162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 262306a36Sopenharmony_ci/* Diffie-Hellman Key Agreement Method [RFC2631] 362306a36Sopenharmony_ci * 462306a36Sopenharmony_ci * Copyright (c) 2016, Intel Corporation 562306a36Sopenharmony_ci * Authors: Salvatore Benedetto <salvatore.benedetto@intel.com> 662306a36Sopenharmony_ci */ 762306a36Sopenharmony_ci 862306a36Sopenharmony_ci#include <linux/fips.h> 962306a36Sopenharmony_ci#include <linux/module.h> 1062306a36Sopenharmony_ci#include <crypto/internal/kpp.h> 1162306a36Sopenharmony_ci#include <crypto/kpp.h> 1262306a36Sopenharmony_ci#include <crypto/dh.h> 1362306a36Sopenharmony_ci#include <crypto/rng.h> 1462306a36Sopenharmony_ci#include <linux/mpi.h> 1562306a36Sopenharmony_ci 1662306a36Sopenharmony_cistruct dh_ctx { 1762306a36Sopenharmony_ci MPI p; /* Value is guaranteed to be set. */ 1862306a36Sopenharmony_ci MPI g; /* Value is guaranteed to be set. */ 1962306a36Sopenharmony_ci MPI xa; /* Value is guaranteed to be set. */ 2062306a36Sopenharmony_ci}; 2162306a36Sopenharmony_ci 2262306a36Sopenharmony_cistatic void dh_clear_ctx(struct dh_ctx *ctx) 2362306a36Sopenharmony_ci{ 2462306a36Sopenharmony_ci mpi_free(ctx->p); 2562306a36Sopenharmony_ci mpi_free(ctx->g); 2662306a36Sopenharmony_ci mpi_free(ctx->xa); 2762306a36Sopenharmony_ci memset(ctx, 0, sizeof(*ctx)); 2862306a36Sopenharmony_ci} 2962306a36Sopenharmony_ci 3062306a36Sopenharmony_ci/* 3162306a36Sopenharmony_ci * If base is g we compute the public key 3262306a36Sopenharmony_ci * ya = g^xa mod p; [RFC2631 sec 2.1.1] 3362306a36Sopenharmony_ci * else if base if the counterpart public key we compute the shared secret 3462306a36Sopenharmony_ci * ZZ = yb^xa mod p; [RFC2631 sec 2.1.1] 3562306a36Sopenharmony_ci */ 3662306a36Sopenharmony_cistatic int _compute_val(const struct dh_ctx *ctx, MPI base, MPI val) 3762306a36Sopenharmony_ci{ 3862306a36Sopenharmony_ci /* val = base^xa mod p */ 3962306a36Sopenharmony_ci return mpi_powm(val, base, ctx->xa, ctx->p); 4062306a36Sopenharmony_ci} 4162306a36Sopenharmony_ci 4262306a36Sopenharmony_cistatic inline struct dh_ctx *dh_get_ctx(struct crypto_kpp *tfm) 4362306a36Sopenharmony_ci{ 4462306a36Sopenharmony_ci return kpp_tfm_ctx(tfm); 4562306a36Sopenharmony_ci} 4662306a36Sopenharmony_ci 4762306a36Sopenharmony_cistatic int dh_check_params_length(unsigned int p_len) 4862306a36Sopenharmony_ci{ 4962306a36Sopenharmony_ci if (fips_enabled) 5062306a36Sopenharmony_ci return (p_len < 2048) ? -EINVAL : 0; 5162306a36Sopenharmony_ci 5262306a36Sopenharmony_ci return (p_len < 1536) ? -EINVAL : 0; 5362306a36Sopenharmony_ci} 5462306a36Sopenharmony_ci 5562306a36Sopenharmony_cistatic int dh_set_params(struct dh_ctx *ctx, struct dh *params) 5662306a36Sopenharmony_ci{ 5762306a36Sopenharmony_ci if (dh_check_params_length(params->p_size << 3)) 5862306a36Sopenharmony_ci return -EINVAL; 5962306a36Sopenharmony_ci 6062306a36Sopenharmony_ci ctx->p = mpi_read_raw_data(params->p, params->p_size); 6162306a36Sopenharmony_ci if (!ctx->p) 6262306a36Sopenharmony_ci return -EINVAL; 6362306a36Sopenharmony_ci 6462306a36Sopenharmony_ci ctx->g = mpi_read_raw_data(params->g, params->g_size); 6562306a36Sopenharmony_ci if (!ctx->g) 6662306a36Sopenharmony_ci return -EINVAL; 6762306a36Sopenharmony_ci 6862306a36Sopenharmony_ci return 0; 6962306a36Sopenharmony_ci} 7062306a36Sopenharmony_ci 7162306a36Sopenharmony_cistatic int dh_set_secret(struct crypto_kpp *tfm, const void *buf, 7262306a36Sopenharmony_ci unsigned int len) 7362306a36Sopenharmony_ci{ 7462306a36Sopenharmony_ci struct dh_ctx *ctx = dh_get_ctx(tfm); 7562306a36Sopenharmony_ci struct dh params; 7662306a36Sopenharmony_ci 7762306a36Sopenharmony_ci /* Free the old MPI key if any */ 7862306a36Sopenharmony_ci dh_clear_ctx(ctx); 7962306a36Sopenharmony_ci 8062306a36Sopenharmony_ci if (crypto_dh_decode_key(buf, len, ¶ms) < 0) 8162306a36Sopenharmony_ci goto err_clear_ctx; 8262306a36Sopenharmony_ci 8362306a36Sopenharmony_ci if (dh_set_params(ctx, ¶ms) < 0) 8462306a36Sopenharmony_ci goto err_clear_ctx; 8562306a36Sopenharmony_ci 8662306a36Sopenharmony_ci ctx->xa = mpi_read_raw_data(params.key, params.key_size); 8762306a36Sopenharmony_ci if (!ctx->xa) 8862306a36Sopenharmony_ci goto err_clear_ctx; 8962306a36Sopenharmony_ci 9062306a36Sopenharmony_ci return 0; 9162306a36Sopenharmony_ci 9262306a36Sopenharmony_cierr_clear_ctx: 9362306a36Sopenharmony_ci dh_clear_ctx(ctx); 9462306a36Sopenharmony_ci return -EINVAL; 9562306a36Sopenharmony_ci} 9662306a36Sopenharmony_ci 9762306a36Sopenharmony_ci/* 9862306a36Sopenharmony_ci * SP800-56A public key verification: 9962306a36Sopenharmony_ci * 10062306a36Sopenharmony_ci * * For the safe-prime groups in FIPS mode, Q can be computed 10162306a36Sopenharmony_ci * trivially from P and a full validation according to SP800-56A 10262306a36Sopenharmony_ci * section 5.6.2.3.1 is performed. 10362306a36Sopenharmony_ci * 10462306a36Sopenharmony_ci * * For all other sets of group parameters, only a partial validation 10562306a36Sopenharmony_ci * according to SP800-56A section 5.6.2.3.2 is performed. 10662306a36Sopenharmony_ci */ 10762306a36Sopenharmony_cistatic int dh_is_pubkey_valid(struct dh_ctx *ctx, MPI y) 10862306a36Sopenharmony_ci{ 10962306a36Sopenharmony_ci if (unlikely(!ctx->p)) 11062306a36Sopenharmony_ci return -EINVAL; 11162306a36Sopenharmony_ci 11262306a36Sopenharmony_ci /* 11362306a36Sopenharmony_ci * Step 1: Verify that 2 <= y <= p - 2. 11462306a36Sopenharmony_ci * 11562306a36Sopenharmony_ci * The upper limit check is actually y < p instead of y < p - 1 11662306a36Sopenharmony_ci * in order to save one mpi_sub_ui() invocation here. Note that 11762306a36Sopenharmony_ci * p - 1 is the non-trivial element of the subgroup of order 2 and 11862306a36Sopenharmony_ci * thus, the check on y^q below would fail if y == p - 1. 11962306a36Sopenharmony_ci */ 12062306a36Sopenharmony_ci if (mpi_cmp_ui(y, 1) < 1 || mpi_cmp(y, ctx->p) >= 0) 12162306a36Sopenharmony_ci return -EINVAL; 12262306a36Sopenharmony_ci 12362306a36Sopenharmony_ci /* 12462306a36Sopenharmony_ci * Step 2: Verify that 1 = y^q mod p 12562306a36Sopenharmony_ci * 12662306a36Sopenharmony_ci * For the safe-prime groups q = (p - 1)/2. 12762306a36Sopenharmony_ci */ 12862306a36Sopenharmony_ci if (fips_enabled) { 12962306a36Sopenharmony_ci MPI val, q; 13062306a36Sopenharmony_ci int ret; 13162306a36Sopenharmony_ci 13262306a36Sopenharmony_ci val = mpi_alloc(0); 13362306a36Sopenharmony_ci if (!val) 13462306a36Sopenharmony_ci return -ENOMEM; 13562306a36Sopenharmony_ci 13662306a36Sopenharmony_ci q = mpi_alloc(mpi_get_nlimbs(ctx->p)); 13762306a36Sopenharmony_ci if (!q) { 13862306a36Sopenharmony_ci mpi_free(val); 13962306a36Sopenharmony_ci return -ENOMEM; 14062306a36Sopenharmony_ci } 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_ci /* 14362306a36Sopenharmony_ci * ->p is odd, so no need to explicitly subtract one 14462306a36Sopenharmony_ci * from it before shifting to the right. 