
FelemAdd(&tmp, &j, &tmp); // tmp[] < 2^64 + 2^116 < 2^117
FelemSub(&result.x, &result.x, &tmp); // result.x[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125
FelemReduce(&result.x, &result.x); // result.x[] < 2^64
// Y3 = r * (V - X3) - 2 * Y1 * J
FelemSub(&tmp, &v, &result.x); // tmp[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125
FelemReduce(&tmp, &tmp);
FelemMul(<mp, &r, &tmp); // ltmp[] < 2^67
FelemMul(<mp2, &a->y, &j); // ltmp2[] < 2^67
LongFelemScale(<mp2, <mp2, 2); // ltmp2[] < 2^68
LongFelemSub(<mp, <mp, <mp2); // ltmp[] < (2^74 + 2^42 - 2^10) + 2^67 < 2^75
LongFelemReduce(&result.y, <mp); // result.y[] < 2^115
FelemReduce(&result.y, &result.y); // result.y[] < 2^64
// Z3 = (Z1 + H)^2 - Z1Z1 - HH
FelemAdd(&result.z, &a->z, &h); // result.z[] < 2^64 + 2^64 = 2^65
FelemReduce(&result.z, &result.z);
FelemSqrReduce(&result.z, &result.z); // result.z[] < 2^115
FelemAdd(&tmp, &z1sqr, &hsqr); // tmp[] < 2^64 + 2^115 < 2^116
FelemSub(&result.z, &result.z, &tmp); // result.z[] < (2^124 + 2^92 - 2^60) + 2^115 < 2^125
FelemReduce(&result.z, &result.z); // result.z[] < 2^64
// Special case processing for infinity points
PtAssignWithMask(&result, a, isZ2Zero);
PtAssignWithMask(&result, b, isZ1Zero);
PtAssign(out, &result);
}
/* Select the point with subscript index in the table and place it in the point. Anti-side channel process is exists. */
static inline void GetPointFromTable(Point *point, const Point table[], uint32_t pointNum, const uint32_t index)
{
uint128_t mask;
for (uint32_t i = 0; i < pointNum; i++) {
/* If i is equal to index, the last mask is all Fs. Otherwise, the last mask is all 0s. */
mask = (0 - (i ^ index)) >> 31; // shifted rightwards by 31 bits and obtain the most significant bit.
mask--;
/* Conditional value assignment, valid only when i == index */
PtAssignWithMask(point, &table[i], mask);
}
}
/*
* Input:
* k1 < n
* 0 <= i < 32
* Output:
* out->x < p, out->y < p, out->z = 0 或 1
*/
static inline void GetLowerPrecomputePtOfG(Point *out, const Felem *k1, int32_t curBit)
{
uint32_t bits;
uint32_t i = (uint32_t)curBit;
bits = (uint32_t)(k1->data[0] >> i) & 1; // i-bit of the lower half of the digit 0
bits |= ((uint32_t)(k1->data[1] >> i) & 1) << 1; // i-bit of the lower half of the digit 1
bits |= ((uint32_t)(k1->data[2] >> i) & 1) << 2; // i-bit of the lower half of the digit 2
bits |= ((uint32_t)(k1->data[3] >> i) & 1) << 3; // i-bit of the lower half of the digit 3
GetPointFromTable(out, PRE_MUL_G, TABLE_G_SIZE, bits);
}
/*
* Input:
* k1 < n
* 0 <= i < 32
* Output:
* out->x < p, out->y < p, out->z = 0 或 1
*/
static inline void GetUpperPrecomputePtOfG(Point *out, const Felem *k1, int32_t curBit)
{
uint32_t bits;
uint32_t i = (uint32_t)curBit;
// i-bit of the upper half of the digit 0. (BASE_BITS/2) is the half width.
bits = (uint32_t)(k1->data[0] >> (i + BASE_BITS / 2)) & 1;
// i-bit of the upper half of the digit 1. (BASE_BITS/2) is the half width.
bits |= ((uint32_t)(k1->data[1] >> (i + BASE_BITS / 2)) & 1) << 1;
// i-bit of the upper half of the digit 2. (BASE_BITS/2) is the half width.
bits |= ((uint32_t)(k1->data[2] >> (i + BASE_BITS / 2)) & 1) << 2;
// i-bit of the upper half of the digit 3. (BASE_BITS/2) is the half width.
bits |= ((uint32_t)(k1->data[3] >> (i + BASE_BITS / 2)) & 1) << 3;
GetPointFromTable(out, PRE_MUL_G2, TABLE_G_SIZE, bits);
}
/*
* Input:
* k2 < n
* 0 <= i <= 255
* The coordinates of each point of preMulPt are reduced.
* Output:
* out->x[] < 2^64, out->y[] < 2^64, out->z[] < 2^64
*/
static inline void GetPrecomputePtOfP(Point *out, const Felem *k2, int32_t curBit, const Point preMulPt[TABLE_P_SIZE])
{
uint32_t bits;
uint32_t sign, value; // Indicates the grouping sign and actual value.
Felem negY;
// Obtain the 5-bit signed code. Read the sign bits of the next group of numbers
// to determine whether there is a carry. The total length is 6.
bits = (uint32_t)FelemGetBits(k2, curBit - 1, WINDOW_SIZE + 1);
DecodeScalarCode(&sign, &value, bits);
GetPointFromTable(out, preMulPt, TABLE_P_SIZE, value);
FelemNeg(&negY, &out->y);
FelemReduce(&negY, &negY);
FelemAssignWithMask(&out->y, &negY, (uint128_t)0 - sign);
}
/*
* Calculate k1 * G + k2 * P
* Input:
* k1 < n
* k2 < n
* The coordinates of each point of preMulPt are reduced.
* Output:
* out->x < p, out->y < p, out->z < p
*/
static void PtMul(Point *out, const Felem *k1, const Felem *k2, const Point preMulPt[TABLE_P_SIZE])
{
Point ptQ = {}; // ptQ stores the result
Point ptPre = {}; // ptPre stores the points obtained from the table.
bool isGMul = k1 != NULL;
bool isPtMul = k2 != NULL && preMulPt != NULL;
int32_t curBit;
// Initialize the Q point.
if (isPtMul) {
curBit = 255; // Start from 255th bit.
// Select the initial point from bit coding (_, _, _, _, 255, 254) of k2
GetPrecomputePtOfP(&ptQ, k2, curBit, preMulPt);
} else if (isGMul) {
curBit = 31; // Start from 31.
// Select the initial point from bit coding (223, 159, 95, 31) of k1
GetLowerPrecomputePtOfG(&ptQ, k1, curBit);
// Select a precomputation point from the (223 + 32, 159 + 32, 95 + 32, 31 + 32) bit of k1
// and add the precomputation point to the point Q
GetUpperPrecomputePtOfG(&ptPre, k1, curBit);
PtAddMixed(&ptQ, &ptQ, &ptPre);
} else {
// k1 and k2 are NULL, output the infinite point.
(void)memset_s((void *)out, sizeof(Point), 0, sizeof(Point));
return;
}
// Operation chain: Q point output range:
// x[] y[] z[]
// Init value < 2^64 < 2^64 < 2^64
// ↓
// double ←↑ < 2^64 < 2^64 < 2^64
// ↓ ↑
// mixed add ↑ < 2^64 < 2^64 < 2^64
// ↓ ↑
// mixed add →↑ < 2^64 < 2^64 < 2^64
// ↓ ↑
// Y negation & reduction ↑ < 2^64 < 2^64 < 2^64
// ↓ ↑
// add →↑ < 2^64 < 2^64 < 2^64
while (--curBit >= 0) {
// Start to shift right bit by bit. Because the most significant bit is initialized,
// common point multiplication starts from 254th bit and base point multiplication starts from 30th bit.
// Whether G-point multiplication is performed in the current cycle.
// It is calculated once in each cycle starting from bit 31.
bool isStepGMul = curBit <= 31;
// Whether the current cycle is a common point multiplication, calculated once every 5 cycles
bool isStepPtMul = curBit % WINDOW_SIZE == 0;
PtDouble(&ptQ, &ptQ);
// Generator G-point multiplication part.
// Divide k1 into 8 segments, from high bits to low bits, select bits from each segment
// and combine them together, then read the pre-computation table.
// Specially, to shrink the precomputation table, the divided 8 segments are combined
// according to the upper half and the lower half.
if (isGMul && isStepGMul) {
// Add the point multiplication result of the current bit of the eight-segment packet to the point Q
GetLowerPrecomputePtOfG(&ptPre, k1, curBit);
PtAddMixed(&ptQ, &ptQ, &ptPre);
GetUpperPrecomputePtOfG(&ptPre, k1, curBit);
PtAddMixed(&ptQ, &ptQ, &ptPre);
}
// Common point multiplication part.
// Use the sliding window signed encoding method
// to group the most significant bits to the least significant bits every five bits.
// Each group of numbers is regarded as a signed number. 00000 to 01111 are decimal numbers 0 to 15,
// and 10000 to 11111 are decimal numbers (32-16) to (32-1).
// This is equivalent to the set of numbers in the complement form after carry 1.
// for example:
// 11011(complement) = 100000 - 00101
if (isPtMul && isStepPtMul) {
// Add the point multiplication result of the current group to point Q.
GetPrecomputePtOfP(&ptPre, k2, curBit, preMulPt);
PtAdd(&ptQ, &ptQ, &ptPre);
}
}
// Output the modulo operation.
FelemContract(&ptQ.x, &ptQ.x);
FelemContract(&ptQ.y, &ptQ.y);
FelemContract(&ptQ.z, &ptQ.z);
PtAssign(out, &ptQ);
}
/*
* Convert Jacobian coordinates to affine coordinates by a given module inverse
* Input:
* in->x[] < 2^64, in->y[] < 2^64
* zInv < 2^64
* Output:
* out->x < p, out->y < p, out->z = 1
*/
static void PtMakeAffineWithInv(Point *out, const Point *in, const Felem *zInv)
{
Felem tmp;
// 1/Z^2
FelemSqrReduceToBase(&tmp, zInv);
// X/Z^2
FelemMulReduceToBase(&out->x, &in->x, &tmp);
FelemContract(&out->x, &out->x);
// 1/Z^3
FelemMulReduceToBase(&tmp, &tmp, zInv);
// Y/Z^3
FelemMulReduceToBase(&out->y, &in->y, &tmp);
FelemContract(&out->y, &out->y);
FelemSetLimb(&out->z, 1);
}
/* --------------------------other functions-------------------------- */
/*
* Obtain the pre-multiplication table of the input point pt, including 0pt-16pt. All points are reduced.
*/
static int32_t GetPreMulPt(Point preMulPt[TABLE_P_SIZE], const ECC_Point *pt)
{
int32_t ret;
// 0pt
(void)memset_s((void *)&preMulPt[0], sizeof(Point), 0, sizeof(Point));
// 1pt
GOTO_ERR_IF_EX(BN2Felem(&preMulPt[1].x, &pt->x), ret);
GOTO_ERR_IF_EX(BN2Felem(&preMulPt[1].y, &pt->y), ret);
GOTO_ERR_IF_EX(BN2Felem(&preMulPt[1].z, &pt->z), ret);
// 2pt ~ 15pt
for (uint32_t i = 2; i < 15; i += 2) {
PtDouble(&preMulPt[i], &preMulPt[i >> 1]);
PtAdd(&preMulPt[i + 1], &preMulPt[i], &preMulPt[1]);
}
// 16pt
PtDouble(&preMulPt[16], &preMulPt[16 >> 1]);
ERR:
return ret;
}
int32_t ECP256_PointMulAdd(
ECC_Para *para, ECC_Point *r, const BN_BigNum *k1, const BN_BigNum *k2, const ECC_Point *pt)
{
int32_t ret;
Felem felemK1;
Felem felemK2;
Point preMulPt[TABLE_P_SIZE];
Point out;
// Check the input parameters.
GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP256), ret);
GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP256), ret);
GOTO_ERR_IF(CheckBnValid(k1, FELEM_BITS), ret);
GOTO_ERR_IF(CheckBnValid(k2, FELEM_BITS), ret);
GOTO_ERR_IF(CheckPointValid(pt, CRYPT_ECC_NISTP256), ret);
// Special treatment of infinity points
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
GOTO_ERR_IF_EX(BN2Felem(&felemK1, k1), ret);
GOTO_ERR_IF_EX(BN2Felem(&felemK2, k2), ret);
GOTO_ERR_IF_EX(GetPreMulPt(preMulPt, pt), ret);
PtMul(&out, &felemK1, &felemK2, preMulPt);
GOTO_ERR_IF_EX(Felem2BN(&r->x, &out.x), ret);
GOTO_ERR_IF_EX(Felem2BN(&r->y, &out.y), ret);
GOTO_ERR_IF_EX(Felem2BN(&r->z, &out.z), ret);
ERR:
return ret;
}
int32_t ECP256_PointMul(ECC_Para *para, ECC_Point *r, const BN_BigNum *k, const ECC_Point *pt)
{
int32_t ret;
Felem felemK;
Point preMulPt[TABLE_P_SIZE];
Point out;
// Check the input parameters.
GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP256), ret);
GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP256), ret);
GOTO_ERR_IF(CheckBnValid(k, FELEM_BITS), ret);
if (pt != NULL) {
GOTO_ERR_IF(CheckPointValid(pt, CRYPT_ECC_NISTP256), ret);
// Special treatment of infinity points
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
}
GOTO_ERR_IF_EX(BN2Felem(&felemK, k), ret);
if (pt != NULL) {
GOTO_ERR_IF_EX(GetPreMulPt(preMulPt, pt), ret);
PtMul(&out, NULL, &felemK, preMulPt);
} else {
PtMul(&out, &felemK, NULL, NULL);
}
GOTO_ERR_IF_EX(Felem2BN(&r->x, &out.x), ret);
GOTO_ERR_IF_EX(Felem2BN(&r->y, &out.y), ret);
GOTO_ERR_IF_EX(Felem2BN(&r->z, &out.z), ret);
ERR:
return ret;
}
int32_t ECP256_Point2Affine(const ECC_Para *para, ECC_Point *r, const ECC_Point *pt)
{
int32_t ret;
Point out;
Felem zInv;
// Check the input parameters.
GOTO_ERR_IF(CheckParaValid(para, CRYPT_ECC_NISTP256), ret);
GOTO_ERR_IF(CheckPointValid(r, CRYPT_ECC_NISTP256), ret);
GOTO_ERR_IF(CheckPointValid(pt, CRYPT_ECC_NISTP256), ret);
// Special treatment of infinity points
if (BN_IsZero(&pt->z)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_AT_INFINITY);
return CRYPT_ECC_POINT_AT_INFINITY;
}
GOTO_ERR_IF_EX(BN2Felem(&out.x, &pt->x), ret);
GOTO_ERR_IF_EX(BN2Felem(&out.y, &pt->y), ret);
GOTO_ERR_IF_EX(BN2Felem(&out.z, &pt->z), ret);
FelemInv(&zInv, &out.z);
PtMakeAffineWithInv(&out, &out, &zInv);
GOTO_ERR_IF_EX(Felem2BN(&r->x, &out.x), ret);
GOTO_ERR_IF_EX(Felem2BN(&r->y, &out.y), ret);
GOTO_ERR_IF_EX(Felem2BN(&r->z, &out.z), ret);
ERR:
return ret;
}
int32_t ECP256_ModOrderInv(const ECC_Para *para, BN_BigNum *r, const BN_BigNum *a)
{
if (para == NULL || r == NULL || a == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->id != CRYPT_ECC_NISTP256) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_POINT_ERR_CURVE_ID);
return CRYPT_ECC_POINT_ERR_CURVE_ID;
}
if (BN_IsZero(a)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_INVERSE_INPUT_ZERO);
return CRYPT_ECC_INVERSE_INPUT_ZERO;
}
return ECP_ModOrderInv(para, r, a);
}
#endif /* defined(HITLS_CRYPTO_CURVE_NISTP256) && defined(HITLS_CRYPTO_NIST_USE_ACCEL) */
|
2301_79861745/bench_create
|
crypto/ecc/src/noasm_ecp_nistp256.c
|
C
|
unknown
| 71,213
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_ECDH_H
#define CRYPT_ECDH_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ECDH
#include <stdint.h>
#include "crypt_types.h"
#include "crypt_algid.h"
#include "crypt_ecc_pkey.h"
#include "bsl_params.h"
#ifdef __cplusplus
extern "C" {
#endif /* __cpluscplus */
/* ECDH key context */
typedef struct ECC_PkeyCtx CRYPT_ECDH_Ctx;
/* ECDH parameter structure */
typedef struct EccPara CRYPT_EcdhPara;
/**
* @ingroup ecdh
* @brief ecdh Allocate the context memory space.
*
* @retval (CRYPT_ECDH_Ctx *) Pointer to the memory space of the allocated context
* @retval NULL Invalid null pointer
*/
CRYPT_ECDH_Ctx *CRYPT_ECDH_NewCtx(void);
/**
* @ingroup ecdh
* @brief ecdh Allocate the context memory space.
*
* @param libCtx [IN] Library context
*
* @retval (CRYPT_ECDH_Ctx *) Pointer to the memory space of the allocated context
* @retval NULL Invalid null pointer
*/
CRYPT_ECDH_Ctx *CRYPT_ECDH_NewCtxEx(void *libCtx);
/**
* @ingroup ecdh
* @brief Copy the ECDH context. After the duplication is complete, call the CRYPT_ECDH_FreeCtx to release the memory.
*
* @param ctx [IN] Source ECDH context
*
* @return CRYPT_ECDH_Ctx ECDH context pointer
* If the operation fails, null is returned.
*/
CRYPT_ECDH_Ctx *CRYPT_ECDH_DupCtx(CRYPT_ECDH_Ctx *ctx);
/**
* @ingroup ecdh
* @brief ecdh Release the key context structure
*
* @param ctx [IN] Indicate the pointer of the context structure to be released. The ctx is set NULL by the invoker.
*/
void CRYPT_ECDH_FreeCtx(CRYPT_ECDH_Ctx *ctx);
/**
* @ingroup ecdh
* @brief Set a parameter based on the parameter ID.
*
* @param id [IN] Curve ID Parameter ID, which can be selected CRYPT_ECC_NISTP224 to CRYPT_ECC_BRAINPOOLP512R1 only
* from CRYPT_PKEY_ParaId.
*
* @retval (CRYPT_EcdhPara *) Pointer to the memory space of the allocated context
* @retval NULL Invalid null pointer
*/
CRYPT_EcdhPara *CRYPT_ECDH_NewParaById(CRYPT_PKEY_ParaId id);
/**
* @ingroup ecdh
* @brief Set a parameter based on the eccPara parameter.
*
* @param eccPara [IN] Curve parameter information,
* which can be selected CRYPT_ECC_NISTP224 to CRYPT_ECC_BRAINPOOLP512R1 only from the CRYPT_PKEY_ParaId.
*
* @retval (CRYPT_EcdhPara *) Pointer to the memory space of the allocated context
* @retval NULL Invalid null pointer
*/
CRYPT_EcdhPara *CRYPT_ECDH_NewPara(const CRYPT_EccPara *eccPara);
/**
* @ingroup ecdh
* @brief Obtain the parameter ID.
*
* @param ctx [IN] ECDH context
*
* @retval ID. If the context is invalid, CRYPT_PKEY_PARAID_MAX is returned.
*/
CRYPT_PKEY_ParaId CRYPT_ECDH_GetParaId(const CRYPT_ECDH_Ctx *ctx);
/**
* @ingroup ecdh
* @brief ecdh Release a key parameter structure
*
* @param para [IN] Pointer to the key parameter structure to be released. The parameter is set NULL by the invoker.
*/
void CRYPT_ECDH_FreePara(CRYPT_EcdhPara *para);
/**
* @ingroup ecdh
* @brief Set the data of the key parameter structure to the key structure.
*
* @param ctx [OUT] Key structure for setting related parameters
* @param para [IN] Key parameters
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input.
* @retval CRYPT_MEM_ALLOC_FAIL internal memory allocation error
* @retval CRYPT_SUCCESS Set successfully.
*/
int32_t CRYPT_ECDH_SetPara(CRYPT_ECDH_Ctx *ctx, const CRYPT_EccPara *para);
/**
* @ingroup ecdh
* @brief Get the data of the key structure to the key parameter structure.
*
* @param ctx [IN] Key structure for setting related parameters
* @param para [OUT] Key parameters
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input.
* @retval CRYPT_MEM_ALLOC_FAIL Internal memory allocation error
* @retval CRYPT_SUCCESS Get successfully.
*/
int32_t CRYPT_ECDH_GetPara(const CRYPT_ECDH_Ctx *ctx, CRYPT_EccPara *para);
/**
* @ingroup ecdh
* @brief Obtain the valid length of the private key, which is used before obtaining the private key.
*
* @param ctx [IN] Structure from which the key length is expected to be obtained
*
* @retval 0 The input is incorrect or the corresponding key structure does not have a valid key length.
* @retval uint32_t Valid key length
*/
uint32_t CRYPT_ECDH_GetBits(const CRYPT_ECDH_Ctx *ctx);
/**
* @ingroup ecdh
* @brief Generate the ECDH key pair.
*
* @param ctx [IN] ECDH Context structure
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval ECC error code. Internal ECC calculation error
* @retval CRYPT_SUCCESS The key pair is successfully generated.
*/
int32_t CRYPT_ECDH_Gen(CRYPT_ECDH_Ctx *ctx);
/**
* @ingroup ecdh
* @brief ECDH key exchange
*
* @param ctx [IN] dh Context structure
* @param pubKey [IN] Public key data
* @param shareKey [OUT] Shared key
* @param shareKeyLen [IN/OUT] The input parameter is the space length of the shareKey,
* and the output parameter is the valid length of the shareKey.
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval CRYPT_ECDH_ERR_EMPTY_KEY The ctx private key is empty or the public key pubKey is empty.
* @retval CRYPT_ECDH_ERR_INVALID_COFACTOR Invalid harmonic factor h
* @retval BN error. An error occurs in the internal BigNum operation.
* @retval ECC error code. Internal ECC calculation error
* @retval CRYPT_SUCCESS Key exchange succeeded.
*/
int32_t CRYPT_ECDH_ComputeShareKey(const CRYPT_ECDH_Ctx *ctx, const CRYPT_ECDH_Ctx *pubKey,
uint8_t *shareKey, uint32_t *shareKeyLen);
/**
* @ingroup ecdh
* @brief ECDH Set the private key data.
*
* @param ctx [OUT] ecdh context structure
* @param prv [IN] Private key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Set successfully.
*/
int32_t CRYPT_ECDH_SetPrvKey(CRYPT_ECDH_Ctx *ctx, const CRYPT_EcdhPrv *prv);
/**
* @ingroup ecdh
* @brief ECDH Set the public key data.
*
* @param ctx [OUT] ecdh context structure
* @param pub [IN] Public key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Set successfully.
*/
int32_t CRYPT_ECDH_SetPubKey(CRYPT_ECDH_Ctx *ctx, const CRYPT_EcdhPub *pub);
/**
* @ingroup ecdh
* @brief ECDH Obtain the private key data.
*
* @param ctx [IN] ecdh context structure
* @param prv [OUT] Private key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_ECC_PKEY_ERR_EMPTY_KEY The key is empty.
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Obtained successfully.
*/
int32_t CRYPT_ECDH_GetPrvKey(const CRYPT_ECDH_Ctx *ctx, CRYPT_EcdhPrv *prv);
/**
* @ingroup ecdh
* @brief ECDH Obtain the public key data.
*
* @param ctx [IN] ecdh context structure
* @param pub [OUT] Public key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_ECC_PKEY_ERR_EMPTY_KEY The key is empty.
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Obtained successfully.
*/
int32_t CRYPT_ECDH_GetPubKey(const CRYPT_ECDH_Ctx *ctx, CRYPT_EcdhPub *pub);
#ifdef HITLS_BSL_PARAMS
/**
* @ingroup ecdh
* @brief ECDH Set the private key data.
*
* @param ctx [OUT] ecdh context structure
* @param para [IN] Private key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Set successfully.
*/
int32_t CRYPT_ECDH_SetPrvKeyEx(CRYPT_ECDH_Ctx *ctx, const BSL_Param *para);
/**
* @ingroup ecdh
* @brief ECDH Set the public key data.
*
* @param ctx [OUT] ecdh context structure
* @param para [IN] Public key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Set successfully.
*/
int32_t CRYPT_ECDH_SetPubKeyEx(CRYPT_ECDH_Ctx *ctx, const BSL_Param *para);
/**
* @ingroup ecdh
* @brief ECDH Obtain the private key data.
*
* @param ctx [IN] ecdh context structure
* @param para [OUT] Private key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_ECC_PKEY_ERR_EMPTY_KEY The key is empty.
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Obtained successfully.
*/
int32_t CRYPT_ECDH_GetPrvKeyEx(const CRYPT_ECDH_Ctx *ctx, BSL_Param *para);
/**
* @ingroup ecdh
* @brief ECDH Obtain the public key data.
*
* @param ctx [IN] ecdh context structure
* @param para [OUT] Public key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_ECC_PKEY_ERR_EMPTY_KEY The key is empty.
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Obtained successfully.
*/
int32_t CRYPT_ECDH_GetPubKeyEx(const CRYPT_ECDH_Ctx *ctx, BSL_Param *para);
/**
* @ingroup ecdh
* @brief Get the data of the key structure to the key parameter structure.
*
* @param ctx [IN] Key structure for setting related parameters
* @param para [OUT] Key parameters
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input.
* @retval CRYPT_MEM_ALLOC_FAIL Internal memory allocation error
* @retval CRYPT_SUCCESS Get successfully.
*/
int32_t CRYPT_ECDH_GetParaEx(const CRYPT_ECDH_Ctx *ctx, BSL_Param *para);
/**
* @ingroup ecdh
* @brief Set the data of the key parameter structure to the key structure.
*
* @param ctx [OUT] Key structure for setting related parameters
* @param para [IN] Key parameters
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input.
* @retval CRYPT_MEM_ALLOC_FAIL internal memory allocation error
* @retval CRYPT_SUCCESS Set successfully.
*/
int32_t CRYPT_ECDH_SetParaEx(CRYPT_ECDH_Ctx *ctx, const BSL_Param *para);
#endif
/**
* @ingroup ecdh
* @brief ecdh control interface
*
* @param ctx [IN/OUT] ecdh context structure
* @param opt [IN] Operation mode. For details, see ECC_CtrlType.
* @param val [IN] Input parameter about ctrl
* @param len [IN] val Length
*
* @retval CRYPT_SUCCESS Set successfully.
* @retval CRYPT_NULL_INPUT If any input parameter is empty
* @retval CRYPT_ECC_PKEY_ERR_INVALID_POINT_FORMAT Invalid point format
* @retval CRYPT_ECC_PKEY_ERR_CTRL_LEN The len is incorrect.
* @retval CRYPT_ECC_PKEY_ERR_UNSUPPORTED_CTRL_OPTION opt mode not supported
*/
int32_t CRYPT_ECDH_Ctrl(CRYPT_ECDH_Ctx *ctx, int32_t opt, void *val, uint32_t len);
/**
* @ingroup ecdh
* @brief ecdh Compare public keys and parameters
*
* @param a [IN] ecdh context structure
* @param b [IN] ecdh context structure
*
* @retval CRYPT_SUCCESS is the same
* Others. For details, see errno.
*/
int32_t CRYPT_ECDH_Cmp(const CRYPT_ECDH_Ctx *a, const CRYPT_ECDH_Ctx *b);
/**
* @ingroup ecdh
* @brief ecdh get security bits
*
* @param ctx [IN] ecdh Context structure
*
* @retval security bits
*/
int32_t CRYPT_ECDH_GetSecBits(const CRYPT_ECDH_Ctx *ctx);
#ifdef HITLS_CRYPTO_ECDH_CHECK
/**
* @ingroup ecdh
* @brief ecdh check public key
*
* @param checkType [IN] check type
* @param pkey1 [IN] ecdh context structure
* @param pkey2 [IN] ecdh context structure
*
* @retval CRYPT_SUCCESS check success.
* Others. For details, see error code in errno.
*/
int32_t CRYPT_ECDH_Check(uint32_t checkType, const CRYPT_ECDH_Ctx *pkey1, const CRYPT_ECDH_Ctx *pkey2);
#endif // HITLS_CRYPTO_ECDH_CHECK
#ifdef __cplusplus
}
#endif
#endif // HITLS_CRYPTO_ECDH
#endif // CRYPT_ECDH_H
|
2301_79861745/bench_create
|
crypto/ecdh/include/crypt_ecdh.h
|
C
|
unknown
| 12,944
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ECDH
#include <stdbool.h>
#include "crypt_errno.h"
#include "crypt_types.h"
#include "securec.h"
#include "bsl_sal.h"
#include "bsl_err_internal.h"
#include "crypt_utils.h"
#include "crypt_bn.h"
#include "crypt_ecc.h"
#include "crypt_ecc_pkey.h"
#include "crypt_ecdh.h"
#include "sal_atomic.h"
#include "crypt_local_types.h"
#include "crypt_params_key.h"
CRYPT_ECDH_Ctx *CRYPT_ECDH_NewCtx(void)
{
ECC_Pkey *ctx = BSL_SAL_Calloc(1u, sizeof(ECC_Pkey));
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
ctx->useCofactorMode = true;
ctx->pointFormat = CRYPT_POINT_UNCOMPRESSED; // the point format is uncompressed by default
BSL_SAL_ReferencesInit(&(ctx->references));
return ctx;
}
CRYPT_ECDH_Ctx *CRYPT_ECDH_NewCtxEx(void *libCtx)
{
CRYPT_ECDH_Ctx *ctx = CRYPT_ECDH_NewCtx();
if (ctx == NULL) {
return NULL;
}
ctx->libCtx = libCtx;
return ctx;
}
CRYPT_ECDH_Ctx *CRYPT_ECDH_DupCtx(CRYPT_ECDH_Ctx *ctx)
{
return ECC_DupCtx(ctx);
}
void CRYPT_ECDH_FreeCtx(CRYPT_ECDH_Ctx *ctx)
{
if (ctx == NULL) {
return;
}
ECC_FreeCtx(ctx);
return;
}
CRYPT_EcdhPara *CRYPT_ECDH_NewParaById(CRYPT_PKEY_ParaId id)
{
return ECC_NewPara(id);
}
CRYPT_EcdhPara *CRYPT_ECDH_NewPara(const CRYPT_EccPara *eccPara)
{
CRYPT_PKEY_ParaId id = GetCurveId(eccPara);
if (id == CRYPT_PKEY_PARAID_MAX) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_PARA);
return NULL;
}
return CRYPT_ECDH_NewParaById(id);
}
CRYPT_PKEY_ParaId CRYPT_ECDH_GetParaId(const CRYPT_ECDH_Ctx *ctx)
{
if (ctx == NULL) {
return CRYPT_PKEY_PARAID_MAX;
}
return ECC_GetParaId(ctx->para);
}
void CRYPT_ECDH_FreePara(CRYPT_EcdhPara *para)
{
ECC_FreePara(para);
}
int32_t CRYPT_ECDH_GetPara(const CRYPT_ECDH_Ctx *ctx, CRYPT_EccPara *para)
{
return ECC_GetPara(ctx, para);
}
static int32_t EcdhSetPara(CRYPT_ECDH_Ctx *ctx, CRYPT_EcdhPara *para)
{
return ECC_SetPara(ctx, para);
}
int32_t CRYPT_ECDH_SetPara(CRYPT_ECDH_Ctx *ctx, const CRYPT_EccPara *para)
{
if (ctx == NULL || para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
return EcdhSetPara(ctx, CRYPT_ECDH_NewPara(para));
}
uint32_t CRYPT_ECDH_GetBits(const CRYPT_ECDH_Ctx *ctx)
{
return ECC_PkeyGetBits(ctx);
}
int32_t CRYPT_ECDH_SetPrvKey(CRYPT_ECDH_Ctx *ctx, const CRYPT_EcdhPrv *prv)
{
return ECC_PkeySetPrvKey(ctx, prv);
}
int32_t CRYPT_ECDH_SetPubKey(CRYPT_ECDH_Ctx *ctx, const CRYPT_EcdhPub *pub)
{
return ECC_PkeySetPubKey(ctx, pub);
}
int32_t CRYPT_ECDH_GetPrvKey(const CRYPT_ECDH_Ctx *ctx, CRYPT_EcdhPrv *prv)
{
return ECC_PkeyGetPrvKey(ctx, prv);
}
int32_t CRYPT_ECDH_GetPubKey(const CRYPT_ECDH_Ctx *ctx, CRYPT_EcdhPub *pub)
{
return ECC_PkeyGetPubKey(ctx, pub);
}
#ifdef HITLS_BSL_PARAMS
int32_t CRYPT_ECDH_GetParaEx(const CRYPT_ECDH_Ctx *ctx, BSL_Param *para)
{
return ECC_GetParaEx(ctx, para);
}
int32_t CRYPT_ECDH_SetParaEx(CRYPT_ECDH_Ctx *ctx, const BSL_Param *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_EccPara eccPara = {0};
(void)GetConstParamValue(para, CRYPT_PARAM_EC_P, &(eccPara.p), &(eccPara.pLen));
(void)GetConstParamValue(para, CRYPT_PARAM_EC_A, &(eccPara.a), &(eccPara.aLen));
(void)GetConstParamValue(para, CRYPT_PARAM_EC_B, &(eccPara.b), &(eccPara.bLen));
(void)GetConstParamValue(para, CRYPT_PARAM_EC_N, &(eccPara.n), &(eccPara.nLen));
(void)GetConstParamValue(para, CRYPT_PARAM_EC_H, &(eccPara.h), &(eccPara.hLen));
(void)GetConstParamValue(para, CRYPT_PARAM_EC_X, &(eccPara.x), &(eccPara.xLen));
(void)GetConstParamValue(para, CRYPT_PARAM_EC_Y, &(eccPara.y), &(eccPara.yLen));
return CRYPT_ECDH_SetPara(ctx, &eccPara);
}
int32_t CRYPT_ECDH_SetPrvKeyEx(CRYPT_ECDH_Ctx *ctx, const BSL_Param *para)
{
return ECC_PkeySetPrvKeyEx(ctx, para);
}
int32_t CRYPT_ECDH_SetPubKeyEx(CRYPT_ECDH_Ctx *ctx, const BSL_Param *para)
{
return ECC_PkeySetPubKeyEx(ctx, para);
}
int32_t CRYPT_ECDH_GetPrvKeyEx(const CRYPT_ECDH_Ctx *ctx, BSL_Param *para)
{
return ECC_PkeyGetPrvKeyEx(ctx, para);
}
int32_t CRYPT_ECDH_GetPubKeyEx(const CRYPT_ECDH_Ctx *ctx, BSL_Param *para)
{
return ECC_PkeyGetPubKeyEx(ctx, para);
}
#endif
int32_t CRYPT_ECDH_Gen(CRYPT_ECDH_Ctx *ctx)
{
return ECC_PkeyGen(ctx);
}
static int32_t ComputeShareKeyInputCheck(const CRYPT_ECDH_Ctx *ctx, const CRYPT_ECDH_Ctx *pubKey,
const uint8_t *shareKey, const uint32_t *shareKeyLen)
{
if ((ctx == NULL) || (pubKey == NULL) || (shareKey == NULL) || (shareKeyLen == NULL)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if ((ctx->prvkey == NULL) || (pubKey->pubkey == NULL)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECDH_ERR_EMPTY_KEY);
return CRYPT_ECDH_ERR_EMPTY_KEY;
}
// only the cofactor which value is 1 is supported currently
BN_BigNum *paraH = ECC_GetParaH(ctx->para);
if (paraH == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
if (BN_IsOne(paraH) != true) {
BN_Destroy(paraH);
BSL_ERR_PUSH_ERROR(CRYPT_ECDH_ERR_INVALID_COFACTOR);
return CRYPT_ECDH_ERR_INVALID_COFACTOR;
}
BN_Destroy(paraH);
return CRYPT_SUCCESS;
}
int32_t CRYPT_ECDH_ComputeShareKey(const CRYPT_ECDH_Ctx *ctx, const CRYPT_ECDH_Ctx *pubKey,
uint8_t *shareKey, uint32_t *shareKeyLen)
{
int32_t ret = ComputeShareKeyInputCheck(ctx, pubKey, shareKey, shareKeyLen);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ECC_Point *sharePoint = NULL;
CRYPT_Data shareKeyX = {shareKey, *shareKeyLen};
BN_BigNum *tmpPrvkey = BN_Dup(ctx->prvkey);
sharePoint = ECC_NewPoint(ctx->para);
if ((tmpPrvkey == NULL) || (sharePoint == NULL)) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
/** When the cofactor mode is enabled, pubkey = prvkey * h * G. When h is 1, no calculation is required.
* Currently, the cofactor of the prime curve is only 1, and no related calculation is required.
*/
ret = ECC_PointMul(ctx->para, sharePoint, ctx->prvkey, pubKey->pubkey);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = ECC_PointCheck(sharePoint);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = ECC_GetPoint(ctx->para, sharePoint, &shareKeyX, NULL);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
*shareKeyLen = shareKeyX.len;
EXIT:
ECC_FreePoint(sharePoint);
BN_Destroy(tmpPrvkey);
return ret;
}
static int32_t CRYPT_ECDH_GetLen(const CRYPT_ECDH_Ctx *ctx, GetLenFunc func, void *val, uint32_t len)
{
if (val == NULL || len != sizeof(int32_t)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
*(int32_t *)val = func(ctx);
return CRYPT_SUCCESS;
}
int32_t CRYPT_ECDH_Ctrl(CRYPT_ECDH_Ctx *ctx, int32_t opt, void *val, uint32_t len)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
switch (opt) {
case CRYPT_CTRL_GET_PARAID:
return CRYPT_ECDH_GetLen(ctx, (GetLenFunc)CRYPT_ECDH_GetParaId, val, len);
case CRYPT_CTRL_GET_BITS:
return CRYPT_ECDH_GetLen(ctx, (GetLenFunc)CRYPT_ECDH_GetBits, val, len);
case CRYPT_CTRL_GET_SECBITS:
return CRYPT_ECDH_GetLen(ctx, (GetLenFunc)CRYPT_ECDH_GetSecBits, val, len);
case CRYPT_CTRL_SET_PARA_BY_ID:
return EcdhSetPara(ctx, CRYPT_ECDH_NewParaById(*(CRYPT_PKEY_ParaId *)val));
default:
break;
}
return ECC_PkeyCtrl(ctx, opt, val, len);
}
int32_t CRYPT_ECDH_Cmp(const CRYPT_ECDH_Ctx *a, const CRYPT_ECDH_Ctx *b)
{
return ECC_PkeyCmp(a, b);
}
int32_t CRYPT_ECDH_GetSecBits(const CRYPT_ECDH_Ctx *ctx)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return 0;
}
return ECC_GetSecBits(ctx->para);
}
#ifdef HITLS_CRYPTO_ECDH_CHECK
int32_t CRYPT_ECDH_Check(uint32_t checkType, const CRYPT_ECDH_Ctx *pkey1, const CRYPT_ECDH_Ctx *pkey2)
{
int32_t ret = ECC_PkeyCheck(pkey1, pkey2, checkType);
if (ret == CRYPT_ECC_PAIRWISE_CHECK_FAIL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECDH_PAIRWISE_CHECK_FAIL);
return CRYPT_ECDH_PAIRWISE_CHECK_FAIL;
}
if (ret == CRYPT_ECC_INVALID_PRVKEY) {
BSL_ERR_PUSH_ERROR(CRYPT_ECDH_INVALID_PRVKEY);
return CRYPT_ECDH_INVALID_PRVKEY;
}
return ret; // may be other error occurred.
}
#endif // HITLS_CRYPTO_ECDH_CHECK
#endif /* HITLS_CRYPTO_ECDH */
|
2301_79861745/bench_create
|
crypto/ecdh/src/ecdh.c
|
C
|
unknown
| 9,384
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_ECDSA_H
#define CRYPT_ECDSA_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ECDSA
#include <stdint.h>
#include "crypt_types.h"
#include "crypt_local_types.h"
#include "crypt_ecc_pkey.h"
#include "crypt_ecc.h"
#ifdef __cplusplus
extern "C" {
#endif /* __cpluscplus */
/* ECDSA key context */
typedef struct ECC_PkeyCtx CRYPT_ECDSA_Ctx;
/* ECDSA parameter structure */
typedef struct EccPara CRYPT_EcdsaPara;
/**
* @ingroup ecdsa
* @brief ecdsa Allocate context memory space.
*
* @retval (CRYPT_ECDSA_Ctx *) Pointer to the memory space of the allocated context
* @retval NULL Invalid null pointer
*/
CRYPT_ECDSA_Ctx *CRYPT_ECDSA_NewCtx(void);
/**
* @ingroup ecdsa
* @brief ecdsa Allocate context memory space.
*
* @param libCtx [IN] Library context
*
* @retval (CRYPT_ECDSA_Ctx *) Pointer to the memory space of the allocated context
* @retval NULL Invalid null pointer
*/
CRYPT_ECDSA_Ctx *CRYPT_ECDSA_NewCtxEx(void *libCtx);
/**
* @ingroup ecdsa
* @brief Copy the ECDSA context. After the duplication is complete, call the CRYPT_ECDSA_FreeCtx to release the memory.
*
* @param ctx [IN] Source ECDSA context
*
* @return CRYPT_ECDSA_Ctx ECDSA context pointer
* If it fails, null is returned.
*/
CRYPT_ECDSA_Ctx *CRYPT_ECDSA_DupCtx(CRYPT_ECDSA_Ctx *ctx);
/**
* @ingroup ecdsa
* @brief ecdsa Releasing the key context structure
*
* @param ctx [IN] Pointer to the context structure to be released. The ctx is set NULL by the invoker.
*/
void CRYPT_ECDSA_FreeCtx(CRYPT_ECDSA_Ctx *ctx);
/**
* @ingroup ecdsa
* @brief ecdsa Generate the key parameter structure
*
* @param id [IN] Curve ID Parameter ID, which can be selected CRYPT_ECC_NISTP224 to CRYPT_ECC_NISTP521 only
* from CRYPT_PKEY_ParaId.
*
* @retval (CRYPT_EcdsaPara *) Pointer to the memory space of the allocated context
* @retval NULL Invalid null pointer
*/
CRYPT_EcdsaPara *CRYPT_ECDSA_NewParaById(int32_t id);
/**
* @ingroup ecdsa
* @brief ecdsa Generate the key parameter structure
*
* @param eccPara [IN] Curve parameter information, which can be selected CRYPT_ECC_NISTP224 to CRYPT_ECC_NISTP521 only
* from CRYPT_PKEY_ParaId.
*
* @retval (CRYPT_EcdsaPara *) Pointer to the memory space of the allocated context
* @retval NULL Invalid null pointer
*/
CRYPT_EcdsaPara *CRYPT_ECDSA_NewPara(const CRYPT_EccPara *eccPara);
/**
* @ingroup ecdsa
* @brief Obtain the parameter ID.
*
* @param ctx [IN] ECDSA context
*
* @retval ID. If the context is invalid, CRYPT_PKEY_PARAID_MAX is returned.
*/
CRYPT_PKEY_ParaId CRYPT_ECDSA_GetParaId(const CRYPT_ECDSA_Ctx *ctx);
/**
* @ingroup ecdsa
* @brief ecdsa Release the key parameter structure
*
* @param para [IN] Pointer to the key parameter structure to be released. The parameter is set NULL by the invoker.
*/
void CRYPT_ECDSA_FreePara(CRYPT_EcdsaPara *para);
/**
* @ingroup ecdsa
* @brief Set the data of the key parameter structure to the key structure.
*
* @param ctx [OUT] Key structure for which related parameters need to be set
* @param para [IN] Key parameters
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Internal memory allocation error
* @retval CRYPT_SUCCESS Set successfully.
*/
int32_t CRYPT_ECDSA_SetPara(CRYPT_ECDSA_Ctx *ctx, const CRYPT_EccPara *para);
/**
* @ingroup ecdsa
* @brief Obtain the key parameter structure.
*
* @param ctx [IN] Key structure for which related parameters need to be get
* @param para [OUT] Key parameters
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Internal memory allocation error
* @retval CRYPT_SUCCESS Get parameters successfully.
*/
int32_t CRYPT_ECDSA_GetPara(const CRYPT_ECDSA_Ctx *ctx, CRYPT_EccPara *para);
/**
* @ingroup ecdsa
* @brief ecdsa Obtain the key length.
*
* @param ctx [IN] ecdsa context structure
*
* @retval 0 The input is incorrect or the corresponding key structure does not contain valid key length.
* @retval uint32_t Valid key length
*/
uint32_t CRYPT_ECDSA_GetBits(const CRYPT_ECDSA_Ctx *ctx);
/**
* @ingroup ecdsa
* @brief ecdsa Obtains the length required for signing.
*
* @param ctx [IN] ecdsa context structure
*
* @retval 0 The input is incorrect or the corresponding key structure does not contain valid parameter data.
* @retval uint32_t Length required for valid signature data
*/
uint32_t CRYPT_ECDSA_GetSignLen(const CRYPT_ECDSA_Ctx *ctx);
/**
* @ingroup ecdsa
* @brief Generate the ECDSA key pair.
*
* @param ctx [IN/OUT] ecdsa context structure
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval ECC error code. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS The key pair is successfully generated.
*/
int32_t CRYPT_ECDSA_Gen(CRYPT_ECDSA_Ctx *ctx);
/**
* @ingroup ecdsa
* @brief ECDSA Signature
*
* @param ctx [IN] ecdsa context structure
* @param algId [IN] md algId
* @param data [IN] Data to be signed
* @param dataLen [IN] Length of the data to be signed
* @param sign [OUT] Signature data
* @param signLen [IN/OUT] The input parameter is the space length of the sign,
* and the output parameter is the valid length of the sign.
* The required space can be obtained by calling CRYPT_ECDSA_GetSignLen.
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval CRYPT_ECDSA_ERR_EMPTY_KEY The key cannot be empty.
* @retval CRYPT_ECDSA_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient.
* @retval BN error. An error occurs in the internal BigNum operation.
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Signed successfully.
*/
int32_t CRYPT_ECDSA_Sign(const CRYPT_ECDSA_Ctx *ctx, int32_t algId, const uint8_t *data, uint32_t dataLen,
uint8_t *sign, uint32_t *signLen);
/**
* @ingroup ecdsa
* @brief ECDSA Signature
*
* @param ctx [IN] ecdsa context structure
* @param data [IN] Data to be signed
* @param dataLen [IN] Length of the data to be signed
* @param sign [OUT] Signature data
* @param signLen [IN/OUT] The input parameter is the space length of the sign,
* and the output parameter is the valid length of the sign.
* The required space can be obtained by calling CRYPT_ECDSA_GetSignLen.
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval CRYPT_ECDSA_ERR_EMPTY_KEY The key cannot be empty.
* @retval CRYPT_ECDSA_BUFF_LEN_NOT_ENOUGH The buffer length is insufficient.
* @retval BN error. An error occurs in the internal BigNum operation.
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Signed successfully.
*/
int32_t CRYPT_ECDSA_SignData(const CRYPT_ECDSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen,
uint8_t *sign, uint32_t *signLen);
/**
* @ingroup ecdsa
* @brief ECDSA Verification
*
* @param ctx [IN] ecdsa context structure
* @param algId [IN] md algId
* @param data [IN] Data to be signed
* @param dataLen [IN] Length of the data to be signed
* @param sign [IN] Signature data
* @param signLen [IN] Valid length of the sign
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval CRYPT_ECDSA_VERIFY_FAIL Failed to verify the signature.
* @retval BN error. An error occurs in the internal BigNum operation.
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval DSA error. An error occurs in the DSA encoding and decoding part.
* @retval CRYPT_SUCCESS The signature is verified successfully.
*/
int32_t CRYPT_ECDSA_Verify(const CRYPT_ECDSA_Ctx *ctx, int32_t algId, const uint8_t *data, uint32_t dataLen,
const uint8_t *sign, uint32_t signLen);
/**
* @ingroup ecdsa
* @brief ECDSA Verification
*
* @param ctx [IN] ecdsa context structure
* @param data [IN] Data to be signed
* @param dataLen [IN] Length of the data to be signed
* @param sign [IN] Signature data
* @param signLen [IN] Valid length of the sign
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval CRYPT_ECDSA_VERIFY_FAIL Failed to verify the signature.
* @retval BN error. An error occurs in the internal BigNum operation.
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval DSA error. An error occurs in the DSA encoding and decoding part.
* @retval CRYPT_SUCCESS The signature is verified successfully.
*/
int32_t CRYPT_ECDSA_VerifyData(const CRYPT_ECDSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen,
const uint8_t *sign, uint32_t signLen);
/**
* @ingroup ecdsa
* @brief ECDSA Set the private key data.
*
* @param ctx [OUT] ecdsa context structure
* @param prv [IN] External private key data
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Set successfully.
*/
int32_t CRYPT_ECDSA_SetPrvKey(CRYPT_ECDSA_Ctx *ctx, const CRYPT_DsaPrv *prv);
/**
* @ingroup ecdsa
* @brief ECDSA Set the public key data.
*
* @param ctx [OUT] ecdsa context structure
* @param pub [IN] External public key data
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Set successfully.
*/
int32_t CRYPT_ECDSA_SetPubKey(CRYPT_ECDSA_Ctx *ctx, const CRYPT_DsaPub *pub);
/**
* @ingroup ecdsa
* @brief ECDSA Obtain the private key data.
*
* @param ctx [IN] ecdsa context structure
* @param prv [OUT] External private key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_ECC_PKEY_ERR_EMPTY_KEY The key is empty.
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Obtained successfully.
*/
int32_t CRYPT_ECDSA_GetPrvKey(const CRYPT_ECDSA_Ctx *ctx, CRYPT_DsaPrv *prv);
/**
* @ingroup ecdsa
* @brief ECDSA Obtain the public key data.
*
* @param ctx [IN] ecdsa context structure
* @param pub [OUT] External public key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_ECC_PKEY_ERR_EMPTY_KEY The key is empty.
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Obtained successfully.
*/
int32_t CRYPT_ECDSA_GetPubKey(const CRYPT_ECDSA_Ctx *ctx, CRYPT_DsaPub *pub);
#ifdef HITLS_BSL_PARAMS
/**
* @ingroup ecdsa
* @brief ECDSA Set the private key data.
*
* @param ctx [OUT] ecdsa context structure
* @param para [IN] External private key data
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Set successfully.
*/
int32_t CRYPT_ECDSA_SetPrvKeyEx(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *para);
/**
* @ingroup ecdsa
* @brief ECDSA Set the public key data.
*
* @param ctx [OUT] ecdsa context structure
* @param para [IN] External public key data
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Set successfully.
*/
int32_t CRYPT_ECDSA_SetPubKeyEx(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *para);
/**
* @ingroup ecdsa
* @brief ECDSA Obtain the private key data.
*
* @param ctx [IN] ecdsa context structure
* @param para [OUT] External private key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_ECC_PKEY_ERR_EMPTY_KEY The key is empty.
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Obtained successfully.
*/
int32_t CRYPT_ECDSA_GetPrvKeyEx(const CRYPT_ECDSA_Ctx *ctx, BSL_Param *para);
/**
* @ingroup ecdsa
* @brief ECDSA Obtain the public key data.
*
* @param ctx [IN] ecdsa context structure
* @param para [OUT] External public key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_ECC_PKEY_ERR_EMPTY_KEY The key is empty.
* @retval ECC error. An error occurred in the internal ECC calculation.
* @retval CRYPT_SUCCESS Obtained successfully.
*/
int32_t CRYPT_ECDSA_GetPubKeyEx(const CRYPT_ECDSA_Ctx *ctx, BSL_Param *para);
/**
* @ingroup ecdsa
* @brief Set the data of the key parameter structure to the key structure.
*
* @param ctx [OUT] Key structure for which related parameters need to be set
* @param para [IN] Key parameters
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Internal memory allocation error
* @retval CRYPT_SUCCESS Set successfully.
*/
int32_t CRYPT_ECDSA_SetParaEx(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *para);
/**
* @ingroup ecdsa
* @brief Obtain the key parameter structure.
*
* @param ctx [IN] Key structure for which related parameters need to be get
* @param para [OUT] Key parameters
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_MEM_ALLOC_FAIL Internal memory allocation error
* @retval CRYPT_SUCCESS Get parameters successfully.
*/
int32_t CRYPT_ECDSA_GetParaEx(const CRYPT_ECDSA_Ctx *ctx, BSL_Param *para);
#endif
/**
* @ingroup ecdsa
* @brief ecdsa control interface
*
* @param ctx [IN/OUT] ecdsa context structure
* @param opt [IN] Operation mode. For details, see ECC_CtrlType.
* @param val [IN] Input parameter
* @param len [IN] val length
*
* @retval CRYPT_SUCCESS Set successfully.
* @retval CRYPT_NULL_INPUT If any input parameter is empty
* @retval CRYPT_ECC_PKEY_ERR_INVALID_POINT_FORMAT Invalid point format
* @retval CRYPT_ECC_PKEY_ERR_CTRL_LEN The length of len is incorrect.
* @retval CRYPT_ECDSA_ERR_UNSUPPORTED_CTRL_OPTION The opt mode is not supported.
*/
int32_t CRYPT_ECDSA_Ctrl(CRYPT_ECDSA_Ctx *ctx, int32_t opt, void *val, uint32_t len);
/**
* @ingroup ecdsa
* @brief ecdsa Compare public keys and parameters
*
* @param a [IN] ecdsa Context structure
* @param b [IN] ecdsa context structure
*
* @retval CRYPT_SUCCESS is the same
* Others. For details, see error code in errno.
*/
int32_t CRYPT_ECDSA_Cmp(const CRYPT_ECDSA_Ctx *a, const CRYPT_ECDSA_Ctx *b);
/**
* @ingroup ecdsa
* @brief ecdsa get security bits
*
* @param ctx [IN] ecdsa Context structure
*
* @retval security bits
*/
int32_t CRYPT_ECDSA_GetSecBits(const CRYPT_ECDSA_Ctx *ctx);
#ifdef HITLS_CRYPTO_PROVIDER
/**
* @ingroup ecdsa
* @brief ecdsa import key
*
* @param ctx [IN/OUT] ecdsa context structure
* @param params [IN] parameters
*/
int32_t CRYPT_ECDSA_Import(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *params);
/**
* @ingroup ecdsa
* @brief ecdsa export key
*
* @param ctx [IN] ecdsa context structure
* @param params [IN/OUT] key parameters
*/
int32_t CRYPT_ECDSA_Export(const CRYPT_ECDSA_Ctx *ctx, BSL_Param *params);
#endif // HITLS_CRYPTO_PROVIDER
#ifdef HITLS_CRYPTO_ECDSA_CHECK
/**
* @ingroup ecdsa
* @brief ecdsa check public key
*
* @param checkType [IN] check type
* @param pkey1 [IN] ecdsa context structure
* @param pkey2 [IN] ecdsa context structure
*
* @retval CRYPT_SUCCESS is the same
* Others. For details, see error code in errno.
*/
int32_t CRYPT_ECDSA_Check(uint32_t checkType, const CRYPT_ECDSA_Ctx *pkey1, const CRYPT_ECDSA_Ctx *pkey2);
#endif // HITLS_CRYPTO_ECDSA_CHECK
#ifdef __cplusplus
}
#endif
#endif // HITLS_CRYPTO_ECDSA
#endif // CRYPT_ECDSA_H
|
2301_79861745/bench_create
|
crypto/ecdsa/include/crypt_ecdsa.h
|
C
|
unknown
| 17,143
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ECDSA
#include <stdbool.h>
#include "securec.h"
#include "crypt_errno.h"
#include "crypt_types.h"
#include "crypt_utils.h"
#include "bsl_sal.h"
#include "bsl_err_internal.h"
#include "crypt_bn.h"
#include "crypt_encode_internal.h"
#include "crypt_ecc.h"
#include "crypt_ecc_pkey.h"
#include "eal_pkey_local.h"
#include "eal_md_local.h"
#include "crypt_ecdsa.h"
CRYPT_ECDSA_Ctx *CRYPT_ECDSA_NewCtx(void)
{
CRYPT_ECDSA_Ctx *ctx = BSL_SAL_Calloc(1u, sizeof(CRYPT_ECDSA_Ctx));
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
ctx->pointFormat = CRYPT_POINT_UNCOMPRESSED; // point format is uncompressed by default.
