Important changes to repositories hosted on mbed.com
Mbed hosted mercurial repositories are deprecated and are due to be permanently deleted in July 2026.
To keep a copy of this software download the repository Zip archive or clone locally using Mercurial.
It is also possible to export all your personal repositories from the account settings page.
dhm.h
00001 /** 00002 * \file dhm.h 00003 * 00004 * \brief This file contains Diffie-Hellman-Merkle (DHM) key exchange 00005 * definitions and functions. 00006 * 00007 * Diffie-Hellman-Merkle (DHM) key exchange is defined in 00008 * <em>RFC-2631: Diffie-Hellman Key Agreement Method</em> and 00009 * <em>Public-Key Cryptography Standards (PKCS) #3: Diffie 00010 * Hellman Key Agreement Standard</em>. 00011 * 00012 * <em>RFC-3526: More Modular Exponential (MODP) Diffie-Hellman groups for 00013 * Internet Key Exchange (IKE)</em> defines a number of standardized 00014 * Diffie-Hellman groups for IKE. 00015 * 00016 * <em>RFC-5114: Additional Diffie-Hellman Groups for Use with IETF 00017 * Standards</em> defines a number of standardized Diffie-Hellman 00018 * groups that can be used. 00019 * 00020 * \warning The security of the DHM key exchange relies on the proper choice 00021 * of prime modulus - optimally, it should be a safe prime. The usage 00022 * of non-safe primes both decreases the difficulty of the underlying 00023 * discrete logarithm problem and can lead to small subgroup attacks 00024 * leaking private exponent bits when invalid public keys are used 00025 * and not detected. This is especially relevant if the same DHM 00026 * parameters are reused for multiple key exchanges as in static DHM, 00027 * while the criticality of small-subgroup attacks is lower for 00028 * ephemeral DHM. 00029 * 00030 * \warning For performance reasons, the code does neither perform primality 00031 * nor safe primality tests, nor the expensive checks for invalid 00032 * subgroups. Moreover, even if these were performed, non-standardized 00033 * primes cannot be trusted because of the possibility of backdoors 00034 * that can't be effectively checked for. 00035 * 00036 * \warning Diffie-Hellman-Merkle is therefore a security risk when not using 00037 * standardized primes generated using a trustworthy ("nothing up 00038 * my sleeve") method, such as the RFC 3526 / 7919 primes. In the TLS 00039 * protocol, DH parameters need to be negotiated, so using the default 00040 * primes systematically is not always an option. If possible, use 00041 * Elliptic Curve Diffie-Hellman (ECDH), which has better performance, 00042 * and for which the TLS protocol mandates the use of standard 00043 * parameters. 00044 * 00045 */ 00046 /* 00047 * Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved 00048 * SPDX-License-Identifier: Apache-2.0 00049 * 00050 * Licensed under the Apache License, Version 2.0 (the "License"); you may 00051 * not use this file except in compliance with the License. 00052 * You may obtain a copy of the License at 00053 * 00054 * http://www.apache.org/licenses/LICENSE-2.0 00055 * 00056 * Unless required by applicable law or agreed to in writing, software 00057 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 00058 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 00059 * See the License for the specific language governing permissions and 00060 * limitations under the License. 00061 * 00062 * This file is part of Mbed TLS (https://tls.mbed.org) 00063 */ 00064 00065 #ifndef MBEDTLS_DHM_H 00066 #define MBEDTLS_DHM_H 00067 00068 #if !defined(MBEDTLS_CONFIG_FILE) 00069 #include "config.h" 00070 #else 00071 #include MBEDTLS_CONFIG_FILE 00072 #endif 00073 #include "bignum.h" 00074 00075 /* 00076 * DHM Error codes 00077 */ 00078 #define MBEDTLS_ERR_DHM_BAD_INPUT_DATA -0x3080 /**< Bad input parameters. */ 00079 #define MBEDTLS_ERR_DHM_READ_PARAMS_FAILED -0x3100 /**< Reading of the DHM parameters failed. */ 00080 #define MBEDTLS_ERR_DHM_MAKE_PARAMS_FAILED -0x3180 /**< Making of the DHM parameters failed. */ 00081 #define MBEDTLS_ERR_DHM_READ_PUBLIC_FAILED -0x3200 /**< Reading of the public values failed. */ 00082 #define MBEDTLS_ERR_DHM_MAKE_PUBLIC_FAILED -0x3280 /**< Making of the public value failed. */ 00083 #define MBEDTLS_ERR_DHM_CALC_SECRET_FAILED -0x3300 /**< Calculation of the DHM secret failed. */ 00084 #define MBEDTLS_ERR_DHM_INVALID_FORMAT -0x3380 /**< The ASN.1 data is not formatted correctly. */ 00085 #define MBEDTLS_ERR_DHM_ALLOC_FAILED -0x3400 /**< Allocation of memory failed. */ 00086 #define MBEDTLS_ERR_DHM_FILE_IO_ERROR -0x3480 /**< Read or write of file failed. */ 00087 #define MBEDTLS_ERR_DHM_HW_ACCEL_FAILED -0x3500 /**< DHM hardware accelerator failed. */ 00088 #define MBEDTLS_ERR_DHM_SET_GROUP_FAILED -0x3580 /**< Setting the modulus and generator failed. */ 00089 00090 #ifdef __cplusplus 00091 extern "C" { 00092 #endif 00093 00094 #if !defined(MBEDTLS_DHM_ALT) 00095 00096 /** 00097 * \brief The DHM context structure. 00098 */ 00099 typedef struct 00100 { 00101 size_t len ; /*!< The size of \p P in Bytes. */ 00102 mbedtls_mpi P ; /*!< The prime modulus. */ 00103 mbedtls_mpi G ; /*!< The generator. */ 00104 mbedtls_mpi X ; /*!< Our secret value. */ 00105 mbedtls_mpi GX ; /*!< Our public key = \c G^X mod \c P. */ 00106 mbedtls_mpi GY ; /*!< The public key of the peer = \c G^Y mod \c P. */ 00107 mbedtls_mpi K ; /*!< The shared secret = \c G^(XY) mod \c P. */ 00108 mbedtls_mpi RP ; /*!< The cached value = \c R^2 mod \c P. */ 00109 mbedtls_mpi Vi ; /*!< The blinding value. */ 00110 mbedtls_mpi Vf ; /*!< The unblinding value. */ 00111 mbedtls_mpi pX ; /*!< The previous \c X. */ 00112 } 00113 mbedtls_dhm_context; 00114 00115 #else /* MBEDTLS_DHM_ALT */ 00116 #include "dhm_alt.h" 00117 #endif /* MBEDTLS_DHM_ALT */ 00118 00119 /** 00120 * \brief This function initializes the DHM context. 00121 * 00122 * \param ctx The DHM context to initialize. 00123 */ 00124 void mbedtls_dhm_init( mbedtls_dhm_context *ctx ); 00125 00126 /** 00127 * \brief This function parses the ServerKeyExchange parameters. 00128 * 00129 * \param ctx The DHM context. 00130 * \param p On input, *p must be the start of the input buffer. 00131 * On output, *p is updated to point to the end of the data 00132 * that has been read. On success, this is the first byte 00133 * past the end of the ServerKeyExchange parameters. 00134 * On error, this is the point at which an error has been 00135 * detected, which is usually not useful except to debug 00136 * failures. 00137 * \param end The end of the input buffer. 00138 * 00139 * \return \c 0 on success. 00140 * \return An \c MBEDTLS_ERR_DHM_XXX error code on failure. 00141 */ 00142 int mbedtls_dhm_read_params( mbedtls_dhm_context *ctx, 00143 unsigned char **p, 00144 const unsigned char *end ); 00145 00146 /** 00147 * \brief This function sets up and writes the ServerKeyExchange 00148 * parameters. 