diff options
Diffstat (limited to 'debian/vendor-h2o/deps/picotls/deps/cifra')
114 files changed, 0 insertions, 24086 deletions
diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/.travis.yml b/debian/vendor-h2o/deps/picotls/deps/cifra/.travis.yml deleted file mode 100644 index 44b1a26..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/.travis.yml +++ /dev/null @@ -1,29 +0,0 @@ -language: c - -before_install: - - sudo pip install cpp-coveralls - -script: - - cd src - - make clean - - make test - -after_success: - - coveralls --exclude src/ext --gcov-options '\-lp' - -compiler: - - gcc - -env: - global: - - secure: "W9IUnUWNc03gIBGLPOxXCVJUOb3RY2fS4lgOo+wIsCSk0rsJAB6gruAZDoz1sMxCJyBhCv0dKV5WPkAxkZ0y55wiuUcCepgR0qis6S6rJxldPdEWc3RQaeU9LbVRKRBYUBqSsFlXr5pdOvl0CBDWmx8lhcRxAw8z+JVDrAGVsTQ=" - -addons: - coverity_scan: - project: - name: "ctz/cifra" - description: "Cifra is a collection of cryptographic primitives targeted at embedded use." - notification_email: jpixton@gmail.com - build_command_prepend: "cd src ; make clean" - build_command: "make" - branch_pattern: coverity-scan diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/COPYING b/debian/vendor-h2o/deps/picotls/deps/cifra/COPYING deleted file mode 100644 index 0e259d4..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/COPYING +++ /dev/null @@ -1,121 +0,0 @@ -Creative Commons Legal Code - -CC0 1.0 Universal - - CREATIVE COMMONS CORPORATION IS NOT A LAW FIRM AND DOES NOT PROVIDE - LEGAL SERVICES. DISTRIBUTION OF THIS DOCUMENT DOES NOT CREATE AN - ATTORNEY-CLIENT RELATIONSHIP. CREATIVE COMMONS PROVIDES THIS - INFORMATION ON AN "AS-IS" BASIS. CREATIVE COMMONS MAKES NO WARRANTIES - REGARDING THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS - PROVIDED HEREUNDER, AND DISCLAIMS LIABILITY FOR DAMAGES RESULTING FROM - THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS PROVIDED - HEREUNDER. - -Statement of Purpose - -The laws of most jurisdictions throughout the world automatically confer -exclusive Copyright and Related Rights (defined below) upon the creator -and subsequent owner(s) (each and all, an "owner") of an original work of -authorship and/or a database (each, a "Work"). - -Certain owners wish to permanently relinquish those rights to a Work for -the purpose of contributing to a commons of creative, cultural and -scientific works ("Commons") that the public can reliably and without fear -of later claims of infringement build upon, modify, incorporate in other -works, reuse and redistribute as freely as possible in any form whatsoever -and for any purposes, including without limitation commercial purposes. -These owners may contribute to the Commons to promote the ideal of a free -culture and the further production of creative, cultural and scientific -works, or to gain reputation or greater distribution for their Work in -part through the use and efforts of others. - -For these and/or other purposes and motivations, and without any -expectation of additional consideration or compensation, the person -associating CC0 with a Work (the "Affirmer"), to the extent that he or she -is an owner of Copyright and Related Rights in the Work, voluntarily -elects to apply CC0 to the Work and publicly distribute the Work under its -terms, with knowledge of his or her Copyright and Related Rights in the -Work and the meaning and intended legal effect of CC0 on those rights. - -1. Copyright and Related Rights. A Work made available under CC0 may be -protected by copyright and related or neighboring rights ("Copyright and -Related Rights"). Copyright and Related Rights include, but are not -limited to, the following: - - i. the right to reproduce, adapt, distribute, perform, display, - communicate, and translate a Work; - ii. moral rights retained by the original author(s) and/or performer(s); -iii. publicity and privacy rights pertaining to a person's image or - likeness depicted in a Work; - iv. rights protecting against unfair competition in regards to a Work, - subject to the limitations in paragraph 4(a), below; - v. rights protecting the extraction, dissemination, use and reuse of data - in a Work; - vi. database rights (such as those arising under Directive 96/9/EC of the - European Parliament and of the Council of 11 March 1996 on the legal - protection of databases, and under any national implementation - thereof, including any amended or successor version of such - directive); and -vii. other similar, equivalent or corresponding rights throughout the - world based on applicable law or treaty, and any national - implementations thereof. - -2. Waiver. To the greatest extent permitted by, but not in contravention -of, applicable law, Affirmer hereby overtly, fully, permanently, -irrevocably and unconditionally waives, abandons, and surrenders all of -Affirmer's Copyright and Related Rights and associated claims and causes -of action, whether now known or unknown (including existing as well as -future claims and causes of action), in the Work (i) in all territories -worldwide, (ii) for the maximum duration provided by applicable law or -treaty (including future time extensions), (iii) in any current or future -medium and for any number of copies, and (iv) for any purpose whatsoever, -including without limitation commercial, advertising or promotional -purposes (the "Waiver"). Affirmer makes the Waiver for the benefit of each -member of the public at large and to the detriment of Affirmer's heirs and -successors, fully intending that such Waiver shall not be subject to -revocation, rescission, cancellation, termination, or any other legal or -equitable action to disrupt the quiet enjoyment of the Work by the public -as contemplated by Affirmer's express Statement of Purpose. - -3. Public License Fallback. Should any part of the Waiver for any reason -be judged legally invalid or ineffective under applicable law, then the -Waiver shall be preserved to the maximum extent permitted taking into -account Affirmer's express Statement of Purpose. In addition, to the -extent the Waiver is so judged Affirmer hereby grants to each affected -person a royalty-free, non transferable, non sublicensable, non exclusive, -irrevocable and unconditional license to exercise Affirmer's Copyright and -Related Rights in the Work (i) in all territories worldwide, (ii) for the -maximum duration provided by applicable law or treaty (including future -time extensions), (iii) in any current or future medium and for any number -of copies, and (iv) for any purpose whatsoever, including without -limitation commercial, advertising or promotional purposes (the -"License"). The License shall be deemed effective as of the date CC0 was -applied by Affirmer to the Work. Should any part of the License for any -reason be judged legally invalid or ineffective under applicable law, such -partial invalidity or ineffectiveness shall not invalidate the remainder -of the License, and in such case Affirmer hereby affirms that he or she -will not (i) exercise any of his or her remaining Copyright and Related -Rights in the Work or (ii) assert any associated claims and causes of -action with respect to the Work, in either case contrary to Affirmer's -express Statement of Purpose. - -4. Limitations and Disclaimers. - - a. No trademark or patent rights held by Affirmer are waived, abandoned, - surrendered, licensed or otherwise affected by this document. - b. Affirmer offers the Work as-is and makes no representations or - warranties of any kind concerning the Work, express, implied, - statutory or otherwise, including without limitation warranties of - title, merchantability, fitness for a particular purpose, non - infringement, or the absence of latent or other defects, accuracy, or - the present or absence of errors, whether or not discoverable, all to - the greatest extent permissible under applicable law. - c. Affirmer disclaims responsibility for clearing rights of other persons - that may apply to the Work or any use thereof, including without - limitation any person's Copyright and Related Rights in the Work. - Further, Affirmer disclaims responsibility for obtaining any necessary - consents, permissions or other rights required for any use of the - Work. - d. Affirmer understands and acknowledges that Creative Commons is not a - party to this document and has no duty or obligation with respect to - this CC0 or use of the Work. diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/README.md b/debian/vendor-h2o/deps/picotls/deps/cifra/README.md deleted file mode 100644 index e972912..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/README.md +++ /dev/null @@ -1,246 +0,0 @@ -# Cifra -Cifra is a collection of cryptographic primitives targeted at embedded use. - -[![Build Status](https://travis-ci.org/ctz/cifra.svg?branch=master)](https://travis-ci.org/ctz/cifra) - -[![Documentation](https://readthedocs.org/projects/pip/badge/)](https://cifra.readthedocs.org/en/latest/) - -[![Analysis Status](https://scan.coverity.com/projects/4324/badge.svg)](https://scan.coverity.com/projects/4324) - -[![Coverage Status](https://coveralls.io/repos/ctz/cifra/badge.svg?branch=coveralls-scan)](https://coveralls.io/r/ctz/cifra?branch=coveralls-scan) - -## Aims -In order of descending emphasis, cifra aims for: - -* **Clarity** and **simplicity**. -* Countermeasures for side channel leaks inherent in some - algorithms. -* Suitability for embedded use. Particularly: cifra uses an - absolute minimum of the standard C library and is reasonably - efficient with respect to code and data space. - -## Features -* **AES** in the **GCM**, **CCM**, **EAX** and **OCB** authenticated encryption modes. -* **NORX** authenticated encryption system. -* **SHA224**, **SHA256**, **SHA384** and **SHA512** hash functions (including **HMAC** and **PBKDF2**). -* **SHA3-224**, **SHA3-256**, **SHA3-384**, **SHA3-512** hash functions (FIPS 202 compatible). -* **ChaCha20** and **Salsa20** stream ciphers. -* **Poly1305** one time MAC. -* 100% code coverage by line, zero static analysis defects, valgrind-clean. - -Additionally cifra imports curve25519 from elsewhere (μNaCl, NaCl, tweetNaCl, -Adam Langley's curve25519-donna) for comparison between various implementations -on embedded targets. - -## Documentation -Available at [Read the Docs](https://cifra.readthedocs.org/en/latest/). - -## Testing -There is quite a lot of testing available: - -* **Host builds**: run `make test` in the `src` directory. This builds and - runs assorted test programs. -* **Emulated embedded builds**: run `make test` in the `src/arm` directory. This - expects to find `qemu-system-gnuarmeclipse` on the path. These tests assume - a Cortex-M3 target. -* **Cortex-M0 on-target tests**: run `make test.stm32f0` in the `src/arm` directory. - This expects to find `openocd` on the path, with an STM32F0xx attached via - stlinkv2. It uses ARM semihosting to report results. -* **Cortex-M3/4 on-target tests**: run `make test.stm32f1` or `make test.stm32f3` as above. - -Additionally all embedded targets expect to find the `arm-none-eabi` toolchain -to be on the path. - -## Measurements -All measurements performed at `-Os` (optimise for space), on the following MCUs: - -Core | Part number | Price (1s) | Max clock | Flash | SRAM ----------- | ------------- | ------------ | ---------- | ----- | ----- -Cortex-M0 | STM32F030F4P6 | 1.17EUR | 48MHz | 16KB | 4KB -Cortex-M3 | STM32F103C8T6 | 2.87EUR | 72MHz | 64KB | 20KB -Cortex-M4F | STM32F303K6T6 | 4.53EUR | 72MHz | 32KB | 12KB - -More measurements are available for AEAD modes on my blog post: -[Benchmarking Modern Authenticated Encryption on €1 devices](http://jbp.io/2015/06/01/modern-authenticated-encryption-for-1-euro/). - -## AES -This test does a key schedule, then encrypts one block. - -### 128-bit key -Core | Cycles (key schedule + block) | Cycles (key schedule) | Cycles (block) | Stack | Code size ----------- | ----------------------------- | --------------------- | -------------- | ----- | --------- -Cortex-M0 | 7156 | 2147 | 5009 | 312B | 1020B -Cortex-M3 | 4692 | 1591 | 3101 | 300B | 960B -Cortex-M4F | 4591 | 1571 | 3020 | 300B | 960B - -### 256-bit key -Core | Cycles (key schedule + block) | Cycles (key schedule) | Cycles (block) | Stack | Code size ----------- | ----------------------------- | --------------------- | -------------- | ----- | --------- -Cortex-M0 | 10611 | 3650 | 6961 | 396B | 1100B -Cortex-M3 | 6735 | 2450 | 4285 | 380B | 1048B -Cortex-M4F | 6588 | 2416 | 4172 | 380B | 1048B - -## AES128-GCM -This test encrypts and authenticates a 16 byte message, -with 16 bytes additionally authenticated data. It includes -the initial key schedule. - -Core | Cycles | Stack | Code size ----------- | ------ | ----- | --------- -Cortex-M0 | 57022 | 796B | 2600B -Cortex-M3 | 44306 | 812B | 2644B -Cortex-M4F | 43657 | 812B | 2644B - -## AES128-EAX -This test encrypts and authenticates a 16 byte message, -with 16 bytes additionally authenticated data. It includes -the initial key schedule. - -Core | Cycles | Stack | Code size ----------- | ------ | ----- | --------- -Cortex-M0 | 50564 | 932B | 2836B -Cortex-M3 | 32855 | 932B | 2780B -Cortex-M4F | 32159 | 932B | 2780B - -## AES128-CCM -This test encrypts and authenticates a 16 byte message, -with 16 bytes additionally authenticated data. It includes -the initial key schedule. - -Core | Cycles | Stack | Code size ----------- | ------ | ----- | --------- -Cortex-M0 | 37677 | 772B | 2280B -Cortex-M3 | 24462 | 780B | 2256B -Cortex-M4F | 23949 | 780B | 2256B - -## NORX32 -This test encrypts and authenticates a 16 byte message, -with 16 bytes additionally authenticated data. - -Core | Cycles | Stack | Code size ----------- | ------ | ----- | --------- -Cortex-M0 | 10692 | 320B | 1636B -Cortex-M3 | 6909 | 320B | 1820B -Cortex-M4F | 6855 | 320B | 1820B - -## ChaCha20 -This test encrypts a 64 byte message. - -Core | Cycles | Stack | Code size ----------- | ------ | ----- | --------- -Cortex-M0 | 5981 | 564B | 1416B -Cortex-M3 | 3487 | 544B | 1328B -Cortex-M4F | 3468 | 544B | 1328B - -(For comparison with AES, add an AES256 key schedule plus 4 blocks. -That's about 33K cycles.) - -## Salsa20 -This test encrypts a 64 byte message. - -Core | Cycles | Stack | Code size ----------- | ------ | ----- | --------- -Cortex-M0 | 6173 | 560B | 1412B -Cortex-M3 | 3320 | 552B | 1272B -Cortex-M4F | 3311 | 552B | 1272B - -## SHA256 -This test hashes the empty string (one compression function invocation). - -Core | Cycles | Stack | Code size ----------- | ------ | ----- | --------- -Cortex-M0 | 11561 | 312B | 1760B -Cortex-M3 | 6530 | 300B | 1708B -Cortex-M4F | 6278 | 300B | 1708B - -## SHA512 -This test hashes the empty string (one compression function invocation). - -Core | Cycles | Stack | Code size ----------- | ------ | ----- | --------- -Cortex-M0 | 38447 | 796B | 2888B -Cortex-M3 | 28771 | 836B | 2988B -Cortex-M4F | 28777 | 836B | 2980B - -## SHA3-256 -This test hashes the empty string (one sponge permutation). - -Core | Cycles | Stack | Code size ----------- | ------ | ----- | --------- -Cortex-M0 | 93648 | 848B | 2212B -Cortex-M3 | 74321 | 856B | 2164B -Cortex-M4F | 72215 | 856B | 2140B - -## SHA3-512 -This test hashes the empty string (one sponge permutation). - -Core | Cycles | Stack | Code size ----------- | ------ | ----- | --------- -Cortex-M0 | 92565 | 880B | 2212B -Cortex-M3 | 73509 | 888B | 2164B -Cortex-M4F | 71419 | 888B | 2140B - -## HMAC-SHA256 -This test computes a MAC with a 32 byte key over the -message "hello world". - -Core | Cycles | Stack | Code size ----------- | ------ | ----- | --------- -Cortex-M0 | 48924 | 1328B | 2200B -Cortex-M3 | 28333 | 1324B | 2132B -Cortex-M4F | 27337 | 1324B | 2132B - -## Poly1305-AES -This test computes a MAC with a 32 byte key over the -message "hello world". It includes the AES nonce -processing. - -Core | Cycles | Stack | Code size ----------- | ------ | ----- | --------- -Cortex-M0 | 15719 | 704B | 1920B -Cortex-M3 | 11328 | 696B | 1964B -Cortex-M4F | 10706 | 696B | 1932B - -## Curve25519 -This test is one point multiplication. - -This uses the implementation from [μNaCl](http://munacl.cryptojedi.org/curve25519-cortexm0.shtml) -by Düll, Haase, Hinterwälder, Hutter, Paar, Sánchez and Schwabe. - -Core | Cycles | Stack | Code size ----------- | ------- | ----- | --------- -Cortex-M0 | 4070271 | 464B | 5596B -Cortex-M3 | 3720363 | 448B | 5536B -Cortex-M4F | 3720105 | 448B | 5536B - -See [curve25519-shootout](curve25519-shootout.md) for comparitive measurements -for other curve25519 implementations. - -## C library requirements -Cifra requires `memcpy`, `memset`, and `abort`. - -## Future -* ~~Keccak hash function (aka SHA3)~~. -* ~~Poly1305 one-time MAC~~. -* Constant time curve25519 for Cortex-M4F using the FPU. -* Constant time curve25519 for Cortex-M3 (avoiding the variable-time multiplier). - -## Notable past bugs/advisories -* [Issue #2](https://github.com/ctz/cifra/issues/2): in all versions before commit - [d62aa26e](https://github.com/ctz/cifra/commit/d62aa26e2c3c49e5b8a4298644cff290406d9357) - (September 16th 2015) too much padding was added when hashing messages of certain - lengths. Specifically, messages whose length satisfied `len % 64 = 55` for - SHA1/SHA224/SHA256 or `len % 128 = 119` for SHA384/SHA512. SHA3 was not affected. - Better testing is now in place. -* [Issue #3](https://github.com/ctz/cifra/issues/3): in all versions before commit - [82d77cd8](https://github.com/ctz/cifra/commit/82d77cd8323f6d4473fcb68517752a778970138d) - (April 16th 2016) EAX would produce wrong tags for empty AADs or messages. The - underlying CMAC is now more resistant to this case. - -## License -[CC0](https://creativecommons.org/publicdomain/zero/1.0/). - -Please attribute the author. This is a request only, and not a license term. - -## Author -Joseph Birr-Pixton <jpixton@gmail.com> diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/curve25519-shootout.md b/debian/vendor-h2o/deps/picotls/deps/cifra/curve25519-shootout.md deleted file mode 100644 index 6f05758..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/curve25519-shootout.md +++ /dev/null @@ -1,16 +0,0 @@ -## Curve25519 on Cortex-M0 shootout -Implementation | Optimisation | Cycles | Code size | Stack usage --------------- | ------------ | --------- | --------- | ----------- -donna | `-Os` | 15748K | 7.4KB | 3148B -donna | `-O2` | 15218K | 7.9KB | 3148B -donna | `-O3` | 12907K | 16KB | 3380B -naclref | `-Os` | 47813K | 3.2KB | 4012B -naclref | `-O2` | 34309K | 3.5KB | 4036B -naclref | `-O3` | 35059K | 4.1KB | 4044B -tweetnacl | `-Os` | 75979K | 2.8KB | 2244B -tweetnacl | `-O2` | 68876K | 3.0KB | 2268B -tweetnacl | `-O3` | 69622K | 8.9KB | 2900B - -naclref at -O2 seems to give a good balance. If you can spare the flash, -donna is quite significantly quicker. - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/doc/Makefile b/debian/vendor-h2o/deps/picotls/deps/cifra/doc/Makefile deleted file mode 100644 index 2b7f5c0..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/doc/Makefile +++ /dev/null @@ -1,3 +0,0 @@ -default: all -all: - sphinx-build -b html . _build diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/doc/build.py b/debian/vendor-h2o/deps/picotls/deps/cifra/doc/build.py deleted file mode 100644 index 0b00682..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/doc/build.py +++ /dev/null @@ -1,274 +0,0 @@ -""" -Extracts documentation from cifra headers. - -We want to embed documentation in headers for good -locality. But want to write rst for formatting by sphinx. -This is a problem. - -'Breathe' provides a bridge between doxygen and sphinx, -but doxygen's documentation markup is pretty awful. - -Therefore, we write rst directly in C headers, and then -extract it here. The rules are: a C block comment -starting exactly '/* .. ' is dedented, and then included -verbatim. The convention is that the documentation -preceeds the C declarations they apply to, and that struct -members are documented before the struct they are contained -within. eg: - -/* .. c:function:: int foo(int bar) - * Foos a bar, returning the foo coefficient. - */ -int foo(int bar); - -/* .. c:type:: thing - * Container for things. - * - * .. c:member:: int thing.foo - * Count of foos. - * - * .. c:member:: int thing.bar - * Count of bars. - */ -typedef struct -{ - int foo; - int bar; -} thing; - -As a special effect, the following tokens are replaced -in the comments: - - - $DECL: the immediately following function declaration -""" - -import glob -import re -import StringIO - -# We know which headers constitute the external interface. -EXTERNAL = """ -aes -cf_config -chash -hmac -modes -pbkdf2 -prp -salsa20 -sha1 -sha2 -sha3 -norx -poly1305 -chacha20poly1305 -drbg -""".split() - -# Basic idea of a C identifier -C_IDENTIFIER = '[a-zA-Z_][a-zA-Z0-9_]+' - -DECL_RE = re.compile(r'^\s*(.+?' + C_IDENTIFIER + '\(.+?\));', re.MULTILINE | re.DOTALL) -COMMENT_RE = re.compile(r'^\s*\/\* (\.\..*?) \*\/$', re.MULTILINE | re.DOTALL) -INTRO_RE = re.compile(r'^\s*\/\*\*(.*?)\*\/$', re.MULTILINE | re.DOTALL) -NEW_SECTION_RE = re.compile(r'^..+\n(==+|--+)$', re.MULTILINE) - -class section(object): - def __init__(self): - self.intro = [] - self.macros = [] - self.types = [] - self.functions = [] - self.values = [] - - def __repr__(self): - return repr(self.format()[:30]) - - def __str__(self): - return repr(self.format()[:30]) - - def format(self): - f = StringIO.StringIO() - - def emit(title, section): - if len(section) == 0: - return - - if title: - print >>f, title - print >>f, '*' * len(title) - print >>f - - for s in section: - print >>f, s.getvalue() - - emit(None, self.intro) - emit('Macros', self.macros) - emit('Types', self.types) - emit('Functions', self.functions) - emit('Values', self.values) - - return f.getvalue() - - def is_empty(self): - items = len(self.intro) + len(self.macros) + len(self.types) + \ - len(self.functions) + len(self.values) - return 0 == items - - def add_item(self, sec): - f = StringIO.StringIO() - sec.append(f) - return f - -def massage_decl(decl): - """ - Tart-up a C function declaration: remove storage qualifiers, - smush onto one line, escape asterisks. - """ - for storage in 'extern static inline'.split(): - decl = decl.replace(storage + ' ', '') - - fixed_lines = ' '.join(line.strip() for line in decl.splitlines()) - - return fixed_lines.replace('*', '\\*') - -def replace_decl(comment, comment_match, header): - if '$DECL' not in comment: - return comment - - start = comment_match.end(0) + 1 - decl_match = DECL_RE.match(header, start) - - if decl_match is None: - print 'Cause:', comment - print 'Trailer:', header[start:start+60] - raise IOError('$DECL present but cannot find following DECL') - - decl = decl_match.group(1) - decl = massage_decl(decl) - return comment.replace('$DECL', decl) - -def decomment(lines): - for i in range(len(lines)): - if lines[i].startswith(' *'): - lines[i] = lines[i][3:] - lines[i] = lines[i].strip() - -def drop_empty_prefix(lines): - while len(lines) and lines[0] == '': - lines.pop(0) - -def starts_new_section(lines): - txt = '\n'.join(lines) - r = NEW_SECTION_RE.search(txt) is not None - return r - -def process(header, rst): - """ - Converts a header into restructured text. - - header is a file-like opened to read the header. - rst is a file-like opened to write the rst results. - """ - - hh = header.read() - - # Collect definitions into sections - sec = None - all_sections = [] - intro, macros, types, functions, values = [], [], [], [], [] - - def add_section(): - if sec and not sec.is_empty(): - all_sections.append(sec) - return section() - - sec = add_section() - - offs = 0 - - while True: - intro_match = INTRO_RE.search(hh, offs) - comment_match = COMMENT_RE.search(hh, offs) - - if intro_match is None and comment_match is None: - break - - # process earliest occuring - if intro_match is not None and (comment_match is None or intro_match.start(0) < comment_match.start(0)): - txt = intro_match.group(1) - - lines = txt.splitlines() - decomment(lines) - drop_empty_prefix(lines) - - if starts_new_section(lines): - sec = add_section() - - outf = sec.add_item(sec.intro) - - for l in lines: - print >>outf, l - offs = intro_match.end(0) + 1 - continue - - if comment_match is not None and (intro_match is None or comment_match.start(0) < intro_match.start(0)): - txt = comment_match.group(1) - - # work out which section this goes into - outf = None - if '.. c:macro::' in txt: - outf = sec.add_item(sec.macros) - elif '.. c:type::' in txt: - outf = sec.add_item(sec.types) - elif '.. c:var::' in txt: - outf = sec.add_item(sec.values) - elif '.. c:function::' in txt: - outf = sec.add_item(sec.functions) - elif '.. c:member::' in txt: - if len(types) == 0: - raise IOError('c:member must come after a c:type') - outf = types[-1] - else: - raise IOError('Cannot categorise item: ' + txt) - - # expand $DECL - txt = replace_decl(txt, comment_match, hh) - - # decomment lines - lines = txt.splitlines() - decomment(lines) - - # domain lines are unindented - while lines and lines[0].startswith('.. '): - print >>outf, lines.pop(0) - print >>outf - - # empty prefix lines are stripped - drop_empty_prefix(lines) - - # other lines are indented - for line in lines: - if len(line): - line = ' ' + line - print >>outf, line - - offs = comment_match.end(0) + 1 - continue - - add_section() - - for sec in all_sections: - rst.write(sec.format()) - -def run(): - for fn in EXTERNAL: - print '** build', fn - header = '../src/' + fn + '.h' - rst = fn + '.rst' - with open(header, 'r') as fh: - with open(rst, 'w') as fr: - process(fh, fr) - -if __name__ == '__main__': - run() diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/doc/conf.py b/debian/vendor-h2o/deps/picotls/deps/cifra/doc/conf.py deleted file mode 100644 index 8354354..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/doc/conf.py +++ /dev/null @@ -1,263 +0,0 @@ -# -*- coding: utf-8 -*- -# -# Cifra documentation build configuration file, created by -# sphinx-quickstart on Sat Feb 21 18:02:37 2015. -# -# This file is execfile()d with the current directory set to its -# containing dir. -# -# Note that not all possible configuration values are present in this -# autogenerated file. -# -# All configuration values have a default; values that are commented out -# serve to show the default. - -import sys -import os - -# If extensions (or modules to document with autodoc) are in another directory, -# add these directories to sys.path here. If the directory is relative to the -# documentation root, use os.path.abspath to make it absolute, like shown here. -sys.path.insert(0, os.path.abspath('.')) - -import build -build.run() - -# -- General configuration ------------------------------------------------ - -# If your documentation needs a minimal Sphinx version, state it here. -#needs_sphinx = '1.0' - -# Add any Sphinx extension module names here, as strings. They can be -# extensions coming with Sphinx (named 'sphinx.ext.*') or your custom -# ones. -extensions = [ - 'sphinx.ext.mathjax', -] - -# Add any paths that contain templates here, relative to this directory. -templates_path = ['_templates'] - -# The suffix of source filenames. -source_suffix = '.rst' - -# The encoding of source files. -#source_encoding = 'utf-8-sig' - -# The master toctree document. -master_doc = 'index' - -# General information about the project. -project = u'Cifra' -copyright = u'2015, Joseph Birr-Pixton' - -# The version info for the project you're documenting, acts as replacement for -# |version| and |release|, also used in various other places throughout the -# built documents. -# -# The short X.Y version. -version = '0.1' -# The full version, including alpha/beta/rc tags. -release = '0.1' - -# The language for content autogenerated by Sphinx. Refer to documentation -# for a list of supported languages. -#language = None - -# There are two options for replacing |today|: either, you set today to some -# non-false value, then it is used: -#today = '' -# Else, today_fmt is used as the format for a strftime call. -#today_fmt = '%B %d, %Y' - -# List of patterns, relative to source directory, that match files and -# directories to ignore when looking for source files. -exclude_patterns = ['_build'] - -# The reST default role (used for this markup: `text`) to use for all -# documents. -#default_role = None - -# If true, '()' will be appended to :func: etc. cross-reference text. -#add_function_parentheses = True - -# If true, the current module name will be prepended to all description -# unit titles (such as .. function::). -#add_module_names = True - -# If true, sectionauthor and moduleauthor directives will be shown in the -# output. They are ignored by default. -#show_authors = False - -# The name of the Pygments (syntax highlighting) style to use. -pygments_style = 'sphinx' - -# A list of ignored prefixes for module index sorting. -#modindex_common_prefix = [] - -# If true, keep warnings as "system message" paragraphs in the built documents. -#keep_warnings = False - - -# -- Options for HTML output ---------------------------------------------- - -# The theme to use for HTML and HTML Help pages. See the documentation for -# a list of builtin themes. -html_theme = 'default' - -# Theme options are theme-specific and customize the look and feel of a theme -# further. For a list of options available for each theme, see the -# documentation. -#html_theme_options = {} - -# Add any paths that contain custom themes here, relative to this directory. -#html_theme_path = [] - -# The name for this set of Sphinx documents. If None, it defaults to -# "<project> v<release> documentation". -#html_title = None - -# A shorter title for the navigation bar. Default is the same as html_title. -#html_short_title = None - -# The name of an image file (relative to this directory) to place at the top -# of the sidebar. -#html_logo = None - -# The name of an image file (within the static path) to use as favicon of the -# docs. This file should be a Windows icon file (.ico) being 16x16 or 32x32 -# pixels large. -#html_favicon = None - -# Add any paths that contain custom static files (such as style sheets) here, -# relative to this directory. They are copied after the builtin static files, -# so a file named "default.css" will overwrite the builtin "default.css". -html_static_path = ['_static'] - -# Add any extra paths that contain custom files (such as robots.txt or -# .htaccess) here, relative to this directory. These files are copied -# directly to the root of the documentation. -#html_extra_path = [] - -# If not '', a 'Last updated on:' timestamp is inserted at every page bottom, -# using the given strftime format. -#html_last_updated_fmt = '%b %d, %Y' - -# If true, SmartyPants will be used to convert quotes and dashes to -# typographically correct entities. -#html_use_smartypants = True - -# Custom sidebar templates, maps document names to template names. -#html_sidebars = {} - -# Additional templates that should be rendered to pages, maps page names to -# template names. -#html_additional_pages = {} - -# If false, no module index is generated. -#html_domain_indices = True - -# If false, no index is generated. -#html_use_index = True - -# If true, the index is split into individual pages for each letter. -#html_split_index = False - -# If true, links to the reST sources are added to the pages. -#html_show_sourcelink = True - -# If true, "Created using Sphinx" is shown in the HTML footer. Default is True. -#html_show_sphinx = True - -# If true, "(C) Copyright ..." is shown in the HTML footer. Default is True. -#html_show_copyright = True - -# If true, an OpenSearch description file will be output, and all pages will -# contain a <link> tag referring to it. The value of this option must be the -# base URL from which the finished HTML is served. -#html_use_opensearch = '' - -# This is the file name suffix for HTML files (e.g. ".xhtml"). -#html_file_suffix = None - -# Output file base name for HTML help builder. -htmlhelp_basename = 'Cifradoc' - - -# -- Options for LaTeX output --------------------------------------------- - -latex_elements = { -# The paper size ('letterpaper' or 'a4paper'). -#'papersize': 'letterpaper', - -# The font size ('10pt', '11pt' or '12pt'). -#'pointsize': '10pt', - -# Additional stuff for the LaTeX preamble. -#'preamble': '', -} - -# Grouping the document tree into LaTeX files. List of tuples -# (source start file, target name, title, -# author, documentclass [howto, manual, or own class]). -latex_documents = [ - ('index', 'Cifra.tex', u'Cifra Documentation', - u'Joseph Birr-Pixton', 'manual'), -] - -# The name of an image file (relative to this directory) to place at the top of -# the title page. -#latex_logo = None - -# For "manual" documents, if this is true, then toplevel headings are parts, -# not chapters. -#latex_use_parts = False - -# If true, show page references after internal links. -#latex_show_pagerefs = False - -# If true, show URL addresses after external links. -#latex_show_urls = False - -# Documents to append as an appendix to all manuals. -#latex_appendices = [] - -# If false, no module index is generated. -#latex_domain_indices = True - - -# -- Options for manual page output --------------------------------------- - -# One entry per manual page. List of tuples -# (source start file, name, description, authors, manual section). -man_pages = [ - ('index', 'cifra', u'Cifra Documentation', - [u'Joseph Birr-Pixton'], 1) -] - -# If true, show URL addresses after external links. -#man_show_urls = False - - -# -- Options for Texinfo output ------------------------------------------- - -# Grouping the document tree into Texinfo files. List of tuples -# (source start file, target name, title, author, -# dir menu entry, description, category) -texinfo_documents = [ - ('index', 'Cifra', u'Cifra Documentation', - u'Joseph Birr-Pixton', 'Cifra', 'One line description of project.', - 'Miscellaneous'), -] - -# Documents to append as an appendix to all manuals. -#texinfo_appendices = [] - -# If false, no module index is generated. -#texinfo_domain_indices = True - -# How to display URL addresses: 'footnote', 'no', or 'inline'. -#texinfo_show_urls = 'footnote' - -# If true, do not generate a @detailmenu in the "Top" node's menu. -#texinfo_no_detailmenu = False diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/doc/index.rst b/debian/vendor-h2o/deps/picotls/deps/cifra/doc/index.rst deleted file mode 100644 index e853de4..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/doc/index.rst +++ /dev/null @@ -1,33 +0,0 @@ -.. Cifra documentation master file, created by - sphinx-quickstart on Sat Feb 21 18:02:37 2015. - You can adapt this file completely to your liking, but it should at least - contain the root `toctree` directive. - -Welcome to Cifra's documentation! -================================= - -Contents: - -.. toctree:: - :maxdepth: 2 - - cf_config - prp - chash - aes - norx - salsa20 - modes - hmac - poly1305 - chacha20poly1305 - pbkdf2 - sha1 - sha2 - sha3 - drbg - -Index ------ -* :ref:`genindex` - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/extra_vecs/Makefile b/debian/vendor-h2o/deps/picotls/deps/cifra/extra_vecs/Makefile deleted file mode 100644 index 065721c..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/extra_vecs/Makefile +++ /dev/null @@ -1,13 +0,0 @@ -CFLAGS += -std=gnu99 -O0 -g -Wall -Werror - -all: run - -openssl-hash: openssl-hash.c - $(CC) $(CFLAGS) -o $@ $^ -lcrypto - -run: openssl-hash - ./openssl-hash - python python-hash.py - -clean: - rm -rf *.o openssl-hash diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/extra_vecs/README.md b/debian/vendor-h2o/deps/picotls/deps/cifra/extra_vecs/README.md deleted file mode 100644 index a7d3828..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/extra_vecs/README.md +++ /dev/null @@ -1,2 +0,0 @@ -This directory contains assorted programs for generating test vectors -from other crypto libraries, like OpenSSL. diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/extra_vecs/openssl-hash.c b/debian/vendor-h2o/deps/picotls/deps/cifra/extra_vecs/openssl-hash.c deleted file mode 100644 index 9df6856..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/extra_vecs/openssl-hash.c +++ /dev/null @@ -1,60 +0,0 @@ -#include <stdint.h> -#include <stdio.h> - -#include <openssl/evp.h> - -#define MAX_LENGTH 1024 - -static void printhex(const uint8_t *buf, size_t len) -{ - for (size_t i = 0; i < len; i++) - printf("%02x", buf[i]); -} - -/* This test produces a single hash value which depends on - * hashes with all preimage lengths up to max. - * - * It emits - * H(H(t(0)) || H(t(1)) || ... || H(t(max-1)))) - * where - * t(n) = (n % 256) ^ n - * (informally, t(n) is a n-length octet string of octets with value n mod 256) - */ -static void emit_length_test(const char *name, const EVP_MD *h, size_t max) -{ - EVP_MD_CTX outer, inner; - EVP_DigestInit(&outer, h); - uint8_t digest[EVP_MAX_MD_SIZE]; - unsigned int digestlen; - - for (size_t n = 0; n < max; n++) - { - EVP_DigestInit(&inner, h); - for (size_t i = 0; i < n; i++) - { - uint8_t byte = n & 0xff; - EVP_DigestUpdate(&inner, &byte, 1); - } - digestlen = sizeof digest; - EVP_DigestFinal(&inner, digest, &digestlen); - - EVP_DigestUpdate(&outer, digest, digestlen); - } - - digestlen = sizeof digest; - EVP_DigestFinal(&outer, digest, &digestlen); - - printf("%s(%zu) = ", name, max); - printhex(digest, (size_t) digestlen); - printf("\n"); -} - -int main(void) -{ - emit_length_test("SHA1", EVP_sha1(), MAX_LENGTH); - emit_length_test("SHA224", EVP_sha224(), MAX_LENGTH); - emit_length_test("SHA256", EVP_sha256(), MAX_LENGTH); - emit_length_test("SHA384", EVP_sha384(), MAX_LENGTH); - emit_length_test("SHA512", EVP_sha512(), MAX_LENGTH); - return 0; -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/extra_vecs/python-hash.py b/debian/vendor-h2o/deps/picotls/deps/cifra/extra_vecs/python-hash.py deleted file mode 100644 index 90aa248..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/extra_vecs/python-hash.py +++ /dev/null @@ -1,38 +0,0 @@ -#!/usr/bin/python2 - -# -# see openssl-hash for details of what this is computing -# you'll need python-sha3 from https://github.com/bjornedstrom/python-sha3 -# - -import hashlib -import sha3 - -# check sha3 at least works; pysha3 *DOES NOT* (it is keccak, not sha3) -assert '3a985da74fe225b2045c172d6bd390bd855f086e3e9d525b46bfe24511431532' == hashlib.sha3_256('abc').hexdigest() - -def hh(x): - return ''.join(['\\x' + x[y:y+2] for y in range(0, len(x), 2)]) - -def len_test(name, H, max): - outer = H() - - for n in range(max): - inner = H() - inner.update(chr(n & 0xff) * n) - outer.update(inner.digest()) - - result = outer.hexdigest() - print '%s(%d) = %s or %s' % (name, max, result, hh(result)) - -if __name__ == '__main__': - MAX = 1024 - len_test('SHA1', hashlib.sha1, MAX) - len_test('SHA224', hashlib.sha224, MAX) - len_test('SHA256', hashlib.sha256, MAX) - len_test('SHA384', hashlib.sha384, MAX) - len_test('SHA512', hashlib.sha512, MAX) - len_test('SHA3-224', hashlib.sha3_224, MAX) - len_test('SHA3-256', hashlib.sha3_256, MAX) - len_test('SHA3-384', hashlib.sha3_384, MAX) - len_test('SHA3-512', hashlib.sha3_512, MAX) diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/Makefile b/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/Makefile deleted file mode 100644 index ccbda7e..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/Makefile +++ /dev/null @@ -1,17 +0,0 @@ -CFLAGS += -g -O0 -std=gnu99 -fPIC -Wall -Wextra -Werror -Wno-unused-parameter -CPPFLAGS += -I../src -I../../bignum/out -I../../shitlisp/out - -all: cifra.so - -SOURCES = aes.o sha256.o sha512.o chash.o hmac.o pbkdf2.o modes.o eax.o \ - blockwise.o cmac.o salsa20.o chacha20.o curve25519.o - -cifra.so: $(addprefix ../src/, $(SOURCES)) sl-cifra.o - $(CC) $(CPPFLAGS) $(CFLAGS) -o $@ $^ -shared - -clean: - rm -f *.o *.pyc $(TARGETS) *.gcov *.gcda *.gcno - -test: $(wildcard test-*.sl) cifra.so - ../../shitlisp/out/shitlisp --mod=./cifra.so $(wildcard test-*.sl) - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/sl-cifra.c b/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/sl-cifra.c deleted file mode 100644 index 6d7b944..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/sl-cifra.c +++ /dev/null @@ -1,206 +0,0 @@ -#include "handy.h" -#include "dstr.h" -#include "shitlisp.h" -#include "aes.h" -#include "sha2.h" -#include "hmac.h" -#include "pbkdf2.h" - -#include <assert.h> - -static sl_value * aes_block_fn(sl_value *self, sl_value *args, sl_symboltab *tab, - void (*blockfn)(const cf_aes_context *ctx, - const uint8_t *in, - uint8_t *out)) -{ - sl_iter it = sl_iter_start(args); - sl_value *key = sl_iter_convert(&it, sl_preprocess_eval, sl_assert_bytes, tab); - sl_value *block = sl_iter_convert(&it, sl_preprocess_eval, sl_assert_bytes, tab); - - sl_value *ret = NULL; - - if (!key || !block || - (key->u.bytes.len != 16 && key->u.bytes.len != 24 && key->u.bytes.len != 32) || - block->u.bytes.len != AES_BLOCKSZ) - { - ret = sl_get_nil(); - goto x_err; - } - - cf_aes_context ctx; - cf_aes_init(&ctx, key->u.bytes.buf, key->u.bytes.len); - uint8_t blockout[AES_BLOCKSZ]; - blockfn(&ctx, block->u.bytes.buf, blockout); - ret = sl_new_bytes(blockout, AES_BLOCKSZ); - cf_aes_finish(&ctx); - -x_err: - sl_decref(key); - sl_decref(block); - return ret; -} - -static sl_value * aes_block_encrypt(sl_value *self, sl_value *args, sl_symboltab *tab) -{ - return aes_block_fn(self, args, tab, cf_aes_encrypt); -} - -static sl_value * aes_block_decrypt(sl_value *self, sl_value *args, sl_symboltab *tab) -{ - return aes_block_fn(self, args, tab, cf_aes_decrypt); -} - -/* Hashing */ -static sl_value * hash_fn(sl_value *self, sl_value *args, sl_symboltab *tab, const cf_chash *h) -{ - sl_iter it = sl_iter_start(args); - sl_value *msg = sl_iter_convert(&it, sl_preprocess_eval, sl_assert_bytes, tab); - - if (!msg) - return sl_get_nil(); - - cf_chash_ctx ctx; - assert(h->ctxsz <= CF_CHASH_MAXCTX); - h->init(&ctx); - h->update(&ctx, msg->u.bytes.buf, msg->u.bytes.len); - sl_decref(msg); - - uint8_t result[CF_MAXHASH]; - assert(h->hashsz <= CF_MAXHASH); - h->digest(&ctx, result); - - return sl_new_bytes(result, h->hashsz); -} - -static sl_value * sha224(sl_value *self, sl_value *args, sl_symboltab *tab) -{ - return hash_fn(self, args, tab, &cf_sha224); -} - -static sl_value * sha256(sl_value *self, sl_value *args, sl_symboltab *tab) -{ - return hash_fn(self, args, tab, &cf_sha256); -} - -static sl_value * sha384(sl_value *self, sl_value *args, sl_symboltab *tab) -{ - return hash_fn(self, args, tab, &cf_sha384); -} - -static sl_value * sha512(sl_value *self, sl_value *args, sl_symboltab *tab) -{ - return hash_fn(self, args, tab, &cf_sha512); -} - -/* HMAC */ -static sl_value * hmac_fn(sl_value *self, sl_value *args, sl_symboltab *tab, const cf_chash *h) -{ - sl_iter it = sl_iter_start(args); - sl_value *key = sl_iter_convert(&it, sl_preprocess_eval, sl_assert_bytes, tab); - sl_value *msg = sl_iter_convert(&it, sl_preprocess_eval, sl_assert_bytes, tab); - - if (!key || !msg) - { - sl_decref(key); - sl_decref(msg); - return sl_get_nil(); - } - - uint8_t result[CF_MAXHASH]; - cf_hmac(key->u.bytes.buf, key->u.bytes.len, - msg->u.bytes.buf, msg->u.bytes.len, - result, - h); - - sl_decref(key); - sl_decref(msg); - return sl_new_bytes(result, h->hashsz); -} - -static sl_value * hmac_sha224(sl_value *self, sl_value *args, sl_symboltab *tab) -{ return hmac_fn(self, args, tab, &cf_sha224); } - -static sl_value * hmac_sha256(sl_value *self, sl_value *args, sl_symboltab *tab) -{ return hmac_fn(self, args, tab, &cf_sha256); } - -static sl_value * hmac_sha384(sl_value *self, sl_value *args, sl_symboltab *tab) -{ return hmac_fn(self, args, tab, &cf_sha384); } - -static sl_value * hmac_sha512(sl_value *self, sl_value *args, sl_symboltab *tab) -{ return hmac_fn(self, args, tab, &cf_sha512); } - - -/* PBKDF2 */ -static sl_value * do_pbkdf2(const cf_chash *h, sl_value *pw, sl_value *salt, - uint32_t iterations, uint32_t outlen) -{ - dstr out; - dstr_init(&out); - if (dstr_expand(&out, outlen)) - return NULL; - - cf_pbkdf2_hmac(pw->u.bytes.buf, pw->u.bytes.len, - salt->u.bytes.buf, salt->u.bytes.len, - iterations, - (uint8_t *) out.start, outlen, - h); - - sl_value *ret = sl_new_bytes((uint8_t *) out.start, outlen); - dstr_free(&out); - return ret; -} - -static sl_value * pbkdf2_fn(sl_value *self, sl_value *args, sl_symboltab *tab, const cf_chash *h) -{ - sl_iter it = sl_iter_start(args); - sl_value *pw = sl_iter_convert(&it, sl_preprocess_eval, sl_assert_bytes, tab); - sl_value *salt = sl_iter_convert(&it, sl_preprocess_eval, sl_assert_bytes, tab); - sl_value *iterations = sl_iter_convert(&it, sl_preprocess_eval, sl_assert_integer, tab); - sl_value *outlen = sl_iter_convert(&it, sl_preprocess_eval, sl_assert_integer, tab); - - sl_value *ret; - - if (!pw || !salt || !iterations || !outlen) - ret = sl_get_nil(); - else - { - assert(bignum_len_words(&iterations->u.integer.bn) == 1); - assert(bignum_len_words(&outlen->u.integer.bn) == 1); - ret = do_pbkdf2(h, pw, salt, - iterations->u.integer.bn.v[0], - outlen->u.integer.bn.v[0]); - } - - sl_decref(pw); - sl_decref(salt); - sl_decref(iterations); - sl_decref(outlen); - return ret; -} - -static sl_value * pbkdf2_sha224(sl_value *self, sl_value *args, sl_symboltab *tab) -{ - return pbkdf2_fn(self, args, tab, &cf_sha224); -} - -static sl_value * pbkdf2_sha256(sl_value *self, sl_value *args, sl_symboltab *tab) -{ - return pbkdf2_fn(self, args, tab, &cf_sha256); -} - -int SL_MODULE_ENTRY(sl_symboltab *tab) -{ - ER(sl_symboltab_add_name_native(tab, "aes-encrypt", aes_block_encrypt)); - ER(sl_symboltab_add_name_native(tab, "aes-decrypt", aes_block_decrypt)); - ER(sl_symboltab_add_name_native(tab, "sha224", sha224)); - ER(sl_symboltab_add_name_native(tab, "sha256", sha256)); - ER(sl_symboltab_add_name_native(tab, "sha384", sha384)); - ER(sl_symboltab_add_name_native(tab, "sha512", sha512)); - ER(sl_symboltab_add_name_native(tab, "hmac-sha224", hmac_sha224)); - ER(sl_symboltab_add_name_native(tab, "hmac-sha256", hmac_sha256)); - ER(sl_symboltab_add_name_native(tab, "hmac-sha384", hmac_sha384)); - ER(sl_symboltab_add_name_native(tab, "hmac-sha512", hmac_sha512)); - ER(sl_symboltab_add_name_native(tab, "pbkdf2-sha224", pbkdf2_sha224)); - ER(sl_symboltab_add_name_native(tab, "pbkdf2-sha256", pbkdf2_sha256)); - return 0; -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-aes.sl b/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-aes.sl deleted file mode 100644 index 5535c5d..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-aes.sl +++ /dev/null @@ -1,91 +0,0 @@ -(def check-aes (key pt ct) - (+ - (assert (= - ct - (aes-encrypt key pt))) - (assert (= - pt - (aes-decrypt key ct))) - ) -) - -(check-aes - [000102030405060708090a0b0c0d0e0f] - [00112233445566778899aabbccddeeff] - [69c4e0d86a7b0430d8cdb78070b4c55a] -) -(check-aes - [000102030405060708090a0b0c0d0e0f1011121314151617] - [00112233445566778899aabbccddeeff] - [dda97ca4864cdfe06eaf70a0ec0d7191] -) -(check-aes - [000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f] - [00112233445566778899aabbccddeeff] - [8ea2b7ca516745bfeafc49904b496089] -) - -(check-aes - [2b7e151628aed2a6abf7158809cf4f3c] - [6bc1bee22e409f96e93d7e117393172a] - [3ad77bb40d7a3660a89ecaf32466ef97] -) -(check-aes - [2b7e151628aed2a6abf7158809cf4f3c] - [ae2d8a571e03ac9c9eb76fac45af8e51] - [f5d3d58503b9699de785895a96fdbaaf] -) -(check-aes - [2b7e151628aed2a6abf7158809cf4f3c] - [30c81c46a35ce411e5fbc1191a0a52ef] - [43b1cd7f598ece23881b00e3ed030688] -) -(check-aes - [2b7e151628aed2a6abf7158809cf4f3c] - [f69f2445df4f9b17ad2b417be66c3710] - [7b0c785e27e8ad3f8223207104725dd4] -) - -(check-aes - [8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b] - [6bc1bee22e409f96e93d7e117393172a] - [bd334f1d6e45f25ff712a214571fa5cc] -) -(check-aes - [8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b] - [ae2d8a571e03ac9c9eb76fac45af8e51] - [974104846d0ad3ad7734ecb3ecee4eef] -) -(check-aes - [8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b] - [30c81c46a35ce411e5fbc1191a0a52ef] - [ef7afd2270e2e60adce0ba2face6444e] -) -(check-aes - [8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b] - [f69f2445df4f9b17ad2b417be66c3710] - [9a4b41ba738d6c72fb16691603c18e0e] -) - -(check-aes - [603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4] - [6bc1bee22e409f96e93d7e117393172a] - [f3eed1bdb5d2a03c064b5a7e3db181f8] -) -(check-aes - [603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4] - [ae2d8a571e03ac9c9eb76fac45af8e51] - [591ccb10d410ed26dc5ba74a31362870] -) -(check-aes - [603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4] - [30c81c46a35ce411e5fbc1191a0a52ef] - [b6ed21b99ca6f4f9f153e7b1beafed1d] -) -(check-aes - [603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4] - [f69f2445df4f9b17ad2b417be66c3710] - [23304b7a39f9f3ff067d8d8f9e24ecc7] -) - -(puts success) diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-pbkdf2.sl b/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-pbkdf2.sl deleted file mode 100644 index b87f397..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-pbkdf2.sl +++ /dev/null @@ -1,36 +0,0 @@ -(assert (= - (pbkdf2-sha256 (bytes "password") (bytes "salt") 1 32) - [120fb6cffcf8b32c43e7225256c4f837a86548c92ccc35480805987cb70be17b]) -) - -(assert (= - (pbkdf2-sha256 (bytes "password") (bytes "salt") 2 32) - [ae4d0c95af6b46d32d0adff928f06dd02a303f8ef3c251dfd6e2d85a95474c43]) -) - -(assert (= - (pbkdf2-sha256 (bytes "password") (bytes "salt") 4096 32) - [c5e478d59288c841aa530db6845c4c8d962893a001ce4e11a4963873aa98134a]) -) - -(assert (= - (pbkdf2-sha256 (bytes "passwordPASSWORDpassword") (bytes "saltSALTsaltSALTsaltSALTsaltSALTsalt") 4096 40) - [348c89dbcbd32b2f32d814b8116e84cf2b17347ebc1800181c4e2a1fb8dd53e1c635518c7dac47e9]) -) - -(assert (= - (pbkdf2-sha256 [] (bytes "salt") 1024 32) - [9e83f279c040f2a11aa4a02b24c418f2d3cb39560c9627fa4f47e3bcc2897c3d]) -) - -(assert (= - (pbkdf2-sha256 (bytes "password") [] 1024 32) - [ea5808411eb0c7e830deab55096cee582761e22a9bc034e3ece925225b07bf46]) -) - -(assert (= - (pbkdf2-sha256 [7061737300776f7264] [7361006c74] 4096 16) - [89b69d0516f829893c696226650a8687]) -) - -(puts success) diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-sha224.sl b/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-sha224.sl deleted file mode 100644 index 5de9e15..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-sha224.sl +++ /dev/null @@ -1,41 +0,0 @@ -(assert (= - (sha224 (bytes "abc")) - [23097d22 3405d822 8642a477 bda255b3 2aadbce4 bda0b3f7 e36c9da7]) -) - -(assert (= - (sha224 []) - [d14a028c 2a3a2bc9 476102bb 288234c4 15a2b01f 828ea62a c5b3e42f]) -) - -(assert (= - (hmac-sha224 (* [0b] 20) (bytes "Hi There")) - [896fb1128abbdf196832107cd49df33f47b4b1169912ba4f53684b22]) -) - -(assert (= - (hmac-sha224 (bytes "Jefe") (bytes "what do ya want for nothing?")) - [a30e01098bc6dbbf45690f3a7e9e6d0f8bbea2a39e6148008fd05e44]) -) - -(assert (= - (hmac-sha224 (* [aa] 20) (* [dd] 50)) - [7fb3cb3588c6c1f6ffa9694d7d6ad2649365b0c1f65d69d1ec8333ea]) -) - -(assert (= - (hmac-sha224 [0102030405060708090a0b0c0d0e0f10111213141516171819] (* [cd] 50)) - [6c11506874013cac6a2abc1bb382627cec6a90d86efc012de7afec5a]) -) - -(assert (= - (hmac-sha224 (* [aa] 131) (bytes "Test Using Larger Than Block-Size Key - Hash Key First")) - [95e9a0db962095adaebe9b2d6f0dbce2d499f112f2d2b7273fa6870e]) -) - -(assert (= - (hmac-sha224 (* [aa] 131) (bytes "This is a test using a larger than block-size key and a larger than block-size data. The key needs to be hashed before being used by the HMAC algorithm.")) - [3a854166ac5d9f023f54d517d0b39dbd946770db9c2b95c9f6f565d1]) -) - -(puts success) diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-sha256.sl b/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-sha256.sl deleted file mode 100644 index 83c0457..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-sha256.sl +++ /dev/null @@ -1,62 +0,0 @@ -(assert (= - (sha256 (bytes "abc")) - [ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad]) -) - -(assert (= - (sha256 (bytes "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq")) - [248d6a61d20638b8e5c026930c3e6039a33ce45964ff2167f6ecedd419db06c1]) -) - -(assert (= - (sha256 (* (bytes "a") 1000000)) - [cdc76e5c9914fb9281a1c7e284d73e67f1809a48a497200e046d39ccc7112cd0]) -) - -(assert (= - (sha256 (bytes "The quick brown fox jumps over the lazy dog")) - [d7a8fbb307d7809469ca9abcb0082e4f8d5651e46d3cdb762d02d0bf37c9e592]) -) - -(assert (= - (sha256 (bytes "The quick brown fox jumps over the lazy cog")) - [e4c4d8f3bf76b692de791a173e05321150f7a345b46484fe427f6acc7ecc81be]) -) - -(assert (= - (sha256 []) - [e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855]) -) - -(assert (= - (hmac-sha256 (* [0b] 20) (bytes "Hi There")) - [b0344c61d8db38535ca8afceaf0bf12b881dc200c9833da726e9376c2e32cff7]) -) - -(assert (= - (hmac-sha256 (bytes "Jefe") (bytes "what do ya want for nothing?")) - [5bdcc146bf60754e6a042426089575c75a003f089d2739839dec58b964ec3843]) -) - -(assert (= - (hmac-sha256 (* [aa] 20) (* [dd] 50)) - [773ea91e36800e46854db8ebd09181a72959098b3ef8c122d9635514ced565fe]) -) - -(assert (= - (hmac-sha256 [0102030405060708090a0b0c0d0e0f10111213141516171819] (* [cd] 50)) - [82558a389a443c0ea4cc819899f2083a85f0faa3e578f8077a2e3ff46729665b]) -) - -(assert (= - (hmac-sha256 (* [aa] 131) (bytes "Test Using Larger Than Block-Size Key - Hash Key First")) - [60e431591ee0b67f0d8a26aacbf5b77f8e0bc6213728c5140546040f0ee37f54]) -) - -(assert (= - (hmac-sha256 (* [aa] 131) (bytes "This is a test using a larger than block-size key and a larger than block-size data. The key needs to be hashed before being used by the HMAC algorithm.")) - [9b09ffa71b942fcb27635fbcd5b0e944bfdc63644f0713938a7f51535c3a35e2]) -) - - -(puts success) diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-sha384.sl b/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-sha384.sl deleted file mode 100644 index 33a00ee..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-sha384.sl +++ /dev/null @@ -1,67 +0,0 @@ -(assert (= - (sha384 (bytes "abc")) - [cb00753f45a35e8b b5a03d699ac65007 272c32ab0eded163 1a8b605a43ff5bed 8086072ba1e7cc23 58baeca134c825a7]) -) - -(assert (= - (sha384 (bytes "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq")) - [3391fdddfc8dc739 3707a65b1b470939 7cf8b1d162af05ab fe8f450de5f36bc6 b0455a8520bc4e6f 5fe95b1fe3c8452b]) -) - -(assert (= - (sha384 (bytes "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu")) - [09330c33f71147e8 3d192fc782cd1b47 53111b173b3b05d2 2fa08086e3b0f712 fcc7c71a557e2db9 66c3e9fa91746039]) -) - -(assert (= - (sha384 (* (bytes "a") 1000000)) - [9d0e1809716474cb 086e834e310a4a1c ed149e9c00f24852 7972cec5704c2a5b 07b8b3dc38ecc4eb ae97ddd87f3d8985]) -) - -(assert (= - (sha384 (bytes "The quick brown fox jumps over the lazy dog")) - [ca737f1014a48f4c0b6dd43cb177b0afd9e5169367544c494011e3317dbf9a509cb1e5dc1e85a941bbee3d7f2afbc9b1]) -) - -(assert (= - (sha384 (bytes "The quick brown fox jumps over the lazy cog")) - [098cea620b0978caa5f0befba6ddcf22764bea977e1c70b3483edfdf1de25f4b40d6cea3cadf00f809d422feb1f0161b]) -) - -(assert (= - (sha384 []) - [38b060a751ac9638 4cd9327eb1b1e36a 21fdb71114be0743 4c0cc7bf63f6e1da 274edebfe76f65fb d51ad2f14898b95b]) -) - -(assert (= - (hmac-sha384 (* [0b] 20) (bytes "Hi There")) - [afd03944d84895626b0825f4ab46907f15f9dadbe4101ec682aa034c7cebc59cfaea9ea9076ede7f4af152e8b2fa9cb6]) -) - -(assert (= - (hmac-sha384 (bytes "Jefe") (bytes "what do ya want for nothing?")) - [af45d2e376484031617f78d2b58a6b1b9c7ef464f5a01b47e42ec3736322445e8e2240ca5e69e2c78b3239ecfab21649]) -) - -(assert (= - (hmac-sha384 (* [aa] 20) (* [dd] 50)) - [88062608d3e6ad8a0aa2ace014c8a86f0aa635d947ac9febe83ef4e55966144b2a5ab39dc13814b94e3ab6e101a34f27]) -) - -(assert (= - (hmac-sha384 [0102030405060708090a0b0c0d0e0f10111213141516171819] (* [cd] 50)) - [3e8a69b7783c25851933ab6290af6ca77a9981480850009cc5577c6e1f573b4e6801dd23c4a7d679ccf8a386c674cffb]) -) - -(assert (= - (hmac-sha384 (* [aa] 131) (bytes "Test Using Larger Than Block-Size Key - Hash Key First")) - [4ece084485813e9088d2c63a041bc5b44f9ef1012a2b588f3cd11f05033ac4c60c2ef6ab4030fe8296248df163f44952]) -) - -(assert (= - (hmac-sha384 (* [aa] 131) (bytes "This is a test using a larger than block-size key and a larger than block-size data. The key needs to be hashed before being used by the HMAC algorithm.")) - [6617178e941f020d351e2f254e8fd32c602420feb0b8fb9adccebb82461e99c5a678cc31e799176d3860e6110c46523e]) -) - - -(puts success) diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-sha512.sl b/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-sha512.sl deleted file mode 100644 index 4201019..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/shitlisp/test-sha512.sl +++ /dev/null @@ -1,67 +0,0 @@ -(assert (= - (sha512 (bytes "abc")) - [ddaf35a193617aba cc417349ae204131 12e6fa4e89a97ea2 0a9eeee64b55d39a 2192992a274fc1a8 36ba3c23a3feebbd 454d4423643ce80e 2a9ac94fa54ca49f]) -) - -(assert (= - (sha512 (bytes "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq")) - [204a8fc6dda82f0a 0ced7beb8e08a416 57c16ef468b228a8 279be331a703c335 96fd15c13b1b07f9 aa1d3bea57789ca0 31ad85c7a71dd703 54ec631238ca3445]) -) - -(assert (= - (sha512 (bytes "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu")) - [8e959b75dae313da 8cf4f72814fc143f 8f7779c6eb9f7fa1 7299aeadb6889018 501d289e4900f7e4 331b99dec4b5433a c7d329eeb6dd2654 5e96e55b874be909]) -) - -(assert (= - (sha512 (* (bytes "a") 1000000)) - [e718483d0ce76964 4e2e42c7bc15b463 8e1f98b13b204428 5632a803afa973eb de0ff244877ea60a 4cb0432ce577c31b eb009c5c2c49aa2e 4eadb217ad8cc09b]) -) - -(assert (= - (sha512 (bytes "The quick brown fox jumps over the lazy dog")) - [07e547d9586f6a73f73fbac0435ed76951218fb7d0c8d788a309d785436bbb642e93a252a954f23912547d1e8a3b5ed6e1bfd7097821233fa0538f3db854fee6]) -) - -(assert (= - (sha512 (bytes "The quick brown fox jumps over the lazy cog")) - [3eeee1d0 e11733ef 152a6c29 503b3ae2 0c4f1f3c da4cb26f 1bc1a41f 91c7fe4a b3bd8649 4049e201 c4bd5155 f31ecb7a 3c860684 3c4cc8df cab7da11 c8ae5045]) -) - -(assert (= - (sha512 []) - [cf83e1357eefb8bd f1542850d66d8007 d620e4050b5715dc 83f4a921d36ce9ce 47d0d13c5d85f2b0 ff8318d2877eec2f 63b931bd47417a81 a538327af927da3e]) -) - -(assert (= - (hmac-sha512 (* [0b] 20) (bytes "Hi There")) - [87aa7cdea5ef619d4ff0b4241a1d6cb02379f4e2ce4ec2787ad0b30545e17cdedaa833b7d6b8a702038b274eaea3f4e4be9d914eeb61f1702e696c203a126854]) -) - -(assert (= - (hmac-sha512 (bytes "Jefe") (bytes "what do ya want for nothing?")) - [164b7a7bfcf819e2e395fbe73b56e0a387bd64222e831fd610270cd7ea2505549758bf75c05a994a6d034f65f8f0e6fdcaeab1a34d4a6b4b636e070a38bce737]) -) - -(assert (= - (hmac-sha512 (* [aa] 20) (* [dd] 50)) - [fa73b0089d56a284efb0f0756c890be9b1b5dbdd8ee81a3655f83e33b2279d39bf3e848279a722c806b485a47e67c807b946a337bee8942674278859e13292fb]) -) - -(assert (= - (hmac-sha512 [0102030405060708090a0b0c0d0e0f10111213141516171819] (* [cd] 50)) - [b0ba465637458c6990e5a8c5f61d4af7e576d97ff94b872de76f8050361ee3dba91ca5c11aa25eb4d679275cc5788063a5f19741120c4f2de2adebeb10a298dd]) -) - -(assert (= - (hmac-sha512 (* [aa] 131) (bytes "Test Using Larger Than Block-Size Key - Hash Key First")) - [80b24263c7c1a3ebb71493c1dd7be8b49b46d1f41b4aeec1121b013783f8f3526b56d037e05f2598bd0fd2215d6a1e5295e64f73f63f0aec8b915a985d786598]) -) - -(assert (= - (hmac-sha512 (* [aa] 131) (bytes "This is a test using a larger than block-size key and a larger than block-size data. The key needs to be hashed before being used by the HMAC algorithm.")) - [e37b6a775dc87dbaa4dfa9f96e5e3ffddebd71f8867289865df5a32d20cdc944b6022cac3c4982b10d5eeb55c3e4de15134676fb6de0446065c97440fa8c6a58]) -) - - -(puts success) diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/Makefile b/debian/vendor-h2o/deps/picotls/deps/cifra/src/Makefile deleted file mode 100644 index 451548d..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/Makefile +++ /dev/null @@ -1,54 +0,0 @@ -CFLAGS += -g -O0 -std=gnu99 -fPIC -Wall -Wextra -Werror \ - -Wno-unused-parameter -Wno-missing-field-initializers -CPPFLAGS += -I./ext - -ifdef WITH_ASAN - LDFLAGS += -fsanitize=address - CFLAGS += -fsanitize=address -endif - -ifdef WITH_COVERAGE - LDFLAGS += -coverage - CFLAGS += -coverage -endif - -ifdef WITH_VALGRIND - VALGRIND := valgrind --leak-check=full --show-reachable=yes --track-origins=yes - TEST_OPT := --no-exec -endif - -TARGETS = testaes testmodes testsha1 testsha2 testsha3 testsalsa20 \ - testcurve25519 testpoly1305 testnorx testchacha20poly1305 \ - testdrbg -all: $(TARGETS) - -SOURCES = aes.o sha256.o sha512.o chash.o hmac.o pbkdf2.o modes.o eax.o \ - gf128.o blockwise.o cmac.o salsa20.o chacha20.o curve25519.o \ - gcm.o cbcmac.o ccm.o sha3.o sha1.o poly1305.o \ - norx.o chacha20poly1305.o drbg.o ocb.o - -testaes: $(SOURCES) testaes.o -testmodes: $(SOURCES) testmodes.o -testsha1: $(SOURCES) testsha1.o -testsha2: $(SOURCES) testsha2.o -testsha3: $(SOURCES) testsha3.o -testsalsa20: $(SOURCES) testsalsa20.o -testcurve25519: $(SOURCES) testcurve25519.o -testpoly1305: $(SOURCES) testpoly1305.o -testnorx: $(SOURCES) testnorx.o -testchacha20poly1305: $(SOURCES) testchacha20poly1305.o -testdrbg: $(SOURCES) testdrbg.o - -clean: - rm -f *.o *.pyc $(TARGETS) *.gcov *.gcda *.gcno - -test: $(TARGETS) - for x in $(TARGETS) ; do \ - echo "Running $$x" ; \ - $(VALGRIND) ./$$x $(TEST_OPT) ; \ - done - -cover: test - gcov *.c - echo 'Lines with missing coverage:' - grep '#####' *.gcov | grep -vE '(cutest|testutil).h.gcov' diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/aes.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/aes.c deleted file mode 100644 index 545588e..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/aes.c +++ /dev/null @@ -1,419 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include <string.h> -#include <stdlib.h> - -#include "cf_config.h" -#include "aes.h" -#include "handy.h" -#include "bitops.h" -#include "tassert.h" - -static const uint8_t S[256] = -{ - 0x63, 0x7c, 0x77, 0x7b, 0xf2, 0x6b, 0x6f, 0xc5, 0x30, 0x01, 0x67, 0x2b, 0xfe, - 0xd7, 0xab, 0x76, 0xca, 0x82, 0xc9, 0x7d, 0xfa, 0x59, 0x47, 0xf0, 0xad, 0xd4, - 0xa2, 0xaf, 0x9c, 0xa4, 0x72, 0xc0, 0xb7, 0xfd, 0x93, 0x26, 0x36, 0x3f, 0xf7, - 0xcc, 0x34, 0xa5, 0xe5, 0xf1, 0x71, 0xd8, 0x31, 0x15, 0x04, 0xc7, 0x23, 0xc3, - 0x18, 0x96, 0x05, 0x9a, 0x07, 0x12, 0x80, 0xe2, 0xeb, 0x27, 0xb2, 0x75, 0x09, - 0x83, 0x2c, 0x1a, 0x1b, 0x6e, 0x5a, 0xa0, 0x52, 0x3b, 0xd6, 0xb3, 0x29, 0xe3, - 0x2f, 0x84, 0x53, 0xd1, 0x00, 0xed, 0x20, 0xfc, 0xb1, 0x5b, 0x6a, 0xcb, 0xbe, - 0x39, 0x4a, 0x4c, 0x58, 0xcf, 0xd0, 0xef, 0xaa, 0xfb, 0x43, 0x4d, 0x33, 0x85, - 0x45, 0xf9, 0x02, 0x7f, 0x50, 0x3c, 0x9f, 0xa8, 0x51, 0xa3, 0x40, 0x8f, 0x92, - 0x9d, 0x38, 0xf5, 0xbc, 0xb6, 0xda, 0x21, 0x10, 0xff, 0xf3, 0xd2, 0xcd, 0x0c, - 0x13, 0xec, 0x5f, 0x97, 0x44, 0x17, 0xc4, 0xa7, 0x7e, 0x3d, 0x64, 0x5d, 0x19, - 0x73, 0x60, 0x81, 0x4f, 0xdc, 0x22, 0x2a, 0x90, 0x88, 0x46, 0xee, 0xb8, 0x14, - 0xde, 0x5e, 0x0b, 0xdb, 0xe0, 0x32, 0x3a, 0x0a, 0x49, 0x06, 0x24, 0x5c, 0xc2, - 0xd3, 0xac, 0x62, 0x91, 0x95, 0xe4, 0x79, 0xe7, 0xc8, 0x37, 0x6d, 0x8d, 0xd5, - 0x4e, 0xa9, 0x6c, 0x56, 0xf4, 0xea, 0x65, 0x7a, 0xae, 0x08, 0xba, 0x78, 0x25, - 0x2e, 0x1c, 0xa6, 0xb4, 0xc6, 0xe8, 0xdd, 0x74, 0x1f, 0x4b, 0xbd, 0x8b, 0x8a, - 0x70, 0x3e, 0xb5, 0x66, 0x48, 0x03, 0xf6, 0x0e, 0x61, 0x35, 0x57, 0xb9, 0x86, - 0xc1, 0x1d, 0x9e, 0xe1, 0xf8, 0x98, 0x11, 0x69, 0xd9, 0x8e, 0x94, 0x9b, 0x1e, - 0x87, 0xe9, 0xce, 0x55, 0x28, 0xdf, 0x8c, 0xa1, 0x89, 0x0d, 0xbf, 0xe6, 0x42, - 0x68, 0x41, 0x99, 0x2d, 0x0f, 0xb0, 0x54, 0xbb, 0x16 -}; - -static const uint8_t Rcon[11] = -{ - 0x8d, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36 -}; - -#ifdef INLINE_FUNCS -static inline uint32_t word4(uint8_t b0, uint8_t b1, uint8_t b2, uint8_t b3) -{ - return b0 << 24 | b1 << 16 | b2 << 8 | b3; -} - -static inline uint8_t byte(uint32_t w, unsigned x) -{ - /* nb. bytes are numbered 0 (leftmost, top) - * to 3 (rightmost). */ - x = 3 - x; - return (w >> (x * 8)) & 0xff; -} - -static uint32_t round_constant(uint32_t i) -{ - return Rcon[i] << 24; -} - -static uint32_t rot_word(uint32_t w) -{ - /* Takes - * word [a0,a1,a2,a3] - * returns - * word [a1,a2,a3,a0] - * - */ - return rotl32(w, 8); -} -#endif - -#define word4(a, b, c, d) (((uint32_t)(a) << 24) | ((uint32_t)(b) << 16) | ((uint32_t)(c) << 8) | (d)) -#define byte(w, x) ((w >> ((3 - (x)) << 3)) & 0xff) -#define round_constant(i) ((uint32_t)(Rcon[i]) << 24) -#define rot_word(w) rotl32((w), 8) - -static uint32_t sub_word(uint32_t w, const uint8_t *sbox) -{ - uint8_t a = byte(w, 0), - b = byte(w, 1), - c = byte(w, 2), - d = byte(w, 3); -#if CF_CACHE_SIDE_CHANNEL_PROTECTION - select_u8x4(&a, &b, &c, &d, sbox, 256); -#else - a = sbox[a]; - b = sbox[b]; - c = sbox[c]; - d = sbox[d]; -#endif - return word4(a, b, c, d); -} - -static void aes_schedule(cf_aes_context *ctx, const uint8_t *key, size_t nkey) -{ - size_t i, - nb = AES_BLOCKSZ / 4, - nk = nkey / 4, - n = nb * (ctx->rounds + 1); - uint32_t *w = ctx->ks; - - /* First words are just the key. */ - for (i = 0; i < nk; i++) - { - w[i] = read32_be(key + i * 4); - } - - uint32_t i_div_nk = 1; - uint32_t i_mod_nk = 0; - - for (; i < n; i++, i_mod_nk++) - { - uint32_t temp = w[i - 1]; - - if (i_mod_nk == nk) - { - i_div_nk++; - i_mod_nk = 0; - } - - if (i_mod_nk == 0) - temp = sub_word(rot_word(temp), S) ^ round_constant(i_div_nk); - else if (nk > 6 && i_mod_nk == 4) - temp = sub_word(temp, S); - - w[i] = w[i - nk] ^ temp; - } -} - -void cf_aes_init(cf_aes_context *ctx, const uint8_t *key, size_t nkey) -{ - memset(ctx, 0, sizeof *ctx); - - switch (nkey) - { -#if CF_AES_MAXROUNDS >= AES128_ROUNDS - case 16: - ctx->rounds = AES128_ROUNDS; - aes_schedule(ctx, key, nkey); - break; -#endif - -#if CF_AES_MAXROUNDS >= AES192_ROUNDS - case 24: - ctx->rounds = AES192_ROUNDS; - aes_schedule(ctx, key, nkey); - break; -#endif - -#if CF_AES_MAXROUNDS >= AES256_ROUNDS - case 32: - ctx->rounds = AES256_ROUNDS; - aes_schedule(ctx, key, nkey); - break; -#endif - - default: - abort(); - } -} - -static void add_round_key(uint32_t state[4], const uint32_t rk[4]) -{ - state[0] ^= rk[0]; - state[1] ^= rk[1]; - state[2] ^= rk[2]; - state[3] ^= rk[3]; -} - -static void sub_block(uint32_t state[4]) -{ - state[0] = sub_word(state[0], S); - state[1] = sub_word(state[1], S); - state[2] = sub_word(state[2], S); - state[3] = sub_word(state[3], S); -} - -static void shift_rows(uint32_t state[4]) -{ - uint32_t u, v, x, y; - - u = word4(byte(state[0], 0), - byte(state[1], 1), - byte(state[2], 2), - byte(state[3], 3)); - - v = word4(byte(state[1], 0), - byte(state[2], 1), - byte(state[3], 2), - byte(state[0], 3)); - - x = word4(byte(state[2], 0), - byte(state[3], 1), - byte(state[0], 2), - byte(state[1], 3)); - - y = word4(byte(state[3], 0), - byte(state[0], 1), - byte(state[1], 2), - byte(state[2], 3)); - - state[0] = u; - state[1] = v; - state[2] = x; - state[3] = y; -} - -static uint32_t gf_poly_mul2(uint32_t x) -{ - return - ((x & 0x7f7f7f7f) << 1) ^ - (((x & 0x80808080) >> 7) * 0x1b); -} - -static uint32_t mix_column(uint32_t x) -{ - uint32_t x2 = gf_poly_mul2(x); - return x2 ^ rotr32(x ^ x2, 24) ^ rotr32(x, 16) ^ rotr32(x, 8); -} - -static void mix_columns(uint32_t state[4]) -{ - state[0] = mix_column(state[0]); - state[1] = mix_column(state[1]); - state[2] = mix_column(state[2]); - state[3] = mix_column(state[3]); -} - -void cf_aes_encrypt(const cf_aes_context *ctx, - const uint8_t in[AES_BLOCKSZ], - uint8_t out[AES_BLOCKSZ]) -{ - assert(ctx->rounds == AES128_ROUNDS || - ctx->rounds == AES192_ROUNDS || - ctx->rounds == AES256_ROUNDS); - - uint32_t state[4] = { - read32_be(in + 0), - read32_be(in + 4), - read32_be(in + 8), - read32_be(in + 12) - }; - - const uint32_t *round_keys = ctx->ks; - add_round_key(state, round_keys); - round_keys += 4; - - uint32_t round; - for (round = 1; round < ctx->rounds; round++) - { - sub_block(state); - shift_rows(state); - mix_columns(state); - add_round_key(state, round_keys); - round_keys += 4; - } - - sub_block(state); - shift_rows(state); - add_round_key(state, round_keys); - - write32_be(state[0], out + 0); - write32_be(state[1], out + 4); - write32_be(state[2], out + 8); - write32_be(state[3], out + 12); -} - -#if CF_AES_ENCRYPT_ONLY == 0 -static const uint8_t S_inv[256] = -{ - 0x52, 0x09, 0x6a, 0xd5, 0x30, 0x36, 0xa5, 0x38, 0xbf, 0x40, 0xa3, 0x9e, 0x81, - 0xf3, 0xd7, 0xfb, 0x7c, 0xe3, 0x39, 0x82, 0x9b, 0x2f, 0xff, 0x87, 0x34, 0x8e, - 0x43, 0x44, 0xc4, 0xde, 0xe9, 0xcb, 0x54, 0x7b, 0x94, 0x32, 0xa6, 0xc2, 0x23, - 0x3d, 0xee, 0x4c, 0x95, 0x0b, 0x42, 0xfa, 0xc3, 0x4e, 0x08, 0x2e, 0xa1, 0x66, - 0x28, 0xd9, 0x24, 0xb2, 0x76, 0x5b, 0xa2, 0x49, 0x6d, 0x8b, 0xd1, 0x25, 0x72, - 0xf8, 0xf6, 0x64, 0x86, 0x68, 0x98, 0x16, 0xd4, 0xa4, 0x5c, 0xcc, 0x5d, 0x65, - 0xb6, 0x92, 0x6c, 0x70, 0x48, 0x50, 0xfd, 0xed, 0xb9, 0xda, 0x5e, 0x15, 0x46, - 0x57, 0xa7, 0x8d, 0x9d, 0x84, 0x90, 0xd8, 0xab, 0x00, 0x8c, 0xbc, 0xd3, 0x0a, - 0xf7, 0xe4, 0x58, 0x05, 0xb8, 0xb3, 0x45, 0x06, 0xd0, 0x2c, 0x1e, 0x8f, 0xca, - 0x3f, 0x0f, 0x02, 0xc1, 0xaf, 0xbd, 0x03, 0x01, 0x13, 0x8a, 0x6b, 0x3a, 0x91, - 0x11, 0x41, 0x4f, 0x67, 0xdc, 0xea, 0x97, 0xf2, 0xcf, 0xce, 0xf0, 0xb4, 0xe6, - 0x73, 0x96, 0xac, 0x74, 0x22, 0xe7, 0xad, 0x35, 0x85, 0xe2, 0xf9, 0x37, 0xe8, - 0x1c, 0x75, 0xdf, 0x6e, 0x47, 0xf1, 0x1a, 0x71, 0x1d, 0x29, 0xc5, 0x89, 0x6f, - 0xb7, 0x62, 0x0e, 0xaa, 0x18, 0xbe, 0x1b, 0xfc, 0x56, 0x3e, 0x4b, 0xc6, 0xd2, - 0x79, 0x20, 0x9a, 0xdb, 0xc0, 0xfe, 0x78, 0xcd, 0x5a, 0xf4, 0x1f, 0xdd, 0xa8, - 0x33, 0x88, 0x07, 0xc7, 0x31, 0xb1, 0x12, 0x10, 0x59, 0x27, 0x80, 0xec, 0x5f, - 0x60, 0x51, 0x7f, 0xa9, 0x19, 0xb5, 0x4a, 0x0d, 0x2d, 0xe5, 0x7a, 0x9f, 0x93, - 0xc9, 0x9c, 0xef, 0xa0, 0xe0, 0x3b, 0x4d, 0xae, 0x2a, 0xf5, 0xb0, 0xc8, 0xeb, - 0xbb, 0x3c, 0x83, 0x53, 0x99, 0x61, 0x17, 0x2b, 0x04, 0x7e, 0xba, 0x77, 0xd6, - 0x26, 0xe1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0c, 0x7d -}; - -static void inv_sub_block(uint32_t state[4]) -{ - state[0] = sub_word(state[0], S_inv); - state[1] = sub_word(state[1], S_inv); - state[2] = sub_word(state[2], S_inv); - state[3] = sub_word(state[3], S_inv); -} - -static void inv_shift_rows(uint32_t state[4]) -{ - uint32_t u, v, x, y; - - u = word4(byte(state[0], 0), - byte(state[3], 1), - byte(state[2], 2), - byte(state[1], 3)); - - v = word4(byte(state[1], 0), - byte(state[0], 1), - byte(state[3], 2), - byte(state[2], 3)); - - x = word4(byte(state[2], 0), - byte(state[1], 1), - byte(state[0], 2), - byte(state[3], 3)); - - y = word4(byte(state[3], 0), - byte(state[2], 1), - byte(state[1], 2), - byte(state[0], 3)); - - state[0] = u; - state[1] = v; - state[2] = x; - state[3] = y; -} - -static uint32_t inv_mix_column(uint32_t x) -{ - uint32_t x2 = gf_poly_mul2(x), - x4 = gf_poly_mul2(x2), - x9 = x ^ gf_poly_mul2(x4), - x11 = x2 ^ x9, - x13 = x4 ^ x9; - - return x ^ x2 ^ x13 ^ rotr32(x11, 24) ^ rotr32(x13, 16) ^ rotr32(x9, 8); -} - -static void inv_mix_columns(uint32_t state[4]) -{ - state[0] = inv_mix_column(state[0]); - state[1] = inv_mix_column(state[1]); - state[2] = inv_mix_column(state[2]); - state[3] = inv_mix_column(state[3]); -} - -void cf_aes_decrypt(const cf_aes_context *ctx, - const uint8_t in[AES_BLOCKSZ], - uint8_t out[AES_BLOCKSZ]) -{ - assert(ctx->rounds == AES128_ROUNDS || - ctx->rounds == AES192_ROUNDS || - ctx->rounds == AES256_ROUNDS); - - uint32_t state[4] = { - read32_be(in + 0), - read32_be(in + 4), - read32_be(in + 8), - read32_be(in + 12) - }; - - const uint32_t *round_keys = &ctx->ks[ctx->rounds << 2]; - add_round_key(state, round_keys); - round_keys -= 4; - - uint32_t round; - for (round = ctx->rounds - 1; round != 0; round--) - { - inv_shift_rows(state); - inv_sub_block(state); - add_round_key(state, round_keys); - inv_mix_columns(state); - round_keys -= 4; - } - - inv_shift_rows(state); - inv_sub_block(state); - add_round_key(state, round_keys); - - write32_be(state[0], out + 0); - write32_be(state[1], out + 4); - write32_be(state[2], out + 8); - write32_be(state[3], out + 12); -} -#else -void cf_aes_decrypt(const cf_aes_context *ctx, - const uint8_t in[AES_BLOCKSZ], - uint8_t out[AES_BLOCKSZ]) -{ - abort(); -} -#endif - -void cf_aes_finish(cf_aes_context *ctx) -{ - mem_clean(ctx, sizeof *ctx); -} - -const cf_prp cf_aes = { - .blocksz = AES_BLOCKSZ, - .encrypt = (cf_prp_block) cf_aes_encrypt, - .decrypt = (cf_prp_block) cf_aes_decrypt -}; - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/aes.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/aes.h deleted file mode 100644 index 2ee7f46..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/aes.h +++ /dev/null @@ -1,152 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -/** - * The AES block cipher - * ==================== - * - * This is a small, simple implementation of AES. Key expansion is done - * first, filling in a :c:type:`cf_aes_context`. Then encryption and - * decryption can be performed as desired. - * - * Usually you don't want to use AES directly; you should use it via - * a :doc:`block cipher mode <modes>`. - */ - -#ifndef AES_H -#define AES_H - -#include <stddef.h> -#include <stdint.h> - -#include "prp.h" - -/* .. c:macro:: AES_BLOCKSZ - * AES has a 128-bit block size. This quantity is in bytes. - */ -#define AES_BLOCKSZ 16 - -/* --- Size configuration --- */ - -/* .. c:macro:: AES128_ROUNDS - * .. c:macro:: AES192_ROUNDS - * .. c:macro:: AES256_ROUNDS - * - * Round counts for different key sizes. - */ -#define AES128_ROUNDS 10 -#define AES192_ROUNDS 12 -#define AES256_ROUNDS 14 - -/* .. c:macro:: CF_AES_MAXROUNDS - * - * You can reduce the maximum number of rounds this implementation - * supports. This reduces the storage needed by :c:type:`cf_aes_context`. - * - * The default is :c:macro:`AES256_ROUNDS` and is good for all key - * sizes. - */ -#ifndef CF_AES_MAXROUNDS -# define CF_AES_MAXROUNDS AES256_ROUNDS -#endif - -/* .. c:macro:: CF_AES_ENCRYPT_ONLY - * - * Define this to 1 if you don't need to decrypt anything. - * This saves space. :c:func:`cf_aes_decrypt` calls `abort(3)`. - */ -#ifndef CF_AES_ENCRYPT_ONLY -# define CF_AES_ENCRYPT_ONLY 0 -#endif - -/* .. c:type:: cf_aes_context - * This type represents an expanded AES key. Create one - * using :c:func:`cf_aes_init`, make use of one using - * :c:func:`cf_aes_encrypt` or :c:func:`cf_aes_decrypt`. - * - * The contents of this structure are equivalent to the - * original key material. You should clean the - * contents of this structure with :c:func:`cf_aes_finish` - * when you're done. - * - * .. c:member:: cf_aes_context.rounds - * - * Number of rounds to use, set by :c:func:`cf_aes_init`. - * - * This depends on the original key size, and will be - * :c:macro:`AES128_ROUNDS`, :c:macro:`AES192_ROUNDS` or - * :c:macro:`AES256_ROUNDS`. - * - * .. c:member:: cf_aes_context.ks - * - * Expanded key material. Filled in by :c:func:`cf_aes_init`. - */ -typedef struct -{ - uint32_t rounds; - uint32_t ks[AES_BLOCKSZ / 4 * (CF_AES_MAXROUNDS + 1)]; -} cf_aes_context; - -/* .. c:function:: $DECL - * This function does AES key expansion. It destroys - * existing contents of :c:data:`ctx`. - * - * :param ctx: expanded key context, filled in by this function. - * :param key: pointer to key material, of :c:data:`nkey` bytes. - * :param nkey: length of key material. Must be `16`, `24` or `32`. - */ -extern void cf_aes_init(cf_aes_context *ctx, - const uint8_t *key, - size_t nkey); - -/* .. c:function:: $DECL - * Encrypts the given block, from :c:data:`in` to :c:data:`out`. - * These may alias. - * - * Fails at runtime if :c:data:`ctx` is invalid. - * - * :param ctx: expanded key context - * :param in: input block (read) - * :param out: output block (written) - */ -extern void cf_aes_encrypt(const cf_aes_context *ctx, - const uint8_t in[AES_BLOCKSZ], - uint8_t out[AES_BLOCKSZ]); - -/* .. c:function:: $DECL - * Decrypts the given block, from :c:data:`in` to :c:data:`out`. - * These may alias. - * - * Fails at runtime if :c:data:`ctx` is invalid. - * - * :param ctx: expanded key context - * :param in: input block (read) - * :param out: output block (written) - */ -extern void cf_aes_decrypt(const cf_aes_context *ctx, - const uint8_t in[AES_BLOCKSZ], - uint8_t out[AES_BLOCKSZ]); - -/* .. c:function:: $DECL - * Erase scheduled key material. - * - * Call this when you're done to erase the round keys. */ -extern void cf_aes_finish(cf_aes_context *ctx); - -/* .. c:var:: const cf_prp cf_aes - * Abstract interface to AES. See :c:type:`cf_prp` for - * more information. */ -extern const cf_prp cf_aes; - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/Makefile b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/Makefile deleted file mode 100644 index 7be9a53..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/Makefile +++ /dev/null @@ -1,184 +0,0 @@ -FUNCS = do_nothing stack_8w stack_64w \ - hashtest_sha256 hashtest_sha512 \ - hashtest_sha3_256 hashtest_sha3_512 \ - aes128block_test aes128sched_test \ - aes256block_test aes256sched_test \ - aes128gcm_test aes128eax_test \ - aes128ccm_test \ - salsa20_test chacha20_test \ - poly1305_test hmacsha256_test \ - curve25519_test \ - norx_test - -AEADS = aeadperf_aes128gcm \ - aeadperf_aes128ccm \ - aeadperf_aes128eax \ - aeadperf_aes256gcm \ - aeadperf_aes256ccm \ - aeadperf_aes256eax \ - aeadperf_norx \ - aeadperf_chacha20poly1305 -TESTS = testcurve25519 testaes testmodes testsalsa20 testsha1 testsha2 \ - testsha3 testpoly1305 testnorx testchacha20poly1305 testdrbg -ARCHS = stm32f0 stm32f1 stm32f3 efm32 qemucm3 - -all: $(patsubst %,%.stm32f0.bin,$(FUNCS) $(AEADS) $(TESTS)) \ - $(patsubst %,%.stm32f1.bin,$(FUNCS) $(AEADS) $(TESTS)) \ - $(patsubst %,%.stm32f3.bin,$(FUNCS) $(AEADS) $(TESTS)) \ - $(patsubst %,%.efm32.bin,$(FUNCS) $(AEADS) $(TESTS)) \ - $(patsubst %,%.qemucm3.bin,$(FUNCS) $(AEADS) $(TESTS)) - -%.stm32f0.elf: - arm-none-eabi-gcc $(CFLAGS) $(CFLAGS_$*) $(LDFLAGS) -T linkscript.stm32f0.ld -mcpu=cortex-m0 -DCORTEX_M0 -o $@ $^ -DTEST=$* -lgcc - -%.stm32f1.elf: - arm-none-eabi-gcc $(CFLAGS) $(CFLAGS_$*) $(LDFLAGS) -T linkscript.stm32f1.ld -mcpu=cortex-m3 -DCORTEX_M3 -o $@ $^ -DTEST=$* -lgcc - -%.stm32f3.elf: - arm-none-eabi-gcc $(CFLAGS) $(CFLAGS_$*) $(LDFLAGS) -T linkscript.stm32f3.ld -mcpu=cortex-m4 -DCORTEX_M4 -o $@ $^ -DTEST=$* -lgcc - -%.efm32.elf: - arm-none-eabi-gcc $(CFLAGS) $(CFLAGS_$*) $(LDFLAGS) -T linkscript.efm32.ld -mcpu=cortex-m0 -DCORTEX_M0 -o $@ $^ -DTEST=$* -lgcc - -%.qemucm3.elf: - arm-none-eabi-gcc $(CFLAGS) $(CFLAGS_$*) $(LDFLAGS) -T linkscript.qemucm3.ld -mcpu=cortex-m3 -DCORTEX_M3 -o $@ $^ -DTEST=$* -lgcc - -%.bin: %.elf - arm-none-eabi-objcopy -O binary $< $@ -.PRECIOUS: %.bin - -AES_OPTIONS = -DCF_AES_ENCRYPT_ONLY=1 -DCF_SIDE_CHANNEL_PROTECTION=0 -AES128_OPTIONS = -DCF_AES_MAXROUNDS=AES128_ROUNDS -AES256_OPTIONS = -DCF_AES_MAXROUNDS=AES256_ROUNDS - -AEADPERF_BRACKET = -DBRACKET_MODE=1 -DBRACKET_START=0 -DBRACKET_END=256 -DBRACKET_STEP=4 - -CFLAGS_aes128block_test = $(AES_OPTIONS) $(AES128_OPTIONS) -CFLAGS_aes128sched_test = $(AES_OPTIONS) $(AES128_OPTIONS) -CFLAGS_aes128gcm_test = $(AES_OPTIONS) $(AES128_OPTIONS) -CFLAGS_aes128eax_test = $(AES_OPTIONS) $(AES128_OPTIONS) -CFLAGS_aes128ccm_test = $(AES_OPTIONS) $(AES128_OPTIONS) -CFLAGS_poly1305_test = $(AES_OPTIONS) $(AES128_OPTIONS) - -CFLAGS_aeadperf_aes128gcm = $(AES_OPTIONS) $(AES128_OPTIONS) $(AEADPERF_BRACKET) -CFLAGS_aeadperf_aes128eax = $(AES_OPTIONS) $(AES128_OPTIONS) $(AEADPERF_BRACKET) -CFLAGS_aeadperf_aes128ccm = $(AES_OPTIONS) $(AES128_OPTIONS) $(AEADPERF_BRACKET) -CFLAGS_aeadperf_aes256gcm = $(AES_OPTIONS) $(AES256_OPTIONS) $(AEADPERF_BRACKET) -CFLAGS_aeadperf_aes256eax = $(AES_OPTIONS) $(AES256_OPTIONS) $(AEADPERF_BRACKET) -CFLAGS_aeadperf_aes256ccm = $(AES_OPTIONS) $(AES256_OPTIONS) $(AEADPERF_BRACKET) -CFLAGS_aeadperf_norx = $(AEADPERF_BRACKET) -CFLAGS_aeadperf_chacha20poly1305 = $(AEADPERF_BRACKET) - -CFLAGS_aes256block_test = $(AES_OPTIONS) $(AES256_OPTIONS) -CFLAGS_aes256sched_test = $(AES_OPTIONS) $(AES256_OPTIONS) - -CFLAGS_testaes = -DCF_SIDE_CHANNEL_PROTECTION=0 - -CFLAGS = -I./ext -I../ext -I.. -Os -ffunction-sections -g \ - -Wall -Werror -std=gnu99 -mthumb -LDFLAGS = -nostartfiles -nostdlib -Wl,-gc-sections -CURVESRCS = unacl/cortex_m0_mpy121666.s unacl/cortex_m0_reduce25519.s unacl/mul.s unacl/sqr.s -SRCS = boot.c memcpy.s memset.s semihost.c semihost.s \ - ../sha1.c ../sha256.c ../sha512.c ../sha3.c ../blockwise.c ../chash.c \ - ../curve25519.c ../poly1305.c \ - ../aes.c ../eax.c ../gcm.c ../cbcmac.c ../ccm.c \ - ../modes.c ../cmac.c ../gf128.c \ - ../hmac.c ../pbkdf2.c ../salsa20.c ../chacha20.c \ - ../norx.c ../chacha20poly1305.c ../drbg.c - -$(patsubst %,%.stm32f0.elf, $(FUNCS) $(AEADS)): $(SRCS) main.c $(CURVESRCS) -$(patsubst %,%.stm32f1.elf, $(FUNCS) $(AEADS)): $(SRCS) main.c $(CURVESRCS) -$(patsubst %,%.stm32f3.elf, $(FUNCS) $(AEADS)): $(SRCS) main.c $(CURVESRCS) -$(patsubst %,%.efm32.elf, $(FUNCS) $(AEADS)): $(SRCS) main.c $(CURVESRCS) -$(patsubst %,%.qemucm3.elf, $(FUNCS) $(AEADS)): $(SRCS) main.c $(CURVESRCS) - -$(patsubst %,testcurve25519.%.elf, $(ARCHS)): $(SRCS) $(CURVESRCS) ../testcurve25519.c -$(patsubst %,testaes.%.elf, $(ARCHS)): $(SRCS) ../testaes.c -$(patsubst %,testmodes.%.elf, $(ARCHS)): $(SRCS) ../testmodes.c -$(patsubst %,testsalsa20.%.elf, $(ARCHS)): $(SRCS) ../testsalsa20.c -$(patsubst %,testsha1.%.elf, $(ARCHS)): $(SRCS) ../testsha1.c -$(patsubst %,testsha2.%.elf, $(ARCHS)): $(SRCS) ../testsha2.c -$(patsubst %,testsha3.%.elf, $(ARCHS)): $(SRCS) ../testsha3.c -$(patsubst %,testpoly1305.%.elf, $(ARCHS)): $(SRCS) ../testpoly1305.c -$(patsubst %,testnorx.%.elf, $(ARCHS)): $(SRCS) ../testnorx.c -$(patsubst %,testchacha20poly1305.%.elf, $(ARCHS)): $(SRCS) ../testchacha20poly1305.c -$(patsubst %,testdrbg.%.elf, $(ARCHS)): $(SRCS) ../testdrbg.c - -run.%.qemucm3: %.qemucm3.bin - arm-none-eabi-readelf -l $(patsubst %.bin,%.elf,$^) > $@.log - qemu-system-gnuarmeclipse -verbose -verbose -M STM32-P103 -kernel $^ -semihosting -nographic -monitor null -serial null 2>> $@.log - cat $@.log - -run.%.efm32: %.efm32.elf - arm-none-eabi-readelf -l $^ > $@.log - echo '-----' >> $@.log - openocd -f openocd.efm32.cfg >> $@.log & - arm-none-eabi-gdb --quiet --batch-silent \ - $^ \ - -ex 'target remote :3333' \ - -ex 'monitor reset halt' \ - -ex 'load' \ - -ex 'monitor arm semihosting enable' \ - -ex 'monitor reset run' \ - -ex 'monitor wait_halt 720000' \ - -ex 'monitor shutdown' - -run.%.stm32f0: %.stm32f0.elf - arm-none-eabi-readelf -l $^ > $@.log - echo '-----' >> $@.log - openocd -f openocd.stm32f0.cfg >> $@.log & - arm-none-eabi-gdb --quiet --batch-silent \ - $^ \ - -ex 'target remote :3333' \ - -ex 'monitor reset halt' \ - -ex 'load' \ - -ex 'monitor arm semihosting enable' \ - -ex 'monitor reset run' \ - -ex 'monitor wait_halt 720000' \ - -ex 'monitor shutdown' - -run.%.stm32f1: %.stm32f1.elf - arm-none-eabi-readelf -l $^ > $@.log - echo '-----' >> $@.log - openocd -f openocd.stm32f1.cfg >> $@.log & - arm-none-eabi-gdb --quiet --batch-silent \ - $^ \ - -ex 'target remote :3333' \ - -ex 'monitor reset halt' \ - -ex 'load' \ - -ex 'monitor arm semihosting enable' \ - -ex 'monitor reset run' \ - -ex 'monitor wait_halt 720000' \ - -ex 'monitor shutdown' - -run.%.stm32f3: %.stm32f3.elf - arm-none-eabi-readelf -l $^ > $@.log - echo '-----' >> $@.log - openocd -f openocd.stm32f3.cfg >> $@.log & - arm-none-eabi-gdb --quiet --batch-silent \ - $^ \ - -ex 'target remote :3333' \ - -ex 'monitor reset halt' \ - -ex 'load' \ - -ex 'monitor arm semihosting enable' \ - -ex 'monitor reset run' \ - -ex 'monitor wait_halt 720000' \ - -ex 'monitor shutdown' - -test: $(patsubst %,run.%.qemucm3,$(FUNCS) $(TESTS)) -.PHONY: test - -perf.stm32f0: $(patsubst %,run.%.stm32f0,$(FUNCS)) -.PHONY: perf.stm32f0 - -test.stm32f0: $(patsubst %,run.%.stm32f0,$(FUNCS) $(TESTS)) -.PHONY: test.stm32f0 - -test.stm32f1: $(patsubst %,run.%.stm32f1,$(FUNCS) $(TESTS)) -.PHONY: test.stm32f1 - -test.stm32f3: $(patsubst %,run.%.stm32f3,$(FUNCS) $(TESTS)) -.PHONY: test.stm32f3 - -clean: - rm -rf *.log *.elf *.bin diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/analyse.py b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/analyse.py deleted file mode 100644 index d2c456f..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/analyse.py +++ /dev/null @@ -1,207 +0,0 @@ -import subprocess -import sys -import re - -function_intro_re = re.compile(r'^(?P<addr>[0-9a-fA-F]{8}) <(?P<name>[a-zA-Z0-9\._]+)>:$') -insn_re = re.compile(r'^\s+(?P<addr>[0-9a-fA-F]+):\s+(?P<insn>[0-9a-fA-F ]+)\s+\t(?P<op>.*)$') - -class Instruction: - def __init__(self, addr, insn, op): - self.addr = long(addr, 16) - self.insn = insn - - args = op.split('\t', 1) - - self.op = args[0].strip() - if len(args) == 2: - comment = args[1].strip().split(';', 1) - else: - comment = args - - self.args = comment[0].strip() - - if len(comment) == 2: - self.comment = comment[1].strip() - else: - self.comment = '' - - def __repr__(self): - return '<insn %r>' % (self.__dict__) - - -def literal_branch_target(t): - return ' <' in t - -class Function: - def __init__(self, addr, name): - self.name = name - self.addr = long(addr, 16) - self.insns = [] - self.calls = [] - - def __repr__(self): - return '<%s %d instructions>' % (self.name, len(self.insns)) - - def add_insn(self, insn): - self.insns.append(Instruction(**insn)) - - def contains_addr(self, addr): - if self.insns: - return addr >= self.addr and addr <= self.insns[-1].addr - else: - return addr == self.addr - - def dump(self): - print self.name + ':' - for insn in self.insns: - print ' ', '%04x' % insn.addr + ':', insn.op, insn.args, '\t;', insn.comment - - def get_literal_word(self, addr): - for insn in self.insns: - if insn.addr == addr and insn.op == '.word': - w = int(insn.args, 16) - if w & 0x80000000: - w = -(w ^ 0xffffffff) + 1 - return w - return None - - def analyse(self, prog): - self.stack_guess = None - regs = {} - - for insn in self.insns: - # stack adjustment with literal - if insn.op == 'sub' and insn.args.startswith('sp, ') and self.stack_guess is None: - sz = int(insn.args.split('#', 1)[1]) - self.stack_guess = sz - - # literal pool loads - if insn.op == 'ldr' and ', [pc, #' in insn.args: - reg, offset = insn.args.split(', [pc, #') - offset = int(offset.replace(']', '')) - word = self.get_literal_word(insn.addr + offset + 2) - if word is not None: - regs[reg] = word - - if insn.op == 'add' and insn.args.startswith('sp, r') and self.stack_guess is None: - reg = insn.args.split(', ')[1] - if reg in regs: - self.stack_guess = regs[reg] - - # static branches - if insn.op[0] == 'b' and literal_branch_target(insn.args): - target = long(insn.args.split(' <', 1)[0], 16) - - targetf = prog.function_at_addr(target) - - if targetf and targetf != self: - self.calls.append(targetf) - - if self.stack_guess is None: - self.stack_guess = 0 - - def stack_usage(self, hints, warns, prog, depth = 0): - hinted_calls = [] - if self.stack_guess: - print ' ' * depth, 'stack:', self.name, self.stack_guess, 'bytes' - - our_hints = [h for h in hints if h and h[0] == self.name] - if our_hints: - hints = [h[1:] for h in our_hints] - hinted_calls = [prog.function_by_name(h[0]) for h in hints if h] - else: - if self.name in warns: - print ' WARN: no calls hints for fn-ptr caller', self.name - - if self.calls + hinted_calls: - call_usage = max([f.stack_usage(hints, warns, prog, depth + 1) for f in self.calls + hinted_calls]) - else: - call_usage = 0 - return self.stack_guess + call_usage - -class Program: - def __init__(self): - self.functions = [] - - # sequence of tuples naming a call sequence known to occur - # this allows working out calls through pointers - self.call_hints = [] - - # function names to warn on if we don't have callees - self.call_warns = set() - - def read_elf(self, elf): - current_fn = None - - for x in subprocess.Popen(['arm-none-eabi-objdump', '-d', elf], - stdout = subprocess.PIPE).stdout: - x = x.rstrip('\n') - m = function_intro_re.match(x) - if m: - fn = Function(**m.groupdict()) - current_fn = fn - self.functions.append(fn) - - m = insn_re.match(x) - if m: - assert current_fn - current_fn.add_insn(m.groupdict()) - - def analyse(self): - for f in self.functions: - f.analyse(self) - - def function_by_name(self, name): - fns = [fn for fn in self.functions if fn.name == name] - if len(fns) == 0: - return None - elif len(fns) == 1: - return fns[0] - else: - print 'warn: more than one function named', name - return None - - def function_at_addr(self, addr): - for f in self.functions: - if f.addr == addr: - return f - return None - - def add_call_hint(self, *seq): - self.call_hints.append(seq) - - def add_call_warn(self, fn): - self.call_warns.add(fn) - - def measure_stack(self, name): - fn = self.function_by_name(name) - if fn is None: - return 0 - - return fn.stack_usage(self.call_hints, self.call_warns, self) - -_, exe, fn = sys.argv - -p = Program() -p.read_elf(exe) - -p.analyse() - -# calls which indirect through fn ptrs -p.add_call_warn('cf_blockwise_accumulate') -p.add_call_warn('cf_blockwise_accumulate_final') - -# hints to resolve those -p.add_call_hint('cf_sha224_update', 'cf_blockwise_accumulate', 'cf_blockwise_accumulate_final', 'sha256_update_block') -p.add_call_hint('cf_sha256_update', 'cf_blockwise_accumulate', 'cf_blockwise_accumulate_final', 'sha256_update_block') -p.add_call_hint('cf_sha384_update', 'cf_blockwise_accumulate', 'cf_blockwise_accumulate_final', 'sha512_update_block') -p.add_call_hint('cf_sha512_update', 'cf_blockwise_accumulate', 'cf_blockwise_accumulate_final', 'sha512_update_block') -p.add_call_hint('cf_norx32_encrypt', 'input', 'cf_blockwise_accumulate', 'cf_blockwise_accumulate_final', 'input_block') -p.add_call_hint('cf_norx32_decrypt', 'input', 'cf_blockwise_accumulate', 'cf_blockwise_accumulate_final', 'input_block') -p.add_call_hint('cf_cbcmac_stream_update', 'cf_blockwise_accumulate', 'cf_blockwise_accumulate_final', 'cbcmac_process') -p.add_call_hint('cf_cmac_stream_update', 'cf_blockwise_accumulate', 'cf_blockwise_accumulate_final', 'cmac_process_final_pad') -p.add_call_hint('cf_cmac_stream_update', 'cf_blockwise_accumulate_final', 'cmac_process') -p.add_call_hint('cf_cmac_stream_update', 'cf_blockwise_accumulate_final', 'cmac_process_final_nopad') - - -print 'stack', fn, '=', p.measure_stack(fn) diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/boot.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/boot.c deleted file mode 100644 index d2a8e40..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/boot.c +++ /dev/null @@ -1,144 +0,0 @@ -#include <stdint.h> -#include <stdlib.h> -#include <string.h> - -extern int main(void); - -/* --- Defined by link script --- */ -extern uint32_t __etext; /* End of text/start of data. */ -extern uint32_t __data_start__, __data_end__; /* Data addresses in RAM */ -extern uint32_t __bss_start__, __bss_end__; /* BSS addresses in RAM */ -extern uint32_t __StackTop; /* End of stack in RAM */ - -#define ATTR_SECTION(sec) __attribute__ ((section (sec))) - -/* --- Interrupt vector table. --- */ -void Reset_Handler(void); -void SysTick_Handler(void); -void infinite_loop(void); -void do_nothing(void); - -typedef void (*vector_fn)(void); - -typedef struct { - uint32_t *stack_top; - vector_fn reset, nmi, hard_fault, mmu_fault, bus_fault, usage_fault; - vector_fn reserved0[4]; - vector_fn svc, debug_monitor; - vector_fn reserved1; - vector_fn pendsv, systick; - vector_fn irq[128]; -} vectors_t; - -#define COPY2(v) v, v -#define COPY4(v) COPY2(v), COPY2(v) -#define COPY8(v) COPY4(v), COPY4(v) -#define COPY16(v) COPY8(v), COPY8(v) -#define COPY32(v) COPY16(v), COPY16(v) -#define COPY64(v) COPY32(v), COPY32(v) -#define COPY128(v) COPY64(v), COPY64(v) - -vectors_t vectors ATTR_SECTION(".isr_vector") = { - .stack_top = &__StackTop, - .reset = Reset_Handler, - .nmi = do_nothing, - .hard_fault = infinite_loop, - .mmu_fault = infinite_loop, - .bus_fault = infinite_loop, - .usage_fault = infinite_loop, - .svc = do_nothing, - .debug_monitor = do_nothing, - .pendsv = do_nothing, - .systick = SysTick_Handler, - .irq = { COPY128(do_nothing) } -}; - -/* --- ISRs --- */ -void Reset_Handler(void) -{ - /* Copy data segment contents from flash to RAM. */ - uint32_t data_bytes = (&__data_end__ - &__data_start__) * 4; - memcpy(&__etext, &__data_start__, data_bytes); - - /* Zero BSS. */ - uint32_t bss_bytes = (&__bss_end__ - &__bss_start__) * 4; - memset(&__bss_start__, 0, bss_bytes); - - main(); - while (1) - ; -} - -void __assert_func(const char *file, int line, const char *func, const char *expr) -{ - while (1) - ; -} - -void infinite_loop(void) -{ - while (1) - ; -} - -void do_nothing(void) -{ -} - -uint32_t ticks = 0; - -void SysTick_Handler(void) -{ - ticks++; -} - -uint32_t get_ticks(void) -{ - return ticks; -} - -void reset_ticks(void) -{ - ticks = 0; -} - -void *memmove(void *vtarg, const void *vsrc, size_t len) -{ - if (vsrc > vtarg) - return memcpy(vtarg, vsrc, len); - else if (vsrc == vtarg) - return vtarg; - - uint8_t *targ = vtarg; - const uint8_t *src = vsrc; - - for (size_t i = len; i != 0; i++) - targ[i - 1] = src[i - 1]; - return vtarg; -} - -int memcmp(const void *va, const void *vb, size_t len) -{ - const uint8_t *a = va, *b = vb; - - for (size_t i = 0; i < len; i++) - { - if (a[i] != b[i]) - return a[i] < b[i] ? -1 : 1; - } - - return 0; -} - -size_t strlen(const char *c) -{ - size_t r = 0; - while (*c++) r++; - return r; -} - -void abort(void) -{ - while (1) - ; -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/curve25519-results.txt b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/curve25519-results.txt deleted file mode 100644 index 968e40e..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/curve25519-results.txt +++ /dev/null @@ -1,22 +0,0 @@ -STM32F0 -donna-before-opt: 12907000c -donna-after-opt: 17294000c -donna-reset-opt: 12947000c -~20k - -donna -O2 -Os: 15268000c -donna -O2 -Os noasm: 20453000c -donna -Os: 15748000c -7.4k - -donna -O3: 12907000c 16KB 3380b -donna -Os: 15748000c 7.4KB 3148b -donna -O2: 15218000c 7.9KB 3148b - -tweetnacl -O2: 68876000c 3.0KB 2268b -tweetnacl -Os: 75979000c 2.8KB 2244b -tweetnacl -O3: 69622000c 8.9KB 2900b - -naclref -Os: 47813000c 3.2KB 4012b -naclref -O3: 35059000c 4.1KB 4044b -naclref -O2: 34309000c 3.5KB 4036b diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/ext/cutest.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/ext/cutest.h deleted file mode 100644 index fa3c5d8..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/ext/cutest.h +++ /dev/null @@ -1,55 +0,0 @@ -/* cutest, for embedded targets. */ - -#ifndef CUTEST_H -#define CUTEST_H - -/* Main interface. */ -#define TEST_LIST const struct test__ test_list__[] -#define TEST_CHECK(cond) test_check__((cond), __FILE__, __LINE__, #cond) -/* no TEST_CHECK_ -- we don't have a good enough printf */ - -/* Implementation */ -#include "../semihost.h" - -struct test__ -{ - const char *name; - void (*func)(void); -}; - -extern const struct test__ test_list__[]; - -static void test_check__(int cond, const char *file, int line, const char *expr) -{ - if (cond) - return; /* pass */ - - emit("Failed!