From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-12.6 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C83AEC4363D for ; Fri, 25 Sep 2020 13:03:26 +0000 (UTC) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 3268920756 for ; Fri, 25 Sep 2020 13:03:26 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b="lL+PE4Xc" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 3268920756 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linaro.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Received: from localhost ([::1]:40578 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1kLnNl-00054f-9G for qemu-devel@archiver.kernel.org; Fri, 25 Sep 2020 09:03:25 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:48388) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1kLnCw-0007rp-Si for qemu-devel@nongnu.org; Fri, 25 Sep 2020 08:52:14 -0400 Received: from mail-wm1-x32d.google.com ([2a00:1450:4864:20::32d]:53738) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1kLnCu-0001RU-3c for qemu-devel@nongnu.org; Fri, 25 Sep 2020 08:52:14 -0400 Received: by mail-wm1-x32d.google.com with SMTP id x23so2927646wmi.3 for ; Fri, 25 Sep 2020 05:52:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=2gc/eAiM6fc/9xFq9v+gXHzceFFWcZXTxfGGQdY3TKo=; b=lL+PE4Xcu99+Yf301fWBDOYOKBRFX4BGFnZJ9UM7e6YQx7nI3w4CwXaBrlDtW24dA7 9yH0LGCvLuy+6BePjaLK1Vg1wGGk81aoyFSpUs2ZOC/clFHjzRFJ5XlSSO7/i7x/vkjN g0roGJSrbKQve6pS7JsMrp+kDyc9YYHw+3/f04F6DOnoJ1nQpXYmGJDG/RvPf7xuxmx7 ouVpX/eJImiwkjssNy4cVXCMVUjntSt3ydwH8eVazGioYkm5+7tClPR79hX3PJa1G9Od Mm7sOQrVgX+nxEgdIFkHH8pbG3IUlI2fURFwA6jXVZzmfqpo/yNQtoPA9PVNEdHPHoJs BbsQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=2gc/eAiM6fc/9xFq9v+gXHzceFFWcZXTxfGGQdY3TKo=; b=LshQ5juMAg9NyBcvAzw9yzFSmq2/V0jMfbU5YNUHcolFJZR01niF3Kz1BSh5ixc1nG 4eyFWvpbX9G70CyxlLv4R6VtnwIGMz5F8KCO7948gUUomUmg4GBscHKE6His/pymbEV3 KvhqD8rAoedPk9gBu3b5UtzpxpQyQPykh16z8BNtHtCCJOycV7e/PLbe/S1vzwWerJ8u yIS1BPU3lWYoS105pg9qD3fo4hxyg2JyMZFqWxFt8ir5Z/yjsat3kiTtmErLQmWo22vw b1rtbN/uxKCJ1taHjelDreDv7LbRqJzxTTSQ1+hjlmyzuVVtE/w2PmMvWBihNV42iFNg z3lw== X-Gm-Message-State: AOAM530TMNHFRgFENs7DMb/20lmht/UnBPUu/l1P2jKA2cZoDyzw/fxP CumPgkMLP+zqfY/rXrr8m71lhg== X-Google-Smtp-Source: ABdhPJxeBSupo8i5C6YvM07AtjMhDiqQ1xpAwpiJVWc7s3N20uU84fMRZW1sEDeRezUSSYo0TsiUYQ== X-Received: by 2002:a1c:ed19:: with SMTP id l25mr3025751wmh.49.1601038330538; Fri, 25 Sep 2020 05:52:10 -0700 (PDT) Received: from zen.linaroharston ([51.148.130.216]) by smtp.gmail.com with ESMTPSA id l126sm2849103wmf.39.2020.09.25.05.51.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 25 Sep 2020 05:52:00 -0700 (PDT) Received: from zen.lan (localhost [127.0.0.1]) by zen.linaroharston (Postfix) with ESMTP id 5E0241FF9B; Fri, 25 Sep 2020 13:51:49 +0100 (BST) From: =?UTF-8?q?Alex=20Benn=C3=A9e?= To: qemu-devel@nongnu.org, maxim.uvarov@linaro.org, joakim.bech@linaro.org, ilias.apalodimas@linaro.org, tomas.winkler@intel.com, yang.huang@intel.com, bing.zhu@intel.com, Matti.Moell@opensynergy.com, hmo@opensynergy.com Subject: [RFC PATCH 12/19] tools/vhost-user-rpmb: import hmac_sha256 functions Date: Fri, 25 Sep 2020 13:51:40 +0100 Message-Id: <20200925125147.26943-13-alex.bennee@linaro.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20200925125147.26943-1-alex.bennee@linaro.org> References: <20200925125147.26943-1-alex.bennee@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Received-SPF: pass client-ip=2a00:1450:4864:20::32d; envelope-from=alex.bennee@linaro.org; helo=mail-wm1-x32d.google.com X-detected-operating-system: by eggs.gnu.org: No matching host in p0f cache. That's all we know. X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: jean-philippe@linaro.org, takahiro.akashi@linaro.org, virtualization@lists.linuxfoundation.org, =?UTF-8?q?Alex=20Benn=C3=A9e?= , arnd@linaro.org, stratos-dev@op-lists.linaro.org Errors-To: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Sender: "Qemu-devel" We need to calculate HMAC-256SHA as part of the protocol. To avoid making the daemon dependent on QEMU's internal crypto library we import the functions here. Signed-off-by: Alex Bennée --- tools/vhost-user-rpmb/hmac_sha256.h | 87 ++++++++ tools/vhost-user-rpmb/hmac_sha256.c | 331 ++++++++++++++++++++++++++++ tools/vhost-user-rpmb/meson.build | 3 +- 3 files changed, 420 insertions(+), 1 deletion(-) create mode 100644 tools/vhost-user-rpmb/hmac_sha256.h create mode 100644 tools/vhost-user-rpmb/hmac_sha256.c diff --git a/tools/vhost-user-rpmb/hmac_sha256.h b/tools/vhost-user-rpmb/hmac_sha256.h new file mode 100644 index 000000000000..e67a5baedecd --- /dev/null +++ b/tools/vhost-user-rpmb/hmac_sha256.h @@ -0,0 +1,87 @@ +/* + * HMAC-SHA-256 implementation + * Last update: 06/15/2005 + * Issue date: 06/15/2005 + * + * Copyright (C) 2005 Olivier Gay + * All rights reserved. + * + * Copyright (c) 2016, 2020, Linaro Limited + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * 3. Neither the name of the project nor the names of its contributors + * may be used to endorse or promote products derived from this software + * without specific prior written permission. + * + * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + */ + +#ifndef HMAC_SHA256_H +#define HMAC_SHA256_H + +#define SHA256_DIGEST_SIZE ( 