162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later
262306a36Sopenharmony_ci/*  Diffie-Hellman Key Agreement Method [RFC2631]
362306a36Sopenharmony_ci *
462306a36Sopenharmony_ci * Copyright (c) 2016, Intel Corporation
562306a36Sopenharmony_ci * Authors: Salvatore Benedetto <salvatore.benedetto@intel.com>
662306a36Sopenharmony_ci */
762306a36Sopenharmony_ci
862306a36Sopenharmony_ci#include <linux/fips.h>
962306a36Sopenharmony_ci#include <linux/module.h>
1062306a36Sopenharmony_ci#include <crypto/internal/kpp.h>
1162306a36Sopenharmony_ci#include <crypto/kpp.h>
1262306a36Sopenharmony_ci#include <crypto/dh.h>
1362306a36Sopenharmony_ci#include <crypto/rng.h>
1462306a36Sopenharmony_ci#include <linux/mpi.h>
1562306a36Sopenharmony_ci
1662306a36Sopenharmony_cistruct dh_ctx {
1762306a36Sopenharmony_ci	MPI p;	/* Value is guaranteed to be set. */
1862306a36Sopenharmony_ci	MPI g;	/* Value is guaranteed to be set. */
1962306a36Sopenharmony_ci	MPI xa;	/* Value is guaranteed to be set. */
2062306a36Sopenharmony_ci};
2162306a36Sopenharmony_ci
2262306a36Sopenharmony_cistatic void dh_clear_ctx(struct dh_ctx *ctx)
2362306a36Sopenharmony_ci{
2462306a36Sopenharmony_ci	mpi_free(ctx->p);
2562306a36Sopenharmony_ci	mpi_free(ctx->g);
2662306a36Sopenharmony_ci	mpi_free(ctx->xa);
2762306a36Sopenharmony_ci	memset(ctx, 0, sizeof(*ctx));
2862306a36Sopenharmony_ci}
2962306a36Sopenharmony_ci
3062306a36Sopenharmony_ci/*
3162306a36Sopenharmony_ci * If base is g we compute the public key
3262306a36Sopenharmony_ci *	ya = g^xa mod p; [RFC2631 sec 2.1.1]
3362306a36Sopenharmony_ci * else if base if the counterpart public key we compute the shared secret
3462306a36Sopenharmony_ci *	ZZ = yb^xa mod p; [RFC2631 sec 2.1.1]
3562306a36Sopenharmony_ci */
3662306a36Sopenharmony_cistatic int _compute_val(const struct dh_ctx *ctx, MPI base, MPI val)
3762306a36Sopenharmony_ci{
3862306a36Sopenharmony_ci	/* val = base^xa mod p */
3962306a36Sopenharmony_ci	return mpi_powm(val, base, ctx->xa, ctx->p);
4062306a36Sopenharmony_ci}
4162306a36Sopenharmony_ci
4262306a36Sopenharmony_cistatic inline struct dh_ctx *dh_get_ctx(struct crypto_kpp *tfm)
4362306a36Sopenharmony_ci{
4462306a36Sopenharmony_ci	return kpp_tfm_ctx(tfm);
4562306a36Sopenharmony_ci}
4662306a36Sopenharmony_ci
4762306a36Sopenharmony_cistatic int dh_check_params_length(unsigned int p_len)
4862306a36Sopenharmony_ci{
4962306a36Sopenharmony_ci	if (fips_enabled)
5062306a36Sopenharmony_ci		return (p_len < 2048) ? -EINVAL : 0;
5162306a36Sopenharmony_ci
5262306a36Sopenharmony_ci	return (p_len < 1536) ? -EINVAL : 0;
5362306a36Sopenharmony_ci}
5462306a36Sopenharmony_ci
5562306a36Sopenharmony_cistatic int dh_set_params(struct dh_ctx *ctx, struct dh *params)
5662306a36Sopenharmony_ci{
5762306a36Sopenharmony_ci	if (dh_check_params_length(params->p_size << 3))
5862306a36Sopenharmony_ci		return -EINVAL;
5962306a36Sopenharmony_ci
6062306a36Sopenharmony_ci	ctx->p = mpi_read_raw_data(params->p, params->p_size);
6162306a36Sopenharmony_ci	if (!ctx->p)
6262306a36Sopenharmony_ci		return -EINVAL;
6362306a36Sopenharmony_ci
6462306a36Sopenharmony_ci	ctx->g = mpi_read_raw_data(params->g, params->g_size);
6562306a36Sopenharmony_ci	if (!ctx->g)
6662306a36Sopenharmony_ci		return -EINVAL;
6762306a36Sopenharmony_ci
6862306a36Sopenharmony_ci	return 0;
6962306a36Sopenharmony_ci}
7062306a36Sopenharmony_ci
7162306a36Sopenharmony_cistatic int dh_set_secret(struct crypto_kpp *tfm, const void *buf,
7262306a36Sopenharmony_ci			 unsigned int len)
7362306a36Sopenharmony_ci{
7462306a36Sopenharmony_ci	struct dh_ctx *ctx = dh_get_ctx(tfm);
7562306a36Sopenharmony_ci	struct dh params;
7662306a36Sopenharmony_ci
7762306a36Sopenharmony_ci	/* Free the old MPI key if any */
7862306a36Sopenharmony_ci	dh_clear_ctx(ctx);
7962306a36Sopenharmony_ci
8062306a36Sopenharmony_ci	if (crypto_dh_decode_key(buf, len, &params) < 0)
8162306a36Sopenharmony_ci		goto err_clear_ctx;
8262306a36Sopenharmony_ci
8362306a36Sopenharmony_ci	if (dh_set_params(ctx, &params) < 0)
8462306a36Sopenharmony_ci		goto err_clear_ctx;
8562306a36Sopenharmony_ci
8662306a36Sopenharmony_ci	ctx->xa = mpi_read_raw_data(params.key, params.key_size);
8762306a36Sopenharmony_ci	if (!ctx->xa)
8862306a36Sopenharmony_ci		goto err_clear_ctx;
8962306a36Sopenharmony_ci
9062306a36Sopenharmony_ci	return 0;
9162306a36Sopenharmony_ci
9262306a36Sopenharmony_cierr_clear_ctx:
9362306a36Sopenharmony_ci	dh_clear_ctx(ctx);
9462306a36Sopenharmony_ci	return -EINVAL;
9562306a36Sopenharmony_ci}
9662306a36Sopenharmony_ci
9762306a36Sopenharmony_ci/*
9862306a36Sopenharmony_ci * SP800-56A public key verification:
9962306a36Sopenharmony_ci *
10062306a36Sopenharmony_ci * * For the safe-prime groups in FIPS mode, Q can be computed
10162306a36Sopenharmony_ci *   trivially from P and a full validation according to SP800-56A
10262306a36Sopenharmony_ci *   section 5.6.2.3.1 is performed.
10362306a36Sopenharmony_ci *
10462306a36Sopenharmony_ci * * For all other sets of group parameters, only a partial validation
10562306a36Sopenharmony_ci *   according to SP800-56A section 5.6.2.3.2 is performed.
10662306a36Sopenharmony_ci */
10762306a36Sopenharmony_cistatic int dh_is_pubkey_valid(struct dh_ctx *ctx, MPI y)
10862306a36Sopenharmony_ci{
10962306a36Sopenharmony_ci	if (unlikely(!ctx->p))
11062306a36Sopenharmony_ci		return -EINVAL;
11162306a36Sopenharmony_ci
11262306a36Sopenharmony_ci	/*
11362306a36Sopenharmony_ci	 * Step 1: Verify that 2 <= y <= p - 2.
11462306a36Sopenharmony_ci	 *
11562306a36Sopenharmony_ci	 * The upper limit check is actually y < p instead of y < p - 1
11662306a36Sopenharmony_ci	 * in order to save one mpi_sub_ui() invocation here. Note that
11762306a36Sopenharmony_ci	 * p - 1 is the non-trivial element of the subgroup of order 2 and
11862306a36Sopenharmony_ci	 * thus, the check on y^q below would fail if y == p - 1.
11962306a36Sopenharmony_ci	 */
12062306a36Sopenharmony_ci	if (mpi_cmp_ui(y, 1) < 1 || mpi_cmp(y, ctx->p) >= 0)
12162306a36Sopenharmony_ci		return -EINVAL;
12262306a36Sopenharmony_ci
12362306a36Sopenharmony_ci	/*
12462306a36Sopenharmony_ci	 * Step 2: Verify that 1 = y^q mod p
12562306a36Sopenharmony_ci	 *
12662306a36Sopenharmony_ci	 * For the safe-prime groups q = (p - 1)/2.
12762306a36Sopenharmony_ci	 */
12862306a36Sopenharmony_ci	if (fips_enabled) {
12962306a36Sopenharmony_ci		MPI val, q;
13062306a36Sopenharmony_ci		int ret;
13162306a36Sopenharmony_ci
13262306a36Sopenharmony_ci		val = mpi_alloc(0);
13362306a36Sopenharmony_ci		if (!val)
13462306a36Sopenharmony_ci			return -ENOMEM;
13562306a36Sopenharmony_ci
13662306a36Sopenharmony_ci		q = mpi_alloc(mpi_get_nlimbs(ctx->p));
13762306a36Sopenharmony_ci		if (!q) {
13862306a36Sopenharmony_ci			mpi_free(val);
13962306a36Sopenharmony_ci			return -ENOMEM;
14062306a36Sopenharmony_ci		}
14162306a36Sopenharmony_ci
14262306a36Sopenharmony_ci		/*
14362306a36Sopenharmony_ci		 * ->p is odd, so no need to explicitly subtract one
14462306a36Sopenharmony_ci		 * from it before shifting to the right.