\n"); - emit("File: "); emit(file); emit("\n"); - emit("Line: "); emit_uint32(line); emit("\n"); - emit("Expr: "); emit(expr); emit("\n"); - quit_failure(); -} - -static void run_test__(const struct test__ *t) -{ - emit(" "); emit(t->name); emit(": "); - t->func(); - emit("OK\n"); -} - -int main(void) -{ - emit("Running tests:\n"); - - for (const struct test__ *t = test_list__; - t->name; - t++) - { - run_test__(t); - } - emit("Success\n"); - quit_success(); -} - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.efm32.ld b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.efm32.ld deleted file mode 100644 index 8b9a6bf..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.efm32.ld +++ /dev/null @@ -1,8 +0,0 @@ -MEMORY -{ - FLASH (rx) : ORIGIN = 0x00000000, LENGTH = 64K - RAM (rwx) : ORIGIN = 0x20000000, LENGTH = 8K -} - -INCLUDE linkscript.std.ld - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.lm3s6965evb.ld b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.lm3s6965evb.ld deleted file mode 100644 index 14fdac4..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.lm3s6965evb.ld +++ /dev/null @@ -1,7 +0,0 @@ -MEMORY -{ - FLASH (rx) : ORIGIN = 0x00000000, LENGTH = 256K - RAM (rwx) : ORIGIN = 0x20000000, LENGTH = 64K -} - -INCLUDE linkscript.std.ld diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.qemucm3.ld b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.qemucm3.ld deleted file mode 100644 index 2826467..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.qemucm3.ld +++ /dev/null @@ -1,8 +0,0 @@ -MEMORY -{ - FLASH (rx) : ORIGIN = 0x00000000, LENGTH = 128K - RAM (rwx) : ORIGIN = 0x20000000, LENGTH = 20K -} - -INCLUDE linkscript.std.ld - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.std.ld b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.std.ld deleted file mode 100644 index c08d7be..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.std.ld +++ /dev/null @@ -1,172 +0,0 @@ - -/* Linker script to place sections and symbol values. Should be used together - * with other linker script that defines memory regions FLASH and RAM. - * It references following symbols, which must be defined in code: - * Reset_Handler : Entry of reset handler - * - * It defines following symbols, which code can use without definition: - * __exidx_start - * __exidx_end - * __copy_table_start__ - * __copy_table_end__ - * __zero_table_start__ - * __zero_table_end__ - * __etext - * __data_start__ - * __preinit_array_start - * __preinit_array_end - * __init_array_start - * __init_array_end - * __fini_array_start - * __fini_array_end - * __data_end__ - * __bss_start__ - * __bss_end__ - * __end__ - * end - * __HeapLimit - * __StackLimit - * __StackTop - * __stack - */ -ENTRY(Reset_Handler) - -SECTIONS -{ - .text : - { - KEEP(*(.isr_vector)) - *(.text*) - - KEEP(*(.init)) - KEEP(*(.fini)) - - /* .ctors */ - *crtbegin.o(.ctors) - *crtbegin?.o(.ctors) - *(EXCLUDE_FILE(*crtend?.o *crtend.o) .ctors) - *(SORT(.ctors.*)) - *(.ctors) - - /* .dtors */ - *crtbegin.o(.dtors) - *crtbegin?.o(.dtors) - *(EXCLUDE_FILE(*crtend?.o *crtend.o) .dtors) - *(SORT(.dtors.*)) - *(.dtors) - - *(.rodata*) - - KEEP(*(.eh_frame*)) - } > FLASH - - .ARM.extab : - { - *(.ARM.extab* .gnu.linkonce.armextab.*) - } > FLASH - - __exidx_start = .; - .ARM.exidx : - { - *(.ARM.exidx* .gnu.linkonce.armexidx.*) - } > FLASH - __exidx_end = .; - - /* To copy multiple ROM to RAM sections, - * uncomment .copy.table section and, - * define __STARTUP_COPY_MULTIPLE in startup_ARMCMx.S */ - - .copy.table : - { - . = ALIGN(4); - __copy_table_start__ = .; - LONG (__etext) - LONG (__data_start__) - LONG (__data_end__ - __data_start__) - __copy_table_end__ = .; - } > FLASH - - - /* To clear multiple BSS sections, - * uncomment .zero.table section and, - * define __STARTUP_CLEAR_BSS_MULTIPLE in startup_ARMCMx.S */ - .zero.table : - { - . = ALIGN(4); - __zero_table_start__ = .; - LONG (__bss_start__) - LONG (__bss_end__ - __bss_start__) - __zero_table_end__ = .; - } > FLASH - - __etext = .; - - .data : AT (__etext) - { - __data_start__ = .; - *(vtable) - *(.data*) - - . = ALIGN(4); - /* preinit data */ - PROVIDE_HIDDEN (__preinit_array_start = .); - KEEP(*(.preinit_array)) - PROVIDE_HIDDEN (__preinit_array_end = .); - - . = ALIGN(4); - /* init data */ - PROVIDE_HIDDEN (__init_array_start = .); - KEEP(*(SORT(.init_array.*))) - KEEP(*(.init_array)) - PROVIDE_HIDDEN (__init_array_end = .); - - - . = ALIGN(4); - /* finit data */ - PROVIDE_HIDDEN (__fini_array_start = .); - KEEP(*(SORT(.fini_array.*))) - KEEP(*(.fini_array)) - PROVIDE_HIDDEN (__fini_array_end = .); - - KEEP(*(.jcr*)) - . = ALIGN(4); - /* All data end */ - __data_end__ = .; - - } > RAM - - .bss : - { - . = ALIGN(4); - __bss_start__ = .; - *(.bss*) - *(COMMON) - . = ALIGN(4); - __bss_end__ = .; - } > RAM - - .heap (COPY): - { - __end__ = .; - PROVIDE(end = .); - *(.heap*) - __HeapLimit = .; - } > RAM - - /* .stack_dummy section doesn't contains any symbols. It is only - * used for linker to calculate size of stack sections, and assign - * values to stack symbols later */ - .stack_dummy (COPY): - { - *(.stack*) - } > RAM - - /* Set stack top to end of RAM, and stack limit move down by - * size of stack_dummy section */ - __StackTop = ORIGIN(RAM) + LENGTH(RAM); - __StackLimit = __StackTop - SIZEOF(.stack_dummy); - PROVIDE(__stack = __StackTop); - - /* Check if data + heap + stack exceeds RAM limit */ - ASSERT(__StackLimit >= __HeapLimit, "region RAM overflowed with stack") -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.stm32f0.ld b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.stm32f0.ld deleted file mode 100644 index c7a3bd8..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.stm32f0.ld +++ /dev/null @@ -1,8 +0,0 @@ -MEMORY -{ - FLASH (rx) : ORIGIN = 0x08000000, LENGTH = 128K - RAM (rwx) : ORIGIN = 0x20000000, LENGTH = 16K -} - -INCLUDE linkscript.std.ld - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.stm32f1.ld b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.stm32f1.ld deleted file mode 100644 index d13f58d..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.stm32f1.ld +++ /dev/null @@ -1,8 +0,0 @@ -MEMORY -{ - FLASH (rx) : ORIGIN = 0x08000000, LENGTH = 64K - RAM (rwx) : ORIGIN = 0x20000000, LENGTH = 8K -} - -INCLUDE linkscript.std.ld - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.stm32f3.ld b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.stm32f3.ld deleted file mode 100644 index 92eee46..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/linkscript.stm32f3.ld +++ /dev/null @@ -1,8 +0,0 @@ -MEMORY -{ - FLASH (rx) : ORIGIN = 0x08000000, LENGTH = 64K - RAM (rwx) : ORIGIN = 0x20000000, LENGTH = 12K -} - -INCLUDE linkscript.std.ld - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/main.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/main.c deleted file mode 100644 index 5b7cbf2..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/main.c +++ /dev/null @@ -1,447 +0,0 @@ -#ifndef TEST -# error You must select a function to test. -#endif - -#include "semihost.h" -#include "aes.h" -#include "hmac.h" -#include "sha2.h" -#include "sha3.h" -#include "modes.h" -#include "salsa20.h" -#include "curve25519.h" -#include "poly1305.h" -#include "norx.h" -#include "chacha20poly1305.h" - -#include <stdio.h> - -typedef void (*measure_fn)(void); -static uint32_t bracket; /* bracket mode parameter */ - -static void do_nothing(void) -{ -} - -static void stack_64w(void) -{ - volatile uint32_t words[64]; - words[0] = 0; - words[63] = 0; - (void) words[63]; -} - -static void stack_8w(void) -{ - volatile uint32_t words[8]; - words[0] = 0; - words[7] = 0; - (void) words[7]; -} - -static void hashtest_sha256(void) -{ - uint8_t hash[CF_SHA256_HASHSZ]; - cf_sha256_context ctx; - cf_sha256_init(&ctx); - cf_sha256_update(&ctx, "", 0); - cf_sha256_digest_final(&ctx, hash); -} - -static void hashtest_sha512(void) -{ - uint8_t hash[CF_SHA512_HASHSZ]; - cf_sha512_context ctx; - cf_sha512_init(&ctx); - cf_sha512_update(&ctx, "", 0); - cf_sha512_digest_final(&ctx, hash); -} - -static void hashtest_sha3_256(void) -{ - uint8_t hash[CF_SHA3_256_HASHSZ]; - cf_sha3_context ctx; - cf_sha3_256_init(&ctx); - cf_sha3_256_update(&ctx, "", 0); - cf_sha3_256_digest_final(&ctx, hash); -} - -static void hashtest_sha3_512(void) -{ - uint8_t hash[CF_SHA3_512_HASHSZ]; - cf_sha3_context ctx; - cf_sha3_512_init(&ctx); - cf_sha3_512_update(&ctx, "", 0); - cf_sha3_512_digest_final(&ctx, hash); -} - -static void aes128block_test(void) -{ - uint8_t key[16] = { 0 }, block[16] = { 0 }; - cf_aes_context ctx; - cf_aes_init(&ctx, key, sizeof key); - cf_aes_encrypt(&ctx, block, block); -} - -static void aes128sched_test(void) -{ - uint8_t key[16] = { 0 }; - cf_aes_context ctx; - cf_aes_init(&ctx, key, sizeof key); -} - -static void aes256block_test(void) -{ - uint8_t key[32] = { 0 }, block[16] = { 0 }; - cf_aes_context ctx; - cf_aes_init(&ctx, key, sizeof key); - cf_aes_encrypt(&ctx, block, block); -} - -static void aes256sched_test(void) -{ - uint8_t key[32] = { 0 }; - cf_aes_context ctx; - cf_aes_init(&ctx, key, sizeof key); -} - -static void aes128gcm_test(void) -{ - uint8_t key[16] = { 0 }; - cf_aes_context ctx; - cf_aes_init(&ctx, key, sizeof key); - - uint8_t msg[16] = { 0 }; - uint8_t aad[16] = { 0 }; - uint8_t nonce[12] = { 0 }; - uint8_t cipher[16] = { 0 }; - uint8_t tag[16] = { 0 }; - - cf_gcm_encrypt(&cf_aes, &ctx, - msg, sizeof msg, - aad, sizeof aad, - nonce, sizeof nonce, - cipher, - tag, sizeof tag); -} - -static void aes128eax_test(void) -{ - uint8_t key[16] = { 0 }; - cf_aes_context ctx; - cf_aes_init(&ctx, key, sizeof key); - - uint8_t msg[16] = { 0 }; - uint8_t aad[16] = { 0 }; - uint8_t nonce[12] = { 0 }; - uint8_t cipher[16] = { 0 }; - uint8_t tag[16] = { 0 }; - - cf_eax_encrypt(&cf_aes, &ctx, - msg, sizeof msg, - aad, sizeof aad, - nonce, sizeof nonce, - cipher, - tag, sizeof tag); -} - -static void aes128ccm_test(void) -{ - uint8_t key[16] = { 0 }; - cf_aes_context ctx; - cf_aes_init(&ctx, key, sizeof key); - - uint8_t msg[16] = { 0 }; - uint8_t aad[16] = { 0 }; - uint8_t nonce[11] = { 0 }; - uint8_t cipher[16] = { 0 }; - uint8_t tag[16] = { 0 }; - - cf_ccm_encrypt(&cf_aes, &ctx, - msg, sizeof msg, 4, - aad, sizeof aad, - nonce, sizeof nonce, - cipher, - tag, sizeof tag); -} - -static void salsa20_test(void) -{ - uint8_t key[32] = { 0 }; - uint8_t nonce[8] = { 0 }; - uint8_t msg[64] = { 0 }; - uint8_t cipher[64] = { 0 }; - - cf_salsa20_ctx ctx; - cf_salsa20_init(&ctx, key, sizeof key, nonce); - cf_salsa20_cipher(&ctx, msg, cipher, sizeof msg); -} - -static void chacha20_test(void) -{ - uint8_t key[32] = { 0 }; - uint8_t nonce[8] = { 0 }; - uint8_t msg[64] = { 0 }; - uint8_t cipher[64] = { 0 }; - - cf_chacha20_ctx ctx; - cf_chacha20_init(&ctx, key, sizeof key, nonce); - cf_chacha20_cipher(&ctx, msg, cipher, sizeof msg); -} - -static void curve25519_test(void) -{ - uint8_t secret[32] = { 1 }; - uint8_t pubkey[32]; - cf_curve25519_mul_base(pubkey, secret); -} - -static const uint8_t *mac_message = (const uint8_t *) "hello world"; -static const size_t mac_message_len = 11; - -static void poly1305_test(void) -{ - uint8_t key[32] = { 0 }, - nonce[16] = { 0 }, - encnonce[16], - mac[16]; - - cf_aes_context aes; - cf_aes_init(&aes, key, 16); - cf_aes_encrypt(&aes, nonce, encnonce); - - cf_poly1305 poly; - cf_poly1305_init(&poly, key + 16, encnonce); - cf_poly1305_update(&poly, mac_message, mac_message_len); - cf_poly1305_finish(&poly, mac); -} - -static void hmacsha256_test(void) -{ - uint8_t key[32] = { 0 }, - mac[32] = { 0 }; - - cf_hmac_ctx ctx; - cf_hmac_init(&ctx, &cf_sha256, key, sizeof key); - cf_hmac_update(&ctx, mac_message, mac_message_len); - cf_hmac_finish(&ctx, mac); -} - -static void norx_test(void) -{ - uint8_t key[16] = { 0 }; - uint8_t msg[16] = { 0 }; - uint8_t aad[16] = { 0 }; - uint8_t nonce[8] = { 0 }; - uint8_t cipher[16] = { 0 }; - uint8_t tag[16] = { 0 }; - - cf_norx32_encrypt(key, - nonce, - aad, sizeof aad, - msg, sizeof msg, - NULL, 0, - cipher, - tag); -} - -#ifndef BRACKET_MODE -# define AEADPERF_LEN 1 -#else -# define AEADPERF_LEN BRACKET_END -#endif - -static uint8_t aead_msg[AEADPERF_LEN] = { 0 }; -static uint8_t aead_cipher[AEADPERF_LEN] = { 0 }; -static uint8_t aead_aad[16] = { 0 }; -static uint8_t aead_key[32] = { 0 }; -static uint8_t aead_nonce[16] = { 0 }; -static uint8_t aead_tag[16] = { 0 }; - -static void aeadperf_norx(void) -{ - cf_norx32_encrypt(aead_key, aead_nonce, - aead_aad, sizeof aead_aad, - aead_msg, bracket, - NULL, 0, - aead_cipher, aead_tag); -} - -static void aeadperf_chacha20poly1305(void) -{ - cf_chacha20poly1305_encrypt(aead_key, aead_nonce, - aead_aad, sizeof aead_aad, - aead_msg, bracket, - aead_cipher, aead_tag); -} -static void aeadperf_aes128gcm(void) -{ - cf_aes_context ctx; - cf_aes_init(&ctx, aead_key, 16); - - cf_gcm_encrypt(&cf_aes, &ctx, - aead_msg, bracket, - aead_aad, sizeof aead_aad, - aead_nonce, 12, - aead_cipher, - aead_tag, 16); -} - -static void aeadperf_aes128ccm(void) -{ - cf_aes_context ctx; - cf_aes_init(&ctx, aead_key, 16); - - cf_ccm_encrypt(&cf_aes, &ctx, - aead_msg, bracket, - 4, - aead_aad, sizeof aead_aad, - aead_nonce, 11, - aead_cipher, - aead_tag, 16); -} - -static void aeadperf_aes128eax(void) -{ - cf_aes_context ctx; - cf_aes_init(&ctx, aead_key, 16); - - cf_eax_encrypt(&cf_aes, &ctx, - aead_msg, bracket, - aead_aad, sizeof aead_aad, - aead_nonce, 12, - aead_cipher, - aead_tag, 16); -} - -static void aeadperf_aes256gcm(void) -{ - cf_aes_context ctx; - cf_aes_init(&ctx, aead_key, 32); - - cf_gcm_encrypt(&cf_aes, &ctx, - aead_msg, bracket, - aead_aad, sizeof aead_aad, - aead_nonce, 12, - aead_cipher, - aead_tag, 16); -} - -static void aeadperf_aes256ccm(void) -{ - cf_aes_context ctx; - cf_aes_init(&ctx, aead_key, 32); - - cf_ccm_encrypt(&cf_aes, &ctx, - aead_msg, bracket, - 4, - aead_aad, sizeof aead_aad, - aead_nonce, 11, - aead_cipher, - aead_tag, 16); -} - -static void aeadperf_aes256eax(void) -{ - cf_aes_context ctx; - cf_aes_init(&ctx, aead_key, 32); - - cf_eax_encrypt(&cf_aes, &ctx, - aead_msg, bracket, - aead_aad, sizeof aead_aad, - aead_nonce, 12, - aead_cipher, - aead_tag, 16); -} - -/* Provided by linkscript */ -extern uint32_t __HeapLimit; - -#define STACK_MAGIC 0x57ac34df - -static __attribute__((noinline)) void clear_stack(void) -{ - uint32_t *stack_start = &__HeapLimit; - uint32_t ss = 0, *stack_stop = &ss; - size_t words = stack_stop - stack_start; - for (size_t i = 0; i < words; i++) - stack_start[i] = STACK_MAGIC; -} - -static __attribute__((noinline)) uint32_t measure_stack(void) -{ - uint32_t *stack_start = &__HeapLimit; - uint32_t ss, *stack_stop = &ss; - size_t words = stack_stop - stack_start; - for (size_t i = 0; i < words; i++) - if (stack_start[i] != STACK_MAGIC) - return words - i + 4; /* we used 4 words for ourselves, roughly */ - - return 0; -} - -static void measure(measure_fn fn) -{ - clear_stack(); - uint32_t start_cycles = reset_cycles(); - fn(); - uint32_t end_cycles = get_cycles(); - uint32_t stack_words = measure_stack(); - - emit("cycles = "); - emit_uint32(end_cycles - start_cycles); - emit("\n"); - emit("stack = "); - emit_uint32(stack_words << 2); - emit("\n"); -} - -#define STRING_(x) #x -#define STRING(x) STRING_(x) - -int main(void) -{ - emit(STRING(TEST) "\n"); -#ifdef BRACKET_MODE - for (bracket = BRACKET_START; bracket <= BRACKET_END; bracket += BRACKET_STEP) - { - emit("bracket = "); - emit_uint32(bracket); - emit("\n"); - measure(TEST); - } -#else - measure(TEST); -#endif - quit_success(); - - (void) bracket; - (void) do_nothing; - (void) stack_8w; - (void) stack_64w; - (void) hashtest_sha256; - (void) hashtest_sha512; - (void) hashtest_sha3_256; - (void) hashtest_sha3_512; - (void) aes128block_test; - (void) aes128sched_test; - (void) aes256block_test; - (void) aes256sched_test; - (void) aes128gcm_test; - (void) aes128eax_test; - (void) aes128ccm_test; - (void) salsa20_test; - (void) chacha20_test; - (void) curve25519_test; - (void) poly1305_test; - (void) hmacsha256_test; - (void) norx_test; - (void) aeadperf_norx; - (void) aeadperf_chacha20poly1305; - (void) aeadperf_aes128gcm; - (void) aeadperf_aes128ccm; - (void) aeadperf_aes128eax; - (void) aeadperf_aes256gcm; - (void) aeadperf_aes256ccm; - (void) aeadperf_aes256eax; -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/memcpy.s b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/memcpy.s deleted file mode 100644 index 63406fe..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/memcpy.s +++ /dev/null @@ -1,49 +0,0 @@ - .text - .syntax unified - .global memcpy - .func memcpy - .thumb_func - -memcpy: - /* on entry - * r0 = targ - * r1 = src - * r2 = len (bytes) - * on exit - * r0 = targ (unchanged) - */ - push {r0, r4, lr} - - /* If targ or src are unaligned, drop to byte - * processing. */ - mov r3, r0 - movs r4, #3 - orrs r3, r1 - ands r3, r4 - bne L_bytewise - - /* Process words */ -L_wordwise: - cmp r2, #4 - blo L_bytewise - ldr r4, [r1] - adds r1, #4 - str r4, [r0] - adds r0, #4 - subs r2, #4 - b L_wordwise - - /* Process bytes */ -L_bytewise: - cmp r2, #0 - beq L_fin - ldrb r4, [r1] - adds r1, #1 - strb r4, [r0] - adds r0, #1 - subs r2, #1 - b L_bytewise - -L_fin: - pop {r0, r4, pc} - .endfunc diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/memset.s b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/memset.s deleted file mode 100644 index a501966..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/memset.s +++ /dev/null @@ -1,50 +0,0 @@ - .text - .syntax unified - .global memset - .func memset - .thumb_func - -memset: - /* on entry - * r0 = targ - * r1 = value - * r2 = len (bytes) - * on exit - * r0 = targ (unchanged) - */ - push {r0, r4, lr} - - /* If targ is unaligned, drop to byte - * processing. */ - movs r3, #3 - ands r3, r0 - bne L_bytewise - - /* Process words */ - /* Build r4 by repeating r1. */ - uxtb r4, r1 - lsls r3, r4, #8 - orrs r4, r3 - lsls r3, r4, #16 - orrs r4, r3 - -L_wordwise: - cmp r2, #4 - blo L_bytewise - str r4, [r0] - adds r0, #4 - subs r2, #4 - b L_wordwise - - /* Process bytes */ -L_bytewise: - cmp r2, #0 - beq L_fin - strb r1, [r0] - adds r0, #1 - subs r2, #1 - b L_bytewise - -L_fin: - pop {r0, r4, pc} - .endfunc diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/merge.py b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/merge.py deleted file mode 100644 index 71d5089..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/merge.py +++ /dev/null @@ -1,26 +0,0 @@ -import sys - -def extract_results(results): - index = 0 - while index < len(results): - if results[index].startswith('## '): - end = results.index('\n', index) - yield results[index:end] - index += 1 - -def merge(readme, res): - title, table = res[0], res[1:] - assert title in readme, 'Section ' + title + ' missing from README.md' - secindex = readme.index(title) - hdrindex = [i for i in range(secindex, len(readme)) if readme[i].startswith('---------- | ')][0] - start = hdrindex - 1 - end = readme.index('\n', start) - table = [t.rstrip() + '\n' for t in table] - return readme[:start] + table + readme[end:] - -results = sys.stdin.readlines() -readme = open('../../README.md').readlines() - -for res in extract_results(results): - readme = merge(readme, res) -print ''.join(readme).rstrip() diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/openocd.efm32.cfg b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/openocd.efm32.cfg deleted file mode 100644 index 85af473..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/openocd.efm32.cfg +++ /dev/null @@ -1,3 +0,0 @@ -source [find interface/jlink.cfg] -transport select swd -source [find target/efm32.cfg] diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/openocd.stm32f0.cfg b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/openocd.stm32f0.cfg deleted file mode 100644 index e9356f7..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/openocd.stm32f0.cfg +++ /dev/null @@ -1,3 +0,0 @@ -source [find interface/stlink-v2.cfg] -transport select hla_swd -source [find target/stm32f0x.cfg] diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/openocd.stm32f1.cfg b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/openocd.stm32f1.cfg deleted file mode 100644 index 1108ea0..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/openocd.stm32f1.cfg +++ /dev/null @@ -1,3 +0,0 @@ -source [find interface/stlink-v2.cfg] -transport select hla_swd -source [find target/stm32f1x.cfg] diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/openocd.stm32f3.cfg b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/openocd.stm32f3.cfg deleted file mode 100644 index de023b8..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/openocd.stm32f3.cfg +++ /dev/null @@ -1,3 +0,0 @@ -source [find interface/stlink-v2.cfg] -transport select hla_swd -source [find target/stm32f3x.cfg] diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/report.py b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/report.py deleted file mode 100644 index 718ab24..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/report.py +++ /dev/null @@ -1,276 +0,0 @@ -""" -Interprets logs from test runs. Outputs ASCII -tables containing results, json data, etc. -""" - -import json -import sys - -archs = 'stm32f0 stm32f1 stm32f3'.split() -tests = """ -aes128block_test -aes256block_test -aes128sched_test -aes256sched_test -hashtest_sha256 -hashtest_sha512 -hashtest_sha3_256 -hashtest_sha3_512 -aes128gcm_test -aes128eax_test -aes128ccm_test -norx_test -salsa20_test -chacha20_test -poly1305_test -hmacsha256_test -curve25519_test -aeadperf_norx -aeadperf_aes128gcm -aeadperf_aes128eax -aeadperf_aes128ccm -aeadperf_aes256gcm -aeadperf_aes256eax -aeadperf_aes256ccm -aeadperf_chacha20poly1305 -do_nothing -""".split() - -arch_names = dict( - stm32f0 = 'Cortex-M0', - stm32f1 = 'Cortex-M3', - stm32f3 = 'Cortex-M4F' - ) - -base_test = 'do_nothing' - -def extract(arch, test): - fn = 'run.%s.%s.log' % (test, arch) - - code_size = 0 - data_size = 0 - cycle_count = None - stack_usage = None - brackets = None - current_bracket = None - - try: - lines = open(fn).readlines() - except IOError: - return None - - for l in lines: - if 'LOAD' in l: - parts = l.split() - assert len(parts) >= 8 - assert 'LOAD' == parts[0] - if parts[6] == 'RWE': - code_size += long(parts[5], 16) - if parts[6] == 'RW': - data_size += long(parts[5], 16) - - if l.startswith('bracket = '): - bracket = long(l.split(' = ')[1].strip(), 16) - current_bracket = bracket - if brackets is None: - brackets = {} - brackets[current_bracket] = dict() - - if l.startswith('cycles = '): - cycle_count = long(l.split(' = ')[1].strip(), 16) - if current_bracket is not None: - brackets[current_bracket]['cycle_count'] = cycle_count - - if l.startswith('stack = '): - stack_usage = long(l.split(' = ')[1].strip(), 16) - if current_bracket is not None: - brackets[current_bracket]['stack_usage'] = stack_usage - - return dict( - code_size = code_size, - data_size = data_size, - cycle_count = cycle_count, - stack_usage = stack_usage, - brackets = brackets - ) - -def print_table(rows): - header, rows = rows[0], rows[1:] - assert not [True for r in rows if len(r) != len(header)] - widths = [] - for i, h in enumerate(header): - widths.append(max([len(h)] + [len(r[i]) for r in rows])) - - def print_row(row): - print ' | '.join(c + (' ' * (widths[i] - len(c))) for i, c in enumerate(row)) - - print_row(header) - print_row(['-' * w for w in widths]) - for r in rows: - print_row(r) - -results = {} - -for arch in archs: - for test in tests: - inf = extract(arch, test) - if inf: - results.setdefault(arch, {})[test] = inf - -for arch in results.keys(): - if base_test not in results[arch]: - print 'need', base_test, 'results to report for', arch - continue - - base_result = results[arch][base_test] - - for test in results[arch].keys(): - if test == base_test: - continue - - results[arch][test]['code_size'] -= base_result['code_size'] - -def tabulate_aes(arch, block_result, sched_result, table = None): - if table is None: - table = [] - table.append(( - 'Core', - 'Cycles (key schedule + block)', - 'Cycles (key schedule)', - 'Cycles (block)', - 'Stack', - 'Code size' - )) - - table.append( - ( - arch_names[arch], - '%d' % block_result['cycle_count'], - '%d' % sched_result['cycle_count'], - '%d' % (block_result['cycle_count'] - sched_result['cycle_count']), - '%dB' % block_result['stack_usage'], - '%dB' % block_result['code_size'] - )) - - return table - -def print_std(result): - print """* **Cycles**: %(cycle_count)d -* **Stack**: %(stack_usage)dB -* **Code size**: %(code_size)dB -""" % result - -def tabulate_std(arch, result, table = None): - if table is None: - table = [] - table.append(('Core', 'Cycles', 'Stack', 'Code size')) - - table.append( - ( - arch_names[arch], - '%d' % result['cycle_count'], - '%dB' % result['stack_usage'], - '%dB' % result['code_size'] - )) - - return table - -def tabulate(mktab): - table = None - for arch in archs: - if arch not in results: - continue - table = mktab(arch, table) - print_table(table) - -def convert_brackets(metric, tests): - for arch in archs: - arch_result = {} - - # collect results for each test - for t in tests: - if arch not in results or t not in results[arch]: - print 'missing', arch, t - continue - data = results[arch][t]['brackets'] - arch_result[t] = [[b, data[b][metric]] for b in sorted(data.keys())] - - # convert into list of [bracket, test-1, test-2, ...] lists - out = [] - if len(arch_result) == 0: - continue - first_row = arch_result.values()[0] - - for i in range(len(first_row)): - row = [ first_row[i][0] ] - - for k in sorted(arch_result.keys()): - if len(arch_result[k]) != len(first_row): - print 'warn:', 'test', k, 'did not complete?' - rr = arch_result[k][i] - row.append(rr[1]) - - out.append(row) - - print json.dumps(out) - -convert_brackets('cycle_count', - [ - 'aeadperf_norx', - 'aeadperf_aes128gcm', - 'aeadperf_aes128eax', - 'aeadperf_aes128ccm', - 'aeadperf_aes256gcm', - 'aeadperf_aes256eax', - 'aeadperf_aes256ccm', - 'aeadperf_chacha20poly1305' - ]) -convert_brackets('stack_usage', - [ - 'aeadperf_norx', - 'aeadperf_aes128gcm', - 'aeadperf_aes128eax', - 'aeadperf_aes128ccm', - 'aeadperf_aes256gcm', - 'aeadperf_aes256eax', - 'aeadperf_aes256ccm', - 'aeadperf_chacha20poly1305' - ]) - -# screwed if we need other block ciphers -print '###', '128-bit key' -tabulate(lambda arch, table: tabulate_aes(arch, results[arch]['aes128block_test'], results[arch]['aes128sched_test'], table)) -print - -print '###', '256-bit key' -tabulate(lambda arch, table: tabulate_aes(arch, results[arch]['aes256block_test'], results[arch]['aes256sched_test'], table)) -print - -def do_table(title, test): - print '##', title - tabulate(lambda arch, table: tabulate_std(arch, results[arch][test], table)) - print - -do_table('AES128-GCM', 'aes128gcm_test') -do_table('AES128-EAX', 'aes128eax_test') -do_table('AES128-CCM', 'aes128ccm_test') -do_table('NORX32', 'norx_test') -do_table('ChaCha20', 'chacha20_test') -do_table('Salsa20', 'salsa20_test') -do_table('SHA256', 'hashtest_sha256') -do_table('SHA512', 'hashtest_sha512') -do_table('SHA3-256', 'hashtest_sha3_256') -do_table('SHA3-512', 'hashtest_sha3_512') -do_table('HMAC-SHA256', 'hmacsha256_test') -do_table('Poly1305-AES', 'poly1305_test') -do_table('Curve25519', 'curve25519_test') - -if '--aead' in sys.argv: - do_table('AEAD-Shootout: NORX', 'aeadperf_norx') - do_table('AEAD-Shootout: AES-128-GCM', 'aeadperf_aes128gcm') - do_table('AEAD-Shootout: AES-128-EAX', 'aeadperf_aes128eax') - do_table('AEAD-Shootout: AES-128-CCM', 'aeadperf_aes128ccm') - do_table('AEAD-Shootout: AES-256-GCM', 'aeadperf_aes256gcm') - do_table('AEAD-Shootout: AES-256-EAX', 'aeadperf_aes256eax') - do_table('AEAD-Shootout: AES-256-CCM', 'aeadperf_aes256ccm') - do_table('AEAD-Shootout: ChaCha20-Poly1305', 'aeadperf_chacha20poly1305') diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/semihost.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/semihost.c deleted file mode 100644 index cbe5aa2..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/semihost.c +++ /dev/null @@ -1,170 +0,0 @@ -#include <stdint.h> -#include <stdlib.h> -#include <stdarg.h> -#include <string.h> - -#include "semihost.h" - -#define OP_WRITE0 0x04 -#define OP_EXIT 0x18 -#define OP_EXIT_ARG_FAILURE 0x0 -#define OP_EXIT_ARG_SUCCESS 0x20026 - -extern uint32_t semihost(uint32_t, volatile void *); - -__attribute__((noreturn)) -void quit_success(void) -{ - semihost(OP_EXIT, (void *) OP_EXIT_ARG_SUCCESS); - while (1) - ; -} - -__attribute__((noreturn)) -void quit_failure(void) -{ - semihost(OP_EXIT, (void *) OP_EXIT_ARG_FAILURE); - while (1) - ; -} - -void emit(const char *buf) -{ - semihost(OP_WRITE0, (volatile void *) buf); -} - -static void emit_extent(const char *start, const char *end) -{ - char buf[32+1]; - size_t bufmax = sizeof(buf) - 1; - buf[32] = 0; - - size_t bytes = end - start + 1; - - while (bytes >= bufmax) - { - memcpy(buf, start, bufmax); - emit(buf); - bytes -= bufmax; - start += bufmax; - } - - if (bytes == 0) - return; - - memcpy(buf, start, bytes); - buf[bytes] = 0; - emit(buf); -} - -void emitf(const char *fmt, ...) -{ - const char *start = fmt, *end = fmt; - - va_list args; - va_start(args, fmt); - - while (*fmt) - { - switch (*fmt) - { - case '%': - emit_extent(start, end); - - switch (fmt[1]) - { - case '%': - emit("%"); - break; - - case 'u': - emit_uint32(va_arg(args, uint32_t)); - break; - - case 's': - emit(va_arg(args, const char *)); - break; - } - start = end = fmt + 2; - break; - - default: - end = fmt; - break; - } - - fmt++; - } - - va_end(args); - emit_extent(start, end); -} - -static const char *hex_chars = "0123456789abcdef"; - -void emit_hex(const void *ptr, size_t len) -{ - const uint8_t *bb = ptr; - char byte[3]; - - byte[2] = 0; - - for (size_t i = 0; i < len; i++) - { - byte[0] = hex_chars[(bb[i] >> 4) & 0xf]; - byte[1] = hex_chars[bb[i] & 0xf]; - emit(byte); - } -} - -void emit_uint32(uint32_t x) -{ - char buf[sizeof "0x11223344"]; - buf[0] = '0'; - buf[1] = 'x'; - buf[2] = hex_chars[(x >> 28) & 0xf]; - buf[3] = hex_chars[(x >> 24) & 0xf]; - buf[4] = hex_chars[(x >> 20) & 0xf]; - buf[5] = hex_chars[(x >> 16) & 0xf]; - buf[6] = hex_chars[(x >> 12) & 0xf]; - buf[7] = hex_chars[(x >> 8) & 0xf]; - buf[8] = hex_chars[(x >> 4) & 0xf]; - buf[9] = hex_chars[x & 0xf]; - buf[10] = 0; - - emit(buf); -} - -typedef struct -{ - volatile uint32_t ctrl; - volatile uint32_t reload; - volatile uint32_t current; -} systick; - -#define SysTick ((systick *)0xe000e010) - -#define STCTRL_SYSCLOCK 0x04 -#define STCTRL_TICKINT 0x02 -#define STCTRL_ENABLE 0x01 - -#define STCTRL_MAX 0xffffff -#define STCTRL_SHIFT 24 - -extern uint32_t get_ticks(void); -extern void reset_ticks(void); - -uint32_t reset_cycles(void) -{ - SysTick->reload = STCTRL_MAX; - SysTick->ctrl = STCTRL_SYSCLOCK | STCTRL_TICKINT | STCTRL_ENABLE; - SysTick->current = 0; - reset_ticks(); - return get_ticks(); -} - -uint32_t get_cycles(void) -{ - return (get_ticks() << STCTRL_SHIFT) + (STCTRL_MAX - SysTick->current); -} - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/semihost.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/semihost.h deleted file mode 100644 index cf6f01a..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/semihost.h +++ /dev/null @@ -1,40 +0,0 @@ -#ifndef SEMIHOST_H -#define SEMIHOST_H - -#include <stdint.h> -#include <stdlib.h> - -/* Exits emulator with success (or merely hangs). */ -__attribute__((noreturn)) -void quit_success(void); - -/* Exits emulator with failure (or merely hangs). */ -__attribute__((noreturn)) -void quit_failure(void); - -/* Writes zero terminated string to debug output */ -void emit(const char *buf); - -/* Writes a formatting string to debug output. - * - * Supported: - * %u - uint32_t argument, same as emit_uint32 - * %s - const char * argument, same as emit - */ -void emitf(const char *fmt, ...); - -/* Writes hex dump of len bytes at ptr to debug output. */ -void emit_hex(const void *ptr, size_t len); - -/* Writes value v in hex to debug output, in format: - * 0xHHHHHHHH (equivalent to printf 0x%08x). */ -void emit_uint32(uint32_t v); - -/* Reset cycle counter to 0. Returns the current value - * (just after resetting it). */ -uint32_t reset_cycles(void); - -/* Return the value of the cycle counter. */ -uint32_t get_cycles(void); - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/semihost.s b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/semihost.s deleted file mode 100644 index 0fddf04..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/semihost.s +++ /dev/null @@ -1,15 +0,0 @@ - .text - .syntax unified - .global semihost - .func semihost - .thumb_func - -semihost: - /* on entry - * r0 = op - * r1 = arg */ - push {r7, lr} - bkpt 0xab - pop {r7, pc} - - .endfunc diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/unacl/cortex_m0_mpy121666.s b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/unacl/cortex_m0_mpy121666.s deleted file mode 100644 index 49e3b5d..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/unacl/cortex_m0_mpy121666.s +++ /dev/null @@ -1,199 +0,0 @@ -// Implementation of multiplication of an fe25519 bit value with the curve constant 121666. -// -// B. Haase, Endress + Hauser Conducta GmbH & Ko. KG -// public domain. -// -// gnu assembler format. -// -// Generated and tested with C++ functions in the test subdirectory. -// -// ATTENTION: -// Not yet tested on target hardware. - - - .cpu cortex-m0 - .fpu softvfp - .eabi_attribute 20, 1 - .eabi_attribute 21, 1 - .eabi_attribute 23, 3 - .eabi_attribute 24, 1 - .eabi_attribute 25, 1 - .eabi_attribute 26, 1 - .eabi_attribute 30, 2 - .eabi_attribute 34, 0 - .eabi_attribute 18, 4 - .code 16 - - .file "cortex_m0_reduce25519.s" - - .text - .align 2 - - .global fe25519_mpyWith121666_asm - .code 16 - .thumb_func - .type fe25519_mpyWith121666_asm, %function - -fe25519_mpyWith121666_asm: - push {r4,r5,r6,r7,r14} - ldr r7,__label_for_immediate_56130 - ldr r2,[r1,#28] - lsl r5,r2,#16 - lsr r6,r2,#16 - lsr r3,r2,#16 - uxth r2,r2 - mul r2,r7 - mul r3,r7 - add r5,r2 - mov r2,#0 - adc r6,r2 - lsl r2,r3,#16 - lsr r3,r3,#16 - add r5,r2 - adc r6,r3 - lsl r2,r5,#1 - lsr r2,r2,#1 - str r2,[r0,#28] - lsr r5,r5,#31 - lsl r6,r6,#1 - orr r5,r6 - mov r6,#19 - mul r5,r6 - mov r6,#0 - ldr r2,[r1,#0] - lsl r3,r2,#16 - lsr r4,r2,#16 - add r5,r3 - adc r6,r4 - lsr r3,r2,#16 - uxth r2,r2 - mul r2,r7 - mul r3,r7 - add r5,r2 - mov r2,#0 - adc r6,r2 - lsl r2,r3,#16 - lsr r3,r3,#16 - add r5,r2 - adc r6,r3 - str r5,[r0,#0] - mov r5,#0 - ldr r2,[r1,#4] - lsl r3,r2,#16 - lsr r4,r2,#16 - add r6,r3 - adc r5,r4 - lsr r3,r2,#16 - uxth r2,r2 - mul r2,r7 - mul r3,r7 - add r6,r2 - mov r2,#0 - adc r5,r2 - lsl r2,r3,#16 - lsr r3,r3,#16 - add r6,r2 - adc r5,r3 - str r6,[r0,#4] - mov r6,#0 - ldr r2,[r1,#8] - lsl r3,r2,#16 - lsr r4,r2,#16 - add r5,r3 - adc r6,r4 - lsr r3,r2,#16 - uxth r2,r2 - mul r2,r7 - mul r3,r7 - add r5,r2 - mov r2,#0 - adc r6,r2 - lsl r2,r3,#16 - lsr r3,r3,#16 - add r5,r2 - adc r6,r3 - str r5,[r0,#8] - mov r5,#0 - ldr r2,[r1,#12] - lsl r3,r2,#16 - lsr r4,r2,#16 - add r6,r3 - adc r5,r4 - lsr r3,r2,#16 - uxth r2,r2 - mul r2,r7 - mul r3,r7 - add r6,r2 - mov r2,#0 - adc r5,r2 - lsl r2,r3,#16 - lsr r3,r3,#16 - add r6,r2 - adc r5,r3 - str r6,[r0,#12] - mov r6,#0 - ldr r2,[r1,#16] - lsl r3,r2,#16 - lsr r4,r2,#16 - add r5,r3 - adc r6,r4 - lsr r3,r2,#16 - uxth r2,r2 - mul r2,r7 - mul r3,r7 - add r5,r2 - mov r2,#0 - adc r6,r2 - lsl r2,r3,#16 - lsr r3,r3,#16 - add r5,r2 - adc r6,r3 - str r5,[r0,#16] - mov r5,#0 - ldr r2,[r1,#20] - lsl r3,r2,#16 - lsr r4,r2,#16 - add r6,r3 - adc r5,r4 - lsr r3,r2,#16 - uxth r2,r2 - mul r2,r7 - mul r3,r7 - add r6,r2 - mov r2,#0 - adc r5,r2 - lsl r2,r3,#16 - lsr r3,r3,#16 - add r6,r2 - adc r5,r3 - str r6,[r0,#20] - mov r6,#0 - ldr r2,[r1,#24] - lsl r3,r2,#16 - lsr r4,r2,#16 - add r5,r3 - adc r6,r4 - lsr r3,r2,#16 - uxth r2,r2 - mul r2,r7 - mul r3,r7 - add r5,r2 - mov r2,#0 - adc r6,r2 - lsl r2,r3,#16 - lsr r3,r3,#16 - add r5,r2 - adc r6,r3 - str r5,[r0,#24] - mov r5,#0 - ldr r2,[r0,#28] - add r6,r2 - str r6,[r0,#28] - pop {r4,r5,r6,r7,r15} - - .align 2 -__label_for_immediate_56130: - .word 56130 - - .size fe25519_mpyWith121666_asm, .-fe25519_mpyWith121666_asm - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/unacl/cortex_m0_reduce25519.s b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/unacl/cortex_m0_reduce25519.s deleted file mode 100644 index 4c09f5e..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/unacl/cortex_m0_reduce25519.s +++ /dev/null @@ -1,176 +0,0 @@ -// Implementation of a partial reduction modulo 2^255 - 38. -// -// B. Haase, Endress + Hauser Conducta GmbH & Ko. KG -// public domain. -// -// gnu assembler format. -// -// Generated and tested with C++ functions in the test subdirectory and on the target. -// - - .cpu cortex-m0 - .fpu softvfp - .eabi_attribute 20, 1 - .eabi_attribute 21, 1 - .eabi_attribute 23, 3 - .eabi_attribute 24, 1 - .eabi_attribute 25, 1 - .eabi_attribute 26, 1 - .eabi_attribute 30, 2 - .eabi_attribute 34, 0 - .eabi_attribute 18, 4 - .code 16 - - .file "cortex_m0_reduce25519.s" - - .text - .align 2 - - .global fe25519_reduceTo256Bits_asm - .code 16 - .thumb_func - .type fe25519_reduceTo256Bits_asm, %function - -fe25519_reduceTo256Bits_asm: - push {r4,r5,r6,r7,r14} - ldr r2,[r1,#60] - lsr r3,r2,#16 - uxth r2,r2 - mov r7,#38 - mul r2,r7 - mul r3,r7 - ldr r4,[r1,#28] - lsr r5,r3,#16 - lsl r3,r3,#16 - mov r6,#0 - add r4,r2 - adc r5,r6 - add r4,r3 - adc r5,r6 - lsl r2,r4,#1 - lsr r2,r2,#1 - str r2,[r0,#28] - lsr r4,r4,#31 - lsl r5,r5,#1 - orr r4,r5 - mov r2,#19 - mul r2,r4 - ldr r4,[r1,#0] - add r2,r4 - mov r3,#0 - adc r3,r6 - ldr r4,[r1,#32] - lsr r5,r4,#16 - uxth r4,r4 - mul r5,r7 - mul r4,r7 - add r2,r4 - adc r3,r6 - lsl r4,r5,#16 - lsr r5,r5,#16 - add r2,r4 - adc r3,r5 - str r2,[r0,#0] - ldr r4,[r1,#4] - add r3,r4 - mov r2,#0 - adc r2,r6 - ldr r4,[r1,#36] - lsr r5,r4,#16 - uxth r4,r4 - mul r5,r7 - mul r4,r7 - add r3,r4 - adc r2,r6 - lsl r4,r5,#16 - lsr r5,r5,#16 - add r3,r4 - adc r2,r5 - str r3,[r0,#4] - ldr r4,[r1,#8] - add r2,r4 - mov r3,#0 - adc r3,r6 - ldr r4,[r1,#40] - lsr r5,r4,#16 - uxth r4,r4 - mul r5,r7 - mul r4,r7 - add r2,r4 - adc r3,r6 - lsl r4,r5,#16 - lsr r5,r5,#16 - add r2,r4 - adc r3,r5 - str r2,[r0,#8] - ldr r4,[r1,#12] - add r3,r4 - mov r2,#0 - adc r2,r6 - ldr r4,[r1,#44] - lsr r5,r4,#16 - uxth r4,r4 - mul r5,r7 - mul r4,r7 - add r3,r4 - adc r2,r6 - lsl r4,r5,#16 - lsr r5,r5,#16 - add r3,r4 - adc r2,r5 - str r3,[r0,#12] - ldr r4,[r1,#16] - add r2,r4 - mov r3,#0 - adc r3,r6 - ldr r4,[r1,#48] - lsr r5,r4,#16 - uxth r4,r4 - mul r5,r7 - mul r4,r7 - add r2,r4 - adc r3,r6 - lsl r4,r5,#16 - lsr r5,r5,#16 - add r2,r4 - adc r3,r5 - str r2,[r0,#16] - ldr r4,[r1,#20] - add r3,r4 - mov r2,#0 - adc r2,r6 - ldr r4,[r1,#52] - lsr r5,r4,#16 - uxth r4,r4 - mul r5,r7 - mul r4,r7 - add r3,r4 - adc r2,r6 - lsl r4,r5,#16 - lsr r5,r5,#16 - add r3,r4 - adc r2,r5 - str r3,[r0,#20] - ldr r4,[r1,#24] - add r2,r4 - mov r3,#0 - adc r3,r6 - ldr r4,[r1,#56] - lsr r5,r4,#16 - uxth r4,r4 - mul r5,r7 - mul r4,r7 - add r2,r4 - adc r3,r6 - lsl r4,r5,#16 - lsr r5,r5,#16 - add r2,r4 - adc r3,r5 - str r2,[r0,#24] - ldr r4,[r0,#28] - add r4,r3 - str r4,[r0,#28] - pop {r4,r5,r6,r7,r15} - - .size fe25519_reduceTo256Bits_asm, .-fe25519_reduceTo256Bits_asm - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/unacl/mul.s b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/unacl/mul.s deleted file mode 100644 index 155674c..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/unacl/mul.s +++ /dev/null @@ -1,1109 +0,0 @@ - .align 2 - .global multiply256x256_asm - .type multiply256x256_asm, %function -multiply256x256_asm: - push {r4-r7,lr} - mov r3, r8 - mov r4, r9 - mov r5, r10 - mov r6, r11 - push {r0-r6} - mov r12, r0 - mov r10, r2 - mov r11, r1 - mov r0,r2 - ldm r0!, {r4,r5,r6,r7} - ldm r1!, {r2,r3,r6,r7} - push {r0,r1} - /////////BEGIN LOW PART ////////////////////// - /////////MUL128///////////// - //MUL64 - mov r6, r5 - mov r1, r2 - sub r5, r4 - sbc r0, r0 - eor r5, r0 - sub r5, r0 - sub r1, r3 - sbc r7, r7 - eor r1, r7 - sub r1, r7 - eor r7, r0 - mov r9, r1 - mov r8, r5 - lsr r1,r4,#16 - uxth r4,r4 - mov r0,r4 - uxth r5,r2 - lsr r2,#16 - mul r0,r5//00 - mul r5,r1//10 - mul r4,r2//01 - mul r1,r2//11 - lsl r2,r4,#16 - lsr r4,r4,#16 - add r0,r2 - adc r1,r4 - lsl r2,r5,#16 - lsr r4,r5,#16 - add r0,r2 - adc r1,r4 - lsr r4, r6,#16 - uxth r6, r6 - uxth r5, r3 - lsr r3, r3, #16 - mov r2, r6 - mul r2, r5 - mul r5, r4 - mul r6, r3 - mul r3, r4 - lsl r4,r5,#16 - lsr r5,r5,#16 - add r2,r4 - adc r3,r5 - lsl r4,r6,#16 - lsr r5,r6,#16 - add r2,r4 - adc r3,r5 - eor r6, r6 - add r2, r1 - adc r3, r6 - mov r1, r9 - mov r5, r8 - mov r8, r0 - lsr r0, r1,#16 - uxth r1,r1 - mov r4,r1 - lsr r6,r5,#16 - uxth r5,r5 - mul r1,r5 - mul r4,r6 - mul r5,r0 - mul r0,r6 - lsl r6,r4,#16 - lsr r4,#16 - add r1,r6 - adc r0,r4 - lsl r6,r5,#16 - lsr r5,#16 - add r1,r6 - adc r0,r5 - eor r1,r7 - eor r0,r7 - eor r4, r4 - asr r7, r7, #1 - adc r1, r2 - adc r2, r0 - adc r7, r4 - mov r0, r8 - add r1, r0 - adc r2, r3 - adc r3, r7 - ////////////////////////// - mov r4, r12 - stm r4!, {r0,r1} - push {r4} - push {r0,r1} - mov r1, r10 - mov r10, r2 - ldm r1, {r0, r1, r4, r5} - mov r2, r4 - mov r7, r5 - sub r2, r0 - sbc r7, r1 - sbc r6, r6 - eor r2, r6 - eor r7, r6 - sub r2, r6 - sbc r7, r6 - push {r2, r7} - mov r2, r11 - mov r11, r3 - ldm r2, {r0, r1, r2, r3} - sub r0, r2 - sbc r1, r3 - sbc r7, r7 - eor r0, r7 - eor r1, r7 - sub r0, r7 - sbc r1, r7 - eor r7, r6 - mov r12, r7 - push {r0, r1} - //MUL64 - mov r6, r5 - mov r1, r2 - sub r5, r4 - sbc r0, r0 - eor r5, r0 - sub r5, r0 - sub r1, r3 - sbc r7, r7 - eor r1, r7 - sub r1, r7 - eor r7, r0 - mov r9, r1 - mov r8, r5 - lsr r1,r4,#16 - uxth r4,r4 - mov r0,r4 - uxth r5,r2 - lsr r2,#16 - mul r0,r5//00 - mul r5,r1//10 - mul r4,r2//01 - mul r1,r2//11 - lsl r2,r4,#16 - lsr r4,r4,#16 - add r0,r2 - adc r1,r4 - lsl r2,r5,#16 - lsr r4,r5,#16 - add r0,r2 - adc r1,r4 - lsr r4, r6,#16 - uxth r6, r6 - uxth r5, r3 - lsr r3, r3, #16 - mov r2, r6 - mul r2, r5 - mul r5, r4 - mul r6, r3 - mul r3, r4 - lsl r4,r5,#16 - lsr r5,r5,#16 - add r2,r4 - adc r3,r5 - lsl r4,r6,#16 - lsr r5,r6,#16 - add r2,r4 - adc r3,r5 - eor r6, r6 - add r2, r1 - adc r3, r6 - mov r1, r9 - mov r5, r8 - mov r8, r0 - lsr r0, r1,#16 - uxth r1,r1 - mov r4,r1 - lsr r6,r5,#16 - uxth r5,r5 - mul r1,r5 - mul r4,r6 - mul r5,r0 - mul r0,r6 - lsl r6,r4,#16 - lsr r4,#16 - add r1,r6 - adc r0,r4 - lsl r6,r5,#16 - lsr r5,#16 - add r1,r6 - adc r0,r5 - eor r1,r7 - eor r0,r7 - eor r4, r4 - asr r7, r7, #1 - adc r1, r2 - adc r2, r0 - adc r7, r4 - mov r0, r8 - add r1, r0 - adc r2, r3 - adc r3, r7 - mov r4, r10 - mov r5, r11 - eor r6, r6 - add r0, r4 - adc r1, r5 - adc r2, r6 - adc r3, r6 - mov r10, r2 - mov r11, r3 - pop {r2-r5} - push {r0, r1} - mov r6, r5 - mov r1, r2 - sub r5, r4 - sbc r0, r0 - eor r5, r0 - sub r5, r0 - sub r1, r3 - sbc r7, r7 - eor r1, r7 - sub r1, r7 - eor r7, r0 - mov r9, r1 - mov r8, r5 - lsr r1,r4,#16 - uxth r4,r4 - mov r0,r4 - uxth r5,r2 - lsr r2,#16 - mul r0,r5//00 - mul r5,r1//10 - mul r4,r2//01 - mul r1,r2//11 - lsl r2,r4,#16 - lsr r4,r4,#16 - add r0,r2 - adc r1,r4 - lsl r2,r5,#16 - lsr r4,r5,#16 - add r0,r2 - adc r1,r4 - lsr r4, r6,#16 - uxth r6, r6 - uxth r5, r3 - lsr r3, r3, #16 - mov r2, r6 - mul r2, r5 - mul r5, r4 - mul r6, r3 - mul r3, r4 - lsl r4,r5,#16 - lsr r5,r5,#16 - add r2,r4 - adc r3,r5 - lsl r4,r6,#16 - lsr r5,r6,#16 - add r2,r4 - adc r3,r5 - eor r6, r6 - add r2, r1 - adc r3, r6 - mov r1, r9 - mov r5, r8 - mov r8, r0 - lsr r0, r1,#16 - uxth r1,r1 - mov r4,r1 - lsr r6,r5,#16 - uxth r5,r5 - mul r1,r5 - mul r4,r6 - mul r5,r0 - mul r0,r6 - lsl r6,r4,#16 - lsr r4,#16 - add r1,r6 - adc r0,r4 - lsl r6,r5,#16 - lsr r5,#16 - add r1,r6 - adc r0,r5 - eor r1,r7 - eor r0,r7 - eor r4, r4 - asr r7, r7, #1 - adc r1, r2 - adc r2, r0 - adc r7, r4 - mov r0, r8 - add r1, r0 - adc r2, r3 - adc r3, r7 - pop {r4, r5} - mov r6, r12 - mov r7, r12 - eor r0, r6 - eor r1, r6 - eor r2, r6 - eor r3, r6 - asr r6, r6, #1 - adc r0, r4 - adc r1, r5 - adc r4, r2 - adc r5, r3 - eor r2, r2 - adc r6,r2 - adc r7,r2 - pop {r2, r3} - mov r8, r2 - mov r9, r3 - add r2, r0 - adc r3, r1 - mov r0, r10 - mov r1, r11 - adc r4, r0 - adc r5, r1 - adc r6, r0 - adc r7, r1 - ////////END LOW PART///////////////////// - pop {r0} - stm r0!, {r2,r3} - pop {r1,r2} - push {r0} - push {r4-r7} - mov r10, r1 - mov r11, r2 - ldm r1!, {r4, r5} - ldm r2, {r2, r3} - /////////BEGIN HIGH PART//////////////// - /////////MUL128///////////// - //MUL64 - mov r6, r5 - mov r1, r2 - sub r5, r4 - sbc r0, r0 - eor r5, r0 - sub r5, r0 - sub r1, r3 - sbc r7, r7 - eor r1, r7 - sub r1, r7 - eor r7, r0 - mov r9, r1 - mov r8, r5 - lsr r1,r4,#16 - uxth r4,r4 - mov r0,r4 - uxth r5,r2 - lsr r2,#16 - mul r0,r5//00 - mul r5,r1//10 - mul r4,r2//01 - mul r1,r2//11 - lsl r2,r4,#16 - lsr r4,r4,#16 - add r0,r2 - adc r1,r4 - lsl r2,r5,#16 - lsr r4,r5,#16 - add r0,r2 - adc r1,r4 - lsr r4, r6,#16 - uxth r6, r6 - uxth r5, r3 - lsr r3, r3, #16 - mov r2, r6 - mul r2, r5 - mul r5, r4 - mul r6, r3 - mul r3, r4 - lsl r4,r5,#16 - lsr r5,r5,#16 - add r2,r4 - adc r3,r5 - lsl r4,r6,#16 - lsr r5,r6,#16 - add r2,r4 - adc r3,r5 - eor r6, r6 - add r2, r1 - adc r3, r6 - mov r1, r9 - mov r5, r8 - mov r8, r0 - lsr r0, r1,#16 - uxth r1,r1 - mov r4,r1 - lsr r6,r5,#16 - uxth r5,r5 - mul r1,r5 - mul r4,r6 - mul r5,r0 - mul r0,r6 - lsl r6,r4,#16 - lsr r4,#16 - add r1,r6 - adc r0,r4 - lsl r6,r5,#16 - lsr r5,#16 - add r1,r6 - adc r0,r5 - eor r1,r7 - eor r0,r7 - eor r4, r4 - asr r7, r7, #1 - adc r1, r2 - adc r2, r0 - adc r7, r4 - mov r0, r8 - add r1, r0 - adc r2, r3 - adc r3, r7 - push {r0,r1} - mov r1, r10 - mov r10, r2 - ldm r1, {r0, r1, r4, r5} - mov r2, r4 - mov r7, r5 - sub r2, r0 - sbc r7, r1 - sbc r6, r6 - eor r2, r6 - eor r7, r6 - sub r2, r6 - sbc r7, r6 - push {r2, r7} - mov r2, r11 - mov r11, r3 - ldm r2, {r0, r1, r2, r3} - sub r0, r2 - sbc r1, r3 - sbc r7, r7 - eor r0, r7 - eor r1, r7 - sub r0, r7 - sbc r1, r7 - eor r7, r6 - mov r12, r7 - push {r0, r1} - //MUL64 - mov r6, r5 - mov r1, r2 - sub r5, r4 - sbc r0, r0 - eor r5, r0 - sub r5, r0 - sub r1, r3 - sbc r7, r7 - eor r1, r7 - sub r1, r7 - eor r7, r0 - mov r9, r1 - mov r8, r5 - lsr r1,r4,#16 - uxth r4,r4 - mov r0,r4 - uxth r5,r2 - lsr r2,#16 - mul r0,r5//00 - mul r5,r1//10 - mul r4,r2//01 - mul r1,r2//11 - lsl r2,r4,#16 - lsr r4,r4,#16 - add r0,r2 - adc r1,r4 - lsl r2,r5,#16 - lsr r4,r5,#16 - add r0,r2 - adc r1,r4 - lsr r4, r6,#16 - uxth r6, r6 - uxth r5, r3 - lsr r3, r3, #16 - mov r2, r6 - mul r2, r5 - mul r5, r4 - mul r6, r3 - mul r3, r4 - lsl r4,r5,#16 - lsr r5,r5,#16 - add r2,r4 - adc r3,r5 - lsl r4,r6,#16 - lsr r5,r6,#16 - add r2,r4 - adc r3,r5 - eor r6, r6 - add r2, r1 - adc r3, r6 - mov r1, r9 - mov r5, r8 - mov r8, r0 - lsr r0, r1,#16 - uxth r1,r1 - mov r4,r1 - lsr r6,r5,#16 - uxth r5,r5 - mul r1,r5 - mul r4,r6 - mul r5,r0 - mul r0,r6 - lsl r6,r4,#16 - lsr r4,#16 - add r1,r6 - adc r0,r4 - lsl r6,r5,#16 - lsr r5,#16 - add r1,r6 - adc r0,r5 - eor r1,r7 - eor r0,r7 - eor r4, r4 - asr r7, r7, #1 - adc r1, r2 - adc r2, r0 - adc r7, r4 - mov r0, r8 - add r1, r0 - adc r2, r3 - adc r3, r7 - mov r4, r10 - mov r5, r11 - eor r6, r6 - add r0, r4 - adc r1, r5 - adc r2, r6 - adc r3, r6 - mov r10, r2 - mov r11, r3 - pop {r2-r5} - push {r0, r1} - mov r6, r5 - mov r1, r2 - sub r5, r4 - sbc r0, r0 - eor r5, r0 - sub r5, r0 - sub r1, r3 - sbc r7, r7 - eor r1, r7 - sub r1, r7 - eor r7, r0 - mov r9, r1 - mov r8, r5 - lsr r1,r4,#16 - uxth r4,r4 - mov r0,r4 - uxth r5,r2 - lsr r2,#16 - mul r0,r5//00 - mul r5,r1//10 - mul r4,r2//01 - mul r1,r2//11 - lsl r2,r4,#16 - lsr r4,r4,#16 - add r0,r2 - adc r1,r4 - lsl r2,r5,#16 - lsr r4,r5,#16 - add r0,r2 - adc r1,r4 - lsr r4, r6,#16 - uxth r6, r6 - uxth r5, r3 - lsr r3, r3, #16 - mov r2, r6 - mul r2, r5 - mul r5, r4 - mul r6, r3 - mul r3, r4 - lsl r4,r5,#16 - lsr r5,r5,#16 - add r2,r4 - adc r3,r5 - lsl r4,r6,#16 - lsr r5,r6,#16 - add r2,r4 - adc r3,r5 - eor r6, r6 - add r2, r1 - adc r3, r6 - mov r1, r9 - mov r5, r8 - mov r8, r0 - lsr r0, r1,#16 - uxth r1,r1 - mov r4,r1 - lsr r6,r5,#16 - uxth r5,r5 - mul r1,r5 - mul r4,r6 - mul r5,r0 - mul r0,r6 - lsl r6,r4,#16 - lsr r4,#16 - add r1,r6 - adc r0,r4 - lsl r6,r5,#16 - lsr r5,#16 - add r1,r6 - adc r0,r5 - eor r1,r7 - eor r0,r7 - eor r4, r4 - asr r7, r7, #1 - adc r1, r2 - adc r2, r0 - adc r7, r4 - mov r0, r8 - add r1, r0 - adc r2, r3 - adc r3, r7 - pop {r4, r5} - mov r6, r12 - mov r7, r12 - eor r0, r6 - eor r1, r6 - eor r2, r6 - eor r3, r6 - asr r6, r6, #1 - adc r0, r4 - adc r1, r5 - adc r4, r2 - adc r5, r3 - eor r2, r2 - adc r6,r2 //0,1 - adc r7,r2 - pop {r2, r3} - mov r8, r2 - mov r9, r3 - add r2, r0 - adc r3, r1 - mov r0, r10 - mov r1, r11 - adc r4, r0 - adc r5, r1 - adc r6, r0 - adc r7, r1 - ////////END HIGH PART///////////////////// - mov r0, r8 - mov r1, r9 - mov r8, r6 - mov r9, r7 - pop {r6, r7} - add r0, r6 - adc r1, r7 - pop {r6, r7} - adc r2, r6 - adc r3, r7 - pop {r7} - stm r7!, {r0-r3} - mov r10, r7 - eor r0,r0 - mov r6, r8 - mov r7, r9 - adc r4, r0 - adc r5, r0 - adc r6, r0 - adc r7, r0 - pop {r0,r1,r2} - mov r12, r2 - push {r0, r4-r7} - ldm r1, {r0-r7} - sub r0, r4 - sbc r1, r5 - sbc r2, r6 - sbc r3, r7 - eor r4, r4 - sbc r4, r4 - eor r0, r4 - eor r1, r4 - eor r2, r4 - eor r3, r4 - sub r0, r4 - sbc r1, r4 - sbc r2, r4 - sbc r3, r4 - mov r6, r12 - mov r12, r4 //carry - mov r5, r10 - stm r5!, {r0-r3} - mov r11, r5 - mov r8, r0 - mov r9, r1 - ldm r6, {r0-r7} - sub r4, r0 - sbc r5, r1 - sbc r6, r2 - sbc r7, r3 - eor r0, r0 - sbc r0, r0 - eor r4, r0 - eor r5, r0 - eor r6, r0 - eor r7, r0 - sub r4, r0 - sbc r5, r0 - sbc r6, r0 - sbc r7, r0 - mov r1, r12 - eor r0, r1 - mov r1, r11 - stm r1!, {r4-r7} - push {r0} - mov r2, r8 - mov r3, r9 - /////////BEGIN MIDDLE PART//////////////// - /////////MUL128///////////// - //MUL64 - mov r6, r5 - mov r1, r2 - sub r5, r4 - sbc r0, r0 - eor r5, r0 - sub r5, r0 - sub r1, r3 - sbc r7, r7 - eor r1, r7 - sub r1, r7 - eor r7, r0 - mov r9, r1 - mov r8, r5 - lsr r1,r4,#16 - uxth r4,r4 - mov r0,r4 - uxth r5,r2 - lsr r2,#16 - mul r0,r5//00 - mul r5,r1//10 - mul r4,r2//01 - mul r1,r2//11 - lsl r2,r4,#16 - lsr r4,r4,#16 - add r0,r2 - adc r1,r4 - lsl r2,r5,#16 - lsr r4,r5,#16 - add r0,r2 - adc r1,r4 - lsr r4, r6,#16 - uxth r6, r6 - uxth r5, r3 - lsr r3, r3, #16 - mov r2, r6 - mul r2, r5 - mul r5, r4 - mul r6, r3 - mul r3, r4 - lsl r4,r5,#16 - lsr r5,r5,#16 - add r2,r4 - adc r3,r5 - lsl r4,r6,#16 - lsr r5,r6,#16 - add r2,r4 - adc r3,r5 - eor r6, r6 - add r2, r1 - adc r3, r6 - mov r1, r9 - mov r5, r8 - mov r8, r0 - lsr r0, r1,#16 - uxth r1,r1 - mov r4,r1 - lsr r6,r5,#16 - uxth r5,r5 - mul r1,r5 - mul r4,r6 - mul r5,r0 - mul r0,r6 - lsl r6,r4,#16 - lsr r4,#16 - add r1,r6 - adc r0,r4 - lsl r6,r5,#16 - lsr r5,#16 - add r1,r6 - adc r0,r5 - eor r1,r7 - eor r0,r7 - eor r4, r4 - asr r7, r7, #1 - adc r1, r2 - adc r2, r0 - adc r7, r4 - mov r0, r8 - add r1, r0 - adc r2, r3 - adc r3, r7 - push {r0,r1} - mov r1, r10 - mov r10, r2 - ldm r1, {r0, r1, r4, r5} - mov r2, r4 - mov r7, r5 - sub r2, r0 - sbc r7, r1 - sbc r6, r6 - eor r2, r6 - eor r7, r6 - sub r2, r6 - sbc r7, r6 - push {r2, r7} - mov r2, r11 - mov r11, r3 - ldm r2, {r0, r1, r2, r3} - sub r0, r2 - sbc r1, r3 - sbc r7, r7 - eor r0, r7 - eor r1, r7 - sub r0, r7 - sbc r1, r7 - eor r7, r6 - mov r12, r7 - push {r0, r1} - //MUL64 - mov r6, r5 - mov r1, r2 - sub r5, r4 - sbc r0, r0 - eor r5, r0 - sub r5, r0 - sub r1, r3 - sbc r7, r7 - eor r1, r7 - sub r1, r7 - eor r7, r0 - mov r9, r1 - mov r8, r5 - lsr r1,r4,#16 - uxth r4,r4 - mov r0,r4 - uxth r5,r2 - lsr r2,#16 - mul r0,r5//00 - mul r5,r1//10 - mul r4,r2//01 - mul r1,r2//11 - lsl r2,r4,#16 - lsr r4,r4,#16 - add r0,r2 - adc r1,r4 - lsl r2,r5,#16 - lsr r4,r5,#16 - add r0,r2 - adc r1,r4 - lsr r4, r6,#16 - uxth r6, r6 - uxth r5, r3 - lsr r3, r3, #16 - mov r2, r6 - mul r2, r5 - mul r5, r4 - mul r6, r3 - mul r3, r4 - lsl r4,r5,#16 - lsr r5,r5,#16 - add r2,r4 - adc r3,r5 - lsl r4,r6,#16 - lsr r5,r6,#16 - add r2,r4 - adc r3,r5 - eor r6, r6 - add r2, r1 - adc r3, r6 - mov r1, r9 - mov r5, r8 - mov r8, r0 - lsr r0, r1,#16 - uxth r1,r1 - mov r4,r1 - lsr r6,r5,#16 - uxth r5,r5 - mul r1,r5 - mul r4,r6 - mul r5,r0 - mul r0,r6 - lsl r6,r4,#16 - lsr r4,#16 - add r1,r6 - adc r0,r4 - lsl r6,r5,#16 - lsr r5,#16 - add r1,r6 - adc r0,r5 - eor r1,r7 - eor r0,r7 - eor r4, r4 - asr r7, r7, #1 - adc r1, r2 - adc r2, r0 - adc r7, r4 - mov r0, r8 - add r1, r0 - adc r2, r3 - adc r3, r7 - mov r4, r10 - mov r5, r11 - eor r6, r6 - add r0, r4 - adc r1, r5 - adc r2, r6 - adc r3, r6 - mov r10, r2 - mov r11, r3 - pop {r2-r5} - push {r0, r1} - mov r6, r5 - mov r1, r2 - sub r5, r4 - sbc r0, r0 - eor r5, r0 - sub r5, r0 - sub r1, r3 - sbc r7, r7 - eor r1, r7 - sub r1, r7 - eor r7, r0 - mov r9, r1 - mov r8, r5 - lsr r1,r4,#16 - uxth r4,r4 - mov r0,r4 - uxth r5,r2 - lsr r2,#16 - mul r0,r5//00 - mul r5,r1//10 - mul r4,r2//01 - mul r1,r2//11 - lsl r2,r4,#16 - lsr r4,r4,#16 - add r0,r2 - adc r1,r4 - lsl r2,r5,#16 - lsr r4,r5,#16 - add r0,r2 - adc r1,r4 - lsr r4, r6,#16 - uxth r6, r6 - uxth r5, r3 - lsr r3, r3, #16 - mov r2, r6 - mul r2, r5 - mul r5, r4 - mul r6, r3 - mul r3, r4 - lsl r4,r5,#16 - lsr r5,r5,#16 - add r2,r4 - adc r3,r5 - lsl r4,r6,#16 - lsr r5,r6,#16 - add r2,r4 - adc r3,r5 - eor r6, r6 - add r2, r1 - adc r3, r6 - mov r1, r9 - mov r5, r8 - mov r8, r0 - lsr r0, r1,#16 - uxth r1,r1 - mov r4,r1 - lsr r6,r5,#16 - uxth r5,r5 - mul r1,r5 - mul r4,r6 - mul r5,r0 - mul r0,r6 - lsl r6,r4,#16 - lsr r4,#16 - add r1,r6 - adc r0,r4 - lsl r6,r5,#16 - lsr r5,#16 - add r1,r6 - adc r0,r5 - eor r1,r7 - eor r0,r7 - eor r4, r4 - asr r7, r7, #1 - adc r1, r2 - adc r2, r0 - adc r7, r4 - mov r0, r8 - add r1, r0 - adc r2, r3 - adc r3, r7 - pop {r4, r5} - mov r6, r12 - mov r7, r12 - eor r0, r6 - eor r1, r6 - eor r2, r6 - eor r3, r6 - asr r6, r6, #1 - adc r0, r4 - adc r1, r5 - adc r4, r2 - adc r5, r3 - eor r2, r2 - adc r6,r2 //0,1 - adc r7,r2 - pop {r2, r3} - mov r8, r2 - mov r9, r3 - add r2, r0 - adc r3, r1 - mov r0, r10 - mov r1, r11 - adc r4, r0 - adc r5, r1 - adc r6, r0 - adc r7, r1 - //////////END MIDDLE PART//////////////// - pop {r0,r1} //r0,r1 - mov r12, r0 //negative - eor r2, r0 - eor r3, r0 - eor r4, r0 - eor r5, r0 - eor r6, r0 - eor r7, r0 - push {r4-r7} - ldm r1!, {r4-r7} - mov r11, r1 //reference - mov r1, r9 - eor r1, r0 - mov r10, r4 - mov r4, r8 - asr r0, #1 - eor r0, r4 - mov r4, r10 - adc r0, r4 - adc r1, r5 - adc r2, r6 - adc r3, r7 - eor r4, r4 - adc r4, r4 - mov r10, r4 //carry - mov r4, r11 - ldm r4, {r4-r7} - add r0, r4 - adc r1, r5 - adc r2, r6 - adc r3, r7 - mov r9, r4 - mov r4, r11 - stm r4!, {r0-r3} - mov r11, r4 - pop {r0-r3} - mov r4, r9 - adc r4, r0 - adc r5, r1 - adc r6, r2 - adc r7, r3 - mov r1, #0 - adc r1, r1 - mov r0, r10 - mov r10, r1 //carry - asr r0, #1 - pop {r0-r3} - adc r4, r0 - adc r5, r1 - adc r6, r2 - adc r7, r3 - mov r8, r0 - mov r0, r11 - stm r0!, {r4-r7} - mov r11, r0 - mov r0, r8 - mov r6, r12 - mov r5, r10 - eor r4, r4 - adc r5, r6 - adc r6, r4 - add r0, r5 - adc r1, r6 - adc r2, r6 - adc r3, r6 - mov r7, r11 - stm r7!, {r0-r3} - pop {r3-r6} - mov r8, r3 - mov r9, r4 - mov r10, r5 - mov r11, r6 - pop {r4-r7,pc} - bx lr -.size multiply256x256_asm, .-multiply256x256_asm - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/unacl/scalarmult.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/unacl/scalarmult.c deleted file mode 100644 index 488aac7..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/unacl/scalarmult.c +++ /dev/null @@ -1,761 +0,0 @@ -/* ======================= - ============================ C/C++ HEADER FILE ============================= - ======================= - - Collection of all required submodules from naclM0 required for curve25519 - scalar multiplication (not including randomization, etc.) alone. - - Library naclM0 largely bases on work avrNacl of M. Hutter and P. Schwabe. - - Will compile to the two functions - - int - crypto_scalarmult_base_curve25519( - unsigned char* q, - const unsigned char* n - ); - - int - crypto_scalarmult_curve25519 ( - unsigned char* r, - const unsigned char* s, - const unsigned char* p - ); - - Requires inttypes.h header and the four external assembly functions - - extern void - fe25519_reduceTo256Bits_asm ( - fe25519 *res, - const UN_512bitValue *in - ); - - extern void - fe25519_mpyWith121666_asm ( - fe25519* out, - const fe25519* in - ); - - extern void - multiply256x256_asm ( - UN_512bitValue* result, - const UN_256bitValue* x, - const UN_256bitValue* y - ); - - extern void - square256_asm ( - UN_512bitValue* result, - const UN_256bitValue* x - ); - - \file scalarmult.c - - \Author B. Haase, Endress + Hauser Conducta GmbH & Co. KG - - License: CC Common Creative license Attribution 4.0 International (CC BY 4.0) - http://creativecommons.org/licenses/by/4.0/ - ============================================================================*/ - -#include <inttypes.h> - -// comment out this line if implementing conditional swaps by data moves -//#define DH_SWAP_BY_POINTERS - -// Define the symbol to 0 in order to only use ladder steps -//#define DH_REPLACE_LAST_THREE_LADDERSTEPS_WITH_DOUBLINGS 1 - -typedef uint8_t uint8; -typedef uint16_t uint16; -typedef uint32_t uint32; -typedef uint64_t uint64; -typedef uintptr_t uintptr; - -typedef int8_t int8; -typedef int16_t int16; -typedef int32_t int32; -typedef int64_t int64; -typedef intptr_t intptr; - -// Note that it's important to define the unit8 as first union member, so that -// an array of uint8 may be used as initializer. -typedef union UN_256bitValue_ -{ - uint8 as_uint8[32]; - uint16 as_uint16[16]; - uint32 as_uint32[8]; - uint64 as_uint64[4]; -} UN_256bitValue; - -// Note that it's important to define the unit8 as first union member, so that -// an array of uint8 may be used as initializer. -typedef union UN_512bitValue_ -{ - uint8 as_uint8[64]; - uint16 as_uint16[32]; - uint32 as_uint32[16]; - uint64 as_uint64[8]; - UN_256bitValue as_256_bitValue[2]; -} UN_512bitValue; - -typedef UN_256bitValue fe25519; - -// **************************************************** -// Assembly functions. -// **************************************************** - -extern void -fe25519_reduceTo256Bits_asm( - fe25519 *res, - const UN_512bitValue *in -); - -#define fe25519_mpyWith121666 fe25519_mpyWith121666_asm -extern void -fe25519_mpyWith121666_asm ( - fe25519* out, - const fe25519* in -); - -#define multiply256x256 multiply256x256_asm -extern void -multiply256x256( - UN_512bitValue* result, - const UN_256bitValue* x, - const UN_256bitValue* y -); - -#define square256 square256_asm -extern void -square256( - UN_512bitValue* result, - const UN_256bitValue* x -); - -// **************************************************** -// C functions for fe25519 -// **************************************************** - -static void -fe25519_cpy( - fe25519* dest, - const fe25519* source -) -{ - uint32 ctr; - - for (ctr = 0; ctr < 8; ctr++) - { - dest->as_uint32[ctr] = source->as_uint32[ctr]; - } -} - -static void -fe25519_unpack( - volatile fe25519* out, - const unsigned char in[32] -) -{ - uint8 ctr; - - for (ctr = 0; ctr < 32; ctr++) - { - out->as_uint8[ctr] = in[ctr]; - } - out->as_uint8[31] &= 0x7f; // make sure that the last bit is cleared. -} - -static void -fe25519_sub( - fe25519* out, - const fe25519* baseValue, - const fe25519* valueToSubstract -) -{ - uint16 ctr; - int64 accu = 0; - - // First subtract the most significant word, so that we may - // reduce the result "on the fly". - accu = baseValue->as_uint32[7]; - accu -= valueToSubstract->as_uint32[7]; - - // We always set bit #31, and compensate this by subtracting 1 from the reduction - // value. - out->as_uint32[7] = ((uint32)accu) | 0x80000000ul; - - accu = 19 * ((int32)(accu >> 31) - 1); - // ^ "-1" is the compensation for the "| 0x80000000ul" above. - // This choice makes sure, that the result will be positive! - - for (ctr = 0; ctr < 7; ctr += 1) - { - accu += baseValue->as_uint32[ctr]; - accu -= valueToSubstract->as_uint32[ctr]; - - out->as_uint32[ctr] = (uint32)accu; - accu >>= 32; - } - accu += out->as_uint32[7]; - out->as_uint32[7] = (uint32)accu; -} - -static void -fe25519_add( - fe25519* out, - const fe25519* baseValue, - const fe25519* valueToAdd -) -{ - uint16 ctr = 0; - uint64 accu = 0; - - // We first add the most significant word, so that we may reduce - // "on the fly". - accu = baseValue->as_uint32[7]; - accu += valueToAdd->as_uint32[7]; - out->as_uint32[7] = ((uint32)accu) & 0x7ffffffful; - - accu = ((uint32)(accu >> 31)) * 19; - - for (ctr = 0; ctr < 7; ctr += 1) - { - accu += baseValue->as_uint32[ctr]; - accu += valueToAdd->as_uint32[ctr]; - - out->as_uint32[ctr] = (uint32)accu; - accu >>= 32; - } - accu += out->as_uint32[7]; - out->as_uint32[7] = (uint32)accu; -} - -static void -fe25519_mul( - fe25519* result, - const fe25519* in1, - const fe25519* in2 -) -{ - UN_512bitValue tmp; - - multiply256x256(&tmp, in1, in2); - fe25519_reduceTo256Bits_asm(result,&tmp); -} - -static void -fe25519_square( - fe25519* result, - const fe25519* in -) -{ - UN_512bitValue tmp; - - square256(&tmp, in); - fe25519_reduceTo256Bits_asm(result,&tmp); -} - -static void -fe25519_reduceCompletely( - volatile fe25519* inout -) -{ - uint32 numberOfTimesToSubstractPrime; - uint32 initialGuessForNumberOfTimesToSubstractPrime = inout->as_uint32[7] >> - 31; - uint64 accu; - uint8 ctr; - - // add one additional 19 to the estimated number of reductions. - // Do the calculation without writing back the results to memory. - // - // The initial guess of required numbers of reductions is based - // on bit #32 of the most significant word. - // This initial guess may be wrong, since we might have a value - // v in the range - // 2^255 - 19 <= v < 2^255 - // . After adding 19 to the value, we will be having the correct - // Number of required subtractions. - accu = initialGuessForNumberOfTimesToSubstractPrime * 19 + 19; - - for (ctr = 0; ctr < 7; ctr++) - { - accu += inout->as_uint32[ctr]; - accu >>= 32; - } - accu += inout->as_uint32[7]; - - numberOfTimesToSubstractPrime = (uint32)(accu >> 31); - - // Do the reduction. - accu = numberOfTimesToSubstractPrime * 19; - - for (ctr = 0; ctr < 7; ctr++) - { - accu += inout->as_uint32[ctr]; - inout->as_uint32[ctr] = (uint32)accu; - accu >>= 32; - } - accu += inout->as_uint32[7]; - inout->as_uint32[7] = accu & 0x7ffffffful; -} - -/// We are already using a packed radix 16 representation for fe25519. The real use for this function -/// is for architectures that use more bits for storing a fe25519 in a representation where multiplication -/// may be calculated more efficiently. -/// Here we simply copy the data. -static void -fe25519_pack( - unsigned char out[32], - volatile fe25519* in -) -{ - uint8 ctr; - - fe25519_reduceCompletely(in); - - for (ctr = 0; ctr < 32; ctr++) - { - out[ctr] = in->as_uint8[ctr]; - } -} - -// Note, that r and x are allowed to overlap! -static void -fe25519_invert_useProvidedScratchBuffers( - fe25519* r, - const fe25519* x, - fe25519* t0, - fe25519* t1, - fe25519* t2 -) -{ - fe25519 *z11 = r; // store z11 in r (in order to save one temporary). - fe25519 *z2_10_0 = t1; - fe25519 *z2_50_0 = t2; - fe25519 *z2_100_0 = z2_10_0; - - uint8 i; - - { - fe25519 *z2 = z2_50_0; - - /* 2 */ fe25519_square(z2, x); - /* 4 */ fe25519_square(t0, z2); - /* 8 */ fe25519_square(t0, t0); - /* 9 */ fe25519_mul(z2_10_0, t0, x); - /* 11 */ fe25519_mul(z11, z2_10_0, z2); - - // z2 is dead. - } - - /* 22 */ fe25519_square(t0, z11); - /* 2^5 - 2^0 = 31 */ fe25519_mul(z2_10_0, t0, z2_10_0); - - /* 2^6 - 2^1 */ fe25519_square(t0, z2_10_0); - /* 2^7 - 2^2 */ fe25519_square(t0, t0); - /* 2^8 - 2^3 */ fe25519_square(t0, t0); - /* 2^9 - 2^4 */ fe25519_square(t0, t0); - /* 2^10 - 2^5 */ fe25519_square(t0, t0); - /* 2^10 - 2^0 */ fe25519_mul(z2_10_0, t0, z2_10_0); - - /* 2^11 - 2^1 */ fe25519_square(t0, z2_10_0); - - /* 2^20 - 2^10 */ for (i = 1; i < 10; i ++) - { - fe25519_square(t0, t0); - } - /* 2^20 - 2^0 */ fe25519_mul(z2_50_0, t0, z2_10_0); - - /* 2^21 - 2^1 */ fe25519_square(t0, z2_50_0); - - /* 2^40 - 2^20 */ for (i = 1; i < 20; i ++) - { - fe25519_square(t0, t0); - } - /* 2^40 - 2^0 */ fe25519_mul(t0, t0, z2_50_0); - - /* 2^41 - 2^1 */ fe25519_square(t0, t0); - - /* 2^50 - 2^10 */ for (i = 1; i < 10; i ++) - { - fe25519_square(t0, t0); - } - /* 2^50 - 2^0 */ fe25519_mul(z2_50_0, t0, z2_10_0); - - /* 2^51 - 2^1 */ fe25519_square(t0, z2_50_0); - - /* 2^100 - 2^50 */ for (i = 1; i < 50; i ++) - { - fe25519_square(t0, t0); - } - /* 2^100 - 2^0 */ fe25519_mul(z2_100_0, t0, z2_50_0); - - /* 2^101 - 2^1 */ fe25519_square(t0, z2_100_0); - - /* 2^200 - 2^100 */ for (i = 1; i < 100; i ++) - { - fe25519_square(t0, t0); - } - /* 2^200 - 2^0 */ fe25519_mul(t0, t0, z2_100_0); - - /* 2^250 - 2^50 */ for (i = 0; i < 50; i ++) - { - fe25519_square(t0, t0); - } - /* 2^250 - 2^0 */ fe25519_mul(t0, t0, z2_50_0); - - /* 2^255 - 2^5 */ for (i = 0; i < 5; i ++) - { - fe25519_square(t0, t0); - } - /* 2^255 - 21 */ fe25519_mul(r, t0, z11); -} - -static void -fe25519_setzero( - fe25519* out -) -{ - uint8 ctr; - - for (ctr = 0; ctr < 8; ctr++) - { - out->as_uint32[ctr] = 0; - } -} - -static void -fe25519_setone( - fe25519* out -) -{ - uint8 ctr; - - out->as_uint32[0] = 1; - - for (ctr = 1; ctr < 8; ctr++) - { - out->as_uint32[ctr] = 0; - } -} - -/* -static void -swapPointersConditionally (void **p1, void **p2, uint8 condition) -{ - // Secure version of this code: - // - // if (condition) - // { - // void *temp; - // temp = *p2; - // *p2 = *p1; - // *p1 = temp; - // } - - uintptr mask = condition; - uintptr val1 = (uintptr) *p1; - uintptr val2 = (uintptr) *p2; - uintptr temp = val2 ^ val1; - - mask = (uintptr)( - (intptr) mask ); - temp ^= mask & (temp ^ val1); - val1 ^= mask & (val1 ^ val2); - val2 ^= mask & (val2 ^ temp); - - *p1 = (void *) val1; - *p2 = (void *) val2; -} -*/ - -static void -fe25519_cswap( - fe25519* in1, - fe25519* in2, - int condition -) -{ - int32 mask = condition; - uint32 ctr; - - mask = -mask; - - for (ctr = 0; ctr < 8; ctr++) - { - uint32 val1 = in1->as_uint32[ctr]; - uint32 val2 = in2->as_uint32[ctr]; - uint32 temp = val1; - - val1 ^= mask & (val2 ^ val1); - val2 ^= mask & (val2 ^ temp); - - - in1->as_uint32[ctr] = val1; - in2->as_uint32[ctr] = val2; - } -} - -// **************************************************** -// Scalarmultiplication implementation. -// **************************************************** - -typedef struct _ST_curve25519ladderstepWorkingState -{ - // The base point in affine coordinates - fe25519 x0; - - // The two working points p, q, in projective coordinates. Possibly randomized. - fe25519 xp; - fe25519 zp; - fe25519 xq; - fe25519 zq; - - volatile UN_256bitValue s; - - int nextScalarBitToProcess; - uint8 previousProcessedBit; - -#ifdef DH_SWAP_BY_POINTERS - fe25519 *pXp; - fe25519 *pZp; - fe25519 *pXq; - fe25519 *pZq; -#endif - -} ST_curve25519ladderstepWorkingState; - -static void -curve25519_ladderstep( - ST_curve25519ladderstepWorkingState* pState -) -{ - // Implements the "ladd-1987-m-3" differential-addition-and-doubling formulas - // Source: 1987 Montgomery "Speeding the Pollard and elliptic curve methods of factorization", page 261, - // fifth and sixth displays, plus common-subexpression elimination. - // - // Notation from the explicit formulas database: - // (X2,Z2) corresponds to (xp,zp), - // (X3,Z3) corresponds to (xq,zq) - // Result (X4,Z4) (X5,Z5) expected in (xp,zp) and (xq,zq) - // - // A = X2+Z2; AA = A^2; B = X2-Z2; BB = B^2; E = AA-BB; C = X3+Z3; D = X3-Z3; - // DA = D*A; CB = C*B; t0 = DA+CB; t1 = t0^2; X5 = Z1*t1; t2 = DA-CB; - // t3 = t2^2; Z5 = X1*t3; X4 = AA*BB; t4 = a24*E; t5 = BB+t4; Z4 = E*t5 ; - // - // Re-Ordered for using less temporaries. - - fe25519 t1, t2; - - #ifdef DH_SWAP_BY_POINTERS - fe25519 *b1=pState->pXp; fe25519 *b2=pState->pZp; - fe25519 *b3=pState->pXq; fe25519 *b4=pState->pZq; - #else - fe25519 *b1=&pState->xp; fe25519 *b2=&pState->zp; - fe25519 *b3=&pState->xq; fe25519 *b4=&pState->zq; - #endif - - fe25519 *b5= &t1; fe25519 *b6=&t2; - - fe25519_add(b5,b1,b2); // A = X2+Z2 - fe25519_sub(b6,b1,b2); // B = X2-Z2 - fe25519_add(b1,b3,b4); // C = X3+Z3 - fe25519_sub(b2,b3,b4); // D = X3-Z3 - fe25519_mul(b3,b2,b5); // DA= D*A - fe25519_mul(b2,b1,b6); // CB= C*B - fe25519_add(b1,b2,b3); // T0= DA+CB - fe25519_sub(b4,b3,b2); // T2= DA-CB - fe25519_square(b3,b1); // X5==T1= T0^2 - fe25519_square(b1,b4); // T3= t2^2 - fe25519_mul(b4,b1,&pState->x0); // Z5=X1*t3 - fe25519_square(b1,b5); // AA=A^2 - fe25519_square(b5,b6); // BB=B^2 - fe25519_sub(b2,b1,b5); // E=AA-BB - fe25519_mul(b1,b5,b1); // X4= AA*BB - fe25519_mpyWith121666 (b6,b2); // T4 = a24*E - fe25519_add(b6,b6,b5); // T5 = BB + t4 - fe25519_mul(b2,b6,b2); // Z4 = E*t5 -} - -static void -curve25519_cswap( - ST_curve25519ladderstepWorkingState* state, - uint8 b -) -{ - #ifdef DH_SWAP_BY_POINTERS - swapPointersConditionally ((void **) &state->pXp,(void **) &state->pXq,b); - swapPointersConditionally ((void **) &state->pZp,(void **) &state->pZq,b); - #else - fe25519_cswap (&state->xp, &state->xq,b); - fe25519_cswap (&state->zp, &state->zq,b); - #endif -} - -#if DH_REPLACE_LAST_THREE_LADDERSTEPS_WITH_DOUBLINGS - -static void -curve25519_doublePointP (ST_curve25519ladderstepWorkingState* pState) -{ - // Implement the doubling formula "dbl-1987-m-3" - // from 1987 Montgomery "Speeding the Pollard and elliptic curve methods of factorization", - // page 261, sixth display, plus common-subexpression elimination. - // - // Three operand code: - // A = X1+Z1 - // AA = A^2 - // B = X1-Z1 - // BB = B^2 - // C = AA-BB - // X3 = AA*BB - // t0 = a24*C - // t1 = BB+t0 - // Z3 = C*t1 - - // Double the point input in the state variable "P". Use the State variable "Q" as temporary - // for storing A, AA and B, BB. Use the same temporary variable for A and AA respectively and - // B, BB respectively. - #ifdef DH_SWAP_BY_POINTERS - fe25519 *pA = pState->pXq; - fe25519 *pB = pState->pZq; - fe25519 *pX = pState->pXp; - fe25519 *pZ = pState->pZp; - #else - fe25519 *pA = &pState->xq; - fe25519 *pB = &pState->zq; - fe25519 *pX = &pState->xp; - fe25519 *pZ = &pState->zp; - #endif - - // A = X1+Z1 - fe25519_add(pA, pX, pZ); - // AA = A^2 - fe25519_square (pA,pA); - // B = X1-Z1 - fe25519_sub(pB, pX, pZ); - // BB = B^2 - fe25519_square (pB,pB); - // X3 = AA*BB - fe25519_mul (pX,pA,pB); - // C = AA-BB - fe25519_sub (pZ,pA,pB); - // t0 = a24*C - fe25519_mpyWith121666 (pA,pZ); - // t1 = BB+t0 - fe25519_add (pB,pA,pB); - // Z3 = C*t1 - fe25519_mul (pZ,pZ,pB); -} - -#endif // #ifdef DH_REPLACE_LAST_THREE_LADDERSTEPS_WITH_DOUBLINGS - -int -crypto_scalarmult_curve25519( - unsigned char* r, - const unsigned char* s, - const unsigned char* p -) -{ - ST_curve25519ladderstepWorkingState state; - unsigned char i; - - - // Prepare the scalar within the working state buffer. - for (i = 0; i < 32; i++) - { - state.s.as_uint8 [i] = s[i]; - } -#if DH_REPLACE_LAST_THREE_LADDERSTEPS_WITH_DOUBLINGS - // Due to explicit final doubling for the last three bits instead of a full ladderstep, - // the following line is no longer necessary. -#else - state.s.as_uint8 [0] &= 248; -#endif - state.s.as_uint8 [31] &= 127; - state.s.as_uint8 [31] |= 64; - - // Copy the affine x-axis of the base point to the state. - fe25519_unpack (&state.x0, p); - - // Prepare the working points within the working state struct. - - fe25519_setone (&state.zq); - fe25519_cpy (&state.xq, &state.x0); - - fe25519_setone(&state.xp); - fe25519_setzero(&state.zp); - - state.nextScalarBitToProcess = 254; - -#ifdef DH_SWAP_BY_POINTERS - // we need to initially assign the pointers correctly. - state.pXp = &state.xp; - state.pZp = &state.zp; - state.pXq = &state.xq; - state.pZq = &state.zq; -#endif - - state.previousProcessedBit = 0; - -#if DH_REPLACE_LAST_THREE_LADDERSTEPS_WITH_DOUBLINGS - // Process all the bits except for the last three where we explicitly double the result. - while (state.nextScalarBitToProcess >= 3) -#else - // Process all the bits except for the last three where we explicitly double the result. - while (state.nextScalarBitToProcess >= 0) -#endif - { - uint8 byteNo = state.nextScalarBitToProcess >> 3; - uint8 bitNo = state.nextScalarBitToProcess & 7; - uint8 bit; - uint8 swap; - - bit = 1 & (state.s.as_uint8 [byteNo] >> bitNo); - swap = bit ^ state.previousProcessedBit; - state.previousProcessedBit = bit; - curve25519_cswap(&state, swap); - curve25519_ladderstep(&state); - state.nextScalarBitToProcess --; - } - - curve25519_cswap(&state,state.previousProcessedBit); - -#if DH_REPLACE_LAST_THREE_LADDERSTEPS_WITH_DOUBLINGS - curve25519_doublePointP (&state); - curve25519_doublePointP (&state); - curve25519_doublePointP (&state); -#endif - -#ifdef DH_SWAP_BY_POINTERS - // optimize for stack usage. - fe25519_invert_useProvidedScratchBuffers (state.pZp, state.pZp, state.pXq,state.pZq,&state.x0); - fe25519_mul(state.pXp, state.pXp, state.pZp); - fe25519_reduceCompletely(state.pXp); - - fe25519_pack (r, state.pXp); -#else - // optimize for stack usage. - fe25519_invert_useProvidedScratchBuffers (&state.zp, &state.zp, &state.xq, &state.zq, &state.x0); - fe25519_mul(&state.xp, &state.xp, &state.zp); - fe25519_reduceCompletely(&state.xp); - - fe25519_pack (r, &state.xp); -#endif - - return 0; -} - -int -crypto_scalarmult_curve25519_base( - unsigned char* q, - const unsigned char* n -) -{ - static const uint8 base[32] = - { - 9, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, - 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 - }; - - return crypto_scalarmult_curve25519(q, n, base); -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/unacl/sqr.s b/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/unacl/sqr.s deleted file mode 100644 index 3b190c9..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/arm/unacl/sqr.s +++ /dev/null @@ -1,777 +0,0 @@ - .align 2 - .global square256_asm - .type square256_asm, %function -square256_asm: - push {r4-r7,lr} - mov r2, r8 - mov r3, r9 - mov r4, r10 - mov r5, r11 - push {r0-r5} - - mov r12, r0 - mov r4, r1 - ldm r4!, {r0-r3} - push {r4} - /////////BEGIN LOW PART ////////////////////// - ///SQR 128, in r0-r3 - mov r8, r2 - mov r9, r3 - eor r4, r4 - sub r2, r0 - sbc r3, r1 - sbc r4, r4 - eor r2, r4 - eor r3, r4 - sub r2, r4 - sbc r3, r4 - mov r10, r2 - mov r11, r3 - //SQR64, in: r0, r1, out: r0-r3, used: r0-r6 - mov r2, r0 - eor r3, r3 - sub r2, r1 - sbc r3, r3 - eor r2, r3 - sub r2, r3 - lsr r3, r0, #16 - uxth r0, r0 - mov r4, r0 - mul r4, r3 - mul r0, r0 - mul r3, r3 - lsr r5, r4, #16 - lsl r4, #16 - add r0, r4 - adc r3, r5 - add r0, r4 - adc r3, r5 - lsr r4, r1, #16 - uxth r1, r1 - mov r5, r1 - mul r5, r4 - mul r1, r1 - mul r4, r4 - eor r6, r6 - add r1, r3 - adc r4, r6 - lsr r3, r5, #16 - lsl r5, r5, #16 - add r1, r5 - adc r4, r3 - add r1, r5 - adc r3, r4 - lsr r4, r2, #16 - uxth r2, r2 - mov r5, r2 - mul r5, r4 - mul r2, r2 - mul r4, r4 - lsr r6, r5, #16 - lsl r5, #16 - add r2, r5 - adc r4, r6 - add r5, r2 - adc r6, r4 - eor r7, r7 - mov r2, r1 - sub r1, r5 - sbc r2, r6 - sbc r7, r7 - add r1, r0 - adc r2, r3 - adc r7, r3 - mov r3, r12 - stm r3!, {r0-r1} - push {r3} - - mov r12, r0 - mov r0, r8 - mov r8, r1 - mov r1, r9 - mov r9, r2 - //SQR64, in: r0, r1, out: r0-r3, used: r0-r6 - mov r2, r0 - eor r3, r3 - sub r2, r1 - sbc r3, r3 - eor r2, r3 - sub r2, r3 - lsr r3, r0, #16 - uxth r0, r0 - mov r4, r0 - mul r4, r3 - mul r0, r0 - mul r3, r3 - lsr r5, r4, #16 - lsl r4, #16 - add r0, r4 - adc r3, r5 - add r0, r4 - adc r3, r5 - lsr r4, r1, #16 - uxth r1, r1 - mov r5, r1 - mul r5, r4 - mul r1, r1 - mul r4, r4 - eor r6, r6 - add r1, r3 - adc r4, r6 - lsr r3, r5, #16 - lsl r5, r5, #16 - add r1, r5 - adc r4, r3 - add r1, r5 - adc r3, r4 - lsr r4, r2, #16 - uxth r2, r2 - mov r5, r2 - mul r5, r4 - mul r2, r2 - mul r4, r4 - lsr r6, r5, #16 - lsl r5, #16 - add r2, r5 - adc r4, r6 - add r5, r2 - adc r6, r4 - eor r4, r4 - mov r2, r1 - sub r1, r5 - sbc r2, r6 - sbc r4, r4 - add r1, r0 - adc r2, r3 - adc r3, r4 - eor r4, r4 - mov r6, r9 - add r0, r6 - adc r7, r1 - adc r2, r4 - adc r3, r4 - mov r1, r11 - mov r11, r0 - mov r0, r10 - mov r9, r2 - mov r10,r3 - //SQR64, in: r0, r1, out: r0-r3, used: r0-r6 - mov r2, r0 - eor r3, r3 - sub r2, r1 - sbc r3, r3 - eor r2, r3 - sub r2, r3 - lsr r3, r0, #16 - uxth r0, r0 - mov r4, r0 - mul r4, r3 - mul r0, r0 - mul r3, r3 - lsr r5, r4, #16 - lsl r4, #16 - add r0, r4 - adc r3, r5 - add r0, r4 - adc r3, r5 - lsr r4, r1, #16 - uxth r1, r1 - mov r5, r1 - mul r5, r4 - mul r1, r1 - mul r4, r4 - eor r6, r6 - add r1, r3 - adc r4, r6 - lsr r3, r5, #16 - lsl r5, r5, #16 - add r1, r5 - adc r4, r3 - add r1, r5 - adc r3, r4 - lsr r4, r2, #16 - uxth r2, r2 - mov r5, r2 - mul r5, r4 - mul r2, r2 - mul r4, r4 - lsr r6, r5, #16 - lsl r5, #16 - add r2, r5 - adc r4, r6 - add r5, r2 - adc r6, r4 - eor r4, r4 - mov r2, r1 - sub r1, r5 - sbc r2, r6 - sbc r4, r4 - add r1, r0 - adc r2, r3 - adc r3, r4 - mov r6, r11 - mov r4, r11 - mov r5, r7 - sub r6, r0 - sbc r7, r1 - sbc r4, r2 - sbc r5, r3 - eor r1, r1 - sbc r1, r1 - mov r2, r12 - mov r3, r8 - add r2, r6 - adc r3, r7 - mov r6, r9 - mov r7, r10 - adc r4, r6 - adc r5, r7 - adc r6, r1 - adc r7, r1 - //results r12, r8, r2-r7 - /////////END LOW PART //////////////////////// - pop {r0,r1} - stm r0!, {r2, r3} - push {r0, r4-r7} - ldm r1, {r0-r3} - /////////BEGIN HIGH PART ////////////////////// - ///SQR 128, in r0-r3 - mov r8, r2 - mov r9, r3 - eor r4, r4 - sub r2, r0 - sbc r3, r1 - sbc r4, r4 - eor r2, r4 - eor r3, r4 - sub r2, r4 - sbc r3, r4 - mov r10, r2 - mov r11, r3 - //SQR64, in: r0, r1, out: r0-r3, used: r0-r6 - mov r2, r0 - eor r3, r3 - sub r2, r1 - sbc r3, r3 - eor r2, r3 - sub r2, r3 - lsr r3, r0, #16 - uxth r0, r0 - mov r4, r0 - mul r4, r3 - mul r0, r0 - mul r3, r3 - lsr r5, r4, #16 - lsl r4, #16 - add r0, r4 - adc r3, r5 - add r0, r4 - adc r3, r5 - lsr r4, r1, #16 - uxth r1, r1 - mov r5, r1 - mul r5, r4 - mul r1, r1 - mul r4, r4 - eor r6, r6 - add r1, r3 - adc r4, r6 - lsr r3, r5, #16 - lsl r5, r5, #16 - add r1, r5 - adc r4, r3 - add r1, r5 - adc r3, r4 - lsr r4, r2, #16 - uxth r2, r2 - mov r5, r2 - mul r5, r4 - mul r2, r2 - mul r4, r4 - lsr r6, r5, #16 - lsl r5, #16 - add r2, r5 - adc r4, r6 - add r5, r2 - adc r6, r4 - eor r7, r7 - mov r2, r1 - sub r1, r5 - sbc r2, r6 - sbc r7, r7 - add r1, r0 - adc r2, r3 - adc r7, r3 - mov r12, r0 - mov r0, r8 - mov r8, r1 - mov r1, r9 - mov r9, r2 - //SQR64, in: r0, r1, out: r0-r3, used: r0-r6 - mov r2, r0 - eor r3, r3 - sub r2, r1 - sbc r3, r3 - eor r2, r3 - sub r2, r3 - lsr r3, r0, #16 - uxth r0, r0 - mov r4, r0 - mul r4, r3 - mul r0, r0 - mul r3, r3 - lsr r5, r4, #16 - lsl r4, #16 - add r0, r4 - adc r3, r5 - add r0, r4 - adc r3, r5 - lsr r4, r1, #16 - uxth r1, r1 - mov r5, r1 - mul r5, r4 - mul r1, r1 - mul r4, r4 - eor r6, r6 - add r1, r3 - adc r4, r6 - lsr r3, r5, #16 - lsl r5, r5, #16 - add r1, r5 - adc r4, r3 - add r1, r5 - adc r3, r4 - lsr r4, r2, #16 - uxth r2, r2 - mov r5, r2 - mul r5, r4 - mul r2, r2 - mul r4, r4 - lsr r6, r5, #16 - lsl r5, #16 - add r2, r5 - adc r4, r6 - add r5, r2 - adc r6, r4 - eor r4, r4 - mov r2, r1 - sub r1, r5 - sbc r2, r6 - sbc r4, r4 - add r1, r0 - adc r2, r3 - adc r3, r4 - eor r4, r4 - mov r6, r9 - add r0, r6 - adc r7, r1 - adc r2, r4 - adc r3, r4 - mov r1, r11 - mov r11, r0 - mov r0, r10 - mov r9, r2 - mov r10,r3 - //SQR64, in: r0, r1, out: r0-r3, used: r0-r6 - mov r2, r0 - eor r3, r3 - sub r2, r1 - sbc r3, r3 - eor r2, r3 - sub r2, r3 - lsr r3, r0, #16 - uxth r0, r0 - mov r4, r0 - mul r4, r3 - mul r0, r0 - mul r3, r3 - lsr r5, r4, #16 - lsl r4, #16 - add r0, r4 - adc r3, r5 - add r0, r4 - adc r3, r5 - lsr r4, r1, #16 - uxth r1, r1 - mov r5, r1 - mul r5, r4 - mul r1, r1 - mul r4, r4 - eor r6, r6 - add r1, r3 - adc r4, r6 - lsr r3, r5, #16 - lsl r5, r5, #16 - add r1, r5 - adc r4, r3 - add r1, r5 - adc r3, r4 - lsr r4, r2, #16 - uxth r2, r2 - mov r5, r2 - mul r5, r4 - mul r2, r2 - mul r4, r4 - lsr r6, r5, #16 - lsl r5, #16 - add r2, r5 - adc r4, r6 - add r5, r2 - adc r6, r4 - eor r4, r4 - mov r2, r1 - sub r1, r5 - sbc r2, r6 - sbc r4, r4 - add r1, r0 - adc r2, r3 - adc r3, r4 - mov r6, r11 - mov r4, r11 - mov r5, r7 - sub r6, r0 - sbc r7, r1 - sbc r4, r2 - sbc r5, r3 - eor r1, r1 - sbc r1, r1 - mov r2, r12 - mov r3, r8 - add r2, r6 - adc r3, r7 - mov r6, r9 - mov r7, r10 - adc r4, r6 - adc r5, r7 - adc r6, r1 - adc r7, r1 - //results r12, r8, r2-r7 - /////////END HIGH PART //////////////////////// - mov r0, r12 - mov r1, r8 - mov r8, r4 - mov r9, r5 - mov r10, r6 - mov r11, r7 - pop {r4} - mov r12, r4//str - pop {r4-r7} - add r0, r4 - adc r1, r5 - adc r2, r6 - adc r3, r7 - mov r4, r12 - stm r4!, {r0-r3}//low part - mov r4, r8 - mov r5, r9 - mov r6, r10 - mov r7, r11 - eor r0, r0 - adc r4, r0 - adc r5, r0 - adc r6, r0 - adc r7, r0 - pop {r0, r1} //r0->out, r1, in - push {r0,r4-r7} - ldm r1, {r0-r7} - sub r0, r4 - sbc r1, r5 - sbc r2, r6 - sbc r3, r7 - sbc r4, r4 - eor r0, r4 - eor r1, r4 - eor r2, r4 - eor r3, r4 - sub r0, r4 - sbc r1, r4 - sbc r2, r4 - sbc r3, r4 - //////////BEGIN MIDDLE PART//////////////// - ///SQR 128, in r0-r3 - mov r8, r2 - mov r9, r3 - eor r4, r4 - sub r2, r0 - sbc r3, r1 - sbc r4, r4 - eor r2, r4 - eor r3, r4 - sub r2, r4 - sbc r3, r4 - mov r10, r2 - mov r11, r3 - //SQR64, in: r0, r1, out: r0-r3, used: r0-r6 - mov r2, r0 - eor r3, r3 - sub r2, r1 - sbc r3, r3 - eor r2, r3 - sub r2, r3 - lsr r3, r0, #16 - uxth r0, r0 - mov r4, r0 - mul r4, r3 - mul r0, r0 - mul r3, r3 - lsr r5, r4, #16 - lsl r4, #16 - add r0, r4 - adc r3, r5 - add r0, r4 - adc r3, r5 - lsr r4, r1, #16 - uxth r1, r1 - mov r5, r1 - mul r5, r4 - mul r1, r1 - mul r4, r4 - eor r6, r6 - add r1, r3 - adc r4, r6 - lsr r3, r5, #16 - lsl r5, r5, #16 - add r1, r5 - adc r4, r3 - add r1, r5 - adc r3, r4 - lsr r4, r2, #16 - uxth r2, r2 - mov r5, r2 - mul r5, r4 - mul r2, r2 - mul r4, r4 - lsr r6, r5, #16 - lsl r5, #16 - add r2, r5 - adc r4, r6 - add r5, r2 - adc r6, r4 - eor r7, r7 - mov r2, r1 - sub r1, r5 - sbc r2, r6 - sbc r7, r7 - add r1, r0 - adc r2, r3 - adc r7, r3 - mov r12, r0 - mov r0, r8 - mov r8, r1 - mov r1, r9 - mov r9, r2 - //SQR64, in: r0, r1, out: r0-r3, used: r0-r6 - mov r2, r0 - eor r3, r3 - sub r2, r1 - sbc r3, r3 - eor r2, r3 - sub r2, r3 - lsr r3, r0, #16 - uxth r0, r0 - mov r4, r0 - mul r4, r3 - mul r0, r0 - mul r3, r3 - lsr r5, r4, #16 - lsl r4, #16 - add r0, r4 - adc r3, r5 - add r0, r4 - adc r3, r5 - lsr r4, r1, #16 - uxth r1, r1 - mov r5, r1 - mul r5, r4 - mul r1, r1 - mul r4, r4 - eor r6, r6 - add r1, r3 - adc r4, r6 - lsr r3, r5, #16 - lsl r5, r5, #16 - add r1, r5 - adc r4, r3 - add r1, r5 - adc r3, r4 - lsr r4, r2, #16 - uxth r2, r2 - mov r5, r2 - mul r5, r4 - mul r2, r2 - mul r4, r4 - lsr r6, r5, #16 - lsl r5, #16 - add r2, r5 - adc r4, r6 - add r5, r2 - adc r6, r4 - eor r4, r4 - mov r2, r1 - sub r1, r5 - sbc r2, r6 - sbc r4, r4 - add r1, r0 - adc r2, r3 - adc r3, r4 - eor r4, r4 - mov r6, r9 - add r0, r6 - adc r7, r1 - adc r2, r4 - adc r3, r4 - mov r1, r11 - mov r11, r0 - mov r0, r10 - mov r9, r2 - mov r10,r3 - //SQR64, in: r0, r1, out: r0-r3, used: r0-r6 - mov r2, r0 - eor r3, r3 - sub r2, r1 - sbc r3, r3 - eor r2, r3 - sub r2, r3 - lsr r3, r0, #16 - uxth r0, r0 - mov r4, r0 - mul r4, r3 - mul r0, r0 - mul r3, r3 - lsr r5, r4, #16 - lsl r4, #16 - add r0, r4 - adc r3, r5 - add r0, r4 - adc r3, r5 - lsr r4, r1, #16 - uxth r1, r1 - mov r5, r1 - mul r5, r4 - mul r1, r1 - mul r4, r4 - eor r6, r6 - add r1, r3 - adc r4, r6 - lsr r3, r5, #16 - lsl r5, r5, #16 - add r1, r5 - adc r4, r3 - add r1, r5 - adc r3, r4 - lsr r4, r2, #16 - uxth r2, r2 - mov r5, r2 - mul r5, r4 - mul r2, r2 - mul r4, r4 - lsr r6, r5, #16 - lsl r5, #16 - add r2, r5 - adc r4, r6 - add r5, r2 - adc r6, r4 - eor r4, r4 - mov r2, r1 - sub r1, r5 - sbc r2, r6 - sbc r4, r4 - add r1, r0 - adc r2, r3 - adc r3, r4 - mov r6, r11 - mov r4, r11 - mov r5, r7 - sub r6, r0 - sbc r7, r1 - sbc r4, r2 - sbc r5, r3 - eor r1, r1 - sbc r1, r1 - mov r2, r12 - mov r3, r8 - add r2, r6 - adc r3, r7 - mov r6, r9 - mov r7, r10 - adc r4, r6 - adc r5, r7 - adc r6, r1 - adc r7, r1 - //results r12, r8, r2-r7 - //////////END MIDDLE PART////////////////// - mvn r2, r2 - mvn r3, r3 - mvn r4, r4 - mvn r5, r5 - mvn r6, r6 - mvn r7, r7 - pop {r1} - push {r4-r7} - mov r4, #1 - asr r4, #1 - ldm r1!, {r4-r7} - mov r0, r12 - mov r12, r1 ////////ref - mov r1, r8 - mvn r0, r0 - mvn r1, r1 - adc r0, r4 - adc r1, r5 - adc r2, r6 - adc r3, r7 - eor r4, r4 - adc r4, r4 - mov r8, r4 //carry A --ini - mov r4, r12 - ldm r4, {r4-r7} - add r0, r4 - adc r1, r5 - adc r2, r6 - adc r3, r7 - mov r9, r4 - mov r4, r12 - stm r4!, {r0-r3} - mov r12, r4 - mov r4, r9 - pop {r0-r3} - adc r4, r0 - adc r5, r1 - adc r6, r2 - adc r7, r3 - eor r0, r0 - adc r0, r0 - mov r9, r0 //carry B --ini - mov r0, r8 - asr r0, #1 //carry A --end - pop {r0-r3} - adc r4, r0 - adc r5, r1 - adc r6, r2 - adc r7, r3 - mov r8, r0 - mov r0, r12 - stm r0!, {r4-r7} - mov r11, r0 - mov r0, r8 - eor r4, r4 - mov r5, r9 - adc r5, r4 //carry B --end - mvn r6, r4 - add r5, r6 - adc r6, r4 - add r0, r5 - adc r1, r6 - adc r2, r6 - adc r3, r6 - mov r7, r11 - stm r7!, {r0-r3} - - pop {r3-r6} - mov r8, r3 - mov r9, r4 - mov r10, r5 - mov r11, r6 - pop {r4-r7,pc} - bx lr - .size square256_asm, .-square256_asm diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/bitops.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/bitops.h deleted file mode 100644 index f2ca308..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/bitops.h +++ /dev/null @@ -1,310 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef BITOPS_H -#define BITOPS_H - -#include <stdint.h> -#include <stddef.h> - -#ifdef _WINDOWS -#include <intrin.h> -#endif - -/* Assorted bitwise and common operations used in ciphers. */ - -/** Circularly rotate right x by n bits. - * 0 > n > 32. */ -static inline uint32_t rotr32(uint32_t x, unsigned n) -{ - return (x >> n) | (x << (32 - n)); -} - -/** Circularly rotate left x by n bits. - * 0 > n > 32. */ -static inline uint32_t rotl32(uint32_t x, unsigned n) -{ - return (x << n) | (x >> (32 - n)); -} - -/** Circularly rotate right x by n bits. - * 0 > n > 64. */ -static inline uint64_t rotr64(uint64_t x, unsigned n) -{ - return (x >> n) | (x << (64 - n)); -} - -/** Circularly rotate left x by n bits. - * 0 > n > 64. */ -static inline uint64_t rotl64(uint64_t x, unsigned n) -{ - return (x << n) | (x >> (64 - n)); -} - -/** Read 4 bytes from buf, as a 32-bit big endian quantity. */ -static inline uint32_t read32_be(const uint8_t buf[4]) -{ - return (buf[0] << 24) | - (buf[1] << 16) | - (buf[2] << 8) | - (buf[3]); -} - -/** Read 4 bytes from buf, as a 32-bit little endian quantity. */ -static inline uint32_t read32_le(const uint8_t buf[4]) -{ - return (buf[3] << 24) | - (buf[2] << 16) | - (buf[1] << 8) | - (buf[0]); -} - -/** Read 8 bytes from buf, as a 64-bit big endian quantity. */ -static inline uint64_t read64_be(const uint8_t buf[8]) -{ - uint32_t hi = read32_be(buf), - lo = read32_be(buf + 4); - return ((uint64_t)hi) << 32 | - lo; -} - -/** Read 8 bytes from buf, as a 64-bit little endian quantity. */ -static inline uint64_t read64_le(const uint8_t buf[8]) -{ - uint32_t hi = read32_le(buf + 4), - lo = read32_le(buf); - return ((uint64_t)hi) << 32 | - lo; -} - -/** Encode v as a 32-bit big endian quantity into buf. */ -static inline void write32_be(uint32_t v, uint8_t buf[4]) -{ - *buf++ = (v >> 24) & 0xff; - *buf++ = (v >> 16) & 0xff; - *buf++ = (v >> 8) & 0xff; - *buf = v & 0xff; -} - -/** Encode v as a 32-bit little endian quantity into buf. */ -static inline void write32_le(uint32_t v, uint8_t buf[4]) -{ - *buf++ = v & 0xff; - *buf++ = (v >> 8) & 0xff; - *buf++ = (v >> 16) & 0xff; - *buf = (v >> 24) & 0xff; -} - -/** Encode v as a 64-bit big endian quantity into buf. */ -static inline void write64_be(uint64_t v, uint8_t buf[8]) -{ - *buf++ = (v >> 56) & 0xff; - *buf++ = (v >> 48) & 0xff; - *buf++ = (v >> 40) & 0xff; - *buf++ = (v >> 32) & 0xff; - *buf++ = (v >> 24) & 0xff; - *buf++ = (v >> 16) & 0xff; - *buf++ = (v >> 8) & 0xff; - *buf = v & 0xff; -} - -/** Encode v as a 64-bit little endian quantity into buf. */ -static inline void write64_le(uint64_t v, uint8_t buf[8]) -{ - *buf++ = v & 0xff; - *buf++ = (v >> 8) & 0xff; - *buf++ = (v >> 16) & 0xff; - *buf++ = (v >> 24) & 0xff; - *buf++ = (v >> 32) & 0xff; - *buf++ = (v >> 40) & 0xff; - *buf++ = (v >> 48) & 0xff; - *buf = (v >> 56) & 0xff; -} - -/** out = in ^ b8. - * out and in may alias. */ -static inline void xor_b8(uint8_t *out, const uint8_t *in, uint8_t b8, size_t len) -{ - size_t i; - for (i = 0; i < len; i++) - out[i] = in[i] ^ b8; -} - -/** out = x ^ y. - * out, x and y may alias. */ -static inline void xor_bb(uint8_t *out, const uint8_t *x, const uint8_t *y, size_t len) -{ - size_t i; - for (i = 0; i < len; i++) - out[i] = x[i] ^ y[i]; -} - -/* out ^= x - * out and x may alias. */ -static inline void xor_words(uint32_t *out, const uint32_t *x, size_t nwords) -{ - size_t i; - for (i = 0; i < nwords; i++) - out[i] ^= x[i]; -} - -/** Produce 0xffffffff if x == y, zero otherwise, without branching. */ -static inline uint32_t mask_u32(uint32_t x, uint32_t y) -{ - uint32_t diff = x ^ y; - uint32_t diff_is_zero = ~diff & (diff - 1); - return (uint32_t)(-(int32_t)(diff_is_zero >> 31)); -} - -/** Product 0xff if x == y, zero otherwise, without branching. */ -static inline uint8_t mask_u8(uint32_t x, uint32_t y) -{ - uint32_t diff = x ^ y; - uint8_t diff_is_zero = ~diff & (diff - 1); - return - (diff_is_zero >> 7); -} - -/** Select the ith entry from the given table of n values, in a side channel-silent - * way. */ -static inline uint32_t select_u32(uint32_t i, volatile const uint32_t *tab, uint32_t n) -{ - uint32_t r = 0, ii; - - for (ii = 0; ii < n; ii++) - { - uint32_t mask = mask_u32(i, ii); - r = (r & ~mask) | (tab[ii] & mask); - } - - return r; -} - -/** Select the ith entry from the given table of n values, in a side channel-silent - * way. */ -static inline uint8_t select_u8(uint32_t i, volatile const uint8_t *tab, uint32_t n) -{ - uint8_t r = 0; - uint32_t ii; - - for (ii = 0; ii < n; ii++) - { - uint8_t mask = mask_u8(i, ii); - r = (r & ~mask) | (tab[ii] & mask); - } - - return r; -} - -/** Select the ath, bth, cth and dth entries from the given table of n values, - * placing the results into a, b, c and d. */ -static inline void select_u8x4(uint8_t *a, uint8_t *b, uint8_t *c, uint8_t *d, - volatile const uint8_t *tab, uint32_t n) -{ - uint8_t ra = 0, - rb = 0, - rc = 0, - rd = 0; - uint8_t mask; - uint32_t i; - - for (i = 0; i < n; i++) - { - uint8_t item = tab[i]; - - mask = mask_u8(*a, i); ra = (ra & ~mask) | (item & mask); - mask = mask_u8(*b, i); rb = (rb & ~mask) | (item & mask); - mask = mask_u8(*c, i); rc = (rc & ~mask) | (item & mask); - mask = mask_u8(*d, i); rd = (rd & ~mask) | (item & mask); - } - - *a = ra; - *b = rb; - *c = rc; - *d = rd; -} - -/** out ^= if0 or if1, depending on the value of bit. */ -static inline void select_xor128(uint32_t out[4], - const uint32_t if0[4], - const uint32_t if1[4], - uint8_t bit) -{ - uint32_t mask1 = mask_u32(bit, 1); - uint32_t mask0 = ~mask1; - - out[0] ^= (if0[0] & mask0) | (if1[0] & mask1); - out[1] ^= (if0[1] & mask0) | (if1[1] & mask1); - out[2] ^= (if0[2] & mask0) | (if1[2] & mask1); - out[3] ^= (if0[3] & mask0) | (if1[3] & mask1); -} - -/** Increments the integer stored at v (of non-zero length len) - * with the least significant byte first. */ -static inline void incr_le(uint8_t *v, size_t len) -{ - size_t i = 0; - while (1) - { - if (++v[i] != 0) - return; - i++; - if (i == len) - return; - } -} - -/** Increments the integer stored at v (of non-zero length len) - * with the most significant byte last. */ -static inline void incr_be(uint8_t *v, size_t len) -{ - len--; - while (1) - { - if (++v[len] != 0) - return; - if (len == 0) - return; - len--; - } -} - -/** Copies len bytes from in to out, with in shifted left by offset bits - * to the right. */ -static inline void copy_bytes_unaligned(uint8_t *out, const uint8_t *in, size_t len, uint8_t offset) -{ - uint8_t byte_off = offset / 8; - uint8_t bit_off = offset & 7; - uint8_t rmask = (1 << bit_off) - 1; - uint8_t lmask = ~rmask; - size_t i; - - for (i = 0; i < len; i++) - { - out[i] = (in[i + byte_off] << bit_off) & lmask; - out[i] |= (in[i + byte_off + 1] >> (8 - bit_off)) & rmask; - } -} - -static inline uint32_t count_trailing_zeroes(uint32_t x) -{ -#ifdef _WINDOWS - uint32_t r = 0; - _BitScanReverse(&r, x); - return (31 - r); -#else - return (uint32_t) __builtin_ctzl(x); -#endif -} - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/blockwise.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/blockwise.c deleted file mode 100644 index 182c8c5..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/blockwise.c +++ /dev/null @@ -1,195 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "blockwise.h" -#include "bitops.h" -#include "handy.h" -#include "tassert.h" - -#include <string.h> - -void cf_blockwise_accumulate(uint8_t *partial, size_t *npartial, size_t nblock, - const void *inp, size_t nbytes, - cf_blockwise_in_fn process, - void *ctx) -{ - cf_blockwise_accumulate_final(partial, npartial, nblock, - inp, nbytes, - process, process, ctx); -} - -void cf_blockwise_accumulate_final(uint8_t *partial, size_t *npartial, size_t nblock, - const void *inp, size_t nbytes, - cf_blockwise_in_fn process, - cf_blockwise_in_fn process_final, - void *ctx) -{ - const uint8_t *bufin = inp; - assert(partial && *npartial < nblock); - assert(inp || !nbytes); - assert(process && ctx); - - /* If we have partial data, copy in to buffer. */ - if (*npartial && nbytes) - { - size_t space = nblock - *npartial; - size_t taken = MIN(space, nbytes); - - memcpy(partial + *npartial, bufin, taken); - - bufin += taken; - nbytes -= taken; - *npartial += taken; - - /* If that gives us a full block, process it. */ - if (*npartial == nblock) - { - if (nbytes == 0) - process_final(ctx, partial); - else - process(ctx, partial); - *npartial = 0; - } - } - - /* now nbytes < nblock or *npartial == 0. */ - - /* If we have a full block of data, process it directly. */ - while (nbytes >= nblock) - { - /* Partial buffer must be empty, or we're ignoring extant data */ - assert(*npartial == 0); - - if (nbytes == nblock) - process_final(ctx, bufin); - else - process(ctx, bufin); - bufin += nblock; - nbytes -= nblock; - } - - /* Finally, if we have remaining data, buffer it. */ - while (nbytes) - { - size_t space = nblock - *npartial; - size_t taken = MIN(space, nbytes); - - memcpy(partial + *npartial, bufin, taken); - - bufin += taken; - nbytes -= taken; - *npartial += taken; - - /* If we started with *npartial, we must have copied it - * in first. */ - assert(*npartial < nblock); - } -} - -void cf_blockwise_xor(uint8_t *partial, size_t *npartial, size_t nblock, - const void *inp, void *outp, size_t nbytes, - cf_blockwise_out_fn process, void *ctx) -{ - const uint8_t *inb = inp; - uint8_t *outb = outp; - - assert(partial && *npartial < nblock); - assert(inp || !nbytes); - assert(process && ctx); - - while (nbytes) - { - /* If we're out of material, and need more, produce a block. */ - if (*npartial == 0) - { - process(ctx, partial); - *npartial = nblock; - } - - size_t offset = nblock - *npartial; - size_t taken = MIN(*npartial, nbytes); - xor_bb(outb, inb, partial + offset, taken); - *npartial -= taken; - nbytes -= taken; - outb += taken; - inb += taken; - } -} - -void cf_blockwise_acc_byte(uint8_t *partial, size_t *npartial, - size_t nblock, - uint8_t byte, size_t nbytes, - cf_blockwise_in_fn process, - void *ctx) -{ - /* only memset the whole of the block once */ - int filled = 0; - - while (nbytes) - { - size_t start = *npartial; - size_t count = MIN(nbytes, nblock - start); - - if (!filled) - memset(partial + start, byte, count); - - if (start == 0 && count == nblock) - filled = 1; - - if (start + count == nblock) - { - process(ctx, partial); - *npartial = 0; - } else { - *npartial += count; - } - - nbytes -= count; - } -} - -void cf_blockwise_acc_pad(uint8_t *partial, size_t *npartial, - size_t nblock, - uint8_t fbyte, uint8_t mbyte, uint8_t lbyte, - size_t nbytes, - cf_blockwise_in_fn process, - void *ctx) -{ - - switch (nbytes) - { - case 0: break; - case 1: fbyte ^= lbyte; - cf_blockwise_accumulate(partial, npartial, nblock, &fbyte, 1, process, ctx); - break; - case 2: - cf_blockwise_accumulate(partial, npartial, nblock, &fbyte, 1, process, ctx); - cf_blockwise_accumulate(partial, npartial, nblock, &lbyte, 1, process, ctx); - break; - default: - cf_blockwise_accumulate(partial, npartial, nblock, &fbyte, 1, process, ctx); - - /* If the middle and last bytes differ, then process the last byte separately. - * Otherwise, just extend the middle block size. */ - if (lbyte != mbyte) - { - cf_blockwise_acc_byte(partial, npartial, nblock, mbyte, nbytes - 2, process, ctx); - cf_blockwise_accumulate(partial, npartial, nblock, &lbyte, 1, process, ctx); - } else { - cf_blockwise_acc_byte(partial, npartial, nblock, mbyte, nbytes - 1, process, ctx); - } - - break; - } -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/blockwise.