BSL_SAL_ReferencesInit(&(ctx->references));
return ctx;
}
CRYPT_ECDSA_Ctx *CRYPT_ECDSA_NewCtxEx(void *libCtx)
{
CRYPT_ECDSA_Ctx *ctx = CRYPT_ECDSA_NewCtx();
if (ctx == NULL) {
return NULL;
}
ctx->libCtx = libCtx;
return ctx;
}
CRYPT_ECDSA_Ctx *CRYPT_ECDSA_DupCtx(CRYPT_ECDSA_Ctx *ctx)
{
return ECC_DupCtx(ctx);
}
void CRYPT_ECDSA_FreeCtx(CRYPT_ECDSA_Ctx *ctx)
{
if (ctx == NULL) {
return;
}
ECC_FreeCtx(ctx);
}
CRYPT_EcdsaPara *CRYPT_ECDSA_NewParaById(int32_t id)
{
return ECC_NewPara(id);
}
CRYPT_EcdsaPara *CRYPT_ECDSA_NewPara(const CRYPT_EccPara *eccPara)
{
CRYPT_PKEY_ParaId id = GetCurveId(eccPara);
if (id == CRYPT_PKEY_PARAID_MAX) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_PARA);
return NULL;
}
return CRYPT_ECDSA_NewParaById(id);
}
CRYPT_PKEY_ParaId CRYPT_ECDSA_GetParaId(const CRYPT_ECDSA_Ctx *ctx)
{
if (ctx == NULL) {
return CRYPT_PKEY_PARAID_MAX;
}
return ECC_GetParaId(ctx->para);
}
void CRYPT_ECDSA_FreePara(CRYPT_EcdsaPara *para)
{
ECC_FreePara(para);
}
int32_t CRYPT_ECDSA_GetPara(const CRYPT_ECDSA_Ctx *ctx, CRYPT_EccPara *para)
{
return ECC_GetPara(ctx, para);
}
static int32_t EcdsaSetPara(CRYPT_ECDSA_Ctx *ctx, CRYPT_EcdsaPara *para)
{
return ECC_SetPara(ctx, para);
}
int32_t CRYPT_ECDSA_SetPara(CRYPT_ECDSA_Ctx *ctx, const CRYPT_EccPara *para)
{
if (ctx == NULL || para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
return EcdsaSetPara(ctx, CRYPT_ECDSA_NewPara(para));
}
uint32_t CRYPT_ECDSA_GetBits(const CRYPT_ECDSA_Ctx *ctx)
{
return ECC_PkeyGetBits(ctx);
}
int32_t CRYPT_ECDSA_SetPrvKey(CRYPT_ECDSA_Ctx *ctx, const CRYPT_EcdsaPrv *prv)
{
return ECC_PkeySetPrvKey(ctx, prv);
}
int32_t CRYPT_ECDSA_SetPubKey(CRYPT_ECDSA_Ctx *ctx, const CRYPT_EcdsaPub *pub)
{
return ECC_PkeySetPubKey(ctx, pub);
}
int32_t CRYPT_ECDSA_GetPrvKey(const CRYPT_ECDSA_Ctx *ctx, CRYPT_EcdsaPrv *prv)
{
return ECC_PkeyGetPrvKey(ctx, prv);
}
int32_t CRYPT_ECDSA_GetPubKey(const CRYPT_ECDSA_Ctx *ctx, CRYPT_EcdsaPub *pub)
{
return ECC_PkeyGetPubKey(ctx, pub);
}
#ifdef HITLS_BSL_PARAMS
int32_t CRYPT_ECDSA_SetParaEx(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
#ifdef HITLS_CRYPTO_PROVIDER
int32_t ret;
const BSL_Param *temp = NULL;
if ((temp = BSL_PARAM_FindConstParam(para, CRYPT_PARAM_MD_ATTR)) != NULL) {
ret = CRYPT_PkeySetMdAttr((const char *)(temp->value), temp->valueLen, &(ctx->mdAttr));
if (ret != CRYPT_SUCCESS) {
return ret;
}
}
#endif
if (BSL_PARAM_FindConstParam(para, CRYPT_PARAM_EC_P) == NULL) {
return CRYPT_SUCCESS;
}
CRYPT_EccPara eccPara = {0};
(void)GetConstParamValue(para, CRYPT_PARAM_EC_P, &(eccPara.p), &(eccPara.pLen));
(void)GetConstParamValue(para, CRYPT_PARAM_EC_A, &(eccPara.a), &(eccPara.aLen));
(void)GetConstParamValue(para, CRYPT_PARAM_EC_B, &(eccPara.b), &(eccPara.bLen));
(void)GetConstParamValue(para, CRYPT_PARAM_EC_N, &(eccPara.n), &(eccPara.nLen));
(void)GetConstParamValue(para, CRYPT_PARAM_EC_H, &(eccPara.h), &(eccPara.hLen));
(void)GetConstParamValue(para, CRYPT_PARAM_EC_X, &(eccPara.x), &(eccPara.xLen));
(void)GetConstParamValue(para, CRYPT_PARAM_EC_Y, &(eccPara.y), &(eccPara.yLen));
return CRYPT_ECDSA_SetPara(ctx, &eccPara);
}
int32_t CRYPT_ECDSA_GetParaEx(const CRYPT_ECDSA_Ctx *ctx, BSL_Param *para)
{
return ECC_GetParaEx(ctx, para);
}
int32_t CRYPT_ECDSA_SetPrvKeyEx(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *para)
{
return ECC_PkeySetPrvKeyEx(ctx, para);
}
int32_t CRYPT_ECDSA_SetPubKeyEx(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *para)
{
return ECC_PkeySetPubKeyEx(ctx, para);
}
int32_t CRYPT_ECDSA_GetPrvKeyEx(const CRYPT_ECDSA_Ctx *ctx, BSL_Param *para)
{
return ECC_PkeyGetPrvKeyEx(ctx, para);
}
int32_t CRYPT_ECDSA_GetPubKeyEx(const CRYPT_ECDSA_Ctx *ctx, BSL_Param *para)
{
return ECC_PkeyGetPubKeyEx(ctx, para);
}
#endif
int32_t CRYPT_ECDSA_Gen(CRYPT_ECDSA_Ctx *ctx)
{
return ECC_PkeyGen(ctx);
}
uint32_t CRYPT_ECDSA_GetSignLen(const CRYPT_ECDSA_Ctx *ctx)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return 0;
}
/**
* https://docs.microsoft.com/en-us/windows/win32/seccertenroll/about-integer
* If the integer is positive but the high order bit is set to 1,
* a leading 0x00 is added to the content to indicate that the number is not negative
*/
// When the number of bits is a multiple of 8 and the most significant bit is 1, 0x00 needs to be added.
// If the number of bits is not a multiple of 8,
// an extra byte needs to be added to store the data with less than 8 bits.
uint32_t qLen = (ECC_ParaBits(ctx->para) / 8) + 1; // divided by 8 to converted to bytes
uint32_t maxSignLen = 0;
int32_t ret = CRYPT_EAL_GetSignEncodeLen(qLen, qLen, &maxSignLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return 0;
}
return maxSignLen;
}
// Obtain the input hash data. For details, see RFC6979-2.4.1 and RFC6979-2.3.2
static BN_BigNum *GetBnByData(const BN_BigNum *n, const uint8_t *data, uint32_t dataLen)
{
uint32_t nBits = BN_Bits(n);
BN_BigNum *d = BN_Create(nBits); // each byte has 8bits
if (d == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
if (data == NULL) {
return d;
}
uint32_t dLen = dataLen;
if (8 * dLen > nBits) { // bytes * 8 = bits
dLen = (nBits + 7) >> 3; // Add 7 and shift rightward by 3 (equal to /8) to achieve the effect of bits2bytes.
}
// The input parameters of the function have been verified, and no failure case exists.
(void)BN_Bin2Bn(d, data, dLen);
if (8 * dLen > nBits) { // bytes * 8 = bits
// Subtracted by 8 and &7 to be accurate to bits.
int32_t ret = BN_Rshift(d, d, (8 - (nBits & 7)));
if (ret != CRYPT_SUCCESS) {
BN_Destroy(d);
BSL_ERR_PUSH_ERROR(ret);
return NULL;
}
}
return d;
}
static int32_t EcdsaSignCore(const CRYPT_ECDSA_Ctx *ctx, const BN_BigNum *paraN, BN_BigNum *d,
BN_BigNum *r, BN_BigNum *s)
{
uint32_t keyBits = CRYPT_ECDSA_GetBits(ctx); // input parameter has been checked externally.
BN_BigNum *k = BN_Create(keyBits);
BN_BigNum *k2 = BN_Create(keyBits);
ECC_Point *pt = ECC_NewPoint(ctx->para);
BN_BigNum *ptX = BN_Create(keyBits);
BN_Optimizer *opt = BN_OptimizerCreate();
int32_t ret;
int32_t i;
if ((k == NULL) || (k2 == NULL) || (pt == NULL) || (opt == NULL) || (ptX == NULL)) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
ret = CRYPT_MEM_ALLOC_FAIL;
goto ERR;
}
for (i = 0; i < CRYPT_ECC_TRY_MAX_CNT; i++) {
GOTO_ERR_IF(BN_RandRangeEx(ctx->libCtx, k, paraN), ret);
if (BN_IsZero(k)) {
continue;
}
// pt = k * G
GOTO_ERR_IF(ECC_PointMul(ctx->para, pt, k, NULL), ret);
// r = pt->x mod n
GOTO_ERR_IF_EX(ECC_GetPointDataX(ctx->para, pt, ptX), ret);
GOTO_ERR_IF(BN_Mod(r, ptX, paraN, opt), ret);
// if r == 0, then restart
if (BN_IsZero(r)) {
continue;
}
// prvkey * r mod n
GOTO_ERR_IF(BN_ModMul(s, ctx->prvkey, r, paraN, opt), ret);
// hash + prvkey * r mod n
GOTO_ERR_IF(BN_ModAddQuick(s, d, s, paraN, opt), ret);
// 1/k mod n
GOTO_ERR_IF(ECC_ModOrderInv(ctx->para, k2, k), ret);
// s = (1/k) * (hash + prvkey * r) mod n
GOTO_ERR_IF(BN_ModMul(s, k2, s, paraN, opt), ret);
// if s == 0, then restart
if (BN_IsZero(s) != true) {
break;
}
}
if (i >= CRYPT_ECC_TRY_MAX_CNT) {
BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_ERR_TRY_CNT);
ret = CRYPT_ECDSA_ERR_TRY_CNT;
}
ERR:
BN_Destroy(k);
BN_Destroy(k2);
BN_Destroy(ptX);
ECC_FreePoint(pt);
BN_OptimizerDestroy(opt);
return ret;
}
static int32_t CryptEcdsaSign(const CRYPT_ECDSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen,
BN_BigNum **r, BN_BigNum **s)
{
int32_t rc = CRYPT_SUCCESS;
BN_BigNum *signR = NULL;
BN_BigNum *signS = NULL;
BN_BigNum *d = NULL;
BN_BigNum *paraN = ECC_GetParaN(ctx->para);
if (paraN == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
uint32_t keyBits = ECC_PkeyGetBits(ctx);
signR = BN_Create(keyBits);
signS = BN_Create(keyBits);
if ((signR == NULL) || (signS == NULL)) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
rc = CRYPT_MEM_ALLOC_FAIL;
goto ERR;
}
d = GetBnByData(paraN, data, dataLen);
if (d == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
rc = CRYPT_MEM_ALLOC_FAIL;
goto ERR;
}
GOTO_ERR_IF_EX(EcdsaSignCore(ctx, paraN, d, signR, signS), rc);
*r = signR;
*s = signS;
goto OK;
ERR:
BN_Destroy(signR);
BN_Destroy(signS);
OK:
BN_Destroy(paraN);
BN_Destroy(d);
return rc;
}
// Data with a value of 0 can also be signed.
int32_t CRYPT_ECDSA_SignData(const CRYPT_ECDSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen,
uint8_t *sign, uint32_t *signLen)
{
if ((ctx == NULL) || (ctx->para == NULL) || (sign == NULL) || (signLen == NULL) ||
((data == NULL) && (dataLen != 0))) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->prvkey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_ERR_EMPTY_KEY);
return CRYPT_ECDSA_ERR_EMPTY_KEY;
}
if (*signLen < CRYPT_ECDSA_GetSignLen(ctx)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_BUFF_LEN_NOT_ENOUGH);
return CRYPT_ECDSA_BUFF_LEN_NOT_ENOUGH;
}
int32_t ret;
BN_BigNum *r = NULL;
BN_BigNum *s = NULL;
ret = CryptEcdsaSign(ctx, data, dataLen, &r, &s);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = CRYPT_EAL_EncodeSign(r, s, sign, signLen);
BN_Destroy(r);
BN_Destroy(s);
return ret;
}
int32_t CRYPT_ECDSA_Sign(const CRYPT_ECDSA_Ctx *ctx, int32_t algId, const uint8_t *data, uint32_t dataLen,
uint8_t *sign, uint32_t *signLen)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
uint8_t hash[64]; // 64 is max hash len
uint32_t hashLen = sizeof(hash) / sizeof(hash[0]);
int32_t ret = EAL_Md(algId, ctx->libCtx, ctx->mdAttr, data, dataLen, hash, &hashLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
return CRYPT_ECDSA_SignData(ctx, hash, hashLen, sign, signLen);
}
static int32_t VerifyCheckSign(const BN_BigNum *paraN, BN_BigNum *r, BN_BigNum *s)
{
if ((BN_Cmp(r, paraN) >= 0) || (BN_Cmp(s, paraN) >= 0)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_VERIFY_FAIL);
return CRYPT_ECDSA_VERIFY_FAIL;
}
if (BN_IsZero(r) || BN_IsZero(s)) {
BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_VERIFY_FAIL);
return CRYPT_ECDSA_VERIFY_FAIL;
}
return CRYPT_SUCCESS;
}
static int32_t EcdsaVerifyCore(const CRYPT_ECDSA_Ctx *ctx, const BN_BigNum *paraN, BN_BigNum *d, const BN_BigNum *r,
const BN_BigNum *s)
{
BN_Optimizer *opt = BN_OptimizerCreate();
if (opt == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
(void)OptimizerStart(opt);
ECC_Point *tpt = ECC_NewPoint(ctx->para);
uint32_t keyBits = CRYPT_ECDSA_GetBits(ctx);
uint32_t room = BITS_TO_BN_UNIT(keyBits);
BN_BigNum *w = OptimizerGetBn(opt, room);
BN_BigNum *u1 = OptimizerGetBn(opt, room);
BN_BigNum *u2 = OptimizerGetBn(opt, room);
BN_BigNum *v = OptimizerGetBn(opt, room);
BN_BigNum *tptX = OptimizerGetBn(opt, room);
int32_t ret;
if (tpt == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
if ((w == NULL) || (u1 == NULL) || (u2 == NULL) || (v == NULL) || (tptX == NULL)) {
ret = CRYPT_BN_OPTIMIZER_GET_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
// w = 1/s mod n
GOTO_ERR_IF(ECC_ModOrderInv(ctx->para, w, s), ret);
// u1 = msg*(1/s) mod n
GOTO_ERR_IF(BN_ModMul(u1, d, w, paraN, opt), ret);
// u2 = r*(1/s) mod n
GOTO_ERR_IF(BN_ModMul(u2, r, w, paraN, opt), ret);
// tpt : u1*G + u2*pubkey
GOTO_ERR_IF(ECC_PointMulAdd(ctx->para, tpt, u1, u2, ctx->pubkey), ret);
GOTO_ERR_IF(ECC_GetPointDataX(ctx->para, tpt, tptX), ret);
GOTO_ERR_IF(BN_Mod(v, tptX, paraN, opt), ret);
if (BN_Cmp(v, r) != 0) {
BSL_ERR_PUSH_ERROR(ret);
ret = CRYPT_ECDSA_VERIFY_FAIL;
}
ERR:
ECC_FreePoint(tpt);
OptimizerEnd(opt);
BN_OptimizerDestroy(opt);
return ret;
}
int32_t CRYPT_ECDSA_VerifyData(const CRYPT_ECDSA_Ctx *ctx, const uint8_t *data, uint32_t dataLen,
const uint8_t *sign, uint32_t signLen)
{
if ((ctx == NULL) || (ctx->para == NULL) || ((data == NULL) && (dataLen != 0)) ||
(sign == NULL) || (signLen == 0)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->pubkey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_ERR_EMPTY_KEY);
return CRYPT_ECDSA_ERR_EMPTY_KEY;
}
int32_t ret;
BN_BigNum *paraN = ECC_GetParaN(ctx->para);
if (paraN == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
uint32_t keyBits = ECC_PkeyGetBits(ctx);
BN_BigNum *r = BN_Create(keyBits);
BN_BigNum *s = BN_Create(keyBits);
BN_BigNum *d = GetBnByData(paraN, data, dataLen);
if (r == NULL || s == NULL || d == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
goto ERR;
}
GOTO_ERR_IF(CRYPT_EAL_DecodeSign(sign, signLen, r, s), ret);
GOTO_ERR_IF(VerifyCheckSign(paraN, r, s), ret);
GOTO_ERR_IF(EcdsaVerifyCore(ctx, paraN, d, r, s), ret);
ERR:
BN_Destroy(paraN);
BN_Destroy(r);
BN_Destroy(s);
BN_Destroy(d);
return ret;
}
int32_t CRYPT_ECDSA_Verify(const CRYPT_ECDSA_Ctx *ctx, int32_t algId, const uint8_t *data, uint32_t dataLen,
const uint8_t *sign, uint32_t signLen)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
uint8_t hash[64]; // 64 is max hash len
uint32_t hashLen = sizeof(hash) / sizeof(hash[0]);
int32_t ret = EAL_Md(algId, ctx->libCtx, ctx->mdAttr, data, dataLen, hash, &hashLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
return CRYPT_ECDSA_VerifyData(ctx, hash, hashLen, sign, signLen);
}
static int32_t CRYPT_ECDSA_GetLen(const CRYPT_ECDSA_Ctx *ctx, GetLenFunc func, void *val, uint32_t len)
{
if (val == NULL || len != sizeof(int32_t)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
*(int32_t *)val = func(ctx);
return CRYPT_SUCCESS;
}
int32_t CRYPT_ECDSA_Ctrl(CRYPT_ECDSA_Ctx *ctx, int32_t opt, void *val, uint32_t len)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
switch (opt) {
case CRYPT_CTRL_SET_ECC_USE_COFACTOR_MODE:
BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_ERR_UNSUPPORTED_CTRL_OPTION);
return CRYPT_ECDSA_ERR_UNSUPPORTED_CTRL_OPTION;
case CRYPT_CTRL_GET_PARAID:
return CRYPT_ECDSA_GetLen(ctx, (GetLenFunc)CRYPT_ECDSA_GetParaId, val, len);
case CRYPT_CTRL_GET_BITS:
return CRYPT_ECDSA_GetLen(ctx, (GetLenFunc)CRYPT_ECDSA_GetBits, val, len);
case CRYPT_CTRL_GET_SIGNLEN:
return CRYPT_ECDSA_GetLen(ctx, (GetLenFunc)CRYPT_ECDSA_GetSignLen, val, len);
case CRYPT_CTRL_GET_SECBITS:
return CRYPT_ECDSA_GetLen(ctx, (GetLenFunc)CRYPT_ECDSA_GetSecBits, val, len);
case CRYPT_CTRL_SET_PARA_BY_ID:
if (val == NULL || len != sizeof(CRYPT_PKEY_ParaId)) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
return EcdsaSetPara(ctx, CRYPT_ECDSA_NewParaById(*(CRYPT_PKEY_ParaId *)val));
default:
break;
}
return ECC_PkeyCtrl(ctx, opt, val, len);
}
int32_t CRYPT_ECDSA_Cmp(const CRYPT_ECDSA_Ctx *a, const CRYPT_ECDSA_Ctx *b)
{
return ECC_PkeyCmp(a, b);
}
int32_t CRYPT_ECDSA_GetSecBits(const CRYPT_ECDSA_Ctx *ctx)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return 0;
}
return ECC_GetSecBits(ctx->para);
}
#ifdef HITLS_CRYPTO_PROVIDER
static int32_t SetCurveInfo(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *curve)
{
if (curve->value == NULL || curve->valueType != BSL_PARAM_TYPE_INT32 ||
curve->valueLen != sizeof(int32_t)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_PKEY_ParaId paraId = *(CRYPT_PKEY_ParaId *)curve->value;
int32_t ret = ECC_SetPara(ctx, CRYPT_ECDSA_NewParaById((int32_t)paraId));
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
return ret;
}
int32_t CRYPT_ECDSA_Import(CRYPT_ECDSA_Ctx *ctx, const BSL_Param *params)
{
if (ctx == NULL || params == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
int32_t ret = CRYPT_SUCCESS;
const BSL_Param *prv = BSL_PARAM_FindConstParam(params, CRYPT_PARAM_EC_PRVKEY);
const BSL_Param *pub = BSL_PARAM_FindConstParam(params, CRYPT_PARAM_EC_PUBKEY);
const BSL_Param *curve = BSL_PARAM_FindConstParam(params, CRYPT_PARAM_EC_CURVE_ID);
if (curve != NULL) {
ret = SetCurveInfo(ctx, curve);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
}
if (prv != NULL) {
ret = CRYPT_ECDSA_SetPrvKeyEx(ctx, params);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
}
if (pub != NULL) {
ret = CRYPT_ECDSA_SetPubKeyEx(ctx, params);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
}
return ret;
}
int32_t CRYPT_ECDSA_Export(const CRYPT_ECDSA_Ctx *ctx, BSL_Param *params)
{
if (ctx == NULL || params == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_PKEY_ParaId curveId = CRYPT_ECDSA_GetParaId(ctx);
if (curveId == CRYPT_PKEY_PARAID_MAX) {
BSL_ERR_PUSH_ERROR(CRYPT_ECC_ERR_PARA);
return CRYPT_ECC_ERR_PARA;
}
uint32_t keyBytes = (CRYPT_ECDSA_GetBits(ctx) + 7) / 8;
if (keyBytes == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
int32_t ret;
int index = 1;
void *args = NULL;
CRYPT_EAL_ProcessFuncCb processCb = NULL;
BSL_Param ecdsaParams[4] = {
{CRYPT_PARAM_EC_CURVE_ID, BSL_PARAM_TYPE_INT32, (int32_t *)&curveId, sizeof(int32_t), 0},
{0},
{0},
BSL_PARAM_END
};
ret = CRYPT_GetPkeyProcessParams(params, &processCb, &args);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
uint8_t *buffer = BSL_SAL_Calloc(1, keyBytes * 2); // 2 denote private + public key
if (buffer == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
if (ctx->pubkey != NULL) {
(void)BSL_PARAM_InitValue(&ecdsaParams[index], CRYPT_PARAM_EC_PUBKEY, BSL_PARAM_TYPE_OCTETS,
buffer, keyBytes);
ret = CRYPT_ECDSA_GetPubKeyEx(ctx, ecdsaParams);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_Free(buffer);
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ecdsaParams[index].valueLen = ecdsaParams[index].useLen;
index++;
}
if (ctx->prvkey != NULL) {
(void)BSL_PARAM_InitValue(&ecdsaParams[index], CRYPT_PARAM_EC_PRVKEY, BSL_PARAM_TYPE_OCTETS,
buffer + keyBytes, keyBytes);
ret = CRYPT_ECDSA_GetPrvKeyEx(ctx, ecdsaParams);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_Free(buffer);
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ecdsaParams[index].valueLen = ecdsaParams[index].useLen;
index++;
}
ret = processCb(ecdsaParams, args);
BSL_SAL_Free(buffer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
return ret;
}
#endif // HITLS_CRYPTO_PROVIDER
#ifdef HITLS_CRYPTO_ECDSA_CHECK
int32_t CRYPT_ECDSA_Check(uint32_t checkType, const CRYPT_ECDSA_Ctx *pkey1, const CRYPT_ECDSA_Ctx *pkey2)
{
int32_t ret = ECC_PkeyCheck(pkey1, pkey2, checkType);
if (ret == CRYPT_ECC_PAIRWISE_CHECK_FAIL) {
BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_PAIRWISE_CHECK_FAIL);
return CRYPT_ECDSA_PAIRWISE_CHECK_FAIL;
}
if (ret == CRYPT_ECC_INVALID_PRVKEY) {
BSL_ERR_PUSH_ERROR(CRYPT_ECDSA_INVALID_PRVKEY);
return CRYPT_ECDSA_INVALID_PRVKEY;
}
return ret; // may be other error occurred.
}
#endif // HITLS_CRYPTO_ECDSA_CHECK
#endif /* HITLS_CRYPTO_ECDSA */
|
2301_79861745/bench_create
|
crypto/ecdsa/src/ecdsa.c
|
C
|
unknown
| 22,652
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_ELGAMAL_H
#define CRYPT_ELGAMAL_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ELGAMAL
#include <stdlib.h>
#include <stdint.h>
#include "crypt_bn.h"
#include "crypt_local_types.h"
#include "bsl_params.h"
#ifdef __cplusplus
extern "C" {
#endif /* __cpluscplus */
#define ELGAMAL_MAX_MODULUS_BITS 16384
/* ElGamal*/
typedef struct ELGAMAL_Ctx CRYPT_ELGAMAL_Ctx;
typedef struct ELGAMAL_Para CRYPT_ELGAMAL_Para;
/* ElGamal method*/
/**
* @ingroup elgamal
* @brief Allocate elgamal context memory space.
*
* @retval (CRYPT_ELGAMAL_Ctx *) Pointer to the memory space of the allocated context
* @retval NULL Invalid null pointer.
*/
CRYPT_ELGAMAL_Ctx *CRYPT_ELGAMAL_NewCtx(void);
CRYPT_ELGAMAL_Ctx *CRYPT_ELGAMAL_NewCtxEx(void *libCtx);
/**
* @ingroup elgamal
* @brief Copy the ElGamal context. After the duplication is complete, call the CRYPT_ELGAMAL_FreeCtx to release the memory.
*
* @param ctx [IN] ELGAMAL context
*
* @return CRYPT_ELGAMAL_Ctx ELGAMAL context pointer
* If the operation fails, a null value is returned.
*/
CRYPT_ELGAMAL_Ctx *CRYPT_ELGAMAL_DupCtx(CRYPT_ELGAMAL_Ctx *keyCtx);
/**
* @ingroup elgamal
* @brief Create elgamal key parameter structure
*
* @param para [IN] ELGAMAL External parameter
*
* @retval (CRYPT_ELGAMAL_Para *) Pointer to the allocated memory space of the structure
* @retval NULL Invalid null pointer.
*/
CRYPT_ELGAMAL_Para *CRYPT_ELGAMAL_NewPara(const CRYPT_ElGamalPara *para);
/**
* @ingroup elgamal
* @brief release ElGamal key context structure
*
* @param ctx [IN] Pointer to the context structure to be released. The ctx is set NULL by the invoker.
*/
void CRYPT_ELGAMAL_FreeCtx(CRYPT_ELGAMAL_Ctx *ctx);
/**
* @ingroup elgamal
* @brief Release ElGamal key parameter structure
*
* @param para [IN] Storage pointer in the parameter structure to be released. The parameter is set NULL by the invoker.
*/
void CRYPT_ELGAMAL_FreePara(CRYPT_ELGAMAL_Para *para);
/**
* @ingroup elgamal
* @brief Set the data of the key parameter structure to the key structure.
*
* @param ctx [OUT] ElGamal context structure for which related parameters need to be set
* @param para [IN] Key parameter structure
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input.
* @retval CRYPT_ELGAMAL_ERR_KEY_BITS The expected key length does not meet the requirements.
* @retval CRYPT_ELGAMAL_ERR_E_VALUE The expected value of e does not meet the requirements.
* @retval CRYPT_MEM_ALLOC_FAIL internal memory allocation error
* @retval CRYPT_SUCCESS set successfully.
*/
int32_t CRYPT_ELGAMAL_SetPara(CRYPT_ELGAMAL_Ctx *ctx, const CRYPT_ElGamalPara *para);
#ifdef HITLS_BSL_PARAMS
/**
* @ingroup elgamal
* @brief Set the data of the key parameter structure to the key structure.
*
* @param ctx [OUT] ElGamal context structure for which related parameters need to be set
* @param para [IN] Key parameter structure
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input.
* @retval CRYPT_ELGAMAL_ERR_KEY_BITS The expected key length does not meet the requirements.
* @retval CRYPT_ELGAMAL_ERR_E_VALUE The expected value of e does not meet the requirements.
* @retval CRYPT_MEM_ALLOC_FAIL internal memory allocation error
* @retval CRYPT_SUCCESS set successfully.
*/
int32_t CRYPT_ELGAMAL_SetParaEx(CRYPT_ELGAMAL_Ctx *ctx, const BSL_Param *para);
#endif
/**
* @ingroup elgamal
* @brief Obtain the valid length of the key.
*
* @param ctx [IN] Structure from which the key length is expected to be obtained
*
* @retval 0: The input is incorrect or the corresponding key structure does not have a valid key length.
* @retval uint32_t: Valid key length
*/
uint32_t CRYPT_ELGAMAL_GetBits(const CRYPT_ELGAMAL_Ctx *ctx);
/**
* @ingroup elgamal
* @brief Obtain the valid length of the k.
*
* @param ctx [IN] Structure from which the key length is expected to be obtained
*
* @retval 0: The input is incorrect or the corresponding key structure does not have a valid key length.
* @retval uint32_t: Valid key length
*/
uint32_t CRYPT_ELGAMAL_GetKBits(const CRYPT_ELGAMAL_Ctx *ctx);
/**
* @ingroup elgamal
* @brief Generate the ElGamal key pair.
*
* @param ctx [IN/OUT] elgamal context structure
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_ELGAMAL_ERR_KEY_BITS The value of e in the context structure does not meet the requirements.
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval BN error An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS The key pair is successfully generated.
*/
int32_t CRYPT_ELGAMAL_Gen(CRYPT_ELGAMAL_Ctx *ctx);
/**
* @ingroup elgamal
* @brief ElGamal public key encryption
*
* @param ctx [IN] ElGamal context structure
* @param input [IN] Information to be encrypted
* @param inputLen [IN] Length of the information to be encrypted
* @param out1 [OUT] Pointer to the encrypted information output.(c1)
* @param out1Len [IN/OUT] Pointer to the length of the encrypted information.
* Before being transferred, the value must be set to the maximum length of the array.
* @param out2 [OUT] Pointer to the encrypted information output.(c2)
* @param out2Len [IN/OUT] Pointer to the length of the encrypted information.
* Before being transferred, the value must be set to the maximum length of the array.
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_ELGAMAL_NO_KEY_INFO does not contain the key information.
* @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions.
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval CRYPT_SECUREC_FAIL A security function error occurs.
* @retval BN error An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS encryption succeeded.
*/
int32_t CRYPT_ELGAMAL_PubEnc(const CRYPT_ELGAMAL_Ctx *ctx, const uint8_t *input, uint32_t inputLen, uint8_t *out1,
uint32_t *out1Len, uint8_t *out2, uint32_t *out2Len);
/**
* @ingroup elgamal
* @brief ElGamal private key decryption
*
* @param ctx [IN] ElGamal context structure
* @param c1 [IN] Information to be decrypted
* @param c2 [IN] Information to be decrypted
* @param bits [IN] Length of the information to be decrypted
* @param out [OUT] Pointer to the decrypted information output.
* @param outLen [IN/OUT] Pointer to the length of the decrypted information.
* Before being transferred, the value must be set to the maximum length of the array.
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_ELGAMAL_ERR_DEC_BITS Incorrect length of the encrypted private key.
* @retval CRYPT_ELGAMAL_NO_KEY_INFO does not contain the key information.
* @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions.
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval CRYPT_SECUREC_FAIL A security function error occurs.
* @retval BN error. An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS Decrypted Successfully
*/
int32_t CRYPT_ELGAMAL_PrvDec(const CRYPT_ELGAMAL_Ctx *ctx, const BN_BigNum *c1, const BN_BigNum *c2, uint32_t bits,
uint8_t *out, uint32_t *outLen);
/**
* @ingroup elgamal
* @brief ElGamal Set the private key information.
*
* @param ctx [OUT] ElGamal context structure
* @param prv [IN] Private key data
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_ELGAMAL_ERR_KEY_BITS The key length does not meet the requirements.
* @retval CRYPT_ELGAMAL_NO_KEY_INFO does not contain the key information.
* @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions.
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval BN error An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS The private key is successfully set.
*/
int32_t CRYPT_ELGAMAL_SetPrvKey(CRYPT_ELGAMAL_Ctx *ctx, const CRYPT_ElGamalPrv *prv);
/**
* @ingroup elgamal
* @brief ElGamal Set the public key information.
*
* @param ctx [OUT] ElGamal context structure
* @param pub [IN] Public key data
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_ELGAMAL_ERR_KEY_BITS The key length does not meet the requirements.
* @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions.
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval BN error An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS The public key is successfully set.
*/
int32_t CRYPT_ELGAMAL_SetPubKey(CRYPT_ELGAMAL_Ctx *ctx, const CRYPT_ElGamalPub *pub);
/**
* @ingroup elgamal
* @brief ElGamal Obtain the private key information.
*
* @param ctx [IN] ElGamal context structure
* @param prv [OUT] Private key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval BN error An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS The private key is obtained successfully.
*/
int32_t CRYPT_ELGAMAL_GetPrvKey(const CRYPT_ELGAMAL_Ctx *ctx, CRYPT_ElGamalPrv *prv);
/**
* @ingroup elgamal
* @brief ElGamal Obtain the public key information.
*
* @param ctx [IN] ElGamal context structure
* @param pub [OUT] Public key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval BN error An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS The public key is obtained successfully.
*/
int32_t CRYPT_ELGAMAL_GetPubKey(const CRYPT_ELGAMAL_Ctx *ctx, CRYPT_ElGamalPub *pub);
#ifdef HITLS_BSL_PARAMS
/**
* @ingroup elgamal
* @brief ElGamal Set the private key information.
*
* @param ctx [OUT] ElGamal context structure
* @param para [IN] Private key data
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_ELGAMAL_ERR_KEY_BITS The key length does not meet the requirements.
* @retval CRYPT_ELGAMAL_NO_KEY_INFO does not contain the key information.
* @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions.
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval BN error An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS The private key is successfully set.
*/
int32_t CRYPT_ELGAMAL_SetPrvKeyEx(CRYPT_ELGAMAL_Ctx *ctx, const BSL_Param *para);
/**
* @ingroup elgamal
* @brief ElGamal Set the public key information.
*
* @param ctx [OUT] ElGamal context structure
* @param para [IN] Public key data
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_ELGAMAL_ERR_KEY_BITS The key length does not meet the requirements.
* @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions.
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval BN error An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS The public key is successfully set.
*/
int32_t CRYPT_ELGAMAL_SetPubKeyEx(CRYPT_ELGAMAL_Ctx *ctx, const BSL_Param *para);
/**
* @ingroup elgamal
* @brief ElGamal Obtain the private key information.
*
* @param ctx [IN] ElGamal context structure
* @param para [OUT] Private key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval BN error An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS The private key is obtained successfully.
*/
int32_t CRYPT_ELGAMAL_GetPrvKeyEx(const CRYPT_ELGAMAL_Ctx *ctx, BSL_Param *para);
/**
* @ingroup elgamal
* @brief ElGamal Obtain the public key information.
*
* @param ctx [IN] ElGamal context structure
* @param para [OUT] Public key data
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval BN error An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS The public key is obtained successfully.
*/
int32_t CRYPT_ELGAMAL_GetPubKeyEx(const CRYPT_ELGAMAL_Ctx *ctx, BSL_Param *para);
#endif
/**
* @ingroup elgamal
* @brief ElGamal public key encryption
*
* @param ctx [IN] ELGAMAL context structure
* @param data [IN] Information to be encrypted
* @param dataLen [IN] Length of the information to be encrypted
* @param out [OUT] Pointer to the encrypted information output.
* @param outLen [OUT] Pointer to the length of the encrypted information
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_ELGAMAL_NO_KEY_INFO does not contain the key information.
* @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions.
* @retval CRYPT_ELGAMAL_BUFF_LEN_NOT_ENOUGH Outbuf Insufficient
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval CRYPT_SECUREC_FAIL A safe function error occurs.
* @retval BN error. An error occurs in the internal BigNum operation.
* @retval CRYPT_EAL_ALG_NOT_SUPPORT does not register the encryption method.
* @retval CRYPT_SUCCESS encryption succeeded.
*/
int32_t CRYPT_ELGAMAL_Encrypt(CRYPT_ELGAMAL_Ctx *ctx, const uint8_t *data, uint32_t dataLen, uint8_t *out,
uint32_t *outLen);
/**
* @ingroup elgamal
* @brief ElGamal private key decryption
*
* @param ctx [IN] ELGAMAL context structure
* @param data [IN] Information to be decrypted
* @param dataLen [IN] Length of the information to be decrypted
* @param out [OUT] Pointer to the output information after decryption.
* @param outLen [OUT] Pointer to the length of the decrypted information
*
* @retval CRYPT_NULL_INPUT Error null pointer input
* @retval CRYPT_ELGAMAL_NO_KEY_INFO does not contain the key information.
* @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions.
* @retval CRYPT_ELGAMAL_BUFF_LEN_NOT_ENOUGH Outbuf Insufficient
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval CRYPT_SECUREC_FAIL A security function error occurs.
* @retval CRYPT_EAL_ALG_NOT_SUPPORT does not register the decryption method.
* @retval BN error. An error occurs in the internal BigNum operation.
* @retval CRYPT_SUCCESS Decryption succeeded.
*/
int32_t CRYPT_ELGAMAL_Decrypt(CRYPT_ELGAMAL_Ctx *ctx, const uint8_t *data, uint32_t dataLen, uint8_t *out,
uint32_t *outLen);
/**
* @ingroup elgamal
* @brief ELGAMAL get security bits
*
* @param ctx [IN] ELGAMAL Context structure
*
* @retval security bits
*/
int32_t CRYPT_ELGAMAL_GetSecBits(const CRYPT_ELGAMAL_Ctx *ctx);
/**
* @ingroup elgamal
* @brief ELGAMAL control function for various operations
*
* @param ctx [IN/OUT] ELGAMAL context structure
* @param opt [IN] Control operation type
* @param val [IN/OUT] Parameter value for the operation
* @param len [IN] Length of the parameter value
*
* @retval CRYPT_NULL_INPUT Invalid null pointer input
* @retval CRYPT_ELGAMAL_ERR_INPUT_VALUE The entered value does not meet the calculation conditions
* @retval CRYPT_ELGAMAL_NO_KEY_INFO Does not contain the key information
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
* @retval CRYPT_EAL_ALG_NOT_SUPPORT Operation not supported
* @retval CRYPT_SUCCESS Operation succeeded
*/
int32_t CRYPT_ELGAMAL_Ctrl(CRYPT_ELGAMAL_Ctx *ctx, int32_t opt, void *val, uint32_t len);
#ifdef HITLS_CRYPTO_ELGAMAL
/**
* @ingroup elgamal
* @brief BigNum Calculate the original root
*
* @param g [OUT] Safety prime
* @param p [IN] Big prime
* @param q [IN] Big prime
* @param opt [IN] Optimizer
*
* @retval CRYPT_SUCCESS
* @retval CRYPT_NULL_INPUT Invalid null pointer
* @retval CRYPT_MEM_ALLOC_FAIL Memory allocation failure
*/
int32_t OriginalRoot(void *libCtx, BN_BigNum *g, const BN_BigNum *p, const BN_BigNum *q, uint32_t bits);
#endif
#ifdef _cplusplus
}
#endif
#endif // HITLS_CRYPTO_ELGAMAL
#endif // CRYPT_ELGAMAL_H
|
2301_79861745/bench_create
|
crypto/elgamal/include/crypt_elgamal.h
|
C
|
unknown
| 17,992
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ELGAMAL
#include "crypt_utils.h"
#include "crypt_elgamal.h"
#include "elgamal_local.h"
#include "crypt_errno.h"
#include "bsl_sal.h"
#include "securec.h"
#include "bsl_err_internal.h"
static int32_t AddZero(uint32_t bits, uint8_t *out, uint32_t *outLen)
{
int32_t ret;
uint32_t i;
uint32_t zeros = 0;
/* Divide bits by 8 to obtain the byte length. If it is smaller than the key length, pad it with 0. */
if ((*outLen) < BN_BITS_TO_BYTES(bits)) {
/* Divide bits by 8 to obtain the byte length. If it is smaller than the key length, pad it with 0. */
zeros = BN_BITS_TO_BYTES(bits) - (*outLen);
ret = memmove_s(out + zeros, BN_BITS_TO_BYTES(bits) - zeros, out, (*outLen));
if (ret != EOK) {
BSL_ERR_PUSH_ERROR(CRYPT_SECUREC_FAIL);
return CRYPT_SECUREC_FAIL;
}
for (i = 0; i < zeros; i++) {
out[i] = 0x0;
}
}
*outLen = BN_BITS_TO_BYTES(bits);
return CRYPT_SUCCESS;
}
static int32_t ResultToOut(uint32_t bits, const BN_BigNum *result, uint8_t *out, uint32_t *outLen)
{
int32_t ret = BN_Bn2Bin(result, out, outLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
return AddZero(bits, out, outLen);
}
int32_t CRYPT_ELGAMAL_PubEnc(const CRYPT_ELGAMAL_Ctx *ctx, const uint8_t *input, uint32_t inputLen, uint8_t *out1,
uint32_t *out1Len, uint8_t *out2, uint32_t *out2Len)
{
int32_t ret;
CRYPT_ELGAMAL_PubKey *pubKey = ctx->pubKey;
if (pubKey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
BN_Mont *mont = BN_MontCreate(pubKey->p);
uint32_t bits = CRYPT_ELGAMAL_GetBits(ctx);
uint32_t k_bits = CRYPT_ELGAMAL_GetKBits(ctx);
BN_Optimizer *optimizer = BN_OptimizerCreate();
if (optimizer == NULL || mont == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
BN_MontDestroy(mont);
BN_OptimizerDestroy(optimizer);
return CRYPT_MEM_ALLOC_FAIL;
}
BN_BigNum *m = BN_Create(bits);
BN_BigNum *r = BN_Create(k_bits);
BN_BigNum *yr = BN_Create(bits);
BN_BigNum *c1 = BN_Create(bits);
BN_BigNum *c2 = BN_Create(bits);
BN_BigNum *gcd_result = BN_Create(bits);
BN_BigNum *top = BN_Create(k_bits);
bool createFailed =
(m == NULL || r == NULL || yr == NULL || c1 == NULL || c2 == NULL || gcd_result == NULL || top == NULL);
if (createFailed) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
ret = CRYPT_MEM_ALLOC_FAIL;
goto EXIT;
}
ret = BN_Bin2Bn(m, input, inputLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
if (BN_IsNegative(m)) {
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_INPUT_VALUE);
ret = CRYPT_ELGAMAL_ERR_INPUT_VALUE;
goto EXIT;
}
ret = BN_SubLimb(top, pubKey->q, 1);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
while (true) {
ret = BN_RandRangeEx(ctx->libCtx, r, top);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
// Check whether r is relatively prime to p-1, if not, regenerate r
ret = BN_Gcd(gcd_result, r, top, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
if (BN_IsOne(gcd_result)) {
break;
}
}
ret = BN_MontExp(c1, pubKey->g, r, mont, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = BN_MontExp(yr, pubKey->y, r, mont, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = BN_ModMul(c2, m, yr, pubKey->p, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = BN_Bn2Bin(c1, out1, out1Len);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = BN_Bn2Bin(c2, out2, out2Len);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
EXIT:
BN_Destroy(m);
BN_Destroy(r);
BN_Destroy(yr);
BN_Destroy(c1);
BN_Destroy(c2);
BN_Destroy(gcd_result);
BN_Destroy(top);
BN_OptimizerDestroy(optimizer);
BN_MontDestroy(mont);
return ret;
}
int32_t CRYPT_ELGAMAL_PrvDec(const CRYPT_ELGAMAL_Ctx *ctx, const BN_BigNum *c1, const BN_BigNum *c2, uint32_t bits,
uint8_t *out, uint32_t *outLen)
{
int32_t ret;
CRYPT_ELGAMAL_PrvKey *prvKey = ctx->prvKey;
if (prvKey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
BN_Optimizer *optimizer = BN_OptimizerCreate();
if (optimizer == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
bits = CRYPT_ELGAMAL_GetBits(ctx);
BN_BigNum *m = BN_Create(bits);
BN_BigNum *c1_x = BN_Create(bits);
BN_BigNum *c1_x_inv = BN_Create(bits);
BN_BigNum *result = BN_Create(bits);
bool createFailed = (m == NULL || c1_x == NULL || c1_x_inv == NULL || result == NULL);
if (createFailed) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
ret = CRYPT_MEM_ALLOC_FAIL;
goto EXIT;
}
ret = BN_ModExp(c1_x, c1, prvKey->x, prvKey->p, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = BN_ModInv(c1_x_inv, c1_x, prvKey->p, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = BN_ModMul(m, c2, c1_x_inv, prvKey->p, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = ResultToOut(bits, result, out, outLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
EXIT:
BN_Destroy(m);
BN_Destroy(c1_x);
BN_Destroy(c1_x_inv);
BN_Destroy(result);
BN_OptimizerDestroy(optimizer);
return ret;
}
static int32_t EncryptInputCheck(const CRYPT_ELGAMAL_Ctx *ctx, const uint8_t *input, uint32_t inputLen, uint8_t *out,
uint32_t *outLen)
{
if (ctx == NULL || (input == NULL && inputLen != 0) || out == NULL || outLen == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->pubKey == NULL) {
// Check whether the public key information exists.
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_NO_KEY_INFO);
return CRYPT_ELGAMAL_NO_KEY_INFO;
}
// Check whether the length of the out is sufficient to place the encryption information.
uint32_t bits = CRYPT_ELGAMAL_GetBits(ctx);
if ((*outLen) < BN_BITS_TO_BYTES(bits)) {
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_BUFF_LEN_NOT_ENOUGH);
return CRYPT_ELGAMAL_BUFF_LEN_NOT_ENOUGH;
}
if (inputLen > BN_BITS_TO_BYTES(bits)) {
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_ENC_BITS);
return CRYPT_ELGAMAL_ERR_ENC_BITS;
}
return CRYPT_SUCCESS;
}
int32_t CRYPT_ELGAMAL_Encrypt(CRYPT_ELGAMAL_Ctx *ctx, const uint8_t *data, uint32_t dataLen, uint8_t *out,
uint32_t *outLen)
{
int32_t ret = EncryptInputCheck(ctx, data, dataLen, out, outLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
uint32_t bits = CRYPT_ELGAMAL_GetBits(ctx);
uint32_t out1Len = bits;
uint32_t out2Len = (*outLen) - bits;
uint32_t out3Len = 2 * bits ;
uint8_t *out1 = BSL_SAL_Calloc(1u, out1Len);
uint8_t *out2 = BSL_SAL_Calloc(1u, out2Len);
uint8_t *out3 = BSL_SAL_Calloc(1u, out3Len);
BN_BigNum *result = BN_Create(*outLen);
BN_BigNum *c = BN_Create(*outLen);
if (out1 == NULL || out2 == NULL || out3 == NULL || result == NULL || c == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
ret = CRYPT_MEM_ALLOC_FAIL;
goto EXIT;
}
ret = CRYPT_ELGAMAL_PubEnc(ctx, data, dataLen, out1, &out1Len, out2, &out2Len);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
(void)memcpy_s(out3, out3Len, out1, out1Len); // c1
(void)memcpy_s(out3 + out1Len, out3Len - out1Len, out2, out2Len); // c2
ret = BN_Bin2Bn(c,out3,out3Len);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = ResultToOut(2 * bits, result, out, outLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
EXIT:
BSL_SAL_FREE(out1);
BSL_SAL_FREE(out2);
BSL_SAL_FREE(out3);
BN_Destroy(result);
BN_Destroy(c);
return ret;
}
static int32_t DecryptInputCheck(const CRYPT_ELGAMAL_Ctx *ctx, const uint8_t *data, uint32_t dataLen,
const uint8_t *out, const uint32_t *outLen)
{
if (ctx == NULL || data == NULL || out == NULL || outLen == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->prvKey == NULL) {
// Check whether the private key information exists.