00149 * 00150 * \note The destination buffer must be large enough to hold 00151 * the reduced binary presentation of the modulus, the generator 00152 * and the public key, each wrapped with a 2-byte length field. 00153 * It is the responsibility of the caller to ensure that enough 00154 * space is available. Refer to \c mbedtls_mpi_size to computing 00155 * the byte-size of an MPI. 00156 * 00157 * \note This function assumes that \c ctx->P and \c ctx->G 00158 * have already been properly set. For that, use 00159 * mbedtls_dhm_set_group() below in conjunction with 00160 * mbedtls_mpi_read_binary() and mbedtls_mpi_read_string(). 00161 * 00162 * \param ctx The DHM context. 00163 * \param x_size The private key size in Bytes. 00164 * \param olen The number of characters written. 00165 * \param output The destination buffer. 00166 * \param f_rng The RNG function. 00167 * \param p_rng The RNG context. 00168 * 00169 * \return \c 0 on success. 00170 * \return An \c MBEDTLS_ERR_DHM_XXX error code on failure. 00171 */ 00172 int mbedtls_dhm_make_params( mbedtls_dhm_context *ctx, int x_size, 00173 unsigned char *output, size_t *olen, 00174 int (*f_rng)(void *, unsigned char *, size_t), 00175 void *p_rng ); 00176 00177 /** 00178 * \brief This function sets the prime modulus and generator. 00179 * 00180 * \note This function can be used to set \p P, \p G 00181 * in preparation for mbedtls_dhm_make_params(). 00182 * 00183 * \param ctx The DHM context. 00184 * \param P The MPI holding the DHM prime modulus. 00185 * \param G The MPI holding the DHM generator. 00186 * 00187 * \return \c 0 if successful. 00188 * \return An \c MBEDTLS_ERR_DHM_XXX error code on failure. 00189 */ 00190 int mbedtls_dhm_set_group( mbedtls_dhm_context *ctx, 00191 const mbedtls_mpi *P, 00192 const mbedtls_mpi *G ); 00193 00194 /** 00195 * \brief This function imports the public value of the peer, G^Y. 00196 * 00197 * \param ctx The DHM context. 00198 * \param input The input buffer containing the G^Y value of the peer. 00199 * \param ilen The size of the input buffer. 00200 * 00201 * \return \c 0 on success. 00202 * \return An \c MBEDTLS_ERR_DHM_XXX error code on failure. 00203 */ 00204 int mbedtls_dhm_read_public( mbedtls_dhm_context *ctx, 00205 const unsigned char *input, size_t ilen ); 00206 00207 /** 00208 * \brief This function creates its own private key, \c X, and 00209 * exports \c G^X. 00210 * 00211 * \note The destination buffer is always fully written 00212 * so as to contain a big-endian representation of G^X mod P. 00213 * If it is larger than ctx->len, it is padded accordingly 00214 * with zero-bytes at the beginning. 00215 * 00216 * \param ctx The DHM context. 00217 * \param x_size The private key size in Bytes. 00218 * \param output The destination buffer. 00219 * \param olen The length of the destination buffer. Must be at least 00220 * equal to ctx->len (the size of \c P). 00221 * \param f_rng The RNG function. 00222 * \param p_rng The RNG context. 00223 * 00224 * \return \c 0 on success. 00225 * \return An \c MBEDTLS_ERR_DHM_XXX error code on failure. 00226 */ 00227 int mbedtls_dhm_make_public( mbedtls_dhm_context *ctx, int x_size, 00228 unsigned char *output, size_t olen, 00229 int (*f_rng)(void *, unsigned char *, size_t), 00230 void *p_rng ); 00231 00232 /** 00233 * \brief This function derives and exports the shared secret 00234 * \c (G^Y)^X mod \c P. 00235 * 00236 * \note If \p f_rng is not NULL, it is used to blind the input as 00237 * a countermeasure against timing attacks. Blinding is used 00238 * only if our private key \c X is re-used, and not used 00239 * otherwise. We recommend always passing a non-NULL 00240 * \p f_rng argument. 00241 * 00242 * \param ctx The DHM context. 00243 * \param output The destination buffer. 00244 * \param output_size The size of the destination buffer. Must be at least 00245 * the size of ctx->len (the size of \c P). 00246 * \param olen On exit, holds the actual number of Bytes written. 00247 * \param f_rng The RNG function, for blinding purposes. 00248 * \param p_rng The RNG context. 00249 * 00250 * \return \c 0 on success. 00251 * \return An \c MBEDTLS_ERR_DHM_XXX error code on failure. 00252 */ 00253 int mbedtls_dhm_calc_secret( mbedtls_dhm_context *ctx, 00254 unsigned char *output, size_t output_size, size_t *olen, 00255 int (*f_rng)(void *, unsigned char *, size_t), 00256 void *p_rng ); 00257 00258 /** 00259 * \brief This function frees and clears the components of a DHM context. 00260 * 00261 * \param ctx The DHM context to free and clear. 00262 */ 00263 void mbedtls_dhm_free( mbedtls_dhm_context *ctx ); 00264 00265 #if defined(MBEDTLS_ASN1_PARSE_C) 00266 /** \ingroup x509_module */ 00267 /** 00268 * \brief This function parses DHM parameters in PEM or DER format. 00269 * 00270 * \param dhm The DHM context to initialize. 00271 * \param dhmin The input buffer. 00272 * \param dhminlen The size of the buffer, including the terminating null 00273 * Byte for PEM data. 00274 * 00275 * \return \c 0 on success. 00276 * \return An \c MBEDTLS_ERR_DHM_XXX or \c MBEDTLS_ERR_PEM_XXX error code 00277 * error code on failure. 00278 */ 00279 int mbedtls_dhm_parse_dhm( mbedtls_dhm_context *dhm, const unsigned char *dhmin, 00280 size_t dhminlen ); 00281 00282 #if defined(MBEDTLS_FS_IO) 00283 /** \ingroup x509_module */ 00284 /** 00285 * \brief This function loads and parses DHM parameters from a file. 00286 * 00287 * \param dhm The DHM context to load the parameters to. 00288 * \param path The filename to read the DHM parameters from. 00289 * 00290 * \return \c 0 on success. 00291 * \return An \c MBEDTLS_ERR_DHM_XXX or \c MBEDTLS_ERR_PEM_XXX error code 00292 * error code on failure. 00293 */ 00294 int mbedtls_dhm_parse_dhmfile( mbedtls_dhm_context *dhm, const char *path ); 00295 #endif /* MBEDTLS_FS_IO */ 00296 #endif /* MBEDTLS_ASN1_PARSE_C */ 00297 00298 /** 00299 * \brief The DMH checkup routine. 00300 * 00301 * \return \c 0 on success. 00302 * \return \c 1 on failure. 00303 */ 00304 int mbedtls_dhm_self_test( int verbose ); 00305 00306 #ifdef __cplusplus 00307 } 00308 #endif 00309 00310 /** 00311 * RFC 3526, RFC 5114 and RFC 7919 standardize a number of 00312 * Diffie-Hellman groups, some of which are included here 00313 * for use within the SSL/TLS module and the user's convenience 00314 * when configuring the Diffie-Hellman parameters by hand 00315 * through \c mbedtls_ssl_conf_dh_param. 00316 * 00317 * The following lists the source of the above groups in the standards: 00318 * - RFC 5114 section 2.2: 2048-bit MODP Group with 224-bit Prime Order Subgroup 00319 * - RFC 3526 section 3: 2048-bit MODP Group 00320 * - RFC 3526 section 4: 3072-bit MODP Group 00321 * - RFC 3526 section 5: 4096-bit MODP Group 00322 * - RFC 7919 section A.1: ffdhe2048 00323 * - RFC 7919 section A.2: ffdhe3072 00324 * - RFC 7919 section A.3: ffdhe4096 00325 * - RFC 7919 section A.4: ffdhe6144 00326 * - RFC 7919 section A.5: ffdhe8192 00327 * 00328 * The constants with suffix "_p" denote the chosen prime moduli, while 00329 * the constants with suffix "_g" denote the chosen generator 00330 * of the associated prime field. 