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/blockwise.h deleted file mode 100644 index a20ff95..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/blockwise.h +++ /dev/null @@ -1,147 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef BLOCKWISE_H -#define BLOCKWISE_H - -#include <stdint.h> -#include <stddef.h> - -/* Processing function for cf_blockwise_accumulate. */ -typedef void (*cf_blockwise_in_fn)(void *ctx, const uint8_t *data); - -/* Processing function for cf_blockwise_xor. */ -typedef void (*cf_blockwise_out_fn)(void *ctx, uint8_t *data); - -/* This function manages the common abstraction of accumulating input in - * a buffer, and processing it when a full block is available. - * - * partial is the buffer (maintained by the caller) - * on entry, npartial is the currently valid count of used bytes on - * the front of partial. - * on exit, npartial is updated to reflect the status of partial. - * nblock is the blocksize to accumulate -- partial must be at least - * this long! - * input is the new data to process, of length nbytes. - * process is the processing function, passed ctx and a pointer - * to the data to process (always exactly nblock bytes long!) - * which may not neccessarily be the same as partial. - */ -void cf_blockwise_accumulate(uint8_t *partial, size_t *npartial, - size_t nblock, - const void *input, size_t nbytes, - cf_blockwise_in_fn process, - void *ctx); - -/* This function manages the common abstraction of accumulating input in - * a buffer, and processing it when a full block is available. - * This version supports calling a different processing function for - * the last block. - * - * partial is the buffer (maintained by the caller) - * on entry, npartial is the currently valid count of used bytes on - * the front of partial. - * on exit, npartial is updated to reflect the status of partial. - * nblock is the blocksize to accumulate -- partial must be at least - * this long! - * input is the new data to process, of length nbytes. - * process is the processing function, passed ctx and a pointer - * to the data to process (always exactly nblock bytes long!) - * which may not neccessarily be the same as partial. - * process_final is called last (but may not be called at all if - * all input is buffered). - */ -void cf_blockwise_accumulate_final(uint8_t *partial, size_t *npartial, - size_t nblock, - const void *input, size_t nbytes, - cf_blockwise_in_fn process, - cf_blockwise_in_fn process_final, - void *ctx); - -/* This function manages XORing an input stream with a keystream - * to produce an output stream. The keystream is produced in blocks - * (ala a block cipher in counter mode). - * - * partial is the keystream buffer (maintained by the caller) - * on entry, *npartial is the currently valid count of bytes in partial: - * unused bytes are at the *end*. So *npartial = 4 means the last four - * bytes of partial are usable as keystream. - * on exit, npartial is updated to reflect the new state of partial. - * nblock is the blocksize to accumulate -- partial must be at least - * this long! - * input is the new data to process, of length nbytes. - * output is where to write input xored with the keystream -- also length - * nbytes. - * process is the processing function, passed ctx and partial which it - * should fill with fresh key stream. - */ -void cf_blockwise_xor(uint8_t *partial, size_t *npartial, - size_t nblock, - const void *input, void *output, size_t nbytes, - cf_blockwise_out_fn newblock, - void *ctx); - -/* This function processes a single byte a number of times. It's useful - * for padding, and more efficient than calling cf_blockwise_accumulate - * a bunch of times. - * - * partial is the buffer (maintained by the caller) - * on entry, npartial is the currently valid count of used bytes on - * the front of partial. - * on exit, npartial is updated to reflect the status of partial. - * nblock is the blocksize to accumulate -- partial must be at least - * this long! - * process is the processing function, passed ctx and a pointer - * to the data to process (always exactly nblock bytes long!) - * which may not neccessarily be the same as partial. - * byte is the byte to process, nbytes times. - */ -void cf_blockwise_acc_byte(uint8_t *partial, size_t *npartial, - size_t nblock, - uint8_t byte, size_t nbytes, - cf_blockwise_in_fn process, - void *ctx); - -/* This function attempts to process patterns of bytes common in - * block cipher padding. - * - * This takes three bytes: - * - a first byte, fbyte, - * - a middle byte, mbyte, - * - a last byte, lbyte. - * - * If nbytes is zero, nothing happens. - * If nbytes is one, the byte fbyte ^ lbyte is processed. - * If nbytes is two, the fbyte then lbyte are processed. - * If nbytes is three or more, fbyte, then one or more mbytes, then fbyte - * is processed. - * - * partial is the buffer (maintained by the caller) - * on entry, npartial is the currently valid count of used bytes on - * the front of partial. - * on exit, npartial is updated to reflect the status of partial. - * nblock is the blocksize to accumulate -- partial must be at least - * this long! - * process is the processing function, passed ctx and a pointer - * to the data to process (always exactly nblock bytes long!) - * which may not neccessarily be the same as partial. - */ -void cf_blockwise_acc_pad(uint8_t *partial, size_t *npartial, - size_t nblock, - uint8_t fbyte, uint8_t mbyte, uint8_t lbyte, - size_t nbytes, - cf_blockwise_in_fn process, - void *ctx); - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/cbcmac.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/cbcmac.c deleted file mode 100644 index f0dfe87..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/cbcmac.c +++ /dev/null @@ -1,79 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "handy.h" -#include "prp.h" -#include "modes.h" -#include "bitops.h" -#include "blockwise.h" -#include "gf128.h" -#include "tassert.h" - -#include <string.h> - -void cf_cbcmac_stream_init(cf_cbcmac_stream *ctx, const cf_prp *prp, void *prpctx) -{ - memset(ctx, 0, sizeof *ctx); - ctx->prp = prp; - ctx->prpctx = prpctx; - cf_cbcmac_stream_reset(ctx); -} - -void cf_cbcmac_stream_reset(cf_cbcmac_stream *ctx) -{ - uint8_t iv_zero[CF_MAXBLOCK] = { 0 }; - cf_cbc_init(&ctx->cbc, ctx->prp, ctx->prpctx, iv_zero); - mem_clean(ctx->buffer, sizeof ctx->buffer); - ctx->used = 0; -} - -static void cbcmac_process(void *vctx, const uint8_t *block) -{ - cf_cbcmac_stream *ctx = vctx; - uint8_t output[CF_MAXBLOCK]; - cf_cbc_encrypt(&ctx->cbc, block, output, 1); -} - -void cf_cbcmac_stream_update(cf_cbcmac_stream *ctx, const uint8_t *data, size_t len) -{ - cf_blockwise_accumulate(ctx->buffer, &ctx->used, ctx->prp->blocksz, - data, len, - cbcmac_process, - ctx); -} - -void cf_cbcmac_stream_finish_block_zero(cf_cbcmac_stream *ctx) -{ - if (ctx->used == 0) - return; - - memset(ctx->buffer + ctx->used, 0, ctx->prp->blocksz - ctx->used); - cbcmac_process(ctx, ctx->buffer); - ctx->used = 0; -} - -void cf_cbcmac_stream_nopad_final(cf_cbcmac_stream *ctx, uint8_t out[CF_MAXBLOCK]) -{ - assert(ctx->used == 0); - memcpy(out, ctx->cbc.block, ctx->prp->blocksz); -} - -void cf_cbcmac_stream_pad_final(cf_cbcmac_stream *ctx, uint8_t out[CF_MAXBLOCK]) -{ - uint8_t npad = ctx->prp->blocksz - ctx->used; - cf_blockwise_acc_byte(ctx->buffer, &ctx->used, ctx->prp->blocksz, - npad, npad, - cbcmac_process, ctx); - cf_cbcmac_stream_nopad_final(ctx, out); -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/ccm.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/ccm.c deleted file mode 100644 index 7ef87fc..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/ccm.c +++ /dev/null @@ -1,193 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "handy.h" -#include "prp.h" -#include "modes.h" -#include "tassert.h" - -#include <string.h> - -#define CCM_ADATA_PRESENT 0x40 - -static void write_be(uint8_t *out, size_t value, size_t bytes) -{ - while (bytes) - { - out[bytes - 1] = value & 0xff; - value >>= 8; - bytes--; - } - - assert(value == 0); /* or we couldn't encode the value. */ -} - -static void zero_pad(cf_cbcmac_stream *cm) -{ - cf_cbcmac_stream_finish_block_zero(cm); -} - -/* nb. block is general workspace. */ -static void add_aad(cf_cbcmac_stream *cm, uint8_t block[CF_MAXBLOCK], - const uint8_t *header, size_t nheader) -{ - assert(nheader <= 0xffffffff); /* we don't support 64 bit lengths. */ - - /* Add length using stupidly complicated rules. */ - if (nheader < 0xff00) - { - write_be(block, nheader, 2); - cf_cbcmac_stream_update(cm, block, 2); - } else { - write_be(block, 0xfffe, 2); - write_be(block + 2, nheader, 4); - cf_cbcmac_stream_update(cm, block, 6); - } - - cf_cbcmac_stream_update(cm, header, nheader); - zero_pad(cm); -} - -static void add_block0(cf_cbcmac_stream *cm, - uint8_t block[CF_MAXBLOCK], size_t nblock, - const uint8_t *nonce, size_t nnonce, - size_t L, size_t nplain, - size_t nheader, size_t ntag) -{ - /* Construct first block B_0. */ - block[0] = ((nheader == 0) ? 0x00 : CCM_ADATA_PRESENT) | - ((ntag - 2) / 2) << 3 | - (L - 1); - memcpy(block + 1, nonce, nnonce); - write_be(block + 1 + nnonce, nplain, L); - - cf_cbcmac_stream_update(cm, block, nblock); -} - -static void build_ctr_nonce(uint8_t ctr_nonce[CF_MAXBLOCK], - size_t L, - const uint8_t *nonce, size_t nnonce) -{ - ctr_nonce[0] = (L - 1); - memcpy(ctr_nonce + 1, nonce, nnonce); - memset(ctr_nonce + 1 + nnonce, 0, L); -} - -void cf_ccm_encrypt(const cf_prp *prp, void *prpctx, - const uint8_t *plain, size_t nplain, size_t L, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce, - uint8_t *cipher, - uint8_t *tag, size_t ntag) -{ - uint8_t block[CF_MAXBLOCK]; - - assert(ntag >= 4 && ntag <= 16 && ntag % 2 == 0); - assert(L >= 2 && L <= 8); - assert(nnonce == prp->blocksz - L - 1); - - cf_cbcmac_stream cm; - cf_cbcmac_stream_init(&cm, prp, prpctx); - - /* Add first block. */ - add_block0(&cm, block, prp->blocksz, - nonce, nnonce, - L, nplain, nheader, ntag); - - /* Add AAD with length prefix, if present. */ - if (nheader) - add_aad(&cm, block, header, nheader); - - /* Add message. */ - cf_cbcmac_stream_update(&cm, plain, nplain); - zero_pad(&cm); - - /* Finish tag. */ - cf_cbcmac_stream_nopad_final(&cm, block); - - /* Start encryption. */ - /* Construct A_0 */ - uint8_t ctr_nonce[CF_MAXBLOCK]; - build_ctr_nonce(ctr_nonce, L, nonce, nnonce); - - cf_ctr ctr; - cf_ctr_init(&ctr, prp, prpctx, ctr_nonce); - cf_ctr_custom_counter(&ctr, prp->blocksz - L, L); - - /* Encrypt tag first. */ - cf_ctr_cipher(&ctr, block, block, prp->blocksz); - memcpy(tag, block, ntag); - - /* Then encrypt message. */ - cf_ctr_cipher(&ctr, plain, cipher, nplain); -} - -int cf_ccm_decrypt(const cf_prp *prp, void *prpctx, - const uint8_t *cipher, size_t ncipher, size_t L, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce, - const uint8_t *tag, size_t ntag, - uint8_t *plain) -{ - uint8_t block[CF_MAXBLOCK]; - - assert(ntag >= 4 && ntag <= 16 && ntag % 2 == 0); - assert(L >= 2 && L <= 8); - assert(nnonce == prp->blocksz - L - 1); - - uint8_t ctr_nonce[CF_MAXBLOCK]; - build_ctr_nonce(ctr_nonce, L, nonce, nnonce); - - cf_ctr ctr; - cf_ctr_init(&ctr, prp, prpctx, ctr_nonce); - cf_ctr_custom_counter(&ctr, prp->blocksz - L, L); - - /* Decrypt tag. */ - uint8_t plain_tag[CF_MAXBLOCK]; - cf_ctr_cipher(&ctr, tag, plain_tag, ntag); - cf_ctr_discard_block(&ctr); - - /* Decrypt message. */ - cf_ctr_cipher(&ctr, cipher, plain, ncipher); - - cf_cbcmac_stream cm; - cf_cbcmac_stream_init(&cm, prp, prpctx); - - /* Add first block. */ - add_block0(&cm, block, prp->blocksz, - nonce, nnonce, - L, ncipher, nheader, ntag); - - if (nheader) - add_aad(&cm, block, header, nheader); - - cf_cbcmac_stream_update(&cm, plain, ncipher); - zero_pad(&cm); - - /* Finish tag. */ - cf_cbcmac_stream_nopad_final(&cm, block); - - int err = 0; - - if (!mem_eq(block, plain_tag, ntag)) - { - err = 1; - mem_clean(plain, ncipher); - } - - mem_clean(block, sizeof block); - mem_clean(plain_tag, sizeof plain_tag); - return err; -} - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/cf_config.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/cf_config.h deleted file mode 100644 index ceb7e8d..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/cf_config.h +++ /dev/null @@ -1,59 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef CF_CONFIG_H -#define CF_CONFIG_H - -/** - * Library configuration - * ===================== - */ - -/* .. c:macro:: CF_SIDE_CHANNEL_PROTECTION - * Define this as 1 if you need all available side channel protections. - * **This option may alter the ABI**. - * - * This has a non-trivial performance penalty. Where a - * side-channel free option is cheap or free (like checking - * a MAC) this is always done in a side-channel free way. - * - * The default is **on** for all available protections. - */ -#ifndef CF_SIDE_CHANNEL_PROTECTION -# define CF_SIDE_CHANNEL_PROTECTION 1 -#endif - -/* .. c:macro:: CF_TIME_SIDE_CHANNEL_PROTECTION - * Define this as 1 if you need timing/branch prediction side channel - * protection. - * - * You probably want this. The default is on. */ -#ifndef CF_TIME_SIDE_CHANNEL_PROTECTION -# define CF_TIME_SIDE_CHANNEL_PROTECTION CF_SIDE_CHANNEL_PROTECTION -#endif - -/* .. c:macro:: CF_CACHE_SIDE_CHANNEL_PROTECTION - * Define this as 1 if you need cache side channel protection. - * - * If you have a microcontroller with no cache, you can turn this off - * without negative effects. - * - * The default is on. This will have some performance impact, - * especially on AES. - */ -#ifndef CF_CACHE_SIDE_CHANNEL_PROTECTION -# define CF_CACHE_SIDE_CHANNEL_PROTECTION CF_SIDE_CHANNEL_PROTECTION -#endif - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/chacha20.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/chacha20.c deleted file mode 100644 index 7a3bf38..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/chacha20.c +++ /dev/null @@ -1,161 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "bitops.h" -#include "salsa20.h" -#include "blockwise.h" -#include "tassert.h" - -#include <string.h> -#include <stdlib.h> - -void cf_chacha20_core(const uint8_t key0[16], - const uint8_t key1[16], - const uint8_t nonce[16], - const uint8_t constant[16], - uint8_t out[64]) -{ - uint32_t z0, z1, z2, z3, z4, z5, z6, z7, - z8, z9, za, zb, zc, zd, ze, zf; - - uint32_t x0 = z0 = read32_le(constant + 0), - x1 = z1 = read32_le(constant + 4), - x2 = z2 = read32_le(constant + 8), - x3 = z3 = read32_le(constant + 12), - x4 = z4 = read32_le(key0 + 0), - x5 = z5 = read32_le(key0 + 4), - x6 = z6 = read32_le(key0 + 8), - x7 = z7 = read32_le(key0 + 12), - x8 = z8 = read32_le(key1 + 0), - x9 = z9 = read32_le(key1 + 4), - xa = za = read32_le(key1 + 8), - xb = zb = read32_le(key1 + 12), - xc = zc = read32_le(nonce + 0), - xd = zd = read32_le(nonce + 4), - xe = ze = read32_le(nonce + 8), - xf = zf = read32_le(nonce + 12); - -#define QUARTER(a, b, c, d) \ - a += b; d = rotl32(d ^ a, 16); \ - c += d; b = rotl32(b ^ c, 12); \ - a += b; d = rotl32(d ^ a, 8); \ - c += d; b = rotl32(b ^ c, 7); - - int i; - for (i = 0; i < 10; i++) - { - QUARTER(z0, z4, z8, zc); - QUARTER(z1, z5, z9, zd); - QUARTER(z2, z6, za, ze); - QUARTER(z3, z7, zb, zf); - QUARTER(z0, z5, za, zf); - QUARTER(z1, z6, zb, zc); - QUARTER(z2, z7, z8, zd); - QUARTER(z3, z4, z9, ze); - } - - x0 += z0; - x1 += z1; - x2 += z2; - x3 += z3; - x4 += z4; - x5 += z5; - x6 += z6; - x7 += z7; - x8 += z8; - x9 += z9; - xa += za; - xb += zb; - xc += zc; - xd += zd; - xe += ze; - xf += zf; - - write32_le(x0, out + 0); - write32_le(x1, out + 4); - write32_le(x2, out + 8); - write32_le(x3, out + 12); - write32_le(x4, out + 16); - write32_le(x5, out + 20); - write32_le(x6, out + 24); - write32_le(x7, out + 28); - write32_le(x8, out + 32); - write32_le(x9, out + 36); - write32_le(xa, out + 40); - write32_le(xb, out + 44); - write32_le(xc, out + 48); - write32_le(xd, out + 52); - write32_le(xe, out + 56); - write32_le(xf, out + 60); -} - -static const uint8_t *chacha20_tau = (const uint8_t *) "expand 16-byte k"; -static const uint8_t *chacha20_sigma = (const uint8_t *) "expand 32-byte k"; - -static void set_key(cf_chacha20_ctx *ctx, const uint8_t *key, size_t nkey) -{ - switch (nkey) - { - case 16: - memcpy(ctx->key0, key, 16); - memcpy(ctx->key1, key, 16); - ctx->constant = chacha20_tau; - break; - case 32: - memcpy(ctx->key0, key, 16); - memcpy(ctx->key1, key + 16, 16); - ctx->constant = chacha20_sigma; - break; - default: - abort(); - } -} - -void cf_chacha20_init(cf_chacha20_ctx *ctx, const uint8_t *key, size_t nkey, const uint8_t nonce[8]) -{ - set_key(ctx, key, nkey); - memset(ctx->nonce, 0, sizeof ctx->nonce); - memcpy(ctx->nonce + 8, nonce, 8); - ctx->nblock = 0; - ctx->ncounter = 8; -} - -void cf_chacha20_init_custom(cf_chacha20_ctx *ctx, const uint8_t *key, size_t nkey, - const uint8_t nonce[16], size_t ncounter) -{ - assert(ncounter > 0); - set_key(ctx, key, nkey); - memcpy(ctx->nonce, nonce, sizeof ctx->nonce); - ctx->nblock = 0; - ctx->ncounter = ncounter; -} - -static void cf_chacha20_next_block(void *vctx, uint8_t *out) -{ - cf_chacha20_ctx *ctx = vctx; - cf_chacha20_core(ctx->key0, - ctx->key1, - ctx->nonce, - ctx->constant, - out); - incr_le(ctx->nonce, ctx->ncounter); -} - -void cf_chacha20_cipher(cf_chacha20_ctx *ctx, const uint8_t *input, uint8_t *output, size_t bytes) -{ - cf_blockwise_xor(ctx->block, &ctx->nblock, 64, - input, output, bytes, - cf_chacha20_next_block, - ctx); -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/chacha20poly1305.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/chacha20poly1305.c deleted file mode 100644 index 0aef725..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/chacha20poly1305.c +++ /dev/null @@ -1,148 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "chacha20poly1305.h" -#include "salsa20.h" -#include "poly1305.h" -#include "bitops.h" -#include "handy.h" - -#define ENCRYPT 1 -#define DECRYPT 0 - -#define SUCCESS 0 -#define FAILURE 1 - -static int process(const uint8_t key[32], - const uint8_t nonce[12], - const uint8_t *header, size_t nheader, - const uint8_t *input, size_t nbytes, - uint8_t *output, - int mode, - uint8_t tag[16]) -{ - /* First, generate the Poly1305 key by running ChaCha20 with the - * given key and a zero counter. The first half of the - * 64-byte output is the key. */ - uint8_t fullnonce[16] = { 0 }; - memcpy(fullnonce + 4, nonce, 12); - - uint8_t polykey[32] = { 0 }; - cf_chacha20_ctx chacha; - cf_chacha20_init_custom(&chacha, key, 32, fullnonce, 4); - cf_chacha20_cipher(&chacha, polykey, polykey, sizeof polykey); - - /* Now initialise Poly1305. */ - cf_poly1305 poly; - cf_poly1305_init(&poly, polykey, polykey + 16); - mem_clean(polykey, sizeof polykey); - - /* Discard next 32 bytes of chacha20 key stream. */ - cf_chacha20_cipher(&chacha, polykey, polykey, sizeof polykey); - mem_clean(polykey, sizeof polykey); - - /* The input to Poly1305 is: - * AAD || pad(AAD) || cipher || pad(cipher) || len_64(aad) || len_64(cipher) */ - uint8_t padbuf[16] = { 0 }; - -#define PADLEN(x) (16 - ((x) & 0xf)) - - /* AAD || pad(AAD) */ - cf_poly1305_update(&poly, header, nheader); - cf_poly1305_update(&poly, padbuf, PADLEN(nheader)); - - /* || cipher */ - if (mode == ENCRYPT) - { - /* If we're encrypting, we compute the ciphertext - * before inputting it into the MAC. */ - cf_chacha20_cipher(&chacha, input, output, nbytes); - cf_poly1305_update(&poly, output, nbytes); - } else { - /* Otherwise: decryption -- input the ciphertext. - * Delay actual decryption until we checked the MAC. */ - cf_poly1305_update(&poly, input, nbytes); - } - - /* || pad(cipher) */ - cf_poly1305_update(&poly, padbuf, PADLEN(nbytes)); - - /* || len_64(aad) || len_64(cipher) */ - write64_le(nheader, padbuf); - write64_le(nbytes, padbuf + 8); - cf_poly1305_update(&poly, padbuf, sizeof padbuf); - - /* MAC computation is now complete. */ - - if (mode == ENCRYPT) - { - cf_poly1305_finish(&poly, tag); - mem_clean(&chacha, sizeof chacha); - return SUCCESS; - } - - /* Decrypt mode: calculate tag, and check it. - * If it's correct, proceed with decryption. */ - uint8_t checktag[16]; - cf_poly1305_finish(&poly, checktag); - - if (mem_eq(checktag, tag, sizeof checktag)) - { - cf_chacha20_cipher(&chacha, input, output, nbytes); - mem_clean(&chacha, sizeof chacha); - mem_clean(checktag, sizeof checktag); - return SUCCESS; - } else { - mem_clean(output, nbytes); - mem_clean(&chacha, sizeof chacha); - mem_clean(checktag, sizeof checktag); - return FAILURE; - } -} - -void cf_chacha20poly1305_encrypt(const uint8_t key[32], - const uint8_t nonce[12], - const uint8_t *header, size_t nheader, - const uint8_t *plaintext, size_t nbytes, - uint8_t *ciphertext, - uint8_t tag[16]) -{ - process(key, - nonce, - header, nheader, - plaintext, nbytes, - ciphertext, - ENCRYPT, - tag); -} - -int cf_chacha20poly1305_decrypt(const uint8_t key[32], - const uint8_t nonce[12], - const uint8_t *header, size_t nheader, - const uint8_t *ciphertext, size_t nbytes, - const uint8_t tag[16], - uint8_t *plaintext) -{ - uint8_t ourtag[16]; - memcpy(ourtag, tag, sizeof ourtag); - - return process(key, - nonce, - header, nheader, - ciphertext, nbytes, - plaintext, - DECRYPT, - ourtag); -} - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/chacha20poly1305.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/chacha20poly1305.h deleted file mode 100644 index 1d44156..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/chacha20poly1305.h +++ /dev/null @@ -1,73 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef CHACHA20POLY1305_H -#define CHACHA20POLY1305_H - -#include <stdint.h> -#include <stddef.h> - -/** - * The ChaCha20-Poly1305 AEAD construction - * ======================================= - * This is a composition of the ChaCha20 stream cipher and - * the Poly1305 polynomial MAC to form an AEAD. - * It's specified for use in TLS in the form of RFC7539. - * - * It uses a 256-bit key and a 96-bit nonce. - * - * This is a one-shot interface. - */ - -/* .. c:function:: $DECL - * ChaCha20-Poly1305 authenticated encryption. - * - * :param key: key material. - * :param nonce: per-message nonce. - * :param header: header buffer. - * :param nheader: number of header bytes. - * :param plaintext: plaintext bytes to be encrypted. - * :param nbytes: number of plaintext/ciphertext bytes. - * :param ciphertext: ciphertext output buffer, nbytes in length. - * :param tag: authentication tag output buffer. - */ -void cf_chacha20poly1305_encrypt(const uint8_t key[32], - const uint8_t nonce[12], - const uint8_t *header, size_t nheader, - const uint8_t *plaintext, size_t nbytes, - uint8_t *ciphertext, - uint8_t tag[16]); - -/* .. c:function:: $DECL - * ChaCha20-Poly1305 authenticated decryption. - * - * :return: 0 on success, non-zero on error. Plaintext is zeroed on error. - * - * :param key: key material. - * :param nonce: per-message nonce. - * :param header: header buffer. - * :param nheader: number of header bytes. - * :param ciphertext: ciphertext bytes to be decrypted. - * :param nbytes: number of plaintext/ciphertext bytes. - * :param plaintext: plaintext output buffer, nbytes in length. - * :param tag: authentication tag output buffer. - */ -int cf_chacha20poly1305_decrypt(const uint8_t key[32], - const uint8_t nonce[12], - const uint8_t *header, size_t nheader, - const uint8_t *ciphertext, size_t nbytes, - const uint8_t tag[16], - uint8_t *plaintext); - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/chash.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/chash.c deleted file mode 100644 index 4ee5d76..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/chash.c +++ /dev/null @@ -1,28 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "chash.h" -#include "handy.h" -#include "tassert.h" - -void cf_hash(const cf_chash *h, const void *m, size_t nm, uint8_t *out) -{ - cf_chash_ctx ctx; - assert(h); - h->init(&ctx); - h->update(&ctx, m, nm); - h->digest(&ctx, out); - mem_clean(&ctx, sizeof ctx); -} - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/chash.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/chash.h deleted file mode 100644 index 8f2e201..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/chash.h +++ /dev/null @@ -1,137 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef CHASH_H -#define CHASH_H - -#include <stddef.h> -#include <stdint.h> - -/** - * General hash function description - * ================================= - * This allows us to make use of hash functions without depending - * on a specific one. This is useful in implementing, for example, - * :doc:`HMAC <hmac>`. - */ - -/* .. c:type:: cf_chash_init - * Hashing initialisation function type. - * - * Functions of this type should initialise the context in preparation - * for hashing a message with `cf_chash_update` functions. - * - * :rtype: void - * :param ctx: hash function-specific context structure. - */ -typedef void (*cf_chash_init)(void *ctx); - -/* .. c:type:: cf_chash_update - * Hashing data processing function type. - * - * Functions of this type hash `count` bytes of data at `data`, - * updating the contents of `ctx`. - * - * :rtype: void - * :param ctx: hash function-specific context structure. - * :param data: input data to hash. - * :param count: number of bytes to hash. - */ -typedef void (*cf_chash_update)(void *ctx, const void *data, size_t count); - -/* .. c:type:: cf_chash_digest - * Hashing completion function type. - * - * Functions of this type complete a hashing operation, - * writing :c:member:`cf_chash.hashsz` bytes to `hash`. - * - * This function does not change `ctx` -- any padding which needs doing - * must be done seperately (in a copy of `ctx`, say). - * - * This means you can interlave `_update` and `_digest` calls to - * learn `H(A)` and `H(A || B)` without hashing `A` twice. - * - * :rtype: void - * :param ctx: hash function-specific context structure. - * :param hash: location to write hash result. - */ -typedef void (*cf_chash_digest)(const void *ctx, uint8_t *hash); - -/* .. c:type:: cf_chash - * This type describes an incremental hash function in an abstract way. - * - * .. c:member:: cf_chash.hashsz - * The hash function's output, in bytes. - * - * .. c:member:: cf_chash.blocksz - * The hash function's internal block size, in bytes. - * - * .. c:member:: cf_chash.init - * Context initialisation function. - * - * .. c:member:: cf_chash:update - * Data processing function. - * - * .. c:member:: cf_chash:digest - * Completion function. - * - */ -typedef struct -{ - size_t hashsz; - size_t blocksz; - - cf_chash_init init; - cf_chash_update update; - cf_chash_digest digest; -} cf_chash; - -/* .. c:macro:: CF_CHASH_MAXCTX - * The maximum size of a :c:type:`cf_chash_ctx`. This allows - * use to put a structure in automatic storage that can - * store working data for any supported hash function. */ -#define CF_CHASH_MAXCTX 360 - -/* .. c:macro:: CF_CHASH_MAXBLK - * Maximum hash function block size (in bytes). */ -#define CF_CHASH_MAXBLK 128 - -/* .. c:macro:: CF_MAXHASH - * Maximum hash function output (in bytes). */ -#define CF_MAXHASH 64 - -/* .. c:type:: cf_chash_ctx - * A type usable with any `cf_chash` as a context. */ -typedef union -{ - uint8_t ctx[CF_CHASH_MAXCTX]; - uint16_t u16; - uint32_t u32; - uint64_t u64; -} cf_chash_ctx; - -/* .. c:function:: $DECL - * One shot hashing: `out = h(m)`. - * - * Using the hash function `h`, `nm` bytes at `m` are hashed and `h->hashsz` bytes - * of result is written to the buffer `out`. - * - * :param h: hash function description. - * :param m: message buffer. - * :param nm: message length. - * :param out: hash result buffer (written). - */ -void cf_hash(const cf_chash *h, const void *m, size_t nm, uint8_t *out); - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/cmac.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/cmac.c deleted file mode 100644 index 51f5843..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/cmac.c +++ /dev/null @@ -1,150 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "handy.h" -#include "prp.h" -#include "modes.h" -#include "bitops.h" -#include "blockwise.h" -#include "gf128.h" -#include "tassert.h" - -#include <string.h> - -void cf_cmac_init(cf_cmac *ctx, const cf_prp *prp, void *prpctx) -{ - uint8_t L[CF_MAXBLOCK]; - assert(prp->blocksz == 16); - - mem_clean(ctx, sizeof *ctx); - - /* L = E_K(0^n) */ - mem_clean(L, prp->blocksz); - prp->encrypt(prpctx, L, L); - - /* B = 2L */ - cf_gf128 gf; - cf_gf128_frombytes_be(L, gf); - cf_gf128_double(gf, gf); - cf_gf128_tobytes_be(gf, ctx->B); - - /* P = 4L */ - cf_gf128_double(gf, gf); - cf_gf128_tobytes_be(gf, ctx->P); - - ctx->prp = prp; - ctx->prpctx = prpctx; -} - -void cf_cmac_sign(cf_cmac *ctx, const uint8_t *data, size_t len, uint8_t out[CF_MAXBLOCK]) -{ - cf_cmac_stream stream; - stream.cmac = *ctx; - cf_cmac_stream_reset(&stream); - cf_cmac_stream_update(&stream, data, len, 1); - cf_cmac_stream_final(&stream, out); -} - -void cf_cmac_stream_init(cf_cmac_stream *ctx, const cf_prp *prp, void *prpctx) -{ - cf_cmac_init(&ctx->cmac, prp, prpctx); - cf_cmac_stream_reset(ctx); -} - -void cf_cmac_stream_reset(cf_cmac_stream *ctx) -{ - uint8_t iv_zero[CF_MAXBLOCK] = { 0 }; - cf_cbc_init(&ctx->cbc, ctx->cmac.prp, ctx->cmac.prpctx, iv_zero); - mem_clean(ctx->buffer, sizeof ctx->buffer); - ctx->used = 0; - ctx->processed = 0; - ctx->finalised = 0; -} - -static void cmac_process(void *vctx, const uint8_t *block) -{ - cf_cmac_stream *ctx = vctx; - uint8_t output[CF_MAXBLOCK]; - cf_cbc_encrypt(&ctx->cbc, block, output, 1); - ctx->processed += ctx->cmac.prp->blocksz; -} - -static void cmac_process_final(cf_cmac_stream *ctx, const uint8_t *block, - const uint8_t *xor) -{ - uint8_t input[CF_MAXBLOCK]; - uint8_t output[CF_MAXBLOCK]; - xor_bb(input, block, xor, ctx->cmac.prp->blocksz); - cf_cbc_encrypt(&ctx->cbc, input, output, 1); - ctx->processed += ctx->cmac.prp->blocksz; - /* signature is in ctx->cbc.block. */ -} - -static void cmac_process_final_nopad(void *vctx, const uint8_t *block) -{ - cf_cmac_stream *ctx = vctx; - cmac_process_final(ctx, block, ctx->cmac.B); - ctx->finalised = 1; -} - -static void cmac_process_final_pad(void *vctx, const uint8_t *block) -{ - cf_cmac_stream *ctx = vctx; - cmac_process_final(ctx, block, ctx->cmac.P); - ctx->finalised = 1; -} - -void cf_cmac_stream_update(cf_cmac_stream *ctx, const uint8_t *data, size_t len, int isfinal) -{ - size_t blocksz = ctx->cmac.prp->blocksz; - cf_blockwise_in_fn final_fn = cmac_process; - int needpad = 0; - - if (isfinal) - { - int whole_number_of_blocks = ((len + ctx->used) & 0xf) == 0; - int empty_message = len == 0 && ctx->used == 0 && ctx->processed == 0; - - assert(!ctx->finalised); /* finalised before? */ - assert(len != 0 || empty_message); /* we can't be told we're done after the fact. */ - - /* If we have a whole number of blocks, and at least 1 block, we XOR in B. - * Otherwise, we need to pad and XOR in P. */ - if (whole_number_of_blocks && !empty_message) - final_fn = cmac_process_final_nopad; - else - needpad = 1; - } - - /* Input data */ - cf_blockwise_accumulate_final(ctx->buffer, &ctx->used, blocksz, - data, len, - cmac_process, - final_fn, ctx); - - /* Input padding */ - if (needpad) - { - cf_blockwise_acc_pad(ctx->buffer, &ctx->used, blocksz, - 0x80, 0x00, 0x00, blocksz - ctx->used, - cmac_process_final_pad, ctx); - } -} - -void cf_cmac_stream_final(cf_cmac_stream *ctx, uint8_t out[CF_MAXBLOCK]) -{ - assert(ctx->finalised); - memcpy(out, ctx->cbc.block, ctx->cmac.prp->blocksz); -} - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/curve25519.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/curve25519.c deleted file mode 100644 index 6c4b9c1..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/curve25519.c +++ /dev/null @@ -1,29 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#if defined(CORTEX_M0) || defined(CORTEX_M3) || defined(CORTEX_M4) -#include "arm/unacl/scalarmult.c" - -void cf_curve25519_mul(uint8_t out[32], const uint8_t scalar[32], const uint8_t point[32]) -{ - crypto_scalarmult_curve25519(out, scalar, point); -} - -void cf_curve25519_mul_base(uint8_t out[32], const uint8_t scalar[32]) -{ - crypto_scalarmult_curve25519_base(out, scalar); -} -#else -#include "curve25519.tweetnacl.c" -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/curve25519.donna.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/curve25519.donna.c deleted file mode 100644 index 3c597d3..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/curve25519.donna.c +++ /dev/null @@ -1,867 +0,0 @@ -/* Copyright 2008, Google Inc. - * All rights reserved. - * - * Redistribution and use in source and binary forms, with or without - * modification, are permitted provided that the following conditions are - * met: - * - * * Redistributions of source code must retain the above copyright - * notice, this list of conditions and the following disclaimer. - * * Redistributions in binary form must reproduce the above - * copyright notice, this list of conditions and the following disclaimer - * in the documentation and/or other materials provided with the - * distribution. - * * Neither the name of Google Inc. nor the names of its - * contributors may be used to endorse or promote products derived from - * this software without specific prior written permission. - * - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. - * - * curve25519-donna: Curve25519 elliptic curve, public key function - * - * http://code.google.com/p/curve25519-donna/ - * - * Adam Langley <agl@imperialviolet.org> - * - * Derived from public domain C code by Daniel J. Bernstein <djb@cr.yp.to> - * - * More information about curve25519 can be found here - * http://cr.yp.to/ecdh.html - * - * djb's sample implementation of curve25519 is written in a special assembly - * language called qhasm and uses the floating point registers. - * - * This is, almost, a clean room reimplementation from the curve25519 paper. It - * uses many of the tricks described therein. Only the crecip function is taken - * from the sample implementation. */ - -#include "curve25519.h" - -#include <string.h> -#include <stdint.h> - -#ifdef _MSC_VER -#define inline __inline -#endif - -typedef uint8_t u8; -typedef int32_t s32; -typedef int64_t limb; - -/* Field element representation: - * - * Field elements are written as an array of signed, 64-bit limbs, least - * significant first. The value of the field element is: - * x[0] + 2^26·x[1] + x^51·x[2] + 2^102·x[3] + ... - * - * i.e. the limbs are 26, 25, 26, 25, ... bits wide. */ - -/* Sum two numbers: output += in */ -static void fsum(limb *output, const limb *in) { - unsigned i; - for (i = 0; i < 10; i += 2) { - output[0+i] = output[0+i] + in[0+i]; - output[1+i] = output[1+i] + in[1+i]; - } -} - -/* Find the difference of two numbers: output = in - output - * (note the order of the arguments!). */ -static void fdifference(limb *output, const limb *in) { - unsigned i; - for (i = 0; i < 10; ++i) { - output[i] = in[i] - output[i]; - } -} - -/* Multiply a number by a scalar: output = in * scalar */ -static void fscalar_product(limb *output, const limb *in, const limb scalar) { - unsigned i; - for (i = 0; i < 10; ++i) { - output[i] = in[i] * scalar; - } -} - -/* Multiply two numbers: output = in2 * in - * - * output must be distinct to both inputs. The inputs are reduced coefficient - * form, the output is not. - * - * output[x] <= 14 * the largest product of the input limbs. */ -static void fproduct(limb *output, const limb *in2, const limb *in) { - output[0] = ((limb) ((s32) in2[0])) * ((s32) in[0]); - output[1] = ((limb) ((s32) in2[0])) * ((s32) in[1]) + - ((limb) ((s32) in2[1])) * ((s32) in[0]); - output[2] = 2 * ((limb) ((s32) in2[1])) * ((s32) in[1]) + - ((limb) ((s32) in2[0])) * ((s32) in[2]) + - ((limb) ((s32) in2[2])) * ((s32) in[0]); - output[3] = ((limb) ((s32) in2[1])) * ((s32) in[2]) + - ((limb) ((s32) in2[2])) * ((s32) in[1]) + - ((limb) ((s32) in2[0])) * ((s32) in[3]) + - ((limb) ((s32) in2[3])) * ((s32) in[0]); - output[4] = ((limb) ((s32) in2[2])) * ((s32) in[2]) + - 2 * (((limb) ((s32) in2[1])) * ((s32) in[3]) + - ((limb) ((s32) in2[3])) * ((s32) in[1])) + - ((limb) ((s32) in2[0])) * ((s32) in[4]) + - ((limb) ((s32) in2[4])) * ((s32) in[0]); - output[5] = ((limb) ((s32) in2[2])) * ((s32) in[3]) + - ((limb) ((s32) in2[3])) * ((s32) in[2]) + - ((limb) ((s32) in2[1])) * ((s32) in[4]) + - ((limb) ((s32) in2[4])) * ((s32) in[1]) + - ((limb) ((s32) in2[0])) * ((s32) in[5]) + - ((limb) ((s32) in2[5])) * ((s32) in[0]); - output[6] = 2 * (((limb) ((s32) in2[3])) * ((s32) in[3]) + - ((limb) ((s32) in2[1])) * ((s32) in[5]) + - ((limb) ((s32) in2[5])) * ((s32) in[1])) + - ((limb) ((s32) in2[2])) * ((s32) in[4]) + - ((limb) ((s32) in2[4])) * ((s32) in[2]) + - ((limb) ((s32) in2[0])) * ((s32) in[6]) + - ((limb) ((s32) in2[6])) * ((s32) in[0]); - output[7] = ((limb) ((s32) in2[3])) * ((s32) in[4]) + - ((limb) ((s32) in2[4])) * ((s32) in[3]) + - ((limb) ((s32) in2[2])) * ((s32) in[5]) + - ((limb) ((s32) in2[5])) * ((s32) in[2]) + - ((limb) ((s32) in2[1])) * ((s32) in[6]) + - ((limb) ((s32) in2[6])) * ((s32) in[1]) + - ((limb) ((s32) in2[0])) * ((s32) in[7]) + - ((limb) ((s32) in2[7])) * ((s32) in[0]); - output[8] = ((limb) ((s32) in2[4])) * ((s32) in[4]) + - 2 * (((limb) ((s32) in2[3])) * ((s32) in[5]) + - ((limb) ((s32) in2[5])) * ((s32) in[3]) + - ((limb) ((s32) in2[1])) * ((s32) in[7]) + - ((limb) ((s32) in2[7])) * ((s32) in[1])) + - ((limb) ((s32) in2[2])) * ((s32) in[6]) + - ((limb) ((s32) in2[6])) * ((s32) in[2]) + - ((limb) ((s32) in2[0])) * ((s32) in[8]) + - ((limb) ((s32) in2[8])) * ((s32) in[0]); - output[9] = ((limb) ((s32) in2[4])) * ((s32) in[5]) + - ((limb) ((s32) in2[5])) * ((s32) in[4]) + - ((limb) ((s32) in2[3])) * ((s32) in[6]) + - ((limb) ((s32) in2[6])) * ((s32) in[3]) + - ((limb) ((s32) in2[2])) * ((s32) in[7]) + - ((limb) ((s32) in2[7])) * ((s32) in[2]) + - ((limb) ((s32) in2[1])) * ((s32) in[8]) + - ((limb) ((s32) in2[8])) * ((s32) in[1]) + - ((limb) ((s32) in2[0])) * ((s32) in[9]) + - ((limb) ((s32) in2[9])) * ((s32) in[0]); - output[10] = 2 * (((limb) ((s32) in2[5])) * ((s32) in[5]) + - ((limb) ((s32) in2[3])) * ((s32) in[7]) + - ((limb) ((s32) in2[7])) * ((s32) in[3]) + - ((limb) ((s32) in2[1])) * ((s32) in[9]) + - ((limb) ((s32) in2[9])) * ((s32) in[1])) + - ((limb) ((s32) in2[4])) * ((s32) in[6]) + - ((limb) ((s32) in2[6])) * ((s32) in[4]) + - ((limb) ((s32) in2[2])) * ((s32) in[8]) + - ((limb) ((s32) in2[8])) * ((s32) in[2]); - output[11] = ((limb) ((s32) in2[5])) * ((s32) in[6]) + - ((limb) ((s32) in2[6])) * ((s32) in[5]) + - ((limb) ((s32) in2[4])) * ((s32) in[7]) + - ((limb) ((s32) in2[7])) * ((s32) in[4]) + - ((limb) ((s32) in2[3])) * ((s32) in[8]) + - ((limb) ((s32) in2[8])) * ((s32) in[3]) + - ((limb) ((s32) in2[2])) * ((s32) in[9]) + - ((limb) ((s32) in2[9])) * ((s32) in[2]); - output[12] = ((limb) ((s32) in2[6])) * ((s32) in[6]) + - 2 * (((limb) ((s32) in2[5])) * ((s32) in[7]) + - ((limb) ((s32) in2[7])) * ((s32) in[5]) + - ((limb) ((s32) in2[3])) * ((s32) in[9]) + - ((limb) ((s32) in2[9])) * ((s32) in[3])) + - ((limb) ((s32) in2[4])) * ((s32) in[8]) + - ((limb) ((s32) in2[8])) * ((s32) in[4]); - output[13] = ((limb) ((s32) in2[6])) * ((s32) in[7]) + - ((limb) ((s32) in2[7])) * ((s32) in[6]) + - ((limb) ((s32) in2[5])) * ((s32) in[8]) + - ((limb) ((s32) in2[8])) * ((s32) in[5]) + - ((limb) ((s32) in2[4])) * ((s32) in[9]) + - ((limb) ((s32) in2[9])) * ((s32) in[4]); - output[14] = 2 * (((limb) ((s32) in2[7])) * ((s32) in[7]) + - ((limb) ((s32) in2[5])) * ((s32) in[9]) + - ((limb) ((s32) in2[9])) * ((s32) in[5])) + - ((limb) ((s32) in2[6])) * ((s32) in[8]) + - ((limb) ((s32) in2[8])) * ((s32) in[6]); - output[15] = ((limb) ((s32) in2[7])) * ((s32) in[8]) + - ((limb) ((s32) in2[8])) * ((s32) in[7]) + - ((limb) ((s32) in2[6])) * ((s32) in[9]) + - ((limb) ((s32) in2[9])) * ((s32) in[6]); - output[16] = ((limb) ((s32) in2[8])) * ((s32) in[8]) + - 2 * (((limb) ((s32) in2[7])) * ((s32) in[9]) + - ((limb) ((s32) in2[9])) * ((s32) in[7])); - output[17] = ((limb) ((s32) in2[8])) * ((s32) in[9]) + - ((limb) ((s32) in2[9])) * ((s32) in[8]); - output[18] = 2 * ((limb) ((s32) in2[9])) * ((s32) in[9]); -} - -/* Reduce a long form to a short form by taking the input mod 2^255 - 19. - * - * On entry: |output[i]| < 14*2^54 - * On exit: |output[0..8]| < 280*2^54 */ -static void freduce_degree(limb *output) { - /* Each of these shifts and adds ends up multiplying the value by 19. - * - * For output[0..8], the absolute entry value is < 14*2^54 and we add, at - * most, 19*14*2^54 thus, on exit, |output[0..8]| < 280*2^54. */ - output[8] += output[18] << 4; - output[8] += output[18] << 1; - output[8] += output[18]; - output[7] += output[17] << 4; - output[7] += output[17] << 1; - output[7] += output[17]; - output[6] += output[16] << 4; - output[6] += output[16] << 1; - output[6] += output[16]; - output[5] += output[15] << 4; - output[5] += output[15] << 1; - output[5] += output[15]; - output[4] += output[14] << 4; - output[4] += output[14] << 1; - output[4] += output[14]; - output[3] += output[13] << 4; - output[3] += output[13] << 1; - output[3] += output[13]; - output[2] += output[12] << 4; - output[2] += output[12] << 1; - output[2] += output[12]; - output[1] += output[11] << 4; - output[1] += output[11] << 1; - output[1] += output[11]; - output[0] += output[10] << 4; - output[0] += output[10] << 1; - output[0] += output[10]; -} - -#if (-1 & 3) != 3 -#error "This code only works on a two's complement system" -#endif - -/* return v / 2^26, using only shifts and adds. - * - * On entry: v can take any value. */ -static inline limb -div_by_2_26(const limb v) -{ - /* High word of v; no shift needed. */ - const uint32_t highword = (uint32_t) (((uint64_t) v) >> 32); - /* Set to all 1s if v was negative; else set to 0s. */ - const int32_t sign = ((int32_t) highword) >> 31; - /* Set to 0x3ffffff if v was negative; else set to 0. */ - const int32_t roundoff = ((uint32_t) sign) >> 6; - /* Should return v / (1<<26) */ - return (v + roundoff) >> 26; -} - -/* return v / (2^25), using only shifts and adds. - * - * On entry: v can take any value. */ -static inline limb -div_by_2_25(const limb v) -{ - /* High word of v; no shift needed*/ - const uint32_t highword = (uint32_t) (((uint64_t) v) >> 32); - /* Set to all 1s if v was negative; else set to 0s. */ - const int32_t sign = ((int32_t) highword) >> 31; - /* Set to 0x1ffffff if v was negative; else set to 0. */ - const int32_t roundoff = ((uint32_t) sign) >> 7; - /* Should return v / (1<<25) */ - return (v + roundoff) >> 25; -} - -/* Reduce all coefficients of the short form input so that |x| < 2^26. - * - * On entry: |output[i]| < 280*2^54 */ -static void freduce_coefficients(limb *output) { - unsigned i; - - output[10] = 0; - - for (i = 0; i < 10; i += 2) { - limb over = div_by_2_26(output[i]); - /* The entry condition (that |output[i]| < 280*2^54) means that over is, at - * most, 280*2^28 in the first iteration of this loop. This is added to the - * next limb and we can approximate the resulting bound of that limb by - * 281*2^54. */ - output[i] -= over << 26; - output[i+1] += over; - - /* For the first iteration, |output[i+1]| < 281*2^54, thus |over| < - * 281*2^29. When this is added to the next limb, the resulting bound can - * be approximated as 281*2^54. - * - * For subsequent iterations of the loop, 281*2^54 remains a conservative - * bound and no overflow occurs. */ - over = div_by_2_25(output[i+1]); - output[i+1] -= over << 25; - output[i+2] += over; - } - /* Now |output[10]| < 281*2^29 and all other coefficients are reduced. */ - output[0] += output[10] << 4; - output[0] += output[10] << 1; - output[0] += output[10]; - - output[10] = 0; - - /* Now output[1..9] are reduced, and |output[0]| < 2^26 + 19*281*2^29 - * So |over| will be no more than 2^16. */ - { - limb over = div_by_2_26(output[0]); - output[0] -= over << 26; - output[1] += over; - } - - /* Now output[0,2..9] are reduced, and |output[1]| < 2^25 + 2^16 < 2^26. The - * bound on |output[1]| is sufficient to meet our needs. */ -} - -/* A helpful wrapper around fproduct: output = in * in2. - * - * On entry: |in[i]| < 2^27 and |in2[i]| < 2^27. - * - * output must be distinct to both inputs. The output is reduced degree - * (indeed, one need only provide storage for 10 limbs) and |output[i]| < 2^26. */ -static void -fmul(limb *output, const limb *in, const limb *in2) { - limb t[19]; - fproduct(t, in, in2); - /* |t[i]| < 14*2^54 */ - freduce_degree(t); - freduce_coefficients(t); - /* |t[i]| < 2^26 */ - memcpy(output, t, sizeof(limb) * 10); -} - -/* Square a number: output = in**2 - * - * output must be distinct from the input. The inputs are reduced coefficient - * form, the output is not. - * - * output[x] <= 14 * the largest product of the input limbs. */ -static void fsquare_inner(limb *output, const limb *in) { - output[0] = ((limb) ((s32) in[0])) * ((s32) in[0]); - output[1] = 2 * ((limb) ((s32) in[0])) * ((s32) in[1]); - output[2] = 2 * (((limb) ((s32) in[1])) * ((s32) in[1]) + - ((limb) ((s32) in[0])) * ((s32) in[2])); - output[3] = 2 * (((limb) ((s32) in[1])) * ((s32) in[2]) + - ((limb) ((s32) in[0])) * ((s32) in[3])); - output[4] = ((limb) ((s32) in[2])) * ((s32) in[2]) + - 4 * ((limb) ((s32) in[1])) * ((s32) in[3]) + - 2 * ((limb) ((s32) in[0])) * ((s32) in[4]); - output[5] = 2 * (((limb) ((s32) in[2])) * ((s32) in[3]) + - ((limb) ((s32) in[1])) * ((s32) in[4]) + - ((limb) ((s32) in[0])) * ((s32) in[5])); - output[6] = 2 * (((limb) ((s32) in[3])) * ((s32) in[3]) + - ((limb) ((s32) in[2])) * ((s32) in[4]) + - ((limb) ((s32) in[0])) * ((s32) in[6]) + - 2 * ((limb) ((s32) in[1])) * ((s32) in[5])); - output[7] = 2 * (((limb) ((s32) in[3])) * ((s32) in[4]) + - ((limb) ((s32) in[2])) * ((s32) in[5]) + - ((limb) ((s32) in[1])) * ((s32) in[6]) + - ((limb) ((s32) in[0])) * ((s32) in[7])); - output[8] = ((limb) ((s32) in[4])) * ((s32) in[4]) + - 2 * (((limb) ((s32) in[2])) * ((s32) in[6]) + - ((limb) ((s32) in[0])) * ((s32) in[8]) + - 2 * (((limb) ((s32) in[1])) * ((s32) in[7]) + - ((limb) ((s32) in[3])) * ((s32) in[5]))); - output[9] = 2 * (((limb) ((s32) in[4])) * ((s32) in[5]) + - ((limb) ((s32) in[3])) * ((s32) in[6]) + - ((limb) ((s32) in[2])) * ((s32) in[7]) + - ((limb) ((s32) in[1])) * ((s32) in[8]) + - ((limb) ((s32) in[0])) * ((s32) in[9])); - output[10] = 2 * (((limb) ((s32) in[5])) * ((s32) in[5]) + - ((limb) ((s32) in[4])) * ((s32) in[6]) + - ((limb) ((s32) in[2])) * ((s32) in[8]) + - 2 * (((limb) ((s32) in[3])) * ((s32) in[7]) + - ((limb) ((s32) in[1])) * ((s32) in[9]))); - output[11] = 2 * (((limb) ((s32) in[5])) * ((s32) in[6]) + - ((limb) ((s32) in[4])) * ((s32) in[7]) + - ((limb) ((s32) in[3])) * ((s32) in[8]) + - ((limb) ((s32) in[2])) * ((s32) in[9])); - output[12] = ((limb) ((s32) in[6])) * ((s32) in[6]) + - 2 * (((limb) ((s32) in[4])) * ((s32) in[8]) + - 2 * (((limb) ((s32) in[5])) * ((s32) in[7]) + - ((limb) ((s32) in[3])) * ((s32) in[9]))); - output[13] = 2 * (((limb) ((s32) in[6])) * ((s32) in[7]) + - ((limb) ((s32) in[5])) * ((s32) in[8]) + - ((limb) ((s32) in[4])) * ((s32) in[9])); - output[14] = 2 * (((limb) ((s32) in[7])) * ((s32) in[7]) + - ((limb) ((s32) in[6])) * ((s32) in[8]) + - 2 * ((limb) ((s32) in[5])) * ((s32) in[9])); - output[15] = 2 * (((limb) ((s32) in[7])) * ((s32) in[8]) + - ((limb) ((s32) in[6])) * ((s32) in[9])); - output[16] = ((limb) ((s32) in[8])) * ((s32) in[8]) + - 4 * ((limb) ((s32) in[7])) * ((s32) in[9]); - output[17] = 2 * ((limb) ((s32) in[8])) * ((s32) in[9]); - output[18] = 2 * ((limb) ((s32) in[9])) * ((s32) in[9]); -} - -/* fsquare sets output = in^2. - * - * On entry: The |in| argument is in reduced coefficients form and |in[i]| < - * 2^27. - * - * On exit: The |output| argument is in reduced coefficients form (indeed, one - * need only provide storage for 10 limbs) and |out[i]| < 2^26. */ -static void -fsquare(limb *output, const limb *in) { - limb t[19]; - fsquare_inner(t, in); - /* |t[i]| < 14*2^54 because the largest product of two limbs will be < - * 2^(27+27) and fsquare_inner adds together, at most, 14 of those - * products. */ - freduce_degree(t); - freduce_coefficients(t); - /* |t[i]| < 2^26 */ - memcpy(output, t, sizeof(limb) * 10); -} - -/* Take a little-endian, 32-byte number and expand it into polynomial form */ -static void -fexpand(limb *output, const u8 *input) { -#define F(n,start,shift,mask) \ - output[n] = ((((limb) input[start + 0]) | \ - ((limb) input[start + 1]) << 8 | \ - ((limb) input[start + 2]) << 16 | \ - ((limb) input[start + 3]) << 24) >> shift) & mask; - F(0, 0, 0, 0x3ffffff); - F(1, 3, 2, 0x1ffffff); - F(2, 6, 3, 0x3ffffff); - F(3, 9, 5, 0x1ffffff); - F(4, 12, 6, 0x3ffffff); - F(5, 16, 0, 0x1ffffff); - F(6, 19, 1, 0x3ffffff); - F(7, 22, 3, 0x1ffffff); - F(8, 25, 4, 0x3ffffff); - F(9, 28, 6, 0x1ffffff); -#undef F -} - -#if (-32 >> 1) != -16 -#error "This code only works when >> does sign-extension on negative numbers" -#endif - -/* s32_eq returns 0xffffffff iff a == b and zero otherwise. */ -static s32 s32_eq(s32 a, s32 b) { - a = ~(a ^ b); - a &= a << 16; - a &= a << 8; - a &= a << 4; - a &= a << 2; - a &= a << 1; - return a >> 31; -} - -/* s32_gte returns 0xffffffff if a >= b and zero otherwise, where a and b are - * both non-negative. */ -static s32 s32_gte(s32 a, s32 b) { - a -= b; - /* a >= 0 iff a >= b. */ - return ~(a >> 31); -} - -/* Take a fully reduced polynomial form number and contract it into a - * little-endian, 32-byte array. - * - * On entry: |input_limbs[i]| < 2^26 */ -static void -fcontract(u8 *output, limb *input_limbs) { - int i; - int j; - s32 input[10]; - s32 mask; - - /* |input_limbs[i]| < 2^26, so it's valid to convert to an s32. */ - for (i = 0; i < 10; i++) { - input[i] = input_limbs[i]; - } - - for (j = 0; j < 2; ++j) { - for (i = 0; i < 9; ++i) { - if ((i & 1) == 1) { - /* This calculation is a time-invariant way to make input[i] - * non-negative by borrowing from the next-larger limb. */ - const s32 mask = input[i] >> 31; - const s32 carry = -((input[i] & mask) >> 25); - input[i] = input[i] + (carry << 25); - input[i+1] = input[i+1] - carry; - } else { - const s32 mask = input[i] >> 31; - const s32 carry = -((input[i] & mask) >> 26); - input[i] = input[i] + (carry << 26); - input[i+1] = input[i+1] - carry; - } - } - - /* There's no greater limb for input[9] to borrow from, but we can multiply - * by 19 and borrow from input[0], which is valid mod 2^255-19. */ - { - const s32 mask = input[9] >> 31; - const s32 carry = -((input[9] & mask) >> 25); - input[9] = input[9] + (carry << 25); - input[0] = input[0] - (carry * 19); - } - - /* After the first iteration, input[1..9] are non-negative and fit within - * 25 or 26 bits, depending on position. However, input[0] may be - * negative. */ - } - - /* The first borrow-propagation pass above ended with every limb - except (possibly) input[0] non-negative. - - If input[0] was negative after the first pass, then it was because of a - carry from input[9]. On entry, input[9] < 2^26 so the carry was, at most, - one, since (2**26-1) >> 25 = 1. Thus input[0] >= -19. - - In the second pass, each limb is decreased by at most one. Thus the second - borrow-propagation pass could only have wrapped around to decrease - input[0] again if the first pass left input[0] negative *and* input[1] - through input[9] were all zero. In that case, input[1] is now 2^25 - 1, - and this last borrow-propagation step will leave input[1] non-negative. */ - { - const s32 mask = input[0] >> 31; - const s32 carry = -((input[0] & mask) >> 26); - input[0] = input[0] + (carry << 26); - input[1] = input[1] - carry; - } - - /* All input[i] are now non-negative. However, there might be values between - * 2^25 and 2^26 in a limb which is, nominally, 25 bits wide. */ - for (j = 0; j < 2; j++) { - for (i = 0; i < 9; i++) { - if ((i & 1) == 1) { - const s32 carry = input[i] >> 25; - input[i] &= 0x1ffffff; - input[i+1] += carry; - } else { - const s32 carry = input[i] >> 26; - input[i] &= 0x3ffffff; - input[i+1] += carry; - } - } - - { - const s32 carry = input[9] >> 25; - input[9] &= 0x1ffffff; - input[0] += 19*carry; - } - } - - /* If the first carry-chain pass, just above, ended up with a carry from - * input[9], and that caused input[0] to be out-of-bounds, then input[0] was - * < 2^26 + 2*19, because the carry was, at most, two. - * - * If the second pass carried from input[9] again then input[0] is < 2*19 and - * the input[9] -> input[0] carry didn't push input[0] out of bounds. */ - - /* It still remains the case that input might be between 2^255-19 and 2^255. - * In this case, input[1..9] must take their maximum value and input[0] must - * be >= (2^255-19) & 0x3ffffff, which is 0x3ffffed. */ - mask = s32_gte(input[0], 0x3ffffed); - for (i = 1; i < 10; i++) { - if ((i & 1) == 1) { - mask &= s32_eq(input[i], 0x1ffffff); - } else { - mask &= s32_eq(input[i], 0x3ffffff); - } - } - - /* mask is either 0xffffffff (if input >= 2^255-19) and zero otherwise. Thus - * this conditionally subtracts 2^255-19. */ - input[0] -= mask & 0x3ffffed; - - for (i = 1; i < 10; i++) { - if ((i & 1) == 1) { - input[i] -= mask & 0x1ffffff; - } else { - input[i] -= mask & 0x3ffffff; - } - } - - input[1] <<= 2; - input[2] <<= 3; - input[3] <<= 5; - input[4] <<= 6; - input[6] <<= 1; - input[7] <<= 3; - input[8] <<= 4; - input[9] <<= 6; -#define F(i, s) \ - output[s+0] |= input[i] & 0xff; \ - output[s+1] = (input[i] >> 8) & 0xff; \ - output[s+2] = (input[i] >> 16) & 0xff; \ - output[s+3] = (input[i] >> 24) & 0xff; - output[0] = 0; - output[16] = 0; - F(0,0); - F(1,3); - F(2,6); - F(3,9); - F(4,12); - F(5,16); - F(6,19); - F(7,22); - F(8,25); - F(9,28); -#undef F -} - -/* Input: Q, Q', Q-Q' - * Output: 2Q, Q+Q' - * - * x2 z3: long form - * x3 z3: long form - * x z: short form, destroyed - * xprime zprime: short form, destroyed - * qmqp: short form, preserved - * - * On entry and exit, the absolute value of the limbs of all inputs and outputs - * are < 2^26. */ -static void fmonty(limb *x2, limb *z2, /* output 2Q */ - limb *x3, limb *z3, /* output Q + Q' */ - limb *x, limb *z, /* input Q */ - limb *xprime, limb *zprime, /* input Q' */ - const limb *qmqp /* input Q - Q' */) { - limb origx[10], origxprime[10], zzz[19], xx[19], zz[19], xxprime[19], - zzprime[19], zzzprime[19], xxxprime[19]; - - memcpy(origx, x, 10 * sizeof(limb)); - fsum(x, z); - /* |x[i]| < 2^27 */ - fdifference(z, origx); /* does x - z */ - /* |z[i]| < 2^27 */ - - memcpy(origxprime, xprime, sizeof(limb) * 10); - fsum(xprime, zprime); - /* |xprime[i]| < 2^27 */ - fdifference(zprime, origxprime); - /* |zprime[i]| < 2^27 */ - fproduct(xxprime, xprime, z); - /* |xxprime[i]| < 14*2^54: the largest product of two limbs will be < - * 2^(27+27) and fproduct adds together, at most, 14 of those products. - * (Approximating that to 2^58 doesn't work out.) */ - fproduct(zzprime, x, zprime); - /* |zzprime[i]| < 14*2^54 */ - freduce_degree(xxprime); - freduce_coefficients(xxprime); - /* |xxprime[i]| < 2^26 */ - freduce_degree(zzprime); - freduce_coefficients(zzprime); - /* |zzprime[i]| < 2^26 */ - memcpy(origxprime, xxprime, sizeof(limb) * 10); - fsum(xxprime, zzprime); - /* |xxprime[i]| < 2^27 */ - fdifference(zzprime, origxprime); - /* |zzprime[i]| < 2^27 */ - fsquare(xxxprime, xxprime); - /* |xxxprime[i]| < 2^26 */ - fsquare(zzzprime, zzprime); - /* |zzzprime[i]| < 2^26 */ - fproduct(zzprime, zzzprime, qmqp); - /* |zzprime[i]| < 14*2^52 */ - freduce_degree(zzprime); - freduce_coefficients(zzprime); - /* |zzprime[i]| < 2^26 */ - memcpy(x3, xxxprime, sizeof(limb) * 10); - memcpy(z3, zzprime, sizeof(limb) * 10); - - fsquare(xx, x); - /* |xx[i]| < 2^26 */ - fsquare(zz, z); - /* |zz[i]| < 2^26 */ - fproduct(x2, xx, zz); - /* |x2[i]| < 14*2^52 */ - freduce_degree(x2); - freduce_coefficients(x2); - /* |x2[i]| < 2^26 */ - fdifference(zz, xx); // does zz = xx - zz - /* |zz[i]| < 2^27 */ - memset(zzz + 10, 0, sizeof(limb) * 9); - fscalar_product(zzz, zz, 121665); - /* |zzz[i]| < 2^(27+17) */ - /* No need to call freduce_degree here: - fscalar_product doesn't increase the degree of its input. */ - freduce_coefficients(zzz); - /* |zzz[i]| < 2^26 */ - fsum(zzz, xx); - /* |zzz[i]| < 2^27 */ - fproduct(z2, zz, zzz); - /* |z2[i]| < 14*2^(26+27) */ - freduce_degree(z2); - freduce_coefficients(z2); - /* |z2|i| < 2^26 */ -} - -/* Conditionally swap two reduced-form limb arrays if 'iswap' is 1, but leave - * them unchanged if 'iswap' is 0. Runs in data-invariant time to avoid - * side-channel attacks. - * - * NOTE that this function requires that 'iswap' be 1 or 0; other values give - * wrong results. Also, the two limb arrays must be in reduced-coefficient, - * reduced-degree form: the values in a[10..19] or b[10..19] aren't swapped, - * and all all values in a[0..9],b[0..9] must have magnitude less than - * INT32_MAX. */ -static void -swap_conditional(limb a[19], limb b[19], limb iswap) { - unsigned i; - const s32 swap = (s32) -iswap; - - for (i = 0; i < 10; ++i) { - const s32 x = swap & ( ((s32)a[i]) ^ ((s32)b[i]) ); - a[i] = ((s32)a[i]) ^ x; - b[i] = ((s32)b[i]) ^ x; - } -} - -/* Calculates nQ where Q is the x-coordinate of a point on the curve - * - * resultx/resultz: the x coordinate of the resulting curve point (short form) - * n: a little endian, 32-byte number - * q: a point of the curve (short form) */ -static void -cmult(limb *resultx, limb *resultz, const u8 *n, const limb *q) { - limb a[19] = {0}, b[19] = {1}, c[19] = {1}, d[19] = {0}; - limb *nqpqx = a, *nqpqz = b, *nqx = c, *nqz = d, *t; - limb e[19] = {0}, f[19] = {1}, g[19] = {0}, h[19] = {1}; - limb *nqpqx2 = e, *nqpqz2 = f, *nqx2 = g, *nqz2 = h; - - unsigned i, j; - - memcpy(nqpqx, q, sizeof(limb) * 10); - - for (i = 0; i < 32; ++i) { - u8 byte = n[31 - i]; - for (j = 0; j < 8; ++j) { - const limb bit = byte >> 7; - - swap_conditional(nqx, nqpqx, bit); - swap_conditional(nqz, nqpqz, bit); - fmonty(nqx2, nqz2, - nqpqx2, nqpqz2, - nqx, nqz, - nqpqx, nqpqz, - q); - swap_conditional(nqx2, nqpqx2, bit); - swap_conditional(nqz2, nqpqz2, bit); - - t = nqx; - nqx = nqx2; - nqx2 = t; - t = nqz; - nqz = nqz2; - nqz2 = t; - t = nqpqx; - nqpqx = nqpqx2; - nqpqx2 = t; - t = nqpqz; - nqpqz = nqpqz2; - nqpqz2 = t; - - byte <<= 1; - } - } - - memcpy(resultx, nqx, sizeof(limb) * 10); - memcpy(resultz, nqz, sizeof(limb) * 10); -} - -// ----------------------------------------------------------------------------- -// Shamelessly copied from djb's code -// ----------------------------------------------------------------------------- -static void -crecip(limb *out, const limb *z) { - limb z2[10]; - limb z9[10]; - limb z11[10]; - limb z2_5_0[10]; - limb z2_10_0[10]; - limb z2_20_0[10]; - limb z2_50_0[10]; - limb z2_100_0[10]; - limb t0[10]; - limb t1[10]; - int i; - - /* 2 */ fsquare(z2,z); - /* 4 */ fsquare(t1,z2); - /* 8 */ fsquare(t0,t1); - /* 9 */ fmul(z9,t0,z); - /* 11 */ fmul(z11,z9,z2); - /* 22 */ fsquare(t0,z11); - /* 2^5 - 2^0 = 31 */ fmul(z2_5_0,t0,z9); - - /* 2^6 - 2^1 */ fsquare(t0,z2_5_0); - /* 2^7 - 2^2 */ fsquare(t1,t0); - /* 2^8 - 2^3 */ fsquare(t0,t1); - /* 2^9 - 2^4 */ fsquare(t1,t0); - /* 2^10 - 2^5 */ fsquare(t0,t1); - /* 2^10 - 2^0 */ fmul(z2_10_0,t0,z2_5_0); - - /* 2^11 - 2^1 */ fsquare(t0,z2_10_0); - /* 2^12 - 2^2 */ fsquare(t1,t0); - /* 2^20 - 2^10 */ for (i = 2;i < 10;i += 2) { fsquare(t0,t1); fsquare(t1,t0); } - /* 2^20 - 2^0 */ fmul(z2_20_0,t1,z2_10_0); - - /* 2^21 - 2^1 */ fsquare(t0,z2_20_0); - /* 2^22 - 2^2 */ fsquare(t1,t0); - /* 2^40 - 2^20 */ for (i = 2;i < 20;i += 2) { fsquare(t0,t1); fsquare(t1,t0); } - /* 2^40 - 2^0 */ fmul(t0,t1,z2_20_0); - - /* 2^41 - 2^1 */ fsquare(t1,t0); - /* 2^42 - 2^2 */ fsquare(t0,t1); - /* 2^50 - 2^10 */ for (i = 2;i < 10;i += 2) { fsquare(t1,t0); fsquare(t0,t1); } - /* 2^50 - 2^0 */ fmul(z2_50_0,t0,z2_10_0); - - /* 2^51 - 2^1 */ fsquare(t0,z2_50_0); - /* 2^52 - 2^2 */ fsquare(t1,t0); - /* 2^100 - 2^50 */ for (i = 2;i < 50;i += 2) { fsquare(t0,t1); fsquare(t1,t0); } - /* 2^100 - 2^0 */ fmul(z2_100_0,t1,z2_50_0); - - /* 2^101 - 2^1 */ fsquare(t1,z2_100_0); - /* 2^102 - 2^2 */ fsquare(t0,t1); - /* 2^200 - 2^100 */ for (i = 2;i < 100;i += 2) { fsquare(t1,t0); fsquare(t0,t1); } - /* 2^200 - 2^0 */ fmul(t1,t0,z2_100_0); - - /* 2^201 - 2^1 */ fsquare(t0,t1); - /* 2^202 - 2^2 */ fsquare(t1,t0); - /* 2^250 - 2^50 */ for (i = 2;i < 50;i += 2) { fsquare(t0,t1); fsquare(t1,t0); } - /* 2^250 - 2^0 */ fmul(t0,t1,z2_50_0); - - /* 2^251 - 2^1 */ fsquare(t1,t0); - /* 2^252 - 2^2 */ fsquare(t0,t1); - /* 2^253 - 2^3 */ fsquare(t1,t0); - /* 2^254 - 2^4 */ fsquare(t0,t1); - /* 2^255 - 2^5 */ fsquare(t1,t0); - /* 2^255 - 21 */ fmul(out,t1,z11); -} - -void cf_curve25519_mul(u8 out[32], const u8 scalar[32], const u8 point[32]) -{ - limb bp[10], x[10], z[11], zmone[10]; - uint8_t e[32]; - int i; - - for (i = 0; i < 32; ++i) e[i] = scalar[i]; - e[0] &= 248; - e[31] &= 127; - e[31] |= 64; - - fexpand(bp, point); - cmult(x, z, e, bp); - crecip(zmone, z); - fmul(z, x, zmone); - fcontract(out, z); -} - -void cf_curve25519_mul_base(u8 out[32], const u8 scalar[32]) -{ - uint8_t base[32] = { 9 }; - cf_curve25519_mul(out, scalar, base); -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/curve25519.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/curve25519.h deleted file mode 100644 index 9b0b7f5..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/curve25519.h +++ /dev/null @@ -1,42 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef CURVE25519_H -#define CURVE25519_H - -#include <stddef.h> -#include <stdint.h> - -/** - * Curve25519 - * ========== - * This is `curve25519 <http://cr.yp.to/ecdh.html>`_ with switchable - * implementations underneath. - * - * By default tweetnacl is used on hosts, and the implementation - * from μNaCl for Cortex-M0, M3 and M4. - */ - -/* .. c:function:: $DECL - * Multiplies `point` by `scalar`, putting the resulting point into `out`. */ -void cf_curve25519_mul(uint8_t out[32], - const uint8_t scalar[32], - const uint8_t point[32]); - -/* .. c:function:: $DECL - * Multiplies `scalar` by the curve25519 base point, putting the resulting - * point into `out`. */ -void cf_curve25519_mul_base(uint8_t out[32], const uint8_t scalar[32]); - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/curve25519.naclref.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/curve25519.naclref.c deleted file mode 100644 index 9f331d1..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/curve25519.naclref.c +++ /dev/null @@ -1,273 +0,0 @@ -/* -version 20081011 -Matthew Dempsky -Public domain. -Derived from public domain code by D. J. Bernstein. -*/ -#include "curve25519.h" - -static void add(unsigned int out[32],const unsigned int a[32],const unsigned int b[32]) -{ - unsigned int j; - unsigned int u; - u = 0; - for (j = 0;j < 31;++j) { u += a[j] + b[j]; out[j] = u & 255; u >>= 8; } - u += a[31] + b[31]; out[31] = u; -} - -static void sub(unsigned int out[32],const unsigned int a[32],const unsigned int b[32]) -{ - unsigned int j; - unsigned int u; - u = 218; - for (j = 0;j < 31;++j) { - u += a[j] + 65280 - b[j]; - out[j] = u & 255; - u >>= 8; - } - u += a[31] - b[31]; - out[31] = u; -} - -static void squeeze(unsigned int a[32]) -{ - unsigned int j; - unsigned int u; - u = 0; - for (j = 0;j < 31;++j) { u += a[j]; a[j] = u & 255; u >>= 8; } - u += a[31]; a[31] = u & 127; - u = 19 * (u >> 7); - for (j = 0;j < 31;++j) { u += a[j]; a[j] = u & 255; u >>= 8; } - u += a[31]; a[31] = u; -} - -static const unsigned int minusp[32] = { - 19, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 128 -} ; - -static void freeze(unsigned int a[32]) -{ - unsigned int aorig[32]; - unsigned int j; - unsigned int negative; - - for (j = 0;j < 32;++j) aorig[j] = a[j]; - add(a,a,minusp); - negative = -((a[31] >> 7) & 1); - for (j = 0;j < 32;++j) a[j] ^= negative & (aorig[j] ^ a[j]); -} - -static void mult(unsigned int out[32],const unsigned int a[32],const unsigned int b[32]) -{ - unsigned int i; - unsigned int j; - unsigned int u; - - for (i = 0;i < 32;++i) { - u = 0; - for (j = 0;j <= i;++j) u += a[j] * b[i - j]; - for (j = i + 1;j < 32;++j) u += 38 * a[j] * b[i + 32 - j]; - out[i] = u; - } - squeeze(out); -} - -static void mult121665(unsigned int out[32],const unsigned int a[32]) -{ - unsigned int j; - unsigned int u; - - u = 0; - for (j = 0;j < 31;++j) { u += 121665 * a[j]; out[j] = u & 255; u >>= 8; } - u += 121665 * a[31]; out[31] = u & 127; - u = 19 * (u >> 7); - for (j = 0;j < 31;++j) { u += out[j]; out[j] = u & 255; u >>= 8; } - u += out[j]; out[j] = u; -} - -static void square(unsigned int out[32],const unsigned int a[32]) -{ - unsigned int i; - unsigned int j; - unsigned int u; - - for (i = 0;i < 32;++i) { - u = 0; - for (j = 0;j < i - j;++j) u += a[j] * a[i - j]; - for (j = i + 1;j < i + 32 - j;++j) u += 38 * a[j] * a[i + 32 - j]; - u *= 2; - if ((i & 1) == 0) { - u += a[i / 2] * a[i / 2]; - u += 38 * a[i / 2 + 16] * a[i / 2 + 16]; - } - out[i] = u; - } - squeeze(out); -} - -static void select(unsigned int p[64],unsigned int q[64],const unsigned int r[64],const unsigned int s[64],unsigned int b) -{ - unsigned int j; - unsigned int t; - unsigned int bminus1; - - bminus1 = b - 1; - for (j = 0;j < 64;++j) { - t = bminus1 & (r[j] ^ s[j]); - p[j] = s[j] ^ t; - q[j] = r[j] ^ t; - } -} - -static void mainloop(unsigned int work[64],const unsigned char e[32]) -{ - unsigned int xzm1[64]; - unsigned int xzm[64]; - unsigned int xzmb[64]; - unsigned int xzm1b[64]; - unsigned int xznb[64]; - unsigned int xzn1b[64]; - unsigned int a0[64]; - unsigned int a1[64]; - unsigned int b0[64]; - unsigned int b1[64]; - unsigned int c1[64]; - unsigned int r[32]; - unsigned int s[32]; - unsigned int t[32]; - unsigned int u[32]; - unsigned int j; - unsigned int b; - int pos; - - for (j = 0;j < 32;++j) xzm1[j] = work[j]; - xzm1[32] = 1; - for (j = 33;j < 64;++j) xzm1[j] = 0; - - xzm[0] = 1; - for (j = 1;j < 64;++j) xzm[j] = 0; - - for (pos = 254;pos >= 0;--pos) { - b = e[pos / 8] >> (pos & 7); - b &= 1; - select(xzmb,xzm1b,xzm,xzm1,b); - add(a0,xzmb,xzmb + 32); - sub(a0 + 32,xzmb,xzmb + 32); - add(a1,xzm1b,xzm1b + 32); - sub(a1 + 32,xzm1b,xzm1b + 32); - square(b0,a0); - square(b0 + 32,a0 + 32); - mult(b1,a1,a0 + 32); - mult(b1 + 32,a1 + 32,a0); - add(c1,b1,b1 + 32); - sub(c1 + 32,b1,b1 + 32); - square(r,c1 + 32); - sub(s,b0,b0 + 32); - mult121665(t,s); - add(u,t,b0); - mult(xznb,b0,b0 + 32); - mult(xznb + 32,s,u); - square(xzn1b,c1); - mult(xzn1b + 32,r,work); - select(xzm,xzm1,xznb,xzn1b,b); - } - - for (j = 0;j < 64;++j) work[j] = xzm[j]; -} - -static void recip(unsigned int out[32],const unsigned int z[32]) -{ - unsigned int z2[32]; - unsigned int z9[32]; - unsigned int z11[32]; - unsigned int z2_5_0[32]; - unsigned int z2_10_0[32]; - unsigned int z2_20_0[32]; - unsigned int z2_50_0[32]; - unsigned int z2_100_0[32]; - unsigned int t0[32]; - unsigned int t1[32]; - int i; - - /* 2 */ square(z2,z); - /* 4 */ square(t1,z2); - /* 8 */ square(t0,t1); - /* 9 */ mult(z9,t0,z); - /* 11 */ mult(z11,z9,z2); - /* 22 */ square(t0,z11); - /* 2^5 - 2^0 = 31 */ mult(z2_5_0,t0,z9); - - /* 2^6 - 2^1 */ square(t0,z2_5_0); - /* 2^7 - 2^2 */ square(t1,t0); - /* 2^8 - 2^3 */ square(t0,t1); - /* 2^9 - 2^4 */ square(t1,t0); - /* 2^10 - 2^5 */ square(t0,t1); - /* 2^10 - 2^0 */ mult(z2_10_0,t0,z2_5_0); - - /* 2^11 - 2^1 */ square(t0,z2_10_0); - /* 2^12 - 2^2 */ square(t1,t0); - /* 2^20 - 2^10 */ for (i = 2;i < 10;i += 2) { square(t0,t1); square(t1,t0); } - /* 2^20 - 2^0 */ mult(z2_20_0,t1,z2_10_0); - - /* 2^21 - 2^1 */ square(t0,z2_20_0); - /* 2^22 - 2^2 */ square(t1,t0); - /* 2^40 - 2^20 */ for (i = 2;i < 20;i += 2) { square(t0,t1); square(t1,t0); } - /* 2^40 - 2^0 */ mult(t0,t1,z2_20_0); - - /* 2^41 - 2^1 */ square(t1,t0); - /* 2^42 - 2^2 */ square(t0,t1); - /* 2^50 - 2^10 */ for (i = 2;i < 10;i += 2) { square(t1,t0); square(t0,t1); } - /* 2^50 - 2^0 */ mult(z2_50_0,t0,z2_10_0); - - /* 2^51 - 2^1 */ square(t0,z2_50_0); - /* 2^52 - 2^2 */ square(t1,t0); - /* 2^100 - 2^50 */ for (i = 2;i < 50;i += 2) { square(t0,t1); square(t1,t0); } - /* 2^100 - 2^0 */ mult(z2_100_0,t1,z2_50_0); - - /* 2^101 - 2^1 */ square(t1,z2_100_0); - /* 2^102 - 2^2 */ square(t0,t1); - /* 2^200 - 2^100 */ for (i = 2;i < 100;i += 2) { square(t1,t0); square(t0,t1); } - /* 2^200 - 2^0 */ mult(t1,t0,z2_100_0); - - /* 2^201 - 2^1 */ square(t0,t1); - /* 2^202 - 2^2 */ square(t1,t0); - /* 2^250 - 2^50 */ for (i = 2;i < 50;i += 2) { square(t0,t1); square(t1,t0); } - /* 2^250 - 2^0 */ mult(t0,t1,z2_50_0); - - /* 2^251 - 2^1 */ square(t1,t0); - /* 2^252 - 2^2 */ square(t0,t1); - /* 2^253 - 2^3 */ square(t1,t0); - /* 2^254 - 2^4 */ square(t0,t1); - /* 2^255 - 2^5 */ square(t1,t0); - /* 2^255 - 21 */ mult(out,t1,z11); -} - -static void crypto_scalarmult(unsigned char *q, - const unsigned char *n, - const unsigned char *p) -{ - unsigned int work[96]; - unsigned char e[32]; - unsigned int i; - for (i = 0;i < 32;++i) e[i] = n[i]; - e[0] &= 248; - e[31] &= 127; - e[31] |= 64; - for (i = 0;i < 32;++i) work[i] = p[i]; - mainloop(work,e); - recip(work + 32,work + 32); - mult(work + 64,work,work + 32); - freeze(work + 64); - for (i = 0;i < 32;++i) q[i] = work[64 + i]; -} - -void cf_curve25519_mul(uint8_t out[32], const uint8_t scalar[32], const uint8_t point[32]) -{ - crypto_scalarmult(out, scalar, point); -} - -void cf_curve25519_mul_base(uint8_t out[32], const uint8_t scalar[32]) -{ - uint8_t base_point[32] = { 9 }; - cf_curve25519_mul(out, scalar, base_point); -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/curve25519.tweetnacl.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/curve25519.tweetnacl.c deleted file mode 100644 index c98c107..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/curve25519.tweetnacl.c +++ /dev/null @@ -1,235 +0,0 @@ -/* This is based on tweetnacl. Some typedefs have been - * replaced with their stdint equivalents. - * - * Original code was public domain. */ - -#include <stdint.h> -#include <stddef.h> - -#include "handy.h" - -typedef int64_t gf[16]; - -static const uint8_t _0[16], - _9[32] = {9}; -static const gf gf0, - gf1 = {1}, - _121665 = {0xDB41, 1}, - D = {0x78a3, 0x1359, 0x4dca, 0x75eb, - 0xd8ab, 0x4141, 0x0a4d, 0x0070, - 0xe898, 0x7779, 0x4079, 0x8cc7, - 0xfe73, 0x2b6f, 0x6cee, 0x5203}, - D2 = {0xf159, 0x26b2, 0x9b94, 0xebd6, - 0xb156, 0x8283, 0x149a, 0x00e0, - 0xd130, 0xeef3, 0x80f2, 0x198e, - 0xfce7, 0x56df, 0xd9dc, 0x2406}, - X = {0xd51a, 0x8f25, 0x2d60, 0xc956, - 0xa7b2, 0x9525, 0xc760, 0x692c, - 0xdc5c, 0xfdd6, 0xe231, 0xc0a4, - 0x53fe, 0xcd6e, 0x36d3, 0x2169}, - Y = {0x6658, 0x6666, 0x6666, 0x6666, - 0x6666, 0x6666, 0x6666, 0x6666, - 0x6666, 0x6666, 0x6666, 0x6666, - 0x6666, 0x6666, 0x6666, 0x6666}, - I = {0xa0b0, 0x4a0e, 0x1b27, 0xc4ee, - 0xe478, 0xad2f, 0x1806, 0x2f43, - 0xd7a7, 0x3dfb, 0x0099, 0x2b4d, - 0xdf0b, 0x4fc1, 0x2480, 0x2b83}; - -static void set25519(gf r, const gf a) -{ - size_t i; - for (i = 0; i < 16; i++) - r[i] = a[i]; -} - -static void car25519(gf o) -{ - int64_t c; - size_t i; - - for (i = 0; i < 16; i++) - { - o[i] += (1LL << 16); - c = o[i] >> 16; - o[(i + 1) * (i < 15)] += c - 1 + 37 * (c - 1) * (i == 15); - o[i] -= c << 16; - } -} - -static void sel25519(gf p, gf q, int64_t b) -{ - int64_t tmp, mask = ~(b-1); - size_t i; - for (i = 0; i < 16; i++) - { - tmp = mask & (p[i] ^ q[i]); - p[i] ^= tmp; - q[i] ^= tmp; - } -} - -static void pack25519(uint8_t out[32], const gf n) -{ - size_t i, j; - int b; - gf m, t; - set25519(t, n); - car25519(t); - car25519(t); - car25519(t); - - for(j = 0; j < 2; j++) - { - m[0] = t[0] - 0xffed; - for (i = 1; i < 15; i++) - { - m[i] = t[i] - 0xffff - ((m[i - 1] >> 16) & 1); - m[i - 1] &= 0xffff; - } - m[15] = t[15] - 0x7fff - ((m[14] >> 16) & 1); - b = (m[15] >> 16) & 1; - m[14] &= 0xffff; - sel25519(t, m, 1 - b); - } - - for (i = 0; i < 16; i++) - { - out[2 * i] = t[i] & 0xff; - out[2 * i + 1] = (uint8_t) (t[i] >> 8); - } -} - - - -static void unpack25519(gf o, const uint8_t *n) -{ - size_t i; - for (i = 0; i < 16; i++) - o[i] = n[2 * i] + ((int64_t) n[2 * i + 1] << 8); - o[15] &= 0x7fff; -} - -static void add(gf o, const gf a, const gf b) -{ - size_t i; - for (i = 0; i < 16; i++) - o[i] = a[i] + b[i]; -} - -static void sub(gf o, const gf a, const gf b) -{ - size_t i; - for (i = 0; i < 16; i++) - o[i] = a[i] - b[i]; -} - -static void mul(gf o, const gf a, const gf b) -{ - int64_t t[31]; - size_t i, j; - - for (i = 0; i < 31; i++) - t[i] = 0; - - for (i = 0; i < 16; i++) - for (j = 0; j < 16; j++) - t[i + j] += a[i] * b[j]; - - for (i = 0; i < 15; i++) - t[i] += 38 * t[i + 16]; - - for (i = 0; i < 16; i++) - o[i] = t[i]; - - car25519(o); - car25519(o); -} - -static void sqr(gf o, const gf a) -{ - mul(o, a, a); -} - -static void inv25519(gf o, const gf i) -{ - gf c; - int a; - for (a = 0; a < 16; a++) - c[a] = i[a]; - - for (a = 253; a >= 0; a--) - { - sqr(c, c); - if(a != 2 && a != 4) - mul(c, c, i); - } - - for (a = 0; a < 16; a++) - o[a] = c[a]; -} - - -void cf_curve25519_mul(uint8_t *q, const uint8_t *n, const uint8_t *p) -{ - uint8_t z[32]; - gf x; - gf a, b, c, d, e, f; - - { - size_t i; - for (i = 0; i < 31; i++) - z[i] = n[i]; - z[31] = (n[31] & 127) | 64; - z[0] &= 248; - - unpack25519(x, p); - - for(i = 0; i < 16; i++) - { - b[i] = x[i]; - d[i] = a[i] = c[i] = 0; - } - } - - a[0] = d[0] = 1; - - {int i; - for (i = 254; i >= 0; i--) - { - int64_t r = (z[i >> 3] >> (i & 7)) & 1; - sel25519(a, b, r); - sel25519(c, d, r); - add(e, a, c); - sub(a, a, c); - add(c, b, d); - sub(b, b, d); - sqr(d, e); - sqr(f, a); - mul(a, c, a); - mul(c, b, e); - add(e, a, c); - sub(a, a, c); - sqr(b, a); - sub(c, d, f); - mul(a, c, _121665); - add(a, a, d); - mul(c, c, a); - mul(a, d, f); - mul(d, b, x); - sqr(b, e); - sel25519(a, b, r); - sel25519(c, d, r); - } - } - - inv25519(c, c); - mul(a, a, c); - pack25519(q, a); -} - -void cf_curve25519_mul_base(uint8_t *q, const uint8_t *n) -{ - cf_curve25519_mul(q, n, _9); -} - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/drbg.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/drbg.c deleted file mode 100644 index ae79067..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/drbg.c +++ /dev/null @@ -1,434 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2016 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "drbg.h" -#include "handy.h" -#include "bitops.h" -#include "sha2.h" -#include "tassert.h" - -#include <string.h> - -#define MAX_DRBG_GENERATE 0x10000ul - -static void hash_df(const cf_chash *H, - const void *in1, size_t nin1, - const void *in2, size_t nin2, - const void *in3, size_t nin3, - const void *in4, size_t nin4, - uint8_t *out, size_t nout) -{ - uint8_t counter = 1; - uint32_t bits_to_return = nout * 8; - uint8_t cbuf[4]; - uint8_t block[CF_MAXHASH]; - - write32_be(bits_to_return, cbuf); - - while (nout) - { - /* Make a block. This is the hash of: - * counter || bits_to_return || in1 || in2 || in3 | in4 - */ - cf_chash_ctx ctx; - H->init(&ctx); - H->update(&ctx, &counter, sizeof counter); - H->update(&ctx, cbuf, sizeof cbuf); - H->update(&ctx, in1, nin1); - H->update(&ctx, in2, nin2); - H->update(&ctx, in3, nin3); - H->update(&ctx, in4, nin4); - H->digest(&ctx, block); - - size_t take = MIN(H->hashsz, nout); - memcpy(out, block, take); - out += take; - nout -= take; - - counter += 1; - } -} - -void cf_hash_drbg_sha256_init(cf_hash_drbg_sha256 *ctx, - const void *entropy, size_t nentropy, - const void *nonce, size_t nnonce, - const void *persn, size_t npersn) -{ - mem_clean(ctx, sizeof *ctx); - - /* 1. seed_material = entropy_input || nonce || personalization_string - * 2. seed = Hash_df(seed_material, seedlen) - * 3. V = seed */ - hash_df(&cf_sha256, - entropy, nentropy, - nonce, nnonce, - persn, npersn, - NULL, 0, - ctx->V, sizeof ctx->V); - - /* 4. C = Hash_df(0x00 || V, seedlen) */ - uint8_t zero = 0; - hash_df(&cf_sha256, - &zero, sizeof zero, - ctx->V, sizeof ctx->V, - NULL, 0, - NULL, 0, - ctx->C, sizeof ctx->C); - - /* 5. reseed_counter = 1 */ - ctx->reseed_counter = 1; -} - -/* Add out += in, mod 2^nout. - * Runs in time dependent on nout and nin, but not the contents of out or in. - */ -static void add(uint8_t *out, size_t nout, const uint8_t *in, size_t nin) -{ - assert(nout >= nin); - - uint16_t carry = 0; - int oi, ii; - - for (oi = nout - 1, ii = nin - 1; - oi >= 0; - ii--, oi--) - { - carry += out[oi]; - if (ii >= 0) - carry += in[ii]; - out[oi] = carry & 0xff; - carry >>= 8; - } -} - -static void hash_process_addnl(const cf_chash *H, - const void *input, size_t ninput, - uint8_t *V, size_t nV) -{ - if (!ninput) - return; - - /* 2.1. w = Hash(0x02 || V || additional_input) */ - uint8_t two = 2; - uint8_t w[CF_MAXHASH]; - cf_chash_ctx ctx; - H->init(&ctx); - H->update(&ctx, &two, sizeof two); - H->update(&ctx, V, nV); - H->update(&ctx, input, ninput); - H->digest(&ctx, w); - - /* 2.2. V = (V + w) mod 2 ^ seedlen */ - add(V, nV, w, H->hashsz); -} - -static void hash_generate(const cf_chash *H, - uint8_t *data, size_t ndata, /* initialised with V */ - void *out, size_t nout) -{ - cf_chash_ctx ctx; - uint8_t w[CF_MAXHASH]; - uint8_t *bout = out; - uint8_t one = 1; - - while (nout) - { - /* 4.1. w = Hash(data) */ - H->init(&ctx); - H->update(&ctx, data, ndata); - H->digest(&ctx, w); - - /* 4.2. W = W || w */ - size_t take = MIN(H->hashsz, nout); - memcpy(bout, w, take); - bout += take; - nout -= take; - - /* 4.3. data = (data + 1) mod 2 ^ seedlen */ - add(data, ndata, &one, sizeof one); - } -} - -static void hash_step(const cf_chash *H, - uint8_t *V, size_t nV, - const uint8_t *C, size_t nC, - uint32_t *reseed_counter) -{ - /* 4. h = Hash(0x03 || V) */ - uint8_t h[CF_MAXHASH]; - uint8_t three = 3; - cf_chash_ctx ctx; - - H->init(&ctx); - H->update(&ctx, &three, sizeof three); - H->update(&ctx, V, nV); - H->digest(&ctx, h); - - /* 5. V = (V + h + C + reseed_counter) mod 2 ^ seedlen */ - uint8_t reseed_counter_buf[4]; - write32_be(*reseed_counter, reseed_counter_buf); - - add(V, nV, h, H->hashsz); - add(V, nV, C, nC); - add(V, nV, reseed_counter_buf, sizeof reseed_counter_buf); - - /* 6. reseed_counter = reseed_counter + 1 */ - *reseed_counter = *reseed_counter + 1; -} - -/* This is Hash_DRBG_Generate_algorithm. - * nout is a maximum of MAX_DRBG_GENERATE */ -static void hash_gen_request(cf_hash_drbg_sha256 *ctx, - const void *addnl, size_t naddnl, - void *out, size_t nout) -{ - uint8_t data[440/8]; /* a temporary copy of V, which gets incremented by generate */ - - assert(!cf_hash_drbg_sha256_needs_reseed(ctx)); - - hash_process_addnl(&cf_sha256, addnl, naddnl, ctx->V, sizeof ctx->V); - assert(sizeof data == sizeof ctx->V); - memcpy(data, ctx->V, sizeof ctx->V); - hash_generate(&cf_sha256, data, sizeof data, out, nout); - hash_step(&cf_sha256, ctx->V, sizeof ctx->V, ctx->C, sizeof ctx->C, &ctx->reseed_counter); -} - -void cf_hash_drbg_sha256_gen_additional(cf_hash_drbg_sha256 *ctx, - const void *addnl, size_t naddnl, - void *out, size_t nout) -{ - uint8_t *bout = out; - - /* Generate output in requests of MAX_DRBG_GENERATE in size. */ - while (nout != 0) - { - size_t take = MIN(MAX_DRBG_GENERATE, nout); - hash_gen_request(ctx, addnl, naddnl, bout, take); - bout += take; - nout -= take; - - /* Add additional data only once. */ - addnl = NULL; - naddnl = 0; - } -} - -void cf_hash_drbg_sha256_gen(cf_hash_drbg_sha256 *ctx, - void *out, size_t nout) -{ - cf_hash_drbg_sha256_gen_additional(ctx, - NULL, 0, - out, nout); -} - -void cf_hash_drbg_sha256_reseed(cf_hash_drbg_sha256 *ctx, - const void *entropy, size_t nentropy, - const void *addnl, size_t naddnl) -{ - /* 1. seed_material = 0x01 || V || entropy_input || additional_input - * 2. seed = Hash_df(seed_material, seedlen) - * 3. V = seed */ - uint8_t one = 1; - /* stash V in C, because it cannot alias output */ - memcpy(ctx->C, ctx->V, sizeof ctx->C); - hash_df(&cf_sha256, - &one, sizeof one, - ctx->C, sizeof ctx->C, - entropy, nentropy, - addnl, naddnl, - ctx->V, sizeof ctx->V); - - /* 4. C = Hash_df(0x00 || V, seedlen) */ - uint8_t zero = 0; - hash_df(&cf_sha256, - &zero, sizeof zero, - ctx->V, sizeof ctx->V, - NULL, 0, - NULL, 0, - ctx->C, sizeof ctx->C); - - /* 5. reseed_counter = 1 */ - ctx->reseed_counter = 1; -} - -uint32_t cf_hash_drbg_sha256_needs_reseed(const cf_hash_drbg_sha256 *ctx) -{ - /* we need reseeding after 2 ^ 32 - 1 requests. */ - return ctx->reseed_counter == 0; -} - -/* --- HMAC_DRBG --- */ - -/* provided_data is in1 || in2 || in3. - * K is already scheduled in ctx->hmac. */ -static void hmac_drbg_update(cf_hmac_drbg *ctx, - const void *in1, size_t nin1, - const void *in2, size_t nin2, - const void *in3, size_t nin3) -{ - cf_hmac_ctx local; - const cf_chash *H = ctx->hmac.hash; - uint8_t new_key[CF_MAXHASH]; - uint8_t zero = 0; - - /* 1. K = HMAC(K, V || 0x00 || provided_data) */ - local = ctx->hmac; - cf_hmac_update(&local, ctx->V, H->hashsz); - cf_hmac_update(&local, &zero, sizeof zero); - cf_hmac_update(&local, in1, nin1); - cf_hmac_update(&local, in2, nin2); - cf_hmac_update(&local, in3, nin3); - cf_hmac_finish(&local, new_key); - cf_hmac_init(&ctx->hmac, H, new_key, H->hashsz); - mem_clean(new_key, sizeof new_key); - - /* 2. V = HMAC(K, V) */ - local = ctx->hmac; - cf_hmac_update(&local, ctx->V, H->hashsz); - cf_hmac_finish(&local, ctx->V); - - /* 3. if (provided_data = null) then return K and V */ - if (nin1 == 0 && nin2 == 0 && nin3 == 0) - return; - - /* 4. K = HMAC(K, V || 0x01 || provided_data) */ - uint8_t one = 1; - local = ctx->hmac; - cf_hmac_update(&local, ctx->V, H->hashsz); - cf_hmac_update(&local, &one, sizeof one); - cf_hmac_update(&local, in1, nin1); - cf_hmac_update(&local, in2, nin2); - cf_hmac_update(&local, in3, nin3); - cf_hmac_finish(&local, new_key); - cf_hmac_init(&ctx->hmac, H, new_key, H->hashsz); - mem_clean(new_key, sizeof new_key); - - /* 5. V = HMAC(K, V) */ - local = ctx->hmac; - cf_hmac_update(&local, ctx->V, H->hashsz); - cf_hmac_finish(&local, ctx->V); -} - -void cf_hmac_drbg_init(cf_hmac_drbg *ctx, - const cf_chash *hash, - const void *entropy, size_t nentropy, - const void *nonce, size_t nnonce, - const void *persn, size_t npersn) -{ - mem_clean(ctx, sizeof *ctx); - - assert(hash->hashsz <= CF_MAXHASH); - - /* 2. Key = 0x00 00 ... 00 - * 3. V = 0x01 01 ... 01 */ - uint8_t initial_key[CF_MAXHASH]; - memset(initial_key, 0x00, hash->hashsz); - memset(ctx->V, 0x01, hash->hashsz); - cf_hmac_init(&ctx->hmac, hash, initial_key, hash->hashsz); - - /* 1. seed_material = entropy_input || nonce || personalization_string - * 4. (Key, V) = HMAC_DRBG_Update(seed_material, Key, V) */ - hmac_drbg_update(ctx, entropy, nentropy, nonce, nnonce, persn, npersn); - - /* 5. reseed_counter = 1 */ - ctx->reseed_counter = 1; -} - -uint32_t cf_hmac_drbg_needs_reseed(const cf_hmac_drbg *ctx) -{ - return ctx->reseed_counter == 0; -} - -static void hmac_drbg_generate(cf_hmac_drbg *ctx, - const void *addnl, size_t naddnl, - void *out, size_t nout) -{ - /* 1. If reseed_counter > reseed_interval, then return an indication - * that a reseed is required */ - assert(!cf_hmac_drbg_needs_reseed(ctx)); - - /* 2. If additional_input != null, then - * (Key, V) = HMAC_DRBG_Update(additional_input, Key, V) - */ - if (naddnl) - hmac_drbg_update(ctx, addnl, naddnl, NULL, 0, NULL, 0); - - /* 3. temp = Null - * 4. While (len(temp) < requested_number_of_bits) do: - * 4.1. V = HMAC(Key, V) - * 4.2. temp = temp || V - * 5. returned_bits = leftmost(temp, requested_number_of_bits) - * - * We write the contents of temp directly into the caller's - * out buffer. - */ - uint8_t *bout = out; - cf_hmac_ctx local; - - while (nout) - { - local = ctx->hmac; - cf_hmac_update(&local, ctx->V, ctx->hmac.hash->hashsz); - cf_hmac_finish(&local, ctx->V); - - size_t take = MIN(ctx->hmac.hash->hashsz, nout); - memcpy(bout, ctx->V, take); - bout += take; - nout -= take; - } - - /* 6. (Key, V) = HMAC_DRBG_Update(additional_input, Key, V) */ - hmac_drbg_update(ctx, addnl, naddnl, NULL, 0, NULL, 0); - - /* 7. reseed_counter = reseed_counter + 1 */ - ctx->reseed_counter++; -} - -void cf_hmac_drbg_gen_additional(cf_hmac_drbg *ctx, - const void *addnl, size_t naddnl, - void *out, size_t nout) -{ - uint8_t *bout = out; - - while (nout != 0) - { - size_t take = MIN(MAX_DRBG_GENERATE, nout); - hmac_drbg_generate(ctx, addnl, naddnl, bout, take); - bout += take; - nout -= take; - - /* Add additional data only once. */ - addnl = NULL; - naddnl = 0; - } -} - -void cf_hmac_drbg_gen(cf_hmac_drbg *ctx, void *out, size_t nout) -{ - cf_hmac_drbg_gen_additional(ctx, - NULL, 0, - out, nout); -} - -void cf_hmac_drbg_reseed(cf_hmac_drbg *ctx, - const void *entropy, size_t nentropy, - const void *addnl, size_t naddnl) -{ - /* 1. seed_material = entropy_input || additional_input - * 2. (Key, V) = HMAC_DRBG_Update(seed_material, Key, V) */ - hmac_drbg_update(ctx, entropy, nentropy, addnl, naddnl, NULL, 0); - - /* 3. reseed_counter = 1 */ - ctx->reseed_counter = 1; -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/drbg.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/drbg.h deleted file mode 100644 index 18a1070..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/drbg.h +++ /dev/null @@ -1,191 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2016 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef DRBG_H -#define DRBG_H - -#include <stddef.h> -#include <stdint.h> - -#include "chash.h" -#include "hmac.h" - -/** - * Hash_DRBG - * ========= - * This is Hash_DRBG from SP800-90A rev 1, with SHA256 as - * the underlying hash function. - * - * This generator enforces a `reseed_interval` of 2^32-1: - * use :c:func:`cf_hash_drbg_sha256_needs_reseed` to check - * whether you need to reseed before use, and reseed using - * :c:func:`cf_hash_drbg_sha256_reseed`. If you try to use - * the generator when it thinks it needs reseeding, it will - * call `abort`. - * - * Internally it enforces a `max_number_of_bits_per_request` - * of 2^19 bits. It sorts out chunking up multiple requests - * for you though, so feel free to ask for more than 2^16 bytes - * at a time. If you provide additional input when doing that, - * it is added only once, on the first subrequest. - * - * It does not enforce any `max_length` or - * `max_personalization_string_length`. - */ - -/* .. c:type:: cf_hash_drbg_sha256 - * Hash_DRBG with SHA256 context. - * - * .. c:member:: cf_hash_drbg_sha256.V - * Current internal state. - * - * .. c:member:: cf_hash_drbg_sha256.C - * Current update offset. - * - * .. c:member:: cf_hash_drbg_sha256.reseed_counter - * Current number of times entropy has been extracted from - * generator. - */ -typedef struct -{ - uint8_t V[440/8]; - uint8_t C[440/8]; - uint32_t reseed_counter; -} cf_hash_drbg_sha256; - -/* .. c:function:: $DECL - * Initialises the generator state `ctx`, using the provided `entropy`, - * `nonce` and personalisation string `persn`. - */ -extern void cf_hash_drbg_sha256_init(cf_hash_drbg_sha256 *ctx, - const void *entropy, size_t nentropy, - const void *nonce, size_t nnonce, - const void *persn, size_t npersn); - -/* .. c:function:: $DECL - * Returns non-zero if the generator needs reseeding. If - * this function returns non-zero, the next :c:func:`cf_hash_drbg_sha256_gen` - * or :c:func:`cf_hash_drbg_sha256_gen_additional` call will call `abort`. - */ -extern uint32_t cf_hash_drbg_sha256_needs_reseed(const cf_hash_drbg_sha256 *ctx); - -/* .. c:function:: $DECL - * Reseeds the generator with the given `entropy` and additional data `addnl`. - */ -extern void cf_hash_drbg_sha256_reseed(cf_hash_drbg_sha256 *ctx, - const void *entropy, size_t nentropy, - const void *addnl, size_t naddnl); - -/* .. c:function:: $DECL - * Generates pseudo-random output, writing `nout` bytes at `out`. - * This function aborts if the generator needs seeding. - */ -extern void cf_hash_drbg_sha256_gen(cf_hash_drbg_sha256 *ctx, - void *out, size_t nout); - -/* .. c:function:: $DECL - * Generates pseudo-random output, writing `nout` bytes at `out`. - * At the same time, `addnl` is input to the generator as further - * entropy. - * This function aborts if the generator needs seeding. - */ -extern void cf_hash_drbg_sha256_gen_additional(cf_hash_drbg_sha256 *ctx, - const void *addnl, size_t naddnl, - void *out, size_t nout); - -/** - * HMAC_DRBG - * ========= - * This is HMAC_DRBG from SP800-90a r1 with any hash function. - * - * This generator enforces a `reseed_interval` of 2^32-1: - * use :c:func:`cf_hmac_drbg_needs_reseed` to check whether - * you need to reseed before use, and reseed using - * :c:func:`cf_hmac_drbg_reseed`. If you try to use the - * generator when it thinks it needs reseeding, it will - * call `abort`. - * - * Internally it enforces a `max_number_of_bits_per_request` - * of 2^19 bits. It sorts out chunking up multiple requests - * for you though, so feel free to ask for more than 2^16 bytes - * at a time. If you provide additional input when doing that, - * it is added only once, on the first subrequest. - * - * It does not enforce any `max_length` or - * `max_personalization_string_length`. - */ - -/* .. c:type:: cf_hmac_drbg - * HMAC_DRBG context. - * - * .. c:member:: cf_hmac_drbg.V - * Current internal state. - * - * .. c:member:: cf_hmac_drbg.hmac - * Current HMAC context, with key scheduled in it. - * - * .. c:member:: cf_hmac_drbg.reseed_counter - * Current number of times entropy has been extracted from - * generator. - */ -typedef struct -{ - uint8_t V[CF_MAXHASH]; - cf_hmac_ctx hmac; /* pristine context with key scheduled */ - uint32_t reseed_counter; -} cf_hmac_drbg; - -/* .. c:function:: $DECL - * Initialises the generator state `ctx`, using the provided `entropy`, - * `nonce` and personalisation string `persn`. - */ -extern void cf_hmac_drbg_init(cf_hmac_drbg *ctx, - const cf_chash *hash, - const void *entropy, size_t nentropy, - const void *nonce, size_t nnonce, - const void *persn, size_t npersn); - -/* .. c:function:: $DECL - * Returns non-zero if the generator needs reseeding. If - * this function returns non-zero, the next :c:func:`cf_hmac_drbg_gen` - * or :c:func:`cf_hmac_drbg_gen_additional` call will call `abort`. - */ -extern uint32_t cf_hmac_drbg_needs_reseed(const cf_hmac_drbg *ctx); - -/* .. c:function:: $DECL - * Reseeds the generator with the given `entropy` and additional data - * `addnl`. - */ -extern void cf_hmac_drbg_reseed(cf_hmac_drbg *ctx, - const void *entropy, size_t nentropy, - const void *addnl, size_t naddnl); - -/* .. c:function:: $DECL - * Generates pseudo-random output, writing `nout` bytes at `out`. - * This function aborts if the generator needs seeding. - */ -extern void cf_hmac_drbg_gen(cf_hmac_drbg *ctx, - void *out, size_t nout); - -/* .. c:function:: $DECL - * Generates pseudo-random output, writing `nout` bytes at `out`. - * At the same time, `addnl` is input to the generator as further - * entropy. - * This function aborts if the generator needs seeding. - */ -extern void cf_hmac_drbg_gen_additional(cf_hmac_drbg *ctx, - const void *addnl, size_t naddnl, - void *out, size_t nout); - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/eax.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/eax.c deleted file mode 100644 index 80ba46f..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/eax.c +++ /dev/null @@ -1,116 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "handy.h" -#include "prp.h" -#include "modes.h" -#include "tassert.h" - -#include <string.h> - -static void cmac_compute_n(cf_cmac_stream *ctx, - uint8_t t, - const uint8_t *input, size_t ninput, - uint8_t out[CF_MAXBLOCK]) -{ - size_t blocksz = ctx->cmac.prp->blocksz; - assert(blocksz > 0); - - uint8_t firstblock[CF_MAXBLOCK]; - memset(firstblock, 0, blocksz); - firstblock[blocksz - 1] = t; - - cf_cmac_stream_reset(ctx); - if (ninput) - { - cf_cmac_stream_update(ctx, firstblock, blocksz, 0); - cf_cmac_stream_update(ctx, input, ninput, 1); - } else { - cf_cmac_stream_update(ctx, firstblock, blocksz, 1); - } - - cf_cmac_stream_final(ctx, out); -} - -void cf_eax_encrypt(const cf_prp *prp, void *prpctx, - const uint8_t *plain, size_t nplain, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce, - uint8_t *cipher, /* the same size as nplain */ - uint8_t *tag, size_t ntag) -{ - uint8_t NN[CF_MAXBLOCK], - HH[CF_MAXBLOCK], - CC[CF_MAXBLOCK]; - - cf_cmac_stream cmac; - cf_cmac_stream_init(&cmac, prp, prpctx); - - /* NN = OMAC_K^0(N) */ - cmac_compute_n(&cmac, 0, nonce, nnonce, NN); - - /* HH = OMAC_K^1(H) */ - cmac_compute_n(&cmac, 1, header, nheader, HH); - - /* C = CTR_K^NN(M) */ - cf_ctr ctr; - cf_ctr_init(&ctr, prp, prpctx, NN); - cf_ctr_cipher(&ctr, plain, cipher, nplain); - - /* CC = OMAC_K^2(C) */ - cmac_compute_n(&cmac, 2, cipher, nplain, CC); - - /* Tag = NN ^ CC ^ HH - * T = Tag [ first tau bits ] */ - assert(ntag <= prp->blocksz); - for (size_t i = 0; i < ntag; i++) - tag[i] = NN[i] ^ CC[i] ^ HH[i]; -} - -int cf_eax_decrypt(const cf_prp *prp, void *prpctx, - const uint8_t *cipher, size_t ncipher, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce, - const uint8_t *tag, size_t ntag, - uint8_t *plain) /* the same size as ncipher */ -{ - uint8_t NN[CF_MAXBLOCK], - HH[CF_MAXBLOCK], - CC[CF_MAXBLOCK]; - - cf_cmac_stream cmac; - cf_cmac_stream_init(&cmac, prp, prpctx); - - /* NN = OMAC_K^0(N) */ - cmac_compute_n(&cmac, 0, nonce, nnonce, NN); - - /* HH = OMAC_K^1(H) */ - cmac_compute_n(&cmac, 1, header, nheader, HH); - - /* CC = OMAC_K^2(C) */ - cmac_compute_n(&cmac, 2, cipher, ncipher, CC); - - uint8_t tt[CF_MAXBLOCK]; - assert(ntag && ntag <= prp->blocksz); - for (size_t i = 0; i < ntag; i++) - tt[i] = NN[i] ^ CC[i] ^ HH[i]; - - if (!mem_eq(tt, tag, ntag)) - return 1; - - cf_ctr ctr; - cf_ctr_init(&ctr, prp, prpctx, NN); - cf_ctr_cipher(&ctr, cipher, plain, ncipher); - return 0; -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/ext/cutest.