14562306a36Sopenharmony_ci		 */
14662306a36Sopenharmony_ci		mpi_rshift(q, ctx->p, 1);
14762306a36Sopenharmony_ci
14862306a36Sopenharmony_ci		ret = mpi_powm(val, y, q, ctx->p);
14962306a36Sopenharmony_ci		mpi_free(q);
15062306a36Sopenharmony_ci		if (ret) {
15162306a36Sopenharmony_ci			mpi_free(val);
15262306a36Sopenharmony_ci			return ret;
15362306a36Sopenharmony_ci		}
15462306a36Sopenharmony_ci
15562306a36Sopenharmony_ci		ret = mpi_cmp_ui(val, 1);
15662306a36Sopenharmony_ci
15762306a36Sopenharmony_ci		mpi_free(val);
15862306a36Sopenharmony_ci
15962306a36Sopenharmony_ci		if (ret != 0)
16062306a36Sopenharmony_ci			return -EINVAL;
16162306a36Sopenharmony_ci	}
16262306a36Sopenharmony_ci
16362306a36Sopenharmony_ci	return 0;
16462306a36Sopenharmony_ci}
16562306a36Sopenharmony_ci
16662306a36Sopenharmony_cistatic int dh_compute_value(struct kpp_request *req)
16762306a36Sopenharmony_ci{
16862306a36Sopenharmony_ci	struct crypto_kpp *tfm = crypto_kpp_reqtfm(req);
16962306a36Sopenharmony_ci	struct dh_ctx *ctx = dh_get_ctx(tfm);
17062306a36Sopenharmony_ci	MPI base, val = mpi_alloc(0);
17162306a36Sopenharmony_ci	int ret = 0;
17262306a36Sopenharmony_ci	int sign;
17362306a36Sopenharmony_ci
17462306a36Sopenharmony_ci	if (!val)
17562306a36Sopenharmony_ci		return -ENOMEM;
17662306a36Sopenharmony_ci
17762306a36Sopenharmony_ci	if (unlikely(!ctx->xa)) {
17862306a36Sopenharmony_ci		ret = -EINVAL;
17962306a36Sopenharmony_ci		goto err_free_val;
18062306a36Sopenharmony_ci	}
18162306a36Sopenharmony_ci
18262306a36Sopenharmony_ci	if (req->src) {
18362306a36Sopenharmony_ci		base = mpi_read_raw_from_sgl(req->src, req->src_len);
18462306a36Sopenharmony_ci		if (!base) {
18562306a36Sopenharmony_ci			ret = -EINVAL;
18662306a36Sopenharmony_ci			goto err_free_val;
18762306a36Sopenharmony_ci		}
18862306a36Sopenharmony_ci		ret = dh_is_pubkey_valid(ctx, base);
18962306a36Sopenharmony_ci		if (ret)
19062306a36Sopenharmony_ci			goto err_free_base;
19162306a36Sopenharmony_ci	} else {
19262306a36Sopenharmony_ci		base = ctx->g;
19362306a36Sopenharmony_ci	}
19462306a36Sopenharmony_ci
19562306a36Sopenharmony_ci	ret = _compute_val(ctx, base, val);
19662306a36Sopenharmony_ci	if (ret)
19762306a36Sopenharmony_ci		goto err_free_base;
19862306a36Sopenharmony_ci
19962306a36Sopenharmony_ci	if (fips_enabled) {
20062306a36Sopenharmony_ci		/* SP800-56A rev3 5.7.1.1 check: Validation of shared secret */
20162306a36Sopenharmony_ci		if (req->src) {
20262306a36Sopenharmony_ci			MPI pone;
20362306a36Sopenharmony_ci
20462306a36Sopenharmony_ci			/* z <= 1 */
20562306a36Sopenharmony_ci			if (mpi_cmp_ui(val, 1) < 1) {
20662306a36Sopenharmony_ci				ret = -EBADMSG;
20762306a36Sopenharmony_ci				goto err_free_base;
20862306a36Sopenharmony_ci			}
20962306a36Sopenharmony_ci
21062306a36Sopenharmony_ci			/* z == p - 1 */
21162306a36Sopenharmony_ci			pone = mpi_alloc(0);
21262306a36Sopenharmony_ci
21362306a36Sopenharmony_ci			if (!pone) {
21462306a36Sopenharmony_ci				ret = -ENOMEM;
21562306a36Sopenharmony_ci				goto err_free_base;
21662306a36Sopenharmony_ci			}
21762306a36Sopenharmony_ci
21862306a36Sopenharmony_ci			ret = mpi_sub_ui(pone, ctx->p, 1);
21962306a36Sopenharmony_ci			if (!ret && !mpi_cmp(pone, val))
22062306a36Sopenharmony_ci				ret = -EBADMSG;
22162306a36Sopenharmony_ci
22262306a36Sopenharmony_ci			mpi_free(pone);
22362306a36Sopenharmony_ci
22462306a36Sopenharmony_ci			if (ret)
22562306a36Sopenharmony_ci				goto err_free_base;
22662306a36Sopenharmony_ci
22762306a36Sopenharmony_ci		/* SP800-56A rev 3 5.6.2.1.3 key check */
22862306a36Sopenharmony_ci		} else {
22962306a36Sopenharmony_ci			if (dh_is_pubkey_valid(ctx, val)) {
23062306a36Sopenharmony_ci				ret = -EAGAIN;
23162306a36Sopenharmony_ci				goto err_free_val;
23262306a36Sopenharmony_ci			}
23362306a36Sopenharmony_ci		}
23462306a36Sopenharmony_ci	}
23562306a36Sopenharmony_ci
23662306a36Sopenharmony_ci	ret = mpi_write_to_sgl(val, req->dst, req->dst_len, &sign);
23762306a36Sopenharmony_ci	if (ret)
23862306a36Sopenharmony_ci		goto err_free_base;
23962306a36Sopenharmony_ci
24062306a36Sopenharmony_ci	if (sign < 0)
24162306a36Sopenharmony_ci		ret = -EBADMSG;
24262306a36Sopenharmony_cierr_free_base:
24362306a36Sopenharmony_ci	if (req->src)
24462306a36Sopenharmony_ci		mpi_free(base);
24562306a36Sopenharmony_cierr_free_val:
24662306a36Sopenharmony_ci	mpi_free(val);
24762306a36Sopenharmony_ci	return ret;
24862306a36Sopenharmony_ci}
24962306a36Sopenharmony_ci
25062306a36Sopenharmony_cistatic unsigned int dh_max_size(struct crypto_kpp *tfm)
25162306a36Sopenharmony_ci{
25262306a36Sopenharmony_ci	struct dh_ctx *ctx = dh_get_ctx(tfm);
25362306a36Sopenharmony_ci
25462306a36Sopenharmony_ci	return mpi_get_size(ctx->p);
25562306a36Sopenharmony_ci}
25662306a36Sopenharmony_ci
25762306a36Sopenharmony_cistatic void dh_exit_tfm(struct crypto_kpp *tfm)
25862306a36Sopenharmony_ci{
25962306a36Sopenharmony_ci	struct dh_ctx *ctx = dh_get_ctx(tfm);
26062306a36Sopenharmony_ci
26162306a36Sopenharmony_ci	dh_clear_ctx(ctx);
26262306a36Sopenharmony_ci}
26362306a36Sopenharmony_ci
26462306a36Sopenharmony_cistatic struct kpp_alg dh = {
26562306a36Sopenharmony_ci	.set_secret = dh_set_secret,
26662306a36Sopenharmony_ci	.generate_public_key = dh_compute_value,
26762306a36Sopenharmony_ci	.compute_shared_secret = dh_compute_value,
26862306a36Sopenharmony_ci	.max_size = dh_max_size,
26962306a36Sopenharmony_ci	.exit = dh_exit_tfm,
27062306a36Sopenharmony_ci	.base = {
27162306a36Sopenharmony_ci		.cra_name = "dh",
27262306a36Sopenharmony_ci		.cra_driver_name = "dh-generic",
27362306a36Sopenharmony_ci		.cra_priority = 100,
27462306a36Sopenharmony_ci		.cra_module = THIS_MODULE,
27562306a36Sopenharmony_ci		.cra_ctxsize = sizeof(struct dh_ctx),
27662306a36Sopenharmony_ci	},
27762306a36Sopenharmony_ci};
27862306a36Sopenharmony_ci
27962306a36Sopenharmony_ci
28062306a36Sopenharmony_cistruct dh_safe_prime {
28162306a36Sopenharmony_ci	unsigned int max_strength;
28262306a36Sopenharmony_ci	unsigned int p_size;
28362306a36Sopenharmony_ci	const char *p;
28462306a36Sopenharmony_ci};
28562306a36Sopenharmony_ci
28662306a36Sopenharmony_cistatic const char safe_prime_g[]  = { 2 };
28762306a36Sopenharmony_ci
28862306a36Sopenharmony_cistruct dh_safe_prime_instance_ctx {
28962306a36Sopenharmony_ci	struct crypto_kpp_spawn dh_spawn;
29062306a36Sopenharmony_ci	const struct dh_safe_prime *safe_prime;
29162306a36Sopenharmony_ci};
29262306a36Sopenharmony_ci
29362306a36Sopenharmony_cistruct dh_safe_prime_tfm_ctx {
29462306a36Sopenharmony_ci	struct crypto_kpp *dh_tfm;
29562306a36Sopenharmony_ci};
29662306a36Sopenharmony_ci
29762306a36Sopenharmony_cistatic void dh_safe_prime_free_instance(struct kpp_instance *inst)
29862306a36Sopenharmony_ci{
29962306a36Sopenharmony_ci	struct dh_safe_prime_instance_ctx *ctx = kpp_instance_ctx(inst);
30062306a36Sopenharmony_ci
30162306a36Sopenharmony_ci	crypto_drop_kpp(&ctx->dh_spawn);
30262306a36Sopenharmony_ci	kfree(inst);
30362306a36Sopenharmony_ci}
30462306a36Sopenharmony_ci
30562306a36Sopenharmony_cistatic inline struct dh_safe_prime_instance_ctx *dh_safe_prime_instance_ctx(
30662306a36Sopenharmony_ci	struct crypto_kpp *tfm)
30762306a36Sopenharmony_ci{
30862306a36Sopenharmony_ci	return kpp_instance_ctx(kpp_alg_instance(tfm));
30962306a36Sopenharmony_ci}
31062306a36Sopenharmony_ci
31162306a36Sopenharmony_cistatic int dh_safe_prime_init_tfm(struct crypto_kpp *tfm)
31262306a36Sopenharmony_ci{
31362306a36Sopenharmony_ci	struct dh_safe_prime_instance_ctx *inst_ctx =
31462306a36Sopenharmony_ci		dh_safe_prime_instance_ctx(tfm);
31562306a36Sopenharmony_ci	struct dh_safe_prime_tfm_ctx *tfm_ctx = kpp_tfm_ctx(tfm);
31662306a36Sopenharmony_ci
31762306a36Sopenharmony_ci	tfm_ctx->dh_tfm = crypto_spawn_kpp(&inst_ctx->dh_spawn);
31862306a36Sopenharmony_ci	if (IS_ERR(tfm_ctx->dh_tfm))
31962306a36Sopenharmony_ci		return PTR_ERR(tfm_ctx->dh_tfm);
32062306a36Sopenharmony_ci
32162306a36Sopenharmony_ci	kpp_set_reqsize(tfm, sizeof(struct kpp_request) +
32262306a36Sopenharmony_ci			     crypto_kpp_reqsize(tfm_ctx->dh_tfm));
32362306a36Sopenharmony_ci
32462306a36Sopenharmony_ci	return 0;
32562306a36Sopenharmony_ci}
32662306a36Sopenharmony_ci
32762306a36Sopenharmony_cistatic void dh_safe_prime_exit_tfm(struct crypto_kpp *tfm)
32862306a36Sopenharmony_ci{
32962306a36Sopenharmony_ci	struct dh_safe_prime_tfm_ctx *tfm_ctx = kpp_tfm_ctx(tfm);
33062306a36Sopenharmony_ci
33162306a36Sopenharmony_ci	crypto_free_kpp(tfm_ctx->dh_tfm);
33262306a36Sopenharmony_ci}
33362306a36Sopenharmony_ci
33462306a36Sopenharmony_cistatic u64 __add_u64_to_be(__be64 *dst, unsigned int n, u64 val)
33562306a36Sopenharmony_ci{
33662306a36Sopenharmony_ci	unsigned int i;
33762306a36Sopenharmony_ci
33862306a36Sopenharmony_ci	for (i = n; val && i > 0; --i) {
33962306a36Sopenharmony_ci		u64 tmp = be64_to_cpu(dst[i - 1]);
34062306a36Sopenharmony_ci
34162306a36Sopenharmony_ci		tmp += val;
34262306a36Sopenharmony_ci		val = tmp >= val ? 0 : 1;
34362306a36Sopenharmony_ci		dst[i - 1] = cpu_to_be64(tmp);
34462306a36Sopenharmony_ci	}
34562306a36Sopenharmony_ci
34662306a36Sopenharmony_ci	return val;
34762306a36Sopenharmony_ci}
34862306a36Sopenharmony_ci
34962306a36Sopenharmony_cistatic void *dh_safe_prime_gen_privkey(const struct dh_safe_prime *safe_prime,
35062306a36Sopenharmony_ci				       unsigned int *key_size)
35162306a36Sopenharmony_ci{
35262306a36Sopenharmony_ci	unsigned int n, oversampling_size;
35362306a36Sopenharmony_ci	__be64 *key;
35462306a36Sopenharmony_ci	int err;
35562306a36Sopenharmony_ci	u64 h, o;
35662306a36Sopenharmony_ci
35762306a36Sopenharmony_ci	/*
35862306a36Sopenharmony_ci	 * Generate a private key following NIST SP800-56Ar3,
35962306a36Sopenharmony_ci	 * sec. 5.6.1.1.1 and 5.6.1.1.3 resp..