256 / 8) +#define SHA256_BLOCK_SIZE ( 512 / 8) + +#ifndef SHA2_TYPES +#define SHA2_TYPES +typedef unsigned char uint8; +typedef unsigned int uint32; +typedef unsigned long long uint64; +#endif + +typedef struct { + unsigned int tot_len; + unsigned int len; + unsigned char block[2 * SHA256_BLOCK_SIZE]; + uint32 h[8]; +} sha256_ctx; + +void sha256_init(sha256_ctx * ctx); +void sha256_update(sha256_ctx *ctx, const unsigned char *message, + unsigned int len); +void sha256_final(sha256_ctx *ctx, unsigned char *digest); +void sha256(const unsigned char *message, unsigned int len, + unsigned char *digest); + +typedef struct { + sha256_ctx ctx_inside; + sha256_ctx ctx_outside; + + /* for hmac_reinit */ + sha256_ctx ctx_inside_reinit; + sha256_ctx ctx_outside_reinit; + + unsigned char block_ipad[SHA256_BLOCK_SIZE]; + unsigned char block_opad[SHA256_BLOCK_SIZE]; +} hmac_sha256_ctx; + +void hmac_sha256_init(hmac_sha256_ctx *ctx, const unsigned char *key, + unsigned int key_size); +void hmac_sha256_reinit(hmac_sha256_ctx *ctx); +void hmac_sha256_update(hmac_sha256_ctx *ctx, const unsigned char *message, + unsigned int message_len); +void hmac_sha256_final(hmac_sha256_ctx *ctx, unsigned char *mac, + unsigned int mac_size); +void hmac_sha256(const unsigned char *key, unsigned int key_size, + const unsigned char *message, unsigned int message_len, + unsigned char *mac, unsigned mac_size); + +#endif /* !HMAC_SHA256_H */ diff --git a/tools/vhost-user-rpmb/hmac_sha256.c b/tools/vhost-user-rpmb/hmac_sha256.c new file mode 100644 index 000000000000..f6640a46c616 --- /dev/null +++ b/tools/vhost-user-rpmb/hmac_sha256.c @@ -0,0 +1,331 @@ +/* + * HMAC-SHA-256 implementation + * Last update: 06/15/2005 + * Issue date: 06/15/2005 + * + * Copyright (C) 2005 Olivier Gay + * All rights reserved. + * + * Copyright (c) 2016, 2020 Linaro Limited + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * 3. Neither the name of the project nor the names of its contributors + * may be used to endorse or promote products derived from this software + * without specific prior written permission. + * + * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + */ + +#include + +#include "hmac_sha256.h" + +/* SHA256 functions */ + +#define SHFR(x, n) (x >> n) +#define ROTR(x, n) ((x >> n) | (x << ((sizeof(x) << 3) - n))) +#define ROTL(x, n) ((x << n) | (x >> ((sizeof(x) << 3) - n))) +#define CH(x, y, z) ((x & y) ^ (~x & z)) +#define MAJ(x, y, z) ((x & y) ^ (x & z) ^ (y & z)) + +#define SHA256_F1(x) (ROTR(x, 2) ^ ROTR(x, 13) ^ ROTR(x, 22)) +#define SHA256_F2(x) (ROTR(x, 6) ^ ROTR(x, 11) ^ ROTR(x, 25)) +#define SHA256_F3(x) (ROTR(x, 7) ^ ROTR(x, 18) ^ SHFR(x, 3)) +#define SHA256_F4(x) (ROTR(x, 17) ^ ROTR(x, 19) ^ SHFR(x, 10)) + +#define UNPACK32(x, str) \ +{ \ + *((str) + 3) = (uint8) ((x) ); \ + *((str) + 2) = (uint8) ((x) >> 8); \ + *((str) + 1) = (uint8) ((x) >> 16); \ + *((str) + 0) = (uint8) ((x) >> 24); \ +} + +#define PACK32(str, x) \ +{ \ + *(x) = ((uint32) *((str) + 3) ) \ + | ((uint32) *((str) + 2) << 8) \ + | ((uint32) *((str) + 1) << 16) \ + | ((uint32) *((str) + 0) << 24); \ +} + +#define UNPACK64(x, str) \ +{ \ + *((str) + 7) = (uint8) ((x) ); \ + *((str) + 6) = (uint8) ((x) >> 8); \ + *((str) + 5) = (uint8) ((x) >> 16); \ + *((str) + 4) = (uint8) ((x) >> 24); \ + *((str) + 3) = (uint8) ((x) >> 32); \ + *((str) + 2) = (uint8) ((x) >> 40); \ + *((str) + 1) = (uint8) ((x) >> 48); \ + *((str) + 0) = (uint8) ((x) >> 56); \ +} + +#define PACK64(str, x) \ +{ \ + *(x) = ((uint64) *((str) + 7) ) \ + | ((uint64) *((str) + 6) << 8) \ + | ((uint64) *((str) + 5) << 16) \ + | ((uint64) *((str) + 4) << 24) \ + | ((uint64) *((str) + 3) << 32) \ + | ((uint64) *((str) + 2) << 40) \ + | ((uint64) *((str) + 1) << 48) \ + | ((uint64) *((str) + 0) << 56); \ +} + +#define SHA256_SCR(i) \ +{ \ + w[i] = SHA256_F4(w[i - 2]) + w[i - 7] \ + + SHA256_F3(w[i - 15]) + w[i - 16]; \ +} + +uint32 sha256_h0[8] = + {0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a, + 0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19}; + +uint32 sha256_k[64] = + {0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, + 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5, + 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, + 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174, + 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, + 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da, + 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, + 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967, + 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, + 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85, + 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, + 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070, + 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, + 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3, + 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, + 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2}; + +/* SHA-256 functions */ + +static void sha256_transf(sha256_ctx *ctx, const unsigned char *message, + unsigned int block_nb) +{ + uint32 w[64]; + uint32 wv[8]; + uint32 t1, t2; + const unsigned char *sub_block; + int i; + int j; + + for (i = 0; i < (int) block_nb; i++) { + sub_block = message + (i << 6); + + for (j = 0; j < 16; j++) { + PACK32(&sub_block[j << 2], &w[j]); + } + + for (j = 16; j < 64; j++) { + SHA256_SCR(j); + } + + for (j = 0; j < 8; j++) { + wv[j] = ctx->h[j]; + } + + for (j = 0; j < 64; j++) { + t1 = wv[7] + SHA256_F2(wv[4]) + CH(wv[4], wv[5], wv[6]) + + sha256_k[j] + w[j]; + t2 = SHA256_F1(wv[0]) + MAJ(wv[0], wv[1], wv[2]); + wv[7] = wv[6]; + wv[6] = wv[5]; + wv[5] = wv[4]; + wv[4] = wv[3] + t1; + wv[3] = wv[2]; + wv[2] = wv[1]; + wv[1] = wv[0]; + wv[0] = t1 + t2; + } + + for (j = 0; j < 8; j++) { + ctx->h[j] += wv[j]; + } + } +} + +void sha256(const unsigned char *message, unsigned int len, unsigned char *digest) +{ + sha256_ctx ctx; + + sha256_init(&ctx); + sha256_update(&ctx, message, len); + sha256_final(&ctx, digest); +} + +void sha256_init(sha256_ctx *ctx) +{ + int i; + for (i = 0; i < 8; i++) { + ctx->h[i] = sha256_h0[i]; + } + + ctx->len = 0; + ctx->tot_len = 0; +} + +void sha256_update(sha256_ctx *ctx, const unsigned char *message, + unsigned int len) +{ + unsigned int block_nb; + unsigned int new_len, rem_len, tmp_len; + const unsigned char *shifted_message; + + tmp_len = SHA256_BLOCK_SIZE - ctx->len; + rem_len = len < tmp_len ? len : tmp_len; + + memcpy(&ctx->block[ctx->len], message, rem_len); + + if (ctx->len + len < SHA256_BLOCK_SIZE) { + ctx->len += len; + return; + } + + new_len = len - rem_len; + block_nb = new_len / SHA256_BLOCK_SIZE; + + shifted_message = message + rem_len; + + sha256_transf(ctx, ctx->block, 1); + sha256_transf(ctx, shifted_message, block_nb); + + rem_len = new_len % SHA256_BLOCK_SIZE; + + memcpy(ctx->block, &shifted_message[block_nb << 6], + rem_len); + + ctx->len = rem_len; + ctx->tot_len += (block_nb + 1) << 6; +} + +void sha256_final(sha256_ctx *ctx, unsigned char *digest) +{ + unsigned int block_nb; + unsigned int pm_len; + unsigned int len_b; + int i; + + block_nb = (1 + ((SHA256_BLOCK_SIZE - 9) + < (ctx->len % SHA256_BLOCK_SIZE))); + + len_b = (ctx->tot_len + ctx->len) << 3; + pm_len = block_nb << 6; + + memset(ctx->block + ctx->len, 0, pm_len - ctx->len); + ctx->block[ctx->len] = 0x80; + UNPACK32(len_b, ctx->block + pm_len - 4); + + sha256_transf(ctx, ctx->block, block_nb); + + for (i = 0 ; i < 8; i++) { + UNPACK32(ctx->h[i], &digest[i << 2]); + } +} + +/* HMAC-SHA-256 functions */ + +void hmac_sha256_init(hmac_sha256_ctx *ctx, const unsigned char *key, + unsigned int key_size) +{ + unsigned int fill; + unsigned int num; + + const unsigned char *key_used; + unsigned char key_temp[SHA256_DIGEST_SIZE]; + int i; + + if (key_size == SHA256_BLOCK_SIZE) { + key_used = key; + num = SHA256_BLOCK_SIZE; + } else { + if (key_size > SHA256_BLOCK_SIZE){ + num = SHA256_DIGEST_SIZE; + sha256(key, key_size, key_temp); + key_used = key_temp; + } else { /* key_size > SHA256_BLOCK_SIZE */ + key_used = key; + num = key_size; + } + fill = SHA256_BLOCK_SIZE - num; + + memset(ctx->block_ipad + num, 0x36, fill); + memset(ctx->block_opad + num, 0x5c, fill); + } + + for (i = 0; i < (int) num; i++) { + ctx->block_ipad[i] = key_used[i] ^ 0x36; + ctx->block_opad[i] = key_used[i] ^ 0x5c; + } + + sha256_init(&ctx->ctx_inside); + sha256_update(&ctx->ctx_inside, ctx->block_ipad, SHA256_BLOCK_SIZE); + + sha256_init(&ctx->ctx_outside); + sha256_update(&ctx->ctx_outside, ctx->block_opad, + SHA256_BLOCK_SIZE); + + /* for hmac_reinit */ + memcpy(&ctx->ctx_inside_reinit, &ctx->ctx_inside, + sizeof(sha256_ctx)); + memcpy(&ctx->ctx_outside_reinit, &ctx->ctx_outside, + sizeof(sha256_ctx)); +} + +void hmac_sha256_reinit(hmac_sha256_ctx *ctx) +{ + memcpy(&ctx->ctx_inside, &ctx->ctx_inside_reinit, + sizeof(sha256_ctx)); + memcpy(&ctx->ctx_outside, &ctx->ctx_outside_reinit, + sizeof(sha256_ctx)); +} + +void hmac_sha256_update(hmac_sha256_ctx *ctx, const unsigned char *message, + unsigned int message_len) +{ + sha256_update(&ctx->ctx_inside, message, message_len); +} + +void hmac_sha256_final(hmac_sha256_ctx *ctx, unsigned char *mac, + unsigned int mac_size) +{ + unsigned char digest_inside[SHA256_DIGEST_SIZE]; + unsigned char mac_temp[SHA256_DIGEST_SIZE]; + + sha256_final(&ctx->ctx_inside, digest_inside); + sha256_update(&ctx->ctx_outside, digest_inside, SHA256_DIGEST_SIZE); + sha256_final(&ctx->ctx_outside, mac_temp); + memcpy(mac, mac_temp, mac_size); +} + +void hmac_sha256(const unsigned char *key, unsigned int key_size, + const unsigned char *message, unsigned int message_len, + unsigned char *mac, unsigned mac_size) +{ + hmac_sha256_ctx ctx; + + hmac_sha256_init(&ctx, key, key_size); + hmac_sha256_update(&ctx, message, message_len); + hmac_sha256_final(&ctx, mac, mac_size); +} diff --git a/tools/vhost-user-rpmb/meson.build b/tools/vhost-user-rpmb/meson.build index cf80bedd99ac..f964837d151d 100644 --- a/tools/vhost-user-rpmb/meson.build +++ b/tools/vhost-user-rpmb/meson.build @@ -1,5 +1,6 @@ executable('vhost-user-rpmb', files( - 'main.c'), + 'main.c', + 'hmac_sha256.c'), dependencies: [qemuutil, glib, gio], link_with: [libvhost_user], install: true, -- 2.20.1 From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-12.6 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3DED8C47420 for ; Fri, 25 Sep 2020 12:52:19 +0000 (UTC) Received: from whitealder.osuosl.org (smtp1.osuosl.org [140.211.166.138]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id D92A52075E for ; Fri, 25 Sep 2020 12:52:18 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b="lL+PE4Xc" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org D92A52075E Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linaro.