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/ext/cutest.h deleted file mode 100644 index c9af425..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/ext/cutest.h +++ /dev/null @@ -1,620 +0,0 @@ -/* - * CUTest -- C/C++ Unit Test facility - * <http://github.com/mity/cutest> - * - * Copyright (c) 2013-2014 Martin Mitas - * - * This library is free software; you can redistribute it and/or modify it - * under the terms of the GNU Lesser General Public License as published by - * the Free Software Foundation; either version 2.1 of the License, or - * (at your option) any later version. - * - * This library is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU Lesser General Public License for more details. - * - * You should have received a copy of the GNU Lesser General Public License - * along with this library; if not, write to the Free Software Foundation, - * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA - */ - -#ifndef CUTEST_H__ -#define CUTEST_H__ - - -/************************ - *** Public interface *** - ************************/ - -/* By default, <cutest.h> provides the main program entry point (function - * main()). However, if the test suite is composed of multiple source files - * which include <cutest.h>, then this brings a problem of multiple main() - * definitions. To avoid this problem, #define macro TEST_NO_MAIN in all - * compilation units but one. - */ - -/* Macro to specify list of unit tests in the suite. - * The unit test implementation MUST provide list of unit tests it implements - * with this macro: - * - * TEST_LIST = { - * { "test1_name", test1_func_ptr }, - * { "test2_name", test2_func_ptr }, - * ... - * { 0 } - * }; - * - * The list specifies names of each tests (must be unique) and pointer to - * a function implementing it. The function does not take any arguments - * and have no return values, i.e. the test functions should have this - * prototype: - * - * void test_func(void); - */ -#define TEST_LIST const struct test__ test_list__[] - - -/* Macros for testing whether an unit test succeeds or fails. These macros - * can be used arbitrarily in functions implementing the unit tests. - * - * If any condition fails throughout execution of a test, the test fails. - * - * TEST_CHECK takes only one argument (the condition), TEST_CHECK_ allows - * also to specify an error message to print out if the condition fails. - * (It expects printf-like format string and its parameters). The macros - * return non-zero (condition passes) or 0 (condition fails). - * - * That can be useful when more conditions should be checked only if some - * preceding condition passes, as illustrated here: - * - * SomeStruct* ptr = allocate_some_struct(); - * if(TEST_CHECK(ptr != NULL)) { - * TEST_CHECK(ptr->member1 < 100); - * TEST_CHECK(ptr->member2 > 200); - * } - */ -#define TEST_CHECK_(cond,...) test_check__((cond), __FILE__, __LINE__, __VA_ARGS__) -#define TEST_CHECK(cond) test_check__((cond), __FILE__, __LINE__, "%s", #cond) - - -/********************** - *** Implementation *** - **********************/ - -/* The unit test files should not rely on anything below. */ - -#include <stdarg.h> -#include <stdio.h> -#include <stdlib.h> -#include <string.h> - -#if defined(unix) || defined(__unix__) || defined(__unix) || defined(__APPLE__) - #define CUTEST_UNIX__ 1 - #include <errno.h> - #include <unistd.h> - #include <sys/types.h> - #include <sys/wait.h> - #include <signal.h> -#endif - -#if defined(_WIN32) || defined(__WIN32__) || defined(__WINDOWS__) - #define CUTEST_WIN__ 1 - #include <windows.h> - #include <io.h> -#endif - -#ifdef __cplusplus - #include <exception> -#endif - - -/* Note our global private identifiers end with '__' to minimize risk of clash - * with the unit tests implementation. */ - - -#ifdef __cplusplus - extern "C" { -#endif - - -struct test__ { - const char* name; - void (*func)(void); -}; - -extern const struct test__ test_list__[]; -extern int test_verbose_level__; -extern const struct test__* test_current_unit__; -extern int test_current_already_logged__; -extern int test_current_failures__; -extern int test_colorize__; - - -#define CUTEST_COLOR_DEFAULT__ 0 -#define CUTEST_COLOR_GREEN__ 1 -#define CUTEST_COLOR_RED__ 2 -#define CUTEST_COLOR_DEFAULT_INTENSIVE__ 3 -#define CUTEST_COLOR_GREEN_INTENSIVE__ 4 -#define CUTEST_COLOR_RED_INTENSIVE__ 5 - -size_t -test_print_in_color(int color, const char* fmt, ...) -{ - va_list args; - char buffer[256]; - size_t n; - - va_start(args, fmt); - vsnprintf(buffer, sizeof(buffer), fmt, args); - va_end(args); - buffer[sizeof(buffer)-1] = '\0'; - - if(!test_colorize__) { - return printf("%s", buffer); - } - -#if defined CUTEST_UNIX__ - const char* col_str; - switch(color) { - case CUTEST_COLOR_GREEN__: col_str = "\e[0;32m"; break; - case CUTEST_COLOR_RED__: col_str = "\e[0;31m"; break; - case CUTEST_COLOR_GREEN_INTENSIVE__: col_str = "\e[1;32m"; break; - case CUTEST_COLOR_RED_INTENSIVE__: col_str = "\e[1;30m"; break; - case CUTEST_COLOR_DEFAULT_INTENSIVE__: col_str = "\e[1m"; break; - default: col_str = "\e[0m"; break; - } - printf("%s", col_str); - n = printf("%s", buffer); - printf("\e[0m"); - return n; -#elif defined CUTEST_WIN__ - HANDLE h; - CONSOLE_SCREEN_BUFFER_INFO info; - WORD attr; - - h = GetStdHandle(STD_OUTPUT_HANDLE); - GetConsoleScreenBufferInfo(h, &info); - - switch(color) { - case CUTEST_COLOR_GREEN__: attr = FOREGROUND_GREEN; break; - case CUTEST_COLOR_RED__: attr = FOREGROUND_RED; break; - case CUTEST_COLOR_GREEN_INTENSIVE__: attr = FOREGROUND_GREEN | FOREGROUND_INTENSITY; break; - case CUTEST_COLOR_RED_INTENSIVE__: attr = FOREGROUND_RED | FOREGROUND_INTENSITY; break; - case CUTEST_COLOR_DEFAULT_INTENSIVE__: attr = FOREGROUND_BLUE | FOREGROUND_GREEN | FOREGROUND_RED | FOREGROUND_INTENSITY; break; - default: attr = 0; break; - } - if(attr != 0) - SetConsoleTextAttribute(h, attr); - n = printf("%s", buffer); - SetConsoleTextAttribute(h, info.wAttributes); - return n; -#else - n = printf("%s", buffer); - return n; -#endif -} - -int -test_check__(int cond, const char* file, int line, const char* fmt, ...) -{ - const char *result_str; - int result_color; - int verbose_level; - - if(cond) { - result_str = "ok"; - result_color = CUTEST_COLOR_GREEN__; - verbose_level = 3; - } else { - if(!test_current_already_logged__ && test_current_unit__ != NULL) { - printf("[ "); - test_print_in_color(CUTEST_COLOR_RED_INTENSIVE__, "FAILED"); - printf(" ]\n"); - } - result_str = "failed"; - result_color = CUTEST_COLOR_RED__; - verbose_level = 2; - test_current_failures__++; - test_current_already_logged__++; - } - - if(test_verbose_level__ >= verbose_level) { - size_t n = 0; - va_list args; - - printf(" "); - - if(file != NULL) - n += printf("%s:%d: Check ", file, line); - - va_start(args, fmt); - n += vprintf(fmt, args); - va_end(args); - - printf("... "); - test_print_in_color(result_color, result_str); - printf("\n"); - test_current_already_logged__++; - } - - return (cond != 0); -} - - -#ifndef TEST_NO_MAIN - -static char* test_argv0__ = NULL; -static int test_count__ = 0; -static int test_no_exec__ = 0; -static int test_no_summary__ = 0; -static int test_skip_mode__ = 0; - -static int test_stat_failed_units__ = 0; -static int test_stat_run_units__ = 0; - -const struct test__* test_current_unit__ = NULL; -int test_current_already_logged__ = 0; -int test_verbose_level__ = 2; -int test_current_failures__ = 0; -int test_colorize__ = 0; - - -static void -test_list_names__(void) -{ - const struct test__* test; - - printf("Unit tests:\n"); - for(test = &test_list__[0]; test->func != NULL; test++) - printf(" %s\n", test->name); -} - -static const struct test__* -test_by_name__(const char* name) -{ - const struct test__* test; - - for(test = &test_list__[0]; test->func != NULL; test++) { - if(strcmp(test->name, name) == 0) - return test; - } - - return NULL; -} - -static int -test_do_run__(const struct test__* test) -{ - test_current_unit__ = test; - test_current_failures__ = 0; - test_current_already_logged__ = 0; - - if(test_verbose_level__ >= 3) { - test_print_in_color(CUTEST_COLOR_DEFAULT_INTENSIVE__, "Test %s:\n", test->name); - test_current_already_logged__++; - } else if(test_verbose_level__ >= 1) { - size_t n; - char spaces[32]; - - n = test_print_in_color(CUTEST_COLOR_DEFAULT_INTENSIVE__, "Test %s... ", test->name); - memset(spaces, ' ', sizeof(spaces)); - if(n < sizeof(spaces)) - printf("%.*s", (int) (sizeof(spaces) - n), spaces); - } else { - test_current_already_logged__ = 1; - } - -#ifdef __cplusplus - try { -#endif - - test->func(); - -#ifdef __cplusplus - } catch(std::exception& e) { - const char* what = e.what(); - if(what != NULL) - test_check__(0, NULL, 0, "Threw std::exception: %s", what); - else - test_check__(0, NULL, 0, "Threw std::exception"); - } catch(...) { - test_check__(0, NULL, 0, "Threw an exception"); - } -#endif - - if(test_verbose_level__ >= 3) { - switch(test_current_failures__) { - case 0: test_print_in_color(CUTEST_COLOR_GREEN_INTENSIVE__, " All conditions have passed.\n\n"); break; - case 1: test_print_in_color(CUTEST_COLOR_RED_INTENSIVE__, " One condition has FAILED.\n\n"); break; - default: test_print_in_color(CUTEST_COLOR_RED_INTENSIVE__, " %d conditions have FAILED.\n\n", test_current_failures__); break; - } - } else if(test_verbose_level__ >= 1 && test_current_failures__ == 0) { - printf("[ "); - test_print_in_color(CUTEST_COLOR_GREEN_INTENSIVE__, "OK"); - printf(" ]\n"); - } - - test_current_unit__ = NULL; - return (test_current_failures__ == 0) ? 0 : -1; -} - -static void -test_error__(const char* fmt, ...) -{ - va_list args; - - if(!test_current_already_logged__ && test_current_unit__ != NULL) { - printf("[ "); - test_print_in_color(CUTEST_COLOR_RED_INTENSIVE__, "FAILED"); - printf(" ]\n"); - } - - if(test_verbose_level__ < 2) - return; - - test_print_in_color(CUTEST_COLOR_RED_INTENSIVE__, " Error: "); - va_start(args, fmt); - vprintf(fmt, args); - va_end(args); - printf("\n"); -} - -static void -test_run__(const struct test__* test) -{ - int failed = 1; - - test_current_unit__ = test; - test_current_already_logged__ = 0; - - if(!test_no_exec__) { - -#if defined(CUTEST_UNIX__) - - pid_t pid; - int exit_code; - - pid = fork(); - if(pid == (pid_t)-1) { - test_error__("Cannot fork. %s [%d]", strerror(errno), errno); - failed = 1; - } else if(pid == 0) { - failed = (test_do_run__(test) != 0); - exit(failed ? 1 : 0); - } else { - waitpid(pid, &exit_code, 0); - if(WIFEXITED(exit_code)) { - switch(WEXITSTATUS(exit_code)) { - case 0: failed = 0; break; /* test has passed. */ - case 1: /* noop */ break; /* "normal" failure. */ - default: test_error__("Unexpected exit code [%d]", WEXITSTATUS(exit_code)); - } - } else if(WIFSIGNALED(exit_code)) { - char tmp[32]; - const char* signame; - switch(WTERMSIG(exit_code)) { - case SIGINT: signame = "SIGINT"; break; - case SIGHUP: signame = "SIGHUP"; break; - case SIGQUIT: signame = "SIGQUIT"; break; - case SIGABRT: signame = "SIGABRT"; break; - case SIGKILL: signame = "SIGKILL"; break; - case SIGSEGV: signame = "SIGSEGV"; break; - case SIGILL: signame = "SIGILL"; break; - case SIGTERM: signame = "SIGTERM"; break; - default: sprintf(tmp, "signal %d", WTERMSIG(exit_code)); signame = tmp; break; - } - test_error__("Test interrupted by %s", signame); - } else { - test_error__("Test ended in an unexpected way [%d]", exit_code); - } - } - -#elif defined(CUTEST_WIN__) - - char buffer[512] = {0}; - STARTUPINFOA startupInfo = {0}; - PROCESS_INFORMATION processInfo; - DWORD exitCode; - - _snprintf(buffer, sizeof(buffer)-1, - "%s --no-exec --no-summary --verbose=%d --color=%s -- \"%s\"", - test_argv0__, test_verbose_level__, - test_colorize__ ? "always" : "never", test->name); - startupInfo.cb = sizeof(STARTUPINFO); - if(CreateProcessA(NULL, buffer, NULL, NULL, FALSE, 0, NULL, NULL, &startupInfo, &processInfo)) { - WaitForSingleObject(processInfo.hProcess, INFINITE); - GetExitCodeProcess(processInfo.hProcess, &exitCode); - CloseHandle(processInfo.hThread); - CloseHandle(processInfo.hProcess); - failed = (exitCode != 0); - } else { - test_error__("Cannot create unit test subprocess [%ld].", GetLastError()); - failed = 1; - } - -#else - - failed = (test_do_run__(test) != 0); - -#endif - - } else { - failed = (test_do_run__(test) != 0); - } - - test_current_unit__ = NULL; - - test_stat_run_units__++; - if(failed) - test_stat_failed_units__++; -} - -#if defined(CUTEST_WIN__) -static LONG CALLBACK -test_exception_filter__(EXCEPTION_POINTERS *ptrs) -{ - test_error__("Unhandled SEH exception %08lx at %p.", - ptrs->ExceptionRecord->ExceptionCode, - ptrs->ExceptionRecord->ExceptionAddress); - fflush(stdout); - fflush(stderr); - return EXCEPTION_EXECUTE_HANDLER; -} -#endif - -static void -test_help__(void) -{ - printf("Usage: %s [options] [test...]\n", test_argv0__); - printf("Run the specified unit tests; or if the option '--skip' is used, run all\n"); - printf("tests in the suite but those listed. By default, if no tests are specified\n"); - printf("on the command line, all unit tests in the suite are run.\n"); - printf("\n"); - printf("Options:\n"); - printf(" -s, --skip Execute all unit tests but the listed ones\n"); - printf(" --no-exec Do not execute unit tests as child processes\n"); - printf(" --no-summary Suppress printing of test results summary\n"); - printf(" -l, --list List unit tests in the suite and exit\n"); - printf(" -v, --verbose Enable more verbose output\n"); - printf(" --verbose=LEVEL Set verbose level to LEVEL (small integer)\n"); - printf(" --color=WHEN Enable colorized output (WHEN is one of 'auto', 'always', 'never')\n"); - printf(" -h, --help Display this help and exit\n"); - printf("\n"); - test_list_names__(); -} - -int -main(int argc, char** argv) -{ - const struct test__** tests = NULL; - int i, j, n = 0; - int seen_double_dash = 0; - - test_argv0__ = argv[0]; - -#if defined CUTEST_UNIX__ - test_colorize__ = isatty(fileno(stdout)); -#elif defined CUTEST_WIN__ - test_colorize__ = _isatty(_fileno(stdout)); -#else - test_colorize__ = 0; -#endif - - /* Parse options */ - for(i = 1; i < argc; i++) { - if(seen_double_dash || argv[i][0] != '-') { - tests = (const struct test__**) realloc(tests, (n+1) * sizeof(const struct test__*)); - if(tests == NULL) { - fprintf(stderr, "Out of memory.\n"); - exit(2); - } - tests[n] = test_by_name__(argv[i]); - if(tests[n] == NULL) { - fprintf(stderr, "%s: Unrecognized unit test '%s'\n", argv[0], argv[i]); - fprintf(stderr, "Try '%s --list' for list of unit tests.\n", argv[0]); - exit(2); - } - n++; - } else if(strcmp(argv[i], "--") == 0) { - seen_double_dash = 1; - } else if(strcmp(argv[i], "--help") == 0 || strcmp(argv[i], "-h") == 0) { - test_help__(); - exit(0); - } else if(strcmp(argv[i], "--verbose") == 0 || strcmp(argv[i], "-v") == 0) { - test_verbose_level__++; - } else if(strncmp(argv[i], "--verbose=", 10) == 0) { - test_verbose_level__ = atoi(argv[i] + 10); - } else if(strcmp(argv[i], "--color=auto") == 0) { - /* noop (set from above) */ - } else if(strcmp(argv[i], "--color=always") == 0 || strcmp(argv[i], "--color") == 0) { - test_colorize__ = 1; - } else if(strcmp(argv[i], "--color=never") == 0) { - test_colorize__ = 0; - } else if(strcmp(argv[i], "--skip") == 0 || strcmp(argv[i], "-s") == 0) { - test_skip_mode__ = 1; - } else if(strcmp(argv[i], "--no-exec") == 0) { - test_no_exec__ = 1; - } else if(strcmp(argv[i], "--no-summary") == 0) { - test_no_summary__ = 1; - } else if(strcmp(argv[i], "--list") == 0 || strcmp(argv[i], "-l") == 0) { - test_list_names__(); - exit(0); - } else { - fprintf(stderr, "%s: Unrecognized option '%s'\n", argv[0], argv[i]); - fprintf(stderr, "Try '%s --help' for more information.\n", argv[0]); - exit(2); - } - } - -#if defined(CUTEST_WIN__) - SetUnhandledExceptionFilter(test_exception_filter__); -#endif - - /* Count all test units */ - test_count__ = 0; - for(i = 0; test_list__[i].func != NULL; i++) - test_count__++; - - /* Run the tests */ - if(n == 0) { - /* Run all tests */ - for(i = 0; test_list__[i].func != NULL; i++) - test_run__(&test_list__[i]); - } else if(!test_skip_mode__) { - /* Run the listed tests */ - for(i = 0; i < n; i++) - test_run__(tests[i]); - } else { - /* Run all tests except those listed */ - int is_skipped; - - for(i = 0; test_list__[i].func != NULL; i++) { - is_skipped = 0; - for(j = 0; j < n; j++) { - if(tests[j] == &test_list__[i]) { - is_skipped = 1; - break; - } - } - if(!is_skipped) - test_run__(&test_list__[i]); - } - } - - /* Write a summary */ - if(!test_no_summary__ && test_verbose_level__ >= 1) { - test_print_in_color(CUTEST_COLOR_DEFAULT_INTENSIVE__, "\nSummary:\n"); - - if(test_verbose_level__ >= 3) { - printf(" Count of all unit tests: %4d\n", test_count__); - printf(" Count of run unit tests: %4d\n", test_stat_run_units__); - printf(" Count of failed unit tests: %4d\n", test_stat_failed_units__); - printf(" Count of skipped unit tests: %4d\n", test_count__ - test_stat_run_units__); - } - - if(test_stat_failed_units__ == 0) { - test_print_in_color(CUTEST_COLOR_GREEN_INTENSIVE__, - " SUCCESS: All unit tests have passed.\n"); - } else { - test_print_in_color(CUTEST_COLOR_RED_INTENSIVE__, - " FAILED: %d of %d unit tests have failed.\n", - test_stat_failed_units__, test_stat_run_units__); - } - } - - if(tests != NULL) - free(tests); - - return (test_stat_failed_units__ == 0) ? 0 : 1; -} - - -#endif /* #ifndef TEST_NO_MAIN */ - -#ifdef __cplusplus - } /* extern "C" */ -#endif - - -#endif /* #ifndef CUTEST_H__ */ diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/ext/handy.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/ext/handy.h deleted file mode 100644 index 936e70f..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/ext/handy.h +++ /dev/null @@ -1,66 +0,0 @@ -#ifndef HANDY_H -#define HANDY_H - -#include <stddef.h> -#include <stdint.h> -#include <string.h> - -/* - * Handy CPP defines and C inline functions. - */ - -/* Evaluates to the number of items in array-type variable arr. */ -#define ARRAYCOUNT(arr) (sizeof arr / sizeof arr[0]) - -#ifndef MIN -# define MIN(x, y) ((x) < (y) ? (x) : (y)) -#endif - -/** Stringify its argument. */ -#define STRINGIFY(x) STRINGIFY_(x) -#define STRINGIFY_(x) #x - -/* Error handling macros. - * - * These expect a zero = success, non-zero = error convention. - */ - -/** Error: return. - * - * If the expression fails, return the error from this function. */ -#define ER(expr) do { typeof (expr) err_ = (expr); if (err_) return err_; } while (0) - -/** Error: goto. - * - * If the expression fails, goto x_err. Assumes defn of label - * x_err and 'error_type err'. */ -#define EG(expr) do { err = (expr); if (err) goto x_err; } while (0) - -/** Like memset(ptr, 0, len), but not allowed to be removed by - * compilers. */ -static inline void mem_clean(volatile void *v, size_t len) -{ - if (len) - { - memset((void *) v, 0, len); - (void) *((volatile uint8_t *) v); - } -} - -/** Returns 1 if len bytes at va equal len bytes at vb, 0 if they do not. - * Does not leak length of common prefix through timing. */ -static inline unsigned mem_eq(const void *va, const void *vb, size_t len) -{ - const volatile uint8_t *a = va; - const volatile uint8_t *b = vb; - uint8_t diff = 0; - - while (len--) - { - diff |= *a++ ^ *b++; - } - - return !diff; -} - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/gcm.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/gcm.c deleted file mode 100644 index 5b37473..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/gcm.c +++ /dev/null @@ -1,249 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "handy.h" -#include "prp.h" -#include "modes.h" -#include "blockwise.h" -#include "bitops.h" -#include "gf128.h" -#include "tassert.h" - -#include <string.h> - -#define STATE_INVALID 0 -#define STATE_AAD 1 -#define STATE_CIPHER 2 - -static void ghash_init(ghash_ctx *ctx, uint8_t H[16]) -{ - memset(ctx, 0, sizeof *ctx); - cf_gf128_frombytes_be(H, ctx->H); - ctx->state = STATE_AAD; -} - -static void ghash_block(void *vctx, const uint8_t *data) -{ - ghash_ctx *ctx = vctx; - cf_gf128 gfdata; - cf_gf128_frombytes_be(data, gfdata); - cf_gf128_add(gfdata, ctx->Y, ctx->Y); - cf_gf128_mul(ctx->Y, ctx->H, ctx->Y); -} - -static void ghash_add(ghash_ctx *ctx, const uint8_t *buf, size_t n) -{ - cf_blockwise_accumulate(ctx->buffer, &ctx->buffer_used, - sizeof ctx->buffer, - buf, n, - ghash_block, - ctx); -} - -static void ghash_add_pad(ghash_ctx *ctx) -{ - if (ctx->buffer_used == 0) - return; - - memset(ctx->buffer + ctx->buffer_used, 0, sizeof(ctx->buffer) - ctx->buffer_used); - ghash_block(ctx, ctx->buffer); - ctx->buffer_used = 0; -} - -static void ghash_add_aad(ghash_ctx *ctx, const uint8_t *buf, size_t n) -{ - assert(ctx->state == STATE_AAD); - ctx->len_aad += n; - ghash_add(ctx, buf, n); -} - -static void ghash_add_cipher(ghash_ctx *ctx, const uint8_t *buf, size_t n) -{ - if (ctx->state == STATE_AAD) - { - ghash_add_pad(ctx); - ctx->state = STATE_CIPHER; - } - - assert(ctx->state == STATE_CIPHER); - ctx->len_cipher += n; - ghash_add(ctx, buf, n); -} - -static void ghash_final(ghash_ctx *ctx, uint8_t out[16]) -{ - uint8_t lenbuf[8]; - - if (ctx->state == STATE_AAD || ctx->state == STATE_CIPHER) - { - ghash_add_pad(ctx); - ctx->state = STATE_INVALID; - } - - /* Add len(A) || len(C) */ - write64_be(ctx->len_aad * 8, lenbuf); - ghash_add(ctx, lenbuf, sizeof lenbuf); - - write64_be(ctx->len_cipher * 8, lenbuf); - ghash_add(ctx, lenbuf, sizeof lenbuf); - - assert(ctx->buffer_used == 0); - cf_gf128_tobytes_be(ctx->Y, out); -} - -void cf_gcm_encrypt_init(const cf_prp *prp, void *prpctx, cf_gcm_ctx *gcmctx, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce) -{ - uint8_t H[16] = { 0 }; - - /* H = E_K(0^128) */ - prp->encrypt(prpctx, H, H); - - /* Produce CTR nonce, Y_0: - * - * if len(IV) == 96 - * Y_0 = IV || 0^31 || 1 - * otherwise - * Y_0 = GHASH(H, {}, IV) - */ - - if (nnonce == 12) - { - memcpy(gcmctx->Y0, nonce, nnonce); - gcmctx->Y0[12] = gcmctx->Y0[13] = gcmctx->Y0[14] = 0x00; - gcmctx->Y0[15] = 0x01; - } else { - ghash_init(&gcmctx->gh, H); - ghash_add_cipher(&gcmctx->gh, nonce, nnonce); - ghash_final(&gcmctx->gh, gcmctx->Y0); - } - - /* Hash AAD */ - ghash_init(&gcmctx->gh, H); - ghash_add_aad(&gcmctx->gh, header, nheader); - - /* Produce ciphertext */ - memset(gcmctx->e_Y0, 0, sizeof(gcmctx->e_Y0)); - cf_ctr_init(&gcmctx->ctr, prp, prpctx, gcmctx->Y0); - cf_ctr_custom_counter(&gcmctx->ctr, 12, 4); /* counter is 2^32 */ - cf_ctr_cipher(&gcmctx->ctr, gcmctx->e_Y0, gcmctx->e_Y0, sizeof gcmctx->e_Y0); /* first block is tag offset */ - - mem_clean(H, sizeof H); -} - -void cf_gcm_encrypt_update(cf_gcm_ctx *gcmctx, const uint8_t *plain, size_t nplain, uint8_t *cipher) -{ - cf_ctr_cipher(&gcmctx->ctr, plain, cipher, nplain); - ghash_add_cipher(&gcmctx->gh, cipher, nplain); -} - -void cf_gcm_encrypt_final(cf_gcm_ctx *gcmctx, uint8_t *tag, size_t ntag) -{ - /* Post-process ghash output */ - uint8_t full_tag[16] = { 0 }; - ghash_final(&gcmctx->gh, full_tag); - - assert(ntag > 1 && ntag <= 16); - xor_bb(tag, full_tag, gcmctx->e_Y0, ntag); - - mem_clean(full_tag, sizeof full_tag); - mem_clean(gcmctx, sizeof *gcmctx); -} - -void cf_gcm_encrypt(const cf_prp *prp, void *prpctx, - const uint8_t *plain, size_t nplain, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce, - uint8_t *cipher, /* the same size as nplain */ - uint8_t *tag, size_t ntag) -{ - cf_gcm_ctx gcmctx; - - cf_gcm_encrypt_init(prp, prpctx, &gcmctx, header, nheader, nonce, nnonce); - cf_gcm_encrypt_update(&gcmctx, plain, nplain, cipher); - cf_gcm_encrypt_final(&gcmctx, tag, ntag); -} - -int cf_gcm_decrypt(const cf_prp *prp, void *prpctx, - const uint8_t *cipher, size_t ncipher, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce, - const uint8_t *tag, size_t ntag, - uint8_t *plain) -{ - uint8_t H[16] = { 0 }; - uint8_t Y0[16]; - - /* H = E_K(0^128) */ - prp->encrypt(prpctx, H, H); - - /* Produce CTR nonce, Y_0: - * - * if len(IV) == 96 - * Y_0 = IV || 0^31 || 1 - * otherwise - * Y_0 = GHASH(H, {}, IV) - */ - - if (nnonce == 12) - { - memcpy(Y0, nonce, nnonce); - Y0[12] = Y0[13] = Y0[14] = 0x00; - Y0[15] = 0x01; - } else { - ghash_ctx gh; - ghash_init(&gh, H); - ghash_add_cipher(&gh, nonce, nnonce); - ghash_final(&gh, Y0); - } - - /* Hash AAD. */ - ghash_ctx gh; - ghash_init(&gh, H); - ghash_add_aad(&gh, header, nheader); - - /* Start counter mode, to obtain offset on tag. */ - uint8_t e_Y0[16] = { 0 }; - cf_ctr ctr; - cf_ctr_init(&ctr, prp, prpctx, Y0); - cf_ctr_custom_counter(&ctr, 12, 4); - cf_ctr_cipher(&ctr, e_Y0, e_Y0, sizeof e_Y0); - - /* Hash ciphertext. */ - ghash_add_cipher(&gh, cipher, ncipher); - - /* Produce tag. */ - uint8_t full_tag[16]; - ghash_final(&gh, full_tag); - assert(ntag > 1 && ntag <= 16); - xor_bb(full_tag, full_tag, e_Y0, ntag); - - int err = 1; - if (!mem_eq(full_tag, tag, ntag)) - goto x_err; - - /* Complete decryption. */ - cf_ctr_cipher(&ctr, cipher, plain, ncipher); - err = 0; - -x_err: - mem_clean(H, sizeof H); - mem_clean(Y0, sizeof Y0); - mem_clean(e_Y0, sizeof e_Y0); - mem_clean(full_tag, sizeof full_tag); - mem_clean(&gh, sizeof gh); - mem_clean(&ctr, sizeof ctr); - return err; -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/gf128.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/gf128.c deleted file mode 100644 index f7ea834..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/gf128.c +++ /dev/null @@ -1,114 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "cf_config.h" -#include "gf128.h" -#include "bitops.h" - -#include <string.h> - -void cf_gf128_tobytes_be(const cf_gf128 in, uint8_t out[16]) -{ - write32_be(in[0], out + 0); - write32_be(in[1], out + 4); - write32_be(in[2], out + 8); - write32_be(in[3], out + 12); -} - -void cf_gf128_frombytes_be(const uint8_t in[16], cf_gf128 out) -{ - out[0] = read32_be(in + 0); - out[1] = read32_be(in + 4); - out[2] = read32_be(in + 8); - out[3] = read32_be(in + 12); -} - -/* out = 2 * in. Arguments may alias. */ -void cf_gf128_double(const cf_gf128 in, cf_gf128 out) -{ - uint8_t table[2] = { 0x00, 0x87 }; - uint32_t borrow = 0; - uint32_t inword; - - inword = in[3]; out[3] = (inword << 1) | borrow; borrow = inword >> 31; - inword = in[2]; out[2] = (inword << 1) | borrow; borrow = inword >> 31; - inword = in[1]; out[1] = (inword << 1) | borrow; borrow = inword >> 31; - inword = in[0]; out[0] = (inword << 1) | borrow; borrow = inword >> 31; - -#if CF_CACHE_SIDE_CHANNEL_PROTECTION - out[3] ^= select_u8(borrow, table, 2); -#else - out[3] ^= table[borrow]; -#endif -} - -/* out = 2 * in. Arguments may alias. */ -void cf_gf128_double_le(const cf_gf128 in, cf_gf128 out) -{ - uint8_t table[2] = { 0x00, 0xe1 }; - uint32_t borrow = 0; - uint32_t inword; - - inword = in[0]; out[0] = (inword >> 1) | (borrow << 31); borrow = inword & 1; - inword = in[1]; out[1] = (inword >> 1) | (borrow << 31); borrow = inword & 1; - inword = in[2]; out[2] = (inword >> 1) | (borrow << 31); borrow = inword & 1; - inword = in[3]; out[3] = (inword >> 1) | (borrow << 31); borrow = inword & 1; - -#if CF_CACHE_SIDE_CHANNEL_PROTECTION - out[0] ^= select_u8(borrow, table, 2) << 24; -#else - out[0] ^= table[borrow] << 24; -#endif -} - -/* out = x + y. Arguments may alias. */ -void cf_gf128_add(const cf_gf128 x, const cf_gf128 y, cf_gf128 out) -{ - out[0] = x[0] ^ y[0]; - out[1] = x[1] ^ y[1]; - out[2] = x[2] ^ y[2]; - out[3] = x[3] ^ y[3]; -} - -/* out = xy. Arguments may alias. */ -void cf_gf128_mul(const cf_gf128 x, const cf_gf128 y, cf_gf128 out) -{ -#if CF_TIME_SIDE_CHANNEL_PROTECTION - cf_gf128 zero = { 0 }; -#endif - - /* Z_0 = 0^128 - * V_0 = Y */ - cf_gf128 Z, V; - memset(Z, 0, sizeof Z); - memcpy(V, y, sizeof V); - - int i; - for (i = 0; i < 128; i++) - { - uint32_t word = x[i >> 5]; - uint8_t bit = (word >> (31 - (i & 31))) & 1; - -#if CF_TIME_SIDE_CHANNEL_PROTECTION - select_xor128(Z, zero, V, bit); -#else - if (bit) - xor_words(Z, V, 4); -#endif - - cf_gf128_double_le(V, V); - } - - memcpy(out, Z, sizeof Z); -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/gf128.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/gf128.h deleted file mode 100644 index 7560862..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/gf128.h +++ /dev/null @@ -1,55 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef GF128_H -#define GF128_H - -#include <stddef.h> -#include <stdint.h> - -/** - * @brief Operations in GF(2^128). - * - * These implementations are constant time, but relatively slow. - */ - -typedef uint32_t cf_gf128[4]; - -/* Unpack from big-endian bytes into out. */ -void cf_gf128_frombytes_be(const uint8_t in[16], cf_gf128 out); - -/* Pack in big-endian order into out. */ -void cf_gf128_tobytes_be(const cf_gf128 in, uint8_t out[16]); - -/* out = 2 * in. Arguments may not alias. */ -void cf_gf128_double(const cf_gf128 in, cf_gf128 out); - -/* out = 2 * in. Arguments may not alias. - * This differs from cf_gf128_double because it interprets the - * block in little endian: the lsb is the msb of the - * first element, the msb is the lsb of the last element. - * - * GCM uses this convention. */ -void cf_gf128_double_le(const cf_gf128 in, cf_gf128 out); - -/* out = x + y. Arguments may alias. */ -void cf_gf128_add(const cf_gf128 x, const cf_gf128 y, cf_gf128 out); - -/* out = xy. Arguments may alias. - * - * This uses cf_gf128_double_le internally, and is suitable for - * GCM. */ -void cf_gf128_mul(const cf_gf128 x, const cf_gf128 y, cf_gf128 out); - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/hmac.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/hmac.c deleted file mode 100644 index 98646d7..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/hmac.c +++ /dev/null @@ -1,106 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "hmac.h" -#include "chash.h" -#include "bitops.h" -#include "handy.h" -#include "tassert.h" - -#include <string.h> - -void cf_hmac_init(cf_hmac_ctx *ctx, - const cf_chash *hash, - const uint8_t *key, size_t nkey) -{ - assert(ctx); - assert(hash); - - mem_clean(ctx, sizeof *ctx); - ctx->hash = hash; - - /* Prepare key: */ - uint8_t k[CF_CHASH_MAXBLK]; - - /* Shorten long keys. */ - if (nkey > hash->blocksz) - { - /* Standard doesn't cover case where blocksz < hashsz. - * FIPS186-1 seems to want to append a negative number of zero bytes. - * In any case, we only have a k buffer of CF_CHASH_MAXBLK! */ - assert(hash->hashsz <= hash->blocksz); - - cf_hash(hash, key, nkey, k); - key = k; - nkey = hash->hashsz; - } - - /* Right zero-pad short keys. */ - if (k != key) - memcpy(k, key, nkey); - if (hash->blocksz > nkey) - memset(k + nkey, 0, hash->blocksz - nkey); - - /* Start inner hash computation */ - uint8_t blk[CF_CHASH_MAXBLK]; - - xor_b8(blk, k, 0x36, hash->blocksz); - hash->init(&ctx->inner); - hash->update(&ctx->inner, blk, hash->blocksz); - - /* And outer. */ - xor_b8(blk, k, 0x5c, hash->blocksz); - hash->init(&ctx->outer); - hash->update(&ctx->outer, blk, hash->blocksz); - - mem_clean(blk, sizeof blk); - mem_clean(k, sizeof k); -} - -void cf_hmac_update(cf_hmac_ctx *ctx, const void *data, size_t ndata) -{ - assert(ctx && ctx->hash); - - ctx->hash->update(&ctx->inner, data, ndata); -} - -void cf_hmac_finish(cf_hmac_ctx *ctx, uint8_t *out) -{ - assert(ctx && ctx->hash); - assert(out); - - uint8_t innerh[CF_MAXHASH]; - ctx->hash->digest(&ctx->inner, innerh); - - ctx->hash->update(&ctx->outer, innerh, ctx->hash->hashsz); - ctx->hash->digest(&ctx->outer, out); - - mem_clean(ctx, sizeof *ctx); -} - -void cf_hmac(const uint8_t *key, size_t nkey, - const uint8_t *msg, size_t nmsg, - uint8_t *out, - const cf_chash *hash) -{ - cf_hmac_ctx ctx; - - assert(out); - assert(hash); - - cf_hmac_init(&ctx, hash, key, nkey); - cf_hmac_update(&ctx, msg, nmsg); - cf_hmac_finish(&ctx, out); -} - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/hmac.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/hmac.h deleted file mode 100644 index 2f9ea7b..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/hmac.h +++ /dev/null @@ -1,78 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef HMAC_H -#define HMAC_H - -#include <stddef.h> -#include <stdint.h> - -#include "chash.h" - -/** - * HMAC - * ==== - * This is a one-shot and incremental interface to computing - * HMAC with any hash function. - * - * (Note: HMAC with SHA3 is possible, but is probably not a - * sensible thing to want.) - */ - -/* .. c:type:: cf_hmac_ctx - * HMAC incremental interface context. - * - * .. c:member:: cf_hmac_ctx.hash - * Hash function description. - * - * .. c:member:: cf_hmac_ctx.inner - * Inner hash computation. - * - * .. c:member:: cf_hmac_ctx.outer - * Outer hash computation. - */ -typedef struct -{ - const cf_chash *hash; - cf_chash_ctx inner; - cf_chash_ctx outer; -} cf_hmac_ctx; - -/* .. c:function:: $DECL - * Set up ctx for computing a HMAC using the given hash and key. */ -void cf_hmac_init(cf_hmac_ctx *ctx, - const cf_chash *hash, - const uint8_t *key, size_t nkey); - -/* .. c:function:: $DECL - * Input data. */ -void cf_hmac_update(cf_hmac_ctx *ctx, - const void *data, size_t ndata); - -/* .. c:function:: $DECL - * Finish and compute HMAC. - * `ctx->hash->hashsz` bytes are written to `out`. */ -void cf_hmac_finish(cf_hmac_ctx *ctx, uint8_t *out); - -/* .. c:function:: $DECL - * One shot interface: compute `HMAC_hash(key, msg)`, writing the - * answer (which is `hash->hashsz` long) to `out`. - * - * This function does not fail. */ -void cf_hmac(const uint8_t *key, size_t nkey, - const uint8_t *msg, size_t nmsg, - uint8_t *out, - const cf_chash *hash); - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/modes.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/modes.c deleted file mode 100644 index 1e44af1..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/modes.c +++ /dev/null @@ -1,99 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "prp.h" -#include "modes.h" -#include "bitops.h" -#include "blockwise.h" - -#include <string.h> -#include "tassert.h" - -/* CBC */ -void cf_cbc_init(cf_cbc *ctx, const cf_prp *prp, void *prpctx, const uint8_t iv[CF_MAXBLOCK]) -{ - ctx->prp = prp; - ctx->prpctx = prpctx; - memcpy(ctx->block, iv, prp->blocksz); -} - -void cf_cbc_encrypt(cf_cbc *ctx, const uint8_t *input, uint8_t *output, size_t blocks) -{ - uint8_t buf[CF_MAXBLOCK]; - size_t nblk = ctx->prp->blocksz; - - while (blocks--) - { - xor_bb(buf, input, ctx->block, nblk); - ctx->prp->encrypt(ctx->prpctx, buf, ctx->block); - memcpy(output, ctx->block, nblk); - input += nblk; - output += nblk; - } -} - -void cf_cbc_decrypt(cf_cbc *ctx, const uint8_t *input, uint8_t *output, size_t blocks) -{ - uint8_t buf[CF_MAXBLOCK]; - size_t nblk = ctx->prp->blocksz; - - while (blocks--) - { - ctx->prp->decrypt(ctx->prpctx, input, buf); - xor_bb(output, buf, ctx->block, nblk); - memcpy(ctx->block, input, nblk); - input += nblk; - output += nblk; - } -} - -/* CTR */ -void cf_ctr_init(cf_ctr *ctx, const cf_prp *prp, void *prpctx, const uint8_t nonce[CF_MAXBLOCK]) -{ - memset(ctx, 0, sizeof *ctx); - ctx->counter_offset = 0; - ctx->counter_width = prp->blocksz; - ctx->prp = prp; - ctx->prpctx = prpctx; - ctx->nkeymat = 0; - memcpy(ctx->nonce, nonce, prp->blocksz); -} - -void cf_ctr_custom_counter(cf_ctr *ctx, size_t offset, size_t width) -{ - assert(ctx->prp->blocksz <= offset + width); - ctx->counter_offset = offset; - ctx->counter_width = width; -} - -static void ctr_next_block(void *vctx, uint8_t *out) -{ - cf_ctr *ctx = vctx; - ctx->prp->encrypt(ctx->prpctx, ctx->nonce, out); - incr_be(ctx->nonce + ctx->counter_offset, ctx->counter_width); -} - -void cf_ctr_cipher(cf_ctr *ctx, const uint8_t *input, uint8_t *output, size_t bytes) -{ - cf_blockwise_xor(ctx->keymat, &ctx->nkeymat, - ctx->prp->blocksz, - input, output, bytes, - ctr_next_block, - ctx); -} - -void cf_ctr_discard_block(cf_ctr *ctx) -{ - ctx->nkeymat = 0; -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/modes.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/modes.h deleted file mode 100644 index 20940a3..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/modes.h +++ /dev/null @@ -1,587 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef MODES_H -#define MODES_H - -#include <stddef.h> -#include <stdint.h> - -#include "gf128.h" -#include "prp.h" - -/** - * Block cipher modes - * ================== - */ - -/** - * CBC mode - * -------- - * This implementation allows encryption or decryption of whole - * blocks in CBC mode. It does not offer a byte-wise incremental - * interface, or do any padding. - * - * This mode provides no useful integrity and should not be used - * directly. - */ - -/* .. c:type:: cf_cbc - * This structure binds together the things needed to encrypt/decrypt whole - * blocks in CBC mode. - * - * .. c:member:: cf_cbc.prp - * How to encrypt or decrypt blocks. This could be, for example, :c:data:`cf_aes`. - * - * .. c:member:: cf_cbc.prpctx - * Private data for prp functions. For a `prp` of `cf_aes`, this would be a - * pointer to a :c:type:`cf_aes_context` instance. - * - * .. c:member:: cf_cbc.block - * The IV or last ciphertext block. - */ -typedef struct -{ - const cf_prp *prp; - void *prpctx; - uint8_t block[CF_MAXBLOCK]; -} cf_cbc; - -/* .. c:function:: $DECL - * Initialise CBC encryption/decryption context using selected prp, prp context and IV. */ -void cf_cbc_init(cf_cbc *ctx, const cf_prp *prp, void *prpctx, const uint8_t iv[CF_MAXBLOCK]); - -/* .. c:function:: $DECL - * Encrypt blocks in CBC mode. input and output - * must point to blocks * ctx->prp->blocksz bytes of storage (and may alias). */ -void cf_cbc_encrypt(cf_cbc *ctx, const uint8_t *input, uint8_t *output, size_t blocks); - -/* .. c:function:: $DECL - * Decrypt blocks in CBC mode. input and output - * must point to blocks * ctx->prp->blocksz bytes of storage (and may alias). */ -void cf_cbc_decrypt(cf_cbc *ctx, const uint8_t *input, uint8_t *output, size_t blocks); - -/** - * Counter mode - * ------------ - * This implementation allows incremental encryption/decryption of - * messages. Encryption and decryption are the same operation. - * - * The counter is always big-endian, but has configurable location - * and size within the nonce block. The counter wraps, so you - * should make sure the length of a message with a given nonce - * doesn't cause nonce reuse. - * - * This mode provides no integrity and should not be used directly. - */ - -/* .. c:type:: cf_ctr - * - * .. c:member:: cf_ctr.prp - * How to encrypt or decrypt blocks. This could be, for example, :c:data:`cf_aes`. - * - * .. c:member:: cf_ctr.prpctx - * Private data for prp functions. For a `prp` of `cf_aes`, this would be a - * pointer to a :c:type:`cf_aes_context` instance. - * - * .. c:member:: cf_ctr.nonce - * The next block to encrypt to get another block of key stream. - * - * .. c:member:: cf_ctr.keymat - * The current block of key stream. - * - * .. c:member:: cf_ctr.nkeymat - * The number of bytes at the end of :c:member:`keymat` that are so-far unused. - * If this is zero, all the bytes are used up and/or of undefined value. - * - * .. c:member:: cf_ctr.counter_offset - * The offset (in bytes) of the counter block within the nonce. - * - * .. c:member:: cf_ctr.counter_width - * The width (in bytes) of the counter block in the nonce. - */ -typedef struct -{ - const cf_prp *prp; - void *prpctx; - uint8_t nonce[CF_MAXBLOCK]; - uint8_t keymat[CF_MAXBLOCK]; - size_t nkeymat; - size_t counter_offset; - size_t counter_width; -} cf_ctr; - -/* .. c:function:: $DECL - * Initialise CTR encryption/decryption context using selected prp and nonce. - * (nb, this only increments the whole nonce as a big endian block) */ -void cf_ctr_init(cf_ctr *ctx, const cf_prp *prp, void *prpctx, const uint8_t nonce[CF_MAXBLOCK]); - -/* .. c:function:: $DECL - * Set the location and width of the nonce counter. - * - * eg. offset = 12, width = 4 means the counter is mod 2^32 and placed - * at the end of the nonce. */ -void cf_ctr_custom_counter(cf_ctr *ctx, size_t offset, size_t width); - -/* .. c:function:: $DECL - * Encrypt or decrypt bytes in CTR mode. - * input and output may alias and must point to specified number of bytes. */ -void cf_ctr_cipher(cf_ctr *ctx, const uint8_t *input, uint8_t *output, size_t bytes); - -/* .. c:function:: $DECL - * Discards the rest of this block of key stream. */ -void cf_ctr_discard_block(cf_ctr *ctx); - -/** - * CBC-MAC - * ------- - * This is a incremental interface to computing a CBC-MAC tag over a message. - * - * It optionally pads the message with PKCS#5/PKCS#7 padding -- if you don't - * do this, messages must be an exact number of blocks long. - * - * You shouldn't use this directly because it isn't secure for variable-length - * messages. Use CMAC instead. - */ - -/* .. c:type:: cf_cbcmac_stream - * Stream interface to CBC-MAC signing. - * - * .. c:member:: cf_cbcmac.prp - * How to encrypt or decrypt blocks. This could be, for example, :c:data:`cf_aes`. - * - * .. c:member:: cf_cbcmac.prpctx - * Private data for prp functions. For a `prp` of `cf_aes`, this would be a - * pointer to a :c:type:`cf_aes_context` instance. - * - * .. c:member:: cf_cbcmac.cbc - * CBC data. - * - * .. c:member:: cf_cbcmac.buffer - * Buffer for data which can't be processed until we have a full block. - * - * .. c:member:: cf_cbcmac.used - * How many bytes at the front of :c:member:`buffer` are valid. - */ -typedef struct -{ - const cf_prp *prp; - void *prpctx; - cf_cbc cbc; - uint8_t buffer[CF_MAXBLOCK]; - size_t used; -} cf_cbcmac_stream; - -/* .. c:function:: $DECL - * Initialise CBC-MAC signing context using selected prp. */ -void cf_cbcmac_stream_init(cf_cbcmac_stream *ctx, const cf_prp *prp, void *prpctx); - -/* .. c:function:: $DECL - * Reset the streaming signing context, to sign a new message. */ -void cf_cbcmac_stream_reset(cf_cbcmac_stream *ctx); - -/* .. c:function:: $DECL - * Process ndata bytes at data. */ -void cf_cbcmac_stream_update(cf_cbcmac_stream *ctx, const uint8_t *data, size_t ndata); - -/* .. c:function:: $DECL - * Finish the current block of data by adding zeroes. Does nothing if there - * are no bytes awaiting processing. */ -void cf_cbcmac_stream_finish_block_zero(cf_cbcmac_stream *ctx); - -/* .. c:function:: $DECL - * Output the MAC to ctx->prp->blocksz bytes at out. - * ctx->used must be zero: the inputed message must be an exact number of - * blocks. */ -void cf_cbcmac_stream_nopad_final(cf_cbcmac_stream *ctx, uint8_t out[CF_MAXBLOCK]); - -/* .. c:function:: $DECL - * Output the MAC to ctx->prp->blocksz bytes at out. - * - * The message is padded with PKCS#5 padding. */ -void cf_cbcmac_stream_pad_final(cf_cbcmac_stream *ctx, uint8_t out[CF_MAXBLOCK]); - -/** - * CMAC - * ---- - * This is both a one-shot and incremental interface to - * computing a CMAC tag over a message. - * - * The one-shot interface separates out the per-key computation, - * so if you need to compute lots of MACs with one key you don't - * pay that cost more than once. - * - * CMAC is a good choice for a symmetric MAC. - */ - -/* .. c:type:: cf_cmac - * One-shot interface to CMAC signing. - * - * .. c:member:: cf_cmac.prp - * How to encrypt or decrypt blocks. This could be, for example, :c:data:`cf_aes`. - * - * .. c:member:: cf_cmac.prpctx - * Private data for prp functions. For a `prp` of `cf_aes`, this would be a - * pointer to a :c:type:`cf_aes_context` instance. - * - * .. c:member:: cf_cmac.B - * The XOR offset for the last message block if it is a complete block - * (also known as K\ :sub:`1`). - * - * .. c:member:: cf_cmac.P - * The XOR offset for the last message block if it is a partial block - * (also known as K\ :sub:`2`). - */ -typedef struct -{ - const cf_prp *prp; - void *prpctx; - uint8_t B[CF_MAXBLOCK]; - uint8_t P[CF_MAXBLOCK]; -} cf_cmac; - -/* .. c:function:: $DECL - * Initialise CMAC signing context using selected prp. */ -void cf_cmac_init(cf_cmac *ctx, const cf_prp *prp, void *prpctx); - -/* .. c:function:: $DECL - * CMAC sign the given data. The MAC is written to ctx->prp->blocksz - * bytes at out. This is a one-shot function. */ -void cf_cmac_sign(cf_cmac *ctx, const uint8_t *data, size_t bytes, - uint8_t out[CF_MAXBLOCK]); - -/* .. c:type:: cf_cmac_stream - * Stream interface to CMAC signing. - * - * Input data in arbitrary chunks using :c:func:`cf_cmac_stream_update`. - * The last bit of data must be signalled with the `isfinal` flag to - * that function, and the data cannot be zero length unless the whole - * message is empty. - * - * .. c:member:: cf_cmac_stream.cmac - * CMAC one-shot data. - * - * .. c:member:: cf_cmac_stream.cbc - * CBC block encryption data. - * - * .. c:member:: cf_cmac_stream.buffer - * Buffer for data which can't be processed until we have a full block. - * - * .. c:member:: cf_cmac_stream.used - * How many bytes at the front of :c:member:`buffer` are valid. - * - * .. c:member:: cf_cmac_stream.processed - * How many bytes in total we've processed. This is used to correctly - * process empty messages. - * - * .. c:member:: cf_cmac_stream.finalised - * A flag set when the final chunk of the message has been processed. - * Only when this flag is set can you get the MAC out. - */ -typedef struct -{ - cf_cmac cmac; - cf_cbc cbc; - uint8_t buffer[CF_MAXBLOCK]; - size_t used; - size_t processed; - int finalised; -} cf_cmac_stream; - -/* .. c:function:: $DECL - * Initialise CMAC streaming signing context using selected prp. */ -void cf_cmac_stream_init(cf_cmac_stream *ctx, const cf_prp *prp, void *prpctx); - -/* .. c:function:: $DECL - * Reset the streaming signing context, to sign a new message. */ -void cf_cmac_stream_reset(cf_cmac_stream *ctx); - -/* .. c:function:: $DECL - * Process ndata bytes at data. isfinal is non-zero if this is the last piece - * of data. */ -void cf_cmac_stream_update(cf_cmac_stream *ctx, const uint8_t *data, size_t ndata, - int isfinal); - -/* .. c:function:: $DECL - * Output the MAC to ctx->cmac->prp->blocksz bytes at out. - * cf_cmac_stream_update with isfinal non-zero must have been called - * since the last _init/_reset. */ -void cf_cmac_stream_final(cf_cmac_stream *ctx, uint8_t out[CF_MAXBLOCK]); - -/** - * EAX - * --- - * - * The EAX authenticated encryption mode. This is a one-shot - * interface. - * - * EAX is a pretty respectable and fast AEAD mode. - */ - -/* .. c:function:: $DECL - * EAX authenticated encryption. - * - * This function does not fail. - * - * :param prp/prpctx: describe the block cipher to use. - * :param plain: message plaintext. - * :param nplain: length of message. May be zero. - * :param header: additionally authenticated data (AAD). - * :param nheader: length of AAD. May be zero. - * :param nonce: nonce. This must not repeat for a given key. - * :param nnonce: length of nonce. The nonce can be any length. - * :param cipher: ciphertext output. `nplain` bytes are written here. - * :param tag: authentication tag. `ntag` bytes are written here. - * :param ntag: authentication tag length. This must be non-zero and no greater than `prp->blocksz`. - */ -void cf_eax_encrypt(const cf_prp *prp, void *prpctx, - const uint8_t *plain, size_t nplain, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce, - uint8_t *cipher, - uint8_t *tag, size_t ntag); - -/* .. c:function:: $DECL - * EAX authenticated decryption. - * - * :return: 0 on success, non-zero on error. Nothing is written to plain on error. - * - * :param prp/prpctx: describe the block cipher to use. - * :param cipher: message ciphertext. - * :param ncipher: message length. - * :param header: additionally authenticated data (AAD). - * :param nheader: length of AAD. - * :param nonce: nonce. - * :param nnonce: length of nonce. - * :param tag: authentication tag. `ntag` bytes are read from here. - * :param ntag: authentication tag length. - * :param plain: plaintext output. `ncipher` bytes are written here. - */ -int cf_eax_decrypt(const cf_prp *prp, void *prpctx, - const uint8_t *cipher, size_t ncipher, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce, - const uint8_t *tag, size_t ntag, - uint8_t *plain); - -/** - * GCM - * --- - * The GCM ('Galois counter mode') authenticated encryption mode. - * This is a one-shot interface. - * - * GCM is a reasonably respectable AEAD mode. It's somewhat more - * complex than EAX, and side channel-free implementations can - * be quite slow. - */ - -/* .. c:function:: $DECL - * GCM authenticated encryption. - * - * This function does not fail. - * - * :param prp/prpctx: describe the block cipher to use. - * :param plain: message plaintext. - * :param nplain: length of message. May be zero. - * :param header: additionally authenticated data (AAD). - * :param nheader: length of AAD. May be zero. - * :param nonce: nonce. This must not repeat for a given key. - * :param nnonce: length of nonce. The nonce can be any length, but 12 bytes is strongly recommended. - * :param cipher: ciphertext output. `nplain` bytes are written here. - * :param tag: authentication tag. `ntag` bytes are written here. - * :param ntag: authentication tag length. This must be non-zero and no greater than `prp->blocksz`. - * - * This function does not fail. - */ -void cf_gcm_encrypt(const cf_prp *prp, void *prpctx, - const uint8_t *plain, size_t nplain, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce, - uint8_t *cipher, - uint8_t *tag, size_t ntag); - -/* Incremental GHASH computation. */ -typedef struct -{ - cf_gf128 H; - cf_gf128 Y; - uint8_t buffer[16]; - size_t buffer_used; - uint64_t len_aad; - uint64_t len_cipher; - unsigned state; -} ghash_ctx; - -typedef struct -{ - cf_ctr ctr; - ghash_ctx gh; - uint8_t Y0[16]; - uint8_t e_Y0[16]; -} cf_gcm_ctx; - -void cf_gcm_encrypt_init(const cf_prp *prp, void *prpctx, cf_gcm_ctx *gcmctx, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce); -void cf_gcm_encrypt_update(cf_gcm_ctx *gcmctx, const uint8_t *plain, size_t nplain, uint8_t *cipher); -void cf_gcm_encrypt_final(cf_gcm_ctx *gcmctx, uint8_t *tag, size_t ntag); - -/* .. c:function:: $DECL - * GCM authenticated decryption. - * - * :return: 0 on success, non-zero on error. Nothing is written to plain on error. - * - * :param prp: describe the block cipher to use. - * :param prpctx: describe the block cipher to use. - * :param cipher: message ciphertext. - * :param ncipher: message length. - * :param header: additionally authenticated data (AAD). - * :param nheader: length of AAD. - * :param nonce: nonce. - * :param nnonce: length of nonce. - * :param tag: authentication tag. `ntag` bytes are read from here. - * :param ntag: authentication tag length. - * :param plain: plaintext output. `ncipher` bytes are written here. - */ -int cf_gcm_decrypt(const cf_prp *prp, void *prpctx, - const uint8_t *cipher, size_t ncipher, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce, - const uint8_t *tag, size_t ntag, - uint8_t *plain); - -/** - * CCM - * --- - * - * The CCM ('Counter with CBC-MAC') authenticated encryption mode. - * CCM is a widely used AEAD mode (in IPSec, WPA2, Bluetooth, etc.) - * - * It works (at a high level) by just gluing together CTR and CBC-MAC - * modes (in MAC-then-encrypt mode) and then fixing the problems inherent - * with CBC-MAC in over-complicated ways. - * - * This is a one-shot interface, which is good because the underlying - * mechanism isn't actually online: you need to know the message length - * before you start, or do everything in two passes. - */ - -/* .. c:function:: $DECL - * CCM authenticated encryption. - * - * This function does not fail. - * - * :param prp/prpctx: describe the block cipher to use. - * :param plain: message plaintext. - * :param nplain: length of message. May be zero. Must meet the constraints placed on it by `L`. - * :param L: length of the message length encoding. This must be in the interval `[2,8]` and gives a maximum message size of 2\ :sup:`8L` bytes. - * :param header: additionally authenticated data (AAD). - * :param nheader: length of AAD. May be zero. - * :param nonce: nonce. This must not repeat for a given key. - * :param nnonce: length of nonce. Must be exactly `15 - L` bytes for a 128-bit block cipher. - * :param cipher: ciphertext output. `nplain` bytes are written here. - * :param tag: authentication tag. `ntag` bytes are written here. - * :param ntag: authentication tag length. This must be 4, 6, 8, 10, 12, 14 or 16. - */ -void cf_ccm_encrypt(const cf_prp *prp, void *prpctx, - const uint8_t *plain, size_t nplain, size_t L, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce, - uint8_t *cipher, - uint8_t *tag, size_t ntag); - -/* .. c:function:: $DECL - * CCM authenticated decryption. - * - * :return: 0 on success, non-zero on error. Plain is cleared on error. - * - * :param prp: describe the block cipher to use. - * :param prpctx: describe the block cipher to use. - * :param cipher: message ciphertext. - * :param ncipher: length of message. - * :param L: length of the message length encoding. See :c:func:`cf_ccm_encrypt`. - * :param header: additionally authenticated data (AAD). - * :param nheader: length of AAD. - * :param nonce: nonce. - * :param nnonce: length of nonce. - * :param tag: authentication tag. `ntag` bytes are read from here. - * :param ntag: authentication tag length. This must be 4, 6, 8, 10, 12, 14 or 16. - * :param plain: plaintext output. `ncipher` bytes are written here. - */ -int cf_ccm_decrypt(const cf_prp *prp, void *prpctx, - const uint8_t *cipher, size_t ncipher, size_t L, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce, - const uint8_t *tag, size_t ntag, - uint8_t *plain); - -/** - * OCB - * --- - * - * OCB is an authenticated encryption mode by Phil Rogaway. - * - * This is version 3, as standardised in RFC7253. It's defined - * only for block ciphers with a 128-bit block size. - * - * This is a one-shot interface. - */ - -/* .. c:function:: $DECL - * OCB authenticated encryption. - * - * This function does not fail. - * - * :param prp/prpctx: describe the block cipher to use. - * :param plain: message plaintext. - * :param nplain: length of message. May be zero. - * :param header: additionally authenticated data (AAD). - * :param nheader: length of AAD. May be zero. - * :param nonce: nonce. This must not repeat for a given key. - * :param nnonce: length of nonce. Must be 15 or fewer bytes. - * :param cipher: ciphertext output. `nplain` bytes are written here. - * :param tag: authentication tag. `ntag` bytes are written here. - * :param ntag: authentication tag length. Must be 16 or fewer bytes. - */ -void cf_ocb_encrypt(const cf_prp *prp, void *prpctx, - const uint8_t *plain, size_t nplain, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce, - uint8_t *cipher, - uint8_t *tag, size_t ntag); - -/* .. c:function:: $DECL - * OCB authenticated decryption. - * - * :return: 0 on success, non-zero on error. `plain` is cleared on error. - * - * :param prp: describe the block cipher to use. - * :param prpctx: describe the block cipher to use. - * :param cipher: message ciphertext. - * :param ncipher: length of message. - * :param header: additionally authenticated data (AAD). - * :param nheader: length of AAD. - * :param nonce: nonce. - * :param nnonce: length of nonce. - * :param tag: authentication tag. `ntag` bytes are read from here. - * :param ntag: authentication tag length. - * :param plain: plaintext output. `ncipher` bytes are written here. - */ -int cf_ocb_decrypt(const cf_prp *prp, void *prpctx, - const uint8_t *cipher, size_t ncipher, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce, - const uint8_t *tag, size_t ntag, - uint8_t *plain); -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/norx.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/norx.c deleted file mode 100644 index 8f0aba6..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/norx.c +++ /dev/null @@ -1,410 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - - -#include "norx.h" -#include "bitops.h" -#include "handy.h" -#include "blockwise.h" -#include "tassert.h" - -#include <string.h> - -typedef struct -{ - uint32_t s[16]; -} norx32_ctx; - -/* Domain separation constants */ -#define DOMAIN_HEADER 0x01 -#define DOMAIN_PAYLOAD 0x02 -#define DOMAIN_TRAILER 0x04 -#define DOMAIN_TAG 0x08 - -#define WORD_BYTES 4 -#define WORD_BITS 32 -#define ROUNDS 4 -#define DEGREE 1 -#define TAG_BITS 128 -#define RATE_BYTES 48 -#define RATE_WORDS 12 - -static void permute(norx32_ctx *ctx) -{ -#ifdef CORTEX_M0 - /* Register usage: A-D r2, r3, r4, r5. - * Temps: r6 */ - -#define in(xx) "%[" #xx "]" - - /* Load numbered slots of S into r2-r5 */ -#define LOAD(u, v, w, x) \ - " ldr r2, [%[S], " in(u) "]\n" \ - " ldr r3, [%[S], " in(v) "]\n" \ - " ldr r4, [%[S], " in(w) "]\n" \ - " ldr r5, [%[S], " in(x) "]\n" - - /* Store r2-r5 into numbered slots of S */ -#define STORE(u, v, w, x) \ - " str r2, [%[S], " in(u) "]\n" \ - " str r3, [%[S], " in(v) "]\n" \ - " str r4, [%[S], " in(w) "]\n" \ - " str r5, [%[S], " in(x) "]\n" - - /* This is H() plus the xor and rotate in one step of G. - * rx is the register containing x (read/write) - * ry is the register containing y (read) - * rw is the register containing d (read/write) - * rot is the rotation constant r_n */ -#define P(rx, ry, rw, rot) \ - " mov r6, " #rx "\n" \ - " and " #rx ", " #ry "\n" \ - " lsl " #rx ", #1\n" \ - " eor " #rx ", r6\n" \ - " eor " #rx ", " #ry "\n" \ - " mov r6, #" #rot "\n" \ - " eor " #rw ", " #rx "\n" \ - " ror " #rw ", r6\n" - - /* The function G. s is the state array, a-d are indices - * into it. */ -#define G(s, a, b, c, d) \ - __asm__ ( \ - LOAD(A, B, C, D) \ - P(r2, r3, r5, 8) \ - P(r4, r5, r3, 11) \ - P(r2, r3, r5, 16) \ - P(r4, r5, r3, 31) \ - STORE(A, B, C, D) \ - : \ - : [S] "r" (s), \ - [A] "i" (a << 2), \ - [B] "i" (b << 2), \ - [C] "i" (c << 2), \ - [D] "i" (d << 2) \ - : "memory", "cc", "r2", "r3", "r4", "r5", "r6"); -#else - - /* This is one quarter of G; the function H plus xor/rotate. */ -#define P(u, v, w, rr) \ - (u) = ((u) ^ (v)) ^ (((u) & (v)) << 1); \ - (w) = rotr32((u) ^ (w), rr); - -#define G(s, a, b, c, d) \ - P(s[a], s[b], s[d], 8) \ - P(s[c], s[d], s[b], 11) \ - P(s[a], s[b], s[d], 16) \ - P(s[c], s[d], s[b], 31) -#endif - - for (int i = 0; i < ROUNDS; i++) - { - /* columns */ - G(ctx->s, 0, 4, 8, 12); - G(ctx->s, 1, 5, 9, 13); - G(ctx->s, 2, 6, 10, 14); - G(ctx->s, 3, 7, 11, 15); - - /* diagonals */ - G(ctx->s, 0, 5, 10, 15); - G(ctx->s, 1, 6, 11, 12); - G(ctx->s, 2, 7, 8, 13); - G(ctx->s, 3, 4, 9, 14); - } - -#undef G -#undef P -} - -static void init(norx32_ctx *ctx, - const uint8_t key[16], - const uint8_t nonce[8]) -{ - /* 1. Basic setup */ - ctx->s[0] = read32_le(nonce + 0); - ctx->s[1] = read32_le(nonce + 4); - ctx->s[2] = 0xb707322f; - ctx->s[3] = 0xa0c7c90d; - - ctx->s[4] = read32_le(key + 0); - ctx->s[5] = read32_le(key + 4); - ctx->s[6] = read32_le(key + 8); - ctx->s[7] = read32_le(key + 12); - - ctx->s[8] = 0xa3d8d930; - ctx->s[9] = 0x3fa8b72c; - ctx->s[10] = 0xed84eb49; - ctx->s[11] = 0xedca4787; - - ctx->s[12] = 0x335463eb; - ctx->s[13] = 0xf994220b; - ctx->s[14] = 0xbe0bf5c9; - ctx->s[15] = 0xd7c49104; - - /* 2. Parameter integration - * w = 32 - * l = 4 - * p = 1 - * t = 128 - */ - ctx->s[12] ^= WORD_BITS; - ctx->s[13] ^= ROUNDS; - ctx->s[14] ^= DEGREE; - ctx->s[15] ^= TAG_BITS; - - permute(ctx); -} - -/* Input domain separation constant for next step, and final permutation of - * preceeding step. */ -static void switch_domain(norx32_ctx *ctx, uint32_t constant) -{ - ctx->s[15] ^= constant; - permute(ctx); -} - -typedef struct -{ - norx32_ctx *ctx; - uint32_t type; -} blockctx; - -static void input_block_final(void *vctx, const uint8_t *data) -{ - blockctx *bctx = vctx; - norx32_ctx *ctx = bctx->ctx; - - /* just xor-in data. */ - for (int i = 0; i < RATE_WORDS; i++) - { - ctx->s[i] ^= read32_le(data); - data += WORD_BYTES; - } -} - -static void input_block(void *vctx, const uint8_t *data) -{ - /* Process block, then prepare for the next one. */ - blockctx *bctx = vctx; - input_block_final(vctx, data); - switch_domain(bctx->ctx, bctx->type); -} - -static void input(norx32_ctx *ctx, uint32_t type, - const uint8_t *buf, size_t nbuf) -{ - uint8_t partial[RATE_BYTES]; - size_t npartial = 0; - blockctx bctx = { ctx, type }; - - /* Process input. */ - cf_blockwise_accumulate(partial, &npartial, sizeof partial, - buf, nbuf, - input_block, - &bctx); - - /* Now pad partial. This contains the trailing portion of buf. */ - memset(partial + npartial, 0, sizeof(partial) - npartial); - partial[npartial] = 0x01; - partial[sizeof(partial) - 1] ^= 0x80; - - input_block_final(&bctx, partial); -} - -static void do_header(norx32_ctx *ctx, const uint8_t *buf, size_t nbuf) -{ - if (nbuf) - { - switch_domain(ctx, DOMAIN_HEADER); - input(ctx, DOMAIN_HEADER, buf, nbuf); - } -} - -static void do_trailer(norx32_ctx *ctx, const uint8_t *buf, size_t nbuf) -{ - if (nbuf) - { - switch_domain(ctx, DOMAIN_TRAILER); - input(ctx, DOMAIN_TRAILER, buf, nbuf); - } -} - -static void body_block_encrypt(norx32_ctx *ctx, - const uint8_t plain[RATE_BYTES], - uint8_t cipher[RATE_BYTES]) -{ - for (int i = 0; i < RATE_WORDS; i++) - { - ctx->s[i] ^= read32_le(plain); - write32_le(ctx->s[i], cipher); - plain += WORD_BYTES; - cipher += WORD_BYTES; - } -} - -static void encrypt_body(norx32_ctx *ctx, - const uint8_t *plain, uint8_t *cipher, size_t nbytes) -{ - if (nbytes == 0) - return; - - /* Process full blocks: easy */ - while (nbytes >= RATE_BYTES) - { - switch_domain(ctx, DOMAIN_PAYLOAD); - body_block_encrypt(ctx, plain, cipher); - plain += RATE_BYTES; - cipher += RATE_BYTES; - nbytes -= RATE_BYTES; - } - - /* Final padded block. */ - uint8_t partial[RATE_BYTES]; - memset(partial, 0, sizeof partial); - memcpy(partial, plain, nbytes); - partial[nbytes] ^= 0x01; - partial[sizeof(partial) - 1] ^= 0x80; - - switch_domain(ctx, DOMAIN_PAYLOAD); - body_block_encrypt(ctx, partial, partial); - - memcpy(cipher, partial, nbytes); -} - -static void body_block_decrypt(norx32_ctx *ctx, - const uint8_t cipher[RATE_BYTES], - uint8_t plain[RATE_BYTES], - size_t start, size_t end) -{ - for (size_t i = start; i < end; i++) - { - uint32_t ct = read32_le(cipher); - write32_le(ctx->s[i] ^ ct, plain); - ctx->s[i] = ct; - plain += WORD_BYTES; - cipher += WORD_BYTES; - } -} - -static void undo_padding(norx32_ctx *ctx, size_t bytes) -{ - assert(bytes < RATE_BYTES); - ctx->s[bytes / WORD_BYTES] ^= 0x01 << ((bytes % WORD_BYTES) * 8); - ctx->s[RATE_WORDS - 1] ^= 0x80000000; -} - -static void decrypt_body(norx32_ctx *ctx, - const uint8_t *cipher, uint8_t *plain, size_t nbytes) -{ - if (nbytes == 0) - return; - - /* Process full blocks. */ - while (nbytes >= RATE_BYTES) - { - switch_domain(ctx, DOMAIN_PAYLOAD); - body_block_decrypt(ctx, cipher, plain, 0, RATE_WORDS); - plain += RATE_BYTES; - cipher += RATE_BYTES; - nbytes -= RATE_BYTES; - } - - /* Then partial blocks. */ - size_t offset = 0; - switch_domain(ctx, DOMAIN_PAYLOAD); - - undo_padding(ctx, nbytes); - - /* In units of whole words. */ - while (nbytes >= WORD_BYTES) - { - body_block_decrypt(ctx, cipher, plain, offset, offset + 1); - plain += WORD_BYTES; - cipher += WORD_BYTES; - nbytes -= WORD_BYTES; - offset += 1; - } - - /* And then, finally, bytewise. */ - uint8_t tmp[WORD_BYTES]; - write32_le(ctx->s[offset], tmp); - - for (size_t i = 0; i < nbytes; i++) - { - uint8_t c = cipher[i]; - plain[i] = tmp[i] ^ c; - tmp[i] = c; - } - - ctx->s[offset] = read32_le(tmp); -} - -static void get_tag(norx32_ctx *ctx, uint8_t tag[16]) -{ - switch_domain(ctx, DOMAIN_TAG); - permute(ctx); - write32_le(ctx->s[0], tag + 0); - write32_le(ctx->s[1], tag + 4); - write32_le(ctx->s[2], tag + 8); - write32_le(ctx->s[3], tag + 12); -} - -void cf_norx32_encrypt(const uint8_t key[16], - const uint8_t nonce[8], - const uint8_t *header, size_t nheader, - const uint8_t *plaintext, size_t nbytes, - const uint8_t *trailer, size_t ntrailer, - uint8_t *ciphertext, - uint8_t tag[16]) -{ - norx32_ctx ctx; - - init(&ctx, key, nonce); - do_header(&ctx, header, nheader); - encrypt_body(&ctx, plaintext, ciphertext, nbytes); - do_trailer(&ctx, trailer, ntrailer); - get_tag(&ctx, tag); - - mem_clean(&ctx, sizeof ctx); -} - -int cf_norx32_decrypt(const uint8_t key[16], - const uint8_t nonce[8], - const uint8_t *header, size_t nheader, - const uint8_t *ciphertext, size_t nbytes, - const uint8_t *trailer, size_t ntrailer, - const uint8_t tag[16], - uint8_t *plaintext) -{ - norx32_ctx ctx; - uint8_t ourtag[16]; - - init(&ctx, key, nonce); - do_header(&ctx, header, nheader); - decrypt_body(&ctx, ciphertext, plaintext, nbytes); - do_trailer(&ctx, trailer, ntrailer); - get_tag(&ctx, ourtag); - - int err = 0; - - if (!mem_eq(ourtag, tag, sizeof ourtag)) - { - err = 1; - mem_clean(plaintext, nbytes); - mem_clean(ourtag, sizeof ourtag); - } - - mem_clean(&ctx, sizeof ctx); - return err; -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/norx.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/norx.h deleted file mode 100644 index aee7bfe..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/norx.h +++ /dev/null @@ -1,84 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef NORX_H -#define NORX_H - -#include <stdint.h> -#include <stddef.h> - -/** - * The NORX AEAD cipher - * ==================== - * This is an implementation of NORX32-4-1 with a one-shot - * interface. NORX is a CAESAR candidate with a core similar - * to ChaCha20 and a sponge structure like Keccak. - * - * This is NORX v2.0. It is not compatible with earlier - * versions. - * - * NORX32 uses a 128-bit key. Each encryption requires a - * 64-bit nonce. An encryption processes one sequence of - * additional data ('header'), followed by encryption of - * the plaintext, followed by processing a second sequence - * of additional data ('trailer'). It outputs a 128-bit - * tag. - */ - -/* .. c:function:: $DECL - * NORX32-4-1 one-shot encryption interface. - * - * :param key: key material. - * :param nonce: per-message nonce. - * :param header: header buffer. - * :param nheader: number of header bytes. - * :param plaintext: plaintext bytes to be encrypted. - * :param nbytes: number of plaintext/ciphertext bytes. - * :param trailer: trailer buffer. - * :param ntrailer: number of trailer bytes. - * :param ciphertext: ciphertext output buffer, nbytes in length. - * :param tag: authentication tag output buffer. - */ -void cf_norx32_encrypt(const uint8_t key[16], - const uint8_t nonce[8], - const uint8_t *header, size_t nheader, - const uint8_t *plaintext, size_t nbytes, - const uint8_t *trailer, size_t ntrailer, - uint8_t *ciphertext, - uint8_t tag[16]); -/* .. c:function:: $DECL - * NORX32-4-1 one-shot decryption interface. - * - * :return: 0 on success, non-zero on error. Plaintext is zeroed on error. - * - * :param key: key material. - * :param nonce: per-message nonce. - * :param header: header buffer. - * :param nheader: number of header bytes. - * :param ciphertext: ciphertext bytes to be decrypted. - * :param nbytes: number of plaintext/ciphertext bytes. - * :param trailer: trailer buffer. - * :param ntrailer: number of trailer bytes. - * :param plaintext: plaintext output buffer, nbytes in length. - * :param tag: authentication tag output buffer. - */ -int cf_norx32_decrypt(const uint8_t key[16], - const uint8_t nonce[8], - const uint8_t *header, size_t nheader, - const uint8_t *ciphertext, size_t nbytes, - const uint8_t *trailer, size_t ntrailer, - const uint8_t tag[16], - uint8_t *plaintext); - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/ocb.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/ocb.c deleted file mode 100644 index 3d244d4..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/ocb.c +++ /dev/null @@ -1,404 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2016 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "handy.h" -#include "prp.h" -#include "modes.h" -#include "blockwise.h" -#include "bitops.h" -#include "gf128.h" -#include "tassert.h" - -#include <string.h> - -/* How many L_n values to compute at schedule time. */ -#define MAX_L 4 - -/* We and RFC7253 assume 128-bit blocks. */ -#define BLOCK 16 - -typedef struct -{ - const cf_prp *prp; - void *prpctx; /* Our PRP */ - uint8_t *out; /* Output pointer for block processing */ - cf_gf128 L_star; /* Zero block ciphertext */ - cf_gf128 L_dollar; /* L_$ is double of L_* */ - cf_gf128 L[MAX_L]; /* L[0] is double of L_$, L[1] is double of L[0], etc. */ - cf_gf128 offset; /* Offset_i */ - cf_gf128 checksum; /* Checksum_i */ - uint32_t i; /* Block index, 1-based */ -} ocb; - -typedef struct -{ - ocb *o; /* OCB context (contains PRP, etc.) */ - cf_gf128 sum; /* Current Sum_i */ - cf_gf128 offset; /* Current Offset_i */ - uint32_t i; /* Block index, 1-based */ -} ocb_hash; - -static void ocb_init(ocb *o, const cf_prp *prp, void *prpctx, - const uint8_t *nonce, size_t nnonce, - size_t ntag) -{ - o->prp = prp; - o->prpctx = prpctx; - - assert(o->prp->blocksz == BLOCK); - - /* L_* = ENCIPHER(K, zeros(128)) */ - uint8_t L_star_bytes[BLOCK] = { 0 }; - prp->encrypt(prpctx, L_star_bytes, L_star_bytes); - cf_gf128_frombytes_be(L_star_bytes, o->L_star); - - /* L_$ = double(L_*) */ - cf_gf128_double(o->L_star, o->L_dollar); - - /* L_0 = double(L_$) etc. */ - cf_gf128_double(o->L_dollar, o->L[0]); - - for (int i = 1; i < MAX_L; i++) - cf_gf128_double(o->L[i - 1], o->L[i]); - - /* Compute nonce-dependent and per-encryption vars */ - assert(nnonce > 0 && nnonce < BLOCK); - uint8_t full_nonce[BLOCK] = { 0 }; - full_nonce[0] = ((ntag * 8) & 0x7f) << 1; - full_nonce[BLOCK - 1 - nnonce] |= 0x01; - memcpy(full_nonce + BLOCK - nnonce, nonce, nnonce); - uint8_t bottom = full_nonce[BLOCK - 1] & 0x3f; - - /* Make Ktop */ - full_nonce[BLOCK - 1] &= 0xc0; - uint8_t Ktop[BLOCK + 8]; - prp->encrypt(prpctx, full_nonce, Ktop); - - /* Stretch Ktop */ - for (int i = 0; i < 8; i++) - Ktop[i + BLOCK] = Ktop[i] ^ Ktop[i + 1]; - - /* Outputs */ - uint8_t offset[BLOCK]; - copy_bytes_unaligned(offset, Ktop, BLOCK, bottom); - cf_gf128_frombytes_be(offset, o->offset); - memset(o->checksum, 0, sizeof o->checksum); -} - -static void ocb_start_cipher(ocb *o, uint8_t *output) -{ - o->i = 1; - o->out = output; -} - -static void ocb_add_Ln(ocb *o, uint32_t n, cf_gf128 out) -{ - /* Do we have a precomputed L term? */ - if (n < MAX_L) - { - cf_gf128_add(o->L[n], out, out); - return; - } - - /* Compute more terms of L. */ - cf_gf128 accum; - memcpy(accum, o->L[MAX_L - 1], sizeof accum); - - for (uint32_t i = MAX_L - 1; i < n; i++) - { - cf_gf128 next; - cf_gf128_double(accum, next); - memcpy(accum, next, sizeof accum); - } - - cf_gf128_add(accum, out, out); -} - -static void ocb_hash_init(ocb_hash *h) -{ - memset(h->offset, 0, sizeof h->offset); - memset(h->sum, 0, sizeof h->sum); - h->i = 1; -} - -static void ocb_hash_sum(ocb *o, const uint8_t *block, - cf_gf128 sum, const cf_gf128 offset) -{ - uint8_t offset_bytes[BLOCK]; - cf_gf128_tobytes_be(offset, offset_bytes); - - uint8_t block_tmp[BLOCK]; - xor_bb(block_tmp, block, offset_bytes, sizeof block_tmp); - o->prp->encrypt(o->prpctx, block_tmp, block_tmp); - - cf_gf128 tmp; - cf_gf128_frombytes_be(block_tmp, tmp); - cf_gf128_add(sum, tmp, sum); -} - -static void ocb_hash_block(void *vctx, const uint8_t *block) -{ - ocb_hash *h = vctx; - - /* Offset_i = Offset_{i - 1} xor L{ntz(i)} */ - ocb_add_Ln(h->o, count_trailing_zeroes(h->i), h->offset); - - /* Sum_i = Sum_{i - 1} xor ENCIPHER(K, A_i xor Offset_i) */ - ocb_hash_sum(h->o, block, h->sum, h->offset); - - h->i++; -} - -static void ocb_process_header(ocb *o, const uint8_t *header, size_t nheader, - uint8_t out[BLOCK]) -{ - ocb_hash ctx = { o }; - ocb_hash_init(&ctx); - - uint8_t partial[BLOCK]; - size_t npartial = 0; - - cf_blockwise_accumulate(partial, &npartial, - o->prp->blocksz, - header, nheader, - ocb_hash_block, - &ctx); - - if (npartial) - { - /* Offset_* = Offset_m xor L_* */ - cf_gf128_add(ctx.offset, o->L_star, ctx.offset); - - /* CipherInput = (A_* || 1 || zeros(127 - bitlen(A_*))) xor Offset_* */ - memset(partial + npartial, 0, sizeof(partial) - npartial); - partial[npartial] = 0x80; - - /* Sum = Sum_m xor ENCIPHER(K, CipherInput) */ - ocb_hash_sum(ctx.o, partial, ctx.sum, ctx.offset); - } - - cf_gf128_tobytes_be(ctx.sum, out); - mem_clean(&ctx, sizeof ctx); -} - -static void ocb_encrypt_block(void *vctx, const uint8_t *block) -{ - ocb *o = vctx; - - /* Offset_i = Offset_{i - 1} xor L{ntz(i)} */ - ocb_add_Ln(o, count_trailing_zeroes(o->i), o->offset); - - /* C_i = Offset_i xor ENCIPHER(K, P_i xor Offset_i) */ - uint8_t offset_bytes[BLOCK]; - cf_gf128_tobytes_be(o->offset, offset_bytes); - - uint8_t block_tmp[BLOCK]; - xor_bb(block_tmp, block, offset_bytes, sizeof block_tmp); - o->prp->encrypt(o->prpctx, block_tmp, block_tmp); - xor_bb(o->out, block_tmp, offset_bytes, sizeof block_tmp); - o->out += sizeof block_tmp; - - /* Checksum_i = Checksum_{i - 1} xor P_i */ - cf_gf128 P; - cf_gf128_frombytes_be(block, P); - cf_gf128_add(o->checksum, P, o->checksum); - - o->i++; -} - -void cf_ocb_encrypt(const cf_prp *prp, void *prpctx, - const uint8_t *plain, size_t nplain, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce, - uint8_t *cipher, /* the same size as nplain */ - uint8_t *tag, size_t ntag) -{ - ocb o; - ocb_init(&o, prp, prpctx, nonce, nnonce, ntag); - - /* Process blocks. The blockwise machinery takes care of - * splitting the input into 128-bit blocks, and calling - * a function on each one. */ - uint8_t partial[BLOCK]; - size_t npartial = 0; - - ocb_start_cipher(&o, cipher); - cf_blockwise_accumulate(partial, &npartial, - prp->blocksz, - plain, nplain, - ocb_encrypt_block, - &o); - - /* Move along plain and cipher. */ - plain += (o.out - cipher); - cipher = o.out; - - /* If we have remaining data to pad and process, - * it's in partial. */ - if (npartial) - { - /* Offset_* = Offset_m xor L_* */ - cf_gf128_add(o.offset, o.L_star, o.offset); - - /* Pad = ENCIPHER(K, Offset_*) */ - uint8_t pad[BLOCK]; - cf_gf128_tobytes_be(o.offset, pad); - o.prp->encrypt(o.prpctx, pad, pad); - - /* C_* = P_* xor Pad[1..bitlen(P_*)] */ - xor_bb(cipher, partial, pad, npartial); - mem_clean(pad, sizeof pad); - - /* Checksum_* = Checksum_m xor (P_* || 1 || zeros(127 - bitlen(P_*))) */ - memset(partial + npartial, 0, sizeof(partial) - npartial); - partial[npartial] = 0x80; - - cf_gf128 last_block; - cf_gf128_frombytes_be(partial, last_block); - cf_gf128_add(o.checksum, last_block, o.checksum); - mem_clean(last_block, sizeof last_block); - } - - /* Compute: Tag = ENCIPHER(K, Checksum_m xor Offset_m xor L_$) xor HASH(K, A) */ - cf_gf128 full_tag; - for (size_t i = 0; i < 4; i++) - full_tag[i] = o.checksum[i] ^ o.offset[i] ^ o.L_dollar[i]; - - /* Convert tag to bytes for encryption */ - uint8_t tag_bytes[BLOCK]; - cf_gf128_tobytes_be(full_tag, tag_bytes); - - /* ENCIPHER(...) */ - o.prp->encrypt(o.prpctx, tag_bytes, tag_bytes); - - /* Compute HASH(K, A). */ - uint8_t hash_a[BLOCK]; - ocb_process_header(&o, header, nheader, hash_a); - - /* ... xor HASH(K, A) */ - xor_bb(tag_bytes, tag_bytes, hash_a, sizeof tag_bytes); - - /* Copy out tag to caller. */ - memcpy(tag, tag_bytes, ntag); - - mem_clean(&o, sizeof o); -} - -static void ocb_decrypt_block(void *vctx, const uint8_t *block) -{ - ocb *o = vctx; - - /* Offset_i = Offset_{i - 1} xor L{ntz(i)} */ - ocb_add_Ln(o, count_trailing_zeroes(o->i), o->offset); - - /* P_i = Offset_i xor DECIPHER(K, C_i xor Offset_i) */ - uint8_t offset_bytes[BLOCK]; - cf_gf128_tobytes_be(o->offset, offset_bytes); - - uint8_t block_tmp[BLOCK]; - xor_bb(block_tmp, block, offset_bytes, sizeof block_tmp); - o->prp->decrypt(o->prpctx, block_tmp, block_tmp); - xor_bb(o->out, block_tmp, offset_bytes, sizeof block_tmp); - - /* Checksum_i = Checksum_{i - 1} xor P_i */ - cf_gf128 P; - cf_gf128_frombytes_be(o->out, P); - o->out += sizeof block_tmp; - cf_gf128_add(o->checksum, P, o->checksum); - - o->i++; -} - -int cf_ocb_decrypt(const cf_prp *prp, void *prpctx, - const uint8_t *cipher, size_t ncipher, - const uint8_t *header, size_t nheader, - const uint8_t *nonce, size_t nnonce, - const uint8_t *tag, size_t ntag, - uint8_t *plain) -{ - ocb o; - ocb_init(&o, prp, prpctx, nonce, nnonce, ntag); - - /* Do blockwise decryption */ - uint8_t partial[BLOCK]; - size_t npartial = 0; - - ocb_start_cipher(&o, plain); - cf_blockwise_accumulate(partial, &npartial, - prp->blocksz, - cipher, ncipher, - ocb_decrypt_block, - &o); - - if (npartial) - { - /* Offset_* = Offset_m xor L_* */ - cf_gf128_add(o.offset, o.L_star, o.offset); - - /* Pad = ENCIPHER(K, Offset_*) */ - uint8_t pad[BLOCK]; - cf_gf128_tobytes_be(o.offset, pad); - o.prp->encrypt(o.prpctx, pad, pad); - - /* P_* = C_* xor Pad[1..bitlen(C_*)] */ - xor_bb(partial, partial, pad, npartial); - mem_clean(pad, sizeof pad); - - memcpy(o.out, partial, npartial); - - /* Checksum_* = Checksum_m xor (P_* || 1 || zeros(127 - bitlen(P_*))) */ - memset(partial + npartial, 0, sizeof(partial) - npartial); - partial[npartial] = 0x80; - - cf_gf128 last_block; - cf_gf128_frombytes_be(partial, last_block); - cf_gf128_add(o.checksum, last_block, o.checksum); - mem_clean(last_block, sizeof last_block); - } - - /* Compute: Tag = ENCIPHER(K, Checksum_m xor Offset_m xor L_$) xor HASH(K, A) */ - cf_gf128 full_tag; - for (size_t i = 0; i < 4; i++) - full_tag[i] = o.checksum[i] ^ o.offset[i] ^ o.L_dollar[i]; - - /* Convert tag to bytes for encryption */ - uint8_t tag_bytes[BLOCK]; - cf_gf128_tobytes_be(full_tag, tag_bytes); - - /* ENCIPHER(...) */ - o.prp->encrypt(o.prpctx, tag_bytes, tag_bytes); - - /* Compute HASH(K, A). */ - uint8_t hash_a[BLOCK]; - ocb_process_header(&o, header, nheader, hash_a); - - /* ... xor HASH(K, A) */ - xor_bb(tag_bytes, tag_bytes, hash_a, sizeof tag_bytes); - - /* Check against caller's tag. */ - int err; - - if (mem_eq(tag, tag_bytes, ntag)) - { - err = 0; - } else { - err = 1; - mem_clean(plain, ncipher); - } - - mem_clean(&o, sizeof o); - mem_clean(tag_bytes, sizeof tag_bytes); - mem_clean(full_tag, sizeof full_tag); - return err; -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/pbkdf2.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/pbkdf2.c deleted file mode 100644 index fce6a22..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/pbkdf2.c +++ /dev/null @@ -1,84 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "pbkdf2.h" -#include "hmac.h" -#include "bitops.h" -#include "handy.h" -#include "tassert.h" - -#include <string.h> - -static void F(const cf_hmac_ctx *startctx, - uint32_t counter, - const uint8_t *salt, size_t nsalt, - uint32_t iterations, - uint8_t *out) -{ - uint8_t U[CF_MAXHASH]; - size_t hashsz = startctx->hash->hashsz; - - uint8_t countbuf[4]; - write32_be(counter, countbuf); - - /* First iteration: - * U_1 = PRF(P, S || INT_32_BE(i)) - */ - cf_hmac_ctx ctx = *startctx; - cf_hmac_update(&ctx, salt, nsalt); - cf_hmac_update(&ctx, countbuf, sizeof countbuf); - cf_hmac_finish(&ctx, U); - memcpy(out, U, hashsz); - - /* Subsequent iterations: - * U_c = PRF(P, U_{c-1}) - */ - for (uint32_t i = 1; i < iterations; i++) - { - ctx = *startctx; - cf_hmac_update(&ctx, U, hashsz); - cf_hmac_finish(&ctx, U); - xor_bb(out, out, U, hashsz); - } -} - -void cf_pbkdf2_hmac(const uint8_t *pw, size_t npw, - const uint8_t *salt, size_t nsalt, - uint32_t iterations, - uint8_t *out, size_t nout, - const cf_chash *hash) -{ - uint32_t counter = 1; - uint8_t block[CF_MAXHASH]; - - assert(iterations); - assert(out && nout); - assert(hash); - - /* Starting point for inner loop. */ - cf_hmac_ctx ctx; - cf_hmac_init(&ctx, hash, pw, npw); - - while (nout) - { - F(&ctx, counter, salt, nsalt, iterations, block); - - size_t taken = MIN(nout, hash->hashsz); - memcpy(out, block, taken); - out += taken; - nout -= taken; - counter++; - } -} - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/pbkdf2.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/pbkdf2.h deleted file mode 100644 index 2f30484..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/pbkdf2.h +++ /dev/null @@ -1,47 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef PBKDF2_H -#define PBKDF2_H - -#include <stddef.h> -#include <stdint.h> - -#include "chash.h" - -/** - * PBKDF2-HMAC - * =========== - * This is PBKDF2 as described by PKCS#5/RFC2898 with HMAC as the PRF. - */ - -/* .. c:function:: $DECL - * This computes PBKDF2-HMAC with the given hash functon. - * - * :param pw: password input buffer. - * :param npw: password length. - * :param salt: salt input buffer. - * :param nsalt: salt length. - * :param iterations: non-zero iteration count. Tune this for performance/security tradeoff. - * :param out: key material output buffer. `nout` bytes are written here. - * :param nout: key material length. - * :param hash: hash function description. - */ -void cf_pbkdf2_hmac(const uint8_t *pw, size_t npw, - const uint8_t *salt, size_t nsalt, - uint32_t iterations, - uint8_t *out, size_t nout, - const cf_chash *hash); - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/poly1305.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/poly1305.c deleted file mode 100644 index 6c3f13d..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/poly1305.c +++ /dev/null @@ -1,221 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "poly1305.h" -#include "bitops.h" -#include "handy.h" -#include "blockwise.h" - -#include <string.h> -#include <stdio.h> - -void cf_poly1305_init(cf_poly1305 *ctx, - const uint8_t r[16], - const uint8_t s[16]) -{ - memset(ctx, 0, sizeof *ctx); - - ctx->r[0] = r[0]; - ctx->r[1] = r[1]; - ctx->r[2] = r[2]; - ctx->r[3] = r[3] & 0x0f; - ctx->r[4] = r[4] & 0xfc; - ctx->r[5] = r[5]; - ctx->r[6] = r[6]; - ctx->r[7] = r[7] & 0x0f; - ctx->r[8] = r[8] & 0xfc; - ctx->r[9] = r[9]; - ctx->r[10] = r[10]; - ctx->r[11] = r[11] & 0x0f; - ctx->r[12] = r[12] & 0xfc; - ctx->r[13] = r[13]; - ctx->r[14] = r[14]; - ctx->r[15] = r[15] & 0x0f; - ctx->r[16] = 0; - - memcpy(ctx->s, s, 16); -} - -static void poly1305_add(uint32_t h[17], - const uint32_t x[17]) -{ - uint32_t carry = 0; - int i; - - for (i = 0; i < 17; i++) - { - carry += h[i] + x[i]; - h[i] = carry & 0xff; - carry >>= 8; - } -} - -/* Minimal reduction/carry chain. */ -static void poly1305_min_reduce(uint32_t x[17]) -{ - uint32_t carry = 0; - int i; - for (i = 0; i < 16; i++) - { - carry += x[i]; - x[i] = carry & 0xff; - carry >>= 8; - } - - /* 2 ** 130 - 5 = 0x3fffffffffffffffffffffffffffffffb - * ^ - * So 2 bits of carry are put into top word. - * Remaining bits get multiplied by 5 and carried back - * into bottom */ - carry += x[16]; - x[16] = carry & 0x03; - carry = 5 * (carry >> 2); - - for (i = 0; i < 16; i++) - { - carry += x[i]; - x[i] = carry & 0xff; - carry >>= 8; - } - - x[16] += carry; -} - -/* This is - 2 ** 130 - 5 in twos complement. */ -static const uint32_t negative_1305[17] = { - 0x05, 0, 0, 0, 0, 0, 0, 0, 0, 0, - 0, 0, 0, 0, 0, 0, 0xfc -}; - -static void poly1305_full_reduce(uint32_t x[17]) -{ - uint32_t xsub[17]; - size_t i; - - for (i = 0; i < 17; i++) - xsub[i] = x[i]; - - poly1305_add(xsub, negative_1305); - - /* If x - (2 ** 130 - 5) is negative, then - * x didn't need reduction: we discard the results. - * Do this in a side-channel silent way. */ - uint32_t negative_mask = mask_u32(xsub[16] & 0x80, 0x80); - uint32_t positive_mask = negative_mask ^ 0xffffffff; - - for (i = 0; i < 17; i++) - x[i] = (x[i] & negative_mask) | (xsub[i] & positive_mask); -} - -static void poly1305_mul(uint32_t x[17], - const uint32_t y[17]) -{ - uint32_t r[17]; - int i; - - for (i = 0; i < 17; i++) - { - uint32_t accum = 0; - int j; - - for (j = 0; j <= i; j++) - accum += x[j] * y[i - j]; - - /* Add in carries. These get shifted 130 bits - * to the right, with a combination of byte indexing - * and shifting (136 bits right, then 6 bits left). - * - * nb. 5 << 6 is made up of two parts: - * 5: reduction of 2 ** 130 leaves a multiple 5 - * shift 6 places left - * 17 * 8: byte indexing shift (136 bits) - * 130: desired shift - */ - for (j = i + 1; j < 17; j++) - accum += (5 << 6) * x[j] * y[i + 17 - j]; - - r[i] = accum; - } - - poly1305_min_reduce(r); - - for (i = 0; i < 17; i++) - x[i] = r[i]; -} - -static void poly1305_block(cf_poly1305 *ctx, - const uint32_t c[17]) -{ - poly1305_add(ctx->h, c); - poly1305_mul(ctx->h, ctx->r); -} - -static void poly1305_whole_block(void *vctx, - const uint8_t *buf) -{ - cf_poly1305 *ctx = vctx; - uint32_t c[17]; - int i; - - for (i = 0; i < 16; i++) - c[i] = buf[i]; - - c[16] = 1; - poly1305_block(ctx, c); -} - -static void poly1305_last_block(cf_poly1305 *ctx) -{ - uint32_t c[17] = { 0 }; - size_t i; - - for (i = 0; i < ctx->npartial; i++) - c[i] = ctx->partial[i]; - - c[ctx->npartial] = 1; - poly1305_block(ctx, c); -} - -void cf_poly1305_update(cf_poly1305 *ctx, - const uint8_t *buf, - size_t nbytes) -{ - cf_blockwise_accumulate(ctx->partial, &ctx->npartial, - sizeof ctx->partial, - buf, nbytes, - poly1305_whole_block, - ctx); -} - -void cf_poly1305_finish(cf_poly1305 *ctx, - uint8_t out[16]) -{ - if (ctx->npartial) - poly1305_last_block(ctx); - - uint32_t s[17]; - size_t i; - for (i = 0; i < 16; i++) - s[i] = ctx->s[i]; - s[16] = 0; - - poly1305_full_reduce(ctx->h); - poly1305_add(ctx->h, s); - - for (i = 0; i < 16; i++) - out[i] = ctx->h[i]; - - mem_clean(ctx, sizeof *ctx); -} - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/poly1305.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/poly1305.h deleted file mode 100644 index b318e28..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/poly1305.h +++ /dev/null @@ -1,91 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef POLY1305_H -#define POLY1305_H - -#include <stddef.h> -#include <stdint.h> - -/** - * Poly1305 - * ======== - * This is an incremental interface to computing the poly1305 - * single shot MAC. - * - * Note: construct Poly1305-AES with this by taking a 16 byte - * nonce and encrypting it, and then using the result as an - * input to this function. - */ - -/* .. c:type:: cf_poly1305 - * Poly1305 incremental interface context. - * - * .. c:member:: cf_poly1305.h - * Current accumulator. - * - * .. c:member:: cf_poly1305.r - * Block multiplier. - * - * .. c:member:: cf_poly1305.s - * Final XOR offset. - * - * .. c:member:: cf_poly1305.partial - * Unprocessed input. - * - * .. c:member:: cf_poly1305.npartial - * Number of bytes of unprocessed input. - * - */ -typedef struct -{ - uint32_t h[17]; - uint32_t r[17]; - uint8_t s[16]; - uint8_t partial[16]; - size_t npartial; -} cf_poly1305; - -/* .. c:function:: $DECL - * Sets up `ctx` ready to compute a new MAC. - * - * In Poly1305-AES, `r` is the second half of the 32-byte key. - * `s` is a nonce encrypted under the first half of the key. - * - * :param ctx: context (written) - * :param r: MAC key. - * :param s: preprocessed nonce. - * - */ -void cf_poly1305_init(cf_poly1305 *ctx, - const uint8_t r[16], - const uint8_t s[16]); - -/* .. c:function:: $DECL - * Processes `nbytes` at `data`. Copies the data if there isn't enough to make - * a full block. - */ -void cf_poly1305_update(cf_poly1305 *ctx, - const uint8_t *data, - size_t nbytes); - -/* .. c:function:: $DECL - * Finishes the operation, writing 16 bytes to `out`. - * - * This destroys `ctx`. - */ -void cf_poly1305_finish(cf_poly1305 *ctx, - uint8_t out[16]); - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/poly1305.py b/debian/vendor-h2o/deps/picotls/deps/cifra/src/poly1305.py deleted file mode 100644 index 41a1b9d..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/poly1305.py +++ /dev/null @@ -1,127 +0,0 @@ -rs = (0xee,0xa6,0xa7,0x25,0x1c,0x1e,0x72,0x91 -,0x6d,0x11,0xc2,0xcb,0x21,0x4d,0x3c,0x25 -,0x25,0x39,0x12,0x1d,0x8e,0x23,0x4e,0x65 -,0x2d,0x65,0x1f,0xa4,0xc8,0xcf,0xf8,0x80) - -msg = (0x8e,0x99,0x3b,0x9f,0x48,0x68,0x12,0x73 - ,0xc2,0x96,0x50,0xba,0x32,0xfc,0x76,0xce - ,0x48,0x33,0x2e,0xa7,0x16,0x4d,0x96,0xa4 - ,0x47,0x6f,0xb8,0xc5,0x31,0xa1,0x18,0x6a - ,0xc0,0xdf,0xc1,0x7c,0x98,0xdc,0xe8,0x7b - ,0x4d,0xa7,0xf0,0x11,0xec,0x48,0xc9,0x72 - ,0x71,0xd2,0xc2,0x0f,0x9b,0x92,0x8f,0xe2 - ,0x27,0x0d,0x6f,0xb8,0x63,0xd5,0x17,0x38 - ,0xb4,0x8e,0xee,0xe3,0x14,0xa7,0xcc,0x8a - ,0xb9,0x32,0x16,0x45,0x48,0xe5,0x26,0xae - ,0x90,0x22,0x43,0x68,0x51,0x7a,0xcf,0xea - ,0xbd,0x6b,0xb3,0x73,0x2b,0xc0,0xe9,0xda - ,0x99,0x83,0x2b,0x61,0xca,0x01,0xb6,0xde - ,0x56,0x24,0x4a,0x9e,0x88,0xd5,0xf9,0xb3 - ,0x79,0x73,0xf6,0x22,0xa4,0x3d,0x14,0xa6 - ,0x59,0x9b,0x1f,0x65,0x4c,0xb4,0x5a,0x74 - ,0xe3,0x55,0xa5) - -tag = (0xf3,0xff,0xc7,0x70,0x3f,0x94,0x00,0xe5 -,0x2a,0x7d,0xfb,0x4b,0x3d,0x33,0x05,0xd9) - -print len(msg) - -WORD = 0xffffffff - -def add(x, y): - u = 0 - r = [0] * 17 - for i in range(17): - u += (x[i] + y[i]) & WORD - r[i] = u & 0xff - u >>= 8 - return r - -def reduce(x): - r = list(x) - u = 0 - - for i in range(16): - u += r[i] - r[i] = u & 0xff - u >>= 8 - u += r[16] - r[16] = u & 3 - u = 5 * (u >> 2) - - for i in range(16): - u += r[i] - r[i] = u & 0xff - u >>= 8 - u += r[16] - r[16] = u - - return r - -def modmul(x, y): - r = [0] * 17 - for i in range(17): - u = 0 - for j in range(i + 1): - u += (x[j] * y[i - j]) & WORD - for j in range(i + 1, 17): - u += (320 * x[j] * y[i + 17 - j]) & WORD - r[i] = u - return reduce(r) - -def dump(why, v): - print '%s = %s' % (why, ' '.join('%08x' % x for x in v)) - -def freeze(x): - # -2^130 - 5 in twos complement - negative_130_5 = (5, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 252) - - r = add(x, negative_130_5) - dump('minusp', r) - negative = bool(x[16] >> 7) - if negative: - return r - else: - return x - -def poly1305(msg, rs): - r, s = list(rs[:16]), list(rs[16:]) - - r[3] &= 15 - r[4] &= 252 - r[7] &= 15 - r[8] &= 252 - r[11] &= 15 - r[12] &= 252 - r[15] &= 15 - r.append(0) - - h = [0] * 17 - dump('r-init', r) - dump('h-init', h) - - block = 0 - - for offs in range(0, len(msg), 16): - print '--- block %d ---' % block - block += 1 - c = list(msg[offs:offs+16]) - c.append(1) - while len(c) != 17: c.append(0) - dump('c', c) - - h = add(h, c) - dump('after-add', h) - h = modmul(h, r) - dump('after-mul', h) - - dump('end-block', h) - h = freeze(h) - dump('h', h) - s.append(0) - h = add(h, s) - dump('final', h) - return h[:16] - -r = poly1305(msg, rs) -print repr([hex(x) for x in r]) diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/prp.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/prp.h deleted file mode 100644 index 1aa7258..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/prp.h +++ /dev/null @@ -1,64 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef PRP_H -#define PRP_H - -#include <stddef.h> -#include <stdint.h> - -/** - * General block cipher description - * ================================ - * This allows us to implement block cipher modes which can work - * with different block ciphers. - */ - -/* .. c:type:: cf_prp_block - * Block processing function type. - * - * The `in` and `out` blocks may alias. - * - * :rtype: void - * :param ctx: block cipher-specific context object. - * :param in: input block. - * :param out: output block. - */ -typedef void (*cf_prp_block)(void *ctx, const uint8_t *in, uint8_t *out); - -/* .. c:type:: cf_prp - * Describes an PRP in a general way. - * - * .. c:member:: cf_prp.blocksz - * Block size in bytes. Must be no more than :c:macro:`CF_MAXBLOCK`. - * - * .. c:member:: cf_prp.encrypt - * Block encryption function. - * - * .. c:member:: cf_prp.decrypt - * Block decryption function. - */ -typedef struct -{ - size_t blocksz; - cf_prp_block encrypt; - cf_prp_block decrypt; -} cf_prp; - -/* .. c:macro:: CF_MAXBLOCK - * The maximum block cipher blocksize we support, in bytes. - */ -#define CF_MAXBLOCK 16 - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/salsa20.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/salsa20.c deleted file mode 100644 index 34bd156..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/salsa20.c +++ /dev/null @@ -1,164 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "salsa20.h" -#include "bitops.h" -#include "blockwise.h" - -#include <string.h> -#include <stdlib.h> - -void cf_salsa20_core(const uint8_t key0[16], - const uint8_t key1[16], - const uint8_t nonce[16], - const uint8_t constant[16], - uint8_t out[64]) -{ - /* unpack sequence is: - * - * c0 - * key0 - * c1 - * nonce - * c2 - * key1 - * c3 - * - * where c0, c1, c2, c3 = constant - */ - - uint32_t z0, z1, z2, z3, z4, z5, z6, z7, - z8, z9, za, zb, zc, zd, ze, zf; - - uint32_t x0 = z0 = read32_le(constant + 0), - x1 = z1 = read32_le(key0 + 0), - x2 = z2 = read32_le(key0 + 4), - x3 = z3 = read32_le(key0 + 8), - x4 = z4 = read32_le(key0 + 12), - x5 = z5 = read32_le(constant + 4), - x6 = z6 = read32_le(nonce + 0), - x7 = z7 = read32_le(nonce + 4), - x8 = z8 = read32_le(nonce + 8), - x9 = z9 = read32_le(nonce + 12), - xa = za = read32_le(constant + 8), - xb = zb = read32_le(key1 + 0), - xc = zc = read32_le(key1 + 4), - xd = zd = read32_le(key1 + 8), - xe = ze = read32_le(key1 + 12), - xf = zf = read32_le(constant + 12); - -#define QUARTER(v0, v1, v2, v3) \ - v1 ^= rotl32(v0 + v3, 7); \ - v2 ^= rotl32(v1 + v0, 9); \ - v3 ^= rotl32(v2 + v1, 13);\ - v0 ^= rotl32(v3 + v2, 18) - -#define ROW \ - QUARTER(z0, z1, z2, z3); \ - QUARTER(z5, z6, z7, z4); \ - QUARTER(za, zb, z8, z9); \ - QUARTER(zf, zc, zd, ze) - -#define COLUMN\ - QUARTER(z0, z4, z8, zc); \ - QUARTER(z5, z9, zd, z1); \ - QUARTER(za, ze, z2, z6); \ - QUARTER(zf, z3, z7, zb) - - for (int i = 0; i < 10; i++) - { - COLUMN; - ROW; - } - - x0 += z0; - x1 += z1; - x2 += z2; - x3 += z3; - x4 += z4; - x5 += z5; - x6 += z6; - x7 += z7; - x8 += z8; - x9 += z9; - xa += za; - xb += zb; - xc += zc; - xd += zd; - xe += ze; - xf += zf; - - write32_le(x0, out + 0); - write32_le(x1, out + 4); - write32_le(x2, out + 8); - write32_le(x3, out + 12); - write32_le(x4, out + 16); - write32_le(x5, out + 20); - write32_le(x6, out + 24); - write32_le(x7, out + 28); - write32_le(x8, out + 32); - write32_le(x9, out + 36); - write32_le(xa, out + 40); - write32_le(xb, out + 44); - write32_le(xc, out + 48); - write32_le(xd, out + 52); - write32_le(xe, out + 56); - write32_le(xf, out + 60); -} - -static const uint8_t *salsa20_tau = (const uint8_t *) "expand 16-byte k"; -static const uint8_t *salsa20_sigma = (const uint8_t *) "expand 32-byte k"; - -void cf_salsa20_init(cf_salsa20_ctx *ctx, const uint8_t *key, size_t nkey, const uint8_t nonce[8]) -{ - switch (nkey) - { - case 16: - memcpy(ctx->key0, key, 16); - memcpy(ctx->key1, key, 16); - ctx->constant = salsa20_tau; - break; - case 32: - memcpy(ctx->key0, key, 16); - memcpy(ctx->key1, key + 16, 16); - ctx->constant = salsa20_sigma; - break; - default: - abort(); - } - - memset(ctx->nonce, 0, sizeof ctx->nonce); - memcpy(ctx->nonce + 8, nonce, 8); - ctx->nblock = 0; - ctx->ncounter = 8; -} - -static void cf_salsa20_next_block(void *vctx, uint8_t *out) -{ - cf_salsa20_ctx *ctx = vctx; - cf_salsa20_core(ctx->key0, - ctx->key1, - ctx->nonce, - ctx->constant, - out); - incr_le(ctx->nonce, ctx->ncounter); -} - -void cf_salsa20_cipher(cf_salsa20_ctx *ctx, const uint8_t *input, uint8_t *output, size_t bytes) -{ - cf_blockwise_xor(ctx->block, &ctx->nblock, 64, - input, output, bytes, - cf_salsa20_next_block, - ctx); -} diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/salsa20.