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_NO_KEY_INFO);
return CRYPT_ELGAMAL_NO_KEY_INFO;
}
// Check whether the length of the out is sufficient to place the decryption information.
uint32_t bits = CRYPT_ELGAMAL_GetBits(ctx);
if ((*outLen) < BN_BITS_TO_BYTES(bits)) {
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_BUFF_LEN_NOT_ENOUGH);
return CRYPT_ELGAMAL_BUFF_LEN_NOT_ENOUGH;
}
if (dataLen != 2 * BN_BITS_TO_BYTES(bits)) {
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_DEC_BITS);
return CRYPT_ELGAMAL_ERR_DEC_BITS;
}
return CRYPT_SUCCESS;
}
static int32_t CheckCiphertext(const BN_BigNum *c1, const BN_BigNum *c2, const CRYPT_ELGAMAL_PrvKey *prvKey)
{
if (BN_Cmp(c1, prvKey->p) >= 0 || BN_IsNegative(c1)) {
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_INPUT_VALUE);
return CRYPT_ELGAMAL_ERR_INPUT_VALUE;
}
if (BN_Cmp(c2, prvKey->p) >= 0 || BN_IsNegative(c2)) {
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_INPUT_VALUE);
return CRYPT_ELGAMAL_ERR_INPUT_VALUE;
}
int32_t ret = CRYPT_SUCCESS;
BN_BigNum *gcd_result = BN_Create(BN_Bits(c1));
BN_Optimizer *optimizer = BN_OptimizerCreate();
if (gcd_result == NULL || optimizer == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
ret = CRYPT_MEM_ALLOC_FAIL;
goto EXIT;
}
ret = BN_Gcd(gcd_result, c1, prvKey->p, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
if (BN_IsOne(gcd_result) == false) {
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_INPUT_VALUE);
ret = CRYPT_ELGAMAL_ERR_INPUT_VALUE;
goto EXIT;
}
ret = BN_Gcd(gcd_result, c2, prvKey->p, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
if (BN_IsOne(gcd_result) == false) {
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_INPUT_VALUE);
ret = CRYPT_ELGAMAL_ERR_INPUT_VALUE;
}
EXIT:
BN_Destroy(gcd_result);
BN_OptimizerDestroy(optimizer);
return ret;
}
int32_t CRYPT_ELGAMAL_Decrypt(CRYPT_ELGAMAL_Ctx *ctx, const uint8_t *data, uint32_t dataLen, uint8_t *out,
uint32_t *outLen)
{
int32_t ret = DecryptInputCheck(ctx, data, dataLen, out, outLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
uint32_t bits = CRYPT_ELGAMAL_GetBits(ctx);
uint32_t data1Len = BN_BITS_TO_BYTES(bits);
uint32_t data2Len = dataLen - BN_BITS_TO_BYTES(bits);
uint8_t *data1 = BSL_SAL_Calloc(1u, data1Len);
uint8_t *data2 = BSL_SAL_Calloc(1u, data2Len);
BN_BigNum *c1 = BN_Create(bits);
BN_BigNum *c2 = BN_Create(bits);
if (data1 == NULL || data2 == NULL || c1 == NULL || c2 == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
ret = CRYPT_MEM_ALLOC_FAIL;
goto EXIT;
}
(void)memcpy_s(data1, data1Len, data, data1Len); // c1
(void)memcpy_s(data2, data2Len, data + data1Len, data2Len); // c2
ret = BN_Bin2Bn(c1, data1, data1Len);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = BN_Bin2Bn(c2, data2, data2Len);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = CheckCiphertext(c1, c2, ctx->prvKey);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = CRYPT_ELGAMAL_PrvDec(ctx, c1, c2, bits, out, outLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
EXIT:
BSL_SAL_FREE(data1);
BSL_SAL_FREE(data2);
BN_Destroy(c1);
BN_Destroy(c2);
return ret;
}
static uint32_t CRYPT_ELGAMAL_GetLen(const CRYPT_ELGAMAL_Ctx *ctx, GetLenFunc func, void *val, uint32_t len)
{
if (val == NULL || len != sizeof(int32_t)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
*(int32_t *)val = func(ctx);
return CRYPT_SUCCESS;
}
int32_t CRYPT_ELGAMAL_Ctrl(CRYPT_ELGAMAL_Ctx *ctx, int32_t opt, void *val, uint32_t len)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
switch (opt) {
case CRYPT_CTRL_GET_BITS:
return CRYPT_ELGAMAL_GetLen(ctx, (GetLenFunc)CRYPT_ELGAMAL_GetBits, val, len);
case CRYPT_CTRL_GET_SECBITS:
return CRYPT_ELGAMAL_GetLen(ctx, (GetLenFunc)CRYPT_ELGAMAL_GetSecBits, val, len);
default:
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_CTRL_NOT_SUPPORT_ERROR);
return CRYPT_ELGAMAL_CTRL_NOT_SUPPORT_ERROR;
}
}
#endif // HITLS_CRYPTO_ELGAMAL
|
2301_79861745/bench_create
|
crypto/elgamal/src/elgamal_encdec.c
|
C
|
unknown
| 14,388
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ELGAMAL
#include "crypt_elgamal.h"
#include "elgamal_local.h"
#include "crypt_errno.h"
#include "crypt_utils.h"
#include "securec.h"
#include "bsl_sal.h"
#include "bsl_err_internal.h"
#include "crypt_params_key.h"
CRYPT_ELGAMAL_Ctx *CRYPT_ELGAMAL_NewCtx(void)
{
CRYPT_ELGAMAL_Ctx *ctx = NULL;
ctx = (CRYPT_ELGAMAL_Ctx *)BSL_SAL_Malloc(sizeof(CRYPT_ELGAMAL_Ctx));
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)memset_s(ctx, sizeof(CRYPT_ELGAMAL_Ctx), 0, sizeof(CRYPT_ELGAMAL_Ctx));
BSL_SAL_ReferencesInit(&(ctx->references));
return ctx;
}
CRYPT_ELGAMAL_Ctx *CRYPT_ELGAMAL_NewCtxEx(void *libCtx)
{
CRYPT_ELGAMAL_Ctx *ctx = CRYPT_ELGAMAL_NewCtx();
if (ctx == NULL) {
return NULL;
}
ctx->libCtx = libCtx;
return ctx;
}
static CRYPT_ELGAMAL_PubKey *ElGamalPubKeyDupCtx(CRYPT_ELGAMAL_PubKey *pubKey)
{
CRYPT_ELGAMAL_PubKey *newPubKey = (CRYPT_ELGAMAL_PubKey *)BSL_SAL_Malloc(sizeof(CRYPT_ELGAMAL_PubKey));
if (newPubKey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)memset_s(newPubKey, sizeof(CRYPT_ELGAMAL_PubKey), 0, sizeof(CRYPT_ELGAMAL_PubKey));
GOTO_ERR_IF_SRC_NOT_NULL(newPubKey->p, pubKey->p, BN_Dup(pubKey->p), CRYPT_MEM_ALLOC_FAIL);
GOTO_ERR_IF_SRC_NOT_NULL(newPubKey->g, pubKey->g, BN_Dup(pubKey->g), CRYPT_MEM_ALLOC_FAIL);
GOTO_ERR_IF_SRC_NOT_NULL(newPubKey->y, pubKey->y, BN_Dup(pubKey->y), CRYPT_MEM_ALLOC_FAIL);
GOTO_ERR_IF_SRC_NOT_NULL(newPubKey->q, pubKey->q, BN_Dup(pubKey->q), CRYPT_MEM_ALLOC_FAIL);
return newPubKey;
ERR:
ELGAMAL_FREE_PUB_KEY(newPubKey);
return NULL;
}
static CRYPT_ELGAMAL_PrvKey *ElGamalPrvKeyDupCtx(CRYPT_ELGAMAL_PrvKey *prvKey)
{
CRYPT_ELGAMAL_PrvKey *newPrvKey = (CRYPT_ELGAMAL_PrvKey *)BSL_SAL_Malloc(sizeof(CRYPT_ELGAMAL_PrvKey));
if (newPrvKey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)memset_s(newPrvKey, sizeof(CRYPT_ELGAMAL_PrvKey), 0, sizeof(CRYPT_ELGAMAL_PrvKey));
GOTO_ERR_IF_SRC_NOT_NULL(newPrvKey->p, prvKey->p, BN_Dup(prvKey->p), CRYPT_MEM_ALLOC_FAIL);
GOTO_ERR_IF_SRC_NOT_NULL(newPrvKey->g, prvKey->g, BN_Dup(prvKey->g), CRYPT_MEM_ALLOC_FAIL);
GOTO_ERR_IF_SRC_NOT_NULL(newPrvKey->x, prvKey->x, BN_Dup(prvKey->x), CRYPT_MEM_ALLOC_FAIL);
return newPrvKey;
ERR:
ELGAMAL_FREE_PRV_KEY(newPrvKey);
return NULL;
}
static CRYPT_ELGAMAL_Para *ElGamalParaDupCtx(CRYPT_ELGAMAL_Para *para)
{
CRYPT_ELGAMAL_Para *newPara = (CRYPT_ELGAMAL_Para *)BSL_SAL_Malloc(sizeof(CRYPT_ELGAMAL_Para));
if (newPara == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)memset_s(newPara, sizeof(CRYPT_ELGAMAL_Para), 0, sizeof(CRYPT_ELGAMAL_Para));
newPara->bits = para->bits;
GOTO_ERR_IF_SRC_NOT_NULL(newPara->q, para->q, BN_Dup(para->q), CRYPT_MEM_ALLOC_FAIL);
return newPara;
ERR:
ELGAMAL_FREE_PARA(newPara);
return NULL;
}
CRYPT_ELGAMAL_Ctx *CRYPT_ELGAMAL_DupCtx(CRYPT_ELGAMAL_Ctx *keyCtx)
{
if (keyCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return NULL;
}
CRYPT_ELGAMAL_Ctx *newKeyCtx = BSL_SAL_Malloc(sizeof(CRYPT_ELGAMAL_Ctx));;
if (newKeyCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)memset_s(newKeyCtx, sizeof(CRYPT_ELGAMAL_Ctx), 0, sizeof(CRYPT_ELGAMAL_Ctx));
GOTO_ERR_IF_SRC_NOT_NULL(newKeyCtx->prvKey, keyCtx->prvKey, ElGamalPrvKeyDupCtx(keyCtx->prvKey),
CRYPT_MEM_ALLOC_FAIL);
GOTO_ERR_IF_SRC_NOT_NULL(newKeyCtx->pubKey, keyCtx->pubKey, ElGamalPubKeyDupCtx(keyCtx->pubKey),
CRYPT_MEM_ALLOC_FAIL);
GOTO_ERR_IF_SRC_NOT_NULL(newKeyCtx->para, keyCtx->para, ElGamalParaDupCtx(keyCtx->para), CRYPT_MEM_ALLOC_FAIL);
newKeyCtx->libCtx = keyCtx->libCtx;
BSL_SAL_ReferencesInit(&(newKeyCtx->references));
return newKeyCtx;
ERR:
CRYPT_ELGAMAL_FreeCtx(newKeyCtx);
return NULL;
}
static int32_t NewParaCheck(const CRYPT_ElGamalPara *para)
{
if (para == NULL || para->q == NULL || para->qLen == 0 ||
para->bits == 0 || para->k_bits == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->bits > ELGAMAL_MAX_MODULUS_BITS || para->k_bits > ELGAMAL_MAX_MODULUS_BITS) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
if (para->qLen != BN_BITS_TO_BYTES(para->k_bits)) {
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_KEY_KBITS);
return CRYPT_ELGAMAL_ERR_KEY_KBITS;
}
return CRYPT_SUCCESS;
}
CRYPT_ELGAMAL_Para *CRYPT_ELGAMAL_NewPara(const CRYPT_ElGamalPara *para)
{
if (NewParaCheck(para) != CRYPT_SUCCESS) {
return NULL;
}
CRYPT_ELGAMAL_Para *retPara = BSL_SAL_Malloc(sizeof(CRYPT_ELGAMAL_Para));
if (retPara == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
retPara->bits = para->bits;
retPara->k_bits = para->k_bits;
retPara->q = BN_Create(para->k_bits);
if (retPara->q == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
goto ERR;
}
return retPara;
ERR:
CRYPT_ELGAMAL_FreePara(retPara);
return NULL;
}
void CRYPT_ELGAMAL_FreeCtx(CRYPT_ELGAMAL_Ctx *ctx)
{
if (ctx == NULL) {
return;
}
int i = 0;
BSL_SAL_AtomicDownReferences(&(ctx->references), &i);
if (i > 0) {
return;
}
BSL_SAL_ReferencesFree(&(ctx->references));
ELGAMAL_FREE_PRV_KEY(ctx->prvKey);
ELGAMAL_FREE_PUB_KEY(ctx->pubKey);
ELGAMAL_FREE_PARA(ctx->para);
BSL_SAL_Free(ctx);
}
void CRYPT_ELGAMAL_FreePara(CRYPT_ELGAMAL_Para *para)
{
if (para == NULL) {
return;
}
BN_Destroy(para->q);
BSL_SAL_Free(para);
}
void ELGAMAL_FreePrvKey(CRYPT_ELGAMAL_PrvKey *prvKey)
{
if (prvKey == NULL) {
return;
}
BN_Destroy(prvKey->p);
BN_Destroy(prvKey->g);
BN_Destroy(prvKey->x);
BSL_SAL_Free(prvKey);
}
void ELGAMAL_FreePubKey(CRYPT_ELGAMAL_PubKey *pubKey)
{
if (pubKey == NULL) {
return;
}
BN_Destroy(pubKey->p);
BN_Destroy(pubKey->q);
BN_Destroy(pubKey->g);
BN_Destroy(pubKey->y);
BSL_SAL_Free(pubKey);
}
static int32_t IsELGAMALSetParaVaild(const CRYPT_ELGAMAL_Ctx *ctx, const CRYPT_ELGAMAL_Para *para)
{
if (ctx == NULL || para == NULL || para->q == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (para->bits > ELGAMAL_MAX_MODULUS_BITS || para->bits <= 0) {
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_KEY_BITS);
return CRYPT_ELGAMAL_ERR_KEY_BITS;
}
if (para->k_bits > ELGAMAL_MAX_MODULUS_BITS || para->k_bits <= 0) {
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_KEY_KBITS);
return CRYPT_ELGAMAL_ERR_KEY_KBITS;
}
if (para->bits <= para->k_bits) {
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_KEY_BITS_KBITS);
return CRYPT_ELGAMAL_ERR_KEY_BITS_KBITS;
}
return CRYPT_SUCCESS;
}
CRYPT_ELGAMAL_Para *CRYPT_ElGamal_DupPara(const CRYPT_ELGAMAL_Para *para)
{
CRYPT_ELGAMAL_Para *paraCopy = BSL_SAL_Malloc(sizeof(CRYPT_ELGAMAL_Para));
if (paraCopy == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
paraCopy->bits = para->bits;
paraCopy->k_bits = para->k_bits;
paraCopy->q = BN_Dup(para->q);
if (paraCopy->q == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
ELGAMAL_FREE_PARA(paraCopy);
return NULL;
}
return paraCopy;
}
int32_t CRYPT_ELGAMAL_SetPara(CRYPT_ELGAMAL_Ctx *ctx, const CRYPT_ElGamalPara *para)
{
if (ctx == NULL || para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_ELGAMAL_Para *elGamalPara = CRYPT_ELGAMAL_NewPara(para);
if (elGamalPara == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
int32_t ret = IsELGAMALSetParaVaild(ctx, elGamalPara);
if (ret != CRYPT_SUCCESS) {
CRYPT_ELGAMAL_FreePara(elGamalPara);
return ret;
}
ELGAMAL_FREE_PARA(ctx->para);
ELGAMAL_FREE_PUB_KEY(ctx->pubKey);
ELGAMAL_FREE_PRV_KEY(ctx->prvKey);
ctx->para = elGamalPara;
return CRYPT_SUCCESS;
}
#ifdef HITLS_BSL_PARAMS
int32_t CRYPT_ELGAMAL_SetParaEx(CRYPT_ELGAMAL_Ctx *ctx, const BSL_Param *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_ElGamalPara elGamalPara = {0};
uint32_t len = sizeof(uint32_t);
int32_t ret = 0;
(void)GetConstParamValue(para, CRYPT_PARAM_ELGAMAL_Q, &(elGamalPara.q), &(elGamalPara.qLen));
const BSL_Param *temp = BSL_PARAM_FindConstParam(para, CRYPT_PARAM_ELGAMAL_BITS);
if (temp != NULL) {
RETURN_RET_IF_ERR(BSL_PARAM_GetValue(temp, CRYPT_PARAM_ELGAMAL_BITS,
BSL_PARAM_TYPE_UINT32, &elGamalPara.bits, &len), ret);
}
temp = BSL_PARAM_FindConstParam(para, CRYPT_PARAM_ELGAMAL_KBITS);
if (temp != NULL) {
RETURN_RET_IF_ERR(BSL_PARAM_GetValue(temp, CRYPT_PARAM_ELGAMAL_KBITS,
BSL_PARAM_TYPE_UINT32, &elGamalPara.k_bits, &len), ret);
}
return CRYPT_ELGAMAL_SetPara(ctx, &elGamalPara);
}
#endif
uint32_t CRYPT_ELGAMAL_GetBits(const CRYPT_ELGAMAL_Ctx *ctx)
{
if (ctx == NULL) {
return 0;
}
if (ctx->para != NULL) {
return ctx->para->bits;
}
if (ctx->prvKey != NULL) {
return BN_Bits(ctx->prvKey->p);
}
if (ctx->pubKey != NULL) {
return BN_Bits(ctx->pubKey->p);
}
return 0;
}
uint32_t CRYPT_ELGAMAL_GetKBits(const CRYPT_ELGAMAL_Ctx *ctx)
{
if (ctx == NULL) {
return 0;
}
if (ctx->para != NULL) {
return ctx->para->k_bits;
}
return 0;
}
CRYPT_ELGAMAL_PrvKey *ElGamal_NewPrvKey(uint32_t bits)
{
CRYPT_ELGAMAL_PrvKey *prvKey = (CRYPT_ELGAMAL_PrvKey *)BSL_SAL_Malloc(sizeof(CRYPT_ELGAMAL_PrvKey));
if (prvKey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
prvKey->p = BN_Create(bits);
prvKey->g = BN_Create(bits);
prvKey->x = BN_Create(bits);
if (prvKey->p == NULL || prvKey->g == NULL || prvKey->x == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
ELGAMAL_FREE_PRV_KEY(prvKey);
}
return prvKey;
}
CRYPT_ELGAMAL_PubKey *ElGamal_NewPubKey(uint32_t bits)
{
CRYPT_ELGAMAL_PubKey *pubKey = (CRYPT_ELGAMAL_PubKey *)BSL_SAL_Malloc(sizeof(CRYPT_ELGAMAL_PubKey));
if (pubKey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
pubKey->p = BN_Create(bits);
pubKey->g = BN_Create(bits);
pubKey->y = BN_Create(bits);
pubKey->q = BN_Create(bits);
if (pubKey->p == NULL || pubKey->g == NULL || pubKey->y == NULL || pubKey->q == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
ELGAMAL_FREE_PUB_KEY(pubKey);
}
return pubKey;
}
static int32_t ElGamal_GenP(void *libCtx, BN_BigNum *p, CRYPT_ELGAMAL_Para *para, BN_Optimizer *optimizer)
{
uint32_t bits = para->bits;
uint32_t k_bits = para->k_bits;
BN_BigNum *k = BN_Create(bits - k_bits);
BN_BigNum *kq = BN_Create(bits);
int32_t ret = CRYPT_MEM_ALLOC_FAIL;
if (kq == NULL || k == NULL) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = BN_GenPrime(para->q, NULL, k_bits, false, optimizer, NULL);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = BN_RandEx(libCtx, k, (bits - k_bits), 1, 0);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = BN_Mul(kq, k, para->q, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = BN_AddLimb(p, kq, 1);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
EXIT:
BN_Destroy(k);
BN_Destroy(kq);
return ret;
}
static int32_t ElGamal_CalcPrvKey(void *libCtx, CRYPT_ELGAMAL_PrvKey *prvKey, CRYPT_ELGAMAL_Para *para,
BN_Optimizer *optimizer)
{
int32_t ret = CRYPT_SUCCESS;
BN_BigNum *xTop = BN_Create(para->bits);
if (xTop == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ret = ElGamal_GenP(libCtx, prvKey->p, para, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = OriginalRoot(libCtx, prvKey->g, prvKey->p, para->q, para->bits);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = BN_SubLimb(xTop, para->q, 1);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = BN_RandRangeEx(libCtx, prvKey->x, xTop);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
EXIT:
BN_Destroy(xTop);
return ret;
}
static int32_t ElGamal_CalcPubKey(CRYPT_ELGAMAL_PubKey *pubKey, CRYPT_ELGAMAL_PrvKey *prvKey, BN_Optimizer *optimizer)
{
int32_t ret = BN_Copy(pubKey->p, prvKey->p);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ret = BN_Copy(pubKey->g, prvKey->g);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ret = BN_ModExp(pubKey->y, pubKey->g, prvKey->x, pubKey->p, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
return ret;
}
int32_t CRYPT_ELGAMAL_Gen(CRYPT_ELGAMAL_Ctx *ctx)
{
if (ctx == NULL || ctx->para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
int32_t ret = CRYPT_MEM_ALLOC_FAIL;
BN_Optimizer *optimizer = NULL;
CRYPT_ELGAMAL_Ctx *newCtx = CRYPT_ELGAMAL_NewCtx();
if (newCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
newCtx->para = CRYPT_ElGamal_DupPara(ctx->para);
if (newCtx->para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
goto ERR;
}
newCtx->prvKey = ElGamal_NewPrvKey(newCtx->para->bits);
newCtx->pubKey = ElGamal_NewPubKey(newCtx->para->bits);
optimizer = BN_OptimizerCreate();
if (optimizer == NULL || newCtx->prvKey == NULL || newCtx->pubKey == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
BN_OptimizerSetLibCtx(ctx->libCtx, optimizer);
ret = ElGamal_GenP(ctx->libCtx, newCtx->prvKey->p, newCtx->para, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
ret = ElGamal_CalcPrvKey(ctx->libCtx, newCtx->prvKey, newCtx->para, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
ret = ElGamal_CalcPubKey(newCtx->pubKey, newCtx->prvKey, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
ELGAMAL_FREE_PARA(ctx->para);
ELGAMAL_FREE_PRV_KEY(ctx->prvKey);
ELGAMAL_FREE_PUB_KEY(ctx->pubKey);
BSL_SAL_ReferencesFree(&(newCtx->references));
ctx->prvKey = newCtx->prvKey;
ctx->pubKey = newCtx->pubKey;
ctx->para = newCtx->para;
BSL_SAL_FREE(newCtx);
BN_OptimizerDestroy(optimizer);
return ret;
ERR:
CRYPT_ELGAMAL_FreeCtx(newCtx);
BN_OptimizerDestroy(optimizer);
return ret;
}
#endif // HITLS_CRYPTO_ELGAMAL
|
2301_79861745/bench_create
|
crypto/elgamal/src/elgamal_keygen.c
|
C
|
unknown
| 16,119
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ELGAMAL
#include "crypt_types.h"
#include "crypt_elgamal.h"
#include "crypt_utils.h"
#include "bsl_err_internal.h"
#include "elgamal_local.h"
#include "crypt_errno.h"
#include "securec.h"
#include "bsl_sal.h"
#include "crypt_params_key.h"
#define PARAMISNULL(a) (a == NULL || a->value == NULL)
static int32_t SetPrvPara(const CRYPT_ELGAMAL_PrvKey *prvKey, const CRYPT_ElGamalPrv *prv)
{
int32_t ret = BN_Bin2Bn(prvKey->p, prv->p, prv->pLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
uint32_t bnBits = BN_Bits(prvKey->p);
if (bnBits > ELGAMAL_MAX_MODULUS_BITS || bnBits <= 0) {
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_KEY_BITS);
return CRYPT_ELGAMAL_ERR_KEY_BITS;
}
ret = BN_Bin2Bn(prvKey->g, prv->g, prv->gLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ret = BN_Bin2Bn(prvKey->x, prv->x, prv->xLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
return ret;
}
int32_t CRYPT_ELGAMAL_SetPrvKey(CRYPT_ELGAMAL_Ctx *ctx, const CRYPT_ElGamalPrv *prv)
{
if (ctx == NULL || prv == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (prv->p == NULL || prv->g == NULL || prv->x == NULL ||
prv->pLen == 0 || prv->gLen == 0 || prv->xLen == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_INPUT_VALUE);
return CRYPT_ELGAMAL_ERR_INPUT_VALUE;
}
int32_t ret = CRYPT_SUCCESS;
CRYPT_ELGAMAL_Ctx *newCtx = CRYPT_ELGAMAL_NewCtx();
if (newCtx == NULL) {
return CRYPT_MEM_ALLOC_FAIL;
}
newCtx->prvKey = ElGamal_NewPrvKey(prv->pLen * 8); // Bit length is obtained by multiplying byte length by 8.
if (newCtx->prvKey == NULL) {
ret = CRYPT_MEM_ALLOC_FAIL;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
ret = SetPrvPara(newCtx->prvKey, prv);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
ELGAMAL_FREE_PRV_KEY(ctx->prvKey);
ctx->prvKey = newCtx->prvKey;
BSL_SAL_ReferencesFree(&(newCtx->references));
BSL_SAL_FREE(newCtx);
return ret;
ERR:
CRYPT_ELGAMAL_FreeCtx(newCtx);
return ret;
}
int32_t CRYPT_ELGAMAL_SetPubKey(CRYPT_ELGAMAL_Ctx *ctx, const CRYPT_ElGamalPub *pub)
{
if (ctx == NULL || pub == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pub->p == NULL || pub->g == NULL || pub->y == NULL || pub->q == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
int32_t ret = CRYPT_SUCCESS;
CRYPT_ELGAMAL_PubKey *newPub = NULL;
/* Bit length is obtained by multiplying byte length by 8. */
newPub = ElGamal_NewPubKey(pub->pLen * 8);
if (newPub == NULL) {
return CRYPT_MEM_ALLOC_FAIL;
}
GOTO_ERR_IF(BN_Bin2Bn(newPub->p, pub->p, pub->pLen), ret);
uint32_t bnBits = BN_Bits(newPub->p);
if (bnBits > ELGAMAL_MAX_MODULUS_BITS || bnBits <= 0) {
ret = CRYPT_ELGAMAL_ERR_KEY_BITS;
BSL_ERR_PUSH_ERROR(ret);
goto ERR;
}
GOTO_ERR_IF(BN_Bin2Bn(newPub->g, pub->g, pub->gLen), ret);
GOTO_ERR_IF(BN_Bin2Bn(newPub->y, pub->y, pub->yLen), ret);
GOTO_ERR_IF(BN_Bin2Bn(newPub->q, pub->q, pub->qLen), ret);
ELGAMAL_FREE_PUB_KEY(ctx->pubKey);
ctx->pubKey = newPub;
return ret;
ERR:
ELGAMAL_FREE_PUB_KEY(newPub);
return ret;
}
int32_t CRYPT_ELGAMAL_GetPrvKey(const CRYPT_ELGAMAL_Ctx *ctx, CRYPT_ElGamalPrv *prv)
{
if (ctx == NULL || ctx->prvKey == NULL || prv == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (prv->x == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ELGAMAL_ERR_INPUT_VALUE);
return CRYPT_ELGAMAL_ERR_INPUT_VALUE;
}
int32_t ret = CRYPT_SUCCESS;
if (prv->p != NULL) {
GOTO_ERR_IF(BN_Bn2Bin(ctx->prvKey->p, prv->p, &(prv->pLen)), ret);
}
if (prv->g != NULL) {
GOTO_ERR_IF(BN_Bn2Bin(ctx->prvKey->g, prv->g, &(prv->gLen)), ret);
}
GOTO_ERR_IF(BN_Bn2Bin(ctx->prvKey->x, prv->x, &(prv->xLen)), ret);
return CRYPT_SUCCESS;
ERR:
BSL_SAL_CleanseData(prv->p, prv->pLen);
BSL_SAL_CleanseData(prv->g, prv->gLen);
BSL_SAL_CleanseData(prv->x, prv->xLen);
prv->pLen = 0;
prv->gLen = 0;
prv->xLen = 0;
return ret;
}
int32_t CRYPT_ELGAMAL_GetPubKey(const CRYPT_ELGAMAL_Ctx *ctx, CRYPT_ElGamalPub *pub)
{
if (ctx == NULL || ctx->pubKey == NULL || pub == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (pub->p == NULL || pub->g == NULL || pub->y == NULL || pub->q == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
int32_t ret;
GOTO_ERR_IF(BN_Bn2Bin(ctx->pubKey->g, pub->g, &(pub->gLen)), ret);
GOTO_ERR_IF(BN_Bn2Bin(ctx->pubKey->p, pub->p, &(pub->pLen)), ret);
GOTO_ERR_IF(BN_Bn2Bin(ctx->pubKey->q, pub->q, &(pub->qLen)), ret);
GOTO_ERR_IF(BN_Bn2Bin(ctx->pubKey->y, pub->y, &(pub->yLen)), ret);
return CRYPT_SUCCESS;
ERR:
BSL_SAL_CleanseData(pub->g, pub->gLen);
BSL_SAL_CleanseData(pub->p, pub->pLen);
BSL_SAL_CleanseData(pub->q, pub->qLen);
BSL_SAL_CleanseData(pub->y, pub->yLen);
pub->gLen = 0;
pub->pLen = 0;
pub->qLen = 0;
pub->yLen = 0;
return ret;
}
#ifdef HITLS_BSL_PARAMS
int32_t CRYPT_ELGAMAL_SetPrvKeyEx(CRYPT_ELGAMAL_Ctx *ctx, const BSL_Param *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_ElGamalPrv elGamalPara = {0};
(void)GetConstParamValue(para, CRYPT_PARAM_ELGAMAL_P, &(elGamalPara.p), &(elGamalPara.pLen));
(void)GetConstParamValue(para, CRYPT_PARAM_ELGAMAL_G, &(elGamalPara.g), &(elGamalPara.gLen));
(void)GetConstParamValue(para, CRYPT_PARAM_ELGAMAL_X, &(elGamalPara.x), &(elGamalPara.xLen));
return CRYPT_ELGAMAL_SetPrvKey(ctx, &elGamalPara);
}
int32_t CRYPT_ELGAMAL_SetPubKeyEx(CRYPT_ELGAMAL_Ctx *ctx, const BSL_Param *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_ElGamalPub elGamalPara = {0};
(void)GetConstParamValue(para, CRYPT_PARAM_ELGAMAL_P, &(elGamalPara.p), &(elGamalPara.pLen));
(void)GetConstParamValue(para, CRYPT_PARAM_ELGAMAL_G, &(elGamalPara.g), &(elGamalPara.gLen));
(void)GetConstParamValue(para, CRYPT_PARAM_ELGAMAL_Y, &(elGamalPara.y), &(elGamalPara.yLen));
(void)GetConstParamValue(para, CRYPT_PARAM_ELGAMAL_Q, &(elGamalPara.q), &(elGamalPara.qLen));
return CRYPT_ELGAMAL_SetPubKey(ctx, &elGamalPara);
}
int32_t CRYPT_ELGAMAL_GetPrvKeyEx(const CRYPT_ELGAMAL_Ctx *ctx, BSL_Param *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_ElGamalPrv prv = {0};
BSL_Param *paramP = GetParamValue(para, CRYPT_PARAM_ELGAMAL_P, &prv.p, &prv.pLen);
BSL_Param *paramG = GetParamValue(para, CRYPT_PARAM_ELGAMAL_G, &prv.g, &prv.gLen);
BSL_Param *paramX = GetParamValue(para, CRYPT_PARAM_ELGAMAL_X, &prv.x, &prv.xLen);
int32_t ret = CRYPT_ELGAMAL_GetPrvKey(ctx, &prv);
if (ret != CRYPT_SUCCESS) {
return ret;
}
if (paramP != NULL) {
paramP->useLen = prv.pLen;
}
if (paramG != NULL) {
paramG->useLen = prv.gLen;
}
paramX->useLen = prv.xLen;
return CRYPT_SUCCESS;
}
int32_t CRYPT_ELGAMAL_GetPubKeyEx(const CRYPT_ELGAMAL_Ctx *ctx, BSL_Param *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_ElGamalPub pub = {0};
BSL_Param *paramP = GetParamValue(para, CRYPT_PARAM_ELGAMAL_P, &pub.p, &pub.pLen);
BSL_Param *paramG = GetParamValue(para, CRYPT_PARAM_ELGAMAL_G, &pub.g, &pub.gLen);
BSL_Param *paramY = GetParamValue(para, CRYPT_PARAM_ELGAMAL_Y, &pub.y, &pub.yLen);
BSL_Param *paramQ = GetParamValue(para, CRYPT_PARAM_ELGAMAL_Q, &pub.q, &pub.qLen);
int32_t ret = CRYPT_ELGAMAL_GetPubKey(ctx, &pub);
if (ret != CRYPT_SUCCESS) {
return ret;
}
paramP->useLen = pub.pLen;
paramG->useLen = pub.gLen;
paramY->useLen = pub.yLen;
paramQ->useLen = pub.qLen;
return ret;
}
#endif
int32_t CRYPT_ELGAMAL_GetSecBits(const CRYPT_ELGAMAL_Ctx *ctx)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return 0;
}
int32_t bits = (int32_t)CRYPT_ELGAMAL_GetBits(ctx);
return BN_SecBits(bits, -1);
}
#endif /* HITLS_CRYPTO_ELGAMAL */
|
2301_79861745/bench_create
|
crypto/elgamal/src/elgamal_keyop.c
|
C
|
unknown
| 9,209
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef ELGAMAL_LOCAL_H
#define ELGAMAL_LOCAL_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ELGAMAL
#include "crypt_elgamal.h"
#include "crypt_bn.h"
#include "crypt_local_types.h"
#include "crypt_types.h"
#include "sal_atomic.h"
#ifdef __cplusplus
extern "C" {
#endif /* __cpluscplus */
typedef struct {
BN_BigNum *p; // prime factor p
BN_BigNum *g; // primitive root of p
BN_BigNum *y; // y = g^x (mod p)
BN_BigNum *q; // prime factor q
} CRYPT_ELGAMAL_PubKey;
typedef struct {
BN_BigNum *p; // prime factor p
BN_BigNum *g; // primitive root of g
BN_BigNum *x; // pub key x needed for decryption
} CRYPT_ELGAMAL_PrvKey;
struct ELGAMAL_Para {
BN_BigNum *q; // prime factor q
uint32_t k_bits; // security parameter k
uint32_t bits; // length in bits of modulus
};
struct ELGAMAL_Ctx {
CRYPT_ELGAMAL_PubKey *pubKey;
CRYPT_ELGAMAL_PrvKey *prvKey;
CRYPT_ELGAMAL_Para *para;
BSL_SAL_RefCount references;
void *libCtx;
};
CRYPT_ELGAMAL_PrvKey *ElGamal_NewPrvKey(uint32_t bits);
CRYPT_ELGAMAL_PubKey *ElGamal_NewPubKey(uint32_t bits);
void ELGAMAL_FreePrvKey(CRYPT_ELGAMAL_PrvKey *prvKey);
void ELGAMAL_FreePubKey(CRYPT_ELGAMAL_PubKey *pubKey);
CRYPT_ELGAMAL_Para *CRYPT_ElGamal_DupPara(const CRYPT_ELGAMAL_Para *para);
#define ELGAMAL_FREE_PRV_KEY(prvKey_) \
do { \
ELGAMAL_FreePrvKey((prvKey_)); \
(prvKey_) = NULL; \
} while (0)
#define ELGAMAL_FREE_PUB_KEY(pubKey_) \
do { \
ELGAMAL_FreePubKey((pubKey_)); \
(pubKey_) = NULL; \
} while (0)
#define ELGAMAL_FREE_PARA(para_) \
do { \
CRYPT_ELGAMAL_FreePara((para_)); \
(para_) = NULL; \
} while (0)
#ifdef __cplusplus
}
#endif
#endif // HITLS_CRYPTO_ELGAMAL
#endif // ELGAMAL_LOCAL_H
|
2301_79861745/bench_create
|
crypto/elgamal/src/elgamal_local.h
|
C
|
unknown
| 2,461
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ELGAMAL
#include <stdbool.h>
#include "securec.h"
#include "bsl_sal.h"
#include "bsl_err_internal.h"
#include "crypt_errno.h"
#include "crypt_elgamal.h"
#include "elgamal_local.h"
#include "crypt_utils.h"
#include "crypt_params_key.h"
int32_t OriginalRoot(void *libCtx, BN_BigNum *g, const BN_BigNum *p, const BN_BigNum *q, uint32_t bits)
{
if (g == NULL || p == NULL || q == NULL ) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
BN_Optimizer *optimizer = BN_OptimizerCreate();
if (optimizer == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
int32_t ret = CRYPT_MEM_ALLOC_FAIL;
BN_BigNum *x1 = BN_Create(bits);
BN_BigNum *x2 = BN_Create(bits);
BN_BigNum *xTop = BN_Create(bits);
if (x1 == NULL || x2 == NULL || xTop == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
goto EXIT;
}
ret = BN_SubLimb(xTop, p, 1);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
while (true) {
ret = BN_RandRangeEx(libCtx, g, xTop);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
ret = BN_ModSqr(x1, g, p, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
if (BN_IsOne(x1)) {
continue;
}
ret = BN_ModExp(x2, g, q, p, optimizer);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
goto EXIT;
}
if (!BN_IsOne(x2)) {
break;
}
}
EXIT:
BN_Destroy(xTop);
BN_Destroy(x2);
BN_Destroy(x1);
BN_OptimizerDestroy(optimizer);
return ret;
}
#endif /* HITLS_CRYPTO_ELGAMAL */
|
2301_79861745/bench_create
|
crypto/elgamal/src/originalroot.c
|
C
|
unknown
| 2,409
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_ENCODE_INTERNAL_H
#define CRYPT_ENCODE_INTERNAL_H
#include "hitls_build.h"
#include "bsl_types.h"
#include "bsl_asn1_internal.h"
#include "crypt_bn.h"
#include "crypt_eal_pkey.h"
#ifdef __cplusplus
extern "C" {
#endif /* __cpluscplus */
#if defined(HITLS_CRYPTO_SM2_SIGN) || defined(HITLS_CRYPTO_DSA) || defined(HITLS_CRYPTO_ECDSA)
/**
* Get the maximum length of the signature data.
*
* @param rLen [in] The length of r.
* @param sLen [in] The length of s.
* @param maxLen [out] The maximum length of the signature data.
* @return: CRYPT_SUCCESS: Success, other: Error.
*/
int32_t CRYPT_EAL_GetSignEncodeLen(uint32_t rLen, uint32_t sLen, uint32_t *maxLen);
/**
* Encode the signature data by big number.
*
* @param r [in] The r value.
* @param s [in] The s value.
* @param encode [out] The encoded data.
* @param encodeLen [out] The length of the encoded data.
* @return: CRYPT_SUCCESS: Success, other: Error.
*/
int32_t CRYPT_EAL_EncodeSign(const BN_BigNum *r, const BN_BigNum *s, uint8_t *encode, uint32_t *encodeLen);
/**
* Decode the signature data to big number.
*
* @param encode [in] The encoded data.
* @param encodeLen [in] The length of the encoded data.
* @param r [out] The r value.
* @param s [out] The s value.
* @return: CRYPT_SUCCESS: Success, other: Error.
*/
int32_t CRYPT_EAL_DecodeSign(const uint8_t *encode, uint32_t encodeLen, BN_BigNum *r, BN_BigNum *s);
#endif
#ifdef HITLS_CRYPTO_SM2_CRYPT
typedef struct {
uint8_t *x; // XCoordinate
uint8_t *y; // YCoordinate
uint8_t *hash; // HASH
uint8_t *cipher; // CipherText
uint32_t xLen;
uint32_t yLen;
uint32_t hashLen;
uint32_t cipherLen;
} CRYPT_SM2_EncryptData;
/**
* Get the length of the SM2 encoded data.
*
* @param xLen [in] The length of the x coordinate.
* @param yLen [in] The length of the y coordinate.
* @param hashLen [in] The length of the hash.
* @param dataLen [in] The length of the data.
* @param maxLen [out] The length of the SM2 encoded data.
* @return: CRYPT_SUCCESS: Success, other: Error.
*/
int32_t CRYPT_EAL_GetSm2EncryptDataEncodeLen(uint32_t xLen, uint32_t yLen, uint32_t hashLen, uint32_t dataLen,
uint32_t *maxLen);
/**
* Encode the SM2 encrypt data.
*
* @param data [in] The SM2 encrypt data.
* @param encode [out] The encoded data.
* @param encodeLen [out] The length of the encoded data.
* @return: CRYPT_SUCCESS: Success, other: Error.
*/
int32_t CRYPT_EAL_EncodeSm2EncryptData(const CRYPT_SM2_EncryptData *data, uint8_t *encode, uint32_t *encodeLen);
/**
* Decode the SM2 encrypt data.
*
* @param encode [in] The encoded data.
* @param encodeLen [in] The length of the encoded data.
* @param data [out] The SM2 encrypt data.
* @return: CRYPT_SUCCESS: Success, other: Error.
*/
int32_t CRYPT_EAL_DecodeSm2EncryptData(const uint8_t *encode, uint32_t encodeLen, CRYPT_SM2_EncryptData *data);
#endif
#ifdef __cplusplus
}
#endif
#endif // CRYPT_ENCODE_INTERNAL_H
|
2301_79861745/bench_create
|
crypto/encode/include/crypt_encode_internal.h
|
C
|
unknown
| 3,539
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_SM2_SIGN) || defined(HITLS_CRYPTO_DSA) || defined(HITLS_CRYPTO_ECDSA) || \
defined(HITLS_CRYPTO_SM2_CRYPT)
#include "securec.h"
#include "crypt_errno.h"
#include "bsl_err_internal.h"
#include "bsl_obj_internal.h"
#include "crypt_encode_internal.h"
#include "bsl_asn1_internal.h"
/**
* Common function to encode ASN.1 template and copy result
*/
static int32_t EncodeAsn1Template(BSL_ASN1_Template *templ, BSL_ASN1_Buffer *asnArr, uint32_t asnArrLen,
uint8_t *encode, uint32_t *encodeLen)
{
uint8_t *outBuf = NULL;
uint32_t outLen = 0;
int32_t ret = BSL_ASN1_EncodeTemplate(templ, asnArr, asnArrLen, &outBuf, &outLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
if (outLen > *encodeLen) {
BSL_SAL_Free(outBuf);
BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_BUFF_NOT_ENOUGH);
return CRYPT_ENCODE_BUFF_NOT_ENOUGH;
}
(void)memcpy_s(encode, *encodeLen, outBuf, outLen);
BSL_SAL_Free(outBuf);
*encodeLen = outLen;
return CRYPT_SUCCESS;
}
/**
* Common function to decode ASN.1 template and check remaining length
*/
static int32_t DecodeAsn1Template(const uint8_t *encode, uint32_t encodeLen, BSL_ASN1_Template *templ,
BSL_ASN1_Buffer *asnArr, uint32_t asnArrLen)
{
uint8_t *tmpEnc = (uint8_t *)(uintptr_t)encode;
uint32_t tmpEncLen = encodeLen;
int32_t ret = BSL_ASN1_DecodeTemplate(templ, NULL, &tmpEnc, &tmpEncLen, asnArr, asnArrLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
if (tmpEncLen != 0) {
BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ASN1_BUFF_FAILED);
return CRYPT_DECODE_ASN1_BUFF_FAILED;
}
for (uint32_t i = 0; i < asnArrLen; i++) {
if (asnArr[i].len == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_DECODE_ASN1_BUFF_LEN_ZERO);
return CRYPT_DECODE_ASN1_BUFF_LEN_ZERO;
}
}
return CRYPT_SUCCESS;
}
#if defined(HITLS_CRYPTO_SM2_SIGN) || defined(HITLS_CRYPTO_DSA) || defined(HITLS_CRYPTO_ECDSA)
int32_t CRYPT_EAL_GetSignEncodeLen(uint32_t rLen, uint32_t sLen, uint32_t *maxLen)
{
/**
* https://docs.microsoft.com/en-us/windows/win32/seccertenroll/about-integer
* If the integer is positive but the high order bit is set to 1,
* a leading 0x00 is added to the content to indicate that the number is not negative
*/
if (rLen == 0 || rLen > UINT32_MAX - 1 || sLen == 0 || sLen > UINT32_MAX - 1 || maxLen == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
uint32_t rEncodeLen = 0;
uint32_t sEncodeLen = 0;
int32_t ret = BSL_ASN1_GetEncodeLen(rLen + 1, &rEncodeLen); // + 1: if high bit is 1, should add a leading 0x00
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ret = BSL_ASN1_GetEncodeLen(sLen + 1, &sEncodeLen); // + 1: if high bit is 1, should add a leading 0x00
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
if (rEncodeLen > UINT32_MAX - sEncodeLen) {
BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_ERR_SIGN_LEN_OVERFLOW);
return CRYPT_ENCODE_ERR_SIGN_LEN_OVERFLOW;
}
ret = BSL_ASN1_GetEncodeLen(rEncodeLen + sEncodeLen, maxLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
return ret;
}
static BSL_ASN1_TemplateItem g_signTempl[] = {
{BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0},
{BSL_ASN1_TAG_INTEGER, 0, 1},
{BSL_ASN1_TAG_INTEGER, 0, 1},
};
static int32_t CheckSignBnParams(const BN_BigNum *r, const BN_BigNum *s, uint8_t *encode, uint32_t *encodeLen)
{
if (r == NULL || s == NULL || encode == NULL || encodeLen == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
// The big number must be non-negative.
if (BN_IsNegative(r) || BN_IsNegative(s)) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
// The big number must be non-zero.
if (BN_IsZero(r) || BN_IsZero(s)) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
return CRYPT_SUCCESS;
}
static int32_t ConvertBNToBuffer(const BN_BigNum *bn, uint8_t **outBuf, uint32_t *outLen)
{
uint32_t len = BN_Bytes(bn);
uint8_t *buf = (uint8_t *)BSL_SAL_Malloc(len);
if (buf == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
int32_t ret = BN_Bn2Bin(bn, buf, &len);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_Free(buf);
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
*outBuf = buf;
*outLen = len;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_EncodeSign(const BN_BigNum *r, const BN_BigNum *s, uint8_t *encode, uint32_t *encodeLen)
{
int32_t ret = CheckSignBnParams(r, s, encode, encodeLen);
if (ret != CRYPT_SUCCESS) {
return ret;
}
uint8_t *rBuf = NULL;
uint8_t *sBuf = NULL;
uint32_t rLen = 0;
uint32_t sLen = 0;
// Prepare the buffer for r.
ret = ConvertBNToBuffer(r, &rBuf, &rLen);
if (ret != CRYPT_SUCCESS) {
return ret; // no need to push err
}
// Prepare the buffer for s.
ret = ConvertBNToBuffer(s, &sBuf, &sLen);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_Free(rBuf);
return ret; // no need to push err
}
BSL_ASN1_Buffer asnArr[2] = {
{BSL_ASN1_TAG_INTEGER, rLen, rBuf},
{BSL_ASN1_TAG_INTEGER, sLen, sBuf}
};
BSL_ASN1_Template templ = {g_signTempl, sizeof(g_signTempl) / sizeof(g_signTempl[0])};
ret = EncodeAsn1Template(&templ, asnArr, 2, encode, encodeLen);
BSL_SAL_Free(rBuf);
BSL_SAL_Free(sBuf);
return ret;
}
int32_t CRYPT_EAL_DecodeSign(const uint8_t *encode, uint32_t encodeLen, BN_BigNum *r, BN_BigNum *s)
{
if (encode == NULL || encodeLen == 0 || r == NULL || s == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
// Decode ASN.1 sequence to get r and s components
BSL_ASN1_Buffer asnArr[2] = {0}; // 2: r and s
BSL_ASN1_Template templ = {g_signTempl, sizeof(g_signTempl) / sizeof(g_signTempl[0])};
int32_t ret = DecodeAsn1Template(encode, encodeLen, &templ, asnArr, 2); // 2: r and s
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
// Convert decoded buffers to big numbers
ret = BN_Bin2Bn(r, asnArr[0].buff, asnArr[0].len);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ret = BN_Bin2Bn(s, asnArr[1].buff, asnArr[1].len);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
return ret;
}
#endif
#ifdef HITLS_CRYPTO_SM2_CRYPT
int32_t CRYPT_EAL_GetSm2EncryptDataEncodeLen(uint32_t xLen, uint32_t yLen, uint32_t hashLen, uint32_t dataLen,
uint32_t *maxLen)
{
if (maxLen == NULL || xLen > UINT32_MAX - 1 || yLen > UINT32_MAX - 1) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
uint32_t xEncodeLen = 0;
uint32_t yEncodeLen = 0;
uint32_t hashEncodeLen = 0;
uint32_t cipherEncodeLen = 0;
int32_t ret = BSL_ASN1_GetEncodeLen(xLen + 1, &xEncodeLen); // + 1: if high bit is 1, should add a leading 0x00
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ret = BSL_ASN1_GetEncodeLen(yLen + 1, &yEncodeLen); // + 1: if high bit is 1, should add a leading 0x00
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ret = BSL_ASN1_GetEncodeLen(hashLen, &hashEncodeLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ret = BSL_ASN1_GetEncodeLen(dataLen, &cipherEncodeLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
if (xEncodeLen > UINT32_MAX - yEncodeLen ||
(xEncodeLen + yEncodeLen) > UINT32_MAX - hashEncodeLen ||
(xEncodeLen + yEncodeLen + hashEncodeLen) > UINT32_MAX - cipherEncodeLen) {
BSL_ERR_PUSH_ERROR(CRYPT_ENCODE_ERR_SM2_ENCRYPT_DATA_LEN_OVERFLOW);
return CRYPT_ENCODE_ERR_SM2_ENCRYPT_DATA_LEN_OVERFLOW;
}
// Calculate the total length of the encoded data
ret = BSL_ASN1_GetEncodeLen(xEncodeLen + yEncodeLen + hashEncodeLen + cipherEncodeLen, maxLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
return ret;
}
/**
* Reference: GM/T 0009-2012 7.2
* Define template for SM2 encryption data structure:
* SM2Cipher ::= SEQUENCE {
* XCoordinate INTEGER,
* YCoordinate INTEGER,
* HASH OCTET STRING SIZE(32),
* CipherText OCTET STRING
* }
*/
static BSL_ASN1_TemplateItem g_sm2EncryptTempl[] = {
{BSL_ASN1_TAG_CONSTRUCTED | BSL_ASN1_TAG_SEQUENCE, 0, 0},
{BSL_ASN1_TAG_INTEGER, 0, 1}, // x coordinate
{BSL_ASN1_TAG_INTEGER, 0, 1}, // y coordinate
{BSL_ASN1_TAG_OCTETSTRING, 0, 1}, // hash (c3)
{BSL_ASN1_TAG_OCTETSTRING, 0, 1} // ciphertext (c2)
};
#define SM2_ENCRYPT_DATA_ITEM_NUM 4
int32_t CheckSm2EncryptData(const CRYPT_SM2_EncryptData *data)
{
if (data == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
// Check x and y coordinate
if (data->x == NULL || data->xLen == 0 || data->y == NULL || data->yLen == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
// Check hash
if (data->hash == NULL || data->hashLen == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
// Check cipher
if (data->cipher == NULL || data->cipherLen == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_EncodeSm2EncryptData(const CRYPT_SM2_EncryptData *data, uint8_t *encode, uint32_t *encodeLen)
{
int32_t ret = CheckSm2EncryptData(data);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
if (encode == NULL || encodeLen == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
BSL_ASN1_Buffer asnArr[SM2_ENCRYPT_DATA_ITEM_NUM] = {
{BSL_ASN1_TAG_INTEGER, data->xLen, data->x}, // x coordinate
{BSL_ASN1_TAG_INTEGER, data->yLen, data->y}, // y coordinate
{BSL_ASN1_TAG_OCTETSTRING, data->hashLen, data->hash}, // hash
{BSL_ASN1_TAG_OCTETSTRING, data->cipherLen, data->cipher} // ciphertext
};
BSL_ASN1_Template templ = {g_sm2EncryptTempl, sizeof(g_sm2EncryptTempl) / sizeof(g_sm2EncryptTempl[0])};
return EncodeAsn1Template(&templ, asnArr, SM2_ENCRYPT_DATA_ITEM_NUM, encode, encodeLen);
}
int32_t CRYPT_EAL_DecodeSm2EncryptData(const uint8_t *encode, uint32_t encodeLen, CRYPT_SM2_EncryptData *data)
{
int32_t ret = CheckSm2EncryptData(data);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
if (encode == NULL || encodeLen == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
BSL_ASN1_Buffer asnArr[SM2_ENCRYPT_DATA_ITEM_NUM] = {0};
BSL_ASN1_Template templ = {g_sm2EncryptTempl, sizeof(g_sm2EncryptTempl) / sizeof(g_sm2EncryptTempl[0])};
ret = DecodeAsn1Template(encode, encodeLen, &templ, asnArr, SM2_ENCRYPT_DATA_ITEM_NUM);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
// Validate lengths
if (asnArr[0].len > data->xLen || asnArr[1].len > data->yLen ||
asnArr[2].len > data->hashLen || // 2: hash
asnArr[3].len > data->cipherLen) { // 3: cipher
BSL_ERR_PUSH_ERROR(CRYPT_DECODE_BUFF_NOT_ENOUGH);
return CRYPT_DECODE_BUFF_NOT_ENOUGH;
}
// 1: point xy
(void)memcpy_s(data->x + (data->xLen - asnArr[0].len), asnArr[0].len, asnArr[0].buff, asnArr[0].len);
(void)memcpy_s(data->y + (data->yLen - asnArr[1].len), asnArr[1].len, asnArr[1].buff, asnArr[1].len);
(void)memcpy_s(data->hash, data->hashLen, asnArr[2].buff, asnArr[2].len); // 2: hash
(void)memcpy_s(data->cipher, data->cipherLen, asnArr[3].buff, asnArr[3].len); // 3: cipher
data->hashLen = asnArr[2].len; // 2: hash
data->cipherLen = asnArr[3].len; // 3: cipher
return CRYPT_SUCCESS;
}
#endif // HITLS_CRYPTO_SM2_CRYPT
#endif
|
2301_79861745/bench_create
|
crypto/encode/src/crypt_encode.c
|
C
|
unknown
| 13,107
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_ENTROPY_H
#define CRYPT_ENTROPY_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ENTROPY
#include <stdint.h>
#include <stdbool.h>
#include "crypt_types.h"
#ifdef __cplusplus
extern "C" {
#endif
/**
* drbg1 drbg2 drbg3 drbgi
* * * * *
* * * * *
* * * * *
* *
* *
* get-entropy
* *
* parent-drbg
* *
* get-entropy
* *
* seed-pool
* *
* *
* * * * *
* * * * *
* * * * *
* hard-ES sys-ES hitls-ES ES(add-in)
* *
* entropy-pool
* *
* CF/LFST
* *
* *
* * * * *
* * * * *
* * * * *
* timestamp-NS jitter-NS interrup-NS NS(add-in)
*/
#ifdef HITLS_CRYPTO_ENTROPY_SYS
typedef struct ES_Entropy ENTROPY_EntropySource;
typedef struct {
uint32_t algId;
void *md;
} ENTROPY_CFPara;
/* Entropy source model APIs provided by HiTLS. */
/* Creating an entropy source. */
ENTROPY_EntropySource *ENTROPY_EsNew(void);
/* release entropy source. */
void ENTROPY_EsFree(ENTROPY_EntropySource *ctx);
/* Initialize Entropy Source. */
int32_t ENTROPY_EsInit(ENTROPY_EntropySource *ctx);
/* Deinitialize the entropy source. */
void ENTROPY_EsDeinit(ENTROPY_EntropySource *ctx);
/* Interface for Setting the Entropy Source. */
int32_t ENTROPY_EsCtrl(ENTROPY_EntropySource *ctx, int32_t cmd, void *data, uint32_t len);
/* Obtaining Entropy Data. */
uint32_t ENTROPY_EsEntropyGet(ENTROPY_EntropySource *ctx, uint8_t *data, uint32_t len);
/* Collect entropy data. */
int32_t ENTROPY_EsEntropyGather(ENTROPY_EntropySource *es);
#endif
typedef struct EntropySeedPool ENTROPY_SeedPool;
typedef uint32_t (*EntropyGet)(void *ctx, uint8_t *buf, uint32_t bufLen);
/* create seed-pool handles */
ENTROPY_SeedPool *ENTROPY_SeedPoolNew(bool isCreateNullPool);
/* Adding an entropy source */
int32_t ENTROPY_SeedPoolAddEs(ENTROPY_SeedPool *pool, const CRYPT_EAL_EsPara *para);
/* Interface for releasing the seed pool */
void ENTROPY_SeedPoolFree(ENTROPY_SeedPool *pool);
/* Interface for collecting entropy data */
uint32_t ENTROPY_SeedPoolCollect(ENTROPY_SeedPool *pool, bool isNpesUsed, uint32_t needEntropy,
uint8_t *data, uint32_t *len);
/* Check whether the seed pool contains physical or non-physical entropy sources. */
bool ENTROPY_SeedPoolCheckState(ENTROPY_SeedPool *seedPool, bool isNpesUsed);
/* Obtains the minimum entropy of the entropy source. */
uint32_t ENTROPY_SeedPoolGetMinEntropy(ENTROPY_SeedPool *seedPool);
typedef int32_t (*ExternalConditioningFunction)(uint32_t algId, uint8_t *in, uint32_t inLen, uint8_t *out,
uint32_t *outLen);
typedef struct EcfCtx {
uint32_t algId;
uint32_t outLen;
ExternalConditioningFunction conFunc;
} ENTROPY_ECFCtx;
/**
* @brief Obtain full entropy bits
*
* @param ctx[IN] ecfCtx
* @param pool[IN] seed pool
* @param isNpesUsed[IN] whether the npes is available
* @param needEntropy[IN] the amount of entropy required
* @param data[OUT] data
* @param len[IN] length
* @return Success: CRYPT_SUCCESS
*/
int32_t ENTROPY_GetFullEntropyInput(void *ctx, ENTROPY_SeedPool *pool, bool isNpesUsed, uint32_t needEntropy,
uint8_t *data, uint32_t len);
#ifdef __cplusplus
}
#endif
#endif // HITLS_CRYPTO_ENTROPY
#endif // CRYPT_ENTROPY_H
|
2301_79861745/bench_create
|
crypto/entropy/include/crypt_entropy.h
|
C
|
unknown
| 4,464
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ENTROPY
#include <stdint.h>
#include "securec.h"
#include "bsl_err_internal.h"
#include "bsl_sal.h"
#include "crypt_algid.h"
#include "crypt_errno.h"
#include "crypt_utils.h"
#include "crypt_entropy.h"
#define ECF_MAX_OUTPUT_LEN 64
#define ECF_ADDITION_ENTROPY 64 // reference nist-800 90c-3pd section 3.3.2
#define ECF_BYTE_TO_BIT 8
static int32_t EntropyEcf(ENTROPY_ECFCtx *enCtx, uint8_t *data, uint32_t dataLen, uint8_t *out, uint32_t *outLen)
{
uint8_t conData[ECF_MAX_OUTPUT_LEN] = {0};
uint32_t conLen = ECF_MAX_OUTPUT_LEN;
int32_t ret = enCtx->conFunc(enCtx->algId, data, dataLen, conData, &conLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
uint32_t cpLen = (conLen > *outLen) ? *outLen : conLen;
(void)memcpy_s(out, cpLen, conData, cpLen);
(void)memset_s(conData, conLen, 0, conLen);
*outLen = cpLen;
return CRYPT_SUCCESS;
}
int32_t ENTROPY_GetFullEntropyInput(void *ctx, ENTROPY_SeedPool *pool, bool isNpesUsed, uint32_t needEntropy,
uint8_t *data, uint32_t len)
{
int32_t ret = CRYPT_SUCCESS;
uint8_t *ptr = data;
if (ENTROPY_SeedPoolGetMinEntropy(pool) == 0) {
return CRYPT_INVALID_ARG;
}
ENTROPY_ECFCtx *enCtx = (ENTROPY_ECFCtx *)ctx;
if (enCtx == NULL || enCtx->conFunc == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ECF_IS_ERROR);
return CRYPT_ENTROPY_ECF_IS_ERROR;
}
uint32_t conEnt = enCtx->outLen * ECF_BYTE_TO_BIT;
uint32_t tmpEntropy = conEnt + ECF_ADDITION_ENTROPY;
uint32_t tmpDataLen = (tmpEntropy + ECF_BYTE_TO_BIT - 1) / ENTROPY_SeedPoolGetMinEntropy(pool);
uint8_t *tmpData = BSL_SAL_Malloc(tmpDataLen);
if (tmpData == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
uint32_t remEnt = needEntropy;
uint32_t remLen = len;
while (remEnt > 0) {
uint32_t tmpLen = tmpDataLen;
uint32_t oneEnt = (remEnt < conEnt) ? remEnt : conEnt;
uint32_t entropy = ENTROPY_SeedPoolCollect(pool, isNpesUsed, oneEnt, tmpData, &tmpLen);
if (entropy < oneEnt) {
GOTO_ERR_IF(CRYPT_SEED_POOL_NOT_MEET_REQUIREMENT, ret);
}
uint32_t cpLen;
/* If the data of the length specified by tmpLen can be provided, the value is the full entropy (tmpLen * 8). */
if (tmpLen * ECF_BYTE_TO_BIT == entropy) {
cpLen = tmpLen < remLen ? tmpLen : remLen;
(void)memcpy_s(ptr, remLen, tmpData, cpLen);
remEnt -= ((entropy > remEnt) ? remEnt : entropy);
} else {
uint32_t leftLen = tmpDataLen - tmpLen;
uint32_t leftEnt = ENTROPY_SeedPoolCollect(pool, isNpesUsed, tmpEntropy - entropy, tmpData + tmpLen,
&leftLen);
if (leftEnt < tmpEntropy - entropy) {
GOTO_ERR_IF(CRYPT_SEED_POOL_NOT_MEET_REQUIREMENT, ret);
}
cpLen = remLen;
GOTO_ERR_IF(EntropyEcf(ctx, tmpData, tmpLen + leftLen, ptr, &cpLen), ret);
remEnt -= (remEnt < conEnt ? remEnt : conEnt);
}
ptr += cpLen;
remLen -= cpLen;
}
if (remLen > 0) {
uint32_t leftLen = remLen;
uint32_t entropy = ENTROPY_SeedPoolCollect(pool, true, 0, ptr, &leftLen);
if (entropy == 0 || leftLen < remLen) {
GOTO_ERR_IF(CRYPT_SEED_POOL_NOT_MEET_REQUIREMENT, ret);
}
}
ERR:
(void)memset_s(tmpData, tmpDataLen, 0, tmpDataLen);
BSL_SAL_FREE(tmpData);
return ret;
}
#endif /* HITLS_CRYPTO_ENTROPY */
|
2301_79861745/bench_create
|
crypto/entropy/src/entropy.c
|
C
|
unknown
| 4,153
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ENTROPY
#include <stdint.h>
#include "securec.h"
#include "crypt_utils.h"
#include "entropy_seed_pool.h"
#ifdef HITLS_CRYPTO_ENTROPY_HARDWARE
#if defined(__x86_64__) || defined(__aarch64__)
/* For clarity */
#define DRNG_NO_SUPPORT 0x0
#define DRNG_HAS_RDRAND 0x1
#define DRNG_HAS_RDSEED 0x2
#define RDRAND_MAX_RETRIES 20
static uint32_t HWRandBytes(uint8_t *buf, uint32_t len, int32_t (*rand)(uint64_t *), uint32_t retries)
{
uint32_t left = len;
while (left != 0) {
uint32_t cnt = 0;
uint64_t randVal = 0;
while (cnt < retries) {
if (rand(&randVal) == 1) {
break;
}
cnt++;
}
if (cnt == retries) {
// high probability that it wouldn't be here
return len - left;
}
uint32_t cpLen = left < sizeof(randVal) ? left : sizeof(randVal);
(void)memcpy_s(buf + len - left, left, (uint8_t *)&randVal, cpLen);
left -= cpLen;
}
return len;
}
#ifdef __x86_64__
#include <cpuid.h>
/**
* Using Intel/AMD cpu's instructions to get hardware random value.