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=virtualization-bounces@lists.linux-foundation.org Received: from localhost (localhost [127.0.0.1]) by whitealder.osuosl.org (Postfix) with ESMTP id AD17386DD6; Fri, 25 Sep 2020 12:52:18 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from whitealder.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YR0n8luWH73k; Fri, 25 Sep 2020 12:52:16 +0000 (UTC) Received: from lists.linuxfoundation.org (lf-lists.osuosl.org [140.211.9.56]) by whitealder.osuosl.org (Postfix) with ESMTP id 6D4EF86DF2; Fri, 25 Sep 2020 12:52:16 +0000 (UTC) Received: from lf-lists.osuosl.org (localhost [127.0.0.1]) by lists.linuxfoundation.org (Postfix) with ESMTP id 50205C1AD7; Fri, 25 Sep 2020 12:52:16 +0000 (UTC) Received: from whitealder.osuosl.org (smtp1.osuosl.org [140.211.166.138]) by lists.linuxfoundation.org (Postfix) with ESMTP id 2B9DAC0890 for ; Fri, 25 Sep 2020 12:52:14 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by whitealder.osuosl.org (Postfix) with ESMTP id 1970F86DD4 for ; Fri, 25 Sep 2020 12:52:14 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from whitealder.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O7qU9+4uQSoH for ; Fri, 25 Sep 2020 12:52:12 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.7.6 Received: from mail-wm1-f51.google.com (mail-wm1-f51.google.com [209.85.128.51]) by whitealder.osuosl.org (Postfix) with ESMTPS id 2989786DD9 for ; Fri, 25 Sep 2020 12:52:12 +0000 (UTC) Received: by mail-wm1-f51.google.com with SMTP id q9so2947743wmj.2 for ; Fri, 25 Sep 2020 05:52:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=2gc/eAiM6fc/9xFq9v+gXHzceFFWcZXTxfGGQdY3TKo=; b=lL+PE4Xcu99+Yf301fWBDOYOKBRFX4BGFnZJ9UM7e6YQx7nI3w4CwXaBrlDtW24dA7 9yH0LGCvLuy+6BePjaLK1Vg1wGGk81aoyFSpUs2ZOC/clFHjzRFJ5XlSSO7/i7x/vkjN g0roGJSrbKQve6pS7JsMrp+kDyc9YYHw+3/f04F6DOnoJ1nQpXYmGJDG/RvPf7xuxmx7 ouVpX/eJImiwkjssNy4cVXCMVUjntSt3ydwH8eVazGioYkm5+7tClPR79hX3PJa1G9Od Mm7sOQrVgX+nxEgdIFkHH8pbG3IUlI2fURFwA6jXVZzmfqpo/yNQtoPA9PVNEdHPHoJs BbsQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=2gc/eAiM6fc/9xFq9v+gXHzceFFWcZXTxfGGQdY3TKo=; b=kx/3Ph05UJ8+8f1VCIhSLjPBiElekP4t7ZbLBra7tInZtQ7PDYmaaMHutbkLhMoT/F m/plxWBB7/0p9s3Cw0szBFdMmwi1fovgNzuPnmRIJjWCX7G/XBD+1ywmEcoylVQNYWCJ F81/Ix9zkE8GV9tUVYiAu2gXXrOAchZjr1kkc93CgGAqxKsgr4A9kB9LdcoMLZ4u5/0k geWoStUq/c/QA5OWbuB68rsj4i5iwiYZthL9/1IL0sWkUy6uUzByjohrxxgSwM80DYBK 2pmE0ICntQiX8wDCvDHCOrrKEONimqlHAYz8H4bOdwXQo+GwvZlJI6AV6OVBMgmWX763 exGg== X-Gm-Message-State: AOAM531RxfEcS6n9hfO6W4u5JgSWFTF/nnIq6cVXI4WL/CP5104Wz7vk /HMh+GySco8qRwiEpAxI4mU3Qw== X-Google-Smtp-Source: ABdhPJxeBSupo8i5C6YvM07AtjMhDiqQ1xpAwpiJVWc7s3N20uU84fMRZW1sEDeRezUSSYo0TsiUYQ== X-Received: by 2002:a1c:ed19:: with SMTP id l25mr3025751wmh.49.1601038330538; Fri, 25 Sep 2020 05:52:10 -0700 (PDT) Received: from zen.linaroharston ([51.148.130.216]) by smtp.gmail.com with ESMTPSA id l126sm2849103wmf.39.2020.09.25.05.51.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 25 Sep 2020 05:52:00 -0700 (PDT) Received: from zen.lan (localhost [127.0.0.1]) by zen.linaroharston (Postfix) with ESMTP id 5E0241FF9B; Fri, 25 Sep 2020 13:51:49 +0100 (BST) From: =?UTF-8?q?Alex=20Benn=C3=A9e?= To: qemu-devel@nongnu.org, maxim.uvarov@linaro.org, joakim.bech@linaro.org, ilias.apalodimas@linaro.org, tomas.winkler@intel.com, yang.huang@intel.com, bing.zhu@intel.com, Matti.Moell@opensynergy.com, hmo@opensynergy.com Subject: [RFC PATCH 12/19] tools/vhost-user-rpmb: import hmac_sha256 functions Date: Fri, 25 Sep 2020 13:51:40 +0100 Message-Id: <20200925125147.26943-13-alex.bennee@linaro.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20200925125147.26943-1-alex.bennee@linaro.org> References: <20200925125147.26943-1-alex.bennee@linaro.org> MIME-Version: 1.0 Cc: jean-philippe@linaro.org, takahiro.akashi@linaro.org, virtualization@lists.linuxfoundation.org, arnd@linaro.org, stratos-dev@op-lists.linaro.org X-BeenThere: virtualization@lists.linux-foundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Linux virtualization List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Errors-To: virtualization-bounces@lists.linux-foundation.org Sender: "Virtualization" V2UgbmVlZCB0byBjYWxjdWxhdGUgSE1BQy0yNTZTSEEgYXMgcGFydCBvZiB0aGUgcHJvdG9jb2wu IFRvIGF2b2lkCm1ha2luZyB0aGUgZGFlbW9uIGRlcGVuZGVudCBvbiBRRU1VJ3MgaW50ZXJuYWwg Y3J5cHRvIGxpYnJhcnkgd2UKaW1wb3J0IHRoZSBmdW5jdGlvbnMgaGVyZS4KClNpZ25lZC1vZmYt Ynk6IEFsZXggQmVubsOpZSA8YWxleC5iZW5uZWVAbGluYXJvLm9yZz4KLS0tCiB0b29scy92aG9z dC11c2VyLXJwbWIvaG1hY19zaGEyNTYuaCB8ICA4NyArKysrKysrKwogdG9vbHMvdmhvc3QtdXNl ci1ycG1iL2htYWNfc2hhMjU2LmMgfCAzMzEgKysrKysrKysrKysrKysrKysrKysrKysrKysrKwog dG9vbHMvdmhvc3QtdXNlci1ycG1iL21lc29uLmJ1aWxkICAgfCAgIDMgKy0KIDMgZmlsZXMgY2hh bmdlZCwgNDIwIGluc2VydGlvbnMoKyksIDEgZGVsZXRpb24oLSkKIGNyZWF0ZSBtb2RlIDEwMDY0 NCB0b29scy92aG9zdC11c2VyLXJwbWIvaG1hY19zaGEyNTYuaAogY3JlYXRlIG1vZGUgMTAwNjQ0 