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/salsa20.h deleted file mode 100644 index 462d019..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/salsa20.h +++ /dev/null @@ -1,140 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef SALSA20_H -#define SALSA20_H - -#include <stdint.h> -#include <stddef.h> - -/** - * The Salsa20/Chacha20 stream ciphers - * =================================== - * - * These are similar stream ciphers by djb. - * - * A reduced round variant of Salsa20 (Salsa20/12) - * was selected as a finalist of the eSTREAM stream - * cipher competition. This implementation does - * the full 20 rounds. - * - * ChaCha20 is fundamentally like Salsa20, but - * has a tweaked round function to improve security - * margin without damaging performance. - */ - -/* Salsa20 core transform. */ -void cf_salsa20_core(const uint8_t key0[16], - const uint8_t key1[16], - const uint8_t nonce[16], - const uint8_t constant[16], - uint8_t out[64]); - -/* Chacha20 core transform. */ -void cf_chacha20_core(const uint8_t key0[16], - const uint8_t key1[16], - const uint8_t nonce[16], - const uint8_t constant[16], - uint8_t out[64]); - -/* .. c:type:: cf_salsa20_ctx - * Incremental interface to Salsa20. - * - * .. c:member:: cf_salsa20_ctx.key0 - * Half of key material. - * - * .. c:member:: cf_salsa20_ctx.key1 - * Half of key material. - * - * .. c:member:: cf_salsa20_ctx.nonce - * Nonce and counter block. - * - * .. c:member:: cf_salsa20_ctx.constant - * Per-key-length constants. - * - * .. c:member:: cf_salsa20_ctx.block - * Buffer for unused key stream material. - * - * .. c:member:: cf_salsa20_ctx.nblock - * Number of bytes at end of `block` that can be used as key stream. - * - */ -typedef struct -{ - uint8_t key0[16], key1[16]; - uint8_t nonce[16]; - const uint8_t *constant; - uint8_t block[64]; - size_t nblock; - size_t ncounter; -} cf_salsa20_ctx, cf_chacha20_ctx; - -/* .. c:type:: cf_chacha20_ctx - * Incremental interface to Chacha20. This structure - * is identical to :c:type:`cf_salsa20_ctx`. - */ - -/* .. c:function:: $DECL - * Salsa20 initialisation function. - * - * :param ctx: salsa20 context. - * :param key: key material. - * :param nkey: length of key in bytes, either 16 or 32. - * :param nonce: per-message nonce. - */ -void cf_salsa20_init(cf_salsa20_ctx *ctx, const uint8_t *key, size_t nkey, const uint8_t nonce[8]); - -/* .. c:function:: $DECL - * Chacha20 initialisation function. - * - * :param ctx: chacha20 context (written). - * :param key: key material. - * :param nkey: length of key in bytes, either 16 or 32. - * :param nonce: per-message nonce. - */ -void cf_chacha20_init(cf_chacha20_ctx *ctx, const uint8_t *key, size_t nkey, const uint8_t nonce[8]); - -/* .. c:function:: $DECL - * Chacha20 initialisation function. This version gives full control over the whole - * initial nonce value, and the size of the counter. The counter is always at the front - * of the nonce. - * - * :param ctx: chacha20 context (written). - * :param key: key material. - * :param nkey: length of key in bytes, either 16 or 32. - * :param nonce: per-message nonce. `ncounter` bytes at the start are the block counter. - * :param ncounter: length, in bytes, of the counter portion of the nonce. - */ -void cf_chacha20_init_custom(cf_chacha20_ctx *ctx, const uint8_t *key, size_t nkey, - const uint8_t nonce[16], size_t ncounter); - -/* .. c:function:: $DECL - * Salsa20 encryption/decryption function. - * - * :param ctx: salsa20 context. - * :param input: input data buffer (read), `count` bytes long. - * :param output: output data buffer (written), `count` bytes long. - */ -void cf_salsa20_cipher(cf_salsa20_ctx *ctx, const uint8_t *input, uint8_t *output, size_t count); - -/* .. c:function:: $DECL - * Chacha20 encryption/decryption function. - * - * :param ctx: chacha20 context. - * :param input: input data buffer (read), `count` bytes long. - * :param output: output data buffer (written), `count` bytes long. - */ -void cf_chacha20_cipher(cf_chacha20_ctx *ctx, const uint8_t *input, uint8_t *output, size_t count); - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha1.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha1.c deleted file mode 100644 index 8b7d02f..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha1.c +++ /dev/null @@ -1,150 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include <string.h> - -#include "sha1.h" -#include "blockwise.h" -#include "bitops.h" -#include "handy.h" -#include "tassert.h" - -void cf_sha1_init(cf_sha1_context *ctx) -{ - memset(ctx, 0, sizeof *ctx); - ctx->H[0] = 0x67452301; - ctx->H[1] = 0xefcdab89; - ctx->H[2] = 0x98badcfe; - ctx->H[3] = 0x10325476; - ctx->H[4] = 0xc3d2e1f0; -} - -static void sha1_update_block(void *vctx, const uint8_t *inp) -{ - cf_sha1_context *ctx = vctx; - - /* This is a 16-word window into the whole W array. */ - uint32_t W[16]; - - uint32_t a = ctx->H[0], - b = ctx->H[1], - c = ctx->H[2], - d = ctx->H[3], - e = ctx->H[4], - Wt; - - for (size_t t = 0; t < 80; t++) - { - /* For W[0..16] we process the input into W. - * For W[16..79] we compute the next W value: - * - * W[t] = (W[t - 3] ^ W[t - 8] ^ W[t - 14] ^ W[t - 16]) <<< 1 - * - * But all W indices are reduced mod 16 into our window. - */ - if (t < 16) - { - W[t] = Wt = read32_be(inp); - inp += 4; - } else { - Wt = W[(t - 3) % 16] ^ W[(t - 8) % 16] ^ W[(t - 14) % 16] ^ W[(t - 16) % 16]; - Wt = rotl32(Wt, 1); - W[t % 16] = Wt; - } - - uint32_t f, k; - - if (t <= 19) - { - f = (b & c) | (~b & d); - k = 0x5a827999; - } else if (t <= 39) { - f = b ^ c ^ d; - k = 0x6ed9eba1; - } else if (t <= 59) { - f = (b & c) | (b & d) | (c & d); - k = 0x8f1bbcdc; - } else { - f = b ^ c ^ d; - k = 0xca62c1d6; - } - - uint32_t temp = rotl32(a, 5) + f + e + k + Wt; - e = d; - d = c; - c = rotl32(b, 30); - b = a; - a = temp; - } - - ctx->H[0] += a; - ctx->H[1] += b; - ctx->H[2] += c; - ctx->H[3] += d; - ctx->H[4] += e; - - ctx->blocks++; -} - -void cf_sha1_update(cf_sha1_context *ctx, const void *data, size_t nbytes) -{ - cf_blockwise_accumulate(ctx->partial, &ctx->npartial, sizeof ctx->partial, - data, nbytes, - sha1_update_block, ctx); -} - -void cf_sha1_digest(const cf_sha1_context *ctx, uint8_t hash[CF_SHA1_HASHSZ]) -{ - cf_sha1_context ours = *ctx; - cf_sha1_digest_final(&ours, hash); -} - -void cf_sha1_digest_final(cf_sha1_context *ctx, uint8_t hash[CF_SHA1_HASHSZ]) -{ - uint64_t digested_bytes = ctx->blocks; - digested_bytes = digested_bytes * CF_SHA1_BLOCKSZ + ctx->npartial; - uint64_t digested_bits = digested_bytes * 8; - - size_t padbytes = CF_SHA1_BLOCKSZ - ((digested_bytes + 8) % CF_SHA1_BLOCKSZ); - - /* Hash 0x80 00 ... block first. */ - cf_blockwise_acc_pad(ctx->partial, &ctx->npartial, sizeof ctx->partial, - 0x80, 0x00, 0x00, padbytes, - sha1_update_block, ctx); - - /* Now hash length. */ - uint8_t buf[8]; - write64_be(digested_bits, buf); - cf_sha1_update(ctx, buf, 8); - - /* We ought to have got our padding calculation right! */ - assert(ctx->npartial == 0); - - write32_be(ctx->H[0], hash + 0); - write32_be(ctx->H[1], hash + 4); - write32_be(ctx->H[2], hash + 8); - write32_be(ctx->H[3], hash + 12); - write32_be(ctx->H[4], hash + 16); - - memset(ctx, 0, sizeof *ctx); -} - -const cf_chash cf_sha1 = { - .hashsz = CF_SHA1_HASHSZ, - .blocksz = CF_SHA1_BLOCKSZ, - .init = (cf_chash_init) cf_sha1_init, - .update = (cf_chash_update) cf_sha1_update, - .digest = (cf_chash_digest) cf_sha1_digest -}; - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha1.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha1.h deleted file mode 100644 index 4ca0e91..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha1.h +++ /dev/null @@ -1,91 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef SHA1_H -#define SHA1_H - -#include <stddef.h> -#include <stdint.h> - -#include "chash.h" - -/** - * SHA1 - * ==== - * - * You shouldn't use this for anything new. - */ - -/* .. c:macro:: CF_SHA1_HASHSZ - * The output size of SHA1: 20 bytes. */ -#define CF_SHA1_HASHSZ 20 - -/* .. c:macro:: CF_SHA1_BLOCKSZ - * The block size of SHA1: 64 bytes. */ -#define CF_SHA1_BLOCKSZ 64 - -/* .. c:type:: cf_sha1_context - * Incremental SHA1 hashing context. - * - * .. c:member:: cf_sha1_context.H - * Intermediate values. - * - * .. c:member:: cf_sha1_context.partial - * Unprocessed input. - * - * .. c:member:: cf_sha1_context.npartial - * Number of bytes of unprocessed input. - * - * .. c:member:: cf_sha1_context.blocks - * Number of full blocks processed. - */ -typedef struct -{ - uint32_t H[5]; /* State. */ - uint8_t partial[CF_SHA1_BLOCKSZ]; /* Partial block of input. */ - uint32_t blocks; /* Number of full blocks processed into H. */ - size_t npartial; /* Number of bytes in prefix of partial. */ -} cf_sha1_context; - -/* .. c:function:: $DECL - * Sets up `ctx` ready to hash a new message. - */ -extern void cf_sha1_init(cf_sha1_context *ctx); - -/* .. c:function:: $DECL - * Hashes `nbytes` at `data`. Copies the data if there isn't enough to make - * a full block. - */ -extern void cf_sha1_update(cf_sha1_context *ctx, const void *data, size_t nbytes); - -/* .. c:function:: $DECL - * Finishes the hash operation, writing `CF_SHA1_HASHSZ` bytes to `hash`. - * - * This leaves `ctx` unchanged. - */ -extern void cf_sha1_digest(const cf_sha1_context *ctx, uint8_t hash[CF_SHA1_HASHSZ]); - -/* .. c:function:: $DECL - * Finishes the hash operation, writing `CF_SHA1_HASHSZ` bytes to `hash`. - * - * This destroys `ctx`, but uses less stack than :c:func:`cf_sha1_digest`. - */ -extern void cf_sha1_digest_final(cf_sha1_context *ctx, uint8_t hash[CF_SHA1_HASHSZ]); - -/* .. c:var:: cf_sha1 - * Abstract interface to SHA1. See :c:type:`cf_chash` for more information. - */ -extern const cf_chash cf_sha1; - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha2.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha2.h deleted file mode 100644 index c4ed24b..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha2.h +++ /dev/null @@ -1,235 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef SHA2_H -#define SHA2_H - -#include <stddef.h> -#include <stdint.h> - -#include "chash.h" - -/** - * SHA224/SHA256 - * ============= - */ - -/* .. c:macro:: CF_SHA224_HASHSZ - * The output size of SHA224: 28 bytes. */ -#define CF_SHA224_HASHSZ 28 - -/* .. c:macro:: CF_SHA224_BLOCKSZ - * The block size of SHA224: 64 bytes. */ -#define CF_SHA224_BLOCKSZ 64 - -/* .. c:macro:: CF_SHA256_HASHSZ - * The output size of SHA256: 32 bytes. */ -#define CF_SHA256_HASHSZ 32 - -/* .. c:macro:: CF_SHA256_BLOCKSZ - * The block size of SHA256: 64 bytes. */ -#define CF_SHA256_BLOCKSZ 64 - -/* .. c:type:: cf_sha256_context - * Incremental SHA256 hashing context. - * - * .. c:member:: cf_sha256_context.H - * Intermediate values. - * - * .. c:member:: cf_sha256_context.partial - * Unprocessed input. - * - * .. c:member:: cf_sha256_context.npartial - * Number of bytes of unprocessed input. - * - * .. c:member:: cf_sha256_context.blocks - * Number of full blocks processed. - */ -typedef struct -{ - uint32_t H[8]; /* State. */ - uint8_t partial[CF_SHA256_BLOCKSZ]; /* Partial block of input. */ - uint32_t blocks; /* Number of full blocks processed into H. */ - size_t npartial; /* Number of bytes in prefix of partial. */ -} cf_sha256_context; - -/* .. c:function:: $DECL - * Sets up `ctx` ready to hash a new message. - */ -extern void cf_sha256_init(cf_sha256_context *ctx); - -/* .. c:function:: $DECL - * Hashes `nbytes` at `data`. Copies the data if there isn't enough to make - * a full block. - */ -extern void cf_sha256_update(cf_sha256_context *ctx, const void *data, size_t nbytes); - -/* .. c:function:: $DECL - * Finishes the hash operation, writing `CF_SHA256_HASHSZ` bytes to `hash`. - * - * This leaves `ctx` unchanged. - */ -extern void cf_sha256_digest(const cf_sha256_context *ctx, uint8_t hash[CF_SHA256_HASHSZ]); - -/* .. c:function:: $DECL - * Finishes the hash operation, writing `CF_SHA256_HASHSZ` bytes to `hash`. - * - * This destroys `ctx`, but uses less stack than :c:func:`cf_sha256_digest`. - */ -extern void cf_sha256_digest_final(cf_sha256_context *ctx, uint8_t hash[CF_SHA256_HASHSZ]); - -/* .. c:function:: $DECL - * Sets up `ctx` ready to hash a new message. - * - * nb. SHA224 uses SHA256's underlying types. - */ -extern void cf_sha224_init(cf_sha256_context *ctx); - -/* .. c:function:: $DECL - * Hashes `nbytes` at `data`. Copies the data if there isn't enough to make - * a full block. - */ -extern void cf_sha224_update(cf_sha256_context *ctx, const void *data, size_t nbytes); - -/* .. c:function:: $DECL - * Finishes the hash operation, writing `CF_SHA224_HASHSZ` bytes to `hash`. - * - * This leaves `ctx` unchanged. - */ -extern void cf_sha224_digest(const cf_sha256_context *ctx, uint8_t hash[CF_SHA224_HASHSZ]); - -/* .. c:function:: $DECL - * Finishes the hash operation, writing `CF_SHA224_HASHSZ` bytes to `hash`. - * - * This destroys `ctx`, but uses less stack than :c:func:`cf_sha224_digest`. - */ -extern void cf_sha224_digest_final(cf_sha256_context *ctx, uint8_t hash[CF_SHA224_HASHSZ]); - -/* .. c:var:: cf_sha224 - * Abstract interface to SHA224. See :c:type:`cf_chash` for more information. - */ -extern const cf_chash cf_sha224; - -/* .. c:var:: cf_sha256 - * Abstract interface to SHA256. See :c:type:`cf_chash` for more information. - */ -extern const cf_chash cf_sha256; - -/** - * SHA384/SHA512 - * ============= - */ - -/* .. c:macro:: CF_SHA384_HASHSZ - * The output size of SHA384: 48 bytes. */ -#define CF_SHA384_HASHSZ 48 - -/* .. c:macro:: CF_SHA384_BLOCKSZ - * The block size of SHA384: 128 bytes. */ -#define CF_SHA384_BLOCKSZ 128 - -/* .. c:macro:: CF_SHA512_HASHSZ - * The output size of SHA512: 64 bytes. */ -#define CF_SHA512_HASHSZ 64 - -/* .. c:macro:: CF_SHA512_BLOCKSZ - * The block size of SHA512: 128 bytes. */ -#define CF_SHA512_BLOCKSZ 128 - -/* .. c:type:: cf_sha512_context - * Incremental SHA512 hashing context. - * - * .. c:member:: cf_sha512_context.H - * Intermediate values. - * - * .. c:member:: cf_sha512_context.partial - * Unprocessed input. - * - * .. c:member:: cf_sha512_context.npartial - * Number of bytes of unprocessed input. - * - * .. c:member:: cf_sha512_context.blocks - * Number of full blocks processed. - */ -typedef struct -{ - uint64_t H[8]; - uint8_t partial[CF_SHA512_BLOCKSZ]; - uint32_t blocks; - size_t npartial; -} cf_sha512_context; - -/* .. c:function:: $DECL - * Sets up `ctx` ready to hash a new message. - */ -extern void cf_sha512_init(cf_sha512_context *ctx); - -/* .. c:function:: $DECL - * Hashes `nbytes` at `data`. Copies the data if there isn't enough to make - * a full block. - */ -extern void cf_sha512_update(cf_sha512_context *ctx, const void *data, size_t nbytes); - -/* .. c:function:: $DECL - * Finishes the hash operation, writing `CF_SHA512_HASHSZ` bytes to `hash`. - * - * This leaves `ctx` unchanged. - */ -extern void cf_sha512_digest(const cf_sha512_context *ctx, uint8_t hash[CF_SHA512_HASHSZ]); - -/* .. c:function:: $DECL - * Finishes the hash operation, writing `CF_SHA512_HASHSZ` bytes to `hash`. - * - * This destroys `ctx`, but uses less stack than :c:func:`cf_sha512_digest`. - */ -extern void cf_sha512_digest_final(cf_sha512_context *ctx, uint8_t hash[CF_SHA512_HASHSZ]); - -/* .. c:function:: $DECL - * Sets up `ctx` ready to hash a new message. - * - * nb. SHA384 uses SHA512's underlying types. - */ -extern void cf_sha384_init(cf_sha512_context *ctx); - -/* .. c:function:: $DECL - * Hashes `nbytes` at `data`. Copies the data if there isn't enough to make - * a full block. - */ -extern void cf_sha384_update(cf_sha512_context *ctx, const void *data, size_t nbytes); - -/* .. c:function:: $DECL - * Finishes the hash operation, writing `CF_SHA384_HASHSZ` bytes to `hash`. - * - * This leaves `ctx` unchanged. - */ -extern void cf_sha384_digest(const cf_sha512_context *ctx, uint8_t hash[CF_SHA384_HASHSZ]); - -/* .. c:function:: $DECL - * Finishes the hash operation, writing `CF_SHA384_HASHSZ` bytes to `hash`. - * - * This destroys `ctx`, but uses less stack than :c:func:`cf_sha384_digest`. - */ -extern void cf_sha384_digest_final(cf_sha512_context *ctx, uint8_t hash[CF_SHA384_HASHSZ]); - -/* .. c:var:: cf_sha384 - * Abstract interface to SHA384. See :c:type:`cf_chash` for more information. - */ -extern const cf_chash cf_sha384; - -/* .. c:var:: cf_sha512 - * Abstract interface to SHA512. See :c:type:`cf_chash` for more information. - */ -extern const cf_chash cf_sha512; - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha256.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha256.c deleted file mode 100644 index 8ecef16..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha256.c +++ /dev/null @@ -1,232 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include <string.h> - -#include "sha2.h" -#include "blockwise.h" -#include "bitops.h" -#include "handy.h" -#include "tassert.h" - -static const uint32_t K[64] = { - 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, - 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5, - 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, - 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174, - 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, - 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da, - 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, - 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967, - 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, - 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85, - 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, - 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070, - 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, - 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3, - 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, - 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2 -}; - -# define CH(x, y, z) (((x) & (y)) ^ (~(x) & (z))) -# define MAJ(x, y, z) (((x) & (y)) ^ ((x) & (z)) ^ ((y) & (z))) -# define BSIG0(x) (rotr32((x), 2) ^ rotr32((x), 13) ^ rotr32((x), 22)) -# define BSIG1(x) (rotr32((x), 6) ^ rotr32((x), 11) ^ rotr32((x), 25)) -# define SSIG0(x) (rotr32((x), 7) ^ rotr32((x), 18) ^ ((x) >> 3)) -# define SSIG1(x) (rotr32((x), 17) ^ rotr32((x), 19) ^ ((x) >> 10)) - -void cf_sha256_init(cf_sha256_context *ctx) -{ - memset(ctx, 0, sizeof *ctx); - ctx->H[0] = 0x6a09e667; - ctx->H[1] = 0xbb67ae85; - ctx->H[2] = 0x3c6ef372; - ctx->H[3] = 0xa54ff53a; - ctx->H[4] = 0x510e527f; - ctx->H[5] = 0x9b05688c; - ctx->H[6] = 0x1f83d9ab; - ctx->H[7] = 0x5be0cd19; -} - -void cf_sha224_init(cf_sha256_context *ctx) -{ - memset(ctx, 0, sizeof *ctx); - ctx->H[0] = 0xc1059ed8; - ctx->H[1] = 0x367cd507; - ctx->H[2] = 0x3070dd17; - ctx->H[3] = 0xf70e5939; - ctx->H[4] = 0xffc00b31; - ctx->H[5] = 0x68581511; - ctx->H[6] = 0x64f98fa7; - ctx->H[7] = 0xbefa4fa4; -} - -static void sha256_update_block(void *vctx, const uint8_t *inp) -{ - cf_sha256_context *ctx = vctx; - - /* This is a 16-word window into the whole W array. */ - uint32_t W[16]; - - uint32_t a = ctx->H[0], - b = ctx->H[1], - c = ctx->H[2], - d = ctx->H[3], - e = ctx->H[4], - f = ctx->H[5], - g = ctx->H[6], - h = ctx->H[7], - Wt; - - size_t t; - for (t = 0; t < 64; t++) - { - /* For W[0..16] we process the input into W. - * For W[16..64] we compute the next W value: - * - * W[t] = SSIG1(W[t - 2]) + W[t - 7] + SSIG0(W[t - 15]) + W[t - 16]; - * - * But all W indices are reduced mod 16 into our window. - */ - if (t < 16) - { - W[t] = Wt = read32_be(inp); - inp += 4; - } else { - Wt = SSIG1(W[(t - 2) % 16]) + - W[(t - 7) % 16] + - SSIG0(W[(t - 15) % 16]) + - W[(t - 16) % 16]; - W[t % 16] = Wt; - } - - uint32_t T1 = h + BSIG1(e) + CH(e, f, g) + K[t] + Wt; - uint32_t T2 = BSIG0(a) + MAJ(a, b, c); - h = g; - g = f; - f = e; - e = d + T1; - d = c; - c = b; - b = a; - a = T1 + T2; - } - - ctx->H[0] += a; - ctx->H[1] += b; - ctx->H[2] += c; - ctx->H[3] += d; - ctx->H[4] += e; - ctx->H[5] += f; - ctx->H[6] += g; - ctx->H[7] += h; - - ctx->blocks++; -} - -void cf_sha256_update(cf_sha256_context *ctx, const void *data, size_t nbytes) -{ - cf_blockwise_accumulate(ctx->partial, &ctx->npartial, sizeof ctx->partial, - data, nbytes, - sha256_update_block, ctx); -} - -void cf_sha224_update(cf_sha256_context *ctx, const void *data, size_t nbytes) -{ - cf_sha256_update(ctx, data, nbytes); -} - -void cf_sha256_digest(const cf_sha256_context *ctx, uint8_t hash[CF_SHA256_HASHSZ]) -{ - /* We copy the context, so the finalisation doesn't effect the caller's - * context. This means the caller can do: - * - * x = init() - * x.update('hello') - * h1 = x.digest() - * x.update(' world') - * h2 = x.digest() - * - * to get h1 = H('hello') and h2 = H('hello world') - * - * This wouldn't work if we applied MD-padding to *ctx. - */ - - cf_sha256_context ours = *ctx; - cf_sha256_digest_final(&ours, hash); -} - -void cf_sha256_digest_final(cf_sha256_context *ctx, uint8_t hash[CF_SHA256_HASHSZ]) -{ - uint64_t digested_bytes = ctx->blocks; - digested_bytes = digested_bytes * CF_SHA256_BLOCKSZ + ctx->npartial; - uint64_t digested_bits = digested_bytes * 8; - - size_t padbytes = CF_SHA256_BLOCKSZ - ((digested_bytes + 8) % CF_SHA256_BLOCKSZ); - - /* Hash 0x80 00 ... block first. */ - cf_blockwise_acc_pad(ctx->partial, &ctx->npartial, sizeof ctx->partial, - 0x80, 0x00, 0x00, padbytes, - sha256_update_block, ctx); - - /* Now hash length. */ - uint8_t buf[8]; - write64_be(digested_bits, buf); - cf_sha256_update(ctx, buf, 8); - - /* We ought to have got our padding calculation right! */ - assert(ctx->npartial == 0); - - write32_be(ctx->H[0], hash + 0); - write32_be(ctx->H[1], hash + 4); - write32_be(ctx->H[2], hash + 8); - write32_be(ctx->H[3], hash + 12); - write32_be(ctx->H[4], hash + 16); - write32_be(ctx->H[5], hash + 20); - write32_be(ctx->H[6], hash + 24); - write32_be(ctx->H[7], hash + 28); - - memset(ctx, 0, sizeof *ctx); -} - -void cf_sha224_digest(const cf_sha256_context *ctx, uint8_t hash[CF_SHA224_HASHSZ]) -{ - uint8_t full[CF_SHA256_HASHSZ]; - cf_sha256_digest(ctx, full); - memcpy(hash, full, CF_SHA224_HASHSZ); -} - -void cf_sha224_digest_final(cf_sha256_context *ctx, uint8_t hash[CF_SHA224_HASHSZ]) -{ - uint8_t full[CF_SHA256_HASHSZ]; - cf_sha256_digest_final(ctx, full); - memcpy(hash, full, CF_SHA224_HASHSZ); -} - -const cf_chash cf_sha224 = { - .hashsz = CF_SHA224_HASHSZ, - .blocksz = CF_SHA256_BLOCKSZ, - .init = (cf_chash_init) cf_sha224_init, - .update = (cf_chash_update) cf_sha224_update, - .digest = (cf_chash_digest) cf_sha224_digest -}; - -const cf_chash cf_sha256 = { - .hashsz = CF_SHA256_HASHSZ, - .blocksz = CF_SHA256_BLOCKSZ, - .init = (cf_chash_init) cf_sha256_init, - .update = (cf_chash_update) cf_sha256_update, - .digest = (cf_chash_digest) cf_sha256_digest -}; - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha3.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha3.c deleted file mode 100644 index f130747..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha3.c +++ /dev/null @@ -1,444 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include <string.h> - -#include "sha3.h" -#include "blockwise.h" -#include "handy.h" -#include "bitops.h" -#include "tassert.h" - -/* The round constants, pre-interleaved. See bitinter.py */ -static const cf_sha3_bi round_constants[24] = { - { 0x00000001, 0x00000000 }, { 0x00000000, 0x00000089 }, - { 0x00000000, 0x8000008b }, { 0x00000000, 0x80008080 }, - { 0x00000001, 0x0000008b }, { 0x00000001, 0x00008000 }, - { 0x00000001, 0x80008088 }, { 0x00000001, 0x80000082 }, - { 0x00000000, 0x0000000b }, { 0x00000000, 0x0000000a }, - { 0x00000001, 0x00008082 }, { 0x00000000, 0x00008003 }, - { 0x00000001, 0x0000808b }, { 0x00000001, 0x8000000b }, - { 0x00000001, 0x8000008a }, { 0x00000001, 0x80000081 }, - { 0x00000000, 0x80000081 }, { 0x00000000, 0x80000008 }, - { 0x00000000, 0x00000083 }, { 0x00000000, 0x80008003 }, - { 0x00000001, 0x80008088 }, { 0x00000000, 0x80000088 }, - { 0x00000001, 0x00008000 }, { 0x00000000, 0x80008082 } -}; - -static const uint8_t rotation_constants[5][5] = { - { 0, 1, 62, 28, 27, }, - { 36, 44, 6, 55, 20, }, - { 3, 10, 43, 25, 39, }, - { 41, 45, 15, 21, 8, }, - { 18, 2, 61, 56, 14, } -}; - -/* --- Bit interleaving and uninterleaving --- */ -/* See bitinter.py for models of these bit twiddles. The originals - * come from "Hacker's Delight" by Henry Warren, where they are named - * shuffle2 and unshuffle. - * See: - * http://www.hackersdelight.org/hdcodetxt/shuffle.c.txt - * - * The overriding aim is to change bit ordering: - * AaBbCcDd -> ABCDabcd - * and back. Once they're in the shuffled form, we can extract - * odd/even bits by taking the half words from each pair. - */ - -static inline uint32_t shuffle_out(uint32_t x) -{ - uint32_t t; - t = (x ^ (x >> 1)) & 0x22222222; x = x ^ t ^ (t << 1); - t = (x ^ (x >> 2)) & 0x0c0c0c0c; x = x ^ t ^ (t << 2); - t = (x ^ (x >> 4)) & 0x00f000f0; x = x ^ t ^ (t << 4); - t = (x ^ (x >> 8)) & 0x0000ff00; x = x ^ t ^ (t << 8); - return x; -} - -/* Convert ABCDabcd -> AaBbCcDd. */ -static inline uint32_t shuffle_in(uint32_t x) -{ - uint32_t t; - t = (x ^ (x >> 8)) & 0x0000ff00; x = x ^ t ^ (t << 8); - t = (x ^ (x >> 4)) & 0x00f000f0; x = x ^ t ^ (t << 4); - t = (x ^ (x >> 2)) & 0x0c0c0c0c; x = x ^ t ^ (t << 2); - t = (x ^ (x >> 1)) & 0x22222222; x = x ^ t ^ (t << 1); - return x; -} - -static inline void read64_bi(cf_sha3_bi *out, const uint8_t data[8]) -{ - uint32_t lo = read32_le(data + 0), - hi = read32_le(data + 4); - - lo = shuffle_out(lo); - hi = shuffle_out(hi); - - out->odd = (lo & 0x0000ffff) | (hi << 16); - out->evn = (lo >> 16) | (hi & 0xffff0000); -} - -static inline void write64_bi(const cf_sha3_bi *bi, uint8_t data[8]) -{ - uint32_t lo = (bi->odd & 0x0000ffff) | (bi->evn << 16), - hi = (bi->odd >> 16) | (bi->evn & 0xffff0000); - - lo = shuffle_in(lo); - hi = shuffle_in(hi); - - write32_le(lo, data + 0); - write32_le(hi, data + 4); -} - -static inline void rotl_bi_1(cf_sha3_bi *out, const cf_sha3_bi *in) -{ - /* in bit-interleaved representation, a rotation of 1 - * is a swap plus a single rotation of the odd word. */ - out->odd = rotl32(in->evn, 1); - out->evn = in->odd; -} - -static inline void rotl_bi_n(cf_sha3_bi *out, const cf_sha3_bi *in, uint8_t rot) -{ - uint8_t half = rot >> 1; - - /* nb. rot is a constant, so this isn't a branch leak. */ - if (rot & 1) - { - out->odd = rotl32(in->evn, half + 1); - out->evn = rotl32(in->odd, half); - } else { - out->evn = rotl32(in->evn, half); - out->odd = rotl32(in->odd, half); - } -} - -/* --- */ - -static void sha3_init(cf_sha3_context *ctx, uint16_t rate_bits, uint16_t capacity_bits) -{ - mem_clean(ctx, sizeof *ctx); - ctx->rate = rate_bits / 8; - ctx->capacity = capacity_bits / 8; -} - -static void absorb(cf_sha3_context *ctx, const uint8_t *data, uint16_t sz) -{ - uint16_t lanes = sz / 8; - - for (uint16_t x = 0, y = 0, i = 0; i < lanes; i++) - { - cf_sha3_bi bi; - read64_bi(&bi, data); - ctx->A[x][y].odd ^= bi.odd; - ctx->A[x][y].evn ^= bi.evn; - data += 8; - - x++; - if (x == 5) - { - y++; - x = 0; - } - } -} - -/* Integers [-1,20] mod 5. To avoid a divmod. Indices - * are constants; not data-dependant. */ -static const uint8_t mod5_table[] = { - 4, - 0, - 1, 2, 3, 4, 0, 1, 2, 3, 4, 0, - 1, 2, 3, 4, 0, 1, 2, 3, 4, 0 -}; - -#define MOD5(x) (mod5_table[(x) + 1]) - -static void theta(cf_sha3_context *ctx) -{ - cf_sha3_bi C[5], D[5]; - - for (int x = 0; x < 5; x++) - { - C[x].odd = ctx->A[x][0].odd ^ ctx->A[x][1].odd ^ ctx->A[x][2].odd ^ ctx->A[x][3].odd ^ ctx->A[x][4].odd; - C[x].evn = ctx->A[x][0].evn ^ ctx->A[x][1].evn ^ ctx->A[x][2].evn ^ ctx->A[x][3].evn ^ ctx->A[x][4].evn; - } - - for (int x = 0; x < 5; x++) - { - cf_sha3_bi r; - rotl_bi_1(&r, &C[MOD5(x + 1)]); - D[x].odd = C[MOD5(x - 1)].odd ^ r.odd; - D[x].evn = C[MOD5(x - 1)].evn ^ r.evn; - - for (int y = 0; y < 5; y++) - { - ctx->A[x][y].odd ^= D[x].odd; - ctx->A[x][y].evn ^= D[x].evn; - } - } -} - -static void rho_pi_chi(cf_sha3_context *ctx) -{ - cf_sha3_bi B[5][5] = { { { 0 } } }; - - for (int x = 0; x < 5; x++) - for (int y = 0; y < 5; y++) - rotl_bi_n(&B[y][MOD5(2 * x + 3 * y)], &ctx->A[x][y], rotation_constants[y][x]); - - for (int x = 0; x < 5; x++) - { - unsigned x1 = MOD5(x + 1); - unsigned x2 = MOD5(x + 2); - - for (int y = 0; y < 5; y++) - { - ctx->A[x][y].odd = B[x][y].odd ^ ((~ B[x1][y].odd) & B[x2][y].odd); - ctx->A[x][y].evn = B[x][y].evn ^ ((~ B[x1][y].evn) & B[x2][y].evn); - } - } -} - -static void permute(cf_sha3_context *ctx) -{ - for (int r = 0; r < 24; r++) - { - theta(ctx); - rho_pi_chi(ctx); - - /* iota */ - ctx->A[0][0].odd ^= round_constants[r].odd; - ctx->A[0][0].evn ^= round_constants[r].evn; - } -} - -static void extract(cf_sha3_context *ctx, uint8_t *out, size_t nbytes) -{ - uint16_t lanes = (nbytes + 7) / 8; - - for (uint16_t x = 0, y = 0, i = 0; i < lanes; i++) - { - if (nbytes >= 8) - { - write64_bi(&ctx->A[x][y], out); - out += 8; - nbytes -= 8; - } else { - uint8_t buf[8]; - write64_bi(&ctx->A[x][y], buf); - memcpy(out, buf, nbytes); - out += nbytes; - nbytes = 0; - } - - x++; - if (x == 5) - { - y++; - x = 0; - } - } -} - -static void squeeze(cf_sha3_context *ctx, uint8_t *out, size_t nbytes) -{ - while (nbytes) - { - size_t take = MIN(nbytes, ctx->rate); - extract(ctx, out, take); - out += take; - nbytes -= take; - - assert(nbytes == 0); -#if 0 - /* Note: if we ever have |H| >= rate, we need to permute - * after each rate-length block. - * - * This cannot currently happen. */ - if (nbytes) - permute(ctx); -#endif - } -} - -static void sha3_block(void *vctx, const uint8_t *data) -{ - cf_sha3_context *ctx = vctx; - - absorb(ctx, data, ctx->rate); - permute(ctx); -} - -static void sha3_update(cf_sha3_context *ctx, const void *data, size_t nbytes) -{ - cf_blockwise_accumulate(ctx->partial, &ctx->npartial, ctx->rate, - data, nbytes, - sha3_block, ctx); -} - -/* Padding and domain separation constants. - * - * FIPS 202 specifies that 0b01 is appended to hash function - * input, and 0b1111 is appended to SHAKE input. - * - * This is done in internal (little endian) bit ordering, and - * we convolve it with the leftmost (first) padding bit, so: - * - * Hash: 0b110 - * SHAKE: 0b11111 - */ - -#define DOMAIN_HASH_PAD 0x06 -#define DOMAIN_SHAKE_PAD 0x1f - -static void pad(cf_sha3_context *ctx, uint8_t domain, size_t npad) -{ - assert(npad >= 1); - - cf_blockwise_acc_pad(ctx->partial, &ctx->npartial, ctx->rate, - domain, 0x00, 0x80, - npad, - sha3_block, ctx); -} - -static void pad_and_squeeze(cf_sha3_context *ctx, uint8_t *out, size_t nout) -{ - pad(ctx, DOMAIN_HASH_PAD, ctx->rate - ctx->npartial); - assert(ctx->npartial == 0); - - squeeze(ctx, out, nout); - mem_clean(ctx, sizeof *ctx); -} - -/* SHA3-224 */ -void cf_sha3_224_init(cf_sha3_context *ctx) -{ - sha3_init(ctx, 1152, 448); -} - -void cf_sha3_224_update(cf_sha3_context *ctx, const void *data, size_t nbytes) -{ - sha3_update(ctx, data, nbytes); -} - -void cf_sha3_224_digest(const cf_sha3_context *ctx, uint8_t hash[CF_SHA3_224_HASHSZ]) -{ - cf_sha3_context ours = *ctx; - cf_sha3_224_digest_final(&ours, hash); -} - -void cf_sha3_224_digest_final(cf_sha3_context *ctx, uint8_t hash[CF_SHA3_224_HASHSZ]) -{ - pad_and_squeeze(ctx, hash, CF_SHA3_224_HASHSZ); -} - -const cf_chash cf_sha3_224 = { - .hashsz = CF_SHA3_224_HASHSZ, - .blocksz = CF_SHA3_224_BLOCKSZ, - .init = (cf_chash_init) cf_sha3_224_init, - .update = (cf_chash_update) cf_sha3_224_update, - .digest = (cf_chash_digest) cf_sha3_224_digest -}; - -/* SHA3-256 */ -void cf_sha3_256_init(cf_sha3_context *ctx) -{ - sha3_init(ctx, 1088, 512); -} - -void cf_sha3_256_update(cf_sha3_context *ctx, const void *data, size_t nbytes) -{ - sha3_update(ctx, data, nbytes); -} - -void cf_sha3_256_digest(const cf_sha3_context *ctx, uint8_t hash[CF_SHA3_256_HASHSZ]) -{ - cf_sha3_context ours = *ctx; - cf_sha3_256_digest_final(&ours, hash); -} - -void cf_sha3_256_digest_final(cf_sha3_context *ctx, uint8_t hash[CF_SHA3_256_HASHSZ]) -{ - pad_and_squeeze(ctx, hash, CF_SHA3_256_HASHSZ); -} - -const cf_chash cf_sha3_256 = { - .hashsz = CF_SHA3_256_HASHSZ, - .blocksz = CF_SHA3_256_BLOCKSZ, - .init = (cf_chash_init) cf_sha3_256_init, - .update = (cf_chash_update) cf_sha3_256_update, - .digest = (cf_chash_digest) cf_sha3_256_digest -}; - -/* SHA3-384 */ -void cf_sha3_384_init(cf_sha3_context *ctx) -{ - sha3_init(ctx, 832, 768); -} - -void cf_sha3_384_update(cf_sha3_context *ctx, const void *data, size_t nbytes) -{ - sha3_update(ctx, data, nbytes); -} - -void cf_sha3_384_digest(const cf_sha3_context *ctx, uint8_t hash[CF_SHA3_384_HASHSZ]) -{ - cf_sha3_context ours = *ctx; - cf_sha3_384_digest_final(&ours, hash); -} - -void cf_sha3_384_digest_final(cf_sha3_context *ctx, uint8_t hash[CF_SHA3_384_HASHSZ]) -{ - pad_and_squeeze(ctx, hash, CF_SHA3_384_HASHSZ); -} - -const cf_chash cf_sha3_384 = { - .hashsz = CF_SHA3_384_HASHSZ, - .blocksz = CF_SHA3_384_BLOCKSZ, - .init = (cf_chash_init) cf_sha3_384_init, - .update = (cf_chash_update) cf_sha3_384_update, - .digest = (cf_chash_digest) cf_sha3_384_digest -}; - -/* SHA3-512 */ -void cf_sha3_512_init(cf_sha3_context *ctx) -{ - sha3_init(ctx, 576, 1024); -} - -void cf_sha3_512_update(cf_sha3_context *ctx, const void *data, size_t nbytes) -{ - sha3_update(ctx, data, nbytes); -} - -void cf_sha3_512_digest(const cf_sha3_context *ctx, uint8_t hash[CF_SHA3_512_HASHSZ]) -{ - cf_sha3_context ours = *ctx; - cf_sha3_512_digest_final(&ours, hash); -} - -void cf_sha3_512_digest_final(cf_sha3_context *ctx, uint8_t hash[CF_SHA3_512_HASHSZ]) -{ - pad_and_squeeze(ctx, hash, CF_SHA3_512_HASHSZ); -} - -const cf_chash cf_sha3_512 = { - .hashsz = CF_SHA3_512_HASHSZ, - .blocksz = CF_SHA3_512_BLOCKSZ, - .init = (cf_chash_init) cf_sha3_512_init, - .update = (cf_chash_update) cf_sha3_512_update, - .digest = (cf_chash_digest) cf_sha3_512_digest -}; diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha3.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha3.h deleted file mode 100644 index 44895dc..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha3.h +++ /dev/null @@ -1,180 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef SHA3_H -#define SHA3_H - -#include <stddef.h> -#include <stdint.h> - -#include "chash.h" - -/** - * SHA3/Keccak - * =========== - * This implementation is compatible with FIPS 202, - * rather than the original Keccak submission. - * - */ - -/* .. c:macro:: CF_SHA3_224_HASHSZ - * The output size of SHA3-224: 28 bytes. */ -#define CF_SHA3_224_HASHSZ 28 - -/* .. c:macro:: CF_SHA3_256_HASHSZ - * The output size of SHA3-256: 32 bytes. */ -#define CF_SHA3_256_HASHSZ 32 - -/* .. c:macro:: CF_SHA3_384_HASHSZ - * The output size of SHA3-384: 48 bytes. */ -#define CF_SHA3_384_HASHSZ 48 - -/* .. c:macro:: CF_SHA3_512_HASHSZ - * The output size of SHA3-512: 64 bytes. */ -#define CF_SHA3_512_HASHSZ 64 - -/* .. c:macro:: CF_SHA3_224_BLOCKSZ - * The block size of SHA3-224. */ -#define CF_SHA3_224_BLOCKSZ 144 - -/* .. c:macro:: CF_SHA3_256_BLOCKSZ - * The block size of SHA3-256. */ -#define CF_SHA3_256_BLOCKSZ 136 - -/* .. c:macro:: CF_SHA3_384_BLOCKSZ - * The block size of SHA3-384. */ -#define CF_SHA3_384_BLOCKSZ 104 - -/* .. c:macro:: CF_SHA3_512_BLOCKSZ - * The block size of SHA3-512. */ -#define CF_SHA3_512_BLOCKSZ 72 - -/* We use bit-interleaved internal representation. This - * stores a 64 bit quantity in two 32 bit words: one word - * contains odd bits, the other even. This means 64-bit rotations - * are cheaper to compute. */ -typedef struct -{ - uint32_t odd, evn; -} cf_sha3_bi; - -/* .. c:type:: cf_sha3_context - * Incremental SHA3 hashing context. - * - * .. c:member:: cf_sha3_context.A - * Intermediate state. - * - * .. c:member:: cf_sha3_context.partial - * Unprocessed input. - * - * .. c:member:: cf_sha3_context.npartial - * Number of bytes of unprocessed input. - * - * .. c:member:: cf_sha3_context.rate - * Sponge absorption rate. - * - * .. c:member:: cf_sha3_context.rate - * Sponge capacity. - */ -typedef struct -{ - /* State is a 5x5 block of 64-bit values, for Keccak-f[1600]. */ - cf_sha3_bi A[5][5]; - uint8_t partial[CF_SHA3_224_BLOCKSZ]; - size_t npartial; - uint16_t rate, capacity; /* rate and capacity, in bytes. */ -} cf_sha3_context; - - -/* -- _init functions -- */ - -/* .. c:function:: $DECL */ -extern void cf_sha3_224_init(cf_sha3_context *ctx); - -/* .. c:function:: $DECL */ -extern void cf_sha3_256_init(cf_sha3_context *ctx); - -/* .. c:function:: $DECL */ -extern void cf_sha3_384_init(cf_sha3_context *ctx); - -/* .. c:function:: $DECL - * Sets up `ctx` ready to hash a new message. - */ -extern void cf_sha3_512_init(cf_sha3_context *ctx); - -/* -- _update functions -- */ - -/* .. c:function:: $DECL */ -extern void cf_sha3_224_update(cf_sha3_context *ctx, const void *data, size_t nbytes); - -/* .. c:function:: $DECL */ -extern void cf_sha3_256_update(cf_sha3_context *ctx, const void *data, size_t nbytes); - -/* .. c:function:: $DECL */ -extern void cf_sha3_384_update(cf_sha3_context *ctx, const void *data, size_t nbytes); - -/* .. c:function:: $DECL - * Hashes `nbytes` at `data`. Copies the data for processing later if there - * isn't enough to make a full block. - */ -extern void cf_sha3_512_update(cf_sha3_context *ctx, const void *data, size_t nbytes); - -/* -- _digest functions -- */ - -/* .. c:function:: $DECL */ -extern void cf_sha3_224_digest(const cf_sha3_context *ctx, uint8_t hash[CF_SHA3_224_HASHSZ]); - -/* .. c:function:: $DECL */ -extern void cf_sha3_256_digest(const cf_sha3_context *ctx, uint8_t hash[CF_SHA3_256_HASHSZ]); - -/* .. c:function:: $DECL */ -extern void cf_sha3_384_digest(const cf_sha3_context *ctx, uint8_t hash[CF_SHA3_384_HASHSZ]); - -/* .. c:function:: $DECL - * Finishes the hashing operation, writing result to `hash`. - * - * This leaves `ctx` unchanged. - */ -extern void cf_sha3_512_digest(const cf_sha3_context *ctx, uint8_t hash[CF_SHA3_512_HASHSZ]); - -/* -- _digest_final functions -- */ - -/* .. c:function:: $DECL */ -extern void cf_sha3_224_digest_final(cf_sha3_context *ctx, uint8_t hash[CF_SHA3_224_HASHSZ]); - -/* .. c:function:: $DECL */ -extern void cf_sha3_256_digest_final(cf_sha3_context *ctx, uint8_t hash[CF_SHA3_256_HASHSZ]); - -/* .. c:function:: $DECL */ -extern void cf_sha3_384_digest_final(cf_sha3_context *ctx, uint8_t hash[CF_SHA3_384_HASHSZ]); - -/* .. c:function:: $DECL - * Finishes the hashing operation, writing result to `hash`. - * - * This destroys the contents of `ctx`. - */ -extern void cf_sha3_512_digest_final(cf_sha3_context *ctx, uint8_t hash[CF_SHA3_512_HASHSZ]); - -/* .. c:var:: cf_sha3_224 - * .. c:var:: cf_sha3_256 - * .. c:var:: cf_sha3_384 - * .. c:var:: cf_sha3_512 - * Abstract interface to SHA3 functions. See :c:type:`cf_chash` for more information. - */ -extern const cf_chash cf_sha3_224; -extern const cf_chash cf_sha3_256; -extern const cf_chash cf_sha3_384; -extern const cf_chash cf_sha3_512; - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha512.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha512.c deleted file mode 100644 index 2d1c896..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/sha512.c +++ /dev/null @@ -1,248 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include <string.h> - -#include "sha2.h" -#include "blockwise.h" -#include "bitops.h" -#include "handy.h" -#include "tassert.h" - -static const uint64_t K[80] = { - UINT64_C(0x428a2f98d728ae22), UINT64_C(0x7137449123ef65cd), - UINT64_C(0xb5c0fbcfec4d3b2f), UINT64_C(0xe9b5dba58189dbbc), - UINT64_C(0x3956c25bf348b538), UINT64_C(0x59f111f1b605d019), - UINT64_C(0x923f82a4af194f9b), UINT64_C(0xab1c5ed5da6d8118), - UINT64_C(0xd807aa98a3030242), UINT64_C(0x12835b0145706fbe), - UINT64_C(0x243185be4ee4b28c), UINT64_C(0x550c7dc3d5ffb4e2), - UINT64_C(0x72be5d74f27b896f), UINT64_C(0x80deb1fe3b1696b1), - UINT64_C(0x9bdc06a725c71235), UINT64_C(0xc19bf174cf692694), - UINT64_C(0xe49b69c19ef14ad2), UINT64_C(0xefbe4786384f25e3), - UINT64_C(0x0fc19dc68b8cd5b5), UINT64_C(0x240ca1cc77ac9c65), - UINT64_C(0x2de92c6f592b0275), UINT64_C(0x4a7484aa6ea6e483), - UINT64_C(0x5cb0a9dcbd41fbd4), UINT64_C(0x76f988da831153b5), - UINT64_C(0x983e5152ee66dfab), UINT64_C(0xa831c66d2db43210), - UINT64_C(0xb00327c898fb213f), UINT64_C(0xbf597fc7beef0ee4), - UINT64_C(0xc6e00bf33da88fc2), UINT64_C(0xd5a79147930aa725), - UINT64_C(0x06ca6351e003826f), UINT64_C(0x142929670a0e6e70), - UINT64_C(0x27b70a8546d22ffc), UINT64_C(0x2e1b21385c26c926), - UINT64_C(0x4d2c6dfc5ac42aed), UINT64_C(0x53380d139d95b3df), - UINT64_C(0x650a73548baf63de), UINT64_C(0x766a0abb3c77b2a8), - UINT64_C(0x81c2c92e47edaee6), UINT64_C(0x92722c851482353b), - UINT64_C(0xa2bfe8a14cf10364), UINT64_C(0xa81a664bbc423001), - UINT64_C(0xc24b8b70d0f89791), UINT64_C(0xc76c51a30654be30), - UINT64_C(0xd192e819d6ef5218), UINT64_C(0xd69906245565a910), - UINT64_C(0xf40e35855771202a), UINT64_C(0x106aa07032bbd1b8), - UINT64_C(0x19a4c116b8d2d0c8), UINT64_C(0x1e376c085141ab53), - UINT64_C(0x2748774cdf8eeb99), UINT64_C(0x34b0bcb5e19b48a8), - UINT64_C(0x391c0cb3c5c95a63), UINT64_C(0x4ed8aa4ae3418acb), - UINT64_C(0x5b9cca4f7763e373), UINT64_C(0x682e6ff3d6b2b8a3), - UINT64_C(0x748f82ee5defb2fc), UINT64_C(0x78a5636f43172f60), - UINT64_C(0x84c87814a1f0ab72), UINT64_C(0x8cc702081a6439ec), - UINT64_C(0x90befffa23631e28), UINT64_C(0xa4506cebde82bde9), - UINT64_C(0xbef9a3f7b2c67915), UINT64_C(0xc67178f2e372532b), - UINT64_C(0xca273eceea26619c), UINT64_C(0xd186b8c721c0c207), - UINT64_C(0xeada7dd6cde0eb1e), UINT64_C(0xf57d4f7fee6ed178), - UINT64_C(0x06f067aa72176fba), UINT64_C(0x0a637dc5a2c898a6), - UINT64_C(0x113f9804bef90dae), UINT64_C(0x1b710b35131c471b), - UINT64_C(0x28db77f523047d84), UINT64_C(0x32caab7b40c72493), - UINT64_C(0x3c9ebe0a15c9bebc), UINT64_C(0x431d67c49c100d4c), - UINT64_C(0x4cc5d4becb3e42b6), UINT64_C(0x597f299cfc657e2a), - UINT64_C(0x5fcb6fab3ad6faec), UINT64_C(0x6c44198c4a475817) -}; - -# define CH(x, y, z) (((x) & (y)) ^ (~(x) & (z))) -# define MAJ(x, y, z) (((x) & (y)) ^ ((x) & (z)) ^ ((y) & (z))) -# define BSIG0(x) (rotr64((x), 28) ^ rotr64((x), 34) ^ rotr64((x), 39)) -# define BSIG1(x) (rotr64((x), 14) ^ rotr64((x), 18) ^ rotr64((x), 41)) -# define SSIG0(x) (rotr64((x), 1) ^ rotr64((x), 8) ^ ((x) >> 7)) -# define SSIG1(x) (rotr64((x), 19) ^ rotr64((x), 61) ^ ((x) >> 6)) - -void cf_sha512_init(cf_sha512_context *ctx) -{ - memset(ctx, 0, sizeof *ctx); - ctx->H[0] = UINT64_C(0x6a09e667f3bcc908); - ctx->H[1] = UINT64_C(0xbb67ae8584caa73b); - ctx->H[2] = UINT64_C(0x3c6ef372fe94f82b); - ctx->H[3] = UINT64_C(0xa54ff53a5f1d36f1); - ctx->H[4] = UINT64_C(0x510e527fade682d1); - ctx->H[5] = UINT64_C(0x9b05688c2b3e6c1f); - ctx->H[6] = UINT64_C(0x1f83d9abfb41bd6b); - ctx->H[7] = UINT64_C(0x5be0cd19137e2179); -} - -void cf_sha384_init(cf_sha512_context *ctx) -{ - memset(ctx, 0, sizeof *ctx); - ctx->H[0] = UINT64_C(0xcbbb9d5dc1059ed8); - ctx->H[1] = UINT64_C(0x629a292a367cd507); - ctx->H[2] = UINT64_C(0x9159015a3070dd17); - ctx->H[3] = UINT64_C(0x152fecd8f70e5939); - ctx->H[4] = UINT64_C(0x67332667ffc00b31); - ctx->H[5] = UINT64_C(0x8eb44a8768581511); - ctx->H[6] = UINT64_C(0xdb0c2e0d64f98fa7); - ctx->H[7] = UINT64_C(0x47b5481dbefa4fa4); -} - -static void sha512_update_block(void *vctx, const uint8_t *inp) -{ - cf_sha512_context *ctx = vctx; - - uint64_t W[16]; - - uint64_t a = ctx->H[0], - b = ctx->H[1], - c = ctx->H[2], - d = ctx->H[3], - e = ctx->H[4], - f = ctx->H[5], - g = ctx->H[6], - h = ctx->H[7], - Wt; - - for (size_t t = 0; t < 80; t++) - { - if (t < 16) - { - W[t] = Wt = read64_be(inp); - inp += 8; - } else { - Wt = SSIG1(W[(t - 2) % 16]) + - W[(t - 7) % 16] + - SSIG0(W[(t - 15) % 16]) + - W[(t - 16) % 16]; - W[t % 16] = Wt; - } - - uint64_t T1 = h + BSIG1(e) + CH(e, f, g) + K[t] + Wt; - uint64_t T2 = BSIG0(a) + MAJ(a, b, c); - h = g; - g = f; - f = e; - e = d + T1; - d = c; - c = b; - b = a; - a = T1 + T2; - } - - ctx->H[0] += a; - ctx->H[1] += b; - ctx->H[2] += c; - ctx->H[3] += d; - ctx->H[4] += e; - ctx->H[5] += f; - ctx->H[6] += g; - ctx->H[7] += h; - - ctx->blocks++; -} - -void cf_sha512_update(cf_sha512_context *ctx, const void *data, size_t nbytes) -{ - cf_blockwise_accumulate(ctx->partial, &ctx->npartial, sizeof ctx->partial, - data, nbytes, - sha512_update_block, ctx); -} - -void cf_sha384_update(cf_sha512_context *ctx, const void *data, size_t nbytes) -{ - cf_sha512_update(ctx, data, nbytes); -} - -void cf_sha512_digest(const cf_sha512_context *ctx, uint8_t hash[CF_SHA512_HASHSZ]) -{ - /* We copy the context, so the finalisation doesn't effect the caller's - * context. This means the caller can do: - * - * x = init() - * x.update('hello') - * h1 = x.digest() - * x.update(' world') - * h2 = x.digest() - * - * to get h1 = H('hello') and h2 = H('hello world') - * - * This wouldn't work if we applied MD-padding to *ctx. - */ - - cf_sha512_context ours = *ctx; - cf_sha512_digest_final(&ours, hash); -} - -void cf_sha512_digest_final(cf_sha512_context *ctx, uint8_t hash[CF_SHA512_HASHSZ]) -{ - uint64_t digested_bytes = ctx->blocks; - digested_bytes = digested_bytes * CF_SHA512_BLOCKSZ + ctx->npartial; - uint64_t digested_bits = digested_bytes * 8; - - size_t padbytes = CF_SHA512_BLOCKSZ - ((digested_bytes + 16) % CF_SHA512_BLOCKSZ); - - /* Hash 0x80 00 ... block first. */ - cf_blockwise_acc_pad(ctx->partial, &ctx->npartial, sizeof ctx->partial, - 0x80, 0x00, 0x00, padbytes, - sha512_update_block, ctx); - - /* Now hash length (this is 128 bits long). */ - uint8_t buf[8]; - write64_be(0, buf); - cf_sha512_update(ctx, buf, 8); - write64_be(digested_bits, buf); - cf_sha512_update(ctx, buf, 8); - - /* We ought to have got our padding calculation right! */ - assert(ctx->npartial == 0); - - write64_be(ctx->H[0], hash + 0); - write64_be(ctx->H[1], hash + 8); - write64_be(ctx->H[2], hash + 16); - write64_be(ctx->H[3], hash + 24); - write64_be(ctx->H[4], hash + 32); - write64_be(ctx->H[5], hash + 40); - write64_be(ctx->H[6], hash + 48); - write64_be(ctx->H[7], hash + 56); - memset(ctx, 0, sizeof *ctx); -} - -void cf_sha384_digest(const cf_sha512_context *ctx, uint8_t hash[CF_SHA384_HASHSZ]) -{ - uint8_t full[CF_SHA512_HASHSZ]; - cf_sha512_digest(ctx, full); - memcpy(hash, full, CF_SHA384_HASHSZ); -} - -void cf_sha384_digest_final(cf_sha512_context *ctx, uint8_t hash[CF_SHA384_HASHSZ]) -{ - uint8_t full[CF_SHA512_HASHSZ]; - cf_sha512_digest_final(ctx, full); - memcpy(hash, full, CF_SHA384_HASHSZ); -} - -const cf_chash cf_sha384 = { - .hashsz = CF_SHA384_HASHSZ, - .blocksz = CF_SHA384_BLOCKSZ, - .init = (cf_chash_init) cf_sha384_init, - .update = (cf_chash_update) cf_sha384_update, - .digest = (cf_chash_digest) cf_sha384_digest -}; - -const cf_chash cf_sha512 = { - .hashsz = CF_SHA512_HASHSZ, - .blocksz = CF_SHA512_BLOCKSZ, - .init = (cf_chash_init) cf_sha512_init, - .update = (cf_chash_update) cf_sha512_update, - .digest = (cf_chash_digest) cf_sha512_digest -}; - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/tassert.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/tassert.h deleted file mode 100644 index 58ebb4c..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/tassert.h +++ /dev/null @@ -1,32 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef TASSERT_H -#define TASSERT_H - -/* Tiny assert - * ----------- - * - * This is an assert(3) definition which doesn't include any - * strings, but just branches to abort(3) on failure. - */ - -#ifndef FULL_FAT_ASSERT -# include <stdlib.h> -# define assert(expr) do { if (!(expr)) abort(); } while (0) -#else -# include <assert.h> -#endif - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testaes.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/testaes.c deleted file mode 100644 index 12543bb..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testaes.c +++ /dev/null @@ -1,258 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "aes.h" -#include "modes.h" -#include "bitops.h" -#include "gf128.h" - -#include "handy.h" -#include "cutest.h" -#include "testutil.h" - -static void test_memclean(void) -{ - uint8_t buf[32], buf2[32]; - memset(buf, 0xff, sizeof buf); - mem_clean(buf + 1, sizeof buf - 2); - TEST_CHECK(buf[0] == 0xff); - TEST_CHECK(buf[1] == 0x00); - TEST_CHECK(buf[16] == 0x00); - TEST_CHECK(buf[30] == 0x00); - TEST_CHECK(buf[31] == 0xff); - - memcpy(buf2, buf, sizeof buf); - TEST_CHECK(buf2[0] == 0xff); - TEST_CHECK(buf2[1] == 0x00); - TEST_CHECK(buf2[16] == 0x00); - TEST_CHECK(buf2[30] == 0x00); - TEST_CHECK(buf2[31] == 0xff); - - memset(buf2, 0xee, sizeof buf); - TEST_CHECK(buf2[0] == 0xee); - TEST_CHECK(buf2[1] == 0xee); - TEST_CHECK(buf2[2] == 0xee); - TEST_CHECK(buf2[3] == 0xee); - TEST_CHECK(buf2[30] == 0xee); - TEST_CHECK(buf2[31] == 0xee); -} - -static void test_bitops_select(void) -{ - uint8_t tab8[8]; - uint32_t tab32[32]; - - for (size_t i = 0; i < 8; i++) - tab8[i] = 1 << i; - for (size_t i = 0; i < 32; i++) - tab32[i] = 1 << i; - - for (size_t i = 0; i < 8; i++) - { - TEST_CHECK(select_u8(i, tab8, 8) == tab8[i]); - } - - for (size_t i = 0; i < 32; i++) - { - TEST_CHECK(select_u32(i, tab32, 32) == tab32[i]); - } -} - -static void test_bitops_incr(void) -{ - uint8_t buf[4]; - -#define CHECK_BE(start, add, end) \ - { \ - write32_be((start), buf); \ - for (size_t i = 0; i < (add); i++) \ - incr_be(buf, sizeof buf); \ - TEST_CHECK(read32_be(buf) == (end)); \ - } - -#define CHECK_LE(start, add, end) \ - { \ - write32_le((start), buf); \ - for (size_t i = 0; i < (add); i++) \ - incr_le(buf, sizeof buf); \ - TEST_CHECK(read32_le(buf) == (end)); \ - } - - CHECK_BE(0, 1, 1); - CHECK_BE(0, 256, 256); - CHECK_BE(256, 256, 512); - CHECK_BE(0xffffffff, 1, 0); - - CHECK_LE(0, 1, 1); - CHECK_LE(0, 256, 256); - CHECK_LE(0x7fffffff, 1, 0x80000000); - CHECK_LE(0xffffffff, 1, 0); - -#undef CHECK_BE -#undef CHECK_LE -} - -static void test_bitops_unaligned(void) -{ - uint8_t in[4], out[4]; - -#define CHECK(outw, len, offs) \ - { \ - memset(out, 0, sizeof out); \ - copy_bytes_unaligned(out, in, len, offs); \ - TEST_CHECK(read32_be(out) == (outw)); \ - } - - write32_be(0x11223344, in); - - CHECK(0x11223344, 4, 0); - CHECK(0x22446600, 3, 1); - CHECK(0x4488cd00, 3, 2); - CHECK(0x89119a00, 3, 3); - CHECK(0x12233400, 3, 4); - CHECK(0x24466800, 3, 5); - CHECK(0x488cd100, 3, 6); - CHECK(0x9119a200, 3, 7); - CHECK(0x22334400, 3, 8); - CHECK(0x44660000, 2, 9); - CHECK(0x33440000, 2, 16); - -#undef CHECK -} - -static void test_expand(const uint8_t *key, size_t nkey, - const uint32_t *answer, size_t roundkeys) -{ - cf_aes_context ctx; - - cf_aes_init(&ctx, key, nkey); - - for (size_t i = 0; i < roundkeys; i++) - { - TEST_CHECK(ctx.ks[i] == answer[i]); - } -} - -static void test_expand_128(void) -{ - /* This is FIPS-197 appendix A.1. */ - const uint8_t key[] = { - 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, - 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c - }; - - const uint32_t answer[] = { - 0x2b7e1516, 0x28aed2a6, 0xabf71588, 0x09cf4f3c, 0xa0fafe17, 0x88542cb1, - 0x23a33939, 0x2a6c7605, 0xf2c295f2, 0x7a96b943, 0x5935807a, 0x7359f67f, - 0x3d80477d, 0x4716fe3e, 0x1e237e44, 0x6d7a883b, 0xef44a541, 0xa8525b7f, - 0xb671253b, 0xdb0bad00, 0xd4d1c6f8, 0x7c839d87, 0xcaf2b8bc, 0x11f915bc, - 0x6d88a37a, 0x110b3efd, 0xdbf98641, 0xca0093fd, 0x4e54f70e, 0x5f5fc9f3, - 0x84a64fb2, 0x4ea6dc4f, 0xead27321, 0xb58dbad2, 0x312bf560, 0x7f8d292f, - 0xac7766f3, 0x19fadc21, 0x28d12941, 0x575c006e, 0xd014f9a8, 0xc9ee2589, - 0xe13f0cc8, 0xb6630ca6 - }; - - test_expand(key, sizeof key, answer, ARRAYCOUNT(answer)); -} - -static void test_expand_192(void) -{ - /* This is FIPS-197 appendix A.2. */ - const uint8_t key[] = { - 0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52, 0xc8, 0x10, 0xf3, 0x2b, - 0x80, 0x90, 0x79, 0xe5, 0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b - }; - - const uint32_t answer[] = { - 0x8e73b0f7, 0xda0e6452, 0xc810f32b, 0x809079e5, 0x62f8ead2, 0x522c6b7b, - 0xfe0c91f7, 0x2402f5a5, 0xec12068e, 0x6c827f6b, 0x0e7a95b9, 0x5c56fec2, - 0x4db7b4bd, 0x69b54118, 0x85a74796, 0xe92538fd, 0xe75fad44, 0xbb095386, - 0x485af057, 0x21efb14f, 0xa448f6d9, 0x4d6dce24, 0xaa326360, 0x113b30e6, - 0xa25e7ed5, 0x83b1cf9a, 0x27f93943, 0x6a94f767, 0xc0a69407, 0xd19da4e1, - 0xec1786eb, 0x6fa64971, 0x485f7032, 0x22cb8755, 0xe26d1352, 0x33f0b7b3, - 0x40beeb28, 0x2f18a259, 0x6747d26b, 0x458c553e, 0xa7e1466c, 0x9411f1df, - 0x821f750a, 0xad07d753, 0xca400538, 0x8fcc5006, 0x282d166a, 0xbc3ce7b5, - 0xe98ba06f, 0x448c773c, 0x8ecc7204, 0x01002202 - }; - - test_expand(key, sizeof key, answer, ARRAYCOUNT(answer)); -} - -static void test_expand_256(void) -{ - /* And this is A.3. */ - const uint8_t key[] = { - 0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, 0x2b, 0x73, 0xae, 0xf0, - 0x85, 0x7d, 0x77, 0x81, 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, - 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4 - }; - - const uint32_t answer[] = { - 0x603deb10, 0x15ca71be, 0x2b73aef0, 0x857d7781, 0x1f352c07, 0x3b6108d7, - 0x2d9810a3, 0x0914dff4, 0x9ba35411, 0x8e6925af, 0xa51a8b5f, 0x2067fcde, - 0xa8b09c1a, 0x93d194cd, 0xbe49846e, 0xb75d5b9a, 0xd59aecb8, 0x5bf3c917, - 0xfee94248, 0xde8ebe96, 0xb5a9328a, 0x2678a647, 0x98312229, 0x2f6c79b3, - 0x812c81ad, 0xdadf48ba, 0x24360af2, 0xfab8b464, 0x98c5bfc9, 0xbebd198e, - 0x268c3ba7, 0x09e04214, 0x68007bac, 0xb2df3316, 0x96e939e4, 0x6c518d80, - 0xc814e204, 0x76a9fb8a, 0x5025c02d, 0x59c58239, 0xde136967, 0x6ccc5a71, - 0xfa256395, 0x9674ee15, 0x5886ca5d, 0x2e2f31d7, 0x7e0af1fa, 0x27cf73c3, - 0x749c47ab, 0x18501dda, 0xe2757e4f, 0x7401905a, 0xcafaaae3, 0xe4d59b34, - 0x9adf6ace, 0xbd10190d, 0xfe4890d1, 0xe6188d0b, 0x046df344, 0x706c631e - }; - - test_expand(key, sizeof key, answer, ARRAYCOUNT(answer)); -} - -static void vector(const char *input, const char *output, - const char *key) -{ - uint8_t keybuf[32], inbuf[16], outbuf[16], tmp[16]; - size_t nkey = sizeof keybuf; - cf_aes_context ctx; - - nkey = unhex(keybuf, 32, key); - unhex(inbuf, 16, input); - unhex(outbuf, 16, output); - - cf_aes_init(&ctx, keybuf, nkey); - cf_aes_encrypt(&ctx, inbuf, tmp); - TEST_CHECK(memcmp(tmp, outbuf, 16) == 0); - - cf_aes_decrypt(&ctx, outbuf, tmp); - TEST_CHECK(memcmp(tmp, inbuf, 16) == 0); - cf_aes_finish(&ctx); -} - -static void test_vectors(void) -{ - vector("00112233445566778899aabbccddeeff", "69c4e0d86a7b0430d8cdb78070b4c55a", - "000102030405060708090a0b0c0d0e0f"); - vector("00112233445566778899aabbccddeeff", "dda97ca4864cdfe06eaf70a0ec0d7191", - "000102030405060708090a0b0c0d0e0f1011121314151617"); - vector("00112233445566778899aabbccddeeff", "8ea2b7ca516745bfeafc49904b496089", - "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f"); -} - -TEST_LIST = { - { "handy-memclean", test_memclean }, - { "bitops-select", test_bitops_select }, - { "bitops-incr", test_bitops_incr }, - { "bitops-unaligned", test_bitops_unaligned }, - { "key-expansion-128", test_expand_128 }, - { "key-expansion-192", test_expand_192 }, - { "key-expansion-256", test_expand_256 }, - { "vectors", test_vectors }, - { 0 } -}; - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testchacha20poly1305.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/testchacha20poly1305.c deleted file mode 100644 index f1b53e6..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testchacha20poly1305.c +++ /dev/null @@ -1,91 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "chacha20poly1305.h" -#include "handy.h" -#include "cutest.h" -#include "testutil.h" - -static void vector(const char *keystr, - const char *noncestr, - const char *headerstr, - const char *plainstr, - const char *cipherstr, - const char *tagstr) -{ - /* inputs */ - uint8_t K[32], N[12], H[12], A[16]; - uint8_t C[265], P[265]; - - unhex(K, sizeof K, keystr); - unhex(N, sizeof N, noncestr); - size_t headerlen = unhex(H, sizeof H, headerstr); - size_t plainlen = unhex(P, sizeof P, plainstr); - size_t cipherlen = unhex(C, sizeof C, cipherstr); - unhex(A, sizeof A, tagstr); - - assert(cipherlen == plainlen); - - /* working data */ - uint8_t out[265], ourtag[16]; - - /* check encryption works. */ - cf_chacha20poly1305_encrypt(K, N, - H, headerlen, - P, plainlen, - out, ourtag); - - TEST_CHECK(memcmp(out, C, cipherlen) == 0); - TEST_CHECK(memcmp(ourtag, A, sizeof A) == 0); - - /* proper decryption */ - TEST_CHECK(0 == cf_chacha20poly1305_decrypt(K, N, - H, headerlen, - C, cipherlen, - A, out)); - TEST_CHECK(0 == memcmp(out, P, plainlen)); - - /* failure decryption */ - C[0] ^= 0xff; - - TEST_CHECK(1 == cf_chacha20poly1305_decrypt(K, N, - H, headerlen, - C, cipherlen, - A, out)); -} - -static void test_vectors(void) -{ - /* Test vector from section 2.8.2. */ - vector("808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9f", - "070000004041424344454647", - "50515253c0c1c2c3c4c5c6c7", - "4c616469657320616e642047656e746c656d656e206f662074686520636c617373206f66202739393a204966204920636f756c64206f6666657220796f75206f6e6c79206f6e652074697020666f7220746865206675747572652c2073756e73637265656e20776f756c642062652069742e", - "d31a8d34648e60db7b86afbc53ef7ec2a4aded51296e08fea9e2b5a736ee62d63dbea45e8ca9671282fafb69da92728b1a71de0a9e060b2905d6a5b67ecd3b3692ddbd7f2d778b8c9803aee328091b58fab324e4fad675945585808b4831d7bc3ff4def08e4b7a9de576d26586cec64b6116", - "1ae10b594f09e26a7e902ecbd0600691"); - - /* Test vector from A.5. */ - vector("1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0", - "000000000102030405060708", - "f33388860000000000004e91", - "496e7465726e65742d4472616674732061726520647261667420646f63756d656e74732076616c696420666f722061206d6178696d756d206f6620736978206d6f6e74687320616e64206d617920626520757064617465642c207265706c616365642c206f72206f62736f6c65746564206279206f7468657220646f63756d656e747320617420616e792074696d652e20497420697320696e617070726f70726961746520746f2075736520496e7465726e65742d447261667473206173207265666572656e6365206d6174657269616c206f7220746f2063697465207468656d206f74686572207468616e206173202fe2809c776f726b20696e2070726f67726573732e2fe2809d", - "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", - "eead9d67890cbb22392336fea1851f38"); -} - -TEST_LIST = { - { "vectors", test_vectors }, - { 0 } -}; - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testcurve25519.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/testcurve25519.c deleted file mode 100644 index a0ab8db..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testcurve25519.c +++ /dev/null @@ -1,56 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "curve25519.h" -#include "handy.h" -#include "cutest.h" -#include "testutil.h" - -static void test_base_mul(void) -{ - uint8_t secret[32]; - uint8_t public[32]; - uint8_t expect[32]; - - unhex(secret, 32, "77076d0a7318a57d3c16c17251b26645df4c2f87ebc0992ab177fba51db92c2a"); - unhex(expect, 32, "8520f0098930a754748b7ddcb43ef75a0dbf3a0d26381af4eba4a98eaa9b4e6a"); - cf_curve25519_mul_base(public, secret); - TEST_CHECK(memcmp(expect, public, 32) == 0); - - unhex(secret, 32, "5dab087e624a8a4b79e17f8b83800ee66f3bb1292618b6fd1c2f8b27ff88e0eb"); - unhex(expect, 32, "de9edb7d7b7dc1b4d35b61c2ece435373f8343c85b78674dadfc7e146f882b4f"); - cf_curve25519_mul_base(public, secret); - TEST_CHECK(memcmp(expect, public, 32) == 0); -} - -static void test_mul(void) -{ - uint8_t scalar[32]; - uint8_t public[32]; - uint8_t shared[32]; - uint8_t expect[32]; - - unhex(scalar, 32, "77076d0a7318a57d3c16c17251b26645df4c2f87ebc0992ab177fba51db92c2a"); - unhex(public, 32, "de9edb7d7b7dc1b4d35b61c2ece435373f8343c85b78674dadfc7e146f882b4f"); - unhex(expect, 32, "4a5d9d5ba4ce2de1728e3bf480350f25e07e21c947d19e3376f09b3c1e161742"); - cf_curve25519_mul(shared, scalar, public); - TEST_CHECK(memcmp(expect, shared, 32) == 0); -} - -TEST_LIST = { - { "base-mul", test_base_mul }, - { "mul", test_mul }, - { 0 } -}; - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testdrbg.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/testdrbg.c deleted file mode 100644 index 253c8c0..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testdrbg.c +++ /dev/null @@ -1,206 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2016 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "drbg.h" -#include "sha1.h" -#include "sha2.h" - -#include "handy.h" -#include "cutest.h" -#include "testutil.h" - -static void test_hashdrbg_sha256_vector(void) -{ - uint8_t entropy[32], nonce[16], persn[32], reseed[32], got[128], expect[128]; - - /* This is the first KAT from NIST's CAVP example - * file for SHA-256 with all inputs used; line 4360. */ - unhex(entropy, sizeof entropy, "b87bb4de5c148d964fc0cb612d69295671780b4270fe32bf389b6f49488efe13"); - unhex(nonce, sizeof nonce, "27eb37a0c695c4ee3c9b70b7f6b33492"); - unhex(persn, sizeof persn, "52321406ac8a9c266b1f8d811bb871269e5824b59a0234f01d358193523bbb7c"); - unhex(reseed, sizeof reseed, "7638267f534c4e6ee22cc6ca6ed824fd5d3d387c00b89dd791eb5ac9766385b8"); - - unhex(expect, sizeof expect, "de01c061651bab3cef2fc4ea89a56b6e86e74b2e9fd11ed671c97c813778a06a2c1f41b41e754a5257750c6bde9601da9d67d8d9564f4a8538b92516a2dacc496dee257b85393f2a01ad59aa3257f1b6da9566e3706d2d6d4a26e511b0c64d7dc223acb24827178afa43ca8d5a66f983d6929dc61564c4c14fc32d85765a23f7"); - - cf_hash_drbg_sha256 ctx; - cf_hash_drbg_sha256_init(&ctx, entropy, sizeof entropy, nonce, sizeof nonce, persn, sizeof persn); - cf_hash_drbg_sha256_reseed(&ctx, reseed, sizeof reseed, NULL, 0); - cf_hash_drbg_sha256_gen(&ctx, got, sizeof got); - cf_hash_drbg_sha256_gen(&ctx, got, sizeof got); - TEST_CHECK(memcmp(got, expect, sizeof got) == 0); - - /* This is line 5064 from Hash_DRBG.rsp */ - unhex(entropy, sizeof entropy, "63363377e41e86468deb0ab4a8ed683f6a134e47e014c700454e81e95358a569"); - unhex(nonce, sizeof nonce, "808aa38f2a72a62359915a9f8a04ca68"); - /* no persn */ - unhex(reseed, sizeof reseed, "e62b8a8ee8f141b6980566e3bfe3c04903dad4ac2cdf9f2280010a6739bc83d3"); - unhex(expect, sizeof expect, "04eec63bb231df2c630a1afbe724949d005a587851e1aa795e477347c8b056621c18bddcdd8d99fc5fc2b92053d8cfacfb0bb8831205fad1ddd6c071318a6018f03b73f5ede4d4d071f9de03fd7aea105d9299b8af99aa075bdb4db9aa28c18d174b56ee2a014d098896ff2282c955a81969e069fa8ce007a180183a07dfae17"); - - cf_hash_drbg_sha256_init(&ctx, entropy, sizeof entropy, nonce, sizeof nonce, NULL, 0); - cf_hash_drbg_sha256_reseed(&ctx, reseed, sizeof reseed, NULL, 0); - cf_hash_drbg_sha256_gen(&ctx, got, sizeof got); - cf_hash_drbg_sha256_gen(&ctx, got, sizeof got); - TEST_CHECK(memcmp(got, expect, sizeof got) == 0); -} - -static void test_hashdrbg_sha256_vector_addnl(void) -{ - uint8_t entropy[32], nonce[16], reseed[32], got[128], expect[128], addnl[32]; - - /* Hash_DRBG.rsp, line 5230. No personlisation string, but with additional data. */ - unhex(entropy, sizeof entropy, "9cfb7ad03be487a3b42be06e9ae44f283c2b1458cec801da2ae6532fcb56cc4c"); - unhex(nonce, sizeof nonce, "a20765538e8db31295747ec922c13a69"); - unhex(reseed, sizeof reseed, "96bc8014f90ebdf690db0e171b59cc46c75e2e9b8e1dc699c65c03ceb2f4d7dc"); - unhex(expect, sizeof expect, "71c1154a2a7a3552413970bf698aa02f14f8ea95e861f801f463be27868b1b14b1b4babd9eba5915a6414ab1104c8979b1918f3094925aeab0d07d2037e613b63cbd4f79d9f95c84b47ed9b77230a57515c211f48f4af6f5edb2c308b33905db308cf88f552c8912c49b34e66c026e67b302ca65b187928a1aba9a49edbfe190"); - - cf_hash_drbg_sha256 ctx; - cf_hash_drbg_sha256_init(&ctx, entropy, sizeof entropy, nonce, sizeof nonce, NULL, 0); - unhex(addnl, sizeof addnl, "6fea0894052dab3c44d503950c7c72bd7b87de87cb81d3bb51c32a62f742286d"); - cf_hash_drbg_sha256_reseed(&ctx, reseed, sizeof reseed, addnl, sizeof addnl); - unhex(addnl, sizeof addnl, "d3467c78563b74c13db7af36c2a964820f2a9b1b167474906508fdac9b2049a6"); - cf_hash_drbg_sha256_gen_additional(&ctx, addnl, sizeof addnl, got, sizeof got); - unhex(addnl, sizeof addnl, "5840a11cc9ebf77b963854726a826370ffdb2fc2b3d8479e1df5dcfa3dddd10b"); - cf_hash_drbg_sha256_gen_additional(&ctx, addnl, sizeof addnl, got, sizeof got); - TEST_CHECK(memcmp(got, expect, sizeof got) == 0); -} - -static void test_hmacdrbg_sha1_vector(void) -{ - uint8_t entropy[16], nonce[8], reseed[16], got[80], expect[80]; - - /* HMAC_DRBG.rsp, line 8. */ - unhex(entropy, sizeof entropy, "79349bbf7cdda5799557866621c91383"); - unhex(nonce, sizeof nonce, "1146733abf8c35c8"); - unhex(reseed, sizeof reseed, "c7215b5b96c48e9b338c74e3e99dfedf"); - unhex(expect, sizeof expect, "c6a16ab8d420706f0f34ab7fec5adca9d8ca3a133e159ca6ac43c6f8a2be22834a4c0a0affb10d7194f1c1a5cf7322ec1ae0964ed4bf122746e087fdb5b3e91b3493d5bb98faed49e85f130fc8a459b7"); - - cf_hmac_drbg ctx; - cf_hmac_drbg_init(&ctx, &cf_sha1, entropy, sizeof entropy, nonce, sizeof nonce, NULL, 0); - cf_hmac_drbg_reseed(&ctx, reseed, sizeof reseed, NULL, 0); - cf_hmac_drbg_gen(&ctx, got, sizeof got); - cf_hmac_drbg_gen(&ctx, got, sizeof got); - TEST_CHECK(memcmp(got, expect, sizeof got) == 0); -} - -static void test_hmacdrbg_sha1_vector_addnl(void) -{ - uint8_t entropy[16], nonce[8], reseed[16], got[80], expect[80], addnl[16]; - - /* HMAC_DRBG.rsp, line 174. */ - unhex(entropy, sizeof entropy, "7d7052a776fd2fb3d7191f733304ee8b"); - unhex(nonce, sizeof nonce, "be4a0ceedca80207"); - unhex(reseed, sizeof reseed, "49047e879d610955eed916e4060e00c9"); - unhex(expect, sizeof expect, "a736343844fc92511391db0addd9064dbee24c8976aa259a9e3b6368aa6de4c9bf3a0effcda9cb0e9dc33652ab58ecb7650ed80467f76a849fb1cfc1ed0a09f7155086064db324b1e124f3fc9e614fcb"); - - cf_hmac_drbg ctx; - cf_hmac_drbg_init(&ctx, &cf_sha1, entropy, sizeof entropy, nonce, sizeof nonce, NULL, 0); - unhex(addnl, sizeof addnl, "fd8bb33aab2f6cdfbc541811861d518d"); - cf_hmac_drbg_reseed(&ctx, reseed, sizeof reseed, addnl, sizeof addnl); - unhex(addnl, sizeof addnl, "99afe347540461ddf6abeb491e0715b4"); - cf_hmac_drbg_gen_additional(&ctx, addnl, sizeof addnl, got, sizeof got); - unhex(addnl, sizeof addnl, "02f773482dd7ae66f76e381598a64ef0"); - cf_hmac_drbg_gen_additional(&ctx, addnl, sizeof addnl, got, sizeof got); - TEST_CHECK(memcmp(got, expect, sizeof got) == 0); -} - -static void test_hmacdrbg_sha256_vector(void) -{ - uint8_t entropy[32], nonce[16], reseed[32], got[128], expect[128]; - - /* HMAC_DRBG.rsp, line 5064. */ - unhex(entropy, sizeof entropy, "06032cd5eed33f39265f49ecb142c511da9aff2af71203bffaf34a9ca5bd9c0d"); - unhex(nonce, sizeof nonce, "0e66f71edc43e42a45ad3c6fc6cdc4df"); - unhex(reseed, sizeof reseed, "01920a4e669ed3a85ae8a33b35a74ad7fb2a6bb4cf395ce00334a9c9a5a5d552"); - unhex(expect, sizeof expect, "76fc79fe9b50beccc991a11b5635783a83536add03c157fb30645e611c2898bb2b1bc215000209208cd506cb28da2a51bdb03826aaf2bd2335d576d519160842e7158ad0949d1a9ec3e66ea1b1a064b005de914eac2e9d4f2d72a8616a80225422918250ff66a41bd2f864a6a38cc5b6499dc43f7f2bd09e1e0f8f5885935124"); - - cf_hmac_drbg ctx; - cf_hmac_drbg_init(&ctx, &cf_sha256, entropy, sizeof entropy, nonce, sizeof nonce, NULL, 0); - cf_hmac_drbg_reseed(&ctx, reseed, sizeof reseed, NULL, 0); - cf_hmac_drbg_gen(&ctx, got, sizeof got); - cf_hmac_drbg_gen(&ctx, got, sizeof got); - TEST_CHECK(memcmp(got, expect, sizeof got) == 0); -} - -static void test_hmacdrbg_sha256_vector_addnl(void) -{ - uint8_t entropy[32], nonce[16], reseed[32], got[128], expect[128], addnl[32]; - - /* HMAC_DRBG.rsp, line 5230. */ - unhex(entropy, sizeof entropy, "05ac9fc4c62a02e3f90840da5616218c6de5743d66b8e0fbf833759c5928b53d"); - unhex(nonce, sizeof nonce, "2b89a17904922ed8f017a63044848545"); - unhex(reseed, sizeof reseed, "2791126b8b52ee1fd9392a0a13e0083bed4186dc649b739607ac70ec8dcecf9b"); - unhex(expect, sizeof expect, "02ddff5173da2fcffa10215b030d660d61179e61ecc22609b1151a75f1cbcbb4363c3a89299b4b63aca5e581e73c860491010aa35de3337cc6c09ebec8c91a6287586f3a74d9694b462d2720ea2e11bbd02af33adefb4a16e6b370fa0effd57d607547bdcfbb7831f54de7073ad2a7da987a0016a82fa958779a168674b56524"); - - cf_hmac_drbg ctx; - cf_hmac_drbg_init(&ctx, &cf_sha256, entropy, sizeof entropy, nonce, sizeof nonce, NULL, 0); - unhex(addnl, sizeof addnl, "43bac13bae715092cf7eb280a2e10a962faf7233c41412f69bc74a35a584e54c"); - cf_hmac_drbg_reseed(&ctx, reseed, sizeof reseed, addnl, sizeof addnl); - unhex(addnl, sizeof addnl, "3f2fed4b68d506ecefa21f3f5bb907beb0f17dbc30f6ffbba5e5861408c53a1e"); - cf_hmac_drbg_gen_additional(&ctx, addnl, sizeof addnl, got, sizeof got); - unhex(addnl, sizeof addnl, "529030df50f410985fde068df82b935ec23d839cb4b269414c0ede6cffea5b68"); - cf_hmac_drbg_gen_additional(&ctx, addnl, sizeof addnl, got, sizeof got); - TEST_CHECK(memcmp(got, expect, sizeof got) == 0); -} - -static void test_hmacdrbg_sha512_vector(void) -{ - uint8_t entropy[32], nonce[16], reseed[32], got[256], expect[256]; - - /* HMAC_DRBG.rsp, line 10120. */ - unhex(entropy, sizeof entropy, "48c121b18733af15c27e1dd9ba66a9a81a5579cdba0f5b657ec53c2b9e90bbf6"); - unhex(nonce, sizeof nonce, "bbb7c777428068fad9970891f879b1af"); - unhex(reseed, sizeof reseed, "e0ffefdadb9ccf990504d568bdb4d862cbe17ccce6e22dfcab8b4804fd21421a"); - unhex(expect, sizeof expect, "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"); - - cf_hmac_drbg ctx; - cf_hmac_drbg_init(&ctx, &cf_sha512, entropy, sizeof entropy, nonce, sizeof nonce, NULL, 0); - cf_hmac_drbg_reseed(&ctx, reseed, sizeof reseed, NULL, 0); - cf_hmac_drbg_gen(&ctx, got, sizeof got); - cf_hmac_drbg_gen(&ctx, got, sizeof got); - TEST_CHECK(memcmp(got, expect, sizeof got) == 0); -} - -static void test_hmacdrbg_sha512_vector_addnl(void) -{ - uint8_t entropy[32], nonce[16], reseed[32], got[256], expect[256], addnl[32]; - - /* HMAC_DRBG.rsp, line 10286. */ - unhex(entropy, sizeof entropy, "4686a959e17dfb96c294b09c0f7a60efb386416cfb4c8972bcc55e44a151607a"); - unhex(nonce, sizeof nonce, "5226543b4c89321bbfb0f11f18ee3462"); - unhex(reseed, sizeof reseed, "5ef50daaf29929047870235c17762f5df5d9ab1af656e0e215fcc6fd9fc0d85d"); - unhex(expect, sizeof expect, "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"); - - cf_hmac_drbg ctx; - cf_hmac_drbg_init(&ctx, &cf_sha512, entropy, sizeof entropy, nonce, sizeof nonce, NULL, 0); - unhex(addnl, sizeof addnl, "d2383c3e528492269e6c3b3aaa2b54fbf48731f5aa52150ce7fc644679a5e7c6"); - cf_hmac_drbg_reseed(&ctx, reseed, sizeof reseed, addnl, sizeof addnl); - unhex(addnl, sizeof addnl, "c841e7a2d9d13bdb8644cd7f5d91d241a369e12dc6c9c2be50d1ed29484bff98"); - cf_hmac_drbg_gen_additional(&ctx, addnl, sizeof addnl, got, sizeof got); - unhex(addnl, sizeof addnl, "9054cf9216af66a788d3bf6757b8987e42d4e49b325e728dc645d5e107048245"); - cf_hmac_drbg_gen_additional(&ctx, addnl, sizeof addnl, got, sizeof got); - TEST_CHECK(memcmp(got, expect, sizeof got) == 0); -} - -TEST_LIST = { - { "hashdrbg-sha256", test_hashdrbg_sha256_vector }, - { "hashdrbg-sha256-addnl", test_hashdrbg_sha256_vector_addnl }, - { "hmacdrbg-sha1", test_hmacdrbg_sha1_vector }, - { "hmacdrbg-sha1-addnl", test_hmacdrbg_sha1_vector_addnl }, - { "hmacdrbg-sha256", test_hmacdrbg_sha256_vector }, - { "hmacdrbg-sha256-addnl", test_hmacdrbg_sha256_vector_addnl }, - { "hmacdrbg-sha512", test_hmacdrbg_sha512_vector }, - { "hmacdrbg-sha512-addnl", test_hmacdrbg_sha512_vector_addnl }, - { 0 } -}; - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testmodes.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/testmodes.c deleted file mode 100644 index ed96dde..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testmodes.c +++ /dev/null @@ -1,890 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "aes.h" -#include "modes.h" -#include "bitops.h" -#include "gf128.h" - -#include "handy.h" -#include "cutest.h" -#include "testutil.h" - -/* Some tests are too big for microcontrollers. */ -#if defined(CORTEX_M0) || defined(CORTEX_M3) || defined(CORTEX_M4) -# define MCU_TARGET 1 -#else -# define MCU_TARGET 0 -#endif - -static void test_cbc(void) -{ - uint8_t out[16]; - - const void *iv = "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"; - const void *key = "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c"; - const void *inp = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"; - const void *expect = "\x76\x49\xab\xac\x81\x19\xb2\x46\xce\xe9\x8e\x9b\x12\xe9\x19\x7d"; - - cf_aes_context aes; - cf_aes_init(&aes, key, 16); - - cf_cbc cbc; - cf_cbc_init(&cbc, &cf_aes, &aes, iv); - cf_cbc_encrypt(&cbc, inp, out, 1); - TEST_CHECK(memcmp(out, expect, 16) == 0); - - uint8_t decrypt[16]; - cf_cbc_init(&cbc, &cf_aes, &aes, iv); - cf_cbc_decrypt(&cbc, out, decrypt, 1); - TEST_CHECK(memcmp(decrypt, inp, 16) == 0); -} - -static void cbcmac_vector(const void *tag_expect, size_t ntag, - const void *key, size_t nkey, - const void *msg, size_t nmsg) -{ - uint8_t tag[16]; - - cf_aes_context aes; - cf_aes_init(&aes, key, nkey); - - cf_cbcmac_stream cm; - cf_cbcmac_stream_init(&cm, &cf_aes, &aes); - cf_cbcmac_stream_update(&cm, msg, nmsg); - cf_cbcmac_stream_pad_final(&cm, tag); - - TEST_CHECK(sizeof tag == ntag); - TEST_CHECK(memcmp(tag, tag_expect, sizeof tag) == 0); -} - -static void test_cbcmac(void) -{ - cbcmac_vector("\xf0\xf1\x89\x75\xa0\x85\x9d\x13\xa4\x9d\x3d\xbf\xc6\xcd\x65\xd9", 16, "\x04\xf7\xf7\x78\x62\x1d\x1e\x2c\x86\x47\x82\x2a\x50\xd9\x8a\x83", 16, "\x83\x1b\xe7\x4b\x9b\xe6\x85\xc8\x38\xe2\x2a\x25\xa3\x11\xcb\x14\x79\x62\x35\xf5\x28\x98\xd0", 23); - cbcmac_vector("\x0d\x6a\x13\x8f\x75\xb7\x56\x94\xd5\x15\xc5\x55\x5e\xee\xdd\x92", 16, "\xff\x84\x5a\xfc\x51\xf2\x06\x35\xa4\x8f\x6c\xec\x9f\x78\x1f\x2e", 16, "\xc5\x85\x3e\x6b\x3f\x7e\xf5\x10\x93\x6e\x30\xd5\x54\x13\x5f\x0d\x55\x43\x92\x8c\x53\xfc\x2f\x81\xa3", 25); - cbcmac_vector("\x96\x81\x3d\xb1\x7e\xac\x06\xb9\x79\x42\xa7\x3a\x7c\x5a\x0a\xad", 16, "\x10\x77\x16\x47\x23\x2e\xda\x40\x23\xd7\xc5\xc9\xbb\x51\x2e\x93", 16, "\x06\x53\x5f\x70\xd9\x6c\x80\x50\x85\x6b\x02\x4f\x67\xae\x87\xde\xc8\xd2\x9d\xab\xb7\x1f\x55\x93\x51\x00\x0a\x3c\x8f\xfc\x63\x60", 32); - cbcmac_vector("\x20\xdd\xa5\xb1\xc1\x14\x00\x90\x97\x41\xef\x3b\xc6\xac\xe8\xec", 16, "\x5b\x39\xdb\x4b\xa4\x53\x1f\x97\xf9\xca\x4b\xdd\xed\x9b\x28\x53", 16, "\x49\x91\xb3\x35\x40\xda\x4d\x8a\xdf\xe9\x37\x4b\xb4\xe1\xc5", 15); - cbcmac_vector("\xc0\x2f\x8f\x0a\xba\x13\x4b\x6b\x16\x69\xfb\x58\x2f\xc1\xc8\x76", 16, "\xd0\x22\xc7\xe7\x85\xd2\xfc\xa4\xd6\x7f\xaa\x18\xb1\xa9\xfd\x9d\x7a\x47\x37\x09\x33\x43\x06\x32", 24, "\x2b\xa2\x8e\xa5\x62\xdd\x9c\x5e\x80\xcc\xaf\x80\x16\x77", 14); - cbcmac_vector("\x05\x79\x4b\x5f\xc8\xf2\xee\x87\x74\xcd\x88\x9f\x7c\x29\xeb\xa0", 16, "\xe4\x51\xdb\x26\x8e\x2a\x26\xd1\xbf\x78\x3e\xab\x5d\xc6\xf9\x3f\xb2\xc5\xe2\x5c\xe8\x61\x28\x3c", 24, "\xea\x14\xfa\xaa\x95\x48\x12\xcb", 8); - cbcmac_vector("\x6a\x14\x4b\xaa\x39\xf6\x19\x71\x62\x65\xd3\x4e\x53\xb4\xc6\x7c", 16, "\xff\x46\x38\x0f\x62\xa9\x37\x7f\xb2\x41\x88\x44\x39\x2a\x97\xf5\xb9\x9a\xc0\x37\xf9\xc6\x75\x3f", 24, "\x64\x04\x53\x4c\xa8\x0a\x60\xf6\x5e\x22\xb6\xc4\xd7\xf3\xa9\x33\xf9\x3e", 18); - cbcmac_vector("\xf7\x1d\x16\x5c\xba\xac\x0f\xf0\x1a\x12\x75\xf8\x5b\x6a\x8e\x15", 16, "\x67\xce\x47\x6c\x11\x0e\xa1\xbc\xf0\x81\x30\x2b\x5f\xe2\x3b\xbc\x34\xc5\x4d\x46\x01\xed\x49\x04", 24, "\x94\xb1\x25\x63\x49\x49\x46\x7e\x7a\xa0\x0e\xa1\x10\x25\x21\x9a\xc9\x1f\x0d\xed\xa1\x10\x30\x7e\x08\x84\xee\x09\xe8\x31\x53\x81", 32); - cbcmac_vector("\x22\xfb\x7e\x4c\x77\x12\x7c\xed\x2c\xaa\xf9\x8d\x9f\x35\x15\x60", 16, "\x1c\x50\xc0\x79\x7c\xd6\x7f\x89\x26\xd1\xc9\xb9\x85\xf9\xee\xaf\x18\x3f\x07\x0b\x3a\xd2\x5f\x7e\xfa\x08\x95\xfe\x98\xe3\x43\x91", 32, "\x7d\x1e\x7e\x19\x9a\xd4\xf4\x3f\xcf\xff\x55\xf7\xc9\x81\xe6\x13\xc0\x22\xab\x7f\x83\x92\x21\x72\x65\x79\x78\xcd\xf0\x8b\x36", 31); - cbcmac_vector("\x40\xc1\xef\xf3\xf4\x71\x54\x58\x77\x3c\xd3\x07\x96\xdf\xfd\x54", 16, "\x3c\x1e\xae\xa7\x4a\xf6\xee\x43\x9b\xd7\xa3\x76\x38\xd6\x08\x21\x60\xe6\x1b\x23\x2b\xf8\xa4\x5d\x05\xd5\xf4\x89\x04\x3e\x2d\x19", 32, "\xd2\xa3\x38\x1a\x82\xd6\xb6\xc2\x52\x93\x43\x1d\xdc\x1d\x73\xb5\x14\x82\x40\xfe\x00\xc3\x24\x52\x8d\x69\xc6\x11\x4e\x4c\xa9\x40\xcd\xfb\x29\x17", 36); - cbcmac_vector("\x69\x7c\x65\x95\xa2\x1f\xa2\xfa\x3a\xd3\x60\x68\x7a\xed\x68\x37", 16, "\xc2\xda\x01\xb4\x12\xa5\xcd\x1c\x75\xb5\x08\x5f\xd2\xee\x79\xc3\x47\xd9\xf9\x12\x86\x3d\x81\xd0\x42\x89\x75\x96\x58\x70\x47\x05", 32, "\x65\x22\x9b\x77\x15\xe5\x02\x54\x04\x90\xfb\xe2\xbf\x5a\x8e\xb0\xbf\x64\xff\x7f\xb7\xab\x7f\x18\x69\x7b", 26); - cbcmac_vector("\xf5\x2d\x65\x16\x84\x43\x0d\xe8\x1f\x29\x51\x06\xec\xf0\xa5\xd2", 16, "\x76\xff\xb3\x38\x5b\xca\x7c\x93\xc0\x12\xd7\xbc\xb3\xa3\xd0\xf2\x87\xa7\x0a\x91\x36\x76\xa7\x8d\x28\x47\x05\x8e\x75\xae\x5e\x3c", 32, "\x12\x90\x91\x65\x32\x37\xd0\x35\xf6\x40\x42\xa7\x4f\x61\xa9\x9c\x8f\xd6\x84\x9a\x86\x0e\x57\xe7\xe4", 25); -} - -static void test_ctr(void) -{ - uint8_t out[16]; - - const void *nonce = "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff"; - const void *key = "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c"; - const void *inp = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"; - const void *expect = "\x87\x4d\x61\x91\xb6\x20\xe3\x26\x1b\xef\x68\x64\x99\x0d\xb6\xce"; - - cf_aes_context aes; - cf_aes_init(&aes, key, 16); - - cf_ctr ctr; - cf_ctr_init(&ctr, &cf_aes, &aes, nonce); - cf_ctr_cipher(&ctr, inp, out, 16); /* one piece */ - TEST_CHECK(memcmp(expect, out, 16) == 0); - - cf_ctr_init(&ctr, &cf_aes, &aes, nonce); - cf_ctr_cipher(&ctr, inp, out, 1); /* incremental (2 blocks) */ - cf_ctr_cipher(&ctr, inp, out, 16); - cf_ctr_cipher(&ctr, inp, out, 16); - - cf_ctr_init(&ctr, &cf_aes, &aes, nonce); - cf_ctr_cipher(&ctr, inp, out, 1); /* incremental */ - cf_ctr_cipher(&ctr, ((uint8_t *)inp) + 1, out + 1, 15); - TEST_CHECK(memcmp(expect, out, 16) == 0); - - uint8_t decrypt[16]; - cf_ctr_init(&ctr, &cf_aes, &aes, nonce); - cf_ctr_cipher(&ctr, out, decrypt, 16); - TEST_CHECK(memcmp(decrypt, inp, 16) == 0); - - /* Test we use the right number of blocks up. */ - uint8_t test_nonce[16], test_inp[16]; - memset(test_nonce, 0xff, 16); - memset(test_inp, 0x00, 16); - cf_ctr_init(&ctr, &cf_aes, &aes, test_nonce); - - /* Exercise cf_blockwise_xor code paths. */ - for (int i = 0; i < 1024; i++) - { - cf_ctr_cipher(&ctr, test_inp, out, i % 16); - } - - /* expected counter value is 1024 * 7.5 / 16 - 1: - * 479 = 0x1df - */ - - memset(test_nonce, 0, sizeof test_nonce); - test_nonce[15] = 0xdf; - test_nonce[14] = 0x01; - - TEST_CHECK(memcmp(test_nonce, ctr.nonce, 16) == 0); -} - -static void check_eax(const void *key, size_t nkey, - const void *msg, size_t nmsg, - const void *nonce, size_t nnonce, - const void *header, size_t nheader, - const void *expect_cipher, - const void *expect_tag, size_t ntag) -{ - uint8_t cipher[32]; - uint8_t tag[16]; - - assert(nmsg <= sizeof cipher); - assert(ntag <= ntag); - - cf_aes_context aes; - cf_aes_init(&aes, key, nkey); - - cf_eax_encrypt(&cf_aes, &aes, - msg, nmsg, - header, nheader, - nonce, nnonce, - cipher, - tag, ntag); - - TEST_CHECK(memcmp(expect_cipher, cipher, nmsg) == 0); - TEST_CHECK(memcmp(expect_tag, tag, ntag) == 0); - - int rc; - uint8_t tmp[sizeof cipher]; - rc = cf_eax_decrypt(&cf_aes, &aes, - cipher, nmsg, - header, nheader, - nonce, nnonce, - tag, ntag, - tmp); - TEST_CHECK(rc == 0); - TEST_CHECK(memcmp(tmp, msg, nmsg) == 0); - - tag[0] ^= 0xff; - rc = cf_eax_decrypt(&cf_aes, &aes, - cipher, nmsg, - header, nheader, - nonce, nnonce, - tag, ntag, - tmp); - TEST_CHECK(rc == 1); -} - -static void test_eax(void) -{ - /* Test vectors from paper. */ - check_eax("\x23\x39\x52\xDE\xE4\xD5\xED\x5F\x9B\x9C\x6D\x6F\xF8\x0F\xF4\x78", 16, - "", 0, - "\x62\xEC\x67\xF9\xC3\xA4\xA4\x07\xFC\xB2\xA8\xC4\x90\x31\xA8\xB3", 16, - "\x6B\xFB\x91\x4F\xD0\x7E\xAE\x6B", 8, - "", - "\xE0\x37\x83\x0E\x83\x89\xF2\x7B\x02\x5A\x2D\x65\x27\xE7\x9D\x01", 16); - - check_eax("\x91\x94\x5D\x3F\x4D\xCB\xEE\x0B\xF4\x5E\xF5\x22\x55\xF0\x95\xA4", 16, - "\xF7\xFB", 2, - "\xBE\xCA\xF0\x43\xB0\xA2\x3D\x84\x31\x94\xBA\x97\x2C\x66\xDE\xBD", 16, - "\xFA\x3B\xFD\x48\x06\xEB\x53\xFA", 8, - "\x19\xDD", - "\x5C\x4C\x93\x31\x04\x9D\x0B\xDA\xB0\x27\x74\x08\xF6\x79\x67\xE5", 16); - - check_eax("\x01\xF7\x4A\xD6\x40\x77\xF2\xE7\x04\xC0\xF6\x0A\xDA\x3D\xD5\x23", 16, - "\x1A\x47\xCB\x49\x33", 5, - "\x70\xC3\xDB\x4F\x0D\x26\x36\x84\x00\xA1\x0E\xD0\x5D\x2B\xFF\x5E", 16, - "\x23\x4A\x34\x63\xC1\x26\x4A\xC6", 8, - "\xD8\x51\xD5\xBA\xE0", - "\x3A\x59\xF2\x38\xA2\x3E\x39\x19\x9D\xC9\x26\x66\x26\xC4\x0F\x80", 16); - - check_eax("\xD0\x7C\xF6\xCB\xB7\xF3\x13\xBD\xDE\x66\xB7\x27\xAF\xD3\xC5\xE8", 16, - "\x48\x1C\x9E\x39\xB1", 5, - "\x84\x08\xDF\xFF\x3C\x1A\x2B\x12\x92\xDC\x19\x9E\x46\xB7\xD6\x17", 16, - "\x33\xCC\xE2\xEA\xBF\xF5\xA7\x9D", 8, - "\x63\x2A\x9D\x13\x1A", - "\xD4\xC1\x68\xA4\x22\x5D\x8E\x1F\xF7\x55\x93\x99\x74\xA7\xBE\xDE", 16); - - check_eax("\x35\xB6\xD0\x58\x00\x05\xBB\xC1\x2B\x05\x87\x12\x45\x57\xD2\xC2", 16, - "\x40\xD0\xC0\x7D\xA5\xE4", 6, - "\xFD\xB6\xB0\x66\x76\xEE\xDC\x5C\x61\xD7\x42\x76\xE1\xF8\xE8\x16", 16, - "\xAE\xB9\x6E\xAE\xBE\x29\x70\xE9", 8, - "\x07\x1D\xFE\x16\xC6\x75", - "\xCB\x06\x77\xE5\x36\xF7\x3A\xFE\x6A\x14\xB7\x4E\xE4\x98\x44\xDD", 16); - - check_eax("\xBD\x8E\x6E\x11\x47\x5E\x60\xB2\x68\x78\x4C\x38\xC6\x2F\xEB\x22", 16, - "\x4D\xE3\xB3\x5C\x3F\xC0\x39\x24\x5B\xD1\xFB\x7D", 12, - "\x6E\xAC\x5C\x93\x07\x2D\x8E\x85\x13\xF7\x50\x93\x5E\x46\xDA\x1B", 16, - "\xD4\x48\x2D\x1C\xA7\x8D\xCE\x0F", 8, - "\x83\x5B\xB4\xF1\x5D\x74\x3E\x35\x0E\x72\x84\x14", - "\xAB\xB8\x64\x4F\xD6\xCC\xB8\x69\x47\xC5\xE1\x05\x90\x21\x0A\x4F", 16); - - check_eax("\x7C\x77\xD6\xE8\x13\xBE\xD5\xAC\x98\xBA\xA4\x17\x47\x7A\x2E\x7D", 16, - "\x8B\x0A\x79\x30\x6C\x9C\xE7\xED\x99\xDA\xE4\xF8\x7F\x8D\xD6\x16\x36", 17, - "\x1A\x8C\x98\xDC\xD7\x3D\x38\x39\x3B\x2B\xF1\x56\x9D\xEE\xFC\x19", 16, - "\x65\xD2\x01\x79\x90\xD6\x25\x28", 8, - "\x02\x08\x3E\x39\x79\xDA\x01\x48\x12\xF5\x9F\x11\xD5\x26\x30\xDA\x30", - "\x13\x73\x27\xD1\x06\x49\xB0\xAA\x6E\x1C\x18\x1D\xB6\x17\xD7\xF2", 16); - - check_eax("\x5F\xFF\x20\xCA\xFA\xB1\x19\xCA\x2F\xC7\x35\x49\xE2\x0F\x5B\x0D", 16, - "\x1B\xDA\x12\x2B\xCE\x8A\x8D\xBA\xF1\x87\x7D\x96\x2B\x85\x92\xDD\x2D\x56", 18, - "\xDD\xE5\x9B\x97\xD7\x22\x15\x6D\x4D\x9A\xFF\x2B\xC7\x55\x98\x26", 16, - "\x54\xB9\xF0\x4E\x6A\x09\x18\x9A", 8, - "\x2E\xC4\x7B\x2C\x49\x54\xA4\x89\xAF\xC7\xBA\x48\x97\xED\xCD\xAE\x8C\xC3", - "\x3B\x60\x45\x05\x99\xBD\x02\xC9\x63\x82\x90\x2A\xEF\x7F\x83\x2A", 16); - - check_eax("\xA4\xA4\x78\x2B\xCF\xFD\x3E\xC5\xE7\xEF\x6D\x8C\x34\xA5\x61\x23", 16, - "\x6C\xF3\x67\x20\x87\x2B\x85\x13\xF6\xEA\xB1\xA8\xA4\x44\x38\xD5\xEF\x11", 18, - "\xB7\x81\xFC\xF2\xF7\x5F\xA5\xA8\xDE\x97\xA9\xCA\x48\xE5\x22\xEC", 16, - "\x89\x9A\x17\x58\x97\x56\x1D\x7E", 8, - "\x0D\xE1\x8F\xD0\xFD\xD9\x1E\x7A\xF1\x9F\x1D\x8E\xE8\x73\x39\x38\xB1\xE8", - "\xE7\xF6\xD2\x23\x16\x18\x10\x2F\xDB\x7F\xE5\x5F\xF1\x99\x17\x00", 16); - - check_eax("\x83\x95\xFC\xF1\xE9\x5B\xEB\xD6\x97\xBD\x01\x0B\xC7\x66\xAA\xC3", 16, - "\xCA\x40\xD7\x44\x6E\x54\x5F\xFA\xED\x3B\xD1\x2A\x74\x0A\x65\x9F\xFB\xBB\x3C\xEA\xB7", 21, - "\x22\xE7\xAD\xD9\x3C\xFC\x63\x93\xC5\x7E\xC0\xB3\xC1\x7D\x6B\x44", 16, - "\x12\x67\x35\xFC\xC3\x20\xD2\x5A", 8, - "\xCB\x89\x20\xF8\x7A\x6C\x75\xCF\xF3\x96\x27\xB5\x6E\x3E\xD1\x97\xC5\x52\xD2\x95\xA7", - "\xCF\xC4\x6A\xFC\x25\x3B\x46\x52\xB1\xAF\x37\x95\xB1\x24\xAB\x6E", 16); - - /* Test vector from bug #3 */ - check_eax("\x58\x94\x17\xB0\x32\x4B\x1B\x71\xD7\xA6\x75\x18\x52\x86\x7A\xE8", 16, - "\x00\x00\x1C\x40\x00\x00\x00\x48\x00\x00\x00\x73", 12, - "\x00\x01\x00\x00\xF6\x83", 6, - "", 0, - "\xD5\xD8\x99\x79\xAE\x79\xEB\xEE\x4E\x38\x5F\xA5", - "\x0E\xFB\x21\xFA\xD7\x14\xA2\x5B\x44\x14\x5F\x79\x22\x1A\x2C\x9A", 16); - -} - -static void check_cmac(const void *key, size_t nkey, - const void *msg, size_t nmsg, - const void *wanttag, size_t ntag) -{ - uint8_t gottag[16]; - - TEST_CHECK(cf_aes.blocksz == ntag); - - cf_aes_context aes; - cf_aes_init(&aes, key, nkey); - - cf_cmac cmac; - cf_cmac_init(&cmac, &cf_aes, &aes); - cf_cmac_sign(&cmac, msg, nmsg, gottag); - - TEST_CHECK(memcmp(gottag, wanttag, cf_aes.blocksz) == 0); -} - -static void test_cmac(void) -{ - /* These from SP800-38B */ - check_cmac("\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c", 16, - "", 0, - "\xbb\x1d\x69\x29\xe9\x59\x37\x28\x7f\xa3\x7d\x12\x9b\x75\x67\x46", 16); - check_cmac("\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c", 16, - "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a", 16, - "\x07\x0a\x16\xb4\x6b\x4d\x41\x44\xf7\x9b\xdd\x9d\xd0\x4a\x28\x7c", 16); - check_cmac("\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c", 16, - "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51\x30\xc8\x1c\x46\xa3\x5c\xe4\x11", 40, - "\xdf\xa6\x67\x47\xde\x9a\xe6\x30\x30\xca\x32\x61\x14\x97\xc8\x27", 16); - check_cmac("\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c", 16, - "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51\x30\xc8\x1c\x46\xa3\x5c\xe4\x11\xe5\xfb\xc1\x19\x1a\x0a\x52\xef\xf6\x9f\x24\x45\xdf\x4f\x9b\x17\xad\x2b\x41\x7b\xe6\x6c\x37\x10", 64, - "\x51\xf0\xbe\xbf\x7e\x3b\x9d\x92\xfc\x49\x74\x17\x79\x36\x3c\xfe", 16); - - check_cmac("\x8e\x73\xb0\xf7\xda\x0e\x64\x52\xc8\x10\xf3\x2b\x80\x90\x79\xe5\x62\xf8\xea\xd2\x52\x2c\x6b\x7b", 24, - "", 0, - "\xd1\x7d\xdf\x46\xad\xaa\xcd\xe5\x31\xca\xc4\x83\xde\x7a\x93\x67", 16); - check_cmac("\x8e\x73\xb0\xf7\xda\x0e\x64\x52\xc8\x10\xf3\x2b\x80\x90\x79\xe5\x62\xf8\xea\xd2\x52\x2c\x6b\x7b", 24, - "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a", 16, - "\x9e\x99\xa7\xbf\x31\xe7\x10\x90\x06\x62\xf6\x5e\x61\x7c\x51\x84", 16); - check_cmac("\x8e\x73\xb0\xf7\xda\x0e\x64\x52\xc8\x10\xf3\x2b\x80\x90\x79\xe5\x62\xf8\xea\xd2\x52\x2c\x6b\x7b", 24, - "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51\x30\xc8\x1c\x46\xa3\x5c\xe4\x11", 40, - "\x8a\x1d\xe5\xbe\x2e\xb3\x1a\xad\x08\x9a\x82\xe6\xee\x90\x8b\x0e", 16); - check_cmac("\x8e\x73\xb0\xf7\xda\x0e\x64\x52\xc8\x10\xf3\x2b\x80\x90\x79\xe5\x62\xf8\xea\xd2\x52\x2c\x6b\x7b", 24, - "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51\x30\xc8\x1c\x46\xa3\x5c\xe4\x11\xe5\xfb\xc1\x19\x1a\x0a\x52\xef\xf6\x9f\x24\x45\xdf\x4f\x9b\x17\xad\x2b\x41\x7b\xe6\x6c\x37\x10", 64, - "\xa1\xd5\xdf\x0e\xed\x79\x0f\x79\x4d\x77\x58\x96\x59\xf3\x9a\x11", 16); - - check_cmac("\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4", 32, - "", 0, - "\x02\x89\x62\xf6\x1b\x7b\xf8\x9e\xfc\x6b\x55\x1f\x46\x67\xd9\x83", 16); - check_cmac("\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4", 32, - "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a", 16, - "\x28\xa7\x02\x3f\x45\x2e\x8f\x82\xbd\x4b\xf2\x8d\x8c\x37\xc3\x5c", 16); - check_cmac("\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4", 32, - "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51\x30\xc8\x1c\x46\xa3\x5c\xe4\x11", 40, - "\xaa\xf3\xd8\xf1\xde\x56\x40\xc2\x32\xf5\xb1\x69\xb9\xc9\x11\xe6", 16); - check_cmac("\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4", 32, - "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51\x30\xc8\x1c\x46\xa3\x5c\xe4\x11\xe5\xfb\xc1\x19\x1a\x0a\x52\xef\xf6\x9f\x24\x45\xdf\x4f\x9b\x17\xad\x2b\x41\x7b\xe6\x6c\x37\x10", 64, - "\xe1\x99\x21\x90\x54\x9f\x6e\xd5\x69\x6a\x2c\x05\x6c\x31\x54\x10", 16); -} - -static void test_gf128_mul(void) -{ - uint8_t bout[16]; - - const void *bx = "\x03\x88\xda\xce\x60\xb6\xa3\x92\xf3\x28\xc2\xb9\x71\xb2\xfe\x78"; - const void *by = "\x66\xe9\x4b\xd4\xef\x8a\x2c\x3b\x88\x4c\xfa\x59\xca\x34\x2b\x2e"; - const void *bexpect = "\x5e\x2e\xc7\x46\x91\x70\x62\x88\x2c\x85\xb0\x68\x53\x53\xde\xb7"; - - cf_gf128 x, y, out; - cf_gf128_frombytes_be(bx, x); - cf_gf128_frombytes_be(by, y); - cf_gf128_mul(x, y, out); - cf_gf128_tobytes_be(out, bout); - TEST_CHECK(memcmp(bexpect, bout, 16) == 0); -} - -static void check_gcm(const void *key, size_t nkey, - const void *plain, size_t nplain, - const void *aad, size_t naad, - const void *iv, size_t niv, - const void *cipher_expect, size_t ncipher, - const void *tag_expect, size_t ntag) -{ - uint8_t plain_decrypt[64], - cipher[64], - tag[16]; - - assert(ncipher == nplain); - - cf_aes_context ctx; - cf_aes_init(&ctx, key, nkey); - - cf_gcm_encrypt(&cf_aes, &ctx, - plain, nplain, - aad, naad, - iv, niv, - cipher, - tag, ntag); - - TEST_CHECK(memcmp(tag, tag_expect, ntag) == 0); - TEST_CHECK(memcmp(cipher, cipher_expect, ncipher) == 0); - - int err = cf_gcm_decrypt(&cf_aes, &ctx, - cipher, ncipher, - aad, naad, - iv, niv, - tag, ntag, - plain_decrypt); - TEST_CHECK(err == 0); - TEST_CHECK(memcmp(plain_decrypt, plain, ncipher) == 0); - - tag[0] ^= 0xff; - err = cf_gcm_decrypt(&cf_aes, &ctx, - cipher, ncipher, - aad, naad, - iv, niv, - tag, ntag, - plain_decrypt); - TEST_CHECK(err == 1); -} - -static void test_gcm(void) -{ - check_gcm("\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 16, - "", 0, - "", 0, - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 12, - "", 0, - "\x58\xe2\xfc\xce\xfa\x7e\x30\x61\x36\x7f\x1d\x57\xa4\xe7\x45\x5a", 16); - check_gcm("\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 16, - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 16, - "", 0, - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 12, - "\x03\x88\xda\xce\x60\xb6\xa3\x92\xf3\x28\xc2\xb9\x71\xb2\xfe\x78", 16, - "\xab\x6e\x47\xd4\x2c\xec\x13\xbd\xf5\x3a\x67\xb2\x12\x57\xbd\xdf", 16); - check_gcm("\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08", 16, - "\xd9\x31\x32\x25\xf8\x84\x06\xe5\xa5\x59\x09\xc5\xaf\xf5\x26\x9a" - "\x86\xa7\xa9\x53\x15\x34\xf7\xda\x2e\x4c\x30\x3d\x8a\x31\x8a\x72" - "\x1c\x3c\x0c\x95\x95\x68\x09\x53\x2f\xcf\x0e\x24\x49\xa6\xb5\x25" - "\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57\xba\x63\x7b\x39\x1a\xaf\xd2\x55", 64, - "", 0, - "\xca\xfe\xba\xbe\xfa\xce\xdb\xad\xde\xca\xf8\x88", 12, - "\x42\x83\x1e\xc2\x21\x77\x74\x24\x4b\x72\x21\xb7\x84\xd0\xd4\x9c" - "\xe3\xaa\x21\x2f\x2c\x02\xa4\xe0\x35\xc1\x7e\x23\x29\xac\xa1\x2e" - "\x21\xd5\x14\xb2\x54\x66\x93\x1c\x7d\x8f\x6a\x5a\xac\x84\xaa\x05" - "\x1b\xa3\x0b\x39\x6a\x0a\xac\x97\x3d\x58\xe0\x91\x47\x3f\x59\x85", 64, - "\x4d\x5c\x2a\xf3\x27\xcd\x64\xa6\x2c\xf3\x5a\xbd\x2b\xa6\xfa\xb4", 16); - check_gcm("\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08", 16, - "\xd9\x31\x32\x25\xf8\x84\x06\xe5\xa5\x59\x09\xc5\xaf\xf5\x26\x9a" - "\x86\xa7\xa9\x53\x15\x34\xf7\xda\x2e\x4c\x30\x3d\x8a\x31\x8a\x72" - "\x1c\x3c\x0c\x95\x95\x68\x09\x53\x2f\xcf\x0e\x24\x49\xa6\xb5\x25" - "\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57\xba\x63\x7b\x39", 60, - "\xfe\xed\xfa\xce\xde\xad\xbe\xef\xfe\xed\xfa\xce\xde\xad\xbe\xef" - "\xab\xad\xda\xd2", 20, - "\xca\xfe\xba\xbe\xfa\xce\xdb\xad\xde\xca\xf8\x88", 12, - "\x42\x83\x1e\xc2\x21\x77\x74\x24\x4b\x72\x21\xb7\x84\xd0\xd4\x9c" - "\xe3\xaa\x21\x2f\x2c\x02\xa4\xe0\x35\xc1\x7e\x23\x29\xac\xa1\x2e" - "\x21\xd5\x14\xb2\x54\x66\x93\x1c\x7d\x8f\x6a\x5a\xac\x84\xaa\x05" - "\x1b\xa3\x0b\x39\x6a\x0a\xac\x97\x3d\x58\xe0\x91", 60, - "\x5b\xc9\x4f\xbc\x32\x21\xa5\xdb\x94\xfa\xe9\x5a\xe7\x12\x1a\x47", 16); - check_gcm("\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08", 16, - "\xd9\x31\x32\x25\xf8\x84\x06\xe5\xa5\x59\x09\xc5\xaf\xf5\x26\x9a" - "\x86\xa7\xa9\x53\x15\x34\xf7\xda\x2e\x4c\x30\x3d\x8a\x31\x8a\x72" - "\x1c\x3c\x0c\x95\x95\x68\x09\x53\x2f\xcf\x0e\x24\x49\xa6\xb5\x25" - "\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57\xba\x63\x7b\x39", 60, - "\xfe\xed\xfa\xce\xde\xad\xbe\xef\xfe\xed\xfa\xce\xde\xad\xbe\xef" - "\xab\xad\xda\xd2", 20, - "\xca\xfe\xba\xbe\xfa\xce\xdb\xad", 8, - "\x61\x35\x3b\x4c\x28\x06\x93\x4a\x77\x7f\xf5\x1f\xa2\x2a\x47\x55" - "\x69\x9b\x2a\x71\x4f\xcd\xc6\xf8\x37\x66\xe5\xf9\x7b\x6c\x74\x23" - "\x73\x80\x69\x00\xe4\x9f\x24\xb2\x2b\x09\x75\x44\xd4\x89\x6b\x42" - "\x49\x89\xb5\xe1\xeb\xac\x0f\x07\xc2\x3f\x45\x98", 60, - "\x36\x12\xd2\xe7\x9e\x3b\x07\x85\x56\x1b\xe1\x4a\xac\xa2\xfc\xcb", 16); - check_gcm("\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08", 16, - "\xd9\x31\x32\x25\xf8\x84\x06\xe5\xa5\x59\x09\xc5\xaf\xf5\x26\x9a" - "\x86\xa7\xa9\x53\x15\x34\xf7\xda\x2e\x4c\x30\x3d\x8a\x31\x8a\x72" - "\x1c\x3c\x0c\x95\x95\x68\x09\x53\x2f\xcf\x0e\x24\x49\xa6\xb5\x25" - "\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57\xba\x63\x7b\x39", 60, - "\xfe\xed\xfa\xce\xde\xad\xbe\xef\xfe\xed\xfa\xce\xde\xad\xbe\xef" - "\xab\xad\xda\xd2", 20, - "\x93\x13\x22\x5d\xf8\x84\x06\xe5\x55\x90\x9c\x5a\xff\x52\x69\xaa" - "\x6a\x7a\x95\x38\x53\x4f\x7d\xa1\xe4\xc3\x03\xd2\xa3\x18\xa7\x28" - "\xc3\xc0\xc9\x51\x56\x80\x95\x39\xfc\xf0\xe2\x42\x9a\x6b\x52\x54" - "\x16\xae\xdb\xf5\xa0\xde\x6a\x57\xa6\x37\xb3\x9b", 60, - "\x8c\xe2\x49\x98\x62\x56\x15\xb6\x03\xa0\x33\xac\xa1\x3f\xb8\x94" - "\xbe\x91\x12\xa5\xc3\xa2\x11\xa8\xba\x26\x2a\x3c\xca\x7e\x2c\xa7" - "\x01\xe4\xa9\xa4\xfb\xa4\x3c\x90\xcc\xdc\xb2\x81\xd4\x8c\x7c\x6f" - "\xd6\x28\x75\xd2\xac\xa4\x17\x03\x4c\x34\xae\xe5", 60, - "\x61\x9c\xc5\xae\xff\xfe\x0b\xfa\x46\x2a\xf4\x3c\x16\x99\xd0\x50", 16); - - check_gcm("\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08", 16, - "\xd9\x31\x32\x25\xf8\x84\x06\xe5\xa5\x59\x09\xc5\xaf\xf5\x26\x9a" - "\x86\xa7\xa9\x53\x15\x34\xf7\xda\x2e\x4c\x30\x3d\x8a\x31\x8a\x72" - "\x1c\x3c\x0c\x95\x95\x68\x09\x53\x2f\xcf\x0e\x24\x49\xa6\xb5\x25" - "\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57\xba\x63\x7b\x39", 60, - "\xfe\xed\xfa\xce\xde\xad\xbe\xef\xfe\xed\xfa\xce\xde\xad\xbe\xef" - "\xab\xad\xda\xd2", 20, - "\x93\x13\x22\x5d\xf8\x84\x06\xe5\x55\x90\x9c\x5a\xff\x52\x69\xaa" - "\x6a\x7a\x95\x38\x53\x4f\x7d\xa1\xe4\xc3\x03\xd2\xa3\x18\xa7\x28" - "\xc3\xc0\xc9\x51\x56\x80\x95\x39\xfc\xf0\xe2\x42\x9a\x6b\x52\x54" - "\x16\xae\xdb\xf5\xa0\xde\x6a\x57\xa6\x37\xb3\x9b", 60, - "\x8c\xe2\x49\x98\x62\x56\x15\xb6\x03\xa0\x33\xac\xa1\x3f\xb8\x94" - "\xbe\x91\x12\xa5\xc3\xa2\x11\xa8\xba\x26\x2a\x3c\xca\x7e\x2c\xa7" - "\x01\xe4\xa9\xa4\xfb\xa4\x3c\x90\xcc\xdc\xb2\x81\xd4\x8c\x7c\x6f" - "\xd6\x28\x75\xd2\xac\xa4\x17\x03\x4c\x34\xae\xe5", 60, - "\x61\x9c\xc5\xae\xff\xfe\x0b\xfa\x46\x2a\xf4\x3c\x16\x99\xd0\x50", 16); - check_gcm("\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 24, - "", 0, - "", 0, - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 12, - "", 0, - "\xcd\x33\xb2\x8a\xc7\x73\xf7\x4b\xa0\x0e\xd1\xf3\x12\x57\x24\x35", 16); - check_gcm("\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 24, - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 16, - "", 0, - "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", 12, - "\x98\xe7\x24\x7c\x07\xf0\xfe\x41\x1c\x26\x7e\x43\x84\xb0\xf6\x00", 16, - "\x2f\xf5\x8d\x80\x03\x39\x27\xab\x8e\xf4\xd4\x58\x75\x14\xf0\xfb", 16); - check_gcm("\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08" - "\xfe\xff\xe9\x92\x86\x65\x73\x1c", 24, - "\xd9\x31\x32\x25\xf8\x84\x06\xe5\xa5\x59\x09\xc5\xaf\xf5\x26\x9a" - "\x86\xa7\xa9\x53\x15\x34\xf7\xda\x2e\x4c\x30\x3d\x8a\x31\x8a\x72" - "\x1c\x3c\x0c\x95\x95\x68\x09\x53\x2f\xcf\x0e\x24\x49\xa6\xb5\x25" - "\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57\xba\x63\x7b\x39\x1a\xaf\xd2\x55", 64, - "", 0, - "\xca\xfe\xba\xbe\xfa\xce\xdb\xad\xde\xca\xf8\x88", 12, - "\x39\x80\xca\x0b\x3c\x00\xe8\x41\xeb\x06\xfa\xc4\x87\x2a\x27\x57" - "\x85\x9e\x1c\xea\xa6\xef\xd9\x84\x62\x85\x93\xb4\x0c\xa1\xe1\x9c" - "\x7d\x77\x3d\x00\xc1\x44\xc5\x25\xac\x61\x9d\x18\xc8\x4a\x3f\x47" - "\x18\xe2\x44\x8b\x2f\xe3\x24\xd9\xcc\xda\x27\x10\xac\xad\xe2\x56", 64, - "\x99\x24\xa7\xc8\x58\x73\x36\xbf\xb1\x18\x02\x4d\xb8\x67\x4a\x14", 16); -} - -static void check_ccm(const void *key, size_t nkey, - const void *header, size_t nheader, - const void *plain, size_t nplain, - const void *nonce, size_t nnonce, - const void *expect_cipher, size_t ncipher, - const void *expect_tag, size_t ntag) -{ - uint8_t cipher[32], tag[16], decrypted[32]; - - assert(ncipher == nplain); - - cf_aes_context ctx; - cf_aes_init(&ctx, key, nkey); - - cf_ccm_encrypt(&cf_aes, &ctx, - plain, nplain, 15 - nnonce, - header, nheader, - nonce, nnonce, - cipher, - tag, ntag); - - TEST_CHECK(memcmp(tag, expect_tag, ntag) == 0); - TEST_CHECK(memcmp(cipher, expect_cipher, ncipher) == 0); - - int err; - err = cf_ccm_decrypt(&cf_aes, &ctx, - expect_cipher, ncipher, 15 - nnonce, - header, nheader, - nonce, nnonce, - tag, ntag, - decrypted); - TEST_CHECK(err == 0); - TEST_CHECK(memcmp(decrypted, plain, nplain) == 0); - - tag[0] ^= 0xff; - - err = cf_ccm_decrypt(&cf_aes, &ctx, - expect_cipher, ncipher, 15 - nnonce, - header, nheader, - nonce, nnonce, - tag, ntag, - decrypted); - TEST_CHECK(err == 1); -} - -#if !MCU_TARGET -static void fill(uint8_t *buf, size_t len, uint8_t b) -{ - for (size_t i = 0; i < len; i++) - buf[i] = b++; -} - -static void test_ccm_long(void) -{ - /* This is example 4 from SP800-38C, to test the long AAD code path. */ - uint8_t header[0x10000]; - uint8_t key[16]; - uint8_t tag[14]; - uint8_t nonce[13]; - uint8_t plain[32], cipher[32]; - - fill(header, sizeof header, 0x00); - fill(key, sizeof key, 0x40); - fill(nonce, sizeof nonce, 0x10); - fill(plain, sizeof plain, 0x20); - - const void *expect_tag = "\xb4\xac\x6b\xec\x93\xe8\x59\x8e\x7f\x0d\xad\xbc\xea\x5b"; - const void *expect_cipher = "\x69\x91\x5d\xad\x1e\x84\xc6\x37\x6a\x68\xc2\x96\x7e\x4d\xab\x61\x5a\xe0\xfd\x1f\xae\xc4\x4c\xc4\x84\x82\x85\x29\x46\x3c\xcf\x72"; - - cf_aes_context ctx; - cf_aes_init(&ctx, key, sizeof key); - - cf_ccm_encrypt(&cf_aes, &ctx, - plain, sizeof plain, 15 - sizeof nonce, - header, sizeof header, - nonce, sizeof nonce, - cipher, - tag, sizeof tag); - - TEST_CHECK(memcmp(expect_tag, tag, sizeof tag) == 0); - TEST_CHECK(memcmp(expect_cipher, cipher, sizeof cipher) == 0); -} -#endif - -static void test_ccm(void) -{ - check_ccm("\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf", 16, - "\x00\x01\x02\x03\x04\x05\x06\x07", 8, - "\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e", 23, - "\x00\x00\x00\x03\x02\x01\x00\xa0\xa1\xa2\xa3\xa4\xa5", 13, - "\x58\x8c\x97\x9a\x61\xc6\x63\xd2\xf0\x66\xd0\xc2\xc0\xf9\x89\x80\x6d\x5f\x6b\x61\xda\xc3\x84", 23, - "\x17\xe8\xd1\x2c\xfd\xf9\x26\xe0", 8); - - check_ccm("\x40\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f", 16, - "\x00\x01\x02\x03\x04\x05\x06\x07", 8, - "\x20\x21\x22\x23", 4, - "\x10\x11\x12\x13\x14\x15\x16", 7, - "\x71\x62\x01\x5b", 4, - "\x4d\xac\x25\x5d", 4); - - check_ccm("\x40\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f", 16, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10\x11\x12\x13", 20, - "\x20\x21\x22\x23\x24\x25\x26\x27\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f\x30\x31\x32\x33\x34\x35\x36\x37", 24, - "\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b", 12, - "\xe3\xb2\x01\xa9\xf5\xb7\x1a\x7a\x9b\x1c\xea\xec\xcd\x97\xe7\x0b\x61\x76\xaa\xd9\xa4\x42\x8a\xa5", 24, - "\x48\x43\x92\xfb\xc1\xb0\x99\x51", 8); -} - -static void check_ocb(const void *key, size_t nkey, - const void *header, size_t nheader, - const void *plain, size_t nplain, - const void *nonce, size_t nnonce, - const void *expect_cipher, size_t ncipher, - const void *expect_tag, size_t ntag) -{ - uint8_t cipher[40], tag[16]; - - assert(ncipher == nplain); - assert(ncipher <= sizeof cipher); - assert(ntag <= sizeof tag); - - cf_aes_context ctx; - cf_aes_init(&ctx, key, nkey); - - cf_ocb_encrypt(&cf_aes, &ctx, - plain, nplain, - header, nheader, - nonce, nnonce, - cipher, - tag, ntag); - - TEST_CHECK(memcmp(tag, expect_tag, ntag) == 0); - TEST_CHECK(memcmp(cipher, expect_cipher, ncipher) == 0); - - uint8_t decrypted[40]; - int err; - err = cf_ocb_decrypt(&cf_aes, &ctx, - expect_cipher, ncipher, - header, nheader, - nonce, nnonce, - tag, ntag, - decrypted); - TEST_CHECK(err == 0); - TEST_CHECK(memcmp(decrypted, plain, nplain) == 0); - - tag[0] ^= 0xff; - - err = cf_ocb_decrypt(&cf_aes, &ctx, - expect_cipher, ncipher, - header, nheader, - nonce, nnonce, - tag, ntag, - decrypted); - TEST_CHECK(err == 1); -} - -static void test_ocb(void) -{ - check_ocb("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "", 0, - "", 0, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x00", 12, - "", 0, - "\x78\x54\x07\xBF\xFF\xC8\xAD\x9E\xDC\xC5\x52\x0A\xC9\x11\x1E\xE6", 16); - - check_ocb("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "\x00\x01\x02\x03\x04\x05\x06\x07", 8, - "\x00\x01\x02\x03\x04\x05\x06\x07", 8, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x01", 12, - "\x68\x20\xB3\x65\x7B\x6F\x61\x5A", 8, - "\x57\x25\xBD\xA0\xD3\xB4\xEB\x3A\x25\x7C\x9A\xF1\xF8\xF0\x30\x09", 16); - - check_ocb("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "\x00\x01\x02\x03\x04\x05\x06\x07", 8, - "", 0, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x02", 12, - "", 0, - "\x81\x01\x7F\x82\x03\xF0\x81\x27\x71\x52\xFA\xDE\x69\x4A\x0A\x00", 16); - - check_ocb("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "", 0, - "\x00\x01\x02\x03\x04\x05\x06\x07", 8, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x03", 12, - "\x45\xDD\x69\xF8\xF5\xAA\xE7\x24", 8, - "\x14\x05\x4C\xD1\xF3\x5D\x82\x76\x0B\x2C\xD0\x0D\x2F\x99\xBF\xA9", 16); - - check_ocb("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x04", 12, - "\x57\x1D\x53\x5B\x60\xB2\x77\x18\x8B\xE5\x14\x71\x70\xA9\xA2\x2C", 16, - "\x3A\xD7\xA4\xFF\x38\x35\xB8\xC5\x70\x1C\x1C\xCE\xC8\xFC\x33\x58", 16); - - check_ocb("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "", 0, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x05", 12, - "", 0, - "\x8C\xF7\x61\xB6\x90\x2E\xF7\x64\x46\x2A\xD8\x64\x98\xCA\x6B\x97", 16); - - check_ocb("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "", 0, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x06", 12, - "\x5C\xE8\x8E\xC2\xE0\x69\x27\x06\xA9\x15\xC0\x0A\xEB\x8B\x23\x96", 16, - "\xF4\x0E\x1C\x74\x3F\x52\x43\x6B\xDF\x06\xD8\xFA\x1E\xCA\x34\x3D", 16); - - check_ocb("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17", 24, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17", 24, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x07", 12, - "\x1C\xA2\x20\x73\x08\xC8\x7C\x01\x07\x56\x10\x4D\x88\x40\xCE\x19\x52\xF0\x96\x73\xA4\x48\xA1\x22", 24, - "\xC9\x2C\x62\x24\x10\x51\xF5\x73\x56\xD7\xF3\xC9\x0B\xB0\xE0\x7F", 16); - - check_ocb("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17", 24, - "", 0, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x08", 12, - "", 0, - "\x6D\xC2\x25\xA0\x71\xFC\x1B\x9F\x7C\x69\xF9\x3B\x0F\x1E\x10\xDE", 16); - - check_ocb("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "", 0, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17", 24, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x09", 12, - "\x22\x1B\xD0\xDE\x7F\xA6\xFE\x99\x3E\xCC\xD7\x69\x46\x0A\x0A\xF2\xD6\xCD\xED\x0C\x39\x5B\x1C\x3C", 24, - "\xE7\x25\xF3\x24\x94\xB9\xF9\x14\xD8\x5C\x0B\x1E\xB3\x83\x57\xFF", 16); - - check_ocb("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E\x1F", 32, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E\x1F", 32, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x0A", 12, - "\xBD\x6F\x6C\x49\x62\x01\xC6\x92\x96\xC1\x1E\xFD\x13\x8A\x46\x7A\xBD\x3C\x70\x79\x24\xB9\x64\xDE\xAF\xFC\x40\x31\x9A\xF5\xA4\x85", 32, - "\x40\xFB\xBA\x18\x6C\x55\x53\xC6\x8A\xD9\xF5\x92\xA7\x9A\x42\x40", 16); - - check_ocb("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E\x1F", 32, - "", 0, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x0B", 12, - "", 0, - "\xFE\x80\x69\x0B\xEE\x8A\x48\x5D\x11\xF3\x29\x65\xBC\x9D\x2A\x32", 16); - - check_ocb("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "", 0, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E\x1F", 32, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x0C", 12, - "\x29\x42\xBF\xC7\x73\xBD\xA2\x3C\xAB\xC6\xAC\xFD\x9B\xFD\x58\x35\xBD\x30\x0F\x09\x73\x79\x2E\xF4\x60\x40\xC5\x3F\x14\x32\xBC\xDF", 32, - "\xB5\xE1\xDD\xE3\xBC\x18\xA5\xF8\x40\xB5\x2E\x65\x34\x44\xD5\xDF", 16); - - check_ocb("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E\x1F\x20\x21\x22\x23\x24\x25\x26\x27", 40, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E\x1F\x20\x21\x22\x23\x24\x25\x26\x27", 40, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x0D", 12, - "\xD5\xCA\x91\x74\x84\x10\xC1\x75\x1F\xF8\xA2\xF6\x18\x25\x5B\x68\xA0\xA1\x2E\x09\x3F\xF4\x54\x60\x6E\x59\xF9\xC1\xD0\xDD\xC5\x4B\x65\xE8\x62\x8E\x56\x8B\xAD\x7A", 40, - "\xED\x07\xBA\x06\xA4\xA6\x94\x83\xA7\x03\x54\x90\xC5\x76\x9E\x60", 16); - - check_ocb("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E\x1F\x20\x21\x22\x23\x24\x25\x26\x27", 40, - "", 0, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x0E", 12, - "", 0, - "\xC5\xCD\x9D\x18\x50\xC1\x41\xE3\x58\x64\x99\x94\xEE\x70\x1B\x68", 16); - - check_ocb("\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F", 16, - "", 0, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E\x1F\x20\x21\x22\x23\x24\x25\x26\x27", 40, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x0F", 12, - "\x44\x12\x92\x34\x93\xC5\x7D\x5D\xE0\xD7\x00\xF7\x53\xCC\xE0\xD1\xD2\xD9\x50\x60\x12\x2E\x9F\x15\xA5\xDD\xBF\xC5\x78\x7E\x50\xB5\xCC\x55\xEE\x50\x7B\xCB\x08\x4E", 40, - "\x47\x9A\xD3\x63\xAC\x36\x6B\x95\xA9\x8C\xA5\xF3\x00\x0B\x14\x79", 16); - - check_ocb("\x0F\x0E\x0D\x0C\x0B\x0A\x09\x08\x07\x06\x05\x04\x03\x02\x01\x00", 16, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E\x1F\x20\x21\x22\x23\x24\x25\x26\x27", 40, - "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E\x1F\x20\x21\x22\x23\x24\x25\x26\x27", 40, - "\xBB\xAA\x99\x88\x77\x66\x55\x44\x33\x22\x11\x0D", 12, - "\x17\x92\xA4\xE3\x1E\x07\x55\xFB\x03\xE3\x1B\x22\x11\x6E\x6C\x2D\xDF\x9E\xFD\x6E\x33\xD5\x36\xF1\xA0\x12\x4B\x0A\x55\xBA\xE8\x84\xED\x93\x48\x15\x29\xC7\x6B\x6A", 40, - "\xD0\xC5\x15\xF4\xD1\xCD\xD4\xFD\xAC\x4F\x02\xAA", 12); -} - -#if !MCU_TARGET -static void check_ocb_long(size_t nkey, const void *expect_tag, size_t ntag) -{ - uint8_t C[22400]; - uint8_t K[32]; - uint8_t S[128] = { 0 }; - uint8_t N[12] = { 0 }; - size_t nC = 0; - - memset(K, 0, sizeof K); - K[nkey - 1] = ntag * 8; - - cf_aes_context aes; - cf_aes_init(&aes, K, nkey); - - for (size_t i = 0; i < 128; i++) - { - /* N = num2str(3i+1, 96) */ - memset(N, 0, sizeof N); - write32_be(3 * i + 1, N + 8); - - /* C = C || OCB-ENCRYPT(K, N, S, S) - * nb. OCB-ENCRYPT(Key, Nonce, AAD, Plain) */ - cf_ocb_encrypt(&cf_aes, &aes, - S, i, /* plain */ - S, i, /* aad */ - N, sizeof N, /* nonce */ - C + nC, /* cipher out */ - C + nC + i, /* tag out */ - ntag); - nC += i + ntag; - - /* N = num2str(3i+2,96) */ - write32_be(3 * i + 2, N + 8); - - /* C = C || OCB-ENCRYPT(K, N, <empty string>, S) */ - cf_ocb_encrypt(&cf_aes, &aes, - S, i, - NULL, 0, - N, sizeof N, - C + nC, - C + nC + i, - ntag); - nC += i + ntag; - - /* N = num2str(3i+3,96) */ - write32_be(3 * i + 3, N + 8); - - /* C = C || OCB-ENCRYPT(K, N, S, <empty string>) */ - cf_ocb_encrypt(&cf_aes, &aes, - NULL, 0, - S, i, - N, sizeof N, - NULL, - C + nC, - ntag); - nC += ntag; - } - - /* N = num2str(385, 96) */ - write32_be(385, N + 8); - - /* Output : OCB-ENCRYPT(K, N, C, <empty string>) */ - uint8_t result[16]; - cf_ocb_encrypt(&cf_aes, &aes, - NULL, 0, - C, nC, - N, sizeof N, - NULL, - result, ntag); - - TEST_CHECK(memcmp(result, expect_tag, ntag) == 0); -} - -static void test_ocb_long(void) -{ - check_ocb_long(16, "\x67\xE9\x44\xD2\x32\x56\xC5\xE0\xB6\xC6\x1F\xA2\x2F\xDF\x1E\xA2", 16); - check_ocb_long(24, "\xF6\x73\xF2\xC3\xE7\x17\x4A\xAE\x7B\xAE\x98\x6C\xA9\xF2\x9E\x17", 16); - check_ocb_long(32, "\xD9\x0E\xB8\xE9\xC9\x77\xC8\x8B\x79\xDD\x79\x3D\x7F\xFA\x16\x1C", 16); - check_ocb_long(16, "\x77\xA3\xD8\xE7\x35\x89\x15\x8D\x25\xD0\x12\x09", 12); - check_ocb_long(24, "\x05\xD5\x6E\xAD\x27\x52\xC8\x6B\xE6\x93\x2C\x5E", 12); - check_ocb_long(32, "\x54\x58\x35\x9A\xC2\x3B\x0C\xBA\x9E\x63\x30\xDD", 12); - check_ocb_long(16, "\x19\x2C\x9B\x7B\xD9\x0B\xA0\x6A", 8); - check_ocb_long(24, "\x00\x66\xBC\x6E\x0E\xF3\x4E\x24", 8); - check_ocb_long(32, "\x7D\x4E\xA5\xD4\x45\x50\x1C\xBE", 8); -} -#endif - -TEST_LIST = { - { "cbc", test_cbc }, - { "cbcmac", test_cbcmac }, - { "ctr", test_ctr }, - { "eax", test_eax }, - { "cmac", test_cmac }, - { "gf128-mul", test_gf128_mul }, - { "gcm", test_gcm }, - { "ccm", test_ccm }, - { "ocb", test_ocb }, - /* These remaining tests are too big for microcontroller targets. */ -#if !MCU_TARGET - { "ccm-long", test_ccm_long }, - { "ocb-long", test_ocb_long }, -#endif - { 0 } -}; - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testnorx.