14562306a36Sopenharmony_ci */ 14662306a36Sopenharmony_ci mpi_rshift(q, ctx->p, 1); 14762306a36Sopenharmony_ci 14862306a36Sopenharmony_ci ret = mpi_powm(val, y, q, ctx->p); 14962306a36Sopenharmony_ci mpi_free(q); 15062306a36Sopenharmony_ci if (ret) { 15162306a36Sopenharmony_ci mpi_free(val); 15262306a36Sopenharmony_ci return ret; 15362306a36Sopenharmony_ci } 15462306a36Sopenharmony_ci 15562306a36Sopenharmony_ci ret = mpi_cmp_ui(val, 1); 15662306a36Sopenharmony_ci 15762306a36Sopenharmony_ci mpi_free(val); 15862306a36Sopenharmony_ci 15962306a36Sopenharmony_ci if (ret != 0) 16062306a36Sopenharmony_ci return -EINVAL; 16162306a36Sopenharmony_ci } 16262306a36Sopenharmony_ci 16362306a36Sopenharmony_ci return 0; 16462306a36Sopenharmony_ci} 16562306a36Sopenharmony_ci 16662306a36Sopenharmony_cistatic int dh_compute_value(struct kpp_request *req) 16762306a36Sopenharmony_ci{ 16862306a36Sopenharmony_ci struct crypto_kpp *tfm = crypto_kpp_reqtfm(req); 16962306a36Sopenharmony_ci struct dh_ctx *ctx = dh_get_ctx(tfm); 17062306a36Sopenharmony_ci MPI base, val = mpi_alloc(0); 17162306a36Sopenharmony_ci int ret = 0; 17262306a36Sopenharmony_ci int sign; 17362306a36Sopenharmony_ci 17462306a36Sopenharmony_ci if (!val) 17562306a36Sopenharmony_ci return -ENOMEM; 17662306a36Sopenharmony_ci 17762306a36Sopenharmony_ci if (unlikely(!ctx->xa)) { 17862306a36Sopenharmony_ci ret = -EINVAL; 17962306a36Sopenharmony_ci goto err_free_val; 18062306a36Sopenharmony_ci } 18162306a36Sopenharmony_ci 18262306a36Sopenharmony_ci if (req->src) { 18362306a36Sopenharmony_ci base = mpi_read_raw_from_sgl(req->src, req->src_len); 18462306a36Sopenharmony_ci if (!base) { 18562306a36Sopenharmony_ci ret = -EINVAL; 18662306a36Sopenharmony_ci goto err_free_val; 18762306a36Sopenharmony_ci } 18862306a36Sopenharmony_ci ret = dh_is_pubkey_valid(ctx, base); 18962306a36Sopenharmony_ci if (ret) 19062306a36Sopenharmony_ci goto err_free_base; 19162306a36Sopenharmony_ci } else { 19262306a36Sopenharmony_ci base = ctx->g; 19362306a36Sopenharmony_ci } 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci ret = _compute_val(ctx, base, val); 19662306a36Sopenharmony_ci if (ret) 19762306a36Sopenharmony_ci goto err_free_base; 19862306a36Sopenharmony_ci 19962306a36Sopenharmony_ci if (fips_enabled) { 20062306a36Sopenharmony_ci /* SP800-56A rev3 5.7.1.1 check: Validation of shared secret */ 20162306a36Sopenharmony_ci if (req->src) { 20262306a36Sopenharmony_ci MPI pone; 20362306a36Sopenharmony_ci 20462306a36Sopenharmony_ci /* z <= 1 */ 20562306a36Sopenharmony_ci if (mpi_cmp_ui(val, 1) < 1) { 20662306a36Sopenharmony_ci ret = -EBADMSG; 20762306a36Sopenharmony_ci goto err_free_base; 20862306a36Sopenharmony_ci } 20962306a36Sopenharmony_ci 21062306a36Sopenharmony_ci /* z == p - 1 */ 21162306a36Sopenharmony_ci pone = mpi_alloc(0); 21262306a36Sopenharmony_ci 21362306a36Sopenharmony_ci if (!pone) { 21462306a36Sopenharmony_ci ret = -ENOMEM; 21562306a36Sopenharmony_ci goto err_free_base; 21662306a36Sopenharmony_ci } 21762306a36Sopenharmony_ci 21862306a36Sopenharmony_ci ret = mpi_sub_ui(pone, ctx->p, 1); 21962306a36Sopenharmony_ci if (!ret && !mpi_cmp(pone, val)) 22062306a36Sopenharmony_ci ret = -EBADMSG; 22162306a36Sopenharmony_ci 22262306a36Sopenharmony_ci mpi_free(pone); 22362306a36Sopenharmony_ci 22462306a36Sopenharmony_ci if (ret) 22562306a36Sopenharmony_ci goto err_free_base; 22662306a36Sopenharmony_ci 22762306a36Sopenharmony_ci /* SP800-56A rev 3 5.6.2.1.3 key check */ 22862306a36Sopenharmony_ci } else { 22962306a36Sopenharmony_ci if (dh_is_pubkey_valid(ctx, val)) { 23062306a36Sopenharmony_ci ret = -EAGAIN; 23162306a36Sopenharmony_ci goto err_free_val; 23262306a36Sopenharmony_ci } 23362306a36Sopenharmony_ci } 23462306a36Sopenharmony_ci } 23562306a36Sopenharmony_ci 23662306a36Sopenharmony_ci ret = mpi_write_to_sgl(val, req->dst, req->dst_len, &sign); 23762306a36Sopenharmony_ci if (ret) 23862306a36Sopenharmony_ci goto err_free_base; 23962306a36Sopenharmony_ci 24062306a36Sopenharmony_ci if (sign < 0) 24162306a36Sopenharmony_ci ret = -EBADMSG; 24262306a36Sopenharmony_cierr_free_base: 24362306a36Sopenharmony_ci if (req->src) 24462306a36Sopenharmony_ci mpi_free(base); 24562306a36Sopenharmony_cierr_free_val: 24662306a36Sopenharmony_ci mpi_free(val); 24762306a36Sopenharmony_ci return ret; 24862306a36Sopenharmony_ci} 24962306a36Sopenharmony_ci 25062306a36Sopenharmony_cistatic unsigned int dh_max_size(struct crypto_kpp *tfm) 25162306a36Sopenharmony_ci{ 25262306a36Sopenharmony_ci struct dh_ctx *ctx = dh_get_ctx(tfm); 25362306a36Sopenharmony_ci 25462306a36Sopenharmony_ci return mpi_get_size(ctx->p); 25562306a36Sopenharmony_ci} 25662306a36Sopenharmony_ci 25762306a36Sopenharmony_cistatic void dh_exit_tfm(struct crypto_kpp *tfm) 25862306a36Sopenharmony_ci{ 25962306a36Sopenharmony_ci struct dh_ctx *ctx = dh_get_ctx(tfm); 26062306a36Sopenharmony_ci 26162306a36Sopenharmony_ci dh_clear_ctx(ctx); 26262306a36Sopenharmony_ci} 26362306a36Sopenharmony_ci 26462306a36Sopenharmony_cistatic struct kpp_alg dh = { 26562306a36Sopenharmony_ci .set_secret = dh_set_secret, 26662306a36Sopenharmony_ci .generate_public_key = dh_compute_value, 26762306a36Sopenharmony_ci .compute_shared_secret = dh_compute_value, 26862306a36Sopenharmony_ci .max_size = dh_max_size, 26962306a36Sopenharmony_ci .exit = dh_exit_tfm, 27062306a36Sopenharmony_ci .base = { 27162306a36Sopenharmony_ci .cra_name = "dh", 27262306a36Sopenharmony_ci .cra_driver_name = "dh-generic", 27362306a36Sopenharmony_ci .cra_priority = 100, 27462306a36Sopenharmony_ci .cra_module = THIS_MODULE, 27562306a36Sopenharmony_ci .cra_ctxsize = sizeof(struct dh_ctx), 27662306a36Sopenharmony_ci }, 27762306a36Sopenharmony_ci}; 27862306a36Sopenharmony_ci 27962306a36Sopenharmony_ci 28062306a36Sopenharmony_cistruct dh_safe_prime { 28162306a36Sopenharmony_ci unsigned int max_strength; 28262306a36Sopenharmony_ci unsigned int p_size; 28362306a36Sopenharmony_ci const char *p; 28462306a36Sopenharmony_ci}; 28562306a36Sopenharmony_ci 28662306a36Sopenharmony_cistatic const char safe_prime_g[] = { 2 }; 28762306a36Sopenharmony_ci 28862306a36Sopenharmony_cistruct dh_safe_prime_instance_ctx { 28962306a36Sopenharmony_ci struct crypto_kpp_spawn dh_spawn; 29062306a36Sopenharmony_ci const struct dh_safe_prime *safe_prime; 29162306a36Sopenharmony_ci}; 29262306a36Sopenharmony_ci 29362306a36Sopenharmony_cistruct dh_safe_prime_tfm_ctx { 29462306a36Sopenharmony_ci struct crypto_kpp *dh_tfm; 