00331 * 00332 * The constants further suffixed with "_bin" are provided in binary format, 00333 * while all other constants represent null-terminated strings holding the 00334 * hexadecimal presentation of the respective numbers. 00335 * 00336 * The primes from RFC 3526 and RFC 7919 have been generating by the following 00337 * trust-worthy procedure: 00338 * - Fix N in { 2048, 3072, 4096, 6144, 8192 } and consider the N-bit number 00339 * the first and last 64 bits are all 1, and the remaining N - 128 bits of 00340 * which are 0x7ff...ff. 00341 * - Add the smallest multiple of the first N - 129 bits of the binary expansion 00342 * of pi (for RFC 5236) or e (for RFC 7919) to this intermediate bit-string 00343 * such that the resulting integer is a safe-prime. 00344 * - The result is the respective RFC 3526 / 7919 prime, and the corresponding 00345 * generator is always chosen to be 2 (which is a square for these prime, 00346 * hence the corresponding subgroup has order (p-1)/2 and avoids leaking a 00347 * bit in the private exponent). 00348 * 00349 */ 00350 00351 #if !defined(MBEDTLS_DEPRECATED_REMOVED) 00352 00353 #if defined(MBEDTLS_DEPRECATED_WARNING) 00354 #define MBEDTLS_DEPRECATED __attribute__((deprecated)) 00355 MBEDTLS_DEPRECATED typedef char const * mbedtls_deprecated_constant_t; 00356 #define MBEDTLS_DEPRECATED_STRING_CONSTANT( VAL ) \ 00357 ( (mbedtls_deprecated_constant_t) ( VAL ) ) 00358 #else 00359 #define MBEDTLS_DEPRECATED_STRING_CONSTANT( VAL ) VAL 00360 #endif /* ! MBEDTLS_DEPRECATED_WARNING */ 00361 00362 /** 00363 * \warning The origin of the primes in RFC 5114 is not documented and 00364 * their use therefore constitutes a security risk! 00365 * 00366 * \deprecated The hex-encoded primes from RFC 5114 are deprecated and are 00367 * likely to be removed in a future version of the library without 00368 * replacement. 00369 */ 00370 00371 /** 00372 * The hexadecimal presentation of the prime underlying the 00373 * 2048-bit MODP Group with 224-bit Prime Order Subgroup, as defined 00374 * in <em>RFC-5114: Additional Diffie-Hellman Groups for Use with 00375 * IETF Standards</em>. 00376 */ 00377 #define MBEDTLS_DHM_RFC5114_MODP_2048_P \ 00378 MBEDTLS_DEPRECATED_STRING_CONSTANT( \ 00379 "AD107E1E9123A9D0D660FAA79559C51FA20D64E5683B9FD1" \ 00380 "B54B1597B61D0A75E6FA141DF95A56DBAF9A3C407BA1DF15" \ 00381 "EB3D688A309C180E1DE6B85A1274A0A66D3F8152AD6AC212" \ 00382 "9037C9EDEFDA4DF8D91E8FEF55B7394B7AD5B7D0B6C12207" \ 00383 "C9F98D11ED34DBF6C6BA0B2C8BBC27BE6A00E0A0B9C49708" \ 00384 "B3BF8A317091883681286130BC8985DB1602E714415D9330" \ 00385 "278273C7DE31EFDC7310F7121FD5A07415987D9ADC0A486D" \ 00386 "CDF93ACC44328387315D75E198C641A480CD86A1B9E587E8" \ 00387 "BE60E69CC928B2B9C52172E413042E9B23F10B0E16E79763" \ 00388 "C9B53DCF4BA80A29E3FB73C16B8E75B97EF363E2FFA31F71" \ 00389 "CF9DE5384E71B81C0AC4DFFE0C10E64F" ) 00390 00391 /** 00392 * The hexadecimal presentation of the chosen generator of the 2048-bit MODP 00393 * Group with 224-bit Prime Order Subgroup, as defined in <em>RFC-5114: 00394 * Additional Diffie-Hellman Groups for Use with IETF Standards</em>. 00395 */ 00396 #define MBEDTLS_DHM_RFC5114_MODP_2048_G \ 00397 MBEDTLS_DEPRECATED_STRING_CONSTANT( \ 00398 "AC4032EF4F2D9AE39DF30B5C8FFDAC506CDEBE7B89998CAF" \ 00399 "74866A08CFE4FFE3A6824A4E10B9A6F0DD921F01A70C4AFA" \ 00400 "AB739D7700C29F52C57DB17C620A8652BE5E9001A8D66AD7" \ 00401 "C17669101999024AF4D027275AC1348BB8A762D0521BC98A" \ 00402 "E247150422EA1ED409939D54DA7460CDB5F6C6B250717CBE" \ 00403 "F180EB34118E98D119529A45D6F834566E3025E316A330EF" \ 00404 "BB77A86F0C1AB15B051AE3D428C8F8ACB70A8137150B8EEB" \ 00405 "10E183EDD19963DDD9E263E4770589EF6AA21E7F5F2FF381" \ 00406 "B539CCE3409D13CD566AFBB48D6C019181E1BCFE94B30269" \ 00407 "EDFE72FE9B6AA4BD7B5A0F1C71CFFF4C19C418E1F6EC0179" \ 00408 "81BC087F2A7065B384B890D3191F2BFA" ) 00409 00410 /** 00411 * The hexadecimal presentation of the prime underlying the 2048-bit MODP 00412 * Group, as defined in <em>RFC-3526: More Modular Exponential (MODP) 00413 * Diffie-Hellman groups for Internet Key Exchange (IKE)</em>. 00414 * 00415 * \deprecated The hex-encoded primes from RFC 3625 are deprecated and 00416 * superseded by the corresponding macros providing them as 00417 * binary constants. Their hex-encoded constants are likely 00418 * to be removed in a future version of the library. 00419 * 00420 */ 00421 #define MBEDTLS_DHM_RFC3526_MODP_2048_P \ 00422 MBEDTLS_DEPRECATED_STRING_CONSTANT( \ 00423 "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \ 00424 "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \ 00425 "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \ 00426 "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \ 00427 "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" \ 00428 "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" \ 00429 "83655D23DCA3AD961C62F356208552BB9ED529077096966D" \ 00430 "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" \ 00431 "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" \ 00432 "DE2BCBF6955817183995497CEA956AE515D2261898FA0510" \ 00433 "15728E5A8AACAA68FFFFFFFFFFFFFFFF" ) 00434 00435 /** 00436 * The hexadecimal presentation of the chosen generator of the 2048-bit MODP 00437 * Group, as defined in <em>RFC-3526: More Modular Exponential (MODP) 00438 * Diffie-Hellman groups for Internet Key Exchange (IKE)</em>. 00439 */ 00440 #define MBEDTLS_DHM_RFC3526_MODP_2048_G \ 00441 MBEDTLS_DEPRECATED_STRING_CONSTANT( "02" ) 00442 00443 /** 00444 * The hexadecimal presentation of the prime underlying the 3072-bit MODP 00445 * Group, as defined in <em>RFC-3072: More Modular Exponential (MODP) 00446 * Diffie-Hellman groups for Internet Key Exchange (IKE)</em>. 00447 */ 00448 #define MBEDTLS_DHM_RFC3526_MODP_3072_P \ 00449 MBEDTLS_DEPRECATED_STRING_CONSTANT( \ 00450 "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \ 00451 "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \ 00452 "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \ 00453 "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \ 00454 "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" \ 00455 "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" \ 00456 "83655D23DCA3AD961C62F356208552BB9ED529077096966D" \ 00457 "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" \ 00458 "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" \ 00459 "DE2BCBF6955817183995497CEA956AE515D2261898FA0510" \ 00460 "15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64" \ 00461 "ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7" \ 00462 "ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B" \ 00463 "F12FFA06D98A0864D87602733EC86A64521F2B18177B200C" \ 00464 "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31" \ 00465 "43DB5BFCE0FD108E4B82D120A93AD2CAFFFFFFFFFFFFFFFF" ) 00466 00467 /** 00468 * The hexadecimal presentation of the chosen generator of the 3072-bit MODP 00469 * Group, as defined in <em>RFC-3526: More Modular Exponential (MODP) 00470 * Diffie-Hellman groups for Internet Key Exchange (IKE)</em>. 