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/testnorx.c deleted file mode 100644 index b18393f..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testnorx.c +++ /dev/null @@ -1,118 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "norx.h" -#include "handy.h" -#include "cutest.h" -#include "testutil.h" - -static void test_vector(void) -{ - uint8_t K[16], N[8], A[128], M[128], Z[128], C[128], T[16]; - - /* This is from the v2.0 paper, section A.2. */ - - unhex(K, sizeof K, "000102030405060708090a0b0c0d0e0f"); - unhex(N, sizeof N, "f0e0d0c0b0a09080"); - - for (unsigned i = 0; i < 128; i++) - { - A[i] = M[i] = Z[i] = i; - } - - cf_norx32_encrypt(K, N, - A, sizeof A, - M, sizeof M, - Z, sizeof Z, - C, T); - - uint8_t expect_C[128], expect_T[16]; - - unhex(expect_C, sizeof expect_C, "f4afc8e66d2d80de0a7f719c899624c9ad896ec7c61739d5376d0648c7bcb204e57db05c6f83b3ff4315e8a4ef2f2c855f21ea4c51ac6de575773ba548f36e636a13b979d953bb91298ea4a6e2aa27402991e0da541997825407b2f12441de3ae6c5dbfe41b12f1480d234832765111e4c09deef9fe3971618d2217c4b77921e"); - unhex(expect_T, sizeof expect_T, "7810131eea2eab1e5da05d23d4e3cb99"); - - TEST_CHECK(memcmp(C, expect_C, sizeof C) == 0); - TEST_CHECK(memcmp(T, expect_T, sizeof T) == 0); - - uint8_t M2[128]; - TEST_CHECK(0 == - cf_norx32_decrypt(K, N, - A, sizeof A, - C, sizeof C, - Z, sizeof Z, - T, - M2)); - - TEST_CHECK(memcmp(M, M2, sizeof M) == 0); - T[0] ^= 0xff; - - TEST_CHECK(cf_norx32_decrypt(K, N, - A, sizeof A, - C, sizeof C, - Z, sizeof Z, - T, - M2)); -} - -#include "testnorx.katdata.inc" - -static void test_kat(void) -{ - uint8_t K[16], N[16], H[256], W[256]; - const uint8_t *kats = kat_data; - -#define FILL(arr, c) \ - do { \ - for (size_t i = 0; i < sizeof arr; i++) \ - arr[i] = (i * c + 123) & 0xff; \ - } while (0) - FILL(N, 181); - FILL(K, 191); - FILL(H, 193); - FILL(W, 197); -#undef FILL - - for (size_t i = 0; i < sizeof W; i++) - { - uint8_t C[256]; - uint8_t A[16]; - - cf_norx32_encrypt(K, N, - H, i, - W, i, - NULL, 0, - C, A); - - TEST_CHECK(memcmp(kats, C, i) == 0); - kats += i; - TEST_CHECK(memcmp(kats, A, sizeof A) == 0); - kats += sizeof A; - - uint8_t M[256] = { 0 }; - TEST_CHECK(0 == cf_norx32_decrypt(K, N, - H, i, - C, i, - NULL, 0, - A, M)); - - TEST_CHECK(0 == memcmp(M, W, i)); - } -} - -TEST_LIST = { - { "vector", test_vector }, - { "kat", test_kat }, - { 0 } -}; - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testnorx.katdata.inc b/debian/vendor-h2o/deps/picotls/deps/cifra/src/testnorx.katdata.inc deleted file mode 100644 index 13dd746..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testnorx.katdata.inc +++ /dev/null @@ -1,4961 +0,0 @@ -static const uint8_t kat_data[] = { - 0xAF, 0x7C, 0xEF, 0x63, 0x5D, 0xEE, 0x94, 0x74, - 0x9B, 0xC2, 0x03, 0x9E, 0xC0, 0x49, 0xE0, 0x81, - - 0x69, 0x63, 0x57, 0x72, 0xEC, 0x0B, 0x66, 0xF2, - 0xE4, 0xB0, 0x1D, 0x30, 0x34, 0x29, 0x84, 0xE9, - 0xA8, - - 0x02, 0x46, 0x13, 0xCC, 0x6B, 0x19, 0x96, 0xB3, - 0x7E, 0x1C, 0xA6, 0x79, 0x00, 0x28, 0x19, 0x09, - 0x9F, 0x86, - - 0x99, 0xAC, 0xEA, 0x8C, 0x2B, 0x70, 0x02, 0xBA, - 0x86, 0xE9, 0xEB, 0x22, 0xEC, 0x23, 0xAF, 0x9A, - 0x95, 0xD0, 0xE5, - - 0xFE, 0xFB, 0xA0, 0xBA, 0x20, 0x28, 0x50, 0xDC, - 0xE5, 0xD6, 0x70, 0x26, 0x7A, 0x9E, 0x2A, 0xC3, - 0x3F, 0xCB, 0xD7, 0x0C, - - 0xB9, 0x67, 0x98, 0x4F, 0xDF, 0x1B, 0x19, 0x66, - 0x9C, 0xDE, 0xAE, 0x96, 0x76, 0xDB, 0xDE, 0x55, - 0x95, 0x50, 0xD9, 0xC2, 0xBA, - - 0x62, 0x28, 0x9A, 0x03, 0xF3, 0xF2, 0xFB, 0x0E, - 0xCF, 0xD4, 0x11, 0x74, 0x1D, 0x8E, 0x8B, 0xCD, - 0x92, 0x52, 0x96, 0x5B, 0x64, 0x99, - - 0x2F, 0xCE, 0xB4, 0x86, 0x4C, 0x0A, 0x47, 0xEB, - 0x98, 0x2A, 0xD2, 0xA1, 0x59, 0x9A, 0x5A, 0xB9, - 0x0C, 0xA7, 0x7D, 0xB0, 0xA6, 0xFF, 0x05, - - 0xE0, 0x22, 0x71, 0xE2, 0xCD, 0xF8, 0x3C, 0x12, - 0x8B, 0x4E, 0x28, 0x14, 0x6F, 0x0E, 0x18, 0xAE, - 0x23, 0xDF, 0xD0, 0x59, 0x70, 0x9E, 0x54, 0x49, - - 0xF6, 0xB6, 0x9E, 0x08, 0xB8, 0x27, 0x54, 0x94, - 0xD1, 0x0B, 0x93, 0x25, 0xEF, 0xD5, 0xE2, 0x19, - 0xEF, 0xEA, 0x0C, 0xFC, 0x01, 0x75, 0xC2, 0x90, - 0x00, - - 0x54, 0xBE, 0x7D, 0xFB, 0xF5, 0xCC, 0x52, 0xC6, - 0x9A, 0x0F, 0x65, 0xBD, 0xF1, 0x53, 0x5D, 0x01, - 0x07, 0xCC, 0xAB, 0xB9, 0xA5, 0x53, 0xFD, 0xE7, - 0xE4, 0x74, - - 0xD7, 0x6E, 0x5B, 0x87, 0xD0, 0xC1, 0x68, 0x92, - 0xD0, 0x80, 0x7D, 0x36, 0x8D, 0xE7, 0x36, 0xC5, - 0x97, 0xE7, 0x46, 0xDA, 0xC9, 0x19, 0xD9, 0x98, - 0xD9, 0xBD, 0x7B, - - 0x7E, 0xEB, 0x69, 0xAB, 0x77, 0x97, 0xDA, 0xE8, - 0x47, 0xA4, 0x6E, 0x4A, 0x1D, 0xC9, 0x00, 0xF3, - 0x4B, 0x2E, 0xCD, 0x56, 0xDF, 0xE1, 0xAF, 0x9E, - 0xE8, 0xAD, 0x94, 0x48, - - 0xDF, 0xAB, 0x2B, 0xE7, 0x84, 0x9C, 0xBB, 0x96, - 0x3F, 0x02, 0x99, 0x65, 0x42, 0x1A, 0x0D, 0x33, - 0x97, 0xA8, 0x23, 0x7C, 0x59, 0x4E, 0xCC, 0x64, - 0x54, 0x11, 0x6F, 0x09, 0x80, - - 0xB5, 0x4B, 0x1A, 0x8C, 0x05, 0x62, 0x60, 0x7A, - 0xCC, 0xA8, 0x63, 0x7F, 0xCC, 0xC6, 0x13, 0x70, - 0xF8, 0xC6, 0x09, 0x5C, 0x45, 0x93, 0x3E, 0x7C, - 0x9E, 0x27, 0x23, 0x42, 0xAE, 0x52, - - 0x56, 0x3E, 0x38, 0xC7, 0x66, 0xCE, 0xB5, 0x8F, - 0x77, 0xA1, 0x20, 0xE2, 0x69, 0x08, 0x92, 0x1E, - 0x32, 0x01, 0x75, 0xD2, 0x05, 0x92, 0x1B, 0x60, - 0x60, 0x9F, 0xD2, 0xA3, 0x89, 0x49, 0x6E, - - 0x01, 0x91, 0x5D, 0xDC, 0xC7, 0xB1, 0x4F, 0x6D, - 0x73, 0x4D, 0x3B, 0x68, 0xA0, 0xA5, 0x1D, 0xA5, - 0x22, 0x3C, 0xFE, 0xDC, 0x86, 0xB1, 0x64, 0x54, - 0x92, 0xE1, 0x0F, 0x32, 0xD5, 0xA6, 0x4B, 0xAC, - - 0x13, 0xF8, 0xFC, 0xDB, 0x41, 0x62, 0x9F, 0x6E, - 0xE6, 0x9B, 0xAB, 0xE5, 0x27, 0x3B, 0x8C, 0x15, - 0x8C, 0xC8, 0x03, 0x38, 0xE3, 0x7E, 0x83, 0xDA, - 0xA2, 0x5B, 0xA8, 0x44, 0xE2, 0x41, 0x47, 0x53, - 0x2A, - - 0xD2, 0x73, 0x87, 0xC2, 0xF0, 0x28, 0x2A, 0x0F, - 0xE6, 0x37, 0xC9, 0xAF, 0xF3, 0x02, 0xAC, 0xEA, - 0x37, 0xB6, 0x8C, 0xA6, 0x37, 0x5F, 0x79, 0x89, - 0xCD, 0x90, 0x6B, 0xCC, 0xF6, 0x7C, 0xEC, 0xD9, - 0x75, 0xE6, - - 0x0B, 0x76, 0x2F, 0xAC, 0x9F, 0x20, 0xA1, 0x56, - 0x5F, 0xF9, 0x67, 0xB8, 0xDC, 0xAC, 0x48, 0xA0, - 0x00, 0xD3, 0xFE, 0x87, 0xAE, 0x13, 0x07, 0x26, - 0xD9, 0xC2, 0x6D, 0xF9, 0xEC, 0xB4, 0xA2, 0x41, - 0x17, 0xB6, 0x4C, - - 0xA2, 0xE6, 0x67, 0xBC, 0x65, 0x03, 0x88, 0xDC, - 0xAD, 0x8B, 0x3C, 0x28, 0x83, 0x5F, 0xE3, 0x47, - 0x95, 0xDA, 0xF9, 0x6A, 0x09, 0xE9, 0xF9, 0xD5, - 0x58, 0xE4, 0xC3, 0x64, 0x3E, 0xE2, 0x82, 0x22, - 0xC3, 0xF7, 0x50, 0x40, - - 0x73, 0xA2, 0xA1, 0xB7, 0xC4, 0xCC, 0x5F, 0xA6, - 0x86, 0x7A, 0xFB, 0xF9, 0x2D, 0xB0, 0x92, 0x90, - 0xDB, 0xD1, 0xD0, 0xD4, 0x7E, 0x83, 0xD8, 0xF7, - 0x39, 0x38, 0xFA, 0xD4, 0x24, 0x56, 0x96, 0x1D, - 0xF5, 0xB9, 0x35, 0x7A, 0x7B, - - 0xCB, 0xA1, 0x1C, 0x70, 0x7E, 0x42, 0xF7, 0x32, - 0x68, 0x56, 0x27, 0xC7, 0xFD, 0x13, 0xCE, 0xC2, - 0xD3, 0xEE, 0x3E, 0x33, 0xF3, 0xC3, 0xB4, 0x87, - 0x31, 0x6E, 0xDA, 0xA1, 0x09, 0x77, 0x9E, 0xBE, - 0x43, 0x8D, 0x11, 0xF9, 0x0B, 0x5B, - - 0x31, 0xD7, 0x0C, 0xE3, 0xD3, 0x37, 0xCA, 0xF9, - 0x9E, 0x7E, 0x57, 0xF1, 0x45, 0x02, 0x7D, 0xDC, - 0xA9, 0xBF, 0x73, 0x6B, 0x04, 0x16, 0x44, 0x6D, - 0x62, 0x65, 0x2E, 0x5D, 0xBE, 0x75, 0xD0, 0xA2, - 0x88, 0xF2, 0x60, 0xFE, 0x7B, 0xED, 0x74, - - 0x42, 0xD4, 0xAD, 0xFF, 0xDB, 0x5D, 0xBF, 0x2F, - 0xA9, 0xE1, 0x7B, 0x60, 0xB8, 0xE8, 0x4D, 0x6F, - 0xF9, 0x70, 0xE4, 0x26, 0x40, 0xFA, 0x19, 0x36, - 0x07, 0x5C, 0xEA, 0x0F, 0x47, 0x89, 0xE0, 0x91, - 0xD2, 0xF7, 0x75, 0xB7, 0x27, 0x3A, 0xCC, 0xEB, - - 0xCB, 0x20, 0xDD, 0xCD, 0x30, 0x13, 0xD8, 0x84, - 0xD8, 0x57, 0xAA, 0xFA, 0x74, 0xDA, 0x46, 0x49, - 0x35, 0x60, 0x93, 0x20, 0xAB, 0x32, 0x19, 0x02, - 0x3C, 0x8F, 0x9F, 0x1E, 0xAD, 0x4B, 0x8F, 0x5A, - 0xE5, 0x1F, 0xEA, 0x8B, 0x5C, 0x53, 0x81, 0x68, - 0x0D, - - 0xF9, 0x00, 0x75, 0x76, 0x0E, 0x8B, 0x33, 0xAF, - 0x83, 0xD4, 0xB4, 0x0D, 0xF1, 0x48, 0xD5, 0x02, - 0x08, 0x6F, 0xEC, 0x1B, 0xB0, 0x40, 0x82, 0xF2, - 0xF4, 0x52, 0xCB, 0x43, 0xE6, 0x0F, 0x1F, 0xBE, - 0x15, 0xCE, 0x9D, 0xB8, 0xED, 0x3F, 0x7B, 0xD0, - 0x94, 0xFF, - - 0x6C, 0x78, 0x7D, 0x34, 0x07, 0xA5, 0xB2, 0xA9, - 0xF8, 0x8F, 0xB6, 0x4E, 0x0D, 0x31, 0x23, 0xD2, - 0x71, 0xB5, 0x7D, 0x10, 0xBA, 0xA7, 0x35, 0x1F, - 0xDE, 0x10, 0xE7, 0x21, 0x56, 0x50, 0xB1, 0xAD, - 0x76, 0x03, 0x7C, 0x8C, 0x88, 0x12, 0x09, 0x46, - 0xF4, 0x5F, 0x57, - - 0xFC, 0xAC, 0x41, 0xB1, 0x66, 0xBD, 0xFE, 0x96, - 0x4D, 0xDA, 0x18, 0x9C, 0xDA, 0xA8, 0xC7, 0x6A, - 0x94, 0x5D, 0x2B, 0x44, 0xB0, 0xF6, 0x89, 0x58, - 0x9C, 0x30, 0xD3, 0xC8, 0x48, 0x2F, 0xE8, 0x9F, - 0xB5, 0x33, 0x4C, 0x2A, 0x89, 0x15, 0x71, 0xDF, - 0xDB, 0xA0, 0x4B, 0x00, - - 0x1F, 0x85, 0x54, 0x96, 0x15, 0x04, 0x80, 0x09, - 0xDB, 0x13, 0xA7, 0x52, 0x03, 0x5F, 0x8C, 0x6E, - 0x66, 0x9D, 0x65, 0x64, 0xB0, 0x73, 0xC0, 0x61, - 0xCD, 0xF1, 0xEF, 0xE6, 0x01, 0x5B, 0x3B, 0x85, - 0xB8, 0x9E, 0x54, 0xC8, 0x47, 0x9C, 0x8A, 0x9C, - 0x27, 0x43, 0x4D, 0xB3, 0x33, - - 0x96, 0xEA, 0xF6, 0x72, 0xED, 0x28, 0x75, 0x42, - 0x06, 0x81, 0xEA, 0x29, 0xDF, 0xE4, 0x06, 0x51, - 0xD2, 0x3F, 0x42, 0xF5, 0x9C, 0xDD, 0x4C, 0xCD, - 0xA3, 0xEC, 0x46, 0x65, 0xD8, 0xA2, 0x5D, 0x05, - 0x6D, 0x5B, 0x46, 0x18, 0x44, 0xB0, 0x34, 0x02, - 0x7A, 0xEF, 0x24, 0x2A, 0x73, 0x69, - - 0x41, 0xC9, 0xA4, 0x8C, 0xE0, 0x92, 0xB4, 0xAB, - 0xCB, 0xFA, 0x94, 0xDF, 0xF5, 0x29, 0xFA, 0x23, - 0x43, 0x0F, 0xF0, 0x96, 0x01, 0x58, 0xAC, 0x6E, - 0x16, 0x5B, 0x59, 0xAA, 0x46, 0x10, 0xA5, 0x27, - 0xF3, 0xD0, 0x6D, 0x7B, 0xA8, 0x44, 0x2E, 0x9D, - 0xF9, 0x62, 0x87, 0xA4, 0xA2, 0xDC, 0x69, - - 0xA6, 0xBB, 0x70, 0x33, 0x8E, 0x2E, 0xBD, 0xF7, - 0x24, 0xAF, 0x04, 0xAF, 0x33, 0x3C, 0x58, 0x6A, - 0xB0, 0x83, 0xC6, 0x4B, 0xE6, 0xB6, 0x90, 0xDA, - 0x29, 0xFC, 0x34, 0xDE, 0x50, 0x4E, 0x4F, 0x77, - 0xD6, 0x31, 0x41, 0x80, 0x52, 0x06, 0x39, 0x11, - 0x83, 0xA9, 0x34, 0x69, 0x87, 0xAC, 0x54, 0x28, - - 0x5E, 0x8D, 0x7B, 0xAE, 0xCD, 0x3B, 0x76, 0xBC, - 0xD6, 0x0A, 0x5D, 0x7A, 0x91, 0x4C, 0x51, 0x5D, - 0x54, 0xA6, 0x9D, 0xB8, 0xAD, 0xE9, 0xA3, 0xCB, - 0x80, 0xAD, 0xE8, 0x72, 0x99, 0xFE, 0x31, 0xFA, - 0x9F, 0x5E, 0xB4, 0x7A, 0x8A, 0x33, 0x19, 0x42, - 0xF4, 0x7E, 0xB1, 0x68, 0x28, 0x72, 0xFD, 0xCB, - 0x39, - - 0x4E, 0x1D, 0xFC, 0x0C, 0x9C, 0x55, 0x80, 0x6A, - 0x05, 0x1B, 0x55, 0x77, 0x9D, 0x42, 0x98, 0x4A, - 0x70, 0x70, 0x1E, 0x06, 0x48, 0xD3, 0x76, 0x72, - 0x6A, 0x14, 0x71, 0xA2, 0xF9, 0xB1, 0xB2, 0xE9, - 0x17, 0x08, 0x95, 0x20, 0x2A, 0x00, 0xDF, 0x29, - 0x3B, 0xFA, 0x3C, 0xD2, 0x63, 0xAF, 0x24, 0xF9, - 0x08, 0x09, - - 0xCB, 0x1E, 0x1E, 0x95, 0xE6, 0x40, 0xDF, 0x3F, - 0x0C, 0x7B, 0x5B, 0x76, 0xFD, 0x13, 0xC4, 0x95, - 0xBE, 0xCC, 0x66, 0xD9, 0x1D, 0x4F, 0xBD, 0x29, - 0xBB, 0x3F, 0x5C, 0x3B, 0xA4, 0x0E, 0x4E, 0x76, - 0xD4, 0x42, 0x6F, 0x64, 0xCA, 0x26, 0xAB, 0x7B, - 0xA6, 0x9C, 0x54, 0x7B, 0x2A, 0x71, 0xBA, 0xC2, - 0xF0, 0xF2, 0x6F, - - 0x63, 0xF4, 0x8B, 0x62, 0x4F, 0xE7, 0x46, 0xCC, - 0x4F, 0x60, 0x20, 0x8B, 0x00, 0x57, 0xD0, 0xA7, - 0xDF, 0x6F, 0x08, 0x5C, 0x6F, 0x00, 0x78, 0xA8, - 0x5A, 0x77, 0x71, 0x65, 0x6E, 0x01, 0x71, 0x8D, - 0x2B, 0x15, 0x90, 0x7E, 0x59, 0xA4, 0xF6, 0x23, - 0xF3, 0x12, 0xBC, 0x3C, 0xFD, 0x21, 0x7D, 0x2E, - 0x7E, 0x4F, 0x83, 0xD7, - - 0x76, 0xC1, 0x46, 0xC5, 0x86, 0x11, 0xE9, 0x28, - 0x6A, 0x97, 0x26, 0xC7, 0x89, 0xA7, 0xCD, 0x01, - 0x40, 0x53, 0xD6, 0x42, 0xB3, 0xF1, 0x48, 0x51, - 0x11, 0xC6, 0x9E, 0xDF, 0x91, 0x5C, 0xD9, 0x4C, - 0xB9, 0x68, 0x63, 0x6D, 0xBC, 0xCE, 0x6F, 0x5E, - 0xE3, 0xFC, 0xAB, 0xCE, 0x24, 0x94, 0x5C, 0x43, - 0x51, 0xB6, 0xE7, 0x99, 0x45, - - 0xC9, 0xC7, 0xCD, 0x1F, 0x2E, 0x48, 0x25, 0xC3, - 0x1C, 0xF8, 0x85, 0x32, 0x15, 0x56, 0x82, 0x17, - 0xF4, 0xDC, 0x5F, 0xAE, 0xEF, 0x94, 0xDD, 0xFA, - 0xEA, 0xEE, 0xFC, 0x9B, 0x8C, 0xE1, 0x2E, 0xCF, - 0xE3, 0x40, 0x03, 0xF7, 0xBD, 0x7B, 0x12, 0x56, - 0x42, 0xCA, 0x1A, 0x68, 0xEF, 0xC3, 0xEF, 0xAC, - 0xEB, 0xA8, 0xD8, 0x91, 0x8C, 0x42, - - 0x78, 0xF9, 0x51, 0x9E, 0x84, 0x32, 0xFC, 0xBA, - 0x46, 0xA0, 0xF1, 0x04, 0x77, 0xF6, 0x93, 0xAD, - 0xB3, 0x95, 0xA3, 0x69, 0xA4, 0xAD, 0x45, 0x89, - 0x39, 0xFC, 0x08, 0x35, 0x45, 0xA9, 0xDC, 0x26, - 0x55, 0xA2, 0x8E, 0x3E, 0xF5, 0xE3, 0x86, 0xD1, - 0x1A, 0x37, 0x4C, 0x96, 0x16, 0x68, 0x06, 0x01, - 0xF0, 0x0D, 0x02, 0x4F, 0x17, 0x34, 0x9C, - - 0xD8, 0xFF, 0x53, 0x2C, 0xEE, 0xA5, 0xEB, 0x21, - 0xD8, 0x4C, 0x89, 0xCF, 0x7F, 0x15, 0x59, 0x5D, - 0xDD, 0x45, 0x01, 0x6A, 0x71, 0x0B, 0x47, 0x2C, - 0x72, 0x08, 0xC4, 0x5D, 0x71, 0x6A, 0x59, 0xDB, - 0x46, 0x0E, 0xDF, 0xD7, 0x2B, 0xDA, 0xE1, 0x69, - 0x0A, 0xE7, 0xD7, 0x5F, 0x18, 0x49, 0xC6, 0xA2, - 0xA7, 0x1A, 0x2E, 0x94, 0xCD, 0x45, 0xD9, 0x5A, - - 0x51, 0x54, 0x80, 0x8F, 0x07, 0xDA, 0xCC, 0x7B, - 0xB8, 0xE1, 0xE0, 0xEE, 0xF2, 0x7D, 0x8D, 0x2D, - 0xF0, 0x50, 0x5A, 0xB6, 0xF5, 0xBC, 0x62, 0xBC, - 0xA6, 0x75, 0xB7, 0x80, 0xBA, 0x6E, 0x1D, 0x7C, - 0xD5, 0xC7, 0x42, 0x31, 0xA3, 0x98, 0x08, 0xFE, - 0x13, 0xA2, 0xA6, 0x74, 0x4D, 0xF3, 0x20, 0x9E, - 0xEB, 0x83, 0x64, 0x27, 0xE4, 0x9C, 0x3C, 0x1F, - 0xC2, - - 0xF1, 0x24, 0xBC, 0xD3, 0x95, 0x66, 0x65, 0x69, - 0xA7, 0x6E, 0x61, 0x08, 0x9C, 0xBF, 0xC3, 0x9B, - 0x9B, 0x09, 0x05, 0x0B, 0x94, 0xB4, 0x64, 0xB2, - 0x0E, 0x0F, 0x19, 0x0C, 0x6D, 0x92, 0xF5, 0xC3, - 0xB8, 0x9B, 0xBF, 0x59, 0x00, 0x6D, 0x8D, 0x48, - 0xE0, 0xB1, 0x06, 0xC2, 0x3E, 0x33, 0x26, 0x24, - 0x6F, 0x53, 0xBE, 0x86, 0xD7, 0xEA, 0xCD, 0x18, - 0x18, 0x24, - - 0xE8, 0xE1, 0xC4, 0x50, 0xEF, 0xB6, 0xF0, 0xCA, - 0x78, 0xEF, 0x9C, 0x51, 0x61, 0x58, 0x18, 0xB7, - 0x90, 0x09, 0x48, 0x73, 0xA1, 0x13, 0x6D, 0x16, - 0x8D, 0x97, 0x84, 0x92, 0x25, 0x44, 0xBF, 0xF5, - 0x3C, 0x9D, 0xCE, 0x68, 0x7E, 0x4B, 0x0A, 0x49, - 0xE1, 0xAE, 0xA7, 0xB3, 0xC8, 0xE0, 0x7B, 0x54, - 0xF9, 0xAB, 0x22, 0x0A, 0x19, 0x4F, 0x86, 0x1F, - 0xB7, 0x0F, 0x3A, - - 0x23, 0xD4, 0x95, 0xC7, 0xF9, 0xB7, 0x17, 0x4B, - 0xE8, 0x10, 0xF9, 0xB4, 0xCA, 0x9F, 0xBA, 0xBE, - 0x66, 0xAA, 0x83, 0x98, 0x7D, 0x2B, 0xF4, 0x84, - 0x18, 0x13, 0xCE, 0xBE, 0x10, 0x7D, 0x1B, 0x76, - 0x89, 0xBC, 0x9C, 0xF4, 0xE6, 0x71, 0x62, 0xA7, - 0x39, 0x89, 0xEF, 0x0D, 0xE9, 0x63, 0xD9, 0xB1, - 0x96, 0x63, 0xAC, 0xBC, 0xC7, 0x85, 0x77, 0xE3, - 0xD4, 0x40, 0x41, 0x5C, - - 0x0F, 0x8F, 0x47, 0xF8, 0xEA, 0x17, 0x30, 0x7E, - 0x67, 0xE2, 0x69, 0xF5, 0x20, 0xD9, 0xE0, 0x87, - 0xAB, 0xF6, 0x70, 0xBE, 0xF1, 0x26, 0x25, 0x01, - 0x14, 0x69, 0xE8, 0x8E, 0xA9, 0x8E, 0xB2, 0xAE, - 0xA5, 0x2C, 0x5F, 0x9D, 0x0C, 0x50, 0xC6, 0x95, - 0xC1, 0xDE, 0xEC, 0x7D, 0xEA, 0x87, 0xCA, 0x02, - 0xD7, 0x3F, 0x5E, 0x8A, 0xB3, 0x3A, 0xDA, 0x6A, - 0x33, 0xAD, 0x06, 0xD4, 0x6D, - - 0xAB, 0x89, 0xF3, 0x78, 0x67, 0x63, 0xD5, 0xFC, - 0xF2, 0x19, 0xD5, 0x91, 0x5C, 0x10, 0x86, 0x9F, - 0xD2, 0xDC, 0x46, 0xD9, 0xC7, 0xAA, 0x4E, 0x44, - 0xFF, 0x79, 0x5B, 0x8A, 0xE3, 0x47, 0x92, 0x20, - 0xA8, 0xA3, 0x5C, 0x95, 0xEF, 0xD2, 0x21, 0x49, - 0x8C, 0x66, 0x0D, 0xCD, 0xD2, 0x1D, 0x11, 0x22, - 0x31, 0x62, 0x47, 0xC9, 0xD4, 0xC1, 0xBC, 0xB3, - 0x80, 0x84, 0xB4, 0x71, 0xC1, 0xAB, - - 0x85, 0x76, 0x7F, 0x0D, 0x73, 0xE2, 0x6C, 0xB5, - 0x98, 0x1F, 0x7E, 0x09, 0xFC, 0x2D, 0xD6, 0xA4, - 0xE7, 0x57, 0xDC, 0x14, 0xCB, 0xD9, 0x7D, 0x46, - 0xC9, 0x6E, 0xE7, 0x61, 0x0A, 0x5F, 0x3D, 0xAB, - 0x4D, 0x39, 0x77, 0x96, 0xF5, 0xB0, 0x0C, 0x53, - 0x21, 0xBB, 0xA2, 0xAC, 0xA9, 0xC6, 0x91, 0xB9, - 0xF8, 0x03, 0xE2, 0xDD, 0xEE, 0x3B, 0xB7, 0xEB, - 0xD8, 0xB7, 0xCE, 0xAC, 0x02, 0xA1, 0xA8, - - 0xAA, 0xBE, 0xDD, 0x59, 0x61, 0xF8, 0xD1, 0x11, - 0x7A, 0xC2, 0x81, 0x7E, 0x61, 0x58, 0xAF, 0xA2, - 0x67, 0xC1, 0xA2, 0x8F, 0xE1, 0xC7, 0x0D, 0x27, - 0x2B, 0x4A, 0x9A, 0x6A, 0x77, 0x68, 0xFD, 0x68, - 0x18, 0xF1, 0xDB, 0x55, 0xBA, 0xEC, 0x2A, 0x37, - 0x7F, 0xD2, 0x68, 0xA7, 0xEF, 0x31, 0x77, 0x97, - 0xDE, 0x6B, 0x56, 0xB1, 0x5E, 0xBE, 0xBD, 0x51, - 0x07, 0x3E, 0xD6, 0xD9, 0x01, 0x64, 0xB8, 0x65, - - 0x52, 0x67, 0x5D, 0x5E, 0x11, 0xDA, 0x06, 0xC2, - 0xA6, 0x8E, 0x41, 0xE4, 0x30, 0x59, 0x2F, 0x73, - 0x40, 0x03, 0x88, 0x85, 0xE6, 0x91, 0x29, 0xCB, - 0xA6, 0x68, 0x56, 0xCF, 0x05, 0xE4, 0xD7, 0xA2, - 0x46, 0xC6, 0xC1, 0x06, 0x50, 0x0E, 0x1F, 0xAA, - 0xC2, 0xB2, 0x6E, 0x2F, 0xB9, 0x1A, 0x9F, 0xC3, - 0xC0, 0xD8, 0xD7, 0xF6, 0xCD, 0xD8, 0x92, 0xFB, - 0x6A, 0x4F, 0xFA, 0x2D, 0x0E, 0x13, 0x01, 0xD8, - 0x9A, - - 0x6B, 0xA5, 0xF2, 0x8D, 0x73, 0x10, 0x6F, 0x06, - 0x2B, 0x8B, 0x10, 0x56, 0xF6, 0x5F, 0xC0, 0x94, - 0x1C, 0x70, 0xB3, 0xBE, 0xEE, 0x00, 0x4D, 0x50, - 0x94, 0x88, 0xC5, 0x51, 0x01, 0x8B, 0xE8, 0xA5, - 0xF8, 0x89, 0x0F, 0x97, 0x7F, 0x0C, 0x67, 0x6F, - 0xC7, 0x1F, 0x91, 0x20, 0xD7, 0x32, 0x9C, 0x63, - 0xFF, 0xE7, 0xB8, 0x63, 0x0F, 0xE1, 0xCE, 0xC7, - 0xEA, 0x82, 0x1D, 0x57, 0xEC, 0xB9, 0xF9, 0x05, - 0x8D, 0x94, - - 0xFE, 0x5B, 0xB2, 0x66, 0xD8, 0xDF, 0x19, 0x49, - 0x59, 0x8E, 0xBC, 0xC5, 0xC7, 0xD1, 0x6F, 0x0A, - 0x8A, 0x5B, 0x0C, 0xF4, 0xC2, 0x35, 0x62, 0x61, - 0x89, 0x2E, 0x43, 0x70, 0x7D, 0x5A, 0xE7, 0xF1, - 0x63, 0x92, 0xDD, 0xD4, 0xBD, 0x61, 0x93, 0x8C, - 0x21, 0x13, 0x96, 0xBA, 0xDB, 0x7A, 0x1B, 0x81, - 0x43, 0x6B, 0x3F, 0x2C, 0x2E, 0x6B, 0xB2, 0x49, - 0x2E, 0x28, 0xB2, 0x79, 0x52, 0x66, 0x89, 0x48, - 0xE7, 0x97, 0x44, - - 0x4C, 0xAD, 0x82, 0xE3, 0x09, 0xEA, 0x08, 0x73, - 0xF4, 0x16, 0x4D, 0x67, 0x33, 0x17, 0xB0, 0x47, - 0x16, 0xA2, 0xAF, 0x99, 0xFE, 0x5A, 0x45, 0x70, - 0x5C, 0xB2, 0xF2, 0x7A, 0x64, 0xC9, 0x65, 0xE3, - 0x07, 0xAD, 0x8D, 0x77, 0x3F, 0x10, 0x9E, 0xCE, - 0xC5, 0x63, 0xA2, 0x67, 0xE3, 0xFE, 0x48, 0xAC, - 0x9A, 0x8F, 0x9E, 0xB9, 0x63, 0xB2, 0x2B, 0x59, - 0xF1, 0x53, 0x18, 0x95, 0xA8, 0x12, 0x28, 0xAF, - 0xCF, 0x97, 0x9A, 0xC9, - - 0x5C, 0x23, 0xC9, 0xB0, 0x2F, 0x8E, 0x8B, 0x75, - 0xBC, 0xD3, 0x76, 0x22, 0xD0, 0x83, 0x85, 0x0A, - 0xA8, 0xC1, 0xF6, 0x06, 0xD5, 0x80, 0x59, 0xEB, - 0xF5, 0xD2, 0xBF, 0x35, 0x76, 0x64, 0xF6, 0x40, - 0x2B, 0xC4, 0x59, 0xA4, 0x8A, 0x21, 0x78, 0x77, - 0xBD, 0x4C, 0x2D, 0x11, 0x24, 0x31, 0x33, 0xF4, - 0x8D, 0x89, 0x61, 0xA4, 0xD9, 0x74, 0xEC, 0xEA, - 0xC9, 0x90, 0x9C, 0x79, 0x5D, 0x4B, 0x9E, 0x92, - 0xB5, 0x0D, 0x94, 0xE4, 0xCE, - - 0xAC, 0xE3, 0xD3, 0xD0, 0x7C, 0x51, 0x6F, 0xD7, - 0x73, 0xC9, 0x82, 0x6B, 0x9A, 0x6C, 0x8D, 0x56, - 0xB4, 0x17, 0xB7, 0xD8, 0xAD, 0x80, 0xA7, 0xFC, - 0xCA, 0xD5, 0x5B, 0x8E, 0x3A, 0xE3, 0x4B, 0x6B, - 0xFD, 0x75, 0x1B, 0xD1, 0xE5, 0xBA, 0x64, 0xD8, - 0xC4, 0x29, 0x83, 0xF8, 0x18, 0x98, 0xA2, 0x96, - 0x10, 0xB2, 0x3E, 0x60, 0x04, 0xE9, 0x9A, 0x68, - 0x2D, 0xFD, 0x41, 0x6A, 0xB7, 0xB4, 0xB8, 0x81, - 0x08, 0x54, 0x7A, 0xBF, 0xD1, 0x91, - - 0xA9, 0xB0, 0xF9, 0x25, 0x66, 0xC3, 0xF5, 0x4D, - 0x9A, 0x9A, 0x18, 0x15, 0x8E, 0x06, 0x8E, 0xC3, - 0x75, 0x7B, 0x99, 0xE2, 0x07, 0x49, 0x41, 0x19, - 0xA1, 0x7E, 0x3E, 0x13, 0xED, 0x3E, 0xB9, 0x66, - 0x89, 0x37, 0x37, 0xE3, 0xBC, 0xC4, 0xA7, 0xA5, - 0xB4, 0x5A, 0x57, 0x1B, 0xF7, 0xAD, 0x54, 0x13, - 0xF5, 0x4F, 0x80, 0x3F, 0xF9, 0x02, 0x89, 0xCA, - 0xFE, 0x2F, 0xE3, 0xC5, 0x63, 0xB6, 0x4D, 0x72, - 0x95, 0x25, 0x51, 0xFE, 0xD7, 0x4C, 0x7B, - - 0xB9, 0x14, 0xD1, 0xAD, 0x98, 0x4B, 0x37, 0x28, - 0x4B, 0x73, 0xFE, 0x28, 0x3F, 0x0B, 0x83, 0xC4, - 0xB6, 0xED, 0x8D, 0x4E, 0x25, 0x12, 0xB5, 0x41, - 0xB3, 0xAC, 0x2C, 0x2A, 0x8B, 0x5C, 0x3D, 0xE6, - 0x69, 0xE1, 0x99, 0x18, 0x31, 0x78, 0xCB, 0xAC, - 0xA8, 0xE7, 0x7F, 0x44, 0xFF, 0x87, 0xBB, 0x92, - 0xBD, 0x98, 0xEF, 0xD3, 0x86, 0x1B, 0xD3, 0xB5, - 0xB2, 0x78, 0x56, 0x1D, 0x7A, 0x0C, 0x4D, 0xC7, - 0x15, 0xA1, 0x68, 0x10, 0x85, 0x19, 0x39, 0x9A, - - 0x4B, 0x01, 0x86, 0x3D, 0x0D, 0xB2, 0x31, 0x1F, - 0xA1, 0xCA, 0x12, 0x0C, 0x59, 0x69, 0xEC, 0x14, - 0x62, 0xC9, 0x17, 0xC2, 0x61, 0xF1, 0x60, 0x2B, - 0x8C, 0x46, 0x80, 0x62, 0x9E, 0x7E, 0xE4, 0x21, - 0xC3, 0x3F, 0xF7, 0x4C, 0x31, 0xCE, 0x8B, 0x4C, - 0x87, 0x48, 0xD9, 0x60, 0x39, 0xFD, 0xFC, 0x12, - 0x15, 0x2F, 0x35, 0x74, 0x79, 0xEB, 0x87, 0x20, - 0x72, 0x23, 0xE6, 0x66, 0x5A, 0xD4, 0xFB, 0x72, - 0xA9, 0x6B, 0xDB, 0xB4, 0x30, 0xFD, 0x80, 0xF5, - 0xBB, - - 0xBC, 0xD6, 0x2A, 0xC2, 0x2E, 0x81, 0x71, 0xF7, - 0xF9, 0x29, 0x5B, 0xBB, 0x8C, 0x84, 0xB3, 0xB2, - 0x47, 0xF4, 0xBB, 0x9C, 0x82, 0xC0, 0x35, 0xA2, - 0xEA, 0xA7, 0x4E, 0xA5, 0x5E, 0xD5, 0x0D, 0xDF, - 0x89, 0x3E, 0xC1, 0x3F, 0x8B, 0x82, 0xE5, 0xEB, - 0x4D, 0x87, 0xD9, 0x73, 0xAC, 0x06, 0x8A, 0xB4, - 0xF3, 0x2C, 0x83, 0xCB, 0x08, 0xB5, 0xB2, 0x74, - 0x16, 0xD0, 0x97, 0x87, 0x53, 0x6C, 0x73, 0x7B, - 0x20, 0x0D, 0x18, 0x7F, 0x3A, 0xD6, 0x3D, 0xF0, - 0x9E, 0x00, - - 0xE9, 0x20, 0xCF, 0x62, 0x26, 0x4F, 0xA8, 0xA2, - 0x8C, 0xCC, 0x32, 0xDE, 0x6B, 0xA5, 0x44, 0xB7, - 0xD0, 0x25, 0x48, 0x4B, 0xB7, 0x10, 0x61, 0x3B, - 0x93, 0xFB, 0xFB, 0x57, 0x02, 0xBC, 0x02, 0xD2, - 0x8E, 0x33, 0x08, 0xBF, 0xA2, 0x02, 0xB4, 0xDF, - 0x86, 0x33, 0xCD, 0xCD, 0x7C, 0x3B, 0x8D, 0xDB, - 0x90, 0x3A, 0xF3, 0x55, 0x82, 0x73, 0x5F, 0x27, - 0x8D, 0xED, 0x06, 0x08, 0x18, 0x27, 0xAF, 0xF8, - 0x7B, 0x01, 0x4E, 0xB0, 0xF2, 0xE8, 0xD9, 0x73, - 0x43, 0x59, 0xB0, - - 0x92, 0x47, 0x3D, 0x62, 0x6D, 0x82, 0xB4, 0x89, - 0x35, 0xCB, 0x4A, 0x66, 0x24, 0xF1, 0x14, 0x40, - 0xA6, 0xAD, 0xE1, 0xD4, 0xC8, 0xFB, 0x08, 0x90, - 0xFC, 0x33, 0xA8, 0x2E, 0xCF, 0x38, 0x4C, 0x45, - 0xF8, 0x8D, 0x4B, 0x11, 0xF8, 0x7F, 0xD8, 0x4F, - 0x22, 0x2D, 0x7B, 0x38, 0x8C, 0x8F, 0xDF, 0x8B, - 0xF1, 0x4B, 0xCF, 0x46, 0xE5, 0xCC, 0x8D, 0x0A, - 0x7A, 0x0E, 0xF8, 0xDE, 0xCE, 0x10, 0xCA, 0xCD, - 0xA8, 0x30, 0x0A, 0x63, 0x0E, 0xA0, 0x32, 0x54, - 0x5C, 0x77, 0x49, 0xDC, - - 0xED, 0xA1, 0x20, 0xA9, 0x5E, 0x2A, 0xBC, 0xBC, - 0x1A, 0x8D, 0x48, 0x71, 0x4E, 0x3A, 0xFA, 0xEA, - 0x8F, 0x78, 0x3F, 0xA6, 0x61, 0x28, 0xC3, 0xC9, - 0x01, 0xCF, 0xD4, 0x2E, 0x36, 0x40, 0x90, 0xA8, - 0xCA, 0x45, 0x40, 0xFE, 0x9E, 0xB6, 0x40, 0x28, - 0xFB, 0x28, 0x3E, 0x07, 0xFC, 0xA1, 0x1A, 0x8D, - 0xA8, 0x5B, 0xB1, 0x1A, 0xE3, 0x18, 0xDC, 0xB3, - 0x19, 0x14, 0xF9, 0xB9, 0x9C, 0xF2, 0x15, 0xE2, - 0x70, 0xD5, 0x74, 0xFF, 0x1E, 0xED, 0x92, 0x0C, - 0xC9, 0xE7, 0x57, 0x55, 0x8B, - - 0xD5, 0x15, 0x63, 0x0A, 0x41, 0xF9, 0x2B, 0x15, - 0x55, 0x1E, 0x63, 0x96, 0xC3, 0xF0, 0x21, 0x90, - 0xFB, 0xB9, 0xC7, 0xFE, 0xEE, 0x15, 0x2C, 0x28, - 0xBB, 0x2C, 0x9D, 0x6F, 0x8E, 0xAB, 0x73, 0xD3, - 0x03, 0x39, 0xE9, 0xB4, 0xEC, 0xED, 0x48, 0x1F, - 0xDA, 0x87, 0x29, 0xA1, 0x4B, 0xD7, 0xC8, 0xCD, - 0xDB, 0xF0, 0xCF, 0x82, 0x54, 0x27, 0xBF, 0x20, - 0xF4, 0xD4, 0x52, 0xED, 0x64, 0xA2, 0x4A, 0x6D, - 0xC8, 0x78, 0x1E, 0x83, 0x03, 0xBA, 0x22, 0x9C, - 0xFC, 0xB1, 0xE0, 0x67, 0xC7, 0x23, - - 0x62, 0xB2, 0xA4, 0xD4, 0xCD, 0xAE, 0xD3, 0xF1, - 0xFB, 0x71, 0x5C, 0xDD, 0xD6, 0x51, 0x91, 0x9D, - 0x48, 0xBD, 0x3C, 0xF9, 0x0C, 0x05, 0xEB, 0xF8, - 0x55, 0x48, 0x03, 0xE6, 0x9C, 0x13, 0x9E, 0xB8, - 0x6B, 0xB5, 0x09, 0xB3, 0x89, 0x04, 0x96, 0xFD, - 0x1C, 0xE8, 0x0F, 0xC9, 0x19, 0x85, 0xE4, 0xCC, - 0xBB, 0xDB, 0xC3, 0x15, 0x69, 0xD9, 0xA1, 0x91, - 0x9B, 0x16, 0xE0, 0xD0, 0x74, 0x3F, 0xF4, 0x2D, - 0x33, 0x74, 0x02, 0x1D, 0xE3, 0xDB, 0xF8, 0xD3, - 0x33, 0xD9, 0x2F, 0x77, 0x94, 0x6B, 0x20, - - 0x86, 0x99, 0xFC, 0xEF, 0x12, 0x8E, 0x6E, 0x84, - 0x7A, 0x25, 0xD3, 0xB6, 0x37, 0xEE, 0x42, 0x0D, - 0x88, 0xE2, 0x53, 0xD7, 0x59, 0x4A, 0x73, 0x67, - 0xA6, 0x20, 0xA3, 0x91, 0x7C, 0x1F, 0xCA, 0x18, - 0xC9, 0xEF, 0xD1, 0xD0, 0xE0, 0xC7, 0x23, 0x14, - 0x03, 0x05, 0x7F, 0x84, 0xCD, 0xDB, 0xDB, 0x2D, - 0x31, 0x33, 0xBE, 0xD5, 0x1A, 0xDC, 0xC2, 0xBE, - 0x6C, 0x9B, 0x35, 0xFB, 0xAD, 0xC1, 0xDE, 0xDC, - 0xDC, 0xB9, 0xDE, 0xF5, 0x38, 0xCF, 0x06, 0x95, - 0x53, 0x24, 0x47, 0x9F, 0xB8, 0x41, 0x84, 0x9B, - - 0x13, 0x83, 0x54, 0x9F, 0x66, 0xE7, 0x40, 0x2D, - 0xD9, 0xB5, 0xB9, 0xAC, 0xB0, 0x08, 0x06, 0x54, - 0x50, 0x34, 0x07, 0x8A, 0x2E, 0x0B, 0xF2, 0x06, - 0x85, 0xF2, 0x8C, 0xC1, 0x24, 0x2D, 0x9F, 0x66, - 0x9A, 0x94, 0x93, 0x0E, 0xFA, 0x5E, 0xCC, 0x1D, - 0x74, 0xAE, 0x8F, 0xAA, 0x51, 0x0E, 0x7F, 0xD4, - 0x61, 0xA2, 0x29, 0xAB, 0xE9, 0x70, 0x8F, 0x99, - 0xFF, 0x11, 0x38, 0x84, 0x63, 0x6D, 0x91, 0xB8, - 0xF8, 0x08, 0x01, 0x08, 0x65, 0x39, 0xCF, 0x42, - 0x34, 0x29, 0x36, 0xDE, 0x29, 0xE9, 0x44, 0xFE, - 0x7E, - - 0x13, 0x26, 0xF8, 0xB2, 0xD9, 0x68, 0xE5, 0x81, - 0x20, 0xE6, 0xA3, 0xC8, 0x34, 0x43, 0x4D, 0xCE, - 0xA7, 0x87, 0x10, 0x98, 0x35, 0x91, 0x70, 0xF0, - 0x1D, 0xA4, 0xFB, 0x73, 0x00, 0x8E, 0x15, 0x49, - 0x14, 0xF8, 0xE8, 0x11, 0xA6, 0xBD, 0xEE, 0x7D, - 0x51, 0x49, 0x52, 0x5F, 0x0D, 0x63, 0x8D, 0x52, - 0x40, 0x4D, 0xF5, 0x40, 0x15, 0x04, 0x7C, 0xE2, - 0x23, 0xCE, 0x1F, 0x37, 0x15, 0x2C, 0xDF, 0x92, - 0xDC, 0xF7, 0xAB, 0xA5, 0x2B, 0xE8, 0x8C, 0xF9, - 0xF1, 0xBC, 0x42, 0x79, 0xE0, 0x6B, 0xBF, 0xEA, - 0x74, 0xBA, - - 0xB4, 0x5B, 0x74, 0xCE, 0x30, 0x5A, 0x8C, 0x7B, - 0xCE, 0x65, 0x3E, 0x64, 0xEE, 0x0D, 0xC8, 0x91, - 0x2E, 0x57, 0x6B, 0xE6, 0xD1, 0x95, 0xCC, 0x64, - 0xB6, 0x0E, 0x67, 0xD2, 0xB3, 0x52, 0x78, 0x18, - 0x1E, 0xE6, 0x49, 0x32, 0x61, 0x68, 0x94, 0x19, - 0x98, 0x54, 0xDB, 0x92, 0x8B, 0x9B, 0x4E, 0x75, - 0x93, 0x72, 0x59, 0x63, 0x8D, 0x3F, 0x2F, 0x9C, - 0x4D, 0xC6, 0x94, 0x60, 0xDD, 0xD9, 0xB3, 0xB4, - 0x04, 0xC0, 0xBC, 0x49, 0x94, 0x01, 0x61, 0x1B, - 0xF0, 0xB6, 0x94, 0xCF, 0x21, 0xE6, 0x96, 0x77, - 0xDF, 0xB9, 0x13, - - 0xB2, 0xEB, 0xE5, 0x13, 0x22, 0xCD, 0x5F, 0x6C, - 0x28, 0xB3, 0xCD, 0x37, 0x6A, 0xCC, 0xC8, 0x59, - 0xBC, 0x0A, 0x44, 0xC0, 0x53, 0xB7, 0xD9, 0x1F, - 0x6A, 0xD2, 0x7D, 0x34, 0xB8, 0x9F, 0xBF, 0xA7, - 0xF2, 0x87, 0x09, 0xF7, 0xE0, 0xDE, 0x43, 0x66, - 0xD8, 0xAF, 0x04, 0x03, 0x2A, 0x48, 0xBC, 0x70, - 0x49, 0x34, 0x05, 0x03, 0x85, 0xFC, 0x30, 0x78, - 0xE5, 0x2A, 0x30, 0x65, 0x95, 0x62, 0xD6, 0x0B, - 0x5C, 0xD6, 0x97, 0x4C, 0x65, 0x0A, 0x94, 0xB5, - 0x2E, 0xF7, 0x86, 0x30, 0x63, 0x4F, 0xA8, 0x72, - 0xAD, 0xF4, 0x19, 0xFB, - - 0x9B, 0x61, 0xE9, 0xE9, 0x8D, 0xB0, 0x02, 0x06, - 0x4D, 0x1C, 0x28, 0x5C, 0x65, 0x7E, 0x89, 0x02, - 0x47, 0x76, 0x1A, 0x1E, 0xEC, 0x64, 0xBA, 0x8D, - 0x59, 0xF0, 0xC5, 0xCE, 0x89, 0xCF, 0x11, 0x5E, - 0x3A, 0xBF, 0x8A, 0x32, 0x63, 0xFB, 0xD8, 0xC7, - 0x56, 0xA8, 0x6F, 0xF3, 0x2B, 0xC8, 0x5B, 0x8F, - 0xEC, 0x2C, 0x91, 0x35, 0x60, 0xE4, 0x84, 0x09, - 0x2F, 0x36, 0x8E, 0x4F, 0xFB, 0x06, 0xBD, 0x53, - 0xC4, 0x8A, 0x6B, 0x3B, 0xFA, 0x04, 0x50, 0x15, - 0x17, 0x63, 0x46, 0x9C, 0x54, 0xF6, 0xB6, 0xA9, - 0xEA, 0xE5, 0x60, 0x5E, 0x75, - - 0xC6, 0x4D, 0xA8, 0x7B, 0xC5, 0xC5, 0xDA, 0x2B, - 0xBB, 0x19, 0xA2, 0x36, 0xBE, 0x76, 0xA7, 0x34, - 0x92, 0xD4, 0xE2, 0xA5, 0xF3, 0xF1, 0xF8, 0xBE, - 0xA0, 0xA3, 0xB8, 0xE2, 0x3C, 0x39, 0x34, 0x84, - 0xE5, 0xF7, 0x48, 0xF3, 0xD1, 0x4F, 0x4E, 0xC2, - 0x4E, 0xB3, 0xC2, 0xBB, 0xE0, 0x1E, 0xAA, 0xBF, - 0x42, 0x62, 0x90, 0x4D, 0x62, 0xF5, 0x79, 0xE5, - 0x50, 0x25, 0x03, 0x37, 0x90, 0xAA, 0xF7, 0xFC, - 0xEB, 0xC0, 0x32, 0xDA, 0x1C, 0xD7, 0x1E, 0xA5, - 0x1C, 0x49, 0xF4, 0xE4, 0x94, 0x2D, 0x88, 0xA8, - 0x24, 0x7C, 0x0D, 0x1F, 0xB1, 0xA7, - - 0xE5, 0x1F, 0xCF, 0xE1, 0x7A, 0x7C, 0xF5, 0x66, - 0x6E, 0x92, 0x41, 0x68, 0x89, 0x5C, 0xD7, 0xB4, - 0x24, 0x06, 0xEE, 0x3D, 0x0D, 0xC7, 0xDF, 0xA9, - 0x48, 0x39, 0xCB, 0x8E, 0x79, 0xE9, 0xA8, 0x3D, - 0xB9, 0xFC, 0x97, 0xF1, 0x03, 0x06, 0xEB, 0xFB, - 0x14, 0x97, 0x96, 0xA1, 0xFB, 0x25, 0x12, 0x6D, - 0xA9, 0x2B, 0x0C, 0xC1, 0x27, 0x87, 0x4D, 0x17, - 0xDE, 0xEA, 0xD3, 0xEE, 0x3A, 0xA9, 0xD5, 0x80, - 0x52, 0x0E, 0xBB, 0x15, 0xA8, 0x16, 0x58, 0x25, - 0x7A, 0x6C, 0x55, 0x30, 0x80, 0xCE, 0x9B, 0x1E, - 0x97, 0x21, 0xD7, 0xEE, 0x5D, 0x4C, 0xE6, - - 0xEE, 0x3C, 0x03, 0x94, 0x28, 0xD8, 0xED, 0x96, - 0x2E, 0x67, 0x08, 0xEE, 0xDB, 0x31, 0xD9, 0x42, - 0x10, 0x51, 0x99, 0x56, 0x68, 0x60, 0xA6, 0x79, - 0x19, 0x7A, 0x54, 0xC3, 0xBD, 0x2A, 0x2D, 0x69, - 0xF1, 0xE2, 0xEF, 0xA7, 0x26, 0x3D, 0x9A, 0x6F, - 0x26, 0x8D, 0xE3, 0x0E, 0x3B, 0xFB, 0xCC, 0xFF, - 0x65, 0x09, 0xAD, 0x24, 0xEE, 0xA8, 0xD8, 0x55, - 0x83, 0xF5, 0xEA, 0x61, 0x07, 0x6F, 0x90, 0x54, - 0x3C, 0x1A, 0x8E, 0xB0, 0x89, 0x79, 0x8A, 0xA7, - 0x35, 0x05, 0x7B, 0xAF, 0xF0, 0xBC, 0x94, 0xB1, - 0x59, 0xF2, 0xB8, 0xAA, 0xC9, 0x92, 0x9B, 0x4A, - - 0xF6, 0xF8, 0x0F, 0x47, 0xEF, 0xEB, 0x09, 0xB2, - 0xB3, 0xC6, 0x0E, 0xE1, 0xA5, 0xA2, 0x62, 0x6D, - 0x44, 0x25, 0xEE, 0xEE, 0x35, 0xD0, 0x18, 0xBE, - 0x07, 0xC3, 0xAD, 0x9E, 0x8E, 0x93, 0xBB, 0x78, - 0xD7, 0x8F, 0x47, 0x6A, 0x27, 0x4C, 0x39, 0x18, - 0xD1, 0xC5, 0xA9, 0x9F, 0x31, 0x7F, 0x47, 0x6A, - 0x95, 0x35, 0x74, 0x6B, 0x1C, 0xD5, 0x33, 0x51, - 0x68, 0x58, 0x67, 0x89, 0xA8, 0x43, 0x9B, 0xE5, - 0xB4, 0x94, 0x5E, 0x62, 0xD5, 0x1C, 0xCB, 0x31, - 0x1E, 0x5C, 0xA8, 0x10, 0xA4, 0xC0, 0x62, 0xDE, - 0x19, 0xCC, 0x17, 0x09, 0x4A, 0x5B, 0x88, 0xC3, - 0xE4, - - 0xFB, 0xD9, 0x1D, 0x95, 0x93, 0x0F, 0xBA, 0xDB, - 0x70, 0x42, 0x47, 0x89, 0xB4, 0xF2, 0xCB, 0xF9, - 0x65, 0x5F, 0x8D, 0xC7, 0x44, 0x51, 0x39, 0x7F, - 0xCC, 0xD2, 0x8A, 0xA7, 0x14, 0xFE, 0xFC, 0x4A, - 0x36, 0x50, 0x6E, 0x18, 0xF9, 0xAF, 0x0E, 0xB5, - 0xEC, 0x1B, 0xCB, 0x66, 0xE0, 0x1A, 0x41, 0xC2, - 0xA8, 0x5F, 0x62, 0x35, 0xE5, 0x9C, 0xCB, 0x35, - 0x40, 0x51, 0x54, 0x25, 0xA6, 0xAB, 0x3D, 0x87, - 0x13, 0x58, 0x6C, 0x39, 0xEA, 0x09, 0xDE, 0xF4, - 0xD9, 0x8D, 0x55, 0xF3, 0xBF, 0x18, 0xDC, 0xD5, - 0x9E, 0xD2, 0xCE, 0x9D, 0x38, 0x99, 0x16, 0xB3, - 0x67, 0xAB, - - 0xFF, 0x15, 0x86, 0xD2, 0x9C, 0x6E, 0xBB, 0xC6, - 0x3F, 0xB4, 0x57, 0x9D, 0x0C, 0x84, 0xCF, 0xE3, - 0xAB, 0x55, 0xA6, 0x11, 0x6A, 0xBB, 0xB8, 0x3A, - 0x4C, 0x18, 0x53, 0x53, 0x54, 0xAE, 0x1F, 0x48, - 0x81, 0x98, 0x10, 0x13, 0x95, 0xE5, 0xF7, 0xC9, - 0x7A, 0xE5, 0x08, 0x3D, 0xD2, 0xE3, 0xE0, 0x63, - 0x08, 0x2C, 0x53, 0x35, 0x4A, 0xFA, 0xB1, 0x33, - 0x8C, 0xE7, 0x4B, 0xE7, 0x56, 0x9C, 0x97, 0x26, - 0xC8, 0xD7, 0x8F, 0x37, 0xF0, 0x8C, 0x69, 0x30, - 0x6C, 0x6B, 0xE9, 0x50, 0x03, 0xDC, 0xF3, 0x06, - 0x02, 0x6B, 0x73, 0x97, 0xF3, 0xC8, 0x51, 0x90, - 0x56, 0xEE, 0x6B, - - 0xD1, 0x92, 0x49, 0xBE, 0x13, 0xB9, 0x0D, 0xC3, - 0x94, 0x48, 0xF7, 0xAE, 0x8D, 0xB3, 0xCD, 0x40, - 0xBB, 0x01, 0x2F, 0x5E, 0x65, 0xBF, 0x15, 0xE7, - 0xC9, 0x23, 0xD8, 0x8A, 0x31, 0x92, 0xD4, 0x89, - 0x03, 0x92, 0x64, 0x77, 0xC4, 0x02, 0xA1, 0xC8, - 0x06, 0xA5, 0x46, 0xD8, 0x83, 0x19, 0x9B, 0x49, - 0x2C, 0x77, 0x14, 0x1C, 0x37, 0xEC, 0xBC, 0x16, - 0x16, 0x90, 0x38, 0x5D, 0x7B, 0x62, 0xC7, 0x5E, - 0xB9, 0x90, 0x4C, 0x86, 0xB1, 0x04, 0x3F, 0x9B, - 0x97, 0xFF, 0x96, 0x96, 0xF8, 0x8C, 0xED, 0x30, - 0x29, 0x97, 0xCE, 0x39, 0x08, 0xEA, 0xCE, 0xEC, - 0xE4, 0xD5, 0x97, 0x80, - - 0xED, 0x40, 0x76, 0x4D, 0x2A, 0x83, 0x9E, 0xB9, - 0x0E, 0xA6, 0x9B, 0xFF, 0x43, 0xD3, 0x57, 0x22, - 0xA1, 0xE5, 0x19, 0x44, 0x8A, 0x2C, 0x2B, 0xA5, - 0xE0, 0x58, 0x00, 0xEA, 0xDE, 0xD7, 0x77, 0x95, - 0x98, 0x02, 0x43, 0xC8, 0xAC, 0x9E, 0x10, 0x49, - 0xDD, 0xFC, 0x0D, 0x6B, 0x69, 0x0C, 0x5F, 0xA6, - 0xBC, 0x11, 0xCB, 0xB0, 0x40, 0x8C, 0xFD, 0xFD, - 0x28, 0xEF, 0xEB, 0xAC, 0x73, 0xCD, 0x15, 0x74, - 0x49, 0x08, 0x5F, 0xE5, 0xCA, 0x39, 0x3E, 0x07, - 0xAB, 0xF0, 0xE8, 0xC3, 0x6F, 0xEC, 0x41, 0x50, - 0x29, 0x5A, 0xF8, 0xD8, 0x95, 0x68, 0x77, 0xA9, - 0x31, 0x9A, 0x5E, 0xB7, 0xFD, - - 0x4E, 0xB1, 0x03, 0x95, 0xE6, 0x22, 0x49, 0x89, - 0xDE, 0x26, 0x73, 0x65, 0x0B, 0xE2, 0x85, 0xA1, - 0xC5, 0x15, 0x5B, 0x5F, 0x8D, 0xC8, 0xB3, 0x15, - 0xCB, 0x39, 0xD8, 0xD8, 0x12, 0xEF, 0x83, 0x89, - 0x02, 0x81, 0x5A, 0x36, 0xB4, 0xAF, 0xE0, 0xA4, - 0xE3, 0x1E, 0x72, 0xB6, 0x80, 0x1A, 0xCA, 0xB9, - 0xF8, 0x64, 0x80, 0x62, 0x55, 0xA3, 0x50, 0x6F, - 0xD0, 0x4C, 0x37, 0xFC, 0xFE, 0x8D, 0xC6, 0xFE, - 0xD9, 0x6A, 0x6A, 0x1E, 0x44, 0x35, 0xCF, 0x6A, - 0x1F, 0xDC, 0x86, 0x22, 0x74, 0x5D, 0xC9, 0x6A, - 0xFA, 0x32, 0x12, 0xB3, 0x12, 0x8A, 0x9D, 0x29, - 0x6A, 0xB0, 0x10, 0x73, 0xF3, 0xAF, - - 0xAF, 0x25, 0xCA, 0x2F, 0xCC, 0xAC, 0xEB, 0x64, - 0x67, 0xCA, 0x4A, 0xC6, 0xE6, 0x6C, 0x98, 0xC8, - 0xB9, 0x12, 0xCF, 0xCD, 0x56, 0xC1, 0x01, 0x32, - 0x36, 0xEB, 0xE5, 0x58, 0xAC, 0xEC, 0x2D, 0xA6, - 0xF9, 0x95, 0x84, 0xD9, 0x21, 0x13, 0x81, 0xE7, - 0x8B, 0x46, 0x34, 0x3E, 0x29, 0xD7, 0x02, 0xAE, - 0xC7, 0x45, 0x38, 0xC1, 0x69, 0x70, 0xE9, 0x38, - 0x2C, 0x9D, 0x0F, 0xE1, 0x32, 0x48, 0x74, 0x65, - 0x8A, 0x20, 0x50, 0x2A, 0x5C, 0xF9, 0x6F, 0xD7, - 0xAC, 0x8A, 0xFB, 0x63, 0x24, 0x09, 0x6F, 0x9F, - 0xC0, 0x19, 0xA9, 0x84, 0x53, 0x2E, 0x4F, 0x25, - 0x22, 0x19, 0x99, 0x6D, 0x63, 0xD6, 0x2F, - - 0x06, 0x07, 0xEB, 0x05, 0xA8, 0x83, 0xC7, 0xFC, - 0x5B, 0x09, 0xBF, 0x80, 0xC9, 0x86, 0x1C, 0x98, - 0xDD, 0x25, 0xE9, 0xDB, 0x66, 0xC5, 0x49, 0x4F, - 0xF0, 0x12, 0xD6, 0x73, 0x04, 0xD7, 0x1B, 0xC6, - 0xFF, 0xEB, 0xB7, 0x34, 0x09, 0x74, 0x96, 0xB4, - 0xDD, 0xB2, 0x52, 0x3E, 0xB2, 0xDC, 0x9D, 0x4D, - 0x12, 0x77, 0x7C, 0x5B, 0xB1, 0x2D, 0x18, 0x35, - 0xD0, 0xCF, 0x22, 0x40, 0x2B, 0xEF, 0x91, 0x28, - 0xDC, 0x4A, 0xF8, 0xB3, 0xAE, 0x22, 0x7B, 0x9D, - 0x1C, 0x92, 0x19, 0xD2, 0x3E, 0x7D, 0xAF, 0xD5, - 0x31, 0x95, 0xB0, 0x9A, 0x52, 0xD2, 0xFE, 0x3F, - 0x23, 0x37, 0x22, 0xF5, 0xC6, 0xC4, 0x41, 0xCC, - - 0x67, 0x3B, 0x8B, 0xB9, 0x68, 0x4C, 0x7A, 0x96, - 0xA1, 0xB1, 0x89, 0x79, 0x49, 0x24, 0xC4, 0x12, - 0x42, 0x1A, 0x78, 0x6F, 0xE2, 0x7F, 0xB4, 0x92, - 0xCD, 0xC0, 0xAD, 0xF5, 0x2D, 0x87, 0x6D, 0x22, - 0x18, 0xFC, 0xCE, 0x69, 0xAA, 0xD8, 0x01, 0x2D, - 0x49, 0x64, 0x3C, 0x24, 0xEE, 0xFF, 0xCA, 0x32, - 0x34, 0xF5, 0x09, 0x5E, 0x90, 0x50, 0x35, 0xEB, - 0xB8, 0x2D, 0x16, 0x10, 0xAD, 0x38, 0x30, 0x3D, - 0x97, 0x07, 0xD0, 0x99, 0xCF, 0xF0, 0xA8, 0xBB, - 0x21, 0xB0, 0x54, 0xCB, 0x56, 0xC6, 0x72, 0x96, - 0x22, 0x58, 0x9A, 0x10, 0xAE, 0xA5, 0xD5, 0x52, - 0x0F, 0xB6, 0x3C, 0xF3, 0x16, 0x59, 0x3F, 0x46, - 0x56, - - 0xC3, 0xFC, 0x2F, 0xDE, 0xBC, 0xC5, 0xF4, 0xB3, - 0x17, 0x21, 0x88, 0xF7, 0xAB, 0x80, 0x06, 0x7A, - 0x36, 0x20, 0x97, 0x8A, 0x71, 0x16, 0xB9, 0x38, - 0xCF, 0x0E, 0x91, 0xC2, 0x4E, 0x38, 0x99, 0xC8, - 0x5B, 0xAA, 0xC0, 0xFC, 0xD4, 0x48, 0x85, 0x3F, - 0x41, 0xF0, 0x0A, 0x17, 0x2E, 0x32, 0xD3, 0xD4, - 0xF4, 0x43, 0xDE, 0x00, 0x0D, 0xE0, 0xA5, 0x81, - 0x2B, 0xB9, 0xF3, 0x9D, 0xE4, 0xA9, 0x29, 0xF1, - 0x25, 0x1F, 0x44, 0x7C, 0xBC, 0x84, 0xEA, 0xA1, - 0x39, 0xA3, 0x2F, 0x16, 0x7B, 0xEB, 0x47, 0xF6, - 0x33, 0x53, 0xD4, 0x4D, 0xFE, 0x63, 0x72, 0x4E, - 0x32, 0x72, 0x87, 0x1A, 0xA8, 0x94, 0x56, 0x7B, - 0xC0, 0x6E, - - 0xB9, 0x69, 0x4D, 0x32, 0x87, 0xD6, 0xC6, 0x8B, - 0xEC, 0xA1, 0xDF, 0xF8, 0x58, 0xB4, 0xCD, 0xCE, - 0x1E, 0xC5, 0x37, 0x4E, 0x9B, 0x77, 0x8F, 0x8A, - 0xEB, 0x89, 0x03, 0x4A, 0xA0, 0x0F, 0x51, 0x3C, - 0x6C, 0x1B, 0x14, 0x7D, 0x0D, 0x1D, 0xBF, 0xA1, - 0x8D, 0x59, 0x48, 0xA7, 0x95, 0x24, 0xED, 0x09, - 0x8D, 0xDF, 0x89, 0xCA, 0x80, 0xB7, 0x2D, 0x0D, - 0x71, 0xC7, 0x73, 0xFA, 0xB0, 0xFE, 0x70, 0xCE, - 0xEA, 0xA2, 0x53, 0x23, 0x07, 0x41, 0x5B, 0x75, - 0x44, 0x93, 0x0A, 0x36, 0xB3, 0x5A, 0x6C, 0xBD, - 0xDA, 0x66, 0x43, 0x55, 0x3C, 0x87, 0xC2, 0x8E, - 0x51, 0xA3, 0x28, 0xFB, 0xFB, 0x5F, 0x8E, 0x82, - 0xA9, 0x60, 0x5D, - - 0x7E, 0x26, 0x4B, 0x2B, 0x10, 0x93, 0x82, 0xAC, - 0x0B, 0x01, 0x88, 0x29, 0x90, 0x43, 0xA7, 0xAE, - 0xC5, 0xDE, 0xC6, 0xAB, 0x67, 0x49, 0x45, 0x6B, - 0x30, 0x5F, 0x87, 0x59, 0x4D, 0xB2, 0xE0, 0x8B, - 0xEC, 0x9F, 0x9D, 0xB6, 0x5E, 0x1A, 0xA8, 0xE8, - 0xB2, 0xF5, 0xC4, 0xDB, 0xC1, 0x39, 0xC6, 0xF4, - 0x85, 0xE8, 0x59, 0x19, 0xE8, 0xE8, 0xAA, 0xE6, - 0xA7, 0xE1, 0x66, 0x1B, 0x9A, 0xE3, 0x7C, 0xCE, - 0x5A, 0x7A, 0x3B, 0x32, 0x38, 0x89, 0x60, 0x6B, - 0xB8, 0xD9, 0xA1, 0xE2, 0x33, 0x62, 0xDA, 0xED, - 0xC0, 0xAF, 0x10, 0x23, 0xCA, 0xD5, 0x18, 0x5F, - 0x4F, 0xAC, 0x07, 0x02, 0x5D, 0x62, 0x4B, 0xCF, - 0x89, 0x5D, 0xB6, 0x8F, - - 0x4F, 0xB9, 0xC8, 0xBB, 0x61, 0x38, 0x62, 0xC0, - 0x7E, 0xDA, 0xBB, 0x97, 0x1F, 0x14, 0x93, 0x3D, - 0x56, 0x14, 0x06, 0xA0, 0xDA, 0xA6, 0x2F, 0x8D, - 0x61, 0xC6, 0xD3, 0x70, 0x2A, 0xF2, 0xEF, 0xD6, - 0x97, 0x81, 0x1B, 0x18, 0xCB, 0x5D, 0x3F, 0xC0, - 0xAB, 0xF1, 0xE8, 0x16, 0x59, 0xA3, 0x9E, 0xDC, - 0x59, 0x0D, 0x5D, 0x1C, 0x51, 0x81, 0xF6, 0x1A, - 0x12, 0x0C, 0xF7, 0xE3, 0xF0, 0x6E, 0x8D, 0x89, - 0x8D, 0xED, 0x1F, 0xE7, 0x4E, 0xE9, 0xB0, 0x9A, - 0x04, 0xB2, 0x9F, 0xB5, 0x05, 0xBB, 0xE2, 0x70, - 0x4F, 0x9F, 0x86, 0x03, 0x86, 0x9C, 0xE9, 0x63, - 0x8B, 0xA5, 0x8B, 0xFC, 0xD3, 0xF4, 0x24, 0xE1, - 0xE2, 0x46, 0xEB, 0x77, 0x2C, - - 0xD3, 0xE2, 0xB1, 0xBF, 0xE6, 0x28, 0xA2, 0x19, - 0x09, 0x7C, 0xE5, 0xDE, 0x6C, 0x07, 0x79, 0x55, - 0x36, 0xD2, 0x39, 0x8B, 0x1C, 0x1E, 0xBB, 0x67, - 0xF6, 0xE9, 0xA5, 0xD6, 0xCE, 0x83, 0x47, 0xFC, - 0x2D, 0x5D, 0xF3, 0x9D, 0xA8, 0x98, 0x78, 0x2B, - 0x2A, 0x4B, 0x1C, 0xC8, 0x7F, 0x45, 0x3F, 0x58, - 0x01, 0x35, 0xE4, 0x5C, 0xF8, 0xEE, 0x27, 0xC6, - 0x53, 0x88, 0x4B, 0x96, 0xDA, 0xBF, 0x57, 0x37, - 0x45, 0x2F, 0x4B, 0xDC, 0x57, 0x74, 0xD9, 0x69, - 0x15, 0x94, 0x60, 0x45, 0x72, 0xFA, 0x52, 0x05, - 0x2B, 0xA5, 0xF2, 0x85, 0x6F, 0x3C, 0xF6, 0xF1, - 0xF8, 0x4A, 0xAF, 0xF4, 0xC3, 0x0D, 0x6A, 0x8C, - 0xF3, 0xBC, 0x6A, 0x07, 0x02, 0x15, - - 0xBE, 0x63, 0x59, 0xA9, 0x6D, 0x8D, 0x63, 0xB4, - 0x80, 0xB1, 0xEA, 0xCD, 0x8B, 0xB3, 0x98, 0x8A, - 0x63, 0xF3, 0x0C, 0xD6, 0x93, 0xC0, 0x9E, 0x88, - 0x33, 0x19, 0x0F, 0xC0, 0xF0, 0xFE, 0xCC, 0x33, - 0xC7, 0xC5, 0xF0, 0xD6, 0x73, 0x6D, 0x57, 0xA4, - 0x4C, 0x49, 0x20, 0x10, 0x99, 0x68, 0x73, 0x99, - 0x38, 0xE9, 0x25, 0x11, 0x8B, 0xE1, 0xC8, 0x90, - 0x13, 0x6A, 0x96, 0x0F, 0x82, 0x23, 0xFD, 0x5E, - 0x71, 0x8D, 0x6E, 0xA4, 0x37, 0x7C, 0x35, 0xC6, - 0x37, 0xD3, 0xC8, 0xBE, 0x4B, 0x59, 0x94, 0xE2, - 0x5C, 0x70, 0xEB, 0x62, 0xC5, 0xF1, 0x7E, 0x63, - 0x02, 0xCE, 0xE4, 0x07, 0x38, 0x2E, 0x8F, 0x63, - 0x8D, 0xAC, 0xBB, 0x93, 0xAB, 0x8D, 0x71, - - 0x52, 0xBD, 0xA1, 0x06, 0x3C, 0x94, 0x40, 0x14, - 0x24, 0x66, 0x94, 0x84, 0x7F, 0x92, 0x07, 0x8C, - 0x02, 0xB4, 0x9A, 0x9D, 0x77, 0x91, 0xDC, 0xEC, - 0x69, 0xC6, 0x9F, 0xD5, 0x89, 0xDE, 0x3A, 0x55, - 0xF1, 0x8C, 0x2D, 0xAD, 0xBE, 0x56, 0x1B, 0x88, - 0x4D, 0xE1, 0x88, 0x8A, 0xEF, 0xFB, 0x2B, 0x1A, - 0xE0, 0xEF, 0xF3, 0x79, 0xED, 0x25, 0x23, 0xF3, - 0xAA, 0x1B, 0xE1, 0xF6, 0xB3, 0x0E, 0xC4, 0xA7, - 0x02, 0xBB, 0xCC, 0x25, 0x08, 0x67, 0x75, 0x23, - 0xE6, 0x0D, 0x5E, 0x4E, 0xE9, 0x00, 0xB3, 0xA8, - 0x7F, 0xB3, 0x42, 0x08, 0x7B, 0x36, 0xC8, 0x4A, - 0x67, 0xCA, 0xC3, 0x8E, 0xEC, 0x62, 0xB3, 0xA1, - 0x2E, 0x8A, 0xB6, 0x60, 0xE0, 0xD6, 0x38, 0xA9, - - 0x9E, 0x06, 0x4A, 0xB5, 0x71, 0xD7, 0x33, 0x84, - 0x95, 0x9C, 0x5F, 0xF8, 0x12, 0x0D, 0x46, 0xFA, - 0xE5, 0x67, 0x31, 0xE2, 0x71, 0xDC, 0xB6, 0xB4, - 0xE1, 0x3B, 0x16, 0x28, 0xE5, 0x04, 0x20, 0x90, - 0xC1, 0x70, 0xB3, 0x1C, 0x93, 0xF6, 0x6E, 0xC8, - 0x42, 0x8A, 0xAC, 0x85, 0x67, 0xB5, 0xAE, 0x74, - 0x78, 0xFA, 0x32, 0x4B, 0x0D, 0x74, 0x3B, 0x38, - 0xF9, 0x31, 0x01, 0xDA, 0x65, 0xE1, 0xBA, 0x5B, - 0x47, 0xE5, 0xCE, 0x58, 0xC6, 0x16, 0x6D, 0xC2, - 0x56, 0xB7, 0x9B, 0x43, 0x0B, 0x81, 0x65, 0xDD, - 0xF5, 0xB9, 0x44, 0x93, 0x06, 0xD6, 0x07, 0x8B, - 0xDF, 0xE7, 0x1F, 0x14, 0xD6, 0x04, 0x4F, 0xFD, - 0x47, 0x67, 0xEB, 0xBF, 0x23, 0xEB, 0xA7, 0xEE, - 0xB0, - - 0x31, 0xCF, 0x75, 0x5F, 0xFF, 0xBD, 0xB1, 0xE7, - 0x04, 0xBF, 0x32, 0x3F, 0x80, 0x8C, 0x1A, 0xCF, - 0x78, 0xF2, 0x95, 0x2B, 0x4B, 0xEF, 0x30, 0xDF, - 0xE4, 0x49, 0x04, 0xF3, 0x82, 0x11, 0x30, 0x6B, - 0x30, 0x3C, 0xAA, 0x9B, 0x1F, 0xDB, 0xFA, 0xDA, - 0xC3, 0x79, 0x88, 0x1F, 0x4C, 0x06, 0x7E, 0xE5, - 0x89, 0x04, 0x78, 0x7C, 0x0B, 0xA0, 0x2D, 0x50, - 0x88, 0xD4, 0xA8, 0x3C, 0x4D, 0x9F, 0x85, 0x9E, - 0x6A, 0x0C, 0xC6, 0x75, 0xE5, 0x02, 0x19, 0x64, - 0xA6, 0x64, 0x21, 0x76, 0x2F, 0x2E, 0xBC, 0xDA, - 0xF0, 0xDD, 0x19, 0xCE, 0xB1, 0xB6, 0x35, 0x3F, - 0x6B, 0x3F, 0xCF, 0xFD, 0x71, 0x2E, 0x0C, 0x4B, - 0x8B, 0x4D, 0x26, 0xDA, 0x06, 0x46, 0xE3, 0x68, - 0xBA, 0x22, - - 0xA3, 0x90, 0x81, 0xE3, 0xBA, 0x9C, 0x12, 0x57, - 0xE3, 0x53, 0x6E, 0x90, 0x2F, 0xD4, 0x6B, 0x23, - 0x58, 0xCD, 0x1C, 0xBD, 0x6F, 0x8B, 0x16, 0x0C, - 0x40, 0x41, 0x47, 0x86, 0xA4, 0xA2, 0x90, 0x6C, - 0x81, 0x8B, 0x51, 0x53, 0xC8, 0x9A, 0xF4, 0x4F, - 0x04, 0xB0, 0xF3, 0xE2, 0xDE, 0x73, 0x17, 0x3B, - 0xB3, 0xDB, 0x61, 0xFB, 0xBD, 0xC8, 0xBB, 0x13, - 0x8A, 0xE9, 0xB0, 0x5D, 0x38, 0x5F, 0x3F, 0x7A, - 0xDC, 0xB2, 0x25, 0xB7, 0x0B, 0xBD, 0xC6, 0xD6, - 0x8F, 0x15, 0xD5, 0x17, 0x2E, 0x84, 0xD0, 0xA6, - 0xA8, 0x72, 0xEA, 0x2D, 0x2C, 0xE9, 0x31, 0x8D, - 0x22, 0x6B, 0x0F, 0xD8, 0x36, 0x70, 0x3C, 0x11, - 0xBE, 0x32, 0x2D, 0xB1, 0x14, 0xCD, 0x90, 0x18, - 0x99, 0xCA, 0x01, - - 0xA9, 0x3C, 0xC6, 0x55, 0x5C, 0xA3, 0x2C, 0x02, - 0x51, 0xB8, 0x98, 0xF0, 0xDE, 0xF3, 0x51, 0x7A, - 0x1F, 0x6C, 0xA1, 0xCD, 0x15, 0xCB, 0x3B, 0x3A, - 0x7E, 0xD5, 0x3E, 0xF0, 0xD5, 0xE4, 0x6F, 0x30, - 0x3C, 0x1F, 0x92, 0x65, 0xEE, 0x40, 0xAC, 0x8F, - 0x8A, 0xA5, 0x5D, 0x26, 0x38, 0xCE, 0x02, 0xDE, - 0xA4, 0xF6, 0xC1, 0xB5, 0x53, 0x7B, 0x37, 0x40, - 0x38, 0xC6, 0x31, 0x9B, 0x3F, 0x72, 0x0D, 0x91, - 0x46, 0xD9, 0xE3, 0x17, 0xAD, 0x07, 0x1D, 0xDE, - 0x69, 0xF9, 0xBD, 0x72, 0x1E, 0x4E, 0x68, 0x4E, - 0x16, 0x48, 0xAD, 0xEA, 0x9C, 0x18, 0x70, 0xDF, - 0x7E, 0x38, 0x4F, 0x68, 0xC5, 0xE2, 0xA1, 0x09, - 0x5E, 0x5F, 0x42, 0x75, 0x66, 0x20, 0xE6, 0xE3, - 0x1F, 0xAC, 0x76, 0x6D, - - 0xCE, 0x61, 0xD7, 0xE9, 0x85, 0xCF, 0xEF, 0xDC, - 0x2D, 0x75, 0x04, 0x60, 0x76, 0xF1, 0x4E, 0xE9, - 0x72, 0xD3, 0x2E, 0x6A, 0x5A, 0x81, 0xB0, 0xAF, - 0x29, 0x05, 0xAF, 0x9C, 0xEF, 0xF1, 0xF3, 0x96, - 0x97, 0x10, 0xCA, 0x15, 0xA9, 0x73, 0x44, 0xFC, - 0x61, 0x0D, 0x2E, 0xE5, 0x1A, 0x3B, 0x24, 0x5E, - 0x04, 0xAE, 0x5B, 0xCA, 0x40, 0xEC, 0x4B, 0x92, - 0xD8, 0x7C, 0x3F, 0x0B, 0x69, 0x9B, 0x3C, 0xC4, - 0x9E, 0x80, 0x3C, 0x2B, 0xB1, 0x39, 0xFB, 0xC6, - 0x8A, 0x65, 0x98, 0x1A, 0x53, 0xE1, 0x31, 0x90, - 0xE6, 0x26, 0x43, 0x73, 0x07, 0xAD, 0x80, 0xD9, - 0x4C, 0xC0, 0x0E, 0x5F, 0xE7, 0x6D, 0x0B, 0xEB, - 0xD1, 0x16, 0x0A, 0x57, 0xFB, 0x49, 0xF5, 0xA0, - 0x96, 0x6E, 0x9A, 0xB0, 0x82, - - 0xC7, 0x84, 0x16, 0x76, 0x54, 0xAE, 0x96, 0x80, - 0x66, 0x9E, 0xCF, 0xB2, 0x49, 0x57, 0x8B, 0x32, - 0xDA, 0x1C, 0xCD, 0xD1, 0xA7, 0x44, 0x52, 0x19, - 0x5A, 0x77, 0x8D, 0x9D, 0x89, 0xC4, 0x84, 0xD0, - 0x2D, 0xFB, 0x8D, 0xB5, 0xCD, 0x63, 0x48, 0x6E, - 0x18, 0x49, 0x1B, 0xFA, 0x48, 0xD5, 0x32, 0xBB, - 0x85, 0x0A, 0x90, 0xBC, 0x6C, 0xAF, 0x5D, 0x6F, - 0xAC, 0x34, 0xF9, 0xC6, 0x59, 0x85, 0xE8, 0xC2, - 0xA2, 0xA4, 0x9F, 0x77, 0xE4, 0x00, 0xEE, 0x94, - 0xD9, 0x57, 0xEC, 0x31, 0x7E, 0x0F, 0xB1, 0xD2, - 0xD5, 0xA5, 0x1A, 0xBE, 0x0C, 0xC2, 0x85, 0x7B, - 0x5E, 0xCD, 0xD0, 0xB6, 0x1E, 0x04, 0x86, 0xEF, - 0x84, 0x74, 0x6B, 0x97, 0x5D, 0x6B, 0x5C, 0x63, - 0x81, 0x50, 0x6F, 0x4F, 0x8E, 0x1B, - - 0xC7, 0x9C, 0x57, 0x9D, 0xE5, 0x46, 0x4F, 0xC1, - 0x4A, 0x03, 0x63, 0x2E, 0x35, 0x1B, 0x35, 0x9D, - 0xD3, 0xA7, 0xB5, 0xDC, 0xCD, 0x58, 0xEB, 0x25, - 0x52, 0x9E, 0xC0, 0xB3, 0x19, 0x85, 0x11, 0x65, - 0x14, 0x8A, 0x27, 0x0F, 0xDD, 0xB5, 0x06, 0xCE, - 0x9A, 0x1A, 0xD8, 0xB5, 0x07, 0x63, 0x24, 0x5F, - 0xD2, 0xBC, 0x79, 0xB8, 0x62, 0x45, 0x10, 0xBC, - 0x65, 0x00, 0x22, 0x94, 0x83, 0x60, 0x62, 0xF3, - 0x13, 0xE1, 0xD0, 0x5D, 0x47, 0xD8, 0xCB, 0x2C, - 0x59, 0x60, 0x9D, 0x8F, 0x9A, 0x49, 0x7F, 0x60, - 0x71, 0x85, 0xA5, 0x53, 0xCE, 0x55, 0x72, 0x30, - 0x89, 0xD6, 0x74, 0x5B, 0xEE, 0xAF, 0x48, 0x60, - 0x1C, 0x0A, 0xD0, 0x56, 0x54, 0xC5, 0x40, 0x1B, - 0x1F, 0x94, 0xAE, 0x5E, 0x45, 0x60, 0x59, - - 0xD1, 0x73, 0xAA, 0xD6, 0x76, 0x3F, 0x35, 0xDE, - 0x77, 0x82, 0x96, 0xFF, 0x1B, 0x34, 0xAD, 0x16, - 0x77, 0x73, 0xD7, 0x8A, 0x96, 0x19, 0xA0, 0xBA, - 0x22, 0x71, 0x36, 0x9D, 0xAC, 0x41, 0x14, 0xAB, - 0xA8, 0x77, 0x34, 0x7A, 0x70, 0x2A, 0xF6, 0xF6, - 0xEA, 0xFD, 0x6D, 0xDB, 0xAD, 0x65, 0x14, 0x3A, - 0xEA, 0x0E, 0x2C, 0xC4, 0xC1, 0x13, 0x7D, 0x59, - 0x8D, 0xE8, 0x61, 0x29, 0x50, 0x61, 0xC3, 0xC9, - 0x76, 0x20, 0x7C, 0xEF, 0x09, 0xA8, 0xC3, 0x8E, - 0x11, 0xD2, 0x3F, 0x32, 0x09, 0x61, 0x91, 0xF8, - 0x60, 0xF6, 0x83, 0x93, 0x08, 0x94, 0xBF, 0x5D, - 0x6E, 0xDE, 0xA1, 0x04, 0xEE, 0xB2, 0xE3, 0x10, - 0x1D, 0x22, 0xF0, 0xF8, 0x4E, 0x5C, 0xF5, 0x9B, - 0x86, 0x44, 0x57, 0x28, 0xB7, 0x8C, 0x81, 0x14, - - 0x31, 0xDF, 0xA5, 0xD5, 0xF6, 0x17, 0x19, 0x50, - 0xA3, 0x0F, 0x26, 0x1C, 0xD4, 0x98, 0xCA, 0xB0, - 0xDB, 0x0C, 0x2F, 0x8C, 0xCE, 0xCC, 0x56, 0x35, - 0x57, 0xC2, 0x9D, 0xEF, 0x64, 0x82, 0xE4, 0x8A, - 0xFA, 0xFE, 0x07, 0xF1, 0xB7, 0x10, 0xDF, 0x56, - 0x7B, 0x64, 0x88, 0x9C, 0x25, 0xF1, 0x6D, 0x6C, - 0x5F, 0xD3, 0xC8, 0xC4, 0x7E, 0xD5, 0x26, 0xB8, - 0xC3, 0xDD, 0xAD, 0x85, 0x3E, 0xA0, 0x5C, 0x33, - 0x25, 0x9A, 0xD9, 0x52, 0xB7, 0x8C, 0x22, 0x3F, - 0x96, 0xD4, 0x51, 0x7C, 0x9F, 0xAD, 0x01, 0x81, - 0xBE, 0x95, 0x90, 0x38, 0x90, 0xDD, 0x81, 0x43, - 0xB0, 0x66, 0x0D, 0x4E, 0x9E, 0xF6, 0x0C, 0x13, - 0x47, 0xA5, 0xA0, 0x1F, 0x94, 0xFB, 0x86, 0x42, - 0x8B, 0x9B, 0x22, 0x25, 0xF2, 0xB8, 0x83, 0x3C, - 0x87, - - 0x06, 0xFA, 0x95, 0x25, 0x62, 0x35, 0x4D, 0x06, - 0x3F, 0xD2, 0xAE, 0x4E, 0x86, 0x32, 0x08, 0x54, - 0x78, 0x35, 0xAD, 0x84, 0xE1, 0x6D, 0xB1, 0x5E, - 0xD0, 0x91, 0x42, 0x02, 0x39, 0x1F, 0x0D, 0x4C, - 0xE5, 0x4B, 0xDB, 0x9D, 0x1A, 0xE5, 0x05, 0x97, - 0x90, 0x0F, 0xB4, 0xCD, 0xC5, 0xF7, 0xDA, 0x81, - 0xC7, 0x22, 0x25, 0xB8, 0xAA, 0xC5, 0xA6, 0x6C, - 0xCD, 0x21, 0xC3, 0xCA, 0xFA, 0xDB, 0x0C, 0xDC, - 0x35, 0x7B, 0x49, 0x2E, 0xC9, 0xD4, 0xDC, 0x2C, - 0xF5, 0x2A, 0x3E, 0xBA, 0x93, 0x52, 0x88, 0x73, - 0x4B, 0x3A, 0x1E, 0x5B, 0x37, 0xE4, 0x54, 0x8E, - 0xE7, 0x3C, 0x78, 0x37, 0xBA, 0x31, 0x09, 0x3A, - 0xE0, 0x36, 0xFF, 0x6C, 0x7D, 0xA9, 0x68, 0x0F, - 0x33, 0xCD, 0x1B, 0x7E, 0xD0, 0x12, 0x98, 0xC7, - 0xC6, 0x9E, - - 0x59, 0xBC, 0xD3, 0x93, 0xD5, 0x73, 0x5C, 0x4F, - 0xCD, 0x32, 0x8C, 0xA7, 0xEC, 0xB1, 0x92, 0x82, - 0xFF, 0x08, 0x94, 0xED, 0xCE, 0x65, 0x7E, 0xDD, - 0x28, 0x65, 0xEA, 0xDB, 0x3B, 0x77, 0x87, 0x41, - 0x5A, 0xE7, 0xE4, 0x4F, 0x5D, 0xC6, 0x8E, 0xB7, - 0xD5, 0x83, 0x5A, 0xA4, 0x1B, 0xE5, 0x40, 0x50, - 0xA1, 0x0E, 0xB3, 0x8F, 0xE3, 0x31, 0x87, 0xD8, - 0xBF, 0xD9, 0xBE, 0x07, 0x68, 0x9F, 0xAF, 0xD5, - 0x5A, 0xB3, 0xEB, 0x4B, 0x59, 0x0E, 0xDA, 0x36, - 0xE8, 0xCE, 0x29, 0x5A, 0x9D, 0x68, 0xF7, 0x40, - 0xAD, 0xD4, 0x4C, 0xEC, 0xD3, 0xB1, 0xF8, 0x13, - 0x5B, 0x4B, 0x9A, 0xE9, 0x7A, 0x19, 0x37, 0x21, - 0x35, 0x2F, 0x01, 0xE3, 0xF0, 0x7E, 0xF4, 0x80, - 0x3E, 0xBF, 0xB0, 0xDB, 0xB8, 0x5B, 0x46, 0xBF, - 0x81, 0xB2, 0x6D, - - 0xE6, 0x27, 0x7B, 0xD7, 0x3A, 0x57, 0x4A, 0x57, - 0x1F, 0x16, 0x60, 0x67, 0xE3, 0xCB, 0x95, 0x54, - 0x52, 0x0F, 0xD3, 0xF8, 0x2E, 0x4E, 0xFE, 0xAC, - 0x98, 0x99, 0x14, 0x6E, 0x24, 0x91, 0x5A, 0x2C, - 0xA1, 0xDE, 0x40, 0xBB, 0x2E, 0x59, 0x23, 0x98, - 0xCE, 0x15, 0x9A, 0xDC, 0x0D, 0x1B, 0xB2, 0xC4, - 0x6C, 0xC3, 0x23, 0xBE, 0xCB, 0xF3, 0xF6, 0x67, - 0xCF, 0x10, 0x5B, 0x90, 0xEE, 0xAC, 0x62, 0x54, - 0xCA, 0x9C, 0xD4, 0xD4, 0x83, 0x41, 0x1B, 0x46, - 0xD8, 0x42, 0x0B, 0x01, 0x7B, 0xC2, 0x1B, 0xD0, - 0x6A, 0x55, 0x1D, 0x2F, 0x2D, 0xF3, 0x63, 0xCD, - 0xAC, 0xCB, 0x30, 0xF0, 0x95, 0x7C, 0x9E, 0x37, - 0xA8, 0x37, 0x42, 0xA5, 0xAC, 0xCC, 0xA2, 0xFD, - 0x6E, 0x90, 0x0B, 0x64, 0x50, 0x38, 0x72, 0x7A, - 0x0B, 0x7E, 0x50, 0xFF, - - 0xAF, 0xB6, 0xBB, 0x4A, 0x9E, 0x62, 0xFB, 0xD7, - 0xDA, 0x69, 0xA1, 0x60, 0x20, 0x32, 0xE6, 0x56, - 0xA1, 0x6F, 0x37, 0xCA, 0x2D, 0x23, 0xBC, 0x39, - 0xED, 0xEF, 0xB7, 0xEE, 0x47, 0x4E, 0xCB, 0x46, - 0xD3, 0xCA, 0x19, 0xF6, 0x58, 0x4C, 0x31, 0x2B, - 0x65, 0xD6, 0xBC, 0x74, 0x21, 0x05, 0xD7, 0x99, - 0x96, 0x8F, 0x47, 0xE4, 0xD8, 0x4B, 0xD1, 0x60, - 0x27, 0x2E, 0x9B, 0xBF, 0x22, 0xC4, 0xAC, 0x37, - 0xDB, 0x41, 0x61, 0xF6, 0xA7, 0x25, 0x4B, 0xC6, - 0x75, 0x97, 0x0B, 0x17, 0xCB, 0x49, 0x60, 0x5A, - 0x3E, 0xB6, 0xD7, 0x88, 0x8D, 0x02, 0x89, 0xB3, - 0xB0, 0xCC, 0x03, 0xE4, 0x6F, 0x87, 0x44, 0xFF, - 0x01, 0x6D, 0xC0, 0xC9, 0xC5, 0x78, 0x34, 0xD2, - 0x33, 0x91, 0x0D, 0x51, 0x7A, 0xD9, 0x4D, 0x68, - 0x91, 0x47, 0xAB, 0xF9, 0xA1, - - 0x7B, 0x15, 0x4A, 0xEF, 0x0F, 0xD6, 0x75, 0xB7, - 0x1B, 0x32, 0x8B, 0x31, 0xC1, 0xCD, 0x3A, 0xF8, - 0x7F, 0x2F, 0xA5, 0xBD, 0x7C, 0x5C, 0x43, 0x82, - 0x4A, 0x01, 0x3B, 0x50, 0x59, 0x74, 0xB5, 0x61, - 0x40, 0x3B, 0xC0, 0xF3, 0xA1, 0x3E, 0x75, 0x36, - 0x85, 0x74, 0xC3, 0xB3, 0x55, 0xB6, 0xAB, 0xFC, - 0xE9, 0x36, 0x9E, 0x01, 0x1E, 0xCB, 0xEA, 0x1B, - 0xB2, 0x02, 0xD8, 0x42, 0x75, 0xD7, 0x36, 0x5E, - 0x45, 0x17, 0x0E, 0xDF, 0x33, 0xEF, 0x97, 0xCE, - 0xC5, 0x1D, 0x41, 0x4A, 0x06, 0xD3, 0xA1, 0x2F, - 0x5C, 0xD6, 0x7F, 0xE1, 0x45, 0xF7, 0x69, 0xC5, - 0xFA, 0xE6, 0x88, 0x3A, 0xCB, 0x96, 0xC0, 0xA4, - 0xB7, 0x50, 0x9C, 0x67, 0xA2, 0x12, 0x85, 0xC3, - 0x0D, 0xD3, 0x0A, 0xE2, 0x58, 0xD7, 0x94, 0x42, - 0xFD, 0x3D, 0x54, 0xA7, 0x08, 0x85, - - 0x56, 0x28, 0xAF, 0x54, 0xEA, 0x3E, 0xF7, 0xCF, - 0xB9, 0x44, 0xE1, 0xB6, 0x1D, 0x0D, 0xE5, 0x3F, - 0xDF, 0x47, 0x9D, 0xE4, 0x94, 0xA0, 0xBF, 0x0E, - 0xE1, 0xC1, 0x13, 0x73, 0x0F, 0x23, 0xB1, 0xBE, - 0xC1, 0x19, 0xD5, 0x4E, 0x0D, 0x19, 0xA0, 0xD5, - 0x20, 0xDD, 0xEA, 0xA9, 0x05, 0x27, 0xF7, 0x8C, - 0x3C, 0xB3, 0x18, 0x07, 0xDC, 0x11, 0xE8, 0x60, - 0xC2, 0x61, 0x67, 0xAD, 0x0B, 0x6C, 0xA9, 0xD9, - 0x3D, 0x65, 0xE9, 0x31, 0x68, 0xFB, 0x3F, 0xDF, - 0x4B, 0x0C, 0x3B, 0xC6, 0x51, 0xE4, 0x77, 0x73, - 0x9D, 0xB5, 0x5C, 0x37, 0x3B, 0xDD, 0xAD, 0xF2, - 0xA8, 0x22, 0x98, 0x4D, 0x5F, 0x4B, 0xE6, 0xE1, - 0x0A, 0x46, 0x60, 0x0F, 0xDE, 0x02, 0xF9, 0xE6, - 0xFC, 0x3E, 0x22, 0x5D, 0x42, 0x66, 0x50, 0x60, - 0x67, 0x8C, 0x16, 0x28, 0xC4, 0x87, 0x02, - - 0x7E, 0xF5, 0xA3, 0x08, 0x91, 0x76, 0x3F, 0x65, - 0x90, 0xBF, 0xA2, 0xD7, 0x38, 0x6B, 0x41, 0x4E, - 0xC7, 0xD5, 0xBE, 0xEC, 0x60, 0xC5, 0x80, 0x3B, - 0xD6, 0x7A, 0x45, 0x4A, 0x44, 0x0F, 0xA1, 0x28, - 0xB5, 0x5C, 0x58, 0xB4, 0x2F, 0x56, 0xD3, 0xB9, - 0x43, 0x49, 0x09, 0x5E, 0xA6, 0x50, 0xFE, 0xCF, - 0x6A, 0x1D, 0x26, 0xC5, 0x4E, 0x96, 0x1A, 0xD0, - 0xBA, 0x3F, 0x8D, 0x8D, 0xB1, 0x9E, 0x13, 0x66, - 0xCB, 0x9C, 0xEC, 0x57, 0x34, 0x59, 0x7C, 0x8F, - 0xE7, 0xE4, 0x8A, 0x52, 0x77, 0x31, 0x0A, 0x7C, - 0xB2, 0xD4, 0x80, 0x89, 0xCA, 0x09, 0xAD, 0x93, - 0xBC, 0x96, 0x60, 0xBE, 0xB7, 0x92, 0xD5, 0xDA, - 0xBB, 0x2C, 0x3B, 0xF6, 0x80, 0xA1, 0xFA, 0xB7, - 0x06, 0xA9, 0x5D, 0x74, 0x16, 0x5F, 0x4D, 0xBD, - 0xDF, 0x2B, 0x45, 0xA4, 0x14, 0xBA, 0x65, 0xBF, - - 0xDB, 0xE7, 0xA9, 0x45, 0xFF, 0x17, 0xA2, 0xCE, - 0xC3, 0x98, 0x34, 0xD0, 0x2F, 0xC2, 0xC1, 0xAE, - 0x0A, 0xC0, 0x0B, 0xFF, 0x6A, 0x0D, 0xA1, 0xAB, - 0xDA, 0x0B, 0x58, 0xA0, 0x85, 0xFC, 0xF1, 0xC7, - 0x53, 0x09, 0x22, 0x4E, 0xBC, 0x0D, 0x32, 0x83, - 0x2D, 0xF9, 0x06, 0x38, 0x18, 0x55, 0xC3, 0x6D, - 0x79, 0x46, 0x9D, 0x10, 0x5F, 0x14, 0xFB, 0x02, - 0x1D, 0xAD, 0x3A, 0xB2, 0x16, 0x48, 0xB5, 0xAD, - 0xB7, 0x24, 0x59, 0x93, 0x09, 0xA3, 0xDE, 0x52, - 0xE4, 0x4E, 0x63, 0xB8, 0xF4, 0x2E, 0x04, 0x90, - 0x10, 0x70, 0xE6, 0x2D, 0xE9, 0x27, 0xEC, 0x20, - 0x28, 0xF9, 0xBB, 0xF0, 0x1B, 0xF6, 0xB1, 0xA9, - 0x74, 0x60, 0x93, 0xF9, 0x39, 0x5D, 0x45, 0x29, - 0x43, 0x7B, 0x06, 0x50, 0x4B, 0x81, 0x79, 0xC1, - 0xF4, 0xBB, 0x71, 0x60, 0xE6, 0x1F, 0x93, 0xB2, - 0x33, - - 0xA8, 0xE6, 0xE9, 0xEB, 0x5A, 0xE1, 0xDE, 0x41, - 0xE9, 0x3E, 0x93, 0x29, 0xA3, 0x8C, 0x26, 0x4C, - 0x89, 0x01, 0x48, 0x46, 0x39, 0xB7, 0x49, 0x8D, - 0xAD, 0xDB, 0x76, 0x22, 0x74, 0x1C, 0x49, 0x79, - 0x61, 0x36, 0x56, 0x16, 0x10, 0x20, 0x68, 0x5E, - 0xBF, 0x1A, 0x25, 0x87, 0x7F, 0xC6, 0xB8, 0x17, - 0xB6, 0x4F, 0x89, 0xDD, 0x6A, 0x72, 0xD8, 0xF7, - 0xDF, 0x27, 0x50, 0xBF, 0x93, 0x26, 0xFE, 0x7A, - 0xD3, 0x55, 0x54, 0xC7, 0x23, 0x18, 0xFC, 0x88, - 0x47, 0x1A, 0x58, 0x51, 0x49, 0xE7, 0xC0, 0xAB, - 0xF8, 0xC8, 0x54, 0x38, 0xE0, 0x75, 0x6B, 0x47, - 0x1D, 0x5F, 0xC2, 0x60, 0x59, 0x72, 0x92, 0x57, - 0x5C, 0x2E, 0x0D, 0xAC, 0x94, 0x9A, 0x86, 0x74, - 0xF0, 0x42, 0x98, 0x11, 0x41, 0xE8, 0x3A, 0x3F, - 0xBA, 0xE4, 0xB4, 0xB6, 0x0E, 0x85, 0x11, 0xBC, - 0xB3, 0x23, - - 0x3C, 0xD8, 0x11, 0xEC, 0xC7, 0xBB, 0xA6, 0x7C, - 0x7F, 0x06, 0x4F, 0x7E, 0xBF, 0x3F, 0xA1, 0x96, - 0x65, 0x75, 0xC4, 0xDC, 0x2C, 0x2D, 0x89, 0x6D, - 0x75, 0xCB, 0xDD, 0xB2, 0xF9, 0x4F, 0x1B, 0x4C, - 0xE7, 0xCA, 0x02, 0xA5, 0x64, 0x6A, 0xEE, 0xEF, - 0x0B, 0xDF, 0xE8, 0x79, 0x2C, 0xBA, 0x0F, 0x46, - 0x17, 0xA0, 0x45, 0x14, 0x0C, 0x99, 0x2E, 0x66, - 0x09, 0xFC, 0x17, 0xD5, 0x03, 0xA3, 0x50, 0x98, - 0x82, 0xD6, 0x1B, 0x53, 0xBE, 0x27, 0x4D, 0xB3, - 0xBD, 0xC0, 0x43, 0x81, 0x75, 0x7D, 0xCF, 0x11, - 0xC7, 0x70, 0x50, 0x01, 0x0C, 0x08, 0x2E, 0xE3, - 0x81, 0xC7, 0x04, 0x43, 0xDE, 0x6F, 0x59, 0xB7, - 0x9E, 0x82, 0x33, 0x74, 0x6D, 0xF9, 0x0A, 0xE5, - 0x69, 0x99, 0xFC, 0x54, 0x73, 0xD8, 0xC8, 0x5A, - 0x65, 0x43, 0x45, 0xE0, 0x1B, 0xF4, 0xFA, 0x80, - 0xA0, 0x86, 0x7F, - - 0xB3, 0x36, 0xBC, 0x71, 0x8B, 0x9A, 0x93, 0x81, - 0x95, 0xD8, 0x5E, 0xF8, 0xDA, 0x56, 0x9E, 0xDB, - 0xF2, 0xBE, 0xFE, 0xB0, 0x57, 0xA6, 0x85, 0x48, - 0x59, 0x72, 0xEF, 0xB4, 0xF2, 0xFD, 0x5E, 0x98, - 0x9C, 0x74, 0x84, 0x52, 0xED, 0x88, 0xFA, 0x97, - 0x5C, 0x91, 0x4E, 0x34, 0x92, 0xD3, 0xC4, 0x4C, - 0x1B, 0x2F, 0x5F, 0xC8, 0x9B, 0xF1, 0xF6, 0x60, - 0x8F, 0xA5, 0x3E, 0xEC, 0x15, 0x2F, 0xCA, 0xC6, - 0xFF, 0xB9, 0xDD, 0x3E, 0x05, 0x6F, 0xAE, 0xE2, - 0x67, 0xD7, 0xF5, 0xE6, 0x93, 0x74, 0x07, 0x54, - 0x86, 0x62, 0xA3, 0x14, 0x4B, 0x8F, 0x00, 0xEA, - 0x70, 0x29, 0x15, 0xA5, 0x05, 0x9A, 0xFE, 0xFE, - 0xF5, 0x74, 0xE7, 0x29, 0xA1, 0x2C, 0x37, 0xEF, - 0x08, 0x81, 0xE0, 0x63, 0x4C, 0x0B, 0x4C, 0xD8, - 0xAF, 0x3A, 0x13, 0x11, 0x16, 0x03, 0x5C, 0x73, - 0x74, 0x6D, 0xDB, 0xD2, - - 0x84, 0x6D, 0xEF, 0xF2, 0x61, 0x96, 0xD3, 0x49, - 0x3A, 0x6E, 0x30, 0x46, 0xB9, 0x56, 0x8A, 0x81, - 0xC0, 0xCB, 0xDF, 0x5B, 0xCD, 0x5A, 0xAE, 0xF1, - 0xA1, 0x10, 0xE7, 0x03, 0x9A, 0xAE, 0x61, 0x16, - 0x2F, 0xD0, 0x0C, 0x26, 0x7A, 0x96, 0x8E, 0x3A, - 0x97, 0x8A, 0x0A, 0xC9, 0x90, 0x7F, 0x1E, 0x98, - 0xF2, 0x17, 0x74, 0xE7, 0xD1, 0xB2, 0x7F, 0x0F, - 0xE6, 0x19, 0x80, 0x2F, 0x83, 0x22, 0x63, 0xDD, - 0x73, 0x01, 0xEB, 0xC7, 0x72, 0xC7, 0x87, 0xBA, - 0x76, 0xF2, 0x53, 0xD2, 0xDD, 0x23, 0x91, 0x4F, - 0x67, 0x6F, 0x69, 0x74, 0xB4, 0xD8, 0x24, 0x20, - 0xD8, 0x29, 0x91, 0x78, 0xD6, 0xA2, 0xE0, 0x42, - 0x4C, 0xAE, 0x3A, 0xFB, 0xAB, 0x01, 0x70, 0xCF, - 0x57, 0xE7, 0xD0, 0x17, 0xF0, 0x4E, 0x9D, 0x52, - 0x4C, 0x37, 0x25, 0xA3, 0x23, 0x16, 0x82, 0x89, - 0x40, 0x64, 0xA4, 0x0C, 0x5A, - - 0x69, 0xB0, 0x3E, 0x4F, 0x95, 0x66, 0xFD, 0x32, - 0x6D, 0x68, 0xF4, 0xDD, 0x78, 0x1D, 0x54, 0x43, - 0xD1, 0xB2, 0x50, 0x71, 0x1C, 0x48, 0xDB, 0x8E, - 0xE0, 0x58, 0x1A, 0x89, 0xE0, 0x37, 0x64, 0x76, - 0x69, 0x85, 0xB9, 0x34, 0x82, 0xA5, 0x57, 0xAE, - 0x2A, 0x03, 0x00, 0x9B, 0x97, 0xCF, 0xE1, 0x59, - 0x94, 0x74, 0x07, 0x63, 0xD9, 0x6B, 0xBC, 0x1B, - 0x03, 0xD9, 0xE4, 0x40, 0xA5, 0xCB, 0x63, 0xF4, - 0xA1, 0xBA, 0x2F, 0xCE, 0x1A, 0x8F, 0xB7, 0x5A, - 0xB9, 0xFE, 0xEF, 0x8C, 0xA6, 0x74, 0x97, 0xC0, - 0xD6, 0x80, 0xB7, 0x2F, 0x03, 0xD8, 0x9B, 0x6E, - 0x36, 0x5D, 0xCC, 0x92, 0x21, 0x6E, 0xB8, 0x02, - 0xFA, 0xF9, 0xEA, 0x24, 0xA0, 0x3F, 0xDA, 0x2A, - 0xD9, 0x43, 0x1C, 0x07, 0xF2, 0x0A, 0x2C, 0x75, - 0x3D, 0x42, 0xDB, 0xEA, 0x33, 0xAB, 0x9D, 0x95, - 0xBE, 0x53, 0xF6, 0xAC, 0x56, 0xEB, - - 0x80, 0x25, 0xA8, 0x28, 0x34, 0x43, 0x8F, 0xDB, - 0xE4, 0xB8, 0x7A, 0x84, 0xE3, 0x12, 0x2E, 0xD3, - 0x28, 0x14, 0xFE, 0x42, 0x90, 0x95, 0x26, 0x2B, - 0xA1, 0x19, 0x69, 0x23, 0xCF, 0x9D, 0x91, 0xF4, - 0xD4, 0xF3, 0x3A, 0xCF, 0xA0, 0x61, 0x3E, 0x91, - 0xBF, 0xEE, 0x5B, 0xF8, 0x4E, 0xBE, 0xA0, 0x0A, - 0xAB, 0xBC, 0xE4, 0x6A, 0x11, 0x45, 0x20, 0xEA, - 0x3B, 0x29, 0xB7, 0xCA, 0x79, 0x75, 0x06, 0x48, - 0x4B, 0x7E, 0x11, 0xC5, 0xA8, 0x6A, 0x51, 0x9B, - 0x32, 0xBA, 0x3A, 0xA4, 0x06, 0x69, 0xC6, 0xD7, - 0x8F, 0xDE, 0x67, 0x52, 0x63, 0xFC, 0x71, 0x99, - 0x62, 0x10, 0x4B, 0x58, 0x77, 0xAB, 0x16, 0xBC, - 0x5D, 0xDF, 0x25, 0x45, 0xB3, 0x37, 0x03, 0x12, - 0x42, 0xAE, 0x77, 0xBD, 0xD5, 0x59, 0x37, 0x62, - 0x28, 0x8C, 0x0F, 0x70, 0x3B, 0x0B, 0x08, 0x2B, - 0x13, 0xAE, 0x21, 0x58, 0x20, 0x38, 0xDC, - - 0xCE, 0xFA, 0x4C, 0xBD, 0xCA, 0xBC, 0x3A, 0xC0, - 0x4B, 0x91, 0x3F, 0x33, 0x19, 0x46, 0x05, 0x16, - 0x80, 0xC0, 0xE2, 0x63, 0xB0, 0xE0, 0xD5, 0x2B, - 0xCE, 0xBA, 0x01, 0x36, 0x5B, 0xCD, 0x68, 0x17, - 0xCF, 0xEC, 0x0A, 0x31, 0x45, 0x36, 0x1B, 0x28, - 0xB1, 0x85, 0x90, 0x55, 0xB5, 0x27, 0x90, 0xE1, - 0x09, 0x4E, 0x8E, 0x27, 0x91, 0xD7, 0x15, 0x70, - 0x85, 0x89, 0x20, 0x0D, 0xD3, 0xF1, 0x70, 0x74, - 0xAA, 0x29, 0x0A, 0xA2, 0xA3, 0x96, 0x4B, 0x6E, - 0xBB, 0x04, 0x99, 0x4D, 0xC9, 0xD8, 0xFB, 0xA3, - 0xD0, 0xEF, 0x9D, 0x2A, 0x77, 0xC9, 0x0E, 0x85, - 0x33, 0x68, 0xFC, 0x30, 0xA1, 0x48, 0x55, 0x75, - 0x55, 0x21, 0xC8, 0x1F, 0x01, 0xF2, 0xA5, 0x2B, - 0x7D, 0xD7, 0x5E, 0x8C, 0x76, 0x06, 0x18, 0xBD, - 0x74, 0x4A, 0x5F, 0xE4, 0xE9, 0xD7, 0xCB, 0xEB, - 0x37, 0x95, 0x4F, 0x06, 0x26, 0xD2, 0xF1, 0xD4, - - 0x37, 0x0D, 0xA6, 0xE9, 0x34, 0x06, 0x17, 0x74, - 0x20, 0x52, 0x8E, 0x5B, 0xC2, 0x71, 0x8D, 0x6E, - 0x3C, 0xAA, 0xAA, 0xF9, 0x7F, 0x82, 0x09, 0x74, - 0x29, 0xCF, 0x79, 0xC1, 0xF7, 0x42, 0xB8, 0xA9, - 0x36, 0xA5, 0xFF, 0x77, 0x15, 0x09, 0x0B, 0x04, - 0x7E, 0xF4, 0xE1, 0xB1, 0x88, 0x89, 0x7A, 0x88, - 0x98, 0xD3, 0xA7, 0x95, 0x23, 0x69, 0x88, 0xD3, - 0x8F, 0x61, 0x1E, 0xBF, 0x99, 0xAD, 0xB4, 0x56, - 0xDF, 0x37, 0x12, 0x78, 0xDA, 0xF7, 0xDA, 0x42, - 0x8A, 0x43, 0xBD, 0x1A, 0xB2, 0x0A, 0xDA, 0x71, - 0xD6, 0x16, 0xDB, 0x15, 0xCA, 0xEA, 0x74, 0xA2, - 0x11, 0x0D, 0xAE, 0xE5, 0x2B, 0x64, 0x01, 0x61, - 0x91, 0x38, 0x16, 0xF4, 0x6E, 0xB9, 0x01, 0xDF, - 0xFD, 0xCD, 0x56, 0x79, 0xA7, 0x42, 0x7D, 0x8C, - 0xF4, 0x10, 0x4B, 0x00, 0xBA, 0x05, 0x77, 0x35, - 0x29, 0x74, 0x45, 0xDF, 0xCF, 0x2A, 0x6E, 0xBF, - 0x60, - - 0x49, 0x06, 0x7D, 0xD6, 0xE2, 0xC8, 0x54, 0x45, - 0x41, 0x97, 0x98, 0x29, 0xB5, 0x49, 0x3C, 0xE2, - 0x29, 0xC1, 0x87, 0xAC, 0x4A, 0x88, 0x31, 0x54, - 0x12, 0xDF, 0x6F, 0x7C, 0x88, 0xD4, 0x5A, 0x69, - 0xEF, 0x89, 0xB7, 0x26, 0xBD, 0x5D, 0x14, 0x45, - 0x5B, 0xAA, 0xC0, 0x31, 0x77, 0x20, 0x56, 0x22, - 0x32, 0x43, 0x0B, 0x0F, 0x29, 0x9F, 0x2C, 0xA5, - 0x42, 0xFC, 0x25, 0x1C, 0x9C, 0x1B, 0xE7, 0xBE, - 0x65, 0x8F, 0xBD, 0xA8, 0x07, 0xCC, 0x54, 0xFF, - 0xD2, 0x3B, 0xC0, 0x52, 0x9F, 0x21, 0xDE, 0xA4, - 0xA0, 0x8F, 0xB9, 0x05, 0x51, 0x8B, 0x4D, 0x6C, - 0x87, 0x4A, 0xD3, 0x82, 0xD4, 0x0D, 0xE2, 0x11, - 0xAC, 0x48, 0x81, 0x6D, 0xF9, 0xFD, 0xEC, 0x8D, - 0x15, 0x38, 0x8E, 0x6B, 0xE4, 0x5B, 0x04, 0x42, - 0xD5, 0x34, 0xFB, 0xE1, 0xBC, 0x0D, 0xDB, 0xB7, - 0xA9, 0xF7, 0xE6, 0x42, 0x5C, 0xBF, 0x89, 0x57, - 0x63, 0xF6, - - 0x90, 0x0A, 0xF6, 0x05, 0x11, 0x92, 0x82, 0x59, - 0xA1, 0x31, 0x54, 0xE8, 0x93, 0x6C, 0xE5, 0x4B, - 0xE8, 0x6C, 0x14, 0x80, 0xFB, 0x5F, 0xB5, 0x52, - 0xAA, 0x4A, 0x04, 0x64, 0xC5, 0xC5, 0x03, 0x2C, - 0x2D, 0xB1, 0x6F, 0xDC, 0xA0, 0x74, 0xFF, 0xDE, - 0xE5, 0x0D, 0x50, 0xE0, 0xBE, 0x35, 0xBA, 0x42, - 0x5E, 0x56, 0x64, 0x4F, 0xA0, 0x19, 0xD0, 0xAC, - 0xC6, 0x79, 0x09, 0x61, 0x1C, 0x72, 0xE2, 0x38, - 0x66, 0x7E, 0x96, 0x61, 0xC7, 0x69, 0x41, 0xEF, - 0x5A, 0x41, 0x89, 0xB2, 0xC6, 0xA9, 0xF3, 0xCB, - 0x8C, 0xAE, 0x1E, 0xBE, 0xDE, 0xF2, 0x4B, 0x20, - 0x67, 0xFF, 0x89, 0xAD, 0x95, 0x0A, 0x4D, 0x2C, - 0xEC, 0x62, 0x45, 0x53, 0x5C, 0xD8, 0x8F, 0x41, - 0x1B, 0x5E, 0xC6, 0x8E, 0xF6, 0x79, 0xB1, 0x3E, - 0xD5, 0x95, 0x46, 0x4E, 0x85, 0xA2, 0x32, 0x79, - 0x06, 0xE5, 0xBE, 0xD0, 0xEB, 0x77, 0xE0, 0x87, - 0x87, 0x75, 0xDD, - - 0xAC, 0x14, 0x1B, 0x69, 0xEE, 0x01, 0x0E, 0xE8, - 0x55, 0x78, 0x58, 0x91, 0xBE, 0xB4, 0x31, 0xCD, - 0x3D, 0xBE, 0x2F, 0x30, 0x81, 0x9D, 0x5F, 0x3A, - 0x65, 0x49, 0x1E, 0x24, 0x75, 0x38, 0xEA, 0x0F, - 0x45, 0x88, 0x6F, 0x66, 0x98, 0x56, 0x84, 0x41, - 0xB0, 0x7B, 0x08, 0x92, 0xE1, 0xAC, 0x8E, 0xFD, - 0x51, 0x96, 0xAD, 0x8B, 0x2D, 0x8C, 0xB8, 0xFA, - 0xB8, 0xA6, 0x63, 0x34, 0xF3, 0xC1, 0xCB, 0x51, - 0xC2, 0xAB, 0x04, 0x9B, 0x53, 0x28, 0xF9, 0x13, - 0xF0, 0x11, 0x54, 0xFF, 0xB0, 0x47, 0x18, 0x29, - 0xC5, 0x97, 0x43, 0x5E, 0x7C, 0xAA, 0x6F, 0x38, - 0x99, 0x04, 0x5C, 0x79, 0xF0, 0x08, 0xA2, 0x69, - 0xD3, 0xFF, 0x62, 0xC6, 0xDB, 0xA8, 0x2B, 0xF5, - 0xDB, 0xD2, 0x8A, 0xDD, 0x4F, 0xC3, 0xD2, 0x00, - 0xE5, 0xDE, 0x75, 0xD7, 0xC4, 0x8B, 0x76, 0xC8, - 0xDB, 0x55, 0xCB, 0xE6, 0x1B, 0xAB, 0xD2, 0x4E, - 0x3B, 0x93, 0x08, 0x43, - - 0x10, 0x07, 0x49, 0x6C, 0x11, 0x44, 0xEE, 0xFA, - 0x41, 0x19, 0xFA, 0xD1, 0x7D, 0xEC, 0xD2, 0x8F, - 0xA2, 0xBC, 0xB5, 0x38, 0x85, 0xD5, 0x4B, 0x79, - 0xFB, 0x77, 0x69, 0x42, 0x65, 0xEC, 0x29, 0x04, - 0x24, 0xCF, 0x51, 0xE1, 0xC2, 0x23, 0x06, 0x88, - 0x47, 0xAE, 0x7D, 0xA1, 0x08, 0x9A, 0x82, 0x2C, - 0xD6, 0xB4, 0x4D, 0x84, 0x96, 0x19, 0x17, 0x5A, - 0x0F, 0x22, 0x29, 0xDE, 0x0F, 0x8F, 0x71, 0xAE, - 0x12, 0x65, 0x87, 0xC5, 0xB4, 0xAD, 0x58, 0xDB, - 0xCA, 0x66, 0xE6, 0xB8, 0xE4, 0x3A, 0x80, 0x2B, - 0x18, 0x88, 0xD6, 0x21, 0xDC, 0x2B, 0xC8, 0x52, - 0x4B, 0x48, 0x90, 0x37, 0x72, 0x02, 0xCD, 0x01, - 0xEC, 0xE8, 0x03, 0xD4, 0x28, 0x8D, 0xD1, 0x94, - 0xBC, 0x1E, 0xAE, 0xA2, 0x79, 0x12, 0xB0, 0x5D, - 0x34, 0x32, 0x53, 0x1B, 0xC9, 0xA8, 0x6A, 0x1D, - 0x48, 0x30, 0x08, 0xB4, 0xC5, 0x54, 0x0A, 0x1E, - 0x24, 0x9E, 0x8D, 0x58, 0xF2, - - 0x1C, 0x73, 0x21, 0xCA, 0xB9, 0x20, 0x75, 0xEF, - 0xF4, 0x2B, 0xA5, 0xE5, 0x66, 0x62, 0xF3, 0x31, - 0x61, 0x92, 0x8B, 0x34, 0x44, 0x67, 0xC5, 0xAD, - 0xC1, 0x56, 0xC3, 0xB7, 0x23, 0xC6, 0x2B, 0xB1, - 0x34, 0x5F, 0xEF, 0xF7, 0x70, 0x21, 0x5E, 0x35, - 0x36, 0x28, 0xCC, 0xD2, 0x61, 0x58, 0xA3, 0xF6, - 0xB0, 0xD7, 0xA2, 0xBC, 0xF3, 0x02, 0x4E, 0x76, - 0x55, 0x1D, 0x48, 0x45, 0x90, 0x4C, 0xEF, 0x6C, - 0xAC, 0x58, 0x7B, 0xF2, 0x7C, 0x3E, 0x3F, 0xD6, - 0xFB, 0x57, 0x74, 0x3B, 0x91, 0xBE, 0xCE, 0x05, - 0x58, 0x9E, 0x26, 0xE6, 0x8A, 0x96, 0x8B, 0x00, - 0xC3, 0x28, 0x4A, 0xE8, 0x5C, 0xDA, 0x46, 0xF2, - 0x55, 0x14, 0x7C, 0x86, 0x58, 0xE0, 0x78, 0x16, - 0x0B, 0xA6, 0x45, 0xB2, 0xBD, 0x09, 0x83, 0x16, - 0xFE, 0x8F, 0x0D, 0xE6, 0x46, 0xE4, 0x85, 0x80, - 0x95, 0xE5, 0xC7, 0xEC, 0x5A, 0xE2, 0xE8, 0x1F, - 0xCC, 0x33, 0x25, 0x2A, 0x71, 0xB4, - - 0xDF, 0x62, 0x81, 0xFF, 0x5B, 0x88, 0x34, 0xB3, - 0xA9, 0x4A, 0xA6, 0xD9, 0x08, 0x48, 0x65, 0x7D, - 0xFC, 0x07, 0x56, 0xD8, 0xF5, 0xBA, 0x69, 0xD2, - 0xF8, 0x68, 0xAD, 0xDB, 0x14, 0x6F, 0x3F, 0x27, - 0x0B, 0x1D, 0x14, 0x53, 0x2C, 0xC2, 0x9E, 0x7E, - 0x1A, 0x97, 0xA2, 0xE3, 0x0B, 0x9E, 0x78, 0x3C, - 0x79, 0x4B, 0xD9, 0xCC, 0xDD, 0x19, 0x0D, 0x26, - 0x77, 0x65, 0xE6, 0x89, 0x19, 0xAB, 0x58, 0xA3, - 0x91, 0x50, 0x82, 0xA0, 0xB1, 0xB3, 0x7E, 0xD7, - 0x4B, 0xE2, 0xA2, 0xF7, 0x1E, 0x37, 0x33, 0x18, - 0xF6, 0x09, 0x60, 0x6B, 0x00, 0x46, 0xEF, 0xB1, - 0x06, 0x60, 0x1B, 0x0A, 0x4C, 0x0E, 0xE3, 0xFA, - 0xEA, 0xD7, 0x9D, 0xDC, 0x6B, 0x4C, 0x9E, 0x9C, - 0x61, 0x22, 0xAB, 0x19, 0x6E, 0x62, 0xA7, 0x25, - 0x26, 0xC3, 0xDB, 0x9B, 0xE0, 0x6E, 0xD4, 0x2D, - 0xDC, 0x71, 0x2A, 0x13, 0x7C, 0x77, 0xE8, 0xAA, - 0x1D, 0xED, 0x37, 0xB5, 0x6A, 0xB8, 0x3E, - - 0x02, 0xDC, 0x62, 0xA2, 0x98, 0x84, 0x22, 0x1E, - 0xB7, 0x25, 0x9A, 0xED, 0xDD, 0x60, 0x96, 0x44, - 0xEB, 0x1B, 0xC6, 0x9A, 0xEE, 0x76, 0x1B, 0x67, - 0xF4, 0x66, 0xE8, 0x63, 0x55, 0x3F, 0x6F, 0xB9, - 0x35, 0xAE, 0xB4, 0x3D, 0xD4, 0xDC, 0x4B, 0xD9, - 0x42, 0x1F, 0x7A, 0x36, 0x4D, 0x2C, 0x01, 0x2A, - 0x74, 0x5B, 0x67, 0xF9, 0xE1, 0x66, 0x69, 0xEF, - 0x89, 0x17, 0x96, 0xFF, 0x3F, 0xC6, 0x6C, 0xAB, - 0xFA, 0xE8, 0x82, 0x6D, 0x65, 0x48, 0xD2, 0x8D, - 0x0D, 0xCB, 0x0F, 0x5B, 0x2E, 0xCF, 0x17, 0xEA, - 0x60, 0x96, 0x76, 0x64, 0x33, 0x9A, 0xDE, 0x11, - 0xB4, 0x2A, 0xC4, 0x2D, 0x35, 0x2B, 0xF8, 0x36, - 0x80, 0xC4, 0x4E, 0xFE, 0x14, 0xFD, 0xB2, 0x57, - 0x0A, 0x46, 0x29, 0x37, 0x50, 0x7B, 0x26, 0x29, - 0x2B, 0xAE, 0x3D, 0xB9, 0xF8, 0x38, 0x31, 0x4C, - 0x13, 0x67, 0xD5, 0xF2, 0x40, 0x92, 0x09, 0xF1, - 0x5C, 0xE1, 0xF3, 0xE7, 0xE3, 0x6B, 0x25, 0x88, - - 0x70, 0x64, 0x4F, 0x22, 0x92, 0xCC, 0xBA, 0x70, - 0x10, 0xB5, 0xF9, 0x5D, 0xF6, 0xBD, 0x95, 0x7A, - 0x9E, 0xA1, 0xC3, 0x00, 0x77, 0x6A, 0x12, 0x94, - 0x43, 0xC9, 0x0C, 0xBB, 0xE2, 0xCD, 0xBE, 0xB7, - 0xF4, 0x11, 0xB0, 0x86, 0x11, 0xBB, 0x98, 0x31, - 0xBE, 0xC0, 0x82, 0xF9, 0x84, 0xF7, 0x99, 0xA6, - 0x1A, 0x44, 0x66, 0x28, 0x93, 0x32, 0xD9, 0x91, - 0x16, 0x8F, 0x53, 0x0D, 0x21, 0xF4, 0xFC, 0x69, - 0x5F, 0xDD, 0xFE, 0xF5, 0x59, 0x9A, 0x96, 0x4F, - 0x1C, 0x2A, 0xFD, 0xE4, 0x88, 0x66, 0x2A, 0x78, - 0x33, 0x60, 0xF3, 0x10, 0x55, 0xED, 0x68, 0xE6, - 0x34, 0x67, 0x62, 0x04, 0xBF, 0x39, 0x17, 0x3D, - 0x1B, 0x22, 0x8A, 0x77, 0x45, 0x90, 0x7C, 0x5C, - 0xCF, 0x4E, 0xE2, 0xB0, 0x88, 0xB8, 0x2B, 0x4A, - 0x4F, 0xCC, 0x14, 0xDC, 0xD3, 0x6A, 0x77, 0xA7, - 0xA7, 0x52, 0x0A, 0x4A, 0xCC, 0x3C, 0x30, 0xF0, - 0x9B, 0x10, 0x1A, 0xAA, 0xC8, 0x5A, 0xFE, 0x6F, - 0xA6, - - 0xC1, 0x62, 0xCF, 0x2C, 0xBA, 0xC0, 0xC0, 0x84, - 0x67, 0x4E, 0x96, 0xA2, 0xFF, 0x81, 0xE6, 0x74, - 0xFA, 0x22, 0xCE, 0x6B, 0xC4, 0x9C, 0x1D, 0x03, - 0xC0, 0xB1, 0x8B, 0x10, 0x33, 0xC3, 0x1F, 0x61, - 0x2D, 0x67, 0x09, 0x2F, 0x04, 0x51, 0x49, 0xCE, - 0x9F, 0x94, 0x14, 0xAB, 0x0A, 0x7F, 0x39, 0xD9, - 0xA5, 0x4F, 0x4E, 0x5A, 0x3C, 0xCB, 0xB8, 0x74, - 0x51, 0x28, 0x3B, 0xBE, 0x1B, 0x5E, 0x94, 0xFC, - 0xD1, 0xB2, 0x0A, 0x46, 0x20, 0xB3, 0x7E, 0x6E, - 0xD3, 0x9F, 0x76, 0x3F, 0x4A, 0xFF, 0x0B, 0xB7, - 0x52, 0xE2, 0xA4, 0xDF, 0x2E, 0x0C, 0x72, 0xE2, - 0xC7, 0x91, 0x2D, 0x5F, 0xB3, 0x38, 0x4F, 0x03, - 0x5C, 0x19, 0x2F, 0xBD, 0xDC, 0x84, 0xB5, 0xF9, - 0xFF, 0x8C, 0x19, 0x6F, 0x57, 0x4A, 0xD7, 0xA6, - 0xC5, 0x93, 0x2E, 0xEA, 0x35, 0xD7, 0xF8, 0xD4, - 0x08, 0xCA, 0x21, 0x06, 0x21, 0x12, 0x9B, 0xE2, - 0xF5, 0x38, 0x2C, 0xD4, 0x02, 0xD9, 0x56, 0xDE, - 0x5D, 0xB5, - - 0x1F, 0x86, 0xAE, 0xE4, 0xE4, 0xB2, 0x42, 0x60, - 0x9B, 0xBF, 0x1E, 0xA5, 0x16, 0x65, 0xA0, 0xDD, - 0xB3, 0xC6, 0xCA, 0xD7, 0xB8, 0xAE, 0x14, 0xCD, - 0xDF, 0xE9, 0xFF, 0x63, 0x38, 0x87, 0xE8, 0x2F, - 0xAE, 0xC7, 0xC7, 0x43, 0x46, 0x24, 0x54, 0xC0, - 0x41, 0xA6, 0x27, 0x73, 0x4E, 0x63, 0x0D, 0x0F, - 0x2D, 0xAA, 0xD6, 0x62, 0xFE, 0x8E, 0xE4, 0x3F, - 0xA2, 0xC3, 0x98, 0x5B, 0x93, 0x5B, 0x11, 0xEA, - 0xC9, 0x6D, 0xED, 0x9E, 0x71, 0x9D, 0xD9, 0x5E, - 0xA7, 0xB3, 0x4C, 0xB9, 0xBF, 0x2C, 0xE0, 0x90, - 0x3C, 0x19, 0x82, 0xE5, 0x94, 0xB9, 0xD7, 0x67, - 0x3F, 0xA7, 0x78, 0xAE, 0x10, 0x8B, 0x59, 0x69, - 0xD3, 0x73, 0x33, 0x2C, 0xD5, 0x74, 0x76, 0x56, - 0xA5, 0x16, 0xF0, 0x78, 0xB9, 0x4E, 0xFA, 0x0B, - 0x71, 0x77, 0x99, 0xAD, 0xBC, 0xD5, 0x86, 0xE0, - 0xFD, 0x36, 0xF6, 0x35, 0x97, 0x05, 0xEF, 0xB6, - 0xFF, 0x83, 0xA7, 0x0F, 0x65, 0xE8, 0x98, 0x8F, - 0x42, 0xB0, 0x8B, - - 0x90, 0x2A, 0x6C, 0xF6, 0x1D, 0xD4, 0x36, 0xDD, - 0xC3, 0x87, 0x2D, 0xE1, 0x68, 0xED, 0x8F, 0x21, - 0x0E, 0x53, 0xF5, 0x03, 0xE9, 0xA0, 0xD5, 0x3A, - 0xF9, 0xEF, 0x15, 0xCC, 0x0E, 0xE3, 0xD6, 0x27, - 0xB3, 0x30, 0x8B, 0x60, 0x0A, 0x43, 0x2F, 0xA4, - 0x41, 0x0E, 0xE9, 0x8F, 0xFD, 0x6E, 0x7C, 0x8A, - 0xEA, 0xCB, 0x7F, 0x1E, 0xEF, 0x15, 0x97, 0x59, - 0x4A, 0x67, 0x25, 0xFD, 0x72, 0xB6, 0x0D, 0x3A, - 0xC0, 0xCE, 0xD4, 0xA7, 0xF6, 0x61, 0x6B, 0x60, - 0x8C, 0x55, 0xB3, 0xB7, 0xA9, 0xB0, 0x7E, 0xD8, - 0x95, 0xBB, 0xAA, 0xFD, 0x3B, 0x72, 0x40, 0x72, - 0x28, 0xA4, 0x73, 0x19, 0x75, 0x37, 0x39, 0x07, - 0xBD, 0xB8, 0xB6, 0x51, 0x48, 0xC2, 0xB5, 0xFF, - 0xE8, 0xBC, 0x0C, 0x65, 0xD0, 0x8E, 0xB2, 0x32, - 0xA5, 0xCE, 0xE7, 0xB9, 0x3C, 0xC2, 0x56, 0xBF, - 0x4D, 0x7B, 0x8E, 0xA4, 0xCE, 0x2D, 0x7B, 0x32, - 0x48, 0xA9, 0xE3, 0x3A, 0x34, 0x18, 0xB0, 0x6A, - 0x68, 0x88, 0xED, 0x55, - - 0xB6, 0xDF, 0x47, 0x88, 0x2F, 0x70, 0x18, 0x3C, - 0xB9, 0x72, 0x04, 0x1E, 0x75, 0x5F, 0x45, 0xCA, - 0xA4, 0xB0, 0xAC, 0x11, 0x1B, 0x65, 0x4B, 0xAE, - 0xCA, 0x4D, 0xA1, 0xA9, 0x2C, 0xDF, 0x76, 0x14, - 0x94, 0x2A, 0xFC, 0x04, 0xC2, 0xE8, 0xAE, 0x94, - 0x15, 0x11, 0x07, 0x7A, 0x72, 0x25, 0xB6, 0x6D, - 0x70, 0x03, 0xC9, 0xAC, 0xE0, 0xAB, 0xD0, 0xC1, - 0x90, 0x4E, 0x08, 0xF4, 0x9F, 0x13, 0xB4, 0x7B, - 0xB5, 0x56, 0x37, 0x20, 0x83, 0x0C, 0x71, 0xA6, - 0x93, 0xF5, 0x00, 0x2F, 0xC9, 0xD5, 0x6A, 0x5C, - 0xB7, 0xA7, 0x9E, 0xB2, 0x1B, 0x62, 0x49, 0x9B, - 0xA0, 0x2A, 0x54, 0xC5, 0xE4, 0x5C, 0xCF, 0x5A, - 0x63, 0x9D, 0xA2, 0x85, 0x8D, 0xFA, 0xEE, 0x2B, - 0x1A, 0x41, 0x35, 0x97, 0x67, 0x36, 0x53, 0x25, - 0x52, 0x57, 0x8C, 0x8E, 0x53, 0x27, 0x89, 0xBC, - 0x2D, 0x3F, 0x91, 0xC4, 0x36, 0xB1, 0xEF, 0x54, - 0x1A, 0xCB, 0xDA, 0xC9, 0x78, 0x54, 0x78, 0xBA, - 0xDD, 0xA9, 0x23, 0x9D, 0xB4, - - 0xB0, 0xA8, 0x6B, 0x05, 0x72, 0x86, 0xDA, 0xD2, - 0x21, 0xDC, 0xC6, 0x3C, 0x0B, 0x47, 0x2E, 0xAA, - 0x4A, 0x4F, 0x19, 0x7B, 0xAC, 0xEF, 0x6F, 0xA6, - 0xD4, 0x9D, 0x45, 0xEF, 0xB4, 0x14, 0x83, 0x49, - 0xA6, 0x20, 0x55, 0x18, 0xA0, 0x64, 0x49, 0xD0, - 0xBB, 0x1C, 0xA5, 0x49, 0x56, 0x13, 0x8E, 0xD6, - 0x9A, 0x22, 0x3E, 0x1A, 0x28, 0x24, 0x6E, 0x55, - 0xAF, 0xA3, 0xDD, 0x02, 0x1B, 0xBC, 0x1E, 0xF2, - 0xA7, 0x8A, 0x5C, 0xBD, 0x6A, 0xE8, 0x26, 0x21, - 0x81, 0x5D, 0x6C, 0xDF, 0x44, 0xF8, 0xB4, 0xA7, - 0x42, 0x9D, 0x73, 0x9A, 0xC4, 0x7A, 0x4B, 0xF2, - 0x98, 0xFC, 0xB7, 0xE8, 0xEA, 0x8C, 0x0A, 0xC2, - 0xD5, 0xC3, 0x51, 0xCF, 0x3F, 0x71, 0xB5, 0xE4, - 0xC3, 0x5B, 0x30, 0xA6, 0xE4, 0x80, 0xFA, 0x46, - 0xB4, 0xBC, 0x13, 0x01, 0xA0, 0xA5, 0xF8, 0xEF, - 0x6D, 0xA8, 0xD3, 0xCB, 0x92, 0xD7, 0xBF, 0x46, - 0x73, 0xC4, 0xE0, 0x12, 0xC3, 0x57, 0xC1, 0x20, - 0x5E, 0xF2, 0xF2, 0x7A, 0x18, 0x54, - - 0xD5, 0x8C, 0x8D, 0x9B, 0x33, 0xB8, 0x9B, 0xC3, - 0x15, 0x50, 0xC9, 0xC7, 0x25, 0x8B, 0x36, 0xA6, - 0x5C, 0x3E, 0x87, 0x59, 0x3F, 0x6B, 0x0A, 0xD8, - 0x22, 0x39, 0x48, 0x8A, 0xE4, 0x50, 0x23, 0x8F, - 0x3A, 0x6E, 0xE1, 0x60, 0xA3, 0xDE, 0xB3, 0xFA, - 0xEA, 0xD4, 0x8B, 0x25, 0x17, 0xB1, 0x4E, 0xBA, - 0x0E, 0x97, 0x22, 0x37, 0xEE, 0xFE, 0x5D, 0x42, - 0xB5, 0xE5, 0xC1, 0x96, 0x34, 0xA6, 0x0E, 0x11, - 0xAA, 0x41, 0xD4, 0xF5, 0xDA, 0x40, 0x22, 0x2B, - 0xF9, 0x9E, 0x9C, 0x55, 0x6C, 0xB9, 0x73, 0xDF, - 0x94, 0x71, 0x8B, 0x90, 0x91, 0x67, 0xF4, 0xFE, - 0x01, 0x90, 0x64, 0xB8, 0xB8, 0x31, 0x85, 0xAE, - 0x82, 0x1B, 0x65, 0xD4, 0xC8, 0x61, 0x9D, 0x1D, - 0x9A, 0x94, 0x40, 0xD9, 0x7C, 0xE2, 0xE9, 0x09, - 0xE9, 0x2B, 0xD0, 0xEB, 0xBE, 0x57, 0xAD, 0x29, - 0xCB, 0xA5, 0xD4, 0x46, 0xBA, 0xB6, 0x86, 0xB8, - 0xD1, 0x2F, 0x0B, 0xFC, 0xCA, 0x43, 0xBA, 0x60, - 0xA2, 0x0F, 0xA6, 0xC6, 0x2F, 0x05, 0x0A, - - 0xA1, 0x11, 0x6A, 0x04, 0xA8, 0x55, 0xB1, 0x04, - 0xA8, 0x6F, 0x55, 0x85, 0xE9, 0xF1, 0x0D, 0x6F, - 0xDD, 0x04, 0x10, 0x3C, 0xB3, 0xAD, 0xD2, 0x9E, - 0xE7, 0x1E, 0x08, 0xBF, 0x65, 0x0A, 0xB0, 0xB4, - 0x95, 0x6D, 0xC6, 0x3E, 0xD8, 0x71, 0x46, 0x3E, - 0x1B, 0x1E, 0x82, 0x8D, 0x16, 0xF8, 0x98, 0xF1, - 0xEC, 0x0B, 0x0C, 0xFB, 0x73, 0xDB, 0x28, 0x1E, - 0xC1, 0xD0, 0xC2, 0xB1, 0xB0, 0x48, 0x02, 0xD9, - 0x69, 0xC5, 0x72, 0x6D, 0xB2, 0xD2, 0xCE, 0x15, - 0x8C, 0x77, 0xAD, 0x48, 0x7C, 0x4D, 0xEA, 0x87, - 0x5E, 0x13, 0x6D, 0x61, 0xFE, 0xFC, 0x75, 0xAA, - 0x76, 0x55, 0x2E, 0x87, 0x26, 0x92, 0x9D, 0x43, - 0x61, 0x7D, 0x1F, 0xFD, 0xE0, 0xCA, 0xC0, 0x87, - 0xAF, 0xAF, 0xC4, 0x92, 0x37, 0xED, 0xBB, 0x4F, - 0x38, 0x03, 0xE0, 0x1E, 0x1D, 0xB1, 0x4A, 0xBA, - 0x9A, 0xA0, 0x14, 0x84, 0x90, 0x90, 0x70, 0x62, - 0xA2, 0x55, 0x1D, 0x49, 0xD1, 0x51, 0xF1, 0x9B, - 0x1E, 0xD6, 0x8C, 0x02, 0xA4, 0xE2, 0x2D, 0x0E, - - 0xB9, 0xED, 0x83, 0x89, 0xD5, 0x73, 0x97, 0x72, - 0x3A, 0xF3, 0x32, 0x9A, 0xC4, 0xE0, 0x80, 0x5B, - 0xA3, 0x2E, 0x18, 0x82, 0xD9, 0x6D, 0xDC, 0xA3, - 0x4F, 0x00, 0x24, 0x67, 0x52, 0xDC, 0xD9, 0x07, - 0x1E, 0x62, 0x1A, 0xC8, 0xA8, 0xC0, 0xEF, 0x68, - 0x5E, 0xED, 0x2A, 0x23, 0xA2, 0x91, 0xC4, 0x49, - 0x69, 0xF4, 0xC1, 0x84, 0x60, 0x84, 0xAB, 0x34, - 0x91, 0x73, 0x76, 0x4A, 0x70, 0x98, 0xD5, 0x42, - 0xA0, 0x8C, 0x69, 0x1A, 0x6B, 0xC5, 0x90, 0x86, - 0x4E, 0xF3, 0x4C, 0xA0, 0xBA, 0x47, 0x4F, 0x41, - 0x0E, 0x83, 0x30, 0xF7, 0x5B, 0x47, 0x4C, 0x2D, - 0x78, 0xB9, 0x49, 0x51, 0x54, 0xF4, 0x01, 0x23, - 0x77, 0x6D, 0x2D, 0x05, 0x1F, 0xA9, 0xA5, 0x65, - 0x83, 0x92, 0xF3, 0xCE, 0x19, 0x2A, 0x9A, 0xF2, - 0xC6, 0x9C, 0x08, 0x8D, 0xF9, 0x31, 0xCA, 0xD0, - 0xF0, 0x56, 0xB9, 0xD2, 0xDE, 0x09, 0x6E, 0x7B, - 0xF1, 0x33, 0x45, 0xAD, 0x5D, 0x20, 0xC9, 0x6B, - 0x12, 0x91, 0xCC, 0xA0, 0x44, 0xF3, 0xB2, 0x9C, - 0x29, - - 0x28, 0x3B, 0xFC, 0xF7, 0x0B, 0xE0, 0x62, 0x2F, - 0xB3, 0x2E, 0x10, 0xD3, 0x78, 0x0C, 0x33, 0x6D, - 0xD7, 0xA8, 0xB2, 0xF7, 0x1C, 0x6C, 0xBA, 0xD0, - 0x67, 0x5F, 0xB5, 0xD3, 0x71, 0x09, 0xD7, 0x34, - 0xCE, 0xFB, 0xF0, 0xEE, 0x7D, 0x5C, 0xCE, 0x03, - 0x20, 0x85, 0xEA, 0xD6, 0x01, 0xF9, 0x4A, 0x3C, - 0x83, 0xC8, 0x59, 0xA3, 0x42, 0x90, 0xB3, 0x14, - 0x04, 0x86, 0xB1, 0x1A, 0xDB, 0x7C, 0x35, 0x56, - 0x96, 0x15, 0xE4, 0x17, 0x27, 0xB0, 0x47, 0xF2, - 0x75, 0x4E, 0xBD, 0x4D, 0x6D, 0x40, 0xDB, 0x03, - 0xBE, 0x34, 0x23, 0x9C, 0x80, 0xF3, 0x34, 0xF2, - 0x89, 0x43, 0xE2, 0x39, 0x4B, 0x9B, 0xD9, 0x1A, - 0xAB, 0x48, 0x4A, 0x97, 0x66, 0x87, 0xF8, 0x37, - 0x70, 0xCC, 0x05, 0x24, 0x48, 0x9F, 0xEF, 0x19, - 0x9C, 0xB4, 0x5F, 0x76, 0x28, 0xED, 0x59, 0x12, - 0x50, 0x5B, 0x69, 0x44, 0xA9, 0xBE, 0x40, 0xEE, - 0x2C, 0x97, 0xA3, 0x4A, 0x05, 0xCC, 0x57, 0xB8, - 0xC9, 0x26, 0x85, 0xE4, 0xB1, 0x58, 0xF2, 0x4D, - 0x9B, 0xA9, - - 0x36, 0xEF, 0xE2, 0x4F, 0xAE, 0x4C, 0xB1, 0xB3, - 0xB8, 0x22, 0x91, 0xB6, 0xC5, 0x31, 0x60, 0xFF, - 0x7B, 0x00, 0x71, 0x12, 0xAA, 0x5A, 0xD2, 0x10, - 0x5E, 0x0F, 0x4C, 0xB0, 0xDB, 0x09, 0x11, 0xC7, - 0x28, 0x6C, 0x88, 0x96, 0x97, 0xC6, 0xB7, 0x56, - 0x77, 0x20, 0xAB, 0xE4, 0x03, 0xFA, 0x7A, 0xCF, - 0x8E, 0xB7, 0x73, 0xEB, 0xD6, 0x80, 0xD8, 0xAE, - 0x6F, 0xCC, 0x22, 0x90, 0x49, 0x7B, 0x21, 0x57, - 0xAF, 0x39, 0x8E, 0x25, 0x98, 0x54, 0x2C, 0x7A, - 0xFC, 0xF1, 0xAE, 0xA0, 0xD7, 0x69, 0x95, 0x04, - 0x6A, 0x93, 0xDA, 0x41, 0x8F, 0xE3, 0x53, 0x7D, - 0x8C, 0xC4, 0xE6, 0x14, 0xD6, 0xF5, 0x23, 0x10, - 0xFF, 0xF4, 0x3D, 0x87, 0x8E, 0x44, 0x7B, 0xBD, - 0xDF, 0x5B, 0x81, 0x1E, 0x88, 0x9C, 0x8E, 0x3C, - 0xB3, 0xA1, 0x8D, 0xC9, 0x1F, 0xE2, 0x51, 0xFB, - 0x31, 0xBA, 0x07, 0x2D, 0xF8, 0xFA, 0x54, 0x88, - 0x64, 0x00, 0xA0, 0x73, 0x2A, 0xD7, 0x9B, 0x85, - 0xBB, 0xED, 0x0A, 0x2E, 0xA1, 0x98, 0x3D, 0x87, - 0xFA, 0x0A, 0x43, - - 0xAE, 0x78, 0x23, 0x96, 0x97, 0xE1, 0x6D, 0x02, - 0x31, 0xA9, 0x56, 0xBA, 0xDC, 0xA4, 0xDB, 0xD5, - 0x5F, 0x37, 0x26, 0xF8, 0xED, 0x78, 0x79, 0xAA, - 0x7B, 0xCC, 0xC3, 0x67, 0x38, 0x86, 0xB6, 0x58, - 0x7D, 0x2A, 0x5E, 0x77, 0xF8, 0xDB, 0x3A, 0xB0, - 0xB3, 0x83, 0x3A, 0xEF, 0xB5, 0xB0, 0x46, 0xA7, - 0x85, 0x98, 0xA8, 0x71, 0x1C, 0x2C, 0xB6, 0x06, - 0x3F, 0xEC, 0x59, 0x78, 0x15, 0xAD, 0x17, 0x65, - 0x94, 0x37, 0xC1, 0x21, 0xC9, 0x1A, 0x16, 0xEA, - 0x1A, 0xFE, 0x3D, 0x35, 0xF4, 0xBA, 0x5D, 0xA0, - 0x21, 0x9C, 0x89, 0x39, 0x69, 0xAB, 0x8E, 0x4B, - 0x8A, 0x9C, 0x38, 0xFD, 0x53, 0x37, 0xB4, 0x59, - 0xBE, 0xB0, 0x56, 0xD7, 0x6C, 0xF8, 0xB8, 0xF1, - 0x03, 0x26, 0xF5, 0x07, 0x98, 0xDB, 0xDF, 0xF3, - 0x9D, 0x02, 0x65, 0x78, 0x7C, 0xD7, 0x71, 0x06, - 0x93, 0xFF, 0xFA, 0xBE, 0xEF, 0x24, 0x24, 0x21, - 0x32, 0xD8, 0xC2, 0xFD, 0xB9, 0x08, 0xBC, 0x06, - 0xD6, 0xC1, 0xEE, 0x5D, 0xFE, 0xA1, 0x8D, 0x12, - 0x9A, 0x36, 0x5B, 0xB7, - - 0x61, 0x61, 0x14, 0x68, 0xE4, 0x54, 0x04, 0x1F, - 0xB4, 0x42, 0x87, 0x44, 0x7B, 0x01, 0xC6, 0xD6, - 0xF9, 0xBC, 0xE5, 0x1D, 0x25, 0x6E, 0xFB, 0xC9, - 0x2A, 0x50, 0x31, 0xB7, 0x8B, 0x11, 0x50, 0x39, - 0x2C, 0xE9, 0x37, 0xD1, 0x43, 0xD5, 0xD2, 0x9D, - 0x9D, 0x9E, 0x58, 0x1C, 0x14, 0x90, 0x8C, 0x0B, - 0xF0, 0x2D, 0xBE, 0xEB, 0xF4, 0x24, 0xA9, 0xFF, - 0x07, 0x5C, 0x8F, 0x49, 0x26, 0xEF, 0xC4, 0x74, - 0x8E, 0x32, 0x03, 0xCA, 0xBF, 0xB9, 0x8D, 0x3C, - 0x69, 0xE4, 0x3D, 0x35, 0x85, 0xC3, 0xAE, 0x35, - 0x33, 0x95, 0xD4, 0xE8, 0xAC, 0xBE, 0xE2, 0x2E, - 0xD2, 0x75, 0x3A, 0x42, 0x00, 0xBF, 0xC2, 0x61, - 0xF1, 0x0C, 0x5D, 0xFB, 0xC9, 0x59, 0xB1, 0xAC, - 0x37, 0x83, 0x7E, 0x52, 0xB0, 0x32, 0x38, 0x9E, - 0xD5, 0xCD, 0xE4, 0x77, 0x47, 0x08, 0x9B, 0x41, - 0x2A, 0x5D, 0xA7, 0x5E, 0xAA, 0xF2, 0xD3, 0x4F, - 0x76, 0x20, 0xB3, 0xD5, 0x55, 0xEE, 0x41, 0x00, - 0x8C, 0x7C, 0x38, 0x67, 0xF4, 0x38, 0x21, 0xB8, - 0x3F, 0x1E, 0x57, 0x46, 0x45, - - 0x66, 0xF1, 0x58, 0xCA, 0xD3, 0x81, 0x9F, 0x85, - 0x1D, 0x6F, 0xA2, 0xB5, 0xCB, 0x77, 0x12, 0x4C, - 0x41, 0xF2, 0x93, 0xED, 0x56, 0x04, 0xC7, 0xB1, - 0xA0, 0x9B, 0x6D, 0x51, 0x9C, 0xC8, 0xE9, 0xF3, - 0x9C, 0xE1, 0xC2, 0x91, 0x6A, 0x31, 0x05, 0x2A, - 0xB1, 0xEE, 0x19, 0xCD, 0x01, 0x30, 0x2F, 0x80, - 0x37, 0x03, 0xCD, 0xB1, 0x7D, 0xB8, 0xC0, 0x06, - 0x83, 0x00, 0xC7, 0x12, 0x85, 0x43, 0x8D, 0x67, - 0x12, 0xD8, 0xC8, 0x15, 0x62, 0x80, 0xA1, 0xE1, - 0x60, 0x42, 0x04, 0x74, 0x34, 0xBA, 0xBC, 0x67, - 0xF0, 0x04, 0xA7, 0x54, 0x3C, 0x6C, 0x0B, 0x10, - 0x2E, 0x02, 0x4D, 0x4F, 0x4A, 0x45, 0x97, 0x8E, - 0xF6, 0x50, 0x65, 0x44, 0xD0, 0x8B, 0x72, 0x33, - 0xCE, 0xD9, 0xDE, 0x7A, 0xE9, 0x98, 0x6F, 0x0C, - 0xE7, 0x79, 0xA8, 0x11, 0x73, 0x83, 0xF2, 0x93, - 0x5B, 0xE7, 0x3E, 0x4B, 0x81, 0xCE, 0xFB, 0x4E, - 0x27, 0x73, 0x7E, 0x66, 0xFA, 0x55, 0x1F, 0xCE, - 0xE8, 0xC3, 0x38, 0x7D, 0x04, 0xC6, 0xC3, 0x30, - 0x47, 0x8B, 0x02, 0x9D, 0x81, 0x49, - - 0x0A, 0x2A, 0x5B, 0x2B, 0x5E, 0xA4, 0x2B, 0x40, - 0x5E, 0x95, 0x70, 0x40, 0x23, 0x66, 0xD1, 0x1A, - 0x27, 0x79, 0x3F, 0x3C, 0xA9, 0x86, 0xF2, 0x75, - 0x2A, 0x52, 0x2E, 0xFE, 0x4E, 0x8E, 0x7E, 0x20, - 0x79, 0x19, 0x98, 0xDD, 0x01, 0x3F, 0x19, 0x68, - 0x23, 0x0A, 0xF0, 0x18, 0xA7, 0x13, 0x33, 0xF3, - 0x9E, 0x04, 0xA7, 0xA9, 0x01, 0xFA, 0xAC, 0xF3, - 0x81, 0x3D, 0xC6, 0x57, 0x35, 0x8C, 0xFE, 0x5D, - 0xCB, 0xE6, 0xF3, 0xA6, 0xCF, 0x18, 0x96, 0x70, - 0xCF, 0xAD, 0x05, 0xC6, 0x75, 0x05, 0x02, 0x50, - 0xA6, 0xAA, 0x88, 0xBC, 0x57, 0xA9, 0x14, 0x1A, - 0xF9, 0x1A, 0xD3, 0x40, 0xC7, 0x48, 0xFF, 0xE0, - 0x2D, 0xC6, 0xA8, 0x94, 0xBA, 0x3F, 0xFA, 0x76, - 0x44, 0xBA, 0xE8, 0x3E, 0xCC, 0x0D, 0x16, 0x8A, - 0x72, 0x91, 0xD8, 0xB1, 0x29, 0xC7, 0x3C, 0x67, - 0x1E, 0xA2, 0x3A, 0x9C, 0x9F, 0x5B, 0xCD, 0x41, - 0x8C, 0xCB, 0xFF, 0xFE, 0x70, 0x6F, 0xDA, 0xDF, - 0x10, 0x4B, 0xFF, 0x9A, 0xBF, 0x3E, 0xFF, 0x98, - 0x4E, 0x62, 0x15, 0x96, 0x97, 0xE1, 0x4E, - - 0x18, 0xDD, 0xC6, 0xD7, 0x31, 0x4C, 0x44, 0xF5, - 0x63, 0x56, 0x9C, 0xDF, 0xDC, 0x2D, 0x25, 0x5A, - 0xBF, 0x0C, 0x40, 0x69, 0x86, 0xDA, 0xA8, 0x76, - 0x86, 0x9C, 0x74, 0x9F, 0xDD, 0x04, 0x01, 0x9E, - 0x0B, 0x70, 0xEF, 0xE1, 0xF6, 0x26, 0x58, 0x5F, - 0x10, 0x2F, 0x9D, 0xC7, 0xAC, 0x4C, 0x19, 0x85, - 0xC8, 0x3E, 0xE8, 0xFF, 0xC4, 0x6C, 0x17, 0xB0, - 0xB9, 0x2E, 0x00, 0xD6, 0xEA, 0xF0, 0xFA, 0x40, - 0x93, 0x8D, 0x6F, 0xFD, 0x0B, 0xF5, 0x59, 0xEC, - 0xEA, 0x64, 0x26, 0x9D, 0x5F, 0xB2, 0x26, 0x1E, - 0x4C, 0xC8, 0x65, 0xAD, 0xD4, 0xC1, 0xAD, 0x63, - 0x29, 0x6C, 0x11, 0xCB, 0xE6, 0xDC, 0xF8, 0x2E, - 0x18, 0xA7, 0x50, 0xF0, 0x8F, 0x0E, 0x9B, 0x95, - 0xCC, 0x74, 0x3D, 0xB1, 0x9C, 0xD3, 0x50, 0x08, - 0x18, 0x5E, 0x27, 0x15, 0xD3, 0xF3, 0x5A, 0xC0, - 0x63, 0xEC, 0xB1, 0x4C, 0x77, 0x77, 0x9B, 0xE9, - 0x7B, 0x57, 0x0C, 0x31, 0xAA, 0xB5, 0xCE, 0x6C, - 0x4F, 0x46, 0x16, 0x0D, 0x55, 0xB9, 0x36, 0xF1, - 0xFA, 0x36, 0xE8, 0x89, 0xB0, 0x7B, 0xBB, 0x84, - - 0xF3, 0x24, 0x87, 0xDA, 0x52, 0xDC, 0x22, 0x0A, - 0xE1, 0x8E, 0x6A, 0x1A, 0xA6, 0x6C, 0x16, 0x48, - 0xFD, 0x70, 0xF9, 0x3E, 0x45, 0xF7, 0xE3, 0x6A, - 0xAC, 0x92, 0x5A, 0x82, 0xD1, 0xC3, 0x8C, 0x7E, - 0x76, 0x69, 0x3E, 0x34, 0x66, 0x25, 0x46, 0xD0, - 0x17, 0xEE, 0x25, 0xD2, 0xB2, 0x2A, 0xCE, 0xB8, - 0x6A, 0x56, 0x2C, 0x37, 0xB0, 0x51, 0x62, 0x1A, - 0x04, 0xB9, 0x68, 0xAA, 0x9B, 0x30, 0xEE, 0x17, - 0x57, 0xFC, 0x98, 0xCF, 0x7E, 0x4B, 0xAB, 0x25, - 0xA0, 0x91, 0x6E, 0x68, 0x23, 0x55, 0xF0, 0xC7, - 0x20, 0xA7, 0x3B, 0xE1, 0x03, 0xB3, 0x94, 0x2C, - 0x5D, 0xC1, 0x50, 0x32, 0x61, 0xB8, 0x63, 0x69, - 0x61, 0x74, 0x61, 0xCA, 0xC1, 0x49, 0x25, 0x63, - 0x9B, 0xA1, 0x5A, 0x09, 0x23, 0x44, 0x05, 0x97, - 0xCA, 0x73, 0xA6, 0x57, 0x92, 0xA5, 0x22, 0x18, - 0x82, 0x55, 0x0E, 0xFF, 0xE7, 0x53, 0xA9, 0x71, - 0x25, 0xC6, 0x2D, 0x02, 0x07, 0xD4, 0x51, 0x12, - 0x18, 0x03, 0x71, 0x4F, 0x10, 0x23, 0x17, 0xF0, - 0x76, 0xB3, 0x3B, 0x57, 0x8D, 0x88, 0xDA, 0x6F, - 0x5F, - - 0xCB, 0xF5, 0x44, 0xA5, 0x45, 0x49, 0x7D, 0x58, - 0xA6, 0x10, 0x4B, 0x4E, 0x81, 0xF2, 0x15, 0x21, - 0x03, 0xFB, 0xD2, 0x34, 0xE2, 0xF8, 0x99, 0x09, - 0x5D, 0x59, 0x24, 0xFF, 0xB9, 0x0D, 0xBC, 0xF6, - 0x2B, 0x11, 0x55, 0x4D, 0x50, 0x7C, 0xCD, 0x18, - 0x94, 0x92, 0xF3, 0x5C, 0x95, 0x7A, 0x64, 0xF7, - 0x35, 0x27, 0x56, 0x79, 0xD6, 0xD8, 0x81, 0xE0, - 0xF3, 0x3F, 0x80, 0x8F, 0x97, 0x1B, 0xD8, 0x15, - 0x70, 0x15, 0x2D, 0xC0, 0x2E, 0x7E, 0x79, 0xF8, - 0x1F, 0x88, 0xB7, 0xB7, 0xFF, 0x53, 0x67, 0xE8, - 0xC1, 0x59, 0x89, 0x66, 0xFD, 0x66, 0x4E, 0x88, - 0xA0, 0xCD, 0xC6, 0xD0, 0x34, 0x0C, 0x31, 0xE3, - 0xD4, 0x5F, 0x32, 0x32, 0xAC, 0xCC, 0xE1, 0x24, - 0x8C, 0x4E, 0xC9, 0x39, 0xC3, 0x7A, 0x6B, 0xAB, - 0xAE, 0x6C, 0x01, 0x79, 0x6D, 0xB4, 0xAF, 0x49, - 0x12, 0x10, 0xB3, 0xC5, 0x20, 0xB9, 0x63, 0x99, - 0x79, 0xC1, 0x22, 0xE4, 0x74, 0x15, 0x42, 0x61, - 0x98, 0x4E, 0xDC, 0x13, 0xD0, 0xE1, 0xD8, 0x24, - 0x0A, 0xC5, 0xB4, 0x54, 0xDC, 0x3C, 0x00, 0xDE, - 0xFB, 0xEB, - - 0x01, 0x0B, 0xD7, 0x6A, 0x19, 0xF8, 0xD2, 0x4A, - 0xD6, 0xC8, 0xFA, 0x05, 0x69, 0x4A, 0x18, 0x97, - 0x35, 0x61, 0x8B, 0xB9, 0x8B, 0x7B, 0x0C, 0xD9, - 0xF4, 0xF4, 0xC4, 0x2F, 0x1F, 0xA9, 0x98, 0x16, - 0xB7, 0xD6, 0x1F, 0x4A, 0x59, 0x42, 0x37, 0x60, - 0x37, 0x20, 0x37, 0x5C, 0x16, 0x6E, 0x63, 0x49, - 0x25, 0x1A, 0x86, 0x42, 0x00, 0xC3, 0x4A, 0x33, - 0xC7, 0x7D, 0x06, 0x14, 0xC9, 0x98, 0x19, 0x9A, - 0xD3, 0x17, 0xB4, 0x61, 0x4F, 0x52, 0x09, 0x13, - 0x54, 0xFE, 0xE4, 0x47, 0xA4, 0xFF, 0xA5, 0x20, - 0x62, 0x52, 0xB1, 0xDD, 0x42, 0xF2, 0x1C, 0xE9, - 0x0E, 0x2D, 0xEA, 0x19, 0x51, 0xF5, 0x3E, 0x7D, - 0x27, 0xFF, 0x1D, 0x43, 0x96, 0x16, 0x9B, 0xBD, - 0x9D, 0x29, 0x0E, 0x19, 0x4B, 0x6E, 0x98, 0xF4, - 0xA3, 0x51, 0x3C, 0x14, 0x64, 0xBF, 0x93, 0xAA, - 0x3C, 0x86, 0xF8, 0xB5, 0x3A, 0x2C, 0x12, 0x10, - 0x52, 0xD6, 0xE9, 0xB6, 0x36, 0x91, 0x5B, 0x36, - 0x22, 0x9B, 0xD1, 0x00, 0xEC, 0xC6, 0x13, 0x13, - 0x1D, 0x83, 0xF4, 0xF9, 0xBE, 0xC0, 0x3E, 0x71, - 0x0B, 0x64, 0xDF, - - 0xF2, 0xB0, 0xFC, 0xD2, 0x54, 0x85, 0x18, 0xD4, - 0x31, 0x7A, 0x3E, 0xD5, 0xDD, 0x8D, 0x3C, 0xCC, - 0x4E, 0x92, 0x14, 0xE4, 0x21, 0x39, 0xF3, 0x73, - 0x66, 0x71, 0x77, 0x29, 0x37, 0x49, 0x6C, 0x72, - 0xFB, 0x51, 0x17, 0x6C, 0x9E, 0x4A, 0x7C, 0x8C, - 0xBF, 0x96, 0x13, 0x8F, 0xAE, 0x7E, 0x88, 0x15, - 0xE9, 0x5E, 0x1A, 0xC4, 0xA7, 0x42, 0xFA, 0x60, - 0xD5, 0xFB, 0xCF, 0x90, 0x56, 0x97, 0xBB, 0xAD, - 0xF2, 0x2C, 0x6B, 0x07, 0xA5, 0xE6, 0x99, 0x92, - 0x75, 0x55, 0x69, 0xE8, 0xA3, 0xD9, 0x05, 0xC4, - 0x95, 0xED, 0xD0, 0x8E, 0x18, 0x60, 0x86, 0x86, - 0xEB, 0xC3, 0x20, 0xA8, 0xB9, 0x2E, 0xB8, 0x38, - 0xEB, 0xCE, 0x48, 0x2E, 0x4B, 0x42, 0xD6, 0xFB, - 0xDF, 0x97, 0xC4, 0xCD, 0x8C, 0xFD, 0x98, 0x0E, - 0xAC, 0xC2, 0xC4, 0xDA, 0x07, 0xFF, 0x8D, 0x72, - 0xF3, 0x15, 0x6F, 0x69, 0x3A, 0x61, 0x5F, 0xE0, - 0xAE, 0x1B, 0xCB, 0x16, 0x91, 0xEF, 0x54, 0x92, - 0xFC, 0xCD, 0xAF, 0xF4, 0x45, 0x4F, 0x2A, 0xCD, - 0xF8, 0xE4, 0x3F, 0x99, 0x2C, 0x61, 0xEC, 0x23, - 0xE3, 0x8B, 0xAB, 0x8F, - - 0x7C, 0x3F, 0x27, 0xDE, 0xAF, 0xE9, 0x72, 0x9C, - 0x04, 0xDA, 0xB4, 0xBB, 0xE6, 0x6F, 0x56, 0xF1, - 0xE8, 0x7E, 0xB5, 0xDA, 0x14, 0x2D, 0xFA, 0x29, - 0x80, 0x87, 0x53, 0x78, 0x65, 0xF7, 0x98, 0x64, - 0xB7, 0x11, 0x1A, 0x08, 0x4F, 0x36, 0x7E, 0xF8, - 0x4F, 0x0C, 0x70, 0xFE, 0xAF, 0xF1, 0x72, 0xC9, - 0xB8, 0x39, 0x57, 0xCB, 0x10, 0x61, 0x95, 0x49, - 0xEA, 0xB4, 0x2B, 0xA0, 0x77, 0x76, 0x30, 0x5D, - 0x9A, 0xB5, 0xCB, 0xF4, 0x5F, 0xC7, 0xA6, 0xD8, - 0x3A, 0x9E, 0xA8, 0xA1, 0x9F, 0xAB, 0xCC, 0x2C, - 0x2D, 0x8C, 0xCF, 0x3D, 0x7C, 0x11, 0xC6, 0xE9, - 0xD5, 0x15, 0xA2, 0xB8, 0xCE, 0x11, 0x45, 0x52, - 0x94, 0x0D, 0xE3, 0xF4, 0x47, 0x4A, 0xC6, 0x2E, - 0x7A, 0xBF, 0xBB, 0x4D, 0x2A, 0x89, 0xE5, 0x49, - 0x51, 0xDE, 0x25, 0x36, 0x58, 0x52, 0x3F, 0xA3, - 0xAD, 0xFE, 0xE3, 0xA3, 0x31, 0x90, 0xDA, 0xA3, - 0x1D, 0x48, 0xD6, 0xE8, 0xF2, 0x9E, 0x4C, 0xEC, - 0xCA, 0xC7, 0x46, 0x3C, 0xD5, 0x89, 0x01, 0xA7, - 0x33, 0xD3, 0x50, 0x7E, 0x31, 0x1C, 0x8E, 0xFF, - 0xF0, 0xB4, 0x42, 0x70, 0xA5, - - 0xDB, 0xFD, 0x65, 0xEB, 0x8C, 0xA7, 0x97, 0xE5, - 0xC7, 0xF4, 0x2E, 0xD4, 0x19, 0xCD, 0xA6, 0x0F, - 0x56, 0x39, 0xE3, 0x55, 0xF6, 0xFA, 0x43, 0xAC, - 0x3C, 0x0A, 0x1E, 0x00, 0xBF, 0x36, 0x1B, 0x95, - 0x71, 0x7E, 0x73, 0xBF, 0x93, 0x76, 0xF6, 0x2D, - 0xCB, 0x35, 0xBE, 0x43, 0x33, 0x2B, 0x89, 0x2D, - 0x85, 0x8A, 0xCE, 0x2F, 0xE7, 0x9C, 0x39, 0xD7, - 0x01, 0x69, 0x2E, 0xB3, 0xE7, 0xED, 0xEF, 0x41, - 0x06, 0xE7, 0xFC, 0x1F, 0x4B, 0x42, 0x71, 0xB2, - 0x59, 0x55, 0xEB, 0xBD, 0x18, 0x12, 0x63, 0x7F, - 0xEE, 0x10, 0x35, 0x84, 0x4E, 0x58, 0x9C, 0x75, - 0x86, 0xAB, 0x7F, 0x54, 0x8C, 0x90, 0x79, 0xAD, - 0xE7, 0xA6, 0x40, 0xCA, 0xB3, 0x6D, 0x8A, 0x14, - 0x8A, 0xE5, 0x13, 0x8C, 0x6E, 0xE9, 0x99, 0x56, - 0x11, 0xFC, 0xD4, 0x3B, 0xF5, 0xCB, 0x65, 0x33, - 0xEF, 0x98, 0x63, 0x7F, 0x91, 0x22, 0xD1, 0x2E, - 0xF4, 0xE0, 0xB3, 0xE8, 0xA6, 0x9E, 0xF9, 0x10, - 0xC6, 0xF1, 0x21, 0x95, 0x8C, 0x34, 0x2D, 0x7C, - 0x54, 0x92, 0x8D, 0x8F, 0xB6, 0x03, 0x34, 0xF7, - 0xF7, 0xD8, 0x5A, 0xBA, 0x57, 0x50, - - 0x41, 0x62, 0x0B, 0xC6, 0xC6, 0x43, 0xE4, 0x2D, - 0x36, 0x29, 0x87, 0x1D, 0x0D, 0xAC, 0xDB, 0xF0, - 0x00, 0x89, 0xBD, 0xE6, 0x48, 0x04, 0x24, 0x0C, - 0x28, 0x54, 0x88, 0x94, 0x3E, 0x1F, 0x2F, 0x5D, - 0x1C, 0xC1, 0x18, 0x38, 0xA6, 0xA5, 0xCA, 0xC3, - 0xAF, 0x5C, 0xDF, 0xAD, 0x8B, 0x4F, 0x53, 0x9E, - 0x6B, 0x99, 0xAB, 0x09, 0x2F, 0xD8, 0x11, 0xF9, - 0xC9, 0xAB, 0x73, 0x0A, 0xE6, 0x50, 0x6F, 0xBD, - 0xA5, 0xD1, 0x16, 0xFE, 0xC3, 0x11, 0xDE, 0x11, - 0x72, 0xC4, 0x71, 0x80, 0x40, 0x02, 0x14, 0x1F, - 0xC1, 0x6C, 0xE3, 0x28, 0xF8, 0xD8, 0x99, 0x06, - 0x1B, 0x90, 0x55, 0xFB, 0x67, 0x1D, 0x37, 0xA8, - 0xF9, 0xC7, 0xB2, 0xAD, 0x0F, 0x6C, 0xF4, 0x0F, - 0x1B, 0x42, 0xBD, 0x57, 0x51, 0x56, 0xA5, 0x83, - 0x7A, 0x15, 0x1C, 0x1A, 0xCF, 0x8C, 0xA4, 0x1B, - 0xF2, 0xFB, 0xDF, 0xC1, 0xCE, 0xD1, 0xF3, 0x29, - 0x7B, 0xA6, 0xA7, 0xE8, 0xA8, 0xB4, 0xCF, 0xEC, - 0x4E, 0xD7, 0x92, 0x82, 0x3A, 0x27, 0x05, 0xEF, - 0x88, 0x1B, 0x9C, 0x04, 0xAD, 0xF9, 0x51, 0x94, - 0xA6, 0xC1, 0xF8, 0x16, 0x3F, 0x5F, 0xF2, - - 0xFC, 0xF4, 0xBD, 0x0F, 0xE9, 0x09, 0xA4, 0xCE, - 0x31, 0x2D, 0x53, 0xD4, 0x15, 0xE5, 0x62, 0xF6, - 0x72, 0x63, 0x22, 0x53, 0x93, 0x2E, 0xCB, 0x30, - 0x01, 0x5C, 0x1C, 0xBA, 0x04, 0xA6, 0x95, 0x46, - 0x4E, 0x03, 0xEC, 0x36, 0xA2, 0xBE, 0x86, 0xD7, - 0x6E, 0x92, 0x2C, 0xEF, 0x64, 0x45, 0x94, 0x22, - 0xF8, 0x11, 0x43, 0x2D, 0x81, 0x04, 0xE6, 0x7B, - 0xEC, 0xE3, 0xF9, 0x9A, 0x43, 0xEF, 0xA7, 0xC9, - 0x5F, 0x39, 0x56, 0x6D, 0x3A, 0xBC, 0x26, 0xCD, - 0x77, 0x6F, 0x38, 0x30, 0x0A, 0x78, 0xD3, 0x98, - 0x71, 0xE1, 0x2C, 0xEA, 0xC2, 0xD8, 0x69, 0x18, - 0x74, 0xFE, 0x91, 0x1C, 0xAF, 0x5D, 0x8D, 0xDB, - 0x59, 0xDA, 0x52, 0xCD, 0xE4, 0x0D, 0x76, 0x41, - 0x9E, 0x6C, 0xD3, 0x85, 0x96, 0x3C, 0x8E, 0x66, - 0xDF, 0xED, 0x26, 0x03, 0x84, 0x88, 0x9D, 0x25, - 0x39, 0x35, 0xAD, 0xB5, 0x8B, 0xBB, 0xC5, 0x64, - 0xCE, 0xC5, 0xD7, 0x88, 0x5C, 0x2D, 0x46, 0x47, - 0x80, 0x11, 0x43, 0x85, 0xF1, 0xEB, 0x90, 0x71, - 0xA4, 0xB7, 0x5A, 0x3B, 0xB4, 0x51, 0x68, 0x76, - 0x63, 0x4D, 0x8F, 0x9F, 0x65, 0x6F, 0x9D, 0x03, - - 0x80, 0x5F, 0x0F, 0xB1, 0x39, 0x5B, 0xF6, 0x33, - 0xF7, 0x1C, 0xE6, 0x3C, 0x31, 0xC4, 0x31, 0x1A, - 0x14, 0x67, 0x38, 0x6C, 0x79, 0x59, 0x05, 0xF2, - 0x1F, 0xBA, 0xF2, 0xAE, 0x0C, 0xFF, 0xC5, 0x22, - 0x89, 0xB9, 0x2C, 0x88, 0xD1, 0x10, 