*
* references:
* https://crypto.stackexchange.com/questions/42340/usage-difference-between-x86-rdrand-and-rdseed
*
* https://www.intel.com/content/www/us/en/developer/articles/guide/intel-
* digital-random-number-generator-drng-software-implementation-guide.html
*/
/**
* If the return value is 1, the variable passed by reference will be populated with a usable random value.
* If the return value is 0, the caller understands that the value assigned to the variable is not usable.
*/
static int32_t Rdrand64(uint64_t *rand)
{
uint8_t ok = 0;
asm volatile("rdrand %0; setc %1" : "=r"(*rand), "=qm"(ok));
return (int32_t)ok;
}
/**
* return value of "Rdseed64" is same to "Rdrand64".
*/
static int32_t Rdseed64(uint64_t *seed)
{
uint8_t ok = 0;
asm volatile("rdseed %0; setc %1" : "=r"(*seed), "=qm"(ok));
return (int32_t)ok;
}
#define RAND_BYTES(buf, len) HWRandBytes(buf, len, Rdrand64, RDRAND_MAX_RETRIES)
#define SEED_BYTES(buf, len) HWRandBytes(buf, len, Rdseed64, RDRAND_MAX_RETRIES)
static uint32_t GetDrbgSupport()
{
static uint32_t drngCap = 0xffffffff;
if (drngCap == 0xffffffff) {
drngCap = DRNG_NO_SUPPORT;
uint32_t cpuid[CPU_ID_OUT_U32_CNT];
GetCpuId(0x1, 0, cpuid);
if (cpuid[ECX_OUT_IDX] & bit_RDRND) {
drngCap |= DRNG_HAS_RDRAND;
}
(void)memset_s(cpuid, sizeof(cpuid), 0, sizeof(cpuid));
GetCpuId(0x7, 0, cpuid);
if (cpuid[EBX_OUT_IDX] & bit_RDSEED) {
drngCap |= DRNG_HAS_RDSEED;
}
}
return drngCap;
}
uint32_t ENTROPY_HWEntropyGet(void *ctx, uint8_t *buf, uint32_t bufLen)
{
(void)ctx;
uint32_t drngCap = GetDrbgSupport();
if (drngCap & DRNG_HAS_RDSEED) {
return SEED_BYTES(buf, bufLen);
} else if (drngCap & DRNG_HAS_RDRAND) {
return RAND_BYTES(buf, bufLen);
} else {
return 0;
}
}
#endif
#ifdef __aarch64__
#include <sys/auxv.h>
#include "crypt_arm.h"
static uint32_t GetDrbgSupport()
{
static uint32_t drngCap = 0xffffffff;
if (drngCap == 0xffffffff) {
drngCap = DRNG_NO_SUPPORT;
if (getauxval(CRYPT_CAP2) & CRYPT_ARM_CAP2_RNG) {
drngCap |= (DRNG_HAS_RDRAND | DRNG_HAS_RDSEED);
}
}
return drngCap;
}
// https://developer.arm.com/documentation/ddi0601/2024-12/AArch64-Registers/RNDR--Random-Number
static int32_t Rndr64(uint64_t *rand)
{
uint8_t ok = 0;
asm volatile("mrs %0, s3_3_c2_c4_0; cset %w1, ne;" : "=r"(*rand), "=r"(ok));
return (int32_t)ok;
}
// https://developer.arm.com/documentation/ddi0601/2024-12/AArch64-Registers/RNDRRS--Random-Number-Full-Entropy
static int32_t Rndrrs64(uint64_t *seed)
{
uint8_t ok = 0;
asm volatile("mrs %0, s3_3_c2_c4_1; cset %w1, ne;" : "=r"(*seed), "=r"(ok));
return (int32_t)ok;
}
#define RAND_BYTES(buf, len) HWRandBytes(buf, len, Rndr64, RDRAND_MAX_RETRIES)
#define SEED_BYTES(buf, len) HWRandBytes(buf, len, Rndrrs64, RDRAND_MAX_RETRIES)
uint32_t ENTROPY_HWEntropyGet(void *ctx, uint8_t *buf, uint32_t bufLen)
{
(void)ctx;
uint32_t drngCap = GetDrbgSupport();
if (drngCap & DRNG_HAS_RDSEED) {
uint32_t len = SEED_BYTES(buf, bufLen);
if (bufLen - len > 0) {
len += RAND_BYTES(buf + len, bufLen - len);
}
return len;
} else {
return 0;
}
}
#endif
#else
uint32_t ENTROPY_HWEntropyGet(void *ctx, uint8_t *buf, uint32_t bufLen)
{
(void)ctx;
(void)buf;
(void)bufLen;
return 0;
}
#endif
#else
uint32_t ENTROPY_HWEntropyGet(void *ctx, uint8_t *buf, uint32_t bufLen)
{
(void)ctx;
(void)buf;
(void)bufLen;
return 0;
}
#endif
#endif
|
2301_79861745/bench_create
|
crypto/entropy/src/entropy_hardware.c
|
C
|
unknown
| 5,586
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ENTROPY
#include <stdint.h>
#include "securec.h"
#include "bsl_err_internal.h"
#include "crypt_errno.h"
#include "entropy_seed_pool.h"
#define SEEDPOOL_ES_MAX_SIZE 16
#define SEEDPOOL_ES_INIT_MINENTROPY 9
#define SEEDPOOL_ES_FULL_MINENTROPY 8
#define SEEDPOOL_ES_SYS_MINENTROPY 7
ENTROPY_SeedPool *ENTROPY_SeedPoolNew(bool isCreateNullPool)
{
ENTROPY_SeedPool *poolCtx = BSL_SAL_Malloc(sizeof(ENTROPY_SeedPool));
if (poolCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)memset_s(poolCtx, sizeof(ENTROPY_SeedPool), 0, sizeof(ENTROPY_SeedPool));
poolCtx->esList = BSL_LIST_New(sizeof(ENTROPY_Source));
if (poolCtx->esList == NULL) {
BSL_SAL_Free(poolCtx);
BSL_ERR_PUSH_ERROR(BSL_LIST_MALLOC_FAIL);
return NULL;
}
poolCtx->minEntropy = SEEDPOOL_ES_INIT_MINENTROPY;
if (isCreateNullPool) {
return poolCtx;
}
CRYPT_EAL_EsPara para = {false, SEEDPOOL_ES_SYS_MINENTROPY, NULL, ENTROPY_SysEntropyGet};
int32_t ret = ENTROPY_SeedPoolAddEs(poolCtx, ¶);
if (ret != CRYPT_SUCCESS) {
ENTROPY_SeedPoolFree(poolCtx);
BSL_ERR_PUSH_ERROR(ret);
return NULL;
}
CRYPT_EAL_EsPara hwPara = {true, SEEDPOOL_ES_FULL_MINENTROPY, NULL, ENTROPY_HWEntropyGet};
ret = ENTROPY_SeedPoolAddEs(poolCtx, &hwPara);
if (ret != CRYPT_SUCCESS) {
ENTROPY_SeedPoolFree(poolCtx);
BSL_ERR_PUSH_ERROR(ret);
return NULL;
}
return poolCtx;
}
static ENTROPY_Source *SeedPoolEsNew(const CRYPT_EAL_EsPara *para)
{
ENTROPY_Source *es = BSL_SAL_Malloc(sizeof(ENTROPY_Source));
if (es == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
es->isPhysical = para->isPhysical;
es->minEntropy = para->minEntropy;
es->ctx = para->entropyCtx;
es->entropyGet = (EntropyGet)(para->entropyGet);
return es;
}
int32_t ENTROPY_SeedPoolAddEs(ENTROPY_SeedPool *pool, const CRYPT_EAL_EsPara *para)
{
if (pool == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (BSL_LIST_COUNT(pool->esList) >= SEEDPOOL_ES_MAX_SIZE) {
BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_ES_LIST_FULL);
return CRYPT_SEED_POOL_ES_LIST_FULL;
}
ENTROPY_Source *es = SeedPoolEsNew(para);
if (es == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_NEW_ERROR);
return CRYPT_SEED_POOL_NEW_ERROR;
}
/*
* The header insertion method is used to add an entropy source to ensure that the entropy source added by the
* invoker is used first when the entropy data is obtained.
*/
int32_t ret = BSL_LIST_AddElement(pool->esList, es, BSL_LIST_POS_BEFORE);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_Free(es);
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
pool->minEntropy = (pool->minEntropy < para->minEntropy) ? pool->minEntropy : para->minEntropy;
pool->isContainFes = pool->isContainFes || (para->minEntropy == SEEDPOOL_ES_FULL_MINENTROPY);
pool->isContainPes = pool->isContainPes || para->isPhysical;
return CRYPT_SUCCESS;
}
void ENTROPY_SeedPoolFree(ENTROPY_SeedPool *pool)
{
if (pool == NULL) {
return;
}
if (pool->esList != NULL) {
BSL_LIST_FREE(pool->esList, BSL_SAL_Free);
}
BSL_SAL_Free(pool);
return;
}
static uint32_t GetMinLen(uint32_t needEntropy, uint32_t currEntropy, uint32_t minEntropy, uint32_t bufLen)
{
if (needEntropy == 0) {
return bufLen;
}
uint32_t len =
(uint32_t)(((uint64_t)(needEntropy - currEntropy) + (uint64_t)minEntropy - 1) / (uint64_t)minEntropy);
return bufLen >= len ? len : bufLen;
}
uint32_t ENTROPY_SeedPoolCollect(ENTROPY_SeedPool *pool, bool isNpesUsed, uint32_t needEntropy, uint8_t *data,
uint32_t *len)
{
if (data == NULL || len == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return 0;
}
if (!ENTROPY_SeedPoolCheckState(pool, isNpesUsed)) {
BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_STATE_ERROR);
return 0;
}
uint32_t bufLen = *len;
uint8_t *buf = data;
uint32_t curEntropy = 0;
for (ENTROPY_Source *es = BSL_LIST_GET_FIRST(pool->esList); es != NULL; es = BSL_LIST_GET_NEXT(pool->esList)) {
if (!isNpesUsed && !es->isPhysical) {
continue;
}
uint32_t tmpLen = GetMinLen(needEntropy, curEntropy, es->minEntropy, bufLen);
uint32_t readLen = es->entropyGet(es->ctx, buf, tmpLen);
if (readLen > 0) {
bufLen -= readLen;
buf += readLen;
curEntropy += es->minEntropy * readLen;
}
bool flag = (needEntropy == 0) ? (bufLen == 0) : (curEntropy >= needEntropy);
if (flag) {
break;
}
}
*len = buf - data;
return curEntropy;
}
bool ENTROPY_SeedPoolCheckState(ENTROPY_SeedPool *seedPool, bool isNpesUsed)
{
if (seedPool == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return false;
}
if (BSL_LIST_COUNT(seedPool->esList) == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_NO_ENTROPY_SOURCE);
return false;
}
if (!isNpesUsed && !seedPool->isContainPes) {
BSL_ERR_PUSH_ERROR(CRYPT_SEED_POOL_NO_ENTROPY_SOURCE);
return false;
}
return true;
}
uint32_t ENTROPY_SeedPoolGetMinEntropy(ENTROPY_SeedPool *seedPool)
{
if (seedPool == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return 0;
}
return seedPool->minEntropy;
}
#endif
|
2301_79861745/bench_create
|
crypto/entropy/src/entropy_seed_pool.c
|
C
|
unknown
| 6,326
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef ENTROPY_SEED_POOL_H
#define ENTROPY_SEED_POOL_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ENTROPY
#include <stdint.h>
#include "crypt_entropy.h"
#include "bsl_list.h"
#ifdef __cplusplus
extern "C" {
#endif
typedef struct {
bool isPhysical;
uint32_t minEntropy;
void *ctx;
EntropyGet entropyGet;
} ENTROPY_Source;
struct EntropySeedPool {
bool isContainFes;
bool isContainPes;
uint32_t minEntropy;
BslList *esList;
};
uint32_t ENTROPY_HWEntropyGet(void *ctx, uint8_t *buf, uint32_t bufLen);
uint32_t ENTROPY_SysEntropyGet(void *ctx, uint8_t *buf, uint32_t bufLen);
#ifdef __cplusplus
}
#endif
#endif
#endif
|
2301_79861745/bench_create
|
crypto/entropy/src/entropy_seed_pool.h
|
C
|
unknown
| 1,253
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ENTROPY
#include <stdint.h>
#include <unistd.h>
#ifdef HITLS_CRYPTO_ENTROPY_GETENTROPY
#include <sys/random.h>
#endif
#ifdef HITLS_CRYPTO_ENTROPY_DEVRANDOM
#include <fcntl.h>
#include <errno.h>
#endif
#include "securec.h"
#include "bsl_err_internal.h"
#include "crypt_errno.h"
#include "entropy_seed_pool.h"
uint32_t ENTROPY_SysEntropyGet(void *ctx, uint8_t *buf, uint32_t bufLen)
{
(void)ctx;
#if defined(HITLS_CRYPTO_ENTROPY_GETENTROPY) || defined(HITLS_CRYPTO_ENTROPY_DEVRANDOM)
uint32_t res = 0;
#if defined(HITLS_CRYPTO_ENTROPY_GETENTROPY)
if (getentropy(buf, bufLen) == 0) {
return bufLen;
}
#endif
#if defined(HITLS_CRYPTO_ENTROPY_DEVRANDOM)
int32_t fd = open("/dev/random", O_RDONLY);
if (fd == -1) {
BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_ENTROPY);
return 0;
}
uint32_t left = bufLen;
uint8_t *tmp = buf;
do {
int32_t count = (int32_t)read(fd, tmp, left);
if (count == -1 && errno == EINTR) {
continue;
} else if (count == -1) {
break;
}
left -= (uint32_t)count;
tmp += (uint32_t)count;
} while (left > 0);
close(fd);
if (left > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_ENTROPY);
}
res = bufLen - left;
#endif
return res;
#else
(void)buf;
(void)bufLen;
BSL_ERR_PUSH_ERROR(CRYPT_DRBG_FAIL_GET_ENTROPY);
return 0;
#endif
}
#endif
|
2301_79861745/bench_create
|
crypto/entropy/src/entropy_system.c
|
C
|
unknown
| 2,098
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_ENTROPY) && defined(HITLS_CRYPTO_ENTROPY_SYS)
#include <stdint.h>
#include "crypt_errno.h"
#include "bsl_err_internal.h"
#include "es_cf.h"
ES_CfMethod *ES_CFGetMethod(uint32_t algId, void *md)
{
switch (algId) {
case CRYPT_MD_SM3:
case CRYPT_MD_SHA256:
case CRYPT_MD_SHA224:
case CRYPT_MD_SHA384:
case CRYPT_MD_SHA512:
return ES_CFGetDfMethod((EAL_MdMethod *)md);
default:
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ECF_ALG_ERROR);
return NULL;
}
}
#endif
|
2301_79861745/bench_create
|
crypto/entropy/src/es_cf.c
|
C
|
unknown
| 1,171
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef ES_CF_H
#define ES_CF_H
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_ENTROPY) && defined(HITLS_CRYPTO_ENTROPY_SYS)
#include <stdint.h>
#include "crypt_local_types.h"
#ifdef __cplusplus
extern "C" {
#endif
typedef struct {
uint32_t algId;
union {
EAL_MdMethod mdMeth;
EAL_SymMethod ciMeth;
EAL_MacMethod macMeth;
} meth;
uint8_t *ctx;
/* Conditioning function initialization. */
void *(*init)(void *mdMeth);
/* Conditioning Function Conditioning Raw Entropy Output. */
int32_t (*update)(void *ctx, uint8_t *data, uint32_t dataLen);
/* Deinitialize the conditioning function. */
void (*deinit)(void *ctx);
/* Output length of each conditioning function. */
uint32_t (*getCfOutLen)(void *ctx);
/* Obtaining the Entropy Data After Conditioning. */
uint8_t *(*getEntropyData)(void *ctx, uint32_t *len);
/* Obtains the entropy required for full entropy output. */
uint32_t (*getNeedEntropy)(void *ctx);
} ES_CfMethod;
ES_CfMethod *ES_CFGetMethod(uint32_t algId, void *md);
ES_CfMethod *ES_CFGetDfMethod(EAL_MdMethod *mdMeth);
#ifdef __cplusplus
}
#endif
#endif
#endif
|
2301_79861745/bench_create
|
crypto/entropy/src/es_cf.h
|
C
|
unknown
| 1,773
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_ENTROPY) && defined(HITLS_CRYPTO_ENTROPY_SYS)
#include <stdint.h>
#include "securec.h"
#include "bsl_err_internal.h"
#include "bsl_sal.h"
#include "crypt_local_types.h"
#include "crypt_errno.h"
#include "es_cf.h"
/*
* see FIPS 140-3 section Full Entropy
* To receive full entropy from the output of a conditioning component, the following criteria must be met:
* The conditioning component shall be vetted,
* ℎin shall be greater than or equal to 𝑛𝑛out + 64 bits,
* 𝑛𝑛out shall be less than or equal to the security strength of the cryptographic function used as the
* conditioning component.
*/
#define CF_FE_EXLEN 64
#define CF_BYTE_TO_BIT 8
typedef struct {
void *ctx; // Hash algorithm handle
EAL_MdMethod meth; // Hash algorithm operation function
} ES_CfDfCtx;
static void ES_CfDfDeinit(void *ctx)
{
ES_CfDfCtx *cfCtx = (ES_CfDfCtx *)ctx;
if (cfCtx == NULL) {
return;
}
if (cfCtx->ctx != NULL) {
cfCtx->meth.freeCtx(cfCtx->ctx);
}
BSL_SAL_Free(cfCtx);
return;
}
static void *ES_CfDfInit(void *mdMeth)
{
ES_CfDfCtx *ctx = BSL_SAL_Malloc(sizeof(ES_CfDfCtx));
EAL_MdMethod *meth = (EAL_MdMethod *)mdMeth;
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)memcpy_s(&ctx->meth, sizeof(EAL_MdMethod), meth, sizeof(EAL_MdMethod));
ctx->ctx = meth->newCtx(NULL, meth->id);
if (ctx->ctx == NULL) {
BSL_SAL_Free(ctx);
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
int32_t ret = meth->init(ctx->ctx, NULL);
if (ret != CRYPT_SUCCESS) {
ES_CfDfDeinit(ctx);
BSL_ERR_PUSH_ERROR(ret);
return NULL;
}
return ctx;
}
static void DfI32ToByte(uint8_t values[4], uint32_t len)
{
values[0] = (uint8_t)(((len << 3) >> 24) & 0xff); /* leftward by 3, rightwards by 24 */
values[1] = (uint8_t)(((len << 3) >> 16) & 0xff); /* leftward by 3, rightwards by 16 */
values[2] = (uint8_t)(((len << 3) >> 8) & 0xff); /* leftward by 3, rightwards by 8 */
values[3] = (uint8_t)((len << 3) & 0xff); /* leftward by 3 */
return;
}
static int32_t ES_CfDfUpdateData(void *ctx, uint8_t *data, uint32_t dataLen)
{
ES_CfDfCtx *cfCtx = (ES_CfDfCtx *)ctx;
uint8_t tmp[1] = { 0x01};
int32_t ret = cfCtx->meth.update(cfCtx->ctx, tmp, 1);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
uint8_t values[4] = {0}; // 4 is sizeof(uint32_t)
DfI32ToByte(values, cfCtx->meth.mdSize);
ret = cfCtx->meth.update(cfCtx->ctx, values, sizeof(values));
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ret = cfCtx->meth.update(cfCtx->ctx, data, dataLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
return ret;
}
static uint8_t *ES_CfDfGetEntropyData(void *cfCtx, uint32_t *len)
{
ES_CfDfCtx *ctx = (ES_CfDfCtx *)cfCtx;
uint32_t bufLen = ctx->meth.mdSize;
uint8_t *buf = BSL_SAL_Malloc(bufLen);
if (buf == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
int32_t ret = ctx->meth.final(ctx->ctx, buf, &bufLen);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_Free(buf);
BSL_ERR_PUSH_ERROR(ret);
return NULL;
}
ctx->meth.deinit(ctx->ctx);
ret = ctx->meth.init(ctx->ctx, NULL);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_Free(buf);
BSL_ERR_PUSH_ERROR(ret);
return NULL;
}
*len = bufLen;
return buf;
}
static uint32_t ES_CfDfGetCfOutLen(void *cfCtx)
{
ES_CfDfCtx *ctx = (ES_CfDfCtx *)cfCtx;
return ctx->meth.mdSize;
}
static uint32_t ES_CfDfGetNeedEntropy(void *cfCtx)
{
ES_CfDfCtx *ctx = (ES_CfDfCtx *)cfCtx;
return ctx->meth.mdSize * CF_BYTE_TO_BIT + CF_FE_EXLEN;
}
ES_CfMethod *ES_CFGetDfMethod(EAL_MdMethod *mdMeth)
{
ES_CfMethod *meth = BSL_SAL_Malloc(sizeof(ES_CfMethod));
if (meth == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
meth->ctx = NULL;
meth->meth.mdMeth = *mdMeth;
meth->init = ES_CfDfInit;
meth->update = ES_CfDfUpdateData;
meth->deinit = ES_CfDfDeinit;
meth->getCfOutLen = ES_CfDfGetCfOutLen;
meth->getEntropyData = ES_CfDfGetEntropyData;
meth->getNeedEntropy = ES_CfDfGetNeedEntropy;
return meth;
}
#endif
|
2301_79861745/bench_create
|
crypto/entropy/src/es_cf_df.c
|
C
|
unknown
| 5,155
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_ENTROPY) && defined(HITLS_CRYPTO_ENTROPY_SYS)
#include <stdint.h>
#include "securec.h"
#include "bsl_err_internal.h"
#include "bsl_list.h"
#include "crypt_errno.h"
#include "crypt_entropy.h"
#include "crypt_eal_entropy.h"
#include "es_entropy_pool.h"
#include "es_cf.h"
#include "es_noise_source.h"
struct ES_Entropy {
bool isWork; // Whether in working state
bool enableTest; // Whether to enable the health test
uint32_t poolSize; // Entropy pool size
ES_EntropyPool *pool; // Entropy pool
ES_CfMethod *cfMeth; // compression function handle
BslList *nsList;
CRYPT_EAL_EsLogFunc runLog;
};
#define ENTROPY_POOL_SIZE_DEFAULT 4096
#define ENTROPY_POOL_SIZE_MIN 512
#define ENTROPY_POOL_SIZE_MAX 4096
ENTROPY_EntropySource *ENTROPY_EsNew(void)
{
ENTROPY_EntropySource *es = BSL_SAL_Malloc(sizeof(ENTROPY_EntropySource));
if (es == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)memset_s(es, sizeof(ENTROPY_EntropySource), 0, sizeof(ENTROPY_EntropySource));
es->nsList = ES_NsListCreat();
if (es->nsList == NULL) {
BSL_SAL_Free(es);
return NULL;
}
es->poolSize = ENTROPY_POOL_SIZE_DEFAULT;
es->enableTest = false;
return es;
}
void ENTROPY_EsFree(ENTROPY_EntropySource *es)
{
if (es == NULL) {
return;
}
if (es->isWork == true) {
ENTROPY_EsDeinit(es);
}
BSL_SAL_FREE(es->cfMeth);
ES_NsListFree(es->nsList);
es->nsList = NULL;
BSL_SAL_Free(es);
return;
}
int32_t ENTROPY_EsInit(ENTROPY_EntropySource *es)
{
if (es == NULL || es->cfMeth == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (es->isWork) {
return CRYPT_SUCCESS;
}
ES_CfMethod *meth = es->cfMeth;
if (meth->init != NULL) {
meth->ctx = meth->init(&meth->meth);
if (meth->ctx == NULL) {
ENTROPY_EsDeinit(es);
return CRYPT_ENTROPY_ES_CF_ERROR;
}
}
int32_t ret = ES_NsListInit(es->nsList, es->enableTest);
if (ret != CRYPT_SUCCESS) {
ENTROPY_EsDeinit(es);
return ret;
}
ES_EntropyPool *pool = ES_EntropyPoolInit(es->poolSize);
if (pool == NULL) {
ENTROPY_EsDeinit(es);
return CRYPT_ENTROPY_ES_POOL_ERROR;
}
es->pool = pool;
es->isWork = true;
return CRYPT_SUCCESS;
}
void ENTROPY_EsDeinit(ENTROPY_EntropySource *es)
{
if (es == NULL) {
return;
}
es->isWork = false;
ES_EntropyPoolDeInit(es->pool);
es->pool = NULL;
if (es->cfMeth != NULL && es->cfMeth->deinit != NULL) {
es->cfMeth->deinit(es->cfMeth->ctx);
es->cfMeth->ctx = NULL;
}
ES_NsListDeinit(es->nsList);
return;
}
static int32_t EsPoolSizeSet(ENTROPY_EntropySource *es, void *data, uint32_t len)
{
if (es->isWork) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_STATE_ERROR);
return CRYPT_ENTROPY_ES_STATE_ERROR;
}
if (len != sizeof(uint32_t) || *(uint32_t *)data < ENTROPY_POOL_SIZE_MIN ||
*(uint32_t *)data > ENTROPY_POOL_SIZE_MAX) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_CTRL_INVALID_PARAM);
return CRYPT_ENTROPY_CTRL_INVALID_PARAM;
}
es->poolSize = *(uint32_t *)data;
return CRYPT_SUCCESS;
}
static int32_t EsNsAdd(ENTROPY_EntropySource *es, void *data, uint32_t len)
{
if (es->isWork) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_STATE_ERROR);
return CRYPT_ENTROPY_ES_STATE_ERROR;
}
if (data == NULL || len != sizeof(CRYPT_EAL_NsPara)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_EAL_NsPara *para = (CRYPT_EAL_NsPara *)data;
return ES_NsAdd(es->nsList, para->name, para->autoTest, para->minEntropy, ¶->nsMeth,
(const CRYPT_EAL_NsTestPara *)&(para->nsPara));
}
static int32_t EsEnableTest(ENTROPY_EntropySource *es, void *data, uint32_t len)
{
if (es->isWork) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_STATE_ERROR);
return CRYPT_ENTROPY_ES_STATE_ERROR;
}
if (data == NULL || len != sizeof(bool)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
es->enableTest = *(bool *)data;
return CRYPT_SUCCESS;
}
static int32_t EsNsRemove(ENTROPY_EntropySource *es, void *data, uint32_t len)
{
if (es->isWork) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_STATE_ERROR);
return CRYPT_ENTROPY_ES_STATE_ERROR;
}
if (data == NULL || len == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
return ES_NsRemove(es->nsList, (const char *)data);
}
static int32_t EsSetCF(ENTROPY_EntropySource *es, ENTROPY_CFPara *data)
{
if (es->isWork) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_STATE_ERROR);
return CRYPT_ENTROPY_ES_STATE_ERROR;
}
if (es->cfMeth != NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_CF_ERROR);
return CRYPT_ENTROPY_ES_CF_ERROR;
}
es->cfMeth = ES_CFGetMethod(data->algId, data->md);
if (es->cfMeth == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_CF_NOT_SUPPORT);
return CRYPT_ENTROPY_ES_CF_NOT_SUPPORT;
}
return CRYPT_SUCCESS;
}
static int32_t EsGetSize(ENTROPY_EntropySource *es, int32_t cmd, void *data, uint32_t len)
{
if (data == NULL || len != sizeof(uint32_t)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (!es->isWork) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_STATE_ERROR);
return CRYPT_ENTROPY_ES_STATE_ERROR;
}
switch (cmd) {
case CRYPT_ENTROPY_GET_POOL_SIZE:
*(uint32_t *)data = es->poolSize;
return CRYPT_SUCCESS;
case CRYPT_ENTROPY_POOL_GET_CURRSIZE:
*(uint32_t *)data = ES_EntropyPoolGetCurSize(es->pool);
return CRYPT_SUCCESS;
case CRYPT_ENTROPY_GET_CF_SIZE:
*(uint32_t *)data = es->cfMeth->getCfOutLen(es->cfMeth->ctx);
return CRYPT_SUCCESS;
default:
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_CTRL_ERROR);
return CRYPT_ENTROPY_ES_CTRL_ERROR;
}
}
static int32_t EsGetState(ENTROPY_EntropySource *es, void *data, uint32_t len)
{
if (data == NULL || len != sizeof(bool)) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
*(bool *)data = es->isWork;
return CRYPT_SUCCESS;
}
static int32_t EsSetLogCallback(ENTROPY_EntropySource *es, void *data, uint32_t len)
{
(void)len;
if (es == NULL || data == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
es->runLog = (CRYPT_EAL_EsLogFunc)data;
return CRYPT_SUCCESS;
}
int32_t ENTROPY_EsCtrl(ENTROPY_EntropySource *es, int32_t cmd, void *data, uint32_t len)
{
if (es == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
switch (cmd) {
case CRYPT_ENTROPY_SET_POOL_SIZE:
return EsPoolSizeSet(es, data, len);
case CRYPT_ENTROPY_ADD_NS:
return EsNsAdd(es, data, len);
case CRYPT_ENTROPY_REMOVE_NS:
return EsNsRemove(es, data, len);
case CRYPT_ENTROPY_ENABLE_TEST:
return EsEnableTest(es, data, len);
case CRYPT_ENTROPY_SET_CF:
return EsSetCF(es, data);
case CRYPT_ENTROPY_GET_STATE:
return EsGetState(es, data, len);
case CRYPT_ENTROPY_SET_LOG_CALLBACK:
return EsSetLogCallback(es, data, len);
default:
return EsGetSize(es, cmd, data, len);
}
}
uint32_t ENTROPY_EsEntropyGet(ENTROPY_EntropySource *es, uint8_t *data, uint32_t len)
{
if (es == NULL || !es->isWork || data == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return 0;
}
if (ES_EntropyPoolGetCurSize(es->pool) <= 0) {
int32_t ret = ENTROPY_EsEntropyGather(es);
if (ret != CRYPT_SUCCESS) {
return 0;
}
}
return ES_EntropyPoolPopBytes(es->pool, data, len);
}
static uint32_t EsGetEntropy(ENTROPY_EntropySource *es, uint8_t *buf, uint32_t bufLen, uint32_t entropy)
{
ES_NoiseSource *ns = NULL;
uint32_t needLen = 0;
uint32_t curEntropy = 0;
uint8_t *data = buf;
while (curEntropy < entropy) {
uint32_t tmpEntropy = curEntropy;
for (ns = BSL_LIST_GET_FIRST(es->nsList); ns != NULL && needLen < bufLen; ns = BSL_LIST_GET_NEXT(es->nsList)) {
int32_t ret = ES_NsRead(ns, data, 1);
if (ret == CRYPT_SUCCESS) {
data++;
needLen++;
curEntropy += ns->minEntropy;
}
if (es->runLog != NULL) {
es->runLog(ret);
}
if (curEntropy >= entropy) {
return needLen;
}
}
if (curEntropy == tmpEntropy) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_NS_NOT_AVA);
needLen = 0;
break;
}
}
return needLen;
}
static uint32_t GetMinLen(uint32_t entropy, uint32_t minEntropy)
{
return (uint32_t)(((uint64_t)entropy + (uint64_t)minEntropy - 1) / (uint64_t)minEntropy);
}
int32_t ENTROPY_EsEntropyGather(ENTROPY_EntropySource *es)
{
if (es == NULL || es->isWork == false || es->cfMeth == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
ES_CfMethod *meth = es->cfMeth;
if ((meth->getCfOutLen(meth->ctx) > (uint32_t)ES_EntropyPoolGetMaxSize(es->pool) -
ES_EntropyPoolGetCurSize(es->pool))) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_POOL_INSUFFICIENT);
return CRYPT_ENTROPY_ES_POOL_INSUFFICIENT;
}
uint32_t minEntropy = ES_NsListGetMinEntropy(es->nsList);
uint32_t needEntropy = meth->getNeedEntropy(meth->ctx);
uint32_t bufLen = GetMinLen(needEntropy, minEntropy);
uint8_t *buf = BSL_SAL_Malloc(bufLen);
if (buf == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
uint32_t needLen = EsGetEntropy(es, buf, bufLen, needEntropy);
if (needLen == 0) {
BSL_SAL_Free(buf);
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_ENTROPY_NOT_ENOUGH);
return CRYPT_ENTROPY_ES_ENTROPY_NOT_ENOUGH;
}
int32_t ret = meth->update(meth->ctx, buf, needLen);
BSL_SAL_Free(buf);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
uint32_t len;
uint8_t *data = meth->getEntropyData(meth->ctx, &len);
if (data == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ret = ES_EntropyPoolPushBytes(es->pool, data, len);
(void)memset_s(data, len, 0, len);
BSL_SAL_Free(data);
return ret;
}
#endif
|
2301_79861745/bench_create
|
crypto/entropy/src/es_entropy.c
|
C
|
unknown
| 11,765
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_ENTROPY) && defined(HITLS_CRYPTO_ENTROPY_SYS)
#include <stdint.h>
#include "securec.h"
#include "bsl_err_internal.h"
#include "bsl_sal.h"
#include "crypt_errno.h"
#include "es_entropy_pool.h"
ES_EntropyPool *ES_EntropyPoolInit(uint32_t size)
{
ES_EntropyPool *pool = NULL;
uint32_t maxSize = size + 1;
if (size == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return NULL;
}
pool = (ES_EntropyPool *)BSL_SAL_Malloc(sizeof(ES_EntropyPool));
if (pool == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
pool->buf = (uint8_t *)BSL_SAL_Malloc(maxSize);
if (pool->buf == NULL) {
BSL_SAL_FREE(pool);
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
pool->front = 0;
pool->rear = 0;
pool->maxSize = maxSize;
return pool;
}
void ES_EntropyPoolDeInit(ES_EntropyPool *pool)
{
if (pool == NULL) {
return;
}
(void)memset_s(pool->buf, pool->maxSize, 0, pool->maxSize);
BSL_SAL_FREE(pool->buf);
BSL_SAL_Free(pool);
return;
}
int32_t ES_EntropyPoolGetMaxSize(ES_EntropyPool *pool)
{
return pool->maxSize - 1;
}
uint32_t ES_EntropyPoolGetCurSize(ES_EntropyPool *pool)
{
return (pool->rear - pool->front + pool->maxSize) % pool->maxSize;
}
int32_t ES_EntropyPoolPushBytes(ES_EntropyPool *pool, uint8_t *buf, uint32_t bufLen)
{
uint32_t partA, partB;
partA = (bufLen > (pool->maxSize - pool->rear)) ? pool->maxSize - pool->rear : bufLen;
(void)memcpy_s(&pool->buf[pool->rear], pool->maxSize - pool->rear, buf, partA);
pool->rear = (pool->rear + partA) % pool->maxSize;
if (partA < bufLen) {
partB = bufLen - partA;
(void)memcpy_s(&pool->buf[pool->rear], pool->maxSize - pool->rear, buf + partA, partB);
pool->rear = (pool->rear + partB) % pool->maxSize;
}
return CRYPT_SUCCESS;
}
uint32_t ES_EntropyPoolPopBytes(ES_EntropyPool *pool, uint8_t *data, uint32_t size)
{
uint32_t bufLen, partA, partB;
if (ES_EntropyPoolGetMaxSize(pool) == 0 || size == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return 0;
}
bufLen = (ES_EntropyPoolGetCurSize(pool) < size) ? ES_EntropyPoolGetCurSize(pool) : size;
partA = (bufLen <= pool->maxSize - pool->front) ? bufLen : pool->maxSize - pool->front;
(void)memcpy_s(data, bufLen, &pool->buf[pool->front], partA);
pool->front = (pool->front + partA) % pool->maxSize;
partB = bufLen - partA;
if (partB != 0) {
(void)memcpy_s(data + partA, bufLen - partA, &pool->buf[pool->front], partB);
pool->front = (pool->front + partB) % pool->maxSize;
}
return bufLen;
}
#endif
|
2301_79861745/bench_create
|
crypto/entropy/src/es_entropy_pool.c
|
C
|
unknown
| 3,397
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef ES_ENTROPY_POOL_H
#define ES_ENTROPY_POOL_H
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_ENTROPY) && defined(HITLS_CRYPTO_ENTROPY_SYS)
#include <stdint.h>
#ifdef __cplusplus
extern "C" {
#endif
typedef struct {
uint8_t *buf; // queue data
uint32_t front; // queue head
uint32_t rear; // queue tail
uint32_t maxSize; // queue capacity + 1
} ES_EntropyPool;
/* Entropy pool initialization. */
ES_EntropyPool *ES_EntropyPoolInit(uint32_t size);
/* Entropy pool deinitialization. */
void ES_EntropyPoolDeInit(ES_EntropyPool *pool);
/* Obtains the maximum capacity of the entropy pool. */
int32_t ES_EntropyPoolGetMaxSize(ES_EntropyPool *pool);
/* Obtains the current data volume of the entropy pool. */
uint32_t ES_EntropyPoolGetCurSize(ES_EntropyPool *pool);
/* Obtains entropy data from the entropy pool. */
int32_t ES_EntropyPoolPushBytes(ES_EntropyPool *pool, uint8_t *buf, uint32_t bufLen);
/* Compress entropy data into the entropy pool. */
uint32_t ES_EntropyPoolPopBytes(ES_EntropyPool *pool, uint8_t *data, uint32_t size);
#ifdef __cplusplus
}
#endif
#endif
#endif
|
2301_79861745/bench_create
|
crypto/entropy/src/es_entropy_pool.h
|
C
|
unknown
| 1,711
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_ENTROPY) && defined(HITLS_CRYPTO_ENTROPY_SYS)
#include <stdint.h>
#include <stddef.h>
#include "bsl_err_internal.h"
#include "crypt_errno.h"
#include "es_health_test.h"
int32_t ES_HealthTestRct(ES_HealthTest *state, uint64_t data)
{
if (data == state->lastData) {
state->rctCount++;
if (state->rctCount >= state->rctCutoff) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_RCT_FAILURE);
return CRYPT_ENTROPY_RCT_FAILURE;
}
} else {
state->lastData = data;
state->rctCount = 1;
}
return CRYPT_SUCCESS;
}
int32_t ES_HealthTestApt(ES_HealthTest *state, uint64_t data)
{
if (state->aptBaseSet == 0) { // NIST SP800-90B section 4.4.2 step 1/2
state->aptBaseSet = 1;
state->aptBaseData = data;
state->aptCount = 1;
state->aptI = 1;
return CRYPT_SUCCESS;
}
if (state->aptBaseData == data) {
state->aptCount++;
if (state->aptCount >= state->aptCutOff) {
state->aptBaseSet = 0; // Restart an APT window next time.
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_APT_FAILURE);
return CRYPT_ENTROPY_APT_FAILURE;
}
}
state->aptI++;
if (state->aptI >= state->aptWindowSize) {
state->aptBaseSet = 0;
}
return CRYPT_SUCCESS;
}
#endif
|
2301_79861745/bench_create
|
crypto/entropy/src/es_health_test.c
|
C
|
unknown
| 1,976
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef ES_HEALTH_TEST_H
#define ES_HEALTH_TEST_H
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_ENTROPY) && defined(HITLS_CRYPTO_ENTROPY_SYS)
#include <stdint.h>
#ifdef __cplusplus
extern "C" {
#endif
typedef struct {
// RCT
uint32_t rctCutoff; // NIST SP800-90B 4.4.1 Parameter C
uint32_t rctCount; // NIST SP800-90B 4.4.1 Parameter B
// APT
uint32_t aptBaseSet; // Indicates whether aptBaseData has been set. The value must be initialized to 0.
uint32_t aptCount; // NIST SP800-90B 4.4.2 Parameter B
uint32_t aptWindowSize; // NIST SP800-90B 4.4.2 Parameter W
uint32_t aptI; // counters
uint32_t aptCutOff; // NIST SP800-90B 4.4.2 Parameter C
uint64_t aptBaseData; // NIST SP800-90B 4.4.2 Parameter A
uint64_t lastData; // NIST SP800-90B 4.4.1 Parameter A
} ES_HealthTest;
/* Repetition Count Test */
int32_t ES_HealthTestRct(ES_HealthTest *state, uint64_t data);
/* Adaptive Proportion Test */
int32_t ES_HealthTestApt(ES_HealthTest *state, uint64_t data);
#ifdef __cplusplus
}
#endif
#endif
#endif
|
2301_79861745/bench_create
|
crypto/entropy/src/es_health_test.h
|
C
|
unknown
| 1,655
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_ENTROPY) && defined(HITLS_CRYPTO_ENTROPY_SYS)
#include <stdint.h>
#include "securec.h"
#include "crypt_errno.h"
#include "bsl_list_internal.h"
#include "bsl_err_internal.h"
#include "es_noise_source.h"
#define ES_NS_MAX_SIZE 16
#define ES_MIN_ENTROPY_MAX 8
/* Noise source non-blocking reading. Set the maximum reading time to 10s. */
#define ES_MAX_TIMEOUT_MAX 10
static int32_t NsRead(ES_NoiseSource *ns, uint8_t *buf, uint32_t bufLen);
/*
* GM/T 0105-2021 Section 5.5
* The Power-Up Health Test requires a continuous health test of at least 1024 consecutive samples.
*/
#define ENTROPY_START_UP_TEST_SIZE 1024
int32_t ES_NoiseSourceStartupTest(ES_NoiseSource *ns)
{
uint8_t buf[ENTROPY_START_UP_TEST_SIZE] = {0};
return NsRead(ns, buf, ENTROPY_START_UP_TEST_SIZE);
}
static ES_NoiseSource *ES_NsCreate(const char *name, bool autoTest, uint32_t minEntropy,
const CRYPT_EAL_NsMethod *method, const CRYPT_EAL_NsTestPara *para)
{
ES_NoiseSource *ctx = BSL_SAL_Malloc(sizeof(ES_NoiseSource));
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)memset_s(ctx, sizeof(ES_NoiseSource), 0, sizeof(ES_NoiseSource));
uint32_t len = strlen(name) + 1;
ctx->name = BSL_SAL_Malloc(len);
if (ctx->name == NULL) {
BSL_SAL_FREE(ctx);
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
(void)strncpy_s(ctx->name, len, name, len - 1);
// Initializing
ctx->autoTest = autoTest;
ctx->para = method->para;
ctx->init = method->init;
ctx->read = method->read;
ctx->deinit = method->deinit;
ctx->minEntropy = minEntropy;
ctx->state.rctCutoff = para->rctCutoff;
ctx->state.aptCutOff = para->aptCutoff;
ctx->state.aptWindowSize = para->aptWinSize;
return ctx;
}
static void ES_NsFree(ES_NoiseSource *ns)
{
if (ns->usrdata != NULL && ns->deinit != NULL) {
ns->deinit(ns->usrdata);
}
BSL_SAL_FREE(ns->name);
BSL_SAL_Free(ns);
return;
}
BslList *ES_NsListCreat(void)
{
BslList *ns = BSL_LIST_New(sizeof(BslListNode));
if (ns == NULL) {
BSL_ERR_PUSH_ERROR(BSL_LIST_MALLOC_FAIL);
return NULL;
}
ES_NoiseSource *jitterCtx = ES_CpuJitterGetCtx();
if (jitterCtx == NULL) {
goto ERR;
}
int32_t ret = BSL_LIST_AddElement(ns, jitterCtx, BSL_LIST_POS_AFTER);
if (ret != CRYPT_SUCCESS) {
ES_NsFree(jitterCtx);
goto ERR;
}
ES_NoiseSource *stampCtx = ES_TimeStampGetCtx();
if (stampCtx == NULL) {
goto ERR;
}
ret = BSL_LIST_AddElement(ns, stampCtx, BSL_LIST_POS_AFTER);
if (ret != CRYPT_SUCCESS) {
ES_NsFree(stampCtx);
goto ERR;
}
return ns;
ERR:
BSL_LIST_FREE(ns, (BSL_LIST_PFUNC_FREE)ES_NsFree);
return NULL;
}
int32_t ES_NsListInit(BslList *nsList, bool enableTest)
{
if (BSL_LIST_COUNT(nsList) == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_NO_NS);
return CRYPT_ENTROPY_ES_NO_NS;
}
bool nsUsed = false;
ES_NoiseSource *ns = NULL;
for (ns = BSL_LIST_GET_FIRST(nsList); ns != NULL; ns = BSL_LIST_GET_NEXT(nsList)) {
/*
* If the health check is automatically performed when the noise source is generated, no additional health
* check is required. Otherwise, determine whether to perform the health check based on the configuration.
*/
ns->enableTest = (ns->autoTest) ? false : enableTest;
if (ns->init != NULL) {
ns->usrdata = ns->init(ns->para);
if (ns->usrdata == NULL) {
ns->isEnable = false;
continue;
}
}
ns->isInit = true;
if (enableTest) {
int32_t ret = ES_NoiseSourceStartupTest(ns);
if (ret != CRYPT_SUCCESS) {
ns->isEnable = false;
BSL_ERR_PUSH_ERROR(ret);
continue;
}
}
ns->isEnable = true;
nsUsed = true;
}
if (!nsUsed) {
ES_NsListDeinit(nsList);
return CRYPT_ENTROPY_ES_NO_NS;
}
return CRYPT_SUCCESS;
}
void ES_NsListDeinit(BslList *nsList)
{
if (BSL_LIST_COUNT(nsList) == 0) {
return;
}
ES_NoiseSource *ns = NULL;
for (ns = BSL_LIST_GET_FIRST(nsList); ns != NULL; ns = BSL_LIST_GET_NEXT(nsList)) {
ns->isInit = false;
ns->isEnable = false;
if (ns->deinit != NULL) {
ns->deinit(ns->usrdata);
ns->usrdata = NULL;
}
}
return;
}
void ES_NsListFree(BslList *nsList)
{
BSL_LIST_FREE(nsList, (BSL_LIST_PFUNC_FREE)ES_NsFree);
}
static int32_t ES_NsComp(const ES_NoiseSource *ns, const char *name)
{
return strcmp(ns->name, name);
}
int32_t ES_NsAdd(BslList *nsList, const char *name, bool autoTest, uint32_t minEntropy,
const CRYPT_EAL_NsMethod *method, const CRYPT_EAL_NsTestPara *para)
{
if (name == NULL || minEntropy > ES_MIN_ENTROPY_MAX) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (method->read == NULL || (method->init == NULL && method->deinit != NULL) ||
(method->init != NULL && method->deinit == NULL)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (BSL_LIST_COUNT(nsList) >= ES_NS_MAX_SIZE) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_NS_FULL);
return CRYPT_ENTROPY_ES_NS_FULL;
}
if (BSL_LIST_SearchEx(nsList, name, (BSL_LIST_PFUNC_CMP)ES_NsComp) != NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_DUP_NS);
return CRYPT_ENTROPY_ES_DUP_NS;
}
ES_NoiseSource *ns = ES_NsCreate(name, autoTest, minEntropy, method, para);
if (ns == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_CREATE_ERROR);
return CRYPT_ENTROPY_ES_CREATE_ERROR;
}
int32_t ret = BSL_LIST_AddElement(nsList, ns, BSL_LIST_POS_AFTER);
if (ret != CRYPT_SUCCESS) {
ES_NsFree(ns);
}
return ret;
}
int32_t ES_NsRemove(BslList *nsList, const char *name)
{
BslListNode *tmpNode = NULL;
for (BslListNode *node = BSL_LIST_FirstNode(nsList); node != NULL;) {
tmpNode = node;
ES_NoiseSource *ns = BSL_LIST_GetData(tmpNode);
if (ns == NULL) {
continue;
}
if (strcmp(ns->name, name) == 0) {
BSL_LIST_DeleteNode(nsList, (const BslListNode *)tmpNode, (BSL_LIST_PFUNC_FREE)ES_NsFree);
return CRYPT_SUCCESS;
}
node = BSL_LIST_GetNextNode(nsList, tmpNode);
}
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_NS_NOT_FOUND);
return CRYPT_ENTROPY_ES_NS_NOT_FOUND;
}
static int32_t NsRead(ES_NoiseSource *ns, uint8_t *buf, uint32_t bufLen)
{
int32_t ret = ns->read(ns->usrdata, ES_MAX_TIMEOUT_MAX, buf, bufLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
if (!ns->enableTest) {
return CRYPT_SUCCESS;
}
for (uint32_t iter = 0; iter < bufLen; iter++) {
ret = ES_HealthTestRct(&(ns->state), buf[iter]);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = ES_HealthTestApt(&(ns->state), buf[iter]);
if (ret != CRYPT_SUCCESS) {
return ret;
}
}
return ret;
}
int32_t ES_NsRead(ES_NoiseSource *ns, uint8_t *buf, uint32_t bufLen)
{
if (ns->isInit != true || ns->isEnable != true) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_NS_NOT_AVA);
return CRYPT_ENTROPY_ES_NS_NOT_AVA;
}
return NsRead(ns, buf, bufLen);
}
uint32_t ES_NsListGetMinEntropy(BslList *nsList)
{
if (BSL_LIST_COUNT(nsList) == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_ENTROPY_ES_NO_NS);
return 0;
}
uint32_t minEntropy = 8;
ES_NoiseSource *ns = NULL;
for (ns = BSL_LIST_GET_FIRST(nsList); ns != NULL; ns = BSL_LIST_GET_NEXT(nsList)) {
minEntropy = (ns->minEntropy < minEntropy) ? ns->minEntropy : minEntropy;
}
return minEntropy;
}
#endif
|
2301_79861745/bench_create
|
crypto/entropy/src/es_noise_source.c
|
C
|
unknown
| 8,853
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef ES_NOISE_SOURCE_H
#define ES_NOISE_SOURCE_H
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_ENTROPY) && defined(HITLS_CRYPTO_ENTROPY_SYS)
#include <stdint.h>
#include "bsl_list.h"
#include "es_health_test.h"
#include "crypt_types.h"
#ifdef __cplusplus
extern "C" {
#endif
typedef struct {
/* Whether to enable the health test */
bool enableTest;
/* Whether the noise source automatically performs the health test */
bool autoTest;
/* Whether the noise source is available */
bool isEnable;
/* Whether the noise source is initialized */
bool isInit;
/* Noise source name, which must be unique. */
char *name;
/* Initialization parameters of the noise source */
void *para;
/* Noise Source Handle */
void *usrdata;
/* Noise Source Initialization Interface. */
void *(*init)(void *para);
/* Interface for Obtaining Noise Sources. */
int32_t (*read)(void *usrdata, uint32_t timeout, uint8_t *buf, uint32_t bufLen);
/* Noise Source Deinitialization Interface. */
void (*deinit)(void *usrdata);
/* minimum entropy, bit entropy contained in a byte. */
uint32_t minEntropy;
ES_HealthTest state;
} ES_NoiseSource;
/* Noise Source List create. */
BslList *ES_NsListCreat(void);
/* Noise Source List Initialization. */
int32_t ES_NsListInit(BslList *nsList, bool enableTest);
/* Noise Source List deinitialization. */
void ES_NsListDeinit(BslList *nsList);
/* Noise Source List release. */
void ES_NsListFree(BslList *nsList);
/**
* @brief add ns
*
* @param nsList [IN] noise source list
* @param name [IN] Noise source name, which must be unique.
* @param autoTest [IN] Whether the noise source automatically performs the health test.
* @param minEntropy [IN] minimum entropy, bit entropy contained in a byte.
* @param method [IN] noise source callback Interface.
* @param para [IN] noise source health test parameter.
*
* @return CRYPT_SUCCESS succeeded.
* For other error codes, see crypt_error.h.
*/
int32_t ES_NsAdd(BslList *nsList, const char *name, bool autoTest, uint32_t minEntropy,
const CRYPT_EAL_NsMethod *method, const CRYPT_EAL_NsTestPara *para);
/**
* @brief remove ns
*
* @param nsList [IN] noise source list
* @param name [IN] Noise source name, which must be unique.
*
* @return CRYPT_SUCCESS succeeded.
* For other error codes, see crypt_error.h.
*/
int32_t ES_NsRemove(BslList *nsList, const char *name);
/**
* @brief Read the raw noise data.
*
* @param ns [IN] noise source handle
* @param buf [IN] the raw noise data buffer.
* @param bufLen [IN] the length of the raw noise data.
*
* @return CRYPT_SUCCESS succeeded.
* For other error codes, see crypt_error.h.
*/
int32_t ES_NsRead(ES_NoiseSource *ns, uint8_t *buf, uint32_t bufLen);
/**
* @brief Obtains the minimum value of the minimum entropy.
*
* @param nsList [IN] noise source list
*
* @return CRYPT_SUCCESS succeeded.
* For other error codes, see crypt_error.h.
*/
uint32_t ES_NsListGetMinEntropy(BslList *nsList);
/* Obtains the handle of the cpu-jiiter. */
ES_NoiseSource *ES_CpuJitterGetCtx(void);
/* Obtains the handle of the timestamp. */
ES_NoiseSource *ES_TimeStampGetCtx(void);
#ifdef __cplusplus
}
#endif
#endif
#endif
|
2301_79861745/bench_create
|
crypto/entropy/src/es_noise_source.h
|
C
|
unknown
| 3,925
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_ENTROPY) && defined(HITLS_CRYPTO_ENTROPY_SYS)
#include <stdint.h>
#include <time.h>
#include "securec.h"
#include "bsl_err_internal.h"
#include "crypt_errno.h"
#include "es_noise_source.h"
#ifndef HITLS_CACHE_LINE_SIZE
#define HITLS_CACHE_LINE_SIZE 64
#endif
#ifndef HITLS_CACHE_ROW_COUNT
#define HITLS_CACHE_ROW_COUNT 1025
#endif
#ifndef HITLS_JITTER_APT_CUT_OFF
/**
* Binary WINDOW 1024, 0.8 Entropy CUT off 664 0.6 Entropy CUT off 748
* reference to SP800-90B sec 4.4.2
*/
#define HITLS_JITTER_APT_CUT_OFF 592
#endif
#ifndef HITLS_JITTER_RCT_CUT_OFF
/**
* C = 1 + ceil(-log_2(alpha)/H), H = 1(MIN_ENTROPY), alpha = 2^(-20)
* alpha value reference SP800-90B sec 4.4.1
* following SP800-90B. Thus C = ceil(-log_2(alpha)/H) = 20.
*/
#define HITLS_JITTER_RCT_CUT_OFF 20
#endif
#ifndef HITLS_JITTER_MINENTROPY
/**
* HITLS_JITTER_RCT_CUT_OFF and HITLS_JITTER_APT_CUT_OFF are calculated based on HITLS_JITTER_MINENTROPY.
* If HITLS_JITTER_MINENTROPY is configured manually, HITLS_JITTER_RCT_CUT_OFF and must be
* configured simultaneously.
*/
#define HITLS_JITTER_MINENTROPY 5
#endif
#define NS_APT_BIN_WINDOW_SIZE 1024
#define NS_ENTROPY_HASH_SIZE 32 // hash size
#define NS_ENTROPY_DATA_SIZE (NS_ENTROPY_HASH_SIZE * 4) // 4 * 32, 128 bytes,1024 bits,one APT window
/* Mainstream CPU cache access unit (cache line) 32 或者64 */
#define NS_CACHE_SIZE (HITLS_CACHE_LINE_SIZE * HITLS_CACHE_ROW_COUNT) // total operation memory size
#define NS_CACHE_MIN_SIZE 33 // minimum Length
#define NS_ENTROPY_RCT_FAILURE (-1)
#define NS_ENTROPY_APT_FAILURE (-2)
#define NS_ENTROPY_MAX_LIFE 30 // maximum lifetime of entropy data: 30 seconds
typedef struct ES_JitterState {
int8_t testFailure;
uint8_t rctCount;
uint8_t aptBase;
uint8_t aptBaseSet;
uint16_t aptCount;
uint16_t aptObservations;
uint8_t data[NS_ENTROPY_DATA_SIZE];
uint64_t lastDelta;
uint32_t remainCount;
uint32_t memLocation;
uint8_t mem[HITLS_CACHE_ROW_COUNT][HITLS_CACHE_LINE_SIZE];
volatile uint32_t mID;
uint64_t lastTime;
void (*hashFunc)(uint8_t *, int, uint8_t *, int);
} ES_JitterState;
static void UpdateRctHealth(ES_JitterState *e, int stuck)
{
if (e->rctCount > HITLS_JITTER_RCT_CUT_OFF) {
return;
}
if (stuck > 0) {
e->rctCount++;
if (e->rctCount > HITLS_JITTER_RCT_CUT_OFF) {
e->testFailure = NS_ENTROPY_RCT_FAILURE; // If the RCT test fails, the entropy source can be restarted.