00471 */ 00472 #define MBEDTLS_DHM_RFC3526_MODP_3072_G \ 00473 MBEDTLS_DEPRECATED_STRING_CONSTANT( "02" ) 00474 00475 /** 00476 * The hexadecimal presentation of the prime underlying the 4096-bit MODP 00477 * Group, as defined in <em>RFC-3526: More Modular Exponential (MODP) 00478 * Diffie-Hellman groups for Internet Key Exchange (IKE)</em>. 00479 */ 00480 #define MBEDTLS_DHM_RFC3526_MODP_4096_P \ 00481 MBEDTLS_DEPRECATED_STRING_CONSTANT( \ 00482 "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \ 00483 "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \ 00484 "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \ 00485 "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \ 00486 "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" \ 00487 "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" \ 00488 "83655D23DCA3AD961C62F356208552BB9ED529077096966D" \ 00489 "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" \ 00490 "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" \ 00491 "DE2BCBF6955817183995497CEA956AE515D2261898FA0510" \ 00492 "15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64" \ 00493 "ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7" \ 00494 "ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B" \ 00495 "F12FFA06D98A0864D87602733EC86A64521F2B18177B200C" \ 00496 "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31" \ 00497 "43DB5BFCE0FD108E4B82D120A92108011A723C12A787E6D7" \ 00498 "88719A10BDBA5B2699C327186AF4E23C1A946834B6150BDA" \ 00499 "2583E9CA2AD44CE8DBBBC2DB04DE8EF92E8EFC141FBECAA6" \ 00500 "287C59474E6BC05D99B2964FA090C3A2233BA186515BE7ED" \ 00501 "1F612970CEE2D7AFB81BDD762170481CD0069127D5B05AA9" \ 00502 "93B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934063199" \ 00503 "FFFFFFFFFFFFFFFF" ) 00504 00505 /** 00506 * The hexadecimal presentation of the chosen generator of the 4096-bit MODP 00507 * Group, as defined in <em>RFC-3526: More Modular Exponential (MODP) 00508 * Diffie-Hellman groups for Internet Key Exchange (IKE)</em>. 00509 */ 00510 #define MBEDTLS_DHM_RFC3526_MODP_4096_G \ 00511 MBEDTLS_DEPRECATED_STRING_CONSTANT( "02" ) 00512 00513 #endif /* MBEDTLS_DEPRECATED_REMOVED */ 00514 00515 /* 00516 * Trustworthy DHM parameters in binary form 00517 */ 00518 00519 #define MBEDTLS_DHM_RFC3526_MODP_2048_P_BIN { \ 00520 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \ 00521 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, \ 00522 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, \ 00523 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, \ 00524 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, \ 00525 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, \ 00526 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, \ 00527 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, \ 00528 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, \ 00529 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, \ 00530 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, \ 00531 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, \ 00532 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, \ 00533 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, \ 00534 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, \ 00535 0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, \ 00536 0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, \ 00537 0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, \ 00538 0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, \ 00539 0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, \ 00540 0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, \ 00541 0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, \ 00542 0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, \ 00543 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, \ 00544 0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, \ 00545 0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, \ 00546 0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, \ 00547 0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, \ 00548 0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, \ 00549 0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, \ 00550 0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAC, 0xAA, 0x68, \ 00551 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF } 00552 00553 #define MBEDTLS_DHM_RFC3526_MODP_2048_G_BIN { 0x02 } 00554 00555 #define MBEDTLS_DHM_RFC3526_MODP_3072_P_BIN { \ 00556 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \ 00557 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, \ 00558 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, \ 00559 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, \ 00560 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, \ 00561 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, \ 00562 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, \ 00563 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, \ 00564 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, \ 00565 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, \ 00566 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, \ 00567 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, \ 00568 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, \ 00569 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, \ 00570 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, \ 00571 0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, \ 00572 0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, \ 00573 0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, \ 00574 0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, \ 00575 0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, \ 00576 0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, \ 00577 0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, \ 00578 0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, \ 00579 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, \ 00580 0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, \ 00581 0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, \ 00582 0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, \ 00583 0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, \ 00584 0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, \ 00585 0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, \ 00586 0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D, \ 00587 0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33, \ 00588 0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64, \ 00589 0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A, \ 00590 0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D, \ 00591 0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7, \ 00592 0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7, \ 00593 