IHRvb2xzL3Zob3N0LXVzZXItcnBtYi9obWFjX3NoYTI1Ni5jCgpkaWZmIC0tZ2l0IGEvdG9vbHMv dmhvc3QtdXNlci1ycG1iL2htYWNfc2hhMjU2LmggYi90b29scy92aG9zdC11c2VyLXJwbWIvaG1h Y19zaGEyNTYuaApuZXcgZmlsZSBtb2RlIDEwMDY0NAppbmRleCAwMDAwMDAwMDAwMDAuLmU2N2E1 YmFlZGVjZAotLS0gL2Rldi9udWxsCisrKyBiL3Rvb2xzL3Zob3N0LXVzZXItcnBtYi9obWFjX3No YTI1Ni5oCkBAIC0wLDAgKzEsODcgQEAKKy8qCisgKiBITUFDLVNIQS0yNTYgaW1wbGVtZW50YXRp b24KKyAqIExhc3QgdXBkYXRlOiAwNi8xNS8yMDA1CisgKiBJc3N1ZSBkYXRlOiAgMDYvMTUvMjAw NQorICoKKyAqIENvcHlyaWdodCAoQykgMjAwNSBPbGl2aWVyIEdheSA8b2xpdmllci5nYXlAYTMu ZXBmbC5jaD4KKyAqIEFsbCByaWdodHMgcmVzZXJ2ZWQuCisgKgorICogQ29weXJpZ2h0IChjKSAy MDE2LCAyMDIwLCBMaW5hcm8gTGltaXRlZAorICogQWxsIHJpZ2h0cyByZXNlcnZlZC4KKyAqCisg KiBSZWRpc3RyaWJ1dGlvbiBhbmQgdXNlIGluIHNvdXJjZSBhbmQgYmluYXJ5IGZvcm1zLCB3aXRo IG9yIHdpdGhvdXQKKyAqIG1vZGlmaWNhdGlvbiwgYXJlIHBlcm1pdHRlZCBwcm92aWRlZCB0aGF0 IHRoZSBmb2xsb3dpbmcgY29uZGl0aW9ucworICogYXJlIG1ldDoKKyAqIDEuIFJlZGlzdHJpYnV0 aW9ucyBvZiBzb3VyY2UgY29kZSBtdXN0IHJldGFpbiB0aGUgYWJvdmUgY29weXJpZ2h0CisgKiAg ICBub3RpY2UsIHRoaXMgbGlzdCBvZiBjb25kaXRpb25zIGFuZCB0aGUgZm9sbG93aW5nIGRpc2Ns YWltZXIuCisgKiAyLiBSZWRpc3RyaWJ1dGlvbnMgaW4gYmluYXJ5IGZvcm0gbXVzdCByZXByb2R1 Y2UgdGhlIGFib3ZlIGNvcHlyaWdodAorICogICAgbm90aWNlLCB0aGlzIGxpc3Qgb2YgY29uZGl0 aW9ucyBhbmQgdGhlIGZvbGxvd2luZyBkaXNjbGFpbWVyIGluIHRoZQorICogICAgZG9jdW1lbnRh dGlvbiBhbmQvb3Igb3RoZXIgbWF0ZXJpYWxzIHByb3ZpZGVkIHdpdGggdGhlIGRpc3RyaWJ1dGlv bi4KKyAqIDMuIE5laXRoZXIgdGhlIG5hbWUgb2YgdGhlIHByb2plY3Qgbm9yIHRoZSBuYW1lcyBv ZiBpdHMgY29udHJpYnV0b3JzCisgKiAgICBtYXkgYmUgdXNlZCB0byBlbmRvcnNlIG9yIHByb21v dGUgcHJvZHVjdHMgZGVyaXZlZCBmcm9tIHRoaXMgc29mdHdhcmUKKyAqICAgIHdpdGhvdXQgc3Bl Y2lmaWMgcHJpb3Igd3JpdHRlbiBwZXJtaXNzaW9uLgorICoKKyAqIFRISVMgU09GVFdBUkUgSVMg UFJPVklERUQgQlkgVEhFIFBST0pFQ1QgQU5EIENPTlRSSUJVVE9SUyBgYEFTIElTJycgQU5ECisg KiBBTlkgRVhQUkVTUyBPUiBJTVBMSUVEIFdBUlJBTlRJRVMsIElOQ0xVRElORywgQlVUIE5PVCBM SU1JVEVEIFRPLCBUSEUKKyAqIElNUExJRUQgV0FSUkFOVElFUyBPRiBNRVJDSEFOVEFCSUxJVFkg QU5EIEZJVE5FU1MgRk9SIEEgUEFSVElDVUxBUiBQVVJQT1NFCisgKiBBUkUgRElTQ0xBSU1FRC4g IElOIE5PIEVWRU5UIFNIQUxMIFRIRSBQUk9KRUNUIE9SIENPTlRSSUJVVE9SUyBCRSBMSUFCTEUK KyAqIEZPUiBBTlkgRElSRUNULCBJTkRJUkVDVCwgSU5DSURFTlRBTCwgU1BFQ0lBTCwgRVhFTVBM QVJZLCBPUiBDT05TRVFVRU5USUFMCisgKiBEQU1BR0VTIChJTkNMVURJTkcsIEJVVCBOT1QgTElN SVRFRCBUTywgUFJPQ1VSRU1FTlQgT0YgU1VCU1RJVFVURSBHT09EUworICogT1IgU0VSVklDRVM7 IExPU1MgT0YgVVNFLCBEQVRBLCBPUiBQUk9GSVRTOyBPUiBCVVNJTkVTUyBJTlRFUlJVUFRJT04p CisgKiBIT1dFVkVSIENBVVNFRCBBTkQgT04gQU5ZIFRIRU9SWSBPRiBMSUFCSUxJVFksIFdIRVRI RVIgSU4gQ09OVFJBQ1QsIFNUUklDVAorICogTElBQklMSVRZLCBPUiBUT1JUIChJTkNMVURJTkcg TkVHTElHRU5DRSBPUiBPVEhFUldJU0UpIEFSSVNJTkcgSU4gQU5ZIFdBWQorICogT1VUIE9GIFRI RSBVU0UgT0YgVEhJUyBTT0ZUV0FSRSwgRVZFTiBJRiBBRFZJU0VEIE9GIFRIRSBQT1NTSUJJTElU WSBPRgorICogU1VDSCBEQU1BR0UuCisgKi8KKworI2lmbmRlZiBITUFDX1NIQTI1Nl9ICisjZGVm aW5lIEhNQUNfU0hBMjU2X0gKKworI2RlZmluZSBTSEEyNTZfRElHRVNUX1NJWkUgKCAyNTYgLyA4 KQorI2RlZmluZSBTSEEyNTZfQkxPQ0tfU0laRSAgKCA1MTIgLyA4KQorCisjaWZuZGVmIFNIQTJf VFlQRVMKKyNkZWZpbmUgU0hBMl9UWVBFUwordHlwZWRlZiB1bnNpZ25lZCBjaGFyIHVpbnQ4Owor dHlwZWRlZiB1bnNpZ25lZCBpbnQgIHVpbnQzMjsKK3R5cGVkZWYgdW5zaWduZWQgbG9uZyBsb25n IHVpbnQ2NDsKKyNlbmRpZgorCit0eXBlZGVmIHN0cnVjdCB7CisgICAgdW5zaWduZWQgaW50IHRv dF9sZW47CisgICAgdW5zaWduZWQgaW50IGxlbjsKKyAgICB1bnNpZ25lZCBjaGFyIGJsb2NrWzIg KiBTSEEyNTZfQkxPQ0tfU0laRV07CisgICAgdWludDMyIGhbOF07Cit9IHNoYTI1Nl9jdHg7CisK K3ZvaWQgc2hhMjU2X2luaXQoc2hhMjU2X2N0eCAqIGN0eCk7Cit2b2lkIHNoYTI1Nl91cGRhdGUo c2hhMjU2X2N0eCAqY3R4LCBjb25zdCB1bnNpZ25lZCBjaGFyICptZXNzYWdlLAorICAgICAgICAg ICAgICAgICAgIHVuc2lnbmVkIGludCBsZW4pOwordm9pZCBzaGEyNTZfZmluYWwoc2hhMjU2X2N0 eCAqY3R4LCB1bnNpZ25lZCBjaGFyICpkaWdlc3QpOwordm9pZCBzaGEyNTYoY29uc3QgdW5zaWdu ZWQgY2hhciAqbWVzc2FnZSwgdW5zaWduZWQgaW50IGxlbiwKKyAgICAgICAgICAgIHVuc2lnbmVk IGNoYXIgKmRpZ2VzdCk7CisKK3R5cGVkZWYgc3RydWN0IHsKKyAgICBzaGEyNTZfY3R4IGN0eF9p bnNpZGU7CisgICAgc2hhMjU2X2N0eCBjdHhfb3V0c2lkZTsKKworICAgIC8qIGZvciBobWFjX3Jl aW5pdCAqLworICAgIHNoYTI1Nl9jdHggY3R4X2luc2lkZV9yZWluaXQ7CisgICAgc2hhMjU2X2N0 eCBjdHhfb3V0c2lkZV9yZWluaXQ7CisKKyAgICB1bnNpZ25lZCBjaGFyIGJsb2NrX2lwYWRbU0hB MjU2X0JMT0NLX1NJWkVdOworICAgIHVuc2lnbmVkIGNoYXIgYmxvY2tfb3BhZFtTSEEyNTZfQkxP Q0tfU0laRV07Cit9IGhtYWNfc2hhMjU2X2N0eDsKKwordm9pZCBobWFjX3NoYTI1Nl9pbml0KGht YWNfc2hhMjU2X2N0eCAqY3R4LCBjb25zdCB1bnNpZ25lZCBjaGFyICprZXksCisgICAgICAgICAg ICAgICAgICAgICAgdW5zaWduZWQgaW50IGtleV9zaXplKTsKK3ZvaWQgaG1hY19zaGEyNTZfcmVp bml0KGhtYWNfc2hhMjU2X2N0eCAqY3R4KTsKK3ZvaWQgaG1hY19zaGEyNTZfdXBkYXRlKGhtYWNf c2hhMjU2X2N0eCAqY3R4LCBjb25zdCB1bnNpZ25lZCBjaGFyICptZXNzYWdlLAorICAgICAgICAg ICAgICAgICAgICAgICAgdW5zaWduZWQgaW50IG1lc3NhZ2VfbGVuKTsKK3ZvaWQgaG1hY19zaGEy NTZfZmluYWwoaG1hY19zaGEyNTZfY3R4ICpjdHgsIHVuc2lnbmVkIGNoYXIgKm1hYywKKyAgICAg ICAgICAgICAgICAgICAgICAgdW5zaWduZWQgaW50IG1hY19zaXplKTsKK3ZvaWQgaG1hY19zaGEy NTYoY29uc3QgdW5zaWduZWQgY2hhciAqa2V5LCB1bnNpZ25lZCBpbnQga2V5X3NpemUsCisgICAg ICAgICAgICAgICAgIGNvbnN0IHVuc2lnbmVkIGNoYXIgKm1lc3NhZ2UsIHVuc2lnbmVkIGludCBt ZXNzYWdlX2xlbiwKKyAgICAgICAgICAgICAgICAgdW5zaWduZWQgY2hhciAqbWFjLCB1bnNpZ25l ZCBtYWNfc2l6ZSk7CisKKyNlbmRpZiAvKiAhSE1BQ19TSEEyNTZfSCAqLwpkaWZmIC0tZ2l0IGEv dG9vbHMvdmhvc3QtdXNlci1ycG1iL2htYWNfc2hhMjU2LmMgYi90b29scy92aG9zdC11c2VyLXJw bWIvaG1hY19zaGEyNTYuYwpuZXcgZmlsZSBtb2RlIDEwMDY0NAppbmRleCAwMDAwMDAwMDAwMDAu LmY2NjQwYTQ2YzYxNgotLS0gL2Rldi9udWxsCisrKyBiL3Rvb2xzL3Zob3N0LXVzZXItcnBtYi9o