0x24, 0xD1, - 0xBA, 0xD4, 0xD7, 0x41, 0x45, 0xAF, 0x57, 0xFC, - 0xF6, 0x97, 0x81, 0x4D, 0xA5, 0xF9, 0xC2, 0x25, - 0xFC, 0x3B, 0xBD, 0x0E, 0x96, 0xC2, 0x8B, 0xE3, - 0x93, 0x67, 0x65, 0xC4, 0x1D, 0x2A, 0x86, 0xCC, - 0x8A, 0x87, 0x4C, 0x35, 0xF7, 0x55, 0x51, 0xD6, - 0x8A, 0x8A, 0xE8, 0xE8, 0x69, 0xEF, 0x1A, 0xED, - 0xCB, 0x09, 0x4C, 0xE1, 0x4F, 0x36, 0xA6, 0xBD, - 0x68, 0x6B, 0x87, 0xC1, 0x39, 0x5E, 0x63, 0x61, - 0xA7, 0x19, 0x60, 0x3E, 0x1A, 0x2A, 0xF0, 0x43, - 0xA4, 0xE5, 0xE3, 0xEF, 0x76, 0x20, 0xA1, 0x7D, - 0x61, 0xFB, 0xC0, 0x8D, 0xED, 0xB0, 0x78, 0xDB, - 0xEC, 0x53, 0x44, 0x4A, 0x94, 0x42, 0x39, 0x83, - 0x41, 0x49, 0xBC, 0xA5, 0x17, 0x6C, 0xB4, 0x89, - 0x8D, 0xAB, 0x32, 0x40, 0x05, 0x69, 0x44, 0xF8, - 0x9A, 0x8B, 0x60, 0xD5, 0x47, 0x31, 0xD5, 0x17, - 0x1A, - - 0x99, 0xC8, 0x1F, 0x50, 0x51, 0xE0, 0xCA, 0x64, - 0x60, 0x38, 0x24, 0x34, 0x8B, 0x37, 0x13, 0x87, - 0x05, 0xE5, 0x3D, 0x7E, 0x8F, 0x8D, 0xF7, 0xD5, - 0x92, 0x06, 0xA4, 0x32, 0xD9, 0x64, 0xD8, 0xFC, - 0x1B, 0x5E, 0x46, 0xE4, 0x97, 0x14, 0x80, 0x2D, - 0xE2, 0x7B, 0x2E, 0xC4, 0xC2, 0x50, 0x0C, 0xDC, - 0xC1, 0xE6, 0x6A, 0x5F, 0x37, 0x02, 0x36, 0x24, - 0x98, 0x51, 0xB5, 0x92, 0x4E, 0x95, 0x80, 0x3E, - 0x93, 0x21, 0x03, 0xFB, 0x41, 0x20, 0x85, 0x55, - 0x39, 0xFC, 0xFC, 0x9E, 0xE6, 0x5B, 0x21, 0x29, - 0xC6, 0xCD, 0x63, 0x6B, 0xB8, 0x66, 0xB3, 0xB2, - 0x77, 0xE6, 0xA3, 0x3A, 0x40, 0x6C, 0xD0, 0x7C, - 0xEA, 0x36, 0x5F, 0x3E, 0xA2, 0x47, 0x64, 0xD9, - 0xF5, 0x94, 0x09, 0xE6, 0xC4, 0x90, 0x0E, 0xF6, - 0x5E, 0xE5, 0x9E, 0x54, 0xFC, 0x32, 0x51, 0x0F, - 0xED, 0x6A, 0xEE, 0x50, 0x29, 0x47, 0x0C, 0xEF, - 0xCD, 0x3D, 0x83, 0x2F, 0xA4, 0x62, 0x93, 0x0A, - 0x28, 0xEF, 0xD9, 0xAD, 0x6F, 0xAE, 0x79, 0x1B, - 0x7E, 0xB8, 0xEC, 0x21, 0x53, 0x13, 0x21, 0xDF, - 0x01, 0x81, 0x4C, 0x30, 0x07, 0x58, 0x6E, 0x80, - 0x1A, 0xED, - - 0x78, 0x66, 0x40, 0x07, 0x32, 0x18, 0x83, 0x4D, - 0x35, 0x65, 0x2D, 0xD2, 0x93, 0x09, 0xEF, 0xF7, - 0x5F, 0xD6, 0xB0, 0x99, 0xD9, 0xD0, 0xC5, 0xD7, - 0xF7, 0xC3, 0xDF, 0xD2, 0x01, 0xB2, 0x80, 0x7F, - 0xC5, 0xC8, 0x9A, 0xB3, 0x1B, 0x1D, 0x4A, 0x3E, - 0x05, 0xD4, 0x5B, 0xB5, 0xC5, 0x61, 0x7A, 0x16, - 0x49, 0x0E, 0xB3, 0x17, 0x30, 0x81, 0x10, 0xA0, - 0xC7, 0xE7, 0x3E, 0x1D, 0xAC, 0x2B, 0x36, 0x02, - 0xB2, 0x82, 0x7D, 0xAD, 0xD4, 0x24, 0x34, 0xC6, - 0x90, 0x19, 0x7E, 0xE0, 0xAD, 0xE2, 0xB2, 0xDE, - 0x59, 0xB8, 0xB5, 0x98, 0xC5, 0xEE, 0xA4, 0x14, - 0x8E, 0x4E, 0xEB, 0x9C, 0xA3, 0x27, 0x35, 0xF5, - 0x03, 0x8F, 0x3F, 0x24, 0xED, 0x7D, 0xA1, 0x86, - 0xFE, 0xD3, 0xD7, 0x45, 0xC8, 0x48, 0xDC, 0xA1, - 0x2E, 0xF9, 0xDF, 0xB3, 0x15, 0xD9, 0x16, 0x8E, - 0xEA, 0x52, 0xDE, 0x70, 0x71, 0xA9, 0x6A, 0x48, - 0x75, 0xBD, 0x6C, 0x8C, 0xF4, 0x51, 0x93, 0x35, - 0x7F, 0xD8, 0x59, 0xDB, 0xEE, 0x97, 0xB3, 0x15, - 0xC2, 0x66, 0x95, 0xB9, 0x09, 0x7F, 0x22, 0x4A, - 0x0D, 0xBF, 0xCE, 0x05, 0x11, 0x14, 0x72, 0x83, - 0x89, 0x77, 0x48, - - 0x36, 0x9A, 0x46, 0xA7, 0xD8, 0x92, 0xA3, 0x4A, - 0xBE, 0x55, 0xDA, 0xBE, 0xB4, 0x8D, 0x58, 0x09, - 0x0F, 0xEB, 0x49, 0x0C, 0xFE, 0xDA, 0x5E, 0xB3, - 0xCF, 0xB5, 0xDF, 0x65, 0x4B, 0x37, 0xF4, 0xFF, - 0x0F, 0x68, 0x8C, 0xBE, 0x3C, 0x36, 0x62, 0x54, - 0xF1, 0xC5, 0x76, 0x64, 0x6E, 0x7F, 0xCC, 0x91, - 0x61, 0x77, 0xB5, 0xD1, 0x5F, 0x56, 0x35, 0xAA, - 0xFB, 0x72, 0x8E, 0x21, 0xFF, 0x33, 0xD5, 0x36, - 0xFE, 0xF6, 0x85, 0x63, 0x58, 0x02, 0x6A, 0x35, - 0x0C, 0x3F, 0x42, 0xE2, 0xF7, 0xE7, 0x36, 0xC1, - 0x11, 0x49, 0x75, 0x99, 0x6D, 0x39, 0x68, 0x7F, - 0x17, 0x54, 0x29, 0x5A, 0x88, 0xAF, 0x48, 0xFC, - 0xF7, 0xC9, 0xD1, 0x39, 0xA2, 0xBD, 0x1D, 0xBF, - 0xAA, 0xA2, 0x37, 0x9D, 0x71, 0x7D, 0xEC, 0xF5, - 0x7C, 0xEC, 0x1C, 0x21, 0xBC, 0x73, 0x4D, 0x69, - 0xA5, 0x0C, 0xA1, 0x6E, 0xDA, 0x84, 0x52, 0xB9, - 0xED, 0xE6, 0x3C, 0xAC, 0x0D, 0xEA, 0x78, 0x40, - 0x4A, 0x24, 0x6C, 0xC5, 0xA9, 0xB9, 0x6C, 0x9A, - 0x57, 0xC4, 0xA3, 0xC2, 0x66, 0x8F, 0x4D, 0x9E, - 0x85, 0x14, 0x26, 0xB2, 0x9B, 0xB5, 0xEF, 0x22, - 0xE1, 0xA1, 0x50, 0x41, - - 0x96, 0x16, 0x23, 0x5B, 0x30, 0x81, 0xD1, 0x9A, - 0x66, 0x84, 0x92, 0xD1, 0xC4, 0x59, 0xE1, 0x24, - 0xFF, 0x2D, 0xA8, 0x6B, 0x83, 0x72, 0x38, 0xCD, - 0x7D, 0x4F, 0x5A, 0x85, 0x8A, 0x2E, 0xE9, 0x6B, - 0x48, 0x02, 0x54, 0xE4, 0x3B, 0x9F, 0x76, 0x13, - 0x9F, 0x9F, 0xF3, 0xE0, 0xF0, 0x48, 0x67, 0x9D, - 0x9F, 0x86, 0xCF, 0x7E, 0x7C, 0x1C, 0x0F, 0x61, - 0x64, 0xDA, 0x67, 0xBE, 0x68, 0x02, 0x08, 0x43, - 0x02, 0xF8, 0x68, 0x4C, 0x73, 0x4B, 0xCF, 0xFB, - 0xE8, 0xC7, 0x61, 0xCC, 0x62, 0x18, 0x39, 0xE4, - 0x04, 0x44, 0x36, 0x1E, 0xB7, 0xFB, 0xCC, 0x0A, - 0x05, 0xE7, 0x50, 0x28, 0x7F, 0xD0, 0x4F, 0xCF, - 0x81, 0xC2, 0x61, 0x72, 0x1C, 0x21, 0x76, 0x46, - 0x13, 0x05, 0x38, 0x5D, 0xEA, 0x2B, 0xF3, 0x5D, - 0xD9, 0x02, 0x3D, 0xBA, 0x4D, 0x79, 0x19, 0xB5, - 0xAC, 0xE3, 0xC7, 0x87, 0x0E, 0xA5, 0x40, 0xE5, - 0x68, 0x7A, 0x4A, 0xA1, 0x54, 0x1B, 0x10, 0xA0, - 0x9D, 0x00, 0x74, 0xB6, 0x86, 0x6D, 0x45, 0x77, - 0xBB, 0x7B, 0x4C, 0x8C, 0xD1, 0xCA, 0xC0, 0xA8, - 0xC1, 0x17, 0x17, 0x39, 0xD6, 0xC8, 0x8D, 0x75, - 0x63, 0x03, 0xB7, 0xCC, 0xA8, - - 0x18, 0xB2, 0xD0, 0xF4, 0xB4, 0xCD, 0x4D, 0xB5, - 0x3F, 0x45, 0x8E, 0x05, 0x57, 0x1A, 0x9E, 0xFB, - 0xA7, 0x46, 0xB9, 0x97, 0xC6, 0x72, 0x46, 0x48, - 0x84, 0xB2, 0xB3, 0x28, 0xBC, 0xF8, 0x3A, 0x70, - 0x4A, 0x1A, 0x26, 0x9D, 0x71, 0x31, 0xEC, 0xB2, - 0xA2, 0x26, 0x8A, 0x74, 0x03, 0x7D, 0x12, 0x07, - 0x09, 0x7B, 0xD9, 0x89, 0x3B, 0x76, 0xD6, 0xC5, - 0xB9, 0x25, 0x93, 0xFD, 0x15, 0xDA, 0x26, 0x9E, - 0x0D, 0x74, 0xAE, 0xCE, 0x81, 0xC1, 0x3E, 0x1F, - 0x4C, 0x86, 0x3C, 0x99, 0x0A, 0xC5, 0x28, 0x90, - 0x74, 0x39, 0x03, 0x07, 0x1F, 0x6A, 0xB5, 0xF1, - 0x64, 0xB4, 0xEC, 0xEE, 0x04, 0xEB, 0x46, 0xCA, - 0xCC, 0x2B, 0x3C, 0x6A, 0x9B, 0x06, 0x0A, 0xD9, - 0x76, 0xB6, 0xBB, 0x8B, 0xBD, 0x57, 0x7A, 0x31, - 0x87, 0x1D, 0x37, 0x2B, 0xAC, 0x43, 0xA5, 0x0F, - 0x0F, 0xC4, 0x25, 0x17, 0x65, 0xDF, 0xD3, 0x98, - 0x7F, 0x31, 0x89, 0xAF, 0xE2, 0x1D, 0xED, 0x3B, - 0x29, 0x5F, 0x35, 0x68, 0xEC, 0xC2, 0x77, 0x4A, - 0x9C, 0x5A, 0xAE, 0x52, 0x13, 0x8C, 0x98, 0x47, - 0x03, 0x1B, 0x20, 0x1A, 0x22, 0x4D, 0x87, 0x9D, - 0x40, 0x86, 0x48, 0xF8, 0x60, 0xFB, - - 0x63, 0x82, 0x97, 0xF6, 0x37, 0x44, 0x0E, 0x4B, - 0x54, 0x92, 0xA1, 0xFB, 0x06, 0x95, 0x89, 0x79, - 0x8F, 0x50, 0x5F, 0xD3, 0x46, 0x7A, 0xEB, 0xEC, - 0x98, 0x38, 0x40, 0x0E, 0xCC, 0x6C, 0x35, 0xBF, - 0x50, 0xD1, 0x6A, 0x3E, 0x08, 0x2E, 0x50, 0x8E, - 0xC2, 0xEB, 0xF3, 0xD8, 0x5A, 0xE8, 0xE3, 0xF4, - 0xC0, 0x37, 0x88, 0x04, 0x32, 0xAF, 0x17, 0xFC, - 0xEE, 0x42, 0x88, 0x84, 0xE7, 0xAD, 0x0F, 0xA7, - 0x51, 0xAB, 0x6A, 0xD5, 0x4B, 0xCF, 0xDB, 0xC2, - 0x09, 0xEF, 0x5D, 0x6B, 0x7F, 0x12, 0x79, 0x13, - 0xB0, 0xE8, 0xDE, 0x80, 0x72, 0x71, 0xD8, 0xDB, - 0x4E, 0x08, 0xF0, 0xA8, 0x7A, 0x68, 0xF8, 0x82, - 0xD5, 0xFD, 0xD3, 0x4A, 0x58, 0x2A, 0x99, 0x65, - 0xC2, 0x2C, 0x97, 0x59, 0x13, 0xA8, 0x96, 0x52, - 0xC3, 0xA9, 0x17, 0x47, 0xBA, 0x9C, 0xD9, 0xBB, - 0xBE, 0xAF, 0x91, 0x6F, 0xE0, 0xE3, 0x52, 0x9B, - 0xA5, 0x49, 0x7B, 0xEF, 0x5F, 0x2B, 0x03, 0xD7, - 0x4C, 0x46, 0xC0, 0xE8, 0x3F, 0xE5, 0x68, 0x7D, - 0xC9, 0xCC, 0x63, 0xA8, 0x85, 0x78, 0xFD, 0x0F, - 0x6A, 0x09, 0xBE, 0x1B, 0x1B, 0x62, 0x7A, 0x43, - 0x57, 0xF3, 0x7B, 0xC7, 0xD4, 0x9F, 0xF0, - - 0x48, 0xA5, 0xCC, 0x95, 0x4E, 0xDD, 0xE7, 0xF9, - 0x53, 0x3C, 0x37, 0xAC, 0xAA, 0x4D, 0xD7, 0x46, - 0x53, 0xD8, 0xC5, 0x51, 0x27, 0xFE, 0x09, 0x24, - 0x56, 0x0D, 0x9D, 0x57, 0x3B, 0x07, 0xB6, 0xA1, - 0x0E, 0x75, 0xF3, 0xC4, 0x80, 0x06, 0x49, 0x0B, - 0xFB, 0x36, 0x3A, 0x98, 0xB0, 0x98, 0xB8, 0xD1, - 0x4A, 0x9F, 0x7A, 0x3D, 0x06, 0x32, 0xDE, 0x00, - 0x8C, 0xF5, 0x5C, 0x65, 0xE8, 0xCB, 0x15, 0xF7, - 0x77, 0xE6, 0x93, 0x1F, 0x56, 0x21, 0x48, 0x7B, - 0xFF, 0xD1, 0x7E, 0xA2, 0xB1, 0xDB, 0x36, 0xC1, - 0x3D, 0x23, 0x9F, 0x8B, 0x2B, 0x23, 0x90, 0x58, - 0x9A, 0x60, 0xF2, 0x8D, 0x61, 0xAD, 0x69, 0x5C, - 0xC4, 0xA5, 0xB3, 0x68, 0xF0, 0x98, 0xD1, 0xB2, - 0xEA, 0x03, 0xE7, 0x02, 0x19, 0x81, 0x26, 0x5D, - 0x20, 0x4E, 0x61, 0xF1, 0xEC, 0xE6, 0x6C, 0xEF, - 0x0E, 0x55, 0x6F, 0x6D, 0x11, 0x84, 0x1A, 0x5B, - 0x7E, 0x82, 0x66, 0x88, 0x44, 0x63, 0x99, 0xB1, - 0x5B, 0xC5, 0xFB, 0x47, 0xFF, 0x9C, 0x39, 0xD6, - 0xC2, 0x96, 0xEC, 0xE3, 0xA7, 0xAA, 0xF7, 0xC2, - 0x93, 0xB2, 0x0D, 0x7B, 0x2A, 0xF8, 0xBA, 0x22, - 0x2E, 0xA5, 0x7C, 0x88, 0x41, 0x7E, 0x8A, 0xFA, - - 0x0F, 0x63, 0x92, 0x0D, 0x42, 0x3E, 0x56, 0x78, - 0x82, 0x58, 0xB7, 0x5A, 0xB4, 0xFF, 0x25, 0x5E, - 0xCD, 0x05, 0x8A, 0x3B, 0x00, 0xE7, 0xF0, 0x70, - 0xFE, 0x38, 0xC4, 0x17, 0x4D, 0x0A, 0x26, 0x71, - 0x3F, 0x64, 0x1F, 0x85, 0xE2, 0xF6, 0xED, 0x07, - 0x79, 0xDF, 0x7D, 0x03, 0x45, 0x0E, 0x26, 0xB1, - 0xC8, 0xD7, 0x7C, 0xE0, 0xF6, 0x3E, 0x6C, 0xDC, - 0xB2, 0x58, 0xFD, 0x56, 0x47, 0x69, 0xE1, 0x41, - 0xEB, 0x88, 0xEB, 0xE9, 0x8E, 0x73, 0x68, 0x4A, - 0xB4, 0xC3, 0x35, 0xA0, 0x2F, 0x8D, 0x07, 0x1E, - 0xE9, 0x7E, 0x63, 0x4D, 0x73, 0xEE, 0x79, 0x6A, - 0xA6, 0x84, 0x4A, 0x22, 0xE7, 0x88, 0xBC, 0x59, - 0x83, 0x41, 0xCD, 0x16, 0x73, 0x7C, 0xE3, 0xC0, - 0xEF, 0x23, 0x8C, 0x7A, 0x24, 0x16, 0x3F, 0x77, - 0x72, 0x10, 0xCF, 0x32, 0x1F, 0x2E, 0x37, 0xED, - 0x1B, 0x90, 0xD4, 0x4C, 0x71, 0x4D, 0x81, 0xBD, - 0x36, 0x6B, 0x6A, 0x2E, 0x07, 0xAD, 0x32, 0x35, - 0x76, 0x67, 0x66, 0xE1, 0x76, 0x95, 0x2F, 0x0A, - 0xF3, 0xF7, 0xC3, 0x25, 0x3D, 0xDF, 0xA1, 0x89, - 0xC2, 0xC1, 0x15, 0x7C, 0xD6, 0xA0, 0x07, 0x14, - 0x7D, 0x81, 0x83, 0x3B, 0x96, 0xBA, 0x39, 0x57, - 0x01, - - 0x41, 0xC2, 0x86, 0x92, 0x97, 0xA5, 0x85, 0x6B, - 0xA6, 0xEC, 0x46, 0xB2, 0xA1, 0xF7, 0x9F, 0x4C, - 0x95, 0xA8, 0xEE, 0xE0, 0xB8, 0x83, 0x46, 0x6A, - 0xAD, 0x9C, 0xD1, 0x91, 0x42, 0xD8, 0x18, 0xC1, - 0xA9, 0x54, 0x1A, 0xCA, 0xA6, 0x66, 0xF7, 0xE2, - 0x9F, 0x82, 0x73, 0xE9, 0x17, 0x32, 0x23, 0x35, - 0x3E, 0x18, 0x5C, 0xAE, 0x59, 0xB7, 0x6A, 0x04, - 0x97, 0xD1, 0x1F, 0xB2, 0x58, 0xC9, 0x37, 0xFD, - 0xE0, 0xC5, 0xA4, 0x6C, 0x9A, 0x00, 0x9B, 0x4C, - 0x06, 0x32, 0xF4, 0xA3, 0x94, 0xBF, 0xA8, 0x49, - 0xFE, 0xC2, 0x45, 0xA8, 0xB5, 0x32, 0x86, 0x5F, - 0xBA, 0xFD, 0xD1, 0x60, 0x4D, 0xF1, 0x43, 0xE1, - 0x55, 0x75, 0xD8, 0xD6, 0x1F, 0xD5, 0x7F, 0x35, - 0x67, 0x39, 0x74, 0x9C, 0x3B, 0x50, 0xBE, 0xC0, - 0x67, 0xA1, 0x90, 0x0F, 0x90, 0x27, 0xAD, 0xB9, - 0x97, 0x0C, 0xBC, 0x2A, 0xEF, 0x4D, 0x8F, 0x69, - 0x08, 0x50, 0xBD, 0x69, 0xE9, 0x2B, 0xB3, 0x37, - 0xB5, 0x90, 0x81, 0x73, 0x63, 0x64, 0xE6, 0x6A, - 0xF0, 0xEF, 0xB1, 0xEC, 0x9C, 0x8B, 0x23, 0xE3, - 0xBA, 0xDD, 0x10, 0x1A, 0x0E, 0x6A, 0x76, 0x4C, - 0x58, 0xAF, 0x8C, 0x10, 0xDD, 0xFE, 0xCB, 0x82, - 0x53, 0x9A, - - 0xB5, 0x42, 0x48, 0x28, 0x65, 0x88, 0xE8, 0xB7, - 0xB6, 0xCD, 0xAB, 0x9B, 0x31, 0xFE, 0xEC, 0xD7, - 0xBF, 0x43, 0x1B, 0x30, 0x75, 0x57, 0x96, 0x3E, - 0x34, 0x5C, 0xAA, 0x37, 0x83, 0x1C, 0xA3, 0x08, - 0x88, 0x31, 0xA0, 0x96, 0x40, 0x50, 0x7D, 0x5C, - 0x26, 0x66, 0x8D, 0x71, 0x95, 0xE0, 0xB8, 0x83, - 0x90, 0x8D, 0x9B, 0xBF, 0x85, 0x67, 0x08, 0x88, - 0x9F, 0x96, 0xC4, 0x31, 0xEC, 0xED, 0x6E, 0x9A, - 0x7E, 0x62, 0x20, 0x9A, 0xD2, 0xC6, 0xEA, 0x6B, - 0x65, 0xB2, 0xC5, 0xBB, 0xD3, 0x82, 0xC0, 0x0D, - 0xF6, 0x37, 0x3F, 0xAB, 0x88, 0xFA, 0x7E, 0xFC, - 0x4D, 0xE4, 0x83, 0x32, 0x8F, 0x3A, 0xFF, 0xAC, - 0x12, 0x81, 0xFC, 0x49, 0x0E, 0xA6, 0x37, 0xA0, - 0xFC, 0x40, 0x47, 0x4B, 0x14, 0x42, 0xC0, 0x0B, - 0xE5, 0x2D, 0x26, 0x5C, 0x2B, 0x4D, 0x0C, 0xBE, - 0xC1, 0x63, 0x67, 0x75, 0xB4, 0x1D, 0xB3, 0x9D, - 0xAA, 0xD6, 0x7C, 0xC3, 0x53, 0xD5, 0x0F, 0xE7, - 0x7F, 0xFA, 0xC0, 0xB5, 0x93, 0xBE, 0x18, 0x40, - 0x3B, 0x71, 0x32, 0xF1, 0x0F, 0x78, 0x53, 0xA1, - 0x01, 0xC6, 0xF6, 0x60, 0xEA, 0x50, 0x3A, 0x62, - 0x30, 0xBD, 0x1E, 0xE1, 0x88, 0x7C, 0x30, 0x9F, - 0xE4, 0x8E, 0x3F, - - 0x2A, 0x34, 0xC2, 0x7C, 0xAA, 0x2B, 0xA1, 0xC0, - 0x1A, 0xF5, 0xA8, 0xBC, 0xB8, 0x1E, 0x17, 0x9D, - 0xE3, 0x4E, 0x65, 0xB4, 0x4E, 0x9A, 0xB7, 0x6C, - 0xDD, 0x1E, 0x86, 0xA0, 0x68, 0x4D, 0x83, 0xB7, - 0x06, 0xD3, 0x5E, 0xAC, 0xB0, 0x9F, 0x00, 0x00, - 0x62, 0xD2, 0xCD, 0x67, 0x0C, 0x2D, 0xA9, 0x25, - 0xC1, 0x6E, 0xA8, 0xB0, 0x0E, 0xCF, 0xD9, 0x1D, - 0x5D, 0x5A, 0x04, 0xD9, 0xEA, 0x3F, 0x57, 0xE1, - 0x25, 0x19, 0xF4, 0x9D, 0x3C, 0x7D, 0xE0, 0x65, - 0x98, 0xF2, 0xD1, 0x92, 0xCA, 0x8E, 0x97, 0x6B, - 0x61, 0x58, 0x2B, 0xB4, 0x2A, 0xB4, 0x7A, 0x2A, - 0xEC, 0x93, 0xC4, 0xCB, 0x54, 0x58, 0x96, 0xD1, - 0x9E, 0x90, 0xA2, 0x2E, 0xD8, 0x62, 0x89, 0x97, - 0x2B, 0x43, 0x29, 0x6C, 0xC8, 0x78, 0x5E, 0xB8, - 0x25, 0x9E, 0x23, 0x92, 0x6F, 0x32, 0xAF, 0x4B, - 0x13, 0x6E, 0x1F, 0xB5, 0x8B, 0x8F, 0x46, 0x80, - 0x40, 0xD6, 0x34, 0xD4, 0x0D, 0x23, 0xA6, 0x46, - 0x86, 0x22, 0x51, 0xCF, 0xF5, 0xB6, 0x7E, 0x0B, - 0xD3, 0xE8, 0xD5, 0xAE, 0x47, 0x2C, 0xD9, 0xDA, - 0x61, 0x81, 0x32, 0x0A, 0xAC, 0x32, 0x83, 0x0F, - 0x5D, 0x06, 0x15, 0x19, 0x2D, 0x4E, 0x13, 0x7A, - 0xEC, 0x91, 0xEC, 0xC8, - - 0xB0, 0x44, 0xEA, 0xAC, 0x35, 0x51, 0x2D, 0x29, - 0x50, 0x73, 0x14, 0xC6, 0x5A, 0x7B, 0x9F, 0xD2, - 0x75, 0xE5, 0xE0, 0xE7, 0x66, 0x8A, 0xCB, 0x54, - 0x1D, 0xC4, 0x8A, 0x25, 0x0C, 0x7D, 0xA1, 0xA1, - 0xBA, 0x4E, 0x24, 0xB6, 0xD1, 0xF8, 0x8A, 0x9E, - 0x49, 0xD7, 0xCA, 0x7C, 0x7D, 0x83, 0xDE, 0x3E, - 0xED, 0x6E, 0x26, 0x34, 0x57, 0x6F, 0x00, 0x55, - 0xB9, 0x44, 0x54, 0x82, 0x9B, 0x9A, 0x32, 0xDA, - 0xBB, 0x59, 0x48, 0x80, 0x08, 0x96, 0x2D, 0x34, - 0x68, 0x40, 0x27, 0xB9, 0x00, 0x80, 0xC6, 0x6F, - 0x42, 0x72, 0x3C, 0x9B, 0xD1, 0xA0, 0x01, 0xCC, - 0xD2, 0x0F, 0x33, 0x00, 0x15, 0x6A, 0x65, 0x9B, - 0xED, 0x91, 0xDF, 0x56, 0xE2, 0x81, 0x54, 0x06, - 0xA0, 0xFE, 0x0E, 0xE6, 0x54, 0x16, 0xC5, 0xA6, - 0x89, 0x54, 0x87, 0x7E, 0x49, 0x47, 0x6C, 0x29, - 0x0F, 0x1C, 0x9E, 0xF7, 0x62, 0x23, 0xEB, 0x17, - 0xC2, 0x7B, 0x0D, 0x8B, 0xA0, 0xEF, 0xCE, 0x03, - 0xDE, 0x8D, 0x58, 0x0C, 0x7B, 0x6A, 0xD7, 0x66, - 0x52, 0x6E, 0x93, 0x0C, 0x13, 0xDF, 0x65, 0x28, - 0x66, 0x38, 0xA9, 0x67, 0xE9, 0x22, 0x96, 0x71, - 0xD2, 0xB9, 0xA3, 0xE8, 0x61, 0x49, 0x20, 0x7C, - 0xD5, 0x5B, 0x49, 0xCF, 0x57, - - 0x4B, 0xA0, 0x49, 0xB0, 0xEE, 0xB4, 0xED, 0x67, - 0x08, 0x08, 0x9D, 0xBB, 0x9F, 0xD8, 0x79, 0xE8, - 0x42, 0x71, 0x81, 0xDA, 0x5E, 0x8D, 0x90, 0x1B, - 0x4C, 0x9E, 0x71, 0xCF, 0x46, 0xEB, 0xE7, 0x14, - 0x96, 0x98, 0xA5, 0xDB, 0xFA, 0x35, 0x99, 0x4C, - 0x40, 0x21, 0x5D, 0xF8, 0xB5, 0xC5, 0xAE, 0xE5, - 0x29, 0x68, 0x5F, 0x4A, 0xE9, 0x1D, 0x15, 0x55, - 0xF1, 0x4F, 0x74, 0xD4, 0x15, 0xB3, 0x7D, 0x9F, - 0x37, 0xC8, 0xC8, 0xAF, 0xF1, 0xF0, 0x8D, 0xC4, - 0xF8, 0x36, 0xF0, 0x7A, 0xB9, 0xE6, 0xB8, 0xA9, - 0x66, 0x10, 0xDF, 0xFE, 0x16, 0x7C, 0x8E, 0xDE, - 0x57, 0x0C, 0x75, 0xBF, 0x67, 0x8C, 0x39, 0x49, - 0xF1, 0x66, 0x1D, 0xF2, 0x0D, 0x6D, 0xBB, 0xB4, - 0xC3, 0xC7, 0xD7, 0xE1, 0xB3, 0xEB, 0xE2, 0x0C, - 0x69, 0x4E, 0xC3, 0x60, 0x5B, 0x2B, 0xD5, 0x71, - 0x1D, 0x33, 0xF6, 0x9D, 0xBC, 0xAE, 0x0C, 0x7E, - 0x3B, 0x75, 0x16, 0x73, 0x1D, 0xD5, 0xFA, 0x71, - 0x04, 0xA1, 0x76, 0xA8, 0xCF, 0xB2, 0xD1, 0x8D, - 0x00, 0x83, 0x47, 0x14, 0x28, 0x13, 0x22, 0xF6, - 0x2C, 0xF1, 0xCF, 0xC1, 0xB9, 0x8F, 0x18, 0x42, - 0x88, 0x28, 0x9B, 0x0D, 0xFF, 0xEA, 0x2D, 0xD3, - 0xF8, 0xC5, 0x26, 0x49, 0x67, 0xB4, - - 0x5A, 0xE7, 0x15, 0x4E, 0x9B, 0xC6, 0x57, 0xBD, - 0x13, 0x39, 0xD7, 0xDA, 0x9A, 0xBA, 0x06, 0xDA, - 0x73, 0xEC, 0x64, 0xBF, 0xF4, 0x29, 0xEB, 0x4D, - 0x6B, 0x9A, 0xA2, 0x0F, 0x77, 0x6F, 0xBC, 0x2B, - 0xC5, 0x3F, 0xE8, 0xF0, 0x5A, 0x46, 0x88, 0x3C, - 0x4F, 0xC0, 0x44, 0xE7, 0xAC, 0x89, 0xED, 0xF6, - 0xF3, 0xF2, 0xE1, 0xB7, 0x24, 0x75, 0xAB, 0x72, - 0xC1, 0x06, 0x0E, 0x5D, 0x02, 0x5E, 0x57, 0xA6, - 0xA3, 0x4E, 0x4A, 0xFE, 0x46, 0xF0, 0xB4, 0xDD, - 0x2F, 0xAB, 0xD6, 0xED, 0x49, 0x68, 0x6B, 0xE3, - 0x5D, 0xFF, 0x11, 0x67, 0xA0, 0x38, 0xD1, 0xB6, - 0x6E, 0x98, 0x61, 0x88, 0xA5, 0x60, 0x3E, 0x74, - 0xFB, 0xF6, 0x47, 0x5D, 0xB4, 0xB0, 0x1F, 0xB0, - 0xD0, 0xE8, 0x7B, 0xB7, 0xD4, 0x7D, 0xA1, 0xAF, - 0xD5, 0xD8, 0x5B, 0x83, 0xDF, 0x82, 0x29, 0xA8, - 0xB1, 0x50, 0x2A, 0x06, 0xA6, 0xC0, 0x4C, 0xC0, - 0x96, 0xA4, 0xDB, 0x95, 0x61, 0x19, 0x4E, 0x1E, - 0xB8, 0x79, 0x45, 0x48, 0xCA, 0x22, 0xFD, 0x20, - 0x9E, 0x0E, 0xE1, 0xD7, 0x28, 0x00, 0x16, 0x50, - 0x42, 0xE4, 0x72, 0xB0, 0x61, 0x41, 0xA4, 0x93, - 0x9D, 0xB9, 0x0D, 0x7F, 0x2F, 0xBB, 0xD3, 0x89, - 0xA1, 0xBB, 0xCF, 0xE6, 0xE0, 0x09, 0x52, - - 0x0B, 0x8D, 0x85, 0x02, 0x46, 0xFB, 0x2D, 0x5A, - 0x4A, 0xB7, 0xC1, 0x3A, 0x8C, 0x4D, 0xA0, 0xBD, - 0x43, 0x52, 0xE1, 0x83, 0xA5, 0x6C, 0x78, 0x10, - 0xC1, 0xF1, 0xDF, 0x77, 0x66, 0x2C, 0x30, 0x82, - 0x12, 0x06, 0xBD, 0x79, 0x0A, 0xBD, 0x80, 0x92, - 0xF2, 0xCF, 0xB3, 0x50, 0xF7, 0x3A, 0x80, 0xE2, - 0xE5, 0xB6, 0xC8, 0x65, 0xFF, 0xB9, 0x75, 0x84, - 0x89, 0xB3, 0x63, 0x75, 0xA8, 0xA1, 0x45, 0x3E, - 0x46, 0x97, 0x4A, 0x09, 0xFF, 0xAC, 0x5B, 0xF9, - 0x25, 0x79, 0x49, 0x70, 0xA8, 0x87, 0x95, 0x8D, - 0x59, 0x2F, 0x27, 0x85, 0x02, 0x78, 0x30, 0x9F, - 0x72, 0xDB, 0x11, 0x88, 0x85, 0x09, 0xD4, 0x4B, - 0x71, 0x39, 0xF4, 0x68, 0xFB, 0x40, 0x63, 0x71, - 0xAA, 0xFC, 0x6C, 0xE3, 0x2A, 0xF1, 0x45, 0xF4, - 0xE8, 0x0E, 0x8E, 0xF4, 0xA3, 0xC9, 0x37, 0xA0, - 0xEF, 0xDE, 0x9C, 0x92, 0x42, 0x36, 0x95, 0x30, - 0x0A, 0x9A, 0x06, 0xB8, 0xEB, 0x5C, 0xE2, 0x85, - 0x40, 0x7C, 0x2A, 0xBD, 0xC6, 0x63, 0xCE, 0xBB, - 0x20, 0xC0, 0x1F, 0xE1, 0x5B, 0xDD, 0xD9, 0x62, - 0x2D, 0x30, 0x79, 0xBB, 0x49, 0x65, 0x2A, 0x12, - 0x82, 0x7A, 0x8D, 0x2F, 0xFC, 0xF7, 0xB4, 0x17, - 0x1B, 0x69, 0x5B, 0x90, 0x6D, 0x07, 0x0D, 0x5B, - - 0x99, 0x09, 0x0A, 0xFD, 0xC2, 0x22, 0x9F, 0x2B, - 0x4E, 0xD3, 0x2E, 0x38, 0x10, 0x2F, 0x9D, 0xD4, - 0x5E, 0xFC, 0x93, 0x77, 0x7B, 0x8D, 0xD3, 0xB9, - 0x5E, 0x1C, 0x17, 0x29, 0x4D, 0x0A, 0xA9, 0x5D, - 0x3E, 0xA9, 0x59, 0xD9, 0xBA, 0xF9, 0x5B, 0x21, - 0xF8, 0x59, 0xA8, 0xD5, 0x5C, 0x7E, 0x01, 0xDA, - 0xE5, 0x4F, 0x81, 0x1C, 0xD7, 0x63, 0x16, 0xA4, - 0x2D, 0xE6, 0xFA, 0xAA, 0x18, 0x8C, 0x87, 0xF7, - 0xF2, 0x7C, 0x38, 0x0C, 0x08, 0xD6, 0xA4, 0x1E, - 0x61, 0x19, 0xE7, 0xE9, 0x5B, 0x7C, 0x8F, 0x1A, - 0xB6, 0x4B, 0x7E, 0x78, 0x12, 0x22, 0xF4, 0xCA, - 0x59, 0xAE, 0x69, 0xC7, 0x22, 0x1D, 0xF6, 0xBB, - 0xFC, 0xEF, 0x70, 0x47, 0x0E, 0x5F, 0x85, 0x75, - 0x26, 0xA9, 0x07, 0xFA, 0x6C, 0x59, 0x67, 0x14, - 0x0B, 0x86, 0xCD, 0xA4, 0x84, 0xD9, 0xB1, 0xCF, - 0xC4, 0x26, 0x40, 0x55, 0x3E, 0xFA, 0x5F, 0x08, - 0x0A, 0x89, 0x56, 0x6F, 0x3A, 0xFF, 0xE4, 0x46, - 0x63, 0x93, 0xB9, 0xDE, 0x2C, 0x57, 0x26, 0x96, - 0x38, 0x03, 0x01, 0x80, 0x02, 0x44, 0xBA, 0x96, - 0x20, 0x7C, 0x7C, 0x76, 0x1C, 0x0C, 0x0D, 0x72, - 0x56, 0x28, 0xFD, 0x9F, 0xCB, 0xD5, 0xEE, 0x92, - 0x61, 0x5C, 0x6F, 0x0A, 0x70, 0xBA, 0xD3, 0xFB, - 0xD5, - - 0x79, 0xFE, 0xFA, 0xEB, 0xF2, 0x35, 0xB1, 0x0C, - 0x46, 0x53, 0x2E, 0x26, 0xCE, 0x1A, 0x6E, 0x36, - 0xD0, 0xD1, 0x4C, 0x2B, 0x55, 0x02, 0x8C, 0x39, - 0xA4, 0xC4, 0x14, 0x9B, 0x05, 0x83, 0x80, 0x8A, - 0xE6, 0x05, 0x7E, 0x0A, 0xE9, 0x1A, 0xBC, 0xBD, - 0xAE, 0xDE, 0xCF, 0x33, 0xC4, 0xAB, 0x10, 0x66, - 0x52, 0x56, 0x4D, 0xEA, 0xBD, 0xE2, 0xDA, 0xC8, - 0x77, 0x1D, 0x26, 0x8C, 0xD5, 0x9A, 0x01, 0xFD, - 0xFB, 0x49, 0x89, 0xB8, 0xE1, 0xD0, 0x48, 0x49, - 0x44, 0x23, 0xE2, 0xEF, 0x11, 0x74, 0x67, 0x5E, - 0x14, 0x01, 0x15, 0xEC, 0x39, 0x9B, 0x0A, 0x69, - 0x7C, 0x87, 0xC2, 0xE9, 0x58, 0x05, 0xDE, 0x15, - 0xA2, 0x71, 0x50, 0x73, 0x12, 0x5E, 0x5B, 0x87, - 0x6E, 0xAE, 0xD3, 0x8F, 0x95, 0xE9, 0x77, 0xEF, - 0x2F, 0xD3, 0x63, 0x5B, 0x40, 0xBB, 0xDD, 0xF0, - 0x01, 0x08, 0x7A, 0x5C, 0x92, 0xB6, 0x37, 0xC9, - 0xEB, 0x84, 0x07, 0x65, 0x92, 0xFC, 0xC6, 0xB3, - 0x68, 0x37, 0xED, 0x62, 0xD1, 0x70, 0xD4, 0xBD, - 0x28, 0xD3, 0x46, 0x94, 0x63, 0xD9, 0x56, 0xBE, - 0x93, 0xEC, 0x8A, 0x01, 0xB5, 0xBD, 0xC6, 0x9B, - 0x75, 0x08, 0x06, 0x08, 0xF1, 0xFB, 0x3F, 0xB0, - 0x3E, 0x18, 0x35, 0xF3, 0xFA, 0x85, 0x1A, 0xA7, - 0x9A, 0x8E, - - 0x17, 0x73, 0x8A, 0x98, 0x3B, 0x5B, 0xAD, 0x53, - 0x01, 0x84, 0x65, 0x88, 0xB4, 0x47, 0x4D, 0xC8, - 0x8C, 0x13, 0x47, 0x75, 0xB5, 0x03, 0x43, 0x64, - 0xE5, 0x8D, 0x56, 0xC1, 0xC0, 0x85, 0xE8, 0x25, - 0xE7, 0x2F, 0xC1, 0x98, 0x58, 0xE7, 0x2D, 0xD7, - 0x4D, 0x2B, 0xE0, 0x2D, 0x87, 0x67, 0x72, 0x7E, - 0xA1, 0xAE, 0xF3, 0x86, 0x88, 0xE4, 0x69, 0x23, - 0x30, 0x27, 0xA3, 0x48, 0xDC, 0xA0, 0x67, 0xCC, - 0x54, 0x31, 0xB2, 0xB7, 0x24, 0x23, 0xB9, 0x4A, - 0x5A, 0x07, 0x65, 0x4C, 0x2D, 0x5A, 0x9A, 0x4E, - 0xB4, 0xA6, 0x70, 0xFF, 0x69, 0x3E, 0xD2, 0xC9, - 0x55, 0x2E, 0x4F, 0xC4, 0x2F, 0x1F, 0x89, 0x98, - 0x76, 0x45, 0x5F, 0xBD, 0x3A, 0x8C, 0xB6, 0x55, - 0x93, 0xB0, 0xA7, 0x4E, 0x75, 0xBD, 0x7D, 0x25, - 0x08, 0x8C, 0xAD, 0x13, 0x33, 0x24, 0x57, 0xA9, - 0x1C, 0x44, 0x71, 0x86, 0x7E, 0xC4, 0xC4, 0x1C, - 0x5B, 0x1E, 0x83, 0x37, 0x1B, 0x37, 0x98, 0x9A, - 0xB4, 0xDC, 0xA1, 0xC2, 0x1A, 0x69, 0x89, 0xE1, - 0xD9, 0x67, 0x41, 0x58, 0x72, 0x6A, 0xF8, 0x22, - 0x69, 0xEA, 0x53, 0xF5, 0x3C, 0x5E, 0x53, 0x5D, - 0x98, 0x9A, 0x2A, 0xDA, 0xF6, 0x30, 0xA0, 0xBA, - 0xCE, 0xF8, 0xB7, 0x4D, 0xE2, 0xBF, 0x05, 0xAA, - 0xF7, 0x44, 0x84, - - 0x97, 0xDD, 0xB6, 0xB9, 0xD3, 0xA3, 0x8A, 0x20, - 0x05, 0x15, 0xD1, 0x14, 0x69, 0x33, 0x98, 0xFF, - 0x77, 0xDA, 0x47, 0x11, 0xC3, 0x59, 0x19, 0xFB, - 0x86, 0xEE, 0x3A, 0xB9, 0x4F, 0x61, 0x07, 0x6C, - 0x7B, 0x01, 0x89, 0x87, 0x1E, 0xA0, 0xBB, 0x34, - 0x60, 0x89, 0xAA, 0xE9, 0xE5, 0x03, 0xE4, 0xF7, - 0xA7, 0x16, 0xD0, 0xA9, 0x08, 0x3F, 0xA1, 0x25, - 0x57, 0xB4, 0xAD, 0x52, 0x80, 0x53, 0xB3, 0x3B, - 0x58, 0x58, 0x96, 0x37, 0x25, 0xEB, 0x08, 0xD9, - 0x63, 0xFA, 0x1F, 0xC8, 0x92, 0xF0, 0x50, 0x0D, - 0xAE, 0xFB, 0x16, 0x2E, 0xA7, 0xB1, 0x1E, 0x71, - 0x46, 0xCE, 0xE6, 0xA9, 0x4B, 0x67, 0xAC, 0xD8, - 0xC7, 0x01, 0x18, 0xA0, 0x83, 0xD5, 0xBA, 0xA9, - 0x94, 0xCD, 0x2C, 0x8C, 0x90, 0x86, 0xE9, 0x80, - 0x3E, 0x94, 0x0B, 0x0C, 0xDD, 0xF0, 0xB8, 0xFE, - 0x29, 0x9D, 0x9F, 0xAB, 0x16, 0xE6, 0x08, 0x12, - 0x67, 0x29, 0x45, 0x57, 0x4D, 0xB9, 0x08, 0xF3, - 0x44, 0x4E, 0x5C, 0x9C, 0x92, 0x69, 0xF6, 0x41, - 0x90, 0x17, 0x92, 0xF5, 0x1B, 0x8B, 0xBB, 0x89, - 0x2E, 0x3A, 0x7F, 0xAF, 0x82, 0x59, 0xA4, 0x94, - 0x53, 0x40, 0xF5, 0x6A, 0x2A, 0xF5, 0xA8, 0x4F, - 0x48, 0x2D, 0x01, 0x61, 0x6A, 0x98, 0xFD, 0xF8, - 0xBC, 0x46, 0xFC, 0x6F, - - 0x2F, 0x20, 0x5D, 0x1C, 0xAC, 0x77, 0x49, 0x4E, - 0x6A, 0x21, 0x43, 0x6D, 0x67, 0x9C, 0xF6, 0x87, - 0xC9, 0xAF, 0x8B, 0x58, 0xF0, 0xCB, 0x8B, 0x9C, - 0x41, 0x7D, 0x77, 0x66, 0xFF, 0x9D, 0x6D, 0xA5, - 0x23, 0xAC, 0x7E, 0x35, 0x18, 0xC1, 0x8E, 0x96, - 0x5F, 0x9B, 0xD8, 0xDF, 0xEA, 0xA1, 0x1A, 0x4E, - 0xE5, 0x43, 0x6E, 0x05, 0xE7, 0xBF, 0x0B, 0x81, - 0xD5, 0x73, 0x6C, 0x37, 0x43, 0x82, 0xF4, 0x40, - 0x8F, 0x6E, 0xA2, 0x7B, 0xEC, 0x28, 0x7B, 0xD5, - 0xA1, 0xCB, 0x38, 0xF1, 0x62, 0x5F, 0xCC, 0xCF, - 0xB5, 0x87, 0x38, 0x03, 0x5D, 0x1E, 0xC9, 0x01, - 0x4C, 0xE1, 0x97, 0xD7, 0xC5, 0x92, 0xE2, 0xEB, - 0x5B, 0x49, 0xC3, 0xB9, 0xB9, 0x9D, 0x16, 0x8D, - 0x54, 0x57, 0xB7, 0x08, 0xA9, 0xF2, 0x1E, 0x2B, - 0x6B, 0x8C, 0x0C, 0x1E, 0xD6, 0x8D, 0x0E, 0xA6, - 0x51, 0xB5, 0xC7, 0x02, 0xC1, 0x34, 0x92, 0x95, - 0x8A, 0xEA, 0xF3, 0xCD, 0x37, 0x54, 0x09, 0x74, - 0x47, 0x04, 0x93, 0x73, 0xD9, 0x91, 0x31, 0x33, - 0x91, 0x4E, 0xF5, 0x08, 0x0A, 0x8A, 0x50, 0x15, - 0x9F, 0x08, 0x36, 0xC5, 0x74, 0xEF, 0x2B, 0xD2, - 0x1E, 0x05, 0xD1, 0xB7, 0x2E, 0x57, 0x3B, 0x25, - 0x0F, 0x91, 0x65, 0x48, 0xEB, 0x2F, 0xF3, 0xDB, - 0xF8, 0xE2, 0x7B, 0xAF, 0x93, - - 0xB0, 0xC5, 0x54, 0xAD, 0x36, 0x9B, 0x5C, 0x03, - 0x86, 0x9C, 0x35, 0x73, 0xD5, 0xF9, 0x0F, 0x5F, - 0xEF, 0x3A, 0xFF, 0x73, 0x9E, 0xC4, 0xDB, 0x64, - 0x4F, 0x3E, 0xEF, 0xD2, 0x32, 0x5A, 0x7F, 0xA5, - 0xBF, 0x2C, 0x81, 0x00, 0xBB, 0xFA, 0x5F, 0x98, - 0x86, 0x71, 0x26, 0x39, 0x8F, 0xB7, 0x84, 0x38, - 0x9D, 0xE4, 0xF7, 0x99, 0x21, 0xB9, 0x0D, 0xF7, - 0x6F, 0x7F, 0xB8, 0x68, 0x8F, 0x7E, 0x7E, 0x4F, - 0xA7, 0x15, 0x2A, 0x82, 0xFC, 0x60, 0xCF, 0x70, - 0xE9, 0x86, 0xBD, 0x24, 0xA1, 0xBA, 0x30, 0xB2, - 0x70, 0x66, 0xBC, 0x6F, 0x1C, 0x39, 0x94, 0xB5, - 0x81, 0x3C, 0x54, 0x98, 0x3C, 0x82, 0xE3, 0xF8, - 0x6D, 0x3C, 0x1B, 0x5A, 0x7A, 0x81, 0x7A, 0x29, - 0xEF, 0x48, 0x3B, 0x35, 0x3F, 0x73, 0xF0, 0x05, - 0x12, 0xB6, 0xC9, 0x2D, 0xDA, 0xCB, 0x81, 0xBD, - 0xEE, 0x8F, 0x8E, 0xE7, 0x06, 0x8D, 0xD2, 0x76, - 0x39, 0x60, 0xF2, 0x57, 0xD6, 0xE5, 0xFC, 0x81, - 0x14, 0x49, 0xB4, 0x6B, 0x06, 0x6E, 0x33, 0xDC, - 0x2C, 0x2F, 0x4E, 0x15, 0xC8, 0xC2, 0x41, 0x95, - 0xA8, 0x65, 0x59, 0xCA, 0x97, 0xD8, 0xA0, 0x4A, - 0x1F, 0xCA, 0x35, 0xC5, 0x21, 0xBD, 0x51, 0x29, - 0x2B, 0x0A, 0x1B, 0x37, 0x4C, 0xF7, 0xAA, 0x88, - 0xDF, 0x44, 0x88, 0x05, 0x2F, 0x4B, - - 0x50, 0xDC, 0xA7, 0x8B, 0xED, 0x47, 0x10, 0x06, - 0x63, 0xCB, 0x7D, 0x5B, 0xE6, 0xB0, 0xED, 0x90, - 0x55, 0xF0, 0x38, 0x3C, 0x80, 0x34, 0x2B, 0x62, - 0x92, 0xC5, 0x61, 0x0D, 0xEC, 0x0E, 0xD3, 0xEA, - 0xD6, 0x81, 0xB8, 0x4D, 0xC6, 0x3E, 0xC5, 0x19, - 0x70, 0x31, 0x0F, 0x2C, 0x65, 0x07, 0x0F, 0x43, - 0x2F, 0xA0, 0x63, 0xD7, 0xFB, 0x9B, 0xD1, 0xA9, - 0x60, 0x3C, 0xFE, 0x4E, 0x09, 0xAF, 0xC7, 0x04, - 0x4A, 0xE6, 0x75, 0x18, 0xF6, 0x53, 0x87, 0x91, - 0xD6, 0x33, 0x15, 0x9C, 0x32, 0xA0, 0x52, 0x82, - 0xC7, 0xF9, 0x17, 0x9C, 0x58, 0x2C, 0xBC, 0x75, - 0x88, 0x1B, 0x7D, 0x71, 0xC3, 0xCC, 0xFE, 0x60, - 0x08, 0xDD, 0xB0, 0x5F, 0x45, 0x49, 0x08, 0x91, - 0xF6, 0x42, 0x97, 0x85, 0xBB, 0xF7, 0x04, 0xAB, - 0xFF, 0xB6, 0xB6, 0x37, 0xA3, 0xA8, 0x1D, 0x41, - 0x52, 0x9F, 0x47, 0xC2, 0xD4, 0xE1, 0x32, 0x22, - 0x26, 0xF5, 0x26, 0x0A, 0x03, 0xD5, 0xDD, 0x37, - 0x95, 0xBB, 0xC0, 0xEF, 0x4C, 0x61, 0xC9, 0x87, - 0x43, 0x88, 0x22, 0xE9, 0x5F, 0x30, 0x0A, 0x64, - 0x73, 0xF3, 0x2F, 0xD2, 0x4D, 0xE8, 0x91, 0x1C, - 0x68, 0xBE, 0x35, 0xC3, 0xF4, 0xC4, 0xD3, 0xD2, - 0x01, 0xB2, 0x19, 0x28, 0x30, 0x86, 0xD9, 0xFC, - 0x16, 0x4A, 0x0E, 0xCC, 0xCA, 0xD6, 0xF6, - - 0x74, 0xAF, 0x14, 0xA0, 0x6E, 0x50, 0x25, 0x74, - 0x8F, 0xC7, 0x16, 0x03, 0x56, 0x10, 0x01, 0x76, - 0x5B, 0x63, 0xD0, 0xEF, 0x4E, 0xA7, 0x59, 0x27, - 0x43, 0x0C, 0x3F, 0x8C, 0xFD, 0xB6, 0x09, 0x17, - 0x81, 0xD7, 0xEC, 0x94, 0x50, 0x4B, 0xC8, 0x22, - 0x3F, 0x82, 0x11, 0xA1, 0x58, 0x8C, 0x23, 0xBB, - 0x8B, 0xFB, 0x4F, 0x34, 0x31, 0x98, 0x63, 0x1B, - 0xC4, 0x8E, 0xCF, 0x12, 0x57, 0x68, 0x14, 0x2B, - 0x23, 0xA9, 0x9D, 0x17, 0x84, 0x2A, 0x53, 0xE7, - 0x67, 0x5A, 0xC1, 0x6E, 0x65, 0x25, 0x70, 0x25, - 0x76, 0x70, 0x30, 0x24, 0x85, 0xF8, 0x1F, 0x9D, - 0xFD, 0x8D, 0x84, 0xAD, 0x33, 0x07, 0xFD, 0x21, - 0x01, 0x13, 0xC0, 0x14, 0x20, 0xF2, 0xDC, 0x81, - 0x21, 0xEF, 0x3A, 0xCB, 0x32, 0x23, 0xB2, 0x76, - 0x3B, 0xA4, 0x30, 0xB6, 0x8F, 0x90, 0xE3, 0x20, - 0x4C, 0x81, 0x6A, 0xF4, 0x2C, 0xC3, 0x4C, 0x86, - 0x08, 0x86, 0x1E, 0x31, 0x48, 0x55, 0x7E, 0xF2, - 0xA7, 0xF5, 0xC6, 0x22, 0x19, 0x87, 0xE5, 0x6E, - 0xA6, 0xC5, 0x31, 0xF6, 0x1D, 0xA4, 0xD8, 0x75, - 0x90, 0x1C, 0x57, 0x01, 0xF5, 0xE8, 0x53, 0x3E, - 0x0A, 0x16, 0xDD, 0x40, 0x58, 0x0C, 0xE0, 0x8F, - 0xBF, 0x57, 0xFA, 0x1D, 0x37, 0x15, 0xC6, 0x63, - 0xC1, 0x57, 0x0C, 0x6D, 0x83, 0x6C, 0xA4, 0x0E, - - 0x6A, 0x33, 0x55, 0x52, 0x04, 0x3E, 0x41, 0x83, - 0x22, 0xED, 0x2A, 0xAC, 0x33, 0xEF, 0xA6, 0xA9, - 0x8E, 0x21, 0x9D, 0x2B, 0xFB, 0x20, 0x80, 0x22, - 0x0F, 0x7A, 0xB4, 0x67, 0xFF, 0x76, 0xFA, 0x1D, - 0x1B, 0x26, 0xF9, 0xD4, 0x3A, 0x66, 0x99, 0x4C, - 0xFD, 0x45, 0x61, 0x96, 0x02, 0x3F, 0xD3, 0x13, - 0xE4, 0x44, 0x30, 0x30, 0x6B, 0x76, 0x77, 0xEA, - 0x66, 0x69, 0x1B, 0x82, 0xE6, 0xA2, 0x50, 0x69, - 0xFD, 0x5D, 0xAD, 0x59, 0x82, 0x94, 0xA1, 0xF3, - 0x78, 0x5B, 0x00, 0x7B, 0x6E, 0xE9, 0xA2, 0xB9, - 0xB4, 0x56, 0xF9, 0xD5, 0x5C, 0x42, 0x89, 0xA5, - 0x7E, 0x86, 0xFE, 0x61, 0x6C, 0xF1, 0x0A, 0xFC, - 0xC9, 0x7D, 0x9C, 0xF0, 0xE7, 0x7F, 0xFE, 0xCD, - 0x85, 0xEC, 0x68, 0x68, 0xC5, 0x6F, 0x06, 0x35, - 0x4B, 0xA6, 0x15, 0xF8, 0x38, 0xF5, 0x1B, 0x56, - 0x20, 0x75, 0xCE, 0xA4, 0xCB, 0x5F, 0x60, 0x96, - 0xE7, 0xEF, 0x71, 0x1B, 0x1D, 0xF5, 0xD1, 0x96, - 0xA1, 0x9C, 0x64, 0xFA, 0x2F, 0x88, 0x9C, 0x87, - 0x53, 0xC5, 0x08, 0xE5, 0x93, 0xD0, 0x6E, 0xDB, - 0xA1, 0x84, 0x1C, 0x49, 0x79, 0x38, 0x48, 0xDD, - 0x6B, 0xD0, 0x80, 0x52, 0x51, 0x4A, 0x96, 0x9C, - 0x4A, 0x48, 0xB3, 0x9B, 0x86, 0x2F, 0xDC, 0x32, - 0x34, 0x27, 0x04, 0xAB, 0x37, 0xB2, 0x50, 0x6C, - 0xB8, - - 0x86, 0x42, 0xAF, 0x92, 0x97, 0x70, 0x4B, 0x6A, - 0xC3, 0x85, 0x01, 0xE0, 0xFE, 0x10, 0x0A, 0x58, - 0xD8, 0xF8, 0x1F, 0x0C, 0xA0, 0xF3, 0x41, 0x40, - 0x1F, 0x90, 0x54, 0x07, 0x52, 0x34, 0x2C, 0xC8, - 0x20, 0x3A, 0xA5, 0x1D, 0x12, 0x59, 0xC5, 0xCA, - 0x3F, 0x60, 0x7E, 0x9F, 0xB0, 0xB3, 0x66, 0x99, - 0x67, 0xD6, 0x0B, 0x05, 0x54, 0xB5, 0xE3, 0x7E, - 0xC6, 0x97, 0xF3, 0xD5, 0xC0, 0x73, 0xE9, 0xE2, - 0x70, 0x20, 0x78, 0x15, 0x74, 0x2F, 0x19, 0xCC, - 0x0F, 0xA9, 0xCC, 0xE1, 0xAE, 0x60, 0x6A, 0x05, - 0x97, 0xE4, 0x5A, 0x6F, 0xF9, 0xB6, 0x40, 0x31, - 0xE1, 0x41, 0xF2, 0x72, 0x3E, 0xB2, 0xEB, 0x78, - 0x33, 0x7E, 0x0A, 0xB4, 0x39, 0xE3, 0xEE, 0x99, - 0x17, 0x6C, 0x2F, 0x2F, 0xA8, 0x3C, 0x2C, 0xFC, - 0x70, 0x53, 0x53, 0x14, 0x82, 0x62, 0xCA, 0x55, - 0x23, 0x20, 0xFF, 0x7F, 0xC5, 0xE9, 0x28, 0xB9, - 0xA2, 0x15, 0x82, 0x6B, 0xED, 0x1C, 0xBB, 0xD6, - 0x74, 0x8E, 0xE5, 0x2F, 0x54, 0x97, 0x05, 0xAB, - 0x88, 0xF8, 0x6E, 0x5E, 0x45, 0x52, 0x61, 0x3B, - 0xCD, 0x9F, 0x3E, 0xE0, 0x43, 0x30, 0x37, 0x73, - 0x50, 0xE3, 0x21, 0x29, 0xAA, 0x48, 0x7B, 0xDE, - 0x50, 0x2B, 0xBC, 0x34, 0xBF, 0xB3, 0x0F, 0xF7, - 0xCB, 0x78, 0x4B, 0xDE, 0x7B, 0x1D, 0xAC, 0xFC, - 0xEB, 0x03, - - 0x76, 0xD3, 0x4B, 0xE8, 0x19, 0x32, 0xEE, 0xA7, - 0xD5, 0x21, 0xE4, 0xFF, 0x60, 0x32, 0xED, 0xE4, - 0x6D, 0xC3, 0xE2, 0xA4, 0xD2, 0xEC, 0x0B, 0x41, - 0x8E, 0xF2, 0xE3, 0x83, 0x84, 0x18, 0xE5, 0xF4, - 0xBA, 0xE7, 0x17, 0xED, 0xF7, 0xF6, 0xC8, 0x6C, - 0xA9, 0xC7, 0xF7, 0x23, 0x9E, 0x0F, 0xEC, 0x4C, - 0x51, 0x20, 0xB8, 0xEF, 0x02, 0xCC, 0xFF, 0xBB, - 0xDE, 0x1C, 0x47, 0x8A, 0xAB, 0x2D, 0xDF, 0xF6, - 0x86, 0x0B, 0xC8, 0xFB, 0xDE, 0x24, 0x64, 0x1F, - 0x99, 0x4F, 0x44, 0xC9, 0x78, 0x45, 0xD2, 0x2A, - 0x7A, 0x3B, 0x1C, 0xC5, 0xD8, 0x87, 0x29, 0xEB, - 0x5E, 0x02, 0x12, 0x93, 0xF7, 0xED, 0x21, 0xFF, - 0x50, 0xDB, 0xD9, 0xD4, 0x0B, 0x1C, 0xC9, 0x1D, - 0xF2, 0x1F, 0x9C, 0x93, 0x2F, 0xDA, 0x90, 0xB0, - 0xF9, 0x25, 0x4F, 0x25, 0xE7, 0x64, 0xB4, 0xD6, - 0x78, 0xB3, 0x68, 0xD8, 0x46, 0xCF, 0xE4, 0xC7, - 0x15, 0x28, 0xC2, 0x34, 0x6E, 0xB2, 0x4F, 0x12, - 0xD2, 0x89, 0xDE, 0x77, 0xDA, 0x58, 0x40, 0x62, - 0x8B, 0x55, 0xF7, 0x80, 0x82, 0x3C, 0xC3, 0xAC, - 0x7C, 0xF4, 0x2E, 0xDD, 0xC4, 0x70, 0x52, 0x63, - 0x17, 0x7F, 0x44, 0xF7, 0x65, 0x59, 0x3D, 0x91, - 0x95, 0x18, 0xB0, 0xA4, 0xA0, 0xAF, 0x52, 0x3A, - 0xD3, 0xC0, 0xDD, 0x0C, 0x00, 0xC1, 0xD7, 0xA6, - 0x1D, 0x5E, 0x35, - - 0xC5, 0x4F, 0x57, 0x22, 0xF0, 0xE2, 0x42, 0xEE, - 0x03, 0x5C, 0xDE, 0x88, 0x0A, 0x6E, 0xEB, 0xA4, - 0x41, 0xEF, 0x55, 0x9D, 0x37, 0x21, 0xAE, 0x2A, - 0xA9, 0x9D, 0x92, 0xDC, 0xCF, 0x5F, 0xD3, 0x28, - 0x23, 0x5D, 0x22, 0xDB, 0x89, 0x31, 0x4D, 0x60, - 0x08, 0x92, 0x78, 0x3A, 0x5D, 0xAE, 0x91, 0x1A, - 0x93, 0xCD, 0x4D, 0x62, 0x40, 0xA2, 0x18, 0x1A, - 0x6B, 0xCE, 0x34, 0x0D, 0x3B, 0x09, 0xC6, 0xE6, - 0x3F, 0x1B, 0x88, 0x19, 0x14, 0x29, 0xAD, 0x75, - 0x06, 0x1B, 0xD9, 0xE2, 0xEC, 0xE7, 0x1B, 0xC9, - 0x7A, 0xD3, 0x18, 0x86, 0xE7, 0x36, 0xAD, 0x21, - 0x7D, 0xA2, 0xDC, 0x1C, 0x97, 0xBA, 0xB2, 0xCB, - 0x59, 0x19, 0x7D, 0x20, 0xC5, 0x68, 0xB8, 0xBD, - 0x51, 0x49, 0x5B, 0x45, 0xAB, 0x47, 0x33, 0x63, - 0xA2, 0xEC, 0x4C, 0x2D, 0x69, 0x91, 0x27, 0x86, - 0x72, 0x28, 0xDB, 0x96, 0x55, 0x5D, 0x1A, 0x2F, - 0x7E, 0x5D, 0xC6, 0x0A, 0x69, 0xAB, 0x8C, 0x8B, - 0x36, 0x87, 0xB4, 0x1A, 0x15, 0xE4, 0x68, 0x21, - 0xDB, 0x65, 0x87, 0xBA, 0x24, 0xBD, 0x1F, 0xFA, - 0x5C, 0x4B, 0x48, 0x21, 0x83, 0xD8, 0x04, 0x50, - 0x31, 0x83, 0xF7, 0x21, 0xC5, 0xA8, 0xA9, 0x8A, - 0x5E, 0xC6, 0x1C, 0x40, 0x8E, 0x29, 0xB3, 0xF2, - 0xA8, 0x86, 0xED, 0x60, 0xCA, 0xF8, 0x24, 0x7F, - 0x09, 0xAE, 0x36, 0x3F, - - 0x6D, 0x99, 0x39, 0x36, 0xA1, 0x3E, 0x29, 0x65, - 0x55, 0xA1, 0x90, 0x10, 0xB5, 0x49, 0x64, 0xE3, - 0x09, 0xB2, 0xDB, 0x65, 0xF1, 0x5E, 0x05, 0x1E, - 0x0E, 0x6A, 0x8C, 0x38, 0xDF, 0xE1, 0xB8, 0x87, - 0x15, 0x2C, 0xCB, 0x4D, 0xD7, 0x44, 0xDB, 0x3B, - 0x80, 0xA2, 0xEA, 0x9A, 0x7A, 0xA8, 0x39, 0xE2, - 0x33, 0xFC, 0x40, 0xCD, 0x92, 0xB8, 0x62, 0x1D, - 0x9E, 0xC7, 0x65, 0x65, 0x3C, 0x24, 0x6A, 0x77, - 0x11, 0xA5, 0xEE, 0x86, 0x19, 0x5E, 0xCF, 0x01, - 0xF7, 0x74, 0x64, 0xAA, 0xDF, 0xD3, 0x0B, 0x54, - 0xF8, 0xEB, 0x9F, 0xE5, 0x3B, 0x9B, 0x3A, 0xCB, - 0x36, 0x65, 0xA6, 0xD3, 0x8B, 0x5D, 0xD3, 0x55, - 0xC4, 0xD6, 0x26, 0x46, 0x5D, 0x66, 0x4E, 0xEB, - 0x7F, 0xB3, 0x1F, 0x36, 0x12, 0x92, 0x50, 0xF4, - 0xE3, 0x2B, 0x90, 0x32, 0xFF, 0x56, 0x90, 0x81, - 0xC3, 0x52, 0x7A, 0x26, 0x67, 0xA5, 0x4E, 0xC1, - 0x3B, 0xB9, 0x44, 0x4B, 0x6F, 0x96, 0xD7, 0xD4, - 0xE9, 0x67, 0x10, 0x36, 0xD8, 0xAB, 0xC3, 0x0C, - 0x17, 0xCF, 0xC1, 0x38, 0xC9, 0xD6, 0x7B, 0xB9, - 0xFC, 0xF9, 0x1D, 0x49, 0x87, 0x84, 0xCF, 0x86, - 0x72, 0xFD, 0x95, 0x15, 0xBF, 0x27, 0x1F, 0xAB, - 0x64, 0x81, 0xCF, 0x99, 0x96, 0x2E, 0x15, 0x57, - 0xA5, 0xD7, 0x7D, 0x0E, 0xB9, 0xDC, 0x6A, 0x44, - 0xFC, 0x80, 0x80, 0x66, 0x2E, - - 0x9C, 0x95, 0xB5, 0x62, 0xE3, 0x90, 0x98, 0xF3, - 0x02, 0x26, 0x65, 0x18, 0x99, 0x4B, 0xCC, 0x67, - 0x42, 0xCF, 0x7B, 0x21, 0xC4, 0xB7, 0x97, 0x99, - 0x50, 0xBD, 0x05, 0x49, 0xB4, 0xA3, 0x9E, 0xCA, - 0x85, 0xD1, 0xD0, 0x65, 0xF3, 0x69, 0x8E, 0x21, - 0x49, 0xCA, 0x23, 0x89, 0x8F, 0x9A, 0x03, 0x7B, - 0xB0, 0x55, 0xE4, 0x21, 0x7D, 0x00, 0xC1, 0xFA, - 0xBC, 0x24, 0x65, 0x5C, 0x83, 0x67, 0x5B, 0x97, - 0x01, 0xCB, 0x00, 0x82, 0xF2, 0xA1, 0x3E, 0xE8, - 0xCC, 0xCE, 0x00, 0x5A, 0x79, 0xB5, 0xF7, 0x13, - 0xD8, 0x9D, 0x57, 0x8F, 0x98, 0x49, 0x80, 0x72, - 0xC4, 0xA5, 0x7C, 0x03, 0x91, 0x77, 0x1F, 0x82, - 0x07, 0x42, 0x88, 0x36, 0x00, 0x9B, 0x09, 0x87, - 0x90, 0xE6, 0x6C, 0x53, 0xF6, 0x3A, 0x5F, 0x6E, - 0x71, 0xA3, 0xDB, 0x58, 0x49, 0x69, 0xCC, 0x9B, - 0x69, 0x85, 0x43, 0xFF, 0x1E, 0xEA, 0x53, 0x3C, - 0xF5, 0xD9, 0x7C, 0x63, 0xF6, 0x85, 0xEB, 0xE0, - 0xE9, 0x20, 0x6F, 0xB1, 0x5F, 0xFE, 0xEA, 0xF1, - 0x30, 0x1F, 0x7E, 0x61, 0x10, 0x74, 0x29, 0x06, - 0xB4, 0x9F, 0xAC, 0xA5, 0x3E, 0xC1, 0xAF, 0xF8, - 0x6A, 0x3F, 0x7E, 0xDE, 0x75, 0x67, 0xB7, 0x79, - 0xAB, 0x96, 0x82, 0xD9, 0x52, 0x08, 0xC9, 0xEA, - 0x1F, 0x69, 0xBF, 0xF6, 0xEA, 0xE2, 0x6F, 0x7B, - 0xB7, 0x2F, 0xED, 0xA8, 0x50, 0xD4, - - 0x5E, 0xAA, 0x52, 0xBD, 0xD4, 0x77, 0xAF, 0x8B, - 0x18, 0x01, 0xE0, 0xF7, 0xC4, 0xE7, 0x4B, 0x86, - 0xAB, 0x7D, 0x11, 0xE6, 0x70, 0x98, 0x34, 0x7C, - 0x53, 0x63, 0x75, 0xFE, 0xE8, 0xB4, 0x7A, 0x95, - 0x59, 0x0A, 0x4D, 0x78, 0x65, 0x7E, 0x93, 0xEE, - 0xD0, 0x84, 0x3D, 0xE0, 0xB6, 0xA2, 0x2D, 0x8A, - 0x36, 0x68, 0x04, 0xB4, 0x84, 0x38, 0x14, 0x1E, - 0x7A, 0x61, 0x6B, 0x60, 0xA0, 0x4A, 0xE1, 0x7D, - 0x4B, 0xB8, 0x8F, 0x31, 0x49, 0x66, 0xE2, 0x3E, - 0x73, 0xE5, 0xE1, 0x73, 0xB9, 0x9A, 0x4D, 0xAD, - 0xD5, 0xED, 0x42, 0x53, 0x41, 0x42, 0x21, 0x2E, - 0xC3, 0x36, 0x8B, 0x0A, 0x40, 0xB5, 0xB4, 0x0C, - 0xB3, 0xF0, 0x53, 0x34, 0xD7, 0xE5, 0xE0, 0x70, - 0xB1, 0xEA, 0x86, 0x5E, 0x9A, 0x39, 0x30, 0x95, - 0x84, 0xC7, 0x57, 0x93, 0xC9, 0x7A, 0xF6, 0x10, - 0x3D, 0x3F, 0x68, 0x33, 0xC3, 0x4F, 0x45, 0x36, - 0xB0, 0xA4, 0xDF, 0x58, 0xE8, 0xB7, 0x4A, 0x42, - 0x8C, 0x6D, 0x04, 0xCF, 0x24, 0xA5, 0x69, 0x95, - 0xDE, 0x04, 0xC3, 0xA8, 0xDD, 0xE3, 0x78, 0x44, - 0xA0, 0x9F, 0x11, 0x9B, 0xB4, 0xA2, 0x27, 0x7A, - 0x15, 0xA3, 0x9D, 0x27, 0x80, 0x35, 0xB4, 0x9F, - 0x33, 0xBE, 0x27, 0x3A, 0xE1, 0x1F, 0x67, 0x97, - 0x1D, 0x1A, 0x7D, 0x11, 0x59, 0xEF, 0x01, 0x5E, - 0x8E, 0xD9, 0xA8, 0x16, 0x94, 0x54, 0xD9, - - 0x49, 0x52, 0x78, 0x3A, 0x42, 0x33, 0x66, 0xEF, - 0x71, 0xB1, 0xF3, 0x8B, 0x98, 0xB2, 0x65, 0x8A, - 0x8A, 0x5D, 0xE8, 0x6B, 0x9B, 0xFB, 0xEF, 0x15, - 0x86, 0x3C, 0x68, 0x1D, 0x3A, 0x5C, 0xA7, 0xD8, - 0x3B, 0x33, 0x95, 0xF0, 0x9C, 0xB8, 0xA6, 0x92, - 0x11, 0x79, 0xB2, 0xD9, 0x3C, 0x18, 0x7F, 0xBB, - 0xF9, 0xAA, 0x43, 0x01, 0xD1, 0x7D, 0xC7, 0xB7, - 0x0D, 0x49, 0x44, 0x0D, 0x36, 0x0B, 0xD9, 0xC6, - 0x54, 0x79, 0x0A, 0x63, 0x79, 0x86, 0xBD, 0x0B, - 0xC4, 0x03, 0xF5, 0xFC, 0x1E, 0x37, 0xE5, 0x24, - 0x30, 0x5A, 0x35, 0x1D, 0x13, 0xE8, 0x35, 0x9E, - 0x42, 0x0F, 0xDA, 0xB1, 0x80, 0xD1, 0xE6, 0xE5, - 0x7A, 0xD5, 0xFE, 0x66, 0x8B, 0x38, 0xD7, 0x5E, - 0xD8, 0xE0, 0x67, 0xC0, 0xE0, 0x06, 0x10, 0xE6, - 0x18, 0xC7, 0x7A, 0xF4, 0xCF, 0xFD, 0xB2, 0xB4, - 0x1C, 0xF5, 0x46, 0x7D, 0xDF, 0x7C, 0x83, 0xA5, - 0xAB, 0xC3, 0x7C, 0xE1, 0x3F, 0x0A, 0xA3, 0xAA, - 0x37, 0x9F, 0x86, 0x8F, 0xAD, 0x26, 0xB8, 0x84, - 0xF4, 0x91, 0xF7, 0x19, 0x0A, 0x7B, 0x1B, 0x46, - 0x63, 0x43, 0x08, 0x41, 0x07, 0x0D, 0x19, 0xF1, - 0xFF, 0x8D, 0x23, 0xF1, 0xE8, 0x42, 0x54, 0x4C, - 0xBC, 0x89, 0x34, 0xA3, 0x90, 0xDC, 0x8A, 0x9F, - 0xA0, 0xFD, 0xC9, 0x65, 0xAB, 0x6B, 0x29, 0x71, - 0x6C, 0xA9, 0xF4, 0x77, 0x50, 0xA5, 0xEA, 0xBB, - - 0x9C, 0xB1, 0xAA, 0x0D, 0xDB, 0xC1, 0x1A, 0x9C, - 0x5C, 0x98, 0x93, 0xD8, 0x01, 0xC7, 0xFE, 0x24, - 0xBC, 0x60, 0x5F, 0x0D, 0xA4, 0x50, 0xC2, 0x9D, - 0x11, 0x34, 0xDE, 0x31, 0xE9, 0xD2, 0x45, 0x49, - 0x6F, 0xC2, 0x91, 0x8C, 0x75, 0x1D, 0xB8, 0xD8, - 0x27, 0xA1, 0x5F, 0xF2, 0x66, 0xBA, 0xD2, 0x5C, - 0xD6, 0xBB, 0x5B, 0x45, 0x57, 0x08, 0xF3, 0x0A, - 0x5C, 0x58, 0xAA, 0x0B, 0x79, 0x12, 0x2F, 0x2D, - 0x42, 0x37, 0xCD, 0x5C, 0xB3, 0xF1, 0x8F, 0x34, - 0xE2, 0x61, 0xC3, 0x45, 0xFC, 0xFF, 0x96, 0x53, - 0x0B, 0x1A, 0x71, 0xB5, 0x5F, 0xA2, 0x12, 0x26, - 0x78, 0xCC, 0xBD, 0x5A, 0x84, 0x35, 0xAE, 0xF2, - 0xA3, 0xC3, 0x42, 0x5F, 0x51, 0x22, 0x77, 0x91, - 0x08, 0xDF, 0x1C, 0x68, 0xAE, 0x0F, 0x51, 0x79, - 0x4E, 0x75, 0xED, 0x8D, 0x55, 0x2A, 0x54, 0x88, - 0x97, 0xF8, 0x90, 0x24, 0x14, 0xE3, 0x07, 0x4D, - 0xCD, 0x26, 0x06, 0xA7, 0x35, 0xCF, 0x6A, 0x38, - 0xB7, 0x98, 0x2F, 0xA8, 0xAE, 0x6C, 0x3D, 0xB5, - 0x1E, 0x37, 0xD1, 0xE9, 0xD4, 0x53, 0x67, 0x4B, - 0xA4, 0xAE, 0xFA, 0x51, 0x01, 0x40, 0x8B, 0xD1, - 0x09, 0x74, 0x4C, 0x7F, 0xB2, 0xFA, 0xF9, 0xA8, - 0x27, 0xAF, 0xC8, 0x24, 0x2C, 0x31, 0xA1, 0xF6, - 0xF8, 0x81, 0xAC, 0xB4, 0x02, 0x83, 0x6F, 0x49, - 0xCF, 0xEC, 0xDF, 0x71, 0x5E, 0x2F, 0x33, 0x07, - 0xBA, - - 0x55, 0xA8, 0x19, 0x38, 0x4C, 0x45, 0x5C, 0xF7, - 0x03, 0x9A, 0x21, 0x1B, 0xFF, 0xA8, 0xF7, 0x76, - 0x3E, 0xF2, 0x8E, 0xF1, 0xCD, 0x69, 0xDB, 0x0F, - 0xF6, 0x1C, 0x6A, 0x92, 0x71, 0xEF, 0x4A, 0x3E, - 0xCE, 0xF9, 0xEA, 0xAB, 0x76, 0x6B, 0x1E, 0xB5, - 0x02, 0x61, 0xA7, 0x02, 0x76, 0xBA, 0x6B, 0x1D, - 0xE5, 0xF0, 0x12, 0xDF, 0x1D, 0x61, 0x82, 0x90, - 0x91, 0xDA, 0x96, 0x60, 0x89, 0x88, 0x83, 0xCD, - 0xBF, 0xAC, 0xA8, 0x86, 0xC4, 0x7F, 0xA5, 0xA3, - 0x3E, 0x50, 0xC4, 0x8B, 0x30, 0xD8, 0x98, 0x89, - 0x0E, 0x10, 0xA3, 0x77, 0x64, 0xBF, 0x44, 0xE8, - 0x7B, 0xF4, 0x56, 0xA2, 0x87, 0x06, 0xF6, 0xF0, - 0x98, 0x77, 0x92, 0x5D, 0xED, 0x6A, 0x29, 0x33, - 0x22, 0x31, 0xD5, 0x3A, 0xD4, 0xDB, 0x11, 0x34, - 0x7D, 0xA0, 0xFC, 0x96, 0x54, 0x61, 0x16, 0x2C, - 0x48, 0x6C, 0x55, 0x2B, 0xE0, 0x8C, 0xE3, 0x7F, - 0x05, 0x32, 0xFB, 0xCE, 0xD4, 0x2F, 0x47, 0x54, - 0xE5, 0x9D, 0x6B, 0x68, 0x85, 0xF0, 0xD6, 0xCD, - 0xEA, 0xB6, 0x48, 0x59, 0xA8, 0xE6, 0x0B, 0x80, - 0x21, 0x2A, 0x62, 0x74, 0x1E, 0xD9, 0x11, 0x9A, - 0x16, 0x8A, 0xB0, 0xC5, 0x2C, 0xF2, 0x77, 0x80, - 0x0D, 0x74, 0x24, 0xE9, 0x29, 0x65, 0x47, 0x1F, - 0xEE, 0xF0, 0xA4, 0x26, 0xAF, 0xC5, 0x4B, 0x83, - 0x67, 0x23, 0x7C, 0x2E, 0x54, 0x29, 0x88, 0xD0, - 0x6A, 0xCB, - - 0x35, 0x07, 0x1D, 0x30, 0xAA, 0x5F, 0xC8, 0x44, - 0xDA, 0x6D, 0xB6, 0xCB, 0x0B, 0xD6, 0x54, 0x54, - 0x48, 0x98, 0x07, 0xE6, 0xB0, 0x33, 0x48, 0xCF, - 0xB7, 0xAF, 0x58, 0xF6, 0x2A, 0x09, 0xD2, 0x7A, - 0xB5, 0xB4, 0x93, 0x6C, 0xC3, 0x83, 0xFB, 0x17, - 0xE5, 0xBF, 0xDD, 0xE3, 0x10, 0x37, 0x69, 0xF9, - 0x90, 0xEE, 0x65, 0x1E, 0x8F, 0x82, 0x14, 0xC5, - 0x38, 0xF3, 0x96, 0x22, 0x63, 0x81, 0xD4, 0x7A, - 0x23, 0x2E, 0x9A, 0xFD, 0xD4, 0xBB, 0xE1, 0x56, - 0xDD, 0xB6, 0xD0, 0x77, 0x0C, 0x88, 0x50, 0x18, - 0xE3, 0x25, 0xBC, 0x33, 0x36, 0xB0, 0xD9, 0x65, - 0xD2, 0xC2, 0xAA, 0x26, 0xB4, 0x52, 0xEF, 0x8B, - 0x19, 0x74, 0x14, 0x69, 0xB9, 0x60, 0x0B, 0x59, - 0x2C, 0xC7, 0x74, 0x0F, 0x6B, 0xF7, 0x5C, 0x4F, - 0xC7, 0xC8, 0xED, 0xFF, 0x1F, 0x02, 0x46, 0x46, - 0x93, 0x38, 0x6F, 0x34, 0x2A, 0x0C, 0xEC, 0x3E, - 0x3F, 0xAA, 0xA0, 0xEB, 0x43, 0x24, 0x84, 0x55, - 0xAF, 0x43, 0x08, 0x0B, 0xDD, 0x0D, 0x9D, 0x01, - 0x5C, 0x47, 0x27, 0x47, 0x3A, 0x0D, 0xA8, 0x27, - 0xAE, 0x04, 0x25, 0x27, 0x5D, 0xF6, 0x19, 0x6B, - 0x2E, 0x5A, 0x1B, 0x70, 0xBD, 0xB3, 0x44, 0x23, - 0x59, 0x4F, 0xE4, 0xA0, 0x02, 0x78, 0x22, 0xA6, - 0x25, 0xA8, 0x55, 0x59, 0xB5, 0xA0, 0x60, 0x47, - 0x57, 0x1F, 0x62, 0xC2, 0x16, 0x38, 0x7D, 0x86, - 0xB9, 0x0F, 0x8A, - - 0xDD, 0x6E, 0xDE, 0x6B, 0x5B, 0x0B, 0xEA, 0xD1, - 0xB1, 0xB9, 0xD8, 0xA3, 0xCE, 0xE3, 0x95, 0x79, - 0x16, 0x68, 0x90, 0x54, 0x7A, 0xC4, 0x4E, 0x77, - 0x95, 0xD6, 0xBE, 0xAF, 0x0E, 0xE0, 0x88, 0xDA, - 0x28, 0xF2, 0xEA, 0x52, 0x77, 0xFE, 0x7F, 0xAA, - 0x3D, 0xD4, 0xCA, 0x1B, 0xBC, 0xAC, 0xC5, 0x0D, - 0xE2, 0x50, 0x70, 0x57, 0x12, 0x14, 0x54, 0x97, - 0x22, 0x3E, 0x43, 0x82, 0x0F, 0xA1, 0xA8, 0x93, - 0x4A, 0xD3, 0x7E, 0xE1, 0x1E, 0xBE, 0xD5, 0x3E, - 0x36, 0x61, 0xB1, 0x0A, 0x85, 0x6F, 0x3B, 0xF4, - 0x60, 0x39, 0xEE, 0xE5, 0x81, 0x88, 0xC2, 0x6E, - 0x24, 0xAC, 0xBD, 0x0C, 0x25, 0xE7, 0xAB, 0xB0, - 0xC8, 0xA1, 0x8F, 0x09, 0xE3, 0xCA, 0x77, 0xE3, - 0x50, 0x80, 0x6A, 0x42, 0x94, 0x2C, 0x43, 0x85, - 0x71, 0xB8, 0x4A, 0xCC, 0xBA, 0x0C, 0x5D, 0xBF, - 0x2C, 0xF8, 0x36, 0x5D, 0x79, 0xFB, 0x3C, 0x11, - 0x15, 0x7C, 0x47, 0xDD, 0xC7, 0x26, 0x71, 0x44, - 0xAF, 0x17, 0xAE, 0x74, 0xF1, 0xC5, 0xE0, 0x00, - 0x5C, 0xF0, 0x96, 0x38, 0x86, 0x1A, 0x7F, 0xA1, - 0xBC, 0x0E, 0x32, 0xCA, 0x54, 0xBF, 0x5F, 0xEA, - 0x76, 0x31, 0x1B, 0x1B, 0x70, 0xE5, 0xB9, 0xA8, - 0x18, 0x58, 0xF4, 0x31, 0x92, 0xDD, 0x25, 0xB6, - 0xF5, 0xC1, 0x6B, 0x0D, 0xFC, 0x97, 0x29, 0xD1, - 0x6F, 0xE2, 0xCD, 0xC6, 0x41, 0x24, 0x28, 0x68, - 0x42, 0x23, 0x34, 0xF5, - - 0xC7, 0xD2, 0x23, 0x12, 0x22, 0x4E, 0x47, 0x8E, - 0xB9, 0x0E, 0x31, 0x80, 0xA3, 0xB3, 0x72, 0xE1, - 0xB4, 0xE6, 0x43, 0x4C, 0x9C, 0xDE, 0xBD, 0x34, - 0x79, 0xD8, 0x2D, 0x82, 0xA2, 0x79, 0x64, 0x54, - 0x13, 0x9C, 0xFC, 0x21, 0x3A, 0x7C, 0xFC, 0x84, - 0x87, 0xB6, 0x94, 0xD8, 0x8E, 0x6A, 0xBD, 0xA7, - 0xC5, 0x2E, 0xC6, 0x88, 0x46, 0xF9, 0xA3, 0xFE, - 0x66, 0x6D, 0x10, 0xB3, 0x07, 0x27, 0xDE, 0xDC, - 0x84, 0xEC, 0xFB, 0x15, 0xC7, 0x6C, 0x9E, 0x3E, - 0x03, 0x41, 0x29, 0x8F, 0x06, 0xDB, 0xF1, 0x5E, - 0x21, 0xB7, 0x5E, 0x42, 0x9C, 0x7D, 0x21, 0xC8, - 0x78, 0x5E, 0x6E, 0x19, 0x77, 0x21, 0x41, 0xF6, - 0x5D, 0x2F, 0x6A, 0xC1, 0xCB, 0xB8, 0x62, 0x4B, - 0xDD, 0xD4, 0xBE, 0x2E, 0xAD, 0x05, 0x6E, 0x4F, - 0x96, 0x4C, 0x02, 0x5D, 0x75, 0xE7, 0x0E, 0x50, - 0xA5, 0x45, 0xB3, 0x47, 0xAC, 0xAE, 0xED, 0x0C, - 0x94, 0x6A, 0x5E, 0x4A, 0x66, 0xE9, 0x2A, 0x2A, - 0x5B, 0x00, 0xA7, 0xEC, 0xDE, 0xE7, 0xE8, 0xAA, - 0x01, 0x51, 0x4F, 0x2B, 0x67, 0x95, 0x2E, 0xA7, - 0xE3, 0x05, 0x9D, 0x45, 0x40, 0x68, 0x7F, 0xBB, - 0x98, 0xCB, 0x54, 0x8C, 0xEB, 0x29, 0xAD, 0xE2, - 0xA6, 0x8C, 0xBB, 0x33, 0xCD, 0xB2, 0x79, 0x6E, - 0x37, 0x01, 0xEB, 0xF6, 0x19, 0x70, 0x08, 0x08, - 0x17, 0x4F, 0x8E, 0x45, 0x2A, 0x8A, 0x97, 0x91, - 0x8D, 0x4F, 0x53, 0x4B, 0x3F, - - 0xCA, 0x0D, 0x28, 0x4B, 0x0A, 0x4D, 0xD4, 0x03, - 0xDA, 0xAA, 0x7E, 0x33, 0x7D, 0x98, 0x9D, 0xE0, - 0x5B, 0x29, 0x94, 0x19, 0xA4, 0xD8, 0xC7, 0xF8, - 0x11, 0xF0, 0xD9, 0x18, 0x9A, 0x17, 0x1A, 0x14, - 0xE1, 0x4E, 0x4F, 0x09, 0x45, 0x7D, 0x17, 0xE9, - 0xB7, 0xA2, 0x6B, 0x0A, 0xE6, 0x17, 0x57, 0x05, - 0x24, 0xDC, 0xC6, 0x75, 0xAE, 0xBC, 0xAE, 0x32, - 0x1B, 0x60, 0x5A, 0x5D, 0x77, 0xB4, 0x42, 0x48, - 0x99, 0xE7, 0xB5, 0xEB, 0xE5, 0x7A, 0x10, 0x93, - 0x5D, 0x81, 0xCA, 0x01, 0x2F, 0x41, 0xD4, 0x0F, - 0xDE, 0xBE, 0xC4, 0x59, 0xC3, 0xDB, 0xDE, 0xF3, - 0x14, 0xFC, 0xC5, 0x8B, 0x22, 0xCC, 0x6A, 0x3F, - 0x0C, 0xCC, 0x53, 0x3D, 0x39, 0x0C, 0x83, 0xED, - 0x51, 0x54, 0x4A, 0xD9, 0x2D, 0x0C, 0x5E, 0x1D, - 0x0B, 0x82, 0x73, 0x0C, 0x41, 0xCD, 0x8D, 0xD0, - 0xD9, 0xD3, 0x7C, 0x8D, 0x3D, 0xFA, 0xA9, 0x51, - 0xE5, 0x13, 0x8B, 0x81, 0x32, 0x62, 0xAB, 0xB6, - 0xB1, 0xF2, 0x1C, 0x5C, 0xE6, 0x9A, 0xB0, 0x83, - 0x40, 0x92, 0xB8, 0x85, 0x22, 0x7E, 0x53, 0x9A, - 0x0F, 0x87, 0xDD, 0xBA, 0x20, 0x83, 0xE4, 0x93, - 0xDE, 0x35, 0x8E, 0xBD, 0x2F, 0xA3, 0x04, 0xF2, - 0x87, 0x62, 0x9E, 0xD9, 0x72, 0xBC, 0xC7, 0x0C, - 0x8F, 0x6F, 0x48, 0x93, 0x0D, 0x48, 0x9B, 0x21, - 0xA7, 0xD4, 0x12, 0x0C, 0x06, 0x61, 0x9D, 0xC2, - 0x45, 0x51, 0x17, 0x6D, 0xD2, 0x95, - - 0x15, 0x94, 0x79, 0xF5, 0xEB, 0x7F, 0xDD, 0x18, - 0x2E, 0x9C, 0x4B, 0xA0, 0xD2, 0x3D, 0xEF, 0x37, - 0x82, 0xDB, 0xDC, 0xFB, 0x8D, 0x07, 0x87, 0x30, - 0x89, 0x79, 0x31, 0xB1, 0x27, 0xAF, 0x6B, 0x9B, - 0x0C, 0xAB, 0xA3, 0x72, 0xA4, 0xE3, 0x96, 0x7B, - 0x61, 0x4F, 0xB4, 0x0D, 0xD1, 0x64, 0x9D, 0xD5, - 0x3D, 0x0F, 0x24, 0x3C, 0xFF, 0x39, 0xA3, 0x08, - 0x7E, 0xD0, 0x4A, 0x14, 0xF2, 0x16, 0x08, 0x12, - 0x58, 0x6F, 0xE4, 0xC3, 0xEE, 0x77, 0xDA, 0xF0, - 0x21, 0x0E, 0x8A, 0xFB, 0x19, 0x46, 0x08, 0xCF, - 0x47, 0x93, 0x76, 0xE8, 0x15, 0x7F, 0x07, 0xC7, - 0x44, 0x4A, 0x35, 0xA9, 0x65, 0x58, 0xF6, 0x21, - 0xCA, 0x2E, 0xAD, 0xE1, 0x21, 0xE2, 0x25, 0x8F, - 0x87, 0xA4, 0xFD, 0xE1, 0xEF, 0xE9, 0x25, 0x70, - 0x7E, 0x41, 0x4D, 0x5A, 0x20, 0xC6, 0x0C, 0xD4, - 0xE5, 0x49, 0xF3, 0xB9, 0xDB, 0xE5, 0xCE, 0x21, - 0x1D, 0xE5, 0xA9, 0x73, 0x5E, 0x91, 0xFA, 0x86, - 0x5A, 0x25, 0x52, 0x27, 0xF5, 0x4C, 0x92, 0xC1, - 0x14, 0x52, 0x0E, 0x78, 0x6E, 0xCD, 0x8F, 0x0F, - 0xD5, 0x40, 0x42, 0x01, 0xD1, 0x6A, 0xD2, 0xCE, - 0xD8, 0xC0, 0x6A, 0x3E, 0x82, 0xF0, 0x41, 0x0D, - 0x44, 0x24, 0xE2, 0x43, 0xA3, 0xE8, 0x68, 0x12, - 0x46, 0x2E, 0x7A, 0x72, 0x04, 0xE0, 0xE6, 0x38, - 0x4D, 0x62, 0x7F, 0x02, 0x59, 0x17, 0x8F, 0xB9, - 0x75, 0x74, 0x25, 0x7F, 0x95, 0xBF, 0x9C, - - 0xC5, 0x38, 0x2D, 0xA3, 0x3D, 0xF8, 0x27, 0x28, - 0x56, 0x3E, 0x35, 0x24, 0x8D, 0x8F, 0x56, 0xBD, - 0xA9, 0x6D, 0x58, 0x99, 0x12, 0xC7, 0xAB, 0x4A, - 0xE0, 0xF7, 0xDE, 0x1E, 0xF0, 0x40, 0x89, 0x0C, - 0xE4, 0x7B, 0xF8, 0x7B, 0x8C, 0x1B, 0x6F, 0xC1, - 0xD4, 0x6E, 0xEF, 0x45, 0x2E, 0x7E, 0x03, 0x0F, - 0x3B, 0x0F, 0x48, 0x28, 0x8D, 0x8C, 0xAF, 0x9E, - 0xB3, 0x55, 0x6B, 0xA7, 0xAA, 0x03, 0x94, 0x21, - 0xED, 0x7A, 0x92, 0x81, 0x12, 0x37, 0xAF, 0x4B, - 0xE1, 0x34, 0x62, 0xC6, 0x7D, 0x5E, 0xA8, 0xD6, - 0x9A, 0xB8, 0x12, 0xF0, 0xB8, 0x7E, 0x92, 0x88, - 0xDB, 0x67, 0x97, 0x56, 0x88, 0xA4, 0x22, 0x18, - 0xFC, 0xC3, 0xCD, 0x1B, 0x12, 0x09, 0xC9, 0xD6, - 0x71, 0xE1, 0x76, 0xED, 0x95, 0x61, 0x96, 0xF9, - 0xB1, 0xFA, 0x16, 0x9F, 0xDC, 0x3A, 0x3C, 0x9A, - 0xFB, 0x25, 0x0A, 0x0C, 0x8B, 0xFB, 0xD1, 0x7E, - 0x13, 0x27, 0x5B, 0x24, 0x95, 0xC4, 0x6B, 0xAC, - 0x32, 0xB5, 0x1D, 0xC9, 0x96, 0x67, 0x84, 0x43, - 0x5C, 0xAD, 0xD2, 0xF2, 0x15, 0xDA, 0x83, 0x84, - 0x71, 0xB2, 0x14, 0x04, 0x20, 0xDD, 0x04, 0x78, - 0x6E, 0xCD, 0x7F, 0x73, 0xD1, 0xAD, 0xBE, 0xD4, - 0x4F, 0xED, 0xF8, 0xE9, 0xEA, 0x07, 0xBD, 0xB7, - 0xDD, 0x0F, 0xFB, 0xF5, 0x88, 0x6A, 0x3E, 0x8A, - 0xCD, 0x79, 0xBA, 0xDE, 0x98, 0xB3, 0x74, 0x3D, - 0x0F, 0x92, 0x40, 0x10, 0xE4, 0x26, 0x85, 0x2D, - - 0x0E, 0x46, 0xBD, 0x8B, 0xDC, 0xE8, 0x28, 0x6A, - 0x31, 0x78, 0xE6, 0xDE, 0x37, 0xC0, 0x68, 0x2D, - 0xE0, 0x38, 0xD0, 0x2F, 0x28, 0xBB, 0xA2, 0xF4, - 0x8F, 0x82, 0x35, 0xDF, 0x0F, 0xB9, 0x31, 0x98, - 0xF6, 0x03, 0x66, 0x80, 0xCF, 0xDA, 0xF0, 0x0B, - 0x4C, 0x62, 0x2F, 0x6E, 0x7A, 0x1B, 0x80, 0x98, - 0x7A, 0xDB, 0x1F, 0x2B, 0xC2, 0x2F, 0x96, 0x80, - 0x58, 0x98, 0x21, 0xFC, 0xBB, 0x1A, 0x13, 0xAF, - 0x56, 0xA5, 0x4A, 0x89, 0xDB, 0xF0, 0x28, 0x97, - 0x43, 0xB6, 0x45, 0xBF, 0x58, 0x76, 0x78, 0x8A, - 0x83, 0xF8, 0x6E, 0xC1, 0x90, 0x99, 0x59, 0x0A, - 0xF2, 0x1E, 0x95, 0x8A, 0x13, 0x58, 0xC0, 0xC7, - 0x8F, 0x27, 0xD9, 0x53, 0xEC, 0xD0, 0x24, 0xFC, - 0x83, 0x60, 0x74, 0x24, 0x2D, 0xD5, 0xE5, 0x51, - 0x27, 0x0E, 0x62, 0x17, 0xD4, 0xAA, 0xF1, 0x30, - 0x6F, 0x35, 0x4C, 0xE0, 0x91, 0x2D, 0xDA, 0x11, - 0x68, 0xDF, 0x6F, 0xEA, 0x29, 0xC0, 0xB4, 0x75, - 0x04, 0x4E, 0xB7, 0x49, 0x47, 0x19, 0xA1, 0x7F, - 0x99, 0x0B, 0x45, 0x95, 0x3F, 0x6A, 0x97, 0x8B, - 0xA8, 0x27, 0x1C, 0xBF, 0x07, 0x7D, 0x30, 0xD9, - 0x97, 0xD7, 0xA5, 0x2D, 0x22, 0x23, 0xF7, 0x1D, - 0xFD, 0x4A, 0xE9, 0xA8, 0xFD, 0x10, 0xE4, 0xEF, - 0x0F, 0xBB, 0x54, 0x2B, 0xFC, 0x74, 0xDE, 0x55, - 0xF7, 0x51, 0xBF, 0x8B, 0x73, 0x38, 0xF8, 0x5E, - 0xFF, 0x8C, 0x96, 0xFF, 0xFA, 0x82, 0x67, 0xC7, - 0xA6, - - 0x78, 0xC3, 0xA1, 0xCB, 0x49, 0x80, 0x93, 0x83, - 0x6D, 0x3D, 0x8C, 0xB6, 0x38, 0x79, 0x45, 0xCF, - 0x65, 0x32, 0x71, 0xE6, 0x00, 0x24, 0x23, 0x45, - 0x47, 0x37, 0x84, 0x54, 0x1B, 0x7E, 0x25, 0x5B, - 0x86, 0xA5, 0x55, 0x07, 0xB4, 0x0B, 0xCD, 0x23, - 0x6B, 0xF3, 0x33, 0xCB, 0xCA, 0x7C, 0xBC, 0x7F, - 0x43, 0x50, 0x02, 0xA2, 0x45, 0x1C, 0xD3, 0x32, - 0x7C, 0x28, 0x6D, 0xA1, 0x24, 0x2A, 0x58, 0x29, - 0xC1, 0xB2, 0x6C, 0x71, 0x1A, 0xA4, 0xA9, 0xB3, - 0x27, 0xAB, 0xBC, 0xC6, 0x9F, 0x9D, 0x92, 0xB6, - 0x70, 0x99, 0xA6, 0x9B, 0xAD, 0x8A, 0x59, 0xC9, - 0x08, 0xE0, 0xFB, 0x92, 0xB0, 0x0B, 0x03, 0x75, - 0xBA, 0xC0, 0x88, 0x56, 0xF2, 0x8B, 0xCD, 0x22, - 0xB8, 0x2B, 0xEA, 0xD8, 0x79, 0xD1, 0xA5, 0xF4, - 0x98, 0xEF, 0x71, 0xE9, 0xFE, 0xBC, 0x0F, 0xEA, - 0x5B, 0x8D, 0x96, 0xF6, 0xB7, 0x03, 0xEF, 0xA6, - 0x61, 0x05, 0x8F, 0xB3, 0x0D, 0xB0, 0xCA, 0xC1, - 0xCF, 0x25, 0xB2, 0x87, 0x98, 0x13, 0xB8, 0xEC, - 0xA8, 0x54, 0xF6, 0xF5, 0x5F, 0xB2, 0x11, 0x52, - 0x14, 0xD7, 0x9E, 0x36, 0x93, 0x62, 0x3B, 0x24, - 0x92, 0x9C, 0x63, 0xB7, 0x2D, 0x18, 0xAA, 0x10, - 0x89, 0x84, 0x29, 0x16, 0xF0, 0xDF, 0x7C, 0x31, - 0x0C, 0x3E, 0x25, 0xB3, 0x72, 0x50, 0xE3, 0x51, - 0xDC, 0x12, 0x58, 0xA7, 0xED, 0x38, 0x43, 0x92, - 0x1B, 0xA5, 0x54, 0xE1, 0xC6, 0x56, 0x30, 0x65, - 0x0A, 0xA5, - - 0x02, 0xF5, 0xEC, 0x03, 0x39, 0xF9, 0x74, 0xC8, - 0xAC, 0xC7, 0xF7, 0xE5, 0x62, 0x30, 0xB3, 0x0E, - 0xBA, 0x02, 0xD6, 0x48, 0x76, 0x84, 0xDC, 0x9F, - 0xF0, 0x79, 0x39, 0x06, 0xA9, 0x82, 0x53, 0x00, - 0xAB, 0x09, 0x0C, 0x16, 0xDE, 0xC1, 0x05, 0xC8, - 0x2C, 0x92, 0x02, 0x61, 0xEA, 0x87, 0x8C, 0xFC, - 0x8A, 0x0B, 0x9F, 0x04, 0x9F, 0x51, 0x5F, 0x7B, - 0x4F, 0xAC, 0xF1, 0x4F, 0x9A, 0x29, 0x61, 0x42, - 0x8C, 0xD7, 0x23, 0x49, 0x63, 0xEB, 0xFD, 0x2C, - 0xDC, 0x76, 0xF1, 0xF0, 0xC8, 0xA2, 0x97, 0x5C, - 0x20, 0x23, 0x7C, 0x9F, 0x5D, 0xDE, 0x59, 0x87, - 0x3A, 0x33, 0xE6, 0x77, 0x83, 0xE8, 0xF7, 0xA8, - 0x31, 0x7E, 0xFA, 0x02, 0x79, 0x96, 0x13, 0xCB, - 0x08, 0xB3, 0x0E, 0x18, 0x2E, 0x2C, 0x48, 0x1B, - 0x8D, 0xF7, 0x40, 0x0F, 0xD0, 0x95, 0x29, 0x99, - 0xA9, 0x8C, 0xF5, 0xBA, 0xC3, 0xE7, 0x1E, 0x3F, - 0x34, 0x13, 0x02, 0x24, 0xF0, 0x4E, 0xC6, 0xCD, - 0xEE, 0xA1, 0xF0, 0x0F, 0xAE, 0xB8, 0x31, 0x0F, - 0x5F, 0x34, 0x4F, 0xAC, 0x17, 0x52, 0x26, 0x84, - 0xA0, 0x65, 0x88, 0x2E, 0xA2, 0x75, 0xC0, 0x18, - 0x6A, 0x2C, 0xDD, 0x0F, 0xF9, 0x0E, 0xFA, 0x56, - 0xBB, 0x71, 0xAD, 0x69, 0xCB, 0x96, 0x31, 0xCF, - 0x66, 0x1C, 0x87, 0x71, 0x77, 0x11, 0x39, 0xB7, - 0xE9, 0x25, 0x7A, 0x88, 0x8A, 0x0C, 0xE9, 0xCD, - 0x0F, 0xB9, 0x82, 0x18, 0x66, 0x2A, 0xD1, 0x91, - 0xD9, 0x4F, 0x8D, - - 0xE9, 0xF8, 0x7F, 0xAE, 0x1B, 0x66, 0x68, 0x95, - 0x73, 0xE2, 0x74, 0x01, 0xE1, 0x7D, 0x2A, 0x45, - 0xC0, 0x88, 0x27, 0xB0, 0x1A, 0x6F, 0xD0, 0x5E, - 0xA6, 0x05, 0x9D, 0x18, 0xB8, 0xA2, 0x86, 0x0E, - 0xB3, 0xF7, 0x79, 0xC3, 0x41, 0xBE, 0x1D, 0x34, - 0x69, 0x19, 0x07, 0x2F, 0x81, 0x48, 0xFC, 0xC1, - 0x35, 0xA4, 0x98, 0xFF, 0xAA, 0xA7, 0xF9, 0xC7, - 0x32, 0x63, 0xBB, 0x56, 0xA7, 0xBE, 0x31, 0x88, - 0xA1, 0x35, 0x57, 0x17, 0x1B, 0x00, 0x5A, 0x0C, - 0xAF, 0x48, 0xE8, 0xA6, 0x63, 0x5F, 0x6B, 0xB9, - 0x4D, 0x44, 0x0E, 0xCB, 0xA2, 0xDB, 0x7E, 0xBD, - 0xC1, 0x99, 0x7A, 0x02, 0xAE, 0xDF, 0x01, 0xA6, - 0x19, 0x8A, 0xA0, 0x91, 0xA8, 0x4E, 0x34, 0xF6, - 0x4A, 0x53, 0xD3, 0x44, 0xF6, 0x3C, 0x5A, 0x2D, - 0x16, 0xAD, 0x5F, 0x09, 0x0B, 0xE2, 0xE8, 0xD0, - 0xFE, 0x09, 0x6F, 0x7A, 0xDB, 0x86, 0x57, 0xA9, - 0x7B, 0x06, 0x7D, 0xC5, 0x99, 0x4C, 0xA5, 0xE2, - 0xEA, 0x18, 0x0A, 0xFD, 0xB6, 0xF2, 0x03, 0xEA, - 0xEC, 0xAF, 0x7B, 0xA1, 0x9C, 0x31, 0xDF, 0x17, - 0x74, 0x6D, 0x01, 0x9E, 0xBF, 0x76, 0x63, 0x2D, - 0x5B, 0xA0, 0xF6, 0xD1, 0xC2, 0x01, 0x40, 0xDF, - 0xE1, 0x81, 0xD6, 0xCB, 0x67, 0xC7, 0x96, 0x6C, - 0xE6, 0x34, 0x9E, 0xA5, 0x23, 0xCA, 0x9B, 0x06, - 0x96, 0x45, 0xFA, 0xB8, 0x96, 0x3A, 0x66, 0x32, - 0x5F, 0xF1, 0x92, 0xA1, 0x64, 0xF8, 0x2B, 0x90, - 0x65, 0x5D, 0xD7, 0xF8, - - 0x8F, 0xEC, 0x60, 0x90, 0x57, 0x5B, 0x8B, 0x0F, - 0xF5, 0xF9, 0xF1, 0xA6, 0x11, 0x9A, 0xE5, 0x47, - 0x50, 0x3A, 0x7D, 0x92, 0x1C, 0x2D, 0xBE, 0x3F, - 0x0B, 0x75, 0x18, 0x78, 0xD1, 0x29, 0xBA, 0x37, - 0x3F, 0xD6, 0x89, 0xE6, 0x14, 0x54, 0x58, 0x70, - 0x0F, 0x17, 0x62, 0x4E, 0xE3, 0x8E, 0xC0, 0x18, - 0x7B, 0x5C, 0xCB, 0x31, 0x95, 0x16, 0x9E, 0xEC, - 0x0B, 0x7B, 0xF4, 0x1D, 0xC6, 0x30, 0xB4, 0xBD, - 0xAA, 0x29, 0x33, 0x94, 0xCC, 0x30, 0x98, 0x44, - 0x20, 0x4E, 0xF3, 0x50, 0x9C, 0x75, 0x5C, 0xB0, - 0xB9, 0x1F, 0x60, 0xDF, 0xFA, 0x57, 0xAF, 0xC1, - 0x69, 0x50, 0xFD, 0x09, 0x9B, 0x62, 0xEB, 0xE5, - 0x9C, 0x09, 0xAB, 0x83, 0x34, 0xDE, 0x9F, 0x48, - 0xF7, 0x2B, 0x21, 0xB7, 0xC5, 0x90, 0x15, 0xFF, - 0x9D, 0x5F, 0xD7, 0x5A, 0x4F, 0x6D, 0xB7, 0x8C, - 0xD5, 0x74, 0x17, 0xEB, 0xD2, 0xF5, 0xE2, 0xCF, - 0x6E, 0xE0, 0xE3, 0xCD, 0xD7, 0x11, 0xD7, 0xA6, - 0x89, 0xF4, 0xDE, 0xEF, 0xEB, 0x77, 0xCD, 0xA3, - 0x2C, 0x1F, 0xDF, 0xED, 0x93, 0xA6, 0x51, 0xC8, - 0xD4, 0x45, 0x72, 0x11, 0x7F, 0xC8, 0x68, 0x86, - 0x4B, 0x6E, 0x13, 0x92, 0x2B, 0xDA, 0x6F, 0xE4, - 0x86, 0xBB, 0xF4, 0x71, 0x8E, 0xA4, 0x2A, 0x55, - 0x3C, 0xC6, 0x37, 0x67, 0x96, 0xFF, 0x40, 0xF9, - 0x1E, 0xDD, 0x95, 0x5A, 0x89, 0x0C, 0x07, 0x59, - 0x90, 0x4F, 0xCF, 0x83, 0xE8, 0x0B, 0x93, 0x73, - 0xAA, 0x8A, 0x15, 0x0A, 0x21, - - 0x8F, 0xB7, 0xC6, 0xB8, 0x22, 0xAE, 0x29, 0x71, - 0x39, 0xA5, 0x99, 0xC3, 0x6F, 0xBD, 0x8D, 0xF2, - 0x74, 0x24, 0x7E, 0xFF, 0x4B, 0x35, 0x63, 0xF4, - 0xD2, 0xA8, 0x55, 0xCD, 0x1A, 0x1A, 0x40, 0x64, - 0x45, 0x61, 0xD8, 0x26, 0xA0, 0x23, 0x3E, 0xDC, - 0x57, 0x05, 0xB8, 0xC4, 0xC0, 0x0C, 0xF4, 0x2E, - 0x3F, 0xBE, 0x36, 0xFB, 0x84, 0xDF, 0x5A, 0x19, - 0x87, 0x78, 0x6B, 0x31, 0x2D, 0xB5, 0x03, 0x98, - 0x92, 0x3C, 0x5F, 0xD7, 0x5F, 0x06, 0x2A, 0x00, - 0x5C, 0x7C, 0xF1, 0x4F, 0x70, 0x36, 0xBB, 0xE0, - 0xDC, 0x5B, 0x9A, 0x10, 0x87, 0x13, 0x05, 0x58, - 0xB2, 0x9C, 0xEB, 0xFE, 0xCF, 0x82, 0x03, 0x18, - 0x6A, 0x37, 0x8D, 0x11, 0xD9, 0x15, 0x1E, 0x27, - 0x54, 0x8E, 0x7A, 0x30, 0x13, 0xD8, 0x1A, 0xBB, - 0x6C, 0xAD, 0xC4, 0xFD, 0x61, 0x2E, 0x03, 0xEB, - 0x2C, 0x2D, 0x01, 0x4A, 0x3A, 0xCA, 0xDF, 0x23, - 0x8E, 0x39, 0x81, 0x6D, 0x62, 0xEE, 0x12, 0x89, - 0xC6, 0xA3, 0x1D, 0x38, 0xA9, 0xDE, 0x5D, 0x1C, - 0x3F, 0xAE, 0x79, 0xAC, 0x2A, 0x5B, 0xCD, 0x94, - 0x9F, 0xE3, 0xB8, 0x93, 0x21, 0x4E, 0x0E, 0xB4, - 0x78, 0xE6, 0xC2, 0x69, 0x7D, 0x58, 0x26, 0xDD, - 0xE1, 0xC0, 0xAB, 0xF9, 0x9F, 0xDE, 0xB0, 0xB5, - 0x24, 0x78, 0x4C, 0x5A, 0x42, 0x91, 0x8E, 0x03, - 0x95, 0xAA, 0x08, 0xD4, 0x56, 0x6D, 0x64, 0x41, - 0xC7, 0xC9, 0x2E, 0xEC, 0xE7, 0x1A, 0xEB, 0xE8, - 0x24, 0x8D, 0xE3, 0x31, 0xA5, 0x11, - - 0x05, 0x2F, 0xC0, 0x7D, 0xD7, 0xC5, 0x12, 0xF3, - 0x37, 0x94, 0x79, 0xEF, 0x44, 0xEE, 0xB0, 0xD0, - 0xED, 0x39, 0xCB, 0x5E, 0x64, 0xE9, 0x83, 0xD2, - 0x76, 0xF0, 0x65, 0x47, 0x25, 0x1D, 0x0D, 0x6B, - 0x16, 0x23, 0x98, 0xE5, 0x1D, 0xF2, 0xB1, 0x68, - 0x0D, 0xBA, 0xFE, 0x9D, 0x1A, 0x1D, 0xBA, 0x5F, - 0x92, 0x6F, 0x17, 0x76, 0xF5, 0xB3, 0xBA, 0x5A, - 0x71, 0x0C, 0x72, 0xFA, 0x32, 0xCC, 0x7B, 0x17, - 0x52, 0xB7, 0xF9, 0x86, 0x70, 0xF7, 0x39, 0x22, - 0xA1, 0xF6, 0xB3, 0xAA, 0xE9, 0xC5, 0x8B, 0x69, - 0xE4, 0x48, 0xD2, 0xAA, 0x8E, 0xAF, 0x7C, 0xE5, - 0x77, 0xE1, 0x33, 0xEC, 0x30, 0x20, 0xB8, 0xCD, - 0x3E, 0xD6, 0xB6, 0xD0, 0x64, 0x86, 0x39, 0x01, - 0x0D, 0x4F, 0xAB, 0xF7, 0x7B, 0xBE, 0x97, 0x21, - 0xCD, 0x96, 0x69, 0x16, 0x73, 0x61, 0x7D, 0x84, - 0x21, 0x3A, 0xA0, 0x07, 0xDE, 0xCA, 0x17, 0x0E, - 0x82, 0xA4, 0x8B, 0x2D, 0xE4, 0x99, 0x11, 0x3C, - 0x3C, 0x5B, 0x16, 0xB8, 0x00, 0xEE, 0xD1, 0xDF, - 0x68, 0x30, 0x0E, 0x12, 0x5E, 0x12, 0x4F, 0x1B, - 0xBE, 0xC2, 0x9B, 0x99, 0x64, 0xDB, 0xCE, 0x29, - 0xE5, 0x8E, 0x66, 0x96, 0x65, 0x37, 0x6E, 0xE2, - 0xE9, 0x05, 0x34, 0x56, 0x8D, 0xDF, 0x24, 0x34, - 0x09, 0x77, 0xB0, 0x76, 0xDD, 0x1E, 0x76, 0x5D, - 0x67, 0x7D, 0xCC, 0xCF, 0xB2, 0x7E, 0x15, 0x5E, - 0xE0, 0x4E, 0x80, 0x4B, 0xE0, 0xD2, 0x5A, 0xD4, - 0x1F, 0x5F, 0x6E, 0x65, 0x9C, 0x07, 0xBD, - - 0x08, 0x49, 0x9F, 0x83, 0x46, 0x0F, 0x0E, 0x04, - 0x94, 0x6C, 0x3F, 0x75, 0x4D, 0x98, 0xE5, 0x5D, - 0x12, 0xCB, 0xF6, 0x53, 0x0D, 0xFD, 0x30, 0x75, - 0x92, 0x02, 0xA9, 0x69, 0xD3, 0x71, 0xBC, 0x28, - 0xBC, 0x18, 0x88, 0x48, 0x27, 0x0B, 0x3B, 0x5C, - 0x2C, 0xFF, 0x7C, 0xFA, 0xB1, 0x02, 0x00, 0x79, - 0x6D, 0x8A, 0x39, 0x3F, 0xF2, 0x11, 0xA8, 0xA3, - 0x95, 0x68, 0xCA, 0x97, 0x1E, 0xD9, 0x80, 0xD8, - 0x9D, 0x4C, 0x62, 0x3E, 0xA5, 0xD0, 0x61, 0xE3, - 0x0D, 0x3D, 0xBA, 0xE7, 0x0E, 0x7F, 0x23, 0xBF, - 0x3D, 0x04, 0xB4, 0x1F, 0x20, 0x49, 0x5A, 0x40, - 0x50, 0x59, 0x2C, 0x09, 0x05, 0x5B, 0x8D, 0x07, - 0xA9, 0x79, 0x75, 0x13, 0xFF, 0xB5, 0x33, 0x58, - 0x41, 0x5D, 0x1D, 0xF1, 0x39, 0x54, 0x3A, 0x41, - 0x09, 0xDB, 0x5F, 0xC7, 0x5F, 0x7A, 0xE6, 0x27, - 0xA4, 0xFF, 0x20, 0xE8, 0x5F, 0x25, 0x89, 0xCB, - 0x77, 0x8D, 0xD7, 0x79, 0x16, 0x50, 0x68, 0xE0, - 0x24, 0xEC, 0x87, 0x60, 0xC2, 0x75, 0x87, 0xB8, - 0xAD, 0x66, 0x64, 0xF1, 0x6B, 0x01, 0x7E, 0xB0, - 0xE3, 0x79, 0x7E, 0x84, 0x29, 0x51, 0x47, 0x24, - 0xB9, 0x5D, 0xC6, 0x13, 0xEC, 0x0D, 0x5E, 0x8B, - 0x3E, 0x68, 0x97, 0x74, 0xB5, 0x1C, 0xE6, 0x9E, - 0x74, 0xD1, 0x9A, 0xE6, 0x1A, 0x6C, 0xFD, 0xBB, - 0x27, 0xC1, 0x73, 0xB1, 0x4E, 0xAC, 0x97, 0x1B, - 0x8B, 0xB2, 0x0A, 0x6A, 0x67, 0xA0, 0xA9, 0xDD, - 0x88, 0xF0, 0x55, 0x58, 0x10, 0x79, 0x9C, 0xC5, - - 0xAF, 0x48, 0x98, 0xFF, 0xF1, 0xC9, 0x67, 0xB3, - 0x74, 0xA9, 0xAC, 0xF5, 0x17, 0x7D, 0x95, 0x53, - 0x6A, 0xDD, 0xD6, 0x44, 0x3B, 0x09, 0x32, 0x78, - 0x2E, 0xEC, 0x19, 0x33, 0xD8, 0x4C, 0xFD, 0xE6, - 0xCE, 0x4A, 0x08, 0x78, 0xB5, 0xE8, 0x90, 0x1B, - 0x32, 0x04, 0x51, 0xC1, 0x4A, 0x1A, 0x69, 0xA2, - 0x0A, 0x76, 0x86, 0x73, 0x4B, 0x4C, 0xF7, 0x62, - 0xF7, 0xD0, 0x2E, 0x91, 0x8B, 0x7C, 0xFA, 0x8F, - 0xC9, 0xBE, 0x49, 0x9B, 0x1C, 0x58, 0xF8, 0x14, - 0xD1, 0x07, 0x4A, 0x4D, 0xE4, 0xB3, 0x83, 0x0A, - 0xD3, 0xF9, 0xDD, 0xC1, 0x2F, 0x84, 0x15, 0x02, - 0xA8, 0xB7, 0xB8, 0x45, 0x05, 0x99, 0x71, 0xEE, - 0xC6, 0x3B, 0xC4, 0xC3, 0x6F, 0x10, 0x63, 0x17, - 0x11, 0xD0, 0x1F, 0x1C, 0x63, 0xB9, 0x3F, 0x3D, - 0x68, 0x0A, 0x39, 0x25, 0x95, 0xB9, 0x81, 0xA7, - 0x04, 0x64, 0x6B, 0x2E, 0x52, 0xD0, 0x56, 0x04, - 0x99, 0x4F, 0x1B, 0x8E, 0xB0, 0x29, 0xA5, 0x3C, - 0x17, 0x46, 0xEC, 0x36, 0xC2, 0xD0, 0xAD, 0x92, - 0xB7, 0x58, 0x70, 0x33, 0xA9, 0xA3, 0xD8, 0xB7, - 0xF1, 0x04, 0xA7, 0xFA, 0x9D, 0x2C, 0x6B, 0x5A, - 0x52, 0x89, 0xAC, 0xD0, 0x12, 0x44, 0x8F, 0x7E, - 0x97, 0xA1, 0x82, 0x82, 0xB2, 0xEA, 0x47, 0x60, - 0x9B, 0x22, 0x32, 0x74, 0x77, 0x62, 0xE3, 0x46, - 0xF5, 0x55, 0x79, 0xEF, 0x9D, 0xB0, 0x2A, 0xC8, - 0x10, 0x2E, 0x7B, 0x3F, 0x00, 0xE8, 0x04, 0xA0, - 0x7E, 0x7F, 0x34, 0xB2, 0x35, 0x0E, 0x3A, 0x2F, - 0x65, - - 0x0C, 0x94, 0x90, 0x76, 0x67, 0xAB, 0xE0, 0x58, - 0x2E, 0x22, 0xF4, 0x48, 0xE7, 0x3E, 0x44, 0xB6, - 0x6D, 0xD4, 0xBD, 0x46, 0xEB, 0x9E, 0x01, 0xF9, - 0xB3, 0x06, 0x6F, 0xBA, 0xEE, 0x06, 0x1F, 0xB9, - 0x22, 0xE3, 0x49, 0x27, 0x80, 0x86, 0xB5, 0x38, - 0x47, 0x77, 0x14, 0x68, 0x0B, 0xF2, 0x6C, 0x9A, - 0xF1, 0x1F, 0x20, 0xED, 0x86, 0xF9, 0xEE, 0x04, - 0x92, 0xBC, 0xAB, 0xB8, 0x6B, 0x4A, 0x9D, 0x63, - 0xEB, 0x1B, 0x69, 0x18, 0x3D, 0x81, 0x4D, 0x16, - 0x68, 0x63, 0xF1, 0x96, 0x96, 0x0B, 0x51, 0x66, - 0x93, 0xFE, 0x49, 0xEA, 0xF6, 0x55, 0x8A, 0x2A, - 0xD7, 0x2E, 0xD0, 0x2D, 0xBF, 0x85, 0xD5, 0x97, - 0x9D, 0x8D, 0x2D, 0xD3, 0xB3, 0x62, 0x61, 0xB6, - 0x3B, 0x7B, 0xD1, 0x17, 0xB3, 0xB4, 0x94, 0x2D, - 0xEC, 0x76, 0xD1, 0x39, 0x75, 0x39, 0xFA, 0xAA, - 0x5B, 0x47, 0x0D, 0x9F, 0xBC, 0xEC, 0x12, 0x4F, - 0x76, 0x7C, 0xCB, 0xAD, 0x19, 0x80, 0xCF, 0x65, - 0x7F, 0x1E, 0x64, 0x2D, 0xE7, 0xF1, 0x4B, 0x22, - 0x9D, 0xEE, 0x46, 0x48, 0xBA, 0x54, 0x32, 0x5D, - 0x33, 0xE0, 0x81, 0xF6, 0x9C, 0x2F, 0x1C, 0xBC, - 0x17, 0xCA, 0x34, 0x0C, 0x9A, 0xEF, 0x27, 0x8E, - 0x19, 0xD8, 0x8C, 0xC4, 0xED, 0x0C, 0x88, 0xBA, - 0x60, 0x8B, 0xCF, 0x84, 0xB8, 0xF0, 0x25, 0x8C, - 0x9E, 0xEA, 0x00, 0xE0, 0xB6, 0xC1, 0xAA, 0x02, - 0x51, 0xD9, 0xFF, 0xDA, 0x87, 0x9D, 0x62, 0xB1, - 0xD1, 0x52, 0x7D, 0xE8, 0xB1, 0xC2, 0x45, 0x7D, - 0x4D, 0xF8, - - 0x20, 0xC9, 0xAD, 0x20, 0xED, 0x26, 0x96, 0x8F, - 0xF9, 0xEA, 0xD1, 0x3C, 0x54, 0xA2, 0x45, 0xAF, - 0x13, 0x85, 0x90, 0x43, 0xC3, 0xFD, 0x90, 0xBA, - 0x19, 0xAF, 0xB3, 0x6F, 0x3E, 0xD7, 0x01, 0xB3, - 0xCD, 0x1F, 0xAC, 0x35, 0x48, 0x29, 0x7E, 0xE3, - 0x7B, 0x5F, 0x2A, 0x48, 0x86, 0x27, 0x43, 0xAA, - 0x9C, 0x30, 0x6A, 0x4B, 0x13, 0x77, 0x2D, 0xE5, - 0xB4, 0xB2, 0x66, 0x82, 0xC0, 0x4E, 0xDE, 0x81, - 0x18, 0x9E, 0x4A, 0xC4, 0x0A, 0x20, 0x2E, 0x70, - 0xED, 0x7D, 0x48, 0x28, 0xF8, 0xE4, 0x68, 0x01, - 0xEF, 0x54, 0x43, 0x42, 0x3A, 0xA8, 0x65, 0xC6, - 0xF5, 0x94, 0x19, 0x8A, 0x23, 0x75, 0xBD, 0x08, - 0xAE, 0xA4, 0x78, 0x42, 0xD1, 0xF4, 0xF0, 0xA3, - 0x5A, 0x21, 0x74, 0x1B, 0x90, 0xD8, 0x05, 0x99, - 0xA7, 0x22, 0x7C, 0x79, 0xE9, 0x7D, 0xFF, 0xB2, - 0x1F, 0x04, 0x37, 0xAE, 0xFA, 0xD5, 0x93, 0x97, - 0x32, 0x7E, 0xFD, 0xBB, 0xAC, 0x6E, 0x96, 0xA5, - 0x4F, 0xB4, 0x89, 0x21, 0xB1, 0x3F, 0xB2, 0x3D, - 0xFA, 0x08, 0xCE, 0xED, 0x70, 0x23, 0xAF, 0x75, - 0x22, 0xDE, 0x2E, 0x12, 0x37, 0xE4, 0xB9, 0x92, - 0xA2, 0xB0, 0x4D, 0x56, 0xDE, 0x5E, 0xD3, 0x7F, - 0xBF, 0xBD, 0x5E, 0x6F, 0x4A, 0xBA, 0xC3, 0x27, - 0x22, 0x19, 0xA3, 0x4E, 0x90, 0x2E, 0x72, 0x2E, - 0xEB, 0x6B, 0x48, 0xD5, 0xC6, 0x00, 0x94, 0x56, - 0x29, 0x74, 0x13, 0x0B, 0x85, 0xCF, 0xE5, 0x51, - 0x83, 0xB5, 0x20, 0x49, 0xF0, 0xC6, 0x08, 0xEE, - 0x18, 0x26, 0x19, - - 0x74, 0x41, 0x6D, 0x4E, 0x6C, 0x5E, 0x82, 0xB9, - 0xA6, 0x6E, 0x53, 0x6C, 0xEF, 0x7E, 0x43, 0x36, - 0x6A, 0xAA, 0x94, 0x99, 0xAA, 0x92, 0x44, 0xE6, - 0x41, 0x1D, 0x09, 0xE6, 0x5D, 0xF5, 0x8D, 0xCF, - 0x34, 0xE3, 0xAC, 0x10, 0x0B, 0x5D, 0xC1, 0x59, - 0xB7, 0x60, 0x6C, 0xCB, 0x75, 0x67, 0x85, 0x40, - 0xB8, 0x06, 0x54, 0xE0, 0xB7, 0xB9, 0x4E, 0x4A, - 0x52, 0xD0, 0x39, 0x9F, 0x2C, 0x01, 0xFE, 0xB2, - 0x09, 0x73, 0xA1, 0x6C, 0xD6, 0x0E, 0xB4, 0x8F, - 0x40, 0xA2, 0x15, 0x12, 0x88, 0x3D, 0x65, 0x49, - 0x0C, 0xE1, 0xF5, 0x95, 0xF4, 0xC0, 0xF2, 0x63, - 0x5F, 0xF6, 0x1B, 0xF2, 0x30, 0xC8, 0x5B, 0xE9, - 0xC0, 0x84, 0x0C, 0x6E, 0xDF, 0xC4, 0x19, 0xB9, - 0xCE, 0xA6, 0x49, 0xA5, 0x64, 0xE9, 0x66, 0xC3, - 0x6C, 0xE5, 0x93, 0x76, 0xAC, 0x59, 0x65, 0x0E, - 0xE6, 0xF5, 0x80, 0xCE, 0x1C, 0x72, 0x9A, 0x53, - 0xB0, 0xC7, 0xB6, 0x11, 0x65, 0xDE, 0xEC, 0x89, - 0x18, 0xD8, 0x05, 0x6E, 0x41, 0xD2, 0x31, 0xBD, - 0xDB, 0xE5, 0xEF, 0xF5, 0x76, 0x5C, 0xBD, 0x03, - 0x6D, 0x04, 0x00, 0x16, 0x64, 0x19, 0xFE, 0x4B, - 0x73, 0x9C, 0xDB, 0x31, 0x13, 0x50, 0xD6, 0xCB, - 0xE4, 0xFC, 0x73, 0x89, 0x0F, 0x50, 0x31, 0xBF, - 0x0E, 0xAB, 0xD8, 0xF2, 0x9C, 0xB8, 0x04, 0x88, - 0xAD, 0xE3, 0x9F, 0xDA, 0x0D, 0xE3, 0x5B, 0x34, - 0x94, 0xCB, 0x50, 0x61, 0xA4, 0x01, 0x03, 0xFA, - 0x4D, 0x85, 0xE4, 0x29, 0xFC, 0x11, 0x77, 0x97, - 0x75, 0x6D, 0xF3, 0xC1, - - 0x16, 0x34, 0x6D, 0x2E, 0x36, 0x03, 0xC4, 0x4E, - 0xC5, 0xB4, 0xF8, 0xFA, 0x20, 0x49, 0x81, 0x68, - 0x7E, 0xC8, 0xC2, 0x13, 0x18, 0x84, 0x0C, 0x84, - 0xE8, 0xBF, 0xD9, 0x0D, 0x1B, 0x9F, 0xF0, 0x1F, - 0x8D, 0x41, 0x56, 0x5F, 0xBB, 0x1A, 0x21, 0x5F, - 0x0B, 0x7E, 0x79, 0xFC, 0x7C, 0x72, 0xD5, 0x80, - 0x64, 0x8A, 0xFD, 0xC5, 0xF9, 0xDC, 0x61, 0x27, - 0x75, 0x65, 0x0A, 0x2C, 0x2A, 0x4C, 0xE9, 0x7A, - 0x3A, 0xFA, 0x1E, 0xE6, 0x2A, 0x31, 0xFD, 0xD1, - 0xA0, 0xD8, 0xBF, 0xAB, 0x40, 0x61, 0x87, 0x9F, - 0xA8, 0x65, 0x18, 0x7C, 0x87, 0xEE, 0xA2, 0x93, - 0xC2, 0xE4, 0xED, 0xEF, 0x5C, 0x3D, 0x09, 0xC8, - 0xD7, 0x75, 0x76, 0xF2, 0x1A, 0x9E, 0x19, 0xB8, - 0x44, 0xE8, 0xBE, 0x4F, 0x71, 0xD2, 0xEF, 0x0A, - 0x83, 0x1C, 0xFC, 0xA5, 0x6F, 0x43, 0x0A, 0x1D, - 0xDA, 0xD7, 0x4D, 0x14, 0xE3, 0x5C, 0x32, 0x74, - 0x45, 0x19, 0xC4, 0xF4, 0x3D, 0x5A, 0x6E, 0xEC, - 0x5E, 0x54, 0xF1, 0xB3, 0xF1, 0x4B, 0x05, 0x52, - 0x92, 0x41, 0x49, 0x27, 0x18, 0x40, 0x38, 0x4E, - 0x0A, 0x7D, 0xD1, 0x31, 0x0A, 0xC8, 0x82, 0x60, - 0x5A, 0xBE, 0x4A, 0x5A, 0xAE, 0xBE, 0x86, 0x7D, - 0x2B, 0x27, 0x07, 0x2C, 0xFA, 0x65, 0xB0, 0x73, - 0x50, 0x68, 0x58, 0x36, 0x50, 0x74, 0x61, 0x57, - 0xAB, 0xF4, 0xE8, 0xCD, 0xEE, 0xBB, 0x29, 0x68, - 0x0E, 0x6C, 0x38, 0x0E, 0x0C, 0xDC, 0x79, 0x12, - 0xC7, 0xF4, 0x25, 0x74, 0x66, 0xD6, 0xC1, 0xF6, - 0xF0, 0xF6, 0x1D, 0x27, 0xA1, - - 0xFA, 0x0C, 0xB5, 0xEE, 0x97, 0x04, 0x06, 0xF8, - 0x04, 0xE8, 0xBF, 0x1C, 0x3D, 0x19, 0x5A, 0x1C, - 0x04, 0xBC, 0x6F, 0x76, 0x50, 0x3D, 0x0C, 0xE7, - 0xCE, 0xE5, 0xDE, 0x6F, 0xA1, 0xE6, 0xA3, 0xE4, - 0x3C, 0xC6, 0x17, 0xBF, 0xDC, 0xDF, 0x56, 0xFC, - 0x63, 0xE9, 0x9F, 0x57, 0x0C, 0xF0, 0xA8, 0x19, - 0x1B, 0x8A, 0x33, 0xA3, 0xBF, 0xA8, 0xCD, 0xC4, - 0x24, 0x71, 0xA2, 0x4D, 0x2D, 0xF4, 0x3E, 0xB7, - 0xF9, 0xAD, 0x3B, 0xA9, 0xDF, 0xCF, 0x81, 0xBD, - 0x9A, 0x5A, 0x45, 0xC0, 0x94, 0xA2, 0xAF, 0x9A, - 0x86, 0xF6, 0xBF, 0x3B, 0x99, 0xDB, 0x1E, 0x41, - 0xFD, 0xA5, 0x57, 0xB3, 0x2E, 0x7B, 0x73, 0x4F, - 0x6A, 0xBF, 0xAD, 0x5F, 0x87, 0xFC, 0xA7, 0xEC, - 0xC9, 0xD6, 0x70, 0xDA, 0xED, 0x75, 0x84, 0x50, - 0x61, 0x7C, 0x73, 0x18, 0x8D, 0x7B, 0xF2, 0x47, - 0x85, 0x75, 0x0A, 0x19, 0xBF, 0xFE, 0x3B, 0x81, - 0x81, 0x15, 0x57, 0xD8, 0xE7, 0x13, 0xD6, 0xF6, - 0x0D, 0x49, 0xB9, 0x71, 0x23, 0x51, 0x3F, 0x6A, - 0x50, 0x70, 0xB6, 0x42, 0x18, 0xE9, 0xD9, 0xF5, - 0xEF, 0x60, 0x15, 0xE3, 0x73, 0xCD, 0x49, 0x09, - 0x4A, 0x87, 0x05, 0x5D, 0x45, 0xE1, 0x40, 0xAC, - 0x6E, 0xA0, 0xD0, 0x1C, 0xD4, 0xFE, 0x76, 0xE4, - 0xD8, 0x4E, 0x3E, 0x93, 0xC9, 0xC8, 0xC7, 0x4A, - 0x49, 0x8E, 0x79, 0x46, 0x5D, 0xB0, 0xEB, 0xDC, - 0x46, 0x88, 0x25, 0x5B, 0xE4, 0xE2, 0x0E, 0x0C, - 0xC9, 0xD3, 0xA2, 0x79, 0x1A, 0xF2, 0x94, 0xF2, - 0xC2, 0xE2, 0x98, 0x6E, 0x99, 0x87, - - 0xDE, 0xEE, 0x45, 0x68, 0x9D, 0xC8, 0x03, 0xC0, - 0x02, 0x41, 0x3D, 0x9F, 0x33, 0x70, 0x73, 0x62, - 0x96, 0x25, 0x02, 0xF4, 0x74, 0x5D, 0xE2, 0xF1, - 0x67, 0xF2, 0xFD, 0xE1, 0x65, 0x47, 0x33, 0x6D, - 0xF4, 0x86, 0x11, 0x7C, 0xD0, 0x48, 0x02, 0x7C, - 0xA7, 0x26, 0x85, 0x27, 0xBE, 0x13, 0x96, 0x85, - 0x40, 0x1F, 0x6A, 0xB0, 0x0D, 0x8E, 0xD2, 0x02, - 0xD7, 0x03, 0xFD, 0x45, 0xC8, 0x08, 0xED, 0x3E, - 0x32, 0x04, 0x30, 0x48, 0x63, 0xA3, 0x65, 0x8C, - 0x11, 0x9D, 0x7B, 0x65, 0xE9, 0x02, 0x37, 0xF3, - 0x9D, 0x0B, 0x5E, 0xAD, 0x9D, 0xFF, 0x7D, 0x56, - 0x3D, 0x50, 0x74, 0x37, 0xAD, 0x39, 0x06, 0x85, - 0x10, 0xC5, 0x69, 0x37, 0x57, 0x3C, 0x4F, 0xE8, - 0x4A, 0xAC, 0x1D, 0x06, 0xDA, 0x62, 0xB3, 0x3E, - 0x0B, 0xB0, 0xE4, 0x1F, 0x3F, 0x2F, 0x29, 0x88, - 0x14, 0xC1, 0xAE, 0xD1, 0x62, 0x89, 0xB7, 0xC5, - 0x51, 0x72, 0xFE, 0xE3, 0xDF, 0x56, 0x9E, 0xDB, - 0x37, 0xE4, 0x64, 0xAC, 0x99, 0x08, 0xF7, 0x87, - 0xFA, 0xCE, 0x5B, 0xF3, 0xCD, 0x21, 0xF6, 0x8A, - 0xED, 0xA3, 0x7B, 0xEC, 0x3F, 0x30, 0x14, 0x3D, - 0x00, 0xD4, 0x40, 0xBE, 0x35, 0x36, 0x89, 0xCF, - 0x29, 0xDA, 0x13, 0xE8, 0x69, 0x0D, 0xDE, 0xE8, - 0x05, 0x22, 0x0D, 0x02, 0x18, 0xDB, 0x12, 0xAC, - 0x01, 0x12, 0xD0, 0xEF, 0xD2, 0x82, 0x21, 0xC9, - 0xF7, 0x52, 0x94, 0x98, 0x0E, 0xE7, 0xCB, 0x9C, - 0x3F, 0xD1, 0x0D, 0xA6, 0x0C, 0x53, 0x60, 0x8B, - 0x13, 0x3F, 0x77, 0xD5, 0xDC, 0xC5, 0xE2, - - 0x7D, 0x3B, 0xAE, 0x67, 0x64, 0x19, 0xC8, 0x66, - 0xF1, 0x0F, 0x31, 0xAD, 0x43, 0x35, 0xD4, 0x44, - 0x2C, 0xA5, 0x5D, 0x76, 0x78, 0x70, 0x4C, 0x2F, - 0x71, 0x11, 0xB9, 0xF3, 0x69, 0x16, 0xFA, 0x09, - 0x42, 0xE7, 0x6C, 0x09, 0x2E, 0xDA, 0xEB, 0x9A, - 0x53, 0x82, 0x1D, 0x31, 0x3E, 0x3E, 0xD8, 0x48, - 0xEA, 0x86, 0xE8, 0x76, 0x8E, 0xC6, 0xA7, 0xEA, - 0xBB, 0x58, 0x7D, 0xB7, 0x39, 0x76, 0xEC, 0xE6, - 0x35, 0x19, 0xAA, 0xFA, 0x6E, 0x98, 0x2C, 0x38, - 0xC2, 0xA2, 0x0E, 0x36, 0xA9, 0x4F, 0x88, 0xDA, - 0x6E, 0x3D, 0x1C, 0xFB, 0x25, 0xF5, 0x96, 0x1E, - 0x18, 0xBE, 0xEB, 0x0A, 0x48, 0xB8, 0x5A, 0x42, - 0xD3, 0x77, 0xEB, 0xD1, 0x06, 0x93, 0x4D, 0x56, - 0xB0, 0x60, 0xAA, 0x72, 0x8B, 0xC4, 0x29, 0x2E, - 0xE5, 0x36, 0x53, 0x46, 0xA3, 0x4F, 0x27, 0xED, - 0xED, 0x0A, 0x19, 0xCC, 0xF1, 0x1C, 0xBB, 0x0C, - 0x43, 0x2C, 0x6E, 0x40, 0xCF, 0x0F, 0x58, 0x23, - 0xC0, 0xE1, 0x5F, 0x2A, 0x63, 0x06, 0xD0, 0x91, - 0x97, 0x9C, 0x16, 0x0E, 0x0A, 0xE6, 0xAF, 0x1D, - 0x7C, 0x07, 0xD6, 0xC4, 0x64, 0x01, 0xB9, 0xE4, - 0x6D, 0x75, 0x92, 0x4F, 0x35, 0x1B, 0x4C, 0x37, - 0xCE, 0x05, 0x88, 0x06, 0x08, 0x1C, 0xD6, 0x75, - 0xE2, 0x07, 0x2E, 0x54, 0x58, 0xA1, 0x00, 0x39, - 0xA4, 0x80, 0xBF, 0xB2, 0x1F, 0xC4, 0x69, 0xC1, - 0x3D, 0x4B, 0xFE, 0x7F, 0x20, 0x1F, 0x49, 0x8B, - 0x08, 0xC6, 0x33, 0x86, 0xEB, 0x7B, 0x3E, 0x16, - 0xDE, 0xE3, 0x34, 0xD8, 0x66, 0x04, 0x55, 0xBA, - - 0xBE, 0x42, 0xC4, 0xEA, 0xAB, 0x31, 0xF5, 0x2E, - 0xF3, 0xF6, 0xBC, 0x86, 0xB6, 0xA4, 0x48, 0x74, - 0x15, 0xE9, 0xA7, 0x65, 0xE6, 0xDA, 0xF0, 0x94, - 0x5F, 0x1F, 0xC4, 0xCA, 0xD3, 0xFE, 0x66, 0x78, - 0x03, 0xE3, 0xBE, 0x9D, 0xE8, 0xAC, 0x45, 0x29, - 0xFA, 0x59, 0xE0, 0xBA, 0xD0, 0xAC, 0x62, 0x9A, - 0xA6, 0x6F, 0x6C, 0x5B, 0x0E, 0x86, 0xC8, 0x3E, - 0xD6, 0xE2, 0x84, 0x31, 0x79, 0xD1, 0xAF, 0xCB, - 0x78, 0x1D, 0xF5, 0x1D, 0x76, 0x72, 0xCC, 0xAA, - 0x7A, 0x22, 0x35, 0xBD, 0x3A, 0x26, 0x7B, 0x2B, - 0x08, 0xD8, 0x27, 0x26, 0x07, 0xA2, 0xAA, 0x6E, - 0x30, 0x8C, 0x38, 0x70, 0x40, 0x3C, 0x61, 0x9F, - 0x5C, 0x57, 0x72, 0x9B, 0x5B, 0x4C, 0x20, 0xB0, - 0x84, 0x1A, 0x85, 0x0C, 0xF3, 0x3E, 0x5B, 0x67, - 0x3D, 0xF2, 0xB4, 0x4F, 0xB1, 0xE6, 0x3D, 0xDC, - 0xF1, 0x3C, 0x49, 0x9A, 0x38, 0x95, 0x47, 0xF2, - 0xCA, 0x43, 0xB7, 0x0A, 0x80, 0x06, 0x9F, 0x06, - 0x4D, 0x02, 0x98, 0x44, 0xB0, 0x8B, 0x73, 0xC6, - 0x26, 0x5B, 0x14, 0xA1, 0xF6, 0x64, 0x37, 0xDE, - 0xF2, 0x22, 0x1A, 0x59, 0x85, 0xAE, 0xFD, 0x5A, - 0xE5, 0x71, 0xC8, 0xCF, 0x6C, 0xFA, 0x64, 0x27, - 0xFF, 0x55, 0x45, 0x88, 0xA4, 0x5A, 0x50, 0x82, - 0x47, 0x61, 0x4C, 0xE5, 0x43, 0x9A, 0xA9, 0x5A, - 0xCC, 0xA3, 0xCA, 0x1B, 0xA0, 0x28, 0x65, 0x6E, - 0xA4, 0xCE, 0xE2, 0x17, 0x41, 0x07, 0x50, 0x31, - 0x76, 0xCB, 0x61, 0x14, 0xE3, 0x50, 0x68, 0x2B, - 0xF2, 0x96, 0x6B, 0xCF, 0xFE, 0xF7, 0x91, 0xD6, - 0x6F, - - 0x55, 0x68, 0x17, 0x44, 0xA4, 0xAE, 0x0A, 0xBE, - 0xB6, 0xF4, 0x72, 0xAA, 0x55, 0x65, 0x33, 0x22, - 0xC5, 0x86, 0x02, 0xC5, 0xB6, 0x13, 0x9B, 0x68, - 0x1E, 0xE8, 0xFD, 0x2D, 0xEB, 0x9E, 0xF2, 0x72, - 0xA3, 0xA7, 0x38, 0xC1, 0xDB, 0xDB, 0x72, 0x03, - 0xE9, 0x7E, 0x5B, 0x55, 0x12, 0x0A, 0x8B, 0x87, - 0x89, 0xA5, 0xB7, 0x93, 0xFA, 0x8E, 0x80, 0xAA, - 0xB5, 0xDC, 0xA4, 0x78, 0xD7, 0x76, 0x21, 0x7B, - 0xF0, 0x1B, 0x41, 0x89, 0x9F, 0x9C, 0x41, 0xE6, - 0xDE, 0x3A, 0xF6, 0x16, 0x66, 0xDF, 0xF1, 0xC9, - 0x59, 0x75, 0x18, 0xBE, 0xC5, 0xE3, 0x55, 0xA7, - 0x39, 0xF5, 0x04, 0xBA, 0x3A, 0x11, 0x53, 0x36, - 0x69, 0x58, 0x49, 0xC3, 0xB1, 0x4E, 0x65, 0x88, - 0xDA, 0x46, 0xB8, 0x79, 0x58, 0x32, 0x18, 0xBA, - 0x3E, 0x3C, 0x5C, 0x02, 0x34, 0xFD, 0xD1, 0x2F, - 0x32, 0xCA, 0x4D, 0x1A, 0x68, 0x3B, 0x73, 0xC6, - 0xD0, 0xA8, 0x71, 0x24, 0xA8, 0xD5, 0x82, 0x83, - 0x26, 0x99, 0xCA, 0x8E, 0xC9, 0x55, 0xF2, 0x92, - 0xD1, 0x95, 0x4E, 0xA7, 0x5F, 0x16, 0x56, 0xD7, - 0xEA, 0xCF, 0xD3, 0xC7, 0xD7, 0xEA, 0x79, 0xF4, - 0x12, 0xC4, 0x7E, 0x5B, 0xB3, 0x1D, 0xAE, 0x0A, - 0xFD, 0xE1, 0x9F, 0x27, 0xCC, 0x95, 0xC6, 0x03, - 0xFD, 0x2F, 0xD3, 0xC5, 0x4E, 0xEF, 0x42, 0x10, - 0xF4, 0x6B, 0x24, 0x78, 0x53, 0xC5, 0xE1, 0xB6, - 0xB7, 0x80, 0xBD, 0xEB, 0x65, 0x5B, 0xA8, 0xE5, - 0x8E, 0xE5, 0x7F, 0x1E, 0x5B, 0x93, 0xA4, 0xDD, - 0xD5, 0xAB, 0xF2, 0x4A, 0x75, 0xE0, 0xAC, 0xC1, - 0x0C, 0x2D, - - 0x3A, 0x63, 0xF3, 0x06, 0x48, 0xB8, 0x7A, 0x18, - 0x11, 0x6F, 0x96, 0x89, 0x2C, 0x01, 0x1F, 0x47, - 0x73, 0xF4, 0x9E, 0x28, 0x77, 0xE8, 0xCD, 0x57, - 0x36, 0x53, 0xB4, 0x33, 0x62, 0x83, 0x51, 0x7A, - 0x4A, 0x4D, 0xC3, 0xF7, 0x58, 0x19, 0x73, 0xB5, - 0xFF, 0x36, 0x3E, 0x63, 0xB0, 0xD1, 0x12, 0x07, - 0xB9, 0x17, 0xF1, 0xC6, 0x78, 0x79, 0xA1, 0x2D, - 0x4F, 0x00, 0xAF, 0xCD, 0xA3, 0x73, 0x09, 0xDD, - 0x9C, 0x3D, 0x8E, 0x6B, 0x2B, 0xA5, 0xF5, 0x91, - 0x1C, 0x2B, 0xFE, 0xB8, 0xE5, 0x6E, 0xA5, 0x9D, - 0x5D, 0x5C, 0x6A, 0xF2, 0xA1, 0x7E, 0x82, 0xB0, - 0x47, 0xB5, 0x53, 0xE4, 0x49, 0x00, 0x5B, 0x60, - 0x5C, 0x94, 0x6E, 0xD1, 0xDE, 0x27, 0x7C, 0xC2, - 0xA2, 0xFF, 0xB4, 0xAF, 0x5F, 0x52, 0x0F, 0x5B, - 0x3B, 0xA5, 0x48, 0x93, 0x90, 0x97, 0x30, 0x10, - 0x30, 0x96, 0x84, 0x68, 0x8D, 0xB4, 0x47, 0x9E, - 0x77, 0x23, 0x2A, 0x96, 0xA9, 0x29, 0x2E, 0xBC, - 0x40, 0x59, 0x92, 0xE4, 0x55, 0xD7, 0x30, 0x2E, - 0x62, 0x15, 0xA6, 0xEA, 0x77, 0x5D, 0x2C, 0x1C, - 0x10, 0xF5, 0x8A, 0x43, 0x2B, 0x72, 0xC3, 0xD0, - 0x9E, 0xB9, 0x80, 0x4C, 0x8D, 0xCD, 0x5B, 0xB5, - 0xAD, 0xF6, 0x44, 0xDD, 0x9D, 0x37, 0x8E, 0x28, - 0xF1, 0xB5, 0xCE, 0xF2, 0xDD, 0x35, 0x6F, 0x63, - 0xB3, 0x32, 0xAC, 0x13, 0x4B, 0xC9, 0x67, 0x58, - 0x63, 0x2F, 0xB4, 0x23, 0x0C, 0xA3, 0x4F, 0xF8, - 0xB6, 0x52, 0xE7, 0xD1, 0xA7, 0x0D, 0x0D, 0x5B, - 0x66, 0x1D, 0x77, 0x82, 0xCA, 0xE5, 0x11, 0x62, - 0xF4, 0xA9, 0x95, - - 0xE7, 0x1E, 0xF9, 0x44, 0xCD, 0x9F, 0xB5, 0xC5, - 0x80, 0xDC, 0x78, 0xA9, 0x4E, 0xAB, 0xD3, 0x1D, - 0xA9, 0xC6, 0xCC, 0x67, 0x49, 0xC2, 0x9C, 0x99, - 0x60, 0x86, 0xBA, 0x95, 0xDD, 0x10, 0x02, 0x37, - 0xE8, 0x2B, 0xF9, 0x2B, 0xB3, 0x97, 0x44, 0xDA, - 0xEF, 0x65, 0xB6, 0xB2, 0x0D, 0xA4, 0xAB, 0xFE, - 0xD7, 0x19, 0x07, 0xBD, 0x5B, 0xCC, 0x56, 0x78, - 0x90, 0xBA, 0x9C, 0x85, 0x7B, 0xD7, 0xDE, 0xD2, - 0x07, 0x29, 0xB2, 0x82, 0xF1, 0x37, 0x7A, 0x87, - 0xB9, 0x04, 0xF6, 0xE2, 0xC9, 0xF7, 0xDD, 0x1D, - 0xA4, 0x25, 0xB0, 0x18, 0x49, 0x72, 0x6F, 0x02, - 0xB1, 0x49, 0xB9, 0x15, 0xA6, 0x00, 0x87, 0x23, - 0x88, 0xED, 0xB7, 0xD5, 0xA2, 0x12, 0xC2, 0xA6, - 0xF3, 0x8A, 0x8C, 0x50, 0xE2, 0xC9, 0xBC, 0x62, - 0x50, 0xF8, 0x2C, 0xB1, 0x11, 0x00, 0x36, 0x79, - 0x13, 0x75, 0xFB, 0x87, 0xDA, 0x49, 0x59, 0x42, - 0x57, 0xDD, 0x7C, 0xE4, 0xFA, 0xD1, 0x5B, 0xF9, - 0xB5, 0xB8, 0x56, 0xB0, 0x98, 0xF9, 0x63, 0xB1, - 0x1B, 0xEC, 0xF7, 0x05, 0x4C, 0xBC, 0x32, 0x1C, - 0x59, 0xC8, 0x75, 0x7E, 0xBC, 0xAD, 0xCF, 0x32, - 0x1A, 0x3D, 0xAE, 0x1F, 0x27, 0x01, 0x85, 0x60, - 0xCB, 0xDE, 0xAB, 0x39, 0xFD, 0x1E, 0x45, 0x82, - 0x36, 0xC1, 0xC3, 0x69, 0xA7, 0xE4, 0x5B, 0x16, - 0x36, 0x5A, 0xD5, 0x20, 0x5E, 0x4D, 0x1C, 0xBA, - 0x6E, 0x28, 0x30, 0x66, 0xDA, 0x6C, 0x66, 0x42, - 0xD4, 0x9A, 0x98, 0x31, 0xF8, 0x11, 0x8A, 0xB5, - 0xF9, 0x9E, 0x96, 0xE9, 0x42, 0x0D, 0xDF, 0x28, - 0x2D, 0x03, 0xC6, 0xFF, - - 0x05, 0x1F, 0xCE, 0x41, 0xE4, 0x8C, 0x74, 0x81, - 0x36, 0x78, 0x17, 0x9E, 0x28, 0xCC, 0xA0, 0xA8, - 0x03, 0x13, 0xEB, 0x8D, 0xD9, 0xF5, 0x75, 0x8C, - 0x58, 0x0B, 0xA5, 0x3F, 0xB5, 0x5D, 0x48, 0x94, - 0xA9, 0x7D, 0x61, 0x34, 0x5F, 0x07, 0xA2, 0x84, - 0x6A, 0xF9, 0x6C, 0xCB, 0x4C, 0x5D, 0x2D, 0xB2, - 0x05, 0x0B, 0x03, 0x61, 0x4A, 0x68, 0xB3, 0xA2, - 0x08, 0x33, 0x68, 0xB0, 0xD9, 0x95, 0x63, 0x98, - 0xBA, 0xF9, 0x70, 0x81, 0xDC, 0x34, 0xD2, 0xA3, - 0x5C, 0x5E, 0x85, 0x22, 0x8D, 0xEB, 0xEE, 0x81, - 0xEC, 0xEE, 0x43, 0xAC, 0x70, 0x93, 0x2C, 0xBC, - 0x66, 0x33, 0x37, 0xD9, 0xE1, 0x71, 0x2F, 0xD0, - 0x5A, 0xB8, 0x32, 0x8C, 0xE7, 0x98, 0x13, 0x8C, - 0x61, 0x94, 0x6C, 0xAA, 0x38, 0xCF, 0xAD, 0xF6, - 0xBE, 0x40, 0xA9, 0x6F, 0x02, 0xFA, 0x16, 0x5C, - 0x70, 0x2E, 0x55, 0xCC, 0x5F, 0x5A, 0xF7, 0x07, - 0x95, 0xB0, 0x18, 0xB7, 0xF0, 0x4A, 0xFA, 0xCD, - 0xB4, 0xA8, 0x92, 0x3F, 0x71, 0xED, 0x8F, 0x54, - 0xC0, 0x35, 0x1F, 0x2E, 0xC7, 0xF2, 0xBE, 0x4B, - 0x96, 0x4F, 0x05, 0xB7, 0x3E, 0x9E, 0x40, 0xA9, - 0x2A, 0xC7, 0x1C, 0x2D, 0x91, 0x5A, 0xBB, 0x31, - 0xB1, 0x4F, 0xE1, 0x3F, 0x34, 0x27, 0x4D, 0xAD, - 0x19, 0x34, 0xC5, 0x4F, 0x2C, 0x32, 0x24, 0x3E, - 0x9E, 0x50, 0x1F, 0xC2, 0x57, 0x63, 0xFF, 0x45, - 0xBE, 0x73, 0x72, 0xED, 0xE6, 0x01, 0x35, 0x33, - 0xCD, 0x14, 0xC2, 0xF4, 0xFB, 0xEF, 0x47, 0x55, - 0x3F, 0x4B, 0xD0, 0x05, 0xF0, 0x38, 0x2A, 0x37, - 0xAF, 0x02, 0xD9, 0x25, 0xDD, - - 0x20, 0xCE, 0x9F, 0xBC, 0x8E, 0x72, 0x30, 0xBB, - 0xE1, 0xC8, 0x3C, 0x08, 0x89, 0x34, 0x73, 0x4C, - 0x8D, 0x0C, 0x00, 0x1E, 0xA4, 0xD4, 0xDA, 0x55, - 0x18, 0x8C, 0xF0, 0xA4, 0x2F, 0xE9, 0x06, 0x30, - 0xDE, 0x73, 0xDA, 0x14, 0xA8, 0x82, 0xC3, 0x94, - 0xAE, 0x12, 0xC5, 0x55, 0x5B, 0x15, 0x42, 0x75, - 0x7A, 0xC3, 0x79, 0x05, 0x09, 0x63, 0x9A, 0xC4, - 0xD4, 0xCA, 0x1D, 0x08, 0x75, 0x68, 0x78, 0x07, - 0x7D, 0xD2, 0x37, 0xEB, 0x8B, 0x25, 0xAC, 0xF4, - 0x90, 0x5F, 0x4A, 0x2D, 0xE4, 0x4F, 0x08, 0x3B, - 0x3D, 0xF3, 0x9F, 0xA4, 0x8E, 0xEE, 0xE6, 0x47, - 0x4F, 0x3A, 0x6D, 0xBC, 0xB7, 0xA9, 0x4C, 0x1D, - 0x82, 0x4E, 0x7A, 0x29, 0xC9, 0x01, 0xFF, 0xC6, - 0x6F, 0x63, 0x4C, 0xE3, 0x0A, 0x10, 0x3F, 0x07, - 0xB4, 0x3F, 0x71, 0x55, 0x8D, 0xE3, 0xEF, 0xFC, - 0x76, 0xF6, 0x0A, 0xC3, 0xE9, 0xA9, 0x28, 0x03, - 0xB0, 0xDF, 0x15, 0x0E, 0xD0, 0x68, 0x17, 0x7D, - 0xC7, 0xC2, 0x51, 0x1A, 0x0D, 0x24, 0x21, 0x21, - 0x45, 0xFF, 0xEA, 0x17, 0xFB, 0xBF, 0x59, 0x63, - 0x03, 0x4F, 0x62, 0xEF, 0x1C, 0xDA, 0xF5, 0x00, - 0x8F, 0x9D, 0x2B, 0x81, 0x62, 0x9F, 0xED, 0xA6, - 0x6D, 0xA0, 0x57, 0x16, 0x08, 0x9E, 0x07, 0xB9, - 0xF3, 0x8B, 0x78, 0xA8, 0x6E, 0x15, 0x53, 0x26, - 0xE5, 0x7A, 0xE4, 0xBA, 0x09, 0xC6, 0x25, 0x41, - 0x1A, 0x24, 0x9B, 0xE0, 0x16, 0x62, 0xCF, 0x67, - 0xB6, 0xA1, 0xEF, 0x8B, 0x4D, 0xCC, 0xC3, 0xB6, - 0xB6, 0x89, 0x6C, 0x79, 0x02, 0x56, 0x79, 0x87, - 0xF4, 0xA7, 0x4B, 0x1D, 0xBC, 0xC0, - - 0x34, 0xF6, 0x75, 0xEA, 0x0F, 0x48, 0x36, 0xB3, - 0x59, 0x85, 0x62, 0x0F, 0xEF, 0x08, 0xA8, 0xEB, - 0x6F, 0x83, 0x96, 0x3D, 0xDA, 0x81, 0x49, 0xF3, - 0x9D, 0xBD, 0x99, 0x93, 0x3B, 0x86, 0xF3, 0x9F, - 0xEF, 0x0F, 0x16, 0x0F, 0xBD, 0x58, 0x11, 0x93, - 0x1E, 0xF2, 0xAB, 0x31, 0xB0, 0x2E, 0x8B, 0x3D, - 0x57, 0x97, 0x6F, 0x54, 0xA2, 0x75, 0x04, 0xBE, - 0x9E, 0xF2, 0x57, 0x23, 0xC7, 0x3C, 0x4A, 0x4B, - 0xF0, 0xBC, 0x61, 0x53, 0x88, 0xC5, 0x91, 0x34, - 0x58, 0xEE, 0x16, 0xA3, 0xB7, 0x68, 0xDE, 0x60, - 0x99, 0x50, 0xF6, 0x3B, 0x14, 0x55, 0xC0, 0xE7, - 0xEE, 0x34, 0xA4, 0x29, 0xED, 0xD5, 0x5E, 0x6A, - 0xD2, 0xAD, 0x09, 0xCD, 0x21, 0x63, 0x7D, 0xAD, - 0xCC, 0xB1, 0x15, 0xD4, 0x4A, 0x12, 0x7A, 0xD2, - 0xB5, 0xE3, 0x79, 0x7A, 0x88, 0xFE, 0x57, 0x77, - 0xB9, 0xE6, 0x08, 0xE4, 0xA4, 0x62, 0x7A, 0xED, - 0xBF, 0x4F, 0xC2, 0xD8, 0x66, 0x4A, 0x3D, 0xA8, - 0xEC, 0xC6, 0x1C, 0xE7, 0xAF, 0xC4, 0x2B, 0x3B, - 0xB5, 0x5D, 0xF0, 0x33, 0xBA, 0xF2, 0x61, 0x99, - 0x92, 0xCF, 0x34, 0x19, 0x99, 0x43, 0xF5, 0x9F, - 0xF6, 0x64, 0x5A, 0x40, 0x87, 0x53, 0x2D, 0x16, - 0x75, 0x68, 0x31, 0xAA, 0x61, 0xCF, 0x1F, 0xC3, - 0x32, 0x5B, 0x78, 0xFB, 0x8D, 0x67, 0x1F, 0x16, - 0x80, 0x3A, 0x7E, 0x05, 0x45, 0x7A, 0x5E, 0x43, - 0x0A, 0x2E, 0xE1, 0x22, 0xA8, 0x96, 0x79, 0xD5, - 0xC4, 0x2E, 0xE0, 0x1F, 0x43, 0x1B, 0x8D, 0xDC, - 0xBA, 0xCF, 0x7D, 0xF2, 0xD1, 0x70, 0xF6, 0x65, - 0x44, 0xCE, 0x2B, 0x08, 0x0D, 0x43, 0xC4, - - 0xF1, 0x1E, 0x0E, 0xFC, 0x7A, 0x10, 0x39, 0x3A, - 0x1E, 0xAD, 0x9E, 0x81, 0xC9, 0x04, 0xDB, 0x02, - 0x15, 0xC4, 0x9F, 0x6F, 0xD8, 0xF4, 0xCE, 0x77, - 0x00, 0x46, 0xB9, 0x0C, 0xD1, 0x4B, 0x1D, 0x6C, - 0x44, 0xFA, 0x19, 0x09, 0xB6, 0xEB, 0x34, 0x4A, - 0xC2, 0xDF, 0xF3, 0xF2, 0xE7, 0x3A, 0xE3, 0x6C, - 0xD4, 0xAF, 0x22, 0xFF, 0x40, 0xBC, 0x5C, 0x4A, - 0xBA, 0x7E, 0x54, 0xB1, 0xDB, 0xDF, 0x02, 0x2D, - 0xC2, 0xAD, 0x7B, 0x3E, 0x4C, 0x8E, 0x42, 0x97, - 0xDA, 0x00, 0xAA, 0x9F, 0x6A, 0x33, 0xB1, 0xFF, - 0xBB, 0x5E, 0x5F, 0x10, 0xE6, 0xA0, 0xF3, 0x25, - 0x8B, 0xAC, 0x36, 0xCF, 0xB6, 0x4A, 0x4D, 0x12, - 0x77, 0xDA, 0x17, 0xC5, 0xD5, 0xD2, 0xCB, 0xA1, - 0x95, 0xBB, 0xF1, 0xC9, 0xD8, 0xD3, 0xC1, 0xCC, - 0x67, 0xCE, 0xAB, 0x2B, 0x6A, 0x69, 0x41, 0x7C, - 0x7A, 0x47, 0x25, 0xE8, 0x39, 0xDC, 0x29, 0x31, - 0x36, 0x20, 0xA0, 0x58, 0x2A, 0x1A, 0xF0, 0x22, - 0xB9, 0x04, 0x10, 0xDA, 0x42, 0x2A, 0x6E, 0x1F, - 0x78, 0x01, 0x7C, 0x05, 0xE3, 0x1B, 0xA1, 0xC3, - 0x1A, 0x26, 0xA6, 0xF6, 0xBF, 0x54, 0xE9, 0x45, - 0x7F, 0x87, 0x08, 0xB8, 0xAF, 0xF0, 0xF0, 0xB4, - 0x96, 0xA4, 0xE3, 0xC0, 0x6A, 0x0B, 0xF9, 0x49, - 0x89, 0x1B, 0x9E, 0x69, 0x42, 0xD8, 0x21, 0x57, - 0x20, 0xC3, 0x95, 0xE5, 0xC6, 0x98, 0x06, 0x5E, - 0x69, 0x1F, 0x14, 0x8E, 0x9F, 0xF8, 0x58, 0x7C, - 0xEE, 0x13, 0xC7, 0x96, 0xC1, 0xE7, 0x71, 0x88, - 0x96, 0x54, 0xF9, 0xA7, 0xD6, 0x56, 0x7B, 0x8C, - 0xA5, 0x44, 0x42, 0xD3, 0x6B, 0x2E, 0x2E, 0x03, - - 0x7D, 0x39, 0xA9, 0xFF, 0x6A, 0x3D, 0x14, 0x95, - 0x1C, 0xB6, 0xD8, 0x13, 0x4E, 0x41, 0xF5, 0xD5, - 0x3F, 0x0F, 0xEC, 0x55, 0x1E, 0xAC, 0x95, 0x79, - 0x28, 0x5D, 0xBD, 0xBE, 0xC4, 0x7D, 0x31, 0x1F, - 0x64, 0x11, 0x9D, 0x0B, 0x8F, 0x06, 0xAB, 0x23, - 0x2D, 0x8D, 0xC4, 0x10, 0xE7, 0x20, 0x95, 0x60, - 0x76, 0xFC, 0xFA, 0xE3, 0x64, 0xC3, 0x67, 0x32, - 0xFA, 0x3D, 0x5D, 0x8F, 0xEA, 0xE3, 0x4F, 0x95, - 0x0A, 0x37, 0x4A, 0x30, 0x98, 0x93, 0x76, 0x20, - 0x7F, 0xB7, 0xA9, 0xE0, 0x6C, 0x42, 0xE7, 0xF8, - 0x57, 0xC8, 0xBE, 0xD3, 0x7A, 0x1E, 0xBE, 0xF8, - 0x30, 0x8C, 0x29, 0x95, 0x71, 0x29, 0xFD, 0x79, - 0x0E, 0x1D, 0xDD, 0x4B, 0x41, 0xE9, 0x5F, 0x7E, - 0xF5, 0x4C, 0x7F, 0xA2, 0x10, 0x06, 0x57, 0x86, - 0xAB, 0x10, 0xBF, 0x5A, 0xFE, 0xA2, 0x5F, 0xE8, - 0x70, 0x8F, 0xCC, 0x00, 0xD9, 0x86, 0x86, 0x2C, - 0x31, 0x2E, 0xF9, 0xAD, 0x56, 0x0C, 0xE9, 0xB9, - 0x42, 0x39, 0x3B, 0x0D, 0x47, 0x60, 0x6F, 0xF9, - 0xFB, 0xE8, 0xBE, 0xFC, 0x7D, 0x0B, 0xA3, 0xEC, - 0x09, 0x6E, 0x0E, 0x0B, 0x6D, 0xEC, 0x60, 0x17, - 0xE9, 0x34, 0x65, 0x6F, 0xA4, 0x84, 0x61, 0x13, - 0xB2, 0xA6, 0xD3, 0x56, 0x06, 0xD9, 0xAE, 0x9A, - 0x57, 0x78, 0x93, 0xF2, 0x86, 0xA5, 0x39, 0x27, - 0x20, 0x36, 0x7A, 0xE7, 0xDE, 0x63, 0x02, 0x90, - 0x52, 0x3B, 0x7D, 0x32, 0x24, 0xFA, 0x77, 0x3A, - 0xFF, 0x6D, 0x6D, 0x38, 0xB1, 0xDC, 0x78, 0x06, - 0x5A, 0xCE, 0x72, 0xE9, 0x72, 0x22, 0x72, 0x60, - 0x90, 0x25, 0x72, 0x00, 0x28, 0xA2, 0xC0, 0x4A, - 0x31, - - 0xFE, 0xCE, 0x1F, 0x8E, 0xEF, 0xB9, 0x81, 0xD1, - 0x1D, 0x7F, 0x88, 0x64, 0xF5, 0x96, 0xE5, 0xD0, - 0xCD, 0x3E, 0xBE, 0x2D, 0x39, 0x22, 0x61, 0xBA, - 0xC9, 0x91, 0xA1, 0xF6, 0x6E, 0x5F, 0x7E, 0x2A, - 0x90, 0xD0, 0x26, 0xB7, 0x6D, 0x1B, 0xAE, 0xE2, - 0x54, 0xDE, 0x79, 0xF8, 0x39, 0x1E, 0xA0, 0xFC, - 0x65, 0xE1, 0x45, 0x22, 0x7A, 0x1A, 0x06, 0x0A, - 0xBB, 0x59, 0x41, 0xF5, 0xCF, 0xC0, 0x4C, 0x76, - 0xB7, 0x98, 0xF8, 0x2F, 0x32, 0xE6, 0x5B, 0xC3, - 0x70, 0xF3, 0xF5, 0x18, 0xC5, 0x0B, 0xAF, 0x82, - 0x4A, 0x17, 0xEF, 0xA5, 0x96, 0xE2, 0x20, 0xBA, - 0xE5, 0x23, 0x55, 0xD2, 0x85, 0xA3, 0x1C, 0x1E, - 0x46, 0xDA, 0xCF, 0xD3, 0xAC, 0x56, 0xF6, 0x94, - 0xFE, 0x14, 0xBB, 0x15, 0xD6, 0xA0, 0xF3, 0x5B, - 0x5C, 0x62, 0xA3, 0xEC, 0xF8, 0x23, 0x75, 0x62, - 0x5D, 0xB9, 0x47, 0x46, 0x25, 0xF1, 0x9E, 0x88, - 0xC0, 0xF7, 0x5A, 0xC2, 0xA7, 0x97, 0xEA, 0xB1, - 0x35, 0x70, 0x02, 0x33, 0x29, 0xA9, 0xF9, 0x36, - 0xC8, 0xF0, 0x70, 0xCB, 0xD0, 0xD4, 0x07, 0x26, - 0xD6, 0x9C, 0x62, 0x37, 0xEB, 0xDD, 0xE1, 0x71, - 0x10, 0x49, 0x52, 0x86, 0x71, 0xC1, 0xB7, 0x78, - 0xE4, 0x85, 0xC2, 0x34, 0x3E, 0x83, 0xF2, 0xBE, - 0x31, 0x51, 0x65, 0xF4, 0x42, 0xE4, 0x66, 0x85, - 0xE8, 0xEF, 0xDD, 0xD9, 0xE0, 0x41, 0x3E, 0x25, - 0xF2, 0x9D, 0xCA, 0x48, 0xF3, 0x55, 0x99, 0x83, - 0xD6, 0xF3, 0x96, 0x37, 0xF5, 0x18, 0x90, 0x2E, - 0xA4, 0xA7, 0xE1, 0x08, 0x89, 0xFA, 0x54, 0x22, - 0xE8, 0x1D, 0x8E, 0xFE, 0x94, 0xED, 0x86, 0xF2, - 0x21, 0xE4, - - 0xE1, 0x07, 0xBB, 0xC9, 0x51, 0x1C, 0xA7, 0x07, - 0xE9, 0x61, 0x25, 0xB4, 0x69, 0x8D, 0x72, 0xF1, - 0xF0, 0x12, 0xBB, 0x01, 0xD0, 0xCA, 0x4F, 0x29, - 0x42, 0x6B, 0x97, 0x7E, 0xC1, 0x8B, 0x1D, 0x9B, - 0x64, 0xD9, 0x21, 0x24, 0xF3, 0xE0, 0xEA, 0x72, - 0xD3, 0x5E, 0xEB, 0x71, 0x27, 0xEE, 0xEF, 0x09, - 0x3A, 0xDF, 0x73, 0x2E, 0xBE, 0x30, 0x57, 0xCD, - 0xEB, 0x49, 0x28, 0x83, 0x58, 0xB6, 0xBB, 0x91, - 0x90, 0xAC, 0x38, 0xBF, 0xC5, 0x6A, 0x6F, 0x6E, - 0x2F, 0xFF, 0x98, 0xD2, 0xFF, 0xE1, 0xB6, 0x5C, - 0x10, 0x3F, 0xBB, 0xA5, 0xDB, 0xC8, 0x56, 0x64, - 0x0D, 0xD6, 0xBE, 0xD2, 0x76, 0xF0, 0x33, 0xA0, - 0x37, 0xD1, 0xC6, 0xF1, 0x32, 0x96, 0x84, 0x17, - 0xE9, 0x4D, 0x37, 0x1B, 0x76, 0x60, 0x5F, 0xAA, - 0xD0, 0x70, 0xEF, 0xA7, 0x83, 0x48, 0xC6, 0xAE, - 0xB0, 0xCF, 0x6B, 0x72, 0x2D, 0x43, 0x7A, 0x7C, - 0x18, 0x25, 0x6B, 0xC7, 0x16, 0x60, 0x5C, 0x5D, - 0xF9, 0x1E, 0xE4, 0x0B, 0xAD, 0x7B, 0x06, 0x23, - 0xCA, 0xB8, 0x46, 0x05, 0xFC, 0x47, 0xBF, 0xCC, - 0xF7, 0x78, 0x9A, 0xB6, 0xDE, 0x12, 0xA0, 0x5D, - 0x1C, 0x1B, 0xF5, 0x36, 0x77, 0x9E, 0x8F, 0x95, - 0x7E, 0x3F, 0x5F, 0x82, 0xE7, 0xF5, 0x3D, 0xF6, - 0xEF, 0x13, 0x95, 0xB5, 0xEE, 0x3B, 0x1F, 0x0E, - 0x20, 0x02, 0xEA, 0x85, 0xFB, 0x09, 0x84, 0xCE, - 0x93, 0x8D, 0x48, 0x67, 0xCC, 0xA0, 0x98, 0x2E, - 0xFF, 0xD4, 0x5D, 0x45, 0x81, 0x0D, 0x43, 0xA5, - 0xD5, 0xC9, 0xD1, 0x4D, 0x5B, 0x3A, 0x9F, 0x4D, - 0x85, 0x8E, 0x95, 0x6A, 0xD7, 0x98, 0x85, 0x95, - 0x6F, 0x3E, 0x1E, - - 0x8F, 0x79, 0x64, 0x19, 0x20, 0xB6, 0x73, 0xAD, - 0x05, 0xF9, 0x92, 0xB5, 0x64, 0xFD, 0x00, 0x8A, - 0xD1, 0x35, 0x86, 0xF9, 0x1B, 0x1C, 0x6C, 0x48, - 0x2A, 0x54, 0x07, 0xCD, 0x59, 0xD7, 0xC2, 0x1B, - 0xA5, 0xF6, 0x25, 0x80, 0xF2, 0xC7, 0x4D, 0xE6, - 0xC8, 0xB1, 0x6B, 0x02, 0x90, 0x19, 0x82, 0xCD, - 0xEB, 0x35, 0xC5, 0xB9, 0x9C, 0xE6, 0x18, 0xBF, - 0xD5, 0xFA, 0x16, 0x72, 0x5E, 0x41, 0x1B, 0x85, - 0xB3, 0xA6, 0x96, 0xA8, 0x3C, 0x84, 0x7A, 0xB9, - 0xCE, 0xA5, 0x18, 0xA8, 0xE5, 0x78, 0x9C, 0x1D, - 0x2D, 0x5F, 0x8C, 0x7C, 0x09, 0xF9, 0xE5, 0xFB, - 0xDD, 0x56, 0xD9, 0x95, 0x60, 0xB1, 0x12, 0xD6, - 0x86, 0x6C, 0x3B, 0xE8, 0x2C, 0x22, 0xE3, 0xAB, - 0xEF, 0xC5, 0x8E, 0x0A, 0x3F, 0x6E, 0x3A, 0x1B, - 0x5D, 0x39, 0x96, 0x1B, 0xC3, 0x8B, 0x59, 0x1C, - 0xC3, 0xE4, 0x10, 0xD7, 0x29, 0x43, 0x14, 0xEB, - 0x63, 0x88, 0x53, 0x6E, 0x44, 0x8F, 0xAD, 0x5A, - 0xDD, 0xF4, 0x8A, 0xD0, 0x20, 0x21, 0x02, 0x6B, - 0x81, 0x05, 0xB1, 0xC4, 0xD2, 0xA1, 0x48, 0x70, - 0xF7, 0x66, 0xE3, 0xBE, 0x15, 0xB5, 0xF5, 0x43, - 0x66, 0x12, 0x94, 0x56, 0x88, 0x31, 0xE6, 0xAC, - 0xC4, 0x54, 0x48, 0x9F, 0x51, 0x09, 0x3D, 0x95, - 0xA4, 0x83, 0x62, 0xD8, 0x47, 0x3D, 0xEB, 0xC4, - 0x5B, 0x6D, 0x38, 0x98, 0x93, 0x89, 0xF0, 0x1C, - 0x40, 0x00, 0x02, 0xE6, 0xCA, 0xDB, 0x95, 0xE6, - 0x8E, 0x44, 0xE0, 0x5F, 0xC9, 0x62, 0x55, 0x3F, - 0xC8, 0x48, 0x5D, 0x12, 0xE7, 0x01, 0x87, 0x5C, - 0x07, 0xF3, 0x0E, 0x0F, 0xD7, 0x89, 0x04, 0x3F, - 0x2A, 0x10, 0x70, 0xCC, - - 0x3C, 0xB9, 0x3D, 0x28, 0x90, 0xEB, 0x21, 0x7D, - 0x9E, 0xCC, 0x4D, 0xA5, 0x84, 0xF6, 0x96, 0x93, - 0x5D, 0x12, 0x84, 0x9E, 0x71, 0x56, 0x5C, 0xD4, - 0x71, 0xB9, 0x9F, 0xDF, 0x2B, 0x51, 0x43, 0xC5, - 0x1E, 0x98, 0xBE, 0x8D, 0xB8, 0xFE, 0x3A, 0x9C, - 0x22, 0x25, 0xF2, 0x0F, 0x7F, 0x52, 0xB3, 0x9A, - 0xB6, 0xD8, 0x31, 0xE9, 0xC3, 0x9A, 0x86, 0x89, - 0xB6, 0x1B, 0x63, 0x3F, 0xC0, 0x37, 0x7D, 0xFF, - 0x80, 0xC3, 0x28, 0x0D, 0xF1, 0x09, 0xB1, 0xD1, - 0x38, 0xA8, 0x99, 0xD9, 0x81, 0x32, 0x62, 0x16, - 0xDE, 0x2D, 0x16, 0x07, 0x78, 0x5D, 0xCB, 0xB8, - 0x3E, 0xB8, 0x01, 0x5A, 0xB5, 0x21, 0x6E, 0xA1, - 0x7B, 0xD8, 0x64, 0x00, 0xFC, 0x6B, 0xDF, 0xA4, - 0x4D, 0x07, 0x81, 0xEE, 0x76, 0x69, 0x43, 0x9F, - 0x90, 0x09, 0x24, 0x26, 0x72, 0xC5, 0x2F, 0xF5, - 0x50, 0x31, 0xC9, 0xB9, 0x3B, 0xAE, 0xDE, 0x1F, - 0x6B, 0xCC, 0xFA, 0xC6, 0xCB, 0xBC, 0xEC, 0x75, - 0x91, 0x3A, 0x0C, 0x5D, 0x13, 0xB9, 0x3E, 0x16, - 0x3C, 0xE4, 0xAC, 0x56, 0x60, 0x0C, 0x92, 0x2D, - 0x05, 0xD6, 0x1A, 0x01, 0xC4, 0x94, 0xAD, 0x19, - 0xEE, 0x3C, 0x79, 0x5D, 0x5C, 0x49, 0x8A, 0x67, - 0xAF, 0x19, 0x1B, 0xBA, 0x2C, 0x30, 0xA2, 0x47, - 0xF2, 0x35, 0x00, 0x15, 0xF0, 0x7B, 0xC1, 0xA2, - 0xB3, 0x9C, 0x49, 0x83, 0x81, 0x26, 0x71, 0x7E, - 0xF0, 0x34, 0x01, 0x02, 0xC0, 0xDE, 0x44, 0xFA, - 0xFA, 0x5F, 0x84, 0xBA, 0x23, 0x16, 0x39, 0x29, - 0x77, 0xD7, 0x5D, 0x17, 0xBA, 0x9A, 0x39, 0x93, - 0xBE, 0xBB, 0x01, 0x67, 0xD6, 0x23, 0x2B, 0x7F, - 0x9E, 0x29, 0x61, 0xCC, 0x4D, - - 0xCE, 0x24, 0x29, 0x8D, 0x54, 0x03, 0x84, 0x07, - 0xF8, 0x5A, 0x69, 0x9A, 0x3E, 0x01, 0xF5, 0x63, - 0xFC, 0x16, 0xB6, 0xF0, 0x20, 0x39, 0x81, 0x10, - 0xCD, 0x82, 0xD5, 0x5D, 0xAE, 0xED, 0xA6, 0x86, - 0xA5, 0xFF, 0xF8, 0x85, 0x6E, 0x0A, 0x36, 0x2F, - 0x6B, 0xF6, 0x62, 0xAB, 0x12, 0xE6, 0x41, 0x2B, - 0x3D, 0x4D, 0xDB, 0x80, 0x26, 0xC9, 0xAD, 0xE4, - 0x93, 0x05, 0x0C, 0x28, 0x23, 0xFF, 0x9B, 0xBF, - 0x85, 0x43, 0x82, 0xCD, 0x6E, 0x5F, 0xD4, 0x08, - 0x31, 0xFA, 0x52, 0x78, 0x99, 0x15, 0xD0, 0xD5, - 0xBD, 0x7C, 0xD4, 0x91, 0xCB, 0x0F, 0x53, 0xE7, - 0x5D, 0x53, 0xE8, 0xDA, 0xAB, 0x32, 0xDF, 0xD8, - 0xCF, 0xF5, 0x95, 0xF1, 0x41, 0xCF, 0x37, 0x2B, - 0xF0, 0x51, 0x93, 0x33, 0xAA, 0xFF, 0x36, 0x07, - 0x3C, 0xF9, 0x40, 0x18, 0x05, 0xA6, 0x1B, 0xEF, - 0x9E, 0x5E, 0x71, 0x77, 0x75, 0xD2, 0x23, 0xD6, - 0x0F, 0x5A, 0x84, 0x73, 0x6C, 0x23, 0x17, 0x18, - 0x78, 0x84, 0x41, 0xEC, 0x76, 0xD5, 0x66, 0xDE, - 0xF3, 0x22, 0x6E, 0x03, 0xD0, 0xF0, 0xFE, 0x67, - 0x8C, 0x4B, 0x4F, 0x43, 0xC8, 0x94, 0xBE, 0x8D, - 0x3C, 0x34, 0xA9, 0x1E, 0xC2, 0x27, 0x64, 0x90, - 0x13, 0x85, 0xA7, 0xC1, 0xC9, 0xF3, 0x6E, 0x50, - 0x0B, 0xD5, 0xD1, 0x38, 0xB0, 0x53, 0x0D, 0xDC, - 0x5A, 0xE8, 0x6B, 0x30, 0x91, 0xA2, 0x73, 0xDA, - 0x5C, 0xB3, 0x77, 0x36, 0xBC, 0xE1, 0xBF, 0xE0, - 0x85, 0x3B, 0xAC, 0x73, 0x13, 0xD1, 0x72, 0x0D, - 0x36, 0x47, 0xAE, 0x77, 0xA9, 0x91, 0x3B, 0x65, - 0x3F, 0x20, 0xED, 0x65, 0x02, 0x98, 0xAE, 0x1B, - 0x6B, 0x22, 0x17, 0x9F, 0x10, 0x64, - - 0x43, 0xA6, 0xF3, 0x60, 0x88, 0x3A, 0x74, 0x66, - 0xA5, 0x48, 0xB2, 0x8F, 0x82, 0x94, 0xCC, 0xFD, - 0xCB, 0x15, 0x13, 0x60, 0x9B, 0xE4, 0x97, 0x96, - 0x2E, 0x36, 0xF9, 0xB3, 0x7B, 0xEC, 0xF1, 0xC3, - 0x54, 0xF0, 0xBB, 0xA0, 0xA8, 0x4A, 0x28, 0xB7, - 0x3A, 0x2E, 0xEC, 0x36, 0x5D, 0x0F, 0x26, 0xDE, - 0x3A, 0x24, 0x53, 0x13, 0x3F, 0xEA, 0x7C, 0x03, - 0xEB, 0x83, 0x53, 0x76, 0x8E, 0x83, 0xBC, 0x15, - 0x77, 0x04, 0xCC, 0xEF, 0x16, 0x7A, 0x40, 0xBA, - 0x14, 0xAB, 0x79, 0xB3, 0x2C, 0x18, 0xCE, 0xEC, - 0xC0, 0xF0, 0x66, 0x61, 0x99, 0xF7, 0x31, 0x3C, - 0x69, 0x66, 0xB5, 0xC0, 0xF4, 0x22, 0x4E, 0xCC, - 0x8A, 0xE9, 0xAC, 0x94, 0xC7, 0xC4, 0xC0, 0x88, - 0xCB, 0xF3, 0x4C, 0x49, 0xD1, 0x87, 0x55, 0xB8, - 0x15, 0x34, 0x47, 0x4B, 0xF0, 0x5B, 0xB3, 0xBB, - 0x77, 0x15, 0xED, 0x3F, 0xF8, 0x4F, 0xD3, 0x9D, - 0xFE, 0x8C, 0xD5, 0x4C, 0xE1, 0x2B, 0x74, 0x6F, - 0xA3, 0xBF, 0x03, 0x8A, 0xDF, 0xC2, 0xBF, 0xC5, - 0x27, 0x0F, 0xAF, 0x53, 0x42, 0x9A, 0x69, 0x39, - 0x33, 0xC7, 0x73, 0x67, 0x2E, 0xCE, 0x88, 0xD6, - 0xCF, 0xBB, 0x7C, 0xCB, 0x0D, 0x84, 0x0E, 0xB9, - 0x54, 0xFD, 0x51, 0x9F, 0xE3, 0x62, 0x87, 0xC7, - 0x5F, 0x08, 0xFE, 0x4C, 0x2E, 0xEA, 0x7F, 0xF2, - 0xC6, 0xB8, 0xEB, 0xDC, 0x35, 0x02, 0x1A, 0x6C, - 0xEB, 0xC0, 0x73, 0x82, 0x34, 0x52, 0xBE, 0x55, - 0x14, 0xB9, 0x36, 0x3D, 0xC8, 0x88, 0x03, 0x51, - 0x35, 0x7D, 0x89, 0x1B, 0x36, 0xA9, 0xD4, 0x03, - 0xA0, 0x86, 0x66, 0x90, 0x10, 0xC0, 0xBD, 0x39, - 0x5D, 0xB5, 0x4A, 0x67, 0x49, 0x2A, 0xBC, - - 0x05, 0x95, 0xB2, 0x93, 0x14, 0x73, 0xB3, 0x70, - 0x89, 0xE4, 0xCC, 0x29, 0x8C, 0x60, 0x49, 0x46, - 0xBD, 0xC5, 0x33, 0x19, 0x32, 0xEE, 0xC7, 0xFA, - 0x6B, 0x93, 0x8B, 0x09, 0x75, 0x6D, 0xC6, 0x81, - 0xFA, 0xE9, 0xB1, 0x91, 0xBE, 0x74, 0xDF, 0x09, - 0xB6, 0xDB, 0x98, 0x67, 0x26, 0x7E, 0x8C, 0x0F, - 0x27, 0x5D, 0x38, 0x22, 0xCE, 0x70, 0x60, 0x7A, - 0xA1, 0xA5, 0x2F, 0xCC, 0x71, 0x18, 0x0C, 0x17, - 0x3D, 0x2A, 0xDD, 0xEC, 0xFA, 0xCB, 0x5B, 0x0E, - 0xD4, 0x4C, 0x3D, 0xED, 0x8A, 0xDE, 0xA5, 0x3D, - 0x1E, 0x35, 0xE4, 0xAB, 0xAF, 0x14, 0x5F, 0xF0, - 0x3F, 0xA0, 0x11, 0x5A, 0xC5, 0x64, 0x40, 0xEC, - 0x11, 0x90, 0x70, 0xDE, 0x01, 0x7F, 0xAD, 0xAE, - 0xE1, 0x30, 0x94, 0x6E, 0x1E, 0xE3, 0x22, 0xCD, - 0xC3, 0x91, 0x25, 0x77, 0x25, 0x9A, 0x62, 0xFA, - 0x43, 0xAC, 0x32, 0x8E, 0xE7, 0xB7, 0xF2, 0xD0, - 0x54, 0xD4, 0xC4, 0x6C, 0xB3, 0x88, 0xDD, 0xDA, - 0x82, 0xD6, 0xA4, 0x33, 0xC1, 0xAA, 0x42, 0xD1, - 0x26, 0x0C, 0xE7, 0xEC, 0x81, 0x87, 0x50, 0x56, - 0x00, 0xC0, 0xAC, 0xEE, 0x96, 0xBC, 0x67, 0xEB, - 0x03, 0x58, 0x38, 0x67, 0x71, 0x1B, 0xD8, 0x59, - 0xA2, 0xC5, 0x77, 0xA4, 0xD5, 0x39, 0x95, 0x13, - 0x60, 0x3C, 0x4F, 0x28, 0xD4, 0xB2, 0x9E, 0x15, - 0x3D, 0xB5, 0x24, 0x37, 0x32, 0xCC, 0x2C, 0x22, - 0xD3, 0x02, 0xAF, 0x60, 0x7F, 0x8E, 0x56, 0x59, - 0xC7, 0x52, 0x1A, 0xF7, 0x43, 0x70, 0x6E, 0xE6, - 0xFF, 0x2C, 0x94, 0x22, 0x85, 0x28, 0xEF, 0x24, - 0x83, 0x7F, 0x80, 0xAF, 0x4E, 0x7F, 0x37, 0x21, - 0x78, 0x9B, 0x31, 0x2E, 0x3A, 0xC0, 0xCE, 0x49, - - 0x1C, 0x1A, 0x99, 0x58, 0xBA, 0x52, 0xC5, 0x41, - 0xFB, 0x0A, 0x17, 0xAF, 0x23, 0x3B, 0xBF, 0x3D, - 0x5B, 0x70, 0x45, 0xB9, 0xC2, 0xF4, 0xD5, 0xB2, - 0xF9, 0x5E, 0x82, 0xC0, 0x19, 0x99, 0x3F, 0xCB, - 0x22, 0xEC, 0x10, 0xF3, 0x26, 0xBA, 0xC7, 0xD4, - 0x9B, 0x2D, 0xFF, 0x3C, 0x39, 0xE4, 0xFB, 0x4D, - 0xC5, 0x5A, 0x01, 0x43, 0xBC, 0x83, 0x9F, 0x17, - 0x4E, 0xDC, 0xFE, 0x4B, 0x2E, 0x3C, 0x67, 0xA9, - 0x2A, 0xDB, 0xC4, 0x28, 0xB6, 0xD7, 0xB1, 0x24, - 0xDB, 0x10, 0xE6, 0x27, 0xF9, 0x29, 0xFC, 0x63, - 0x57, 0x72, 0xB6, 0xA0, 0x8C, 0x25, 0x7F, 0x67, - 0x94, 0x70, 0xBB, 0xBF, 0x2F, 0x60, 0xF4, 0xF3, - 0x98, 0x85, 0xBD, 0xE6, 0x50, 0xDC, 0xA6, 0x0E, - 0x96, 0xE7, 0x9F, 0x3C, 0x4F, 0xAE, 0xC7, 0x95, - 0xDB, 0x67, 0xEC, 0x20, 0x54, 0x2B, 0x34, 0xFA, - 0x04, 0x98, 0x77, 0xEE, 0xAD, 0xE4, 0x65, 0x94, - 0x94, 0xD6, 0x6D, 0xE0, 0x81, 0x15, 0x1F, 0x10, - 0x0F, 0x34, 0xEE, 0x64, 0x47, 0xD4, 0x15, 0x07, - 0xF4, 0x38, 0xC5, 0xEE, 0x06, 0x6F, 0x8A, 0xE6, - 0x7A, 0x18, 0x2E, 0x2E, 0xAB, 0xE7, 0xD9, 0x5C, - 0xD6, 0x58, 0xE4, 0x22, 0x21, 0xFB, 0xE0, 0x34, - 0x46, 0xE1, 0xBE, 0x89, 0x17, 0xC7, 0x8A, 0xD7, - 0x22, 0xE6, 0xE4, 0xDF, 0xA8, 0xCE, 0xFF, 0x2D, - 0xC4, 0x63, 0xF8, 0x83, 0x70, 0x3B, 0x4F, 0xB6, - 0x62, 0xA0, 0x50, 0x46, 0x30, 0xB1, 0x3E, 0xE8, - 0x2E, 0xBE, 0xFC, 0xAA, 0x5C, 0xF5, 0x68, 0xB3, - 0x47, 0xBF, 0x65, 0x3E, 0x64, 0x72, 0x6F, 0x90, - 0x89, 0x88, 0x2F, 0x82, 0x35, 0xE9, 0xF6, 0xD1, - 0xFA, 0xEE, 0x25, 0xDC, 0xA0, 0x04, 0xD7, 0x0B, - 0x1E, - - 0xED, 0x32, 0x54, 0xE8, 0x2D, 0x03, 0x35, 0xD5, - 0x55, 0x62, 0x1F, 0xD2, 0x2A, 0xE5, 0x69, 0x47, - 0xD6, 0xD8, 0x92, 0xBC, 0x3D, 0xF1, 0xAB, 0x57, - 0xFE, 0x03, 0x12, 0xCE, 0xAD, 0xF8, 0x1D, 0x37, - 0xB2, 0x40, 0x72, 0xD0, 0xC8, 0x38, 0xE2, 0xD1, - 0xA4, 0x0F, 0xA0, 0x7F, 0x19, 0x72, 0xAF, 0x84, - 0x53, 0x8B, 0x71, 0x66, 0xBF, 0x56, 0x19, 0x3A, - 0xEA, 0x27, 0xFD, 0xF5, 0xB6, 0x43, 0xD4, 0xB8, - 0x8B, 0x27, 0xE8, 0x82, 0x0B, 0x24, 0x3C, 0xD7, - 0xFF, 0x31, 0xF3, 0x6D, 0x15, 0x5D, 0xBD, 0x1D, - 0x93, 0x0F, 0x98, 0x4E, 0x16, 0x00, 0x94, 0xEE, - 0xE6, 0x27, 0xBA, 0x19, 0xC2, 0xCE, 0x73, 0x63, - 0x0C, 0x71, 0xEC, 0x27, 0x70, 0x69, 0x2E, 0x96, - 0xA3, 0x20, 0x98, 0xCF, 0x2B, 0xDF, 0x50, 0x07, - 0xC8, 0x10, 0xCD, 0xA0, 0x6B, 0x9E, 0xBF, 0xEC, - 0xD3, 0x6E, 0x94, 0x70, 0x6B, 0x3F, 0xE1, 0x73, - 0x10, 0xDB, 0x9E, 0x98, 0x5B, 0x5B, 0x97, 0xB9, - 0x07, 0xF4, 0xD6, 0x55, 0xEC, 0x52, 0x86, 0x0E, - 0x14, 0xD5, 0xF9, 0x5F, 0xA9, 0xFB, 0xE1, 0x96, - 0x6E, 0xB1, 0xA8, 0xB0, 0xD3, 0xB1, 0x44, 0x08, - 0xF8, 0xBC, 0x97, 0xC8, 0xF7, 0xE8, 0xD5, 0xC9, - 0xD7, 0x9F, 0x2C, 0xCA, 0xC6, 0x35, 0x26, 0x4F, - 0x2F, 0x83, 0xC0, 0x88, 0x91, 0x8D, 0x9A, 0xD7, - 0xFC, 0x8A, 0x2A, 0x9C, 0x06, 0x8C, 0xFA, 0xC3, - 0xF3, 0xD0, 0x0A, 0x21, 0xE3, 0x4E, 0xDF, 0x6A, - 0xB4, 0x00, 0x9F, 0xF4, 0xB6, 0x6E, 0x41, 0xF2, - 0x1A, 0x5E, 0xC8, 0x8B, 0x36, 0xC2, 0x81, 0xDA, - 0x0C, 0x74, 0x20, 0xC5, 0x41, 0x60, 0xD1, 0x2A, - 0xEB, 0xAA, 0x51, 0xCB, 0x38, 0x10, 0x94, 0x8B, - 0xA2, 0x89, - - 0x90, 0xBB, 0xE5, 0x2E, 0xDE, 0xBA, 0xB1, 0x0F, - 0x5C, 0xB8, 0x39, 0x67, 0xF9, 0x10, 0x1A, 0x72, - 0x33, 0xA4, 0x9B, 0x47, 0x5C, 0xC3, 0x97, 0x66, - 0xA9, 0x31, 0xC6, 0xD6, 0xD1, 0x64, 0x51, 0x19, - 0x3A, 0xAC, 0xBF, 0x99, 0x1B, 0x1C, 0xEC, 0x32, - 0x4F, 0x69, 0xC7, 0x6D, 0xBD, 0x4A, 0xEE, 0x29, - 0x75, 0x66, 0x42, 0xF7, 0x40, 0x58, 0xE5, 0x05, - 0x84, 0x18, 0x8A, 0x82, 0xE8, 0x8E, 0x13, 0x19, - 0x89, 0x6F, 0xC1, 0xDD, 0x43, 0x0C, 0xC5, 0x63, - 0xE2, 0xC4, 0xCC, 0x33, 0x61, 0xF4, 0xE6, 0x6B, - 0x9B, 0x39, 0x5E, 0xA1, 0x8E, 0x80, 0x8C, 0x13, - 0x1B, 0xE5, 0xD4, 0x4D, 0x7A, 0xDD, 0xF4, 0x52, - 0x51, 0x0C, 0x0B, 0x1F, 0x23, 0x52, 0xC8, 0x52, - 0xF8, 0xD4, 0x88, 0x3E, 0xAE, 0xB8, 0x98, 0xF8, - 0x76, 0xB3, 0xAD, 0x6B, 0x20, 0xD4, 0x83, 0x87, - 0x68, 0x45, 0x5C, 0xA8, 0xB3, 0xA0, 0xA4, 0xB9, - 0xE7, 0x16, 0x06, 0x48, 0xEF, 0x45, 0x33, 0x29, - 0xAB, 0x75, 0xE6, 0x9D, 0x83, 0x74, 0xF9, 0xF7, - 0x22, 0xA0, 0xC5, 0xFF, 0x9E, 0x35, 0x6A, 0x46, - 0x7B, 0x80, 0x21, 0xE7, 0x47, 0xD8, 0x4C, 0x37, - 0xB1, 0x96, 0x05, 0xBD, 0xE2, 0x1B, 0xDF, 0xE9, - 0x34, 0x4B, 0xBF, 0x03, 0x72, 0xB8, 0x47, 0x6E, - 0xE4, 0xB8, 0xDB, 0x63, 0xD6, 0xC2, 0x62, 0x8E, - 0xA8, 0x28, 0x1F, 0xC3, 0x1C, 0x35, 0x1F, 0x2C, - 0xCD, 0x24, 0xAF, 0x6A, 0x38, 0x1D, 0xA1, 0xC8, - 0x07, 0xA7, 0xB7, 0x04, 0x5A, 0xC6, 0x08, 0x4E, - 0x29, 0xBB, 0xA2, 0x19, 0xFE, 0x54, 0x2F, 0xD8, - 0xF3, 0xB3, 0x3E, 0x60, 0xFF, 0x27, 0xB1, 0x88, - 0x2F, 0x2C, 0xB7, 0x66, 0x09, 0x97, 0xE5, 0x09, - 0x77, 0x5F, 0x53, - - 0xD3, 0xA5, 0x23, 0x44, 0x45, 0xCA, 0x7B, 0xF1, - 0x84, 0xF2, 0x59, 0x2F, 0x75, 0xC6, 0xC3, 0x49, - 0xEC, 0x4C, 0xA2, 0x4A, 0xF9, 0xD1, 0xBB, 0x1D, - 0xBB, 0x30, 0x2E, 0x18, 0xDD, 0xFF, 0xC8, 0x77, - 0x2D, 0x8F, 0x09, 0x6F, 0x65, 0x5A, 0x64, 0x6B, - 0xEB, 0x8A, 0xDF, 0xA2, 0x50, 0xBA, 0x5A, 0x54, - 0x79, 0xE5, 0x14, 0x69, 0x42, 0x34, 0xE8, 0xA0, - 0x62, 0xA5, 0x3A, 0x7A, 0x49, 0xB1, 0x8B, 0xA3, - 0xD8, 0x73, 0x57, 0x70, 0xE3, 0x93, 0x04, 0xE4, - 0x59, 0x86, 0x8A, 0x7B, 0xBE, 0x65, 0x48, 0x16, - 0xB5, 0xE6, 0xAF, 0xC3, 0xBD, 0xFF, 0x3C, 0xDF, - 0xF6, 0xCB, 0x60, 0xE4, 0xBA, 0x77, 0xF4, 0x4B, - 0x95, 0x79, 0xCE, 0xD6, 0x36, 0xBD, 0xBF, 0x36, - 0x42, 0x53, 0x15, 0xA3, 0x77, 0xB3, 0x9F, 0x68, - 0x98, 0x6E, 0xB5, 0x01, 0x16, 0xA2, 0x26, 0x79, - 0xB0, 0x1A, 0x65, 0x45, 0x30, 0xBB, 0x00, 0x4F, - 0xE4, 0x7A, 0xD0, 0x31, 0xE5, 0x77, 0xD4, 0xC6, - 0x6A, 0x72, 0xC5, 0xF2, 0xC1, 0xFC, 0x60, 0x74, - 0x99, 0xD5, 0x25, 0xF2, 0x7B, 0x6D, 0xFE, 0x32, - 0x1C, 0x90, 0xD0, 0xF9, 0xF0, 0xAE, 0x93, 0x20, - 0xB4, 0xA0, 0xF7, 0xA5, 0x75, 0xE4, 0x83, 0x94, - 0x80, 0x8C, 0x1E, 0x18, 0xD7, 0x1C, 0xA4, 0x5F, - 0x0A, 0x08, 0xD2, 0xB1, 0x27, 0xC4, 0x0D, 0xA4, - 0xBE, 0xE0, 0x36, 0x69, 0x19, 0x14, 0x9A, 0x58, - 0x9C, 0xD5, 0x36, 0xE5, 0x46, 0xE1, 0x94, 0x66, - 0xC3, 0x77, 0x78, 0x52, 0xF9, 0x2B, 0xDA, 0x95, - 0xDC, 0xED, 0x6A, 0x6E, 0x58, 0xE9, 0x16, 0x34, - 0x2A, 0x6B, 0xD5, 0x4E, 0xF2, 0x7E, 0xB8, 0x96, - 0xEB, 0x9B, 0x4D, 0xD3, 0xFD, 0xB4, 0x33, 0x0D, - 0x13, 0x26, 0x42, 0x3E, - - 0xF6, 0x0F, 0x59, 0xEC, 0xB0, 0xE1, 0x3D, 0x20, - 0xB8, 0xD7, 0x3D, 0xF9, 0x59, 0xCF, 0xEF, 0xA9, - 0xD7, 0xB2, 0x47, 0xBC, 0x87, 0x54, 0xD3, 0x7E, - 0xF9, 0x2C, 0xDF, 0xB6, 0x0F, 0x86, 0x13, 0x02, - 0x1C, 0xFA, 0xC0, 0x26, 0xDB, 0x49, 0x3B, 0x36, - 0x60, 0xA2, 0x64, 0xD8, 0x91, 0xB1, 0x7C, 0x35, - 0xEA, 0x2F, 0x5E, 0xF6, 0x99, 0xE2, 0x0B, 0x74, - 0x1F, 0x76, 0xF6, 0x8F, 0x7E, 0x58, 0x63, 0x3E, - 0xB6, 0xA2, 0xF3, 0x0A, 0xD4, 0xA5, 0x19, 0xB7, - 0x45, 0x08, 0xDB, 0x52, 0x17, 0x1D, 0xB1, 0x00, - 0x23, 0x0B, 0xD4, 0xC0, 0x86, 0x52, 0x49, 0xA8, - 0x33, 0xAB, 0x0A, 0xD1, 0x51, 0x9C, 0x5D, 0x4B, - 0x23, 0xF1, 0x93, 0x17, 0x6A, 0x48, 0xA6, 0x2F, - 0x9D, 0x0D, 0x9A, 0x09, 0xBD, 0x19, 0xA0, 0x39, - 0x60, 0xDE, 0xD1, 0xE4, 0x42, 0xD8, 0x34, 0xC0, - 0x1D, 0xD3, 0x88, 0x29, 0xA8, 0x48, 0x75, 0x5C, - 0xDF, 0x1D, 0xD4, 0x09, 0x53, 0x5E, 0x5D, 0x0A, - 0x9A, 0x2D, 0x95, 0x83, 0xF6, 0x85, 0x2F, 0xAD, - 0x8C, 0xFF, 0x55, 0xD8, 0x19, 0x56, 0xEE, 0x38, - 0xD2, 0x25, 0x30, 0x27, 0x21, 0xB5, 0x10, 0xED, - 0x24, 0xFB, 0x0E, 0x22, 0x55, 0xA2, 