0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D, \ 00594 0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B, \ 00595 0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64, \ 00596 0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64, \ 00597 0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C, \ 00598 0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C, \ 00599 0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2, \ 00600 0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31, \ 00601 0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E, \ 00602 0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x3A, 0xD2, 0xCA, \ 00603 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF } 00604 00605 #define MBEDTLS_DHM_RFC3526_MODP_3072_G_BIN { 0x02 } 00606 00607 #define MBEDTLS_DHM_RFC3526_MODP_4096_P_BIN { \ 00608 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \ 00609 0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, \ 00610 0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, \ 00611 0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, \ 00612 0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, \ 00613 0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, \ 00614 0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, \ 00615 0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, \ 00616 0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, \ 00617 0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, \ 00618 0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, \ 00619 0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, \ 00620 0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, \ 00621 0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, \ 00622 0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, \ 00623 0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, \ 00624 0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, \ 00625 0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, \ 00626 0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, \ 00627 0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, \ 00628 0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, \ 00629 0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, \ 00630 0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, \ 00631 0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, \ 00632 0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, \ 00633 0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, \ 00634 0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, \ 00635 0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, \ 00636 0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, \ 00637 0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, \ 00638 0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D, \ 00639 0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33, \ 00640 0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64, \ 00641 0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A, \ 00642 0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D, \ 00643 0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7, \ 00644 0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7, \ 00645 0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D, \ 00646 0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B, \ 00647 0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64, \ 00648 0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64, \ 00649 0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C, \ 00650 0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C, \ 00651 0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2, \ 00652 0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31, \ 00653 0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E, \ 00654 0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x21, 0x08, 0x01, \ 00655 0x1A, 0x72, 0x3C, 0x12, 0xA7, 0x87, 0xE6, 0xD7, \ 00656 0x88, 0x71, 0x9A, 0x10, 0xBD, 0xBA, 0x5B, 0x26, \ 00657 0x99, 0xC3, 0x27, 0x18, 0x6A, 0xF4, 0xE2, 0x3C, \ 00658 0x1A, 0x94, 0x68, 0x34, 0xB6, 0x15, 0x0B, 0xDA, \ 00659 0x25, 0x83, 0xE9, 0xCA, 0x2A, 0xD4, 0x4C, 0xE8, \ 00660 0xDB, 0xBB, 0xC2, 0xDB, 0x04, 0xDE, 0x8E, 0xF9, \ 00661 0x2E, 0x8E, 0xFC, 0x14, 0x1F, 0xBE, 0xCA, 0xA6, \ 00662 0x28, 0x7C, 0x59, 0x47, 0x4E, 0x6B, 0xC0, 0x5D, \ 00663 0x99, 0xB2, 0x96, 0x4F, 0xA0, 0x90, 0xC3, 0xA2, \ 00664 0x23, 0x3B, 0xA1, 0x86, 0x51, 0x5B, 0xE7, 0xED, \ 00665 0x1F, 0x61, 0x29, 0x70, 0xCE, 0xE2, 0xD7, 0xAF, \ 00666 0xB8, 0x1B, 0xDD, 0x76, 0x21, 0x70, 0x48, 0x1C, \ 00667 0xD0, 0x06, 0x91, 0x27, 0xD5, 0xB0, 0x5A, 0xA9, \ 00668 0x93, 0xB4, 0xEA, 0x98, 0x8D, 0x8F, 0xDD, 0xC1, \ 00669 0x86, 0xFF, 0xB7, 0xDC, 0x90, 0xA6, 0xC0, 0x8F, \ 00670 0x4D, 0xF4, 0x35, 0xC9, 0x34, 0x06, 0x31, 0x99, \ 00671 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF } 00672 00673 #define MBEDTLS_DHM_RFC3526_MODP_4096_G_BIN { 0x02 } 00674 00675 #define MBEDTLS_DHM_RFC7919_FFDHE2048_P_BIN { \ 00676 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \ 00677 0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, \ 00678 0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, \ 00679 0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, \ 00680 0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, \ 00681 0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, \ 00682 0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, \ 00683 0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, \ 00684 0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, \ 00685 0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, \ 00686 0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, \ 00687 0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, \ 00688 0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, \ 00689 0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, \ 00690 0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, \ 00691 0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, \ 00692 0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, \ 00693 0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, \ 00694 0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, \ 00695 0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, \ 00696 0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, \ 00697 0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, \ 00698 0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, \ 00699 0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, \ 00700 0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, \ 00701 0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, \ 00702 0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, \ 00703 0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, \ 00704 0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, \ 00705 0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, \ 00706 0x88, 0x6B, 0x42, 0x38, 0x61, 0x28, 0x5C, 0x97, \ 00707 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, } 