36062306a36Sopenharmony_ci	 *
36162306a36Sopenharmony_ci	 * 5.6.1.1.1: choose key length N such that
36262306a36Sopenharmony_ci	 * 2 * ->max_strength <= N <= log2(q) + 1 = ->p_size * 8 - 1
36362306a36Sopenharmony_ci	 * with q = (p - 1) / 2 for the safe-prime groups.
36462306a36Sopenharmony_ci	 * Choose the lower bound's next power of two for N in order to
36562306a36Sopenharmony_ci	 * avoid excessively large private keys while still
36662306a36Sopenharmony_ci	 * maintaining some extra reserve beyond the bare minimum in
36762306a36Sopenharmony_ci	 * most cases. Note that for each entry in safe_prime_groups[],
36862306a36Sopenharmony_ci	 * the following holds for such N:
36962306a36Sopenharmony_ci	 * - N >= 256, in particular it is a multiple of 2^6 = 64
37062306a36Sopenharmony_ci	 *   bits and
37162306a36Sopenharmony_ci	 * - N < log2(q) + 1, i.e. N respects the upper bound.
37262306a36Sopenharmony_ci	 */
37362306a36Sopenharmony_ci	n = roundup_pow_of_two(2 * safe_prime->max_strength);
37462306a36Sopenharmony_ci	WARN_ON_ONCE(n & ((1u << 6) - 1));
37562306a36Sopenharmony_ci	n >>= 6; /* Convert N into units of u64. */
37662306a36Sopenharmony_ci
37762306a36Sopenharmony_ci	/*
37862306a36Sopenharmony_ci	 * Reserve one extra u64 to hold the extra random bits
37962306a36Sopenharmony_ci	 * required as per 5.6.1.1.3.
38062306a36Sopenharmony_ci	 */
38162306a36Sopenharmony_ci	oversampling_size = (n + 1) * sizeof(__be64);
38262306a36Sopenharmony_ci	key = kmalloc(oversampling_size, GFP_KERNEL);
38362306a36Sopenharmony_ci	if (!key)
38462306a36Sopenharmony_ci		return ERR_PTR(-ENOMEM);
38562306a36Sopenharmony_ci
38662306a36Sopenharmony_ci	/*
38762306a36Sopenharmony_ci	 * 5.6.1.1.3, step 3 (and implicitly step 4): obtain N + 64
38862306a36Sopenharmony_ci	 * random bits and interpret them as a big endian integer.
38962306a36Sopenharmony_ci	 */
39062306a36Sopenharmony_ci	err = -EFAULT;
39162306a36Sopenharmony_ci	if (crypto_get_default_rng())
39262306a36Sopenharmony_ci		goto out_err;
39362306a36Sopenharmony_ci
39462306a36Sopenharmony_ci	err = crypto_rng_get_bytes(crypto_default_rng, (u8 *)key,
39562306a36Sopenharmony_ci				   oversampling_size);
39662306a36Sopenharmony_ci	crypto_put_default_rng();
39762306a36Sopenharmony_ci	if (err)
39862306a36Sopenharmony_ci		goto out_err;
39962306a36Sopenharmony_ci
40062306a36Sopenharmony_ci	/*
40162306a36Sopenharmony_ci	 * 5.6.1.1.3, step 5 is implicit: 2^N < q and thus,
40262306a36Sopenharmony_ci	 * M = min(2^N, q) = 2^N.
40362306a36Sopenharmony_ci	 *
40462306a36Sopenharmony_ci	 * For step 6, calculate
40562306a36Sopenharmony_ci	 * key = (key[] mod (M - 1)) + 1 = (key[] mod (2^N - 1)) + 1.
40662306a36Sopenharmony_ci	 *
40762306a36Sopenharmony_ci	 * In order to avoid expensive divisions, note that
40862306a36Sopenharmony_ci	 * 2^N mod (2^N - 1) = 1 and thus, for any integer h,
40962306a36Sopenharmony_ci	 * 2^N * h mod (2^N - 1) = h mod (2^N - 1) always holds.
41062306a36Sopenharmony_ci	 * The big endian integer key[] composed of n + 1 64bit words
41162306a36Sopenharmony_ci	 * may be written as key[] = h * 2^N + l, with h = key[0]
41262306a36Sopenharmony_ci	 * representing the 64 most significant bits and l
41362306a36Sopenharmony_ci	 * corresponding to the remaining 2^N bits. With the remark
41462306a36Sopenharmony_ci	 * from above,
41562306a36Sopenharmony_ci	 * h * 2^N + l mod (2^N - 1) = l + h mod (2^N - 1).
41662306a36Sopenharmony_ci	 * As both, l and h are less than 2^N, their sum after
41762306a36Sopenharmony_ci	 * this first reduction is guaranteed to be <= 2^(N + 1) - 2.
41862306a36Sopenharmony_ci	 * Or equivalently, that their sum can again be written as
41962306a36Sopenharmony_ci	 * h' * 2^N + l' with h' now either zero or one and if one,
42062306a36Sopenharmony_ci	 * then l' <= 2^N - 2. Thus, all bits at positions >= N will
42162306a36Sopenharmony_ci	 * be zero after a second reduction:
42262306a36Sopenharmony_ci	 * h' * 2^N + l' mod (2^N - 1) = l' + h' mod (2^N - 1).
42362306a36Sopenharmony_ci	 * At this point, it is still possible that
42462306a36Sopenharmony_ci	 * l' + h' = 2^N - 1, i.e. that l' + h' mod (2^N - 1)
42562306a36Sopenharmony_ci	 * is zero. This condition will be detected below by means of
42662306a36Sopenharmony_ci	 * the final increment overflowing in this case.
42762306a36Sopenharmony_ci	 */
42862306a36Sopenharmony_ci	h = be64_to_cpu(key[0]);
42962306a36Sopenharmony_ci	h = __add_u64_to_be(key + 1, n, h);
43062306a36Sopenharmony_ci	h = __add_u64_to_be(key + 1, n, h);
43162306a36Sopenharmony_ci	WARN_ON_ONCE(h);
43262306a36Sopenharmony_ci
43362306a36Sopenharmony_ci	/* Increment to obtain the final result. */
43462306a36Sopenharmony_ci	o = __add_u64_to_be(key + 1, n, 1);
43562306a36Sopenharmony_ci	/*
43662306a36Sopenharmony_ci	 * The overflow bit o from the increment is either zero or
43762306a36Sopenharmony_ci	 * one. If zero, key[1:n] holds the final result in big-endian
43862306a36Sopenharmony_ci	 * order. If one, key[1:n] is zero now, but needs to be set to
43962306a36Sopenharmony_ci	 * one, c.f. above.