29562306a36Sopenharmony_ci}; 29662306a36Sopenharmony_ci 29762306a36Sopenharmony_cistatic void dh_safe_prime_free_instance(struct kpp_instance *inst) 29862306a36Sopenharmony_ci{ 29962306a36Sopenharmony_ci struct dh_safe_prime_instance_ctx *ctx = kpp_instance_ctx(inst); 30062306a36Sopenharmony_ci 30162306a36Sopenharmony_ci crypto_drop_kpp(&ctx->dh_spawn); 30262306a36Sopenharmony_ci kfree(inst); 30362306a36Sopenharmony_ci} 30462306a36Sopenharmony_ci 30562306a36Sopenharmony_cistatic inline struct dh_safe_prime_instance_ctx *dh_safe_prime_instance_ctx( 30662306a36Sopenharmony_ci struct crypto_kpp *tfm) 30762306a36Sopenharmony_ci{ 30862306a36Sopenharmony_ci return kpp_instance_ctx(kpp_alg_instance(tfm)); 30962306a36Sopenharmony_ci} 31062306a36Sopenharmony_ci 31162306a36Sopenharmony_cistatic int dh_safe_prime_init_tfm(struct crypto_kpp *tfm) 31262306a36Sopenharmony_ci{ 31362306a36Sopenharmony_ci struct dh_safe_prime_instance_ctx *inst_ctx = 31462306a36Sopenharmony_ci dh_safe_prime_instance_ctx(tfm); 31562306a36Sopenharmony_ci struct dh_safe_prime_tfm_ctx *tfm_ctx = kpp_tfm_ctx(tfm); 31662306a36Sopenharmony_ci 31762306a36Sopenharmony_ci tfm_ctx->dh_tfm = crypto_spawn_kpp(&inst_ctx->dh_spawn); 31862306a36Sopenharmony_ci if (IS_ERR(tfm_ctx->dh_tfm)) 31962306a36Sopenharmony_ci return PTR_ERR(tfm_ctx->dh_tfm); 32062306a36Sopenharmony_ci 32162306a36Sopenharmony_ci kpp_set_reqsize(tfm, sizeof(struct kpp_request) + 32262306a36Sopenharmony_ci crypto_kpp_reqsize(tfm_ctx->dh_tfm)); 32362306a36Sopenharmony_ci 32462306a36Sopenharmony_ci return 0; 32562306a36Sopenharmony_ci} 32662306a36Sopenharmony_ci 32762306a36Sopenharmony_cistatic void dh_safe_prime_exit_tfm(struct crypto_kpp *tfm) 32862306a36Sopenharmony_ci{ 32962306a36Sopenharmony_ci struct dh_safe_prime_tfm_ctx *tfm_ctx = kpp_tfm_ctx(tfm); 33062306a36Sopenharmony_ci 33162306a36Sopenharmony_ci crypto_free_kpp(tfm_ctx->dh_tfm); 33262306a36Sopenharmony_ci} 33362306a36Sopenharmony_ci 33462306a36Sopenharmony_cistatic u64 __add_u64_to_be(__be64 *dst, unsigned int n, u64 val) 33562306a36Sopenharmony_ci{ 33662306a36Sopenharmony_ci unsigned int i; 33762306a36Sopenharmony_ci 33862306a36Sopenharmony_ci for (i = n; val && i > 0; --i) { 33962306a36Sopenharmony_ci u64 tmp = be64_to_cpu(dst[i - 1]); 34062306a36Sopenharmony_ci 34162306a36Sopenharmony_ci tmp += val; 34262306a36Sopenharmony_ci val = tmp >= val ? 0 : 1; 34362306a36Sopenharmony_ci dst[i - 1] = cpu_to_be64(tmp); 34462306a36Sopenharmony_ci } 34562306a36Sopenharmony_ci 34662306a36Sopenharmony_ci return val; 34762306a36Sopenharmony_ci} 34862306a36Sopenharmony_ci 34962306a36Sopenharmony_cistatic void *dh_safe_prime_gen_privkey(const struct dh_safe_prime *safe_prime, 35062306a36Sopenharmony_ci unsigned int *key_size) 35162306a36Sopenharmony_ci{ 35262306a36Sopenharmony_ci unsigned int n, oversampling_size; 35362306a36Sopenharmony_ci __be64 *key; 35462306a36Sopenharmony_ci int err; 35562306a36Sopenharmony_ci u64 h, o; 35662306a36Sopenharmony_ci 35762306a36Sopenharmony_ci /* 35862306a36Sopenharmony_ci * Generate a private key following NIST SP800-56Ar3, 35962306a36Sopenharmony_ci * sec. 5.6.1.1.1 and 5.6.1.1.3 resp.. 36062306a36Sopenharmony_ci * 36162306a36Sopenharmony_ci * 5.6.1.1.1: choose key length N such that 36262306a36Sopenharmony_ci * 2 * ->max_strength <= N <= log2(q) + 1 = ->p_size * 8 - 1 36362306a36Sopenharmony_ci * with q = (p - 1) / 2 for the safe-prime groups. 36462306a36Sopenharmony_ci * Choose the lower bound's next power of two for N in order to 36562306a36Sopenharmony_ci * avoid excessively large private keys while still 36662306a36Sopenharmony_ci * maintaining some extra reserve beyond the bare minimum in 36762306a36Sopenharmony_ci * most cases. Note that for each entry in safe_prime_groups[], 36862306a36Sopenharmony_ci * the following holds for such N: 36962306a36Sopenharmony_ci * - N >= 256, in particular it is a multiple of 2^6 = 64 37062306a36Sopenharmony_ci * bits and 37162306a36Sopenharmony_ci * - N < log2(q) + 1, i.e. N respects the upper bound. 37262306a36Sopenharmony_ci */ 37362306a36Sopenharmony_ci n = roundup_pow_of_two(2 * safe_prime->max_strength); 37462306a36Sopenharmony_ci WARN_ON_ONCE(n & ((1u << 6) - 1)); 37562306a36Sopenharmony_ci n >>= 6; /* Convert N into units of u64. */ 37662306a36Sopenharmony_ci 37762306a36Sopenharmony_ci /* 37862306a36Sopenharmony_ci * Reserve one extra u64 to hold the extra random bits 37962306a36Sopenharmony_ci * required as per 5.6.1.1.3. 38062306a36Sopenharmony_ci */ 38162306a36Sopenharmony_ci oversampling_size = (n + 1) * sizeof(__be64); 38262306a36Sopenharmony_ci key = kmalloc(oversampling_size, GFP_KERNEL); 38362306a36Sopenharmony_ci if (!key) 38462306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 38562306a36Sopenharmony_ci 38662306a36Sopenharmony_ci /* 38762306a36Sopenharmony_ci * 5.6.1.1.3, step 3 (and implicitly step 4): obtain N + 64 38862306a36Sopenharmony_ci * random bits and interpret them as a big endian integer. 38962306a36Sopenharmony_ci */ 39062306a36Sopenharmony_ci err = -EFAULT; 39162306a36Sopenharmony_ci if (crypto_get_default_rng()) 39262306a36Sopenharmony_ci goto out_err; 39362306a36Sopenharmony_ci 39462306a36Sopenharmony_ci err = crypto_rng_get_bytes(crypto_default_rng, (u8 *)key, 39562306a36Sopenharmony_ci oversampling_size); 39662306a36Sopenharmony_ci crypto_put_default_rng(); 39762306a36Sopenharmony_ci if (err) 39862306a36Sopenharmony_ci goto out_err; 39962306a36Sopenharmony_ci 40062306a36Sopenharmony_ci /* 40162306a36Sopenharmony_ci * 5.6.1.1.3, step 5 is implicit: 2^N < q and thus, 40262306a36Sopenharmony_ci * M = min(2^N, q) = 2^N. 40362306a36Sopenharmony_ci * 40462306a36Sopenharmony_ci * For step 6, calculate 40562306a36Sopenharmony_ci * key = (key[] mod (M - 1)) + 1 = (key[] mod (2^N - 1)) + 1. 40662306a36Sopenharmony_ci * 40762306a36Sopenharmony_ci * In order to avoid expensive divisions, note that 40862306a36Sopenharmony_ci * 2^N mod (2^N - 1) = 1 and thus, for any integer h, 40962306a36Sopenharmony_ci * 2^N * h mod (2^N - 1) = h mod (2^N - 1) always holds. 41062306a36Sopenharmony_ci * The big endian integer key[] composed of n + 1 64bit words 41162306a36Sopenharmony_ci * may be written as key[] = h * 2^N + l, with h = key[0] 41262306a36Sopenharmony_ci * representing the 64 most significant bits and l 41362306a36Sopenharmony_ci * corresponding to the remaining 2^N bits. With the remark 41462306a36Sopenharmony_ci * from above, 41562306a36Sopenharmony_ci * h * 2^N + l mod (2^N - 1) = l + h mod (2^N - 1). 41662306a36Sopenharmony_ci * As both, l and h are less than 2^N, their sum after 41762306a36Sopenharmony_ci * this first reduction is guaranteed to be <= 2^(N + 1) - 2. 