00708 00709 #define MBEDTLS_DHM_RFC7919_FFDHE2048_G_BIN { 0x02 } 00710 00711 #define MBEDTLS_DHM_RFC7919_FFDHE3072_P_BIN { \ 00712 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \ 00713 0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, \ 00714 0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, \ 00715 0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, \ 00716 0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, \ 00717 0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, \ 00718 0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, \ 00719 0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, \ 00720 0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, \ 00721 0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, \ 00722 0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, \ 00723 0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, \ 00724 0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, \ 00725 0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, \ 00726 0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, \ 00727 0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, \ 00728 0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, \ 00729 0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, \ 00730 0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, \ 00731 0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, \ 00732 0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, \ 00733 0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, \ 00734 0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, \ 00735 0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, \ 00736 0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, \ 00737 0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, \ 00738 0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, \ 00739 0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, \ 00740 0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, \ 00741 0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, \ 00742 0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, \ 00743 0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, \ 00744 0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, \ 00745 0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, \ 00746 0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, \ 00747 0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, \ 00748 0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, \ 00749 0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, \ 00750 0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, \ 00751 0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, \ 00752 0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, \ 00753 0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, \ 00754 0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, \ 00755 0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, \ 00756 0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, \ 00757 0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, \ 00758 0x25, 0xE4, 0x1D, 0x2B, 0x66, 0xC6, 0x2E, 0x37, \ 00759 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF } 00760 00761 #define MBEDTLS_DHM_RFC7919_FFDHE3072_G_BIN { 0x02 } 00762 00763 #define MBEDTLS_DHM_RFC7919_FFDHE4096_P_BIN { \ 00764 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \ 00765 0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, \ 00766 0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, \ 00767 0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, \ 00768 0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, \ 00769 0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, \ 00770 0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, \ 00771 0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, \ 00772 0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, \ 00773 0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, \ 00774 0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, \ 00775 0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, \ 00776 0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, \ 00777 0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, \ 00778 0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, \ 00779 0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, \ 00780 0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, \ 00781 0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, \ 00782 0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, \ 00783 0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, \ 00784 0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, \ 00785 0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, \ 00786 0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, \ 00787 0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, \ 00788 0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, \ 00789 0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, \ 00790 0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, \ 00791 0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, \ 00792 0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, \ 00793 0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, \ 00794 0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, \ 00795 0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, \ 00796 0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, \ 00797 0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, \ 00798 0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, \ 00799 0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, \ 00800 0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, \ 00801 0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, \ 00802 0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, \ 00803 0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, \ 00804 0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, \ 00805 0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, \ 00806 0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, \ 00807 0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, \ 00808 0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, \ 00809 0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, \ 00810 0x25, 0xE4, 0x1D, 0x2B, 0x66, 0x9E, 0x1E, 0xF1, \ 00811 0x6E, 0x6F, 0x52, 0xC3, 0x16, 0x4D, 0xF4, 0xFB, \ 00812 0x79, 0x30, 0xE9, 0xE4, 0xE5, 0x88, 0x57, 0xB6, \ 00813 0xAC, 0x7D, 0x5F, 0x42, 0xD6, 0x9F, 0x6D, 0x18, \ 00814 0x77, 0x63, 0xCF, 0x1D, 0x55, 0x03, 0x40, 0x04, \ 00815 0x87, 0xF5, 0x5B, 0xA5, 0x7E, 0x31, 0xCC, 0x7A, \ 00816 0x71, 0x35, 0xC8, 0x86, 0xEF, 0xB4, 0x31, 0x8A, \ 00817 0xED, 0x6A, 0x1E, 0x01, 0x2D, 0x9E, 0x68, 0x32, \ 00818 0xA9, 0x07, 0x60, 0x0A, 0x91, 0x81, 0x30, 0xC4, \ 00819 0x6D, 0xC7, 0x78, 0xF9, 0x71, 0xAD, 0x00, 0x38, \ 00820 0x09, 0x29, 0x99, 0xA3, 0x33, 0xCB, 0x8B, 0x7A, \ 00821 0x1A, 0x1D, 0xB9, 0x3D, 0x71, 0x40, 0x00, 0x3C, \ 00822 0x2A, 0x4E, 0xCE, 0xA9, 0xF9, 0x8D, 