44062306a36Sopenharmony_ci	 */
44162306a36Sopenharmony_ci	if (o)
44262306a36Sopenharmony_ci		key[n] = cpu_to_be64(1);
44362306a36Sopenharmony_ci
44462306a36Sopenharmony_ci	/* n is in units of u64, convert to bytes. */
44562306a36Sopenharmony_ci	*key_size = n << 3;
44662306a36Sopenharmony_ci	/* Strip the leading extra __be64, which is (virtually) zero by now. */
44762306a36Sopenharmony_ci	memmove(key, &key[1], *key_size);
44862306a36Sopenharmony_ci
44962306a36Sopenharmony_ci	return key;
45062306a36Sopenharmony_ci
45162306a36Sopenharmony_ciout_err:
45262306a36Sopenharmony_ci	kfree_sensitive(key);
45362306a36Sopenharmony_ci	return ERR_PTR(err);
45462306a36Sopenharmony_ci}
45562306a36Sopenharmony_ci
45662306a36Sopenharmony_cistatic int dh_safe_prime_set_secret(struct crypto_kpp *tfm, const void *buffer,
45762306a36Sopenharmony_ci				    unsigned int len)
45862306a36Sopenharmony_ci{
45962306a36Sopenharmony_ci	struct dh_safe_prime_instance_ctx *inst_ctx =
46062306a36Sopenharmony_ci		dh_safe_prime_instance_ctx(tfm);
46162306a36Sopenharmony_ci	struct dh_safe_prime_tfm_ctx *tfm_ctx = kpp_tfm_ctx(tfm);
46262306a36Sopenharmony_ci	struct dh params = {};
46362306a36Sopenharmony_ci	void *buf = NULL, *key = NULL;
46462306a36Sopenharmony_ci	unsigned int buf_size;
46562306a36Sopenharmony_ci	int err;
46662306a36Sopenharmony_ci
46762306a36Sopenharmony_ci	if (buffer) {
46862306a36Sopenharmony_ci		err = __crypto_dh_decode_key(buffer, len, &params);
46962306a36Sopenharmony_ci		if (err)
47062306a36Sopenharmony_ci			return err;
47162306a36Sopenharmony_ci		if (params.p_size || params.g_size)
47262306a36Sopenharmony_ci			return -EINVAL;
47362306a36Sopenharmony_ci	}
47462306a36Sopenharmony_ci
47562306a36Sopenharmony_ci	params.p = inst_ctx->safe_prime->p;
47662306a36Sopenharmony_ci	params.p_size = inst_ctx->safe_prime->p_size;
47762306a36Sopenharmony_ci	params.g = safe_prime_g;
47862306a36Sopenharmony_ci	params.g_size = sizeof(safe_prime_g);
47962306a36Sopenharmony_ci
48062306a36Sopenharmony_ci	if (!params.key_size) {
48162306a36Sopenharmony_ci		key = dh_safe_prime_gen_privkey(inst_ctx->safe_prime,
48262306a36Sopenharmony_ci						&params.key_size);
48362306a36Sopenharmony_ci		if (IS_ERR(key))
48462306a36Sopenharmony_ci			return PTR_ERR(key);
48562306a36Sopenharmony_ci		params.key = key;
48662306a36Sopenharmony_ci	}
48762306a36Sopenharmony_ci
48862306a36Sopenharmony_ci	buf_size = crypto_dh_key_len(&params);
48962306a36Sopenharmony_ci	buf = kmalloc(buf_size, GFP_KERNEL);
49062306a36Sopenharmony_ci	if (!buf) {
49162306a36Sopenharmony_ci		err = -ENOMEM;
49262306a36Sopenharmony_ci		goto out;
49362306a36Sopenharmony_ci	}
49462306a36Sopenharmony_ci
49562306a36Sopenharmony_ci	err = crypto_dh_encode_key(buf, buf_size, &params);
49662306a36Sopenharmony_ci	if (err)
49762306a36Sopenharmony_ci		goto out;
49862306a36Sopenharmony_ci
49962306a36Sopenharmony_ci	err = crypto_kpp_set_secret(tfm_ctx->dh_tfm, buf, buf_size);
50062306a36Sopenharmony_ciout:
50162306a36Sopenharmony_ci	kfree_sensitive(buf);
50262306a36Sopenharmony_ci	kfree_sensitive(key);
50362306a36Sopenharmony_ci	return err;
50462306a36Sopenharmony_ci}
50562306a36Sopenharmony_ci
50662306a36Sopenharmony_cistatic void dh_safe_prime_complete_req(void *data, int err)
50762306a36Sopenharmony_ci{
50862306a36Sopenharmony_ci	struct kpp_request *req = data;
50962306a36Sopenharmony_ci
51062306a36Sopenharmony_ci	kpp_request_complete(req, err);
51162306a36Sopenharmony_ci}
51262306a36Sopenharmony_ci
51362306a36Sopenharmony_cistatic struct kpp_request *dh_safe_prime_prepare_dh_req(struct kpp_request *req)
51462306a36Sopenharmony_ci{
51562306a36Sopenharmony_ci	struct dh_safe_prime_tfm_ctx *tfm_ctx =
51662306a36Sopenharmony_ci		kpp_tfm_ctx(crypto_kpp_reqtfm(req));
51762306a36Sopenharmony_ci	struct kpp_request *dh_req = kpp_request_ctx(req);
51862306a36Sopenharmony_ci
51962306a36Sopenharmony_ci	kpp_request_set_tfm(dh_req, tfm_ctx->dh_tfm);
52062306a36Sopenharmony_ci	kpp_request_set_callback(dh_req, req->base.flags,
52162306a36Sopenharmony_ci				 dh_safe_prime_complete_req, req);
52262306a36Sopenharmony_ci
52362306a36Sopenharmony_ci	kpp_request_set_input(dh_req, req->src, req->src_len);
52462306a36Sopenharmony_ci	kpp_request_set_output(dh_req, req->dst, req->dst_len);
52562306a36Sopenharmony_ci
52662306a36Sopenharmony_ci	return dh_req;
52762306a36Sopenharmony_ci}
52862306a36Sopenharmony_ci
52962306a36Sopenharmony_cistatic int dh_safe_prime_generate_public_key(struct kpp_request *req)
53062306a36Sopenharmony_ci{
53162306a36Sopenharmony_ci	struct kpp_request *dh_req = dh_safe_prime_prepare_dh_req(req);
53262306a36Sopenharmony_ci
53362306a36Sopenharmony_ci	return crypto_kpp_generate_public_key(dh_req);
53462306a36Sopenharmony_ci}
53562306a36Sopenharmony_ci
53662306a36Sopenharmony_cistatic int dh_safe_prime_compute_shared_secret(struct kpp_request *req)
53762306a36Sopenharmony_ci{
53862306a36Sopenharmony_ci	struct kpp_request *dh_req = dh_safe_prime_prepare_dh_req(req);
53962306a36Sopenharmony_ci
54062306a36Sopenharmony_ci	return crypto_kpp_compute_shared_secret(dh_req);
54162306a36Sopenharmony_ci}
54262306a36Sopenharmony_ci
54362306a36Sopenharmony_cistatic unsigned int dh_safe_prime_max_size(struct crypto_kpp *tfm)
54462306a36Sopenharmony_ci{
54562306a36Sopenharmony_ci	struct dh_safe_prime_tfm_ctx *tfm_ctx = kpp_tfm_ctx(tfm);
54662306a36Sopenharmony_ci
54762306a36Sopenharmony_ci	return crypto_kpp_maxsize(tfm_ctx->dh_tfm);
54862306a36Sopenharmony_ci}
54962306a36Sopenharmony_ci
55062306a36Sopenharmony_cistatic int __maybe_unused __dh_safe_prime_create(
55162306a36Sopenharmony_ci	struct crypto_template *tmpl, struct rtattr **tb,
55262306a36Sopenharmony_ci	const struct dh_safe_prime *safe_prime)
55362306a36Sopenharmony_ci{
55462306a36Sopenharmony_ci	struct kpp_instance *inst;
55562306a36Sopenharmony_ci	struct dh_safe_prime_instance_ctx *ctx;
55662306a36Sopenharmony_ci	const char *dh_name;
55762306a36Sopenharmony_ci	struct kpp_alg *dh_alg;
55862306a36Sopenharmony_ci	u32 mask;
55962306a36Sopenharmony_ci	int err;
56062306a36Sopenharmony_ci
56162306a36Sopenharmony_ci	err = crypto_check_attr_type(tb, CRYPTO_ALG_TYPE_KPP, &mask);
56262306a36Sopenharmony_ci	if (err)
56362306a36Sopenharmony_ci		return err;
56462306a36Sopenharmony_ci
56562306a36Sopenharmony_ci	dh_name = crypto_attr_alg_name(tb[1]);
56662306a36Sopenharmony_ci	if (IS_ERR(dh_name))
56762306a36Sopenharmony_ci		return PTR_ERR(dh_name);