}
} else {
e->rctCount = 0;
}
}
static void UpdateAptHealth(ES_JitterState *e, uint8_t data)
{
if (e->aptBaseSet == 0) {
e->aptBase = data;
e->aptBaseSet = 1;
e->aptCount = 1;
e->aptObservations = 1;
return;
}
if (e->aptBase == data) {
e->aptCount++;
if (e->aptCount > HITLS_JITTER_APT_CUT_OFF) {
e->testFailure = NS_ENTROPY_APT_FAILURE; // If APT detection fails, the entropy source can be restarted.
}
}
e->aptObservations++;
if (e->aptObservations >= NS_APT_BIN_WINDOW_SIZE) {
e->aptBaseSet = 0;
}
}
static uint64_t NS_ENTROPY_Gettick(void)
{
uint64_t ticks = 0;
struct timespec time;
if (clock_gettime(CLOCK_REALTIME, &time) == 0) {
ticks = ((uint64_t)time.tv_sec & 0xFFFFFFFF) * 1000000000UL;
ticks = ticks + (uint64_t)time.tv_nsec;
}
return ticks;
}
#define NS_MOVE_LEVEL 128
static void __attribute__((optimize("O0"))) EntropyMemeryAccess(ES_JitterState *e, uint8_t det)
{
/*
* 1. Random read/write start position
* 2. Read and write position change by position value
* 3. Multiple data reads and writes
* 4. branch prediction mitigation
*/
e->mID = (e->mID + det) % NS_CACHE_SIZE;
uint32_t bound = HITLS_CACHE_ROW_COUNT + det;
for (uint32_t i = 0; i < bound; i++) {
// c, l Calculate the row and column coordinate points.
uint32_t c = e->mID / HITLS_CACHE_LINE_SIZE;
uint32_t l = e->mID % HITLS_CACHE_LINE_SIZE;
volatile uint8_t *volatile cur = e->mem[c] + l;
*cur ^= det;
e->memLocation = (e->memLocation + (*cur & 0x0f) + NS_CACHE_MIN_SIZE) % NS_CACHE_SIZE;
}
}
/**
* Get a random position: keep moving right until there is a non-zero bit in the lower eight bits,
* then return the lower eight bits
*/
static uint8_t GetUChar(uint64_t tick)
{
size_t i;
volatile uint64_t data = tick;
for (i = 0; i < sizeof(uint64_t); i++) {
if ((data & 1) == 1) {
return (uint8_t)data;
}
data >>= 1;
}
return (uint8_t)((data % HITLS_CACHE_LINE_SIZE) + NS_CACHE_MIN_SIZE);
}
static void EntropyMeasure(ES_JitterState *e, int32_t index)
{
uint8_t data = 0;
int i;
// One byte has eight bits. Only the status of one bit can be obtained each time the memory is read or written.
for (i = 0; i < 8; i++) { // 8 bit
uint64_t tick1 = NS_ENTROPY_Gettick();
EntropyMemeryAccess(e, GetUChar(tick1));
uint64_t tick = NS_ENTROPY_Gettick();
uint64_t delta = tick - tick1;
uint8_t bit;
if (delta & 0x01) {
bit = (delta >> 3) & 0x01; // 3:4th bits
} else {
bit = (delta >> 7) & 0x01; // 7:8th bits
}
data = (uint8_t)(data << 1); // Move to the left first to prevent entropy overflow.
data |= bit;
UpdateRctHealth(e, e->lastDelta == bit);
UpdateAptHealth(e, bit);
e->lastDelta = bit;
}
e->data[index] = data;
data = 0; // clean
}
static void EntropyProcess(ES_JitterState *e)
{
int32_t i, start;
uint8_t buf[NS_ENTROPY_HASH_SIZE + 1];
for (i = 0; i < NS_ENTROPY_DATA_SIZE; i++) {
EntropyMeasure(e, i); // Obtains 1-byte entropy.
start = (i / NS_ENTROPY_HASH_SIZE) * NS_ENTROPY_HASH_SIZE;
/**
* Copy 32 bytes to buf at a time, but only one byte of entropy is added to e-data in each loop. Subsequently,
* the latest entropy is attached to the tail of the buffer each time, and the 33-byte content is hashed.
* The hashed content is written to the internal entropy pool of the entropy source.
*/
(void)memcpy_s(buf, NS_ENTROPY_HASH_SIZE + 1, e->data + start, NS_ENTROPY_HASH_SIZE);
// The latest entropy 1 byte is placed at the end. The 33-byte data is hashed to form a new 32-byte entropy.
buf[NS_ENTROPY_HASH_SIZE] = e->data[i];
e->hashFunc(buf, sizeof(buf), (e->data + start), NS_ENTROPY_HASH_SIZE);
}
(void)memset_s(buf, sizeof(buf), 0, sizeof(buf));
}
static int32_t EsCpuJitterGen(ES_JitterState *jitter, uint8_t *buf, uint32_t bufLen)
{
const uint32_t entropySize = sizeof(jitter->data);
EntropyProcess(jitter);
uint8_t *out = buf;
uint32_t left = bufLen;
while (left > 0) {
EntropyProcess(jitter); // 1024
if (jitter->testFailure != CRYPT_SUCCESS) {
jitter->remainCount = 0;
break;
}
uint32_t length = left > entropySize ? entropySize : left;
(void)memcpy_s(out, length, jitter->data, length);
left -= length;
if (left <= 0) {
jitter->remainCount = entropySize - length;
jitter->lastTime = BSL_SAL_CurrentSysTimeGet();
break;
}
out += length;
}
return jitter->testFailure;
}
static uint32_t EsCpuJitterGet(ES_JitterState *jitter, uint8_t *buf, uint32_t bufLen)
{
if (jitter->remainCount == 0) {
return bufLen;
}
uint64_t nowTime = BSL_SAL_CurrentSysTimeGet();
if (nowTime == 0 || nowTime - jitter->lastTime > NS_ENTROPY_MAX_LIFE) {
return bufLen;
}
uint32_t length = (bufLen < jitter->remainCount) ? bufLen : jitter->remainCount;
(void)memcpy_s(buf, bufLen, jitter->data + (NS_ENTROPY_DATA_SIZE - jitter->remainCount), length);
jitter->remainCount -= length;
return bufLen - length;
}
static int32_t ES_CpuJitterRead(void *ctx, uint32_t timeout, uint8_t *buf, uint32_t bufLen)
{
ES_JitterState *jitter = (ES_JitterState *)ctx;
(void)timeout;
if (ctx == NULL || buf == NULL || bufLen <= 0) {
return CRYPT_NULL_INPUT;
}
uint32_t left = EsCpuJitterGet(jitter, buf, bufLen);
if (left == 0) {
return CRYPT_SUCCESS;
}
return EsCpuJitterGen(jitter, buf + (bufLen -left), left);
}
static void ES_CpuJitterFree(void *ctx)
{
if (ctx == NULL) {
return;
}
(void)memset_s(ctx, sizeof(ES_JitterState), 0, sizeof(ES_JitterState));
BSL_SAL_FREE(ctx);
}
static void *ES_CpuJitterInit(void *para)
{
if (para == NULL) {
return NULL;
}
ES_JitterState *e = (ES_JitterState *)BSL_SAL_Malloc(sizeof(ES_JitterState));
if (e == NULL) {
return NULL;
}
e->rctCount = 0;
e->aptBaseSet = 0;
e->mID = 0;
e->hashFunc = para;
e->testFailure = CRYPT_SUCCESS;
// Try to read 32 bytes once to check whether the environment is normal.
uint8_t data[32] = {0};
if (ES_CpuJitterRead(e, true, data, sizeof(data)) != CRYPT_SUCCESS) {
(void)memset_s(data, sizeof(data), 0, 32); // 32, Zeroed 32-byte array
ES_CpuJitterFree(e);
return NULL;
}
return e;
}
static void EmptyConditionComp(uint8_t *out, int32_t outLen, uint8_t *in, int32_t inLen)
{
(void)out;
(void)outLen;
(void)in;
(void)inLen;
}
ES_NoiseSource *ES_CpuJitterGetCtx(void)
{
ES_NoiseSource *ctx = BSL_SAL_Malloc(sizeof(ES_NoiseSource));
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(BSL_LIST_MALLOC_FAIL);
return NULL;
}
(void)memset_s(ctx, sizeof(ES_NoiseSource), 0, sizeof(ES_NoiseSource));
uint32_t len = strlen("CPU-Jitter");
ctx->name = BSL_SAL_Malloc(len + 1);
if (ctx->name == NULL) {
BSL_SAL_Free(ctx);
BSL_ERR_PUSH_ERROR(BSL_LIST_MALLOC_FAIL);
return NULL;
}
(void)strncpy_s(ctx->name, len + 1, "CPU-Jitter", len);
ctx->autoTest = true;
ctx->para = (void *)EmptyConditionComp;
ctx->init = ES_CpuJitterInit;
ctx->read = ES_CpuJitterRead;
ctx->deinit = ES_CpuJitterFree;
ctx->minEntropy = HITLS_JITTER_MINENTROPY; // one byte bring 5 bits entropy
return ctx;
}
#endif
|
2301_79861745/bench_create
|
crypto/entropy/src/es_ns_jitter.c
|
C
|
unknown
| 11,286
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_ENTROPY) && defined(HITLS_CRYPTO_ENTROPY_SYS)
#include <stdint.h>
#include <time.h>
#include "securec.h"
#include "bsl_err_internal.h"
#include "crypt_errno.h"
#include "es_noise_source.h"
#define TIME_STAMP_ENTROPY_RCT_CUT_OFF 5
#define TIME_STAMP_ENTROPY_APT_WINDOW_SIZE 512
#define TIME_STAMP_ENTROPY_APT_CUT_OFF 39
static uint64_t CRPT_Gettick(void)
{
uint64_t tick = 0;
struct timespec time;
if (clock_gettime(CLOCK_MONOTONIC, &time) == 0) {
tick = ((uint64_t)time.tv_sec & 0xFFFFFFFF) * 1000000000UL;
tick = tick + (uint64_t)time.tv_nsec;
}
return tick;
}
static int32_t ES_TimeStampRead(void *ctx, uint32_t timeout, uint8_t *buf, uint32_t bufLen)
{
if (buf == NULL || bufLen == 0) {
return -1;
}
(void)ctx;
(void)timeout;
for (uint32_t i = 0; i < bufLen; i++) {
buf[i] = CRPT_Gettick() & 0xFF;
}
return CRYPT_SUCCESS;
}
ES_NoiseSource *ES_TimeStampGetCtx(void)
{
ES_NoiseSource *ctx = BSL_SAL_Malloc(sizeof(ES_NoiseSource));
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(BSL_LIST_MALLOC_FAIL);
return NULL;
}
(void)memset_s(ctx, sizeof(ES_NoiseSource), 0, sizeof(ES_NoiseSource));
uint32_t len = strlen("timestamp");
ctx->name = BSL_SAL_Malloc(len + 1);
if (ctx->name == NULL) {
BSL_SAL_Free(ctx);
BSL_ERR_PUSH_ERROR(BSL_LIST_MALLOC_FAIL);
return NULL;
}
(void)strncpy_s(ctx->name, len + 1, "timestamp", len);
ctx->para = NULL;
ctx->init = NULL;
ctx->read = ES_TimeStampRead;
ctx->deinit = NULL;
ctx->minEntropy = 5; // one byte bring 5 bits entropy
ctx->state.rctCutoff = TIME_STAMP_ENTROPY_RCT_CUT_OFF;
ctx->state.aptCutOff = TIME_STAMP_ENTROPY_APT_CUT_OFF;
ctx->state.aptWindowSize = TIME_STAMP_ENTROPY_APT_WINDOW_SIZE;
return ctx;
}
#endif
|
2301_79861745/bench_create
|
crypto/entropy/src/es_ns_timestamp.c
|
C
|
unknown
| 2,516
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_GMAC_H
#define CRYPT_GMAC_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_GMAC
#include <stdint.h>
#include "crypt_types.h"
#include "crypt_modes_gcm.h"
#ifdef __cplusplus
extern "C" {
#endif /* __cpluscplus */
#define CRYPT_GMAC_SetParam NULL
MODES_GCM_Ctx *CRYPT_GMAC_NewCtx(CRYPT_MAC_AlgId id);
MODES_GCM_Ctx *CRYPT_GMAC_NewCtxEx(void *libCtx, CRYPT_MAC_AlgId id);
int32_t CRYPT_GMAC_Init(MODES_GCM_Ctx *ctx, const uint8_t *key, uint32_t len, void *param);
int32_t CRYPT_GMAC_Update(MODES_GCM_Ctx *ctx, const uint8_t *in, uint32_t len);
int32_t CRYPT_GMAC_Final(MODES_GCM_Ctx *ctx, uint8_t *out, uint32_t *len);
void CRYPT_GMAC_FreeCtx(MODES_GCM_Ctx *ctx);
#define CRYPT_GMAC_Reinit NULL
int32_t CRYPT_GMAC_Deinit(MODES_GCM_Ctx *ctx);
int32_t CRYPT_GMAC_Ctrl(MODES_GCM_Ctx *ctx, int32_t opt, void *val, uint32_t len);
#ifdef __cplusplus
}
#endif /* __cpluscplus */
#endif
#endif
|
2301_79861745/bench_create
|
crypto/gmac/include/crypt_gmac.h
|
C
|
unknown
| 1,505
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_GMAC
#include <stdlib.h>
#include "crypt_gmac.h"
#include "crypt_errno.h"
#include "bsl_err_internal.h"
static int32_t GmacIdToSymId(CRYPT_MAC_AlgId algId)
{
switch (algId) {
case CRYPT_MAC_GMAC_AES128:
return CRYPT_CIPHER_AES128_GCM;
case CRYPT_MAC_GMAC_AES192:
return CRYPT_CIPHER_AES192_GCM;
case CRYPT_MAC_GMAC_AES256:
return CRYPT_CIPHER_AES256_GCM;
default:
return CRYPT_CIPHER_MAX;
}
}
MODES_GCM_Ctx *CRYPT_GMAC_NewCtx(CRYPT_MAC_AlgId id)
{
return MODES_GCM_NewCtx(GmacIdToSymId(id));
}
MODES_GCM_Ctx *CRYPT_GMAC_NewCtxEx(void *libCtx, CRYPT_MAC_AlgId id)
{
(void)libCtx;
return MODES_GCM_NewCtx(GmacIdToSymId(id));
}
int32_t CRYPT_GMAC_Init(MODES_GCM_Ctx *ctx, const uint8_t *key, uint32_t len, void *param)
{
(void)param;
return MODES_GCM_SetKey(&ctx->gcmCtx, key, len);
}
int32_t CRYPT_GMAC_Update(MODES_GCM_Ctx *ctx, const uint8_t *in, uint32_t len)
{
return MODES_GCM_Ctrl(ctx, CRYPT_CTRL_SET_AAD, (void *)(uintptr_t)in, len);
}
int32_t CRYPT_GMAC_Final(MODES_GCM_Ctx *ctx, uint8_t *out, uint32_t *len)
{
if (len == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
return MODES_GCM_Ctrl(ctx, CRYPT_CTRL_GET_TAG, (void *)(uintptr_t)out, *len);
}
void CRYPT_GMAC_FreeCtx(MODES_GCM_Ctx *ctx)
{
MODES_GCM_FreeCtx(ctx);
}
int32_t CRYPT_GMAC_Deinit(MODES_GCM_Ctx *ctx)
{
return MODES_GCM_DeInitCtx(ctx);
}
int32_t CRYPT_GMAC_Ctrl(MODES_GCM_Ctx *ctx, int32_t opt, void *val, uint32_t len)
{
switch (opt) {
case CRYPT_CTRL_SET_IV:
return MODES_GCM_Ctrl(ctx, CRYPT_CTRL_REINIT_STATUS, val, len);
case CRYPT_CTRL_GET_MACLEN:
return MODES_GCM_Ctrl(ctx, CRYPT_CTRL_GET_BLOCKSIZE, val, len);
case CRYPT_CTRL_SET_TAGLEN:
return MODES_GCM_Ctrl(ctx, CRYPT_CTRL_SET_TAGLEN, val, len);
default:
BSL_ERR_PUSH_ERROR(CRYPT_EAL_MAC_CTRL_TYPE_ERROR);
return CRYPT_EAL_MAC_CTRL_TYPE_ERROR;
}
}
#endif /* HITLS_CRYPTO_GMAC */
|
2301_79861745/bench_create
|
crypto/gmac/src/gmac.c
|
C
|
unknown
| 2,779
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_HKDF_H
#define CRYPT_HKDF_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_HKDF
#include <stdint.h>
#include "crypt_local_types.h"
#include "bsl_params.h"
#ifdef __cplusplus
extern "C" {
#endif // __cplusplus
typedef struct CryptHkdfCtx CRYPT_HKDF_Ctx;
/**
* @ingroup HKDF
* @brief Generate HKDF context.
*
* @retval Success: hkdf ctx.
* Fails: NULL.
*/
CRYPT_HKDF_Ctx* CRYPT_HKDF_NewCtx(void);
/**
* @ingroup HKDF
* @brief Generate HKDF context.
*
* @param libCtx [in] library context
* @retval Success: hkdf ctx.
* Fails: NULL.
*/
CRYPT_HKDF_Ctx* CRYPT_HKDF_NewCtxEx(void *libCtx);
/**
* @ingroup HKDF
* @brief Set parameters for the HKDF context.
*
* @param ctx [in, out] Pointer to the HKDF context.
* @param param [in] Either a MAC algorithm ID, a salt, a password, or an iteration count.
*
* @retval Success: CRYPT_SUCCESS
* For other error codes, see crypt_errno.h.
*/
int32_t CRYPT_HKDF_SetParam(CRYPT_HKDF_Ctx *ctx, const BSL_Param *param);
/**
* @ingroup HKDF
* @brief Obtain the derived key based on the passed HKDF context..
*
* @param ctx [in, out] Pointer to the HKDF context.
* @param out [out] Derived key buffer.
* @param out [out] Derived key buffer size.
*
* @retval Success: CRYPT_SUCCESS
* For other error codes, see crypt_errno.h.
*/
int32_t CRYPT_HKDF_Derive(CRYPT_HKDF_Ctx *ctx, uint8_t *out, uint32_t len);
/**
* @ingroup HKDF
* @brief HKDF deinitialization API
*
* @param ctx [in, out] Pointer to the HKDF context.
*
* @retval #CRYPT_SUCCESS Deinitialization succeeded.
* @retval #CRYPT_NULL_INPUT Pointer ctx is NULL
*/
int32_t CRYPT_HKDF_Deinit(CRYPT_HKDF_Ctx *ctx);
/**
* @ingroup HKDF
* @brief free HKDF context.
*
* @param ctx [IN] HKDF handle
*/
void CRYPT_HKDF_FreeCtx(CRYPT_HKDF_Ctx *ctx);
#ifdef __cplusplus
}
#endif // __cplusplus
#endif // HITLS_CRYPTO_HKDF
#endif // CRYPT_HKDF_H
|
2301_79861745/bench_create
|
crypto/hkdf/include/crypt_hkdf.h
|
C
|
unknown
| 2,483
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_HKDF
#include <stdint.h>
#include "securec.h"
#include "bsl_err_internal.h"
#include "bsl_sal.h"
#include "crypt_local_types.h"
#include "crypt_errno.h"
#include "crypt_utils.h"
#include "eal_mac_local.h"
#include "bsl_params.h"
#include "crypt_params_key.h"
#include "crypt_hkdf.h"
#define HKDF_MAX_HMACSIZE 64
static const uint32_t HKDF_ID_LIST[] = {
CRYPT_MAC_HMAC_MD5,
CRYPT_MAC_HMAC_SHA1,
CRYPT_MAC_HMAC_SHA224,
CRYPT_MAC_HMAC_SHA256,
CRYPT_MAC_HMAC_SHA384,
CRYPT_MAC_HMAC_SHA512,
};
bool CRYPT_HKDF_IsValidAlgId(CRYPT_MAC_AlgId id)
{
return ParamIdIsValid(id, HKDF_ID_LIST, sizeof(HKDF_ID_LIST) / sizeof(HKDF_ID_LIST[0]));
}
struct CryptHkdfCtx {
CRYPT_MAC_AlgId macId;
EAL_MacMethod macMeth;
uint16_t mdSize;
CRYPT_HKDF_MODE mode;
void *macCtx;
uint8_t *key;
uint32_t keyLen;
uint8_t *salt;
uint32_t saltLen;
uint8_t *prk;
uint32_t prkLen;
uint8_t *info;
uint32_t infoLen;
uint32_t *outLen;
#ifdef HITLS_CRYPTO_PROVIDER
void *libCtx;
#endif
bool hasGetMdSize;
};
static bool CheckMacMethod(const EAL_MacMethod *macMeth)
{
return macMeth->freeCtx != NULL && macMeth->init != NULL &&
macMeth->update != NULL && macMeth->final != NULL && macMeth->deinit != NULL &&
macMeth->reinit != NULL;
}
int32_t CRYPT_HKDF_Extract(void *macCtx, const EAL_MacMethod *macMeth, const uint8_t *key,
uint32_t keyLen, const uint8_t *salt, uint32_t saltLen, uint8_t *prk, uint32_t *prkLen)
{
int32_t ret;
if (macCtx == NULL || macMeth == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (CheckMacMethod(macMeth) == false) {
BSL_ERR_PUSH_ERROR(CRYPT_HKDF_ERR_MAC_METH);
return CRYPT_HKDF_ERR_MAC_METH;
}
if (key == NULL && keyLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (salt == NULL && saltLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
(void)macMeth->deinit(macCtx);
GOTO_ERR_IF(macMeth->init(macCtx, salt, saltLen, NULL), ret);
GOTO_ERR_IF(macMeth->update(macCtx, key, keyLen), ret);
GOTO_ERR_IF(macMeth->final(macCtx, prk, prkLen), ret);
ERR:
(void)macMeth->deinit(macCtx);
return ret;
}
static int32_t HKDF_ExpandParamCheck(void *macCtx, const EAL_MacMethod *macMeth, uint16_t mdSize, const uint8_t *prk,
uint32_t prkLen, const uint8_t *info, uint32_t infoLen, const uint8_t *out, uint32_t outLen)
{
if (macCtx == NULL || macMeth == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (CheckMacMethod(macMeth) == false) {
BSL_ERR_PUSH_ERROR(CRYPT_HKDF_ERR_MAC_METH);
return CRYPT_HKDF_ERR_MAC_METH;
}
if (prk == NULL && prkLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (info == NULL && infoLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if ((out == NULL) || (outLen == 0)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (mdSize == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_HKDF_PARAM_ERROR);
return CRYPT_HKDF_PARAM_ERROR;
}
/* len cannot be larger than 255 * hashLen */
if (outLen > mdSize * 255) {
BSL_ERR_PUSH_ERROR(CRYPT_HKDF_DKLEN_OVERFLOW);
return CRYPT_HKDF_DKLEN_OVERFLOW;
}
return CRYPT_SUCCESS;
}
int32_t CRYPT_HKDF_Expand(void *macCtx, const EAL_MacMethod *macMeth, uint16_t mdSize,
const uint8_t *prk, uint32_t prkLen, const uint8_t *info, uint32_t infoLen, uint8_t *out, uint32_t outLen)
{
int32_t ret = HKDF_ExpandParamCheck(macCtx, macMeth, mdSize, prk, prkLen, info, infoLen, out, outLen);
if (ret != CRYPT_SUCCESS) {
return ret;
}
uint8_t hash[HKDF_MAX_HMACSIZE];
uint32_t hashLen = mdSize;
uint8_t counter = 1;
uint32_t totalLen = 0;
uint32_t n;
(void)macMeth->deinit(macCtx);
GOTO_ERR_IF(macMeth->init(macCtx, prk, prkLen, NULL), ret);
/* ceil(a / b) = (a + b - 1) / b */
n = (outLen + hashLen - 1) / hashLen;
for (uint32_t i = 1; i <= n; i++, counter++) {
if (i > 1) {
macMeth->reinit(macCtx);
GOTO_ERR_IF(macMeth->update(macCtx, hash, hashLen), ret);
}
GOTO_ERR_IF(macMeth->update(macCtx, info, infoLen), ret);
GOTO_ERR_IF(macMeth->update(macCtx, &counter, 1), ret);
GOTO_ERR_IF(macMeth->final(macCtx, hash, &hashLen), ret);
hashLen = hashLen > (outLen - totalLen) ? (outLen - totalLen) : hashLen;
(void)memcpy_s(out + totalLen, outLen - totalLen, hash, hashLen);
totalLen += hashLen;
}
ERR:
(void)macMeth->deinit(macCtx);
return ret;
}
int32_t CRYPT_HKDF(void *macCtx, const EAL_MacMethod *macMeth, uint16_t mdSize,
const uint8_t *key, uint32_t keyLen, const uint8_t *salt, uint32_t saltLen,
const uint8_t *info, uint32_t infoLen, uint8_t *out, uint32_t len)
{
int ret;
uint8_t prk[HKDF_MAX_HMACSIZE];
uint32_t prkLen = HKDF_MAX_HMACSIZE;
ret = CRYPT_HKDF_Extract(macCtx, macMeth, key, keyLen, salt, saltLen, prk, &prkLen);
if (ret != CRYPT_SUCCESS) {
return ret;
}
return CRYPT_HKDF_Expand(macCtx, macMeth, mdSize, prk, prkLen, info, infoLen, out, len);
}
CRYPT_HKDF_Ctx* CRYPT_HKDF_NewCtx(void)
{
CRYPT_HKDF_Ctx *ctx = BSL_SAL_Calloc(1, sizeof(CRYPT_HKDF_Ctx));
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
return ctx;
}
#ifdef HITLS_CRYPTO_PROVIDER
CRYPT_HKDF_Ctx* CRYPT_HKDF_NewCtxEx(void *libCtx)
{
(void)libCtx;
CRYPT_HKDF_Ctx *ctx = BSL_SAL_Calloc(1, sizeof(CRYPT_HKDF_Ctx));
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
#ifdef HITLS_CRYPTO_PROVIDER
ctx->libCtx = libCtx;
#endif
return ctx;
}
#endif
static int32_t HkdfGetMdSize(CRYPT_HKDF_Ctx *ctx, const char *mdAttr)
{
if (ctx->hasGetMdSize) {
return CRYPT_SUCCESS;
}
void *libCtx = NULL;
#ifdef HITLS_CRYPTO_PROVIDER
libCtx = ctx->libCtx;
#endif
EAL_MdMethod mdMeth = {0};
EAL_MacDepMethod depMeth = {.method = {.md = &mdMeth}};
int32_t ret = EAL_MacFindDepMethod(ctx->macId, libCtx, mdAttr, &depMeth, NULL, true);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ctx->mdSize = mdMeth.mdSize;
ctx->hasGetMdSize = true;
return CRYPT_SUCCESS;
}
int32_t CRYPT_HKDF_SetMacMethod(CRYPT_HKDF_Ctx *ctx, const CRYPT_MAC_AlgId id)
{
if (!CRYPT_HKDF_IsValidAlgId(id)) {
BSL_ERR_PUSH_ERROR(CRYPT_HKDF_PARAM_ERROR);
return CRYPT_HKDF_PARAM_ERROR;
}
// free the old macCtx
if (ctx->macCtx != NULL) {
if (ctx->macMeth.freeCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_PBKDF2_ERR_MAC_METH);
return CRYPT_PBKDF2_ERR_MAC_METH;
}
ctx->macMeth.freeCtx(ctx->macCtx);
ctx->macCtx = NULL;
(void)memset_s(&ctx->macMeth, sizeof(EAL_MacMethod), 0, sizeof(EAL_MacMethod));
}
EAL_MacMethod *macMeth = EAL_MacFindMethod(id, &ctx->macMeth);
if (macMeth == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_METH_NULL_MEMBER);
return CRYPT_EAL_ERR_METH_NULL_MEMBER;
}
if (macMeth->newCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_HKDF_ERR_MAC_METH);
return CRYPT_HKDF_ERR_MAC_METH;
}
#ifdef HITLS_CRYPTO_PROVIDER
ctx->macCtx = macMeth->newCtx(ctx->libCtx, id);
#else
ctx->macCtx = macMeth->newCtx(NULL, id);
#endif
if (ctx->macCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ctx->macId = id;
return CRYPT_SUCCESS;
}
int32_t CRYPT_HKDF_SetKey(CRYPT_HKDF_Ctx *ctx, const uint8_t *key, uint32_t keyLen)
{
if (key == NULL && keyLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
BSL_SAL_ClearFree((void *)ctx->key, ctx->keyLen);
ctx->key = BSL_SAL_Dump(key, keyLen);
if (ctx->key == NULL && keyLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ctx->keyLen = keyLen;
return CRYPT_SUCCESS;
}
int32_t CRYPT_HKDF_SetSalt(CRYPT_HKDF_Ctx *ctx, const uint8_t *salt, uint32_t saltLen)
{
if (salt == NULL && saltLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
BSL_SAL_FREE(ctx->salt);
ctx->salt = BSL_SAL_Dump(salt, saltLen);
if (ctx->salt == NULL && saltLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ctx->saltLen = saltLen;
return CRYPT_SUCCESS;
}
int32_t CRYPT_HKDF_SetPRK(CRYPT_HKDF_Ctx *ctx, const uint8_t *prk, uint32_t prkLen)
{
if (prk == NULL && prkLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
BSL_SAL_ClearFree((void *)ctx->prk, ctx->prkLen);
ctx->prk = BSL_SAL_Dump(prk, prkLen);
if (ctx->prk == NULL && prkLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ctx->prkLen = prkLen;
return CRYPT_SUCCESS;
}
int32_t CRYPT_HKDF_SetInfo(CRYPT_HKDF_Ctx *ctx, const uint8_t *info, uint32_t infoLen)
{
if (info == NULL && infoLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
BSL_SAL_ClearFree((void *)ctx->info, ctx->infoLen);
ctx->info = BSL_SAL_Dump(info, infoLen);
if (ctx->info == NULL && infoLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ctx->infoLen = infoLen;
return CRYPT_SUCCESS;
}
int32_t CRYPT_HKDF_SetOutLen(CRYPT_HKDF_Ctx *ctx, uint32_t *outLen)
{
if (outLen == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
ctx->outLen = outLen;
return CRYPT_SUCCESS;
}
#ifdef HITLS_CRYPTO_PROVIDER
static int32_t CRYPT_HKDF_SetMdAttr(CRYPT_HKDF_Ctx *ctx, const char *mdAttr, uint32_t valLen)
{
if (mdAttr == NULL || valLen == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_HKDF_PARAM_ERROR);
return CRYPT_HKDF_PARAM_ERROR;
}
if (ctx->macCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_HKDF_ERR_MAC_ID_NOT_SET);
return CRYPT_HKDF_ERR_MAC_ID_NOT_SET;
}
// Set mdAttr for macCtx
if (ctx->macMeth.setParam == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_HKDF_ERR_MAC_METH);
return CRYPT_HKDF_ERR_MAC_METH;
}
BSL_Param param[] = {
{.key = CRYPT_PARAM_MD_ATTR, .valueType = BSL_PARAM_TYPE_UTF8_STR,
.value = (void *)(uintptr_t)mdAttr, .valueLen = valLen, .useLen = 0},
BSL_PARAM_END
};
int32_t ret = ctx->macMeth.setParam(ctx->macCtx, param);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
}
return HkdfGetMdSize(ctx, mdAttr);
}
#endif
int32_t CRYPT_HKDF_SetParam(CRYPT_HKDF_Ctx *ctx, const BSL_Param *param)
{
uint32_t val = 0;
void *ptrVal = NULL;
uint32_t len = 0;
const BSL_Param *temp = NULL;
int32_t ret = CRYPT_HKDF_PARAM_ERROR;
if (ctx == NULL || param == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_KDF_MAC_ID)) != NULL) {
len = sizeof(val);
GOTO_ERR_IF(BSL_PARAM_GetValue(temp, CRYPT_PARAM_KDF_MAC_ID,
BSL_PARAM_TYPE_UINT32, &val, &len), ret);
GOTO_ERR_IF(CRYPT_HKDF_SetMacMethod(ctx, val), ret);
}
if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_KDF_MODE)) != NULL) {
len = sizeof(val);
GOTO_ERR_IF(BSL_PARAM_GetValue(temp, CRYPT_PARAM_KDF_MODE,
BSL_PARAM_TYPE_UINT32, &val, &len), ret);
ctx->mode = val;
}
if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_KDF_KEY)) != NULL) {
GOTO_ERR_IF(CRYPT_HKDF_SetKey(ctx, temp->value, temp->valueLen), ret);
}
if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_KDF_SALT)) != NULL) {
GOTO_ERR_IF(CRYPT_HKDF_SetSalt(ctx, temp->value, temp->valueLen), ret);
}
if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_KDF_PRK)) != NULL) {
GOTO_ERR_IF(CRYPT_HKDF_SetPRK(ctx, temp->value, temp->valueLen), ret);
}
if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_KDF_INFO)) != NULL) {
GOTO_ERR_IF(CRYPT_HKDF_SetInfo(ctx, temp->value, temp->valueLen), ret);
}
if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_KDF_EXLEN)) != NULL) {
len = sizeof(val);
GOTO_ERR_IF(BSL_PARAM_GetPtrValue(temp, CRYPT_PARAM_KDF_EXLEN, BSL_PARAM_TYPE_UINT32_PTR, &ptrVal, &len), ret);
GOTO_ERR_IF(CRYPT_HKDF_SetOutLen(ctx, ptrVal), ret);
}
#ifdef HITLS_CRYPTO_PROVIDER
if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_MD_ATTR)) != NULL) {
GOTO_ERR_IF(CRYPT_HKDF_SetMdAttr(ctx, temp->value, temp->valueLen), ret);
}
#endif
ERR:
return ret;
}
int32_t CRYPT_HKDF_Derive(CRYPT_HKDF_Ctx *ctx, uint8_t *out, uint32_t len)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
void *macCtx = ctx->macCtx;
const EAL_MacMethod *macMeth = &ctx->macMeth;
const uint8_t *key = ctx->key;
uint32_t keyLen = ctx->keyLen;
const uint8_t *salt = ctx->salt;
uint32_t saltLen = ctx->saltLen;
const uint8_t *prk = ctx->prk;
uint32_t prkLen = ctx->prkLen;
const uint8_t *info = ctx->info;
uint32_t infoLen = ctx->infoLen;
uint32_t *outLen = ctx->outLen;
int32_t ret = HkdfGetMdSize(ctx, NULL);
if (ret != CRYPT_SUCCESS) {
return ret;
}
switch (ctx->mode) {
case CRYPT_KDF_HKDF_MODE_FULL:
return CRYPT_HKDF(macCtx, macMeth, ctx->mdSize, key, keyLen, salt, saltLen, info, infoLen, out, len);
case CRYPT_KDF_HKDF_MODE_EXTRACT:
return CRYPT_HKDF_Extract(macCtx, macMeth, key, keyLen, salt, saltLen, out, outLen);
case CRYPT_KDF_HKDF_MODE_EXPAND:
return CRYPT_HKDF_Expand(macCtx, macMeth, ctx->mdSize, prk, prkLen, info, infoLen, out, len);
default:
return CRYPT_HKDF_PARAM_ERROR;
}
}
int32_t CRYPT_HKDF_Deinit(CRYPT_HKDF_Ctx *ctx)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->macMeth.freeCtx != NULL) {
ctx->macMeth.freeCtx(ctx->macCtx);
ctx->macCtx = NULL;
}
BSL_SAL_ClearFree((void *)ctx->key, ctx->keyLen);
BSL_SAL_FREE(ctx->salt);
BSL_SAL_ClearFree((void *)ctx->prk, ctx->prkLen);
BSL_SAL_ClearFree((void *)ctx->info, ctx->infoLen);
(void)memset_s(ctx, sizeof(CRYPT_HKDF_Ctx), 0, sizeof(CRYPT_HKDF_Ctx));
return CRYPT_SUCCESS;
}
void CRYPT_HKDF_FreeCtx(CRYPT_HKDF_Ctx *ctx)
{
if (ctx == NULL) {
return;
}
if (ctx->macMeth.freeCtx != NULL) {
ctx->macMeth.freeCtx(ctx->macCtx);
}
BSL_SAL_ClearFree((void *)ctx->key, ctx->keyLen);
BSL_SAL_FREE(ctx->salt);
BSL_SAL_ClearFree((void *)ctx->prk, ctx->prkLen);
BSL_SAL_ClearFree((void *)ctx->info, ctx->infoLen);
BSL_SAL_Free(ctx);
}
#endif // HITLS_CRYPTO_HKDF
|
2301_79861745/bench_create
|
crypto/hkdf/src/hkdf.c
|
C
|
unknown
| 15,939
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_HMAC_H
#define CRYPT_HMAC_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_HMAC
#include <stdint.h>
#include "crypt_local_types.h"
#include "bsl_params.h"
#ifdef __cplusplus
extern "C" {
#endif /* __cplusplus */
#define HMAC_MAXBLOCKSIZE 144
#define HMAC_MAXOUTSIZE 64
typedef struct HMAC_Ctx CRYPT_HMAC_Ctx;
CRYPT_HMAC_Ctx *CRYPT_HMAC_NewCtx(CRYPT_MAC_AlgId id);
CRYPT_HMAC_Ctx *CRYPT_HMAC_NewCtxEx(void *libCtx, CRYPT_MAC_AlgId id);
int32_t CRYPT_HMAC_Init(CRYPT_HMAC_Ctx *ctx, const uint8_t *key, uint32_t len, BSL_Param *param);
int32_t CRYPT_HMAC_Update(CRYPT_HMAC_Ctx *ctx, const uint8_t *in, uint32_t len);
int32_t CRYPT_HMAC_Final(CRYPT_HMAC_Ctx *ctx, uint8_t *out, uint32_t *len);
int32_t CRYPT_HMAC_Reinit(CRYPT_HMAC_Ctx *ctx);
int32_t CRYPT_HMAC_Deinit(CRYPT_HMAC_Ctx *ctx);
int32_t CRYPT_HMAC_Ctrl(CRYPT_HMAC_Ctx *ctx, CRYPT_MacCtrl opt, void *val, uint32_t len);
#ifdef HITLS_CRYPTO_PROVIDER
int32_t CRYPT_HMAC_SetParam(CRYPT_HMAC_Ctx *ctx, const BSL_Param *param);
#else
#define CRYPT_HMAC_SetParam NULL
#endif // HITLS_CRYPTO_PROVIDER
void CRYPT_HMAC_FreeCtx(CRYPT_HMAC_Ctx *ctx);
#ifdef __cplusplus
}
#endif /* __cplusplus */
#endif // HITLS_CRYPTO_HMAC
#endif // CRYPT_HMAC_H
|
2301_79861745/bench_create
|
crypto/hmac/include/crypt_hmac.h
|
C
|
unknown
| 1,760
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_HMAC
#include <stdlib.h>
#include "securec.h"
#include "bsl_sal.h"
#include "crypt_errno.h"
#include "bsl_err_internal.h"
#include "crypt_utils.h"
#include "eal_mac_local.h"
#include "crypt_local_types.h"
#include "crypt_hmac.h"
struct HMAC_Ctx {
CRYPT_MAC_AlgId hmacId;
EAL_MdMethod method;
void *mdCtx; /* md ctx */
void *oCtx; /* opad ctx */
void *iCtx; /* ipad ctx */
#ifdef HITLS_CRYPTO_PROVIDER
void *libCtx; /* library context for external provider */
#endif
};
CRYPT_HMAC_Ctx *CRYPT_HMAC_NewCtx(CRYPT_MAC_AlgId id)
{
CRYPT_HMAC_Ctx *ctx = BSL_SAL_Calloc(1, sizeof(CRYPT_HMAC_Ctx));
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
ctx->hmacId = id;
return ctx;
}
CRYPT_HMAC_Ctx *CRYPT_HMAC_NewCtxEx(void *libCtx, CRYPT_MAC_AlgId id)
{
CRYPT_HMAC_Ctx *ctx = BSL_SAL_Calloc(1, sizeof(CRYPT_HMAC_Ctx));
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
ctx->hmacId = id;
#ifdef HITLS_CRYPTO_PROVIDER
ctx->libCtx = libCtx;
#else
(void)libCtx;
#endif
return ctx;
}
static void HmacCleanseData(uint8_t *tmp, uint32_t tmpLen, uint8_t *ipad, uint32_t ipadLen,
uint8_t *opad, uint32_t opadLen)
{
BSL_SAL_CleanseData(tmp, tmpLen);
BSL_SAL_CleanseData(ipad, ipadLen);
BSL_SAL_CleanseData(opad, opadLen);
}
static int32_t HmacInitMdCtx(CRYPT_HMAC_Ctx *ctx, const char *attr)
{
if (ctx->mdCtx != NULL) { // already initialized at ctrl or init
return CRYPT_SUCCESS;
}
#ifdef HITLS_CRYPTO_PROVIDER
void *libCtx = ctx->libCtx;
#else
void *libCtx = NULL;
#endif
void *provCtx = NULL;
EAL_MacDepMethod depMeth = {.method = {.md = &ctx->method}};
int32_t ret = EAL_MacFindDepMethod(ctx->hmacId, libCtx, attr, &depMeth, &provCtx, true);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
if (ctx->method.newCtx == NULL || ctx->method.freeCtx == NULL) { // Check the method will be used.