0xC3, 0x31, - 0xDC, 0x1E, 0xA0, 0xC7, 0x4B, 0x1B, 0xC0, 0x14, - 0x95, 0x25, 0x8F, 0x37, 0x3C, 0x75, 0x61, 0x44, - 0x0B, 0x09, 0x81, 0x8C, 0x32, 0xE5, 0x59, 0x3D, - 0xE3, 0xD5, 0x45, 0xDF, 0x11, 0xFF, 0x61, 0x9E, - 0x01, 0x10, 0x5E, 0x91, 0x70, 0x18, 0x1D, 0x76, - 0xC9, 0x74, 0x3C, 0xDD, 0x30, 0xB2, 0x01, 0xF5, - 0xCD, 0xCD, 0x9F, 0xFC, 0xE3, 0x7A, 0xB9, 0xD1, - 0x7F, 0xA4, 0x3C, 0x2E, 0x2C, 0x28, 0x25, 0xCC, - 0x6C, 0x56, 0x3A, 0x80, 0xF9, - - 0x7E, 0x13, 0xEF, 0xE6, 0x6B, 0x69, 0x25, 0xE0, - 0x81, 0xE9, 0x64, 0x4E, 0xE9, 0xFC, 0x00, 0x0C, - 0xDD, 0x81, 0x66, 0xB1, 0xC9, 0x12, 0xC4, 0x98, - 0x5F, 0x71, 0x2F, 0xFC, 0xFB, 0x24, 0x9E, 0x49, - 0x5E, 0xFB, 0x20, 0xB9, 0x56, 0x06, 0x23, 0xD3, - 0xD5, 0x80, 0x51, 0x25, 0xE6, 0x33, 0x55, 0xC0, - 0x48, 0x28, 0x32, 0xDB, 0xBB, 0x48, 0x6D, 0xF6, - 0x30, 0xA7, 0x4D, 0xC6, 0x54, 0x7A, 0x63, 0x5E, - 0x54, 0x7A, 0xE4, 0xEB, 0x71, 0x03, 0xA7, 0x65, - 0x1F, 0x36, 0x25, 0x32, 0xD0, 0x3F, 0xA1, 0x07, - 0xAB, 0xE0, 0x17, 0x57, 0x18, 0x06, 0xCB, 0x2B, - 0x78, 0x9F, 0xC3, 0xBD, 0x57, 0x13, 0x4B, 0x0A, - 0x52, 0xFC, 0x87, 0x39, 0xFF, 0xE6, 0xE8, 0x89, - 0x1D, 0x65, 0x61, 0x36, 0x6B, 0x93, 0xB8, 0xA9, - 0x71, 0x4B, 0xB3, 0xD4, 0x87, 0xBF, 0xAF, 0x89, - 0xB7, 0x57, 0x8F, 0x11, 0x3D, 0x36, 0xF2, 0x13, - 0x89, 0x92, 0x7C, 0xD6, 0xFE, 0x18, 0x9F, 0x4A, - 0x7F, 0xBE, 0x34, 0x1F, 0xAF, 0xCB, 0xFB, 0xCA, - 0x74, 0x7B, 0x4D, 0x93, 0x71, 0x45, 0xE4, 0xA0, - 0x4E, 0xE7, 0x4B, 0x9E, 0xFE, 0x45, 0x13, 0xDB, - 0xE9, 0x26, 0xD8, 0x75, 0xA5, 0xB6, 0x8A, 0x5E, - 0xF7, 0x7A, 0xE1, 0xA6, 0x78, 0xEB, 0xBA, 0xBA, - 0xC6, 0xB2, 0xC2, 0xCF, 0x04, 0x8A, 0x72, 0x6C, - 0xA2, 0x53, 0xDE, 0xC8, 0x91, 0xDB, 0x05, 0x46, - 0xA4, 0x86, 0x0C, 0xB8, 0xD0, 0x0F, 0x15, 0x10, - 0xD4, 0xC3, 0xA1, 0x53, 0xEA, 0x9F, 0x9A, 0x20, - 0x5A, 0xB3, 0xE8, 0x7A, 0x47, 0xC8, 0xCF, 0x87, - 0xA3, 0x7D, 0x54, 0x5C, 0xF1, 0x84, 0xE2, 0x5E, - 0x8A, 0x98, 0x8E, 0x7F, 0xAE, 0x18, 0x2F, 0x97, - 0xB3, 0x5D, 0x84, 0xFF, 0xEC, 0xAB, - - 0x81, 0x65, 0x82, 0x11, 0xCB, 0x36, 0xCA, 0xE9, - 0x04, 0x0E, 0x35, 0x85, 0xBE, 0xB3, 0x99, 0xDF, - 0xCF, 0xD5, 0x77, 0x38, 0xD4, 0xDC, 0xFE, 0x0D, - 0x01, 0xD3, 0x06, 0x2E, 0x83, 0x2E, 0x3A, 0x8C, - 0x90, 0x84, 0x17, 0x74, 0x28, 0x79, 0xFB, 0x3C, - 0x4B, 0x6D, 0x22, 0x43, 0xD6, 0x54, 0x6C, 0x6D, - 0x04, 0x36, 0xD7, 0x75, 0x95, 0xA0, 0xA8, 0xD1, - 0x42, 0xAC, 0x4B, 0x97, 0xAD, 0x69, 0x3F, 0xBA, - 0x2C, 0x0B, 0xC2, 0xCD, 0x3D, 0x70, 0x31, 0xEE, - 0xE6, 0x9E, 0x81, 0x28, 0x42, 0xAF, 0x67, 0x5D, - 0x3C, 0xFE, 0xDA, 0xF8, 0x89, 0x2F, 0xF8, 0xA0, - 0x19, 0x4E, 0x77, 0x87, 0x45, 0xBC, 0x0D, 0xB6, - 0xC0, 0x16, 0xE3, 0x4D, 0x46, 0x03, 0x89, 0x70, - 0xB0, 0xF3, 0xD3, 0x6F, 0x9A, 0x30, 0xD7, 0x51, - 0x05, 0xAE, 0xCC, 0x3A, 0xC5, 0x68, 0x56, 0x93, - 0x7B, 0x0F, 0x37, 0x96, 0x0E, 0x91, 0xD5, 0x7D, - 0xF9, 0xA6, 0xEB, 0x2C, 0x4E, 0xF6, 0x19, 0x0A, - 0xBA, 0x0F, 0x84, 0xA9, 0xD1, 0xFC, 0xD4, 0x72, - 0x0B, 0xCD, 0x79, 0xDE, 0x05, 0x49, 0x62, 0x4A, - 0x89, 0xEE, 0xB5, 0x6D, 0x5C, 0x28, 0xA7, 0xC7, - 0x96, 0x99, 0xF1, 0x0D, 0x35, 0xE2, 0xB3, 0x0E, - 0x20, 0xDB, 0x0A, 0xAD, 0x32, 0x72, 0x42, 0x40, - 0x60, 0x68, 0x39, 0xE1, 0xD9, 0x2E, 0x74, 0x90, - 0x59, 0xC7, 0xF1, 0xAE, 0x35, 0xC4, 0x0D, 0x8B, - 0xCE, 0xB1, 0xDC, 0x60, 0xD7, 0x03, 0x5A, 0x03, - 0xCD, 0x6F, 0xED, 0xC8, 0x8A, 0xF2, 0x5A, 0xE5, - 0x88, 0xBB, 0x24, 0xA5, 0x6C, 0x8E, 0x95, 0x84, - 0xF3, 0x02, 0x78, 0x5E, 0x7C, 0x8E, 0xDF, 0xCF, - 0xB1, 0x48, 0x5F, 0x16, 0x73, 0x38, 0x46, 0x69, - 0x3E, 0x41, 0x82, 0xBE, 0x29, 0xEC, 0xAF, - - 0x35, 0x6C, 0x92, 0x8B, 0x5B, 0xA9, 0xD1, 0x04, - 0x67, 0x82, 0x3C, 0x7E, 0x26, 0xA3, 0x0B, 0x58, - 0xD2, 0xC7, 0xC2, 0x3E, 0xC3, 0xDF, 0x79, 0x69, - 0xA6, 0x73, 0x38, 0xDC, 0x01, 0x60, 0x17, 0x37, - 0xD7, 0x46, 0xF4, 0xE6, 0x62, 0x72, 0xC7, 0x09, - 0xDB, 0x6F, 0x45, 0xDE, 0x59, 0x85, 0x48, 0xA1, - 0xA4, 0xF7, 0x6D, 0x83, 0x52, 0xC0, 0x64, 0xE3, - 0x4B, 0xFB, 0xCD, 0xAB, 0x62, 0x10, 0xF7, 0x40, - 0x07, 0xAA, 0x51, 0x83, 0xCF, 0xD8, 0xFD, 0xC1, - 0x35, 0x27, 0x0A, 0xCE, 0x21, 0x5E, 0x85, 0xF8, - 0x10, 0x0C, 0xAD, 0xCE, 0xD3, 0xB2, 0xF0, 0xCB, - 0x03, 0x4A, 0xE1, 0x8E, 0x8E, 0xF1, 0x05, 0xE3, - 0x1E, 0xBD, 0x35, 0xB3, 0x41, 0xEA, 0x39, 0x93, - 0xAD, 0xE2, 0xBC, 0xFD, 0x68, 0xCF, 0xAF, 0xDE, - 0x3F, 0xB3, 0xDD, 0xB3, 0x1A, 0x4C, 0x81, 0x6D, - 0x3E, 0x7E, 0x76, 0xA3, 0xB8, 0x26, 0x9D, 0xA4, - 0xD9, 0xAC, 0x88, 0x71, 0xEC, 0xE9, 0x4F, 0xA5, - 0xBF, 0x53, 0xB6, 0xFF, 0x52, 0xDA, 0xCB, 0x9B, - 0x2B, 0x67, 0xAF, 0x50, 0xEE, 0xCF, 0xA5, 0xD0, - 0x35, 0xAA, 0xB5, 0xE9, 0x34, 0x8E, 0x62, 0xD6, - 0x11, 0x94, 0xD0, 0xA7, 0xEF, 0xB9, 0xA2, 0x19, - 0x22, 0x17, 0xE4, 0x20, 0x35, 0xB6, 0x60, 0x8F, - 0x26, 0xAA, 0x3C, 0x41, 0xC8, 0xFC, 0xBC, 0xEE, - 0x5E, 0x42, 0xF6, 0x9B, 0x79, 0xBA, 0xAA, 0x4D, - 0x59, 0x18, 0xC9, 0x00, 0x9F, 0x28, 0x17, 0x3A, - 0x1F, 0xFC, 0x3B, 0x4C, 0xD5, 0xBF, 0x1B, 0x72, - 0x88, 0x5D, 0x22, 0x57, 0x7A, 0x47, 0x8A, 0x2C, - 0x19, 0x97, 0x80, 0x9A, 0x1C, 0x8A, 0x70, 0xA7, - 0xDA, 0xEB, 0xAE, 0x21, 0x81, 0x93, 0x63, 0xE9, - 0xDE, 0x12, 0xB2, 0xA6, 0xC3, 0x57, 0xD0, 0xD7, - - 0x04, 0xCD, 0xA5, 0x8D, 0x82, 0x25, 0xCC, 0xAE, - 0xDB, 0x8A, 0xBB, 0xCE, 0x96, 0x7D, 0x69, 0x62, - 0x5F, 0x34, 0x39, 0x4C, 0x82, 0xD3, 0xC6, 0x1E, - 0x27, 0x44, 0xDF, 0x66, 0xF0, 0x66, 0xF1, 0xA4, - 0x3E, 0xC8, 0x72, 0x58, 0x7C, 0x78, 0x50, 0x1B, - 0xAE, 0x6D, 0x22, 0x40, 0x27, 0x70, 0x6C, 0x12, - 0x1D, 0x44, 0x70, 0x1B, 0xC6, 0xD5, 0x76, 0x76, - 0xDD, 0xC4, 0x63, 0xE9, 0x17, 0xFF, 0xE4, 0x93, - 0x67, 0x24, 0xE0, 0x2C, 0x51, 0x3E, 0xCA, 0x62, - 0xC7, 0x0B, 0x47, 0x84, 0xDF, 0x98, 0x94, 0x85, - 0x40, 0xF0, 0xAA, 0xFC, 0x74, 0xCC, 0x15, 0x7E, - 0x9B, 0x14, 0x2D, 0x78, 0x38, 0x88, 0x12, 0x4D, - 0xB3, 0xE4, 0x64, 0xEB, 0x38, 0x3C, 0x0F, 0xC7, - 0x08, 0x26, 0x06, 0x9D, 0xD4, 0xCD, 0xCD, 0xCA, - 0x10, 0xA1, 0x9B, 0xCD, 0x03, 0x92, 0x75, 0x32, - 0xA5, 0x0F, 0xAA, 0xA4, 0xB0, 0xFE, 0x6B, 0xB3, - 0x47, 0xFD, 0x58, 0x9F, 0x69, 0x6D, 0xD5, 0x93, - 0xE7, 0x46, 0x92, 0xF5, 0x6B, 0xA7, 0x07, 0xBC, - 0x5E, 0xE1, 0x9D, 0x7D, 0xF6, 0xB5, 0x01, 0x64, - 0x6D, 0xDE, 0x24, 0x8F, 0xEF, 0x17, 0x4F, 0x74, - 0x3A, 0x13, 0x2B, 0x67, 0x05, 0x3C, 0x3B, 0xE2, - 0x17, 0x01, 0xD7, 0xAC, 0x2C, 0xD2, 0xEE, 0x89, - 0xE7, 0x50, 0xAB, 0x0B, 0x3A, 0x03, 0x6A, 0x05, - 0x2B, 0xAF, 0x7A, 0x71, 0x6D, 0x59, 0x13, 0x22, - 0xD4, 0x7F, 0xE0, 0xD4, 0xD5, 0xE6, 0x37, 0x4E, - 0x81, 0x04, 0xB1, 0x5C, 0xE4, 0x81, 0xE4, 0xE0, - 0x1D, 0x11, 0xF6, 0x3E, 0xE7, 0xB8, 0x7E, 0xDB, - 0xB3, 0x72, 0xE9, 0x63, 0x6B, 0xB7, 0xAA, 0x20, - 0x94, 0x14, 0x8E, 0x1C, 0x6D, 0xD3, 0xF4, 0xE6, - 0x3F, 0x14, 0xDD, 0x3F, 0xA3, 0x8A, 0x5B, 0xC3, - 0x0A, - - 0x10, 0x5A, 0xA3, 0x65, 0x9B, 0x9C, 0x5D, 0xBD, - 0x92, 0x5A, 0x84, 0x1B, 0x18, 0xA6, 0x4A, 0x43, - 0x69, 0xA2, 0xD2, 0x67, 0x8C, 0xC5, 0x90, 0xD6, - 0x33, 0xD7, 0xE5, 0x12, 0xEF, 0xCB, 0x68, 0x24, - 0xB9, 0x66, 0xF6, 0x69, 0xA5, 0x2D, 0x43, 0xDD, - 0xFC, 0x2C, 0x08, 0x3E, 0x71, 0xF3, 0x33, 0xF1, - 0xED, 0xBA, 0x0E, 0x8B, 0xE6, 0xF3, 0xA7, 0x90, - 0x61, 0xD9, 0x3B, 0xC6, 0xB6, 0x89, 0xEF, 0xE3, - 0x9C, 0x55, 0xCC, 0x92, 0xE0, 0xB7, 0xA8, 0xA2, - 0xBE, 0x6E, 0x3B, 0xF4, 0xC2, 0x47, 0x21, 0x0E, - 0x1B, 0xD8, 0x76, 0x19, 0x99, 0xCE, 0x97, 0x02, - 0x25, 0x37, 0x28, 0xC0, 0x8E, 0x13, 0x6E, 0xB7, - 0x1B, 0x6B, 0x7C, 0x40, 0x3E, 0x78, 0xD1, 0xD1, - 0x55, 0x84, 0xA7, 0x1E, 0x82, 0x5C, 0x5D, 0x8E, - 0x14, 0x2E, 0xF4, 0x5B, 0x76, 0xC7, 0xCB, 0x82, - 0x74, 0xB3, 0x6F, 0xF5, 0xFD, 0xDE, 0x74, 0xD5, - 0xBD, 0xFB, 0x37, 0xA9, 0x54, 0x90, 0x97, 0x08, - 0x5C, 0xA7, 0x13, 0x07, 0xC4, 0x8C, 0x0C, 0x51, - 0x5D, 0x22, 0x71, 0xFE, 0x25, 0x77, 0x13, 0x23, - 0x3C, 0x57, 0x04, 0xEC, 0xE5, 0xD4, 0x41, 0x4E, - 0xE7, 0xFA, 0x1B, 0x4A, 0x31, 0xE1, 0xC6, 0x35, - 0x99, 0x0D, 0x8B, 0xAC, 0x37, 0xAB, 0x38, 0x8C, - 0xEC, 0x59, 0x44, 0x8A, 0x5A, 0xD9, 0x7A, 0x99, - 0x95, 0x33, 0x7E, 0x65, 0xEF, 0x78, 0x63, 0xE2, - 0x6D, 0xFE, 0x7D, 0xAC, 0xA5, 0x05, 0x13, 0xB7, - 0x8E, 0xF2, 0x9B, 0x76, 0x7E, 0x6C, 0x54, 0x86, - 0xA2, 0xAA, 0x2F, 0x3B, 0x38, 0x46, 0x1D, 0x4E, - 0xDB, 0x36, 0x42, 0x88, 0x0D, 0x0C, 0x7B, 0xAF, - 0xAC, 0x58, 0x0B, 0x24, 0x99, 0xCB, 0x5E, 0x9D, - 0x6D, 0xDC, 0xE8, 0xE1, 0xDC, 0xD5, 0xC3, 0x31, - 0xBE, 0xD5, - - 0xB0, 0xD1, 0xFC, 0x60, 0x3A, 0x61, 0x99, 0x7C, - 0xDD, 0x25, 0x09, 0x27, 0x2F, 0x4F, 0xEA, 0x8D, - 0x71, 0x0C, 0xE3, 0x47, 0x8A, 0xBC, 0xB6, 0xBD, - 0x8B, 0x6E, 0xFC, 0x63, 0x4A, 0x49, 0x59, 0xA4, - 0x4D, 0x2C, 0x8B, 0xDB, 0x9C, 0xFA, 0x23, 0xAE, - 0xDF, 0xBA, 0x3A, 0x1A, 0x21, 0xED, 0x74, 0x3F, - 0x20, 0xC1, 0x66, 0xCF, 0xBB, 0x21, 0x96, 0x57, - 0xD4, 0x9A, 0xFF, 0xCD, 0xB6, 0x21, 0xE4, 0xA6, - 0xC1, 0x38, 0xDA, 0x54, 0x20, 0x9B, 0x21, 0xC9, - 0x22, 0x5D, 0x1E, 0xCD, 0x48, 0x8C, 0x85, 0xE2, - 0xCA, 0x4D, 0xE3, 0xE3, 0x82, 0x9F, 0x3A, 0xB9, - 0xC1, 0xB9, 0x01, 0x50, 0x1F, 0x13, 0xB0, 0xDF, - 0x12, 0x2D, 0x09, 0x85, 0xA2, 0xD7, 0x0D, 0x9D, - 0x01, 0x92, 0xC9, 0xEC, 0xE5, 0x50, 0x58, 0xF0, - 0xF8, 0x58, 0x7F, 0xD1, 0xCF, 0xFD, 0x77, 0xBD, - 0x73, 0x6B, 0x9B, 0x9D, 0x35, 0x25, 0x1D, 0x52, - 0x6B, 0xF0, 0x8E, 0x78, 0xF2, 0xCF, 0x52, 0x11, - 0x17, 0xF3, 0xB2, 0x20, 0x80, 0x22, 0x90, 0x7B, - 0xBD, 0x1B, 0x32, 0x1D, 0x17, 0xF8, 0xB0, 0xB0, - 0xBC, 0x82, 0xC1, 0x20, 0x8E, 0x79, 0x17, 0x18, - 0x6B, 0x8D, 0xD3, 0x57, 0xBE, 0xB6, 0xB0, 0x48, - 0x23, 0x5D, 0x70, 0x50, 0xA7, 0x2C, 0x55, 0xC4, - 0x39, 0x88, 0x5C, 0x7C, 0xA5, 0x74, 0x43, 0xA4, - 0x8E, 0x02, 0x4C, 0x8E, 0x7E, 0x05, 0x73, 0x6B, - 0x89, 0x44, 0xAA, 0x84, 0xF4, 0xD4, 0x0F, 0xB9, - 0xB1, 0x8B, 0x0D, 0xD5, 0x38, 0x32, 0xBD, 0x84, - 0x49, 0xB6, 0x3E, 0xD9, 0x65, 0xAB, 0x96, 0x2A, - 0x6A, 0x47, 0xD5, 0x0E, 0x21, 0x4F, 0xF7, 0xF9, - 0xE4, 0xE9, 0x46, 0xA1, 0x09, 0x7A, 0x7B, 0x0E, - 0x10, 0x3D, 0x3D, 0xE8, 0xB1, 0xBB, 0x07, 0x1A, - 0x54, 0xBA, 0xC2, - - 0x3C, 0xDD, 0x72, 0x30, 0xB1, 0xD2, 0x79, 0x40, - 0x8E, 0x03, 0x65, 0x7D, 0x82, 0x70, 0x77, 0xEB, - 0x77, 0x9B, 0x6C, 0x46, 0x20, 0x27, 0x40, 0xCF, - 0xAA, 0xF3, 0x2D, 0xBC, 0xF8, 0xE0, 0xA4, 0x04, - 0xAE, 0x72, 0xE7, 0x95, 0x38, 0xA2, 0xAA, 0x45, - 0x7F, 0xDB, 0x72, 0x58, 0x0C, 0x30, 0x70, 0x4E, - 0x8A, 0xE2, 0xDD, 0x2D, 0xA8, 0x03, 0x9A, 0xEB, - 0x99, 0x96, 0x8E, 0x9E, 0xC1, 0x65, 0x8C, 0xB9, - 0xD1, 0xE1, 0xED, 0xEC, 0x3C, 0x3F, 0xA8, 0xAB, - 0x54, 0x81, 0x2C, 0x16, 0x77, 0x3B, 0x6A, 0xB9, - 0x09, 0x51, 0xF0, 0x98, 0x38, 0xF3, 0x69, 0xC6, - 0x07, 0xB6, 0x98, 0x2C, 0x00, 0xDA, 0xFF, 0xD4, - 0x4B, 0x51, 0x00, 0xF4, 0xF4, 0xC6, 0x59, 0xFF, - 0x4D, 0x2F, 0xF0, 0x55, 0x91, 0x33, 0x58, 0xAC, - 0x0B, 0xA7, 0x43, 0x4B, 0x11, 0xDA, 0x6F, 0x3A, - 0x7A, 0xF1, 0xE5, 0xE4, 0x58, 0xB0, 0xA3, 0x5D, - 0x89, 0xDD, 0x6B, 0x84, 0x28, 0x04, 0x1E, 0x0B, - 0xD5, 0x3F, 0x5E, 0x87, 0x47, 0xE5, 0xCC, 0xCC, - 0xF8, 0x46, 0xD0, 0x41, 0xD4, 0x89, 0xC6, 0x31, - 0x4B, 0x9B, 0xF6, 0x64, 0xCB, 0xDE, 0x11, 0x36, - 0x7F, 0x1C, 0xC4, 0x4A, 0x10, 0xA0, 0xF0, 0xE2, - 0xA8, 0x9D, 0x80, 0x22, 0xAF, 0xFA, 0x1D, 0xCB, - 0x99, 0x08, 0x56, 0x12, 0x0C, 0xE8, 0x23, 0xF9, - 0x13, 0x68, 0x7C, 0x89, 0x5A, 0xAC, 0x00, 0x25, - 0x0A, 0xEF, 0xDD, 0xF1, 0xF4, 0xDC, 0xC1, 0x92, - 0x71, 0x12, 0xF2, 0xBF, 0x7F, 0xA9, 0x30, 0x5C, - 0x75, 0x43, 0x4F, 0x19, 0x7C, 0xD6, 0x39, 0xF2, - 0xDC, 0xAB, 0xE7, 0x36, 0x75, 0x26, 0x2C, 0xC5, - 0x4D, 0xBF, 0xD0, 0x4A, 0x20, 0x26, 0x50, 0x9A, - 0x31, 0x41, 0x29, 0xD0, 0x73, 0x53, 0x7A, 0x81, - 0xF4, 0x5D, 0xDB, 0x8E, - - 0x21, 0x55, 0x95, 0x56, 0x2A, 0xFA, 0x88, 0x2E, - 0xC9, 0x9B, 0x1E, 0xE9, 0xA4, 0x4C, 0x1A, 0xC7, - 0xFB, 0xF6, 0xA5, 0xE8, 0x5A, 0xFB, 0xF6, 0x53, - 0x4C, 0xCD, 0x0F, 0xE7, 0x0A, 0x97, 0x73, 0x95, - 0x7C, 0x0E, 0x11, 0x82, 0x07, 0x8F, 0x77, 0x2B, - 0xDE, 0x4D, 0x95, 0xDB, 0x27, 0x6D, 0x70, 0x89, - 0xC8, 0x5C, 0x1B, 0xC8, 0xEE, 0xEE, 0x8E, 0x75, - 0xDB, 0x1B, 0x5E, 0xF2, 0x1D, 0x6D, 0xD8, 0x8C, - 0x81, 0x3B, 0x58, 0x71, 0xBA, 0x12, 0x70, 0x12, - 0x6E, 0x8D, 0x13, 0x2E, 0x4B, 0x4A, 0x81, 0x93, - 0xA9, 0xAD, 0xA6, 0xB2, 0xB2, 0x4D, 0xE2, 0x26, - 0x2E, 0xC7, 0x31, 0xD1, 0xFB, 0x02, 0xAB, 0xE9, - 0x76, 0xBF, 0x84, 0xEF, 0xE2, 0x02, 0xDA, 0xDE, - 0x93, 0x08, 0x3F, 0x02, 0x37, 0x04, 0xC3, 0x37, - 0xB0, 0x5B, 0x7F, 0x04, 0x37, 0xC0, 0xA3, 0x67, - 0x3F, 0xFA, 0x31, 0x43, 0x10, 0x27, 0xA1, 0x36, - 0x3D, 0x56, 0xF9, 0x70, 0xDF, 0x6B, 0x51, 0x61, - 0x76, 0xD2, 0x22, 0xCC, 0x19, 0x66, 0x30, 0x63, - 0xBC, 0x25, 0x7A, 0x7E, 0x8B, 0x7B, 0x9D, 0xD7, - 0x49, 0x99, 0x67, 0x8C, 0x19, 0x2F, 0x51, 0x0F, - 0x01, 0xD7, 0x35, 0xF0, 0xA2, 0x20, 0x38, 0x03, - 0x9F, 0xCB, 0x42, 0x65, 0xC3, 0x6A, 0x0E, 0xA8, - 0xF6, 0x4F, 0xBF, 0x73, 0x3A, 0x1A, 0xDF, 0x48, - 0x03, 0x72, 0xF5, 0xB9, 0x94, 0x56, 0xD4, 0x46, - 0x93, 0xDD, 0x6B, 0xB3, 0xF9, 0x6B, 0xDF, 0xEC, - 0x88, 0x34, 0x6D, 0x39, 0x51, 0xEE, 0xFD, 0xA6, - 0x4B, 0xC7, 0x2B, 0xAE, 0xC6, 0x2A, 0x14, 0x15, - 0xDF, 0xB3, 0x7E, 0x02, 0x1C, 0x8D, 0xA8, 0xD4, - 0xDB, 0x19, 0xCF, 0x19, 0xEA, 0x8A, 0x14, 0xBC, - 0x67, 0xB1, 0x62, 0x35, 0x69, 0x84, 0x21, 0x08, - 0xF8, 0x5D, 0x44, 0x10, 0xD9, - - 0x0E, 0xE7, 0x88, 0x5B, 0x12, 0x67, 0xA8, 0x08, - 0x53, 0xD1, 0x65, 0x84, 0xE8, 0x9C, 0x12, 0xE3, - 0xBA, 0x44, 0x83, 0xA1, 0x1E, 0x73, 0xDE, 0x63, - 0x6C, 0xCC, 0xF7, 0xA4, 0x6B, 0xD0, 0x6B, 0xBF, - 0x3D, 0xAE, 0x4D, 0xF2, 0xB7, 0xF7, 0xC4, 0x30, - 0x2F, 0xB0, 0xEE, 0x09, 0x10, 0x20, 0xE1, 0x77, - 0x7B, 0xD4, 0xD1, 0x6B, 0x7F, 0x88, 0xA6, 0xE6, - 0x51, 0xD5, 0x4E, 0x9F, 0xFD, 0xFB, 0x1F, 0x4A, - 0x7C, 0xA7, 0x99, 0x32, 0x3F, 0x7C, 0xEA, 0xD9, - 0x36, 0xD4, 0x2C, 0xE1, 0xE0, 0x84, 0x2E, 0xFE, - 0x2A, 0x57, 0xA5, 0x56, 0xBD, 0xD3, 0x16, 0x8F, - 0x5A, 0x5A, 0x02, 0x20, 0xF1, 0x1B, 0xF0, 0x96, - 0x22, 0xBF, 0x1B, 0x24, 0xA4, 0xD2, 0x5A, 0x35, - 0x9E, 0xBA, 0x71, 0xB4, 0x5D, 0x13, 0x19, 0x8D, - 0x64, 0x4C, 0x5B, 0x22, 0xAA, 0x0E, 0x87, 0x1E, - 0xF6, 0x62, 0x8A, 0x94, 0xA6, 0x36, 0x03, 0xEA, - 0x6F, 0xB4, 0xFC, 0xA5, 0xC9, 0x98, 0x73, 0x54, - 0x38, 0x97, 0x6D, 0xC8, 0x08, 0x01, 0xCA, 0xD8, - 0x88, 0xE7, 0xAA, 0x9E, 0xCE, 0x3B, 0xA7, 0xBA, - 0x69, 0x50, 0xAB, 0x78, 0x9C, 0x83, 0x20, 0x23, - 0x31, 0x1C, 0xCC, 0x01, 0x52, 0xDF, 0x6F, 0xC2, - 0x56, 0x09, 0x57, 0xFF, 0xDE, 0x27, 0xD4, 0x17, - 0x4E, 0x6B, 0xD5, 0x60, 0x3A, 0x9F, 0xC8, 0xA4, - 0x1A, 0xAB, 0x82, 0x9A, 0x05, 0x15, 0xC8, 0x66, - 0x89, 0x40, 0x2A, 0x90, 0xF8, 0xEB, 0xD1, 0x2F, - 0x6E, 0x68, 0x13, 0xAD, 0x66, 0x39, 0x6C, 0xB1, - 0x7C, 0xEE, 0x33, 0xB7, 0xA6, 0x88, 0x69, 0xE1, - 0x32, 0x34, 0xA4, 0x87, 0xB1, 0x0C, 0xF3, 0x59, - 0xBE, 0x88, 0x72, 0x77, 0x76, 0x61, 0x45, 0x6F, - 0xF7, 0x75, 0x12, 0xB6, 0x03, 0x17, 0xE9, 0x2E, - 0x15, 0x93, 0xDA, 0xA9, 0xAE, 0x12, - - 0x4E, 0xB8, 0x67, 0xB1, 0x3C, 0x12, 0xCD, 0x1E, - 0x2D, 0xA3, 0x9C, 0xE5, 0xA6, 0x4A, 0x08, 0x0E, - 0x0D, 0x1C, 0x9B, 0xE7, 0xE5, 0x6D, 0x0A, 0x75, - 0xE0, 0xE4, 0x33, 0x3B, 0x43, 0x3D, 0x2C, 0x39, - 0x96, 0x43, 0x8F, 0xF6, 0xA4, 0xAA, 0x5E, 0x32, - 0xFE, 0x00, 0xCD, 0xD6, 0x9D, 0x75, 0x6F, 0x3A, - 0x20, 0x4E, 0x05, 0xB5, 0x7C, 0xE8, 0xDA, 0xE1, - 0x32, 0x10, 0xC0, 0x85, 0x8D, 0x34, 0x35, 0x12, - 0x41, 0x50, 0xBF, 0x58, 0xB8, 0xFF, 0x4E, 0x6B, - 0x04, 0x40, 0x76, 0xAD, 0xCC, 0x31, 0xDB, 0xF4, - 0x12, 0x7F, 0x30, 0x4E, 0x28, 0x28, 0x73, 0x67, - 0xED, 0x35, 0x38, 0x18, 0xD9, 0x9D, 0xEA, 0x68, - 0xFA, 0x65, 0x28, 0x7B, 0x99, 0x3A, 0x89, 0x7D, - 0x52, 0xE1, 0x59, 0x4C, 0x68, 0xC9, 0xDA, 0xFC, - 0x3D, 0x39, 0xE0, 0x81, 0xDB, 0x22, 0xBD, 0xBF, - 0xF3, 0xDA, 0x45, 0x1D, 0x3A, 0x8D, 0xF3, 0x97, - 0x9E, 0xDA, 0x2A, 0xD5, 0x4E, 0x2C, 0x23, 0x74, - 0x3A, 0xC9, 0x73, 0x4D, 0x24, 0x7E, 0x1A, 0x9B, - 0xF9, 0xD7, 0x21, 0x4D, 0x9A, 0x28, 0x21, 0x44, - 0xD4, 0xE8, 0x93, 0xC5, 0x4F, 0x9A, 0xF9, 0x66, - 0x09, 0xA5, 0x46, 0x31, 0x59, 0xB3, 0xCC, 0xF3, - 0xD4, 0x58, 0x9E, 0x8E, 0xB5, 0x35, 0x47, 0x5C, - 0x23, 0xC9, 0xFC, 0xE8, 0x64, 0x5D, 0x47, 0x6C, - 0x43, 0xAC, 0x47, 0x30, 0xAE, 0x40, 0x7A, 0x9E, - 0x1F, 0xF9, 0x74, 0x55, 0x10, 0x6F, 0x2A, 0xEB, - 0x50, 0x63, 0x51, 0xDD, 0x8E, 0x38, 0x6F, 0x27, - 0x1F, 0x21, 0x3C, 0xDC, 0x65, 0x63, 0xE4, 0xE8, - 0xD8, 0x63, 0x20, 0x67, 0x96, 0x22, 0xFD, 0xC3, - 0xA0, 0xDB, 0x90, 0x64, 0x56, 0xE6, 0xB0, 0xFE, - 0xB3, 0x7C, 0x74, 0x2C, 0x01, 0xD5, 0xCC, 0xD4, - 0x3C, 0x1B, 0xBA, 0x79, 0x68, 0x33, 0x7C, - - 0x3E, 0x82, 0xD7, 0x53, 0xF6, 0x16, 0xE3, 0x10, - 0x01, 0x36, 0xA8, 0xEF, 0x33, 0xCA, 0x26, 0xC9, - 0x21, 0xBF, 0xCA, 0x3B, 0x7D, 0x89, 0xC2, 0x59, - 0x1D, 0x57, 0x2B, 0x02, 0x05, 0xEA, 0x49, 0x99, - 0x31, 0x95, 0xFF, 0x0A, 0x45, 0x56, 0x1D, 0xB9, - 0xD3, 0x01, 0x44, 0xC4, 0x8C, 0x88, 0xAD, 0xC9, - 0x83, 0x6A, 0x35, 0x83, 0x81, 0xBC, 0x59, 0x0A, - 0xB0, 0x2A, 0x82, 0xE5, 0x89, 0x54, 0xA0, 0xAC, - 0x69, 0x1A, 0x63, 0x5B, 0x2C, 0x8A, 0x61, 0xAE, - 0x72, 0xD9, 0xDB, 0xF0, 0x6C, 0xAA, 0x8F, 0x61, - 0x46, 0x0C, 0x0A, 0x5D, 0xE6, 0x15, 0x92, 0x65, - 0x83, 0xCF, 0x80, 0xB6, 0x78, 0x9E, 0x87, 0x9B, - 0x13, 0xD5, 0x94, 0xD2, 0x1E, 0x7A, 0x28, 0x8B, - 0x14, 0x76, 0x0C, 0x7E, 0x41, 0xAE, 0x5B, 0x36, - 0x40, 0xD9, 0x30, 0x31, 0xFD, 0x73, 0x81, 0xCC, - 0x83, 0x22, 0x03, 0xFF, 0xB6, 0xCC, 0xFA, 0xD7, - 0x3A, 0x1C, 0xB4, 0xA8, 0x48, 0x47, 0xD9, 0xA9, - 0x54, 0xCE, 0x26, 0x92, 0x84, 0x19, 0x6D, 0x57, - 0x1B, 0x24, 0x3B, 0x5F, 0xBD, 0xBB, 0x7F, 0x18, - 0x97, 0xE2, 0x79, 0x81, 0x7B, 0x19, 0xB6, 0x9C, - 0x4F, 0xE6, 0xD5, 0x01, 0x8B, 0x41, 0xE5, 0x21, - 0x18, 0x76, 0x2A, 0x16, 0xC2, 0xEF, 0x20, 0xAC, - 0xB0, 0x0E, 0x58, 0x8C, 0x6D, 0xE7, 0x02, 0x35, - 0x15, 0x94, 0xDB, 0xC6, 0x58, 0xE3, 0xF0, 0x0F, - 0xBF, 0x6A, 0x63, 0xE0, 0x4A, 0x51, 0x32, 0x90, - 0x40, 0x84, 0xB6, 0x05, 0x92, 0xB1, 0x6B, 0xF8, - 0xCD, 0xCD, 0x7F, 0xF1, 0x43, 0x72, 0xBB, 0x8B, - 0x1E, 0xAF, 0xE5, 0x78, 0x75, 0x72, 0xE5, 0x72, - 0x14, 0x2D, 0x5B, 0x83, 0xD2, 0x40, 0x55, 0xFC, - 0x8C, 0x9B, 0xFB, 0xAE, 0xCC, 0x51, 0xBE, 0x56, - 0x9D, 0x4C, 0xC1, 0xFC, 0xF1, 0xC3, 0xC3, 0xAD, - - 0xA9, 0x2F, 0xB7, 0xB1, 0x24, 0x2E, 0xD1, 0x6E, - 0xAF, 0x5B, 0xC5, 0xF2, 0xF8, 0x5E, 0x43, 0x83, - 0xB4, 0x3D, 0x57, 0xD6, 0x16, 0x8D, 0x56, 0x31, - 0xE5, 0xEB, 0x44, 0x01, 0x9F, 0xCA, 0x6E, 0x77, - 0xC2, 0xAC, 0xAD, 0x84, 0x1E, 0x4B, 0x38, 0xCC, - 0x48, 0x36, 0xD6, 0x8E, 0xCA, 0xAD, 0x67, 0x3E, - 0x20, 0xD2, 0x3A, 0x84, 0xA2, 0x79, 0x60, 0xBD, - 0xA2, 0x1B, 0x7E, 0x41, 0x57, 0x2D, 0x52, 0x41, - 0x41, 0x1C, 0x32, 0x5F, 0xE4, 0x1B, 0x21, 0x55, - 0xA9, 0xAE, 0xFE, 0xB1, 0x80, 0xB2, 0x85, 0x0E, - 0x5A, 0xA8, 0x06, 0x4C, 0x73, 0x96, 0xC7, 0xDF, - 0x39, 0x6D, 0x5A, 0x69, 0x7F, 0x3C, 0xC1, 0x71, - 0xEF, 0xEC, 0x84, 0x23, 0x5F, 0x92, 0xD9, 0x07, - 0x2D, 0x73, 0x4A, 0xAB, 0x55, 0x46, 0xE8, 0xCC, - 0x46, 0x2C, 0x09, 0x7B, 0x65, 0xD7, 0xCF, 0x1A, - 0x3B, 0x27, 0xD3, 0x8C, 0x3B, 0x8A, 0xDC, 0xDB, - 0x36, 0x95, 0x06, 0x8D, 0x5B, 0x44, 0xBA, 0xBF, - 0x7E, 0x50, 0xAF, 0xC3, 0x63, 0x66, 0xB9, 0xD3, - 0xB0, 0xC4, 0x2C, 0x03, 0xBF, 0x7E, 0x70, 0xCF, - 0x93, 0xEB, 0x3D, 0xDC, 0x74, 0x16, 0x49, 0x0A, - 0x02, 0x98, 0x4F, 0x81, 0x6C, 0x29, 0x53, 0x39, - 0x25, 0xBA, 0xD4, 0x59, 0xF2, 0xB9, 0x92, 0xE6, - 0x83, 0x41, 0xE2, 0x7B, 0xE1, 0x6E, 0xA0, 0x8F, - 0xC4, 0xE8, 0x35, 0x76, 0x5A, 0x3A, 0xA4, 0x35, - 0x83, 0x85, 0x77, 0xA9, 0x63, 0x00, 0xA1, 0x29, - 0xD5, 0x43, 0x05, 0x59, 0xA3, 0x52, 0x3E, 0xE4, - 0xDA, 0xC1, 0x72, 0x36, 0x8F, 0x5E, 0xA0, 0x8B, - 0x88, 0x3D, 0xE9, 0x19, 0x11, 0x89, 0x3F, 0x0E, - 0xF1, 0x04, 0xA9, 0x4C, 0x87, 0xFF, 0x08, 0x89, - 0xF9, 0x13, 0xEB, 0xE7, 0x28, 0x41, 0x0B, 0x58, - 0xA4, 0xA9, 0x19, 0xC7, 0x4F, 0x34, 0xFD, 0x54, - 0x0A, - - 0x79, 0x14, 0x36, 0xA5, 0x6B, 0x3F, 0x22, 0xFA, - 0x12, 0x4B, 0x4F, 0xC4, 0x97, 0xD7, 0xC7, 0x61, - 0x94, 0x53, 0x53, 0xD3, 0xF5, 0x07, 0x64, 0x7D, - 0xE0, 0x11, 0x63, 0xC5, 0xE7, 0x4A, 0x88, 0xEC, - 0x6C, 0x0D, 0xA5, 0x05, 0x13, 0xE4, 0xC6, 0x94, - 0x3D, 0xEE, 0x87, 0xB1, 0x77, 0xCE, 0xB6, 0x7E, - 0xC9, 0x99, 0xB5, 0xAA, 0xB2, 0xC8, 0x0F, 0x5F, - 0xE9, 0x92, 0x9F, 0x1E, 0x49, 0x6D, 0xC8, 0xD7, - 0x6D, 0x1E, 0xD7, 0x63, 0x6D, 0xDD, 0x64, 0xCB, - 0xFF, 0x45, 0xB0, 0xF6, 0x89, 0xC5, 0xF3, 0xFB, - 0x82, 0xB9, 0x5B, 0xF1, 0x42, 0x4A, 0x8C, 0x9E, - 0xCD, 0x9D, 0xEF, 0x9D, 0x36, 0x79, 0x04, 0x7D, - 0x16, 0x6D, 0xC6, 0x66, 0xAA, 0xFE, 0x1D, 0xAB, - 0x4D, 0xDF, 0xF8, 0xE8, 0xC3, 0x12, 0xB3, 0xAD, - 0x49, 0xD1, 0x85, 0x7D, 0x2C, 0x76, 0xD9, 0x66, - 0x85, 0xA0, 0x81, 0x29, 0x2B, 0x13, 0x47, 0x1E, - 0x98, 0x77, 0x79, 0x3F, 0x23, 0xD2, 0xFC, 0xA5, - 0xA5, 0x64, 0xDF, 0xBB, 0x3E, 0xA8, 0x85, 0x98, - 0xB1, 0x34, 0x2B, 0xB7, 0xA0, 0xD1, 0x7A, 0x47, - 0x42, 0xFE, 0x98, 0x80, 0xBB, 0x21, 0x19, 0x4F, - 0xE0, 0x58, 0x2D, 0xD9, 0xE2, 0x0F, 0x46, 0x13, - 0xC7, 0x4A, 0x11, 0xDD, 0x49, 0xEC, 0x32, 0x0C, - 0x1C, 0x3C, 0x96, 0x75, 0x3C, 0xB4, 0x73, 0x07, - 0x3E, 0xBC, 0xA4, 0xB8, 0x17, 0x05, 0x38, 0x92, - 0x6B, 0x56, 0xF3, 0x28, 0xE3, 0x71, 0x73, 0x2A, - 0x30, 0x4C, 0xF5, 0xCF, 0x2A, 0xC5, 0x1B, 0x24, - 0x4E, 0xA0, 0x2C, 0x9A, 0xCA, 0x98, 0x8C, 0xCA, - 0x16, 0xD3, 0xA6, 0x77, 0xC7, 0x83, 0x3C, 0x25, - 0x96, 0x0D, 0x15, 0xBE, 0x33, 0x7E, 0xCA, 0x3A, - 0xC0, 0x37, 0x7C, 0x91, 0x04, 0xF0, 0x4D, 0x8D, - 0xAE, 0xBF, 0x6B, 0x99, 0x57, 0x63, 0x90, 0x10, - 0x41, 0xF1, - - 0x83, 0xD6, 0xF5, 0x41, 0x9F, 0x3B, 0x2C, 0x9B, - 0xAB, 0xAF, 0x1B, 0xAE, 0x69, 0xB4, 0xAA, 0x5B, - 0xF9, 0x5F, 0x0F, 0xC7, 0xD4, 0x7F, 0x90, 0xAF, - 0xB2, 0xBA, 0xAB, 0x86, 0x92, 0x8E, 0x66, 0x46, - 0xD5, 0x73, 0x08, 0xB7, 0x3E, 0x46, 0x86, 0xC0, - 0x1C, 0x72, 0xB1, 0xDF, 0x7A, 0x3A, 0xC4, 0xEF, - 0x85, 0x36, 0x21, 0x3C, 0x29, 0xB9, 0x68, 0xFD, - 0x48, 0xBD, 0x1A, 0x5C, 0x83, 0xA3, 0x02, 0xFD, - 0x67, 0xBF, 0xC3, 0xD1, 0x68, 0xE1, 0xB8, 0x91, - 0x57, 0xA5, 0x7B, 0xE8, 0x4B, 0x82, 0x7C, 0x76, - 0xEB, 0x1C, 0x38, 0x4C, 0x1E, 0x54, 0xE8, 0x66, - 0x47, 0x47, 0x8A, 0x41, 0xD7, 0x38, 0xCC, 0x8E, - 0xD8, 0x58, 0x20, 0x26, 0x79, 0x7B, 0x5A, 0xCF, - 0xD0, 0x0E, 0x6C, 0xE4, 0x91, 0x01, 0xE4, 0x95, - 0xF8, 0x6D, 0x7F, 0xFD, 0x38, 0x04, 0x41, 0x23, - 0x72, 0xC7, 0x32, 0xD9, 0x65, 0x4F, 0xCF, 0x3D, - 0xE8, 0xA3, 0xA7, 0x9C, 0xEF, 0x05, 0xDE, 0x12, - 0x70, 0x96, 0x04, 0x2C, 0x75, 0x06, 0xBE, 0xEC, - 0xA0, 0x37, 0x43, 0xF7, 0x39, 0x7E, 0x90, 0x39, - 0xAB, 0xFF, 0x97, 0x27, 0x05, 0xBC, 0x9D, 0xB9, - 0xDB, 0x8C, 0xFB, 0x10, 0x55, 0xC1, 0x63, 0xAA, - 0x59, 0xD3, 0x09, 0xC7, 0x49, 0xDB, 0x18, 0x2B, - 0x4A, 0xAE, 0x2B, 0x0E, 0xE0, 0x45, 0x3E, 0x96, - 0xF8, 0x82, 0x0F, 0xC4, 0xB7, 0x17, 0x3A, 0x0B, - 0x1D, 0x43, 0x81, 0x33, 0xA5, 0xDD, 0x26, 0x12, - 0xBF, 0xD9, 0x56, 0x13, 0xD8, 0xBB, 0xBE, 0xA8, - 0xAE, 0xCE, 0xF0, 0x99, 0x95, 0x66, 0xA0, 0xB5, - 0xD1, 0x94, 0xA3, 0xF8, 0x42, 0x3F, 0x3B, 0x0F, - 0x56, 0x9A, 0xBF, 0xAE, 0xEE, 0xC1, 0xA8, 0x25, - 0xFA, 0xF5, 0x0D, 0xAE, 0x4F, 0x40, 0x2B, 0xB2, - 0xEF, 0xB1, 0x61, 0xCF, 0x41, 0x6D, 0x96, 0x4D, - 0x8E, 0x0B, 0xFE, - - 0x24, 0xE7, 0xE5, 0x6C, 0xA2, 0x9D, 0xFB, 0xD1, - 0x90, 0xAA, 0xF0, 0xE7, 0xA6, 0x08, 0x5C, 0x80, - 0x69, 0xEE, 0x83, 0xE9, 0x8B, 0x70, 0x0B, 0x97, - 0xFB, 0xF0, 0xE5, 0x43, 0x81, 0x6D, 0xDC, 0xE9, - 0x4C, 0x14, 0xFA, 0xEA, 0x1F, 0x39, 0x31, 0x2A, - 0x60, 0x87, 0x10, 0x95, 0x19, 0x3A, 0x97, 0x09, - 0xF6, 0x7A, 0xDF, 0xF1, 0xAE, 0xB5, 0x43, 0x0D, - 0x6C, 0x1E, 0x2C, 0xC9, 0x2A, 0xF3, 0x76, 0xDA, - 0x6A, 0xEB, 0xE4, 0x92, 0x74, 0x82, 0xF1, 0x4C, - 0x64, 0x28, 0x01, 0xB0, 0xE1, 0xDF, 0x9A, 0x6B, - 0x89, 0x02, 0xE0, 0x43, 0xC6, 0x77, 0x18, 0xE8, - 0xC4, 0xC9, 0x98, 0xF2, 0x8F, 0xE0, 0xB4, 0x38, - 0x50, 0x81, 0xC7, 0xF4, 0x3F, 0xE2, 0xD9, 0xCB, - 0x5E, 0xE9, 0x5B, 0xC5, 0x98, 0xD2, 0xEB, 0xC6, - 0x13, 0x3E, 0xC1, 0x13, 0xFD, 0x54, 0x48, 0xA0, - 0x09, 0x64, 0x71, 0xE5, 0xCA, 0xC0, 0x75, 0x2D, - 0xF7, 0x89, 0x5B, 0x00, 0x05, 0xE1, 0x4B, 0xA8, - 0xDA, 0x12, 0x6A, 0x4E, 0xCE, 0xAB, 0x3A, 0xDF, - 0x4A, 0x90, 0xF4, 0xCA, 0x6C, 0x40, 0x00, 0xF9, - 0x9F, 0x92, 0xF7, 0x94, 0x53, 0x77, 0x55, 0x7F, - 0xA8, 0xA5, 0xBC, 0xC2, 0xC2, 0x45, 0xBB, 0x07, - 0x13, 0x4D, 0x9E, 0x0D, 0xCF, 0x49, 0xF1, 0x5A, - 0x69, 0xDF, 0x2D, 0x53, 0x54, 0xB7, 0x7A, 0xD4, - 0x2F, 0x1B, 0x99, 0x78, 0x84, 0x81, 0x04, 0xC4, - 0x5C, 0x26, 0x35, 0x01, 0xED, 0x75, 0xBC, 0x54, - 0x71, 0xA3, 0x96, 0x9E, 0xD4, 0x41, 0xCB, 0x05, - 0xB3, 0x08, 0x98, 0xAD, 0x93, 0x15, 0xF7, 0xC2, - 0xF4, 0xCB, 0xE6, 0xB7, 0xEB, 0x3F, 0xF7, 0x62, - 0x45, 0x40, 0xE3, 0x97, 0x58, 0xC4, 0x49, 0xED, - 0xBA, 0x92, 0xA3, 0x94, 0x1F, 0xCD, 0x66, 0x9C, - 0xA6, 0x85, 0x1F, 0xBF, 0xA1, 0xAA, 0x03, 0x1B, - 0xB2, 0x70, 0x9D, 0xE3, - - 0x0B, 0x45, 0xA1, 0x98, 0x47, 0xD8, 0xB2, 0x5D, - 0x41, 0xA7, 0x35, 0xE4, 0x41, 0x4B, 0x45, 0x6A, - 0x9A, 0x91, 0xA5, 0x66, 0xDA, 0x63, 0xE7, 0xB8, - 0x4E, 0x88, 0x0A, 0x80, 0x2E, 0xEC, 0x08, 0x74, - 0x8E, 0xEB, 0xDA, 0xC4, 0x6D, 0xB5, 0xDA, 0x27, - 0xEC, 0x67, 0xAC, 0x7D, 0x63, 0x7A, 0xF4, 0x9B, - 0xB6, 0x43, 0xE5, 0x87, 0xA7, 0x52, 0x34, 0xFD, - 0x15, 0x99, 0xC7, 0x13, 0x3E, 0xC6, 0x4F, 0x38, - 0xA3, 0x8B, 0xD1, 0xB4, 0x5E, 0x0E, 0xC0, 0xA8, - 0x9B, 0x34, 0x47, 0xC3, 0x61, 0x82, 0x0D, 0xBF, - 0x78, 0x2F, 0x90, 0x7B, 0x07, 0x5A, 0x2B, 0xA2, - 0xB6, 0x9D, 0xB0, 0x15, 0x0A, 0x32, 0xA1, 0x70, - 0x4E, 0x8D, 0x98, 0xC4, 0xB7, 0xE0, 0xD0, 0xBE, - 0x1D, 0xB4, 0xA3, 0xC9, 0x6A, 0xA4, 0xE6, 0x4F, - 0x12, 0xC2, 0x35, 0xD7, 0xA6, 0x69, 0x67, 0x18, - 0x2C, 0xB0, 0xCF, 0x39, 0x78, 0xDB, 0xB7, 0x66, - 0x50, 0xFD, 0xB7, 0x3F, 0x77, 0x7F, 0x4E, 0x3C, - 0xF8, 0xBD, 0xC5, 0xD2, 0xCA, 0xCB, 0xCB, 0x10, - 0x94, 0x9F, 0x3E, 0xA0, 0x5B, 0xBA, 0x74, 0xB9, - 0x84, 0xFE, 0xB1, 0x91, 0x93, 0x5D, 0x8B, 0x23, - 0x86, 0x8F, 0xCB, 0xF0, 0x0E, 0x27, 0xA8, 0x6A, - 0x57, 0xF3, 0x7A, 0xEE, 0x94, 0x5F, 0x29, 0x3F, - 0xF8, 0xD3, 0xD1, 0x30, 0xCD, 0x8B, 0x31, 0xFC, - 0x6E, 0xC6, 0x31, 0xB7, 0x76, 0x26, 0x12, 0x7A, - 0xB9, 0xB0, 0x29, 0x4D, 0xAF, 0x10, 0xFC, 0xCC, - 0xD1, 0xD6, 0x9C, 0x19, 0x81, 0x15, 0xC4, 0x19, - 0xDD, 0x5D, 0x56, 0x65, 0x6C, 0xE0, 0x39, 0x25, - 0x5C, 0xE5, 0xE2, 0x6E, 0x5D, 0x48, 0x44, 0xF8, - 0x53, 0x4A, 0x36, 0x48, 0xDB, 0x0D, 0x89, 0xF7, - 0x1B, 0xF5, 0xD0, 0x8E, 0xA2, 0xD8, 0xD7, 0x9E, - 0xCE, 0x35, 0xA0, 0x10, 0xE5, 0xBC, 0x22, 0xF9, - 0xC3, 0x35, 0xEC, 0x35, 0x6C, - - 0x59, 0x77, 0x61, 0xB9, 0xD2, 0xA0, 0x7C, 0xD6, - 0x95, 0x93, 0x17, 0x1B, 0x25, 0x09, 0x47, 0xF1, - 0x1B, 0x73, 0x28, 0xA8, 0xA1, 0xF6, 0x0F, 0x7F, - 0x4B, 0x86, 0xED, 0xC5, 0xBD, 0x15, 0x92, 0x75, - 0x23, 0x3E, 0x38, 0x30, 0xE0, 0x64, 0x80, 0x7B, - 0x10, 0xD5, 0x54, 0x08, 0x6E, 0x3D, 0x78, 0xFE, - 0x40, 0x0C, 0xFD, 0x86, 0xC1, 0xD1, 0xD4, 0xE7, - 0xF0, 0xD2, 0xFF, 0x52, 0xA4, 0x8F, 0xA8, 0x0A, - 0x9C, 0x6E, 0x49, 0x70, 0xC6, 0x7D, 0x7C, 0xDD, - 0xCE, 0x75, 0x09, 0xE3, 0xBF, 0x5A, 0x4A, 0x30, - 0xFD, 0xC0, 0x2B, 0x8F, 0x23, 0x39, 0x6B, 0x41, - 0x17, 0x51, 0x1F, 0x16, 0xAC, 0x33, 0x69, 0x42, - 0xD2, 0xE2, 0x32, 0x91, 0x81, 0xCB, 0x7C, 0x04, - 0xC8, 0xD9, 0x77, 0x1A, 0x59, 0xC7, 0x37, 0x5C, - 0x5B, 0xC3, 0x9F, 0x22, 0xE5, 0xDA, 0xD8, 0x59, - 0x3C, 0x01, 0xE6, 0xCC, 0x46, 0x5C, 0x90, 0xE0, - 0x3F, 0x4D, 0x77, 0xAD, 0x96, 0x2A, 0x5D, 0x37, - 0x0F, 0x59, 0x10, 0xF0, 0x23, 0xF0, 0xA9, 0x75, - 0xED, 0xDE, 0xFB, 0x74, 0x06, 0x2B, 0xBF, 0x20, - 0xED, 0xEA, 0xCD, 0x49, 0x8A, 0x41, 0x09, 0x6C, - 0x0F, 0x0E, 0x79, 0xF7, 0x61, 0x18, 0xBF, 0x77, - 0x09, 0xB9, 0x05, 0xEF, 0x89, 0xEE, 0x79, 0xD9, - 0x20, 0xAF, 0xE3, 0x3F, 0x0E, 0xCE, 0x3E, 0x94, - 0x0C, 0x3B, 0xC1, 0xA0, 0x88, 0xA8, 0x8D, 0xDB, - 0x4D, 0x70, 0xC6, 0x19, 0x2A, 0xCE, 0xE1, 0x9D, - 0x9E, 0x60, 0xBD, 0x93, 0x2D, 0xF1, 0xC6, 0x50, - 0x1B, 0xA7, 0x21, 0x7B, 0x11, 0x86, 0xCD, 0xF9, - 0x17, 0xAE, 0x4B, 0x88, 0x7B, 0xAF, 0xD1, 0xCA, - 0x80, 0xF7, 0xA1, 0x7F, 0x0A, 0x4D, 0xF8, 0x35, - 0x6E, 0xB1, 0x61, 0xEC, 0xAB, 0xD7, 0x60, 0x2D, - 0xB8, 0xB7, 0x59, 0x77, 0x90, 0xED, 0xC5, 0x24, - 0xCA, 0x02, 0xF2, 0x35, 0xD8, 0xB4, - - 0xE5, 0x07, 0x55, 0x53, 0x6C, 0x5E, 0xD2, 0x9F, - 0xE4, 0x23, 0xA5, 0x58, 0x45, 0x18, 0x2B, 0x0B, - 0x17, 0x00, 0xE8, 0xD7, 0x89, 0x06, 0xE6, 0x75, - 0x56, 0x25, 0xC0, 0x92, 0x79, 0xCD, 0xA2, 0xC0, - 0xBD, 0x8E, 0x52, 0x0D, 0xF3, 0xA2, 0xA1, 0x66, - 0x0F, 0x94, 0x23, 0xE7, 0x2D, 0x14, 0xB6, 0x82, - 0xB0, 0x9A, 0xE1, 0xE8, 0xF3, 0x15, 0x92, 0xFB, - 0xDE, 0x8D, 0xA2, 0x1A, 0xB3, 0xB2, 0xF7, 0xC0, - 0xAB, 0xA9, 0x79, 0x70, 0xBE, 0xE8, 0x14, 0x65, - 0x79, 0x10, 0x1C, 0x7C, 0x29, 0x2C, 0x16, 0x33, - 0xBB, 0xEF, 0x91, 0x5A, 0xC0, 0xA5, 0x7D, 0x97, - 0x79, 0x42, 0xB9, 0xA3, 0x7E, 0x9E, 0x87, 0xBB, - 0xDC, 0x65, 0x12, 0xDC, 0xD9, 0x2D, 0x73, 0x8A, - 0x73, 0x38, 0xF1, 0xA5, 0x60, 0x7E, 0xD1, 0xF3, - 0x97, 0xAB, 0xCF, 0xFF, 0x5C, 0x5E, 0xE1, 0xAC, - 0x1A, 0x41, 0xC2, 0x6D, 0xB1, 0x24, 0xAF, 0x19, - 0x55, 0x61, 0x4D, 0xDA, 0xD4, 0xE7, 0x10, 0x78, - 0x14, 0x2B, 0xA4, 0x88, 0x9D, 0x2F, 0x96, 0xF8, - 0x03, 0xF6, 0xB5, 0x13, 0x2B, 0xEA, 0x52, 0x24, - 0xB2, 0xA1, 0x46, 0xEC, 0x57, 0x59, 0x19, 0x17, - 0x83, 0x05, 0x20, 0x44, 0x4C, 0xEC, 0xC7, 0xE0, - 0xB1, 0x84, 0x00, 0x62, 0xE5, 0xE5, 0xAA, 0x0B, - 0xE6, 0x0E, 0x44, 0x5D, 0x55, 0x1D, 0x15, 0xDC, - 0xCE, 0x53, 0x2C, 0xF9, 0x7B, 0xDE, 0x95, 0x05, - 0xAF, 0x88, 0x59, 0xF1, 0xC2, 0x59, 0x3A, 0xFC, - 0x2E, 0x43, 0x37, 0x2F, 0xB8, 0x83, 0xD5, 0x42, - 0xE3, 0xA2, 0xFC, 0xA1, 0x62, 0xC6, 0x99, 0x9C, - 0x4C, 0x7A, 0x72, 0xD6, 0xF5, 0xF8, 0x3E, 0xE1, - 0xD0, 0x21, 0xE1, 0x74, 0x69, 0xB4, 0xE5, 0xB5, - 0x26, 0x2C, 0x37, 0x73, 0x90, 0xD3, 0x1D, 0x5B, - 0x08, 0xF4, 0x64, 0xE4, 0x9F, 0xA1, 0x95, 0xAE, - 0xCA, 0xB5, 0x6A, 0xD4, 0x50, 0x12, 0xDC, - - 0xED, 0xE8, 0x53, 0x43, 0xCA, 0x1B, 0xB7, 0x40, - 0x82, 0x4A, 0x01, 0x55, 0xD6, 0x0F, 0x9F, 0xFE, - 0x2F, 0x1B, 0x94, 0x9F, 0x49, 0xFA, 0x86, 0x45, - 0x3C, 0x63, 0x14, 0x2E, 0xAF, 0x66, 0x78, 0x97, - 0xA3, 0x40, 0x11, 0x32, 0x52, 0x3F, 0x22, 0x26, - 0xCA, 0xCC, 0x61, 0x3F, 0x31, 0x5E, 0x67, 0x5D, - 0x71, 0x7D, 0x5F, 0x69, 0xBF, 0xDC, 0x93, 0x1E, - 0xA8, 0x5F, 0xA2, 0x56, 0x91, 0xEC, 0xCE, 0x61, - 0x67, 0xF3, 0xDC, 0xE8, 0xF4, 0xF7, 0x46, 0xE9, - 0xE3, 0xB8, 0x21, 0x2A, 0x6E, 0xB9, 0xDD, 0x69, - 0x14, 0xFF, 0x1C, 0xC1, 0xF4, 0x27, 0x6B, 0x6E, - 0x2D, 0xC0, 0x75, 0x56, 0xF9, 0x75, 0x21, 0x3D, - 0x39, 0xE0, 0x67, 0x3C, 0xCC, 0x4D, 0x95, 0xDD, - 0xFE, 0x99, 0x1C, 0x77, 0xA6, 0xF2, 0x62, 0x23, - 0x79, 0x49, 0xAB, 0x65, 0x34, 0x2F, 0x71, 0x6F, - 0xCD, 0xA3, 0xBF, 0xF3, 0xAE, 0x08, 0xF8, 0xF3, - 0x18, 0x67, 0x51, 0x33, 0xD7, 0x3B, 0xF1, 0xD0, - 0x37, 0xA9, 0x07, 0x52, 0x77, 0xF0, 0x75, 0x0C, - 0xC6, 0x4A, 0xDC, 0x6B, 0x4C, 0xBF, 0x80, 0xEC, - 0x42, 0x89, 0x19, 0x22, 0xE1, 0x90, 0x2F, 0xC9, - 0x5E, 0x5D, 0xC8, 0xCF, 0xD3, 0x9F, 0x37, 0xAF, - 0x60, 0xAE, 0x34, 0x5F, 0xD8, 0x3F, 0xA9, 0x55, - 0x0E, 0x5C, 0xC9, 0xA8, 0xA2, 0x0E, 0xE3, 0xC2, - 0xAC, 0x9E, 0x87, 0x38, 0xBB, 0x53, 0x86, 0x82, - 0xDF, 0x05, 0xE4, 0x23, 0xF3, 0x77, 0xDA, 0x7A, - 0x1E, 0x9C, 0x88, 0x53, 0xB9, 0x14, 0x56, 0x49, - 0x2F, 0x6A, 0xE8, 0x3A, 0xF1, 0x5C, 0x72, 0xAF, - 0x2A, 0x19, 0x0A, 0xBB, 0x2B, 0xFD, 0x91, 0x59, - 0x43, 0x12, 0x9C, 0xC3, 0x0B, 0x7A, 0x7F, 0x85, - 0x1C, 0x98, 0x34, 0xF6, 0xDE, 0x59, 0x3F, 0x7C, - 0x49, 0x37, 0x75, 0x6B, 0xC1, 0xE1, 0xD7, 0x70, - 0xB9, 0xFB, 0xCA, 0xD8, 0x41, 0x6B, 0x8C, 0x01, - - 0xB9, 0xC3, 0x0F, 0x35, 0xEB, 0x2F, 0x12, 0x4E, - 0xE4, 0x78, 0x2D, 0x24, 0x77, 0xA4, 0x89, 0x1F, - 0x64, 0xAD, 0xE7, 0x2B, 0x49, 0xE0, 0xDC, 0x05, - 0x7D, 0x6C, 0xEC, 0x4E, 0x9E, 0xAE, 0x2E, 0xDF, - 0xE6, 0xF2, 0x3F, 0xC6, 0xD5, 0xAA, 0xFC, 0x23, - 0xAB, 0xCB, 0x96, 0x49, 0xC4, 0xEB, 0xAF, 0x18, - 0x14, 0x27, 0xFB, 0xE7, 0x1C, 0x34, 0xF7, 0x22, - 0x69, 0xA3, 0xD2, 0xFD, 0x9E, 0x9F, 0x29, 0xA9, - 0x50, 0x34, 0x3C, 0x4F, 0xDD, 0xE5, 0xAB, 0xE6, - 0xAC, 0x99, 0x80, 0x50, 0x7A, 0x4F, 0x79, 0xD2, - 0xC2, 0xC6, 0x31, 0x8F, 0xF6, 0xD6, 0xAA, 0x57, - 0x00, 0xA2, 0x4B, 0x61, 0xBA, 0xD6, 0x28, 0xD3, - 0xFA, 0x93, 0xE4, 0x65, 0x53, 0x81, 0xD3, 0x01, - 0xF1, 0xDA, 0x7A, 0x12, 0x85, 0x17, 0x5A, 0x7E, - 0x35, 0x21, 0x6C, 0xF0, 0x18, 0x34, 0xA4, 0xF4, - 0xDD, 0x24, 0xEB, 0x86, 0xDC, 0xD0, 0xF7, 0xAB, - 0x41, 0xB5, 0x59, 0x3F, 0x22, 0x7B, 0xCF, 0xDB, - 0x61, 0x4D, 0x61, 0x58, 0x55, 0xA5, 0x23, 0xCE, - 0x69, 0x2D, 0x5C, 0x24, 0x73, 0xA2, 0x80, 0x3F, - 0x67, 0xB7, 0x66, 0xD8, 0x30, 0x87, 0xFE, 0x74, - 0x23, 0x35, 0xFD, 0xD8, 0xA7, 0xD4, 0xAC, 0x02, - 0x40, 0xF6, 0xCA, 0x9B, 0xB3, 0xB4, 0x73, 0xEA, - 0x67, 0x39, 0xB4, 0x1B, 0xB4, 0x45, 0xFB, 0xB2, - 0xF9, 0xDB, 0x8E, 0x90, 0x29, 0x62, 0x9D, 0x9D, - 0x73, 0x30, 0x6C, 0x51, 0x56, 0xA6, 0x9B, 0x9A, - 0xE9, 0x33, 0xCA, 0xC8, 0xED, 0xE4, 0x58, 0x91, - 0x82, 0x17, 0x10, 0x0F, 0x2D, 0xF7, 0x82, 0xCD, - 0x25, 0x61, 0x45, 0xCD, 0xDD, 0x66, 0xF1, 0x8A, - 0xDC, 0x08, 0xF8, 0x53, 0xF6, 0x07, 0x8E, 0x3A, - 0x6F, 0x0B, 0xF0, 0x9D, 0x8F, 0xFE, 0xDD, 0xCF, - 0x94, 0xDD, 0xB2, 0x1F, 0x1A, 0xFF, 0x08, 0x22, - 0x3D, 0xEE, 0x45, 0x6B, 0xD2, 0x5A, 0xF3, 0x15, - 0x93, - - 0xCC, 0x0E, 0xCA, 0xDF, 0xEF, 0xC6, 0xC6, 0x35, - 0x66, 0x95, 0xFF, 0xCE, 0x3F, 0x13, 0x97, 0xEA, - 0xEC, 0xB9, 0xEB, 0x1F, 0x82, 0x4E, 0x6A, 0xFF, - 0xB0, 0x0A, 0x75, 0xAB, 0xBC, 0x6B, 0xF1, 0xC4, - 0xEE, 0xB8, 0x8C, 0xAE, 0x52, 0xED, 0x7C, 0x9E, - 0xF3, 0xE2, 0x74, 0xAD, 0x95, 0x65, 0x8F, 0x2D, - 0x1A, 0x93, 0xF5, 0x35, 0x5D, 0x5E, 0x7F, 0x5A, - 0x22, 0x9F, 0x48, 0x81, 0x25, 0xDE, 0xB1, 0xC3, - 0x0A, 0xD6, 0x7E, 0x9E, 0x77, 0xF0, 0x1F, 0x77, - 0xE0, 0x85, 0xBB, 0xFA, 0xC5, 0x87, 0xC7, 0x17, - 0x0A, 0x7B, 0x3D, 0x85, 0xD4, 0xA9, 0xCA, 0x98, - 0xCC, 0x08, 0xD5, 0x40, 0x58, 0x6A, 0x0D, 0xFE, - 0xBC, 0x4D, 0xBE, 0x46, 0x9E, 0xC0, 0x84, 0xF4, - 0x63, 0xE7, 0xEA, 0xFD, 0x7B, 0x73, 0x1D, 0xDB, - 0xE2, 0xD7, 0x51, 0x6D, 0xB2, 0x4F, 0x79, 0x37, - 0x9E, 0x37, 0x39, 0xE9, 0xD7, 0xCB, 0x7F, 0x56, - 0x5E, 0x68, 0xCC, 0x73, 0x7B, 0xBA, 0x3D, 0x76, - 0x0A, 0x41, 0x0B, 0x83, 0xC5, 0xAA, 0xCF, 0x7E, - 0xDA, 0x40, 0xB6, 0xCB, 0xC1, 0x76, 0xE5, 0x21, - 0xC3, 0xC8, 0xDB, 0x01, 0x2A, 0x87, 0xFF, 0x9E, - 0xC7, 0x58, 0xD5, 0xC8, 0x22, 0x37, 0x3F, 0x1F, - 0x49, 0xF0, 0x9F, 0x7C, 0x60, 0x91, 0x8C, 0xC5, - 0x51, 0xE3, 0x5F, 0x7A, 0x98, 0x0B, 0x3E, 0xE1, - 0xAA, 0xC8, 0xE4, 0x3C, 0xC5, 0x98, 0xC0, 0xE5, - 0x00, 0x5C, 0xEB, 0x57, 0xAF, 0xF2, 0x67, 0x30, - 0x11, 0xB0, 0xD8, 0x82, 0x8A, 0x5A, 0x97, 0xC8, - 0xFC, 0x09, 0xD7, 0x74, 0x98, 0xC9, 0x8D, 0xB5, - 0x1A, 0x96, 0x79, 0x47, 0xDE, 0x9B, 0x7C, 0xF3, - 0x86, 0x80, 0x87, 0x2C, 0x2F, 0xC6, 0xA6, 0x17, - 0x85, 0xF3, 0xD1, 0xEE, 0x33, 0x68, 0x7A, 0xCC, - 0x54, 0x4A, 0x08, 0x18, 0x8F, 0x20, 0x08, 0x33, - 0x43, 0x25, 0x05, 0x9B, 0x21, 0xB2, 0x49, 0xA5, - 0x33, 0xC0, - - 0x62, 0xD2, 0x23, 0x2D, 0x6D, 0xC4, 0x02, 0x15, - 0x9C, 0xC7, 0x37, 0x08, 0xEA, 0x73, 0x56, 0xB4, - 0x77, 0xEE, 0x14, 0xEC, 0x2B, 0x86, 0x51, 0xA0, - 0x63, 0x54, 0x00, 0xD4, 0xDE, 0x91, 0xE9, 0x94, - 0x3F, 0x32, 0xE6, 0x44, 0x49, 0xF7, 0xBD, 0x4C, - 0xFA, 0x07, 0xFB, 0xCB, 0x86, 0xFC, 0xBA, 0x1B, - 0x66, 0x52, 0xE3, 0x2C, 0x52, 0x5C, 0x07, 0xD7, - 0xFF, 0x08, 0x93, 0x73, 0x30, 0x4E, 0xB8, 0x97, - 0x8E, 0xB5, 0xEB, 0x24, 0xF7, 0x26, 0xB5, 0x21, - 0xEA, 0x1A, 0x62, 0x1B, 0xAC, 0x12, 0x83, 0xB1, - 0xB2, 0xAB, 0x1C, 0x1C, 0x69, 0x7D, 0x5C, 0x9D, - 0x4E, 0x20, 0x13, 0x52, 0x6B, 0x88, 0xB6, 0xBE, - 0x0E, 0x8D, 0x23, 0xD4, 0x14, 0xF5, 0x99, 0xEB, - 0x2E, 0xC8, 0x4D, 0x38, 0x57, 0x47, 0x70, 0x18, - 0x65, 0xB5, 0xB8, 0xB4, 0x29, 0x99, 0xA2, 0x4B, - 0xAA, 0x5A, 0xEC, 0x8B, 0xCA, 0x9F, 0xE9, 0x6D, - 0x8B, 0x0D, 0xEC, 0x0A, 0xCB, 0xD8, 0xF7, 0x0C, - 0x7B, 0x22, 0xB0, 0xE8, 0x3C, 0x4F, 0x0C, 0xEC, - 0x7E, 0x2D, 0x8F, 0x93, 0x2C, 0xC0, 0xA8, 0x40, - 0x48, 0xAA, 0xAF, 0x83, 0x08, 0xBF, 0xBF, 0x5C, - 0xBE, 0xB8, 0xAD, 0xC0, 0xCC, 0xDC, 0x7D, 0x00, - 0x2B, 0x2B, 0xC7, 0x74, 0xB0, 0x77, 0x95, 0x5F, - 0xE9, 0xA1, 0x65, 0x45, 0xB0, 0xBB, 0xEF, 0xD8, - 0xFA, 0x1D, 0x1F, 0x66, 0xEF, 0x3B, 0x68, 0x7B, - 0x67, 0x9F, 0xFF, 0xA4, 0xB5, 0x24, 0x69, 0xAB, - 0x84, 0xE3, 0x75, 0x69, 0x56, 0x72, 0x19, 0x0D, - 0x47, 0xA3, 0xF8, 0xAE, 0xA1, 0x4E, 0xB0, 0x4C, - 0xAA, 0x0F, 0xF9, 0x08, 0xEA, 0x8F, 0x69, 0xFC, - 0x60, 0xF4, 0x91, 0xFF, 0x08, 0xD5, 0xD4, 0xB4, - 0xD2, 0x4B, 0xBD, 0x4E, 0x3F, 0x53, 0x34, 0x06, - 0x4A, 0x26, 0x57, 0x0F, 0xF2, 0xDE, 0x9D, 0x02, - 0xA4, 0xE0, 0x0D, 0xD7, 0x2C, 0x5F, 0x5F, 0x05, - 0x4F, 0x60, 0x38, - - 0x0D, 0xEC, 0xE4, 0x86, 0xF5, 0x6D, 0xC1, 0x52, - 0x88, 0x55, 0xB9, 0x1D, 0x2D, 0xD7, 0x0A, 0xB4, - 0x5C, 0xB2, 0xDE, 0xF6, 0xBD, 0x91, 0x5D, 0x8D, - 0x0D, 0xB0, 0xD8, 0x54, 0x56, 0x62, 0xF1, 0x94, - 0xB5, 0xEE, 0x73, 0x23, 0xF2, 0x25, 0xF5, 0x7E, - 0x6A, 0xBF, 0x8A, 0xAA, 0x1C, 0x66, 0xCB, 0xA0, - 0xD6, 0xB2, 0xFC, 0x94, 0x6E, 0x26, 0x49, 0xF8, - 0xDE, 0xC0, 0xD8, 0x04, 0x93, 0x80, 0x16, 0x52, - 0xA6, 0xDE, 0x3F, 0x87, 0x4E, 0x2F, 0x93, 0xBD, - 0xAA, 0x8D, 0xA8, 0x86, 0x27, 0xAC, 0x6D, 0xA0, - 0x13, 0x81, 0xF6, 0xE7, 0x7D, 0xBC, 0xF1, 0x09, - 0x38, 0x09, 0x93, 0xC5, 0x94, 0x84, 0x0F, 0x4E, - 0x28, 0xCA, 0x29, 0x4D, 0xED, 0xDC, 0x91, 0xDC, - 0xEC, 0x16, 0xF7, 0x86, 0x4C, 0x0B, 0x2C, 0xDA, - 0xCE, 0x2B, 0x1B, 0xB4, 0xFC, 0x6F, 0xA5, 0x7C, - 0xE2, 0xC0, 0xAD, 0xC7, 0xA7, 0xE1, 0x28, 0x03, - 0xD5, 0xB3, 0x30, 0x51, 0xA2, 0x24, 0x2F, 0x9E, - 0x16, 0x48, 0x54, 0x6B, 0x36, 0x60, 0x22, 0x58, - 0x00, 0xFF, 0x40, 0x59, 0x17, 0x36, 0x1C, 0x2C, - 0x58, 0x0F, 0xC0, 0x5D, 0x41, 0x47, 0x7F, 0xE3, - 0xB1, 0x5F, 0x0A, 0x88, 0xBC, 0xBA, 0x83, 0xBF, - 0x3D, 0x0B, 0xDF, 0xFC, 0xD3, 0x55, 0xDF, 0x72, - 0x0D, 0x8A, 0xAF, 0x4D, 0xF4, 0x0C, 0x0F, 0x8C, - 0xE9, 0xEE, 0xA5, 0xA7, 0xFF, 0x87, 0x81, 0x2E, - 0x38, 0x04, 0x76, 0xAE, 0xA2, 0xE6, 0x84, 0x73, - 0xFF, 0xEC, 0xEE, 0xA3, 0x40, 0xA8, 0x67, 0x8C, - 0xD6, 0x68, 0x70, 0xA0, 0x6B, 0x3F, 0x0D, 0x45, - 0xE0, 0xA0, 0x29, 0x38, 0xF8, 0xD5, 0x58, 0x59, - 0xBD, 0x9B, 0x2B, 0xD3, 0x8B, 0x45, 0x3D, 0xDB, - 0x79, 0x0F, 0x25, 0xE7, 0xF9, 0xC7, 0x30, 0xC8, - 0x92, 0xC1, 0x99, 0xBE, 0xEC, 0xAF, 0x68, 0xDF, - 0x9F, 0xEC, 0x4C, 0x8C, 0xD8, 0x7A, 0xEF, 0x07, - 0x6E, 0x14, 0xF4, 0x41, - - 0x93, 0x45, 0x33, 0x61, 0xF0, 0xF2, 0x27, 0x76, - 0x4C, 0x53, 0x60, 0xAE, 0x83, 0xB0, 0x90, 0x70, - 0xDB, 0xAE, 0x2F, 0x1A, 0xCF, 0xF2, 0xC6, 0x50, - 0x36, 0x1B, 0x2E, 0x75, 0xF2, 0x4F, 0x1B, 0x9B, - 0x81, 0x2F, 0x49, 0x96, 0xED, 0x05, 0x69, 0x07, - 0x0C, 0x6B, 0x5A, 0x35, 0x11, 0x6B, 0x29, 0xC6, - 0x07, 0xF5, 0x68, 0xAF, 0x26, 0xE1, 0xEB, 0x71, - 0x53, 0x4A, 0xC0, 0x5A, 0x1B, 0xDD, 0x49, 0x28, - 0x90, 0xE3, 0xDB, 0x1F, 0x86, 0xB1, 0xAB, 0x4A, - 0x64, 0x39, 0x8F, 0x83, 0xA7, 0x37, 0x1B, 0xC9, - 0xB6, 0xEA, 0x5E, 0xA8, 0x25, 0x87, 0x78, 0x52, - 0xA0, 0xE5, 0xA3, 0x26, 0x74, 0x66, 0xCC, 0x0A, - 0x92, 0x7D, 0x9B, 0x4B, 0xAD, 0x79, 0x7F, 0x87, - 0x9E, 0x0A, 0xF9, 0xDE, 0xB0, 0x31, 0x2B, 0xDC, - 0xC8, 0x29, 0xD0, 0xAC, 0x3C, 0xD8, 0x60, 0x19, - 0xA5, 0xF6, 0x50, 0xC1, 0xBA, 0x0F, 0xE4, 0x4A, - 0x07, 0xE8, 0xA5, 0xB7, 0x6C, 0x88, 0xF1, 0xBE, - 0xAF, 0x2F, 0x40, 0x9B, 0xB3, 0x98, 0x28, 0x43, - 0x25, 0xBB, 0x23, 0x1C, 0xF3, 0x98, 0x19, 0x9E, - 0x9E, 0x3D, 0xC0, 0xFF, 0x05, 0xA8, 0x35, 0xCD, - 0x47, 0xB7, 0xB3, 0xEF, 0xC9, 0x38, 0x36, 0xE7, - 0xF9, 0x6F, 0x5B, 0x6E, 0x79, 0xCB, 0x08, 0x49, - 0x6F, 0x4C, 0x17, 0xC2, 0x91, 0x7E, 0x8B, 0x86, - 0x57, 0x30, 0x8F, 0x92, 0x94, 0x34, 0x10, 0x1B, - 0xE5, 0x8F, 0xCC, 0xAF, 0xD0, 0x87, 0xDA, 0x9A, - 0xF2, 0x09, 0x99, 0x6C, 0x8E, 0x50, 0x91, 0x7D, - 0x7C, 0x4D, 0x3E, 0x24, 0xFF, 0xD4, 0xC1, 0xAA, - 0xA7, 0x80, 0x89, 0xB5, 0x8E, 0x50, 0x7D, 0x49, - 0xD4, 0xA0, 0xA1, 0xFD, 0x34, 0xCA, 0xB8, 0xCB, - 0x64, 0x76, 0x07, 0x91, 0x39, 0x7D, 0xAE, 0xE2, - 0xD9, 0x5A, 0xCB, 0xB7, 0xAD, 0x9E, 0x8C, 0xE8, - 0x0A, 0xE8, 0xE9, 0xCC, 0x49, 0x97, 0xC3, 0xE9, - 0x96, 0x1A, 0xCE, 0xFF, 0x16, - - 0x3D, 0x76, 0xF1, 0x1D, 0x88, 0x56, 0x8E, 0x23, - 0x96, 0xE0, 0x55, 0xE9, 0xF3, 0x36, 0xCE, 0xEA, - 0x3C, 0x72, 0x34, 0x12, 0xA4, 0x19, 0x29, 0x74, - 0x26, 0xCA, 0xF9, 0xDB, 0xA4, 0x2F, 0x2E, 0xBD, - 0xD1, 0x64, 0x97, 0xE2, 0x7E, 0x30, 0x59, 0xDB, - 0xBB, 0x7D, 0x42, 0xD2, 0xC1, 0x84, 0x18, 0x1F, - 0x67, 0x61, 0x5D, 0x40, 0xE5, 0xD8, 0x83, 0x36, - 0x98, 0xAB, 0x2F, 0xE8, 0x24, 0x13, 0xC7, 0x61, - 0x0A, 0x71, 0x59, 0x9E, 0x51, 0xE1, 0xBB, 0xCE, - 0xEA, 0xE7, 0xFC, 0x7E, 0x92, 0xE0, 0x1F, 0xA5, - 0xE3, 0x89, 0x80, 0xBC, 0xA8, 0xCB, 0xDB, 0xFD, - 0x49, 0x8D, 0x7F, 0x01, 0x15, 0xA5, 0x35, 0x89, - 0x46, 0xB5, 0xBC, 0x8E, 0x96, 0x80, 0x11, 0xCA, - 0x6C, 0x56, 0x94, 0x1C, 0x0C, 0xEC, 0x56, 0x78, - 0xC9, 0x7E, 0x4A, 0x44, 0xE7, 0xDF, 0x03, 0xA9, - 0x32, 0xF5, 0xA2, 0x4C, 0x80, 0xBB, 0x31, 0x9E, - 0x00, 0x5D, 0xCD, 0xB2, 0x33, 0x41, 0xCA, 0xA4, - 0x8A, 0xB3, 0x52, 0x59, 0xD9, 0x19, 0xD4, 0x98, - 0x78, 0xFE, 0xB1, 0x02, 0x6D, 0x52, 0x6F, 0x23, - 0xC8, 0xF7, 0xA8, 0xC2, 0xB4, 0x90, 0x69, 0x68, - 0x5A, 0xA5, 0xDB, 0x26, 0x93, 0xF0, 0x78, 0x25, - 0xC3, 0x94, 0x1F, 0x0A, 0x0B, 0x0F, 0xA8, 0xC2, - 0xCB, 0x7B, 0x0D, 0xC9, 0x53, 0x1D, 0x5A, 0xB4, - 0x30, 0xF2, 0xDD, 0x15, 0x8D, 0xDE, 0x49, 0x82, - 0x94, 0x9B, 0x6E, 0x2D, 0x2D, 0xD7, 0x21, 0x38, - 0x98, 0x61, 0xEB, 0xF3, 0xDE, 0xB1, 0xCE, 0x54, - 0xB9, 0x7F, 0x9C, 0x4B, 0xF0, 0x8B, 0xD1, 0xBF, - 0x6A, 0xA4, 0x57, 0x28, 0x86, 0xE2, 0xB2, 0x74, - 0x31, 0x51, 0x9E, 0x30, 0xF5, 0x98, 0x3E, 0x9D, - 0x98, 0x21, 0x7C, 0xAD, 0x68, 0x44, 0x91, 0x5C, - 0x11, 0x5A, 0x42, 0x0C, 0x84, 0x69, 0x62, 0xD0, - 0x98, 0x3D, 0x89, 0x4D, 0xBC, 0x65, 0x38, 0x03, - 0x44, 0x76, 0xFF, 0x20, 0x3D, 0x28, - - 0xD4, 0xAE, 0xDA, 0xA8, 0x24, 0x19, 0x06, 0xFB, - 0xE9, 0xAD, 0x9F, 0x3C, 0x1D, 0xD6, 0x92, 0x5E, - 0x83, 0x58, 0x54, 0xBB, 0xCB, 0x7D, 0x8E, 0x24, - 0x0F, 0x0A, 0x43, 0xF5, 0x6D, 0x89, 0x99, 0x4A, - 0xB7, 0xDF, 0x8A, 0x84, 0x00, 0x1A, 0xF5, 0x6E, - 0x1C, 0xC2, 0xFA, 0x20, 0xE7, 0xC2, 0x41, 0x60, - 0x7C, 0xCE, 0x90, 0x8E, 0x16, 0x64, 0x94, 0xDA, - 0xE2, 0x3A, 0x8D, 0xDF, 0x21, 0x61, 0x17, 0x3C, - 0x72, 0xE3, 0x66, 0x35, 0x0B, 0xF6, 0x30, 0x5C, - 0x82, 0x5C, 0x48, 0xA1, 0xE8, 0x21, 0x9C, 0x92, - 0xA1, 0x0F, 0xBF, 0x89, 0xC8, 0x7A, 0xEE, 0x18, - 0x87, 0x5B, 0x51, 0xF3, 0xF7, 0x0A, 0xA3, 0xB4, - 0x2E, 0xDA, 0x4E, 0xAA, 0xAD, 0x6E, 0x70, 0x04, - 0xF8, 0x47, 0x1E, 0x5F, 0x43, 0x69, 0x0B, 0x26, - 0x4C, 0xBC, 0xDB, 0x46, 0x77, 0x87, 0xA1, 0x9A, - 0x04, 0xEF, 0x74, 0x99, 0xEA, 0x29, 0x71, 0x55, - 0x9C, 0x2E, 0x47, 0xE3, 0x4A, 0x15, 0xA4, 0xF6, - 0xED, 0x5D, 0xBE, 0x4F, 0x94, 0x3F, 0xFD, 0xD3, - 0x6E, 0x0E, 0xD9, 0x26, 0x68, 0x9F, 0xC2, 0x8C, - 0xA5, 0xA8, 0xF0, 0xFB, 0x53, 0x5F, 0x18, 0xCA, - 0xDB, 0xBD, 0x98, 0x96, 0x28, 0xFC, 0xE9, 0x2E, - 0x81, 0xE1, 0x0E, 0x3A, 0x77, 0x18, 0x25, 0x9D, - 0xB7, 0x67, 0x8C, 0x35, 0x68, 0x4A, 0x88, 0x18, - 0x45, 0x6C, 0xE5, 0xCC, 0x22, 0xD2, 0x77, 0x9A, - 0x68, 0x0E, 0xC5, 0xA6, 0x1D, 0xAD, 0xDB, 0xB5, - 0xFF, 0xEA, 0x7C, 0x7D, 0x19, 0x1B, 0x9D, 0xB9, - 0xD0, 0xA7, 0xAB, 0x4D, 0x4A, 0x7D, 0x1A, 0xA5, - 0x09, 0x54, 0x84, 0x5C, 0x14, 0x4E, 0xA6, 0x14, - 0x6B, 0x22, 0x46, 0x7E, 0x5E, 0xB9, 0x33, 0x97, - 0xB5, 0x63, 0x5C, 0xCE, 0xF4, 0xD0, 0xD8, 0x8C, - 0xCC, 0xE7, 0x67, 0x01, 0x1B, 0x56, 0x68, 0x54, - 0x56, 0x4C, 0x19, 0x1D, 0x05, 0xF8, 0x55, 0xD6, - 0x45, 0xC0, 0xAD, 0xD6, 0xEE, 0xD9, 0x03, - - 0x7F, 0x07, 0xFA, 0x8C, 0x77, 0xF1, 0xDA, 0x4E, - 0x4B, 0x65, 0x55, 0xA4, 0x12, 0xE8, 0x7F, 0x04, - 0x0A, 0xEC, 0x57, 0xFF, 0x30, 0xD1, 0xE2, 0x08, - 0x71, 0xEC, 0x5F, 0x72, 0x88, 0x37, 0xC1, 0x33, - 0x79, 0xC8, 0x49, 0x47, 0x11, 0xC9, 0x8C, 0xD3, - 0x3B, 0x4F, 0x2C, 0x5A, 0xDD, 0x8C, 0x00, 0x8B, - 0xF6, 0xC4, 0x07, 0x7E, 0x2C, 0xFA, 0x3A, 0xBF, - 0x84, 0xBA, 0x13, 0x31, 0x20, 0x69, 0xAF, 0xBD, - 0x61, 0xB0, 0xFF, 0x28, 0x40, 0x1B, 0x5F, 0x1D, - 0x87, 0x99, 0x23, 0x95, 0x77, 0x88, 0x3F, 0xBB, - 0xFA, 0x55, 0xB5, 0xB2, 0xF7, 0xF3, 0xA6, 0x0B, - 0x57, 0x71, 0xF5, 0x7A, 0xE7, 0x23, 0x61, 0x54, - 0x13, 0xCB, 0x71, 0x97, 0xDE, 0xFF, 0x0E, 0x23, - 0x5C, 0xD4, 0xCC, 0xB1, 0xB8, 0x2F, 0xA1, 0xA5, - 0x15, 0xEB, 0xB4, 0x47, 0xA7, 0x7C, 0xEA, 0xD1, - 0x23, 0xE7, 0xFE, 0x9D, 0x56, 0xC5, 0x73, 0x9D, - 0xE8, 0x90, 0x4E, 0x00, 0xE5, 0x7F, 0x6E, 0x36, - 0x6D, 0xEA, 0x8C, 0xBA, 0xC6, 0x9C, 0xA0, 0x27, - 0x13, 0x90, 0x35, 0xE7, 0xD5, 0x27, 0x56, 0x50, - 0x70, 0x64, 0x03, 0xD2, 0x43, 0xDC, 0x1F, 0x60, - 0x4B, 0x5D, 0x48, 0xF1, 0x82, 0xE6, 0x9A, 0xDE, - 0xC7, 0xDB, 0x2F, 0x0D, 0xD9, 0xF4, 0xAD, 0xD0, - 0xB9, 0xDC, 0x01, 0x09, 0x74, 0x4F, 0x29, 0x71, - 0x61, 0x6D, 0xE2, 0xAC, 0xE3, 0x60, 0x9C, 0x4D, - 0x9A, 0x26, 0xC9, 0x3D, 0x11, 0x04, 0x83, 0x9F, - 0x39, 0x39, 0x0E, 0x44, 0xB2, 0xD3, 0x7A, 0x0D, - 0xD7, 0x0B, 0xDB, 0x14, 0x4A, 0x46, 0xA7, 0xB5, - 0x34, 0x2C, 0x22, 0x98, 0xBA, 0x6A, 0xBA, 0x4A, - 0xDA, 0x30, 0x8C, 0xE7, 0xDF, 0xD8, 0x73, 0x83, - 0x8C, 0xB6, 0x7A, 0x73, 0x74, 0xE5, 0x04, 0x32, - 0x66, 0x24, 0xC9, 0x45, 0xDA, 0x86, 0xE2, 0xCD, - 0xF9, 0xDB, 0x2F, 0x1D, 0xBA, 0x2C, 0xC0, 0x91, - 0x06, 0xF7, 0x44, 0xE8, 0x30, 0x34, 0x94, 0x91, - - 0xD5, 0x3B, 0xA6, 0x5A, 0x56, 0xB4, 0xDD, 0xBC, - 0xD8, 0xE7, 0x85, 0x2B, 0x3E, 0xFC, 0xBC, 0xD1, - 0xB9, 0x68, 0x09, 0xC3, 0xA5, 0xC1, 0x1D, 0x5C, - 0x4C, 0x11, 0xAC, 0x4A, 0xA3, 0x96, 0xAB, 0xD2, - 0xFD, 0x33, 0xD7, 0x69, 0xD1, 0x95, 0x50, 0xE6, - 0x4D, 0x3A, 0xE9, 0x9D, 0x67, 0x68, 0x16, 0x01, - 0xE7, 0x8A, 0xE3, 0x90, 0xC8, 0x4D, 0xD4, 0xDF, - 0xB0, 0xA1, 0x90, 0x14, 0xC2, 0x32, 0x9A, 0xC2, - 0x86, 0xA2, 0x53, 0x72, 0x1A, 0x9A, 0xFE, 0x8E, - 0xB1, 0x4C, 0xCD, 0x9F, 0xFF, 0x3F, 0xA6, 0x6A, - 0x8E, 0xEB, 0x5E, 0x7C, 0x9D, 0xF3, 0x4B, 0x3B, - 0x09, 0xC7, 0x68, 0x71, 0xD5, 0xBA, 0x32, 0x2D, - 0xBA, 0x15, 0xE3, 0x63, 0xD7, 0x5A, 0x87, 0x5E, - 0x9E, 0xAF, 0xB0, 0x9C, 0xF9, 0x35, 0xA3, 0x67, - 0x1B, 0xD5, 0xC7, 0x9C, 0xB5, 0x63, 0x0E, 0x16, - 0x9B, 0x2D, 0x25, 0x1E, 0x22, 0x96, 0x0A, 0x96, - 0xBE, 0xEF, 0x65, 0xAA, 0xFE, 0x28, 0xB9, 0x55, - 0xD0, 0xDC, 0xB2, 0x5C, 0x21, 0x9B, 0x31, 0xF7, - 0xDE, 0xD9, 0xA6, 0x86, 0x3D, 0xD8, 0x5F, 0xB4, - 0xC5, 0x7A, 0x4D, 0xAB, 0xE5, 0xBC, 0x10, 0xB7, - 0x26, 0x15, 0x08, 0x64, 0x58, 0xB0, 0x4F, 0x77, - 0xCE, 0xDC, 0xBD, 0x1D, 0xD5, 0x21, 0x9A, 0x9A, - 0x93, 0x72, 0x2D, 0x4D, 0x82, 0x36, 0x29, 0xCA, - 0xAB, 0x80, 0xD2, 0x02, 0x1D, 0x6C, 0x49, 0x30, - 0x56, 0x20, 0x8D, 0xFA, 0xA1, 0x58, 0x3F, 0xA6, - 0xCB, 0xF0, 0x41, 0xFB, 0xDD, 0xD0, 0x6D, 0x80, - 0x75, 0xE1, 0x36, 0xAC, 0xF8, 0xAE, 0xDB, 0x37, - 0xB0, 0xDE, 0x4B, 0x89, 0xFB, 0xC1, 0x1B, 0x23, - 0x05, 0xBC, 0x02, 0x87, 0x42, 0x9A, 0x77, 0x23, - 0x99, 0xB4, 0x56, 0x7E, 0x7C, 0xD7, 0x61, 0x18, - 0xD2, 0x4F, 0x19, 0xE6, 0x05, 0x4D, 0x72, 0xC8, - 0xB7, 0xA9, 0x9F, 0xF9, 0x9F, 0xE9, 0x54, 0x34, - 0x54, 0x45, 0x7C, 0xA4, 0xCC, 0x3B, 0xFF, 0x2B, - 0x58, - - 0xB7, 0x93, 0x32, 0xE4, 0xCA, 0xD7, 0xB5, 0x4F, - 0x11, 0xB0, 0x5B, 0x38, 0xB8, 0xC0, 0x90, 0xA8, - 0x0E, 0x4B, 0x34, 0x6C, 0xCC, 0x81, 0x82, 0xC5, - 0x41, 0x91, 0x0D, 0x1A, 0x47, 0x0E, 0xE6, 0x39, - 0x7F, 0xDD, 0xF9, 0xBE, 0xF1, 0xB0, 0xDC, 0x76, - 0xB8, 0x2C, 0x2B, 0xAD, 0xA9, 0xE5, 0xCA, 0x70, - 0x8D, 0xF1, 0xCA, 0x60, 0x5C, 0x85, 0x2E, 0x73, - 0xE7, 0xF8, 0x0A, 0x33, 0xB3, 0x32, 0xC0, 0xCD, - 0x64, 0x4C, 0x9C, 0x65, 0x55, 0x2A, 0x60, 0x42, - 0xF3, 0xBA, 0xF5, 0xC2, 0x28, 0xFC, 0xFE, 0x32, - 0x96, 0xBF, 0x6F, 0x7E, 0x09, 0x82, 0xA5, 0xD0, - 0xE4, 0x11, 0x66, 0x67, 0x66, 0xDB, 0x8A, 0x3D, - 0x08, 0x40, 0xC4, 0x40, 0x66, 0xF8, 0x1F, 0x86, - 0x39, 0xDB, 0xB6, 0x12, 0x11, 0x4E, 0xE4, 0x52, - 0xA5, 0x18, 0x4A, 0x3F, 0x04, 0x01, 0x3D, 0x8D, - 0x15, 0xEE, 0x28, 0xBD, 0xED, 0x32, 0x11, 0xB8, - 0xE9, 0x5E, 0x2A, 0xB7, 0xD3, 0x3C, 0xDD, 0xC6, - 0x42, 0xE0, 0x15, 0x20, 0x0B, 0x13, 0x7E, 0x21, - 0xFE, 0x7B, 0x5F, 0x46, 0x70, 0xF6, 0x64, 0x73, - 0x71, 0x1A, 0x29, 0xD9, 0x07, 0xE0, 0xA9, 0x65, - 0x5B, 0x90, 0x17, 0x5E, 0xE6, 0xFC, 0x29, 0xA2, - 0x5B, 0xB0, 0x00, 0x54, 0x6C, 0x15, 0xA1, 0x44, - 0x66, 0x0F, 0x87, 0xCF, 0x66, 0x04, 0x6F, 0x3F, - 0x04, 0xE5, 0xFA, 0x2D, 0x0C, 0x70, 0x43, 0xF0, - 0x08, 0x01, 0x62, 0x21, 0x81, 0x65, 0x9F, 0x61, - 0xC6, 0x5A, 0x80, 0x64, 0x9D, 0x8E, 0xD7, 0x52, - 0xCF, 0xDC, 0x04, 0x50, 0x0A, 0x98, 0x5A, 0xF2, - 0x9F, 0x6A, 0xAF, 0xDA, 0x96, 0x35, 0x34, 0xF9, - 0xAB, 0x1E, 0x17, 0xC3, 0x18, 0x90, 0xFB, 0x07, - 0x5E, 0xA0, 0x02, 0x4C, 0x0C, 0xE1, 0xE9, 0x06, - 0x7F, 0x1F, 0xC1, 0xA2, 0x77, 0x63, 0xF0, 0x96, - 0xEE, 0x87, 0xC8, 0x28, 0x79, 0x17, 0x33, 0x2D, - 0x16, 0x43, 0x9A, 0x79, 0x32, 0xA9, 0x3D, 0x1F, - 0x35, 0x3D, - - 0xD1, 0x6C, 0xFF, 0x29, 0x4F, 0xC3, 0x29, 0xC5, - 0xC9, 0x5B, 0xDC, 0x81, 0xD1, 0xB3, 0x55, 0xA8, - 0x5E, 0xE2, 0xC9, 0xE3, 0xFC, 0x16, 0x30, 0x02, - 0xAB, 0x43, 0x26, 0x7E, 0xD1, 0xCD, 0x2B, 0x06, - 0xE8, 0x4E, 0xDA, 0xA3, 0xD3, 0xD3, 0x87, 0x05, - 0xB3, 0x05, 0x8C, 0xCF, 0xAE, 0xEF, 0x15, 0x33, - 0xCE, 0x72, 0x64, 0x52, 0x88, 0x78, 0x20, 0x1B, - 0xF1, 0x7E, 0xC9, 0x46, 0x13, 0xCF, 0xD9, 0xF2, - 0x4B, 0x1C, 0xA6, 0x96, 0xAF, 0x02, 0xAD, 0x6F, - 0xDB, 0xAD, 0x6F, 0x04, 0x55, 0xA2, 0x2C, 0x9C, - 0x56, 0xB6, 0x07, 0x8A, 0x87, 0x3F, 0xD6, 0x06, - 0x90, 0x4C, 0x6D, 0x5E, 0xE5, 0x16, 0x21, 0x46, - 0x00, 0x88, 0x77, 0x58, 0x0E, 0x9E, 0x89, 0xFE, - 0x3F, 0x20, 0x6A, 0x17, 0x64, 0x9C, 0x63, 0x71, - 0x3C, 0xDB, 0x36, 0xE3, 0x8A, 0xA6, 0x7A, 0xD5, - 0x1A, 0x27, 0x75, 0x4C, 0xD9, 0xF3, 0xF0, 0x02, - 0x2B, 0x3D, 0xE5, 0xF1, 0xDE, 0x98, 0x98, 0x62, - 0x18, 0x17, 0xAE, 0xD2, 0x80, 0xA7, 0xA3, 0x82, - 0xBF, 0x30, 0xC8, 0xC9, 0x68, 0x6A, 0x2F, 0x40, - 0x8A, 0x2F, 0x8A, 0x39, 0xB4, 0x60, 0x6F, 0xE1, - 0x0F, 0x19, 0xB1, 0x4C, 0x82, 0x9A, 0x11, 0xB4, - 0x98, 0x74, 0xE7, 0xAF, 0xD4, 0x21, 0x5E, 0xD8, - 0x30, 0xA1, 0x53, 0xF3, 0xD2, 0xDE, 0x02, 0x9F, - 0xA6, 0xA8, 0x4D, 0x03, 0x2A, 0x45, 0xE3, 0x49, - 0x98, 0xE2, 0xF7, 0x71, 0x9F, 0xBC, 0x93, 0xDE, - 0xF6, 0x7E, 0x12, 0xC1, 0x37, 0xB0, 0x93, 0x4E, - 0x89, 0x16, 0x39, 0x2B, 0xF6, 0x28, 0x30, 0x75, - 0xC0, 0x43, 0xA9, 0x3D, 0x1F, 0xD3, 0xFD, 0x56, - 0xF7, 0x65, 0xFC, 0x08, 0x3C, 0x9B, 0x1C, 0x33, - 0x57, 0x0B, 0xAB, 0x4B, 0xFE, 0xD4, 0x50, 0xFC, - 0x9D, 0x42, 0xF7, 0x8D, 0xB4, 0x50, 0xF5, 0xA9, - 0x54, 0x00, 0x74, 0x93, 0x59, 0x6B, 0x6F, 0x95, - 0x31, 0xEE, 0xF5, 0xC4, 0x4A, 0x9C, 0x33, 0x27, - 0x6E, 0x1D, 0x4A, - - 0xB5, 0xEE, 0x2C, 0xC7, 0x88, 0xD2, 0x63, 0x3E, - 0xF6, 0x8E, 0xC1, 0xA3, 0xD2, 0x39, 0x8E, 0xF6, - 0xD3, 0x44, 0x7C, 0xA6, 0x27, 0x6E, 0x67, 0x66, - 0x0F, 0x68, 0xF9, 0xE2, 0xE4, 0xA2, 0x9B, 0x59, - 0x6D, 0x26, 0xE2, 0x4B, 0xF1, 0x82, 0x5C, 0x67, - 0xE9, 0x55, 0xEE, 0xB6, 0xA0, 0xE3, 0x32, 0xEE, - 0x2A, 0x33, 0x2F, 0x6A, 0x2B, 0xBC, 0xE8, 0xB9, - 0x45, 0xCD, 0x0F, 0xF0, 0x84, 0xB6, 0x5D, 0xC5, - 0xAC, 0xD7, 0x45, 0x4B, 0x5A, 0xE4, 0xD5, 0x07, - 0x6D, 0x30, 0x0A, 0x9E, 0x73, 0x0E, 0x7D, 0x5F, - 0x8A, 0x2C, 0x7A, 0xE4, 0xD0, 0x1B, 0xE7, 0x02, - 0x93, 0x2E, 0xCE, 0x3C, 0xA1, 0xB1, 0x48, 0x5A, - 0xD6, 0xC0, 0x38, 0x0F, 0x13, 0xC7, 0x8B, 0x0F, - 0x4D, 0x90, 0xFC, 0x22, 0xC5, 0x74, 0xC6, 0xE0, - 0xFE, 0x1B, 0x2D, 0xEA, 0x3E, 0xDB, 0xC1, 0xCA, - 0x7F, 0x0D, 0xA0, 0xBB, 0x62, 0x0B, 0x51, 0x46, - 0xD4, 0xAB, 0x21, 0xE9, 0x6A, 0x13, 0x55, 0xEC, - 0x00, 0x16, 0xF5, 0xA3, 0xE8, 0x59, 0x90, 0xFB, - 0x56, 0xA5, 0x4B, 0x7F, 0x3F, 0xAA, 0x2E, 0x27, - 0x6F, 0xEC, 0x7B, 0xD1, 0xFA, 0x79, 0x36, 0x95, - 0x17, 0x84, 0xE0, 0xF1, 0xFB, 0xCA, 0xE2, 0x71, - 0x18, 0xAF, 0x49, 0x4D, 0x02, 0x51, 0xAB, 0x0C, - 0x56, 0x0A, 0xAF, 0x96, 0x0A, 0xD3, 0x57, 0x93, - 0xA1, 0x8E, 0xD1, 0x32, 0xD4, 0x1D, 0x62, 0xE1, - 0x1F, 0x4D, 0x00, 0xD4, 0x0B, 0x6F, 0xAE, 0x69, - 0x67, 0xAA, 0x2D, 0x75, 0x17, 0x0E, 0xE8, 0x72, - 0x91, 0x11, 0x05, 0xBB, 0x94, 0xBE, 0x0B, 0x2C, - 0x05, 0xF3, 0x09, 0x98, 0xAA, 0xA3, 0x77, 0xB9, - 0xAF, 0x75, 0x29, 0x57, 0xA0, 0x7F, 0x70, 0x53, - 0x4E, 0xEB, 0xD5, 0x15, 0x50, 0x60, 0x1D, 0x7B, - 0x3F, 0x3F, 0x65, 0x4E, 0xE0, 0x4A, 0x47, 0xEF, - 0xBA, 0x68, 0x01, 0xEB, 0xA5, 0x09, 0x4C, 0xE4, - 0xF6, 0xAA, 0xE0, 0x00, 0x43, 0x5B, 0x2E, 0x09, - 0xFE, 0xD0, 0x4E, 0xE8, - - 0x06, 0x49, 0x5B, 0x9A, 0xCF, 0x47, 0x2B, 0x04, - 0xBE, 0x1B, 0x98, 0x6A, 0xB5, 0x21, 0x6D, 0x0E, - 0x18, 0x9B, 0x87, 0xA4, 0x97, 0x13, 0xF5, 0x7E, - 0x94, 0x92, 0xB3, 0x69, 0xA1, 0xD5, 0x25, 0x46, - 0x26, 0x8E, 0x6B, 0x47, 0x0A, 0x77, 0x48, 0x51, - 0xB9, 0xAF, 0x64, 0x37, 0x70, 0x64, 0xBD, 0x98, - 0x16, 0x1A, 0x46, 0xAA, 0xFA, 0x0C, 0xB2, 0x3C, - 0x6F, 0x23, 0xA5, 0x6C, 0x81, 0x0B, 0x49, 0x7C, - 0x75, 0xE6, 0x0B, 0x47, 0x49, 0xDB, 0x70, 0xC5, - 0x26, 0x75, 0x20, 0x3E, 0xE2, 0x28, 0xD9, 0x1A, - 0xE2, 0x96, 0x9D, 0xAE, 0x29, 0x53, 0x9A, 0xE2, - 0xFE, 0xC9, 0xF5, 0x3B, 0x02, 0x40, 0x13, 0xF1, - 0x10, 0x27, 0x1A, 0x67, 0x97, 0x9C, 0xF6, 0xC5, - 0xBA, 0xE6, 0x3D, 0xA4, 0xA8, 0x67, 0xCF, 0xB6, - 0x35, 0xC7, 0x6B, 0xC6, 0x9C, 0x85, 0x25, 0x14, - 0x20, 0xC6, 0x48, 0x23, 0x26, 0x29, 0xE9, 0xBE, - 0x79, 0x89, 0xFA, 0x26, 0x2E, 0xB9, 0xC3, 0x54, - 0x28, 0x8B, 0xE2, 0xEF, 0xBC, 0xB2, 0x19, 0xC3, - 0x40, 0x85, 0x8A, 0x59, 0x06, 0x96, 0xDF, 0x39, - 0x03, 0x6E, 0xA0, 0xF8, 0x20, 0xD9, 0x3B, 0x72, - 0x80, 0xCC, 0x15, 0xBF, 0xB6, 0x2B, 0x15, 0x8A, - 0xC2, 0x71, 0x60, 0xEE, 0x51, 0x80, 0xCB, 0x61, - 0x7A, 0xDB, 0x17, 0x18, 0x80, 0xE5, 0x2F, 0xB9, - 0xB9, 0x36, 0xE3, 0xED, 0x7B, 0x7C, 0x23, 0xF7, - 0xBB, 0xBE, 0x61, 0xF1, 0xAF, 0x38, 0x5E, 0xAC, - 0x6E, 0x8F, 0x5A, 0x46, 0xB9, 0xD6, 0x4D, 0x51, - 0x5A, 0x7F, 0x3C, 0x34, 0xE5, 0x5E, 0x28, 0xB4, - 0x00, 0xD5, 0x76, 0xF6, 0x04, 0x94, 0x00, 0x36, - 0x23, 0xD1, 0x87, 0xA7, 0x0D, 0x55, 0xF4, 0x8A, - 0x89, 0x3A, 0x32, 0x9D, 0x08, 0xEB, 0xB6, 0x6F, - 0xED, 0xF0, 0xF8, 0x8F, 0x25, 0x3B, 0xAC, 0x6E, - 0xF5, 0x2B, 0x37, 0x4E, 0x4C, 0x28, 0x19, 0x69, - 0x66, 0x04, 0x40, 0x09, 0xE4, 0x1F, 0x82, 0x6F, - 0x5E, 0x40, 0x4C, 0x16, 0x4B, - - 0xBF, 0x12, 0xC4, 0xD2, 0xDD, 0xF1, 0x90, 0x50, - 0x38, 0x11, 0x8E, 0x5D, 0x20, 0x49, 0x64, 0xEB, - 0x08, 0xE0, 0x5F, 0xFF, 0x81, 0xC1, 0x23, 0x7F, - 0xA0, 0xBB, 0xB4, 0x28, 0x61, 0xA2, 0x99, 0xEB, - 0x44, 0x5A, 0x26, 0xF3, 0xF1, 0x76, 0x41, 0xF7, - 0x92, 0xFD, 0x6A, 0xB1, 0x72, 0x92, 0xBF, 0x62, - 0x92, 0x57, 0x46, 0x45, 0x0B, 0x5E, 0xA3, 0x33, - 0x64, 0x79, 0xE9, 0x3B, 0x50, 0x54, 0x62, 0xC1, - 0xB8, 0x5E, 0x45, 0x5A, 0x5F, 0xB4, 0xBB, 0x5F, - 0x6A, 0x01, 0x8D, 0x1B, 0x79, 0x76, 0x34, 0x08, - 0xF9, 0x42, 0xE4, 0xD6, 0x42, 0xDD, 0x16, 0x80, - 0xD4, 0x7D, 0x7D, 0xC4, 0x09, 0xAC, 0x96, 0xF8, - 0xB5, 0x8A, 0xF7, 0xBF, 0x92, 0xDB, 0x5D, 0xB7, - 0x15, 0x91, 0x6F, 0x96, 0xB5, 0x4C, 0x3E, 0x27, - 0xD8, 0xE2, 0xE1, 0x6F, 0x9D, 0x9B, 0xBB, 0x99, - 0x5D, 0xB5, 0x33, 0x55, 0xB3, 0x12, 0xFF, 0x64, - 0xBF, 0xB7, 0x58, 0xA0, 0x40, 0x9B, 0x6E, 0x35, - 0x26, 0x88, 0x13, 0x0B, 0x82, 0xA7, 0x2F, 0x10, - 0x70, 0x2B, 0xAF, 0x24, 0x1F, 0xAA, 0x62, 0xD2, - 0xBA, 0x0F, 0x3A, 0x29, 0x88, 0x48, 0xCB, 0xC9, - 0x60, 0x20, 0x73, 0x07, 0x46, 0x4D, 0x62, 0x2B, - 0x52, 0x2D, 0x39, 0xCB, 0x79, 0x63, 0x29, 0x54, - 0xA7, 0x4E, 0x3A, 0xD7, 0xD4, 0x51, 0x2D, 0xDD, - 0xBF, 0x6C, 0x16, 0x4E, 0xA7, 0x49, 0xEA, 0xE2, - 0x78, 0xBA, 0x84, 0x89, 0x7D, 0x5F, 0xA8, 0xFD, - 0x89, 0x2F, 0xA0, 0xE0, 0x1E, 0xE5, 0x51, 0x8D, - 0xE9, 0xE1, 0x73, 0x79, 0xE5, 0x28, 0x62, 0xFB, - 0x15, 0xD3, 0x44, 0xAF, 0xED, 0xCE, 0x1F, 0xB6, - 0x2D, 0x26, 0x5D, 0xDA, 0xED, 0x01, 0x30, 0x4D, - 0x72, 0x4F, 0x23, 0xF0, 0x5A, 0x1E, 0xC9, 0xAF, - 0xCF, 0x75, 0xA3, 0x15, 0xAE, 0x29, 0xF6, 0xD7, - 0xE4, 0xA9, 0x95, 0xF4, 0x39, 0x3E, 0xF6, 0x99, - 0xB5, 0xB3, 0x60, 0xDE, 0x7C, 0x26, 0xDD, 0xF0, - 0xD3, 0x04, 0x0A, 0xFC, 0xE9, 0xAE, - - 0xB0, 0x1B, 0x1C, 0xC2, 0xC4, 0x72, 0x71, 0xBF, - 0x61, 0x44, 0xD2, 0x9C, 0x4B, 0x14, 0x90, 0x14, - 0xC5, 0x89, 0x3D, 0xC7, 0x32, 0x07, 0xA7, 0xF5, - 0x64, 0xC1, 0xDD, 0x7D, 0x42, 0x2C, 0x3D, 0xDE, - 0x61, 0xDD, 0x78, 0x94, 0xB6, 0xB5, 0xF8, 0x47, - 0xEE, 0x5C, 0x2A, 0xA3, 0x32, 0xB5, 0x63, 0x3E, - 0x8C, 0xE6, 0x2F, 0x56, 0x1A, 0x24, 0xAA, 0xBD, - 0xA6, 0xAF, 0x30, 0x90, 0x7D, 0xF2, 0x73, 0x86, - 0x4D, 0x93, 0x74, 0xF1, 0xD8, 0x9B, 0x70, 0xDC, - 0xA5, 0xCC, 0xA8, 0xF9, 0x27, 0xBA, 0xA0, 0x3D, - 0x4D, 0x11, 0x19, 0xA5, 0x23, 0xE0, 0xC1, 0xC2, - 0xF7, 0x18, 0xDA, 0xCA, 0x23, 0x7E, 0x91, 0x56, - 0x72, 0xF7, 0xCE, 0xB4, 0xBF, 0x31, 0x2A, 0x61, - 0x9B, 0x7D, 0x82, 0xDF, 0xF2, 0xC7, 0x04, 0x74, - 0xD4, 0x2F, 0x14, 0x02, 0x4C, 0xC9, 0x12, 0x6D, - 0xF9, 0x67, 0x9C, 0xC5, 0x97, 0x3B, 0x9C, 0x54, - 0xA4, 0x45, 0xDA, 0xA5, 0xE8, 0xDB, 0xF7, 0x95, - 0x62, 0x0E, 0xE3, 0x25, 0x95, 0xC6, 0x68, 0xA1, - 0xBD, 0xC7, 0x78, 0xBD, 0x7E, 0xF8, 0x98, 0xDE, - 0xDA, 0x30, 0x75, 0xB6, 0xD0, 0xE1, 0x67, 0x42, - 0x6D, 0xE0, 0x26, 0x34, 0x7B, 0x47, 0x81, 0x03, - 0x96, 0x3C, 0x55, 0x8A, 0x6E, 0x73, 0x51, 0x88, - 0x1B, 0x05, 0x52, 0xDC, 0x8A, 0xA4, 0x07, 0x50, - 0x3C, 0x98, 0xC3, 0xFC, 0x58, 0xFA, 0xC8, 0x94, - 0x7D, 0x75, 0xE3, 0x4B, 0x6C, 0xCC, 0xB7, 0x9D, - 0x6F, 0xEA, 0x79, 0x4F, 0x5C, 0x77, 0xD3, 0x1B, - 0xC5, 0xB7, 0x97, 0xD7, 0xD4, 0xE9, 0x72, 0xD5, - 0x7E, 0xA3, 0xB5, 0xE9, 0xAC, 0xA0, 0x5D, 0xF8, - 0x38, 0xAC, 0x50, 0xA2, 0x47, 0x51, 0x96, 0x15, - 0x73, 0x74, 0x1B, 0x4E, 0xF2, 0x80, 0x59, 0xC6, - 0x58, 0x40, 0x3F, 0xB3, 0xE5, 0x4C, 0x62, 0x1F, - 0x65, 0xD9, 0x16, 0xBF, 0xD5, 0x45, 0x4A, 0x39, - 0xCA, 0x5A, 0x8F, 0xD2, 0x77, 0x5D, 0x96, 0x25, - 0x2E, 0xD4, 0xC3, 0x01, 0x25, 0xFB, 0x78 -}; diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testpoly1305.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/testpoly1305.c deleted file mode 100644 index 3ecf1ca..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testpoly1305.c +++ /dev/null @@ -1,102 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - - -#include "poly1305.h" - -#include "testutil.h" -#include "handy.h" -#include "cutest.h" - -static void check(const char *rstr, const char *sstr, - const char *msgstr, const char *tagstr) -{ - uint8_t r[16], s[16], tag[16]; - uint8_t msg[132], out[16]; - - unhex(r, sizeof r, rstr); - unhex(s, sizeof s, sstr); - size_t nmsg = unhex(msg, sizeof msg, msgstr); - unhex(tag, sizeof tag, tagstr); - - cf_poly1305 ctx; - cf_poly1305_init(&ctx, r, s); - cf_poly1305_update(&ctx, msg, nmsg); - cf_poly1305_finish(&ctx, out); - - TEST_CHECK(memcmp(out, tag, 16) == 0); -} - -static void test_poly1305(void) -{ - check("eea6a7251c1e72916d11c2cb214d3c25", - "2539121d8e234e652d651fa4c8cff880", - "8e993b9f48681273c29650ba32fc76ce48332ea7164d96a4476fb8c531a1186ac0dfc17c98dce87b4da7f011ec48c97271d2c20f9b928fe2270d6fb863d51738b48eeee314a7cc8ab932164548e526ae90224368517acfeabd6bb3732bc0e9da99832b61ca01b6de56244a9e88d5f9b37973f622a43d14a6599b1f654cb45a74e355a5", - "f3ffc7703f9400e52a7dfb4b3d3305d9"); - - check("851fc40c3467ac0be05cc20404f3f700", - "580b3b0f9447bb1e69d095b5928b6dbc", - "f3f6", - "f4c633c3044fc145f84f335cb81953de"); - - check("a0f3080000f46400d0c7e9076c834403", - "dd3fab2251f11ac759f0887129cc2ee7", - "", - "dd3fab2251f11ac759f0887129cc2ee7"); - - check("48443d0bb0d21109c89a100b5ce2c208", - "83149c69b561dd88298a1798b10716ef", - "663cea190ffb83d89593f3f476b6bc24d7e679107ea26adb8caf6652d0656136", - "0ee1c16bb73f0f4fd19881753c01cdbe"); - - check("12976a08c4426d0ce8a82407c4f48207", - "80f8c20aa71202d1e29179cbcb555a57", - "ab0812724a7f1e342742cbed374d94d136c6b8795d45b3819830f2c04491faf0990c62e48b8018b2c3e4a0fa3134cb67fa83e158c994d961c4cb21095c1bf9", - "5154ad0d2cb26e01274fc51148491f1b"); - - /* extras from RFC7539 */ - check("02000000000000000000000000000000", - "00000000000000000000000000000000", - "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", - "03000000000000000000000000000000"); - check("02000000000000000000000000000000", - "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", - "02000000000000000000000000000000", - "03000000000000000000000000000000"); - check("01000000000000000000000000000000", - "00000000000000000000000000000000", - "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF0FFFFFFFFFFFFFFFFFFFFFFFFFFFFFF11000000000000000000000000000000", - "05000000000000000000000000000000"); - check("01000000000000000000000000000000", - "00000000000000000000000000000000", - "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFBFEFEFEFEFEFEFEFEFEFEFEFEFEFEFE01010101010101010101010101010101", - "00000000000000000000000000000000"); - check("02000000000000000000000000000000", - "00000000000000000000000000000000", - "FDFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", - "FAFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF"); - check("01000000000000000400000000000000", - "00000000000000000000000000000000", - "E33594D7505E43B900000000000000003394D7505E4379CD01000000000000000000000000000000000000000000000001000000000000000000000000000000", - "14000000000000005500000000000000"); - check("01000000000000000400000000000000", - "00000000000000000000000000000000", - "E33594D7505E43B900000000000000003394D7505E4379CD010000000000000000000000000000000000000000000000", - "13000000000000000000000000000000"); -} - -TEST_LIST = { - { "poly1305", test_poly1305 }, - { 0 } -}; diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testsalsa20.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/testsalsa20.c deleted file mode 100644 index 9d50b93..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testsalsa20.c +++ /dev/null @@ -1,210 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "salsa20.h" - -#include "testutil.h" -#include "handy.h" -#include "cutest.h" - -static void test_salsa20_core(void) -{ - uint8_t k0[16], k1[16], nonce[16], sigma[16], out[64], expect[64]; - - /* From section 8. */ - memset(k0, 0, sizeof k0); - memset(k1, 0, sizeof k1); - memset(nonce, 0, sizeof nonce); - memset(sigma, 0, sizeof sigma); - - cf_salsa20_core(k0, k1, nonce, sigma, out); - - unhex(expect, 64, "00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"); - TEST_CHECK(memcmp(expect, out, 64) == 0); - - /* - d39f0d73 - 4c3752b70375de25bfbbea8831edb330 - 016ab2db - afc7a6305610b3cf1ff0203f0f535da1 - 74933071 - ee37cc244fc9eb4f03519c2fcb1af4f3 - 58766836 - */ - unhex(k0, 16, "4c3752b70375de25bfbbea8831edb330"); - unhex(k1, 16, "ee37cc244fc9eb4f03519c2fcb1af4f3"); - unhex(nonce, 16, "afc7a6305610b3cf1ff0203f0f535da1"); - unhex(sigma, 16, "d39f0d73016ab2db7493307158766836"); - - cf_salsa20_core(k0, k1, nonce, sigma, out); - - unhex(expect, 64, "6d2ab2a89cf0f8eea8c4becb1a6eaa9a1d1d961a961eebf9bea3fb30459033397628989db4391b5e6b2aec231b6f7272dbece8876f9b6e1218e85f9eb31330ca"); - TEST_CHECK(memcmp(expect, out, 64) == 0); - - /* - 58766836 - 4fc9eb4f03519c2fcb1af4f3bfbbea88 - d39f0d73 - 4c3752b70375de255610b3cf31edb330 - 016ab2db - afc7a630ee37cc241ff0203f0f535da1 - 74933071 - */ - unhex(k0, 16, "4fc9eb4f03519c2fcb1af4f3bfbbea88"); - unhex(k1, 16, "afc7a630ee37cc241ff0203f0f535da1"); - unhex(nonce, 16, "4c3752b70375de255610b3cf31edb330"); - unhex(sigma, 16, "58766836d39f0d73016ab2db74933071"); - - cf_salsa20_core(k0, k1, nonce, sigma, out); - - unhex(expect, 64, "b31330cadbece8876f9b6e1218e85f9e1a6eaa9a6d2ab2a89cf0f8eea8c4becb459033391d1d961a961eebf9bea3fb301b6f72727628989db4391b5e6b2aec23"); - TEST_CHECK(memcmp(expect, out, 64) == 0); - - /* From section 9. */ - for (size_t i = 0; i < 16; i++) - { - k0[i] = 1 + i; - k1[i] = 201 + i; - nonce[i] = 101 + i; - } - - cf_salsa20_core(k0, k1, nonce, (const uint8_t *) "expand 32-byte k", out); - - unhex(expect, 64, "45254427290f6bc1ff8b7a06aae9d9625990b66a1533c841ef31de22d772287e68c507e1c5991f02664e4cb054f5f6b8b1a0858206489577c0c384ecea67f64a"); - TEST_CHECK(memcmp(expect, out, 64) == 0); - - cf_salsa20_core(k0, k0, nonce, (const uint8_t *) "expand 16-byte k", out); - - unhex(expect, 64, "27ad2ef81ec852113043feef25120df7f1c83d900a3732b9062ff6fd8f56bbe186556ef6a1a32bebe75eab3391d6701d0ee80510978cb78dab097ab568b6b1c1"); - TEST_CHECK(memcmp(expect, out, 64) == 0); -} - -static void test_salsa20(void) -{ - cf_salsa20_ctx ctx; - uint8_t key[32], nonce[8], cipher[64], expect[64]; - - unhex(key, 32, "0102030405060708090a0b0c0d0e0f10c9cacbcccdcecfd0d1d2d3d4d5d6d7d8"); - memset(nonce, 0, 8); - - cf_salsa20_init(&ctx, key, sizeof key, nonce); - unhex(ctx.nonce, 16, "65666768696a6b6c6d6e6f7071727374"); - memset(cipher, 0, 64); - cf_salsa20_cipher(&ctx, cipher, cipher, 64); - - unhex(expect, 64, "45254427290f6bc1ff8b7a06aae9d9625990b66a1533c841ef31de22d772287e68c507e1c5991f02664e4cb054f5f6b8b1a0858206489577c0c384ecea67f64a"); - TEST_CHECK(memcmp(expect, cipher, 64) == 0); - - cf_salsa20_init(&ctx, key, 16, nonce); - unhex(ctx.nonce, 16, "65666768696a6b6c6d6e6f7071727374"); - memset(cipher, 0, 64); - cf_salsa20_cipher(&ctx, cipher, cipher, 64); - - unhex(expect, 64, "27ad2ef81ec852113043feef25120df7f1c83d900a3732b9062ff6fd8f56bbe186556ef6a1a32bebe75eab3391d6701d0ee80510978cb78dab097ab568b6b1c1"); - TEST_CHECK(memcmp(expect, cipher, 64) == 0); -} - -static void test_chacha20_core(void) -{ - uint8_t k0[16], k1[16], nonce[16], out[64], expect[64]; - - /* From draft-agl-tls-chacha20poly1305-04 section 7. */ - - memset(k0, 0, sizeof k0); - memset(k1, 0, sizeof k1); - memset(nonce, 0, sizeof nonce); - - cf_chacha20_core(k0, k1, nonce, (const uint8_t *) "expand 32-byte k", out); - - unhex(expect, 60, "76b8e0ada0f13d90405d6ae55386bd28bdd219b8a08ded1aa836efcc8b770dc7da41597c5157488d7724e03fb8d84a376a43b8f41518a11cc387b669"); - TEST_CHECK(memcmp(expect, out, 60) == 0); - - k1[15] = 0x01; - cf_chacha20_core(k0, k1, nonce, (const uint8_t *) "expand 32-byte k", out); - - unhex(expect, 60, "4540f05a9f1fb296d7736e7b208e3c96eb4fe1834688d2604f450952ed432d41bbe2a0b6ea7566d2a5d1e7e20d42af2c53d792b1c43fea817e9ad275"); - TEST_CHECK(memcmp(expect, out, 60) == 0); - - memset(k1, 0, sizeof k1); - nonce[15] = 0x01; - - cf_chacha20_core(k0, k1, nonce, (const uint8_t *) "expand 32-byte k", out); - - unhex(expect, 60, "de9cba7bf3d69ef5e786dc63973f653a0b49e015adbff7134fcb7df137821031e85a050278a7084527214f73efc7fa5b5277062eb7a0433e445f41e3"); - TEST_CHECK(memcmp(expect, out, 60) == 0); - - memset(nonce, 0, sizeof nonce); - nonce[8] = 0x01; - - cf_chacha20_core(k0, k1, nonce, (const uint8_t *) "expand 32-byte k", out); - - unhex(expect, 64, "ef3fdfd6c61578fbf5cf35bd3dd33b8009631634d21e42ac33960bd138e50d32111e4caf237ee53ca8ad6426194a88545ddc497a0b466e7d6bbdb0041b2f586b"); - TEST_CHECK(memcmp(expect, out, 64) == 0); - - unhex(k0, 16, "000102030405060708090a0b0c0d0e0f"); - unhex(k1, 16, "101112131415161718191a1b1c1d1e1f"); - unhex(nonce, 16, "00000000000000000001020304050607"); - - cf_chacha20_core(k0, k1, nonce, (const uint8_t *) "expand 32-byte k", out); - - unhex(expect, 64, "f798a189f195e66982105ffb640bb7757f579da31602fc93ec01ac56f85ac3c134a4547b733b46413042c9440049176905d3be59ea1c53f15916155c2be8241a"); - TEST_CHECK(memcmp(expect, out, 64) == 0); - - nonce[0]++; - cf_chacha20_core(k0, k1, nonce, (const uint8_t *) "expand 32-byte k", out); - - unhex(expect, 64, "38008b9a26bc35941e2444177c8ade6689de95264986d95889fb60e84629c9bd9a5acb1cc118be563eb9b3a4a472f82e09a7e778492b562ef7130e88dfe031c7"); - TEST_CHECK(memcmp(expect, out, 64) == 0); - - nonce[0]++; - cf_chacha20_core(k0, k1, nonce, (const uint8_t *) "expand 32-byte k", out); - - unhex(expect, 64, "9db9d4f7c7a899151b9a475032b63fc385245fe054e3dd5a97a5f576fe064025d3ce042c566ab2c507b138db853e3d6959660996546cc9c4a6eafdc777c040d7"); - TEST_CHECK(memcmp(expect, out, 64) == 0); - - nonce[0]++; - cf_chacha20_core(k0, k1, nonce, (const uint8_t *) "expand 32-byte k", out); - - unhex(expect, 64, "0eaf46f76dad3979e5c5360c3317166a1c894c94a371876a94df7628fe4eaaf2ccb27d5aaae0ad7ad0f9d4b6ad3b54098746d4524d38407a6deb3ab78fab78c9"); - TEST_CHECK(memcmp(expect, out, 64) == 0); -} - -static void test_chacha20(void) -{ - uint8_t key[32], nonce[8], block[256], expect[256]; - - unhex(key, 32, "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f"); - unhex(nonce, 8, "0001020304050607"); - unhex(expect, 256, "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"); - memset(block, 0, 256); - - cf_chacha20_ctx ctx; - cf_chacha20_init(&ctx, key, sizeof key, nonce); - cf_chacha20_cipher(&ctx, block, block, sizeof block); - - TEST_CHECK(memcmp(expect, block, sizeof expect) == 0); - - /* Check 128-bit mode works. */ - cf_chacha20_init(&ctx, key, 16, nonce); - cf_chacha20_cipher(&ctx, block, block, sizeof block); -} - -TEST_LIST = { - { "salsa20-core", test_salsa20_core }, - { "chacha20-core", test_chacha20_core }, - { "salsa20", test_salsa20 }, - { "chacha20", test_chacha20 }, - { 0 } -}; - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testsha.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/testsha.h deleted file mode 100644 index 70075f0..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testsha.h +++ /dev/null @@ -1,213 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef TESTSHA_H -#define TESTSHA_H - -#include "hmac.h" - -/* Common functions for testing hash functions. - * You shouldn't use this file. */ - -static void vector(const cf_chash *hash, - const void *vmsg, size_t nmsg, - const char *expect, size_t nexpect) -{ - uint8_t digest[CF_MAXHASH]; - const uint8_t *msg = vmsg; - size_t orig_nmsg = nmsg; - - cf_chash_ctx ctx; - hash->init(&ctx); - - /* Input in carefully chosen chunk sizes to exercise blockwise code. */ - if (nmsg) - { - hash->update(&ctx, msg, 1); - nmsg--; - msg++; - } - - hash->update(&ctx, msg, nmsg); - hash->digest(&ctx, digest); - TEST_CHECK(nexpect == hash->hashsz); - TEST_CHECK(memcmp(digest, expect, nexpect) == 0); - - /* Now try with other arrangements. */ - msg = vmsg; - nmsg = orig_nmsg; - - hash->init(&ctx); - if (nmsg >= hash->blocksz) - { - hash->update(&ctx, msg, hash->blocksz - 1); - nmsg -= hash->blocksz - 1; - msg += hash->blocksz - 1; - } - - hash->update(&ctx, msg, nmsg); - hash->digest(&ctx, digest); - TEST_CHECK(memcmp(digest, expect, nexpect) == 0); -} - -/* These are shared between RFC2202 and RFC4231. */ -static inline void hmac_test(const cf_chash *hash, - const void *hi_there, - const void *jefe, - const void *aa_dd, - const void *counter_key) -{ - uint8_t sig[CF_MAXHASH]; - uint8_t key[25], message[50]; - - /* Key: 0x0b * 20 - * Message: "Hi There" - */ - memset(key, 0x0b, 20); - memcpy(message, "Hi There", 8); - cf_hmac(key, 20, message, 8, sig, hash); - - TEST_CHECK(memcmp(sig, hi_there, hash->hashsz) == 0); - - /* Key: "Jefe" - * Message: "what do ya want for nothing?" - */ - memcpy(key, "Jefe", 4); - memcpy(message, "what do ya want for nothing?", 28); - cf_hmac(key, 4, message, 28, sig, hash); - TEST_CHECK(memcmp(sig, jefe, hash->hashsz) == 0); - - /* Key: 0xaa * 20 - * Message: 0xdd * 50 - */ - memset(key, 0xaa, 20); - memset(message, 0xdd, 50); - cf_hmac(key, 20, message, 50, sig, hash); - TEST_CHECK(memcmp(sig, aa_dd, hash->hashsz) == 0); - - /* Key: 0x01..0x19 - * Message: 0xcd * 50 - */ - for (uint8_t i = 1; i < 26; i++) - key[i - 1] = i; - memset(message, 0xcd, 50); - cf_hmac(key, 25, message, 50, sig, hash); - TEST_CHECK(memcmp(sig, counter_key, hash->hashsz) == 0); -} - -/* These are specific to RFC4231. */ -static inline void hmac_test_sha2(const cf_chash *hash, - const char *long_key, - const char *long_message) -{ - uint8_t sig[CF_MAXHASH]; - uint8_t key[131], message[152]; - - /* Key: 0xaa * 131 - * Message: "Test Using Larger Than Block-Size Key - Hash Key First" - */ - memset(key, 0xaa, 131); - memcpy(message, "Test Using Larger Than Block-Size Key - Hash Key First", 54); - cf_hmac(key, 131, message, 54, sig, hash); - TEST_CHECK(memcmp(sig, long_key, hash->hashsz) == 0); - - /* Key: 0xaa * 131 - * Message: "This is a test using a larger than block-size key and a larger than block-size data. The key needs to be hashed before being used by the HMAC algorithm." - */ - memset(key, 0xaa, 131); - memcpy(message, "This is a test using a larger than block-size key and a larger than block-size data. The key needs to be hashed before being used by the HMAC algorithm.", 152); - cf_hmac(key, 131, message, 152, sig, hash); - TEST_CHECK(memcmp(sig, long_message, hash->hashsz) == 0); -} - -/* This is as hmac_test_sha2, except the sizes are specific to - * a 512-bit block. This is from RFC2202. */ -static inline void hmac_test_sha1(const cf_chash *hash, - const char *long_key, - const char *long_message) -{ - uint8_t sig[CF_MAXHASH]; - uint8_t key[80], message[73]; - - /* Key: 0xaa * 80 - * Message: "Test Using Larger Than Block-Size Key - Hash Key First" - */ - memset(key, 0xaa, 80); - memcpy(message, "Test Using Larger Than Block-Size Key - Hash Key First", 54); - cf_hmac(key, 80, message, 54, sig, hash); - TEST_CHECK(memcmp(sig, long_key, hash->hashsz) == 0); - - /* Key: 0xaa * 80 - * Message: "Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data" - */ - memset(key, 0xaa, 80); - memcpy(message, "Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data", 73); - cf_hmac(key, 80, message, 73, sig, hash); - TEST_CHECK(memcmp(sig, long_message, hash->hashsz) == 0); -} - -typedef void (*final_fn)(void *ctx, uint8_t *out); - -/* Check incremental interface works, and final function likewise. */ -static void vector_abc_final(const cf_chash *hash, const void *vfinal_fn, - const void *expect, size_t nexpect) -{ - uint8_t digest[CF_MAXHASH]; - - final_fn final = vfinal_fn; - cf_chash_ctx ctx; - hash->init(&ctx); - hash->update(&ctx, "a", 1); - hash->digest(&ctx, digest); - hash->update(&ctx, "b", 1); - hash->digest(&ctx, digest); - hash->update(&ctx, "c", 1); - final(&ctx, digest); - - TEST_CHECK(hash->hashsz == nexpect); - TEST_CHECK(memcmp(expect, digest, nexpect) == 0); -} - -/* Check length-checking vectors work (generated by programs in ../extra_vecs) */ -static inline void vector_length(const cf_chash *h, - size_t max, - const void *expect, size_t nexpect) -{ - cf_chash_ctx outer, inner; - uint8_t digest[CF_MAXHASH]; - - h->init(&outer); - - for (size_t n = 0; n < max; n++) - { - h->init(&inner); - - for (size_t i = 0; i < n; i++) - { - uint8_t byte = (uint8_t) n & 0xff; - h->update(&inner, &byte, 1); - } - - h->digest(&inner, digest); - - h->update(&outer, digest, h->hashsz); - } - - h->digest(&outer, digest); - - TEST_CHECK(h->hashsz == nexpect); - TEST_CHECK(memcmp(expect, digest, nexpect) == 0); -} - -#endif diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testsha1.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/testsha1.c deleted file mode 100644 index c7adc8a..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testsha1.c +++ /dev/null @@ -1,55 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "sha1.h" -#include "hmac.h" -#include "handy.h" -#include "cutest.h" -#include "testutil.h" - -#include "testsha.h" - -static void test_sha1(void) -{ - const cf_chash *h = &cf_sha1; - vector(h, "", 0, "\xda\x39\xa3\xee\x5e\x6b\x4b\x0d\x32\x55\xbf\xef\x95\x60\x18\x90\xaf\xd8\x07\x09", 20); - vector(h, "abc", 3, "\xa9\x99\x3e\x36\x47\x06\x81\x6a\xba\x3e\x25\x71\x78\x50\xc2\x6c\x9c\xd0\xd8\x9d", 20); - vector(h, "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", 56, - "\x84\x98\x3e\x44\x1c\x3b\xd2\x6e\xba\xae\x4a\xa1\xf9\x51\x29\xe5\xe5\x46\x70\xf1", 20); - vector(h, "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", 112, - "\xa4\x9b\x24\x46\xa0\x2c\x64\x5b\xf4\x19\xf9\x95\xb6\x70\x91\x25\x3a\x04\xa2\x59", 20); - - vector_abc_final(h, cf_sha1_digest_final, "\xa9\x99\x3e\x36\x47\x06\x81\x6a\xba\x3e\x25\x71\x78\x50\xc2\x6c\x9c\xd0\xd8\x9d", 20); - - vector_length(h, 1024, "\x15\x53\x65\xcf\x77\xee\xd4\x8f\x46\xe2\x55\xc7\xdd\xdf\xfd\x0a\xf6\x99\x88\xbe", 20); -} - -static void test_hmac_sha1(void) -{ - hmac_test(&cf_sha1, - "\xb6\x17\x31\x86\x55\x05\x72\x64\xe2\x8b\xc0\xb6\xfb\x37\x8c\x8e\xf1\x46\xbe\x00", - "\xef\xfc\xdf\x6a\xe5\xeb\x2f\xa2\xd2\x74\x16\xd5\xf1\x84\xdf\x9c\x25\x9a\x7c\x79", - "\x12\x5d\x73\x42\xb9\xac\x11\xcd\x91\xa3\x9a\xf4\x8a\xa1\x7b\x4f\x63\xf1\x75\xd3", - "\x4c\x90\x07\xf4\x02\x62\x50\xc6\xbc\x84\x14\xf9\xbf\x50\xc8\x6c\x2d\x72\x35\xda"); - hmac_test_sha1(&cf_sha1, - "\xaa\x4a\xe5\xe1\x52\x72\xd0\x0e\x95\x70\x56\x37\xce\x8a\x3b\x55\xed\x40\x21\x12", - "\xe8\xe9\x9d\x0f\x45\x23\x7d\x78\x6d\x6b\xba\xa7\x96\x5c\x78\x08\xbb\xff\x1a\x91"); -} - -TEST_LIST = { - { "sha1", test_sha1}, - { "hmac-sha1", test_hmac_sha1}, - { 0 } -}; - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testsha2.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/testsha2.c deleted file mode 100644 index fc0ab6c..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testsha2.c +++ /dev/null @@ -1,224 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "sha2.h" -#include "hmac.h" -#include "pbkdf2.h" -#include "handy.h" -#include "cutest.h" -#include "testutil.h" - -#include "testsha.h" - -#undef REALLY_SLOW_TEST - -static void test_sha224(void) -{ - const cf_chash *h = &cf_sha224; - vector(h, "", 0, "\xd1\x4a\x02\x8c\x2a\x3a\x2b\xc9\x47\x61\x02\xbb\x28\x82\x34\xc4\x15\xa2\xb0\x1f\x82\x8e\xa6\x2a\xc5\xb3\xe4\x2f", 28); - vector(h, "abc", 3, "\x23\x09\x7d\x22\x34\x05\xd8\x22\x86\x42\xa4\x77\xbd\xa2\x55\xb3\x2a\xad\xbc\xe4\xbd\xa0\xb3\xf7\xe3\x6c\x9d\xa7", 28); - vector(h, "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", 56, - "\x75\x38\x8b\x16\x51\x27\x76\xcc\x5d\xba\x5d\xa1\xfd\x89\x01\x50\xb0\xc6\x45\x5c\xb4\xf5\x8b\x19\x52\x52\x25\x25", 28); - vector(h, "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", 112, - "\xc9\x7c\xa9\xa5\x59\x85\x0c\xe9\x7a\x04\xa9\x6d\xef\x6d\x99\xa9\xe0\xe0\xe2\xab\x14\xe6\xb8\xdf\x26\x5f\xc0\xb3", 28); - - /* Check that incremental interface produces correct results. */ - vector_abc_final(h, cf_sha224_digest_final, "\x23\x09\x7d\x22\x34\x05\xd8\x22\x86\x42\xa4\x77\xbd\xa2\x55\xb3\x2a\xad\xbc\xe4\xbd\xa0\xb3\xf7\xe3\x6c\x9d\xa7", 28); - - vector_length(h, 1024, "\x08\x2c\x80\x5b\x6f\x85\xde\x0e\xdf\xa8\x51\xa0\x1f\xe6\x4f\x64\x85\x16\x48\xae\xfc\xc1\xd4\x52\x4e\xf8\x36\xe7", 28); -} - -static void test_hmac_sha224(void) -{ - hmac_test(&cf_sha224, - "\x89\x6f\xb1\x12\x8a\xbb\xdf\x19\x68\x32\x10\x7c\xd4\x9d\xf3\x3f\x47\xb4\xb1\x16\x99\x12\xba\x4f\x53\x68\x4b\x22", - "\xa3\x0e\x01\x09\x8b\xc6\xdb\xbf\x45\x69\x0f\x3a\x7e\x9e\x6d\x0f\x8b\xbe\xa2\xa3\x9e\x61\x48\x00\x8f\xd0\x5e\x44", - "\x7f\xb3\xcb\x35\x88\xc6\xc1\xf6\xff\xa9\x69\x4d\x7d\x6a\xd2\x64\x93\x65\xb0\xc1\xf6\x5d\x69\xd1\xec\x83\x33\xea", - "\x6c\x11\x50\x68\x74\x01\x3c\xac\x6a\x2a\xbc\x1b\xb3\x82\x62\x7c\xec\x6a\x90\xd8\x6e\xfc\x01\x2d\xe7\xaf\xec\x5a"); - hmac_test_sha2(&cf_sha224, - "\x95\xe9\xa0\xdb\x96\x20\x95\xad\xae\xbe\x9b\x2d\x6f\x0d\xbc\xe2\xd4\x99\xf1\x12\xf2\xd2\xb7\x27\x3f\xa6\x87\x0e", - "\x3a\x85\x41\x66\xac\x5d\x9f\x02\x3f\x54\xd5\x17\xd0\xb3\x9d\xbd\x94\x67\x70\xdb\x9c\x2b\x95\xc9\xf6\xf5\x65\xd1"); -} - -static void test_sha256(void) -{ - const cf_chash *h = &cf_sha256; - vector(h, "", 0, "\xe3\xb0\xc4\x42\x98\xfc\x1c\x14\x9a\xfb\xf4\xc8\x99\x6f\xb9\x24\x27\xae\x41\xe4\x64\x9b\x93\x4c\xa4\x95\x99\x1b\x78\x52\xb8\x55", 32); - vector(h, "abc", 3, "\xba\x78\x16\xbf\x8f\x01\xcf\xea\x41\x41\x40\xde\x5d\xae\x22\x23\xb0\x03\x61\xa3\x96\x17\x7a\x9c\xb4\x10\xff\x61\xf2\x00\x15\xad", 32); - vector(h, "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", 56, - "\x24\x8d\x6a\x61\xd2\x06\x38\xb8\xe5\xc0\x26\x93\x0c\x3e\x60\x39\xa3\x3c\xe4\x59\x64\xff\x21\x67\xf6\xec\xed\xd4\x19\xdb\x06\xc1", 32); - vector(h, "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", 112, - "\xcf\x5b\x16\xa7\x78\xaf\x83\x80\x03\x6c\xe5\x9e\x7b\x04\x92\x37\x0b\x24\x9b\x11\xe8\xf0\x7a\x51\xaf\xac\x45\x03\x7a\xfe\xe9\xd1", 32); - - vector_abc_final(h, cf_sha256_digest_final, "\xba\x78\x16\xbf\x8f\x01\xcf\xea\x41\x41\x40\xde\x5d\xae\x22\x23\xb0\x03\x61\xa3\x96\x17\x7a\x9c\xb4\x10\xff\x61\xf2\x00\x15\xad", 32); - - vector_length(h, 1024, "\x55\x7b\xfd\xd5\xef\xda\xfd\x63\x06\x5e\xb7\x98\x87\xde\x86\xdb\x54\xc3\xfe\xdf\x7b\xcc\xcb\x97\x08\xfa\x87\xf0\x11\x87\x61\xdc", 32); -} - -static void test_hmac_sha256(void) -{ - hmac_test(&cf_sha256, - "\xb0\x34\x4c\x61\xd8\xdb\x38\x53\x5c\xa8\xaf\xce\xaf\x0b\xf1\x2b\x88\x1d\xc2\x00\xc9\x83\x3d\xa7\x26\xe9\x37\x6c\x2e\x32\xcf\xf7", - "\x5b\xdc\xc1\x46\xbf\x60\x75\x4e\x6a\x04\x24\x26\x08\x95\x75\xc7\x5a\x00\x3f\x08\x9d\x27\x39\x83\x9d\xec\x58\xb9\x64\xec\x38\x43", - "\x77\x3e\xa9\x1e\x36\x80\x0e\x46\x85\x4d\xb8\xeb\xd0\x91\x81\xa7\x29\x59\x09\x8b\x3e\xf8\xc1\x22\xd9\x63\x55\x14\xce\xd5\x65\xfe", - "\x82\x55\x8a\x38\x9a\x44\x3c\x0e\xa4\xcc\x81\x98\x99\xf2\x08\x3a\x85\xf0\xfa\xa3\xe5\x78\xf8\x07\x7a\x2e\x3f\xf4\x67\x29\x66\x5b"); - hmac_test_sha2(&cf_sha256, - "\x60\xe4\x31\x59\x1e\xe0\xb6\x7f\x0d\x8a\x26\xaa\xcb\xf5\xb7\x7f\x8e\x0b\xc6\x21\x37\x28\xc5\x14\x05\x46\x04\x0f\x0e\xe3\x7f\x54", - "\x9b\x09\xff\xa7\x1b\x94\x2f\xcb\x27\x63\x5f\xbc\xd5\xb0\xe9\x44\xbf\xdc\x63\x64\x4f\x07\x13\x93\x8a\x7f\x51\x53\x5c\x3a\x35\xe2"); -} - -static void test_sha384(void) -{ - const cf_chash *h = &cf_sha384; - vector(h, "", 0, "\x38\xb0\x60\xa7\x51\xac\x96\x38\x4c\xd9\x32\x7e\xb1\xb1\xe3\x6a\x21\xfd\xb7\x11\x14\xbe\x07\x43\x4c\x0c\xc7\xbf\x63\xf6\xe1\xda\x27\x4e\xde\xbf\xe7\x6f\x65\xfb\xd5\x1a\xd2\xf1\x48\x98\xb9\x5b", 48); - vector(h, "abc", 3, "\xcb\x00\x75\x3f\x45\xa3\x5e\x8b\xb5\xa0\x3d\x69\x9a\xc6\x50\x07\x27\x2c\x32\xab\x0e\xde\xd1\x63\x1a\x8b\x60\x5a\x43\xff\x5b\xed\x80\x86\x07\x2b\xa1\xe7\xcc\x23\x58\xba\xec\xa1\x34\xc8\x25\xa7", 48); - vector(h, "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", 56, - "\x33\x91\xfd\xdd\xfc\x8d\xc7\x39\x37\x07\xa6\x5b\x1b\x47\x09\x39\x7c\xf8\xb1\xd1\x62\xaf\x05\xab\xfe\x8f\x45\x0d\xe5\xf3\x6b\xc6\xb0\x45\x5a\x85\x20\xbc\x4e\x6f\x5f\xe9\x5b\x1f\xe3\xc8\x45\x2b", 48); - vector(h, "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", 112, - "\x09\x33\x0c\x33\xf7\x11\x47\xe8\x3d\x19\x2f\xc7\x82\xcd\x1b\x47\x53\x11\x1b\x17\x3b\x3b\x05\xd2\x2f\xa0\x80\x86\xe3\xb0\xf7\x12\xfc\xc7\xc7\x1a\x55\x7e\x2d\xb9\x66\xc3\xe9\xfa\x91\x74\x60\x39", 48); - - vector_abc_final(h, cf_sha384_digest_final, "\xcb\x00\x75\x3f\x45\xa3\x5e\x8b\xb5\xa0\x3d\x69\x9a\xc6\x50\x07\x27\x2c\x32\xab\x0e\xde\xd1\x63\x1a\x8b\x60\x5a\x43\xff\x5b\xed\x80\x86\x07\x2b\xa1\xe7\xcc\x23\x58\xba\xec\xa1\x34\xc8\x25\xa7", 48); - - vector_length(h, 1024, "\xae\xe7\xf1\x43\xef\x69\x7b\xa2\xe1\xfd\x39\x9f\xd7\xe6\x28\x9c\x19\xaf\x3c\xc1\xbd\xda\xbd\x3f\x07\xae\xc2\xea\x40\x55\x37\x27\x5f\x41\x49\x50\x3f\xcc\xaf\xa0\xc5\x95\xf7\x62\x9b\xff\x50\x32", 48); -} - -static void test_hmac_sha384(void) -{ - hmac_test(&cf_sha384, - "\xaf\xd0\x39\x44\xd8\x48\x95\x62\x6b\x08\x25\xf4\xab\x46\x90\x7f\x15\xf9\xda\xdb\xe4\x10\x1e\xc6\x82\xaa\x03\x4c\x7c\xeb\xc5\x9c\xfa\xea\x9e\xa9\x07\x6e\xde\x7f\x4a\xf1\x52\xe8\xb2\xfa\x9c\xb6", - "\xaf\x45\xd2\xe3\x76\x48\x40\x31\x61\x7f\x78\xd2\xb5\x8a\x6b\x1b\x9c\x7e\xf4\x64\xf5\xa0\x1b\x47\xe4\x2e\xc3\x73\x63\x22\x44\x5e\x8e\x22\x40\xca\x5e\x69\xe2\xc7\x8b\x32\x39\xec\xfa\xb2\x16\x49", - "\x88\x06\x26\x08\xd3\xe6\xad\x8a\x0a\xa2\xac\xe0\x14\xc8\xa8\x6f\x0a\xa6\x35\xd9\x47\xac\x9f\xeb\xe8\x3e\xf4\xe5\x59\x66\x14\x4b\x2a\x5a\xb3\x9d\xc1\x38\x14\xb9\x4e\x3a\xb6\xe1\x01\xa3\x4f\x27", - "\x3e\x8a\x69\xb7\x78\x3c\x25\x85\x19\x33\xab\x62\x90\xaf\x6c\xa7\x7a\x99\x81\x48\x08\x50\x00\x9c\xc5\x57\x7c\x6e\x1f\x57\x3b\x4e\x68\x01\xdd\x23\xc4\xa7\xd6\x79\xcc\xf8\xa3\x86\xc6\x74\xcf\xfb"); - hmac_test_sha2(&cf_sha384, - "\x4e\xce\x08\x44\x85\x81\x3e\x90\x88\xd2\xc6\x3a\x04\x1b\xc5\xb4\x4f\x9e\xf1\x01\x2a\x2b\x58\x8f\x3c\xd1\x1f\x05\x03\x3a\xc4\xc6\x0c\x2e\xf6\xab\x40\x30\xfe\x82\x96\x24\x8d\xf1\x63\xf4\x49\x52", - "\x66\x17\x17\x8e\x94\x1f\x02\x0d\x35\x1e\x2f\x25\x4e\x8f\xd3\x2c\x60\x24\x20\xfe\xb0\xb8\xfb\x9a\xdc\xce\xbb\x82\x46\x1e\x99\xc5\xa6\x78\xcc\x31\xe7\x99\x17\x6d\x38\x60\xe6\x11\x0c\x46\x52\x3e"); -} - -static void test_sha512(void) -{ - const cf_chash *h = &cf_sha512; - vector(h, "", 0, "\xcf\x83\xe1\x35\x7e\xef\xb8\xbd\xf1\x54\x28\x50\xd6\x6d\x80\x07\xd6\x20\xe4\x05\x0b\x57\x15\xdc\x83\xf4\xa9\x21\xd3\x6c\xe9\xce\x47\xd0\xd1\x3c\x5d\x85\xf2\xb0\xff\x83\x18\xd2\x87\x7e\xec\x2f\x63\xb9\x31\xbd\x47\x41\x7a\x81\xa5\x38\x32\x7a\xf9\x27\xda\x3e", 64); - vector(h, "abc", 3, "\xdd\xaf\x35\xa1\x93\x61\x7a\xba\xcc\x41\x73\x49\xae\x20\x41\x31\x12\xe6\xfa\x4e\x89\xa9\x7e\xa2\x0a\x9e\xee\xe6\x4b\x55\xd3\x9a\x21\x92\x99\x2a\x27\x4f\xc1\xa8\x36\xba\x3c\x23\xa3\xfe\xeb\xbd\x45\x4d\x44\x23\x64\x3c\xe8\x0e\x2a\x9a\xc9\x4f\xa5\x4c\xa4\x9f", 64); - vector(h, "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", 56, - "\x20\x4a\x8f\xc6\xdd\xa8\x2f\x0a\x0c\xed\x7b\xeb\x8e\x08\xa4\x16\x57\xc1\x6e\xf4\x68\xb2\x28\xa8\x27\x9b\xe3\x31\xa7\x03\xc3\x35\x96\xfd\x15\xc1\x3b\x1b\x07\xf9\xaa\x1d\x3b\xea\x57\x78\x9c\xa0\x31\xad\x85\xc7\xa7\x1d\xd7\x03\x54\xec\x63\x12\x38\xca\x34\x45", 64); - vector(h, "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", 112, - "\x8e\x95\x9b\x75\xda\xe3\x13\xda\x8c\xf4\xf7\x28\x14\xfc\x14\x3f\x8f\x77\x79\xc6\xeb\x9f\x7f\xa1\x72\x99\xae\xad\xb6\x88\x90\x18\x50\x1d\x28\x9e\x49\x00\xf7\xe4\x33\x1b\x99\xde\xc4\xb5\x43\x3a\xc7\xd3\x29\xee\xb6\xdd\x26\x54\x5e\x96\xe5\x5b\x87\x4b\xe9\x09", 64); - - vector_abc_final(h, cf_sha512_digest_final, "\xdd\xaf\x35\xa1\x93\x61\x7a\xba\xcc\x41\x73\x49\xae\x20\x41\x31\x12\xe6\xfa\x4e\x89\xa9\x7e\xa2\x0a\x9e\xee\xe6\x4b\x55\xd3\x9a\x21\x92\x99\x2a\x27\x4f\xc1\xa8\x36\xba\x3c\x23\xa3\xfe\xeb\xbd\x45\x4d\x44\x23\x64\x3c\xe8\x0e\x2a\x9a\xc9\x4f\xa5\x4c\xa4\x9f", 64); - - vector_length(h, 1024, "\x61\x20\x81\x2e\xd5\x0c\xc3\x11\x67\x04\x3f\x1f\x06\x9d\xcd\x4a\xd8\x83\x23\xd9\x96\x53\xd9\x67\x38\x2c\xc3\x44\x25\x69\x53\x1c\xd0\x3d\xe4\x79\x0a\x71\xde\x88\x45\x44\x66\x80\xb8\xc5\x90\xb3\x07\xc8\xae\x52\x57\x67\xf9\x28\xf8\xda\x9e\x9e\x80\xc9\x35\x5e", 64); -} - -static void test_hmac_sha512(void) -{ - hmac_test(&cf_sha512, - "\x87\xaa\x7c\xde\xa5\xef\x61\x9d\x4f\xf0\xb4\x24\x1a\x1d\x6c\xb0\x23\x79\xf4\xe2\xce\x4e\xc2\x78\x7a\xd0\xb3\x05\x45\xe1\x7c\xde\xda\xa8\x33\xb7\xd6\xb8\xa7\x02\x03\x8b\x27\x4e\xae\xa3\xf4\xe4\xbe\x9d\x91\x4e\xeb\x61\xf1\x70\x2e\x69\x6c\x20\x3a\x12\x68\x54", - "\x16\x4b\x7a\x7b\xfc\xf8\x19\xe2\xe3\x95\xfb\xe7\x3b\x56\xe0\xa3\x87\xbd\x64\x22\x2e\x83\x1f\xd6\x10\x27\x0c\xd7\xea\x25\x05\x54\x97\x58\xbf\x75\xc0\x5a\x99\x4a\x6d\x03\x4f\x65\xf8\xf0\xe6\xfd\xca\xea\xb1\xa3\x4d\x4a\x6b\x4b\x63\x6e\x07\x0a\x38\xbc\xe7\x37", - "\xfa\x73\xb0\x08\x9d\x56\xa2\x84\xef\xb0\xf0\x75\x6c\x89\x0b\xe9\xb1\xb5\xdb\xdd\x8e\xe8\x1a\x36\x55\xf8\x3e\x33\xb2\x27\x9d\x39\xbf\x3e\x84\x82\x79\xa7\x22\xc8\x06\xb4\x85\xa4\x7e\x67\xc8\x07\xb9\x46\xa3\x37\xbe\xe8\x94\x26\x74\x27\x88\x59\xe1\x32\x92\xfb", - "\xb0\xba\x46\x56\x37\x45\x8c\x69\x90\xe5\xa8\xc5\xf6\x1d\x4a\xf7\xe5\x76\xd9\x7f\xf9\x4b\x87\x2d\xe7\x6f\x80\x50\x36\x1e\xe3\xdb\xa9\x1c\xa5\xc1\x1a\xa2\x5e\xb4\xd6\x79\x27\x5c\xc5\x78\x80\x63\xa5\xf1\x97\x41\x12\x0c\x4f\x2d\xe2\xad\xeb\xeb\x10\xa2\x98\xdd"); - hmac_test_sha2(&cf_sha512, - "\x80\xb2\x42\x63\xc7\xc1\xa3\xeb\xb7\x14\x93\xc1\xdd\x7b\xe8\xb4\x9b\x46\xd1\xf4\x1b\x4a\xee\xc1\x12\x1b\x01\x37\x83\xf8\xf3\x52\x6b\x56\xd0\x37\xe0\x5f\x25\x98\xbd\x0f\xd2\x21\x5d\x6a\x1e\x52\x95\xe6\x4f\x73\xf6\x3f\x0a\xec\x8b\x91\x5a\x98\x5d\x78\x65\x98", - "\xe3\x7b\x6a\x77\x5d\xc8\x7d\xba\xa4\xdf\xa9\xf9\x6e\x5e\x3f\xfd\xde\xbd\x71\xf8\x86\x72\x89\x86\x5d\xf5\xa3\x2d\x20\xcd\xc9\x44\xb6\x02\x2c\xac\x3c\x49\x82\xb1\x0d\x5e\xeb\x55\xc3\xe4\xde\x15\x13\x46\x76\xfb\x6d\xe0\x44\x60\x65\xc9\x74\x40\xfa\x8c\x6a\x58"); -} - -#ifdef REALLY_SLOW_TEST -static void test_sha256_long(void) -{ - uint8_t digest[32]; - cf_sha256_context ctx; - cf_sha256_init(&ctx); - - for (size_t i = 0; i < 0x1000000; i++) - cf_sha256_update(&ctx, "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmno", 64); - cf_sha256_digest_final(&ctx, digest); - - uint8_t expect[32]; - unhex(expect, sizeof expect, "\x50\xe7\x2a\x0e\x26\x44\x2f\xe2\x55\x2d\xc3\x93\x8a\xc5\x86\x58\x22\x8c\x0c\xbf\xb1\xd2\xca\x87\x2a\xe4\x35\x26\x6f\xcd\x05\x5e", 32); - TEST_CHECK(memcmp(expect, digest, sizeof digest) == 0); -} -#endif - -static void check_pkbdf2_sha256(const void *pw, size_t npw, - const void *salt, size_t nsalt, - uint32_t iters, - const void *expect, size_t nexpect) -{ - uint8_t output[64]; - - cf_pbkdf2_hmac((const void *) pw, npw, - (const void *) salt, nsalt, - iters, - output, nexpect, - &cf_sha256); - - TEST_CHECK(memcmp(expect, output, nexpect) == 0); -} - -static void test_pbkdf2_sha256(void) -{ - check_pkbdf2_sha256("password", 8, - "salt", 4, - 1, - "\x12\x0f\xb6\xcf\xfc\xf8\xb3\x2c\x43\xe7\x22\x52\x56\xc4\xf8\x37\xa8\x65\x48\xc9\x2c\xcc\x35\x48\x08\x05\x98\x7c\xb7\x0b\xe1\x7b", 32); - - check_pkbdf2_sha256("password", 8, - "salt", 4, - 2, - "\xae\x4d\x0c\x95\xaf\x6b\x46\xd3\x2d\x0a\xdf\xf9\x28\xf0\x6d\xd0\x2a\x30\x3f\x8e\xf3\xc2\x51\xdf\xd6\xe2\xd8\x5a\x95\x47\x4c\x43", 32); - - check_pkbdf2_sha256("password", 8, - "salt", 4, - 4096, - "\xc5\xe4\x78\xd5\x92\x88\xc8\x41\xaa\x53\x0d\xb6\x84\x5c\x4c\x8d\x96\x28\x93\xa0\x01\xce\x4e\x11\xa4\x96\x38\x73\xaa\x98\x13\x4a", 32); - - check_pkbdf2_sha256("passwordPASSWORDpassword", 24, - "saltSALTsaltSALTsaltSALTsaltSALTsalt", 36, - 4096, - "\x34\x8c\x89\xdb\xcb\xd3\x2b\x2f\x32\xd8\x14\xb8\x11\x6e\x84\xcf\x2b\x17\x34\x7e\xbc\x18\x00\x18\x1c\x4e\x2a\x1f\xb8\xdd\x53\xe1\xc6\x35\x51\x8c\x7d\xac\x47\xe9", 40); - - check_pkbdf2_sha256("", 0, - "salt", 4, - 1024, - "\x9e\x83\xf2\x79\xc0\x40\xf2\xa1\x1a\xa4\xa0\x2b\x24\xc4\x18\xf2\xd3\xcb\x39\x56\x0c\x96\x27\xfa\x4f\x47\xe3\xbc\xc2\x89\x7c\x3d", 32); - - check_pkbdf2_sha256("password", 8, - "", 0, - 1024, - "\xea\x58\x08\x41\x1e\xb0\xc7\xe8\x30\xde\xab\x55\x09\x6c\xee\x58\x27\x61\xe2\x2a\x9b\xc0\x34\xe3\xec\xe9\x25\x22\x5b\x07\xbf\x46", 32); - - check_pkbdf2_sha256("\x70\x61\x73\x73\x00\x77\x6f\x72\x64", 9, - "\x73\x61\x00\x6c\x74", 5, - 4096, - "\x89\xb6\x9d\x05\x16\xf8\x29\x89\x3c\x69\x62\x26\x65\x0a\x86\x87", 16); -} - -TEST_LIST = { - { "sha224", test_sha224}, - { "sha256", test_sha256 }, - { "sha384", test_sha384 }, - { "sha512", test_sha512 }, - - { "hmac-sha224", test_hmac_sha224 }, - { "hmac-sha256", test_hmac_sha256 }, - { "hmac-sha384", test_hmac_sha384 }, - { "hmac-sha512", test_hmac_sha512 }, - - { "pbkdf2-sha256", test_pbkdf2_sha256 }, - -#ifdef REALLY_SLOW_TEST - { "sha256-long", test_sha256_long }, -#endif - { 0 } -}; - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testsha3.c b/debian/vendor-h2o/deps/picotls/deps/cifra/src/testsha3.c deleted file mode 100644 index 92ab9cf..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testsha3.c +++ /dev/null @@ -1,104 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#include "sha3.h" -#include "handy.h" -#include "cutest.h" -#include "testutil.h" -#include "testsha.h" - -static void test_sha3_224(void) -{ - const cf_chash *H = &cf_sha3_224; - vector(H, "", 0, - "\x6b\x4e\x03\x42\x36\x67\xdb\xb7\x3b\x6e\x15\x45\x4f\x0e\xb1\xab\xd4\x59\x7f\x9a\x1b\x07\x8e\x3f\x5b\x5a\x6b\xc7", 28); - vector(H, "abc", 3, - "\xe6\x42\x82\x4c\x3f\x8c\xf2\x4a\xd0\x92\x34\xee\x7d\x3c\x76\x6f\xc9\xa3\xa5\x16\x8d\x0c\x94\xad\x73\xb4\x6f\xdf", 28); - vector(H, "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", 56, - "\x8a\x24\x10\x8b\x15\x4a\xda\x21\xc9\xfd\x55\x74\x49\x44\x79\xba\x5c\x7e\x7a\xb7\x6e\xf2\x64\xea\xd0\xfc\xce\x33", 28); - vector(H, "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", 112, - "\x54\x3e\x68\x68\xe1\x66\x6c\x1a\x64\x36\x30\xdf\x77\x36\x7a\xe5\xa6\x2a\x85\x07\x0a\x51\xc1\x4c\xbf\x66\x5c\xbc", 28); - - /* Artificial exercise for len(msg) = rate_bytes - 1 codepath */ - vector(H, "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", 143, - "\x73\xb1\xb2\x2b\x54\xf5\x15\xf6\x26\xa6\xab\xdd\xe6\xaf\x25\xcd\x48\x01\xdc\x6e\x9d\xc7\xfa\x3f\x77\xe1\xc1\x22", 28); - - vector_abc_final(H, cf_sha3_224_digest_final, - "\xe6\x42\x82\x4c\x3f\x8c\xf2\x4a\xd0\x92\x34\xee\x7d\x3c\x76\x6f\xc9\xa3\xa5\x16\x8d\x0c\x94\xad\x73\xb4\x6f\xdf", 28); - - vector_length(H, 1024, "\xf2\x54\xf3\x67\x6d\xc6\xc0\x0f\x2f\xee\x50\x59\x07\x62\x8b\x0d\x5b\x9e\xdf\xf8\xe8\xc2\x9e\x9b\xa7\xd6\x05\xdd", 28); -} - -static void test_sha3_256(void) -{ - const cf_chash *H = &cf_sha3_256; - vector(H, "", 0, - "\xa7\xff\xc6\xf8\xbf\x1e\xd7\x66\x51\xc1\x47\x56\xa0\x61\xd6\x62\xf5\x80\xff\x4d\xe4\x3b\x49\xfa\x82\xd8\x0a\x4b\x80\xf8\x43\x4a", 32); - vector(H, "abc", 3, - "\x3a\x98\x5d\xa7\x4f\xe2\x25\xb2\x04\x5c\x17\x2d\x6b\xd3\x90\xbd\x85\x5f\x08\x6e\x3e\x9d\x52\x5b\x46\xbf\xe2\x45\x11\x43\x15\x32", 32); - vector(H, "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", 56, - "\x41\xc0\xdb\xa2\xa9\xd6\x24\x08\x49\x10\x03\x76\xa8\x23\x5e\x2c\x82\xe1\xb9\x99\x8a\x99\x9e\x21\xdb\x32\xdd\x97\x49\x6d\x33\x76", 32); - vector(H, "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", 112, - "\x91\x6f\x60\x61\xfe\x87\x97\x41\xca\x64\x69\xb4\x39\x71\xdf\xdb\x28\xb1\xa3\x2d\xc3\x6c\xb3\x25\x4e\x81\x2b\xe2\x7a\xad\x1d\x18", 32); - - vector_abc_final(H, cf_sha3_256_digest_final, - "\x3a\x98\x5d\xa7\x4f\xe2\x25\xb2\x04\x5c\x17\x2d\x6b\xd3\x90\xbd\x85\x5f\x08\x6e\x3e\x9d\x52\x5b\x46\xbf\xe2\x45\x11\x43\x15\x32", 32); - - vector_length(H, 1024, "\xf7\xed\xf7\x2b\x34\x8c\xb4\xab\x5e\xe7\x4f\x6c\xae\xaf\x11\xad\xe2\x2f\x04\x65\x84\x8e\x5c\xaa\x14\x38\x7f\xd4\xeb\xdb\x9d\x70", 32); -} - -static void test_sha3_384(void) -{ - const cf_chash *H = &cf_sha3_384; - vector(H, "", 0, - "\x0c\x63\xa7\x5b\x84\x5e\x4f\x7d\x01\x10\x7d\x85\x2e\x4c\x24\x85\xc5\x1a\x50\xaa\xaa\x94\xfc\x61\x99\x5e\x71\xbb\xee\x98\x3a\x2a\xc3\x71\x38\x31\x26\x4a\xdb\x47\xfb\x6b\xd1\xe0\x58\xd5\xf0\x04", 48); - vector(H, "abc", 3, - "\xec\x01\x49\x82\x88\x51\x6f\xc9\x26\x45\x9f\x58\xe2\xc6\xad\x8d\xf9\xb4\x73\xcb\x0f\xc0\x8c\x25\x96\xda\x7c\xf0\xe4\x9b\xe4\xb2\x98\xd8\x8c\xea\x92\x7a\xc7\xf5\x39\xf1\xed\xf2\x28\x37\x6d\x25", 48); - vector(H, "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", 56, - "\x99\x1c\x66\x57\x55\xeb\x3a\x4b\x6b\xbd\xfb\x75\xc7\x8a\x49\x2e\x8c\x56\xa2\x2c\x5c\x4d\x7e\x42\x9b\xfd\xbc\x32\xb9\xd4\xad\x5a\xa0\x4a\x1f\x07\x6e\x62\xfe\xa1\x9e\xef\x51\xac\xd0\x65\x7c\x22", 48); - vector(H, "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", 112, - "\x79\x40\x7d\x3b\x59\x16\xb5\x9c\x3e\x30\xb0\x98\x22\x97\x47\x91\xc3\x13\xfb\x9e\xcc\x84\x9e\x40\x6f\x23\x59\x2d\x04\xf6\x25\xdc\x8c\x70\x9b\x98\xb4\x3b\x38\x52\xb3\x37\x21\x61\x79\xaa\x7f\xc7", 48); - - vector_abc_final(H, cf_sha3_384_digest_final, - "\xec\x01\x49\x82\x88\x51\x6f\xc9\x26\x45\x9f\x58\xe2\xc6\xad\x8d\xf9\xb4\x73\xcb\x0f\xc0\x8c\x25\x96\xda\x7c\xf0\xe4\x9b\xe4\xb2\x98\xd8\x8c\xea\x92\x7a\xc7\xf5\x39\xf1\xed\xf2\x28\x37\x6d\x25", 48); - - vector_length(H, 1024, "\xc2\x16\x48\x6a\x00\x32\xb1\xe1\x98\xf8\x72\x52\x01\x87\xba\xd4\xcf\x39\x13\x9c\x54\x21\x6d\x78\x86\x93\x88\xf9\x75\x03\xc1\x11\xcc\x7f\x5a\xc3\x21\x00\x3f\xc8\xa1\xf7\xfa\x10\x75\x60\xdb\xb1", 48); -} - -static void test_sha3_512(void) -{ - const cf_chash *H = &cf_sha3_512; - vector(H, "", 0, - "\xa6\x9f\x73\xcc\xa2\x3a\x9a\xc5\xc8\xb5\x67\xdc\x18\x5a\x75\x6e\x97\xc9\x82\x16\x4f\xe2\x58\x59\xe0\xd1\xdc\xc1\x47\x5c\x80\xa6\x15\xb2\x12\x3a\xf1\xf5\xf9\x4c\x11\xe3\xe9\x40\x2c\x3a\xc5\x58\xf5\x00\x19\x9d\x95\xb6\xd3\xe3\x01\x75\x85\x86\x28\x1d\xcd\x26", 64); - vector(H, "abc", 3, - "\xb7\x51\x85\x0b\x1a\x57\x16\x8a\x56\x93\xcd\x92\x4b\x6b\x09\x6e\x08\xf6\x21\x82\x74\x44\xf7\x0d\x88\x4f\x5d\x02\x40\xd2\x71\x2e\x10\xe1\x16\xe9\x19\x2a\xf3\xc9\x1a\x7e\xc5\x76\x47\xe3\x93\x40\x57\x34\x0b\x4c\xf4\x08\xd5\xa5\x65\x92\xf8\x27\x4e\xec\x53\xf0", 64); - vector(H, "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", 56, - "\x04\xa3\x71\xe8\x4e\xcf\xb5\xb8\xb7\x7c\xb4\x86\x10\xfc\xa8\x18\x2d\xd4\x57\xce\x6f\x32\x6a\x0f\xd3\xd7\xec\x2f\x1e\x91\x63\x6d\xee\x69\x1f\xbe\x0c\x98\x53\x02\xba\x1b\x0d\x8d\xc7\x8c\x08\x63\x46\xb5\x33\xb4\x9c\x03\x0d\x99\xa2\x7d\xaf\x11\x39\xd6\xe7\x5e", 64); - vector(H, "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", 112, - "\xaf\xeb\xb2\xef\x54\x2e\x65\x79\xc5\x0c\xad\x06\xd2\xe5\x78\xf9\xf8\xdd\x68\x81\xd7\xdc\x82\x4d\x26\x36\x0f\xee\xbf\x18\xa4\xfa\x73\xe3\x26\x11\x22\x94\x8e\xfc\xfd\x49\x2e\x74\xe8\x2e\x21\x89\xed\x0f\xb4\x40\xd1\x87\xf3\x82\x27\x0c\xb4\x55\xf2\x1d\xd1\x85", 64); - - vector_abc_final(H, cf_sha3_512_digest_final, - "\xb7\x51\x85\x0b\x1a\x57\x16\x8a\x56\x93\xcd\x92\x4b\x6b\x09\x6e\x08\xf6\x21\x82\x74\x44\xf7\x0d\x88\x4f\x5d\x02\x40\xd2\x71\x2e\x10\xe1\x16\xe9\x19\x2a\xf3\xc9\x1a\x7e\xc5\x76\x47\xe3\x93\x40\x57\x34\x0b\x4c\xf4\x08\xd5\xa5\x65\x92\xf8\x27\x4e\xec\x53\xf0", 64); - - vector_length(H, 1024, "\x3a\x98\x11\x17\xbc\x2f\xa3\x3b\x00\x51\x71\xf8\x80\x86\x33\x7f\x4f\x6c\xe9\xd1\x5c\xb7\x38\xc0\x9b\xe2\x8a\xb6\xd5\x38\xba\xbf\x7b\xc5\x4e\xbf\x3d\xdb\x53\x4a\x9c\x3c\x10\x85\xe7\x18\x3d\x46\xa5\x8c\xbc\xb0\x15\xb0\xdf\x50\x7a\xad\x0e\xdf\xf3\x54\x8e\xfd", 64); -} - -TEST_LIST = { - { "sha3-224", test_sha3_224 }, - { "sha3-256", test_sha3_256 }, - { "sha3-384", test_sha3_384 }, - { "sha3-512", test_sha3_512 }, - { 0 } -}; - diff --git a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testutil.h b/debian/vendor-h2o/deps/picotls/deps/cifra/src/testutil.h deleted file mode 100644 index b9a52b3..0000000 --- a/debian/vendor-h2o/deps/picotls/deps/cifra/src/testutil.h +++ /dev/null @@ -1,61 +0,0 @@ -/* - * cifra - embedded cryptography library - * Written in 2014 by Joseph Birr-Pixton <jpixton@gmail.com> - * - * To the extent possible under law, the author(s) have dedicated all - * copyright and related and neighboring rights to this software to the - * public domain worldwide. This software is distributed without any - * warranty. - * - * You should have received a copy of the CC0 Public Domain Dedication - * along with this software. If not, see - * <http://creativecommons.org/publicdomain/zero/1.0/>. - */ - -#ifndef TESTUTIL_H -#define TESTUTIL_H - -#include <assert.h> -#include <string.h> -#include <stdio.h> - -static inline uint8_t unhex_chr(char a) -{ - if (a >= '0' && a <= '9') - return a - '0'; - else if (a >= 'a' && a <= 'f') - return a - 'a' + 10; - else if (a >= 'A' && a <= 'F') - return a - 'A' + 10; - return 0; -} - -static inline size_t unhex(uint8_t *buf, size_t len, const char *str) -{ - size_t used = 0; - - assert(strlen(str) % 2 == 0); - assert(strlen(str) / 2 <= len); - - while (*str) - { - assert(len); - *buf = unhex_chr(str[0]) << 4 | unhex_chr(str[1]); - buf++; - used++; - str += 2; - len--; - } - - return used; -} - -static inline void dump(const char *label, const uint8_t *buf, size_t len) -{ - printf("%s: ", label); - for (size_t i = 0; i < len; i++) - printf("%02x", buf[i]); - printf("\n"); -} - -#endif |