56862306a36Sopenharmony_ci
56962306a36Sopenharmony_ci	inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL);
57062306a36Sopenharmony_ci	if (!inst)
57162306a36Sopenharmony_ci		return -ENOMEM;
57262306a36Sopenharmony_ci
57362306a36Sopenharmony_ci	ctx = kpp_instance_ctx(inst);
57462306a36Sopenharmony_ci
57562306a36Sopenharmony_ci	err = crypto_grab_kpp(&ctx->dh_spawn, kpp_crypto_instance(inst),
57662306a36Sopenharmony_ci			      dh_name, 0, mask);
57762306a36Sopenharmony_ci	if (err)
57862306a36Sopenharmony_ci		goto err_free_inst;
57962306a36Sopenharmony_ci
58062306a36Sopenharmony_ci	err = -EINVAL;
58162306a36Sopenharmony_ci	dh_alg = crypto_spawn_kpp_alg(&ctx->dh_spawn);
58262306a36Sopenharmony_ci	if (strcmp(dh_alg->base.cra_name, "dh"))
58362306a36Sopenharmony_ci		goto err_free_inst;
58462306a36Sopenharmony_ci
58562306a36Sopenharmony_ci	ctx->safe_prime = safe_prime;
58662306a36Sopenharmony_ci
58762306a36Sopenharmony_ci	err = crypto_inst_setname(kpp_crypto_instance(inst),
58862306a36Sopenharmony_ci				  tmpl->name, &dh_alg->base);
58962306a36Sopenharmony_ci	if (err)
59062306a36Sopenharmony_ci		goto err_free_inst;
59162306a36Sopenharmony_ci
59262306a36Sopenharmony_ci	inst->alg.set_secret = dh_safe_prime_set_secret;
59362306a36Sopenharmony_ci	inst->alg.generate_public_key = dh_safe_prime_generate_public_key;
59462306a36Sopenharmony_ci	inst->alg.compute_shared_secret = dh_safe_prime_compute_shared_secret;
59562306a36Sopenharmony_ci	inst->alg.max_size = dh_safe_prime_max_size;
59662306a36Sopenharmony_ci	inst->alg.init = dh_safe_prime_init_tfm;
59762306a36Sopenharmony_ci	inst->alg.exit = dh_safe_prime_exit_tfm;
59862306a36Sopenharmony_ci	inst->alg.base.cra_priority = dh_alg->base.cra_priority;
59962306a36Sopenharmony_ci	inst->alg.base.cra_module = THIS_MODULE;
60062306a36Sopenharmony_ci	inst->alg.base.cra_ctxsize = sizeof(struct dh_safe_prime_tfm_ctx);
60162306a36Sopenharmony_ci
60262306a36Sopenharmony_ci	inst->free = dh_safe_prime_free_instance;
60362306a36Sopenharmony_ci
60462306a36Sopenharmony_ci	err = kpp_register_instance(tmpl, inst);
60562306a36Sopenharmony_ci	if (err)
60662306a36Sopenharmony_ci		goto err_free_inst;
60762306a36Sopenharmony_ci
60862306a36Sopenharmony_ci	return 0;
60962306a36Sopenharmony_ci
61062306a36Sopenharmony_cierr_free_inst:
61162306a36Sopenharmony_ci	dh_safe_prime_free_instance(inst);
61262306a36Sopenharmony_ci
61362306a36Sopenharmony_ci	return err;
61462306a36Sopenharmony_ci}
61562306a36Sopenharmony_ci
61662306a36Sopenharmony_ci#ifdef CONFIG_CRYPTO_DH_RFC7919_GROUPS
61762306a36Sopenharmony_ci
61862306a36Sopenharmony_cistatic const struct dh_safe_prime ffdhe2048_prime = {
61962306a36Sopenharmony_ci	.max_strength = 112,
62062306a36Sopenharmony_ci	.p_size = 256,
62162306a36Sopenharmony_ci	.p =
62262306a36Sopenharmony_ci	"\xff\xff\xff\xff\xff\xff\xff\xff\xad\xf8\x54\x58\xa2\xbb\x4a\x9a"
62362306a36Sopenharmony_ci	"\xaf\xdc\x56\x20\x27\x3d\x3c\xf1\xd8\xb9\xc5\x83\xce\x2d\x36\x95"
62462306a36Sopenharmony_ci	"\xa9\xe1\x36\x41\x14\x64\x33\xfb\xcc\x93\x9d\xce\x24\x9b\x3e\xf9"
62562306a36Sopenharmony_ci	"\x7d\x2f\xe3\x63\x63\x0c\x75\xd8\xf6\x81\xb2\x02\xae\xc4\x61\x7a"
62662306a36Sopenharmony_ci	"\xd3\xdf\x1e\xd5\xd5\xfd\x65\x61\x24\x33\xf5\x1f\x5f\x06\x6e\xd0"
62762306a36Sopenharmony_ci	"\x85\x63\x65\x55\x3d\xed\x1a\xf3\xb5\x57\x13\x5e\x7f\x57\xc9\x35"
62862306a36Sopenharmony_ci	"\x98\x4f\x0c\x70\xe0\xe6\x8b\x77\xe2\xa6\x89\xda\xf3\xef\xe8\x72"
62962306a36Sopenharmony_ci	"\x1d\xf1\x58\xa1\x36\xad\xe7\x35\x30\xac\xca\x4f\x48\x3a\x79\x7a"
63062306a36Sopenharmony_ci	"\xbc\x0a\xb1\x82\xb3\x24\xfb\x61\xd1\x08\xa9\x4b\xb2\xc8\xe3\xfb"
63162306a36Sopenharmony_ci	"\xb9\x6a\xda\xb7\x60\xd7\xf4\x68\x1d\x4f\x42\xa3\xde\x39\x4d\xf4"
63262306a36Sopenharmony_ci	"\xae\x56\xed\xe7\x63\x72\xbb\x19\x0b\x07\xa7\xc8\xee\x0a\x6d\x70"
63362306a36Sopenharmony_ci	"\x9e\x02\xfc\xe1\xcd\xf7\xe2\xec\xc0\x34\x04\xcd\x28\x34\x2f\x61"
63462306a36Sopenharmony_ci	"\x91\x72\xfe\x9c\xe9\x85\x83\xff\x8e\x4f\x12\x32\xee\xf2\x81\x83"
63562306a36Sopenharmony_ci	"\xc3\xfe\x3b\x1b\x4c\x6f\xad\x73\x3b\xb5\xfc\xbc\x2e\xc2\x20\x05"
63662306a36Sopenharmony_ci	"\xc5\x8e\xf1\x83\x7d\x16\x83\xb2\xc6\xf3\x4a\x26\xc1\xb2\xef\xfa"
63762306a36Sopenharmony_ci	"\x88\x6b\x42\x38\x61\x28\x5c\x97\xff\xff\xff\xff\xff\xff\xff\xff",
63862306a36Sopenharmony_ci};
63962306a36Sopenharmony_ci
64062306a36Sopenharmony_cistatic const struct dh_safe_prime ffdhe3072_prime = {
64162306a36Sopenharmony_ci	.max_strength = 128,
64262306a36Sopenharmony_ci	.p_size = 384,
64362306a36Sopenharmony_ci	.p =
64462306a36Sopenharmony_ci	"\xff\xff\xff\xff\xff\xff\xff\xff\xad\xf8\x54\x58\xa2\xbb\x4a\x9a"
64562306a36Sopenharmony_ci	"\xaf\xdc\x56\x20\x27\x3d\x3c\xf1\xd8\xb9\xc5\x83\xce\x2d\x36\x95"
64662306a36Sopenharmony_ci	"\xa9\xe1\x36\x41\x14\x64\x33\xfb\xcc\x93\x9d\xce\x24\x9b\x3e\xf9"
64762306a36Sopenharmony_ci	"\x7d\x2f\xe3\x63\x63\x0c\x75\xd8\xf6\x81\xb2\x02\xae\xc4\x61\x7a"
64862306a36Sopenharmony_ci	"\xd3\xdf\x1e\xd5\xd5\xfd\x65\x61\x24\x33\xf5\x1f\x5f\x06\x6e\xd0"
64962306a36Sopenharmony_ci	"\x85\x63\x65\x55\x3d\xed\x1a\xf3\xb5\x57\x13\x5e\x7f\x57\xc9\x35"
65062306a36Sopenharmony_ci	"\x98\x4f\x0c\x70\xe0\xe6\x8b\x77\xe2\xa6\x89\xda\xf3\xef\xe8\x72"
65162306a36Sopenharmony_ci	"\x1d\xf1\x58\xa1\x36\xad\xe7\x35\x30\xac\xca\x4f\x48\x3a\x79\x7a"
65262306a36Sopenharmony_ci	"\xbc\x0a\xb1\x82\xb3\x24\xfb\x61\xd1\x08\xa9\x4b\xb2\xc8\xe3\xfb"
65362306a36Sopenharmony_ci	"\xb9\x6a\xda\xb7\x60\xd7\xf4\x68\x1d\x4f\x42\xa3\xde\x39\x4d\xf4"
65462306a36Sopenharmony_ci	"\xae\x56\xed\xe7\x63\x72\xbb\x19\x0b\x07\xa7\xc8\xee\x0a\x6d\x70"
65562306a36Sopenharmony_ci	"\x9e\x02\xfc\xe1\xcd\xf7\xe2\xec\xc0\x34\x04\xcd\x28\x34\x2f\x61"
65662306a36Sopenharmony_ci	"\x91\x72\xfe\x9c\xe9\x85\x83\xff\x8e\x4f\x12\x32\xee\xf2\x81\x83"
65762306a36Sopenharmony_ci	"\xc3\xfe\x3b\x1b\x4c\x6f\xad\x73\x3b\xb5\xfc\xbc\x2e\xc2\x20\x05"
65862306a36Sopenharmony_ci	"\xc5\x8e\xf1\x83\x7d\x16\x83\xb2\xc6\xf3\x4a\x26\xc1\xb2\xef\xfa"
65962306a36Sopenharmony_ci	"\x88\x6b\x42\x38\x61\x1f\xcf\xdc\xde\x35\x5b\x3b\x65\x19\x03\x5b"
66062306a36Sopenharmony_ci	"\xbc\x34\xf4\xde\xf9\x9c\x02\x38\x61\xb4\x6f\xc9\xd6\xe6\xc9\x07"
66162306a36Sopenharmony_ci	"\x7a\xd9\x1d\x26\x91\xf7\xf7\xee\x59\x8c\xb0\xfa\xc1\x86\xd9\x1c"
66262306a36Sopenharmony_ci	"\xae\xfe\x13\x09\x85\x13\x92\x70\xb4\x13\x0c\x93\xbc\x43\x79\x44"
66362306a36Sopenharmony_ci	"\xf4\xfd\x44\x52\xe2\xd7\x4d\xd3\x64\xf2\xe2\x1e\x71\xf5\x4b\xff"