bWFjX3NoYTI1Ni5jCkBAIC0wLDAgKzEsMzMxIEBACisvKgorICogSE1BQy1TSEEtMjU2IGltcGxl bWVudGF0aW9uCisgKiBMYXN0IHVwZGF0ZTogMDYvMTUvMjAwNQorICogSXNzdWUgZGF0ZTogIDA2 LzE1LzIwMDUKKyAqCisgKiBDb3B5cmlnaHQgKEMpIDIwMDUgT2xpdmllciBHYXkgPG9saXZpZXIu Z2F5QGEzLmVwZmwuY2g+CisgKiBBbGwgcmlnaHRzIHJlc2VydmVkLgorICoKKyAqIENvcHlyaWdo dCAoYykgMjAxNiwgMjAyMCBMaW5hcm8gTGltaXRlZAorICogQWxsIHJpZ2h0cyByZXNlcnZlZC4K KyAqCisgKiBSZWRpc3RyaWJ1dGlvbiBhbmQgdXNlIGluIHNvdXJjZSBhbmQgYmluYXJ5IGZvcm1z LCB3aXRoIG9yIHdpdGhvdXQKKyAqIG1vZGlmaWNhdGlvbiwgYXJlIHBlcm1pdHRlZCBwcm92aWRl ZCB0aGF0IHRoZSBmb2xsb3dpbmcgY29uZGl0aW9ucworICogYXJlIG1ldDoKKyAqIDEuIFJlZGlz dHJpYnV0aW9ucyBvZiBzb3VyY2UgY29kZSBtdXN0IHJldGFpbiB0aGUgYWJvdmUgY29weXJpZ2h0 CisgKiAgICBub3RpY2UsIHRoaXMgbGlzdCBvZiBjb25kaXRpb25zIGFuZCB0aGUgZm9sbG93aW5n IGRpc2NsYWltZXIuCisgKiAyLiBSZWRpc3RyaWJ1dGlvbnMgaW4gYmluYXJ5IGZvcm0gbXVzdCBy ZXByb2R1Y2UgdGhlIGFib3ZlIGNvcHlyaWdodAorICogICAgbm90aWNlLCB0aGlzIGxpc3Qgb2Yg Y29uZGl0aW9ucyBhbmQgdGhlIGZvbGxvd2luZyBkaXNjbGFpbWVyIGluIHRoZQorICogICAgZG9j dW1lbnRhdGlvbiBhbmQvb3Igb3RoZXIgbWF0ZXJpYWxzIHByb3ZpZGVkIHdpdGggdGhlIGRpc3Ry aWJ1dGlvbi4KKyAqIDMuIE5laXRoZXIgdGhlIG5hbWUgb2YgdGhlIHByb2plY3Qgbm9yIHRoZSBu YW1lcyBvZiBpdHMgY29udHJpYnV0b3JzCisgKiAgICBtYXkgYmUgdXNlZCB0byBlbmRvcnNlIG9y IHByb21vdGUgcHJvZHVjdHMgZGVyaXZlZCBmcm9tIHRoaXMgc29mdHdhcmUKKyAqICAgIHdpdGhv dXQgc3BlY2lmaWMgcHJpb3Igd3JpdHRlbiBwZXJtaXNzaW9uLgorICoKKyAqIFRISVMgU09GVFdB UkUgSVMgUFJPVklERUQgQlkgVEhFIFBST0pFQ1QgQU5EIENPTlRSSUJVVE9SUyBgYEFTIElTJycg QU5ECisgKiBBTlkgRVhQUkVTUyBPUiBJTVBMSUVEIFdBUlJBTlRJRVMsIElOQ0xVRElORywgQlVU IE5PVCBMSU1JVEVEIFRPLCBUSEUKKyAqIElNUExJRUQgV0FSUkFOVElFUyBPRiBNRVJDSEFOVEFC SUxJVFkgQU5EIEZJVE5FU1MgRk9SIEEgUEFSVElDVUxBUiBQVVJQT1NFCisgKiBBUkUgRElTQ0xB SU1FRC4gIElOIE5PIEVWRU5UIFNIQUxMIFRIRSBQUk9KRUNUIE9SIENPTlRSSUJVVE9SUyBCRSBM SUFCTEUKKyAqIEZPUiBBTlkgRElSRUNULCBJTkRJUkVDVCwgSU5DSURFTlRBTCwgU1BFQ0lBTCwg RVhFTVBMQVJZLCBPUiBDT05TRVFVRU5USUFMCisgKiBEQU1BR0VTIChJTkNMVURJTkcsIEJVVCBO T1QgTElNSVRFRCBUTywgUFJPQ1VSRU1FTlQgT0YgU1VCU1RJVFVURSBHT09EUworICogT1IgU0VS VklDRVM7IExPU1MgT0YgVVNFLCBEQVRBLCBPUiBQUk9GSVRTOyBPUiBCVVNJTkVTUyBJTlRFUlJV UFRJT04pCisgKiBIT1dFVkVSIENBVVNFRCBBTkQgT04gQU5ZIFRIRU9SWSBPRiBMSUFCSUxJVFks IFdIRVRIRVIgSU4gQ09OVFJBQ1QsIFNUUklDVAorICogTElBQklMSVRZLCBPUiBUT1JUIChJTkNM VURJTkcgTkVHTElHRU5DRSBPUiBPVEhFUldJU0UpIEFSSVNJTkcgSU4gQU5ZIFdBWQorICogT1VU IE9GIFRIRSBVU0UgT0YgVEhJUyBTT0ZUV0FSRSwgRVZFTiBJRiBBRFZJU0VEIE9GIFRIRSBQT1NT SUJJTElUWSBPRgorICogU1VDSCBEQU1BR0UuCisgKi8KKworI2luY2x1ZGUgPHN0cmluZy5oPgor CisjaW5jbHVkZSAiaG1hY19zaGEyNTYuaCIKKworLyogU0hBMjU2IGZ1bmN0aW9ucyAqLworCisj ZGVmaW5lIFNIRlIoeCwgbikgICAgKHggPj4gbikKKyNkZWZpbmUgUk9UUih4LCBuKSAgICgoeCA+ PiBuKSB8ICh4IDw8ICgoc2l6ZW9mKHgpIDw8IDMpIC0gbikpKQorI2RlZmluZSBST1RMKHgsIG4p ICAgKCh4IDw8IG4pIHwgKHggPj4gKChzaXplb2YoeCkgPDwgMykgLSBuKSkpCisjZGVmaW5lIENI KHgsIHksIHopICAoKHggJiB5KSBeICh+eCAmIHopKQorI2RlZmluZSBNQUooeCwgeSwgeikgKCh4 ICYgeSkgXiAoeCAmIHopIF4gKHkgJiB6KSkKKworI2RlZmluZSBTSEEyNTZfRjEoeCkgKFJPVFIo eCwgIDIpIF4gUk9UUih4LCAxMykgXiBST1RSKHgsIDIyKSkKKyNkZWZpbmUgU0hBMjU2X0YyKHgp IChST1RSKHgsICA2KSBeIFJPVFIoeCwgMTEpIF4gUk9UUih4LCAyNSkpCisjZGVmaW5lIFNIQTI1 Nl9GMyh4KSAoUk9UUih4LCAgNykgXiBST1RSKHgsIDE4KSBeIFNIRlIoeCwgIDMpKQorI2RlZmlu ZSBTSEEyNTZfRjQoeCkgKFJPVFIoeCwgMTcpIF4gUk9UUih4LCAxOSkgXiBTSEZSKHgsIDEwKSkK KworI2RlZmluZSBVTlBBQ0szMih4LCBzdHIpICAgICAgICAgICAgICAgICAgICAgIFwKK3sgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBcCisgICAgKigoc3RyKSAr IDMpID0gKHVpbnQ4KSAoKHgpICAgICAgKTsgICAgICAgXAorICAgICooKHN0cikgKyAyKSA9ICh1 aW50OCkgKCh4KSA+PiAgOCk7ICAgICAgIFwKKyAgICAqKChzdHIpICsgMSkgPSAodWludDgpICgo eCkgPj4gMTYpOyAgICAgICBcCisgICAgKigoc3RyKSArIDApID0gKHVpbnQ4KSAoKHgpID4+IDI0 KTsgICAgICAgXAorfQorCisjZGVmaW5lIFBBQ0szMihzdHIsIHgpICAgICAgICAgICAgICAgICAg ICAgICAgXAoreyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFwK KyAgICAqKHgpID0gICAoKHVpbnQzMikgKigoc3RyKSArIDMpICAgICAgKSAgICBcCisgICAgICAg ICAgIHwgKCh1aW50MzIpICooKHN0cikgKyAyKSA8PCAgOCkgICAgXAorICAgICAgICAgICB8ICgo dWludDMyKSAqKChzdHIpICsgMSkgPDwgMTYpICAgIFwKKyAgICAgICAgICAgfCAoKHVpbnQzMikg Kigoc3RyKSArIDApIDw8IDI0KTsgICBcCit9CisKKyNkZWZpbmUgVU5QQUNLNjQoeCwgc3RyKSAg ICAgICAgICAgICAgICAgICAgICBcCit7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgXAorICAgICooKHN0cikgKyA3KSA9ICh1aW50OCkgKCh4KSAgICAgICk7ICAg ICAgIFwKKyAgICAqKChzdHIpICsgNikgPSAodWludDgpICgoeCkgPj4gIDgpOyAgICAgICBcCisg ICAgKigoc3RyKSArIDUpID0gKHVpbnQ4KSAoKHgpID4+IDE2KTsgICAgICAgXAorICAgICooKHN0 cikgKyA0KSA9ICh1aW50OCkgKCh4KSA+PiAyNCk7ICAgICAgIFwKKyAgICAqKChzdHIpICsgMykg PSAodWludDgpICgoeCkgPj4gMzIpOyAgICAgICBcCisgICAgKigoc3RyKSArIDIpID0gKHVpbnQ4 KSAoKHgpID4+IDQwKTsgICAgICAgXAorICAgICooKHN0cikgKyAxKSA9ICh1aW50OCkgKCh4KSA+ PiA0OCk7ICAgICAgIFwKKyAgICAqKChzdHIpICsgMCkgPSAodWludDgpICgoeCkgPj4gNTYpOyAg ICAgICBcCit9CisKKyNkZWZpbmUgUEFDSzY0KHN0ciwgeCkgICAgICAgICAgICAgICAgICAgICAg ICBcCit7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgXAorICAg ICooeCkgPSAgICgodWludDY0KSAqKChzdHIpICsgNykgICAgICApICAgIFwKKyAgICAgICAgICAg fCAoKHVpbnQ2NCkgKigoc3RyKSArIDYpIDw8ICA4KSAgICBcCisgICAgICAgICAgIHwgKCh1aW50 NjQpICooKHN0cikgKyA1KSA8PCAxNikgICAgXAorICAgICAgICAgICB8ICgodWludDY0KSAqKChz dHIpICsgNCkgPDwgMjQpICAgIFwKKyAgICAgICAgICAgfCAoKHVpbnQ2NCkgKigoc3RyKSArIDMp IDw8IDMyKSAgICBcCisgICAgICAgICAgIHwgKCh1aW50NjQpICooKHN0cikgKyAyKSA8PCA0MCkg ICAgXAorICAgICAgICAgICB8ICgodWludDY0KSAqKChzdHIpICsgMSkgPDwgNDgpICAgIFwKKyAg