41862306a36Sopenharmony_ci * Or equivalently, that their sum can again be written as 41962306a36Sopenharmony_ci * h' * 2^N + l' with h' now either zero or one and if one, 42062306a36Sopenharmony_ci * then l' <= 2^N - 2. Thus, all bits at positions >= N will 42162306a36Sopenharmony_ci * be zero after a second reduction: 42262306a36Sopenharmony_ci * h' * 2^N + l' mod (2^N - 1) = l' + h' mod (2^N - 1). 42362306a36Sopenharmony_ci * At this point, it is still possible that 42462306a36Sopenharmony_ci * l' + h' = 2^N - 1, i.e. that l' + h' mod (2^N - 1) 42562306a36Sopenharmony_ci * is zero. This condition will be detected below by means of 42662306a36Sopenharmony_ci * the final increment overflowing in this case. 42762306a36Sopenharmony_ci */ 42862306a36Sopenharmony_ci h = be64_to_cpu(key[0]); 42962306a36Sopenharmony_ci h = __add_u64_to_be(key + 1, n, h); 43062306a36Sopenharmony_ci h = __add_u64_to_be(key + 1, n, h); 43162306a36Sopenharmony_ci WARN_ON_ONCE(h); 43262306a36Sopenharmony_ci 43362306a36Sopenharmony_ci /* Increment to obtain the final result. */ 43462306a36Sopenharmony_ci o = __add_u64_to_be(key + 1, n, 1); 43562306a36Sopenharmony_ci /* 43662306a36Sopenharmony_ci * The overflow bit o from the increment is either zero or 43762306a36Sopenharmony_ci * one. If zero, key[1:n] holds the final result in big-endian 43862306a36Sopenharmony_ci * order. If one, key[1:n] is zero now, but needs to be set to 43962306a36Sopenharmony_ci * one, c.f. above. 44062306a36Sopenharmony_ci */ 44162306a36Sopenharmony_ci if (o) 44262306a36Sopenharmony_ci key[n] = cpu_to_be64(1); 44362306a36Sopenharmony_ci 44462306a36Sopenharmony_ci /* n is in units of u64, convert to bytes. */ 44562306a36Sopenharmony_ci *key_size = n << 3; 44662306a36Sopenharmony_ci /* Strip the leading extra __be64, which is (virtually) zero by now. */ 44762306a36Sopenharmony_ci memmove(key, &key[1], *key_size); 44862306a36Sopenharmony_ci 44962306a36Sopenharmony_ci return key; 45062306a36Sopenharmony_ci 45162306a36Sopenharmony_ciout_err: 45262306a36Sopenharmony_ci kfree_sensitive(key); 45362306a36Sopenharmony_ci return ERR_PTR(err); 45462306a36Sopenharmony_ci} 45562306a36Sopenharmony_ci 45662306a36Sopenharmony_cistatic int dh_safe_prime_set_secret(struct crypto_kpp *tfm, const void *buffer, 45762306a36Sopenharmony_ci unsigned int len) 45862306a36Sopenharmony_ci{ 45962306a36Sopenharmony_ci struct dh_safe_prime_instance_ctx *inst_ctx = 46062306a36Sopenharmony_ci dh_safe_prime_instance_ctx(tfm); 46162306a36Sopenharmony_ci struct dh_safe_prime_tfm_ctx *tfm_ctx = kpp_tfm_ctx(tfm); 46262306a36Sopenharmony_ci struct dh params = {}; 46362306a36Sopenharmony_ci void *buf = NULL, *key = NULL; 46462306a36Sopenharmony_ci unsigned int buf_size; 46562306a36Sopenharmony_ci int err; 46662306a36Sopenharmony_ci 46762306a36Sopenharmony_ci if (buffer) { 46862306a36Sopenharmony_ci err = __crypto_dh_decode_key(buffer, len, ¶ms); 46962306a36Sopenharmony_ci if (err) 47062306a36Sopenharmony_ci return err; 47162306a36Sopenharmony_ci if (params.p_size || params.g_size) 47262306a36Sopenharmony_ci return -EINVAL; 47362306a36Sopenharmony_ci } 47462306a36Sopenharmony_ci 47562306a36Sopenharmony_ci params.p = inst_ctx->safe_prime->p; 47662306a36Sopenharmony_ci params.p_size = inst_ctx->safe_prime->p_size; 47762306a36Sopenharmony_ci params.g = safe_prime_g; 47862306a36Sopenharmony_ci params.g_size = sizeof(safe_prime_g); 47962306a36Sopenharmony_ci 48062306a36Sopenharmony_ci if (!params.key_size) { 48162306a36Sopenharmony_ci key = dh_safe_prime_gen_privkey(inst_ctx->safe_prime, 48262306a36Sopenharmony_ci ¶ms.key_size); 48362306a36Sopenharmony_ci if (IS_ERR(key)) 48462306a36Sopenharmony_ci return PTR_ERR(key); 48562306a36Sopenharmony_ci params.key = key; 48662306a36Sopenharmony_ci } 48762306a36Sopenharmony_ci 48862306a36Sopenharmony_ci buf_size = crypto_dh_key_len(¶ms); 48962306a36Sopenharmony_ci buf = kmalloc(buf_size, GFP_KERNEL); 49062306a36Sopenharmony_ci if (!buf) { 49162306a36Sopenharmony_ci err = -ENOMEM; 49262306a36Sopenharmony_ci goto out; 49362306a36Sopenharmony_ci } 49462306a36Sopenharmony_ci 49562306a36Sopenharmony_ci err = crypto_dh_encode_key(buf, buf_size, ¶ms); 49662306a36Sopenharmony_ci if (err) 49762306a36Sopenharmony_ci goto out; 49862306a36Sopenharmony_ci 49962306a36Sopenharmony_ci err = crypto_kpp_set_secret(tfm_ctx->dh_tfm, buf, buf_size); 50062306a36Sopenharmony_ciout: 50162306a36Sopenharmony_ci kfree_sensitive(buf); 50262306a36Sopenharmony_ci kfree_sensitive(key); 50362306a36Sopenharmony_ci return err; 50462306a36Sopenharmony_ci} 50562306a36Sopenharmony_ci 50662306a36Sopenharmony_cistatic void dh_safe_prime_complete_req(void *data, int err) 50762306a36Sopenharmony_ci{ 50862306a36Sopenharmony_ci struct kpp_request *req = data; 50962306a36Sopenharmony_ci 51062306a36Sopenharmony_ci kpp_request_complete(req, err); 51162306a36Sopenharmony_ci} 51262306a36Sopenharmony_ci 51362306a36Sopenharmony_cistatic struct kpp_request *dh_safe_prime_prepare_dh_req(struct kpp_request *req) 51462306a36Sopenharmony_ci{ 51562306a36Sopenharmony_ci struct dh_safe_prime_tfm_ctx *tfm_ctx = 51662306a36Sopenharmony_ci kpp_tfm_ctx(crypto_kpp_reqtfm(req)); 51762306a36Sopenharmony_ci struct kpp_request *dh_req = kpp_request_ctx(req); 51862306a36Sopenharmony_ci 51962306a36Sopenharmony_ci kpp_request_set_tfm(dh_req, tfm_ctx->dh_tfm); 52062306a36Sopenharmony_ci kpp_request_set_callback(dh_req, req->base.flags, 52162306a36Sopenharmony_ci dh_safe_prime_complete_req, req); 52262306a36Sopenharmony_ci 52362306a36Sopenharmony_ci kpp_request_set_input(dh_req, req->src, req->src_len); 52462306a36Sopenharmony_ci kpp_request_set_output(dh_req, req->dst, req->dst_len); 52562306a36Sopenharmony_ci 52662306a36Sopenharmony_ci return dh_req; 52762306a36Sopenharmony_ci} 52862306a36Sopenharmony_ci 52962306a36Sopenharmony_cistatic int dh_safe_prime_generate_public_key(struct kpp_request *req) 53062306a36Sopenharmony_ci{ 53162306a36Sopenharmony_ci struct kpp_request *dh_req = dh_safe_prime_prepare_dh_req(req); 53262306a36Sopenharmony_ci 53362306a36Sopenharmony_ci return crypto_kpp_generate_public_key(dh_req); 53462306a36Sopenharmony_ci} 53562306a36Sopenharmony_ci 53662306a36Sopenharmony_cistatic int dh_safe_prime_compute_shared_secret(struct kpp_request *req) 53762306a36Sopenharmony_ci{ 53862306a36Sopenharmony_ci struct kpp_request *dh_req = dh_safe_prime_prepare_dh_req(req); 53962306a36Sopenharmony_ci 54062306a36Sopenharmony_ci return crypto_kpp_compute_shared_secret(dh_req); 54162306a36Sopenharmony_ci} 54262306a36Sopenharmony_ci 54362306a36Sopenharmony_cistatic unsigned int dh_safe_prime_max_size(struct crypto_kpp *tfm) 54462306a36Sopenharmony_ci{ 54562306a36Sopenharmony_ci struct