66462306a36Sopenharmony_ci	"\x5c\xae\x82\xab\x9c\x9d\xf6\x9e\xe8\x6d\x2b\xc5\x22\x36\x3a\x0d"
66562306a36Sopenharmony_ci	"\xab\xc5\x21\x97\x9b\x0d\xea\xda\x1d\xbf\x9a\x42\xd5\xc4\x48\x4e"
66662306a36Sopenharmony_ci	"\x0a\xbc\xd0\x6b\xfa\x53\xdd\xef\x3c\x1b\x20\xee\x3f\xd5\x9d\x7c"
66762306a36Sopenharmony_ci	"\x25\xe4\x1d\x2b\x66\xc6\x2e\x37\xff\xff\xff\xff\xff\xff\xff\xff",
66862306a36Sopenharmony_ci};
66962306a36Sopenharmony_ci
67062306a36Sopenharmony_cistatic const struct dh_safe_prime ffdhe4096_prime = {
67162306a36Sopenharmony_ci	.max_strength = 152,
67262306a36Sopenharmony_ci	.p_size = 512,
67362306a36Sopenharmony_ci	.p =
67462306a36Sopenharmony_ci	"\xff\xff\xff\xff\xff\xff\xff\xff\xad\xf8\x54\x58\xa2\xbb\x4a\x9a"
67562306a36Sopenharmony_ci	"\xaf\xdc\x56\x20\x27\x3d\x3c\xf1\xd8\xb9\xc5\x83\xce\x2d\x36\x95"
67662306a36Sopenharmony_ci	"\xa9\xe1\x36\x41\x14\x64\x33\xfb\xcc\x93\x9d\xce\x24\x9b\x3e\xf9"
67762306a36Sopenharmony_ci	"\x7d\x2f\xe3\x63\x63\x0c\x75\xd8\xf6\x81\xb2\x02\xae\xc4\x61\x7a"
67862306a36Sopenharmony_ci	"\xd3\xdf\x1e\xd5\xd5\xfd\x65\x61\x24\x33\xf5\x1f\x5f\x06\x6e\xd0"
67962306a36Sopenharmony_ci	"\x85\x63\x65\x55\x3d\xed\x1a\xf3\xb5\x57\x13\x5e\x7f\x57\xc9\x35"
68062306a36Sopenharmony_ci	"\x98\x4f\x0c\x70\xe0\xe6\x8b\x77\xe2\xa6\x89\xda\xf3\xef\xe8\x72"
68162306a36Sopenharmony_ci	"\x1d\xf1\x58\xa1\x36\xad\xe7\x35\x30\xac\xca\x4f\x48\x3a\x79\x7a"
68262306a36Sopenharmony_ci	"\xbc\x0a\xb1\x82\xb3\x24\xfb\x61\xd1\x08\xa9\x4b\xb2\xc8\xe3\xfb"
68362306a36Sopenharmony_ci	"\xb9\x6a\xda\xb7\x60\xd7\xf4\x68\x1d\x4f\x42\xa3\xde\x39\x4d\xf4"
68462306a36Sopenharmony_ci	"\xae\x56\xed\xe7\x63\x72\xbb\x19\x0b\x07\xa7\xc8\xee\x0a\x6d\x70"
68562306a36Sopenharmony_ci	"\x9e\x02\xfc\xe1\xcd\xf7\xe2\xec\xc0\x34\x04\xcd\x28\x34\x2f\x61"
68662306a36Sopenharmony_ci	"\x91\x72\xfe\x9c\xe9\x85\x83\xff\x8e\x4f\x12\x32\xee\xf2\x81\x83"
68762306a36Sopenharmony_ci	"\xc3\xfe\x3b\x1b\x4c\x6f\xad\x73\x3b\xb5\xfc\xbc\x2e\xc2\x20\x05"
68862306a36Sopenharmony_ci	"\xc5\x8e\xf1\x83\x7d\x16\x83\xb2\xc6\xf3\x4a\x26\xc1\xb2\xef\xfa"
68962306a36Sopenharmony_ci	"\x88\x6b\x42\x38\x61\x1f\xcf\xdc\xde\x35\x5b\x3b\x65\x19\x03\x5b"
69062306a36Sopenharmony_ci	"\xbc\x34\xf4\xde\xf9\x9c\x02\x38\x61\xb4\x6f\xc9\xd6\xe6\xc9\x07"
69162306a36Sopenharmony_ci	"\x7a\xd9\x1d\x26\x91\xf7\xf7\xee\x59\x8c\xb0\xfa\xc1\x86\xd9\x1c"
69262306a36Sopenharmony_ci	"\xae\xfe\x13\x09\x85\x13\x92\x70\xb4\x13\x0c\x93\xbc\x43\x79\x44"
69362306a36Sopenharmony_ci	"\xf4\xfd\x44\x52\xe2\xd7\x4d\xd3\x64\xf2\xe2\x1e\x71\xf5\x4b\xff"
69462306a36Sopenharmony_ci	"\x5c\xae\x82\xab\x9c\x9d\xf6\x9e\xe8\x6d\x2b\xc5\x22\x36\x3a\x0d"
69562306a36Sopenharmony_ci	"\xab\xc5\x21\x97\x9b\x0d\xea\xda\x1d\xbf\x9a\x42\xd5\xc4\x48\x4e"
69662306a36Sopenharmony_ci	"\x0a\xbc\xd0\x6b\xfa\x53\xdd\xef\x3c\x1b\x20\xee\x3f\xd5\x9d\x7c"
69762306a36Sopenharmony_ci	"\x25\xe4\x1d\x2b\x66\x9e\x1e\xf1\x6e\x6f\x52\xc3\x16\x4d\xf4\xfb"
69862306a36Sopenharmony_ci	"\x79\x30\xe9\xe4\xe5\x88\x57\xb6\xac\x7d\x5f\x42\xd6\x9f\x6d\x18"
69962306a36Sopenharmony_ci	"\x77\x63\xcf\x1d\x55\x03\x40\x04\x87\xf5\x5b\xa5\x7e\x31\xcc\x7a"
70062306a36Sopenharmony_ci	"\x71\x35\xc8\x86\xef\xb4\x31\x8a\xed\x6a\x1e\x01\x2d\x9e\x68\x32"
70162306a36Sopenharmony_ci	"\xa9\x07\x60\x0a\x91\x81\x30\xc4\x6d\xc7\x78\xf9\x71\xad\x00\x38"
70262306a36Sopenharmony_ci	"\x09\x29\x99\xa3\x33\xcb\x8b\x7a\x1a\x1d\xb9\x3d\x71\x40\x00\x3c"
70362306a36Sopenharmony_ci	"\x2a\x4e\xce\xa9\xf9\x8d\x0a\xcc\x0a\x82\x91\xcd\xce\xc9\x7d\xcf"
70462306a36Sopenharmony_ci	"\x8e\xc9\xb5\x5a\x7f\x88\xa4\x6b\x4d\xb5\xa8\x51\xf4\x41\x82\xe1"
70562306a36Sopenharmony_ci	"\xc6\x8a\x00\x7e\x5e\x65\x5f\x6a\xff\xff\xff\xff\xff\xff\xff\xff",
70662306a36Sopenharmony_ci};
70762306a36Sopenharmony_ci
70862306a36Sopenharmony_cistatic const struct dh_safe_prime ffdhe6144_prime = {
70962306a36Sopenharmony_ci	.max_strength = 176,
71062306a36Sopenharmony_ci	.p_size = 768,
71162306a36Sopenharmony_ci	.p =
71262306a36Sopenharmony_ci	"\xff\xff\xff\xff\xff\xff\xff\xff\xad\xf8\x54\x58\xa2\xbb\x4a\x9a"
71362306a36Sopenharmony_ci	"\xaf\xdc\x56\x20\x27\x3d\x3c\xf1\xd8\xb9\xc5\x83\xce\x2d\x36\x95"
71462306a36Sopenharmony_ci	"\xa9\xe1\x36\x41\x14\x64\x33\xfb\xcc\x93\x9d\xce\x24\x9b\x3e\xf9"
71562306a36Sopenharmony_ci	"\x7d\x2f\xe3\x63\x63\x0c\x75\xd8\xf6\x81\xb2\x02\xae\xc4\x61\x7a"
71662306a36Sopenharmony_ci	"\xd3\xdf\x1e\xd5\xd5\xfd\x65\x61\x24\x33\xf5\x1f\x5f\x06\x6e\xd0"
71762306a36Sopenharmony_ci	"\x85\x63\x65\x55\x3d\xed\x1a\xf3\xb5\x57\x13\x5e\x7f\x57\xc9\x35"
71862306a36Sopenharmony_ci	"\x98\x4f\x0c\x70\xe0\xe6\x8b\x77\xe2\xa6\x89\xda\xf3\xef\xe8\x72"
71962306a36Sopenharmony_ci	"\x1d\xf1\x58\xa1\x36\xad\xe7\x35\x30\xac\xca\x4f\x48\x3a\x79\x7a"
72062306a36Sopenharmony_ci	"\xbc\x0a\xb1\x82\xb3\x24\xfb\x61\xd1\x08\xa9\x4b\xb2\xc8\xe3\xfb"
72162306a36Sopenharmony_ci	"\xb9\x6a\xda\xb7\x60\xd7\xf4\x68\x1d\x4f\x42\xa3\xde\x39\x4d\xf4"
72262306a36Sopenharmony_ci	"\xae\x56\xed\xe7\x63\x72\xbb\x19\x0b\x07\xa7\xc8\xee\x0a\x6d\x70"
72362306a36Sopenharmony_ci	"\x9e\x02\xfc\xe1\xcd\xf7\xe2\xec\xc0\x34\x04\xcd\x28\x34\x2f\x61"
72462306a36Sopenharmony_ci	"\x91\x72\xfe\x9c\xe9\x85\x83\xff\x8e\x4f\x12\x32\xee\xf2\x81\x83"
72562306a36Sopenharmony_ci	"\xc3\xfe\x3b\x1b\x4c\x6f\xad\x73\x3b\xb5\xfc\xbc\x2e\xc2\x20\x05"
72662306a36Sopenharmony_ci	"\xc5\x8e\xf1\x83\x7d\x16\x83\xb2\xc6\xf3\x4a\x26\xc1\xb2\xef\xfa"
72762306a36Sopenharmony_ci	"\x88\x6b\x42\x38\x61\x1f\xcf\xdc\xde\x35\x5b\x3b\x65\x19\x03\x5b"
72862306a36Sopenharmony_ci	"\xbc\x34\xf4\xde\xf9\x9c\x02\x38\x61\xb4\x6f\xc9\xd6\xe6\xc9\x07"
72962306a36Sopenharmony_ci	"\x7a\xd9\x1d\x26\x91\xf7\xf7\xee\x59\x8c\xb0\xfa\xc1\x86\xd9\x1c"
73062306a36Sopenharmony_ci	"\xae\xfe\x13\x09\x85\x13\x92\x70\xb4\x13\x0c\x93\xbc\x43\x79\x44"
73162306a36Sopenharmony_ci	"\xf4\xfd\x44\x52\xe2\xd7\x4d\xd3\x64\xf2\xe2\x1e\x71\xf5\x4b\xff"
73262306a36Sopenharmony_ci	"\x5c\xae\x82\xab\x9c\x9d\xf6\x9e\xe8\x6d\x2b\xc5\x22\x36\x3a\x0d"
73362306a36Sopenharmony_ci	"\xab\xc5\x21\x97\x9b\x0d\xea\xda\x1d\xbf\x9a\x42\xd5\xc4\x48\x4e"
73462306a36Sopenharmony_ci	"\x0a\xbc\xd0\x6b\xfa\x53\xdd\xef\x3c\x1b\x20\xee\x3f\xd5\x9d\x7c"
73562306a36Sopenharmony_ci	"\x25\xe4\x1d\x2b\x66\x9e\x1e\xf1\x6e\x6f\x52\xc3\x16\x4d\xf4\xfb"
73662306a36Sopenharmony_ci	"\x79\x30\xe9\xe4\xe5\x88\x57\xb6\xac\x7d\x5f\x42\xd6\x9f\x6d\x18"
73762306a36Sopenharmony_ci	"\x77\x63\xcf\x1d\x55\x03\x40\x04\x87\xf5\x5b\xa5\x7e\x31\xcc\x7a"
73862306a36Sopenharmony_ci	"\x71\x35\xc8\x86\xef\xb4\x31\x8a\xed\x6a\x1e\x01\x2d\x9e\x68\x32"