0x0A, 0xCC, \ 00823 0x0A, 0x82, 0x91, 0xCD, 0xCE, 0xC9, 0x7D, 0xCF, \ 00824 0x8E, 0xC9, 0xB5, 0x5A, 0x7F, 0x88, 0xA4, 0x6B, \ 00825 0x4D, 0xB5, 0xA8, 0x51, 0xF4, 0x41, 0x82, 0xE1, \ 00826 0xC6, 0x8A, 0x00, 0x7E, 0x5E, 0x65, 0x5F, 0x6A, \ 00827 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF } 00828 00829 #define MBEDTLS_DHM_RFC7919_FFDHE4096_G_BIN { 0x02 } 00830 00831 #define MBEDTLS_DHM_RFC7919_FFDHE6144_P_BIN { \ 00832 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \ 00833 0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, \ 00834 0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, \ 00835 0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, \ 00836 0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, \ 00837 0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, \ 00838 0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, \ 00839 0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, \ 00840 0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, \ 00841 0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, \ 00842 0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, \ 00843 0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, \ 00844 0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, \ 00845 0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, \ 00846 0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, \ 00847 0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, \ 00848 0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, \ 00849 0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, \ 00850 0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, \ 00851 0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, \ 00852 0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, \ 00853 0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, \ 00854 0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, \ 00855 0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, \ 00856 0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, \ 00857 0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, \ 00858 0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, \ 00859 0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, \ 00860 0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, \ 00861 0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, \ 00862 0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, \ 00863 0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, \ 00864 0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, \ 00865 0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, \ 00866 0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, \ 00867 0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, \ 00868 0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, \ 00869 0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, \ 00870 0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, \ 00871 0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, \ 00872 0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, \ 00873 0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, \ 00874 0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, \ 00875 0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, \ 00876 0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, \ 00877 0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, \ 00878 0x25, 0xE4, 0x1D, 0x2B, 0x66, 0x9E, 0x1E, 0xF1, \ 00879 0x6E, 0x6F, 0x52, 0xC3, 0x16, 0x4D, 0xF4, 0xFB, \ 00880 0x79, 0x30, 0xE9, 0xE4, 0xE5, 0x88, 0x57, 0xB6, \ 00881 0xAC, 0x7D, 0x5F, 0x42, 0xD6, 0x9F, 0x6D, 0x18, \ 00882 0x77, 0x63, 0xCF, 0x1D, 0x55, 0x03, 0x40, 0x04, \ 00883 0x87, 0xF5, 0x5B, 0xA5, 0x7E, 0x31, 0xCC, 0x7A, \ 00884 0x71, 0x35, 0xC8, 0x86, 0xEF, 0xB4, 0x31, 0x8A, \ 00885 0xED, 0x6A, 0x1E, 0x01, 0x2D, 0x9E, 0x68, 0x32, \ 00886 0xA9, 0x07, 0x60, 0x0A, 0x91, 0x81, 0x30, 0xC4, \ 00887 0x6D, 0xC7, 0x78, 0xF9, 0x71, 0xAD, 0x00, 0x38, \ 00888 0x09, 0x29, 0x99, 0xA3, 0x33, 0xCB, 0x8B, 0x7A, \ 00889 0x1A, 0x1D, 0xB9, 0x3D, 0x71, 0x40, 0x00, 0x3C, \ 00890 0x2A, 0x4E, 0xCE, 0xA9, 0xF9, 0x8D, 0x0A, 0xCC, \ 00891 0x0A, 0x82, 0x91, 0xCD, 0xCE, 0xC9, 0x7D, 0xCF, \ 00892 0x8E, 0xC9, 0xB5, 0x5A, 0x7F, 0x88, 0xA4, 0x6B, \ 00893 0x4D, 0xB5, 0xA8, 0x51, 0xF4, 0x41, 0x82, 0xE1, \ 00894 0xC6, 0x8A, 0x00, 0x7E, 0x5E, 0x0D, 0xD9, 0x02, \ 00895 0x0B, 0xFD, 0x64, 0xB6, 0x45, 0x03, 0x6C, 0x7A, \ 00896 0x4E, 0x67, 0x7D, 0x2C, 0x38, 0x53, 0x2A, 0x3A, \ 00897 0x23, 0xBA, 0x44, 0x42, 0xCA, 0xF5, 0x3E, 0xA6, \ 00898 0x3B, 0xB4, 0x54, 0x32, 0x9B, 0x76, 0x24, 0xC8, \ 00899 0x91, 0x7B, 0xDD, 0x64, 0xB1, 0xC0, 0xFD, 0x4C, \ 00900 0xB3, 0x8E, 0x8C, 0x33, 0x4C, 0x70, 0x1C, 0x3A, \ 00901 0xCD, 0xAD, 0x06, 0x57, 0xFC, 0xCF, 0xEC, 0x71, \ 00902 0x9B, 0x1F, 0x5C, 0x3E, 0x4E, 0x46, 0x04, 0x1F, \ 00903 0x38, 0x81, 0x47, 0xFB, 0x4C, 0xFD, 0xB4, 0x77, \ 00904 0xA5, 0x24, 0x71, 0xF7, 0xA9, 0xA9, 0x69, 0x10, \ 00905 0xB8, 0x55, 0x32, 0x2E, 0xDB, 0x63, 0x40, 0xD8, \ 00906 0xA0, 0x0E, 0xF0, 0x92, 0x35, 0x05, 0x11, 0xE3, \ 00907 0x0A, 0xBE, 0xC1, 0xFF, 0xF9, 0xE3, 0xA2, 0x6E, \ 00908 0x7F, 0xB2, 0x9F, 0x8C, 0x18, 0x30, 0x23, 0xC3, \ 00909 0x58, 0x7E, 0x38, 0xDA, 0x00, 0x77, 0xD9, 0xB4, \ 00910 0x76, 0x3E, 0x4E, 0x4B, 0x94, 0xB2, 0xBB, 0xC1, \ 00911 0x94, 0xC6, 0x65, 0x1E, 0x77, 0xCA, 0xF9, 0x92, \ 00912 0xEE, 0xAA, 0xC0, 0x23, 0x2A, 0x28, 0x1B, 0xF6, \ 00913 0xB3, 0xA7, 0x39, 0xC1, 0x22, 0x61, 0x16, 0x82, \ 00914 0x0A, 0xE8, 0xDB, 0x58, 0x47, 0xA6, 0x7C, 0xBE, \ 00915 0xF9, 0xC9, 0x09, 0x1B, 0x46, 0x2D, 0x53, 0x8C, \ 00916 0xD7, 0x2B, 0x03, 0x74, 0x6A, 0xE7, 0x7F, 0x5E, \ 00917 0x62, 0x29, 0x2C, 0x31, 0x15, 0x62, 0xA8, 0x46, \ 00918 0x50, 0x5D, 0xC8, 0x2D, 0xB8, 0x54, 0x33, 0x8A, \ 00919 0xE4, 0x9F, 0x52, 0x35, 0xC9, 0x5B, 0x91, 0x17, \ 00920 0x8C, 0xCF, 0x2D, 0xD5, 0xCA, 0xCE, 0xF4, 0x03, \ 00921 0xEC, 0x9D, 0x18, 0x10, 0xC6, 0x27, 0x2B, 0x04, \ 00922 0x5B, 0x3B, 0x71, 0xF9, 0xDC, 0x6B, 0x80, 0xD6, \ 00923 0x3F, 0xDD, 0x4A, 0x8E, 0x9A, 0xDB, 0x1E, 0x69, \ 00924 0x62, 0xA6, 0x95, 0x26, 0xD4, 0x31, 0x61, 0xC1, \ 00925 0xA4, 0x1D, 0x57, 0x0D, 0x79, 0x38, 0xDA, 0xD4, \ 00926 0xA4, 0x0E, 0x32, 0x9C, 0xD0, 0xE4, 0x0E, 0x65, \ 00927 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF } 00928 00929 #define MBEDTLS_DHM_RFC7919_FFDHE6144_G_BIN { 0x02 } 00930 00931 #define MBEDTLS_DHM_RFC7919_FFDHE8192_P_BIN { \ 00932 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \ 00933 0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, \ 00934 0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, \ 00935 0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, \ 00936 0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, \ 00937 0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, \ 00938 0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, \ 00939 0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, \ 00940 0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, \ 00941 0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, \ 00942 0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, \ 