dh_safe_prime_tfm_ctx *tfm_ctx = kpp_tfm_ctx(tfm); 54662306a36Sopenharmony_ci 54762306a36Sopenharmony_ci return crypto_kpp_maxsize(tfm_ctx->dh_tfm); 54862306a36Sopenharmony_ci} 54962306a36Sopenharmony_ci 55062306a36Sopenharmony_cistatic int __maybe_unused __dh_safe_prime_create( 55162306a36Sopenharmony_ci struct crypto_template *tmpl, struct rtattr **tb, 55262306a36Sopenharmony_ci const struct dh_safe_prime *safe_prime) 55362306a36Sopenharmony_ci{ 55462306a36Sopenharmony_ci struct kpp_instance *inst; 55562306a36Sopenharmony_ci struct dh_safe_prime_instance_ctx *ctx; 55662306a36Sopenharmony_ci const char *dh_name; 55762306a36Sopenharmony_ci struct kpp_alg *dh_alg; 55862306a36Sopenharmony_ci u32 mask; 55962306a36Sopenharmony_ci int err; 56062306a36Sopenharmony_ci 56162306a36Sopenharmony_ci err = crypto_check_attr_type(tb, CRYPTO_ALG_TYPE_KPP, &mask); 56262306a36Sopenharmony_ci if (err) 56362306a36Sopenharmony_ci return err; 56462306a36Sopenharmony_ci 56562306a36Sopenharmony_ci dh_name = crypto_attr_alg_name(tb[1]); 56662306a36Sopenharmony_ci if (IS_ERR(dh_name)) 56762306a36Sopenharmony_ci return PTR_ERR(dh_name); 56862306a36Sopenharmony_ci 56962306a36Sopenharmony_ci inst = kzalloc(sizeof(*inst) + sizeof(*ctx), GFP_KERNEL); 57062306a36Sopenharmony_ci if (!inst) 57162306a36Sopenharmony_ci return -ENOMEM; 57262306a36Sopenharmony_ci 57362306a36Sopenharmony_ci ctx = kpp_instance_ctx(inst); 57462306a36Sopenharmony_ci 57562306a36Sopenharmony_ci err = crypto_grab_kpp(&ctx->dh_spawn, kpp_crypto_instance(inst), 57662306a36Sopenharmony_ci dh_name, 0, mask); 57762306a36Sopenharmony_ci if (err) 57862306a36Sopenharmony_ci goto err_free_inst; 57962306a36Sopenharmony_ci 58062306a36Sopenharmony_ci err = -EINVAL; 58162306a36Sopenharmony_ci dh_alg = crypto_spawn_kpp_alg(&ctx->dh_spawn); 58262306a36Sopenharmony_ci if (strcmp(dh_alg->base.cra_name, "dh")) 58362306a36Sopenharmony_ci goto err_free_inst; 58462306a36Sopenharmony_ci 58562306a36Sopenharmony_ci ctx->safe_prime = safe_prime; 58662306a36Sopenharmony_ci 58762306a36Sopenharmony_ci err = crypto_inst_setname(kpp_crypto_instance(inst), 58862306a36Sopenharmony_ci tmpl->name, &dh_alg->base); 58962306a36Sopenharmony_ci if (err) 59062306a36Sopenharmony_ci goto err_free_inst; 59162306a36Sopenharmony_ci 59262306a36Sopenharmony_ci inst->alg.set_secret = dh_safe_prime_set_secret; 59362306a36Sopenharmony_ci inst->alg.generate_public_key = dh_safe_prime_generate_public_key; 59462306a36Sopenharmony_ci inst->alg.compute_shared_secret = dh_safe_prime_compute_shared_secret; 59562306a36Sopenharmony_ci inst->alg.max_size = dh_safe_prime_max_size; 59662306a36Sopenharmony_ci inst->alg.init = dh_safe_prime_init_tfm; 59762306a36Sopenharmony_ci inst->alg.exit = dh_safe_prime_exit_tfm; 59862306a36Sopenharmony_ci inst->alg.base.cra_priority = dh_alg->base.cra_priority; 59962306a36Sopenharmony_ci inst->alg.base.cra_module = THIS_MODULE; 60062306a36Sopenharmony_ci inst->alg.base.cra_ctxsize = sizeof(struct dh_safe_prime_tfm_ctx); 60162306a36Sopenharmony_ci 60262306a36Sopenharmony_ci inst->free = dh_safe_prime_free_instance; 60362306a36Sopenharmony_ci 60462306a36Sopenharmony_ci err = kpp_register_instance(tmpl, inst); 60562306a36Sopenharmony_ci if (err) 60662306a36Sopenharmony_ci goto err_free_inst; 60762306a36Sopenharmony_ci 60862306a36Sopenharmony_ci return 0; 60962306a36Sopenharmony_ci 61062306a36Sopenharmony_cierr_free_inst: 61162306a36Sopenharmony_ci dh_safe_prime_free_instance(inst); 61262306a36Sopenharmony_ci 61362306a36Sopenharmony_ci return err; 61462306a36Sopenharmony_ci} 61562306a36Sopenharmony_ci 61662306a36Sopenharmony_ci#ifdef CONFIG_CRYPTO_DH_RFC7919_GROUPS 61762306a36Sopenharmony_ci 61862306a36Sopenharmony_cistatic const struct dh_safe_prime ffdhe2048_prime = { 61962306a36Sopenharmony_ci .max_strength = 112, 62062306a36Sopenharmony_ci .p_size = 256, 62162306a36Sopenharmony_ci .p = 62262306a36Sopenharmony_ci "\xff\xff\xff\xff\xff\xff\xff\xff\xad\xf8\x54\x58\xa2\xbb\x4a\x9a" 62362306a36Sopenharmony_ci "\xaf\xdc\x56\x20\x27\x3d\x3c\xf1\xd8\xb9\xc5\x83\xce\x2d\x36\x95" 62462306a36Sopenharmony_ci "\xa9\xe1\x36\x41\x14\x64\x33\xfb\xcc\x93\x9d\xce\x24\x9b\x3e\xf9" 62562306a36Sopenharmony_ci "\x7d\x2f\xe3\x63\x63\x0c\x75\xd8\xf6\x81\xb2\x02\xae\xc4\x61\x7a" 62662306a36Sopenharmony_ci "\xd3\xdf\x1e\xd5\xd5\xfd\x65\x61\x24\x33\xf5\x1f\x5f\x06\x6e\xd0" 62762306a36Sopenharmony_ci "\x85\x63\x65\x55\x3d\xed\x1a\xf3\xb5\x57\x13\x5e\x7f\x57\xc9\x35" 62862306a36Sopenharmony_ci "\x98\x4f\x0c\x70\xe0\xe6\x8b\x77\xe2\xa6\x89\xda\xf3\xef\xe8\x72" 62962306a36Sopenharmony_ci "\x1d\xf1\x58\xa1\x36\xad\xe7\x35\x30\xac\xca\x4f\x48\x3a\x79\x7a" 63062306a36Sopenharmony_ci "\xbc\x0a\xb1\x82\xb3\x24\xfb\x61\xd1\x08\xa9\x4b\xb2\xc8\xe3\xfb" 63162306a36Sopenharmony_ci "\xb9\x6a\xda\xb7\x60\xd7\xf4\x68\x1d\x4f\x42\xa3\xde\x39\x4d\xf4" 63262306a36Sopenharmony_ci "\xae\x56\xed\xe7\x63\x72\xbb\x19\x0b\x07\xa7\xc8\xee\x0a\x6d\x70" 63362306a36Sopenharmony_ci "\x9e\x02\xfc\xe1\xcd\xf7\xe2\xec\xc0\x34\x04\xcd\x28\x34\x2f\x61" 63462306a36Sopenharmony_ci "\x91\x72\xfe\x9c\xe9\x85\x83\xff\x8e\x4f\x12\x32\xee\xf2\x81\x83" 63562306a36Sopenharmony_ci "\xc3\xfe\x3b\x1b\x4c\x6f\xad\x73\x3b\xb5\xfc\xbc\x2e\xc2\x20\x05" 63662306a36Sopenharmony_ci "\xc5\x8e\xf1\x83\x7d\x16\x83\xb2\xc6\xf3\x4a\x26\xc1\xb2\xef\xfa" 63762306a36Sopenharmony_ci "\x88\x6b\x42\x38\x61\x28\x5c\x97\xff\xff\xff\xff\xff\xff\xff\xff", 63862306a36Sopenharmony_ci}; 63962306a36Sopenharmony_ci 64062306a36Sopenharmony_cistatic const struct dh_safe_prime ffdhe3072_prime = { 64162306a36Sopenharmony_ci .max_strength = 128, 64262306a36Sopenharmony_ci .p_size = 384, 64362306a36Sopenharmony_ci .p = 64462306a36Sopenharmony_ci "\xff\xff\xff\xff\xff\xff\xff\xff\xad\xf8\x54\x58\xa2\xbb\x4a\x9a" 64562306a36Sopenharmony_ci "\xaf\xdc\x56\x20\x27\x3d\x3c\xf1\xd8\xb9\xc5\x83\xce\x2d\x36\x95" 64662306a36Sopenharmony_ci "\xa9\xe1\x36\x41\x14\x64\x33\xfb\xcc\x93\x9d\xce\x24\x9b\x3e\xf9" 64762306a36Sopenharmony_ci "\x7d\x2f\xe3\x63\x63\x0c\x75\xd8\xf6\x81\xb2\x02\xae\xc4\x61\x7a" 64862306a36Sopenharmony_ci "\xd3\xdf\x1e\xd5\xd5\xfd\x65\x61\x24\x33\xf5\x1f\x5f\x06\x6e\xd0" 64962306a36Sopenharmony_ci "\x85\x63\x65\x55\x3d\xed\x1a\xf3\xb5\x57\x13\x5e\x7f\x57\xc9\x35" 65062306a36Sopenharmony_ci "\x98\x4f\x0c\x70\xe0\xe6\x8b\x77\xe2\xa6\x89\xda\xf3\xef\xe8\x72" 65162306a36Sopenharmony_ci "\x1d\xf1\x58\xa1\x36\xad\xe7\x35\x30\xac\xca\x4f\x48\x3a\x79\x7a" 65262306a36Sopenharmony_ci "\xbc\x0a\xb1\x82\xb3\x24\xfb\x61\xd1\x08\xa9\x4b\xb2\xc8\xe3\xfb" 65362306a36Sopenharmony_ci "\xb9\x6a\xda\xb7\x60\xd7\xf4\x68\x1d\x4f\x42\xa3\xde\x39\x4d\xf4" 65462306a36Sopenharmony_ci "\xae\x56\xed\xe7\x63\x72\xbb\x19\x0b\x07\xa7\xc8\xee\x0a\x6d\x70" 