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
ctx->mdCtx = ctx->method.newCtx(provCtx, depMeth.id.mdId);
if (ctx->mdCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
goto ERR;
}
ctx->iCtx = ctx->method.newCtx(provCtx, depMeth.id.mdId);
if (ctx->iCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
goto ERR;
}
ctx->oCtx = ctx->method.newCtx(provCtx, depMeth.id.mdId);
if (ctx->oCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
goto ERR;
}
return CRYPT_SUCCESS;
ERR:
ctx->method.freeCtx(ctx->mdCtx);
ctx->mdCtx = NULL;
ctx->method.freeCtx(ctx->iCtx);
ctx->iCtx = NULL;
ctx->method.freeCtx(ctx->oCtx);
ctx->oCtx = NULL;
return CRYPT_MEM_ALLOC_FAIL;
}
int32_t CRYPT_HMAC_Init(CRYPT_HMAC_Ctx *ctx, const uint8_t *key, uint32_t len, BSL_Param *param)
{
(void)param;
if (ctx == NULL || (key == NULL && len != 0)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
uint8_t tmp[HMAC_MAXBLOCKSIZE];
uint32_t tmpLen = HMAC_MAXBLOCKSIZE;
const uint8_t *keyTmp = key;
uint32_t i, keyLen = len;
uint8_t ipad[HMAC_MAXBLOCKSIZE];
uint8_t opad[HMAC_MAXBLOCKSIZE];
int32_t ret = HmacInitMdCtx(ctx, NULL);
if (ret != CRYPT_SUCCESS) {
return ret;
}
if (ctx->method.init == NULL || ctx->method.update == NULL || ctx->method.final == NULL ||
ctx->method.deinit == NULL || ctx->method.copyCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (keyLen > ctx->method.blockSize) {
keyTmp = tmp;
GOTO_ERR_IF(ctx->method.init(ctx->mdCtx, NULL), ret);
GOTO_ERR_IF(ctx->method.update(ctx->mdCtx, key, keyLen), ret);
GOTO_ERR_IF(ctx->method.final(ctx->mdCtx, tmp, &tmpLen), ret);
keyLen = ctx->method.mdSize;
}
for (i = 0; i < keyLen; i++) {
ipad[i] = 0x36 ^ keyTmp[i];
opad[i] = 0x5c ^ keyTmp[i];
}
for (i = keyLen; i < ctx->method.blockSize; i++) {
ipad[i] = 0x36;
opad[i] = 0x5c;
}
GOTO_ERR_IF(ctx->method.init(ctx->iCtx, NULL), ret);
GOTO_ERR_IF(ctx->method.update(ctx->iCtx, ipad, ctx->method.blockSize), ret);
GOTO_ERR_IF(ctx->method.init(ctx->oCtx, NULL), ret);
GOTO_ERR_IF(ctx->method.update(ctx->oCtx, opad, ctx->method.blockSize), ret);
GOTO_ERR_IF(ctx->method.copyCtx(ctx->mdCtx, ctx->iCtx), ret);
HmacCleanseData(tmp, HMAC_MAXBLOCKSIZE, ipad, HMAC_MAXBLOCKSIZE, opad, HMAC_MAXBLOCKSIZE);
return CRYPT_SUCCESS;
ERR:
HmacCleanseData(tmp, HMAC_MAXBLOCKSIZE, ipad, HMAC_MAXBLOCKSIZE, opad, HMAC_MAXBLOCKSIZE);
ctx->method.deinit(ctx->mdCtx);
ctx->method.deinit(ctx->iCtx);
ctx->method.deinit(ctx->oCtx);
return ret;
}
int32_t CRYPT_HMAC_Update(CRYPT_HMAC_Ctx *ctx, const uint8_t *in, uint32_t len)
{
if (ctx == NULL || ctx->method.update == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
return ctx->method.update(ctx->mdCtx, in, len);
}
int32_t CRYPT_HMAC_Final(CRYPT_HMAC_Ctx *ctx, uint8_t *out, uint32_t *len)
{
if (ctx == NULL || ctx->method.final == NULL || ctx->method.copyCtx == NULL || ctx->method.update == NULL ||
out == NULL || len == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
const EAL_MdMethod *method = &ctx->method;
if (*len < method->mdSize) {
BSL_ERR_PUSH_ERROR(CRYPT_HMAC_OUT_BUFF_LEN_NOT_ENOUGH);
return CRYPT_HMAC_OUT_BUFF_LEN_NOT_ENOUGH;
}
*len = method->mdSize;
uint8_t tmp[HMAC_MAXOUTSIZE];
uint32_t tmpLen = sizeof(tmp);
int32_t ret = method->final(ctx->mdCtx, tmp, &tmpLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ret = method->copyCtx(ctx->mdCtx, ctx->oCtx);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ret = method->update(ctx->mdCtx, tmp, tmpLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
return method->final(ctx->mdCtx, out, len);
}
int32_t CRYPT_HMAC_Reinit(CRYPT_HMAC_Ctx *ctx)
{
if (ctx == NULL || ctx->method.copyCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
ctx->method.copyCtx(ctx->mdCtx, ctx->iCtx);
return CRYPT_SUCCESS;
}
int32_t CRYPT_HMAC_Deinit(CRYPT_HMAC_Ctx *ctx)
{
if (ctx == NULL || ctx->method.deinit == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
(void)ctx->method.deinit(ctx->mdCtx);
(void)ctx->method.deinit(ctx->iCtx);
(void)ctx->method.deinit(ctx->oCtx);
return CRYPT_SUCCESS;
}
static int32_t CRYPT_HMAC_GetMacLen(CRYPT_HMAC_Ctx *ctx)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return 0;
}
int32_t ret = HmacInitMdCtx(ctx, NULL);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return 0;
}
return ctx->method.mdSize;
}
static int32_t HmacGetLen(CRYPT_HMAC_Ctx *ctx, GetLenFunc func, void *val, uint32_t len)
{
if (len != sizeof(uint32_t)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
*(uint32_t *)val = func(ctx);
return CRYPT_SUCCESS;
}
int32_t CRYPT_HMAC_Ctrl(CRYPT_HMAC_Ctx *ctx, CRYPT_MacCtrl opt, void *val, uint32_t len)
{
if (ctx == NULL || val == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
switch (opt) {
case CRYPT_CTRL_GET_MACLEN:
return HmacGetLen(ctx, (GetLenFunc)CRYPT_HMAC_GetMacLen, val, len);
default:
BSL_ERR_PUSH_ERROR(CRYPT_HMAC_ERR_UNSUPPORTED_CTRL_OPTION);
return CRYPT_HMAC_ERR_UNSUPPORTED_CTRL_OPTION;
}
}
static void HmacFreeMdCtx(CRYPT_HMAC_Ctx *ctx)
{
if (ctx->method.freeCtx == NULL) {
return;
}
ctx->method.freeCtx(ctx->mdCtx);
ctx->mdCtx = NULL;
ctx->method.freeCtx(ctx->iCtx);
ctx->iCtx = NULL;
ctx->method.freeCtx(ctx->oCtx);
ctx->oCtx = NULL;
}
#ifdef HITLS_CRYPTO_PROVIDER
int32_t CRYPT_HMAC_SetParam(CRYPT_HMAC_Ctx *ctx, const BSL_Param *param)
{
const BSL_Param *temp = NULL;
int32_t ret = CRYPT_HMAC_PARAM_ERROR;
if (ctx == NULL || param == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_MD_ATTR)) != NULL) {
if (temp->valueLen == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_HMAC_PARAM_ERROR);
return CRYPT_HMAC_PARAM_ERROR;
}
HmacFreeMdCtx(ctx);
GOTO_ERR_IF(HmacInitMdCtx(ctx, (const char *)temp->value), ret);
}
ERR:
return ret;
}
#endif // HITLS_CRYPTO_PROVIDER
void CRYPT_HMAC_FreeCtx(CRYPT_HMAC_Ctx *ctx)
{
if (ctx == NULL) {
return;
}
HmacFreeMdCtx(ctx);
BSL_SAL_Free(ctx);
}
#endif // HITLS_CRYPTO_HMAC
|
2301_79861745/bench_create
|
crypto/hmac/src/hmac.c
|
C
|
unknown
| 9,767
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_HPKE)
#include <string.h>
#include "securec.h"
#include "crypt_eal_pkey.h"
#include "crypt_eal_kdf.h"
#include "crypt_eal_cipher.h"
#include "crypt_eal_rand.h"
#include "crypt_algid.h"
#include "crypt_errno.h"
#include "crypt_bn.h"
#include "crypt_params_key.h"
#include "bsl_err_internal.h"
#include "bsl_sal.h"
#include "bsl_bytes.h"
#include "crypt_eal_hpke.h"
// Data from RFC9180
#define HPKE_HKDF_MAX_EXTRACT_KEY_LEN 64
#define HPKE_KEM_MAX_SHARED_KEY_LEN 64
#define HPKE_KEM_MAX_ENCAPSULATED_KEY_LEN 133
#define HPKE_KEM_MAX_PUBLIC_KEY_LEN 133
#define HPKE_KEM_MAX_PRIVATE_KEY_LEN 66
#define HPKE_KEM_DH_MAX_SHARED_KEY_LEN 66 // p521 key length
#define MAX_ECC_PARAM_LEN 66
#define HPKE_AEAD_NONCE_LEN 12
#define HPKE_AEAD_TAG_LEN 16
#define HPKE_KEM_SUITEID_LEN 5
#define HPKE_HPKE_SUITEID_LEN 10
typedef struct {
// PSK mode
uint8_t *psk;
uint32_t pskLen;
uint8_t *pskId;
uint32_t pskIdLen;
// AUTH mode, Sender's private key held by the sender, Sender's public key held by the recipient
CRYPT_EAL_PkeyCtx *authPkey;
} AuthInfo;
struct CRYPT_EAL_HpkeCtx {
uint8_t role; // Sender or Recipient
uint8_t mode; // HPKE mode
uint8_t kemIndex;
uint8_t kdfIndex;
uint8_t aeadIndex;
uint8_t *symKey;
uint8_t *baseNonce;
uint32_t symKeyLen;
uint32_t baseNonceLen;
uint8_t *exporterSecret;
uint8_t *sharedSecret;
uint32_t exporterSecretLen;
uint32_t sharedSecretLen;
uint64_t seq; // Message sequence number
CRYPT_EAL_KdfCTX *kdfCtx;
CRYPT_EAL_CipherCtx *cipherCtx;
CRYPT_EAL_LibCtx *libCtx;
char *attrName;
AuthInfo *authInfo;
};
typedef struct {
uint16_t hpkeKemId;
CRYPT_PKEY_AlgId pkeyId;
CRYPT_PKEY_ParaId curveId;
CRYPT_MAC_AlgId macId;
uint16_t privateKeyLen;
uint16_t sharedKeyLen;
uint16_t encapsulatedKeyLen;
uint16_t hkdfExtractKeyLen;
} HPKE_KemAlgInfo;
typedef struct {
uint16_t hpkeKdfId;
uint16_t hkdfExtractKeyLen;
CRYPT_MAC_AlgId macId;
} HPKE_KdfAlgInfo;
typedef struct {
uint16_t hpkeAeadId;
uint16_t keyLen;
CRYPT_CIPHER_AlgId cipherId;
} HPKE_AeadAlgInfo;
#define HPKE_INVALID_ALG_INDEX 0xFF
static HPKE_KemAlgInfo g_hpkeKemAlgInfo[] = {
{CRYPT_KEM_DHKEM_P256_HKDF_SHA256, CRYPT_PKEY_ECDH, CRYPT_ECC_NISTP256, CRYPT_MAC_HMAC_SHA256, 32, 32, 65, 32},
{CRYPT_KEM_DHKEM_P384_HKDF_SHA384, CRYPT_PKEY_ECDH, CRYPT_ECC_NISTP384, CRYPT_MAC_HMAC_SHA384, 48, 48, 97, 48},
{CRYPT_KEM_DHKEM_P521_HKDF_SHA512, CRYPT_PKEY_ECDH, CRYPT_ECC_NISTP521, CRYPT_MAC_HMAC_SHA512, 66, 64, 133, 64},
{CRYPT_KEM_DHKEM_X25519_HKDF_SHA256, CRYPT_PKEY_X25519, CRYPT_PKEY_PARAID_MAX, CRYPT_MAC_HMAC_SHA256, 32, 32, 32,
32},
};
static HPKE_KdfAlgInfo g_hpkeKdfAlgInfo[] = {
{CRYPT_KDF_HKDF_SHA256, 32, CRYPT_MAC_HMAC_SHA256},
{CRYPT_KDF_HKDF_SHA384, 48, CRYPT_MAC_HMAC_SHA384},
{CRYPT_KDF_HKDF_SHA512, 64, CRYPT_MAC_HMAC_SHA512},
};
static HPKE_AeadAlgInfo g_hpkeAeadAlgInfo[] = {
{CRYPT_AEAD_AES_128_GCM, 16, CRYPT_CIPHER_AES128_GCM},
{CRYPT_AEAD_AES_256_GCM, 32, CRYPT_CIPHER_AES256_GCM},
{CRYPT_AEAD_CHACHA20_POLY1305, 32, CRYPT_CIPHER_CHACHA20_POLY1305},
{CRYPT_AEAD_EXPORT_ONLY, 0, CRYPT_CIPHER_MAX},
};
static int32_t HpkeCheckCipherSuite(const CRYPT_HPKE_CipherSuite *cipherSuite, uint8_t *kemIndex, uint8_t *kdfIndex,
uint8_t *aeadIndex)
{
uint8_t kemPosition = HPKE_INVALID_ALG_INDEX;
uint8_t kdfPosition = HPKE_INVALID_ALG_INDEX;
uint8_t aeadPosition = HPKE_INVALID_ALG_INDEX;
uint8_t i;
for (i = 0; i < sizeof(g_hpkeKemAlgInfo) / sizeof(HPKE_KemAlgInfo); i++) {
if (cipherSuite->kemId == g_hpkeKemAlgInfo[i].hpkeKemId) {
kemPosition = i;
break;
}
}
for (i = 0; i < sizeof(g_hpkeKdfAlgInfo) / sizeof(HPKE_KdfAlgInfo); i++) {
if (cipherSuite->kdfId == g_hpkeKdfAlgInfo[i].hpkeKdfId) {
kdfPosition = i;
break;
}
}
for (i = 0; i < sizeof(g_hpkeAeadAlgInfo) / sizeof(HPKE_AeadAlgInfo); i++) {
if (cipherSuite->aeadId == g_hpkeAeadAlgInfo[i].hpkeAeadId) {
aeadPosition = i;
break;
}
}
if (kemPosition == HPKE_INVALID_ALG_INDEX || kdfPosition == HPKE_INVALID_ALG_INDEX ||
aeadPosition == HPKE_INVALID_ALG_INDEX) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
if (kemIndex != NULL) {
*kemIndex = kemPosition;
}
if (kdfIndex != NULL) {
*kdfIndex = kdfPosition;
}
if (aeadIndex != NULL) {
*aeadIndex = aeadPosition;
}
return CRYPT_SUCCESS;
}
static int32_t InitCipherSuiteCtx(CRYPT_EAL_HpkeCtx *ctx, uint8_t aeadIndex, CRYPT_EAL_LibCtx *libCtx,
const char *attrName)
{
CRYPT_EAL_KdfCTX *kdfCtx = NULL;
CRYPT_EAL_CipherCtx *cipherCtx = NULL;
kdfCtx = CRYPT_EAL_ProviderKdfNewCtx(libCtx, CRYPT_KDF_HKDF, attrName);
if (kdfCtx == NULL) {
return CRYPT_HPKE_FAILED_FETCH_KDF;
}
if (g_hpkeAeadAlgInfo[aeadIndex].hpkeAeadId != CRYPT_AEAD_EXPORT_ONLY) {
cipherCtx = CRYPT_EAL_ProviderCipherNewCtx(libCtx, g_hpkeAeadAlgInfo[aeadIndex].cipherId, attrName);
if (cipherCtx == NULL) {
CRYPT_EAL_KdfFreeCtx(kdfCtx);
return CRYPT_HPKE_FAILED_FETCH_CIPHER;
}
}
ctx->kdfCtx = kdfCtx;
ctx->cipherCtx = cipherCtx;
return CRYPT_SUCCESS;
}
static int32_t HpkeInitCipherSuite(CRYPT_EAL_HpkeCtx *ctx, CRYPT_HPKE_CipherSuite *cipherSuite,
CRYPT_EAL_LibCtx *libCtx, const char *attrName)
{
uint8_t kemIndex;
uint8_t kdfIndex;
uint8_t aeadIndex;
int32_t ret;
ret = HpkeCheckCipherSuite(cipherSuite, &kemIndex, &kdfIndex, &aeadIndex);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = InitCipherSuiteCtx(ctx, aeadIndex, libCtx, attrName);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
ctx->kemIndex = kemIndex;
ctx->aeadIndex = aeadIndex;
ctx->kdfIndex = kdfIndex;
return CRYPT_SUCCESS;
}
CRYPT_EAL_HpkeCtx *CRYPT_EAL_HpkeNewCtx(CRYPT_EAL_LibCtx *libCtx, const char *attrName, CRYPT_HPKE_Role role,
CRYPT_HPKE_Mode mode, CRYPT_HPKE_CipherSuite cipherSuite)
{
if (role != CRYPT_HPKE_SENDER && role != CRYPT_HPKE_RECIPIENT) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return NULL;
}
if (mode != CRYPT_HPKE_MODE_BASE && mode != CRYPT_HPKE_MODE_PSK && mode != CRYPT_HPKE_MODE_AUTH &&
mode != CRYPT_HPKE_MODE_AUTH_PSK) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return NULL;
}
CRYPT_EAL_HpkeCtx *ctx = (CRYPT_EAL_HpkeCtx*)BSL_SAL_Calloc(1, sizeof(CRYPT_EAL_HpkeCtx));
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
int32_t ret = HpkeInitCipherSuite(ctx, &cipherSuite, libCtx, attrName);
if (ret != CRYPT_SUCCESS) {
CRYPT_EAL_HpkeFreeCtx(ctx);
return NULL;
}
if (attrName != NULL && strlen(attrName) > 0) {
ctx->attrName = BSL_SAL_Dump(attrName, (uint32_t)strlen(attrName) + 1);
if (ctx->attrName == NULL) {
CRYPT_EAL_HpkeFreeCtx(ctx);
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
}
if (mode == CRYPT_HPKE_MODE_PSK || mode == CRYPT_HPKE_MODE_AUTH || mode == CRYPT_HPKE_MODE_AUTH_PSK) {
AuthInfo *authInfo = (AuthInfo *)BSL_SAL_Calloc(1, sizeof(AuthInfo));
if (authInfo == NULL) {
CRYPT_EAL_HpkeFreeCtx(ctx);
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
ctx->authInfo = authInfo;
}
ctx->mode = mode;
ctx->role = role;
ctx->libCtx = libCtx;
return ctx;
}
int32_t CRYPT_EAL_HpkeGetEncapKeyLen(CRYPT_HPKE_CipherSuite cipherSuite, uint32_t *encapKeyLen)
{
if (encapKeyLen == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
uint8_t kemIndex;
int32_t ret = HpkeCheckCipherSuite(&cipherSuite, &kemIndex, NULL, NULL);
if (ret != CRYPT_SUCCESS) {
return ret;
}
*encapKeyLen = g_hpkeKemAlgInfo[kemIndex].encapsulatedKeyLen;
return CRYPT_SUCCESS;
}
static int32_t HpkeCreatePkeyCtx(uint8_t kemIdex, CRYPT_EAL_PkeyCtx **pkeyCtx, CRYPT_EAL_LibCtx *libCtx,
const char *attrName)
{
CRYPT_PKEY_AlgId algId = g_hpkeKemAlgInfo[kemIdex].pkeyId;
CRYPT_EAL_PkeyCtx *pkey = NULL;
#ifdef HITLS_CRYPTO_PROVIDER
pkey = CRYPT_EAL_ProviderPkeyNewCtx(libCtx, algId, CRYPT_EAL_PKEY_EXCH_OPERATE, attrName);
#else
(void)libCtx;
(void)attrName;
pkey = CRYPT_EAL_PkeyNewCtx(algId);
#endif
if (pkey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_FAILED_FETCH_PKEY);
return CRYPT_HPKE_FAILED_FETCH_PKEY;
}
if (algId == CRYPT_PKEY_ECDH) {
CRYPT_PKEY_ParaId curveId = g_hpkeKemAlgInfo[kemIdex].curveId;
int32_t ret = CRYPT_EAL_PkeySetParaById(pkey, curveId);
if (ret != CRYPT_SUCCESS) {
CRYPT_EAL_PkeyFreeCtx(pkey);
return ret;
}
}
*pkeyCtx = pkey;
return CRYPT_SUCCESS;
}
static int32_t HpkeCreatePubKey(uint8_t kemIdex, uint8_t *pubKey, uint32_t pubKeyLen, CRYPT_EAL_PkeyCtx **pkey,
CRYPT_EAL_LibCtx *libCtx, const char *attrName)
{
CRYPT_EAL_PkeyCtx *tmpPkey = NULL;
int32_t ret = HpkeCreatePkeyCtx(kemIdex, &tmpPkey, libCtx, attrName);
if (ret != CRYPT_SUCCESS) {
return ret;
}
CRYPT_EAL_PkeyPub pub = {0};
pub.id = CRYPT_EAL_PkeyGetId(tmpPkey);
pub.key.eccPub.data = pubKey; // compatible curve25519Pub
pub.key.eccPub.len = pubKeyLen;
ret = CRYPT_EAL_PkeySetPub(tmpPkey, &pub);
if (ret != CRYPT_SUCCESS) {
CRYPT_EAL_PkeyFreeCtx(tmpPkey);
return ret;
}
*pkey = tmpPkey;
return CRYPT_SUCCESS;
}
static int32_t HpkeCreatePriKey(uint8_t kemIdex, uint8_t *priKey, uint32_t priKeyLen, CRYPT_EAL_PkeyCtx **pkey,
CRYPT_EAL_LibCtx *libCtx, const char *attrName)
{
CRYPT_EAL_PkeyCtx *tmpPkey = *pkey;
int32_t ret;
if (tmpPkey == NULL) {
ret = HpkeCreatePkeyCtx(kemIdex, &tmpPkey, libCtx, attrName);
if (ret != CRYPT_SUCCESS) {
return ret;
}
}
CRYPT_EAL_PkeyPrv prv = {0};
prv.id = CRYPT_EAL_PkeyGetId(tmpPkey);
prv.key.eccPrv.data = priKey;
prv.key.eccPrv.len = priKeyLen;
ret = CRYPT_EAL_PkeySetPrv(tmpPkey, &prv);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
if (g_hpkeKemAlgInfo[kemIdex].hpkeKemId == CRYPT_KEM_DHKEM_X25519_HKDF_SHA256) {
ret = CRYPT_EAL_PkeyCtrl(tmpPkey, CRYPT_CTRL_GEN_X25519_PUBLICKEY, NULL, 0);
} else {
ret = CRYPT_EAL_PkeyCtrl(tmpPkey, CRYPT_CTRL_GEN_ECC_PUBLICKEY, NULL, 0);
}
if (ret == CRYPT_SUCCESS) {
*pkey = tmpPkey;
return CRYPT_SUCCESS;
}
EXIT:
if (*pkey == NULL) {
CRYPT_EAL_PkeyFreeCtx(tmpPkey);
}
return ret;
}
static inline void HpkeGenerateHpkeSuiteId(uint8_t kemIndex, uint8_t kdfIndex, uint8_t aeadIndex, uint8_t *suiteId,
uint32_t suiteIdLen)
{
(void)memcpy_s(suiteId, suiteIdLen, "HPKE", strlen("HPKE"));
uint32_t offset = strlen("HPKE");
BSL_Uint16ToByte(g_hpkeKemAlgInfo[kemIndex].hpkeKemId, suiteId + offset);
offset += sizeof(uint16_t);
BSL_Uint16ToByte(g_hpkeKdfAlgInfo[kdfIndex].hpkeKdfId, suiteId + offset);
offset += sizeof(uint16_t);
BSL_Uint16ToByte(g_hpkeAeadAlgInfo[aeadIndex].hpkeAeadId, suiteId + offset);
}
static inline void HpkeGenerateKemSuiteId(uint8_t kemIdex, uint8_t *suiteId, uint32_t suiteIdLen)
{
uint16_t kemId = g_hpkeKemAlgInfo[kemIdex].hpkeKemId;
(void)memcpy_s(suiteId, suiteIdLen, "KEM", strlen("KEM"));
uint32_t offset = strlen("KEM");
BSL_Uint16ToByte(kemId, suiteId + offset);
}
typedef struct {
int32_t macId;
uint8_t *key;
uint32_t keyLen;
uint8_t *salt;
uint32_t saltLen;
} HPKE_HkdfExtractParams;
typedef struct {
int32_t macId;
uint8_t *prk;
uint32_t prkLen;
uint8_t *info;
uint32_t infoLen;
} HPKE_HkdfExpandParam;
static int32_t HpkeHkdfExtract(CRYPT_EAL_KdfCTX *hkdfCtx, HPKE_HkdfExtractParams *extractParams, uint8_t *out,
uint32_t outLen)
{
int32_t ret;
CRYPT_HKDF_MODE mode = CRYPT_KDF_HKDF_MODE_EXTRACT;
BSL_Param params[6] = {{0}, {0}, {0}, {0}, {0}, BSL_PARAM_END}; // 6 parameters
ret = BSL_PARAM_InitValue(¶ms[0], CRYPT_PARAM_KDF_MAC_ID, BSL_PARAM_TYPE_UINT32, (void *)&extractParams->macId,
sizeof(int32_t));
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = BSL_PARAM_InitValue(¶ms[1], CRYPT_PARAM_KDF_MODE, BSL_PARAM_TYPE_UINT32, (void *)&mode, sizeof(mode));
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = BSL_PARAM_InitValue(¶ms[2], CRYPT_PARAM_KDF_KEY, BSL_PARAM_TYPE_OCTETS, // param index 2
(void *)extractParams->key, extractParams->keyLen);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = BSL_PARAM_InitValue(¶ms[3], CRYPT_PARAM_KDF_SALT, BSL_PARAM_TYPE_OCTETS, // param index 3
(void *)extractParams->salt, extractParams->saltLen);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = BSL_PARAM_InitValue(¶ms[4], CRYPT_PARAM_KDF_EXLEN, BSL_PARAM_TYPE_UINT32_PTR, // param index 4
(void *)&outLen, sizeof(outLen));
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = CRYPT_EAL_KdfSetParam(hkdfCtx, params);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = CRYPT_EAL_KdfDerive(hkdfCtx, out, outLen);
CRYPT_EAL_KdfDeInitCtx(hkdfCtx);
return ret;
}
static int32_t HpkeHkdfExpand(CRYPT_EAL_KdfCTX *hkdfCtx, HPKE_HkdfExpandParam *expandParams, uint8_t *out,
uint32_t outLen)
{
int32_t ret;
CRYPT_HKDF_MODE mode = CRYPT_KDF_HKDF_MODE_EXPAND;
BSL_Param params[5] = {{0}, {0}, {0}, {0}, BSL_PARAM_END}; // 5 parameters
ret = BSL_PARAM_InitValue(¶ms[0], CRYPT_PARAM_KDF_MAC_ID, BSL_PARAM_TYPE_UINT32, (void *)&expandParams->macId,
sizeof(int32_t));
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = BSL_PARAM_InitValue(¶ms[1], CRYPT_PARAM_KDF_MODE, BSL_PARAM_TYPE_UINT32, (void *)&mode, sizeof(mode));
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = BSL_PARAM_InitValue(¶ms[2], CRYPT_PARAM_KDF_PRK, BSL_PARAM_TYPE_OCTETS, // param index 2
(void *)expandParams->prk, expandParams->prkLen);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = BSL_PARAM_InitValue(¶ms[3], CRYPT_PARAM_KDF_INFO, BSL_PARAM_TYPE_OCTETS, // param index 3
(void *)expandParams->info, expandParams->infoLen);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = CRYPT_EAL_KdfSetParam(hkdfCtx, params);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = CRYPT_EAL_KdfDerive(hkdfCtx, out, outLen);
CRYPT_EAL_KdfDeInitCtx(hkdfCtx);
return ret;
}
typedef struct {
int32_t macId;
uint8_t *salt;
uint32_t saltLen;
uint8_t *label;
uint32_t labelLen;
uint8_t *ikm;
uint32_t ikmLen;
uint8_t *suiteId;
uint32_t suiteIdLen;
} HPKE_LabeledExtractParams;
typedef struct {
int32_t macId;
uint8_t *prk;
uint32_t prkLen;
uint8_t *label;
uint32_t labelLen;
uint8_t *info;
uint32_t infoLen;
uint8_t *suiteId;
uint32_t suiteIdLen;
} HPKE_LabeledExpandParams;
static int32_t HpkeLabeledExtract(CRYPT_EAL_KdfCTX *hkdfCtx, HPKE_LabeledExtractParams *params, uint8_t *out,
uint32_t outLen)
{
// labeled_ikm = "HPKE-v1" || suite_id || label || ikm
const uint8_t *version = (const uint8_t *)"HPKE-v1";
uint32_t versionLen = strlen("HPKE-v1");
uint32_t partialLen = versionLen + params->suiteIdLen + params->labelLen;
if (params->ikmLen > (UINT32_MAX - partialLen)) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
uint32_t labeledIkmLen = partialLen + params->ikmLen;
uint8_t *labeledIkm = (uint8_t *)BSL_SAL_Malloc(labeledIkmLen);
if (labeledIkm == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
uint32_t offset = 0;
(void)memcpy_s(labeledIkm + offset, labeledIkmLen - offset, version, versionLen);
offset += versionLen;
(void)memcpy_s(labeledIkm + offset, labeledIkmLen - offset, params->suiteId, params->suiteIdLen);
offset += params->suiteIdLen;
(void)memcpy_s(labeledIkm + offset, labeledIkmLen - offset, params->label, params->labelLen);
offset += params->labelLen;
(void)memcpy_s(labeledIkm + offset, labeledIkmLen - offset, params->ikm, params->ikmLen);
HPKE_HkdfExtractParams extractParams = {params->macId, labeledIkm, labeledIkmLen, params->salt, params->saltLen};
int32_t ret = HpkeHkdfExtract(hkdfCtx, &extractParams, out, outLen);
BSL_SAL_ClearFree(labeledIkm, labeledIkmLen);
return ret;
}
static int32_t HpkeLabeledExpand(CRYPT_EAL_KdfCTX *hkdfCtx, HPKE_LabeledExpandParams *params, uint8_t *out,
uint32_t outLen)
{
// labeled_info = I2OSP(L, 2) || "HPKE-v1" || suite_id || label || info
const uint8_t *version = (const uint8_t *)"HPKE-v1";
uint32_t versionLen = strlen("HPKE-v1");
uint32_t partialLen = sizeof(uint16_t) + versionLen + params->suiteIdLen + params->labelLen;
if (params->infoLen > (UINT32_MAX - partialLen)) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
uint32_t labeledInfoLen = partialLen + params->infoLen;
uint8_t *labeledInfo = (uint8_t *)BSL_SAL_Malloc(labeledInfoLen);
if (labeledInfo == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
BSL_Uint16ToByte((uint16_t)outLen, labeledInfo);
uint32_t offset = sizeof(uint16_t);
(void)memcpy_s(labeledInfo + offset, labeledInfoLen - offset, version, versionLen);
offset += versionLen;
(void)memcpy_s(labeledInfo + offset, labeledInfoLen - offset, params->suiteId, params->suiteIdLen);
offset += params->suiteIdLen;
(void)memcpy_s(labeledInfo + offset, labeledInfoLen - offset, params->label, params->labelLen);
offset += params->labelLen;
(void)memcpy_s(labeledInfo + offset, labeledInfoLen - offset, params->info, params->infoLen);
HPKE_HkdfExpandParam expandParams = {params->macId, params->prk, params->prkLen, labeledInfo, labeledInfoLen};
int32_t ret = HpkeHkdfExpand(hkdfCtx, &expandParams, out, outLen);
BSL_SAL_FREE(labeledInfo);
return ret;
}
static int32_t GetPubKeyData(CRYPT_EAL_PkeyCtx *pkey, uint8_t *out, uint32_t *outLen)
{
CRYPT_EAL_PkeyPub ephemPub = { 0 };
ephemPub.id = CRYPT_EAL_PkeyGetId(pkey);
ephemPub.key.eccPub.data = out;
ephemPub.key.eccPub.len = *outLen; // compatible curve25519Pub, CRYPT_Data type.
int32_t ret = CRYPT_EAL_PkeyGetPub(pkey, &ephemPub);
if (ret != CRYPT_SUCCESS) {
return ret;
}
*outLen = ephemPub.key.eccPub.len;
return CRYPT_SUCCESS;
}
static int32_t HpkeComputeSharedSecret(CRYPT_EAL_HpkeCtx *ctx, CRYPT_EAL_PkeyCtx *priKey, CRYPT_EAL_PkeyCtx *pubKey,
CRYPT_EAL_PkeyCtx *authKey, uint8_t *kemContext, uint32_t kemContextLen, uint8_t *sharedSecret,
uint32_t sharedSecretLen)
{
uint8_t dh[HPKE_KEM_DH_MAX_SHARED_KEY_LEN * 2];
uint32_t dhLen = HPKE_KEM_DH_MAX_SHARED_KEY_LEN;
int32_t ret = CRYPT_EAL_PkeyComputeShareKey(priKey, pubKey, dh, &dhLen);
if (ret != CRYPT_SUCCESS) {
memset_s(dh, dhLen, 0, dhLen);
return ret;
}
if (ctx->mode == CRYPT_HPKE_MODE_AUTH || ctx->mode == CRYPT_HPKE_MODE_AUTH_PSK) {
uint32_t dh0Len = HPKE_KEM_DH_MAX_SHARED_KEY_LEN;
if (ctx->role == CRYPT_HPKE_SENDER) {
ret = CRYPT_EAL_PkeyComputeShareKey(authKey, pubKey, dh + dhLen, &dh0Len);
}
if (ctx->role == CRYPT_HPKE_RECIPIENT) {
ret = CRYPT_EAL_PkeyComputeShareKey(priKey, authKey, dh + dhLen, &dh0Len);
}
if (ret != CRYPT_SUCCESS) {
memset_s(dh, dhLen + dh0Len, 0, dhLen + dh0Len);
return ret;
}
dhLen = dhLen + dh0Len;
}
uint8_t suiteId[HPKE_KEM_SUITEID_LEN];
HpkeGenerateKemSuiteId(ctx->kemIndex, suiteId, HPKE_KEM_SUITEID_LEN);
CRYPT_MAC_AlgId macId = g_hpkeKemAlgInfo[ctx->kemIndex].macId;
uint32_t eaePrkLen = g_hpkeKemAlgInfo[ctx->kemIndex].hkdfExtractKeyLen;
uint8_t eaePrk[HPKE_HKDF_MAX_EXTRACT_KEY_LEN];
HPKE_LabeledExtractParams extractParams = {macId, NULL, 0, (uint8_t *)"eae_prk", strlen("eae_prk"), dh, dhLen,
suiteId, HPKE_KEM_SUITEID_LEN};
ret = HpkeLabeledExtract(ctx->kdfCtx, &extractParams, eaePrk, eaePrkLen);
BSL_SAL_CleanseData(dh, dhLen);
if (ret != CRYPT_SUCCESS) {
return ret;
}
HPKE_LabeledExpandParams expandParams = {macId, eaePrk, eaePrkLen, (uint8_t *)"shared_secret",
strlen("shared_secret"), kemContext, kemContextLen, suiteId, HPKE_KEM_SUITEID_LEN};
ret = HpkeLabeledExpand(ctx->kdfCtx, &expandParams, sharedSecret, sharedSecretLen);
BSL_SAL_CleanseData(eaePrk, eaePrkLen);
return ret;
}
static int32_t HpkeCreateKemContext(uint8_t *enc, uint32_t encLen, uint8_t *pkR, uint32_t pkRLen,
CRYPT_EAL_PkeyCtx *authKey, uint8_t **out, uint32_t *outLen)
{
uint8_t pkSm[HPKE_KEM_MAX_PUBLIC_KEY_LEN] = { 0 };
uint32_t pkSmLen = HPKE_KEM_MAX_PUBLIC_KEY_LEN;
if (authKey != NULL) {
int32_t ret = GetPubKeyData(authKey, pkSm, &pkSmLen);
if (ret != CRYPT_SUCCESS) {
return ret;
}
} else {
pkSmLen = 0;
}
// kemContext = enc || pkRm || pkSm
uint32_t kemContextLen = encLen + pkRLen + pkSmLen;
uint8_t *kemContext = (uint8_t *)BSL_SAL_Malloc(kemContextLen);
if (kemContext == NULL) {
return CRYPT_MEM_ALLOC_FAIL;
}
(void)memcpy_s(kemContext, encLen, enc, encLen);
(void)memcpy_s(kemContext + encLen, pkRLen, pkR, pkRLen);
if (authKey != NULL) {
(void)memcpy_s(kemContext + encLen + pkRLen, pkSmLen, pkSm, pkSmLen);
}
*out = kemContext;
*outLen = kemContextLen;
return CRYPT_SUCCESS;
}
static int32_t HpkeEncap(CRYPT_EAL_HpkeCtx *ctx, CRYPT_EAL_PkeyCtx *pkey, uint8_t *pkR, uint32_t pkRLen,
uint8_t *encapsulatedKey, uint32_t *encapsulatedKeyLen, uint8_t *sharedSecret, uint32_t sharedSecretLen)
{
int32_t ret;
CRYPT_EAL_PkeyCtx *pkeyS = pkey;
if (pkeyS == NULL) {
CRYPT_HPKE_CipherSuite cipherSuite = {g_hpkeKemAlgInfo[ctx->kemIndex].hpkeKemId,
g_hpkeKdfAlgInfo[ctx->kdfIndex].hpkeKdfId, g_hpkeAeadAlgInfo[ctx->aeadIndex].hpkeAeadId};
ret = CRYPT_EAL_HpkeGenerateKeyPair(ctx->libCtx, ctx->attrName, cipherSuite, NULL, 0, &pkeyS);
if (ret != CRYPT_SUCCESS) {
return ret;
}
}
CRYPT_EAL_PkeyCtx *pkeyR = NULL;
uint8_t enc[HPKE_KEM_MAX_PUBLIC_KEY_LEN] = { 0 };
uint32_t encLen = HPKE_KEM_MAX_PUBLIC_KEY_LEN;
uint32_t kemContextLen = 0;
uint8_t *kemContext = NULL;
CRYPT_EAL_PkeyCtx *authKey = NULL;
if (ctx->mode == CRYPT_HPKE_MODE_AUTH || ctx->mode == CRYPT_HPKE_MODE_AUTH_PSK) {
authKey = ctx->authInfo->authPkey;
}
ret = GetPubKeyData(pkeyS, enc, &encLen);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
ret = HpkeCreatePubKey(ctx->kemIndex, pkR, pkRLen, &pkeyR, ctx->libCtx, ctx->attrName);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
ret = HpkeCreateKemContext(enc, encLen, pkR, pkRLen, authKey, &kemContext, &kemContextLen);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
ret = HpkeComputeSharedSecret(ctx, pkeyS, pkeyR, authKey, kemContext, kemContextLen, sharedSecret, sharedSecretLen);
if (ret == CRYPT_SUCCESS) {
(void)memcpy_s(encapsulatedKey, *encapsulatedKeyLen, enc, encLen);
*encapsulatedKeyLen = encLen;
}
EXIT:
BSL_SAL_FREE(kemContext);
CRYPT_EAL_PkeyFreeCtx(pkeyR);
if (pkey == NULL) {
CRYPT_EAL_PkeyFreeCtx(pkeyS);
}
return ret;
}
static int32_t HpkeGenKeyScheduleCtx(CRYPT_EAL_HpkeCtx *ctx, uint8_t *info, uint32_t infoLen, uint8_t *pskId,
uint32_t pskIdLen, uint8_t *suiteId, uint32_t suiteIdLen, uint8_t **keyScheduleContext,
uint32_t *keyScheduleContextLen)
{
uint32_t extractKeyLen = g_hpkeKdfAlgInfo[ctx->kdfIndex].hkdfExtractKeyLen;
uint32_t contextLen = sizeof(uint8_t) + extractKeyLen + extractKeyLen;
uint8_t *context = (uint8_t *)BSL_SAL_Malloc(contextLen);
if (context == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
context[0] = ctx->mode;
uint32_t offset = sizeof(uint8_t);
CRYPT_MAC_AlgId macId = g_hpkeKdfAlgInfo[ctx->kdfIndex].macId;
HPKE_LabeledExtractParams params = {macId, NULL, 0, (uint8_t*)"psk_id_hash", strlen("psk_id_hash"), pskId, pskIdLen,
suiteId, suiteIdLen};
int32_t ret = HpkeLabeledExtract(ctx->kdfCtx, ¶ms, context + offset, extractKeyLen);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
offset += extractKeyLen;
params.label = (uint8_t*)"info_hash";
params.labelLen = strlen("info_hash");
params.ikm = info;
params.ikmLen = infoLen;
ret = HpkeLabeledExtract(ctx->kdfCtx, ¶ms, context + offset, extractKeyLen);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
*keyScheduleContext = context;
*keyScheduleContextLen = contextLen;
return CRYPT_SUCCESS;
EXIT:
BSL_SAL_ClearFree(context, contextLen);
return ret;
}
static void HpkeFreeKeyInfo(CRYPT_EAL_HpkeCtx *ctx)
{
BSL_SAL_ClearFree(ctx->symKey, ctx->symKeyLen);
ctx->symKey = NULL;
ctx->symKeyLen = 0;
BSL_SAL_ClearFree(ctx->baseNonce, ctx->baseNonceLen);
ctx->baseNonce = NULL;
ctx->baseNonceLen = 0;
BSL_SAL_ClearFree(ctx->exporterSecret, ctx->exporterSecretLen);
ctx->exporterSecret = NULL;
ctx->exporterSecretLen = 0;
}
static int32_t HpkeMallocKeyInfo(CRYPT_EAL_HpkeCtx *ctx)
{
if (g_hpkeAeadAlgInfo[ctx->aeadIndex].hpkeAeadId != CRYPT_AEAD_EXPORT_ONLY) {
ctx->symKeyLen = g_hpkeAeadAlgInfo[ctx->aeadIndex].keyLen;
ctx->symKey = BSL_SAL_Malloc(ctx->symKeyLen);
ctx->baseNonceLen = HPKE_AEAD_NONCE_LEN;
ctx->baseNonce = BSL_SAL_Malloc(HPKE_AEAD_NONCE_LEN);
if (ctx->symKey == NULL || ctx->baseNonce == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
HpkeFreeKeyInfo(ctx);
return CRYPT_MEM_ALLOC_FAIL;
}
}
ctx->exporterSecretLen = g_hpkeKdfAlgInfo[ctx->kdfIndex].hkdfExtractKeyLen;
ctx->exporterSecret = BSL_SAL_Malloc(ctx->exporterSecretLen);
if (ctx->exporterSecret == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
HpkeFreeKeyInfo(ctx);
return CRYPT_MEM_ALLOC_FAIL;
}
return CRYPT_SUCCESS;
}
static int32_t HpkeDeriveKeyInfo(CRYPT_EAL_HpkeCtx *ctx, HPKE_LabeledExpandParams *expandParams)
{
CRYPT_HPKE_AEAD_AlgId aeadId = g_hpkeAeadAlgInfo[ctx->aeadIndex].hpkeAeadId;
if (aeadId != CRYPT_AEAD_EXPORT_ONLY) {
int32_t ret = HpkeLabeledExpand(ctx->kdfCtx, expandParams, ctx->symKey, ctx->symKeyLen);
if (ret != CRYPT_SUCCESS) {
return ret;
}
expandParams->label = (uint8_t*)"base_nonce";
expandParams->labelLen = strlen("base_nonce");
ret = HpkeLabeledExpand(ctx->kdfCtx, expandParams, ctx->baseNonce, ctx->baseNonceLen);
if (ret != CRYPT_SUCCESS) {
return ret;
}
}
expandParams->label = (uint8_t*)"exp";
expandParams->labelLen = strlen("exp");
return HpkeLabeledExpand(ctx->kdfCtx, expandParams, ctx->exporterSecret, ctx->exporterSecretLen);
}
static int32_t HpkeKeySchedule(CRYPT_EAL_HpkeCtx *ctx, uint8_t *sharedSecret, uint32_t sharedSecretLen, uint8_t *info,
uint32_t infoLen)
{
uint8_t suiteId[HPKE_HPKE_SUITEID_LEN];
uint8_t suiteIdLen = HPKE_HPKE_SUITEID_LEN;
HpkeGenerateHpkeSuiteId(ctx->kemIndex, ctx->kdfIndex, ctx->aeadIndex, suiteId, HPKE_HPKE_SUITEID_LEN);
uint32_t contextLen;
uint8_t *context = NULL;
uint8_t *pskId = (uint8_t *)"";
uint32_t pskIdLen = 0;
uint8_t *psk = (uint8_t *)"";
uint32_t pskLen = 0;
if (ctx->mode == CRYPT_HPKE_MODE_PSK || ctx->mode == CRYPT_HPKE_MODE_AUTH_PSK) {
pskId = ctx->authInfo->pskId;
pskIdLen = ctx->authInfo->pskIdLen;
psk = ctx->authInfo->psk;
pskLen = ctx->authInfo->pskLen;
}
int32_t ret = HpkeGenKeyScheduleCtx(ctx, info, infoLen, pskId, pskIdLen, suiteId, suiteIdLen, &context,
&contextLen);
if (ret != CRYPT_SUCCESS) {
return ret;
}
CRYPT_MAC_AlgId macId = g_hpkeKdfAlgInfo[ctx->kdfIndex].macId;
uint8_t secret[HPKE_KEM_MAX_SHARED_KEY_LEN] = {0};
uint32_t secretLen = g_hpkeKdfAlgInfo[ctx->kdfIndex].hkdfExtractKeyLen;
HPKE_LabeledExtractParams extractparams = {macId, sharedSecret, sharedSecretLen, (uint8_t*)"secret",
strlen("secret"), psk, pskLen, suiteId, suiteIdLen};
HPKE_LabeledExpandParams expandParams = {macId, secret, secretLen, (uint8_t*)"key", strlen("key"), context,
contextLen, suiteId, suiteIdLen};
ret = HpkeLabeledExtract(ctx->kdfCtx, &extractparams, secret, secretLen);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
ret = HpkeMallocKeyInfo(ctx);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
ret = HpkeDeriveKeyInfo(ctx, &expandParams);
EXIT:
BSL_SAL_CleanseData(secret, HPKE_KEM_MAX_SHARED_KEY_LEN);
BSL_SAL_ClearFree(context, contextLen);
if (ret != CRYPT_SUCCESS) {
HpkeFreeKeyInfo(ctx);
}
return ret;
}
static int32_t HpkeCheckAuthInfo(CRYPT_EAL_HpkeCtx *ctx)
{
if (ctx->mode == CRYPT_HPKE_MODE_AUTH || ctx->mode == CRYPT_HPKE_MODE_AUTH_PSK) {
if (ctx->authInfo == NULL || ctx->authInfo->authPkey == NULL) {
return CRYPT_HPKE_ERR_CALL;
}
}
if (ctx->mode == CRYPT_HPKE_MODE_PSK || ctx->mode == CRYPT_HPKE_MODE_AUTH_PSK) {
if (ctx->authInfo == NULL || ctx->authInfo->psk == NULL || ctx->authInfo->pskId == NULL) {
return CRYPT_HPKE_ERR_CALL;
}
}
return CRYPT_SUCCESS;
}
static void HpkeFreeAuthInfo(CRYPT_EAL_HpkeCtx *ctx)
{
if (ctx->authInfo == NULL) {
return;
}
BSL_SAL_ClearFree(ctx->authInfo->psk, ctx->authInfo->pskLen);
ctx->authInfo->psk = NULL;
ctx->authInfo->pskLen = 0;
BSL_SAL_ClearFree(ctx->authInfo->pskId, ctx->authInfo->pskIdLen);
ctx->authInfo->pskId = NULL;
ctx->authInfo->pskIdLen = 0;
CRYPT_EAL_PkeyFreeCtx(ctx->authInfo->authPkey);
ctx->authInfo->authPkey = NULL;
BSL_SAL_FREE(ctx->authInfo);
}
static int32_t HpkeCheckSenderParams(CRYPT_EAL_HpkeCtx *ctx, uint8_t *info, uint32_t infoLen, const uint8_t *pkR,
uint32_t pkRLen, uint8_t *encapsulatedKey, uint32_t *encapsulatedKeyLen)
{
if (ctx == NULL) {
return CRYPT_NULL_INPUT;
}
if (ctx->role != CRYPT_HPKE_SENDER) {
return CRYPT_HPKE_ERR_CALL;
}
if (ctx->sharedSecret != NULL) {
return CRYPT_HPKE_ERR_CALL;
}
if (pkR == NULL || encapsulatedKey == NULL || encapsulatedKeyLen == NULL) {
return CRYPT_NULL_INPUT;
}
if ((info == NULL && infoLen != 0) || (info != NULL && infoLen == 0)) {
return CRYPT_INVALID_ARG;
}
uint32_t encLen = g_hpkeKemAlgInfo[ctx->kemIndex].encapsulatedKeyLen;
if (pkRLen != encLen) {
return CRYPT_INVALID_ARG;
}
if (*encapsulatedKeyLen < encLen) {
return CRYPT_INVALID_ARG;
}
return HpkeCheckAuthInfo(ctx);
}
int32_t CRYPT_EAL_HpkeSetupSender(CRYPT_EAL_HpkeCtx *ctx, CRYPT_EAL_PkeyCtx *pkey, uint8_t *info, uint32_t infoLen,
uint8_t *pkR, uint32_t pkRLen, uint8_t *encapKey, uint32_t *encapKeyLen)
{
int32_t ret = HpkeCheckSenderParams(ctx, info, infoLen, pkR, pkRLen, encapKey, encapKeyLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
uint32_t sharedSecretLen = g_hpkeKemAlgInfo[ctx->kemIndex].sharedKeyLen;
uint8_t *sharedSecret = BSL_SAL_Malloc(sharedSecretLen);
if (sharedSecret == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ret = HpkeEncap(ctx, pkey, pkR, pkRLen, encapKey, encapKeyLen, sharedSecret, sharedSecretLen);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_ClearFree(sharedSecret, sharedSecretLen);
return ret;
}
ret = HpkeKeySchedule(ctx, sharedSecret, sharedSecretLen, info, infoLen);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_ClearFree(sharedSecret, sharedSecretLen);
return ret;
}
ctx->sharedSecret = sharedSecret;
ctx->sharedSecretLen = sharedSecretLen;
HpkeFreeAuthInfo(ctx); // Derived key successfully, no longer requires authinfo
return ret;
}
static int32_t HpkeAeadEncrypt(CRYPT_EAL_HpkeCtx *ctx, const uint8_t *nonce, uint32_t nonceLen, uint8_t *aad,
uint32_t aadLen, const uint8_t *plainText, uint32_t plainTextLen, uint8_t *cipherText, uint32_t *cipherTextLen)
{
CRYPT_EAL_CipherCtx *cipherCtx = ctx->cipherCtx;
uint32_t outLen = *cipherTextLen;
int32_t ret = CRYPT_EAL_CipherInit(cipherCtx, ctx->symKey, ctx->symKeyLen, nonce, nonceLen, true);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
if (aad != NULL && aadLen > 0) {
ret = CRYPT_EAL_CipherCtrl(cipherCtx, CRYPT_CTRL_SET_AAD, aad, aadLen);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
}
ret = CRYPT_EAL_CipherUpdate(cipherCtx, plainText, plainTextLen, cipherText, &outLen);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
ret = CRYPT_EAL_CipherCtrl(cipherCtx, CRYPT_CTRL_GET_TAG, cipherText + outLen, HPKE_AEAD_TAG_LEN);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
*cipherTextLen = outLen + HPKE_AEAD_TAG_LEN;
EXIT:
CRYPT_EAL_CipherDeinit(cipherCtx);
return ret;
}
int32_t CRYPT_EAL_HpkeSetSeq(CRYPT_EAL_HpkeCtx *ctx, uint64_t seq)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (seq == UINT64_MAX) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
ctx->seq = seq;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_HpkeGetSeq(CRYPT_EAL_HpkeCtx *ctx, uint64_t *seq)
{
if (ctx == NULL || seq == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
*seq = ctx->seq;
return CRYPT_SUCCESS;
}
static void HpkeComputeNonce(CRYPT_EAL_HpkeCtx *ctx, uint8_t *nonce, uint32_t nonceLen)
{
uint64_t seq = ctx->seq;
for (uint32_t i = 0; i < sizeof(seq); i++) {
nonce[nonceLen - i - 1] = seq & UINT8_MAX;
seq = seq >> 8; // 8 bits
}
for (uint32_t i = 0; i < nonceLen; i++) {
nonce[i] ^= ctx->baseNonce[i];
}
}
static int32_t HpkeCheckSealParams(CRYPT_EAL_HpkeCtx *ctx, const uint8_t *plainText, uint32_t plainTextLen,
uint32_t *cipherTextLen)
{
if (ctx == NULL) {
return CRYPT_NULL_INPUT;
}
if (ctx->role != CRYPT_HPKE_SENDER) {
return CRYPT_HPKE_ERR_CALL;
}
if (g_hpkeAeadAlgInfo[ctx->aeadIndex].hpkeAeadId == CRYPT_AEAD_EXPORT_ONLY) {
return CRYPT_HPKE_ERR_CALL;
}
if (ctx->symKey == NULL || ctx->baseNonce == NULL) {
return CRYPT_HPKE_ERR_CALL;
}
if (plainText == NULL || plainTextLen == 0 || cipherTextLen == NULL) {
return CRYPT_NULL_INPUT;
}
if (plainTextLen > (UINT32_MAX - HPKE_AEAD_TAG_LEN)) {
return CRYPT_INVALID_ARG;
}
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_HpkeSeal(CRYPT_EAL_HpkeCtx *ctx, uint8_t *aad, uint32_t aadLen, const uint8_t *plainText,
uint32_t plainTextLen, uint8_t *cipherText, uint32_t *cipherTextLen)
{
int32_t ret = HpkeCheckSealParams(ctx, plainText, plainTextLen, cipherTextLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
if (ctx->seq + 1 == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
if (cipherText == NULL) {
*cipherTextLen = plainTextLen + HPKE_AEAD_TAG_LEN;
return CRYPT_SUCCESS;
}
if (*cipherTextLen < (plainTextLen + HPKE_AEAD_TAG_LEN)) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
uint8_t nonce[HPKE_AEAD_NONCE_LEN] = { 0 };
HpkeComputeNonce(ctx, nonce, HPKE_AEAD_NONCE_LEN);
ret = HpkeAeadEncrypt(ctx, nonce, HPKE_AEAD_NONCE_LEN, aad, aadLen, plainText, plainTextLen, cipherText,
cipherTextLen);
if (ret == CRYPT_SUCCESS) {
ctx->seq++;
}
return ret;
}
static int32_t HpkeDecap(CRYPT_EAL_HpkeCtx *ctx, CRYPT_EAL_PkeyCtx *pkey, uint8_t *encKey, uint32_t encKeyLen,
uint8_t *sharedSecret, uint32_t sharedSecretLen)
{
CRYPT_EAL_PkeyCtx *pkeyS = NULL;
int32_t ret = HpkeCreatePubKey(ctx->kemIndex, encKey, encKeyLen, &pkeyS, ctx->libCtx, ctx->attrName);
if (ret != CRYPT_SUCCESS) {
return ret;
}
uint8_t *kemContext = NULL;
uint32_t kemContextLen;
uint8_t pubKeyData[HPKE_KEM_MAX_PUBLIC_KEY_LEN];
uint32_t pubKeyDataLen = HPKE_KEM_MAX_PUBLIC_KEY_LEN;
CRYPT_EAL_PkeyCtx *authKey = NULL;
if (ctx->mode == CRYPT_HPKE_MODE_AUTH || ctx->mode == CRYPT_HPKE_MODE_AUTH_PSK) {
authKey = ctx->authInfo->authPkey;
}
ret = GetPubKeyData(pkey, pubKeyData, &pubKeyDataLen);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
ret = HpkeCreateKemContext(encKey, encKeyLen, pubKeyData, pubKeyDataLen, authKey, &kemContext, &kemContextLen);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
ret = HpkeComputeSharedSecret(ctx, pkey, pkeyS, authKey, kemContext, kemContextLen, sharedSecret, sharedSecretLen);
EXIT:
CRYPT_EAL_PkeyFreeCtx(pkeyS);
BSL_SAL_FREE(kemContext);
return ret;
}
static int32_t HpkeCheckRecipientParams(CRYPT_EAL_HpkeCtx *ctx, CRYPT_EAL_PkeyCtx *pkey, uint8_t *info,
uint32_t infoLen, const uint8_t *encapsulatedKey, uint32_t encapsulatedKeyLen)
{
if (ctx == NULL) {
return CRYPT_NULL_INPUT;
}
if (ctx->role != CRYPT_HPKE_RECIPIENT) {
return CRYPT_HPKE_ERR_CALL;
}
if (ctx->sharedSecret != NULL) {
return CRYPT_HPKE_ERR_CALL;
}
if ((info == NULL && infoLen != 0) || (info != NULL && infoLen == 0)) {
return CRYPT_INVALID_ARG;
}
if (pkey == NULL || encapsulatedKey == NULL) {
return CRYPT_NULL_INPUT;
}
if (encapsulatedKeyLen != g_hpkeKemAlgInfo[ctx->kemIndex].encapsulatedKeyLen) {
return CRYPT_INVALID_ARG;
}
return HpkeCheckAuthInfo(ctx);
}
int32_t CRYPT_EAL_HpkeSetupRecipient(CRYPT_EAL_HpkeCtx *ctx, CRYPT_EAL_PkeyCtx *pkey, uint8_t *info, uint32_t infoLen,
uint8_t *encapKey, uint32_t encapKeyLen)
{
int32_t ret = HpkeCheckRecipientParams(ctx, pkey, info, infoLen, encapKey, encapKeyLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
uint32_t sharedSecretLen = g_hpkeKemAlgInfo[ctx->kemIndex].sharedKeyLen;
uint8_t *sharedSecret = BSL_SAL_Malloc(sharedSecretLen);
if (sharedSecret == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ret = HpkeDecap(ctx, pkey, encapKey, encapKeyLen, sharedSecret, sharedSecretLen);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_ClearFree(sharedSecret, sharedSecretLen);
return ret;
}
ret = HpkeKeySchedule(ctx, sharedSecret, sharedSecretLen, info, infoLen);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_ClearFree(sharedSecret, sharedSecretLen);
return ret;
}
ctx->sharedSecret = sharedSecret;
ctx->sharedSecretLen = sharedSecretLen;
HpkeFreeAuthInfo(ctx); // Derived key successfully, no longer requires authinfo
return ret;
}
static int32_t HpkeAeadDecrypt(CRYPT_EAL_HpkeCtx *ctx, const uint8_t *nonce, uint32_t nonceLen, uint8_t *aad,
uint32_t aadLen, const uint8_t *cipherText, uint32_t cipherTextLen, uint8_t *plainText, uint32_t *plainTextLen)
{
CRYPT_EAL_CipherCtx *cipherCtx = ctx->cipherCtx;
int32_t ret = CRYPT_EAL_CipherInit(cipherCtx, ctx->symKey, ctx->symKeyLen, nonce, nonceLen, false);
if (ret != CRYPT_SUCCESS) {
CRYPT_EAL_CipherDeinit(cipherCtx);
return ret;
}
if (aad != NULL && aadLen > 0) {
ret = CRYPT_EAL_CipherCtrl(cipherCtx, CRYPT_CTRL_SET_AAD, (void *)aad, aadLen);
if (ret != CRYPT_SUCCESS) {
CRYPT_EAL_CipherDeinit(cipherCtx);
return ret;
}
}
ret = CRYPT_EAL_CipherUpdate(cipherCtx, cipherText, cipherTextLen - HPKE_AEAD_TAG_LEN, plainText, plainTextLen);
if (ret != CRYPT_SUCCESS) {
CRYPT_EAL_CipherDeinit(cipherCtx);
return ret;
}
uint8_t tag[HPKE_AEAD_TAG_LEN];
ret = CRYPT_EAL_CipherCtrl(cipherCtx, CRYPT_CTRL_GET_TAG, (void *)tag, HPKE_AEAD_TAG_LEN);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
if (memcmp(tag, cipherText + (cipherTextLen - HPKE_AEAD_TAG_LEN), HPKE_AEAD_TAG_LEN) != 0) {
ret = CRYPT_HPKE_ERR_AEAD_TAG;
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_AEAD_TAG);
}
EXIT:
if (ret != CRYPT_SUCCESS) {
BSL_SAL_CleanseData(plainText, *plainTextLen);
}
CRYPT_EAL_CipherDeinit(cipherCtx);
return ret;
}
static int32_t HpkeCheckOpenParams(CRYPT_EAL_HpkeCtx *ctx, const uint8_t *cipherText, uint32_t cipherTextLen,
uint32_t *plainTextLen)
{
if (ctx == NULL) {
return CRYPT_NULL_INPUT;
}
if (ctx->role != CRYPT_HPKE_RECIPIENT) {
return CRYPT_HPKE_ERR_CALL;
}
if (g_hpkeAeadAlgInfo[ctx->aeadIndex].hpkeAeadId == CRYPT_AEAD_EXPORT_ONLY) {
return CRYPT_HPKE_ERR_CALL;
}
if (ctx->symKey == NULL || ctx->baseNonce == NULL) {
return CRYPT_HPKE_ERR_CALL;
}
if (cipherText == NULL || cipherTextLen == 0 || plainTextLen == NULL) {
return CRYPT_NULL_INPUT;
}
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_HpkeOpen(CRYPT_EAL_HpkeCtx *ctx, uint8_t *aad, uint32_t aadLen, const uint8_t *cipherText,
uint32_t cipherTextLen, uint8_t *plainText, uint32_t *plainTextLen)
{
int32_t ret = HpkeCheckOpenParams(ctx, cipherText, cipherTextLen, plainTextLen);
if (ret != CRYPT_SUCCESS) {
BSL_ERR_PUSH_ERROR(ret);
return ret;
}
if (ctx->seq + 1 == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
if (cipherTextLen <= HPKE_AEAD_TAG_LEN) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
if (plainText == NULL) {
*plainTextLen = cipherTextLen - HPKE_AEAD_TAG_LEN;
return CRYPT_SUCCESS;
}
uint8_t nonce[HPKE_AEAD_NONCE_LEN] = { 0 };
HpkeComputeNonce(ctx, nonce, HPKE_AEAD_NONCE_LEN);
ret = HpkeAeadDecrypt(ctx, nonce, HPKE_AEAD_NONCE_LEN, aad, aadLen, cipherText, cipherTextLen, plainText,
plainTextLen);
if (ret == CRYPT_SUCCESS) {
ctx->seq++;
}
return ret;
}
void CRYPT_EAL_HpkeFreeCtx(CRYPT_EAL_HpkeCtx *ctx)
{
if (ctx == NULL) {
return;
}
BSL_SAL_ClearFree(ctx->sharedSecret, ctx->sharedSecretLen);
HpkeFreeKeyInfo(ctx);
CRYPT_EAL_CipherFreeCtx(ctx->cipherCtx);
CRYPT_EAL_KdfFreeCtx(ctx->kdfCtx);
BSL_SAL_FREE(ctx->attrName);
HpkeFreeAuthInfo(ctx);
BSL_SAL_ClearFree(ctx, sizeof(CRYPT_EAL_HpkeCtx));
}
static int32_t HpkeGetEccOrder(CRYPT_EAL_PkeyCtx *pkey, BN_BigNum **order)
{
uint8_t ecP[MAX_ECC_PARAM_LEN];
uint8_t ecA[MAX_ECC_PARAM_LEN];
uint8_t ecB[MAX_ECC_PARAM_LEN];
uint8_t ecN[MAX_ECC_PARAM_LEN];
uint8_t ecH[MAX_ECC_PARAM_LEN];
uint8_t ecX[MAX_ECC_PARAM_LEN];
uint8_t ecY[MAX_ECC_PARAM_LEN];
CRYPT_EAL_PkeyPara para = {0};
para.id = CRYPT_EAL_PkeyGetId(pkey);
para.para.eccPara.p = ecP;
para.para.eccPara.a = ecA;
para.para.eccPara.b = ecB;
para.para.eccPara.n = ecN;
para.para.eccPara.h = ecH;
para.para.eccPara.x = ecX;
para.para.eccPara.y = ecY;
para.para.eccPara.pLen = MAX_ECC_PARAM_LEN;
para.para.eccPara.aLen = MAX_ECC_PARAM_LEN;
para.para.eccPara.bLen = MAX_ECC_PARAM_LEN;
para.para.eccPara.nLen = MAX_ECC_PARAM_LEN;
para.para.eccPara.hLen = MAX_ECC_PARAM_LEN;
para.para.eccPara.xLen = MAX_ECC_PARAM_LEN;
para.para.eccPara.yLen = MAX_ECC_PARAM_LEN;
int32_t ret = CRYPT_EAL_PkeyGetPara(pkey, ¶);
if (ret != CRYPT_SUCCESS) {
return ret;
}
BN_BigNum *bn = BN_Create(para.para.eccPara.nLen * 8);
if (bn == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ret = BN_Bin2Bn(bn, para.para.eccPara.n, para.para.eccPara.nLen);
if (ret != CRYPT_SUCCESS) {
BN_Destroy(bn);
return ret;
}
*order = bn;
return CRYPT_SUCCESS;
}
static int32_t HpkeExpandEccPriKey(CRYPT_EAL_PkeyCtx *pkey, CRYPT_EAL_KdfCTX *hkdfCtx, uint32_t kemIndex,
HPKE_LabeledExpandParams *params, uint8_t *sk, uint32_t skLen)
{
BN_BigNum *order = NULL;
int32_t ret = HpkeGetEccOrder(pkey, &order);
if (ret != CRYPT_SUCCESS) {
return ret;
}
BN_BigNum *skBn = BN_Create(skLen * 8);
if (skBn == NULL) {
BN_Destroy(order);
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
uint8_t counter = 0;
uint8_t bitmask = 0xFF; // 0xFF for P256 P384
if (g_hpkeKemAlgInfo[kemIndex].hpkeKemId == CRYPT_KEM_DHKEM_P521_HKDF_SHA512) {
bitmask = 0x01;
}
do {
if (counter == 255) { // RFC9180 7.1.3, up to 255 attempts.