73962306a36Sopenharmony_ci	"\xa9\x07\x60\x0a\x91\x81\x30\xc4\x6d\xc7\x78\xf9\x71\xad\x00\x38"
74062306a36Sopenharmony_ci	"\x09\x29\x99\xa3\x33\xcb\x8b\x7a\x1a\x1d\xb9\x3d\x71\x40\x00\x3c"
74162306a36Sopenharmony_ci	"\x2a\x4e\xce\xa9\xf9\x8d\x0a\xcc\x0a\x82\x91\xcd\xce\xc9\x7d\xcf"
74262306a36Sopenharmony_ci	"\x8e\xc9\xb5\x5a\x7f\x88\xa4\x6b\x4d\xb5\xa8\x51\xf4\x41\x82\xe1"
74362306a36Sopenharmony_ci	"\xc6\x8a\x00\x7e\x5e\x0d\xd9\x02\x0b\xfd\x64\xb6\x45\x03\x6c\x7a"
74462306a36Sopenharmony_ci	"\x4e\x67\x7d\x2c\x38\x53\x2a\x3a\x23\xba\x44\x42\xca\xf5\x3e\xa6"
74562306a36Sopenharmony_ci	"\x3b\xb4\x54\x32\x9b\x76\x24\xc8\x91\x7b\xdd\x64\xb1\xc0\xfd\x4c"
74662306a36Sopenharmony_ci	"\xb3\x8e\x8c\x33\x4c\x70\x1c\x3a\xcd\xad\x06\x57\xfc\xcf\xec\x71"
74762306a36Sopenharmony_ci	"\x9b\x1f\x5c\x3e\x4e\x46\x04\x1f\x38\x81\x47\xfb\x4c\xfd\xb4\x77"
74862306a36Sopenharmony_ci	"\xa5\x24\x71\xf7\xa9\xa9\x69\x10\xb8\x55\x32\x2e\xdb\x63\x40\xd8"
74962306a36Sopenharmony_ci	"\xa0\x0e\xf0\x92\x35\x05\x11\xe3\x0a\xbe\xc1\xff\xf9\xe3\xa2\x6e"
75062306a36Sopenharmony_ci	"\x7f\xb2\x9f\x8c\x18\x30\x23\xc3\x58\x7e\x38\xda\x00\x77\xd9\xb4"
75162306a36Sopenharmony_ci	"\x76\x3e\x4e\x4b\x94\xb2\xbb\xc1\x94\xc6\x65\x1e\x77\xca\xf9\x92"
75262306a36Sopenharmony_ci	"\xee\xaa\xc0\x23\x2a\x28\x1b\xf6\xb3\xa7\x39\xc1\x22\x61\x16\x82"
75362306a36Sopenharmony_ci	"\x0a\xe8\xdb\x58\x47\xa6\x7c\xbe\xf9\xc9\x09\x1b\x46\x2d\x53\x8c"
75462306a36Sopenharmony_ci	"\xd7\x2b\x03\x74\x6a\xe7\x7f\x5e\x62\x29\x2c\x31\x15\x62\xa8\x46"
75562306a36Sopenharmony_ci	"\x50\x5d\xc8\x2d\xb8\x54\x33\x8a\xe4\x9f\x52\x35\xc9\x5b\x91\x17"
75662306a36Sopenharmony_ci	"\x8c\xcf\x2d\xd5\xca\xce\xf4\x03\xec\x9d\x18\x10\xc6\x27\x2b\x04"
75762306a36Sopenharmony_ci	"\x5b\x3b\x71\xf9\xdc\x6b\x80\xd6\x3f\xdd\x4a\x8e\x9a\xdb\x1e\x69"
75862306a36Sopenharmony_ci	"\x62\xa6\x95\x26\xd4\x31\x61\xc1\xa4\x1d\x57\x0d\x79\x38\xda\xd4"
75962306a36Sopenharmony_ci	"\xa4\x0e\x32\x9c\xd0\xe4\x0e\x65\xff\xff\xff\xff\xff\xff\xff\xff",
76062306a36Sopenharmony_ci};
76162306a36Sopenharmony_ci
76262306a36Sopenharmony_cistatic const struct dh_safe_prime ffdhe8192_prime = {
76362306a36Sopenharmony_ci	.max_strength = 200,
76462306a36Sopenharmony_ci	.p_size = 1024,
76562306a36Sopenharmony_ci	.p =
76662306a36Sopenharmony_ci	"\xff\xff\xff\xff\xff\xff\xff\xff\xad\xf8\x54\x58\xa2\xbb\x4a\x9a"
76762306a36Sopenharmony_ci	"\xaf\xdc\x56\x20\x27\x3d\x3c\xf1\xd8\xb9\xc5\x83\xce\x2d\x36\x95"
76862306a36Sopenharmony_ci	"\xa9\xe1\x36\x41\x14\x64\x33\xfb\xcc\x93\x9d\xce\x24\x9b\x3e\xf9"
76962306a36Sopenharmony_ci	"\x7d\x2f\xe3\x63\x63\x0c\x75\xd8\xf6\x81\xb2\x02\xae\xc4\x61\x7a"
77062306a36Sopenharmony_ci	"\xd3\xdf\x1e\xd5\xd5\xfd\x65\x61\x24\x33\xf5\x1f\x5f\x06\x6e\xd0"
77162306a36Sopenharmony_ci	"\x85\x63\x65\x55\x3d\xed\x1a\xf3\xb5\x57\x13\x5e\x7f\x57\xc9\x35"
77262306a36Sopenharmony_ci	"\x98\x4f\x0c\x70\xe0\xe6\x8b\x77\xe2\xa6\x89\xda\xf3\xef\xe8\x72"
77362306a36Sopenharmony_ci	"\x1d\xf1\x58\xa1\x36\xad\xe7\x35\x30\xac\xca\x4f\x48\x3a\x79\x7a"
77462306a36Sopenharmony_ci	"\xbc\x0a\xb1\x82\xb3\x24\xfb\x61\xd1\x08\xa9\x4b\xb2\xc8\xe3\xfb"
77562306a36Sopenharmony_ci	"\xb9\x6a\xda\xb7\x60\xd7\xf4\x68\x1d\x4f\x42\xa3\xde\x39\x4d\xf4"
77662306a36Sopenharmony_ci	"\xae\x56\xed\xe7\x63\x72\xbb\x19\x0b\x07\xa7\xc8\xee\x0a\x6d\x70"
77762306a36Sopenharmony_ci	"\x9e\x02\xfc\xe1\xcd\xf7\xe2\xec\xc0\x34\x04\xcd\x28\x34\x2f\x61"
77862306a36Sopenharmony_ci	"\x91\x72\xfe\x9c\xe9\x85\x83\xff\x8e\x4f\x12\x32\xee\xf2\x81\x83"
77962306a36Sopenharmony_ci	"\xc3\xfe\x3b\x1b\x4c\x6f\xad\x73\x3b\xb5\xfc\xbc\x2e\xc2\x20\x05"
78062306a36Sopenharmony_ci	"\xc5\x8e\xf1\x83\x7d\x16\x83\xb2\xc6\xf3\x4a\x26\xc1\xb2\xef\xfa"
78162306a36Sopenharmony_ci	"\x88\x6b\x42\x38\x61\x1f\xcf\xdc\xde\x35\x5b\x3b\x65\x19\x03\x5b"
78262306a36Sopenharmony_ci	"\xbc\x34\xf4\xde\xf9\x9c\x02\x38\x61\xb4\x6f\xc9\xd6\xe6\xc9\x07"
78362306a36Sopenharmony_ci	"\x7a\xd9\x1d\x26\x91\xf7\xf7\xee\x59\x8c\xb0\xfa\xc1\x86\xd9\x1c"
78462306a36Sopenharmony_ci	"\xae\xfe\x13\x09\x85\x13\x92\x70\xb4\x13\x0c\x93\xbc\x43\x79\x44"
78562306a36Sopenharmony_ci	"\xf4\xfd\x44\x52\xe2\xd7\x4d\xd3\x64\xf2\xe2\x1e\x71\xf5\x4b\xff"
78662306a36Sopenharmony_ci	"\x5c\xae\x82\xab\x9c\x9d\xf6\x9e\xe8\x6d\x2b\xc5\x22\x36\x3a\x0d"
78762306a36Sopenharmony_ci	"\xab\xc5\x21\x97\x9b\x0d\xea\xda\x1d\xbf\x9a\x42\xd5\xc4\x48\x4e"
78862306a36Sopenharmony_ci	"\x0a\xbc\xd0\x6b\xfa\x53\xdd\xef\x3c\x1b\x20\xee\x3f\xd5\x9d\x7c"
78962306a36Sopenharmony_ci	"\x25\xe4\x1d\x2b\x66\x9e\x1e\xf1\x6e\x6f\x52\xc3\x16\x4d\xf4\xfb"
79062306a36Sopenharmony_ci	"\x79\x30\xe9\xe4\xe5\x88\x57\xb6\xac\x7d\x5f\x42\xd6\x9f\x6d\x18"
79162306a36Sopenharmony_ci	"\x77\x63\xcf\x1d\x55\x03\x40\x04\x87\xf5\x5b\xa5\x7e\x31\xcc\x7a"
79262306a36Sopenharmony_ci	"\x71\x35\xc8\x86\xef\xb4\x31\x8a\xed\x6a\x1e\x01\x2d\x9e\x68\x32"
79362306a36Sopenharmony_ci	"\xa9\x07\x60\x0a\x91\x81\x30\xc4\x6d\xc7\x78\xf9\x71\xad\x00\x38"
79462306a36Sopenharmony_ci	"\x09\x29\x99\xa3\x33\xcb\x8b\x7a\x1a\x1d\xb9\x3d\x71\x40\x00\x3c"
79562306a36Sopenharmony_ci	"\x2a\x4e\xce\xa9\xf9\x8d\x0a\xcc\x0a\x82\x91\xcd\xce\xc9\x7d\xcf"
79662306a36Sopenharmony_ci	"\x8e\xc9\xb5\x5a\x7f\x88\xa4\x6b\x4d\xb5\xa8\x51\xf4\x41\x82\xe1"
79762306a36Sopenharmony_ci	"\xc6\x8a\x00\x7e\x5e\x0d\xd9\x02\x0b\xfd\x64\xb6\x45\x03\x6c\x7a"
79862306a36Sopenharmony_ci	"\x4e\x67\x7d\x2c\x38\x53\x2a\x3a\x23\xba\x44\x42\xca\xf5\x3e\xa6"
79962306a36Sopenharmony_ci	"\x3b\xb4\x54\x32\x9b\x76\x24\xc8\x91\x7b\xdd\x64\xb1\xc0\xfd\x4c"
80062306a36Sopenharmony_ci	"\xb3\x8e\x8c\x33\x4c\x70\x1c\x3a\xcd\xad\x06\x57\xfc\xcf\xec\x71"
80162306a36Sopenharmony_ci	"\x9b\x1f\x5c\x3e\x4e\x46\x04\x1f\x38\x81\x47\xfb\x4c\xfd\xb4\x77"
80262306a36Sopenharmony_ci	"\xa5\x24\x71\xf7\xa9\xa9\x69\x10\xb8\x55\x32\x2e\xdb\x63\x40\xd8"
80362306a36Sopenharmony_ci	"\xa0\x0e\xf0\x92\x35\x05\x11\xe3\x0a\xbe\xc1\xff\xf9\xe3\xa2\x6e"
80462306a36Sopenharmony_ci	"\x7f\xb2\x9f\x8c\x18\x30\x23\xc3\x58\x7e\x38\xda\x00\x77\xd9\xb4"
80562306a36Sopenharmony_ci	"\x76\x3e\x4e\x4b\x94\xb2\xbb\xc1\x94\xc6\x65\x1e\x77\xca\xf9\x92"
80662306a36Sopenharmony_ci	"\xee\xaa\xc0\x23\x2a\x28\x1b\xf6\xb3\xa7\x39\xc1\x22\x61\x16\x82"
80762306a36Sopenharmony_ci	"\x0a\xe8\xdb\x58\x47\xa6\x7c\xbe\xf9\xc9\x09\x1b\x46\x2d\x53\x8c"
80862306a36Sopenharmony_ci	"\xd7\x2b\x03\x74\x6a\xe7\x7f\x5e\x62\x29\x2c\x31\x15\x62\xa8\x46"
80962306a36Sopenharmony_ci	"\x50\x5d\xc8\x2d\xb8\x54\x33\x8a\xe4\x9f\x52\x35\xc9\x5b\x91\x17"