65562306a36Sopenharmony_ci "\x9e\x02\xfc\xe1\xcd\xf7\xe2\xec\xc0\x34\x04\xcd\x28\x34\x2f\x61" 65662306a36Sopenharmony_ci "\x91\x72\xfe\x9c\xe9\x85\x83\xff\x8e\x4f\x12\x32\xee\xf2\x81\x83" 65762306a36Sopenharmony_ci "\xc3\xfe\x3b\x1b\x4c\x6f\xad\x73\x3b\xb5\xfc\xbc\x2e\xc2\x20\x05" 65862306a36Sopenharmony_ci "\xc5\x8e\xf1\x83\x7d\x16\x83\xb2\xc6\xf3\x4a\x26\xc1\xb2\xef\xfa" 65962306a36Sopenharmony_ci "\x88\x6b\x42\x38\x61\x1f\xcf\xdc\xde\x35\x5b\x3b\x65\x19\x03\x5b" 66062306a36Sopenharmony_ci "\xbc\x34\xf4\xde\xf9\x9c\x02\x38\x61\xb4\x6f\xc9\xd6\xe6\xc9\x07" 66162306a36Sopenharmony_ci "\x7a\xd9\x1d\x26\x91\xf7\xf7\xee\x59\x8c\xb0\xfa\xc1\x86\xd9\x1c" 66262306a36Sopenharmony_ci "\xae\xfe\x13\x09\x85\x13\x92\x70\xb4\x13\x0c\x93\xbc\x43\x79\x44" 66362306a36Sopenharmony_ci "\xf4\xfd\x44\x52\xe2\xd7\x4d\xd3\x64\xf2\xe2\x1e\x71\xf5\x4b\xff" 66462306a36Sopenharmony_ci "\x5c\xae\x82\xab\x9c\x9d\xf6\x9e\xe8\x6d\x2b\xc5\x22\x36\x3a\x0d" 66562306a36Sopenharmony_ci "\xab\xc5\x21\x97\x9b\x0d\xea\xda\x1d\xbf\x9a\x42\xd5\xc4\x48\x4e" 66662306a36Sopenharmony_ci "\x0a\xbc\xd0\x6b\xfa\x53\xdd\xef\x3c\x1b\x20\xee\x3f\xd5\x9d\x7c" 66762306a36Sopenharmony_ci "\x25\xe4\x1d\x2b\x66\xc6\x2e\x37\xff\xff\xff\xff\xff\xff\xff\xff", 66862306a36Sopenharmony_ci}; 66962306a36Sopenharmony_ci 67062306a36Sopenharmony_cistatic const struct dh_safe_prime ffdhe4096_prime = { 67162306a36Sopenharmony_ci .max_strength = 152, 67262306a36Sopenharmony_ci .p_size = 512, 67362306a36Sopenharmony_ci .p = 67462306a36Sopenharmony_ci "\xff\xff\xff\xff\xff\xff\xff\xff\xad\xf8\x54\x58\xa2\xbb\x4a\x9a" 67562306a36Sopenharmony_ci "\xaf\xdc\x56\x20\x27\x3d\x3c\xf1\xd8\xb9\xc5\x83\xce\x2d\x36\x95" 67662306a36Sopenharmony_ci "\xa9\xe1\x36\x41\x14\x64\x33\xfb\xcc\x93\x9d\xce\x24\x9b\x3e\xf9" 67762306a36Sopenharmony_ci "\x7d\x2f\xe3\x63\x63\x0c\x75\xd8\xf6\x81\xb2\x02\xae\xc4\x61\x7a" 67862306a36Sopenharmony_ci "\xd3\xdf\x1e\xd5\xd5\xfd\x65\x61\x24\x33\xf5\x1f\x5f\x06\x6e\xd0" 67962306a36Sopenharmony_ci "\x85\x63\x65\x55\x3d\xed\x1a\xf3\xb5\x57\x13\x5e\x7f\x57\xc9\x35" 68062306a36Sopenharmony_ci "\x98\x4f\x0c\x70\xe0\xe6\x8b\x77\xe2\xa6\x89\xda\xf3\xef\xe8\x72" 68162306a36Sopenharmony_ci "\x1d\xf1\x58\xa1\x36\xad\xe7\x35\x30\xac\xca\x4f\x48\x3a\x79\x7a" 68262306a36Sopenharmony_ci "\xbc\x0a\xb1\x82\xb3\x24\xfb\x61\xd1\x08\xa9\x4b\xb2\xc8\xe3\xfb" 68362306a36Sopenharmony_ci "\xb9\x6a\xda\xb7\x60\xd7\xf4\x68\x1d\x4f\x42\xa3\xde\x39\x4d\xf4" 68462306a36Sopenharmony_ci "\xae\x56\xed\xe7\x63\x72\xbb\x19\x0b\x07\xa7\xc8\xee\x0a\x6d\x70" 68562306a36Sopenharmony_ci "\x9e\x02\xfc\xe1\xcd\xf7\xe2\xec\xc0\x34\x04\xcd\x28\x34\x2f\x61" 68662306a36Sopenharmony_ci "\x91\x72\xfe\x9c\xe9\x85\x83\xff\x8e\x4f\x12\x32\xee\xf2\x81\x83" 68762306a36Sopenharmony_ci "\xc3\xfe\x3b\x1b\x4c\x6f\xad\x73\x3b\xb5\xfc\xbc\x2e\xc2\x20\x05" 68862306a36Sopenharmony_ci "\xc5\x8e\xf1\x83\x7d\x16\x83\xb2\xc6\xf3\x4a\x26\xc1\xb2\xef\xfa" 68962306a36Sopenharmony_ci "\x88\x6b\x42\x38\x61\x1f\xcf\xdc\xde\x35\x5b\x3b\x65\x19\x03\x5b" 69062306a36Sopenharmony_ci "\xbc\x34\xf4\xde\xf9\x9c\x02\x38\x61\xb4\x6f\xc9\xd6\xe6\xc9\x07" 69162306a36Sopenharmony_ci "\x7a\xd9\x1d\x26\x91\xf7\xf7\xee\x59\x8c\xb0\xfa\xc1\x86\xd9\x1c" 69262306a36Sopenharmony_ci "\xae\xfe\x13\x09\x85\x13\x92\x70\xb4\x13\x0c\x93\xbc\x43\x79\x44" 69362306a36Sopenharmony_ci "\xf4\xfd\x44\x52\xe2\xd7\x4d\xd3\x64\xf2\xe2\x1e\x71\xf5\x4b\xff" 69462306a36Sopenharmony_ci "\x5c\xae\x82\xab\x9c\x9d\xf6\x9e\xe8\x6d\x2b\xc5\x22\x36\x3a\x0d" 69562306a36Sopenharmony_ci "\xab\xc5\x21\x97\x9b\x0d\xea\xda\x1d\xbf\x9a\x42\xd5\xc4\x48\x4e" 69662306a36Sopenharmony_ci "\x0a\xbc\xd0\x6b\xfa\x53\xdd\xef\x3c\x1b\x20\xee\x3f\xd5\x9d\x7c" 69762306a36Sopenharmony_ci "\x25\xe4\x1d\x2b\x66\x9e\x1e\xf1\x6e\x6f\x52\xc3\x16\x4d\xf4\xfb" 69862306a36Sopenharmony_ci "\x79\x30\xe9\xe4\xe5\x88\x57\xb6\xac\x7d\x5f\x42\xd6\x9f\x6d\x18" 69962306a36Sopenharmony_ci "\x77\x63\xcf\x1d\x55\x03\x40\x04\x87\xf5\x5b\xa5\x7e\x31\xcc\x7a" 70062306a36Sopenharmony_ci "\x71\x35\xc8\x86\xef\xb4\x31\x8a\xed\x6a\x1e\x01\x2d\x9e\x68\x32" 70162306a36Sopenharmony_ci "\xa9\x07\x60\x0a\x91\x81\x30\xc4\x6d\xc7\x78\xf9\x71\xad\x00\x38" 70262306a36Sopenharmony_ci "\x09\x29\x99\xa3\x33\xcb\x8b\x7a\x1a\x1d\xb9\x3d\x71\x40\x00\x3c" 70362306a36Sopenharmony_ci "\x2a\x4e\xce\xa9\xf9\x8d\x0a\xcc\x0a\x82\x91\xcd\xce\xc9\x7d\xcf" 70462306a36Sopenharmony_ci "\x8e\xc9\xb5\x5a\x7f\x88\xa4\x6b\x4d\xb5\xa8\x51\xf4\x41\x82\xe1" 70562306a36Sopenharmony_ci "\xc6\x8a\x00\x7e\x5e\x65\x5f\x6a\xff\xff\xff\xff\xff\xff\xff\xff", 70662306a36Sopenharmony_ci}; 70762306a36Sopenharmony_ci 70862306a36Sopenharmony_cistatic const struct dh_safe_prime ffdhe6144_prime = { 70962306a36Sopenharmony_ci .max_strength = 176, 71062306a36Sopenharmony_ci .p_size = 768, 71162306a36Sopenharmony_ci .p = 71262306a36Sopenharmony_ci "\xff\xff\xff\xff\xff\xff\xff\xff\xad\xf8\x54\x58\xa2\xbb\x4a\x9a" 71362306a36Sopenharmony_ci "\xaf\xdc\x56\x20\x27\x3d\x3c\xf1\xd8\xb9\xc5\x83\xce\x2d\x36\x95" 71462306a36Sopenharmony_ci "\xa9\xe1\x36\x41\x14\x64\x33\xfb\xcc\x93\x9d\xce\x24\x9b\x3e\xf9" 71562306a36Sopenharmony_ci "\x7d\x2f\xe3\x63\x63\x0c\x75\xd8\xf6\x81\xb2\x02\xae\xc4\x61\x7a" 71662306a36Sopenharmony_ci "\xd3\xdf\x1e\xd5\xd5\xfd\x65\x61\x24\x33\xf5\x1f\x5f\x06\x6e\xd0" 71762306a36Sopenharmony_ci "\x85\x63\x65\x55\x3d\xed\x1a\xf3\xb5\x57\x13\x5e\x7f\x57\xc9\x35" 71862306a36Sopenharmony_ci "\x98\x4f\x0c\x70\xe0\xe6\x8b\x77\xe2\xa6\x89\xda\xf3\xef\xe8\x72" 71962306a36Sopenharmony_ci "\x1d\xf1\x58\xa1\x36\xad\xe7\x35\x30\xac\xca\x4f\x48\x3a\x79\x7a" 72062306a36Sopenharmony_ci "\xbc\x0a\xb1\x82\xb3\x24\xfb\x61\xd1\x08\xa9\x4b\xb2\xc8\xe3\xfb" 72162306a36Sopenharmony_ci "\xb9\x6a\xda\xb7\x60\xd7\xf4\x68\x1d\x4f\x42\xa3\xde\x39\x4d\xf4" 72262306a36Sopenharmony_ci "\xae\x56\xed\xe7\x63\x72\xbb\x19\x0b\x07\xa7\xc8\xee\x0a\x6d\x70" 72362306a36Sopenharmony_ci "\x9e\x02\xfc\xe1\xcd\xf7\xe2\xec\xc0\x34\x04\xcd\x28\x34\x2f\x61" 72462306a36Sopenharmony_ci "\x91\x72\xfe\x9c\xe9\x85\x83\xff\x8e\x4f\x12\x32\xee\xf2\x81\x83" 72562306a36Sopenharmony_ci "\xc3\xfe\x3b\x1b\x4c\x6f\xad\x73\x3b\xb5\xfc\xbc\x2e\xc2\x20\x05" 72662306a36Sopenharmony_ci "\xc5\x8e\xf1\x83\x7d\x16\x83\xb2\xc6\xf3\x4a\x26\xc1\xb2\xef\xfa" 72762306a36Sopenharmony_ci "\x88\x6b\x42\x38\x61\x1f\xcf\xdc\xde\x35\x5b\x3b\x65\x19\x03\x5b" 72862306a36Sopenharmony_ci "\xbc\x34\xf4\xde\xf9\x9c\x02\x38\x61\xb4\x6f\xc9\xd6\xe6\xc9\x07" 72962306a36Sopenharmony_ci "\x7a\xd9\x1d\x26\x91\xf7\xf7\xee\x59\x8c\xb0\xfa\xc1\x86\xd9\x1c" 73062306a36Sopenharmony_ci "\xae\xfe\x13\x09\x85\x13\x92\x70\xb4\x13\x0c\x93\xbc\x43\x79\x44" 73162306a36Sopenharmony_ci "\xf4\xfd\x44\x52\xe2\xd7\x4d\xd3\x64\xf2\xe2\x1e\x71\xf5\x4b\xff" 73262306a36Sopenharmony_ci "\x5c\xae\x82\xab\x9c\x9d\xf6\x9e\xe8\x6d\x2b\xc5\x22\x36\x3a\x0d" 73362306a36Sopenharmony_ci "\xab\xc5\x21\x97\x9b\x0d\xea\xda\x1d\xbf\x9a\x42\xd5\xc4\x48\x4e" 73462306a36Sopenharmony_ci "\x0a\xbc\xd0\x6b\xfa\x53\xdd\xef\x3c\x1b\x20\xee\x3f\xd5\x9d\x7c" 73562306a36Sopenharmony_ci "\x25\xe4\x1d\x2b\x66\x9e\x1e\xf1\x6e\x6f\x52\xc3\x16\x4d\xf4\xfb" 73662306a36Sopenharmony_ci "\x79\x30\xe9\xe4\xe5\x88\x57\xb6\xac\x7d\x5f\x42\xd6\x9f\x6d\x18" 73762306a36Sopenharmony_ci "\x77\x63\xcf\x1d\x55\x03\x40\x04\x87\xf5\x5b\xa5\x7e\x31\xcc\x7a" 73862306a36Sopenharmony_ci "\x71\x35\xc8\x86\xef\xb4\x31\x8a\xed\x6a\x1e\x01\x2d\x9e\x68\x32" 73962306a36Sopenharmony_ci "\xa9\x07\x60\x0a\x91\x81\x30\xc4\x6d\xc7\x78\xf9\x71\xad\x00\x38" 74062306a36Sopenharmony_ci "\x09\x29\x99\xa3\x33\xcb\x8b\x7a\x1a\x1d\xb9\x3d\x71\x40\x00\x3c" 74162306a36Sopenharmony_ci "\x2a\x4e\xce\xa9\xf9\x8d\x0a\xcc\x0a\x82\x91\xcd\xce\xc9\x7d\xcf" 74262306a36Sopenharmony_ci "\x8e\xc9\xb5\x5a\x7f\x88\xa4\x6b\x4d\xb5\xa8\x51\xf4\x41\x82\xe1" 74362306a36Sopenharmony_ci "\xc6\x8a\x00\x7e\x5e\x0d\xd9\x02\x0b\xfd\x64\xb6\x45\x03\x6c\x7a" 74462306a36Sopenharmony_ci "\x4e\x67\x7d\x2c\x38\x53\x2a\x3a\x23\xba\x44\x42\xca\xf5\x3e\xa6" 74562306a36Sopenharmony_ci "\x3b\xb4\x54\x32\x9b\x76\x24\xc8\x91\x7b\xdd\x64\xb1\xc0\xfd\x4c" 74662306a36Sopenharmony_ci "\xb3\x8e\x8c\x33\x4c\x70\x1c\x3a\xcd\xad\x06\x57\xfc\xcf\xec\x71" 74762306a36Sopenharmony_ci "\x9b\x1f\x5c\x3e\x4e\x46\x04\x1f\x38\x81\x47\xfb\x4c\xfd\xb4\x77" 74862306a36Sopenharmony_ci "\xa5\x24\x71\xf7\xa9\xa9\x69\x10\xb8\x55\x32\x2e\xdb\x63\x40\xd8" 74962306a36Sopenharmony_ci "\xa0\x0e\xf0\x92\x35\x05\x11\xe3\x0a\xbe\xc1\xff\xf9\xe3\xa2\x6e" 75062306a36Sopenharmony_ci "\x7f\xb2\x9f\x8c\x18\x30\x23\xc3\x58\x7e\x38\xda\x00\x77\xd9\xb4" 75162306a36Sopenharmony_ci "\x76\x3e\x4e\x4b\x94\xb2\xbb\xc1\x94\xc6\x65\x1e\x77\xca\xf9\x92" 75262306a36Sopenharmony_ci "\xee\xaa\xc0\x23\x2a\x28\x1b\xf6\xb3\xa7\x39\xc1\x22\x61\x16\x82" 75362306a36Sopenharmony_ci "\x0a\xe8\xdb\x58\x47\xa6\x7c\xbe\xf9\xc9\x09\x1b\x46\x2d\x53\x8c" 75462306a36Sopenharmony_ci "\xd7\x2b\x03\x74\x6a\xe7\x7f\x5e\x62\x29\x2c\x31\x15\x62\xa8\x46" 75562306a36Sopenharmony_ci "\x50\x5d\xc8\x2d\xb8\x54\x33\x8a\xe4\x9f\x52\x35\xc9\x5b\x91\x17" 75662306a36Sopenharmony_ci "\x8c\xcf\x2d\xd5\xca\xce\xf4\x03\xec\x9d\x18\x10\xc6\x27\x2b\x04" 75762306a36Sopenharmony_ci "\x5b\x3b\x71\xf9\xdc\x6b\x80\xd6\x3f\xdd\x4a\x8e\x9a\xdb\x1e\x69" 75862306a36Sopenharmony_ci "\x62\xa6\x95\x26\xd4\x31\x61\xc1\xa4\x1d\x57\x0d\x79\x38\xda\xd4" 75962306a36Sopenharmony_ci "\xa4\x0e\x32\x9c\xd0\xe4\x0e\x65\xff\xff\xff\xff\xff\xff\xff\xff", 76062306a36Sopenharmony_ci}; 76162306a36Sopenharmony_ci 76262306a36Sopenharmony_cistatic const struct dh_safe_prime ffdhe8192_prime = { 76362306a36Sopenharmony_ci .max_strength = 200, 76462306a36Sopenharmony_ci .p_size = 1024, 76562306a36Sopenharmony_ci .p = 76662306a36Sopenharmony_ci "\xff\xff\xff\xff\xff\xff\xff\xff\xad\xf8\x54\x58\xa2\xbb\x4a\x9a" 76762306a36Sopenharmony_ci "\xaf\xdc\x56\x20\x27\x3d\x3c\xf1\xd8\xb9\xc5\x83\xce\x2d\x36\x95" 76862306a36Sopenharmony_ci "\xa9\xe1\x36\x41\x14\x64\x33\xfb\xcc\x93\x9d\xce\x24\x9b\x3e\xf9" 76962306a36Sopenharmony_ci "\x7d\x2f\xe3\x63\x63\x0c\x75\xd8\xf6\x81\xb2\x02\xae\xc4\x61\x7a" 77062306a36Sopenharmony_ci "\xd3\xdf\x1e\xd5\xd5\xfd\x65\x61\x24\x33\xf5\x1f\x5f\x06\x6e\xd0" 77162306a36Sopenharmony_ci "\x85\x63\x65\x55\x3d\xed\x1a\xf3\xb5\x57\x13\x5e\x7f\x57\xc9\x35" 77262306a36Sopenharmony_ci "\x98\x4f\x0c\x70\xe0\xe6\x8b\x77\xe2\xa6\x89\xda\xf3\xef\xe8\x72" 77362306a36Sopenharmony_ci "\x1d\xf1\x58\xa1\x36\xad\xe7\x35\x30\xac\xca\x4f\x48\x3a\x79\x7a" 77462306a36Sopenharmony_ci "\xbc\x0a\xb1\x82\xb3\x24\xfb\x61\xd1\x08\xa9\x4b\xb2\xc8\xe3\xfb" 77562306a36Sopenharmony_ci "\xb9\x6a\xda\xb7\x60\xd7\xf4\x68\x1d\x4f\x42\xa3\xde\x39\x4d\xf4" 77662306a36Sopenharmony_ci "\xae\x56\xed\xe7\x63\x72\xbb\x19\x0b\x07\xa7\xc8\xee\x0a\x6d\x70" 77762306a36Sopenharmony_ci "\x9e\x02\xfc\xe1\xcd\xf7\xe2\xec\xc0\x34\x04\xcd\x28\x34\x2f\x61" 77862306a36Sopenharmony_ci "\x91\x72\xfe\x9c\xe9\x85\x83\xff\x8e\x4f\x12\x32\xee\xf2\x81\x83" 77962306a36Sopenharmony_ci "\xc3\xfe\x3b\x1b\x4c\x6f\xad\x73\x3b\xb5\xfc\xbc\x2e\xc2\x20\x05" 78062306a36Sopenharmony_ci "\xc5\x8e\xf1\x83\x7d\x16\x83\xb2\xc6\xf3\x4a\x26\xc1\xb2\xef\xfa" 78162306a36Sopenharmony_ci "\x88\x6b\x42\x38\x61\x1f\xcf\xdc\xde\x35\x5b\x3b\x65\x19\x03\x5b" 78262306a36Sopenharmony_ci "\xbc\x34\xf4\xde\xf9\x9c\x02\x38\x61\xb4\x6f\xc9\xd6\xe6\xc9\x07" 78362306a36Sopenharmony_ci "\x7a\xd9\x1d\x26\x91\xf7\xf7\xee\x59\x8c\xb0\xfa\xc1\x86\xd9\x1c" 78462306a36Sopenharmony_ci "\xae\xfe\x13\x09\x85\x13\x92\x70\xb4\x13\x0c\x93\xbc\x43\x79\x44" 78562306a36Sopenharmony_ci "\xf4\xfd\x44\x52\xe2\xd7\x4d\xd3\x64\xf2\xe2\x1e\x71\xf5\x4b\xff" 78662306a36Sopenharmony_ci "\x5c\xae\x82\xab\x9c\x9d\xf6\x9e\xe8\x6d\x2b\xc5\x22\x36\x3a\x0d" 78762306a36Sopenharmony_ci "\xab\xc5\x21\x97\x9b\x0d\xea\xda\x1d\xbf\x9a\x42\xd5\xc4\x48\x4e" 78862306a36Sopenharmony_ci "\x0a\xbc\xd0\x6b\xfa\x53\xdd\xef\x3c\x1b\x20\xee\x3f\xd5\x9d\x7c" 78962306a36Sopenharmony_ci "\x25\xe4\x1d\x2b\x66\x9e\x1e\xf1\x6e\x6f\x52\xc3\x16\x4d\xf4\xfb" 79062306a36Sopenharmony_ci "\x79\x30\xe9\xe4\xe5\x88\x57\xb6\xac\x7d\x5f\x42\xd6\x9f\x6d\x18" 79162306a36Sopenharmony_ci "\x77\x63\xcf\x1d\x55\x03\x40\x04\x87\xf5\x5b\xa5\x7e\x31\xcc\x7a" 79262306a36Sopenharmony_ci "\x71\x35\xc8\x86\xef\xb4\x31\x8a\xed\x6a\x1e\x01\x2d\x9e\x68\x32" 79362306a36Sopenharmony_ci "\xa9\x07\x60\x0a\x91\x81\x30\xc4\x6d\xc7\x78\xf9\x71\xad\x00\x38" 79462306a36Sopenharmony_ci "\x09\x29\x99\xa3\x33\xcb\x8b\x7a\x1a\x1d\xb9\x3d\x71\x40\x00\x3c" 79562306a36Sopenharmony_ci "\x2a\x4e\xce\xa9\xf9\x8d\x0a\xcc\x0a\x82\x91\xcd\xce\xc9\x7d\xcf" 79662306a36Sopenharmony_ci "\x8e\xc9\xb5\x5a\x7f\x88\xa4\x6b\x4d\xb5\xa8\x51\xf4\x41\x82\xe1" 79762306a36Sopenharmony_ci "\xc6\x8a\x00\x7e\x5e\x0d\xd9\x02\x0b\xfd\x64\xb6\x45\x03\x6c\x7a" 79862306a36Sopenharmony_ci "\x4e\x67\x7d\x2c\x38\x53\x2a\x3a\x23\xba\x44\x42\xca\xf5\x3e\xa6" 79962306a36Sopenharmony_ci "\x3b\xb4\x54\x32\x9b\x76\x24\xc8\x91\x7b\xdd\x64\xb1\xc0\xfd\x4c" 80062306a36Sopenharmony_ci "\xb3\x8e\x8c\x33\x4c\x70\x1c\x3a\xcd\xad\x06\x57\xfc\xcf\xec\x71" 80162306a36Sopenharmony_ci "\x9b\x1f\x5c\x3e\x4e\x46\x04\x1f\x38\x81\x47\xfb\x4c\xfd\xb4\x77" 80262306a36Sopenharmony_ci "\xa5\x24\x71\xf7\xa9\xa9\x69\x10\xb8\x55\x32\x2e\xdb\x63\x40\xd8" 80362306a36Sopenharmony_ci "\xa0\x0e\xf0\x92\x35\x05\x11\xe3\x0a\xbe\xc1\xff\xf9\xe3\xa2\x6e" 80462306a36Sopenharmony_ci "\x7f\xb2\x9f\x8c\x18\x30\x23\xc3\x58\x7e\x38\xda\x00\x77\xd9\xb4" 80562306a36Sopenharmony_ci "\x76\x3e\x4e\x4b\x94\xb2\xbb\xc1\x94\xc6\x65\x1e\x77\xca\xf9\x92" 80662306a36Sopenharmony_ci "\xee\xaa\xc0\x23\x2a\x28\x1b\xf6\xb3\xa7\x39\xc1\x22\x61\x16\x82" 