ICAgICAgICAgfCAoKHVpbnQ2NCkgKigoc3RyKSArIDApIDw8IDU2KTsgICBcCit9CisKKyNkZWZp bmUgU0hBMjU2X1NDUihpKSAgICAgICAgICAgICAgICAgICAgICAgICBcCit7ICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgXAorICAgIHdbaV0gPSAgU0hBMjU2X0Y0 KHdbaSAtICAyXSkgKyB3W2kgLSAgN10gIFwKKyAgICAgICAgICArIFNIQTI1Nl9GMyh3W2kgLSAx NV0pICsgd1tpIC0gMTZdOyBcCit9CisKK3VpbnQzMiBzaGEyNTZfaDBbOF0gPQorICAgICAgICAg ICAgezB4NmEwOWU2NjcsIDB4YmI2N2FlODUsIDB4M2M2ZWYzNzIsIDB4YTU0ZmY1M2EsCisgICAg ICAgICAgICAgMHg1MTBlNTI3ZiwgMHg5YjA1Njg4YywgMHgxZjgzZDlhYiwgMHg1YmUwY2QxOX07 CisKK3VpbnQzMiBzaGEyNTZfa1s2NF0gPQorICAgICAgICAgICAgezB4NDI4YTJmOTgsIDB4NzEz NzQ0OTEsIDB4YjVjMGZiY2YsIDB4ZTliNWRiYTUsCisgICAgICAgICAgICAgMHgzOTU2YzI1Yiwg MHg1OWYxMTFmMSwgMHg5MjNmODJhNCwgMHhhYjFjNWVkNSwKKyAgICAgICAgICAgICAweGQ4MDdh YTk4LCAweDEyODM1YjAxLCAweDI0MzE4NWJlLCAweDU1MGM3ZGMzLAorICAgICAgICAgICAgIDB4 NzJiZTVkNzQsIDB4ODBkZWIxZmUsIDB4OWJkYzA2YTcsIDB4YzE5YmYxNzQsCisgICAgICAgICAg ICAgMHhlNDliNjljMSwgMHhlZmJlNDc4NiwgMHgwZmMxOWRjNiwgMHgyNDBjYTFjYywKKyAgICAg ICAgICAgICAweDJkZTkyYzZmLCAweDRhNzQ4NGFhLCAweDVjYjBhOWRjLCAweDc2Zjk4OGRhLAor ICAgICAgICAgICAgIDB4OTgzZTUxNTIsIDB4YTgzMWM2NmQsIDB4YjAwMzI3YzgsIDB4YmY1OTdm YzcsCisgICAgICAgICAgICAgMHhjNmUwMGJmMywgMHhkNWE3OTE0NywgMHgwNmNhNjM1MSwgMHgx NDI5Mjk2NywKKyAgICAgICAgICAgICAweDI3YjcwYTg1LCAweDJlMWIyMTM4LCAweDRkMmM2ZGZj LCAweDUzMzgwZDEzLAorICAgICAgICAgICAgIDB4NjUwYTczNTQsIDB4NzY2YTBhYmIsIDB4ODFj MmM5MmUsIDB4OTI3MjJjODUsCisgICAgICAgICAgICAgMHhhMmJmZThhMSwgMHhhODFhNjY0Yiwg MHhjMjRiOGI3MCwgMHhjNzZjNTFhMywKKyAgICAgICAgICAgICAweGQxOTJlODE5LCAweGQ2OTkw NjI0LCAweGY0MGUzNTg1LCAweDEwNmFhMDcwLAorICAgICAgICAgICAgIDB4MTlhNGMxMTYsIDB4 MWUzNzZjMDgsIDB4Mjc0ODc3NGMsIDB4MzRiMGJjYjUsCisgICAgICAgICAgICAgMHgzOTFjMGNi MywgMHg0ZWQ4YWE0YSwgMHg1YjljY2E0ZiwgMHg2ODJlNmZmMywKKyAgICAgICAgICAgICAweDc0 OGY4MmVlLCAweDc4YTU2MzZmLCAweDg0Yzg3ODE0LCAweDhjYzcwMjA4LAorICAgICAgICAgICAg IDB4OTBiZWZmZmEsIDB4YTQ1MDZjZWIsIDB4YmVmOWEzZjcsIDB4YzY3MTc4ZjJ9OworCisvKiBT SEEtMjU2IGZ1bmN0aW9ucyAqLworCitzdGF0aWMgdm9pZCBzaGEyNTZfdHJhbnNmKHNoYTI1Nl9j dHggKmN0eCwgY29uc3QgdW5zaWduZWQgY2hhciAqbWVzc2FnZSwKKyAgICAgICAgICAgICAgICAg ICAgICAgICAgdW5zaWduZWQgaW50IGJsb2NrX25iKQoreworICAgIHVpbnQzMiB3WzY0XTsKKyAg ICB1aW50MzIgd3ZbOF07CisgICAgdWludDMyIHQxLCB0MjsKKyAgICBjb25zdCB1bnNpZ25lZCBj aGFyICpzdWJfYmxvY2s7CisgICAgaW50IGk7CisgICAgaW50IGo7CisKKyAgICBmb3IgKGkgPSAw OyBpIDwgKGludCkgYmxvY2tfbmI7IGkrKykgeworICAgICAgICBzdWJfYmxvY2sgPSBtZXNzYWdl ICsgKGkgPDwgNik7CisKKyAgICAgICAgZm9yIChqID0gMDsgaiA8IDE2OyBqKyspIHsKKyAgICAg ICAgICAgIFBBQ0szMigmc3ViX2Jsb2NrW2ogPDwgMl0sICZ3W2pdKTsKKyAgICAgICAgfQorCisg ICAgICAgIGZvciAoaiA9IDE2OyBqIDwgNjQ7IGorKykgeworICAgICAgICAgICAgU0hBMjU2X1ND UihqKTsKKyAgICAgICAgfQorCisgICAgICAgIGZvciAoaiA9IDA7IGogPCA4OyBqKyspIHsKKyAg ICAgICAgICAgIHd2W2pdID0gY3R4LT5oW2pdOworICAgICAgICB9CisKKyAgICAgICAgZm9yIChq ID0gMDsgaiA8IDY0OyBqKyspIHsKKyAgICAgICAgICAgIHQxID0gd3ZbN10gKyBTSEEyNTZfRjIo d3ZbNF0pICsgQ0god3ZbNF0sIHd2WzVdLCB3dls2XSkKKyAgICAgICAgICAgICAgICArIHNoYTI1 Nl9rW2pdICsgd1tqXTsKKyAgICAgICAgICAgIHQyID0gU0hBMjU2X0YxKHd2WzBdKSArIE1BSih3 dlswXSwgd3ZbMV0sIHd2WzJdKTsKKyAgICAgICAgICAgIHd2WzddID0gd3ZbNl07CisgICAgICAg ICAgICB3dls2XSA9IHd2WzVdOworICAgICAgICAgICAgd3ZbNV0gPSB3dls0XTsKKyAgICAgICAg ICAgIHd2WzRdID0gd3ZbM10gKyB0MTsKKyAgICAgICAgICAgIHd2WzNdID0gd3ZbMl07CisgICAg ICAgICAgICB3dlsyXSA9IHd2WzFdOworICAgICAgICAgICAgd3ZbMV0gPSB3dlswXTsKKyAgICAg ICAgICAgIHd2WzBdID0gdDEgKyB0MjsKKyAgICAgICAgfQorCisgICAgICAgIGZvciAoaiA9IDA7 IGogPCA4OyBqKyspIHsKKyAgICAgICAgICAgIGN0eC0+aFtqXSArPSB3dltqXTsKKyAgICAgICAg fQorICAgIH0KK30KKwordm9pZCBzaGEyNTYoY29uc3QgdW5zaWduZWQgY2hhciAqbWVzc2FnZSwg dW5zaWduZWQgaW50IGxlbiwgdW5zaWduZWQgY2hhciAqZGlnZXN0KQoreworICAgIHNoYTI1Nl9j dHggY3R4OworCisgICAgc2hhMjU2X2luaXQoJmN0eCk7CisgICAgc2hhMjU2X3VwZGF0ZSgmY3R4 LCBtZXNzYWdlLCBsZW4pOworICAgIHNoYTI1Nl9maW5hbCgmY3R4LCBkaWdlc3QpOworfQorCit2 b2lkIHNoYTI1Nl9pbml0KHNoYTI1Nl9jdHggKmN0eCkKK3sKKyAgICBpbnQgaTsKKyAgICBmb3Ig KGkgPSAwOyBpIDwgODsgaSsrKSB7CisgICAgICAgIGN0eC0+aFtpXSA9IHNoYTI1Nl9oMFtpXTsK KyAgICB9CisKKyAgICBjdHgtPmxlbiA9IDA7CisgICAgY3R4LT50b3RfbGVuID0gMDsKK30KKwor dm9pZCBzaGEyNTZfdXBkYXRlKHNoYTI1Nl9jdHggKmN0eCwgY29uc3QgdW5zaWduZWQgY2hhciAq bWVzc2FnZSwKKyAgICAgICAgICAgICAgICAgICB1bnNpZ25lZCBpbnQgbGVuKQoreworICAgIHVu c2lnbmVkIGludCBibG9ja19uYjsKKyAgICB1bnNpZ25lZCBpbnQgbmV3X2xlbiwgcmVtX2xlbiwg dG1wX2xlbjsKKyAgICBjb25zdCB1bnNpZ25lZCBjaGFyICpzaGlmdGVkX21lc3NhZ2U7CisKKyAg ICB0bXBfbGVuID0gU0hBMjU2X0JMT0NLX1NJWkUgLSBjdHgtPmxlbjsKKyAgICByZW1fbGVuID0g bGVuIDwgdG1wX2xlbiA/IGxlbiA6IHRtcF9sZW47CisKKyAgICBtZW1jcHkoJmN0eC0+YmxvY2tb Y3R4LT5sZW5dLCBtZXNzYWdlLCByZW1fbGVuKTsKKworICAgIGlmIChjdHgtPmxlbiArIGxlbiA8 IFNIQTI1Nl9CTE9DS19TSVpFKSB7CisgICAgICAgIGN0eC0+bGVuICs9IGxlbjsKKyAgICAgICAg cmV0dXJuOworICAgIH0KKworICAgIG5ld19sZW4gPSBsZW4gLSByZW1fbGVuOworICAgIGJsb2Nr X25iID0gbmV3X2xlbiAvIFNIQTI1Nl9CTE9DS19TSVpFOworCisgICAgc2hpZnRlZF9tZXNzYWdl ID0gbWVzc2FnZSArIHJlbV9sZW47CisKKyAgICBzaGEyNTZfdHJhbnNmKGN0eCwgY3R4LT5ibG9j aywgMSk7CisgICAgc2hhMjU2X3RyYW5zZihjdHgsIHNoaWZ0ZWRfbWVzc2FnZSwgYmxvY2tfbmIp OworCisgICAgcmVtX2xlbiA9IG5ld19sZW4gJSBTSEEyNTZfQkxPQ0tfU0laRTsKKworICAgIG1l bWNweShjdHgtPmJsb2NrLCAmc2hpZnRlZF9tZXNzYWdlW2Jsb2NrX25iIDw8IDZdLAorICAgICAg ICAgICByZW1fbGVuKTsKKworICAgIGN0eC0+bGVuID0gcmVtX2xlbjsKKyAgICBjdHgtPnRvdF9s ZW4gKz0gKGJsb2NrX25iICsgMSkgPDwgNjsKK30KKwordm9pZCBzaGEyNTZfZmluYWwoc2hhMjU2 