ret = CRYPT_HPKE_ERR_GEN_ASYM_KEY;
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_GEN_ASYM_KEY);
break;
}
*(params->info) = counter;
ret = HpkeLabeledExpand(hkdfCtx, params, sk, skLen);
if (ret != CRYPT_SUCCESS) {
break;
}
sk[0] = sk[0] & bitmask;
ret = BN_Bin2Bn(skBn, sk, skLen);
if (ret != CRYPT_SUCCESS) {
break;
}
counter++;
} while (BN_IsZero(skBn) || BN_Cmp(skBn, order) >= 0);
BN_Destroy(skBn);
BN_Destroy(order);
if (ret != CRYPT_SUCCESS) {
BSL_SAL_CleanseData(sk, skLen);
}
return ret;
}
static int32_t DeriveSk(uint8_t kemIndex, CRYPT_EAL_KdfCTX *kdfCtx, CRYPT_EAL_PkeyCtx *pkey,
HPKE_LabeledExpandParams *expandParams, uint8_t *sk, uint32_t skLen)
{
if (g_hpkeKemAlgInfo[kemIndex].hpkeKemId == CRYPT_KEM_DHKEM_X25519_HKDF_SHA256) {
return HpkeLabeledExpand(kdfCtx, expandParams, sk, skLen);
} else {
uint8_t counter = 0;
expandParams->label = (uint8_t *)"candidate";
expandParams->labelLen = strlen("candidate");
expandParams->info = (uint8_t *)&counter;
expandParams->infoLen = sizeof(uint8_t);
return HpkeExpandEccPriKey(pkey, kdfCtx, kemIndex, expandParams, sk, skLen);
}
}
static int32_t HpkeDeriveKeyPair(uint8_t kemIndex, uint8_t *ikm, uint32_t ikmLen,
CRYPT_EAL_PkeyCtx **pctx, CRYPT_EAL_LibCtx *libCtx, const char *attrName)
{
uint8_t suiteId[HPKE_KEM_SUITEID_LEN];
HpkeGenerateKemSuiteId(kemIndex, suiteId, HPKE_KEM_SUITEID_LEN);
uint8_t dkpPrk[HPKE_HKDF_MAX_EXTRACT_KEY_LEN];
uint8_t sk[HPKE_KEM_MAX_PRIVATE_KEY_LEN] = { 0 };
uint32_t dkpPrkLen = g_hpkeKemAlgInfo[kemIndex].hkdfExtractKeyLen;
CRYPT_MAC_AlgId macId = g_hpkeKemAlgInfo[kemIndex].macId;
uint32_t skLen = g_hpkeKemAlgInfo[kemIndex].privateKeyLen;
CRYPT_EAL_KdfCTX *kdfCtx = NULL;
kdfCtx = CRYPT_EAL_ProviderKdfNewCtx(libCtx, CRYPT_KDF_HKDF, attrName);
if (kdfCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_FAILED_FETCH_KDF);
return CRYPT_HPKE_FAILED_FETCH_KDF;
}
CRYPT_EAL_PkeyCtx *pkey = NULL;
int32_t ret = HpkeCreatePkeyCtx(kemIndex, &pkey, libCtx, attrName);
if (ret != CRYPT_SUCCESS) {
CRYPT_EAL_KdfFreeCtx(kdfCtx);
return ret;
}
HPKE_LabeledExtractParams extractParams = {macId, (uint8_t *)"", 0, (uint8_t *)"dkp_prk", strlen("dkp_prk"),
ikm, ikmLen, suiteId, HPKE_KEM_SUITEID_LEN};
HPKE_LabeledExpandParams expandParams = {macId, dkpPrk, dkpPrkLen, (uint8_t *)"sk", strlen("sk"), (uint8_t *)"", 0,
suiteId, HPKE_KEM_SUITEID_LEN};
ret = HpkeLabeledExtract(kdfCtx, &extractParams, dkpPrk, dkpPrkLen);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
ret = DeriveSk(kemIndex, kdfCtx, pkey, &expandParams, sk, skLen);
if (ret != CRYPT_SUCCESS) {
goto EXIT;
}
ret = HpkeCreatePriKey(kemIndex, sk, skLen, &pkey, libCtx, attrName);
EXIT:
CRYPT_EAL_KdfFreeCtx(kdfCtx);
BSL_SAL_CleanseData(sk, skLen);
BSL_SAL_CleanseData(dkpPrk, HPKE_HKDF_MAX_EXTRACT_KEY_LEN);
if (ret != CRYPT_SUCCESS) {
CRYPT_EAL_PkeyFreeCtx(pkey);
return ret;
}
*pctx = pkey;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_HpkeGenerateKeyPair(CRYPT_EAL_LibCtx *libCtx, const char *attrName,
CRYPT_HPKE_CipherSuite cipherSuite, uint8_t *ikm, uint32_t ikmLen, CRYPT_EAL_PkeyCtx **pctx)
{
if (pctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (*pctx != NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
uint8_t kemIndex;
int32_t ret = HpkeCheckCipherSuite(&cipherSuite, &kemIndex, NULL, NULL);
if (ret != CRYPT_SUCCESS) {
return ret;
}
uint32_t ikmNewLen = g_hpkeKemAlgInfo[kemIndex].privateKeyLen;
if (ikm != NULL && ikmLen != 0) {
if (ikmLen < ikmNewLen) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
return HpkeDeriveKeyPair(kemIndex, ikm, ikmLen, pctx, libCtx, attrName);
}
uint8_t ikmNew[HPKE_KEM_MAX_PRIVATE_KEY_LEN];
ret = CRYPT_EAL_RandbytesEx(libCtx, ikmNew, ikmNewLen);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ret = HpkeDeriveKeyPair(kemIndex, ikmNew, ikmNewLen, pctx, libCtx, attrName);
BSL_SAL_CleanseData(ikmNew, ikmNewLen);
return ret;
}
int32_t CRYPT_EAL_HpkeExportSecret(CRYPT_EAL_HpkeCtx *ctx, uint8_t *info, uint32_t infoLen, uint8_t *key,
uint32_t keyLen)
{
if (ctx == NULL || key == NULL || keyLen == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->exporterSecret == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
if ((info == NULL && infoLen != 0) || (info != NULL && infoLen == 0)) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
if (keyLen > 255 * g_hpkeKdfAlgInfo[ctx->kdfIndex].hkdfExtractKeyLen) { // RFC9180 5.3 max L is 255*Nh
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
uint8_t suiteId[HPKE_HPKE_SUITEID_LEN];
HpkeGenerateHpkeSuiteId(ctx->kemIndex, ctx->kdfIndex, ctx->aeadIndex, suiteId, HPKE_HPKE_SUITEID_LEN);
CRYPT_MAC_AlgId macId = g_hpkeKdfAlgInfo[ctx->kdfIndex].macId;
HPKE_LabeledExpandParams params = {macId, ctx->exporterSecret, ctx->exporterSecretLen, (uint8_t *)"sec",
strlen("sec"), info, infoLen, suiteId, HPKE_HPKE_SUITEID_LEN};
return HpkeLabeledExpand(ctx->kdfCtx, ¶ms, key, keyLen);
}
int32_t CRYPT_EAL_HpkeGetSharedSecret(CRYPT_EAL_HpkeCtx *ctx, uint8_t *buff, uint32_t *buffLen)
{
if (ctx == NULL || buffLen == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->sharedSecret == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
if (buff == NULL) {
*buffLen = ctx->sharedSecretLen;
return CRYPT_SUCCESS;
}
if (*buffLen < ctx->sharedSecretLen) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
(void)memcpy_s(buff, *buffLen, ctx->sharedSecret, ctx->sharedSecretLen);
*buffLen = ctx->sharedSecretLen;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_HpkeSetSharedSecret(CRYPT_EAL_HpkeCtx *ctx, uint8_t *info, uint32_t infoLen,
uint8_t *buff, uint32_t buffLen)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->sharedSecret != NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
if (buff == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if ((info == NULL && infoLen != 0) || (info != NULL && infoLen == 0)) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
if (buffLen != g_hpkeKemAlgInfo[ctx->kemIndex].sharedKeyLen) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
if (ctx->mode == CRYPT_HPKE_MODE_PSK || ctx->mode == CRYPT_HPKE_MODE_AUTH_PSK) {
if (ctx->authInfo == NULL || ctx->authInfo->psk == NULL || ctx->authInfo->pskId == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
}
int32_t ret = HpkeKeySchedule(ctx, buff, buffLen, info, infoLen);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ctx->sharedSecret = BSL_SAL_Dump(buff, buffLen);
if (ctx->sharedSecret == NULL) {
HpkeFreeKeyInfo(ctx);
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ctx->sharedSecretLen = buffLen;
HpkeFreeAuthInfo(ctx); // Derived key successfully, no longer requires authinfo
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_HpkeSetPsk(CRYPT_EAL_HpkeCtx *ctx, uint8_t *psk, uint32_t pskLen, uint8_t *pskId, uint32_t pskIdLen)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->mode != CRYPT_HPKE_MODE_PSK && ctx->mode != CRYPT_HPKE_MODE_AUTH_PSK) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
if (ctx->authInfo == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
if (ctx->authInfo->psk != NULL || ctx->authInfo->pskId != NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
// psk and pskId must appear together
if (psk == NULL || pskIdLen == 0 || pskId == NULL || pskLen == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
ctx->authInfo->psk = BSL_SAL_Dump(psk, pskLen);
if (ctx->authInfo->psk == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ctx->authInfo->pskLen = pskLen;
ctx->authInfo->pskId = BSL_SAL_Dump(pskId, pskIdLen);
if (ctx->authInfo->pskId == NULL) {
BSL_SAL_ClearFree(ctx->authInfo->psk, ctx->authInfo->pskLen);
ctx->authInfo->psk = NULL;
ctx->authInfo->pskLen = 0;
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ctx->authInfo->pskIdLen = pskIdLen;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_HpkeSetAuthPriKey(CRYPT_EAL_HpkeCtx *ctx, CRYPT_EAL_PkeyCtx *pkey)
{
if (ctx == NULL || pkey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->mode != CRYPT_HPKE_MODE_AUTH && ctx->mode != CRYPT_HPKE_MODE_AUTH_PSK) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
if (ctx->role != CRYPT_HPKE_SENDER) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
if (ctx->authInfo == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
if (ctx->authInfo->authPkey != NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
CRYPT_EAL_PkeyCtx *skS = NULL;
#ifdef HITLS_CRYPTO_PROVIDER
skS = CRYPT_EAL_ProviderPkeyNewCtx(ctx->libCtx, g_hpkeKemAlgInfo[ctx->kemIndex].pkeyId,
CRYPT_EAL_PKEY_EXCH_OPERATE, ctx->attrName);
#else
skS = CRYPT_EAL_PkeyNewCtx(g_hpkeKemAlgInfo[ctx->kemIndex].pkeyId);
#endif
if (skS == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_FAILED_FETCH_PKEY);
return CRYPT_HPKE_FAILED_FETCH_PKEY;
}
int32_t ret = CRYPT_EAL_PkeyCopyCtx(skS, pkey);
if (ret != CRYPT_SUCCESS) {
CRYPT_EAL_PkeyFreeCtx(skS);
return ret;
}
ctx->authInfo->authPkey = skS;
return CRYPT_SUCCESS;
}
int32_t CRYPT_EAL_HpkeSetAuthPubKey(CRYPT_EAL_HpkeCtx *ctx, uint8_t *pub, uint32_t pubLen)
{
if (ctx == NULL || pub == NULL || pubLen == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->mode != CRYPT_HPKE_MODE_AUTH && ctx->mode != CRYPT_HPKE_MODE_AUTH_PSK) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
if (ctx->role != CRYPT_HPKE_RECIPIENT) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
if (ctx->authInfo == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
if (ctx->authInfo->authPkey != NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_HPKE_ERR_CALL);
return CRYPT_HPKE_ERR_CALL;
}
CRYPT_EAL_PkeyCtx *pkS = NULL;
int32_t ret = HpkeCreatePubKey(ctx->kemIndex, pub, pubLen, &pkS, ctx->libCtx, ctx->attrName);
if (ret != CRYPT_SUCCESS) {
return ret;
}
ctx->authInfo->authPkey = pkS;
return CRYPT_SUCCESS;
}
#endif // HITLS_CRYPTO_HPKE
|
2301_79861745/bench_create
|
crypto/hpke/src/hpke.c
|
C
|
unknown
| 58,577
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_HYBRIDKEM_H
#define CRYPT_HYBRIDKEM_H
#include <stdint.h>
#include "crypt_types.h"
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_ECDH
typedef struct HybridKemCtx CRYPT_HybridKemCtx;
CRYPT_HybridKemCtx *CRYPT_HYBRID_KEM_NewCtx(void);
CRYPT_HybridKemCtx *CRYPT_HYBRID_KEM_NewCtxEx(void *libCtx);
void CRYPT_HYBRID_KEM_FreeCtx(CRYPT_HybridKemCtx *ctx);
int32_t CRYPT_HYBRID_KEM_KeyCtrl(CRYPT_HybridKemCtx *ctx, int32_t opt, void *val, uint32_t len);
int32_t CRYPT_HYBRID_KEM_GenKey(CRYPT_HybridKemCtx *ctx);
int32_t CRYPT_HYBRID_KEM_SetEncapsKey(CRYPT_HybridKemCtx *ctx, const CRYPT_KemEncapsKey *ek);
int32_t CRYPT_HYBRID_KEM_SetDecapsKey(CRYPT_HybridKemCtx *ctx, const CRYPT_KemDecapsKey *dk);
int32_t CRYPT_HYBRID_KEM_GetEncapsKey(const CRYPT_HybridKemCtx *ctx, CRYPT_KemEncapsKey *ek);
int32_t CRYPT_HYBRID_KEM_GetDecapsKey(const CRYPT_HybridKemCtx *ctx, CRYPT_KemDecapsKey *dk);
int32_t CRYPT_HYBRID_KEM_GetEncapsKeyEx(const CRYPT_HybridKemCtx *ctx, BSL_Param *para);
int32_t CRYPT_HYBRID_KEM_GetDecapsKeyEx(const CRYPT_HybridKemCtx *ctx, BSL_Param *para);
int32_t CRYPT_HYBRID_KEM_SetEncapsKeyEx(CRYPT_HybridKemCtx *ctx, const BSL_Param *para);
int32_t CRYPT_HYBRID_KEM_SetDecapsKeyEx(CRYPT_HybridKemCtx *ctx, const BSL_Param *para);
int32_t CRYPT_HYBRID_KEM_Encaps(const CRYPT_HybridKemCtx *ctx, uint8_t *cipher, uint32_t *cipherLen,
uint8_t *share, uint32_t *shareLen);
int32_t CRYPT_HYBRID_KEM_Decaps(const CRYPT_HybridKemCtx *ctx, uint8_t *cipher, uint32_t cipherLen,
uint8_t *share, uint32_t *shareLen);
#endif
#endif // CRYPT_HYBRIDKEM_H
|
2301_79861745/bench_create
|
crypto/hybridkem/include/crypt_hybridkem.h
|
C
|
unknown
| 2,129
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_HYBRIDKEM
#include "securec.h"
#include "bsl_sal.h"
#include "sal_atomic.h"
#include "eal_pkey_local.h"
#include "crypt_eal_pkey.h"
#include "crypt_utils.h"
#include "crypt_algid.h"
#include "crypt_hybridkem_local.h"
#include "crypt_hybridkem.h"
#include "crypt_ecdh.h"
#include "crypt_curve25519.h"
#include "crypt_mlkem.h"
typedef struct {
int32_t hybrId;
int32_t pkeyParam;
int32_t kemParam;
int32_t pkeyAlg;
int32_t kemAlg;
} HybridKemIdList;
static const HybridKemIdList HYBRID_KEY_LIST[] = {
{CRYPT_HYBRID_X25519_MLKEM512, 0, CRYPT_KEM_TYPE_MLKEM_512, CRYPT_PKEY_X25519, CRYPT_PKEY_ML_KEM},
{CRYPT_HYBRID_X25519_MLKEM768, 0, CRYPT_KEM_TYPE_MLKEM_768, CRYPT_PKEY_X25519, CRYPT_PKEY_ML_KEM},
{CRYPT_HYBRID_X25519_MLKEM1024, 0, CRYPT_KEM_TYPE_MLKEM_1024, CRYPT_PKEY_X25519, CRYPT_PKEY_ML_KEM},
{CRYPT_HYBRID_ECDH_NISTP256_MLKEM512, CRYPT_ECC_NISTP256, CRYPT_KEM_TYPE_MLKEM_512,
CRYPT_PKEY_ECDH, CRYPT_PKEY_ML_KEM},
{CRYPT_HYBRID_ECDH_NISTP256_MLKEM768, CRYPT_ECC_NISTP256, CRYPT_KEM_TYPE_MLKEM_768,
CRYPT_PKEY_ECDH, CRYPT_PKEY_ML_KEM},
{CRYPT_HYBRID_ECDH_NISTP256_MLKEM1024, CRYPT_ECC_NISTP256, CRYPT_KEM_TYPE_MLKEM_1024,
CRYPT_PKEY_ECDH, CRYPT_PKEY_ML_KEM},
{CRYPT_HYBRID_ECDH_NISTP384_MLKEM512, CRYPT_ECC_NISTP384, CRYPT_KEM_TYPE_MLKEM_512,
CRYPT_PKEY_ECDH, CRYPT_PKEY_ML_KEM},
{CRYPT_HYBRID_ECDH_NISTP384_MLKEM768, CRYPT_ECC_NISTP384, CRYPT_KEM_TYPE_MLKEM_768,
CRYPT_PKEY_ECDH, CRYPT_PKEY_ML_KEM},
{CRYPT_HYBRID_ECDH_NISTP384_MLKEM1024, CRYPT_ECC_NISTP384, CRYPT_KEM_TYPE_MLKEM_1024,
CRYPT_PKEY_ECDH, CRYPT_PKEY_ML_KEM},
{CRYPT_HYBRID_ECDH_NISTP521_MLKEM512, CRYPT_ECC_NISTP521, CRYPT_KEM_TYPE_MLKEM_512,
CRYPT_PKEY_ECDH, CRYPT_PKEY_ML_KEM},
{CRYPT_HYBRID_ECDH_NISTP521_MLKEM768, CRYPT_ECC_NISTP521, CRYPT_KEM_TYPE_MLKEM_768,
CRYPT_PKEY_ECDH, CRYPT_PKEY_ML_KEM},
{CRYPT_HYBRID_ECDH_NISTP521_MLKEM1024, CRYPT_ECC_NISTP521, CRYPT_KEM_TYPE_MLKEM_1024,
CRYPT_PKEY_ECDH, CRYPT_PKEY_ML_KEM},
};
static int32_t HybridGetCurveIdAndKemId(int32_t hybrId, const HybridKemIdList **algInfo)
{
for (uint32_t i = 0; i < (sizeof(HYBRID_KEY_LIST) / sizeof(HYBRID_KEY_LIST[0])); i++) {
if (HYBRID_KEY_LIST[i].hybrId == hybrId) {
*algInfo = &HYBRID_KEY_LIST[i];
return CRYPT_SUCCESS;
}
}
return CRYPT_ERR_ALGID;
}
CRYPT_HybridKemCtx *CRYPT_HYBRID_KEM_NewCtx(void)
{
CRYPT_HybridKemCtx *hybridKey = BSL_SAL_Calloc(sizeof(CRYPT_HybridKemCtx), 1);
if (hybridKey == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
BSL_SAL_ReferencesInit(&(hybridKey->references));
return hybridKey;
}
CRYPT_HybridKemCtx *CRYPT_HYBRID_KEM_NewCtxEx(void *libCtx)
{
CRYPT_HybridKemCtx *hybridKey = CRYPT_HYBRID_KEM_NewCtx();
if (hybridKey == NULL) {
return NULL;
}
hybridKey->libCtx = libCtx;
return hybridKey;
}
void CRYPT_HYBRID_KEM_FreeCtx(CRYPT_HybridKemCtx *hybridKey)
{
if (hybridKey == NULL) {
return;
}
int ref = 0;
BSL_SAL_AtomicDownReferences(&(hybridKey->references), &ref);
if (ref > 0) {
return;
}
BSL_SAL_ReferencesFree(&(hybridKey->references));
if (hybridKey->pKeyMethod != NULL && hybridKey->pKeyMethod->freeCtx != NULL) {
hybridKey->pKeyMethod->freeCtx(hybridKey->pkeyCtx);
}
if (hybridKey->kemMethod != NULL && hybridKey->kemMethod->freeCtx != NULL) {
hybridKey->kemMethod->freeCtx(hybridKey->kemCtx);
}
BSL_SAL_FREE(hybridKey);
}
static void *CRYPT_HybridNewPkeyCtx(CRYPT_HybridKemCtx *ctx, int32_t algId)
{
void *pkeyCtx = NULL;
#ifdef HITLS_CRYPTO_PROVIDER
if (algId == CRYPT_PKEY_X25519) {
pkeyCtx = CRYPT_X25519_NewCtxEx(ctx->libCtx);
} else {
pkeyCtx = CRYPT_ECDH_NewCtxEx(ctx->libCtx);
}
#else
(void) ctx;
if (algId == CRYPT_PKEY_X25519) {
pkeyCtx = CRYPT_X25519_NewCtx();
} else {
pkeyCtx = CRYPT_ECDH_NewCtx();
}
#endif
return pkeyCtx;
}
static void *CRYPT_HybridNewKemCtx(CRYPT_HybridKemCtx *ctx, int32_t algId)
{
(void) algId;
void *kemCtx = NULL;
#ifdef HITLS_CRYPTO_PROVIDER
kemCtx = CRYPT_ML_KEM_NewCtxEx(ctx->libCtx);
#else
(void) ctx;
kemCtx = CRYPT_ML_KEM_NewCtx();
#endif
return kemCtx;
}
static int32_t CRYPT_HybridSetKeyType(CRYPT_HybridKemCtx *ctx, int32_t val)
{
int32_t ret;
const HybridKemIdList *algInfo = NULL;
RETURN_RET_IF((ctx->pkeyCtx != NULL || ctx->kemCtx != NULL), CRYPT_INVALID_ARG);
RETURN_RET_IF_ERR(HybridGetCurveIdAndKemId(val, &algInfo), ret);
const EAL_PkeyMethod *pKeyMethod = CRYPT_EAL_PkeyFindMethod(algInfo->pkeyAlg);
const EAL_PkeyMethod *kemMethod = CRYPT_EAL_PkeyFindMethod(algInfo->kemAlg);
RETURN_RET_IF((pKeyMethod == NULL || kemMethod == NULL), CRYPT_NOT_SUPPORT);
ctx->pkeyCtx = CRYPT_HybridNewPkeyCtx(ctx, algInfo->pkeyAlg);
RETURN_RET_IF(ctx->pkeyCtx == NULL, CRYPT_MEM_ALLOC_FAIL);
ctx->kemCtx = CRYPT_HybridNewKemCtx(ctx, algInfo->kemAlg);
if (ctx->kemCtx == NULL) {
pKeyMethod->freeCtx(ctx->pkeyCtx);
ctx->pkeyCtx = NULL;
return CRYPT_MEM_ALLOC_FAIL;
}
ctx->pKeyMethod = pKeyMethod;
ctx->kemMethod = kemMethod;
int32_t kemType = algInfo->kemParam;
int32_t curveId = algInfo->pkeyParam;
GOTO_ERR_IF_EX(ctx->kemMethod->ctrl(ctx->kemCtx, CRYPT_CTRL_SET_PARA_BY_ID, &kemType, sizeof(kemType)), ret);
if (curveId == 0) { // For X25519, the curve ID does not need to be set.
return CRYPT_SUCCESS;
}
GOTO_ERR_IF_EX(ctx->pKeyMethod->ctrl(ctx->pkeyCtx, CRYPT_CTRL_SET_PARA_BY_ID, &curveId, sizeof(curveId)), ret);
return CRYPT_SUCCESS;
ERR:
pKeyMethod->freeCtx(ctx->pkeyCtx);
ctx->pkeyCtx = NULL;
kemMethod->freeCtx(ctx->kemCtx);
ctx->kemCtx = NULL;
return ret;
}
static int32_t CRYPT_HybridGetEncapsKeyLen(const CRYPT_HybridKemCtx *ctx, uint32_t *pubLen, uint32_t *ekLen)
{
int32_t ret;
uint32_t val;
RETURN_RET_IF((ctx->pKeyMethod == NULL || ctx->kemMethod == NULL), CRYPT_NULL_INPUT);
RETURN_RET_IF_ERR(ctx->pKeyMethod->ctrl(ctx->pkeyCtx, CRYPT_CTRL_GET_PUBKEY_LEN, &val, sizeof(val)), ret);
*pubLen = val;
RETURN_RET_IF_ERR(ctx->kemMethod->ctrl(ctx->kemCtx, CRYPT_CTRL_GET_PUBKEY_LEN, &val, sizeof(val)), ret);
*ekLen = val;
return CRYPT_SUCCESS;
}
static int32_t CRYPT_HybridGetDecapsKeyLen(const CRYPT_HybridKemCtx *ctx, uint32_t *prvLen, uint32_t *dkLen)
{
int32_t ret;
uint32_t val;
RETURN_RET_IF((ctx->pKeyMethod == NULL || ctx->kemMethod == NULL), CRYPT_NULL_INPUT);
RETURN_RET_IF_ERR(ctx->pKeyMethod->ctrl(ctx->pkeyCtx, CRYPT_CTRL_GET_PRVKEY_LEN, &val, sizeof(val)), ret);
*prvLen = val;
RETURN_RET_IF_ERR(ctx->kemMethod->ctrl(ctx->kemCtx, CRYPT_CTRL_GET_PRVKEY_LEN, &val, sizeof(val)), ret);
*dkLen = val;
return CRYPT_SUCCESS;
}
static int32_t CRYPT_HybridGetCipherTextLen(const CRYPT_HybridKemCtx *ctx, uint32_t *pubLen, uint32_t *ctLen)
{
int32_t ret;
uint32_t val;
RETURN_RET_IF((ctx->pKeyMethod == NULL || ctx->kemMethod == NULL), CRYPT_NULL_INPUT);
RETURN_RET_IF_ERR(ctx->pKeyMethod->ctrl(ctx->pkeyCtx, CRYPT_CTRL_GET_PUBKEY_LEN, &val, sizeof(val)), ret);
*pubLen = val;
RETURN_RET_IF_ERR(ctx->kemMethod->ctrl(ctx->kemCtx, CRYPT_CTRL_GET_CIPHERTEXT_LEN, &val, sizeof(val)), ret);
*ctLen = val;
return CRYPT_SUCCESS;
}
static int32_t CRYPT_HybridGetShareKeyLen(const CRYPT_HybridKemCtx *ctx, uint32_t *pkeyLen, uint32_t *kemLen)
{
int32_t ret;
uint32_t val;
RETURN_RET_IF((ctx->pKeyMethod == NULL || ctx->kemMethod == NULL), CRYPT_NULL_INPUT);
RETURN_RET_IF_ERR(ctx->pKeyMethod->ctrl(ctx->pkeyCtx, CRYPT_CTRL_GET_SHARED_KEY_LEN, &val, sizeof(val)), ret);
*pkeyLen = val;
RETURN_RET_IF_ERR(ctx->kemMethod->ctrl(ctx->kemCtx, CRYPT_CTRL_GET_SHARED_KEY_LEN, &val, sizeof(val)), ret);
*kemLen = val;
return CRYPT_SUCCESS;
}
static int32_t CRYPT_HybridSetEccPointFormit(const CRYPT_HybridKemCtx *ctx, void *val, uint32_t len)
{
RETURN_RET_IF((ctx->pKeyMethod == NULL || ctx->pkeyCtx == NULL), CRYPT_INVALID_ARG);
return ctx->pKeyMethod->ctrl(ctx->pkeyCtx, CRYPT_CTRL_SET_ECC_POINT_FORMAT, val, len);
}
int32_t CRYPT_HYBRID_KEM_KeyCtrl(CRYPT_HybridKemCtx *ctx, int32_t opt, void *val, uint32_t len)
{
int32_t ret;
RETURN_RET_IF(ctx == NULL || val == NULL, CRYPT_NULL_INPUT);
RETURN_RET_IF(len != sizeof(uint32_t), CRYPT_INVALID_ARG);
uint32_t pkeyLen = 0;
uint32_t kemLen = 0;
switch (opt) {
case CRYPT_CTRL_SET_PARA_BY_ID:
return CRYPT_HybridSetKeyType(ctx, *(int32_t *)val);
case CRYPT_CTRL_GET_PUBKEY_LEN:
ret = CRYPT_HybridGetEncapsKeyLen(ctx, &pkeyLen, &kemLen);
break;
case CRYPT_CTRL_GET_PRVKEY_LEN:
ret = CRYPT_HybridGetDecapsKeyLen(ctx, &pkeyLen, &kemLen);
break;
case CRYPT_CTRL_GET_CIPHERTEXT_LEN:
ret = CRYPT_HybridGetCipherTextLen(ctx, &pkeyLen, &kemLen);
break;
case CRYPT_CTRL_GET_SHARED_KEY_LEN:
ret = CRYPT_HybridGetShareKeyLen(ctx, &pkeyLen, &kemLen);
break;
case CRYPT_CTRL_SET_ECC_POINT_FORMAT:
return CRYPT_HybridSetEccPointFormit(ctx, val, len);
default:
BSL_ERR_PUSH_ERROR(CRYPT_NOT_SUPPORT);
return CRYPT_NOT_SUPPORT;
}
RETURN_RET_IF(ret != CRYPT_SUCCESS, ret);
*(uint32_t *)val = pkeyLen + kemLen;
return CRYPT_SUCCESS;
}
int32_t CRYPT_HYBRID_KEM_GenKey(CRYPT_HybridKemCtx *ctx)
{
int32_t ret;
RETURN_RET_IF(ctx == NULL, CRYPT_NULL_INPUT);
RETURN_RET_IF((ctx->pKeyMethod == NULL || ctx->kemMethod == NULL), CRYPT_NULL_INPUT);
RETURN_RET_IF_ERR(ctx->pKeyMethod->gen(ctx->pkeyCtx), ret);
return ctx->kemMethod->gen(ctx->kemCtx);
}
/*
* According of <Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3>, when MLKEM and X25519 are mixed,
* the key of MLKEM is before the key of X25519.
* Protocol link: www.ietf.org/archive/id/draft-kwiatkowski-tls-ecdhe-mlkem-03.html#name-negotiated-groups
*/
static int32_t CRYPT_HybridGetKeyPtr(const CRYPT_HybridKemCtx *ctx, void *pub, uint32_t pubLen, BSL_Param *pkeyData,
BSL_Param *kemData)
{
RETURN_RET_IF(pubLen < (pkeyData->valueLen + kemData->valueLen), CRYPT_INVALID_ARG);
if (ctx->pKeyMethod->id == CRYPT_PKEY_X25519) {
kemData->value = pub;
pkeyData->value = pub + kemData->valueLen;
} else {
pkeyData->value = pub;
kemData->value = pub + pkeyData->valueLen;
}
return CRYPT_SUCCESS;
}
// Get the local public Key and kem encapsulation key.
int32_t CRYPT_HYBRID_KEM_GetEncapsKey(const CRYPT_HybridKemCtx *ctx, CRYPT_KemEncapsKey *ek)
{
int32_t ret;
RETURN_RET_IF((ctx == NULL || ek == NULL || ek->data == NULL), CRYPT_NULL_INPUT);
BSL_Param pubKey[2] = {{CRYPT_PARAM_EC_PUBKEY, BSL_PARAM_TYPE_OCTETS, NULL, 0, 0}, BSL_PARAM_END};
BSL_Param kemEK[2] = {{CRYPT_PARAM_ML_KEM_PUBKEY, BSL_PARAM_TYPE_OCTETS, NULL, 0, 0}, BSL_PARAM_END};
RETURN_RET_IF_ERR(CRYPT_HybridGetEncapsKeyLen(ctx, &(pubKey[0].valueLen), &(kemEK[0].valueLen)), ret);
RETURN_RET_IF_ERR(CRYPT_HybridGetKeyPtr(ctx, ek->data, ek->len, pubKey, kemEK), ret);
if (ctx->pKeyMethod->id == CRYPT_PKEY_X25519) {
pubKey[0].key = CRYPT_PARAM_CURVE25519_PUBKEY;
}
RETURN_RET_IF_ERR(ctx->pKeyMethod->getPub(ctx->pkeyCtx, pubKey), ret);
RETURN_RET_IF_ERR(ctx->kemMethod->getPub(ctx->kemCtx, kemEK), ret);
ek->len = pubKey[0].useLen + kemEK[0].useLen;
return CRYPT_SUCCESS;
}
int32_t CRYPT_HYBRID_KEM_GetDecapsKey(const CRYPT_HybridKemCtx *ctx, CRYPT_KemDecapsKey *dk)
{
int32_t ret;
RETURN_RET_IF((ctx == NULL || dk == NULL || dk->data == NULL), CRYPT_NULL_INPUT);
BSL_Param prvKey[2] = {{CRYPT_PARAM_EC_PRVKEY, BSL_PARAM_TYPE_OCTETS, NULL, 0, 0}, BSL_PARAM_END};
BSL_Param kemDK[2] = {{CRYPT_PARAM_ML_KEM_PRVKEY, BSL_PARAM_TYPE_OCTETS, NULL, 0, 0}, BSL_PARAM_END};
RETURN_RET_IF_ERR(CRYPT_HybridGetDecapsKeyLen(ctx, &prvKey[0].valueLen, &kemDK[0].valueLen), ret);
RETURN_RET_IF_ERR(CRYPT_HybridGetKeyPtr(ctx, dk->data, dk->len, prvKey, kemDK), ret);
if (ctx->pKeyMethod->id == CRYPT_PKEY_X25519) {
prvKey[0].key = CRYPT_PARAM_CURVE25519_PRVKEY;
}
RETURN_RET_IF_ERR(ctx->pKeyMethod->getPrv(ctx->pkeyCtx, prvKey), ret);
RETURN_RET_IF_ERR(ctx->kemMethod->getPrv(ctx->kemCtx, kemDK), ret);
dk->len = prvKey[0].useLen + kemDK[0].useLen;
return CRYPT_SUCCESS;
}
// Set the public key and kem encapsulation key.
int32_t CRYPT_HYBRID_KEM_SetEncapsKey(CRYPT_HybridKemCtx *ctx, const CRYPT_KemEncapsKey *ek)
{
int32_t ret;
RETURN_RET_IF((ctx == NULL || ek == NULL || ek->data == NULL), CRYPT_NULL_INPUT);
BSL_Param pubKey[2] = {{CRYPT_PARAM_EC_PUBKEY, BSL_PARAM_TYPE_OCTETS, NULL, 0, 0}, BSL_PARAM_END};
BSL_Param kemEK[2] = {{CRYPT_PARAM_ML_KEM_PUBKEY, BSL_PARAM_TYPE_OCTETS, NULL, 0, 0}, BSL_PARAM_END};
RETURN_RET_IF_ERR(CRYPT_HybridGetEncapsKeyLen(ctx, &pubKey[0].valueLen, &kemEK[0].valueLen), ret);
RETURN_RET_IF(ek->len < kemEK[0].valueLen, CRYPT_INVALID_ARG);
pubKey[0].valueLen = ek->len - kemEK[0].valueLen;
RETURN_RET_IF_ERR(CRYPT_HybridGetKeyPtr(ctx, ek->data, ek->len, pubKey, kemEK), ret);
if (ctx->pKeyMethod->id == CRYPT_PKEY_X25519) {
pubKey[0].key = CRYPT_PARAM_CURVE25519_PUBKEY;
}
RETURN_RET_IF_ERR(ctx->kemMethod->setPub(ctx->kemCtx, kemEK), ret);
return ctx->pKeyMethod->setPub(ctx->pkeyCtx, pubKey);
}
int32_t CRYPT_HYBRID_KEM_SetDecapsKey(CRYPT_HybridKemCtx *ctx, const CRYPT_KemDecapsKey *dk)
{
int32_t ret;
RETURN_RET_IF((ctx == NULL || dk == NULL || dk->data == NULL), CRYPT_NULL_INPUT);
BSL_Param prvKey[2] = {{CRYPT_PARAM_EC_PRVKEY, BSL_PARAM_TYPE_OCTETS, NULL, 0, 0}, BSL_PARAM_END};
BSL_Param kemDK[2] = {{CRYPT_PARAM_ML_KEM_PRVKEY, BSL_PARAM_TYPE_OCTETS, NULL, 0, 0}, BSL_PARAM_END};
RETURN_RET_IF_ERR(CRYPT_HybridGetDecapsKeyLen(ctx, &(prvKey[0].valueLen), &(kemDK[0].valueLen)), ret);
RETURN_RET_IF_ERR(CRYPT_HybridGetKeyPtr(ctx, dk->data, dk->len, prvKey, kemDK), ret);
if (ctx->pKeyMethod->id == CRYPT_PKEY_X25519) {
prvKey[0].key = CRYPT_PARAM_CURVE25519_PRVKEY;
}
RETURN_RET_IF_ERR(ctx->kemMethod->setPrv(ctx->kemCtx, kemDK), ret);
return ctx->pKeyMethod->setPrv(ctx->pkeyCtx, prvKey);
}
int32_t CRYPT_HYBRID_KEM_GetEncapsKeyEx(const CRYPT_HybridKemCtx *ctx, BSL_Param *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_KemEncapsKey pub = {0};
BSL_Param *paramPub = GetParamValue(para, CRYPT_PARAM_HYBRID_PUBKEY, &pub.data, &(pub.len));
if (paramPub == NULL) {
paramPub = GetParamValue(para, CRYPT_PARAM_PKEY_ENCODE_PUBKEY, &pub.data, &(pub.len));
}
int32_t ret = CRYPT_HYBRID_KEM_GetEncapsKey(ctx, &pub);
if (ret != CRYPT_SUCCESS) {
return ret;
}
paramPub->useLen = pub.len;
return CRYPT_SUCCESS;
}
int32_t CRYPT_HYBRID_KEM_GetDecapsKeyEx(const CRYPT_HybridKemCtx *ctx, BSL_Param *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_KemDecapsKey prv = {0};
BSL_Param *paramPrv = GetParamValue(para, CRYPT_PARAM_HYBRID_PRVKEY, &prv.data, &(prv.len));
int32_t ret = CRYPT_HYBRID_KEM_GetDecapsKey(ctx, &prv);
if (ret != CRYPT_SUCCESS) {
return ret;
}
paramPrv->useLen = prv.len;
return CRYPT_SUCCESS;
}
int32_t CRYPT_HYBRID_KEM_SetEncapsKeyEx(CRYPT_HybridKemCtx *ctx, const BSL_Param *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_KemEncapsKey pub = {0};
if (GetConstParamValue(para, CRYPT_PARAM_HYBRID_PUBKEY, &pub.data, &pub.len) == NULL) {
(void)GetConstParamValue(para, CRYPT_PARAM_PKEY_ENCODE_PUBKEY, &pub.data, &pub.len);
}
return CRYPT_HYBRID_KEM_SetEncapsKey(ctx, &pub);
}
int32_t CRYPT_HYBRID_KEM_SetDecapsKeyEx(CRYPT_HybridKemCtx *ctx, const BSL_Param *para)
{
if (para == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
CRYPT_KemDecapsKey prv = {0};
(void)GetConstParamValue(para, CRYPT_PARAM_HYBRID_PRVKEY, &prv.data, &prv.len);
return CRYPT_HYBRID_KEM_SetDecapsKey(ctx, &prv);
}
int32_t CRYPT_HYBRID_KEM_Encaps(const CRYPT_HybridKemCtx *ctx, uint8_t *cipher, uint32_t *cipherLen,
uint8_t *sharekey, uint32_t *shareLen)
{
int32_t ret;
RETURN_RET_IF((ctx == NULL || cipher == NULL || cipherLen == NULL || sharekey == NULL || shareLen == NULL),
CRYPT_NULL_INPUT);
BSL_Param kemCT = { 0 };
BSL_Param pubKey[2] = {{CRYPT_PARAM_EC_PUBKEY, BSL_PARAM_TYPE_OCTETS, NULL, 0, 0}, BSL_PARAM_END};
RETURN_RET_IF_ERR(CRYPT_HybridGetCipherTextLen(ctx, &(pubKey[0].valueLen), &(kemCT.valueLen)), ret);
RETURN_RET_IF_ERR(CRYPT_HybridGetKeyPtr(ctx, cipher, *cipherLen, pubKey, &kemCT), ret);
void *tmpKey = ctx->pKeyMethod->dupCtx(ctx->pkeyCtx);
RETURN_RET_IF(tmpKey == NULL, CRYPT_MEM_ALLOC_FAIL);
GOTO_ERR_IF(ctx->pKeyMethod->gen(tmpKey), ret);
if (ctx->pKeyMethod->id == CRYPT_PKEY_X25519) {
pubKey[0].key = CRYPT_PARAM_CURVE25519_PUBKEY;
}
GOTO_ERR_IF(ctx->pKeyMethod->getPub(tmpKey, pubKey), ret);
BSL_Param kemSK = { 0 };
BSL_Param pkeyShared = { 0 };
GOTO_ERR_IF(CRYPT_HybridGetShareKeyLen(ctx, &pkeyShared.valueLen, &kemSK.valueLen), ret);
GOTO_ERR_IF(CRYPT_HybridGetKeyPtr(ctx, sharekey, *shareLen, &pkeyShared, &kemSK), ret);
GOTO_ERR_IF(ctx->pKeyMethod->computeShareKey(tmpKey, ctx->pkeyCtx, pkeyShared.value, &pkeyShared.valueLen), ret);
GOTO_ERR_IF(ctx->kemMethod->encaps(ctx->kemCtx, kemCT.value, &kemCT.valueLen, kemSK.value, &kemSK.valueLen), ret);
*shareLen = pkeyShared.valueLen + kemSK.valueLen;
*cipherLen = pubKey[0].valueLen + kemCT.valueLen;
ERR:
ctx->pKeyMethod->freeCtx(tmpKey);
return ret;
}
int32_t CRYPT_HYBRID_KEM_Decaps(const CRYPT_HybridKemCtx *ctx, uint8_t *cipher, uint32_t cipherLen,
uint8_t *sharekey, uint32_t *shareLen)
{
int32_t ret;
RETURN_RET_IF((ctx == NULL || cipher == NULL || sharekey == NULL || shareLen == NULL), CRYPT_NULL_INPUT);
BSL_Param kemCT = { 0 };
BSL_Param pubKey[2] = {{CRYPT_PARAM_EC_PUBKEY, BSL_PARAM_TYPE_OCTETS, NULL, 0, 0}, BSL_PARAM_END};
RETURN_RET_IF_ERR(CRYPT_HybridGetCipherTextLen(ctx, &pubKey[0].valueLen, &kemCT.valueLen), ret);
RETURN_RET_IF_ERR(CRYPT_HybridGetKeyPtr(ctx, cipher, cipherLen, pubKey, &kemCT), ret);
void *tmpKey = ctx->pKeyMethod->dupCtx(ctx->pkeyCtx);
RETURN_RET_IF(tmpKey == NULL, CRYPT_MEM_ALLOC_FAIL);
if (ctx->pKeyMethod->id == CRYPT_PKEY_X25519) {
pubKey[0].key = CRYPT_PARAM_CURVE25519_PUBKEY;
}
GOTO_ERR_IF(ctx->pKeyMethod->setPub(tmpKey, pubKey), ret);
BSL_Param pkeyShared = { 0 };
BSL_Param kemSK = { 0 };
GOTO_ERR_IF(CRYPT_HybridGetShareKeyLen(ctx, &pkeyShared.valueLen, &kemSK.valueLen), ret);
GOTO_ERR_IF(CRYPT_HybridGetKeyPtr(ctx, sharekey, *shareLen, &pkeyShared, &kemSK), ret);
GOTO_ERR_IF(ctx->pKeyMethod->computeShareKey(ctx->pkeyCtx, tmpKey, pkeyShared.value, &pkeyShared.valueLen), ret);
GOTO_ERR_IF(ctx->kemMethod->decaps(ctx->kemCtx, kemCT.value, kemCT.valueLen, kemSK.value, &kemSK.valueLen), ret);
*shareLen = pkeyShared.valueLen + kemSK.valueLen;
ERR:
ctx->pKeyMethod->freeCtx(tmpKey);
return ret;
}
#endif
|
2301_79861745/bench_create
|
crypto/hybridkem/src/crypt_hybridkem.c
|
C
|
unknown
| 20,170
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_HYBRID_KEM_LOCAL_H
#define CRYPT_HYBRID_KEM_LOCAL_H
#include "crypt_local_types.h"
#include "sal_atomic.h"
struct HybridKemCtx {
void *pkeyCtx; // CRYPT_CURVE25519_Ctx or CRYPT_ECDH_Ctx
void *kemCtx; // CRYPT_ML_KEM_Ctx
const EAL_PkeyMethod *pKeyMethod;
const EAL_PkeyMethod *kemMethod;
BSL_SAL_RefCount references;
void *libCtx;
};
#endif
|
2301_79861745/bench_create
|
crypto/hybridkem/src/crypt_hybridkem_local.h
|
C
|
unknown
| 963
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_ARM_H
#define CRYPT_ARM_H
#ifndef CRYPT_VAL
#define CRYPT_VAL 16
#endif
#ifndef CRYPT_VAL2
#define CRYPT_VAL2 26
#endif
#if defined(__arm__) || defined (__arm)
#define CRYPT_CAP CRYPT_VAL
#define CRYPT_CE CRYPT_VAL2
#define CRYPT_ARM_NEON (1 << 12)
#define CRYPT_ARM_AES (1 << 0)
#define CRYPT_ARM_PMULL (1 << 1)
#define CRYPT_ARM_SHA1 (1 << 2)
#define CRYPT_ARM_SHA256 (1 << 3)
#elif defined(__aarch64__)
#define CRYPT_CAP CRYPT_VAL
#define CRYPT_CE CRYPT_VAL
#define CRYPT_ARM_NEON (1 << 1)
#define CRYPT_ARM_AES (1 << 3)
#define CRYPT_ARM_PMULL (1 << 4)
#define CRYPT_ARM_SHA1 (1 << 5)
#define CRYPT_ARM_SHA256 (1 << 6)
#define CRYPT_ARM_SM3 (1 << 18)
#define CRYPT_ARM_SM4 (1 << 19)
#define CRYPT_ARM_SHA512 (1 << 21)
#define CRYPT_CAP2 CRYPT_VAL2
#define CRYPT_ARM_CAP2_RNG (1 << 16)
#endif
#ifndef __ASSEMBLER__
extern uint32_t g_cryptArmCpuInfo;
#else
# ifdef HITLS_AARCH64_PACIASP
# define AARCH64_PACIASP hint #25
# define AARCH64_AUTIASP hint #29
# else
# define AARCH64_PACIASP
# define AARCH64_AUTIASP
# endif
#endif
#endif
|
2301_79861745/bench_create
|
crypto/include/crypt_arm.h
|
C
|
unknown
| 1,824
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_CMVP_SELFTEST_H
#define CRYPT_CMVP_SELFTEST_H
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_CMVP_ISO19790) || defined(HITLS_CRYPTO_CMVP_SM) || defined(HITLS_CRYPTO_CMVP_FIPS)
#include <stdint.h>
#include "crypt_cmvp.h"
#include "crypt_types.h"
#include "crypt_eal_pkey.h"
#include "crypt_eal_rand.h"
#include "crypt_eal_md.h"
#include "crypt_eal_mac.h"
#include "crypt_eal_cipher.h"
#include "crypt_eal_kdf.h"
#ifdef __cplusplus
extern "C" {
#endif /* __cplusplus */
bool CRYPT_CMVP_SelftestDrbg(CRYPT_RAND_AlgId id);
bool CRYPT_CMVP_SelftestProviderDrbg(void *libCtx, const char *attrName, CRYPT_RAND_AlgId id);
bool CRYPT_CMVP_SelftestMd(CRYPT_MD_AlgId id);
bool CRYPT_CMVP_SelftestProviderMd(void *libCtx, const char *attrName, CRYPT_MD_AlgId id);
bool CRYPT_CMVP_SelftestRsa(void);
bool CRYPT_CMVP_SelftestProviderRsa(void *libCtx, const char *attrName);
bool CRYPT_CMVP_SelftestCipher(CRYPT_CIPHER_AlgId id);
bool CRYPT_CMVP_SelftestProviderCipher(void *libCtx, const char *attrName, CRYPT_CIPHER_AlgId id);
bool CRYPT_CMVP_SelftestChacha20poly1305(void);
bool CRYPT_CMVP_SelftestProviderChacha20poly1305(void *libCtx, const char *attrName);
bool CRYPT_CMVP_SelftestDh(void);
bool CRYPT_CMVP_SelftestProviderDh(void *libCtx, const char *attrName);
bool CRYPT_CMVP_SelftestDsa(void);
bool CRYPT_CMVP_SelftestProviderDsa(void *libCtx, const char *attrName);
bool CRYPT_CMVP_SelftestEd25519(void);
bool CRYPT_CMVP_SelftestProviderEd25519(void *libCtx, const char *attrName);
bool CRYPT_CMVP_SelftestHkdf(void);
bool CRYPT_CMVP_SelftestProviderHkdf(void *libCtx, const char *attrName);
bool CRYPT_CMVP_SelftestMac(CRYPT_MAC_AlgId id);
bool CRYPT_CMVP_SelftestProviderMac(void *libCtx, const char *attrName, CRYPT_MAC_AlgId id);
bool CRYPT_CMVP_SelftestPbkdf2(CRYPT_MAC_AlgId id);
bool CRYPT_CMVP_SelftestProviderPbkdf2(void *libCtx, const char *attrName, CRYPT_MAC_AlgId id);
bool CRYPT_CMVP_SelftestScrypt(void);
bool CRYPT_CMVP_SelftestProviderScrypt(void *libCtx, const char *attrName);
bool CRYPT_CMVP_SelftestKdfTls12(void);
bool CRYPT_CMVP_SelftestProviderKdfTls12(void *libCtx, const char *attrName);
bool CRYPT_CMVP_SelftestX25519(void);
bool CRYPT_CMVP_SelftestProviderX25519(void *libCtx, const char *attrName);
bool CRYPT_CMVP_SelftestEcdsa(void);
bool CRYPT_CMVP_SelftestProviderEcdsa(void *libCtx, const char *attrName);
bool CRYPT_CMVP_SelftestEcdh(void);
bool CRYPT_CMVP_SelftestProviderEcdh(void *libCtx, const char *attrName);
bool CRYPT_CMVP_SelftestSM2(void);
bool CRYPT_CMVP_SelftestProviderSM2(void *libCtx, const char *attrName);
bool CRYPT_CMVP_SelftestMlkemEncapsDecaps(void);
bool CRYPT_CMVP_SelftestProviderMlkemEncapsDecaps(void *libCtx, const char *attrName);
bool CRYPT_CMVP_SelftestMldsaSignVerify(void);
bool CRYPT_CMVP_SelftestProviderMldsaSignVerify(void *libCtx, const char *attrName);
bool CRYPT_CMVP_SelftestSlhdsaSignVerify(void);
bool CRYPT_CMVP_SelftestProviderSlhdsaSignVerify(void *libCtx, const char *attrName);
bool CRYPT_CMVP_SelftestPkeyPct(void *ctx, int32_t algId);
int32_t CRYPT_CMVP_RandomnessTest(const uint8_t *data, const uint32_t len);
#ifdef __cplusplus
}
#endif /* __cplusplus */
#endif /* HITLS_CRYPTO_CMVP_ISO19790 || HITLS_CRYPTO_CMVP_SM || HITLS_CRYPTO_CMVP_FIPS */
#endif /* CRYPT_CMVP_SELFTEST_H */
|
2301_79861745/bench_create
|
crypto/include/crypt_cmvp_selftest.h
|
C
|
unknown
| 3,870
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef EAL_DRBG_LOCAL_H
#define EAL_DRBG_LOCAL_H
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_EAL) && defined(HITLS_CRYPTO_DRBG)
#include <stdint.h>
#include "bsl_sal.h"
#include "crypt_eal_rand.h"
#include "crypt_algid.h"
#include "sal_atomic.h"
#include "crypt_local_types.h"
#ifdef __cplusplus
extern "C" {
#endif // __cplusplus
struct EAL_RndCtx {
bool isProvider;
CRYPT_RAND_AlgId id;
EAL_RandUnitaryMethod *meth;
void *ctx;
bool working; // whether the system is in the working state
bool isDefaultSeed;
BSL_SAL_ThreadLockHandle lock; // thread lock
};
typedef struct {
CRYPT_RAND_AlgId id; // seed-drbg algorithm
CRYPT_EAL_RndCtx *seed; // seed-drbg
void *seedCtx; // seed-drbg entropy source handle
CRYPT_RandSeedMethod seedMeth; // seed-drbg entropy source implementation function
BSL_SAL_RefCount references;
} EAL_SeedDrbg;
int32_t EAL_SeedDrbgInit(EAL_SeedDrbg *seedDrbg);
void EAL_SeedDrbgEntropyMeth(CRYPT_RandSeedMethod *meth);
void EAL_SeedDrbgRandDeinit(CRYPT_EAL_RndCtx *rndCtx);
int32_t EAL_RandFindMethod(CRYPT_RAND_AlgId id, EAL_RandMethLookup *lu);
/**
* @brief Global random deinitialization
*
* @param ctx handle of ctx
*/
void EAL_RandDeinit(CRYPT_EAL_RndCtx *ctx);
/**
* @brief Get default method.
*
* @param void
*/
EAL_RandUnitaryMethod* EAL_RandGetMethod(void);
/**
* @brief Get default seed method and ctx.
*
* @param seedMeth Seed method
* @param seedCtx Seed context
*/
int32_t EAL_GetDefaultSeed(CRYPT_RandSeedMethod *seedMeth, void **seedCtx);
#ifdef __cplusplus
}
#endif // __cplusplus
#endif // HITLS_CRYPTO_DRBG
#endif // EAL_DRBG_LOCAL_H
|
2301_79861745/bench_create
|
crypto/include/crypt_drbg_local.h
|
C
|
unknown
| 2,289
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_LOCAL_TYPES_H
#define CRYPT_LOCAL_TYPES_H
#include "crypt_algid.h"
#include "crypt_types.h"
#include "bsl_params.h"
#include "crypt_params_key.h"
#include "crypt_eal_provider.h"
#ifdef __cplusplus
extern "C" {
#endif // __cplusplus
#define CRYPT_PKEY_FLAG_DUP 0x01
#define CRYPT_PKEY_FLAG_NEED_EXPORT_CB 0x02
/* length function */
typedef int32_t (*GetLenFunc)(const void *ctx);
/* Prototype of the MD algorithm operation functions */
typedef void* (*MdNewCtx)(void *provCtx, int32_t algId);
typedef int32_t (*MdInit)(void *data, const BSL_Param *param);
typedef int32_t (*MdUpdate)(void *data, const uint8_t *input, uint32_t len);
typedef int32_t (*MdFinal)(void *data, uint8_t *out, uint32_t *len);
typedef int32_t (*MdDeinit)(void *data);
typedef int32_t (*MdCopyCtx)(void *dst, const void *src);
typedef void* (*MdDupCtx)(const void *src);
typedef void (*MdFreeCtx)(void *data);
typedef int32_t (*MdGetParam)(void *data, BSL_Param *param);
typedef int32_t (*MdSqueeze)(void *data, uint8_t *out, uint32_t len);
typedef struct {
uint32_t id;
uint16_t blockSize; // Block size processed by the hash algorithm at a time, which is used with other algorithms.
uint16_t mdSize; // Output length of the HASH algorithm
MdNewCtx newCtx; // generate md context
MdInit init; // Initialize the MD context.
MdUpdate update; // Add block data for MD calculation.
MdFinal final; // Complete the MD calculation and obtain the MD result.
MdDeinit deinit; // Clear the key information of the MD context.
MdCopyCtx copyCtx; // Copy the MD context.
MdDupCtx dupCtx; // Dup the MD context.
MdFreeCtx freeCtx; // free md context
MdGetParam getParam; // get/set md param
MdSqueeze squeeze; // squeeze the MD context.
} EAL_MdMethod;
typedef struct {
uint16_t hashSize; // Output length of the Siphash algorithm
uint16_t compressionRounds; // the number of compression rounds
uint16_t finalizationRounds; // the number of finalization rounds
} EAL_SiphashMethod;
/* provide asymmetric primitive method */
typedef void *(*PkeyNew)(void);
typedef void* (*PkeyProvNew)(void *provCtx, int32_t algId);
typedef void *(*PkeyDup)(void *key);
typedef void (*PkeyFree)(void *key);
typedef void *(*PkeyNewParaById)(int32_t id);
typedef CRYPT_PKEY_ParaId (*PkeyGetParaId)(const void *key);
typedef void (*PkeyFreePara)(void *para);
typedef int32_t (*PkeySetPara)(void *key, const void *para);
typedef int32_t (*PkeyGetPara)(const void *key, void *para);
typedef int32_t (*PkeyGen)(void *key);
typedef uint32_t (*PkeyBits)(void *key);
typedef uint32_t (*PkeyGetSignLen)(void *key);
typedef int32_t (*PkeyCtrl)(void *key, int32_t opt, void *val, uint32_t len);
typedef int32_t (*PkeySetPrv)(void *key, const void *para);
typedef int32_t (*PkeySetPub)(void *key, const void *para);
typedef int32_t (*PkeyGetPrv)(const void *key, void *para);
typedef int32_t (*PkeyGetPub)(const void *key, void *para);
typedef void *(*PkeyNewPara)(const void *para);
typedef int32_t (*PkeySign)(void *key, int32_t mdAlgId, const uint8_t *data, uint32_t dataLen,
uint8_t *sign, uint32_t *signLen);
typedef int32_t (*PkeySignData)(void *key, const uint8_t *data, uint32_t dataLen,
uint8_t *sign, uint32_t *signLen);
typedef int32_t (*PkeyVerify)(const void *key, int32_t mdAlgId, const uint8_t *data, uint32_t dataLen,
const uint8_t *sign, uint32_t signLen);
typedef int32_t (*PkeyVerifyData)(const void *key, const uint8_t *data, uint32_t dataLen,
const uint8_t *sign, uint32_t signLen);
typedef int32_t (*PkeyRecover)(const void *key, const uint8_t *sign, uint32_t signLen,
uint8_t *data, uint32_t *dataLen);
typedef int32_t (*PkeyComputeShareKey)(const void *key, const void *pub, uint8_t *share, uint32_t *shareLen);
typedef int32_t (*PkeyCrypt)(const void *key, const uint8_t *data, uint32_t dataLen, uint8_t *out, uint32_t *outLen);
typedef int32_t (*PkeyHEOperation)(const void *ctx, const BSL_Param *input, uint8_t *out, uint32_t *outLen);
typedef int32_t (*PkeyCheck)(uint32_t checkType, const void *key1, const void *key2);
typedef int32_t (*PkeyCmp)(const void *key1, const void *key2);
typedef int32_t (*PkeyCopyParam)(const void *src, void *dest);
typedef int32_t (*PkeyGetSecBits)(const void *key);
typedef int32_t (*PkeyEncapsulate)(const void *key, uint8_t *cipher, uint32_t *cipherLen,
uint8_t *share, uint32_t *shareLen);
typedef int32_t (*PkeyDecapsulate)(const void *key, const uint8_t *cipher, uint32_t cipherLen,
uint8_t *share, uint32_t *shareLen);
typedef int32_t (*PkeyEncapsulateInit)(const void *key, const BSL_Param *params);
typedef int32_t (*PkeyDecapsulateInit)(const void *key, const BSL_Param *params);
typedef int32_t (*PkeyBlind)(void *pkey, int32_t mdAlgId, const uint8_t *input, uint32_t inputLen,
uint8_t *out, uint32_t *outLen);
typedef int32_t (*PkeyUnBlind)(const void *pkey, const uint8_t *input, uint32_t inputLen,
uint8_t *out, uint32_t *outLen);
typedef int32_t (*PkeyImport)(void *key, const BSL_Param *params);
typedef int32_t (*PkeyExport)(const void *key, BSL_Param *params);
/**
* @ingroup EAL
*
* Method structure of the EAL
*/
typedef struct EAL_PkeyMethod {
uint32_t id;
PkeyNew newCtx; // Apply for a key pair structure resource.
PkeyDup dupCtx; // Copy key pair structure resource.
PkeyFree freeCtx; // Free the key structure.
PkeySetPara setPara; // Set parameters of the key pair structure.
PkeyGetPara getPara; // Obtain parameters from the key pair structure.
PkeyGen gen; // Generate a key pair.
PkeyCtrl ctrl; // Control function.
PkeySetPub setPub; // Set the public key.
PkeySetPrv setPrv; // Set the private key.
PkeyGetPub getPub; // Obtain the public key.
PkeyGetPrv getPrv; // Obtain the private key.
PkeySign sign; // Sign the signature.
PkeySignData signData; // sign the raw data
PkeyVerify verify; // Verify the signature.
PkeyVerifyData verifyData; // Verify the raw data
PkeyRecover recover; // Signature recovery.
PkeyComputeShareKey computeShareKey; // Calculate the shared key.
PkeyCrypt encrypt; // Encrypt.
PkeyCrypt decrypt; // Decrypt.