80762306a36Sopenharmony_ci "\x0a\xe8\xdb\x58\x47\xa6\x7c\xbe\xf9\xc9\x09\x1b\x46\x2d\x53\x8c" 80862306a36Sopenharmony_ci "\xd7\x2b\x03\x74\x6a\xe7\x7f\x5e\x62\x29\x2c\x31\x15\x62\xa8\x46" 80962306a36Sopenharmony_ci "\x50\x5d\xc8\x2d\xb8\x54\x33\x8a\xe4\x9f\x52\x35\xc9\x5b\x91\x17" 81062306a36Sopenharmony_ci "\x8c\xcf\x2d\xd5\xca\xce\xf4\x03\xec\x9d\x18\x10\xc6\x27\x2b\x04" 81162306a36Sopenharmony_ci "\x5b\x3b\x71\xf9\xdc\x6b\x80\xd6\x3f\xdd\x4a\x8e\x9a\xdb\x1e\x69" 81262306a36Sopenharmony_ci "\x62\xa6\x95\x26\xd4\x31\x61\xc1\xa4\x1d\x57\x0d\x79\x38\xda\xd4" 81362306a36Sopenharmony_ci "\xa4\x0e\x32\x9c\xcf\xf4\x6a\xaa\x36\xad\x00\x4c\xf6\x00\xc8\x38" 81462306a36Sopenharmony_ci "\x1e\x42\x5a\x31\xd9\x51\xae\x64\xfd\xb2\x3f\xce\xc9\x50\x9d\x43" 81562306a36Sopenharmony_ci "\x68\x7f\xeb\x69\xed\xd1\xcc\x5e\x0b\x8c\xc3\xbd\xf6\x4b\x10\xef" 81662306a36Sopenharmony_ci "\x86\xb6\x31\x42\xa3\xab\x88\x29\x55\x5b\x2f\x74\x7c\x93\x26\x65" 81762306a36Sopenharmony_ci "\xcb\x2c\x0f\x1c\xc0\x1b\xd7\x02\x29\x38\x88\x39\xd2\xaf\x05\xe4" 81862306a36Sopenharmony_ci "\x54\x50\x4a\xc7\x8b\x75\x82\x82\x28\x46\xc0\xba\x35\xc3\x5f\x5c" 81962306a36Sopenharmony_ci "\x59\x16\x0c\xc0\x46\xfd\x82\x51\x54\x1f\xc6\x8c\x9c\x86\xb0\x22" 82062306a36Sopenharmony_ci "\xbb\x70\x99\x87\x6a\x46\x0e\x74\x51\xa8\xa9\x31\x09\x70\x3f\xee" 82162306a36Sopenharmony_ci "\x1c\x21\x7e\x6c\x38\x26\xe5\x2c\x51\xaa\x69\x1e\x0e\x42\x3c\xfc" 82262306a36Sopenharmony_ci "\x99\xe9\xe3\x16\x50\xc1\x21\x7b\x62\x48\x16\xcd\xad\x9a\x95\xf9" 82362306a36Sopenharmony_ci "\xd5\xb8\x01\x94\x88\xd9\xc0\xa0\xa1\xfe\x30\x75\xa5\x77\xe2\x31" 82462306a36Sopenharmony_ci "\x83\xf8\x1d\x4a\x3f\x2f\xa4\x57\x1e\xfc\x8c\xe0\xba\x8a\x4f\xe8" 82562306a36Sopenharmony_ci "\xb6\x85\x5d\xfe\x72\xb0\xa6\x6e\xde\xd2\xfb\xab\xfb\xe5\x8a\x30" 82662306a36Sopenharmony_ci "\xfa\xfa\xbe\x1c\x5d\x71\xa8\x7e\x2f\x74\x1e\xf8\xc1\xfe\x86\xfe" 82762306a36Sopenharmony_ci "\xa6\xbb\xfd\xe5\x30\x67\x7f\x0d\x97\xd1\x1d\x49\xf7\xa8\x44\x3d" 82862306a36Sopenharmony_ci "\x08\x22\xe5\x06\xa9\xf4\x61\x4e\x01\x1e\x2a\x94\x83\x8f\xf8\x8c" 82962306a36Sopenharmony_ci "\xd6\x8c\x8b\xb7\xc5\xc6\x42\x4c\xff\xff\xff\xff\xff\xff\xff\xff", 83062306a36Sopenharmony_ci}; 83162306a36Sopenharmony_ci 83262306a36Sopenharmony_cistatic int dh_ffdhe2048_create(struct crypto_template *tmpl, 83362306a36Sopenharmony_ci struct rtattr **tb) 83462306a36Sopenharmony_ci{ 83562306a36Sopenharmony_ci return __dh_safe_prime_create(tmpl, tb, &ffdhe2048_prime); 83662306a36Sopenharmony_ci} 83762306a36Sopenharmony_ci 83862306a36Sopenharmony_cistatic int dh_ffdhe3072_create(struct crypto_template *tmpl, 83962306a36Sopenharmony_ci struct rtattr **tb) 84062306a36Sopenharmony_ci{ 84162306a36Sopenharmony_ci return __dh_safe_prime_create(tmpl, tb, &ffdhe3072_prime); 84262306a36Sopenharmony_ci} 84362306a36Sopenharmony_ci 84462306a36Sopenharmony_cistatic int dh_ffdhe4096_create(struct crypto_template *tmpl, 84562306a36Sopenharmony_ci struct rtattr **tb) 84662306a36Sopenharmony_ci{ 84762306a36Sopenharmony_ci return __dh_safe_prime_create(tmpl, tb, &ffdhe4096_prime); 84862306a36Sopenharmony_ci} 84962306a36Sopenharmony_ci 85062306a36Sopenharmony_cistatic int dh_ffdhe6144_create(struct crypto_template *tmpl, 85162306a36Sopenharmony_ci struct rtattr **tb) 85262306a36Sopenharmony_ci{ 85362306a36Sopenharmony_ci return __dh_safe_prime_create(tmpl, tb, &ffdhe6144_prime); 85462306a36Sopenharmony_ci} 85562306a36Sopenharmony_ci 85662306a36Sopenharmony_cistatic int dh_ffdhe8192_create(struct crypto_template *tmpl, 85762306a36Sopenharmony_ci struct rtattr **tb) 85862306a36Sopenharmony_ci{ 85962306a36Sopenharmony_ci return __dh_safe_prime_create(tmpl, tb, &ffdhe8192_prime); 86062306a36Sopenharmony_ci} 86162306a36Sopenharmony_ci 86262306a36Sopenharmony_cistatic struct crypto_template crypto_ffdhe_templates[] = { 86362306a36Sopenharmony_ci { 86462306a36Sopenharmony_ci .name = "ffdhe2048", 86562306a36Sopenharmony_ci .create = dh_ffdhe2048_create, 86662306a36Sopenharmony_ci .module = THIS_MODULE, 86762306a36Sopenharmony_ci }, 86862306a36Sopenharmony_ci { 86962306a36Sopenharmony_ci .name = "ffdhe3072", 87062306a36Sopenharmony_ci .create = dh_ffdhe3072_create, 87162306a36Sopenharmony_ci .module = THIS_MODULE, 87262306a36Sopenharmony_ci }, 87362306a36Sopenharmony_ci { 87462306a36Sopenharmony_ci .name = "ffdhe4096", 87562306a36Sopenharmony_ci .create = dh_ffdhe4096_create, 87662306a36Sopenharmony_ci .module = THIS_MODULE, 87762306a36Sopenharmony_ci }, 87862306a36Sopenharmony_ci { 87962306a36Sopenharmony_ci .name = "ffdhe6144", 88062306a36Sopenharmony_ci .create = dh_ffdhe6144_create, 88162306a36Sopenharmony_ci .module = THIS_MODULE, 88262306a36Sopenharmony_ci }, 88362306a36Sopenharmony_ci { 88462306a36Sopenharmony_ci .name = "ffdhe8192", 88562306a36Sopenharmony_ci .create = dh_ffdhe8192_create, 88662306a36Sopenharmony_ci .module = THIS_MODULE, 88762306a36Sopenharmony_ci }, 88862306a36Sopenharmony_ci}; 88962306a36Sopenharmony_ci 89062306a36Sopenharmony_ci#else /* ! CONFIG_CRYPTO_DH_RFC7919_GROUPS */ 89162306a36Sopenharmony_ci 89262306a36Sopenharmony_cistatic struct crypto_template crypto_ffdhe_templates[] = {}; 89362306a36Sopenharmony_ci 89462306a36Sopenharmony_ci#endif /* CONFIG_CRYPTO_DH_RFC7919_GROUPS */ 89562306a36Sopenharmony_ci 89662306a36Sopenharmony_ci 89762306a36Sopenharmony_cistatic int __init dh_init(void) 89862306a36Sopenharmony_ci{ 89962306a36Sopenharmony_ci int err; 90062306a36Sopenharmony_ci 90162306a36Sopenharmony_ci err = crypto_register_kpp(&dh); 90262306a36Sopenharmony_ci if (err) 90362306a36Sopenharmony_ci return err; 90462306a36Sopenharmony_ci 90562306a36Sopenharmony_ci err = crypto_register_templates(crypto_ffdhe_templates, 90662306a36Sopenharmony_ci ARRAY_SIZE(crypto_ffdhe_templates)); 90762306a36Sopenharmony_ci if (err) { 90862306a36Sopenharmony_ci crypto_unregister_kpp(&dh); 90962306a36Sopenharmony_ci return err; 91062306a36Sopenharmony_ci } 91162306a36Sopenharmony_ci 91262306a36Sopenharmony_ci return 0; 91362306a36Sopenharmony_ci} 91462306a36Sopenharmony_ci 91562306a36Sopenharmony_cistatic void __exit dh_exit(void) 91662306a36Sopenharmony_ci{ 91762306a36Sopenharmony_ci crypto_unregister_templates(crypto_ffdhe_templates, 91862306a36Sopenharmony_ci ARRAY_SIZE(crypto_ffdhe_templates)); 91962306a36Sopenharmony_ci crypto_unregister_kpp(&dh); 92062306a36Sopenharmony_ci} 92162306a36Sopenharmony_ci 92262306a36Sopenharmony_cisubsys_initcall(dh_init); 92362306a36Sopenharmony_cimodule_exit(dh_exit); 92462306a36Sopenharmony_ciMODULE_ALIAS_CRYPTO("dh"); 92562306a36Sopenharmony_ciMODULE_LICENSE("GPL"); 92662306a36Sopenharmony_ciMODULE_DESCRIPTION("DH generic algorithm"); 927