81062306a36Sopenharmony_ci	"\x8c\xcf\x2d\xd5\xca\xce\xf4\x03\xec\x9d\x18\x10\xc6\x27\x2b\x04"
81162306a36Sopenharmony_ci	"\x5b\x3b\x71\xf9\xdc\x6b\x80\xd6\x3f\xdd\x4a\x8e\x9a\xdb\x1e\x69"
81262306a36Sopenharmony_ci	"\x62\xa6\x95\x26\xd4\x31\x61\xc1\xa4\x1d\x57\x0d\x79\x38\xda\xd4"
81362306a36Sopenharmony_ci	"\xa4\x0e\x32\x9c\xcf\xf4\x6a\xaa\x36\xad\x00\x4c\xf6\x00\xc8\x38"
81462306a36Sopenharmony_ci	"\x1e\x42\x5a\x31\xd9\x51\xae\x64\xfd\xb2\x3f\xce\xc9\x50\x9d\x43"
81562306a36Sopenharmony_ci	"\x68\x7f\xeb\x69\xed\xd1\xcc\x5e\x0b\x8c\xc3\xbd\xf6\x4b\x10\xef"
81662306a36Sopenharmony_ci	"\x86\xb6\x31\x42\xa3\xab\x88\x29\x55\x5b\x2f\x74\x7c\x93\x26\x65"
81762306a36Sopenharmony_ci	"\xcb\x2c\x0f\x1c\xc0\x1b\xd7\x02\x29\x38\x88\x39\xd2\xaf\x05\xe4"
81862306a36Sopenharmony_ci	"\x54\x50\x4a\xc7\x8b\x75\x82\x82\x28\x46\xc0\xba\x35\xc3\x5f\x5c"
81962306a36Sopenharmony_ci	"\x59\x16\x0c\xc0\x46\xfd\x82\x51\x54\x1f\xc6\x8c\x9c\x86\xb0\x22"
82062306a36Sopenharmony_ci	"\xbb\x70\x99\x87\x6a\x46\x0e\x74\x51\xa8\xa9\x31\x09\x70\x3f\xee"
82162306a36Sopenharmony_ci	"\x1c\x21\x7e\x6c\x38\x26\xe5\x2c\x51\xaa\x69\x1e\x0e\x42\x3c\xfc"
82262306a36Sopenharmony_ci	"\x99\xe9\xe3\x16\x50\xc1\x21\x7b\x62\x48\x16\xcd\xad\x9a\x95\xf9"
82362306a36Sopenharmony_ci	"\xd5\xb8\x01\x94\x88\xd9\xc0\xa0\xa1\xfe\x30\x75\xa5\x77\xe2\x31"
82462306a36Sopenharmony_ci	"\x83\xf8\x1d\x4a\x3f\x2f\xa4\x57\x1e\xfc\x8c\xe0\xba\x8a\x4f\xe8"
82562306a36Sopenharmony_ci	"\xb6\x85\x5d\xfe\x72\xb0\xa6\x6e\xde\xd2\xfb\xab\xfb\xe5\x8a\x30"
82662306a36Sopenharmony_ci	"\xfa\xfa\xbe\x1c\x5d\x71\xa8\x7e\x2f\x74\x1e\xf8\xc1\xfe\x86\xfe"
82762306a36Sopenharmony_ci	"\xa6\xbb\xfd\xe5\x30\x67\x7f\x0d\x97\xd1\x1d\x49\xf7\xa8\x44\x3d"
82862306a36Sopenharmony_ci	"\x08\x22\xe5\x06\xa9\xf4\x61\x4e\x01\x1e\x2a\x94\x83\x8f\xf8\x8c"
82962306a36Sopenharmony_ci	"\xd6\x8c\x8b\xb7\xc5\xc6\x42\x4c\xff\xff\xff\xff\xff\xff\xff\xff",
83062306a36Sopenharmony_ci};
83162306a36Sopenharmony_ci
83262306a36Sopenharmony_cistatic int dh_ffdhe2048_create(struct crypto_template *tmpl,
83362306a36Sopenharmony_ci			       struct rtattr **tb)
83462306a36Sopenharmony_ci{
83562306a36Sopenharmony_ci	return  __dh_safe_prime_create(tmpl, tb, &ffdhe2048_prime);
83662306a36Sopenharmony_ci}
83762306a36Sopenharmony_ci
83862306a36Sopenharmony_cistatic int dh_ffdhe3072_create(struct crypto_template *tmpl,
83962306a36Sopenharmony_ci			       struct rtattr **tb)
84062306a36Sopenharmony_ci{
84162306a36Sopenharmony_ci	return  __dh_safe_prime_create(tmpl, tb, &ffdhe3072_prime);
84262306a36Sopenharmony_ci}
84362306a36Sopenharmony_ci
84462306a36Sopenharmony_cistatic int dh_ffdhe4096_create(struct crypto_template *tmpl,
84562306a36Sopenharmony_ci			       struct rtattr **tb)
84662306a36Sopenharmony_ci{
84762306a36Sopenharmony_ci	return  __dh_safe_prime_create(tmpl, tb, &ffdhe4096_prime);
84862306a36Sopenharmony_ci}
84962306a36Sopenharmony_ci
85062306a36Sopenharmony_cistatic int dh_ffdhe6144_create(struct crypto_template *tmpl,
85162306a36Sopenharmony_ci			       struct rtattr **tb)
85262306a36Sopenharmony_ci{
85362306a36Sopenharmony_ci	return  __dh_safe_prime_create(tmpl, tb, &ffdhe6144_prime);
85462306a36Sopenharmony_ci}
85562306a36Sopenharmony_ci
85662306a36Sopenharmony_cistatic int dh_ffdhe8192_create(struct crypto_template *tmpl,
85762306a36Sopenharmony_ci			       struct rtattr **tb)
85862306a36Sopenharmony_ci{
85962306a36Sopenharmony_ci	return  __dh_safe_prime_create(tmpl, tb, &ffdhe8192_prime);
86062306a36Sopenharmony_ci}
86162306a36Sopenharmony_ci
86262306a36Sopenharmony_cistatic struct crypto_template crypto_ffdhe_templates[] = {
86362306a36Sopenharmony_ci	{
86462306a36Sopenharmony_ci		.name = "ffdhe2048",
86562306a36Sopenharmony_ci		.create = dh_ffdhe2048_create,
86662306a36Sopenharmony_ci		.module = THIS_MODULE,
86762306a36Sopenharmony_ci	},
86862306a36Sopenharmony_ci	{
86962306a36Sopenharmony_ci		.name = "ffdhe3072",
87062306a36Sopenharmony_ci		.create = dh_ffdhe3072_create,
87162306a36Sopenharmony_ci		.module = THIS_MODULE,
87262306a36Sopenharmony_ci	},
87362306a36Sopenharmony_ci	{
87462306a36Sopenharmony_ci		.name = "ffdhe4096",
87562306a36Sopenharmony_ci		.create = dh_ffdhe4096_create,
87662306a36Sopenharmony_ci		.module = THIS_MODULE,
87762306a36Sopenharmony_ci	},
87862306a36Sopenharmony_ci	{
87962306a36Sopenharmony_ci		.name = "ffdhe6144",
88062306a36Sopenharmony_ci		.create = dh_ffdhe6144_create,
88162306a36Sopenharmony_ci		.module = THIS_MODULE,
88262306a36Sopenharmony_ci	},
88362306a36Sopenharmony_ci	{
88462306a36Sopenharmony_ci		.name = "ffdhe8192",
88562306a36Sopenharmony_ci		.create = dh_ffdhe8192_create,
88662306a36Sopenharmony_ci		.module = THIS_MODULE,
88762306a36Sopenharmony_ci	},
88862306a36Sopenharmony_ci};
88962306a36Sopenharmony_ci
89062306a36Sopenharmony_ci#else /* ! CONFIG_CRYPTO_DH_RFC7919_GROUPS */
89162306a36Sopenharmony_ci
89262306a36Sopenharmony_cistatic struct crypto_template crypto_ffdhe_templates[] = {};
89362306a36Sopenharmony_ci
89462306a36Sopenharmony_ci#endif /* CONFIG_CRYPTO_DH_RFC7919_GROUPS */
89562306a36Sopenharmony_ci
89662306a36Sopenharmony_ci
89762306a36Sopenharmony_cistatic int __init dh_init(void)
89862306a36Sopenharmony_ci{
89962306a36Sopenharmony_ci	int err;
90062306a36Sopenharmony_ci
90162306a36Sopenharmony_ci	err = crypto_register_kpp(&dh);
90262306a36Sopenharmony_ci	if (err)
90362306a36Sopenharmony_ci		return err;
90462306a36Sopenharmony_ci
90562306a36Sopenharmony_ci	err = crypto_register_templates(crypto_ffdhe_templates,
90662306a36Sopenharmony_ci					ARRAY_SIZE(crypto_ffdhe_templates));
90762306a36Sopenharmony_ci	if (err) {
90862306a36Sopenharmony_ci		crypto_unregister_kpp(&dh);
90962306a36Sopenharmony_ci		return err;
91062306a36Sopenharmony_ci	}
91162306a36Sopenharmony_ci
91262306a36Sopenharmony_ci	return 0;
91362306a36Sopenharmony_ci}
91462306a36Sopenharmony_ci
91562306a36Sopenharmony_cistatic void __exit dh_exit(void)
91662306a36Sopenharmony_ci{
91762306a36Sopenharmony_ci	crypto_unregister_templates(crypto_ffdhe_templates,
91862306a36Sopenharmony_ci				    ARRAY_SIZE(crypto_ffdhe_templates));
91962306a36Sopenharmony_ci	crypto_unregister_kpp(&dh);
92062306a36Sopenharmony_ci}
92162306a36Sopenharmony_ci
92262306a36Sopenharmony_cisubsys_initcall(dh_init);
92362306a36Sopenharmony_cimodule_exit(dh_exit);
92462306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("dh");
92562306a36Sopenharmony_ciMODULE_LICENSE("GPL");
92662306a36Sopenharmony_ciMODULE_DESCRIPTION("DH generic algorithm");
927