00943 0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, \ 00944 0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, \ 00945 0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, \ 00946 0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, \ 00947 0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, \ 00948 0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, \ 00949 0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, \ 00950 0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, \ 00951 0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, \ 00952 0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, \ 00953 0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, \ 00954 0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, \ 00955 0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, \ 00956 0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, \ 00957 0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, \ 00958 0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, \ 00959 0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, \ 00960 0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, \ 00961 0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, \ 00962 0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, \ 00963 0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, \ 00964 0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, \ 00965 0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, \ 00966 0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, \ 00967 0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, \ 00968 0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, \ 00969 0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, \ 00970 0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, \ 00971 0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, \ 00972 0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, \ 00973 0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, \ 00974 0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, \ 00975 0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, \ 00976 0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, \ 00977 0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, \ 00978 0x25, 0xE4, 0x1D, 0x2B, 0x66, 0x9E, 0x1E, 0xF1, \ 00979 0x6E, 0x6F, 0x52, 0xC3, 0x16, 0x4D, 0xF4, 0xFB, \ 00980 0x79, 0x30, 0xE9, 0xE4, 0xE5, 0x88, 0x57, 0xB6, \ 00981 0xAC, 0x7D, 0x5F, 0x42, 0xD6, 0x9F, 0x6D, 0x18, \ 00982 0x77, 0x63, 0xCF, 0x1D, 0x55, 0x03, 0x40, 0x04, \ 00983 0x87, 0xF5, 0x5B, 0xA5, 0x7E, 0x31, 0xCC, 0x7A, \ 00984 0x71, 0x35, 0xC8, 0x86, 0xEF, 0xB4, 0x31, 0x8A, \ 00985 0xED, 0x6A, 0x1E, 0x01, 0x2D, 0x9E, 0x68, 0x32, \ 00986 0xA9, 0x07, 0x60, 0x0A, 0x91, 0x81, 0x30, 0xC4, \ 00987 0x6D, 0xC7, 0x78, 0xF9, 0x71, 0xAD, 0x00, 0x38, \ 00988 0x09, 0x29, 0x99, 0xA3, 0x33, 0xCB, 0x8B, 0x7A, \ 00989 0x1A, 0x1D, 0xB9, 0x3D, 0x71, 0x40, 0x00, 0x3C, \ 00990 0x2A, 0x4E, 0xCE, 0xA9, 0xF9, 0x8D, 0x0A, 0xCC, \ 00991 0x0A, 0x82, 0x91, 0xCD, 0xCE, 0xC9, 0x7D, 0xCF, \ 00992 0x8E, 0xC9, 0xB5, 0x5A, 0x7F, 0x88, 0xA4, 0x6B, \ 00993 0x4D, 0xB5, 0xA8, 0x51, 0xF4, 0x41, 0x82, 0xE1, \ 00994 0xC6, 0x8A, 0x00, 0x7E, 0x5E, 0x0D, 0xD9, 0x02, \ 00995 0x0B, 0xFD, 0x64, 0xB6, 0x45, 0x03, 0x6C, 0x7A, \ 00996 0x4E, 0x67, 0x7D, 0x2C, 0x38, 0x53, 0x2A, 0x3A, \ 00997 0x23, 0xBA, 0x44, 0x42, 0xCA, 0xF5, 0x3E, 0xA6, \ 00998 0x3B, 0xB4, 0x54, 0x32, 0x9B, 0x76, 0x24, 0xC8, \ 00999 0x91, 0x7B, 0xDD, 0x64, 0xB1, 0xC0, 0xFD, 0x4C, \ 01000 0xB3, 0x8E, 0x8C, 0x33, 0x4C, 0x70, 0x1C, 0x3A, \ 01001 0xCD, 0xAD, 0x06, 0x57, 0xFC, 0xCF, 0xEC, 0x71, \ 01002 0x9B, 0x1F, 0x5C, 0x3E, 0x4E, 0x46, 0x04, 0x1F, \ 01003 0x38, 0x81, 0x47, 0xFB, 0x4C, 0xFD, 0xB4, 0x77, \ 01004 0xA5, 0x24, 0x71, 0xF7, 0xA9, 0xA9, 0x69, 0x10, \ 01005 0xB8, 0x55, 0x32, 0x2E, 0xDB, 0x63, 0x40, 0xD8, \ 01006 0xA0, 0x0E, 0xF0, 0x92, 0x35, 0x05, 0x11, 0xE3, \ 01007 0x0A, 0xBE, 0xC1, 0xFF, 0xF9, 0xE3, 0xA2, 0x6E, \ 01008 0x7F, 0xB2, 0x9F, 0x8C, 0x18, 0x30, 0x23, 0xC3, \ 01009 0x58, 0x7E, 0x38, 0xDA, 0x00, 0x77, 0xD9, 0xB4, \ 01010 0x76, 0x3E, 0x4E, 0x4B, 0x94, 0xB2, 0xBB, 0xC1, \ 01011 0x94, 0xC6, 0x65, 0x1E, 0x77, 0xCA, 0xF9, 0x92, \ 01012 0xEE, 0xAA, 0xC0, 0x23, 0x2A, 0x28, 0x1B, 0xF6, \ 01013 0xB3, 0xA7, 0x39, 0xC1, 0x22, 0x61, 0x16, 0x82, \ 01014 0x0A, 0xE8, 0xDB, 0x58, 0x47, 0xA6, 0x7C, 0xBE, \ 01015 0xF9, 0xC9, 0x09, 0x1B, 0x46, 0x2D, 0x53, 0x8C, \ 01016 0xD7, 0x2B, 0x03, 0x74, 0x6A, 0xE7, 0x7F, 0x5E, \ 01017 0x62, 0x29, 0x2C, 0x31, 0x15, 0x62, 0xA8, 0x46, \ 01018 0x50, 0x5D, 0xC8, 0x2D, 0xB8, 0x54, 0x33, 0x8A, \ 01019 0xE4, 0x9F, 0x52, 0x35, 0xC9, 0x5B, 0x91, 0x17, \ 01020 0x8C, 0xCF, 0x2D, 0xD5, 0xCA, 0xCE, 0xF4, 0x03, \ 01021 0xEC, 0x9D, 0x18, 0x10, 0xC6, 0x27, 0x2B, 0x04, \ 01022 0x5B, 0x3B, 0x71, 0xF9, 0xDC, 0x6B, 0x80, 0xD6, \ 01023 0x3F, 0xDD, 0x4A, 0x8E, 0x9A, 0xDB, 0x1E, 0x69, \ 01024 0x62, 0xA6, 0x95, 0x26, 0xD4, 0x31, 0x61, 0xC1, \ 01025 0xA4, 0x1D, 0x57, 0x0D, 0x79, 0x38, 0xDA, 0xD4, \ 01026 0xA4, 0x0E, 0x32, 0x9C, 0xCF, 0xF4, 0x6A, 0xAA, \ 01027 0x36, 0xAD, 0x00, 0x4C, 0xF6, 0x00, 0xC8, 0x38, \ 01028 0x1E, 0x42, 0x5A, 0x31, 0xD9, 0x51, 0xAE, 0x64, \ 01029 0xFD, 0xB2, 0x3F, 0xCE, 0xC9, 0x50, 0x9D, 0x43, \ 01030 0x68, 0x7F, 0xEB, 0x69, 0xED, 0xD1, 0xCC, 0x5E, \ 01031 0x0B, 0x8C, 0xC3, 0xBD, 0xF6, 0x4B, 0x10, 0xEF, \ 01032 0x86, 0xB6, 0x31, 0x42, 0xA3, 0xAB, 0x88, 0x29, \ 01033 0x55, 0x5B, 0x2F, 0x74, 0x7C, 0x93, 0x26, 0x65, \ 01034 0xCB, 0x2C, 0x0F, 0x1C, 0xC0, 0x1B, 0xD7, 0x02, \ 01035 0x29, 0x38, 0x88, 0x39, 0xD2, 0xAF, 0x05, 0xE4, \ 01036 0x54, 0x50, 0x4A, 0xC7, 0x8B, 0x75, 0x82, 0x82, \ 01037 0x28, 0x46, 0xC0, 0xBA, 0x35, 0xC3, 0x5F, 0x5C, \ 01038 0x59, 0x16, 0x0C, 0xC0, 0x46, 0xFD, 0x82, 0x51, \ 01039 0x54, 0x1F, 0xC6, 0x8C, 0x9C, 0x86, 0xB0, 0x22, \ 01040 0xBB, 0x70, 0x99, 0x87, 0x6A, 0x46, 0x0E, 0x74, \ 01041 0x51, 0xA8, 0xA9, 0x31, 0x09, 0x70, 0x3F, 0xEE, \ 01042 0x1C, 0x21, 0x7E, 0x6C, 0x38, 0x26, 0xE5, 0x2C, \ 01043 0x51, 0xAA, 0x69, 0x1E, 0x0E, 0x42, 0x3C, 0xFC, \ 01044 0x99, 0xE9, 0xE3, 0x16, 0x50, 0xC1, 0x21, 0x7B, \ 01045 0x62, 0x48, 0x16, 0xCD, 0xAD, 0x9A, 0x95, 0xF9, \ 01046 0xD5, 0xB8, 0x01, 0x94, 0x88, 0xD9, 0xC0, 0xA0, \ 01047 0xA1, 0xFE, 0x30, 0x75, 0xA5, 0x77, 0xE2, 0x31, \ 01048 0x83, 0xF8, 0x1D, 0x4A, 0x3F, 0x2F, 0xA4, 0x57, \ 01049 0x1E, 0xFC, 0x8C, 0xE0, 0xBA, 0x8A, 0x4F, 0xE8, \ 01050 0xB6, 0x85, 0x5D, 0xFE, 0x72, 0xB0, 0xA6, 0x6E, \ 01051 0xDE, 0xD2, 0xFB, 0xAB, 0xFB, 0xE5, 0x8A, 0x30, \ 01052 0xFA, 0xFA, 0xBE, 0x1C, 0x5D, 0x71, 0xA8, 0x7E, \ 01053 0x2F, 0x74, 0x1E, 0xF8, 0xC1, 0xFE, 0x86, 0xFE, \ 01054 0xA6, 0xBB, 0xFD, 0xE5, 0x30, 0x67, 0x7F, 0x0D, \ 01055 0x97, 0xD1, 0x1D, 0x49, 0xF7, 0xA8, 0x44, 0x3D, \ 01056 0x08, 0x22, 0xE5, 0x06, 0xA9, 0xF4, 0x61, 0x4E, \ 01057 0x01, 0x1E, 0x2A, 0x94, 0x83, 0x8F, 0xF8, 0x8C, \ 01058 0xD6, 0x8C, 0x8B, 0xB7, 0xC5, 0xC6, 0x42, 0x4C, \ 01059 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF } 01060 01061 #define MBEDTLS_DHM_RFC7919_FFDHE8192_G_BIN { 0x02 } 01062 01063 #endif /* dhm.h */
Generated on Tue Jul 12 2022 12:43:49 by