X2N0eCAqY3R4LCB1bnNpZ25lZCBjaGFyICpkaWdlc3QpCit7CisgICAgdW5zaWduZWQgaW50IGJs b2NrX25iOworICAgIHVuc2lnbmVkIGludCBwbV9sZW47CisgICAgdW5zaWduZWQgaW50IGxlbl9i OworICAgIGludCBpOworCisgICAgYmxvY2tfbmIgPSAoMSArICgoU0hBMjU2X0JMT0NLX1NJWkUg LSA5KQorICAgICAgICAgICAgICAgICAgICAgPCAoY3R4LT5sZW4gJSBTSEEyNTZfQkxPQ0tfU0la RSkpKTsKKworICAgIGxlbl9iID0gKGN0eC0+dG90X2xlbiArIGN0eC0+bGVuKSA8PCAzOworICAg IHBtX2xlbiA9IGJsb2NrX25iIDw8IDY7CisKKyAgICBtZW1zZXQoY3R4LT5ibG9jayArIGN0eC0+ bGVuLCAwLCBwbV9sZW4gLSBjdHgtPmxlbik7CisgICAgY3R4LT5ibG9ja1tjdHgtPmxlbl0gPSAw eDgwOworICAgIFVOUEFDSzMyKGxlbl9iLCBjdHgtPmJsb2NrICsgcG1fbGVuIC0gNCk7CisKKyAg ICBzaGEyNTZfdHJhbnNmKGN0eCwgY3R4LT5ibG9jaywgYmxvY2tfbmIpOworCisgICAgZm9yIChp ID0gMCA7IGkgPCA4OyBpKyspIHsKKyAgICAgICAgVU5QQUNLMzIoY3R4LT5oW2ldLCAmZGlnZXN0 W2kgPDwgMl0pOworICAgIH0KK30KKworLyogSE1BQy1TSEEtMjU2IGZ1bmN0aW9ucyAqLworCit2 b2lkIGhtYWNfc2hhMjU2X2luaXQoaG1hY19zaGEyNTZfY3R4ICpjdHgsIGNvbnN0IHVuc2lnbmVk IGNoYXIgKmtleSwKKyAgICAgICAgICAgICAgICAgICAgICB1bnNpZ25lZCBpbnQga2V5X3NpemUp Cit7CisgICAgdW5zaWduZWQgaW50IGZpbGw7CisgICAgdW5zaWduZWQgaW50IG51bTsKKworICAg IGNvbnN0IHVuc2lnbmVkIGNoYXIgKmtleV91c2VkOworICAgIHVuc2lnbmVkIGNoYXIga2V5X3Rl bXBbU0hBMjU2X0RJR0VTVF9TSVpFXTsKKyAgICBpbnQgaTsKKworICAgIGlmIChrZXlfc2l6ZSA9 PSBTSEEyNTZfQkxPQ0tfU0laRSkgeworICAgICAgICBrZXlfdXNlZCA9IGtleTsKKyAgICAgICAg bnVtID0gU0hBMjU2X0JMT0NLX1NJWkU7CisgICAgfSBlbHNlIHsKKyAgICAgICAgaWYgKGtleV9z aXplID4gU0hBMjU2X0JMT0NLX1NJWkUpeworICAgICAgICAgICAgbnVtID0gU0hBMjU2X0RJR0VT VF9TSVpFOworICAgICAgICAgICAgc2hhMjU2KGtleSwga2V5X3NpemUsIGtleV90ZW1wKTsKKyAg ICAgICAgICAgIGtleV91c2VkID0ga2V5X3RlbXA7CisgICAgICAgIH0gZWxzZSB7IC8qIGtleV9z aXplID4gU0hBMjU2X0JMT0NLX1NJWkUgKi8KKyAgICAgICAgICAgIGtleV91c2VkID0ga2V5Owor ICAgICAgICAgICAgbnVtID0ga2V5X3NpemU7CisgICAgICAgIH0KKyAgICAgICAgZmlsbCA9IFNI QTI1Nl9CTE9DS19TSVpFIC0gbnVtOworCisgICAgICAgIG1lbXNldChjdHgtPmJsb2NrX2lwYWQg KyBudW0sIDB4MzYsIGZpbGwpOworICAgICAgICBtZW1zZXQoY3R4LT5ibG9ja19vcGFkICsgbnVt LCAweDVjLCBmaWxsKTsKKyAgICB9CisKKyAgICBmb3IgKGkgPSAwOyBpIDwgKGludCkgbnVtOyBp KyspIHsKKyAgICAgICAgY3R4LT5ibG9ja19pcGFkW2ldID0ga2V5X3VzZWRbaV0gXiAweDM2Owor ICAgICAgICBjdHgtPmJsb2NrX29wYWRbaV0gPSBrZXlfdXNlZFtpXSBeIDB4NWM7CisgICAgfQor CisgICAgc2hhMjU2X2luaXQoJmN0eC0+Y3R4X2luc2lkZSk7CisgICAgc2hhMjU2X3VwZGF0ZSgm Y3R4LT5jdHhfaW5zaWRlLCBjdHgtPmJsb2NrX2lwYWQsIFNIQTI1Nl9CTE9DS19TSVpFKTsKKwor ICAgIHNoYTI1Nl9pbml0KCZjdHgtPmN0eF9vdXRzaWRlKTsKKyAgICBzaGEyNTZfdXBkYXRlKCZj dHgtPmN0eF9vdXRzaWRlLCBjdHgtPmJsb2NrX29wYWQsCisgICAgICAgICAgICAgICAgICBTSEEy NTZfQkxPQ0tfU0laRSk7CisKKyAgICAvKiBmb3IgaG1hY19yZWluaXQgKi8KKyAgICBtZW1jcHko JmN0eC0+Y3R4X2luc2lkZV9yZWluaXQsICZjdHgtPmN0eF9pbnNpZGUsCisgICAgICAgICAgIHNp emVvZihzaGEyNTZfY3R4KSk7CisgICAgbWVtY3B5KCZjdHgtPmN0eF9vdXRzaWRlX3JlaW5pdCwg JmN0eC0+Y3R4X291dHNpZGUsCisgICAgICAgICAgIHNpemVvZihzaGEyNTZfY3R4KSk7Cit9CisK K3ZvaWQgaG1hY19zaGEyNTZfcmVpbml0KGhtYWNfc2hhMjU2X2N0eCAqY3R4KQoreworICAgIG1l bWNweSgmY3R4LT5jdHhfaW5zaWRlLCAmY3R4LT5jdHhfaW5zaWRlX3JlaW5pdCwKKyAgICAgICAg ICAgc2l6ZW9mKHNoYTI1Nl9jdHgpKTsKKyAgICBtZW1jcHkoJmN0eC0+Y3R4X291dHNpZGUsICZj dHgtPmN0eF9vdXRzaWRlX3JlaW5pdCwKKyAgICAgICAgICAgc2l6ZW9mKHNoYTI1Nl9jdHgpKTsK K30KKwordm9pZCBobWFjX3NoYTI1Nl91cGRhdGUoaG1hY19zaGEyNTZfY3R4ICpjdHgsIGNvbnN0 IHVuc2lnbmVkIGNoYXIgKm1lc3NhZ2UsCisgICAgICAgICAgICAgICAgICAgICAgICB1bnNpZ25l ZCBpbnQgbWVzc2FnZV9sZW4pCit7CisgICAgc2hhMjU2X3VwZGF0ZSgmY3R4LT5jdHhfaW5zaWRl LCBtZXNzYWdlLCBtZXNzYWdlX2xlbik7Cit9CisKK3ZvaWQgaG1hY19zaGEyNTZfZmluYWwoaG1h Y19zaGEyNTZfY3R4ICpjdHgsIHVuc2lnbmVkIGNoYXIgKm1hYywKKyAgICAgICAgICAgICAgICAg ICAgICAgdW5zaWduZWQgaW50IG1hY19zaXplKQoreworICAgIHVuc2lnbmVkIGNoYXIgZGlnZXN0 X2luc2lkZVtTSEEyNTZfRElHRVNUX1NJWkVdOworICAgIHVuc2lnbmVkIGNoYXIgbWFjX3RlbXBb U0hBMjU2X0RJR0VTVF9TSVpFXTsKKworICAgIHNoYTI1Nl9maW5hbCgmY3R4LT5jdHhfaW5zaWRl LCBkaWdlc3RfaW5zaWRlKTsKKyAgICBzaGEyNTZfdXBkYXRlKCZjdHgtPmN0eF9vdXRzaWRlLCBk aWdlc3RfaW5zaWRlLCBTSEEyNTZfRElHRVNUX1NJWkUpOworICAgIHNoYTI1Nl9maW5hbCgmY3R4 LT5jdHhfb3V0c2lkZSwgbWFjX3RlbXApOworICAgIG1lbWNweShtYWMsIG1hY190ZW1wLCBtYWNf c2l6ZSk7Cit9CisKK3ZvaWQgaG1hY19zaGEyNTYoY29uc3QgdW5zaWduZWQgY2hhciAqa2V5LCB1 bnNpZ25lZCBpbnQga2V5X3NpemUsCisgICAgICAgICAgY29uc3QgdW5zaWduZWQgY2hhciAqbWVz c2FnZSwgdW5zaWduZWQgaW50IG1lc3NhZ2VfbGVuLAorICAgICAgICAgIHVuc2lnbmVkIGNoYXIg Km1hYywgdW5zaWduZWQgbWFjX3NpemUpCit7CisgICAgaG1hY19zaGEyNTZfY3R4IGN0eDsKKwor ICAgIGhtYWNfc2hhMjU2X2luaXQoJmN0eCwga2V5LCBrZXlfc2l6ZSk7CisgICAgaG1hY19zaGEy NTZfdXBkYXRlKCZjdHgsIG1lc3NhZ2UsIG1lc3NhZ2VfbGVuKTsKKyAgICBobWFjX3NoYTI1Nl9m aW5hbCgmY3R4LCBtYWMsIG1hY19zaXplKTsKK30KZGlmZiAtLWdpdCBhL3Rvb2xzL3Zob3N0LXVz ZXItcnBtYi9tZXNvbi5idWlsZCBiL3Rvb2xzL3Zob3N0LXVzZXItcnBtYi9tZXNvbi5idWlsZApp bmRleCBjZjgwYmVkZDk5YWMuLmY5NjQ4MzdkMTUxZCAxMDA2NDQKLS0tIGEvdG9vbHMvdmhvc3Qt dXNlci1ycG1iL21lc29uLmJ1aWxkCisrKyBiL3Rvb2xzL3Zob3N0LXVzZXItcnBtYi9tZXNvbi5i dWlsZApAQCAtMSw1ICsxLDYgQEAKIGV4ZWN1dGFibGUoJ3Zob3N0LXVzZXItcnBtYicsIGZpbGVz KAotICAnbWFpbi5jJyksCisgICdtYWluLmMnLAorICAnaG1hY19zaGEyNTYuYycpLAogICBkZXBl bmRlbmNpZXM6IFtxZW11dXRpbCwgZ2xpYiwgZ2lvXSwKICAgbGlua193aXRoOiBbbGlidmhvc3Rf dXNlcl0sCiAgIGluc3RhbGw6IHRydWUsCi0tIAoyLjIwLjEKCl9fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fClZpcnR1YWxpemF0aW9uIG1haWxpbmcgbGlzdApW aXJ0dWFsaXphdGlvbkBsaXN0cy5saW51eC1mb3VuZGF0aW9uLm9yZwpodHRwczovL2xpc3RzLmxp bnV4Zm91bmRhdGlvbi5vcmcvbWFpbG1hbi9saXN0aW5mby92aXJ0dWFsaXphdGlvbg==