PkeyHEOperation headd; // Add
PkeyHEOperation hemul; // Multiply
PkeyCheck check; // Check the consistency of the key pair.
PkeyCmp cmp; // Compare keys and parameters.
PkeyCopyParam copyPara; // Copy parameter from source to destination
PkeyEncapsulate encaps; // Key encapsulation.
PkeyDecapsulate decaps; // Key decapsulation.
PkeyBlind blind; // msg blind
PkeyUnBlind unBlind; // sig unBlind.
} EAL_PkeyMethod;
typedef struct EAL_PkeyUnitaryMethod {
PkeyNew newCtx; // Apply for a key pair structure resource.
PkeyProvNew provNewCtx; // Creat a key pair structure resource for provider
PkeyDup dupCtx; // Copy key pair structure resource.
PkeyFree freeCtx; // Free the key structure.
PkeySetPara setPara; // Set parameters of the key pair structure.
PkeyGetPara getPara; // Obtain parameters from the key pair structure.
PkeyGen gen; // Generate a key pair.
PkeyCtrl ctrl; // Control function.
PkeySetPub setPub; // Set the public key.
PkeySetPrv setPrv; // Set the private key.
PkeyGetPub getPub; // Obtain the public key.
PkeyGetPrv getPrv; // Obtain the private key.
PkeySign sign; // Sign the signature.
PkeySignData signData; // sign the raw data
PkeyVerify verify; // Verify the signature.
PkeyVerifyData verifyData; // Verify the raw data
PkeyRecover recover; // Signature recovery.
PkeyComputeShareKey computeShareKey; // Calculate the shared key.
PkeyCrypt encrypt; // Encrypt.
PkeyCrypt decrypt; // Decrypt.
PkeyHEOperation headd; // Add
PkeyHEOperation hemul; // Multiply
PkeyCheck check; // Check the consistency of the key pair.
PkeyCmp cmp; // Compare keys and parameters.
PkeyEncapsulateInit encapsInit; // Key encapsulation init.
PkeyDecapsulateInit decapsInit; // Key decapsulation init.
PkeyEncapsulate encaps; // Key encapsulation.
PkeyDecapsulate decaps; // Key decapsulation.
PkeyBlind blind; // msg blind
PkeyUnBlind unBlind; // sig unBlind.
PkeyImport import; // import key
PkeyExport export; // export key
} EAL_PkeyUnitaryMethod;
/**
* @ingroup sym_algid
* Symmetric encryption/decryption algorithm ID
*/
typedef enum {
CRYPT_SYM_AES128 = 0,
CRYPT_SYM_AES192,
CRYPT_SYM_AES256,
CRYPT_SYM_CHACHA20,
CRYPT_SYM_SM4,
CRYPT_SYM_MAX
} CRYPT_SYM_AlgId;
typedef void *(*CipherNewCtx)(int32_t alg);
typedef void *(*CipherProvNewCtx)(void *provCtx, int32_t alg);
typedef int32_t (*CipherInitCtx)(void *ctx, const uint8_t *key, uint32_t keyLen, const uint8_t *iv,
uint32_t ivLen, const BSL_Param *param, bool enc);
typedef int32_t (*CipherDeInitCtx)(void *ctx);
typedef int32_t (*CipherUpdate)(void *ctx, const uint8_t *in, uint32_t inLen, uint8_t *out, uint32_t *outLen);
typedef int32_t (*CipherFinal)(void *ctx, uint8_t *out, uint32_t *outLen);
typedef int32_t (*CipherCtrl)(void *ctx, int32_t opt, void *val, uint32_t len);
typedef void (*CipherFreeCtx)(void *ctx);
typedef int32_t (*SetEncryptKey)(void *ctx, const uint8_t *key, uint32_t len);
typedef int32_t (*SetDecryptKey)(void *ctx, const uint8_t *key, uint32_t len);
typedef int32_t (*SetKey)(void *ctx, const uint8_t *key, uint32_t len);
// process block or blocks
typedef int32_t (*EncryptBlock)(void *ctx, const uint8_t *in, uint8_t *out, uint32_t len);
typedef int32_t (*DecryptBlock)(void *ctx, const uint8_t *in, uint8_t *out, uint32_t len);
typedef void (*DeInitBlockCtx)(void *ctx);
typedef int32_t (*CipherStreamProcess)(void *ctx, const uint8_t *in, uint8_t *out, uint32_t len);
typedef struct {
SetEncryptKey setEncryptKey;
SetDecryptKey setDecryptKey;
EncryptBlock encryptBlock;
DecryptBlock decryptBlock;
DeInitBlockCtx cipherDeInitCtx;
CipherCtrl cipherCtrl;
uint8_t blockSize;
uint16_t ctxSize;
CRYPT_SYM_AlgId algId;
} EAL_SymMethod;
typedef struct {
CipherNewCtx newCtx;
CipherInitCtx initCtx;
CipherDeInitCtx deinitCtx;
CipherUpdate update;
CipherFinal final;
CipherCtrl ctrl;
CipherFreeCtx freeCtx;
} EAL_CipherMethod;
typedef struct {
CipherNewCtx newCtx;
CipherProvNewCtx provNewCtx;
CipherInitCtx initCtx;
CipherDeInitCtx deinitCtx;
CipherUpdate update;
CipherFinal final;
CipherCtrl ctrl;
CipherFreeCtx freeCtx;
} EAL_CipherUnitaryMethod;
/* prototype of MAC algorithm operation functions */
typedef void* (*MacNewCtx)(void *provCtx, int32_t algId);
// Complete key initialization.
typedef int32_t (*MacInit)(void *ctx, const uint8_t *key, uint32_t len, const BSL_Param *param);
typedef int32_t (*MacUpdate)(void *ctx, const uint8_t *in, uint32_t len);
typedef int32_t (*MacFinal)(void *ctx, const uint8_t *out, uint32_t *len);
typedef int32_t (*MacDeinit)(void *ctx);
// The action is opposite to the initCtx. Sensitive data is deleted.
typedef int32_t (*MacReinit)(void *ctx);
typedef int32_t (*MacCtrl)(void *data, int32_t cmd, void *val, uint32_t valLen);
typedef int32_t (*MacSetParam)(void *data, const BSL_Param *param);
typedef void (*MacFreeCtx)(void *ctx);
/* set of MAC algorithm operation methods */
typedef struct {
MacNewCtx newCtx;
MacInit init; // Initialize the MAC context.
MacUpdate update; // Add block data for MAC calculation.
MacFinal final; // Complete MAC calculation and obtain the MAC result.
MacDeinit deinit; // Clear the key information in MAC context.
// Re-initialize the key. This method is used where the keys are the same during multiple MAC calculations.
MacReinit reinit;
MacCtrl ctrl;
MacSetParam setParam;
MacFreeCtx freeCtx;
} EAL_MacMethod;
typedef struct {
union {
CRYPT_MD_AlgId mdId;
CRYPT_SYM_AlgId symId;
} id;
union {
EAL_MdMethod *md; // MD algorithm which HMAC depends on
const EAL_SymMethod *sym; // AES function wihch CMAC depends on
EAL_SiphashMethod *sip; // siphash method
} method;
} EAL_MacDepMethod;
/**
* @ingroup mode_algid
* Symmetric encryption/decryption mode ID
*/
typedef enum {
CRYPT_MODE_CBC = 0,
CRYPT_MODE_ECB,
CRYPT_MODE_CTR,
CRYPT_MODE_XTS,
CRYPT_MODE_CCM,
CRYPT_MODE_GCM,
CRYPT_MODE_CHACHA20_POLY1305,
CRYPT_MODE_CFB,
CRYPT_MODE_OFB,
CRYPT_MODE_MAX
} CRYPT_MODE_AlgId;
/**
* @ingroup crypt_eal_pkey
*
* Structure of the PSS padding mode when RSA is used for signature
*/
typedef struct {
int32_t saltLen; /**< pss salt length. -1 indicates hashLen, -2 indicates MaxLen, -3 is AutoLen */
EAL_MdMethod mdMeth; /**< pss mdid method when padding */
EAL_MdMethod mgfMeth; /**< pss mgfid method when padding */
CRYPT_MD_AlgId mdId; /**< pss mdid when padding */
CRYPT_MD_AlgId mgfId; /**< pss mgfid when padding */
void *mdProvCtx;
void *mgfProvCtx;
} RSA_PadingPara;
/* Prototype of the KDF algorithm operation functions */
typedef void* (*KdfNewCtx)(void);
typedef void* (*KdfProvNewCtx)(void *provCtx, int32_t algId);
typedef int32_t (*KdfSetParam)(void *ctx, const BSL_Param *param);
typedef int32_t (*KdfDerive)(void *ctx, uint8_t *key, uint32_t keyLen);
typedef int32_t (*KdfDeinit)(void *ctx);
typedef int32_t (*KdfCtrl)(void *data, int32_t cmd, void *val, uint32_t valLen);
typedef void (*KdfFreeCtx)(void *ctx);
typedef struct {
KdfNewCtx newCtx;
KdfSetParam setParam;
KdfDerive derive;
KdfDeinit deinit;
KdfFreeCtx freeCtx;
} EAL_KdfMethod;
typedef struct {
KdfNewCtx newCtx;
KdfProvNewCtx provNewCtx;
KdfSetParam setParam;
KdfDerive derive;
KdfDeinit deinit;
KdfFreeCtx freeCtx;
KdfCtrl ctrl;
} EAL_KdfUnitaryMethod;
typedef struct {
uint32_t id;
EAL_KdfMethod *kdfMeth;
} EAL_CidToKdfMeth;
/* Prototype of the RAND algorithm operation functions */
typedef void *(*RandDrbgNewCtx)(void *libCtx, int32_t algId, BSL_Param *param);
typedef int32_t (*RandDrbgInst)(void *ctx, const uint8_t *pers, uint32_t persLen, BSL_Param *param);
typedef int32_t (*RandDrbgUnInst)(void *ctx);
typedef int32_t (*RandDrbgGen)(void *ctx, uint8_t *bytes, uint32_t len,
const uint8_t *addin, uint32_t addinLen, BSL_Param *param);
typedef int32_t (*RandDrbgReSeed)(void *ctx, const uint8_t *addin, uint32_t addinLen, BSL_Param *param);
typedef int32_t (*RandDrbgCtrl)(void *ctx, int32_t cmd, void *val, uint32_t valLen);
typedef void (*RandDrbgFreeCtx)(void *ctx);
typedef struct {
RandDrbgNewCtx newCtx;
RandDrbgInst inst;
RandDrbgUnInst unInst;
RandDrbgGen gen;
RandDrbgReSeed reSeed;
RandDrbgCtrl ctrl;
RandDrbgFreeCtx freeCtx;
} EAL_RandUnitaryMethod;
typedef struct {
uint32_t type;
int32_t methodId;
const void *method;
} EAL_RandMethLookup;
/**
* @ingroup crypt_ctrl_param
*
* Set and obtain internal parameters of Pbkdf2.
*/
typedef enum {
CRYPT_CTRL_GET_MACID = 0, /* kdf get macId . */
CRYPT_CTRL_GET_SALTLEN, /* kdf get saltlen . */
CRYPT_CTRL_GET_ITER, /* kdf get iter . */
CRYPT_CTRL_GET_KEYLEN /* kdf get keyLen . */
} CRYPT_KdfCtrl;
typedef enum {
CRYPT_PKEY_CHECK_KEYPAIR = 1, /**< Check the key pair. */
CRYPT_PKEY_CHECK_PRVKEY = 2, /**< Check the private key. */
CRYPT_PKEY_CHECK_MAX,
} CRYPT_KeyCheckType;
#ifdef __cplusplus
}
#endif // __cplusplus
#endif // EAL_LOCAL_TYPES_H
|
2301_79861745/bench_create
|
crypto/include/crypt_local_types.h
|
C
|
unknown
| 17,351
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_UTIL_RAND_H
#define CRYPT_UTIL_RAND_H
#include "hitls_build.h"
#if defined(HITLS_CRYPTO_DRBG) || defined(HITLS_CRYPTO_CURVE25519) || \
defined(HITLS_CRYPTO_RSA) || defined(HITLS_CRYPTO_BN_RAND)
#include <stdint.h>
#include "crypt_eal_rand.h"
#ifdef __cplusplus
extern "C" {
#endif
/**
* @brief Random number registration
*
* @param func [IN] Interface for obtaining random numbers
*/
void CRYPT_RandRegist(CRYPT_EAL_RandFunc func);
/**
* @brief Get the registered random number function
*
* @return The registered random number function
*/
CRYPT_EAL_RandFunc CRYPT_RandRegistGet(void);
/**
* @brief Generate a random number
*
* @param rand [OUT] buffer of random number
* @param randLen [IN] length of random number
*
* @retval CRYPT_SUCCESS A random number is generated successfully.
* @retval CRYPT_NO_REGIST_RAND The random number function is not registered.
* @retval Error returned when the registered random number fails during the generate.
*/
int32_t CRYPT_Rand(uint8_t *rand, uint32_t randLen);
/**
* @brief Random number registration
*
* @param func [IN] Interface for obtaining random numbers
*/
void CRYPT_RandRegistEx(CRYPT_EAL_RandFuncEx func);
/**
* @brief Get the registered random number function
*
* @return The registered random number function
*/
CRYPT_EAL_RandFuncEx CRYPT_RandRegistExGet(void);
/**
* @brief Generate a random number
*
* @param libCtx [IN] Library context
* @param rand [OUT] buffer of random number
* @param randLen [IN] length of random number
*
* @retval CRYPT_SUCCESS A random number is generated successfully.
* @retval CRYPT_NO_REGIST_RAND The random number function is not registered.
* @retval Error returned when the registered random number fails during the generate.
*/
int32_t CRYPT_RandEx(void *libCtx, uint8_t *rand, uint32_t randLen);
#if defined(HITLS_CRYPTO_EAL)
#ifdef HITLS_CRYPTO_ENTROPY
/**
* @brief Global seed-drbg lock initialization
*
* @param ctx handle of ctx
*/
int32_t EAL_SeedDrbgLockInit(void);
/**
* @brief Global seed-drbg lock deinitialization
*
* @param ctx handle of ctx
*/
void EAL_SeedDrbgLockDeInit(void);
#endif
#endif
#ifdef __cplusplus
}
#endif
#endif
#endif
|
2301_79861745/bench_create
|
crypto/include/crypt_util_rand.h
|
C
|
unknown
| 2,816
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_UTILS_H
#define CRYPT_UTILS_H
#include <stdint.h>
#include <stdlib.h>
#include <stdbool.h>
#include "bsl_err_internal.h"
#include "crypt_errno.h"
#include "crypt_algid.h"
#include "crypt_local_types.h"
#ifdef HITLS_BSL_PARAMS
#include "bsl_params.h"
#include "crypt_params_key.h"
#endif
#ifdef __cplusplus
extern "C" {
#endif // __cplusplus
#if defined(__GNUC__) || defined(__clang__)
#define LIKELY(x) __builtin_expect(!!(x), 1)
#define UNLIKELY(x) __builtin_expect(!!(x), 0)
#define ALIGN32 __attribute__((aligned(32)))
#define ALIGN64 __attribute__((aligned(64)))
#else
#define LIKELY(x) x
#define UNLIKELY(x) x
#define ALIGN32
#define ALIGN64
#endif
#define BITS_PER_BYTE 8
#define SHIFTS_PER_BYTE 3
#define BITSIZE(t) (sizeof(t) * BITS_PER_BYTE)
#define PUT_UINT32_BE(v, p, i) \
do { \
(p)[(i) + 0] = (uint8_t)((v) >> 24); \
(p)[(i) + 1] = (uint8_t)((v) >> 16); \
(p)[(i) + 2] = (uint8_t)((v) >> 8); \
(p)[(i) + 3] = (uint8_t)((v) >> 0); \
} while (0)
#define PUT_UINT64_BE(v, p, i) \
do { \
(p)[(i) + 0] = (uint8_t)((v) >> 56); \
(p)[(i) + 1] = (uint8_t)((v) >> 48); \
(p)[(i) + 2] = (uint8_t)((v) >> 40); \
(p)[(i) + 3] = (uint8_t)((v) >> 32); \
(p)[(i) + 4] = (uint8_t)((v) >> 24); \
(p)[(i) + 5] = (uint8_t)((v) >> 16); \
(p)[(i) + 6] = (uint8_t)((v) >> 8); \
(p)[(i) + 7] = (uint8_t)((v) >> 0); \
} while (0)
#define GET_UINT32_BE(p, i) \
( \
((uint32_t)(p)[(i) + 0] << 24) | \
((uint32_t)(p)[(i) + 1] << 16) | \
((uint32_t)(p)[(i) + 2] << 8) | \
((uint32_t)(p)[(i) + 3] << 0) \
)
#define PUT_UINT32_LE(v, p, i) \
do { \
(p)[(i) + 3] = (uint8_t)((v) >> 24); \
(p)[(i) + 2] = (uint8_t)((v) >> 16); \
(p)[(i) + 1] = (uint8_t)((v) >> 8); \
(p)[(i) + 0] = (uint8_t)((v) >> 0); \
} while (0)
#define PUT_UINT64_LE(v, p, i) do { \
(p)[(i) + 7] = (uint8_t)((v) >> 56); \
(p)[(i) + 6] = (uint8_t)((v) >> 48); \
(p)[(i) + 5] = (uint8_t)((v) >> 40); \
(p)[(i) + 4] = (uint8_t)((v) >> 32); \
(p)[(i) + 3] = (uint8_t)((v) >> 24); \
(p)[(i) + 2] = (uint8_t)((v) >> 16); \
(p)[(i) + 1] = (uint8_t)((v) >> 8); \
(p)[(i) + 0] = (uint8_t)((v) >> 0); \
} while (0)
#define GET_UINT64_LE(p, i) \
( \
((uint64_t)(p)[(i) + 7] << 56) | ((uint64_t)(p)[(i) + 6] << 48) | \
((uint64_t)(p)[(i) + 5] << 40) | ((uint64_t)(p)[(i) + 4] << 32) | \
((uint64_t)(p)[(i) + 3] << 24) | ((uint64_t)(p)[(i) + 2] << 16) | \
((uint64_t)(p)[(i) + 1] << 8) | ((uint64_t)(p)[(i) + 0] << 0) \
)
/**
* Check whether conditions are met. If yes, an error code is returned.
*/
#define RETURN_RET_IF(condition, ret) \
do { \
if (condition) { \
BSL_ERR_PUSH_ERROR(ret); \
return ret; \
} \
} while (0)
/**
* If the return value of func is not CRYPT_SUCCESS, go to the label ERR.
*/
#define GOTO_ERR_IF(func, ret) do { \
(ret) = (func); \
if ((ret) != CRYPT_SUCCESS) { \
BSL_ERR_PUSH_ERROR((ret)); \
goto ERR; \
} \
} while (0)
#define GOTO_ERR_IF_EX(func, ret) do { \
(ret) = (func); \
if ((ret) != CRYPT_SUCCESS) { \
goto ERR; \
} \
} while (0)
#define GOTO_ERR_IF_TRUE(condition, ret) do { \
if (condition) { \
BSL_ERR_PUSH_ERROR((ret)); \
goto ERR; \
} \
} while (0)
/**
* Check whether conditions are met. If yes, an error code is returned.
*/
#define RETURN_RET_IF_ERR(func, ret) \
do { \
(ret) = (func); \
if ((ret) != CRYPT_SUCCESS) { \
BSL_ERR_PUSH_ERROR((ret)); \
return ret; \
} \
} while (0)
#define RETURN_RET_IF_ERR_EX(func, ret) \
do { \
(ret) = (func); \
if ((ret) != CRYPT_SUCCESS) { \
return ret; \
} \
} while (0)
#define BREAK_IF(condition) \
do { \
if (condition) { \
break; \
} \
} while (0)
/**
* If src is not NULL, then execute the fun function. If the operation fails, go to the label ERR.
*/
#define GOTO_ERR_IF_SRC_NOT_NULL(dest, src, func, ret) \
do { \
if ((src) != NULL) { \
(dest) = (func); \
if ((dest) == NULL) { \
BSL_ERR_PUSH_ERROR((ret)); \
goto ERR; \
} \
} \
} while (0)
/**
* @brief Perform the XOR operation on the data of two arrays.
*
* @param a [IN] Input data a
* @param b [IN] Input data b
* @param r [out] Output the result data.
* @param len [IN] Output result data length
*/
#define DATA_XOR(a, b, r, len) \
do { \
uint32_t subscript; \
for (subscript = 0; subscript < (len); subscript++) { \
(r)[subscript] = (a)[subscript] ^ (b)[subscript]; \
} \
} while (0)
/**
* @brief Perform the XOR operation on the data of 32 bits in two arrays each time.
* Ensure that the input and output are integer multiples of 32 bits.
* Type conversion is performed only when the address is 4-byte aligned.
*
* @param a [IN] Input data a
* @param b [IN] Input data b
* @param r [out] Output the result data.
* @param len [IN] Output result data length
*/
#define DATA32_XOR(a, b, r, len) \
do { \
uint32_t ii; \
uintptr_t aPtr = (uintptr_t)(a); \
uintptr_t bPtr = (uintptr_t)(b); \
uintptr_t rPtr = (uintptr_t)(r); \
if (((aPtr & 0x3) != 0) || ((bPtr & 0x3) != 0) || ((rPtr & 0x3) != 0)) { \
for (ii = 0; ii < (len); ii++) { \
(r)[ii] = (a)[ii] ^ (b)[ii]; \
} \
} else { \
for (ii = 0; ii < (len); ii += 4) { \
*(uint32_t *)((r) + ii) = (*(const uint32_t *)((a) + ii)) ^ (*(const uint32_t *)((b) + ii)); \
} \
} \
} while (0)
/**
* @brief Perform the XOR operation on 64 bits of data in two arrays each time.
* Ensure that the input and output are integer multiples of 64 bits.
* Type conversion is performed only when the address is 8-byte aligned.
*
* @param a [IN] Input data a
* @param b [IN] Input data b
* @param r [out] Output the result data.
* @param len [IN] Output result data length
*/
#define DATA64_XOR(a, b, r, len) \
do { \
uint32_t ii; \
uintptr_t aPtr = (uintptr_t)(a); \
uintptr_t bPtr = (uintptr_t)(b); \
uintptr_t rPtr = (uintptr_t)(r); \
if (((aPtr & 0x7) != 0) || ((bPtr & 0x7) != 0) || ((rPtr & 0x7) != 0)) { \
for (ii = 0; ii < (len); ii++) { \
(r)[ii] = (a)[ii] ^ (b)[ii]; \
} \
} else { \
for (ii = 0; ii < (len); ii += 8) { \
*(uint64_t *)((r) + ii) = (*(const uint64_t *)((a) + ii)) ^ (*(const uint64_t *)((b) + ii)); \
} \
} \
} while (0)
/**
* @brief Calculate the hash value of the input data.
*
* @param provCtx [IN] Provider context
* @param hashMethod [IN] Hash method
* @param hashData [IN] Hash data
* @param size [IN] Size of hash data
* @param out [OUT] Output hash value
*/
int32_t CRYPT_CalcHash(void *provCtx, const EAL_MdMethod *hashMethod, const CRYPT_ConstData *hashData, uint32_t size,
uint8_t *out, uint32_t *outlen);
/**
* @ingroup rsa
* @brief mgf1 of PKCS1
*
* @param provCtx [IN] Provider context
* @param hashMethod [IN] Hash method
* @param seed [IN] Seed
* @param seedLen [IN] Seed length
* @param mask [OUT] Mask
* @param maskLen [IN] Mask length
*
* @retval CRYPT_SUCCESS on success
*/
int32_t CRYPT_Mgf1(void *provCtx, const EAL_MdMethod *hashMethod, const uint8_t *seed, const uint32_t seedLen,
uint8_t *mask, uint32_t maskLen);
/**
* @brief Retrieves the process function callback and its arguments from a parameter list.
*
* @param params A pointer to the BSL_Param list containing the parameters.
* @param processCb A pointer to a pointer to the process function callback.
* @param args A pointer to a pointer to the process function arguments.
* @return int32_t Returns CRYPT_SUCCESS if the operation is successful, otherwise an error code.
*/
int32_t CRYPT_GetPkeyProcessParams(BSL_Param *params, CRYPT_EAL_ProcessFuncCb *processCb, void **args);
#if (defined(HITLS_CRYPTO_DH_CHECK) || defined(HITLS_CRYPTO_DSA_CHECK))
/**
* @brief check the key pair consistency
*
* @param x [IN] FFC private key
* @param y [IN] FFC public key
* @param p [IN] FFC prime
* @param g [IN] FFC generator
*
* @retval CRYPT_SUCCESS check success.
* Others. For details, see error code in errno.
*/
int32_t CRYPT_FFC_KeyPairCheck(const void *x, const void *y, const void *p, const void *g);
/**
* @brief check the private key
*
* @param x [IN] FFC private key
* @param p [IN] FFC prime
* @param q [IN] FFC subprime
*
* @retval CRYPT_SUCCESS check success.
* Others. For details, see error code in errno.
*/
int32_t CRYPT_FFC_PrvCheck(const void *x, const void *p, const void *q);
#endif // HITLS_CRYPTO_DH_CHECK || HITLS_CRYPTO_DSA_CHECK
#if defined(HITLS_CRYPTO_PROVIDER) && defined(HITLS_CRYPTO_MD)
/**
* @brief Control the MD context.
*
* @param mdSize [IN] MD size
* @param mdBlockSize [IN] MD block size
* @param opt [IN] Option
* @param val [IN] Value
* @param len [IN] Length
*
* @retval #CRYPT_SUCCESS initialization succeeded.
* @retval #CRYPT_NULL_INPUT Pointer ctx is NULL
* @retval #CRYPT_NOT_SUPPORT Option is not supported
*/
int32_t CRYPT_MdCommonGetParam(uint16_t mdSize, uint16_t mdBlockSize, BSL_Param *param);
#endif
#if defined(HITLS_CRYPTO_PROVIDER) && (defined(HITLS_CRYPTO_RSA) || defined(HITLS_CRYPTO_ECDSA) || \
defined(HITLS_CRYPTO_DSA))
/**
* @brief Set the MD attribute.
*
* @param mdAttr [IN] MD attribute
* @param len [IN] MD attribute length
* @param pkeyMdAttr [OUT] Output pkey MD attribute
*/
int32_t CRYPT_PkeySetMdAttr(const char *mdAttr, uint32_t len, char **pkeyMdAttr);
#endif
/* Assumes that x is uint32_t and 0 < n < 32 */
#define ROTL32(x, n) (((x) << (n)) | ((x) >> (32 - (n))))
#define ROTR64(x, n) (((x) << (64 - (n))) | ((x) >> (n))) // Assumes that x is uint64_t and 0 < n < 64
#define IS_BUF_NON_ZERO(out, outLen) (((out) != NULL) && ((outLen) > 0))
#define CRYPT_IS_BUF_NON_ZERO(out, outLen) (((out) != NULL) && ((outLen) > 0))
#define CRYPT_CHECK_DATA_INVALID(d) (((d)->data == NULL && (d)->len != 0))
#define CRYPT_IsDataNull(d) ((d) == NULL || (d)->data == NULL || (d)->len == 0)
#define CRYPT_IN_RANGE(x, range) ((x) >= (range)->min && (x) <= (range)->max)
#define CRYPT_CHECK_BUF_INVALID(buf, len) (((buf) == NULL && (len) != 0))
#define CRYPT_SWAP32(x) ((((x) & 0xff000000) >> 24) | \
(((x) & 0x00ff0000) >> 8) | \
(((x) & 0x0000ff00) << 8) | \
(((x) & 0x000000ff) << 24))
#ifdef HITLS_BIG_ENDIAN
#define CRYPT_HTONL(x) (x)
// Interpret p + i as little endian order. The type of p must be uint8_t *.
#define GET_UINT32_LE(p, i) \
( \
((uint32_t)((const uint8_t *)(p))[(i) + 3] << 24) | \
((uint32_t)((const uint8_t *)(p))[(i) + 2] << 16) | \
((uint32_t)((const uint8_t *)(p))[(i) + 1] << 8) | \
((uint32_t)((const uint8_t *)(p))[(i) + 0] << 0) \
)
// Convert little-endian order to host order
#define CRYPT_LE32TOH(x) CRYPT_SWAP32(x)
// Convert host order to little-endian order
#define CRYPT_HTOLE32(x) CRYPT_SWAP32(x)
#else
#define CRYPT_HTONL(x) CRYPT_SWAP32(x)
// Interpret p + i as little endian.
#define GET_UINT32_LE(p, i) \
( \
(((uintptr_t)(p) & 0x7) != 0) ? ((uint32_t)((const uint8_t *)(p))[(i) + 3] << 24) | \
((uint32_t)((const uint8_t *)(p))[(i) + 2] << 16) | \
((uint32_t)((const uint8_t *)(p))[(i) + 1] << 8) | \
((uint32_t)((const uint8_t *)(p))[(i) + 0] << 0) \
: (*(uint32_t *)((uint8_t *)(uintptr_t)(p) + (i))) \
)
// Convert little-endian order to host order
#define CRYPT_LE32TOH(x) (x)
// Convert host order to little-endian order
#define CRYPT_HTOLE32(x) (x)
#endif
#ifdef HITLS_BIG_ENDIAN
// Interpret p + i as little endian. The type of p must be uint8_t *.
#define GET_UINT16_LE(p, i) \
( \
((uint16_t)((const uint8_t *)(p))[(i) + 1] << 8) | \
((uint16_t)((const uint8_t *)(p))[(i) + 0] << 0) \
)
#else
// Interpret p + i as little endian.
#define GET_UINT16_LE(p, i) \
( \
(((uintptr_t)(p) & 0x7) != 0) ? ((uint16_t)((const uint8_t *)(p))[(i) + 1] << 8) | \
((uint16_t)((const uint8_t *)(p))[(i) + 0] << 0) \
: (*(uint16_t *)((uint8_t *)(uintptr_t)(p) + (i))) \
)
#endif
#define PUT_UINT16_LE(v, p, i) \
do \
{ \
(p)[(i) + 1] = (uint8_t)((v) >> 8); \
(p)[(i) + 0] = (uint8_t)((v) >> 0); \
} while (0)
/**
* 64-bit integer manipulation functions (big endian)
*/
static inline uint64_t Uint64FromBeBytes(const uint8_t *bytes)
{
return (((uint64_t)bytes[0] << 56) |
((uint64_t)bytes[1] << 48) |
((uint64_t)bytes[2] << 40) |
((uint64_t)bytes[3] << 32) |
((uint64_t)bytes[4] << 24) |
((uint64_t)bytes[5] << 16) |
((uint64_t)bytes[6] << 8) |
(uint64_t)bytes[7]);
}
static inline void Uint64ToBeBytes(uint64_t v, uint8_t *bytes)
{
bytes[0] = (uint8_t)(v >> 56);
bytes[1] = (uint8_t)(v >> 48);
bytes[2] = (uint8_t)(v >> 40);
bytes[3] = (uint8_t)(v >> 32);
bytes[4] = (uint8_t)(v >> 24);
bytes[5] = (uint8_t)(v >> 16);
bytes[6] = (uint8_t)(v >> 8);
bytes[7] = (uint8_t)(v & 0xffu);
}
#if defined(HITLS_CRYPTO_RSA_SIGN) || defined(HITLS_CRYPTO_RSA_VERIFY)
uint32_t CRYPT_GetMdSizeById(CRYPT_MD_AlgId id);
#endif
static inline bool ParamIdIsValid(uint32_t id, const uint32_t *list, uint32_t num)
{
for (uint32_t i = 0; i < num; i++) {
if (id == list[i]) {
return true;
}
}
return false;
}
typedef uint32_t (*GetUintCallBack)(const void *key);
static inline int32_t GetUintCtrl(const void *ctx, void *val, uint32_t len, GetUintCallBack getUint)
{
if (val == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (len != sizeof(uint32_t)) {
BSL_ERR_PUSH_ERROR(CRYPT_INVALID_ARG);
return CRYPT_INVALID_ARG;
}
*(uint32_t *)val = getUint(ctx);
return CRYPT_SUCCESS;
}
#ifdef HITLS_BSL_PARAMS
static inline const BSL_Param *GetConstParamValue(const BSL_Param *params, int32_t type,
uint8_t **value, uint32_t *valueLen)
{
const BSL_Param *temp = BSL_PARAM_FindConstParam(params, type);
if (temp != NULL) {
*value = temp->value;
if (valueLen != NULL) {
*valueLen = temp->valueLen;
}
}
return temp;
}
static inline BSL_Param *GetParamValue(BSL_Param *params, int32_t type, uint8_t **value, uint32_t *valueLen)
{
BSL_Param *temp = BSL_PARAM_FindParam(params, type);
if (temp != NULL) {
*value = temp->value;
if (valueLen != NULL) {
*valueLen = temp->valueLen;
}
}
return temp;
}
#endif
void GetCpuInstrSupportState(void);
#ifdef __x86_64__
#define CPU_ID_OUT_U32_CNT 4
#define EAX_OUT_IDX 0
#define EBX_OUT_IDX 1
#define ECX_OUT_IDX 2
#define EDX_OUT_IDX 3
/* %eax */
#define XCR0_BIT_SSE (1ULL << 1)
#define XCR0_BIT_AVX (1ULL << 2)
#define XCR0_BIT_OPMASK (1ULL << 5)
#define XCR0_BIT_ZMM_LOW (1ULL << 6)
#define XCR0_BIT_ZMM_HIGH (1ULL << 7)
typedef struct {
uint32_t code1Out[CPU_ID_OUT_U32_CNT];
uint32_t code7Out[CPU_ID_OUT_U32_CNT];
bool osSupportAVX; /* input ecx = 0, output edx:eax bit 2 */
bool osSupportAVX512; /* input ecx = 0, output edx:eax bit 6 */
} CpuInstrSupportState;
bool IsSupportAES(void);
bool IsSupportBMI1(void);
bool IsSupportBMI2(void);
bool IsSupportADX(void);
bool IsSupportAVX(void);
bool IsSupportAVX2(void);
bool IsSupportSSE(void);
bool IsSupportSSE2(void);
bool IsSupportSSE3(void);
bool IsSupportMOVBE(void);
bool IsSupportAVX512F(void);
bool IsSupportAVX512VL(void);
bool IsSupportAVX512BW(void);
bool IsSupportAVX512DQ(void);
bool IsSupportXSAVE(void);
bool IsSupportOSXSAVE(void);
bool IsOSSupportAVX(void);
bool IsOSSupportAVX512(void);
void GetCpuId(uint32_t eax, uint32_t ecx, uint32_t cpuId[CPU_ID_OUT_U32_CNT]);
#elif defined(__arm__) || defined(__arm) || defined(__aarch64__)
bool IsSupportAES(void);
bool IsSupportPMULL(void);
bool IsSupportSHA1(void);
bool IsSupportSHA256(void);
bool IsSupportNEON(void);
#if defined(__aarch64__)
bool IsSupportSHA512(void);
#endif // __aarch64__
#endif // __arm__ || __arm || __aarch64__
#ifdef __cplusplus
}
#endif // __cplusplus
#endif // CRYPT_UTILS_H
|
2301_79861745/bench_create
|
crypto/include/crypt_utils.h
|
C
|
unknown
| 20,141
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_KDF_TLS12_H
#define CRYPT_KDF_TLS12_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_KDFTLS12
#include <stdint.h>
#include "crypt_local_types.h"
#include "bsl_params.h"
#ifdef __cplusplus
extern "C" {
#endif // __cplusplus
typedef struct CryptKdfTls12Ctx CRYPT_KDFTLS12_Ctx;
/**
* @ingroup KDFTLS12
* @brief Generate KDFTLS12 context.
*
* @retval Success: KDFTLS12 ctx.
* Fails: NULL.
*/
CRYPT_KDFTLS12_Ctx* CRYPT_KDFTLS12_NewCtx(void);
/**
* @ingroup KDFTLS12
* @brief Generate KDFTLS12 context.
*
* @param libCtx [in] Library context.
*
* @retval Success: KDFTLS12 ctx.
* Fails: NULL.
*/
CRYPT_KDFTLS12_Ctx *CRYPT_KDFTLS12_NewCtxEx(void *libCtx);
/**
* @ingroup KDFTLS12
* @brief Set parameters for the KDFTLS12 context.
*
* @param ctx [in, out] Pointer to the KDFTLS12 context.
* @param param [in] Either a MAC algorithm ID, a seed, a password, or a label.
*
* @retval Success: CRYPT_SUCCESS
* For other error codes, see crypt_errno.h.
*/
int32_t CRYPT_KDFTLS12_SetParam(CRYPT_KDFTLS12_Ctx *ctx, const BSL_Param *param);
/**
* @ingroup KDFTLS12
* @brief Obtain the derived key based on the passed KDFTLS12 context..
*
* @param ctx [in, out] Pointer to the KDFTLS12 context.
* @param out [out] Derived key buffer.
* @param len [out] Derived key buffer size.
*
* @retval Success: CRYPT_SUCCESS
* For other error codes, see crypt_errno.h.
*/
int32_t CRYPT_KDFTLS12_Derive(CRYPT_KDFTLS12_Ctx *ctx, uint8_t *out, uint32_t len);
/**
* @ingroup KDFTLS12
* @brief KDFTLS12 deinitialization API
*
* @param ctx [in, out] Pointer to the KDFTLS12 context.
*
* @retval #CRYPT_SUCCESS Deinitialization succeeded.
* @retval #CRYPT_NULL_INPUT Pointer ctx is NULL
*/
int32_t CRYPT_KDFTLS12_Deinit(CRYPT_KDFTLS12_Ctx *ctx);
/**
* @ingroup KDFTLS12
* @brief free KDFTLS12 context.
*
* @param ctx [IN] KDFTLS12 handle
*/
void CRYPT_KDFTLS12_FreeCtx(CRYPT_KDFTLS12_Ctx *ctx);
#ifdef __cplusplus
}
#endif // __cplusplus
#endif // HITLS_CRYPTO_KDFTLS12
#endif // CRYPT_KDF_TLS12_H
|
2301_79861745/bench_create
|
crypto/kdf/include/crypt_kdf_tls12.h
|
C
|
unknown
| 2,628
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_KDFTLS12
#include <stdint.h>
#include "securec.h"
#include "bsl_err_internal.h"
#include "bsl_sal.h"
#include "crypt_local_types.h"
#include "crypt_errno.h"
#include "crypt_utils.h"
#include "eal_mac_local.h"
#include "bsl_params.h"
#include "crypt_params_key.h"
#include "crypt_kdf_tls12.h"
#define KDFTLS12_MAX_BLOCKSIZE 64
static const uint32_t KDFTLS12_ID_LIST[] = {
CRYPT_MAC_HMAC_SHA256,
CRYPT_MAC_HMAC_SHA384,
CRYPT_MAC_HMAC_SHA512,
CRYPT_MAC_HMAC_SM3, // for TLCP
CRYPT_MAC_HMAC_MD5, // for TLS1.0 and TLS1.1
CRYPT_MAC_HMAC_SHA1, // for TLS1.0 and TLS1.1
};
struct CryptKdfTls12Ctx {
CRYPT_MAC_AlgId macId;
EAL_MacMethod macMeth;
void *macCtx;
uint8_t *key;
uint32_t keyLen;
uint8_t *label;
uint32_t labelLen;
uint8_t *seed;
uint32_t seedLen;
#ifdef HITLS_CRYPTO_PROVIDER
void *libCtx;
#endif
};
bool CRYPT_KDFTLS12_IsValidAlgId(CRYPT_MAC_AlgId id)
{
return ParamIdIsValid(id, KDFTLS12_ID_LIST, sizeof(KDFTLS12_ID_LIST) / sizeof(KDFTLS12_ID_LIST[0]));
}
int32_t KDF_Hmac(const EAL_MacMethod *macMeth, void *macCtx, uint8_t *data, uint32_t *len)
{
macMeth->reinit(macCtx);
int32_t ret = macMeth->update(macCtx, data, *len);
if (ret != CRYPT_SUCCESS) {
return ret;
}
return macMeth->final(macCtx, data, len);
}
// algorithm implementation see https://datatracker.ietf.org/doc/pdf/rfc5246.pdf, chapter 5, p_hash function
int32_t KDF_PHASH(CRYPT_KDFTLS12_Ctx *ctx, uint8_t *out, uint32_t len)
{
int32_t ret;
EAL_MacMethod *macMeth = &ctx->macMeth;
uint32_t totalLen = 0;
uint8_t nextIn[KDFTLS12_MAX_BLOCKSIZE];
uint32_t nextInLen = KDFTLS12_MAX_BLOCKSIZE;
uint8_t outTmp[KDFTLS12_MAX_BLOCKSIZE];
uint32_t outTmpLen = KDFTLS12_MAX_BLOCKSIZE;
while (len > totalLen) {
if (totalLen == 0) {
GOTO_ERR_IF(macMeth->init(ctx->macCtx, ctx->key, ctx->keyLen, NULL), ret);
GOTO_ERR_IF(macMeth->update(ctx->macCtx, ctx->label, ctx->labelLen), ret);
GOTO_ERR_IF(macMeth->update(ctx->macCtx, ctx->seed, ctx->seedLen), ret);
GOTO_ERR_IF(macMeth->final(ctx->macCtx, nextIn, &nextInLen), ret);
} else {
GOTO_ERR_IF(KDF_Hmac(macMeth, ctx->macCtx, nextIn, &nextInLen), ret);
}
macMeth->reinit(ctx->macCtx);
GOTO_ERR_IF(macMeth->update(ctx->macCtx, nextIn, nextInLen), ret);
GOTO_ERR_IF(macMeth->update(ctx->macCtx, ctx->label, ctx->labelLen), ret);
GOTO_ERR_IF(macMeth->update(ctx->macCtx, ctx->seed, ctx->seedLen), ret);
GOTO_ERR_IF(macMeth->final(ctx->macCtx, outTmp, &outTmpLen), ret);
uint32_t cpyLen = outTmpLen > (len - totalLen) ? (len - totalLen) : outTmpLen;
(void)memcpy_s(out + totalLen, len - totalLen, outTmp, cpyLen);
totalLen += cpyLen;
}
ret = CRYPT_SUCCESS;
ERR:
macMeth->deinit(ctx->macCtx);
return ret;
}
CRYPT_KDFTLS12_Ctx* CRYPT_KDFTLS12_NewCtx(void)
{
CRYPT_KDFTLS12_Ctx *ctx = BSL_SAL_Calloc(1, sizeof(CRYPT_KDFTLS12_Ctx));
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
return ctx;
}
CRYPT_KDFTLS12_Ctx *CRYPT_KDFTLS12_NewCtxEx(void *libCtx)
{
(void)libCtx;
CRYPT_KDFTLS12_Ctx *ctx = CRYPT_KDFTLS12_NewCtx();
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return NULL;
}
#ifdef HITLS_CRYPTO_PROVIDER
ctx->libCtx = libCtx;
#endif
return ctx;
}
int32_t CRYPT_KDFTLS12_SetMacMethod(CRYPT_KDFTLS12_Ctx *ctx, const CRYPT_MAC_AlgId id)
{
if (!CRYPT_KDFTLS12_IsValidAlgId(id)) {
BSL_ERR_PUSH_ERROR(CRYPT_KDFTLS12_PARAM_ERROR);
return CRYPT_KDFTLS12_PARAM_ERROR;
}
// free the old macCtx
if (ctx->macCtx != NULL) {
if (ctx->macMeth.freeCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_KDFTLS12_ERR_MAC_METH);
return CRYPT_KDFTLS12_ERR_MAC_METH;
}
ctx->macMeth.freeCtx(ctx->macCtx);
ctx->macCtx = NULL;
(void)memset_s(&ctx->macMeth, sizeof(EAL_MacMethod), 0, sizeof(EAL_MacMethod));
}
EAL_MacMethod *macMeth = EAL_MacFindMethod(id, &ctx->macMeth);
if (macMeth == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_EAL_ERR_METH_NULL_MEMBER);
return CRYPT_EAL_ERR_METH_NULL_MEMBER;
}
if (macMeth->newCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_KDFTLS12_ERR_MAC_METH);
return CRYPT_KDFTLS12_ERR_MAC_METH;
}
#ifdef HITLS_CRYPTO_PROVIDER
ctx->macCtx = macMeth->newCtx(ctx->libCtx, id);
#else
ctx->macCtx = macMeth->newCtx(NULL, id);
#endif
if (ctx->macCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ctx->macId = id;
return CRYPT_SUCCESS;
}
int32_t CRYPT_KDFTLS12_SetKey(CRYPT_KDFTLS12_Ctx *ctx, const uint8_t *key, uint32_t keyLen)
{
if (key == NULL && keyLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
BSL_SAL_ClearFree((void *)ctx->key, ctx->keyLen);
ctx->key = BSL_SAL_Dump(key, keyLen);
if (ctx->key == NULL && keyLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ctx->keyLen = keyLen;
return CRYPT_SUCCESS;
}
int32_t CRYPT_KDFTLS12_SetLabel(CRYPT_KDFTLS12_Ctx *ctx, const uint8_t *label, uint32_t labelLen)
{
if (label == NULL && labelLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
BSL_SAL_ClearFree((void *)ctx->label, ctx->labelLen);
ctx->label = BSL_SAL_Dump(label, labelLen);
if (ctx->label == NULL && labelLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ctx->labelLen = labelLen;
return CRYPT_SUCCESS;
}
int32_t CRYPT_KDFTLS12_SetSeed(CRYPT_KDFTLS12_Ctx *ctx, const uint8_t *seed, uint32_t seedLen)
{
if (seed == NULL && seedLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
BSL_SAL_ClearFree((void *)ctx->seed, ctx->seedLen);
ctx->seed = BSL_SAL_Dump(seed, seedLen);
if (ctx->seed == NULL && seedLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_MEM_ALLOC_FAIL);
return CRYPT_MEM_ALLOC_FAIL;
}
ctx->seedLen = seedLen;
return CRYPT_SUCCESS;
}
#ifdef HITLS_CRYPTO_PROVIDER
static int32_t CRYPT_KDFTLS12_SetMdAttr(CRYPT_KDFTLS12_Ctx *ctx, const char *mdAttr, uint32_t valLen)
{
if (mdAttr == NULL || valLen == 0) {
BSL_ERR_PUSH_ERROR(CRYPT_KDFTLS12_PARAM_ERROR);
return CRYPT_KDFTLS12_PARAM_ERROR;
}
if (ctx->macCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_KDFTLS12_ERR_MAC_ID_NOT_SET);
return CRYPT_KDFTLS12_ERR_MAC_ID_NOT_SET;
}
// Set mdAttr for macCtx
if (ctx->macMeth.setParam == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_KDFTLS12_ERR_MAC_METH);
return CRYPT_KDFTLS12_ERR_MAC_METH;
}
BSL_Param param[] = {
{.key = CRYPT_PARAM_MD_ATTR, .valueType = BSL_PARAM_TYPE_UTF8_STR,
.value = (void *)(uintptr_t)mdAttr, .valueLen = valLen, .useLen = 0},
BSL_PARAM_END};
return ctx->macMeth.setParam(ctx->macCtx, param);
}
#endif
int32_t CRYPT_KDFTLS12_SetParam(CRYPT_KDFTLS12_Ctx *ctx, const BSL_Param *param)
{
uint32_t val = 0;
uint32_t len = 0;
const BSL_Param *temp = NULL;
int32_t ret = CRYPT_KDFTLS12_PARAM_ERROR;
if (ctx == NULL || param == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_KDF_MAC_ID)) != NULL) {
len = sizeof(val);
GOTO_ERR_IF(BSL_PARAM_GetValue(temp, CRYPT_PARAM_KDF_MAC_ID,
BSL_PARAM_TYPE_UINT32, &val, &len), ret);
GOTO_ERR_IF(CRYPT_KDFTLS12_SetMacMethod(ctx, val), ret);
}
if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_KDF_KEY)) != NULL) {
GOTO_ERR_IF(CRYPT_KDFTLS12_SetKey(ctx, temp->value, temp->valueLen), ret);
}
if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_KDF_LABEL)) != NULL) {
GOTO_ERR_IF(CRYPT_KDFTLS12_SetLabel(ctx, temp->value, temp->valueLen), ret);
}
if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_KDF_SEED)) != NULL) {
GOTO_ERR_IF(CRYPT_KDFTLS12_SetSeed(ctx, temp->value, temp->valueLen), ret);
}
#ifdef HITLS_CRYPTO_PROVIDER
if ((temp = BSL_PARAM_FindConstParam(param, CRYPT_PARAM_MD_ATTR)) != NULL) {
GOTO_ERR_IF(CRYPT_KDFTLS12_SetMdAttr(ctx, temp->value, temp->valueLen), ret);
}
#endif
ERR:
return ret;
}
int32_t CRYPT_KDFTLS12_Derive(CRYPT_KDFTLS12_Ctx *ctx, uint8_t *out, uint32_t len)
{
if (ctx->macCtx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->macMeth.deinit == NULL || ctx->macMeth.freeCtx == NULL || ctx->macMeth.init == NULL ||
ctx->macMeth.reinit == NULL || ctx->macMeth.update == NULL || ctx->macMeth.final == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_KDFTLS12_ERR_MAC_METH);
return CRYPT_KDFTLS12_ERR_MAC_METH;
}
if (ctx->key == NULL && ctx->keyLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->label == NULL && ctx->labelLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->seed == NULL && ctx->seedLen > 0) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if ((out == NULL) || (len == 0)) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
return KDF_PHASH(ctx, out, len);
}
int32_t CRYPT_KDFTLS12_Deinit(CRYPT_KDFTLS12_Ctx *ctx)
{
if (ctx == NULL) {
BSL_ERR_PUSH_ERROR(CRYPT_NULL_INPUT);
return CRYPT_NULL_INPUT;
}
if (ctx->macMeth.freeCtx != NULL) {
ctx->macMeth.freeCtx(ctx->macCtx);
ctx->macCtx = NULL;
}
BSL_SAL_ClearFree((void *)ctx->key, ctx->keyLen);
BSL_SAL_ClearFree((void *)ctx->label, ctx->labelLen);
BSL_SAL_ClearFree((void *)ctx->seed, ctx->seedLen);
(void)memset_s(ctx, sizeof(CRYPT_KDFTLS12_Ctx), 0, sizeof(CRYPT_KDFTLS12_Ctx));
return CRYPT_SUCCESS;
}
void CRYPT_KDFTLS12_FreeCtx(CRYPT_KDFTLS12_Ctx *ctx)
{
if (ctx == NULL) {
return;
}
if (ctx->macMeth.freeCtx != NULL) {
ctx->macMeth.freeCtx(ctx->macCtx);
}
BSL_SAL_ClearFree((void *)ctx->key, ctx->keyLen);
BSL_SAL_ClearFree((void *)ctx->label, ctx->labelLen);
BSL_SAL_ClearFree((void *)ctx->seed, ctx->seedLen);
BSL_SAL_Free(ctx);
}
#endif // HITLS_CRYPTO_KDFTLS12
|
2301_79861745/bench_create
|
crypto/kdf/src/kdf_tls12.c
|
C
|
unknown
| 11,222
|
/*
* This file is part of the openHiTLS project.
*
* openHiTLS is licensed under the Mulan PSL v2.
* You can use this software according to the terms and conditions of the Mulan PSL v2.
* You may obtain a copy of Mulan PSL v2 at:
*
* http://license.coscl.org.cn/MulanPSL2
*
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
* See the Mulan PSL v2 for more details.
*/
#ifndef CRYPT_MD5_H
#define CRYPT_MD5_H
#include "hitls_build.h"
#ifdef HITLS_CRYPTO_MD5
#include <stdlib.h>
#include <stdint.h>
#include "crypt_types.h"
#include "bsl_params.h"
#ifdef __cplusplus
extern "C" {
#endif
#define CRYPT_MD5_DIGESTSIZE 16
#define CRYPT_MD5_BLOCKSIZE 64
typedef struct CryptMdCtx CRYPT_MD5_Ctx;
#define CRYPT_MD5_Squeeze NULL
/**
* @ingroup MD5
* @brief Generate md context.
*
* @retval Success: md ctx.
* Fails: NULL.
*/
CRYPT_MD5_Ctx *CRYPT_MD5_NewCtx(void);
/**
* @ingroup MD5
* @brief Generate md context.
*
* @param libCtx [IN] library context
* @param algId [IN] algorithm id
*
* @retval Success: md ctx.
* Fails: NULL.
*/
CRYPT_MD5_Ctx *CRYPT_MD5_NewCtxEx(void *libCtx, int32_t algId);
/**
* @ingroup MD5
* @brief free md context.
*
* @param ctx [IN] md handle
*/
void CRYPT_MD5_FreeCtx(CRYPT_MD5_Ctx *ctx);
/**
* @ingroup MD5
* @brief This API is used to initialize the MD5 context.
*
* @param ctx [in,out] Pointer to the MD5 context.
* @param param [in] Pointer to the parameter.
*
* @retval #CRYPT_SUCCESS Initialization succeeded.
* @retval #CRYPT_NULL_INPUT Pointer ctx is NULL
*/
int32_t CRYPT_MD5_Init(CRYPT_MD5_Ctx *ctx, BSL_Param *param);
/**
* @ingroup MD5
* @brief MD5 deinitialization API
* @param ctx [in,out] Pointer to the MD5 context.
*
* @retval #CRYPT_SUCCESS Deinitialization succeeded.
* @retval #CRYPT_NULL_INPUT Pointer ctx is NULL
*/
int32_t CRYPT_MD5_Deinit(CRYPT_MD5_Ctx *ctx);
/**
* @ingroup MD5
* @brief Encode the input text and update the message digest.
*
* @param ctx [in,out] Pointer to the MD5 context.
* @param in [in] Pointer to the data to be calculated
* @param len [in] Length of the data to be calculated
*
* @retval #CRYPT_SUCCESS Succeeded in updating the internal status of the digest.
* @retval #CRYPT_NULL_INPUT The input parameter is NULL.
* @retval #CRYPT_MD5_INPUT_OVERFLOW The accumulated length of the input data exceeds the maximum (2^64 bits).
*/
int32_t CRYPT_MD5_Update(CRYPT_MD5_Ctx *ctx, const uint8_t *in, uint32_t len);
/**
* @ingroup MD5
* @brief Obtain the message digest based on the passed MD5 context.
*
* @param ctx [in,out] Pointer to the MD5 context.
* @param out [in] Digest buffer
* @param outLen [in,out] Digest buffer size
*
* @retval #CRYPT_SUCCESS succeeded in updating the internal status of the digest.
* @retval #CRYPT_NULL_INPUT The input parameter is NULL.
* @retval #CRYPT_MD5_OUT_BUFF_LEN_NOT_ENOUGH The output buffer length is insufficient.
*/
int32_t CRYPT_MD5_Final(CRYPT_MD5_Ctx *ctx, uint8_t *out, uint32_t *outLen);
/**
* @ingroup MD5
* @brief MD5 copy CTX function
* @param dst [out] Pointer to the new MD5 context.
* @param src [in] Pointer to the original MD5 context.
*
* @retval #CRYPT_SUCCESS Copy succeeded.
* @retval #CRYPT_NULL_INPUT Pointer src is NULL
*/
int32_t CRYPT_MD5_CopyCtx(CRYPT_MD5_Ctx *dst, const CRYPT_MD5_Ctx *src);
/**
* @ingroup MD5
* @brief MD5 dup CTX function
* @param src [in] Pointer to the original MD5 context.
*
* @retval Success: md ctx.
* Fails: NULL.
*/
CRYPT_MD5_Ctx *CRYPT_MD5_DupCtx(const CRYPT_MD5_Ctx *src);
#ifdef HITLS_CRYPTO_PROVIDER
/**
* @ingroup MD5
* @brief MD5 get param function
* @param ctx [in] Pointer to the MD5 context.
* @param param [in] Pointer to the parameter.
*
* @retval #CRYPT_SUCCESS Success.
* @retval #CRYPT_NULL_INPUT Pointer param is NULL
* @retval #CRYPT_INVALID_ARG Pointer param is invalid
*/
int32_t CRYPT_MD5_GetParam(CRYPT_MD5_Ctx *ctx, BSL_Param *param);
#else
#define CRYPT_MD5_GetParam NULL
#endif
#ifdef __cplusplus
}
#endif
#endif // HITLS_CRYPTO_MD5
#endif // CRYPT_MD5_H
|
2301_79861745/bench_create
|
crypto/md5/include/crypt_md5.h
|
C
|
unknown
| 4,353
|